Move encrypt_output access from ConfidentialHTTPRequest to HTTPRequest#21071
Conversation
|
👋 nadahalli, thanks for creating this pull request! To help reviewers, please consider creating future PRs as drafts first. This allows you to self-review and make any final changes before notifying the team. Once you're ready, you can mark it as "Ready for review" to request feedback. Thanks! |
There was a problem hiding this comment.
Pull request overview
Updates the fake confidential HTTP capability to read encrypt_output from the inner HTTPRequest (per proto change), and bumps module dependencies to pick up regenerated types.
Changes:
- Read
encrypt_outputviainput.GetRequest().GetEncryptOutput()instead ofinput.GetEncryptOutput() - Bump
chainlink-commonandchainlink-protos/*pseudo-versions across modules - Add
chainlink-protos/node-platformas an indirect dependency where required
Reviewed changes
Copilot reviewed 8 out of 15 changed files in this pull request and generated no comments.
Show a summary per file
| File | Description |
|---|---|
| system-tests/tests/go.mod | Bumps chainlink-common/chainlink-protos versions to align with regenerated types |
| system-tests/lib/go.mod | Bumps chainlink-common/chainlink-protos versions; adds node-platform indirect |
| integration-tests/load/go.mod | Bumps chainlink-common/chainlink-protos versions; adds node-platform indirect |
| integration-tests/go.mod | Bumps chainlink-common/chainlink-protos versions; adds node-platform indirect |
| go.mod | Bumps chainlink-common/chainlink-protos versions; adds node-platform indirect |
| deployment/go.mod | Bumps chainlink-common/chainlink-protos versions; adds node-platform indirect |
| core/scripts/go.mod | Bumps chainlink-common/chainlink-protos versions; adds node-platform indirect |
| core/capabilities/fakes/confidential_http_action.go | Switches encrypt_output lookup to the inner HTTPRequest |
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
CORA - Pending ReviewersAll codeowners have approved! ✅ Legend: ✅ Approved | ❌ Changes Requested | 💬 Commented | 🚫 Dismissed | ⏳ Pending | ❓ Unknown For more details, see the full review summary. |
|
I see you updated files related to
|
Bump chainlink-common to a82fa419e483 and chainlink-protos/cre/go to a488315d180f across all submodules. Access EncryptOutput via GetRequest().GetEncryptOutput() since the field moved from the outer wrapper to HTTPRequest.
… into move-encrypt-output-to-http-request
|




Summary
encrypt_outputaccess from the outerConfidentialHTTPRequestwrapper to the innerHTTPRequest, following chainlink-protos#291chainlink-commontoa82fa419e483andchainlink-protos/cre/gotoa488315d180facross all 7 submodulesDepends on
- #21045 — bumps workflow source protos (must merge first, then rebase this PR)Breaking changes
Follow-up to chainlink-protos#291 which moved
encrypt_outputfromConfidentialHTTPRequest(field 3) toHTTPRequest(field 9). The field is not yet used in production.Code changes
core/capabilities/fakes/confidential_http_action.goRelated PRs