@aztec/aztec-node 0.0.1-commit.b655e406 → 0.0.1-commit.c0b82b2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,49 +1,425 @@
1
- function _ts_decorate(decorators, target, key, desc) {
2
- var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
3
- if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
4
- else for(var i = decorators.length - 1; i >= 0; i--)if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
5
- return c > 3 && r && Object.defineProperty(target, key, r), r;
1
+ function applyDecs2203RFactory() {
2
+ function createAddInitializerMethod(initializers, decoratorFinishedRef) {
3
+ return function addInitializer(initializer) {
4
+ assertNotFinished(decoratorFinishedRef, "addInitializer");
5
+ assertCallable(initializer, "An initializer");
6
+ initializers.push(initializer);
7
+ };
8
+ }
9
+ function memberDec(dec, name, desc, initializers, kind, isStatic, isPrivate, metadata, value) {
10
+ var kindStr;
11
+ switch(kind){
12
+ case 1:
13
+ kindStr = "accessor";
14
+ break;
15
+ case 2:
16
+ kindStr = "method";
17
+ break;
18
+ case 3:
19
+ kindStr = "getter";
20
+ break;
21
+ case 4:
22
+ kindStr = "setter";
23
+ break;
24
+ default:
25
+ kindStr = "field";
26
+ }
27
+ var ctx = {
28
+ kind: kindStr,
29
+ name: isPrivate ? "#" + name : name,
30
+ static: isStatic,
31
+ private: isPrivate,
32
+ metadata: metadata
33
+ };
34
+ var decoratorFinishedRef = {
35
+ v: false
36
+ };
37
+ ctx.addInitializer = createAddInitializerMethod(initializers, decoratorFinishedRef);
38
+ var get, set;
39
+ if (kind === 0) {
40
+ if (isPrivate) {
41
+ get = desc.get;
42
+ set = desc.set;
43
+ } else {
44
+ get = function() {
45
+ return this[name];
46
+ };
47
+ set = function(v) {
48
+ this[name] = v;
49
+ };
50
+ }
51
+ } else if (kind === 2) {
52
+ get = function() {
53
+ return desc.value;
54
+ };
55
+ } else {
56
+ if (kind === 1 || kind === 3) {
57
+ get = function() {
58
+ return desc.get.call(this);
59
+ };
60
+ }
61
+ if (kind === 1 || kind === 4) {
62
+ set = function(v) {
63
+ desc.set.call(this, v);
64
+ };
65
+ }
66
+ }
67
+ ctx.access = get && set ? {
68
+ get: get,
69
+ set: set
70
+ } : get ? {
71
+ get: get
72
+ } : {
73
+ set: set
74
+ };
75
+ try {
76
+ return dec(value, ctx);
77
+ } finally{
78
+ decoratorFinishedRef.v = true;
79
+ }
80
+ }
81
+ function assertNotFinished(decoratorFinishedRef, fnName) {
82
+ if (decoratorFinishedRef.v) {
83
+ throw new Error("attempted to call " + fnName + " after decoration was finished");
84
+ }
85
+ }
86
+ function assertCallable(fn, hint) {
87
+ if (typeof fn !== "function") {
88
+ throw new TypeError(hint + " must be a function");
89
+ }
90
+ }
91
+ function assertValidReturnValue(kind, value) {
92
+ var type = typeof value;
93
+ if (kind === 1) {
94
+ if (type !== "object" || value === null) {
95
+ throw new TypeError("accessor decorators must return an object with get, set, or init properties or void 0");
96
+ }
97
+ if (value.get !== undefined) {
98
+ assertCallable(value.get, "accessor.get");
99
+ }
100
+ if (value.set !== undefined) {
101
+ assertCallable(value.set, "accessor.set");
102
+ }
103
+ if (value.init !== undefined) {
104
+ assertCallable(value.init, "accessor.init");
105
+ }
106
+ } else if (type !== "function") {
107
+ var hint;
108
+ if (kind === 0) {
109
+ hint = "field";
110
+ } else if (kind === 10) {
111
+ hint = "class";
112
+ } else {
113
+ hint = "method";
114
+ }
115
+ throw new TypeError(hint + " decorators must return a function or void 0");
116
+ }
117
+ }
118
+ function applyMemberDec(ret, base, decInfo, name, kind, isStatic, isPrivate, initializers, metadata) {
119
+ var decs = decInfo[0];
120
+ var desc, init, value;
121
+ if (isPrivate) {
122
+ if (kind === 0 || kind === 1) {
123
+ desc = {
124
+ get: decInfo[3],
125
+ set: decInfo[4]
126
+ };
127
+ } else if (kind === 3) {
128
+ desc = {
129
+ get: decInfo[3]
130
+ };
131
+ } else if (kind === 4) {
132
+ desc = {
133
+ set: decInfo[3]
134
+ };
135
+ } else {
136
+ desc = {
137
+ value: decInfo[3]
138
+ };
139
+ }
140
+ } else if (kind !== 0) {
141
+ desc = Object.getOwnPropertyDescriptor(base, name);
142
+ }
143
+ if (kind === 1) {
144
+ value = {
145
+ get: desc.get,
146
+ set: desc.set
147
+ };
148
+ } else if (kind === 2) {
149
+ value = desc.value;
150
+ } else if (kind === 3) {
151
+ value = desc.get;
152
+ } else if (kind === 4) {
153
+ value = desc.set;
154
+ }
155
+ var newValue, get, set;
156
+ if (typeof decs === "function") {
157
+ newValue = memberDec(decs, name, desc, initializers, kind, isStatic, isPrivate, metadata, value);
158
+ if (newValue !== void 0) {
159
+ assertValidReturnValue(kind, newValue);
160
+ if (kind === 0) {
161
+ init = newValue;
162
+ } else if (kind === 1) {
163
+ init = newValue.init;
164
+ get = newValue.get || value.get;
165
+ set = newValue.set || value.set;
166
+ value = {
167
+ get: get,
168
+ set: set
169
+ };
170
+ } else {
171
+ value = newValue;
172
+ }
173
+ }
174
+ } else {
175
+ for(var i = decs.length - 1; i >= 0; i--){
176
+ var dec = decs[i];
177
+ newValue = memberDec(dec, name, desc, initializers, kind, isStatic, isPrivate, metadata, value);
178
+ if (newValue !== void 0) {
179
+ assertValidReturnValue(kind, newValue);
180
+ var newInit;
181
+ if (kind === 0) {
182
+ newInit = newValue;
183
+ } else if (kind === 1) {
184
+ newInit = newValue.init;
185
+ get = newValue.get || value.get;
186
+ set = newValue.set || value.set;
187
+ value = {
188
+ get: get,
189
+ set: set
190
+ };
191
+ } else {
192
+ value = newValue;
193
+ }
194
+ if (newInit !== void 0) {
195
+ if (init === void 0) {
196
+ init = newInit;
197
+ } else if (typeof init === "function") {
198
+ init = [
199
+ init,
200
+ newInit
201
+ ];
202
+ } else {
203
+ init.push(newInit);
204
+ }
205
+ }
206
+ }
207
+ }
208
+ }
209
+ if (kind === 0 || kind === 1) {
210
+ if (init === void 0) {
211
+ init = function(instance, init) {
212
+ return init;
213
+ };
214
+ } else if (typeof init !== "function") {
215
+ var ownInitializers = init;
216
+ init = function(instance, init) {
217
+ var value = init;
218
+ for(var i = 0; i < ownInitializers.length; i++){
219
+ value = ownInitializers[i].call(instance, value);
220
+ }
221
+ return value;
222
+ };
223
+ } else {
224
+ var originalInitializer = init;
225
+ init = function(instance, init) {
226
+ return originalInitializer.call(instance, init);
227
+ };
228
+ }
229
+ ret.push(init);
230
+ }
231
+ if (kind !== 0) {
232
+ if (kind === 1) {
233
+ desc.get = value.get;
234
+ desc.set = value.set;
235
+ } else if (kind === 2) {
236
+ desc.value = value;
237
+ } else if (kind === 3) {
238
+ desc.get = value;
239
+ } else if (kind === 4) {
240
+ desc.set = value;
241
+ }
242
+ if (isPrivate) {
243
+ if (kind === 1) {
244
+ ret.push(function(instance, args) {
245
+ return value.get.call(instance, args);
246
+ });
247
+ ret.push(function(instance, args) {
248
+ return value.set.call(instance, args);
249
+ });
250
+ } else if (kind === 2) {
251
+ ret.push(value);
252
+ } else {
253
+ ret.push(function(instance, args) {
254
+ return value.call(instance, args);
255
+ });
256
+ }
257
+ } else {
258
+ Object.defineProperty(base, name, desc);
259
+ }
260
+ }
261
+ }
262
+ function applyMemberDecs(Class, decInfos, metadata) {
263
+ var ret = [];
264
+ var protoInitializers;
265
+ var staticInitializers;
266
+ var existingProtoNonFields = new Map();
267
+ var existingStaticNonFields = new Map();
268
+ for(var i = 0; i < decInfos.length; i++){
269
+ var decInfo = decInfos[i];
270
+ if (!Array.isArray(decInfo)) continue;
271
+ var kind = decInfo[1];
272
+ var name = decInfo[2];
273
+ var isPrivate = decInfo.length > 3;
274
+ var isStatic = kind >= 5;
275
+ var base;
276
+ var initializers;
277
+ if (isStatic) {
278
+ base = Class;
279
+ kind = kind - 5;
280
+ staticInitializers = staticInitializers || [];
281
+ initializers = staticInitializers;
282
+ } else {
283
+ base = Class.prototype;
284
+ protoInitializers = protoInitializers || [];
285
+ initializers = protoInitializers;
286
+ }
287
+ if (kind !== 0 && !isPrivate) {
288
+ var existingNonFields = isStatic ? existingStaticNonFields : existingProtoNonFields;
289
+ var existingKind = existingNonFields.get(name) || 0;
290
+ if (existingKind === true || existingKind === 3 && kind !== 4 || existingKind === 4 && kind !== 3) {
291
+ throw new Error("Attempted to decorate a public method/accessor that has the same name as a previously decorated public method/accessor. This is not currently supported by the decorators plugin. Property name was: " + name);
292
+ } else if (!existingKind && kind > 2) {
293
+ existingNonFields.set(name, kind);
294
+ } else {
295
+ existingNonFields.set(name, true);
296
+ }
297
+ }
298
+ applyMemberDec(ret, base, decInfo, name, kind, isStatic, isPrivate, initializers, metadata);
299
+ }
300
+ pushInitializers(ret, protoInitializers);
301
+ pushInitializers(ret, staticInitializers);
302
+ return ret;
303
+ }
304
+ function pushInitializers(ret, initializers) {
305
+ if (initializers) {
306
+ ret.push(function(instance) {
307
+ for(var i = 0; i < initializers.length; i++){
308
+ initializers[i].call(instance);
309
+ }
310
+ return instance;
311
+ });
312
+ }
313
+ }
314
+ function applyClassDecs(targetClass, classDecs, metadata) {
315
+ if (classDecs.length > 0) {
316
+ var initializers = [];
317
+ var newClass = targetClass;
318
+ var name = targetClass.name;
319
+ for(var i = classDecs.length - 1; i >= 0; i--){
320
+ var decoratorFinishedRef = {
321
+ v: false
322
+ };
323
+ try {
324
+ var nextNewClass = classDecs[i](newClass, {
325
+ kind: "class",
326
+ name: name,
327
+ addInitializer: createAddInitializerMethod(initializers, decoratorFinishedRef),
328
+ metadata
329
+ });
330
+ } finally{
331
+ decoratorFinishedRef.v = true;
332
+ }
333
+ if (nextNewClass !== undefined) {
334
+ assertValidReturnValue(10, nextNewClass);
335
+ newClass = nextNewClass;
336
+ }
337
+ }
338
+ return [
339
+ defineMetadata(newClass, metadata),
340
+ function() {
341
+ for(var i = 0; i < initializers.length; i++){
342
+ initializers[i].call(newClass);
343
+ }
344
+ }
345
+ ];
346
+ }
347
+ }
348
+ function defineMetadata(Class, metadata) {
349
+ return Object.defineProperty(Class, Symbol.metadata || Symbol.for("Symbol.metadata"), {
350
+ configurable: true,
351
+ enumerable: true,
352
+ value: metadata
353
+ });
354
+ }
355
+ return function applyDecs2203R(targetClass, memberDecs, classDecs, parentClass) {
356
+ if (parentClass !== void 0) {
357
+ var parentMetadata = parentClass[Symbol.metadata || Symbol.for("Symbol.metadata")];
358
+ }
359
+ var metadata = Object.create(parentMetadata === void 0 ? null : parentMetadata);
360
+ var e = applyMemberDecs(targetClass, memberDecs, metadata);
361
+ if (!classDecs.length) defineMetadata(targetClass, metadata);
362
+ return {
363
+ e: e,
364
+ get c () {
365
+ return applyClassDecs(targetClass, classDecs, metadata);
366
+ }
367
+ };
368
+ };
6
369
  }
370
+ function _apply_decs_2203_r(targetClass, memberDecs, classDecs, parentClass) {
371
+ return (_apply_decs_2203_r = applyDecs2203RFactory())(targetClass, memberDecs, classDecs, parentClass);
372
+ }
373
+ var _dec, _initProto;
7
374
  import { createArchiver } from '@aztec/archiver';
8
375
  import { BBCircuitVerifier, QueuedIVCVerifier, TestCircuitVerifier } from '@aztec/bb-prover';
9
- import { createBlobSinkClient } from '@aztec/blob-sink/client';
10
- import { INITIAL_L2_BLOCK_NUM } from '@aztec/constants';
376
+ import { createBlobClientWithFileStores } from '@aztec/blob-client/client';
377
+ import { Blob } from '@aztec/blob-lib';
11
378
  import { EpochCache } from '@aztec/epoch-cache';
12
- import { RegistryContract, RollupContract, createEthereumChain, getPublicClient } from '@aztec/ethereum';
13
- import { compactArray, pick } from '@aztec/foundation/collection';
379
+ import { createEthereumChain } from '@aztec/ethereum/chain';
380
+ import { getPublicClient } from '@aztec/ethereum/client';
381
+ import { RegistryContract, RollupContract } from '@aztec/ethereum/contracts';
382
+ import { BlockNumber, SlotNumber } from '@aztec/foundation/branded-types';
383
+ import { compactArray, pick, unique } from '@aztec/foundation/collection';
384
+ import { Fr } from '@aztec/foundation/curves/bn254';
14
385
  import { EthAddress } from '@aztec/foundation/eth-address';
15
- import { Fr } from '@aztec/foundation/fields';
16
386
  import { BadRequestError } from '@aztec/foundation/json-rpc';
17
387
  import { createLogger } from '@aztec/foundation/log';
18
- import { SerialQueue } from '@aztec/foundation/queue';
19
388
  import { count } from '@aztec/foundation/string';
20
389
  import { DateProvider, Timer } from '@aztec/foundation/timer';
21
390
  import { MembershipWitness } from '@aztec/foundation/trees';
22
391
  import { KeystoreManager, loadKeystores, mergeKeystores } from '@aztec/node-keystore';
23
392
  import { trySnapshotSync, uploadSnapshot } from '@aztec/node-lib/actions';
24
- import { createL1TxUtilsWithBlobsFromEthSigner } from '@aztec/node-lib/factories';
25
- import { createP2PClient, getDefaultAllowedSetupFunctions } from '@aztec/p2p';
393
+ import { createForwarderL1TxUtilsFromSigners, createL1TxUtilsFromSigners } from '@aztec/node-lib/factories';
394
+ import { createP2PClient, createTxValidatorForAcceptingTxsOverRPC, getDefaultAllowedSetupFunctions } from '@aztec/p2p';
26
395
  import { ProtocolContractAddress } from '@aztec/protocol-contracts';
27
- import { BlockBuilder, GlobalVariableBuilder, SequencerClient, createValidatorForAcceptingTxs } from '@aztec/sequencer-client';
396
+ import { createProverNode } from '@aztec/prover-node';
397
+ import { createKeyStoreForProver } from '@aztec/prover-node/config';
398
+ import { GlobalVariableBuilder, SequencerClient } from '@aztec/sequencer-client';
28
399
  import { PublicProcessorFactory } from '@aztec/simulator/server';
29
400
  import { AttestationsBlockWatcher, EpochPruneWatcher, createSlasher } from '@aztec/slasher';
401
+ import { CollectionLimitsConfig, PublicSimulatorConfig } from '@aztec/stdlib/avm';
30
402
  import { AztecAddress } from '@aztec/stdlib/aztec-address';
31
- import { L2BlockHash } from '@aztec/stdlib/block';
403
+ import { BlockHash, L2Block } from '@aztec/stdlib/block';
404
+ import { GasFees } from '@aztec/stdlib/gas';
32
405
  import { computePublicDataTreeLeafSlot } from '@aztec/stdlib/hash';
33
406
  import { AztecNodeAdminConfigSchema } from '@aztec/stdlib/interfaces/client';
34
407
  import { tryStop } from '@aztec/stdlib/interfaces/server';
408
+ import { InMemoryDebugLogStore, NullDebugLogStore } from '@aztec/stdlib/logs';
35
409
  import { InboxLeaf } from '@aztec/stdlib/messaging';
36
- import { P2PClientType } from '@aztec/stdlib/p2p';
37
410
  import { MerkleTreeId, NullifierMembershipWitness, PublicDataWitness } from '@aztec/stdlib/trees';
38
411
  import { PublicSimulationOutput, TxReceipt, TxStatus } from '@aztec/stdlib/tx';
39
412
  import { getPackageVersion } from '@aztec/stdlib/update-checker';
40
413
  import { Attributes, getTelemetryClient, trackSpan } from '@aztec/telemetry-client';
41
- import { NodeKeystoreAdapter, ValidatorClient, createBlockProposalHandler, createValidatorClient } from '@aztec/validator-client';
414
+ import { FullNodeCheckpointsBuilder as CheckpointsBuilder, FullNodeCheckpointsBuilder, NodeKeystoreAdapter, ValidatorClient, createBlockProposalHandler, createValidatorClient } from '@aztec/validator-client';
42
415
  import { createWorldStateSynchronizer } from '@aztec/world-state';
43
416
  import { createPublicClient, fallback, http } from 'viem';
44
417
  import { createSentinel } from '../sentinel/factory.js';
45
418
  import { createKeyStoreForValidator } from './config.js';
46
419
  import { NodeMetrics } from './node_metrics.js';
420
+ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
421
+ [Attributes.TX_HASH]: tx.getTxHash().toString()
422
+ }));
47
423
  /**
48
424
  * The aztec node.
49
425
  */ export class AztecNodeService {
@@ -55,6 +431,7 @@ import { NodeMetrics } from './node_metrics.js';
55
431
  l1ToL2MessageSource;
56
432
  worldStateSynchronizer;
57
433
  sequencer;
434
+ proverNode;
58
435
  slasherClient;
59
436
  validatorsSentinel;
60
437
  epochPruneWatcher;
@@ -66,13 +443,25 @@ import { NodeMetrics } from './node_metrics.js';
66
443
  proofVerifier;
67
444
  telemetry;
68
445
  log;
446
+ blobClient;
447
+ validatorClient;
448
+ keyStoreManager;
449
+ debugLogStore;
450
+ static{
451
+ ({ e: [_initProto] } = _apply_decs_2203_r(this, [
452
+ [
453
+ _dec,
454
+ 2,
455
+ "simulatePublicCalls"
456
+ ]
457
+ ], []));
458
+ }
69
459
  metrics;
460
+ initialHeaderHashPromise;
70
461
  // Prevent two snapshot operations to happen simultaneously
71
462
  isUploadingSnapshot;
72
- // Serial queue to ensure that we only send one tx at a time
73
- txQueue;
74
463
  tracer;
75
- constructor(config, p2pClient, blockSource, logsSource, contractDataSource, l1ToL2MessageSource, worldStateSynchronizer, sequencer, slasherClient, validatorsSentinel, epochPruneWatcher, l1ChainId, version, globalVariableBuilder, epochCache, packageVersion, proofVerifier, telemetry = getTelemetryClient(), log = createLogger('node')){
464
+ constructor(config, p2pClient, blockSource, logsSource, contractDataSource, l1ToL2MessageSource, worldStateSynchronizer, sequencer, proverNode, slasherClient, validatorsSentinel, epochPruneWatcher, l1ChainId, version, globalVariableBuilder, epochCache, packageVersion, proofVerifier, telemetry = getTelemetryClient(), log = createLogger('node'), blobClient, validatorClient, keyStoreManager, debugLogStore = new NullDebugLogStore()){
76
465
  this.config = config;
77
466
  this.p2pClient = p2pClient;
78
467
  this.blockSource = blockSource;
@@ -81,6 +470,7 @@ import { NodeMetrics } from './node_metrics.js';
81
470
  this.l1ToL2MessageSource = l1ToL2MessageSource;
82
471
  this.worldStateSynchronizer = worldStateSynchronizer;
83
472
  this.sequencer = sequencer;
473
+ this.proverNode = proverNode;
84
474
  this.slasherClient = slasherClient;
85
475
  this.validatorsSentinel = validatorsSentinel;
86
476
  this.epochPruneWatcher = epochPruneWatcher;
@@ -92,13 +482,22 @@ import { NodeMetrics } from './node_metrics.js';
92
482
  this.proofVerifier = proofVerifier;
93
483
  this.telemetry = telemetry;
94
484
  this.log = log;
485
+ this.blobClient = blobClient;
486
+ this.validatorClient = validatorClient;
487
+ this.keyStoreManager = keyStoreManager;
488
+ this.debugLogStore = debugLogStore;
489
+ this.initialHeaderHashPromise = (_initProto(this), undefined);
95
490
  this.isUploadingSnapshot = false;
96
- this.txQueue = new SerialQueue();
97
491
  this.metrics = new NodeMetrics(telemetry, 'AztecNodeService');
98
492
  this.tracer = telemetry.getTracer('AztecNodeService');
99
- this.txQueue.start();
100
493
  this.log.info(`Aztec Node version: ${this.packageVersion}`);
101
494
  this.log.info(`Aztec Node started on chain 0x${l1ChainId.toString(16)}`, config.l1Contracts);
495
+ // A defensive check that protects us against introducing a bug in the complex `createAndSync` function. We must
496
+ // never have debugLogStore enabled when not in test mode because then we would be accumulating debug logs in
497
+ // memory which could be a DoS vector on the sequencer (since no fees are paid for debug logs).
