@aztec/bb-prover 0.39.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (49) hide show
  1. package/dest/bb/cli.d.ts +9 -0
  2. package/dest/bb/cli.d.ts.map +1 -0
  3. package/dest/bb/cli.js +64 -0
  4. package/dest/bb/execute.d.ts +88 -0
  5. package/dest/bb/execute.d.ts.map +1 -0
  6. package/dest/bb/execute.js +288 -0
  7. package/dest/bb/index.d.ts +3 -0
  8. package/dest/bb/index.d.ts.map +1 -0
  9. package/dest/bb/index.js +18 -0
  10. package/dest/index.d.ts +3 -0
  11. package/dest/index.d.ts.map +1 -0
  12. package/dest/index.js +3 -0
  13. package/dest/mappings/mappings.d.ts +12 -0
  14. package/dest/mappings/mappings.d.ts.map +1 -0
  15. package/dest/mappings/mappings.js +22 -0
  16. package/dest/prover/bb_native_proof_creator.d.ts +58 -0
  17. package/dest/prover/bb_native_proof_creator.d.ts.map +1 -0
  18. package/dest/prover/bb_native_proof_creator.js +238 -0
  19. package/dest/prover/bb_prover.d.ts +110 -0
  20. package/dest/prover/bb_prover.d.ts.map +1 -0
  21. package/dest/prover/bb_prover.js +321 -0
  22. package/dest/prover/index.d.ts +3 -0
  23. package/dest/prover/index.d.ts.map +1 -0
  24. package/dest/prover/index.js +3 -0
  25. package/dest/prover/verification_key_data.d.ts +16 -0
  26. package/dest/prover/verification_key_data.d.ts.map +1 -0
  27. package/dest/prover/verification_key_data.js +5 -0
  28. package/dest/stats.d.ts +9 -0
  29. package/dest/stats.d.ts.map +1 -0
  30. package/dest/stats.js +61 -0
  31. package/dest/test/index.d.ts +2 -0
  32. package/dest/test/index.d.ts.map +1 -0
  33. package/dest/test/index.js +2 -0
  34. package/dest/test/test_circuit_prover.d.ts +48 -0
  35. package/dest/test/test_circuit_prover.d.ts.map +1 -0
  36. package/dest/test/test_circuit_prover.js +128 -0
  37. package/package.json +85 -0
  38. package/src/bb/cli.ts +92 -0
  39. package/src/bb/execute.ts +359 -0
  40. package/src/bb/index.ts +23 -0
  41. package/src/index.ts +2 -0
  42. package/src/mappings/mappings.ts +41 -0
  43. package/src/prover/bb_native_proof_creator.ts +382 -0
  44. package/src/prover/bb_prover.ts +557 -0
  45. package/src/prover/index.ts +2 -0
  46. package/src/prover/verification_key_data.ts +16 -0
  47. package/src/stats.ts +82 -0
  48. package/src/test/index.ts +1 -0
  49. package/src/test/test_circuit_prover.ts +268 -0
@@ -0,0 +1,321 @@
1
+ /* eslint-disable require-await */
2
+ import { PublicKernelType, makePublicInputsAndProof, } from '@aztec/circuit-types';
3
+ import { Fr, Proof, RecursiveProof, RollupTypes, RootParityInput, VerificationKeyAsFields, } from '@aztec/circuits.js';
4
+ import { randomBytes } from '@aztec/foundation/crypto';
5
+ import { createDebugLogger } from '@aztec/foundation/log';
6
+ import { Timer } from '@aztec/foundation/timer';
7
+ import { ServerCircuitArtifacts, convertBaseParityInputsToWitnessMap, convertBaseParityOutputsFromWitnessMap, convertBaseRollupInputsToWitnessMap, convertBaseRollupOutputsFromWitnessMap, convertMergeRollupInputsToWitnessMap, convertMergeRollupOutputsFromWitnessMap, convertPublicTailInputsToWitnessMap, convertPublicTailOutputFromWitnessMap, convertRootParityInputsToWitnessMap, convertRootParityOutputsFromWitnessMap, convertRootRollupInputsToWitnessMap, convertRootRollupOutputsFromWitnessMap, } from '@aztec/noir-protocol-circuits-types';
8
+ import { NativeACVMSimulator } from '@aztec/simulator';
9
+ import * as fs from 'fs/promises';
10
+ import { BB_RESULT, PROOF_FIELDS_FILENAME, PROOF_FILENAME, VK_FIELDS_FILENAME, VK_FILENAME, generateKeyForNoirCircuit, generateProof, verifyProof, } from '../bb/execute.js';
11
+ import { PublicKernelArtifactMapping } from '../mappings/mappings.js';
12
+ import { circuitTypeToCircuitName, emitCircuitProvingStats, emitCircuitWitnessGenerationStats } from '../stats.js';
13
+ import { AGGREGATION_OBJECT_SIZE, CIRCUIT_PUBLIC_INPUTS_INDEX, CIRCUIT_RECURSIVE_INDEX, CIRCUIT_SIZE_INDEX, } from './verification_key_data.js';
14
+ const logger = createDebugLogger('aztec:bb-prover');
15
+ const CIRCUITS_WITHOUT_AGGREGATION = new Set(['BaseParityArtifact']);
16
+ /**
17
+ * Prover implementation that uses barretenberg native proving
18
+ */
19
+ export class BBNativeRollupProver {
20
+ constructor(config) {
21
+ this.config = config;
22
+ this.verificationKeys = new Map();
23
+ }
24
+ static async new(config) {
25
+ await fs.access(config.acvmBinaryPath, fs.constants.R_OK);
26
+ await fs.mkdir(config.acvmWorkingDirectory, { recursive: true });
27
+ await fs.access(config.bbBinaryPath, fs.constants.R_OK);
28
+ await fs.mkdir(config.bbWorkingDirectory, { recursive: true });
29
+ logger.info(`Using native BB at ${config.bbBinaryPath} and working directory ${config.bbWorkingDirectory}`);
30
+ logger.info(`Using native ACVM at ${config.acvmBinaryPath} and working directory ${config.acvmWorkingDirectory}`);
31
+ return new BBNativeRollupProver(config);
32
+ }
33
+ /**
34
+ * Simulates the base parity circuit from its inputs.
35
+ * @param inputs - Inputs to the circuit.
36
+ * @returns The public inputs of the parity circuit.
37
+ */
38
+ async getBaseParityProof(inputs) {
39
+ const witnessMap = convertBaseParityInputsToWitnessMap(inputs);
40
+ const [circuitOutput, proof] = await this.createRecursiveProof(witnessMap, 'BaseParityArtifact', convertBaseParityOutputsFromWitnessMap);
41
+ const verificationKey = await this.getVerificationKeyDataForCircuit('BaseParityArtifact');
42
+ const vk = new VerificationKeyAsFields(verificationKey.keyAsFields, verificationKey.hash);
43
+ return new RootParityInput(proof, vk, circuitOutput);
44
+ }
45
+ /**
46
+ * Simulates the root parity circuit from its inputs.
47
+ * @param inputs - Inputs to the circuit.
48
+ * @returns The public inputs of the parity circuit.
49
+ */
50
+ async getRootParityProof(inputs) {
51
+ const witnessMap = convertRootParityInputsToWitnessMap(inputs);
52
+ const [circuitOutput, proof] = await this.createRecursiveProof(witnessMap, 'RootParityArtifact', convertRootParityOutputsFromWitnessMap);
53
+ const verificationKey = await this.getVerificationKeyDataForCircuit('RootParityArtifact');
54
+ const vk = new VerificationKeyAsFields(verificationKey.keyAsFields, verificationKey.hash);
55
+ return new RootParityInput(proof, vk, circuitOutput);
56
+ }
57
+ /**
58
+ * Requests that a public kernel circuit be executed and the proof generated
59
+ * @param kernelRequest - The object encapsulating the request for a proof
60
+ * @returns The requested circuit's public inputs and proof
61
+ */
62
+ async getPublicKernelProof(kernelRequest) {
63
+ const kernelOps = PublicKernelArtifactMapping[kernelRequest.type];
64
+ if (kernelOps === undefined) {
65
+ throw new Error(`Unable to prove kernel type ${PublicKernelType[kernelRequest.type]}`);
66
+ }
67
+ const witnessMap = kernelOps.convertInputs(kernelRequest.inputs);
68
+ const [outputWitness, proof] = await this.createProof(witnessMap, kernelOps.artifact);
69
+ const result = kernelOps.convertOutputs(outputWitness);
70
+ return makePublicInputsAndProof(result, proof);
71
+ }
72
+ /**
73
+ * Requests that the public kernel tail circuit be executed and the proof generated
74
+ * @param kernelRequest - The object encapsulating the request for a proof
75
+ * @returns The requested circuit's public inputs and proof
76
+ */
77
+ async getPublicTailProof(kernelRequest) {
78
+ const witnessMap = convertPublicTailInputsToWitnessMap(kernelRequest.inputs);
79
+ const [outputWitness, proof] = await this.createProof(witnessMap, 'PublicKernelTailArtifact');
80
+ const result = convertPublicTailOutputFromWitnessMap(outputWitness);
81
+ return makePublicInputsAndProof(result, proof);
82
+ }
83
+ /**
84
+ * Simulates the base rollup circuit from its inputs.
