@aztec/validator-client 4.0.0-devnet.2-patch.4 → 4.0.0-devnet.3-patch.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (50) hide show
  1. package/README.md +41 -0
  2. package/dest/checkpoint_builder.d.ts +19 -6
  3. package/dest/checkpoint_builder.d.ts.map +1 -1
  4. package/dest/checkpoint_builder.js +115 -39
  5. package/dest/config.d.ts +1 -1
  6. package/dest/config.d.ts.map +1 -1
  7. package/dest/config.js +20 -0
  8. package/dest/duties/validation_service.d.ts +1 -1
  9. package/dest/duties/validation_service.d.ts.map +1 -1
  10. package/dest/duties/validation_service.js +3 -9
  11. package/dest/factory.d.ts +7 -4
  12. package/dest/factory.d.ts.map +1 -1
  13. package/dest/factory.js +6 -5
  14. package/dest/index.d.ts +2 -3
  15. package/dest/index.d.ts.map +1 -1
  16. package/dest/index.js +1 -2
  17. package/dest/key_store/ha_key_store.js +1 -1
  18. package/dest/metrics.d.ts +10 -2
  19. package/dest/metrics.d.ts.map +1 -1
  20. package/dest/metrics.js +12 -0
  21. package/dest/proposal_handler.d.ts +94 -0
  22. package/dest/proposal_handler.d.ts.map +1 -0
  23. package/dest/{block_proposal_handler.js → proposal_handler.js} +356 -36
  24. package/dest/validator.d.ts +11 -22
  25. package/dest/validator.d.ts.map +1 -1
  26. package/dest/validator.js +41 -217
  27. package/package.json +19 -19
  28. package/src/checkpoint_builder.ts +135 -39
  29. package/src/config.ts +20 -0
  30. package/src/duties/validation_service.ts +3 -9
  31. package/src/factory.ts +9 -3
  32. package/src/index.ts +1 -2
  33. package/src/key_store/ha_key_store.ts +1 -1
  34. package/src/metrics.ts +19 -1
  35. package/src/{block_proposal_handler.ts → proposal_handler.ts} +412 -44
  36. package/src/validator.ts +48 -240
  37. package/dest/block_proposal_handler.d.ts +0 -63
  38. package/dest/block_proposal_handler.d.ts.map +0 -1
  39. package/dest/tx_validator/index.d.ts +0 -3
  40. package/dest/tx_validator/index.d.ts.map +0 -1
  41. package/dest/tx_validator/index.js +0 -2
  42. package/dest/tx_validator/nullifier_cache.d.ts +0 -14
  43. package/dest/tx_validator/nullifier_cache.d.ts.map +0 -1
  44. package/dest/tx_validator/nullifier_cache.js +0 -24
  45. package/dest/tx_validator/tx_validator_factory.d.ts +0 -19
  46. package/dest/tx_validator/tx_validator_factory.d.ts.map +0 -1
  47. package/dest/tx_validator/tx_validator_factory.js +0 -54
  48. package/src/tx_validator/index.ts +0 -2
  49. package/src/tx_validator/nullifier_cache.ts +0 -30
  50. package/src/tx_validator/tx_validator_factory.ts +0 -154
package/src/validator.ts CHANGED
@@ -1,7 +1,5 @@
1
1
  import type { BlobClientInterface } from '@aztec/blob-client/client';
2
- import { type Blob, getBlobsPerL1Block } from '@aztec/blob-lib';
3
2
  import type { EpochCache } from '@aztec/epoch-cache';
4
- import { validateFeeAssetPriceModifier } from '@aztec/ethereum/contracts';
5
3
  import {
6
4
  BlockNumber,
7
5
  CheckpointNumber,
@@ -10,11 +8,9 @@ import {
10
8
  SlotNumber,
11
9
  } from '@aztec/foundation/branded-types';
12
10
  import { Fr } from '@aztec/foundation/curves/bn254';
13
- import { TimeoutError } from '@aztec/foundation/error';
14
11
  import type { EthAddress } from '@aztec/foundation/eth-address';
15
12
  import type { Signature } from '@aztec/foundation/eth-signature';
16
- import { type LogData, type Logger, createLogger } from '@aztec/foundation/log';
17
- import { retryUntil } from '@aztec/foundation/retry';
13
+ import { type Logger, createLogger } from '@aztec/foundation/log';
18
14
  import { RunningPromise } from '@aztec/foundation/running-promise';
19
15
  import { sleep } from '@aztec/foundation/sleep';
20
16
  import { DateProvider } from '@aztec/foundation/timer';
@@ -23,8 +19,8 @@ import type { DuplicateAttestationInfo, DuplicateProposalInfo, P2P, PeerId } fro
23
19
  import { AuthRequest, AuthResponse, BlockProposalValidator, ReqRespSubProtocol } from '@aztec/p2p';
24
20
  import { OffenseType, WANT_TO_SLASH_EVENT, type Watcher, type WatcherEmitter } from '@aztec/slasher';
25
21
  import type { AztecAddress } from '@aztec/stdlib/aztec-address';
26
- import type { CommitteeAttestationsAndSigners, L2Block, L2BlockSink, L2BlockSource } from '@aztec/stdlib/block';
27
- import { getEpochAtSlot, getTimestampForSlot } from '@aztec/stdlib/epoch-helpers';
22
+ import type { CommitteeAttestationsAndSigners, L2BlockSink, L2BlockSource } from '@aztec/stdlib/block';
23
+ import { getEpochAtSlot } from '@aztec/stdlib/epoch-helpers';
28
24
  import type {
29
25
  CreateCheckpointProposalLastBlockData,
30
26
  ITxProvider,
@@ -32,7 +28,7 @@ import type {
32
28
  ValidatorClientFullConfig,
33
29
  WorldStateSynchronizer,
34
30
  } from '@aztec/stdlib/interfaces/server';
35
- import { type L1ToL2MessageSource, accumulateCheckpointOutHashes } from '@aztec/stdlib/messaging';
31
+ import type { L1ToL2MessageSource } from '@aztec/stdlib/messaging';
36
32
  import {
37
33
  type BlockProposal,
38
34
  type BlockProposalOptions,
@@ -42,23 +38,23 @@ import {
42
38
  type CheckpointProposalOptions,
43
39
  } from '@aztec/stdlib/p2p';
44
40
  import type { CheckpointHeader } from '@aztec/stdlib/rollup';
45
- import type { BlockHeader, CheckpointGlobalVariables, Tx } from '@aztec/stdlib/tx';
41
+ import type { BlockHeader, Tx } from '@aztec/stdlib/tx';
46
42
  import { AttestationTimeoutError } from '@aztec/stdlib/validators';
47
43
  import { type TelemetryClient, type Tracer, getTelemetryClient } from '@aztec/telemetry-client';
48
- import { createHASigner } from '@aztec/validator-ha-signer/factory';
49
- import { DutyType, type SigningContext } from '@aztec/validator-ha-signer/types';
44
+ import { createHASigner, createSignerFromSharedDb } from '@aztec/validator-ha-signer/factory';
45
+ import { DutyType, type SigningContext, type SlashingProtectionDatabase } from '@aztec/validator-ha-signer/types';
50
46
  import type { ValidatorHASigner } from '@aztec/validator-ha-signer/validator-ha-signer';
51
47
 
