@aztec/bb-prover 0.46.2 → 0.46.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (36) hide show
  1. package/dest/bb/cli.d.ts.map +1 -1
  2. package/dest/bb/cli.js +22 -1
  3. package/dest/bb/execute.d.ts +25 -0
  4. package/dest/bb/execute.d.ts.map +1 -1
  5. package/dest/bb/execute.js +185 -7
  6. package/dest/prover/bb_private_kernel_prover.d.ts +49 -0
  7. package/dest/prover/bb_private_kernel_prover.d.ts.map +1 -0
  8. package/dest/prover/bb_private_kernel_prover.js +201 -0
  9. package/dest/prover/bb_prover.d.ts +20 -5
  10. package/dest/prover/bb_prover.d.ts.map +1 -1
  11. package/dest/prover/bb_prover.js +118 -15
  12. package/dest/prover/index.d.ts +1 -1
  13. package/dest/prover/index.d.ts.map +1 -1
  14. package/dest/prover/index.js +2 -2
  15. package/dest/stats.d.ts.map +1 -1
  16. package/dest/stats.js +3 -1
  17. package/dest/test/test_circuit_prover.d.ts +6 -1
  18. package/dest/test/test_circuit_prover.d.ts.map +1 -1
  19. package/dest/test/test_circuit_prover.js +17 -3
  20. package/dest/verification_key/verification_key_data.d.ts.map +1 -1
  21. package/dest/verification_key/verification_key_data.js +2 -3
  22. package/dest/verifier/bb_verifier.d.ts.map +1 -1
  23. package/dest/verifier/bb_verifier.js +8 -7
  24. package/package.json +8 -7
  25. package/src/bb/cli.ts +32 -0
  26. package/src/bb/execute.ts +227 -7
  27. package/src/prover/{bb_native_proof_creator.ts → bb_private_kernel_prover.ts} +114 -114
  28. package/src/prover/bb_prover.ts +167 -17
  29. package/src/prover/index.ts +1 -1
  30. package/src/stats.ts +2 -0
  31. package/src/test/test_circuit_prover.ts +42 -0
  32. package/src/verification_key/verification_key_data.ts +1 -5
  33. package/src/verifier/bb_verifier.ts +7 -6
  34. package/dest/prover/bb_native_proof_creator.d.ts +0 -47
  35. package/dest/prover/bb_native_proof_creator.d.ts.map +0 -1
  36. package/dest/prover/bb_native_proof_creator.js +0 -198
@@ -0,0 +1,201 @@
1
+ import { ClientIvcProof, Fr, Proof, RecursiveProof, } from '@aztec/circuits.js';
2
+ import { siloNoteHash } from '@aztec/circuits.js/hash';
3
+ import { runInDirectory } from '@aztec/foundation/fs';
4
+ import { createDebugLogger } from '@aztec/foundation/log';
5
+ import { Timer } from '@aztec/foundation/timer';
6
+ import { ClientCircuitArtifacts, PrivateResetTagToArtifactName, ProtocolCircuitVks, convertPrivateKernelInitInputsToWitnessMap, convertPrivateKernelInitOutputsFromWitnessMap, convertPrivateKernelInnerInputsToWitnessMap, convertPrivateKernelInnerOutputsFromWitnessMap, convertPrivateKernelResetInputsToWitnessMap, convertPrivateKernelResetOutputsFromWitnessMap, convertPrivateKernelTailForPublicOutputsFromWitnessMap, convertPrivateKernelTailInputsToWitnessMap, convertPrivateKernelTailOutputsFromWitnessMap, convertPrivateKernelTailToPublicInputsToWitnessMap, } from '@aztec/noir-protocol-circuits-types';
7
+ import { WASMSimulator } from '@aztec/simulator';
8
+ import { encode } from '@msgpack/msgpack';
9
+ import { serializeWitness } from '@noir-lang/noirc_abi';
10
+ import * as fs from 'fs/promises';
11
+ import path from 'path';
12
+ import { BB_RESULT, PROOF_FIELDS_FILENAME, PROOF_FILENAME, computeVerificationKey, executeBbClientIvcProof, verifyProof, } from '../bb/execute.js';
13
+ import { mapProtocolArtifactNameToCircuitName } from '../stats.js';
14
+ import { extractVkData } from '../verification_key/verification_key_data.js';
15
+ /**
16
+ * This proof creator implementation uses the native bb binary.
17
+ * This is a temporary implementation until we make the WASM version work.
18
+ * TODO(#7368): this class grew 'organically' aka it could use a look at its resposibilities
19
+ */
20
+ export class BBNativePrivateKernelProver {
21
+ constructor(bbBinaryPath, bbWorkingDirectory, log = createDebugLogger('aztec:bb-native-prover')) {
22
+ this.bbBinaryPath = bbBinaryPath;
23
+ this.bbWorkingDirectory = bbWorkingDirectory;
24
+ this.log = log;
25
+ this.simulator = new WASMSimulator();
26
+ this.verificationKeys = new Map();
27
+ }
28
+ async _createClientIvcProof(directory, acirs, witnessStack) {
29
+ // TODO(#7371): Longer term we won't use this hacked together msgpack format
