Skip to content

Conversation

@niran
Copy link
Contributor

@niran niran commented Sep 28, 2025

The previous configuration stored the address 0xafF0CA253b97e54440965855cec0A8a2E2399896 for all roles in the protocol, but that key wasn't being used. The batcher uses 0xa0Ee7A142d267C1f36714E4a8F75612F20a79720 and op-node signs unsafe blocks with 0x9965507D1a55bcC2695C58ba16FB37d819B0A4dc. This discrepancy prevented safe head from advancing and op-node peers from successfully processing signed unsafe blocks. These changes fix both issues.

op-contracts has been updated to v4.0.0 (via l1ContractsLocator and l2ContractsLocator), and op-deployer v0.4.2 was used to regenerate the rollup configuration.

@niran
Copy link
Contributor Author

niran commented Sep 28, 2025

This fix is intended to supersede #188.

@gpevnev
Copy link
Collaborator

gpevnev commented Nov 5, 2025

@niran trying to pick this PR up. do you think this might be connected to #202 ?

@niran
Copy link
Contributor Author

niran commented Nov 6, 2025

@gpevnev Yes! #202 almost certainly is the same issue. Safe head can't advance because the key being used to submit batches is not the key in the L1 SystemConfig.

@gpevnev
Copy link
Collaborator

gpevnev commented Nov 7, 2025

@niran let's merge when CI passes, force push to re-trigger CI jobs if they won't start shortly

@metachris
Copy link
Contributor

@niran could you please push an empty commit to retrigger CI? I can't seem to trigger the actions otherwise.

@niran
Copy link
Contributor Author

niran commented Nov 10, 2025

@metachris Done! The workflow still needs approval before it will run.

@metachris
Copy link
Contributor

thank you, great PR!

@metachris metachris merged commit 733ba37 into flashbots:main Nov 11, 2025
8 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants