@aztec/bb-prover 0.39.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (49) hide show
  1. package/dest/bb/cli.d.ts +9 -0
  2. package/dest/bb/cli.d.ts.map +1 -0
  3. package/dest/bb/cli.js +64 -0
  4. package/dest/bb/execute.d.ts +88 -0
  5. package/dest/bb/execute.d.ts.map +1 -0
  6. package/dest/bb/execute.js +288 -0
  7. package/dest/bb/index.d.ts +3 -0
  8. package/dest/bb/index.d.ts.map +1 -0
  9. package/dest/bb/index.js +18 -0
  10. package/dest/index.d.ts +3 -0
  11. package/dest/index.d.ts.map +1 -0
  12. package/dest/index.js +3 -0
  13. package/dest/mappings/mappings.d.ts +12 -0
  14. package/dest/mappings/mappings.d.ts.map +1 -0
  15. package/dest/mappings/mappings.js +22 -0
  16. package/dest/prover/bb_native_proof_creator.d.ts +58 -0
  17. package/dest/prover/bb_native_proof_creator.d.ts.map +1 -0
  18. package/dest/prover/bb_native_proof_creator.js +238 -0
  19. package/dest/prover/bb_prover.d.ts +110 -0
  20. package/dest/prover/bb_prover.d.ts.map +1 -0
  21. package/dest/prover/bb_prover.js +321 -0
  22. package/dest/prover/index.d.ts +3 -0
  23. package/dest/prover/index.d.ts.map +1 -0
  24. package/dest/prover/index.js +3 -0
  25. package/dest/prover/verification_key_data.d.ts +16 -0
  26. package/dest/prover/verification_key_data.d.ts.map +1 -0
  27. package/dest/prover/verification_key_data.js +5 -0
  28. package/dest/stats.d.ts +9 -0
  29. package/dest/stats.d.ts.map +1 -0
  30. package/dest/stats.js +61 -0
  31. package/dest/test/index.d.ts +2 -0
  32. package/dest/test/index.d.ts.map +1 -0
  33. package/dest/test/index.js +2 -0
  34. package/dest/test/test_circuit_prover.d.ts +48 -0
  35. package/dest/test/test_circuit_prover.d.ts.map +1 -0
  36. package/dest/test/test_circuit_prover.js +128 -0
  37. package/package.json +85 -0
  38. package/src/bb/cli.ts +92 -0
  39. package/src/bb/execute.ts +359 -0
  40. package/src/bb/index.ts +23 -0
  41. package/src/index.ts +2 -0
  42. package/src/mappings/mappings.ts +41 -0
  43. package/src/prover/bb_native_proof_creator.ts +382 -0
  44. package/src/prover/bb_prover.ts +557 -0
  45. package/src/prover/index.ts +2 -0
  46. package/src/prover/verification_key_data.ts +16 -0
  47. package/src/stats.ts +82 -0
  48. package/src/test/index.ts +1 -0
  49. package/src/test/test_circuit_prover.ts +268 -0
@@ -0,0 +1,238 @@
1
+ import { Fr, NESTED_RECURSIVE_PROOF_LENGTH, Proof, RECURSIVE_PROOF_LENGTH, RecursiveProof, VerificationKeyAsFields, } from '@aztec/circuits.js';
2
+ import { siloNoteHash } from '@aztec/circuits.js/hash';
3
+ import { randomBytes } from '@aztec/foundation/crypto';
4
+ import { createDebugLogger } from '@aztec/foundation/log';
5
+ import { ClientCircuitArtifacts, convertPrivateKernelInitInputsToWitnessMap, convertPrivateKernelInitOutputsFromWitnessMap, convertPrivateKernelInnerInputsToWitnessMap, convertPrivateKernelInnerOutputsFromWitnessMap, convertPrivateKernelTailForPublicOutputsFromWitnessMap, convertPrivateKernelTailInputsToWitnessMap, convertPrivateKernelTailOutputsFromWitnessMap, convertPrivateKernelTailToPublicInputsToWitnessMap, } from '@aztec/noir-protocol-circuits-types';
6
+ import { WASMSimulator } from '@aztec/simulator';
7
+ import { serializeWitness } from '@noir-lang/noirc_abi';
8
+ import * as fs from 'fs/promises';
9
+ import { BB_RESULT, PROOF_FIELDS_FILENAME, PROOF_FILENAME, VK_FIELDS_FILENAME, VK_FILENAME, generateKeyForNoirCircuit, generateProof, verifyProof, } from '../bb/execute.js';
10
+ import { AGGREGATION_OBJECT_SIZE, CIRCUIT_PUBLIC_INPUTS_INDEX, CIRCUIT_RECURSIVE_INDEX, CIRCUIT_SIZE_INDEX, } from './verification_key_data.js';
11
+ const PrivateKernelArtifactMapping = {
12
+ PrivateKernelInitArtifact: {
13
+ convertOutputs: convertPrivateKernelInitOutputsFromWitnessMap,
14
+ },
15
+ PrivateKernelInnerArtifact: {
16
+ convertOutputs: convertPrivateKernelInnerOutputsFromWitnessMap,
17
+ },
18
+ PrivateKernelTailArtifact: {
19
+ convertOutputs: convertPrivateKernelTailOutputsFromWitnessMap,
20
+ },
21
+ PrivateKernelTailToPublicArtifact: {
22
+ convertOutputs: convertPrivateKernelTailForPublicOutputsFromWitnessMap,
23
+ },
24
+ };
25
+ /**
26
+ * This proof creator implementation uses the native bb binary.
27
+ * This is a temporary implementation until we make the WASM version work.
