@aztec/aztec-node 0.0.1-commit.3469e52 → 0.0.1-commit.358457c
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dest/aztec-node/config.d.ts +7 -4
- package/dest/aztec-node/config.d.ts.map +1 -1
- package/dest/aztec-node/config.js +10 -2
- package/dest/aztec-node/node_metrics.d.ts +1 -1
- package/dest/aztec-node/node_metrics.d.ts.map +1 -1
- package/dest/aztec-node/node_metrics.js +8 -4
- package/dest/aztec-node/server.d.ts +38 -28
- package/dest/aztec-node/server.d.ts.map +1 -1
- package/dest/aztec-node/server.js +247 -101
- package/dest/sentinel/factory.d.ts +1 -1
- package/dest/sentinel/factory.d.ts.map +1 -1
- package/dest/sentinel/factory.js +1 -1
- package/dest/sentinel/sentinel.d.ts +2 -2
- package/dest/sentinel/sentinel.d.ts.map +1 -1
- package/dest/sentinel/sentinel.js +53 -27
- package/dest/sentinel/store.d.ts +2 -2
- package/dest/sentinel/store.d.ts.map +1 -1
- package/dest/sentinel/store.js +11 -7
- package/package.json +27 -25
- package/src/aztec-node/config.ts +24 -8
- package/src/aztec-node/node_metrics.ts +12 -5
- package/src/aztec-node/server.ts +328 -154
- package/src/sentinel/factory.ts +1 -6
- package/src/sentinel/sentinel.ts +56 -23
- package/src/sentinel/store.ts +12 -12
|
@@ -374,12 +374,13 @@ var _dec, _initProto;
|
|
|
374
374
|
import { createArchiver } from '@aztec/archiver';
|
|
375
375
|
import { BBCircuitVerifier, QueuedIVCVerifier, TestCircuitVerifier } from '@aztec/bb-prover';
|
|
376
376
|
import { createBlobClientWithFileStores } from '@aztec/blob-client/client';
|
|
377
|
+
import { Blob } from '@aztec/blob-lib';
|
|
377
378
|
import { EpochCache } from '@aztec/epoch-cache';
|
|
378
379
|
import { createEthereumChain } from '@aztec/ethereum/chain';
|
|
379
380
|
import { getPublicClient } from '@aztec/ethereum/client';
|
|
380
381
|
import { RegistryContract, RollupContract } from '@aztec/ethereum/contracts';
|
|
381
382
|
import { BlockNumber, SlotNumber } from '@aztec/foundation/branded-types';
|
|
382
|
-
import { compactArray, pick } from '@aztec/foundation/collection';
|
|
383
|
+
import { compactArray, pick, unique } from '@aztec/foundation/collection';
|
|
383
384
|
import { Fr } from '@aztec/foundation/curves/bn254';
|
|
384
385
|
import { EthAddress } from '@aztec/foundation/eth-address';
|
|
385
386
|
import { BadRequestError } from '@aztec/foundation/json-rpc';
|
|
@@ -389,26 +390,29 @@ import { DateProvider, Timer } from '@aztec/foundation/timer';
|
|
|
389
390
|
import { MembershipWitness } from '@aztec/foundation/trees';
|
|
390
391
|
import { KeystoreManager, loadKeystores, mergeKeystores } from '@aztec/node-keystore';
|
|
391
392
|
import { trySnapshotSync, uploadSnapshot } from '@aztec/node-lib/actions';
|
|
392
|
-
import {
|
|
393
|
-
import { createP2PClient, getDefaultAllowedSetupFunctions } from '@aztec/p2p';
|
|
393
|
+
import { createForwarderL1TxUtilsFromSigners, createL1TxUtilsFromSigners } from '@aztec/node-lib/factories';
|
|
394
|
+
import { createP2PClient, createTxValidatorForAcceptingTxsOverRPC, getDefaultAllowedSetupFunctions } from '@aztec/p2p';
|
|
394
395
|
import { ProtocolContractAddress } from '@aztec/protocol-contracts';
|
|
396
|
+
import { createProverNode } from '@aztec/prover-node';
|
|
397
|
+
import { createKeyStoreForProver } from '@aztec/prover-node/config';
|
|
395
398
|
import { GlobalVariableBuilder, SequencerClient } from '@aztec/sequencer-client';
|
|
396
399
|
import { PublicProcessorFactory } from '@aztec/simulator/server';
|
|
397
400
|
import { AttestationsBlockWatcher, EpochPruneWatcher, createSlasher } from '@aztec/slasher';
|
|
398
401
|
import { CollectionLimitsConfig, PublicSimulatorConfig } from '@aztec/stdlib/avm';
|
|
399
402
|
import { AztecAddress } from '@aztec/stdlib/aztec-address';
|
|
400
|
-
import {
|
|
403
|
+
import { BlockHash, L2Block } from '@aztec/stdlib/block';
|
|
401
404
|
import { GasFees } from '@aztec/stdlib/gas';
|
|
402
405
|
import { computePublicDataTreeLeafSlot } from '@aztec/stdlib/hash';
|
|
403
406
|
import { AztecNodeAdminConfigSchema } from '@aztec/stdlib/interfaces/client';
|
|
404
407
|
import { tryStop } from '@aztec/stdlib/interfaces/server';
|
|
408
|
+
import { InMemoryDebugLogStore, NullDebugLogStore } from '@aztec/stdlib/logs';
|
|
405
409
|
import { InboxLeaf } from '@aztec/stdlib/messaging';
|
|
406
410
|
import { P2PClientType } from '@aztec/stdlib/p2p';
|
|
407
411
|
import { MerkleTreeId, NullifierMembershipWitness, PublicDataWitness } from '@aztec/stdlib/trees';
|
|
408
412
|
import { PublicSimulationOutput, TxReceipt, TxStatus } from '@aztec/stdlib/tx';
|
|
409
413
|
import { getPackageVersion } from '@aztec/stdlib/update-checker';
|
|
410
414
|
import { Attributes, getTelemetryClient, trackSpan } from '@aztec/telemetry-client';
|
|
411
|
-
import { FullNodeCheckpointsBuilder as CheckpointsBuilder, FullNodeCheckpointsBuilder, NodeKeystoreAdapter, ValidatorClient, createBlockProposalHandler, createValidatorClient
|
|
415
|
+
import { FullNodeCheckpointsBuilder as CheckpointsBuilder, FullNodeCheckpointsBuilder, NodeKeystoreAdapter, ValidatorClient, createBlockProposalHandler, createValidatorClient } from '@aztec/validator-client';
|
|
412
416
|
import { createWorldStateSynchronizer } from '@aztec/world-state';
|
|
413
417
|
import { createPublicClient, fallback, http } from 'viem';
|
|
414
418
|
import { createSentinel } from '../sentinel/factory.js';
|
|
@@ -428,6 +432,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
428
432
|
l1ToL2MessageSource;
|
|
429
433
|
worldStateSynchronizer;
|
|
430
434
|
sequencer;
|
|
435
|
+
proverNode;
|
|
431
436
|
slasherClient;
|
|
432
437
|
validatorsSentinel;
|
|
433
438
|
epochPruneWatcher;
|
|
@@ -440,6 +445,9 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
440
445
|
telemetry;
|
|
441
446
|
log;
|
|
442
447
|
blobClient;
|
|
448
|
+
validatorClient;
|
|
449
|
+
keyStoreManager;
|
|