52
48
  import { EventEmitter } from 'events';
53
49
  import type { TypedDataDefinition } from 'viem';
54
50
 
55
- import { BlockProposalHandler, type BlockProposalValidationFailureReason } from './block_proposal_handler.js';
56
51
  import type { FullNodeCheckpointsBuilder } from './checkpoint_builder.js';
57
52
  import { ValidationService } from './duties/validation_service.js';
58
53
  import { HAKeyStore } from './key_store/ha_key_store.js';
59
54
  import type { ExtendedValidatorKeyStore } from './key_store/interface.js';
60
55
  import { NodeKeystoreAdapter } from './key_store/node_keystore_adapter.js';
61
56
  import { ValidatorMetrics } from './metrics.js';
57
+ import { type BlockProposalValidationFailureReason, ProposalHandler } from './proposal_handler.js';
62
58
 
63
59
  // We maintain a set of proposers who have proposed invalid blocks.
64
60
  // Just cap the set to avoid unbounded growth.
@@ -89,6 +85,8 @@ export class ValidatorClient extends (EventEmitter as new () => WatcherEmitter)
89
85
 
90
86
  private lastEpochForCommitteeUpdateLoop: EpochNumber | undefined;
91
87
  private epochCacheUpdateLoop: RunningPromise;
88
+ /** Tracks the last epoch in which each attester successfully submitted at least one attestation. */
89
+ private lastAttestedEpochByAttester: Map<string, EpochNumber> = new Map();
92
90
 
93
91
  private proposersOfInvalidBlocks: Set<string> = new Set();
94
92
 
@@ -99,11 +97,7 @@ export class ValidatorClient extends (EventEmitter as new () => WatcherEmitter)
99
97
  private keyStore: ExtendedValidatorKeyStore,
100
98
  private epochCache: EpochCache,
101
99
  private p2pClient: P2P,
102
- private blockProposalHandler: BlockProposalHandler,
103
- private blockSource: L2BlockSource,
104
- private checkpointsBuilder: FullNodeCheckpointsBuilder,
105
- private worldState: WorldStateSynchronizer,
106
- private l1ToL2MessageSource: L1ToL2MessageSource,
100
+ private proposalHandler: ProposalHandler,
107
101
  private config: ValidatorClientFullConfig,
108
102
  private blobClient: BlobClientInterface,
109
103
  private haSigner: ValidatorHASigner | undefined,
@@ -160,6 +154,7 @@ export class ValidatorClient extends (EventEmitter as new () => WatcherEmitter)
160
154
  this.log.trace(`No committee found for slot`);
161
155
  return;
162
156
  }
157
+ this.metrics.setCurrentEpoch(epoch);
163
158
  if (epoch !== this.lastEpochForCommitteeUpdateLoop) {
164
159
  const me = this.getValidatorAddresses();
165
160
  const committeeSet = new Set(committee.map(v => v.toString()));
@@ -193,12 +188,14 @@ export class ValidatorClient extends (EventEmitter as new () => WatcherEmitter)
193
188
  blobClient: BlobClientInterface,
194
189
  dateProvider: DateProvider = new DateProvider(),
195
190
  telemetry: TelemetryClient = getTelemetryClient(),
191
+ slashingProtectionDb?: SlashingProtectionDatabase,
196
192
  ) {
197
193
  const metrics = new ValidatorMetrics(telemetry);
198
194
  const blockProposalValidator = new BlockProposalValidator(epochCache, {
199
195
  txsPermitted: !config.disableTransactions,
196
+ maxTxsPerBlock: config.validateMaxTxsPerBlock,
200
197
  });
201
- const blockProposalHandler = new BlockProposalHandler(
198
+ const proposalHandler = new ProposalHandler(
202
199
  checkpointsBuilder,
203
200
  worldState,
204
201
  blockSource,
@@ -207,6 +204,7 @@ export class ValidatorClient extends (EventEmitter as new () => WatcherEmitter)
207
204
  blockProposalValidator,
208
205
  epochCache,
209
206
  config,
207
+ blobClient,
210
208
  metrics,
211
209
  dateProvider,
212
210
  telemetry,
@@ -215,7 +213,12 @@ export class ValidatorClient extends (EventEmitter as new () => WatcherEmitter)
215
213
  const nodeKeystoreAdapter = NodeKeystoreAdapter.fromKeyStoreManager(keyStoreManager);
216
214
  let validatorKeyStore: ExtendedValidatorKeyStore = nodeKeystoreAdapter;
217
215
  let haSigner: ValidatorHASigner | undefined;
218
- if (config.haSigningEnabled) {
216
+ if (slashingProtectionDb) {
217
+ // Shared database mode: use a pre-existing database (e.g. for testing HA setups).
218
+ const { signer } = createSignerFromSharedDb(slashingProtectionDb, config);
219
+ haSigner = signer;
220
+ validatorKeyStore = new HAKeyStore(nodeKeystoreAdapter, signer);
221
+ } else if (config.haSigningEnabled) {
219
222
  // If maxStuckDutiesAgeMs is not explicitly set, compute it from Aztec slot duration
220
223
  const haConfig = {
221
224
  ...config,
@@ -230,11 +233,7 @@ export class ValidatorClient extends (EventEmitter as new () => WatcherEmitter)
230
233
  validatorKeyStore,
231
234
  epochCache,
232
235
  p2pClient,
233
- blockProposalHandler,
234
- blockSource,
235
- checkpointsBuilder,
236
- worldState,
237
- l1ToL2MessageSource,
236
+ proposalHandler,
238
237
  config,
239
238
  blobClient,
240
239
  haSigner,
@@ -251,8 +250,8 @@ export class ValidatorClient extends (EventEmitter as new () => WatcherEmitter)
251
250
  .filter(addr => !this.config.disabledValidators.some(disabled => disabled.equals(addr)));
252
251
  }
253
252
 
