@aztec/aztec-node 0.0.1-commit.9593d84 → 0.0.1-commit.967fc6998

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,43 +1,36 @@
1
1
  import { Archiver, createArchiver } from '@aztec/archiver';
2
2
  import { BBCircuitVerifier, QueuedIVCVerifier, TestCircuitVerifier } from '@aztec/bb-prover';
3
- import { type BlobSinkClientInterface, createBlobSinkClient } from '@aztec/blob-sink/client';
4
- import {
5
- ARCHIVE_HEIGHT,
6
- INITIAL_L2_BLOCK_NUM,
7
- type L1_TO_L2_MSG_TREE_HEIGHT,
8
- type NOTE_HASH_TREE_HEIGHT,
9
- type NULLIFIER_TREE_HEIGHT,
10
- type PUBLIC_DATA_TREE_HEIGHT,
11
- } from '@aztec/constants';
3
+ import { type BlobClientInterface, createBlobClientWithFileStores } from '@aztec/blob-client/client';
4
+ import { Blob } from '@aztec/blob-lib';
5
+ import { ARCHIVE_HEIGHT, type L1_TO_L2_MSG_TREE_HEIGHT, type NOTE_HASH_TREE_HEIGHT } from '@aztec/constants';
12
6
  import { EpochCache, type EpochCacheInterface } from '@aztec/epoch-cache';
13
- import {
14
- type L1ContractAddresses,
15
- RegistryContract,
16
- RollupContract,
17
- createEthereumChain,
18
- getPublicClient,
19
- } from '@aztec/ethereum';
20
- import { SlotNumber } from '@aztec/foundation/branded-types';
21
- import { compactArray, pick } from '@aztec/foundation/collection';
7
+ import { createEthereumChain } from '@aztec/ethereum/chain';
8
+ import { getPublicClient } from '@aztec/ethereum/client';
9
+ import { RegistryContract, RollupContract } from '@aztec/ethereum/contracts';
10
+ import type { L1ContractAddresses } from '@aztec/ethereum/l1-contract-addresses';
11
+ import { BlockNumber, CheckpointNumber, EpochNumber, SlotNumber } from '@aztec/foundation/branded-types';
12
+ import { compactArray, pick, unique } from '@aztec/foundation/collection';
13
+ import { Fr } from '@aztec/foundation/curves/bn254';
22
14
  import { EthAddress } from '@aztec/foundation/eth-address';
23
- import { Fr } from '@aztec/foundation/fields';
24
15
  import { BadRequestError } from '@aztec/foundation/json-rpc';
25
16
  import { type Logger, createLogger } from '@aztec/foundation/log';
26
17
  import { count } from '@aztec/foundation/string';
27
18
  import { DateProvider, Timer } from '@aztec/foundation/timer';
28
19
  import { MembershipWitness, SiblingPath } from '@aztec/foundation/trees';
29
- import { KeystoreManager, loadKeystores, mergeKeystores } from '@aztec/node-keystore';
20
+ import { type KeyStore, KeystoreManager, loadKeystores, mergeKeystores } from '@aztec/node-keystore';
30
21
  import { trySnapshotSync, uploadSnapshot } from '@aztec/node-lib/actions';
31
- import { createL1TxUtilsWithBlobsFromEthSigner } from '@aztec/node-lib/factories';
32
- import { type P2P, type P2PClientDeps, createP2PClient, getDefaultAllowedSetupFunctions } from '@aztec/p2p';
33
- import { ProtocolContractAddress } from '@aztec/protocol-contracts';
22
+ import { createForwarderL1TxUtilsFromSigners, createL1TxUtilsFromSigners } from '@aztec/node-lib/factories';
34
23
  import {
35
- BlockBuilder,
36
- GlobalVariableBuilder,
37
- SequencerClient,
38
- type SequencerPublisher,
39
- createValidatorForAcceptingTxs,
40
- } from '@aztec/sequencer-client';
24
+ type P2P,
25
+ type P2PClientDeps,
26
+ createP2PClient,
27
+ createTxValidatorForAcceptingTxsOverRPC,
28
+ getDefaultAllowedSetupFunctions,
29
+ } from '@aztec/p2p';
30
+ import { ProtocolContractAddress } from '@aztec/protocol-contracts';
31
+ import { type ProverNode, type ProverNodeDeps, createProverNode } from '@aztec/prover-node';
32
+ import { createKeyStoreForProver } from '@aztec/prover-node/config';
33
+ import { GlobalVariableBuilder, SequencerClient, type SequencerPublisher } from '@aztec/sequencer-client';
41
34
  import { PublicProcessorFactory } from '@aztec/simulator/server';
42
35
  import {
43
36
  AttestationsBlockWatcher,
@@ -46,16 +39,17 @@ import {
46
39
  type Watcher,
47
40
  createSlasher,
48
41
  } from '@aztec/slasher';
49
- import { PublicSimulatorConfig } from '@aztec/stdlib/avm';
42
+ import { CollectionLimitsConfig, PublicSimulatorConfig } from '@aztec/stdlib/avm';
50
43
  import { AztecAddress } from '@aztec/stdlib/aztec-address';
51
44
  import {
52
- type InBlock,
53
- type L2Block,
54
- L2BlockHash,
55
- type L2BlockNumber,
45
+ type BlockData,
46
+ BlockHash,
47
+ type BlockParameter,
48
+ type DataInBlock,
49
+ L2Block,
56
50
  type L2BlockSource,
57
- type PublishedL2Block,
58
51
  } from '@aztec/stdlib/block';
52
+ import type { PublishedCheckpoint } from '@aztec/stdlib/checkpoint';
59
53
  import type {
60
54
  ContractClassPublic,
61
55
  ContractDataSource,
@@ -63,7 +57,7 @@ import type {
63
57
  NodeInfo,
64
58
  ProtocolContractAddresses,
65
59
  } from '@aztec/stdlib/contract';
66
- import type { GasFees } from '@aztec/stdlib/gas';
60
+ import { GasFees } from '@aztec/stdlib/gas';
67
61
  import { computePublicDataTreeLeafSlot } from '@aztec/stdlib/hash';
68
62
  import {
69
63
  type AztecNode,
@@ -82,9 +76,9 @@ import {
82
76
  type WorldStateSynchronizer,
83
77
  tryStop,
84
78
  } from '@aztec/stdlib/interfaces/server';
85
- import type { LogFilter, PrivateLog, TxScopedL2Log } from '@aztec/stdlib/logs';
79
+ import type { DebugLogStore, LogFilter, SiloedTag, Tag, TxScopedL2Log } from '@aztec/stdlib/logs';
80
+ import { InMemoryDebugLogStore, NullDebugLogStore } from '@aztec/stdlib/logs';
86
81
  import { InboxLeaf, type L1ToL2MessageSource } from '@aztec/stdlib/messaging';
87
- import { P2PClientType } from '@aztec/stdlib/p2p';
88
82
  import type { Offense, SlashPayloadRound } from '@aztec/stdlib/slashing';
89
83
  import type { NullifierLeafPreimage, PublicDataTreeLeaf, PublicDataTreeLeafPreimage } from '@aztec/stdlib/trees';
90
84
  import { MerkleTreeId, NullifierMembershipWitness, PublicDataWitness } from '@aztec/stdlib/trees';
@@ -110,6 +104,8 @@ import {
110
104
  trackSpan,
111
105
  } from '@aztec/telemetry-client';
112
106
  import {
107
+ FullNodeCheckpointsBuilder as CheckpointsBuilder,
108
+ FullNodeCheckpointsBuilder,
113
109
  NodeKeystoreAdapter,
114
110
  ValidatorClient,
115
111
  createBlockProposalHandler,
@@ -129,6 +125,7 @@ import { NodeMetrics } from './node_metrics.js';
129
125
  */
130
126
  export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
131
127
  private metrics: NodeMetrics;
128
+ private initialHeaderHashPromise: Promise<BlockHash> | undefined = undefined;
132
129
 
133
130
  // Prevent two snapshot operations to happen simultaneously
134
131
  private isUploadingSnapshot = false;
@@ -144,6 +141,7 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
144
141
  protected readonly l1ToL2MessageSource: L1ToL2MessageSource,
145
142
  protected readonly worldStateSynchronizer: WorldStateSynchronizer,
146
143
  protected readonly sequencer: SequencerClient | undefined,
144
+ protected readonly proverNode: ProverNode | undefined,
147
145
  protected readonly slasherClient: SlasherClientInterface | undefined,
148
146
  protected readonly validatorsSentinel: Sentinel | undefined,
149
147
  protected readonly epochPruneWatcher: EpochPruneWatcher | undefined,
@@ -155,12 +153,23 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
155
153
  private proofVerifier: ClientProtocolCircuitVerifier,
156
154
  private telemetry: TelemetryClient = getTelemetryClient(),
157
155
  private log = createLogger('node'),
156
+ private blobClient?: BlobClientInterface,
157
+ private validatorClient?: ValidatorClient,
158
+ private keyStoreManager?: KeystoreManager,
159
+ private debugLogStore: DebugLogStore = new NullDebugLogStore(),
158
160
  ) {
159
161
  this.metrics = new NodeMetrics(telemetry, 'AztecNodeService');
160
162
  this.tracer = telemetry.getTracer('AztecNodeService');
161
163
 