450
|
+
debugLogStore;
|
|
443
451
|
static{
|
|
444
452
|
({ e: [_initProto] } = _apply_decs_2203_r(this, [
|
|
445
453
|
[
|
|
@@ -454,7 +462,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
454
462
|
// Prevent two snapshot operations to happen simultaneously
|
|
455
463
|
isUploadingSnapshot;
|
|
456
464
|
tracer;
|
|
457
|
-
constructor(config, p2pClient, blockSource, logsSource, contractDataSource, l1ToL2MessageSource, worldStateSynchronizer, sequencer, slasherClient, validatorsSentinel, epochPruneWatcher, l1ChainId, version, globalVariableBuilder, epochCache, packageVersion, proofVerifier, telemetry = getTelemetryClient(), log = createLogger('node'), blobClient){
|
|
465
|
+
constructor(config, p2pClient, blockSource, logsSource, contractDataSource, l1ToL2MessageSource, worldStateSynchronizer, sequencer, proverNode, slasherClient, validatorsSentinel, epochPruneWatcher, l1ChainId, version, globalVariableBuilder, epochCache, packageVersion, proofVerifier, telemetry = getTelemetryClient(), log = createLogger('node'), blobClient, validatorClient, keyStoreManager, debugLogStore = new NullDebugLogStore()){
|
|
458
466
|
this.config = config;
|
|
459
467
|
this.p2pClient = p2pClient;
|
|
460
468
|
this.blockSource = blockSource;
|
|
@@ -463,6 +471,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
463
471
|
this.l1ToL2MessageSource = l1ToL2MessageSource;
|
|
464
472
|
this.worldStateSynchronizer = worldStateSynchronizer;
|
|
465
473
|
this.sequencer = sequencer;
|
|
474
|
+
this.proverNode = proverNode;
|
|
466
475
|
this.slasherClient = slasherClient;
|
|
467
476
|
this.validatorsSentinel = validatorsSentinel;
|
|
468
477
|
this.epochPruneWatcher = epochPruneWatcher;
|
|
@@ -475,12 +484,21 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
475
484
|
this.telemetry = telemetry;
|
|
476
485
|
this.log = log;
|
|
477
486
|
this.blobClient = blobClient;
|
|
487
|
+
this.validatorClient = validatorClient;
|
|
488
|
+
this.keyStoreManager = keyStoreManager;
|
|
489
|
+
this.debugLogStore = debugLogStore;
|
|
478
490
|
this.initialHeaderHashPromise = (_initProto(this), undefined);
|
|
479
491
|
this.isUploadingSnapshot = false;
|
|
480
492
|
this.metrics = new NodeMetrics(telemetry, 'AztecNodeService');
|
|
481
493
|
this.tracer = telemetry.getTracer('AztecNodeService');
|
|
482
494
|
this.log.info(`Aztec Node version: ${this.packageVersion}`);
|
|
483
495
|
this.log.info(`Aztec Node started on chain 0x${l1ChainId.toString(16)}`, config.l1Contracts);
|
|
496
|
+
// A defensive check that protects us against introducing a bug in the complex `createAndSync` function. We must
|
|
497
|
+
// never have debugLogStore enabled when not in test mode because then we would be accumulating debug logs in
|
|
498
|
+
// memory which could be a DoS vector on the sequencer (since no fees are paid for debug logs).
|
|
499
|
+
if (debugLogStore.isEnabled && config.realProofs) {
|
|
500
|
+
throw new Error('debugLogStore should never be enabled when realProofs are set');
|
|
501
|
+
}
|
|
484
502
|
}
|
|
485
503
|
async getWorldStateSyncStatus() {
|
|
486
504
|
const status = await this.worldStateSynchronizer.status();
|
|
@@ -502,16 +520,27 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
502
520
|
const telemetry = deps.telemetry ?? getTelemetryClient();
|
|
503
521
|
const dateProvider = deps.dateProvider ?? new DateProvider();
|
|
504
522
|
const ethereumChain = createEthereumChain(config.l1RpcUrls, config.l1ChainId);
|
|
505
|
-
// Build a key store from file if given or from environment otherwise
|
|
523
|
+
// Build a key store from file if given or from environment otherwise.
|
|
524
|
+
// We keep the raw KeyStore available so we can merge with prover keys if enableProverNode is set.
|
|
506
525
|
let keyStoreManager;
|
|
507
526
|
const keyStoreProvided = config.keyStoreDirectory !== undefined && config.keyStoreDirectory.length > 0;
|
|
508
527
|
if (keyStoreProvided) {
|
|
509
528
|
const keyStores = loadKeystores(config.keyStoreDirectory);
|
|
510
529
|
keyStoreManager = new KeystoreManager(mergeKeystores(keyStores));
|
|
511
530
|
} else {
|
|
512
|
-
const
|
|
513
|
-
|
|
514
|
-
|
|
531
|
+
const rawKeyStores = [];
|
|
532
|
+
const validatorKeyStore = createKeyStoreForValidator(config);
|
|
533
|
+
if (validatorKeyStore) {
|
|
534
|
+
rawKeyStores.push(validatorKeyStore);
|
|
535
|
+
}
|
|
536
|
+
if (config.enableProverNode) {
|
|
537
|
+
const proverKeyStore = createKeyStoreForProver(config);
|
|
538
|
+
if (proverKeyStore) {
|
|
539
|
+
rawKeyStores.push(proverKeyStore);
|
|
540
|
+
}
|
|
541
|
+
}
|
|
542
|
+
if (rawKeyStores.length > 0) {
|
|
543
|
+
keyStoreManager = new KeystoreManager(rawKeyStores.length === 1 ? rawKeyStores[0] : mergeKeystores(rawKeyStores));
|
|
515
544
|
}
|
|
516
545
|
}
|
|
517
546
|
await keyStoreManager?.validateSigners();
|
|
@@ -520,8 +549,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
520
549
|
if (keyStoreManager === undefined) {
|
|
521
550
|
throw new Error('Failed to create key store, a requirement for running a validator');
|
|
522
551
|
}
|
|
523
|
-
if (!keyStoreProvided) {
|
|
524
|
-
log.warn(
|
|
552
|
+
if (!keyStoreProvided && process.env.NODE_ENV !== 'test') {
|
|
553
|
+
log.warn("Keystore created from env: it's recommended to use a file-based key store for production");
|
|
525
554
|
}
|
|
526
555
|
ValidatorClient.validateKeyStoreConfiguration(keyStoreManager, log);
|
|
527
556
|
}
|
|
@@ -552,7 +581,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
552
581
|
if (config.rollupVersion !== Number(rollupVersionFromRollup)) {
|
|
553
582
|
log.warn(`Registry looked up and returned a rollup with version (${config.rollupVersion}), but this does not match with version detected from the rollup directly: (${rollupVersionFromRollup}).`);
|
|
554
583
|
}
|
|
555
|
-
const blobClient = await createBlobClientWithFileStores(config,
