@aztec/validator-client 0.0.1-commit.fce3e4f → 0.0.1-commit.ffe5b04ea
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +327 -0
- package/dest/block_proposal_handler.d.ts +25 -14
- package/dest/block_proposal_handler.d.ts.map +1 -1
- package/dest/block_proposal_handler.js +366 -105
- package/dest/checkpoint_builder.d.ts +76 -0
- package/dest/checkpoint_builder.d.ts.map +1 -0
- package/dest/checkpoint_builder.js +228 -0
- package/dest/config.d.ts +1 -1
- package/dest/config.d.ts.map +1 -1
- package/dest/config.js +37 -8
- package/dest/duties/validation_service.d.ts +42 -13
- package/dest/duties/validation_service.d.ts.map +1 -1
- package/dest/duties/validation_service.js +105 -28
- package/dest/factory.d.ts +13 -8
- package/dest/factory.d.ts.map +1 -1
- package/dest/factory.js +4 -3
- package/dest/index.d.ts +2 -1
- package/dest/index.d.ts.map +1 -1
- package/dest/index.js +1 -0
- package/dest/key_store/ha_key_store.d.ts +99 -0
- package/dest/key_store/ha_key_store.d.ts.map +1 -0
- package/dest/key_store/ha_key_store.js +208 -0
- package/dest/key_store/index.d.ts +2 -1
- package/dest/key_store/index.d.ts.map +1 -1
- package/dest/key_store/index.js +1 -0
- package/dest/key_store/interface.d.ts +36 -6
- package/dest/key_store/interface.d.ts.map +1 -1
- package/dest/key_store/local_key_store.d.ts +10 -5
- package/dest/key_store/local_key_store.d.ts.map +1 -1
- package/dest/key_store/local_key_store.js +9 -5
- package/dest/key_store/node_keystore_adapter.d.ts +18 -5
- package/dest/key_store/node_keystore_adapter.d.ts.map +1 -1
- package/dest/key_store/node_keystore_adapter.js +18 -4
- package/dest/key_store/web3signer_key_store.d.ts +10 -5
- package/dest/key_store/web3signer_key_store.d.ts.map +1 -1
- package/dest/key_store/web3signer_key_store.js +9 -5
- package/dest/metrics.d.ts +12 -3
- package/dest/metrics.d.ts.map +1 -1
- package/dest/metrics.js +46 -30
- package/dest/validator.d.ts +76 -21
- package/dest/validator.d.ts.map +1 -1
- package/dest/validator.js +478 -57
- package/package.json +23 -13
- package/src/block_proposal_handler.ts +288 -75
- package/src/checkpoint_builder.ts +390 -0
- package/src/config.ts +36 -7
- package/src/duties/validation_service.ts +156 -33
- package/src/factory.ts +18 -8
- package/src/index.ts +1 -0
- package/src/key_store/ha_key_store.ts +269 -0
- package/src/key_store/index.ts +1 -0
- package/src/key_store/interface.ts +44 -5
- package/src/key_store/local_key_store.ts +14 -5
- package/src/key_store/node_keystore_adapter.ts +28 -5
- package/src/key_store/web3signer_key_store.ts +18 -5
- package/src/metrics.ts +63 -33
- package/src/validator.ts +640 -85
|
@@ -1,8 +1,11 @@
|
|
|
1
|
+
import { BlockNumber } from '@aztec/foundation/branded-types';
|
|
1
2
|
import { Buffer32 } from '@aztec/foundation/buffer';
|
|
2
|
-
import { keccak256 } from '@aztec/foundation/crypto';
|
|
3
|
-
import { Fr } from '@aztec/foundation/
|
|
3
|
+
import { keccak256 } from '@aztec/foundation/crypto/keccak';
|
|
4
|
+
import { Fr } from '@aztec/foundation/curves/bn254';
|
|
4
5
|
import { createLogger } from '@aztec/foundation/log';
|
|
5
|
-
import {
|
|
6
|
+
import { BlockProposal, CheckpointAttestation, CheckpointProposal, ConsensusPayload, SignatureDomainSeparator } from '@aztec/stdlib/p2p';
|
|
7
|
+
import { DutyAlreadySignedError, SlashingProtectionError } from '@aztec/validator-ha-signer/errors';
|
|
8
|
+
import { DutyType } from '@aztec/validator-ha-signer/types';
|
|
6
9
|
export class ValidationService {
|
|
7
10
|
keyStore;
|
|
8
11
|
log;
|
|
@@ -13,46 +16,120 @@ export class ValidationService {
|
|
|
13
16
|
/**
|
|
14
17
|
* Create a block proposal with the given header, archive, and transactions
|
|
15
18
|
*
|
|
16
|
-
* @param
|
|
19
|
+
* @param blockHeader - The block header
|
|
20
|
+
* @param blockIndexWithinCheckpoint - The block index within checkpoint for HA signing context
|
|
21
|
+
* @param inHash - Hash of L1 to L2 messages for this checkpoint
|
|
17
22
|
* @param archive - The archive of the current block
|
|
18
|
-
* @param txs -
|
|
23
|
+
* @param txs - Ordered list of transactions (Tx[])
|
|
24
|
+
* @param proposerAttesterAddress - The address of the proposer/attester, or undefined
|
|
19
25
|
* @param options - Block proposal options (including broadcastInvalidBlockProposal for testing)
|
|
20
26
|
*
|
|
21
|
-
* @returns A block proposal signing the above information
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
payloadSigner = (payload)=>this.keyStore.signMessageWithAddress(proposerAttesterAddress, payload);
|
|
26
|
-
} else {
|
|
27
|
-
// if there is no proposer attester address, just use the first signer
|
|
28
|
-
const signer = this.keyStore.getAddress(0);
|
|
29
|
-
payloadSigner = (payload)=>this.keyStore.signMessageWithAddress(signer, payload);