162
164
  this.log.info(`Aztec Node version: ${this.packageVersion}`);
163
165
  this.log.info(`Aztec Node started on chain 0x${l1ChainId.toString(16)}`, config.l1Contracts);
166
+
167
+ // A defensive check that protects us against introducing a bug in the complex `createAndSync` function. We must
168
+ // never have debugLogStore enabled when not in test mode because then we would be accumulating debug logs in
169
+ // memory which could be a DoS vector on the sequencer (since no fees are paid for debug logs).
170
+ if (debugLogStore.isEnabled && config.realProofs) {
171
+ throw new Error('debugLogStore should never be enabled when realProofs are set');
172
+ }
164
173
  }
165
174
 
166
175
  public async getWorldStateSyncStatus(): Promise<WorldStateSyncStatus> {
@@ -184,12 +193,13 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
184
193
  logger?: Logger;
185
194
  publisher?: SequencerPublisher;
186
195
  dateProvider?: DateProvider;
187
- blobSinkClient?: BlobSinkClientInterface;
188
- p2pClientDeps?: P2PClientDeps<P2PClientType.Full>;
196
+ p2pClientDeps?: P2PClientDeps;
197
+ proverNodeDeps?: Partial<ProverNodeDeps>;
189
198
  } = {},
190
199
  options: {
191
200
  prefilledPublicData?: PublicDataTreeLeaf[];
192
201
  dontStartSequencer?: boolean;
202
+ dontStartProverNode?: boolean;
193
203
  } = {},
194
204
  ): Promise<AztecNodeService> {
195
205
  const config = { ...inputConfig }; // Copy the config so we dont mutate the input object
@@ -197,20 +207,31 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
197
207
  const packageVersion = getPackageVersion() ?? '';
198
208
  const telemetry = deps.telemetry ?? getTelemetryClient();
199
209
  const dateProvider = deps.dateProvider ?? new DateProvider();
200
- const blobSinkClient =
201
- deps.blobSinkClient ?? createBlobSinkClient(config, { logger: createLogger('node:blob-sink:client') });
202
210
  const ethereumChain = createEthereumChain(config.l1RpcUrls, config.l1ChainId);
203
211
 
204
- // Build a key store from file if given or from environment otherwise
212
+ // Build a key store from file if given or from environment otherwise.
213
+ // We keep the raw KeyStore available so we can merge with prover keys if enableProverNode is set.
205
214
  let keyStoreManager: KeystoreManager | undefined;
206
215
  const keyStoreProvided = config.keyStoreDirectory !== undefined && config.keyStoreDirectory.length > 0;
207
216
  if (keyStoreProvided) {
208
217
  const keyStores = loadKeystores(config.keyStoreDirectory!);
209
218
  keyStoreManager = new KeystoreManager(mergeKeystores(keyStores));
210
219
  } else {
211
- const keyStore = createKeyStoreForValidator(config);
212
- if (keyStore) {
213
- keyStoreManager = new KeystoreManager(keyStore);
220
+ const rawKeyStores: KeyStore[] = [];
221
+ const validatorKeyStore = createKeyStoreForValidator(config);
222
+ if (validatorKeyStore) {
223
+ rawKeyStores.push(validatorKeyStore);
224
+ }
225
+ if (config.enableProverNode) {
226
+ const proverKeyStore = createKeyStoreForProver(config);
227
+ if (proverKeyStore) {
228
+ rawKeyStores.push(proverKeyStore);
229
+ }
230
+ }
231
+ if (rawKeyStores.length > 0) {
232
+ keyStoreManager = new KeystoreManager(
233
+ rawKeyStores.length === 1 ? rawKeyStores[0] : mergeKeystores(rawKeyStores),
234
+ );
214
235
  }
215
236
  }
216
237
 
@@ -221,10 +242,8 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
221
242
  if (keyStoreManager === undefined) {
222
243
  throw new Error('Failed to create key store, a requirement for running a validator');
223
244
  }
224
- if (!keyStoreProvided) {
225
- log.warn(
226
- 'KEY STORE CREATED FROM ENVIRONMENT, IT IS RECOMMENDED TO USE A FILE-BASED KEY STORE IN PRODUCTION ENVIRONMENTS',
227
- );
245
+ if (!keyStoreProvided && process.env.NODE_ENV !== 'test') {
246
+ log.warn("Keystore created from env: it's recommended to use a file-based key store for production");
228
247
  }
229
248
  ValidatorClient.validateKeyStoreConfiguration(keyStoreManager, log);
230
249
  }
@@ -238,7 +257,7 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
238
257
 
239
258
  const publicClient = createPublicClient({
240
259
  chain: ethereumChain.chainInfo,
241
- transport: fallback(config.l1RpcUrls.map((url: string) => http(url))),
260
+ transport: fallback(config.l1RpcUrls.map((url: string) => http(url, { batch: false }))),
242
261
  pollingInterval: config.viemPollingIntervalMS,
243
262
  });
244
263
 
@@ -266,6 +285,8 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
266
285
  );
267
286
  }
268
287
 
288
+ const blobClient = await createBlobClientWithFileStores(config, log.createChild('blob-client'));
289
+
269
290
  // attempt snapshot sync if possible
270
291
  await trySnapshotSync(config, log);
271
292
 
@@ -273,7 +294,7 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
273
294
 
274
295
  const archiver = await createArchiver(
275
296
  config,
276
- { blobSinkClient, epochCache, telemetry, dateProvider },
297
+ { blobClient, epochCache, telemetry, dateProvider },
277
298
  { blockUntilSync: !config.skipArchiverInitialSync },
278
299
  );
279
300
 
@@ -284,17 +305,32 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
284
305
  options.prefilledPublicData,
285
306
  telemetry,
286
307
  );
287
- const circuitVerifier = config.realProofs
288
- ? await BBCircuitVerifier.new(config)
289
- : new TestCircuitVerifier(config.proverTestVerificationDelayMs);
308
+ const circuitVerifier =
309
+ config.realProofs || config.debugForceTxProofVerification
310
+ ? await BBCircuitVerifier.new(config)
311
+ : new TestCircuitVerifier(config.proverTestVerificationDelayMs);
312
+
313
+ let debugLogStore: DebugLogStore;
290
314
  if (!config.realProofs) {
291
315
  log.warn(`Aztec node is accepting fake proofs`);
316
+
317
+ debugLogStore = new InMemoryDebugLogStore();
318
+ log.info(
319
+ 'Aztec node started in test mode (realProofs set to false) hence debug logs from public functions will be collected and served',
320
+ );
321
+ } else {
322
+ debugLogStore = new NullDebugLogStore();
292
323
  }
324
+
293
325
  const proofVerifier = new QueuedIVCVerifier(config, circuitVerifier);
294
326
 
327
+ const proverOnly = config.enableProverNode && config.disableValidator;
328
+ if (proverOnly) {
329
+ log.info('Starting in prover-only mode: skipping validator, sequencer, sentinel, and slasher subsystems');
330
+ }
331
+
295
332
  // create the tx pool and the p2p client, which will need the l2 block source
296
333
  const p2pClient = await createP2PClient(
297
- P2PClientType.Full,
298
334
  config,
299
335
  archiver,
300
336
  proofVerifier,
@@ -309,7 +345,11 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
309
345
  // We should really not be modifying the config object
310
346
  config.txPublicSetupAllowList = config.txPublicSetupAllowList ?? (await getDefaultAllowedSetupFunctions());
311
347
 
312
- const blockBuilder = new BlockBuilder(
348
+ // We'll accumulate sentinel watchers here
349
+ const watchers: Watcher[] = [];
350
+
351
+ // Create FullNodeCheckpointsBuilder for block proposal handling and tx validation
352
+ const validatorCheckpointsBuilder = new FullNodeCheckpointsBuilder(
313
353
  { ...config, l1GenesisTime, slotDuration: Number(slotDuration) },
314
354
  worldStateSynchronizer,
315
355
  archiver,
@@ -317,44 +357,48 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
317
357
  telemetry,
318
358
  );
319
359
 
320
- // We'll accumulate sentinel watchers here
321
- const watchers: Watcher[] = [];
360
+ let validatorClient: ValidatorClient | undefined;
322
361
 