|
|
584
|
+
const blobClient = await createBlobClientWithFileStores(config, log.createChild('blob-client'));
|
|
556
585
|
// attempt snapshot sync if possible
|
|
557
586
|
await trySnapshotSync(config, log);
|
|
558
587
|
const epochCache = await EpochCache.create(config.l1Contracts.rollupAddress, config, {
|
|
@@ -569,8 +598,13 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
569
598
|
// now create the merkle trees and the world state synchronizer
|
|
570
599
|
const worldStateSynchronizer = await createWorldStateSynchronizer(config, archiver, options.prefilledPublicData, telemetry);
|
|
571
600
|
const circuitVerifier = config.realProofs || config.debugForceTxProofVerification ? await BBCircuitVerifier.new(config) : new TestCircuitVerifier(config.proverTestVerificationDelayMs);
|
|
601
|
+
let debugLogStore;
|
|
572
602
|
if (!config.realProofs) {
|
|
573
603
|
log.warn(`Aztec node is accepting fake proofs`);
|
|
604
|
+
debugLogStore = new InMemoryDebugLogStore();
|
|
605
|
+
log.info('Aztec node started in test mode (realProofs set to false) hence debug logs from public functions will be collected and served');
|
|
606
|
+
} else {
|
|
607
|
+
debugLogStore = new NullDebugLogStore();
|
|
574
608
|
}
|
|
575
609
|
const proofVerifier = new QueuedIVCVerifier(config, circuitVerifier);
|
|
576
610
|
// create the tx pool and the p2p client, which will need the l2 block source
|
|
@@ -658,27 +692,29 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
658
692
|
const validatorAddresses = keyStoreManager ? NodeKeystoreAdapter.fromKeyStoreManager(keyStoreManager).getAddresses() : [];
|
|
659
693
|
slasherClient = await createSlasher(config, config.l1Contracts, getPublicClient(config), watchers, dateProvider, epochCache, validatorAddresses, undefined);
|
|
660
694
|
await slasherClient.start();
|
|
661
|
-
const l1TxUtils = config.
|
|
695
|
+
const l1TxUtils = config.sequencerPublisherForwarderAddress ? await createForwarderL1TxUtilsFromSigners(publicClient, keyStoreManager.createAllValidatorPublisherSigners(), config.sequencerPublisherForwarderAddress, {
|
|
662
696
|
...config,
|
|
663
697
|
scope: 'sequencer'
|
|
664
698
|
}, {
|
|
665
699
|
telemetry,
|
|
666
700
|
logger: log.createChild('l1-tx-utils'),
|
|
667
|
-
dateProvider
|
|
668
|
-
|
|
701
|
+
dateProvider,
|
|
702
|
+
kzg: Blob.getViemKzgInstance()
|
|
703
|
+
}) : await createL1TxUtilsFromSigners(publicClient, keyStoreManager.createAllValidatorPublisherSigners(), {
|
|
669
704
|
...config,
|
|
670
705
|
scope: 'sequencer'
|
|
671
706
|
}, {
|
|
672
707
|
telemetry,
|
|
673
708
|
logger: log.createChild('l1-tx-utils'),
|
|
674
|
-
dateProvider
|
|
709
|
+
dateProvider,
|
|
710
|
+
kzg: Blob.getViemKzgInstance()
|
|
675
711
|
});
|
|
676
712
|
// Create and start the sequencer client
|
|
677
713
|
const checkpointsBuilder = new CheckpointsBuilder({
|
|
678
714
|
...config,
|
|
679
715
|
l1GenesisTime,
|
|
680
716
|
slotDuration: Number(slotDuration)
|
|
681
|
-
}, worldStateSynchronizer, archiver, dateProvider, telemetry);
|
|
717
|
+
}, worldStateSynchronizer, archiver, dateProvider, telemetry, debugLogStore);
|
|
682
718
|
sequencer = await SequencerClient.new(config, {
|
|
683
719
|
...deps,
|
|
684
720
|
epochCache,
|
|
@@ -702,13 +738,35 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
702
738
|
} else if (sequencer) {
|
|
703
739
|
log.warn(`Sequencer created but not started`);
|
|
704
740
|
}
|
|
741
|
+
// Create prover node subsystem if enabled
|
|
742
|
+
let proverNode;
|
|
743
|
+
if (config.enableProverNode) {
|
|
744
|
+
proverNode = await createProverNode(config, {
|
|
745
|
+
...deps.proverNodeDeps,
|
|
746
|
+
telemetry,
|
|
747
|
+
dateProvider,
|
|
748
|
+
archiver,
|
|
749
|
+
worldStateSynchronizer,
|
|
750
|
+
p2pClient,
|
|
751
|
+
epochCache,
|
|
752
|
+
blobClient,
|
|
753
|
+
keyStoreManager
|
|
754
|
+
});
|
|
755
|
+
if (!options.dontStartProverNode) {
|
|
756
|
+
await proverNode.start();
|
|
757
|
+
log.info(`Prover node subsystem started`);
|
|
758
|
+
} else {
|
|
759
|
+
log.info(`Prover node subsystem created but not started`);
|
|
760
|
+
}
|
|
761
|
+
}
|
|
705
762
|
const globalVariableBuilder = new GlobalVariableBuilder({
|
|
706
763
|
...config,
|
|
707
764
|
rollupVersion: BigInt(config.rollupVersion),
|
|
708
765
|
l1GenesisTime,
|
|
709
766
|
slotDuration: Number(slotDuration)
|
|
710
767
|
});
|
|
711
|
-
|
|
768
|
+
const node = new AztecNodeService(config, p2pClient, archiver, archiver, archiver, archiver, worldStateSynchronizer, sequencer, proverNode, slasherClient, validatorsSentinel, epochPruneWatcher, ethereumChain.chainInfo.id, config.rollupVersion, globalVariableBuilder, epochCache, packageVersion, proofVerifier, telemetry, log, blobClient, validatorClient, keyStoreManager, debugLogStore);
|
|
769
|
+
return node;
|
|
712
770
|
}
|
|
713
771
|
/**
|
|
714
772
|
* Returns the sequencer client instance.
|
|
@@ -716,6 +774,9 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
716
774
|
*/ getSequencer() {
|
|
717
775
|
return this.sequencer;
|
|
718
776
|
}
|
|
777
|
+
/** Returns the prover node subsystem, if enabled. */ getProverNode() {
|
|
778
|
+
return this.proverNode;
|
|
779
|
+
}
|
|
719
780
|
getBlockSource() {
|
|
720
781
|
return this.blockSource;
|
|
721
782
|
}
|
|
@@ -758,7 +819,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
758
819
|
rollupVersion,
|
|
759
820
|
enr,
|
|
760
821
|
l1ContractAddresses: contractAddresses,
|
|
761
|
-
protocolContractAddresses: protocolContractAddresses
|
|
822
|
+
protocolContractAddresses: protocolContractAddresses,
|
|
823
|
+
realProofs: !!this.config.realProofs
|
|
762
824
|
};
|
|
763
825
|
return nodeInfo;
|
|
764
826
|
}
|
|
@@ -767,14 +829,14 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
767
829
|
* @param block - The block parameter (block number, block hash, or 'latest').
