Skip to content

Bump chainlink-protos/cre/go for ConfidentialWorkflow proto restructure#2080

Merged
mchain0 merged 3 commits into
mainfrom
tejaswi/bump-protos-binary-url-restructure
May 22, 2026
Merged

Bump chainlink-protos/cre/go for ConfidentialWorkflow proto restructure#2080
mchain0 merged 3 commits into
mainfrom
tejaswi/bump-protos-binary-url-restructure

Conversation

@nadahalli
Copy link
Copy Markdown
Contributor

@nadahalli nadahalli commented May 21, 2026

Breaking Changes

Are ok, because confidential-workflows is not in production yet. We are still working on it.

What

Bumps github.com/smartcontractkit/chainlink-protos/cre/go:

Picks up the ConfidentialWorkflow proto restructure:

  • binary_url moved from WorkflowExecution to ConfidentialWorkflowRequest (sibling of execution, outside ComputeRequest.PublicData hash envelope). A per-node value cannot live inside that envelope without breaking F+1 quorum at the enclave.
  • SecretIdentifier message and vault_don_secrets field removed. Enclave fetches secrets dynamically at runtime; the host-side adapter already returns nil for this field.
  • WorkflowExecution fields renumbered cleanly with no reserved gap. org_id moves from field 7 to field 6.

The new binary_url field on ConfidentialWorkflowRequest carries a load-bearing comment in the upstream proto explaining the design constraint and the hash-envelope invariant. Read that for full context.

Scope

  • go.mod + go.sum: bumped cre/go pseudo-version.
  • keystore/go.mod + keystore/go.sum: same indirect bump.
  • pkg/capabilities/v2/actions/confidentialworkflow/client.pb.go: regenerated.

No source consumers in chainlink-common reference WorkflowExecution.BinaryUrl or VaultDonSecrets, so no other code changes needed. Root and keystore builds pass.

Follow-up PRs

  • confidential-compute: add per-node-data passthrough on SignedComputeRequest, framework executor seam, update enclave/apps/confidential-workflows/app/app.go to read URL from per-node-data, update capability/action.go adapter, remove vault_don_secrets validation, update tests and E2E.
  • chainlink: core/services/workflows/v2/confidential_module.go:130 populates new binary_url on ConfidentialWorkflowRequest instead of WorkflowExecution.BinaryUrl.

See PRIV-389 for background.

Bumps github.com/smartcontractkit/chainlink-protos/cre/go pseudo-version
from v0.0.0-20260514104516-a827acdffe43 to v0.0.0-20260520181035-b5bb732eb9d7
(chainlink-protos cap-dev tip after #365 merged).

The proto restructure (chainlink-protos#365):

- binary_url moved from WorkflowExecution to ConfidentialWorkflowRequest
  (sibling of execution, outside ComputeRequest.PublicData hash envelope).
- SecretIdentifier message and vault_don_secrets field removed; enclave
  fetches secrets dynamically at runtime and the host-side adapter
  already returns nil for vault_don_secrets.
- WorkflowExecution fields renumbered cleanly with no reserved gap; org_id
  moves from field 7 to field 6.

Regenerated pkg/capabilities/v2/actions/confidentialworkflow/client.pb.go.
Also bumped the indirect pin in keystore/go.mod for consistency.

No chainlink-common code consumers reference WorkflowExecution.BinaryUrl
or VaultDonSecrets, so no other source changes needed.

See PRIV-389.
Copilot AI review requested due to automatic review settings May 21, 2026 10:13
@nadahalli nadahalli requested review from a team as code owners May 21, 2026 10:13
@github-actions
Copy link
Copy Markdown

👋 nadahalli, thanks for creating this pull request!

To help reviewers, please consider creating future PRs as drafts first. This allows you to self-review and make any final changes before notifying the team.

Once you're ready, you can mark it as "Ready for review" to request feedback. Thanks!

@github-actions
Copy link
Copy Markdown

github-actions Bot commented May 21, 2026

⚠️ API Diff Results - github.com/smartcontractkit/chainlink-common

⚠️ Breaking Changes (5)

pkg/capabilities/v2/actions/confidentialworkflow (1)
  • SecretIdentifier — 🗑️ Removed
pkg/capabilities/v2/actions/confidentialworkflow.(*ConfidentialWorkflowRequest) (1)
  • GetVaultDonSecrets — 🗑️ Removed
pkg/capabilities/v2/actions/confidentialworkflow.(*WorkflowExecution) (1)
  • GetBinaryUrl — 🗑️ Removed
pkg/capabilities/v2/actions/confidentialworkflow.ConfidentialWorkflowRequest (1)
  • VaultDonSecrets — 🗑️ Removed
pkg/capabilities/v2/actions/confidentialworkflow.WorkflowExecution (1)
  • BinaryUrl — 🗑️ Removed

✅ Compatible Changes (2)

pkg/capabilities/v2/actions/confidentialworkflow.(*ConfidentialWorkflowRequest) (1)
  • GetBinaryUrl — ➕ Added
pkg/capabilities/v2/actions/confidentialworkflow.ConfidentialWorkflowRequest (1)
  • BinaryUrl — ➕ Added

📄 View full apidiff report

@github-actions
Copy link
Copy Markdown

github-actions Bot commented May 21, 2026

📊 API Diff Results

No changes detected for module github.com/smartcontractkit/chainlink-common/keystore

View full report

Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

This PR updates github.com/smartcontractkit/chainlink-protos/cre/go to pick up the ConfidentialWorkflow proto restructure, and refreshes the generated Go bindings in chainlink-common accordingly. This aligns the client types with the upstream change that moves per-node binary_url out of the hashed WorkflowExecution envelope and removes the no-longer-used VaultDON secret identifier plumbing.

Changes:

  • Bump chainlink-protos/cre/go pseudo-version in the root module and keystore submodule.
  • Regenerate pkg/capabilities/v2/actions/confidentialworkflow/client.pb.go to reflect the upstream proto changes (move binary_url, remove vault_don_secrets / SecretIdentifier, renumber WorkflowExecution fields).

Reviewed changes

Copilot reviewed 2 out of 5 changed files in this pull request and generated no comments.

Show a summary per file
File Description
pkg/capabilities/v2/actions/confidentialworkflow/client.pb.go Regenerated protobuf bindings reflecting the ConfidentialWorkflow request/execution schema changes.
go.mod Updates chainlink-protos/cre/go to the newer pseudo-version.
go.sum Updates sums for the new chainlink-protos/cre/go version.
keystore/go.mod Updates the keystore submodule’s indirect chainlink-protos/cre/go requirement.
keystore/go.sum Adds sums for the new chainlink-protos/cre/go version in the keystore submodule.
Files not reviewed (1)
  • pkg/capabilities/v2/actions/confidentialworkflow/client.pb.go: Language not supported

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

The keystore submodule was bumped via 'go get' but go.sum still carried
the orphan old-pin entries (v0.0.0-20260420204255-a3f3bdd56877) for the
chainlink-protos/cre/go indirect dependency. Running 'go mod tidy' from
inside the keystore module removes them.

Fixes check-tidy CI failure on this branch.
@mchain0 mchain0 added this pull request to the merge queue May 22, 2026
Merged via the queue into main with commit c735c28 May 22, 2026
34 of 35 checks passed
@mchain0 mchain0 deleted the tejaswi/bump-protos-binary-url-restructure branch May 22, 2026 13:10
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants