@aztec/validator-client 0.0.1-commit.7d4e6cd → 0.0.1-commit.808bf7f90
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +53 -24
- package/dest/block_proposal_handler.d.ts +9 -9
- package/dest/block_proposal_handler.d.ts.map +1 -1
- package/dest/block_proposal_handler.js +35 -54
- package/dest/checkpoint_builder.d.ts +24 -25
- package/dest/checkpoint_builder.d.ts.map +1 -1
- package/dest/checkpoint_builder.js +60 -34
- package/dest/config.d.ts +1 -1
- package/dest/config.d.ts.map +1 -1
- package/dest/config.js +12 -14
- package/dest/duties/validation_service.d.ts +20 -7
- package/dest/duties/validation_service.d.ts.map +1 -1
- package/dest/duties/validation_service.js +75 -22
- package/dest/factory.d.ts +2 -2
- package/dest/factory.d.ts.map +1 -1
- package/dest/factory.js +1 -1
- package/dest/key_store/ha_key_store.d.ts +99 -0
- package/dest/key_store/ha_key_store.d.ts.map +1 -0
- package/dest/key_store/ha_key_store.js +208 -0
- package/dest/key_store/index.d.ts +2 -1
- package/dest/key_store/index.d.ts.map +1 -1
- package/dest/key_store/index.js +1 -0
- package/dest/key_store/interface.d.ts +36 -6
- package/dest/key_store/interface.d.ts.map +1 -1
- package/dest/key_store/local_key_store.d.ts +10 -5
- package/dest/key_store/local_key_store.d.ts.map +1 -1
- package/dest/key_store/local_key_store.js +8 -4
- package/dest/key_store/node_keystore_adapter.d.ts +18 -5
- package/dest/key_store/node_keystore_adapter.d.ts.map +1 -1
- package/dest/key_store/node_keystore_adapter.js +18 -4
- package/dest/key_store/web3signer_key_store.d.ts +10 -5
- package/dest/key_store/web3signer_key_store.d.ts.map +1 -1
- package/dest/key_store/web3signer_key_store.js +8 -4
- package/dest/metrics.d.ts +4 -3
- package/dest/metrics.d.ts.map +1 -1
- package/dest/metrics.js +34 -5
- package/dest/tx_validator/tx_validator_factory.d.ts +4 -3
- package/dest/tx_validator/tx_validator_factory.d.ts.map +1 -1
- package/dest/tx_validator/tx_validator_factory.js +17 -16
- package/dest/validator.d.ts +43 -18
- package/dest/validator.d.ts.map +1 -1
- package/dest/validator.js +233 -94
- package/package.json +21 -17
- package/src/block_proposal_handler.ts +48 -69
- package/src/checkpoint_builder.ts +101 -38
- package/src/config.ts +11 -13
- package/src/duties/validation_service.ts +100 -25
- package/src/factory.ts +1 -0
- package/src/key_store/ha_key_store.ts +269 -0
- package/src/key_store/index.ts +1 -0
- package/src/key_store/interface.ts +44 -5
- package/src/key_store/local_key_store.ts +13 -4
- package/src/key_store/node_keystore_adapter.ts +27 -4
- package/src/key_store/web3signer_key_store.ts +17 -4
- package/src/metrics.ts +45 -6
- package/src/tx_validator/tx_validator_factory.ts +52 -31
- package/src/validator.ts +303 -114
|
@@ -1,17 +1,17 @@
|
|
|
1
1
|
import { merge, pick } from '@aztec/foundation/collection';
|
|
2
2
|
import { createLogger } from '@aztec/foundation/log';
|
|
3
3
|
import { bufferToHex } from '@aztec/foundation/string';
|
|
4
|
-
import {
|
|
4
|
+
import { elapsed } from '@aztec/foundation/timer';
|
|
5
5
|
import { getDefaultAllowedSetupFunctions } from '@aztec/p2p/msg_validators';
|
|
6
6
|
import { LightweightCheckpointBuilder } from '@aztec/prover-client/light';
|
|
7
7
|
import { GuardedMerkleTreeOperations, PublicContractsDB, PublicProcessor, createPublicTxSimulatorForBlockBuilding } from '@aztec/simulator/server';
|
|
8
8
|
import { Gas } from '@aztec/stdlib/gas';
|
|
9
|
-
import { FullNodeBlockBuilderConfigKeys } from '@aztec/stdlib/interfaces/server';
|
|
9
|
+
import { FullNodeBlockBuilderConfigKeys, NoValidTxsError } from '@aztec/stdlib/interfaces/server';
|
|
10
|
+
import { NullDebugLogStore } from '@aztec/stdlib/logs';
|
|
10
11
|
import { MerkleTreeId } from '@aztec/stdlib/trees';
|
|
11
12
|
import { GlobalVariables } from '@aztec/stdlib/tx';
|
|
12
13
|
import { getTelemetryClient } from '@aztec/telemetry-client';
|
|
13
14
|
import { createValidatorForBlockBuilding } from './tx_validator/tx_validator_factory.js';
|
|
14
|
-
const log = createLogger('checkpoint-builder');
|
|
15
15
|
/**
|
|
16
16
|
* Builder for a single checkpoint. Handles building blocks within the checkpoint
|
|
17
17
|
* and completing it.
|
|
@@ -22,26 +22,33 @@ const log = createLogger('checkpoint-builder');
|
|
|
22
22
|
contractDataSource;
|
|
23
23
|
dateProvider;
|
|
24
24
|
telemetryClient;
|
|
25
|
-
|
|
25
|
+
debugLogStore;
|
|
26
|
+
log;
|
|
27
|
+
constructor(checkpointBuilder, fork, config, contractDataSource, dateProvider, telemetryClient, bindings, debugLogStore = new NullDebugLogStore()){
|
|
26
28
|
this.checkpointBuilder = checkpointBuilder;
|
|
27
29
|
this.fork = fork;
|
|
28
30
|
this.config = config;
|
|
29
31
|
this.contractDataSource = contractDataSource;
|
|
30
32
|
this.dateProvider = dateProvider;
|
|
31
33
|
this.telemetryClient = telemetryClient;
|
|
34
|
+
this.debugLogStore = debugLogStore;
|
|
35
|
+
this.log = createLogger('checkpoint-builder', {
|
|
36
|
+
...bindings,
|
|
37
|
+
instanceId: `checkpoint-${checkpointBuilder.checkpointNumber}`
|
|
38
|
+
});
|
|
32
39
|
}
|
|
33
40
|
getConstantData() {
|
|
34
41
|
return this.checkpointBuilder.constants;
|
|
35
42
|
}
|
|
36
43
|
/**
|
|
37
44
|
* Builds a single block within this checkpoint.
|
|
38
|
-
*/ async buildBlock(pendingTxs, blockNumber, timestamp, opts) {
|
|
39
|
-
const blockBuildingTimer = new Timer();
|
|
45
|
+
*/ async buildBlock(pendingTxs, blockNumber, timestamp, opts = {}) {
|
|
40
46
|
const slot = this.checkpointBuilder.constants.slotNumber;
|
|
41
|
-
log.verbose(`Building block ${blockNumber} for slot ${slot} within checkpoint`, {
|
|
47
|
+
this.log.verbose(`Building block ${blockNumber} for slot ${slot} within checkpoint`, {
|
|
42
48
|
slot,
|
|
43
49
|
blockNumber,
|
|
44
|
-
...opts
|
|
50
|
+
...opts,
|
|
51
|
+
currentTime: new Date(this.dateProvider.now())
|
|
45
52
|
});
|
|
46
53
|
const constants = this.checkpointBuilder.constants;
|
|
47
54
|
const globalVariables = GlobalVariables.from({
|
|
@@ -55,28 +62,36 @@ const log = createLogger('checkpoint-builder');
|
|
|
55
62
|
gasFees: constants.gasFees
|
|
56
63
|
});
|
|
57
64
|
const { processor, validator } = await this.makeBlockBuilderDeps(globalVariables, this.fork);
|
|
58
|
-
const [publicProcessorDuration, [processedTxs, failedTxs, usedTxs]] = await elapsed(()=>processor.process(pendingTxs, opts, validator));
|
|
65
|
+
const [publicProcessorDuration, [processedTxs, failedTxs, usedTxs, _, usedTxBlobFields]] = await elapsed(()=>processor.process(pendingTxs, opts, validator));
|
|
66
|
+
// Throw if we didn't collect a single valid tx and we're not allowed to build empty blocks
|
|
67
|
+
// (only the first block in a checkpoint can be empty)
|
|
68
|
+
if (processedTxs.length === 0 && this.checkpointBuilder.getBlockCount() > 0) {
|
|
69
|
+
throw new NoValidTxsError(failedTxs);
|
|
70
|
+
}
|
|
59
71
|
// Add block to checkpoint
|
|
60
72
|
const block = await this.checkpointBuilder.addBlock(globalVariables, processedTxs, {
|
|
61
73
|
expectedEndState: opts.expectedEndState
|
|
62
74
|
});
|
|
63
75
|
// How much public gas was processed
|
|
64
76
|
const publicGas = processedTxs.reduce((acc, tx)=>acc.add(tx.gasUsed.publicGas), Gas.empty());
|
|
65
|
-
|
|
77
|
+
this.log.debug('Built block within checkpoint', {
|
|
78
|
+
header: block.header.toInspect(),
|
|
79
|
+
processedTxs: processedTxs.map((tx)=>tx.hash.toString()),
|
|
80
|
+
failedTxs: failedTxs.map((tx)=>tx.tx.txHash.toString())
|
|
81
|
+
});
|
|
82
|
+
return {
|
|
66
83
|
block,
|
|
67
84
|
publicGas,
|
|
68
85
|
publicProcessorDuration,
|
|
69
86
|
numTxs: processedTxs.length,
|
|
70
87
|
failedTxs,
|
|
71
|
-
|
|
72
|
-
|
|
88
|
+
usedTxs,
|
|
89
|
+
usedTxBlobFields
|
|
73
90
|
};
|
|
74
|
-
log.debug('Built block within checkpoint', res.block.header);
|
|
75
|
-
return res;
|
|
76
91
|
}
|
|
77
92
|
/** Completes the checkpoint and returns it. */ async completeCheckpoint() {
|
|
78
93
|
const checkpoint = await this.checkpointBuilder.completeCheckpoint();
|
|
79
|
-
log.verbose(`Completed checkpoint ${checkpoint.number}`, {
|
|
94
|
+
this.log.verbose(`Completed checkpoint ${checkpoint.number}`, {
|
|
80
95
|
checkpointNumber: checkpoint.number,
|
|
81
96
|
numBlocks: checkpoint.blocks.length,
|
|
82
97
|
archiveRoot: checkpoint.archive.root.toString()
|
|
@@ -88,29 +103,35 @@ const log = createLogger('checkpoint-builder');
|
|
|
88
103
|
}
|
|
89
104
|
async makeBlockBuilderDeps(globalVariables, fork) {
|
|
90
105
|
const txPublicSetupAllowList = this.config.txPublicSetupAllowList ?? await getDefaultAllowedSetupFunctions();
|
|
91
|
-
const contractsDB = new PublicContractsDB(this.contractDataSource);
|
|
106
|
+
const contractsDB = new PublicContractsDB(this.contractDataSource, this.log.getBindings());
|
|
92
107
|
const guardedFork = new GuardedMerkleTreeOperations(fork);
|
|
93
|
-
const
|
|
94
|
-
const
|
|
95
|
-
const
|
|
108
|
+
const collectDebugLogs = this.debugLogStore.isEnabled;
|
|
109
|
+
const bindings = this.log.getBindings();
|
|
110
|
+
const publicTxSimulator = createPublicTxSimulatorForBlockBuilding(guardedFork, contractsDB, globalVariables, this.telemetryClient, bindings, collectDebugLogs);
|
|
111
|
+
const processor = new PublicProcessor(globalVariables, guardedFork, contractsDB, publicTxSimulator, this.dateProvider, this.telemetryClient, createLogger('simulator:public-processor', bindings), this.config, this.debugLogStore);
|
|
112
|
+
const validator = createValidatorForBlockBuilding(fork, this.contractDataSource, globalVariables, txPublicSetupAllowList, this.log.getBindings());
|
|
96
113
|
return {
|
|
97
114
|
processor,
|
|
98
115
|
validator
|
|
99
116
|
};
|
|
100
117
|
}
|
|
101
118
|
}
|
|
102
|
-
/**
|
|
103
|
-
* Factory for creating checkpoint builders.
|
|
104
|
-
*/ export class FullNodeCheckpointsBuilder {
|
|
119
|
+
/** Factory for creating checkpoint builders. */ export class FullNodeCheckpointsBuilder {
|
|
105
120
|
config;
|
|
121
|
+
worldState;
|
|
106
122
|
contractDataSource;
|
|
107
123
|
dateProvider;
|
|
108
124
|
telemetryClient;
|
|
109
|
-
|
|
125
|
+
debugLogStore;
|
|
126
|
+
log;
|
|
127
|
+
constructor(config, worldState, contractDataSource, dateProvider, telemetryClient = getTelemetryClient(), debugLogStore = new NullDebugLogStore()){
|
|
110
128
|
this.config = config;
|
|
129
|
+
this.worldState = worldState;
|
|
111
130
|
this.contractDataSource = contractDataSource;
|
|
112
131
|
this.dateProvider = dateProvider;
|
|
113
132
|
this.telemetryClient = telemetryClient;
|
|
133
|
+
this.debugLogStore = debugLogStore;
|
|
134
|
+
this.log = createLogger('checkpoint-builder');
|
|
114
135
|
}
|
|
115
136
|
getConfig() {
|
|
116
137
|
return this.config;
|
|
@@ -120,36 +141,41 @@ const log = createLogger('checkpoint-builder');
|
|
|
120
141
|
}
|
|
121
142
|
/**
|
|
122
143
|
* Starts a new checkpoint and returns a CheckpointBuilder to build blocks within it.
|
|
123
|
-
*/ async startCheckpoint(checkpointNumber, constants, l1ToL2Messages, fork) {
|
|
144
|
+
*/ async startCheckpoint(checkpointNumber, constants, feeAssetPriceModifier, l1ToL2Messages, previousCheckpointOutHashes, fork, bindings) {
|
|
124
145
|
const stateReference = await fork.getStateReference();
|
|
125
146
|
const archiveTree = await fork.getTreeInfo(MerkleTreeId.ARCHIVE);
|
|
126
|
-
log.verbose(`Building new checkpoint ${checkpointNumber}`, {
|
|
147
|
+
this.log.verbose(`Building new checkpoint ${checkpointNumber}`, {
|
|
127
148
|
checkpointNumber,
|
|
128
149
|
msgCount: l1ToL2Messages.length,
|
|
129
150
|
initialStateReference: stateReference.toInspect(),
|
|
130
151
|
initialArchiveRoot: bufferToHex(archiveTree.root),
|
|
131
|
-
constants
|
|
152
|
+
constants,
|
|
153
|
+
feeAssetPriceModifier
|
|
132
154
|
});
|
|
133
|
-
const lightweightBuilder = await LightweightCheckpointBuilder.startNewCheckpoint(checkpointNumber, constants, l1ToL2Messages, fork);
|
|
134
|
-
return new CheckpointBuilder(lightweightBuilder, fork, this.config, this.contractDataSource, this.dateProvider, this.telemetryClient);
|
|
155
|
+
const lightweightBuilder = await LightweightCheckpointBuilder.startNewCheckpoint(checkpointNumber, constants, l1ToL2Messages, previousCheckpointOutHashes, fork, bindings, feeAssetPriceModifier);
|
|
156
|
+
return new CheckpointBuilder(lightweightBuilder, fork, this.config, this.contractDataSource, this.dateProvider, this.telemetryClient, bindings, this.debugLogStore);
|
|
135
157
|
}
|
|
136
158
|
/**
|
|
137
159
|
* Opens a checkpoint, either starting fresh or resuming from existing blocks.
|
|
138
|
-
*/ async openCheckpoint(checkpointNumber, constants, l1ToL2Messages, fork, existingBlocks = []) {
|
|
160
|
+
*/ async openCheckpoint(checkpointNumber, constants, feeAssetPriceModifier, l1ToL2Messages, previousCheckpointOutHashes, fork, existingBlocks = [], bindings) {
|
|
139
161
|
const stateReference = await fork.getStateReference();
|
|
140
162
|
const archiveTree = await fork.getTreeInfo(MerkleTreeId.ARCHIVE);
|
|
141
163
|
if (existingBlocks.length === 0) {
|
|
142
|
-
return this.startCheckpoint(checkpointNumber, constants, l1ToL2Messages, fork);
|
|
164
|
+
return this.startCheckpoint(checkpointNumber, constants, feeAssetPriceModifier, l1ToL2Messages, previousCheckpointOutHashes, fork, bindings);
|
|
143
165
|
}
|
|
144
|
-
log.verbose(`Resuming checkpoint ${checkpointNumber} with ${existingBlocks.length} existing blocks`, {
|
|
166
|
+
this.log.verbose(`Resuming checkpoint ${checkpointNumber} with ${existingBlocks.length} existing blocks`, {
|
|
145
167
|
checkpointNumber,
|
|
146
168
|
msgCount: l1ToL2Messages.length,
|
|
147
169
|
existingBlockCount: existingBlocks.length,
|
|
148
170
|
initialStateReference: stateReference.toInspect(),
|
|
149
171
|
initialArchiveRoot: bufferToHex(archiveTree.root),
|
|
150
|
-
constants
|
|
172
|
+
constants,
|
|
173
|
+
feeAssetPriceModifier
|
|
151
174
|
});
|
|
152
|
-
const lightweightBuilder = await LightweightCheckpointBuilder.resumeCheckpoint(checkpointNumber, constants, l1ToL2Messages, fork, existingBlocks);
|
|
153
|
-
return new CheckpointBuilder(lightweightBuilder, fork, this.config, this.contractDataSource, this.dateProvider, this.telemetryClient);
|
|
175
|
+
const lightweightBuilder = await LightweightCheckpointBuilder.resumeCheckpoint(checkpointNumber, constants, feeAssetPriceModifier, l1ToL2Messages, previousCheckpointOutHashes, fork, existingBlocks, bindings);
|
|
176
|
+
return new CheckpointBuilder(lightweightBuilder, fork, this.config, this.contractDataSource, this.dateProvider, this.telemetryClient, bindings, this.debugLogStore);
|
|
177
|
+
}
|
|
178
|
+
/** Returns a fork of the world state at the given block number. */ getFork(blockNumber) {
|
|
179
|
+
return this.worldState.fork(blockNumber);
|
|
154
180
|
}
|
|
155
181
|
}
|
package/dest/config.d.ts
CHANGED
|
@@ -8,4 +8,4 @@ export declare const validatorClientConfigMappings: ConfigMappingsType<Validator
|
|
|
8
8
|
* @returns The validator configuration.
|
|
9
9
|
*/
|
|
10
10
|
export declare function getProverEnvVars(): ValidatorClientConfig;
|
|
11
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
11
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiY29uZmlnLmQudHMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi9zcmMvY29uZmlnLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBLE9BQU8sRUFDTCxLQUFLLGtCQUFrQixFQUt4QixNQUFNLDBCQUEwQixDQUFDO0FBR2xDLE9BQU8sS0FBSyxFQUFFLHFCQUFxQixFQUFFLE1BQU0saUNBQWlDLENBQUM7QUFFN0UsWUFBWSxFQUFFLHFCQUFxQixFQUFFLENBQUM7QUFFdEMsZUFBTyxNQUFNLDZCQUE2QixFQUFFLGtCQUFrQixDQUFDLHFCQUFxQixDQW1FbkYsQ0FBQztBQUVGOzs7O0dBSUc7QUFDSCx3QkFBZ0IsZ0JBQWdCLElBQUkscUJBQXFCLENBRXhEIn0=
|
package/dest/config.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"config.d.ts","sourceRoot":"","sources":["../src/config.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,KAAK,kBAAkB,EAKxB,MAAM,0BAA0B,CAAC;
|
|
1
|
+
{"version":3,"file":"config.d.ts","sourceRoot":"","sources":["../src/config.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,KAAK,kBAAkB,EAKxB,MAAM,0BAA0B,CAAC;AAGlC,OAAO,KAAK,EAAE,qBAAqB,EAAE,MAAM,iCAAiC,CAAC;AAE7E,YAAY,EAAE,qBAAqB,EAAE,CAAC;AAEtC,eAAO,MAAM,6BAA6B,EAAE,kBAAkB,CAAC,qBAAqB,CAmEnF,CAAC;AAEF;;;;GAIG;AACH,wBAAgB,gBAAgB,IAAI,qBAAqB,CAExD"}
|
package/dest/config.js
CHANGED
|
@@ -1,5 +1,6 @@
|
|
|
1
1
|
import { booleanConfigHelper, getConfigFromMappings, numberConfigHelper, secretValueConfigHelper } from '@aztec/foundation/config';
|
|
2
2
|
import { EthAddress } from '@aztec/foundation/eth-address';
|
|
3
|
+
import { validatorHASignerConfigMappings } from '@aztec/stdlib/ha-signing';
|
|
3
4
|
export const validatorClientConfigMappings = {
|
|
4
5
|
validatorPrivateKeys: {
|
|
5
6
|
env: 'VALIDATOR_PRIVATE_KEYS',
|
|
@@ -35,31 +36,28 @@ export const validatorClientConfigMappings = {
|
|
|
35
36
|
description: 'Re-execute transactions before attesting',
|
|
36
37
|
...booleanConfigHelper(true)
|
|
37
38
|
},
|
|
38
|
-
validatorReexecuteDeadlineMs: {
|
|
39
|
-
env: 'VALIDATOR_REEXECUTE_DEADLINE_MS',
|
|
40
|
-
description: 'Will re-execute until this many milliseconds are left in the slot',
|
|
41
|
-
...numberConfigHelper(6000)
|
|
42
|
-
},
|
|
43
39
|
alwaysReexecuteBlockProposals: {
|
|
44
|
-
env: 'ALWAYS_REEXECUTE_BLOCK_PROPOSALS',
|
|
45
40
|
description: 'Whether to always reexecute block proposals, even for non-validator nodes (useful for monitoring network status).',
|
|
46
|
-
|
|
41
|
+
defaultValue: true
|
|
47
42
|
},
|
|
48
43
|
fishermanMode: {
|
|
49
44
|
env: 'FISHERMAN_MODE',
|
|
50
45
|
description: 'Whether to run in fisherman mode: validates all proposals and attestations but does not broadcast attestations or participate in consensus.',
|
|
51
46
|
...booleanConfigHelper(false)
|
|
52
47
|
},
|
|
53
|
-
// TODO(palla/mbps): Change default to false once checkpoint validation is stable
|
|
54
48
|
skipCheckpointProposalValidation: {
|
|
55
|
-
description: 'Skip checkpoint proposal validation and always attest (default:
|
|
56
|
-
defaultValue:
|
|
49
|
+
description: 'Skip checkpoint proposal validation and always attest (default: false)',
|
|
50
|
+
defaultValue: false
|
|
57
51
|
},
|
|
58
|
-
// TODO(palla/mbps): Change default to false once block sync is stable
|
|
59
52
|
skipPushProposedBlocksToArchiver: {
|
|
60
|
-
description: 'Skip pushing re-executed blocks to archiver (default:
|
|
61
|
-
defaultValue:
|
|
62
|
-
}
|
|
53
|
+
description: 'Skip pushing re-executed blocks to archiver (default: false)',
|
|
54
|
+
defaultValue: false
|
|
55
|
+
},
|
|
56
|
+
attestToEquivocatedProposals: {
|
|
57
|
+
description: 'Agree to attest to equivocated checkpoint proposals (for testing purposes only)',
|
|
58
|
+
...booleanConfigHelper(false)
|
|
59
|
+
},
|
|
60
|
+
...validatorHASignerConfigMappings
|
|
63
61
|
};
|
|
64
62
|
/**
|
|
65
63
|
* Returns the prover configuration from the environment variables.
|
|
@@ -1,3 +1,4 @@
|
|
|
1
|
+
import { BlockNumber, type CheckpointNumber, IndexWithinCheckpoint, type SlotNumber } from '@aztec/foundation/branded-types';
|
|
1
2
|
import { Fr } from '@aztec/foundation/curves/bn254';
|
|
2
3
|
import type { EthAddress } from '@aztec/foundation/eth-address';
|
|
3
4
|
import type { Signature } from '@aztec/foundation/eth-signature';
|
|
@@ -15,15 +16,18 @@ export declare class ValidationService {
|
|
|
15
16
|
* Create a block proposal with the given header, archive, and transactions
|
|
16
17
|
*
|
|
17
18
|
* @param blockHeader - The block header
|
|
18
|
-
* @param
|
|
19
|
+
* @param blockIndexWithinCheckpoint - The block index within checkpoint for HA signing context
|
|
19
20
|
* @param inHash - Hash of L1 to L2 messages for this checkpoint
|
|
20
21
|
* @param archive - The archive of the current block
|
|
21
|
-
* @param txs -
|
|
22
|
+
* @param txs - Ordered list of transactions (Tx[])
|
|
23
|
+
* @param proposerAttesterAddress - The address of the proposer/attester, or undefined
|
|
22
24
|
* @param options - Block proposal options (including broadcastInvalidBlockProposal for testing)
|
|
23
25
|
*
|
|
24
26
|
* @returns A block proposal signing the above information
|
|
27
|
+
* @throws DutyAlreadySignedError if HA signer indicates duty already signed by another node
|
|
28
|
+
* @throws SlashingProtectionError if attempting to sign different data for same slot
|
|
25
29
|
*/
|
|
26
|
-
createBlockProposal(blockHeader: BlockHeader,
|
|
30
|
+
createBlockProposal(blockHeader: BlockHeader, blockIndexWithinCheckpoint: IndexWithinCheckpoint, inHash: Fr, archive: Fr, txs: Tx[], proposerAttesterAddress: EthAddress | undefined, options: BlockProposalOptions): Promise<BlockProposal>;
|
|
27
31
|
/**
|
|
28
32
|
* Create a checkpoint proposal with the last block header and checkpoint header
|
|
29
33
|
*
|
|
@@ -35,8 +39,7 @@ export declare class ValidationService {
|
|
|
35
39
|
*
|
|
36
40
|
* @returns A checkpoint proposal signing the above information
|
|
37
41
|
*/
|
|
38
|
-
createCheckpointProposal(checkpointHeader: CheckpointHeader, archive: Fr, lastBlockInfo: CreateCheckpointProposalLastBlockData | undefined, proposerAttesterAddress: EthAddress | undefined, options: CheckpointProposalOptions): Promise<CheckpointProposal>;
|
|
39
|
-
private getPayloadSigner;
|
|
42
|
+
createCheckpointProposal(checkpointHeader: CheckpointHeader, archive: Fr, feeAssetPriceModifier: bigint, lastBlockInfo: CreateCheckpointProposalLastBlockData | undefined, proposerAttesterAddress: EthAddress | undefined, options: CheckpointProposalOptions): Promise<CheckpointProposal>;
|
|
40
43
|
/**
|
|
41
44
|
* Attest with selection of validators to the given checkpoint proposal
|
|
42
45
|
*
|
|
@@ -48,6 +51,16 @@ export declare class ValidationService {
|
|
|
48
51
|
* @returns checkpoint attestations
|
|
49
52
|
*/
|
|
50
53
|
attestToCheckpointProposal(proposal: CheckpointProposalCore, attestors: EthAddress[]): Promise<CheckpointAttestation[]>;
|
|
51
|
-
|
|
54
|
+
/**
|
|
55
|
+
* Sign attestations and signers payload
|
|
56
|
+
* @param attestationsAndSigners - The attestations and signers to sign
|
|
57
|
+
* @param proposer - The proposer address to sign with
|
|
58
|
+
* @param slot - The slot number for HA signing context
|
|
59
|
+
* @param blockNumber - The block or checkpoint number for HA signing context
|
|
60
|
+
* @returns signature
|
|
61
|
+
* @throws DutyAlreadySignedError if already signed by another HA node
|
|
62
|
+
* @throws SlashingProtectionError if attempting to sign different data for same slot
|
|
63
|
+
*/
|
|
64
|
+
signAttestationsAndSigners(attestationsAndSigners: CommitteeAttestationsAndSigners, proposer: EthAddress, slot: SlotNumber, blockNumber: BlockNumber | CheckpointNumber): Promise<Signature>;
|
|
52
65
|
}
|
|
53
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
66
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"validation_service.d.ts","sourceRoot":"","sources":["../../src/duties/validation_service.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"validation_service.d.ts","sourceRoot":"","sources":["../../src/duties/validation_service.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,WAAW,EACX,KAAK,gBAAgB,EACrB,qBAAqB,EACrB,KAAK,UAAU,EAChB,MAAM,iCAAiC,CAAC;AAGzC,OAAO,EAAE,EAAE,EAAE,MAAM,gCAAgC,CAAC;AACpD,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,+BAA+B,CAAC;AAChE,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,iCAAiC,CAAC;AAEjE,OAAO,KAAK,EAAE,+BAA+B,EAAE,MAAM,qBAAqB,CAAC;AAC3E,OAAO,KAAK,EAAE,qCAAqC,EAAE,MAAM,iCAAiC,CAAC;AAC7F,OAAO,EACL,aAAa,EACb,KAAK,oBAAoB,EACzB,qBAAqB,EACrB,kBAAkB,EAClB,KAAK,sBAAsB,EAC3B,KAAK,yBAAyB,EAG/B,MAAM,mBAAmB,CAAC;AAC3B,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,sBAAsB,CAAC;AAC7D,OAAO,KAAK,EAAE,WAAW,EAAE,EAAE,EAAE,MAAM,kBAAkB,CAAC;AAIxD,OAAO,KAAK,EAAE,iBAAiB,EAAE,MAAM,2BAA2B,CAAC;AAEnE,qBAAa,iBAAiB;IAE1B,OAAO,CAAC,QAAQ;IAChB,OAAO,CAAC,GAAG;IAFb,YACU,QAAQ,EAAE,iBAAiB,EAC3B,GAAG,yCAA+C,EACxD;IAEJ;;;;;;;;;;;;;;OAcG;IACI,mBAAmB,CACxB,WAAW,EAAE,WAAW,EACxB,0BAA0B,EAAE,qBAAqB,EACjD,MAAM,EAAE,EAAE,EACV,OAAO,EAAE,EAAE,EACX,GAAG,EAAE,EAAE,EAAE,EACT,uBAAuB,EAAE,UAAU,GAAG,SAAS,EAC/C,OAAO,EAAE,oBAAoB,GAC5B,OAAO,CAAC,aAAa,CAAC,CAqBxB;IAED;;;;;;;;;;OAUG;IACI,wBAAwB,CAC7B,gBAAgB,EAAE,gBAAgB,EAClC,OAAO,EAAE,EAAE,EACX,qBAAqB,EAAE,MAAM,EAC7B,aAAa,EAAE,qCAAqC,GAAG,SAAS,EAChE,uBAAuB,EAAE,UAAU,GAAG,SAAS,EAC/C,OAAO,EAAE,yBAAyB,GACjC,OAAO,CAAC,kBAAkB,CAAC,CA4B7B;IAED;;;;;;;;;OASG;IACG,0BAA0B,CAC9B,QAAQ,EAAE,sBAAsB,EAChC,SAAS,EAAE,UAAU,EAAE,GACtB,OAAO,CAAC,qBAAqB,EAAE,CAAC,CAoDlC;IAED;;;;;;;;;OASG;IACH,0BAA0B,CACxB,sBAAsB,EAAE,+BAA+B,EACvD,QAAQ,EAAE,UAAU,EACpB,IAAI,EAAE,UAAU,EAChB,WAAW,EAAE,WAAW,GAAG,gBAAgB,GAC1C,OAAO,CAAC,SAAS,CAAC,CAWpB;CACF"}
|
|
@@ -1,8 +1,11 @@
|
|
|
1
|
+
import { BlockNumber } from '@aztec/foundation/branded-types';
|
|
1
2
|
import { Buffer32 } from '@aztec/foundation/buffer';
|
|
2
3
|
import { keccak256 } from '@aztec/foundation/crypto/keccak';
|
|
3
4
|
import { Fr } from '@aztec/foundation/curves/bn254';
|
|
4
5
|
import { createLogger } from '@aztec/foundation/log';
|
|
5
6
|
import { BlockProposal, CheckpointAttestation, CheckpointProposal, ConsensusPayload, SignatureDomainSeparator } from '@aztec/stdlib/p2p';
|
|
7
|
+
import { DutyAlreadySignedError, SlashingProtectionError } from '@aztec/validator-ha-signer/errors';
|
|
8
|
+
import { DutyType } from '@aztec/validator-ha-signer/types';
|
|
6
9
|
export class ValidationService {
|
|
7
10
|
keyStore;
|
|
8
11
|
log;
|
|
@@ -14,21 +17,26 @@ export class ValidationService {
|
|
|
14
17
|
* Create a block proposal with the given header, archive, and transactions
|
|
15
18
|
*
|
|
16
19
|
* @param blockHeader - The block header
|
|
17
|
-
* @param
|
|
20
|
+
* @param blockIndexWithinCheckpoint - The block index within checkpoint for HA signing context
|
|
18
21
|
* @param inHash - Hash of L1 to L2 messages for this checkpoint
|
|
19
22
|
* @param archive - The archive of the current block
|
|
20
|
-
* @param txs -
|
|
23
|
+
* @param txs - Ordered list of transactions (Tx[])
|
|
24
|
+
* @param proposerAttesterAddress - The address of the proposer/attester, or undefined
|
|
21
25
|
* @param options - Block proposal options (including broadcastInvalidBlockProposal for testing)
|
|
22
26
|
*
|
|
23
27
|
* @returns A block proposal signing the above information
|
|
24
|
-
|
|
25
|
-
|
|
28
|
+
* @throws DutyAlreadySignedError if HA signer indicates duty already signed by another node
|
|
29
|
+
* @throws SlashingProtectionError if attempting to sign different data for same slot
|
|
30
|
+
*/ createBlockProposal(blockHeader, blockIndexWithinCheckpoint, inHash, archive, txs, proposerAttesterAddress, options) {
|
|
26
31
|
// For testing: change the new archive to trigger state_mismatch validation failure
|
|
27
32
|
if (options.broadcastInvalidBlockProposal) {
|
|
28
33
|
archive = Fr.random();
|
|
29
34
|
this.log.warn(`Creating INVALID block proposal for slot ${blockHeader.globalVariables.slotNumber}`);
|
|
30
35
|
}
|
|
31
|
-
|
|
36
|
+
// Create a signer that uses the appropriate address
|
|
37
|
+
const address = proposerAttesterAddress ?? this.keyStore.getAddress(0);
