@aztec/aztec-node 0.0.1-commit.6d63667d → 0.0.1-commit.7ac86ea28

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@aztec/aztec-node",
3
- "version": "0.0.1-commit.6d63667d",
3
+ "version": "0.0.1-commit.7ac86ea28",
4
4
  "main": "dest/index.js",
5
5
  "type": "module",
6
6
  "exports": {
@@ -65,30 +65,32 @@
65
65
  ]
66
66
  },
67
67
  "dependencies": {
68
- "@aztec/archiver": "0.0.1-commit.6d63667d",
69
- "@aztec/bb-prover": "0.0.1-commit.6d63667d",
70
- "@aztec/blob-client": "0.0.1-commit.6d63667d",
71
- "@aztec/constants": "0.0.1-commit.6d63667d",
72
- "@aztec/epoch-cache": "0.0.1-commit.6d63667d",
73
- "@aztec/ethereum": "0.0.1-commit.6d63667d",
74
- "@aztec/foundation": "0.0.1-commit.6d63667d",
75
- "@aztec/kv-store": "0.0.1-commit.6d63667d",
76
- "@aztec/l1-artifacts": "0.0.1-commit.6d63667d",
77
- "@aztec/merkle-tree": "0.0.1-commit.6d63667d",
78
- "@aztec/node-keystore": "0.0.1-commit.6d63667d",
79
- "@aztec/node-lib": "0.0.1-commit.6d63667d",
80
- "@aztec/noir-protocol-circuits-types": "0.0.1-commit.6d63667d",
81
- "@aztec/p2p": "0.0.1-commit.6d63667d",
82
- "@aztec/protocol-contracts": "0.0.1-commit.6d63667d",
83
- "@aztec/prover-client": "0.0.1-commit.6d63667d",
84
- "@aztec/sequencer-client": "0.0.1-commit.6d63667d",
85
- "@aztec/simulator": "0.0.1-commit.6d63667d",
86
- "@aztec/slasher": "0.0.1-commit.6d63667d",
87
- "@aztec/stdlib": "0.0.1-commit.6d63667d",
88
- "@aztec/telemetry-client": "0.0.1-commit.6d63667d",
89
- "@aztec/validator-client": "0.0.1-commit.6d63667d",
90
- "@aztec/validator-ha-signer": "0.0.1-commit.6d63667d",
91
- "@aztec/world-state": "0.0.1-commit.6d63667d",
68
+ "@aztec/archiver": "0.0.1-commit.7ac86ea28",
69
+ "@aztec/bb-prover": "0.0.1-commit.7ac86ea28",
70
+ "@aztec/blob-client": "0.0.1-commit.7ac86ea28",
71
+ "@aztec/blob-lib": "0.0.1-commit.7ac86ea28",
72
+ "@aztec/constants": "0.0.1-commit.7ac86ea28",
73
+ "@aztec/epoch-cache": "0.0.1-commit.7ac86ea28",
74
+ "@aztec/ethereum": "0.0.1-commit.7ac86ea28",
75
+ "@aztec/foundation": "0.0.1-commit.7ac86ea28",
76
+ "@aztec/kv-store": "0.0.1-commit.7ac86ea28",
77
+ "@aztec/l1-artifacts": "0.0.1-commit.7ac86ea28",
78
+ "@aztec/merkle-tree": "0.0.1-commit.7ac86ea28",
79
+ "@aztec/node-keystore": "0.0.1-commit.7ac86ea28",
80
+ "@aztec/node-lib": "0.0.1-commit.7ac86ea28",
81
+ "@aztec/noir-protocol-circuits-types": "0.0.1-commit.7ac86ea28",
82
+ "@aztec/p2p": "0.0.1-commit.7ac86ea28",
83
+ "@aztec/protocol-contracts": "0.0.1-commit.7ac86ea28",
84
+ "@aztec/prover-client": "0.0.1-commit.7ac86ea28",
85
+ "@aztec/prover-node": "0.0.1-commit.7ac86ea28",
86
+ "@aztec/sequencer-client": "0.0.1-commit.7ac86ea28",
87
+ "@aztec/simulator": "0.0.1-commit.7ac86ea28",
88
+ "@aztec/slasher": "0.0.1-commit.7ac86ea28",
89
+ "@aztec/stdlib": "0.0.1-commit.7ac86ea28",
90
+ "@aztec/telemetry-client": "0.0.1-commit.7ac86ea28",
91
+ "@aztec/validator-client": "0.0.1-commit.7ac86ea28",
92
+ "@aztec/validator-ha-signer": "0.0.1-commit.7ac86ea28",
93
+ "@aztec/world-state": "0.0.1-commit.7ac86ea28",
92
94
  "koa": "^2.16.1",
93
95
  "koa-router": "^13.1.1",
94
96
  "tslib": "^2.4.0",
@@ -13,9 +13,14 @@ import {
13
13
  import { type SharedNodeConfig, sharedNodeConfigMappings } from '@aztec/node-lib/config';
14
14
  import { type P2PConfig, p2pConfigMappings } from '@aztec/p2p/config';
15
15
  import { type ProverClientUserConfig, proverClientConfigMappings } from '@aztec/prover-client/config';
16
+ import {
17
+ type ProverNodeConfig,
18
+ proverNodeConfigMappings,
19
+ specificProverNodeConfigMappings,
20
+ } from '@aztec/prover-node/config';
16
21
  import {
17
22
  type SequencerClientConfig,
18
- type TxSenderConfig,
23
+ type SequencerTxSenderConfig,
19
24
  sequencerClientConfigMappings,
20
25
  } from '@aztec/sequencer-client/config';
21
26
  import { slasherConfigMappings } from '@aztec/slasher';
@@ -46,16 +51,18 @@ export type AztecNodeConfig = ArchiverConfig &
46
51
  SharedNodeConfig &
47
52
  GenesisStateConfig &
48
53
  NodeRPCConfig &
49
- SlasherConfig & {
54
+ SlasherConfig &
55
+ ProverNodeConfig & {
50
56
  /** L1 contracts addresses */
51
57
  l1Contracts: L1ContractAddresses;
52
58
  /** Whether the validator is disabled for this node */
53
59
  disableValidator: boolean;
54
60
  /** Whether to skip waiting for the archiver to be fully synced before starting other services */
55
61
  skipArchiverInitialSync: boolean;
56
-
57
62
  /** A flag to force verification of tx Chonk proofs. Only used for testnet */
58
63
  debugForceTxProofVerification: boolean;
64
+ /** Whether to enable the prover node as a subsystem. */
65
+ enableProverNode: boolean;
59
66
  };
60
67
 
