@aztec/pxe 0.0.1-commit.cd76b27 → 0.0.1-commit.ce4f8c4f2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dest/config/index.d.ts +2 -2
- package/dest/config/index.d.ts.map +1 -1
- package/dest/config/index.js +1 -1
- package/dest/contract_function_simulator/contract_function_simulator.d.ts +9 -3
- package/dest/contract_function_simulator/contract_function_simulator.d.ts.map +1 -1
- package/dest/contract_function_simulator/contract_function_simulator.js +33 -11
- package/dest/contract_function_simulator/execution_tagging_index_cache.d.ts +7 -7
- package/dest/contract_function_simulator/execution_tagging_index_cache.d.ts.map +1 -1
- package/dest/contract_function_simulator/execution_tagging_index_cache.js +19 -11
- package/dest/contract_function_simulator/index.d.ts +2 -1
- package/dest/contract_function_simulator/index.d.ts.map +1 -1
- package/dest/contract_function_simulator/index.js +1 -0
- package/dest/contract_function_simulator/noir-structs/event_validation_request.d.ts +2 -3
- package/dest/contract_function_simulator/noir-structs/event_validation_request.d.ts.map +1 -1
- package/dest/contract_function_simulator/noir-structs/event_validation_request.js +5 -4
- package/dest/contract_function_simulator/noir-structs/log_retrieval_response.d.ts +1 -1
- package/dest/contract_function_simulator/noir-structs/log_retrieval_response.d.ts.map +1 -1
- package/dest/contract_function_simulator/noir-structs/log_retrieval_response.js +1 -3
- package/dest/contract_function_simulator/noir-structs/message_tx_context.d.ts +16 -0
- package/dest/contract_function_simulator/noir-structs/message_tx_context.d.ts.map +1 -0
- package/dest/contract_function_simulator/noir-structs/message_tx_context.js +57 -0
- package/dest/contract_function_simulator/noir-structs/note_validation_request.d.ts +2 -4
- package/dest/contract_function_simulator/noir-structs/note_validation_request.d.ts.map +1 -1
- package/dest/contract_function_simulator/noir-structs/note_validation_request.js +3 -5
- package/dest/contract_function_simulator/oracle/interfaces.d.ts +50 -45
- package/dest/contract_function_simulator/oracle/interfaces.d.ts.map +1 -1
- package/dest/contract_function_simulator/oracle/legacy_oracle_mappings.d.ts +9 -0
- package/dest/contract_function_simulator/oracle/legacy_oracle_mappings.d.ts.map +1 -0
- package/dest/contract_function_simulator/oracle/legacy_oracle_mappings.js +42 -0
- package/dest/contract_function_simulator/oracle/oracle.d.ts +45 -44
- package/dest/contract_function_simulator/oracle/oracle.d.ts.map +1 -1
- package/dest/contract_function_simulator/oracle/oracle.js +163 -94
- package/dest/contract_function_simulator/oracle/private_execution.js +5 -3
- package/dest/contract_function_simulator/oracle/private_execution_oracle.d.ts +22 -47
- package/dest/contract_function_simulator/oracle/private_execution_oracle.d.ts.map +1 -1
- package/dest/contract_function_simulator/oracle/private_execution_oracle.js +40 -80
- package/dest/contract_function_simulator/oracle/utility_execution_oracle.d.ts +57 -39
- package/dest/contract_function_simulator/oracle/utility_execution_oracle.d.ts.map +1 -1
- package/dest/contract_function_simulator/oracle/utility_execution_oracle.js +138 -63
- package/dest/contract_logging.d.ts +22 -0
- package/dest/contract_logging.d.ts.map +1 -0
- package/dest/contract_logging.js +23 -0
- package/dest/contract_sync/contract_sync_service.d.ts +5 -3
- package/dest/contract_sync/contract_sync_service.d.ts.map +1 -1
- package/dest/contract_sync/contract_sync_service.js +47 -30
- package/dest/entrypoints/client/bundle/index.d.ts +2 -1
- package/dest/entrypoints/client/bundle/index.d.ts.map +1 -1
- package/dest/entrypoints/client/bundle/index.js +1 -0
- package/dest/entrypoints/client/lazy/index.d.ts +2 -1
- package/dest/entrypoints/client/lazy/index.d.ts.map +1 -1
- package/dest/entrypoints/client/lazy/index.js +1 -0
- package/dest/logs/log_service.d.ts +1 -1
- package/dest/logs/log_service.d.ts.map +1 -1
- package/dest/logs/log_service.js +4 -4
- package/dest/messages/message_context_service.d.ts +17 -0
- package/dest/messages/message_context_service.d.ts.map +1 -0
- package/dest/messages/message_context_service.js +36 -0
- package/dest/oracle_version.d.ts +2 -2
- package/dest/oracle_version.js +3 -3
- package/dest/private_kernel/hints/private_kernel_reset_private_inputs_builder.d.ts +4 -3
- package/dest/private_kernel/hints/private_kernel_reset_private_inputs_builder.d.ts.map +1 -1
- package/dest/private_kernel/hints/private_kernel_reset_private_inputs_builder.js +125 -64
- package/dest/private_kernel/hints/test_utils.d.ts +122 -0
- package/dest/private_kernel/hints/test_utils.d.ts.map +1 -0
- package/dest/private_kernel/hints/test_utils.js +203 -0
- package/dest/private_kernel/private_kernel_execution_prover.d.ts +1 -1
- package/dest/private_kernel/private_kernel_execution_prover.d.ts.map +1 -1
- package/dest/private_kernel/private_kernel_execution_prover.js +13 -5
- package/dest/private_kernel/private_kernel_oracle.d.ts +6 -2
- package/dest/private_kernel/private_kernel_oracle.d.ts.map +1 -1
- package/dest/private_kernel/private_kernel_oracle.js +7 -3
- package/dest/pxe.d.ts +8 -4
- package/dest/pxe.d.ts.map +1 -1
- package/dest/pxe.js +55 -33
- package/dest/storage/contract_store/contract_store.d.ts +42 -15
- package/dest/storage/contract_store/contract_store.d.ts.map +1 -1
- package/dest/storage/contract_store/contract_store.js +140 -64
- package/dest/storage/metadata.d.ts +1 -1
- package/dest/storage/metadata.js +1 -1
- package/dest/storage/tagging_store/recipient_tagging_store.d.ts +6 -6
- package/dest/storage/tagging_store/recipient_tagging_store.d.ts.map +1 -1
- package/dest/storage/tagging_store/sender_tagging_store.d.ts +29 -28
- package/dest/storage/tagging_store/sender_tagging_store.d.ts.map +1 -1
- package/dest/storage/tagging_store/sender_tagging_store.js +141 -115
- package/dest/tagging/index.d.ts +3 -3
- package/dest/tagging/index.d.ts.map +1 -1
- package/dest/tagging/index.js +1 -1
- package/dest/tagging/recipient_sync/load_private_logs_for_sender_recipient_pair.d.ts +4 -5
- package/dest/tagging/recipient_sync/load_private_logs_for_sender_recipient_pair.d.ts.map +1 -1
- package/dest/tagging/recipient_sync/load_private_logs_for_sender_recipient_pair.js +3 -3
- package/dest/tagging/recipient_sync/utils/load_logs_for_range.d.ts +6 -7
- package/dest/tagging/recipient_sync/utils/load_logs_for_range.d.ts.map +1 -1
- package/dest/tagging/recipient_sync/utils/load_logs_for_range.js +12 -11
- package/dest/tagging/sender_sync/sync_sender_tagging_indexes.d.ts +4 -8
- package/dest/tagging/sender_sync/sync_sender_tagging_indexes.d.ts.map +1 -1
- package/dest/tagging/sender_sync/sync_sender_tagging_indexes.js +13 -7
- package/dest/tagging/sender_sync/utils/get_status_change_of_pending.d.ts +4 -3
- package/dest/tagging/sender_sync/utils/get_status_change_of_pending.d.ts.map +1 -1
- package/dest/tagging/sender_sync/utils/get_status_change_of_pending.js +20 -10
- package/dest/tagging/sender_sync/utils/load_and_store_new_tagging_indexes.d.ts +5 -7
- package/dest/tagging/sender_sync/utils/load_and_store_new_tagging_indexes.d.ts.map +1 -1
- package/dest/tagging/sender_sync/utils/load_and_store_new_tagging_indexes.js +36 -24
- package/package.json +16 -16
- package/src/config/index.ts +1 -1
- package/src/contract_function_simulator/contract_function_simulator.ts +51 -20
- package/src/contract_function_simulator/execution_tagging_index_cache.ts +19 -14
- package/src/contract_function_simulator/index.ts +1 -0
- package/src/contract_function_simulator/noir-structs/event_validation_request.ts +8 -5
- package/src/contract_function_simulator/noir-structs/log_retrieval_response.ts +1 -4
- package/src/contract_function_simulator/noir-structs/message_tx_context.ts +55 -0
- package/src/contract_function_simulator/noir-structs/note_validation_request.ts +3 -6
- package/src/contract_function_simulator/oracle/interfaces.ts +54 -54
- package/src/contract_function_simulator/oracle/legacy_oracle_mappings.ts +135 -0
- package/src/contract_function_simulator/oracle/oracle.ts +176 -138
- package/src/contract_function_simulator/oracle/private_execution.ts +4 -4
- package/src/contract_function_simulator/oracle/private_execution_oracle.ts +45 -99
- package/src/contract_function_simulator/oracle/utility_execution_oracle.ts +200 -80
- package/src/contract_logging.ts +39 -0
- package/src/contract_sync/contract_sync_service.ts +67 -38
- package/src/entrypoints/client/bundle/index.ts +1 -0
- package/src/entrypoints/client/lazy/index.ts +1 -0
- package/src/logs/log_service.ts +10 -5
- package/src/messages/message_context_service.ts +45 -0
- package/src/oracle_version.ts +3 -3
- package/src/private_kernel/hints/private_kernel_reset_private_inputs_builder.ts +157 -110
- package/src/private_kernel/hints/test_utils.ts +325 -0
- package/src/private_kernel/private_kernel_execution_prover.ts +13 -6
- package/src/private_kernel/private_kernel_oracle.ts +7 -7
- package/src/pxe.ts +74 -34
- package/src/storage/contract_store/contract_store.ts +170 -71
- package/src/storage/metadata.ts +1 -1
- package/src/storage/tagging_store/recipient_tagging_store.ts +9 -5
- package/src/storage/tagging_store/sender_tagging_store.ts +185 -138
- package/src/tagging/index.ts +2 -2
- package/src/tagging/recipient_sync/load_private_logs_for_sender_recipient_pair.ts +3 -6
- package/src/tagging/recipient_sync/utils/load_logs_for_range.ts +10 -15
- package/src/tagging/sender_sync/sync_sender_tagging_indexes.ts +23 -10
- package/src/tagging/sender_sync/utils/get_status_change_of_pending.ts +26 -11
- package/src/tagging/sender_sync/utils/load_and_store_new_tagging_indexes.ts +27 -26
|
@@ -1,3 +1,4 @@
|
|
|
1
|
+
import { ExtendedDirectionalAppTaggingSecret, SiloedTag } from '@aztec/stdlib/logs';
|
|
1
2
|
import { TxHash } from '@aztec/stdlib/tx';
|
|
2
3
|
import { UNFINALIZED_TAGGING_INDEXES_WINDOW_LEN } from '../../tagging/constants.js';
|
|
3
4
|
/**
|
|
@@ -7,18 +8,17 @@ import { UNFINALIZED_TAGGING_INDEXES_WINDOW_LEN } from '../../tagging/constants.
|
|
|
7
8
|
*/ export class SenderTaggingStore {
|
|
8
9
|
storeName = 'sender_tagging';
|
|
9
10
|
#store;
|
|
10
|
-
// Stores the pending
|
|
11
|
-
// the private logs with tags corresponding to these indexes has not been finalized yet.
|
|
11
|
+
// Stores the pending index ranges for each directional app tagging secret. Pending here means that the tx that
|
|
12
|
+
// contained the private logs with tags corresponding to these indexes has not been finalized yet.
|
|
12
13
|
//
|
|
13
|
-
// We
|
|
14
|
-
//
|
|
15
|
-
//
|
|
14
|
+
// We store the full range (lowestIndex, highestIndex) for each secret-tx pair because transactions can partially
|
|
15
|
+
// revert, in which case only some logs (from the non-revertible phase) survive onchain. By storing the range,
|
|
16
|
+
// we can expand it and check each individual siloed tag against the TxEffect to determine which indexes made it
|
|
17
|
+
// onchain.
|
|
16
18
|
//
|
|
17
|
-
//
|
|
18
|
-
//
|
|
19
|
-
// directional app tagging secret => { pending index, txHash }[]
|
|
19
|
+
// directional app tagging secret => { lowestIndex, highestIndex, txHash }[]
|
|
20
20
|
#pendingIndexes;
|
|
21
|
-
// jobId => directional app tagging secret => {
|
|
21
|
+
// jobId => directional app tagging secret => { lowestIndex, highestIndex, txHash }[]
|
|
22
22
|
#pendingIndexesForJob;
|
|
23
23
|
// Stores the last (highest) finalized index for each directional app tagging secret. We care only about the last
|
|
24
24
|
// index because unlike the pending indexes, it will never happen that a finalized index would be removed and hence
|
|
@@ -100,82 +100,62 @@ import { UNFINALIZED_TAGGING_INDEXES_WINDOW_LEN } from '../../tagging/constants.
|
|
|
100
100
|
return Promise.resolve();
|
|
101
101
|
}
|
|
102
102
|
/**
|
|
103
|
-
* Stores pending
|
|
104
|
-
* @remarks
|
|
105
|
-
*
|
|
106
|
-
*
|
|
107
|
-
* @param
|
|
108
|
-
* stored in the db.
|
|
109
|
-
* @param txHash - The tx in which the
|
|
103
|
+
* Stores pending index ranges.
|
|
104
|
+
* @remarks If the same (secret, txHash) pair already exists in the db with an equal range, it's a no-op. This is
|
|
105
|
+
* expected to happen because whenever we start sync we start from the last finalized index and we can have pending
|
|
106
|
+
* ranges already stored from previous syncs. If the ranges differ, it throws an error as that indicates a bug.
|
|
107
|
+
* @param ranges - The tagging index ranges containing the directional app tagging secrets and the index ranges that are
|
|
108
|
+
* to be stored in the db.
|
|
109
|
+
* @param txHash - The tx in which the tagging indexes were used in private logs.
|
|
110
110
|
* @param jobId - job context for staged writes to this store. See `JobCoordinator` for more details.
|
|
111
|
-
* @throws If
|
|
112
|
-
*
|
|
113
|
-
*
|
|
114
|
-
|
|
115
|
-
|
|
116
|
-
* window length ahead of the highest finalized index.
