@aztec/aztec-node 0.0.1-commit.7d4e6cd → 0.0.1-commit.7ffbba4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dest/aztec-node/config.d.ts +8 -5
- package/dest/aztec-node/config.d.ts.map +1 -1
- package/dest/aztec-node/config.js +11 -3
- package/dest/aztec-node/node_metrics.d.ts +1 -1
- package/dest/aztec-node/node_metrics.d.ts.map +1 -1
- package/dest/aztec-node/node_metrics.js +8 -4
- package/dest/aztec-node/server.d.ts +44 -97
- package/dest/aztec-node/server.d.ts.map +1 -1
- package/dest/aztec-node/server.js +389 -233
- package/dest/sentinel/factory.d.ts +2 -2
- package/dest/sentinel/factory.d.ts.map +1 -1
- package/dest/sentinel/factory.js +1 -1
- package/dest/sentinel/sentinel.d.ts +2 -2
- package/dest/sentinel/sentinel.d.ts.map +1 -1
- package/dest/sentinel/sentinel.js +53 -27
- package/dest/sentinel/store.d.ts +2 -2
- package/dest/sentinel/store.d.ts.map +1 -1
- package/dest/sentinel/store.js +11 -7
- package/package.json +28 -25
- package/src/aztec-node/config.ts +25 -9
- package/src/aztec-node/node_metrics.ts +12 -5
- package/src/aztec-node/server.ts +487 -304
- package/src/sentinel/factory.ts +2 -7
- package/src/sentinel/sentinel.ts +56 -23
- package/src/sentinel/store.ts +12 -12
|
@@ -374,13 +374,13 @@ var _dec, _initProto;
|
|
|
374
374
|
import { createArchiver } from '@aztec/archiver';
|
|
375
375
|
import { BBCircuitVerifier, QueuedIVCVerifier, TestCircuitVerifier } from '@aztec/bb-prover';
|
|
376
376
|
import { createBlobClientWithFileStores } from '@aztec/blob-client/client';
|
|
377
|
-
import {
|
|
377
|
+
import { Blob } from '@aztec/blob-lib';
|
|
378
378
|
import { EpochCache } from '@aztec/epoch-cache';
|
|
379
379
|
import { createEthereumChain } from '@aztec/ethereum/chain';
|
|
380
380
|
import { getPublicClient } from '@aztec/ethereum/client';
|
|
381
381
|
import { RegistryContract, RollupContract } from '@aztec/ethereum/contracts';
|
|
382
382
|
import { BlockNumber, SlotNumber } from '@aztec/foundation/branded-types';
|
|
383
|
-
import { compactArray, pick } from '@aztec/foundation/collection';
|
|
383
|
+
import { compactArray, pick, unique } from '@aztec/foundation/collection';
|
|
384
384
|
import { Fr } from '@aztec/foundation/curves/bn254';
|
|
385
385
|
import { EthAddress } from '@aztec/foundation/eth-address';
|
|
386
386
|
import { BadRequestError } from '@aztec/foundation/json-rpc';
|
|
@@ -390,26 +390,28 @@ import { DateProvider, Timer } from '@aztec/foundation/timer';
|
|
|
390
390
|
import { MembershipWitness } from '@aztec/foundation/trees';
|
|
391
391
|
import { KeystoreManager, loadKeystores, mergeKeystores } from '@aztec/node-keystore';
|
|
392
392
|
import { trySnapshotSync, uploadSnapshot } from '@aztec/node-lib/actions';
|
|
393
|
-
import {
|
|
394
|
-
import { createP2PClient, getDefaultAllowedSetupFunctions } from '@aztec/p2p';
|
|
393
|
+
import { createForwarderL1TxUtilsFromSigners, createL1TxUtilsFromSigners } from '@aztec/node-lib/factories';
|
|
394
|
+
import { createP2PClient, createTxValidatorForAcceptingTxsOverRPC, getDefaultAllowedSetupFunctions } from '@aztec/p2p';
|
|
395
395
|
import { ProtocolContractAddress } from '@aztec/protocol-contracts';
|
|
396
|
-
import {
|
|
396
|
+
import { createProverNode } from '@aztec/prover-node';
|
|
397
|
+
import { createKeyStoreForProver } from '@aztec/prover-node/config';
|
|
398
|
+
import { GlobalVariableBuilder, SequencerClient } from '@aztec/sequencer-client';
|
|
397
399
|
import { PublicProcessorFactory } from '@aztec/simulator/server';
|
|
398
400
|
import { AttestationsBlockWatcher, EpochPruneWatcher, createSlasher } from '@aztec/slasher';
|
|
399
401
|
import { CollectionLimitsConfig, PublicSimulatorConfig } from '@aztec/stdlib/avm';
|
|
400
402
|
import { AztecAddress } from '@aztec/stdlib/aztec-address';
|
|
401
|
-
import {
|
|
403
|
+
import { BlockHash, L2Block } from '@aztec/stdlib/block';
|
|
402
404
|
import { GasFees } from '@aztec/stdlib/gas';
|
|
403
405
|
import { computePublicDataTreeLeafSlot } from '@aztec/stdlib/hash';
|
|
404
406
|
import { AztecNodeAdminConfigSchema } from '@aztec/stdlib/interfaces/client';
|
|
405
407
|
import { tryStop } from '@aztec/stdlib/interfaces/server';
|
|
408
|
+
import { InMemoryDebugLogStore, NullDebugLogStore } from '@aztec/stdlib/logs';
|
|
406
409
|
import { InboxLeaf } from '@aztec/stdlib/messaging';
|
|
407
|
-
import { P2PClientType } from '@aztec/stdlib/p2p';
|
|
408
410
|
import { MerkleTreeId, NullifierMembershipWitness, PublicDataWitness } from '@aztec/stdlib/trees';
|
|
409
411
|
import { PublicSimulationOutput, TxReceipt, TxStatus } from '@aztec/stdlib/tx';
|
|
410
412
|
import { getPackageVersion } from '@aztec/stdlib/update-checker';
|
|
411
413
|
import { Attributes, getTelemetryClient, trackSpan } from '@aztec/telemetry-client';
|
|
412
|
-
import { FullNodeCheckpointsBuilder as CheckpointsBuilder, FullNodeCheckpointsBuilder, NodeKeystoreAdapter, ValidatorClient, createBlockProposalHandler, createValidatorClient
|
|
414
|
+
import { FullNodeCheckpointsBuilder as CheckpointsBuilder, FullNodeCheckpointsBuilder, NodeKeystoreAdapter, ValidatorClient, createBlockProposalHandler, createValidatorClient } from '@aztec/validator-client';
|
|
413
415
|
import { createWorldStateSynchronizer } from '@aztec/world-state';
|
|
414
416
|
import { createPublicClient, fallback, http } from 'viem';
|
|
415
417
|
import { createSentinel } from '../sentinel/factory.js';
|
|
@@ -429,6 +431,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
429
431
|
l1ToL2MessageSource;
|
|
430
432
|
worldStateSynchronizer;
|
|
431
433
|
sequencer;
|
|
434
|
+
proverNode;
|
|
432
435
|
slasherClient;
|
|
433
436
|
validatorsSentinel;
|
|
434
437
|
epochPruneWatcher;
|
|
@@ -441,6 +444,9 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
441
444
|
telemetry;
|
|
442
445
|
log;
|
|
443
446
|
blobClient;
|
|
447
|
+
validatorClient;
|
|
448
|
+
keyStoreManager;
|
|
449
|
+
debugLogStore;
|
|
444
450
|
static{
|
|
445
451
|
({ e: [_initProto] } = _apply_decs_2203_r(this, [
|
|
446
452
|
[
|
|
@@ -451,10 +457,11 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
451
457
|
], []));
|
|
452
458
|
}
|
|
453
459
|
metrics;
|
|
460
|
+
initialHeaderHashPromise;
|
|
454
461
|
// Prevent two snapshot operations to happen simultaneously
|
|
455
462
|
isUploadingSnapshot;
|
|
456
463
|
tracer;
|
|
457
|
-
constructor(config, p2pClient, blockSource, logsSource, contractDataSource, l1ToL2MessageSource, worldStateSynchronizer, sequencer, slasherClient, validatorsSentinel, epochPruneWatcher, l1ChainId, version, globalVariableBuilder, epochCache, packageVersion, proofVerifier, telemetry = getTelemetryClient(), log = createLogger('node'), blobClient){
|
|
464
|
+
constructor(config, p2pClient, blockSource, logsSource, contractDataSource, l1ToL2MessageSource, worldStateSynchronizer, sequencer, proverNode, slasherClient, validatorsSentinel, epochPruneWatcher, l1ChainId, version, globalVariableBuilder, epochCache, packageVersion, proofVerifier, telemetry = getTelemetryClient(), log = createLogger('node'), blobClient, validatorClient, keyStoreManager, debugLogStore = new NullDebugLogStore()){
|
|
458
465
|
this.config = config;
|
|
459
466
|
this.p2pClient = p2pClient;
|
|
460
467
|
this.blockSource = blockSource;
|
|
@@ -463,6 +470,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
463
470
|
this.l1ToL2MessageSource = l1ToL2MessageSource;
|
|
464
471
|
this.worldStateSynchronizer = worldStateSynchronizer;
|
|
465
472
|
this.sequencer = sequencer;
|
|
473
|
+
this.proverNode = proverNode;
|
|
466
474
|
this.slasherClient = slasherClient;
|
|
467
475
|
this.validatorsSentinel = validatorsSentinel;
|
|
468
476
|
this.epochPruneWatcher = epochPruneWatcher;
|
|
@@ -475,11 +483,21 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
475
483
|
this.telemetry = telemetry;
|
|
476
484
|
this.log = log;
|
|
477
485
|
this.blobClient = blobClient;
|
|
478
|
-
this.