498
+ if (debugLogStore.isEnabled && config.realProofs) {
499
+ throw new Error('debugLogStore should never be enabled when realProofs are set');
500
+ }
102
501
  }
103
502
  async getWorldStateSyncStatus() {
104
503
  const status = await this.worldStateSynchronizer.status();
@@ -119,20 +518,28 @@ import { NodeMetrics } from './node_metrics.js';
119
518
  const packageVersion = getPackageVersion() ?? '';
120
519
  const telemetry = deps.telemetry ?? getTelemetryClient();
121
520
  const dateProvider = deps.dateProvider ?? new DateProvider();
122
- const blobSinkClient = deps.blobSinkClient ?? createBlobSinkClient(config, {
123
- logger: createLogger('node:blob-sink:client')
124
- });
125
521
  const ethereumChain = createEthereumChain(config.l1RpcUrls, config.l1ChainId);
126
- // Build a key store from file if given or from environment otherwise
522
+ // Build a key store from file if given or from environment otherwise.
523
+ // We keep the raw KeyStore available so we can merge with prover keys if enableProverNode is set.
127
524
  let keyStoreManager;
128
525
  const keyStoreProvided = config.keyStoreDirectory !== undefined && config.keyStoreDirectory.length > 0;
129
526
  if (keyStoreProvided) {
130
527
  const keyStores = loadKeystores(config.keyStoreDirectory);
131
528
  keyStoreManager = new KeystoreManager(mergeKeystores(keyStores));
132
529
  } else {
133
- const keyStore = createKeyStoreForValidator(config);
134
- if (keyStore) {
135
- keyStoreManager = new KeystoreManager(keyStore);
530
+ const rawKeyStores = [];
531
+ const validatorKeyStore = createKeyStoreForValidator(config);
532
+ if (validatorKeyStore) {
533
+ rawKeyStores.push(validatorKeyStore);
534
+ }
535
+ if (config.enableProverNode) {
536
+ const proverKeyStore = createKeyStoreForProver(config);
537
+ if (proverKeyStore) {
538
+ rawKeyStores.push(proverKeyStore);
539
+ }
540
+ }
541
+ if (rawKeyStores.length > 0) {
542
+ keyStoreManager = new KeystoreManager(rawKeyStores.length === 1 ? rawKeyStores[0] : mergeKeystores(rawKeyStores));
136
543
  }
137
544
  }
138
545
  await keyStoreManager?.validateSigners();
@@ -141,8 +548,8 @@ import { NodeMetrics } from './node_metrics.js';
141
548
  if (keyStoreManager === undefined) {
142
549
  throw new Error('Failed to create key store, a requirement for running a validator');
143
550
  }
144
- if (!keyStoreProvided) {
145
- log.warn('KEY STORE CREATED FROM ENVIRONMENT, IT IS RECOMMENDED TO USE A FILE-BASED KEY STORE IN PRODUCTION ENVIRONMENTS');
551
+ if (!keyStoreProvided && process.env.NODE_ENV !== 'test') {
552
+ log.warn("Keystore created from env: it's recommended to use a file-based key store for production");
146
553
  }
147
554
  ValidatorClient.validateKeyStoreConfiguration(keyStoreManager, log);
148
555
  }
@@ -152,7 +559,9 @@ import { NodeMetrics } from './node_metrics.js';
152
559
  }
153
560
  const publicClient = createPublicClient({
154
561
  chain: ethereumChain.chainInfo,
155
- transport: fallback(config.l1RpcUrls.map((url)=>http(url))),
562
+ transport: fallback(config.l1RpcUrls.map((url)=>http(url, {
563
+ batch: false
564
+ }))),
156
565
  pollingInterval: config.viemPollingIntervalMS
157
566
  });
158
567
  const l1ContractsAddresses = await RegistryContract.collectAddresses(publicClient, config.l1Contracts.registryAddress, config.rollupVersion ?? 'canonical');
@@ -171,13 +580,14 @@ import { NodeMetrics } from './node_metrics.js';
171
580
  if (config.rollupVersion !== Number(rollupVersionFromRollup)) {
172
581
  log.warn(`Registry looked up and returned a rollup with version (${config.rollupVersion}), but this does not match with version detected from the rollup directly: (${rollupVersionFromRollup}).`);
173
582
  }
583
+ const blobClient = await createBlobClientWithFileStores(config, log.createChild('blob-client'));
174
584
  // attempt snapshot sync if possible
175
585
  await trySnapshotSync(config, log);
176
586
  const epochCache = await EpochCache.create(config.l1Contracts.rollupAddress, config, {
177
587
  dateProvider
178
588
  });
179
589
  const archiver = await createArchiver(config, {
180
- blobSinkClient,
590
+ blobClient,
181
591
  epochCache,
182
592
  telemetry,
183
593
  dateProvider
@@ -186,74 +596,93 @@ import { NodeMetrics } from './node_metrics.js';
186
596
  });
187
597
  // now create the merkle trees and the world state synchronizer
188
598
  const worldStateSynchronizer = await createWorldStateSynchronizer(config, archiver, options.prefilledPublicData, telemetry);
189
- const circuitVerifier = config.realProofs ? await BBCircuitVerifier.new(config) : new TestCircuitVerifier();
599
+ const circuitVerifier = config.realProofs || config.debugForceTxProofVerification ? await BBCircuitVerifier.new(config) : new TestCircuitVerifier(config.proverTestVerificationDelayMs);
600
+ let debugLogStore;
190
601
  if (!config.realProofs) {
191
602
  log.warn(`Aztec node is accepting fake proofs`);
603
+ debugLogStore = new InMemoryDebugLogStore();
604
+ log.info('Aztec node started in test mode (realProofs set to false) hence debug logs from public functions will be collected and served');
605
+ } else {
606
+ debugLogStore = new NullDebugLogStore();
192
607
  }
193
608
  const proofVerifier = new QueuedIVCVerifier(config, circuitVerifier);
609
+ const proverOnly = config.enableProverNode && config.disableValidator;
610
+ if (proverOnly) {
611
+ log.info('Starting in prover-only mode: skipping validator, sequencer, sentinel, and slasher subsystems');
612
+ }
194
613
  // create the tx pool and the p2p client, which will need the l2 block source
195
- const p2pClient = await createP2PClient(P2PClientType.Full, config, archiver, proofVerifier, worldStateSynchronizer, epochCache, packageVersion, dateProvider, telemetry, deps.p2pClientDeps);
614
+ const p2pClient = await createP2PClient(config, archiver, proofVerifier, worldStateSynchronizer, epochCache, packageVersion, dateProvider, telemetry, deps.p2pClientDeps);
196
615
  // We should really not be modifying the config object
197
616
  config.txPublicSetupAllowList = config.txPublicSetupAllowList ?? await getDefaultAllowedSetupFunctions();
198
- const blockBuilder = new BlockBuilder({
617
+ // We'll accumulate sentinel watchers here
618
+ const watchers = [];
619
+ // Create FullNodeCheckpointsBuilder for block proposal handling and tx validation
620
+ const validatorCheckpointsBuilder = new FullNodeCheckpointsBuilder({
199
621
  ...config,
200
622
  l1GenesisTime,
201
623
  slotDuration: Number(slotDuration)
202
624
  }, worldStateSynchronizer, archiver, dateProvider, telemetry);
203
- // We'll accumulate sentinel watchers here
204
- const watchers = [];
205
- // Create validator client if required
206
- const validatorClient = createValidatorClient(config, {
207
- p2pClient,
208
- telemetry,
209
- dateProvider,
210
- epochCache,
211
- blockBuilder,
212
- blockSource: archiver,
213
- l1ToL2MessageSource: archiver,
214
- keyStoreManager
215
- });
216
- // If we have a validator client, register it as a source of offenses for the slasher,
217
- // and have it register callbacks on the p2p client *before* we start it, otherwise messages
218
- // like attestations or auths will fail.
219
- if (validatorClient) {
220
- watchers.push(validatorClient);
221
- if (!options.dontStartSequencer) {
222
- await validatorClient.registerHandlers();
223
- }
224
- }
225
- // If there's no validator client but alwaysReexecuteBlockProposals is enabled,
226
- // create a BlockProposalHandler to reexecute block proposals for monitoring
227
- if (!validatorClient && config.alwaysReexecuteBlockProposals) {
228
- log.info('Setting up block proposal reexecution for monitoring');
229
- createBlockProposalHandler(config, {
230
- blockBuilder,
625
+ let validatorClient;
626
+ if (!proverOnly) {
627
+ // Create validator client if required
628
+ validatorClient = await createValidatorClient(config, {
629
+ checkpointsBuilder: validatorCheckpointsBuilder,
630
+ worldState: worldStateSynchronizer,
631
+ p2pClient,
632
+ telemetry,
633
+ dateProvider,
231
634
  epochCache,
232
635
  blockSource: archiver,
233
636
  l1ToL2MessageSource: archiver,
234
- p2pClient,
235
- dateProvider,
236
- telemetry
237
- }).registerForReexecution(p2pClient);
637
+ keyStoreManager,
638
+ blobClient
639
+ });
640
+ // If we have a validator client, register it as a source of offenses for the slasher,
641
+ // and have it register callbacks on the p2p client *before* we start it, otherwise messages
642
+ // like attestations or auths will fail.
643
+ if (validatorClient) {
644
+ watchers.push(validatorClient);
645
+ if (!options.dontStartSequencer) {
646
+ await validatorClient.registerHandlers();
647
+ }
648
+ }
649
+ // If there's no validator client but alwaysReexecuteBlockProposals is enabled,
650
+ // create a BlockProposalHandler to reexecute block proposals for monitoring
651
+ if (!validatorClient && config.alwaysReexecuteBlockProposals) {
652
+ log.info('Setting up block proposal reexecution for monitoring');
653
+ createBlockProposalHandler(config, {
654
+ checkpointsBuilder: validatorCheckpointsBuilder,
655
+ worldState: worldStateSynchronizer,
656
+ epochCache,
657
+ blockSource: archiver,
658
+ l1ToL2MessageSource: archiver,
659
+ p2pClient,
660
+ dateProvider,
661
+ telemetry
662
+ }).registerForReexecution(p2pClient);
663
+ }
238
664
  }
239
665
  // Start world state and wait for it to sync to the archiver.
240
666
  await worldStateSynchronizer.start();
241
667
  // Start p2p. Note that it depends on world state to be running.
242
668
  await p2pClient.start();
243
- const validatorsSentinel = await createSentinel(epochCache, archiver, p2pClient, config);
244
- if (validatorsSentinel && config.slashInactivityPenalty > 0n) {
245
- watchers.push(validatorsSentinel);
246
- }
669
+ let validatorsSentinel;
247
670
  let epochPruneWatcher;
248
- if (config.slashPrunePenalty > 0n || config.slashDataWithholdingPenalty > 0n) {
249
- epochPruneWatcher = new EpochPruneWatcher(archiver, archiver, epochCache, p2pClient.getTxProvider(), blockBuilder, config);
250
- watchers.push(epochPruneWatcher);
251
- }
252
- // We assume we want to slash for invalid attestations unless all max penalties are set to 0
253
671
  let attestationsBlockWatcher;
254
- if (config.slashProposeInvalidAttestationsPenalty > 0n || config.slashAttestDescendantOfInvalidPenalty > 0n) {
255
- attestationsBlockWatcher = new AttestationsBlockWatcher(archiver, epochCache, config);
256
- watchers.push(attestationsBlockWatcher);
672
+ if (!proverOnly) {
673
+ validatorsSentinel = await createSentinel(epochCache, archiver, p2pClient, config);
674
+ if (validatorsSentinel && config.slashInactivityPenalty > 0n) {
675
+ watchers.push(validatorsSentinel);
676
+ }
677
+ if (config.slashPrunePenalty > 0n || config.slashDataWithholdingPenalty > 0n) {
678
+ epochPruneWatcher = new EpochPruneWatcher(archiver, archiver, epochCache, p2pClient.getTxProvider(), validatorCheckpointsBuilder, config);
679
+ watchers.push(epochPruneWatcher);
680
+ }
681
+ // We assume we want to slash for invalid attestations unless all max penalties are set to 0
682
+ if (config.slashProposeInvalidAttestationsPenalty > 0n || config.slashAttestDescendantOfInvalidPenalty > 0n) {
683
+ attestationsBlockWatcher = new AttestationsBlockWatcher(archiver, epochCache, config);
684
+ watchers.push(attestationsBlockWatcher);
685
+ }
257
686
  }
258
687
  // Start p2p-related services once the archiver has completed sync
259
688
  void archiver.waitForInitialSync().then(async ()=>{
@@ -266,21 +695,35 @@ import { NodeMetrics } from './node_metrics.js';
266
695
  // Validator enabled, create/start relevant service
267
696
  let sequencer;
268
697
  let slasherClient;
269
- if (!config.disableValidator) {
698
+ if (!config.disableValidator && validatorClient) {
270
699
  // We create a slasher only if we have a sequencer, since all slashing actions go through the sequencer publisher
271
700
  // as they are executed when the node is selected as proposer.
272
701
  const validatorAddresses = keyStoreManager ? NodeKeystoreAdapter.fromKeyStoreManager(keyStoreManager).getAddresses() : [];
273
702
  slasherClient = await createSlasher(config, config.l1Contracts, getPublicClient(config), watchers, dateProvider, epochCache, validatorAddresses, undefined);
274
703
  await slasherClient.start();
275
- const l1TxUtils = await createL1TxUtilsWithBlobsFromEthSigner(publicClient, keyStoreManager.createAllValidatorPublisherSigners(), {
704
+ const l1TxUtils = config.sequencerPublisherForwarderAddress ? await createForwarderL1TxUtilsFromSigners(publicClient, keyStoreManager.createAllValidatorPublisherSigners(), config.sequencerPublisherForwarderAddress, {
705
+ ...config,
706
+ scope: 'sequencer'
707
+ }, {
708
+ telemetry,
709
+ logger: log.createChild('l1-tx-utils'),
710
+ dateProvider,
711
+ kzg: Blob.getViemKzgInstance()
712
+ }) : await createL1TxUtilsFromSigners(publicClient, keyStoreManager.createAllValidatorPublisherSigners(), {
276
713
  ...config,
277
714
  scope: 'sequencer'
278
715
  }, {
279
716
  telemetry,
280
717
  logger: log.createChild('l1-tx-utils'),
281
- dateProvider
718
+ dateProvider,
719
+ kzg: Blob.getViemKzgInstance()
282
720
  });
283
721
  // Create and start the sequencer client
722
+ const checkpointsBuilder = new CheckpointsBuilder({
723
+ ...config,
724
+ l1GenesisTime,
725
+ slotDuration: Number(slotDuration)
726
+ }, worldStateSynchronizer, archiver, dateProvider, telemetry, debugLogStore);
284
727
  sequencer = await SequencerClient.new(config, {
285
728
  ...deps,
286
729
  epochCache,
@@ -289,12 +732,12 @@ import { NodeMetrics } from './node_metrics.js';
289
732
  p2pClient,
290
733
  worldStateSynchronizer,
291
734
  slasherClient,
292
- blockBuilder,
735
+ checkpointsBuilder,
293
736
  l2BlockSource: archiver,
294
737
  l1ToL2MessageSource: archiver,
295
738
  telemetry,
296
739
  dateProvider,
297
- blobSinkClient,
740
+ blobClient,
298
741
  nodeKeyStore: keyStoreManager
299
742
  });
300
743
  }
@@ -304,7 +747,35 @@ import { NodeMetrics } from './node_metrics.js';
304
747
  } else if (sequencer) {
305
748
  log.warn(`Sequencer created but not started`);
306
749
  }
307
- return new AztecNodeService(config, p2pClient, archiver, archiver, archiver, archiver, worldStateSynchronizer, sequencer, slasherClient, validatorsSentinel, epochPruneWatcher, ethereumChain.chainInfo.id, config.rollupVersion, new GlobalVariableBuilder(config), epochCache, packageVersion, proofVerifier, telemetry, log);
750
+ // Create prover node subsystem if enabled
751
+ let proverNode;
752
+ if (config.enableProverNode) {
753
+ proverNode = await createProverNode(config, {
754
+ ...deps.proverNodeDeps,
755
+ telemetry,
756
+ dateProvider,
757
+ archiver,
758
+ worldStateSynchronizer,
759
+ p2pClient,
760
+ epochCache,
761
+ blobClient,
762
+ keyStoreManager
763
+ });
764
+ if (!options.dontStartProverNode) {
765
+ await proverNode.start();
766
+ log.info(`Prover node subsystem started`);
767
+ } else {
768
+ log.info(`Prover node subsystem created but not started`);
769
+ }
770
+ }
771
+ const globalVariableBuilder = new GlobalVariableBuilder({
772
+ ...config,
773
+ rollupVersion: BigInt(config.rollupVersion),
774
+ l1GenesisTime,
775
+ slotDuration: Number(slotDuration)
776
+ });
777
+ const node = new AztecNodeService(config, p2pClient, archiver, archiver, archiver, archiver, worldStateSynchronizer, sequencer, proverNode, slasherClient, validatorsSentinel, epochPruneWatcher, ethereumChain.chainInfo.id, config.rollupVersion, globalVariableBuilder, epochCache, packageVersion, proofVerifier, telemetry, log, blobClient, validatorClient, keyStoreManager, debugLogStore);
778
+ return node;
308
779
  }
309
780
  /**
310
781
  * Returns the sequencer client instance.
@@ -312,6 +783,9 @@ import { NodeMetrics } from './node_metrics.js';
312
783
  */ getSequencer() {
313
784
  return this.sequencer;
314
785
  }
786
+ /** Returns the prover node subsystem, if enabled. */ getProverNode() {
787
+ return this.proverNode;
788
+ }
315
789
  getBlockSource() {
316
790
  return this.blockSource;
317
791
  }
@@ -354,33 +828,46 @@ import { NodeMetrics } from './node_metrics.js';
354
828
  rollupVersion,
355
829
  enr,
356
830
  l1ContractAddresses: contractAddresses,
357
- protocolContractAddresses: protocolContractAddresses
831
+ protocolContractAddresses: protocolContractAddresses,
832
+ realProofs: !!this.config.realProofs
358
833
  };
359
834
  return nodeInfo;
360
835
  }
361
836
  /**
362
- * Get a block specified by its number.
363
- * @param number - The block number being requested.
837
+ * Get a block specified by its block number, block hash, or 'latest'.
838
+ * @param block - The block parameter (block number, block hash, or 'latest').
364
839
  * @returns The requested block.
365
- */ async getBlock(number) {
366
- const blockNumber = number === 'latest' ? await this.getBlockNumber() : number;
367
- return await this.blockSource.getBlock(blockNumber);
840
+ */ async getBlock(block) {
841
+ if (BlockHash.isBlockHash(block)) {
842
+ return this.getBlockByHash(block);
843
+ }
844
+ const blockNumber = block === 'latest' ? await this.getBlockNumber() : block;
845
+ if (blockNumber === BlockNumber.ZERO) {
846
+ return this.buildInitialBlock();
847
+ }
848
+ return await this.blockSource.getL2Block(blockNumber);
368
849
  }
369
850
  /**
370
851
  * Get a block specified by its hash.
371
852
  * @param blockHash - The block hash being requested.
372
853
  * @returns The requested block.
373
854
  */ async getBlockByHash(blockHash) {
374
- const publishedBlock = await this.blockSource.getPublishedBlockByHash(blockHash);
375
- return publishedBlock?.block;
855
+ const initialBlockHash = await this.#getInitialHeaderHash();
856
+ if (blockHash.equals(initialBlockHash)) {
857
+ return this.buildInitialBlock();
858
+ }
859
+ return await this.blockSource.getL2BlockByHash(blockHash);
860
+ }
861
+ buildInitialBlock() {
862
+ const initialHeader = this.worldStateSynchronizer.getCommitted().getInitialHeader();
863
+ return L2Block.empty(initialHeader);
376
864
  }
377
865
  /**
378
866
  * Get a block specified by its archive root.