28
+ */
29
+ export class BBNativeProofCreator {
30
+ constructor(bbBinaryPath, bbWorkingDirectory, log = createDebugLogger('aztec:bb-native-prover')) {
31
+ this.bbBinaryPath = bbBinaryPath;
32
+ this.bbWorkingDirectory = bbWorkingDirectory;
33
+ this.log = log;
34
+ this.simulator = new WASMSimulator();
35
+ this.verificationKeys = new Map();
36
+ }
37
+ getSiloedCommitments(publicInputs) {
38
+ const contractAddress = publicInputs.callContext.storageContractAddress;
39
+ return Promise.resolve(publicInputs.newNoteHashes.map(commitment => siloNoteHash(contractAddress, commitment.value)));
40
+ }
41
+ async createProofInit(inputs) {
42
+ const witnessMap = convertPrivateKernelInitInputsToWitnessMap(inputs);
43
+ return await this.createSafeProof(witnessMap, 'PrivateKernelInitArtifact');
44
+ }
45
+ async createProofInner(inputs) {
46
+ const witnessMap = convertPrivateKernelInnerInputsToWitnessMap(inputs);
47
+ return await this.createSafeProof(witnessMap, 'PrivateKernelInnerArtifact');
48
+ }
49
+ async createProofTail(inputs) {
50
+ if (!inputs.isForPublic()) {
51
+ const witnessMap = convertPrivateKernelTailInputsToWitnessMap(inputs);
52
+ return await this.createSafeProof(witnessMap, 'PrivateKernelTailArtifact');
53
+ }
54
+ const witnessMap = convertPrivateKernelTailToPublicInputsToWitnessMap(inputs);
55
+ return await this.createSafeProof(witnessMap, 'PrivateKernelTailToPublicArtifact');
56
+ }
57
+ async createAppCircuitProof(partialWitness, bytecode) {
58
+ const directory = `${this.bbWorkingDirectory}/${randomBytes(8).toString('hex')}`;
59
+ await fs.mkdir(directory, { recursive: true });
60
+ this.log.debug(`Created directory: ${directory}`);
61
+ try {
62
+ this.log.debug(`Proving app circuit`);
63
+ const proofOutput = await this.createProof(directory, partialWitness, bytecode, 'App');
64
+ if (proofOutput.proof.proof.length != RECURSIVE_PROOF_LENGTH) {
65
+ throw new Error(`Incorrect proof length`);
66
+ }
67
+ const proof = proofOutput.proof;
68
+ const output = {
69
+ proof,
70
+ verificationKey: proofOutput.verificationKey,
71
+ };
72
+ return output;
73
+ }
74
+ finally {
75
+ await fs.rm(directory, { recursive: true, force: true });
76
+ this.log.debug(`Deleted directory: ${directory}`);
77
+ }
78
+ }
79
+ /**
80
+ * Verifies a proof, will generate the verification key if one is not cached internally
81
+ * @param circuitType - The type of circuit whose proof is to be verified
82
+ * @param proof - The proof to be verified
83
+ */
84
+ async verifyProofForProtocolCircuit(circuitType, proof) {
85
+ const verificationKey = await this.getVerificationKeyDataForCircuit(circuitType);
86
+ this.log.debug(`Verifying with key: ${verificationKey.hash.toString()}`);
87
+ const logFunction = (message) => {
88
+ this.log.debug(`${circuitType} BB out - ${message}`);
89
+ };
90
+ const result = await this.verifyProofFromKey(verificationKey.keyAsBytes, proof, logFunction);
91
+ if (result.status === BB_RESULT.FAILURE) {
92
+ const errorMessage = `Failed to verify ${circuitType} proof!`;
93
+ throw new Error(errorMessage);
94
+ }
95
+ this.log.info(`Successfully verified ${circuitType} proof in ${result.duration} ms`);
96
+ }
97
+ async verifyProofFromKey(verificationKey, proof, logFunction = () => { }) {
98
+ // Create random directory to be used for temp files
99
+ const bbWorkingDirectory = `${this.bbWorkingDirectory}/${randomBytes(8).toString('hex')}`;
100
+ await fs.mkdir(bbWorkingDirectory, { recursive: true });
101
+ const proofFileName = `${bbWorkingDirectory}/proof`;
102
+ const verificationKeyPath = `${bbWorkingDirectory}/vk`;
103
+ await fs.writeFile(proofFileName, proof.buffer);
104
+ await fs.writeFile(verificationKeyPath, verificationKey);
105
+ try {
106
+ return await verifyProof(this.bbBinaryPath, proofFileName, verificationKeyPath, logFunction);
107
+ }
108
+ finally {
109
+ await fs.rm(bbWorkingDirectory, { recursive: true, force: true });
110
+ }
111
+ }
112
+ /**
113
+ * Returns the verification key data for a circuit, will generate and cache it if not cached internally
114
+ * @param circuitType - The type of circuit for which the verification key is required