|
|
30
|
-
}
|
|
31
|
-
// TODO: check if this is calculated earlier / can not be recomputed
|
|
32
|
-
const txHashes = await Promise.all(txs.map((tx)=>tx.getTxHash()));
|
|
27
|
+
* @returns A block proposal signing the above information
|
|
28
|
+
* @throws DutyAlreadySignedError if HA signer indicates duty already signed by another node
|
|
29
|
+
* @throws SlashingProtectionError if attempting to sign different data for same slot
|
|
30
|
+
*/ createBlockProposal(blockHeader, blockIndexWithinCheckpoint, inHash, archive, txs, proposerAttesterAddress, options) {
|
|
33
31
|
// For testing: change the new archive to trigger state_mismatch validation failure
|
|
34
32
|
if (options.broadcastInvalidBlockProposal) {
|
|
35
33
|
archive = Fr.random();
|
|
36
|
-
this.log.warn(`Creating INVALID block proposal for slot ${
|
|
34
|
+
this.log.warn(`Creating INVALID block proposal for slot ${blockHeader.globalVariables.slotNumber}`);
|
|
37
35
|
}
|
|
38
|
-
|
|
36
|
+
// Create a signer that uses the appropriate address
|
|
37
|
+
const address = proposerAttesterAddress ?? this.keyStore.getAddress(0);
|
|
38
|
+
const payloadSigner = (payload, context)=>this.keyStore.signMessageWithAddress(address, payload, context);
|
|
39
|
+
return BlockProposal.createProposalFromSigner(blockHeader, blockIndexWithinCheckpoint, inHash, archive, txs.map((tx)=>tx.getTxHash()), options.publishFullTxs ? txs : undefined, payloadSigner);
|
|
39
40
|
}
|
|
40
41
|
/**
|
|
41
|
-
*
|
|
42
|
+
* Create a checkpoint proposal with the last block header and checkpoint header
|
|
43
|
+
*
|
|
44
|
+
* @param checkpointHeader - The checkpoint header containing aggregated data
|
|
45
|
+
* @param archive - The archive of the checkpoint
|
|
46
|
+
* @param lastBlockInfo - Info about the last block (header, index, txs) or undefined
|
|
47
|
+
* @param proposerAttesterAddress - The address of the proposer
|
|
48
|
+
* @param options - Checkpoint proposal options
|
|
49
|
+
*
|
|
50
|
+
* @returns A checkpoint proposal signing the above information
|
|
51
|
+
*/ createCheckpointProposal(checkpointHeader, archive, feeAssetPriceModifier, lastBlockInfo, proposerAttesterAddress, options) {
|
|
52
|
+
// For testing: change the archive to trigger state_mismatch validation failure
|
|
53
|
+
if (options.broadcastInvalidCheckpointProposal) {
|
|
54
|
+
archive = Fr.random();
|
|
55
|
+
this.log.warn(`Creating INVALID checkpoint proposal for slot ${checkpointHeader.slotNumber}`);
|
|
56
|
+
}
|
|
57
|
+
// Create a signer that takes payload and context, and uses the appropriate address
|
|
58
|
+
const payloadSigner = (payload, context)=>{
|
|
59
|
+
const address = proposerAttesterAddress ?? this.keyStore.getAddress(0);
|
|
60
|
+
return this.keyStore.signMessageWithAddress(address, payload, context);
|
|
61
|
+
};
|
|
62
|
+
// Last block to include in the proposal
|
|
63
|
+
const lastBlock = lastBlockInfo && {
|
|
64
|
+
blockHeader: lastBlockInfo.blockHeader,
|
|
65
|
+
indexWithinCheckpoint: lastBlockInfo.indexWithinCheckpoint,
|
|
66
|
+
txHashes: lastBlockInfo.txs.map((tx)=>tx.getTxHash()),
|
|
67
|
+
txs: options.publishFullTxs ? lastBlockInfo.txs : undefined
|
|
68
|
+
};
|
|
69
|
+
return CheckpointProposal.createProposalFromSigner(checkpointHeader, archive, feeAssetPriceModifier, lastBlock, payloadSigner);
|
|
70
|
+
}
|
|
71
|
+
/**
|
|
72
|
+
* Attest with selection of validators to the given checkpoint proposal
|
|
42
73
|
*
|
|
43
74
|
* NOTE: This is just a blind signing.
|
|
44
75
|
* We assume that the proposal is valid and DA guarantees have been checked previously.
|
|
45
76
|
*
|
|
46
|
-
* @param proposal - The proposal to attest to
|
|
77
|
+
* @param proposal - The checkpoint proposal (core version without lastBlock) to attest to
|
|
47
78
|
* @param attestors - The validators to attest with
|
|
48
|
-
* @returns attestations
|
|
49
|
-
*/ async
|
|
50
|
-
|
|
51
|
-
const
|
|
52
|
-
|
|
79
|
+
* @returns checkpoint attestations
|
|
80
|
+
*/ async attestToCheckpointProposal(proposal, attestors) {
|
|
81
|
+
// Create the attestation payload from the checkpoint proposal
|
|
82
|
+
const payload = new ConsensusPayload(proposal.checkpointHeader, proposal.archive, proposal.feeAssetPriceModifier);
|
|
83
|
+
const buf = Buffer32.fromBuffer(keccak256(payload.getPayloadToSign(SignatureDomainSeparator.checkpointAttestation)));
|
|
84
|
+
// TODO(spy/ha): Use checkpointNumber instead of blockNumber once CheckpointHeader includes it.
|
|
85
|
+
// CheckpointProposalCore doesn't have lastBlock info, so use 0 as a proxy.
|
|
86
|
+
// blockNumber is NOT used for the primary key so it's safe to use here.
|
|
87
|
+
// See CheckpointHeader TODO and SigningContext types documentation.
