Stelios
Stelios Life-long learner, happy father, trying to do some software engineering on the side.

The Chainlink protocol: Creating Oracle networks

The Chainlink protocol: Creating Oracle networks

Continuing in the world of blockchain oracles, I am covering one of the most popular protocols, Chainlink.

The world, according to Chainlink

Some blockchain-y image

Photo by Shubham Dhage on Unsplash

In my previous blog post I covered the basics of blockchain oracles, using the Band Protocol for a hands-on exercise.
If you have not read that post, you may want to take some time to get acquainted with some basic concepts, before proceeding.

Chainlink is arguably the biggest oracle protocol, having started its life in the Ethereum network.
With the protocol currently in its second iteration, Chainlink oracles

provide tamper-proof inputs, outputs, and computations to support advanced smart contracts on any blockchain.

To achieve this, the protocol

  • gives incentives and punishments to oracle and node providers to create reliable data sources,
  • performs all computations off-chain (Off-chain reporting) and stores the results on-chain, maintaining security while reducing gas cost,
  • gives them a powerful and “pliable” compute engine (the Chainlink node) for off-chain computations,
  • provides building blocks to extend the oracle functionality and connectivity to any chain and data source.

Use cases

Before we deep-dive into the technicals of Chainlink, let’s have a quick look on the different use cases it considers as relevant.
Use case images in this section are from the Chainlink whitepaper.1

Oracle data

Oracle data

The vanilla use case is “off-chain data ingress”.
A smart contract (denoted as Blockchain) requests data from an oracle (denoted as DON). The oracle reaches out to a number of external services to fetch this data.

Compaction of data

Compaction of data

This is a corollary / side-effect of the above use case. It is worth highlighting given the cost of computation gas on some chains.

A smart contract requires a number of external data points from 3rd party services.

  1. In the simple case, the oracle is a simple pass-through. Each data point / service call becomes a new transaction in the calling chain.
  2. The oracle contains "enough" logic to fan out calls to the external services and gather the required data. The different data points are compacted into a single payload back to the calling chain. This results in a single transaction, reducing overall cost.

Meta-layer

Blockchain meta-layer

The next step from the “oracle-as-off-chain-data-ingres” scenario is having a mesh of co-operating oracles acting as proxies to both the blockchain and non-blockchain worlds.
In this case, a dApp is calling one or more oracles which aggregate on- and off-chain data. This is a reincarnation of the BFF pattern, with the oracle taking over some logic which would have resided inside the dApp.

Oracle as an outgres

Outgres to prevent MEV

This use case is hidden in the Meta-layer one.
An oracle can be used as an outgress (or smart forward proxy) for important smart contract and dApp calls. The most obvious case is ensuring transaction are first-in-first-out to prevent MEV front-runs.

Architecture & components

Let’s take a quick tour of the data flow and different components involved in Chainlink. We will use the basic Oracle data use case from above.

Chainlink data flow

  1. (one-off) The Oracle operator deploys their oracle contract on a supported chain (e.g. Ethereum, Solana).
    The <<Chainlink>> Operator contract is what ties the whole system together.2 In the background they also setup their oracle node or Decentralized Oracle Network (DON). More on this in the ‘Chainlink node’ section.
  2. (one-off) The Oracle operator deploy their specific Chainlink job instance in the running Chainlink nodes (DON). The node automatically generates a unique job identifier and…
  3. (one-off) the Oracle operator registers the node as a trusted address with the Oracle smart contract.
    The oracle data feed is now ready to be used; it is uniquely identified by the combination of [oracle contract address, job id]. It can be advertised in Chainlink’s oracle marketplace and other channels.
  4. (one-off) The dApp / smart contract developer needing oracle data, update their code to use the [oracle contract address, job id] and deploy their code on the chain.
    Their contract (Consumer) extends the base Chainlink Client contract.
  5. When the Consumer contract needs data, it makes a transferAndCall invocation to the Operator contract instance.
    This is the point that the Oracle contract deducts the LINK token fee from the consumer and holds it in escrow until the node returns the data.
  6. The Operator contract emits an event for the specific job running on the Chainlink node to pick up and take action.
  7. (If there is a DON setup) The nodes in the network prepare themselves to reach a consensus on the result. More on this in the ‘DON’ section.
  8. The node(s) collect the data from the outside source(s).
    (If there is a DON) The nodes reach a consensus on the result and sign a response.
  9. The oracle node calls back the Operator contract with the result.
    If the result is deemed timely, the payment is released to the node’s wallet address.
  10. The Operator contract calls back the Consumer contract with the data result.

