@aztec/aztec-node 0.0.1-commit.96bb3f7 → 0.0.1-commit.96dac018d
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dest/aztec-node/config.d.ts +7 -4
- package/dest/aztec-node/config.d.ts.map +1 -1
- package/dest/aztec-node/config.js +10 -2
- package/dest/aztec-node/node_metrics.d.ts +1 -1
- package/dest/aztec-node/node_metrics.d.ts.map +1 -1
- package/dest/aztec-node/node_metrics.js +8 -4
- package/dest/aztec-node/server.d.ts +41 -94
- package/dest/aztec-node/server.d.ts.map +1 -1
- package/dest/aztec-node/server.js +313 -181
- package/dest/sentinel/factory.d.ts +1 -1
- package/dest/sentinel/factory.d.ts.map +1 -1
- package/dest/sentinel/factory.js +1 -1
- package/dest/sentinel/sentinel.d.ts +2 -2
- package/dest/sentinel/sentinel.d.ts.map +1 -1
- package/dest/sentinel/sentinel.js +53 -27
- package/dest/sentinel/store.d.ts +2 -2
- package/dest/sentinel/store.d.ts.map +1 -1
- package/dest/sentinel/store.js +11 -7
- package/package.json +28 -25
- package/src/aztec-node/config.ts +24 -8
- package/src/aztec-node/node_metrics.ts +12 -5
- package/src/aztec-node/server.ts +401 -242
- package/src/sentinel/factory.ts +1 -6
- package/src/sentinel/sentinel.ts +56 -23
- package/src/sentinel/store.ts +12 -12
|
@@ -374,13 +374,13 @@ var _dec, _initProto;
|
|
|
374
374
|
import { createArchiver } from '@aztec/archiver';
|
|
375
375
|
import { BBCircuitVerifier, QueuedIVCVerifier, TestCircuitVerifier } from '@aztec/bb-prover';
|
|
376
376
|
import { createBlobClientWithFileStores } from '@aztec/blob-client/client';
|
|
377
|
-
import {
|
|
377
|
+
import { Blob } from '@aztec/blob-lib';
|
|
378
378
|
import { EpochCache } from '@aztec/epoch-cache';
|
|
379
379
|
import { createEthereumChain } from '@aztec/ethereum/chain';
|
|
380
380
|
import { getPublicClient } from '@aztec/ethereum/client';
|
|
381
381
|
import { RegistryContract, RollupContract } from '@aztec/ethereum/contracts';
|
|
382
382
|
import { BlockNumber, SlotNumber } from '@aztec/foundation/branded-types';
|
|
383
|
-
import { compactArray, pick } from '@aztec/foundation/collection';
|
|
383
|
+
import { compactArray, pick, unique } from '@aztec/foundation/collection';
|
|
384
384
|
import { Fr } from '@aztec/foundation/curves/bn254';
|
|
385
385
|
import { EthAddress } from '@aztec/foundation/eth-address';
|
|
386
386
|
import { BadRequestError } from '@aztec/foundation/json-rpc';
|
|
@@ -390,26 +390,29 @@ import { DateProvider, Timer } from '@aztec/foundation/timer';
|
|
|
390
390
|
import { MembershipWitness } from '@aztec/foundation/trees';
|
|
391
391
|
import { KeystoreManager, loadKeystores, mergeKeystores } from '@aztec/node-keystore';
|
|
392
392
|
import { trySnapshotSync, uploadSnapshot } from '@aztec/node-lib/actions';
|
|
393
|
-
import {
|
|
394
|
-
import { createP2PClient, getDefaultAllowedSetupFunctions } from '@aztec/p2p';
|
|
393
|
+
import { createForwarderL1TxUtilsFromSigners, createL1TxUtilsFromSigners } from '@aztec/node-lib/factories';
|
|
394
|
+
import { createP2PClient, createTxValidatorForAcceptingTxsOverRPC, getDefaultAllowedSetupFunctions } from '@aztec/p2p';
|
|
395
395
|
import { ProtocolContractAddress } from '@aztec/protocol-contracts';
|
|
396
|
-
import {
|
|
396
|
+
import { createProverNode } from '@aztec/prover-node';
|
|
397
|
+
import { createKeyStoreForProver } from '@aztec/prover-node/config';
|
|
398
|
+
import { GlobalVariableBuilder, SequencerClient } from '@aztec/sequencer-client';
|
|
397
399
|
import { PublicProcessorFactory } from '@aztec/simulator/server';
|
|
398
400
|
import { AttestationsBlockWatcher, EpochPruneWatcher, createSlasher } from '@aztec/slasher';
|
|
399
401
|
import { CollectionLimitsConfig, PublicSimulatorConfig } from '@aztec/stdlib/avm';
|
|
400
402
|
import { AztecAddress } from '@aztec/stdlib/aztec-address';
|
|
401
|
-
import {
|
|
403
|
+
import { BlockHash, L2Block } from '@aztec/stdlib/block';
|
|
402
404
|
import { GasFees } from '@aztec/stdlib/gas';
|
|
403
405
|
import { computePublicDataTreeLeafSlot } from '@aztec/stdlib/hash';
|
|
404
406
|
import { AztecNodeAdminConfigSchema } from '@aztec/stdlib/interfaces/client';
|
|
405
407
|
import { tryStop } from '@aztec/stdlib/interfaces/server';
|
|
408
|
+
import { InMemoryDebugLogStore, NullDebugLogStore } from '@aztec/stdlib/logs';
|
|
406
409
|
import { InboxLeaf } from '@aztec/stdlib/messaging';
|
|
407
410
|
import { P2PClientType } from '@aztec/stdlib/p2p';
|
|
408
411
|
import { MerkleTreeId, NullifierMembershipWitness, PublicDataWitness } from '@aztec/stdlib/trees';
|
|
409
412
|
import { PublicSimulationOutput, TxReceipt, TxStatus } from '@aztec/stdlib/tx';
|
|
410
413
|
import { getPackageVersion } from '@aztec/stdlib/update-checker';
|
|
411
414
|
import { Attributes, getTelemetryClient, trackSpan } from '@aztec/telemetry-client';
|
|
412
|
-
import { FullNodeCheckpointsBuilder as CheckpointsBuilder, FullNodeCheckpointsBuilder, NodeKeystoreAdapter, ValidatorClient, createBlockProposalHandler, createValidatorClient
|
|
415
|
+
import { FullNodeCheckpointsBuilder as CheckpointsBuilder, FullNodeCheckpointsBuilder, NodeKeystoreAdapter, ValidatorClient, createBlockProposalHandler, createValidatorClient } from '@aztec/validator-client';
|
|
413
416
|
import { createWorldStateSynchronizer } from '@aztec/world-state';
|
|
414
417
|
import { createPublicClient, fallback, http } from 'viem';
|
|
415
418
|
import { createSentinel } from '../sentinel/factory.js';
|
|
@@ -429,6 +432,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
429
432
|
l1ToL2MessageSource;
|
|
430
433
|
worldStateSynchronizer;
|
|
431
434
|
sequencer;
|
|
435
|
+
proverNode;
|
|
432
436
|
slasherClient;
|
|
433
437
|
validatorsSentinel;
|
|
434
438
|
epochPruneWatcher;
|
|
@@ -441,6 +445,9 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
441
445
|
telemetry;
|
|
442
446
|
log;
|
|
443
447
|
blobClient;
|
|
448
|
+
validatorClient;
|
|
449
|
+
keyStoreManager;
|
|
450
|
+
debugLogStore;
|
|
444
451
|
static{
|
|
445
452
|
({ e: [_initProto] } = _apply_decs_2203_r(this, [
|
|
446
453
|
[
|
|
@@ -451,10 +458,11 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
451
458
|
], []));
|
|
452
459
|
}
|
|
453
460
|
metrics;
|
|
461
|
+
initialHeaderHashPromise;
|
|
454
462
|
// Prevent two snapshot operations to happen simultaneously
|
|
455
463
|
isUploadingSnapshot;
|
|
456
464
|
tracer;
|
|
457
|
-
constructor(config, p2pClient, blockSource, logsSource, contractDataSource, l1ToL2MessageSource, worldStateSynchronizer, sequencer, slasherClient, validatorsSentinel, epochPruneWatcher, l1ChainId, version, globalVariableBuilder, epochCache, packageVersion, proofVerifier, telemetry = getTelemetryClient(), log = createLogger('node'), blobClient){
|
|
465
|
+
constructor(config, p2pClient, blockSource, logsSource, contractDataSource, l1ToL2MessageSource, worldStateSynchronizer, sequencer, proverNode, slasherClient, validatorsSentinel, epochPruneWatcher, l1ChainId, version, globalVariableBuilder, epochCache, packageVersion, proofVerifier, telemetry = getTelemetryClient(), log = createLogger('node'), blobClient, validatorClient, keyStoreManager, debugLogStore = new NullDebugLogStore()){
|
|
458
466
|
this.config = config;
|
|
459
467
|
this.p2pClient = p2pClient;
|
|
460
468
|
this.blockSource = blockSource;
|
|
@@ -463,6 +471,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
463
471
|
this.l1ToL2MessageSource = l1ToL2MessageSource;
|
|
464
472
|
this.worldStateSynchronizer = worldStateSynchronizer;
|
|
465
473
|
this.sequencer = sequencer;
|
|
474
|
+
this.proverNode = proverNode;
|
|
466
475
|
this.slasherClient = slasherClient;
|
|
467
476
|
this.validatorsSentinel = validatorsSentinel;
|
|
468
477
|
this.epochPruneWatcher = epochPruneWatcher;
|
|
@@ -475,11 +484,21 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
475
484
|
this.telemetry = telemetry;
|
|
476
485
|
this.log = log;
|
|
477
486
|
this.blobClient = blobClient;
|
|
478
|
-
this.
