@aztec/aztec-node 0.0.1-commit.fce3e4f → 0.0.1-commit.ffe5b04ea

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,18 +1,388 @@
1
- function _ts_decorate(decorators, target, key, desc) {
2
- var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
3
- if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
4
- else for(var i = decorators.length - 1; i >= 0; i--)if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
5
- return c > 3 && r && Object.defineProperty(target, key, r), r;
1
+ function applyDecs2203RFactory() {
2
+ function createAddInitializerMethod(initializers, decoratorFinishedRef) {
3
+ return function addInitializer(initializer) {
4
+ assertNotFinished(decoratorFinishedRef, "addInitializer");
5
+ assertCallable(initializer, "An initializer");
6
+ initializers.push(initializer);
7
+ };
8
+ }
9
+ function memberDec(dec, name, desc, initializers, kind, isStatic, isPrivate, metadata, value) {
10
+ var kindStr;
11
+ switch(kind){
12
+ case 1:
13
+ kindStr = "accessor";
14
+ break;
15
+ case 2:
16
+ kindStr = "method";
17
+ break;
18
+ case 3:
19
+ kindStr = "getter";
20
+ break;
21
+ case 4:
22
+ kindStr = "setter";
23
+ break;
24
+ default:
25
+ kindStr = "field";
26
+ }
27
+ var ctx = {
28
+ kind: kindStr,
29
+ name: isPrivate ? "#" + name : name,
30
+ static: isStatic,
31
+ private: isPrivate,
32
+ metadata: metadata
33
+ };
34
+ var decoratorFinishedRef = {
35
+ v: false
36
+ };
37
+ ctx.addInitializer = createAddInitializerMethod(initializers, decoratorFinishedRef);
38
+ var get, set;
39
+ if (kind === 0) {
40
+ if (isPrivate) {
41
+ get = desc.get;
42
+ set = desc.set;
43
+ } else {
44
+ get = function() {
45
+ return this[name];
46
+ };
47
+ set = function(v) {
48
+ this[name] = v;
49
+ };
50
+ }
51
+ } else if (kind === 2) {
52
+ get = function() {
53
+ return desc.value;
54
+ };
55
+ } else {
56
+ if (kind === 1 || kind === 3) {
57
+ get = function() {
58
+ return desc.get.call(this);
59
+ };
60
+ }
61
+ if (kind === 1 || kind === 4) {
62
+ set = function(v) {
63
+ desc.set.call(this, v);
64
+ };
65
+ }
66
+ }
67
+ ctx.access = get && set ? {
68
+ get: get,
69
+ set: set
70
+ } : get ? {
71
+ get: get
72
+ } : {
73
+ set: set
74
+ };
75
+ try {
76
+ return dec(value, ctx);
77
+ } finally{
78
+ decoratorFinishedRef.v = true;
79
+ }
80
+ }
81
+ function assertNotFinished(decoratorFinishedRef, fnName) {
82
+ if (decoratorFinishedRef.v) {
83
+ throw new Error("attempted to call " + fnName + " after decoration was finished");
84
+ }
85
+ }
86
+ function assertCallable(fn, hint) {
87
+ if (typeof fn !== "function") {
88
+ throw new TypeError(hint + " must be a function");
89
+ }
90
+ }
91
+ function assertValidReturnValue(kind, value) {
92
+ var type = typeof value;
93
+ if (kind === 1) {
94
+ if (type !== "object" || value === null) {
95
+ throw new TypeError("accessor decorators must return an object with get, set, or init properties or void 0");
96
+ }
97
+ if (value.get !== undefined) {
98
+ assertCallable(value.get, "accessor.get");
99
+ }
100
+ if (value.set !== undefined) {
101
+ assertCallable(value.set, "accessor.set");
102
+ }
103
+ if (value.init !== undefined) {
104
+ assertCallable(value.init, "accessor.init");
105
+ }
106
+ } else if (type !== "function") {
107
+ var hint;
108
+ if (kind === 0) {
109
+ hint = "field";
110
+ } else if (kind === 10) {
111
+ hint = "class";
112
+ } else {
113
+ hint = "method";
114
+ }
115
+ throw new TypeError(hint + " decorators must return a function or void 0");
116
+ }
117
+ }
118
+ function applyMemberDec(ret, base, decInfo, name, kind, isStatic, isPrivate, initializers, metadata) {
119
+ var decs = decInfo[0];
120
+ var desc, init, value;
121
+ if (isPrivate) {
122
+ if (kind === 0 || kind === 1) {
123
+ desc = {
124
+ get: decInfo[3],
125
+ set: decInfo[4]
126
+ };
127
+ } else if (kind === 3) {
128
+ desc = {
129
+ get: decInfo[3]
130
+ };
131
+ } else if (kind === 4) {
132
+ desc = {
133
+ set: decInfo[3]
134
+ };
135
+ } else {
136
+ desc = {
137
+ value: decInfo[3]
138
+ };
139
+ }
140
+ } else if (kind !== 0) {
141
+ desc = Object.getOwnPropertyDescriptor(base, name);
142
+ }
143
+ if (kind === 1) {
144
+ value = {
145
+ get: desc.get,
146
+ set: desc.set
147
+ };
148
+ } else if (kind === 2) {
149
+ value = desc.value;
150
+ } else if (kind === 3) {
151
+ value = desc.get;
152
+ } else if (kind === 4) {
153
+ value = desc.set;
154
+ }
155
+ var newValue, get, set;
156
+ if (typeof decs === "function") {
157
+ newValue = memberDec(decs, name, desc, initializers, kind, isStatic, isPrivate, metadata, value);
158
+ if (newValue !== void 0) {
159
+ assertValidReturnValue(kind, newValue);
160
+ if (kind === 0) {
161
+ init = newValue;
162
+ } else if (kind === 1) {
163
+ init = newValue.init;
164
+ get = newValue.get || value.get;
165
+ set = newValue.set || value.set;
166
+ value = {
167
+ get: get,
168
+ set: set
169
+ };
170
+ } else {
171
+ value = newValue;
172
+ }
173
+ }
174
+ } else {
175
+ for(var i = decs.length - 1; i >= 0; i--){
176
+ var dec = decs[i];
177
+ newValue = memberDec(dec, name, desc, initializers, kind, isStatic, isPrivate, metadata, value);
178
+ if (newValue !== void 0) {
179
+ assertValidReturnValue(kind, newValue);
180
+ var newInit;
181
+ if (kind === 0) {
182
+ newInit = newValue;
183
+ } else if (kind === 1) {
184
+ newInit = newValue.init;
185
+ get = newValue.get || value.get;
186
+ set = newValue.set || value.set;
187
+ value = {
188
+ get: get,
189
+ set: set
190
+ };
191
+ } else {
192
+ value = newValue;
193
+ }
194
+ if (newInit !== void 0) {
195
+ if (init === void 0) {
196
+ init = newInit;
197
+ } else if (typeof init === "function") {
198
+ init = [
199
+ init,
200
+ newInit
201
+ ];
202
+ } else {
203
+ init.push(newInit);
204
+ }
205
+ }
206
+ }
207
+ }
208
+ }
209
+ if (kind === 0 || kind === 1) {
210
+ if (init === void 0) {
211
+ init = function(instance, init) {
212
+ return init;
213
+ };
214
+ } else if (typeof init !== "function") {
215
+ var ownInitializers = init;
216
+ init = function(instance, init) {
217
+ var value = init;
218
+ for(var i = 0; i < ownInitializers.length; i++){
219
+ value = ownInitializers[i].call(instance, value);
220
+ }
221
+ return value;
222
+ };
223
+ } else {
224
+ var originalInitializer = init;
225
+ init = function(instance, init) {
226
+ return originalInitializer.call(instance, init);
227
+ };
228
+ }
229
+ ret.push(init);
230
+ }
231
+ if (kind !== 0) {
232
+ if (kind === 1) {
233
+ desc.get = value.get;
234
+ desc.set = value.set;
235
+ } else if (kind === 2) {
236
+ desc.value = value;
237
+ } else if (kind === 3) {
238
+ desc.get = value;
239
+ } else if (kind === 4) {
240
+ desc.set = value;
241
+ }
242
+ if (isPrivate) {
243
+ if (kind === 1) {
244
+ ret.push(function(instance, args) {
245
+ return value.get.call(instance, args);
246
+ });
247
+ ret.push(function(instance, args) {
248
+ return value.set.call(instance, args);
249
+ });
250
+ } else if (kind === 2) {
251
+ ret.push(value);
252
+ } else {
253
+ ret.push(function(instance, args) {
254
+ return value.call(instance, args);
255
+ });
256
+ }
257
+ } else {
258
+ Object.defineProperty(base, name, desc);
259
+ }
260
+ }
261
+ }
262
+ function applyMemberDecs(Class, decInfos, metadata) {
263
+ var ret = [];
264
+ var protoInitializers;
265
+ var staticInitializers;
266
+ var existingProtoNonFields = new Map();
267
+ var existingStaticNonFields = new Map();
268
+ for(var i = 0; i < decInfos.length; i++){
269
+ var decInfo = decInfos[i];
270
+ if (!Array.isArray(decInfo)) continue;
271
+ var kind = decInfo[1];
272
+ var name = decInfo[2];
273
+ var isPrivate = decInfo.length > 3;
274
+ var isStatic = kind >= 5;
275
+ var base;
276
+ var initializers;
277
+ if (isStatic) {
278
+ base = Class;
279
+ kind = kind - 5;
280
+ staticInitializers = staticInitializers || [];
281
+ initializers = staticInitializers;
282
+ } else {
283
+ base = Class.prototype;
284
+ protoInitializers = protoInitializers || [];
285
+ initializers = protoInitializers;
286
+ }
287
+ if (kind !== 0 && !isPrivate) {
288
+ var existingNonFields = isStatic ? existingStaticNonFields : existingProtoNonFields;
289
+ var existingKind = existingNonFields.get(name) || 0;
290
+ if (existingKind === true || existingKind === 3 && kind !== 4 || existingKind === 4 && kind !== 3) {
291
+ throw new Error("Attempted to decorate a public method/accessor that has the same name as a previously decorated public method/accessor. This is not currently supported by the decorators plugin. Property name was: " + name);
292
+ } else if (!existingKind && kind > 2) {
293
+ existingNonFields.set(name, kind);
294
+ } else {
295
+ existingNonFields.set(name, true);
296
+ }
297
+ }
298
+ applyMemberDec(ret, base, decInfo, name, kind, isStatic, isPrivate, initializers, metadata);
299
+ }
300
+ pushInitializers(ret, protoInitializers);
301
+ pushInitializers(ret, staticInitializers);
302
+ return ret;
303
+ }
304
+ function pushInitializers(ret, initializers) {
305
+ if (initializers) {
306
+ ret.push(function(instance) {
307
+ for(var i = 0; i < initializers.length; i++){
308
+ initializers[i].call(instance);
309
+ }
310
+ return instance;
311
+ });
312
+ }
313
+ }
314
+ function applyClassDecs(targetClass, classDecs, metadata) {
315
+ if (classDecs.length > 0) {
316
+ var initializers = [];
317
+ var newClass = targetClass;
318
+ var name = targetClass.name;
319
+ for(var i = classDecs.length - 1; i >= 0; i--){
320
+ var decoratorFinishedRef = {
321
+ v: false
322
+ };
323
+ try {
324
+ var nextNewClass = classDecs[i](newClass, {
325
+ kind: "class",
326
+ name: name,
327