Architecture discussion

The end-to-end data path and high-level components build upon the standard Oracle pattern, first introduced by Ethereum.
An Oracle contract emits a special event, an associated out-of-chain trusted process listens to that event, it fetches data and performs a method callback on the Oracle contract.

Similar to the Band protocol, Chainlink innovates by providing incentives for a distributed marketplace of oracle data.
It moves a couple of steps further by

  • having the oracle contract (Operator) function as single-point-of-entry and “good behaviour” enforcer,
  • providing a “pliable” and configurable compute building block with the Chainlink node,
  • off-loading computation while trying to balance centralisation with the Decentralized Oracle Network (DON).

Let’s examine all three in a bit more detail.

Oracle contract

The oracle contract (a.k.a. Operator contract) performs 2 functions:

  • Gateway to nodes
    The contract controls which Chainlink nodes can serve specific job requests.
    Employing a general-purpose payload format for requests and responses, it remains agnostic to the “what” while focusing on the “how” of the interaction.

  • Node behaviour controller
    The oracle contract can force Chainlink nodes to have “skin in the game” and be benevolent actors.
    High-value consumer data calls can require that Chainlink nodes bond an amount of LINK as guarantee of good behavior. In case of poor performance / results, this amount gets slashed by the oracle contract.

From a technical PoV, the Chainlink node is a configurable process which can

  • listen to events from (and post callbacks to) a blockchain, and
  • execute arbitrary logic expressed as a DOT graph.

From a conceptual PoV, the best way to understand it is like a box of lego: it contains “bricks” and “templates”.

  • Bricks
    These are the individual pieces of logic executed by the node, i.e. the vertices of the graph. These are Tasks (for standard computations and external calls), Adapters (for bespoke computations and calls) and Initiators (for triggering of logic based on external conditions).
  • Templates Jobs are Chainlink’s way of describing the “category” of a computation pipeline. E.g. is the job launched as a CRON or on a webhook call? A Job is the overall framework in which the individual data pipeline of Tasks, Adapters and Initiators will execute in.

From a product PoV the reason for the technical choice (a highly configurable process) is clear.
Node and validator operators’ skillset leans more towards DevOps and sysadmin than development. I.e. it is easier for them to spin up new services based on configuration, rather than coding.
Zero-code deployments make a lot of sense for them.

DON

The real Don

A Decentralized Oracle Network (DON) is a subset of Chainlink nodes forming a committee and agreeing to serve clients on other chains (e.g. smart contracts). The DON’s service is a combination of networking, storage and computation.

The DON could be organized in one of 2 ways:

  • Basic Request Model
    In this setup, described in the previous section, the DON fetches data from primary data sources after it has been requested by consumers. It is useful when the consumer can tolerate a delay between requesting and receiving the data.
  • Data Feed
    This setup is used when data needs to be timely and acted upon immediately (e.g. price tickers). Here the oracle(s) in the DON provide data observations on regular intervals and these are stored in the oracle contract on-chain.

Off-chain Reporting (OCR)
OCR is a lightweight consensus protocol, designed to provide transparency in off-chain calculations.
It has the same compaction effect as ZK rollups: many data points in a single transaction. Unlike ZK rollups, it is transparent. The result is signed by a majority of DON participants and we know which oracle has reported what.

The OCR protocol is working with a predetermined list of oracle nodes. It is a PBFT derivative, so it requires over 2/3 of participants to be well-behaved. Only the correct oracles (according to consensus) receive a payout. Like PBFT, it has 4 stages, after leader election

  1. Start of epoch (cycle)
  2. Followers submit observations
  3. Leader compiles the report
  4. Followers sign the report

and then the leader submits the final report.

The main deviation from PBFT is the additional check for epoch invalidation. I.e. if the participants cannot reach a conclusion in a timely manner, the current epoch is cancelled and a new one starts.

With the technical descriptions out of the way, let’s re-visit our flight oracle use case.

Flight oracle, the Chainlink way

Landing

Photo by John McArthur on Unsplash

In the previous article we created a flight oracle, providing information on flight arrivals.

As a quick reminder:

  • Oracle consumer requests flight status by providing
  • Oracle responds with
    • Flight status string,
    • Arrival airport code,
    • Scheduled Departure Time (ISO-8601 UTC),
    • Actual Arrival Time (optional, ISO-8601 UTC)

In this iteration, we will

  • create a simple flight data consumer contract, deployed on the Goerli ETH testnet,
  • deploy an oracle contract on the Goerli ETH testnet as gateway,
  • operate a local Chainlink node, listening for instructions from that oracle contract.
  • The node will be configured to use our flight oracle API via an External Adapter, and
  • will submit its report back to the oracle contract.

Our setup looks something like this.
Local environment

We will run our local node using K8s, orchestrated by Tilt. The Chainlink node is using Postgres as its persistent storage.

If you have not already followed the steps of the previous article, at the very least you will need to create a free AeroDataBox account.

Let’s get prepared.

Local environment

First we need to setup our local dev environment.

Cluster

Docker
Follow the instructions in Docker for your machine type (Mac or, Windows)

Enable Kubernetes (K8s) support in Docker.
Enabling K8s support

Kubectl, Helm & Tilt

If you do not have them, install

Make sure you are using Docker Desktop as the K8s environment.
kubectl config use-context docker-desktop

Node & nvm

We will use Node.JS and nvm to build and deploy our smart contracts.
Follow the nvm installation instructions.

The code has been tested to work with Node 18.7.0, so I suggest you install that.

1
2
nvm install 18.7.0
nvm use 18.7.0

Infura & Etherscan APIs

We will need an Infura API token to communicate with the Goerli testnet.
Head over, register for free and generate an API key.

Infura API key

We will also need an Etherscan API key to auto-verify our deployments. Go ahead and create a free account.

Metamask

Check the detailed instructions in the Annex at the end of this post.

We are finally ready to…

Get coding

Engineering

Photo by ThisisEngineering RAEng on Unsplash

You can find the code for this blog post in this Github repo.
Clone locally and open a terminal inside it. We will assume this is your working directory, unless explicitly noted so. Install all dependencies with node install

Launch local node

With Docker Desktop running, let’s test launching the local Chainlink node.

1
2
3
INFURA_TOKEN=<YOUR_INFURA_TOKEN> \ 
RAPIDAPI_TOKEN=<YOUR_AERODATABOX_API_TOKEN> \
tilt up

Tilt will take care of co-ordinating between the different resources (env files, external adapter, DB and Chainlink node).
You will be prompted to open Tilt’s web UI on http://localhost:10350/.
Tilt console

We can see that the external adapter (api-bridge) has completed initialisation.
You can quickly test that it is working and can make connections to the external flight data API with curl. Adjust flight and date accordingly.

1
2
3
4
5
curl -X POST \
	--url http://localhost:5000/data \
	--data-binary '{"flight":"EK29","date":"2022-09-08"}'

{"actualTimeUtc": "2022-09-08 13:19Z",...}

The Chainlink node will have finished booting, created its DB schema in Postgres and connected to the Ethereum Goerli network.
Let’s test the node’s web UI on http://localhost:6688/. Use the username and password you have defined in the Tiltfile.
Chainlink UI

We can see that the node’s wallet has a balance of zero. Take a note of its address.
Go to your testnet Metamask and transfer some Goerli ETH and Goerli LINK to the node’s wallet.
Fund wallet

Transfer LINK

Refresh the node’s web UI to see the updated balance.

Leave the Tilt cluster running, as we turn our attention to the…

Oracle contract

At the time of writing this, Chainlink defines 2 types of oracle contracts

Since our flight data response can be larger than 32 bytes, we create a simple stub import of the Operator contract for deployment.

The deploy folder contains a set of re-usable contract deploy scripts, based on Hardhat.
Let’s deploy the Operator contract on Goerli.

1
2
3
4
5
6
7
8
INFURA_TOKEN=<YOUR_INFURA_API_KEY> \
ETHERSCAN_API_KEY=<YOUR_ETHERSCAN_API_KEY> \
PRIVATE_KEY=<YOUR_ORACLE_METAMASK_ACCOUNT_PRIVATE_KEY> \
npx hardhat deploy --network goerli --tags oracle
...
deploying "Operator" (tx: 0xf45a12e9da5ee79ed41cb9520dbd388f85284b75ca15531ff489917fec238c8e)...: deployed at 0xAC356bC1D70354b4FBb1f3451f93b5f6Ebd2025E with 3754056 gas
Operator Deployed!
...

Note down the contract’s address (0xAC3...); we will need it!

Let’s interact with the Operator contract, using the custom Hardhat commands we have created. We will add our node to the list of trusted addresses (i.e. it can send back results to the Oracle contract).

First let’s check if the node is trusted.

1
2
3
4
5
6
7
8
INFURA_TOKEN=<YOUR_TOKEN> \
PRIVATE_KEY=<YOUR_ORACLE_ACCOUNT_KEY> \
npx hardhat is-auth-sender \
--contract <YOUR_ORACLE_ADDRESS> \
--address <YOUR_NODE_ADDRESS> \
--network goerli
Checking auth. sender 0xC4... from Operator contract 0xAC... on network goerli
Authorized: false

Let’s update the value…

1
2
3
4
5
6
7
8
INFURA_TOKEN=<YOUR_TOKEN> \
PRIVATE_KEY=<YOUR_ORACLE_ACCOUNT_KEY> \
npx hardhat set-auth-senders \
--contract <YOUR_ORACLE_ADDRESS> \
--addresses <YOUR_NODE_ADDRESS> \
--network goerli
Updating auth. senders in Operator contract 0xAC3... on network goerli
Done

…and check again, after 10-20 seconds, when the blockchain state will have been updated.

1
2
3
4
5
6
7
INFURA_TOKEN=<YOUR_TOKEN> \
PRIVATE_KEY=<YOUR_ORACLE_ACCOUNT_KEY> \
npx hardhat auth-senders \
--contract <YOUR_ORACLE_ADDRESS> \
--network goerli
Fetching auth. senders from Operator contract 0xAC3... on network goerli
Authorized senders: [ '0xC4E...' ]

Great job!

Speaking of which, time to look into the…

Oracle job

We mentioned above that the Chainlink node is a configurable piece of computing, like a box of lego.
The logic of calling out to the External Adapter and processing the result can be expressed as an Oracle job, namely a Direct Request.

Going back to the previous flight oracle article, we can use the Python data source implementation as a reference.
The diagram below describes one way of arranging some available tasks in the job’s acyclic graph to achieve our result.

Flight status Job

The job first extracts the flight number & date from the CBOR-encoded payload. This payload originates from the consumer contract and is passed down by the Oracle contract.
It then requests flight data (HTTP call) through the local bridge process. The JSON response is parsed to extract the individual fields. These are then compiled into a multi-variable response and sent back to the Oracle.

You can view the resulting job script in this file.

Job deployment

The Oracle job script has a placeholder for the Oracle contract address, to monitor for OracleRequest events.

In the node’s web ui, click New job. In the text box, paste the job TOML script.
Replace the placeholder with the Oracle contract address we just deployed. If there are no syntax errors, the side panel will show a nice graph of the tasks.
Deploy job

After clicking Create job, we can see our new job on the node.
Job id

Take careful note of the External Job ID.

External bridge

You may have noticed that our Oracle Job script references the [bridge process by name][].
We need to register our little server as a Bridge to the node.
Click on the Bridges menu and point to 127.0.0.1:5000. Make sure to only use lowercase for the name.
Create bridge

We now have all the ingredients we need.

  • A running and funded Chainlink node,
  • running bridge process with API key,
  • deployed Oracle job, and
  • a deployed Oracle contract
  • …trusting our Chainlink node.

We can reference these in our…

Consumer contract

Our flight data consumer contract is intentionally quite simple.
After being initialized with a target Oracle and job id, it exposes method requestFlightData to fetch info for a flight and date combination. After the Oracle responds, our contract emits a DataFulfilled event and updates its internal state variables (flightStatus, arrivalAirport,…).

This functionality is demonstrated in the suite of unit tests contained in the project. These tests mock away the 2 external contract dependencies (ERC-20 LINK token & Operator contracts).
Go ahead and execute the unit tests with npx hardhat test.

Having made sure the consumer contract works as expected, let’s deploy it. In helper-hardhat-config.js replace the placeholder jobId value with the newly deployed Job id from above without the dashes.3
Then deploy with

1
2
3
4
5
6
7
8
9
INFURA_TOKEN=<YOUR_INFURA_API_KEY> \
ETHERSCAN_API_KEY=<YOUR_ETHERSCAN_API_KEY> \
PRIVATE_KEY=<YOUR_ORACLE_METAMASK_ACCOUNT_PRIVATE_KEY> \
npx hardhat deploy --network goerli --tags api
...
deploying "FlightDataConsumer" (tx: 0x...)...: deployed at 0x0067... with 2190227 gas
...
Run the Flight Data Consumer contract with the following commands:
...

Note down of the deployed consumer contract address, as we will need it for our end-to-end test.

Fund the consumer contract with some ETH and LINK, so it can execute its calls.
Using any of the 2 accounts you have created in Metamask, make the transfer to the contract’s address.
Transfer ETH

Transfer LINK

Bring it all together!

All set!

Photo by Lou Levit on Unsplash

Let’s interact with the consumer contract and see the round-trip of information on- and off-chain.

First let’s check the current values of the consumer contract member variables.

1
2
3
4
5
6
7
INFURA_TOKEN=<YOUR_TOKEN> \
PRIVATE_KEY=<YOUR_CONSUMER_METAMASK_ACCOUNT_KEY> \
npx hardhat read-data \
--contract <YOUR_FLIGHT_DATA_CONSUMER_ADDRESS> \
--network goerli
Reading data from Flight Data Consumer contract ...
Status: , Airport: , Sched. arrival: , Actual arrival: ,

Let’s initiate a request for some data from our Oracle.4

1
2
3
4
5
6
7
8
9
10
INFURA_TOKEN=<YOUR_TOKEN> \
PRIVATE_KEY=<YOUR_CONSUMER_METAMASK_ACCOUNT_KEY> \
npx hardhat request-data \
--contract <YOUR_FLIGHT_DATA_CONSUMER_ADDRESS> \
--network goerli \
--flight EK29 \
--date 2022-09-07
...
Contract 0x0067... external data request successfully called. Transaction Hash: 0xd302...
...

Copy the transaction hash and search for it on Goerli Etherscan.
Call transaction
We can see the arguments we have passed in the Logs tab.

After 10-20 seconds, the Chainlink node logs come alive. It has received the emitted OracleRequest event.
OracleRequest logs

…and triggers the job execution.
Job run

We can click on it and view the execution details.
Job run details

After a few more seconds (allowing for the blockchain to commit the transaction), we can go back to the Consumer contract and confirm it has been updated.

1
2
3
4
5
6
7
INFURA_TOKEN=<YOUR_TOKEN> \
PRIVATE_KEY=<YOUR_METAMASK_CONSUMER_ACCOUNT_KEY> \
npx hardhat read-data \
--contract <YOUR_FLIGHT_DATA_CONSUMER_ADDRESS> \
--network goerli
Reading data from Flight Data Consumer contract ...
Status: Arrived, Airport: LHR, Sched. arrival: 2022-09-09 13:25Z, Actual arrival: 2022-09-09 13:16Z

Awesome stuff!!
🎉🎉

If you have made it this far, you can pat yourself on the back!
We have covered A LOT of ground in this tutorial.

Discussion

Discussion

Photo by Dylan Gillis on Unsplash

Let’s take a step back and compare the architectures of Chainlink vs Band Protocol (see previous blog post)

From an abstract level they are very similar:

  • An Oracle contract called by Consumers.
  • An off-chain process listening for Oracle events.
  • The Oracle gathering the generated data and passing them back.

In terms of platform user cohorts/personas, they differ.

  • Chainlink assumes (in fact, it forces!) that data providers (Node Operators) maintain their own hardware infrastructure.
    It assists them by providing the Chainlink node as a configurable and versatile process tool. Consensus is left for the underlying chain, while nodes focus on data handling. In this model, the data consumer puts trust on the Node Operator’s infrastructure, assisted by the incentives of the Chainlink protocol.
  • Band utilizes the existing infrastructure of Validators to handle data retrieval.
    Band’s platform appeals to the user persona of independent Oracle Developers, who do not want to maintain their own infrastructure. It allows them to develop the data retrieval logic and Oracle contracts, deploy them on-chain and off-load execution to Validators. In this model, consensus and data quality are inherently intertwined: if you trust the chain’s consensus validation, you also trust the data.

Going through both Band and Chainlink blog posts, you may have noticed that Chainlink poses a higher barrier-to-entry for an Oracle provider. This is a big drawback, which offerings like Node-as-a-Service are attempting to cover.
On the other hand, the maturity of Chainlink (supported blockchains, development community) makes it more attractive as a “business proposition”. In plain words, the immediate TAM (number of chains) is larger, therefore more requests and revenue is to be expected.

