@aztec/validator-ha-signer 0.0.1-commit.b468ad8 → 0.0.1-commit.b6e433891

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (46) hide show
  1. package/README.md +10 -2
  2. package/dest/db/index.d.ts +2 -1
  3. package/dest/db/index.d.ts.map +1 -1
  4. package/dest/db/index.js +1 -0
  5. package/dest/db/lmdb.d.ts +66 -0
  6. package/dest/db/lmdb.d.ts.map +1 -0
  7. package/dest/db/lmdb.js +188 -0
  8. package/dest/db/postgres.d.ts +20 -4
  9. package/dest/db/postgres.d.ts.map +1 -1
  10. package/dest/db/postgres.js +44 -17
  11. package/dest/db/schema.d.ts +17 -10
  12. package/dest/db/schema.d.ts.map +1 -1
  13. package/dest/db/schema.js +39 -22
  14. package/dest/db/types.d.ts +43 -19
  15. package/dest/db/types.d.ts.map +1 -1
  16. package/dest/db/types.js +30 -15
  17. package/dest/factory.d.ts +39 -4
  18. package/dest/factory.d.ts.map +1 -1
  19. package/dest/factory.js +75 -5
  20. package/dest/metrics.d.ts +51 -0
  21. package/dest/metrics.d.ts.map +1 -0
  22. package/dest/metrics.js +103 -0
  23. package/dest/slashing_protection_service.d.ts +19 -6
  24. package/dest/slashing_protection_service.d.ts.map +1 -1
  25. package/dest/slashing_protection_service.js +57 -17
  26. package/dest/types.d.ts +32 -72
  27. package/dest/types.d.ts.map +1 -1
  28. package/dest/types.js +3 -20
  29. package/dest/validator_ha_signer.d.ts +15 -6
  30. package/dest/validator_ha_signer.d.ts.map +1 -1
  31. package/dest/validator_ha_signer.js +24 -11
  32. package/package.json +10 -5
  33. package/src/db/index.ts +1 -0
  34. package/src/db/lmdb.ts +264 -0
  35. package/src/db/postgres.ts +45 -12
  36. package/src/db/schema.ts +41 -22
  37. package/src/db/types.ts +67 -17
  38. package/src/factory.ts +93 -4
  39. package/src/metrics.ts +138 -0
  40. package/src/slashing_protection_service.ts +79 -21
  41. package/src/types.ts +50 -103
  42. package/src/validator_ha_signer.ts +41 -15
  43. package/dest/config.d.ts +0 -79
  44. package/dest/config.d.ts.map +0 -1
  45. package/dest/config.js +0 -73
  46. package/src/config.ts +0 -125
@@ -5,9 +5,8 @@
5
5
  * This ensures that even with multiple validator nodes running, only one
6
6
  * node will sign for a given duty (slot + duty type).
7
7
  */ import { createLogger } from '@aztec/foundation/log';
8
- import { DutyType } from './db/types.js';
8
+ import { DutyType, getBlockNumberFromSigningContext } from '@aztec/stdlib/ha-signing';
9
9
  import { SlashingProtectionService } from './slashing_protection_service.js';
10
- import { getBlockNumberFromSigningContext } from './types.js';
11
10
  /**
12
11
  * Validator High Availability Signer
13
12
  *
@@ -30,19 +29,25 @@ import { getBlockNumberFromSigningContext } from './types.js';
30
29
  config;
31
30
  log;
32
31
  slashingProtection;
33
- constructor(db, config){
32
+ rollupAddress;
33
+ dateProvider;
34
+ metrics;
35
+ constructor(db, config, deps){
34
36
  this.config = config;
35
37
  this.log = createLogger('validator-ha-signer');
36
- if (!config.haSigningEnabled) {
37
- // this shouldn't happen, the validator should use different signer for non-HA setups
38
- throw new Error('Validator HA Signer is not enabled in config');
39
- }
38
