@aztec/aztec-node 0.0.1-commit.fce3e4f → 0.0.1-commit.ffe5b04ea
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dest/aztec-node/config.d.ts +12 -6
- package/dest/aztec-node/config.d.ts.map +1 -1
- package/dest/aztec-node/config.js +18 -4
- package/dest/aztec-node/node_metrics.d.ts +1 -1
- package/dest/aztec-node/node_metrics.d.ts.map +1 -1
- package/dest/aztec-node/node_metrics.js +9 -16
- package/dest/aztec-node/server.d.ts +68 -124
- package/dest/aztec-node/server.d.ts.map +1 -1
- package/dest/aztec-node/server.js +856 -263
- package/dest/sentinel/factory.d.ts +2 -2
- package/dest/sentinel/factory.d.ts.map +1 -1
- package/dest/sentinel/factory.js +1 -1
- package/dest/sentinel/sentinel.d.ts +6 -5
- package/dest/sentinel/sentinel.d.ts.map +1 -1
- package/dest/sentinel/sentinel.js +82 -51
- package/dest/sentinel/store.d.ts +2 -2
- package/dest/sentinel/store.d.ts.map +1 -1
- package/dest/sentinel/store.js +11 -7
- package/package.json +30 -28
- package/src/aztec-node/config.ts +35 -15
- package/src/aztec-node/node_metrics.ts +6 -17
- package/src/aztec-node/server.ts +595 -341
- package/src/sentinel/factory.ts +2 -7
- package/src/sentinel/sentinel.ts +94 -52
- package/src/sentinel/store.ts +12 -12
|
@@ -1,18 +1,388 @@
|
|
|
1
|
-
function
|
|
2
|
-
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
1
|
+
function applyDecs2203RFactory() {
|
|
2
|
+
function createAddInitializerMethod(initializers, decoratorFinishedRef) {
|
|
3
|
+
return function addInitializer(initializer) {
|
|
4
|
+
assertNotFinished(decoratorFinishedRef, "addInitializer");
|
|
5
|
+
assertCallable(initializer, "An initializer");
|
|
6
|
+
initializers.push(initializer);
|
|
7
|
+
};
|
|
8
|
+
}
|
|
9
|
+
function memberDec(dec, name, desc, initializers, kind, isStatic, isPrivate, metadata, value) {
|
|
10
|
+
var kindStr;
|
|
11
|
+
switch(kind){
|
|
12
|
+
case 1:
|
|
13
|
+
kindStr = "accessor";
|
|
14
|
+
break;
|
|
15
|
+
case 2:
|
|
16
|
+
kindStr = "method";
|
|
17
|
+
break;
|
|
18
|
+
case 3:
|
|
19
|
+
kindStr = "getter";
|
|
20
|
+
break;
|
|
21
|
+
case 4:
|
|
22
|
+
kindStr = "setter";
|
|
23
|
+
break;
|
|
24
|
+
default:
|
|
25
|
+
kindStr = "field";
|
|
26
|
+
}
|
|
27
|
+
var ctx = {
|
|
28
|
+
kind: kindStr,
|
|
29
|
+
name: isPrivate ? "#" + name : name,
|
|
30
|
+
static: isStatic,
|
|
31
|
+
private: isPrivate,
|
|
32
|
+
metadata: metadata
|
|
33
|
+
};
|
|
34
|
+
var decoratorFinishedRef = {
|
|
35
|
+
v: false
|
|
36
|
+
};
|
|
37
|
+
ctx.addInitializer = createAddInitializerMethod(initializers, decoratorFinishedRef);
|
|
38
|
+
var get, set;
|
|
39
|
+
if (kind === 0) {
|
|
40
|
+
if (isPrivate) {
|
|
41
|
+
get = desc.get;
|
|
42
|
+
set = desc.set;
|
|
43
|
+
} else {
|
|
44
|
+
get = function() {
|
|
45
|
+
return this[name];
|
|
46
|
+
};
|
|
47
|
+
set = function(v) {
|
|
48
|
+
this[name] = v;
|
|
49
|
+
};
|
|
50
|
+
}
|
|
51
|
+
} else if (kind === 2) {
|
|
52
|
+
get = function() {
|
|
53
|
+
return desc.value;
|
|
54
|
+
};
|
|
55
|
+
} else {
|
|
56
|
+
if (kind === 1 || kind === 3) {
|
|
57
|
+
get = function() {
|
|
58
|
+
return desc.get.call(this);
|
|
59
|
+
};
|
|
60
|
+
}
|
|
61
|
+
if (kind === 1 || kind === 4) {
|
|
62
|
+
set = function(v) {
|
|
63
|
+
desc.set.call(this, v);
|
|
64
|
+
};
|
|
65
|
+
}
|
|
66
|
+
}
|
|
67
|
+
ctx.access = get && set ? {
|
|
68
|
+
get: get,
|
|
69
|
+
set: set
|
|
70
|
+
} : get ? {
|
|
71
|
+
get: get
|
|
72
|
+
} : {
|
|
73
|
+
set: set
|
|
74
|
+
};
|
|
75
|
+
try {
|
|
76
|
+
return dec(value, ctx);
|
|
77
|
+
} finally{
|
|
78
|
+
decoratorFinishedRef.v = true;
|
|
79
|
+
}
|
|
80
|
+
}
|
|
81
|
+
function assertNotFinished(decoratorFinishedRef, fnName) {
|
|
82
|
+
if (decoratorFinishedRef.v) {
|
|
83
|
+
throw new Error("attempted to call " + fnName + " after decoration was finished");
|
|
84
|
+
}
|
|
85
|
+
}
|
|
86
|
+
function assertCallable(fn, hint) {
|
|
87
|
+
if (typeof fn !== "function") {
|
|
88
|
+
throw new TypeError(hint + " must be a function");
|
|
89
|
+
}
|
|
90
|
+
}
|
|
91
|
+
function assertValidReturnValue(kind, value) {
|
|
92
|
+
var type = typeof value;
|
|
93
|
+
if (kind === 1) {
|
|
94
|
+
if (type !== "object" || value === null) {
|
|
95
|
+
throw new TypeError("accessor decorators must return an object with get, set, or init properties or void 0");
|
|
96
|
+
}
|
|
97
|
+
if (value.get !== undefined) {
|
|
98
|
+
assertCallable(value.get, "accessor.get");
|
|
99
|
+
}
|
|
100
|
+
if (value.set !== undefined) {
|
|
101
|
+
assertCallable(value.set, "accessor.set");
|
|
102
|
+
}
|
|
103
|
+
if (value.init !== undefined) {
|
|
104
|
+
assertCallable(value.init, "accessor.init");
|
|
105
|
+
}
|
|
106
|
+
} else if (type !== "function") {
|
|
107
|
+
var hint;
|
|
108
|
+
if (kind === 0) {
|
|
109
|
+
hint = "field";
|
|
110
|
+
} else if (kind === 10) {
|
|
111
|
+
hint = "class";
|
|
112
|
+
} else {
|
|
113
|
+
hint = "method";
|
|
114
|
+
}
|
|
115
|
+
throw new TypeError(hint + " decorators must return a function or void 0");
|
|
116
|
+
}
|
|
117
|
+
}
|
|
118
|
+
function applyMemberDec(ret, base, decInfo, name, kind, isStatic, isPrivate, initializers, metadata) {
|
|
119
|
+
var decs = decInfo[0];
|
|
120
|
+
var desc, init, value;
|
|
121
|
+
if (isPrivate) {
|
|
122
|
+
if (kind === 0 || kind === 1) {
|
|
123
|
+
desc = {
|
|
124
|
+
get: decInfo[3],
|
|
125
|
+
set: decInfo[4]
|
|
126
|
+
};
|
|
127
|
+
} else if (kind === 3) {
|
|
128
|
+
desc = {
|
|
129
|
+
get: decInfo[3]
|
|
130
|
+
};
|
|
131
|
+
} else if (kind === 4) {
|
|
132
|
+
desc = {
|
|
133
|
+
set: decInfo[3]
|
|
134
|
+
};
|
|
135
|
+
} else {
|
|
136
|
+
desc = {
|
|
137
|
+
value: decInfo[3]
|
|
138
|
+
};
|
|
139
|
+
}
|
|
140
|
+
} else if (kind !== 0) {
|
|
141
|
+
desc = Object.getOwnPropertyDescriptor(base, name);
|
|
142
|
+
}
|
|
143
|
+
if (kind === 1) {
|
|
144
|
+
value = {
|
|
145
|
+
get: desc.get,
|
|
146
|
+
set: desc.set
|
|
147
|
+
};
|
|
148
|
+
} else if (kind === 2) {
|
|
149
|
+
value = desc.value;
|
|
150
|
+
} else if (kind === 3) {
|
|
151
|
+
value = desc.get;
|
|
152
|
+
} else if (kind === 4) {
|
|
153
|
+
value = desc.set;
|
|
154
|
+
}
|
|
155
|
+
var newValue, get, set;
|
|
156
|
+
if (typeof decs === "function") {
|
|
157
|
+
newValue = memberDec(decs, name, desc, initializers, kind, isStatic, isPrivate, metadata, value);
|
|
158
|
+
if (newValue !== void 0) {
|
|
159
|
+
assertValidReturnValue(kind, newValue);
|
|
160
|
+
if (kind === 0) {
|
|
161
|
+
init = newValue;
|
|
162
|
+
} else if (kind === 1) {
|
|
163
|
+
init = newValue.init;
|
|
164
|
+
get = newValue.get || value.get;
|
|
165
|
+
set = newValue.set || value.set;
|
|
166
|
+
value = {
|
|
167
|
+
get: get,
|
|
168
|
+
set: set
|
|
169
|
+
};
|
|
170
|
+
} else {
|
|
171
|
+
value = newValue;
|
|
172
|
+
}
|
|
173
|
+
}
|
|
174
|
+
} else {
|
|
175
|
+
for(var i = decs.length - 1; i >= 0; i--){
|
|
176
|
+
var dec = decs[i];
|
|
177
|
+
newValue = memberDec(dec, name, desc, initializers, kind, isStatic, isPrivate, metadata, value);
|
|
178
|
+
if (newValue !== void 0) {
|
|
179
|
+
assertValidReturnValue(kind, newValue);
|
|
180
|
+
var newInit;
|
|
181
|
+
if (kind === 0) {
|
|
182
|
+
newInit = newValue;
|
|
183
|
+
} else if (kind === 1) {
|
|
184
|
+
newInit = newValue.init;
|
|
185
|
+
get = newValue.get || value.get;
|
|
186
|
+
set = newValue.set || value.set;
|
|
187
|
+
value = {
|
|
188
|
+
get: get,
|
|
189
|
+
set: set
|
|
190
|
+
};
|
|
191
|
+
} else {
|
|
192
|
+
value = newValue;
|
|
193
|
+
}
|
|
194
|
+
if (newInit !== void 0) {
|
|
195
|
+
if (init === void 0) {
|
|
196
|
+
init = newInit;
|
|
197
|
+
} else if (typeof init === "function") {
|
|
198
|
+
init = [
|
|
199
|
+
init,
|
|
200
|
+
newInit
|
|
201
|
+
];
|
|
202
|
+
} else {
|
|
203
|
+
init.push(newInit);
|
|
204
|
+
}
|
|
205
|
+
}
|
|
206
|
+
}
|
|
207
|
+
}
|
|
208
|
+
}
|
|
209
|
+
if (kind === 0 || kind === 1) {
|
|
210
|
+
if (init === void 0) {
|
|
211
|
+
init = function(instance, init) {
|
|
212
|
+
return init;
|
|
213
|
+
};
|
|
214
|
+
} else if (typeof init !== "function") {
|
|
215
|
+
var ownInitializers = init;
|
|
216
|
+
init = function(instance, init) {
|
|
217
|
+
var value = init;
|
|
218
|
+
for(var i = 0; i < ownInitializers.length; i++){
|
|
219
|
+
value = ownInitializers[i].call(instance, value);
|
|
220
|
+
}
|
|
221
|
+
return value;
|
|
222
|
+
};
|
|
223
|
+
} else {
|
|
224
|
+
var originalInitializer = init;
|
|
225
|
+
init = function(instance, init) {
|
|
226
|
+
return originalInitializer.call(instance, init);
|
|
227
|
+
};
|
|
228
|
+
}
|
|
229
|
+
ret.push(init);
|
|
230
|
+
}
|
|
231
|
+
if (kind !== 0) {
|
|
232
|
+
if (kind === 1) {
|
|
233
|
+
desc.get = value.get;
|
|
234
|
+
desc.set = value.set;
|
|
235
|
+
} else if (kind === 2) {
|
|
236
|
+
desc.value = value;
|
|
237
|
+
} else if (kind === 3) {
|
|
238
|
+
desc.get = value;
|
|
239
|
+
} else if (kind === 4) {
|
|
240
|
+
desc.set = value;
|
|
241
|
+
}
|
|
242
|
+
if (isPrivate) {
|
|
243
|
+
if (kind === 1) {
|
|
244
|
+
ret.push(function(instance, args) {
|
|
245
|
+
return value.get.call(instance, args);
|
|
246
|
+
});
|
|
247
|
+
ret.push(function(instance, args) {
|
|
248
|
+
return value.set.call(instance, args);
|
|
249
|
+
});
|
|
250
|
+
} else if (kind === 2) {
|
|
251
|
+
ret.push(value);
|
|
252
|
+
} else {
|
|
253
|
+
ret.push(function(instance, args) {
|
|
254
|
+
return value.call(instance, args);
|
|
255
|
+
});
|
|
256
|
+
}
|
|
257
|
+
} else {
|
|
258
|
+
Object.defineProperty(base, name, desc);
|
|
259
|
+
}
|
|
260
|
+
}
|
|
261
|
+
}
|
|
262
|
+
function applyMemberDecs(Class, decInfos, metadata) {
|
|
263
|
+
var ret = [];
|
|
264
|
+
var protoInitializers;
|
|
265
|
+
var staticInitializers;
|
|
266
|
+
var existingProtoNonFields = new Map();
|
|
267
|
+
var existingStaticNonFields = new Map();
|
|
268
|
+
for(var i = 0; i < decInfos.length; i++){
|
|
269
|
+
var decInfo = decInfos[i];
|
|
270
|
+
if (!Array.isArray(decInfo)) continue;
|
|
271
|
+
var kind = decInfo[1];
|
|
272
|
+
var name = decInfo[2];
|
|
273
|
+
var isPrivate = decInfo.length > 3;
|
|
274
|
+
var isStatic = kind >= 5;
|
|
275
|
+
var base;
|
|
276
|
+
var initializers;
|
|
277
|
+
if (isStatic) {
|
|
278
|
+
base = Class;
|
|
279
|
+
kind = kind - 5;
|
|
280
|
+
staticInitializers = staticInitializers || [];
|
|
281
|
+
initializers = staticInitializers;
|
|
282
|
+
} else {
|
|
283
|
+
base = Class.prototype;
|
|
284
|
+
protoInitializers = protoInitializers || [];
|
|
285
|
+
initializers = protoInitializers;
|
|
286
|
+
}
|
|
287
|
+
if (kind !== 0 && !isPrivate) {
|
|
288
|
+
var existingNonFields = isStatic ? existingStaticNonFields : existingProtoNonFields;
|
|
289
|
+
var existingKind = existingNonFields.get(name) || 0;
|
|
290
|
+
if (existingKind === true || existingKind === 3 && kind !== 4 || existingKind === 4 && kind !== 3) {
|
|
291
|
+
throw new Error("Attempted to decorate a public method/accessor that has the same name as a previously decorated public method/accessor. This is not currently supported by the decorators plugin. Property name was: " + name);
|
|
292
|
+
} else if (!existingKind && kind > 2) {
|
|
293
|
+
existingNonFields.set(name, kind);
|
|
294
|
+
} else {
|
|
295
|
+
existingNonFields.set(name, true);
|
|
296
|
+
}
|
|
297
|
+
}
|
|
298
|
+
applyMemberDec(ret, base, decInfo, name, kind, isStatic, isPrivate, initializers, metadata);
|
|
299
|
+
}
|
|
300
|
+
pushInitializers(ret, protoInitializers);
|
|
301
|
+
pushInitializers(ret, staticInitializers);
|
|
302
|
+
return ret;
|
|
303
|
+
}
|
|
304
|
+
function pushInitializers(ret, initializers) {
|
|
305
|
+
if (initializers) {
|
|
306
|
+
ret.push(function(instance) {
|
|
307
|
+
for(var i = 0; i < initializers.length; i++){
|
|
308
|
+
initializers[i].call(instance);
|
|
309
|
+
}
|
|
310
|
+
return instance;
|
|
311
|
+
});
|
|
312
|
+
}
|
|
313
|
+
}
|
|
314
|
+
function applyClassDecs(targetClass, classDecs, metadata) {
|
|
315
|
+
if (classDecs.length > 0) {
|
|
316
|
+
var initializers = [];
|
|
317
|
+
var newClass = targetClass;
|
|
318
|
+
var name = targetClass.name;
|
|
319
|
+
for(var i = classDecs.length - 1; i >= 0; i--){
|
|
320
|
+
var decoratorFinishedRef = {
|
|
321
|
+
v: false
|
|
322
|
+
};
|
|
323
|
+
try {
|
|
324
|
+
var nextNewClass = classDecs[i](newClass, {
|
|
325
|
+
kind: "class",
|
|
326
|
+
name: name,
|
|
327
|
+
addInitializer: createAddInitializerMethod(initializers, decoratorFinishedRef),
|
|
328
|
+
metadata
|
|
329
|
+
});
|
|
330
|
+
} finally{
|
|
331
|
+
decoratorFinishedRef.v = true;
|
|
332
|
+
}
|
|
333
|
+
if (nextNewClass !== undefined) {
|
|
334
|
+
assertValidReturnValue(10, nextNewClass);
|
|
335
|
+
newClass = nextNewClass;
|
|
336
|
+
}
|
|
337
|
+
}
|
|
338
|
+
return [
|
|
339
|
+
defineMetadata(newClass, metadata),
|
|
340
|
+
function() {
|
|
341
|
+
for(var i = 0; i < initializers.length; i++){
|
|
342
|
+
initializers[i].call(newClass);
|
|
343
|
+
}
|
|
344
|
+
}
|
|
345
|
+
];
|
|
346
|
+
}
|
|
347
|
+
}
|
|
348
|
+
function defineMetadata(Class, metadata) {
|
|
349
|
+
return Object.defineProperty(Class, Symbol.metadata || Symbol.for("Symbol.metadata"), {
|
|
350
|
+
configurable: true,
|
|
351
|
+
enumerable: true,
|
|
352
|
+
value: metadata
|
|
353
|
+
});
|
|
354
|
+
}
|
|
355
|
+
return function applyDecs2203R(targetClass, memberDecs, classDecs, parentClass) {
|
|
356
|
+
if (parentClass !== void 0) {
|
|
357
|
+
var parentMetadata = parentClass[Symbol.metadata || Symbol.for("Symbol.metadata")];
|
|
358
|
+
}
|
|
359
|
+
var metadata = Object.create(parentMetadata === void 0 ? null : parentMetadata);
|
|
360
|
+
var e = applyMemberDecs(targetClass, memberDecs, metadata);
|
|
361
|
+
if (!classDecs.length) defineMetadata(targetClass, metadata);
|
|
362
|
+
return {
|
|
363
|
+
e: e,
|
|
364
|
+
get c () {
|
|
365
|
+
return applyClassDecs(targetClass, classDecs, metadata);
|
|
366
|
+
}
|
|
367
|
+
};
|
|
368
|
+
};
|
|
6
369
|
}
|
|
370
|
+
function _apply_decs_2203_r(targetClass, memberDecs, classDecs, parentClass) {
|
|
371
|
+
return (_apply_decs_2203_r = applyDecs2203RFactory())(targetClass, memberDecs, classDecs, parentClass);
|
|
372
|
+
}
|
|
373
|
+
var _dec, _initProto;
|
|
7
374
|
import { createArchiver } from '@aztec/archiver';
|
|
8
375
|
import { BBCircuitVerifier, QueuedIVCVerifier, TestCircuitVerifier } from '@aztec/bb-prover';
|
|
9
|
-
import {
|
|
10
|
-
import {
|
|
376
|
+
import { createBlobClientWithFileStores } from '@aztec/blob-client/client';
|
|
377
|
+
import { Blob } from '@aztec/blob-lib';
|
|
11
378
|
import { EpochCache } from '@aztec/epoch-cache';
|
|
12
|
-
import {
|
|
13
|
-
import {
|
|
379
|
+
import { createEthereumChain } from '@aztec/ethereum/chain';
|
|
380
|
+
import { getPublicClient } from '@aztec/ethereum/client';
|
|
381
|
+
import { RegistryContract, RollupContract } from '@aztec/ethereum/contracts';
|
|
382
|
+
import { BlockNumber, SlotNumber } from '@aztec/foundation/branded-types';
|
|
383
|
+
import { compactArray, pick, unique } from '@aztec/foundation/collection';
|
|
384
|
+
import { Fr } from '@aztec/foundation/curves/bn254';
|
|
14
385
|
import { EthAddress } from '@aztec/foundation/eth-address';
|
|
15
|
-
import { Fr } from '@aztec/foundation/fields';
|
|
16
386
|
import { BadRequestError } from '@aztec/foundation/json-rpc';
|
|
17
387
|
import { createLogger } from '@aztec/foundation/log';
|
|
18
388
|
import { count } from '@aztec/foundation/string';
|
|
@@ -20,30 +390,36 @@ import { DateProvider, Timer } from '@aztec/foundation/timer';
|
|
|
20
390
|
import { MembershipWitness } from '@aztec/foundation/trees';
|
|
21
391
|
import { KeystoreManager, loadKeystores, mergeKeystores } from '@aztec/node-keystore';
|
|
22
392
|
import { trySnapshotSync, uploadSnapshot } from '@aztec/node-lib/actions';
|
|
23
|
-
import {
|
|
24
|
-
import { createP2PClient, getDefaultAllowedSetupFunctions } from '@aztec/p2p';
|
|
393
|
+
import { createForwarderL1TxUtilsFromSigners, createL1TxUtilsFromSigners } from '@aztec/node-lib/factories';
|
|
394
|
+
import { createP2PClient, createTxValidatorForAcceptingTxsOverRPC, getDefaultAllowedSetupFunctions } from '@aztec/p2p';
|
|
25
395
|
import { ProtocolContractAddress } from '@aztec/protocol-contracts';
|
|
26
|
-
import {
|
|
396
|
+
import { createProverNode } from '@aztec/prover-node';
|
|
397
|
+
import { createKeyStoreForProver } from '@aztec/prover-node/config';
|
|
398
|
+
import { GlobalVariableBuilder, SequencerClient } from '@aztec/sequencer-client';
|
|
27
399
|
import { PublicProcessorFactory } from '@aztec/simulator/server';
|
|
28
400
|
import { AttestationsBlockWatcher, EpochPruneWatcher, createSlasher } from '@aztec/slasher';
|
|
29
|
-
import { PublicSimulatorConfig } from '@aztec/stdlib/avm';
|
|
401
|
+
import { CollectionLimitsConfig, PublicSimulatorConfig } from '@aztec/stdlib/avm';
|
|
30
402
|
import { AztecAddress } from '@aztec/stdlib/aztec-address';
|
|
31
|
-
import {
|
|
403
|
+
import { BlockHash, L2Block } from '@aztec/stdlib/block';
|
|
404
|
+
import { GasFees } from '@aztec/stdlib/gas';
|
|
32
405
|
import { computePublicDataTreeLeafSlot } from '@aztec/stdlib/hash';
|
|
33
406
|
import { AztecNodeAdminConfigSchema } from '@aztec/stdlib/interfaces/client';
|
|
34
407
|
import { tryStop } from '@aztec/stdlib/interfaces/server';
|
|
408
|
+
import { InMemoryDebugLogStore, NullDebugLogStore } from '@aztec/stdlib/logs';
|
|
35
409
|
import { InboxLeaf } from '@aztec/stdlib/messaging';
|
|
36
|
-
import { P2PClientType } from '@aztec/stdlib/p2p';
|
|
37
410
|
import { MerkleTreeId, NullifierMembershipWitness, PublicDataWitness } from '@aztec/stdlib/trees';
|
|
38
411
|
import { PublicSimulationOutput, TxReceipt, TxStatus } from '@aztec/stdlib/tx';
|
|
39
412
|
import { getPackageVersion } from '@aztec/stdlib/update-checker';
|
|
40
413
|
import { Attributes, getTelemetryClient, trackSpan } from '@aztec/telemetry-client';
|
|
41
|
-
import { NodeKeystoreAdapter, ValidatorClient, createBlockProposalHandler, createValidatorClient } from '@aztec/validator-client';
|
|
414
|
+
import { FullNodeCheckpointsBuilder as CheckpointsBuilder, FullNodeCheckpointsBuilder, NodeKeystoreAdapter, ValidatorClient, createBlockProposalHandler, createValidatorClient } from '@aztec/validator-client';
|
|
42
415
|
import { createWorldStateSynchronizer } from '@aztec/world-state';
|
|
43
416
|
import { createPublicClient, fallback, http } from 'viem';
|
|
44
417
|
import { createSentinel } from '../sentinel/factory.js';
|
|
45
418
|
import { createKeyStoreForValidator } from './config.js';
|
|
46
419
|
import { NodeMetrics } from './node_metrics.js';
|
|
420
|
+
_dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
421
|
+
[Attributes.TX_HASH]: tx.getTxHash().toString()
|
|
422
|
+
}));
|
|
47
423
|
/**
|
|
48
424
|
* The aztec node.