|
|
486
|
+
this.validatorClient = validatorClient;
|
|
487
|
+
this.keyStoreManager = keyStoreManager;
|
|
488
|
+
this.debugLogStore = debugLogStore;
|
|
489
|
+
this.initialHeaderHashPromise = (_initProto(this), undefined);
|
|
490
|
+
this.isUploadingSnapshot = false;
|
|
479
491
|
this.metrics = new NodeMetrics(telemetry, 'AztecNodeService');
|
|
480
492
|
this.tracer = telemetry.getTracer('AztecNodeService');
|
|
481
493
|
this.log.info(`Aztec Node version: ${this.packageVersion}`);
|
|
482
494
|
this.log.info(`Aztec Node started on chain 0x${l1ChainId.toString(16)}`, config.l1Contracts);
|
|
495
|
+
// A defensive check that protects us against introducing a bug in the complex `createAndSync` function. We must
|
|
496
|
+
// never have debugLogStore enabled when not in test mode because then we would be accumulating debug logs in
|
|
497
|
+
// memory which could be a DoS vector on the sequencer (since no fees are paid for debug logs).
|
|
498
|
+
if (debugLogStore.isEnabled && config.realProofs) {
|
|
499
|
+
throw new Error('debugLogStore should never be enabled when realProofs are set');
|
|
500
|
+
}
|
|
483
501
|
}
|
|
484
502
|
async getWorldStateSyncStatus() {
|
|
485
503
|
const status = await this.worldStateSynchronizer.status();
|
|
@@ -501,16 +519,27 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
501
519
|
const telemetry = deps.telemetry ?? getTelemetryClient();
|
|
502
520
|
const dateProvider = deps.dateProvider ?? new DateProvider();
|
|
503
521
|
const ethereumChain = createEthereumChain(config.l1RpcUrls, config.l1ChainId);
|
|
504
|
-
// Build a key store from file if given or from environment otherwise
|
|
522
|
+
// Build a key store from file if given or from environment otherwise.
|
|
523
|
+
// We keep the raw KeyStore available so we can merge with prover keys if enableProverNode is set.
|
|
505
524
|
let keyStoreManager;
|
|
506
525
|
const keyStoreProvided = config.keyStoreDirectory !== undefined && config.keyStoreDirectory.length > 0;
|
|
507
526
|
if (keyStoreProvided) {
|
|
508
527
|
const keyStores = loadKeystores(config.keyStoreDirectory);
|
|
509
528
|
keyStoreManager = new KeystoreManager(mergeKeystores(keyStores));
|
|
510
529
|
} else {
|
|
511
|
-
const
|
|
512
|
-
|
|
513
|
-
|
|
530
|
+
const rawKeyStores = [];
|
|
531
|
+
const validatorKeyStore = createKeyStoreForValidator(config);
|
|
532
|
+
if (validatorKeyStore) {
|
|
533
|
+
rawKeyStores.push(validatorKeyStore);
|
|
534
|
+
}
|
|
535
|
+
if (config.enableProverNode) {
|
|
536
|
+
const proverKeyStore = createKeyStoreForProver(config);
|
|
537
|
+
if (proverKeyStore) {
|
|
538
|
+
rawKeyStores.push(proverKeyStore);
|
|
539
|
+
}
|
|
540
|
+
}
|
|
541
|
+
if (rawKeyStores.length > 0) {
|
|
542
|
+
keyStoreManager = new KeystoreManager(rawKeyStores.length === 1 ? rawKeyStores[0] : mergeKeystores(rawKeyStores));
|
|
514
543
|
}
|
|
515
544
|
}
|
|
516
545
|
await keyStoreManager?.validateSigners();
|
|
@@ -519,8 +548,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
519
548
|
if (keyStoreManager === undefined) {
|
|
520
549
|
throw new Error('Failed to create key store, a requirement for running a validator');
|
|
521
550
|
}
|
|
522
|
-
if (!keyStoreProvided) {
|
|
523
|
-
log.warn(
|
|
551
|
+
if (!keyStoreProvided && process.env.NODE_ENV !== 'test') {
|
|
552
|
+
log.warn("Keystore created from env: it's recommended to use a file-based key store for production");
|
|
524
553
|
}
|
|
525
554
|
ValidatorClient.validateKeyStoreConfiguration(keyStoreManager, log);
|
|
526
555
|
}
|
|
@@ -542,16 +571,17 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
542
571
|
...l1ContractsAddresses
|
|
543
572
|
};
|
|
544
573
|
const rollupContract = new RollupContract(publicClient, config.l1Contracts.rollupAddress.toString());
|
|
545
|
-
const [l1GenesisTime, slotDuration, rollupVersionFromRollup] = await Promise.all([
|
|
574
|
+
const [l1GenesisTime, slotDuration, rollupVersionFromRollup, rollupManaLimit] = await Promise.all([
|
|
546
575
|
rollupContract.getL1GenesisTime(),
|
|
547
576
|
rollupContract.getSlotDuration(),
|
|
548
|
-
rollupContract.getVersion()
|
|
577
|
+
rollupContract.getVersion(),
|
|
578
|
+
rollupContract.getManaLimit().then(Number)
|
|
549
579
|
]);
|
|
550
580
|
config.rollupVersion ??= Number(rollupVersionFromRollup);
|
|
551
581
|
if (config.rollupVersion !== Number(rollupVersionFromRollup)) {
|
|
552
582
|
log.warn(`Registry looked up and returned a rollup with version (${config.rollupVersion}), but this does not match with version detected from the rollup directly: (${rollupVersionFromRollup}).`);
|
|
553
583
|
}
|
|
554
|
-
const blobClient = await createBlobClientWithFileStores(config,
|
|
584
|
+
const blobClient = await createBlobClientWithFileStores(config, log.createChild('blob-client'));
|
|
555
585
|
// attempt snapshot sync if possible
|
|
556
586
|
await trySnapshotSync(config, log);
|
|
557
587
|
const epochCache = await EpochCache.create(config.l1Contracts.rollupAddress, config, {
|
|
@@ -568,54 +598,63 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
568
598
|
// now create the merkle trees and the world state synchronizer
|
|
569
599
|
const worldStateSynchronizer = await createWorldStateSynchronizer(config, archiver, options.prefilledPublicData, telemetry);
|
|
570
600
|
const circuitVerifier = config.realProofs || config.debugForceTxProofVerification ? await BBCircuitVerifier.new(config) : new TestCircuitVerifier(config.proverTestVerificationDelayMs);
|
|
601
|
+
let debugLogStore;
|
|
571
602
|
if (!config.realProofs) {
|
|
572
603
|
log.warn(`Aztec node is accepting fake proofs`);
|
|
604
|
+
debugLogStore = new InMemoryDebugLogStore();
|
|
605
|
+
log.info('Aztec node started in test mode (realProofs set to false) hence debug logs from public functions will be collected and served');
|
|
606
|
+
} else {
|
|
607
|
+
debugLogStore = new NullDebugLogStore();
|
|
573
608
|
}
|
|
574
609
|
const proofVerifier = new QueuedIVCVerifier(config, circuitVerifier);
|
|
610
|
+
const proverOnly = config.enableProverNode && config.disableValidator;
|
|
611
|
+
if (proverOnly) {
|
|
612
|
+
log.info('Starting in prover-only mode: skipping validator, sequencer, sentinel, and slasher subsystems');
|
|
613
|
+
}
|
|
575
614
|
// create the tx pool and the p2p client, which will need the l2 block source
|
|
576
|
-
const p2pClient = await createP2PClient(
|
|
577
|
-
// We
|
|
578
|
-
|
|
579
|
-
// Create
|
|
580
|
-
|
|
581
|
-
...config,
|
|
582
|
-
l1GenesisTime,
|
|
583
|
-
slotDuration: Number(slotDuration)
|
|
584
|
-
}, worldStateSynchronizer, archiver, dateProvider, telemetry);
|
|
585
|
-
// Create FullNodeCheckpointsBuilder for validator and non-validator block proposal handling
|
|
615
|
+
const p2pClient = await createP2PClient(config, archiver, proofVerifier, worldStateSynchronizer, epochCache, packageVersion, dateProvider, telemetry, deps.p2pClientDeps);
|
|
616
|
+
// We'll accumulate sentinel watchers here
|
|
617
|
+
const watchers = [];
|
|
618
|
+
// Create FullNodeCheckpointsBuilder for block proposal handling and tx validation.
|
|
619
|
+
// Override maxTxsPerCheckpoint with the validator-specific limit if set.