85
+ * @param input - Inputs to the circuit.
86
+ * @returns The public inputs as outputs of the simulation.
87
+ */
88
+ async getBaseRollupProof(input) {
89
+ const witnessMap = convertBaseRollupInputsToWitnessMap(input);
90
+ const [outputWitness, proof] = await this.createProof(witnessMap, 'BaseRollupArtifact');
91
+ const result = convertBaseRollupOutputsFromWitnessMap(outputWitness);
92
+ return makePublicInputsAndProof(result, proof);
93
+ }
94
+ /**
95
+ * Simulates the merge rollup circuit from its inputs.
96
+ * @param input - Inputs to the circuit.
97
+ * @returns The public inputs as outputs of the simulation.
98
+ */
99
+ async getMergeRollupProof(input) {
100
+ // verify both inputs
101
+ await Promise.all(input.previousRollupData.map(prev => this.verifyPreviousRollupProof(prev)));
102
+ const witnessMap = convertMergeRollupInputsToWitnessMap(input);
103
+ const [outputWitness, proof] = await this.createProof(witnessMap, 'MergeRollupArtifact');
104
+ const result = convertMergeRollupOutputsFromWitnessMap(outputWitness);
105
+ return makePublicInputsAndProof(result, proof);
106
+ }
107
+ /**
108
+ * Simulates the root rollup circuit from its inputs.
109
+ * @param input - Inputs to the circuit.
110
+ * @returns The public inputs as outputs of the simulation.
111
+ */
112
+ async getRootRollupProof(input) {
113
+ // verify the inputs
114
+ await Promise.all(input.previousRollupData.map(prev => this.verifyPreviousRollupProof(prev)));
115
+ const witnessMap = convertRootRollupInputsToWitnessMap(input);
116
+ const [outputWitness, proof] = await this.createProof(witnessMap, 'RootRollupArtifact');
117
+ await this.verifyProof('RootRollupArtifact', proof);
118
+ const result = convertRootRollupOutputsFromWitnessMap(outputWitness);
119
+ return makePublicInputsAndProof(result, proof);
120
+ }
121
+ // TODO(@PhilWindle): Delete when no longer required
122
+ async createProof(witnessMap, circuitType) {
123
+ // Create random directory to be used for temp files
124
+ const bbWorkingDirectory = `${this.config.bbWorkingDirectory}/${randomBytes(8).toString('hex')}`;
125
+ await fs.mkdir(bbWorkingDirectory, { recursive: true });
126
+ await fs.access(bbWorkingDirectory);
127
+ // Have the ACVM write the partial witness here
128
+ const outputWitnessFile = `${bbWorkingDirectory}/partial-witness.gz`;
129
+ // Generate the partial witness using the ACVM
130
+ // A further temp directory will be created beneath ours and then cleaned up after the partial witness has been copied to our specified location
131
+ const simulator = new NativeACVMSimulator(this.config.acvmWorkingDirectory, this.config.acvmBinaryPath, outputWitnessFile);
132
+ const artifact = ServerCircuitArtifacts[circuitType];
133
+ logger.debug(`Generating witness data for ${circuitType}`);
134
+ const timer = new Timer();
135
+ const outputWitness = await simulator.simulateCircuit(witnessMap, artifact);
136
+ emitCircuitWitnessGenerationStats(circuitTypeToCircuitName(circuitType), timer.ms(), witnessMap.size * Fr.SIZE_IN_BYTES, outputWitness.size * Fr.SIZE_IN_BYTES, logger);
137
+ // Now prove the circuit from the generated witness
138
+ logger.debug(`Proving ${circuitType}...`);
139
+ const provingResult = await generateProof(this.config.bbBinaryPath, bbWorkingDirectory, circuitType, Buffer.from(artifact.bytecode, 'base64'), outputWitnessFile, logger.debug);
140
+ if (provingResult.status === BB_RESULT.FAILURE) {
141
+ logger.error(`Failed to generate proof for ${circuitType}: ${provingResult.reason}`);
142
+ throw new Error(provingResult.reason);
143
+ }
144
+ // Ensure our vk cache is up to date
145
+ await this.updateVerificationKeyAfterProof(provingResult.vkPath, circuitType);
146
+ // Read the proof and then cleanup up our temporary directory
147
+ const proof = await fs.readFile(`${provingResult.proofPath}/${PROOF_FILENAME}`);
148
+ // does not include reading the proof from disk above because duration comes from the bb wrapper
149
+ emitCircuitProvingStats(circuitTypeToCircuitName(circuitType), provingResult.duration, witnessMap.size * Fr.SIZE_IN_BYTES, outputWitness.size * Fr.SIZE_IN_BYTES, proof.length, logger);
150
+ await fs.rm(bbWorkingDirectory, { recursive: true, force: true });
151
+ logger.info(`Generated proof for ${circuitType} in ${provingResult.duration} ms, size: ${proof.length} fields`);
152
+ return [outputWitness, new Proof(proof)];
153
+ }
154
+ /**
155
+ * Executes a circuit and returns it's outputs and corresponding proof with embedded aggregation object
156
+ * @param witnessMap - The input witness
157
+ * @param circuitType - The type of circuit to be executed
158
+ * @param convertOutput - Function for parsing the output witness to it's corresponding object
159
+ * @returns The circuits output object and it's proof
160
+ */
161
+ async createRecursiveProof(witnessMap, circuitType, convertOutput) {
162
+ // Create random directory to be used for temp files
163
+ const bbWorkingDirectory = `${this.config.bbWorkingDirectory}/${randomBytes(8).toString('hex')}`;
164
+ await fs.mkdir(bbWorkingDirectory, { recursive: true });
165
+ await fs.access(bbWorkingDirectory);
166
+ try {
167
+ // Have the ACVM write the partial witness here
168
+ const outputWitnessFile = `${bbWorkingDirectory}/partial-witness.gz`;
169
+ // Generate the partial witness using the ACVM
170
+ // A further temp directory will be created beneath ours and then cleaned up after the partial witness has been copied to our specified location
171
+ const simulator = new NativeACVMSimulator(this.config.acvmWorkingDirectory, this.config.acvmBinaryPath, outputWitnessFile);