115
+ * @returns The verification key data
116
+ */
117
+ async getVerificationKeyDataForCircuit(circuitType) {
118
+ let promise = this.verificationKeys.get(circuitType);
119
+ if (!promise) {
120
+ promise = generateKeyForNoirCircuit(this.bbBinaryPath, this.bbWorkingDirectory, circuitType, ClientCircuitArtifacts[circuitType], 'vk', this.log.debug).then(result => {
121
+ if (result.status === BB_RESULT.FAILURE) {
122
+ throw new Error(`Failed to generate verification key for ${circuitType}, ${result.reason}`);
123
+ }
124
+ return this.convertVk(result.vkPath);
125
+ });
126
+ this.verificationKeys.set(circuitType, promise);
127
+ }
128
+ return await promise;
129
+ }
130
+ /**
131
+ * Reads the verification key data stored at the specified location and parses into a VerificationKeyData
132
+ * @param filePath - The directory containing the verification key data files
133
+ * @returns The verification key data
134
+ */
135
+ async convertVk(filePath) {
136
+ const [rawFields, rawBinary] = await Promise.all([
137
+ fs.readFile(`${filePath}/${VK_FIELDS_FILENAME}`, { encoding: 'utf-8' }),
138
+ fs.readFile(`${filePath}/${VK_FILENAME}`),
139
+ ]);
140
+ const fieldsJson = JSON.parse(rawFields);
141
+ const fields = fieldsJson.map(Fr.fromString);
142
+ // The first item is the hash, this is not part of the actual VK
143
+ const vkHash = fields[0];
144
+ const actualVk = fields.slice(1);
145
+ const vk = {
146
+ hash: vkHash,
147
+ keyAsFields: actualVk,
148
+ keyAsBytes: rawBinary,
149
+ numPublicInputs: Number(actualVk[CIRCUIT_PUBLIC_INPUTS_INDEX]),
150
+ circuitSize: Number(actualVk[CIRCUIT_SIZE_INDEX]),
151
+ isRecursive: actualVk[CIRCUIT_RECURSIVE_INDEX] == Fr.ONE,
152
+ };
153
+ return vk;
154
+ }
155
+ /**
156
+ * Ensures our verification key cache includes the key data located at the specified directory
157
+ * @param filePath - The directory containing the verification key data files
158
+ * @param circuitType - The type of circuit to which the verification key corresponds
159
+ */
160
+ async updateVerificationKeyAfterProof(filePath, circuitType) {
161
+ let promise = this.verificationKeys.get(circuitType);
162
+ if (!promise) {
163
+ promise = this.convertVk(filePath);
164
+ this.log.debug(`Updated verification key for circuit: ${circuitType}`);
165
+ this.verificationKeys.set(circuitType, promise);
166
+ }
167
+ return await promise;
168
+ }
169
+ async createSafeProof(inputs, circuitType) {
170
+ const directory = `${this.bbWorkingDirectory}/${randomBytes(8).toString('hex')}`;
171
+ await fs.mkdir(directory, { recursive: true });
172
+ this.log.debug(`Created directory: ${directory}`);
173
+ try {
174
+ return await this.generateWitnessAndCreateProof(inputs, circuitType, directory);
175
+ }
176
+ finally {
177
+ await fs.rm(directory, { recursive: true, force: true });
178
+ this.log.debug(`Deleted directory: ${directory}`);
179
+ }
180
+ }
181
+ async generateWitnessAndCreateProof(inputs, circuitType, directory) {
182
+ this.log.debug(`Generating witness for ${circuitType}`);
183
+ const compiledCircuit = ClientCircuitArtifacts[circuitType];
184
+ const outputWitness = await this.simulator.simulateCircuit(inputs, compiledCircuit);
185
+ this.log.debug(`Generated witness for ${circuitType}`);
186
+ const publicInputs = PrivateKernelArtifactMapping[circuitType].convertOutputs(outputWitness);
187
+ const proofOutput = await this.createProof(directory, outputWitness, Buffer.from(compiledCircuit.bytecode, 'base64'), circuitType);
188
+ if (proofOutput.proof.proof.length != NESTED_RECURSIVE_PROOF_LENGTH) {
189
+ throw new Error(`Incorrect proof length`);
190
+ }
191
+ const nestedProof = proofOutput.proof;
192
+ const kernelOutput = {
193
+ publicInputs,
194
+ proof: nestedProof,
195
+ verificationKey: proofOutput.verificationKey,
196
+ };
197
+ return kernelOutput;
198
+ }
199
+ async createProof(directory, partialWitness, bytecode, circuitType) {
200
+ const compressedBincodedWitness = serializeWitness(partialWitness);
201
+ const inputsWitnessFile = `${directory}/witness.gz`;
202
