@aztec/validator-client 0.0.1-commit.f504929 → 0.0.1-commit.f81dbcf

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1,5 +1,7 @@
1
+ import { NUM_CHECKPOINT_END_MARKER_FIELDS, getNumBlockEndBlobFields } from '@aztec/blob-lib/encoding';
2
+ import { BLOBS_PER_CHECKPOINT, FIELDS_PER_BLOB, MAX_PROCESSABLE_DA_GAS_PER_CHECKPOINT } from '@aztec/constants';
1
3
  import { BlockNumber, CheckpointNumber } from '@aztec/foundation/branded-types';
2
- import { merge, pick } from '@aztec/foundation/collection';
4
+ import { merge, pick, sum } from '@aztec/foundation/collection';
3
5
  import { Fr } from '@aztec/foundation/curves/bn254';
4
6
  import { type Logger, type LoggerBindings, createLogger } from '@aztec/foundation/log';
5
7
  import { bufferToHex } from '@aztec/foundation/string';
@@ -23,8 +25,8 @@ import {
23
25
  FullNodeBlockBuilderConfigKeys,
24
26
  type ICheckpointBlockBuilder,
25
27
  type ICheckpointsBuilder,
28
+ InsufficientValidTxsError,
26
29
  type MerkleTreeWriteOperations,
27
- NoValidTxsError,
28
30
  type PublicProcessorLimits,
29
31
  type WorldStateSynchronizer,
30
32
  } from '@aztec/stdlib/interfaces/server';
@@ -32,6 +34,7 @@ import { type DebugLogStore, NullDebugLogStore } from '@aztec/stdlib/logs';
32
34
  import { MerkleTreeId } from '@aztec/stdlib/trees';
33
35
  import { type CheckpointGlobalVariables, GlobalVariables, StateReference, Tx } from '@aztec/stdlib/tx';
34
36
  import { type TelemetryClient, getTelemetryClient } from '@aztec/telemetry-client';
37
+ import { ForkCheckpoint } from '@aztec/world-state';
35
38
 
36
39
  // Re-export for backward compatibility
37
40
  export type { BuildBlockInCheckpointResult } from '@aztec/stdlib/interfaces/server';
@@ -65,12 +68,13 @@ export class CheckpointBuilder implements ICheckpointBlockBuilder {
65
68
 
66
69
  /**
67
70
  * Builds a single block within this checkpoint.
71
+ * Automatically caps gas and blob field limits based on checkpoint-level budgets and prior blocks.
68
72
  */
69
73
  async buildBlock(
70
74
  pendingTxs: Iterable<Tx> | AsyncIterable<Tx>,
71
75
  blockNumber: BlockNumber,
72
76
  timestamp: bigint,
73
- opts: PublicProcessorLimits & { expectedEndState?: StateReference } = {},
77
+ opts: PublicProcessorLimits & { expectedEndState?: StateReference; minValidTxs?: number } = {},
74
78
  ): Promise<BuildBlockInCheckpointResult> {
75
79
  const slot = this.checkpointBuilder.constants.slotNumber;
76
80
 
@@ -94,39 +98,53 @@ export class CheckpointBuilder implements ICheckpointBlockBuilder {
94
98
  });
95
99
  const { processor, validator } = await this.makeBlockBuilderDeps(globalVariables, this.fork);
96
100
 
97
- const [publicProcessorDuration, [processedTxs, failedTxs, usedTxs, _, usedTxBlobFields]] = await elapsed(() =>
98
- processor.process(pendingTxs, opts, validator),
99
- );
100
-
101
- // Throw if we didn't collect a single valid tx and we're not allowed to build empty blocks
102
- // (only the first block in a checkpoint can be empty)
103
- if (processedTxs.length === 0 && this.checkpointBuilder.getBlockCount() > 0) {
104
- throw new NoValidTxsError(failedTxs);
105
- }
106
-
107
- // Add block to checkpoint
108
- const { block } = await this.checkpointBuilder.addBlock(globalVariables, processedTxs, {
109
- expectedEndState: opts.expectedEndState,
110
- });
111
-
112
- // How much public gas was processed
113
- const publicGas = processedTxs.reduce((acc, tx) => acc.add(tx.gasUsed.publicGas), Gas.empty());
101
+ // Cap gas limits amd available blob fields by remaining checkpoint-level budgets
102
+ const cappedOpts: PublicProcessorLimits & { expectedEndState?: StateReference } = {
103
+ ...opts,
104
+ ...this.capLimitsByCheckpointBudgets(opts),
105
+ };
114
106
 