30
+ // and instead properly create the bincode serialization from rust
31
+ await fs.writeFile(path.join(directory, 'acir.msgpack'), encode(acirs));
32
+ await fs.writeFile(path.join(directory, 'witnesses.msgpack'), encode(witnessStack.map(map => serializeWitness(map))));
33
+ const provingResult = await executeBbClientIvcProof(this.bbBinaryPath, directory, path.join(directory, 'acir.msgpack'), path.join(directory, 'witnesses.msgpack'), this.log.info);
34
+ if (provingResult.status === BB_RESULT.FAILURE) {
35
+ this.log.error(`Failed to generate client ivc proof`);
36
+ throw new Error(provingResult.reason);
37
+ }
38
+ const proof = await ClientIvcProof.readFromOutputDirectory(directory);
39
+ this.log.info(`Generated IVC proof`, {
40
+ duration: provingResult.durationMs,
41
+ eventName: 'circuit-proving',
42
+ });
43
+ return proof;
44
+ }
45
+ async createClientIvcProof(acirs, witnessStack) {
46
+ this.log.info(`Generating Client IVC proof`);
47
+ const operation = async (directory) => {
48
+ return await this._createClientIvcProof(directory, acirs, witnessStack);
49
+ };
50
+ return await runInDirectory(this.bbWorkingDirectory, operation);
51
+ }
52
+ getSiloedCommitments(publicInputs) {
53
+ const contractAddress = publicInputs.callContext.storageContractAddress;
54
+ return Promise.resolve(publicInputs.noteHashes.map(commitment => siloNoteHash(contractAddress, commitment.value)));
55
+ }
56
+ async simulateProofInit(inputs) {
57
+ return await this.simulate(inputs, 'PrivateKernelInitArtifact', convertPrivateKernelInitInputsToWitnessMap, convertPrivateKernelInitOutputsFromWitnessMap);
58
+ }
59
+ async simulateProofInner(inputs) {
60
+ return await this.simulate(inputs, 'PrivateKernelInnerArtifact', convertPrivateKernelInnerInputsToWitnessMap, convertPrivateKernelInnerOutputsFromWitnessMap);
61
+ }
62
+ async simulateProofReset(inputs) {
63
+ return await this.simulate(inputs, PrivateResetTagToArtifactName[inputs.sizeTag], convertPrivateKernelResetInputsToWitnessMap, output => convertPrivateKernelResetOutputsFromWitnessMap(output, inputs.sizeTag));
64
+ }
65
+ async simulateProofTail(inputs) {
66
+ if (!inputs.isForPublic()) {
67
+ return await this.simulate(inputs, 'PrivateKernelTailArtifact', convertPrivateKernelTailInputsToWitnessMap, convertPrivateKernelTailOutputsFromWitnessMap);
68
+ }
69
+ return await this.simulate(inputs, 'PrivateKernelTailToPublicArtifact', convertPrivateKernelTailToPublicInputsToWitnessMap, convertPrivateKernelTailForPublicOutputsFromWitnessMap);
70
+ }
71
+ async computeAppCircuitVerificationKey(bytecode, appCircuitName) {
72
+ const operation = async (directory) => {
73
+ this.log.debug(`Proving app circuit`);
74
+ return await this.computeVerificationKey(directory, bytecode, 'App', appCircuitName);
75
+ };
76
+ return await runInDirectory(this.bbWorkingDirectory, operation);
77
+ }
78
+ /**
79
+ * Verifies a proof, will generate the verification key if one is not cached internally
80
+ * @param circuitType - The type of circuit whose proof is to be verified
81
+ * @param proof - The proof to be verified
82
+ */
83
+ async verifyProofForProtocolCircuit(circuitType, proof) {
84
+ const verificationKey = ProtocolCircuitVks[circuitType];
85
+ this.log.debug(`Verifying with key: ${verificationKey.keyAsFields.hash.toString()}`);
86
+ const logFunction = (message) => {
87
+ this.log.debug(`${circuitType} BB out - ${message}`);
88
+ };
89
+ const result = await this.verifyProofFromKey(verificationKey.keyAsBytes, proof, logFunction);
90
+ if (result.status === BB_RESULT.FAILURE) {
91
+ const errorMessage = `Failed to verify ${circuitType} proof!`;
92
+ throw new Error(errorMessage);
93
+ }
94
+ this.log.info(`Successfully verified ${circuitType} proof in ${Math.ceil(result.durationMs)} ms`);
95
+ }
96
+ async verifyProofFromKey(verificationKey, proof, logFunction = () => { }) {
97
+ const operation = async (bbWorkingDirectory) => {
98
+ const proofFileName = `${bbWorkingDirectory}/proof`;
99
+ const verificationKeyPath = `${bbWorkingDirectory}/vk`;
100
+ await fs.writeFile(proofFileName, proof.buffer);
101
+ await fs.writeFile(verificationKeyPath, verificationKey);