379
867
  * @param archive - The archive root being requested.
380
868
  * @returns The requested block.
381
869
  */ async getBlockByArchive(archive) {
382
- const publishedBlock = await this.blockSource.getPublishedBlockByArchive(archive);
383
- return publishedBlock?.block;
870
+ return await this.blockSource.getL2BlockByArchive(archive);
384
871
  }
385
872
  /**
386
873
  * Method to request blocks. Will attempt to return all requested blocks but will return only those available.
@@ -388,16 +875,28 @@ import { NodeMetrics } from './node_metrics.js';
388
875
  * @param limit - The maximum number of blocks to obtain.
389
876
  * @returns The blocks requested.
390
877
  */ async getBlocks(from, limit) {
391
- return await this.blockSource.getBlocks(from, limit) ?? [];
878
+ return await this.blockSource.getBlocks(from, BlockNumber(limit)) ?? [];
879
+ }
880
+ async getCheckpoints(from, limit) {
881
+ return await this.blockSource.getCheckpoints(from, limit) ?? [];
392
882
  }
393
- async getPublishedBlocks(from, limit) {
394
- return await this.blockSource.getPublishedBlocks(from, limit) ?? [];
883
+ async getCheckpointedBlocks(from, limit) {
884
+ return await this.blockSource.getCheckpointedBlocks(from, limit) ?? [];
395
885
  }
396
886
  /**
397
- * Method to fetch the current base fees.
398
- * @returns The current base fees.
399
- */ async getCurrentBaseFees() {
400
- return await this.globalVariableBuilder.getCurrentBaseFees();
887
+ * Method to fetch the current min L2 fees.
888
+ * @returns The current min L2 fees.
889
+ */ async getCurrentMinFees() {
890
+ return await this.globalVariableBuilder.getCurrentMinFees();
891
+ }
892
+ async getMaxPriorityFees() {
893
+ for await (const tx of this.p2pClient.iteratePendingTxs()){
894
+ return tx.getGasSettings().maxPriorityFeesPerGas;
895
+ }
896
+ return GasFees.from({
897
+ feePerDaGas: 0n,
898
+ feePerL2Gas: 0n
899
+ });
401
900
  }
402
901
  /**
403
902
  * Method to fetch the latest block number synchronized by the node.
@@ -408,6 +907,9 @@ import { NodeMetrics } from './node_metrics.js';
408
907
  async getProvenBlockNumber() {
409
908
  return await this.blockSource.getProvenBlockNumber();
410
909
  }
910
+ async getCheckpointedBlockNumber() {
911
+ return await this.blockSource.getCheckpointedL2BlockNumber();
912
+ }
411
913
  /**
412
914
  * Method to fetch the version of the package.
413
915
  * @returns The node package version
@@ -432,22 +934,29 @@ import { NodeMetrics } from './node_metrics.js';
432
934
  getContract(address) {
433
935
  return this.contractDataSource.getContract(address);
434
936
  }
435
- /**
436
- * Retrieves all private logs from up to `limit` blocks, starting from the block number `from`.
437
- * @param from - The block number from which to begin retrieving logs.
438
- * @param limit - The maximum number of blocks to retrieve logs from.
439
- * @returns An array of private logs from the specified range of blocks.
440
- */ getPrivateLogs(from, limit) {
441
- return this.logsSource.getPrivateLogs(from, limit);
442
- }
443
- /**
444
- * Gets all logs that match any of the received tags (i.e. logs with their first field equal to a tag).
445
- * @param tags - The tags to filter the logs by.
446
- * @param logsPerTag - The maximum number of logs to return for each tag. By default no limit is set
447
- * @returns For each received tag, an array of matching logs is returned. An empty array implies no logs match
448
- * that tag.
449
- */ getLogsByTags(tags, logsPerTag) {
450
- return this.logsSource.getLogsByTags(tags, logsPerTag);
937
+ async getPrivateLogsByTags(tags, page, referenceBlock) {
938
+ if (referenceBlock) {
939
+ const initialBlockHash = await this.#getInitialHeaderHash();
940
+ if (!referenceBlock.equals(initialBlockHash)) {
941
+ const header = await this.blockSource.getBlockHeaderByHash(referenceBlock);
942
+ if (!header) {
943
+ throw new Error(`Block ${referenceBlock.toString()} not found in the node. This might indicate a reorg has occurred.`);
944
+ }
945
+ }
946
+ }
947
+ return this.logsSource.getPrivateLogsByTags(tags, page);
948
+ }
949
+ async getPublicLogsByTagsFromContract(contractAddress, tags, page, referenceBlock) {
950
+ if (referenceBlock) {
951
+ const initialBlockHash = await this.#getInitialHeaderHash();
952
+ if (!referenceBlock.equals(initialBlockHash)) {
953
+ const header = await this.blockSource.getBlockHeaderByHash(referenceBlock);
954
+ if (!header) {
955
+ throw new Error(`Block ${referenceBlock.toString()} not found in the node. This might indicate a reorg has occurred.`);
956
+ }
957
+ }
958
+ }
959
+ return this.logsSource.getPublicLogsByTagsFromContract(contractAddress, tags, page);
451
960
  }
452
961
  /**
453
962
  * Gets public logs based on the provided filter.
@@ -467,7 +976,7 @@ import { NodeMetrics } from './node_metrics.js';
467
976
  * Method to submit a transaction to the p2p pool.
468
977
  * @param tx - The transaction to be submitted.
469
978
  */ async sendTx(tx) {
470
- await this.txQueue.put(()=>this.#sendTx(tx));
979
+ await this.#sendTx(tx);
471
980
  }
472
981
  async #sendTx(tx) {
473
982
  const timer = new Timer();
@@ -482,24 +991,33 @@ import { NodeMetrics } from './node_metrics.js';
482
991
  throw new Error(`Invalid tx: ${reason}`);
483
992
  }
484
993
  await this.p2pClient.sendTx(tx);
485
- this.metrics.receivedTx(timer.ms(), true);
486
- this.log.info(`Received tx ${txHash}`, {
994
+ const duration = timer.ms();
995
+ this.metrics.receivedTx(duration, true);
996
+ this.log.info(`Received tx ${txHash} in ${duration}ms`, {
487
997
  txHash
488
998
  });
489
999
  }
490
1000
  async getTxReceipt(txHash) {
491
- let txReceipt = new TxReceipt(txHash, TxStatus.DROPPED, 'Tx dropped by P2P node.');
492
- // We first check if the tx is in pending (instead of first checking if it is mined) because if we first check
493
- // for mined and then for pending there could be a race condition where the tx is mined between the two checks
494
- // and we would incorrectly return a TxReceipt with status DROPPED
495
- if (await this.p2pClient.getTxStatus(txHash) === 'pending') {
496
- txReceipt = new TxReceipt(txHash, TxStatus.PENDING, '');
497
- }
1001
+ // Check the tx pool status first. If the tx is known to the pool (pending or mined), we'll use that
1002
+ // as a fallback if we don't find a settled receipt in the archiver.
1003
+ const txPoolStatus = await this.p2pClient.getTxStatus(txHash);
1004
+ const isKnownToPool = txPoolStatus === 'pending' || txPoolStatus === 'mined';
1005
+ // Then get the actual tx from the archiver, which tracks every tx in a mined block.
498
1006
  const settledTxReceipt = await this.blockSource.getSettledTxReceipt(txHash);
1007
+ let receipt;
499
1008
  if (settledTxReceipt) {
500
- txReceipt = settledTxReceipt;
1009
+ receipt = settledTxReceipt;
1010
+ } else if (isKnownToPool) {
1011
+ // If the tx is in the pool but not in the archiver, it's pending.
1012
+ // This handles race conditions between archiver and p2p, where the archiver
1013
+ // has pruned the block in which a tx was mined, but p2p has not caught up yet.
1014
+ receipt = new TxReceipt(txHash, TxStatus.PENDING, undefined, undefined);
1015
+ } else {
1016
+ // Otherwise, if we don't know the tx, we consider it dropped.
1017
+ receipt = new TxReceipt(txHash, TxStatus.DROPPED, undefined, 'Tx dropped by P2P node');
501
1018
  }
502
- return txReceipt;
1019
+ this.debugLogStore.decorateReceiptWithLogs(txHash.toString(), receipt);
1020
+ return receipt;
503
1021
  }
504
1022
  getTxEffect(txHash) {
505
1023
  return this.blockSource.getTxEffect(txHash);
@@ -508,19 +1026,26 @@ import { NodeMetrics } from './node_metrics.js';
508
1026
  * Method to stop the aztec node.
509
1027
  */ async stop() {
510
1028
  this.log.info(`Stopping Aztec Node`);
511
- await this.txQueue.end();
512
1029
  await tryStop(this.validatorsSentinel);
513
1030
  await tryStop(this.epochPruneWatcher);
514
1031
  await tryStop(this.slasherClient);
515
1032
  await tryStop(this.proofVerifier);
516
1033
  await tryStop(this.sequencer);
1034
+ await tryStop(this.proverNode);
517
1035
  await tryStop(this.p2pClient);
518
1036
  await tryStop(this.worldStateSynchronizer);
519
1037
  await tryStop(this.blockSource);
1038
+ await tryStop(this.blobClient);
520
1039
  await tryStop(this.telemetry);
521
1040
  this.log.info(`Stopped Aztec Node`);
522
1041
  }
523
1042
  /**
1043
+ * Returns the blob client used by this node.
1044
+ * @internal - Exposed for testing purposes only.
1045
+ */ getBlobClient() {
1046
+ return this.blobClient;
1047
+ }
1048
+ /**
524
1049
  * Method to retrieve pending txs.
525
1050
  * @param limit - The number of items to returns
526
1051
  * @param after - The last known pending tx. Used for pagination
@@ -545,15 +1070,8 @@ import { NodeMetrics } from './node_metrics.js';
545
1070
  */ async getTxsByHash(txHashes) {
546
1071
  return compactArray(await Promise.all(txHashes.map((txHash)=>this.getTxByHash(txHash))));
547
1072
  }
548
- /**
549
- * Find the indexes of the given leaves in the given tree along with a block metadata pointing to the block in which
550
- * the leaves were inserted.
551
- * @param blockNumber - The block number at which to get the data or 'latest' for latest data.
552
- * @param treeId - The tree to search in.
553
- * @param leafValues - The values to search for.
554
- * @returns The indices of leaves and the block metadata of a block in which the leaves were inserted.