254
- public getBlockProposalHandler() {
255
- return this.blockProposalHandler;
253
+ public getProposalHandler() {
254
+ return this.proposalHandler;
256
255
  }
257
256
 
258
257
  public signWithAddress(addr: EthAddress, msg: TypedDataDefinition, context: SigningContext) {
@@ -380,13 +379,12 @@ export class ValidatorClient extends (EventEmitter as new () => WatcherEmitter)
380
379
  return false;
381
380
  }
382
381
 
383
- // Ignore proposals from ourselves (may happen in HA setups)
382
+ // Log self-proposals from HA peers (same validator key on different nodes)
384
383
  if (this.getValidatorAddresses().some(addr => addr.equals(proposer))) {
385
- this.log.warn(`Ignoring block proposal from self for slot ${slotNumber}`, {
384
+ this.log.verbose(`Processing block proposal from HA peer for slot ${slotNumber}`, {
386
385
  proposer: proposer.toString(),
387
386
  slotNumber,
388
387
  });
389
- return false;
390
388
  }
391
389
 
392
390
  // Check if we're in the committee (for metrics purposes)
@@ -411,16 +409,17 @@ export class ValidatorClient extends (EventEmitter as new () => WatcherEmitter)
411
409
  alwaysReexecuteBlockProposals ||
412
410
  this.blobClient.canUpload();
413
411
 
414
- const validationResult = await this.blockProposalHandler.handleBlockProposal(
412
+ const validationResult = await this.proposalHandler.handleBlockProposal(
415
413
  proposal,
416
414
  proposalSender,
417
415
  !!shouldReexecute && !escapeHatchOpen,
418
416
  );
419
417
 
420
418
  if (!validationResult.isValid) {
421
- this.log.warn(`Block proposal validation failed: ${validationResult.reason}`, proposalInfo);
422
-
423
419
  const reason = validationResult.reason || 'unknown';
420
+
421
+ this.log.warn(`Block proposal validation failed: ${reason}`, proposalInfo);
422
+
424
423
  // Classify failure reason: bad proposal vs node issue
425
424
  const badProposalReasons: BlockProposalValidationFailureReason[] = [
426
425
  'invalid_proposal',
@@ -484,61 +483,40 @@ export class ValidatorClient extends (EventEmitter as new () => WatcherEmitter)
484
483
  return undefined;
485
484
  }
486
485
 
487
- // Reject proposals with invalid signatures
488
- if (!proposer) {
489
- this.log.warn(`Received checkpoint proposal with invalid signature for slot ${slotNumber}`);
490
- return undefined;
491
- }
492
-
493
486
  // Ignore proposals from ourselves (may happen in HA setups)
494
- if (this.getValidatorAddresses().some(addr => addr.equals(proposer))) {
495
- this.log.warn(`Ignoring block proposal from self for slot ${slotNumber}`, {
487
+ if (proposer && this.getValidatorAddresses().some(addr => addr.equals(proposer))) {
488
+ this.log.debug(`Ignoring block proposal from self for slot ${slotNumber}`, {
496
489
  proposer: proposer.toString(),
497
490
  slotNumber,
498
491
  });
499
492
  return undefined;
500
493
  }
501
494
 
502
- // Validate fee asset price modifier is within allowed range
503
- if (!validateFeeAssetPriceModifier(proposal.feeAssetPriceModifier)) {
504
- this.log.warn(
505
- `Received checkpoint proposal with invalid feeAssetPriceModifier ${proposal.feeAssetPriceModifier} for slot ${slotNumber}`,
506
- );
507
- return undefined;
508
- }
509
-
510
- // Check that I have any address in current committee before attesting
495
+ // Check that I have any address in the committee where this checkpoint will land before attesting
511
496
  const inCommittee = await this.epochCache.filterInCommittee(slotNumber, this.getValidatorAddresses());
512
497
  const partOfCommittee = inCommittee.length > 0;
513
498
 
514
499
  const proposalInfo = {
515
500
  slotNumber,
516
501
  archive: proposal.archive.toString(),
517
- proposer: proposer.toString(),
518
- txCount: proposal.txHashes.length,
502
+ proposer: proposer?.toString(),
519
503
  };
520
504
  this.log.info(`Received checkpoint proposal for slot ${slotNumber}`, {
521
505
  ...proposalInfo,
522
- txHashes: proposal.txHashes.map(t => t.toString()),
523
506
  fishermanMode: this.config.fishermanMode || false,
524
507
  });
525
508
 