102
+ return await verifyProof(this.bbBinaryPath, proofFileName, verificationKeyPath, logFunction);
103
+ };
104
+ return await runInDirectory(this.bbWorkingDirectory, operation);
105
+ }
106
+ /**
107
+ * Ensures our verification key cache includes the key data located at the specified directory
108
+ * @param filePath - The directory containing the verification key data files
109
+ * @param circuitType - The type of circuit to which the verification key corresponds
110
+ */
111
+ async updateVerificationKeyAfterSimulation(filePath, circuitType) {
112
+ let promise = this.verificationKeys.get(circuitType);
113
+ if (!promise) {
114
+ promise = extractVkData(filePath);
115
+ this.log.debug(`Updated verification key for circuit: ${circuitType}`);
116
+ this.verificationKeys.set(circuitType, promise);
117
+ }
118
+ return await promise;
119
+ }
120
+ async simulate(inputs, circuitType, convertInputs, convertOutputs) {
121
+ this.log.debug(`Generating witness for ${circuitType}`);
122
+ const compiledCircuit = ClientCircuitArtifacts[circuitType];
123
+ const witnessMap = convertInputs(inputs);
124
+ const timer = new Timer();
125
+ const outputWitness = await this.simulator.simulateCircuit(witnessMap, compiledCircuit);
126
+ const output = convertOutputs(outputWitness);
127
+ this.log.debug(`Generated witness for ${circuitType}`, {
128
+ eventName: 'circuit-witness-generation',
129
+ circuitName: mapProtocolArtifactNameToCircuitName(circuitType),
130
+ duration: timer.ms(),
131
+ inputSize: inputs.toBuffer().length,
132
+ outputSize: output.toBuffer().length,
133
+ });
134
+ // TODO(#7410) we dont need to generate vk's for these circuits, they are in the vk tree
135
+ const { verificationKey } = await runInDirectory(this.bbWorkingDirectory, dir => this.computeVerificationKey(dir, Buffer.from(compiledCircuit.bytecode, 'base64'), circuitType));
136
+ const kernelOutput = {
137
+ publicInputs: output,
138
+ verificationKey,
139
+ outputWitness,
140
+ };
141
+ return kernelOutput;
142
+ }
143
+ async computeVerificationKey(directory, bytecode, circuitType, appCircuitName) {
144
+ const dbgCircuitName = appCircuitName ? `(${appCircuitName})` : '';
145
+ this.log.info(`Computing VK of ${circuitType}${dbgCircuitName} circuit...`);
146
+ const timer = new Timer();
147
+ const vkResult = await computeVerificationKey(this.bbBinaryPath, directory, circuitType, bytecode, this.log.debug);
148
+ if (vkResult.status === BB_RESULT.FAILURE) {
149
+ this.log.error(`Failed to generate proof for ${circuitType}${dbgCircuitName}: ${vkResult.reason}`);
150
+ throw new Error(vkResult.reason);
151
+ }
152
+ this.log.info(`Generated ${circuitType}${dbgCircuitName} VK in ${Math.ceil(timer.ms())} ms`);
153
+ if (circuitType === 'App') {
154
+ const vkData = await extractVkData(directory);
155
+ this.log.debug(`Computed verification key`, {
156
+ circuitName: 'app-circuit',
157
+ duration: vkResult.durationMs,
158
+ eventName: 'circuit-simulation',
159
+ inputSize: bytecode.length,
160
+ outputSize: vkData.keyAsBytes.length,
161
+ circuitSize: vkData.circuitSize,
162
+ numPublicInputs: vkData.numPublicInputs,
163
+ });
164
+ return { verificationKey: vkData.keyAsFields };
165
+ }
166
+ const vkData = await this.updateVerificationKeyAfterSimulation(directory, circuitType);
167
+ this.log.debug(`Computed verification key`, {
168
+ circuitName: mapProtocolArtifactNameToCircuitName(circuitType),
169
+ duration: vkResult.durationMs,
170
+ eventName: 'circuit-simulation',
171
+ inputSize: bytecode.length,
172
+ outputSize: vkData.keyAsBytes.length,
173
+ circuitSize: vkData.circuitSize,
174
+ numPublicInputs: vkData.numPublicInputs,
175
+ });
176
+ return { verificationKey: vkData.keyAsFields };
177
+ }
178
+ /**
179
+ * Parses and returns the proof data stored at the specified directory
180
+ * @param filePath - The directory containing the proof data
181
+ * @param circuitType - The type of circuit proven
182
+ * @returns The proof
183
+ */
184
+ async readProofAsFields(filePath, circuitType, vkData) {
185
+ const [binaryProof, proofString] = await Promise.all([
186
+ fs.readFile(`${filePath}/${PROOF_FILENAME}`),
187
+ fs.readFile(`${filePath}/${PROOF_FIELDS_FILENAME}`, { encoding: 'utf-8' }),
188
+ ]);
189
+ const json = JSON.parse(proofString);
190
+ const fields = json.map(Fr.fromString);
191
+ const numPublicInputs = vkData.numPublicInputs;
192
+ // const numPublicInputs =
193
+ // TODO(https://github.com/AztecProtocol/barretenberg/issues/1044): Reinstate aggregation
194
+ // circuitType === 'App' ? vkData.numPublicInputs : vkData.numPublicInputs - AGGREGATION_OBJECT_LENGTH;
195
+ const fieldsWithoutPublicInputs = fields.slice(numPublicInputs);
196
+ this.log.info(`Circuit type: ${circuitType}, complete proof length: ${fields.length}, without public inputs: ${fieldsWithoutPublicInputs.length}, num public inputs: ${numPublicInputs}, circuit size: ${vkData.circuitSize}, is recursive: ${vkData.isRecursive}, raw length: ${binaryProof.length}`);
197
+ const proof = new RecursiveProof(fieldsWithoutPublicInputs, new Proof(binaryProof, vkData.numPublicInputs), true);
198
+ return proof;
199
+ }
200
+ }
201
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"bb_private_kernel_prover.js","sourceRoot":"","sources":["../../src/prover/bb_private_kernel_prover.ts"],"names":[],"mappings":"AAMA,OAAO,EACL,cAAc,EACd,EAAE,EAQF,KAAK,EACL,cAAc,GAGf,MAAM,oBAAoB,CAAC;AAC5B,OAAO,EAAE,YAAY,EAAE,MAAM,yBAAyB,CAAC;AACvD,OAAO,EAAE,cAAc,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,EAAE,iBAAiB,EAAE,MAAM,uBAAuB,CAAC;AAC1D,OAAO,EAAE,KAAK,EAAE,MAAM,yBAAyB,CAAC;AAChD,OAAO,EACL,sBAAsB,EAEtB,6BAA6B,EAC7B,kBAAkB,EAClB,0CAA0C,EAC1C,6CAA6C,EAC7C,2CAA2C,EAC3C,8CAA8C,EAC9C,2CAA2C,EAC3C,8CAA8C,EAC9C,sDAAsD,EACtD,0CAA0C,EAC1C,6CAA6C,EAC7C,kDAAkD,GACnD,MAAM,qCAAqC,CAAC;AAC7C,OAAO,EAAE,aAAa,EAAE,MAAM,kBAAkB,CAAC;AAGjD,OAAO,EAAE,MAAM,EAAE,MAAM,kBAAkB,CAAC;AAC1C,OAAO,EAAE,gBAAgB,EAAE,MAAM,sBAAsB,CAAC;AAExD,OAAO,KAAK,EAAE,MAAM,aAAa,CAAC;AAClC,OAAO,IAAI,MAAM,MAAM,CAAC;AAExB,OAAO,EACL,SAAS,EACT,qBAAqB,EACrB,cAAc,EACd,sBAAsB,EACtB,uBAAuB,EACvB,WAAW,GACZ,MAAM,kBAAkB,CAAC;AAC1B,OAAO,EAAE,oCAAoC,EAAE,MAAM,aAAa,CAAC;AACnE,OAAO,EAAE,aAAa,EAAE,MAAM,8CAA8C,CAAC;AAE7E;;;;GAIG;AACH,MAAM,OAAO,2BAA2B;IAQtC,YACU,YAAoB,EACpB,kBAA0B,EAC1B,MAAM,iBAAiB,CAAC,wBAAwB,CAAC;QAFjD,iBAAY,GAAZ,YAAY,CAAQ;QACpB,uBAAkB,GAAlB,kBAAkB,CAAQ;QAC1B,QAAG,GAAH,GAAG,CAA8C;QAVnD,cAAS,GAAG,IAAI,aAAa,EAAE,CAAC;QAEhC,qBAAgB,GAA8D,IAAI,GAAG,EAG1F,CAAC;IAMD,CAAC;IAEI,KAAK,CAAC,qBAAqB,CACjC,SAAiB,EACjB,KAAe,EACf,YAA0B;QAE1B,4EAA4E;QAC5E,kEAAkE;QAClE,MAAM,EAAE,CAAC,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,cAAc,CAAC,EAAE,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC;QACxE,MAAM,EAAE,CAAC,SAAS,CAChB,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,mBAAmB,CAAC,EACzC,MAAM,CAAC,YAAY,CAAC,GAAG,CAAC,GAAG,CAAC,EAAE,CAAC,gBAAgB,CAAC,GAAG,CAAC,CAAC,CAAC,CACvD,CAAC;QACF,MAAM,aAAa,GAAG,MAAM,uBAAuB,CACjD,IAAI,CAAC,YAAY,EACjB,SAAS,EACT,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,cAAc,CAAC,EACpC,IAAI,CAAC,IAAI,CAAC,SAAS,EAAE,mBAAmB,CAAC,EACzC,IAAI,CAAC,GAAG,CAAC,IAAI,CACd,CAAC;QAEF,IAAI,aAAa,CAAC,MAAM,KAAK,SAAS,CAAC,OAAO,EAAE,CAAC;YAC/C,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC,qCAAqC,CAAC,CAAC;YACtD,MAAM,IAAI,KAAK,CAAC,aAAa,CAAC,MAAM,CAAC,CAAC;QACxC,CAAC;QAED,MAAM,KAAK,GAAG,MAAM,cAAc,CAAC,uBAAuB,CAAC,SAAS,CAAC,CAAC;QAEtE,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,qBAAqB,EAAE;YACnC,QAAQ,EAAE,aAAa,CAAC,UAAU;YAClC,SAAS,EAAE,iBAAiB;SAC7B,CAAC,CAAC;QAEH,OAAO,KAAK,CAAC;IACf,CAAC;IAED,KAAK,CAAC,oBAAoB,CAAC,KAAe,EAAE,YAA0B;QACpE,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,6BAA6B,CAAC,CAAC;QAC7C,MAAM,SAAS,GAAG,KAAK,EAAE,SAAiB,EAAE,EAAE;YAC5C,OAAO,MAAM,IAAI,CAAC,qBAAqB,CAAC,SAAS,EAAE,KAAK,EAAE,YAAY,CAAC,CAAC;QAC1E,CAAC,CAAC;QACF,OAAO,MAAM,cAAc,CAAC,IAAI,CAAC,kBAAkB,EAAE,SAAS,CAAC,CAAC;IAClE,CAAC;IAEM,oBAAoB,CAAC,YAAwC;QAClE,MAAM,eAAe,GAAG,YAAY,CAAC,WAAW,CAAC,sBAAsB,CAAC;QAExE,OAAO,OAAO,CAAC,OAAO,CAAC,YAAY,CAAC,UAAU,CAAC,GAAG,CAAC,UAAU,CAAC,EAAE,CAAC,YAAY,CAAC,eAAe,EAAE,UAAU,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;IACrH,CAAC;IAEM,KAAK,CAAC,iBAAiB,CAC5B,MAA6C;QAE7C,OAAO,MAAM,IAAI,CAAC,QAAQ,CACxB,MAAM,EACN,2BAA2B,EAC3B,0CAA0C,EAC1C,6CAA6C,CAC9C,CAAC;IACJ,CAAC;IAEM,KAAK,CAAC,kBAAkB,CAC7B,MAA8C;QAE9C,OAAO,MAAM,IAAI,CAAC,QAAQ,CACxB,MAAM,EACN,4BAA4B,EAC5B