@aztec/bb-prover 0.76.4 → 0.77.0-testnet-ignition.21

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (82) hide show
  1. package/dest/avm_proving_tests/avm_proving_tester.d.ts +8 -8
  2. package/dest/avm_proving_tests/avm_proving_tester.d.ts.map +1 -1
  3. package/dest/avm_proving_tests/avm_proving_tester.js +24 -25
  4. package/dest/bb/cli.d.ts +3 -3
  5. package/dest/bb/cli.d.ts.map +1 -1
  6. package/dest/bb/cli.js +4 -9
  7. package/dest/bb/execute.d.ts +7 -37
  8. package/dest/bb/execute.d.ts.map +1 -1
  9. package/dest/bb/execute.js +359 -357
  10. package/dest/bb/index.js +4 -6
  11. package/dest/config.js +1 -2
  12. package/dest/honk.d.ts +1 -1
  13. package/dest/honk.d.ts.map +1 -1
  14. package/dest/honk.js +8 -5
  15. package/dest/index.d.ts +1 -1
  16. package/dest/index.d.ts.map +1 -1
  17. package/dest/index.js +0 -1
  18. package/dest/instrumentation.d.ts +2 -2
  19. package/dest/instrumentation.d.ts.map +1 -1
  20. package/dest/instrumentation.js +50 -47
  21. package/dest/prover/bb_native_private_kernel_prover.d.ts +4 -4
  22. package/dest/prover/bb_native_private_kernel_prover.d.ts.map +1 -1
  23. package/dest/prover/bb_native_private_kernel_prover.js +19 -19
  24. package/dest/prover/bb_private_kernel_prover.d.ts +7 -6
  25. package/dest/prover/bb_private_kernel_prover.d.ts.map +1 -1
  26. package/dest/prover/bb_private_kernel_prover.js +14 -15
  27. package/dest/prover/bb_prover.d.ts +7 -10
  28. package/dest/prover/bb_prover.d.ts.map +1 -1
  29. package/dest/prover/bb_prover.js +402 -447
  30. package/dest/prover/client_ivc_proof_utils.d.ts +3 -3
  31. package/dest/prover/client_ivc_proof_utils.d.ts.map +1 -1
  32. package/dest/prover/client_ivc_proof_utils.js +18 -12
  33. package/dest/prover/index.js +0 -1
  34. package/dest/stats.d.ts +2 -2
  35. package/dest/stats.d.ts.map +1 -1
  36. package/dest/stats.js +15 -14
  37. package/dest/test/delay_values.d.ts +4 -0
  38. package/dest/test/delay_values.d.ts.map +1 -0
  39. package/dest/test/delay_values.js +29 -0
  40. package/dest/test/index.js +0 -1
  41. package/dest/test/test_circuit_prover.d.ts +16 -7
  42. package/dest/test/test_circuit_prover.d.ts.map +1 -1
  43. package/dest/test/test_circuit_prover.js +165 -161
  44. package/dest/test/test_verifier.d.ts +2 -1
  45. package/dest/test/test_verifier.d.ts.map +1 -1
  46. package/dest/test/test_verifier.js +0 -1
  47. package/dest/verification_key/verification_key_data.d.ts +1 -1
  48. package/dest/verification_key/verification_key_data.d.ts.map +1 -1
  49. package/dest/verification_key/verification_key_data.js +13 -9
  50. package/dest/verifier/bb_verifier.d.ts +6 -4
  51. package/dest/verifier/bb_verifier.d.ts.map +1 -1
  52. package/dest/verifier/bb_verifier.js +18 -18
  53. package/dest/verifier/index.js +0 -1
  54. package/dest/wasm/bb_wasm_private_kernel_prover.d.ts +5 -4
  55. package/dest/wasm/bb_wasm_private_kernel_prover.d.ts.map +1 -1
  56. package/dest/wasm/bb_wasm_private_kernel_prover.js +26 -11
  57. package/dest/wasm/bundle.d.ts +1 -1
  58. package/dest/wasm/bundle.d.ts.map +1 -1
  59. package/dest/wasm/bundle.js +1 -2
  60. package/dest/wasm/lazy.d.ts +1 -1
  61. package/dest/wasm/lazy.d.ts.map +1 -1
  62. package/dest/wasm/lazy.js +1 -2
  63. package/package.json +18 -19
  64. package/src/avm_proving_tests/avm_proving_tester.ts +17 -33
  65. package/src/bb/cli.ts +3 -3
  66. package/src/bb/execute.ts +80 -211
  67. package/src/honk.ts +1 -1
  68. package/src/index.ts +1 -1
  69. package/src/instrumentation.ts +10 -10
  70. package/src/prover/bb_native_private_kernel_prover.ts +5 -4
  71. package/src/prover/bb_private_kernel_prover.ts +20 -20
  72. package/src/prover/bb_prover.ts +33 -100
  73. package/src/prover/client_ivc_proof_utils.ts +3 -3
  74. package/src/stats.ts +2 -2
  75. package/src/test/delay_values.ts +31 -0
  76. package/src/test/test_circuit_prover.ts +149 -120
  77. package/src/test/test_verifier.ts +2 -1
  78. package/src/verification_key/verification_key_data.ts +4 -7
  79. package/src/verifier/bb_verifier.ts +16 -9
  80. package/src/wasm/bb_wasm_private_kernel_prover.ts +18 -5
  81. package/src/wasm/bundle.ts +1 -1
  82. package/src/wasm/lazy.ts +1 -1
@@ -1,20 +1,27 @@
1
- import { __esDecorate, __runInitializers } from "tslib";
2
- /* eslint-disable require-await */
3