|
|
88
|
+
const blockNumber = BlockNumber(0);
|
|
89
|
+
const context = {
|
|
90
|
+
slot: proposal.slotNumber,
|
|
91
|
+
blockNumber,
|
|
92
|
+
dutyType: DutyType.ATTESTATION
|
|
93
|
+
};
|
|
94
|
+
// Sign each attestor in parallel, catching HA errors per-attestor
|
|
95
|
+
const results = await Promise.allSettled(attestors.map(async (attestor)=>{
|
|
96
|
+
const sig = await this.keyStore.signMessageWithAddress(attestor, buf, context);
|
|
97
|
+
// return new BlockAttestation(proposal.payload, sig, proposal.signature);
|
|
98
|
+
return new CheckpointAttestation(payload, sig, proposal.signature);
|
|
99
|
+
}));
|
|
100
|
+
const attestations = [];
|
|
101
|
+
for(let i = 0; i < results.length; i++){
|
|
102
|
+
const result = results[i];
|
|
103
|
+
if (result.status === 'fulfilled') {
|
|
104
|
+
attestations.push(result.value);
|
|
105
|
+
} else {
|
|
106
|
+
const error = result.reason;
|
|
107
|
+
if (error instanceof DutyAlreadySignedError || error instanceof SlashingProtectionError) {
|
|
108
|
+
this.log.info(`Attestation for slot ${proposal.slotNumber} by ${attestors[i]} already signed by another High-Availability node`);
|
|
109
|
+
// Continue with remaining attestors
|
|
110
|
+
} else {
|
|
111
|
+
throw error;
|
|
112
|
+
}
|
|
113
|
+
}
|
|
114
|
+
}
|
|
115
|
+
return attestations;
|
|
53
116
|
}
|
|
54
|
-
|
|
117
|
+
/**
|
|
118
|
+
* Sign attestations and signers payload
|
|
119
|
+
* @param attestationsAndSigners - The attestations and signers to sign
|
|
120
|
+
* @param proposer - The proposer address to sign with
|
|
121
|
+
* @param slot - The slot number for HA signing context
|
|
122
|
+
* @param blockNumber - The block or checkpoint number for HA signing context
|
|
123
|
+
* @returns signature
|
|
124
|
+
* @throws DutyAlreadySignedError if already signed by another HA node
|
|
125
|
+
* @throws SlashingProtectionError if attempting to sign different data for same slot
|
|
126
|
+
*/ signAttestationsAndSigners(attestationsAndSigners, proposer, slot, blockNumber) {
|
|
127
|
+
const context = {
|
|
128
|
+
slot,
|
|
129
|
+
blockNumber,
|
|
130
|
+
dutyType: DutyType.ATTESTATIONS_AND_SIGNERS
|
|
131
|
+
};
|
|
55
132
|
const buf = Buffer32.fromBuffer(keccak256(attestationsAndSigners.getPayloadToSign(SignatureDomainSeparator.attestationsAndSigners)));
|
|
56
|
-
return
|
|
133
|
+
return this.keyStore.signMessageWithAddress(proposer, buf, context);
|
|
57
134
|
}
|
|
58
135
|
}
|
package/dest/factory.d.ts
CHANGED
|
@@ -1,16 +1,19 @@
|
|
|
1
|
+
import type { BlobClientInterface } from '@aztec/blob-client/client';
|
|
1
2
|
import type { EpochCache } from '@aztec/epoch-cache';
|
|
2
3
|
import type { DateProvider } from '@aztec/foundation/timer';
|
|
3
4
|
import type { KeystoreManager } from '@aztec/node-keystore';
|
|
4
5
|
import { type P2PClient } from '@aztec/p2p';
|
|
5
|
-
import type { L2BlockSource } from '@aztec/stdlib/block';
|
|
6
|
-
import type {
|
|
6
|
+
import type { L2BlockSink, L2BlockSource } from '@aztec/stdlib/block';
|
|
7
|
+
import type { ValidatorClientFullConfig, WorldStateSynchronizer } from '@aztec/stdlib/interfaces/server';
|
|
7
8
|
import type { L1ToL2MessageSource } from '@aztec/stdlib/messaging';
|
|
8
9
|
import type { TelemetryClient } from '@aztec/telemetry-client';
|
|
9
10
|
import { BlockProposalHandler } from './block_proposal_handler.js';
|
|
11
|
+
import type { FullNodeCheckpointsBuilder } from './checkpoint_builder.js';
|
|
10
12
|
import { ValidatorClient } from './validator.js';
|
|
11
13
|
export declare function createBlockProposalHandler(config: ValidatorClientFullConfig, deps: {
|
|
12
|
-
|
|
13
|
-
|
|
14
|
+
checkpointsBuilder: FullNodeCheckpointsBuilder;
|
|
15
|
+
worldState: WorldStateSynchronizer;
|
|
16
|
+
blockSource: L2BlockSource & L2BlockSink;
|
|
14
17
|
l1ToL2MessageSource: L1ToL2MessageSource;
|
|
15
18
|
p2pClient: P2PClient;
|
|
16
19
|
epochCache: EpochCache;
|
|
@@ -18,13 +21,15 @@ export declare function createBlockProposalHandler(config: ValidatorClientFullCo
|
|
|
18
21
|
telemetry: TelemetryClient;
|
|
19
22
|
}): BlockProposalHandler;
|
|
20
23
|
export declare function createValidatorClient(config: ValidatorClientFullConfig, deps: {
|
|
21
|
-
|
|
24
|
+
checkpointsBuilder: FullNodeCheckpointsBuilder;
|
|
25
|
+
worldState: WorldStateSynchronizer;
|
|
22
26
|
p2pClient: P2PClient;
|
|
23
|
-
blockSource: L2BlockSource;
|
|
27
|
+
blockSource: L2BlockSource & L2BlockSink;
|
|
24
28
|
l1ToL2MessageSource: L1ToL2MessageSource;
|
|
25
29
|
telemetry: TelemetryClient;
|
|
26
30
|
dateProvider: DateProvider;
|
|
27
31
|
epochCache: EpochCache;
|
|
28
32
|
keyStoreManager: KeystoreManager | undefined;
|
|
29
|
-
|
|
30
|
-
|
|
33
|
+
blobClient: BlobClientInterface;
|
|
34
|
+
}): Promise<ValidatorClient> | undefined;
|
|
35
|
+
