Skip to content

Commit 5c8d483

Browse files
authored
feat: cargo release profile in ci (#2980)
1 parent f7d285e commit 5c8d483

File tree

3 files changed

+3
-4
lines changed

3 files changed

+3
-4
lines changed

.github/workflows/rust.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -75,12 +75,12 @@ jobs:
7575
sudo rm -rf "/usr/local/share/boost"
7676
sudo rm -rf "$AGENT_TOOLSDIRECTORY"
7777
- name: Check
78-
run: cargo check --all-features --all-targets
78+
run: cargo check --release --all-features --all-targets
7979
- name: Rustfmt
8080
run: cargo fmt --all -- --check
8181
- name: Clippy
8282
run: cargo clippy -- -D warnings
8383
- name: Setup WASM
8484
run: rustup target add wasm32-unknown-unknown
8585
- name: Check WASM
86-
run: cargo check -p hyperlane-core --features=strum,test-utils --target wasm32-unknown-unknown
86+
run: cargo check --release -p hyperlane-core --features=strum,test-utils --target wasm32-unknown-unknown

.github/workflows/test.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -219,7 +219,7 @@ jobs:
219219
working-directory: ./rust
220220

221221
- name: agent tests with CosmWasm
222-
run: RUST_BACKTRACE=1 cargo test --package run-locally --bin run-locally --features cosmos -- cosmos::test --nocapture
222+
run: RUST_BACKTRACE=1 cargo test --release --package run-locally --bin run-locally --features cosmos -- cosmos::test --nocapture
223223
working-directory: ./rust
224224

225225
- name: agent tests excluding CosmWasm

typescript/infra/src/infrastructure/external-secrets/helm/README.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,4 +29,3 @@ Regardless, workload identities are a more attractive long-term option, and movi
2929
The [documentation](https://external-secrets.io/v0.4.4/) is the best source. In short, it allows Kuberenetes Secrets to get their secrets from an external secret provided (like GCP's Secret Manager), all without a developer/deployer needing to touch the secrets themselves.
3030

3131
The general idea is there are `SecretStore`s (or `ClusterSecretStore`s, which are the cluster-wide version), that specify how the cluster can authenticate with the external secret provider. `ExternalSecret`s can then be specified in "application" infrastructure, which allow developers to specify a template for a Secret that will be created using the secret values from the external provider (& using the credentials from the SecretStore).
32-

0 commit comments

Comments
 (0)