|
|
487
|
+
this.validatorClient = validatorClient;
|
|
488
|
+
this.keyStoreManager = keyStoreManager;
|
|
489
|
+
this.debugLogStore = debugLogStore;
|
|
490
|
+
this.initialHeaderHashPromise = (_initProto(this), undefined);
|
|
491
|
+
this.isUploadingSnapshot = false;
|
|
479
492
|
this.metrics = new NodeMetrics(telemetry, 'AztecNodeService');
|
|
480
493
|
this.tracer = telemetry.getTracer('AztecNodeService');
|
|
481
494
|
this.log.info(`Aztec Node version: ${this.packageVersion}`);
|
|
482
495
|
this.log.info(`Aztec Node started on chain 0x${l1ChainId.toString(16)}`, config.l1Contracts);
|
|
496
|
+
// A defensive check that protects us against introducing a bug in the complex `createAndSync` function. We must
|
|
497
|
+
// never have debugLogStore enabled when not in test mode because then we would be accumulating debug logs in
|
|
498
|
+
// memory which could be a DoS vector on the sequencer (since no fees are paid for debug logs).
|
|
499
|
+
if (debugLogStore.isEnabled && config.realProofs) {
|
|
500
|
+
throw new Error('debugLogStore should never be enabled when realProofs are set');
|
|
501
|
+
}
|
|
483
502
|
}
|
|
484
503
|
async getWorldStateSyncStatus() {
|
|
485
504
|
const status = await this.worldStateSynchronizer.status();
|
|
@@ -501,16 +520,27 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
501
520
|
const telemetry = deps.telemetry ?? getTelemetryClient();
|
|
502
521
|
const dateProvider = deps.dateProvider ?? new DateProvider();
|
|
503
522
|
const ethereumChain = createEthereumChain(config.l1RpcUrls, config.l1ChainId);
|
|
504
|
-
// Build a key store from file if given or from environment otherwise
|
|
523
|
+
// Build a key store from file if given or from environment otherwise.
|
|
524
|
+
// We keep the raw KeyStore available so we can merge with prover keys if enableProverNode is set.
|
|
505
525
|
let keyStoreManager;
|
|
506
526
|
const keyStoreProvided = config.keyStoreDirectory !== undefined && config.keyStoreDirectory.length > 0;
|
|
507
527
|
if (keyStoreProvided) {
|
|
508
528
|
const keyStores = loadKeystores(config.keyStoreDirectory);
|
|
509
529
|
keyStoreManager = new KeystoreManager(mergeKeystores(keyStores));
|
|
510
530
|
} else {
|
|
511
|
-
const
|
|
512
|
-
|
|
513
|
-
|
|
531
|
+
const rawKeyStores = [];
|
|
532
|
+
const validatorKeyStore = createKeyStoreForValidator(config);
|
|
533
|
+
if (validatorKeyStore) {
|
|
534
|
+
rawKeyStores.push(validatorKeyStore);
|
|
535
|
+
}
|
|
536
|
+
if (config.enableProverNode) {
|
|
537
|
+
const proverKeyStore = createKeyStoreForProver(config);
|
|
538
|
+
if (proverKeyStore) {
|
|
539
|
+
rawKeyStores.push(proverKeyStore);
|
|
540
|
+
}
|
|
541
|
+
}
|
|
542
|
+
if (rawKeyStores.length > 0) {
|
|
543
|
+
keyStoreManager = new KeystoreManager(rawKeyStores.length === 1 ? rawKeyStores[0] : mergeKeystores(rawKeyStores));
|
|
514
544
|
}
|
|
515
545
|
}
|
|
516
546
|
await keyStoreManager?.validateSigners();
|
|
@@ -519,8 +549,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
519
549
|
if (keyStoreManager === undefined) {
|
|
520
550
|
throw new Error('Failed to create key store, a requirement for running a validator');
|
|
521
551
|
}
|
|
522
|
-
if (!keyStoreProvided) {
|
|
523
|
-
log.warn(
|
|
552
|
+
if (!keyStoreProvided && process.env.NODE_ENV !== 'test') {
|
|
553
|
+
log.warn("Keystore created from env: it's recommended to use a file-based key store for production");
|
|
524
554
|
}
|
|
525
555
|
ValidatorClient.validateKeyStoreConfiguration(keyStoreManager, log);
|
|
526
556
|
}
|
|
@@ -551,7 +581,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
551
581
|
if (config.rollupVersion !== Number(rollupVersionFromRollup)) {
|
|
552
582
|
log.warn(`Registry looked up and returned a rollup with version (${config.rollupVersion}), but this does not match with version detected from the rollup directly: (${rollupVersionFromRollup}).`);
|
|
553
583
|
}
|
|
554
|
-
const blobClient = await createBlobClientWithFileStores(config,
|
|
584
|
+
const blobClient = await createBlobClientWithFileStores(config, log.createChild('blob-client'));
|
|
555
585
|
// attempt snapshot sync if possible
|
|
556
586
|
await trySnapshotSync(config, log);
|
|
557
587
|
const epochCache = await EpochCache.create(config.l1Contracts.rollupAddress, config, {
|
|
@@ -568,30 +598,29 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
568
598
|
// now create the merkle trees and the world state synchronizer
|
|
569
599
|
const worldStateSynchronizer = await createWorldStateSynchronizer(config, archiver, options.prefilledPublicData, telemetry);
|
|
570
600
|
const circuitVerifier = config.realProofs || config.debugForceTxProofVerification ? await BBCircuitVerifier.new(config) : new TestCircuitVerifier(config.proverTestVerificationDelayMs);
|
|
601
|
+
let debugLogStore;
|
|
571
602
|
if (!config.realProofs) {
|
|
572
603
|
log.warn(`Aztec node is accepting fake proofs`);
|
|
604
|
+
debugLogStore = new InMemoryDebugLogStore();
|
|
605
|
+
log.info('Aztec node started in test mode (realProofs set to false) hence debug logs from public functions will be collected and served');
|
|
606
|
+
} else {
|
|
607
|
+
debugLogStore = new NullDebugLogStore();
|
|
573
608
|
}
|
|
574
609
|
const proofVerifier = new QueuedIVCVerifier(config, circuitVerifier);
|
|
575
610
|
// create the tx pool and the p2p client, which will need the l2 block source
|
|
576
611
|
const p2pClient = await createP2PClient(P2PClientType.Full, config, archiver, proofVerifier, worldStateSynchronizer, epochCache, packageVersion, dateProvider, telemetry, deps.p2pClientDeps);
|
|
577
612
|
// We should really not be modifying the config object
|
|
578
613
|
config.txPublicSetupAllowList = config.txPublicSetupAllowList ?? await getDefaultAllowedSetupFunctions();
|
|
579
|
-
// Create BlockBuilder for EpochPruneWatcher (slasher functionality)
|
|
580
|
-
const blockBuilder = new BlockBuilder({
|
|
581
|
-
...config,
|
|
582
|
-
l1GenesisTime,
|
|
583
|
-
slotDuration: Number(slotDuration)
|
|
584
|
-