|
|
768
830
|
* @returns The requested block.
|
|
769
831
|
*/ async getBlock(block) {
|
|
770
|
-
if (
|
|
771
|
-
return this.getBlockByHash(
|
|
832
|
+
if (BlockHash.isBlockHash(block)) {
|
|
833
|
+
return this.getBlockByHash(block);
|
|
772
834
|
}
|
|
773
835
|
const blockNumber = block === 'latest' ? await this.getBlockNumber() : block;
|
|
774
836
|
if (blockNumber === BlockNumber.ZERO) {
|
|
775
837
|
return this.buildInitialBlock();
|
|
776
838
|
}
|
|
777
|
-
return await this.blockSource.
|
|
839
|
+
return await this.blockSource.getL2Block(blockNumber);
|
|
778
840
|
}
|
|
779
841
|
/**
|
|
780
842
|
* Get a block specified by its hash.
|
|
@@ -782,21 +844,21 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
782
844
|
* @returns The requested block.
|
|
783
845
|
*/ async getBlockByHash(blockHash) {
|
|
784
846
|
const initialBlockHash = await this.#getInitialHeaderHash();
|
|
785
|
-
if (blockHash.equals(
|
|
847
|
+
if (blockHash.equals(initialBlockHash)) {
|
|
786
848
|
return this.buildInitialBlock();
|
|
787
849
|
}
|
|
788
|
-
return await this.blockSource.
|
|
850
|
+
return await this.blockSource.getL2BlockByHash(blockHash);
|
|
789
851
|
}
|
|
790
852
|
buildInitialBlock() {
|
|
791
853
|
const initialHeader = this.worldStateSynchronizer.getCommitted().getInitialHeader();
|
|
792
|
-
return
|
|
854
|
+
return L2Block.empty(initialHeader);
|
|
793
855
|
}
|
|
794
856
|
/**
|
|
795
857
|
* Get a block specified by its archive root.
|
|
796
858
|
* @param archive - The archive root being requested.
|
|
797
859
|
* @returns The requested block.
|
|
798
860
|
*/ async getBlockByArchive(archive) {
|
|
799
|
-
return await this.blockSource.
|
|
861
|
+
return await this.blockSource.getL2BlockByArchive(archive);
|
|
800
862
|
}
|
|
801
863
|
/**
|
|
802
864
|
* Method to request blocks. Will attempt to return all requested blocks but will return only those available.
|
|
@@ -804,19 +866,13 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
804
866
|
* @param limit - The maximum number of blocks to obtain.
|
|
805
867
|
* @returns The blocks requested.
|
|
806
868
|
*/ async getBlocks(from, limit) {
|
|
807
|
-
return await this.blockSource.
|
|
869
|
+
return await this.blockSource.getBlocks(from, BlockNumber(limit)) ?? [];
|
|
808
870
|
}
|
|
809
|
-
async
|
|
810
|
-
return await this.blockSource.
|
|
871
|
+
async getCheckpoints(from, limit) {
|
|
872
|
+
return await this.blockSource.getCheckpoints(from, limit) ?? [];
|
|
811
873
|
}
|
|
812
|
-
async
|
|
813
|
-
return await this.blockSource.
|
|
814
|
-
}
|
|
815
|
-
async getL2BlocksNew(from, limit) {
|
|
816
|
-
return await this.blockSource.getL2BlocksNew(from, limit) ?? [];
|
|
817
|
-
}
|
|
818
|
-
async getCheckpointedBlocks(from, limit, proven) {
|
|
819
|
-
return await this.blockSource.getCheckpointedBlocks(from, limit, proven) ?? [];
|
|
874
|
+
async getCheckpointedBlocks(from, limit) {
|
|
875
|
+
return await this.blockSource.getCheckpointedBlocks(from, limit) ?? [];
|
|
820
876
|
}
|
|
821
877
|
/**
|
|
822
878
|
* Method to fetch the current min L2 fees.
|
|
@@ -842,6 +898,9 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
842
898
|
async getProvenBlockNumber() {
|
|
843
899
|
return await this.blockSource.getProvenBlockNumber();
|
|
844
900
|
}
|
|
901
|
+
async getCheckpointedBlockNumber() {
|
|
902
|
+
return await this.blockSource.getCheckpointedL2BlockNumber();
|
|
903
|
+
}
|
|
845
904
|
/**
|
|
846
905
|
* Method to fetch the version of the package.
|
|
847
906
|
* @returns The node package version
|
|
@@ -866,10 +925,28 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
866
925
|
getContract(address) {
|
|
867
926
|
return this.contractDataSource.getContract(address);
|
|
868
927
|
}
|
|
869
|
-
getPrivateLogsByTags(tags, page) {
|
|
928
|
+
async getPrivateLogsByTags(tags, page, referenceBlock) {
|
|
929
|
+
if (referenceBlock) {
|
|
930
|
+
const initialBlockHash = await this.#getInitialHeaderHash();
|
|
931
|
+
if (!referenceBlock.equals(initialBlockHash)) {
|
|
932
|
+
const header = await this.blockSource.getBlockHeaderByHash(referenceBlock);
|
|
933
|
+
if (!header) {
|
|
934
|
+
throw new Error(`Block ${referenceBlock.toString()} not found in the node. This might indicate a reorg has occurred.`);
|
|
935
|
+
}
|
|
936
|
+
}
|
|
937
|
+
}
|
|
870
938
|
return this.logsSource.getPrivateLogsByTags(tags, page);
|
|
871
939
|
}
|
|
872
|
-
getPublicLogsByTagsFromContract(contractAddress, tags, page) {
|
|
940
|
+
async getPublicLogsByTagsFromContract(contractAddress, tags, page, referenceBlock) {
|
|
941
|
+
if (referenceBlock) {
|
|
942
|
+
const initialBlockHash = await this.#getInitialHeaderHash();
|
|
943
|
+
if (!referenceBlock.equals(initialBlockHash)) {
|
|
944
|
+
const header = await this.blockSource.getBlockHeaderByHash(referenceBlock);
|
|
945
|
+
if (!header) {
|
|
946
|
+
throw new Error(`Block ${referenceBlock.toString()} not found in the node. This might indicate a reorg has occurred.`);
|
|
947
|
+
}
|
|
948
|
+
}
|
|
949
|
+
}
|
|
873
950
|
return this.logsSource.getPublicLogsByTagsFromContract(contractAddress, tags, page);
|
|
874
951
|
}
|
|
875
952
|
/**
|
|
@@ -911,18 +988,26 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
911
988
|
});
|
|
912
989
|
}
|
|
913
990
|
async getTxReceipt(txHash) {
|
|
914
|
-
|
|
915
|
-
//
|
|
916
|
-
|
|
917
|
-
|
|
918
|
-
|
|
919
|
-
txReceipt = new TxReceipt(txHash, TxStatus.PENDING, '');
|
|
920
|
-
}
|
|
991
|
+
// Check the tx pool status first. If the tx is known to the pool (pending or mined), we'll use that
|
|
992
|
+
// as a fallback if we don't find a settled receipt in the archiver.
|
|
993
|
+
const txPoolStatus = await this.p2pClient.getTxStatus(txHash);
|
|
994
|
+
const isKnownToPool = txPoolStatus === 'pending' || txPoolStatus === 'mined';
|
|
995
|
+
// Then get the actual tx from the archiver, which tracks every tx in a mined block.
|
|
921
996
|
const settledTxReceipt = await this.blockSource.getSettledTxReceipt(txHash);
|
|
997
|
+
let receipt;
|
|
922
998
|
if (settledTxReceipt) {
|
|
923
|
-
|
|
999
|
+
receipt = settledTxReceipt;
|
|
1000
|
+
} else if (isKnownToPool) {
|
|
1001
|
+
// If the tx is in the pool but not in the archiver, it's pending.
|
|
1002
|
+
// This handles race conditions between archiver and p2p, where the archiver
|
|
1003
|
+
// has pruned the block in which a tx was mined, but p2p has not caught up yet.
|
|
1004
|
+
receipt = new TxReceipt(txHash, TxStatus.PENDING, undefined, undefined);
|
|
1005
|
+
} else {
|
|
1006
|
+
// Otherwise, if we don't know the tx, we consider it dropped.
|
|
1007
|
+
receipt = new TxReceipt(txHash, TxStatus.DROPPED, undefined, 'Tx dropped by P2P node');
|
|
924
1008
|
}
|
|
925
|
-
|
|
1009
|
+
this.debugLogStore.decorateReceiptWithLogs(txHash.toString(), receipt);
|
|
1010
|
+
return receipt;
|
|
926
1011
|
}
|
|
927
1012
|
getTxEffect(txHash) {
|
|
928
1013
|
return this.blockSource.getTxEffect(txHash);
|
|
@@ -936,6 +1021,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
936
1021
|
await tryStop(this.slasherClient);
|
|
937
1022
|
await tryStop(this.proofVerifier);
|
|
938
1023
|
await tryStop(this.sequencer);
|
|
1024
|
+
await tryStop(this.proverNode);
|
|
939
1025
|
await tryStop(this.p2pClient);
|
|
940
1026
|
await tryStop(this.worldStateSynchronizer);
|
|
941
1027
|
await tryStop(this.blockSource);
|
|
@@ -974,8 +1060,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
974
1060
|
*/ async getTxsByHash(txHashes) {
|
|
975
1061
|
return compactArray(await Promise.all(txHashes.map((txHash)=>this.getTxByHash(txHash))));
|
|
976
1062
|
}
|
|
977
|
-
async findLeavesIndexes(
|
|
978
|
-
const committedDb = await this.#getWorldState(
|
|
1063
|
+
async findLeavesIndexes(referenceBlock, treeId, leafValues) {
|
|
1064
|
+
const committedDb = await this.#getWorldState(referenceBlock);
|
|
979
1065
|
const maybeIndices = await committedDb.findLeafIndices(treeId, leafValues.map((x)=>x.toBuffer()));
|
|
980
1066
|
// We filter out undefined values
|
|
981
1067
|
const indices = maybeIndices.filter((x)=>x !== undefined);
|
|
@@ -1018,35 +1104,27 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1018
1104
|
}
|
|
1019
1105
|
return {
|
|
1020
1106
|
l2BlockNumber: BlockNumber(Number(blockNumber)),
|
|
1021
|
-
l2BlockHash:
|
|
1107
|
+
l2BlockHash: new BlockHash(blockHash),
|
|
1022
1108
|
data: index
|
|
1023
1109
|
};
|
|
1024
1110
|
});
|
|
1025
1111
|
}
|
|
1026
|
-
async
|
|
1027
|
-
const committedDb = await this.#getWorldState(
|
|
1028
|
-
return committedDb.getSiblingPath(MerkleTreeId.NULLIFIER_TREE, leafIndex);
|
|
1029
|
-
}
|
|
1030
|
-
async getNoteHashSiblingPath(block, leafIndex) {
|
|
1031
|
-
const committedDb = await this.#getWorldState(block);
|
|
1032
|
-
return committedDb.getSiblingPath(MerkleTreeId.NOTE_HASH_TREE, leafIndex);
|
|
1033
|
-
}
|
|
1034
|
-
async getArchiveMembershipWitness(block, archive) {
|
|
1035
|
-
const committedDb = await this.#getWorldState(block);
|
|
1112
|
+
async getBlockHashMembershipWitness(referenceBlock, blockHash) {
|
|
1113
|
+
const committedDb = await this.#getWorldState(referenceBlock);
|
|
1036
1114
|
const [pathAndIndex] = await committedDb.findSiblingPaths(MerkleTreeId.ARCHIVE, [
|
|
1037
|
-
|
|
1115
|
+
blockHash
|
|
1038
1116
|
]);
|
|
1039
1117
|
return pathAndIndex === undefined ? undefined : MembershipWitness.fromSiblingPath(pathAndIndex.index, pathAndIndex.path);
|
|
1040
1118
|
}
|
|
1041
|
-
async getNoteHashMembershipWitness(
|
|
1042
|
-
const committedDb = await this.#getWorldState(
|
|
1119
|
+
async getNoteHashMembershipWitness(referenceBlock, noteHash) {
|
|
1120
|
+
const committedDb = await this.#getWorldState(referenceBlock);
|
|
1043
1121
|
const [pathAndIndex] = await committedDb.findSiblingPaths(MerkleTreeId.NOTE_HASH_TREE, [
|
|
1044
1122
|
noteHash
|
|
1045
1123
|
]);
|
|
1046
1124
|
return pathAndIndex === undefined ? undefined : MembershipWitness.fromSiblingPath(pathAndIndex.index, pathAndIndex.path);
|
|
1047
1125
|
}
|
|
1048
|
-
async getL1ToL2MessageMembershipWitness(
|
|
1049
|
-
const db = await this.#getWorldState(
|
|
1126
|
+
async getL1ToL2MessageMembershipWitness(referenceBlock, l1ToL2Message) {
|
|
1127
|
+
const db = await this.#getWorldState(referenceBlock);
|
|
1050
1128
|
const [witness] = await db.findSiblingPaths(MerkleTreeId.L1_TO_L2_MESSAGE_TREE, [
|
|
1051
1129
|
l1ToL2Message
|
|
1052
1130
|
]);
|
|
@@ -1076,12 +1154,13 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1076
1154
|
* @param epoch - The epoch at which to get the data.
