@aztec/aztec-node 0.0.1-commit.6d3c34e → 0.0.1-commit.72dcdcda8

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -374,13 +374,13 @@ var _dec, _initProto;
374
374
  import { createArchiver } from '@aztec/archiver';
375
375
  import { BBCircuitVerifier, QueuedIVCVerifier, TestCircuitVerifier } from '@aztec/bb-prover';
376
376
  import { createBlobClientWithFileStores } from '@aztec/blob-client/client';
377
- import { INITIAL_L2_BLOCK_NUM } from '@aztec/constants';
377
+ import { Blob } from '@aztec/blob-lib';
378
378
  import { EpochCache } from '@aztec/epoch-cache';
379
379
  import { createEthereumChain } from '@aztec/ethereum/chain';
380
380
  import { getPublicClient } from '@aztec/ethereum/client';
381
381
  import { RegistryContract, RollupContract } from '@aztec/ethereum/contracts';
382
382
  import { BlockNumber, SlotNumber } from '@aztec/foundation/branded-types';
383
- import { compactArray, pick } from '@aztec/foundation/collection';
383
+ import { compactArray, pick, unique } from '@aztec/foundation/collection';
384
384
  import { Fr } from '@aztec/foundation/curves/bn254';
385
385
  import { EthAddress } from '@aztec/foundation/eth-address';
386
386
  import { BadRequestError } from '@aztec/foundation/json-rpc';
@@ -390,26 +390,28 @@ import { DateProvider, Timer } from '@aztec/foundation/timer';
390
390
  import { MembershipWitness } from '@aztec/foundation/trees';
391
391
  import { KeystoreManager, loadKeystores, mergeKeystores } from '@aztec/node-keystore';
392
392
  import { trySnapshotSync, uploadSnapshot } from '@aztec/node-lib/actions';
393
- import { createForwarderL1TxUtilsFromEthSigner, createL1TxUtilsWithBlobsFromEthSigner } from '@aztec/node-lib/factories';
394
- import { createP2PClient, getDefaultAllowedSetupFunctions } from '@aztec/p2p';
393
+ import { createForwarderL1TxUtilsFromSigners, createL1TxUtilsFromSigners } from '@aztec/node-lib/factories';
394
+ import { createP2PClient, createTxValidatorForAcceptingTxsOverRPC, getDefaultAllowedSetupFunctions } from '@aztec/p2p';
395
395
  import { ProtocolContractAddress } from '@aztec/protocol-contracts';
396
- import { BlockBuilder, GlobalVariableBuilder, SequencerClient } from '@aztec/sequencer-client';
396
+ import { createProverNode } from '@aztec/prover-node';
397
+ import { createKeyStoreForProver } from '@aztec/prover-node/config';
398
+ import { GlobalVariableBuilder, SequencerClient } from '@aztec/sequencer-client';
397
399
  import { PublicProcessorFactory } from '@aztec/simulator/server';
398
400
  import { AttestationsBlockWatcher, EpochPruneWatcher, createSlasher } from '@aztec/slasher';
399
401
  import { CollectionLimitsConfig, PublicSimulatorConfig } from '@aztec/stdlib/avm';
400
402
  import { AztecAddress } from '@aztec/stdlib/aztec-address';
401
- import { L2BlockHash } from '@aztec/stdlib/block';
403
+ import { BlockHash, L2Block } from '@aztec/stdlib/block';
402
404
  import { GasFees } from '@aztec/stdlib/gas';
403
405
  import { computePublicDataTreeLeafSlot } from '@aztec/stdlib/hash';
404
406
  import { AztecNodeAdminConfigSchema } from '@aztec/stdlib/interfaces/client';
405
407
  import { tryStop } from '@aztec/stdlib/interfaces/server';
408
+ import { InMemoryDebugLogStore, NullDebugLogStore } from '@aztec/stdlib/logs';
406
409
  import { InboxLeaf } from '@aztec/stdlib/messaging';
407
- import { P2PClientType } from '@aztec/stdlib/p2p';
408
410
  import { MerkleTreeId, NullifierMembershipWitness, PublicDataWitness } from '@aztec/stdlib/trees';
409
411
  import { PublicSimulationOutput, TxReceipt, TxStatus } from '@aztec/stdlib/tx';
410
412
  import { getPackageVersion } from '@aztec/stdlib/update-checker';
411
413
  import { Attributes, getTelemetryClient, trackSpan } from '@aztec/telemetry-client';
412
- import { FullNodeCheckpointsBuilder as CheckpointsBuilder, FullNodeCheckpointsBuilder, NodeKeystoreAdapter, ValidatorClient, createBlockProposalHandler, createValidatorClient, createValidatorForAcceptingTxs } from '@aztec/validator-client';
414
+ import { FullNodeCheckpointsBuilder as CheckpointsBuilder, FullNodeCheckpointsBuilder, NodeKeystoreAdapter, ValidatorClient, createBlockProposalHandler, createValidatorClient } from '@aztec/validator-client';
413
415
  import { createWorldStateSynchronizer } from '@aztec/world-state';
414
416
  import { createPublicClient, fallback, http } from 'viem';
415
417
  import { createSentinel } from '../sentinel/factory.js';
@@ -429,6 +431,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
429
431
  l1ToL2MessageSource;
430
432
  worldStateSynchronizer;
431
433
  sequencer;
434
+ proverNode;
432
435
  slasherClient;
433
436
  validatorsSentinel;
434
437
  epochPruneWatcher;
@@ -441,6 +444,9 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
441
444
  telemetry;
442
445
  log;
443
446
  blobClient;
447
+ validatorClient;
448
+ keyStoreManager;
449
+ debugLogStore;
444
450
  static{
445
451
  ({ e: [_initProto] } = _apply_decs_2203_r(this, [
446
452
  [
@@ -451,10 +457,11 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
451
457
  ], []));
452
458
  }
453
459
  metrics;
460
+ initialHeaderHashPromise;
454
461
  // Prevent two snapshot operations to happen simultaneously
455
462
  isUploadingSnapshot;
456
463
  tracer;
457
- constructor(config, p2pClient, blockSource, logsSource, contractDataSource, l1ToL2MessageSource, worldStateSynchronizer, sequencer, slasherClient, validatorsSentinel, epochPruneWatcher, l1ChainId, version, globalVariableBuilder, epochCache, packageVersion, proofVerifier, telemetry = getTelemetryClient(), log = createLogger('node'), blobClient){
464
+ constructor(config, p2pClient, blockSource, logsSource, contractDataSource, l1ToL2MessageSource, worldStateSynchronizer, sequencer, proverNode, slasherClient, validatorsSentinel, epochPruneWatcher, l1ChainId, version, globalVariableBuilder, epochCache, packageVersion, proofVerifier, telemetry = getTelemetryClient(), log = createLogger('node'), blobClient, validatorClient, keyStoreManager, debugLogStore = new NullDebugLogStore()){
458
465
  this.config = config;
459
466
  this.p2pClient = p2pClient;
460
467
  this.blockSource = blockSource;
@@ -463,6 +470,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
463
470
  this.l1ToL2MessageSource = l1ToL2MessageSource;
464
471
  this.worldStateSynchronizer = worldStateSynchronizer;
465
472
  this.sequencer = sequencer;
473
+ this.proverNode = proverNode;
466
474
  this.slasherClient = slasherClient;
467
475
  this.validatorsSentinel = validatorsSentinel;
468
476
  this.epochPruneWatcher = epochPruneWatcher;
@@ -475,11 +483,21 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
475
483
  this.telemetry = telemetry;
476
484
  this.log = log;
477
485
  this.blobClient = blobClient;
478
- this.isUploadingSnapshot = (_initProto(this), false);
486
+ this.validatorClient = validatorClient;
487
+ this.keyStoreManager = keyStoreManager;
488
+ this.debugLogStore = debugLogStore;
489
+ this.initialHeaderHashPromise = (_initProto(this), undefined);
490
+ this.isUploadingSnapshot = false;
479
491
  this.metrics = new NodeMetrics(telemetry, 'AztecNodeService');
480
492
  this.tracer = telemetry.getTracer('AztecNodeService');
481
493
  this.log.info(`Aztec Node version: ${this.packageVersion}`);
482
494
  this.log.info(`Aztec Node started on chain 0x${l1ChainId.toString(16)}`, config.l1Contracts);
495
+ // A defensive check that protects us against introducing a bug in the complex `createAndSync` function. We must
496
+ // never have debugLogStore enabled when not in test mode because then we would be accumulating debug logs in
497
+ // memory which could be a DoS vector on the sequencer (since no fees are paid for debug logs).