//# sourceMappingURL=data:application/json;base64,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
|
package/dest/factory.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"factory.d.ts","sourceRoot":"","sources":["../src/factory.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,oBAAoB,CAAC;AACrD,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,yBAAyB,CAAC;AAC5D,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,sBAAsB,CAAC;AAC5D,OAAO,EAA0B,KAAK,SAAS,EAAE,MAAM,YAAY,CAAC;AACpE,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,qBAAqB,CAAC;
|
|
1
|
+
{"version":3,"file":"factory.d.ts","sourceRoot":"","sources":["../src/factory.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,mBAAmB,EAAE,MAAM,2BAA2B,CAAC;AACrE,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,oBAAoB,CAAC;AACrD,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,yBAAyB,CAAC;AAC5D,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,sBAAsB,CAAC;AAC5D,OAAO,EAA0B,KAAK,SAAS,EAAE,MAAM,YAAY,CAAC;AACpE,OAAO,KAAK,EAAE,WAAW,EAAE,aAAa,EAAE,MAAM,qBAAqB,CAAC;AACtE,OAAO,KAAK,EAAE,yBAAyB,EAAE,sBAAsB,EAAE,MAAM,iCAAiC,CAAC;AACzG,OAAO,KAAK,EAAE,mBAAmB,EAAE,MAAM,yBAAyB,CAAC;AACnE,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,yBAAyB,CAAC;AAE/D,OAAO,EAAE,oBAAoB,EAAE,MAAM,6BAA6B,CAAC;AACnE,OAAO,KAAK,EAAE,0BAA0B,EAAE,MAAM,yBAAyB,CAAC;AAE1E,OAAO,EAAE,eAAe,EAAE,MAAM,gBAAgB,CAAC;AAEjD,wBAAgB,0BAA0B,CACxC,MAAM,EAAE,yBAAyB,EACjC,IAAI,EAAE;IACJ,kBAAkB,EAAE,0BAA0B,CAAC;IAC/C,UAAU,EAAE,sBAAsB,CAAC;IACnC,WAAW,EAAE,aAAa,GAAG,WAAW,CAAC;IACzC,mBAAmB,EAAE,mBAAmB,CAAC;IACzC,SAAS,EAAE,SAAS,CAAC;IACrB,UAAU,EAAE,UAAU,CAAC;IACvB,YAAY,EAAE,YAAY,CAAC;IAC3B,SAAS,EAAE,eAAe,CAAC;CAC5B,wBAoBF;AAED,wBAAgB,qBAAqB,CACnC,MAAM,EAAE,yBAAyB,EACjC,IAAI,EAAE;IACJ,kBAAkB,EAAE,0BAA0B,CAAC;IAC/C,UAAU,EAAE,sBAAsB,CAAC;IACnC,SAAS,EAAE,SAAS,CAAC;IACrB,WAAW,EAAE,aAAa,GAAG,WAAW,CAAC;IACzC,mBAAmB,EAAE,mBAAmB,CAAC;IACzC,SAAS,EAAE,eAAe,CAAC;IAC3B,YAAY,EAAE,YAAY,CAAC;IAC3B,UAAU,EAAE,UAAU,CAAC;IACvB,eAAe,EAAE,eAAe,GAAG,SAAS,CAAC;IAC7C,UAAU,EAAE,mBAAmB,CAAC;CACjC,wCAqBF"}
|
package/dest/factory.js
CHANGED
|
@@ -5,14 +5,15 @@ import { ValidatorClient } from './validator.js';
|
|
|
5
5
|
export function createBlockProposalHandler(config, deps) {
|
|
6
6
|
const metrics = new ValidatorMetrics(deps.telemetry);
|
|
7
7
|
const blockProposalValidator = new BlockProposalValidator(deps.epochCache, {
|
|
8
|
-
txsPermitted: !config.disableTransactions
|
|
8
|
+
txsPermitted: !config.disableTransactions,
|
|
9
|
+
maxTxsPerBlock: config.validateMaxTxsPerBlock
|
|
9
10
|
});
|
|
10
|
-
return new BlockProposalHandler(deps.
|
|
11
|
+
return new BlockProposalHandler(deps.checkpointsBuilder, deps.worldState, deps.blockSource, deps.l1ToL2MessageSource, deps.p2pClient.getTxProvider(), blockProposalValidator, deps.epochCache, config, metrics, deps.dateProvider, deps.telemetry);
|
|
11
12
|
}
|
|
12
13
|
export function createValidatorClient(config, deps) {
|
|
13
14
|
if (config.disableValidator || !deps.keyStoreManager) {
|
|
14
15
|
return undefined;
|
|
15
16
|
}
|
|
16
17
|
const txProvider = deps.p2pClient.getTxProvider();
|
|
17
|
-
return ValidatorClient.new(config, deps.
|
|
18
|
+
return ValidatorClient.new(config, deps.checkpointsBuilder, deps.worldState, deps.epochCache, deps.p2pClient, deps.blockSource, deps.l1ToL2MessageSource, txProvider, deps.keyStoreManager, deps.blobClient, deps.dateProvider, deps.telemetry);
|
|
18
19
|
}
|
package/dest/index.d.ts
CHANGED
|
@@ -1,6 +1,7 @@
|
|
|
1
1
|
export * from './block_proposal_handler.js';
|
|
2
|
+
export * from './checkpoint_builder.js';
|
|
2
3
|
export * from './config.js';
|
|
3
4
|
export * from './factory.js';
|
|
4
5
|
export * from './validator.js';
|
|
5
6
|
export * from './key_store/index.js';
|
|
6
|
-
//# sourceMappingURL=data:application/json;base64,
|
|
7
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguZC50cyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uL3NyYy9pbmRleC50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiQUFBQSxjQUFjLDZCQUE2QixDQUFDO0FBQzVDLGNBQWMseUJBQXlCLENBQUM7QUFDeEMsY0FBYyxhQUFhLENBQUM7QUFDNUIsY0FBYyxjQUFjLENBQUM7QUFDN0IsY0FBYyxnQkFBZ0IsQ0FBQztBQUMvQixjQUFjLHNCQUFzQixDQUFDIn0=
|
package/dest/index.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AAAA,cAAc,6BAA6B,CAAC;AAC5C,cAAc,aAAa,CAAC;AAC5B,cAAc,cAAc,CAAC;AAC7B,cAAc,gBAAgB,CAAC;AAC/B,cAAc,sBAAsB,CAAC"}
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../src/index.ts"],"names":[],"mappings":"AAAA,cAAc,6BAA6B,CAAC;AAC5C,cAAc,yBAAyB,CAAC;AACxC,cAAc,aAAa,CAAC;AAC5B,cAAc,cAAc,CAAC;AAC7B,cAAc,gBAAgB,CAAC;AAC/B,cAAc,sBAAsB,CAAC"}
|
package/dest/index.js
CHANGED
|
@@ -0,0 +1,99 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* High Availability Key Store
|
|
3
|
+
*
|
|
4
|
+
* A ValidatorKeyStore wrapper that adds slashing protection for HA validator setups.