|
|
117
|
-
* @throws If a secret + txHash pair already exists in the db with a different index value. It should never happen
|
|
118
|
-
* that we would attempt to store a different index for a given secret-txHash pair because we always store just the
|
|
119
|
-
* highest index for a given secret-txHash pair. Hence this is a good way to catch bugs.
|
|
120
|
-
* @throws If the newly stored pending index is lower than or equal to the last finalized index for the same secret.
|
|
121
|
-
* This is enforced because this should never happen if the syncing is done correctly as we look for logs from higher
|
|
122
|
-
* indexes than finalized ones.
|
|
123
|
-
*/ storePendingIndexes(preTags, txHash, jobId) {
|
|
124
|
-
if (preTags.length === 0) {
|
|
111
|
+
* @throws If the highestIndex is further than window length from the highest finalized index for the same secret.
|
|
112
|
+
* @throws If the lowestIndex is lower than or equal to the last finalized index for the same secret.
|
|
113
|
+
* @throws If a different range already exists for the same (secret, txHash) pair.
|
|
114
|
+
*/ storePendingIndexes(ranges, txHash, jobId) {
|
|
115
|
+
if (ranges.length === 0) {
|
|
125
116
|
return Promise.resolve();
|
|
126
117
|
}
|
|
127
|
-
// The secrets in pre-tags should be unique because we always store just the highest index per given secret-txHash
|
|
128
|
-
// pair. Below we check that this is the case.
|
|
129
|
-
const secretsSet = new Set(preTags.map((preTag)=>preTag.secret.toString()));
|
|
130
|
-
if (secretsSet.size !== preTags.length) {
|
|
131
|
-
return Promise.reject(new Error(`Duplicate secrets found when storing pending indexes`));
|
|
132
|
-
}
|
|
133
118
|
const txHashStr = txHash.toString();
|
|
134
119
|
return this.#store.transactionAsync(async ()=>{
|
|
135
120
|
// Prefetch all data, start reads during iteration to keep IndexedDB transaction alive
|
|
136
|
-
const
|
|
137
|
-
|
|
138
|
-
|
|
139
|
-
|
|
140
|
-
|
|
141
|
-
|
|
142
|
-
pending: this.#readPendingIndexes(jobId, secretStr),
|
|
143
|
-
finalized: this.#readLastFinalizedIndex(jobId, secretStr)
|
|
144
|
-
};
|
|
145
|
-
});
|
|
121
|
+
const rangeReadPromises = ranges.map((range)=>({
|
|
122
|
+
range,
|
|
123
|
+
secretStr: range.extendedSecret.toString(),
|
|
124
|
+
pending: this.#readPendingIndexes(jobId, range.extendedSecret.toString()),
|
|
125
|
+
finalized: this.#readLastFinalizedIndex(jobId, range.extendedSecret.toString())
|
|
126
|
+
}));
|
|
146
127
|
// Await all reads together
|
|
147
|
-
const
|
|
128
|
+
const rangeData = await Promise.all(rangeReadPromises.map(async (item)=>({
|
|
148
129
|
...item,
|
|
149
130
|
pendingData: await item.pending,
|
|
150
131
|
finalizedIndex: await item.finalized
|
|
151
132
|
})));
|
|
152
133
|
// Process in memory and validate
|
|
153
|
-
for (const {
|
|
154
|
-
//
|
|
155
|
-
|
|
156
|
-
|
|
157
|
-
throw new Error(`Highest used index ${index} is further than window length from the highest finalized index ${finalizedIndex ?? 0}.
|
|
134
|
+
for (const { range, secretStr, pendingData, finalizedIndex } of rangeData){
|
|
135
|
+
// Check that the highest index is not further than window length from the highest finalized index.
|
|
136
|
+
if (range.highestIndex > (finalizedIndex ?? 0) + UNFINALIZED_TAGGING_INDEXES_WINDOW_LEN) {
|
|
137
|
+
throw new Error(`Highest used index ${range.highestIndex} is further than window length from the highest finalized index ${finalizedIndex ?? 0}.
|
|
158
138
|
Tagging window length ${UNFINALIZED_TAGGING_INDEXES_WINDOW_LEN} is configured too low. Contact the Aztec team
|
|
159
139
|
to increase it!`);
|
|
160
140
|
}
|
|
161
|
-
// Throw if the
|
|
162
|
-
if (finalizedIndex !== undefined &&
|
|
163
|
-
throw new Error(`Cannot store pending index ${
|
|
141
|
+
// Throw if the lowest index is lower than or equal to the last finalized index
|
|
142
|
+
if (finalizedIndex !== undefined && range.lowestIndex <= finalizedIndex) {
|
|
143
|
+
throw new Error(`Cannot store pending index range [${range.lowestIndex}, ${range.highestIndex}] for secret ${secretStr}: ` + `lowestIndex is lower than or equal to the last finalized index ${finalizedIndex}`);
|
|
164
144
|
}
|
|
165
|
-
// Check if
|
|
166
|
-
const
|
|
167
|
-
if (
|
|
168
|
-
//
|
|
169
|
-
if (
|
|
170
|
-
throw new Error(`
|
|
145
|
+
// Check if an entry with the same txHash already exists
|
|
146
|
+
const existingEntry = pendingData.find((entry)=>entry.txHash === txHashStr);
|
|
147
|
+
if (existingEntry) {
|
|
148
|
+
// Assert that the ranges are equal — different ranges for the same (secret, txHash) indicates a bug
|
|
149
|
+
if (existingEntry.lowestIndex !== range.lowestIndex || existingEntry.highestIndex !== range.highestIndex) {
|
|
150
|
+
throw new Error(`Conflicting range for secret ${secretStr} and txHash ${txHashStr}: ` + `existing [${existingEntry.lowestIndex}, ${existingEntry.highestIndex}] vs ` + `new [${range.lowestIndex}, ${range.highestIndex}]`);
|
|
171
151
|
}
|
|
172
|
-
//
|
|
152
|
+
// Exact duplicate — skip
|
|
173
153
|
} else {
|
|
174
|
-
// If it doesn't exist, add it
|
|
175
154
|
this.#writePendingIndexes(jobId, secretStr, [
|
|
176
155
|
...pendingData,
|
|
177
156
|
{
|
|
178
|
-
|
|
157
|
+
lowestIndex: range.lowestIndex,
|
|
158
|
+
highestIndex: range.highestIndex,
|
|
179
159
|
txHash: txHashStr
|
|
180
160
|
}
|
|
181
161
|
]);
|
|
@@ -184,8 +164,9 @@ import { UNFINALIZED_TAGGING_INDEXES_WINDOW_LEN } from '../../tagging/constants.
|
|
|
184
164
|
});
|
|
185
165
|
}
|
|
186
166
|
/**
|
|
187
|
-
* Returns the transaction hashes of all pending transactions that contain indexes within a specified range
|
|
188
|
-
* for a given directional app tagging secret.
|
|
167
|
+
* Returns the transaction hashes of all pending transactions that contain highest indexes within a specified range
|
|
168
|
+
* for a given directional app tagging secret. We check based on the highest indexes only as that is the relevant
|
|
169
|
+
* information for the caller of this function.
|
|
189
170
|
* @param secret - The directional app tagging secret to query pending indexes for.
|
|
190
171
|
* @param startIndex - The lower bound of the index range (inclusive).
|
|
191
172
|
* @param endIndex - The upper bound of the index range (exclusive).