|
|
49
425
|
*/ export class AztecNodeService {
|
|
@@ -55,6 +431,7 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
55
431
|
l1ToL2MessageSource;
|
|
56
432
|
worldStateSynchronizer;
|
|
57
433
|
sequencer;
|
|
434
|
+
proverNode;
|
|
58
435
|
slasherClient;
|
|
59
436
|
validatorsSentinel;
|
|
60
437
|
epochPruneWatcher;
|
|
@@ -66,11 +443,25 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
66
443
|
proofVerifier;
|
|
67
444
|
telemetry;
|
|
68
445
|
log;
|
|
446
|
+
blobClient;
|
|
447
|
+
validatorClient;
|
|
448
|
+
keyStoreManager;
|
|
449
|
+
debugLogStore;
|
|
450
|
+
static{
|
|
451
|
+
({ e: [_initProto] } = _apply_decs_2203_r(this, [
|
|
452
|
+
[
|
|
453
|
+
_dec,
|
|
454
|
+
2,
|
|
455
|
+
"simulatePublicCalls"
|
|
456
|
+
]
|
|
457
|
+
], []));
|
|
458
|
+
}
|
|
69
459
|
metrics;
|
|
460
|
+
initialHeaderHashPromise;
|
|
70
461
|
// Prevent two snapshot operations to happen simultaneously
|
|
71
462
|
isUploadingSnapshot;
|
|
72
463
|
tracer;
|
|
73
|
-
constructor(config, p2pClient, blockSource, logsSource, contractDataSource, l1ToL2MessageSource, worldStateSynchronizer, sequencer, slasherClient, validatorsSentinel, epochPruneWatcher, l1ChainId, version, globalVariableBuilder, epochCache, packageVersion, proofVerifier, telemetry = getTelemetryClient(), log = createLogger('node')){
|
|
464
|
+
constructor(config, p2pClient, blockSource, logsSource, contractDataSource, l1ToL2MessageSource, worldStateSynchronizer, sequencer, proverNode, slasherClient, validatorsSentinel, epochPruneWatcher, l1ChainId, version, globalVariableBuilder, epochCache, packageVersion, proofVerifier, telemetry = getTelemetryClient(), log = createLogger('node'), blobClient, validatorClient, keyStoreManager, debugLogStore = new NullDebugLogStore()){
|
|
74
465
|
this.config = config;
|
|
75
466
|
this.p2pClient = p2pClient;
|
|
76
467
|
this.blockSource = blockSource;
|
|
@@ -79,6 +470,7 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
79
470
|
this.l1ToL2MessageSource = l1ToL2MessageSource;
|
|
80
471
|
this.worldStateSynchronizer = worldStateSynchronizer;
|
|
81
472
|
this.sequencer = sequencer;
|
|
473
|
+
this.proverNode = proverNode;
|
|
82
474
|
this.slasherClient = slasherClient;
|
|
83
475
|
this.validatorsSentinel = validatorsSentinel;
|
|
84
476
|
this.epochPruneWatcher = epochPruneWatcher;
|
|
@@ -90,11 +482,22 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
90
482
|
this.proofVerifier = proofVerifier;
|
|
91
483
|
this.telemetry = telemetry;
|
|
92
484
|
this.log = log;
|
|
485
|
+
this.blobClient = blobClient;
|
|
486
|
+
this.validatorClient = validatorClient;
|
|
487
|
+
this.keyStoreManager = keyStoreManager;
|
|
488
|
+
this.debugLogStore = debugLogStore;
|
|
489
|
+
this.initialHeaderHashPromise = (_initProto(this), undefined);
|
|
93
490
|
this.isUploadingSnapshot = false;
|
|
94
491
|
this.metrics = new NodeMetrics(telemetry, 'AztecNodeService');
|
|
95
492
|
this.tracer = telemetry.getTracer('AztecNodeService');
|
|
96
493
|
this.log.info(`Aztec Node version: ${this.packageVersion}`);
|
|
97
494
|
this.log.info(`Aztec Node started on chain 0x${l1ChainId.toString(16)}`, config.l1Contracts);
|
|
495
|
+
// A defensive check that protects us against introducing a bug in the complex `createAndSync` function. We must
|
|
496
|
+
// never have debugLogStore enabled when not in test mode because then we would be accumulating debug logs in
|
|
497
|
+
// memory which could be a DoS vector on the sequencer (since no fees are paid for debug logs).
|
|
498
|
+
if (debugLogStore.isEnabled && config.realProofs) {
|
|
499
|
+
throw new Error('debugLogStore should never be enabled when realProofs are set');
|
|
500
|
+
}
|
|
98
501
|
}
|
|
99
502
|
async getWorldStateSyncStatus() {
|
|
100
503
|
const status = await this.worldStateSynchronizer.status();
|
|
@@ -115,20 +518,28 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
115
518
|
const packageVersion = getPackageVersion() ?? '';
|
|
116
519
|
const telemetry = deps.telemetry ?? getTelemetryClient();
|
|
117
520
|
const dateProvider = deps.dateProvider ?? new DateProvider();
|
|
118
|
-
const blobSinkClient = deps.blobSinkClient ?? createBlobSinkClient(config, {
|
|
119
|
-
logger: createLogger('node:blob-sink:client')
|
|
120
|
-
});
|
|
121
521
|
const ethereumChain = createEthereumChain(config.l1RpcUrls, config.l1ChainId);
|
|
122
|
-
// Build a key store from file if given or from environment otherwise
|
|
522
|
+
// Build a key store from file if given or from environment otherwise.
|
|
523
|
+
// We keep the raw KeyStore available so we can merge with prover keys if enableProverNode is set.
|
|
123
524
|
let keyStoreManager;
|
|
124
525
|
const keyStoreProvided = config.keyStoreDirectory !== undefined && config.keyStoreDirectory.length > 0;
|
|
125
526
|
if (keyStoreProvided) {
|
|
126
527
|
const keyStores = loadKeystores(config.keyStoreDirectory);
|
|
127
528
|
keyStoreManager = new KeystoreManager(mergeKeystores(keyStores));
|
|
128
529
|
} else {
|
|
129
|
-
const
|
|
130
|
-
|
|
131
|
-
|
|
530
|
+
const rawKeyStores = [];
|
|
531
|
+
const validatorKeyStore = createKeyStoreForValidator(config);
|
|
532
|
+
if (validatorKeyStore) {
|
|
533
|
+
rawKeyStores.push(validatorKeyStore);
|
|
534
|
+
}
|
|
535
|
+
if (config.enableProverNode) {
|
|
536
|
+
const proverKeyStore = createKeyStoreForProver(config);
|
|
537
|
+
if (proverKeyStore) {
|
|
538
|
+
rawKeyStores.push(proverKeyStore);
|
|
539
|
+
}
|
|
540
|
+
}
|
|
541
|
+
if (rawKeyStores.length > 0) {
|
|
542
|
+
keyStoreManager = new KeystoreManager(rawKeyStores.length === 1 ? rawKeyStores[0] : mergeKeystores(rawKeyStores));
|
|
132
543
|
}
|
|
133
544
|
}
|
|
134
545
|
await keyStoreManager?.validateSigners();
|
|
@@ -137,8 +548,8 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
137
548
|
if (keyStoreManager === undefined) {
|
|
138
549
|
throw new Error('Failed to create key store, a requirement for running a validator');
|
|
139
550
|
}
|
|
140
|
-
if (!keyStoreProvided) {
|
|
141
|
-
log.warn(
|
|
551
|
+
if (!keyStoreProvided && process.env.NODE_ENV !== 'test') {
|
|
552
|
+
log.warn("Keystore created from env: it's recommended to use a file-based key store for production");
|
|
142
553
|
}
|
|
143
554
|
ValidatorClient.validateKeyStoreConfiguration(keyStoreManager, log);
|
|
144
555
|
}
|
|
@@ -148,7 +559,9 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
148
559
|
}
|
|
149
560
|
const publicClient = createPublicClient({
|
|
150
561
|
chain: ethereumChain.chainInfo,
|
|
151
|
-
transport: fallback(config.l1RpcUrls.map((url)=>http(url
|
|
562
|
+
transport: fallback(config.l1RpcUrls.map((url)=>http(url, {
|
|
563
|
+
batch: false
|
|
564
|
+
}))),
|
|
152
565
|
pollingInterval: config.viemPollingIntervalMS
|
|
153
566
|
});
|
|
154
567
|
const l1ContractsAddresses = await RegistryContract.collectAddresses(publicClient, config.l1Contracts.registryAddress, config.rollupVersion ?? 'canonical');
|
|
@@ -158,22 +571,24 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
158
571
|
...l1ContractsAddresses
|
|
159
572
|
};
|
|
160
573
|
const rollupContract = new RollupContract(publicClient, config.l1Contracts.rollupAddress.toString());
|
|
161
|
-
const [l1GenesisTime, slotDuration, rollupVersionFromRollup] = await Promise.all([
|
|
574
|
+
const [l1GenesisTime, slotDuration, rollupVersionFromRollup, rollupManaLimit] = await Promise.all([
|
|
162
575
|
rollupContract.getL1GenesisTime(),
|
|
163
576
|
rollupContract.getSlotDuration(),
|
|
164
|
-
rollupContract.getVersion()
|
|
577
|
+
rollupContract.getVersion(),
|
|
578
|
+
rollupContract.getManaLimit().then(Number)
|
|
165
579
|
]);
|
|
166
580
|
config.rollupVersion ??= Number(rollupVersionFromRollup);
|
|
167
581
|
if (config.rollupVersion !== Number(rollupVersionFromRollup)) {
|
|
168
582
|
log.warn(`Registry looked up and returned a rollup with version (${config.rollupVersion}), but this does not match with version detected from the rollup directly: (${rollupVersionFromRollup}).`);
|
|
169
583
|
}
|
|
584
|
+
const blobClient = await createBlobClientWithFileStores(config, log.createChild('blob-client'));
|
|
170
585
|
// attempt snapshot sync if possible
|
|
171
586
|
await trySnapshotSync(config, log);
|
|
172
587
|
const epochCache = await EpochCache.create(config.l1Contracts.rollupAddress, config, {
|
|
173
588
|
dateProvider
|
|
174
589
|
});
|
|
175
590
|
const archiver = await createArchiver(config, {
|
|
176
|
-
|
|
591
|
+
blobClient,
|
|
177
592
|
epochCache,
|
|
178
593
|
telemetry,
|
|
179
594
|
dateProvider
|
|
@@ -182,74 +597,96 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
182
597
|
});
|
|
183
598
|
// now create the merkle trees and the world state synchronizer
|
|
184
599
|
const worldStateSynchronizer = await createWorldStateSynchronizer(config, archiver, options.prefilledPublicData, telemetry);
|
|
185
|
-
const circuitVerifier = config.realProofs ? await BBCircuitVerifier.new(config) : new TestCircuitVerifier(config.proverTestVerificationDelayMs);
|
|
600
|
+
const circuitVerifier = config.realProofs || config.debugForceTxProofVerification ? await BBCircuitVerifier.new(config) : new TestCircuitVerifier(config.proverTestVerificationDelayMs);
|
|
601
|
+
let debugLogStore;
|
|
186
602
|
if (!config.realProofs) {
|
|
187
603
|
log.warn(`Aztec node is accepting fake proofs`);
|
|
604
|
+
debugLogStore = new InMemoryDebugLogStore();
|
|
605
|
+
log.info('Aztec node started in test mode (realProofs set to false) hence debug logs from public functions will be collected and served');
|
|
606
|
+
} else {
|
|
607
|
+
debugLogStore = new NullDebugLogStore();
|
|
188
608
|
}
|
|
189
609
|
const proofVerifier = new QueuedIVCVerifier(config, circuitVerifier);
|
|
610
|
+
const proverOnly = config.enableProverNode && config.disableValidator;
|
|
611
|
+
if (proverOnly) {
|
|
612
|
+
log.info('Starting in prover-only mode: skipping validator, sequencer, sentinel, and slasher subsystems');
|
|
613
|
+
}
|
|
190
614
|
// create the tx pool and the p2p client, which will need the l2 block source
|
|
191
|
-
const p2pClient = await createP2PClient(
|
|
192
|
-
// We
|
|
193
|
-
|
|
194
|
-
|
|
615
|
+
const p2pClient = await createP2PClient(config, archiver, proofVerifier, worldStateSynchronizer, epochCache, packageVersion, dateProvider, telemetry, deps.p2pClientDeps);
|
|
616
|
+
// We'll accumulate sentinel watchers here
|
|
617
|
+
const watchers = [];
|
|
618
|
+
// Create FullNodeCheckpointsBuilder for block proposal handling and tx validation.
|
|
619
|
+
// Override maxTxsPerCheckpoint with the validator-specific limit if set.
|
|
620
|
+
const validatorCheckpointsBuilder = new FullNodeCheckpointsBuilder({
|
|
195
621
|
...config,
|
|
196
622
|
l1GenesisTime,
|
|
197
|
-
slotDuration: Number(slotDuration)
|
|
623
|
+
slotDuration: Number(slotDuration),
|
|
624
|
+
rollupManaLimit,
|
|
625
|
+
maxTxsPerCheckpoint: config.validateMaxTxsPerCheckpoint
|
|
198
626
|
}, worldStateSynchronizer, archiver, dateProvider, telemetry);
|
|
199
|
-
|
|
200
|
-
|
|
201
|
-
|
|
202
|
-
|
|
203
|
-
|
|
204
|
-
|
|
205
|
-
|
|
206
|
-
|
|
207
|
-
|
|
208
|
-
|
|
209
|
-
|
|
210
|
-
|
|
211
|
-
|
|
212
|
-
|
|
213
|
-
|
|
214
|
-
|
|
215
|
-
|
|
216
|
-
|
|
217
|
-
if (
|
|
218
|
-
|
|
627
|
+
let validatorClient;
|
|
628
|
+
if (!proverOnly) {
|
|
629
|
+
// Create validator client if required
|
|
630
|
+
validatorClient = await createValidatorClient(config, {
|
|
631
|
+
checkpointsBuilder: validatorCheckpointsBuilder,
|
|
632
|
+
worldState: worldStateSynchronizer,
|
|
633
|
+
p2pClient,
|
|
634
|
+
telemetry,
|
|
635
|
+
dateProvider,
|
|
636
|
+
epochCache,
|
|
637
|
+
blockSource: archiver,
|
|
638
|
+
l1ToL2MessageSource: archiver,
|
|
639
|
+
keyStoreManager,
|
|
640
|
+
blobClient
|
|
641
|
+
});
|
|
642
|
+
// If we have a validator client, register it as a source of offenses for the slasher,
|
|
643
|
+
// and have it register callbacks on the p2p client *before* we start it, otherwise messages
|
|
644
|
+
// like attestations or auths will fail.
|
|
645
|
+
if (validatorClient) {
|
|
646
|
+
watchers.push(validatorClient);
|
|
647
|
+
if (!options.dontStartSequencer) {
|
|
648
|
+
await validatorClient.registerHandlers();
|
|
649
|
+
}
|
|
219
650
|
}
|
|
220
651
|
}
|
|
221
|
-
// If there's no validator client
|
|
222
|
-
//
|
|
223
|
-
|
|
224
|
-
|
|
652
|
+
// If there's no validator client, create a BlockProposalHandler to handle block proposals
|
|
653
|
+
// for monitoring or reexecution. Reexecution (default) allows us to follow the pending chain,
|
|
654
|
+
// while non-reexecution is used for validating the proposals and collecting their txs.
|
|
655
|
+
if (!validatorClient) {
|
|
656
|
+
const reexecute = !!config.alwaysReexecuteBlockProposals;
|
|
657
|
+
log.info(`Setting up block proposal handler` + (reexecute ? ' with reexecution of proposals' : ''));
|
|
225
658
|
createBlockProposalHandler(config, {
|
|
226
|
-
|
|
659
|
+
checkpointsBuilder: validatorCheckpointsBuilder,
|
|
660
|
+
worldState: worldStateSynchronizer,
|
|
227
661
|
epochCache,
|
|
228
662
|
blockSource: archiver,
|
|
229
663
|
l1ToL2MessageSource: archiver,
|
|
230
664
|
p2pClient,
|
|
231
665
|
dateProvider,
|
|
232
666
|
telemetry
|
|
233
|
-
}).
|
|
667
|
+
}).register(p2pClient, reexecute);
|
|
234
668
|
}
|
|
235
669
|
// Start world state and wait for it to sync to the archiver.
|
|
236
670
|
await worldStateSynchronizer.start();
|
|
237
671
|
// Start p2p. Note that it depends on world state to be running.
|
|
238
672
|
await p2pClient.start();
|
|
239
|
-
|
|
240
|
-
if (validatorsSentinel && config.slashInactivityPenalty > 0n) {
|
|
241
|
-
watchers.push(validatorsSentinel);
|
|
242
|
-
}
|
|
673
|
+
let validatorsSentinel;
|
|
243
674
|
let epochPruneWatcher;
|
|
244
|
-
if (config.slashPrunePenalty > 0n || config.slashDataWithholdingPenalty > 0n) {
|
|
245
|
-
epochPruneWatcher = new EpochPruneWatcher(archiver, archiver, epochCache, p2pClient.getTxProvider(), blockBuilder, config);
|
|
246
|
-
watchers.push(epochPruneWatcher);
|
|
247
|
-
}
|
|
248
|
-
// We assume we want to slash for invalid attestations unless all max penalties are set to 0
|
|
249
675
|
let attestationsBlockWatcher;
|
|
250
|
-
if (
|
|
251
|
-
|
|
252
|
-
|
|
676
|
+
if (!proverOnly) {
|
|
677
|
+
validatorsSentinel = await createSentinel(epochCache, archiver, p2pClient, config);
|
|
678
|
+
if (validatorsSentinel && config.slashInactivityPenalty > 0n) {
|
|
679
|
+
watchers.push(validatorsSentinel);
|
|
680
|
+
}
|
|
681
|
+
if (config.slashPrunePenalty > 0n || config.slashDataWithholdingPenalty > 0n) {
|
|
682
|
+
epochPruneWatcher = new EpochPruneWatcher(archiver, archiver, epochCache, p2pClient.getTxProvider(), validatorCheckpointsBuilder, config);
|
|
683
|
+
watchers.push(epochPruneWatcher);
|
|
684
|
+
}
|
|
685
|
+
// We assume we want to slash for invalid attestations unless all max penalties are set to 0
|
|
686
|
+
if (config.slashProposeInvalidAttestationsPenalty > 0n || config.slashAttestDescendantOfInvalidPenalty > 0n) {
|
|
687
|
+
attestationsBlockWatcher = new AttestationsBlockWatcher(archiver, epochCache, config);
|
|
688
|
+
watchers.push(attestationsBlockWatcher);
|
|
689
|
+
}
|
|
253
690
|
}
|
|
254
691
|
// Start p2p-related services once the archiver has completed sync
|
|
255
692
|
void archiver.waitForInitialSync().then(async ()=>{
|
|
@@ -262,21 +699,36 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
262
699
|
// Validator enabled, create/start relevant service
|
|
263
700
|
let sequencer;
|
|
264
701
|
let slasherClient;
|
|
265
|
-
if (!config.disableValidator) {
|
|
702
|
+
if (!config.disableValidator && validatorClient) {
|
|
266
703
|
// We create a slasher only if we have a sequencer, since all slashing actions go through the sequencer publisher
|
|
267
704
|
// as they are executed when the node is selected as proposer.
|
|
268
705
|
const validatorAddresses = keyStoreManager ? NodeKeystoreAdapter.fromKeyStoreManager(keyStoreManager).getAddresses() : [];
|
|
269
706
|
slasherClient = await createSlasher(config, config.l1Contracts, getPublicClient(config), watchers, dateProvider, epochCache, validatorAddresses, undefined);
|
|
270
707
|
await slasherClient.start();
|
|
271
|
-
const l1TxUtils = await
|
|
708
|
+
const l1TxUtils = config.sequencerPublisherForwarderAddress ? await createForwarderL1TxUtilsFromSigners(publicClient, keyStoreManager.createAllValidatorPublisherSigners(), config.sequencerPublisherForwarderAddress, {
|
|
272
709
|
...config,
|
|
273
710
|
scope: 'sequencer'
|
|
274
711
|
}, {
|
|
275
712
|
telemetry,
|
|
276
713
|
logger: log.createChild('l1-tx-utils'),
|
|
277
|
-
dateProvider
|
|
714
|
+
dateProvider,
|
|
715
|
+
kzg: Blob.getViemKzgInstance()
|
|
716
|
+
}) : await createL1TxUtilsFromSigners(publicClient, keyStoreManager.createAllValidatorPublisherSigners(), {
|
|
717
|
+
...config,
|
|
718
|
+
scope: 'sequencer'
|
|
719
|
+
}, {
|
|
720
|
+
telemetry,
|
|
721
|
+
logger: log.createChild('l1-tx-utils'),
|
|
722
|
+
dateProvider,
|
|
723
|
+
kzg: Blob.getViemKzgInstance()
|
|
278
724
|
});
|
|
279
725
|
// Create and start the sequencer client
|
|
726
|
+
const checkpointsBuilder = new CheckpointsBuilder({
|
|
727
|
+
...config,
|
|
728
|
+
l1GenesisTime,
|
|
729
|
+
slotDuration: Number(slotDuration),
|
|
730
|
+
rollupManaLimit
|
|
731
|
+
}, worldStateSynchronizer, archiver, dateProvider, telemetry, debugLogStore);
|
|
280
732
|
sequencer = await SequencerClient.new(config, {
|
|
281
733
|
...deps,
|
|
282
734
|
epochCache,
|
|
@@ -285,12 +737,12 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
285
737
|
p2pClient,
|
|
286
738
|
worldStateSynchronizer,
|
|
287
739
|
slasherClient,
|
|
288
|
-
|
|
740
|
+
checkpointsBuilder,
|
|
289
741
|
l2BlockSource: archiver,
|
|
290
742
|
l1ToL2MessageSource: archiver,
|
|
291
743
|
telemetry,
|
|
292
744
|
dateProvider,
|
|
293
|
-
|
|
745
|
+
blobClient,
|
|
294
746
|
nodeKeyStore: keyStoreManager
|
|
295
747
|
});
|
|
296
748
|
}
|
|
@@ -300,7 +752,35 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
300
752
|
} else if (sequencer) {
|
|
301
753
|
log.warn(`Sequencer created but not started`);
|
|
302
754
|
}
|
|
303
|
-
|
|
755
|
+
// Create prover node subsystem if enabled
|
|
756
|
+
let proverNode;
|
|
757
|
+
if (config.enableProverNode) {
|
|
758
|
+
proverNode = await createProverNode(config, {
|
|
759
|
+
...deps.proverNodeDeps,
|
|
760
|
+
telemetry,
|
|
761
|
+
dateProvider,
|
|
762
|
+
archiver,
|
|
763
|
+
worldStateSynchronizer,
|
|
764
|
+
p2pClient,
|
|
765
|
+
epochCache,
|
|
766
|
+
blobClient,
|
|
767
|
+
keyStoreManager
|
|
768
|
+
});
|
|
769
|
+
if (!options.dontStartProverNode) {
|
|
770
|
+
await proverNode.start();
|
|
771
|
+
log.info(`Prover node subsystem started`);
|
|
772
|
+
} else {
|
|
773
|
+
log.info(`Prover node subsystem created but not started`);
|
|
774
|
+
}
|
|
775
|
+
}
|
|
776
|
+
const globalVariableBuilder = new GlobalVariableBuilder({
|
|
777
|
+
...config,
|
|
778
|
+
rollupVersion: BigInt(config.rollupVersion),
|
|
779
|
+
l1GenesisTime,
|
|
780
|
+
slotDuration: Number(slotDuration)
|
|
781
|
+
});
|
|
782
|
+
const node = new AztecNodeService(config, p2pClient, archiver, archiver, archiver, archiver, worldStateSynchronizer, sequencer, proverNode, slasherClient, validatorsSentinel, epochPruneWatcher, ethereumChain.chainInfo.id, config.rollupVersion, globalVariableBuilder, epochCache, packageVersion, proofVerifier, telemetry, log, blobClient, validatorClient, keyStoreManager, debugLogStore);
|
|
783
|
+
return node;
|
|
304
784
|
}
|
|
305
785
|
/**
|
|
306
786
|
* Returns the sequencer client instance.