172
+ const artifact = ServerCircuitArtifacts[circuitType];
173
+ logger.debug(`Generating witness data for ${circuitType}`);
174
+ const timer = new Timer();
175
+ const outputWitness = await simulator.simulateCircuit(witnessMap, artifact);
176
+ emitCircuitWitnessGenerationStats(circuitTypeToCircuitName(circuitType), timer.ms(), witnessMap.size * Fr.SIZE_IN_BYTES, outputWitness.size * Fr.SIZE_IN_BYTES, logger);
177
+ const outputType = convertOutput(outputWitness);
178
+ // Now prove the circuit from the generated witness
179
+ logger.debug(`Proving ${circuitType}...`);
180
+ const provingResult = await generateProof(this.config.bbBinaryPath, bbWorkingDirectory, circuitType, Buffer.from(artifact.bytecode, 'base64'), outputWitnessFile, logger.debug);
181
+ if (provingResult.status === BB_RESULT.FAILURE) {
182
+ logger.error(`Failed to generate proof for ${circuitType}: ${provingResult.reason}`);
183
+ throw new Error(provingResult.reason);
184
+ }
185
+ // Ensure our vk cache is up to date
186
+ await this.updateVerificationKeyAfterProof(provingResult.vkPath, circuitType);
187
+ // Read the proof and then cleanup up our temporary directory
188
+ const proof = await this.readProofAsFields(provingResult.proofPath, circuitType);
189
+ logger.info(`Generated proof for ${circuitType} in ${provingResult.duration} ms, size: ${proof.proof.length} fields`);
190
+ emitCircuitProvingStats(circuitTypeToCircuitName(circuitType), provingResult.duration, witnessMap.size * Fr.SIZE_IN_BYTES, outputWitness.size * Fr.SIZE_IN_BYTES, proof.binaryProof.buffer.length, logger);
191
+ return [outputType, proof];
192
+ }
193
+ finally {
194
+ await fs.rm(bbWorkingDirectory, { recursive: true, force: true });
195
+ }
196
+ }
197
+ /**
198
+ * Verifies a proof, will generate the verification key if one is not cached internally
199
+ * @param circuitType - The type of circuit whose proof is to be verified
200
+ * @param proof - The proof to be verified
201
+ */
202
+ async verifyProof(circuitType, proof) {
203
+ // Create random directory to be used for temp files
204
+ const bbWorkingDirectory = `${this.config.bbWorkingDirectory}/${randomBytes(8).toString('hex')}`;
205
+ await fs.mkdir(bbWorkingDirectory, { recursive: true });
206
+ const proofFileName = `${bbWorkingDirectory}/proof`;
207
+ const verificationKeyPath = `${bbWorkingDirectory}/vk`;
208
+ const verificationKey = await this.getVerificationKeyDataForCircuit(circuitType);
209
+ logger.debug(`Verifying with key: ${verificationKey.hash.toString()}`);
210
+ await fs.writeFile(proofFileName, proof.buffer);
211
+ await fs.writeFile(verificationKeyPath, verificationKey.keyAsBytes);
212
+ const logFunction = (message) => {
213
+ logger.debug(`${circuitType} BB out - ${message}`);
214
+ };
215
+ const result = await verifyProof(this.config.bbBinaryPath, proofFileName, verificationKeyPath, logFunction);
216
+ await fs.rm(bbWorkingDirectory, { recursive: true, force: true });
217
+ if (result.status === BB_RESULT.FAILURE) {
218
+ const errorMessage = `Failed to verify ${circuitType} proof!`;
219
+ throw new Error(errorMessage);
220
+ }
221
+ logger.info(`Successfully verified ${circuitType} proof in ${result.duration} ms`);
222
+ }
223
+ /**
224
+ * Returns the verification key for a circuit, will generate it if not cached internally
225
+ * @param circuitType - The type of circuit for which the verification key is required
226
+ * @returns The verification key
227
+ */
228
+ async getVerificationKeyForCircuit(circuitType) {
229
+ const vkData = await this.getVerificationKeyDataForCircuit(circuitType);
230
+ return new VerificationKeyAsFields(vkData.keyAsFields, vkData.hash);
231
+ }
232
+ async verifyPreviousRollupProof(previousRollupData) {
233
+ const proof = previousRollupData.proof;
234
+ const circuitType = previousRollupData.baseOrMergeRollupPublicInputs.rollupType === RollupTypes.Base
235
+ ? 'BaseRollupArtifact'
236
+ : 'MergeRollupArtifact';
237
+ await this.verifyProof(circuitType, proof);
238
+ }
239
+ /**
240
+ * Returns the verification key data for a circuit, will generate and cache it if not cached internally
241
+ * @param circuitType - The type of circuit for which the verification key is required
242
+ * @returns The verification key data
243
+ */
244
+ async getVerificationKeyDataForCircuit(circuitType) {
245
+ let promise = this.verificationKeys.get(circuitType);
246
+ if (!promise) {
247
+ promise = generateKeyForNoirCircuit(this.config.bbBinaryPath, this.config.bbWorkingDirectory, circuitType, ServerCircuitArtifacts[circuitType], 'vk', logger.debug).then(result => {
248
+ if (result.status === BB_RESULT.FAILURE) {
249
+ throw new Error(`Failed to generate verification key for ${circuitType}, ${result.reason}`);
250
+ }
251
+ return this.convertVk(result.vkPath);
252
+ });
253
+ this.verificationKeys.set(circuitType, promise);
254
+ }
255
+ return await promise;
256
+ }
257
+ /**
258
+ * Reads the verification key data stored at the specified location and parses into a VerificationKeyData
259
+ * @param filePath - The directory containing the verification key data files
260
+ * @returns The verification key data
261
+ */
262
+ async convertVk(filePath) {
263
+ const [rawFields, rawBinary] = await Promise.all([
264
+ fs.readFile(`${filePath}/${VK_FIELDS_FILENAME}`, { encoding: 'utf-8' }),
265
+ fs.readFile(`${filePath}/${VK_FILENAME}`),
266
+ ]);
267
+ const fieldsJson = JSON.parse(rawFields);
268
+ const fields = fieldsJson.map(Fr.fromString);
269
+ // The first item is the hash, this is not part of the actual VK