526
- // Validate the checkpoint proposal before attesting (unless skipCheckpointProposalValidation is set)
509
+ // Validate the checkpoint proposal and upload blobs (unless skipCheckpointProposalValidation is set)
527
510
  if (this.config.skipCheckpointProposalValidation) {
528
511
  this.log.warn(`Skipping checkpoint proposal validation for slot ${slotNumber}`, proposalInfo);
529
512
  } else {
530
- const validationResult = await this.validateCheckpointProposal(proposal, proposalInfo);
513
+ const validationResult = await this.proposalHandler.handleCheckpointProposal(proposal, proposalInfo);
531
514
  if (!validationResult.isValid) {
532
515
  this.log.warn(`Checkpoint proposal validation failed: ${validationResult.reason}`, proposalInfo);
533
516
  return undefined;
534
517
  }
535
518
  }
536
519
 
537
- // Upload blobs to filestore if we can (fire and forget)
538
- if (this.blobClient.canUpload()) {
539
- void this.uploadBlobsForCheckpoint(proposal, proposalInfo);
540
- }
541
-
542
520
  // Check that I have any address in current committee before attesting
543
521
  // In fisherman mode, we still create attestations for validation even if not in committee
544
522
  if (!partOfCommittee && !this.config.fishermanMode) {
@@ -555,6 +533,17 @@ export class ValidatorClient extends (EventEmitter as new () => WatcherEmitter)
555
533
 
556
534
  this.metrics.incSuccessfulAttestations(inCommittee.length);
557
535
 
536
+ // Track epoch participation per attester: count each (attester, epoch) pair at most once
537
+ const proposalEpoch = getEpochAtSlot(slotNumber, this.epochCache.getL1Constants());
538
+ for (const attester of inCommittee) {
539
+ const key = attester.toString();
540
+ const lastEpoch = this.lastAttestedEpochByAttester.get(key);
541
+ if (lastEpoch === undefined || proposalEpoch > lastEpoch) {
542
+ this.lastAttestedEpochByAttester.set(key, proposalEpoch);
543
+ this.metrics.incAttestedEpochCount(attester);
544
+ }
545
+ }
546
+
558
547
  // Determine which validators should attest
559
548
  let attestors: EthAddress[];
560
549
  if (partOfCommittee) {
@@ -622,187 +611,6 @@ export class ValidatorClient extends (EventEmitter as new () => WatcherEmitter)
622
611
  return attestations;
623
612
  }
624
613
 