|
|
@@ -308,6 +788,9 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
308
788
|
*/ getSequencer() {
|
|
309
789
|
return this.sequencer;
|
|
310
790
|
}
|
|
791
|
+
/** Returns the prover node subsystem, if enabled. */ getProverNode() {
|
|
792
|
+
return this.proverNode;
|
|
793
|
+
}
|
|
311
794
|
getBlockSource() {
|
|
312
795
|
return this.blockSource;
|
|
313
796
|
}
|
|
@@ -327,7 +810,10 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
327
810
|
return Promise.resolve(this.p2pClient.getEnr()?.encodeTxt());
|
|
328
811
|
}
|
|
329
812
|
async getAllowedPublicSetup() {
|
|
330
|
-
return
|
|
813
|
+
return [
|
|
814
|
+
...await getDefaultAllowedSetupFunctions(),
|
|
815
|
+
...this.config.txPublicSetupAllowListExtend ?? []
|
|
816
|
+
];
|
|
331
817
|
}
|
|
332
818
|
/**
|
|
333
819
|
* Method to determine if the node is ready to accept transactions.
|
|
@@ -350,33 +836,46 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
350
836
|
rollupVersion,
|
|
351
837
|
enr,
|
|
352
838
|
l1ContractAddresses: contractAddresses,
|
|
353
|
-
protocolContractAddresses: protocolContractAddresses
|
|
839
|
+
protocolContractAddresses: protocolContractAddresses,
|
|
840
|
+
realProofs: !!this.config.realProofs
|
|
354
841
|
};
|
|
355
842
|
return nodeInfo;
|
|
356
843
|
}
|
|
357
844
|
/**
|
|
358
|
-
* Get a block specified by its number.
|
|
359
|
-
* @param
|
|
845
|
+
* Get a block specified by its block number, block hash, or 'latest'.
|
|
846
|
+
* @param block - The block parameter (block number, block hash, or 'latest').
|
|
360
847
|
* @returns The requested block.
|
|
361
|
-
*/ async getBlock(
|
|
362
|
-
|
|
363
|
-
|
|
848
|
+
*/ async getBlock(block) {
|
|
849
|
+
if (BlockHash.isBlockHash(block)) {
|
|
850
|
+
return this.getBlockByHash(block);
|
|
851
|
+
}
|
|
852
|
+
const blockNumber = block === 'latest' ? await this.getBlockNumber() : block;
|
|
853
|
+
if (blockNumber === BlockNumber.ZERO) {
|
|
854
|
+
return this.buildInitialBlock();
|
|
855
|
+
}
|
|
856
|
+
return await this.blockSource.getL2Block(blockNumber);
|
|
364
857
|
}
|
|
365
858
|
/**
|
|
366
859
|
* Get a block specified by its hash.
|
|
367
860
|
* @param blockHash - The block hash being requested.
|
|
368
861
|
* @returns The requested block.
|
|
369
862
|
*/ async getBlockByHash(blockHash) {
|
|
370
|
-
const
|
|
371
|
-
|
|
863
|
+
const initialBlockHash = await this.#getInitialHeaderHash();
|
|
864
|
+
if (blockHash.equals(initialBlockHash)) {
|
|
865
|
+
return this.buildInitialBlock();
|
|
866
|
+
}
|
|
867
|
+
return await this.blockSource.getL2BlockByHash(blockHash);
|
|
868
|
+
}
|
|
869
|
+
buildInitialBlock() {
|
|
870
|
+
const initialHeader = this.worldStateSynchronizer.getCommitted().getInitialHeader();
|
|
871
|
+
return L2Block.empty(initialHeader);
|
|
372
872
|
}
|
|
373
873
|
/**
|
|
374
874
|
* Get a block specified by its archive root.
|
|
375
875
|
* @param archive - The archive root being requested.
|
|
376
876
|
* @returns The requested block.
|
|
377
877
|
*/ async getBlockByArchive(archive) {
|
|
378
|
-
|
|
379
|
-
return publishedBlock?.block;
|
|
878
|
+
return await this.blockSource.getL2BlockByArchive(archive);
|
|
380
879
|
}
|
|
381
880
|
/**
|
|
382
881
|
* Method to request blocks. Will attempt to return all requested blocks but will return only those available.
|
|
@@ -384,16 +883,28 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
384
883
|
* @param limit - The maximum number of blocks to obtain.
|
|
385
884
|
* @returns The blocks requested.
|
|
386
885
|
*/ async getBlocks(from, limit) {
|
|
387
|
-
return await this.blockSource.getBlocks(from, limit) ?? [];
|
|
886
|
+
return await this.blockSource.getBlocks(from, BlockNumber(limit)) ?? [];
|
|
388
887
|
}
|
|
389
|
-
async
|
|
390
|
-
return await this.blockSource.
|
|
888
|
+
async getCheckpoints(from, limit) {
|
|
889
|
+
return await this.blockSource.getCheckpoints(from, limit) ?? [];
|
|
890
|
+
}
|
|
891
|
+
async getCheckpointedBlocks(from, limit) {
|
|
892
|
+
return await this.blockSource.getCheckpointedBlocks(from, limit) ?? [];
|
|
391
893
|
}
|
|
392
894
|
/**
|
|
393
|
-
* Method to fetch the current
|
|
394
|
-
* @returns The current
|
|
395
|
-
*/ async
|
|
396
|
-
return await this.globalVariableBuilder.
|
|
895
|
+
* Method to fetch the current min L2 fees.
|
|
896
|
+
* @returns The current min L2 fees.
|
|
897
|
+
*/ async getCurrentMinFees() {
|
|
898
|
+
return await this.globalVariableBuilder.getCurrentMinFees();
|
|
899
|
+
}
|
|
900
|
+
async getMaxPriorityFees() {
|
|
901
|
+
for await (const tx of this.p2pClient.iteratePendingTxs()){
|
|
902
|
+
return tx.getGasSettings().maxPriorityFeesPerGas;
|
|
903
|
+
}
|
|
904
|
+
return GasFees.from({
|
|
905
|
+
feePerDaGas: 0n,
|
|
906
|
+
feePerL2Gas: 0n
|
|
907
|
+
});
|
|
397
908
|
}
|
|
398
909
|
/**
|
|
399
910
|
* Method to fetch the latest block number synchronized by the node.
|
|
@@ -404,6 +915,12 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
404
915
|
async getProvenBlockNumber() {
|
|
405
916
|
return await this.blockSource.getProvenBlockNumber();
|
|
406
917
|
}
|
|
918
|
+
async getCheckpointedBlockNumber() {
|
|
919
|
+
return await this.blockSource.getCheckpointedL2BlockNumber();
|
|
920
|
+
}
|
|
921
|
+
getCheckpointNumber() {
|
|
922
|
+
return this.blockSource.getCheckpointNumber();
|
|
923
|
+
}
|
|
407
924
|
/**
|
|
408
925
|
* Method to fetch the version of the package.
|
|
409
926
|
* @returns The node package version
|
|
@@ -428,22 +945,29 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
428
945
|
getContract(address) {
|
|
429
946
|
return this.contractDataSource.getContract(address);
|
|
430
947
|
}
|
|
431
|
-
|
|
432
|
-
|
|
433
|
-
|
|
434
|
-
|
|
435
|
-
|
|
436
|
-
|
|
437
|
-
|
|
438
|
-
|
|
439
|
-
|
|
440
|
-
|
|
441
|
-
|
|
442
|
-
|
|
443
|
-
|
|
444
|
-
|
|
445
|
-
|
|
446
|
-
|
|
948
|
+
async getPrivateLogsByTags(tags, page, referenceBlock) {
|
|
949
|
+
if (referenceBlock) {
|
|
950
|
+
const initialBlockHash = await this.#getInitialHeaderHash();
|
|
951
|
+
if (!referenceBlock.equals(initialBlockHash)) {
|
|
952
|
+
const header = await this.blockSource.getBlockHeaderByHash(referenceBlock);
|
|
953
|
+
if (!header) {
|
|
954
|
+
throw new Error(`Block ${referenceBlock.toString()} not found in the node. This might indicate a reorg has occurred.`);
|
|
955
|
+
}
|
|
956
|
+
}
|
|
957
|
+
}
|
|
958
|
+
return this.logsSource.getPrivateLogsByTags(tags, page);
|
|
959
|
+
}
|
|
960
|
+
async getPublicLogsByTagsFromContract(contractAddress, tags, page, referenceBlock) {
|
|
961
|
+
if (referenceBlock) {
|
|
962
|
+
const initialBlockHash = await this.#getInitialHeaderHash();
|
|
963
|
+
if (!referenceBlock.equals(initialBlockHash)) {
|
|
964
|
+
const header = await this.blockSource.getBlockHeaderByHash(referenceBlock);
|
|
965
|
+
if (!header) {
|
|
966
|
+
throw new Error(`Block ${referenceBlock.toString()} not found in the node. This might indicate a reorg has occurred.`);
|
|
967
|
+
}
|
|
968
|
+
}
|
|
969
|
+
}
|
|
970
|
+
return this.logsSource.getPublicLogsByTagsFromContract(contractAddress, tags, page);
|
|
447
971
|
}
|
|
448
972
|
/**
|
|
449
973
|
* Gets public logs based on the provided filter.
|
|
@@ -478,24 +1002,33 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
478
1002
|
throw new Error(`Invalid tx: ${reason}`);
|
|
479
1003
|
}
|
|
480
1004
|
await this.p2pClient.sendTx(tx);
|
|
481
|
-
|
|
482
|
-
this.
|
|
1005
|
+
const duration = timer.ms();
|
|
1006
|
+
this.metrics.receivedTx(duration, true);
|
|
1007
|
+
this.log.info(`Received tx ${txHash} in ${duration}ms`, {
|
|
483
1008
|
txHash
|
|
484
1009
|
});
|
|
485
1010
|
}
|
|
486
1011
|
async getTxReceipt(txHash) {
|
|
487
|
-
|
|
488
|
-
//
|
|
489
|
-
|
|
490
|
-
|
|
491
|
-
|
|
492
|
-
txReceipt = new TxReceipt(txHash, TxStatus.PENDING, '');
|
|
493
|
-
}
|
|
1012
|
+
// Check the tx pool status first. If the tx is known to the pool (pending or mined), we'll use that
|
|
1013
|
+
// as a fallback if we don't find a settled receipt in the archiver.
|
|
1014
|
+
const txPoolStatus = await this.p2pClient.getTxStatus(txHash);
|
|
1015
|
+
const isKnownToPool = txPoolStatus === 'pending' || txPoolStatus === 'mined';
|
|
1016
|
+
// Then get the actual tx from the archiver, which tracks every tx in a mined block.
|
|
494
1017
|
const settledTxReceipt = await this.blockSource.getSettledTxReceipt(txHash);
|
|
1018
|
+
let receipt;
|
|
495
1019
|
if (settledTxReceipt) {
|
|
496
|
-
|
|
1020
|
+
receipt = settledTxReceipt;
|
|
1021
|
+
} else if (isKnownToPool) {
|
|
1022
|
+
// If the tx is in the pool but not in the archiver, it's pending.
|
|
1023
|
+
// This handles race conditions between archiver and p2p, where the archiver
|
|
1024
|
+
// has pruned the block in which a tx was mined, but p2p has not caught up yet.
|
|
1025
|
+
receipt = new TxReceipt(txHash, TxStatus.PENDING, undefined, undefined);
|
|
1026
|
+
} else {
|
|
1027
|
+
// Otherwise, if we don't know the tx, we consider it dropped.
|
|
1028
|
+
receipt = new TxReceipt(txHash, TxStatus.DROPPED, undefined, 'Tx dropped by P2P node');
|
|
497
1029
|
}
|
|
498
|
-
|
|
1030
|
+
this.debugLogStore.decorateReceiptWithLogs(txHash.toString(), receipt);
|
|
1031
|
+
return receipt;
|
|
499
1032
|
}
|
|
500
1033
|
getTxEffect(txHash) {
|
|
501
1034
|
return this.blockSource.getTxEffect(txHash);
|
|
@@ -509,13 +1042,21 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
509
1042
|
await tryStop(this.slasherClient);
|
|
510
1043
|
await tryStop(this.proofVerifier);
|
|
511
1044
|
await tryStop(this.sequencer);
|
|
1045
|
+
await tryStop(this.proverNode);
|
|
512
1046
|
await tryStop(this.p2pClient);
|
|
513
1047
|
await tryStop(this.worldStateSynchronizer);
|
|
514
1048
|
await tryStop(this.blockSource);
|
|
1049
|
+
await tryStop(this.blobClient);
|
|
515
1050
|
await tryStop(this.telemetry);
|
|
516
1051
|
this.log.info(`Stopped Aztec Node`);
|
|
517
1052
|
}
|
|
518
1053
|
/**
|
|
1054
|
+
* Returns the blob client used by this node.
|
|
1055
|
+
* @internal - Exposed for testing purposes only.
|
|
1056
|
+
*/ getBlobClient() {
|
|
1057
|
+
return this.blobClient;
|
|
1058
|
+
}
|
|
1059
|
+
/**
|
|
519
1060
|
* Method to retrieve pending txs.
|
|
520
1061
|
* @param limit - The number of items to returns
|
|
521
1062
|
* @param after - The last known pending tx. Used for pagination
|
|
@@ -540,15 +1081,8 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
540
1081
|
*/ async getTxsByHash(txHashes) {
|
|
541
1082
|
return compactArray(await Promise.all(txHashes.map((txHash)=>this.getTxByHash(txHash))));
|
|
542
1083
|
}
|
|
543
|
-
|
|
544
|
-
|
|
545
|
-
* the leaves were inserted.
|
|
546
|
-
* @param blockNumber - The block number at which to get the data or 'latest' for latest data.
|
|
547
|
-
* @param treeId - The tree to search in.
|
|
548
|
-
* @param leafValues - The values to search for.
|
|
549
|
-
* @returns The indices of leaves and the block metadata of a block in which the leaves were inserted.
|
|
550
|
-
*/ async findLeavesIndexes(blockNumber, treeId, leafValues) {
|
|
551
|
-
const committedDb = await this.#getWorldState(blockNumber);
|
|
1084
|
+
async findLeavesIndexes(referenceBlock, treeId, leafValues) {
|
|
1085
|
+
const committedDb = await this.#getWorldState(referenceBlock);
|
|
552
1086
|
const maybeIndices = await committedDb.findLeafIndices(treeId, leafValues.map((x)=>x.toBuffer()));
|
|
553
1087
|
// We filter out undefined values
|
|
554
1088
|
const indices = maybeIndices.filter((x)=>x !== undefined);
|
|
@@ -567,7 +1101,7 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
567
1101
|
// Now we obtain the block hashes from the archive tree by calling await `committedDb.getLeafValue(treeId, index)`
|
|
568
1102
|
// (note that block number corresponds to the leaf index in the archive tree).
|
|
569
1103
|
const blockHashes = await Promise.all(uniqueBlockNumbers.map((blockNumber)=>{
|
|
570
|
-
return committedDb.getLeafValue(MerkleTreeId.ARCHIVE, blockNumber);
|
|
1104
|
+
return committedDb.getLeafValue(MerkleTreeId.ARCHIVE, BigInt(blockNumber));
|
|
571
1105
|
}));
|
|
572
1106
|
// If any of the block hashes are undefined, we throw an error.
|
|
573
1107
|
for(let i = 0; i < uniqueBlockNumbers.length; i++){
|
|
@@ -575,7 +1109,7 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
575
1109
|
throw new Error(`Block hash is undefined for block number ${uniqueBlockNumbers[i]}`);
|
|
576
1110
|
}
|
|
577
1111
|
}
|
|
578
|
-
// Create
|
|
1112
|
+
// Create DataInBlock objects by combining indices, blockNumbers and blockHashes and return them.
|
|
579
1113
|
return maybeIndices.map((index, i)=>{
|
|
580
1114
|
if (index === undefined) {
|
|
581
1115
|
return undefined;
|
|
@@ -590,51 +1124,28 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
590
1124
|
return undefined;
|
|
591
1125
|
}
|
|
592
1126
|
return {
|
|
593
|
-
l2BlockNumber: Number(blockNumber),
|
|
594
|
-
l2BlockHash:
|
|
1127
|
+
l2BlockNumber: BlockNumber(Number(blockNumber)),
|
|
1128
|
+
l2BlockHash: new BlockHash(blockHash),
|
|
595
1129
|
data: index
|
|
596
1130
|
};
|
|
597
1131
|
});
|
|
598
1132
|
}
|
|
599
|
-
|
|
600
|
-
|
|
601
|
-
* @param blockNumber - The block number at which to get the data.
|
|
602
|
-
* @param leafIndex - The index of the leaf for which the sibling path is required.
|
|
603
|
-
* @returns The sibling path for the leaf index.
|
|
604
|
-
*/ async getNullifierSiblingPath(blockNumber, leafIndex) {
|
|
605
|
-
const committedDb = await this.#getWorldState(blockNumber);
|
|
606
|
-
return committedDb.getSiblingPath(MerkleTreeId.NULLIFIER_TREE, leafIndex);
|
|
607
|
-
}
|
|
608
|
-
/**
|
|
609
|
-
* Returns a sibling path for the given index in the data tree.
|
|
610
|
-
* @param blockNumber - The block number at which to get the data.
|
|
611
|
-
* @param leafIndex - The index of the leaf for which the sibling path is required.
|
|
612
|
-
* @returns The sibling path for the leaf index.
|
|
613
|
-
*/ async getNoteHashSiblingPath(blockNumber, leafIndex) {
|
|
614
|
-
const committedDb = await this.#getWorldState(blockNumber);
|
|
615
|
-
return committedDb.getSiblingPath(MerkleTreeId.NOTE_HASH_TREE, leafIndex);
|
|
616
|
-
}
|
|
617
|
-
async getArchiveMembershipWitness(blockNumber, archive) {
|
|
618
|
-
const committedDb = await this.#getWorldState(blockNumber);
|
|
1133
|
+
async getBlockHashMembershipWitness(referenceBlock, blockHash) {
|
|
1134
|
+
const committedDb = await this.#getWorldState(referenceBlock);
|
|
619
1135
|
const [pathAndIndex] = await committedDb.findSiblingPaths(MerkleTreeId.ARCHIVE, [
|
|
620
|
-
|
|
1136
|
+
blockHash
|
|
621
1137
|
]);
|
|
622
1138
|
return pathAndIndex === undefined ? undefined : MembershipWitness.fromSiblingPath(pathAndIndex.index, pathAndIndex.path);
|
|
623
1139
|
}
|
|
624
|
-
async getNoteHashMembershipWitness(
|
|
625
|
-
const committedDb = await this.#getWorldState(
|
|
1140
|
+
async getNoteHashMembershipWitness(referenceBlock, noteHash) {
|
|
1141
|
+
const committedDb = await this.#getWorldState(referenceBlock);
|
|
626
1142
|
const [pathAndIndex] = await committedDb.findSiblingPaths(MerkleTreeId.NOTE_HASH_TREE, [
|
|
627
1143
|
noteHash
|
|
628
1144
|
]);
|
|
629
1145
|
return pathAndIndex === undefined ? undefined : MembershipWitness.fromSiblingPath(pathAndIndex.index, pathAndIndex.path);
|
|
630
1146
|
}
|
|
631
|
-
|
|
632
|
-
|
|
633
|
-
* @param blockNumber - The block number at which to get the data.
|
|
634
|
-
* @param l1ToL2Message - The l1ToL2Message to get the index / sibling path for.
|
|
635
|
-
* @returns A tuple of the index and the sibling path of the L1ToL2Message (undefined if not found).
|
|
636
|
-
*/ async getL1ToL2MessageMembershipWitness(blockNumber, l1ToL2Message) {
|
|
637
|
-
const db = await this.#getWorldState(blockNumber);
|
|
1147
|
+
async getL1ToL2MessageMembershipWitness(referenceBlock, l1ToL2Message) {
|
|
1148
|
+
const db = await this.#getWorldState(referenceBlock);
|
|
638
1149
|
const [witness] = await db.findSiblingPaths(MerkleTreeId.L1_TO_L2_MESSAGE_TREE, [
|
|
639
1150
|
l1ToL2Message
|
|
640
1151
|
]);
|
|
@@ -647,9 +1158,9 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
647
1158
|
witness.path
|
|
648
1159
|
];
|
|
649
1160
|
}
|
|
650
|
-
async
|
|
1161
|
+
async getL1ToL2MessageCheckpoint(l1ToL2Message) {
|
|
651
1162
|
const messageIndex = await this.l1ToL2MessageSource.getL1ToL2MessageIndex(l1ToL2Message);
|
|
652
|
-
return messageIndex ? InboxLeaf.
|
|
1163
|
+
return messageIndex ? InboxLeaf.checkpointNumberFromIndex(messageIndex) : undefined;
|
|
653
1164
|
}
|
|
654
1165
|
/**
|
|
655
1166
|
* Returns whether an L1 to L2 message is synced by archiver and if it's ready to be included in a block.
|
|
@@ -660,38 +1171,29 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
660
1171
|
return messageIndex !== undefined;
|
|
661
1172
|
}
|
|
662
1173
|
/**
|
|
663
|
-
* Returns all the L2 to L1 messages in
|
|
664
|
-
* @param
|
|
665
|
-
* @returns The L2 to L1 messages (
|
|
666
|
-
*/ async getL2ToL1Messages(
|
|
667
|
-
|
|
668
|
-
|
|
669
|
-
|
|
670
|
-
|
|
671
|
-
|
|
672
|
-
|
|
673
|
-
|
|
674
|
-
|
|
675
|
-
|
|
676
|
-
|
|
677
|
-
|
|
678
|
-
|
|
679
|
-
|
|
680
|
-
|
|
681
|
-
|
|
682
|
-
|
|
683
|
-
* @returns The sibling path.
|
|
684
|
-
*/ async getPublicDataSiblingPath(blockNumber, leafIndex) {
|
|
685
|
-
const committedDb = await this.#getWorldState(blockNumber);
|
|
686
|
-
return committedDb.getSiblingPath(MerkleTreeId.PUBLIC_DATA_TREE, leafIndex);
|
|
1174
|
+
* Returns all the L2 to L1 messages in an epoch.
|
|
1175
|
+
* @param epoch - The epoch at which to get the data.
|
|
1176
|
+
* @returns The L2 to L1 messages (empty array if the epoch is not found).
|
|
1177
|
+
*/ async getL2ToL1Messages(epoch) {
|
|
1178
|
+
// Assumes `getCheckpointedBlocksForEpoch` returns blocks in ascending order of block number.
|
|
1179
|
+
const checkpointedBlocks = await this.blockSource.getCheckpointedBlocksForEpoch(epoch);
|
|
1180
|
+
const blocksInCheckpoints = [];
|
|
1181
|
+
let previousSlotNumber = SlotNumber.ZERO;
|
|
1182
|
+
let checkpointIndex = -1;
|
|
1183
|
+
for (const checkpointedBlock of checkpointedBlocks){
|
|
1184
|
+
const block = checkpointedBlock.block;
|
|
1185
|
+
const slotNumber = block.header.globalVariables.slotNumber;
|
|
1186
|
+
if (slotNumber !== previousSlotNumber) {
|
|
1187
|
+
checkpointIndex++;
|
|
1188
|
+
blocksInCheckpoints.push([]);
|
|
1189
|
+
previousSlotNumber = slotNumber;
|
|
1190
|
+
}
|
|
1191
|
+
blocksInCheckpoints[checkpointIndex].push(block);
|
|
1192
|
+
}
|
|
1193
|
+
return blocksInCheckpoints.map((blocks)=>blocks.map((block)=>block.body.txEffects.map((txEffect)=>txEffect.l2ToL1Msgs)));
|
|
687
1194
|
}
|
|
688
|
-
|
|
689
|
-
|
|
690
|
-
* @param blockNumber - The block number at which to get the index.
|
|
691
|
-
* @param nullifier - Nullifier we try to find witness for.
|
|
692
|
-
* @returns The nullifier membership witness (if found).
|
|
693
|
-
*/ async getNullifierMembershipWitness(blockNumber, nullifier) {
|
|
694
|
-
const db = await this.#getWorldState(blockNumber);
|
|
1195
|
+
async getNullifierMembershipWitness(referenceBlock, nullifier) {
|
|
1196
|
+
const db = await this.#getWorldState(referenceBlock);
|
|
695
1197
|
const [witness] = await db.findSiblingPaths(MerkleTreeId.NULLIFIER_TREE, [
|
|
696
1198
|
nullifier.toBuffer()
|
|
697
1199
|
]);
|
|
@@ -707,7 +1209,8 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
707
1209
|
}
|
|
708
1210
|
/**
|
|
709
1211
|
* Returns a low nullifier membership witness for a given nullifier at a given block.