270
+ const vkHash = fields[0];
271
+ const actualVk = fields.slice(1);
272
+ const vk = {
273
+ hash: vkHash,
274
+ keyAsFields: actualVk,
275
+ keyAsBytes: rawBinary,
276
+ numPublicInputs: Number(actualVk[CIRCUIT_PUBLIC_INPUTS_INDEX]),
277
+ circuitSize: Number(actualVk[CIRCUIT_SIZE_INDEX]),
278
+ isRecursive: actualVk[CIRCUIT_RECURSIVE_INDEX] == Fr.ONE,
279
+ };
280
+ return vk;
281
+ }
282
+ /**
283
+ * Ensures our verification key cache includes the key data located at the specified directory
284
+ * @param filePath - The directory containing the verification key data files
285
+ * @param circuitType - The type of circuit to which the verification key corresponds
286
+ */
287
+ async updateVerificationKeyAfterProof(filePath, circuitType) {
288
+ let promise = this.verificationKeys.get(circuitType);
289
+ if (!promise) {
290
+ promise = this.convertVk(filePath);
291
+ this.verificationKeys.set(circuitType, promise);
292
+ }
293
+ await promise;
294
+ }
295
+ /**
296
+ * Parses and returns the proof data stored at the specified directory
297
+ * @param filePath - The directory containing the proof data
298
+ * @param circuitType - The type of circuit proven
299
+ * @returns The proof
300
+ */
301
+ async readProofAsFields(filePath, circuitType) {
302
+ const [binaryProof, proofString] = await Promise.all([
303
+ fs.readFile(`${filePath}/${PROOF_FILENAME}`),
304
+ fs.readFile(`${filePath}/${PROOF_FIELDS_FILENAME}`, { encoding: 'utf-8' }),
305
+ ]);
306
+ const json = JSON.parse(proofString);
307
+ const fields = json.map(Fr.fromString);
308
+ const vkData = await this.verificationKeys.get(circuitType);
309
+ if (!vkData) {
310
+ throw new Error(`Invalid verification key for ${circuitType}`);
311
+ }
312
+ const numPublicInputs = CIRCUITS_WITHOUT_AGGREGATION.has(circuitType)
313
+ ? vkData.numPublicInputs
314
+ : vkData.numPublicInputs - AGGREGATION_OBJECT_SIZE;
315
+ const fieldsWithoutPublicInputs = fields.slice(numPublicInputs);
316
+ logger.debug(`Circuit type: ${circuitType}, complete proof length: ${fields.length}, without public inputs: ${fieldsWithoutPublicInputs.length}, num public inputs: ${numPublicInputs}, circuit size: ${vkData.circuitSize}, is recursive: ${vkData.isRecursive}, raw length: ${binaryProof.length}`);
317
+ const proof = new RecursiveProof(fieldsWithoutPublicInputs, new Proof(binaryProof));
318
+ return proof;
319
+ }
320
+ }
321
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"bb_prover.js","sourceRoot":"","sources":["../../src/prover/bb_prover.ts"],"names":[],"mappings":"AAAA,kCAAkC;AAClC,OAAO,EAIL,gBAAgB,EAEhB,wBAAwB,GACzB,MAAM,sBAAsB,CAAC;AAC9B,OAAO,EAIL,EAAE,EAMF,KAAK,EAGL,cAAc,EACd,WAAW,EACX,eAAe,EAKf,uBAAuB,GACxB,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EAAE,WAAW,EAAE,MAAM,0BAA0B,CAAC;AACvD,OAAO,EAAE,iBAAiB,EAAE,MAAM,uBAAuB,CAAC;AAE1D,OAAO,EAAE,KAAK,EAAE,MAAM,yBAAyB,CAAC;AAChD,OAAO,EACL,sBAAsB,EAEtB,mCAAmC,EACnC,sCAAsC,EACtC,mCAAmC,EACnC,sCAAsC,EACtC,oCAAoC,EACpC,uCAAuC,EACvC,mCAAmC,EACnC,qCAAqC,EACrC,mCAAmC,EACnC,sCAAsC,EACtC,mCAAmC,EACnC,sCAAsC,GACvC,MAAM,qCAAqC,CAAC;AAC7C,OAAO,EAAE,mBAAmB,EAAE,MAAM,kBAAkB,CAAC;AAGvD,OAAO,KAAK,EAAE,MAAM,aAAa,CAAC;AAElC,OAAO,EACL,SAAS,EACT,qBAAqB,EACrB,cAAc,EACd,kBAAkB,EAClB,WAAW,EACX,yBAAyB,EACzB,aAAa,EACb,WAAW,GACZ,MAAM,kBAAkB,CAAC;AAC1B,OAAO,EAAE,2BAA2B,EAAE,MAAM,yBAAyB,CAAC;AACtE,OAAO,EAAE,wBAAwB,EAAE,uBAAuB,EAAE,iCAAiC,EAAE,MAAM,aAAa,CAAC;AACnH,OAAO,EACL,uBAAuB,EACvB,2BAA2B,EAC3B,uBAAuB,EACvB,kBAAkB,GAEnB,MAAM,4BAA4B,CAAC;AAEpC,MAAM,MAAM,GAAG,iBAAiB,CAAC,iBAAiB,CAAC,CAAC;AAEpD,MAAM,4BAA4B,GAAgC,IAAI,GAAG,CAAC,CAAC,oBAAoB,CAAC,CAAC,CAAC;AAWlG;;GAEG;AACH,MAAM,OAAO,oBAAoB;IAK/B,YAAoB,MAAsB;QAAtB,WAAM,GAAN,MAAM,CAAgB;QAJlC,qBAAgB,GAA8D,IAAI,GAAG,EAG1F,CAAC;IACyC,CAAC;IAE9C,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,MAAsB;QACrC,MAAM,EAAE,CAAC,MAAM,CAAC,MAAM,CAAC,cAAc,EAAE,EAAE,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC;QAC1D,MAAM,EAAE,CAAC,KAAK,CAAC,MAAM,CAAC,oBAAoB,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;QACjE,MAAM,EAAE,CAAC,MAAM,CAAC,MAAM,CAAC,YAAY,EAAE,EAAE,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC;QACxD,MAAM,EAAE,CAAC,KAAK,CAAC,MAAM,CAAC,kBAAkB,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;QAC/D,MAAM,CAAC,IAAI,CAAC,sBAAsB,MAAM,CAAC,YAAY,0BAA0B,MAAM,CAAC,kBAAkB,EAAE,CAAC,CAAC;QAC5G,MAAM,CAAC,IAAI,CAAC,wBAAwB,MAAM,CAAC,cAAc,0BAA0B,MAAM,CAAC,oBAAoB,EAAE,CAAC,CAAC;QAElH,OAAO,IAAI,oBAAoB,CAAC,MAAM,CAAC,CAAC;IAC1C,CAAC;IAED;;;;OAIG;IACI,KAAK,CAAC,kBAAkB,CAAC,MAAwB;QACtD,MAAM,UAAU,GAAG,mCAAmC,CAAC,MAAM,CAAC,CAAC;QAE/D,MAAM,CAAC,aAAa,EAAE,KAAK,CAAC,GAAG,MAAM,IAAI,CAAC,oBAAoB,CAC5D,UAAU,EACV,oBAAoB,EACpB,sCAAsC,CACvC,CAAC;QAEF,MAAM,eAAe,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAAC,oBAAoB,CAAC,CAAC;QAE1F,MAAM,EAAE,GAAG,IAAI,uBAAuB,CAAC,eAAe,CAAC,WAAW,EAAE,eAAe,CAAC,IAAI,CAAC,CAAC;QAE1F,OAAO,IAAI,eAAe,CAAC,KAAK,EAAE,EAAE,EAAE,aAAa,CAAC,CAAC;IACvD,CAAC;IAED;;;;OAIG;IACI,KAAK,CAAC,kBAAkB,CAC7B,MAAwB;QAExB,MAAM,UAAU,GAAG,mCAAmC,CAAC,MAAM,CAAC,CAAC;QAE/D,MAAM,CAAC,aAAa,EAAE,KAAK,CAAC,GAAG,MAAM,IAAI,CAAC,oBAAoB,CAG5D,UAAU,EAAE,oBAAoB,EAAE,sCAAsC,CAAC,CAAC;QAE5E,MAAM,eAAe,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAAC,oBAAoB,CAAC,CAAC;QAE1F,MAAM,EAAE,GAAG,IAAI,uBAAuB,CAAC,eAAe,CAAC,WAAW,EAAE,eAAe,CAAC,IAAI,CAAC,CAAC;QAE1F,OAAO,IAAI,eAAe,CAAC,KAAK,EAAE,EAAE,EAAE,aAAa,CAAC,CAAC;IACvD,CAAC;IAED;;;;OAIG;IACI,KAAK,CAAC,oBAAoB,CAC/B,aAAyC;QAEzC,MAAM,SAAS,GAAG,2BAA2B,CAAC,aAAa,CAAC,IAAI,CAAC,CAAC;QAClE,IAAI,SAAS,KAAK,SAAS,EAAE,CAAC;YAC5B,MAAM,IAAI,KAAK,CAAC,+BAA+B,gBAAgB,CAAC,aAAa,CAAC,IAAI,CAAC,EAAE,CAAC,CAAC;QACzF,CAAC;QACD,MAAM,UAAU,GAAG,SAAS,CAAC,aAAa,CAAC,aAAa,CAAC,MAAM,CAAC,CAAC;QAEjE,MAAM,CAAC,aAAa,EAAE,KAAK,CAAC,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,UAAU,EAAE,SAAS,CAAC,QAAQ,CAAC,CAAC;QAEtF,MAAM,MAAM,GAAG,SAAS,CAAC,cAAc,CAAC,aAAa,CAAC,CAAC;QACvD,OAAO,wBAAwB,CAAC,MAAM,EAAE,KAAK,CAAC,CAAC;IACjD,CAAC;IAED;;;;OAIG;IACI,KAAK,CAAC,kBAAkB,CAC7B,aAAsC;QAEtC,MAAM,UAAU,GAAG,mCAAmC,CAAC,aAAa,CAAC,MAAM,CAAC,CAAC;QAE7E,MAAM,CAAC,aAAa,EAAE,KAAK,CAAC,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,UAAU,EAAE,0BAA0B,CAAC,CAAC;QAE9F,MAAM,MAAM,GAAG,qCAAqC,CAAC,aAAa,CAAC,CAAC;QACpE,OAAO,wBAAwB,CAAC,MAAM,EAAE,KAAK,CAAC,CAAC;IACjD,CAAC;IAED;;;;OAIG;IACI,KAAK,CAAC,kBAAkB,CAC7B,KAAuB;QAEvB,MAAM,UAAU,GAAG,mCAAmC,CAAC,KAAK,CAAC,CAAC;QAE9D,MAAM,CAAC,aAAa,EAAE,KAAK,CAAC,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,UAAU,EAAE,oBAAoB,CAAC,CAAC;QAExF,MAAM,MAAM,GAAG,sCAAsC,CAAC,aAAa,CAAC,CAAC;QAErE,OAAO,wBAAwB,CAAC,MAAM,EAAE,KAAK,CAAC,CAAC;IACjD,CAAC;IACD;;;;OAIG;IACI,KAAK,CAAC,mBAAmB,CAC9B,KAAwB;QAExB,qBAAqB;QACrB,MAAM,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,kBAAkB,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC,IAAI,CAAC,yBAAyB,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;QAE9F,MAAM,UAAU,GAAG,oCAAoC,CAAC,KAAK,CAAC,CAAC;QAE/D,MAAM,CAAC,aAAa,EAAE,KAAK,CAAC,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,UAAU,EAAE,qBAAqB,CAAC,CAAC;QAEzF,MAAM,MAAM,GAAG,uCAAuC,CAAC,aAAa,CAAC,CAAC;QAEtE,OAAO,wBAAwB,CAAC,MAAM,EAAE,KAAK,CAAC,CAAC;IACjD,CAAC;IAED;;;;OAIG;IACI,KAAK,CAAC,kBAAkB,CAAC,KAAuB;QACrD,oBAAoB;QACpB,MAAM,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,kBAAkB,CAAC,GAAG,CAAC,IAAI,CAAC,EAAE,CAAC,IAAI,CAAC,yBAAyB,CAAC,IAAI,CAAC,CAAC,CAAC,CAAC;QAE9F,MAAM,UAAU,GAAG,mCAAmC,CAAC,KAAK,CAAC,CAAC;QAE9D,MAAM,CAAC,aAAa,EAAE,KAAK,CAAC,GAAG,MAAM,IAAI,CAAC,WAAW,CAAC,UAAU,EAAE,oBAAoB,CAAC,CAAC;QAExF,MAAM,IAAI,CAAC,WAAW,CAAC,oBAAoB,EAAE,KAAK,CAAC,CAAC;QAEpD,MAAM,MAAM,GAAG,sCAAsC,CAAC,aAAa,CAAC,CAAC;QACrE,OAAO,wBAAwB,CAAC,MAAM,EAAE,KAAK,CAAC,CAAC;IACjD,CAAC;IAED,oDAAoD;IAC7C,KAAK,CAAC,WAAW,CAAC,UAAsB,EAAE,WAAmC;QAClF,oDAAoD;QACpD,MAAM,kBAAkB,GAAG,GAAG,IAAI,CAAC,MAAM,CAAC,kBAAkB,IAAI,WAAW,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,EAAE,CAAC;QACjG,MAAM,EAAE,CAAC,KAAK,CAAC,kBAAkB,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;QAExD,MAAM,EAAE,CAAC,MAAM,CAAC,kBAAkB,CAAC,CAAC;QAEpC,+CAA+C;QAC/C,MAAM,iBAAiB,GAAG,GAAG,kBAAkB,qBAAqB,CAAC;QAErE,8CAA8C;QAC9C,gJAAgJ;QAChJ,MAAM,SAAS,GAAG,IAAI,mBAAmB,CACvC,IAAI,CAAC,MAAM,CAAC,oBAAoB,EAChC,IAAI,CAAC,MAAM,CAAC,cAAc,EAC1B,iBAAiB,CAClB,CAAC;QAEF,MAAM,QAAQ,GAAG,sBAAsB,CAAC,WAAW,CAAC,CAAC;QAErD,MAAM,CAAC,KAAK,CAAC,+BAA+B,WAAW,EAAE,CAAC,CAAC;QAE3D,MAAM,KAAK,GAAG,IAAI,KAAK,EAAE,CAAC;QAC1B,MAAM,aAAa,GAAG,MAAM,SAAS,CAAC,eAAe,CAAC,UAAU,EAAE,QAAQ,CAAC,CAAC;QAC5E,iCAAiC,CAC/B,wBAAwB,CAAC,WAAW,CAAC,EACrC,KAAK,CAAC,EAAE,EAAE,EACV,UAAU,CAAC,IAAI,GAAG,EAAE,CAAC,aAAa,EAClC,aAAa,CAAC,IAAI,GAAG,EAAE,CAAC,aAAa,EACrC,MAAM,CACP,CAAC;QAEF,mDAAmD;QACnD,MAAM,CAAC,KAAK,CAAC,WAAW,WAAW,KAAK,CAAC,CAAC;QAE1C,MAAM,aAAa,GAAG,MAAM,aAAa,CACvC,IAAI,CAAC,MAAM,CAAC,YAAY,EACxB,kBAAkB,EAClB,WAAW,EACX,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,EAAE,QAAQ,CAAC,EACxC,iBAAiB,EACjB,MAAM,CAAC,KAAK,CACb,CAAC;QAEF,IAAI,aAAa,CAAC,MAAM,KAAK,SAAS,CAAC,OAAO,EAAE,CAAC;YAC/C,MAAM,CAAC,KAAK,CAAC,gCAAgC,WAAW,KAAK,aAAa,CAAC,MAAM,EAAE,CAAC,CAAC;YACrF,MAAM,IAAI,KAAK,CAAC,aAAa,CAAC,MAAM,CAAC,CAAC;QACxC,CAAC;QAED,oCAAoC;QACpC,MAAM,IAAI,CAAC,+BAA+B,CAAC,aAAa,CAAC,MAAO,EAAE,WAAW,CAAC,CAAC;QAE/E,6DAA6D;QAC7D,MAAM,KAAK,GAAG,MAAM,EAAE,CAAC,QAAQ,CAAC,GAAG,aAAa,CAAC,SAAU,IAAI,cAAc,EAAE,CAAC,CAAC;QAEjF,gGAAgG;QAChG,uBAAuB,CACrB,wBAAwB,CAAC,WAAW,CAAC,EACrC,aAAa,CAAC,QAAQ,EACtB,UAAU,CAAC,IAAI,GAAG,EAAE,CAAC,aAAa,EAClC,aAAa,CAAC,IAAI,GAAG,EAAE,CAAC,aAAa,EACrC,KAAK,CAAC,MAAM,EACZ,MAAM,CACP,CAAC;QAEF,MAAM,EAAE,CAAC,EAAE,CAAC,kBAAkB,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,KAAK,EAAE,IAAI,EAAE,CAAC,CAAC;QAElE,MAAM,CAAC,IAAI,CAAC,uBAAuB,WAAW,OAAO,aAAa,CAAC,QAAQ,cAAc,KAAK,CAAC,MAAM,SAAS,CAAC,CAAC;QAEhH,OAAO,CAAC,aAAa,EAAE,IAAI,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC;IAC3C,CAAC;IAED;;;;;;OAMG;IACI,KAAK,CAAC,oBAAoB,CAC/B,UAAsB,EACtB,WAAmC,EACnC,aAA+D;QAE/D,oDAAoD;QACpD,MAAM,kBAAkB,GAAG,GAAG,IAAI,CAAC,MAAM,CAAC,kBAAkB,IAAI,WAAW,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,EAAE,CAAC;QACjG,MAAM,EAAE,CAAC,KAAK,CAAC,kBAAkB,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;QAExD,MAAM,EAAE,CAAC,MAAM,CAAC,kBAAkB,CAAC,CAAC;QAEpC,IAAI,CAAC;YACH,+CAA+C;YAC/C,MAAM,iBAAiB,GAAG,GAAG,kBAAkB,qBAAqB,CAAC;YAErE,8CAA8C;YAC9C,gJAAgJ;YAChJ,MAAM,SAAS,GAAG,IAAI,mBAAmB,CACvC,IAAI,CAAC,MAAM,CAAC,oBAAoB,EAChC,IAAI,CAAC,MAAM,CAAC,cAAc,EAC1B,iBAAiB,CAClB,CAAC;YAEF,MAAM,QAAQ,GAAG,sBAAsB,CAAC,WAAW,CAAC,CAAC;YAErD,MAAM,CAAC,KAAK,CAAC,+BAA+B,WAAW,EAAE,CAAC,CAAC;YAE3D,MAAM,KAAK,GAAG,IAAI,KAAK,EAAE,CAAC;YAC1B,MAAM,aAAa,GAAG,MAAM,SAAS,CAAC,eAAe,CAAC,UAAU,EAAE,QAAQ,CAAC,CAAC;YAE5E,iCAAiC,CAC/B,wBAAwB,CAAC,WAAW,CAAC,EACrC,KAAK,CAAC,EAAE,EAAE,EACV,UAAU,CAAC,IAAI,GAAG,EAAE,CAAC,aAAa,EAClC,aAAa,CAAC,IAAI,GAAG,EAAE,CAAC,aAAa,EACrC,MAAM,CACP,CAAC;YAEF,MAAM,UAAU,GAAG,aAAa,CAAC,aAAa,CAAC,CAAC;YAEhD,mDAAmD;YACnD,MAAM,CAAC,KAAK,CAAC,WAAW,WAAW,KAAK,CAAC,CAAC;YAE1C,MAAM,aAAa,GAAG,MAAM,aAAa,CACvC,IAAI,CAAC,MAAM,CAAC,YAAY,EACxB,kBAAkB,EAClB,WAAW,EACX,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,EAAE,QAAQ,CAAC,EACxC,iBAAiB,EACjB,MAAM,CAAC,KAAK,CACb,CAAC;YAEF,IAAI,aAAa,CAAC,MAAM,KAAK,SAAS,CAAC,OAAO,EAAE,CAAC;gBAC/C,MAAM,CAAC,KAAK,CAAC,gCAAgC,WAAW,KAAK,aAAa,CAAC,MAAM,EAAE,CAAC,CAAC;gBACrF,MAAM,IAAI,KAAK,CAAC,aAAa,CAAC,MAAM,CAAC,CAAC;YACxC,CAAC;YAED,oCAAoC;YACpC,MAAM,IAAI,CAAC,+BAA+B,CAAC,aAAa,CAAC,MAAO,EAAE,WAAW