498
+ if (debugLogStore.isEnabled && config.realProofs) {
499
+ throw new Error('debugLogStore should never be enabled when realProofs are set');
500
+ }
483
501
  }
484
502
  async getWorldStateSyncStatus() {
485
503
  const status = await this.worldStateSynchronizer.status();
@@ -501,16 +519,27 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
501
519
  const telemetry = deps.telemetry ?? getTelemetryClient();
502
520
  const dateProvider = deps.dateProvider ?? new DateProvider();
503
521
  const ethereumChain = createEthereumChain(config.l1RpcUrls, config.l1ChainId);
504
- // Build a key store from file if given or from environment otherwise
522
+ // Build a key store from file if given or from environment otherwise.
523
+ // We keep the raw KeyStore available so we can merge with prover keys if enableProverNode is set.
505
524
  let keyStoreManager;
506
525
  const keyStoreProvided = config.keyStoreDirectory !== undefined && config.keyStoreDirectory.length > 0;
507
526
  if (keyStoreProvided) {
508
527
  const keyStores = loadKeystores(config.keyStoreDirectory);
509
528
  keyStoreManager = new KeystoreManager(mergeKeystores(keyStores));
510
529
  } else {
511
- const keyStore = createKeyStoreForValidator(config);
512
- if (keyStore) {
513
- keyStoreManager = new KeystoreManager(keyStore);
530
+ const rawKeyStores = [];
531
+ const validatorKeyStore = createKeyStoreForValidator(config);
532
+ if (validatorKeyStore) {
533
+ rawKeyStores.push(validatorKeyStore);
534
+ }
535
+ if (config.enableProverNode) {
536
+ const proverKeyStore = createKeyStoreForProver(config);
537
+ if (proverKeyStore) {
538
+ rawKeyStores.push(proverKeyStore);
539
+ }
540
+ }
541
+ if (rawKeyStores.length > 0) {
542
+ keyStoreManager = new KeystoreManager(rawKeyStores.length === 1 ? rawKeyStores[0] : mergeKeystores(rawKeyStores));
514
543
  }
515
544
  }
516
545
  await keyStoreManager?.validateSigners();
@@ -519,8 +548,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
519
548
  if (keyStoreManager === undefined) {
520
549
  throw new Error('Failed to create key store, a requirement for running a validator');
521
550
  }
522
- if (!keyStoreProvided) {
523
- log.warn('KEY STORE CREATED FROM ENVIRONMENT, IT IS RECOMMENDED TO USE A FILE-BASED KEY STORE IN PRODUCTION ENVIRONMENTS');
551
+ if (!keyStoreProvided && process.env.NODE_ENV !== 'test') {
552
+ log.warn("Keystore created from env: it's recommended to use a file-based key store for production");
524
553
  }
525
554
  ValidatorClient.validateKeyStoreConfiguration(keyStoreManager, log);
526
555
  }
@@ -551,7 +580,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
551
580
  if (config.rollupVersion !== Number(rollupVersionFromRollup)) {
552
581
  log.warn(`Registry looked up and returned a rollup with version (${config.rollupVersion}), but this does not match with version detected from the rollup directly: (${rollupVersionFromRollup}).`);
553
582
  }
554
- const blobClient = await createBlobClientWithFileStores(config, createLogger('node:blob-client:client'));
583
+ const blobClient = await createBlobClientWithFileStores(config, log.createChild('blob-client'));
555
584
  // attempt snapshot sync if possible
556
585
  await trySnapshotSync(config, log);
557
586
  const epochCache = await EpochCache.create(config.l1Contracts.rollupAddress, config, {
@@ -568,83 +597,92 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
568
597
  // now create the merkle trees and the world state synchronizer
569
598
  const worldStateSynchronizer = await createWorldStateSynchronizer(config, archiver, options.prefilledPublicData, telemetry);
570
599
  const circuitVerifier = config.realProofs || config.debugForceTxProofVerification ? await BBCircuitVerifier.new(config) : new TestCircuitVerifier(config.proverTestVerificationDelayMs);
600
+ let debugLogStore;
571
601
  if (!config.realProofs) {
572
602
  log.warn(`Aztec node is accepting fake proofs`);
603
+ debugLogStore = new InMemoryDebugLogStore();
604
+ log.info('Aztec node started in test mode (realProofs set to false) hence debug logs from public functions will be collected and served');
605
+ } else {
606
+ debugLogStore = new NullDebugLogStore();
573
607
  }
574
608
  const proofVerifier = new QueuedIVCVerifier(config, circuitVerifier);
609
+ const proverOnly = config.enableProverNode && config.disableValidator;
610
+ if (proverOnly) {
611
+ log.info('Starting in prover-only mode: skipping validator, sequencer, sentinel, and slasher subsystems');
612
+ }
575
613
  // create the tx pool and the p2p client, which will need the l2 block source
576
- const p2pClient = await createP2PClient(P2PClientType.Full, config, archiver, proofVerifier, worldStateSynchronizer, epochCache, packageVersion, dateProvider, telemetry, deps.p2pClientDeps);
614
+ const p2pClient = await createP2PClient(config, archiver, proofVerifier, worldStateSynchronizer, epochCache, packageVersion, dateProvider, telemetry, deps.p2pClientDeps);
577
615
  // We should really not be modifying the config object
578
616
  config.txPublicSetupAllowList = config.txPublicSetupAllowList ?? await getDefaultAllowedSetupFunctions();
579
- // Create BlockBuilder for EpochPruneWatcher (slasher functionality)
580
- const blockBuilder = new BlockBuilder({
581
- ...config,
582
- l1GenesisTime,
583
- slotDuration: Number(slotDuration)
584
- }, worldStateSynchronizer, archiver, dateProvider, telemetry);
585
- // Create FullNodeCheckpointsBuilder for validator and non-validator block proposal handling
617
+ // We'll accumulate sentinel watchers here
618
+ const watchers = [];
619
+ // Create FullNodeCheckpointsBuilder for block proposal handling and tx validation
586
620
  const validatorCheckpointsBuilder = new FullNodeCheckpointsBuilder({
587
621
  ...config,
588
622
  l1GenesisTime,
589
623
  slotDuration: Number(slotDuration)
590
- }, archiver, dateProvider, telemetry);
591
- // We'll accumulate sentinel watchers here
592
- const watchers = [];
593
- // Create validator client if required
594
- const validatorClient = createValidatorClient(config, {
595
- checkpointsBuilder: validatorCheckpointsBuilder,
596
- worldState: worldStateSynchronizer,
597
- p2pClient,
598
- telemetry,
599
- dateProvider,
600
- epochCache,
601
- blockSource: archiver,
602
- l1ToL2MessageSource: archiver,
603
- keyStoreManager,
604
- blobClient
605
- });
606
- // If we have a validator client, register it as a source of offenses for the slasher,
607
- // and have it register callbacks on the p2p client *before* we start it, otherwise messages
608
- // like attestations or auths will fail.