}, worldStateSynchronizer, archiver, dateProvider, telemetry);
|
|
585
614
|
// Create FullNodeCheckpointsBuilder for validator and non-validator block proposal handling
|
|
586
615
|
const validatorCheckpointsBuilder = new FullNodeCheckpointsBuilder({
|
|
587
616
|
...config,
|
|
588
617
|
l1GenesisTime,
|
|
589
618
|
slotDuration: Number(slotDuration)
|
|
590
|
-
}, archiver, dateProvider, telemetry);
|
|
619
|
+
}, worldStateSynchronizer, archiver, dateProvider, telemetry);
|
|
591
620
|
// We'll accumulate sentinel watchers here
|
|
592
621
|
const watchers = [];
|
|
593
622
|
// Create validator client if required
|
|
594
|
-
const validatorClient = createValidatorClient(config, {
|
|
623
|
+
const validatorClient = await createValidatorClient(config, {
|
|
595
624
|
checkpointsBuilder: validatorCheckpointsBuilder,
|
|
596
625
|
worldState: worldStateSynchronizer,
|
|
597
626
|
p2pClient,
|
|
@@ -637,7 +666,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
637
666
|
}
|
|
638
667
|
let epochPruneWatcher;
|
|
639
668
|
if (config.slashPrunePenalty > 0n || config.slashDataWithholdingPenalty > 0n) {
|
|
640
|
-
epochPruneWatcher = new EpochPruneWatcher(archiver, archiver, epochCache, p2pClient.getTxProvider(),
|
|
669
|
+
epochPruneWatcher = new EpochPruneWatcher(archiver, archiver, epochCache, p2pClient.getTxProvider(), validatorCheckpointsBuilder, config);
|
|
641
670
|
watchers.push(epochPruneWatcher);
|
|
642
671
|
}
|
|
643
672
|
// We assume we want to slash for invalid attestations unless all max penalties are set to 0
|
|
@@ -663,27 +692,29 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
663
692
|
const validatorAddresses = keyStoreManager ? NodeKeystoreAdapter.fromKeyStoreManager(keyStoreManager).getAddresses() : [];
|
|
664
693
|
slasherClient = await createSlasher(config, config.l1Contracts, getPublicClient(config), watchers, dateProvider, epochCache, validatorAddresses, undefined);
|
|
665
694
|
await slasherClient.start();
|
|
666
|
-
const l1TxUtils = config.
|
|
695
|
+
const l1TxUtils = config.sequencerPublisherForwarderAddress ? await createForwarderL1TxUtilsFromSigners(publicClient, keyStoreManager.createAllValidatorPublisherSigners(), config.sequencerPublisherForwarderAddress, {
|
|
667
696
|
...config,
|
|
668
697
|
scope: 'sequencer'
|
|
669
698
|
}, {
|
|
670
699
|
telemetry,
|
|
671
700
|
logger: log.createChild('l1-tx-utils'),
|
|
672
|
-
dateProvider
|
|
673
|
-
|
|
701
|
+
dateProvider,
|
|
702
|
+
kzg: Blob.getViemKzgInstance()
|
|
703
|
+
}) : await createL1TxUtilsFromSigners(publicClient, keyStoreManager.createAllValidatorPublisherSigners(), {
|
|
674
704
|
...config,
|
|
675
705
|
scope: 'sequencer'
|
|
676
706
|
}, {
|
|
677
707
|
telemetry,
|
|
678
708
|
logger: log.createChild('l1-tx-utils'),
|
|
679
|
-
dateProvider
|
|
709
|
+
dateProvider,
|
|
710
|
+
kzg: Blob.getViemKzgInstance()
|
|
680
711
|
});
|
|
681
712
|
// Create and start the sequencer client
|
|
682
713
|
const checkpointsBuilder = new CheckpointsBuilder({
|
|
683
714
|
...config,
|
|
684
715
|
l1GenesisTime,
|
|
685
716
|
slotDuration: Number(slotDuration)
|
|
686
|
-
}, archiver, dateProvider, telemetry);
|
|
717
|
+
}, worldStateSynchronizer, archiver, dateProvider, telemetry, debugLogStore);
|
|
687
718
|
sequencer = await SequencerClient.new(config, {
|
|
688
719
|
...deps,
|
|
689
720
|
epochCache,
|
|
@@ -707,13 +738,35 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
707
738
|
} else if (sequencer) {
|
|
708
739
|
log.warn(`Sequencer created but not started`);
|
|
709
740
|
}
|
|
741
|
+
// Create prover node subsystem if enabled
|
|
742
|
+
let proverNode;
|
|
743
|
+
if (config.enableProverNode) {
|
|
744
|
+
proverNode = await createProverNode(config, {
|
|
745
|
+
...deps.proverNodeDeps,
|
|
746
|
+
telemetry,
|
|
747
|
+
dateProvider,
|
|
748
|
+
archiver,
|
|
749
|
+
worldStateSynchronizer,
|
|
750
|
+
p2pClient,
|
|
751
|
+
epochCache,
|
|
752
|
+
blobClient,
|
|
753
|
+
keyStoreManager
|
|
754
|
+
});
|
|
755
|
+
if (!options.dontStartProverNode) {
|
|
756
|
+
await proverNode.start();
|
|
757
|
+
log.info(`Prover node subsystem started`);
|
|
758
|
+
} else {
|
|
759
|
+
log.info(`Prover node subsystem created but not started`);
|
|
760
|
+
}
|
|
761
|
+
}
|
|
710
762
|
const globalVariableBuilder = new GlobalVariableBuilder({
|
|
711
763
|
...config,
|
|
712
764
|
rollupVersion: BigInt(config.rollupVersion),
|
|
713
765
|
l1GenesisTime,
|
|
714
766
|
slotDuration: Number(slotDuration)
|
|
715
767
|
});
|
|
716
|
-
|
|
768
|
+
const node = new AztecNodeService(config, p2pClient, archiver, archiver, archiver, archiver, worldStateSynchronizer, sequencer, proverNode, slasherClient, validatorsSentinel, epochPruneWatcher, ethereumChain.chainInfo.id, config.rollupVersion, globalVariableBuilder, epochCache, packageVersion, proofVerifier, telemetry, log, blobClient, validatorClient, keyStoreManager, debugLogStore);
|
|
769
|
+
return node;
|
|
717
770
|
}
|
|
718
771
|
/**
|
|
719
772
|
* Returns the sequencer client instance.
|
|
@@ -721,6 +774,9 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
721
774
|
*/ getSequencer() {
|
|
722
775
|
return this.sequencer;
|
|
723
776
|
}
|
|
777
|
+
/** Returns the prover node subsystem, if enabled. */ getProverNode() {
|
|
778
|
+
return this.proverNode;
|
|
779
|
+
}
|
|
724
780
|
getBlockSource() {
|
|
725
781
|
return this.blockSource;
|
|
726
782
|
}
|
|
@@ -763,33 +819,46 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
763
819
|
rollupVersion,
|
|
764
820
|
enr,
|
|
765
821
|
l1ContractAddresses: contractAddresses,
|
|
766
|
-
protocolContractAddresses: protocolContractAddresses
|
|
822
|
+
protocolContractAddresses: protocolContractAddresses,
|
|
823
|
+
realProofs: !!this.config.realProofs
|
|
767
824
|
};
|
|
768
825
|
return nodeInfo;
|
|
769
826
|
}
|
|
770
827
|
/**
|
|
771
|
-
* Get a block specified by its number.
|
|
772
|
-
* @param
|
|
828
|
+
* Get a block specified by its block number, block hash, or 'latest'.
|
|
829
|
+
* @param block - The block parameter (block number, block hash, or 'latest').