|
|
@@ -194,7 +175,7 @@ import { UNFINALIZED_TAGGING_INDEXES_WINDOW_LEN } from '../../tagging/constants.
|
|
|
194
175
|
*/ getTxHashesOfPendingIndexes(secret, startIndex, endIndex, jobId) {
|
|
195
176
|
return this.#store.transactionAsync(async ()=>{
|
|
196
177
|
const existing = await this.#readPendingIndexes(jobId, secret.toString());
|
|
197
|
-
const txHashes = existing.filter((entry)=>entry.
|
|
178
|
+
const txHashes = existing.filter((entry)=>entry.highestIndex >= startIndex && entry.highestIndex < endIndex).map((entry)=>entry.txHash);
|
|
198
179
|
return Array.from(new Set(txHashes)).map(TxHash.fromString);
|
|
199
180
|
});
|
|
200
181
|
}
|
|
@@ -215,17 +196,16 @@ import { UNFINALIZED_TAGGING_INDEXES_WINDOW_LEN } from '../../tagging/constants.
|
|
|
215
196
|
return this.#store.transactionAsync(async ()=>{
|
|
216
197
|
const pendingPromise = this.#readPendingIndexes(jobId, secretStr);
|
|
217
198
|
const finalizedPromise = this.#readLastFinalizedIndex(jobId, secretStr);
|
|
218
|
-
const [
|
|
199
|
+
const [pendingEntries, lastFinalized] = await Promise.all([
|
|
219
200
|
pendingPromise,
|
|
220
201
|
finalizedPromise
|
|
221
202
|
]);
|
|
222
|
-
|
|
223
|
-
if (pendingTxScopedIndexes.length === 0) {
|
|
203
|
+
if (pendingEntries.length === 0) {
|
|
224
204
|
return lastFinalized;
|
|
225
205
|
}
|
|
226
|
-
// As the last used index we return the highest one from the pending
|
|
227
|
-
// higher than the last finalized index because we prune lower pending indexes when a tx is finalized.
|
|
228
|
-
return Math.max(...
|
|
206
|
+
// As the last used index we return the highest one from the pending index ranges. Note that this value will be
|
|
207
|
+
// always higher than the last finalized index because we prune lower pending indexes when a tx is finalized.
|
|
208
|
+
return Math.max(...pendingEntries.map((entry)=>entry.highestIndex));
|
|
229
209
|
});
|
|
230
210
|
}
|
|
231
211
|
/**
|
|
@@ -269,14 +249,7 @@ import { UNFINALIZED_TAGGING_INDEXES_WINDOW_LEN } from '../../tagging/constants.
|
|
|
269
249
|
}
|
|
270
250
|
});
|
|
271
251
|
}
|
|
272
|
-
/**
|
|
273
|
-
* Updates pending indexes corresponding to the given transaction hashes to be finalized and prunes any lower pending
|
|
274
|
-
* indexes.
|
|
275
|
-
*/ finalizePendingIndexes(txHashes, jobId) {
|
|
276
|
-
if (txHashes.length === 0) {
|
|
277
|
-
return Promise.resolve();
|
|
278
|
-
}
|
|
279
|
-
const txHashStrings = new Set(txHashes.map((tx)=>tx.toString()));
|
|
252
|
+
/** Prefetches all pending and finalized index data for every secret (from both DB and staged writes). */ #getSecretsWithPendingData(jobId) {
|
|
280
253
|
return this.#store.transactionAsync(async ()=>{
|
|
281
254
|
// Prefetch all data, start reads during iteration to keep IndexedDB transaction alive
|
|
282
255
|
const secretDataPromises = new Map();
|
|
@@ -304,45 +277,98 @@ import { UNFINALIZED_TAGGING_INDEXES_WINDOW_LEN } from '../../tagging/constants.
|
|
|
304
277
|
pendingData: await secretDataPromises.get(secret).pending,
|
|
305
278
|
lastFinalized: await secretDataPromises.get(secret).finalized
|
|
306
279
|
})));
|
|
307
|
-
|
|
308
|
-
|
|
309
|
-
|
|
280
|
+
return dataResults.filter((r)=>r.pendingData.length > 0);
|
|
281
|
+
});
|
|
282
|
+
}
|
|
283
|
+
/**
|
|
284
|
+
* Updates pending indexes corresponding to the given transaction hashes to be finalized and prunes any lower pending
|
|
285
|
+
* indexes.
|
|
286
|
+
*/ async finalizePendingIndexes(txHashes, jobId) {
|
|
287
|
+
if (txHashes.length === 0) {
|
|
288
|
+
return;
|
|
289
|
+
}
|
|
290
|
+
const txHashStrings = new Set(txHashes.map((tx)=>tx.toString()));
|
|
291
|
+
const secretsWithData = await this.#getSecretsWithPendingData(jobId);
|
|
292
|
+
for (const { secret, pendingData, lastFinalized } of secretsWithData){
|
|
293
|
+
let currentPending = pendingData;
|
|
294
|
+
let currentFinalized = lastFinalized;
|
|
295
|
+
// Process all txHashes for this secret
|
|
296
|
+
for (const txHashStr of txHashStrings){
|
|
297
|
+
const matchingEntries = currentPending.filter((item)=>item.txHash === txHashStr);
|
|
298
|
+
if (matchingEntries.length === 0) {
|
|
310
299
|
continue;
|
|
311
300
|
}
|
|
312
|
-
|
|
313
|
-
|
|
314
|
-
|
|
315
|
-
|
|
316
|
-
const matchingIndexes = currentPending.filter((item)=>item.txHash === txHashStr).map((item)=>item.index);
|
|
317
|
-
if (matchingIndexes.length === 0) {
|
|
318
|
-
continue;
|
|
319
|
-
}
|
|
320
|
-
if (matchingIndexes.length > 1) {
|
|
321
|
-
// We should always just store the highest pending index for a given tx hash and secret because the lower
|
|
322
|
-
// values are irrelevant.
|
|
323
|
-
throw new Error(`Multiple pending indexes found for tx hash ${txHashStr} and secret ${secret}`);
|
|
324
|
-
}
|
|
325
|
-
const newFinalized = matchingIndexes[0];
|
|
326
|
-
if (newFinalized < (currentFinalized ?? 0)) {
|
|
327
|
-
// This should never happen because when last finalized index was finalized we should have pruned the lower
|
|
328
|
-
// pending indexes.
|
|
329
|
-
throw new Error(`New finalized index ${newFinalized} is smaller than the current last finalized index ${currentFinalized}`);
|
|
330
|
-
}
|
|
331
|
-
currentFinalized = newFinalized;
|
|
332
|
-
// When we add pending indexes, we ensure they are higher than the last finalized index. However, because we
|
|
333
|
-
// cannot control the order in which transactions are finalized, there may be pending indexes that are now
|
|
334
|
-
// obsolete because they are lower than the most recently finalized index. For this reason, we prune these
|
|
335
|
-
// outdated pending indexes.
|
|
336
|
-
currentPending = currentPending.filter((item)=>item.index > currentFinalized);
|
|
301
|
+
if (matchingEntries.length > 1) {
|
|
302
|
+
// We should always just store the highest pending index for a given tx hash and secret because the lower
|
|
303
|
+
// values are irrelevant.
|
|
304
|
+
throw new Error(`Multiple pending entries found for tx hash ${txHashStr} and secret ${secret}`);
|
|
337
305
|
}
|
|
338
|
-
|
|
339
|
-
if (currentFinalized
|
|
340
|
-
|
|
306
|
+
const newFinalized = matchingEntries[0].highestIndex;
|
|
307
|
+
if (newFinalized < (currentFinalized ?? 0)) {
|
|
308
|
+
// This should never happen because when last finalized index was finalized we should have pruned the lower
|
|
309
|
+
// pending indexes.