+ await fs.writeFile(inputsWitnessFile, compressedBincodedWitness);
203
+ this.log.debug(`Written ${inputsWitnessFile}`);
204
+ const provingResult = await generateProof(this.bbBinaryPath, directory, circuitType, bytecode, inputsWitnessFile, this.log.debug);
205
+ if (provingResult.status === BB_RESULT.FAILURE) {
206
+ this.log.error(`Failed to generate proof for ${circuitType}: ${provingResult.reason}`);
207
+ throw new Error(provingResult.reason);
208
+ }
209
+ if (circuitType === 'App') {
210
+ const vkData = await this.convertVk(directory);
211
+ const proof = await this.readProofAsFields(directory, circuitType, vkData);
212
+ return { proof, verificationKey: new VerificationKeyAsFields(vkData.keyAsFields, vkData.hash) };
213
+ }
214
+ const vkData = await this.updateVerificationKeyAfterProof(directory, circuitType);
215
+ const proof = await this.readProofAsFields(directory, circuitType, vkData);
216
+ return { proof, verificationKey: new VerificationKeyAsFields(vkData.keyAsFields, vkData.hash) };
217
+ }
218
+ /**
219
+ * Parses and returns the proof data stored at the specified directory
220
+ * @param filePath - The directory containing the proof data
221
+ * @param circuitType - The type of circuit proven
222
+ * @returns The proof
223
+ */
224
+ async readProofAsFields(filePath, circuitType, vkData) {
225
+ const [binaryProof, proofString] = await Promise.all([
226
+ fs.readFile(`${filePath}/${PROOF_FILENAME}`),
227
+ fs.readFile(`${filePath}/${PROOF_FIELDS_FILENAME}`, { encoding: 'utf-8' }),
228
+ ]);
229
+ const json = JSON.parse(proofString);
230
+ const fields = json.map(Fr.fromString);
231
+ const numPublicInputs = circuitType === 'App' ? vkData.numPublicInputs : vkData.numPublicInputs - AGGREGATION_OBJECT_SIZE;
232
+ const fieldsWithoutPublicInputs = fields.slice(numPublicInputs);
233
+ this.log.debug(`Circuit type: ${circuitType}, complete proof length: ${fields.length}, without public inputs: ${fieldsWithoutPublicInputs.length}, num public inputs: ${numPublicInputs}, circuit size: ${vkData.circuitSize}, is recursive: ${vkData.isRecursive}, raw length: ${binaryProof.length}`);
234
+ const proof = new RecursiveProof(fieldsWithoutPublicInputs, new Proof(binaryProof));
235
+ return proof;
236
+ }
237
+ }
238
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"bb_native_proof_creator.js","sourceRoot":"","sources":["../../src/prover/bb_native_proof_creator.ts"],"names":[],"mappings":"AACA,OAAO,EACL,EAAE,EACF,6BAA6B,EAO7B,KAAK,EACL,sBAAsB,EACtB,cAAc,EAEd,uBAAuB,GACxB,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EAAE,YAAY,EAAE,MAAM,yBAAyB,CAAC;AACvD,OAAO,EAAE,WAAW,EAAE,MAAM,0BAA0B,CAAC;AACvD,OAAO,EAAE,iBAAiB,EAAE,MAAM,uBAAuB,CAAC;AAE1D,OAAO,EACL,sBAAsB,EAEtB,0CAA0C,EAC1C,6CAA6C,EAC7C,2CAA2C,EAC3C,8CAA8C,EAC9C,sDAAsD,EACtD,0CAA0C,EAC1C,6CAA6C,EAC7C,kDAAkD,GACnD,MAAM,qCAAqC,CAAC;AAC7C,OAAO,EAAkB,aAAa,EAAE,MAAM,kBAAkB,CAAC;AAGjE,OAAO,EAAE,gBAAgB,EAAE,MAAM,sBAAsB,CAAC;AAExD,OAAO,KAAK,EAAE,MAAM,aAAa,CAAC;AAElC,OAAO,EACL,SAAS,EACT,qBAAqB,EACrB,cAAc,EACd,kBAAkB,EAClB,WAAW,EACX,yBAAyB,EACzB,aAAa,EACb,WAAW,GACZ,MAAM,kBAAkB,CAAC;AAC1B,OAAO,EACL,uBAAuB,EACvB,2BAA2B,EAC3B,uBAAuB,EACvB,kBAAkB,GAEnB,MAAM,4BAA4B,CAAC;AAMpC,MAAM,4BAA4B,GAA4D;IAC5F,yBAAyB,EAAE;QACzB,cAAc,EAAE,6CAA6C;KAC9D;IACD,0BAA0B,EAAE;QAC1B,cAAc,EAAE,8CAA8C;KAC/D;IACD,yBAAyB,EAAE;QACzB,cAAc,EAAE,6CAA6C;KAC9D;IACD,iCAAiC,EAAE;QACjC,cAAc,EAAE,sDAAsD;KACvE;CACF,CAAC;AAEF;;;GAGG;AACH,MAAM,OAAO,oBAAoB;IAQ/B,YACU,YAAoB,EACpB,kBAA0B,EAC1B,MAAM,iBAAiB,CAAC,wBAAwB,CAAC;QAFjD,iBAAY,GAAZ,YAAY,CAAQ;QACpB,uBAAkB,GAAlB,kBAAkB,CAAQ;QAC1B,QAAG,GAAH,GAAG,CAA8C;QAVnD,cAAS,GAAG,IAAI,aAAa,EAAE,CAAC;QAEhC,qBAAgB,GAA8D,IAAI,GAAG,EAG1F,CAAC;IAMD,CAAC;IAEG,oBAAoB,CAAC,YAAwC;QAClE,MAAM,eAAe,GAAG,YAAY,CAAC,WAAW,CAAC,sBAAsB,CAAC;QAExE,OAAO,OAAO,CAAC,OAAO,CACpB,YAAY,CAAC,aAAa,CAAC,GAAG,CAAC,UAAU,CAAC,EAAE,CAAC,YAAY,CAAC,eAAe,EAAE,UAAU,CAAC,KAAK,CAAC,CAAC,CAC9F,CAAC;IACJ,CAAC;IAEM,KAAK,CAAC,eAAe,CAC1B,MAA6C;QAE7C,MAAM,UAAU,GAAG,0CAA0C,CAAC,MAAM,CAAC,CAAC;QACtE,OAAO,MAAM,IAAI,CAAC,eAAe,CAAC,UAAU,EAAE,2BAA2B,CAAC,CAAC;IAC7E,CAAC;IAEM,KAAK,CAAC,gBAAgB,CAC3B,MAA8C;QAE9C,MAAM,UAAU,GAAG,2CAA2C,CAAC,MAAM,CAAC,CAAC;QACvE,OAAO,MAAM,IAAI,CAAC,eAAe,CAAC,UAAU,EAAE,4BAA4B,CAAC,CAAC;IAC9E,CAAC;IAEM,KAAK,CAAC,eAAe,CAC1B,MAA6C;QAE7C,IAAI,CAAC,MAAM,CAAC,WAAW,EAAE,EAAE,CAAC;YAC1B,MAAM,UAAU,GAAG,0CAA0C,CAAC,MAAM,CAAC,CAAC;YACtE,OAAO,MAAM,IAAI,CAAC,eAAe,CAAC,UAAU,EAAE,2BAA2B,CAAC,CAAC;QAC7E,CAAC;QACD,MAAM,UAAU,GAAG,kDAAkD,CAAC,MAAM,CAAC,CAAC;QAC9E,OAAO,MAAM,IAAI,CAAC,eAAe,CAAC,UAAU,EAAE,mCAAmC,CAAC,CAAC;IACrF,CAAC;IAEM,KAAK,CAAC,qBAAqB,CAChC,cAAsC,EACtC,QAAgB;QAEhB,MAAM,SAAS,GAAG,GAAG,IAAI,CAAC,kBAAkB,IAAI,WAAW,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,EAAE,CAAC;QACjF,MAAM,EAAE,CAAC,KAAK,CAAC,SAAS,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;QAC/C,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC,sBAAsB,SAAS,EAAE,CAAC,CAAC;QAClD,IAAI,CAAC;YACH,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC,qBAAqB,CAAC,CAAC;YACtC,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,SAAS,EAAE,cAAc,EAAE,QAAQ,EAAE,KAAK,CAAC,CAAC;YACvF,IAAI,WAAW,CAAC,KAAK,CAAC,KAAK,CAAC,MAAM,IAAI,sBAAsB,EAAE,CAAC;gBAC7D,MAAM,IAAI,KAAK,CAAC,wBAAwB,CAAC,CAAC;YAC5C,CAAC;YACD,MAAM,KAAK,GAAG,WAAW,CAAC,KAAsD,CAAC;YACjF,MAAM,MAAM,GAA0B;gBACpC,KAAK;gBACL,eAAe,EAAE,WAAW,CAAC,eAAe;aAC7C,CAAC;YACF,OAAO,MAAM,CAAC;QAChB,CAAC;gBAAS,CAAC;YACT,MAAM,EAAE,CAAC,EAAE,CAAC,SAAS,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,KAAK,EAAE,IAAI,EAAE,CAAC,CAAC;YACzD,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC,sBAAsB,SAAS,EAAE,CAAC,CAAC;QACpD,CAAC;IACH,CAAC;IAED;;;;OAIG;IACI,KAAK,CAAC,6BAA6B,CAAC,WAAmC,EAAE,KAAY;QAC1F,MAAM,eAAe,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAAC,WAAW,CAAC,CAAC;QAEjF,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC,uBAAuB,eAAe,CAAC,IAAI,CAAC,QAAQ,EAAE,EAAE,CAAC,CAAC;QAEzE,MAAM,WAAW,GAAG,CAAC,OAAe,EAAE,EAAE;YACtC,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC,GAAG,WAAW,aAAa,OAAO,EAAE,CAAC,CAAC;QACvD,CAAC,CAAC;QAEF,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,kBAAkB,CAAC,eAAe,CAAC,UAAU,EAAE,KAAK,EAAE,WAAW,CAAC,CAAC;QAE7F,IAAI,MAAM,CAAC,MAAM,KAAK,SAAS,CAAC,OAAO,EAAE,CAAC;YACxC,MAAM,YAAY,GAAG,oBAAoB,WAAW,SAAS,CAAC;YAC9D,MAAM,IAAI,KAAK,CAAC,YAAY,CAAC,CAAC;QAChC,CAAC;QAED,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,yBAAyB,WAAW,aAAa,MAAM,CAAC,QAAQ,KAAK,CAAC,CAAC;IACvF,CAAC;IAEO,KAAK,CAAC,kBAAkB,CAC9B,eAAuB,EACvB,KAAY,EACZ,cAAyC,GAAG,EAAE,GAAE,CAAC;QAEjD,oDAAoD;QACpD,MAAM,kBAAkB,GAAG,GAAG,IAAI,CAAC,kBAAkB,IAAI,WAAW,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,EAAE,CAAC;QAC1F,MAAM,EAAE,CAAC,KAAK,CAAC,kBAAkB,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;QAExD,MAAM,aAAa,GAAG,GAAG,kBAAkB,QAAQ,CAAC;QACpD,MAAM,mBAAmB,GAAG,GAAG,kBAAkB,KAAK,CAAC;QAEvD,MAAM,EAAE,CAAC,SAAS,CAAC,aAAa,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;QAChD,MAAM,EAAE,CAAC,SAAS,CAAC,mBAAmB,EAAE,eAAe,CAAC,CAAC;QAEzD,IAAI,CAAC;YACH,OAAO,MAAM,WAAW,CAAC,IAAI,CAAC,YAAY,EAAE,aAAa,EAAE,mBAAoB,EAAE,WAAW,CAAC,CAAC;QAChG,CAAC;gBAAS,CAAC;YACT,MAAM,EAAE,CAAC,EAAE,CAAC,kBAAkB,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,KAAK,EAAE,IAAI,EAAE,CAAC,CAAC;QACpE,CAAC;IACH,CAAC;IAED;;;;OAIG;IACK,KAAK,CAAC,gCAAgC,CAAC,WAAmC;QAChF,IAAI,OAAO,GAAG,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;QACrD,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,OAAO,GAAG,yBAAyB,CACjC,IAAI,CAAC,YAAY,EACjB,IAAI,CAAC,kBAAkB,EACvB,WAAW,EACX,sBAAsB,CAAC,WAAW,CAAC,EACnC,IAAI,EACJ,IAAI,CAAC,GAAG,CAAC,KAAK,CACf,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE;gBACd,IAAI,MAAM,CAAC,MAAM,KAAK,SAAS,CAAC,OAAO,EAAE,CAAC;oBACxC,MAAM,IAAI,KAAK,CAAC,2CAA2C,WAAW,KAAK,MAAM,CAAC,MAAM,EAAE,CAAC,CAAC;gBAC9F,CAAC;gBACD,OAAO,IAAI,CAAC,SAAS,CAAC,MAAM,CAAC,MAAO,CAAC,CAAC;YACxC,CAAC,CAAC,CAAC;YACH,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,WAAW,EAAE,OAAO,CAAC,CAAC;QAClD,CAAC;QACD,OAAO,MAAM,OAAO,CAAC;IACvB,CAAC;IAED;;;;OAIG;IACK,KAAK,CAAC,SAAS,CAAC,QAAgB;QACtC,MAAM,CAAC,SAAS,EAAE,SAAS,CAAC,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC;YAC/C,EAAE,CAAC,QAAQ,CAAC,GAAG,QAAQ,IAAI,kBAAkB,EAAE,EAAE,EAAE,QAAQ,EAAE,OAAO,EAAE,CAAC;YACvE,EAAE,CAAC,QAAQ,CAAC,GAAG,QAAQ,IAAI,WAAW,EAAE,CAAC;SAC1C,CAAC,CAAC;QACH,MAAM,UAAU,GAAG,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC;QACzC,MAAM,MAAM,