625
- /**
626
- * Validates a checkpoint proposal by building the full checkpoint and comparing it with the proposal.
627
- * @returns Validation result with isValid flag and reason if invalid.
628
- */
629
- private async validateCheckpointProposal(
630
- proposal: CheckpointProposalCore,
631
- proposalInfo: LogData,
632
- ): Promise<{ isValid: true } | { isValid: false; reason: string }> {
633
- const slot = proposal.slotNumber;
634
-
635
- // Timeout block syncing at the start of the next slot
636
- const config = this.checkpointsBuilder.getConfig();
637
- const nextSlotTimestampSeconds = Number(getTimestampForSlot(SlotNumber(slot + 1), config));
638
- const timeoutSeconds = Math.max(1, nextSlotTimestampSeconds - Math.floor(this.dateProvider.now() / 1000));
639
-
640
- // Wait for last block to sync by archive
641
- let lastBlockHeader: BlockHeader | undefined;
642
- try {
643
- lastBlockHeader = await retryUntil(
644
- async () => {
645
- await this.blockSource.syncImmediate();
646
- return this.blockSource.getBlockHeaderByArchive(proposal.archive);
647
- },
648
- `waiting for block with archive ${proposal.archive.toString()} for slot ${slot}`,
649
- timeoutSeconds,
650
- 0.5,
651
- );
652
- } catch (err) {
653
- if (err instanceof TimeoutError) {
654
- this.log.warn(`Timed out waiting for block with archive matching checkpoint proposal`, proposalInfo);
655
- return { isValid: false, reason: 'last_block_not_found' };
656
- }
657
- this.log.error(`Error fetching last block for checkpoint proposal`, err, proposalInfo);
658
- return { isValid: false, reason: 'block_fetch_error' };
659
- }
660
-
661
- if (!lastBlockHeader) {
662
- this.log.warn(`Last block not found for checkpoint proposal`, proposalInfo);
663
- return { isValid: false, reason: 'last_block_not_found' };
664
- }
665
-
666
- // Get all full blocks for the slot and checkpoint
667
- const blocks = await this.blockSource.getBlocksForSlot(slot);
668
- if (blocks.length === 0) {
669
- this.log.warn(`No blocks found for slot ${slot}`, proposalInfo);
670
- return { isValid: false, reason: 'no_blocks_for_slot' };
671
- }
672
-
673
- // Ensure the last block for this slot matches the archive in the checkpoint proposal
674
- if (!blocks.at(-1)?.archive.root.equals(proposal.archive)) {
675
- this.log.warn(`Last block archive mismatch for checkpoint proposal`, proposalInfo);
676
- return { isValid: false, reason: 'last_block_archive_mismatch' };
677
- }
678
-
679
- this.log.debug(`Found ${blocks.length} blocks for slot ${slot}`, {
680
- ...proposalInfo,
681
- blockNumbers: blocks.map(b => b.number),
682
- });
683
-
684
- // Get checkpoint constants from first block
685
- const firstBlock = blocks[0];
686
- const constants = this.extractCheckpointConstants(firstBlock);
687
- const checkpointNumber = firstBlock.checkpointNumber;
688
-
689
- // Get L1-to-L2 messages for this checkpoint
690
- const l1ToL2Messages = await this.l1ToL2MessageSource.getL1ToL2Messages(checkpointNumber);
691
-
692
- // Collect the out hashes of all the checkpoints before this one in the same epoch
693
- const epoch = getEpochAtSlot(slot, this.epochCache.getL1Constants());
694
- const previousCheckpointOutHashes = (await this.blockSource.getCheckpointsDataForEpoch(epoch))
695
- .filter(c => c.checkpointNumber < checkpointNumber)
696
- .map(c => c.checkpointOutHash);
697
-
698
- // Fork world state at the block before the first block
699
- const parentBlockNumber = BlockNumber(firstBlock.number - 1);
700
- const fork = await this.worldState.fork(parentBlockNumber);
701
-
702
- try {
703
- // Create checkpoint builder with all existing blocks
704
- const checkpointBuilder = await this.checkpointsBuilder.openCheckpoint(
705
- checkpointNumber,
706
- constants,
707
- proposal.feeAssetPriceModifier,
708
- l1ToL2Messages,
709
- previousCheckpointOutHashes,
710
- fork,
711
- blocks,
712
- this.log.getBindings(),
713
- );
714
-
715
- // Complete the checkpoint to get computed values
716
- const computedCheckpoint = await checkpointBuilder.completeCheckpoint();
717
-
718
- // Compare checkpoint header with proposal
719
- if (!computedCheckpoint.header.equals(proposal.checkpointHeader)) {
720
- this.log.warn(`Checkpoint header mismatch`, {
721
- ...proposalInfo,
722
- computed: computedCheckpoint.header.toInspect(),
723
- proposal: proposal.checkpointHeader.toInspect(),
724
- });
725
- return { isValid: false, reason: 'checkpoint_header_mismatch' };
726
- }
727
-
728
- // Compare archive root with proposal
729
- if (!computedCheckpoint.archive.root.equals(proposal.archive)) {
730
- this.log.warn(`Archive root mismatch`, {
731
- ...proposalInfo,
732
- computed: computedCheckpoint.archive.root.toString(),
733
- proposal: proposal.archive.toString(),
734
- });
735
- return { isValid: false, reason: 'archive_mismatch' };
736
- }
737
-
738
- // Check that the accumulated epoch out hash matches the value in the proposal.
739
- // The epoch out hash is the accumulated hash of all checkpoint out hashes in the epoch.
740
- const checkpointOutHash = computedCheckpoint.getCheckpointOutHash();
741
- const computedEpochOutHash = accumulateCheckpointOutHashes([...previousCheckpointOutHashes, checkpointOutHash]);
742
- const proposalEpochOutHash = proposal.checkpointHeader.epochOutHash;
743
- if (!computedEpochOutHash.equals(proposalEpochOutHash)) {
744
- this.log.warn(`Epoch out hash mismatch`, {
745
- proposalEpochOutHash: proposalEpochOutHash.toString(),
746
- computedEpochOutHash: computedEpochOutHash.toString(),
747
- checkpointOutHash: checkpointOutHash.toString(),
748
- previousCheckpointOutHashes: previousCheckpointOutHashes.map(h => h.toString()),
749
- ...proposalInfo,
750
- });
751
- return { isValid: false, reason: 'out_hash_mismatch' };
752
- }
753
-
754
- this.log.verbose(`Checkpoint proposal validation successful for slot ${slot}`, proposalInfo);
755
- return { isValid: true };
756
- } finally {
757
- await fork.close();
758
- }
759
- }
760
-
761
- /**
762
- * Extract checkpoint global variables from a block.
763
- */
764
- private extractCheckpointConstants(block: L2Block): CheckpointGlobalVariables {
765
- const gv = block.header.globalVariables;
766
- return {
767
- chainId: gv.chainId,
768
- version: gv.version,
769
- slotNumber: gv.slotNumber,
770
- timestamp: gv.timestamp,
771
- coinbase: gv.coinbase,
772
- feeRecipient: gv.feeRecipient,
773
- gasFees: gv.gasFees,
774
- };
775
- }
776
-
777
- /**
778
- * Uploads blobs for a checkpoint to the filestore (fire and forget).
779
- */
780
- protected async uploadBlobsForCheckpoint(proposal: CheckpointProposalCore, proposalInfo: LogData): Promise<void> {
781
- try {
782
- const lastBlockHeader = await this.blockSource.getBlockHeaderByArchive(proposal.archive);
783
- if (!lastBlockHeader) {
784
- this.log.warn(`Failed to get last block header for blob upload`, proposalInfo);
785
- return;
786
- }
787
-
788
- const blocks = await this.blockSource.getBlocksForSlot(proposal.slotNumber);
789
- if (blocks.length === 0) {
790
- this.log.warn(`No blocks found for blob upload`, proposalInfo);
791
- return;
792
- }
793
-
794
- const blobFields = blocks.flatMap(b => b.toBlobFields());
795
- const blobs: Blob[] = await getBlobsPerL1Block(blobFields);
796
- await this.blobClient.sendBlobsToFilestore(blobs);
797
- this.log.debug(`Uploaded ${blobs.length} blobs to filestore for checkpoint at slot ${proposal.slotNumber}`, {
798
- ...proposalInfo,
799
- numBlobs: blobs.length,
800
- });
801
- } catch (err) {
802
- this.log.warn(`Failed to upload blobs for checkpoint: ${err}`, proposalInfo);
803
- }
804
- }
805
-
806
614
  private slashInvalidBlock(proposal: BlockProposal) {
807
615
  const proposer = proposal.getSender();
808
616
 