|
|
5
|
+
* When multiple validator nodes are running, only one node will sign for a given duty.
|
|
6
|
+
*/
|
|
7
|
+
import { Buffer32 } from '@aztec/foundation/buffer';
|
|
8
|
+
import type { EthAddress } from '@aztec/foundation/eth-address';
|
|
9
|
+
import type { Signature } from '@aztec/foundation/eth-signature';
|
|
10
|
+
import type { EthRemoteSignerConfig } from '@aztec/node-keystore';
|
|
11
|
+
import type { AztecAddress } from '@aztec/stdlib/aztec-address';
|
|
12
|
+
import { type SigningContext } from '@aztec/validator-ha-signer/types';
|
|
13
|
+
import type { ValidatorHASigner } from '@aztec/validator-ha-signer/validator-ha-signer';
|
|
14
|
+
import { type TypedDataDefinition } from 'viem';
|
|
15
|
+
import type { ExtendedValidatorKeyStore } from './interface.js';
|
|
16
|
+
/**
|
|
17
|
+
* High Availability Key Store
|
|
18
|
+
*
|
|
19
|
+
* Wraps a base ExtendedValidatorKeyStore and ValidatorHASigner to provide
|
|
20
|
+
* HA-protected signing operations (when context is provided).
|
|
21
|
+
*
|
|
22
|
+
* The extended interface methods (getAttesterAddresses, getCoinbaseAddress, etc.)
|
|
23
|
+
* are pure pass-through since they don't require HA coordination.
|
|
24
|
+
*
|
|
25
|
+
* Usage:
|
|
26
|
+
* ```typescript
|
|
27
|
+
* const baseKeyStore = NodeKeystoreAdapter.fromPrivateKeys(privateKeys);
|
|
28
|
+
* const haSigner = new ValidatorHASigner(db, config);
|
|
29
|
+
* const haKeyStore = new HAKeyStore(baseKeyStore, haSigner);
|
|
30
|
+
*
|
|
31
|
+
* // Without context - signs directly (no HA protection)
|
|
32
|
+
* const sig = await haKeyStore.signMessageWithAddress(addr, msg);
|
|
33
|
+
*
|
|
34
|
+
* // With context - HA protected, throws DutyAlreadySignedError if already signed
|
|
35
|
+
* const result = await haKeyStore.signMessageWithAddress(addr, msg, {
|
|
36
|
+
* slot: 100n,
|
|
37
|
+
* blockNumber: 50n,
|
|
38
|
+
* dutyType: DutyType.BLOCK_PROPOSAL,
|
|
39
|
+
* });
|
|
40
|
+
* ```
|
|
41
|
+
*/
|
|
42
|
+
export declare class HAKeyStore implements ExtendedValidatorKeyStore {
|
|
43
|
+
private readonly baseKeyStore;
|
|
44
|
+
private readonly haSigner;
|
|
45
|
+
private readonly log;
|
|
46
|
+
constructor(baseKeyStore: ExtendedValidatorKeyStore, haSigner: ValidatorHASigner);
|
|
47
|
+
/**
|
|
48
|
+
* Sign typed data with all addresses.
|
|
49
|
+
* Coordinates across nodes to prevent double-signing for most duty types.
|
|
50
|
+
* AUTH_REQUEST and TXS duties bypass HA protection since signing multiple times is safe.
|
|
51
|
+
* Returns only signatures that were successfully claimed by this node.
|
|
52
|
+
*/
|
|
53
|
+
signTypedData(typedData: TypedDataDefinition, context: SigningContext): Promise<Signature[]>;
|
|
54
|
+
/**
|
|
55
|
+
* Sign a message with all addresses.
|
|
56
|
+
* Coordinates across nodes to prevent double-signing for most duty types.
|
|
57
|
+
* AUTH_REQUEST and TXS duties bypass HA protection since signing multiple times is safe.
|
|
58
|
+
* Returns only signatures that were successfully claimed by this node.
|
|
59
|
+
*/
|
|
60
|
+
signMessage(message: Buffer32, context: SigningContext): Promise<Signature[]>;
|
|
61
|
+
/**
|
|
62
|
+
* Sign typed data with a specific address.
|
|
63
|
+
* Coordinates across nodes to prevent double-signing for most duty types.
|
|
64
|
+
* AUTH_REQUEST and TXS duties bypass HA protection since signing multiple times is safe.
|
|
65
|
+
* @throws DutyAlreadySignedError if the duty was already signed by another node
|
|
66
|
+
* @throws SlashingProtectionError if attempting to sign different data for the same slot
|
|
67
|
+
*/
|
|
68
|
+
signTypedDataWithAddress(address: EthAddress, typedData: TypedDataDefinition, context: SigningContext): Promise<Signature>;
|
|
69
|
+
/**
|
|
70
|
+
* Sign a message with a specific address.
|
|
71
|
+
* Coordinates across nodes to prevent double-signing for most duty types.
|
|
72
|
+
* AUTH_REQUEST and TXS duties bypass HA protection since signing multiple times is safe.
|
|
73
|
+
* @throws DutyAlreadySignedError if the duty was already signed by another node
|
|
74
|
+
* @throws SlashingProtectionError if attempting to sign different data for the same slot
|
|
75
|
+
*/
|
|
76
|
+
signMessageWithAddress(address: EthAddress, message: Buffer32, context: SigningContext): Promise<Signature>;
|
|
77
|
+
getAddress(index: number): EthAddress;
|
|
78
|
+
getAddresses(): EthAddress[];
|
|
79
|
+
getAttesterAddresses(): EthAddress[];
|
|
80
|
+
getCoinbaseAddress(attesterAddress: EthAddress): EthAddress;
|
|
81
|
+
getPublisherAddresses(attesterAddress: EthAddress): EthAddress[];
|
|
82
|
+
getFeeRecipient(attesterAddress: EthAddress): AztecAddress;
|
|
83
|
+
getRemoteSignerConfig(attesterAddress: EthAddress): EthRemoteSignerConfig | undefined;
|
|
84
|
+
/**
|
|
85
|
+
* Process signing errors from the HA signer.
|
|
86
|
+
* Logs expected HA errors (already signed) at appropriate levels.
|
|
87
|
+
* Re-throws unexpected errors.
