@aztec/validator-ha-signer 0.0.1-commit.c2595eba → 0.0.1-commit.c2eed6949
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +10 -2
- package/dest/db/index.d.ts +2 -1
- package/dest/db/index.d.ts.map +1 -1
- package/dest/db/index.js +1 -0
- package/dest/db/lmdb.d.ts +66 -0
- package/dest/db/lmdb.d.ts.map +1 -0
- package/dest/db/lmdb.js +188 -0
- package/dest/db/postgres.d.ts +20 -4
- package/dest/db/postgres.d.ts.map +1 -1
- package/dest/db/postgres.js +44 -17
- package/dest/db/schema.d.ts +17 -10
- package/dest/db/schema.d.ts.map +1 -1
- package/dest/db/schema.js +39 -22
- package/dest/db/types.d.ts +43 -19
- package/dest/db/types.d.ts.map +1 -1
- package/dest/db/types.js +30 -15
- package/dest/factory.d.ts +39 -4
- package/dest/factory.d.ts.map +1 -1
- package/dest/factory.js +75 -5
- package/dest/metrics.d.ts +51 -0
- package/dest/metrics.d.ts.map +1 -0
- package/dest/metrics.js +103 -0
- package/dest/slashing_protection_service.d.ts +19 -6
- package/dest/slashing_protection_service.d.ts.map +1 -1
- package/dest/slashing_protection_service.js +57 -17
- package/dest/types.d.ts +32 -72
- package/dest/types.d.ts.map +1 -1
- package/dest/types.js +3 -20
- package/dest/validator_ha_signer.d.ts +15 -6
- package/dest/validator_ha_signer.d.ts.map +1 -1
- package/dest/validator_ha_signer.js +24 -11
- package/package.json +10 -5
- package/src/db/index.ts +1 -0
- package/src/db/lmdb.ts +264 -0
- package/src/db/postgres.ts +45 -12
- package/src/db/schema.ts +41 -22
- package/src/db/types.ts +67 -17
- package/src/factory.ts +93 -4
- package/src/metrics.ts +138 -0
- package/src/slashing_protection_service.ts +79 -21
- package/src/types.ts +50 -103
- package/src/validator_ha_signer.ts +41 -15
- package/dest/config.d.ts +0 -79
- package/dest/config.d.ts.map +0 -1
- package/dest/config.js +0 -73
- package/src/config.ts +0 -125
|
@@ -5,9 +5,8 @@
|
|
|
5
5
|
* This ensures that even with multiple validator nodes running, only one
|
|
6
6
|
* node will sign for a given duty (slot + duty type).
|
|
7
7
|
*/ import { createLogger } from '@aztec/foundation/log';
|
|
8
|
-
import { DutyType } from '
|
|
8
|
+
import { DutyType, getBlockNumberFromSigningContext } from '@aztec/stdlib/ha-signing';
|
|
9
9
|
import { SlashingProtectionService } from './slashing_protection_service.js';
|
|
10
|
-
import { getBlockNumberFromSigningContext } from './types.js';
|
|
11
10
|
/**
|
|
12
11
|
* Validator High Availability Signer
|
|
13
12
|
*
|
|
@@ -30,19 +29,25 @@ import { getBlockNumberFromSigningContext } from './types.js';
|
|
|
30
29
|
config;
|
|
31
30
|
log;
|
|
32
31
|
slashingProtection;
|
|
33
|
-
|
|
32
|
+
rollupAddress;
|
|
33
|
+
dateProvider;
|
|
34
|
+
metrics;
|
|
35
|
+
constructor(db, config, deps){
|
|
34
36
|
this.config = config;
|
|
35
37
|
this.log = createLogger('validator-ha-signer');
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
throw new Error('Validator HA Signer is not enabled in config');
|
|
39
|
-
}
|
|
38
|
+
this.metrics = deps.metrics;
|
|
39
|
+
this.dateProvider = deps.dateProvider;
|
|
40
40
|
if (!config.nodeId || config.nodeId === '') {
|
|
41
41
|
throw new Error('NODE_ID is required for high-availability setups');
|
|
42
42
|
}
|
|
43
|
-
this.
