@aztec/validator-client 0.0.1-commit.f504929 → 0.0.1-commit.f81dbcf
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +42 -0
- package/dest/block_proposal_handler.d.ts +4 -3
- package/dest/block_proposal_handler.d.ts.map +1 -1
- package/dest/block_proposal_handler.js +106 -30
- package/dest/checkpoint_builder.d.ts +9 -1
- package/dest/checkpoint_builder.d.ts.map +1 -1
- package/dest/checkpoint_builder.js +85 -27
- package/dest/config.d.ts +1 -1
- package/dest/config.d.ts.map +1 -1
- package/dest/config.js +21 -1
- package/dest/duties/validation_service.d.ts +1 -1
- package/dest/duties/validation_service.d.ts.map +1 -1
- package/dest/duties/validation_service.js +3 -9
- package/dest/factory.js +1 -1
- package/dest/key_store/ha_key_store.js +1 -1
- package/dest/validator.d.ts +1 -1
- package/dest/validator.d.ts.map +1 -1
- package/dest/validator.js +23 -11
- package/package.json +19 -19
- package/src/block_proposal_handler.ts +128 -37
- package/src/checkpoint_builder.ts +107 -34
- package/src/config.ts +21 -1
- package/src/duties/validation_service.ts +3 -9
- package/src/factory.ts +1 -1
- package/src/key_store/ha_key_store.ts +1 -1
- package/src/validator.ts +22 -8
|
@@ -1,5 +1,7 @@
|
|
|
1
|
+
import { NUM_CHECKPOINT_END_MARKER_FIELDS, getNumBlockEndBlobFields } from '@aztec/blob-lib/encoding';
|
|
2
|
+
import { BLOBS_PER_CHECKPOINT, FIELDS_PER_BLOB, MAX_PROCESSABLE_DA_GAS_PER_CHECKPOINT } from '@aztec/constants';
|
|
1
3
|
import { BlockNumber, CheckpointNumber } from '@aztec/foundation/branded-types';
|
|
2
|
-
import { merge, pick } from '@aztec/foundation/collection';
|
|
4
|
+
import { merge, pick, sum } from '@aztec/foundation/collection';
|
|
3
5
|
import { Fr } from '@aztec/foundation/curves/bn254';
|
|
4
6
|
import { type Logger, type LoggerBindings, createLogger } from '@aztec/foundation/log';
|
|
5
7
|
import { bufferToHex } from '@aztec/foundation/string';
|
|
@@ -23,8 +25,8 @@ import {
|
|
|
23
25
|
FullNodeBlockBuilderConfigKeys,
|
|
24
26
|
type ICheckpointBlockBuilder,
|
|
25
27
|
type ICheckpointsBuilder,
|
|
28
|
+
InsufficientValidTxsError,
|
|
26
29
|
type MerkleTreeWriteOperations,
|
|
27
|
-
NoValidTxsError,
|
|
28
30
|
type PublicProcessorLimits,
|
|
29
31
|
type WorldStateSynchronizer,
|
|
30
32
|
} from '@aztec/stdlib/interfaces/server';
|
|
@@ -32,6 +34,7 @@ import { type DebugLogStore, NullDebugLogStore } from '@aztec/stdlib/logs';
|
|
|
32
34
|
import { MerkleTreeId } from '@aztec/stdlib/trees';
|
|
33
35
|
import { type CheckpointGlobalVariables, GlobalVariables, StateReference, Tx } from '@aztec/stdlib/tx';
|
|
34
36
|
import { type TelemetryClient, getTelemetryClient } from '@aztec/telemetry-client';
|
|
37
|
+
import { ForkCheckpoint } from '@aztec/world-state';
|
|
35
38
|
|
|
36
39
|
// Re-export for backward compatibility
|
|
37
40
|
export type { BuildBlockInCheckpointResult } from '@aztec/stdlib/interfaces/server';
|
|
@@ -65,12 +68,13 @@ export class CheckpointBuilder implements ICheckpointBlockBuilder {
|
|
|
65
68
|
|
|
66
69
|
/**
|
|
67
70
|
* Builds a single block within this checkpoint.
|
|
71
|
+
* Automatically caps gas and blob field limits based on checkpoint-level budgets and prior blocks.
|
|
68
72
|
*/
|
|
69
73
|
async buildBlock(
|
|
70
74
|
pendingTxs: Iterable<Tx> | AsyncIterable<Tx>,
|
|
71
75
|
blockNumber: BlockNumber,
|
|
72
76
|
timestamp: bigint,
|
|
73
|
-
opts: PublicProcessorLimits & { expectedEndState?: StateReference } = {},
|
|
77
|
+
opts: PublicProcessorLimits & { expectedEndState?: StateReference; minValidTxs?: number } = {},
|
|
74
78
|
): Promise<BuildBlockInCheckpointResult> {
|
|
75
79
|
const slot = this.checkpointBuilder.constants.slotNumber;
|
|
76
80
|
|
|
@@ -94,39 +98,53 @@ export class CheckpointBuilder implements ICheckpointBlockBuilder {
|
|
|
94
98
|
});
|
|
95
99
|
const { processor, validator } = await this.makeBlockBuilderDeps(globalVariables, this.fork);
|
|
96
100
|
|
|
97
|
-
|
|
98
|
-
|
|
99
|
-
|
|
100
|
-
|
|
101
|
-
|
|
102
|
-
// (only the first block in a checkpoint can be empty)
|
|
103
|
-
if (processedTxs.length === 0 && this.checkpointBuilder.getBlockCount() > 0) {
|
|
104
|
-
throw new NoValidTxsError(failedTxs);
|
|
105
|
-
}
|
|
106
|
-
|
|
107
|
-
// Add block to checkpoint
|
|
108
|
-
const { block } = await this.checkpointBuilder.addBlock(globalVariables, processedTxs, {
|
|
109
|
-
expectedEndState: opts.expectedEndState,
|
|
110
|
-
});
|
|
111
|
-
|
|
112
|
-
// How much public gas was processed
|
|
113
|
-
const publicGas = processedTxs.reduce((acc, tx) => acc.add(tx.gasUsed.publicGas), Gas.empty());
|
|
101
|
+
// Cap gas limits amd available blob fields by remaining checkpoint-level budgets
|
|
102
|
+
const cappedOpts: PublicProcessorLimits & { expectedEndState?: StateReference } = {
|
|
103
|
+
...opts,
|
|
104
|
+
...this.capLimitsByCheckpointBudgets(opts),
|
|
105
|
+
};
|
|
114
106
|
|
|
115
|
-
|
|
116
|
-
|
|
117
|
-
|
|
118
|
-
failedTxs: failedTxs.map(tx => tx.tx.txHash.toString()),
|
|
119
|
-
});
|
|
107
|
+
// We execute all merkle tree operations on a world state fork checkpoint
|
|
108
|
+
// This enables us to discard all modifications in the event that we fail to successfully process sufficient transactions
|
|
109
|
+
const forkCheckpoint = await ForkCheckpoint.new(this.fork);
|
|
120
110
|
|
|
121
|
-
|
|
122
|
-
|
|
123
|
-
|
|
124
|
-
|
|
125
|
-
|
|
126
|
-
|
|
127
|
-
|
|
128
|
-
|
|
129
|
-
|
|
111
|
+
try {
|
|
112
|
+
const [publicProcessorDuration, [processedTxs, failedTxs, usedTxs]] = await elapsed(() =>
|
|
113
|
+
processor.process(pendingTxs, cappedOpts, validator),
|
|
114
|
+
);
|
|
115
|
+
// Throw before updating state if we don't have enough valid txs
|
|
116
|
+
const minValidTxs = opts.minValidTxs ?? 0;
|
|
117
|
+
if (processedTxs.length < minValidTxs) {
|
|
118
|
+
throw new InsufficientValidTxsError(processedTxs.length, minValidTxs, failedTxs);
|
|
119
|
+
}
|
|
120
|
+
|
|
121
|
+
// Commit the fork checkpoint
|
|
122
|
+
await forkCheckpoint.commit();
|
|
123
|
+
|
|
124
|
+
// Add block to checkpoint
|
|
125
|
+
const block = await this.checkpointBuilder.addBlock(globalVariables, processedTxs, {
|
|
126
|
+
expectedEndState: opts.expectedEndState,
|
|
127
|
+
});
|
|
128
|
+
|
|
129
|
+
this.log.debug('Built block within checkpoint', {
|
|
130
|
+
header: block.header.toInspect(),
|
|
131
|
+
processedTxs: processedTxs.map(tx => tx.hash.toString()),
|
|
132
|
+
failedTxs: failedTxs.map(tx => tx.tx.txHash.toString()),
|
|
133
|
+
});
|
|
134
|
+
|
|
135
|
+
return {
|
|
136
|
+
block,
|
|
137
|
+
publicProcessorDuration,
|
|
138
|
+
numTxs: processedTxs.length,
|
|
139
|
+
failedTxs,
|
|
140
|
+
usedTxs,
|
|
141
|
+
};
|
|
142
|
+
} catch (err) {
|
|
143
|
+
// If we reached the point of committing the checkpoint, this does nothing
|
|
144
|
+
// Otherwise it reverts any changes made to the fork for this failed block
|
|
145
|
+
await forkCheckpoint.revert();
|
|
146
|
+
throw err;
|
|
147
|
+
}
|
|
130
148
|
}
|
|
131
149
|
|
|
132
150
|
/** Completes the checkpoint and returns it. */
|
|
@@ -147,6 +165,61 @@ export class CheckpointBuilder implements ICheckpointBlockBuilder {
|
|
|
147
165
|
return this.checkpointBuilder.clone().completeCheckpoint();
|
|
148
166
|
}
|
|
149
167
|
|
|
168
|
+
/**
|
|
169
|
+
* Caps per-block gas and blob field limits by remaining checkpoint-level budgets.
|
|
170
|
+
* Computes remaining L2 gas (mana), DA gas, and blob fields from blocks already added to the checkpoint,
|
|
171
|
+
* then returns opts with maxBlockGas and maxBlobFields capped accordingly.
|
|
172
|
+
*/
|
|
173
|
+
protected capLimitsByCheckpointBudgets(
|
|
174
|
+
opts: PublicProcessorLimits,
|
|
175
|
+
): Pick<PublicProcessorLimits, 'maxBlockGas' | 'maxBlobFields' | 'maxTransactions'> {
|
|
176
|
+
const existingBlocks = this.checkpointBuilder.getBlocks();
|
|
177
|
+
|
|
178
|
+
// Remaining L2 gas (mana)
|
|
179
|
+
// IMPORTANT: This assumes mana is computed solely based on L2 gas used in transactions.
|
|
180
|
+
// This may change in the future.
|
|
181
|
+
const usedMana = sum(existingBlocks.map(b => b.header.totalManaUsed.toNumber()));
|
|
182
|
+
const remainingMana = this.config.rollupManaLimit - usedMana;
|
|
183
|
+
|
|
184
|
+
// Remaining DA gas
|
|
185
|
+
const usedDAGas = sum(existingBlocks.map(b => b.computeDAGasUsed())) ?? 0;
|
|
186
|
+
const remainingDAGas = MAX_PROCESSABLE_DA_GAS_PER_CHECKPOINT - usedDAGas;
|
|
187
|
+
|
|
188
|
+
// Remaining blob fields (block blob fields include both tx data and block-end overhead)
|
|
189
|
+
const usedBlobFields = sum(existingBlocks.map(b => b.toBlobFields().length));
|
|
190
|
+
const totalBlobCapacity = BLOBS_PER_CHECKPOINT * FIELDS_PER_BLOB - NUM_CHECKPOINT_END_MARKER_FIELDS;
|
|
191
|
+
const isFirstBlock = existingBlocks.length === 0;
|
|
192
|
+
const blockEndOverhead = getNumBlockEndBlobFields(isFirstBlock);
|
|
193
|
+
const maxBlobFieldsForTxs = totalBlobCapacity - usedBlobFields - blockEndOverhead;
|
|
194
|
+
|
|
195
|
+
// Cap L2 gas by remaining checkpoint mana
|
|
196
|
+
const cappedL2Gas = Math.min(opts.maxBlockGas?.l2Gas ?? remainingMana, remainingMana);
|
|
197
|
+
|
|
198
|
+
// Cap DA gas by remaining checkpoint DA gas budget
|
|
199
|
+
const cappedDAGas = Math.min(opts.maxBlockGas?.daGas ?? remainingDAGas, remainingDAGas);
|
|
200
|
+
|
|
201
|
+
// Cap blob fields by remaining checkpoint blob capacity
|
|
202
|
+
const cappedBlobFields =
|
|
203
|
+
opts.maxBlobFields !== undefined ? Math.min(opts.maxBlobFields, maxBlobFieldsForTxs) : maxBlobFieldsForTxs;
|
|
204
|
+
|
|
205
|
+
// Cap transaction count by remaining checkpoint tx budget
|
|
206
|
+
let cappedMaxTransactions: number | undefined;
|
|
207
|
+
if (this.config.maxTxsPerCheckpoint !== undefined) {
|
|
208
|
+
const usedTxs = sum(existingBlocks.map(b => b.body.txEffects.length));
|
|
209
|
+
const remainingTxs = Math.max(0, this.config.maxTxsPerCheckpoint - usedTxs);
|
|
210
|
+
cappedMaxTransactions =
|
|
211
|
+
opts.maxTransactions !== undefined ? Math.min(opts.maxTransactions, remainingTxs) : remainingTxs;
|
|
212
|
+
} else {
|
|
213
|
+
cappedMaxTransactions = opts.maxTransactions;
|
|
214
|
+
}
|
|
215
|
+
|
|
216
|
+
return {
|
|
217
|
+
maxBlockGas: new Gas(cappedDAGas, cappedL2Gas),
|
|
218
|
+
maxBlobFields: cappedBlobFields,
|
|
219
|
+
maxTransactions: cappedMaxTransactions,
|
|
220
|
+
};
|
|
221
|
+
}
|
|
222
|
+
|
|
150
223
|
protected async makeBlockBuilderDeps(globalVariables: GlobalVariables, fork: MerkleTreeWriteOperations) {
|
|
151
224
|
const txPublicSetupAllowList = [
|
|
152
225
|
...(await getDefaultAllowedSetupFunctions()),
|
package/src/config.ts
CHANGED
|
@@ -6,8 +6,8 @@ import {
|
|
|
6
6
|
secretValueConfigHelper,
|
|
7
7
|
} from '@aztec/foundation/config';
|
|
8
8
|
import { EthAddress } from '@aztec/foundation/eth-address';
|
|
9
|
-
import { validatorHASignerConfigMappings } from '@aztec/stdlib/ha-signing';
|
|
10
9
|
import type { ValidatorClientConfig } from '@aztec/stdlib/interfaces/server';
|
|
10
|
+
import { validatorHASignerConfigMappings } from '@aztec/validator-ha-signer/config';
|
|
11
11
|
|
|
12
12
|
export type { ValidatorClientConfig };
|
|
13
13
|
|
|
@@ -77,6 +77,26 @@ export const validatorClientConfigMappings: ConfigMappingsType<ValidatorClientCo
|
|
|
77
77
|
description: 'Agree to attest to equivocated checkpoint proposals (for testing purposes only)',
|
|
78
78
|
...booleanConfigHelper(false),
|
|
79
79
|
},
|
|
80
|
+
validateMaxL2BlockGas: {
|
|
81
|
+
env: 'VALIDATOR_MAX_L2_BLOCK_GAS',
|
|
82
|
+
description: 'Maximum L2 block gas for validation. Proposals exceeding this limit are rejected.',
|
|
83
|
+
parseEnv: (val: string) => (val ? parseInt(val, 10) : undefined),
|
|
84
|
+
},
|
|
85
|
+
validateMaxDABlockGas: {
|
|
86
|
+
env: 'VALIDATOR_MAX_DA_BLOCK_GAS',
|
|
87
|
+
description: 'Maximum DA block gas for validation. Proposals exceeding this limit are rejected.',
|
|
88
|
+
parseEnv: (val: string) => (val ? parseInt(val, 10) : undefined),
|
|
89
|
+
},
|
|
90
|
+
validateMaxTxsPerBlock: {
|
|
91
|
+
env: 'VALIDATOR_MAX_TX_PER_BLOCK',
|
|
92
|
+
description: 'Maximum transactions per block for validation. Proposals exceeding this limit are rejected.',
|
|
93
|
+
parseEnv: (val: string) => (val ? parseInt(val, 10) : undefined),
|
|
94
|
+
},
|
|
95
|
+
validateMaxTxsPerCheckpoint: {
|
|
96
|
+
env: 'VALIDATOR_MAX_TX_PER_CHECKPOINT',
|
|
97
|
+
description: 'Maximum transactions per checkpoint for validation. Proposals exceeding this limit are rejected.',
|
|
98
|
+
parseEnv: (val: string) => (val ? parseInt(val, 10) : undefined),
|
|
99
|
+
},
|
|
80
100
|
...validatorHASignerConfigMappings,
|
|
81
101
|
};
|
|
82
102
|
|
|
@@ -150,16 +150,10 @@ export class ValidationService {
|
|
|
150
150
|
);
|
|
151
151
|
|
|
152
152
|
// TODO(spy/ha): Use checkpointNumber instead of blockNumber once CheckpointHeader includes it.
|
|
153
|
-
//
|
|
153
|
+
// CheckpointProposalCore doesn't have lastBlock info, so use 0 as a proxy.
|
|
154
154
|
// blockNumber is NOT used for the primary key so it's safe to use here.
|
|
155
155
|
// See CheckpointHeader TODO and SigningContext types documentation.
|
|
156
|
-
|
|
157
|
-
try {
|
|
158
|
-
blockNumber = proposal.blockNumber;
|
|
159
|
-
} catch {
|
|
160
|
-
// Checkpoint proposal may not have lastBlock, use 0 as fallback
|
|
161
|
-
blockNumber = BlockNumber(0);
|
|
162
|
-
}
|
|
156
|
+
const blockNumber = BlockNumber(0);
|
|
163
157
|
const context: SigningContext = {
|
|
164
158
|
slot: proposal.slotNumber,
|
|
165
159
|
blockNumber,
|
|
@@ -183,7 +177,7 @@ export class ValidationService {
|
|
|
183
177
|
} else {
|
|
184
178
|
const error = result.reason;
|
|
185
179
|
if (error instanceof DutyAlreadySignedError || error instanceof SlashingProtectionError) {
|
|
186
|
-
this.log.
|
|
180
|
+
this.log.verbose(
|
|
187
181
|
`Attestation for slot ${proposal.slotNumber} by ${attestors[i]} already signed by another High-Availability node`,
|
|
188
182
|
);
|
|
189
183
|
// Continue with remaining attestors
|
package/src/factory.ts
CHANGED
|
@@ -29,7 +29,7 @@ export function createBlockProposalHandler(
|
|
|
29
29
|
const metrics = new ValidatorMetrics(deps.telemetry);
|
|
30
30
|
const blockProposalValidator = new BlockProposalValidator(deps.epochCache, {
|
|
31
31
|
txsPermitted: !config.disableTransactions,
|
|
32
|
-
maxTxsPerBlock: config.
|
|
32
|
+
maxTxsPerBlock: config.validateMaxTxsPerBlock ?? config.validateMaxTxsPerCheckpoint,
|
|
33
33
|
});
|
|
34
34
|
return new BlockProposalHandler(
|
|
35
35
|
deps.checkpointsBuilder,
|
|
@@ -240,7 +240,7 @@ export class HAKeyStore implements ExtendedValidatorKeyStore {
|
|
|
240
240
|
}
|
|
241
241
|
|
|
242
242
|
if (error instanceof SlashingProtectionError) {
|
|
243
|
-
this.log.
|
|
243
|
+
this.log.info(`Duty already signed by another node with different payload`, {
|
|
244
244
|
dutyType: context.dutyType,
|
|
245
245
|
slot: context.slot,
|
|
246
246
|
existingMessageHash: error.existingMessageHash,
|
package/src/validator.ts
CHANGED
|
@@ -24,6 +24,7 @@ import { AuthRequest, AuthResponse, BlockProposalValidator, ReqRespSubProtocol }
|
|
|
24
24
|
import { OffenseType, WANT_TO_SLASH_EVENT, type Watcher, type WatcherEmitter } from '@aztec/slasher';
|
|
25
25
|
import type { AztecAddress } from '@aztec/stdlib/aztec-address';
|
|
26
26
|
import type { CommitteeAttestationsAndSigners, L2Block, L2BlockSink, L2BlockSource } from '@aztec/stdlib/block';
|
|
27
|
+
import { validateCheckpoint } from '@aztec/stdlib/checkpoint';
|
|
27
28
|
import { getEpochAtSlot, getTimestampForSlot } from '@aztec/stdlib/epoch-helpers';
|
|
28
29
|
import type {
|
|
29
30
|
CreateCheckpointProposalLastBlockData,
|
|
@@ -200,7 +201,7 @@ export class ValidatorClient extends (EventEmitter as new () => WatcherEmitter)
|
|
|
200
201
|
const metrics = new ValidatorMetrics(telemetry);
|
|
201
202
|
const blockProposalValidator = new BlockProposalValidator(epochCache, {
|
|
202
203
|
txsPermitted: !config.disableTransactions,
|
|
203
|
-
maxTxsPerBlock: config.
|
|
204
|
+
maxTxsPerBlock: config.validateMaxTxsPerBlock,
|
|
204
205
|
});
|
|
205
206
|
const blockProposalHandler = new BlockProposalHandler(
|
|
206
207
|
checkpointsBuilder,
|
|
@@ -225,7 +226,7 @@ export class ValidatorClient extends (EventEmitter as new () => WatcherEmitter)
|
|
|
225
226
|
...config,
|
|
226
227
|
maxStuckDutiesAgeMs: config.maxStuckDutiesAgeMs ?? epochCache.getL1Constants().slotDuration * 2 * 1000,
|
|
227
228
|
};
|
|
228
|
-
const { signer } = await createHASigner(haConfig
|
|
229
|
+
const { signer } = await createHASigner(haConfig);
|
|
229
230
|
haSigner = signer;
|
|
230
231
|
validatorKeyStore = new HAKeyStore(nodeKeystoreAdapter, signer);
|
|
231
232
|
}
|
|
@@ -386,7 +387,7 @@ export class ValidatorClient extends (EventEmitter as new () => WatcherEmitter)
|
|
|
386
387
|
|
|
387
388
|
// Ignore proposals from ourselves (may happen in HA setups)
|
|
388
389
|
if (this.getValidatorAddresses().some(addr => addr.equals(proposer))) {
|
|
389
|
-
this.log.