+ this.metrics = deps.metrics;
39
+ this.dateProvider = deps.dateProvider;
40
40
  if (!config.nodeId || config.nodeId === '') {
41
41
  throw new Error('NODE_ID is required for high-availability setups');
42
42
  }
43
- this.slashingProtection = new SlashingProtectionService(db, config);
43
+ this.rollupAddress = config.l1Contracts.rollupAddress;
44
+ this.slashingProtection = new SlashingProtectionService(db, config, {
45
+ metrics: deps.metrics,
46
+ dateProvider: deps.dateProvider
47
+ });
44
48
  this.log.info('Validator HA Signer initialized with slashing protection', {
45
- nodeId: config.nodeId
49
+ nodeId: config.nodeId,
50
+ rollupAddress: this.rollupAddress.toString()
46
51
  });
47
52
  }
48
53
  /**
@@ -62,9 +67,12 @@ import { getBlockNumberFromSigningContext } from './types.js';
62
67
  * @throws DutyAlreadySignedError if the duty was already signed (expected in HA)
63
68
  * @throws SlashingProtectionError if attempting to sign different data for same slot (expected in HA)
64
69
  */ async signWithProtection(validatorAddress, messageHash, context, signFn) {
70
+ const startTime = this.dateProvider.now();
71
+ const dutyType = context.dutyType;
65
72
  let dutyIdentifier;
66
73
  if (context.dutyType === DutyType.BLOCK_PROPOSAL) {
67
74
  dutyIdentifier = {
75
+ rollupAddress: this.rollupAddress,
68
76
  validatorAddress,
69
77
  slot: context.slot,
70
78
  blockIndexWithinCheckpoint: context.blockIndexWithinCheckpoint,
@@ -72,12 +80,14 @@ import { getBlockNumberFromSigningContext } from './types.js';
72
80
  };
73
81
  } else {
74
82
  dutyIdentifier = {
83
+ rollupAddress: this.rollupAddress,
75
84
  validatorAddress,
76
85
  slot: context.slot,
77
86
  dutyType: context.dutyType
78
87
  };
79
88
  }
80
89
  // Acquire lock and get the token for ownership verification
90
+ // DutyAlreadySignedError and SlashingProtectionError may be thrown here and are recorded in the service
81
91
  const blockNumber = getBlockNumberFromSigningContext(context);
82
92
  const lockToken = await this.slashingProtection.checkAndRecord({
83
93
  ...dutyIdentifier,
@@ -95,6 +105,7 @@ import { getBlockNumberFromSigningContext } from './types.js';
95
105
  ...dutyIdentifier,
96
106
  lockToken
97
107
  });
108
+ this.metrics.recordSigningError(dutyType);
98
109
  throw error;
99
110
  }
100
111
  // Record success (only succeeds if we own the lock)
@@ -104,6 +115,8 @@ import { getBlockNumberFromSigningContext } from './types.js';
104
115
  nodeId: this.config.nodeId,
105
116
  lockToken
106
117
  });
118
+ const duration = this.dateProvider.now() - startTime;
119
+ this.metrics.recordSigningSuccess(dutyType, duration);
107
120
  return signature;
108
121
  }
109
122
  /**
@@ -114,8 +127,8 @@ import { getBlockNumberFromSigningContext } from './types.js';
114
127
  /**
115
128
  * Start the HA signer background tasks (cleanup of stuck duties).
116
129
  * Should be called after construction and before signing operations.
117
- */ start() {
118
- this.slashingProtection.start();
130
+ */ async start() {
131
+ await this.slashingProtection.start();
119
132
  }
120
133
  /**
121
134
  * Stop the HA signer background tasks and close database connection.
