Skip to content

Commit

Permalink
update streamer to the latest of list-service development branch
Browse files Browse the repository at this point in the history
  • Loading branch information
curvesy committed Dec 16, 2023
2 parents 4d00cca + c583a20 commit 3c32d2f
Show file tree
Hide file tree
Showing 803 changed files with 41,753 additions and 34,991 deletions.
13 changes: 6 additions & 7 deletions .eslintrc
Original file line number Diff line number Diff line change
@@ -1,16 +1,17 @@
{
"extends": [
"lisk-base"
"lisk-base",
"prettier"
],
"plugins": [
"import",
"mocha"
],
"globals": {
"ipc": true,
"BigInt": true,
"PRODUCTION": true,
"TEST": true,
"BigInt": true
"TEST": true
},
"env": {
"node": true,
Expand Down Expand Up @@ -42,6 +43,7 @@
]
}
],
"no-await-in-loop": "off",
"no-loop-func": "off",
"no-plusplus": "off",
"no-restricted-properties": "off",
Expand Down Expand Up @@ -70,9 +72,6 @@
}
],
"mocha/no-skipped-tests": "off",
"indent": [
"error",
"tab"
]
"indent": "off"
}
}
10 changes: 0 additions & 10 deletions .github/ISSUE_TEMPLATE/bug_report.md
Original file line number Diff line number Diff line change
@@ -1,27 +1,17 @@
---

name: Bug report
about: Create a report to help us improve
title: ''
labels: 'type: bug'
assignees: ''
projects: 'Lisk Service Version 0.7.0'
status: 'Backlog'

---

### Actual behavior



### Expected behavior



### Steps to reproduce



### Which version(s) does this affect? (Environment, OS, etc...)


1 change: 0 additions & 1 deletion .github/ISSUE_TEMPLATE/feature_request.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,6 @@ about: Propose an idea for new improvements/features
title: ''
labels: 'type: enhancement, type: feature proposal'
assignees: ''

---

### Description
Expand Down
3 changes: 3 additions & 0 deletions .github/pull_request_template.md
Original file line number Diff line number Diff line change
@@ -1,8 +1,11 @@
### What was the problem?

This PR resolves #INSERT_ISSUE_NUMBER

### How was it solved?

<!--- Please describe your technical implementation -->

### How was it tested?

<!--- Please describe how you tested your changes -->
2 changes: 1 addition & 1 deletion .github/semgrep/rule.yaml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
rules:
- id: schema_hardcoded_pattern
message: A fastest-validator schema uses a hardcoded pattern instead of a constant
languages:
languages:
- javascript
severity: WARNING
patterns:
Expand Down
42 changes: 21 additions & 21 deletions .github/workflows/codeql.yml
Original file line number Diff line number Diff line change
Expand Up @@ -9,14 +9,14 @@
# the `language` matrix defined below to confirm you have the correct set of
# supported CodeQL languages.
#
name: "CodeQL"
name: 'CodeQL'

on:
push:
branches: [ "development", feature/*, hotfix/*, main, release/* ]
branches: ['development', feature/*, hotfix/*, main, release/*]
pull_request:
# The branches below must be a subset of the branches above
branches: [ feature/*, hotfix/*, release/* ]
branches: ['development', feature/*, hotfix/*, release/*]
schedule:
- cron: '30 3 * * 2'

Expand All @@ -32,28 +32,28 @@ jobs:
strategy:
fail-fast: true
matrix:
language: [ 'javascript' ]
language: ['javascript']
# CodeQL supports [ 'cpp', 'csharp', 'go', 'java', 'javascript', 'python', 'ruby' ]
# Learn more about CodeQL language support at https://aka.ms/codeql-docs/language-support

steps:
- name: Checkout repository
uses: actions/checkout@v3
- name: Checkout repository
uses: actions/checkout@v3

# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@v2
with:
languages: ${{ matrix.language }}
config-file: ./.github/codeql/codeql-config.yml
# If you wish to specify custom queries, you can do so here or in a config file.
# By default, queries listed here will override any specified in a config file.
# Prefix the list here with "+" to use these queries and those in the config file.
# Initializes the CodeQL tools for scanning.
- name: Initialize CodeQL
uses: github/codeql-action/init@v2
with:
languages: ${{ matrix.language }}
config-file: ./.github/codeql/codeql-config.yml
# If you wish to specify custom queries, you can do so here or in a config file.
# By default, queries listed here will override any specified in a config file.
# Prefix the list here with "+" to use these queries and those in the config file.

# Details on CodeQL's query packs refer to : https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
# queries: security-extended,security-and-quality
# Details on CodeQL's query packs refer to : https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
# queries: security-extended,security-and-quality

- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@v2
with:
category: "/language:${{matrix.language}}"
- name: Perform CodeQL Analysis
uses: github/codeql-action/analyze@v2
with:
category: '/language:${{matrix.language}}'
2 changes: 1 addition & 1 deletion .github/workflows/pr-coverage.yml
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ jobs:
- name: Set up node
uses: actions/setup-node@v3
with:
node-version-file: ".nvmrc"
node-version-file: '.nvmrc'
- name: Install dependencies
run: make build-local
- name: Check test coverage
Expand Down
10 changes: 5 additions & 5 deletions .github/workflows/semgrep.yml
Original file line number Diff line number Diff line change
Expand Up @@ -3,10 +3,10 @@ name: Semgrep

on:
push:
branches: [ "development", feature/*, hotfix/*, main, release/* ]
branches: ['development', feature/*, hotfix/*, main, release/*]
pull_request:
# The branches below must be a subset of the branches above
branches: [ "development", feature/*, hotfix/*, release/* ]
branches: ['development', feature/*, hotfix/*, release/*]
# Schedule the CI job (this method uses cron syntax):
schedule:
- cron: '30 3 * * 2'
Expand All @@ -15,8 +15,8 @@ on:
jobs:
semgrep:
# User definable name of this GitHub Actions job.
name: semgrep/ci
# If you are self-hosting, change the following `runs-on` value:
name: semgrep/ci
# If you are self-hosting, change the following `runs-on` value:
runs-on: ubuntu-latest

container:
Expand All @@ -36,7 +36,7 @@ jobs:
# Generate a token from Semgrep Cloud Platform > Settings
# and add it to your GitHub secrets.
# SEMGREP_APP_TOKEN: ${{ secrets.SEMGREP_APP_TOKEN }}
SEMGREP_RULES: "p/javascript p/r2c p/r2c-security-audit p/r2c-best-practices p/nodejs p/nodejsscan ./.github/semgrep/rule.yaml"
SEMGREP_RULES: 'p/javascript p/r2c p/r2c-security-audit p/r2c-best-practices p/nodejs p/nodejsscan ./.github/semgrep/rule.yaml'

- name: Upload SARIF file for GitHub Advanced Security Dashboard
uses: github/codeql-action/upload-sarif@v2
Expand Down
61 changes: 61 additions & 0 deletions .prettierignore
Original file line number Diff line number Diff line change
@@ -0,0 +1,61 @@
# Files
Jenkinsfile*
Makefile
Dockerfile
LICENSE
.DS_Store
data/
.idea
logs/
jenkins/*.deployment

docs/

.gitkeep
mocha.opts

# rc files
.*rc
## ignore files
.*ignore

# Ignore extensions
*.png
*.sql
*.blob
*.ejs
*.sh
*.conf
*.env
*.info
*.log
*.tgz
*.lock
*.sqlite3

## jest snapshot
*.snap
*.tsbuildinfo

# project specific paths
test/.coverage-unit/
helm
coverage/
build/
dist/
docker/.env*
qa/
bin
tmp/

*.pid
*.gz

*.SHA256
*.mock
*.txt
.editorconfig

*.mainnet

docker/*
7 changes: 7 additions & 0 deletions .prettierrc.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
{
"printWidth": 100,
"singleQuote": true,
"trailingComma": "all",
"useTabs": true,
"arrowParens": "avoid"
}
7 changes: 5 additions & 2 deletions Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,7 @@ test-functional:
$(compose) exec -T tests yarn run test:functional

test-integration:
$(compose) exec -T tests yarn run test:integration:APIv3:SDKv6
$(compose) exec -T tests yarn run test:integration:APIv3

cli: cli-gateway

Expand Down Expand Up @@ -70,7 +70,9 @@ logs-live-%:
print-config:
$(compose) config

build: build-app-registry build-connector build-indexer build-coordinator build-statistics build-fees build-market build-export build-gateway
build: build-local build-images

build-images: build-app-registry build-connector build-indexer build-coordinator build-statistics build-fees build-market build-export build-gateway

build-all: build build-template build-tests

Expand Down Expand Up @@ -121,6 +123,7 @@ build-local:
cd ./services/export && yarn install --frozen-lockfile
cd ./services/template && yarn install --frozen-lockfile
cd ./tests && yarn install --frozen-lockfile

clean: clean-local clean-images

clean-local:
Expand Down
8 changes: 4 additions & 4 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -41,7 +41,7 @@ Every microservice is independently managed and placed in a separate directory u
- The default installation method is based on Docker.
- Some token conversion rates in the Market service require their API keys.
- For the events information to be always available in the API, please set `system.keepEventsForHeights: -1` in the Lisk application node config.
- It is highly recommended to *NOT* enable any plugins on the Lisk application node when running Lisk Service against it. Enabling them can cause performance issues in Lisk Service.
- It is highly recommended to _NOT_ enable any plugins on the Lisk application node when running Lisk Service against it. Enabling them can cause performance issues in Lisk Service.

## Architecture Diagram

Expand Down Expand Up @@ -95,7 +95,7 @@ cd lisk-service
If you wish to build the local version of Lisk Service execute the following command below:

```bash
make build
make build-images
```

> This step is only necessary if you wish to build a custom or pre-release version of Lisk Service that does not have a pre-built Docker image published on the Docker Hub. The installation script chooses the last available stable version on Docker Hub, **unless** there is no local image. If you are unsure about any local builds, use the `make clean` command to remove all locally built docker images.
Expand All @@ -106,8 +106,8 @@ The following system requirements are recommended to start Lisk Service:

#### Memory

- Machines with a minimum of 8 GB RAM for the Mainnet.
- Machines with a minimum of 8 GB RAM for the Testnet.
- Machines with a minimum of 16 GB RAM for the Mainnet.
- Machines with a minimum of 16 GB RAM for the Testnet.

#### Storage

Expand Down
Loading

0 comments on commit 3c32d2f

Please sign in to comment.