,CAAC,CAAC;YAE/E,6DAA6D;YAC7D,MAAM,KAAK,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAe,aAAa,CAAC,SAAU,EAAE,WAAW,CAAC,CAAC;YAEhG,MAAM,CAAC,IAAI,CACT,uBAAuB,WAAW,OAAO,aAAa,CAAC,QAAQ,cAAc,KAAK,CAAC,KAAK,CAAC,MAAM,SAAS,CACzG,CAAC;YAEF,uBAAuB,CACrB,wBAAwB,CAAC,WAAW,CAAC,EACrC,aAAa,CAAC,QAAQ,EACtB,UAAU,CAAC,IAAI,GAAG,EAAE,CAAC,aAAa,EAClC,aAAa,CAAC,IAAI,GAAG,EAAE,CAAC,aAAa,EACrC,KAAK,CAAC,WAAW,CAAC,MAAM,CAAC,MAAM,EAC/B,MAAM,CACP,CAAC;YAEF,OAAO,CAAC,UAAU,EAAE,KAAK,CAAC,CAAC;QAC7B,CAAC;gBAAS,CAAC;YACT,MAAM,EAAE,CAAC,EAAE,CAAC,kBAAkB,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,KAAK,EAAE,IAAI,EAAE,CAAC,CAAC;QACpE,CAAC;IACH,CAAC;IAED;;;;OAIG;IACI,KAAK,CAAC,WAAW,CAAC,WAAmC,EAAE,KAAY;QACxE,oDAAoD;QACpD,MAAM,kBAAkB,GAAG,GAAG,IAAI,CAAC,MAAM,CAAC,kBAAkB,IAAI,WAAW,CAAC,CAAC,CAAC,CAAC,QAAQ,CAAC,KAAK,CAAC,EAAE,CAAC;QACjG,MAAM,EAAE,CAAC,KAAK,CAAC,kBAAkB,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;QAExD,MAAM,aAAa,GAAG,GAAG,kBAAkB,QAAQ,CAAC;QACpD,MAAM,mBAAmB,GAAG,GAAG,kBAAkB,KAAK,CAAC;QACvD,MAAM,eAAe,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAAC,WAAW,CAAC,CAAC;QAEjF,MAAM,CAAC,KAAK,CAAC,uBAAuB,eAAe,CAAC,IAAI,CAAC,QAAQ,EAAE,EAAE,CAAC,CAAC;QAEvE,MAAM,EAAE,CAAC,SAAS,CAAC,aAAa,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;QAChD,MAAM,EAAE,CAAC,SAAS,CAAC,mBAAmB,EAAE,eAAe,CAAC,UAAU,CAAC,CAAC;QAEpE,MAAM,WAAW,GAAG,CAAC,OAAe,EAAE,EAAE;YACtC,MAAM,CAAC,KAAK,CAAC,GAAG,WAAW,aAAa,OAAO,EAAE,CAAC,CAAC;QACrD,CAAC,CAAC;QAEF,MAAM,MAAM,GAAG,MAAM,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,YAAY,EAAE,aAAa,EAAE,mBAAoB,EAAE,WAAW,CAAC,CAAC;QAE7G,MAAM,EAAE,CAAC,EAAE,CAAC,kBAAkB,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,KAAK,EAAE,IAAI,EAAE,CAAC,CAAC;QAElE,IAAI,MAAM,CAAC,MAAM,KAAK,SAAS,CAAC,OAAO,EAAE,CAAC;YACxC,MAAM,YAAY,GAAG,oBAAoB,WAAW,SAAS,CAAC;YAC9D,MAAM,IAAI,KAAK,CAAC,YAAY,CAAC,CAAC;QAChC,CAAC;QAED,MAAM,CAAC,IAAI,CAAC,yBAAyB,WAAW,aAAa,MAAM,CAAC,QAAQ,KAAK,CAAC,CAAC;IACrF,CAAC;IAED;;;;OAIG;IACI,KAAK,CAAC,4BAA4B,CAAC,WAAmC;QAC3E,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,gCAAgC,CAAC,WAAW,CAAC,CAAC;QACxE,OAAO,IAAI,uBAAuB,CAAC,MAAM,CAAC,WAAW,EAAE,MAAM,CAAC,IAAI,CAAC,CAAC;IACtE,CAAC;IAEO,KAAK,CAAC,yBAAyB,CAAC,kBAAsC;QAC5E,MAAM,KAAK,GAAG,kBAAkB,CAAC,KAAK,CAAC;QACvC,MAAM,WAAW,GACf,kBAAkB,CAAC,6BAA6B,CAAC,UAAU,KAAK,WAAW,CAAC,IAAI;YAC9E,CAAC,CAAC,oBAAoB;YACtB,CAAC,CAAC,qBAAqB,CAAC;QAC5B,MAAM,IAAI,CAAC,WAAW,CAAC,WAAW,EAAE,KAAK,CAAC,CAAC;IAC7C,CAAC;IAED;;;;OAIG;IACK,KAAK,CAAC,gCAAgC,CAAC,WAAmC;QAChF,IAAI,OAAO,GAAG,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;QACrD,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,OAAO,GAAG,yBAAyB,CACjC,IAAI,CAAC,MAAM,CAAC,YAAY,EACxB,IAAI,CAAC,MAAM,CAAC,kBAAkB,EAC9B,WAAW,EACX,sBAAsB,CAAC,WAAW,CAAC,EACnC,IAAI,EACJ,MAAM,CAAC,KAAK,CACb,CAAC,IAAI,CAAC,MAAM,CAAC,EAAE;gBACd,IAAI,MAAM,CAAC,MAAM,KAAK,SAAS,CAAC,OAAO,EAAE,CAAC;oBACxC,MAAM,IAAI,KAAK,CAAC,2CAA2C,WAAW,KAAK,MAAM,CAAC,MAAM,EAAE,CAAC,CAAC;gBAC9F,CAAC;gBACD,OAAO,IAAI,CAAC,SAAS,CAAC,MAAM,CAAC,MAAO,CAAC,CAAC;YACxC,CAAC,CAAC,CAAC;YACH,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,WAAW,EAAE,OAAO,CAAC,CAAC;QAClD,CAAC;QACD,OAAO,MAAM,OAAO,CAAC;IACvB,CAAC;IAED;;;;OAIG;IACK,KAAK,CAAC,SAAS,CAAC,QAAgB;QACtC,MAAM,CAAC,SAAS,EAAE,SAAS,CAAC,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC;YAC/C,EAAE,CAAC,QAAQ,CAAC,GAAG,QAAQ,IAAI,kBAAkB,EAAE,EAAE,EAAE,QAAQ,EAAE,OAAO,EAAE,CAAC;YACvE,EAAE,CAAC,QAAQ,CAAC,GAAG,QAAQ,IAAI,WAAW,EAAE,CAAC;SAC1C,CAAC,CAAC;QACH,MAAM,UAAU,GAAG,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC;QACzC,MAAM,MAAM,GAAG,UAAU,CAAC,GAAG,CAAC,EAAE,CAAC,UAAU,CAAC,CAAC;QAC7C,gEAAgE;QAChE,MAAM,MAAM,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;QACzB,MAAM,QAAQ,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;QACjC,MAAM,EAAE,GAAwB;YAC9B,IAAI,EAAE,MAAM;YACZ,WAAW,EAAE,QAA+D;YAC5E,UAAU,EAAE,SAAS;YACrB,eAAe,EAAE,MAAM,CAAC,QAAQ,CAAC,2BAA2B,CAAC,CAAC;YAC9D,WAAW,EAAE,MAAM,CAAC,QAAQ,CAAC,kBAAkB,CAAC,CAAC;YACjD,WAAW,EAAE,QAAQ,CAAC,uBAAuB,CAAC,IAAI,EAAE,CAAC,GAAG;SACzD,CAAC;QACF,OAAO,EAAE,CAAC;IACZ,CAAC;IAED;;;;OAIG;IACK,KAAK,CAAC,+BAA+B,CAAC,QAAgB,EAAE,WAAmC;QACjG,IAAI,OAAO,GAAG,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;QACrD,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,OAAO,GAAG,IAAI,CAAC,SAAS,CAAC,QAAQ,CAAC,CAAC;YACnC,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,WAAW,EAAE,OAAO,CAAC,CAAC;QAClD,CAAC;QACD,MAAM,OAAO,CAAC;IAChB,CAAC;IAED;;;;;OAKG;IACK,KAAK,CAAC,iBAAiB,CAC7B,QAAgB,EAChB,WAAmC;QAEnC,MAAM,CAAC,WAAW,EAAE,WAAW,CAAC,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC;YACnD,EAAE,CAAC,QAAQ,CAAC,GAAG,QAAQ,IAAI,cAAc,EAAE,CAAC;YAC5C,EAAE,CAAC,QAAQ,CAAC,GAAG,QAAQ,IAAI,qBAAqB,EAAE,EAAE,EAAE,QAAQ,EAAE,OAAO,EAAE,CAAC;SAC3E,CAAC,CAAC;QACH,MAAM,IAAI,GAAG,IAAI,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC;QACrC,MAAM,MAAM,GAAG,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,UAAU,CAAC,CAAC;QACvC,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;QAC5D,IAAI,CAAC,MAAM,EAAE,CAAC;YACZ,MAAM,IAAI,KAAK,CAAC,gCAAgC,WAAW,EAAE,CAAC,CAAC;QACjE,CAAC;QACD,MAAM,eAAe,GAAG,4BAA4B,CAAC,GAAG,CAAC,WAAW,CAAC;YACnE,CAAC,CAAC,MAAM,CAAC,eAAe;YACxB,CAAC,CAAC,MAAM,CAAC,eAAe,GAAG,uBAAuB,CAAC;QACrD,MAAM,yBAAyB,GAAG,MAAM,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC;QAChE,MAAM,CAAC,KAAK,CACV,iBAAiB,WAAW,4BAA4B,MAAM,CAAC,MAAM,4BAA4B,yBAAyB,CAAC,MAAM,wBAAwB,eAAe,mBAAmB,MAAM,CAAC,WAAW,mBAAmB,MAAM,CAAC,WAAW,iBAAiB,WAAW,CAAC,MAAM,EAAE,CACxR,CAAC;QACF,MAAM,KAAK,GAAG,IAAI,cAAc,CAAe,yBAAyB,EAAE,IAAI,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC;QAClG,OAAO,KAAK,CAAC;IACf,CAAC;CACF"}
@@ -0,0 +1,3 @@
1
+ export * from './bb_prover.js';