|
|
773
830
|
* @returns The requested block.
|
|
774
|
-
*/ async getBlock(
|
|
775
|
-
|
|
776
|
-
|
|
831
|
+
*/ async getBlock(block) {
|
|
832
|
+
if (BlockHash.isBlockHash(block)) {
|
|
833
|
+
return this.getBlockByHash(block);
|
|
834
|
+
}
|
|
835
|
+
const blockNumber = block === 'latest' ? await this.getBlockNumber() : block;
|
|
836
|
+
if (blockNumber === BlockNumber.ZERO) {
|
|
837
|
+
return this.buildInitialBlock();
|
|
838
|
+
}
|
|
839
|
+
return await this.blockSource.getL2Block(blockNumber);
|
|
777
840
|
}
|
|
778
841
|
/**
|
|
779
842
|
* Get a block specified by its hash.
|
|
780
843
|
* @param blockHash - The block hash being requested.
|
|
781
844
|
* @returns The requested block.
|
|
782
845
|
*/ async getBlockByHash(blockHash) {
|
|
783
|
-
const
|
|
784
|
-
|
|
846
|
+
const initialBlockHash = await this.#getInitialHeaderHash();
|
|
847
|
+
if (blockHash.equals(initialBlockHash)) {
|
|
848
|
+
return this.buildInitialBlock();
|
|
849
|
+
}
|
|
850
|
+
return await this.blockSource.getL2BlockByHash(blockHash);
|
|
851
|
+
}
|
|
852
|
+
buildInitialBlock() {
|
|
853
|
+
const initialHeader = this.worldStateSynchronizer.getCommitted().getInitialHeader();
|
|
854
|
+
return L2Block.empty(initialHeader);
|
|
785
855
|
}
|
|
786
856
|
/**
|
|
787
857
|
* Get a block specified by its archive root.
|
|
788
858
|
* @param archive - The archive root being requested.
|
|
789
859
|
* @returns The requested block.
|
|
790
860
|
*/ async getBlockByArchive(archive) {
|
|
791
|
-
|
|
792
|
-
return publishedBlock?.block;
|
|
861
|
+
return await this.blockSource.getL2BlockByArchive(archive);
|
|
793
862
|
}
|
|
794
863
|
/**
|
|
795
864
|
* Method to request blocks. Will attempt to return all requested blocks but will return only those available.
|
|
@@ -797,19 +866,13 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
797
866
|
* @param limit - The maximum number of blocks to obtain.
|
|
798
867
|
* @returns The blocks requested.
|
|
799
868
|
*/ async getBlocks(from, limit) {
|
|
800
|
-
return await this.blockSource.getBlocks(from, limit) ?? [];
|
|
801
|
-
}
|
|
802
|
-
async getPublishedBlocks(from, limit) {
|
|
803
|
-
return await this.blockSource.getPublishedBlocks(from, limit) ?? [];
|
|
869
|
+
return await this.blockSource.getBlocks(from, BlockNumber(limit)) ?? [];
|
|
804
870
|
}
|
|
805
|
-
async
|
|
806
|
-
return await this.blockSource.
|
|
871
|
+
async getCheckpoints(from, limit) {
|
|
872
|
+
return await this.blockSource.getCheckpoints(from, limit) ?? [];
|
|
807
873
|
}
|
|
808
|
-
async
|
|
809
|
-
return await this.blockSource.
|
|
810
|
-
}
|
|
811
|
-
async getCheckpointedBlocks(from, limit, proven) {
|
|
812
|
-
return await this.blockSource.getCheckpointedBlocks(from, limit, proven) ?? [];
|
|
874
|
+
async getCheckpointedBlocks(from, limit) {
|
|
875
|
+
return await this.blockSource.getCheckpointedBlocks(from, limit) ?? [];
|
|
813
876
|
}
|
|
814
877
|
/**
|
|
815
878
|
* Method to fetch the current min L2 fees.
|
|
@@ -835,6 +898,9 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
835
898
|
async getProvenBlockNumber() {
|
|
836
899
|
return await this.blockSource.getProvenBlockNumber();
|
|
837
900
|
}
|
|
901
|
+
async getCheckpointedBlockNumber() {
|
|
902
|
+
return await this.blockSource.getCheckpointedL2BlockNumber();
|
|
903
|
+
}
|
|
838
904
|
/**
|
|
839
905
|
* Method to fetch the version of the package.
|
|
840
906
|
* @returns The node package version
|
|
@@ -859,11 +925,29 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
859
925
|
getContract(address) {
|
|
860
926
|
return this.contractDataSource.getContract(address);
|
|
861
927
|
}
|
|
862
|
-
getPrivateLogsByTags(tags) {
|
|
863
|
-
|
|
864
|
-
|
|
865
|
-
|
|
866
|
-
|
|
928
|
+
async getPrivateLogsByTags(tags, page, referenceBlock) {
|
|
929
|
+
if (referenceBlock) {
|
|
930
|
+
const initialBlockHash = await this.#getInitialHeaderHash();
|
|
931
|
+
if (!referenceBlock.equals(initialBlockHash)) {
|
|
932
|
+
const header = await this.blockSource.getBlockHeaderByHash(referenceBlock);
|
|
933
|
+
if (!header) {
|
|
934
|
+
throw new Error(`Block ${referenceBlock.toString()} not found in the node. This might indicate a reorg has occurred.`);
|
|
935
|
+
}
|
|
936
|
+
}
|
|
937
|
+
}
|
|
938
|
+
return this.logsSource.getPrivateLogsByTags(tags, page);
|
|
939
|
+
}
|
|
940
|
+
async getPublicLogsByTagsFromContract(contractAddress, tags, page, referenceBlock) {
|
|
941
|
+
if (referenceBlock) {
|
|
942
|
+
const initialBlockHash = await this.#getInitialHeaderHash();
|
|
943
|
+
if (!referenceBlock.equals(initialBlockHash)) {
|
|
944
|
+
const header = await this.blockSource.getBlockHeaderByHash(referenceBlock);
|
|
945
|
+
if (!header) {
|
|
946
|
+
throw new Error(`Block ${referenceBlock.toString()} not found in the node. This might indicate a reorg has occurred.`);
|
|
947
|
+
}
|
|
948
|
+
}
|
|
949
|
+
}
|
|
950
|
+
return this.logsSource.getPublicLogsByTagsFromContract(contractAddress, tags, page);
|
|
867
951
|
}
|
|
868
952
|
/**
|
|
869
953
|
* Gets public logs based on the provided filter.
|
|
@@ -904,18 +988,26 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
904
988
|
});
|
|
905
989
|
}
|
|
906
990
|
async getTxReceipt(txHash) {
|
|
907
|
-
|
|
908
|
-
//
|
|
909
|
-
|
|
910
|
-
|
|
911
|
-
|
|
912
|
-
txReceipt = new TxReceipt(txHash, TxStatus.PENDING, '');
|
|
913
|
-
}
|
|
991
|
+
// Check the tx pool status first. If the tx is known to the pool (pending or mined), we'll use that
|
|
992
|
+
// as a fallback if we don't find a settled receipt in the archiver.
|
|
993
|
+
const txPoolStatus = await this.p2pClient.getTxStatus(txHash);
|
|
994
|
+
const isKnownToPool = txPoolStatus === 'pending' || txPoolStatus === 'mined';
|
|
995
|
+
// Then get the actual tx from the archiver, which tracks every tx in a mined block.
|
|
914
996
|
const settledTxReceipt = await this.blockSource.getSettledTxReceipt(txHash);
|
|
997
|
+
let receipt;
|
|
915
998
|
if (settledTxReceipt) {
|
|
916
|
-
|
|
999
|
+
receipt = settledTxReceipt;
|
|
1000
|
+
} else if (isKnownToPool) {
|
|
1001
|
+
// If the tx is in the pool but not in the archiver, it's pending.
|
|
1002
|
+
// This handles race conditions between archiver and p2p, where the archiver
|
|
1003
|
+
// has pruned the block in which a tx was mined, but p2p has not caught up yet.
|
|
1004
|
+
receipt = new TxReceipt(txHash, TxStatus.PENDING, undefined, undefined);
|
|
1005
|
+
} else {
|
|
1006
|
+
// Otherwise, if we don't know the tx, we consider it dropped.
