Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 5 additions & 0 deletions .changeset/cool-trees-laugh.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
---
"chainlink": minor
---

#added confidential-http to proposable job specs in chainlink/deployment
4 changes: 2 additions & 2 deletions deployment/cre/jobs/propose_job_spec.go
Original file line number Diff line number Diff line change
Expand Up @@ -61,7 +61,7 @@ func (u ProposeJobSpec) VerifyPreconditions(_ cldf.Environment, config ProposeJo
if err := verifyEVMJobSpecInputs(config.Inputs); err != nil {
return fmt.Errorf("invalid inputs for EVM job spec: %w", err)
}
case job_types.Cron, job_types.BootstrapOCR3, job_types.OCR3, job_types.Gateway, job_types.HTTPTrigger, job_types.HTTPAction, job_types.BootstrapVault, job_types.Consensus:
case job_types.Cron, job_types.BootstrapOCR3, job_types.OCR3, job_types.Gateway, job_types.HTTPTrigger, job_types.HTTPAction, job_types.ConfidentialHTTP, job_types.BootstrapVault, job_types.Consensus:
default:
return fmt.Errorf("unsupported template: %s", config.Template)
}
Expand All @@ -77,7 +77,7 @@ func (u ProposeJobSpec) Apply(e cldf.Environment, input ProposeJobSpecInput) (cl
var report operations.Report[any, any]
switch input.Template {
// This will hold all standard capabilities jobs as we add support for them.
case job_types.EVM, job_types.Cron, job_types.HTTPTrigger, job_types.HTTPAction, job_types.Consensus:
case job_types.EVM, job_types.Cron, job_types.HTTPTrigger, job_types.HTTPAction, job_types.ConfidentialHTTP, job_types.Consensus:
// Only consensus generates an oracle factory, for now...
job, err := input.Inputs.ToStandardCapabilityJob(input.JobName, input.Template == job_types.Consensus)
if err != nil {
Expand Down
21 changes: 21 additions & 0 deletions deployment/cre/jobs/propose_job_spec_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -92,6 +92,27 @@ func TestProposeJobSpec_VerifyPreconditions(t *testing.T) {
},
expectError: false,
},
{
name: "valid http action job",
input: jobs.ProposeJobSpecInput{
Environment: "test",
JobName: "confidential-http-test",
Domain: "cre",
DONName: "test-don",
DONFilters: []offchain.TargetDONFilter{
{Key: offchain.FilterKeyDONName, Value: "d"},
{Key: "environment", Value: "e"},
{Key: "product", Value: offchain.ProductLabel},
},
Template: job_types.ConfidentialHTTP,
Inputs: job_types.JobSpecInput{
"command": "confidential-http",
"config": `{"proxyMode": "direct"}`,
"externalJobID": "confidential-http-job-id",
},
},
expectError: false,
},
{
name: "valid evm job",
input: jobs.ProposeJobSpecInput{
Expand Down
5 changes: 5 additions & 0 deletions deployment/cre/jobs/types/job_spec_template.go
Original file line number Diff line number Diff line change
Expand Up @@ -17,6 +17,7 @@ const (
OCR3
HTTPTrigger
HTTPAction
ConfidentialHTTP
EVM
Gateway
BootstrapVault
Expand All @@ -35,6 +36,8 @@ func (jt JobSpecTemplate) String() string {
return "http-trigger"
case HTTPAction:
return "http-action"
case ConfidentialHTTP:
return "confidential-http"
case EVM:
return "evm"
case Gateway:
Expand All @@ -61,6 +64,8 @@ func parseJobSpecTemplate(s string) (JobSpecTemplate, error) {
return HTTPTrigger, nil
case "http-action":
return HTTPAction, nil
case "confidential-http":
return ConfidentialHTTP, nil
case "evm":
return EVM, nil
case "gateway":
Expand Down
Loading