|
|
586
620
|
const validatorCheckpointsBuilder = new FullNodeCheckpointsBuilder({
|
|
587
621
|
...config,
|
|
588
622
|
l1GenesisTime,
|
|
589
|
-
slotDuration: Number(slotDuration)
|
|
590
|
-
|
|
591
|
-
|
|
592
|
-
|
|
593
|
-
|
|
594
|
-
|
|
595
|
-
|
|
596
|
-
|
|
597
|
-
|
|
598
|
-
|
|
599
|
-
|
|
600
|
-
|
|
601
|
-
|
|
602
|
-
|
|
603
|
-
|
|
604
|
-
|
|
605
|
-
|
|
606
|
-
|
|
607
|
-
|
|
608
|
-
|
|
609
|
-
|
|
610
|
-
|
|
611
|
-
if (
|
|
612
|
-
|
|
623
|
+
slotDuration: Number(slotDuration),
|
|
624
|
+
rollupManaLimit,
|
|
625
|
+
maxTxsPerCheckpoint: config.validateMaxTxsPerCheckpoint
|
|
626
|
+
}, worldStateSynchronizer, archiver, dateProvider, telemetry);
|
|
627
|
+
let validatorClient;
|
|
628
|
+
if (!proverOnly) {
|
|
629
|
+
// Create validator client if required
|
|
630
|
+
validatorClient = await createValidatorClient(config, {
|
|
631
|
+
checkpointsBuilder: validatorCheckpointsBuilder,
|
|
632
|
+
worldState: worldStateSynchronizer,
|
|
633
|
+
p2pClient,
|
|
634
|
+
telemetry,
|
|
635
|
+
dateProvider,
|
|
636
|
+
epochCache,
|
|
637
|
+
blockSource: archiver,
|
|
638
|
+
l1ToL2MessageSource: archiver,
|
|
639
|
+
keyStoreManager,
|
|
640
|
+
blobClient
|
|
641
|
+
});
|
|
642
|
+
// If we have a validator client, register it as a source of offenses for the slasher,
|
|
643
|
+
// and have it register callbacks on the p2p client *before* we start it, otherwise messages
|
|
644
|
+
// like attestations or auths will fail.
|
|
645
|
+
if (validatorClient) {
|
|
646
|
+
watchers.push(validatorClient);
|
|
647
|
+
if (!options.dontStartSequencer) {
|
|
648
|
+
await validatorClient.registerHandlers();
|
|
649
|
+
}
|
|
613
650
|
}
|
|
614
651
|
}
|
|
615
|
-
// If there's no validator client
|
|
616
|
-
//
|
|
617
|
-
|
|
618
|
-
|
|
652
|
+
// If there's no validator client, create a BlockProposalHandler to handle block proposals
|
|
653
|
+
// for monitoring or reexecution. Reexecution (default) allows us to follow the pending chain,
|
|
654
|
+
// while non-reexecution is used for validating the proposals and collecting their txs.
|
|
655
|
+
if (!validatorClient) {
|
|
656
|
+
const reexecute = !!config.alwaysReexecuteBlockProposals;
|
|
657
|
+
log.info(`Setting up block proposal handler` + (reexecute ? ' with reexecution of proposals' : ''));
|
|
619
658
|
createBlockProposalHandler(config, {
|
|
620
659
|
checkpointsBuilder: validatorCheckpointsBuilder,
|
|
621
660
|
worldState: worldStateSynchronizer,
|
|
@@ -625,26 +664,29 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
625
664
|
p2pClient,
|
|
626
665
|
dateProvider,
|
|
627
666
|
telemetry
|
|
628
|
-
}).
|
|
667
|
+
}).register(p2pClient, reexecute);
|
|
629
668
|
}
|
|
630
669
|
// Start world state and wait for it to sync to the archiver.
|
|
631
670
|
await worldStateSynchronizer.start();
|
|
632
671
|
// Start p2p. Note that it depends on world state to be running.
|
|
633
672
|
await p2pClient.start();
|
|
634
|
-
|
|
635
|
-
if (validatorsSentinel && config.slashInactivityPenalty > 0n) {
|
|
636
|
-
watchers.push(validatorsSentinel);
|
|
637
|
-
}
|
|
673
|
+
let validatorsSentinel;
|
|
638
674
|
let epochPruneWatcher;
|
|
639
|
-
if (config.slashPrunePenalty > 0n || config.slashDataWithholdingPenalty > 0n) {
|
|
640
|
-
epochPruneWatcher = new EpochPruneWatcher(archiver, archiver, epochCache, p2pClient.getTxProvider(), blockBuilder, config);
|
|
641
|
-
watchers.push(epochPruneWatcher);
|
|
642
|
-
}
|
|
643
|
-
// We assume we want to slash for invalid attestations unless all max penalties are set to 0
|
|
644
675
|
let attestationsBlockWatcher;
|
|
645
|
-
if (
|
|
646
|
-
|
|
647
|
-
|
|
676
|
+
if (!proverOnly) {
|
|
677
|
+
validatorsSentinel = await createSentinel(epochCache, archiver, p2pClient, config);
|
|
678
|
+
if (validatorsSentinel && config.slashInactivityPenalty > 0n) {
|
|
679
|
+
watchers.push(validatorsSentinel);
|
|
680
|
+
}
|
|
681
|
+
if (config.slashPrunePenalty > 0n || config.slashDataWithholdingPenalty > 0n) {
|
|
682
|
+
epochPruneWatcher = new EpochPruneWatcher(archiver, archiver, epochCache, p2pClient.getTxProvider(), validatorCheckpointsBuilder, config);
|
|
683
|
+
watchers.push(epochPruneWatcher);
|
|
684
|
+
}
|
|
685
|
+
// We assume we want to slash for invalid attestations unless all max penalties are set to 0
|
|
686
|
+
if (config.slashProposeInvalidAttestationsPenalty > 0n || config.slashAttestDescendantOfInvalidPenalty > 0n) {
|
|
687
|
+
attestationsBlockWatcher = new AttestationsBlockWatcher(archiver, epochCache, config);
|
|
688
|
+
watchers.push(attestationsBlockWatcher);
|
|
689
|
+
}
|
|
648
690
|
}
|
|
649
691
|
// Start p2p-related services once the archiver has completed sync
|
|
650
692
|
void archiver.waitForInitialSync().then(async ()=>{
|
|
@@ -663,27 +705,30 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
663
705
|
const validatorAddresses = keyStoreManager ? NodeKeystoreAdapter.fromKeyStoreManager(keyStoreManager).getAddresses() : [];
|
|
664
706
|
slasherClient = await createSlasher(config, config.l1Contracts, getPublicClient(config), watchers, dateProvider, epochCache, validatorAddresses, undefined);
|
|
665
707
|
await slasherClient.start();
|
|
666
|
-
const l1TxUtils = config.
|
|
708
|
+
const l1TxUtils = config.sequencerPublisherForwarderAddress ? await createForwarderL1TxUtilsFromSigners(publicClient, keyStoreManager.createAllValidatorPublisherSigners(), config.sequencerPublisherForwarderAddress, {
|
|
667
709
|
...config,
|
|
668
710
|
scope: 'sequencer'
|
|
669
711
|
}, {
|
|
670
712
|
telemetry,
|
|
671
713
|
logger: log.createChild('l1-tx-utils'),
|
|
672
|
-
dateProvider
|
|
673
|
-
|
|
714
|
+
dateProvider,
|
|
715
|
+
kzg: Blob.getViemKzgInstance()
|
|
716
|
+
}) : await createL1TxUtilsFromSigners(publicClient, keyStoreManager.createAllValidatorPublisherSigners(), {
|
|
674
717
|
...config,
|
|
675
718
|
scope: 'sequencer'
|
|
676
719
|
}, {
|
|
677
720
|
telemetry,
|
|
678
721
|
logger: log.createChild('l1-tx-utils'),
|
|
679
|
-
dateProvider
|
|
722
|
+
dateProvider,
|
|
723
|
+
kzg: Blob.getViemKzgInstance()
|
|
680
724
|
});
|
|
681
725
|
// Create and start the sequencer client
|
|
682
726
|
const checkpointsBuilder = new CheckpointsBuilder({
|
|
683
727
|
...config,
|
|
684
728
|
l1GenesisTime,
|
|
685
|
-
slotDuration: Number(slotDuration)
|
|
686
|
-
|
|
729
|
+
slotDuration: Number(slotDuration),
|
|
730
|
+
rollupManaLimit
|
|
731
|
+
}, worldStateSynchronizer, archiver, dateProvider, telemetry, debugLogStore);
|
|
687
732
|
sequencer = await SequencerClient.new(config, {
|
|
688
733
|
...deps,
|
|
689
734
|
epochCache,
|
|
@@ -707,13 +752,35 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
707
752
|
} else if (sequencer) {
|
|
708
753
|
log.warn(`Sequencer created but not started`);
|
|
709
754
|
}
|
|
755
|
+
// Create prover node subsystem if enabled
|
|
756
|
+
let proverNode;
|
|
757
|
+
if (config.enableProverNode) {
|
|
758
|
+
proverNode = await createProverNode(config, {
|
|
759
|
+
...deps.proverNodeDeps,
|
|
760
|
+
telemetry,
|
|
761
|
+
dateProvider,
|
|
762
|
+
archiver,
|
|
763
|
+
worldStateSynchronizer,
|
|
764
|
+
p2pClient,
|
|
765
|
+
epochCache,
|
|
766
|
+
blobClient,
|
|
767
|
+
keyStoreManager
|
|
768
|
+
});
|
|
769
|
+
if (!options.dontStartProverNode) {
|
|
770
|
+
await proverNode.start();
|
|
771
|
+
log.info(`Prover node subsystem started`);
|
|
772
|
+
} else {
|
|
773
|
+
log.info(`Prover node subsystem created but not started`);
|
|
774
|
+
}
|
|
775
|
+
}
|
|
710
776
|
const globalVariableBuilder = new GlobalVariableBuilder({
|
|
711
777
|
...config,
|
|
712
778
|
rollupVersion: BigInt(config.rollupVersion),
|
|
713
779
|
l1GenesisTime,
|
|
714
780
|
slotDuration: Number(slotDuration)
|
|
715
781
|
});
|
|
716
|
-
|
|
782
|
+
const node = new AztecNodeService(config, p2pClient, archiver, archiver, archiver, archiver, worldStateSynchronizer, sequencer, proverNode, slasherClient, validatorsSentinel, epochPruneWatcher, ethereumChain.chainInfo.id, config.rollupVersion, globalVariableBuilder, epochCache, packageVersion, proofVerifier, telemetry, log, blobClient, validatorClient, keyStoreManager, debugLogStore);
|
|
783
|
+
return node;
|
|
717
784
|
}
|
|
718
785
|
/**
|
|
719
786
|
* Returns the sequencer client instance.
