@aztec/p2p 0.76.4 → 0.77.0-testnet-ignition.21

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (241) hide show
  1. package/dest/bootstrap/bootstrap.d.ts +2 -2
  2. package/dest/bootstrap/bootstrap.d.ts.map +1 -1
  3. package/dest/bootstrap/bootstrap.js +55 -41
  4. package/dest/client/factory.d.ts +8 -6
  5. package/dest/client/factory.d.ts.map +1 -1
  6. package/dest/client/factory.js +8 -10
  7. package/dest/client/index.js +0 -1
  8. package/dest/client/p2p_client.d.ts +7 -4
  9. package/dest/client/p2p_client.d.ts.map +1 -1
  10. package/dest/client/p2p_client.js +492 -514
  11. package/dest/config.d.ts +8 -10
  12. package/dest/config.d.ts.map +1 -1
  13. package/dest/config.js +54 -47
  14. package/dest/enr/generate-enr.d.ts +9 -0
  15. package/dest/enr/generate-enr.d.ts.map +1 -0
  16. package/dest/enr/generate-enr.js +30 -0
  17. package/dest/enr/index.d.ts +2 -0
  18. package/dest/enr/index.d.ts.map +1 -0
  19. package/dest/enr/index.js +1 -0
  20. package/dest/errors/reqresp.error.js +6 -10
  21. package/dest/index.js +0 -1
  22. package/dest/mem_pools/attestation_pool/attestation_pool.d.ts +1 -1
  23. package/dest/mem_pools/attestation_pool/attestation_pool.d.ts.map +1 -1
  24. package/dest/mem_pools/attestation_pool/attestation_pool.js +6 -2
  25. package/dest/mem_pools/attestation_pool/attestation_pool_test_suite.d.ts +1 -1
  26. package/dest/mem_pools/attestation_pool/attestation_pool_test_suite.d.ts.map +1 -1
  27. package/dest/mem_pools/attestation_pool/attestation_pool_test_suite.js +65 -33
  28. package/dest/mem_pools/attestation_pool/index.js +0 -1
  29. package/dest/mem_pools/attestation_pool/kv_attestation_pool.d.ts +3 -3
  30. package/dest/mem_pools/attestation_pool/kv_attestation_pool.d.ts.map +1 -1
  31. package/dest/mem_pools/attestation_pool/kv_attestation_pool.js +23 -20
  32. package/dest/mem_pools/attestation_pool/memory_attestation_pool.d.ts +2 -2
  33. package/dest/mem_pools/attestation_pool/memory_attestation_pool.d.ts.map +1 -1
  34. package/dest/mem_pools/attestation_pool/memory_attestation_pool.js +22 -26
  35. package/dest/mem_pools/attestation_pool/mocks.d.ts +3 -2
  36. package/dest/mem_pools/attestation_pool/mocks.d.ts.map +1 -1
  37. package/dest/mem_pools/attestation_pool/mocks.js +12 -7
  38. package/dest/mem_pools/index.d.ts +2 -2
  39. package/dest/mem_pools/index.d.ts.map +1 -1
  40. package/dest/mem_pools/index.js +1 -2
  41. package/dest/mem_pools/instrumentation.d.ts +1 -1
  42. package/dest/mem_pools/instrumentation.d.ts.map +1 -1
  43. package/dest/mem_pools/instrumentation.js +35 -39
  44. package/dest/mem_pools/interface.d.ts +3 -3
  45. package/dest/mem_pools/interface.d.ts.map +1 -1
  46. package/dest/mem_pools/interface.js +3 -2
  47. package/dest/mem_pools/tx_pool/aztec_kv_tx_pool.d.ts +2 -2
  48. package/dest/mem_pools/tx_pool/aztec_kv_tx_pool.d.ts.map +1 -1
  49. package/dest/mem_pools/tx_pool/aztec_kv_tx_pool.js +129 -136
  50. package/dest/mem_pools/tx_pool/index.js +0 -1
  51. package/dest/mem_pools/tx_pool/memory_tx_pool.d.ts +2 -2
  52. package/dest/mem_pools/tx_pool/memory_tx_pool.d.ts.map +1 -1
  53. package/dest/mem_pools/tx_pool/memory_tx_pool.js +46 -44
  54. package/dest/mem_pools/tx_pool/priority.d.ts +1 -1
  55. package/dest/mem_pools/tx_pool/priority.d.ts.map +1 -1
  56. package/dest/mem_pools/tx_pool/priority.js +1 -3
  57. package/dest/mem_pools/tx_pool/tx_pool.d.ts +1 -1
  58. package/dest/mem_pools/tx_pool/tx_pool.d.ts.map +1 -1
  59. package/dest/mem_pools/tx_pool/tx_pool.js +3 -2
  60. package/dest/mem_pools/tx_pool/tx_pool_test_suite.d.ts +1 -1
  61. package/dest/mem_pools/tx_pool/tx_pool_test_suite.d.ts.map +1 -1
  62. package/dest/mem_pools/tx_pool/tx_pool_test_suite.js +109 -39
  63. package/dest/msg_validators/attestation_validator/attestation_validator.d.ts +2 -2
  64. package/dest/msg_validators/attestation_validator/attestation_validator.d.ts.map +1 -1
  65. package/dest/msg_validators/attestation_validator/attestation_validator.js +4 -4
  66. package/dest/msg_validators/attestation_validator/index.js +0 -1
  67. package/dest/msg_validators/block_proposal_validator/block_proposal_validator.d.ts +2 -2
  68. package/dest/msg_validators/block_proposal_validator/block_proposal_validator.d.ts.map +1 -1
  69. package/dest/msg_validators/block_proposal_validator/block_proposal_validator.js +3 -3
  70. package/dest/msg_validators/block_proposal_validator/index.js +0 -1
  71. package/dest/msg_validators/index.js +0 -1
  72. package/dest/msg_validators/tx_validator/aggregate_tx_validator.d.ts +1 -1
  73. package/dest/msg_validators/tx_validator/aggregate_tx_validator.d.ts.map +1 -1
  74. package/dest/msg_validators/tx_validator/aggregate_tx_validator.js +9 -11
  75. package/dest/msg_validators/tx_validator/block_header_validator.d.ts +2 -2
  76. package/dest/msg_validators/tx_validator/block_header_validator.d.ts.map +1 -1
  77. package/dest/msg_validators/tx_validator/block_header_validator.js +18 -13
  78. package/dest/msg_validators/tx_validator/data_validator.d.ts +1 -1
  79. package/dest/msg_validators/tx_validator/data_validator.d.ts.map +1 -1
  80. package/dest/msg_validators/tx_validator/data_validator.js +102 -33
  81. package/dest/msg_validators/tx_validator/double_spend_validator.d.ts +1 -1
  82. package/dest/msg_validators/tx_validator/double_spend_validator.d.ts.map +1 -1
  83. package/dest/msg_validators/tx_validator/double_spend_validator.js +34 -20
  84. package/dest/msg_validators/tx_validator/index.js +0 -1
  85. package/dest/msg_validators/tx_validator/metadata_validator.d.ts +2 -2
  86. package/dest/msg_validators/tx_validator/metadata_validator.d.ts.map +1 -1
  87. package/dest/msg_validators/tx_validator/metadata_validator.js +30 -27
  88. package/dest/msg_validators/tx_validator/tx_proof_validator.d.ts +2 -1
  89. package/dest/msg_validators/tx_validator/tx_proof_validator.d.ts.map +1 -1
  90. package/dest/msg_validators/tx_validator/tx_proof_validator.js +17 -12
  91. package/dest/services/data_store.js +57 -57
  92. package/dest/services/discv5/discV5_service.d.ts +2 -0
  93. package/dest/services/discv5/discV5_service.d.ts.map +1 -1
  94. package/dest/services/discv5/discV5_service.js +64 -36
  95. package/dest/services/dummy_service.d.ts +4 -2
  96. package/dest/services/dummy_service.d.ts.map +1 -1
  97. package/dest/services/dummy_service.js +41 -59
  98. package/dest/services/encoding.d.ts +3 -3
  99. package/dest/services/encoding.d.ts.map +1 -1
  100. package/dest/services/encoding.js +10 -9
  101. package/dest/services/gossipsub/scoring.d.ts +7 -0
  102. package/dest/services/gossipsub/scoring.d.ts.map +1 -0
  103. package/dest/services/gossipsub/scoring.js +10 -0
  104. package/dest/services/index.js +0 -1
  105. package/dest/services/libp2p/libp2p_service.d.ts +10 -33
  106. package/dest/services/libp2p/libp2p_service.d.ts.map +1 -1
  107. package/dest/services/libp2p/libp2p_service.js +682 -673
  108. package/dest/services/peer-manager/metrics.js +14 -7
  109. package/dest/services/peer-manager/peer_manager.d.ts +24 -6
  110. package/dest/services/peer-manager/peer_manager.d.ts.map +1 -1
  111. package/dest/services/peer-manager/peer_manager.js +390 -340
  112. package/dest/services/peer-manager/peer_scoring.d.ts +3 -3
  113. package/dest/services/peer-manager/peer_scoring.d.ts.map +1 -1
  114. package/dest/services/peer-manager/peer_scoring.js +21 -19
  115. package/dest/services/reqresp/config.js +4 -5
  116. package/dest/services/reqresp/connection-sampler/batch_connection_sampler.d.ts +2 -2
  117. package/dest/services/reqresp/connection-sampler/batch_connection_sampler.d.ts.map +1 -1
  118. package/dest/services/reqresp/connection-sampler/batch_connection_sampler.js +35 -28
  119. package/dest/services/reqresp/connection-sampler/connection_sampler.d.ts +1 -1
  120. package/dest/services/reqresp/connection-sampler/connection_sampler.d.ts.map +1 -1
  121. package/dest/services/reqresp/connection-sampler/connection_sampler.js +67 -61
  122. package/dest/services/reqresp/index.js +1 -3
  123. package/dest/services/reqresp/interface.d.ts +2 -2
  124. package/dest/services/reqresp/interface.d.ts.map +1 -1
  125. package/dest/services/reqresp/interface.js +27 -31
  126. package/dest/services/reqresp/metrics.d.ts +1 -1
  127. package/dest/services/reqresp/metrics.d.ts.map +1 -1
  128. package/dest/services/reqresp/metrics.js +23 -10
  129. package/dest/services/reqresp/protocols/block.d.ts +2 -2
  130. package/dest/services/reqresp/protocols/block.d.ts.map +1 -1
  131. package/dest/services/reqresp/protocols/block.js +1 -2
  132. package/dest/services/reqresp/protocols/goodbye.d.ts +5 -5
  133. package/dest/services/reqresp/protocols/goodbye.d.ts.map +1 -1
  134. package/dest/services/reqresp/protocols/goodbye.js +36 -41
  135. package/dest/services/reqresp/protocols/index.js +1 -3
  136. package/dest/services/reqresp/protocols/ping.js +1 -3
  137. package/dest/services/reqresp/protocols/status.js +1 -3
  138. package/dest/services/reqresp/protocols/tx.d.ts +3 -3
  139. package/dest/services/reqresp/protocols/tx.d.ts.map +1 -1
  140. package/dest/services/reqresp/protocols/tx.js +6 -9
  141. package/dest/services/reqresp/rate-limiter/index.js +0 -1
  142. package/dest/services/reqresp/rate-limiter/rate_limiter.d.ts +9 -9
  143. package/dest/services/reqresp/rate-limiter/rate_limiter.d.ts.map +1 -1
  144. package/dest/services/reqresp/rate-limiter/rate_limiter.js +53 -46
  145. package/dest/services/reqresp/rate-limiter/rate_limits.js +16 -17
  146. package/dest/services/reqresp/reqresp.d.ts +4 -4
  147. package/dest/services/reqresp/reqresp.d.ts.map +1 -1
  148. package/dest/services/reqresp/reqresp.js +467 -464
  149. package/dest/services/reqresp/status.js +16 -17
  150. package/dest/services/service.d.ts +3 -2
  151. package/dest/services/service.d.ts.map +1 -1
  152. package/dest/services/service.js +3 -4
  153. package/dest/test-helpers/generate-peer-id-private-keys.js +2 -4
  154. package/dest/test-helpers/get-ports.js +3 -3
  155. package/dest/test-helpers/index.js +0 -1
  156. package/dest/test-helpers/make-enrs.d.ts +1 -1
  157. package/dest/test-helpers/make-enrs.d.ts.map +1 -1
  158. package/dest/test-helpers/make-enrs.js +3 -6
  159. package/dest/test-helpers/make-test-p2p-clients.d.ts +7 -6
  160. package/dest/test-helpers/make-test-p2p-clients.d.ts.map +1 -1
  161. package/dest/test-helpers/make-test-p2p-clients.js +10 -12
  162. package/dest/test-helpers/reqresp-nodes.d.ts +18 -7
  163. package/dest/test-helpers/reqresp-nodes.d.ts.map +1 -1
  164. package/dest/test-helpers/reqresp-nodes.js +64 -40
  165. package/dest/testbench/p2p_client_testbench_worker.js +61 -45
  166. package/dest/testbench/parse_log_file.d.ts +2 -0
  167. package/dest/testbench/parse_log_file.d.ts.map +1 -0
  168. package/dest/testbench/parse_log_file.js +131 -0
  169. package/dest/testbench/testbench.d.ts +2 -0
  170. package/dest/testbench/testbench.d.ts.map +1 -0
  171. package/dest/testbench/testbench.js +141 -0
  172. package/dest/{services/types.d.ts → types/index.d.ts} +1 -1
  173. package/dest/types/index.d.ts.map +1 -0
  174. package/dest/types/index.js +28 -0
  175. package/dest/util.d.ts +5 -5
  176. package/dest/util.d.ts.map +1 -1
  177. package/dest/util.js +23 -34
  178. package/dest/versioning.d.ts +3 -3
  179. package/dest/versioning.d.ts.map +1 -1
  180. package/dest/versioning.js +7 -12
  181. package/package.json +15 -13
  182. package/src/bootstrap/bootstrap.ts +30 -17
  183. package/src/client/factory.ts +9 -12
  184. package/src/client/p2p_client.ts +13 -24
  185. package/src/config.ts +14 -15
  186. package/src/enr/generate-enr.ts +39 -0
  187. package/src/enr/index.ts +1 -0
  188. package/src/mem_pools/attestation_pool/attestation_pool.ts +1 -1
  189. package/src/mem_pools/attestation_pool/attestation_pool_test_suite.ts +4 -3
  190. package/src/mem_pools/attestation_pool/kv_attestation_pool.ts +3 -3
  191. package/src/mem_pools/attestation_pool/memory_attestation_pool.ts +2 -2
  192. package/src/mem_pools/attestation_pool/mocks.ts +5 -5
  193. package/src/mem_pools/index.ts +2 -2
  194. package/src/mem_pools/instrumentation.ts +4 -3
  195. package/src/mem_pools/interface.ts +3 -3
  196. package/src/mem_pools/tx_pool/aztec_kv_tx_pool.ts +4 -4
  197. package/src/mem_pools/tx_pool/memory_tx_pool.ts +3 -3
  198. package/src/mem_pools/tx_pool/priority.ts +1 -1
  199. package/src/mem_pools/tx_pool/tx_pool.ts +1 -1
  200. package/src/mem_pools/tx_pool/tx_pool_test_suite.ts +4 -3
  201. package/src/msg_validators/attestation_validator/attestation_validator.ts +2 -2
  202. package/src/msg_validators/block_proposal_validator/block_proposal_validator.ts +2 -2
  203. package/src/msg_validators/tx_validator/aggregate_tx_validator.ts +1 -1
  204. package/src/msg_validators/tx_validator/block_header_validator.ts +2 -2
  205. package/src/msg_validators/tx_validator/data_validator.ts +57 -4
  206. package/src/msg_validators/tx_validator/double_spend_validator.ts +17 -12
  207. package/src/msg_validators/tx_validator/metadata_validator.ts +2 -2
  208. package/src/msg_validators/tx_validator/tx_proof_validator.ts +2 -6
  209. package/src/services/discv5/discV5_service.ts +33 -8
  210. package/src/services/dummy_service.ts +4 -2
  211. package/src/services/encoding.ts +3 -3
  212. package/src/services/gossipsub/scoring.ts +13 -0
  213. package/src/services/libp2p/libp2p_service.ts +124 -146
  214. package/src/services/peer-manager/peer_manager.ts +71 -13
  215. package/src/services/peer-manager/peer_scoring.ts +3 -3
  216. package/src/services/reqresp/connection-sampler/batch_connection_sampler.ts +2 -2
  217. package/src/services/reqresp/connection-sampler/connection_sampler.ts +9 -3
  218. package/src/services/reqresp/interface.ts +4 -3
  219. package/src/services/reqresp/metrics.ts +1 -1
  220. package/src/services/reqresp/protocols/block.ts +3 -3
  221. package/src/services/reqresp/protocols/goodbye.ts +7 -7
  222. package/src/services/reqresp/protocols/tx.ts +5 -5
  223. package/src/services/reqresp/rate-limiter/rate_limiter.ts +22 -18
  224. package/src/services/reqresp/reqresp.ts +18 -11
  225. package/src/services/service.ts +3 -2
  226. package/src/test-helpers/make-enrs.ts +1 -1
  227. package/src/test-helpers/make-test-p2p-clients.ts +9 -7
  228. package/src/test-helpers/reqresp-nodes.ts +32 -18
  229. package/src/testbench/p2p_client_testbench_worker.ts +16 -9
  230. package/src/testbench/parse_log_file.ts +175 -0
  231. package/src/testbench/testbench.ts +157 -0
  232. package/src/util.ts +5 -5
  233. package/src/versioning.ts +7 -7
  234. package/dest/services/libp2p/libp2p_logger.d.ts +0 -7
  235. package/dest/services/libp2p/libp2p_logger.d.ts.map +0 -1
  236. package/dest/services/libp2p/libp2p_logger.js +0 -67
  237. package/dest/services/types.d.ts.map +0 -1
  238. package/dest/services/types.js +0 -35
  239. package/src/services/libp2p/libp2p_logger.ts +0 -78
  240. package/src/testbench/scripts/run_testbench.sh +0 -7
  241. /package/src/{services/types.ts → types/index.ts} +0 -0
@@ -1,11 +1,18 @@
1
- import { __esDecorate, __runInitializers } from "tslib";
2
- import { BlockAttestation, BlockProposal, MerkleTreeId, P2PClientType, PeerErrorSeverity, TopicTypeMap, Tx, getTopicTypeForClientType, metricsTopicStrToLabels, } from '@aztec/circuit-types';
3
- import { Fr } from '@aztec/circuits.js';
4
- import { createLogger } from '@aztec/foundation/log';
1
+ function _ts_decorate(decorators, target, key, desc) {
2
+ var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
3
+ if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
4
+ else for(var i = decorators.length - 1; i >= 0; i--)if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
5
+ return c > 3 && r && Object.defineProperty(target, key, r), r;
6
+ }
7
+ import { Fr } from '@aztec/foundation/fields';
8
+ import { createLibp2pComponentLogger, createLogger } from '@aztec/foundation/log';
5
9
  import { SerialQueue } from '@aztec/foundation/queue';
6
10
  import { RunningPromise } from '@aztec/foundation/running-promise';
11
+ import { BlockAttestation, BlockProposal, P2PClientType, PeerErrorSeverity, TopicTypeMap, getTopicTypeForClientType, metricsTopicStrToLabels } from '@aztec/stdlib/p2p';
12
+ import { MerkleTreeId } from '@aztec/stdlib/trees';
13
+ import { Tx } from '@aztec/stdlib/tx';
7
14
  import { Attributes, OtelMetricsAdapter, WithTracer, trackSpan } from '@aztec/telemetry-client';
8
- import { gossipsub, } from '@chainsafe/libp2p-gossipsub';
15
+ import { gossipsub } from '@chainsafe/libp2p-gossipsub';
9
16
  import { createPeerScoreParams, createTopicScoreParams } from '@chainsafe/libp2p-gossipsub/score';
10
17
  import { SignaturePolicy } from '@chainsafe/libp2p-gossipsub/types';
11
18
  import { noise } from '@chainsafe/libp2p-noise';
@@ -18,689 +25,691 @@ import { mplex } from '@libp2p/mplex';
18
25
  import { tcp } from '@libp2p/tcp';
19
26
  import { createLibp2p } from 'libp2p';
20
27
  import { AttestationValidator, BlockProposalValidator } from '../../msg_validators/index.js';
21
- import { DataTxValidator, DoubleSpendTxValidator, MetadataTxValidator, TxProofValidator, } from '../../msg_validators/tx_validator/index.js';
28
+ import { DataTxValidator, DoubleSpendTxValidator, MetadataTxValidator, TxProofValidator } from '../../msg_validators/tx_validator/index.js';
29
+ import { GossipSubEvent } from '../../types/index.js';
22
30
  import { convertToMultiaddr } from '../../util.js';
23
31
  import { AztecDatastore } from '../data_store.js';
24
32
  import { SnappyTransform, fastMsgIdFn, getMsgIdFn, msgIdToStrFn } from '../encoding.js';
33
+ import { gossipScoreThresholds } from '../gossipsub/scoring.js';
25
34
  import { PeerManager } from '../peer-manager/peer_manager.js';
26
35
  import { PeerScoring } from '../peer-manager/peer_scoring.js';
27
36
  import { DEFAULT_SUB_PROTOCOL_VALIDATORS, ReqRespSubProtocol } from '../reqresp/interface.js';
28
37
  import { reqGoodbyeHandler } from '../reqresp/protocols/goodbye.js';
29
38
  import { pingHandler, reqRespBlockHandler, reqRespTxHandler, statusHandler } from '../reqresp/protocols/index.js';
30
39
  import { ReqResp } from '../reqresp/reqresp.js';
31
- import { GossipSubEvent } from '../types.js';
32
- import { createLibp2pComponentLogger } from './libp2p_logger.js';
33
40
  /**
34
41
  * Lib P2P implementation of the P2PService interface.