|
|
310
|
+
throw new Error(`New finalized index ${newFinalized} is smaller than the current last finalized index ${currentFinalized}`);
|
|
341
311
|
}
|
|
342
|
-
|
|
343
|
-
|
|
312
|
+
currentFinalized = newFinalized;
|
|
313
|
+
// When we add pending indexes, we ensure they are higher than the last finalized index. However, because we
|
|
314
|
+
// cannot control the order in which transactions are finalized, there may be pending indexes that are now
|
|
315
|
+
// obsolete because they are lower than the most recently finalized index. For this reason, we prune these
|
|
316
|
+
// outdated pending indexes.
|
|
317
|
+
currentPending = currentPending.filter((item)=>item.highestIndex > currentFinalized);
|
|
318
|
+
}
|
|
319
|
+
// Write final state if changed
|
|
320
|
+
if (currentFinalized !== lastFinalized) {
|
|
321
|
+
this.#writeLastFinalizedIndex(jobId, secret, currentFinalized);
|
|
322
|
+
}
|
|
323
|
+
if (currentPending !== pendingData) {
|
|
324
|
+
this.#writePendingIndexes(jobId, secret, currentPending);
|
|
325
|
+
}
|
|
326
|
+
}
|
|
327
|
+
}
|
|
328
|
+
/**
|
|
329
|
+
* Handles finalization of pending indexes for a transaction whose execution was partially reverted.
|
|
330
|
+
* Recomputes the siloed tags for each pending index of the given tx and checks which ones appear in the
|
|
331
|
+
* TxEffect's private logs (i.e., which ones made it onchain). Those that survived are finalized; those that
|
|
332
|
+
* didn't are dropped.
|
|
333
|
+
* @param txEffect - The tx effect of the partially reverted transaction.
|
|
334
|
+
* @param jobId - job context for staged writes to this store. See `JobCoordinator` for more details.
|
|
335
|
+
*/ async finalizePendingIndexesOfAPartiallyRevertedTx(txEffect, jobId) {
|
|
336
|
+
const txHashStr = txEffect.txHash.toString();
|
|
337
|
+
// Build a set of all siloed tag values that made it onchain (first field of each private log).
|
|
338
|
+
const onChainTags = new Set(txEffect.privateLogs.map((log)=>log.fields[0].toString()));
|
|
339
|
+
const secretsWithData = await this.#getSecretsWithPendingData(jobId);
|
|
340
|
+
for (const { secret, pendingData, lastFinalized } of secretsWithData){
|
|
341
|
+
const matchingEntries = pendingData.filter((item)=>item.txHash === txHashStr);
|
|
342
|
+
if (matchingEntries.length === 0) {
|
|
343
|
+
continue;
|
|
344
|
+
}
|
|
345
|
+
if (matchingEntries.length > 1) {
|
|
346
|
+
// We should always just store the highest pending index for a given tx hash and secret because the lower
|
|
347
|
+
// values are irrelevant.
|
|
348
|
+
throw new Error(`Multiple pending entries found for tx hash ${txHashStr} and secret ${secret}`);
|
|
349
|
+
}
|
|
350
|
+
const pendingEntry = matchingEntries[0];
|
|
351
|
+
// Expand each matching entry's range and recompute siloed tags for each index.
|
|
352
|
+
const extendedSecret = ExtendedDirectionalAppTaggingSecret.fromString(secret);
|
|
353
|
+
let highestSurvivingIndex;
|
|
354
|
+
for(let index = pendingEntry.lowestIndex; index <= pendingEntry.highestIndex; index++){
|
|
355
|
+
const siloedTag = await SiloedTag.compute({
|
|
356
|
+
extendedSecret,
|
|
357
|
+
index
|
|
358
|
+
});
|
|
359
|
+
if (onChainTags.has(siloedTag.value.toString())) {
|
|
360
|
+
highestSurvivingIndex = highestSurvivingIndex !== undefined ? Math.max(highestSurvivingIndex, index) : index;
|
|
344
361
|
}
|
|
345
362
|
}
|
|
346
|
-
|
|
363
|
+
// Remove all entries for this txHash from pending (both surviving and non-surviving).
|
|
364
|
+
let currentPending = pendingData.filter((item)=>item.txHash !== txHashStr);
|
|
365
|
+
if (highestSurvivingIndex !== undefined) {
|
|
366
|
+
const newFinalized = Math.max(lastFinalized ?? 0, highestSurvivingIndex);
|
|
367
|
+
this.#writeLastFinalizedIndex(jobId, secret, newFinalized);
|
|
368
|
+
// Prune pending indexes that are now <= the finalized index.
|
|
369
|
+
currentPending = currentPending.filter((item)=>item.highestIndex > newFinalized);
|
|
370
|
+
}
|
|
371
|
+
this.#writePendingIndexes(jobId, secret, currentPending);
|
|
372
|
+
}
|
|
347
373
|
}
|
|
348
374
|
}
|
package/dest/tagging/index.d.ts
CHANGED
|
@@ -12,6 +12,6 @@ export { loadPrivateLogsForSenderRecipientPair } from './recipient_sync/load_pri
|
|
|
12
12
|
export { syncSenderTaggingIndexes } from './sender_sync/sync_sender_tagging_indexes.js';
|
|
13
13
|
export { UNFINALIZED_TAGGING_INDEXES_WINDOW_LEN } from './constants.js';
|
|
14
14
|
export { getAllPrivateLogsByTags, getAllPublicLogsByTagsFromContract } from './get_all_logs_by_tags.js';
|
|
15
|
-
export {
|
|
16
|
-
export { type PreTag } from '@aztec/stdlib/logs';
|
|
17
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
15
|
+
export { ExtendedDirectionalAppTaggingSecret, Tag, SiloedTag } from '@aztec/stdlib/logs';
|
|
16
|
+
export { type PreTag, type TaggingIndexRange } from '@aztec/stdlib/logs';
|
|
17
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/tagging/index.ts"],"names":[],"mappings":"AAAA;;;;;;;;;GASG;AAEH,OAAO,EAAE,qCAAqC,EAAE,MAAM,iEAAiE,CAAC;AACxH,OAAO,EAAE,wBAAwB,EAAE,MAAM,8CAA8C,CAAC;AACxF,OAAO,EAAE,sCAAsC,EAAE,MAAM,gBAAgB,CAAC;AACxE,OAAO,EAAE,uBAAuB,EAAE,kCAAkC,EAAE,MAAM,2BAA2B,CAAC;AAGxG,OAAO,EAAE,
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/tagging/index.ts"],"names":[],"mappings":"AAAA;;;;;;;;;GASG;AAEH,OAAO,EAAE,qCAAqC,EAAE,MAAM,iEAAiE,CAAC;AACxH,OAAO,EAAE,wBAAwB,EAAE,MAAM,8CAA8C,CAAC;AACxF,OAAO,EAAE,sCAAsC,EAAE,MAAM,gBAAgB,CAAC;AACxE,OAAO,EAAE,uBAAuB,EAAE,kCAAkC,EAAE,MAAM,2BAA2B,CAAC;AAGxG,OAAO,EAAE,mCAAmC,EAAE,GAAG,EAAE,SAAS,EAAE,MAAM,oBAAoB,CAAC;AACzF,OAAO,EAAE,KAAK,MAAM,EAAE,KAAK,iBAAiB,EAAE,MAAM,oBAAoB,CAAC"}
|
package/dest/tagging/index.js
CHANGED
|
@@ -12,4 +12,4 @@ export { syncSenderTaggingIndexes } from './sender_sync/sync_sender_tagging_inde
|
|
|
12
12
|
export { UNFINALIZED_TAGGING_INDEXES_WINDOW_LEN } from './constants.js';
|
|
13
13
|
export { getAllPrivateLogsByTags, getAllPublicLogsByTagsFromContract } from './get_all_logs_by_tags.js';
|
|
14
14
|
// Re-export tagging-related types from stdlib
|
|
15
|
-
export {
|
|
15
|
+
export { ExtendedDirectionalAppTaggingSecret, Tag, SiloedTag } from '@aztec/stdlib/logs';
|
|
@@ -1,15 +1,14 @@
|
|
|
1
1
|
import type { BlockNumber } from '@aztec/foundation/branded-types';
|
|
2
|
-
import type { AztecAddress } from '@aztec/stdlib/aztec-address';
|
|
3
2
|
import type { BlockHash } from '@aztec/stdlib/block';
|
|
4
3
|
import type { AztecNode } from '@aztec/stdlib/interfaces/client';
|
|
5
|
-
import type {
|
|
4
|
+
import type { ExtendedDirectionalAppTaggingSecret, TxScopedL2Log } from '@aztec/stdlib/logs';
|
|
6
5
|
import type { RecipientTaggingStore } from '../../storage/tagging_store/recipient_tagging_store.js';
|
|
7
6
|
/**
|
|
8
|
-
* Loads private logs for
|
|
7
|
+
* Loads private logs for the app-sender-recipient triplet defined by `secret` and updates the highest aged and
|
|
9
8
|
* finalized indexes in the db. At most load logs from blocks up to and including `anchorBlockNumber`.