In the case of Band, the ability to allow any “unvetted” developer to become an Oracle Provider is mitigated by transparency; all Oracle and Data Source code lives on-chain for anyone to scrutinise. This poses a problem as there is no room for IP protection. Recall how in the Band blog post, we had to effectively reveal the API key on-chain. The only mitigation would be, …you guessed it!, for the Oracle Developer to deploy their proprietary code on their own infrastructure.

No free lunches, just different sets of trade-offs.

Parting thought

Fireworks

Photo by Ray Hennessy on Unsplash

Blockchains are upending most existing business models around us.
Oracles are a key component in this decentralisation journey.
Maybe THE key.

Chainlink is the undisputed leader in this domain by a margin.
Hopefully this hands-on deep-dive has helped you get a better understanding of Chainlink and its capabilities.

Until next time, happy coding!

Footnotes

  1. In the following images and text, the terms “smart contract” and “blockchain” are used interchangeably.
  2. This step is optional because 1) the node operator may either already have an existing Oracle contract deployed, or 2) they may decide to use someone else’s contract. In any but the most trivial cases, the oracle contract would be deployed behind a proxy for easy upgrades. This is omitted here for brevity.
  3. I.e. for a job id cebdc07d-02ab-4efc-a2e8-ebc736edd2b7, you use the value cebdc07d02ab4efca2e8ebc736edd2b7.
    If you want to change the job id after contract deployment, no problem!
    You can do it with the following command
    1
    2
    3
    4
    5
    6
    
    INFURA_TOKEN=<YOUR_INFURA_TOKEN> \
    PRIVATE_KEY=<YOUR_CONSUMER_METAMASK_ACCOUNT_PRIVATE_KEY> \
    npx hardhat set-jobid \
    --contract <CONSUMER_CONTRACT_ADDRESS> \
    --jobid <THE_NEW_JOBID_WITHOUT_DASHES> \
    --network goerli
    
  4. The free tier of the AeroDataBox API only gives data for ±7 days from the current day. Keep that in mind while testing. You can do a quick smoke test of the validity of your flight/date combination with curl --url https://aerodatabox.p.rapidapi.com/flights/number/<FLIGHT>/<DATE> --header 'X-RapidAPI-Host: aerodatabox.p.rapidapi.com' --header 'X-RapidAPI-Key: <YOUR_KEY>'

Annex 1: Installing Metamask, connecting to Goerli, using faucets

This short guide assumes you are starting from scratch.
If you already have Metamask installed, then you can just skip to the relevant parts.

Be extremely careful, which network you are connected to AT ALL TIMES when in test/development. Sending mainnet ETH to a testnet address will result in loss of funds.

Let’s start by installing the Metamask browser extension from the official website.

  • It launches a setup wizard. Create a new wallet.
    New wallet

  • Your local wallet will be password-protected. Select a password.
    Wallet password

  • Metamask is now installed in your browser’s extensions panel.
    Metamask installed

  • Select the Goerli network from the drop-down.
    If you cannot see Goerli, you may need to toggle showing more networks.
    Select Goerli

  • We need to add testnet LINK as an asset to our wallet.
    In the LINK contracts page, find Goerli and click the Add to wallet button.
    Switch network
    Next add the testnet LINK token to Metamask.
    Add token

  • Next up is funding our Metamask with testnet ETH.
    Select one of the Goerli faucets and use your Metamask account address to receive.
    Copy address

  • We also need to receive some testnet LINK.
    Go to the faucet page, connect your wallet and click Send. Connect wallet

  • We will use multiple accounts from the same wallet, pretending we are different actors.
    Go to the Account Details of the default Metamask account. Click the pencil and rename to Oracle so we know what is what.
    Account details

  • Finally, create a 2nd account. We will use it as the owner of the Oracle consumer contract.
    Name the account as Consumer or similar. New account
    You can transfer some GoerliETH and LINK between the 2 accounts, or fund directly from a faucet.
    You will need to add the testnet LINK token asset to the 2nd account.

  • To view an account’s private key (used for interacting with the contracts), we go to their details.
    Account details
    Then we choose to Export.
    Export key

Check your balance on both accounts; we are all set for testing.
Credited assets

comments powered by Disqus