555
- */ async findLeavesIndexes(blockNumber, treeId, leafValues) {
556
- const committedDb = await this.#getWorldState(blockNumber);
1073
+ async findLeavesIndexes(referenceBlock, treeId, leafValues) {
1074
+ const committedDb = await this.#getWorldState(referenceBlock);
557
1075
  const maybeIndices = await committedDb.findLeafIndices(treeId, leafValues.map((x)=>x.toBuffer()));
558
1076
  // We filter out undefined values
559
1077
  const indices = maybeIndices.filter((x)=>x !== undefined);
@@ -572,7 +1090,7 @@ import { NodeMetrics } from './node_metrics.js';
572
1090
  // Now we obtain the block hashes from the archive tree by calling await `committedDb.getLeafValue(treeId, index)`
573
1091
  // (note that block number corresponds to the leaf index in the archive tree).
574
1092
  const blockHashes = await Promise.all(uniqueBlockNumbers.map((blockNumber)=>{
575
- return committedDb.getLeafValue(MerkleTreeId.ARCHIVE, blockNumber);
1093
+ return committedDb.getLeafValue(MerkleTreeId.ARCHIVE, BigInt(blockNumber));
576
1094
  }));
577
1095
  // If any of the block hashes are undefined, we throw an error.
578
1096
  for(let i = 0; i < uniqueBlockNumbers.length; i++){
@@ -580,7 +1098,7 @@ import { NodeMetrics } from './node_metrics.js';
580
1098
  throw new Error(`Block hash is undefined for block number ${uniqueBlockNumbers[i]}`);
581
1099
  }
582
1100
  }
583
- // Create InBlock objects by combining indices, blockNumbers and blockHashes and return them.
1101
+ // Create DataInBlock objects by combining indices, blockNumbers and blockHashes and return them.
584
1102
  return maybeIndices.map((index, i)=>{
585
1103
  if (index === undefined) {
586
1104
  return undefined;
@@ -595,51 +1113,28 @@ import { NodeMetrics } from './node_metrics.js';
595
1113
  return undefined;
596
1114
  }
597
1115
  return {
598
- l2BlockNumber: Number(blockNumber),
599
- l2BlockHash: L2BlockHash.fromField(blockHash),
1116
+ l2BlockNumber: BlockNumber(Number(blockNumber)),
1117
+ l2BlockHash: new BlockHash(blockHash),
600
1118
  data: index
601
1119
  };
602
1120
  });
603
1121
  }
604
- /**
605
- * Returns a sibling path for the given index in the nullifier tree.
606
- * @param blockNumber - The block number at which to get the data.
607
- * @param leafIndex - The index of the leaf for which the sibling path is required.
608
- * @returns The sibling path for the leaf index.
609
- */ async getNullifierSiblingPath(blockNumber, leafIndex) {
610
- const committedDb = await this.#getWorldState(blockNumber);
611
- return committedDb.getSiblingPath(MerkleTreeId.NULLIFIER_TREE, leafIndex);
612
- }
613
- /**
614
- * Returns a sibling path for the given index in the data tree.
615
- * @param blockNumber - The block number at which to get the data.
616
- * @param leafIndex - The index of the leaf for which the sibling path is required.
617
- * @returns The sibling path for the leaf index.
618
- */ async getNoteHashSiblingPath(blockNumber, leafIndex) {
619
- const committedDb = await this.#getWorldState(blockNumber);
620
- return committedDb.getSiblingPath(MerkleTreeId.NOTE_HASH_TREE, leafIndex);
621
- }
622
- async getArchiveMembershipWitness(blockNumber, archive) {
623
- const committedDb = await this.#getWorldState(blockNumber);
1122
+ async getBlockHashMembershipWitness(referenceBlock, blockHash) {
1123
+ const committedDb = await this.#getWorldState(referenceBlock);
624
1124
  const [pathAndIndex] = await committedDb.findSiblingPaths(MerkleTreeId.ARCHIVE, [
625
- archive
1125
+ blockHash
626
1126
  ]);
627
1127
  return pathAndIndex === undefined ? undefined : MembershipWitness.fromSiblingPath(pathAndIndex.index, pathAndIndex.path);
628
1128
  }
629
- async getNoteHashMembershipWitness(blockNumber, noteHash) {
630
- const committedDb = await this.#getWorldState(blockNumber);
1129
+ async getNoteHashMembershipWitness(referenceBlock, noteHash) {
1130
+ const committedDb = await this.#getWorldState(referenceBlock);
631
1131
  const [pathAndIndex] = await committedDb.findSiblingPaths(MerkleTreeId.NOTE_HASH_TREE, [
632
1132
  noteHash
633
1133
  ]);
634
1134
  return pathAndIndex === undefined ? undefined : MembershipWitness.fromSiblingPath(pathAndIndex.index, pathAndIndex.path);
635
1135
  }
636
- /**
637
- * Returns the index and a sibling path for a leaf in the committed l1 to l2 data tree.
638
- * @param blockNumber - The block number at which to get the data.
639
- * @param l1ToL2Message - The l1ToL2Message to get the index / sibling path for.
640
- * @returns A tuple of the index and the sibling path of the L1ToL2Message (undefined if not found).
641
- */ async getL1ToL2MessageMembershipWitness(blockNumber, l1ToL2Message) {
642
- const db = await this.#getWorldState(blockNumber);
1136
+ async getL1ToL2MessageMembershipWitness(referenceBlock, l1ToL2Message) {
1137
+ const db = await this.#getWorldState(referenceBlock);
643
1138
  const [witness] = await db.findSiblingPaths(MerkleTreeId.L1_TO_L2_MESSAGE_TREE, [
644
1139
  l1ToL2Message
645
1140
  ]);
@@ -654,7 +1149,7 @@ import { NodeMetrics } from './node_metrics.js';
654
1149
  }
655
1150
  async getL1ToL2MessageBlock(l1ToL2Message) {
656
1151
  const messageIndex = await this.l1ToL2MessageSource.getL1ToL2MessageIndex(l1ToL2Message);
657
- return messageIndex ? InboxLeaf.l2BlockFromIndex(messageIndex) : undefined;
1152
+ return messageIndex ? BlockNumber.fromCheckpointNumber(InboxLeaf.checkpointNumberFromIndex(messageIndex)) : undefined;
658
1153
  }
659
1154
  /**
660
1155
  * Returns whether an L1 to L2 message is synced by archiver and if it's ready to be included in a block.
@@ -665,38 +1160,29 @@ import { NodeMetrics } from './node_metrics.js';
665
1160
  return messageIndex !== undefined;
666
1161
  }
667
1162
  /**
668
- * Returns all the L2 to L1 messages in a block.
669
- * @param blockNumber - The block number at which to get the data.
670
- * @returns The L2 to L1 messages (undefined if the block number is not found).
671
- */ async getL2ToL1Messages(blockNumber) {
672
- const block = await this.blockSource.getBlock(blockNumber === 'latest' ? await this.getBlockNumber() : blockNumber);
673
- return block?.body.txEffects.map((txEffect)=>txEffect.l2ToL1Msgs);
674
- }
675
- /**
676
- * Returns a sibling path for a leaf in the committed blocks tree.
677
- * @param blockNumber - The block number at which to get the data.
678
- * @param leafIndex - Index of the leaf in the tree.
679
- * @returns The sibling path.
680
- */ async getArchiveSiblingPath(blockNumber, leafIndex) {
681
- const committedDb = await this.#getWorldState(blockNumber);
682
- return committedDb.getSiblingPath(MerkleTreeId.ARCHIVE, leafIndex);
683
- }
684
- /**
685
- * Returns a sibling path for a leaf in the committed public data tree.
686
- * @param blockNumber - The block number at which to get the data.
687
- * @param leafIndex - Index of the leaf in the tree.
688
- * @returns The sibling path.
689
- */ async getPublicDataSiblingPath(blockNumber, leafIndex) {
690
- const committedDb = await this.#getWorldState(blockNumber);
691
- return committedDb.getSiblingPath(MerkleTreeId.PUBLIC_DATA_TREE, leafIndex);
1163
+ * Returns all the L2 to L1 messages in an epoch.
1164
+ * @param epoch - The epoch at which to get the data.
1165
+ * @returns The L2 to L1 messages (empty array if the epoch is not found).
1166
+ */ async getL2ToL1Messages(epoch) {
1167
+ // Assumes `getCheckpointedBlocksForEpoch` returns blocks in ascending order of block number.
1168
+ const checkpointedBlocks = await this.blockSource.getCheckpointedBlocksForEpoch(epoch);
1169
+ const blocksInCheckpoints = [];
1170
+ let previousSlotNumber = SlotNumber.ZERO;
1171
+ let checkpointIndex = -1;
1172
+ for (const checkpointedBlock of checkpointedBlocks){
1173
+ const block = checkpointedBlock.block;
1174
+ const slotNumber = block.header.globalVariables.slotNumber;
1175
+ if (slotNumber !== previousSlotNumber) {
1176
+ checkpointIndex++;
1177
+ blocksInCheckpoints.push([]);
1178
+ previousSlotNumber = slotNumber;
1179
+ }
1180
+ blocksInCheckpoints[checkpointIndex].push(block);
1181
+ }
1182
+ return blocksInCheckpoints.map((blocks)=>blocks.map((block)=>block.body.txEffects.map((txEffect)=>txEffect.l2ToL1Msgs)));
692
1183
  }
693
- /**
694
- * Returns a nullifier membership witness for a given nullifier at a given block.
695
- * @param blockNumber - The block number at which to get the index.
696
- * @param nullifier - Nullifier we try to find witness for.
697
- * @returns The nullifier membership witness (if found).
698
- */ async getNullifierMembershipWitness(blockNumber, nullifier) {
699
- const db = await this.#getWorldState(blockNumber);
1184
+ async getNullifierMembershipWitness(referenceBlock, nullifier) {
1185
+ const db = await this.#getWorldState(referenceBlock);
700
1186
  const [witness] = await db.findSiblingPaths(MerkleTreeId.NULLIFIER_TREE, [
701
1187
  nullifier.toBuffer()
702
1188
  ]);
@@ -712,7 +1198,8 @@ import { NodeMetrics } from './node_metrics.js';
712
1198
  }
713
1199
  /**
714
1200
  * Returns a low nullifier membership witness for a given nullifier at a given block.
715
- * @param blockNumber - The block number at which to get the index.
1201
+ * @param referenceBlock - The block parameter (block number, block hash, or 'latest') at which to get the data
1202
+ * (which contains the root of the nullifier tree in which we are searching for the nullifier).
716
1203
  * @param nullifier - Nullifier we try to find the low nullifier witness for.
717
1204
  * @returns The low nullifier membership witness (if found).
718
1205
  * @remarks Low nullifier witness can be used to perform a nullifier non-inclusion proof by leveraging the "linked
@@ -723,8 +1210,8 @@ import { NodeMetrics } from './node_metrics.js';
723
1210
  * the nullifier already exists in the tree. This is because the `getPreviousValueIndex` function returns the
724
1211
  * index of the nullifier itself when it already exists in the tree.