|
|
43
|
+
this.rollupAddress = config.l1Contracts.rollupAddress;
|
|
44
|
+
this.slashingProtection = new SlashingProtectionService(db, config, {
|
|
45
|
+
metrics: deps.metrics,
|
|
46
|
+
dateProvider: deps.dateProvider
|
|
47
|
+
});
|
|
44
48
|
this.log.info('Validator HA Signer initialized with slashing protection', {
|
|
45
|
-
nodeId: config.nodeId
|
|
49
|
+
nodeId: config.nodeId,
|
|
50
|
+
rollupAddress: this.rollupAddress.toString()
|
|
46
51
|
});
|
|
47
52
|
}
|
|
48
53
|
/**
|
|
@@ -62,9 +67,12 @@ import { getBlockNumberFromSigningContext } from './types.js';
|
|
|
62
67
|
* @throws DutyAlreadySignedError if the duty was already signed (expected in HA)
|
|
63
68
|
* @throws SlashingProtectionError if attempting to sign different data for same slot (expected in HA)
|
|
64
69
|
*/ async signWithProtection(validatorAddress, messageHash, context, signFn) {
|
|
70
|
+
const startTime = this.dateProvider.now();
|
|
71
|
+
const dutyType = context.dutyType;
|
|
65
72
|
let dutyIdentifier;
|
|
66
73
|
if (context.dutyType === DutyType.BLOCK_PROPOSAL) {
|
|
67
74
|
dutyIdentifier = {
|
|
75
|
+
rollupAddress: this.rollupAddress,
|
|
68
76
|
validatorAddress,
|
|
69
77
|
slot: context.slot,
|
|
70
78
|
blockIndexWithinCheckpoint: context.blockIndexWithinCheckpoint,
|
|
@@ -72,12 +80,14 @@ import { getBlockNumberFromSigningContext } from './types.js';
|
|
|
72
80
|
};
|
|
73
81
|
} else {
|
|
74
82
|
dutyIdentifier = {
|
|
83
|
+
rollupAddress: this.rollupAddress,
|
|
75
84
|
validatorAddress,
|
|
76
85
|
slot: context.slot,
|
|
77
86
|
dutyType: context.dutyType
|
|
78
87
|
};
|
|
79
88
|
}
|
|
80
89
|
// Acquire lock and get the token for ownership verification
|
|
90
|
+
// DutyAlreadySignedError and SlashingProtectionError may be thrown here and are recorded in the service
|
|
81
91
|
const blockNumber = getBlockNumberFromSigningContext(context);
|
|
82
92
|
const lockToken = await this.slashingProtection.checkAndRecord({
|
|
83
93
|
...dutyIdentifier,
|
|
@@ -95,6 +105,7 @@ import { getBlockNumberFromSigningContext } from './types.js';
|
|
|
95
105
|
...dutyIdentifier,
|
|
96
106
|
lockToken
|
|
97
107
|
});
|
|
108
|
+
this.metrics.recordSigningError(dutyType);
|
|
98
109
|
throw error;
|
|
99
110
|
}
|
|
100
111
|
// Record success (only succeeds if we own the lock)
|
|
@@ -104,6 +115,8 @@ import { getBlockNumberFromSigningContext } from './types.js';
|
|
|
104
115
|
nodeId: this.config.nodeId,
|
|
105
116
|
lockToken
|
|
106
117
|
});
|
|
118
|
+
const duration = this.dateProvider.now() - startTime;
|
|
119
|
+
this.metrics.recordSigningSuccess(dutyType, duration);
|
|
107
120
|
return signature;
|
|
108
121
|
}
|
|
109
122
|
/**
|
|
@@ -114,8 +127,8 @@ import { getBlockNumberFromSigningContext } from './types.js';
|
|
|
114
127
|
/**
|
|
115
128
|
* Start the HA signer background tasks (cleanup of stuck duties).
|
|
116
129
|
* Should be called after construction and before signing operations.
|
|
117
|
-
*/ start() {
|
|
118
|
-
this.slashingProtection.start();
|
|
130
|
+
*/ async start() {
|
|
131
|
+
await this.slashingProtection.start();
|
|
119
132
|
}
|
|
120
133
|
/**
|
|
121
134
|
* Stop the HA signer background tasks and close database connection.
|
package/package.json
CHANGED
|
@@ -1,24 +1,25 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aztec/validator-ha-signer",
|
|
3
|
-
"version": "0.0.1-commit.
