-
Notifications
You must be signed in to change notification settings - Fork 1.6k
Conversation
show logs to see what's going wrong
…into mp-bootnode-checker
REVERT ME before merging PR. Should cause the test to fail, then when we remove it, we should succeed. Sadly doesn't account for a new successful bootnode, should ask if we have one we can use for testing.
Begin polling the RPC node right after spawning, allowing us to break early on detecting peers
…into mp-bootnode-checker
Thanks for this, we were trying to figure out a way to roll our own decentralized test and hadn't considered using custom chain spec files. We'll be rolling this into the decentralized IBP monitor to monitor our own nodes. In the case of polkadotters, I believe they had an issue with their network security key. There is an open PR from them to correct this. In the case of metaspan, I reached out to let them know that their bootnodes were failing. |
I corrected an error in the proxy config for the wss connection. Using this command I'm able now to get a test node to start syncing: docker run --rm parity/polkadot \
--base-path /data \
--no-hardware-benchmarks --no-mdns \
--chain westend \
--reserved-only \
--reserved-nodes "/dns/boot-westend.metaspan.io/tcp/33016/wss/p2p/12D3KooWNTau7iG4G9cUJSwwt2QJP1W88pUf2SgqsHjRU2RL8pfa" |
Awesome! I reran our job and the metaspan bootnode no longer appears uncontactable for the three runtimes we're checking, cheers! |
In my independent testing the Parity bootnode is UP: |
So testing with |
bot rebase |
Rebased |
bot merge |
* master: kusama: enable dispute slashes (#5974) Introduce OpenGov into Polkadot (#6701) introduce new well known key (#6915) [CI] Add bootnode checking CI jobs (#6889) Bump parity-db (#6921) Handling timers for repeat dispute participation requests (#6901) [Companion #13634] keystore overhaul (iter2) (#6913) tweak some pattern matches to address a new clippy warning Bump ci-linux image for rust 1.68 Revert "Update orchestra to the recent version (#6854)" (#6916) Deprecate Currency: Companion for #12951 (#6780) changelog: template fixup (#6907) [Companion #13615] Keystore overhaul (#6892) update weights (#6897) Fix approval voting test (#6898) parachains-runtime: Less cloning! (#6896) Testing Reversion Speed on Dispute Concluded Against (#6880) remove duplicated arm and fix version index (#6884)
* master: kusama: enable dispute slashes (#5974) Introduce OpenGov into Polkadot (#6701) introduce new well known key (#6915) [CI] Add bootnode checking CI jobs (#6889) Bump parity-db (#6921) Handling timers for repeat dispute participation requests (#6901) [Companion #13634] keystore overhaul (iter2) (#6913) tweak some pattern matches to address a new clippy warning Bump ci-linux image for rust 1.68 Revert "Update orchestra to the recent version (#6854)" (#6916) Deprecate Currency: Companion for #12951 (#6780) changelog: template fixup (#6907) [Companion #13615] Keystore overhaul (#6892) update weights (#6897) Fix approval voting test (#6898) parachains-runtime: Less cloning! (#6896) Testing Reversion Speed on Dispute Concluded Against (#6880) remove duplicated arm and fix version index (#6884)
Fixes paritytech/ci_cd#735
This PR creates two new Github workflows that check whether some given set of bootnodes are contactable. It does this by rewriting the chainspec for a given runtime such that it only includes the bootnode we wish to test. It then runs a polkadot node using that new chainspec, waits a little while and polls the local node's
health_check
endpoint to make sure it has been able to peer with other nodes.The two tests are:
node/service/chain-specs/
is updated that only tests the connectivity of the newly-added bootnodes.P.S., @paritytech/release-engineering I wasn't sure what to call the on-release workflow file, I noticed you've got some pattern for your github workflows, so lmk what I should change it to (i.e., what number I should prepend the file with).
EDIT: Oh also, here are some examples of the jobs being run against bootnodes. Notice that it is already finding a couple of uncontactable bootnodes (verified manually so we know it's working):
For all three runtimes, the bootnodes by polkadotters.com and metaspan.io are unresponsive. Also for kusama, one of our own bootnodes (
/dns/kusama-bootnode-0.paritytech.net/tcp/30334/ws/p2p/12D3KooWSueCPH3puP2PcvqPJdNaDNF3jMZjtJtDiSy35pWrbt5h
) is also uncontactable.Currently failing bootnodes:
Westend:
Kusama:
Polkadot:
Don't know if we want a process for removing them, should we remove them as part of another PR or contact the owners of said bootnodes first?