Skip to content

Release/0.6.11#1924

Closed
j16r wants to merge 779 commits intomasterfrom
release/0.6.11
Closed

Release/0.6.11#1924
j16r wants to merge 779 commits intomasterfrom
release/0.6.11

Conversation

@j16r
Copy link
Copy Markdown
Contributor

@j16r j16r commented Nov 12, 2019

No description provided.

Alex Kwiatkowski and others added 30 commits October 31, 2019 15:43
Store log artifacts on CircleCI
Convert evm/test/Oracle_test.js to ethers
TestEthTxAdapter_Perform_AppendingTransactionReceipts
j16r and others added 24 commits November 11, 2019 13:35
…r_merging

Use a Merge function, to make merging of >2 inputs clearer
Bump @types/react-router-dom from 4.3.5 to 5.1.2

Co-authored-by: null <27856297+dependabot-preview[bot]@users.noreply.github.com>
…hed_check_from_run_executor

Trim extra Runnable() check from run executor
Remove unused examples
- Save form input on error
- Clear saved input on success
- Show changed form nav warning when different to initial or persisted
- Save form input on error
- Clear saved input on success
- Show changed form nav warning when different to initial or persisted
Clear forms on save
Handle null from localStorage persistURL
Render JSON-API errors on 422 unprocessable entity
@j16r j16r closed this Nov 12, 2019
@j16r j16r deleted the release/0.6.11 branch November 12, 2019 22:06
nadahalli added a commit that referenced this pull request Apr 8, 2026
host.ExecutionHelper gained EmitUserMetric in chainlink-common #1924.
nadahalli added a commit that referenced this pull request Apr 8, 2026
host.ExecutionHelper gained EmitUserMetric in chainlink-common #1924.
nadahalli added a commit that referenced this pull request Apr 8, 2026
host.ExecutionHelper gained EmitUserMetric in chainlink-common #1924.
github-merge-queue Bot pushed a commit that referenced this pull request Apr 16, 2026
…21641)

* resolve go.mod conflicts

* Revert file fetcher HTTP URL handling

The filepath.Base() code for HTTP URLs in newFileFetcher was dead code.
No test or production path sends an HTTP URL to a file-based fetcher.
The enclave fetches binaries via its own BinaryFetcher, independent of
the node syncer's fetcher.

* Restore comments in startAndRegisterEngine, extract newV2EngineConfig

Restore comments that were dropped when extracting startAndRegisterEngine
from tryEngineCreate. Extract common EngineConfig construction into
newV2EngineConfig and initDone hook wiring into wireInitDoneHook,
reducing duplication between the normal and confidential engine paths.

* Unify engine creation flow for confidential and normal paths

Replace the early-return pattern with a symmetric if/else that picks
the factory, then converges on a single startAndRegisterEngine call.
Rename tryConfidentialEngineCreate to confidentialEngineFactory and
change its signature to return (services.Service, error).

# Conflicts:
#	core/services/workflows/syncer/v2/handler.go

* Restore initDone comment in tryEngineCreate

* Inline startAndRegisterEngine back into tryEngineCreate

No longer needed as a separate method now that both engine paths
converge in tryEngineCreate.

* Restore inline comments in wireInitDoneHook

* Restore original BeholderEmitter closure pattern in newV2EngineConfig

* Clean up factory signatures and newV2EngineConfig param ordering

Group string params together in newV2EngineConfig, move SdkName and
DebugMode into the constructor, drop unused wid param from
confidentialEngineFactory.

* Fix lint: errors.New, assert.Empty

* Add BinaryURLResolver to ConfidentialModule for presigned URL support

The enclave needs an authenticated URL to download WASM binaries from
the CRE storage service. BinaryURLResolver resolves the raw on-chain
URL into a presigned/ephemeral URL per execution. Nil-safe: falls
back to the raw URL when no resolver is set.

PR 5/5 (#21642) wires this to the storage service retriever.

* add EmitUserMetric to stubExecutionHelper

host.ExecutionHelper gained EmitUserMetric in chainlink-common #1924.

* fix struct field alignment in ConfidentialModule

* set org_id on WorkflowExecution from CRE context

Bump chainlink-common to pick up OrgId field on WorkflowExecution
proto. Read org from the CRE execution context and include it in
the proto sent to the enclave, matching the pattern used by the
framework executor for VaultDON requests.

* block user workflows from calling system-only capabilities

Adds a deny-list check in ExecutionHelper.CallCapability() that
prevents user workflow steps from invoking internal capabilities
like confidential-workflows. The ConfidentialModule bypasses this
gate because it calls the registry directly.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

7 participants