609
- if (validatorClient) {
610
- watchers.push(validatorClient);
611
- if (!options.dontStartSequencer) {
612
- await validatorClient.registerHandlers();
613
- }
614
- }
615
- // If there's no validator client but alwaysReexecuteBlockProposals is enabled,
616
- // create a BlockProposalHandler to reexecute block proposals for monitoring
617
- if (!validatorClient && config.alwaysReexecuteBlockProposals) {
618
- log.info('Setting up block proposal reexecution for monitoring');
619
- createBlockProposalHandler(config, {
624
+ }, worldStateSynchronizer, archiver, dateProvider, telemetry);
625
+ let validatorClient;
626
+ if (!proverOnly) {
627
+ // Create validator client if required
628
+ validatorClient = await createValidatorClient(config, {
620
629
  checkpointsBuilder: validatorCheckpointsBuilder,
621
630
  worldState: worldStateSynchronizer,
631
+ p2pClient,
632
+ telemetry,
633
+ dateProvider,
622
634
  epochCache,
623
635
  blockSource: archiver,
624
636
  l1ToL2MessageSource: archiver,
625
- p2pClient,
626
- dateProvider,
627
- telemetry
628
- }).registerForReexecution(p2pClient);
637
+ keyStoreManager,
638
+ blobClient
639
+ });
640
+ // If we have a validator client, register it as a source of offenses for the slasher,
641
+ // and have it register callbacks on the p2p client *before* we start it, otherwise messages
642
+ // like attestations or auths will fail.
643
+ if (validatorClient) {
644
+ watchers.push(validatorClient);
645
+ if (!options.dontStartSequencer) {
646
+ await validatorClient.registerHandlers();
647
+ }
648
+ }
649
+ // If there's no validator client but alwaysReexecuteBlockProposals is enabled,
650
+ // create a BlockProposalHandler to reexecute block proposals for monitoring
651
+ if (!validatorClient && config.alwaysReexecuteBlockProposals) {
652
+ log.info('Setting up block proposal reexecution for monitoring');
653
+ createBlockProposalHandler(config, {
654
+ checkpointsBuilder: validatorCheckpointsBuilder,
655
+ worldState: worldStateSynchronizer,
656
+ epochCache,
657
+ blockSource: archiver,
658
+ l1ToL2MessageSource: archiver,
659
+ p2pClient,
660
+ dateProvider,
661
+ telemetry
662
+ }).registerForReexecution(p2pClient);
663
+ }
629
664
  }
630
665
  // Start world state and wait for it to sync to the archiver.
631
666
  await worldStateSynchronizer.start();
632
667
  // Start p2p. Note that it depends on world state to be running.
633
668
  await p2pClient.start();
634
- const validatorsSentinel = await createSentinel(epochCache, archiver, p2pClient, config);
635
- if (validatorsSentinel && config.slashInactivityPenalty > 0n) {
636
- watchers.push(validatorsSentinel);
637
- }
669
+ let validatorsSentinel;
638
670
  let epochPruneWatcher;
639
- if (config.slashPrunePenalty > 0n || config.slashDataWithholdingPenalty > 0n) {
640
- epochPruneWatcher = new EpochPruneWatcher(archiver, archiver, epochCache, p2pClient.getTxProvider(), blockBuilder, config);
641
- watchers.push(epochPruneWatcher);
642
- }
643
- // We assume we want to slash for invalid attestations unless all max penalties are set to 0
644
671
  let attestationsBlockWatcher;
645
- if (config.slashProposeInvalidAttestationsPenalty > 0n || config.slashAttestDescendantOfInvalidPenalty > 0n) {
646
- attestationsBlockWatcher = new AttestationsBlockWatcher(archiver, epochCache, config);
647
- watchers.push(attestationsBlockWatcher);
672
+ if (!proverOnly) {
673
+ validatorsSentinel = await createSentinel(epochCache, archiver, p2pClient, config);
674
+ if (validatorsSentinel && config.slashInactivityPenalty > 0n) {
675
+ watchers.push(validatorsSentinel);
676
+ }
677
+ if (config.slashPrunePenalty > 0n || config.slashDataWithholdingPenalty > 0n) {
678
+ epochPruneWatcher = new EpochPruneWatcher(archiver, archiver, epochCache, p2pClient.getTxProvider(), validatorCheckpointsBuilder, config);
679
+ watchers.push(epochPruneWatcher);
680
+ }
681
+ // We assume we want to slash for invalid attestations unless all max penalties are set to 0
682
+ if (config.slashProposeInvalidAttestationsPenalty > 0n || config.slashAttestDescendantOfInvalidPenalty > 0n) {
683
+ attestationsBlockWatcher = new AttestationsBlockWatcher(archiver, epochCache, config);
684
+ watchers.push(attestationsBlockWatcher);
685
+ }
648
686
  }
649
687
  // Start p2p-related services once the archiver has completed sync
650
688
  void archiver.waitForInitialSync().then(async ()=>{
@@ -663,27 +701,29 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
663
701
  const validatorAddresses = keyStoreManager ? NodeKeystoreAdapter.fromKeyStoreManager(keyStoreManager).getAddresses() : [];
664
702
  slasherClient = await createSlasher(config, config.l1Contracts, getPublicClient(config), watchers, dateProvider, epochCache, validatorAddresses, undefined);
665
703
  await slasherClient.start();
666
- const l1TxUtils = config.publisherForwarderAddress ? await createForwarderL1TxUtilsFromEthSigner(publicClient, keyStoreManager.createAllValidatorPublisherSigners(), config.publisherForwarderAddress, {
704
+ const l1TxUtils = config.sequencerPublisherForwarderAddress ? await createForwarderL1TxUtilsFromSigners(publicClient, keyStoreManager.createAllValidatorPublisherSigners(), config.sequencerPublisherForwarderAddress, {
667
705
  ...config,
668
706
  scope: 'sequencer'
669
707
  }, {
670
708
  telemetry,
671
709
  logger: log.createChild('l1-tx-utils'),
672
- dateProvider
673
- }) : await createL1TxUtilsWithBlobsFromEthSigner(publicClient, keyStoreManager.createAllValidatorPublisherSigners(), {
710
+ dateProvider,
711
+ kzg: Blob.getViemKzgInstance()
712
+ }) : await createL1TxUtilsFromSigners(publicClient, keyStoreManager.createAllValidatorPublisherSigners(), {
674
713
  ...config,
675
714
  scope: 'sequencer'
676
715
  }, {
677
716
  telemetry,
678
717
  logger: log.createChild('l1-tx-utils'),
679
- dateProvider
718
+ dateProvider,
719
+ kzg: Blob.getViemKzgInstance()
680
720
  });
681
721
  // Create and start the sequencer client
682
722
  const checkpointsBuilder = new CheckpointsBuilder({
683
723
  ...config,
684
724
  l1GenesisTime,
685
725
  slotDuration: Number(slotDuration)
686
- }, archiver, dateProvider, telemetry);
726
+ }, worldStateSynchronizer, archiver, dateProvider, telemetry, debugLogStore);
687
727
  sequencer = await SequencerClient.new(config, {
688
728
  ...deps,
689
729
  epochCache,
@@ -707,13 +747,35 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
707
747
  } else if (sequencer) {
708
748
  log.warn(`Sequencer created but not started`);
709
749
  }
750
+ // Create prover node subsystem if enabled
751
+ let proverNode;
752
+ if (config.enableProverNode) {
753
+ proverNode = await createProverNode(config, {
754
+ ...deps.proverNodeDeps,
755
+ telemetry,
756
+ dateProvider,
757
+ archiver,
758
+ worldStateSynchronizer,
759
+ p2pClient,
760
+ epochCache,
761
+ blobClient,
762
+ keyStoreManager
763
+ });
764
+ if (!options.dontStartProverNode) {
765
+ await proverNode.start();
766
+ log.info(`Prover node subsystem started`);
767
+ } else {
768
+ log.info(`Prover node subsystem created but not started`);
769
+ }
770
+ }
710
771
  const globalVariableBuilder = new GlobalVariableBuilder({
711
772
  ...config,
712
773
  rollupVersion: BigInt(config.rollupVersion),
713
774
  l1GenesisTime,
714
775
  slotDuration: Number(slotDuration)
715
776
  });
716
- return new AztecNodeService(config, p2pClient, archiver, archiver, archiver, archiver, worldStateSynchronizer, sequencer, slasherClient, validatorsSentinel, epochPruneWatcher, ethereumChain.chainInfo.id, config.rollupVersion, globalVariableBuilder, epochCache, packageVersion, proofVerifier, telemetry, log, blobClient);
777
+ const node = new AztecNodeService(config, p2pClient, archiver, archiver, archiver, archiver, worldStateSynchronizer, sequencer, proverNode, slasherClient, validatorsSentinel, epochPruneWatcher, ethereumChain.chainInfo.id, config.rollupVersion, globalVariableBuilder, epochCache, packageVersion, proofVerifier, telemetry, log, blobClient, validatorClient, keyStoreManager, debugLogStore);
778
+ return node;
717
779
  }
718
780
  /**
719
781
  * Returns the sequencer client instance.