package/package.json CHANGED
@@ -1,24 +1,25 @@
1
1
  {
2
2
  "name": "@aztec/validator-ha-signer",
3
- "version": "0.0.1-commit.b468ad8",
3
+ "version": "0.0.1-commit.b6e433891",
4
4
  "type": "module",
5
5
  "exports": {
6
- "./config": "./dest/config.js",
7
6
  "./db": "./dest/db/index.js",
8
7
  "./errors": "./dest/errors.js",
9
8
  "./factory": "./dest/factory.js",
9
+ "./metrics": "./dest/metrics.js",
10
10
  "./migrations": "./dest/migrations.js",
11
11
  "./slashing-protection-service": "./dest/slashing_protection_service.js",
12
12
  "./types": "./dest/types.js",
13
13
  "./validator-ha-signer": "./dest/validator_ha_signer.js",
14
- "./test": "./dest/test/pglite_pool.js"
14
+ "./test": "./dest/test/pglite_pool.js",
15
+ "./db/lmdb": "./dest/db/lmdb.js"
15
16
  },
16
17
  "typedocOptions": {
17
18
  "entryPoints": [
18
- "./src/config.ts",
19
19
  "./src/db/index.ts",
20
20
  "./src/errors.ts",
21
21
  "./src/factory.ts",
22
+ "./src/metrics.ts",
22
23
  "./src/migrations.ts",
23
24
  "./src/slashing_protection_service.ts",
24
25
  "./src/types.ts",
@@ -74,7 +75,11 @@
74
75
  ]
75
76
  },
76
77
  "dependencies": {
77
- "@aztec/foundation": "0.0.1-commit.b468ad8",
78
+ "@aztec/ethereum": "0.0.1-commit.b6e433891",
79
+ "@aztec/foundation": "0.0.1-commit.b6e433891",
80
+ "@aztec/kv-store": "0.0.1-commit.b6e433891",
81
+ "@aztec/stdlib": "0.0.1-commit.b6e433891",
82
+ "@aztec/telemetry-client": "0.0.1-commit.b6e433891",
78
83
  "node-pg-migrate": "^8.0.4",
79
84
  "pg": "^8.11.3",
80
85
  "tslib": "^2.4.0",
package/src/db/index.ts CHANGED
@@ -1,3 +1,4 @@
1
1
  export * from './types.js';
2
2
  export * from './schema.js';
3
3
  export * from './postgres.js';
4
+ export * from './lmdb.js';
package/src/db/lmdb.ts ADDED
@@ -0,0 +1,264 @@
1
+ /**
2
+ * LMDB implementation of SlashingProtectionDatabase
3
+ *
4
+ * Provides local (single-node) double-signing protection using LMDB as the backend.
5
+ * Suitable for nodes that do NOT run in a high-availability multi-node setup.
6
+ *
7
+ * The LMDB store is single-writer, making setIfNotExists inherently atomic.
8
+ * This means we get crash-restart protection without needing an external database.
9
+ */
10
+ import { SlotNumber } from '@aztec/foundation/branded-types';
11
+ import { randomBytes } from '@aztec/foundation/crypto/random';
12
+ import { EthAddress } from '@aztec/foundation/eth-address';
13
+ import { type Logger, createLogger } from '@aztec/foundation/log';
14
+ import type { DateProvider } from '@aztec/foundation/timer';
15
+ import type { AztecAsyncKVStore, AztecAsyncMap } from '@aztec/kv-store';
16
+
17
+ import type { SlashingProtectionDatabase, TryInsertOrGetResult } from '../types.js';
18
+ import {
19
+ type CheckAndRecordParams,
20
+ DutyStatus,
21
+ DutyType,
22
+ type StoredDutyRecord,
23
+ getBlockIndexFromDutyIdentifier,
24
+ recordFromFields,
25
+ } from './types.js';
26
+
27
+ function dutyKey(
28
+ rollupAddress: string,
29
+ validatorAddress: string,
30
+ slot: string,
31
+ dutyType: string,
32
+ blockIndexWithinCheckpoint: number,
33
+ ): string {
34
+ return `${rollupAddress}:${validatorAddress}:${slot}:${dutyType}:${blockIndexWithinCheckpoint}`;
35
+ }
36
+
37
+ /**
38
+ * LMDB-backed implementation of SlashingProtectionDatabase.
39
+ *
40
+ * Provides single-node double-signing protection that survives crashes and restarts.
41
+ * Does not provide cross-node coordination (that requires the PostgreSQL implementation).
42
+ */
43
+ export class LmdbSlashingProtectionDatabase implements SlashingProtectionDatabase {
44
+ public static readonly SCHEMA_VERSION = 1;
45
+
46
+ private readonly duties: AztecAsyncMap<string, StoredDutyRecord>;
47
+ private readonly log: Logger;
48
+
49
+ constructor(
50
+ private readonly store: AztecAsyncKVStore,
51
+ private readonly dateProvider: DateProvider,
52
+ ) {
53
+ this.log = createLogger('slashing-protection:lmdb');
54
+ this.duties = store.openMap<string, StoredDutyRecord>('signing-protection-duties');
55
+ }
56
+
57
+ /**
58
+ * Atomically try to insert a new duty record, or get the existing one if present.