115
- this.log.debug('Built block within checkpoint', {
116
- header: block.header.toInspect(),
117
- processedTxs: processedTxs.map(tx => tx.hash.toString()),
118
- failedTxs: failedTxs.map(tx => tx.tx.txHash.toString()),
119
- });
107
+ // We execute all merkle tree operations on a world state fork checkpoint
108
+ // This enables us to discard all modifications in the event that we fail to successfully process sufficient transactions
109
+ const forkCheckpoint = await ForkCheckpoint.new(this.fork);
120
110
 
121
- return {
122
- block,
123
- publicGas,
124
- publicProcessorDuration,
125
- numTxs: processedTxs.length,
126
- failedTxs,
127
- usedTxs,
128
- usedTxBlobFields,
129
- };
111
+ try {
112
+ const [publicProcessorDuration, [processedTxs, failedTxs, usedTxs]] = await elapsed(() =>
113
+ processor.process(pendingTxs, cappedOpts, validator),
114
+ );
115
+ // Throw before updating state if we don't have enough valid txs
116
+ const minValidTxs = opts.minValidTxs ?? 0;
117
+ if (processedTxs.length < minValidTxs) {
118
+ throw new InsufficientValidTxsError(processedTxs.length, minValidTxs, failedTxs);
119
+ }
120
+
121
+ // Commit the fork checkpoint
122
+ await forkCheckpoint.commit();
123
+
124
+ // Add block to checkpoint
125
+ const block = await this.checkpointBuilder.addBlock(globalVariables, processedTxs, {
126
+ expectedEndState: opts.expectedEndState,
127
+ });
128
+
129
+ this.log.debug('Built block within checkpoint', {
130
+ header: block.header.toInspect(),
131
+ processedTxs: processedTxs.map(tx => tx.hash.toString()),
132
+ failedTxs: failedTxs.map(tx => tx.tx.txHash.toString()),
133
+ });
134
+
135
+ return {
136
+ block,
137
+ publicProcessorDuration,
138
+ numTxs: processedTxs.length,
139
+ failedTxs,
140
+ usedTxs,
141
+ };
142
+ } catch (err) {
143
+ // If we reached the point of committing the checkpoint, this does nothing
144
+ // Otherwise it reverts any changes made to the fork for this failed block
145
+ await forkCheckpoint.revert();
146
+ throw err;
147
+ }
130
148
  }
131
149
 
132
150
  /** Completes the checkpoint and returns it. */
@@ -147,6 +165,61 @@ export class CheckpointBuilder implements ICheckpointBlockBuilder {
147
165
  return this.checkpointBuilder.clone().completeCheckpoint();
148
166
  }
149
167
 
