@aztec/aztec-node 0.0.1-commit.0b941701 → 0.0.1-commit.10bd49492
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dest/aztec-node/config.d.ts +8 -5
- package/dest/aztec-node/config.d.ts.map +1 -1
- package/dest/aztec-node/config.js +11 -3
- package/dest/aztec-node/node_metrics.d.ts +1 -1
- package/dest/aztec-node/node_metrics.d.ts.map +1 -1
- package/dest/aztec-node/node_metrics.js +8 -4
- package/dest/aztec-node/server.d.ts +36 -24
- package/dest/aztec-node/server.d.ts.map +1 -1
- package/dest/aztec-node/server.js +312 -155
- package/dest/sentinel/factory.d.ts +2 -2
- package/dest/sentinel/factory.d.ts.map +1 -1
- package/dest/sentinel/factory.js +1 -1
- package/dest/sentinel/sentinel.d.ts +2 -2
- package/dest/sentinel/sentinel.d.ts.map +1 -1
- package/dest/sentinel/sentinel.js +56 -30
- package/dest/sentinel/store.d.ts +2 -2
- package/dest/sentinel/store.d.ts.map +1 -1
- package/dest/sentinel/store.js +11 -7
- package/package.json +27 -25
- package/src/aztec-node/config.ts +25 -9
- package/src/aztec-node/node_metrics.ts +12 -5
- package/src/aztec-node/server.ts +397 -205
- package/src/sentinel/factory.ts +2 -7
- package/src/sentinel/sentinel.ts +59 -26
- package/src/sentinel/store.ts +12 -12
|
@@ -374,12 +374,13 @@ var _dec, _initProto;
|
|
|
374
374
|
import { createArchiver } from '@aztec/archiver';
|
|
375
375
|
import { BBCircuitVerifier, QueuedIVCVerifier, TestCircuitVerifier } from '@aztec/bb-prover';
|
|
376
376
|
import { createBlobClientWithFileStores } from '@aztec/blob-client/client';
|
|
377
|
+
import { Blob } from '@aztec/blob-lib';
|
|
377
378
|
import { EpochCache } from '@aztec/epoch-cache';
|
|
378
379
|
import { createEthereumChain } from '@aztec/ethereum/chain';
|
|
379
380
|
import { getPublicClient } from '@aztec/ethereum/client';
|
|
380
381
|
import { RegistryContract, RollupContract } from '@aztec/ethereum/contracts';
|
|
381
382
|
import { BlockNumber, SlotNumber } from '@aztec/foundation/branded-types';
|
|
382
|
-
import { compactArray, pick } from '@aztec/foundation/collection';
|
|
383
|
+
import { compactArray, pick, unique } from '@aztec/foundation/collection';
|
|
383
384
|
import { Fr } from '@aztec/foundation/curves/bn254';
|
|
384
385
|
import { EthAddress } from '@aztec/foundation/eth-address';
|
|
385
386
|
import { BadRequestError } from '@aztec/foundation/json-rpc';
|
|
@@ -389,26 +390,28 @@ import { DateProvider, Timer } from '@aztec/foundation/timer';
|
|
|
389
390
|
import { MembershipWitness } from '@aztec/foundation/trees';
|
|
390
391
|
import { KeystoreManager, loadKeystores, mergeKeystores } from '@aztec/node-keystore';
|
|
391
392
|
import { trySnapshotSync, uploadSnapshot } from '@aztec/node-lib/actions';
|
|
392
|
-
import {
|
|
393
|
-
import { createP2PClient, getDefaultAllowedSetupFunctions } from '@aztec/p2p';
|
|
393
|
+
import { createForwarderL1TxUtilsFromSigners, createL1TxUtilsFromSigners } from '@aztec/node-lib/factories';
|
|
394
|
+
import { createP2PClient, createTxValidatorForAcceptingTxsOverRPC, getDefaultAllowedSetupFunctions } from '@aztec/p2p';
|
|
394
395
|
import { ProtocolContractAddress } from '@aztec/protocol-contracts';
|
|
396
|
+
import { createProverNode } from '@aztec/prover-node';
|
|
397
|
+
import { createKeyStoreForProver } from '@aztec/prover-node/config';
|
|
395
398
|
import { GlobalVariableBuilder, SequencerClient } from '@aztec/sequencer-client';
|
|
396
399
|
import { PublicProcessorFactory } from '@aztec/simulator/server';
|
|
397
400
|
import { AttestationsBlockWatcher, EpochPruneWatcher, createSlasher } from '@aztec/slasher';
|
|
398
401
|
import { CollectionLimitsConfig, PublicSimulatorConfig } from '@aztec/stdlib/avm';
|
|
399
402
|
import { AztecAddress } from '@aztec/stdlib/aztec-address';
|
|
400
|
-
import {
|
|
403
|
+
import { BlockHash, L2Block } from '@aztec/stdlib/block';
|
|
401
404
|
import { GasFees } from '@aztec/stdlib/gas';
|
|
402
405
|
import { computePublicDataTreeLeafSlot } from '@aztec/stdlib/hash';
|
|
403
406
|
import { AztecNodeAdminConfigSchema } from '@aztec/stdlib/interfaces/client';
|
|
404
407
|
import { tryStop } from '@aztec/stdlib/interfaces/server';
|
|
408
|
+
import { InMemoryDebugLogStore, NullDebugLogStore } from '@aztec/stdlib/logs';
|
|
405
409
|
import { InboxLeaf } from '@aztec/stdlib/messaging';
|
|
406
|
-
import { P2PClientType } from '@aztec/stdlib/p2p';
|
|
407
410
|
import { MerkleTreeId, NullifierMembershipWitness, PublicDataWitness } from '@aztec/stdlib/trees';
|
|
408
411
|
import { PublicSimulationOutput, TxReceipt, TxStatus } from '@aztec/stdlib/tx';
|
|
409
412
|
import { getPackageVersion } from '@aztec/stdlib/update-checker';
|
|
410
413
|
import { Attributes, getTelemetryClient, trackSpan } from '@aztec/telemetry-client';
|
|
411
|
-
import { FullNodeCheckpointsBuilder as CheckpointsBuilder, FullNodeCheckpointsBuilder, NodeKeystoreAdapter, ValidatorClient, createBlockProposalHandler, createValidatorClient
|
|
414
|
+
import { FullNodeCheckpointsBuilder as CheckpointsBuilder, FullNodeCheckpointsBuilder, NodeKeystoreAdapter, ValidatorClient, createBlockProposalHandler, createValidatorClient } from '@aztec/validator-client';
|
|
412
415
|
import { createWorldStateSynchronizer } from '@aztec/world-state';
|
|
413
416
|
import { createPublicClient, fallback, http } from 'viem';
|
|
414
417
|
import { createSentinel } from '../sentinel/factory.js';
|
|
@@ -428,6 +431,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
428
431
|
l1ToL2MessageSource;
|
|
429
432
|
worldStateSynchronizer;
|
|
430
433
|
sequencer;
|
|
434
|
+
proverNode;
|
|
431
435
|
slasherClient;
|
|
432
436
|
validatorsSentinel;
|
|
433
437
|
epochPruneWatcher;
|
|
@@ -440,6 +444,9 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
440
444
|
telemetry;
|
|
441
445
|
log;
|
|
442
446
|
blobClient;
|
|
447
|
+
validatorClient;
|
|
448
|
+
keyStoreManager;
|
|
449
|
+
debugLogStore;
|
|
443
450
|
static{
|
|
444
451
|
({ e: [_initProto] } = _apply_decs_2203_r(this, [
|
|
445
452
|
[
|
|
@@ -454,7 +461,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
454
461
|
// Prevent two snapshot operations to happen simultaneously
|
|
455
462
|
isUploadingSnapshot;
|
|
456
463
|
tracer;
|
|
457
|
-
constructor(config, p2pClient, blockSource, logsSource, contractDataSource, l1ToL2MessageSource, worldStateSynchronizer, sequencer, slasherClient, validatorsSentinel, epochPruneWatcher, l1ChainId, version, globalVariableBuilder, epochCache, packageVersion, proofVerifier, telemetry = getTelemetryClient(), log = createLogger('node'), blobClient){
|
|
464
|
+
constructor(config, p2pClient, blockSource, logsSource, contractDataSource, l1ToL2MessageSource, worldStateSynchronizer, sequencer, proverNode, slasherClient, validatorsSentinel, epochPruneWatcher, l1ChainId, version, globalVariableBuilder, epochCache, packageVersion, proofVerifier, telemetry = getTelemetryClient(), log = createLogger('node'), blobClient, validatorClient, keyStoreManager, debugLogStore = new NullDebugLogStore()){
|
|
458
465
|
this.config = config;
|
|
459
466
|
this.p2pClient = p2pClient;
|
|
460
467
|
this.blockSource = blockSource;
|
|
@@ -463,6 +470,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
463
470
|
this.l1ToL2MessageSource = l1ToL2MessageSource;
|
|
464
471
|
this.worldStateSynchronizer = worldStateSynchronizer;
|
|
465
472
|
this.sequencer = sequencer;
|
|
473
|
+
this.proverNode = proverNode;
|
|
466
474
|
this.slasherClient = slasherClient;
|
|
467
475
|
this.validatorsSentinel = validatorsSentinel;
|
|
468
476
|
this.epochPruneWatcher = epochPruneWatcher;
|
|
@@ -475,12 +483,21 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
475
483
|
this.telemetry = telemetry;
|
|
476
484
|
this.log = log;
|
|
477
485
|
this.blobClient = blobClient;
|
|
486
|
+
this.validatorClient = validatorClient;
|
|
487
|
+
this.keyStoreManager = keyStoreManager;
|
|
488
|
+
this.debugLogStore = debugLogStore;
|
|
478
489
|
this.initialHeaderHashPromise = (_initProto(this), undefined);
|
|
479
490
|
this.isUploadingSnapshot = false;
|
|
480
491
|
this.metrics = new NodeMetrics(telemetry, 'AztecNodeService');
|
|
481
492
|
this.tracer = telemetry.getTracer('AztecNodeService');
|
|
482
493
|
this.log.info(`Aztec Node version: ${this.packageVersion}`);
|
|
483
494
|
this.log.info(`Aztec Node started on chain 0x${l1ChainId.toString(16)}`, config.l1Contracts);
|
|
495
|
+
// A defensive check that protects us against introducing a bug in the complex `createAndSync` function. We must
|
|
496
|
+
// never have debugLogStore enabled when not in test mode because then we would be accumulating debug logs in
|
|
497
|
+
// memory which could be a DoS vector on the sequencer (since no fees are paid for debug logs).
|
|
498
|
+
if (debugLogStore.isEnabled && config.realProofs) {
|
|
499
|
+
throw new Error('debugLogStore should never be enabled when realProofs are set');
|
|
500
|
+
}
|
|
484
501
|
}
|
|
485
502
|
async getWorldStateSyncStatus() {
|
|
486
503
|
const status = await this.worldStateSynchronizer.status();
|
|
@@ -502,16 +519,27 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
502
519
|
const telemetry = deps.telemetry ?? getTelemetryClient();
|
|
503
520
|
const dateProvider = deps.dateProvider ?? new DateProvider();
|
|
504
521
|
const ethereumChain = createEthereumChain(config.l1RpcUrls, config.l1ChainId);
|
|
505
|
-
// Build a key store from file if given or from environment otherwise
|
|
522
|
+
// Build a key store from file if given or from environment otherwise.
|
|
523
|
+
// We keep the raw KeyStore available so we can merge with prover keys if enableProverNode is set.
|
|
506
524
|
let keyStoreManager;
|
|
507
525
|
const keyStoreProvided = config.keyStoreDirectory !== undefined && config.keyStoreDirectory.length > 0;
|
|
508
526
|
if (keyStoreProvided) {
|
|
509
527
|
const keyStores = loadKeystores(config.keyStoreDirectory);
|
|
510
528
|
keyStoreManager = new KeystoreManager(mergeKeystores(keyStores));
|
|
511
529
|
} else {
|
|
512
|
-
const
|
|
513
|
-
|
|
514
|
-
|
|
530
|
+
const rawKeyStores = [];
|
|
531
|
+
const validatorKeyStore = createKeyStoreForValidator(config);
|
|
532
|
+
if (validatorKeyStore) {
|
|
533
|
+
rawKeyStores.push(validatorKeyStore);
|
|
534
|
+
}
|
|
535
|
+
if (config.enableProverNode) {
|
|
536
|
+
const proverKeyStore = createKeyStoreForProver(config);
|
|
537
|
+
if (proverKeyStore) {
|
|
538
|
+
rawKeyStores.push(proverKeyStore);
|
|
539
|
+
}
|
|
540
|
+
}
|
|
541
|
+
if (rawKeyStores.length > 0) {
|
|
542
|
+
keyStoreManager = new KeystoreManager(rawKeyStores.length === 1 ? rawKeyStores[0] : mergeKeystores(rawKeyStores));
|
|
515
543
|
}
|
|
516
544
|
}
|
|
517
545
|
await keyStoreManager?.validateSigners();
|
|
@@ -520,8 +548,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
520
548
|
if (keyStoreManager === undefined) {
|
|
521
549
|
throw new Error('Failed to create key store, a requirement for running a validator');
|
|
522
550
|
}
|
|
523
|
-
if (!keyStoreProvided) {
|
|
524
|
-
log.warn(
|
|
551
|
+
if (!keyStoreProvided && process.env.NODE_ENV !== 'test') {
|
|
552
|
+
log.warn("Keystore created from env: it's recommended to use a file-based key store for production");
|
|
525
553
|
}
|
|
526
554
|
ValidatorClient.validateKeyStoreConfiguration(keyStoreManager, log);
|
|
527
555
|
}
|
|
@@ -543,16 +571,17 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
543
571
|
...l1ContractsAddresses
|
|
544
572
|
};
|
|
545
573
|
const rollupContract = new RollupContract(publicClient, config.l1Contracts.rollupAddress.toString());
|
|
546
|
-
const [l1GenesisTime, slotDuration, rollupVersionFromRollup] = await Promise.all([
|
|
574
|
+
const [l1GenesisTime, slotDuration, rollupVersionFromRollup, rollupManaLimit] = await Promise.all([
|
|
547
575
|
rollupContract.getL1GenesisTime(),
|
|
548
576
|
rollupContract.getSlotDuration(),
|
|
549
|
-
rollupContract.getVersion()
|
|
577
|
+
rollupContract.getVersion(),
|
|
578
|
+
rollupContract.getManaLimit().then(Number)
|
|
550
579
|
]);
|
|
551
580
|
config.rollupVersion ??= Number(rollupVersionFromRollup);
|
|
552
581
|
if (config.rollupVersion !== Number(rollupVersionFromRollup)) {
|
|
553
582
|
log.warn(`Registry looked up and returned a rollup with version (${config.rollupVersion}), but this does not match with version detected from the rollup directly: (${rollupVersionFromRollup}).`);
|
|
554
583
|
}
|
|
555
|
-
const blobClient = await createBlobClientWithFileStores(config,
|
|
584
|
+
const blobClient = await createBlobClientWithFileStores(config, log.createChild('blob-client'));
|
|
556
585
|
// attempt snapshot sync if possible
|
|
557
586
|
await trySnapshotSync(config, log);
|
|
558
587
|
const epochCache = await EpochCache.create(config.l1Contracts.rollupAddress, config, {
|
|
@@ -569,48 +598,63 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
569
598
|
// now create the merkle trees and the world state synchronizer
|
|
570
599
|
const worldStateSynchronizer = await createWorldStateSynchronizer(config, archiver, options.prefilledPublicData, telemetry);
|
|
571
600
|
const circuitVerifier = config.realProofs || config.debugForceTxProofVerification ? await BBCircuitVerifier.new(config) : new TestCircuitVerifier(config.proverTestVerificationDelayMs);
|
|
601
|
+
let debugLogStore;
|
|
572
602
|
if (!config.realProofs) {
|
|
573
603
|
log.warn(`Aztec node is accepting fake proofs`);
|
|
604
|
+
debugLogStore = new InMemoryDebugLogStore();
|
|
605
|
+
log.info('Aztec node started in test mode (realProofs set to false) hence debug logs from public functions will be collected and served');
|
|
606
|
+
} else {
|
|
607
|
+
debugLogStore = new NullDebugLogStore();
|
|
574
608
|
}
|
|
575
609
|
const proofVerifier = new QueuedIVCVerifier(config, circuitVerifier);
|
|
610
|
+
const proverOnly = config.enableProverNode && config.disableValidator;
|
|
611
|
+
if (proverOnly) {
|
|
612
|
+
log.info('Starting in prover-only mode: skipping validator, sequencer, sentinel, and slasher subsystems');
|
|
613
|
+
}
|
|
576
614
|
// create the tx pool and the p2p client, which will need the l2 block source
|
|
577
|
-
const p2pClient = await createP2PClient(
|
|
578
|
-
// We
|
|
579
|
-
|
|
580
|
-
// Create FullNodeCheckpointsBuilder for
|
|
615
|
+
const p2pClient = await createP2PClient(config, archiver, proofVerifier, worldStateSynchronizer, epochCache, packageVersion, dateProvider, telemetry, deps.p2pClientDeps);
|
|
616
|
+
// We'll accumulate sentinel watchers here
|
|
617
|
+
const watchers = [];
|
|
618
|
+
// Create FullNodeCheckpointsBuilder for block proposal handling and tx validation.