|
|
1077
1155
|
* @returns The L2 to L1 messages (empty array if the epoch is not found).
|
|
1078
1156
|
*/ async getL2ToL1Messages(epoch) {
|
|
1079
|
-
// Assumes `
|
|
1080
|
-
const
|
|
1157
|
+
// Assumes `getCheckpointedBlocksForEpoch` returns blocks in ascending order of block number.
|
|
1158
|
+
const checkpointedBlocks = await this.blockSource.getCheckpointedBlocksForEpoch(epoch);
|
|
1081
1159
|
const blocksInCheckpoints = [];
|
|
1082
1160
|
let previousSlotNumber = SlotNumber.ZERO;
|
|
1083
1161
|
let checkpointIndex = -1;
|
|
1084
|
-
for (const
|
|
1162
|
+
for (const checkpointedBlock of checkpointedBlocks){
|
|
1163
|
+
const block = checkpointedBlock.block;
|
|
1085
1164
|
const slotNumber = block.header.globalVariables.slotNumber;
|
|
1086
1165
|
if (slotNumber !== previousSlotNumber) {
|
|
1087
1166
|
checkpointIndex++;
|
|
@@ -1092,16 +1171,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1092
1171
|
}
|
|
1093
1172
|
return blocksInCheckpoints.map((blocks)=>blocks.map((block)=>block.body.txEffects.map((txEffect)=>txEffect.l2ToL1Msgs)));
|
|
1094
1173
|
}
|
|
1095
|
-
async
|
|
1096
|
-
const
|
|
1097
|
-
return committedDb.getSiblingPath(MerkleTreeId.ARCHIVE, leafIndex);
|
|
1098
|
-
}
|
|
1099
|
-
async getPublicDataSiblingPath(block, leafIndex) {
|
|
1100
|
-
const committedDb = await this.#getWorldState(block);
|
|
1101
|
-
return committedDb.getSiblingPath(MerkleTreeId.PUBLIC_DATA_TREE, leafIndex);
|
|
1102
|
-
}
|
|
1103
|
-
async getNullifierMembershipWitness(block, nullifier) {
|
|
1104
|
-
const db = await this.#getWorldState(block);
|
|
1174
|
+
async getNullifierMembershipWitness(referenceBlock, nullifier) {
|
|
1175
|
+
const db = await this.#getWorldState(referenceBlock);
|
|
1105
1176
|
const [witness] = await db.findSiblingPaths(MerkleTreeId.NULLIFIER_TREE, [
|
|
1106
1177
|
nullifier.toBuffer()
|
|
1107
1178
|
]);
|
|
@@ -1117,7 +1188,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1117
1188
|
}
|
|
1118
1189
|
/**
|
|
1119
1190
|
* Returns a low nullifier membership witness for a given nullifier at a given block.
|
|
1120
|
-
* @param
|
|
1191
|
+
* @param referenceBlock - The block parameter (block number, block hash, or 'latest') at which to get the data
|
|
1192
|
+
* (which contains the root of the nullifier tree in which we are searching for the nullifier).
|
|
1121
1193
|
* @param nullifier - Nullifier we try to find the low nullifier witness for.
|
|
1122
1194
|
* @returns The low nullifier membership witness (if found).
|
|
1123
1195
|
* @remarks Low nullifier witness can be used to perform a nullifier non-inclusion proof by leveraging the "linked
|
|
@@ -1128,8 +1200,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1128
1200
|
* the nullifier already exists in the tree. This is because the `getPreviousValueIndex` function returns the
|
|
1129
1201
|
* index of the nullifier itself when it already exists in the tree.
|
|
1130
1202
|
* TODO: This is a confusing behavior and we should eventually address that.
|
|
1131
|
-
*/ async getLowNullifierMembershipWitness(
|
|
1132
|
-
const committedDb = await this.#getWorldState(
|
|
1203
|
+
*/ async getLowNullifierMembershipWitness(referenceBlock, nullifier) {
|
|
1204
|
+
const committedDb = await this.#getWorldState(referenceBlock);
|
|
1133
1205
|
const findResult = await committedDb.getPreviousValueIndex(MerkleTreeId.NULLIFIER_TREE, nullifier.toBigInt());
|
|
1134
1206
|
if (!findResult) {
|
|
1135
1207
|
return undefined;
|
|
@@ -1142,8 +1214,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1142
1214
|
const siblingPath = await committedDb.getSiblingPath(MerkleTreeId.NULLIFIER_TREE, BigInt(index));
|
|
1143
1215
|
return new NullifierMembershipWitness(BigInt(index), preimageData, siblingPath);
|
|
1144
1216
|
}
|
|
1145
|
-
async getPublicDataWitness(
|
|
1146
|
-
const committedDb = await this.#getWorldState(
|
|
1217
|
+
async getPublicDataWitness(referenceBlock, leafSlot) {
|
|
1218
|
+
const committedDb = await this.#getWorldState(referenceBlock);
|
|
1147
1219
|
const lowLeafResult = await committedDb.getPreviousValueIndex(MerkleTreeId.PUBLIC_DATA_TREE, leafSlot.toBigInt());
|
|
1148
1220
|
if (!lowLeafResult) {
|
|
1149
1221
|
return undefined;
|
|
@@ -1153,8 +1225,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1153
1225
|
return new PublicDataWitness(lowLeafResult.index, preimage, path);
|
|
1154
1226
|
}
|
|
1155
1227
|
}
|
|
1156
|
-
async getPublicStorageAt(
|
|
1157
|
-
const committedDb = await this.#getWorldState(
|
|
1228
|
+
async getPublicStorageAt(referenceBlock, contract, slot) {
|
|
1229
|
+
const committedDb = await this.#getWorldState(referenceBlock);
|
|
1158
1230
|
const leafSlot = await computePublicDataTreeLeafSlot(contract, slot);
|
|
1159
1231
|
const lowLeafResult = await committedDb.getPreviousValueIndex(MerkleTreeId.PUBLIC_DATA_TREE, leafSlot.toBigInt());
|
|
1160
1232
|
if (!lowLeafResult || !lowLeafResult.alreadyPresent) {
|
|
@@ -1164,14 +1236,13 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1164
1236
|
return preimage.leaf.value;
|
|
1165
1237
|
}
|
|
1166
1238
|
async getBlockHeader(block = 'latest') {
|
|
1167
|
-
if (
|
|
1239
|
+
if (BlockHash.isBlockHash(block)) {
|
|
1168
1240
|
const initialBlockHash = await this.#getInitialHeaderHash();
|
|
1169
1241
|
if (block.equals(initialBlockHash)) {
|
|
1170
1242
|
// Block source doesn't handle initial header so we need to handle the case separately.
|
|
1171
1243
|
return this.worldStateSynchronizer.getCommitted().getInitialHeader();
|
|
1172
1244
|
}
|
|
1173
|
-
|
|
1174
|
-
return this.blockSource.getBlockHeaderByHash(blockHashFr);
|
|
1245
|
+
return this.blockSource.getBlockHeaderByHash(block);
|
|
1175
1246
|
} else {
|
|
1176
1247
|
// Block source doesn't handle initial header so we need to handle the case separately.