|
|
88
|
+
*/
|
|
89
|
+
private processSigningError;
|
|
90
|
+
/**
|
|
91
|
+
* Start the high-availability key store
|
|
92
|
+
*/
|
|
93
|
+
start(): Promise<void>;
|
|
94
|
+
/**
|
|
95
|
+
* Stop the high-availability key store
|
|
96
|
+
*/
|
|
97
|
+
stop(): Promise<void>;
|
|
98
|
+
}
|
|
99
|
+
//# sourceMappingURL=data:application/json;base64,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
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"ha_key_store.d.ts","sourceRoot":"","sources":["../../src/key_store/ha_key_store.ts"],"names":[],"mappings":"AAAA;;;;;GAKG;AACH,OAAO,EAAE,QAAQ,EAAE,MAAM,0BAA0B,CAAC;AACpD,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,+BAA+B,CAAC;AAChE,OAAO,KAAK,EAAE,SAAS,EAAE,MAAM,iCAAiC,CAAC;AAEjE,OAAO,KAAK,EAAE,qBAAqB,EAAE,MAAM,sBAAsB,CAAC;AAClE,OAAO,KAAK,EAAE,YAAY,EAAE,MAAM,6BAA6B,CAAC;AAEhE,OAAO,EAEL,KAAK,cAAc,EAEpB,MAAM,kCAAkC,CAAC;AAC1C,OAAO,KAAK,EAAE,iBAAiB,EAAE,MAAM,gDAAgD,CAAC;AAExF,OAAO,EAAE,KAAK,mBAAmB,EAAiB,MAAM,MAAM,CAAC;AAE/D,OAAO,KAAK,EAAE,yBAAyB,EAAE,MAAM,gBAAgB,CAAC;AAEhE;;;;;;;;;;;;;;;;;;;;;;;;;GAyBG;AACH,qBAAa,UAAW,YAAW,yBAAyB;IAIxD,OAAO,CAAC,QAAQ,CAAC,YAAY;IAC7B,OAAO,CAAC,QAAQ,CAAC,QAAQ;IAJ3B,OAAO,CAAC,QAAQ,CAAC,GAAG,CAAgC;IAEpD,YACmB,YAAY,EAAE,yBAAyB,EACvC,QAAQ,EAAE,iBAAiB,EAK7C;IAED;;;;;OAKG;IACG,aAAa,CAAC,SAAS,EAAE,mBAAmB,EAAE,OAAO,EAAE,cAAc,GAAG,OAAO,CAAC,SAAS,EAAE,CAAC,CA+BjG;IAED;;;;;OAKG;IACG,WAAW,CAAC,OAAO,EAAE,QAAQ,EAAE,OAAO,EAAE,cAAc,GAAG,OAAO,CAAC,SAAS,EAAE,CAAC,CA+BlF;IAED;;;;;;OAMG;IACG,wBAAwB,CAC5B,OAAO,EAAE,UAAU,EACnB,SAAS,EAAE,mBAAmB,EAC9B,OAAO,EAAE,cAAc,GACtB,OAAO,CAAC,SAAS,CAAC,CAkBpB;IAED;;;;;;OAMG;IACG,sBAAsB,CAAC,OAAO,EAAE,UAAU,EAAE,OAAO,EAAE,QAAQ,EAAE,OAAO,EAAE,cAAc,GAAG,OAAO,CAAC,SAAS,CAAC,CAchH;IAMD,UAAU,CAAC,KAAK,EAAE,MAAM,GAAG,UAAU,CAEpC;IAED,YAAY,IAAI,UAAU,EAAE,CAE3B;IAED,oBAAoB,IAAI,UAAU,EAAE,CAEnC;IAED,kBAAkB,CAAC,eAAe,EAAE,UAAU,GAAG,UAAU,CAE1D;IAED,qBAAqB,CAAC,eAAe,EAAE,UAAU,GAAG,UAAU,EAAE,CAE/D;IAED,eAAe,CAAC,eAAe,EAAE,UAAU,GAAG,YAAY,CAEzD;IAED,qBAAqB,CAAC,eAAe,EAAE,UAAU,GAAG,qBAAqB,GAAG,SAAS,CAEpF;IAED;;;;OAIG;IACH,OAAO,CAAC,mBAAmB;IAwB3B;;OAEG;IACU,KAAK,kBAEjB;IAED;;OAEG;IACU,IAAI,kBAEhB;CACF"}
|
|
@@ -0,0 +1,208 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* High Availability Key Store
|
|
3
|
+
*
|
|
4
|
+
* A ValidatorKeyStore wrapper that adds slashing protection for HA validator setups.
|
|
5
|
+
* When multiple validator nodes are running, only one node will sign for a given duty.
|
|
6
|
+
*/ import { Buffer32 } from '@aztec/foundation/buffer';
|
|
7
|
+
import { createLogger } from '@aztec/foundation/log';
|
|
8
|
+
import { DutyAlreadySignedError, SlashingProtectionError } from '@aztec/validator-ha-signer/errors';
|
|
9
|
+
import { isHAProtectedContext } from '@aztec/validator-ha-signer/types';
|
|
10
|
+
import { hashTypedData } from 'viem';
|
|
11
|
+
/**
|
|
12
|
+
* High Availability Key Store
|
|
13
|
+
*
|
|
14
|
+
* Wraps a base ExtendedValidatorKeyStore and ValidatorHASigner to provide
|
|
15
|
+
* HA-protected signing operations (when context is provided).
|
|
16
|
+
*
|
|
17
|
+
* The extended interface methods (getAttesterAddresses, getCoinbaseAddress, etc.)
|
|
18
|
+
* are pure pass-through since they don't require HA coordination.
