@aztec/validator-client 0.0.1-commit.e0f15ab9b → 0.0.1-commit.e304674f1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +0 -2
- package/dest/config.d.ts +1 -1
- package/dest/config.d.ts.map +1 -1
- package/dest/config.js +0 -5
- package/dest/duties/validation_service.d.ts +3 -4
- package/dest/duties/validation_service.d.ts.map +1 -1
- package/dest/duties/validation_service.js +7 -12
- package/dest/factory.d.ts +5 -4
- package/dest/factory.d.ts.map +1 -1
- package/dest/factory.js +3 -3
- package/dest/index.d.ts +2 -2
- package/dest/index.d.ts.map +1 -1
- package/dest/index.js +1 -1
- package/dest/metrics.d.ts +2 -2
- package/dest/metrics.d.ts.map +1 -1
- package/dest/proposal_handler.d.ts +107 -0
- package/dest/proposal_handler.d.ts.map +1 -0
- package/dest/{block_proposal_handler.js → proposal_handler.js} +368 -16
- package/dest/validator.d.ts +8 -13
- package/dest/validator.d.ts.map +1 -1
- package/dest/validator.js +20 -197
- package/package.json +19 -19
- package/src/config.ts +0 -5
- package/src/duties/validation_service.ts +7 -14
- package/src/factory.ts +5 -3
- package/src/index.ts +1 -1
- package/src/metrics.ts +1 -1
- package/src/{block_proposal_handler.ts → proposal_handler.ts} +418 -17
- package/src/validator.ts +23 -212
- package/dest/block_proposal_handler.d.ts +0 -64
- package/dest/block_proposal_handler.d.ts.map +0 -1
|
@@ -63,7 +63,9 @@ function _ts_dispose_resources(env) {
|
|
|
63
63
|
return next();
|
|
64
64
|
})(env);
|
|
65
65
|
}
|
|
66
|
+
import { encodeCheckpointBlobDataFromBlocks, getBlobsPerL1Block } from '@aztec/blob-lib';
|
|
66
67
|
import { INITIAL_L2_BLOCK_NUM } from '@aztec/constants';
|
|
68
|
+
import { validateFeeAssetPriceModifier } from '@aztec/ethereum/contracts';
|
|
67
69
|
import { BlockNumber, CheckpointNumber, SlotNumber } from '@aztec/foundation/branded-types';
|
|
68
70
|
import { pick } from '@aztec/foundation/collection';
|
|
69
71
|
import { Fr } from '@aztec/foundation/curves/bn254';
|
|
@@ -71,13 +73,14 @@ import { TimeoutError } from '@aztec/foundation/error';
|
|
|
71
73
|
import { createLogger } from '@aztec/foundation/log';
|
|
72
74
|
import { retryUntil } from '@aztec/foundation/retry';
|
|
73
75
|
import { DateProvider, Timer } from '@aztec/foundation/timer';
|
|
76
|
+
import { validateCheckpoint } from '@aztec/stdlib/checkpoint';
|
|
74
77
|
import { getEpochAtSlot, getTimestampForSlot } from '@aztec/stdlib/epoch-helpers';
|
|
75
78
|
import { Gas } from '@aztec/stdlib/gas';
|
|
76
|
-
import { computeInHashFromL1ToL2Messages } from '@aztec/stdlib/messaging';
|
|
79
|
+
import { accumulateCheckpointOutHashes, computeInHashFromL1ToL2Messages } from '@aztec/stdlib/messaging';
|
|
77
80
|
import { MerkleTreeId } from '@aztec/stdlib/trees';
|
|
78
81
|
import { ReExFailedTxsError, ReExInitialStateMismatchError, ReExStateMismatchError, ReExTimeoutError, TransactionsNotAvailableError } from '@aztec/stdlib/validators';
|
|
79
82
|
import { getTelemetryClient } from '@aztec/telemetry-client';
|
|
80
|
-
export class
|
|
83
|
+
/** Handles block and checkpoint proposals for both validator and non-validator nodes. */ export class ProposalHandler {
|
|
81
84
|
checkpointsBuilder;
|
|
82
85
|
worldState;
|
|
83
86
|
blockSource;
|
|
@@ -86,11 +89,15 @@ export class BlockProposalHandler {
|
|
|
86
89
|
blockProposalValidator;
|
|
87
90
|
epochCache;
|
|
88
91
|
config;
|
|
92
|
+
blobClient;
|
|
89
93
|
metrics;
|
|
90
94
|
dateProvider;
|
|
91
95
|
log;
|
|
92
96
|
tracer;
|
|
93
|
-
|
|
97
|
+
/** Cached last checkpoint validation result to avoid double-validation on validator nodes. */ lastCheckpointValidationResult;
|
|
98
|
+
/** Archiver reference for setting proposed checkpoints (pipelining). Set via register(). */ archiver;
|
|
99
|
+
/** Returns current validator addresses for own-proposal detection. Set via register(). */ getOwnValidatorAddresses;
|
|
100
|
+
constructor(checkpointsBuilder, worldState, blockSource, l1ToL2MessageSource, txProvider, blockProposalValidator, epochCache, config, blobClient, metrics, dateProvider = new DateProvider(), telemetry = getTelemetryClient(), log = createLogger('validator:proposal-handler')){
|
|
94
101
|
this.checkpointsBuilder = checkpointsBuilder;
|
|
95
102
|
this.worldState = worldState;
|
|
96
103
|
this.blockSource = blockSource;
|
|
@@ -99,18 +106,27 @@ export class BlockProposalHandler {
|
|
|
99
106
|
this.blockProposalValidator = blockProposalValidator;
|
|
100
107
|
this.epochCache = epochCache;
|
|
101
108
|
this.config = config;
|
|
109
|
+
this.blobClient = blobClient;
|
|
102
110
|
this.metrics = metrics;
|
|
103
111
|
this.dateProvider = dateProvider;
|
|
104
112
|
this.log = log;
|
|
105
113
|
if (config.fishermanMode) {
|
|
106
114
|
this.log = this.log.createChild('[FISHERMAN]');
|
|
107
115
|
}
|
|
108
|
-
this.tracer = telemetry.getTracer('
|
|
116
|
+
this.tracer = telemetry.getTracer('ProposalHandler');
|
|
109
117
|
}
|
|
110
|
-
|
|
118
|
+
/**
|
|
119
|
+
* Registers handlers for block and checkpoint proposals on the p2p client.
|
|
120
|
+
* Block proposals are registered for non-validator nodes (validators register their own enhanced handler).
|
|
121
|
+
* The all-nodes checkpoint proposal handler is always registered for validation, caching, and pipelining.
|
|
122
|
+
* @param archiver - Archiver reference for setting proposed checkpoints (pipelining)
|
|
123
|
+
* @param getOwnValidatorAddresses - Returns current validator addresses for own-proposal detection
|
|
124
|
+
*/ register(p2pClient, shouldReexecute, archiver, getOwnValidatorAddresses) {
|
|
125
|
+
this.archiver = archiver;
|
|
126
|
+
this.getOwnValidatorAddresses = getOwnValidatorAddresses;
|
|
111
127
|
// Non-validator handler that processes or re-executes for monitoring but does not attest.
|
|
112
128
|
// Returns boolean indicating whether the proposal was valid.
|
|
113
|
-
const
|
|
129
|
+
const blockHandler = async (proposal, proposalSender)=>{
|
|
114
130
|
try {
|
|
115
131
|
const { slotNumber, blockNumber } = proposal;
|
|
116
132
|
const result = await this.handleBlockProposal(proposal, proposalSender, shouldReexecute);
|
|
@@ -137,7 +153,40 @@ export class BlockProposalHandler {
|
|
|
137
153
|
return false;
|
|
138
154
|
}
|
|
139
155
|
};
|
|
140
|
-
p2pClient.registerBlockProposalHandler(
|
|
156
|
+
p2pClient.registerBlockProposalHandler(blockHandler);
|
|
157
|
+
// All-nodes checkpoint proposal handler: validates, caches, and sets proposed checkpoint for pipelining.
|
|
158
|
+
// Runs for all nodes (validators and non-validators). Validators get the cached result in the
|
|
159
|
+
// validator-specific callback (attestToCheckpointProposal) which runs after this one.