@@ -721,6 +783,9 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
721
783
  */ getSequencer() {
722
784
  return this.sequencer;
723
785
  }
786
+ /** Returns the prover node subsystem, if enabled. */ getProverNode() {
787
+ return this.proverNode;
788
+ }
724
789
  getBlockSource() {
725
790
  return this.blockSource;
726
791
  }
@@ -763,33 +828,46 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
763
828
  rollupVersion,
764
829
  enr,
765
830
  l1ContractAddresses: contractAddresses,
766
- protocolContractAddresses: protocolContractAddresses
831
+ protocolContractAddresses: protocolContractAddresses,
832
+ realProofs: !!this.config.realProofs
767
833
  };
768
834
  return nodeInfo;
769
835
  }
770
836
  /**
771
- * Get a block specified by its number.
772
- * @param number - The block number being requested.
837
+ * Get a block specified by its block number, block hash, or 'latest'.
838
+ * @param block - The block parameter (block number, block hash, or 'latest').
773
839
  * @returns The requested block.
774
- */ async getBlock(number) {
775
- const blockNumber = number === 'latest' ? await this.getBlockNumber() : number;
776
- return await this.blockSource.getBlock(blockNumber);
840
+ */ async getBlock(block) {
841
+ if (BlockHash.isBlockHash(block)) {
842
+ return this.getBlockByHash(block);
843
+ }
844
+ const blockNumber = block === 'latest' ? await this.getBlockNumber() : block;
845
+ if (blockNumber === BlockNumber.ZERO) {
846
+ return this.buildInitialBlock();
847
+ }
848
+ return await this.blockSource.getL2Block(blockNumber);
777
849
  }
778
850
  /**
779
851
  * Get a block specified by its hash.
780
852
  * @param blockHash - The block hash being requested.
781
853
  * @returns The requested block.
782
854
  */ async getBlockByHash(blockHash) {
783
- const publishedBlock = await this.blockSource.getPublishedBlockByHash(blockHash);
784
- return publishedBlock?.block;
855
+ const initialBlockHash = await this.#getInitialHeaderHash();
856
+ if (blockHash.equals(initialBlockHash)) {
857
+ return this.buildInitialBlock();
858
+ }
859
+ return await this.blockSource.getL2BlockByHash(blockHash);
860
+ }
861
+ buildInitialBlock() {
862
+ const initialHeader = this.worldStateSynchronizer.getCommitted().getInitialHeader();
863
+ return L2Block.empty(initialHeader);
785
864
  }
786
865
  /**
787
866
  * Get a block specified by its archive root.
788
867
  * @param archive - The archive root being requested.
789
868
  * @returns The requested block.
790
869
  */ async getBlockByArchive(archive) {
791
- const publishedBlock = await this.blockSource.getPublishedBlockByArchive(archive);
792
- return publishedBlock?.block;
870
+ return await this.blockSource.getL2BlockByArchive(archive);
793
871
  }
794
872
  /**
795
873
  * Method to request blocks. Will attempt to return all requested blocks but will return only those available.
@@ -797,19 +875,13 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
797
875
  * @param limit - The maximum number of blocks to obtain.
798
876
  * @returns The blocks requested.
799
877
  */ async getBlocks(from, limit) {
800
- return await this.blockSource.getBlocks(from, limit) ?? [];
801
- }
802
- async getPublishedBlocks(from, limit) {
803
- return await this.blockSource.getPublishedBlocks(from, limit) ?? [];
804
- }
805
- async getPublishedCheckpoints(from, limit) {
806
- return await this.blockSource.getPublishedCheckpoints(from, limit) ?? [];
878
+ return await this.blockSource.getBlocks(from, BlockNumber(limit)) ?? [];
807
879
  }
808
- async getL2BlocksNew(from, limit) {
809
- return await this.blockSource.getL2BlocksNew(from, limit) ?? [];
880
+ async getCheckpoints(from, limit) {
881
+ return await this.blockSource.getCheckpoints(from, limit) ?? [];
810
882
  }
811
- async getCheckpointedBlocks(from, limit, proven) {
812
- return await this.blockSource.getCheckpointedBlocks(from, limit, proven) ?? [];
883
+ async getCheckpointedBlocks(from, limit) {
884
+ return await this.blockSource.getCheckpointedBlocks(from, limit) ?? [];
813
885
  }
814
886
  /**
815
887
  * Method to fetch the current min L2 fees.
@@ -835,6 +907,9 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
835
907
  async getProvenBlockNumber() {
836
908
  return await this.blockSource.getProvenBlockNumber();
837
909
  }
910
+ async getCheckpointedBlockNumber() {
911
+ return await this.blockSource.getCheckpointedL2BlockNumber();
912
+ }
838
913
  /**
839
914
  * Method to fetch the version of the package.
840
915
  * @returns The node package version
@@ -859,11 +934,29 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
859
934
  getContract(address) {
860
935
  return this.contractDataSource.getContract(address);
861
936
  }
862
- getPrivateLogsByTags(tags) {
863
- return this.logsSource.getPrivateLogsByTags(tags);
864
- }
865
- getPublicLogsByTagsFromContract(contractAddress, tags) {
866
- return this.logsSource.getPublicLogsByTagsFromContract(contractAddress, tags);
937
+ async getPrivateLogsByTags(tags, page, referenceBlock) {
938
+ if (referenceBlock) {
939
+ const initialBlockHash = await this.#getInitialHeaderHash();
940
+ if (!referenceBlock.equals(initialBlockHash)) {
941
+ const header = await this.blockSource.getBlockHeaderByHash(referenceBlock);
942
+ if (!header) {
943
+ throw new Error(`Block ${referenceBlock.toString()} not found in the node. This might indicate a reorg has occurred.`);
944
+ }
945
+ }
946
+ }
947
+ return this.logsSource.getPrivateLogsByTags(tags, page);
948
+ }
949
+ async getPublicLogsByTagsFromContract(contractAddress, tags, page, referenceBlock) {
950
+ if (referenceBlock) {
951
+ const initialBlockHash = await this.#getInitialHeaderHash();
952
+ if (!referenceBlock.equals(initialBlockHash)) {
953
+ const header = await this.blockSource.getBlockHeaderByHash(referenceBlock);
954
+ if (!header) {
955
+ throw new Error(`Block ${referenceBlock.toString()} not found in the node. This might indicate a reorg has occurred.`);
956
+ }
957
+ }
958
+ }
959
+ return this.logsSource.getPublicLogsByTagsFromContract(contractAddress, tags, page);
867
960
  }
868
961
  /**
869
962
  * Gets public logs based on the provided filter.