61
68
  export const aztecNodeConfigMappings: ConfigMappingsType<AztecNodeConfig> = {
@@ -63,6 +70,7 @@ export const aztecNodeConfigMappings: ConfigMappingsType<AztecNodeConfig> = {
63
70
  ...keyStoreConfigMappings,
64
71
  ...archiverConfigMappings,
65
72
  ...sequencerClientConfigMappings,
73
+ ...proverNodeConfigMappings,
66
74
  ...validatorClientConfigMappings,
67
75
  ...proverClientConfigMappings,
68
76
  ...worldStateConfigMappings,
@@ -72,6 +80,7 @@ export const aztecNodeConfigMappings: ConfigMappingsType<AztecNodeConfig> = {
72
80
  ...genesisStateConfigMappings,
73
81
  ...nodeRpcConfigMappings,
74
82
  ...slasherConfigMappings,
83
+ ...specificProverNodeConfigMappings,
75
84
  l1Contracts: {
76
85
  description: 'The deployed L1 contract addresses',
77
86
  nested: l1ContractAddressesMapping,
@@ -91,6 +100,11 @@ export const aztecNodeConfigMappings: ConfigMappingsType<AztecNodeConfig> = {
91
100
  description: 'Whether to skip waiting for the archiver to be fully synced before starting other services.',
92
101
  ...booleanConfigHelper(false),
93
102
  },
103
+ enableProverNode: {
104
+ env: 'ENABLE_PROVER_NODE',
105
+ description: 'Whether to enable the prover node as a subsystem.',
106
+ ...booleanConfigHelper(false),
107
+ },
94
108
  };
95
109
 