|
|
1007
|
+
receipt = new TxReceipt(txHash, TxStatus.DROPPED, undefined, 'Tx dropped by P2P node');
|
|
917
1008
|
}
|
|
918
|
-
|
|
1009
|
+
this.debugLogStore.decorateReceiptWithLogs(txHash.toString(), receipt);
|
|
1010
|
+
return receipt;
|
|
919
1011
|
}
|
|
920
1012
|
getTxEffect(txHash) {
|
|
921
1013
|
return this.blockSource.getTxEffect(txHash);
|
|
@@ -929,6 +1021,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
929
1021
|
await tryStop(this.slasherClient);
|
|
930
1022
|
await tryStop(this.proofVerifier);
|
|
931
1023
|
await tryStop(this.sequencer);
|
|
1024
|
+
await tryStop(this.proverNode);
|
|
932
1025
|
await tryStop(this.p2pClient);
|
|
933
1026
|
await tryStop(this.worldStateSynchronizer);
|
|
934
1027
|
await tryStop(this.blockSource);
|
|
@@ -967,15 +1060,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
967
1060
|
*/ async getTxsByHash(txHashes) {
|
|
968
1061
|
return compactArray(await Promise.all(txHashes.map((txHash)=>this.getTxByHash(txHash))));
|
|
969
1062
|
}
|
|
970
|
-
|
|
971
|
-
|
|
972
|
-
* the leaves were inserted.
|
|
973
|
-
* @param blockNumber - The block number at which to get the data or 'latest' for latest data.
|
|
974
|
-
* @param treeId - The tree to search in.
|
|
975
|
-
* @param leafValues - The values to search for.
|
|
976
|
-
* @returns The indices of leaves and the block metadata of a block in which the leaves were inserted.
|
|
977
|
-
*/ async findLeavesIndexes(blockNumber, treeId, leafValues) {
|
|
978
|
-
const committedDb = await this.#getWorldState(blockNumber);
|
|
1063
|
+
async findLeavesIndexes(referenceBlock, treeId, leafValues) {
|
|
1064
|
+
const committedDb = await this.#getWorldState(referenceBlock);
|
|
979
1065
|
const maybeIndices = await committedDb.findLeafIndices(treeId, leafValues.map((x)=>x.toBuffer()));
|
|
980
1066
|
// We filter out undefined values
|
|
981
1067
|
const indices = maybeIndices.filter((x)=>x !== undefined);
|
|
@@ -1018,50 +1104,27 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1018
1104
|
}
|
|
1019
1105
|
return {
|
|
1020
1106
|
l2BlockNumber: BlockNumber(Number(blockNumber)),
|
|
1021
|
-
l2BlockHash:
|
|
1107
|
+
l2BlockHash: new BlockHash(blockHash),
|
|
1022
1108
|
data: index
|
|
1023
1109
|
};
|
|
1024
1110
|
});
|
|
1025
1111
|
}
|
|
1026
|
-
|
|
1027
|
-
|
|
1028
|
-
* @param blockNumber - The block number at which to get the data.
|
|
1029
|
-
* @param leafIndex - The index of the leaf for which the sibling path is required.
|
|
1030
|
-
* @returns The sibling path for the leaf index.
|
|
1031
|
-
*/ async getNullifierSiblingPath(blockNumber, leafIndex) {
|
|
1032
|
-
const committedDb = await this.#getWorldState(blockNumber);
|
|
1033
|
-
return committedDb.getSiblingPath(MerkleTreeId.NULLIFIER_TREE, leafIndex);
|
|
1034
|
-
}
|
|
1035
|
-
/**
|
|
1036
|
-
* Returns a sibling path for the given index in the data tree.
|
|
1037
|
-
* @param blockNumber - The block number at which to get the data.
|
|
1038
|
-
* @param leafIndex - The index of the leaf for which the sibling path is required.
|
|
1039
|
-
* @returns The sibling path for the leaf index.
|
|
1040
|
-
*/ async getNoteHashSiblingPath(blockNumber, leafIndex) {
|
|
1041
|
-
const committedDb = await this.#getWorldState(blockNumber);
|
|
1042
|
-
return committedDb.getSiblingPath(MerkleTreeId.NOTE_HASH_TREE, leafIndex);
|
|
1043
|
-
}
|
|
1044
|
-
async getArchiveMembershipWitness(blockNumber, archive) {
|
|
1045
|
-
const committedDb = await this.#getWorldState(blockNumber);
|
|
1112
|
+
async getBlockHashMembershipWitness(referenceBlock, blockHash) {
|
|
1113
|
+
const committedDb = await this.#getWorldState(referenceBlock);
|
|
1046
1114
|
const [pathAndIndex] = await committedDb.findSiblingPaths(MerkleTreeId.ARCHIVE, [
|
|
1047
|
-
|
|
1115
|
+
blockHash
|
|
1048
1116
|
]);
|
|
1049
1117
|
return pathAndIndex === undefined ? undefined : MembershipWitness.fromSiblingPath(pathAndIndex.index, pathAndIndex.path);
|
|
1050
1118
|
}
|
|
1051
|
-
async getNoteHashMembershipWitness(
|
|
1052
|
-
const committedDb = await this.#getWorldState(
|
|
1119
|
+
async getNoteHashMembershipWitness(referenceBlock, noteHash) {
|
|
1120
|
+
const committedDb = await this.#getWorldState(referenceBlock);
|
|
1053
1121
|
const [pathAndIndex] = await committedDb.findSiblingPaths(MerkleTreeId.NOTE_HASH_TREE, [
|
|
1054
1122
|
noteHash
|
|
1055
1123
|
]);
|
|
1056
1124
|
return pathAndIndex === undefined ? undefined : MembershipWitness.fromSiblingPath(pathAndIndex.index, pathAndIndex.path);
|
|
1057
1125
|
}
|
|
1058
|
-
|
|
1059
|
-
|
|
1060
|
-
* @param blockNumber - The block number at which to get the data.
|
|
1061
|
-
* @param l1ToL2Message - The l1ToL2Message to get the index / sibling path for.
|
|
1062
|
-
* @returns A tuple of the index and the sibling path of the L1ToL2Message (undefined if not found).
|
|
1063
|
-
*/ async getL1ToL2MessageMembershipWitness(blockNumber, l1ToL2Message) {
|
|
1064
|
-
const db = await this.#getWorldState(blockNumber);
|
|
1126
|
+
async getL1ToL2MessageMembershipWitness(referenceBlock, l1ToL2Message) {
|
|
1127
|
+
const db = await this.#getWorldState(referenceBlock);
|
|
1065
1128
|
const [witness] = await db.findSiblingPaths(MerkleTreeId.L1_TO_L2_MESSAGE_TREE, [
|
|
1066
1129
|
l1ToL2Message
|
|
1067
1130
|
]);
|
|
@@ -1091,12 +1154,13 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1091
1154
|
* @param epoch - The epoch at which to get the data.
|
|
1092
1155
|
* @returns The L2 to L1 messages (empty array if the epoch is not found).
|
|
1093
1156
|
*/ async getL2ToL1Messages(epoch) {
|
|
1094
|
-
// Assumes `
|
|
1095
|
-
const
|
|
1157
|
+
// Assumes `getCheckpointedBlocksForEpoch` returns blocks in ascending order of block number.
|
|
1158
|
+
const checkpointedBlocks = await this.blockSource.getCheckpointedBlocksForEpoch(epoch);
|
|
1096
1159
|
const blocksInCheckpoints = [];
|
|
1097
1160
|
let previousSlotNumber = SlotNumber.ZERO;
|
|
1098
1161
|
let checkpointIndex = -1;
|
|
1099
|
-
for (const
|
|
1162
|
+
for (const checkpointedBlock of checkpointedBlocks){
|
|
1163
|
+
const block = checkpointedBlock.block;
|
|
1100
1164
|
const slotNumber = block.header.globalVariables.slotNumber;
|
|
1101
1165
|
if (slotNumber !== previousSlotNumber) {
|
|
1102
1166
|
checkpointIndex++;
|
|
@@ -1107,31 +1171,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1107
1171
|
}
|
|
1108
1172
|
return blocksInCheckpoints.map((blocks)=>blocks.map((block)=>block.body.txEffects.map((txEffect)=>txEffect.l2ToL1Msgs)));
|
|
1109
1173
|
}
|
|
1110
|
-
|
|
1111
|
-
|
|
1112
|
-
* @param blockNumber - The block number at which to get the data.
