@aztec/validator-ha-signer 0.0.1-commit.cb6bed7c2 → 0.0.1-commit.cbf2c2d5d
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dest/factory.d.ts +18 -1
- package/dest/factory.d.ts.map +1 -1
- package/dest/factory.js +25 -0
- package/dest/slashing_protection_service.js +2 -2
- package/package.json +6 -6
- package/src/factory.ts +32 -0
- package/src/slashing_protection_service.ts +2 -2
package/dest/factory.d.ts
CHANGED
|
@@ -1,3 +1,7 @@
|
|
|
1
|
+
/**
|
|
2
|
+
* Factory functions for creating validator HA signers
|
|
3
|
+
*/
|
|
4
|
+
import { DateProvider } from '@aztec/foundation/timer';
|
|
1
5
|
import type { LocalSignerConfig, ValidatorHASignerConfig } from '@aztec/stdlib/ha-signing';
|
|
2
6
|
import type { CreateHASignerDeps, CreateLocalSignerWithProtectionDeps, SlashingProtectionDatabase } from './types.js';
|
|
3
7
|
import { ValidatorHASigner } from './validator_ha_signer.js';
|
|
@@ -57,4 +61,17 @@ export declare function createLocalSignerWithProtection(config: LocalSignerConfi
|
|
|
57
61
|
signer: ValidatorHASigner;
|
|
58
62
|
db: SlashingProtectionDatabase;
|
|
59
63
|
}>;
|
|
60
|
-
|
|
64
|
+
/**
|
|
65
|
+
* Create an in-memory LMDB-backed SlashingProtectionDatabase that can be shared across
|
|
66
|
+
* multiple validator nodes in the same process. Used for testing HA setups.
|
|
67
|
+
*/
|
|
68
|
+
export declare function createSharedSlashingProtectionDb(dateProvider?: DateProvider): Promise<SlashingProtectionDatabase>;
|
|
69
|
+
/**
|
|
70
|
+
* Create a ValidatorHASigner backed by a pre-existing SlashingProtectionDatabase.
|
|
71
|
+
* Used for testing HA setups where multiple nodes share the same protection database.
|
|
72
|
+
*/
|
|
73
|
+
export declare function createSignerFromSharedDb(db: SlashingProtectionDatabase, config: Pick<ValidatorHASignerConfig, 'nodeId' | 'pollingIntervalMs' | 'signingTimeoutMs' | 'maxStuckDutiesAgeMs' | 'l1Contracts'>, deps?: CreateLocalSignerWithProtectionDeps): {
|
|
74
|
+
signer: ValidatorHASigner;
|
|
75
|
+
db: SlashingProtectionDatabase;
|
|
76
|
+
};
|
|
77
|
+
//# sourceMappingURL=data:application/json;base64,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
|
package/dest/factory.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"factory.d.ts","sourceRoot":"","sources":["../src/factory.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"factory.d.ts","sourceRoot":"","sources":["../src/factory.ts"],"names":[],"mappings":"AAAA;;GAEG;AACH,OAAO,EAAE,YAAY,EAAE,MAAM,yBAAyB,CAAC;AAEvD,OAAO,KAAK,EAAE,iBAAiB,EAAE,uBAAuB,EAAE,MAAM,0BAA0B,CAAC;AAQ3F,OAAO,KAAK,EAAE,kBAAkB,EAAE,mCAAmC,EAAE,0BAA0B,EAAE,MAAM,YAAY,CAAC;AACtH,OAAO,EAAE,iBAAiB,EAAE,MAAM,0BAA0B,CAAC;AAE7D;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAgCG;AACH,wBAAsB,cAAc,CAClC,MAAM,EAAE,uBAAuB,EAC/B,IAAI,CAAC,EAAE,kBAAkB,GACxB,OAAO,CAAC;IACT,MAAM,EAAE,iBAAiB,CAAC;IAC1B,EAAE,EAAE,0BAA0B,CAAC;CAChC,CAAC,CAsCD;AAED;;;;;;;;;;;;;;GAcG;AACH,wBAAsB,+BAA+B,CACnD,MAAM,EAAE,iBAAiB,EACzB,IAAI,CAAC,EAAE,mCAAmC,GACzC,OAAO,CAAC;IACT,MAAM,EAAE,iBAAiB,CAAC;IAC1B,EAAE,EAAE,0BAA0B,CAAC;CAChC,CAAC,CAsBD;AAED;;;GAGG;AACH,wBAAsB,gCAAgC,CACpD,YAAY,GAAE,YAAiC,GAC9C,OAAO,CAAC,0BAA0B,CAAC,CAKrC;AAED;;;GAGG;AACH,wBAAgB,wBAAwB,CACtC,EAAE,EAAE,0BAA0B,EAC9B,MAAM,EAAE,IAAI,CACV,uBAAuB,EACvB,QAAQ,GAAG,mBAAmB,GAAG,kBAAkB,GAAG,qBAAqB,GAAG,aAAa,CAC5F,EACD,IAAI,CAAC,EAAE,mCAAmC,GACzC;IAAE,MAAM,EAAE,iBAAiB,CAAC;IAAC,EAAE,EAAE,0BAA0B,CAAA;CAAE,CAM/D"}
|
package/dest/factory.js
CHANGED
|
@@ -113,3 +113,28 @@ import { ValidatorHASigner } from './validator_ha_signer.js';
|
|
|
113
113
|
db
|
|
114
114
|
};
|
|
115
115
|
}
|
|
116
|
+
/**
|
|
117
|
+
* Create an in-memory LMDB-backed SlashingProtectionDatabase that can be shared across
|
|
118
|
+
* multiple validator nodes in the same process. Used for testing HA setups.