|
|
3
|
+
"version": "0.0.1-commit.c2eed6949",
|
|
4
4
|
"type": "module",
|
|
5
5
|
"exports": {
|
|
6
|
-
"./config": "./dest/config.js",
|
|
7
6
|
"./db": "./dest/db/index.js",
|
|
8
7
|
"./errors": "./dest/errors.js",
|
|
9
8
|
"./factory": "./dest/factory.js",
|
|
9
|
+
"./metrics": "./dest/metrics.js",
|
|
10
10
|
"./migrations": "./dest/migrations.js",
|
|
11
11
|
"./slashing-protection-service": "./dest/slashing_protection_service.js",
|
|
12
12
|
"./types": "./dest/types.js",
|
|
13
13
|
"./validator-ha-signer": "./dest/validator_ha_signer.js",
|
|
14
|
-
"./test": "./dest/test/pglite_pool.js"
|
|
14
|
+
"./test": "./dest/test/pglite_pool.js",
|
|
15
|
+
"./db/lmdb": "./dest/db/lmdb.js"
|
|
15
16
|
},
|
|
16
17
|
"typedocOptions": {
|
|
17
18
|
"entryPoints": [
|
|
18
|
-
"./src/config.ts",
|
|
19
19
|
"./src/db/index.ts",
|
|
20
20
|
"./src/errors.ts",
|
|
21
21
|
"./src/factory.ts",
|
|
22
|
+
"./src/metrics.ts",
|
|
22
23
|
"./src/migrations.ts",
|
|
23
24
|
"./src/slashing_protection_service.ts",
|
|
24
25
|
"./src/types.ts",
|
|
@@ -74,7 +75,11 @@
|
|
|
74
75
|
]
|
|
75
76
|
},
|
|
76
77
|
"dependencies": {
|
|
77
|
-
"@aztec/
|
|
78
|
+
"@aztec/ethereum": "0.0.1-commit.c2eed6949",
|
|
79
|
+
"@aztec/foundation": "0.0.1-commit.c2eed6949",
|
|
80
|
+
"@aztec/kv-store": "0.0.1-commit.c2eed6949",
|
|
81
|
+
"@aztec/stdlib": "0.0.1-commit.c2eed6949",
|
|
82
|
+
"@aztec/telemetry-client": "0.0.1-commit.c2eed6949",
|
|
78
83
|
"node-pg-migrate": "^8.0.4",
|
|
79
84
|
"pg": "^8.11.3",
|
|
80
85
|
"tslib": "^2.4.0",
|
package/src/db/index.ts
CHANGED
package/src/db/lmdb.ts
ADDED
|
@@ -0,0 +1,264 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* LMDB implementation of SlashingProtectionDatabase
|
|
3
|
+
*
|
|
4
|
+
* Provides local (single-node) double-signing protection using LMDB as the backend.
|
|
5
|
+
* Suitable for nodes that do NOT run in a high-availability multi-node setup.
|
|
6
|
+
*
|
|
7
|
+
* The LMDB store is single-writer, making setIfNotExists inherently atomic.
|
|
8
|
+
* This means we get crash-restart protection without needing an external database.
|
|
9
|
+
*/
|
|
10
|
+
import { SlotNumber } from '@aztec/foundation/branded-types';
|
|
11
|
+
import { randomBytes } from '@aztec/foundation/crypto/random';
|
|
12
|
+
import { EthAddress } from '@aztec/foundation/eth-address';
|
|
13
|
+
import { type Logger, createLogger } from '@aztec/foundation/log';
|
|
14
|
+
import type { DateProvider } from '@aztec/foundation/timer';
|
|
15
|
+
import type { AztecAsyncKVStore, AztecAsyncMap } from '@aztec/kv-store';
|
|
16
|
+
|
|
17
|
+
import type { SlashingProtectionDatabase, TryInsertOrGetResult } from '../types.js';
|
|
18
|
+
import {
|
|
19
|
+
type CheckAndRecordParams,
|
|
20
|
+
DutyStatus,
|
|
21
|
+
DutyType,
|
|
22
|
+
type StoredDutyRecord,
|
|
23
|
+
getBlockIndexFromDutyIdentifier,
|
|
24
|
+
recordFromFields,
|
|
25
|
+
} from './types.js';
|
|
26
|
+
|
|
27
|
+
function dutyKey(
|
|
28
|
+
rollupAddress: string,
|
|
29
|
+
validatorAddress: string,
|
|
30
|
+
slot: string,
|
|
31
|
+
dutyType: string,
|
|
32
|
+
blockIndexWithinCheckpoint: number,
|
|
33
|
+
): string {
|
|
34
|
+
return `${rollupAddress}:${validatorAddress}:${slot}:${dutyType}:${blockIndexWithinCheckpoint}`;
|
|
35
|
+
}
|
|
36
|
+
|
|
37
|
+
/**
|
|
38
|
+
* LMDB-backed implementation of SlashingProtectionDatabase.
|
|
39
|
+
*
|
|
40
|
+
* Provides single-node double-signing protection that survives crashes and restarts.
|
|
41
|
+
* Does not provide cross-node coordination (that requires the PostgreSQL implementation).
|
|
42
|
+
*/
|
|
43
|
+
export class LmdbSlashingProtectionDatabase implements SlashingProtectionDatabase {
|
|
44
|
+
public static readonly SCHEMA_VERSION = 1;
|
|
45
|
+
|
|
46
|
+
private readonly duties: AztecAsyncMap<string, StoredDutyRecord>;
|
|
47
|
+
private readonly log: Logger;
|
|
48
|
+
|
|
49
|
+
constructor(
|
|
50
|
+
private readonly store: AztecAsyncKVStore,
|
|
51
|
+
private readonly dateProvider: DateProvider,
|
|
52
|
+
) {
|
|
53
|
+
this.log = createLogger('slashing-protection:lmdb');
|
|
54
|
+
this.duties = store.openMap<string, StoredDutyRecord>('signing-protection-duties');
|
|
55
|
+
}
|
|
56
|
+
|
|
57
|
+
/**
|
|
58
|
+
* Atomically try to insert a new duty record, or get the existing one if present.
|
|
59
|
+
*
|
|
60
|
+
* LMDB is single-writer so the read-then-write inside transactionAsync is naturally atomic.
|
|
61
|
+
*/
|
|
62
|
+
public async tryInsertOrGetExisting(params: CheckAndRecordParams): Promise<TryInsertOrGetResult> {
|
|
63
|
+
const blockIndexWithinCheckpoint = getBlockIndexFromDutyIdentifier(params);
|
|
64
|
+
const key = dutyKey(
|
|
65
|
+
params.rollupAddress.toString(),
|
|
66
|
+
params.validatorAddress.toString(),
|
|
67
|
+
params.slot.toString(),
|
|
68
|
+
params.dutyType,
|
|
69
|
+
blockIndexWithinCheckpoint,
|
|
70
|
+
);
|
|
71
|
+
|
|
72
|
+
const lockToken = randomBytes(16).toString('hex');
|
|
73
|
+
const now = this.dateProvider.now();
|
|
74
|
+
|
|
75
|
+
const result = await this.store.transactionAsync(async () => {
|
|
76
|
+
const existing = await this.duties.getAsync(key);
|
|
77
|
+
if (existing) {
|
|
78
|
+
return { isNew: false as const, record: { ...existing, lockToken: '' } };
|
|
79
|
+
}
|
|
80
|
+
|
|
81
|
+
const newRecord: StoredDutyRecord = {
|
|
82
|
+
rollupAddress: params.rollupAddress.toString(),
|
|
83
|
+
validatorAddress: params.validatorAddress.toString(),
|
|
84
|
+
slot: params.slot.toString(),
|
|
85
|
+
blockNumber: params.blockNumber.toString(),
|
|
86
|
+
blockIndexWithinCheckpoint,
|
|
87
|
+
dutyType: params.dutyType,
|
|
88
|
+
status: DutyStatus.SIGNING,
|
|
89
|
+
messageHash: params.messageHash,
|
|
90
|
+
nodeId: params.nodeId,
|
|
91
|
+
lockToken,
|
|
92
|
+
startedAtMs: now,
|
|
93
|
+
};
|
|
94
|
+
await this.duties.set(key, newRecord);
|
|
95
|
+
return { isNew: true as const, record: newRecord };
|
|
96
|
+
});
|
|
97
|
+
|
|
98
|
+
if (result.isNew) {
|
|
99
|
+
this.log.debug(`Acquired lock for duty ${params.dutyType} at slot ${params.slot}`, {
|
|
100
|
+
validatorAddress: params.validatorAddress.toString(),
|
|
101
|
+
nodeId: params.nodeId,
|
|
102
|
+
});
|
|
103
|
+
}
|
|
104
|
+
|
|
105
|
+
return { isNew: result.isNew, record: recordFromFields(result.record) };
|
|
106
|
+
}
|
|
107
|
+
|
|
108
|
+
/**
|
|
109
|
+
* Update a duty to 'signed' status with the signature.
|
|
110
|
+
* Only succeeds if the lockToken matches.