35
- */
36
- let LibP2PService = (() => {
37
- var _a;
38
- let _classSuper = WithTracer;
39
- let _instanceExtraInitializers = [];
40
- let _processAttestationFromPeer_decorators;
41
- let _processBlockFromPeer_decorators;
42
- let _broadcastAttestation_decorators;
43
- let _validateRequestedTx_decorators;
44
- let _validatePropagatedTx_decorators;
45
- let _validateAttestation_decorators;
46
- let _validateBlockProposal_decorators;
47
- return _a = class LibP2PService extends _classSuper {
48
- constructor(clientType, config, node, peerDiscoveryService, mempools, l2BlockSource, epochCache, proofVerifier, worldStateSynchronizer, telemetry, logger = createLogger('p2p:libp2p_service')) {
49
- super(telemetry, 'LibP2PService');
50
- this.clientType = (__runInitializers(this, _instanceExtraInitializers), clientType);
51
- this.config = config;
52
- this.node = node;
53
- this.peerDiscoveryService = peerDiscoveryService;
54
- this.mempools = mempools;
55
- this.l2BlockSource = l2BlockSource;
56
- this.proofVerifier = proofVerifier;
57
- this.worldStateSynchronizer = worldStateSynchronizer;
58
- this.logger = logger;
59
- this.jobQueue = new SerialQueue();
60
- const peerScoring = new PeerScoring(config);
61
- this.reqresp = new ReqResp(config, node, peerScoring);
62
- this.peerManager = new PeerManager(node, peerDiscoveryService, config, telemetry, createLogger(`${logger.module}:peer_manager`), peerScoring, this.reqresp);
63
- // Update gossipsub score params
64
- this.node.services.pubsub.score.params.appSpecificScore = (peerId) => {
65
- return this.peerManager.getPeerScore(peerId);
66
- };
67
- this.node.services.pubsub.score.params.appSpecificWeight = 10;
68
- this.attestationValidator = new AttestationValidator(epochCache);
69
- this.blockProposalValidator = new BlockProposalValidator(epochCache);
70
- this.blockReceivedCallback = async (block) => {
71
- this.logger.warn(`Handler not yet registered: Block received callback not set. Received block for slot ${block.slotNumber.toNumber()} from peer.`, { p2pMessageIdentifier: await block.p2pMessageIdentifier() });
72
- return undefined;
73
- };
74
- }
75
- /**
76
- * Creates an instance of the LibP2P service.
77
- * @param config - The configuration to use when creating the service.
78
- * @param txPool - The transaction pool to be accessed by the service.
79
- * @returns The new service.
80
- */
81
- static async new(clientType, config, peerDiscoveryService, peerId, mempools, l2BlockSource, epochCache, proofVerifier, worldStateSynchronizer, store, telemetry, logger = createLogger('p2p:libp2p_service')) {
82
- const { tcpListenAddress, tcpAnnounceAddress, maxPeerCount } = config;
83
- const bindAddrTcp = convertToMultiaddr(tcpListenAddress, 'tcp');
84
- // We know tcpAnnounceAddress cannot be null here because we set it or throw when setting up the service.
85
- const announceAddrTcp = convertToMultiaddr(tcpAnnounceAddress, 'tcp');
86
- const datastore = new AztecDatastore(store);
87
- const otelMetricsAdapter = new OtelMetricsAdapter(telemetry);
88
- // If bootstrap nodes are provided, also provide them to the p2p service
89
- const peerDiscovery = [];
90
- if (peerDiscoveryService.bootstrapNodes.length > 0) {
91
- peerDiscovery.push(bootstrap({ list: peerDiscoveryService.bootstrapNodes }));
92
- }
93
- const node = await createLibp2p({
94
- start: false,
95
- peerId,
96
- addresses: {
97
- listen: [bindAddrTcp],
98
- announce: [announceAddrTcp],
99
- },
100
- transports: [
101
- tcp({
102
- maxConnections: config.maxPeerCount,
103
- // socket option: the maximum length of the queue of pending connections
104
- // https://nodejs.org/dist/latest-v18.x/docs/api/net.html#serverlisten
105
- // it's not safe if we increase this number
106
- backlog: 5,
107
- closeServerOnMaxConnections: {
108
- closeAbove: maxPeerCount ?? Infinity,
109
- listenBelow: maxPeerCount ?? Infinity,
110
- },
111
- }),
112
- ],
113
- datastore,
114
- peerDiscovery,
115
- streamMuxers: [mplex(), yamux()],
116
- connectionEncryption: [noise()],
117
- connectionManager: {
118
- minConnections: 0,
119
- maxConnections: maxPeerCount,
120
- maxParallelDials: 100,
121
- maxPeerAddrsToDial: 5,
122
- maxIncomingPendingConnections: 5,
123
- },
124
- services: {
125
- identify: identify({
126
- protocolPrefix: 'aztec',
127
- }),
128
- pubsub: gossipsub({
129
- debugName: 'gossipsub',
130
- globalSignaturePolicy: SignaturePolicy.StrictNoSign,
131
- allowPublishToZeroTopicPeers: true,
132
- floodPublish: config.gossipsubFloodPublish,
133
- D: config.gossipsubD,
134
- Dlo: config.gossipsubDlo,
135
- Dhi: config.gossipsubDhi,
136
- Dlazy: config.gossipsubDLazy,
137
- heartbeatInterval: config.gossipsubInterval,
138
- mcacheLength: config.gossipsubMcacheLength,
139
- mcacheGossip: config.gossipsubMcacheGossip,
140
- // Increased from default 3s to give time for input lag: configuration and rationale from lodestar
141
- gossipsubIWantFollowupMs: 12 * 1000,
142
- msgIdFn: getMsgIdFn,
143
- msgIdToStrFn: msgIdToStrFn,
144
- fastMsgIdFn: fastMsgIdFn,
145
- dataTransform: new SnappyTransform(),
146
- metricsRegister: otelMetricsAdapter,
147
- metricsTopicStrToLabel: metricsTopicStrToLabels(),
148
- asyncValidation: true,
149
- scoreParams: createPeerScoreParams({
150
- // IPColocation factor can be disabled for local testing - default to -5
151
- IPColocationFactorWeight: config.debugDisableColocationPenalty ? 0 : -5.0,
152
- topics: {
153
- [Tx.p2pTopic]: createTopicScoreParams({
154
- topicWeight: 1,
155
- invalidMessageDeliveriesWeight: -20,
156
- invalidMessageDeliveriesDecay: 0.5,
157
- }),
158
- [BlockAttestation.p2pTopic]: createTopicScoreParams({
159
- topicWeight: 1,
160
- invalidMessageDeliveriesWeight: -20,
161
- invalidMessageDeliveriesDecay: 0.5,
162
- }),
163
- [BlockAttestation.p2pTopic]: createTopicScoreParams({
164
- topicWeight: 1,
165
- invalidMessageDeliveriesWeight: -20,
166
- invalidMessageDeliveriesDecay: 0.5,
167
- }),
168
- },
169
- }),
170
- }),
171
- components: (components) => ({
172
- connectionManager: components.connectionManager,
173
- }),
174
- },
175
- // Fix the peer id in libp2p logs so we can see the source of the log
176
- logger: createLibp2pComponentLogger(logger.module, { sourcePeerId: peerId }),
177
- });
178
- return new _a(clientType, config, node, peerDiscoveryService, mempools, l2BlockSource, epochCache, proofVerifier, worldStateSynchronizer, telemetry, logger);
179
- }
180
- /**
181
- * Starts the LibP2P service.
182
- * @returns An empty promise.
183
- */
184
- async start() {
185
- // Check if service is already started
186
- if (this.node.status === 'started') {
187
- throw new Error('P2P service already started');
188
- }
189
- // Get listen & announce addresses for logging
190
- const { tcpListenAddress, tcpAnnounceAddress } = this.config;
191
- if (!tcpAnnounceAddress) {
192
- throw new Error('Announce address not provided.');
193
- }
194
- const announceTcpMultiaddr = convertToMultiaddr(tcpAnnounceAddress, 'tcp');
195
- // Start job queue, peer discovery service and libp2p node
196
- this.jobQueue.start();
197
- await this.peerDiscoveryService.start();
198
- await this.node.start();
199
- // Subscribe to standard GossipSub topics by default
200
- for (const topic of getTopicTypeForClientType(this.clientType)) {
201
- this.subscribeToTopic(TopicTypeMap[topic].p2pTopic);
202
- }
203
- // Create request response protocol handlers
204
- const txHandler = reqRespTxHandler(this.mempools);
205
- const goodbyeHandler = reqGoodbyeHandler(this.peerManager);
206
- const blockHandler = reqRespBlockHandler(this.l2BlockSource);
207
- const requestResponseHandlers = {
208
- [ReqRespSubProtocol.PING]: pingHandler,
209
- [ReqRespSubProtocol.STATUS]: statusHandler,
210
- [ReqRespSubProtocol.TX]: txHandler.bind(this),
211
- [ReqRespSubProtocol.GOODBYE]: goodbyeHandler.bind(this),
212
- [ReqRespSubProtocol.BLOCK]: blockHandler.bind(this),
213
- };
214
- // Add p2p topic validators
215
- // As they are stored within a kv pair, there is no need to register them conditionally
216
- // based on the client type
217
- const topicValidators = {
218
- [Tx.p2pTopic]: this.validatePropagatedTxFromMessage.bind(this),
219
- [BlockAttestation.p2pTopic]: this.validatePropagatedAttestationFromMessage.bind(this),
220
- [BlockProposal.p2pTopic]: this.validatePropagatedBlockFromMessage.bind(this),
221
- };
222
- // When running bandwidth benchmarks, we use send blobs of data we do not want to validate
223
- // NEVER switch this off in production
224
- if (!this.config.debugDisableMessageValidation) {
225
- for (const [topic, validator] of Object.entries(topicValidators)) {
226
- this.node.services.pubsub.topicValidators.set(topic, validator);
42
+ */ export class LibP2PService extends WithTracer {
43
+ clientType;
44
+ config;
45
+ node;
46
+ peerDiscoveryService;
47
+ mempools;
48
+ l2BlockSource;
49
+ proofVerifier;
50
+ worldStateSynchronizer;
51
+ logger;
52
+ jobQueue;
53
+ peerManager;
54
+ discoveryRunningPromise;
55
+ // Message validators
56
+ attestationValidator;
57
+ blockProposalValidator;
58
+ // Request and response sub service
59
+ reqresp;
60
+ /**
61
+ * Callback for when a block is received from a peer.
62
+ * @param block - The block received from the peer.
63
+ * @returns The attestation for the block, if any.
64
+ */ blockReceivedCallback;
65
+ constructor(clientType, config, node, peerDiscoveryService, mempools, l2BlockSource, epochCache, proofVerifier, worldStateSynchronizer, telemetry, logger = createLogger('p2p:libp2p_service')){
66
+ super(telemetry, 'LibP2PService'), this.clientType = clientType, this.config = config, this.node = node, this.peerDiscoveryService = peerDiscoveryService, this.mempools = mempools, this.l2BlockSource = l2BlockSource, this.proofVerifier = proofVerifier, this.worldStateSynchronizer = worldStateSynchronizer, this.logger = logger, this.jobQueue = new SerialQueue();
67
+ const peerScoring = new PeerScoring(config);
68
+ this.reqresp = new ReqResp(config, node, peerScoring);
69
+ this.peerManager = new PeerManager(node, peerDiscoveryService, config, telemetry, createLogger(`${logger.module}:peer_manager`), peerScoring, this.reqresp);
70
+ // Update gossipsub score params
71
+ this.node.services.pubsub.score.params.appSpecificScore = (peerId)=>{
72
+ return this.peerManager.getPeerScore(peerId);
73
+ };
74
+ this.node.services.pubsub.score.params.appSpecificWeight = 10;
75
+ this.attestationValidator = new AttestationValidator(epochCache);
76
+ this.blockProposalValidator = new BlockProposalValidator(epochCache);
77
+ this.blockReceivedCallback = async (block)=>{
78
+ this.logger.warn(`Handler not yet registered: Block received callback not set. Received block for slot ${block.slotNumber.toNumber()} from peer.`, {
79
+ p2pMessageIdentifier: await block.p2pMessageIdentifier()
80
+ });
81
+ return undefined;
82
+ };
83
+ }
84
+ /**
85
+ * Creates an instance of the LibP2P service.
86
+ * @param config - The configuration to use when creating the service.
87
+ * @param txPool - The transaction pool to be accessed by the service.
88
+ * @returns The new service.
89
+ */ static async new(clientType, config, peerDiscoveryService, peerId, mempools, l2BlockSource, epochCache, proofVerifier, worldStateSynchronizer, store, telemetry, logger = createLogger('p2p:libp2p_service')) {
90
+ const { tcpListenAddress, tcpAnnounceAddress, maxPeerCount } = config;
91
+ const bindAddrTcp = convertToMultiaddr(tcpListenAddress, 'tcp');
92
+ // We know tcpAnnounceAddress cannot be null here because we set it or throw when setting up the service.