GAAG,UAAU,CAAC,GAAG,CAAC,EAAE,CAAC,UAAU,CAAC,CAAC;QAC7C,gEAAgE;QAChE,MAAM,MAAM,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;QACzB,MAAM,QAAQ,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;QACjC,MAAM,EAAE,GAAwB;YAC9B,IAAI,EAAE,MAAM;YACZ,WAAW,EAAE,QAA+D;YAC5E,UAAU,EAAE,SAAS;YACrB,eAAe,EAAE,MAAM,CAAC,QAAQ,CAAC,2BAA2B,CAAC,CAAC;YAC9D,WAAW,EAAE,MAAM,CAAC,QAAQ,CAAC,kBAAkB,CAAC,CAAC;YACjD,WAAW,EAAE,QAAQ,CAAC,uBAAuB,CAAC,IAAI,EAAE,CAAC,GAAG;SACzD,CAAC;QACF,OAAO,EAAE,CAAC;IACZ,CAAC;IAED;;;;OAIG;IACK,KAAK,CAAC,+BAA+B,CAAC,QAAgB,EAAE,WAAmC;QACjG,IAAI,OAAO,GAAG,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;QACrD,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,OAAO,GAAG,IAAI,CAAC,SAAS,CAAC,QAAQ,CAAC,CAAC;YACnC,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC,yCAAyC,WAAW,EAAE,CAAC,CAAC;YACvE,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,WAAW,EAAE,OAAO,CAAC,CAAC;QAClD,CAAC;QACD,OAAO,MAAM,OAAO,CAAC;IACvB,CAAC;IAEO,KAAK,CAAC,eAAe,CAC3B,MAAkB,EAClB,WAAmC;QAEnC,MAAM,SAAS,GAAG,GAAG,IAAI,CAAC,kBAAkB,IAAI,WAAW,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,EAAE,CAAC;QACjF,MAAM,EAAE,CAAC,KAAK,CAAC,SAAS,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;QAC/C,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC,sBAAsB,SAAS,EAAE,CAAC,CAAC;QAClD,IAAI,CAAC;YACH,OAAO,MAAM,IAAI,CAAC,6BAA6B,CAAC,MAAM,EAAE,WAAW,EAAE,SAAS,CAAC,CAAC;QAClF,CAAC;gBAAS,CAAC;YACT,MAAM,EAAE,CAAC,EAAE,CAAC,SAAS,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,KAAK,EAAE,IAAI,EAAE,CAAC,CAAC;YACzD,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC,sBAAsB,SAAS,EAAE,CAAC,CAAC;QACpD,CAAC;IACH,CAAC;IAEO,KAAK,CAAC,6BAA6B,CACzC,MAAkB,EAClB,WAAmC,EACnC,SAAiB;QAEjB,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC,0BAA0B,WAAW,EAAE,CAAC,CAAC;QACxD,MAAM,eAAe,GAAwB,sBAAsB,CAAC,WAAW,CAAC,CAAC;QAEjF,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC,eAAe,CAAC,MAAM,EAAE,eAAe,CAAC,CAAC;QAEpF,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC,yBAAyB,WAAW,EAAE,CAAC,CAAC;QAEvD,MAAM,YAAY,GAAG,4BAA4B,CAAC,WAAW,CAAC,CAAC,cAAc,CAAC,aAAa,CAAM,CAAC;QAElG,MAAM,WAAW,GAAG,MAAM,IAAI,CAAC,WAAW,CACxC,SAAS,EACT,aAAa,EACb,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,QAAQ,EAAE,QAAQ,CAAC,EAC/C,WAAW,CACZ,CAAC;QACF,IAAI,WAAW,CAAC,KAAK,CAAC,KAAK,CAAC,MAAM,IAAI,6BAA6B,EAAE,CAAC;YACpE,MAAM,IAAI,KAAK,CAAC,wBAAwB,CAAC,CAAC;QAC5C,CAAC;QACD,MAAM,WAAW,GAAG,WAAW,CAAC,KAA6D,CAAC;QAE9F,MAAM,YAAY,GAAyB;YACzC,YAAY;YACZ,KAAK,EAAE,WAAW;YAClB,eAAe,EAAE,WAAW,CAAC,eAAe;SAC7C,CAAC;QACF,OAAO,YAAY,CAAC;IACtB,CAAC;IAEO,KAAK,CAAC,WAAW,CACvB,SAAiB,EACjB,cAA0B,EAC1B,QAAgB,EAChB,WAA2C;QAK3C,MAAM,yBAAyB,GAAG,gBAAgB,CAAC,cAAc,CAAC,CAAC;QAEnE,MAAM,iBAAiB,GAAG,GAAG,SAAS,aAAa,CAAC;QAEpD,MAAM,EAAE,CAAC,SAAS,CAAC,iBAAiB,EAAE,yBAAyB,CAAC,CAAC;QAEjE,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC,WAAW,iBAAiB,EAAE,CAAC,CAAC;QAE/C,MAAM,aAAa,GAAG,MAAM,aAAa,CACvC,IAAI,CAAC,YAAY,EACjB,SAAS,EACT,WAAW,EACX,QAAQ,EACR,iBAAiB,EACjB,IAAI,CAAC,GAAG,CAAC,KAAK,CACf,CAAC;QAEF,IAAI,aAAa,CAAC,MAAM,KAAK,SAAS,CAAC,OAAO,EAAE,CAAC;YAC/C,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC,gCAAgC,WAAW,KAAK,aAAa,CAAC,MAAM,EAAE,CAAC,CAAC;YACvF,MAAM,IAAI,KAAK,CAAC,aAAa,CAAC,MAAM,CAAC,CAAC;QACxC,CAAC;QAED,IAAI,WAAW,KAAK,KAAK,EAAE,CAAC;YAC1B,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC,SAAS,CAAC,CAAC;YAC/C,MAAM,KAAK,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAgC,SAAS,EAAE,WAAW,EAAE,MAAM,CAAC,CAAC;YAC1G,OAAO,EAAE,KAAK,EAAE,eAAe,EAAE,IAAI,uBAAuB,CAAC,MAAM,CAAC,WAAW,EAAE,MAAM,CAAC,IAAI,CAAC,EAAE,CAAC;QAClG,CAAC;QAED,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,+BAA+B,CAAC,SAAS,EAAE,WAAW,CAAC,CAAC;QAClF,MAAM,KAAK,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAuC,SAAS,EAAE,WAAW,EAAE,MAAM,CAAC,CAAC;QACjH,OAAO,EAAE,KAAK,EAAE,eAAe,EAAE,IAAI,uBAAuB,CAAC,MAAM,CAAC,WAAW,EAAE,MAAM,CAAC,IAAI,CAAC,EAAE,CAAC;IAClG,CAAC;IAED;;;;;OAKG;IACK,KAAK,CAAC,iBAAiB,CAC7B,QAAgB,EAChB,WAA2C,EAC3C,MAA2B;QAE3B,MAAM,CAAC,WAAW,EAAE,WAAW,CAAC,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC;YACnD,EAAE,CAAC,QAAQ,CAAC,GAAG,QAAQ,IAAI,cAAc,EAAE,CAAC;YAC5C,EAAE,CAAC,QAAQ,CAAC,GAAG,QAAQ,IAAI,qBAAqB,EAAE,EAAE,EAAE,QAAQ,EAAE,OAAO,EAAE,CAAC;SAC3E,CAAC,CAAC;QACH,MAAM,IAAI,GAAG,IAAI,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC;QACrC,MAAM,MAAM,GAAG,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,UAAU,CAAC,CAAC;QACvC,MAAM,eAAe,GACnB,WAAW,KAAK,KAAK,CAAC,CAAC,CAAC,MAAM,CAAC,eAAe,CAAC,CAAC,CAAC,MAAM,CAAC,eAAe,GAAG,uBAAuB,CAAC;QACpG,MAAM,yBAAyB,GAAG,MAAM,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC;QAChE,IAAI,CAAC,GAAG,CAAC,KAAK,CACZ,iBAAiB,WAAW,4BAA4B,MAAM,CAAC,MAAM,4BAA4B,yBAAyB,CAAC,MAAM,wBAAwB,eAAe,mBAAmB,MAAM,CAAC,WAAW,mBAAmB,MAAM,CAAC,WAAW,iBAAiB,WAAW,CAAC,MAAM,EAAE,CACxR,CAAC;QACF,MAAM,KAAK,GAAG,IAAI,cAAc,CAAe,yBAAyB,EAAE,IAAI,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC;QAClG,OAAO,KAAK,CAAC;IACf,CAAC;CACF"}
@@ -0,0 +1,110 @@
1
+ import { type PublicInputsAndProof, type PublicKernelNonTailRequest, type PublicKernelTailRequest, type ServerCircuitProver } from '@aztec/circuit-types';
2
+ import { type BaseOrMergeRollupPublicInputs, type BaseParityInputs, type BaseRollupInputs, type KernelCircuitPublicInputs, type MergeRollupInputs, type NESTED_RECURSIVE_PROOF_LENGTH, Proof, type PublicKernelCircuitPublicInputs, type RECURSIVE_PROOF_LENGTH, RecursiveProof, RootParityInput, type RootParityInputs, type RootRollupInputs, type RootRollupPublicInputs, VerificationKeyAsFields } from '@aztec/circuits.js';
3
+ import { type ServerProtocolArtifact } from '@aztec/noir-protocol-circuits-types';
4
+ import { type WitnessMap } from '@noir-lang/types';
5
+ export type BBProverConfig = {
6
+ bbBinaryPath: string;
7
+ bbWorkingDirectory: string;
8
+ acvmBinaryPath: string;
9
+ acvmWorkingDirectory: string;
10
+ circuitFilter?: ServerProtocolArtifact[];
11
+ };
12
+ /**
13
+ * Prover implementation that uses barretenberg native proving
14
+ */
15
+ export declare class BBNativeRollupProver implements ServerCircuitProver {
16
+ private config;
17
+ private verificationKeys;
18
+ constructor(config: BBProverConfig);
19
+ static new(config: BBProverConfig): Promise<BBNativeRollupProver>;
20
+ /**
21
+ * Simulates the base parity circuit from its inputs.
22
+ * @param inputs - Inputs to the circuit.
23
+ * @returns The public inputs of the parity circuit.
24
+ */
25
+ getBaseParityProof(inputs: BaseParityInputs): Promise<RootParityInput<typeof RECURSIVE_PROOF_LENGTH>>;
26
+ /**
27
+ * Simulates the root parity circuit from its inputs.
28
+ * @param inputs - Inputs to the circuit.
29
+ * @returns The public inputs of the parity circuit.
30
+ */
31
+ getRootParityProof(inputs: RootParityInputs): Promise<RootParityInput<typeof NESTED_RECURSIVE_PROOF_LENGTH>>;
32
+ /**
33
+ * Requests that a public kernel circuit be executed and the proof generated
34
+ * @param kernelRequest - The object encapsulating the request for a proof
35
+ * @returns The requested circuit's public inputs and proof
36
+ */
37
+ getPublicKernelProof(kernelRequest: PublicKernelNonTailRequest): Promise<PublicInputsAndProof<PublicKernelCircuitPublicInputs>>;
38
+ /**
39
+ * Requests that the public kernel tail circuit be executed and the proof generated
40
+ * @param kernelRequest - The object encapsulating the request for a proof
41
+ * @returns The requested circuit's public inputs and proof
42
+ */
43
+ getPublicTailProof(kernelRequest: PublicKernelTailRequest): Promise<PublicInputsAndProof<KernelCircuitPublicInputs>>;
44
+ /**
45
+ * Simulates the base rollup circuit from its inputs.
46
+ * @param input - Inputs to the circuit.
47
+ * @returns The public inputs as outputs of the simulation.
48
+ */
49
+ getBaseRollupProof(input: BaseRollupInputs): Promise<PublicInputsAndProof<BaseOrMergeRollupPublicInputs>>;
50
+ /**
51
+ * Simulates the merge rollup circuit from its inputs.
52
+ * @param input - Inputs to the circuit.
53
+ * @returns The public inputs as outputs of the simulation.
54
+ */
55
+ getMergeRollupProof(input: MergeRollupInputs): Promise<PublicInputsAndProof<BaseOrMergeRollupPublicInputs>>;
56
+ /**
57
+ * Simulates the root rollup circuit from its inputs.
58
+ * @param input - Inputs to the circuit.
59
+ * @returns The public inputs as outputs of the simulation.