+ addInitializer: createAddInitializerMethod(initializers, decoratorFinishedRef),
328
+ metadata
329
+ });
330
+ } finally{
331
+ decoratorFinishedRef.v = true;
332
+ }
333
+ if (nextNewClass !== undefined) {
334
+ assertValidReturnValue(10, nextNewClass);
335
+ newClass = nextNewClass;
336
+ }
337
+ }
338
+ return [
339
+ defineMetadata(newClass, metadata),
340
+ function() {
341
+ for(var i = 0; i < initializers.length; i++){
342
+ initializers[i].call(newClass);
343
+ }
344
+ }
345
+ ];
346
+ }
347
+ }
348
+ function defineMetadata(Class, metadata) {
349
+ return Object.defineProperty(Class, Symbol.metadata || Symbol.for("Symbol.metadata"), {
350
+ configurable: true,
351
+ enumerable: true,
352
+ value: metadata
353
+ });
354
+ }
355
+ return function applyDecs2203R(targetClass, memberDecs, classDecs, parentClass) {
356
+ if (parentClass !== void 0) {
357
+ var parentMetadata = parentClass[Symbol.metadata || Symbol.for("Symbol.metadata")];
358
+ }
359
+ var metadata = Object.create(parentMetadata === void 0 ? null : parentMetadata);
360
+ var e = applyMemberDecs(targetClass, memberDecs, metadata);
361
+ if (!classDecs.length) defineMetadata(targetClass, metadata);
362
+ return {
363
+ e: e,
364
+ get c () {
365
+ return applyClassDecs(targetClass, classDecs, metadata);
366
+ }
367
+ };
368
+ };
6
369
  }
370
+ function _apply_decs_2203_r(targetClass, memberDecs, classDecs, parentClass) {
371
+ return (_apply_decs_2203_r = applyDecs2203RFactory())(targetClass, memberDecs, classDecs, parentClass);
372
+ }
373
+ var _dec, _initProto;
7
374
  import { createArchiver } from '@aztec/archiver';
8
375
  import { BBCircuitVerifier, QueuedIVCVerifier, TestCircuitVerifier } from '@aztec/bb-prover';
9
- import { createBlobSinkClient } from '@aztec/blob-sink/client';
10
- import { INITIAL_L2_BLOCK_NUM } from '@aztec/constants';
376
+ import { createBlobClientWithFileStores } from '@aztec/blob-client/client';
377
+ import { Blob } from '@aztec/blob-lib';
11
378
  import { EpochCache } from '@aztec/epoch-cache';
12
- import { RegistryContract, RollupContract, createEthereumChain, getPublicClient } from '@aztec/ethereum';
13
- import { compactArray, pick } from '@aztec/foundation/collection';
379
+ import { createEthereumChain } from '@aztec/ethereum/chain';
380
+ import { getPublicClient } from '@aztec/ethereum/client';
381
+ import { RegistryContract, RollupContract } from '@aztec/ethereum/contracts';
382
+ import { BlockNumber, SlotNumber } from '@aztec/foundation/branded-types';
383
+ import { compactArray, pick, unique } from '@aztec/foundation/collection';
384
+ import { Fr } from '@aztec/foundation/curves/bn254';
14
385
  import { EthAddress } from '@aztec/foundation/eth-address';
15
- import { Fr } from '@aztec/foundation/fields';
16
386
  import { BadRequestError } from '@aztec/foundation/json-rpc';
17
387
  import { createLogger } from '@aztec/foundation/log';
18
388
  import { count } from '@aztec/foundation/string';
@@ -20,30 +390,36 @@ import { DateProvider, Timer } from '@aztec/foundation/timer';
20
390
  import { MembershipWitness } from '@aztec/foundation/trees';
21
391
  import { KeystoreManager, loadKeystores, mergeKeystores } from '@aztec/node-keystore';
22
392
  import { trySnapshotSync, uploadSnapshot } from '@aztec/node-lib/actions';
23
- import { createL1TxUtilsWithBlobsFromEthSigner } from '@aztec/node-lib/factories';
24
- import { createP2PClient, getDefaultAllowedSetupFunctions } from '@aztec/p2p';
393
+ import { createForwarderL1TxUtilsFromSigners, createL1TxUtilsFromSigners } from '@aztec/node-lib/factories';
394
+ import { createP2PClient, createTxValidatorForAcceptingTxsOverRPC, getDefaultAllowedSetupFunctions } from '@aztec/p2p';
25
395
  import { ProtocolContractAddress } from '@aztec/protocol-contracts';
26
- import { BlockBuilder, GlobalVariableBuilder, SequencerClient, createValidatorForAcceptingTxs } from '@aztec/sequencer-client';
396
+ import { createProverNode } from '@aztec/prover-node';
397
+ import { createKeyStoreForProver } from '@aztec/prover-node/config';
398
+ import { GlobalVariableBuilder, SequencerClient } from '@aztec/sequencer-client';
27
399
  import { PublicProcessorFactory } from '@aztec/simulator/server';
28
400
  import { AttestationsBlockWatcher, EpochPruneWatcher, createSlasher } from '@aztec/slasher';
29
- import { PublicSimulatorConfig } from '@aztec/stdlib/avm';
401
+ import { CollectionLimitsConfig, PublicSimulatorConfig } from '@aztec/stdlib/avm';
30
402
  import { AztecAddress } from '@aztec/stdlib/aztec-address';
31
- import { L2BlockHash } from '@aztec/stdlib/block';
403
+ import { BlockHash, L2Block } from '@aztec/stdlib/block';
404
+ import { GasFees } from '@aztec/stdlib/gas';
32
405
  import { computePublicDataTreeLeafSlot } from '@aztec/stdlib/hash';
33
406
  import { AztecNodeAdminConfigSchema } from '@aztec/stdlib/interfaces/client';
34
407
  import { tryStop } from '@aztec/stdlib/interfaces/server';
408
+ import { InMemoryDebugLogStore, NullDebugLogStore } from '@aztec/stdlib/logs';
35
409
  import { InboxLeaf } from '@aztec/stdlib/messaging';
36
- import { P2PClientType } from '@aztec/stdlib/p2p';
37
410
  import { MerkleTreeId, NullifierMembershipWitness, PublicDataWitness } from '@aztec/stdlib/trees';
38
411
  import { PublicSimulationOutput, TxReceipt, TxStatus } from '@aztec/stdlib/tx';
39
412
  import { getPackageVersion } from '@aztec/stdlib/update-checker';
40
413
  import { Attributes, getTelemetryClient, trackSpan } from '@aztec/telemetry-client';
41
- import { NodeKeystoreAdapter, ValidatorClient, createBlockProposalHandler, createValidatorClient } from '@aztec/validator-client';
414
+ import { FullNodeCheckpointsBuilder as CheckpointsBuilder, FullNodeCheckpointsBuilder, NodeKeystoreAdapter, ValidatorClient, createBlockProposalHandler, createValidatorClient } from '@aztec/validator-client';
42
415
  import { createWorldStateSynchronizer } from '@aztec/world-state';
43
416
  import { createPublicClient, fallback, http } from 'viem';
44
417
  import { createSentinel } from '../sentinel/factory.js';
45
418
  import { createKeyStoreForValidator } from './config.js';
46
419
  import { NodeMetrics } from './node_metrics.js';
420
+ _dec = trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
421
+ [Attributes.TX_HASH]: tx.getTxHash().toString()
422
+ }));
47
423
  /**
48
424
  * The aztec node.
49
425
  */ export class AztecNodeService {
@@ -55,6 +431,7 @@ import { NodeMetrics } from './node_metrics.js';
55
431
  l1ToL2MessageSource;
56
432
  worldStateSynchronizer;
57
433
  sequencer;
434
+ proverNode;
58
435
  slasherClient;
59
436
  validatorsSentinel;
60
437
  epochPruneWatcher;
@@ -66,11 +443,25 @@ import { NodeMetrics } from './node_metrics.js';
66
443
  proofVerifier;
67
444
  telemetry;
68
445
  log;
446
+ blobClient;
447
+ validatorClient;
448
+ keyStoreManager;
449
+ debugLogStore;
450
+ static{
451
+ ({ e: [_initProto] } = _apply_decs_2203_r(this, [
452
+ [
453
+ _dec,
454
+ 2,
455
+ "simulatePublicCalls"
456
+ ]
457
+ ], []));
458
+ }
69
459
  metrics;
460
+ initialHeaderHashPromise;
70
461
  // Prevent two snapshot operations to happen simultaneously
71
462
  isUploadingSnapshot;
72
463
  tracer;
73
- constructor(config, p2pClient, blockSource, logsSource, contractDataSource, l1ToL2MessageSource, worldStateSynchronizer, sequencer, slasherClient, validatorsSentinel, epochPruneWatcher, l1ChainId, version, globalVariableBuilder, epochCache, packageVersion, proofVerifier, telemetry = getTelemetryClient(), log = createLogger('node')){
464
+ constructor(config, p2pClient, blockSource, logsSource, contractDataSource, l1ToL2MessageSource, worldStateSynchronizer, sequencer, proverNode, slasherClient, validatorsSentinel, epochPruneWatcher, l1ChainId, version, globalVariableBuilder, epochCache, packageVersion, proofVerifier, telemetry = getTelemetryClient(), log = createLogger('node'), blobClient, validatorClient, keyStoreManager, debugLogStore = new NullDebugLogStore()){
74
465
  this.config = config;
75
466
  this.p2pClient = p2pClient;
76
467
  this.blockSource = blockSource;
@@ -79,6 +470,7 @@ import { NodeMetrics } from './node_metrics.js';
79
470
  this.l1ToL2MessageSource = l1ToL2MessageSource;
80
471
  this.worldStateSynchronizer = worldStateSynchronizer;
81
472
  this.sequencer = sequencer;
473
+ this.proverNode = proverNode;
82
474
  this.slasherClient = slasherClient;
83
475
  this.validatorsSentinel = validatorsSentinel;
84
476
  this.epochPruneWatcher = epochPruneWatcher;
@@ -90,11 +482,22 @@ import { NodeMetrics } from './node_metrics.js';
90
482
  this.proofVerifier = proofVerifier;
91
483
  this.telemetry = telemetry;
92
484
  this.log = log;
485
+ this.blobClient = blobClient;
486
+ this.validatorClient = validatorClient;
487
+ this.keyStoreManager = keyStoreManager;
488
+ this.debugLogStore = debugLogStore;
489
+ this.initialHeaderHashPromise = (_initProto(this), undefined);
93
490
  this.isUploadingSnapshot = false;
94
491
  this.metrics = new NodeMetrics(telemetry, 'AztecNodeService');
95
492
  this.tracer = telemetry.getTracer('AztecNodeService');
96
493
  this.log.info(`Aztec Node version: ${this.packageVersion}`);
97
494
  this.log.info(`Aztec Node started on chain 0x${l1ChainId.toString(16)}`, config.l1Contracts);
495
+ // A defensive check that protects us against introducing a bug in the complex `createAndSync` function. We must
496
+ // never have debugLogStore enabled when not in test mode because then we would be accumulating debug logs in
497
+ // memory which could be a DoS vector on the sequencer (since no fees are paid for debug logs).
498
+ if (debugLogStore.isEnabled && config.realProofs) {
499
+ throw new Error('debugLogStore should never be enabled when realProofs are set');
500
+ }
98
501
  }
99
502
  async getWorldStateSyncStatus() {
100
503
  const status = await this.worldStateSynchronizer.status();
@@ -115,20 +518,28 @@ import { NodeMetrics } from './node_metrics.js';
115
518
  const packageVersion = getPackageVersion() ?? '';
116
519
  const telemetry = deps.telemetry ?? getTelemetryClient();
117
520
  const dateProvider = deps.dateProvider ?? new DateProvider();
118
- const blobSinkClient = deps.blobSinkClient ?? createBlobSinkClient(config, {
119
- logger: createLogger('node:blob-sink:client')
120
- });
121
521
  const ethereumChain = createEthereumChain(config.l1RpcUrls, config.l1ChainId);
122
- // Build a key store from file if given or from environment otherwise
522
+ // Build a key store from file if given or from environment otherwise.
523
+ // We keep the raw KeyStore available so we can merge with prover keys if enableProverNode is set.
123
524
  let keyStoreManager;
124
525
  const keyStoreProvided = config.keyStoreDirectory !== undefined && config.keyStoreDirectory.length > 0;
125
526
  if (keyStoreProvided) {
126
527
  const keyStores = loadKeystores(config.keyStoreDirectory);
127
528
  keyStoreManager = new KeystoreManager(mergeKeystores(keyStores));
128
529
  } else {
129
- const keyStore = createKeyStoreForValidator(config);
130
- if (keyStore) {
131
- keyStoreManager = new KeystoreManager(keyStore);
530
+ const rawKeyStores = [];
531
+ const validatorKeyStore = createKeyStoreForValidator(config);
532
+ if (validatorKeyStore) {
533
+ rawKeyStores.push(validatorKeyStore);
534
+ }
535
+ if (config.enableProverNode) {
536
+ const proverKeyStore = createKeyStoreForProver(config);
537
+ if (proverKeyStore) {
538
+ rawKeyStores.push(proverKeyStore);
539
+ }
540
+ }
541
+ if (rawKeyStores.length > 0) {
542
+ keyStoreManager = new KeystoreManager(rawKeyStores.length === 1 ? rawKeyStores[0] : mergeKeystores(rawKeyStores));
132
543
  }
133
544
  }
134
545
  await keyStoreManager?.validateSigners();
@@ -137,8 +548,8 @@ import { NodeMetrics } from './node_metrics.js';
137
548
  if (keyStoreManager === undefined) {
138
549
  throw new Error('Failed to create key store, a requirement for running a validator');
139
550
  }
140
- if (!keyStoreProvided) {
141
- log.warn('KEY STORE CREATED FROM ENVIRONMENT, IT IS RECOMMENDED TO USE A FILE-BASED KEY STORE IN PRODUCTION ENVIRONMENTS');
551
+ if (!keyStoreProvided && process.env.NODE_ENV !== 'test') {
552
+ log.warn("Keystore created from env: it's recommended to use a file-based key store for production");
142
553
  }
143
554
  ValidatorClient.validateKeyStoreConfiguration(keyStoreManager, log);
144
555
  }
@@ -148,7 +559,9 @@ import { NodeMetrics } from './node_metrics.js';
148
559
  }
149
560
  const publicClient = createPublicClient({
150
561
  chain: ethereumChain.chainInfo,
151
- transport: fallback(config.l1RpcUrls.map((url)=>http(url))),
562
+ transport: fallback(config.l1RpcUrls.map((url)=>http(url, {
563
+ batch: false
564
+ }))),
152
565
  pollingInterval: config.viemPollingIntervalMS
153
566
  });
154
567
  const l1ContractsAddresses = await RegistryContract.collectAddresses(publicClient, config.l1Contracts.registryAddress, config.rollupVersion ?? 'canonical');
@@ -158,22 +571,24 @@ import { NodeMetrics } from './node_metrics.js';
158
571
  ...l1ContractsAddresses
159
572
  };
160
573
  const rollupContract = new RollupContract(publicClient, config.l1Contracts.rollupAddress.toString());
161
- const [l1GenesisTime, slotDuration, rollupVersionFromRollup] = await Promise.all([
574
+ const [l1GenesisTime, slotDuration, rollupVersionFromRollup, rollupManaLimit] = await Promise.all([
162
575
  rollupContract.getL1GenesisTime(),
163
576
  rollupContract.getSlotDuration(),
164
- rollupContract.getVersion()
577
+ rollupContract.getVersion(),
578
+ rollupContract.getManaLimit().then(Number)
165
579
  ]);
166
580
  config.rollupVersion ??= Number(rollupVersionFromRollup);
167
581
  if (config.rollupVersion !== Number(rollupVersionFromRollup)) {
168
582
  log.warn(`Registry looked up and returned a rollup with version (${config.rollupVersion}), but this does not match with version detected from the rollup directly: (${rollupVersionFromRollup}).`);
169
583
  }
584
+ const blobClient = await createBlobClientWithFileStores(config, log.createChild('blob-client'));
170
585
  // attempt snapshot sync if possible
171
586
  await trySnapshotSync(config, log);
172
587
  const epochCache = await EpochCache.create(config.l1Contracts.rollupAddress, config, {
173
588
  dateProvider
174
589
  });
175
590
  const archiver = await createArchiver(config, {
176
- blobSinkClient,
591
+ blobClient,
177
592
  epochCache,
178
593
  telemetry,
179
594
  dateProvider
@@ -182,74 +597,96 @@ import { NodeMetrics } from './node_metrics.js';
182
597
  });
183
598
  // now create the merkle trees and the world state synchronizer
184
599
  const worldStateSynchronizer = await createWorldStateSynchronizer(config, archiver, options.prefilledPublicData, telemetry);
185
- const circuitVerifier = config.realProofs ? await BBCircuitVerifier.new(config) : new TestCircuitVerifier(config.proverTestVerificationDelayMs);
600
+ const circuitVerifier = config.realProofs || config.debugForceTxProofVerification ? await BBCircuitVerifier.new(config) : new TestCircuitVerifier(config.proverTestVerificationDelayMs);
601
+ let debugLogStore;
186
602
  if (!config.realProofs) {
187
603
  log.warn(`Aztec node is accepting fake proofs`);
604
+ debugLogStore = new InMemoryDebugLogStore();
605
+ log.info('Aztec node started in test mode (realProofs set to false) hence debug logs from public functions will be collected and served');
606
+ } else {
607
+ debugLogStore = new NullDebugLogStore();
188
608
  }
189
609
  const proofVerifier = new QueuedIVCVerifier(config, circuitVerifier);
610
+ const proverOnly = config.enableProverNode && config.disableValidator;
611
+ if (proverOnly) {
612
+ log.info('Starting in prover-only mode: skipping validator, sequencer, sentinel, and slasher subsystems');
613
+ }
190
614
  // create the tx pool and the p2p client, which will need the l2 block source
191
- const p2pClient = await createP2PClient(P2PClientType.Full, config, archiver, proofVerifier, worldStateSynchronizer, epochCache, packageVersion, dateProvider, telemetry, deps.p2pClientDeps);
192
- // We should really not be modifying the config object
193
- config.txPublicSetupAllowList = config.txPublicSetupAllowList ?? await getDefaultAllowedSetupFunctions();
194
- const blockBuilder = new BlockBuilder({
615
+ const p2pClient = await createP2PClient(config, archiver, proofVerifier, worldStateSynchronizer, epochCache, packageVersion, dateProvider, telemetry, deps.p2pClientDeps);
616
+ // We'll accumulate sentinel watchers here
617
+ const watchers = [];
618
+ // Create FullNodeCheckpointsBuilder for block proposal handling and tx validation.
619
+ // Override maxTxsPerCheckpoint with the validator-specific limit if set.
620
+ const validatorCheckpointsBuilder = new FullNodeCheckpointsBuilder({
195
621
  ...config,
196
622
  l1GenesisTime,
197
- slotDuration: Number(slotDuration)
623
+ slotDuration: Number(slotDuration),
624
+ rollupManaLimit,
625
+ maxTxsPerCheckpoint: config.validateMaxTxsPerCheckpoint
198
626
  }, worldStateSynchronizer, archiver, dateProvider, telemetry);
199
- // We'll accumulate sentinel watchers here
200
- const watchers = [];
201
- // Create validator client if required
202
- const validatorClient = createValidatorClient(config, {
203
- p2pClient,
204
- telemetry,
205
- dateProvider,
206
- epochCache,
207
- blockBuilder,
208
- blockSource: archiver,
209
- l1ToL2MessageSource: archiver,
210
- keyStoreManager
211
- });
212
- // If we have a validator client, register it as a source of offenses for the slasher,
213
- // and have it register callbacks on the p2p client *before* we start it, otherwise messages
214
- // like attestations or auths will fail.
215
- if (validatorClient) {
216
- watchers.push(validatorClient);
217
- if (!options.dontStartSequencer) {
218
- await validatorClient.registerHandlers();
627
+ let validatorClient;
628
+ if (!proverOnly) {
629
+ // Create validator client if required
630
+ validatorClient = await createValidatorClient(config, {
631
+ checkpointsBuilder: validatorCheckpointsBuilder,
632
+ worldState: worldStateSynchronizer,
633
+ p2pClient,
634
+ telemetry,
635
+ dateProvider,
636
+ epochCache,
637
+ blockSource: archiver,
638
+ l1ToL2MessageSource: archiver,
639
+ keyStoreManager,
640
+ blobClient
641
+ });
642
+ // If we have a validator client, register it as a source of offenses for the slasher,
643
+ // and have it register callbacks on the p2p client *before* we start it, otherwise messages
644
+ // like attestations or auths will fail.
645
+ if (validatorClient) {
646
+ watchers.push(validatorClient);
647
+ if (!options.dontStartSequencer) {
648
+ await validatorClient.registerHandlers();
649
+ }
219
650
  }
220
651
  }
221
- // If there's no validator client but alwaysReexecuteBlockProposals is enabled,
222
- // create a BlockProposalHandler to reexecute block proposals for monitoring
223
- if (!validatorClient && config.alwaysReexecuteBlockProposals) {
224
- log.info('Setting up block proposal reexecution for monitoring');
652
+ // If there's no validator client, create a BlockProposalHandler to handle block proposals
653
+ // for monitoring or reexecution. Reexecution (default) allows us to follow the pending chain,
654
+ // while non-reexecution is used for validating the proposals and collecting their txs.
655
+ if (!validatorClient) {
656
+ const reexecute = !!config.alwaysReexecuteBlockProposals;
657
+ log.info(`Setting up block proposal handler` + (reexecute ? ' with reexecution of proposals' : ''));
225
658
  createBlockProposalHandler(config, {
226
- blockBuilder,
659
+ checkpointsBuilder: validatorCheckpointsBuilder,
660
+ worldState: worldStateSynchronizer,
227
661
  epochCache,
228
662
  blockSource: archiver,
229
663
  l1ToL2MessageSource: archiver,
230
664
  p2pClient,
231
665
  dateProvider,
232
666
  telemetry
233
- }).registerForReexecution(p2pClient);
667
+ }).register(p2pClient, reexecute);
234
668
  }
235
669
  // Start world state and wait for it to sync to the archiver.
236
670
  await worldStateSynchronizer.start();
237
671
  // Start p2p. Note that it depends on world state to be running.
238
672
  await p2pClient.start();
239
- const validatorsSentinel = await createSentinel(epochCache, archiver, p2pClient, config);
240
- if (validatorsSentinel && config.slashInactivityPenalty > 0n) {
241
- watchers.push(validatorsSentinel);
242
- }
673
+ let validatorsSentinel;
243
674
  let epochPruneWatcher;
244
- if (config.slashPrunePenalty > 0n || config.slashDataWithholdingPenalty > 0n) {
245
- epochPruneWatcher = new EpochPruneWatcher(archiver, archiver, epochCache, p2pClient.getTxProvider(), blockBuilder, config);
246
- watchers.push(epochPruneWatcher);
247
- }
248
- // We assume we want to slash for invalid attestations unless all max penalties are set to 0
249
675
  let attestationsBlockWatcher;
250
- if (config.slashProposeInvalidAttestationsPenalty > 0n || config.slashAttestDescendantOfInvalidPenalty > 0n) {
251
- attestationsBlockWatcher = new AttestationsBlockWatcher(archiver, epochCache, config);
252
- watchers.push(attestationsBlockWatcher);
676
+ if (!proverOnly) {
677
+ validatorsSentinel = await createSentinel(epochCache, archiver, p2pClient, config);
678
+ if (validatorsSentinel && config.slashInactivityPenalty > 0n) {
679
+ watchers.push(validatorsSentinel);
680
+ }
681
+ if (config.slashPrunePenalty > 0n || config.slashDataWithholdingPenalty > 0n) {
682
+ epochPruneWatcher = new EpochPruneWatcher(archiver, archiver, epochCache, p2pClient.getTxProvider(), validatorCheckpointsBuilder, config);
683
+ watchers.push(epochPruneWatcher);
684
+ }
685
+ // We assume we want to slash for invalid attestations unless all max penalties are set to 0
686
+ if (config.slashProposeInvalidAttestationsPenalty > 0n || config.slashAttestDescendantOfInvalidPenalty > 0n) {
687
+ attestationsBlockWatcher = new AttestationsBlockWatcher(archiver, epochCache, config);
688
+ watchers.push(attestationsBlockWatcher);
689
+ }
253
690
  }
254
691
  // Start p2p-related services once the archiver has completed sync
255
692
  void archiver.waitForInitialSync().then(async ()=>{
@@ -262,21 +699,36 @@ import { NodeMetrics } from './node_metrics.js';
262
699
  // Validator enabled, create/start relevant service
263
700
  let sequencer;
264
701
  let slasherClient;
265
- if (!config.disableValidator) {
702
+ if (!config.disableValidator && validatorClient) {
266
703
  // We create a slasher only if we have a sequencer, since all slashing actions go through the sequencer publisher
267
704
  // as they are executed when the node is selected as proposer.
268
705
  const validatorAddresses = keyStoreManager ? NodeKeystoreAdapter.fromKeyStoreManager(keyStoreManager).getAddresses() : [];
269
706
  slasherClient = await createSlasher(config, config.l1Contracts, getPublicClient(config), watchers, dateProvider, epochCache, validatorAddresses, undefined);
270
707
  await slasherClient.start();
271
- const l1TxUtils = await createL1TxUtilsWithBlobsFromEthSigner(publicClient, keyStoreManager.createAllValidatorPublisherSigners(), {
708
+ const l1TxUtils = config.sequencerPublisherForwarderAddress ? await createForwarderL1TxUtilsFromSigners(publicClient, keyStoreManager.createAllValidatorPublisherSigners(), config.sequencerPublisherForwarderAddress, {
272
709
  ...config,
273
710
  scope: 'sequencer'
274
711
  }, {
275
712
  telemetry,
276
713
  logger: log.createChild('l1-tx-utils'),
277
- dateProvider
714
+ dateProvider,
715
+ kzg: Blob.getViemKzgInstance()
716
+ }) : await createL1TxUtilsFromSigners(publicClient, keyStoreManager.createAllValidatorPublisherSigners(), {
717
+ ...config,
718
+ scope: 'sequencer'
719
+ }, {
720
+ telemetry,
721
+ logger: log.createChild('l1-tx-utils'),
722
+ dateProvider,
723
+ kzg: Blob.getViemKzgInstance()
278
724
  });
279
725
  // Create and start the sequencer client
726
+ const checkpointsBuilder = new CheckpointsBuilder({
727
+ ...config,
728
+ l1GenesisTime,
729
+ slotDuration: Number(slotDuration),
730
+ rollupManaLimit
731
+ }, worldStateSynchronizer, archiver, dateProvider, telemetry, debugLogStore);
280
732
  sequencer = await SequencerClient.new(config, {
281
733
  ...deps,
282
734
  epochCache,
@@ -285,12 +737,12 @@ import { NodeMetrics } from './node_metrics.js';
285
737
  p2pClient,
286
738
  worldStateSynchronizer,
287
739
  slasherClient,
288
- blockBuilder,
740
+ checkpointsBuilder,
289
741
  l2BlockSource: archiver,
290
742
  l1ToL2MessageSource: archiver,
291
743
  telemetry,
292
744
  dateProvider,
293
- blobSinkClient,
745
+ blobClient,
294
746
  nodeKeyStore: keyStoreManager
295
747
  });
296
748
  }
@@ -300,7 +752,35 @@ import { NodeMetrics } from './node_metrics.js';
300
752
  } else if (sequencer) {
301
753
  log.warn(`Sequencer created but not started`);
302
754
  }
303
- return new AztecNodeService(config, p2pClient, archiver, archiver, archiver, archiver, worldStateSynchronizer, sequencer, slasherClient, validatorsSentinel, epochPruneWatcher, ethereumChain.chainInfo.id, config.rollupVersion, new GlobalVariableBuilder(config), epochCache, packageVersion, proofVerifier, telemetry, log);
755
+ // Create prover node subsystem if enabled
756
+ let proverNode;
757
+ if (config.enableProverNode) {
758
+ proverNode = await createProverNode(config, {
759
+ ...deps.proverNodeDeps,
760
+ telemetry,
761
+ dateProvider,
762
+ archiver,
763
+ worldStateSynchronizer,
764
+ p2pClient,
765
+ epochCache,
766
+ blobClient,
767
+ keyStoreManager
768
+ });
769
+ if (!options.dontStartProverNode) {
770
+ await proverNode.start();
771
+ log.info(`Prover node subsystem started`);
772
+ } else {
773
+ log.info(`Prover node subsystem created but not started`);
774
+ }
775
+ }
776
+ const globalVariableBuilder = new GlobalVariableBuilder({
777
+ ...config,
778
+ rollupVersion: BigInt(config.rollupVersion),
779
+ l1GenesisTime,
780
+ slotDuration: Number(slotDuration)
781
+ });
782
+ const node = new AztecNodeService(config, p2pClient, archiver, archiver, archiver, archiver, worldStateSynchronizer, sequencer, proverNode, slasherClient, validatorsSentinel, epochPruneWatcher, ethereumChain.chainInfo.id, config.rollupVersion, globalVariableBuilder, epochCache, packageVersion, proofVerifier, telemetry, log, blobClient, validatorClient, keyStoreManager, debugLogStore);
783
+ return node;
304
784
  }
305
785
  /**
306
786
  * Returns the sequencer client instance.
@@ -308,6 +788,9 @@ import { NodeMetrics } from './node_metrics.js';
308
788
  */ getSequencer() {
309
789
  return this.sequencer;
310
790
  }
791
+ /** Returns the prover node subsystem, if enabled. */ getProverNode() {
792
+ return this.proverNode;
793
+ }
311
794
  getBlockSource() {
312
795
  return this.blockSource;
313
796
  }
@@ -327,7 +810,10 @@ import { NodeMetrics } from './node_metrics.js';
327
810
  return Promise.resolve(this.p2pClient.getEnr()?.encodeTxt());
328
811
  }
329
812
  async getAllowedPublicSetup() {
330
- return this.config.txPublicSetupAllowList ?? await getDefaultAllowedSetupFunctions();
813
+ return [
814
+ ...await getDefaultAllowedSetupFunctions(),
815
+ ...this.config.txPublicSetupAllowListExtend ?? []
816
+ ];
331
817
  }
332
818
  /**
333
819
  * Method to determine if the node is ready to accept transactions.
@@ -350,33 +836,46 @@ import { NodeMetrics } from './node_metrics.js';
350
836
  rollupVersion,
351
837
  enr,
352
838
  l1ContractAddresses: contractAddresses,
353
- protocolContractAddresses: protocolContractAddresses
839
+ protocolContractAddresses: protocolContractAddresses,
840
+ realProofs: !!this.config.realProofs
354
841
  };
355
842
  return nodeInfo;
356
843
  }
357
844
  /**
358
- * Get a block specified by its number.
359
- * @param number - The block number being requested.
845
+ * Get a block specified by its block number, block hash, or 'latest'.
846
+ * @param block - The block parameter (block number, block hash, or 'latest').
360
847
  * @returns The requested block.
361
- */ async getBlock(number) {
362
- const blockNumber = number === 'latest' ? await this.getBlockNumber() : number;
363
- return await this.blockSource.getBlock(blockNumber);
848
+ */ async getBlock(block) {
849
+ if (BlockHash.isBlockHash(block)) {
850
+ return this.getBlockByHash(block);
851
+ }
852
+ const blockNumber = block === 'latest' ? await this.getBlockNumber() : block;
853
+ if (blockNumber === BlockNumber.ZERO) {
854
+ return this.buildInitialBlock();
855
+ }
856
+ return await this.blockSource.getL2Block(blockNumber);
364
857
  }
365
858
  /**
366
859
  * Get a block specified by its hash.