|
|
@@ -721,6 +788,9 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
721
788
|
*/ getSequencer() {
|
|
722
789
|
return this.sequencer;
|
|
723
790
|
}
|
|
791
|
+
/** Returns the prover node subsystem, if enabled. */ getProverNode() {
|
|
792
|
+
return this.proverNode;
|
|
793
|
+
}
|
|
724
794
|
getBlockSource() {
|
|
725
795
|
return this.blockSource;
|
|
726
796
|
}
|
|
@@ -740,7 +810,10 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
740
810
|
return Promise.resolve(this.p2pClient.getEnr()?.encodeTxt());
|
|
741
811
|
}
|
|
742
812
|
async getAllowedPublicSetup() {
|
|
743
|
-
return
|
|
813
|
+
return [
|
|
814
|
+
...await getDefaultAllowedSetupFunctions(),
|
|
815
|
+
...this.config.txPublicSetupAllowListExtend ?? []
|
|
816
|
+
];
|
|
744
817
|
}
|
|
745
818
|
/**
|
|
746
819
|
* Method to determine if the node is ready to accept transactions.
|
|
@@ -763,33 +836,46 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
763
836
|
rollupVersion,
|
|
764
837
|
enr,
|
|
765
838
|
l1ContractAddresses: contractAddresses,
|
|
766
|
-
protocolContractAddresses: protocolContractAddresses
|
|
839
|
+
protocolContractAddresses: protocolContractAddresses,
|
|
840
|
+
realProofs: !!this.config.realProofs
|
|
767
841
|
};
|
|
768
842
|
return nodeInfo;
|
|
769
843
|
}
|
|
770
844
|
/**
|
|
771
|
-
* Get a block specified by its number.
|
|
772
|
-
* @param
|
|
845
|
+
* Get a block specified by its block number, block hash, or 'latest'.
|
|
846
|
+
* @param block - The block parameter (block number, block hash, or 'latest').
|
|
773
847
|
* @returns The requested block.
|
|
774
|
-
*/ async getBlock(
|
|
775
|
-
|
|
776
|
-
|
|
848
|
+
*/ async getBlock(block) {
|
|
849
|
+
if (BlockHash.isBlockHash(block)) {
|
|
850
|
+
return this.getBlockByHash(block);
|
|
851
|
+
}
|
|
852
|
+
const blockNumber = block === 'latest' ? await this.getBlockNumber() : block;
|
|
853
|
+
if (blockNumber === BlockNumber.ZERO) {
|
|
854
|
+
return this.buildInitialBlock();
|
|
855
|
+
}
|
|
856
|
+
return await this.blockSource.getL2Block(blockNumber);
|
|
777
857
|
}
|
|
778
858
|
/**
|
|
779
859
|
* Get a block specified by its hash.
|
|
780
860
|
* @param blockHash - The block hash being requested.
|
|
781
861
|
* @returns The requested block.
|
|
782
862
|
*/ async getBlockByHash(blockHash) {
|
|
783
|
-
const
|
|
784
|
-
|
|
863
|
+
const initialBlockHash = await this.#getInitialHeaderHash();
|
|
864
|
+
if (blockHash.equals(initialBlockHash)) {
|
|
865
|
+
return this.buildInitialBlock();
|
|
866
|
+
}
|
|
867
|
+
return await this.blockSource.getL2BlockByHash(blockHash);
|
|
868
|
+
}
|
|
869
|
+
buildInitialBlock() {
|
|
870
|
+
const initialHeader = this.worldStateSynchronizer.getCommitted().getInitialHeader();
|
|
871
|
+
return L2Block.empty(initialHeader);
|
|
785
872
|
}
|
|
786
873
|
/**
|
|
787
874
|
* Get a block specified by its archive root.
|
|
788
875
|
* @param archive - The archive root being requested.
|
|
789
876
|
* @returns The requested block.
|
|
790
877
|
*/ async getBlockByArchive(archive) {
|
|
791
|
-
|
|
792
|
-
return publishedBlock?.block;
|
|
878
|
+
return await this.blockSource.getL2BlockByArchive(archive);
|
|
793
879
|
}
|
|
794
880
|
/**
|
|
795
881
|
* Method to request blocks. Will attempt to return all requested blocks but will return only those available.
|
|
@@ -797,19 +883,13 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
797
883
|
* @param limit - The maximum number of blocks to obtain.
|
|
798
884
|
* @returns The blocks requested.
|
|
799
885
|
*/ async getBlocks(from, limit) {
|
|
800
|
-
return await this.blockSource.getBlocks(from, limit) ?? [];
|
|
801
|
-
}
|
|
802
|
-
async getPublishedBlocks(from, limit) {
|
|
803
|
-
return await this.blockSource.getPublishedBlocks(from, limit) ?? [];
|
|
804
|
-
}
|
|
805
|
-
async getPublishedCheckpoints(from, limit) {
|
|
806
|
-
return await this.blockSource.getPublishedCheckpoints(from, limit) ?? [];
|
|
886
|
+
return await this.blockSource.getBlocks(from, BlockNumber(limit)) ?? [];
|
|
807
887
|
}
|
|
808
|
-
async
|
|
809
|
-
return await this.blockSource.
|
|
888
|
+
async getCheckpoints(from, limit) {
|
|
889
|
+
return await this.blockSource.getCheckpoints(from, limit) ?? [];
|
|
810
890
|
}
|
|
811
|
-
async getCheckpointedBlocks(from, limit
|
|
812
|
-
return await this.blockSource.getCheckpointedBlocks(from, limit
|
|
891
|
+
async getCheckpointedBlocks(from, limit) {
|
|
892
|
+
return await this.blockSource.getCheckpointedBlocks(from, limit) ?? [];
|
|
813
893
|
}
|
|
814
894
|
/**
|
|
815
895
|
* Method to fetch the current min L2 fees.
|
|
@@ -835,6 +915,12 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
835
915
|
async getProvenBlockNumber() {
|
|
836
916
|
return await this.blockSource.getProvenBlockNumber();
|
|
837
917
|
}
|
|
918
|
+
async getCheckpointedBlockNumber() {
|
|
919
|
+
return await this.blockSource.getCheckpointedL2BlockNumber();
|
|
920
|
+
}
|
|
921
|
+
getCheckpointNumber() {
|
|
922
|
+
return this.blockSource.getCheckpointNumber();
|
|
923
|
+
}
|
|
838
924
|
/**
|
|
839
925
|
* Method to fetch the version of the package.
|
|
840
926
|
* @returns The node package version
|
|
@@ -859,11 +945,29 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
859
945
|
getContract(address) {
|
|
860
946
|
return this.contractDataSource.getContract(address);
|
|
861
947
|
}
|
|
862
|
-
getPrivateLogsByTags(tags) {
|
|
863
|
-
|
|
864
|
-
|
|
865
|
-
|
|
866
|
-
|
|
948
|
+
async getPrivateLogsByTags(tags, page, referenceBlock) {
|
|
949
|
+
if (referenceBlock) {
|
|
950
|
+
const initialBlockHash = await this.#getInitialHeaderHash();
|
|
951
|
+
if (!referenceBlock.equals(initialBlockHash)) {
|
|
952
|
+
const header = await this.blockSource.getBlockHeaderByHash(referenceBlock);
|
|
953
|
+
if (!header) {
|
|
954
|
+
throw new Error(`Block ${referenceBlock.toString()} not found in the node. This might indicate a reorg has occurred.`);
|
|
955
|
+
}
|
|
956
|
+
}
|
|
957
|
+
}
|
|
958
|
+
return this.logsSource.getPrivateLogsByTags(tags, page);
|
|
959
|
+
}
|
|
960
|
+
async getPublicLogsByTagsFromContract(contractAddress, tags, page, referenceBlock) {
|
|
961
|
+
if (referenceBlock) {
|
|
962
|
+
const initialBlockHash = await this.#getInitialHeaderHash();
|
|
963
|
+
if (!referenceBlock.equals(initialBlockHash)) {
|
|
964
|
+
const header = await this.blockSource.getBlockHeaderByHash(referenceBlock);
|
|
965
|
+
if (!header) {
|
|
966
|
+
throw new Error(`Block ${referenceBlock.toString()} not found in the node. This might indicate a reorg has occurred.`);
|
|
967
|
+
}
|
|
968
|
+
}
|
|
969
|
+
}
|
|
970
|
+
return this.logsSource.getPublicLogsByTagsFromContract(contractAddress, tags, page);
|
|
867
971
|
}
|
|
868
972
|
/**
|
|
869
973
|
* Gets public logs based on the provided filter.
|
|
@@ -898,24 +1002,33 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
898
1002
|
throw new Error(`Invalid tx: ${reason}`);
|
|
899
1003
|
}
|
|
900
1004
|
await this.p2pClient.sendTx(tx);
|
|
901
|
-
|
|
902
|
-
this.
|
|
1005
|
+
const duration = timer.ms();
|
|
1006
|
+
this.metrics.receivedTx(duration, true);
|
|
1007
|
+
this.log.info(`Received tx ${txHash} in ${duration}ms`, {
|
|
903
1008
|
txHash
|
|
904
1009
|
});
|
|
905
1010
|
}
|
|
906
1011
|
async getTxReceipt(txHash) {
|
|
907
|
-
|
|
908
|
-
//
|
|
909
|
-
|
|
910
|
-
|
|
911
|
-
|
|
912
|
-
txReceipt = new TxReceipt(txHash, TxStatus.PENDING, '');
|
|
913
|
-
}
|
|
1012
|
+
// Check the tx pool status first. If the tx is known to the pool (pending or mined), we'll use that
|
|
1013
|
+
// as a fallback if we don't find a settled receipt in the archiver.
|
|
1014
|
+
const txPoolStatus = await this.p2pClient.getTxStatus(txHash);
|
|
1015
|
+
const isKnownToPool = txPoolStatus === 'pending' || txPoolStatus === 'mined';
|
|
1016
|
+
// Then get the actual tx from the archiver, which tracks every tx in a mined block.
|
|
914
1017
|
const settledTxReceipt = await this.blockSource.getSettledTxReceipt(txHash);
|
|
1018
|
+
let receipt;
|
|
915
1019
|
if (settledTxReceipt) {
|
|
916
|
-
|
|
1020
|
+
receipt = settledTxReceipt;
|
|
1021
|
+
} else if (isKnownToPool) {
|
|
1022
|
+
// If the tx is in the pool but not in the archiver, it's pending.
|
|
1023
|
+
// This handles race conditions between archiver and p2p, where the archiver
|
|
1024
|
+
// has pruned the block in which a tx was mined, but p2p has not caught up yet.
|
|
1025
|
+
receipt = new TxReceipt(txHash, TxStatus.PENDING, undefined, undefined);
|
|
1026
|
+
} else {
|
|
1027
|
+
// Otherwise, if we don't know the tx, we consider it dropped.
|
|
1028
|
+
receipt = new TxReceipt(txHash, TxStatus.DROPPED, undefined, 'Tx dropped by P2P node');
|
|
917
1029
|
}
|
|
918
|
-
|
|
1030
|
+
this.debugLogStore.decorateReceiptWithLogs(txHash.toString(), receipt);
|
|
1031
|
+
return receipt;
|
|
919
1032
|
}
|
|
920
1033
|
getTxEffect(txHash) {
|
|
921
1034
|
return this.blockSource.getTxEffect(txHash);
|
|
@@ -929,6 +1042,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
929
1042
|
await tryStop(this.slasherClient);
|
|
930
1043
|
await tryStop(this.proofVerifier);
|
|
931
1044
|
await tryStop(this.sequencer);
|
|
1045
|
+
await tryStop(this.proverNode);
|
|
932
1046
|
await tryStop(this.p2pClient);
|
|
933
1047
|
await tryStop(this.worldStateSynchronizer);
|
|
934
1048
|
await tryStop(this.blockSource);
|
|
@@ -967,15 +1081,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
967
1081
|
*/ async getTxsByHash(txHashes) {
|
|
968
1082
|
return compactArray(await Promise.all(txHashes.map((txHash)=>this.getTxByHash(txHash))));
|
|
969
1083
|
}
|
|
970
|
-
|
|
971
|
-
|
|
972
|
-
* the leaves were inserted.
|
|
973
|
-
* @param blockNumber - The block number at which to get the data or 'latest' for latest data.
|
|
974
|
-
* @param treeId - The tree to search in.
|
|
975
|
-
* @param leafValues - The values to search for.
|
|
976
|
-
* @returns The indices of leaves and the block metadata of a block in which the leaves were inserted.
|
|
977
|
-
*/ async findLeavesIndexes(blockNumber, treeId, leafValues) {
|
|
978
|
-
const committedDb = await this.#getWorldState(blockNumber);
|
|
1084
|
+
async findLeavesIndexes(referenceBlock, treeId, leafValues) {
|
|
1085
|
+
const committedDb = await this.#getWorldState(referenceBlock);
|
|
979
1086
|
const maybeIndices = await committedDb.findLeafIndices(treeId, leafValues.map((x)=>x.toBuffer()));
|
|
980
1087
|
// We filter out undefined values
|
|
981
1088
|
const indices = maybeIndices.filter((x)=>x !== undefined);
|
|
@@ -1018,50 +1125,27 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1018
1125
|
}
|
|
1019
1126
|
return {
|
|
1020
1127
|
l2BlockNumber: BlockNumber(Number(blockNumber)),
|
|
1021
|
-
l2BlockHash:
|
|
1128
|
+
l2BlockHash: new BlockHash(blockHash),
|
|
1022
1129
|
data: index
|
|
1023
1130
|
};
|
|
1024
1131
|
});
|
|
1025
1132
|
}
|
|
1026
|
-
|
|
1027
|
-
|
|
1028
|
-
* @param blockNumber - The block number at which to get the data.
|
|
1029
|
-
* @param leafIndex - The index of the leaf for which the sibling path is required.
|
|
1030
|
-
* @returns The sibling path for the leaf index.
|
|
1031
|
-
*/ async getNullifierSiblingPath(blockNumber, leafIndex) {
|
|
1032
|
-
const committedDb = await this.#getWorldState(blockNumber);
|
|
1033
|
-
return committedDb.getSiblingPath(MerkleTreeId.NULLIFIER_TREE, leafIndex);
|
|
1034
|
-
}
|
|
1035
|
-
/**
|
|
1036
|
-
* Returns a sibling path for the given index in the data tree.
|
|
1037
|
-
* @param blockNumber - The block number at which to get the data.
|
|
1038
|
-
* @param leafIndex - The index of the leaf for which the sibling path is required.
|
|
1039
|
-
* @returns The sibling path for the leaf index.
|
|
1040
|
-
*/ async getNoteHashSiblingPath(blockNumber, leafIndex) {
|
|
1041
|
-
const committedDb = await this.#getWorldState(blockNumber);
|
|
1042
|
-
return committedDb.getSiblingPath(MerkleTreeId.NOTE_HASH_TREE, leafIndex);
|
|
1043
|
-
}
|
|
1044
|
-
async getArchiveMembershipWitness(blockNumber, archive) {
|
|
1045
|
-
const committedDb = await this.#getWorldState(blockNumber);
|
|
1133
|
+
async getBlockHashMembershipWitness(referenceBlock, blockHash) {
|
|
1134
|
+
const committedDb = await this.#getWorldState(referenceBlock);
|
|
1046
1135
|
const [pathAndIndex] = await committedDb.findSiblingPaths(MerkleTreeId.ARCHIVE, [
|
|
1047
|
-
|
|
1136
|
+
blockHash
|
|
1048
1137
|
]);
|
|
1049
1138
|
return pathAndIndex === undefined ? undefined : MembershipWitness.fromSiblingPath(pathAndIndex.index, pathAndIndex.path);
|
|
1050
1139
|
}
|
|
1051
|
-
async getNoteHashMembershipWitness(
|
|
1052
|
-
const committedDb = await this.#getWorldState(
|
|
1140
|
+
async getNoteHashMembershipWitness(referenceBlock, noteHash) {
|
|
1141
|
+
const committedDb = await this.#getWorldState(referenceBlock);
|
|
1053
1142
|
const [pathAndIndex] = await committedDb.findSiblingPaths(MerkleTreeId.NOTE_HASH_TREE, [
|
|
1054
1143
|
noteHash
|
|
1055
1144
|
]);
|
|
1056
1145
|
return pathAndIndex === undefined ? undefined : MembershipWitness.fromSiblingPath(pathAndIndex.index, pathAndIndex.path);
|
|
1057
1146
|
}
|
|
1058
|
-
|
|
1059
|
-
|
|
1060
|
-
* @param blockNumber - The block number at which to get the data.
|
|
1061
|
-
* @param l1ToL2Message - The l1ToL2Message to get the index / sibling path for.
|
|
1062
|
-
* @returns A tuple of the index and the sibling path of the L1ToL2Message (undefined if not found).
|
|
1063
|
-
*/ async getL1ToL2MessageMembershipWitness(blockNumber, l1ToL2Message) {
|
|
1064
|
-
const db = await this.#getWorldState(blockNumber);
|
|
1147
|
+
async getL1ToL2MessageMembershipWitness(referenceBlock, l1ToL2Message) {
|
|
1148
|
+
const db = await this.#getWorldState(referenceBlock);
|
|
1065
1149
|
const [witness] = await db.findSiblingPaths(MerkleTreeId.L1_TO_L2_MESSAGE_TREE, [
|
|
1066
1150
|
l1ToL2Message
|
|
1067
1151
|
]);
|
|
@@ -1074,9 +1158,9 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1074
1158
|
witness.path
|
|
1075
1159
|
];
|
|
1076
1160
|
}
|
|
1077
|
-
async
|
|
1161
|
+
async getL1ToL2MessageCheckpoint(l1ToL2Message) {
|
|
1078
1162
|
const messageIndex = await this.l1ToL2MessageSource.getL1ToL2MessageIndex(l1ToL2Message);
|
|
1079
|
-
return messageIndex ?
|
|
1163
|
+
return messageIndex ? InboxLeaf.checkpointNumberFromIndex(messageIndex) : undefined;
|
|
1080
1164
|
}
|
|
1081
1165
|
/**
|
|
1082
1166
|
* Returns whether an L1 to L2 message is synced by archiver and if it's ready to be included in a block.
|
|
@@ -1091,12 +1175,13 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1091
1175
|
* @param epoch - The epoch at which to get the data.
|
|
1092
1176
|
* @returns The L2 to L1 messages (empty array if the epoch is not found).
|
|
1093
1177
|
*/ async getL2ToL1Messages(epoch) {
|
|
1094
|
-
// Assumes `
|
|
1095
|
-
const
|
|
1178
|
+
// Assumes `getCheckpointedBlocksForEpoch` returns blocks in ascending order of block number.
|
|
1179
|
+
const checkpointedBlocks = await this.blockSource.getCheckpointedBlocksForEpoch(epoch);
|
|
1096
1180
|
const blocksInCheckpoints = [];
|
|
1097
1181
|
let previousSlotNumber = SlotNumber.ZERO;
|
|
1098
1182
|
let checkpointIndex = -1;
|
|
1099
|
-
for (const
|
|
1183
|
+
for (const checkpointedBlock of checkpointedBlocks){
|
|
1184
|
+
const block = checkpointedBlock.block;
|
|
1100
1185
|
const slotNumber = block.header.globalVariables.slotNumber;
|
|
1101
1186
|
if (slotNumber !== previousSlotNumber) {
|
|
1102
1187
|
checkpointIndex++;
|
|
@@ -1107,31 +1192,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1107
1192
|
}
|
|
1108
1193
|
return blocksInCheckpoints.map((blocks)=>blocks.map((block)=>block.body.txEffects.map((txEffect)=>txEffect.l2ToL1Msgs)));
|
|
1109
1194
|
}
|
|
1110
|
-
|
|
1111
|
-
|
|
1112
|
-
* @param blockNumber - The block number at which to get the data.
|
|
1113
|
-
* @param leafIndex - Index of the leaf in the tree.
|
|
1114
|
-
* @returns The sibling path.
|
|
1115
|
-
*/ async getArchiveSiblingPath(blockNumber, leafIndex) {
|
|
1116
|
-
const committedDb = await this.#getWorldState(blockNumber);
|
|
1117
|
-
return committedDb.getSiblingPath(MerkleTreeId.ARCHIVE, leafIndex);
|
|
1118
|
-
}
|
|
1119
|
-
/**
|
|
1120
|
-
* Returns a sibling path for a leaf in the committed public data tree.
|
|
1121
|
-
* @param blockNumber - The block number at which to get the data.
|
|
1122
|
-
* @param leafIndex - Index of the leaf in the tree.
|
|
1123
|
-
* @returns The sibling path.
|
|
1124
|
-
*/ async getPublicDataSiblingPath(blockNumber, leafIndex) {
|
|
1125
|
-
const committedDb = await this.#getWorldState(blockNumber);
|
|
1126
|
-
return committedDb.getSiblingPath(MerkleTreeId.PUBLIC_DATA_TREE, leafIndex);
|
|
1127
|
-
}
|
|
1128
|
-
/**
|
|
1129
|
-
* Returns a nullifier membership witness for a given nullifier at a given block.
|
|
1130
|
-
* @param blockNumber - The block number at which to get the index.
|
|
1131
|
-
* @param nullifier - Nullifier we try to find witness for.
|
|
1132
|
-
* @returns The nullifier membership witness (if found).
|
|
1133
|
-
*/ async getNullifierMembershipWitness(blockNumber, nullifier) {
|
|
1134
|
-
const db = await this.#getWorldState(blockNumber);
|
|
1195
|
+
async getNullifierMembershipWitness(referenceBlock, nullifier) {
|
|
1196
|
+
const db = await this.#getWorldState(referenceBlock);
|
|
1135
1197
|
const [witness] = await db.findSiblingPaths(MerkleTreeId.NULLIFIER_TREE, [
|
|
1136
1198
|
nullifier.toBuffer()
|
|
1137
1199
|
]);
|
|
@@ -1147,7 +1209,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1147
1209
|
}
|
|
1148
1210
|
/**
|
|
1149
1211
|
* Returns a low nullifier membership witness for a given nullifier at a given block.
|
|
1150
|
-
* @param
|
|
1212
|
+
* @param referenceBlock - The block parameter (block number, block hash, or 'latest') at which to get the data
|
|
1213
|
+
* (which contains the root of the nullifier tree in which we are searching for the nullifier).
|
|
1151
1214
|
* @param nullifier - Nullifier we try to find the low nullifier witness for.
|
|
1152
1215
|
* @returns The low nullifier membership witness (if found).
|
|
1153
1216
|
* @remarks Low nullifier witness can be used to perform a nullifier non-inclusion proof by leveraging the "linked
|
|
@@ -1158,8 +1221,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1158
1221
|
* the nullifier already exists in the tree. This is because the `getPreviousValueIndex` function returns the
|
|
1159
1222
|
* index of the nullifier itself when it already exists in the tree.
|
|
1160
1223
|
* TODO: This is a confusing behavior and we should eventually address that.
|
|
1161
|
-
*/ async getLowNullifierMembershipWitness(
|
|
1162
|
-
const committedDb = await this.#getWorldState(
|
|
1224
|
+
*/ async getLowNullifierMembershipWitness(referenceBlock, nullifier) {
|
|
1225
|
+
const committedDb = await this.#getWorldState(referenceBlock);
|
|
1163
1226
|
const findResult = await committedDb.getPreviousValueIndex(MerkleTreeId.NULLIFIER_TREE, nullifier.toBigInt());
|
|
1164
1227
|
if (!findResult) {
|
|
1165
1228
|
return undefined;
|
|
@@ -1172,8 +1235,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1172
1235
|
const siblingPath = await committedDb.getSiblingPath(MerkleTreeId.NULLIFIER_TREE, BigInt(index));
|
|
1173
1236
|
return new NullifierMembershipWitness(BigInt(index), preimageData, siblingPath);
|
|
1174
1237
|
}
|
|
1175
|
-
async getPublicDataWitness(
|
|
1176
|
-
const committedDb = await this.#getWorldState(
|
|
1238
|
+
async getPublicDataWitness(referenceBlock, leafSlot) {
|
|
1239
|
+
const committedDb = await this.#getWorldState(referenceBlock);
|
|
1177
1240
|
const lowLeafResult = await committedDb.getPreviousValueIndex(MerkleTreeId.PUBLIC_DATA_TREE, leafSlot.toBigInt());
|
|
1178
1241
|
if (!lowLeafResult) {
|
|
1179
1242
|
return undefined;
|
|
@@ -1183,18 +1246,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1183
1246
|
return new PublicDataWitness(lowLeafResult.index, preimage, path);
|
|
1184
1247
|
}
|
|
1185
1248
|
}
|
|
1186
|
-
|
|
1187
|
-
|
|
1188
|
-
*
|
|
1189
|
-
* @remarks The storage slot here refers to the slot as it is defined in Noir not the index in the merkle tree.
|
|
1190
|
-
* Aztec's version of `eth_getStorageAt`.
|
|
1191
|
-
*
|
|
1192
|
-
* @param contract - Address of the contract to query.
|
|
1193
|
-
* @param slot - Slot to query.
|
|
1194
|
-
* @param blockNumber - The block number at which to get the data or 'latest'.
|
|
1195
|
-
* @returns Storage value at the given contract slot.
|
|
1196
|
-
*/ async getPublicStorageAt(blockNumber, contract, slot) {
|
|
1197
|
-
const committedDb = await this.#getWorldState(blockNumber);
|
|
1249
|
+
async getPublicStorageAt(referenceBlock, contract, slot) {
|
|
1250
|
+
const committedDb = await this.#getWorldState(referenceBlock);
|
|
1198
1251
|
const leafSlot = await computePublicDataTreeLeafSlot(contract, slot);
|
|
1199
1252
|
const lowLeafResult = await committedDb.getPreviousValueIndex(MerkleTreeId.PUBLIC_DATA_TREE, leafSlot.toBigInt());
|
|
1200
1253
|
if (!lowLeafResult || !lowLeafResult.alreadyPresent) {
|
|
@@ -1203,18 +1256,22 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1203
1256
|
const preimage = await committedDb.getLeafPreimage(MerkleTreeId.PUBLIC_DATA_TREE, lowLeafResult.index);
|
|
1204
1257
|
return preimage.leaf.value;
|
|
1205
1258
|
}
|
|
1206
|
-
|
|
1207
|
-
|
|
1208
|
-
|
|
1209
|
-
|
|
1210
|
-
|
|
1211
|
-
|
|
1212
|
-
|
|
1213
|
-
|
|
1214
|
-
|
|
1215
|
-
|
|
1216
|
-
|
|
1217
|
-
|
|
1259
|
+
async getBlockHeader(block = 'latest') {
|
|
1260
|
+
if (BlockHash.isBlockHash(block)) {
|
|
1261
|
+
const initialBlockHash = await this.#getInitialHeaderHash();
|
|
1262
|
+
if (block.equals(initialBlockHash)) {
|
|
1263
|
+
// Block source doesn't handle initial header so we need to handle the case separately.
|
|
1264
|
+
return this.worldStateSynchronizer.getCommitted().getInitialHeader();
|
|
1265
|
+
}
|
|
1266
|
+
return this.blockSource.getBlockHeaderByHash(block);
|
|
1267
|
+
} else {
|
|
1268
|
+
// Block source doesn't handle initial header so we need to handle the case separately.
|
|
1269
|
+
const blockNumber = block === 'latest' ? await this.getBlockNumber() : block;
|
|
1270
|
+
if (blockNumber === BlockNumber.ZERO) {
|
|
1271
|
+
return this.worldStateSynchronizer.getCommitted().getInitialHeader();
|
|
1272
|
+
}
|
|
1273
|
+
return this.blockSource.getBlockHeader(block);
|
|
1274
|
+
}
|
|
1218
1275
|
}
|
|
1219
1276
|
/**
|
|
1220
1277
|
* Get a block header specified by its archive root.
|
|
@@ -1223,6 +1280,12 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1223
1280
|
*/ async getBlockHeaderByArchive(archive) {
|
|
1224
1281
|
return await this.blockSource.getBlockHeaderByArchive(archive);
|
|
1225
1282
|
}
|
|
1283
|
+
getBlockData(number) {
|
|
1284
|
+
return this.blockSource.getBlockData(number);
|
|
1285
|
+
}
|
|
1286
|
+
getBlockDataByArchive(archive) {
|
|
1287
|
+
return this.blockSource.getBlockDataByArchive(archive);
|
|
1288
|
+
}
|
|
1226
1289
|
/**
|
|
1227
1290
|
* Simulates the public part of a transaction with the current state.
|
|
1228
1291
|
* @param tx - The transaction to simulate.
|
|
@@ -1235,17 +1298,20 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1235
1298
|
throw new BadRequestError(`Transaction total gas limit ${txGasLimit + teardownGasLimit} (${txGasLimit} + ${teardownGasLimit}) exceeds maximum gas limit ${this.config.rpcSimulatePublicMaxGasLimit} for simulation`);
|
|
1236
1299
|
}
|
|
1237
1300
|
const txHash = tx.getTxHash();
|
|
1238
|
-
const
|
|
1301
|
+
const latestBlockNumber = await this.blockSource.getBlockNumber();
|
|
1302
|
+
const blockNumber = BlockNumber.add(latestBlockNumber, 1);
|
|
1239
1303
|
// If sequencer is not initialized, we just set these values to zero for simulation.
|
|
1240
1304
|
const coinbase = EthAddress.ZERO;
|
|
1241
1305
|
const feeRecipient = AztecAddress.ZERO;
|
|
1242
1306
|
const newGlobalVariables = await this.globalVariableBuilder.buildGlobalVariables(blockNumber, coinbase, feeRecipient);
|
|
1243
|
-
const publicProcessorFactory = new PublicProcessorFactory(this.contractDataSource, new DateProvider(), this.telemetry);
|
|
1307
|
+
const publicProcessorFactory = new PublicProcessorFactory(this.contractDataSource, new DateProvider(), this.telemetry, this.log.getBindings());
|
|
1244
1308
|
this.log.verbose(`Simulating public calls for tx ${txHash}`, {
|
|
1245
1309
|
globalVariables: newGlobalVariables.toInspect(),
|
|
1246
1310
|
txHash,
|
|
1247
1311
|
blockNumber
|
|
1248
1312
|
});
|
|
1313
|
+
// Ensure world-state has caught up with the latest block we loaded from the archiver
|
|
1314
|
+
await this.worldStateSynchronizer.syncImmediate(latestBlockNumber);
|
|
1249
1315
|
const merkleTreeFork = await this.worldStateSynchronizer.fork();
|
|
1250
1316
|
try {
|
|
1251
1317
|
const config = PublicSimulatorConfig.from({
|
|
@@ -1260,7 +1326,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1260
1326
|
});
|
|
1261
1327
|
const processor = publicProcessorFactory.create(merkleTreeFork, newGlobalVariables, config);
|
|
1262
1328
|
// REFACTOR: Consider merging ProcessReturnValues into ProcessedTx
|
|
1263
|
-
const [processedTxs, failedTxs, _usedTxs, returns] = await processor.process([
|
|
1329
|
+
const [processedTxs, failedTxs, _usedTxs, returns, debugLogs] = await processor.process([
|
|
1264
1330
|
tx
|
|
1265
1331
|
]);
|
|
1266
1332
|
// REFACTOR: Consider returning the error rather than throwing
|
|
@@ -1271,7 +1337,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1271
1337
|
throw failedTxs[0].error;
|
|
1272
1338
|
}
|
|
1273
1339
|
const [processedTx] = processedTxs;
|
|
1274
|
-
return new PublicSimulationOutput(processedTx.revertReason, processedTx.globalVariables, processedTx.txEffect, returns, processedTx.gasUsed);
|
|
1340
|
+
return new PublicSimulationOutput(processedTx.revertReason, processedTx.globalVariables, processedTx.txEffect, returns, processedTx.gasUsed, debugLogs);
|
|
1275
1341
|
} finally{
|
|
1276
1342
|
await merkleTreeFork.close();
|
|
1277
1343
|
}
|
|
@@ -1279,19 +1345,22 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1279
1345
|
async isValidTx(tx, { isSimulation, skipFeeEnforcement } = {}) {
|
|
1280
1346
|
const db = this.worldStateSynchronizer.getCommitted();
|
|
1281
1347
|
const verifier = isSimulation ? undefined : this.proofVerifier;
|
|
1282
|
-
// We accept transactions if they are not expired by the next slot (checked based on the
|
|
1348
|
+
// We accept transactions if they are not expired by the next slot (checked based on the ExpirationTimestamp field)
|
|
1283
1349
|
const { ts: nextSlotTimestamp } = this.epochCache.getEpochAndSlotInNextL1Slot();
|
|
1284
1350
|
const blockNumber = BlockNumber(await this.blockSource.getBlockNumber() + 1);
|
|
1285
|
-
const validator =
|
|
1351
|
+
const validator = createTxValidatorForAcceptingTxsOverRPC(db, this.contractDataSource, verifier, {
|
|
1286
1352
|
timestamp: nextSlotTimestamp,
|
|
1287
1353
|
blockNumber,
|
|
1288
1354
|
l1ChainId: this.l1ChainId,
|
|
1289
1355
|
rollupVersion: this.version,
|
|
1290
|
-
setupAllowList:
|
|
1356
|
+
setupAllowList: [
|
|
1357
|
+
...await getDefaultAllowedSetupFunctions(),
|
|
1358
|
+
...this.config.txPublicSetupAllowListExtend ?? []
|
|
1359
|
+
],
|
|
1291
1360
|
gasFees: await this.getCurrentMinFees(),
|
|
1292
1361
|
skipFeeEnforcement,
|
|
1293
1362
|
txsPermitted: !this.config.disableTransactions
|
|
1294
|
-
});
|
|
1363
|
+
}, this.log.getBindings());
|
|
1295
1364
|
return await validator.validateTx(tx);
|
|
1296
1365
|
}
|
|
1297
1366
|
getConfig() {
|
|
@@ -1433,14 +1502,84 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1433
1502
|
return this.slasherClient.gatherOffensesForRound(round === 'current' ? undefined : BigInt(round));
|
|
1434
1503
|
}
|
|
1435
1504
|
}
|
|
1505
|
+
async reloadKeystore() {
|
|
1506
|
+
if (!this.config.keyStoreDirectory?.length) {
|
|
1507
|
+
throw new BadRequestError('Cannot reload keystore: node is not using a file-based keystore. ' + 'Set KEY_STORE_DIRECTORY to use file-based keystores.');
|
|
1508
|
+
}
|
|
1509
|
+
if (!this.validatorClient) {
|
|
1510
|
+
throw new BadRequestError('Cannot reload keystore: validator is not enabled.');
|
|
1511
|
+
}
|
|
1512
|
+
this.log.info('Reloading keystore from disk');
|
|
1513
|
+
// Re-read and validate keystore files
|
|
1514
|
+
const keyStores = loadKeystores(this.config.keyStoreDirectory);
|
|
1515
|
+
const newManager = new KeystoreManager(mergeKeystores(keyStores));
|
|
1516
|
+
await newManager.validateSigners();
|
|
1517
|
+
ValidatorClient.validateKeyStoreConfiguration(newManager, this.log);
|
|
1518
|
+
// Validate that every validator's publisher keys overlap with the L1 signers
|
|
1519
|
+
// that were initialized at startup. Publishers cannot be hot-reloaded, so a
|
|
1520
|
+
// validator with a publisher key that doesn't match any existing L1 signer
|
|
1521
|
+
// would silently fail on every proposer slot.