|
|
119
|
+
*/ export async function createSharedSlashingProtectionDb(dateProvider = new DateProvider()) {
|
|
120
|
+
const kvStore = await createStore('shared-signing-protection', LmdbSlashingProtectionDatabase.SCHEMA_VERSION, {
|
|
121
|
+
dataStoreMapSizeKb: 1024 * 1024
|
|
122
|
+
});
|
|
123
|
+
return new LmdbSlashingProtectionDatabase(kvStore, dateProvider);
|
|
124
|
+
}
|
|
125
|
+
/**
|
|
126
|
+
* Create a ValidatorHASigner backed by a pre-existing SlashingProtectionDatabase.
|
|
127
|
+
* Used for testing HA setups where multiple nodes share the same protection database.
|
|
128
|
+
*/ export function createSignerFromSharedDb(db, config, deps) {
|
|
129
|
+
const telemetryClient = deps?.telemetryClient ?? getTelemetryClient();
|
|
130
|
+
const dateProvider = deps?.dateProvider ?? new DateProvider();
|
|
131
|
+
const metrics = new HASignerMetrics(telemetryClient, config.nodeId, 'SharedSigningProtectionMetrics');
|
|
132
|
+
const signer = new ValidatorHASigner(db, config, {
|
|
133
|
+
metrics,
|
|
134
|
+
dateProvider
|
|
135
|
+
});
|
|
136
|
+
return {
|
|
137
|
+
signer,
|
|
138
|
+
db
|
|
139
|
+
};
|
|
140
|
+
}
|
|
@@ -71,7 +71,7 @@ import { DutyAlreadySignedError, SlashingProtectionError } from './errors.js';
|
|
|
71
71
|
const { isNew, record } = await this.db.tryInsertOrGetExisting(params);
|
|
72
72
|
if (isNew) {
|
|
73
73
|
// We successfully acquired the lock
|
|
74
|
-
this.log.
|
|
74
|
+
this.log.verbose(`Acquired lock for duty ${dutyType} at slot ${slot}`, {
|
|
75
75
|
validatorAddress: validatorAddress.toString(),
|
|
76
76
|
nodeId
|
|
77
77
|
});
|
|
@@ -128,7 +128,7 @@ import { DutyAlreadySignedError, SlashingProtectionError } from './errors.js';
|
|
|
128
128
|
const blockIndexWithinCheckpoint = getBlockIndexFromDutyIdentifier(params);
|
|
129
129
|
const success = await this.db.updateDutySigned(rollupAddress, validatorAddress, slot, dutyType, signature.toString(), lockToken, blockIndexWithinCheckpoint);
|
|
130
130
|
if (success) {
|
|
131
|
-
this.log.
|
|
131
|
+
this.log.verbose(`Recorded successful signing for duty ${dutyType} at slot ${slot}`, {
|
|
132
132
|
validatorAddress: validatorAddress.toString(),
|
|
133
133
|
nodeId
|
|
134
134
|
});
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aztec/validator-ha-signer",
|
|
3
|
-
"version": "0.0.1-commit.
|
|
3
|
+
"version": "0.0.1-commit.cbf2c2d5d",
|
|
4
4
|
"type": "module",
|
|
5
5
|
"exports": {
|
|
6
6
|
"./db": "./dest/db/index.js",
|
|
@@ -75,11 +75,11 @@
|
|
|
75
75
|
]
|
|
76
76
|
},
|
|
77
77
|
"dependencies": {
|
|
78
|
-
"@aztec/ethereum": "0.0.1-commit.