|
|
160
|
+
const checkpointHandler = async (proposal, _sender)=>{
|
|
161
|
+
try {
|
|
162
|
+
const proposalInfo = {
|
|
163
|
+
slot: proposal.slotNumber,
|
|
164
|
+
archive: proposal.archive.toString(),
|
|
165
|
+
proposer: proposal.getSender()?.toString()
|
|
166
|
+
};
|
|
167
|
+
// For own proposals, skip validation — the proposer already built and validated the checkpoint
|
|
168
|
+
const proposer = proposal.getSender();
|
|
169
|
+
const ownAddresses = this.getOwnValidatorAddresses?.();
|
|
170
|
+
const isOwnProposal = proposer && ownAddresses?.some((addr)=>addr === proposer.toString());
|
|
171
|
+
if (isOwnProposal) {
|
|
172
|
+
this.log.debug(`Skipping validation for own checkpoint proposal at slot ${proposal.slotNumber}`);
|
|
173
|
+
if (this.archiver && this.epochCache.isProposerPipeliningEnabled()) {
|
|
174
|
+
await this.setProposedCheckpointFromBlocks(proposal);
|
|
175
|
+
}
|
|
176
|
+
return undefined;
|
|
177
|
+
}
|
|
178
|
+
const result = await this.handleCheckpointProposal(proposal, proposalInfo);
|
|
179
|
+
if (result.isValid && this.archiver && this.epochCache.isProposerPipeliningEnabled()) {
|
|
180
|
+
await this.setProposedCheckpointFromValidation(proposal);
|
|
181
|
+
}
|
|
182
|
+
} catch (err) {
|
|
183
|
+
this.log.warn(`Error handling checkpoint proposal for slot ${proposal.slotNumber}`, {
|
|
184
|
+
err
|
|
185
|
+
});
|
|
186
|
+
}
|
|
187
|
+
return undefined;
|
|
188
|
+
};
|
|
189
|
+
p2pClient.registerAllNodesCheckpointProposalHandler(checkpointHandler);
|
|
141
190
|
return this;
|
|
142
191
|
}
|
|
143
192
|
async handleBlockProposal(proposal, proposalSender, shouldReexecute) {
|
|
@@ -173,7 +222,7 @@ export class BlockProposalHandler {
|
|
|
173
222
|
};
|
|
174
223
|
}
|
|
175
224
|
// Ensure the block source is synced before checking for existing blocks,
|
|
176
|
-
// since a
|
|
225
|
+
// since a proposed checkpoint prune may remove blocks we'd otherwise find.
|
|
177
226
|
// This affects mostly the block_number_already_exists check, since a pending
|
|
178
227
|
// checkpoint prune could remove a block that would conflict with this proposal.
|
|
179
228
|
// When pipelining is enabled, the proposer builds ahead of L1 submission, so the
|
|
@@ -298,7 +347,7 @@ export class BlockProposalHandler {
|
|
|
298
347
|
}
|
|
299
348
|
// If we succeeded, push this block into the archiver (unless disabled)
|
|
300
349
|
if (reexecutionResult?.block && this.config.skipPushProposedBlocksToArchiver === false) {
|
|
301
|
-
await this.blockSource.addBlock(reexecutionResult
|
|
350
|
+
await this.blockSource.addBlock(reexecutionResult.block);
|
|
302
351
|
}
|
|
303
352
|
this.log.info(`Successfully re-executed block ${blockNumber} proposal at index ${proposal.indexWithinCheckpoint} on slot ${slotNumber}`, {
|
|
304
353
|
...proposalInfo,
|
|
@@ -312,13 +361,12 @@ export class BlockProposalHandler {
|
|
|
312
361
|
}
|
|
313
362
|
async getParentBlock(proposal) {
|
|
314
363
|
const parentArchive = proposal.blockHeader.lastArchive.root;
|
|
315
|
-
const slot = proposal.slotNumber;
|
|
316
364
|
const config = this.checkpointsBuilder.getConfig();
|
|
317
365
|
const { genesisArchiveRoot } = await this.blockSource.getGenesisValues();
|
|
318
366
|
if (parentArchive.equals(genesisArchiveRoot)) {
|
|
319
367
|
return 'genesis';
|
|
320
368
|
}
|
|
321
|
-
const deadline = this.getReexecutionDeadline(
|
|
369
|
+
const deadline = this.getReexecutionDeadline(proposal.slotNumber, config);
|
|
322
370
|
const currentTime = this.dateProvider.now();
|
|
323
371
|
const timeoutDurationMs = deadline.getTime() - currentTime;
|
|
324
372
|
try {
|
|
@@ -464,8 +512,11 @@ export class BlockProposalHandler {
|
|
|
464
512
|
}
|
|
465
513
|
return undefined;
|
|
466
514
|
}
|
|
467
|
-
getReexecutionDeadline(
|
|
468
|
-
|
|
515
|
+
getReexecutionDeadline(slotNumber, config) {
|
|
516
|
+
// Under proposer pipelining, the proposal slot may be ahead of wall clock time.
|
|
517
|
+
// Reexecution budgets should still be bounded by the current slot we are in now.
|
|
518
|
+
const wallclockSlot = slotNumber - this.epochCache.pipeliningOffset();
|
|
519
|
+
const nextSlotTimestampSeconds = Number(getTimestampForSlot(SlotNumber(wallclockSlot + 1), config));
|
|
469
520
|
return new Date(nextSlotTimestampSeconds * 1000);
|
|
470
521
|
}
|
|
471
522
|
/** Waits for the block source to sync L1 data up to at least the slot before the given one. */ async waitForBlockSourceSync(slot) {
|
|
@@ -475,16 +526,17 @@ export class BlockProposalHandler {
|
|
|
475
526
|
return true;
|
|
476
527
|
}
|
|
477
528
|
// Make a quick check before triggering an archiver sync
|
|
529
|
+
// If we are pipelining and have a pending checkpoint number stored, we will allow the block proposal to be for a slot further
|
|
478
530
|
const syncedSlot = await this.blockSource.getSyncedL2SlotNumber();
|
|
479
|
-
if (syncedSlot !== undefined && syncedSlot + 1 >= slot) {
|
|
531
|
+
if (syncedSlot !== undefined && syncedSlot + 1 + this.epochCache.pipeliningOffset() >= slot) {
|
|
480
532
|
return true;
|
|
481
533
|
}
|
|
482
534
|
try {
|
|
483
535
|
// Trigger an immediate sync of the block source, and wait until it reports being synced to the required slot
|
|
484
536
|
return await retryUntil(async ()=>{
|
|
485
537
|
await this.blockSource.syncImmediate();
|
|
486
|
-
const
|
|
487
|
-
return
|
|
538
|
+
const updatedSyncedSlot = await this.blockSource.getSyncedL2SlotNumber();
|
|
539
|
+
return updatedSyncedSlot !== undefined && updatedSyncedSlot + 1 >= slot;
|
|
488
540
|
}, 'wait for block source sync', timeoutMs / 1000, 0.5);
|
|
489
541
|
} catch (err) {
|
|
490
542
|
if (err instanceof TimeoutError) {
|
|
@@ -611,4 +663,304 @@ export class BlockProposalHandler {
|
|
|
611
663
|
if (result) await result;
|
|
612
664
|
}
|
|
613
665
|
}
|
|
666
|
+
/**
|
|
667
|
+
* Validates a checkpoint proposal, caches the result, and uploads blobs if configured.
|
|
668
|
+
* Returns a cached result if the same proposal (archive + slot) was already validated.
|
|
669
|
+
* Used by both the all-nodes callback (via register) and the validator client (via delegation).
|
|
670
|
+
*/ async handleCheckpointProposal(proposal, proposalInfo) {
|
|
671
|
+
const slot = proposal.slotNumber;
|
|
672
|
+
// Check cache: same archive+slot means we already validated this proposal
|
|
673
|
+
if (this.lastCheckpointValidationResult && this.lastCheckpointValidationResult.archive.equals(proposal.archive) && this.lastCheckpointValidationResult.slotNumber === slot) {
|
|
674
|
+
this.log.debug(`Returning cached validation result for checkpoint proposal at slot ${slot}`, proposalInfo);
|
|
675
|
+
return this.lastCheckpointValidationResult.result;
|
|
676
|
+
}
|
|
677
|
+
const proposer = proposal.getSender();
|
|
678
|
+
if (!proposer) {
|
|
679
|
+
this.log.warn(`Received checkpoint proposal with invalid signature for slot ${proposal.slotNumber}`);
|
|
680
|
+
const result = {
|
|
681
|
+
isValid: false,
|
|
682
|
+
reason: 'invalid_signature'
|
|
683
|
+
};
|
|
684
|
+
this.lastCheckpointValidationResult = {
|
|
685
|
+
archive: proposal.archive,
|
|
686
|
+
slotNumber: slot,
|
|
687
|
+
result
|
|
688
|
+
};
|
|
689
|
+
return result;
|
|
690
|
+
}
|
|
691
|
+
if (!validateFeeAssetPriceModifier(proposal.feeAssetPriceModifier)) {
|
|
692
|
+
this.log.warn(`Received checkpoint proposal with invalid feeAssetPriceModifier ${proposal.feeAssetPriceModifier} for slot ${proposal.slotNumber}`);
|
|
693
|
+
const result = {
|
|
694
|
+
isValid: false,
|
|
695
|
+
reason: 'invalid_fee_asset_price_modifier'
|
|
696
|
+
};
|
|
697
|
+
this.lastCheckpointValidationResult = {
|
|
698
|
+
archive: proposal.archive,
|
|
699
|
+
slotNumber: slot,
|
|
700
|
+
result
|
|
701
|
+
};
|
|
702
|
+
return result;
|
|
703
|
+
}
|
|
704
|
+
const result = await this.validateCheckpointProposal(proposal, proposalInfo);
|
|
705
|
+
this.lastCheckpointValidationResult = {
|
|
706
|
+
archive: proposal.archive,
|
|
707
|
+
slotNumber: slot,
|
|
708
|
+
result
|
|
709
|
+
};
|
|
710
|
+
// Upload blobs to filestore if validation passed (fire and forget)
|
|
711
|
+
if (result.isValid) {
|
|
712
|
+
this.tryUploadBlobsForCheckpoint(proposal, proposalInfo);
|
|
713
|
+
}
|
|
714
|
+
return result;
|
|
715
|
+
}
|
|
716
|
+
/**
|
|
717
|
+
* Validates a checkpoint proposal by building the full checkpoint and comparing it with the proposal.
|
|
718
|
+
* @returns Validation result with isValid flag and reason if invalid.
|
|
719
|
+
*/ async validateCheckpointProposal(proposal, proposalInfo) {
|
|
720
|
+
const env = {
|
|
721
|
+
stack: [],
|
|
722
|
+
error: void 0,
|
|
723
|
+
hasError: false
|
|
724
|
+
};
|
|
725
|
+
try {
|
|
726
|
+
const slot = proposal.slotNumber;
|
|
727
|
+
// Timeout block syncing at the start of the next slot
|
|
728
|
+
const config = this.checkpointsBuilder.getConfig();
|
|
729
|
+
const nextSlotTimestampSeconds = Number(getTimestampForSlot(SlotNumber(slot + 1), config));
|
|
730
|
+
const timeoutSeconds = Math.max(1, nextSlotTimestampSeconds - Math.floor(this.dateProvider.now() / 1000));
|
|
731
|
+
// Wait for last block to sync by archive
|
|
732
|
+
let lastBlockHeader;
|
|
733
|
+
try {
|
|
734
|
+
lastBlockHeader = await retryUntil(async ()=>{
|
|
735
|
+
await this.blockSource.syncImmediate();
|
|
736
|
+
return this.blockSource.getBlockHeaderByArchive(proposal.archive);
|
|
737
|
+
}, `waiting for block with archive ${proposal.archive.toString()} for slot ${slot}`, timeoutSeconds, 0.5);
|
|
738
|
+
} catch (err) {
|
|
739
|
+
if (err instanceof TimeoutError) {
|
|
740
|
+
this.log.warn(`Timed out waiting for block with archive matching checkpoint proposal`, proposalInfo);
|
|
741
|
+
return {
|
|
742
|
+
isValid: false,
|
|
743
|
+
reason: 'last_block_not_found'
|
|
744
|
+
};
|
|
745
|
+
}
|
|
746
|
+
this.log.error(`Error fetching last block for checkpoint proposal`, err, proposalInfo);
|
|
747
|
+
return {
|
|
748
|
+
isValid: false,
|
|
749
|
+
reason: 'block_fetch_error'
|
|
750
|
+
};
|
|
751
|
+
}
|
|
752
|
+
if (!lastBlockHeader) {
|
|
753
|
+
this.log.warn(`Last block not found for checkpoint proposal`, proposalInfo);
|
|
754
|
+
return {
|
|
755
|
+
isValid: false,
|
|
756
|
+
reason: 'last_block_not_found'
|
|
757
|
+
};
|
|
758
|
+
}
|
|
759
|
+
// Get all full blocks for the slot and checkpoint
|
|
760
|
+
const blocks = await this.blockSource.getBlocksForSlot(slot);
|
|
761
|
+
if (blocks.length === 0) {
|
|
762
|
+
this.log.warn(`No blocks found for slot ${slot}`, proposalInfo);
|
|
763
|
+
return {
|
|
764
|
+
isValid: false,
|
|
765
|
+
reason: 'no_blocks_for_slot'
|
|
766
|
+
};
|
|
767
|
+
}
|
|
768
|
+
// Ensure the last block for this slot matches the archive in the checkpoint proposal
|
|
769
|
+
if (!blocks.at(-1)?.archive.root.equals(proposal.archive)) {
|
|
770
|
+
this.log.warn(`Last block archive mismatch for checkpoint proposal`, proposalInfo);
|
|
771
|
+
return {
|
|
772
|
+
isValid: false,
|
|
773
|
+
reason: 'last_block_archive_mismatch'
|
|
774
|
+
};
|
|
775
|
+
}
|
|
776
|
+
this.log.debug(`Found ${blocks.length} blocks for slot ${slot}`, {
|
|
777
|
+
...proposalInfo,
|
|
778
|
+
blockNumbers: blocks.map((b)=>b.number)
|
|
779
|
+
});
|
|
780
|
+
// Get checkpoint constants from first block
|
|
781
|
+
const firstBlock = blocks[0];
|
|
782
|
+
const constants = this.extractCheckpointConstants(firstBlock);
|
|
783
|
+
const checkpointNumber = firstBlock.checkpointNumber;
|
|
784
|
+
// Get L1-to-L2 messages for this checkpoint
|
|
785
|
+
const l1ToL2Messages = await this.l1ToL2MessageSource.getL1ToL2Messages(checkpointNumber);
|
|
786
|
+
// Collect the out hashes of all the checkpoints before this one in the same epoch
|
|
787
|
+
const epoch = getEpochAtSlot(slot, this.epochCache.getL1Constants());
|
|
788
|
+
const previousCheckpointOutHashes = (await this.blockSource.getCheckpointsDataForEpoch(epoch)).filter((c)=>c.checkpointNumber < checkpointNumber).map((c)=>c.checkpointOutHash);
|
|
789
|
+
// Fork world state at the block before the first block
|
|
790
|
+
const parentBlockNumber = BlockNumber(firstBlock.number - 1);
|
|
791
|
+
const fork = _ts_add_disposable_resource(env, await this.checkpointsBuilder.getFork(parentBlockNumber), true);
|
|
792
|
+
// Create checkpoint builder with all existing blocks
|
|
793
|
+
const checkpointBuilder = await this.checkpointsBuilder.openCheckpoint(checkpointNumber, constants, proposal.feeAssetPriceModifier, l1ToL2Messages, previousCheckpointOutHashes, fork, blocks, this.log.getBindings());
|
|
794
|
+
// Complete the checkpoint to get computed values
|
|
795
|
+
const computedCheckpoint = await checkpointBuilder.completeCheckpoint();
|
|
796
|
+
// Compare checkpoint header with proposal
|
|
797
|
+
if (!computedCheckpoint.header.equals(proposal.checkpointHeader)) {
|
|
798
|
+
this.log.warn(`Checkpoint header mismatch`, {
|
|
799
|
+
...proposalInfo,
|
|
800
|
+
computed: computedCheckpoint.header.toInspect(),
|
|
801
|
+
proposal: proposal.checkpointHeader.toInspect()
|
|
802
|
+
});
|
|
803
|
+
return {
|
|
804
|
+
isValid: false,
|
|
805
|
+
reason: 'checkpoint_header_mismatch'
|
|
806
|
+
};
|
|
807
|
+
}
|
|
808
|
+
// Compare archive root with proposal
|
|
809
|
+
if (!computedCheckpoint.archive.root.equals(proposal.archive)) {
|
|
810
|
+
this.log.warn(`Archive root mismatch`, {
|
|
811
|
+
...proposalInfo,
|
|
812
|
+
computed: computedCheckpoint.archive.root.toString(),
|
|
813
|
+
proposal: proposal.archive.toString()
|
|
814
|
+
});
|
|
815
|
+
return {
|
|
816
|
+
isValid: false,
|
|
817
|
+
reason: 'archive_mismatch'
|
|
818
|
+
};
|
|
819
|
+
}
|
|
820
|
+
// Check that the accumulated epoch out hash matches the value in the proposal.
|
|
821
|
+
// The epoch out hash is the accumulated hash of all checkpoint out hashes in the epoch.
|
|
822
|
+
const checkpointOutHash = computedCheckpoint.getCheckpointOutHash();
|
|
823
|
+
const computedEpochOutHash = accumulateCheckpointOutHashes([
|
|
824
|
+
...previousCheckpointOutHashes,
|
|
825
|
+
checkpointOutHash
|
|
826
|
+
]);
|
|
827
|
+
const proposalEpochOutHash = proposal.checkpointHeader.epochOutHash;
|
|
828
|
+
if (!computedEpochOutHash.equals(proposalEpochOutHash)) {
|
|
829
|
+
this.log.warn(`Epoch out hash mismatch`, {
|
|
830
|
+
proposalEpochOutHash: proposalEpochOutHash.toString(),
|
|
831
|
+
computedEpochOutHash: computedEpochOutHash.toString(),
|
|
832
|
+
checkpointOutHash: checkpointOutHash.toString(),
|
|
833
|
+
previousCheckpointOutHashes: previousCheckpointOutHashes.map((h)=>h.toString()),
|
|
834
|
+
...proposalInfo
|
|
835
|
+
});
|
|
836
|
+
return {
|
|
837
|
+
isValid: false,
|
|
838
|
+
reason: 'out_hash_mismatch'
|
|
839
|
+
};
|
|
840
|
+
}
|
|
841
|
+
// Final round of validations on the checkpoint, just in case.
|
|
842
|
+
try {
|
|
843
|
+
validateCheckpoint(computedCheckpoint, {
|
|
844
|
+
rollupManaLimit: this.checkpointsBuilder.getConfig().rollupManaLimit,
|
|
845
|
+
maxDABlockGas: this.config.validateMaxDABlockGas,
|
|
846
|
+
maxL2BlockGas: this.config.validateMaxL2BlockGas,
|
|
847
|
+
maxTxsPerBlock: this.config.validateMaxTxsPerBlock,
|
|
848
|
+
maxTxsPerCheckpoint: this.config.validateMaxTxsPerCheckpoint
|
|
849
|
+
});
|
|
850
|
+
} catch (err) {
|
|
851
|
+
this.log.warn(`Checkpoint validation failed: ${err}`, proposalInfo);
|
|
852
|
+
return {
|
|
853
|
+
isValid: false,
|
|
854
|
+
reason: 'checkpoint_validation_failed'
|
|
855
|
+
};
|
|
856
|
+
}
|
|
857
|
+
this.log.verbose(`Checkpoint proposal validation successful for slot ${slot}`, proposalInfo);
|
|
858
|
+
return {
|
|
859
|
+
isValid: true
|
|
860
|
+
};
|
|
861
|
+
} catch (e) {
|
|
862
|
+
env.error = e;
|
|
863
|
+
env.hasError = true;
|
|
864
|
+
} finally{
|
|
865
|
+
const result = _ts_dispose_resources(env);
|
|
866
|
+
if (result) await result;
|
|
867
|
+
}
|
|
868
|
+
}
|
|
869
|
+
/** Extracts checkpoint global variables from a block. */ extractCheckpointConstants(block) {
|
|
870
|
+
const gv = block.header.globalVariables;
|
|
871
|
+
return {
|
|
872
|
+
chainId: gv.chainId,
|
|
873
|
+
version: gv.version,
|
|
874
|
+
slotNumber: gv.slotNumber,
|
|
875
|
+
timestamp: gv.timestamp,
|
|
876
|
+
coinbase: gv.coinbase,
|
|
877
|
+
feeRecipient: gv.feeRecipient,
|
|
878
|
+
gasFees: gv.gasFees
|
|
879
|
+
};
|
|
880
|
+
}
|
|
881
|
+
/** Triggers blob upload for a checkpoint if the blob client can upload (fire and forget). */ tryUploadBlobsForCheckpoint(proposal, proposalInfo) {
|
|
882
|
+
if (this.blobClient.canUpload()) {
|
|
883
|
+
void this.uploadBlobsForCheckpoint(proposal, proposalInfo);
|
|
884
|
+
}
|
|
885
|
+
}
|
|
886
|
+
/** Uploads blobs for a checkpoint to the filestore. */ async uploadBlobsForCheckpoint(proposal, proposalInfo) {
|
|
887
|
+
try {
|
|
888
|
+
const lastBlockHeader = await this.blockSource.getBlockHeaderByArchive(proposal.archive);
|
|
889
|
+
if (!lastBlockHeader) {
|
|
890
|
+
this.log.warn(`Failed to get last block header for blob upload`, proposalInfo);
|
|
891
|
+
return;
|
|
892
|
+
}
|
|
893
|
+
const blocks = await this.blockSource.getBlocksForSlot(proposal.slotNumber);
|
|
894
|
+
if (blocks.length === 0) {
|
|
895
|
+
this.log.warn(`No blocks found for blob upload`, proposalInfo);
|
|
896
|
+
return;
|
|
897
|
+
}
|
|
898
|
+
const blockBlobData = blocks.map((b)=>b.toBlockBlobData());
|
|
899
|
+
const blobFields = encodeCheckpointBlobDataFromBlocks(blockBlobData);
|
|
900
|
+
const blobs = await getBlobsPerL1Block(blobFields);
|
|
901
|
+
await this.blobClient.sendBlobsToFilestore(blobs);
|
|
902
|
+
this.log.debug(`Uploaded ${blobs.length} blobs to filestore for checkpoint at slot ${proposal.slotNumber}`, {
|
|
903
|
+
...proposalInfo,
|
|
904
|
+
numBlobs: blobs.length
|
|
905
|
+
});
|
|
906
|
+
} catch (err) {
|
|
907
|
+
this.log.warn(`Failed to upload blobs for checkpoint: ${err}`, proposalInfo);
|
|
908
|
+
}
|
|
909
|
+
}
|
|
910
|
+
/**
|
|
911
|
+
* Derives proposed checkpoint data from validated blocks and sets it on the archiver.
|
|
912
|
+
* Used after successful validation of a foreign proposal.
|
|
913
|
+
* Does not retry since we already waited for the block during validation.
|
|
914
|
+
*/ async setProposedCheckpointFromValidation(proposal) {
|
|
915
|
+
if (!this.archiver) {
|
|
916
|
+
return;
|
|
917
|
+
}
|
|
918
|
+
const blockData = await this.blockSource.getBlockDataByArchive(proposal.archive);
|
|
919
|
+
if (!blockData) {
|
|
920
|
+
this.log.debug(`Block data not found for checkpoint proposal archive, cannot set proposed checkpoint`, {
|
|
921
|
+
archive: proposal.archive.toString()
|
|
922
|
+
});
|
|
923
|
+
return;
|
|
924
|
+
}
|
|
925
|
+
await this.archiver.setProposedCheckpoint({
|
|
926
|
+
header: proposal.checkpointHeader,
|
|
927
|
+
checkpointNumber: blockData.checkpointNumber,
|
|
928
|
+
startBlock: BlockNumber(blockData.header.getBlockNumber() - blockData.indexWithinCheckpoint),
|
|
929
|
+
blockCount: blockData.indexWithinCheckpoint + 1,
|
|
930
|
+
totalManaUsed: proposal.checkpointHeader.totalManaUsed.toBigInt(),
|
|
931
|
+
feeAssetPriceModifier: proposal.feeAssetPriceModifier
|
|
932
|
+
});
|
|
933
|
+
}
|
|
934
|
+
/**
|
|
935
|
+
* Sets proposed checkpoint from blocks for own proposals (skips full validation).
|
|
936
|
+
* Retries fetching block data since the checkpoint proposal often arrives before the last block
|
|
937
|
+
* finishes re-execution.
|
|
938
|
+
*/ async setProposedCheckpointFromBlocks(proposal) {
|
|
939
|
+
if (!this.archiver) {
|
|
940
|
+
return;
|
|
941
|
+
}
|
|
942
|
+
let blockData = await this.blockSource.getBlockDataByArchive(proposal.archive);
|
|
943
|
+
if (!blockData) {
|
|
944
|
+
// The checkpoint proposal often arrives before the last block finishes re-execution.
|
|
945
|
+
// Retry until we find the data or give up at the end of the slot.
|
|
946
|
+
const nextSlot = this.epochCache.getSlotNow() + 1;
|
|
947
|
+
const timeOfNextSlot = getTimestampForSlot(SlotNumber(nextSlot), await this.archiver.getL1Constants());
|
|
948
|
+
const timeoutSeconds = Math.max(1, Number(timeOfNextSlot) - Math.floor(this.dateProvider.now() / 1000));
|
|
949
|
+
blockData = await retryUntil(()=>this.blockSource.getBlockDataByArchive(proposal.archive), 'block data for own checkpoint proposal', timeoutSeconds, 0.25).catch(()=>undefined);
|
|
950
|
+
}
|
|
951
|
+
if (blockData) {
|
|
952
|
+
await this.archiver.setProposedCheckpoint({
|
|
953
|
+
header: proposal.checkpointHeader,
|
|
954
|
+
checkpointNumber: blockData.checkpointNumber,
|
|
955
|
+
startBlock: BlockNumber(blockData.header.getBlockNumber() - blockData.indexWithinCheckpoint),
|
|
956
|
+
blockCount: blockData.indexWithinCheckpoint + 1,
|
|
957
|
+
totalManaUsed: proposal.checkpointHeader.totalManaUsed.toBigInt(),
|
|
958
|
+
feeAssetPriceModifier: proposal.feeAssetPriceModifier
|
|
959
|
+
});
|
|
960
|
+
} else {
|
|
961
|
+
this.log.debug(`Block data not found for own checkpoint proposal archive, cannot set proposed checkpoint`, {
|
|
962
|
+
archive: proposal.archive.toString()
|
|
963
|
+
});
|
|
964
|
+
}
|
|
965
|
+
}
|
|
614
966
|
}
|
package/dest/validator.d.ts
CHANGED
|
@@ -11,8 +11,8 @@ import type { P2P, PeerId } from '@aztec/p2p';
|
|
|
11
11
|
import { type Watcher, type WatcherEmitter } from '@aztec/slasher';
|
|
12
12
|
import type { AztecAddress } from '@aztec/stdlib/aztec-address';
|
|
13
13
|
import type { CommitteeAttestationsAndSigners, L2BlockSink, L2BlockSource } from '@aztec/stdlib/block';
|
|
14
|
-
import type {
|
|
15
|
-
import {
|
|
14
|
+
import type { ITxProvider, Validator, ValidatorClientFullConfig, WorldStateSynchronizer } from '@aztec/stdlib/interfaces/server';
|
|
15
|
+
import type { L1ToL2MessageSource } from '@aztec/stdlib/messaging';
|
|
16
16
|
import { type BlockProposal, type BlockProposalOptions, type CheckpointAttestation, CheckpointProposal, type CheckpointProposalCore, type CheckpointProposalOptions } from '@aztec/stdlib/p2p';
|
|
17
17
|
import type { CheckpointHeader } from '@aztec/stdlib/rollup';
|
|
18
18
|
import type { BlockHeader, Tx } from '@aztec/stdlib/tx';
|
|
@@ -20,9 +20,9 @@ import { type TelemetryClient, type Tracer } from '@aztec/telemetry-client';
|
|
|
20
20
|
import { type SigningContext, type SlashingProtectionDatabase } from '@aztec/validator-ha-signer/types';
|
|
21
21
|
import type { ValidatorHASigner } from '@aztec/validator-ha-signer/validator-ha-signer';
|
|
22
22
|
import type { TypedDataDefinition } from 'viem';
|
|
23
|
-
import { BlockProposalHandler } from './block_proposal_handler.js';
|
|
24
23
|
import type { FullNodeCheckpointsBuilder } from './checkpoint_builder.js';
|
|
25
24
|
import type { ExtendedValidatorKeyStore } from './key_store/interface.js';
|
|
25
|
+
import { ProposalHandler } from './proposal_handler.js';
|
|
26
26
|
declare const ValidatorClient_base: new () => WatcherEmitter;
|
|
27
27
|
/**
|
|
28
28
|
* Validator Client
|
|
@@ -31,7 +31,7 @@ export declare class ValidatorClient extends ValidatorClient_base implements Val
|
|
|
31
31
|
private keyStore;
|
|
32
32
|
private epochCache;
|
|
33
33
|
private p2pClient;
|
|
34
|
-
private
|
|
34
|
+
private proposalHandler;
|
|
35
35
|
private blockSource;
|
|
36
36
|
private checkpointsBuilder;
|
|
37
37
|
private worldState;
|
|
@@ -56,12 +56,12 @@ export declare class ValidatorClient extends ValidatorClient_base implements Val
|
|
|
56
56
|
private proposersOfInvalidBlocks;
|
|
57
57
|
/** Tracks the last checkpoint proposal we attested to, to prevent equivocation. */
|
|
58
58
|
private lastAttestedProposal?;
|
|
59
|
-
protected constructor(keyStore: ExtendedValidatorKeyStore, epochCache: EpochCache, p2pClient: P2P,
|
|
59
|
+
protected constructor(keyStore: ExtendedValidatorKeyStore, epochCache: EpochCache, p2pClient: P2P, proposalHandler: ProposalHandler, blockSource: L2BlockSource, checkpointsBuilder: FullNodeCheckpointsBuilder, worldState: WorldStateSynchronizer, l1ToL2MessageSource: L1ToL2MessageSource, config: ValidatorClientFullConfig, blobClient: BlobClientInterface, slashingProtectionSigner: ValidatorHASigner, dateProvider?: DateProvider, telemetry?: TelemetryClient, log?: Logger);
|
|
60
60
|
static validateKeyStoreConfiguration(keyStoreManager: KeystoreManager, logger?: Logger): void;
|
|
61
61
|
private handleEpochCommitteeUpdate;
|
|
62
62
|
static new(config: ValidatorClientFullConfig, checkpointsBuilder: FullNodeCheckpointsBuilder, worldState: WorldStateSynchronizer, epochCache: EpochCache, p2pClient: P2P, blockSource: L2BlockSource & L2BlockSink, l1ToL2MessageSource: L1ToL2MessageSource, txProvider: ITxProvider, keyStoreManager: KeystoreManager, blobClient: BlobClientInterface, dateProvider?: DateProvider, telemetry?: TelemetryClient, slashingProtectionDb?: SlashingProtectionDatabase): Promise<ValidatorClient>;
|
|
63
63
|
getValidatorAddresses(): EthAddress[];
|
|
64
|
-
|
|
64
|
+
getProposalHandler(): ProposalHandler;
|
|
65
65
|
signWithAddress(addr: EthAddress, msg: TypedDataDefinition, context: SigningContext): Promise<Signature>;
|
|
66
66
|
getCoinbaseForAttestor(attestor: EthAddress): EthAddress;
|
|
67
67
|
getFeeRecipientForAttestor(attestor: EthAddress): AztecAddress;
|
|
@@ -91,11 +91,6 @@ export declare class ValidatorClient extends ValidatorClient_base implements Val
|
|
|
91
91
|
*/
|
|
92
92
|
private shouldAttestToSlot;
|
|
93
93
|
private createCheckpointAttestationsFromProposal;
|
|
94
|
-
private validateCheckpointProposal;
|
|
95
|
-
/**
|
|
96
|
-
* Extract checkpoint global variables from a block.
|
|
97
|
-
*/
|
|
98
|
-
private extractCheckpointConstants;
|
|
99
94
|
/**
|
|
100
95
|
* Uploads blobs for a checkpoint to the filestore (fire and forget).