@@ -898,24 +991,33 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
898
991
  throw new Error(`Invalid tx: ${reason}`);
899
992
  }
900
993
  await this.p2pClient.sendTx(tx);
901
- this.metrics.receivedTx(timer.ms(), true);
902
- this.log.info(`Received tx ${txHash}`, {
994
+ const duration = timer.ms();
995
+ this.metrics.receivedTx(duration, true);
996
+ this.log.info(`Received tx ${txHash} in ${duration}ms`, {
903
997
  txHash
904
998
  });
905
999
  }
906
1000
  async getTxReceipt(txHash) {
907
- let txReceipt = new TxReceipt(txHash, TxStatus.DROPPED, 'Tx dropped by P2P node.');
908
- // We first check if the tx is in pending (instead of first checking if it is mined) because if we first check
909
- // for mined and then for pending there could be a race condition where the tx is mined between the two checks
910
- // and we would incorrectly return a TxReceipt with status DROPPED
911
- if (await this.p2pClient.getTxStatus(txHash) === 'pending') {
912
- txReceipt = new TxReceipt(txHash, TxStatus.PENDING, '');
913
- }
1001
+ // Check the tx pool status first. If the tx is known to the pool (pending or mined), we'll use that
1002
+ // as a fallback if we don't find a settled receipt in the archiver.
1003
+ const txPoolStatus = await this.p2pClient.getTxStatus(txHash);
1004
+ const isKnownToPool = txPoolStatus === 'pending' || txPoolStatus === 'mined';
1005
+ // Then get the actual tx from the archiver, which tracks every tx in a mined block.
914
1006
  const settledTxReceipt = await this.blockSource.getSettledTxReceipt(txHash);
1007
+ let receipt;
915
1008
  if (settledTxReceipt) {
916
- txReceipt = settledTxReceipt;
1009
+ receipt = settledTxReceipt;
1010
+ } else if (isKnownToPool) {
1011
+ // If the tx is in the pool but not in the archiver, it's pending.
1012
+ // This handles race conditions between archiver and p2p, where the archiver
1013
+ // has pruned the block in which a tx was mined, but p2p has not caught up yet.
1014
+ receipt = new TxReceipt(txHash, TxStatus.PENDING, undefined, undefined);
1015
+ } else {
1016
+ // Otherwise, if we don't know the tx, we consider it dropped.
1017
+ receipt = new TxReceipt(txHash, TxStatus.DROPPED, undefined, 'Tx dropped by P2P node');
917
1018
  }
918
- return txReceipt;
1019
+ this.debugLogStore.decorateReceiptWithLogs(txHash.toString(), receipt);
1020
+ return receipt;
919
1021
  }
920
1022
  getTxEffect(txHash) {
921
1023
  return this.blockSource.getTxEffect(txHash);
@@ -929,6 +1031,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
929
1031
  await tryStop(this.slasherClient);
930
1032
  await tryStop(this.proofVerifier);
931
1033
  await tryStop(this.sequencer);
1034
+ await tryStop(this.proverNode);
932
1035
  await tryStop(this.p2pClient);
933
1036
  await tryStop(this.worldStateSynchronizer);
934
1037
  await tryStop(this.blockSource);
@@ -967,15 +1070,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
967
1070
  */ async getTxsByHash(txHashes) {
968
1071
  return compactArray(await Promise.all(txHashes.map((txHash)=>this.getTxByHash(txHash))));
969
1072
  }
970
- /**
971
- * Find the indexes of the given leaves in the given tree along with a block metadata pointing to the block in which
972
- * the leaves were inserted.
973
- * @param blockNumber - The block number at which to get the data or 'latest' for latest data.
974
- * @param treeId - The tree to search in.
975
- * @param leafValues - The values to search for.
976
- * @returns The indices of leaves and the block metadata of a block in which the leaves were inserted.
977
- */ async findLeavesIndexes(blockNumber, treeId, leafValues) {
978
- const committedDb = await this.#getWorldState(blockNumber);
1073
+ async findLeavesIndexes(referenceBlock, treeId, leafValues) {
1074
+ const committedDb = await this.#getWorldState(referenceBlock);
979
1075
  const maybeIndices = await committedDb.findLeafIndices(treeId, leafValues.map((x)=>x.toBuffer()));
980
1076
  // We filter out undefined values
981
1077
  const indices = maybeIndices.filter((x)=>x !== undefined);
@@ -1018,50 +1114,27 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
1018
1114
  }
1019
1115
  return {
1020
1116
  l2BlockNumber: BlockNumber(Number(blockNumber)),
1021
- l2BlockHash: L2BlockHash.fromField(blockHash),
1117
+ l2BlockHash: new BlockHash(blockHash),
1022
1118
  data: index
1023
1119
  };
1024
1120
  });
1025
1121
  }
1026
- /**
1027
- * Returns a sibling path for the given index in the nullifier tree.
1028
- * @param blockNumber - The block number at which to get the data.
1029
- * @param leafIndex - The index of the leaf for which the sibling path is required.
1030
- * @returns The sibling path for the leaf index.
1031
- */ async getNullifierSiblingPath(blockNumber, leafIndex) {
1032
- const committedDb = await this.#getWorldState(blockNumber);
1033
- return committedDb.getSiblingPath(MerkleTreeId.NULLIFIER_TREE, leafIndex);
1034
- }
1035
- /**
1036
- * Returns a sibling path for the given index in the data tree.
1037
- * @param blockNumber - The block number at which to get the data.
1038
- * @param leafIndex - The index of the leaf for which the sibling path is required.
1039
- * @returns The sibling path for the leaf index.
1040
- */ async getNoteHashSiblingPath(blockNumber, leafIndex) {
1041
- const committedDb = await this.#getWorldState(blockNumber);
1042
- return committedDb.getSiblingPath(MerkleTreeId.NOTE_HASH_TREE, leafIndex);
1043
- }
1044
- async getArchiveMembershipWitness(blockNumber, archive) {
1045
- const committedDb = await this.#getWorldState(blockNumber);
1122
+ async getBlockHashMembershipWitness(referenceBlock, blockHash) {
1123
+ const committedDb = await this.#getWorldState(referenceBlock);
1046
1124
  const [pathAndIndex] = await committedDb.findSiblingPaths(MerkleTreeId.ARCHIVE, [
1047
- archive
1125
+ blockHash
1048
1126
  ]);
1049
1127
  return pathAndIndex === undefined ? undefined : MembershipWitness.fromSiblingPath(pathAndIndex.index, pathAndIndex.path);
1050
1128
  }
1051
- async getNoteHashMembershipWitness(blockNumber, noteHash) {
1052
- const committedDb = await this.#getWorldState(blockNumber);
1129
+ async getNoteHashMembershipWitness(referenceBlock, noteHash) {
1130
+ const committedDb = await this.#getWorldState(referenceBlock);
1053
1131
  const [pathAndIndex] = await committedDb.findSiblingPaths(MerkleTreeId.NOTE_HASH_TREE, [
1054
1132
  noteHash
1055
1133
  ]);
1056
1134
  return pathAndIndex === undefined ? undefined : MembershipWitness.fromSiblingPath(pathAndIndex.index, pathAndIndex.path);
1057
1135
  }
1058
- /**
1059
- * Returns the index and a sibling path for a leaf in the committed l1 to l2 data tree.
1060
- * @param blockNumber - The block number at which to get the data.
1061
- * @param l1ToL2Message - The l1ToL2Message to get the index / sibling path for.