|
|
10
9
|
*
|
|
11
10
|
* @dev This function can be safely executed "in parallel" for other sender-recipient pairs because the data in
|
|
12
11
|
* in the tagging data provider is indexed by the secret and hence completely disjoint.
|
|
13
12
|
*/
|
|
14
|
-
export declare function loadPrivateLogsForSenderRecipientPair(secret:
|
|
15
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
13
|
+
export declare function loadPrivateLogsForSenderRecipientPair(secret: ExtendedDirectionalAppTaggingSecret, aztecNode: AztecNode, taggingStore: RecipientTaggingStore, anchorBlockNumber: BlockNumber, anchorBlockHash: BlockHash, jobId: string): Promise<TxScopedL2Log[]>;
|
|
14
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"load_private_logs_for_sender_recipient_pair.d.ts","sourceRoot":"","sources":["../../../src/tagging/recipient_sync/load_private_logs_for_sender_recipient_pair.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,WAAW,EAAE,MAAM,iCAAiC,CAAC;AACnE,OAAO,KAAK,EAAE,
|
|
1
|
+
{"version":3,"file":"load_private_logs_for_sender_recipient_pair.d.ts","sourceRoot":"","sources":["../../../src/tagging/recipient_sync/load_private_logs_for_sender_recipient_pair.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,WAAW,EAAE,MAAM,iCAAiC,CAAC;AACnE,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,qBAAqB,CAAC;AACrD,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,iCAAiC,CAAC;AACjE,OAAO,KAAK,EAAE,mCAAmC,EAAE,aAAa,EAAE,MAAM,oBAAoB,CAAC;AAE7F,OAAO,KAAK,EAAE,qBAAqB,EAAE,MAAM,wDAAwD,CAAC;AAKpG;;;;;;GAMG;AACH,wBAAsB,qCAAqC,CACzD,MAAM,EAAE,mCAAmC,EAC3C,SAAS,EAAE,SAAS,EACpB,YAAY,EAAE,qBAAqB,EACnC,iBAAiB,EAAE,WAAW,EAC9B,eAAe,EAAE,SAAS,EAC1B,KAAK,EAAE,MAAM,GACZ,OAAO,CAAC,aAAa,EAAE,CAAC,CAmH1B"}
|
|
@@ -2,12 +2,12 @@ import { UNFINALIZED_TAGGING_INDEXES_WINDOW_LEN } from '../constants.js';
|
|
|
2
2
|
import { findHighestIndexes } from './utils/find_highest_indexes.js';
|
|
3
3
|
import { loadLogsForRange } from './utils/load_logs_for_range.js';
|
|
4
4
|
/**
|
|
5
|
-
* Loads private logs for
|
|
5
|
+
* Loads private logs for the app-sender-recipient triplet defined by `secret` and updates the highest aged and
|
|
6
6
|
* finalized indexes in the db. At most load logs from blocks up to and including `anchorBlockNumber`.
|
|
7
7
|
*
|
|
8
8
|
* @dev This function can be safely executed "in parallel" for other sender-recipient pairs because the data in
|
|
9
9
|
* in the tagging data provider is indexed by the secret and hence completely disjoint.
|
|
10
|
-
*/ export async function loadPrivateLogsForSenderRecipientPair(secret,
|
|
10
|
+
*/ export async function loadPrivateLogsForSenderRecipientPair(secret, aztecNode, taggingStore, anchorBlockNumber, anchorBlockHash, jobId) {
|
|
11
11
|
// # Explanation of how the algorithm works
|
|
12
12
|
// When we perform the sync we will look at logs that correspond to the tagging index range
|
|
13
13
|
// (highestAgedIndex, highestFinalizedIndex + WINDOW_LEN]
|
|
@@ -72,7 +72,7 @@ import { loadLogsForRange } from './utils/load_logs_for_range.js';
|
|
|
72
72
|
const logs = [];
|
|
73
73
|
while(true){
|
|
74
74
|
// Get private logs with their block timestamps and corresponding tagging indexes
|
|
75
|
-
const privateLogsWithIndexes = await loadLogsForRange(secret,
|
|
75
|
+
const privateLogsWithIndexes = await loadLogsForRange(secret, aztecNode, start, end, anchorBlockNumber, anchorBlockHash);
|
|
76
76
|
if (privateLogsWithIndexes.length === 0) {
|
|
77
77
|
break;
|
|
78
78
|
}
|
|
@@ -1,15 +1,14 @@
|
|
|
1
1
|
import type { BlockNumber } from '@aztec/foundation/branded-types';
|
|
2
|
-
import type { AztecAddress } from '@aztec/stdlib/aztec-address';
|
|
3
2
|
import type { BlockHash } from '@aztec/stdlib/block';
|
|
4
3
|
import type { AztecNode } from '@aztec/stdlib/interfaces/client';
|
|
5
|
-
import type {
|
|
4
|
+
import type { ExtendedDirectionalAppTaggingSecret, TxScopedL2Log } from '@aztec/stdlib/logs';
|
|
6
5
|
/**
|
|
7
|
-
* Gets private logs with their corresponding block timestamps and tagging indexes for the given index range
|
|
8
|
-
* `
|
|
9
|
-
* exclusive.
|
|
6
|
+
* Gets private logs with their corresponding block timestamps and tagging indexes for the given index range and
|
|
7
|
+
* `extendedSecret`. At most load logs from blocks up to and including `anchorBlockNumber`. `start` is inclusive and
|
|
8
|
+
* `end` is exclusive.