323
- // Create validator client if required
324
- const validatorClient = createValidatorClient(config, {
325
- p2pClient,
326
- telemetry,
327
- dateProvider,
328
- epochCache,
329
- blockBuilder,
330
- blockSource: archiver,
331
- l1ToL2MessageSource: archiver,
332
- keyStoreManager,
333
- });
334
-
335
- // If we have a validator client, register it as a source of offenses for the slasher,
336
- // and have it register callbacks on the p2p client *before* we start it, otherwise messages
337
- // like attestations or auths will fail.
338
- if (validatorClient) {
339
- watchers.push(validatorClient);
340
- if (!options.dontStartSequencer) {
341
- await validatorClient.registerHandlers();
342
- }
343
- }
344
-
345
- // If there's no validator client but alwaysReexecuteBlockProposals is enabled,
346
- // create a BlockProposalHandler to reexecute block proposals for monitoring
347
- if (!validatorClient && config.alwaysReexecuteBlockProposals) {
348
- log.info('Setting up block proposal reexecution for monitoring');
349
- createBlockProposalHandler(config, {
350
- blockBuilder,
362
+ if (!proverOnly) {
363
+ // Create validator client if required
364
+ validatorClient = await createValidatorClient(config, {
365
+ checkpointsBuilder: validatorCheckpointsBuilder,
366
+ worldState: worldStateSynchronizer,
367
+ p2pClient,
368
+ telemetry,
369
+ dateProvider,
351
370
  epochCache,
352
371
  blockSource: archiver,
353
372
  l1ToL2MessageSource: archiver,
354
- p2pClient,
355
- dateProvider,
356
- telemetry,
357
- }).registerForReexecution(p2pClient);
373
+ keyStoreManager,
374
+ blobClient,
375
+ });
376
+
377
+ // If we have a validator client, register it as a source of offenses for the slasher,
378
+ // and have it register callbacks on the p2p client *before* we start it, otherwise messages
379
+ // like attestations or auths will fail.
380
+ if (validatorClient) {
381
+ watchers.push(validatorClient);
382
+ if (!options.dontStartSequencer) {
383
+ await validatorClient.registerHandlers();
384
+ }
385
+ }
386
+
387
+ // If there's no validator client but alwaysReexecuteBlockProposals is enabled,
388
+ // create a BlockProposalHandler to reexecute block proposals for monitoring
389
+ if (!validatorClient && config.alwaysReexecuteBlockProposals) {
390
+ log.info('Setting up block proposal reexecution for monitoring');
391
+ createBlockProposalHandler(config, {
392
+ checkpointsBuilder: validatorCheckpointsBuilder,
393
+ worldState: worldStateSynchronizer,
394
+ epochCache,
395
+ blockSource: archiver,
396
+ l1ToL2MessageSource: archiver,
397
+ p2pClient,
398
+ dateProvider,
399
+ telemetry,
400
+ }).registerForReexecution(p2pClient);
401
+ }
358
402
  }
359
403
 
360
404
  // Start world state and wait for it to sync to the archiver.
@@ -363,29 +407,33 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
363
407
  // Start p2p. Note that it depends on world state to be running.
364
408
  await p2pClient.start();
365
409
 
366
- const validatorsSentinel = await createSentinel(epochCache, archiver, p2pClient, config);
367
- if (validatorsSentinel && config.slashInactivityPenalty > 0n) {
368
- watchers.push(validatorsSentinel);
369
- }
370
-
410
+ let validatorsSentinel: Awaited<ReturnType<typeof createSentinel>> | undefined;
371
411
  let epochPruneWatcher: EpochPruneWatcher | undefined;
372
- if (config.slashPrunePenalty > 0n || config.slashDataWithholdingPenalty > 0n) {
373
- epochPruneWatcher = new EpochPruneWatcher(
374
- archiver,
375
- archiver,
376
- epochCache,
377
- p2pClient.getTxProvider(),
378
- blockBuilder,
379
- config,
380
- );
381
- watchers.push(epochPruneWatcher);
382
- }
383
-
384
- // We assume we want to slash for invalid attestations unless all max penalties are set to 0
385
412
  let attestationsBlockWatcher: AttestationsBlockWatcher | undefined;
386
- if (config.slashProposeInvalidAttestationsPenalty > 0n || config.slashAttestDescendantOfInvalidPenalty > 0n) {
387
- attestationsBlockWatcher = new AttestationsBlockWatcher(archiver, epochCache, config);
388
- watchers.push(attestationsBlockWatcher);
413
+
414
+ if (!proverOnly) {
415
+ validatorsSentinel = await createSentinel(epochCache, archiver, p2pClient, config);
416
+ if (validatorsSentinel && config.slashInactivityPenalty > 0n) {
417
+ watchers.push(validatorsSentinel);
418
+ }
419
+
420
+ if (config.slashPrunePenalty > 0n || config.slashDataWithholdingPenalty > 0n) {
421
+ epochPruneWatcher = new EpochPruneWatcher(
422
+ archiver,
423
+ archiver,
424
+ epochCache,
425
+ p2pClient.getTxProvider(),
426
+ validatorCheckpointsBuilder,
427
+ config,
428
+ );
429
+ watchers.push(epochPruneWatcher);
430
+ }
431
+
432
+ // We assume we want to slash for invalid attestations unless all max penalties are set to 0
433
+ if (config.slashProposeInvalidAttestationsPenalty > 0n || config.slashAttestDescendantOfInvalidPenalty > 0n) {
434
+ attestationsBlockWatcher = new AttestationsBlockWatcher(archiver, epochCache, config);
435
+ watchers.push(attestationsBlockWatcher);
436
+ }
389
437
  }
390
438
 
391
439
  // Start p2p-related services once the archiver has completed sync
@@ -403,7 +451,7 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
403
451
  // Validator enabled, create/start relevant service
404
452
  let sequencer: SequencerClient | undefined;
405
453
  let slasherClient: SlasherClientInterface | undefined;
406
- if (!config.disableValidator) {
454
+ if (!config.disableValidator && validatorClient) {
407
455
  // We create a slasher only if we have a sequencer, since all slashing actions go through the sequencer publisher
408
456
  // as they are executed when the node is selected as proposer.
409
457
  const validatorAddresses = keyStoreManager
@@ -422,14 +470,31 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
422
470
  );
423
471
  await slasherClient.start();
424
472
 
425
- const l1TxUtils = await createL1TxUtilsWithBlobsFromEthSigner(
426
- publicClient,
427
- keyStoreManager!.createAllValidatorPublisherSigners(),
428
- { ...config, scope: 'sequencer' },
429
- { telemetry, logger: log.createChild('l1-tx-utils'), dateProvider },
430
- );
473
+ const l1TxUtils = config.sequencerPublisherForwarderAddress
474
+ ? await createForwarderL1TxUtilsFromSigners(
475
+ publicClient,
476
+ keyStoreManager!.createAllValidatorPublisherSigners(),
477
+ config.sequencerPublisherForwarderAddress,
478
+ { ...config, scope: 'sequencer' },
479
+ { telemetry, logger: log.createChild('l1-tx-utils'), dateProvider, kzg: Blob.getViemKzgInstance() },
480
+ )
481
+ : await createL1TxUtilsFromSigners(
482
+ publicClient,
483
+ keyStoreManager!.createAllValidatorPublisherSigners(),
484
+ { ...config, scope: 'sequencer' },
485
+ { telemetry, logger: log.createChild('l1-tx-utils'), dateProvider, kzg: Blob.getViemKzgInstance() },
486
+ );
431
487
 
432
488
  // Create and start the sequencer client
489
+ const checkpointsBuilder = new CheckpointsBuilder(
490
+ { ...config, l1GenesisTime, slotDuration: Number(slotDuration) },
491
+ worldStateSynchronizer,
492
+ archiver,
493
+ dateProvider,
494
+ telemetry,
495
+ debugLogStore,
496
+ );
497
+
433
498
  sequencer = await SequencerClient.new(config, {
434
499
  ...deps,
435
500
  epochCache,
@@ -438,12 +503,12 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
438
503
  p2pClient,
439
504
  worldStateSynchronizer,
440
505
  slasherClient,
441
- blockBuilder,
506
+ checkpointsBuilder,
442
507
  l2BlockSource: archiver,
443
508
  l1ToL2MessageSource: archiver,
444
509
  telemetry,
445
510
  dateProvider,
446
- blobSinkClient,
511
+ blobClient,
447
512
  nodeKeyStore: keyStoreManager!,
448
513
  });
449
514
  }
@@ -455,7 +520,37 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
455
520
  log.warn(`Sequencer created but not started`);
456
521
  }
457
522
 
458
- return new AztecNodeService(
523
+ // Create prover node subsystem if enabled
524
+ let proverNode: ProverNode | undefined;
525
+ if (config.enableProverNode) {
526
+ proverNode = await createProverNode(config, {
527
+ ...deps.proverNodeDeps,
528
+ telemetry,
529
+ dateProvider,
530
+ archiver,
531
+ worldStateSynchronizer,
532
+ p2pClient,
533
+ epochCache,
534
+ blobClient,
535
+ keyStoreManager,
536
+ });
537
+
538
+ if (!options.dontStartProverNode) {
539
+ await proverNode.start();
540
+ log.info(`Prover node subsystem started`);
541
+ } else {
542
+ log.info(`Prover node subsystem created but not started`);
543
+ }
544
+ }
545
+
546
+ const globalVariableBuilder = new GlobalVariableBuilder({
547
+ ...config,
548
+ rollupVersion: BigInt(config.rollupVersion),
549
+ l1GenesisTime,
550
+ slotDuration: Number(slotDuration),
551
+ });
552
+
553
+ const node = new AztecNodeService(
459
554
  config,
460
555
  p2pClient,
461
556
  archiver,
@@ -464,18 +559,25 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
464
559
  archiver,
465
560
  worldStateSynchronizer,
466
561
  sequencer,
562
+ proverNode,
467
563
  slasherClient,
468
564
  validatorsSentinel,
469
565
  epochPruneWatcher,
470
566
  ethereumChain.chainInfo.id,
471
567
  config.rollupVersion,
472
- new GlobalVariableBuilder(config),
568
+ globalVariableBuilder,
473
569
  epochCache,
474
570
  packageVersion,
475
571
  proofVerifier,
476
572
  telemetry,
477
573
  log,
574
+ blobClient,
575
+ validatorClient,
576
+ keyStoreManager,
577
+ debugLogStore,
478
578
  );
579
+
580
+ return node;
479
581
  }
480
582
 
481
583
  /**
@@ -486,6 +588,11 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
486
588
  return this.sequencer;
487
589
  }
488
590
 
591
+ /** Returns the prover node subsystem, if enabled. */
592
+ public getProverNode(): ProverNode | undefined {
593
+ return this.proverNode;
594
+ }
595
+
489
596
  public getBlockSource(): L2BlockSource {
490
597
  return this.blockSource;
491
598
  }
@@ -539,19 +646,26 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
539
646
  enr,
540
647
  l1ContractAddresses: contractAddresses,
541
648
  protocolContractAddresses: protocolContractAddresses,
649
+ realProofs: !!this.config.realProofs,
542
650
  };
543
651
 
544
652
  return nodeInfo;
545
653
  }
546
654
 
547
655
  /**
548
- * Get a block specified by its number.
549
- * @param number - The block number being requested.
656
+ * Get a block specified by its block number, block hash, or 'latest'.
657
+ * @param block - The block parameter (block number, block hash, or 'latest').
550
658
  * @returns The requested block.
551
659
  */
552
- public async getBlock(number: L2BlockNumber): Promise<L2Block | undefined> {
553
- const blockNumber = number === 'latest' ? await this.getBlockNumber() : number;
554
- return await this.blockSource.getBlock(blockNumber);
660
+ public async getBlock(block: BlockParameter): Promise<L2Block | undefined> {
661
+ if (BlockHash.isBlockHash(block)) {
662
+ return this.getBlockByHash(block);
663
+ }
664
+ const blockNumber = block === 'latest' ? await this.getBlockNumber() : (block as BlockNumber);
665
+ if (blockNumber === BlockNumber.ZERO) {
666
+ return this.buildInitialBlock();
667
+ }
668
+ return await this.blockSource.getL2Block(blockNumber);
555
669
  }
556
670
 
557
671
  /**
@@ -559,9 +673,17 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
559
673
  * @param blockHash - The block hash being requested.
560
674
  * @returns The requested block.
561
675
  */
562
- public async getBlockByHash(blockHash: Fr): Promise<L2Block | undefined> {
563
- const publishedBlock = await this.blockSource.getPublishedBlockByHash(blockHash);
564
- return publishedBlock?.block;
676
+ public async getBlockByHash(blockHash: BlockHash): Promise<L2Block | undefined> {
677
+ const initialBlockHash = await this.#getInitialHeaderHash();
678
+ if (blockHash.equals(initialBlockHash)) {
679
+ return this.buildInitialBlock();
680
+ }
681
+ return await this.blockSource.getL2BlockByHash(blockHash);
682
+ }
683
+
684
+ private buildInitialBlock(): L2Block {
685
+ const initialHeader = this.worldStateSynchronizer.getCommitted().getInitialHeader();
686
+ return L2Block.empty(initialHeader);
565
687
  }
566
688
 
567
689
  /**
@@ -570,8 +692,7 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
570
692
  * @returns The requested block.
571
693
  */
572
694
  public async getBlockByArchive(archive: Fr): Promise<L2Block | undefined> {
573
- const publishedBlock = await this.blockSource.getPublishedBlockByArchive(archive);
574
- return publishedBlock?.block;
695
+ return await this.blockSource.getL2BlockByArchive(archive);
575
696
  }
576
697
 
577
698
  /**
@@ -580,34 +701,50 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
580
701
  * @param limit - The maximum number of blocks to obtain.
581
702
  * @returns The blocks requested.
582
703
  */
583
- public async getBlocks(from: number, limit: number): Promise<L2Block[]> {
584
- return (await this.blockSource.getBlocks(from, limit)) ?? [];
704
+ public async getBlocks(from: BlockNumber, limit: number): Promise<L2Block[]> {
705
+ return (await this.blockSource.getBlocks(from, BlockNumber(limit))) ?? [];
706
+ }
707
+
708
+ public async getCheckpoints(from: CheckpointNumber, limit: number): Promise<PublishedCheckpoint[]> {
709
+ return (await this.blockSource.getCheckpoints(from, limit)) ?? [];
585
710
  }
586
711
 
587
- public async getPublishedBlocks(from: number, limit: number): Promise<PublishedL2Block[]> {
588
- return (await this.blockSource.getPublishedBlocks(from, limit)) ?? [];
712
+ public async getCheckpointedBlocks(from: BlockNumber, limit: number) {
713
+ return (await this.blockSource.getCheckpointedBlocks(from, limit)) ?? [];
589
714
  }
590
715
 
591
716
  /**
592
- * Method to fetch the current base fees.
593
- * @returns The current base fees.
717
+ * Method to fetch the current min L2 fees.
718
+ * @returns The current min L2 fees.
594
719
  */
595
- public async getCurrentBaseFees(): Promise<GasFees> {
596
- return await this.globalVariableBuilder.getCurrentBaseFees();
720
+ public async getCurrentMinFees(): Promise<GasFees> {
721
+ return await this.globalVariableBuilder.getCurrentMinFees();
722
+ }
723
+
724
+ public async getMaxPriorityFees(): Promise<GasFees> {
725
+ for await (const tx of this.p2pClient.iteratePendingTxs()) {
726
+ return tx.getGasSettings().maxPriorityFeesPerGas;
727
+ }
728
+
729
+ return GasFees.from({ feePerDaGas: 0n, feePerL2Gas: 0n });
597
730
  }
598
731
 
599
732
  /**
600
733
  * Method to fetch the latest block number synchronized by the node.
601
734
  * @returns The block number.
602
735
  */
603
- public async getBlockNumber(): Promise<number> {
736
+ public async getBlockNumber(): Promise<BlockNumber> {
604
737
  return await this.blockSource.getBlockNumber();
605
738
  }
606
739
 
607
- public async getProvenBlockNumber(): Promise<number> {
740
+ public async getProvenBlockNumber(): Promise<BlockNumber> {
608
741
  return await this.blockSource.getProvenBlockNumber();
609
742
  }
610
743
 
744
+ public async getCheckpointedBlockNumber(): Promise<BlockNumber> {
745
+ return await this.blockSource.getCheckpointedL2BlockNumber();
746
+ }
747
+
611
748
  /**
612
749
  * Method to fetch the version of the package.
613
750
  * @returns The node package version
@@ -640,25 +777,43 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
640
777
  return this.contractDataSource.getContract(address);
641
778
  }
642
779
 
643
- /**
644
- * Retrieves all private logs from up to `limit` blocks, starting from the block number `from`.
645
- * @param from - The block number from which to begin retrieving logs.
646
- * @param limit - The maximum number of blocks to retrieve logs from.
647
- * @returns An array of private logs from the specified range of blocks.
648
- */
649
- public getPrivateLogs(from: number, limit: number): Promise<PrivateLog[]> {
650
- return this.logsSource.getPrivateLogs(from, limit);
651
- }
652
-
653
- /**
654
- * Gets all logs that match any of the received tags (i.e. logs with their first field equal to a tag).
655
- * @param tags - The tags to filter the logs by.
656
- * @param logsPerTag - The maximum number of logs to return for each tag. By default no limit is set
657
- * @returns For each received tag, an array of matching logs is returned. An empty array implies no logs match
658
- * that tag.
659
- */
660
- public getLogsByTags(tags: Fr[], logsPerTag?: number): Promise<TxScopedL2Log[][]> {
661
- return this.logsSource.getLogsByTags(tags, logsPerTag);
780
+ public async getPrivateLogsByTags(
781
+ tags: SiloedTag[],
782
+ page?: number,
783
+ referenceBlock?: BlockHash,
784
+ ): Promise<TxScopedL2Log[][]> {
785
+ if (referenceBlock) {
786
+ const initialBlockHash = await this.#getInitialHeaderHash();
787
+ if (!referenceBlock.equals(initialBlockHash)) {
788
+ const header = await this.blockSource.getBlockHeaderByHash(referenceBlock);
789
+ if (!header) {
790
+ throw new Error(
791
+ `Block ${referenceBlock.toString()} not found in the node. This might indicate a reorg has occurred.`,
792
+ );
793
+ }
794
+ }
795
+ }
796
+ return this.logsSource.getPrivateLogsByTags(tags, page);
797
+ }
798
+
799
+ public async getPublicLogsByTagsFromContract(
800
+ contractAddress: AztecAddress,
801
+ tags: Tag[],
802
+ page?: number,
803
+ referenceBlock?: BlockHash,
804
+ ): Promise<TxScopedL2Log[][]> {
805
+ if (referenceBlock) {
806
+ const initialBlockHash = await this.#getInitialHeaderHash();
807
+ if (!referenceBlock.equals(initialBlockHash)) {
808
+ const header = await this.blockSource.getBlockHeaderByHash(referenceBlock);
809
+ if (!header) {
810
+ throw new Error(
811
+ `Block ${referenceBlock.toString()} not found in the node. This might indicate a reorg has occurred.`,
812
+ );
813
+ }
814
+ }
815
+ }
816
+ return this.logsSource.getPublicLogsByTagsFromContract(contractAddress, tags, page);
662
817
  }
663
818
 
664
819
  /**
@@ -700,26 +855,36 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
700
855
  }
701
856
 
702
857
  await this.p2pClient!.sendTx(tx);
703
- this.metrics.receivedTx(timer.ms(), true);
704
- this.log.info(`Received tx ${txHash}`, { txHash });
858
+ const duration = timer.ms();
859
+ this.metrics.receivedTx(duration, true);
860
+ this.log.info(`Received tx ${txHash} in ${duration}ms`, { txHash });
705
861
  }
706
862
 