168
+ /**
169
+ * Caps per-block gas and blob field limits by remaining checkpoint-level budgets.
170
+ * Computes remaining L2 gas (mana), DA gas, and blob fields from blocks already added to the checkpoint,
171
+ * then returns opts with maxBlockGas and maxBlobFields capped accordingly.
172
+ */
173
+ protected capLimitsByCheckpointBudgets(
174
+ opts: PublicProcessorLimits,
175
+ ): Pick<PublicProcessorLimits, 'maxBlockGas' | 'maxBlobFields' | 'maxTransactions'> {
176
+ const existingBlocks = this.checkpointBuilder.getBlocks();
177
+
178
+ // Remaining L2 gas (mana)
179
+ // IMPORTANT: This assumes mana is computed solely based on L2 gas used in transactions.
180
+ // This may change in the future.
181
+ const usedMana = sum(existingBlocks.map(b => b.header.totalManaUsed.toNumber()));
182
+ const remainingMana = this.config.rollupManaLimit - usedMana;
183
+
184
+ // Remaining DA gas
185
+ const usedDAGas = sum(existingBlocks.map(b => b.computeDAGasUsed())) ?? 0;
186
+ const remainingDAGas = MAX_PROCESSABLE_DA_GAS_PER_CHECKPOINT - usedDAGas;
187
+
188
+ // Remaining blob fields (block blob fields include both tx data and block-end overhead)
189
+ const usedBlobFields = sum(existingBlocks.map(b => b.toBlobFields().length));
190
+ const totalBlobCapacity = BLOBS_PER_CHECKPOINT * FIELDS_PER_BLOB - NUM_CHECKPOINT_END_MARKER_FIELDS;
191
+ const isFirstBlock = existingBlocks.length === 0;
192
+ const blockEndOverhead = getNumBlockEndBlobFields(isFirstBlock);
193
+ const maxBlobFieldsForTxs = totalBlobCapacity - usedBlobFields - blockEndOverhead;
194
+
195
+ // Cap L2 gas by remaining checkpoint mana
196
+ const cappedL2Gas = Math.min(opts.maxBlockGas?.l2Gas ?? remainingMana, remainingMana);
197
+
198
+ // Cap DA gas by remaining checkpoint DA gas budget
199
+ const cappedDAGas = Math.min(opts.maxBlockGas?.daGas ?? remainingDAGas, remainingDAGas);
200
+
201
+ // Cap blob fields by remaining checkpoint blob capacity
202
+ const cappedBlobFields =
203
+ opts.maxBlobFields !== undefined ? Math.min(opts.maxBlobFields, maxBlobFieldsForTxs) : maxBlobFieldsForTxs;
204
+
205
+ // Cap transaction count by remaining checkpoint tx budget
206
+ let cappedMaxTransactions: number | undefined;
207
+ if (this.config.maxTxsPerCheckpoint !== undefined) {
208
+ const usedTxs = sum(existingBlocks.map(b => b.body.txEffects.length));
209
+ const remainingTxs = Math.max(0, this.config.maxTxsPerCheckpoint - usedTxs);
210
+ cappedMaxTransactions =
211
+ opts.maxTransactions !== undefined ? Math.min(opts.maxTransactions, remainingTxs) : remainingTxs;
212
+ } else {
213
+ cappedMaxTransactions = opts.maxTransactions;
214
+ }
215
+
216
+ return {
217
+ maxBlockGas: new Gas(cappedDAGas, cappedL2Gas),
218
+ maxBlobFields: cappedBlobFields,
219
+ maxTransactions: cappedMaxTransactions,
220
+ };
221
+ }
222
+
150
223
  protected async makeBlockBuilderDeps(globalVariables: GlobalVariables, fork: MerkleTreeWriteOperations) {
151
224
  const txPublicSetupAllowList = [
152
225
  ...(await getDefaultAllowedSetupFunctions()),
package/src/config.ts CHANGED
@@ -6,8 +6,8 @@ import {
6
6
  secretValueConfigHelper,
7
7
  } from '@aztec/foundation/config';
8
8
  import { EthAddress } from '@aztec/foundation/eth-address';
9
- import { validatorHASignerConfigMappings } from '@aztec/stdlib/ha-signing';
10
9
  import type { ValidatorClientConfig } from '@aztec/stdlib/interfaces/server';
10
+ import { validatorHASignerConfigMappings } from '@aztec/validator-ha-signer/config';
11
11
 
12
12
  export type { ValidatorClientConfig };
13
13
 
@@ -77,6 +77,26 @@ export const validatorClientConfigMappings: ConfigMappingsType<ValidatorClientCo
77
77
  description: 'Agree to attest to equivocated checkpoint proposals (for testing purposes only)',
78
78
  ...booleanConfigHelper(false),
79
79
  },
80
+ validateMaxL2BlockGas: {
81
+ env: 'VALIDATOR_MAX_L2_BLOCK_GAS',
82
+ description: 'Maximum L2 block gas for validation. Proposals exceeding this limit are rejected.',
83
+ parseEnv: (val: string) => (val ? parseInt(val, 10) : undefined),
84
+ },
85
+ validateMaxDABlockGas: {
86
+ env: 'VALIDATOR_MAX_DA_BLOCK_GAS',
87
+ description: 'Maximum DA block gas for validation. Proposals exceeding this limit are rejected.',
88
+ parseEnv: (val: string) => (val ? parseInt(val, 10) : undefined),
89
+ },
90
+ validateMaxTxsPerBlock: {
91
+ env: 'VALIDATOR_MAX_TX_PER_BLOCK',
92
+ description: 'Maximum transactions per block for validation. Proposals exceeding this limit are rejected.',
93
+ parseEnv: (val: string) => (val ? parseInt(val, 10) : undefined),
94
+ },
95
+ validateMaxTxsPerCheckpoint: {
96
+ env: 'VALIDATOR_MAX_TX_PER_CHECKPOINT',
97
+ description: 'Maximum transactions per checkpoint for validation. Proposals exceeding this limit are rejected.',
98
+ parseEnv: (val: string) => (val ? parseInt(val, 10) : undefined),
99
+ },
80
100
  ...validatorHASignerConfigMappings,
81
101
  };
82
102
 
@@ -150,16 +150,10 @@ export class ValidationService {
150
150
  );
151
151
 
152
152
  // TODO(spy/ha): Use checkpointNumber instead of blockNumber once CheckpointHeader includes it.
153
- // Currently using lastBlock.blockNumber as a proxy for checkpoint identification in HA signing.
153
+ // CheckpointProposalCore doesn't have lastBlock info, so use 0 as a proxy.
154
154
  // blockNumber is NOT used for the primary key so it's safe to use here.
155
155
  // See CheckpointHeader TODO and SigningContext types documentation.
156
- let blockNumber: BlockNumber;
157
- try {
158
- blockNumber = proposal.blockNumber;
159
- } catch {
160
- // Checkpoint proposal may not have lastBlock, use 0 as fallback
161
- blockNumber = BlockNumber(0);
162
- }
156
+ const blockNumber = BlockNumber(0);
163
157
  const context: SigningContext = {
164
158
  slot: proposal.slotNumber,
165
159
  blockNumber,
@@ -183,7 +177,7 @@ export class ValidationService {
183
177
  } else {
184
178
  const error = result.reason;
185
179
  if (error instanceof DutyAlreadySignedError || error instanceof SlashingProtectionError) {
186
- this.log.info(
180
+ this.log.verbose(
187
181
  `Attestation for slot ${proposal.slotNumber} by ${attestors[i]} already signed by another High-Availability node`,
188
182
  );
189
183
  // Continue with remaining attestors
package/src/factory.ts CHANGED
@@ -29,7 +29,7 @@ export function createBlockProposalHandler(
29
29
  const metrics = new ValidatorMetrics(deps.telemetry);
30
30
  const blockProposalValidator = new BlockProposalValidator(deps.epochCache, {
31
31
  txsPermitted: !config.disableTransactions,
32
- maxTxsPerBlock: config.maxTxsPerBlock,
32
+ maxTxsPerBlock: config.validateMaxTxsPerBlock ?? config.validateMaxTxsPerCheckpoint,
33
33
  });
34
34
  return new BlockProposalHandler(
35
35
  deps.checkpointsBuilder,
@@ -240,7 +240,7 @@ export class HAKeyStore implements ExtendedValidatorKeyStore {
240
240
  }
241
241
 
242
242
  if (error instanceof SlashingProtectionError) {
243
- this.log.warn(`Duty already signed by another node with different payload`, {
243
+ this.log.info(`Duty already signed by another node with different payload`, {
244
244
  dutyType: context.dutyType,
245
245
  slot: context.slot,
246
246
  existingMessageHash: error.existingMessageHash,
package/src/validator.ts CHANGED
@@ -24,6 +24,7 @@ import { AuthRequest, AuthResponse, BlockProposalValidator, ReqRespSubProtocol }
24
24
  import { OffenseType, WANT_TO_SLASH_EVENT, type Watcher, type WatcherEmitter } from '@aztec/slasher';
25
25
  import type { AztecAddress } from '@aztec/stdlib/aztec-address';
26
26
  import type { CommitteeAttestationsAndSigners, L2Block, L2BlockSink, L2BlockSource } from '@aztec/stdlib/block';
27
+ import { validateCheckpoint } from '@aztec/stdlib/checkpoint';
27
28
  import { getEpochAtSlot, getTimestampForSlot } from '@aztec/stdlib/epoch-helpers';
28
29
  import type {
29
30
  CreateCheckpointProposalLastBlockData,
@@ -200,7 +201,7 @@ export class ValidatorClient extends (EventEmitter as new () => WatcherEmitter)
200
201
  const metrics = new ValidatorMetrics(telemetry);
201
202
  const blockProposalValidator = new BlockProposalValidator(epochCache, {
202
203
  txsPermitted: !config.disableTransactions,
203
- maxTxsPerBlock: config.maxTxsPerBlock,
204
+ maxTxsPerBlock: config.validateMaxTxsPerBlock,
204
205
  });
205
206
  const blockProposalHandler = new BlockProposalHandler(
206
207
  checkpointsBuilder,
@@ -225,7 +226,7 @@ export class ValidatorClient extends (EventEmitter as new () => WatcherEmitter)
225
226
  ...config,
226
227
  maxStuckDutiesAgeMs: config.maxStuckDutiesAgeMs ?? epochCache.getL1Constants().slotDuration * 2 * 1000,
227
228
  };
228
- const { signer } = await createHASigner(haConfig, { telemetryClient: telemetry, dateProvider });
229
+ const { signer } = await createHASigner(haConfig);
229
230
  haSigner = signer;
230
231
  validatorKeyStore = new HAKeyStore(nodeKeystoreAdapter, signer);
231
232
  }
@@ -386,7 +387,7 @@ export class ValidatorClient extends (EventEmitter as new () => WatcherEmitter)
386
387
 