|
|
101
96
|
*/
|
|
@@ -112,7 +107,7 @@ export declare class ValidatorClient extends ValidatorClient_base implements Val
|
|
|
112
107
|
*/
|
|
113
108
|
private handleDuplicateAttestation;
|
|
114
109
|
createBlockProposal(blockHeader: BlockHeader, indexWithinCheckpoint: IndexWithinCheckpoint, inHash: Fr, archive: Fr, txs: Tx[], proposerAddress: EthAddress | undefined, options?: BlockProposalOptions): Promise<BlockProposal>;
|
|
115
|
-
createCheckpointProposal(checkpointHeader: CheckpointHeader, archive: Fr, feeAssetPriceModifier: bigint,
|
|
110
|
+
createCheckpointProposal(checkpointHeader: CheckpointHeader, archive: Fr, feeAssetPriceModifier: bigint, lastBlockProposal: BlockProposal | undefined, proposerAddress: EthAddress | undefined, options?: CheckpointProposalOptions): Promise<CheckpointProposal>;
|
|
116
111
|
broadcastBlockProposal(proposal: BlockProposal): Promise<void>;
|
|
117
112
|
signAttestationsAndSigners(attestationsAndSigners: CommitteeAttestationsAndSigners, proposer: EthAddress, slot: SlotNumber, blockNumber: BlockNumber | CheckpointNumber): Promise<Signature>;
|
|
118
113
|
collectOwnAttestations(proposal: CheckpointProposal): Promise<CheckpointAttestation[]>;
|
|
@@ -120,4 +115,4 @@ export declare class ValidatorClient extends ValidatorClient_base implements Val
|
|
|
120
115
|
private handleAuthRequest;
|
|
121
116
|
}
|
|
122
117
|
export {};
|
|
123
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
118
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoidmFsaWRhdG9yLmQudHMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi9zcmMvdmFsaWRhdG9yLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBLE9BQU8sS0FBSyxFQUFFLG1CQUFtQixFQUFFLE1BQU0sMkJBQTJCLENBQUM7QUFFckUsT0FBTyxLQUFLLEVBQUUsVUFBVSxFQUFFLE1BQU0sb0JBQW9CLENBQUM7QUFDckQsT0FBTyxFQUNMLFdBQVcsRUFDWCxnQkFBZ0IsRUFFaEIscUJBQXFCLEVBQ3JCLFVBQVUsRUFDWCxNQUFNLGlDQUFpQyxDQUFDO0FBQ3pDLE9BQU8sRUFBRSxFQUFFLEVBQUUsTUFBTSxnQ0FBZ0MsQ0FBQztBQUNwRCxPQUFPLEtBQUssRUFBRSxVQUFVLEVBQUUsTUFBTSwrQkFBK0IsQ0FBQztBQUNoRSxPQUFPLEtBQUssRUFBRSxTQUFTLEVBQUUsTUFBTSxpQ0FBaUMsQ0FBQztBQUNqRSxPQUFPLEVBQUUsS0FBSyxPQUFPLEVBQUUsS0FBSyxNQUFNLEVBQWdCLE1BQU0sdUJBQXVCLENBQUM7QUFHaEYsT0FBTyxFQUFFLFlBQVksRUFBRSxNQUFNLHlCQUF5QixDQUFDO0FBQ3ZELE9BQU8sS0FBSyxFQUFFLGVBQWUsRUFBRSxNQUFNLHNCQUFzQixDQUFDO0FBQzVELE9BQU8sS0FBSyxFQUFtRCxHQUFHLEVBQUUsTUFBTSxFQUFFLE1BQU0sWUFBWSxDQUFDO0FBRS9GLE9BQU8sRUFBb0MsS0FBSyxPQUFPLEVBQUUsS0FBSyxjQUFjLEVBQUUsTUFBTSxnQkFBZ0IsQ0FBQztBQUNyRyxPQUFPLEtBQUssRUFBRSxZQUFZLEVBQUUsTUFBTSw2QkFBNkIsQ0FBQztBQUNoRSxPQUFPLEtBQUssRUFBRSwrQkFBK0IsRUFBRSxXQUFXLEVBQUUsYUFBYSxFQUFFLE1BQU0scUJBQXFCLENBQUM7QUFFdkcsT0FBTyxLQUFLLEVBQ1YsV0FBVyxFQUNYLFNBQVMsRUFDVCx5QkFBeUIsRUFDekIsc0JBQXNCLEVBQ3ZCLE1BQU0saUNBQWlDLENBQUM7QUFDekMsT0FBTyxLQUFLLEVBQUUsbUJBQW1CLEVBQUUsTUFBTSx5QkFBeUIsQ0FBQztBQUNuRSxPQUFPLEVBQ0wsS0FBSyxhQUFhLEVBQ2xCLEtBQUssb0JBQW9CLEVBQ3pCLEtBQUsscUJBQXFCLEVBQzFCLGtCQUFrQixFQUNsQixLQUFLLHNCQUFzQixFQUMzQixLQUFLLHlCQUF5QixFQUMvQixNQUFNLG1CQUFtQixDQUFDO0FBQzNCLE9BQU8sS0FBSyxFQUFFLGdCQUFnQixFQUFFLE1BQU0sc0JBQXNCLENBQUM7QUFDN0QsT0FBTyxLQUFLLEVBQUUsV0FBVyxFQUFFLEVBQUUsRUFBRSxNQUFNLGtCQUFrQixDQUFDO0FBRXhELE9BQU8sRUFBRSxLQUFLLGVBQWUsRUFBRSxLQUFLLE1BQU0sRUFBc0IsTUFBTSx5QkFBeUIsQ0FBQztBQU1oRyxPQUFPLEVBQVksS0FBSyxjQUFjLEVBQUUsS0FBSywwQkFBMEIsRUFBRSxNQUFNLGtDQUFrQyxDQUFDO0FBQ2xILE9BQU8sS0FBSyxFQUFFLGlCQUFpQixFQUFFLE1BQU0sZ0RBQWdELENBQUM7QUFHeEYsT0FBTyxLQUFLLEVBQUUsbUJBQW1CLEVBQUUsTUFBTSxNQUFNLENBQUM7QUFFaEQsT0FBTyxLQUFLLEVBQUUsMEJBQTBCLEVBQUUsTUFBTSx5QkFBeUIsQ0FBQztBQUcxRSxPQUFPLEtBQUssRUFBRSx5QkFBeUIsRUFBRSxNQUFNLDBCQUEwQixDQUFDO0FBRzFFLE9BQU8sRUFBNkMsZUFBZSxFQUFFLE1BQU0sdUJBQXVCLENBQUM7O0FBWW5HOztHQUVHO0FBQ0gscUJBQWEsZUFBZ0IsU0FBUSxvQkFBMkMsWUFBVyxTQUFTLEVBQUUsT0FBTztJQXlCekcsT0FBTyxDQUFDLFFBQVE7SUFDaEIsT0FBTyxDQUFDLFVBQVU7SUFDbEIsT0FBTyxDQUFDLFNBQVM7SUFDakIsT0FBTyxDQUFDLGVBQWU7SUFDdkIsT0FBTyxDQUFDLFdBQVc7SUFDbkIsT0FBTyxDQUFDLGtCQUFrQjtJQUMxQixPQUFPLENBQUMsVUFBVTtJQUNsQixPQUFPLENBQUMsbUJBQW1CO0lBQzNCLE9BQU8sQ0FBQyxNQUFNO0lBQ2QsT0FBTyxDQUFDLFVBQVU7SUFDbEIsT0FBTyxDQUFDLHdCQUF3QjtJQUNoQyxPQUFPLENBQUMsWUFBWTtJQW5DdEIsU0FBZ0IsTUFBTSxFQUFFLE1BQU0sQ0FBQztJQUMvQixPQUFPLENBQUMsaUJBQWlCLENBQW9CO0lBQzdDLE9BQU8sQ0FBQyxPQUFPLENBQW1CO0lBQ2xDLE9BQU8sQ0FBQyxHQUFHLENBQVM7SUFFcEIsT0FBTyxDQUFDLHFCQUFxQixDQUFTO0lBRXRDLHdGQUF3RjtJQUN4RixPQUFPLENBQUMsaUJBQWlCLENBQUMsQ0FBZ0I7SUFFMUMsc0RBQXNEO0lBQ3RELE9BQU8sQ0FBQyxzQkFBc0IsQ0FBQyxDQUFxQjtJQUVwRCxPQUFPLENBQUMsK0JBQStCLENBQTBCO0lBQ2pFLE9BQU8sQ0FBQyxvQkFBb0IsQ0FBaUI7SUFDN0Msb0dBQW9HO0lBQ3BHLE9BQU8sQ0FBQywyQkFBMkIsQ0FBdUM7SUFFMUUsT0FBTyxDQUFDLHdCQUF3QixDQUEwQjtJQUUxRCxtRkFBbUY7SUFDbkYsT0FBTyxDQUFDLG9CQUFvQixDQUFDLENBQXlCO0lBRXRELFNBQVMsYUFDQyxRQUFRLEVBQUUseUJBQXlCLEVBQ25DLFVBQVUsRUFBRSxVQUFVLEVBQ3RCLFNBQVMsRUFBRSxHQUFHLEVBQ2QsZUFBZSxFQUFFLGVBQWUsRUFDaEMsV0FBVyxFQUFFLGFBQWEsRUFDMUIsa0JBQWtCLEVBQUUsMEJBQTBCLEVBQzlDLFVBQVUsRUFBRSxzQkFBc0IsRUFDbEMsbUJBQW1CLEVBQUUsbUJBQW1CLEVBQ3hDLE1BQU0sRUFBRSx5QkFBeUIsRUFDakMsVUFBVSxFQUFFLG1CQUFtQixFQUMvQix3QkFBd0IsRUFBRSxpQkFBaUIsRUFDM0MsWUFBWSxHQUFFLFlBQWlDLEVBQ3ZELFNBQVMsR0FBRSxlQUFzQyxFQUNqRCxHQUFHLFNBQTRCLEVBaUJoQztJQUVELE9BQWMsNkJBQTZCLENBQUMsZUFBZSxFQUFFLGVBQWUsRUFBRSxNQUFNLENBQUMsRUFBRSxNQUFNLFFBdUI1RjtZQUVhLDBCQUEwQjtJQTRCeEMsT0FBYSxHQUFHLENBQ2QsTUFBTSxFQUFFLHlCQUF5QixFQUNqQyxrQkFBa0IsRUFBRSwwQkFBMEIsRUFDOUMsVUFBVSxFQUFFLHNCQUFzQixFQUNsQyxVQUFVLEVBQUUsVUFBVSxFQUN0QixTQUFTLEVBQUUsR0FBRyxFQUNkLFdBQVcsRUFBRSxhQUFhLEdBQUcsV0FBVyxFQUN4QyxtQkFBbUIsRUFBRSxtQkFBbUIsRUFDeEMsVUFBVSxFQUFFLFdBQVcsRUFDdkIsZUFBZSxFQUFFLGVBQWUsRUFDaEMsVUFBVSxFQUFFLG1CQUFtQixFQUMvQixZQUFZLEdBQUUsWUFBaUMsRUFDL0MsU0FBUyxHQUFFLGVBQXNDLEVBQ2pELG9CQUFvQixDQUFDLEVBQUUsMEJBQTBCLDRCQW9FbEQ7SUFFTSxxQkFBcUIsaUJBSTNCO0lBRU0sa0JBQWtCLG9CQUV4QjtJQUVNLGVBQWUsQ0FBQyxJQUFJLEVBQUUsVUFBVSxFQUFFLEdBQUcsRUFBRSxtQkFBbUIsRUFBRSxPQUFPLEVBQUUsY0FBYyxzQkFFekY7SUFFTSxzQkFBc0IsQ0FBQyxRQUFRLEVBQUUsVUFBVSxHQUFHLFVBQVUsQ0FFOUQ7SUFFTSwwQkFBMEIsQ0FBQyxRQUFRLEVBQUUsVUFBVSxHQUFHLFlBQVksQ0FFcEU7SUFFTSxTQUFTLElBQUkseUJBQXlCLENBRTVDO0lBRU0sWUFBWSxDQUFDLE1BQU0sRUFBRSxPQUFPLENBQUMseUJBQXlCLENBQUMsUUFFN0Q7SUFFTSxjQUFjLENBQUMsVUFBVSxFQUFFLGVBQWUsR0FBRyxJQUFJLENBSXZEO0lBRVksS0FBSyxrQkFtQmpCO0lBRVksSUFBSSxrQkFHaEI7SUFFRCwwQ0FBMEM7SUFDN0IsZ0JBQWdCLGtCQWtDNUI7SUFFRDs7OztPQUlHO0lBQ0cscUJBQXFCLENBQUMsUUFBUSxFQUFFLGFBQWEsRUFBRSxjQUFjLEVBQUUsTUFBTSxHQUFHLE9BQU8sQ0FBQyxPQUFPLENBQUMsQ0FpRzdGO0lBRUQ7Ozs7O09BS0c7SUFDRywwQkFBMEIsQ0FDOUIsUUFBUSxFQUFFLHNCQUFzQixFQUNoQyxlQUFlLEVBQUUsTUFBTSxHQUN0QixPQUFPLENBQUMscUJBQXFCLEVBQUUsR0FBRyxTQUFTLENBQUMsQ0FxRzlDO0lBRUQ7OztPQUdHO0lBQ0gsT0FBTyxDQUFDLGtCQUFrQjtZQWlCWix3Q0FBd0M7SUFrQnREOztPQUVHO0lBQ0gsVUFBZ0Isd0JBQXdCLENBQUMsUUFBUSxFQUFFLHNCQUFzQixFQUFFLFlBQVksRUFBRSxPQUFPLEdBQUcsT0FBTyxDQUFDLElBQUksQ0FBQyxDQXdCL0c7SUFFRCxPQUFPLENBQUMsaUJBQWlCO0lBMkJ6Qjs7O09BR0c7SUFDSCxPQUFPLENBQUMsdUJBQXVCO0lBb0IvQjs7O09BR0c7SUFDSCxPQUFPLENBQUMsMEJBQTBCO0lBa0I1QixtQkFBbUIsQ0FDdkIsV0FBVyxFQUFFLFdBQVcsRUFDeEIscUJBQXFCLEVBQUUscUJBQXFCLEVBQzVDLE1BQU0sRUFBRSxFQUFFLEVBQ1YsT0FBTyxFQUFFLEVBQUUsRUFDWCxHQUFHLEVBQUUsRUFBRSxFQUFFLEVBQ1QsZUFBZSxFQUFFLFVBQVUsR0FBRyxTQUFTLEVBQ3ZDLE9BQU8sR0FBRSxvQkFBeUIsR0FDakMsT0FBTyxDQUFDLGFBQWEsQ0FBQyxDQWdDeEI7SUFFSyx3QkFBd0IsQ0FDNUIsZ0JBQWdCLEVBQUUsZ0JBQWdCLEVBQ2xDLE9BQU8sRUFBRSxFQUFFLEVBQ1gscUJBQXFCLEVBQUUsTUFBTSxFQUM3QixpQkFBaUIsRUFBRSxhQUFhLEdBQUcsU0FBUyxFQUM1QyxlQUFlLEVBQUUsVUFBVSxHQUFHLFNBQVMsRUFDdkMsT0FBTyxHQUFFLHlCQUE4QixHQUN0QyxPQUFPLENBQUMsa0JBQWtCLENBQUMsQ0F5QjdCO0lBRUssc0JBQXNCLENBQUMsUUFBUSxFQUFFLGFBQWEsR0FBRyxPQUFPLENBQUMsSUFBSSxDQUFDLENBRW5FO0lBRUssMEJBQTBCLENBQzlCLHNCQUFzQixFQUFFLCtCQUErQixFQUN2RCxRQUFRLEVBQUUsVUFBVSxFQUNwQixJQUFJLEVBQUUsVUFBVSxFQUNoQixXQUFXLEVBQUUsV0FBVyxHQUFHLGdCQUFnQixHQUMxQyxPQUFPLENBQUMsU0FBUyxDQUFDLENBRXBCO0lBRUssc0JBQXNCLENBQUMsUUFBUSxFQUFFLGtCQUFrQixHQUFHLE9BQU8sQ0FBQyxxQkFBcUIsRUFBRSxDQUFDLENBaUIzRjtJQUVLLG1CQUFtQixDQUN2QixRQUFRLEVBQUUsa0JBQWtCLEVBQzVCLFFBQVEsRUFBRSxNQUFNLEVBQ2hCLFFBQVEsRUFBRSxJQUFJLEdBQ2IsT0FBTyxDQUFDLHFCQUFxQixFQUFFLENBQUMsQ0FpRWxDO1lBRWEsaUJBQWlCO0NBd0JoQyJ9
|
package/dest/validator.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"validator.d.ts","sourceRoot":"","sources":["../src/validator.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,mBAAmB,EAAE,MAAM,2BAA2B,CAAC;AAErE,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,oBAAoB,CAAC;
|
|
1
|
+