367
860
  * @param blockHash - The block hash being requested.
368
861
  * @returns The requested block.
369
862
  */ async getBlockByHash(blockHash) {
370
- const publishedBlock = await this.blockSource.getPublishedBlockByHash(blockHash);
371
- return publishedBlock?.block;
863
+ const initialBlockHash = await this.#getInitialHeaderHash();
864
+ if (blockHash.equals(initialBlockHash)) {
865
+ return this.buildInitialBlock();
866
+ }
867
+ return await this.blockSource.getL2BlockByHash(blockHash);
868
+ }
869
+ buildInitialBlock() {
870
+ const initialHeader = this.worldStateSynchronizer.getCommitted().getInitialHeader();
871
+ return L2Block.empty(initialHeader);
372
872
  }
373
873
  /**
374
874
  * Get a block specified by its archive root.
375
875
  * @param archive - The archive root being requested.
376
876
  * @returns The requested block.
377
877
  */ async getBlockByArchive(archive) {
378
- const publishedBlock = await this.blockSource.getPublishedBlockByArchive(archive);
379
- return publishedBlock?.block;
878
+ return await this.blockSource.getL2BlockByArchive(archive);
380
879
  }
381
880
  /**
382
881
  * Method to request blocks. Will attempt to return all requested blocks but will return only those available.
@@ -384,16 +883,28 @@ import { NodeMetrics } from './node_metrics.js';
384
883
  * @param limit - The maximum number of blocks to obtain.
385
884
  * @returns The blocks requested.
386
885
  */ async getBlocks(from, limit) {
387
- return await this.blockSource.getBlocks(from, limit) ?? [];
886
+ return await this.blockSource.getBlocks(from, BlockNumber(limit)) ?? [];
388
887
  }
389
- async getPublishedBlocks(from, limit) {
390
- return await this.blockSource.getPublishedBlocks(from, limit) ?? [];
888
+ async getCheckpoints(from, limit) {
889
+ return await this.blockSource.getCheckpoints(from, limit) ?? [];
890
+ }
891
+ async getCheckpointedBlocks(from, limit) {
892
+ return await this.blockSource.getCheckpointedBlocks(from, limit) ?? [];
391
893
  }
392
894
  /**
393
- * Method to fetch the current base fees.
394
- * @returns The current base fees.
395
- */ async getCurrentBaseFees() {
396
- return await this.globalVariableBuilder.getCurrentBaseFees();
895
+ * Method to fetch the current min L2 fees.
896
+ * @returns The current min L2 fees.
897
+ */ async getCurrentMinFees() {
898
+ return await this.globalVariableBuilder.getCurrentMinFees();
899
+ }
900
+ async getMaxPriorityFees() {
901
+ for await (const tx of this.p2pClient.iteratePendingTxs()){
902
+ return tx.getGasSettings().maxPriorityFeesPerGas;
903
+ }
904
+ return GasFees.from({
905
+ feePerDaGas: 0n,
906
+ feePerL2Gas: 0n
907
+ });
397
908
  }
398
909
  /**
399
910
  * Method to fetch the latest block number synchronized by the node.
@@ -404,6 +915,12 @@ import { NodeMetrics } from './node_metrics.js';
404
915
  async getProvenBlockNumber() {
405
916
  return await this.blockSource.getProvenBlockNumber();
406
917
  }
918
+ async getCheckpointedBlockNumber() {
919
+ return await this.blockSource.getCheckpointedL2BlockNumber();
920
+ }
921
+ getCheckpointNumber() {
922
+ return this.blockSource.getCheckpointNumber();
923
+ }
407
924
  /**
408
925
  * Method to fetch the version of the package.
409
926
  * @returns The node package version
@@ -428,22 +945,29 @@ import { NodeMetrics } from './node_metrics.js';
428
945
  getContract(address) {
429
946
  return this.contractDataSource.getContract(address);
430
947
  }
431
- /**
432
- * Retrieves all private logs from up to `limit` blocks, starting from the block number `from`.
433
- * @param from - The block number from which to begin retrieving logs.
434
- * @param limit - The maximum number of blocks to retrieve logs from.
435
- * @returns An array of private logs from the specified range of blocks.
436
- */ getPrivateLogs(from, limit) {
437
- return this.logsSource.getPrivateLogs(from, limit);
438
- }
439
- /**
440
- * Gets all logs that match any of the received tags (i.e. logs with their first field equal to a tag).
441
- * @param tags - The tags to filter the logs by.
442
- * @param logsPerTag - The maximum number of logs to return for each tag. By default no limit is set
443
- * @returns For each received tag, an array of matching logs is returned. An empty array implies no logs match
444
- * that tag.
445
- */ getLogsByTags(tags, logsPerTag) {
446
- return this.logsSource.getLogsByTags(tags, logsPerTag);
948
+ async getPrivateLogsByTags(tags, page, referenceBlock) {
949
+ if (referenceBlock) {
950
+ const initialBlockHash = await this.#getInitialHeaderHash();
951
+ if (!referenceBlock.equals(initialBlockHash)) {
952
+ const header = await this.blockSource.getBlockHeaderByHash(referenceBlock);
953
+ if (!header) {
954
+ throw new Error(`Block ${referenceBlock.toString()} not found in the node. This might indicate a reorg has occurred.`);
955
+ }
956
+ }
957
+ }
958
+ return this.logsSource.getPrivateLogsByTags(tags, page);
959
+ }
960
+ async getPublicLogsByTagsFromContract(contractAddress, tags, page, referenceBlock) {
961
+ if (referenceBlock) {
962
+ const initialBlockHash = await this.#getInitialHeaderHash();
963
+ if (!referenceBlock.equals(initialBlockHash)) {
964
+ const header = await this.blockSource.getBlockHeaderByHash(referenceBlock);
965
+ if (!header) {
966
+ throw new Error(`Block ${referenceBlock.toString()} not found in the node. This might indicate a reorg has occurred.`);
967
+ }
968
+ }
969
+ }
970
+ return this.logsSource.getPublicLogsByTagsFromContract(contractAddress, tags, page);
447
971
  }
448
972
  /**
449
973
  * Gets public logs based on the provided filter.
@@ -478,24 +1002,33 @@ import { NodeMetrics } from './node_metrics.js';
478
1002
  throw new Error(`Invalid tx: ${reason}`);
479
1003
  }
480
1004
  await this.p2pClient.sendTx(tx);
481
- this.metrics.receivedTx(timer.ms(), true);
482
- this.log.info(`Received tx ${txHash}`, {
1005
+ const duration = timer.ms();
1006
+ this.metrics.receivedTx(duration, true);
1007
+ this.log.info(`Received tx ${txHash} in ${duration}ms`, {
483
1008
  txHash
484
1009
  });
485
1010
  }
486
1011
  async getTxReceipt(txHash) {
487
- let txReceipt = new TxReceipt(txHash, TxStatus.DROPPED, 'Tx dropped by P2P node.');
488
- // We first check if the tx is in pending (instead of first checking if it is mined) because if we first check
489
- // for mined and then for pending there could be a race condition where the tx is mined between the two checks
490
- // and we would incorrectly return a TxReceipt with status DROPPED
491
- if (await this.p2pClient.getTxStatus(txHash) === 'pending') {
492
- txReceipt = new TxReceipt(txHash, TxStatus.PENDING, '');
493
- }
1012
+ // Check the tx pool status first. If the tx is known to the pool (pending or mined), we'll use that
1013
+ // as a fallback if we don't find a settled receipt in the archiver.
1014
+ const txPoolStatus = await this.p2pClient.getTxStatus(txHash);
1015
+ const isKnownToPool = txPoolStatus === 'pending' || txPoolStatus === 'mined';
1016
+ // Then get the actual tx from the archiver, which tracks every tx in a mined block.
494
1017
  const settledTxReceipt = await this.blockSource.getSettledTxReceipt(txHash);
1018
+ let receipt;
495
1019
  if (settledTxReceipt) {
496
- txReceipt = settledTxReceipt;
1020
+ receipt = settledTxReceipt;
1021
+ } else if (isKnownToPool) {
1022
+ // If the tx is in the pool but not in the archiver, it's pending.
1023
+ // This handles race conditions between archiver and p2p, where the archiver
1024
+ // has pruned the block in which a tx was mined, but p2p has not caught up yet.
1025
+ receipt = new TxReceipt(txHash, TxStatus.PENDING, undefined, undefined);
1026
+ } else {
1027
+ // Otherwise, if we don't know the tx, we consider it dropped.
1028
+ receipt = new TxReceipt(txHash, TxStatus.DROPPED, undefined, 'Tx dropped by P2P node');
497
1029
  }
498
- return txReceipt;
1030
+ this.debugLogStore.decorateReceiptWithLogs(txHash.toString(), receipt);
1031
+ return receipt;
499
1032
  }
500
1033
  getTxEffect(txHash) {
501
1034
  return this.blockSource.getTxEffect(txHash);
@@ -509,13 +1042,21 @@ import { NodeMetrics } from './node_metrics.js';
509
1042
  await tryStop(this.slasherClient);
510
1043
  await tryStop(this.proofVerifier);
511
1044
  await tryStop(this.sequencer);
1045
+ await tryStop(this.proverNode);
512
1046
  await tryStop(this.p2pClient);
513
1047
  await tryStop(this.worldStateSynchronizer);
514
1048
  await tryStop(this.blockSource);
1049
+ await tryStop(this.blobClient);
515
1050
  await tryStop(this.telemetry);
516
1051
  this.log.info(`Stopped Aztec Node`);
517
1052
  }
518
1053
  /**
1054
+ * Returns the blob client used by this node.
1055
+ * @internal - Exposed for testing purposes only.
1056
+ */ getBlobClient() {
1057
+ return this.blobClient;
1058
+ }
1059
+ /**
519
1060
  * Method to retrieve pending txs.
520
1061
  * @param limit - The number of items to returns
521
1062
  * @param after - The last known pending tx. Used for pagination
@@ -540,15 +1081,8 @@ import { NodeMetrics } from './node_metrics.js';
540
1081
  */ async getTxsByHash(txHashes) {
541
1082
  return compactArray(await Promise.all(txHashes.map((txHash)=>this.getTxByHash(txHash))));
542
1083
  }
543
- /**
544
- * Find the indexes of the given leaves in the given tree along with a block metadata pointing to the block in which
545
- * the leaves were inserted.
546
- * @param blockNumber - The block number at which to get the data or 'latest' for latest data.
547
- * @param treeId - The tree to search in.
548
- * @param leafValues - The values to search for.
549
- * @returns The indices of leaves and the block metadata of a block in which the leaves were inserted.