|
|
111
|
+
*/
|
|
112
|
+
public updateDutySigned(
|
|
113
|
+
rollupAddress: EthAddress,
|
|
114
|
+
validatorAddress: EthAddress,
|
|
115
|
+
slot: SlotNumber,
|
|
116
|
+
dutyType: DutyType,
|
|
117
|
+
signature: string,
|
|
118
|
+
lockToken: string,
|
|
119
|
+
blockIndexWithinCheckpoint: number,
|
|
120
|
+
): Promise<boolean> {
|
|
121
|
+
const key = dutyKey(
|
|
122
|
+
rollupAddress.toString(),
|
|
123
|
+
validatorAddress.toString(),
|
|
124
|
+
slot.toString(),
|
|
125
|
+
dutyType,
|
|
126
|
+
blockIndexWithinCheckpoint,
|
|
127
|
+
);
|
|
128
|
+
|
|
129
|
+
return this.store.transactionAsync(async () => {
|
|
130
|
+
const existing = await this.duties.getAsync(key);
|
|
131
|
+
if (!existing) {
|
|
132
|
+
this.log.warn('Failed to update duty to signed: duty not found', {
|
|
133
|
+
rollupAddress: rollupAddress.toString(),
|
|
134
|
+
validatorAddress: validatorAddress.toString(),
|
|
135
|
+
slot: slot.toString(),
|
|
136
|
+
dutyType,
|
|
137
|
+
blockIndexWithinCheckpoint,
|
|
138
|
+
});
|
|
139
|
+
return false;
|
|
140
|
+
}
|
|
141
|
+
|
|
142
|
+
if (existing.lockToken !== lockToken) {
|
|
143
|
+
this.log.warn('Failed to update duty to signed: invalid token', {
|
|
144
|
+
rollupAddress: rollupAddress.toString(),
|
|
145
|
+
validatorAddress: validatorAddress.toString(),
|
|
146
|
+
slot: slot.toString(),
|
|
147
|
+
dutyType,
|
|
148
|
+
blockIndexWithinCheckpoint,
|
|
149
|
+
});
|
|
150
|
+
return false;
|
|
151
|
+
}
|
|
152
|
+
|
|
153
|
+
await this.duties.set(key, {
|
|
154
|
+
...existing,
|
|
155
|
+
status: DutyStatus.SIGNED,
|
|
156
|
+
signature,
|
|
157
|
+
completedAtMs: this.dateProvider.now(),
|
|
158
|
+
});
|
|
159
|
+
|
|
160
|
+
return true;
|
|
161
|
+
});
|
|
162
|
+
}
|
|
163
|
+
|
|
164
|
+
/**
|
|
165
|
+
* Delete a duty record.
|
|
166
|
+
* Only succeeds if the lockToken matches.
|
|
167
|
+
*/
|
|
168
|
+
public deleteDuty(
|
|
169
|
+
rollupAddress: EthAddress,
|
|
170
|
+
validatorAddress: EthAddress,
|
|
171
|
+
slot: SlotNumber,
|
|
172
|
+
dutyType: DutyType,
|
|
173
|
+
lockToken: string,
|
|
174
|
+
blockIndexWithinCheckpoint: number,
|
|
175
|
+
): Promise<boolean> {
|
|
176
|
+
const key = dutyKey(
|
|
177
|
+
rollupAddress.toString(),
|
|
178
|
+
validatorAddress.toString(),
|
|
179
|
+
slot.toString(),
|
|
180
|
+
dutyType,
|
|
181
|
+
blockIndexWithinCheckpoint,
|
|
182
|
+
);
|
|
183
|
+
|
|
184
|
+
return this.store.transactionAsync(async () => {
|
|
185
|
+
const existing = await this.duties.getAsync(key);
|
|
186
|
+
if (!existing || existing.lockToken !== lockToken) {
|
|
187
|
+
this.log.warn('Failed to delete duty: invalid token or duty not found', {
|
|
188
|
+
rollupAddress: rollupAddress.toString(),
|
|
189
|
+
validatorAddress: validatorAddress.toString(),
|
|
190
|
+
slot: slot.toString(),
|
|
191
|
+
dutyType,
|
|
192
|
+
blockIndexWithinCheckpoint,
|
|
193
|
+
});
|
|
194
|
+
return false;
|
|
195
|
+
}
|
|
196
|
+
|
|
197
|
+
await this.duties.delete(key);
|
|
198
|
+
return true;
|
|
199
|
+
});
|
|
200
|
+
}
|
|
201
|
+
|
|
202
|
+
/**
|
|
203
|
+
* Cleanup own stuck duties (SIGNING status older than maxAgeMs).