{"version":3,"file":"validator.d.ts","sourceRoot":"","sources":["../src/validator.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,mBAAmB,EAAE,MAAM,2BAA2B,CAAC;AAErE,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,oBAAoB,CAAC;AACrD,OAAO,EACL,WAAW,EACX,gBAAgB,EAEhB,qBAAqB,EACrB,UAAU,EACX,MAAM,iCAAiC,CAAC;AACzC,OAAO,EAAE,EAAE,EAAE,MAAM,gCAAgC,CAAC;AACpD,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,+BAA+B,CAAC;AAChE,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,iCAAiC,CAAC;AACjE,OAAO,EAAE,KAAK,OAAO,EAAE,KAAK,MAAM,EAAgB,MAAM,uBAAuB,CAAC;AAGhF,OAAO,EAAE,YAAY,EAAE,MAAM,yBAAyB,CAAC;AACvD,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,sBAAsB,CAAC;AAC5D,OAAO,KAAK,EAAmD,GAAG,EAAE,MAAM,EAAE,MAAM,YAAY,CAAC;AAE/F,OAAO,EAAoC,KAAK,OAAO,EAAE,KAAK,cAAc,EAAE,MAAM,gBAAgB,CAAC;AACrG,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,6BAA6B,CAAC;AAChE,OAAO,KAAK,EAAE,+BAA+B,EAAE,WAAW,EAAE,aAAa,EAAE,MAAM,qBAAqB,CAAC;AAEvG,OAAO,KAAK,EACV,WAAW,EACX,SAAS,EACT,yBAAyB,EACzB,sBAAsB,EACvB,MAAM,iCAAiC,CAAC;AACzC,OAAO,KAAK,EAAE,mBAAmB,EAAE,MAAM,yBAAyB,CAAC;AACnE,OAAO,EACL,KAAK,aAAa,EAClB,KAAK,oBAAoB,EACzB,KAAK,qBAAqB,EAC1B,kBAAkB,EAClB,KAAK,sBAAsB,EAC3B,KAAK,yBAAyB,EAC/B,MAAM,mBAAmB,CAAC;AAC3B,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,sBAAsB,CAAC;AAC7D,OAAO,KAAK,EAAE,WAAW,EAAE,EAAE,EAAE,MAAM,kBAAkB,CAAC;AAExD,OAAO,EAAE,KAAK,eAAe,EAAE,KAAK,MAAM,EAAsB,MAAM,yBAAyB,CAAC;AAMhG,OAAO,EAAY,KAAK,cAAc,EAAE,KAAK,0BAA0B,EAAE,MAAM,kCAAkC,CAAC;AAClH,OAAO,KAAK,EAAE,iBAAiB,EAAE,MAAM,gDAAgD,CAAC;AAGxF,OAAO,KAAK,EAAE,mBAAmB,EAAE,MAAM,MAAM,CAAC;AAEhD,OAAO,KAAK,EAAE,0BAA0B,EAAE,MAAM,yBAAyB,CAAC;AAG1E,OAAO,KAAK,EAAE,yBAAyB,EAAE,MAAM,0BAA0B,CAAC;AAG1E,OAAO,EAA6C,eAAe,EAAE,MAAM,uBAAuB,CAAC;;AAYnG;;GAEG;AACH,qBAAa,eAAgB,SAAQ,oBAA2C,YAAW,SAAS,EAAE,OAAO;IAyBzG,OAAO,CAAC,QAAQ;IAChB,OAAO,CAAC,UAAU;IAClB,OAAO,CAAC,SAAS;IACjB,OAAO,CAAC,eAAe;IACvB,OAAO,CAAC,WAAW;IACnB,OAAO,CAAC,kBAAkB;IAC1B,OAAO,CAAC,UAAU;IAClB,OAAO,CAAC,mBAAmB;IAC3B,OAAO,CAAC,MAAM;IACd,OAAO,CAAC,UAAU;IAClB,OAAO,CAAC,wBAAwB;IAChC,OAAO,CAAC,YAAY;IAnCtB,SAAgB,MAAM,EAAE,MAAM,CAAC;IAC/B,OAAO,CAAC,iBAAiB,CAAoB;IAC7C,OAAO,CAAC,OAAO,CAAmB;IAClC,OAAO,CAAC,GAAG,CAAS;IAEpB,OAAO,CAAC,qBAAqB,CAAS;IAEtC,wFAAwF;IACxF,OAAO,CAAC,iBAAiB,CAAC,CAAgB;IAE1C,sDAAsD;IACtD,OAAO,CAAC,sBAAsB,CAAC,CAAqB;IAEpD,OAAO,CAAC,+BAA+B,CAA0B;IACjE,OAAO,CAAC,oBAAoB,CAAiB;IAC7C,oGAAoG;IACpG,OAAO,CAAC,2BAA2B,CAAuC;IAE1E,OAAO,CAAC,wBAAwB,CAA0B;IAE1D,mFAAmF;IACnF,OAAO,CAAC,oBAAoB,CAAC,CAAyB;IAEtD,SAAS,aACC,QAAQ,EAAE,yBAAyB,EACnC,UAAU,EAAE,UAAU,EACtB,SAAS,EAAE,GAAG,EACd,eAAe,EAAE,eAAe,EAChC,WAAW,EAAE,aAAa,EAC1B,kBAAkB,EAAE,0BAA0B,EAC9C,UAAU,EAAE,sBAAsB,EAClC,mBAAmB,EAAE,mBAAmB,EACxC,MAAM,EAAE,yBAAyB,EACjC,UAAU,EAAE,mBAAmB,EAC/B,wBAAwB,EAAE,iBAAiB,EAC3C,YAAY,GAAE,YAAiC,EACvD,SAAS,GAAE,eAAsC,EACjD,GAAG,SAA4B,EAiBhC;IAED,OAAc,6BAA6B,CAAC,eAAe,EAAE,eAAe,EAAE,MAAM,CAAC,EAAE,MAAM,QAuB5F;YAEa,0BAA0B;IA4BxC,OAAa,GAAG,CACd,MAAM,EAAE,yBAAyB,EACjC,kBAAkB,EAAE,0BAA0B,EAC9C,UAAU,EAAE,sBAAsB,EAClC,UAAU,EAAE,UAAU,EACtB,SAAS,EAAE,GAAG,EACd,WAAW,EAAE,aAAa,GAAG,WAAW,EACxC,mBAAmB,EAAE,mBAAmB,EACxC,UAAU,EAAE,WAAW,EACvB,eAAe,EAAE,eAAe,EAChC,UAAU,EAAE,mBAAmB,EAC/B,YAAY,GAAE,YAAiC,EAC/C,SAAS,GAAE,eAAsC,EACjD,oBAAoB,CAAC,EAAE,0BAA0B,4BAoElD;IAEM,qBAAqB,iBAI3B;IAEM,kBAAkB,oBAExB;IAEM,eAAe,CAAC,IAAI,EAAE,UAAU,EAAE,GAAG,EAAE,mBAAmB,EAAE,OAAO,EAAE,cAAc,sBAEzF;IAEM,sBAAsB,CAAC,QAAQ,EAAE,UAAU,GAAG,UAAU,CAE9D;IAEM,0BAA0B,CAAC,QAAQ,EAAE,UAAU,GAAG,YAAY,CAEpE;IAEM,SAAS,IAAI,yBAAyB,CAE5C;IAEM,YAAY,CAAC,MAAM,EAAE,OAAO,CAAC,yBAAyB,CAAC,QAE7D;IAEM,cAAc,CAAC,UAAU,EAAE,eAAe,GAAG,IAAI,CAIvD;IAEY,KAAK,kBAmBjB;IAEY,IAAI,kBAGhB;IAED,0CAA0C;IAC7B,gBAAgB,kBAkC5B;IAED;;;;OAIG;IACG,qBAAqB,CAAC,QAAQ,EAAE,aAAa,EAAE,cAAc,EAAE,MAAM,GAAG,OAAO,CAAC,OAAO,CAAC,CAiG7F;IAED;;;;;OAKG;IACG,0BAA0B,CAC9B,QAAQ,EAAE,sBAAsB,EAChC,eAAe,EAAE,MAAM,GACtB,OAAO,CAAC,qBAAqB,EAAE,GAAG,SAAS,CAAC,CAqG9C;IAED;;;OAGG;IACH,OAAO,CAAC,kBAAkB;YAiBZ,wCAAwC;IAkBtD;;OAEG;IACH,UAAgB,wBAAwB,CAAC,QAAQ,EAAE,sBAAsB,EAAE,YAAY,EAAE,OAAO,GAAG,OAAO,CAAC,IAAI,CAAC,CAwB/G;IAED,OAAO,CAAC,iBAAiB;IA2BzB;;;OAGG;IACH,OAAO,CAAC,uBAAuB;IAoB/B;;;OAGG;IACH,OAAO,CAAC,0BAA0B;IAkB5B,mBAAmB,CACvB,WAAW,EAAE,WAAW,EACxB,qBAAqB,EAAE,qBAAqB,EAC5C,MAAM,EAAE,EAAE,EACV,OAAO,EAAE,EAAE,EACX,GAAG,EAAE,EAAE,EAAE,EACT,eAAe,EAAE,UAAU,GAAG,SAAS,EACvC,OAAO,GAAE,oBAAyB,GACjC,OAAO,CAAC,aAAa,CAAC,CAgCxB;IAEK,wBAAwB,CAC5B,gBAAgB,EAAE,gBAAgB,EAClC,OAAO,EAAE,EAAE,EACX,qBAAqB,EAAE,MAAM,EAC7B,iBAAiB,EAAE,aAAa,GAAG,SAAS,EAC5C,eAAe,EAAE,UAAU,GAAG,SAAS,EACvC,OAAO,GAAE,yBAA8B,GACtC,OAAO,CAAC,kBAAkB,CAAC,CAyB7B;IAEK,sBAAsB,CAAC,QAAQ,EAAE,aAAa,GAAG,OAAO,CAAC,IAAI,CAAC,CAEnE;IAEK,0BAA0B,CAC9B,sBAAsB,EAAE,+BAA+B,EACvD,QAAQ,EAAE,UAAU,EACpB,IAAI,EAAE,UAAU,EAChB,WAAW,EAAE,WAAW,GAAG,gBAAgB,GAC1C,OAAO,CAAC,SAAS,CAAC,CAEpB;IAEK,sBAAsB,CAAC,QAAQ,EAAE,kBAAkB,GAAG,OAAO,CAAC,qBAAqB,EAAE,CAAC,CAiB3F;IAEK,mBAAmB,CACvB,QAAQ,EAAE,kBAAkB,EAC5B,QAAQ,EAAE,MAAM,EAChB,QAAQ,EAAE,IAAI,GACb,OAAO,CAAC,qBAAqB,EAAE,CAAC,CAiElC;YAEa,iBAAiB;CAwBhC"}
|