387
388
  // Ignore proposals from ourselves (may happen in HA setups)
388
389
  if (this.getValidatorAddresses().some(addr => addr.equals(proposer))) {
389
- this.log.warn(`Ignoring block proposal from self for slot ${slotNumber}`, {
390
+ this.log.debug(`Ignoring block proposal from self for slot ${slotNumber}`, {
390
391
  proposer: proposer.toString(),
391
392
  slotNumber,
392
393
  });
@@ -422,9 +423,10 @@ export class ValidatorClient extends (EventEmitter as new () => WatcherEmitter)
422
423
  );
423
424
 
424
425
  if (!validationResult.isValid) {
425
- this.log.warn(`Block proposal validation failed: ${validationResult.reason}`, proposalInfo);
426
-
427
426
  const reason = validationResult.reason || 'unknown';
427
+
428
+ this.log.warn(`Block proposal validation failed: ${reason}`, proposalInfo);
429
+
428
430
  // Classify failure reason: bad proposal vs node issue
429
431
  const badProposalReasons: BlockProposalValidationFailureReason[] = [
430
432
  'invalid_proposal',
@@ -496,7 +498,7 @@ export class ValidatorClient extends (EventEmitter as new () => WatcherEmitter)
496
498
 
497
499
  // Ignore proposals from ourselves (may happen in HA setups)
498
500
  if (this.getValidatorAddresses().some(addr => addr.equals(proposer))) {
499
- this.log.warn(`Ignoring block proposal from self for slot ${slotNumber}`, {
501
+ this.log.debug(`Ignoring block proposal from self for slot ${slotNumber}`, {
500
502
  proposer: proposer.toString(),
501
503
  slotNumber,
502
504
  });
@@ -519,11 +521,9 @@ export class ValidatorClient extends (EventEmitter as new () => WatcherEmitter)
519
521
  slotNumber,
520
522
  archive: proposal.archive.toString(),
521
523
  proposer: proposer.toString(),
522
- txCount: proposal.txHashes.length,
523
524
  };
524
525
  this.log.info(`Received checkpoint proposal for slot ${slotNumber}`, {
525
526
  ...proposalInfo,
526
- txHashes: proposal.txHashes.map(t => t.toString()),
527
527
  fishermanMode: this.config.fishermanMode || false,
528
528
  });
529
529
 
@@ -766,6 +766,20 @@ export class ValidatorClient extends (EventEmitter as new () => WatcherEmitter)
766
766
  return { isValid: false, reason: 'out_hash_mismatch' };
767
767
  }
768
768
 
769
+ // Final round of validations on the checkpoint, just in case.
770
+ try {
771
+ validateCheckpoint(computedCheckpoint, {
772
+ rollupManaLimit: this.checkpointsBuilder.getConfig().rollupManaLimit,
773
+ maxDABlockGas: this.config.validateMaxDABlockGas,
774
+ maxL2BlockGas: this.config.validateMaxL2BlockGas,
775
+ maxTxsPerBlock: this.config.validateMaxTxsPerBlock,
776
+ maxTxsPerCheckpoint: this.config.validateMaxTxsPerCheckpoint,
777
+ });
778
+ } catch (err) {
779
+ this.log.warn(`Checkpoint validation failed: ${err}`, proposalInfo);
780
+ return { isValid: false, reason: 'checkpoint_validation_failed' };
781
+ }
782
+
769
783
  this.log.verbose(`Checkpoint proposal validation successful for slot ${slot}`, proposalInfo);
770
784
  return { isValid: true };
771
785
  } finally {