96
110
  /**
@@ -101,7 +115,7 @@ export function getConfigEnvVars(): AztecNodeConfig {
101
115
  return getConfigFromMappings<AztecNodeConfig>(aztecNodeConfigMappings);
102
116
  }
103
117
 
104
- type ConfigRequiredToBuildKeyStore = TxSenderConfig & SequencerClientConfig & SharedNodeConfig & ValidatorClientConfig;
118
+ type ConfigRequiredToBuildKeyStore = SequencerClientConfig & SharedNodeConfig & ValidatorClientConfig;
105
119
 
106
120
  function createKeyStoreFromWeb3Signer(config: ConfigRequiredToBuildKeyStore): KeyStore | undefined {
107
121
  const validatorKeyStores: ValidatorKeyStore[] = [];
@@ -120,7 +134,7 @@ function createKeyStoreFromWeb3Signer(config: ConfigRequiredToBuildKeyStore): Ke
120
134
  feeRecipient: config.feeRecipient ?? AztecAddress.ZERO,
121
135
  coinbase: config.coinbase ?? config.validatorAddresses[0],
122
136
  remoteSigner: config.web3SignerUrl,
123
- publisher: config.publisherAddresses ?? [],
137
+ publisher: config.sequencerPublisherAddresses ?? [],
124
138
  });
125
139
 
126
140
  const keyStore: KeyStore = {
@@ -145,8 +159,10 @@ function createKeyStoreFromPrivateKeys(config: ConfigRequiredToBuildKeyStore): K
145
159
  const coinbase = config.coinbase ?? EthAddress.fromString(privateKeyToAddress(ethPrivateKeys[0]));
146
160
  const feeRecipient = config.feeRecipient ?? AztecAddress.ZERO;
147
161
 
148
- const publisherKeys = config.publisherPrivateKeys
149
- ? config.publisherPrivateKeys.map((k: { getValue: () => string }) => ethPrivateKeySchema.parse(k.getValue()))
162
+ const publisherKeys = config.sequencerPublisherPrivateKeys
163
+ ? config.sequencerPublisherPrivateKeys.map((k: { getValue: () => string }) =>
164
+ ethPrivateKeySchema.parse(k.getValue()),
165
+ )
150
166
  : [];
151
167
 
152
168
  validatorKeyStores.push({
@@ -168,7 +184,7 @@ function createKeyStoreFromPrivateKeys(config: ConfigRequiredToBuildKeyStore): K
168
184
  }
169
185
 
170
186
  export function createKeyStoreForValidator(
171
- config: TxSenderConfig & SequencerClientConfig & SharedNodeConfig,
187
+ config: SequencerTxSenderConfig & SequencerClientConfig & SharedNodeConfig,
172
188
  ): KeyStore | undefined {
173
189
  if (config.web3SignerUrl !== undefined && config.web3SignerUrl.length > 0) {
174
190
  return createKeyStoreFromWeb3Signer(config);
@@ -1,6 +1,7 @@
1
1
  import { Archiver, createArchiver } from '@aztec/archiver';
2
2
  import { BBCircuitVerifier, QueuedIVCVerifier, TestCircuitVerifier } from '@aztec/bb-prover';
3
3
  import { type BlobClientInterface, createBlobClientWithFileStores } from '@aztec/blob-client/client';
4
+ import { Blob } from '@aztec/blob-lib';
4
5
  import { ARCHIVE_HEIGHT, type L1_TO_L2_MSG_TREE_HEIGHT, type NOTE_HASH_TREE_HEIGHT } from '@aztec/constants';
5
6
  import { EpochCache, type EpochCacheInterface } from '@aztec/epoch-cache';
6
7
  import { createEthereumChain } from '@aztec/ethereum/chain';
@@ -8,7 +9,7 @@ import { getPublicClient } from '@aztec/ethereum/client';
8
9
  import { RegistryContract, RollupContract } from '@aztec/ethereum/contracts';
9
10
  import type { L1ContractAddresses } from '@aztec/ethereum/l1-contract-addresses';
10
11
  import { BlockNumber, CheckpointNumber, EpochNumber, SlotNumber } from '@aztec/foundation/branded-types';
11
- import { compactArray, pick } from '@aztec/foundation/collection';
12
+ import { compactArray, pick, unique } from '@aztec/foundation/collection';
12
13
  import { Fr } from '@aztec/foundation/curves/bn254';
13
14
  import { EthAddress } from '@aztec/foundation/eth-address';
14
15
  import { BadRequestError } from '@aztec/foundation/json-rpc';
@@ -16,14 +17,13 @@ import { type Logger, createLogger } from '@aztec/foundation/log';
16
17
  import { count } from '@aztec/foundation/string';
17
18
  import { DateProvider, Timer } from '@aztec/foundation/timer';
18
19
  import { MembershipWitness, SiblingPath } from '@aztec/foundation/trees';
19
- import { KeystoreManager, loadKeystores, mergeKeystores } from '@aztec/node-keystore';
20
+ import { type KeyStore, KeystoreManager, loadKeystores, mergeKeystores } from '@aztec/node-keystore';
20
21
  import { trySnapshotSync, uploadSnapshot } from '@aztec/node-lib/actions';
21
- import {
22
- createForwarderL1TxUtilsFromEthSigner,
23
- createL1TxUtilsWithBlobsFromEthSigner,
24
- } from '@aztec/node-lib/factories';
22
+ import { createForwarderL1TxUtilsFromSigners, createL1TxUtilsFromSigners } from '@aztec/node-lib/factories';
25
23
  import { type P2P, type P2PClientDeps, createP2PClient, getDefaultAllowedSetupFunctions } from '@aztec/p2p';
26
24
  import { ProtocolContractAddress } from '@aztec/protocol-contracts';
25
+ import { type ProverNode, type ProverNodeDeps, createProverNode } from '@aztec/prover-node';
26
+ import { createKeyStoreForProver } from '@aztec/prover-node/config';
27
27
  import { GlobalVariableBuilder, SequencerClient, type SequencerPublisher } from '@aztec/sequencer-client';
28
28
  import { PublicProcessorFactory } from '@aztec/simulator/server';
29
29
  import {
@@ -35,7 +35,14 @@ import {
35
35
  } from '@aztec/slasher';
36
36
  import { CollectionLimitsConfig, PublicSimulatorConfig } from '@aztec/stdlib/avm';
37
37
  import { AztecAddress } from '@aztec/stdlib/aztec-address';
38
- import { BlockHash, type BlockParameter, type DataInBlock, L2Block, type L2BlockSource } from '@aztec/stdlib/block';
38
+ import {
39
+ type BlockData,
40
+ BlockHash,
41
+ type BlockParameter,
42
+ type DataInBlock,
43
+ L2Block,
44
+ type L2BlockSource,
45
+ } from '@aztec/stdlib/block';
39
46
  import type { PublishedCheckpoint } from '@aztec/stdlib/checkpoint';
40
47
  import type {
41
48
  ContractClassPublic,
@@ -129,6 +136,7 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
129
136
  protected readonly l1ToL2MessageSource: L1ToL2MessageSource,
130
137
  protected readonly worldStateSynchronizer: WorldStateSynchronizer,
131
138
  protected readonly sequencer: SequencerClient | undefined,
139
+ protected readonly proverNode: ProverNode | undefined,
132
140
  protected readonly slasherClient: SlasherClientInterface | undefined,
133
141
  protected readonly validatorsSentinel: Sentinel | undefined,
134
142
  protected readonly epochPruneWatcher: EpochPruneWatcher | undefined,
@@ -141,6 +149,8 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
141
149
  private telemetry: TelemetryClient = getTelemetryClient(),
142
150
  private log = createLogger('node'),
143
151
  private blobClient?: BlobClientInterface,
152
+ private validatorClient?: ValidatorClient,
153
+ private keyStoreManager?: KeystoreManager,
144
154
  ) {
145
155
  this.metrics = new NodeMetrics(telemetry, 'AztecNodeService');
146
156
  this.tracer = telemetry.getTracer('AztecNodeService');
@@ -171,10 +181,12 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
171
181
  publisher?: SequencerPublisher;
172
182
  dateProvider?: DateProvider;
173
183
  p2pClientDeps?: P2PClientDeps<P2PClientType.Full>;
184
+ proverNodeDeps?: Partial<ProverNodeDeps>;
174
185
  } = {},
175
186
  options: {
176
187
  prefilledPublicData?: PublicDataTreeLeaf[];
177
188
  dontStartSequencer?: boolean;
189
+ dontStartProverNode?: boolean;
178
190
  } = {},
179
191
  ): Promise<AztecNodeService> {
180
192
  const config = { ...inputConfig }; // Copy the config so we dont mutate the input object
@@ -184,16 +196,29 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
184
196
  const dateProvider = deps.dateProvider ?? new DateProvider();
185
197
  const ethereumChain = createEthereumChain(config.l1RpcUrls, config.l1ChainId);
186
198
 