|
|
1177
1248
|
const blockNumber = block === 'latest' ? await this.getBlockNumber() : block;
|
|
@@ -1188,6 +1259,12 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1188
1259
|
*/ async getBlockHeaderByArchive(archive) {
|
|
1189
1260
|
return await this.blockSource.getBlockHeaderByArchive(archive);
|
|
1190
1261
|
}
|
|
1262
|
+
getBlockData(number) {
|
|
1263
|
+
return this.blockSource.getBlockData(number);
|
|
1264
|
+
}
|
|
1265
|
+
getBlockDataByArchive(archive) {
|
|
1266
|
+
return this.blockSource.getBlockDataByArchive(archive);
|
|
1267
|
+
}
|
|
1191
1268
|
/**
|
|
1192
1269
|
* Simulates the public part of a transaction with the current state.
|
|
1193
1270
|
* @param tx - The transaction to simulate.
|
|
@@ -1200,17 +1277,20 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1200
1277
|
throw new BadRequestError(`Transaction total gas limit ${txGasLimit + teardownGasLimit} (${txGasLimit} + ${teardownGasLimit}) exceeds maximum gas limit ${this.config.rpcSimulatePublicMaxGasLimit} for simulation`);
|
|
1201
1278
|
}
|
|
1202
1279
|
const txHash = tx.getTxHash();
|
|
1203
|
-
const
|
|
1280
|
+
const latestBlockNumber = await this.blockSource.getBlockNumber();
|
|
1281
|
+
const blockNumber = BlockNumber.add(latestBlockNumber, 1);
|
|
1204
1282
|
// If sequencer is not initialized, we just set these values to zero for simulation.
|
|
1205
1283
|
const coinbase = EthAddress.ZERO;
|
|
1206
1284
|
const feeRecipient = AztecAddress.ZERO;
|
|
1207
1285
|
const newGlobalVariables = await this.globalVariableBuilder.buildGlobalVariables(blockNumber, coinbase, feeRecipient);
|
|
1208
|
-
const publicProcessorFactory = new PublicProcessorFactory(this.contractDataSource, new DateProvider(), this.telemetry);
|
|
1286
|
+
const publicProcessorFactory = new PublicProcessorFactory(this.contractDataSource, new DateProvider(), this.telemetry, this.log.getBindings());
|
|
1209
1287
|
this.log.verbose(`Simulating public calls for tx ${txHash}`, {
|
|
1210
1288
|
globalVariables: newGlobalVariables.toInspect(),
|
|
1211
1289
|
txHash,
|
|
1212
1290
|
blockNumber
|
|
1213
1291
|
});
|
|
1292
|
+
// Ensure world-state has caught up with the latest block we loaded from the archiver
|
|
1293
|
+
await this.worldStateSynchronizer.syncImmediate(latestBlockNumber);
|
|
1214
1294
|
const merkleTreeFork = await this.worldStateSynchronizer.fork();
|
|
1215
1295
|
try {
|
|
1216
1296
|
const config = PublicSimulatorConfig.from({
|
|
@@ -1225,7 +1305,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1225
1305
|
});
|
|
1226
1306
|
const processor = publicProcessorFactory.create(merkleTreeFork, newGlobalVariables, config);
|
|
1227
1307
|
// REFACTOR: Consider merging ProcessReturnValues into ProcessedTx
|
|
1228
|
-
const [processedTxs, failedTxs, _usedTxs, returns] = await processor.process([
|
|
1308
|
+
const [processedTxs, failedTxs, _usedTxs, returns, _blobFields, debugLogs] = await processor.process([
|
|
1229
1309
|
tx
|
|
1230
1310
|
]);
|
|
1231
1311
|
// REFACTOR: Consider returning the error rather than throwing
|
|
@@ -1236,7 +1316,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1236
1316
|
throw failedTxs[0].error;
|
|
1237
1317
|
}
|
|
1238
1318
|
const [processedTx] = processedTxs;
|
|
1239
|
-
return new PublicSimulationOutput(processedTx.revertReason, processedTx.globalVariables, processedTx.txEffect, returns, processedTx.gasUsed);
|
|
1319
|
+
return new PublicSimulationOutput(processedTx.revertReason, processedTx.globalVariables, processedTx.txEffect, returns, processedTx.gasUsed, debugLogs);
|
|
1240
1320
|
} finally{
|
|
1241
1321
|
await merkleTreeFork.close();
|
|
1242
1322
|
}
|
|
@@ -1244,10 +1324,10 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1244
1324
|
async isValidTx(tx, { isSimulation, skipFeeEnforcement } = {}) {
|
|
1245
1325
|
const db = this.worldStateSynchronizer.getCommitted();
|
|
1246
1326
|
const verifier = isSimulation ? undefined : this.proofVerifier;
|
|
1247
|
-
// We accept transactions if they are not expired by the next slot (checked based on the
|
|
1327
|
+
// We accept transactions if they are not expired by the next slot (checked based on the ExpirationTimestamp field)
|
|
1248
1328
|
const { ts: nextSlotTimestamp } = this.epochCache.getEpochAndSlotInNextL1Slot();
|
|
1249
1329
|
const blockNumber = BlockNumber(await this.blockSource.getBlockNumber() + 1);
|
|
1250
|
-
const validator =
|
|
1330
|
+
const validator = createTxValidatorForAcceptingTxsOverRPC(db, this.contractDataSource, verifier, {
|
|
1251
1331
|
timestamp: nextSlotTimestamp,
|
|
1252
1332
|
blockNumber,
|
|
1253
1333
|
l1ChainId: this.l1ChainId,
|
|
@@ -1256,7 +1336,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1256
1336
|
gasFees: await this.getCurrentMinFees(),
|
|
1257
1337
|
skipFeeEnforcement,
|
|
1258
1338
|
txsPermitted: !this.config.disableTransactions
|
|
1259
|
-
});
|
|
1339
|
+
}, this.log.getBindings());
|
|
1260
1340
|
return await validator.validateTx(tx);
|
|
1261
1341
|
}
|
|
1262
1342
|
getConfig() {
|
|
@@ -1398,9 +1478,76 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1398
1478
|
return this.slasherClient.gatherOffensesForRound(round === 'current' ? undefined : BigInt(round));
|
|
1399
1479
|
}
|
|
1400
1480
|
}
|
|
1481
|
+
async reloadKeystore() {
|
|
1482
|
+
if (!this.config.keyStoreDirectory?.length) {
|
|
1483
|
+
throw new BadRequestError('Cannot reload keystore: node is not using a file-based keystore. ' + 'Set KEY_STORE_DIRECTORY to use file-based keystores.');
|
|
1484
|
+
}
|
|
1485
|
+
if (!this.validatorClient) {
|
|
1486
|
+
throw new BadRequestError('Cannot reload keystore: validator is not enabled.');
|
|
1487
|
+
}
|
|
1488
|
+
this.log.info('Reloading keystore from disk');
|
|
1489
|
+
// Re-read and validate keystore files
|
|
1490
|
+
const keyStores = loadKeystores(this.config.keyStoreDirectory);
|
|
1491
|
+
const newManager = new KeystoreManager(mergeKeystores(keyStores));
|
|
1492
|
+
await newManager.validateSigners();
|
|
1493
|
+
ValidatorClient.validateKeyStoreConfiguration(newManager, this.log);
|
|
1494
|
+
// Validate that every validator's publisher keys overlap with the L1 signers
|
|
1495
|
+
// that were initialized at startup. Publishers cannot be hot-reloaded, so a
|
|
1496
|
+
// validator with a publisher key that doesn't match any existing L1 signer
|
|
1497
|
+
// would silently fail on every proposer slot.