|
|
619
|
+
// Override maxTxsPerCheckpoint with the validator-specific limit if set.
|
|
581
620
|
const validatorCheckpointsBuilder = new FullNodeCheckpointsBuilder({
|
|
582
621
|
...config,
|
|
583
622
|
l1GenesisTime,
|
|
584
|
-
slotDuration: Number(slotDuration)
|
|
623
|
+
slotDuration: Number(slotDuration),
|
|
624
|
+
rollupManaLimit,
|
|
625
|
+
maxTxsPerCheckpoint: config.validateMaxTxsPerCheckpoint
|
|
585
626
|
}, worldStateSynchronizer, archiver, dateProvider, telemetry);
|
|
586
|
-
|
|
587
|
-
|
|
588
|
-
|
|
589
|
-
|
|
590
|
-
|
|
591
|
-
|
|
592
|
-
|
|
593
|
-
|
|
594
|
-
|
|
595
|
-
|
|
596
|
-
|
|
597
|
-
|
|
598
|
-
|
|
599
|
-
|
|
600
|
-
|
|
601
|
-
|
|
602
|
-
|
|
603
|
-
|
|
604
|
-
|
|
605
|
-
|
|
606
|
-
|
|
607
|
-
|
|
627
|
+
let validatorClient;
|
|
628
|
+
if (!proverOnly) {
|
|
629
|
+
// Create validator client if required
|
|
630
|
+
validatorClient = await createValidatorClient(config, {
|
|
631
|
+
checkpointsBuilder: validatorCheckpointsBuilder,
|
|
632
|
+
worldState: worldStateSynchronizer,
|
|
633
|
+
p2pClient,
|
|
634
|
+
telemetry,
|
|
635
|
+
dateProvider,
|
|
636
|
+
epochCache,
|
|
637
|
+
blockSource: archiver,
|
|
638
|
+
l1ToL2MessageSource: archiver,
|
|
639
|
+
keyStoreManager,
|
|
640
|
+
blobClient
|
|
641
|
+
});
|
|
642
|
+
// If we have a validator client, register it as a source of offenses for the slasher,
|
|
643
|
+
// and have it register callbacks on the p2p client *before* we start it, otherwise messages
|
|
644
|
+
// like attestations or auths will fail.
|
|
645
|
+
if (validatorClient) {
|
|
646
|
+
watchers.push(validatorClient);
|
|
647
|
+
if (!options.dontStartSequencer) {
|
|
648
|
+
await validatorClient.registerHandlers();
|
|
649
|
+
}
|
|
608
650
|
}
|
|
609
651
|
}
|
|
610
|
-
// If there's no validator client
|
|
611
|
-
//
|
|
612
|
-
|
|
613
|
-
|
|
652
|
+
// If there's no validator client, create a BlockProposalHandler to handle block proposals
|
|
653
|
+
// for monitoring or reexecution. Reexecution (default) allows us to follow the pending chain,
|
|
654
|
+
// while non-reexecution is used for validating the proposals and collecting their txs.
|
|
655
|
+
if (!validatorClient) {
|
|
656
|
+
const reexecute = !!config.alwaysReexecuteBlockProposals;
|
|
657
|
+
log.info(`Setting up block proposal handler` + (reexecute ? ' with reexecution of proposals' : ''));
|
|
614
658
|
createBlockProposalHandler(config, {
|
|
615
659
|
checkpointsBuilder: validatorCheckpointsBuilder,
|
|
616
660
|
worldState: worldStateSynchronizer,
|
|
@@ -620,26 +664,29 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
620
664
|
p2pClient,
|
|
621
665
|
dateProvider,
|
|
622
666
|
telemetry
|
|
623
|
-
}).
|
|
667
|
+
}).register(p2pClient, reexecute);
|
|
624
668
|
}
|
|
625
669
|
// Start world state and wait for it to sync to the archiver.
|
|
626
670
|
await worldStateSynchronizer.start();
|
|
627
671
|
// Start p2p. Note that it depends on world state to be running.
|
|
628
672
|
await p2pClient.start();
|
|
629
|
-
|
|
630
|
-
if (validatorsSentinel && config.slashInactivityPenalty > 0n) {
|
|
631
|
-
watchers.push(validatorsSentinel);
|
|
632
|
-
}
|
|
673
|
+
let validatorsSentinel;
|
|
633
674
|
let epochPruneWatcher;
|
|
634
|
-
if (config.slashPrunePenalty > 0n || config.slashDataWithholdingPenalty > 0n) {
|
|
635
|
-
epochPruneWatcher = new EpochPruneWatcher(archiver, archiver, epochCache, p2pClient.getTxProvider(), validatorCheckpointsBuilder, config);
|
|
636
|
-
watchers.push(epochPruneWatcher);
|
|
637
|
-
}
|
|
638
|
-
// We assume we want to slash for invalid attestations unless all max penalties are set to 0
|
|
639
675
|
let attestationsBlockWatcher;
|
|
640
|
-
if (
|
|
641
|
-
|
|
642
|
-
|
|
676
|
+
if (!proverOnly) {
|
|
677
|
+
validatorsSentinel = await createSentinel(epochCache, archiver, p2pClient, config);
|
|
678
|
+
if (validatorsSentinel && config.slashInactivityPenalty > 0n) {
|
|
679
|
+
watchers.push(validatorsSentinel);
|
|
680
|
+
}
|
|
681
|
+
if (config.slashPrunePenalty > 0n || config.slashDataWithholdingPenalty > 0n) {
|
|
682
|
+
epochPruneWatcher = new EpochPruneWatcher(archiver, archiver, epochCache, p2pClient.getTxProvider(), validatorCheckpointsBuilder, config);
|
|
683
|
+
watchers.push(epochPruneWatcher);
|
|
684
|
+
}
|
|
685
|
+
// We assume we want to slash for invalid attestations unless all max penalties are set to 0
|
|
686
|
+
if (config.slashProposeInvalidAttestationsPenalty > 0n || config.slashAttestDescendantOfInvalidPenalty > 0n) {
|
|
687
|
+
attestationsBlockWatcher = new AttestationsBlockWatcher(archiver, epochCache, config);
|
|
688
|
+
watchers.push(attestationsBlockWatcher);
|
|
689
|
+
}
|
|
643
690
|
}
|
|
644
691
|
// Start p2p-related services once the archiver has completed sync
|
|
645
692
|
void archiver.waitForInitialSync().then(async ()=>{
|
|
@@ -658,27 +705,30 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
658
705
|
const validatorAddresses = keyStoreManager ? NodeKeystoreAdapter.fromKeyStoreManager(keyStoreManager).getAddresses() : [];
|
|
659
706
|
slasherClient = await createSlasher(config, config.l1Contracts, getPublicClient(config), watchers, dateProvider, epochCache, validatorAddresses, undefined);
|
|
660
707
|
await slasherClient.start();
|
|
661
|
-
const l1TxUtils = config.