@@ -1,63 +0,0 @@
1
- import type { EpochCache } from '@aztec/epoch-cache';
2
- import { BlockNumber, CheckpointNumber } from '@aztec/foundation/branded-types';
3
- import { Fr } from '@aztec/foundation/curves/bn254';
4
- import { DateProvider } from '@aztec/foundation/timer';
5
- import type { P2P, PeerId } from '@aztec/p2p';
6
- import { BlockProposalValidator } from '@aztec/p2p/msg_validators';
7
- import type { L2Block, L2BlockSink, L2BlockSource } from '@aztec/stdlib/block';
8
- import type { ITxProvider, ValidatorClientFullConfig, WorldStateSynchronizer } from '@aztec/stdlib/interfaces/server';
9
- import { type L1ToL2MessageSource } from '@aztec/stdlib/messaging';
10
- import type { BlockProposal } from '@aztec/stdlib/p2p';
11
- import type { FailedTx, Tx } from '@aztec/stdlib/tx';
12
- import { type TelemetryClient, type Tracer } from '@aztec/telemetry-client';
13
- import type { FullNodeCheckpointsBuilder } from './checkpoint_builder.js';
14
- import type { ValidatorMetrics } from './metrics.js';
15
- export type BlockProposalValidationFailureReason = 'invalid_proposal' | 'parent_block_not_found' | 'parent_block_wrong_slot' | 'in_hash_mismatch' | 'global_variables_mismatch' | 'block_number_already_exists' | 'txs_not_available' | 'state_mismatch' | 'failed_txs' | 'timeout' | 'unknown_error';
16
- type ReexecuteTransactionsResult = {
17
- block: L2Block;
18
- failedTxs: FailedTx[];
19
- reexecutionTimeMs: number;
20
- totalManaUsed: number;
21
- };
22
- export type BlockProposalValidationSuccessResult = {
23
- isValid: true;
24
- blockNumber: BlockNumber;
25
- reexecutionResult?: ReexecuteTransactionsResult;
26
- };
27
- export type BlockProposalValidationFailureResult = {
28
- isValid: false;
29
- reason: BlockProposalValidationFailureReason;
30
- blockNumber?: BlockNumber;
31
- reexecutionResult?: ReexecuteTransactionsResult;
32
- };
33
- export type BlockProposalValidationResult = BlockProposalValidationSuccessResult | BlockProposalValidationFailureResult;
34
- export declare class BlockProposalHandler {
35
- private checkpointsBuilder;
36
- private worldState;
37
- private blockSource;
38
- private l1ToL2MessageSource;
39
- private txProvider;
40
- private blockProposalValidator;
41
- private epochCache;
42
- private config;
43
- private metrics?;
44
- private dateProvider;
45
- private log;
46
- readonly tracer: Tracer;
47
- constructor(checkpointsBuilder: FullNodeCheckpointsBuilder, worldState: WorldStateSynchronizer, blockSource: L2BlockSource & L2BlockSink, l1ToL2MessageSource: L1ToL2MessageSource, txProvider: ITxProvider, blockProposalValidator: BlockProposalValidator, epochCache: EpochCache, config: ValidatorClientFullConfig, metrics?: ValidatorMetrics | undefined, dateProvider?: DateProvider, telemetry?: TelemetryClient, log?: import("@aztec/foundation/log").Logger);
48
- registerForReexecution(p2pClient: P2P): BlockProposalHandler;
49
- handleBlockProposal(proposal: BlockProposal, proposalSender: PeerId, shouldReexecute: boolean): Promise<BlockProposalValidationResult>;
50
- private getParentBlock;
51
- private computeCheckpointNumber;
52
- /**
53
- * Validates that a non-first block in a checkpoint has consistent global variables with its parent.
54
- * For blocks with indexWithinCheckpoint > 0, all global variables except blockNumber must match the parent.
55
- * @returns A failure result if validation fails, undefined if validation passes
56
- */
57
- private validateNonFirstBlockInCheckpoint;
58
- private getReexecutionDeadline;
59
- private getReexecuteFailureReason;
60
- reexecuteTransactions(proposal: BlockProposal, blockNumber: BlockNumber, checkpointNumber: CheckpointNumber, txs: Tx[], l1ToL2Messages: Fr[], previousCheckpointOutHashes: Fr[]): Promise<ReexecuteTransactionsResult>;
61
- }
62
- export {};
63
- //# sourceMappingURL=data:application/json;base64,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
@@ -1 +0,0 @@
1