|
|
204
|
+
*/
|
|
205
|
+
public cleanupOwnStuckDuties(nodeId: string, maxAgeMs: number): Promise<number> {
|
|
206
|
+
const cutoffMs = this.dateProvider.now() - maxAgeMs;
|
|
207
|
+
|
|
208
|
+
return this.store.transactionAsync(async () => {
|
|
209
|
+
const keysToDelete: string[] = [];
|
|
210
|
+
for await (const [key, record] of this.duties.entriesAsync()) {
|
|
211
|
+
if (record.nodeId === nodeId && record.status === DutyStatus.SIGNING && record.startedAtMs < cutoffMs) {
|
|
212
|
+
keysToDelete.push(key);
|
|
213
|
+
}
|
|
214
|
+
}
|
|
215
|
+
for (const key of keysToDelete) {
|
|
216
|
+
await this.duties.delete(key);
|
|
217
|
+
}
|
|
218
|
+
return keysToDelete.length;
|
|
219
|
+
});
|
|
220
|
+
}
|
|
221
|
+
|
|
222
|
+
/**
|
|
223
|
+
* Cleanup duties with outdated rollup address.
|
|
224
|
+
*
|
|
225
|
+
* This is always a no-op for the LMDB implementation: the underlying store is created via
|
|
226
|
+
* DatabaseVersionManager (in factory.ts), which already resets the entire data directory at
|
|
227
|
+
* startup whenever the rollup address changes.
|
|
228
|
+
*/
|
|
229
|
+
public cleanupOutdatedRollupDuties(_currentRollupAddress: EthAddress): Promise<number> {
|
|
230
|
+
return Promise.resolve(0);
|
|
231
|
+
}
|
|
232
|
+
|
|
233
|
+
/**
|
|
234
|
+
* Cleanup old signed duties older than maxAgeMs.
|
|
235
|
+
*/
|
|
236
|
+
public cleanupOldDuties(maxAgeMs: number): Promise<number> {
|
|
237
|
+
const cutoffMs = this.dateProvider.now() - maxAgeMs;
|
|
238
|
+
|
|
239
|
+
return this.store.transactionAsync(async () => {
|
|
240
|
+
const keysToDelete: string[] = [];
|
|
241
|
+
for await (const [key, record] of this.duties.entriesAsync()) {
|
|
242
|
+
if (
|
|
243
|
+
record.status === DutyStatus.SIGNED &&
|
|
244
|
+
record.completedAtMs !== undefined &&
|
|
245
|
+
record.completedAtMs < cutoffMs
|
|
246
|
+
) {
|
|
247
|
+
keysToDelete.push(key);
|
|
248
|
+
}
|
|
249
|
+
}
|
|
250
|
+
for (const key of keysToDelete) {
|
|
251
|
+
await this.duties.delete(key);
|
|
252
|
+
}
|
|
253
|
+
return keysToDelete.length;
|
|
254
|
+
});
|
|
255
|
+
}
|
|
256
|
+
|
|
257
|
+
/**
|
|
258
|
+
* Close the underlying LMDB store.
|
|
259
|
+
*/
|
|
260
|
+
public async close(): Promise<void> {
|
|
261
|
+
await this.store.close();
|
|
262
|
+
this.log.debug('LMDB slashing protection database closed');
|
|
263
|
+
}
|
|
264
|
+
}
|
package/src/db/postgres.ts
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
/**
|
|
2
2
|
* PostgreSQL implementation of SlashingProtectionDatabase
|
|
3
3
|
*/
|
|
4
|
-
import {
|
|
4
|
+
import { SlotNumber } from '@aztec/foundation/branded-types';
|
|
5
5
|
import { randomBytes } from '@aztec/foundation/crypto/random';
|
|
6
6
|
import { EthAddress } from '@aztec/foundation/eth-address';
|
|
7
7
|
import { type Logger, createLogger } from '@aztec/foundation/log';
|
|
@@ -11,6 +11,8 @@ import type { QueryResult, QueryResultRow } from 'pg';
|
|
|
11
11
|
|
|
12
12
|
import type { SlashingProtectionDatabase, TryInsertOrGetResult } from '../types.js';
|
|
13
13
|
import {
|
|
14
|
+
CLEANUP_OLD_DUTIES,
|
|
15
|
+
CLEANUP_OUTDATED_ROLLUP_DUTIES,
|
|
14
16
|
CLEANUP_OWN_STUCK_DUTIES,
|
|
15
17
|
DELETE_DUTY,
|
|
16
18
|
INSERT_OR_GET_DUTY,
|
|
@@ -18,7 +20,7 @@ import {
|
|
|
18
20
|
UPDATE_DUTY_SIGNED,
|
|
19
21
|
} from './schema.js';
|
|
20
22
|
import type { CheckAndRecordParams, DutyRow, DutyType, InsertOrGetRow, ValidatorDutyRecord } from './types.js';
|
|
21
|
-
import { getBlockIndexFromDutyIdentifier } from './types.js';
|
|
23
|
+
import { getBlockIndexFromDutyIdentifier, recordFromFields } from './types.js';
|
|
22
24
|
|
|
23
25
|
/**
|
|
24
26
|
* Minimal pool interface for database operations.