550
- */ async findLeavesIndexes(blockNumber, treeId, leafValues) {
551
- const committedDb = await this.#getWorldState(blockNumber);
1084
+ async findLeavesIndexes(referenceBlock, treeId, leafValues) {
1085
+ const committedDb = await this.#getWorldState(referenceBlock);
552
1086
  const maybeIndices = await committedDb.findLeafIndices(treeId, leafValues.map((x)=>x.toBuffer()));
553
1087
  // We filter out undefined values
554
1088
  const indices = maybeIndices.filter((x)=>x !== undefined);
@@ -567,7 +1101,7 @@ import { NodeMetrics } from './node_metrics.js';
567
1101
  // Now we obtain the block hashes from the archive tree by calling await `committedDb.getLeafValue(treeId, index)`
568
1102
  // (note that block number corresponds to the leaf index in the archive tree).
569
1103
  const blockHashes = await Promise.all(uniqueBlockNumbers.map((blockNumber)=>{
570
- return committedDb.getLeafValue(MerkleTreeId.ARCHIVE, blockNumber);
1104
+ return committedDb.getLeafValue(MerkleTreeId.ARCHIVE, BigInt(blockNumber));
571
1105
  }));
572
1106
  // If any of the block hashes are undefined, we throw an error.
573
1107
  for(let i = 0; i < uniqueBlockNumbers.length; i++){
@@ -575,7 +1109,7 @@ import { NodeMetrics } from './node_metrics.js';
575
1109
  throw new Error(`Block hash is undefined for block number ${uniqueBlockNumbers[i]}`);
576
1110
  }
577
1111
  }
578
- // Create InBlock objects by combining indices, blockNumbers and blockHashes and return them.
1112
+ // Create DataInBlock objects by combining indices, blockNumbers and blockHashes and return them.
579
1113
  return maybeIndices.map((index, i)=>{
580
1114
  if (index === undefined) {
581
1115
  return undefined;
@@ -590,51 +1124,28 @@ import { NodeMetrics } from './node_metrics.js';
590
1124
  return undefined;
591
1125
  }
592
1126
  return {
593
- l2BlockNumber: Number(blockNumber),
594
- l2BlockHash: L2BlockHash.fromField(blockHash),
1127
+ l2BlockNumber: BlockNumber(Number(blockNumber)),
1128
+ l2BlockHash: new BlockHash(blockHash),
595
1129
  data: index
596
1130
  };
597
1131
  });
598
1132
  }
599
- /**
600
- * Returns a sibling path for the given index in the nullifier tree.
601
- * @param blockNumber - The block number at which to get the data.
602
- * @param leafIndex - The index of the leaf for which the sibling path is required.
603
- * @returns The sibling path for the leaf index.
604
- */ async getNullifierSiblingPath(blockNumber, leafIndex) {
605
- const committedDb = await this.#getWorldState(blockNumber);
606
- return committedDb.getSiblingPath(MerkleTreeId.NULLIFIER_TREE, leafIndex);
607
- }
608
- /**
609
- * Returns a sibling path for the given index in the data tree.
610
- * @param blockNumber - The block number at which to get the data.
611
- * @param leafIndex - The index of the leaf for which the sibling path is required.
612
- * @returns The sibling path for the leaf index.
613
- */ async getNoteHashSiblingPath(blockNumber, leafIndex) {
614
- const committedDb = await this.#getWorldState(blockNumber);
615
- return committedDb.getSiblingPath(MerkleTreeId.NOTE_HASH_TREE, leafIndex);
616
- }
617
- async getArchiveMembershipWitness(blockNumber, archive) {
618
- const committedDb = await this.#getWorldState(blockNumber);
1133
+ async getBlockHashMembershipWitness(referenceBlock, blockHash) {
1134
+ const committedDb = await this.#getWorldState(referenceBlock);
619
1135
  const [pathAndIndex] = await committedDb.findSiblingPaths(MerkleTreeId.ARCHIVE, [
620
- archive
1136
+ blockHash
621
1137
  ]);
622
1138
  return pathAndIndex === undefined ? undefined : MembershipWitness.fromSiblingPath(pathAndIndex.index, pathAndIndex.path);
623
1139
  }
624
- async getNoteHashMembershipWitness(blockNumber, noteHash) {
625
- const committedDb = await this.#getWorldState(blockNumber);
1140
+ async getNoteHashMembershipWitness(referenceBlock, noteHash) {
1141
+ const committedDb = await this.#getWorldState(referenceBlock);
626
1142
  const [pathAndIndex] = await committedDb.findSiblingPaths(MerkleTreeId.NOTE_HASH_TREE, [
627
1143
  noteHash
628
1144
  ]);
629
1145
  return pathAndIndex === undefined ? undefined : MembershipWitness.fromSiblingPath(pathAndIndex.index, pathAndIndex.path);
630
1146
  }
631
- /**
632
- * Returns the index and a sibling path for a leaf in the committed l1 to l2 data tree.
633
- * @param blockNumber - The block number at which to get the data.
634
- * @param l1ToL2Message - The l1ToL2Message to get the index / sibling path for.
635
- * @returns A tuple of the index and the sibling path of the L1ToL2Message (undefined if not found).
636
- */ async getL1ToL2MessageMembershipWitness(blockNumber, l1ToL2Message) {
637
- const db = await this.#getWorldState(blockNumber);
1147
+ async getL1ToL2MessageMembershipWitness(referenceBlock, l1ToL2Message) {
1148
+ const db = await this.#getWorldState(referenceBlock);
638
1149
  const [witness] = await db.findSiblingPaths(MerkleTreeId.L1_TO_L2_MESSAGE_TREE, [
639
1150
  l1ToL2Message
640
1151
  ]);
@@ -647,9 +1158,9 @@ import { NodeMetrics } from './node_metrics.js';
647
1158
  witness.path
648
1159
  ];
649
1160
  }
650
- async getL1ToL2MessageBlock(l1ToL2Message) {
1161
+ async getL1ToL2MessageCheckpoint(l1ToL2Message) {
651
1162
  const messageIndex = await this.l1ToL2MessageSource.getL1ToL2MessageIndex(l1ToL2Message);
652
- return messageIndex ? InboxLeaf.l2BlockFromIndex(messageIndex) : undefined;
1163
+ return messageIndex ? InboxLeaf.checkpointNumberFromIndex(messageIndex) : undefined;
653
1164
  }
654
1165
  /**
655
1166
  * Returns whether an L1 to L2 message is synced by archiver and if it's ready to be included in a block.
@@ -660,38 +1171,29 @@ import { NodeMetrics } from './node_metrics.js';
660
1171
  return messageIndex !== undefined;
661
1172
  }
662
1173
  /**
663
- * Returns all the L2 to L1 messages in a block.
664
- * @param blockNumber - The block number at which to get the data.
665
- * @returns The L2 to L1 messages (undefined if the block number is not found).
666
- */ async getL2ToL1Messages(blockNumber) {
667
- const block = await this.blockSource.getBlock(blockNumber === 'latest' ? await this.getBlockNumber() : blockNumber);
668
- return block?.body.txEffects.map((txEffect)=>txEffect.l2ToL1Msgs);
669
- }
670
- /**
671
- * Returns a sibling path for a leaf in the committed blocks tree.
672
- * @param blockNumber - The block number at which to get the data.
673
- * @param leafIndex - Index of the leaf in the tree.
674
- * @returns The sibling path.
675
- */ async getArchiveSiblingPath(blockNumber, leafIndex) {
676
- const committedDb = await this.#getWorldState(blockNumber);
677
- return committedDb.getSiblingPath(MerkleTreeId.ARCHIVE, leafIndex);
678
- }
679
- /**
680
- * Returns a sibling path for a leaf in the committed public data tree.
681
- * @param blockNumber - The block number at which to get the data.
682
- * @param leafIndex - Index of the leaf in the tree.
683
- * @returns The sibling path.
684
- */ async getPublicDataSiblingPath(blockNumber, leafIndex) {
685
- const committedDb = await this.#getWorldState(blockNumber);
686
- return committedDb.getSiblingPath(MerkleTreeId.PUBLIC_DATA_TREE, leafIndex);
1174
+ * Returns all the L2 to L1 messages in an epoch.
1175
+ * @param epoch - The epoch at which to get the data.
1176
+ * @returns The L2 to L1 messages (empty array if the epoch is not found).
1177
+ */ async getL2ToL1Messages(epoch) {
1178
+ // Assumes `getCheckpointedBlocksForEpoch` returns blocks in ascending order of block number.
1179
+ const checkpointedBlocks = await this.blockSource.getCheckpointedBlocksForEpoch(epoch);
1180
+ const blocksInCheckpoints = [];
1181
+ let previousSlotNumber = SlotNumber.ZERO;
1182
+ let checkpointIndex = -1;
1183
+ for (const checkpointedBlock of checkpointedBlocks){
1184
+ const block = checkpointedBlock.block;
1185
+ const slotNumber = block.header.globalVariables.slotNumber;
1186
+ if (slotNumber !== previousSlotNumber) {
1187
+ checkpointIndex++;
1188
+ blocksInCheckpoints.push([]);
1189
+ previousSlotNumber = slotNumber;
1190
+ }
1191
+ blocksInCheckpoints[checkpointIndex].push(block);
1192
+ }
1193
+ return blocksInCheckpoints.map((blocks)=>blocks.map((block)=>block.body.txEffects.map((txEffect)=>txEffect.l2ToL1Msgs)));
687
1194
  }
688
- /**
689
- * Returns a nullifier membership witness for a given nullifier at a given block.
690
- * @param blockNumber - The block number at which to get the index.
691
- * @param nullifier - Nullifier we try to find witness for.
692
- * @returns The nullifier membership witness (if found).
693
- */ async getNullifierMembershipWitness(blockNumber, nullifier) {
694
- const db = await this.#getWorldState(blockNumber);
1195
+ async getNullifierMembershipWitness(referenceBlock, nullifier) {
1196
+ const db = await this.#getWorldState(referenceBlock);
695
1197
  const [witness] = await db.findSiblingPaths(MerkleTreeId.NULLIFIER_TREE, [
696
1198
  nullifier.toBuffer()
697
1199
  ]);
@@ -707,7 +1209,8 @@ import { NodeMetrics } from './node_metrics.js';
707
1209
  }
708
1210
  /**
709
1211
  * Returns a low nullifier membership witness for a given nullifier at a given block.
710
- * @param blockNumber - The block number at which to get the index.
1212
+ * @param referenceBlock - The block parameter (block number, block hash, or 'latest') at which to get the data
1213
+ * (which contains the root of the nullifier tree in which we are searching for the nullifier).
711
1214
  * @param nullifier - Nullifier we try to find the low nullifier witness for.
712
1215
  * @returns The low nullifier membership witness (if found).
713
1216
  * @remarks Low nullifier witness can be used to perform a nullifier non-inclusion proof by leveraging the "linked
@@ -718,8 +1221,8 @@ import { NodeMetrics } from './node_metrics.js';
718
1221
  * the nullifier already exists in the tree. This is because the `getPreviousValueIndex` function returns the
719
1222
  * index of the nullifier itself when it already exists in the tree.