187
- // Build a key store from file if given or from environment otherwise
199
+ // Build a key store from file if given or from environment otherwise.
200
+ // We keep the raw KeyStore available so we can merge with prover keys if enableProverNode is set.
188
201
  let keyStoreManager: KeystoreManager | undefined;
189
202
  const keyStoreProvided = config.keyStoreDirectory !== undefined && config.keyStoreDirectory.length > 0;
190
203
  if (keyStoreProvided) {
191
204
  const keyStores = loadKeystores(config.keyStoreDirectory!);
192
205
  keyStoreManager = new KeystoreManager(mergeKeystores(keyStores));
193
206
  } else {
194
- const keyStore = createKeyStoreForValidator(config);
195
- if (keyStore) {
196
- keyStoreManager = new KeystoreManager(keyStore);
207
+ const rawKeyStores: KeyStore[] = [];
208
+ const validatorKeyStore = createKeyStoreForValidator(config);
209
+ if (validatorKeyStore) {
210
+ rawKeyStores.push(validatorKeyStore);
211
+ }
212
+ if (config.enableProverNode) {
213
+ const proverKeyStore = createKeyStoreForProver(config);
214
+ if (proverKeyStore) {
215
+ rawKeyStores.push(proverKeyStore);
216
+ }
217
+ }
218
+ if (rawKeyStores.length > 0) {
219
+ keyStoreManager = new KeystoreManager(
220
+ rawKeyStores.length === 1 ? rawKeyStores[0] : mergeKeystores(rawKeyStores),
221
+ );
197
222
  }
198
223
  }
199
224
 
@@ -204,10 +229,8 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
204
229
  if (keyStoreManager === undefined) {
205
230
  throw new Error('Failed to create key store, a requirement for running a validator');
206
231
  }
207
- if (!keyStoreProvided) {
208
- log.warn(
209
- 'KEY STORE CREATED FROM ENVIRONMENT, IT IS RECOMMENDED TO USE A FILE-BASED KEY STORE IN PRODUCTION ENVIRONMENTS',
210
- );
232
+ if (!keyStoreProvided && process.env.NODE_ENV !== 'test') {
233
+ log.warn("Keystore created from env: it's recommended to use a file-based key store for production");
211
234
  }
212
235
  ValidatorClient.validateKeyStoreConfiguration(keyStoreManager, log);
213
236
  }
@@ -249,7 +272,7 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
249
272
  );
250
273
  }
251
274
 
252
- const blobClient = await createBlobClientWithFileStores(config, createLogger('node:blob-client:client'));
275
+ const blobClient = await createBlobClientWithFileStores(config, log.createChild('blob-client'));
253
276
 
254
277
  // attempt snapshot sync if possible
255
278
  await trySnapshotSync(config, log);
@@ -412,19 +435,19 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
412
435
  );
413
436
  await slasherClient.start();
414
437
 
415
- const l1TxUtils = config.publisherForwarderAddress
416
- ? await createForwarderL1TxUtilsFromEthSigner(
438
+ const l1TxUtils = config.sequencerPublisherForwarderAddress
439
+ ? await createForwarderL1TxUtilsFromSigners(
417
440
  publicClient,
418
441
  keyStoreManager!.createAllValidatorPublisherSigners(),
419
- config.publisherForwarderAddress,
442
+ config.sequencerPublisherForwarderAddress,
420
443
  { ...config, scope: 'sequencer' },
421
- { telemetry, logger: log.createChild('l1-tx-utils'), dateProvider },
444
+ { telemetry, logger: log.createChild('l1-tx-utils'), dateProvider, kzg: Blob.getViemKzgInstance() },
422
445
  )
423
- : await createL1TxUtilsWithBlobsFromEthSigner(
446
+ : await createL1TxUtilsFromSigners(
424
447
  publicClient,
425
448
  keyStoreManager!.createAllValidatorPublisherSigners(),
426
449
  { ...config, scope: 'sequencer' },
427
- { telemetry, logger: log.createChild('l1-tx-utils'), dateProvider },
450
+ { telemetry, logger: log.createChild('l1-tx-utils'), dateProvider, kzg: Blob.getViemKzgInstance() },
428
451
  );
429
452
 
430
453
  // Create and start the sequencer client
@@ -461,6 +484,29 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
461
484
  log.warn(`Sequencer created but not started`);
462
485
  }
463
486
 
487
+ // Create prover node subsystem if enabled
488
+ let proverNode: ProverNode | undefined;
489
+ if (config.enableProverNode) {
490
+ proverNode = await createProverNode(config, {
491
+ ...deps.proverNodeDeps,
492
+ telemetry,
493
+ dateProvider,
494
+ archiver,
495
+ worldStateSynchronizer,
496
+ p2pClient,
497
+ epochCache,
498
+ blobClient,
499
+ keyStoreManager,
500
+ });
501
+
502
+ if (!options.dontStartProverNode) {
503
+ await proverNode.start();
504
+ log.info(`Prover node subsystem started`);
505
+ } else {
506
+ log.info(`Prover node subsystem created but not started`);
507
+ }
508
+ }
509
+
464
510
  const globalVariableBuilder = new GlobalVariableBuilder({
465
511
  ...config,
466
512
  rollupVersion: BigInt(config.rollupVersion),
@@ -468,7 +514,7 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
468
514
  slotDuration: Number(slotDuration),
469
515
  });
470
516
 
471
- return new AztecNodeService(
517
+ const node = new AztecNodeService(
472
518
  config,
473
519
  p2pClient,
474
520
  archiver,
@@ -477,6 +523,7 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
477
523
  archiver,
478
524
  worldStateSynchronizer,
479
525
  sequencer,
526
+ proverNode,
480
527
  slasherClient,
481
528
  validatorsSentinel,
482
529
  epochPruneWatcher,
@@ -489,7 +536,11 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
489
536
  telemetry,
490
537
  log,
491
538
  blobClient,
539
+ validatorClient,
540
+ keyStoreManager,
492
541
  );
542
+
543
+ return node;
493
544
  }
494
545
 
495
546
  /**
@@ -500,6 +551,11 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
500
551
  return this.sequencer;
501
552
  }
502
553
 
554
+ /** Returns the prover node subsystem, if enabled. */
555
+ public getProverNode(): ProverNode | undefined {
556
+ return this.proverNode;
557
+ }
558
+
503
559
  public getBlockSource(): L2BlockSource {
504
560
  return this.blockSource;
505
561
  }
@@ -553,6 +609,7 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
553
609
  enr,
554
610
  l1ContractAddresses: contractAddresses,
555
611
  protocolContractAddresses: protocolContractAddresses,
612
+ realProofs: !!this.config.realProofs,
556
613
  };
557
614
 
558
615
  return nodeInfo;
@@ -802,6 +859,7 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
802
859
  await tryStop(this.slasherClient);
803
860
  await tryStop(this.proofVerifier);
804
861
  await tryStop(this.sequencer);
862
+ await tryStop(this.proverNode);
805
863
  await tryStop(this.p2pClient);
806
864
  await tryStop(this.worldStateSynchronizer);
807
865
  await tryStop(this.blockSource);
@@ -1105,6 +1163,14 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
1105
1163
  return await this.blockSource.getBlockHeaderByArchive(archive);
1106
1164
  }
1107
1165
 
1166
+ public getBlockData(number: BlockNumber): Promise<BlockData | undefined> {
1167
+ return this.blockSource.getBlockData(number);
1168
+ }
1169
+
1170
+ public getBlockDataByArchive(archive: Fr): Promise<BlockData | undefined> {
1171
+ return this.blockSource.getBlockDataByArchive(archive);
1172
+ }
1173
+
1108
1174
  /**
1109
1175
  * Simulates the public part of a transaction with the current state.
1110
1176
  * @param tx - The transaction to simulate.
@@ -1128,7 +1194,8 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
1128
1194
  }
1129
1195
 
