forked from madara-alliance/madara-orchestrator
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
* strucutre for sending blob added * [test]: function defined * added condition to fetch nonce when the state_diff len is not-zero * updated the condition for nonce getting, to not get it for one contract address * test added for fft function * removed some unused comments * updated test_state_update_to_blob_Data test * deleted extra files * issue resolved * mocking added for state update to blob function * estimation added for txn and chain id dynamically setting * txn inclusion logic added and code cleanup * error message updated for blob length error * linting fix * linting fix * toml linting fixed * added nonce and to address --------- Co-authored-by: apoorvsadana <95699312+apoorvsadana@users.noreply.github.com>
- Loading branch information
1 parent
8afd049
commit 4db34a5
Showing
27 changed files
with
31,799 additions
and
124 deletions.
There are no files selected for viewing
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,2 @@ | ||
PK="private_key_here" | ||
ETHEREUM_RPC_URL="https://ethereum-holesky-rpc.publicnode.com" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,38 +1,215 @@ | ||
#![allow(missing_docs)] | ||
#![allow(clippy::missing_docs_in_private_items)] | ||
use alloy::consensus::{ | ||
BlobTransactionSidecar, SignableTransaction, TxEip4844, TxEip4844Variant, TxEip4844WithSidecar, TxEnvelope, | ||
}; | ||
use alloy::eips::{eip2718::Encodable2718, eip2930::AccessList, eip4844::BYTES_PER_BLOB}; | ||
use alloy::network::{Ethereum, TxSigner}; | ||
use alloy::primitives::{bytes, Address, FixedBytes, TxHash, U256, U64}; | ||
use alloy::providers::{Provider, ProviderBuilder, RootProvider}; | ||
use alloy::rpc::client::RpcClient; | ||
use alloy::signers::wallet::LocalWallet; | ||
use alloy::transports::http::Http; | ||
use async_trait::async_trait; | ||
|
||
use color_eyre::Result; | ||
use mockall::{automock, predicate::*}; | ||
use reqwest::Client; | ||
use starknet::core::types::FieldElement; | ||
use std::str::FromStr; | ||
use url::Url; | ||
|
||
use c_kzg::{Blob, KzgCommitment, KzgProof, KzgSettings}; | ||
use config::EthereumDaConfig; | ||
use da_client_interface::{DaClient, DaVerificationStatus}; | ||
|
||
use dotenv::dotenv; | ||
use std::{env, path::Path}; | ||
pub mod config; | ||
pub struct EthereumDaClient { | ||
#[allow(dead_code)] | ||
provider: RpcClient<Http<Client>>, | ||
provider: RootProvider<Ethereum, Http<Client>>, | ||
wallet: LocalWallet, | ||
trusted_setup: KzgSettings, | ||
} | ||
|
||
#[automock] | ||
#[async_trait] | ||
impl DaClient for EthereumDaClient { | ||
async fn publish_state_diff(&self, _state_diff: Vec<FieldElement>) -> Result<String> { | ||
unimplemented!() | ||
async fn publish_state_diff(&self, state_diff: Vec<Vec<u8>>, to: &[u8; 32]) -> Result<String> { | ||
dotenv().ok(); | ||
let provider = &self.provider; | ||
let trusted_setup = &self.trusted_setup; | ||
let wallet = &self.wallet; | ||
let addr = wallet.address(); | ||
|
||
let (sidecar_blobs, sidecar_commitments, sidecar_proofs) = prepare_sidecar(&state_diff, trusted_setup).await?; | ||
let sidecar = BlobTransactionSidecar::new(sidecar_blobs, sidecar_commitments, sidecar_proofs); | ||
|
||
let eip1559_est = provider.estimate_eip1559_fees(None).await?; | ||
let chain_id: u64 = provider.get_chain_id().await?.to_string().parse()?; | ||
|
||
let max_fee_per_blob_gas: u128 = provider.get_blob_base_fee().await?.to_string().parse()?; | ||