720
1223
  * TODO: This is a confusing behavior and we should eventually address that.
721
- */ async getLowNullifierMembershipWitness(blockNumber, nullifier) {
722
- const committedDb = await this.#getWorldState(blockNumber);
1224
+ */ async getLowNullifierMembershipWitness(referenceBlock, nullifier) {
1225
+ const committedDb = await this.#getWorldState(referenceBlock);
723
1226
  const findResult = await committedDb.getPreviousValueIndex(MerkleTreeId.NULLIFIER_TREE, nullifier.toBigInt());
724
1227
  if (!findResult) {
725
1228
  return undefined;
@@ -732,8 +1235,8 @@ import { NodeMetrics } from './node_metrics.js';
732
1235
  const siblingPath = await committedDb.getSiblingPath(MerkleTreeId.NULLIFIER_TREE, BigInt(index));
733
1236
  return new NullifierMembershipWitness(BigInt(index), preimageData, siblingPath);
734
1237
  }
735
- async getPublicDataWitness(blockNumber, leafSlot) {
736
- const committedDb = await this.#getWorldState(blockNumber);
1238
+ async getPublicDataWitness(referenceBlock, leafSlot) {
1239
+ const committedDb = await this.#getWorldState(referenceBlock);
737
1240
  const lowLeafResult = await committedDb.getPreviousValueIndex(MerkleTreeId.PUBLIC_DATA_TREE, leafSlot.toBigInt());
738
1241
  if (!lowLeafResult) {
739
1242
  return undefined;
@@ -743,18 +1246,8 @@ import { NodeMetrics } from './node_metrics.js';
743
1246
  return new PublicDataWitness(lowLeafResult.index, preimage, path);
744
1247
  }
745
1248
  }
746
- /**
747
- * Gets the storage value at the given contract storage slot.
748
- *
749
- * @remarks The storage slot here refers to the slot as it is defined in Noir not the index in the merkle tree.
750
- * Aztec's version of `eth_getStorageAt`.
751
- *
752
- * @param contract - Address of the contract to query.
753
- * @param slot - Slot to query.
754
- * @param blockNumber - The block number at which to get the data or 'latest'.
755
- * @returns Storage value at the given contract slot.
756
- */ async getPublicStorageAt(blockNumber, contract, slot) {
757
- const committedDb = await this.#getWorldState(blockNumber);
1249
+ async getPublicStorageAt(referenceBlock, contract, slot) {
1250
+ const committedDb = await this.#getWorldState(referenceBlock);
758
1251
  const leafSlot = await computePublicDataTreeLeafSlot(contract, slot);
759
1252
  const lowLeafResult = await committedDb.getPreviousValueIndex(MerkleTreeId.PUBLIC_DATA_TREE, leafSlot.toBigInt());
760
1253
  if (!lowLeafResult || !lowLeafResult.alreadyPresent) {
@@ -763,18 +1256,22 @@ import { NodeMetrics } from './node_metrics.js';
763
1256
  const preimage = await committedDb.getLeafPreimage(MerkleTreeId.PUBLIC_DATA_TREE, lowLeafResult.index);
764
1257
  return preimage.leaf.value;
765
1258
  }
766
- /**
767
- * Returns the currently committed block header, or the initial header if no blocks have been produced.
768
- * @returns The current committed block header.
769
- */ async getBlockHeader(blockNumber = 'latest') {
770
- return blockNumber === 0 || blockNumber === 'latest' && await this.blockSource.getBlockNumber() === 0 ? this.worldStateSynchronizer.getCommitted().getInitialHeader() : this.blockSource.getBlockHeader(blockNumber);
771
- }
772
- /**
773
- * Get a block header specified by its hash.
774
- * @param blockHash - The block hash being requested.
775
- * @returns The requested block header.
776
- */ async getBlockHeaderByHash(blockHash) {
777
- return await this.blockSource.getBlockHeaderByHash(blockHash);
1259
+ async getBlockHeader(block = 'latest') {
1260
+ if (BlockHash.isBlockHash(block)) {
1261
+ const initialBlockHash = await this.#getInitialHeaderHash();
1262
+ if (block.equals(initialBlockHash)) {
1263
+ // Block source doesn't handle initial header so we need to handle the case separately.
1264
+ return this.worldStateSynchronizer.getCommitted().getInitialHeader();
1265
+ }
1266
+ return this.blockSource.getBlockHeaderByHash(block);
1267
+ } else {
1268
+ // Block source doesn't handle initial header so we need to handle the case separately.
1269
+ const blockNumber = block === 'latest' ? await this.getBlockNumber() : block;
1270
+ if (blockNumber === BlockNumber.ZERO) {
1271
+ return this.worldStateSynchronizer.getCommitted().getInitialHeader();
1272
+ }
1273
+ return this.blockSource.getBlockHeader(block);
1274
+ }
778
1275
  }
779
1276
  /**
780
1277
  * Get a block header specified by its archive root.
@@ -783,6 +1280,12 @@ import { NodeMetrics } from './node_metrics.js';
783
1280
  */ async getBlockHeaderByArchive(archive) {
784
1281
  return await this.blockSource.getBlockHeaderByArchive(archive);
785
1282
  }
1283
+ getBlockData(number) {
1284
+ return this.blockSource.getBlockData(number);
1285
+ }
1286
+ getBlockDataByArchive(archive) {
1287
+ return this.blockSource.getBlockDataByArchive(archive);
1288
+ }
786
1289
  /**
787
1290
  * Simulates the public part of a transaction with the current state.
788
1291
  * @param tx - The transaction to simulate.
@@ -795,17 +1298,20 @@ import { NodeMetrics } from './node_metrics.js';
795
1298
  throw new BadRequestError(`Transaction total gas limit ${txGasLimit + teardownGasLimit} (${txGasLimit} + ${teardownGasLimit}) exceeds maximum gas limit ${this.config.rpcSimulatePublicMaxGasLimit} for simulation`);
796
1299
  }
797
1300
  const txHash = tx.getTxHash();
798
- const blockNumber = await this.blockSource.getBlockNumber() + 1;
1301
+ const latestBlockNumber = await this.blockSource.getBlockNumber();
1302
+ const blockNumber = BlockNumber.add(latestBlockNumber, 1);
799
1303
  // If sequencer is not initialized, we just set these values to zero for simulation.
800
1304
  const coinbase = EthAddress.ZERO;
801
1305
  const feeRecipient = AztecAddress.ZERO;
802
1306
  const newGlobalVariables = await this.globalVariableBuilder.buildGlobalVariables(blockNumber, coinbase, feeRecipient);
803
- const publicProcessorFactory = new PublicProcessorFactory(this.contractDataSource, new DateProvider(), this.telemetry);
1307
+ const publicProcessorFactory = new PublicProcessorFactory(this.contractDataSource, new DateProvider(), this.telemetry, this.log.getBindings());
804
1308
  this.log.verbose(`Simulating public calls for tx ${txHash}`, {
805
1309
  globalVariables: newGlobalVariables.toInspect(),
806
1310
  txHash,
807
1311
  blockNumber
808
1312
  });
1313
+ // Ensure world-state has caught up with the latest block we loaded from the archiver
1314
+ await this.worldStateSynchronizer.syncImmediate(latestBlockNumber);
809
1315
  const merkleTreeFork = await this.worldStateSynchronizer.fork();
810
1316
  try {
811
1317
  const config = PublicSimulatorConfig.from({
@@ -813,12 +1319,14 @@ import { NodeMetrics } from './node_metrics.js';
813
1319
  collectDebugLogs: true,
814
1320
  collectHints: false,
815
1321
  collectCallMetadata: true,
816
- maxDebugLogMemoryReads: this.config.rpcSimulatePublicMaxDebugLogMemoryReads,
817
- collectStatistics: false
1322
+ collectStatistics: false,
1323
+ collectionLimits: CollectionLimitsConfig.from({
1324
+ maxDebugLogMemoryReads: this.config.rpcSimulatePublicMaxDebugLogMemoryReads
1325
+ })
818
1326
  });
819
1327
  const processor = publicProcessorFactory.create(merkleTreeFork, newGlobalVariables, config);
820
1328
  // REFACTOR: Consider merging ProcessReturnValues into ProcessedTx
821
- const [processedTxs, failedTxs, _usedTxs, returns] = await processor.process([
1329
+ const [processedTxs, failedTxs, _usedTxs, returns, debugLogs] = await processor.process([
822
1330
  tx
823
1331
  ]);
824
1332
  // REFACTOR: Consider returning the error rather than throwing
@@ -829,7 +1337,7 @@ import { NodeMetrics } from './node_metrics.js';
829
1337
  throw failedTxs[0].error;
830
1338
  }
831
1339
  const [processedTx] = processedTxs;
832
- return new PublicSimulationOutput(processedTx.revertReason, processedTx.globalVariables, processedTx.txEffect, returns, processedTx.gasUsed);
1340
+ return new PublicSimulationOutput(processedTx.revertReason, processedTx.globalVariables, processedTx.txEffect, returns, processedTx.gasUsed, debugLogs);
833
1341
  } finally{
834
1342
  await merkleTreeFork.close();
835
1343
  }
@@ -837,19 +1345,22 @@ import { NodeMetrics } from './node_metrics.js';
837
1345
  async isValidTx(tx, { isSimulation, skipFeeEnforcement } = {}) {
838
1346
  const db = this.worldStateSynchronizer.getCommitted();
839
1347
  const verifier = isSimulation ? undefined : this.proofVerifier;
840
- // We accept transactions if they are not expired by the next slot (checked based on the IncludeByTimestamp field)
1348
+ // We accept transactions if they are not expired by the next slot (checked based on the ExpirationTimestamp field)
841
1349
  const { ts: nextSlotTimestamp } = this.epochCache.getEpochAndSlotInNextL1Slot();
842
- const blockNumber = await this.blockSource.getBlockNumber() + 1;
843
- const validator = createValidatorForAcceptingTxs(db, this.contractDataSource, verifier, {
1350
+ const blockNumber = BlockNumber(await this.blockSource.getBlockNumber() + 1);
1351
+ const validator = createTxValidatorForAcceptingTxsOverRPC(db, this.contractDataSource, verifier, {
844
1352
  timestamp: nextSlotTimestamp,
845
1353
  blockNumber,
846
1354
  l1ChainId: this.l1ChainId,
847
1355
  rollupVersion: this.version,
848
- setupAllowList: this.config.txPublicSetupAllowList ?? await getDefaultAllowedSetupFunctions(),
849
- gasFees: await this.getCurrentBaseFees(),
1356
+ setupAllowList: [
1357
+ ...await getDefaultAllowedSetupFunctions(),
1358
+ ...this.config.txPublicSetupAllowListExtend ?? []
1359
+ ],
1360
+ gasFees: await this.getCurrentMinFees(),
850
1361
  skipFeeEnforcement,
851
1362
  txsPermitted: !this.config.disableTransactions
852
- });
1363
+ }, this.log.getBindings());
853
1364
  return await validator.validateTx(tx);
854
1365
  }
855
1366
  getConfig() {
@@ -909,7 +1420,7 @@ import { NodeMetrics } from './node_metrics.js';
909
1420
  throw new Error(`Archiver initial sync not complete. Cannot start snapshot.`);
910
1421
  }
911
1422
  // And it has an L2 block hash
912
- const l2BlockHash = await archiver.getL2Tips().then((tips)=>tips.latest.hash);
1423
+ const l2BlockHash = await archiver.getL2Tips().then((tips)=>tips.proposed.hash);
913
1424
  if (!l2BlockHash) {
914
1425
  this.metrics.recordSnapshotError();
915
1426
  throw new Error(`Archiver has no latest L2 block hash downloaded. Cannot start snapshot.`);
@@ -936,7 +1447,7 @@ import { NodeMetrics } from './node_metrics.js';
936
1447
  if (!('rollbackTo' in archiver)) {
937
1448
  throw new Error('Archiver implementation does not support rollbacks.');
938
1449
  }
939
- const finalizedBlock = await archiver.getL2Tips().then((tips)=>tips.finalized.number);
1450
+ const finalizedBlock = await archiver.getL2Tips().then((tips)=>tips.finalized.block.number);
940
1451
  if (targetBlock < finalizedBlock) {
941
1452
  if (force) {
942
1453
  this.log.warn(`Clearing world state database to allow rolling back behind finalized block ${finalizedBlock}`);
@@ -991,30 +1502,117 @@ import { NodeMetrics } from './node_metrics.js';
991
1502
  return this.slasherClient.gatherOffensesForRound(round === 'current' ? undefined : BigInt(round));
992
1503
  }
993
1504
  }
1505
+ async reloadKeystore() {
1506
+ if (!this.config.keyStoreDirectory?.length) {
1507
+ throw new BadRequestError('Cannot reload keystore: node is not using a file-based keystore. ' + 'Set KEY_STORE_DIRECTORY to use file-based keystores.');
1508
+ }
1509
+ if (!this.validatorClient) {
1510
+ throw new BadRequestError('Cannot reload keystore: validator is not enabled.');
1511
+ }
1512
+ this.log.info('Reloading keystore from disk');
1513
+ // Re-read and validate keystore files
1514
+ const keyStores = loadKeystores(this.config.keyStoreDirectory);
1515
+ const newManager = new KeystoreManager(mergeKeystores(keyStores));
1516
+ await newManager.validateSigners();
1517
+ ValidatorClient.validateKeyStoreConfiguration(newManager, this.log);
1518
+ // Validate that every validator's publisher keys overlap with the L1 signers
1519
+ // that were initialized at startup. Publishers cannot be hot-reloaded, so a
1520
+ // validator with a publisher key that doesn't match any existing L1 signer
1521
+ // would silently fail on every proposer slot.