|
|
708
|
+
const l1TxUtils = config.sequencerPublisherForwarderAddress ? await createForwarderL1TxUtilsFromSigners(publicClient, keyStoreManager.createAllValidatorPublisherSigners(), config.sequencerPublisherForwarderAddress, {
|
|
662
709
|
...config,
|
|
663
710
|
scope: 'sequencer'
|
|
664
711
|
}, {
|
|
665
712
|
telemetry,
|
|
666
713
|
logger: log.createChild('l1-tx-utils'),
|
|
667
|
-
dateProvider
|
|
668
|
-
|
|
714
|
+
dateProvider,
|
|
715
|
+
kzg: Blob.getViemKzgInstance()
|
|
716
|
+
}) : await createL1TxUtilsFromSigners(publicClient, keyStoreManager.createAllValidatorPublisherSigners(), {
|
|
669
717
|
...config,
|
|
670
718
|
scope: 'sequencer'
|
|
671
719
|
}, {
|
|
672
720
|
telemetry,
|
|
673
721
|
logger: log.createChild('l1-tx-utils'),
|
|
674
|
-
dateProvider
|
|
722
|
+
dateProvider,
|
|
723
|
+
kzg: Blob.getViemKzgInstance()
|
|
675
724
|
});
|
|
676
725
|
// Create and start the sequencer client
|
|
677
726
|
const checkpointsBuilder = new CheckpointsBuilder({
|
|
678
727
|
...config,
|
|
679
728
|
l1GenesisTime,
|
|
680
|
-
slotDuration: Number(slotDuration)
|
|
681
|
-
|
|
729
|
+
slotDuration: Number(slotDuration),
|
|
730
|
+
rollupManaLimit
|
|
731
|
+
}, worldStateSynchronizer, archiver, dateProvider, telemetry, debugLogStore);
|
|
682
732
|
sequencer = await SequencerClient.new(config, {
|
|
683
733
|
...deps,
|
|
684
734
|
epochCache,
|
|
@@ -702,13 +752,35 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
702
752
|
} else if (sequencer) {
|
|
703
753
|
log.warn(`Sequencer created but not started`);
|
|
704
754
|
}
|
|
755
|
+
// Create prover node subsystem if enabled
|
|
756
|
+
let proverNode;
|
|
757
|
+
if (config.enableProverNode) {
|
|
758
|
+
proverNode = await createProverNode(config, {
|
|
759
|
+
...deps.proverNodeDeps,
|
|
760
|
+
telemetry,
|
|
761
|
+
dateProvider,
|
|
762
|
+
archiver,
|
|
763
|
+
worldStateSynchronizer,
|
|
764
|
+
p2pClient,
|
|
765
|
+
epochCache,
|
|
766
|
+
blobClient,
|
|
767
|
+
keyStoreManager
|
|
768
|
+
});
|
|
769
|
+
if (!options.dontStartProverNode) {
|
|
770
|
+
await proverNode.start();
|
|
771
|
+
log.info(`Prover node subsystem started`);
|
|
772
|
+
} else {
|
|
773
|
+
log.info(`Prover node subsystem created but not started`);
|
|
774
|
+
}
|
|
775
|
+
}
|
|
705
776
|
const globalVariableBuilder = new GlobalVariableBuilder({
|
|
706
777
|
...config,
|
|
707
778
|
rollupVersion: BigInt(config.rollupVersion),
|
|
708
779
|
l1GenesisTime,
|
|
709
780
|
slotDuration: Number(slotDuration)
|
|
710
781
|
});
|
|
711
|
-
|
|
782
|
+
const node = new AztecNodeService(config, p2pClient, archiver, archiver, archiver, archiver, worldStateSynchronizer, sequencer, proverNode, slasherClient, validatorsSentinel, epochPruneWatcher, ethereumChain.chainInfo.id, config.rollupVersion, globalVariableBuilder, epochCache, packageVersion, proofVerifier, telemetry, log, blobClient, validatorClient, keyStoreManager, debugLogStore);
|
|
783
|
+
return node;
|
|
712
784
|
}
|
|
713
785
|
/**
|
|
714
786
|
* Returns the sequencer client instance.
|
|
@@ -716,6 +788,9 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
716
788
|
*/ getSequencer() {
|
|
717
789
|
return this.sequencer;
|
|
718
790
|
}
|
|
791
|
+
/** Returns the prover node subsystem, if enabled. */ getProverNode() {
|
|
792
|
+
return this.proverNode;
|
|
793
|
+
}
|
|
719
794
|
getBlockSource() {
|
|
720
795
|
return this.blockSource;
|
|
721
796
|
}
|
|
@@ -735,7 +810,10 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
735
810
|
return Promise.resolve(this.p2pClient.getEnr()?.encodeTxt());
|
|
736
811
|
}
|
|
737
812
|
async getAllowedPublicSetup() {
|
|
738
|
-
return
|
|
813
|
+
return [
|
|
814
|
+
...await getDefaultAllowedSetupFunctions(),
|
|
815
|
+
...this.config.txPublicSetupAllowListExtend ?? []
|
|
816
|
+
];
|
|
739
817
|
}
|
|
740
818
|
/**
|
|
741
819
|
* Method to determine if the node is ready to accept transactions.
|
|
@@ -758,7 +836,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
758
836
|
rollupVersion,
|
|
759
837
|
enr,
|
|
760
838
|
l1ContractAddresses: contractAddresses,
|
|
761
|
-
protocolContractAddresses: protocolContractAddresses
|
|
839
|
+
protocolContractAddresses: protocolContractAddresses,
|
|
840
|
+
realProofs: !!this.config.realProofs
|
|
762
841
|
};
|
|
763
842
|
return nodeInfo;
|
|
764
843
|
}
|
|
@@ -767,8 +846,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
767
846
|
* @param block - The block parameter (block number, block hash, or 'latest').
|
|
768
847
|
* @returns The requested block.
|
|
769
848
|
*/ async getBlock(block) {
|
|
770
|
-
if (
|
|
771
|
-
return this.getBlockByHash(
|
|
849
|
+
if (BlockHash.isBlockHash(block)) {
|
|
850
|
+
return this.getBlockByHash(block);
|
|
772
851
|
}
|
|
773
852
|
const blockNumber = block === 'latest' ? await this.getBlockNumber() : block;
|
|
774
853
|
if (blockNumber === BlockNumber.ZERO) {
|
|
@@ -782,7 +861,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
782
861
|
* @returns The requested block.
|
|
783
862
|
*/ async getBlockByHash(blockHash) {
|
|
784
863
|
const initialBlockHash = await this.#getInitialHeaderHash();
|
|
785
|
-
if (blockHash.equals(
|
|
864
|
+
if (blockHash.equals(initialBlockHash)) {
|
|
786
865
|
return this.buildInitialBlock();
|
|
787
866
|
}
|
|
788
867
|
return await this.blockSource.getL2BlockByHash(blockHash);
|
|
@@ -812,6 +891,9 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
812
891
|
async getCheckpointedBlocks(from, limit) {
|
|
813
892
|
return await this.blockSource.getCheckpointedBlocks(from, limit) ?? [];
|
|
814
893
|
}
|
|
894
|
+
getCheckpointsDataForEpoch(epochNumber) {
|
|
895
|
+
return this.blockSource.getCheckpointsDataForEpoch(epochNumber);
|
|
896
|
+
}
|
|
815
897
|
/**
|
|
816
898
|
* Method to fetch the current min L2 fees.
|
|
817
899
|
* @returns The current min L2 fees.
|
|
@@ -839,6 +921,9 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
839
921
|
async getCheckpointedBlockNumber() {
|
|
840
922
|
return await this.blockSource.getCheckpointedL2BlockNumber();
|
|
841
923
|
}
|
|
924
|
+
getCheckpointNumber() {
|
|
925
|
+
return this.blockSource.getCheckpointNumber();
|
|
926
|
+
}
|
|
842
927
|
/**
|
|
843
928
|
* Method to fetch the version of the package.