,2CAA2C,EAC3C,8CAA8C,CAC/C,CAAC;IACJ,CAAC;IAEM,KAAK,CAAC,kBAAkB,CAC7B,MAAsD;QAEtD,OAAO,MAAM,IAAI,CAAC,QAAQ,CACxB,MAAM,EACN,6BAA6B,CAAC,MAAM,CAAC,OAAO,CAAC,EAC7C,2CAA2C,EAC3C,MAAM,CAAC,EAAE,CAAC,8CAA8C,CAAC,MAAM,EAAE,MAAM,CAAC,OAAO,CAAC,CACjF,CAAC;IACJ,CAAC;IAEM,KAAK,CAAC,iBAAiB,CAC5B,MAA6C;QAE7C,IAAI,CAAC,MAAM,CAAC,WAAW,EAAE,EAAE,CAAC;YAC1B,OAAO,MAAM,IAAI,CAAC,QAAQ,CACxB,MAAM,EACN,2BAA2B,EAC3B,0CAA0C,EAC1C,6CAA6C,CAC9C,CAAC;QACJ,CAAC;QACD,OAAO,MAAM,IAAI,CAAC,QAAQ,CACxB,MAAM,EACN,mCAAmC,EACnC,kDAAkD,EAClD,sDAAsD,CACvD,CAAC;IACJ,CAAC;IAEM,KAAK,CAAC,gCAAgC,CAC3C,QAAgB,EAChB,cAAuB;QAEvB,MAAM,SAAS,GAAG,KAAK,EAAE,SAAiB,EAAE,EAAE;YAC5C,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC,qBAAqB,CAAC,CAAC;YACtC,OAAO,MAAM,IAAI,CAAC,sBAAsB,CAAC,SAAS,EAAE,QAAQ,EAAE,KAAK,EAAE,cAAc,CAAC,CAAC;QACvF,CAAC,CAAC;QAEF,OAAO,MAAM,cAAc,CAAC,IAAI,CAAC,kBAAkB,EAAE,SAAS,CAAC,CAAC;IAClE,CAAC;IAED;;;;OAIG;IACI,KAAK,CAAC,6BAA6B,CAAC,WAAmC,EAAE,KAAY;QAC1F,MAAM,eAAe,GAAG,kBAAkB,CAAC,WAAW,CAAC,CAAC;QAExD,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC,uBAAuB,eAAe,CAAC,WAAW,CAAC,IAAI,CAAC,QAAQ,EAAE,EAAE,CAAC,CAAC;QAErF,MAAM,WAAW,GAAG,CAAC,OAAe,EAAE,EAAE;YACtC,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC,GAAG,WAAW,aAAa,OAAO,EAAE,CAAC,CAAC;QACvD,CAAC,CAAC;QAEF,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,kBAAkB,CAAC,eAAe,CAAC,UAAU,EAAE,KAAK,EAAE,WAAW,CAAC,CAAC;QAE7F,IAAI,MAAM,CAAC,MAAM,KAAK,SAAS,CAAC,OAAO,EAAE,CAAC;YACxC,MAAM,YAAY,GAAG,oBAAoB,WAAW,SAAS,CAAC;YAC9D,MAAM,IAAI,KAAK,CAAC,YAAY,CAAC,CAAC;QAChC,CAAC;QAED,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,yBAAyB,WAAW,aAAa,IAAI,CAAC,IAAI,CAAC,MAAM,CAAC,UAAU,CAAC,KAAK,CAAC,CAAC;IACpG,CAAC;IAEO,KAAK,CAAC,kBAAkB,CAC9B,eAAuB,EACvB,KAAY,EACZ,cAAyC,GAAG,EAAE,GAAE,CAAC;QAEjD,MAAM,SAAS,GAAG,KAAK,EAAE,kBAA0B,EAAE,EAAE;YACrD,MAAM,aAAa,GAAG,GAAG,kBAAkB,QAAQ,CAAC;YACpD,MAAM,mBAAmB,GAAG,GAAG,kBAAkB,KAAK,CAAC;YAEvD,MAAM,EAAE,CAAC,SAAS,CAAC,aAAa,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;YAChD,MAAM,EAAE,CAAC,SAAS,CAAC,mBAAmB,EAAE,eAAe,CAAC,CAAC;YACzD,OAAO,MAAM,WAAW,CAAC,IAAI,CAAC,YAAY,EAAE,aAAa,EAAE,mBAAoB,EAAE,WAAW,CAAC,CAAC;QAChG,CAAC,CAAC;QACF,OAAO,MAAM,cAAc,CAAC,IAAI,CAAC,kBAAkB,EAAE,SAAS,CAAC,CAAC;IAClE,CAAC;IAED;;;;OAIG;IACK,KAAK,CAAC,oCAAoC,CAAC,QAAgB,EAAE,WAAmC;QACtG,IAAI,OAAO,GAAG,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,WAAW,CAAC,CAAC;QACrD,IAAI,CAAC,OAAO,EAAE,CAAC;YACb,OAAO,GAAG,aAAa,CAAC,QAAQ,CAAC,CAAC;YAClC,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC,yCAAyC,WAAW,EAAE,CAAC,CAAC;YACvE,IAAI,CAAC,gBAAgB,CAAC,GAAG,CAAC,WAAW,EAAE,OAAO,CAAC,CAAC;QAClD,CAAC;QACD,OAAO,MAAM,OAAO,CAAC;IACvB,CAAC;IAEO,KAAK,CAAC,QAAQ,CACpB,MAAS,EACT,WAAmC,EACnC,aAAwC,EACxC,cAA0C;QAE1C,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC,0BAA0B,WAAW,EAAE,CAAC,CAAC;QACxD,MAAM,eAAe,GAAwB,sBAAsB,CAAC,WAAW,CAAC,CAAC;QAEjF,MAAM,UAAU,GAAG,aAAa,CAAC,MAAM,CAAC,CAAC;QACzC,MAAM,KAAK,GAAG,IAAI,KAAK,EAAE,CAAC;QAC1B,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,SAAS,CAAC,eAAe,CAAC,UAAU,EAAE,eAAe,CAAC,CAAC;QACxF,MAAM,MAAM,GAAG,cAAc,CAAC,aAAa,CAAC,CAAC;QAE7C,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC,yBAAyB,WAAW,EAAE,EAAE;YACrD,SAAS,EAAE,4BAA4B;YACvC,WAAW,EAAE,oCAAoC,CAAC,WAAW,CAAC;YAC9D,QAAQ,EAAE,KAAK,CAAC,EAAE,EAAE;YACpB,SAAS,EAAE,MAAM,CAAC,QAAQ,EAAE,CAAC,MAAM;YACnC,UAAU,EAAE,MAAM,CAAC,QAAQ,EAAE,CAAC,MAAM;SACG,CAAC,CAAC;QAE3C,wFAAwF;QACxF,MAAM,EAAE,eAAe,EAAE,GAAG,MAAM,cAAc,CAAC,IAAI,CAAC,kBAAkB,EAAE,GAAG,CAAC,EAAE,CAC9E,IAAI,CAAC,sBAAsB,CAAC,GAAG,EAAE,MAAM,CAAC,IAAI,CAAC,eAAe,CAAC,QAAQ,EAAE,QAAQ,CAAC,EAAE,WAAW,CAAC,CAC/F,CAAC;QACF,MAAM,YAAY,GAAmC;YACnD,YAAY,EAAE,MAAM;YACpB,eAAe;YACf,aAAa;SACd,CAAC;QACF,OAAO,YAAY,CAAC;IACtB,CAAC;IAEO,KAAK,CAAC,sBAAsB,CAClC,SAAiB,EACjB,QAAgB,EAChB,WAA2C,EAC3C,cAAuB;QAIvB,MAAM,cAAc,GAAG,cAAc,CAAC,CAAC,CAAC,IAAI,cAAc,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC;QACnE,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,mBAAmB,WAAW,GAAG,cAAc,aAAa,CAAC,CAAC;QAE5E,MAAM,KAAK,GAAG,IAAI,KAAK,EAAE,CAAC;QAE1B,MAAM,QAAQ,GAAG,MAAM,sBAAsB,CAAC,IAAI,CAAC,YAAY,EAAE,SAAS,EAAE,WAAW,EAAE,QAAQ,EAAE,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC,CAAC;QAEnH,IAAI,QAAQ,CAAC,MAAM,KAAK,SAAS,CAAC,OAAO,EAAE,CAAC;YAC1C,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC,gCAAgC,WAAW,GAAG,cAAc,KAAK,QAAQ,CAAC,MAAM,EAAE,CAAC,CAAC;YACnG,MAAM,IAAI,KAAK,CAAC,QAAQ,CAAC,MAAM,CAAC,CAAC;QACnC,CAAC;QAED,IAAI,CAAC,GAAG,CAAC,IAAI,CAAC,aAAa,WAAW,GAAG,cAAc,UAAU,IAAI,CAAC,IAAI,CAAC,KAAK,CAAC,EAAE,EAAE,CAAC,KAAK,CAAC,CAAC;QAE7F,IAAI,WAAW,KAAK,KAAK,EAAE,CAAC;YAC1B,MAAM,MAAM,GAAG,MAAM,aAAa,CAAC,SAAS,CAAC,CAAC;YAE9C,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC,2BAA2B,EAAE;gBAC1C,WAAW,EAAE,aAAa;gBAC1B,QAAQ,EAAE,QAAQ,CAAC,UAAU;gBAC7B,SAAS,EAAE,oBAAoB;gBAC/B,SAAS,EAAE,QAAQ,CAAC,MAAM;gBAC1B,UAAU,EAAE,MAAM,CAAC,UAAU,CAAC,MAAM;gBACpC,WAAW,EAAE,MAAM,CAAC,WAAW;gBAC/B,eAAe,EAAE,MAAM,CAAC,eAAe;aACd,CAAC,CAAC;YAE7B,OAAO,EAAE,eAAe,EAAE,MAAM,CAAC,WAAW,EAAE,CAAC;QACjD,CAAC;QAED,MAAM,MAAM,GAAG,MAAM,IAAI,CAAC,oCAAoC,CAAC,SAAS,EAAE,WAAW,CAAC,CAAC;QAEvF,IAAI,CAAC,GAAG,CAAC,KAAK,CAAC,2BAA2B,EAAE;YAC1C,WAAW,EAAE,oCAAoC,CAAC,WAAW,CAAC;YAC9D,QAAQ,EAAE,QAAQ,CAAC,UAAU;YAC7B,SAAS,EAAE,oBAAoB;YAC/B,SAAS,EAAE,QAAQ,CAAC,MAAM;YAC1B,UAAU,EAAE,MAAM,CAAC,UAAU,CAAC,MAAM;YACpC,WAAW,EAAE,MAAM,CAAC,WAAW;YAC/B,eAAe,EAAE,MAAM,CAAC,eAAe;SACd,CAAC,CAAC;QAE7B,OAAO,EAAE,eAAe,EAAE,MAAM,CAAC,WAAW,EAAE,CAAC;IACjD,CAAC;IAED;;;;;OAKG;IACK,KAAK,CAAC,iBAAiB,CAC7B,QAAgB,EAChB,WAA2C,EAC3C,MAA2B;QAE3B,MAAM,CAAC,WAAW,EAAE,WAAW,CAAC,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC;YACnD,EAAE,CAAC,QAAQ,CAAC,GAAG,QAAQ,IAAI,cAAc,EAAE,CAAC;YAC5C,EAAE,CAAC,QAAQ,CAAC,GAAG,QAAQ,IAAI,qBAAqB,EAAE,EAAE,EAAE,QAAQ,EAAE,OAAO,EAAE,CAAC;SAC3E,CAAC,CAAC;QACH,MAAM,IAAI,GAAG,IAAI,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC;QACrC,MAAM,MAAM,GAAG,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,UAAU,CAAC,CAAC;QACvC,MAAM,eAAe,GAAG,MAAM,CAAC,eAAe,CAAC;QAC/C,0BAA0B;QAC1B,yFAAyF;QACzF,yGAAyG;QACzG,MAAM,yBAAyB,GAAG,MAAM,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC;QAChE,IAAI,CAAC,GAAG,CAAC,IAAI,CACX,iBAAiB,WAAW,4BAA4B,MAAM,CAAC,MAAM,4BAA4B,yBAAyB,CAAC,MAAM,wBAAwB,eAAe,mBAAmB,MAAM,CAAC,WAAW,mBAAmB,MAAM,CAAC,WAAW,iBAAiB,WAAW,CAAC,MAAM,EAAE,CACxR,CAAC;QACF,MAAM,KAAK,GAAG,IAAI,cAAc,CAC9B,yBAAyB,EACzB,IAAI,KAAK,CAAC,WAAW,EAAE,MAAM,CAAC,eAAe,CAAC,EAC9C,IAAI,CACL,CAAC;QACF,OAAO,KAAK,CAAC;IACf,CAAC;CACF"}
@@ -1,5 +1,5 @@
1
1
  import { type ProofAndVerificationKey, type PublicInputsAndRecursiveProof, type PublicKernelNonTailRequest, type PublicKernelTailRequest, type ServerCircuitProver } from '@aztec/circuit-types';
2
- import { type AvmCircuitInputs, type BaseOrMergeRollupPublicInputs, type BaseParityInputs, type BaseRollupInputs, type KernelCircuitPublicInputs, type MergeRollupInputs, NESTED_RECURSIVE_PROOF_LENGTH, type PrivateKernelEmptyInputData, Proof, type PublicKernelCircuitPublicInputs, RECURSIVE_PROOF_LENGTH, RecursiveProof, RootParityInput, type RootParityInputs, type RootRollupInputs, type RootRollupPublicInputs, type VerificationKeyAsFields, type VerificationKeyData } from '@aztec/circuits.js';
2
+ import { type AvmCircuitInputs, type BaseOrMergeRollupPublicInputs, type BaseParityInputs, type BaseRollupInputs, type KernelCircuitPublicInputs, type MergeRollupInputs, NESTED_RECURSIVE_PROOF_LENGTH, type PrivateKernelEmptyInputData, Proof, type PublicKernelCircuitPublicInputs, RECURSIVE_PROOF_LENGTH, RecursiveProof, RootParityInput, type RootParityInputs, type RootRollupInputs, type RootRollupPublicInputs, TUBE_PROOF_LENGTH, TubeInputs, type VerificationKeyAsFields, type VerificationKeyData } from '@aztec/circuits.js';
3
3
  import { type ServerProtocolArtifact } from '@aztec/noir-protocol-circuits-types';
4
4
  import { type TelemetryClient } from '@aztec/telemetry-client';
5
5
  import type { ACVMConfig, BBConfig } from '../config.js';
@@ -48,10 +48,10 @@ export declare class BBNativeRollupProver implements ServerCircuitProver {
48
48
  getPublicTailProof(kernelRequest: PublicKernelTailRequest): Promise<PublicInputsAndRecursiveProof<KernelCircuitPublicInputs>>;
49
49
  /**
50
50
  * Simulates the base rollup circuit from its inputs.
51
- * @param input - Inputs to the circuit.
51
+ * @param baseRollupInput - Inputs to the circuit.
52
52
  * @returns The public inputs as outputs of the simulation.
53
53
  */
54
- getBaseRollupProof(input: BaseRollupInputs): Promise<PublicInputsAndRecursiveProof<BaseOrMergeRollupPublicInputs>>;
54
+ getBaseRollupProof(baseRollupInput: BaseRollupInputs): Promise<PublicInputsAndRecursiveProof<BaseOrMergeRollupPublicInputs>>;
55
55
  /**
56
56
  * Simulates the merge rollup circuit from its inputs.
57
57
  * @param input - Inputs to the circuit.
@@ -65,14 +65,21 @@ export declare class BBNativeRollupProver implements ServerCircuitProver {
65
65
  */
66
66
  getRootRollupProof(input: RootRollupInputs): Promise<PublicInputsAndRecursiveProof<RootRollupPublicInputs>>;
67
67
  getEmptyPrivateKernelProof(inputs: PrivateKernelEmptyInputData): Promise<PublicInputsAndRecursiveProof<KernelCircuitPublicInputs>>;
68
+ getEmptyTubeProof(inputs: PrivateKernelEmptyInputData): Promise<PublicInputsAndRecursiveProof<KernelCircuitPublicInputs>>;
68
69
  private getEmptyNestedProof;
70
+ private getEmptyTubeProofFromEmptyNested;
69
71
  private getEmptyPrivateKernelProofFromEmptyNested;
70
72
  private generateProofWithBB;
71
73
  private createProof;
72
74
  private generateAvmProofWithBB;
75
+ private generateTubeProofWithBB;
73
76
  private createAvmProof;
77
+ getTubeProof(input: TubeInputs): Promise<{
78
+ tubeVK: VerificationKeyData;
79
+ tubeProof: RecursiveProof<typeof TUBE_PROOF_LENGTH>;
80
+ }>;
74
81
  /**
75
- * Executes a circuit and returns it's outputs and corresponding proof with embedded aggregation object
82
+ * Executes a circuit and returns its outputs and corresponding proof with embedded aggregation object
76
83
  * @param witnessMap - The input witness
77
84
  * @param circuitType - The type of circuit to be executed
78
85
  * @param proofLength - The length of the proof to be generated. This is a dummy parameter to aid in type checking
@@ -101,7 +108,7 @@ export declare class BBNativeRollupProver implements ServerCircuitProver {
101
108
  * @param proof - The input proof that may need converting
102
109
  * @returns - The valid proof
103
110
  */
104
- ensureValidProof(proof: RecursiveProof<typeof NESTED_RECURSIVE_PROOF_LENGTH>, circuit: ServerProtocolArtifact, vk: VerificationKeyData): Promise<RecursiveProof<109>>;
111
+ ensureValidProof(proof: RecursiveProof<typeof NESTED_RECURSIVE_PROOF_LENGTH>, circuit: ServerProtocolArtifact, vk: VerificationKeyData): Promise<RecursiveProof<393>>;
105
112
  /**
106
113
  * Returns the verification key data for a circuit, will generate and cache it if not cached internally
107
114
  * @param circuitType - The type of circuit for which the verification key is required
@@ -121,5 +128,13 @@ export declare class BBNativeRollupProver implements ServerCircuitProver {
121
128
  * @returns The proof
122
129
  */
123
130
  private readProofAsFields;
131
+ /**
132
+ * Parses and returns a tube proof stored in the specified directory. TODO merge wih above
133
+ * @param filePath - The directory containing the proof data
134
+ * @param circuitType - The type of circuit proven
135
+ * @returns The proof
136
+ * TODO(#7369) This is entirely redundant now with the above method, deduplicate
137
+ */
138
+ private readTubeProofAsFields;
124
139
  }
125
140
  //# sourceMappingURL=bb_prover.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"bb_prover.d.ts","sourceRoot":"","sources":["../../src/prover/bb_prover.ts"],"names":[],"mappings":"AACA,OAAO,EACL,KAAK,uBAAuB,EAC5B,KAAK,6BAA6B,EAClC,KAAK,0BAA0B,EAC/B,KAAK,uBAAuB,EAC5B,KAAK,mBAAmB,EAEzB,MAAM,sBAAsB,CAAC;AAE9B,OAAO,EAEL,KAAK,gBAAgB,EACrB,KAAK,6BAA6B,EAClC,KAAK,gBAAgB,EACrB,KAAK,gBAAgB,EAIrB,KAAK,yBAAyB,EAC9B,KAAK,iBAAiB,EACtB,6BAA6B,EAC7B,KAAK,2BAA2B,EAEhC,KAAK,EACL,KAAK,+BAA+B,EACpC,sBAAsB,EACtB,cAAc,EACd,eAAe,EACf,KAAK,gBAAgB,EACrB,KAAK,gBAAgB,EACrB,KAAK,sBAAsB,EAC3B,KAAK,uBAAuB,EAC5B,KAAK,mBAAmB,EAEzB,MAAM,oBAAoB,CAAC;AAI5B,OAAO,EAGL,KAAK,sBAAsB,EAgB5B,MAAM,qCAAqC,CAAC;AAE7C,OAAO,EAAc,KAAK,eAAe,EAAa,MAAM,yBAAyB,CAAC;AAqBtF,OAAO,KAAK,EAAE,UAAU,EAAE,QAAQ,EAAE,MAAM,cAAc,CAAC;AAazD,MAAM,WAAW,cAAe,SAAQ,QAAQ,EAAE,UAAU;IAE1D,aAAa,CAAC,EAAE,sBAAsB,EAAE,CAAC;CAC1C;AAED;;GAEG;AACH,qBAAa,oBAAqB,YAAW,mBAAmB;IAQlD,OAAO,CAAC,MAAM;IAP1B,OAAO,CAAC,gBAAgB,CAGpB;IAEJ,OAAO,CAAC,eAAe,CAAwB;gBAE3B,MAAM,EAAE,cAAc,EAAE,SAAS,EAAE,eAAe;IAItE,IAAI,MAAM,6CAET;WAEY,