|
|
10
9
|
*/
|
|
11
|
-
export declare function loadLogsForRange(
|
|
10
|
+
export declare function loadLogsForRange(extendedSecret: ExtendedDirectionalAppTaggingSecret, aztecNode: AztecNode, start: number, end: number, anchorBlockNumber: BlockNumber, anchorBlockHash: BlockHash): Promise<Array<{
|
|
12
11
|
log: TxScopedL2Log;
|
|
13
12
|
taggingIndex: number;
|
|
14
13
|
}>>;
|
|
15
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
14
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoibG9hZF9sb2dzX2Zvcl9yYW5nZS5kLnRzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vLi4vLi4vLi4vc3JjL3RhZ2dpbmcvcmVjaXBpZW50X3N5bmMvdXRpbHMvbG9hZF9sb2dzX2Zvcl9yYW5nZS50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiQUFBQSxPQUFPLEtBQUssRUFBRSxXQUFXLEVBQUUsTUFBTSxpQ0FBaUMsQ0FBQztBQUNuRSxPQUFPLEtBQUssRUFBRSxTQUFTLEVBQUUsTUFBTSxxQkFBcUIsQ0FBQztBQUNyRCxPQUFPLEtBQUssRUFBRSxTQUFTLEVBQUUsTUFBTSxpQ0FBaUMsQ0FBQztBQUNqRSxPQUFPLEtBQUssRUFBRSxtQ0FBbUMsRUFBRSxhQUFhLEVBQUUsTUFBTSxvQkFBb0IsQ0FBQztBQUs3Rjs7OztHQUlHO0FBQ0gsd0JBQXNCLGdCQUFnQixDQUNwQyxjQUFjLEVBQUUsbUNBQW1DLEVBQ25ELFNBQVMsRUFBRSxTQUFTLEVBQ3BCLEtBQUssRUFBRSxNQUFNLEVBQ2IsR0FBRyxFQUFFLE1BQU0sRUFDWCxpQkFBaUIsRUFBRSxXQUFXLEVBQzlCLGVBQWUsRUFBRSxTQUFTLEdBQ3pCLE9BQU8sQ0FBQyxLQUFLLENBQUM7SUFBRSxHQUFHLEVBQUUsYUFBYSxDQUFDO0lBQUMsWUFBWSxFQUFFLE1BQU0sQ0FBQTtDQUFFLENBQUMsQ0FBQyxDQXVCOUQifQ==
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"load_logs_for_range.d.ts","sourceRoot":"","sources":["../../../../src/tagging/recipient_sync/utils/load_logs_for_range.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,WAAW,EAAE,MAAM,iCAAiC,CAAC;AACnE,OAAO,KAAK,EAAE,
|
|
1
|
+
{"version":3,"file":"load_logs_for_range.d.ts","sourceRoot":"","sources":["../../../../src/tagging/recipient_sync/utils/load_logs_for_range.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,WAAW,EAAE,MAAM,iCAAiC,CAAC;AACnE,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,qBAAqB,CAAC;AACrD,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,iCAAiC,CAAC;AACjE,OAAO,KAAK,EAAE,mCAAmC,EAAE,aAAa,EAAE,MAAM,oBAAoB,CAAC;AAK7F;;;;GAIG;AACH,wBAAsB,gBAAgB,CACpC,cAAc,EAAE,mCAAmC,EACnD,SAAS,EAAE,SAAS,EACpB,KAAK,EAAE,MAAM,EACb,GAAG,EAAE,MAAM,EACX,iBAAiB,EAAE,WAAW,EAC9B,eAAe,EAAE,SAAS,GACzB,OAAO,CAAC,KAAK,CAAC;IAAE,GAAG,EAAE,aAAa,CAAC;IAAC,YAAY,EAAE,MAAM,CAAA;CAAE,CAAC,CAAC,CAuB9D"}
|
|
@@ -1,16 +1,17 @@
|
|
|
1
|
-
import { SiloedTag
|
|
1
|
+
import { SiloedTag } from '@aztec/stdlib/logs';
|
|
2
2
|
import { getAllPrivateLogsByTags } from '../../get_all_logs_by_tags.js';
|
|
3
3
|
/**
|
|
4
|
-
* Gets private logs with their corresponding block timestamps and tagging indexes for the given index range
|
|
5
|
-
* `
|
|
6
|
-
* exclusive.
|
|
7
|
-
*/ export async function loadLogsForRange(
|
|
8
|
-
// Derive tags for the window
|
|
9
|
-
const
|
|
10
|
-
|
|
4
|
+
* Gets private logs with their corresponding block timestamps and tagging indexes for the given index range and
|
|
5
|
+
* `extendedSecret`. At most load logs from blocks up to and including `anchorBlockNumber`. `start` is inclusive and
|
|
6
|
+
* `end` is exclusive.
|
|
7
|
+
*/ export async function loadLogsForRange(extendedSecret, aztecNode, start, end, anchorBlockNumber, anchorBlockHash) {
|
|
8
|
+
// Derive siloed tags for the window
|
|
9
|
+
const siloedTags = await Promise.all(Array.from({
|
|
10
|
+
length: end - start
|
|
11
|
+
}, (_, i)=>SiloedTag.compute({
|
|
12
|
+
extendedSecret,
|
|
11
13
|
index: start + i
|
|
12
|
-
}));
|
|
13
|
-
const siloedTags = await Promise.all(preTags.map((preTag)=>Tag.compute(preTag))).then((tags)=>Promise.all(tags.map((tag)=>SiloedTag.compute(tag, app))));
|
|
14
|
+
})));
|
|
14
15
|
// We use the utility function below to retrieve all logs for the tags across all pages, so we don't need to handle
|
|
15
16
|
// pagination here.
|
|
16
17
|
const logs = await getAllPrivateLogsByTags(aztecNode, siloedTags, anchorBlockHash);
|
|
@@ -18,7 +19,7 @@ import { getAllPrivateLogsByTags } from '../../get_all_logs_by_tags.js';
|
|
|
18
19
|
const logsWithIndexes = [];
|
|
19
20
|
for(let i = 0; i < logs.length; i++){
|
|
20
21
|
const logsForTag = logs[i];
|
|
21
|
-
const taggingIndex =
|
|
22
|
+
const taggingIndex = start + i;
|
|
22
23
|
for (const log of logsForTag){
|
|
23
24
|
if (log.blockNumber <= anchorBlockNumber) {
|
|
24
25
|
logsWithIndexes.push({
|
|
@@ -1,21 +1,17 @@
|
|
|
1
|
-
import type { AztecAddress } from '@aztec/stdlib/aztec-address';
|
|
2
1
|
import type { BlockHash } from '@aztec/stdlib/block';
|
|
3
2
|
import type { AztecNode } from '@aztec/stdlib/interfaces/server';
|
|
4
|
-
import type {
|
|
3
|
+
import type { ExtendedDirectionalAppTaggingSecret } from '@aztec/stdlib/logs';
|
|
5
4
|
import type { SenderTaggingStore } from '../../storage/tagging_store/sender_tagging_store.js';
|
|
6
5
|
/**
|
|
7
6
|
* Syncs tagging indexes. This function needs to be called whenever a private log is being sent.
|
|
8
7
|
*
|
|
9
|
-
* @param secret - The secret that's unique for (sender, recipient,
|
|
8
|
+
* @param secret - The secret that's unique for (sender, recipient, app) tuple while the direction of
|
|
10
9
|
* sender -> recipient matters.
|
|
11
|
-
* @param app - The address of the contract that the logs are tagged for. Needs to be provided because we perform
|
|
12
|
-
* second round of siloing in this function which is necessary because kernels do it as well (they silo first field
|
|
13
|
-
* of the private log which corresponds to the tag).