725
1212
  * TODO: This is a confusing behavior and we should eventually address that.
726
- */ async getLowNullifierMembershipWitness(blockNumber, nullifier) {
727
- const committedDb = await this.#getWorldState(blockNumber);
1213
+ */ async getLowNullifierMembershipWitness(referenceBlock, nullifier) {
1214
+ const committedDb = await this.#getWorldState(referenceBlock);
728
1215
  const findResult = await committedDb.getPreviousValueIndex(MerkleTreeId.NULLIFIER_TREE, nullifier.toBigInt());
729
1216
  if (!findResult) {
730
1217
  return undefined;
@@ -737,8 +1224,8 @@ import { NodeMetrics } from './node_metrics.js';
737
1224
  const siblingPath = await committedDb.getSiblingPath(MerkleTreeId.NULLIFIER_TREE, BigInt(index));
738
1225
  return new NullifierMembershipWitness(BigInt(index), preimageData, siblingPath);
739
1226
  }
740
- async getPublicDataWitness(blockNumber, leafSlot) {
741
- const committedDb = await this.#getWorldState(blockNumber);
1227
+ async getPublicDataWitness(referenceBlock, leafSlot) {
1228
+ const committedDb = await this.#getWorldState(referenceBlock);
742
1229
  const lowLeafResult = await committedDb.getPreviousValueIndex(MerkleTreeId.PUBLIC_DATA_TREE, leafSlot.toBigInt());
743
1230
  if (!lowLeafResult) {
744
1231
  return undefined;
@@ -748,18 +1235,8 @@ import { NodeMetrics } from './node_metrics.js';
748
1235
  return new PublicDataWitness(lowLeafResult.index, preimage, path);
749
1236
  }
750
1237
  }
751
- /**
752
- * Gets the storage value at the given contract storage slot.
753
- *
754
- * @remarks The storage slot here refers to the slot as it is defined in Noir not the index in the merkle tree.
755
- * Aztec's version of `eth_getStorageAt`.
756
- *
757
- * @param contract - Address of the contract to query.
758
- * @param slot - Slot to query.
759
- * @param blockNumber - The block number at which to get the data or 'latest'.
760
- * @returns Storage value at the given contract slot.
761
- */ async getPublicStorageAt(blockNumber, contract, slot) {
762
- const committedDb = await this.#getWorldState(blockNumber);
1238
+ async getPublicStorageAt(referenceBlock, contract, slot) {
1239
+ const committedDb = await this.#getWorldState(referenceBlock);
763
1240
  const leafSlot = await computePublicDataTreeLeafSlot(contract, slot);
764
1241
  const lowLeafResult = await committedDb.getPreviousValueIndex(MerkleTreeId.PUBLIC_DATA_TREE, leafSlot.toBigInt());
765
1242
  if (!lowLeafResult || !lowLeafResult.alreadyPresent) {
@@ -768,18 +1245,22 @@ import { NodeMetrics } from './node_metrics.js';
768
1245
  const preimage = await committedDb.getLeafPreimage(MerkleTreeId.PUBLIC_DATA_TREE, lowLeafResult.index);
769
1246
  return preimage.leaf.value;
770
1247
  }
771
- /**
772
- * Returns the currently committed block header, or the initial header if no blocks have been produced.
773
- * @returns The current committed block header.
774
- */ async getBlockHeader(blockNumber = 'latest') {
775
- return blockNumber === 0 || blockNumber === 'latest' && await this.blockSource.getBlockNumber() === 0 ? this.worldStateSynchronizer.getCommitted().getInitialHeader() : this.blockSource.getBlockHeader(blockNumber);
776
- }
777
- /**
778
- * Get a block header specified by its hash.
779
- * @param blockHash - The block hash being requested.
780
- * @returns The requested block header.
781
- */ async getBlockHeaderByHash(blockHash) {
782
- return await this.blockSource.getBlockHeaderByHash(blockHash);
1248
+ async getBlockHeader(block = 'latest') {
1249
+ if (BlockHash.isBlockHash(block)) {
1250
+ const initialBlockHash = await this.#getInitialHeaderHash();
1251
+ if (block.equals(initialBlockHash)) {
1252
+ // Block source doesn't handle initial header so we need to handle the case separately.
1253
+ return this.worldStateSynchronizer.getCommitted().getInitialHeader();
1254
+ }
1255
+ return this.blockSource.getBlockHeaderByHash(block);
1256
+ } else {
1257
+ // Block source doesn't handle initial header so we need to handle the case separately.
1258
+ const blockNumber = block === 'latest' ? await this.getBlockNumber() : block;
1259
+ if (blockNumber === BlockNumber.ZERO) {
1260
+ return this.worldStateSynchronizer.getCommitted().getInitialHeader();
1261
+ }
1262
+ return this.blockSource.getBlockHeader(block);
1263
+ }
783
1264
  }
784
1265
  /**
785
1266
  * Get a block header specified by its archive root.
@@ -788,6 +1269,12 @@ import { NodeMetrics } from './node_metrics.js';
788
1269
  */ async getBlockHeaderByArchive(archive) {
789
1270
  return await this.blockSource.getBlockHeaderByArchive(archive);
790
1271
  }
1272
+ getBlockData(number) {
1273
+ return this.blockSource.getBlockData(number);
1274
+ }
1275
+ getBlockDataByArchive(archive) {
1276
+ return this.blockSource.getBlockDataByArchive(archive);
1277
+ }
791
1278
  /**
792
1279
  * Simulates the public part of a transaction with the current state.
793
1280
  * @param tx - The transaction to simulate.
@@ -800,26 +1287,35 @@ import { NodeMetrics } from './node_metrics.js';
800
1287
  throw new BadRequestError(`Transaction total gas limit ${txGasLimit + teardownGasLimit} (${txGasLimit} + ${teardownGasLimit}) exceeds maximum gas limit ${this.config.rpcSimulatePublicMaxGasLimit} for simulation`);
801
1288
  }
802
1289
  const txHash = tx.getTxHash();
803
- const blockNumber = await this.blockSource.getBlockNumber() + 1;
1290
+ const latestBlockNumber = await this.blockSource.getBlockNumber();
1291
+ const blockNumber = BlockNumber.add(latestBlockNumber, 1);
804
1292
  // If sequencer is not initialized, we just set these values to zero for simulation.
805
1293
  const coinbase = EthAddress.ZERO;
806
1294
  const feeRecipient = AztecAddress.ZERO;
807
1295
  const newGlobalVariables = await this.globalVariableBuilder.buildGlobalVariables(blockNumber, coinbase, feeRecipient);
808
- const publicProcessorFactory = new PublicProcessorFactory(this.contractDataSource, new DateProvider(), this.telemetry);
1296
+ const publicProcessorFactory = new PublicProcessorFactory(this.contractDataSource, new DateProvider(), this.telemetry, this.log.getBindings());
809
1297
  this.log.verbose(`Simulating public calls for tx ${txHash}`, {
810
1298
  globalVariables: newGlobalVariables.toInspect(),
811
1299
  txHash,
812
1300
  blockNumber
813
1301
  });
1302
+ // Ensure world-state has caught up with the latest block we loaded from the archiver
1303
+ await this.worldStateSynchronizer.syncImmediate(latestBlockNumber);
814
1304
  const merkleTreeFork = await this.worldStateSynchronizer.fork();
815
1305
  try {
816
- const processor = publicProcessorFactory.create(merkleTreeFork, newGlobalVariables, {
1306
+ const config = PublicSimulatorConfig.from({
817
1307
  skipFeeEnforcement,
818
- clientInitiatedSimulation: true,
819
- maxDebugLogMemoryReads: this.config.rpcSimulatePublicMaxDebugLogMemoryReads
1308
+ collectDebugLogs: true,
1309
+ collectHints: false,
1310
+ collectCallMetadata: true,
1311
+ collectStatistics: false,
1312
+ collectionLimits: CollectionLimitsConfig.from({
1313
+ maxDebugLogMemoryReads: this.config.rpcSimulatePublicMaxDebugLogMemoryReads
1314
+ })
820
1315
  });
1316
+ const processor = publicProcessorFactory.create(merkleTreeFork, newGlobalVariables, config);
821
1317
  // REFACTOR: Consider merging ProcessReturnValues into ProcessedTx
822
- const [processedTxs, failedTxs, _usedTxs, returns] = await processor.process([
1318
+ const [processedTxs, failedTxs, _usedTxs, returns, _blobFields, debugLogs] = await processor.process([
823
1319
  tx
824
1320
  ]);
825
1321
  // REFACTOR: Consider returning the error rather than throwing
@@ -830,7 +1326,7 @@ import { NodeMetrics } from './node_metrics.js';
830
1326
  throw failedTxs[0].error;
831
1327
  }
832
1328
  const [processedTx] = processedTxs;
833
- return new PublicSimulationOutput(processedTx.revertReason, processedTx.globalVariables, processedTx.txEffect, returns, processedTx.gasUsed);
1329
+ return new PublicSimulationOutput(processedTx.revertReason, processedTx.globalVariables, processedTx.txEffect, returns, processedTx.gasUsed, debugLogs);
834
1330
  } finally{
835
1331
  await merkleTreeFork.close();
836
1332
  }
@@ -838,19 +1334,19 @@ import { NodeMetrics } from './node_metrics.js';
838
1334
  async isValidTx(tx, { isSimulation, skipFeeEnforcement } = {}) {
839
1335
  const db = this.worldStateSynchronizer.getCommitted();
840
1336
  const verifier = isSimulation ? undefined : this.proofVerifier;
841
- // We accept transactions if they are not expired by the next slot (checked based on the IncludeByTimestamp field)
1337
+ // We accept transactions if they are not expired by the next slot (checked based on the ExpirationTimestamp field)
842
1338
  const { ts: nextSlotTimestamp } = this.epochCache.getEpochAndSlotInNextL1Slot();
843
- const blockNumber = await this.blockSource.getBlockNumber() + 1;
844
- const validator = createValidatorForAcceptingTxs(db, this.contractDataSource, verifier, {
1339
+ const blockNumber = BlockNumber(await this.blockSource.getBlockNumber() + 1);
1340
+ const validator = createTxValidatorForAcceptingTxsOverRPC(db, this.contractDataSource, verifier, {
845
1341
  timestamp: nextSlotTimestamp,
846
1342
  blockNumber,
847
1343
  l1ChainId: this.l1ChainId,
848
1344
  rollupVersion: this.version,
849
1345
  setupAllowList: this.config.txPublicSetupAllowList ?? await getDefaultAllowedSetupFunctions(),
850
- gasFees: await this.getCurrentBaseFees(),
1346
+ gasFees: await this.getCurrentMinFees(),
851
1347
  skipFeeEnforcement,
852
1348
  txsPermitted: !this.config.disableTransactions
853
- });
1349
+ }, this.log.getBindings());
854
1350
  return await validator.validateTx(tx);
855
1351
  }
856
1352
  getConfig() {
@@ -910,7 +1406,7 @@ import { NodeMetrics } from './node_metrics.js';
910
1406
  throw new Error(`Archiver initial sync not complete. Cannot start snapshot.`);
911
1407
  }
912
1408
  // And it has an L2 block hash
913
- const l2BlockHash = await archiver.getL2Tips().then((tips)=>tips.latest.hash);
1409
+ const l2BlockHash = await archiver.getL2Tips().then((tips)=>tips.proposed.hash);
914
1410
  if (!l2BlockHash) {
915
1411
  this.metrics.recordSnapshotError();
916
1412
  throw new Error(`Archiver has no latest L2 block hash downloaded. Cannot start snapshot.`);
@@ -937,7 +1433,7 @@ import { NodeMetrics } from './node_metrics.js';
937
1433
  if (!('rollbackTo' in archiver)) {
938
1434
  throw new Error('Archiver implementation does not support rollbacks.');
939
1435
  }
940
- const finalizedBlock = await archiver.getL2Tips().then((tips)=>tips.finalized.number);
1436
+ const finalizedBlock = await archiver.getL2Tips().then((tips)=>tips.finalized.block.number);
941
1437
  if (targetBlock < finalizedBlock) {
942
1438
  if (force) {
943
1439
  this.log.warn(`Clearing world state database to allow rolling back behind finalized block ${finalizedBlock}`);
@@ -992,30 +1488,117 @@ import { NodeMetrics } from './node_metrics.js';
992
1488
  return this.slasherClient.gatherOffensesForRound(round === 'current' ? undefined : BigInt(round));
993
1489
  }
994
1490
  }
1491
+ async reloadKeystore() {
1492
+ if (!this.config.keyStoreDirectory?.length) {
1493
+ throw new BadRequestError('Cannot reload keystore: node is not using a file-based keystore. ' + 'Set KEY_STORE_DIRECTORY to use file-based keystores.');
1494
+ }
1495
+ if (!this.validatorClient) {
1496
+ throw new BadRequestError('Cannot reload keystore: validator is not enabled.');
1497
+ }
1498
+ this.log.info('Reloading keystore from disk');
1499
+ // Re-read and validate keystore files
1500
+ const keyStores = loadKeystores(this.config.keyStoreDirectory);
1501
+ const newManager = new KeystoreManager(mergeKeystores(keyStores));
1502
+ await newManager.validateSigners();
1503
+ ValidatorClient.validateKeyStoreConfiguration(newManager, this.log);
1504
+ // Validate that every validator's publisher keys overlap with the L1 signers
1505
+ // that were initialized at startup. Publishers cannot be hot-reloaded, so a
1506
+ // validator with a publisher key that doesn't match any existing L1 signer
1507
+ // would silently fail on every proposer slot.