let max_priority_fee_per_gas: u128 = provider.get_max_priority_fee_per_gas().await?.to_string().parse()?; | ||
|
||
let nonce = provider.get_transaction_count(addr, None).await?.to_string().parse()?; | ||
let to = FixedBytes(*to); | ||
|
||
let tx = TxEip4844 { | ||
chain_id, | ||
nonce, | ||
gas_limit: 30_000_000, | ||
max_fee_per_gas: eip1559_est.max_fee_per_gas.to_string().parse()?, | ||
max_priority_fee_per_gas, | ||
to: Address::from_word(to), | ||
value: U256::from(0), | ||
access_list: AccessList(vec![]), | ||
blob_versioned_hashes: sidecar.versioned_hashes().collect(), | ||
max_fee_per_blob_gas, | ||
input: bytes!(), | ||
}; | ||
let tx_sidecar = TxEip4844WithSidecar { tx: tx.clone(), sidecar: sidecar.clone() }; | ||
let mut variant = TxEip4844Variant::from(tx_sidecar); | ||
|
||
// Sign and submit | ||
let signature = wallet.sign_transaction(&mut variant).await?; | ||
let tx_signed = variant.into_signed(signature); | ||
let tx_envelope: TxEnvelope = tx_signed.into(); | ||
let encoded = tx_envelope.encoded_2718(); | ||
|
||
let pending_tx = provider.send_raw_transaction(&encoded).await?; | ||
|
||
Ok(pending_tx.tx_hash().to_string()) | ||
} | ||
|
||
async fn verify_inclusion(&self, _external_id: &str) -> Result<DaVerificationStatus> { | ||
todo!() | ||
async fn verify_inclusion(&self, external_id: &str) -> Result<DaVerificationStatus> { | ||
let provider = &self.provider; | ||
let tx_hash: TxHash = external_id.parse().unwrap(); | ||
let txn_response = provider.get_transaction_receipt(tx_hash).await?; | ||
|
||
match txn_response { | ||
None => Ok(DaVerificationStatus::Pending), | ||
Some(receipt) => match receipt.status_code { | ||
Some(status) if status == U64::from(1) => Ok(DaVerificationStatus::Verified), | ||
_ => Ok(DaVerificationStatus::Rejected), | ||
}, | ||
} | ||
} | ||
|
||
async fn max_blob_per_txn(&self) -> u64 { | ||
6 | ||
} | ||
|
||
async fn max_bytes_per_blob(&self) -> u64 { | ||
131072 | ||
} | ||
} | ||
|
||
impl From<EthereumDaConfig> for EthereumDaClient { | ||
fn from(config: EthereumDaConfig) -> Self { | ||
let provider = RpcClient::builder() | ||
.reqwest_http(Url::from_str(config.rpc_url.as_str()).expect("Failed to parse ETHEREUM_RPC_URL")); | ||
EthereumDaClient { provider } | ||
let client = | ||
RpcClient::new_http(Url::from_str(config.rpc_url.as_str()).expect("Failed to parse ETHEREUM_RPC_URL")); | ||
let provider = ProviderBuilder::<_, Ethereum>::new().on_client(client); | ||
let wallet: LocalWallet = env::var("PK").expect("PK must be set").parse().expect("issue while parsing"); | ||
// let wallet: LocalWallet = config.private_key.as_str().parse(); | ||
let trusted_setup = KzgSettings::load_trusted_setup_file(Path::new("./trusted_setup.txt")) | ||
.expect("issue while loading the trusted setup"); | ||
EthereumDaClient { provider, wallet, trusted_setup } | ||
} | ||
} | ||
|
||
async fn prepare_sidecar( | ||
state_diff: &[Vec<u8>], | ||
trusted_setup: &KzgSettings, | ||
) -> Result<(Vec<FixedBytes<131072>>, Vec<FixedBytes<48>>, Vec<FixedBytes<48>>)> { | ||
let mut sidecar_blobs = vec![]; | ||
let mut sidecar_commitments = vec![]; | ||
let mut sidecar_proofs = vec![]; | ||
|
||
for blob_data in state_diff { | ||
let mut fixed_size_blob: [u8; BYTES_PER_BLOB] = [0; BYTES_PER_BLOB]; | ||
fixed_size_blob.copy_from_slice(blob_data.as_slice()); | ||
|
||
let blob = Blob::new(fixed_size_blob); | ||
|
||
let commitment = KzgCommitment::blob_to_kzg_commitment(&blob, trusted_setup)?; | ||
let proof = KzgProof::compute_blob_kzg_proof(&blob, &commitment.to_bytes(), trusted_setup)?; | ||