|
|
1113
|
-
* @param leafIndex - Index of the leaf in the tree.
|
|
1114
|
-
* @returns The sibling path.
|
|
1115
|
-
*/ async getArchiveSiblingPath(blockNumber, leafIndex) {
|
|
1116
|
-
const committedDb = await this.#getWorldState(blockNumber);
|
|
1117
|
-
return committedDb.getSiblingPath(MerkleTreeId.ARCHIVE, leafIndex);
|
|
1118
|
-
}
|
|
1119
|
-
/**
|
|
1120
|
-
* Returns a sibling path for a leaf in the committed public data tree.
|
|
1121
|
-
* @param blockNumber - The block number at which to get the data.
|
|
1122
|
-
* @param leafIndex - Index of the leaf in the tree.
|
|
1123
|
-
* @returns The sibling path.
|
|
1124
|
-
*/ async getPublicDataSiblingPath(blockNumber, leafIndex) {
|
|
1125
|
-
const committedDb = await this.#getWorldState(blockNumber);
|
|
1126
|
-
return committedDb.getSiblingPath(MerkleTreeId.PUBLIC_DATA_TREE, leafIndex);
|
|
1127
|
-
}
|
|
1128
|
-
/**
|
|
1129
|
-
* Returns a nullifier membership witness for a given nullifier at a given block.
|
|
1130
|
-
* @param blockNumber - The block number at which to get the index.
|
|
1131
|
-
* @param nullifier - Nullifier we try to find witness for.
|
|
1132
|
-
* @returns The nullifier membership witness (if found).
|
|
1133
|
-
*/ async getNullifierMembershipWitness(blockNumber, nullifier) {
|
|
1134
|
-
const db = await this.#getWorldState(blockNumber);
|
|
1174
|
+
async getNullifierMembershipWitness(referenceBlock, nullifier) {
|
|
1175
|
+
const db = await this.#getWorldState(referenceBlock);
|
|
1135
1176
|
const [witness] = await db.findSiblingPaths(MerkleTreeId.NULLIFIER_TREE, [
|
|
1136
1177
|
nullifier.toBuffer()
|
|
1137
1178
|
]);
|
|
@@ -1147,7 +1188,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1147
1188
|
}
|
|
1148
1189
|
/**
|
|
1149
1190
|
* Returns a low nullifier membership witness for a given nullifier at a given block.
|
|
1150
|
-
* @param
|
|
1191
|
+
* @param referenceBlock - The block parameter (block number, block hash, or 'latest') at which to get the data
|
|
1192
|
+
* (which contains the root of the nullifier tree in which we are searching for the nullifier).
|
|
1151
1193
|
* @param nullifier - Nullifier we try to find the low nullifier witness for.
|
|
1152
1194
|
* @returns The low nullifier membership witness (if found).
|
|
1153
1195
|
* @remarks Low nullifier witness can be used to perform a nullifier non-inclusion proof by leveraging the "linked
|
|
@@ -1158,8 +1200,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1158
1200
|
* the nullifier already exists in the tree. This is because the `getPreviousValueIndex` function returns the
|
|
1159
1201
|
* index of the nullifier itself when it already exists in the tree.
|
|
1160
1202
|
* TODO: This is a confusing behavior and we should eventually address that.
|
|
1161
|
-
*/ async getLowNullifierMembershipWitness(
|
|
1162
|
-
const committedDb = await this.#getWorldState(
|
|
1203
|
+
*/ async getLowNullifierMembershipWitness(referenceBlock, nullifier) {
|
|
1204
|
+
const committedDb = await this.#getWorldState(referenceBlock);
|
|
1163
1205
|
const findResult = await committedDb.getPreviousValueIndex(MerkleTreeId.NULLIFIER_TREE, nullifier.toBigInt());
|
|
1164
1206
|
if (!findResult) {
|
|
1165
1207
|
return undefined;
|
|
@@ -1172,8 +1214,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1172
1214
|
const siblingPath = await committedDb.getSiblingPath(MerkleTreeId.NULLIFIER_TREE, BigInt(index));
|
|
1173
1215
|
return new NullifierMembershipWitness(BigInt(index), preimageData, siblingPath);
|
|
1174
1216
|
}
|
|
1175
|
-
async getPublicDataWitness(
|
|
1176
|
-
const committedDb = await this.#getWorldState(
|
|
1217
|
+
async getPublicDataWitness(referenceBlock, leafSlot) {
|
|
1218
|
+
const committedDb = await this.#getWorldState(referenceBlock);
|
|
1177
1219
|
const lowLeafResult = await committedDb.getPreviousValueIndex(MerkleTreeId.PUBLIC_DATA_TREE, leafSlot.toBigInt());
|
|
1178
1220
|
if (!lowLeafResult) {
|
|
1179
1221
|
return undefined;
|
|
@@ -1183,18 +1225,8 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1183
1225
|
return new PublicDataWitness(lowLeafResult.index, preimage, path);
|
|
1184
1226
|
}
|
|
1185
1227
|
}
|
|
1186
|
-
|
|
1187
|
-
|
|
1188
|
-
*
|
|
1189
|
-
* @remarks The storage slot here refers to the slot as it is defined in Noir not the index in the merkle tree.
|
|
1190
|
-
* Aztec's version of `eth_getStorageAt`.
|
|
1191
|
-
*
|
|
1192
|
-
* @param contract - Address of the contract to query.
|
|
1193
|
-
* @param slot - Slot to query.
|
|
1194
|
-
* @param blockNumber - The block number at which to get the data or 'latest'.
|
|
1195
|
-
* @returns Storage value at the given contract slot.
|
|
1196
|
-
*/ async getPublicStorageAt(blockNumber, contract, slot) {
|
|
1197
|
-
const committedDb = await this.#getWorldState(blockNumber);
|
|
1228
|
+
async getPublicStorageAt(referenceBlock, contract, slot) {
|
|
1229
|
+
const committedDb = await this.#getWorldState(referenceBlock);
|
|
1198
1230
|
const leafSlot = await computePublicDataTreeLeafSlot(contract, slot);
|
|
1199
1231
|
const lowLeafResult = await committedDb.getPreviousValueIndex(MerkleTreeId.PUBLIC_DATA_TREE, leafSlot.toBigInt());
|
|
1200
1232
|
if (!lowLeafResult || !lowLeafResult.alreadyPresent) {
|
|
@@ -1203,18 +1235,22 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1203
1235
|
const preimage = await committedDb.getLeafPreimage(MerkleTreeId.PUBLIC_DATA_TREE, lowLeafResult.index);
|
|
1204
1236
|
return preimage.leaf.value;
|
|
1205
1237
|
}
|
|
1206
|
-
|
|
1207
|
-
|
|
1208
|
-
|
|
1209
|
-
|
|
1210
|
-
|
|
1211
|
-
|
|
1212
|
-
|
|
1213
|
-
|
|
1214
|
-
|
|
1215
|
-
|
|
1216
|
-
|
|
1217
|
-
|
|
1238
|
+
async getBlockHeader(block = 'latest') {
|
|
1239
|
+
if (BlockHash.isBlockHash(block)) {
|
|
1240
|
+
const initialBlockHash = await this.#getInitialHeaderHash();
|
|
1241
|
+
if (block.equals(initialBlockHash)) {
|
|
1242
|
+
// Block source doesn't handle initial header so we need to handle the case separately.
|
|
1243
|
+
return this.worldStateSynchronizer.getCommitted().getInitialHeader();
|
|
1244
|
+
}
|
|
1245
|
+
return this.blockSource.getBlockHeaderByHash(block);
|
|
1246
|
+
} else {
|
|
1247
|
+
// Block source doesn't handle initial header so we need to handle the case separately.