|
|
844
929
|
* @returns The node package version
|
|
@@ -867,8 +952,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
867
952
|
if (referenceBlock) {
|
|
868
953
|
const initialBlockHash = await this.#getInitialHeaderHash();
|
|
869
954
|
if (!referenceBlock.equals(initialBlockHash)) {
|
|
870
|
-
const
|
|
871
|
-
const header = await this.blockSource.getBlockHeaderByHash(blockHashFr);
|
|
955
|
+
const header = await this.blockSource.getBlockHeaderByHash(referenceBlock);
|
|
872
956
|
if (!header) {
|
|
873
957
|
throw new Error(`Block ${referenceBlock.toString()} not found in the node. This might indicate a reorg has occurred.`);
|
|
874
958
|
}
|
|
@@ -880,8 +964,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
880
964
|
if (referenceBlock) {
|
|
881
965
|
const initialBlockHash = await this.#getInitialHeaderHash();
|
|
882
966
|
if (!referenceBlock.equals(initialBlockHash)) {
|
|
883
|
-
const
|
|
884
|
-
const header = await this.blockSource.getBlockHeaderByHash(blockHashFr);
|
|
967
|
+
const header = await this.blockSource.getBlockHeaderByHash(referenceBlock);
|
|
885
968
|
if (!header) {
|
|
886
969
|
throw new Error(`Block ${referenceBlock.toString()} not found in the node. This might indicate a reorg has occurred.`);
|
|
887
970
|
}
|
|
@@ -922,8 +1005,9 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
922
1005
|
throw new Error(`Invalid tx: ${reason}`);
|
|
923
1006
|
}
|
|
924
1007
|
await this.p2pClient.sendTx(tx);
|
|
925
|
-
|
|
926
|
-
this.
|
|
1008
|
+
const duration = timer.ms();
|
|
1009
|
+
this.metrics.receivedTx(duration, true);
|
|
1010
|
+
this.log.info(`Received tx ${txHash} in ${duration}ms`, {
|
|
927
1011
|
txHash
|
|
928
1012
|
});
|
|
929
1013
|
}
|
|
@@ -934,18 +1018,20 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
934
1018
|
const isKnownToPool = txPoolStatus === 'pending' || txPoolStatus === 'mined';
|
|
935
1019
|
// Then get the actual tx from the archiver, which tracks every tx in a mined block.
|
|
936
1020
|
const settledTxReceipt = await this.blockSource.getSettledTxReceipt(txHash);
|
|
1021
|
+
let receipt;
|
|
937
1022
|
if (settledTxReceipt) {
|
|
938
|
-
|
|
939
|
-
return settledTxReceipt;
|
|
1023
|
+
receipt = settledTxReceipt;
|
|
940
1024
|
} else if (isKnownToPool) {
|
|
941
1025
|
// If the tx is in the pool but not in the archiver, it's pending.
|
|
942
1026
|
// This handles race conditions between archiver and p2p, where the archiver
|
|
943
1027
|
// has pruned the block in which a tx was mined, but p2p has not caught up yet.
|
|
944
|
-
|
|
1028
|
+
receipt = new TxReceipt(txHash, TxStatus.PENDING, undefined, undefined);
|
|
945
1029
|
} else {
|
|
946
1030
|
// Otherwise, if we don't know the tx, we consider it dropped.
|
|
947
|
-
|
|
1031
|
+
receipt = new TxReceipt(txHash, TxStatus.DROPPED, undefined, 'Tx dropped by P2P node');
|
|
948
1032
|
}
|
|
1033
|
+
this.debugLogStore.decorateReceiptWithLogs(txHash.toString(), receipt);
|
|
1034
|
+
return receipt;
|
|
949
1035
|
}
|
|
950
1036
|
getTxEffect(txHash) {
|
|
951
1037
|
return this.blockSource.getTxEffect(txHash);
|
|
@@ -959,6 +1045,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
959
1045
|
await tryStop(this.slasherClient);
|
|
960
1046
|
await tryStop(this.proofVerifier);
|
|
961
1047
|
await tryStop(this.sequencer);
|
|
1048
|
+
await tryStop(this.proverNode);
|
|
962
1049
|
await tryStop(this.p2pClient);
|
|
963
1050
|
await tryStop(this.worldStateSynchronizer);
|
|
964
1051
|
await tryStop(this.blockSource);
|
|
@@ -997,79 +1084,75 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
997
1084
|
*/ async getTxsByHash(txHashes) {
|
|
998
1085
|
return compactArray(await Promise.all(txHashes.map((txHash)=>this.getTxByHash(txHash))));
|
|
999
1086
|
}
|
|
1000
|
-
async findLeavesIndexes(
|
|
1001
|
-
const committedDb = await this.#getWorldState(
|
|
1087
|
+
async findLeavesIndexes(referenceBlock, treeId, leafValues) {
|
|
1088
|
+
const committedDb = await this.#getWorldState(referenceBlock);
|
|
1002
1089
|
const maybeIndices = await committedDb.findLeafIndices(treeId, leafValues.map((x)=>x.toBuffer()));
|
|
1003
|
-
//
|
|
1004
|
-
const
|
|
1005
|
-
// Now we find the block numbers for the indices
|
|
1006
|
-
const blockNumbers = await committedDb.getBlockNumbersForLeafIndices(treeId,
|
|
1007
|
-
//
|
|
1008
|
-
|
|
1009
|
-
|
|
1010
|
-
|
|
1090
|
+
// Filter out undefined values to query block numbers only for found leaves
|
|
1091
|
+
const definedIndices = maybeIndices.filter((x)=>x !== undefined);
|
|
1092
|
+
// Now we find the block numbers for the defined indices
|
|
1093
|
+
const blockNumbers = await committedDb.getBlockNumbersForLeafIndices(treeId, definedIndices);
|
|
1094
|
+
// Build a map from leaf index to block number
|
|
1095
|
+
const indexToBlockNumber = new Map();
|
|
1096
|
+
for(let i = 0; i < definedIndices.length; i++){
|
|
1097
|
+
const blockNumber = blockNumbers[i];
|
|
1098
|
+
if (blockNumber === undefined) {
|
|
1099
|
+
throw new Error(`Block number is undefined for leaf index ${definedIndices[i]} in tree ${MerkleTreeId[treeId]}`);
|
|
1011
1100
|
}
|
|
1101
|
+
indexToBlockNumber.set(definedIndices[i], blockNumber);
|
|
1012
1102
|
}
|
|
1013
1103
|
// Get unique block numbers in order to optimize num calls to getLeafValue function.
|
|
1014
1104
|
const uniqueBlockNumbers = [
|
|
1015
|
-
...new Set(
|
|
1105
|
+
...new Set(indexToBlockNumber.values())
|
|
1016
1106
|
];
|
|
1017
|
-
// Now we obtain the block hashes from the archive tree
|
|
1018
|
-
// (note that block number corresponds to the leaf index in the archive tree).
|
|
1107
|
+
// Now we obtain the block hashes from the archive tree (block number = leaf index in archive tree).
|
|
1019
1108
|
const blockHashes = await Promise.all(uniqueBlockNumbers.map((blockNumber)=>{
|
|
1020
1109
|
return committedDb.getLeafValue(MerkleTreeId.ARCHIVE, BigInt(blockNumber));
|
|
1021
1110
|
}));
|
|
1022
|
-
//
|
|
1111
|
+
// Build a map from block number to block hash
|
|
1112
|
+
const blockNumberToHash = new Map();
|
|
1023
1113
|
for(let i = 0; i < uniqueBlockNumbers.length; i++){
|
|
1024
|
-
|
|
1114
|
+
const blockHash = blockHashes[i];
|
|
1115
|
+
if (blockHash === undefined) {
|
|
1025
1116
|
throw new Error(`Block hash is undefined for block number ${uniqueBlockNumbers[i]}`);
|
|
1026
1117
|
}
|
|
1118
|
+
blockNumberToHash.set(uniqueBlockNumbers[i], blockHash);
|
|
1027
1119
|
}
|
|
1028
1120
|
// Create DataInBlock objects by combining indices, blockNumbers and blockHashes and return them.