1062
- * @returns A tuple of the index and the sibling path of the L1ToL2Message (undefined if not found).
1063
- */ async getL1ToL2MessageMembershipWitness(blockNumber, l1ToL2Message) {
1064
- const db = await this.#getWorldState(blockNumber);
1136
+ async getL1ToL2MessageMembershipWitness(referenceBlock, l1ToL2Message) {
1137
+ const db = await this.#getWorldState(referenceBlock);
1065
1138
  const [witness] = await db.findSiblingPaths(MerkleTreeId.L1_TO_L2_MESSAGE_TREE, [
1066
1139
  l1ToL2Message
1067
1140
  ]);
@@ -1091,12 +1164,13 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
1091
1164
  * @param epoch - The epoch at which to get the data.
1092
1165
  * @returns The L2 to L1 messages (empty array if the epoch is not found).
1093
1166
  */ async getL2ToL1Messages(epoch) {
1094
- // Assumes `getBlocksForEpoch` returns blocks in ascending order of block number.
1095
- const blocks = await this.blockSource.getBlocksForEpoch(epoch);
1167
+ // Assumes `getCheckpointedBlocksForEpoch` returns blocks in ascending order of block number.
1168
+ const checkpointedBlocks = await this.blockSource.getCheckpointedBlocksForEpoch(epoch);
1096
1169
  const blocksInCheckpoints = [];
1097
1170
  let previousSlotNumber = SlotNumber.ZERO;
1098
1171
  let checkpointIndex = -1;
1099
- for (const block of blocks){
1172
+ for (const checkpointedBlock of checkpointedBlocks){
1173
+ const block = checkpointedBlock.block;
1100
1174
  const slotNumber = block.header.globalVariables.slotNumber;
1101
1175
  if (slotNumber !== previousSlotNumber) {
1102
1176
  checkpointIndex++;
@@ -1107,31 +1181,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
1107
1181
  }
1108
1182
  return blocksInCheckpoints.map((blocks)=>blocks.map((block)=>block.body.txEffects.map((txEffect)=>txEffect.l2ToL1Msgs)));
1109
1183
  }
1110
- /**
1111
- * Returns a sibling path for a leaf in the committed blocks tree.
1112
- * @param blockNumber - The block number at which to get the data.
1113
- * @param leafIndex - Index of the leaf in the tree.
1114
- * @returns The sibling path.
1115
- */ async getArchiveSiblingPath(blockNumber, leafIndex) {
1116
- const committedDb = await this.#getWorldState(blockNumber);
1117
- return committedDb.getSiblingPath(MerkleTreeId.ARCHIVE, leafIndex);
1118
- }
1119
- /**
1120
- * Returns a sibling path for a leaf in the committed public data tree.
1121
- * @param blockNumber - The block number at which to get the data.
1122
- * @param leafIndex - Index of the leaf in the tree.
1123
- * @returns The sibling path.
1124
- */ async getPublicDataSiblingPath(blockNumber, leafIndex) {
1125
- const committedDb = await this.#getWorldState(blockNumber);
1126
- return committedDb.getSiblingPath(MerkleTreeId.PUBLIC_DATA_TREE, leafIndex);
1127
- }
1128
- /**
1129
- * Returns a nullifier membership witness for a given nullifier at a given block.
1130
- * @param blockNumber - The block number at which to get the index.
1131
- * @param nullifier - Nullifier we try to find witness for.
1132
- * @returns The nullifier membership witness (if found).
1133
- */ async getNullifierMembershipWitness(blockNumber, nullifier) {
1134
- const db = await this.#getWorldState(blockNumber);
1184
+ async getNullifierMembershipWitness(referenceBlock, nullifier) {
1185
+ const db = await this.#getWorldState(referenceBlock);
1135
1186
  const [witness] = await db.findSiblingPaths(MerkleTreeId.NULLIFIER_TREE, [
1136
1187
  nullifier.toBuffer()
1137
1188
  ]);
@@ -1147,7 +1198,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
1147
1198
  }
1148
1199
  /**
1149
1200
  * Returns a low nullifier membership witness for a given nullifier at a given block.
1150
- * @param blockNumber - The block number at which to get the index.
1201
+ * @param referenceBlock - The block parameter (block number, block hash, or 'latest') at which to get the data
1202
+ * (which contains the root of the nullifier tree in which we are searching for the nullifier).
1151
1203
  * @param nullifier - Nullifier we try to find the low nullifier witness for.
1152
1204
  * @returns The low nullifier membership witness (if found).
1153
1205
  * @remarks Low nullifier witness can be used to perform a nullifier non-inclusion proof by leveraging the "linked
@@ -1158,8 +1210,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
1158
1210
  * the nullifier already exists in the tree. This is because the `getPreviousValueIndex` function returns the
1159
1211
  * index of the nullifier itself when it already exists in the tree.
1160
1212
  * TODO: This is a confusing behavior and we should eventually address that.
1161
- */ async getLowNullifierMembershipWitness(blockNumber, nullifier) {
1162
- const committedDb = await this.#getWorldState(blockNumber);
1213
+ */ async getLowNullifierMembershipWitness(referenceBlock, nullifier) {
1214
+ const committedDb = await this.#getWorldState(referenceBlock);
1163
1215
  const findResult = await committedDb.getPreviousValueIndex(MerkleTreeId.NULLIFIER_TREE, nullifier.toBigInt());
1164
1216
  if (!findResult) {
1165
1217
  return undefined;
@@ -1172,8 +1224,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
1172
1224
  const siblingPath = await committedDb.getSiblingPath(MerkleTreeId.NULLIFIER_TREE, BigInt(index));
1173
1225
  return new NullifierMembershipWitness(BigInt(index), preimageData, siblingPath);
1174
1226
  }
1175
- async getPublicDataWitness(blockNumber, leafSlot) {
1176
- const committedDb = await this.#getWorldState(blockNumber);
1227
+ async getPublicDataWitness(referenceBlock, leafSlot) {
1228
+ const committedDb = await this.#getWorldState(referenceBlock);
1177
1229
  const lowLeafResult = await committedDb.getPreviousValueIndex(MerkleTreeId.PUBLIC_DATA_TREE, leafSlot.toBigInt());
1178
1230
  if (!lowLeafResult) {
1179
1231
  return undefined;
@@ -1183,18 +1235,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
1183
1235
  return new PublicDataWitness(lowLeafResult.index, preimage, path);
1184
1236
  }
1185
1237
  }
1186
- /**
1187
- * Gets the storage value at the given contract storage slot.
1188
- *
1189
- * @remarks The storage slot here refers to the slot as it is defined in Noir not the index in the merkle tree.
1190
- * Aztec's version of `eth_getStorageAt`.
1191
- *
1192
- * @param contract - Address of the contract to query.
1193
- * @param slot - Slot to query.
1194
- * @param blockNumber - The block number at which to get the data or 'latest'.
1195
- * @returns Storage value at the given contract slot.
1196
- */ async getPublicStorageAt(blockNumber, contract, slot) {
1197
- const committedDb = await this.#getWorldState(blockNumber);
1238
+ async getPublicStorageAt(referenceBlock, contract, slot) {
1239
+ const committedDb = await this.#getWorldState(referenceBlock);
1198
1240
  const leafSlot = await computePublicDataTreeLeafSlot(contract, slot);
1199
1241
  const lowLeafResult = await committedDb.getPreviousValueIndex(MerkleTreeId.PUBLIC_DATA_TREE, leafSlot.toBigInt());
1200
1242
  if (!lowLeafResult || !lowLeafResult.alreadyPresent) {
@@ -1203,18 +1245,22 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
1203
1245
  const preimage = await committedDb.getLeafPreimage(MerkleTreeId.PUBLIC_DATA_TREE, lowLeafResult.index);
1204
1246
  return preimage.leaf.value;
1205
1247
  }
1206
- /**
1207
- * Returns the currently committed block header, or the initial header if no blocks have been produced.