1130
1196
  const txHash = tx.getTxHash();
1131
- const blockNumber = BlockNumber((await this.blockSource.getBlockNumber()) + 1);
1197
+ const latestBlockNumber = await this.blockSource.getBlockNumber();
1198
+ const blockNumber = BlockNumber.add(latestBlockNumber, 1);
1132
1199
 
1133
1200
  // If sequencer is not initialized, we just set these values to zero for simulation.
1134
1201
  const coinbase = EthAddress.ZERO;
@@ -1152,6 +1219,8 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
1152
1219
  blockNumber,
1153
1220
  });
1154
1221
 
1222
+ // Ensure world-state has caught up with the latest block we loaded from the archiver
1223
+ await this.worldStateSynchronizer.syncImmediate(latestBlockNumber);
1155
1224
  const merkleTreeFork = await this.worldStateSynchronizer.fork();
1156
1225
  try {
1157
1226
  const config = PublicSimulatorConfig.from({
@@ -1167,7 +1236,7 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
1167
1236
  const processor = publicProcessorFactory.create(merkleTreeFork, newGlobalVariables, config);
1168
1237
 
1169
1238
  // REFACTOR: Consider merging ProcessReturnValues into ProcessedTx
1170
- const [processedTxs, failedTxs, _usedTxs, returns] = await processor.process([tx]);
1239
+ const [processedTxs, failedTxs, _usedTxs, returns, _blobFields, debugLogs] = await processor.process([tx]);
1171
1240
  // REFACTOR: Consider returning the error rather than throwing
1172
1241
  if (failedTxs.length) {
1173
1242
  this.log.warn(`Simulated tx ${txHash} fails: ${failedTxs[0].error}`, { txHash });
@@ -1181,6 +1250,7 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
1181
1250
  processedTx.txEffect,
1182
1251
  returns,
1183
1252
  processedTx.gasUsed,
1253
+ debugLogs,
1184
1254
  );
1185
1255
  } finally {
1186
1256
  await merkleTreeFork.close();
@@ -1194,7 +1264,7 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
1194
1264
  const db = this.worldStateSynchronizer.getCommitted();
1195
1265
  const verifier = isSimulation ? undefined : this.proofVerifier;
1196
1266
 
1197
- // We accept transactions if they are not expired by the next slot (checked based on the IncludeByTimestamp field)
1267
+ // We accept transactions if they are not expired by the next slot (checked based on the ExpirationTimestamp field)
1198
1268
  const { ts: nextSlotTimestamp } = this.epochCache.getEpochAndSlotInNextL1Slot();
1199
1269
  const blockNumber = BlockNumber((await this.blockSource.getBlockNumber()) + 1);
1200
1270
  const validator = createValidatorForAcceptingTxs(
@@ -1376,6 +1446,94 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
1376
1446
  }
1377
1447
  }
1378
1448
 