2
+ export * from './bb_native_proof_creator.js';
3
+ //# sourceMappingURL=index.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/prover/index.ts"],"names":[],"mappings":"AAAA,cAAc,gBAAgB,CAAC;AAC/B,cAAc,8BAA8B,CAAC"}
@@ -0,0 +1,3 @@
1
+ export * from './bb_prover.js';
2
+ export * from './bb_native_proof_creator.js';
3
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi9zcmMvcHJvdmVyL2luZGV4LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiJBQUFBLGNBQWMsZ0JBQWdCLENBQUM7QUFDL0IsY0FBYyw4QkFBOEIsQ0FBQyJ9
@@ -0,0 +1,16 @@
1
+ /// <reference types="node" resolution-mode="require"/>
2
+ import { type Fr, type VERIFICATION_KEY_LENGTH_IN_FIELDS } from '@aztec/circuits.js';
3
+ import { type Tuple } from '@aztec/foundation/serialize';
4
+ export declare const AGGREGATION_OBJECT_SIZE = 16;
5
+ export declare const CIRCUIT_SIZE_INDEX = 3;
6
+ export declare const CIRCUIT_PUBLIC_INPUTS_INDEX = 4;
7
+ export declare const CIRCUIT_RECURSIVE_INDEX = 5;
8
+ export type VerificationKeyData = {
9
+ hash: Fr;
10
+ keyAsFields: Tuple<Fr, typeof VERIFICATION_KEY_LENGTH_IN_FIELDS>;
11
+ keyAsBytes: Buffer;
12
+ numPublicInputs: number;
13
+ circuitSize: number;
14
+ isRecursive: boolean;
15
+ };
16
+ //# sourceMappingURL=verification_key_data.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"verification_key_data.d.ts","sourceRoot":"","sources":["../../src/prover/verification_key_data.ts"],"names":[],"mappings":";AAAA,OAAO,EAAE,KAAK,EAAE,EAAE,KAAK,iCAAiC,EAAE,MAAM,oBAAoB,CAAC;AACrF,OAAO,EAAE,KAAK,KAAK,EAAE,MAAM,6BAA6B,CAAC;AAEzD,eAAO,MAAM,uBAAuB,KAAK,CAAC;AAC1C,eAAO,MAAM,kBAAkB,IAAI,CAAC;AACpC,eAAO,MAAM,2BAA2B,IAAI,CAAC;AAC7C,eAAO,MAAM,uBAAuB,IAAI,CAAC;AAEzC,MAAM,MAAM,mBAAmB,GAAG;IAChC,IAAI,EAAE,EAAE,CAAC;IACT,WAAW,EAAE,KAAK,CAAC,EAAE,EAAE,OAAO,iCAAiC,CAAC,CAAC;IACjE,UAAU,EAAE,MAAM,CAAC;IACnB,eAAe,EAAE,MAAM,CAAC;IACxB,WAAW,EAAE,MAAM,CAAC;IACpB,WAAW,EAAE,OAAO,CAAC;CACtB,CAAC"}
@@ -0,0 +1,5 @@
1
+ export const AGGREGATION_OBJECT_SIZE = 16;
2
+ export const CIRCUIT_SIZE_INDEX = 3;
3
+ export const CIRCUIT_PUBLIC_INPUTS_INDEX = 4;
4
+ export const CIRCUIT_RECURSIVE_INDEX = 5;
5
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoidmVyaWZpY2F0aW9uX2tleV9kYXRhLmpzIiwic291cmNlUm9vdCI6IiIsInNvdXJjZXMiOlsiLi4vLi4vc3JjL3Byb3Zlci92ZXJpZmljYXRpb25fa2V5X2RhdGEudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6IkFBR0EsTUFBTSxDQUFDLE1BQU0sdUJBQXVCLEdBQUcsRUFBRSxDQUFDO0FBQzFDLE1BQU0sQ0FBQyxNQUFNLGtCQUFrQixHQUFHLENBQUMsQ0FBQztBQUNwQyxNQUFNLENBQUMsTUFBTSwyQkFBMkIsR0FBRyxDQUFDLENBQUM7QUFDN0MsTUFBTSxDQUFDLE1BQU0sdUJBQXVCLEdBQUcsQ0FBQyxDQUFDIn0=
@@ -0,0 +1,9 @@
1
+ import { type PublicKernelRequest } from '@aztec/circuit-types';
2
+ import type { CircuitName } from '@aztec/circuit-types/stats';
3
+ import { type Logger } from '@aztec/foundation/log';
4
+ import { type ServerProtocolArtifact } from '@aztec/noir-protocol-circuits-types';
5
+ export declare function emitCircuitWitnessGenerationStats(circuitName: CircuitName, duration: number, inputSize: number, outputSize: number, logger: Logger): void;
6
+ export declare function emitCircuitProvingStats(circuitName: CircuitName, duration: number, inputSize: number, outputSize: number, proofSize: number, logger: Logger): void;
7
+ export declare function mapPublicKernelToCircuitName(kernelType: PublicKernelRequest['type']): CircuitName;
8
+ export declare function circuitTypeToCircuitName(circuitType: ServerProtocolArtifact): CircuitName;
9
+ //# sourceMappingURL=stats.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"stats.d.ts","sourceRoot":"","sources":["../src/stats.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,KAAK,mBAAmB,EAAoB,MAAM,sBAAsB,CAAC;AAClF,OAAO,KAAK,EAAE,WAAW,EAAsD,MAAM,4BAA4B,CAAC;AAClH,OAAO,EAAE,KAAK,MAAM,EAAE,MAAM,uBAAuB,CAAC;AACpD,OAAO,EAAE,KAAK,sBAAsB,EAAE,MAAM,qCAAqC,CAAC;AAElF,wBAAgB,iCAAiC,CAC/C,WAAW,EAAE,WAAW,EACxB,QAAQ,EAAE,MAAM,EAChB,SAAS,EAAE,MAAM,EACjB,UAAU,EAAE,MAAM,EAClB,MAAM,EAAE,MAAM,QAWf;AAED,wBAAgB,uBAAuB,CACrC,WAAW,EAAE,WAAW,EACxB,QAAQ,EAAE,MAAM,EAChB,SAAS,EAAE,MAAM,EACjB,UAAU,EAAE,MAAM,EAClB,SAAS,EAAE,MAAM,EACjB,MAAM,EAAE,MAAM,QAYf;AAED,wBAAgB,4BAA4B,CAAC,UAAU,EAAE,mBAAmB,CAAC,MAAM,CAAC,GAAG,WAAW,CAajG;AAED,wBAAgB,wBAAwB,CAAC,WAAW,EAAE,sBAAsB,GAAG,WAAW,CAuBzF"}
package/dest/stats.js ADDED
@@ -0,0 +1,61 @@
1
+ import { PublicKernelType } from '@aztec/circuit-types';
2
+ export function emitCircuitWitnessGenerationStats(circuitName, duration, inputSize, outputSize, logger) {
3
+ const stats = {
4
+ eventName: 'circuit-witness-generation',
5
+ circuitName,
6
+ inputSize,
7
+ outputSize,
8
+ duration,
9
+ };
10
+ logger.debug('Circuit witness generation stats', stats);
11
+ }
12
+ export function emitCircuitProvingStats(circuitName, duration, inputSize, outputSize, proofSize, logger) {
13
+ const stats = {
14
+ eventName: 'circuit-proving',
15
+ circuitName,
16
+ duration,
17
+ inputSize,
18
+ outputSize,
19
+ proofSize,
20
+ };
21
+ logger.debug('Circuit proving stats', stats);
22
+ }
23
+ export function mapPublicKernelToCircuitName(kernelType) {
24
+ switch (kernelType) {
25
+ case PublicKernelType.SETUP:
26
+ return 'public-kernel-setup';
27
+ case PublicKernelType.APP_LOGIC:
28
+ return 'public-kernel-app-logic';
29
+ case PublicKernelType.TEARDOWN:
30
+ return 'public-kernel-teardown';
31
+ case PublicKernelType.TAIL:
32
+ return 'public-kernel-tail';
33
+ default:
34
+ throw new Error(`Unknown kernel type: ${kernelType}`);
35
+ }
36
+ }
37
+ export function circuitTypeToCircuitName(circuitType) {
38
+ switch (circuitType) {
39
+ case 'BaseParityArtifact':
40
+ return 'base-parity';
41
+ case 'RootParityArtifact':