93
+ const announceAddrTcp = convertToMultiaddr(tcpAnnounceAddress, 'tcp');
94
+ const datastore = new AztecDatastore(store);
95
+ const otelMetricsAdapter = new OtelMetricsAdapter(telemetry);
96
+ // If bootstrap nodes are provided, also provide them to the p2p service
97
+ const peerDiscovery = [];
98
+ if (peerDiscoveryService.bootstrapNodes.length > 0) {
99
+ peerDiscovery.push(bootstrap({
100
+ list: peerDiscoveryService.bootstrapNodes
101
+ }));
102
+ }
103
+ const node = await createLibp2p({
104
+ start: false,
105
+ peerId,
106
+ addresses: {
107
+ listen: [
108
+ bindAddrTcp
109
+ ],
110
+ announce: [
111
+ announceAddrTcp
112
+ ]
113
+ },
114
+ transports: [
115
+ tcp({
116
+ maxConnections: config.maxPeerCount,
117
+ // socket option: the maximum length of the queue of pending connections
118
+ // https://nodejs.org/dist/latest-v18.x/docs/api/net.html#serverlisten
119
+ // it's not safe if we increase this number
120
+ backlog: 5,
121
+ closeServerOnMaxConnections: {
122
+ closeAbove: maxPeerCount ?? Infinity,
123
+ listenBelow: maxPeerCount ?? Infinity
227
124
  }
228
- }
229
- else {
230
- this.logger.warn('MESSAGE VALIDATION DISABLED - IF YOU SEE THIS LOG AND ARE NOT DEBUGGING AND ARE RUNNING IN A PRODUCTION ENVIRONMENT, PLEASE RE-ENABLE MESSAGE VALIDATION');
231
- }
232
- // add GossipSub listener
233
- this.node.services.pubsub.addEventListener(GossipSubEvent.MESSAGE, this.handleGossipSubEvent.bind(this));
234
- // Start running promise for peer discovery
235
- this.discoveryRunningPromise = new RunningPromise(() => this.peerManager.heartbeat(), this.logger, this.config.peerCheckIntervalMS);
236
- this.discoveryRunningPromise.start();
237
- // Define the sub protocol validators - This is done within this start() method to gain a callback to the existing validateTx function
238
- const reqrespSubProtocolValidators = {
239
- ...DEFAULT_SUB_PROTOCOL_VALIDATORS,
240
- // TODO(#11336): A request validator for blocks
241
- [ReqRespSubProtocol.TX]: this.validateRequestedTx.bind(this),
242
- };
243
- await this.reqresp.start(requestResponseHandlers, reqrespSubProtocolValidators);
244
- this.logger.info(`Started P2P service`, {
245
- listen: tcpListenAddress,
246
- announce: announceTcpMultiaddr,
247
- peerId: this.node.peerId.toString(),
248
- });
249
- }
250
- /**
251
- * Stops the LibP2P service.
252
- * @returns An empty promise.
253
- */
254
- async stop() {
255
- // Remove gossip sub listener
256
- this.node.services.pubsub.removeEventListener(GossipSubEvent.MESSAGE, this.handleGossipSubEvent.bind(this));
257
- // Stop peer manager
258
- this.logger.debug('Stopping peer manager...');
259
- await this.peerManager.stop();
260
- this.logger.debug('Stopping job queue...');
261
- await this.jobQueue.end();
262
- this.logger.debug('Stopping running promise...');
263
- await this.discoveryRunningPromise?.stop();
264
- this.logger.debug('Stopping peer discovery service...');
265
- await this.peerDiscoveryService.stop();
266
- this.logger.debug('Request response service stopped...');
267
- await this.reqresp.stop();
268
- this.logger.debug('Stopping LibP2P...');
269
- await this.stopLibP2P();
270
- this.logger.info('LibP2P service stopped');
271
- }
272
- getPeers(includePending) {
273
- return this.peerManager.getPeers(includePending);
274
- }
275
- handleGossipSubEvent(e) {
276
- const { msg } = e.detail;
277
- this.logger.trace(`Received PUBSUB message.`);
278
- void this.jobQueue
279
- .put(() => this.handleNewGossipMessage(msg))
280
- .catch(err => this.logger.error(`Error processing gossip message`, err));
281
- }
282
- /**
283
- * Send Request via the ReqResp service
284
- * The subprotocol defined will determine the request and response types
285
- *
286
- * See the subProtocolMap for the mapping of subprotocols to request/response types in `interface.ts`
287
- *
288
- * @param protocol The request response protocol to use
289
- * @param request The request type to send
290
- * @returns
291
- */
292
- sendRequest(protocol, request) {
293
- return this.reqresp.sendRequest(protocol, request);
294
- }
295
- /**
296
- * Send a batch of requests to peers, and return the responses
297
- * @param protocol - The request response protocol to use
298
- * @param requests - The requests to send to the peers
299
- * @returns The responses to the requests
300
- */
301
- sendBatchRequest(protocol, requests) {
302
- return this.reqresp.sendBatchRequest(protocol, requests);
303
- }
304
- /**
305
- * Get the ENR of the node
306
- * @returns The ENR of the node
307
- */
308
- getEnr() {
309
- return this.peerDiscoveryService.getEnr();
310
- }
311
- registerBlockReceivedCallback(callback) {
312
- this.blockReceivedCallback = callback;
313
- this.logger.verbose('Block received callback registered');
314
- }
315
- /**
316
- * Subscribes to a topic.
317
- * @param topic - The topic to subscribe to.
318
- */
319
- subscribeToTopic(topic) {
320
- if (!this.node.services.pubsub) {
321
- throw new Error('Pubsub service not available.');
322
- }
323
- void this.node.services.pubsub.subscribe(topic);
324
- }
325
- /**
326
- * Publishes data to a topic.
327
- * @param topic - The topic to publish to.
328
- * @param data - The data to publish.
329
- * @returns The number of recipients the data was sent to.
330
- */
331
- async publishToTopic(topic, data) {
332
- if (!this.node.services.pubsub) {
333
- throw new Error('Pubsub service not available.');
334
- }
335
- const result = await this.node.services.pubsub.publish(topic, data);
336
- return result.recipients.length;
337
- }
338
- /**
339
- * Handles a new gossip message that was received by the client.
340
- * @param topic - The message's topic.
341
- * @param data - The message data
342
- */
343
- async handleNewGossipMessage(message) {
344
- if (message.topic === Tx.p2pTopic) {
345
- const tx = Tx.fromBuffer(Buffer.from(message.data));
346
- await this.processTxFromPeer(tx);
347
- }
348
- if (message.topic === BlockAttestation.p2pTopic && this.clientType === P2PClientType.Full) {
349
- const attestation = BlockAttestation.fromBuffer(Buffer.from(message.data));
350
- await this.processAttestationFromPeer(attestation);
351
- }
352
- if (message.topic == BlockProposal.p2pTopic) {
353
- const block = BlockProposal.fromBuffer(Buffer.from(message.data));
354
- await this.processBlockFromPeer(block);
355
- }
356
- return;
357
- }
358
- /**Process Attestation From Peer
359
- * When a proposal is received from a peer, we add it to the attestation pool, so it can be accessed by other services.
360
- *
361
- * @param attestation - The attestation to process.
362
- */
363
- async processAttestationFromPeer(attestation) {
364
- this.logger.debug(`Received attestation for block ${attestation.blockNumber.toNumber()} slot ${attestation.slotNumber.toNumber()} from external peer.`, {
365
- p2pMessageIdentifier: await attestation.p2pMessageIdentifier(),
366
- slot: attestation.slotNumber.toNumber(),
367
- archive: attestation.archive.toString(),
368
- block: attestation.blockNumber.toNumber(),
369
- });
370
- await this.mempools.attestationPool.addAttestations([attestation]);
371
- }
372
- /**Process block from peer
373
- *
374
- * Pass the received block to the validator client
375
- *
376
- * @param block - The block to process.
377
- */
378
- // REVIEW: callback pattern https://github.com/AztecProtocol/aztec-packages/issues/7963
379
- async processBlockFromPeer(block) {
380
- this.logger.verbose(`Received block ${block.blockNumber.toNumber()} for slot ${block.slotNumber.toNumber()} from external peer.`, {
381
- p2pMessageIdentifier: await block.p2pMessageIdentifier(),
382
- slot: block.slotNumber.toNumber(),
383
- archive: block.archive.toString(),
384
- block: block.blockNumber.toNumber(),
385
- });
386
- const attestation = await this.blockReceivedCallback(block);
387
- // TODO: fix up this pattern - the abstraction is not nice
388
- // The attestation can be undefined if no handler is registered / the validator deems the block invalid
389
- if (attestation != undefined) {
390
- this.logger.verbose(`Broadcasting attestation for block ${attestation.blockNumber.toNumber()} slot ${attestation.slotNumber.toNumber()}`, {
391
- p2pMessageIdentifier: await attestation.p2pMessageIdentifier(),
392
- slot: attestation.slotNumber.toNumber(),
393
- archive: attestation.archive.toString(),
394
- block: attestation.blockNumber.toNumber(),
395
- });
396
- await this.broadcastAttestation(attestation);
397
- }
398
- }
399
- /**
400
- * Broadcast an attestation to all peers.
401
- * @param attestation - The attestation to broadcast.
402
- */
403
- async broadcastAttestation(attestation) {
404
- await this.propagate(attestation);
405
- }
406
- /**
407
- * Propagates provided message to peers.
408
- * @param message - The message to propagate.
409
- */
410
- async propagate(message) {
411
- const p2pMessageIdentifier = await message.p2pMessageIdentifier();
412
- this.logger.trace(`Message ${p2pMessageIdentifier} queued`, { p2pMessageIdentifier });
413
- void this.jobQueue.put(async () => {
414
- await this.sendToPeers(message);
415
- });
416
- }
417
- async processTxFromPeer(tx) {
418
- const txHash = await tx.getTxHash();
419
- const txHashString = txHash.toString();
420
- this.logger.verbose(`Received tx ${txHashString} from external peer.`);
421
- await this.mempools.txPool.addTxs([tx]);
125
+ })
126
+ ],
127
+ datastore,
128
+ peerDiscovery,
129
+ streamMuxers: [
130
+ mplex(),
131
+ yamux()
132
+ ],
133
+ connectionEncryption: [
134
+ noise()
135
+ ],
136
+ connectionManager: {
137
+ minConnections: 0,
138
+ maxParallelDials: 100,
139
+ dialTimeout: 30_000,
140
+ maxPeerAddrsToDial: 5,
141
+ maxIncomingPendingConnections: 5
142
+ },
143
+ services: {
144
+ identify: identify({
145
+ protocolPrefix: 'aztec'
146
+ }),
147
+ pubsub: gossipsub({
148
+ debugName: 'gossipsub',
149
+ globalSignaturePolicy: SignaturePolicy.StrictNoSign,
150
+ allowPublishToZeroTopicPeers: true,
151
+ floodPublish: config.gossipsubFloodPublish,
152
+ D: config.gossipsubD,
153
+ Dlo: config.gossipsubDlo,
154
+ Dhi: config.gossipsubDhi,
155
+ Dlazy: config.gossipsubDLazy,
156
+ heartbeatInterval: config.gossipsubInterval,
157
+ mcacheLength: config.gossipsubMcacheLength,
158
+ mcacheGossip: config.gossipsubMcacheGossip,
159
+ msgIdFn: getMsgIdFn,
160
+ msgIdToStrFn: msgIdToStrFn,
161
+ fastMsgIdFn: fastMsgIdFn,
162
+ dataTransform: new SnappyTransform(),
163
+ metricsRegister: otelMetricsAdapter,
164
+ metricsTopicStrToLabel: metricsTopicStrToLabels(),
165
+ asyncValidation: true,
166
+ scoreThresholds: gossipScoreThresholds,
167
+ scoreParams: createPeerScoreParams({
168
+ // IPColocation factor can be disabled for local testing - default to -5
169
+ IPColocationFactorWeight: config.debugDisableColocationPenalty ? 0 : -5.0,
170
+ topics: {
171
+ [Tx.p2pTopic]: createTopicScoreParams({
172
+ topicWeight: 1,
173
+ invalidMessageDeliveriesWeight: -20,
174
+ invalidMessageDeliveriesDecay: 0.5
175
+ }),
176
+ [BlockAttestation.p2pTopic]: createTopicScoreParams({
177
+ topicWeight: 1,
178
+ invalidMessageDeliveriesWeight: -20,
179
+ invalidMessageDeliveriesDecay: 0.5
180
+ }),
181
+ [BlockProposal.p2pTopic]: createTopicScoreParams({
182
+ topicWeight: 1,
183
+ invalidMessageDeliveriesWeight: -20,
184
+ invalidMessageDeliveriesDecay: 0.5
185
+ })
186
+ }
187
+ })
188
+ }),
189
+ components: (components)=>({
190
+ connectionManager: components.connectionManager
191
+ })
192
+ },
193
+ logger: createLibp2pComponentLogger(logger.module)
194
+ });
195
+ return new LibP2PService(clientType, config, node, peerDiscoveryService, mempools, l2BlockSource, epochCache, proofVerifier, worldStateSynchronizer, telemetry, logger);
196
+ }
197
+ /**
198
+ * Starts the LibP2P service.
199
+ * @returns An empty promise.
200
+ */ async start() {
201
+ // Check if service is already started
202
+ if (this.node.status === 'started') {
203
+ throw new Error('P2P service already started');
204
+ }
205
+ // Get listen & announce addresses for logging
206
+ const { tcpListenAddress, tcpAnnounceAddress } = this.config;
207
+ if (!tcpAnnounceAddress) {
208
+ throw new Error('Announce address not provided.');
209
+ }
210
+ const announceTcpMultiaddr = convertToMultiaddr(tcpAnnounceAddress, 'tcp');
211
+ // Start job queue, peer discovery service and libp2p node
212
+ this.jobQueue.start();
213
+ await this.peerDiscoveryService.start();
214
+ await this.node.start();
215
+ // Subscribe to standard GossipSub topics by default
216
+ for (const topic of getTopicTypeForClientType(this.clientType)){
217
+ this.subscribeToTopic(TopicTypeMap[topic].p2pTopic);
218
+ }
219
+ // Create request response protocol handlers
220
+ const txHandler = reqRespTxHandler(this.mempools);
221
+ const goodbyeHandler = reqGoodbyeHandler(this.peerManager);
222
+ const blockHandler = reqRespBlockHandler(this.l2BlockSource);
223
+ const requestResponseHandlers = {
224
+ [ReqRespSubProtocol.PING]: pingHandler,
225
+ [ReqRespSubProtocol.STATUS]: statusHandler,
226
+ [ReqRespSubProtocol.TX]: txHandler.bind(this),
227
+ [ReqRespSubProtocol.GOODBYE]: goodbyeHandler.bind(this),
228
+ [ReqRespSubProtocol.BLOCK]: blockHandler.bind(this)
229
+ };
230
+ // add GossipSub listener
231
+ this.node.services.pubsub.addEventListener(GossipSubEvent.MESSAGE, this.handleGossipSubEvent.bind(this));
232
+ // Start running promise for peer discovery
233
+ this.discoveryRunningPromise = new RunningPromise(()=>this.peerManager.heartbeat(), this.logger, this.config.peerCheckIntervalMS);
234
+ this.discoveryRunningPromise.start();
235
+ // Define the sub protocol validators - This is done within this start() method to gain a callback to the existing validateTx function
236
+ const reqrespSubProtocolValidators = {
237
+ ...DEFAULT_SUB_PROTOCOL_VALIDATORS,
238
+ // TODO(#11336): A request validator for blocks
239
+ [ReqRespSubProtocol.TX]: this.validateRequestedTx.bind(this)
240
+ };
241
+ await this.reqresp.start(requestResponseHandlers, reqrespSubProtocolValidators);
242
+ this.logger.info(`Started P2P service`, {
243
+ listen: tcpListenAddress,
244
+ announce: announceTcpMultiaddr,
245
+ peerId: this.node.peerId.toString()
246
+ });
247
+ }
248
+ /**
249
+ * Stops the LibP2P service.
250
+ * @returns An empty promise.
251
+ */ async stop() {
252
+ // Remove gossip sub listener
253
+ this.node.services.pubsub.removeEventListener(GossipSubEvent.MESSAGE, this.handleGossipSubEvent.bind(this));
254
+ // Stop peer manager
255
+ this.logger.debug('Stopping peer manager...');
256
+ await this.peerManager.stop();
257
+ this.logger.debug('Stopping job queue...');
258
+ await this.jobQueue.end();
259
+ this.logger.debug('Stopping running promise...');
260
+ await this.discoveryRunningPromise?.stop();
261
+ this.logger.debug('Stopping peer discovery service...');
262
+ await this.peerDiscoveryService.stop();
263
+ this.logger.debug('Request response service stopped...');
264
+ await this.reqresp.stop();
265
+ this.logger.debug('Stopping LibP2P...');
266
+ await this.stopLibP2P();
267
+ this.logger.info('LibP2P service stopped');
268
+ }
269
+ getPeers(includePending) {
270
+ return this.peerManager.getPeers(includePending);
271
+ }
272
+ handleGossipSubEvent(e) {
273
+ this.logger.trace(`Received PUBSUB message.`);
274
+ const safeJob = async ()=>{
275
+ try {
276
+ await this.handleNewGossipMessage(e.detail.msg, e.detail.msgId, e.detail.propagationSource);
277
+ } catch (err) {
278
+ this.logger.error(`Error handling gossipsub message: ${err}`);
422
279
  }
423
- /**
424
- * Validate a tx that has been requested from a peer.