707
863
  public async getTxReceipt(txHash: TxHash): Promise<TxReceipt> {
708
- let txReceipt = new TxReceipt(txHash, TxStatus.DROPPED, 'Tx dropped by P2P node.');
709
-
710
- // We first check if the tx is in pending (instead of first checking if it is mined) because if we first check
711
- // for mined and then for pending there could be a race condition where the tx is mined between the two checks
712
- // and we would incorrectly return a TxReceipt with status DROPPED
713
- if ((await this.p2pClient.getTxStatus(txHash)) === 'pending') {
714
- txReceipt = new TxReceipt(txHash, TxStatus.PENDING, '');
715
- }
864
+ // Check the tx pool status first. If the tx is known to the pool (pending or mined), we'll use that
865
+ // as a fallback if we don't find a settled receipt in the archiver.
866
+ const txPoolStatus = await this.p2pClient.getTxStatus(txHash);
867
+ const isKnownToPool = txPoolStatus === 'pending' || txPoolStatus === 'mined';
716
868
 
869
+ // Then get the actual tx from the archiver, which tracks every tx in a mined block.
717
870
  const settledTxReceipt = await this.blockSource.getSettledTxReceipt(txHash);
871
+
872
+ let receipt: TxReceipt;
718
873
  if (settledTxReceipt) {
719
- txReceipt = settledTxReceipt;
874
+ receipt = settledTxReceipt;
875
+ } else if (isKnownToPool) {
876
+ // If the tx is in the pool but not in the archiver, it's pending.
877
+ // This handles race conditions between archiver and p2p, where the archiver
878
+ // has pruned the block in which a tx was mined, but p2p has not caught up yet.
879
+ receipt = new TxReceipt(txHash, TxStatus.PENDING, undefined, undefined);
880
+ } else {
881
+ // Otherwise, if we don't know the tx, we consider it dropped.
882
+ receipt = new TxReceipt(txHash, TxStatus.DROPPED, undefined, 'Tx dropped by P2P node');
720
883
  }
721
884
 
722
- return txReceipt;
885
+ this.debugLogStore.decorateReceiptWithLogs(txHash.toString(), receipt);
886
+
887
+ return receipt;
723
888
  }
724
889
 
725
890
  public getTxEffect(txHash: TxHash): Promise<IndexedTxEffect | undefined> {
@@ -736,13 +901,23 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
736
901
  await tryStop(this.slasherClient);
737
902
  await tryStop(this.proofVerifier);
738
903
  await tryStop(this.sequencer);
904
+ await tryStop(this.proverNode);
739
905
  await tryStop(this.p2pClient);
740
906
  await tryStop(this.worldStateSynchronizer);
741
907
  await tryStop(this.blockSource);
908
+ await tryStop(this.blobClient);
742
909
  await tryStop(this.telemetry);
743
910
  this.log.info(`Stopped Aztec Node`);
744
911
  }
745
912
 
913
+ /**
914
+ * Returns the blob client used by this node.
915
+ * @internal - Exposed for testing purposes only.
916
+ */
917
+ public getBlobClient(): BlobClientInterface | undefined {
918
+ return this.blobClient;
919
+ }
920
+
746
921
  /**
747
922
  * Method to retrieve pending txs.
748
923
  * @param limit - The number of items to returns
@@ -775,20 +950,12 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
775
950
  return compactArray(await Promise.all(txHashes.map(txHash => this.getTxByHash(txHash))));
776
951
  }
777
952
 
778
- /**
779
- * Find the indexes of the given leaves in the given tree along with a block metadata pointing to the block in which
780
- * the leaves were inserted.
781
- * @param blockNumber - The block number at which to get the data or 'latest' for latest data.
782
- * @param treeId - The tree to search in.
783
- * @param leafValues - The values to search for.
784
- * @returns The indices of leaves and the block metadata of a block in which the leaves were inserted.
785
- */
786
953
  public async findLeavesIndexes(
787
- blockNumber: L2BlockNumber,
954
+ referenceBlock: BlockParameter,
788
955
  treeId: MerkleTreeId,
789
956
  leafValues: Fr[],
790
- ): Promise<(InBlock<bigint> | undefined)[]> {
791
- const committedDb = await this.#getWorldState(blockNumber);
957
+ ): Promise<(DataInBlock<bigint> | undefined)[]> {
958
+ const committedDb = await this.#getWorldState(referenceBlock);
792
959
  const maybeIndices = await committedDb.findLeafIndices(
793
960
  treeId,
794
961
  leafValues.map(x => x.toBuffer()),
@@ -813,7 +980,7 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
813
980
  // (note that block number corresponds to the leaf index in the archive tree).
814
981
  const blockHashes = await Promise.all(
815
982
  uniqueBlockNumbers.map(blockNumber => {
816
- return committedDb.getLeafValue(MerkleTreeId.ARCHIVE, blockNumber!);
983
+ return committedDb.getLeafValue(MerkleTreeId.ARCHIVE, BigInt(blockNumber));
817
984
  }),
818
985
  );
819
986
 
@@ -824,7 +991,7 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
824
991
  }
825
992
  }
826
993
 
827
- // Create InBlock objects by combining indices, blockNumbers and blockHashes and return them.
994
+ // Create DataInBlock objects by combining indices, blockNumbers and blockHashes and return them.
828
995
  return maybeIndices.map((index, i) => {
829
996
  if (index === undefined) {
830
997
  return undefined;
@@ -839,57 +1006,29 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
839
1006
  return undefined;
840
1007
  }
841
1008
  return {
842
- l2BlockNumber: Number(blockNumber),
843
- l2BlockHash: L2BlockHash.fromField(blockHash),
1009
+ l2BlockNumber: BlockNumber(Number(blockNumber)),
1010
+ l2BlockHash: new BlockHash(blockHash),
844
1011
  data: index,
845
1012
  };
846
1013
  });
847
1014
  }
848
1015
 
849
- /**
850
- * Returns a sibling path for the given index in the nullifier tree.
851
- * @param blockNumber - The block number at which to get the data.
852
- * @param leafIndex - The index of the leaf for which the sibling path is required.
853
- * @returns The sibling path for the leaf index.
854
- */
855
- public async getNullifierSiblingPath(
856
- blockNumber: L2BlockNumber,
857
- leafIndex: bigint,
858
- ): Promise<SiblingPath<typeof NULLIFIER_TREE_HEIGHT>> {
859
- const committedDb = await this.#getWorldState(blockNumber);
860
- return committedDb.getSiblingPath(MerkleTreeId.NULLIFIER_TREE, leafIndex);
861
- }
862
-
863
- /**
864
- * Returns a sibling path for the given index in the data tree.
865
- * @param blockNumber - The block number at which to get the data.
866
- * @param leafIndex - The index of the leaf for which the sibling path is required.
867
- * @returns The sibling path for the leaf index.
868
- */
869
- public async getNoteHashSiblingPath(
870
- blockNumber: L2BlockNumber,
871
- leafIndex: bigint,
872
- ): Promise<SiblingPath<typeof NOTE_HASH_TREE_HEIGHT>> {
873
- const committedDb = await this.#getWorldState(blockNumber);
874
- return committedDb.getSiblingPath(MerkleTreeId.NOTE_HASH_TREE, leafIndex);
875
- }
876
-
877
- public async getArchiveMembershipWitness(
878
- blockNumber: L2BlockNumber,
879
- archive: Fr,
1016
+ public async getBlockHashMembershipWitness(
1017
+ referenceBlock: BlockParameter,
1018
+ blockHash: BlockHash,
880
1019
  ): Promise<MembershipWitness<typeof ARCHIVE_HEIGHT> | undefined> {
881
- const committedDb = await this.#getWorldState(blockNumber);
882
- const [pathAndIndex] = await committedDb.findSiblingPaths<MerkleTreeId.ARCHIVE>(MerkleTreeId.ARCHIVE, [archive]);
1020
+ const committedDb = await this.#getWorldState(referenceBlock);
1021
+ const [pathAndIndex] = await committedDb.findSiblingPaths<MerkleTreeId.ARCHIVE>(MerkleTreeId.ARCHIVE, [blockHash]);
883
1022
  return pathAndIndex === undefined
884
1023
  ? undefined
885
1024
  : MembershipWitness.fromSiblingPath(pathAndIndex.index, pathAndIndex.path);
886
1025
  }
887
1026
 
888
1027
  public async getNoteHashMembershipWitness(
889
- blockNumber: L2BlockNumber,
1028
+ referenceBlock: BlockParameter,
890
1029
  noteHash: Fr,
891
1030
  ): Promise<MembershipWitness<typeof NOTE_HASH_TREE_HEIGHT> | undefined> {
892
- const committedDb = await this.#getWorldState(blockNumber);
1031
+ const committedDb = await this.#getWorldState(referenceBlock);
893
1032
  const [pathAndIndex] = await committedDb.findSiblingPaths<MerkleTreeId.NOTE_HASH_TREE>(
894
1033
  MerkleTreeId.NOTE_HASH_TREE,
895
1034
  [noteHash],
@@ -899,17 +1038,11 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
899
1038
  : MembershipWitness.fromSiblingPath(pathAndIndex.index, pathAndIndex.path);
900
1039
  }
901
1040
 