59
+ *
60
+ * LMDB is single-writer so the read-then-write inside transactionAsync is naturally atomic.
61
+ */
62
+ public async tryInsertOrGetExisting(params: CheckAndRecordParams): Promise<TryInsertOrGetResult> {
63
+ const blockIndexWithinCheckpoint = getBlockIndexFromDutyIdentifier(params);
64
+ const key = dutyKey(
65
+ params.rollupAddress.toString(),
66
+ params.validatorAddress.toString(),
67
+ params.slot.toString(),
68
+ params.dutyType,
69
+ blockIndexWithinCheckpoint,
70
+ );
71
+
72
+ const lockToken = randomBytes(16).toString('hex');
73
+ const now = this.dateProvider.now();
74
+
75
+ const result = await this.store.transactionAsync(async () => {
76
+ const existing = await this.duties.getAsync(key);
77
+ if (existing) {
78
+ return { isNew: false as const, record: { ...existing, lockToken: '' } };
79
+ }
80
+
81
+ const newRecord: StoredDutyRecord = {
82
+ rollupAddress: params.rollupAddress.toString(),
83
+ validatorAddress: params.validatorAddress.toString(),
84
+ slot: params.slot.toString(),
85
+ blockNumber: params.blockNumber.toString(),
86
+ blockIndexWithinCheckpoint,
87
+ dutyType: params.dutyType,
88
+ status: DutyStatus.SIGNING,
89
+ messageHash: params.messageHash,
90
+ nodeId: params.nodeId,
91
+ lockToken,
92
+ startedAtMs: now,
93
+ };
94
+ await this.duties.set(key, newRecord);
95
+ return { isNew: true as const, record: newRecord };
96
+ });
97
+
98
+ if (result.isNew) {
99
+ this.log.debug(`Acquired lock for duty ${params.dutyType} at slot ${params.slot}`, {
100
+ validatorAddress: params.validatorAddress.toString(),
101
+ nodeId: params.nodeId,
102
+ });
103
+ }
104
+
105
+ return { isNew: result.isNew, record: recordFromFields(result.record) };
106
+ }
107
+
108
+ /**
109
+ * Update a duty to 'signed' status with the signature.
110
+ * Only succeeds if the lockToken matches.
111
+ */
112
+ public updateDutySigned(
113
+ rollupAddress: EthAddress,
114
+ validatorAddress: EthAddress,
115
+ slot: SlotNumber,
116
+ dutyType: DutyType,
117
+ signature: string,
118
+ lockToken: string,
119
+ blockIndexWithinCheckpoint: number,
120
+ ): Promise<boolean> {
121
+ const key = dutyKey(
122
+ rollupAddress.toString(),
123
+ validatorAddress.toString(),
124
+ slot.toString(),
125
+ dutyType,
126
+ blockIndexWithinCheckpoint,
127
+ );
128
+
129
+ return this.store.transactionAsync(async () => {
130
+ const existing = await this.duties.getAsync(key);
131
+ if (!existing) {
132
+ this.log.warn('Failed to update duty to signed: duty not found', {
133
+ rollupAddress: rollupAddress.toString(),
134
+ validatorAddress: validatorAddress.toString(),
135
+ slot: slot.toString(),
136
+ dutyType,
137
+ blockIndexWithinCheckpoint,
138
+ });
139
+ return false;
140
+ }
141
+
142
+ if (existing.lockToken !== lockToken) {
143
+ this.log.warn('Failed to update duty to signed: invalid token', {
144
+ rollupAddress: rollupAddress.toString(),
145
+ validatorAddress: validatorAddress.toString(),
146
+ slot: slot.toString(),
147
+ dutyType,
148
+ blockIndexWithinCheckpoint,
149
+ });
150
+ return false;
151
+ }
152
+
153
+ await this.duties.set(key, {
154
+ ...existing,
155
+ status: DutyStatus.SIGNED,
156
+ signature,
157
+ completedAtMs: this.dateProvider.now(),
158
+ });
159
+
160
+ return true;
161
+ });
162
+ }
163
+
164
+ /**
165
+ * Delete a duty record.