|
|
@@ -101,6 +103,7 @@ export class PostgresSlashingProtectionDatabase implements SlashingProtectionDat
|
|
|
101
103
|
const result = await retry<QueryResult<InsertOrGetRow>>(
|
|
102
104
|
async () => {
|
|
103
105
|
const queryResult: QueryResult<InsertOrGetRow> = await this.pool.query(INSERT_OR_GET_DUTY, [
|
|
106
|
+
params.rollupAddress.toString(),
|
|
104
107
|
params.validatorAddress.toString(),
|
|
105
108
|
params.slot.toString(),
|
|
106
109
|
params.blockNumber.toString(),
|
|
@@ -148,6 +151,7 @@ export class PostgresSlashingProtectionDatabase implements SlashingProtectionDat
|
|
|
148
151
|
* @returns true if the update succeeded, false if token didn't match or duty not found
|
|
149
152
|
*/
|
|
150
153
|
async updateDutySigned(
|
|
154
|
+
rollupAddress: EthAddress,
|
|
151
155
|
validatorAddress: EthAddress,
|
|
152
156
|
slot: SlotNumber,
|
|
153
157
|
dutyType: DutyType,
|
|
@@ -157,6 +161,7 @@ export class PostgresSlashingProtectionDatabase implements SlashingProtectionDat
|
|
|
157
161
|
): Promise<boolean> {
|
|
158
162
|
const result = await this.pool.query(UPDATE_DUTY_SIGNED, [
|
|
159
163
|
signature,
|
|
164
|
+
rollupAddress.toString(),
|
|
160
165
|
validatorAddress.toString(),
|
|
161
166
|
slot.toString(),
|
|
162
167
|
dutyType,
|
|
@@ -166,6 +171,7 @@ export class PostgresSlashingProtectionDatabase implements SlashingProtectionDat
|
|
|
166
171
|
|
|
167
172
|
if (result.rowCount === 0) {
|
|
168
173
|
this.log.warn('Failed to update duty to signed status: invalid token or duty not found', {
|
|
174
|
+
rollupAddress: rollupAddress.toString(),
|
|
169
175
|
validatorAddress: validatorAddress.toString(),
|
|
170
176
|
slot: slot.toString(),
|
|
171
177
|
dutyType,
|
|
@@ -184,6 +190,7 @@ export class PostgresSlashingProtectionDatabase implements SlashingProtectionDat
|
|
|
184
190
|
* @returns true if the delete succeeded, false if token didn't match or duty not found
|
|
185
191
|
*/
|
|
186
192
|
async deleteDuty(
|
|
193
|
+
rollupAddress: EthAddress,
|
|
187
194
|
validatorAddress: EthAddress,
|
|
188
195
|
slot: SlotNumber,
|
|
189
196
|
dutyType: DutyType,
|
|
@@ -191,6 +198,7 @@ export class PostgresSlashingProtectionDatabase implements SlashingProtectionDat
|
|
|
191
198
|
blockIndexWithinCheckpoint: number,
|
|
192
199
|
): Promise<boolean> {
|
|
193
200
|
const result = await this.pool.query(DELETE_DUTY, [
|
|
201
|
+
rollupAddress.toString(),
|
|
194
202
|
validatorAddress.toString(),
|
|
195
203
|
slot.toString(),
|
|
196
204
|
dutyType,
|
|
@@ -200,6 +208,7 @@ export class PostgresSlashingProtectionDatabase implements SlashingProtectionDat
|
|
|
200
208
|
|
|
201
209
|
if (result.rowCount === 0) {
|
|
202
210
|
this.log.warn('Failed to delete duty: invalid token or duty not found', {
|
|
211
|
+
rollupAddress: rollupAddress.toString(),
|
|
203
212
|
validatorAddress: validatorAddress.toString(),
|
|
204
213
|
slot: slot.toString(),
|
|
205
214
|
dutyType,
|
|
@@ -211,13 +220,16 @@ export class PostgresSlashingProtectionDatabase implements SlashingProtectionDat
|
|
|
211
220
|
}
|
|
212
221
|
|
|
213
222
|
/**
|
|
214
|
-
* Convert a database row to a ValidatorDutyRecord
|
|
223
|
+
* Convert a database row to a ValidatorDutyRecord.