902
- /**
903
- * Returns the index and a sibling path for a leaf in the committed l1 to l2 data tree.
904
- * @param blockNumber - The block number at which to get the data.
905
- * @param l1ToL2Message - The l1ToL2Message to get the index / sibling path for.
906
- * @returns A tuple of the index and the sibling path of the L1ToL2Message (undefined if not found).
907
- */
908
1041
  public async getL1ToL2MessageMembershipWitness(
909
- blockNumber: L2BlockNumber,
1042
+ referenceBlock: BlockParameter,
910
1043
  l1ToL2Message: Fr,
911
1044
  ): Promise<[bigint, SiblingPath<typeof L1_TO_L2_MSG_TREE_HEIGHT>] | undefined> {
912
- const db = await this.#getWorldState(blockNumber);
1045
+ const db = await this.#getWorldState(referenceBlock);
913
1046
  const [witness] = await db.findSiblingPaths(MerkleTreeId.L1_TO_L2_MESSAGE_TREE, [l1ToL2Message]);
914
1047
  if (!witness) {
915
1048
  return undefined;
@@ -919,9 +1052,11 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
919
1052
  return [witness.index, witness.path];
920
1053
  }
921
1054
 
922
- public async getL1ToL2MessageBlock(l1ToL2Message: Fr): Promise<number | undefined> {
1055
+ public async getL1ToL2MessageBlock(l1ToL2Message: Fr): Promise<BlockNumber | undefined> {
923
1056
  const messageIndex = await this.l1ToL2MessageSource.getL1ToL2MessageIndex(l1ToL2Message);
924
- return messageIndex ? InboxLeaf.l2BlockFromIndex(messageIndex) : undefined;
1057
+ return messageIndex
1058
+ ? BlockNumber.fromCheckpointNumber(InboxLeaf.checkpointNumberFromIndex(messageIndex))
1059
+ : undefined;
925
1060
  }
926
1061
 
927
1062
  /**
@@ -935,54 +1070,36 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
935
1070
  }
936
1071
 
937
1072
  /**
938
- * Returns all the L2 to L1 messages in a block.
939
- * @param blockNumber - The block number at which to get the data.
940
- * @returns The L2 to L1 messages (undefined if the block number is not found).
1073
+ * Returns all the L2 to L1 messages in an epoch.
1074
+ * @param epoch - The epoch at which to get the data.
1075
+ * @returns The L2 to L1 messages (empty array if the epoch is not found).
941
1076
  */
942
- public async getL2ToL1Messages(blockNumber: L2BlockNumber): Promise<Fr[][] | undefined> {
943
- const block = await this.blockSource.getBlock(blockNumber === 'latest' ? await this.getBlockNumber() : blockNumber);
944
- return block?.body.txEffects.map(txEffect => txEffect.l2ToL1Msgs);
945
- }
946
-
947
- /**
948
- * Returns a sibling path for a leaf in the committed blocks tree.
949
- * @param blockNumber - The block number at which to get the data.
950
- * @param leafIndex - Index of the leaf in the tree.
951
- * @returns The sibling path.
952
- */
953
- public async getArchiveSiblingPath(
954
- blockNumber: L2BlockNumber,
955
- leafIndex: bigint,
956
- ): Promise<SiblingPath<typeof ARCHIVE_HEIGHT>> {
957
- const committedDb = await this.#getWorldState(blockNumber);
958
- return committedDb.getSiblingPath(MerkleTreeId.ARCHIVE, leafIndex);
959
- }
960
-
961
- /**
962
- * Returns a sibling path for a leaf in the committed public data tree.
963
- * @param blockNumber - The block number at which to get the data.
964
- * @param leafIndex - Index of the leaf in the tree.
965
- * @returns The sibling path.
966
- */
967
- public async getPublicDataSiblingPath(
968
- blockNumber: L2BlockNumber,
969
- leafIndex: bigint,
970
- ): Promise<SiblingPath<typeof PUBLIC_DATA_TREE_HEIGHT>> {
971
- const committedDb = await this.#getWorldState(blockNumber);
972
- return committedDb.getSiblingPath(MerkleTreeId.PUBLIC_DATA_TREE, leafIndex);
1077
+ public async getL2ToL1Messages(epoch: EpochNumber): Promise<Fr[][][][]> {
1078
+ // Assumes `getCheckpointedBlocksForEpoch` returns blocks in ascending order of block number.
1079
+ const checkpointedBlocks = await this.blockSource.getCheckpointedBlocksForEpoch(epoch);
1080
+ const blocksInCheckpoints: L2Block[][] = [];
1081
+ let previousSlotNumber = SlotNumber.ZERO;
1082
+ let checkpointIndex = -1;
1083
+ for (const checkpointedBlock of checkpointedBlocks) {
1084
+ const block = checkpointedBlock.block;
1085
+ const slotNumber = block.header.globalVariables.slotNumber;
1086
+ if (slotNumber !== previousSlotNumber) {
1087
+ checkpointIndex++;
1088
+ blocksInCheckpoints.push([]);
1089
+ previousSlotNumber = slotNumber;
1090
+ }
1091
+ blocksInCheckpoints[checkpointIndex].push(block);
1092
+ }
1093
+ return blocksInCheckpoints.map(blocks =>
1094
+ blocks.map(block => block.body.txEffects.map(txEffect => txEffect.l2ToL1Msgs)),
1095
+ );
973
1096
  }
974
1097
 
975
- /**
976
- * Returns a nullifier membership witness for a given nullifier at a given block.
977
- * @param blockNumber - The block number at which to get the index.
978
- * @param nullifier - Nullifier we try to find witness for.
979
- * @returns The nullifier membership witness (if found).
980
- */
981
1098
  public async getNullifierMembershipWitness(
982
- blockNumber: L2BlockNumber,
1099
+ referenceBlock: BlockParameter,
983
1100
  nullifier: Fr,
984
1101
  ): Promise<NullifierMembershipWitness | undefined> {
985
- const db = await this.#getWorldState(blockNumber);
1102
+ const db = await this.#getWorldState(referenceBlock);
986
1103
  const [witness] = await db.findSiblingPaths(MerkleTreeId.NULLIFIER_TREE, [nullifier.toBuffer()]);
987
1104
  if (!witness) {
988
1105
  return undefined;
@@ -999,7 +1116,8 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
999
1116
 
1000
1117
  /**
1001
1118
  * Returns a low nullifier membership witness for a given nullifier at a given block.
1002
- * @param blockNumber - The block number at which to get the index.
1119
+ * @param referenceBlock - The block parameter (block number, block hash, or 'latest') at which to get the data
1120
+ * (which contains the root of the nullifier tree in which we are searching for the nullifier).
1003
1121
  * @param nullifier - Nullifier we try to find the low nullifier witness for.
1004
1122
  * @returns The low nullifier membership witness (if found).
1005
1123
  * @remarks Low nullifier witness can be used to perform a nullifier non-inclusion proof by leveraging the "linked
@@ -1012,10 +1130,10 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
1012
1130
  * TODO: This is a confusing behavior and we should eventually address that.
1013
1131
  */
1014
1132
  public async getLowNullifierMembershipWitness(
1015
- blockNumber: L2BlockNumber,
1133
+ referenceBlock: BlockParameter,
1016
1134
  nullifier: Fr,
1017
1135
  ): Promise<NullifierMembershipWitness | undefined> {
1018
- const committedDb = await this.#getWorldState(blockNumber);
1136
+ const committedDb = await this.#getWorldState(referenceBlock);
1019
1137
  const findResult = await committedDb.getPreviousValueIndex(MerkleTreeId.NULLIFIER_TREE, nullifier.toBigInt());
1020
1138
  if (!findResult) {
1021
1139
  return undefined;
@@ -1030,8 +1148,8 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
1030
1148
  return new NullifierMembershipWitness(BigInt(index), preimageData as NullifierLeafPreimage, siblingPath);
1031
1149
  }
1032
1150
 
1033
- async getPublicDataWitness(blockNumber: L2BlockNumber, leafSlot: Fr): Promise<PublicDataWitness | undefined> {
1034
- const committedDb = await this.#getWorldState(blockNumber);
1151
+ async getPublicDataWitness(referenceBlock: BlockParameter, leafSlot: Fr): Promise<PublicDataWitness | undefined> {
1152
+ const committedDb = await this.#getWorldState(referenceBlock);
1035
1153
  const lowLeafResult = await committedDb.getPreviousValueIndex(MerkleTreeId.PUBLIC_DATA_TREE, leafSlot.toBigInt());
1036
1154
  if (!lowLeafResult) {
1037
1155
  return undefined;
@@ -1045,19 +1163,8 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
1045
1163
  }
1046
1164
  }
1047
1165
 
1048
- /**
1049
- * Gets the storage value at the given contract storage slot.
1050
- *
1051
- * @remarks The storage slot here refers to the slot as it is defined in Noir not the index in the merkle tree.
1052
- * Aztec's version of `eth_getStorageAt`.
1053
- *
1054
- * @param contract - Address of the contract to query.
1055
- * @param slot - Slot to query.
1056
- * @param blockNumber - The block number at which to get the data or 'latest'.
1057
- * @returns Storage value at the given contract slot.
1058
- */
1059
- public async getPublicStorageAt(blockNumber: L2BlockNumber, contract: AztecAddress, slot: Fr): Promise<Fr> {
1060
- const committedDb = await this.#getWorldState(blockNumber);
1166
+ public async getPublicStorageAt(referenceBlock: BlockParameter, contract: AztecAddress, slot: Fr): Promise<Fr> {
1167
+ const committedDb = await this.#getWorldState(referenceBlock);
1061
1168
  const leafSlot = await computePublicDataTreeLeafSlot(contract, slot);
1062
1169
 
1063
1170
  const lowLeafResult = await committedDb.getPreviousValueIndex(MerkleTreeId.PUBLIC_DATA_TREE, leafSlot.toBigInt());
@@ -1071,23 +1178,22 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
1071
1178
  return preimage.leaf.value;
1072
1179
  }
1073
1180
 