166
+ * Only succeeds if the lockToken matches.
167
+ */
168
+ public deleteDuty(
169
+ rollupAddress: EthAddress,
170
+ validatorAddress: EthAddress,
171
+ slot: SlotNumber,
172
+ dutyType: DutyType,
173
+ lockToken: string,
174
+ blockIndexWithinCheckpoint: number,
175
+ ): Promise<boolean> {
176
+ const key = dutyKey(
177
+ rollupAddress.toString(),
178
+ validatorAddress.toString(),
179
+ slot.toString(),
180
+ dutyType,
181
+ blockIndexWithinCheckpoint,
182
+ );
183
+
184
+ return this.store.transactionAsync(async () => {
185
+ const existing = await this.duties.getAsync(key);
186
+ if (!existing || existing.lockToken !== lockToken) {
187
+ this.log.warn('Failed to delete duty: invalid token or duty not found', {
188
+ rollupAddress: rollupAddress.toString(),
189
+ validatorAddress: validatorAddress.toString(),
190
+ slot: slot.toString(),
191
+ dutyType,
192
+ blockIndexWithinCheckpoint,
193
+ });
194
+ return false;
195
+ }
196
+
197
+ await this.duties.delete(key);
198
+ return true;
199
+ });
200
+ }
201
+
202
+ /**
203
+ * Cleanup own stuck duties (SIGNING status older than maxAgeMs).
204
+ */
205
+ public cleanupOwnStuckDuties(nodeId: string, maxAgeMs: number): Promise<number> {
206
+ const cutoffMs = this.dateProvider.now() - maxAgeMs;
207
+
208
+ return this.store.transactionAsync(async () => {
209
+ const keysToDelete: string[] = [];
210
+ for await (const [key, record] of this.duties.entriesAsync()) {
211
+ if (record.nodeId === nodeId && record.status === DutyStatus.SIGNING && record.startedAtMs < cutoffMs) {
212
+ keysToDelete.push(key);
213
+ }
214
+ }
215
+ for (const key of keysToDelete) {
216
+ await this.duties.delete(key);
217
+ }
218
+ return keysToDelete.length;
219
+ });
220
+ }
221
+
222
+ /**
223
+ * Cleanup duties with outdated rollup address.
224
+ *
225
+ * This is always a no-op for the LMDB implementation: the underlying store is created via
226
+ * DatabaseVersionManager (in factory.ts), which already resets the entire data directory at
227
+ * startup whenever the rollup address changes.
228
+ */
229
+ public cleanupOutdatedRollupDuties(_currentRollupAddress: EthAddress): Promise<number> {
230
+ return Promise.resolve(0);
231
+ }
232
+
233
+ /**
234
+ * Cleanup old signed duties older than maxAgeMs.
235
+ */
236
+ public cleanupOldDuties(maxAgeMs: number): Promise<number> {
237
+ const cutoffMs = this.dateProvider.now() - maxAgeMs;
238
+
239
+ return this.store.transactionAsync(async () => {
240
+ const keysToDelete: string[] = [];
241
+ for await (const [key, record] of this.duties.entriesAsync()) {
242
+ if (
243
+ record.status === DutyStatus.SIGNED &&
244
+ record.completedAtMs !== undefined &&
245
+ record.completedAtMs < cutoffMs
246
+ ) {
247
+ keysToDelete.push(key);
248
+ }
249
+ }
250
+ for (const key of keysToDelete) {
251
+ await this.duties.delete(key);
252
+ }
253
+ return keysToDelete.length;
254
+ });
255
+ }
256
+
257
+ /**
258
+ * Close the underlying LMDB store.