60
+ */
61
+ getRootRollupProof(input: RootRollupInputs): Promise<PublicInputsAndProof<RootRollupPublicInputs>>;
62
+ createProof(witnessMap: WitnessMap, circuitType: ServerProtocolArtifact): Promise<[WitnessMap, Proof]>;
63
+ /**
64
+ * Executes a circuit and returns it's outputs and corresponding proof with embedded aggregation object
65
+ * @param witnessMap - The input witness
66
+ * @param circuitType - The type of circuit to be executed
67
+ * @param convertOutput - Function for parsing the output witness to it's corresponding object
68
+ * @returns The circuits output object and it's proof
69
+ */
70
+ createRecursiveProof<PROOF_LENGTH extends number, CircuitOutputType>(witnessMap: WitnessMap, circuitType: ServerProtocolArtifact, convertOutput: (outputWitness: WitnessMap) => CircuitOutputType): Promise<[CircuitOutputType, RecursiveProof<PROOF_LENGTH>]>;
71
+ /**
72
+ * Verifies a proof, will generate the verification key if one is not cached internally
73
+ * @param circuitType - The type of circuit whose proof is to be verified
74
+ * @param proof - The proof to be verified
75
+ */
76
+ verifyProof(circuitType: ServerProtocolArtifact, proof: Proof): Promise<void>;
77
+ /**
78
+ * Returns the verification key for a circuit, will generate it if not cached internally
79
+ * @param circuitType - The type of circuit for which the verification key is required
80
+ * @returns The verification key
81
+ */
82
+ getVerificationKeyForCircuit(circuitType: ServerProtocolArtifact): Promise<VerificationKeyAsFields>;
83
+ private verifyPreviousRollupProof;
84
+ /**
85
+ * Returns the verification key data for a circuit, will generate and cache it if not cached internally
86
+ * @param circuitType - The type of circuit for which the verification key is required
87
+ * @returns The verification key data
88
+ */
89
+ private getVerificationKeyDataForCircuit;
90
+ /**
91
+ * Reads the verification key data stored at the specified location and parses into a VerificationKeyData
92
+ * @param filePath - The directory containing the verification key data files
93
+ * @returns The verification key data
94
+ */
95
+ private convertVk;
96
+ /**
97
+ * Ensures our verification key cache includes the key data located at the specified directory
98
+ * @param filePath - The directory containing the verification key data files
99
+ * @param circuitType - The type of circuit to which the verification key corresponds
100
+ */
101
+ private updateVerificationKeyAfterProof;
102
+ /**
103
+ * Parses and returns the proof data stored at the specified directory
104
+ * @param filePath - The directory containing the proof data
105
+ * @param circuitType - The type of circuit proven
106
+ * @returns The proof
107
+ */
108
+ private readProofAsFields;
109
+ }
110
+ //# sourceMappingURL=bb_prover.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"bb_prover.d.ts","sourceRoot":"","sources":["../../src/prover/bb_prover.ts"],"names":[],"mappings":"AACA,OAAO,EACL,KAAK,oBAAoB,EACzB,KAAK,0BAA0B,EAC/B,KAAK,uBAAuB,EAE5B,KAAK,mBAAmB,EAEzB,MAAM,sBAAsB,CAAC;AAC9B,OAAO,EACL,KAAK,6BAA6B,EAClC,KAAK,gBAAgB,EACrB,KAAK,gBAAgB,EAErB,KAAK,yBAAyB,EAC9B,KAAK,iBAAiB,EACtB,KAAK,6BAA6B,EAGlC,KAAK,EACL,KAAK,+BAA+B,EACpC,KAAK,sBAAsB,EAC3B,cAAc,EAEd,eAAe,EACf,KAAK,gBAAgB,EACrB,KAAK,gBAAgB,EACrB,KAAK,sBAAsB,EAE3B,uBAAuB,EACxB,MAAM,oBAAoB,CAAC;AAK5B,OAAO,EAEL,KAAK,sBAAsB,EAa5B,MAAM,qCAAqC,CAAC;AAG7C,OAAO,EAAE,KAAK,UAAU,EAAE,MAAM,kBAAkB,CAAC;AA2BnD,MAAM,MAAM,cAAc,GAAG;IAC3B,YAAY,EAAE,MAAM,CAAC;IACrB,kBAAkB,EAAE,MAAM,CAAC;IAC3B,cAAc,EAAE,MAAM,CAAC;IACvB,oBAAoB,EAAE,MAAM,CAAC;IAE7B,aAAa,CAAC,EAAE,sBAAsB,EAAE,CAAC;CAC1C,CAAC;AAEF;;GAEG;AACH,qBAAa,oBAAqB,YAAW,mBAAmB;IAKlD,OAAO,CAAC,MAAM;IAJ1B,OAAO,CAAC,gBAAgB,CAGpB;gBACgB,MAAM,EAAE,cAAc;WAE7B,GAAG,CAAC,MAAM,EAAE,cAAc;IAWvC;;;;OAIG;IACU,kBAAkB,CAAC,MAAM,EAAE,gBAAgB,GAAG,OAAO,CAAC,eAAe,CAAC,OAAO,sBAAsB,CAAC,CAAC;IAgBlH;;;;OAIG;IACU,kBAAkB,CAC7B,MAAM,EAAE,gBAAgB,GACvB,OAAO,CAAC,eAAe,CAAC,OAAO,6BAA6B,CAAC,CAAC;IAejE;;;;OAIG;IACU,oBAAoB,CAC/B,aAAa,EAAE,0BAA0B,GACxC,OAAO,CAAC,oBAAoB,CAAC,+BAA+B,CAAC,CAAC;IAajE;;;;OAIG;IACU,kBAAkB,CAC7B,aAAa,EAAE,uBAAuB,GACrC,OAAO,CAAC,oBAAoB,CAAC,yBAAyB,CAAC,CAAC;IAS3D;;;;OAIG;IACU,kBAAkB,CAC7B,KAAK,EAAE,gBAAgB,GACtB,OAAO,CAAC,oBAAoB,CAAC,6BAA6B,CAAC,CAAC;IAS/D;;;;OAIG;IACU,mBAAmB,CAC9B,KAAK,EAAE,iBAAiB,GACvB,OAAO,CAAC,oBAAoB,CAAC,6BAA6B,CAAC,CAAC;IAa/D;;;;OAIG;IACU,kBAAkB,CAAC,KAAK,EAAE,gBAAgB,GAAG,OAAO,CAAC,oBAAoB,CAAC,sBAAsB,CAAC,CAAC;IAelG,WAAW,CAAC,UAAU,EAAE,UAAU,EAAE,WAAW,EAAE,sBAAsB,GAAG,OAAO,CAAC,CAAC,UAAU,EAAE,KAAK,CAAC,CAAC;IAwEnH;;;;;;OAMG;IACU,oBAAoB,CAAC,YAAY,SAAS,MAAM,EAAE,iBAAiB,EAC9E,UAAU,EAAE,UAAU,EACtB,WAAW,EAAE,sBAAsB,EACnC,aAAa,EAAE,CAAC,aAAa,EAAE,UAAU,KAAK,iBAAiB,GAC9D,OAAO,CAAC,CAAC,iBAAiB,EAAE,cAAc,CAAC,YAAY,CAAC,CAAC,CAAC;IA8E7D;;;;OAIG;IACU,WAAW,CAAC,WAAW,EAAE,sBAAsB,EAAE,KAAK,EAAE,KAAK;IA8B1E;;;;OAIG;IACU,4BAA4B,CAAC,WAAW,EAAE,sBAAsB,GAAG,OAAO,CAAC,uBAAuB,CAAC;YAKlG,yBAAyB;IASvC;;;;OAIG;YACW,gCAAgC;IAqB9C;;;;OAIG;YACW,SAAS;IAqBvB;;;;OAIG;YACW,+BAA+B;IAS7C;;;;;OAKG;YACW,iBAAiB;CAwBhC"}