1074
- /**
1075
- * Returns the currently committed block header, or the initial header if no blocks have been produced.
1076
- * @returns The current committed block header.
1077
- */
1078
- public async getBlockHeader(blockNumber: L2BlockNumber = 'latest'): Promise<BlockHeader | undefined> {
1079
- return blockNumber === 0 || (blockNumber === 'latest' && (await this.blockSource.getBlockNumber()) === 0)
1080
- ? this.worldStateSynchronizer.getCommitted().getInitialHeader()
1081
- : this.blockSource.getBlockHeader(blockNumber);
1082
- }
1083
-
1084
- /**
1085
- * Get a block header specified by its hash.
1086
- * @param blockHash - The block hash being requested.
1087
- * @returns The requested block header.
1088
- */
1089
- public async getBlockHeaderByHash(blockHash: Fr): Promise<BlockHeader | undefined> {
1090
- return await this.blockSource.getBlockHeaderByHash(blockHash);
1181
+ public async getBlockHeader(block: BlockParameter = 'latest'): Promise<BlockHeader | undefined> {
1182
+ if (BlockHash.isBlockHash(block)) {
1183
+ const initialBlockHash = await this.#getInitialHeaderHash();
1184
+ if (block.equals(initialBlockHash)) {
1185
+ // Block source doesn't handle initial header so we need to handle the case separately.
1186
+ return this.worldStateSynchronizer.getCommitted().getInitialHeader();
1187
+ }
1188
+ return this.blockSource.getBlockHeaderByHash(block);
1189
+ } else {
1190
+ // Block source doesn't handle initial header so we need to handle the case separately.
1191
+ const blockNumber = block === 'latest' ? await this.getBlockNumber() : (block as BlockNumber);
1192
+ if (blockNumber === BlockNumber.ZERO) {
1193
+ return this.worldStateSynchronizer.getCommitted().getInitialHeader();
1194
+ }
1195
+ return this.blockSource.getBlockHeader(block);
1196
+ }
1091
1197
  }
1092
1198
 
1093
1199
  /**
@@ -1099,6 +1205,14 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
1099
1205
  return await this.blockSource.getBlockHeaderByArchive(archive);
1100
1206
  }
1101
1207
 
1208
+ public getBlockData(number: BlockNumber): Promise<BlockData | undefined> {
1209
+ return this.blockSource.getBlockData(number);
1210
+ }
1211
+
1212
+ public getBlockDataByArchive(archive: Fr): Promise<BlockData | undefined> {
1213
+ return this.blockSource.getBlockDataByArchive(archive);
1214
+ }
1215
+
1102
1216
  /**
1103
1217
  * Simulates the public part of a transaction with the current state.
1104
1218
  * @param tx - The transaction to simulate.
@@ -1122,7 +1236,8 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
1122
1236
  }
1123
1237
 
1124
1238
  const txHash = tx.getTxHash();
1125
- const blockNumber = (await this.blockSource.getBlockNumber()) + 1;
1239
+ const latestBlockNumber = await this.blockSource.getBlockNumber();
1240
+ const blockNumber = BlockNumber.add(latestBlockNumber, 1);
1126
1241
 
1127
1242
  // If sequencer is not initialized, we just set these values to zero for simulation.
1128
1243
  const coinbase = EthAddress.ZERO;
@@ -1137,6 +1252,7 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
1137
1252
  this.contractDataSource,
1138
1253
  new DateProvider(),
1139
1254
  this.telemetry,
1255
+ this.log.getBindings(),
1140
1256
  );
1141
1257
 
1142
1258
  this.log.verbose(`Simulating public calls for tx ${txHash}`, {
@@ -1145,6 +1261,8 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
1145
1261
  blockNumber,
1146
1262
  });
1147
1263
 
1264
+ // Ensure world-state has caught up with the latest block we loaded from the archiver
1265
+ await this.worldStateSynchronizer.syncImmediate(latestBlockNumber);
1148
1266
  const merkleTreeFork = await this.worldStateSynchronizer.fork();
1149
1267
  try {
1150
1268
  const config = PublicSimulatorConfig.from({
@@ -1152,13 +1270,15 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
1152
1270
  collectDebugLogs: true,
1153
1271
  collectHints: false,
1154
1272
  collectCallMetadata: true,
1155
- maxDebugLogMemoryReads: this.config.rpcSimulatePublicMaxDebugLogMemoryReads,
1156
1273
  collectStatistics: false,
1274
+ collectionLimits: CollectionLimitsConfig.from({
1275
+ maxDebugLogMemoryReads: this.config.rpcSimulatePublicMaxDebugLogMemoryReads,
1276
+ }),
1157
1277
  });
1158
1278
  const processor = publicProcessorFactory.create(merkleTreeFork, newGlobalVariables, config);
1159
1279
 
1160
1280
  // REFACTOR: Consider merging ProcessReturnValues into ProcessedTx
1161
- const [processedTxs, failedTxs, _usedTxs, returns] = await processor.process([tx]);
1281
+ const [processedTxs, failedTxs, _usedTxs, returns, _blobFields, debugLogs] = await processor.process([tx]);
1162
1282
  // REFACTOR: Consider returning the error rather than throwing
1163
1283
  if (failedTxs.length) {
1164
1284
  this.log.warn(`Simulated tx ${txHash} fails: ${failedTxs[0].error}`, { txHash });
@@ -1172,6 +1292,7 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
1172
1292
  processedTx.txEffect,
1173
1293
  returns,
1174
1294
  processedTx.gasUsed,
1295
+ debugLogs,
1175
1296
  );
1176
1297
  } finally {
1177
1298
  await merkleTreeFork.close();
@@ -1185,19 +1306,25 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
1185
1306
  const db = this.worldStateSynchronizer.getCommitted();
1186
1307
  const verifier = isSimulation ? undefined : this.proofVerifier;
1187
1308
 
1188
- // We accept transactions if they are not expired by the next slot (checked based on the IncludeByTimestamp field)
1309
+ // We accept transactions if they are not expired by the next slot (checked based on the ExpirationTimestamp field)
1189
1310
  const { ts: nextSlotTimestamp } = this.epochCache.getEpochAndSlotInNextL1Slot();
1190
- const blockNumber = (await this.blockSource.getBlockNumber()) + 1;
1191
- const validator = createValidatorForAcceptingTxs(db, this.contractDataSource, verifier, {
1192
- timestamp: nextSlotTimestamp,
1193
- blockNumber,
1194
- l1ChainId: this.l1ChainId,
1195
- rollupVersion: this.version,
1196
- setupAllowList: this.config.txPublicSetupAllowList ?? (await getDefaultAllowedSetupFunctions()),
1197
- gasFees: await this.getCurrentBaseFees(),
1198
- skipFeeEnforcement,
1199
- txsPermitted: !this.config.disableTransactions,
1200
- });
1311
+ const blockNumber = BlockNumber((await this.blockSource.getBlockNumber()) + 1);
1312
+ const validator = createTxValidatorForAcceptingTxsOverRPC(
1313
+ db,
1314
+ this.contractDataSource,
1315
+ verifier,
1316
+ {
1317
+ timestamp: nextSlotTimestamp,
1318
+ blockNumber,
1319
+ l1ChainId: this.l1ChainId,
1320
+ rollupVersion: this.version,
1321
+ setupAllowList: this.config.txPublicSetupAllowList ?? (await getDefaultAllowedSetupFunctions()),
1322
+ gasFees: await this.getCurrentMinFees(),
1323
+ skipFeeEnforcement,
1324
+ txsPermitted: !this.config.disableTransactions,
1325
+ },
1326
+ this.log.getBindings(),
1327
+ );
1201
1328
 
1202
1329
  return await validator.validateTx(tx);
1203
1330
  }
@@ -1266,7 +1393,7 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
1266
1393
  }
1267
1394
 
1268
1395
  // And it has an L2 block hash
1269
- const l2BlockHash = await archiver.getL2Tips().then(tips => tips.latest.hash);
1396
+ const l2BlockHash = await archiver.getL2Tips().then(tips => tips.proposed.hash);
1270
1397
  if (!l2BlockHash) {
1271
1398
  this.metrics.recordSnapshotError();
1272
1399
  throw new Error(`Archiver has no latest L2 block hash downloaded. Cannot start snapshot.`);
@@ -1294,13 +1421,13 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
1294
1421
  return Promise.resolve();
1295
1422
  }
1296
1423
 
1297
- public async rollbackTo(targetBlock: number, force?: boolean): Promise<void> {
1424
+ public async rollbackTo(targetBlock: BlockNumber, force?: boolean): Promise<void> {
1298
1425
  const archiver = this.blockSource as Archiver;
1299
1426
  if (!('rollbackTo' in archiver)) {
1300
1427
  throw new Error('Archiver implementation does not support rollbacks.');
1301
1428
  }
1302
1429
 
1303
- const finalizedBlock = await archiver.getL2Tips().then(tips => tips.finalized.number);
1430
+ const finalizedBlock = await archiver.getL2Tips().then(tips => tips.finalized.block.number);
1304
1431
  if (targetBlock < finalizedBlock) {
1305
1432
  if (force) {
1306
1433
  this.log.warn(`Clearing world state database to allow rolling back behind finalized block ${finalizedBlock}`);
@@ -1361,17 +1488,108 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
1361
1488
  }
1362
1489
  }
1363
1490
 