259
+ */
260
+ public async close(): Promise<void> {
261
+ await this.store.close();
262
+ this.log.debug('LMDB slashing protection database closed');
263
+ }
264
+ }
@@ -1,7 +1,7 @@
1
1
  /**
2
2
  * PostgreSQL implementation of SlashingProtectionDatabase
3
3
  */
4
- import { BlockNumber, SlotNumber } from '@aztec/foundation/branded-types';
4
+ import { SlotNumber } from '@aztec/foundation/branded-types';
5
5
  import { randomBytes } from '@aztec/foundation/crypto/random';
6
6
  import { EthAddress } from '@aztec/foundation/eth-address';
7
7
  import { type Logger, createLogger } from '@aztec/foundation/log';
@@ -11,6 +11,8 @@ import type { QueryResult, QueryResultRow } from 'pg';
11
11
 
12
12
  import type { SlashingProtectionDatabase, TryInsertOrGetResult } from '../types.js';
13
13
  import {
14
+ CLEANUP_OLD_DUTIES,
15
+ CLEANUP_OUTDATED_ROLLUP_DUTIES,
14
16
  CLEANUP_OWN_STUCK_DUTIES,
15
17
  DELETE_DUTY,
16
18
  INSERT_OR_GET_DUTY,
@@ -18,7 +20,7 @@ import {
18
20
  UPDATE_DUTY_SIGNED,
19
21
  } from './schema.js';
20
22
  import type { CheckAndRecordParams, DutyRow, DutyType, InsertOrGetRow, ValidatorDutyRecord } from './types.js';
21
- import { getBlockIndexFromDutyIdentifier } from './types.js';
23
+ import { getBlockIndexFromDutyIdentifier, recordFromFields } from './types.js';
22
24
 
23
25
  /**
24
26
  * Minimal pool interface for database operations.
@@ -101,6 +103,7 @@ export class PostgresSlashingProtectionDatabase implements SlashingProtectionDat
101
103
  const result = await retry<QueryResult<InsertOrGetRow>>(
102
104
  async () => {
103
105
  const queryResult: QueryResult<InsertOrGetRow> = await this.pool.query(INSERT_OR_GET_DUTY, [
106
+ params.rollupAddress.toString(),
104
107
  params.validatorAddress.toString(),
105
108
  params.slot.toString(),
106
109
  params.blockNumber.toString(),
@@ -148,6 +151,7 @@ export class PostgresSlashingProtectionDatabase implements SlashingProtectionDat
148
151
  * @returns true if the update succeeded, false if token didn't match or duty not found
149
152
  */
150
153
  async updateDutySigned(
154
+ rollupAddress: EthAddress,
151
155
  validatorAddress: EthAddress,
152
156
  slot: SlotNumber,
153
157
  dutyType: DutyType,
@@ -157,6 +161,7 @@ export class PostgresSlashingProtectionDatabase implements SlashingProtectionDat
157
161
  ): Promise<boolean> {
158
162
  const result = await this.pool.query(UPDATE_DUTY_SIGNED, [
159
163
  signature,
164
+ rollupAddress.toString(),
160
165
  validatorAddress.toString(),
161
166
  slot.toString(),
162
167
  dutyType,
@@ -166,6 +171,7 @@ export class PostgresSlashingProtectionDatabase implements SlashingProtectionDat
166
171
 
167
172
  if (result.rowCount === 0) {
168
173
  this.log.warn('Failed to update duty to signed status: invalid token or duty not found', {
174
+ rollupAddress: rollupAddress.toString(),
169
175
  validatorAddress: validatorAddress.toString(),
170
176
  slot: slot.toString(),
171
177
  dutyType,
@@ -184,6 +190,7 @@ export class PostgresSlashingProtectionDatabase implements SlashingProtectionDat
184
190
  * @returns true if the delete succeeded, false if token didn't match or duty not found
185
191
  */
186
192
  async deleteDuty(
193
+ rollupAddress: EthAddress,
187
194
  validatorAddress: EthAddress,
188
195
  slot: SlotNumber,
189
196
  dutyType: DutyType,
@@ -191,6 +198,7 @@ export class PostgresSlashingProtectionDatabase implements SlashingProtectionDat
191
198
  blockIndexWithinCheckpoint: number,
192
199
  ): Promise<boolean> {
193
200
  const result = await this.pool.query(DELETE_DUTY, [
201
+ rollupAddress.toString(),
194
202
  validatorAddress.toString(),
195
203
  slot.toString(),
196
204
  dutyType,
@@ -200,6 +208,7 @@ export class PostgresSlashingProtectionDatabase implements SlashingProtectionDat
200
208
 
201
209
  if (result.rowCount === 0) {
202
210
  this.log.warn('Failed to delete duty: invalid token or duty not found', {
211
+ rollupAddress: rollupAddress.toString(),
203
212
  validatorAddress: validatorAddress.toString(),
204
213
  slot: slot.toString(),
205
214
  dutyType,
@@ -211,13 +220,16 @@ export class PostgresSlashingProtectionDatabase implements SlashingProtectionDat
211
220
  }
212
221
 
213
222
  /**
214
- * Convert a database row to a ValidatorDutyRecord
223
+ * Convert a database row to a ValidatorDutyRecord.