GAAG,CAAC,MAAM,EAAE,cAAc,EAAE,SAAS,EAAE,eAAe;IAWnE;;;;OAIG;IAEU,kBAAkB,CAAC,MAAM,EAAE,gBAAgB,GAAG,OAAO,CAAC,eAAe,CAAC,OAAO,sBAAsB,CAAC,CAAC;IAqBlH;;;;OAIG;IAEU,kBAAkB,CAC7B,MAAM,EAAE,gBAAgB,GACvB,OAAO,CAAC,eAAe,CAAC,OAAO,6BAA6B,CAAC,CAAC;IAqBjE;;;;OAIG;IAIU,WAAW,CAAC,MAAM,EAAE,gBAAgB,GAAG,OAAO,CAAC,uBAAuB,CAAC;IAMpF;;;;OAIG;IAMU,oBAAoB,CAC/B,aAAa,EAAE,0BAA0B,GACxC,OAAO,CAAC,6BAA6B,CAAC,+BAA+B,CAAC,CAAC;IAiC1E;;;;OAIG;IACU,kBAAkB,CAC7B,aAAa,EAAE,uBAAuB,GACrC,OAAO,CAAC,6BAA6B,CAAC,yBAAyB,CAAC,CAAC;IAgBpE;;;;OAIG;IACU,kBAAkB,CAC7B,KAAK,EAAE,gBAAgB,GACtB,OAAO,CAAC,6BAA6B,CAAC,6BAA6B,CAAC,CAAC;IAuBxE;;;;OAIG;IACU,mBAAmB,CAC9B,KAAK,EAAE,iBAAiB,GACvB,OAAO,CAAC,6BAA6B,CAAC,6BAA6B,CAAC,CAAC;IAgBxE;;;;OAIG;IACU,kBAAkB,CAC7B,KAAK,EAAE,gBAAgB,GACtB,OAAO,CAAC,6BAA6B,CAAC,sBAAsB,CAAC,CAAC;IAiBpD,0BAA0B,CACrC,MAAM,EAAE,2BAA2B,GAClC,OAAO,CAAC,6BAA6B,CAAC,yBAAyB,CAAC,CAAC;YAYtD,mBAAmB;YAgBnB,yCAAyC;YAiBzC,mBAAmB;YAsEnB,WAAW;YAyCX,sBAAsB;YAatB,cAAc;IAyC5B;;;;;;;;OAQG;YACW,oBAAoB;IAiDlC;;;;OAIG;IACU,WAAW,CAAC,WAAW,EAAE,sBAAsB,EAAE,KAAK,EAAE,KAAK;IAK7D,cAAc,CAAC,KAAK,EAAE,KAAK,EAAE,eAAe,EAAE,mBAAmB;IAIjE,aAAa,CAAC,eAAe,EAAE,mBAAmB,EAAE,KAAK,EAAE,KAAK;YAI/D,qBAAqB;IAkCnC;;;;OAIG;IACU,4BAA4B,CAAC,WAAW,EAAE,sBAAsB,GAAG,OAAO,CAAC,uBAAuB,CAAC;IAKhH;;;;OAIG;IACU,gBAAgB,CAC3B,KAAK,EAAE,cAAc,CAAC,OAAO,6BAA6B,CAAC,EAC3D,OAAO,EAAE,sBAAsB,EAC/B,EAAE,EAAE,mBAAmB;IAmDzB;;;;OAIG;YACW,gCAAgC;IAsB9C;;;;OAIG;YACW,+BAA+B;IAY7C;;;;;OAKG;YACW,iBAAiB;CAmChC"}
1
+ {"version":3,"file":"bb_prover.d.ts","sourceRoot":"","sources":["../../src/prover/bb_prover.ts"],"names":[],"mappings":"AACA,OAAO,EACL,KAAK,uBAAuB,EAC5B,KAAK,6BAA6B,EAClC,KAAK,0BAA0B,EAC/B,KAAK,uBAAuB,EAC5B,KAAK,mBAAmB,EAEzB,MAAM,sBAAsB,CAAC;AAE9B,OAAO,EACL,KAAK,gBAAgB,EACrB,KAAK,6BAA6B,EAClC,KAAK,gBAAgB,EACrB,KAAK,gBAAgB,EAIrB,KAAK,yBAAyB,EAC9B,KAAK,iBAAiB,EACtB,6BAA6B,EAC7B,KAAK,2BAA2B,EAEhC,KAAK,EACL,KAAK,+BAA+B,EACpC,sBAAsB,EACtB,cAAc,EACd,eAAe,EACf,KAAK,gBAAgB,EACrB,KAAK,gBAAgB,EACrB,KAAK,sBAAsB,EAC3B,iBAAiB,EACjB,UAAU,EACV,KAAK,uBAAuB,EAC5B,KAAK,mBAAmB,EAEzB,MAAM,oBAAoB,CAAC;AAI5B,OAAO,EAGL,KAAK,sBAAsB,EAgB5B,MAAM,qCAAqC,CAAC;AAE7C,OAAO,EAAc,KAAK,eAAe,EAAa,MAAM,yBAAyB,CAAC;AAuBtF,OAAO,KAAK,EAAE,UAAU,EAAE,QAAQ,EAAE,MAAM,cAAc,CAAC;AAazD,MAAM,WAAW,cAAe,SAAQ,QAAQ,EAAE,UAAU;IAE1D,aAAa,CAAC,EAAE,sBAAsB,EAAE,CAAC;CAC1C;AAED;;GAEG;AACH,qBAAa,oBAAqB,YAAW,mBAAmB;IAQlD,OAAO,CAAC,MAAM;IAP1B,OAAO,CAAC,gBAAgB,CAGpB;IAEJ,OAAO,CAAC,eAAe,CAAwB;gBAE3B,MAAM,EAAE,cAAc,EAAE,SAAS,EAAE,eAAe;IAItE,IAAI,MAAM,6CAET;WAEY,GAAG,CAAC,MAAM,EAAE,cAAc,EAAE,SAAS,EAAE,eAAe;IAWnE;;;;OAIG;IAEU,kBAAkB,CAAC,MAAM,EAAE,gBAAgB,GAAG,OAAO,CAAC,eAAe,CAAC,OAAO,sBAAsB,CAAC,CAAC;IAqBlH;;;;OAIG;IAEU,kBAAkB,CAC7B,MAAM,EAAE,gBAAgB,GACvB,OAAO,CAAC,eAAe,CAAC,OAAO,6BAA6B,CAAC,CAAC;IAqBjE;;;;OAIG;IAIU,WAAW,CAAC,MAAM,EAAE,gBAAgB,GAAG,OAAO,CAAC,uBAAuB,CAAC;IAMpF;;;;OAIG;IAMU,oBAAoB,CAC/B,aAAa,EAAE,0BAA0B,GACxC,OAAO,CAAC,6BAA6B,CAAC,+BAA+B,CAAC,CAAC;IA2C1E;;;;OAIG;IACU,kBAAkB,CAC7B,aAAa,EAAE,uBAAuB,GACrC,OAAO,CAAC,6BAA6B,CAAC,yBAAyB,CAAC,CAAC;IAgBpE;;;;OAIG;IACU,kBAAkB,CAC7B,eAAe,EAAE,gBAAgB,GAChC,OAAO,CAAC,6BAA6B,CAAC,6BAA6B,CAAC,CAAC;IA2BxE;;;;OAIG;IACU,mBAAmB,CAC9B,KAAK,EAAE,iBAAiB,GACvB,OAAO,CAAC,6BAA6B,CAAC,6BAA6B,CAAC,CAAC;IAgBxE;;;;OAIG;IACU,kBAAkB,CAC7B,KAAK,EAAE,gBAAgB,GACtB,OAAO,CAAC,6BAA6B,CAAC,sBAAsB,CAAC,CAAC;IAiBpD,0BAA0B,CACrC,MAAM,EAAE,2BAA2B,GAClC,OAAO,CAAC,6BAA6B,CAAC,yBAAyB,CAAC,CAAC;IAYvD,iBAAiB,CAC5B,MAAM,EAAE,2BAA2B,GAClC,OAAO,CAAC,6BAA6B,CAAC,yBAAyB,CAAC,CAAC;YAYtD,mBAAmB;YAoBnB,gCAAgC;YAiBhC,yCAAyC;YAiBzC,mBAAmB;YAsEnB,WAAW;YAyCX,sBAAsB;YAatB,uBAAuB;YAgBvB,cAAc;IAyCf,YAAY,CACvB,KAAK,EAAE,UAAU,GAChB,OAAO,CAAC;QAAE,MAAM,EAAE,mBAAmB,CAAC;QAAC,SAAS,EAAE,cAAc,CAAC,OAAO,iBAAiB,CAAC,CAAA;KAAE,CAAC;IAwBhG;;;;;;;;OAQG;YACW,oBAAoB;IAkDlC;;;;OAIG;IACU,WAAW,CAAC,WAAW,EAAE,sBAAsB,EAAE,KAAK,EAAE,KAAK;IAM7D,cAAc,CAAC,KAAK,EAAE,KAAK,EAAE,eAAe,EAAE,mBAAmB;IAIjE,aAAa,CAAC,eAAe,EAAE,mBAAmB,EAAE,KAAK,EAAE,KAAK;YAI/D,qBAAqB;IAkCnC;;;;OAIG;IACU,4BAA4B,CAAC,WAAW,EAAE,sBAAsB,GAAG,OAAO,CAAC,uBAAuB,CAAC;IAKhH;;;;OAIG;IACU,gBAAgB,CAC3B,KAAK,EAAE,cAAc,CAAC,OAAO,6BAA6B,CAAC,EAC3D,OAAO,EAAE,sBAAsB,EAC/B,EAAE,EAAE,mBAAmB;IAuDzB;;;;OAIG;YACW,gCAAgC;IAsB9C;;;;OAIG;YACW,+BAA+B;IAY7C;;;;;OAKG;YACW,iBAAiB;IA4C/B;;;;;;OAMG;YACW,qBAAqB;CAkCpC"}