|
|
38
|
+
const payloadSigner = (payload, context)=>this.keyStore.signMessageWithAddress(address, payload, context);
|
|
39
|
+
return BlockProposal.createProposalFromSigner(blockHeader, blockIndexWithinCheckpoint, inHash, archive, txs.map((tx)=>tx.getTxHash()), options.publishFullTxs ? txs : undefined, payloadSigner);
|
|
32
40
|
}
|
|
33
41
|
/**
|
|
34
42
|
* Create a checkpoint proposal with the last block header and checkpoint header
|
|
@@ -40,13 +48,17 @@ export class ValidationService {
|
|
|
40
48
|
* @param options - Checkpoint proposal options
|
|
41
49
|
*
|
|
42
50
|
* @returns A checkpoint proposal signing the above information
|
|
43
|
-
*/ createCheckpointProposal(checkpointHeader, archive, lastBlockInfo, proposerAttesterAddress, options) {
|
|
44
|
-
const payloadSigner = this.getPayloadSigner(proposerAttesterAddress);
|
|
51
|
+
*/ createCheckpointProposal(checkpointHeader, archive, feeAssetPriceModifier, lastBlockInfo, proposerAttesterAddress, options) {
|
|
45
52
|
// For testing: change the archive to trigger state_mismatch validation failure
|
|
46
53
|
if (options.broadcastInvalidCheckpointProposal) {
|
|
47
54
|
archive = Fr.random();
|
|
48
55
|
this.log.warn(`Creating INVALID checkpoint proposal for slot ${checkpointHeader.slotNumber}`);
|
|
49
56
|
}
|
|
57
|
+
// Create a signer that takes payload and context, and uses the appropriate address
|
|
58
|
+
const payloadSigner = (payload, context)=>{
|
|
59
|
+
const address = proposerAttesterAddress ?? this.keyStore.getAddress(0);
|
|
60
|
+
return this.keyStore.signMessageWithAddress(address, payload, context);
|
|
61
|
+
};
|
|
50
62
|
// Last block to include in the proposal
|
|
51
63
|
const lastBlock = lastBlockInfo && {
|
|
52
64
|
blockHeader: lastBlockInfo.blockHeader,
|
|
@@ -54,16 +66,7 @@ export class ValidationService {
|
|
|
54
66
|
txHashes: lastBlockInfo.txs.map((tx)=>tx.getTxHash()),
|
|
55
67
|
txs: options.publishFullTxs ? lastBlockInfo.txs : undefined
|
|
56
68
|
};
|
|
57
|
-
return CheckpointProposal.createProposalFromSigner(checkpointHeader, archive, lastBlock, payloadSigner);
|
|
58
|
-
}
|
|
59
|
-
getPayloadSigner(proposerAttesterAddress) {
|
|
60
|
-
if (proposerAttesterAddress !== undefined) {
|
|
61
|
-
return (payload)=>this.keyStore.signMessageWithAddress(proposerAttesterAddress, payload);
|
|
62
|
-
} else {
|
|
63
|
-
// if there is no proposer attester address, just use the first signer
|
|
64
|
-
const signer = this.keyStore.getAddress(0);
|
|
65
|
-
return (payload)=>this.keyStore.signMessageWithAddress(signer, payload);
|
|
66
|
-
}
|
|
69
|
+
return CheckpointProposal.createProposalFromSigner(checkpointHeader, archive, feeAssetPriceModifier, lastBlock, payloadSigner);
|
|
67
70
|
}
|
|
68
71
|
/**
|
|
69
72
|
* Attest with selection of validators to the given checkpoint proposal
|
|
@@ -76,13 +79,63 @@ export class ValidationService {
|
|
|
76
79
|
* @returns checkpoint attestations
|
|
77
80
|
*/ async attestToCheckpointProposal(proposal, attestors) {
|
|
78
81
|
// Create the attestation payload from the checkpoint proposal
|
|
79
|
-
const payload = new ConsensusPayload(proposal.checkpointHeader, proposal.archive);
|
|
82
|
+
const payload = new ConsensusPayload(proposal.checkpointHeader, proposal.archive, proposal.feeAssetPriceModifier);
|
|
80
83
|
const buf = Buffer32.fromBuffer(keccak256(payload.getPayloadToSign(SignatureDomainSeparator.checkpointAttestation)));
|
|
81
|
-
|
|
82
|
-
|
|
84
|
+
// TODO(spy/ha): Use checkpointNumber instead of blockNumber once CheckpointHeader includes it.
|
|
85
|
+
// Currently using lastBlock.blockNumber as a proxy for checkpoint identification in HA signing.
|
|
86
|
+
// blockNumber is NOT used for the primary key so it's safe to use here.
|
|
87
|
+
// See CheckpointHeader TODO and SigningContext types documentation.
|
|
88
|
+
let blockNumber;
|
|
89
|
+
try {
|
|
90
|
+
blockNumber = proposal.blockNumber;
|
|
91
|
+
} catch {
|
|
92
|
+
// Checkpoint proposal may not have lastBlock, use 0 as fallback
|
|
93
|
+
blockNumber = BlockNumber(0);
|
|
94
|
+
}
|
|
95
|
+
const context = {
|
|
96
|
+
slot: proposal.slotNumber,
|
|
97
|
+
blockNumber,
|
|
98
|
+
dutyType: DutyType.ATTESTATION
|
|
99
|
+
};
|
|
100
|
+
// Sign each attestor in parallel, catching HA errors per-attestor
|
|
101
|
+
const results = await Promise.allSettled(attestors.map(async (attestor)=>{
|
|
102
|
+
const sig = await this.keyStore.signMessageWithAddress(attestor, buf, context);
|
|
103
|
+
// return new BlockAttestation(proposal.payload, sig, proposal.signature);
|
|
104
|
+
return new CheckpointAttestation(payload, sig, proposal.signature);
|
|
105
|
+
}));
|
|
106
|
+
const attestations = [];
|
|
107
|
+
for(let i = 0; i < results.length; i++){
|
|
108
|
+
const result = results[i];
|
|
109
|
+
if (result.status === 'fulfilled') {
|
|
110
|
+
attestations.push(result.value);
|
|
111
|
+
} else {
|
|
112
|
+
const error = result.reason;
|
|
113
|
+
if (error instanceof DutyAlreadySignedError || error instanceof SlashingProtectionError) {
|
|
114
|
+
this.log.info(`Attestation for slot ${proposal.slotNumber} by ${attestors[i]} already signed by another High-Availability node`);
|
|
115
|
+
// Continue with remaining attestors
|
|
116
|
+
} else {
|
|
117
|
+
throw error;
|
|
118
|
+
}
|
|
119
|
+
}
|
|
120
|
+
}
|
|
121
|
+
return attestations;
|
|
83
122
|
}
|
|
84