224
+ * Maps snake_case column names to StoredDutyRecord (camelCase, ms timestamps),
225
+ * then delegates to the shared recordFromFields() converter.
215
226
  */
216
227
  private rowToRecord(row: DutyRow): ValidatorDutyRecord {
217
- return {
218
- validatorAddress: EthAddress.fromString(row.validator_address),
219
- slot: SlotNumber.fromString(row.slot),
220
- blockNumber: BlockNumber.fromString(row.block_number),
228
+ return recordFromFields({
229
+ rollupAddress: row.rollup_address,
230
+ validatorAddress: row.validator_address,
231
+ slot: row.slot,
232
+ blockNumber: row.block_number,
221
233
  blockIndexWithinCheckpoint: row.block_index_within_checkpoint,
222
234
  dutyType: row.duty_type,
223
235
  status: row.status,
@@ -225,10 +237,10 @@ export class PostgresSlashingProtectionDatabase implements SlashingProtectionDat
225
237
  signature: row.signature ?? undefined,
226
238
  nodeId: row.node_id,
227
239
  lockToken: row.lock_token,
228
- startedAt: row.started_at,
229
- completedAt: row.completed_at ?? undefined,
240
+ startedAtMs: row.started_at.getTime(),
241
+ completedAtMs: row.completed_at?.getTime(),
230
242
  errorMessage: row.error_message ?? undefined,
231
- };
243
+ });
232
244
  }
233
245
 
234
246
  /**
@@ -244,8 +256,29 @@ export class PostgresSlashingProtectionDatabase implements SlashingProtectionDat
244
256
  * @returns the number of duties cleaned up
245
257
  */
246
258
  async cleanupOwnStuckDuties(nodeId: string, maxAgeMs: number): Promise<number> {
247
- const cutoff = new Date(Date.now() - maxAgeMs);
248
- const result = await this.pool.query(CLEANUP_OWN_STUCK_DUTIES, [nodeId, cutoff]);
259
+ const result = await this.pool.query(CLEANUP_OWN_STUCK_DUTIES, [nodeId, maxAgeMs]);
260
+ return result.rowCount ?? 0;
261
+ }
262
+
263
+ /**
264
+ * Cleanup duties with outdated rollup address.
265
+ * Removes all duties where the rollup address doesn't match the current one.
266
+ * Used after a rollup upgrade to clean up duties for the old rollup.
267
+ * @returns the number of duties cleaned up
268
+ */
269
+ async cleanupOutdatedRollupDuties(currentRollupAddress: EthAddress): Promise<number> {
270
+ const result = await this.pool.query(CLEANUP_OUTDATED_ROLLUP_DUTIES, [currentRollupAddress.toString()]);
271
+ return result.rowCount ?? 0;
272
+ }
273
+
274
+ /**
275
+ * Cleanup old signed duties.
276
+ * Removes only signed duties older than the specified age.
277
+ * Does not remove 'signing' duties as they may be in progress.
278
+ * @returns the number of duties cleaned up
279
+ */
280
+ async cleanupOldDuties(maxAgeMs: number): Promise<number> {
281
+ const result = await this.pool.query(CLEANUP_OLD_DUTIES, [maxAgeMs]);
249
282
  return result.rowCount ?? 0;
250
283
  }
251
284
  }