|
||
sidecar_blobs.push(FixedBytes::new(fixed_size_blob)); | ||
sidecar_commitments.push(FixedBytes::new(commitment.to_bytes().into_inner())); | ||
sidecar_proofs.push(FixedBytes::new(proof.to_bytes().into_inner())); | ||
} | ||
|
||
Ok((sidecar_blobs, sidecar_commitments, sidecar_proofs)) | ||
} | ||
|
||
#[cfg(test)] | ||
mod tests { | ||
use super::*; | ||
use std::fs::File; | ||
use std::io::{self, BufRead}; | ||
|
||
#[tokio::test] | ||
async fn test_kzg() { | ||
let trusted_setup = KzgSettings::load_trusted_setup_file(Path::new("./trusted_setup.txt")) | ||
.expect("Error loading trusted setup file"); | ||
|
||
// hex of the blob data from the block 630872 of L2 | ||
// https://voyager.online/block/0x3333f2f6b32776ac031e7ed373858c656d6d1040e47b73c94e762e6ed4cedf3 (L2) | ||
// https://etherscan.io/tx/0x6b9fc547764a5d6e4451b5236b92e74c70800250f00fc1974fc0a75a459dc12e (L1) | ||
let file_path = "./test_utils/hex_block_630872.txt"; | ||
|
||
// open the file and store the data as a single string | ||
let file = File::open(file_path).expect("Unable to load the file for hex"); | ||
let reader = io::BufReader::new(file); | ||
let mut data = String::new(); | ||
for line in reader.lines().map_while(Result::ok) { | ||
data.push_str(&line); | ||
} | ||
|
||
// create vec<u8> from the hex string | ||
let data_v8 = hex_string_to_u8_vec(&data).expect("error creating hex string from data"); | ||
|
||
// creation of sidecar | ||
let (_sidecar_blobs, sidecar_commitments, sidecar_proofs) = | ||
prepare_sidecar(&[data_v8], &trusted_setup).await.expect("Error creating the sidecar blobs"); | ||
|
||
// blob commitment from L1 | ||
let commitment_vector = hex_string_to_u8_vec( | ||
"adece1d251a1671e134d57204ef111308818dacf97d2372b28b53f947682de715fd0a75f57496124ec97609a52e8ca52", | ||
) | ||
.expect("Error creating the vector of u8 from commitment"); | ||
let commitment_fixedbytes: FixedBytes<48> = FixedBytes::from_slice(&commitment_vector); | ||
|
||
// blob proof from L1 | ||
let proof_vector = hex_string_to_u8_vec( | ||
"999371598a3807abe20956a5754f9894f2d8fe2a0f8fd49bb13f294282121be1118627f2f9fe4e2ea0b9760addd41a0c", | ||
) | ||
.expect("Error creating the vector of u8 from proof"); | ||
let proog_fixedbytes: FixedBytes<48> = FixedBytes::from_slice(&proof_vector); | ||
|
||
// blob commitment and proof should be equal to the blob created by prepare_sidecar | ||
assert_eq!(sidecar_commitments[0], commitment_fixedbytes); | ||
assert_eq!(sidecar_proofs[0], proog_fixedbytes); | ||
} | ||
|
||
fn hex_string_to_u8_vec(hex_str: &str) -> Result<Vec<u8>, String> { | ||
// Remove any spaces or non-hex characters from the input string | ||
let cleaned_str: String = hex_str.chars().filter(|c| c.is_ascii_hexdigit()).collect(); | ||
|
||
// Convert the cleaned hex string to a Vec<u8> | ||
let mut result = Vec::new(); | ||
for chunk in cleaned_str.as_bytes().chunks(2) { | ||
if let Ok(byte_val) = u8::from_str_radix(std::str::from_utf8(chunk).unwrap(), 16) { | ||
result.push(byte_val); | ||
} else { | ||
return Err(format!("Error parsing hex string: {}", cleaned_str)); | ||
} | ||
} | ||
println!("length of vec<u8>: {}", result.len()); | ||
Ok(result) | ||
} | ||
|
||
fn _vec_u8_to_hex_string(data: &[u8]) -> String { | ||
let hex_chars: Vec<String> = data.iter().map(|byte| format!("{:02X}", byte)).collect(); | ||
hex_chars.join("") | ||
} | ||
} |
Large diffs are not rendered by default.
Oops, something went wrong.
Oops, something went wrong.