|
|
710
|
-
* @param
|
|
1212
|
+
* @param referenceBlock - The block parameter (block number, block hash, or 'latest') at which to get the data
|
|
1213
|
+
* (which contains the root of the nullifier tree in which we are searching for the nullifier).
|
|
711
1214
|
* @param nullifier - Nullifier we try to find the low nullifier witness for.
|
|
712
1215
|
* @returns The low nullifier membership witness (if found).
|
|
713
1216
|
* @remarks Low nullifier witness can be used to perform a nullifier non-inclusion proof by leveraging the "linked
|
|
@@ -718,8 +1221,8 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
718
1221
|
* the nullifier already exists in the tree. This is because the `getPreviousValueIndex` function returns the
|
|
719
1222
|
* index of the nullifier itself when it already exists in the tree.
|
|
720
1223
|
* TODO: This is a confusing behavior and we should eventually address that.
|
|
721
|
-
*/ async getLowNullifierMembershipWitness(
|
|
722
|
-
const committedDb = await this.#getWorldState(
|
|
1224
|
+
*/ async getLowNullifierMembershipWitness(referenceBlock, nullifier) {
|
|
1225
|
+
const committedDb = await this.#getWorldState(referenceBlock);
|
|
723
1226
|
const findResult = await committedDb.getPreviousValueIndex(MerkleTreeId.NULLIFIER_TREE, nullifier.toBigInt());
|
|
724
1227
|
if (!findResult) {
|
|
725
1228
|
return undefined;
|
|
@@ -732,8 +1235,8 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
732
1235
|
const siblingPath = await committedDb.getSiblingPath(MerkleTreeId.NULLIFIER_TREE, BigInt(index));
|
|
733
1236
|
return new NullifierMembershipWitness(BigInt(index), preimageData, siblingPath);
|
|
734
1237
|
}
|
|
735
|
-
async getPublicDataWitness(
|
|
736
|
-
const committedDb = await this.#getWorldState(
|
|
1238
|
+
async getPublicDataWitness(referenceBlock, leafSlot) {
|
|
1239
|
+
const committedDb = await this.#getWorldState(referenceBlock);
|
|
737
1240
|
const lowLeafResult = await committedDb.getPreviousValueIndex(MerkleTreeId.PUBLIC_DATA_TREE, leafSlot.toBigInt());
|
|
738
1241
|
if (!lowLeafResult) {
|
|
739
1242
|
return undefined;
|
|
@@ -743,18 +1246,8 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
743
1246
|
return new PublicDataWitness(lowLeafResult.index, preimage, path);
|
|
744
1247
|
}
|
|
745
1248
|
}
|
|
746
|
-
|
|
747
|
-
|
|
748
|
-
*
|
|
749
|
-
* @remarks The storage slot here refers to the slot as it is defined in Noir not the index in the merkle tree.
|
|
750
|
-
* Aztec's version of `eth_getStorageAt`.
|
|
751
|
-
*
|
|
752
|
-
* @param contract - Address of the contract to query.
|
|
753
|
-
* @param slot - Slot to query.
|
|
754
|
-
* @param blockNumber - The block number at which to get the data or 'latest'.
|
|
755
|
-
* @returns Storage value at the given contract slot.
|
|
756
|
-
*/ async getPublicStorageAt(blockNumber, contract, slot) {
|
|
757
|
-
const committedDb = await this.#getWorldState(blockNumber);
|
|
1249
|
+
async getPublicStorageAt(referenceBlock, contract, slot) {
|
|
1250
|
+
const committedDb = await this.#getWorldState(referenceBlock);
|
|
758
1251
|
const leafSlot = await computePublicDataTreeLeafSlot(contract, slot);
|
|
759
1252
|
const lowLeafResult = await committedDb.getPreviousValueIndex(MerkleTreeId.PUBLIC_DATA_TREE, leafSlot.toBigInt());
|
|
760
1253
|
if (!lowLeafResult || !lowLeafResult.alreadyPresent) {
|
|
@@ -763,18 +1256,22 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
763
1256
|
const preimage = await committedDb.getLeafPreimage(MerkleTreeId.PUBLIC_DATA_TREE, lowLeafResult.index);
|
|
764
1257
|
return preimage.leaf.value;
|
|
765
1258
|
}
|
|
766
|
-
|
|
767
|
-
|
|
768
|
-
|
|
769
|
-
|
|
770
|
-
|
|
771
|
-
|
|
772
|
-
|
|
773
|
-
|
|
774
|
-
|
|
775
|
-
|
|
776
|
-
|
|
777
|
-
|
|
1259
|
+
async getBlockHeader(block = 'latest') {
|
|
1260
|
+
if (BlockHash.isBlockHash(block)) {
|
|
1261
|
+
const initialBlockHash = await this.#getInitialHeaderHash();
|
|
1262
|
+
if (block.equals(initialBlockHash)) {
|
|
1263
|
+
// Block source doesn't handle initial header so we need to handle the case separately.
|
|
1264
|
+
return this.worldStateSynchronizer.getCommitted().getInitialHeader();
|
|
1265
|
+
}
|
|
1266
|
+
return this.blockSource.getBlockHeaderByHash(block);
|
|
1267
|
+
} else {
|
|
1268
|
+
// Block source doesn't handle initial header so we need to handle the case separately.
|
|
1269
|
+
const blockNumber = block === 'latest' ? await this.getBlockNumber() : block;
|
|
1270
|
+
if (blockNumber === BlockNumber.ZERO) {
|
|
1271
|
+
return this.worldStateSynchronizer.getCommitted().getInitialHeader();
|
|
1272
|
+
}
|
|
1273
|
+
return this.blockSource.getBlockHeader(block);
|
|
1274
|
+
}
|
|
778
1275
|
}
|
|
779
1276
|
/**
|
|
780
1277
|
* Get a block header specified by its archive root.
|
|
@@ -783,6 +1280,12 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
783
1280
|
*/ async getBlockHeaderByArchive(archive) {
|
|
784
1281
|
return await this.blockSource.getBlockHeaderByArchive(archive);
|
|
785
1282
|
}
|
|
1283
|
+
getBlockData(number) {
|
|
1284
|
+
return this.blockSource.getBlockData(number);
|
|
1285
|
+
}
|
|
1286
|
+
getBlockDataByArchive(archive) {
|
|
1287
|
+
return this.blockSource.getBlockDataByArchive(archive);
|
|
1288
|
+
}
|
|
786
1289
|
/**
|
|
787
1290
|
* Simulates the public part of a transaction with the current state.
|
|
788
1291
|
* @param tx - The transaction to simulate.
|
|
@@ -795,17 +1298,20 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
795
1298
|
throw new BadRequestError(`Transaction total gas limit ${txGasLimit + teardownGasLimit} (${txGasLimit} + ${teardownGasLimit}) exceeds maximum gas limit ${this.config.rpcSimulatePublicMaxGasLimit} for simulation`);
|
|
796
1299
|
}
|
|
797
1300
|
const txHash = tx.getTxHash();
|
|
798
|
-
const
|
|
1301
|
+
const latestBlockNumber = await this.blockSource.getBlockNumber();
|
|
1302
|
+
const blockNumber = BlockNumber.add(latestBlockNumber, 1);
|
|
799
1303
|
// If sequencer is not initialized, we just set these values to zero for simulation.
|
|
800
1304
|
const coinbase = EthAddress.ZERO;
|
|
801
1305
|
const feeRecipient = AztecAddress.ZERO;
|
|
802
1306
|
const newGlobalVariables = await this.globalVariableBuilder.buildGlobalVariables(blockNumber, coinbase, feeRecipient);
|
|
803
|
-
const publicProcessorFactory = new PublicProcessorFactory(this.contractDataSource, new DateProvider(), this.telemetry);
|
|
1307
|
+
const publicProcessorFactory = new PublicProcessorFactory(this.contractDataSource, new DateProvider(), this.telemetry, this.log.getBindings());
|
|
804
1308
|
this.log.verbose(`Simulating public calls for tx ${txHash}`, {
|
|
805
1309
|
globalVariables: newGlobalVariables.toInspect(),
|
|
806
1310
|
txHash,
|
|
807
1311
|
blockNumber
|
|
808
1312
|
});
|
|
1313
|
+
// Ensure world-state has caught up with the latest block we loaded from the archiver
|
|
1314
|
+
await this.worldStateSynchronizer.syncImmediate(latestBlockNumber);
|
|
809
1315
|
const merkleTreeFork = await this.worldStateSynchronizer.fork();
|
|
810
1316
|
try {
|
|
811
1317
|
const config = PublicSimulatorConfig.from({
|
|
@@ -813,12 +1319,14 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
813
1319
|
collectDebugLogs: true,
|
|
814
1320
|
collectHints: false,
|
|
815
1321
|
collectCallMetadata: true,
|
|
816
|
-
|
|
817
|
-
|
|
1322
|
+
collectStatistics: false,
|
|
1323
|
+
collectionLimits: CollectionLimitsConfig.from({
|
|
1324
|
+
maxDebugLogMemoryReads: this.config.rpcSimulatePublicMaxDebugLogMemoryReads
|
|
1325
|
+
})
|
|
818
1326
|
});
|
|
819
1327
|
const processor = publicProcessorFactory.create(merkleTreeFork, newGlobalVariables, config);
|
|
820
1328
|
// REFACTOR: Consider merging ProcessReturnValues into ProcessedTx
|
|
821
|
-
const [processedTxs, failedTxs, _usedTxs, returns] = await processor.process([
|
|
1329
|
+
const [processedTxs, failedTxs, _usedTxs, returns, debugLogs] = await processor.process([
|
|
822
1330
|
tx
|
|
823
1331
|
]);
|
|
824
1332
|
// REFACTOR: Consider returning the error rather than throwing
|
|
@@ -829,7 +1337,7 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
829
1337
|
throw failedTxs[0].error;
|
|
830
1338
|
}
|
|
831
1339
|
const [processedTx] = processedTxs;
|
|
832
|
-
return new PublicSimulationOutput(processedTx.revertReason, processedTx.globalVariables, processedTx.txEffect, returns, processedTx.gasUsed);
|
|
1340
|
+
return new PublicSimulationOutput(processedTx.revertReason, processedTx.globalVariables, processedTx.txEffect, returns, processedTx.gasUsed, debugLogs);
|
|
833
1341
|
} finally{
|
|
834
1342
|
await merkleTreeFork.close();
|
|
835
1343
|
}
|
|
@@ -837,19 +1345,22 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
837
1345
|
async isValidTx(tx, { isSimulation, skipFeeEnforcement } = {}) {
|
|
838
1346
|
const db = this.worldStateSynchronizer.getCommitted();
|
|
839
1347
|
const verifier = isSimulation ? undefined : this.proofVerifier;
|
|
840
|
-
// We accept transactions if they are not expired by the next slot (checked based on the
|
|
1348
|
+
// We accept transactions if they are not expired by the next slot (checked based on the ExpirationTimestamp field)
|
|
841
1349
|
const { ts: nextSlotTimestamp } = this.epochCache.getEpochAndSlotInNextL1Slot();
|
|
842
|
-
const blockNumber = await this.blockSource.getBlockNumber() + 1;
|
|
843
|
-
const validator =
|
|
1350
|
+
const blockNumber = BlockNumber(await this.blockSource.getBlockNumber() + 1);
|
|
1351
|
+
const validator = createTxValidatorForAcceptingTxsOverRPC(db, this.contractDataSource, verifier, {
|
|
844
1352
|
timestamp: nextSlotTimestamp,
|
|
845
1353
|
blockNumber,
|
|
846
1354
|
l1ChainId: this.l1ChainId,
|
|
847
1355
|
rollupVersion: this.version,
|
|
848
|
-
setupAllowList:
|
|
849
|
-
|
|
1356
|
+
setupAllowList: [
|
|
1357
|
+
...await getDefaultAllowedSetupFunctions(),
|
|
1358
|
+
...this.config.txPublicSetupAllowListExtend ?? []
|
|
1359
|
+
],
|
|
1360
|
+
gasFees: await this.getCurrentMinFees(),
|
|
850
1361
|
skipFeeEnforcement,
|
|
851
1362
|
txsPermitted: !this.config.disableTransactions
|
|
852
|
-
});
|
|
1363
|
+
}, this.log.getBindings());
|
|
853
1364
|
return await validator.validateTx(tx);
|
|
854
1365
|
}
|
|
855
1366
|
getConfig() {
|
|
@@ -909,7 +1420,7 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
909
1420
|
throw new Error(`Archiver initial sync not complete. Cannot start snapshot.`);
|
|
910
1421
|
}
|
|
911
1422
|
// And it has an L2 block hash
|
|
912
|
-
const l2BlockHash = await archiver.getL2Tips().then((tips)=>tips.