1208
- * @returns The current committed block header.
1209
- */ async getBlockHeader(blockNumber = 'latest') {
1210
- return blockNumber === BlockNumber.ZERO || blockNumber === 'latest' && await this.blockSource.getBlockNumber() === BlockNumber.ZERO ? this.worldStateSynchronizer.getCommitted().getInitialHeader() : this.blockSource.getBlockHeader(blockNumber === 'latest' ? blockNumber : blockNumber);
1211
- }
1212
- /**
1213
- * Get a block header specified by its hash.
1214
- * @param blockHash - The block hash being requested.
1215
- * @returns The requested block header.
1216
- */ async getBlockHeaderByHash(blockHash) {
1217
- return await this.blockSource.getBlockHeaderByHash(blockHash);
1248
+ async getBlockHeader(block = 'latest') {
1249
+ if (BlockHash.isBlockHash(block)) {
1250
+ const initialBlockHash = await this.#getInitialHeaderHash();
1251
+ if (block.equals(initialBlockHash)) {
1252
+ // Block source doesn't handle initial header so we need to handle the case separately.
1253
+ return this.worldStateSynchronizer.getCommitted().getInitialHeader();
1254
+ }
1255
+ return this.blockSource.getBlockHeaderByHash(block);
1256
+ } else {
1257
+ // Block source doesn't handle initial header so we need to handle the case separately.
1258
+ const blockNumber = block === 'latest' ? await this.getBlockNumber() : block;
1259
+ if (blockNumber === BlockNumber.ZERO) {
1260
+ return this.worldStateSynchronizer.getCommitted().getInitialHeader();
1261
+ }
1262
+ return this.blockSource.getBlockHeader(block);
1263
+ }
1218
1264
  }
1219
1265
  /**
1220
1266
  * Get a block header specified by its archive root.
@@ -1223,6 +1269,12 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
1223
1269
  */ async getBlockHeaderByArchive(archive) {
1224
1270
  return await this.blockSource.getBlockHeaderByArchive(archive);
1225
1271
  }
1272
+ getBlockData(number) {
1273
+ return this.blockSource.getBlockData(number);
1274
+ }
1275
+ getBlockDataByArchive(archive) {
1276
+ return this.blockSource.getBlockDataByArchive(archive);
1277
+ }
1226
1278
  /**
1227
1279
  * Simulates the public part of a transaction with the current state.
1228
1280
  * @param tx - The transaction to simulate.
@@ -1235,17 +1287,20 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
1235
1287
  throw new BadRequestError(`Transaction total gas limit ${txGasLimit + teardownGasLimit} (${txGasLimit} + ${teardownGasLimit}) exceeds maximum gas limit ${this.config.rpcSimulatePublicMaxGasLimit} for simulation`);
1236
1288
  }
1237
1289
  const txHash = tx.getTxHash();
1238
- const blockNumber = BlockNumber(await this.blockSource.getBlockNumber() + 1);
1290
+ const latestBlockNumber = await this.blockSource.getBlockNumber();
1291
+ const blockNumber = BlockNumber.add(latestBlockNumber, 1);
1239
1292
  // If sequencer is not initialized, we just set these values to zero for simulation.
1240
1293
  const coinbase = EthAddress.ZERO;
1241
1294
  const feeRecipient = AztecAddress.ZERO;
1242
1295
  const newGlobalVariables = await this.globalVariableBuilder.buildGlobalVariables(blockNumber, coinbase, feeRecipient);
1243
- const publicProcessorFactory = new PublicProcessorFactory(this.contractDataSource, new DateProvider(), this.telemetry);
1296
+ const publicProcessorFactory = new PublicProcessorFactory(this.contractDataSource, new DateProvider(), this.telemetry, this.log.getBindings());
1244
1297
  this.log.verbose(`Simulating public calls for tx ${txHash}`, {
1245
1298
  globalVariables: newGlobalVariables.toInspect(),
1246
1299
  txHash,
1247
1300
  blockNumber
1248
1301
  });
1302
+ // Ensure world-state has caught up with the latest block we loaded from the archiver
1303
+ await this.worldStateSynchronizer.syncImmediate(latestBlockNumber);
1249
1304
  const merkleTreeFork = await this.worldStateSynchronizer.fork();
1250
1305
  try {
1251
1306
  const config = PublicSimulatorConfig.from({
@@ -1260,7 +1315,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
1260
1315
  });
1261
1316
  const processor = publicProcessorFactory.create(merkleTreeFork, newGlobalVariables, config);
1262
1317
  // REFACTOR: Consider merging ProcessReturnValues into ProcessedTx
1263
- const [processedTxs, failedTxs, _usedTxs, returns] = await processor.process([
1318
+ const [processedTxs, failedTxs, _usedTxs, returns, _blobFields, debugLogs] = await processor.process([
1264
1319
  tx
1265
1320
  ]);
1266
1321
  // REFACTOR: Consider returning the error rather than throwing
@@ -1271,7 +1326,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
1271
1326
  throw failedTxs[0].error;
1272
1327
  }
1273
1328
  const [processedTx] = processedTxs;
1274
- return new PublicSimulationOutput(processedTx.revertReason, processedTx.globalVariables, processedTx.txEffect, returns, processedTx.gasUsed);
1329
+ return new PublicSimulationOutput(processedTx.revertReason, processedTx.globalVariables, processedTx.txEffect, returns, processedTx.gasUsed, debugLogs);
1275
1330
  } finally{
1276
1331
  await merkleTreeFork.close();
1277
1332
  }
@@ -1279,10 +1334,10 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
1279
1334
  async isValidTx(tx, { isSimulation, skipFeeEnforcement } = {}) {
1280
1335
  const db = this.worldStateSynchronizer.getCommitted();
1281
1336
  const verifier = isSimulation ? undefined : this.proofVerifier;
1282
- // We accept transactions if they are not expired by the next slot (checked based on the IncludeByTimestamp field)
1337
+ // We accept transactions if they are not expired by the next slot (checked based on the ExpirationTimestamp field)
1283
1338
  const { ts: nextSlotTimestamp } = this.epochCache.getEpochAndSlotInNextL1Slot();
1284
1339
  const blockNumber = BlockNumber(await this.blockSource.getBlockNumber() + 1);
1285
- const validator = createValidatorForAcceptingTxs(db, this.contractDataSource, verifier, {
1340
+ const validator = createTxValidatorForAcceptingTxsOverRPC(db, this.contractDataSource, verifier, {
1286
1341
  timestamp: nextSlotTimestamp,
1287
1342
  blockNumber,
1288
1343
  l1ChainId: this.l1ChainId,
@@ -1291,7 +1346,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
1291
1346
  gasFees: await this.getCurrentMinFees(),
1292
1347
  skipFeeEnforcement,
1293
1348
  txsPermitted: !this.config.disableTransactions
1294
- });
1349
+ }, this.log.getBindings());
1295
1350
  return await validator.validateTx(tx);
1296
1351
  }
1297
1352
  getConfig() {
@@ -1433,14 +1488,84 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
1433
1488
  return this.slasherClient.gatherOffensesForRound(round === 'current' ? undefined : BigInt(round));
1434
1489
  }
1435
1490
  }
1491
+ async reloadKeystore() {
1492
+ if (!this.config.keyStoreDirectory?.length) {
1493
+ throw new BadRequestError('Cannot reload keystore: node is not using a file-based keystore. ' + 'Set KEY_STORE_DIRECTORY to use file-based keystores.');
1494
+ }
1495
+ if (!this.validatorClient) {
1496
+ throw new BadRequestError('Cannot reload keystore: validator is not enabled.');
1497
+ }
1498
+ this.log.info('Reloading keystore from disk');
1499
+ // Re-read and validate keystore files
1500
+ const keyStores = loadKeystores(this.config.keyStoreDirectory);
1501
+ const newManager = new KeystoreManager(mergeKeystores(keyStores));
1502
+ await newManager.validateSigners();
1503
+ ValidatorClient.validateKeyStoreConfiguration(newManager, this.log);
1504
+ // Validate that every validator's publisher keys overlap with the L1 signers
1505
+ // that were initialized at startup. Publishers cannot be hot-reloaded, so a
1506
+ // validator with a publisher key that doesn't match any existing L1 signer
1507
+ // would silently fail on every proposer slot.