|
|
1248
|
+
const blockNumber = block === 'latest' ? await this.getBlockNumber() : block;
|
|
1249
|
+
if (blockNumber === BlockNumber.ZERO) {
|
|
1250
|
+
return this.worldStateSynchronizer.getCommitted().getInitialHeader();
|
|
1251
|
+
}
|
|
1252
|
+
return this.blockSource.getBlockHeader(block);
|
|
1253
|
+
}
|
|
1218
1254
|
}
|
|
1219
1255
|
/**
|
|
1220
1256
|
* Get a block header specified by its archive root.
|
|
@@ -1223,6 +1259,12 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1223
1259
|
*/ async getBlockHeaderByArchive(archive) {
|
|
1224
1260
|
return await this.blockSource.getBlockHeaderByArchive(archive);
|
|
1225
1261
|
}
|
|
1262
|
+
getBlockData(number) {
|
|
1263
|
+
return this.blockSource.getBlockData(number);
|
|
1264
|
+
}
|
|
1265
|
+
getBlockDataByArchive(archive) {
|
|
1266
|
+
return this.blockSource.getBlockDataByArchive(archive);
|
|
1267
|
+
}
|
|
1226
1268
|
/**
|
|
1227
1269
|
* Simulates the public part of a transaction with the current state.
|
|
1228
1270
|
* @param tx - The transaction to simulate.
|
|
@@ -1235,17 +1277,20 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1235
1277
|
throw new BadRequestError(`Transaction total gas limit ${txGasLimit + teardownGasLimit} (${txGasLimit} + ${teardownGasLimit}) exceeds maximum gas limit ${this.config.rpcSimulatePublicMaxGasLimit} for simulation`);
|
|
1236
1278
|
}
|
|
1237
1279
|
const txHash = tx.getTxHash();
|
|
1238
|
-
const
|
|
1280
|
+
const latestBlockNumber = await this.blockSource.getBlockNumber();
|
|
1281
|
+
const blockNumber = BlockNumber.add(latestBlockNumber, 1);
|
|
1239
1282
|
// If sequencer is not initialized, we just set these values to zero for simulation.
|
|
1240
1283
|
const coinbase = EthAddress.ZERO;
|
|
1241
1284
|
const feeRecipient = AztecAddress.ZERO;
|
|
1242
1285
|
const newGlobalVariables = await this.globalVariableBuilder.buildGlobalVariables(blockNumber, coinbase, feeRecipient);
|
|
1243
|
-
const publicProcessorFactory = new PublicProcessorFactory(this.contractDataSource, new DateProvider(), this.telemetry);
|
|
1286
|
+
const publicProcessorFactory = new PublicProcessorFactory(this.contractDataSource, new DateProvider(), this.telemetry, this.log.getBindings());
|
|
1244
1287
|
this.log.verbose(`Simulating public calls for tx ${txHash}`, {
|
|
1245
1288
|
globalVariables: newGlobalVariables.toInspect(),
|
|
1246
1289
|
txHash,
|
|
1247
1290
|
blockNumber
|
|
1248
1291
|
});
|
|
1292
|
+
// Ensure world-state has caught up with the latest block we loaded from the archiver
|
|
1293
|
+
await this.worldStateSynchronizer.syncImmediate(latestBlockNumber);
|
|
1249
1294
|
const merkleTreeFork = await this.worldStateSynchronizer.fork();
|
|
1250
1295
|
try {
|
|
1251
1296
|
const config = PublicSimulatorConfig.from({
|
|
@@ -1260,7 +1305,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1260
1305
|
});
|
|
1261
1306
|
const processor = publicProcessorFactory.create(merkleTreeFork, newGlobalVariables, config);
|
|
1262
1307
|
// REFACTOR: Consider merging ProcessReturnValues into ProcessedTx
|
|
1263
|
-
const [processedTxs, failedTxs, _usedTxs, returns] = await processor.process([
|
|
1308
|
+
const [processedTxs, failedTxs, _usedTxs, returns, _blobFields, debugLogs] = await processor.process([
|
|
1264
1309
|
tx
|
|
1265
1310
|
]);
|
|
1266
1311
|
// REFACTOR: Consider returning the error rather than throwing
|
|
@@ -1271,7 +1316,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1271
1316
|
throw failedTxs[0].error;
|
|
1272
1317
|
}
|
|
1273
1318
|
const [processedTx] = processedTxs;
|
|
1274
|
-
return new PublicSimulationOutput(processedTx.revertReason, processedTx.globalVariables, processedTx.txEffect, returns, processedTx.gasUsed);
|
|
1319
|
+
return new PublicSimulationOutput(processedTx.revertReason, processedTx.globalVariables, processedTx.txEffect, returns, processedTx.gasUsed, debugLogs);
|
|
1275
1320
|
} finally{
|
|
1276
1321
|
await merkleTreeFork.close();
|
|
1277
1322
|
}
|
|
@@ -1279,10 +1324,10 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1279
1324
|
async isValidTx(tx, { isSimulation, skipFeeEnforcement } = {}) {
|
|
1280
1325
|
const db = this.worldStateSynchronizer.getCommitted();
|
|
1281
1326
|
const verifier = isSimulation ? undefined : this.proofVerifier;
|
|
1282
|
-
// We accept transactions if they are not expired by the next slot (checked based on the
|
|
1327
|
+
// We accept transactions if they are not expired by the next slot (checked based on the ExpirationTimestamp field)
|
|
1283
1328
|
const { ts: nextSlotTimestamp } = this.epochCache.getEpochAndSlotInNextL1Slot();
|
|
1284
1329
|
const blockNumber = BlockNumber(await this.blockSource.getBlockNumber() + 1);
|
|
1285
|
-
const validator =
|
|
1330
|
+
const validator = createTxValidatorForAcceptingTxsOverRPC(db, this.contractDataSource, verifier, {
|
|
1286
1331
|
timestamp: nextSlotTimestamp,
|
|
1287
1332
|
blockNumber,
|
|
1288
1333
|
l1ChainId: this.l1ChainId,
|
|
@@ -1291,7 +1336,7 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1291
1336
|
gasFees: await this.getCurrentMinFees(),
|
|
1292
1337
|
skipFeeEnforcement,
|
|
1293
1338
|
txsPermitted: !this.config.disableTransactions
|
|
1294
|
-
});
|
|
1339
|
+
}, this.log.getBindings());
|
|
1295
1340
|
return await validator.validateTx(tx);
|
|
1296
1341
|
}
|
|
1297
1342
|
getConfig() {
|
|
@@ -1433,14 +1478,84 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1433
1478
|
return this.slasherClient.gatherOffensesForRound(round === 'current' ? undefined : BigInt(round));
|
|
1434
1479
|
}
|
|
1435
1480
|
}
|
|
1481
|
+
async reloadKeystore() {
|
|
1482
|
+
if (!this.config.keyStoreDirectory?.length) {
|
|
1483
|
+
throw new BadRequestError('Cannot reload keystore: node is not using a file-based keystore. ' + 'Set KEY_STORE_DIRECTORY to use file-based keystores.');
|
|
1484
|
+
}
|
|
1485
|
+
if (!this.validatorClient) {
|
|
1486
|
+
throw new BadRequestError('Cannot reload keystore: validator is not enabled.');
|
|
1487
|
+
}
|
|
1488
|
+
this.log.info('Reloading keystore from disk');
|
|
1489
|
+
// Re-read and validate keystore files
|
|
1490
|
+
const keyStores = loadKeystores(this.config.keyStoreDirectory);
|
|
1491
|
+
const newManager = new KeystoreManager(mergeKeystores(keyStores));
|
|
1492
|
+
await newManager.validateSigners();
|
|
1493
|
+
ValidatorClient.validateKeyStoreConfiguration(newManager, this.log);
|
|
1494
|
+
// Validate that every validator's publisher keys overlap with the L1 signers
|
|
1495
|
+
// that were initialized at startup. Publishers cannot be hot-reloaded, so a
|
|
1496
|
+
// validator with a publisher key that doesn't match any existing L1 signer
|
|
1497
|
+
// would silently fail on every proposer slot.
|
|
1498
|
+
if (this.keyStoreManager && this.sequencer) {
|
|
1499
|
+
const oldAdapter = NodeKeystoreAdapter.fromKeyStoreManager(this.keyStoreManager);
|
|
1500
|
+
const availablePublishers = new Set(oldAdapter.getAttesterAddresses().flatMap((a)=>oldAdapter.getPublisherAddresses(a).map((p)=>p.toString().toLowerCase())));
|
|
1501
|
+
const newAdapter = NodeKeystoreAdapter.fromKeyStoreManager(newManager);
|
|
1502
|
+
for (const attester of newAdapter.getAttesterAddresses()){
|
|
1503
|
+
const pubs = newAdapter.getPublisherAddresses(attester);
|
|
1504
|
+
if (pubs.length > 0 && !pubs.some((p)=>availablePublishers.has(p.toString().toLowerCase()))) {
|
|
1505
|
+
throw new BadRequestError(`Cannot reload keystore: validator ${attester} has publisher keys ` + `[${pubs.map((p)=>p.toString()).join(', ')}] but none match the L1 signers initialized at startup ` + `[${[
|
|
1506
|
+
...availablePublishers
|
|
1507
|
+
].join(', ')}]. Publishers cannot be hot-reloaded — ` + `use an existing publisher key or restart the node.`);
|
|
1508
|
+
}
|
|
1509
|
+
}
|
|
1510
|
+
}
|
|
1511
|
+
// Build adapters for old and new keystores to compute diff
|
|
1512
|
+
const newAdapter = NodeKeystoreAdapter.fromKeyStoreManager(newManager);
|
|
1513
|
+
const newAddresses = newAdapter.getAttesterAddresses();
|
|
1514
|
+
const oldAddresses = this.keyStoreManager ? NodeKeystoreAdapter.fromKeyStoreManager(this.keyStoreManager).getAttesterAddresses() : [];
|
|
1515
|
+
const oldSet = new Set(oldAddresses.map((a)=>a.toString()));
|
|
1516
|
+
const newSet = new Set(newAddresses.map((a)=>a.toString()));
|
|
1517
|
+
const added = newAddresses.filter((a)=>!oldSet.has(a.toString()));
|
|
1518
|
+
const removed = oldAddresses.filter((a)=>!newSet.has(a.toString()));
|
|
1519
|
+
if (added.length > 0) {
|
|
1520
|
+
this.log.info(`Keystore reload: adding attester keys: ${added.map((a)=>a.toString()).join(', ')}`);
|
|
1521
|
+
}
|
|
1522
|
+
if (removed.length > 0) {
|
|
1523
|
+
this.log.info(`Keystore reload: removing attester keys: ${removed.map((a)=>a.toString()).join(', ')}`);
|
|
1524
|
+
}
|
|
1525
|
+
if (added.length === 0 && removed.length === 0) {
|
|
1526
|
+
this.log.info('Keystore reload: attester keys unchanged');
|
|
1527
|
+
}
|
|
1528
|
+
// Update the validator client (coinbase, feeRecipient, attester keys)
|
|
1529
|
+
this.validatorClient.reloadKeystore(newManager);
|
|
1530
|
+
// Update the publisher factory's keystore so newly-added validators
|
|
1531
|
+
// can be matched to existing publisher keys when proposing blocks.
|
|
1532
|
+
if (this.sequencer) {
|
|
1533
|
+
this.sequencer.updatePublisherNodeKeyStore(newAdapter);
|
|
1534
|
+
}
|
|
1535
|
+
// Update slasher's "don't-slash-self" list with new validator addresses
|
|
1536
|
+
if (this.slasherClient && !this.config.slashSelfAllowed) {
|
|
1537
|
+
const slashValidatorsNever = unique([
|
|
1538
|
+
...this.config.slashValidatorsNever ?? [],
|
|
1539
|
+
...newAddresses
|
|
1540
|
+
].map((a)=>a.toString())).map(EthAddress.fromString);
|
|
1541
|
+
this.slasherClient.updateConfig({
|
|
1542
|
+
slashValidatorsNever
|
|
1543
|
+
});
|
|
1544
|
+
}
|
|
1545
|
+
this.keyStoreManager = newManager;
|
|
1546
|
+
this.log.info('Keystore reloaded: coinbase, feeRecipient, and attester keys updated');
|
|
1547
|
+
}
|
|
1548
|
+
#getInitialHeaderHash() {
|
|
1549
|
+
if (!this.initialHeaderHashPromise) {
|
|
1550
|
+
this.initialHeaderHashPromise = this.worldStateSynchronizer.getCommitted().getInitialHeader().hash();
|
|
1551
|
+
}
|
|
1552
|
+
return this.initialHeaderHashPromise;
|
|
1553
|
+
}
|
|
1436
1554
|
/**
|
|
1437
1555
|
* Returns an instance of MerkleTreeOperations having first ensured the world state is fully synched
|
|
1438
|
-
* @param
|
|
1556
|
+
* @param block - The block parameter (block number, block hash, or 'latest') at which to get the data.
|
|
1439
1557
|
* @returns An instance of a committed MerkleTreeOperations
|
|
1440
|
-
*/ async #getWorldState(
|
|
1441
|
-
if (typeof blockNumber === 'number' && blockNumber < INITIAL_L2_BLOCK_NUM - 1) {
|
|
1442
|
-
throw new Error('Invalid block number to get world state for: ' + blockNumber);
|
|
1443
|
-
}
|
|
1558
|
+
*/ async #getWorldState(block) {
|
|
1444
1559
|
let blockSyncedTo = BlockNumber.ZERO;
|
|
1445
1560
|
try {
|
|
1446
1561
|
// Attempt to sync the world state if necessary
|
|
@@ -1448,15 +1563,32 @@ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
|
1448
1563
|
} catch (err) {
|
|
1449
1564
|
this.log.error(`Error getting world state: ${err}`);
|
|
1450
1565
|
}
|
|
1451
|
-
|
|
1452
|
-
|
|
1453
|
-
this.log.debug(`Using committed db for block ${blockNumber}, world state synced upto ${blockSyncedTo}`);
|
|
1566
|
+
if (block === 'latest') {
|
|
1567
|
+
this.log.debug(`Using committed db for block 'latest', world state synced upto ${blockSyncedTo}`);
|
|
1454
1568
|
return this.worldStateSynchronizer.getCommitted();
|
|
1455
|
-
}
|
|
1569
|
+
}
|
|
1570
|
+
if (BlockHash.isBlockHash(block)) {
|
|
1571
|
+
const initialBlockHash = await this.#getInitialHeaderHash();
|
|
1572
|
+
if (block.equals(initialBlockHash)) {
|
|
1573
|
+
// Block source doesn't handle initial header so we need to handle the case separately.
|
|
1574
|
+
return this.worldStateSynchronizer.getSnapshot(BlockNumber.ZERO);
|
|
1575
|
+
}
|
|
1576
|
+
const header = await this.blockSource.getBlockHeaderByHash(block);
|
|
1577
|
+
if (!header) {
|
|
1578
|
+
throw new Error(`Block hash ${block.toString()} not found when querying world state. If the node API has been queried with anchor block hash possibly a reorg has occurred.`);
|
|
1579
|
+
}
|
|
1580
|
+
const blockNumber = header.getBlockNumber();
|
|
1581
|
+
this.log.debug(`Using snapshot for block ${blockNumber}, world state synced upto ${blockSyncedTo}`);
|
|
1582
|
+
return this.worldStateSynchronizer.getSnapshot(blockNumber);
|
|
1583
|
+
}
|
|
1584
|
+
// Block number provided
|
|
1585
|
+
{
|
|
1586
|
+
const blockNumber = block;
|
|
1587
|
+
if (blockNumber > blockSyncedTo) {
|
|
1588
|
+
throw new Error(`Queried block ${block} not yet synced by the node (node is synced upto ${blockSyncedTo}).`);
|
|
1589
|
+
}
|
|
1456
1590
|
this.log.debug(`Using snapshot for block ${blockNumber}, world state synced upto ${blockSyncedTo}`);
|
|
1457
1591
|
return this.worldStateSynchronizer.getSnapshot(blockNumber);
|
|
1458
|
-
} else {
|
|
1459
|
-
throw new Error(`Block ${blockNumber} not yet synced`);
|
|
1460
1592
|
}
|
|
1461
1593
|
}
|
|
1462
1594
|
/**
|