- {"version":3,"file":"block_proposal_handler.d.ts","sourceRoot":"","sources":["../src/block_proposal_handler.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,UAAU,EAAE,MAAM,oBAAoB,CAAC;AACrD,OAAO,EAAE,WAAW,EAAE,gBAAgB,EAAc,MAAM,iCAAiC,CAAC;AAC5F,OAAO,EAAE,EAAE,EAAE,MAAM,gCAAgC,CAAC;AAIpD,OAAO,EAAE,YAAY,EAAS,MAAM,yBAAyB,CAAC;AAC9D,OAAO,KAAK,EAAE,GAAG,EAAE,MAAM,EAAE,MAAM,YAAY,CAAC;AAC9C,OAAO,EAAE,sBAAsB,EAAE,MAAM,2BAA2B,CAAC;AACnE,OAAO,KAAK,EAAa,OAAO,EAAE,WAAW,EAAE,aAAa,EAAE,MAAM,qBAAqB,CAAC;AAE1F,OAAO,KAAK,EAAE,WAAW,EAAE,yBAAyB,EAAE,sBAAsB,EAAE,MAAM,iCAAiC,CAAC;AACtH,OAAO,EAAE,KAAK,mBAAmB,EAAmC,MAAM,yBAAyB,CAAC;AACpG,OAAO,KAAK,EAAE,aAAa,EAAE,MAAM,mBAAmB,CAAC;AACvD,OAAO,KAAK,EAA6B,QAAQ,EAAE,EAAE,EAAE,MAAM,kBAAkB,CAAC;AAOhF,OAAO,EAAE,KAAK,eAAe,EAAE,KAAK,MAAM,EAAsB,MAAM,yBAAyB,CAAC;AAEhG,OAAO,KAAK,EAAE,0BAA0B,EAAE,MAAM,yBAAyB,CAAC;AAC1E,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,cAAc,CAAC;AAErD,MAAM,MAAM,oCAAoC,GAC5C,kBAAkB,GAClB,wBAAwB,GACxB,yBAAyB,GACzB,kBAAkB,GAClB,2BAA2B,GAC3B,6BAA6B,GAC7B,mBAAmB,GACnB,gBAAgB,GAChB,YAAY,GACZ,SAAS,GACT,eAAe,CAAC;AAEpB,KAAK,2BAA2B,GAAG;IACjC,KAAK,EAAE,OAAO,CAAC;IACf,SAAS,EAAE,QAAQ,EAAE,CAAC;IACtB,iBAAiB,EAAE,MAAM,CAAC;IAC1B,aAAa,EAAE,MAAM,CAAC;CACvB,CAAC;AAEF,MAAM,MAAM,oCAAoC,GAAG;IACjD,OAAO,EAAE,IAAI,CAAC;IACd,WAAW,EAAE,WAAW,CAAC;IACzB,iBAAiB,CAAC,EAAE,2BAA2B,CAAC;CACjD,CAAC;AAEF,MAAM,MAAM,oCAAoC,GAAG;IACjD,OAAO,EAAE,KAAK,CAAC;IACf,MAAM,EAAE,oCAAoC,CAAC;IAC7C,WAAW,CAAC,EAAE,WAAW,CAAC;IAC1B,iBAAiB,CAAC,EAAE,2BAA2B,CAAC;CACjD,CAAC;AAEF,MAAM,MAAM,6BAA6B,GAAG,oCAAoC,GAAG,oCAAoC,CAAC;AAMxH,qBAAa,oBAAoB;IAI7B,OAAO,CAAC,kBAAkB;IAC1B,OAAO,CAAC,UAAU;IAClB,OAAO,CAAC,WAAW;IACnB,OAAO,CAAC,mBAAmB;IAC3B,OAAO,CAAC,UAAU;IAClB,OAAO,CAAC,sBAAsB;IAC9B,OAAO,CAAC,UAAU;IAClB,OAAO,CAAC,MAAM;IACd,OAAO,CAAC,OAAO,CAAC;IAChB,OAAO,CAAC,YAAY;IAEpB,OAAO,CAAC,GAAG;IAdb,SAAgB,MAAM,EAAE,MAAM,CAAC;IAE/B,YACU,kBAAkB,EAAE,0BAA0B,EAC9C,UAAU,EAAE,sBAAsB,EAClC,WAAW,EAAE,aAAa,GAAG,WAAW,EACxC,mBAAmB,EAAE,mBAAmB,EACxC,UAAU,EAAE,WAAW,EACvB,sBAAsB,EAAE,sBAAsB,EAC9C,UAAU,EAAE,UAAU,EACtB,MAAM,EAAE,yBAAyB,EACjC,OAAO,CAAC,8BAAkB,EAC1B,YAAY,GAAE,YAAiC,EACvD,SAAS,GAAE,eAAsC,EACzC,GAAG,yCAAmD,EAM/D;IAED,sBAAsB,CAAC,SAAS,EAAE,GAAG,GAAG,oBAAoB,CA6B3D;IAEK,mBAAmB,CACvB,QAAQ,EAAE,aAAa,EACvB,cAAc,EAAE,MAAM,EACtB,eAAe,EAAE,OAAO,GACvB,OAAO,CAAC,6BAA6B,CAAC,CA6HxC;YAEa,cAAc;IAoC5B,OAAO,CAAC,uBAAuB;IA0C/B;;;;OAIG;IACH,OAAO,CAAC,iCAAiC;IA4EzC,OAAO,CAAC,sBAAsB;IAK9B,OAAO,CAAC,yBAAyB;IAY3B,qBAAqB,CACzB,QAAQ,EAAE,aAAa,EACvB,WAAW,EAAE,WAAW,EACxB,gBAAgB,EAAE,gBAAgB,EAClC,GAAG,EAAE,EAAE,EAAE,EACT,cAAc,EAAE,EAAE,EAAE,EACpB,2BAA2B,EAAE,EAAE,EAAE,GAChC,OAAO,CAAC,2BAA2B,CAAC,CAmGtC;CACF"}
@@ -1,3 +0,0 @@
1
- export * from './nullifier_cache.js';
2
- export * from './tx_validator_factory.js';
3
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguZC50cyIsInNvdXJjZVJvb3QiOiIiLCJzb3VyY2VzIjpbIi4uLy4uL3NyYy90eF92YWxpZGF0b3IvaW5kZXgudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IkFBQUEsY0FBYyxzQkFBc0IsQ0FBQztBQUNyQyxjQUFjLDJCQUEyQixDQUFDIn0=
@@ -1 +0,0 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/tx_validator/index.ts"],"names":[],"mappings":"AAAA,cAAc,sBAAsB,CAAC;AACrC,cAAc,2BAA2B,CAAC"}
@@ -1,2 +0,0 @@
1
- export * from './nullifier_cache.js';
2
- export * from './tx_validator_factory.js';
@@ -1,14 +0,0 @@
1
- import type { NullifierSource } from '@aztec/p2p';
2
- import type { MerkleTreeReadOperations } from '@aztec/stdlib/interfaces/server';
3
- /**
4
- * Implements a nullifier source by checking a DB and an in-memory collection.
5
- * Intended for validating transactions as they are added to a block.
6
- */
7
- export declare class NullifierCache implements NullifierSource {
8
- private db;
9
- nullifiers: Set<string>;
10
- constructor(db: MerkleTreeReadOperations);
11
- nullifiersExist(nullifiers: Buffer[]): Promise<boolean[]>;
12
- addNullifiers(nullifiers: Buffer[]): void;
13
- }
14
- //# sourceMappingURL=data:application/json;base64,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
@@ -1 +0,0 @@
1