425
- *
426
- * The core component of this validator is that the tx hash MUST match the requested tx hash,
427
- * In order to perform this check, the tx proof must be verified.
428
- *
429
- * Note: This function is called from within `ReqResp.sendRequest` as part of the
430
- * ReqRespSubProtocol.TX subprotocol validation.
431
- *
432
- * @param requestedTxHash - The hash of the tx that was requested.
433
- * @param responseTx - The tx that was received as a response to the request.
434
- * @param peerId - The peer ID of the peer that sent the tx.
435
- * @returns True if the tx is valid, false otherwise.
436
- */
437
- async validateRequestedTx(requestedTxHash, responseTx, peerId) {
438
- const proofValidator = new TxProofValidator(this.proofVerifier);
439
- const validProof = await proofValidator.validateTx(responseTx);
440
- // If the node returns the wrong data, we penalize it
441
- if (!requestedTxHash.equals(await responseTx.getTxHash())) {
442
- // Returning the wrong data is a low tolerance error
443
- this.peerManager.penalizePeer(peerId, PeerErrorSeverity.MidToleranceError);
444
- return false;
445
- }
446
- if (validProof.result === 'invalid') {
447
- // If the proof is invalid, but the txHash is correct, then this is an active attack and we severly punish
448
- this.peerManager.penalizePeer(peerId, PeerErrorSeverity.LowToleranceError);
449
- return false;
450
- }
280
+ };
281
+ setImmediate(()=>void safeJob());
282
+ }
283
+ /**
284
+ * Send Request via the ReqResp service
285
+ * The subprotocol defined will determine the request and response types
286
+ *
287
+ * See the subProtocolMap for the mapping of subprotocols to request/response types in `interface.ts`
288
+ *
289
+ * @param protocol The request response protocol to use
290
+ * @param request The request type to send
291
+ * @returns
292
+ */ sendRequest(protocol, request) {
293
+ return this.reqresp.sendRequest(protocol, request);
294
+ }
295
+ /**
296
+ * Send a batch of requests to peers, and return the responses
297
+ * @param protocol - The request response protocol to use
298
+ * @param requests - The requests to send to the peers
299
+ * @returns The responses to the requests
300
+ */ sendBatchRequest(protocol, requests) {
301
+ return this.reqresp.sendBatchRequest(protocol, requests);
302
+ }
303
+ /**
304
+ * Get the ENR of the node
305
+ * @returns The ENR of the node
306
+ */ getEnr() {
307
+ return this.peerDiscoveryService.getEnr();
308
+ }
309
+ registerBlockReceivedCallback(callback) {
310
+ this.blockReceivedCallback = callback;
311
+ this.logger.verbose('Block received callback registered');
312
+ }
313
+ /**
314
+ * Subscribes to a topic.
315
+ * @param topic - The topic to subscribe to.
316
+ */ subscribeToTopic(topic) {
317
+ if (!this.node.services.pubsub) {
318
+ throw new Error('Pubsub service not available.');
319
+ }
320
+ void this.node.services.pubsub.subscribe(topic);
321
+ }
322
+ /**
323
+ * Publishes data to a topic.
324
+ * @param topic - The topic to publish to.
325
+ * @param data - The data to publish.
326
+ * @returns The number of recipients the data was sent to.
327
+ */ async publishToTopic(topic, data) {
328
+ if (!this.node.services.pubsub) {
329
+ throw new Error('Pubsub service not available.');
330
+ }
331
+ const result = await this.node.services.pubsub.publish(topic, data);
332
+ return result.recipients.length;
333
+ }
334
+ /**
335
+ * Handles a new gossip message that was received by the client.
336
+ * @param topic - The message's topic.
337
+ * @param data - The message data
338
+ */ async handleNewGossipMessage(msg, msgId, source) {
339
+ if (msg.topic === Tx.p2pTopic) {
340
+ await this.handleGossipedTx(msg, msgId, source);
341
+ }
342
+ if (msg.topic === BlockAttestation.p2pTopic && this.clientType === P2PClientType.Full) {
343
+ await this.processAttestationFromPeer(msg, msgId, source);
344
+ }
345
+ if (msg.topic == BlockProposal.p2pTopic) {
346
+ await this.processBlockFromPeer(msg, msgId, source);
347
+ }
348
+ return;
349
+ }
350
+ async validateReceivedMessage(validationFunc, msgId, source) {
351
+ let resultAndObj = {
352
+ result: false,
353
+ obj: undefined
354
+ };
355
+ try {
356
+ resultAndObj = await validationFunc();
357
+ } catch (err) {
358
+ this.logger.error(`Error deserialising and validating message `, err);
359
+ }
360
+ this.node.services.pubsub.reportMessageValidationResult(msgId, source.toString(), resultAndObj.result && resultAndObj.obj ? TopicValidatorResult.Accept : TopicValidatorResult.Reject);
361
+ return resultAndObj;
362
+ }
363
+ async handleGossipedTx(msg, msgId, source) {
364
+ const validationFunc = async ()=>{
365
+ const tx = Tx.fromBuffer(Buffer.from(msg.data));
366
+ const result = await this.validatePropagatedTx(tx, source);
367
+ return {
368
+ result,
369
+ obj: tx
370
+ };
371
+ };
372
+ const { result, obj: tx } = await this.validateReceivedMessage(validationFunc, msgId, source);
373
+ if (!result || !tx) {
374
+ return;
375
+ }
376
+ const txHash = await tx.getTxHash();
377
+ const txHashString = txHash.toString();
378
+ this.logger.verbose(`Received tx ${txHashString} from external peer ${source.toString()}.`);
379
+ await this.mempools.txPool.addTxs([
380
+ tx
381
+ ]);
382
+ }
383
+ /**Process Attestation From Peer
384
+ * When a proposal is received from a peer, we add it to the attestation pool, so it can be accessed by other services.
385
+ *
386
+ * @param attestation - The attestation to process.
387
+ */ async processAttestationFromPeer(msg, msgId, source) {
388
+ const validationFunc = async ()=>{
389
+ const attestation = BlockAttestation.fromBuffer(Buffer.from(msg.data));
390
+ const result = await this.validateAttestation(source, attestation);
391
+ this.logger.trace(`validatePropagatedAttestation: ${result}`, {
392
+ [Attributes.SLOT_NUMBER]: attestation.payload.header.globalVariables.slotNumber.toString(),
393
+ [Attributes.P2P_ID]: source.toString()
394
+ });
395
+ return {
396
+ result,
397
+ obj: attestation
398
+ };
399
+ };
400
+ const { result, obj: attestation } = await this.validateReceivedMessage(validationFunc, msgId, source);
401
+ if (!result || !attestation) {
402
+ return;
403
+ }
404
+ this.logger.debug(`Received attestation for block ${attestation.blockNumber.toNumber()} slot ${attestation.slotNumber.toNumber()} from external peer.`, {
405
+ p2pMessageIdentifier: await attestation.p2pMessageIdentifier(),
406
+ slot: attestation.slotNumber.toNumber(),
407
+ archive: attestation.archive.toString(),
408
+ block: attestation.blockNumber.toNumber()
409
+ });
410
+ await this.mempools.attestationPool.addAttestations([
411
+ attestation
412
+ ]);
413
+ }
414
+ async processBlockFromPeer(msg, msgId, source) {
415
+ const validationFunc = async ()=>{
416
+ const block = BlockProposal.fromBuffer(Buffer.from(msg.data));
417
+ const result = await this.validateBlockProposal(source, block);
418
+ this.logger.trace(`validatePropagatedBlock: ${result}`, {
419
+ [Attributes.SLOT_NUMBER]: block.payload.header.globalVariables.slotNumber.toString(),
420
+ [Attributes.P2P_ID]: source.toString()
421
+ });
422
+ return {
423
+ result,
424
+ obj: block
425
+ };
426
+ };
427
+ const { result, obj: block } = await this.validateReceivedMessage(validationFunc, msgId, source);
428
+ if (!result || !block) {
429
+ return;
430
+ }
431
+ await this.processValidBlockProposal(block);
432
+ }
433
+ // REVIEW: callback pattern https://github.com/AztecProtocol/aztec-packages/issues/7963
434
+ async processValidBlockProposal(block) {
435
+ this.logger.verbose(`Received block ${block.blockNumber.toNumber()} for slot ${block.slotNumber.toNumber()} from external peer.`, {
436
+ p2pMessageIdentifier: await block.p2pMessageIdentifier(),
437
+ slot: block.slotNumber.toNumber(),
438
+ archive: block.archive.toString(),
439
+ block: block.blockNumber.toNumber()
440
+ });
441
+ const attestation = await this.blockReceivedCallback(block);
442
+ // TODO: fix up this pattern - the abstraction is not nice
443
+ // The attestation can be undefined if no handler is registered / the validator deems the block invalid
444
+ if (attestation != undefined) {
445
+ this.logger.verbose(`Broadcasting attestation for block ${attestation.blockNumber.toNumber()} slot ${attestation.slotNumber.toNumber()}`, {
446
+ p2pMessageIdentifier: await attestation.p2pMessageIdentifier(),
447
+ slot: attestation.slotNumber.toNumber(),
448
+ archive: attestation.archive.toString(),
449
+ block: attestation.blockNumber.toNumber()
450
+ });
451
+ await this.broadcastAttestation(attestation);
452
+ }
453
+ }
454
+ /**
455
+ * Broadcast an attestation to all peers.
456
+ * @param attestation - The attestation to broadcast.
457
+ */ async broadcastAttestation(attestation) {
458
+ await this.propagate(attestation);
459
+ }
460
+ /**
461
+ * Propagates provided message to peers.
462
+ * @param message - The message to propagate.
463
+ */ async propagate(message) {
464
+ const p2pMessageIdentifier = await message.p2pMessageIdentifier();
465
+ this.logger.trace(`Message ${p2pMessageIdentifier} queued`, {
466
+ p2pMessageIdentifier
467
+ });
468
+ void this.jobQueue.put(async ()=>{
469
+ await this.sendToPeers(message);
470
+ }).catch((error)=>{
471
+ this.logger.error(`Error propagating message ${p2pMessageIdentifier}`, {
472
+ error
473
+ });
474
+ });
475
+ }
476
+ /**
477
+ * Validate a tx that has been requested from a peer.
478
+ *
479
+ * The core component of this validator is that the tx hash MUST match the requested tx hash,
480
+ * In order to perform this check, the tx proof must be verified.
481
+ *
482
+ * Note: This function is called from within `ReqResp.sendRequest` as part of the
483
+ * ReqRespSubProtocol.TX subprotocol validation.
484
+ *
485
+ * @param requestedTxHash - The hash of the tx that was requested.
486
+ * @param responseTx - The tx that was received as a response to the request.
487
+ * @param peerId - The peer ID of the peer that sent the tx.
488
+ * @returns True if the tx is valid, false otherwise.
489
+ */ async validateRequestedTx(requestedTxHash, responseTx, peerId) {
490
+ const proofValidator = new TxProofValidator(this.proofVerifier);
491
+ const validProof = await proofValidator.validateTx(responseTx);
492
+ // If the node returns the wrong data, we penalize it
493
+ if (!requestedTxHash.equals(await responseTx.getTxHash())) {
494
+ // Returning the wrong data is a low tolerance error
495
+ this.peerManager.penalizePeer(peerId, PeerErrorSeverity.MidToleranceError);
496
+ return false;
497
+ }
498
+ if (validProof.result === 'invalid') {
499
+ // If the proof is invalid, but the txHash is correct, then this is an active attack and we severly punish
500
+ this.peerManager.penalizePeer(peerId, PeerErrorSeverity.LowToleranceError);
501
+ return false;
502
+ }
503
+ return true;
504
+ }
505
+ async validatePropagatedTx(tx, peerId) {
506
+ const blockNumber = await this.l2BlockSource.getBlockNumber() + 1;
507
+ const messageValidators = this.createMessageValidators(blockNumber);
508
+ const outcome = await this.runValidations(tx, messageValidators);
509
+ if (outcome.allPassed) {
510
+ return true;
511
+ }
512
+ const { name, severity } = outcome.failure;
513
+ // Double spend validator has a special case handler
514
+ if (name === 'doubleSpendValidator') {
515
+ const isValid = await this.handleDoubleSpendFailure(tx, blockNumber, peerId);
516
+ if (isValid) {
451
517
  return true;
452
518
  }
453
- /**
454
- * Validate a tx from a peer.
455
- * @param propagationSource - The peer ID of the peer that sent the tx.
456
- * @param msg - The tx message.
457
- * @returns True if the tx is valid, false otherwise.
458
- */
459
- async validatePropagatedTxFromMessage(propagationSource, msg) {
460
- const tx = Tx.fromBuffer(Buffer.from(msg.data));
461
- const isValid = await this.validatePropagatedTx(tx, propagationSource);
462
- this.logger.trace(`validatePropagatedTx: ${isValid}`, {
463
- [Attributes.TX_HASH]: (await tx.getTxHash()).toString(),
464
- [Attributes.P2P_ID]: propagationSource.toString(),
465
- });
466
- return isValid ? TopicValidatorResult.Accept : TopicValidatorResult.Reject;
467
- }
468
- /**
469
- * Validate an attestation from a peer.
470
- * @param propagationSource - The peer ID of the peer that sent the attestation.
471
- * @param msg - The attestation message.
472
- * @returns True if the attestation is valid, false otherwise.
473
- */
474
- async validatePropagatedAttestationFromMessage(propagationSource, msg) {
475
- const attestation = BlockAttestation.fromBuffer(Buffer.from(msg.data));
476
- const isValid = await this.validateAttestation(propagationSource, attestation);
477
- this.logger.trace(`validatePropagatedAttestation: ${isValid}`, {
478
- [Attributes.SLOT_NUMBER]: attestation.payload.header.globalVariables.slotNumber.toString(),
479
- [Attributes.P2P_ID]: propagationSource.toString(),
480
- });
481
- return isValid ? TopicValidatorResult.Accept : TopicValidatorResult.Reject;
482
- }
483
- /**
484
- * Validate a block proposal from a peer.
485
- * @param propagationSource - The peer ID of the peer that sent the block.
486
- * @param msg - The block proposal message.
487
- * @returns True if the block proposal is valid, false otherwise.
488
- */
489
- async validatePropagatedBlockFromMessage(propagationSource, msg) {
490
- const block = BlockProposal.fromBuffer(Buffer.from(msg.data));
491
- const isValid = await this.validateBlockProposal(propagationSource, block);
492
- this.logger.trace(`validatePropagatedBlock: ${isValid}`, {
493
- [Attributes.SLOT_NUMBER]: block.payload.header.globalVariables.slotNumber.toString(),
494
- [Attributes.P2P_ID]: propagationSource.toString(),
495
- });
496
- return isValid ? TopicValidatorResult.Accept : TopicValidatorResult.Reject;
497
- }
498
- async validatePropagatedTx(tx, peerId) {
499
- const blockNumber = (await this.l2BlockSource.getBlockNumber()) + 1;
500
- const messageValidators = this.createMessageValidators(blockNumber);
501
- const outcome = await this.runValidations(tx, messageValidators);
502
- if (outcome.allPassed) {
503
- return true;
504
- }
505
- const { name, severity } = outcome.failure;
506
- // Double spend validator has a special case handler
507
- if (name === 'doubleSpendValidator') {
508
- const isValid = await this.handleDoubleSpendFailure(tx, blockNumber, peerId);
509
- if (isValid) {
510
- return true;
511
- }
512
- }
513
- this.peerManager.penalizePeer(peerId, severity);
514
- return false;
515
- }
516
- /**
517
- * Create message validators for the given block number.
518
- *
519
- * Each validator is a pair of a validator and a severity.
520
- * If a validator fails, the peer is penalized with the severity of the validator.
521
- *
522
- * @param blockNumber - The block number to create validators for.
523
- * @returns The message validators.
524
- */
525
- createMessageValidators(blockNumber) {
526
- return {
527
- dataValidator: {
528
- validator: new DataTxValidator(),
529
- severity: PeerErrorSeverity.HighToleranceError,
530
- },
531
- metadataValidator: {
532
- validator: new MetadataTxValidator(new Fr(this.config.l1ChainId), new Fr(blockNumber)),
533
- severity: PeerErrorSeverity.HighToleranceError,
534
- },
535
- proofValidator: {
536
- validator: new TxProofValidator(this.proofVerifier),
537
- severity: PeerErrorSeverity.MidToleranceError,
538
- },
539
- doubleSpendValidator: {
540
- validator: new DoubleSpendTxValidator({
541
- nullifiersExist: async (nullifiers) => {
542
- const merkleTree = this.worldStateSynchronizer.getCommitted();
543
- const indices = await merkleTree.findLeafIndices(MerkleTreeId.NULLIFIER_TREE, nullifiers);
544
- return indices.map(index => index !== undefined);
545
- },
546
- }),
547
- severity: PeerErrorSeverity.HighToleranceError,
548
- },
549
- };
550
- }
551
- /**
552
- * Run validations on a tx.
553
- * @param tx - The tx to validate.
554
- * @param messageValidators - The message validators to run.
555
- * @returns The validation outcome.