42
+ return 'root-parity';
43
+ case 'BaseRollupArtifact':
44
+ return 'base-rollup';
45
+ case 'MergeRollupArtifact':
46
+ return 'merge-rollup';
47
+ case 'RootRollupArtifact':
48
+ return 'root-rollup';
49
+ case 'PublicKernelSetupArtifact':
50
+ return 'public-kernel-setup';
51
+ case 'PublicKernelAppLogicArtifact':
52
+ return 'public-kernel-app-logic';
53
+ case 'PublicKernelTeardownArtifact':
54
+ return 'public-kernel-teardown';
55
+ case 'PublicKernelTailArtifact':
56
+ return 'public-kernel-tail';
57
+ default:
58
+ throw new Error(`Unknown circuit type: ${circuitType}`);
59
+ }
60
+ }
61
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,2 @@
1
+ export * from './test_circuit_prover.js';
2
+ //# sourceMappingURL=index.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/test/index.ts"],"names":[],"mappings":"AAAA,cAAc,0BAA0B,CAAC"}
@@ -0,0 +1,2 @@
1
+ export * from './test_circuit_prover.js';
2
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi9zcmMvdGVzdC9pbmRleC50cyJdLCJuYW1lcyI6W10sIm1hcHBpbmdzIjoiQUFBQSxjQUFjLDBCQUEwQixDQUFDIn0=
@@ -0,0 +1,48 @@
1
+ import { type PublicInputsAndProof, type PublicKernelNonTailRequest, type PublicKernelTailRequest, type ServerCircuitProver } from '@aztec/circuit-types';
2
+ import { type BaseOrMergeRollupPublicInputs, type BaseParityInputs, type BaseRollupInputs, type KernelCircuitPublicInputs, type MergeRollupInputs, NESTED_RECURSIVE_PROOF_LENGTH, type Proof, type PublicKernelCircuitPublicInputs, RECURSIVE_PROOF_LENGTH, RootParityInput, type RootParityInputs, type RootRollupInputs, type RootRollupPublicInputs } from '@aztec/circuits.js';
3
+ import { type ServerProtocolArtifact } from '@aztec/noir-protocol-circuits-types';
4
+ import { type SimulationProvider } from '@aztec/simulator';
5
+ /**
6
+ * A class for use in testing situations (e2e, unit test etc)
7
+ * Simulates circuits using the most efficient method and performs no proving
8
+ */
9
+ export declare class TestCircuitProver implements ServerCircuitProver {
10
+ private simulationProvider?;
11
+ private logger;
12
+ private wasmSimulator;
13
+ constructor(simulationProvider?: SimulationProvider | undefined, logger?: import("@aztec/foundation/log").Logger);
14
+ /**
15
+ * Simulates the base parity circuit from its inputs.
16
+ * @param inputs - Inputs to the circuit.
17
+ * @returns The public inputs of the parity circuit.
18
+ */
19
+ getBaseParityProof(inputs: BaseParityInputs): Promise<RootParityInput<typeof RECURSIVE_PROOF_LENGTH>>;
20
+ /**
21
+ * Simulates the root parity circuit from its inputs.
22
+ * @param inputs - Inputs to the circuit.
23
+ * @returns The public inputs of the parity circuit.
24
+ */
25
+ getRootParityProof(inputs: RootParityInputs): Promise<RootParityInput<typeof NESTED_RECURSIVE_PROOF_LENGTH>>;
26
+ /**
27
+ * Simulates the base rollup circuit from its inputs.
28
+ * @param input - Inputs to the circuit.
29
+ * @returns The public inputs as outputs of the simulation.
30
+ */
31
+ getBaseRollupProof(input: BaseRollupInputs): Promise<PublicInputsAndProof<BaseOrMergeRollupPublicInputs>>;
32
+ /**
33
+ * Simulates the merge rollup circuit from its inputs.
34
+ * @param input - Inputs to the circuit.
35
+ * @returns The public inputs as outputs of the simulation.
36
+ */
37
+ getMergeRollupProof(input: MergeRollupInputs): Promise<PublicInputsAndProof<BaseOrMergeRollupPublicInputs>>;
38
+ /**
39
+ * Simulates the root rollup circuit from its inputs.
40
+ * @param input - Inputs to the circuit.
41
+ * @returns The public inputs as outputs of the simulation.
42
+ */
43
+ getRootRollupProof(input: RootRollupInputs): Promise<PublicInputsAndProof<RootRollupPublicInputs>>;
44
+ getPublicKernelProof(kernelRequest: PublicKernelNonTailRequest): Promise<PublicInputsAndProof<PublicKernelCircuitPublicInputs>>;
45
+ getPublicTailProof(kernelRequest: PublicKernelTailRequest): Promise<PublicInputsAndProof<KernelCircuitPublicInputs>>;
46
+ verifyProof(_1: ServerProtocolArtifact, _2: Proof): Promise<void>;
47
+ }
48
+ //# sourceMappingURL=test_circuit_prover.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"test_circuit_prover.d.ts","sourceRoot":"","sources":["../../src/test/test_circuit_prover.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,KAAK,oBAAoB,EACzB,KAAK,0BAA0B,EAC/B,KAAK,uBAAuB,EAE5B,KAAK,mBAAmB,EAEzB,MAAM,sBAAsB,CAAC;AAC9B,OAAO,EACL,KAAK,6BAA6B,EAClC,KAAK,gBAAgB,EACrB,KAAK,gBAAgB,EACrB,KAAK,yBAAyB,EAC9B,KAAK,iBAAiB,EACtB,6BAA6B,EAC7B,KAAK,KAAK,EACV,KAAK,+BAA+B,EACpC,sBAAsB,EACtB,eAAe,EACf,KAAK,gBAAgB,EACrB,KAAK,gBAAgB,EACrB,KAAK,sBAAsB,EAI5B,MAAM,oBAAoB,CAAC;AAG5B,OAAO,EAML,KAAK,sBAAsB,EAc5B,MAAM,qCAAqC,CAAC;AAC7C,OAAO,EAAE,KAAK,kBAAkB,EAA6C,MAAM,kBAAkB,CAAC;AAiBtG;;;GAGG;AACH,qBAAa,iBAAkB,YAAW,mBAAmB;IAIzD,OAAO,CAAC,kBAAkB,CAAC;IAC3B,OAAO,CAAC,MAAM;IAJhB,OAAO,CAAC,aAAa,CAAuB;gBAGlC,kBAAkB,CAAC,gCAAoB,EACvC,MAAM,yCAAyC;IAGzD;;;;OAIG;IACU,kBAAkB,CAAC,MAAM,EAAE,gBAAgB,GAAG,OAAO,CAAC,eAAe,CAAC,OAAO,sBAAsB,CAAC,CAAC;IAyBlH;;;;OAIG;IACU,kBAAkB,CAC7B,MAAM,EAAE,gBAAgB,GACvB,OAAO,CAAC,eAAe,CAAC,OAAO,6BAA6B,CAAC,CAAC;IA0BjE;;;;OAIG;IACU,kBAAkB,CAC7B,KAAK,EAAE,gBAAgB,GACtB,OAAO,CAAC,oBAAoB,CAAC,6BAA6B,CAAC,CAAC;IAkB/D;;;;OAIG;IACU,mBAAmB,CAC9B,KAAK,EAAE,iBAAiB,GACvB,OAAO,CAAC,oBAAoB,CAAC,6BAA6B,CAAC,CAAC;IAmB/D;;;;OAIG;IACU,kBAAkB,CAAC,KAAK,EAAE,gBAAgB,GAAG,OAAO,CAAC,oBAAoB,CAAC,sBAAsB,CAAC,CAAC;IAmBlG,oBAAoB,CAC/B,aAAa,EAAE,0BAA0B,GACxC,OAAO,CAAC,oBAAoB,CAAC,+BAA+B,CAAC,CAAC;IAsBpD,kBAAkB,CAC7B,aAAa,EAAE,uBAAuB,GACrC,OAAO,CAAC,oBAAoB,CAAC,yBAAyB,CAAC,CAAC;IAsBpD,WAAW,CAAC,EAAE,EAAE,sBAAsB,EAAE,EAAE,EAAE,KAAK,GAAG,OAAO,CAAC,IAAI,CAAC;CAGzE"}