- {"version":3,"file":"nullifier_cache.d.ts","sourceRoot":"","sources":["../../src/tx_validator/nullifier_cache.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,YAAY,CAAC;AAClD,OAAO,KAAK,EAAE,wBAAwB,EAAE,MAAM,iCAAiC,CAAC;AAGhF;;;GAGG;AACH,qBAAa,cAAe,YAAW,eAAe;IAGxC,OAAO,CAAC,EAAE;IAFtB,UAAU,EAAE,GAAG,CAAC,MAAM,CAAC,CAAC;IAExB,YAAoB,EAAE,EAAE,wBAAwB,EAE/C;IAEY,eAAe,CAAC,UAAU,EAAE,MAAM,EAAE,GAAG,OAAO,CAAC,OAAO,EAAE,CAAC,CAOrE;IAEM,aAAa,CAAC,UAAU,EAAE,MAAM,EAAE,QAIxC;CACF"}
@@ -1,24 +0,0 @@
1
- import { MerkleTreeId } from '@aztec/stdlib/trees';
2
- /**
3
- * Implements a nullifier source by checking a DB and an in-memory collection.
4
- * Intended for validating transactions as they are added to a block.
5
- */ export class NullifierCache {
6
- db;
7
- nullifiers;
8
- constructor(db){
9
- this.db = db;
10
- this.nullifiers = new Set();
11
- }
12
- async nullifiersExist(nullifiers) {
13
- const cacheResults = nullifiers.map((n)=>this.nullifiers.has(n.toString()));
14
- const toCheckDb = nullifiers.filter((_n, index)=>!cacheResults[index]);
15
- const dbHits = await this.db.findLeafIndices(MerkleTreeId.NULLIFIER_TREE, toCheckDb);
16
- let dbIndex = 0;
17
- return nullifiers.map((_n, index)=>cacheResults[index] || dbHits[dbIndex++] !== undefined);
18
- }
19
- addNullifiers(nullifiers) {
20
- for (const nullifier of nullifiers){
21
- this.nullifiers.add(nullifier.toString());
22
- }
23
- }
24
- }
@@ -1,19 +0,0 @@
1
- import { BlockNumber } from '@aztec/foundation/branded-types';
2
- import type { LoggerBindings } from '@aztec/foundation/log';
3
- import type { ContractDataSource } from '@aztec/stdlib/contract';
4
- import type { GasFees } from '@aztec/stdlib/gas';
5
- import type { AllowedElement, ClientProtocolCircuitVerifier, MerkleTreeReadOperations, PublicProcessorValidator } from '@aztec/stdlib/interfaces/server';
6
- import { GlobalVariables, type Tx, type TxValidator } from '@aztec/stdlib/tx';
7
- import type { UInt64 } from '@aztec/stdlib/types';
8
- export declare function createValidatorForAcceptingTxs(db: MerkleTreeReadOperations, contractDataSource: ContractDataSource, verifier: ClientProtocolCircuitVerifier | undefined, { l1ChainId, rollupVersion, setupAllowList, gasFees, skipFeeEnforcement, timestamp, blockNumber, txsPermitted }: {
9
- l1ChainId: number;
10
- rollupVersion: number;
11
- setupAllowList: AllowedElement[];
12
- gasFees: GasFees;
13
- skipFeeEnforcement?: boolean;
14
- timestamp: UInt64;
15
- blockNumber: BlockNumber;
16
- txsPermitted: boolean;
17
- }, bindings?: LoggerBindings): TxValidator<Tx>;
18
- export declare function createValidatorForBlockBuilding(db: MerkleTreeReadOperations, contractDataSource: ContractDataSource, globalVariables: GlobalVariables, setupAllowList: AllowedElement[], bindings?: LoggerBindings): PublicProcessorValidator;
19
- //# sourceMappingURL=data:application/json;base64,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
@@ -1 +0,0 @@
1
- {"version":3,"file":"tx_validator_factory.d.ts","sourceRoot":"","sources":["../../src/tx_validator/tx_validator_factory.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,WAAW,EAAE,MAAM,iCAAiC,CAAC;AAE9D,OAAO,KAAK,EAAE,cAAc,EAAE,MAAM,uBAAuB,CAAC;AAiB5D,OAAO,KAAK,EAAE,kBAAkB,EAAE,MAAM,wBAAwB,CAAC;AACjE,OAAO,KAAK,EAAE,OAAO,EAAE,MAAM,mBAAmB,CAAC;AACjD,OAAO,KAAK,EACV,cAAc,EACd,6BAA6B,EAC7B,wBAAwB,EACxB,wBAAwB,EACzB,MAAM,iCAAiC,CAAC;AAEzC,OAAO,EAAE,eAAe,EAAE,KAAK,EAAE,EAAE,KAAK,WAAW,EAAE,MAAM,kBAAkB,CAAC;AAC9E,OAAO,KAAK,EAAE,MAAM,EAAE,MAAM,qBAAqB,CAAC;AAIlD,wBAAgB,8BAA8B,CAC5C,EAAE,EAAE,wBAAwB,EAC5B,kBAAkB,EAAE,kBAAkB,EACtC,QAAQ,EAAE,6BAA6B,GAAG,SAAS,EACnD,EACE,SAAS,EACT,aAAa,EACb,cAAc,EACd,OAAO,EACP,kBAAkB,EAClB,SAAS,EACT,WAAW,EACX,YAAY,EACb,EAAE;IACD,SAAS,EAAE,MAAM,CAAC;IAClB,aAAa,EAAE,MAAM,CAAC;IACtB,cAAc,EAAE,cAAc,EAAE,CAAC;IACjC,OAAO,EAAE,OAAO,CAAC;IACjB,kBAAkB,CAAC,EAAE,OAAO,CAAC;IAC7B,SAAS,EAAE,MAAM,CAAC;IAClB,WAAW,EAAE,WAAW,CAAC;IACzB,YAAY,EAAE,OAAO,CAAC;CACvB,EACD,QAAQ,CAAC,EAAE,cAAc,GACxB,WAAW,CAAC,EAAE,CAAC,CAqCjB;AAED,wBAAgB,+BAA+B,CAC7C,EAAE,EAAE,wBAAwB,EAC5B,kBAAkB,EAAE,kBAAkB,EACtC,eAAe,EAAE,eAAe,EAChC,cAAc,EAAE,cAAc,EAAE,EAChC,QAAQ,CAAC,EAAE,cAAc,GACxB,wBAAwB,CAiB1B"}