|
|
1522
|
+
if (this.keyStoreManager && this.sequencer) {
|
|
1523
|
+
const oldAdapter = NodeKeystoreAdapter.fromKeyStoreManager(this.keyStoreManager);
|
|
1524
|
+
const availablePublishers = new Set(oldAdapter.getAttesterAddresses().flatMap((a)=>oldAdapter.getPublisherAddresses(a).map((p)=>p.toString().toLowerCase())));
|
|
1525
|
+
const newAdapter = NodeKeystoreAdapter.fromKeyStoreManager(newManager);
|
|
1526
|
+
for (const attester of newAdapter.getAttesterAddresses()){
|
|
1527
|
+
const pubs = newAdapter.getPublisherAddresses(attester);
|
|
1528
|
+
if (pubs.length > 0 && !pubs.some((p)=>availablePublishers.has(p.toString().toLowerCase()))) {
|
|
1529
|
+
throw new BadRequestError(`Cannot reload keystore: validator ${attester} has publisher keys ` + `[${pubs.map((p)=>p.toString()).join(', ')}] but none match the L1 signers initialized at startup ` + `[${[
|
|
1530
|
+
...availablePublishers
|
|
1531
|
+
].join(', ')}]. Publishers cannot be hot-reloaded — ` + `use an existing publisher key or restart the node.`);
|
|
1532
|
+
}
|
|
1533
|
+
}
|
|
1534
|
+
}
|
|
1535
|
+
// Build adapters for old and new keystores to compute diff
|
|
1536
|
+
const newAdapter = NodeKeystoreAdapter.fromKeyStoreManager(newManager);
|
|
1537
|
+
const newAddresses = newAdapter.getAttesterAddresses();
|
|
1538
|
+
const oldAddresses = this.keyStoreManager ? NodeKeystoreAdapter.fromKeyStoreManager(this.keyStoreManager).getAttesterAddresses() : [];
|
|
1539
|
+
const oldSet = new Set(oldAddresses.map((a)=>a.toString()));
|
|
1540
|
+
const newSet = new Set(newAddresses.map((a)=>a.toString()));
|
|
1541
|
+
const added = newAddresses.filter((a)=>!oldSet.has(a.toString()));
|
|
1542
|
+
const removed = oldAddresses.filter((a)=>!newSet.has(a.toString()));
|
|
1543
|
+
if (added.length > 0) {
|
|
1544
|
+
this.log.info(`Keystore reload: adding attester keys: ${added.map((a)=>a.toString()).join(', ')}`);
|
|
1545
|
+
}
|
|
1546
|
+
if (removed.length > 0) {
|
|
1547
|
+
this.log.info(`Keystore reload: removing attester keys: ${removed.map((a)=>a.toString()).join(', ')}`);
|
|
1548
|
+
}
|
|
1549
|
+
if (added.length === 0 && removed.length === 0) {
|
|
1550
|
+
this.log.info('Keystore reload: attester keys unchanged');
|
|
1551
|
+
}
|
|
1552
|
+
// Update the validator client (coinbase, feeRecipient, attester keys)
|
|
1553
|
+
this.validatorClient.reloadKeystore(newManager);
|
|
1554
|
+
// Update the publisher factory's keystore so newly-added validators
|
|
1555
|
+
// can be matched to existing publisher keys when proposing blocks.
|
|
1556
|
+
if (this.sequencer) {
|
|
1557
|
+
this.sequencer.updatePublisherNodeKeyStore(newAdapter);
|
|
1558
|
+
}
|
|
1559
|
+
// Update slasher's "don't-slash-self" list with new validator addresses
|
|
1560
|
+
if (this.slasherClient && !this.config.slashSelfAllowed) {
|
|
1561
|
+
const slashValidatorsNever = unique([
|
|
1562
|
+
...this.config.slashValidatorsNever ?? [],
|
|
1563
|
+
...newAddresses
|
|
1564
|
+
].map((a)=>a.toString())).map(EthAddress.fromString);
|
|
1565
|
+
this.slasherClient.updateConfig({
|
|
1566
|
+
slashValidatorsNever
|
|
1567
|
+
});
|
|
1568
|
+
}
|
|
1569
|
+
this.keyStoreManager = newManager;
|
|
1570
|
+
this.log.info('Keystore reloaded: coinbase, feeRecipient, and attester keys updated');
|
|
1571
|
+
}
|
|
1572
|
+
#getInitialHeaderHash() {
|
|
1573
|
+
if (!this.initialHeaderHashPromise) {
|
|
1574
|
+
this.initialHeaderHashPromise = this.worldStateSynchronizer.getCommitted().getInitialHeader().hash();
|
|
1575
|
+
}
|
|
1576
|
+
return this.initialHeaderHashPromise;
|
|
1577
|
+
}
|
|
1436
1578
|
/**
|
|
1437
1579
|
* Returns an instance of MerkleTreeOperations having first ensured the world state is fully synched
|
|
1438
|
-
* @param
|
|
1580
|
+
* @param block - The block parameter (block number, block hash, or 'latest') at which to get the data.
|
|
1439
1581
|
* @returns An instance of a committed MerkleTreeOperations
|
|
1440
|
-
*/ async #getWorldState(
|
|
1441
|
-
if (typeof blockNumber === 'number' && blockNumber < INITIAL_L2_BLOCK_NUM - 1) {
|
|
1442
|
-
throw new Error('Invalid block number to get world state for: ' + blockNumber);
|
|
1443
|
-
}
|
|
1582
|
+
*/ async #getWorldState(block) {
|
|
1444
1583
|
let blockSyncedTo = BlockNumber.ZERO;
|
|
1445
1584
|
try {
|
|
1446
1585
|
// Attempt to sync the world state if necessary
|
|
@@ -1448,15 +1587,32 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1448
1587
|
} catch (err) {
|
|
1449
1588
|
this.log.error(`Error getting world state: ${err}`);
|
|
1450
1589
|
}
|
|
1451
|
-
|
|
1452
|
-
|
|
1453
|
-
this.log.debug(`Using committed db for block ${blockNumber}, world state synced upto ${blockSyncedTo}`);
|
|
1590
|
+
if (block === 'latest') {
|
|
1591
|
+
this.log.debug(`Using committed db for block 'latest', world state synced upto ${blockSyncedTo}`);
|
|
1454
1592
|
return this.worldStateSynchronizer.getCommitted();
|
|
1455
|
-
}
|
|
1593
|
+
}
|
|
1594
|
+
if (BlockHash.isBlockHash(block)) {
|
|
1595
|
+
const initialBlockHash = await this.#getInitialHeaderHash();
|
|
1596
|
+
if (block.equals(initialBlockHash)) {
|
|
1597
|
+
// Block source doesn't handle initial header so we need to handle the case separately.
|
|
1598
|
+
return this.worldStateSynchronizer.getSnapshot(BlockNumber.ZERO);
|
|
1599
|
+
}
|
|
1600
|
+
const header = await this.blockSource.getBlockHeaderByHash(block);
|
|
1601
|
+
if (!header) {
|
|
1602
|
+
throw new Error(`Block hash ${block.toString()} not found when querying world state. If the node API has been queried with anchor block hash possibly a reorg has occurred.`);
|
|
1603
|
+
}
|
|
1604
|
+
const blockNumber = header.getBlockNumber();
|
|
1605
|
+
this.log.debug(`Using snapshot for block ${blockNumber}, world state synced upto ${blockSyncedTo}`);
|
|
1606
|
+
return this.worldStateSynchronizer.getSnapshot(blockNumber);
|
|
1607
|
+
}
|
|
1608
|
+
// Block number provided
|
|
1609
|
+
{
|
|
1610
|
+
const blockNumber = block;
|
|
1611
|
+
if (blockNumber > blockSyncedTo) {
|
|
1612
|
+
throw new Error(`Queried block ${block} not yet synced by the node (node is synced upto ${blockSyncedTo}).`);
|
|
1613
|
+
}
|
|
1456
1614
|
this.log.debug(`Using snapshot for block ${blockNumber}, world state synced upto ${blockSyncedTo}`);
|
|
1457
1615
|
return this.worldStateSynchronizer.getSnapshot(blockNumber);
|
|
1458
|
-
} else {
|
|
1459
|
-
throw new Error(`Block ${blockNumber} not yet synced`);
|
|
1460
1616
|
}
|
|
1461
1617
|
}
|
|
1462
1618
|
/**
|