1491
+ public async reloadKeystore(): Promise<void> {
1492
+ if (!this.config.keyStoreDirectory?.length) {
1493
+ throw new BadRequestError(
1494
+ 'Cannot reload keystore: node is not using a file-based keystore. ' +
1495
+ 'Set KEY_STORE_DIRECTORY to use file-based keystores.',
1496
+ );
1497
+ }
1498
+ if (!this.validatorClient) {
1499
+ throw new BadRequestError('Cannot reload keystore: validator is not enabled.');
1500
+ }
1501
+
1502
+ this.log.info('Reloading keystore from disk');
1503
+
1504
+ // Re-read and validate keystore files
1505
+ const keyStores = loadKeystores(this.config.keyStoreDirectory);
1506
+ const newManager = new KeystoreManager(mergeKeystores(keyStores));
1507
+ await newManager.validateSigners();
1508
+ ValidatorClient.validateKeyStoreConfiguration(newManager, this.log);
1509
+
1510
+ // Validate that every validator's publisher keys overlap with the L1 signers
1511
+ // that were initialized at startup. Publishers cannot be hot-reloaded, so a
1512
+ // validator with a publisher key that doesn't match any existing L1 signer
1513
+ // would silently fail on every proposer slot.
1514
+ if (this.keyStoreManager && this.sequencer) {
1515
+ const oldAdapter = NodeKeystoreAdapter.fromKeyStoreManager(this.keyStoreManager);
1516
+ const availablePublishers = new Set(
1517
+ oldAdapter
1518
+ .getAttesterAddresses()
1519
+ .flatMap(a => oldAdapter.getPublisherAddresses(a).map(p => p.toString().toLowerCase())),
1520
+ );
1521
+
1522
+ const newAdapter = NodeKeystoreAdapter.fromKeyStoreManager(newManager);
1523
+ for (const attester of newAdapter.getAttesterAddresses()) {
1524
+ const pubs = newAdapter.getPublisherAddresses(attester);
1525
+ if (pubs.length > 0 && !pubs.some(p => availablePublishers.has(p.toString().toLowerCase()))) {
1526
+ throw new BadRequestError(
1527
+ `Cannot reload keystore: validator ${attester} has publisher keys ` +
1528
+ `[${pubs.map(p => p.toString()).join(', ')}] but none match the L1 signers initialized at startup ` +
1529
+ `[${[...availablePublishers].join(', ')}]. Publishers cannot be hot-reloaded — ` +
1530
+ `use an existing publisher key or restart the node.`,
1531
+ );
1532
+ }
1533
+ }
1534
+ }
1535
+
1536
+ // Build adapters for old and new keystores to compute diff
1537
+ const newAdapter = NodeKeystoreAdapter.fromKeyStoreManager(newManager);
1538
+ const newAddresses = newAdapter.getAttesterAddresses();
1539
+ const oldAddresses = this.keyStoreManager
1540
+ ? NodeKeystoreAdapter.fromKeyStoreManager(this.keyStoreManager).getAttesterAddresses()
1541
+ : [];
1542
+
1543
+ const oldSet = new Set(oldAddresses.map(a => a.toString()));
1544
+ const newSet = new Set(newAddresses.map(a => a.toString()));
1545
+ const added = newAddresses.filter(a => !oldSet.has(a.toString()));
1546
+ const removed = oldAddresses.filter(a => !newSet.has(a.toString()));
1547
+
1548
+ if (added.length > 0) {
1549
+ this.log.info(`Keystore reload: adding attester keys: ${added.map(a => a.toString()).join(', ')}`);
1550
+ }
1551
+ if (removed.length > 0) {
1552
+ this.log.info(`Keystore reload: removing attester keys: ${removed.map(a => a.toString()).join(', ')}`);
1553
+ }
1554
+ if (added.length === 0 && removed.length === 0) {
1555
+ this.log.info('Keystore reload: attester keys unchanged');
1556
+ }
1557
+
1558
+ // Update the validator client (coinbase, feeRecipient, attester keys)
1559
+ this.validatorClient.reloadKeystore(newManager);
1560
+
1561
+ // Update the publisher factory's keystore so newly-added validators
1562
+ // can be matched to existing publisher keys when proposing blocks.
1563
+ if (this.sequencer) {
1564
+ this.sequencer.updatePublisherNodeKeyStore(newAdapter);
1565
+ }
1566
+
1567
+ // Update slasher's "don't-slash-self" list with new validator addresses
1568
+ if (this.slasherClient && !this.config.slashSelfAllowed) {
1569
+ const slashValidatorsNever = unique(
1570
+ [...(this.config.slashValidatorsNever ?? []), ...newAddresses].map(a => a.toString()),
1571
+ ).map(EthAddress.fromString);
1572
+ this.slasherClient.updateConfig({ slashValidatorsNever });
1573
+ }
1574
+
1575
+ this.keyStoreManager = newManager;
1576
+ this.log.info('Keystore reloaded: coinbase, feeRecipient, and attester keys updated');
1577
+ }
1578
+
1579
+ #getInitialHeaderHash(): Promise<BlockHash> {
1580
+ if (!this.initialHeaderHashPromise) {
1581
+ this.initialHeaderHashPromise = this.worldStateSynchronizer.getCommitted().getInitialHeader().hash();
1582
+ }
1583
+ return this.initialHeaderHashPromise;
1584
+ }
1585
+
1364
1586
  /**
1365
1587
  * Returns an instance of MerkleTreeOperations having first ensured the world state is fully synched
1366
- * @param blockNumber - The block number at which to get the data.
1588
+ * @param block - The block parameter (block number, block hash, or 'latest') at which to get the data.
1367
1589
  * @returns An instance of a committed MerkleTreeOperations
1368
1590
  */
1369
- async #getWorldState(blockNumber: L2BlockNumber) {
1370
- if (typeof blockNumber === 'number' && blockNumber < INITIAL_L2_BLOCK_NUM - 1) {
1371
- throw new Error('Invalid block number to get world state for: ' + blockNumber);
1372
- }
1373
-
1374
- let blockSyncedTo: number = 0;
1591
+ async #getWorldState(block: BlockParameter) {
1592
+ let blockSyncedTo: BlockNumber = BlockNumber.ZERO;
1375
1593
  try {
1376
1594
  // Attempt to sync the world state if necessary
1377
1595
  blockSyncedTo = await this.#syncWorldState();
@@ -1379,15 +1597,39 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
1379
1597
  this.log.error(`Error getting world state: ${err}`);
1380
1598
  }
1381
1599
 
1382
- // using a snapshot could be less efficient than using the committed db
1383
- if (blockNumber === 'latest' /*|| blockNumber === blockSyncedTo*/) {
1384
- this.log.debug(`Using committed db for block ${blockNumber}, world state synced upto ${blockSyncedTo}`);
1600
+ if (block === 'latest') {
1601
+ this.log.debug(`Using committed db for block 'latest', world state synced upto ${blockSyncedTo}`);
1385
1602
  return this.worldStateSynchronizer.getCommitted();
1386
- } else if (blockNumber <= blockSyncedTo) {
1603
+ }
1604
+
1605
+ if (BlockHash.isBlockHash(block)) {
1606
+ const initialBlockHash = await this.#getInitialHeaderHash();
1607
+ if (block.equals(initialBlockHash)) {
1608
+ // Block source doesn't handle initial header so we need to handle the case separately.
1609
+ return this.worldStateSynchronizer.getSnapshot(BlockNumber.ZERO);
1610
+ }
1611
+
1612
+ const header = await this.blockSource.getBlockHeaderByHash(block);
1613
+ if (!header) {
1614
+ throw new Error(
1615
+ `Block hash ${block.toString()} not found when querying world state. If the node API has been queried with anchor block hash possibly a reorg has occurred.`,
1616
+ );
1617
+ }
1618
+ const blockNumber = header.getBlockNumber();
1619
+ this.log.debug(`Using snapshot for block ${blockNumber}, world state synced upto ${blockSyncedTo}`);
1620
+ return this.worldStateSynchronizer.getSnapshot(blockNumber);
1621
+ }
1622
+
1623
+ // Block number provided
1624
+ {
1625
+ const blockNumber = block as BlockNumber;
1626
+
1627
+ if (blockNumber > blockSyncedTo) {
1628
+ throw new Error(`Queried block ${block} not yet synced by the node (node is synced upto ${blockSyncedTo}).`);
1629
+ }
1630
+
1387
1631
  this.log.debug(`Using snapshot for block ${blockNumber}, world state synced upto ${blockSyncedTo}`);
1388
1632
  return this.worldStateSynchronizer.getSnapshot(blockNumber);
1389
- } else {
1390
- throw new Error(`Block ${blockNumber} not yet synced`);
1391
1633
  }
1392
1634
  }
1393
1635
 
@@ -1395,8 +1637,8 @@ export class AztecNodeService implements AztecNode, AztecNodeAdmin, Traceable {
1395
1637
  * Ensure we fully sync the world state
1396
1638
  * @returns A promise that fulfils once the world state is synced
1397
1639
  */
1398
- async #syncWorldState(): Promise<number> {
1640
+ async #syncWorldState(): Promise<BlockNumber> {
1399
1641
  const blockSourceHeight = await this.blockSource.getBlockNumber();
1400
- return this.worldStateSynchronizer.syncImmediate(blockSourceHeight);
1642
+ return await this.worldStateSynchronizer.syncImmediate(blockSourceHeight);
1401
1643
  }
1402
1644
  }