1508
+ if (this.keyStoreManager && this.sequencer) {
1509
+ const oldAdapter = NodeKeystoreAdapter.fromKeyStoreManager(this.keyStoreManager);
1510
+ const availablePublishers = new Set(oldAdapter.getAttesterAddresses().flatMap((a)=>oldAdapter.getPublisherAddresses(a).map((p)=>p.toString().toLowerCase())));
1511
+ const newAdapter = NodeKeystoreAdapter.fromKeyStoreManager(newManager);
1512
+ for (const attester of newAdapter.getAttesterAddresses()){
1513
+ const pubs = newAdapter.getPublisherAddresses(attester);
1514
+ if (pubs.length > 0 && !pubs.some((p)=>availablePublishers.has(p.toString().toLowerCase()))) {
1515
+ throw new BadRequestError(`Cannot reload keystore: validator ${attester} has publisher keys ` + `[${pubs.map((p)=>p.toString()).join(', ')}] but none match the L1 signers initialized at startup ` + `[${[
1516
+ ...availablePublishers
1517
+ ].join(', ')}]. Publishers cannot be hot-reloaded — ` + `use an existing publisher key or restart the node.`);
1518
+ }
1519
+ }
1520
+ }
1521
+ // Build adapters for old and new keystores to compute diff
1522
+ const newAdapter = NodeKeystoreAdapter.fromKeyStoreManager(newManager);
1523
+ const newAddresses = newAdapter.getAttesterAddresses();
1524
+ const oldAddresses = this.keyStoreManager ? NodeKeystoreAdapter.fromKeyStoreManager(this.keyStoreManager).getAttesterAddresses() : [];
1525
+ const oldSet = new Set(oldAddresses.map((a)=>a.toString()));
1526
+ const newSet = new Set(newAddresses.map((a)=>a.toString()));
1527
+ const added = newAddresses.filter((a)=>!oldSet.has(a.toString()));
1528
+ const removed = oldAddresses.filter((a)=>!newSet.has(a.toString()));
1529
+ if (added.length > 0) {
1530
+ this.log.info(`Keystore reload: adding attester keys: ${added.map((a)=>a.toString()).join(', ')}`);
1531
+ }
1532
+ if (removed.length > 0) {
1533
+ this.log.info(`Keystore reload: removing attester keys: ${removed.map((a)=>a.toString()).join(', ')}`);
1534
+ }
1535
+ if (added.length === 0 && removed.length === 0) {
1536
+ this.log.info('Keystore reload: attester keys unchanged');
1537
+ }
1538
+ // Update the validator client (coinbase, feeRecipient, attester keys)
1539
+ this.validatorClient.reloadKeystore(newManager);
1540
+ // Update the publisher factory's keystore so newly-added validators
1541
+ // can be matched to existing publisher keys when proposing blocks.
1542
+ if (this.sequencer) {
1543
+ this.sequencer.updatePublisherNodeKeyStore(newAdapter);
1544
+ }
1545
+ // Update slasher's "don't-slash-self" list with new validator addresses
1546
+ if (this.slasherClient && !this.config.slashSelfAllowed) {
1547
+ const slashValidatorsNever = unique([
1548
+ ...this.config.slashValidatorsNever ?? [],
1549
+ ...newAddresses
1550
+ ].map((a)=>a.toString())).map(EthAddress.fromString);
1551
+ this.slasherClient.updateConfig({
1552
+ slashValidatorsNever
1553
+ });
1554
+ }
1555
+ this.keyStoreManager = newManager;
1556
+ this.log.info('Keystore reloaded: coinbase, feeRecipient, and attester keys updated');
1557
+ }
1558
+ #getInitialHeaderHash() {
1559
+ if (!this.initialHeaderHashPromise) {
1560
+ this.initialHeaderHashPromise = this.worldStateSynchronizer.getCommitted().getInitialHeader().hash();
1561
+ }
1562
+ return this.initialHeaderHashPromise;
1563
+ }
995
1564
  /**
996
1565
  * Returns an instance of MerkleTreeOperations having first ensured the world state is fully synched
997
- * @param blockNumber - The block number at which to get the data.
1566
+ * @param block - The block parameter (block number, block hash, or 'latest') at which to get the data.
998
1567
  * @returns An instance of a committed MerkleTreeOperations
999
- */ async #getWorldState(blockNumber) {
1000
- if (typeof blockNumber === 'number' && blockNumber < INITIAL_L2_BLOCK_NUM - 1) {
1001
- throw new Error('Invalid block number to get world state for: ' + blockNumber);
1002
- }
1003
- let blockSyncedTo = 0;
1568
+ */ async #getWorldState(block) {
1569
+ let blockSyncedTo = BlockNumber.ZERO;
1004
1570
  try {
1005
1571
  // Attempt to sync the world state if necessary
1006
1572
  blockSyncedTo = await this.#syncWorldState();
1007
1573
  } catch (err) {
1008
1574
  this.log.error(`Error getting world state: ${err}`);
1009
1575
  }
1010
- // using a snapshot could be less efficient than using the committed db
1011
- if (blockNumber === 'latest' /*|| blockNumber === blockSyncedTo*/ ) {
1012
- this.log.debug(`Using committed db for block ${blockNumber}, world state synced upto ${blockSyncedTo}`);
1576
+ if (block === 'latest') {
1577
+ this.log.debug(`Using committed db for block 'latest', world state synced upto ${blockSyncedTo}`);
1013
1578
  return this.worldStateSynchronizer.getCommitted();
1014
- } else if (blockNumber <= blockSyncedTo) {
1579
+ }
1580
+ if (BlockHash.isBlockHash(block)) {
1581
+ const initialBlockHash = await this.#getInitialHeaderHash();
1582
+ if (block.equals(initialBlockHash)) {
1583
+ // Block source doesn't handle initial header so we need to handle the case separately.
1584
+ return this.worldStateSynchronizer.getSnapshot(BlockNumber.ZERO);
1585
+ }
1586
+ const header = await this.blockSource.getBlockHeaderByHash(block);
1587
+ if (!header) {
1588
+ throw new Error(`Block hash ${block.toString()} not found when querying world state. If the node API has been queried with anchor block hash possibly a reorg has occurred.`);
1589
+ }
1590
+ const blockNumber = header.getBlockNumber();
1591
+ this.log.debug(`Using snapshot for block ${blockNumber}, world state synced upto ${blockSyncedTo}`);
1592
+ return this.worldStateSynchronizer.getSnapshot(blockNumber);
1593
+ }
1594
+ // Block number provided
1595
+ {
1596
+ const blockNumber = block;
1597
+ if (blockNumber > blockSyncedTo) {
1598
+ throw new Error(`Queried block ${block} not yet synced by the node (node is synced upto ${blockSyncedTo}).`);
1599
+ }
1015
1600
  this.log.debug(`Using snapshot for block ${blockNumber}, world state synced upto ${blockSyncedTo}`);
1016
1601
  return this.worldStateSynchronizer.getSnapshot(blockNumber);
1017
- } else {
1018
- throw new Error(`Block ${blockNumber} not yet synced`);
1019
1602
  }
1020
1603
  }
1021
1604
  /**
@@ -1023,11 +1606,6 @@ import { NodeMetrics } from './node_metrics.js';
1023
1606
  * @returns A promise that fulfils once the world state is synced
1024
1607
  */ async #syncWorldState() {
1025
1608
  const blockSourceHeight = await this.blockSource.getBlockNumber();
1026
- return this.worldStateSynchronizer.syncImmediate(blockSourceHeight);
1609
+ return await this.worldStateSynchronizer.syncImmediate(blockSourceHeight);
1027
1610
  }
1028
1611
  }
1029
- _ts_decorate([
1030
- trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
1031
- [Attributes.TX_HASH]: tx.getTxHash().toString()
1032
- }))
1033
- ], AztecNodeService.prototype, "simulatePublicCalls", null);