556
- */
557
- async runValidations(tx, messageValidators) {
558
- const validationPromises = Object.entries(messageValidators).map(async ([name, { validator, severity }]) => {
559
- const { result } = await validator.validateTx(tx);
560
- return { name, isValid: result === 'valid', severity };
561
- });
562
- // A promise that resolves when all validations have been run
563
- const allValidations = Promise.all(validationPromises);
564
- // A promise that resolves when the first validation fails
565
- const firstFailure = Promise.race(validationPromises.map(async (promise) => {
566
- const result = await promise;
567
- return result.isValid ? new Promise(() => { }) : result;
568
- }));
569
- // Wait for the first validation to fail or all validations to pass
570
- const result = await Promise.race([
571
- allValidations.then(() => ({ allPassed: true })),
572
- firstFailure.then(failure => ({ allPassed: false, failure: failure })),
573
- ]);
574
- // If all validations pass, allPassed will be true, if failed, then the failure will be the first validation to fail
575
- return result;
576
- }
577
- /**
578
- * Handle a double spend failure.
579
- *
580
- * Double spend failures are managed on their own because they are a special case.
581
- * We must check if the double spend is recent or old, if it is past a threshold, then we heavily penalize the peer.
582
- *
583
- * @param tx - The tx that failed the double spend validator.
584
- * @param blockNumber - The block number of the tx.
585
- * @param peerId - The peer ID of the peer that sent the tx.
586
- * @returns True if the tx is valid, false otherwise.
587
- */
588
- async handleDoubleSpendFailure(tx, blockNumber, peerId) {
589
- if (blockNumber <= this.config.severePeerPenaltyBlockLength) {
590
- return false;
591
- }
592
- const snapshotValidator = new DoubleSpendTxValidator({
593
- nullifiersExist: async (nullifiers) => {
594
- const merkleTree = this.worldStateSynchronizer.getSnapshot(blockNumber - this.config.severePeerPenaltyBlockLength);
519
+ }
520
+ this.peerManager.penalizePeer(peerId, severity);
521
+ return false;
522
+ }
523
+ /**
524
+ * Create message validators for the given block number.
525
+ *
526
+ * Each validator is a pair of a validator and a severity.
527
+ * If a validator fails, the peer is penalized with the severity of the validator.
528
+ *
529
+ * @param blockNumber - The block number to create validators for.
530
+ * @returns The message validators.
531
+ */ createMessageValidators(blockNumber) {
532
+ return {
533
+ dataValidator: {
534
+ validator: new DataTxValidator(),
535
+ severity: PeerErrorSeverity.HighToleranceError
536
+ },
537
+ metadataValidator: {
538
+ validator: new MetadataTxValidator(new Fr(this.config.l1ChainId), new Fr(blockNumber)),
539
+ severity: PeerErrorSeverity.HighToleranceError
540
+ },
541
+ proofValidator: {
542
+ validator: new TxProofValidator(this.proofVerifier),
543
+ severity: PeerErrorSeverity.MidToleranceError
544
+ },
545
+ doubleSpendValidator: {
546
+ validator: new DoubleSpendTxValidator({
547
+ nullifiersExist: async (nullifiers)=>{
548
+ const merkleTree = this.worldStateSynchronizer.getCommitted();
595
549
  const indices = await merkleTree.findLeafIndices(MerkleTreeId.NULLIFIER_TREE, nullifiers);
596
- return indices.map(index => index !== undefined);
597
- },
598
- });
599
- const validSnapshot = await snapshotValidator.validateTx(tx);
600
- if (validSnapshot.result !== 'valid') {
601
- this.peerManager.penalizePeer(peerId, PeerErrorSeverity.LowToleranceError);
602
- return false;
603
- }
604
- return true;
605
- }
606
- /**
607
- * Validate an attestation.
608
- *
609
- * @param attestation - The attestation to validate.
610
- * @returns True if the attestation is valid, false otherwise.
611
- */
612
- async validateAttestation(peerId, attestation) {
613
- const severity = await this.attestationValidator.validate(attestation);
614
- if (severity) {
615
- this.peerManager.penalizePeer(peerId, severity);
616
- return false;
617
- }
618
- return true;
619
- }
620
- /**
621
- * Validate a block proposal.
622
- *
623
- * @param block - The block proposal to validate.
624
- * @returns True if the block proposal is valid, false otherwise.
625
- */
626
- async validateBlockProposal(peerId, block) {
627
- const severity = await this.blockProposalValidator.validate(block);
628
- if (severity) {
629
- this.peerManager.penalizePeer(peerId, severity);
630
- return false;
631
- }
632
- return true;
633
- }
634
- getPeerScore(peerId) {
635
- return this.node.services.pubsub.score.score(peerId.toString());
636
- }
637
- async sendToPeers(message) {
638
- const parent = message.constructor;
639
- const identifier = await message.p2pMessageIdentifier().then(i => i.toString());
640
- this.logger.trace(`Sending message ${identifier}`, { p2pMessageIdentifier: identifier });
641
- const recipientsNum = await this.publishToTopic(parent.p2pTopic, message.toBuffer());
642
- this.logger.debug(`Sent message ${identifier} to ${recipientsNum} peers`, {
643
- p2pMessageIdentifier: identifier,
644
- sourcePeer: this.node.peerId.toString(),
645
- });
550
+ return indices.map((index)=>index !== undefined);
551
+ }
552
+ }),
553
+ severity: PeerErrorSeverity.HighToleranceError
646
554
  }
647
- // Libp2p seems to hang sometimes if new peers are initiating connections.
648
- async stopLibP2P() {
649
- const TIMEOUT_MS = 5000; // 5 seconds timeout
650
- const timeout = new Promise((_resolve, reject) => {
651
- setTimeout(() => reject(new Error('Timeout during libp2p.stop()')), TIMEOUT_MS);
652
- });
653
- try {
654
- await Promise.race([this.node.stop(), timeout]);
655
- this.logger.debug('LibP2P stopped');
656
- }
657
- catch (error) {
658
- this.logger.error('Error during stop or timeout:', error);
659
- }
555
+ };
556
+ }
557
+ /**
558
+ * Run validations on a tx.
559
+ * @param tx - The tx to validate.
560
+ * @param messageValidators - The message validators to run.
561
+ * @returns The validation outcome.
562
+ */ async runValidations(tx, messageValidators) {
563
+ const validationPromises = Object.entries(messageValidators).map(async ([name, { validator, severity }])=>{
564
+ const { result } = await validator.validateTx(tx);
565
+ return {
566
+ name,
567
+ isValid: result === 'valid',
568
+ severity
569
+ };
570
+ });
571
+ // A promise that resolves when all validations have been run
572
+ const allValidations = Promise.all(validationPromises);
573
+ // A promise that resolves when the first validation fails
574
+ const firstFailure = Promise.race(validationPromises.map(async (promise)=>{
575
+ const result = await promise;
576
+ return result.isValid ? new Promise(()=>{}) : result;
577
+ }));
578
+ // Wait for the first validation to fail or all validations to pass
579
+ const result = await Promise.race([
580
+ allValidations.then(()=>({
581
+ allPassed: true
582
+ })),
583
+ firstFailure.then((failure)=>({
584
+ allPassed: false,
585
+ failure: failure
586
+ }))
587
+ ]);
588
+ // If all validations pass, allPassed will be true, if failed, then the failure will be the first validation to fail
589
+ return result;
590
+ }
591
+ /**
592
+ * Handle a double spend failure.
593
+ *
594
+ * Double spend failures are managed on their own because they are a special case.
595
+ * We must check if the double spend is recent or old, if it is past a threshold, then we heavily penalize the peer.
596
+ *
597
+ * @param tx - The tx that failed the double spend validator.
598
+ * @param blockNumber - The block number of the tx.
599
+ * @param peerId - The peer ID of the peer that sent the tx.
600
+ * @returns True if the tx is valid, false otherwise.
601
+ */ async handleDoubleSpendFailure(tx, blockNumber, peerId) {
602
+ if (blockNumber <= this.config.severePeerPenaltyBlockLength) {
603
+ return false;
604
+ }
605
+ const snapshotValidator = new DoubleSpendTxValidator({
606
+ nullifiersExist: async (nullifiers)=>{
607
+ const merkleTree = this.worldStateSynchronizer.getSnapshot(blockNumber - this.config.severePeerPenaltyBlockLength);
608
+ const indices = await merkleTree.findLeafIndices(MerkleTreeId.NULLIFIER_TREE, nullifiers);
609
+ return indices.map((index)=>index !== undefined);
660
610
  }
661
- },
662
- (() => {
663
- const _metadata = typeof Symbol === "function" && Symbol.metadata ? Object.create(_classSuper[Symbol.metadata] ?? null) : void 0;
664
- _processAttestationFromPeer_decorators = [trackSpan('Libp2pService.processAttestationFromPeer', async (attestation) => ({
665
- [Attributes.BLOCK_NUMBER]: attestation.payload.header.globalVariables.blockNumber.toNumber(),
666
- [Attributes.SLOT_NUMBER]: attestation.payload.header.globalVariables.slotNumber.toNumber(),
667
- [Attributes.BLOCK_ARCHIVE]: attestation.archive.toString(),
668
- [Attributes.P2P_ID]: await attestation.p2pMessageIdentifier().then(i => i.toString()),
669
- }))];
670
- _processBlockFromPeer_decorators = [trackSpan('Libp2pService.processBlockFromPeer', async (block) => ({
671
- [Attributes.BLOCK_NUMBER]: block.blockNumber.toNumber(),
672
- [Attributes.SLOT_NUMBER]: block.slotNumber.toNumber(),
673
- [Attributes.BLOCK_ARCHIVE]: block.archive.toString(),
674
- [Attributes.P2P_ID]: await block.p2pMessageIdentifier().then(i => i.toString()),
675
- }))];
676
- _broadcastAttestation_decorators = [trackSpan('Libp2pService.broadcastAttestation', async (attestation) => ({
677
- [Attributes.BLOCK_NUMBER]: attestation.payload.header.globalVariables.blockNumber.toNumber(),
678
- [Attributes.SLOT_NUMBER]: attestation.payload.header.globalVariables.slotNumber.toNumber(),
679
- [Attributes.BLOCK_ARCHIVE]: attestation.archive.toString(),
680
- [Attributes.P2P_ID]: await attestation.p2pMessageIdentifier().then(i => i.toString()),
681
- }))];
682
- _validateRequestedTx_decorators = [trackSpan('Libp2pService.validateRequestedTx', (requestedTxHash, _responseTx) => ({
683
- [Attributes.TX_HASH]: requestedTxHash.toString(),
684
- }))];
685
- _validatePropagatedTx_decorators = [trackSpan('Libp2pService.validatePropagatedTx', async (tx) => ({
686
- [Attributes.TX_HASH]: (await tx.getTxHash()).toString(),
687
- }))];
688
- _validateAttestation_decorators = [trackSpan('Libp2pService.validateAttestation', (_peerId, attestation) => ({
689
- [Attributes.SLOT_NUMBER]: attestation.payload.header.globalVariables.slotNumber.toString(),
690
- }))];
691
- _validateBlockProposal_decorators = [trackSpan('Libp2pService.validateBlockProposal', (_peerId, block) => ({
692
- [Attributes.SLOT_NUMBER]: block.payload.header.globalVariables.slotNumber.toString(),
693
- }))];
694