1522
+ if (this.keyStoreManager && this.sequencer) {
1523
+ const oldAdapter = NodeKeystoreAdapter.fromKeyStoreManager(this.keyStoreManager);
1524
+ const availablePublishers = new Set(oldAdapter.getAttesterAddresses().flatMap((a)=>oldAdapter.getPublisherAddresses(a).map((p)=>p.toString().toLowerCase())));
1525
+ const newAdapter = NodeKeystoreAdapter.fromKeyStoreManager(newManager);
1526
+ for (const attester of newAdapter.getAttesterAddresses()){
1527
+ const pubs = newAdapter.getPublisherAddresses(attester);
1528
+ if (pubs.length > 0 && !pubs.some((p)=>availablePublishers.has(p.toString().toLowerCase()))) {
1529
+ throw new BadRequestError(`Cannot reload keystore: validator ${attester} has publisher keys ` + `[${pubs.map((p)=>p.toString()).join(', ')}] but none match the L1 signers initialized at startup ` + `[${[
1530
+ ...availablePublishers
1531
+ ].join(', ')}]. Publishers cannot be hot-reloaded — ` + `use an existing publisher key or restart the node.`);
1532
+ }
1533
+ }
1534
+ }
1535
+ // Build adapters for old and new keystores to compute diff
1536
+ const newAdapter = NodeKeystoreAdapter.fromKeyStoreManager(newManager);
1537
+ const newAddresses = newAdapter.getAttesterAddresses();
1538
+ const oldAddresses = this.keyStoreManager ? NodeKeystoreAdapter.fromKeyStoreManager(this.keyStoreManager).getAttesterAddresses() : [];
1539
+ const oldSet = new Set(oldAddresses.map((a)=>a.toString()));
1540
+ const newSet = new Set(newAddresses.map((a)=>a.toString()));
1541
+ const added = newAddresses.filter((a)=>!oldSet.has(a.toString()));
1542
+ const removed = oldAddresses.filter((a)=>!newSet.has(a.toString()));
1543
+ if (added.length > 0) {
1544
+ this.log.info(`Keystore reload: adding attester keys: ${added.map((a)=>a.toString()).join(', ')}`);
1545
+ }
1546
+ if (removed.length > 0) {
1547
+ this.log.info(`Keystore reload: removing attester keys: ${removed.map((a)=>a.toString()).join(', ')}`);
1548
+ }
1549
+ if (added.length === 0 && removed.length === 0) {
1550
+ this.log.info('Keystore reload: attester keys unchanged');
1551
+ }
1552
+ // Update the validator client (coinbase, feeRecipient, attester keys)
1553
+ this.validatorClient.reloadKeystore(newManager);
1554
+ // Update the publisher factory's keystore so newly-added validators
1555
+ // can be matched to existing publisher keys when proposing blocks.
1556
+ if (this.sequencer) {
1557
+ this.sequencer.updatePublisherNodeKeyStore(newAdapter);
1558
+ }
1559
+ // Update slasher's "don't-slash-self" list with new validator addresses
1560
+ if (this.slasherClient && !this.config.slashSelfAllowed) {
1561
+ const slashValidatorsNever = unique([
1562
+ ...this.config.slashValidatorsNever ?? [],
1563
+ ...newAddresses
1564
+ ].map((a)=>a.toString())).map(EthAddress.fromString);
1565
+ this.slasherClient.updateConfig({
1566
+ slashValidatorsNever
1567
+ });
1568
+ }
1569
+ this.keyStoreManager = newManager;
1570
+ this.log.info('Keystore reloaded: coinbase, feeRecipient, and attester keys updated');
1571
+ }
1572
+ #getInitialHeaderHash() {
1573
+ if (!this.initialHeaderHashPromise) {
1574
+ this.initialHeaderHashPromise = this.worldStateSynchronizer.getCommitted().getInitialHeader().hash();
1575
+ }
1576
+ return this.initialHeaderHashPromise;
1577
+ }
994
1578
  /**
995
1579
  * Returns an instance of MerkleTreeOperations having first ensured the world state is fully synched
996
- * @param blockNumber - The block number at which to get the data.
1580
+ * @param block - The block parameter (block number, block hash, or 'latest') at which to get the data.
997
1581
  * @returns An instance of a committed MerkleTreeOperations
998
- */ async #getWorldState(blockNumber) {
999
- if (typeof blockNumber === 'number' && blockNumber < INITIAL_L2_BLOCK_NUM - 1) {
1000
- throw new Error('Invalid block number to get world state for: ' + blockNumber);
1001
- }
1002
- let blockSyncedTo = 0;
1582
+ */ async #getWorldState(block) {
1583
+ let blockSyncedTo = BlockNumber.ZERO;
1003
1584
  try {
1004
1585
  // Attempt to sync the world state if necessary
1005
1586
  blockSyncedTo = await this.#syncWorldState();
1006
1587
  } catch (err) {
1007
1588
  this.log.error(`Error getting world state: ${err}`);
1008
1589
  }
1009
- // using a snapshot could be less efficient than using the committed db
1010
- if (blockNumber === 'latest' /*|| blockNumber === blockSyncedTo*/ ) {
1011
- this.log.debug(`Using committed db for block ${blockNumber}, world state synced upto ${blockSyncedTo}`);
1590
+ if (block === 'latest') {
1591
+ this.log.debug(`Using committed db for block 'latest', world state synced upto ${blockSyncedTo}`);
1012
1592
  return this.worldStateSynchronizer.getCommitted();
1013
- } else if (blockNumber <= blockSyncedTo) {
1593
+ }
1594
+ if (BlockHash.isBlockHash(block)) {
1595
+ const initialBlockHash = await this.#getInitialHeaderHash();
1596
+ if (block.equals(initialBlockHash)) {
1597
+ // Block source doesn't handle initial header so we need to handle the case separately.
1598
+ return this.worldStateSynchronizer.getSnapshot(BlockNumber.ZERO);
1599
+ }
1600
+ const header = await this.blockSource.getBlockHeaderByHash(block);
1601
+ if (!header) {
1602
+ throw new Error(`Block hash ${block.toString()} not found when querying world state. If the node API has been queried with anchor block hash possibly a reorg has occurred.`);
1603
+ }
1604
+ const blockNumber = header.getBlockNumber();
1605
+ this.log.debug(`Using snapshot for block ${blockNumber}, world state synced upto ${blockSyncedTo}`);
1606
+ return this.worldStateSynchronizer.getSnapshot(blockNumber);
1607
+ }
1608
+ // Block number provided
1609
+ {
1610
+ const blockNumber = block;
1611
+ if (blockNumber > blockSyncedTo) {
1612
+ throw new Error(`Queried block ${block} not yet synced by the node (node is synced upto ${blockSyncedTo}).`);
1613
+ }
1014
1614
  this.log.debug(`Using snapshot for block ${blockNumber}, world state synced upto ${blockSyncedTo}`);
1015
1615
  return this.worldStateSynchronizer.getSnapshot(blockNumber);
1016
- } else {
1017
- throw new Error(`Block ${blockNumber} not yet synced`);
1018
1616
  }
1019
1617
  }
1020
1618
  /**
@@ -1022,11 +1620,6 @@ import { NodeMetrics } from './node_metrics.js';
1022
1620
  * @returns A promise that fulfils once the world state is synced
1023
1621
  */ async #syncWorldState() {
1024
1622
  const blockSourceHeight = await this.blockSource.getBlockNumber();
1025
- return this.worldStateSynchronizer.syncImmediate(blockSourceHeight);
1623
+ return await this.worldStateSynchronizer.syncImmediate(blockSourceHeight);
1026
1624
  }
1027
1625
  }
1028
- _ts_decorate([
1029
- trackSpan('AztecNodeService.simulatePublicCalls', (tx)=>({
1030
- [Attributes.TX_HASH]: tx.getTxHash().toString()
1031
- }))
1032
- ], AztecNodeService.prototype, "simulatePublicCalls", null);