|
|
1029
|
-
return maybeIndices.map((index
|
|
1121
|
+
return maybeIndices.map((index)=>{
|
|
1030
1122
|
if (index === undefined) {
|
|
1031
1123
|
return undefined;
|
|
1032
1124
|
}
|
|
1033
|
-
const blockNumber =
|
|
1125
|
+
const blockNumber = indexToBlockNumber.get(index);
|
|
1034
1126
|
if (blockNumber === undefined) {
|
|
1035
|
-
|
|
1127
|
+
throw new Error(`Block number not found for leaf index ${index} in tree ${MerkleTreeId[treeId]}`);
|
|
1036
1128
|
}
|
|
1037
|
-
const
|
|
1038
|
-
|
|
1039
|
-
|
|
1040
|
-
return undefined;
|
|
1129
|
+
const blockHash = blockNumberToHash.get(blockNumber);
|
|
1130
|
+
if (blockHash === undefined) {
|
|
1131
|
+
throw new Error(`Block hash not found for block number ${blockNumber}`);
|
|
1041
1132
|
}
|
|
1042
1133
|
return {
|
|
1043
|
-
l2BlockNumber:
|
|
1044
|
-
l2BlockHash:
|
|
1134
|
+
l2BlockNumber: blockNumber,
|
|
1135
|
+
l2BlockHash: new BlockHash(blockHash),
|
|
1045
1136
|
data: index
|
|
1046
1137
|
};
|
|
1047
1138
|
});
|
|
1048
1139
|
}
|
|
1049
|
-
async
|
|
1050
|
-
const committedDb = await this.#getWorldState(
|
|
1051
|
-
return committedDb.getSiblingPath(MerkleTreeId.NULLIFIER_TREE, leafIndex);
|
|
1052
|
-
}
|
|
1053
|
-
async getNoteHashSiblingPath(block, leafIndex) {
|
|
1054
|
-
const committedDb = await this.#getWorldState(block);
|
|
1055
|
-
return committedDb.getSiblingPath(MerkleTreeId.NOTE_HASH_TREE, leafIndex);
|
|
1056
|
-
}
|
|
1057
|
-
async getArchiveMembershipWitness(block, archive) {
|
|
1058
|
-
const committedDb = await this.#getWorldState(block);
|
|
1140
|
+
async getBlockHashMembershipWitness(referenceBlock, blockHash) {
|
|
1141
|
+
const committedDb = await this.#getWorldState(referenceBlock);
|
|
1059
1142
|
const [pathAndIndex] = await committedDb.findSiblingPaths(MerkleTreeId.ARCHIVE, [
|
|
1060
|
-
|
|
1143
|
+
blockHash
|
|
1061
1144
|
]);
|
|
1062
1145
|
return pathAndIndex === undefined ? undefined : MembershipWitness.fromSiblingPath(pathAndIndex.index, pathAndIndex.path);
|
|
1063
1146
|
}
|
|
1064
|
-
async getNoteHashMembershipWitness(
|
|
1065
|
-
const committedDb = await this.#getWorldState(
|
|
1147
|
+
async getNoteHashMembershipWitness(referenceBlock, noteHash) {
|
|
1148
|
+
const committedDb = await this.#getWorldState(referenceBlock);
|
|
1066
1149
|
const [pathAndIndex] = await committedDb.findSiblingPaths(MerkleTreeId.NOTE_HASH_TREE, [
|
|
1067
1150
|
noteHash
|
|
1068
1151
|
]);
|
|
1069
1152
|
return pathAndIndex === undefined ? undefined : MembershipWitness.fromSiblingPath(pathAndIndex.index, pathAndIndex.path);
|
|
1070
1153
|
}
|
|
1071
|
-
async getL1ToL2MessageMembershipWitness(
|
|
1072
|
-
const db = await this.#getWorldState(
|
|
1154
|
+
async getL1ToL2MessageMembershipWitness(referenceBlock, l1ToL2Message) {
|
|
1155
|
+
const db = await this.#getWorldState(referenceBlock);
|
|
1073
1156
|
const [witness] = await db.findSiblingPaths(MerkleTreeId.L1_TO_L2_MESSAGE_TREE, [
|
|
1074
1157
|
l1ToL2Message
|
|
1075
1158
|
]);
|
|
@@ -1082,9 +1165,9 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1082
1165
|
witness.path
|
|
1083
1166
|
];
|
|
1084
1167
|
}
|
|
1085
|
-
async
|
|
1168
|
+
async getL1ToL2MessageCheckpoint(l1ToL2Message) {
|
|
1086
1169
|
const messageIndex = await this.l1ToL2MessageSource.getL1ToL2MessageIndex(l1ToL2Message);
|
|
1087
|
-
return messageIndex ?
|
|
1170
|
+
return messageIndex ? InboxLeaf.checkpointNumberFromIndex(messageIndex) : undefined;
|
|
1088
1171
|
}
|
|
1089
1172
|
/**
|
|
1090
1173
|
* Returns whether an L1 to L2 message is synced by archiver and if it's ready to be included in a block.
|
|
@@ -1116,16 +1199,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1116
1199
|
}
|
|
1117
1200
|
return blocksInCheckpoints.map((blocks)=>blocks.map((block)=>block.body.txEffects.map((txEffect)=>txEffect.l2ToL1Msgs)));
|
|
1118
1201
|
}
|
|
1119
|
-
async
|
|
1120
|
-
const
|
|
1121
|
-
return committedDb.getSiblingPath(MerkleTreeId.ARCHIVE, leafIndex);
|
|
1122
|
-
}
|
|
1123
|
-
async getPublicDataSiblingPath(block, leafIndex) {
|
|
1124
|
-
const committedDb = await this.#getWorldState(block);
|
|
1125
|
-
return committedDb.getSiblingPath(MerkleTreeId.PUBLIC_DATA_TREE, leafIndex);
|
|
1126
|
-
}
|
|
1127
|
-
async getNullifierMembershipWitness(block, nullifier) {
|
|
1128
|
-
const db = await this.#getWorldState(block);
|
|
1202
|
+
async getNullifierMembershipWitness(referenceBlock, nullifier) {
|
|
1203
|
+
const db = await this.#getWorldState(referenceBlock);
|
|
1129
1204
|
const [witness] = await db.findSiblingPaths(MerkleTreeId.NULLIFIER_TREE, [
|
|
1130
1205
|
nullifier.toBuffer()
|
|
1131
1206
|
]);
|
|
@@ -1141,7 +1216,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1141
1216
|
}
|
|
1142
1217
|
/**
|
|
1143
1218
|
* Returns a low nullifier membership witness for a given nullifier at a given block.
|
|
1144
|
-
* @param
|
|
1219
|
+
* @param referenceBlock - The block parameter (block number, block hash, or 'latest') at which to get the data
|
|
1220
|
+
* (which contains the root of the nullifier tree in which we are searching for the nullifier).
|
|
1145
1221
|
* @param nullifier - Nullifier we try to find the low nullifier witness for.
|
|
1146
1222
|
* @returns The low nullifier membership witness (if found).
|
|
1147
1223
|
* @remarks Low nullifier witness can be used to perform a nullifier non-inclusion proof by leveraging the "linked
|
|
@@ -1152,8 +1228,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1152
1228
|
* the nullifier already exists in the tree. This is because the `getPreviousValueIndex` function returns the
|
|
1153
1229
|
* index of the nullifier itself when it already exists in the tree.
|
|
1154
1230
|
* TODO: This is a confusing behavior and we should eventually address that.
|
|
1155
|
-
*/ async getLowNullifierMembershipWitness(
|
|
1156
|
-
const committedDb = await this.#getWorldState(
|
|
1231
|
+
*/ async getLowNullifierMembershipWitness(referenceBlock, nullifier) {
|
|
1232
|
+
const committedDb = await this.#getWorldState(referenceBlock);
|
|
1157
1233
|
const findResult = await committedDb.getPreviousValueIndex(MerkleTreeId.NULLIFIER_TREE, nullifier.toBigInt());
|
|
1158
1234
|
if (!findResult) {
|
|
1159
1235
|
return undefined;
|
|
@@ -1166,8 +1242,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1166
1242
|
const siblingPath = await committedDb.getSiblingPath(MerkleTreeId.NULLIFIER_TREE, BigInt(index));
|
|
1167
1243
|
return new NullifierMembershipWitness(BigInt(index), preimageData, siblingPath);
|
|
1168
1244
|
}
|
|
1169
|
-
async getPublicDataWitness(
|
|
1170
|
-
const committedDb = await this.#getWorldState(
|
|
1245
|
+
async getPublicDataWitness(referenceBlock, leafSlot) {
|
|
1246
|
+
const committedDb = await this.#getWorldState(referenceBlock);
|
|
1171
1247
|
const lowLeafResult = await committedDb.getPreviousValueIndex(MerkleTreeId.PUBLIC_DATA_TREE, leafSlot.toBigInt());
|
|
1172
1248
|
if (!lowLeafResult) {
|
|
1173
1249
|
return undefined;
|
|
@@ -1177,8 +1253,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1177
1253
|
return new PublicDataWitness(lowLeafResult.index, preimage, path);
|
|
1178
1254
|
}
|
|
1179
1255
|
}
|
|
1180
|
-
async getPublicStorageAt(
|
|
1181
|
-
const committedDb = await this.#getWorldState(
|
|
1256
|
+
async getPublicStorageAt(referenceBlock, contract, slot) {
|
|
1257
|
+
const committedDb = await this.#getWorldState(referenceBlock);
|
|
1182
1258
|
const leafSlot = await computePublicDataTreeLeafSlot(contract, slot);
|
|
1183
1259
|
const lowLeafResult = await committedDb.getPreviousValueIndex(MerkleTreeId.PUBLIC_DATA_TREE, leafSlot.toBigInt());
|
|
1184
1260
|
if (!lowLeafResult || !lowLeafResult.alreadyPresent) {
|
|
@@ -1188,14 +1264,13 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1188
1264
|
return preimage.leaf.value;
|
|
1189
1265
|
}
|
|
1190
1266
|
async getBlockHeader(block = 'latest') {
|
|
1191
|
-
if (
|
|
1267
|
+
if (BlockHash.isBlockHash(block)) {
|
|
1192
1268
|
const initialBlockHash = await this.#getInitialHeaderHash();
|
|
1193
1269
|
if (block.equals(initialBlockHash)) {
|
|
1194
1270
|
// Block source doesn't handle initial header so we need to handle the case separately.
|
|
1195
1271
|
return this.worldStateSynchronizer.getCommitted().getInitialHeader();
|
|
1196
1272
|
}
|
|
1197
|
-
|
|
1198
|
-
return this.blockSource.getBlockHeaderByHash(blockHashFr);
|
|
1273
|
+
return this.blockSource.getBlockHeaderByHash(block);
|
|
1199
1274
|
} else {
|
|
1200
1275
|
// Block source doesn't handle initial header so we need to handle the case separately.
|
|
1201
1276
|
const blockNumber = block === 'latest' ? await this.getBlockNumber() : block;
|
|
@@ -1212,6 +1287,12 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1212
1287
|
*/ async getBlockHeaderByArchive(archive) {
|
|
1213
1288
|
return await this.blockSource.getBlockHeaderByArchive(archive);
|
|
1214
1289
|
}
|
|
1290
|
+
getBlockData(number) {
|
|
1291
|
+
return this.blockSource.getBlockData(number);
|
|
1292
|
+
}
|
|
1293
|
+
getBlockDataByArchive(archive) {
|
|
1294
|
+
return this.blockSource.getBlockDataByArchive(archive);
|
|
1295
|
+
}
|
|
1215
1296
|
/**
|
|
1216
1297
|
* Simulates the public part of a transaction with the current state.
|
|
1217
1298
|
* @param tx - The transaction to simulate.
|
|
@@ -1224,17 +1305,20 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1224
1305
|
throw new BadRequestError(`Transaction total gas limit ${txGasLimit + teardownGasLimit} (${txGasLimit} + ${teardownGasLimit}) exceeds maximum gas limit ${this.config.rpcSimulatePublicMaxGasLimit} for simulation`);
|
|
1225
1306
|
}
|
|
1226
1307
|
const txHash = tx.getTxHash();
|
|
1227
|
-
const
|
|
1308
|
+
const latestBlockNumber = await this.blockSource.getBlockNumber();
|
|
1309
|
+
const blockNumber = BlockNumber.add(latestBlockNumber, 1);
|
|
1228
1310
|
// If sequencer is not initialized, we just set these values to zero for simulation.
|
|
1229
1311
|
const coinbase = EthAddress.ZERO;
|
|
1230
1312
|
const feeRecipient = AztecAddress.ZERO;
|
|
1231
1313
|
const newGlobalVariables = await this.globalVariableBuilder.buildGlobalVariables(blockNumber, coinbase, feeRecipient);
|
|
1232
|
-
const publicProcessorFactory = new PublicProcessorFactory(this.contractDataSource, new DateProvider(), this.telemetry);
|
|
1314
|
+
const publicProcessorFactory = new PublicProcessorFactory(this.contractDataSource, new DateProvider(), this.telemetry, this.log.getBindings());
|
|
1233
1315
|
this.log.verbose(`Simulating public calls for tx ${txHash}`, {
|
|
1234
1316
|
globalVariables: newGlobalVariables.toInspect(),
|
|
1235
1317
|
txHash,
|
|
1236
1318
|
blockNumber
|
|
1237
1319
|
});
|
|
1320
|
+
// Ensure world-state has caught up with the latest block we loaded from the archiver
|
|
1321
|
+
await this.worldStateSynchronizer.syncImmediate(latestBlockNumber);
|
|
1238
1322
|
const merkleTreeFork = await this.worldStateSynchronizer.fork();
|
|
1239
1323
|
try {
|
|
1240
1324
|
const config = PublicSimulatorConfig.from({
|
|
@@ -1249,7 +1333,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1249
1333
|
});
|
|
1250
1334
|
const processor = publicProcessorFactory.create(merkleTreeFork, newGlobalVariables, config);
|
|
1251
1335
|
// REFACTOR: Consider merging ProcessReturnValues into ProcessedTx
|
|
1252
|
-
const [processedTxs, failedTxs, _usedTxs, returns] = await processor.process([
|
|
1336
|
+
const [processedTxs, failedTxs, _usedTxs, returns, debugLogs] = await processor.process([
|
|
1253
1337
|
tx
|
|
1254
1338
|
]);
|
|
1255
1339
|
// REFACTOR: Consider returning the error rather than throwing
|
|
@@ -1260,7 +1344,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1260
1344
|
throw failedTxs[0].error;
|
|
1261
1345
|
}
|
|
1262
1346
|
const [processedTx] = processedTxs;
|
|
1263
|
-
return new PublicSimulationOutput(processedTx.revertReason, processedTx.globalVariables, processedTx.txEffect, returns, processedTx.gasUsed);
|
|
1347
|
+
return new PublicSimulationOutput(processedTx.revertReason, processedTx.globalVariables, processedTx.txEffect, returns, processedTx.gasUsed, debugLogs);
|
|
1264
1348
|
} finally{
|
|
1265
1349
|
await merkleTreeFork.close();
|
|
1266
1350
|
}
|
|
@@ -1268,19 +1352,26 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1268
1352
|
async isValidTx(tx, { isSimulation, skipFeeEnforcement } = {}) {
|
|
1269
1353
|
const db = this.worldStateSynchronizer.getCommitted();
|
|
1270
1354
|
const verifier = isSimulation ? undefined : this.proofVerifier;
|
|
1271
|
-
// We accept transactions if they are not expired by the next slot (checked based on the
|
|
1355
|
+
// We accept transactions if they are not expired by the next slot (checked based on the ExpirationTimestamp field)
|
|
1272
1356
|
const { ts: nextSlotTimestamp } = this.epochCache.getEpochAndSlotInNextL1Slot();
|
|
1273
1357
|
const blockNumber = BlockNumber(await this.blockSource.getBlockNumber() + 1);
|
|
1274
|
-
const
|
|
1358
|
+
const l1Constants = await this.blockSource.getL1Constants();
|
|
1359
|
+
const validator = createTxValidatorForAcceptingTxsOverRPC(db, this.contractDataSource, verifier, {
|
|
1275
1360
|
timestamp: nextSlotTimestamp,
|
|
1276
1361
|
blockNumber,
|
|
1277
1362
|
l1ChainId: this.l1ChainId,
|
|
1278
1363
|
rollupVersion: this.version,
|
|
1279
|
-
setupAllowList:
|
|
1364
|
+
setupAllowList: [
|
|
1365
|
+
...await getDefaultAllowedSetupFunctions(),
|
|
1366
|
+
...this.config.txPublicSetupAllowListExtend ?? []
|
|
1367
|
+
],
|
|
1280
1368
|
gasFees: await this.getCurrentMinFees(),
|
|
1281
1369
|
skipFeeEnforcement,
|
|
1282
|
-
txsPermitted: !this.config.disableTransactions
|
|
1283
|
-
|
|
1370
|
+
txsPermitted: !this.config.disableTransactions,
|
|
1371
|
+
rollupManaLimit: l1Constants.rollupManaLimit,
|
|
1372
|
+
maxBlockL2Gas: this.config.validateMaxL2BlockGas,
|
|
1373
|
+
maxBlockDAGas: this.config.validateMaxDABlockGas
|
|
1374
|
+
}, this.log.getBindings());
|
|
1284
1375
|
return await validator.validateTx(tx);
|
|
1285
1376
|
}
|
|
1286
1377
|
getConfig() {
|
|
@@ -1422,6 +1513,73 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1422
1513
|
return this.slasherClient.gatherOffensesForRound(round === 'current' ? undefined : BigInt(round));
|
|
1423
1514
|
}
|
|
1424
1515
|
}
|
|
1516
|
+
async reloadKeystore() {
|
|
1517
|
+
if (!this.config.keyStoreDirectory?.length) {
|
|
1518
|
+
throw new BadRequestError('Cannot reload keystore: node is not using a file-based keystore. ' + 'Set KEY_STORE_DIRECTORY to use file-based keystores.');
|
|
1519
|
+
}
|
|
1520
|
+
if (!this.validatorClient) {
|
|
1521
|
+
throw new BadRequestError('Cannot reload keystore: validator is not enabled.');
|
|
1522
|
+
}
|
|
1523
|
+
this.log.info('Reloading keystore from disk');
|
|
1524
|
+
// Re-read and validate keystore files
|
|
1525
|
+
const keyStores = loadKeystores(this.config.keyStoreDirectory);
|
|
1526
|
+
const newManager = new KeystoreManager(mergeKeystores(keyStores));
|
|
1527
|
+
await newManager.validateSigners();
|
|
1528
|
+
ValidatorClient.validateKeyStoreConfiguration(newManager, this.log);
|
|
1529
|
+
// Validate that every validator's publisher keys overlap with the L1 signers
|
|
1530
|
+
// that were initialized at startup. Publishers cannot be hot-reloaded, so a
|
|
1531
|
+
// validator with a publisher key that doesn't match any existing L1 signer
|
|
1532
|
+
// would silently fail on every proposer slot.