|
-
|
|
123
|
+
/**
|
|
124
|
+
* Sign attestations and signers payload
|
|
125
|
+
* @param attestationsAndSigners - The attestations and signers to sign
|
|
126
|
+
* @param proposer - The proposer address to sign with
|
|
127
|
+
* @param slot - The slot number for HA signing context
|
|
128
|
+
* @param blockNumber - The block or checkpoint number for HA signing context
|
|
129
|
+
* @returns signature
|
|
130
|
+
* @throws DutyAlreadySignedError if already signed by another HA node
|
|
131
|
+
* @throws SlashingProtectionError if attempting to sign different data for same slot
|
|
132
|
+
*/ signAttestationsAndSigners(attestationsAndSigners, proposer, slot, blockNumber) {
|
|
133
|
+
const context = {
|
|
134
|
+
slot,
|
|
135
|
+
blockNumber,
|
|
136
|
+
dutyType: DutyType.ATTESTATIONS_AND_SIGNERS
|
|
137
|
+
};
|
|
85
138
|
const buf = Buffer32.fromBuffer(keccak256(attestationsAndSigners.getPayloadToSign(SignatureDomainSeparator.attestationsAndSigners)));
|
|
86
|
-
return
|
|
139
|
+
return this.keyStore.signMessageWithAddress(proposer, buf, context);
|
|
87
140
|
}
|
|
88
141
|
}
|
package/dest/factory.d.ts
CHANGED
|
@@ -31,5 +31,5 @@ export declare function createValidatorClient(config: ValidatorClientFullConfig,
|
|
|
31
31
|
epochCache: EpochCache;
|
|
32
32
|
keyStoreManager: KeystoreManager | undefined;
|
|
33
33
|
blobClient: BlobClientInterface;
|
|
34
|
-
}): ValidatorClient | undefined;
|
|
35
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
34
|
+
}): Promise<ValidatorClient> | undefined;
|
|
35
|
+
//# sourceMappingURL=data:application/json;base64,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
|
package/dest/factory.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"factory.d.ts","sourceRoot":"","sources":["../src/factory.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,mBAAmB,EAAE,MAAM,2BAA2B,CAAC;AACrE,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,oBAAoB,CAAC;AACrD,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,yBAAyB,CAAC;AAC5D,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,sBAAsB,CAAC;AAC5D,OAAO,EAA0B,KAAK,SAAS,EAAE,MAAM,YAAY,CAAC;AACpE,OAAO,KAAK,EAAE,WAAW,EAAE,aAAa,EAAE,MAAM,qBAAqB,CAAC;AACtE,OAAO,KAAK,EAAE,yBAAyB,EAAE,sBAAsB,EAAE,MAAM,iCAAiC,CAAC;AACzG,OAAO,KAAK,EAAE,mBAAmB,EAAE,MAAM,yBAAyB,CAAC;AACnE,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,yBAAyB,CAAC;AAE/D,OAAO,EAAE,oBAAoB,EAAE,MAAM,6BAA6B,CAAC;AACnE,OAAO,KAAK,EAAE,0BAA0B,EAAE,MAAM,yBAAyB,CAAC;AAE1E,OAAO,EAAE,eAAe,EAAE,MAAM,gBAAgB,CAAC;AAEjD,wBAAgB,0BAA0B,CACxC,MAAM,EAAE,yBAAyB,EACjC,IAAI,EAAE;IACJ,kBAAkB,EAAE,0BAA0B,CAAC;IAC/C,UAAU,EAAE,sBAAsB,CAAC;IACnC,WAAW,EAAE,aAAa,GAAG,WAAW,CAAC;IACzC,mBAAmB,EAAE,mBAAmB,CAAC;IACzC,SAAS,EAAE,SAAS,CAAC;IACrB,UAAU,EAAE,UAAU,CAAC;IACvB,YAAY,EAAE,YAAY,CAAC;IAC3B,SAAS,EAAE,eAAe,CAAC;CAC5B,
|
|
1
|
+
{"version":3,"file":"factory.d.ts","sourceRoot":"","sources":["../src/factory.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,mBAAmB,EAAE,MAAM,2BAA2B,CAAC;AACrE,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,oBAAoB,CAAC;AACrD,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,yBAAyB,CAAC;AAC5D,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,sBAAsB,CAAC;AAC5D,OAAO,EAA0B,KAAK,SAAS,EAAE,MAAM,YAAY,CAAC;AACpE,OAAO,KAAK,EAAE,WAAW,EAAE,aAAa,EAAE,MAAM,qBAAqB,CAAC;AACtE,OAAO,KAAK,EAAE,yBAAyB,EAAE,sBAAsB,EAAE,MAAM,iCAAiC,CAAC;AACzG,OAAO,KAAK,EAAE,mBAAmB,EAAE,MAAM,yBAAyB,CAAC;AACnE,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,yBAAyB,CAAC;AAE/D,OAAO,EAAE,oBAAoB,EAAE,MAAM,6BAA6B,CAAC;AACnE,OAAO,KAAK,EAAE,0BAA0B,EAAE,MAAM,yBAAyB,CAAC;AAE1E,OAAO,EAAE,eAAe,EAAE,MAAM,gBAAgB,CAAC;AAEjD,wBAAgB,0BAA0B,CACxC,MAAM,EAAE,yBAAyB,EACjC,IAAI,EAAE;IACJ,kBAAkB,EAAE,0BAA0B,CAAC;IAC/C,UAAU,EAAE,sBAAsB,CAAC;IACnC,WAAW,EAAE,aAAa,GAAG,WAAW,CAAC;IACzC,mBAAmB,EAAE,mBAAmB,CAAC;IACzC,SAAS,EAAE,SAAS,CAAC;IACrB,UAAU,EAAE,UAAU,CAAC;IACvB,YAAY,EAAE,YAAY,CAAC;IAC3B,SAAS,EAAE,eAAe,CAAC;CAC5B,wBAmBF;AAED,wBAAgB,qBAAqB,CACnC,MAAM,EAAE,yBAAyB,EACjC,IAAI,EAAE;IACJ,kBAAkB,EAAE,0BAA0B,CAAC;IAC/C,UAAU,EAAE,sBAAsB,CAAC;IACnC,SAAS,EAAE,SAAS,CAAC;IACrB,WAAW,EAAE,aAAa,GAAG,WAAW,CAAC;IACzC,mBAAmB,EAAE,mBAAmB,CAAC;IACzC,SAAS,EAAE,eAAe,CAAC;IAC3B,YAAY,EAAE,YAAY,CAAC;IAC3B,UAAU,EAAE,UAAU,CAAC;IACvB,eAAe,EAAE,eAAe,GAAG,SAAS,CAAC;IAC7C,UAAU,EAAE,mBAAmB,CAAC;CACjC,wCAqBF"}
|
package/dest/factory.js
CHANGED
|
@@ -7,7 +7,7 @@ export function createBlockProposalHandler(config, deps) {
|
|
|
7
7
|
const blockProposalValidator = new BlockProposalValidator(deps.epochCache, {
|
|
8
8
|
txsPermitted: !config.disableTransactions
|
|
9
9
|
});
|
|
10
|
-
return new BlockProposalHandler(deps.checkpointsBuilder, deps.worldState, deps.blockSource, deps.l1ToL2MessageSource, deps.p2pClient.getTxProvider(), blockProposalValidator, config, metrics, deps.dateProvider, deps.telemetry);
|
|
10
|
+
return new BlockProposalHandler(deps.checkpointsBuilder, deps.worldState, deps.blockSource, deps.l1ToL2MessageSource, deps.p2pClient.getTxProvider(), blockProposalValidator, deps.epochCache, config, metrics, deps.dateProvider, deps.telemetry);
|
|
11
11
|
}
|
|
12
12
|
export function createValidatorClient(config, deps) {
|
|
13
13
|
if (config.disableValidator || !deps.keyStoreManager) {
|
|
@@ -0,0 +1,99 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* High Availability Key Store
|
|
3
|
+
*
|
|
4
|
+
* A ValidatorKeyStore wrapper that adds slashing protection for HA validator setups.