- __esDecorate(_a, null, _processAttestationFromPeer_decorators, { kind: "method", name: "processAttestationFromPeer", static: false, private: false, access: { has: obj => "processAttestationFromPeer" in obj, get: obj => obj.processAttestationFromPeer }, metadata: _metadata }, null, _instanceExtraInitializers);
695
- __esDecorate(_a, null, _processBlockFromPeer_decorators, { kind: "method", name: "processBlockFromPeer", static: false, private: false, access: { has: obj => "processBlockFromPeer" in obj, get: obj => obj.processBlockFromPeer }, metadata: _metadata }, null, _instanceExtraInitializers);
696
- __esDecorate(_a, null, _broadcastAttestation_decorators, { kind: "method", name: "broadcastAttestation", static: false, private: false, access: { has: obj => "broadcastAttestation" in obj, get: obj => obj.broadcastAttestation }, metadata: _metadata }, null, _instanceExtraInitializers);
697
- __esDecorate(_a, null, _validateRequestedTx_decorators, { kind: "method", name: "validateRequestedTx", static: false, private: false, access: { has: obj => "validateRequestedTx" in obj, get: obj => obj.validateRequestedTx }, metadata: _metadata }, null, _instanceExtraInitializers);
698
- __esDecorate(_a, null, _validatePropagatedTx_decorators, { kind: "method", name: "validatePropagatedTx", static: false, private: false, access: { has: obj => "validatePropagatedTx" in obj, get: obj => obj.validatePropagatedTx }, metadata: _metadata }, null, _instanceExtraInitializers);
699
- __esDecorate(_a, null, _validateAttestation_decorators, { kind: "method", name: "validateAttestation", static: false, private: false, access: { has: obj => "validateAttestation" in obj, get: obj => obj.validateAttestation }, metadata: _metadata }, null, _instanceExtraInitializers);
700
- __esDecorate(_a, null, _validateBlockProposal_decorators, { kind: "method", name: "validateBlockProposal", static: false, private: false, access: { has: obj => "validateBlockProposal" in obj, get: obj => obj.validateBlockProposal }, metadata: _metadata }, null, _instanceExtraInitializers);
701
- if (_metadata) Object.defineProperty(_a, Symbol.metadata, { enumerable: true, configurable: true, writable: true, value: _metadata });
702
- })(),
703
- _a;
704
- })();
705
- export { LibP2PService };
706
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"libp2p_service.js","sourceRoot":"","sources":["../../../src/services/libp2p/libp2p_service.ts"],"names":[],"mappings":";AAAA,OAAO,EACL,gBAAgB,EAChB,aAAa,EAIb,YAAY,EACZ,aAAa,EACb,iBAAiB,EAGjB,YAAY,EACZ,EAAE,EAIF,yBAAyB,EACzB,uBAAuB,GACxB,MAAM,sBAAsB,CAAC;AAC9B,OAAO,EAAE,EAAE,EAAE,MAAM,oBAAoB,CAAC;AAExC,OAAO,EAAE,YAAY,EAAE,MAAM,uBAAuB,CAAC;AACrD,OAAO,EAAE,WAAW,EAAE,MAAM,yBAAyB,CAAC;AACtD,OAAO,EAAE,cAAc,EAAE,MAAM,mCAAmC,CAAC;AAEnE,OAAO,EAAE,UAAU,EAAE,kBAAkB,EAAwB,UAAU,EAAE,SAAS,EAAE,MAAM,yBAAyB,CAAC;AAGtH,OAAO,EAIL,SAAS,GACV,MAAM,6BAA6B,CAAC;AACrC,OAAO,EAAE,qBAAqB,EAAE,sBAAsB,EAAE,MAAM,mCAAmC,CAAC;AAClG,OAAO,EAAE,eAAe,EAAE,MAAM,mCAAmC,CAAC;AACpE,OAAO,EAAE,KAAK,EAAE,MAAM,yBAAyB,CAAC;AAChD,OAAO,EAAE,KAAK,EAAE,MAAM,yBAAyB,CAAC;AAChD,OAAO,EAAE,SAAS,EAAE,MAAM,mBAAmB,CAAC;AAC9C,OAAO,EAAE,QAAQ,EAAE,MAAM,kBAAkB,CAAC;AAC5C,OAAO,EAA6B,oBAAoB,EAAE,MAAM,mBAAmB,CAAC;AAEpF,OAAO,iBAAiB,CAAC;AACzB,OAAO,EAAE,KAAK,EAAE,MAAM,eAAe,CAAC;AACtC,OAAO,EAAE,GAAG,EAAE,MAAM,aAAa,CAAC;AAClC,OAAO,EAAE,YAAY,EAAE,MAAM,QAAQ,CAAC;AAItC,OAAO,EAAE,oBAAoB,EAAE,sBAAsB,EAAE,MAAM,+BAA+B,CAAC;AAC7F,OAAO,EACL,eAAe,EACf,sBAAsB,EACtB,mBAAmB,EACnB,gBAAgB,GACjB,MAAM,4CAA4C,CAAC;AACpD,OAAO,EAAqB,kBAAkB,EAAE,MAAM,eAAe,CAAC;AACtE,OAAO,EAAE,cAAc,EAAE,MAAM,kBAAkB,CAAC;AAClD,OAAO,EAAE,eAAe,EAAE,WAAW,EAAE,UAAU,EAAE,YAAY,EAAE,MAAM,gBAAgB,CAAC;AACxF,OAAO,EAAE,WAAW,EAAE,MAAM,iCAAiC,CAAC;AAC9D,OAAO,EAAE,WAAW,EAAE,MAAM,iCAAiC,CAAC;AAC9D,OAAO,EAAE,+BAA+B,EAAE,kBAAkB,EAAuB,MAAM,yBAAyB,CAAC;AACnH,OAAO,EAAE,iBAAiB,EAAE,MAAM,iCAAiC,CAAC;AACpE,OAAO,EAAE,WAAW,EAAE,mBAAmB,EAAE,gBAAgB,EAAE,aAAa,EAAE,MAAM,+BAA+B,CAAC;AAClH,OAAO,EAAE,OAAO,EAAE,MAAM,uBAAuB,CAAC;AAEhD,OAAO,EAAE,cAAc,EAAE,MAAM,aAAa,CAAC;AAC7C,OAAO,EAAE,2BAA2B,EAAE,MAAM,oBAAoB,CAAC;AAiBjE;;GAEG;IACU,aAAa;;sBAAkC,UAAU;;;;;;;;;sBAAzD,aAAuC,SAAQ,WAAU;YAmBpE,YACU,UAAa,EACb,MAAiB,EACjB,IAAkB,EAClB,oBAA0C,EAC1C,QAAqB,EACrB,aAA4B,EACpC,UAA+B,EACvB,aAA4C,EAC5C,sBAA8C,EACtD,SAA0B,EAClB,SAAS,YAAY,CAAC,oBAAoB,CAAC;gBAEnD,KAAK,CAAC,SAAS,EAAE,eAAe,CAAC,CAAC;gBAZ1B,eAAU,IApBT,mDAAa,EAoBd,UAAU,EAAG;gBACb,WAAM,GAAN,MAAM,CAAW;gBACjB,SAAI,GAAJ,IAAI,CAAc;gBAClB,yBAAoB,GAApB,oBAAoB,CAAsB;gBAC1C,aAAQ,GAAR,QAAQ,CAAa;gBACrB,kBAAa,GAAb,aAAa,CAAe;gBAE5B,kBAAa,GAAb,aAAa,CAA+B;gBAC5C,2BAAsB,GAAtB,sBAAsB,CAAwB;gBAE9C,WAAM,GAAN,MAAM,CAAqC;gBA7B7C,aAAQ,GAAgB,IAAI,WAAW,EAAE,CAAC;gBAiChD,MAAM,WAAW,GAAG,IAAI,WAAW,CAAC,MAAM,CAAC,CAAC;gBAC5C,IAAI,CAAC,OAAO,GAAG,IAAI,OAAO,CAAC,MAAM,EAAE,IAAI,EAAE,WAAW,CAAC,CAAC;gBAEtD,IAAI,CAAC,WAAW,GAAG,IAAI,WAAW,CAChC,IAAI,EACJ,oBAAoB,EACpB,MAAM,EACN,SAAS,EACT,YAAY,CAAC,GAAG,MAAM,CAAC,MAAM,eAAe,CAAC,EAC7C,WAAW,EACX,IAAI,CAAC,OAAO,CACb,CAAC;gBAEF,gCAAgC;gBAChC,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,KAAK,CAAC,MAAM,CAAC,gBAAgB,GAAG,CAAC,MAAc,EAAE,EAAE;oBAC3E,OAAO,IAAI,CAAC,WAAW,CAAC,YAAY,CAAC,MAAM,CAAC,CAAC;gBAC/C,CAAC,CAAC;gBACF,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,KAAK,CAAC,MAAM,CAAC,iBAAiB,GAAG,EAAE,CAAC;gBAE9D,IAAI,CAAC,oBAAoB,GAAG,IAAI,oBAAoB,CAAC,UAAU,CAAC,CAAC;gBACjE,IAAI,CAAC,sBAAsB,GAAG,IAAI,sBAAsB,CAAC,UAAU,CAAC,CAAC;gBAErE,IAAI,CAAC,qBAAqB,GAAG,KAAK,EAAE,KAAoB,EAAyC,EAAE;oBACjG,IAAI,CAAC,MAAM,CAAC,IAAI,CACd,wFAAwF,KAAK,CAAC,UAAU,CAAC,QAAQ,EAAE,aAAa,EAChI,EAAE,oBAAoB,EAAE,MAAM,KAAK,CAAC,oBAAoB,EAAE,EAAE,CAC7D,CAAC;oBACF,OAAO,SAAS,CAAC;gBACnB,CAAC,CAAC;YACJ,CAAC;YAED;;;;;eAKG;YACI,MAAM,CAAC,KAAK,CAAC,GAAG,CACrB,UAAa,EACb,MAAiB,EACjB,oBAA0C,EAC1C,MAAc,EACd,QAAqB,EACrB,aAA4B,EAC5B,UAA+B,EAC/B,aAA4C,EAC5C,sBAA8C,EAC9C,KAAwB,EACxB,SAA0B,EAC1B,MAAM,GAAG,YAAY,CAAC,oBAAoB,CAAC;gBAE3C,MAAM,EAAE,gBAAgB,EAAE,kBAAkB,EAAE,YAAY,EAAE,GAAG,MAAM,CAAC;gBACtE,MAAM,WAAW,GAAG,kBAAkB,CAAC,gBAAgB,EAAE,KAAK,CAAC,CAAC;gBAChE,yGAAyG;gBACzG,MAAM,eAAe,GAAG,kBAAkB,CAAC,kBAAmB,EAAE,KAAK,CAAC,CAAC;gBAEvE,MAAM,SAAS,GAAG,IAAI,cAAc,CAAC,KAAK,CAAC,CAAC;gBAE5C,MAAM,kBAAkB,GAAG,IAAI,kBAAkB,CAAC,SAAS,CAAC,CAAC;gBAE7D,wEAAwE;gBACxE,MAAM,aAAa,GAAG,EAAE,CAAC;gBACzB,IAAI,oBAAoB,CAAC,cAAc,CAAC,MAAM,GAAG,CAAC,EAAE,CAAC;oBACnD,aAAa,CAAC,IAAI,CAAC,SAAS,CAAC,EAAE,IAAI,EAAE,oBAAoB,CAAC,cAAc,EAAE,CAAC,CAAC,CAAC;gBAC/E,CAAC;gBAED,MAAM,IAAI,GAAG,MAAM,YAAY,CAAC;oBAC9B,KAAK,EAAE,KAAK;oBACZ,MAAM;oBACN,SAAS,EAAE;wBACT,MAAM,EAAE,CAAC,WAAW,CAAC;wBACrB,QAAQ,EAAE,CAAC,eAAe,CAAC;qBAC5B;oBACD,UAAU,EAAE;wBACV,GAAG,CAAC;4BACF,cAAc,EAAE,MAAM,CAAC,YAAY;4BACnC,wEAAwE;4BACxE,sEAAsE;4BACtE,2CAA2C;4BAC3C,OAAO,EAAE,CAAC;4BACV,2BAA2B,EAAE;gCAC3B,UAAU,EAAE,YAAY,IAAI,QAAQ;gCACpC,WAAW,EAAE,YAAY,IAAI,QAAQ;6BACtC;yBACF,CAAC;qBACH;oBACD,SAAS;oBACT,aAAa;oBACb,YAAY,EAAE,CAAC,KAAK,EAAE,EAAE,KAAK,EAAE,CAAC;oBAChC,oBAAoB,EAAE,CAAC,KAAK,EAAE,CAAC;oBAC/B,iBAAiB,EAAE;wBACjB,cAAc,EAAE,CAAC;wBACjB,cAAc,EAAE,YAAY;wBAE5B,gBAAgB,EAAE,GAAG;wBACrB,kBAAkB,EAAE,CAAC;wBACrB,6BAA6B,EAAE,CAAC;qBACjC;oBACD,QAAQ,EAAE;wBACR,QAAQ,EAAE,QAAQ,CAAC;4BACjB,cAAc,EAAE,OAAO;yBACxB,CAAC;wBACF,MAAM,EAAE,SAAS,CAAC;4BAChB,SAAS,EAAE,WAAW;4BACtB,qBAAqB,EAAE,eAAe,CAAC,YAAY;4BACnD,4BAA4B,EAAE,IAAI;4BAClC,YAAY,EAAE,MAAM,CAAC,qBAAqB;4BAC1C,CAAC,EAAE,MAAM,CAAC,UAAU;4BACpB,GAAG,EAAE,MAAM,CAAC,YAAY;4BACxB,GAAG,EAAE,MAAM,CAAC,YAAY;4BACxB,KAAK,EAAE,MAAM,CAAC,cAAc;4BAC5B,iBAAiB,EAAE,MAAM,CAAC,iBAAiB;4BAC3C,YAAY,EAAE,MAAM,CAAC,qBAAqB;4BAC1C,YAAY,EAAE,MAAM,CAAC,qBAAqB;4BAC1C,kGAAkG;4BAClG,wBAAwB,EAAE,EAAE,GAAG,IAAI;4BACnC,OAAO,EAAE,UAAU;4BACnB,YAAY,EAAE,YAAY;4BAC1B,WAAW,EAAE,WAAW;4BACxB,aAAa,EAAE,IAAI,eAAe,EAAE;4BACpC,eAAe,EAAE,kBAAkB;4BACnC,sBAAsB,EAAE,uBAAuB,EAAE;4BACjD,eAAe,EAAE,IAAI;4BACrB,WAAW,EAAE,qBAAqB,CAAC;gCACjC,wEAAwE;gCACxE,wBAAwB,EAAE,MAAM,CAAC,6BAA6B,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,GAAG;gCACzE,MAAM,EAAE;oCACN,CAAC,EAAE,CAAC,QAAQ,CAAC,EAAE,sBAAsB,CAAC;wCACpC,WAAW,EAAE,CAAC;wCACd,8BAA8B,EAAE,CAAC,EAAE;wCACnC,6BAA6B,EAAE,GAAG;qCACnC,CAAC;oCACF,CAAC,gBAAgB,CAAC,QAAQ,CAAC,EAAE,sBAAsB,CAAC;wCAClD,WAAW,EAAE,CAAC;wCACd,8BAA8B,EAAE,CAAC,EAAE;wCACnC,6BAA6B,EAAE,GAAG;qCACnC,CAAC;oCACF,CAAC,gBAAgB,CAAC,QAAQ,CAAC,EAAE,sBAAsB,CAAC;wCAClD,WAAW,EAAE,CAAC;wCACd,8BAA8B,EAAE,CAAC,EAAE;wCACnC,6BAA6B,EAAE,GAAG;qCACnC,CAAC;iCACH;6BACF,CAAC;yBACH,CAAmD;wBACpD,UAAU,EAAE,CAAC,UAAoD,EAAE,EAAE,CAAC,CAAC;4BACrE,iBAAiB,EAAE,UAAU,CAAC,iBAAiB;yBAChD,CAAC;qBACH;oBACD,qEAAqE;oBACrE,MAAM,EAAE,2BAA2B,CAAC,MAAM,CAAC,MAAM,EAAE,EAAE,YAAY,EAAE,MAAM,EAAE,CAAC;iBAC7E,CAAC,CAAC;gBAEH,OAAO,IAAI,EAAa,CACtB,UAAU,EACV,MAAM,EACN,IAAI,EACJ,oBAAoB,EACpB,QAAQ,EACR,aAAa,EACb,UAAU,EACV,aAAa,EACb,sBAAsB,EACtB,SAAS,EACT,MAAM,CACP,CAAC;YACJ,CAAC;YAED;;;eAGG;YACI,KAAK,CAAC,KAAK;gBAChB,sCAAsC;gBACtC,IAAI,IAAI,CAAC,IAAI,CAAC,MAAM,KAAK,SAAS,EAAE,CAAC;oBACnC,MAAM,IAAI,KAAK,CAAC,6BAA6B,CAAC,CAAC;gBACjD,CAAC;gBAED,8CAA8C;gBAC9C,MAAM,EAAE,gBAAgB,EAAE,kBAAkB,EAAE,GAAG,IAAI,CAAC,MAAM,CAAC;gBAC7D,IAAI,CAAC,kBAAkB,EAAE,CAAC;oBACxB,MAAM,IAAI,KAAK,CAAC,gCAAgC,CAAC,CAAC;gBACpD,CAAC;gBACD,MAAM,oBAAoB,GAAG,kBAAkB,CAAC,kBAAkB,EAAE,KAAK,CAAC,CAAC;gBAE3E,0DAA0D;gBAC1D,IAAI,CAAC,QAAQ,CAAC,KAAK,EAAE,CAAC;gBACtB,MAAM,IAAI,CAAC,oBAAoB,CAAC,KAAK,EAAE,CAAC;gBACxC,MAAM,IAAI,CAAC,IAAI,CAAC,KAAK,EAAE,CAAC;gBAExB,oDAAoD;gBACpD,KAAK,MAAM,KAAK,IAAI,yBAAyB,CAAC,IAAI,CAAC,UAAU,CAAC,EAAE,CAAC;oBAC/D,IAAI,CAAC,gBAAgB,CAAC,YAAY,CAAC,KAAK,CAAC,CAAC,QAAQ,CAAC,CAAC;gBACtD,CAAC;gBAED,4CAA4C;gBAC5C,MAAM,SAAS,GAAG,gBAAgB,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;gBAClD,MAAM,cAAc,GAAG,iBAAiB,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC;gBAC3D,MAAM,YAAY,GAAG,mBAAmB,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;gBAE7D,MAAM,uBAAuB,GAAG;oBAC9B,CAAC,kBAAkB,CAAC,IAAI,CAAC,EAAE,WAAW;oBACtC,CAAC,kBAAkB,CAAC,MAAM,CAAC,EAAE,aAAa;oBAC1C,CAAC,kBAAkB,CAAC,EAAE,CAAC,EAAE,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC;oBAC7C,CAAC,kBAAkB,CAAC,OAAO,CAAC,EAAE,cAAc,CAAC,IAAI,CAAC,IAAI,CAAC;oBACvD,CAAC,kBAAkB,CAAC,KAAK,CAAC,EAAE,YAAY,CAAC,IAAI,CAAC,IAAI,CAAC;iBACpD,CAAC;gBAEF,2BAA2B;gBAC3B,uFAAuF;gBACvF,2BAA2B;gBAC3B,MAAM,eAAe,GAAG;oBACtB,CAAC,EAAE,CAAC,QAAQ,CAAC,EAAE,IAAI,CAAC,+BAA+B,CAAC,IAAI,CAAC,IAAI,CAAC;oBAC9D,CAAC,gBAAgB,CAAC,QAAQ,CAAC,EAAE,IAAI,CAAC,wCAAwC,CAAC,IAAI,CAAC,IAAI,CAAC;oBACrF,CAAC,aAAa,CAAC,QAAQ,CAAC,EAAE,IAAI,CAAC,kCAAkC,CAAC,IAAI,CAAC,IAAI,CAAC;iBAC7E,CAAC;gBACF,0FAA0F;gBAC1F,sCAAsC;gBACtC,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,6BAA6B,EAAE,CAAC;oBAC/C,KAAK,MAAM,CAAC,KAAK,EAAE,SAAS,CAAC,IAAI,MAAM,CAAC,OAAO,CAAC,eAAe,CAAC,EAAE,CAAC;wBACjE,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,eAAe,CAAC,GAAG,CAAC,KAAK,EAAE,SAAS,CAAC,CAAC;oBAClE,CAAC;gBACH,CAAC;qBAAM,CAAC;oBACN,IAAI,CAAC,MAAM,CAAC,IAAI,CACd,0JAA0J,CAC3J,CAAC;gBACJ,CAAC;gBAED,yBAAyB;gBACzB,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,gBAAgB,CAAC,cAAc,CAAC,OAAO,EAAE,IAAI,CAAC,oBAAoB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC;gBAEzG,2CAA2C;gBAC3C,IAAI,CAAC,uBAAuB,GAAG,IAAI,cAAc,CAC/C,GAAG,EAAE,CAAC,IAAI,CAAC,WAAW,CAAC,SAAS,EAAE,EAClC,IAAI,CAAC,MAAM,EACX,IAAI,CAAC,MAAM,CAAC,mBAAmB,CAChC,CAAC;gBACF,IAAI,CAAC,uBAAuB,CAAC,KAAK,EAAE,CAAC;gBAErC,sIAAsI;gBACtI,MAAM,4BAA4B,GAAG;oBACnC,GAAG,+BAA+B;oBAClC,+CAA+C;oBAC/C,CAAC,kBAAkB,CAAC,EAAE,CAAC,EAAE,IAAI,CAAC,mBAAmB,CAAC,IAAI,CAAC,IAAI,CAAC;iBAC7D,CAAC;gBACF,MAAM,IAAI,CAAC,OAAO,CAAC,KAAK,CAAC,uBAAuB,EAAE,4BAA4B,CAAC,CAAC;gBAChF,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,qBAAqB,EAAE;oBACtC,MAAM,EAAE,gBAAgB;oBACxB,QAAQ,EAAE,oBAAoB;oBAC9B,MAAM,EAAE,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,QAAQ,EAAE;iBACpC,CAAC,CAAC;YACL,CAAC;YAED;;;eAGG;YACI,KAAK,CAAC,IAAI;gBACf,6BAA6B;gBAC7B,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,mBAAmB,CAAC,cAAc,CAAC,OAAO,EAAE,IAAI,CAAC,oBAAoB,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC;gBAE5G,oBAAoB;gBACpB,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,0BAA0B,CAAC,CAAC;gBAC9C,MAAM,IAAI,CAAC,WAAW,CAAC,IAAI,EAAE,CAAC;gBAE9B,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,uBAAuB,CAAC,CAAC;gBAC3C,MAAM,IAAI,CAAC,QAAQ,CAAC,GAAG,EAAE,CAAC;gBAC1B,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,6BAA6B,CAAC,CAAC;gBACjD,MAAM,IAAI,CAAC,uBAAuB,EAAE,IAAI,EAAE,CAAC;gBAC3C,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,oCAAoC,CAAC,CAAC;gBACxD,MAAM,IAAI,CAAC,oBAAoB,CAAC,IAAI,EAAE,CAAC;gBACvC,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,qCAAqC,CAAC,CAAC;gBACzD,MAAM,IAAI,CAAC,OAAO,CAAC,IAAI,EAAE,CAAC;gBAC1B,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC;gBACxC,MAAM,IAAI,CAAC,UAAU,EAAE,CAAC;gBACxB,IAAI,CAAC,MAAM,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC;YAC7C,CAAC;YAEM,QAAQ,CAAC,cAAwB;gBACtC,OAAO,IAAI,CAAC,WAAW,CAAC,QAAQ,CAAC,cAAc,CAAC,CAAC;YACnD,CAAC;YAEO,oBAAoB,CAAC,CAAgC;gBAC3D,MAAM,EAAE,GAAG,EAAE,GAAG,CAAC,CAAC,MAAM,CAAC;gBACzB,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,0BAA0B,CAAC,CAAC;gBAE9C,KAAK,IAAI,CAAC,QAAQ;qBACf,GAAG,CAAC,GAAG,EAAE,CAAC,IAAI,CAAC,sBAAsB,CAAC,GAAG,CAAC,CAAC;qBAC3C,KAAK,CAAC,GAAG,CAAC,EAAE,CAAC,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,iCAAiC,EAAE,GAAG,CAAC,CAAC,CAAC;YAC7E,CAAC;YAED;;;;;;;;;eASG;YACH,WAAW,CACT,QAAqB,EACrB,OAA6D;gBAE7D,OAAO,IAAI,CAAC,OAAO,CAAC,WAAW,CAAC,QAAQ,EAAE,OAAO,CAAC,CAAC;YACrD,CAAC;YAED;;;;;eAKG;YACH,gBAAgB,CACd,QAAqB,EACrB,QAAgE;gBAEhE,OAAO,IAAI,CAAC,OAAO,CAAC,gBAAgB,CAAC,QAAQ,EAAE,QAAQ,CAAC,CAAC;YAC3D,CAAC;YAED;;;eAGG;YACI,MAAM;gBACX,OAAO,IAAI,CAAC,oBAAoB,CAAC,MAAM,EAAE,CAAC;YAC5C,CAAC;YAEM,6BAA6B,CAAC,QAAyE;gBAC5G,IAAI,CAAC,qBAAqB,GAAG,QAAQ,CAAC;gBACtC,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,oCAAoC,CAAC,CAAC;YAC5D,CAAC;YAED;;;eAGG;YACK,gBAAgB,CAAC,KAAa;gBACpC,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,EAAE,CAAC;oBAC/B,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;gBACnD,CAAC;gBACD,KAAK,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,SAAS,CAAC,KAAK,CAAC,CAAC;YAClD,CAAC;YAED;;;;;eAKG;YACK,KAAK,CAAC,cAAc,CAAC,KAAa,EAAE,IAAgB;gBAC1D,IAAI,CAAC,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,EAAE,CAAC;oBAC/B,MAAM,IAAI,KAAK,CAAC,+BAA+B,CAAC,CAAC;gBACnD,CAAC;gBACD,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,OAAO,CAAC,KAAK,EAAE,IAAI,CAAC,CAAC;gBAEpE,OAAO,MAAM,CAAC,UAAU,CAAC,MAAM,CAAC;YAClC,CAAC;YAED;;;;eAIG;YACK,KAAK,CAAC,sBAAsB,CAAC,OAAyB;gBAC5D,IAAI,OAAO,CAAC,KAAK,KAAK,EAAE,CAAC,QAAQ,EAAE,CAAC;oBAClC,MAAM,EAAE,GAAG,EAAE,CAAC,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC;oBACpD,MAAM,IAAI,CAAC,iBAAiB,CAAC,EAAE,CAAC,CAAC;gBACnC,CAAC;gBACD,IAAI,OAAO,CAAC,KAAK,KAAK,gBAAgB,CAAC,QAAQ,IAAI,IAAI,CAAC,UAAU,KAAK,aAAa,CAAC,IAAI,EAAE,CAAC;oBAC1F,MAAM,WAAW,GAAG,gBAAgB,CAAC,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC;oBAC3E,MAAM,IAAI,CAAC,0BAA0B,CAAC,WAAW,CAAC,CAAC;gBACrD,CAAC;gBACD,IAAI,OAAO,CAAC,KAAK,IAAI,aAAa,CAAC,QAAQ,EAAE,CAAC;oBAC5C,MAAM,KAAK,GAAG,aAAa,CAAC,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC,CAAC;oBAClE,MAAM,IAAI,CAAC,oBAAoB,CAAC,KAAK,CAAC,CAAC;gBACzC,CAAC;gBAED,OAAO;YACT,CAAC;YAED;;;;eAIG;YAOK,KAAK,CAAC,0BAA0B,CAAC,WAA6B;gBACpE,IAAI,CAAC,MAAM,CAAC,KAAK,CACf,kCAAkC,WAAW,CAAC,WAAW,CAAC,QAAQ,EAAE,SAAS,WAAW,CAAC,UAAU,CAAC,QAAQ,EAAE,sBAAsB,EACpI;oBACE,oBAAoB,EAAE,MAAM,WAAW,CAAC,oBAAoB,EAAE;oBAC9D,IAAI,EAAE,WAAW,CAAC,UAAU,CAAC,QAAQ,EAAE;oBACvC,OAAO,EAAE,WAAW,CAAC,OAAO,CAAC,QAAQ,EAAE;oBACvC,KAAK,EAAE,WAAW,CAAC,WAAW,CAAC,QAAQ,EAAE;iBAC1C,CACF,CAAC;gBACF,MAAM,IAAI,CAAC,QAAQ,CAAC,eAAgB,CAAC,eAAe,CAAC,CAAC,WAAW,CAAC,CAAC,CAAC;YACtE,CAAC;YAED;;;;;eAKG;YACH,uFAAuF;YAO/E,KAAK,CAAC,oBAAoB,CAAC,KAAoB;gBACrD,IAAI,CAAC,MAAM,CAAC,OAAO,CACjB,kBAAkB,KAAK,CAAC,WAAW,CAAC,QAAQ,EAAE,aAAa,KAAK,CAAC,UAAU,CAAC,QAAQ,EAAE,sBAAsB,EAC5G;oBACE,oBAAoB,EAAE,MAAM,KAAK,CAAC,oBAAoB,EAAE;oBACxD,IAAI,EAAE,KAAK,CAAC,UAAU,CAAC,QAAQ,EAAE;oBACjC,OAAO,EAAE,KAAK,CAAC,OAAO,CAAC,QAAQ,EAAE;oBACjC,KAAK,EAAE,KAAK,CAAC,WAAW,CAAC,QAAQ,EAAE;iBACpC,CACF,CAAC;gBACF,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,qBAAqB,CAAC,KAAK,CAAC,CAAC;gBAE5D,0DAA0D;gBAC1D,uGAAuG;gBACvG,IAAI,WAAW,IAAI,SAAS,EAAE,CAAC;oBAC7B,IAAI,CAAC,MAAM,CAAC,OAAO,CACjB,sCAAsC,WAAW,CAAC,WAAW,CAAC,QAAQ,EAAE,SAAS,WAAW,CAAC,UAAU,CAAC,QAAQ,EAAE,EAAE,EACpH;wBACE,oBAAoB,EAAE,MAAM,WAAW,CAAC,oBAAoB,EAAE;wBAC9D,IAAI,EAAE,WAAW,CAAC,UAAU,CAAC,QAAQ,EAAE;wBACvC,OAAO,EAAE,WAAW,CAAC,OAAO,CAAC,QAAQ,EAAE;wBACvC,KAAK,EAAE,WAAW,CAAC,WAAW,CAAC,QAAQ,EAAE;qBAC1C,CACF,CAAC;oBACF,MAAM,IAAI,CAAC,oBAAoB,CAAC,WAAW,CAAC,CAAC;gBAC/C,CAAC;YACH,CAAC;YAED;;;eAGG;YAOK,KAAK,CAAC,oBAAoB,CAAC,WAA6B;gBAC9D,MAAM,IAAI,CAAC,SAAS,CAAC,WAAW,CAAC,CAAC;YACpC,CAAC;YAED;;;eAGG;YACI,KAAK,CAAC,SAAS,CAAuB,OAAU;gBACrD,MAAM,oBAAoB,GAAG,MAAM,OAAO,CAAC,oBAAoB,EAAE,CAAC;gBAClE,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,WAAW,oBAAoB,SAAS,EAAE,EAAE,oBAAoB,EAAE,CAAC,CAAC;gBACtF,KAAK,IAAI,CAAC,QAAQ,CAAC,GAAG,CAAC,KAAK,IAAI,EAAE;oBAChC,MAAM,IAAI,CAAC,WAAW,CAAC,OAAO,CAAC,CAAC;gBAClC,CAAC,CAAC,CAAC;YACL,CAAC;YAEO,KAAK,CAAC,iBAAiB,CAAC,EAAM;gBACpC,MAAM,MAAM,GAAG,MAAM,EAAE,CAAC,SAAS,EAAE,CAAC;gBACpC,MAAM,YAAY,GAAG,MAAM,CAAC,QAAQ,EAAE,CAAC;gBACvC,IAAI,CAAC,MAAM,CAAC,OAAO,CAAC,eAAe,YAAY,sBAAsB,CAAC,CAAC;gBACvE,MAAM,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC;YAC1C,CAAC;YAED;;;;;;;;;;;;;eAaG;YAIK,KAAK,CAAC,mBAAmB,CAAC,eAAuB,EAAE,UAAc,EAAE,MAAc;gBACvF,MAAM,cAAc,GAAG,IAAI,gBAAgB,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;gBAChE,MAAM,UAAU,GAAG,MAAM,cAAc,CAAC,UAAU,CAAC,UAAU,CAAC,CAAC;gBAE/D,qDAAqD;gBACrD,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC,MAAM,UAAU,CAAC,SAAS,EAAE,CAAC,EAAE,CAAC;oBAC1D,oDAAoD;oBACpD,IAAI,CAAC,WAAW,CAAC,YAAY,CAAC,MAAM,EAAE,iBAAiB,CAAC,iBAAiB,CAAC,CAAC;oBAC3E,OAAO,KAAK,CAAC;gBACf,CAAC;gBAED,IAAI,UAAU,CAAC,MAAM,KAAK,SAAS,EAAE,CAAC;oBACpC,0GAA0G;oBAC1G,IAAI,CAAC,WAAW,CAAC,YAAY,CAAC,MAAM,EAAE,iBAAiB,CAAC,iBAAiB,CAAC,CAAC;oBAC3E,OAAO,KAAK,CAAC;gBACf,CAAC;gBAED,OAAO,IAAI,CAAC;YACd,CAAC;YAED;;;;;eAKG;YACK,KAAK,CAAC,+BAA+B,CAC3C,iBAAyB,EACzB,GAAY;gBAEZ,MAAM,EAAE,GAAG,EAAE,CAAC,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,CAAC;gBAChD,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,oBAAoB,CAAC,EAAE,EAAE,iBAAiB,CAAC,CAAC;gBACvE,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,yBAAyB,OAAO,EAAE,EAAE;oBACpD,CAAC,UAAU,CAAC,OAAO,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,SAAS,EAAE,CAAC,CAAC,QAAQ,EAAE;oBACvD,CAAC,UAAU,CAAC,MAAM,CAAC,EAAE,iBAAiB,CAAC,QAAQ,EAAE;iBAClD,CAAC,CAAC;gBACH,OAAO,OAAO,CAAC,CAAC,CAAC,oBAAoB,CAAC,MAAM,CAAC,CAAC,CAAC,oBAAoB,CAAC,MAAM,CAAC;YAC7E,CAAC;YAED;;;;;eAKG;YACK,KAAK,CAAC,wCAAwC,CACpD,iBAAyB,EACzB,GAAY;gBAEZ,MAAM,WAAW,GAAG,gBAAgB,CAAC,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,CAAC;gBACvE,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAAC,iBAAiB,EAAE,WAAW,CAAC,CAAC;gBAC/E,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,kCAAkC,OAAO,EAAE,EAAE;oBAC7D,CAAC,UAAU,CAAC,WAAW,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,MAAM,CAAC,eAAe,CAAC,UAAU,CAAC,QAAQ,EAAE;oBAC1F,CAAC,UAAU,CAAC,MAAM,CAAC,EAAE,iBAAiB,CAAC,QAAQ,EAAE;iBAClD,CAAC,CAAC;gBACH,OAAO,OAAO,CAAC,CAAC,CAAC,oBAAoB,CAAC,MAAM,CAAC,CAAC,CAAC,oBAAoB,CAAC,MAAM,CAAC;YAC7E,CAAC;YAED;;;;;eAKG;YACK,KAAK,CAAC,kCAAkC,CAC9C,iBAAyB,EACzB,GAAY;gBAEZ,MAAM,KAAK,GAAG,aAAa,CAAC,UAAU,CAAC,MAAM,CAAC,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,CAAC,CAAC;gBAC9D,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,qBAAqB,CAAC,iBAAiB,EAAE,KAAK,CAAC,CAAC;gBAC3E,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,4BAA4B,OAAO,EAAE,EAAE;oBACvD,CAAC,UAAU,CAAC,WAAW,CAAC,EAAE,KAAK,CAAC,OAAO,CAAC,MAAM,CAAC,eAAe,CAAC,UAAU,CAAC,QAAQ,EAAE;oBACpF,CAAC,UAAU,CAAC,MAAM,CAAC,EAAE,iBAAiB,CAAC,QAAQ,EAAE;iBAClD,CAAC,CAAC;gBACH,OAAO,OAAO,CAAC,CAAC,CAAC,oBAAoB,CAAC,MAAM,CAAC,CAAC,CAAC,oBAAoB,CAAC,MAAM,CAAC;YAC7E,CAAC;YAKO,KAAK,CAAC,oBAAoB,CAAC,EAAM,EAAE,MAAc;gBACvD,MAAM,WAAW,GAAG,CAAC,MAAM,IAAI,CAAC,aAAa,CAAC,cAAc,EAAE,CAAC,GAAG,CAAC,CAAC;gBACpE,MAAM,iBAAiB,GAAG,IAAI,CAAC,uBAAuB,CAAC,WAAW,CAAC,CAAC;gBACpE,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,cAAc,CAAC,EAAE,EAAE,iBAAiB,CAAC,CAAC;gBAEjE,IAAI,OAAO,CAAC,SAAS,EAAE,CAAC;oBACtB,OAAO,IAAI,CAAC;gBACd,CAAC;gBAED,MAAM,EAAE,IAAI,EAAE,QAAQ,EAAE,GAAG,OAAO,CAAC,OAAO,CAAC;gBAE3C,oDAAoD;gBACpD,IAAI,IAAI,KAAK,sBAAsB,EAAE,CAAC;oBACpC,MAAM,OAAO,GAAG,MAAM,IAAI,CAAC,wBAAwB,CAAC,EAAE,EAAE,WAAW,EAAE,MAAM,CAAC,CAAC;oBAC7E,IAAI,OAAO,EAAE,CAAC;wBACZ,OAAO,IAAI,CAAC;oBACd,CAAC;gBACH,CAAC;gBAED,IAAI,CAAC,WAAW,CAAC,YAAY,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC;gBAChD,OAAO,KAAK,CAAC;YACf,CAAC;YAED;;;;;;;;eAQG;YACK,uBAAuB,CAAC,WAAmB;gBACjD,OAAO;oBACL,aAAa,EAAE;wBACb,SAAS,EAAE,IAAI,eAAe,EAAE;wBAChC,QAAQ,EAAE,iBAAiB,CAAC,kBAAkB;qBAC/C;oBACD,iBAAiB,EAAE;wBACjB,SAAS,EAAE,IAAI,mBAAmB,CAAC,IAAI,EAAE,CAAC,IAAI,CAAC,MAAM,CAAC,SAAS,CAAC,EAAE,IAAI,EAAE,CAAC,WAAW,CAAC,CAAC;wBACtF,QAAQ,EAAE,iBAAiB,CAAC,kBAAkB;qBAC/C;oBACD,cAAc,EAAE;wBACd,SAAS,EAAE,IAAI,gBAAgB,CAAC,IAAI,CAAC,aAAa,CAAC;wBACnD,QAAQ,EAAE,iBAAiB,CAAC,iBAAiB;qBAC9C;oBACD,oBAAoB,EAAE;wBACpB,SAAS,EAAE,IAAI,sBAAsB,CAAC;4BACpC,eAAe,EAAE,KAAK,EAAE,UAAoB,EAAE,EAAE;gCAC9C,MAAM,UAAU,GAAG,IAAI,CAAC,sBAAsB,CAAC,YAAY,EAAE,CAAC;gCAC9D,MAAM,OAAO,GAAG,MAAM,UAAU,CAAC,eAAe,CAAC,YAAY,CAAC,cAAc,EAAE,UAAU,CAAC,CAAC;gCAC1F,OAAO,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,EAAE,CAAC,KAAK,KAAK,SAAS,CAAC,CAAC;4BACnD,CAAC;yBACF,CAAC;wBACF,QAAQ,EAAE,iBAAiB,CAAC,kBAAkB;qBAC/C;iBACF,CAAC;YACJ,CAAC;YAED;;;;;eAKG;YACK,KAAK,CAAC,cAAc,CAC1B,EAAM,EACN,iBAAmD;gBAEnD,MAAM,kBAAkB,GAAG,MAAM,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC,GAAG,CAAC,KAAK,EAAE,CAAC,IAAI,EAAE,EAAE,SAAS,EAAE,QAAQ,EAAE,CAAC,EAAE,EAAE;oBACzG,MAAM,EAAE,MAAM,EAAE,GAAG,MAAM,SAAS,CAAC,UAAU,CAAC,EAAE,CAAC,CAAC;oBAClD,OAAO,EAAE,IAAI,EAAE,OAAO,EAAE,MAAM,KAAK,OAAO,EAAE,QAAQ,EAAE,CAAC;gBACzD,CAAC,CAAC,CAAC;gBAEH,6DAA6D;gBAC7D,MAAM,cAAc,GAAG,OAAO,CAAC,GAAG,CAAC,kBAAkB,CAAC,CAAC;gBAEvD,0DAA0D;gBAC1D,MAAM,YAAY,GAAG,OAAO,CAAC,IAAI,CAC/B,kBAAkB,CAAC,GAAG,CAAC,KAAK,EAAC,OAAO,EAAC,EAAE;oBACrC,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC;oBAC7B,OAAO,MAAM,CAAC,OAAO,CAAC,CAAC,CAAC,IAAI,OAAO,CAAC,GAAG,EAAE,GAAE,CAAC,CAAC,CAAC,CAAC,CAAC,MAAM,CAAC;gBACzD,CAAC,CAAC,CACH,CAAC;gBAEF,mEAAmE;gBACnE,MAAM,MAAM,GAAG,MAAM,OAAO,CAAC,IAAI,CAAC;oBAChC,cAAc,CAAC,IAAI,CAAC,GAAG,EAAE,CAAC,CAAC,EAAE,SAAS,EAAE,IAAa,EAAE,CAAC,CAAC;oBACzD,YAAY,CAAC,IAAI,CAAC,OAAO,CAAC,EAAE,CAAC,CAAC,EAAE,SAAS,EAAE,KAAc,EAAE,OAAO,EAAE,OAA2B,EAAE,CAAC,CAAC;iBACpG,CAAC,CAAC;gBAEH,oHAAoH;gBACpH,OAAO,MAAM,CAAC;YAChB,CAAC;YAED;;;;;;;;;;eAUG;YACK,KAAK,CAAC,wBAAwB,CAAC,EAAM,EAAE,WAAmB,EAAE,MAAc;gBAChF,IAAI,WAAW,IAAI,IAAI,CAAC,MAAM,CAAC,4BAA4B,EAAE,CAAC;oBAC5D,OAAO,KAAK,CAAC;gBACf,CAAC;gBAED,MAAM,iBAAiB,GAAG,IAAI,sBAAsB,CAAC;oBACnD,eAAe,EAAE,KAAK,EAAE,UAAoB,EAAE,EAAE;wBAC9C,MAAM,UAAU,GAAG,IAAI,CAAC,sBAAsB,CAAC,WAAW,CACxD,WAAW,GAAG,IAAI,CAAC,MAAM,CAAC,4BAA4B,CACvD,CAAC;wBACF,MAAM,OAAO,GAAG,MAAM,UAAU,CAAC,eAAe,CAAC,YAAY,CAAC,cAAc,EAAE,UAAU,CAAC,CAAC;wBAC1F,OAAO,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,EAAE,CAAC,KAAK,KAAK,SAAS,CAAC,CAAC;oBACnD,CAAC;iBACF,CAAC,CAAC;gBAEH,MAAM,aAAa,GAAG,MAAM,iBAAiB,CAAC,UAAU,CAAC,EAAE,CAAC,CAAC;gBAC7D,IAAI,aAAa,CAAC,MAAM,KAAK,OAAO,EAAE,CAAC;oBACrC,IAAI,CAAC,WAAW,CAAC,YAAY,CAAC,MAAM,EAAE,iBAAiB,CAAC,iBAAiB,CAAC,CAAC;oBAC3E,OAAO,KAAK,CAAC;gBACf,CAAC;gBAED,OAAO,IAAI,CAAC;YACd,CAAC;YAED;;;;;eAKG;YAII,KAAK,CAAC,mBAAmB,CAAC,MAAc,EAAE,WAA6B;gBAC5E,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,oBAAoB,CAAC,QAAQ,CAAC,WAAW,CAAC,CAAC;gBACvE,IAAI,QAAQ,EAAE,CAAC;oBACb,IAAI,CAAC,WAAW,CAAC,YAAY,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC;oBAChD,OAAO,KAAK,CAAC;gBACf,CAAC;gBAED,OAAO,IAAI,CAAC;YACd,CAAC;YAED;;;;;eAKG;YAII,KAAK,CAAC,qBAAqB,CAAC,MAAc,EAAE,KAAoB;gBACrE,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,sBAAsB,CAAC,QAAQ,CAAC,KAAK,CAAC,CAAC;gBACnE,IAAI,QAAQ,EAAE,CAAC;oBACb,IAAI,CAAC,WAAW,CAAC,YAAY,CAAC,MAAM,EAAE,QAAQ,CAAC,CAAC;oBAChD,OAAO,KAAK,CAAC;gBACf,CAAC;gBAED,OAAO,IAAI,CAAC;YACd,CAAC;YAEM,YAAY,CAAC,MAAc;gBAChC,OAAO,IAAI,CAAC,IAAI,CAAC,QAAQ,CAAC,MAAM,CAAC,KAAK,CAAC,KAAK,CAAC,MAAM,CAAC,QAAQ,EAAE,CAAC,CAAC;YAClE,CAAC;YAEO,KAAK,CAAC,WAAW,CAAuB,OAAU;gBACxD,MAAM,MAAM,GAAG,OAAO,CAAC,WAAgC,CAAC;gBAExD,MAAM,UAAU,GAAG,MAAM,OAAO,CAAC,oBAAoB,EAAE,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,QAAQ,EAAE,CAAC,CAAC;gBAChF,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,mBAAmB,UAAU,EAAE,EAAE,EAAE,oBAAoB,EAAE,UAAU,EAAE,CAAC,CAAC;gBAEzF,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,cAAc,CAAC,MAAM,CAAC,QAAQ,EAAE,OAAO,CAAC,QAAQ,EAAE,CAAC,CAAC;gBACrF,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,gBAAgB,UAAU,OAAO,aAAa,QAAQ,EAAE;oBACxE,oBAAoB,EAAE,UAAU;oBAChC,UAAU,EAAE,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,QAAQ,EAAE;iBACxC,CAAC,CAAC;YACL,CAAC;YAED,0EAA0E;YAClE,KAAK,CAAC,UAAU;gBACtB,MAAM,UAAU,GAAG,IAAI,CAAC,CAAC,oBAAoB;gBAC7C,MAAM,OAAO,GAAG,IAAI,OAAO,CAAC,CAAC,QAAQ,EAAE,MAAM,EAAE,EAAE;oBAC/C,UAAU,CAAC,GAAG,EAAE,CAAC,MAAM,CAAC,IAAI,KAAK,CAAC,8BAA8B,CAAC,CAAC,EAAE,UAAU,CAAC,CAAC;gBAClF,CAAC,CAAC,CAAC;gBACH,IAAI,CAAC;oBACH,MAAM,OAAO,CAAC,IAAI,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,IAAI,EAAE,EAAE,OAAO,CAAC,CAAC,CAAC;oBAChD,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC;gBACtC,CAAC;gBAAC,OAAO,KAAK,EAAE,CAAC;oBACf,IAAI,CAAC,MAAM,CAAC,KAAK,CAAC,+BAA+B,EAAE,KAAK,CAAC,CAAC;gBAC5D,CAAC;YACH,CAAC;;;;sDAnYA,SAAS,CAAC,0CAA0C,EAAE,KAAK,EAAC,WAAW,EAAC,EAAE,CAAC,CAAC;oBAC3E,CAAC,UAAU,CAAC,YAAY,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,MAAM,CAAC,eAAe,CAAC,WAAW,CAAC,QAAQ,EAAE;oBAC5F,CAAC,UAAU,CAAC,WAAW,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,MAAM,CAAC,eAAe,CAAC,UAAU,CAAC,QAAQ,EAAE;oBAC1F,CAAC,UAAU,CAAC,aAAa,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,QAAQ,EAAE;oBAC1D,CAAC,UAAU,CAAC,MAAM,CAAC,EAAE,MAAM,WAAW,CAAC,oBAAoB,EAAE,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,QAAQ,EAAE,CAAC;iBACtF,CAAC,CAAC;gDAqBF,SAAS,CAAC,oCAAoC,EAAE,KAAK,EAAC,KAAK,EAAC,EAAE,CAAC,CAAC;oBAC/D,CAAC,UAAU,CAAC,YAAY,CAAC,EAAE,KAAK,CAAC,WAAW,CAAC,QAAQ,EAAE;oBACvD,CAAC,UAAU,CAAC,WAAW,CAAC,EAAE,KAAK,CAAC,UAAU,CAAC,QAAQ,EAAE;oBACrD,CAAC,UAAU,CAAC,aAAa,CAAC,EAAE,KAAK,CAAC,OAAO,CAAC,QAAQ,EAAE;oBACpD,CAAC,UAAU,CAAC,MAAM,CAAC,EAAE,MAAM,KAAK,CAAC,oBAAoB,EAAE,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,QAAQ,EAAE,CAAC;iBAChF,CAAC,CAAC;gDAiCF,SAAS,CAAC,oCAAoC,EAAE,KAAK,EAAC,WAAW,EAAC,EAAE,CAAC,CAAC;oBACrE,CAAC,UAAU,CAAC,YAAY,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,MAAM,CAAC,eAAe,CAAC,WAAW,CAAC,QAAQ,EAAE;oBAC5F,CAAC,UAAU,CAAC,WAAW,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,MAAM,CAAC,eAAe,CAAC,UAAU,CAAC,QAAQ,EAAE;oBAC1F,CAAC,UAAU,CAAC,aAAa,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,QAAQ,EAAE;oBAC1D,CAAC,UAAU,CAAC,MAAM,CAAC,EAAE,MAAM,WAAW,CAAC,oBAAoB,EAAE,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,QAAQ,EAAE,CAAC;iBACtF,CAAC,CAAC;+CAsCF,SAAS,CAAC,mCAAmC,EAAE,CAAC,eAAe,EAAE,WAAW,EAAE,EAAE,CAAC,CAAC;oBACjF,CAAC,UAAU,CAAC,OAAO,CAAC,EAAE,eAAe,CAAC,QAAQ,EAAE;iBACjD,CAAC,CAAC;gDA8EF,SAAS,CAAC,oCAAoC,EAAE,KAAK,EAAC,EAAE,EAAC,EAAE,CAAC,CAAC;oBAC5D,CAAC,UAAU,CAAC,OAAO,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,SAAS,EAAE,CAAC,CAAC,QAAQ,EAAE;iBACxD,CAAC,CAAC;+CAyIF,SAAS,CAAC,mCAAmC,EAAE,CAAC,OAAO,EAAE,WAAW,EAAE,EAAE,CAAC,CAAC;oBACzE,CAAC,UAAU,CAAC,WAAW,CAAC,EAAE,WAAW,CAAC,OAAO,CAAC,MAAM,CAAC,eAAe,CAAC,UAAU,CAAC,QAAQ,EAAE;iBAC3F,CAAC,CAAC;iDAiBF,SAAS,CAAC,qCAAqC,EAAE,CAAC,OAAO,EAAE,KAAK,EAAE,EAAE,CAAC,CAAC;oBACrE,CAAC,UAAU,CAAC,WAAW,CAAC,EAAE,KAAK,CAAC,OAAO,CAAC,MAAM,CAAC,eAAe,CAAC,UAAU,CAAC,QAAQ,EAAE;iBACrF,CAAC,CAAC;YArVH,+NAAc,0BAA0B,6DAWvC;YAeD,6MAAc,oBAAoB,6DA0BjC;YAYD,6MAAc,oBAAoB,6DAEjC;YAsCD,0MAAc,mBAAmB,6DAkBhC;YA8DD,6MAAc,oBAAoB,6DAqBjC;YAsHD,0MAAa,mBAAmB,6DAQ/B;YAWD,gNAAa,qBAAqB,6DAQjC;;;;;SAzwBU,aAAa"}
611
+ });
612
+ const validSnapshot = await snapshotValidator.validateTx(tx);
613
+ if (validSnapshot.result !== 'valid') {
614
+ this.peerManager.penalizePeer(peerId, PeerErrorSeverity.LowToleranceError);
615
+ return false;
616
+ }
617
+ return true;
618
+ }
619
+ /**
620
+ * Validate an attestation.
621
+ *
622
+ * @param attestation - The attestation to validate.
623
+ * @returns True if the attestation is valid, false otherwise.
624
+ */ async validateAttestation(peerId, attestation) {
625
+ const severity = await this.attestationValidator.validate(attestation);
626
+ if (severity) {
627
+ this.peerManager.penalizePeer(peerId, severity);
628
+ return false;
629
+ }
630
+ return true;
631
+ }
632
+ /**
633
+ * Validate a block proposal.
634
+ *
635
+ * @param block - The block proposal to validate.
636
+ * @returns True if the block proposal is valid, false otherwise.
637
+ */ async validateBlockProposal(peerId, block) {
638
+ const severity = await this.blockProposalValidator.validate(block);
639
+ if (severity) {
640
+ this.peerManager.penalizePeer(peerId, severity);
641
+ return false;
642
+ }
643
+ return true;
644
+ }
645
+ getPeerScore(peerId) {
646
+ return this.node.services.pubsub.score.score(peerId.toString());
647
+ }
648
+ async sendToPeers(message) {
649
+ const parent = message.constructor;
650
+ const identifier = await message.p2pMessageIdentifier().then((i)=>i.toString());
651
+ this.logger.trace(`Sending message ${identifier}`, {
652
+ p2pMessageIdentifier: identifier
653
+ });
654
+ const recipientsNum = await this.publishToTopic(parent.p2pTopic, message.toBuffer());
655
+ this.logger.debug(`Sent message ${identifier} to ${recipientsNum} peers`, {
656
+ p2pMessageIdentifier: identifier,
657
+ sourcePeer: this.node.peerId.toString()
658
+ });
659
+ }
660
+ // Libp2p seems to hang sometimes if new peers are initiating connections.
661
+ async stopLibP2P() {
662
+ const TIMEOUT_MS = 5000; // 5 seconds timeout
663
+ const timeout = new Promise((_resolve, reject)=>{
664
+ setTimeout(()=>reject(new Error('Timeout during libp2p.stop()')), TIMEOUT_MS);
665
+ });
666
+ try {
667
+ await Promise.race([
668
+ this.node.stop(),
669
+ timeout
670
+ ]);
671
+ this.logger.debug('LibP2P stopped');
672
+ } catch (error) {
673
+ this.logger.error('Error during stop or timeout:', error);
674
+ }
675
+ }
676
+ }
677
+ _ts_decorate([
678
+ trackSpan('Libp2pService.processValidBlockProposal', async (block)=>({
679
+ [Attributes.BLOCK_NUMBER]: block.blockNumber.toNumber(),
680
+ [Attributes.SLOT_NUMBER]: block.slotNumber.toNumber(),
681
+ [Attributes.BLOCK_ARCHIVE]: block.archive.toString(),
682
+ [Attributes.P2P_ID]: await block.p2pMessageIdentifier().then((i)=>i.toString())
683
+ }))
684
+ ], LibP2PService.prototype, "processValidBlockProposal", null);
685
+ _ts_decorate([
686
+ trackSpan('Libp2pService.broadcastAttestation', async (attestation)=>({
687
+ [Attributes.BLOCK_NUMBER]: attestation.payload.header.globalVariables.blockNumber.toNumber(),
688
+ [Attributes.SLOT_NUMBER]: attestation.payload.header.globalVariables.slotNumber.toNumber(),
689
+ [Attributes.BLOCK_ARCHIVE]: attestation.archive.toString(),
690
+ [Attributes.P2P_ID]: await attestation.p2pMessageIdentifier().then((i)=>i.toString())
691
+ }))
692
+ ], LibP2PService.prototype, "broadcastAttestation", null);
693
+ _ts_decorate([
694
+ trackSpan('Libp2pService.validateRequestedTx', (requestedTxHash, _responseTx)=>({
695
+ [Attributes.TX_HASH]: requestedTxHash.toString()
696
+ }))
697
+ ], LibP2PService.prototype, "validateRequestedTx", null);
698
+ _ts_decorate([
699
+ trackSpan('Libp2pService.validatePropagatedTx', async (tx)=>({
700
+ [Attributes.TX_HASH]: (await tx.getTxHash()).toString()
701
+ }))
702
+ ], LibP2PService.prototype, "validatePropagatedTx", null);
703
+ _ts_decorate([
704
+ trackSpan('Libp2pService.validateAttestation', async (_, attestation)=>({
705
+ [Attributes.BLOCK_NUMBER]: attestation.payload.header.globalVariables.blockNumber.toNumber(),
706
+ [Attributes.SLOT_NUMBER]: attestation.payload.header.globalVariables.slotNumber.toNumber(),
707
+ [Attributes.BLOCK_ARCHIVE]: attestation.archive.toString(),
708
+ [Attributes.P2P_ID]: await attestation.p2pMessageIdentifier().then((i)=>i.toString())
709
+ }))
710
+ ], LibP2PService.prototype, "validateAttestation", null);
711
+ _ts_decorate([
712
+ trackSpan('Libp2pService.validateBlockProposal', (_peerId, block)=>({
713
+ [Attributes.SLOT_NUMBER]: block.payload.header.globalVariables.slotNumber.toString()
714
+ }))
715
+ ], LibP2PService.prototype, "validateBlockProposal", null);