|
|
79
|
-
"@aztec/foundation": "0.0.1-commit.
|
|
80
|
-
"@aztec/kv-store": "0.0.1-commit.
|
|
81
|
-
"@aztec/stdlib": "0.0.1-commit.
|
|
82
|
-
"@aztec/telemetry-client": "0.0.1-commit.
|
|
78
|
+
"@aztec/ethereum": "0.0.1-commit.cbf2c2d5d",
|
|
79
|
+
"@aztec/foundation": "0.0.1-commit.cbf2c2d5d",
|
|
80
|
+
"@aztec/kv-store": "0.0.1-commit.cbf2c2d5d",
|
|
81
|
+
"@aztec/stdlib": "0.0.1-commit.cbf2c2d5d",
|
|
82
|
+
"@aztec/telemetry-client": "0.0.1-commit.cbf2c2d5d",
|
|
83
83
|
"node-pg-migrate": "^8.0.4",
|
|
84
84
|
"pg": "^8.11.3",
|
|
85
85
|
"tslib": "^2.4.0",
|
package/src/factory.ts
CHANGED
|
@@ -137,3 +137,35 @@ export async function createLocalSignerWithProtection(
|
|
|
137
137
|
|
|
138
138
|
return { signer, db };
|
|
139
139
|
}
|
|
140
|
+
|
|
141
|
+
/**
|
|
142
|
+
* Create an in-memory LMDB-backed SlashingProtectionDatabase that can be shared across
|
|
143
|
+
* multiple validator nodes in the same process. Used for testing HA setups.
|
|
144
|
+
*/
|
|
145
|
+
export async function createSharedSlashingProtectionDb(
|
|
146
|
+
dateProvider: DateProvider = new DateProvider(),
|
|
147
|
+
): Promise<SlashingProtectionDatabase> {
|
|
148
|
+
const kvStore = await createStore('shared-signing-protection', LmdbSlashingProtectionDatabase.SCHEMA_VERSION, {
|
|
149
|
+
dataStoreMapSizeKb: 1024 * 1024,
|
|
150
|
+
});
|
|
151
|
+
return new LmdbSlashingProtectionDatabase(kvStore, dateProvider);
|
|
152
|
+
}
|
|
153
|
+
|
|
154
|
+
/**
|
|
155
|
+
* Create a ValidatorHASigner backed by a pre-existing SlashingProtectionDatabase.
|
|
156
|
+
* Used for testing HA setups where multiple nodes share the same protection database.
|
|
157
|
+
*/
|
|
158
|
+
export function createSignerFromSharedDb(
|
|
159
|
+
db: SlashingProtectionDatabase,
|
|
160
|
+
config: Pick<
|
|
161
|
+
ValidatorHASignerConfig,
|
|
162
|
+
'nodeId' | 'pollingIntervalMs' | 'signingTimeoutMs' | 'maxStuckDutiesAgeMs' | 'l1Contracts'
|
|
163
|
+
>,
|
|
164
|
+
deps?: CreateLocalSignerWithProtectionDeps,
|
|
165
|
+
): { signer: ValidatorHASigner; db: SlashingProtectionDatabase } {
|
|
166
|
+
const telemetryClient = deps?.telemetryClient ?? getTelemetryClient();
|
|
167
|
+
const dateProvider = deps?.dateProvider ?? new DateProvider();
|
|
168
|
+
const metrics = new HASignerMetrics(telemetryClient, config.nodeId, 'SharedSigningProtectionMetrics');
|
|
169
|
+
const signer = new ValidatorHASigner(db, config, { metrics, dateProvider });
|
|
170
|
+
return { signer, db };
|
|
171
|
+
}
|
|
@@ -99,7 +99,7 @@ export class SlashingProtectionService {
|
|
|
99
99
|
|
|
100
100
|
if (isNew) {
|
|
101
101
|
// We successfully acquired the lock
|
|
102
|
-
this.log.
|
|
102
|
+
this.log.verbose(`Acquired lock for duty ${dutyType} at slot ${slot}`, {
|
|
103
103
|
validatorAddress: validatorAddress.toString(),
|
|
104
104
|
nodeId,
|
|
105
105
|
});
|
|
@@ -177,7 +177,7 @@ export class SlashingProtectionService {
|
|
|
177
177
|
);
|
|
178
178
|
|
|
179
179
|
if (success) {
|
|
180
|
-
this.log.
|
|
180
|
+
this.log.verbose(`Recorded successful signing for duty ${dutyType} at slot ${slot}`, {
|
|
181
181
|
validatorAddress: validatorAddress.toString(),
|
|
182
182
|
nodeId,
|
|
183
183
|
});
|