|
|
5
|
+
* When multiple validator nodes are running, only one node will sign for a given duty.
|
|
6
|
+
*/
|
|
7
|
+
import { Buffer32 } from '@aztec/foundation/buffer';
|
|
8
|
+
import type { EthAddress } from '@aztec/foundation/eth-address';
|
|
9
|
+
import type { Signature } from '@aztec/foundation/eth-signature';
|
|
10
|
+
import type { EthRemoteSignerConfig } from '@aztec/node-keystore';
|
|
11
|
+
import type { AztecAddress } from '@aztec/stdlib/aztec-address';
|
|
12
|
+
import { type SigningContext } from '@aztec/validator-ha-signer/types';
|
|
13
|
+
import type { ValidatorHASigner } from '@aztec/validator-ha-signer/validator-ha-signer';
|
|
14
|
+
import { type TypedDataDefinition } from 'viem';
|
|
15
|
+
import type { ExtendedValidatorKeyStore } from './interface.js';
|
|
16
|
+
/**
|
|
17
|
+
* High Availability Key Store
|
|
18
|
+
*
|
|
19
|
+
* Wraps a base ExtendedValidatorKeyStore and ValidatorHASigner to provide
|
|
20
|
+
* HA-protected signing operations (when context is provided).
|
|
21
|
+
*
|
|
22
|
+
* The extended interface methods (getAttesterAddresses, getCoinbaseAddress, etc.)
|
|
23
|
+
* are pure pass-through since they don't require HA coordination.
|
|
24
|
+
*
|
|
25
|
+
* Usage:
|
|
26
|
+
* ```typescript
|
|
27
|
+
* const baseKeyStore = NodeKeystoreAdapter.fromPrivateKeys(privateKeys);
|
|
28
|
+
* const haSigner = new ValidatorHASigner(db, config);
|
|
29
|
+
* const haKeyStore = new HAKeyStore(baseKeyStore, haSigner);
|
|
30
|
+
*
|
|
31
|
+
* // Without context - signs directly (no HA protection)
|
|
32
|
+
* const sig = await haKeyStore.signMessageWithAddress(addr, msg);
|
|
33
|
+
*
|
|
34
|
+
* // With context - HA protected, throws DutyAlreadySignedError if already signed
|
|
35
|
+
* const result = await haKeyStore.signMessageWithAddress(addr, msg, {
|
|
36
|
+
* slot: 100n,
|
|
37
|
+
* blockNumber: 50n,
|
|
38
|
+
* dutyType: DutyType.BLOCK_PROPOSAL,
|
|
39
|
+
* });
|
|
40
|
+
* ```
|
|
41
|
+
*/
|
|
42
|
+
export declare class HAKeyStore implements ExtendedValidatorKeyStore {
|
|
43
|
+
private readonly baseKeyStore;
|
|
44
|
+
private readonly haSigner;
|
|
45
|
+
private readonly log;
|
|
46
|
+
constructor(baseKeyStore: ExtendedValidatorKeyStore, haSigner: ValidatorHASigner);
|
|
47
|
+
/**
|
|
48
|
+
* Sign typed data with all addresses.
|
|
49
|
+
* Coordinates across nodes to prevent double-signing for most duty types.
|
|
50
|
+
* AUTH_REQUEST and TXS duties bypass HA protection since signing multiple times is safe.
|
|
51
|
+
* Returns only signatures that were successfully claimed by this node.
|
|
52
|
+
*/
|
|
53
|
+
signTypedData(typedData: TypedDataDefinition, context: SigningContext): Promise<Signature[]>;
|
|
54
|
+
/**
|
|
55
|
+
* Sign a message with all addresses.
|
|
56
|
+
* Coordinates across nodes to prevent double-signing for most duty types.
|
|
57
|
+
* AUTH_REQUEST and TXS duties bypass HA protection since signing multiple times is safe.
|
|
58
|
+
* Returns only signatures that were successfully claimed by this node.
|
|
59
|
+
*/
|
|
60
|
+
signMessage(message: Buffer32, context: SigningContext): Promise<Signature[]>;
|
|
61
|
+
/**
|
|
62
|
+
* Sign typed data with a specific address.
|
|
63
|
+
* Coordinates across nodes to prevent double-signing for most duty types.
|
|
64
|
+
* AUTH_REQUEST and TXS duties bypass HA protection since signing multiple times is safe.
|
|
65
|
+
* @throws DutyAlreadySignedError if the duty was already signed by another node
|
|
66
|
+
* @throws SlashingProtectionError if attempting to sign different data for the same slot
|
|
67
|
+
*/
|
|
68
|
+
signTypedDataWithAddress(address: EthAddress, typedData: TypedDataDefinition, context: SigningContext): Promise<Signature>;
|
|
69
|
+
/**
|
|
70
|
+
* Sign a message with a specific address.
|
|
71
|
+
* Coordinates across nodes to prevent double-signing for most duty types.
|
|
72
|
+
* AUTH_REQUEST and TXS duties bypass HA protection since signing multiple times is safe.
|
|
73
|
+
* @throws DutyAlreadySignedError if the duty was already signed by another node
|
|
74
|
+
* @throws SlashingProtectionError if attempting to sign different data for the same slot
|
|
75
|
+
*/
|
|
76
|
+
signMessageWithAddress(address: EthAddress, message: Buffer32, context: SigningContext): Promise<Signature>;
|
|
77
|
+
getAddress(index: number): EthAddress;
|
|
78
|
+
getAddresses(): EthAddress[];
|
|
79
|
+
getAttesterAddresses(): EthAddress[];
|
|
80
|
+
getCoinbaseAddress(attesterAddress: EthAddress): EthAddress;
|
|
81
|
+
getPublisherAddresses(attesterAddress: EthAddress): EthAddress[];
|
|
82
|
+
getFeeRecipient(attesterAddress: EthAddress): AztecAddress;
|
|
83
|
+
getRemoteSignerConfig(attesterAddress: EthAddress): EthRemoteSignerConfig | undefined;
|
|
84
|
+
/**
|
|
85
|
+
* Process signing errors from the HA signer.
|
|
86
|
+
* Logs expected HA errors (already signed) at appropriate levels.
|
|
87
|
+
* Re-throws unexpected errors.
|
|
88
|
+
*/
|
|
89
|
+
private processSigningError;
|
|
90
|
+
/**
|
|
91
|
+
* Start the high-availability key store
|
|
92
|
+
*/
|
|
93
|
+
start(): Promise<void>;
|
|
94
|
+
/**
|
|
95
|
+
* Stop the high-availability key store
|
|
96
|
+
*/
|
|
97
|
+
stop(): Promise<void>;
|
|
98
|
+
}
|
|
99
|
+
//# sourceMappingURL=data:application/json;base64,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
|