|
|
1498
|
+
if (this.keyStoreManager && this.sequencer) {
|
|
1499
|
+
const oldAdapter = NodeKeystoreAdapter.fromKeyStoreManager(this.keyStoreManager);
|
|
1500
|
+
const availablePublishers = new Set(oldAdapter.getAttesterAddresses().flatMap((a)=>oldAdapter.getPublisherAddresses(a).map((p)=>p.toString().toLowerCase())));
|
|
1501
|
+
const newAdapter = NodeKeystoreAdapter.fromKeyStoreManager(newManager);
|
|
1502
|
+
for (const attester of newAdapter.getAttesterAddresses()){
|
|
1503
|
+
const pubs = newAdapter.getPublisherAddresses(attester);
|
|
1504
|
+
if (pubs.length > 0 && !pubs.some((p)=>availablePublishers.has(p.toString().toLowerCase()))) {
|
|
1505
|
+
throw new BadRequestError(`Cannot reload keystore: validator ${attester} has publisher keys ` + `[${pubs.map((p)=>p.toString()).join(', ')}] but none match the L1 signers initialized at startup ` + `[${[
|
|
1506
|
+
...availablePublishers
|
|
1507
|
+
].join(', ')}]. Publishers cannot be hot-reloaded — ` + `use an existing publisher key or restart the node.`);
|
|
1508
|
+
}
|
|
1509
|
+
}
|
|
1510
|
+
}
|
|
1511
|
+
// Build adapters for old and new keystores to compute diff
|
|
1512
|
+
const newAdapter = NodeKeystoreAdapter.fromKeyStoreManager(newManager);
|
|
1513
|
+
const newAddresses = newAdapter.getAttesterAddresses();
|
|
1514
|
+
const oldAddresses = this.keyStoreManager ? NodeKeystoreAdapter.fromKeyStoreManager(this.keyStoreManager).getAttesterAddresses() : [];
|
|
1515
|
+
const oldSet = new Set(oldAddresses.map((a)=>a.toString()));
|
|
1516
|
+
const newSet = new Set(newAddresses.map((a)=>a.toString()));
|
|
1517
|
+
const added = newAddresses.filter((a)=>!oldSet.has(a.toString()));
|
|
1518
|
+
const removed = oldAddresses.filter((a)=>!newSet.has(a.toString()));
|
|
1519
|
+
if (added.length > 0) {
|
|
1520
|
+
this.log.info(`Keystore reload: adding attester keys: ${added.map((a)=>a.toString()).join(', ')}`);
|
|
1521
|
+
}
|
|
1522
|
+
if (removed.length > 0) {
|
|
1523
|
+
this.log.info(`Keystore reload: removing attester keys: ${removed.map((a)=>a.toString()).join(', ')}`);
|
|
1524
|
+
}
|
|
1525
|
+
if (added.length === 0 && removed.length === 0) {
|
|
1526
|
+
this.log.info('Keystore reload: attester keys unchanged');
|
|
1527
|
+
}
|
|
1528
|
+
// Update the validator client (coinbase, feeRecipient, attester keys)
|
|
1529
|
+
this.validatorClient.reloadKeystore(newManager);
|
|
1530
|
+
// Update the publisher factory's keystore so newly-added validators
|
|
1531
|
+
// can be matched to existing publisher keys when proposing blocks.
|
|
1532
|
+
if (this.sequencer) {
|
|
1533
|
+
this.sequencer.updatePublisherNodeKeyStore(newAdapter);
|
|
1534
|
+
}
|
|
1535
|
+
// Update slasher's "don't-slash-self" list with new validator addresses
|
|
1536
|
+
if (this.slasherClient && !this.config.slashSelfAllowed) {
|
|
1537
|
+
const slashValidatorsNever = unique([
|
|
1538
|
+
...this.config.slashValidatorsNever ?? [],
|
|
1539
|
+
...newAddresses
|
|
1540
|
+
].map((a)=>a.toString())).map(EthAddress.fromString);
|
|
1541
|
+
this.slasherClient.updateConfig({
|
|
1542
|
+
slashValidatorsNever
|
|
1543
|
+
});
|
|
1544
|
+
}
|
|
1545
|
+
this.keyStoreManager = newManager;
|
|
1546
|
+
this.log.info('Keystore reloaded: coinbase, feeRecipient, and attester keys updated');
|
|
1547
|
+
}
|
|
1401
1548
|
#getInitialHeaderHash() {
|
|
1402
1549
|
if (!this.initialHeaderHashPromise) {
|
|
1403
|
-
this.initialHeaderHashPromise = this.worldStateSynchronizer.getCommitted().getInitialHeader().hash()
|
|
1550
|
+
this.initialHeaderHashPromise = this.worldStateSynchronizer.getCommitted().getInitialHeader().hash();
|
|
1404
1551
|
}
|
|
1405
1552
|
return this.initialHeaderHashPromise;
|
|
1406
1553
|
}
|
|
@@ -1420,14 +1567,13 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1420
1567
|
this.log.debug(`Using committed db for block 'latest', world state synced upto ${blockSyncedTo}`);
|
|
1421
1568
|
return this.worldStateSynchronizer.getCommitted();
|
|
1422
1569
|
}
|
|
1423
|
-
if (
|
|
1570
|
+
if (BlockHash.isBlockHash(block)) {
|
|
1424
1571
|
const initialBlockHash = await this.#getInitialHeaderHash();
|
|
1425
1572
|
if (block.equals(initialBlockHash)) {
|
|
1426
1573
|
// Block source doesn't handle initial header so we need to handle the case separately.
|
|
1427
1574
|
return this.worldStateSynchronizer.getSnapshot(BlockNumber.ZERO);
|
|
1428
1575
|
}
|
|
1429
|
-
const
|
|
1430
|
-
const header = await this.blockSource.getBlockHeaderByHash(blockHashFr);
|
|
1576
|
+
const header = await this.blockSource.getBlockHeaderByHash(block);
|
|
1431
1577
|
if (!header) {
|
|
1432
1578
|
throw new Error(`Block hash ${block.toString()} not found when querying world state. If the node API has been queried with anchor block hash possibly a reorg has occurred.`);
|
|
1433
1579
|
}
|