|
|
19
|
+
*
|
|
20
|
+
* Usage:
|
|
21
|
+
* ```typescript
|
|
22
|
+
* const baseKeyStore = NodeKeystoreAdapter.fromPrivateKeys(privateKeys);
|
|
23
|
+
* const haSigner = new ValidatorHASigner(db, config);
|
|
24
|
+
* const haKeyStore = new HAKeyStore(baseKeyStore, haSigner);
|
|
25
|
+
*
|
|
26
|
+
* // Without context - signs directly (no HA protection)
|
|
27
|
+
* const sig = await haKeyStore.signMessageWithAddress(addr, msg);
|
|
28
|
+
*
|
|
29
|
+
* // With context - HA protected, throws DutyAlreadySignedError if already signed
|
|
30
|
+
* const result = await haKeyStore.signMessageWithAddress(addr, msg, {
|
|
31
|
+
* slot: 100n,
|
|
32
|
+
* blockNumber: 50n,
|
|
33
|
+
* dutyType: DutyType.BLOCK_PROPOSAL,
|
|
34
|
+
* });
|
|
35
|
+
* ```
|
|
36
|
+
*/ export class HAKeyStore {
|
|
37
|
+
baseKeyStore;
|
|
38
|
+
haSigner;
|
|
39
|
+
log;
|
|
40
|
+
constructor(baseKeyStore, haSigner){
|
|
41
|
+
this.baseKeyStore = baseKeyStore;
|
|
42
|
+
this.haSigner = haSigner;
|
|
43
|
+
this.log = createLogger('ha-key-store');
|
|
44
|
+
this.log.info('HAKeyStore initialized', {
|
|
45
|
+
nodeId: haSigner.nodeId
|
|
46
|
+
});
|
|
47
|
+
}
|
|
48
|
+
/**
|
|
49
|
+
* Sign typed data with all addresses.
|
|
50
|
+
* Coordinates across nodes to prevent double-signing for most duty types.
|
|
51
|
+
* AUTH_REQUEST and TXS duties bypass HA protection since signing multiple times is safe.
|
|
52
|
+
* Returns only signatures that were successfully claimed by this node.
|
|
53
|
+
*/ async signTypedData(typedData, context) {
|
|
54
|
+
// no need for HA protection on auth request and txs signatures
|
|
55
|
+
if (!isHAProtectedContext(context)) {
|
|
56
|
+
return this.baseKeyStore.signTypedData(typedData, context);
|
|
57
|
+
}
|
|
58
|
+
// Sign each address with HA protection
|
|
59
|
+
const addresses = this.getAddresses();
|
|
60
|
+
const results = await Promise.allSettled(addresses.map((addr)=>this.signTypedDataWithAddress(addr, typedData, context)));
|
|
61
|
+
// Filter out failures (already signed by other nodes or other errors)
|
|
62
|
+
return results.filter((result)=>{
|
|
63
|
+
if (result.status === 'fulfilled') {
|
|
64
|
+
return true;
|
|
65
|
+
}
|
|
66
|
+
// Log expected HA errors (already signed) at debug level
|
|
67
|
+
if (result.reason instanceof DutyAlreadySignedError) {
|
|
68
|
+
this.log.debug(`Duty already signed by another node`, {
|
|
69
|
+
dutyType: context.dutyType,
|
|
70
|
+
slot: context.slot,
|
|
71
|
+
signedByNode: result.reason.signedByNode
|
|
72
|
+
});
|
|
73
|
+
return false;
|
|
74
|
+
}
|
|
75
|
+
// Re-throw unexpected errors
|
|
76
|
+
throw result.reason;
|
|
77
|
+
}).map((result)=>result.value);
|
|
78
|
+
}
|
|
79
|
+
/**
|
|
80
|
+
* Sign a message with all addresses.
|
|
81
|
+
* Coordinates across nodes to prevent double-signing for most duty types.
|
|
82
|
+
* AUTH_REQUEST and TXS duties bypass HA protection since signing multiple times is safe.
|
|
83
|
+
* Returns only signatures that were successfully claimed by this node.
|
|
84
|
+
*/ async signMessage(message, context) {
|
|
85
|
+
// no need for HA protection on auth request and txs signatures
|
|
86
|
+
if (!isHAProtectedContext(context)) {
|
|
87
|
+
return this.baseKeyStore.signMessage(message, context);
|
|
88
|
+
}
|
|
89
|
+
// Sign each address with HA protection
|
|
90
|
+
const addresses = this.getAddresses();
|
|
91
|
+
const results = await Promise.allSettled(addresses.map((addr)=>this.signMessageWithAddress(addr, message, context)));
|
|
92
|
+
// Filter out failures (already signed by other nodes or other errors)
|
|
93
|
+
return results.filter((result)=>{
|
|
94
|
+
if (result.status === 'fulfilled') {
|
|
95
|
+
return true;
|
|
96
|
+
}
|
|
97
|
+
// Log expected HA errors (already signed) at debug level
|
|
98
|
+
if (result.reason instanceof DutyAlreadySignedError) {
|
|
99
|
+
this.log.debug(`Duty already signed by another node`, {
|
|
100
|
+
dutyType: context.dutyType,
|
|
101
|
+
slot: context.slot,
|
|
102
|
+
signedByNode: result.reason.signedByNode
|
|
103
|
+
});
|
|
104
|
+
return false;
|
|
105
|
+
}
|
|
106
|
+
// Re-throw unexpected errors
|
|
107
|
+
throw result.reason;
|
|
108
|
+
}).map((result)=>result.value);
|
|
109
|
+
}
|
|
110
|
+
/**
|
|
111
|
+
* Sign typed data with a specific address.
|
|
112
|
+
* Coordinates across nodes to prevent double-signing for most duty types.
|
|
113
|
+
* AUTH_REQUEST and TXS duties bypass HA protection since signing multiple times is safe.
|
|
114
|
+
* @throws DutyAlreadySignedError if the duty was already signed by another node
|
|
115
|
+
* @throws SlashingProtectionError if attempting to sign different data for the same slot
|
|
116
|
+
*/ async signTypedDataWithAddress(address, typedData, context) {
|
|
117
|
+
// AUTH_REQUEST and TXS bypass HA protection - multiple signatures are safe
|
|
118
|
+
if (!isHAProtectedContext(context)) {
|
|
119
|
+
return this.baseKeyStore.signTypedDataWithAddress(address, typedData, context);
|
|
120
|
+
}
|
|
121
|
+
// Compute signing root from typed data for HA tracking
|
|
122
|
+
const digest = hashTypedData(typedData);
|
|
123
|
+
const messageHash = Buffer32.fromString(digest);
|
|
124
|
+
try {
|
|
125
|
+
return await this.haSigner.signWithProtection(address, messageHash, context, ()=>this.baseKeyStore.signTypedDataWithAddress(address, typedData, context));
|
|
126
|
+
} catch (error) {
|
|
127
|
+
this.processSigningError(error, context);
|
|
128
|
+
throw error;
|
|
129
|
+
}
|
|
130
|
+
}
|
|
131
|
+
/**
|
|
132
|
+
* Sign a message with a specific address.