1449
+ public async reloadKeystore(): Promise<void> {
1450
+ if (!this.config.keyStoreDirectory?.length) {
1451
+ throw new BadRequestError(
1452
+ 'Cannot reload keystore: node is not using a file-based keystore. ' +
1453
+ 'Set KEY_STORE_DIRECTORY to use file-based keystores.',
1454
+ );
1455
+ }
1456
+ if (!this.validatorClient) {
1457
+ throw new BadRequestError('Cannot reload keystore: validator is not enabled.');
1458
+ }
1459
+
1460
+ this.log.info('Reloading keystore from disk');
1461
+
1462
+ // Re-read and validate keystore files
1463
+ const keyStores = loadKeystores(this.config.keyStoreDirectory);
1464
+ const newManager = new KeystoreManager(mergeKeystores(keyStores));
1465
+ await newManager.validateSigners();
1466
+ ValidatorClient.validateKeyStoreConfiguration(newManager, this.log);
1467
+
1468
+ // Validate that every validator's publisher keys overlap with the L1 signers
1469
+ // that were initialized at startup. Publishers cannot be hot-reloaded, so a
1470
+ // validator with a publisher key that doesn't match any existing L1 signer
1471
+ // would silently fail on every proposer slot.
1472
+ if (this.keyStoreManager && this.sequencer) {
1473
+ const oldAdapter = NodeKeystoreAdapter.fromKeyStoreManager(this.keyStoreManager);
1474
+ const availablePublishers = new Set(
1475
+ oldAdapter
1476
+ .getAttesterAddresses()
1477
+ .flatMap(a => oldAdapter.getPublisherAddresses(a).map(p => p.toString().toLowerCase())),
1478
+ );
1479
+
1480
+ const newAdapter = NodeKeystoreAdapter.fromKeyStoreManager(newManager);
1481
+ for (const attester of newAdapter.getAttesterAddresses()) {
1482
+ const pubs = newAdapter.getPublisherAddresses(attester);
1483
+ if (pubs.length > 0 && !pubs.some(p => availablePublishers.has(p.toString().toLowerCase()))) {
1484
+ throw new BadRequestError(
1485
+ `Cannot reload keystore: validator ${attester} has publisher keys ` +
1486
+ `[${pubs.map(p => p.toString()).join(', ')}] but none match the L1 signers initialized at startup ` +
1487
+ `[${[...availablePublishers].join(', ')}]. Publishers cannot be hot-reloaded — ` +
1488
+ `use an existing publisher key or restart the node.`,
1489
+ );
1490
+ }
1491
+ }
1492
+ }
1493
+
1494
+ // Build adapters for old and new keystores to compute diff
1495
+ const newAdapter = NodeKeystoreAdapter.fromKeyStoreManager(newManager);
1496
+ const newAddresses = newAdapter.getAttesterAddresses();
1497
+ const oldAddresses = this.keyStoreManager
1498
+ ? NodeKeystoreAdapter.fromKeyStoreManager(this.keyStoreManager).getAttesterAddresses()
1499
+ : [];
1500
+
1501
+ const oldSet = new Set(oldAddresses.map(a => a.toString()));
1502
+ const newSet = new Set(newAddresses.map(a => a.toString()));
1503
+ const added = newAddresses.filter(a => !oldSet.has(a.toString()));
1504
+ const removed = oldAddresses.filter(a => !newSet.has(a.toString()));
1505
+
1506
+ if (added.length > 0) {
1507
+ this.log.info(`Keystore reload: adding attester keys: ${added.map(a => a.toString()).join(', ')}`);
1508
+ }
1509
+ if (removed.length > 0) {
1510
+ this.log.info(`Keystore reload: removing attester keys: ${removed.map(a => a.toString()).join(', ')}`);
1511
+ }
1512
+ if (added.length === 0 && removed.length === 0) {
1513
+ this.log.info('Keystore reload: attester keys unchanged');
1514
+ }
1515
+
1516
+ // Update the validator client (coinbase, feeRecipient, attester keys)
1517
+ this.validatorClient.reloadKeystore(newManager);
1518
+
1519
+ // Update the publisher factory's keystore so newly-added validators
1520
+ // can be matched to existing publisher keys when proposing blocks.
1521
+ if (this.sequencer) {
1522
+ this.sequencer.updatePublisherNodeKeyStore(newAdapter);
1523
+ }
1524
+
1525
+ // Update slasher's "don't-slash-self" list with new validator addresses
1526
+ if (this.slasherClient && !this.config.slashSelfAllowed) {
1527
+ const slashValidatorsNever = unique(
1528
+ [...(this.config.slashValidatorsNever ?? []), ...newAddresses].map(a => a.toString()),
1529
+ ).map(EthAddress.fromString);
1530
+ this.slasherClient.updateConfig({ slashValidatorsNever });
1531
+ }
1532
+
1533
+ this.keyStoreManager = newManager;
1534
+ this.log.info('Keystore reloaded: coinbase, feeRecipient, and attester keys updated');
1535
+ }
1536
+
1379
1537
  #getInitialHeaderHash(): Promise<BlockHash> {
1380
1538
  if (!this.initialHeaderHashPromise) {
1381
1539
  this.initialHeaderHashPromise = this.worldStateSynchronizer.getCommitted().getInitialHeader().hash();