|
|
1423
|
+
const l2BlockHash = await archiver.getL2Tips().then((tips)=>tips.proposed.hash);
|
|
913
1424
|
if (!l2BlockHash) {
|
|
914
1425
|
this.metrics.recordSnapshotError();
|
|
915
1426
|
throw new Error(`Archiver has no latest L2 block hash downloaded. Cannot start snapshot.`);
|
|
@@ -936,7 +1447,7 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
936
1447
|
if (!('rollbackTo' in archiver)) {
|
|
937
1448
|
throw new Error('Archiver implementation does not support rollbacks.');
|
|
938
1449
|
}
|
|
939
|
-
const finalizedBlock = await archiver.getL2Tips().then((tips)=>tips.finalized.number);
|
|
1450
|
+
const finalizedBlock = await archiver.getL2Tips().then((tips)=>tips.finalized.block.number);
|
|
940
1451
|
if (targetBlock < finalizedBlock) {
|
|
941
1452
|
if (force) {
|
|
942
1453
|
this.log.warn(`Clearing world state database to allow rolling back behind finalized block ${finalizedBlock}`);
|
|
@@ -991,30 +1502,117 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
991
1502
|
return this.slasherClient.gatherOffensesForRound(round === 'current' ? undefined : BigInt(round));
|
|
992
1503
|
}
|
|
993
1504
|
}
|
|
1505
|
+
async reloadKeystore() {
|
|
1506
|
+
if (!this.config.keyStoreDirectory?.length) {
|
|
1507
|
+
throw new BadRequestError('Cannot reload keystore: node is not using a file-based keystore. ' + 'Set KEY_STORE_DIRECTORY to use file-based keystores.');
|
|
1508
|
+
}
|
|
1509
|
+
if (!this.validatorClient) {
|
|
1510
|
+
throw new BadRequestError('Cannot reload keystore: validator is not enabled.');
|
|
1511
|
+
}
|
|
1512
|
+
this.log.info('Reloading keystore from disk');
|
|
1513
|
+
// Re-read and validate keystore files
|
|
1514
|
+
const keyStores = loadKeystores(this.config.keyStoreDirectory);
|
|
1515
|
+
const newManager = new KeystoreManager(mergeKeystores(keyStores));
|
|
1516
|
+
await newManager.validateSigners();
|
|
1517
|
+
ValidatorClient.validateKeyStoreConfiguration(newManager, this.log);
|
|
1518
|
+
// Validate that every validator's publisher keys overlap with the L1 signers
|
|
1519
|
+
// that were initialized at startup. Publishers cannot be hot-reloaded, so a
|
|
1520
|
+
// validator with a publisher key that doesn't match any existing L1 signer
|
|
1521
|
+
// would silently fail on every proposer slot.
|
|
1522
|
+
if (this.keyStoreManager && this.sequencer) {
|
|
1523
|
+
const oldAdapter = NodeKeystoreAdapter.fromKeyStoreManager(this.keyStoreManager);
|
|
1524
|
+
const availablePublishers = new Set(oldAdapter.getAttesterAddresses().flatMap((a)=>oldAdapter.getPublisherAddresses(a).map((p)=>p.toString().toLowerCase())));
|
|
1525
|
+
const newAdapter = NodeKeystoreAdapter.fromKeyStoreManager(newManager);
|
|
1526
|
+
for (const attester of newAdapter.getAttesterAddresses()){
|
|
1527
|
+
const pubs = newAdapter.getPublisherAddresses(attester);
|
|
1528
|
+
if (pubs.length > 0 && !pubs.some((p)=>availablePublishers.has(p.toString().toLowerCase()))) {
|
|
1529
|
+
throw new BadRequestError(`Cannot reload keystore: validator ${attester} has publisher keys ` + `[${pubs.map((p)=>p.toString()).join(', ')}] but none match the L1 signers initialized at startup ` + `[${[
|
|
1530
|
+
...availablePublishers
|
|
1531
|
+
].join(', ')}]. Publishers cannot be hot-reloaded — ` + `use an existing publisher key or restart the node.`);
|
|
1532
|
+
}
|
|
1533
|
+
}
|
|
1534
|
+
}
|
|
1535
|
+
// Build adapters for old and new keystores to compute diff
|
|
1536
|
+
const newAdapter = NodeKeystoreAdapter.fromKeyStoreManager(newManager);
|
|
1537
|
+
const newAddresses = newAdapter.getAttesterAddresses();
|
|
1538
|
+
const oldAddresses = this.keyStoreManager ? NodeKeystoreAdapter.fromKeyStoreManager(this.keyStoreManager).getAttesterAddresses() : [];
|
|
1539
|
+
const oldSet = new Set(oldAddresses.map((a)=>a.toString()));
|
|
1540
|
+
const newSet = new Set(newAddresses.map((a)=>a.toString()));
|
|
1541
|
+
const added = newAddresses.filter((a)=>!oldSet.has(a.toString()));
|
|
1542
|
+
const removed = oldAddresses.filter((a)=>!newSet.has(a.toString()));
|
|
1543
|
+
if (added.length > 0) {
|
|
1544
|
+
this.log.info(`Keystore reload: adding attester keys: ${added.map((a)=>a.toString()).join(', ')}`);
|
|
1545
|
+
}
|
|
1546
|
+
if (removed.length > 0) {
|
|
1547
|
+
this.log.info(`Keystore reload: removing attester keys: ${removed.map((a)=>a.toString()).join(', ')}`);
|
|
1548
|
+
}
|
|
1549
|
+
if (added.length === 0 && removed.length === 0) {
|
|
1550
|
+
this.log.info('Keystore reload: attester keys unchanged');
|
|
1551
|
+
}
|
|
1552
|
+
// Update the validator client (coinbase, feeRecipient, attester keys)
|
|
1553
|
+
this.validatorClient.reloadKeystore(newManager);
|
|
1554
|
+
// Update the publisher factory's keystore so newly-added validators
|
|
1555
|
+
// can be matched to existing publisher keys when proposing blocks.
|
|
1556
|
+
if (this.sequencer) {
|
|
1557
|
+
this.sequencer.updatePublisherNodeKeyStore(newAdapter);
|
|
1558
|
+
}
|
|
1559
|
+
// Update slasher's "don't-slash-self" list with new validator addresses
|
|
1560
|
+
if (this.slasherClient && !this.config.slashSelfAllowed) {
|
|
1561
|
+
const slashValidatorsNever = unique([
|
|
1562
|
+
...this.config.slashValidatorsNever ?? [],
|
|
1563
|
+
...newAddresses
|
|
1564
|
+
].map((a)=>a.toString())).map(EthAddress.fromString);
|
|
1565
|
+
this.slasherClient.updateConfig({
|
|
1566
|
+
slashValidatorsNever
|
|
1567
|
+
});
|
|
1568
|
+
}
|
|
1569
|
+
this.keyStoreManager = newManager;
|
|
1570
|
+
this.log.info('Keystore reloaded: coinbase, feeRecipient, and attester keys updated');
|
|
1571
|
+
}
|
|
1572
|
+
#getInitialHeaderHash() {
|
|
1573
|
+
if (!this.initialHeaderHashPromise) {
|
|
1574
|
+
this.initialHeaderHashPromise = this.worldStateSynchronizer.getCommitted().getInitialHeader().hash();
|
|
1575
|
+
}
|
|
1576
|
+
return this.initialHeaderHashPromise;
|
|
1577
|
+
}
|
|
994
1578
|
/**
|
|
995
1579
|
* Returns an instance of MerkleTreeOperations having first ensured the world state is fully synched
|
|
996
|
-
* @param
|
|
1580
|
+
* @param block - The block parameter (block number, block hash, or 'latest') at which to get the data.
|
|
997
1581
|
* @returns An instance of a committed MerkleTreeOperations
|
|
998
|
-
*/ async #getWorldState(
|
|
999
|
-
|
|
1000
|
-
throw new Error('Invalid block number to get world state for: ' + blockNumber);
|
|
1001
|
-
}
|
|
1002
|
-
let blockSyncedTo = 0;
|
|
1582
|
+
*/ async #getWorldState(block) {
|
|
1583
|
+
let blockSyncedTo = BlockNumber.ZERO;
|
|
1003
1584
|
try {
|
|
1004
1585
|
// Attempt to sync the world state if necessary
|
|
1005
1586
|
blockSyncedTo = await this.#syncWorldState();
|
|
1006
1587
|
} catch (err) {
|
|
1007
1588
|
this.log.error(`Error getting world state: ${err}`);
|
|
1008
1589
|
}
|
|
1009
|
-
|
|
1010
|
-
|
|
1011
|
-
this.log.debug(`Using committed db for block ${blockNumber}, world state synced upto ${blockSyncedTo}`);
|
|
1590
|
+
if (block === 'latest') {
|
|
1591
|
+
this.log.debug(`Using committed db for block 'latest', world state synced upto ${blockSyncedTo}`);
|
|
1012
1592
|
return this.worldStateSynchronizer.getCommitted();
|
|
1013
|
-
}
|
|
1593
|
+
}
|
|
1594
|
+
if (BlockHash.isBlockHash(block)) {
|
|
1595
|
+
const initialBlockHash = await this.#getInitialHeaderHash();
|
|
1596
|
+
if (block.equals(initialBlockHash)) {
|
|
1597
|
+
// Block source doesn't handle initial header so we need to handle the case separately.
|
|
1598
|
+
return this.worldStateSynchronizer.getSnapshot(BlockNumber.ZERO);
|
|
1599
|
+
}
|
|
1600
|
+
const header = await this.blockSource.getBlockHeaderByHash(block);
|
|
1601
|
+
if (!header) {
|
|
1602
|
+
throw new Error(`Block hash ${block.toString()} not found when querying world state. If the node API has been queried with anchor block hash possibly a reorg has occurred.`);
|
|
1603
|
+
}
|
|
1604
|
+
const blockNumber = header.getBlockNumber();
|
|
1605
|
+
this.log.debug(`Using snapshot for block ${blockNumber}, world state synced upto ${blockSyncedTo}`);
|
|
1606
|
+
return this.worldStateSynchronizer.getSnapshot(blockNumber);
|
|
1607
|
+
}
|
|
1608
|
+
// Block number provided
|
|
1609
|
+
{
|
|
1610
|
+
const blockNumber = block;
|
|
1611
|
+
if (blockNumber > blockSyncedTo) {
|
|
1612
|
+
throw new Error(`Queried block ${block} not yet synced by the node (node is synced upto ${blockSyncedTo}).`);
|
|
1613
|
+
}
|
|
1014
1614
|
this.log.debug(`Using snapshot for block ${blockNumber}, world state synced upto ${blockSyncedTo}`);
|
|
1015
1615
|
return this.worldStateSynchronizer.getSnapshot(blockNumber);
|
|
1016
|
-
} else {
|
|
1017
|
-
throw new Error(`Block ${blockNumber} not yet synced`);
|
|
1018
1616
|
}
|
|
1019
1617
|
}
|
|
1020
1618
|
/**
|
|
@@ -1022,11 +1620,6 @@ import { NodeMetrics } from './node_metrics.js';
|
|
|
1022
1620
|
* @returns A promise that fulfils once the world state is synced
|
|
1023
1621
|
*/ async #syncWorldState() {
|
|
1024
1622
|
const blockSourceHeight = await this.blockSource.getBlockNumber();
|
|
1025
|
-
return this.worldStateSynchronizer.syncImmediate(blockSourceHeight);
|
|
1623
|
+
return await this.worldStateSynchronizer.syncImmediate(blockSourceHeight);
|
|
1026
1624
|
}
|
|
1027
1625
|
}
|
|
1028
|
-
_ts_decorate([
|
|
1029
|
-
trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
|
|
1030
|
-
[Attributes.TX_HASH]: tx.getTxHash().toString()
|
|
1031
|
-
}))
|
|
1032
|
-
], AztecNodeService.prototype, "simulatePublicCalls", null);
|