|
|
133
|
+
* Coordinates across nodes to prevent double-signing for most duty types.
|
|
134
|
+
* AUTH_REQUEST and TXS duties bypass HA protection since signing multiple times is safe.
|
|
135
|
+
* @throws DutyAlreadySignedError if the duty was already signed by another node
|
|
136
|
+
* @throws SlashingProtectionError if attempting to sign different data for the same slot
|
|
137
|
+
*/ async signMessageWithAddress(address, message, context) {
|
|
138
|
+
// no need for HA protection on auth request and txs signatures
|
|
139
|
+
if (!isHAProtectedContext(context)) {
|
|
140
|
+
return this.baseKeyStore.signMessageWithAddress(address, message, context);
|
|
141
|
+
}
|
|
142
|
+
try {
|
|
143
|
+
return await this.haSigner.signWithProtection(address, message, context, (messageHash)=>this.baseKeyStore.signMessageWithAddress(address, messageHash, context));
|
|
144
|
+
} catch (error) {
|
|
145
|
+
this.processSigningError(error, context);
|
|
146
|
+
throw error;
|
|
147
|
+
}
|
|
148
|
+
}
|
|
149
|
+
// ─────────────────────────────────────────────────────────────────────────────
|
|
150
|
+
// pass-through methods (no HA logic needed)
|
|
151
|
+
// ─────────────────────────────────────────────────────────────────────────────
|
|
152
|
+
getAddress(index) {
|
|
153
|
+
return this.baseKeyStore.getAddress(index);
|
|
154
|
+
}
|
|
155
|
+
getAddresses() {
|
|
156
|
+
return this.baseKeyStore.getAddresses();
|
|
157
|
+
}
|
|
158
|
+
getAttesterAddresses() {
|
|
159
|
+
return this.baseKeyStore.getAttesterAddresses();
|
|
160
|
+
}
|
|
161
|
+
getCoinbaseAddress(attesterAddress) {
|
|
162
|
+
return this.baseKeyStore.getCoinbaseAddress(attesterAddress);
|
|
163
|
+
}
|
|
164
|
+
getPublisherAddresses(attesterAddress) {
|
|
165
|
+
return this.baseKeyStore.getPublisherAddresses(attesterAddress);
|
|
166
|
+
}
|
|
167
|
+
getFeeRecipient(attesterAddress) {
|
|
168
|
+
return this.baseKeyStore.getFeeRecipient(attesterAddress);
|
|
169
|
+
}
|
|
170
|
+
getRemoteSignerConfig(attesterAddress) {
|
|
171
|
+
return this.baseKeyStore.getRemoteSignerConfig(attesterAddress);
|
|
172
|
+
}
|
|
173
|
+
/**
|
|
174
|
+
* Process signing errors from the HA signer.
|
|
175
|
+
* Logs expected HA errors (already signed) at appropriate levels.
|
|
176
|
+
* Re-throws unexpected errors.
|
|
177
|
+
*/ processSigningError(error, context) {
|
|
178
|
+
if (error instanceof DutyAlreadySignedError) {
|
|
179
|
+
this.log.debug(`Duty already signed by another node with the same payload`, {
|
|
180
|
+
dutyType: context.dutyType,
|
|
181
|
+
slot: context.slot,
|
|
182
|
+
signedByNode: error.signedByNode
|
|
183
|
+
});
|
|
184
|
+
return;
|
|
185
|
+
}
|
|
186
|
+
if (error instanceof SlashingProtectionError) {
|
|
187
|
+
this.log.warn(`Duty already signed by another node with different payload`, {
|
|
188
|
+
dutyType: context.dutyType,
|
|
189
|
+
slot: context.slot,
|
|
190
|
+
existingMessageHash: error.existingMessageHash,
|
|
191
|
+
attemptedMessageHash: error.attemptedMessageHash
|
|
192
|
+
});
|
|
193
|
+
return;
|
|
194
|
+
}
|
|
195
|
+
// Re-throw errors
|
|
196
|
+
throw error;
|
|
197
|
+
}
|
|
198
|
+
/**
|
|
199
|
+
* Start the high-availability key store
|
|
200
|
+
*/ async start() {
|
|
201
|
+
await this.haSigner.start();
|
|
202
|
+
}
|
|
203
|
+
/**
|
|
204
|
+
* Stop the high-availability key store
|
|
205
|
+
*/ async stop() {
|
|
206
|
+
await this.haSigner.stop();
|
|
207
|
+
}
|
|
208
|
+
}
|
|
@@ -2,4 +2,5 @@ export * from './interface.js';
|
|
|
2
2
|
export * from './local_key_store.js';
|
|
3
3
|
export * from './node_keystore_adapter.js';
|
|
4
4
|
export * from './web3signer_key_store.js';
|
|
5
|
-
|
|
5
|
+
export * from './ha_key_store.js';
|
|
6
|
+
//# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguZC50cyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uL3NyYy9rZXlfc3RvcmUvaW5kZXgudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IkFBQUEsY0FBYyxnQkFBZ0IsQ0FBQztBQUMvQixjQUFjLHNCQUFzQixDQUFDO0FBQ3JDLGNBQWMsNEJBQTRCLENBQUM7QUFDM0MsY0FBYywyQkFBMkIsQ0FBQztBQUMxQyxjQUFjLG1CQUFtQixDQUFDIn0=
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/key_store/index.ts"],"names":[],"mappings":"AAAA,cAAc,gBAAgB,CAAC;AAC/B,cAAc,sBAAsB,CAAC;AACrC,cAAc,4BAA4B,CAAC;AAC3C,cAAc,2BAA2B,CAAC"}
|
|
1
|
+
{"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/key_store/index.ts"],"names":[],"mappings":"AAAA,cAAc,gBAAgB,CAAC;AAC/B,cAAc,sBAAsB,CAAC;AACrC,cAAc,4BAA4B,CAAC;AAC3C,cAAc,2BAA2B,CAAC;AAC1C,cAAc,mBAAmB,CAAC"}
|
package/dest/key_store/index.js
CHANGED