|
|
14
10
|
* @remarks When syncing the indexes as sender we don't care about the log contents - we only care about the highest
|
|
15
11
|
* pending and highest finalized indexes as that guides the next index choice when sending a log. The next index choice
|
|
16
12
|
* is simply the highest pending index plus one (or finalized if pending is undefined).
|
|
17
13
|
* @dev This function looks for new indexes, adds them to pending, then it checks status of each pending index and
|
|
18
14
|
* updates its status accordingly.
|
|
19
15
|
*/
|
|
20
|
-
export declare function syncSenderTaggingIndexes(secret:
|
|
21
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
16
|
+
export declare function syncSenderTaggingIndexes(secret: ExtendedDirectionalAppTaggingSecret, aztecNode: AztecNode, taggingStore: SenderTaggingStore, anchorBlockHash: BlockHash, jobId: string): Promise<void>;
|
|
17
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"sync_sender_tagging_indexes.d.ts","sourceRoot":"","sources":["../../../src/tagging/sender_sync/sync_sender_tagging_indexes.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,
|
|
1
|
+
{"version":3,"file":"sync_sender_tagging_indexes.d.ts","sourceRoot":"","sources":["../../../src/tagging/sender_sync/sync_sender_tagging_indexes.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,qBAAqB,CAAC;AACrD,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,iCAAiC,CAAC;AACjE,OAAO,KAAK,EAAE,mCAAmC,EAAE,MAAM,oBAAoB,CAAC;AAE9E,OAAO,KAAK,EAAE,kBAAkB,EAAE,MAAM,qDAAqD,CAAC;AAK9F;;;;;;;;;;GAUG;AACH,wBAAsB,wBAAwB,CAC5C,MAAM,EAAE,mCAAmC,EAC3C,SAAS,EAAE,SAAS,EACpB,YAAY,EAAE,kBAAkB,EAChC,eAAe,EAAE,SAAS,EAC1B,KAAK,EAAE,MAAM,GACZ,OAAO,CAAC,IAAI,CAAC,CAqFf"}
|
|
@@ -4,17 +4,14 @@ import { loadAndStoreNewTaggingIndexes } from './utils/load_and_store_new_taggin
|
|
|
4
4
|
/**
|
|
5
5
|
* Syncs tagging indexes. This function needs to be called whenever a private log is being sent.
|
|
6
6
|
*
|
|
7
|
-
* @param secret - The secret that's unique for (sender, recipient,
|
|
7
|
+
* @param secret - The secret that's unique for (sender, recipient, app) tuple while the direction of
|
|
8
8
|
* sender -> recipient matters.
|
|
9
|
-
* @param app - The address of the contract that the logs are tagged for. Needs to be provided because we perform
|
|
10
|
-
* second round of siloing in this function which is necessary because kernels do it as well (they silo first field
|
|
11
|
-
* of the private log which corresponds to the tag).
|
|
12
9
|
* @remarks When syncing the indexes as sender we don't care about the log contents - we only care about the highest
|
|
13
10
|
* pending and highest finalized indexes as that guides the next index choice when sending a log. The next index choice
|
|
14
11
|
* is simply the highest pending index plus one (or finalized if pending is undefined).
|
|
15
12
|
* @dev This function looks for new indexes, adds them to pending, then it checks status of each pending index and
|
|
16
13
|
* updates its status accordingly.
|
|
17
|
-
*/ export async function syncSenderTaggingIndexes(secret,
|
|
14
|
+
*/ export async function syncSenderTaggingIndexes(secret, aztecNode, taggingStore, anchorBlockHash, jobId) {
|
|
18
15
|
// # Explanation of how syncing works
|
|
19
16
|
//
|
|
20
17
|
// When choosing an index, we select: highest pending index + 1 (or highest finalized index + 1 if no pending).
|
|
@@ -40,15 +37,24 @@ import { loadAndStoreNewTaggingIndexes } from './utils/load_and_store_new_taggin
|
|
|
40
37
|
while(true){
|
|
41
38
|
// Load and store indexes for the current window. These indexes may already exist in the database if txs using
|
|
42
39
|
// them were previously sent from this PXE. Any duplicates are handled by the tagging data provider.
|
|
43
|
-
await loadAndStoreNewTaggingIndexes(secret,
|
|
40
|
+
await loadAndStoreNewTaggingIndexes(secret, start, end, aztecNode, taggingStore, anchorBlockHash, jobId);
|
|
44
41
|
// Retrieve all indexes within the current window from storage and update their status accordingly.
|
|
45
42
|
const pendingTxHashes = await taggingStore.getTxHashesOfPendingIndexes(secret, start, end, jobId);
|
|
46
43
|
if (pendingTxHashes.length === 0) {
|
|
47
44
|
break;
|
|
48
45
|
}
|
|
49
|
-
const { txHashesToFinalize, txHashesToDrop } = await getStatusChangeOfPending(pendingTxHashes, aztecNode);
|
|
46
|
+
const { txHashesToFinalize, txHashesToDrop, txHashesWithExecutionReverted } = await getStatusChangeOfPending(pendingTxHashes, aztecNode);
|
|
50
47
|
await taggingStore.dropPendingIndexes(txHashesToDrop, jobId);
|
|
51
48
|
await taggingStore.finalizePendingIndexes(txHashesToFinalize, jobId);
|
|
49
|
+
if (txHashesWithExecutionReverted.length > 0) {
|
|
50
|
+
const indexedTxEffects = await Promise.all(txHashesWithExecutionReverted.map((txHash)=>aztecNode.getTxEffect(txHash)));
|
|
51
|
+
for (const indexedTxEffect of indexedTxEffects){
|
|
52
|
+
if (indexedTxEffect === undefined) {
|
|
53
|
+
throw new Error('TxEffect not found for execution-reverted tx. This is either a bug or a reorg has occurred.');
|
|
54
|
+
}
|
|
55
|
+
await taggingStore.finalizePendingIndexesOfAPartiallyRevertedTx(indexedTxEffect.data, jobId);
|
|
56
|
+
}
|
|
57
|
+
}
|
|
52
58
|
// We check if the finalized index has been updated.
|
|
53
59
|
newFinalizedIndex = await taggingStore.getLastFinalizedIndex(secret, jobId);
|
|
54
60
|
if (previousFinalizedIndex !== newFinalizedIndex) {
|
|
@@ -1,11 +1,12 @@
|
|
|
1
1
|
import type { AztecNode } from '@aztec/stdlib/interfaces/server';
|
|
2
2
|
import { TxHash } from '@aztec/stdlib/tx';
|
|
3
3
|
/**
|
|
4
|
-
* Based on receipts obtained from `aztecNode` returns which pending transactions changed their status to finalized
|
|
5
|
-
* dropped.
|
|
4
|
+
* Based on receipts obtained from `aztecNode` returns which pending transactions changed their status to finalized,
|
|
5
|
+
* dropped, or execution-reverted (but mined).
|
|
6
6
|
*/
|
|
7
7
|
export declare function getStatusChangeOfPending(pending: TxHash[], aztecNode: AztecNode): Promise<{
|
|
8
8
|
txHashesToFinalize: TxHash[];
|
|
9
9
|
txHashesToDrop: TxHash[];
|
|
10
|
+
txHashesWithExecutionReverted: TxHash[];
|
|
10
11
|
}>;
|
|
11
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
12
|
+
//# sourceMappingURL=data:application/json;base64,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
|