|
|
390
|
+
this.log.debug(`Ignoring block proposal from self for slot ${slotNumber}`, {
|
|
390
391
|
proposer: proposer.toString(),
|
|
391
392
|
slotNumber,
|
|
392
393
|
});
|
|
@@ -422,9 +423,10 @@ export class ValidatorClient extends (EventEmitter as new () => WatcherEmitter)
|
|
|
422
423
|
);
|
|
423
424
|
|
|
424
425
|
if (!validationResult.isValid) {
|
|
425
|
-
this.log.warn(`Block proposal validation failed: ${validationResult.reason}`, proposalInfo);
|
|
426
|
-
|
|
427
426
|
const reason = validationResult.reason || 'unknown';
|
|
427
|
+
|
|
428
|
+
this.log.warn(`Block proposal validation failed: ${reason}`, proposalInfo);
|
|
429
|
+
|
|
428
430
|
// Classify failure reason: bad proposal vs node issue
|
|
429
431
|
const badProposalReasons: BlockProposalValidationFailureReason[] = [
|
|
430
432
|
'invalid_proposal',
|
|
@@ -496,7 +498,7 @@ export class ValidatorClient extends (EventEmitter as new () => WatcherEmitter)
|
|
|
496
498
|
|
|
497
499
|
// Ignore proposals from ourselves (may happen in HA setups)
|
|
498
500
|
if (this.getValidatorAddresses().some(addr => addr.equals(proposer))) {
|
|
499
|
-
this.log.
|
|
501
|
+
this.log.debug(`Ignoring block proposal from self for slot ${slotNumber}`, {
|
|
500
502
|
proposer: proposer.toString(),
|
|
501
503
|
slotNumber,
|
|
502
504
|
});
|
|
@@ -519,11 +521,9 @@ export class ValidatorClient extends (EventEmitter as new () => WatcherEmitter)
|
|
|
519
521
|
slotNumber,
|
|
520
522
|
archive: proposal.archive.toString(),
|
|
521
523
|
proposer: proposer.toString(),
|
|
522
|
-
txCount: proposal.txHashes.length,
|
|
523
524
|
};
|
|
524
525
|
this.log.info(`Received checkpoint proposal for slot ${slotNumber}`, {
|
|
525
526
|
...proposalInfo,
|
|
526
|
-
txHashes: proposal.txHashes.map(t => t.toString()),
|
|
527
527
|
fishermanMode: this.config.fishermanMode || false,
|
|
528
528
|
});
|
|
529
529
|
|
|
@@ -766,6 +766,20 @@ export class ValidatorClient extends (EventEmitter as new () => WatcherEmitter)
|
|
|
766
766
|
return { isValid: false, reason: 'out_hash_mismatch' };
|
|
767
767
|
}
|
|
768
768
|
|
|
769
|
+
// Final round of validations on the checkpoint, just in case.
|
|
770
|
+
try {
|
|
771
|
+
validateCheckpoint(computedCheckpoint, {
|
|
772
|
+
rollupManaLimit: this.checkpointsBuilder.getConfig().rollupManaLimit,
|
|
773
|
+
maxDABlockGas: this.config.validateMaxDABlockGas,
|
|
774
|
+
maxL2BlockGas: this.config.validateMaxL2BlockGas,
|
|
775
|
+
maxTxsPerBlock: this.config.validateMaxTxsPerBlock,
|
|
776
|
+
maxTxsPerCheckpoint: this.config.validateMaxTxsPerCheckpoint,
|
|
777
|
+
});
|
|
778
|
+
} catch (err) {
|
|
779
|
+
this.log.warn(`Checkpoint validation failed: ${err}`, proposalInfo);
|
|
780
|
+
return { isValid: false, reason: 'checkpoint_validation_failed' };
|
|
781
|
+
}
|
|
782
|
+
|
|
769
783
|
this.log.verbose(`Checkpoint proposal validation successful for slot ${slot}`, proposalInfo);
|
|
770
784
|
return { isValid: true };
|
|
771
785
|
} finally {
|