|
|
224
|
+
* Maps snake_case column names to StoredDutyRecord (camelCase, ms timestamps),
|
|
225
|
+
* then delegates to the shared recordFromFields() converter.
|
|
215
226
|
*/
|
|
216
227
|
private rowToRecord(row: DutyRow): ValidatorDutyRecord {
|
|
217
|
-
return {
|
|
218
|
-
|
|
219
|
-
|
|
220
|
-
|
|
228
|
+
return recordFromFields({
|
|
229
|
+
rollupAddress: row.rollup_address,
|
|
230
|
+
validatorAddress: row.validator_address,
|
|
231
|
+
slot: row.slot,
|
|
232
|
+
blockNumber: row.block_number,
|
|
221
233
|
blockIndexWithinCheckpoint: row.block_index_within_checkpoint,
|
|
222
234
|
dutyType: row.duty_type,
|
|
223
235
|
status: row.status,
|
|
@@ -225,10 +237,10 @@ export class PostgresSlashingProtectionDatabase implements SlashingProtectionDat
|
|
|
225
237
|
signature: row.signature ?? undefined,
|
|
226
238
|
nodeId: row.node_id,
|
|
227
239
|
lockToken: row.lock_token,
|
|
228
|
-
|
|
229
|
-
|
|
240
|
+
startedAtMs: row.started_at.getTime(),
|
|
241
|
+
completedAtMs: row.completed_at?.getTime(),
|
|
230
242
|
errorMessage: row.error_message ?? undefined,
|
|
231
|
-
};
|
|
243
|
+
});
|
|
232
244
|
}
|
|
233
245
|
|
|
234
246
|
/**
|
|
@@ -244,8 +256,29 @@ export class PostgresSlashingProtectionDatabase implements SlashingProtectionDat
|
|
|
244
256
|
* @returns the number of duties cleaned up
|
|
245
257
|
*/
|
|
246
258
|
async cleanupOwnStuckDuties(nodeId: string, maxAgeMs: number): Promise<number> {
|
|
247
|
-
const
|
|
248
|
-
|
|
259
|
+
const result = await this.pool.query(CLEANUP_OWN_STUCK_DUTIES, [nodeId, maxAgeMs]);
|
|
260
|
+
return result.rowCount ?? 0;
|
|
261
|
+
}
|
|
262
|
+
|
|
263
|
+
/**
|
|
264
|
+
* Cleanup duties with outdated rollup address.
|
|
265
|
+
* Removes all duties where the rollup address doesn't match the current one.
|
|
266
|
+
* Used after a rollup upgrade to clean up duties for the old rollup.
|
|
267
|
+
* @returns the number of duties cleaned up
|
|
268
|
+
*/
|
|
269
|
+
async cleanupOutdatedRollupDuties(currentRollupAddress: EthAddress): Promise<number> {
|
|
270
|
+
const result = await this.pool.query(CLEANUP_OUTDATED_ROLLUP_DUTIES, [currentRollupAddress.toString()]);
|
|
271
|
+
return result.rowCount ?? 0;
|
|
272
|
+
}
|
|
273
|
+
|
|
274
|
+
/**
|
|
275
|
+
* Cleanup old signed duties.
|
|
276
|
+
* Removes only signed duties older than the specified age.
|
|
277
|
+
* Does not remove 'signing' duties as they may be in progress.
|
|
278
|
+
* @returns the number of duties cleaned up
|
|
279
|
+
*/
|
|
280
|
+
async cleanupOldDuties(maxAgeMs: number): Promise<number> {
|
|
281
|
+
const result = await this.pool.query(CLEANUP_OLD_DUTIES, [maxAgeMs]);
|
|
249
282
|
return result.rowCount ?? 0;
|
|
250
283
|
}
|
|
251
284
|
}
|