1508
+ if (this.keyStoreManager && this.sequencer) {
1509
+ const oldAdapter = NodeKeystoreAdapter.fromKeyStoreManager(this.keyStoreManager);
1510
+ const availablePublishers = new Set(oldAdapter.getAttesterAddresses().flatMap((a)=>oldAdapter.getPublisherAddresses(a).map((p)=>p.toString().toLowerCase())));
1511
+ const newAdapter = NodeKeystoreAdapter.fromKeyStoreManager(newManager);
1512
+ for (const attester of newAdapter.getAttesterAddresses()){
1513
+ const pubs = newAdapter.getPublisherAddresses(attester);
1514
+ if (pubs.length > 0 && !pubs.some((p)=>availablePublishers.has(p.toString().toLowerCase()))) {
1515
+ throw new BadRequestError(`Cannot reload keystore: validator ${attester} has publisher keys ` + `[${pubs.map((p)=>p.toString()).join(', ')}] but none match the L1 signers initialized at startup ` + `[${[
1516
+ ...availablePublishers
1517
+ ].join(', ')}]. Publishers cannot be hot-reloaded — ` + `use an existing publisher key or restart the node.`);
1518
+ }
1519
+ }
1520
+ }
1521
+ // Build adapters for old and new keystores to compute diff
1522
+ const newAdapter = NodeKeystoreAdapter.fromKeyStoreManager(newManager);
1523
+ const newAddresses = newAdapter.getAttesterAddresses();
1524
+ const oldAddresses = this.keyStoreManager ? NodeKeystoreAdapter.fromKeyStoreManager(this.keyStoreManager).getAttesterAddresses() : [];
1525
+ const oldSet = new Set(oldAddresses.map((a)=>a.toString()));
1526
+ const newSet = new Set(newAddresses.map((a)=>a.toString()));
1527
+ const added = newAddresses.filter((a)=>!oldSet.has(a.toString()));
1528
+ const removed = oldAddresses.filter((a)=>!newSet.has(a.toString()));
1529
+ if (added.length > 0) {
1530
+ this.log.info(`Keystore reload: adding attester keys: ${added.map((a)=>a.toString()).join(', ')}`);
1531
+ }
1532
+ if (removed.length > 0) {
1533
+ this.log.info(`Keystore reload: removing attester keys: ${removed.map((a)=>a.toString()).join(', ')}`);
1534
+ }
1535
+ if (added.length === 0 && removed.length === 0) {
1536
+ this.log.info('Keystore reload: attester keys unchanged');
1537
+ }
1538
+ // Update the validator client (coinbase, feeRecipient, attester keys)
1539
+ this.validatorClient.reloadKeystore(newManager);
1540
+ // Update the publisher factory's keystore so newly-added validators
1541
+ // can be matched to existing publisher keys when proposing blocks.
1542
+ if (this.sequencer) {
1543
+ this.sequencer.updatePublisherNodeKeyStore(newAdapter);
1544
+ }
1545
+ // Update slasher's "don't-slash-self" list with new validator addresses
1546
+ if (this.slasherClient && !this.config.slashSelfAllowed) {
1547
+ const slashValidatorsNever = unique([
1548
+ ...this.config.slashValidatorsNever ?? [],
1549
+ ...newAddresses
1550
+ ].map((a)=>a.toString())).map(EthAddress.fromString);
1551
+ this.slasherClient.updateConfig({
1552
+ slashValidatorsNever
1553
+ });
1554
+ }
1555
+ this.keyStoreManager = newManager;
1556
+ this.log.info('Keystore reloaded: coinbase, feeRecipient, and attester keys updated');
1557
+ }
1558
+ #getInitialHeaderHash() {
1559
+ if (!this.initialHeaderHashPromise) {
1560
+ this.initialHeaderHashPromise = this.worldStateSynchronizer.getCommitted().getInitialHeader().hash();
1561
+ }
1562
+ return this.initialHeaderHashPromise;
1563
+ }
1436
1564
  /**
1437
1565
  * Returns an instance of MerkleTreeOperations having first ensured the world state is fully synched
1438
- * @param blockNumber - The block number at which to get the data.
1566
+ * @param block - The block parameter (block number, block hash, or 'latest') at which to get the data.
1439
1567
  * @returns An instance of a committed MerkleTreeOperations
1440
- */ async #getWorldState(blockNumber) {
1441
- if (typeof blockNumber === 'number' && blockNumber < INITIAL_L2_BLOCK_NUM - 1) {
1442
- throw new Error('Invalid block number to get world state for: ' + blockNumber);
1443
- }
1568
+ */ async #getWorldState(block) {
1444
1569
  let blockSyncedTo = BlockNumber.ZERO;
1445
1570
  try {
1446
1571
  // Attempt to sync the world state if necessary
@@ -1448,15 +1573,32 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
1448
1573
  } catch (err) {
1449
1574
  this.log.error(`Error getting world state: ${err}`);
1450
1575
  }
1451
- // using a snapshot could be less efficient than using the committed db
1452
- if (blockNumber === 'latest' /*|| blockNumber === blockSyncedTo*/ ) {
1453
- this.log.debug(`Using committed db for block ${blockNumber}, world state synced upto ${blockSyncedTo}`);
1576
+ if (block === 'latest') {
1577
+ this.log.debug(`Using committed db for block 'latest', world state synced upto ${blockSyncedTo}`);
1454
1578
  return this.worldStateSynchronizer.getCommitted();
1455
- } else if (blockNumber <= blockSyncedTo) {
1579
+ }
1580
+ if (BlockHash.isBlockHash(block)) {
1581
+ const initialBlockHash = await this.#getInitialHeaderHash();
1582
+ if (block.equals(initialBlockHash)) {
1583
+ // Block source doesn't handle initial header so we need to handle the case separately.
1584
+ return this.worldStateSynchronizer.getSnapshot(BlockNumber.ZERO);
1585
+ }
1586
+ const header = await this.blockSource.getBlockHeaderByHash(block);
1587
+ if (!header) {
1588
+ throw new Error(`Block hash ${block.toString()} not found when querying world state. If the node API has been queried with anchor block hash possibly a reorg has occurred.`);
1589
+ }
1590
+ const blockNumber = header.getBlockNumber();
1591
+ this.log.debug(`Using snapshot for block ${blockNumber}, world state synced upto ${blockSyncedTo}`);
1592
+ return this.worldStateSynchronizer.getSnapshot(blockNumber);
1593
+ }
1594
+ // Block number provided
1595
+ {
1596
+ const blockNumber = block;
1597
+ if (blockNumber > blockSyncedTo) {
1598
+ throw new Error(`Queried block ${block} not yet synced by the node (node is synced upto ${blockSyncedTo}).`);
1599
+ }
1456
1600
  this.log.debug(`Using snapshot for block ${blockNumber}, world state synced upto ${blockSyncedTo}`);
1457
1601
  return this.worldStateSynchronizer.getSnapshot(blockNumber);
1458
- } else {
1459
- throw new Error(`Block ${blockNumber} not yet synced`);
1460
1602
  }
1461
1603
  }
1462
1604
  /**