|
|
1533
|
+
if (this.keyStoreManager && this.sequencer) {
|
|
1534
|
+
const oldAdapter = NodeKeystoreAdapter.fromKeyStoreManager(this.keyStoreManager);
|
|
1535
|
+
const availablePublishers = new Set(oldAdapter.getAttesterAddresses().flatMap((a)=>oldAdapter.getPublisherAddresses(a).map((p)=>p.toString().toLowerCase())));
|
|
1536
|
+
const newAdapter = NodeKeystoreAdapter.fromKeyStoreManager(newManager);
|
|
1537
|
+
for (const attester of newAdapter.getAttesterAddresses()){
|
|
1538
|
+
const pubs = newAdapter.getPublisherAddresses(attester);
|
|
1539
|
+
if (pubs.length > 0 && !pubs.some((p)=>availablePublishers.has(p.toString().toLowerCase()))) {
|
|
1540
|
+
throw new BadRequestError(`Cannot reload keystore: validator ${attester} has publisher keys ` + `[${pubs.map((p)=>p.toString()).join(', ')}] but none match the L1 signers initialized at startup ` + `[${[
|
|
1541
|
+
...availablePublishers
|
|
1542
|
+
].join(', ')}]. Publishers cannot be hot-reloaded — ` + `use an existing publisher key or restart the node.`);
|
|
1543
|
+
}
|
|
1544
|
+
}
|
|
1545
|
+
}
|
|
1546
|
+
// Build adapters for old and new keystores to compute diff
|
|
1547
|
+
const newAdapter = NodeKeystoreAdapter.fromKeyStoreManager(newManager);
|
|
1548
|
+
const newAddresses = newAdapter.getAttesterAddresses();
|
|
1549
|
+
const oldAddresses = this.keyStoreManager ? NodeKeystoreAdapter.fromKeyStoreManager(this.keyStoreManager).getAttesterAddresses() : [];
|
|
1550
|
+
const oldSet = new Set(oldAddresses.map((a)=>a.toString()));
|
|
1551
|
+
const newSet = new Set(newAddresses.map((a)=>a.toString()));
|
|
1552
|
+
const added = newAddresses.filter((a)=>!oldSet.has(a.toString()));
|
|
1553
|
+
const removed = oldAddresses.filter((a)=>!newSet.has(a.toString()));
|
|
1554
|
+
if (added.length > 0) {
|
|
1555
|
+
this.log.info(`Keystore reload: adding attester keys: ${added.map((a)=>a.toString()).join(', ')}`);
|
|
1556
|
+
}
|
|
1557
|
+
if (removed.length > 0) {
|
|
1558
|
+
this.log.info(`Keystore reload: removing attester keys: ${removed.map((a)=>a.toString()).join(', ')}`);
|
|
1559
|
+
}
|
|
1560
|
+
if (added.length === 0 && removed.length === 0) {
|
|
1561
|
+
this.log.info('Keystore reload: attester keys unchanged');
|
|
1562
|
+
}
|
|
1563
|
+
// Update the validator client (coinbase, feeRecipient, attester keys)
|
|
1564
|
+
this.validatorClient.reloadKeystore(newManager);
|
|
1565
|
+
// Update the publisher factory's keystore so newly-added validators
|
|
1566
|
+
// can be matched to existing publisher keys when proposing blocks.
|
|
1567
|
+
if (this.sequencer) {
|
|
1568
|
+
this.sequencer.updatePublisherNodeKeyStore(newAdapter);
|
|
1569
|
+
}
|
|
1570
|
+
// Update slasher's "don't-slash-self" list with new validator addresses
|
|
1571
|
+
if (this.slasherClient && !this.config.slashSelfAllowed) {
|
|
1572
|
+
const slashValidatorsNever = unique([
|
|
1573
|
+
...this.config.slashValidatorsNever ?? [],
|
|
1574
|
+
...newAddresses
|
|
1575
|
+
].map((a)=>a.toString())).map(EthAddress.fromString);
|
|
1576
|
+
this.slasherClient.updateConfig({
|
|
1577
|
+
slashValidatorsNever
|
|
1578
|
+
});
|
|
1579
|
+
}
|
|
1580
|
+
this.keyStoreManager = newManager;
|
|
1581
|
+
this.log.info('Keystore reloaded: coinbase, feeRecipient, and attester keys updated');
|
|
1582
|
+
}
|
|
1425
1583
|
#getInitialHeaderHash() {
|
|
1426
1584
|
if (!this.initialHeaderHashPromise) {
|
|
1427
1585
|
this.initialHeaderHashPromise = this.worldStateSynchronizer.getCommitted().getInitialHeader().hash();
|
|
@@ -1444,14 +1602,13 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1444
1602
|
this.log.debug(`Using committed db for block 'latest', world state synced upto ${blockSyncedTo}`);
|
|
1445
1603
|
return this.worldStateSynchronizer.getCommitted();
|
|
1446
1604
|
}
|
|
1447
|
-
if (
|
|
1605
|
+
if (BlockHash.isBlockHash(block)) {
|
|
1448
1606
|
const initialBlockHash = await this.#getInitialHeaderHash();
|
|
1449
1607
|
if (block.equals(initialBlockHash)) {
|
|
1450
1608
|
// Block source doesn't handle initial header so we need to handle the case separately.
|
|
1451
1609
|
return this.worldStateSynchronizer.getSnapshot(BlockNumber.ZERO);
|
|
1452
1610
|
}
|
|
1453
|
-
const
|
|
1454
|
-
const header = await this.blockSource.getBlockHeaderByHash(blockHashFr);
|
|
1611
|
+
const header = await this.blockSource.getBlockHeaderByHash(block);
|
|
1455
1612
|
if (!header) {
|
|
1456
1613
|
throw new Error(`Block hash ${block.toString()} not found when querying world state. If the node API has been queried with anchor block hash possibly a reorg has occurred.`);
|
|
1457
1614
|
}
|