Skip to content

Commit 84b6227

Browse files
committed
Add option to disable hack in tests (to not pollute the test results)
1 parent 4a51a72 commit 84b6227

2 files changed

Lines changed: 25 additions & 16 deletions

File tree

core/capabilities/integration_tests/keystone/securemint_workflow_test.go

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,8 @@ import (
1616
"github.com/smartcontractkit/chainlink/v2/core/capabilities/integration_tests/framework"
1717
)
1818

19+
// Test_runSecureMintWorkflow can be run with:
20+
// `SECURE_TRANSMITTER_HACK_DISABLED=true CL_DATABASE_URL=postgresql://chainlink_dev:insecurepassword@localhost:5432/chainlink_development_test?sslmode=disable go test -timeout 2m -run ^Test_runSecureMintWorkflow$ github.com/smartcontractkit/chainlink/v2/core/capabilities/integration_tests/keystone`
1921
func Test_runSecureMintWorkflow(t *testing.T) {
2022
ctx := t.Context()
2123
lggr := logger.Test(t)

core/services/chainlink/application.go

Lines changed: 23 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ import (
77
"fmt"
88
"math/big"
99
"net/http"
10+
"os"
1011
"strconv"
1112
"sync"
1213
"time"
@@ -68,7 +69,7 @@ import (
6869
"github.com/smartcontractkit/chainlink/v2/core/services/llo/retirement"
6970
"github.com/smartcontractkit/chainlink/v2/core/services/ocr"
7071
"github.com/smartcontractkit/chainlink/v2/core/services/ocr2"
71-
securemint "github.com/smartcontractkit/chainlink/v2/core/services/ocr3/securemint"
72+
"github.com/smartcontractkit/chainlink/v2/core/services/ocr3/securemint"
7273
"github.com/smartcontractkit/chainlink/v2/core/services/ocrbootstrap"
7374
"github.com/smartcontractkit/chainlink/v2/core/services/ocrcommon"
7475
p2ptypes "github.com/smartcontractkit/chainlink/v2/core/services/p2p/types"
@@ -1022,22 +1023,28 @@ func newCREServices(
10221023
opts.CapabilitiesRegistry.SetLocalRegistry(&capabilities.TestMetadataRegistry{})
10231024
}
10241025

1025-
globalLogger.Infow("HACK: initializing Secure Mint transmitter for sending mock secure mint trigger events")
1026-
transmitterConfig := securemint.TransmitterConfig{
1027-
Logger: globalLogger,
1028-
CapabilitiesRegistry: opts.CapabilitiesRegistry,
1029-
DonID: 1,
1030-
TriggerCapabilityName: "securemint-trigger",
1031-
TriggerCapabilityVersion: "1.0.0",
1032-
TriggerTickerMinResolutionMs: 1000,
1033-
TriggerSendChannelBufferSize: 1000,
1034-
}
1035-
transmitter, err := transmitterConfig.NewTransmitter("securemint-transmitter")
1036-
if err != nil {
1037-
globalLogger.Errorw("could not create Secure Mint transmitter, skipping", "error", err)
1026+
// enable hack unless it's specifically disabled on the environment (e.g. for tests)
1027+
secureMintTransmitterHackDisabled, ok := os.LookupEnv("SECURE_TRANSMITTER_HACK_DISABLED")
1028+
if !ok || secureMintTransmitterHackDisabled != "true" {
1029+
globalLogger.Infow("HACK: initializing Secure Mint transmitter for sending mock secure mint trigger events")
1030+
transmitterConfig := securemint.TransmitterConfig{
1031+
Logger: globalLogger,
1032+
CapabilitiesRegistry: opts.CapabilitiesRegistry,
1033+
DonID: 1,
1034+
TriggerCapabilityName: "securemint-trigger",
1035+
TriggerCapabilityVersion: "1.0.0",
1036+
TriggerTickerMinResolutionMs: 1000,
1037+
TriggerSendChannelBufferSize: 1000,
1038+
}
1039+
transmitter, err := transmitterConfig.NewTransmitter("securemint-transmitter")
1040+
if err != nil {
1041+
globalLogger.Errorw("could not create Secure Mint transmitter, skipping", "error", err)
1042+
} else {
1043+
srvcs = append(srvcs, transmitter)
1044+
globalLogger.Infow("HACK: successfully created Secure Mint transmitter")
1045+
}
10381046
} else {
1039-
srvcs = append(srvcs, transmitter)
1040-
globalLogger.Infow("HACK: successfully created Secure Mint transmitter")
1047+
globalLogger.Infow("HACK: Secure Mint transmitter hack disabled, skipping")
10411048
}
10421049

10431050
return &CREServices{

0 commit comments

Comments
 (0)