- import { ProvingError, makeProofAndVerificationKey, makePublicInputsAndRecursiveProof, } from '@aztec/circuit-types';
4
- import { AGGREGATION_OBJECT_LENGTH, AVM_PROOF_LENGTH_IN_FIELDS, Fr, IPA_CLAIM_LENGTH, NESTED_RECURSIVE_PROOF_LENGTH, NESTED_RECURSIVE_ROLLUP_HONK_PROOF_LENGTH, Proof, RECURSIVE_PROOF_LENGTH, RecursiveProof, TUBE_PROOF_LENGTH, makeRecursiveProofFromBinary, } from '@aztec/circuits.js';
1
+ /* eslint-disable require-await */ function _ts_decorate(decorators, target, key, desc) {
2
+ var c = arguments.length, r = c < 3 ? target : desc === null ? desc = Object.getOwnPropertyDescriptor(target, key) : desc, d;
3
+ if (typeof Reflect === "object" && typeof Reflect.decorate === "function") r = Reflect.decorate(decorators, target, key, desc);
4
+ else for(var i = decorators.length - 1; i >= 0; i--)if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
5
+ return c > 3 && r && Object.defineProperty(target, key, r), r;
6
+ }
7
+ import { AGGREGATION_OBJECT_LENGTH, AVM_PROOF_LENGTH_IN_FIELDS, IPA_CLAIM_LENGTH, NESTED_RECURSIVE_PROOF_LENGTH, NESTED_RECURSIVE_ROLLUP_HONK_PROOF_LENGTH, RECURSIVE_PROOF_LENGTH, TUBE_PROOF_LENGTH } from '@aztec/constants';
8
+ import { Fr } from '@aztec/foundation/fields';
5
9
  import { runInDirectory } from '@aztec/foundation/fs';
6
10
  import { createLogger } from '@aztec/foundation/log';
7
11
  import { BufferReader } from '@aztec/foundation/serialize';
8
12
  import { Timer } from '@aztec/foundation/timer';
9
- import { ServerCircuitArtifacts, convertBaseParityInputsToWitnessMap, convertBaseParityOutputsFromWitnessMap, convertBlockMergeRollupInputsToWitnessMap, convertBlockMergeRollupOutputsFromWitnessMap, convertBlockRootRollupInputsToWitnessMap, convertBlockRootRollupOutputsFromWitnessMap, convertEmptyBlockRootRollupInputsToWitnessMap, convertEmptyBlockRootRollupOutputsFromWitnessMap, convertMergeRollupInputsToWitnessMap, convertMergeRollupOutputsFromWitnessMap, convertPrivateBaseRollupInputsToWitnessMap, convertPrivateBaseRollupOutputsFromWitnessMap, convertPublicBaseRollupInputsToWitnessMap, convertPublicBaseRollupOutputsFromWitnessMap, convertRootParityInputsToWitnessMap, convertRootParityOutputsFromWitnessMap, convertRootRollupInputsToWitnessMap, convertRootRollupOutputsFromWitnessMap, convertSingleTxBlockRootRollupInputsToWitnessMap, convertSingleTxBlockRootRollupOutputsFromWitnessMap, } from '@aztec/noir-protocol-circuits-types/server';
10
- import { ServerCircuitVks } from '@aztec/noir-protocol-circuits-types/vks';
13
+ import { ServerCircuitArtifacts, convertBaseParityInputsToWitnessMap, convertBaseParityOutputsFromWitnessMap, convertBlockMergeRollupInputsToWitnessMap, convertBlockMergeRollupOutputsFromWitnessMap, convertBlockRootRollupInputsToWitnessMap, convertBlockRootRollupOutputsFromWitnessMap, convertEmptyBlockRootRollupInputsToWitnessMap, convertEmptyBlockRootRollupOutputsFromWitnessMap, convertMergeRollupInputsToWitnessMap, convertMergeRollupOutputsFromWitnessMap, convertPrivateBaseRollupInputsToWitnessMap, convertPrivateBaseRollupOutputsFromWitnessMap, convertPublicBaseRollupInputsToWitnessMap, convertPublicBaseRollupOutputsFromWitnessMap, convertRootParityInputsToWitnessMap, convertRootParityOutputsFromWitnessMap, convertRootRollupInputsToWitnessMap, convertRootRollupOutputsFromWitnessMap, convertSingleTxBlockRootRollupInputsToWitnessMap, convertSingleTxBlockRootRollupOutputsFromWitnessMap } from '@aztec/noir-protocol-circuits-types/server';
14
+ import { ServerCircuitVks } from '@aztec/noir-protocol-circuits-types/server/vks';
11
15
  import { NativeACVMSimulator } from '@aztec/simulator/server';
16
+ import { ProvingError } from '@aztec/stdlib/errors';
17
+ import { makeProofAndVerificationKey, makePublicInputsAndRecursiveProof } from '@aztec/stdlib/interfaces/server';
18
+ import { Proof, RecursiveProof, makeRecursiveProofFromBinary } from '@aztec/stdlib/proofs';
12
19
  import { Attributes, getTelemetryClient, trackSpan } from '@aztec/telemetry-client';
13
20
  import { assert } from 'console';
14
21
  import crypto from 'crypto';
15
22
  import { promises as fs } from 'fs';
16
23
  import * as path from 'path';
17
- import { BB_RESULT, PROOF_FIELDS_FILENAME, PROOF_FILENAME, VK_FILENAME, generateAvmProof, generateProof, generateTubeProof, verifyAvmProof, verifyProof, writeProofAsFields, } from '../bb/execute.js';
24
+ import { BB_RESULT, PROOF_FIELDS_FILENAME, PROOF_FILENAME, VK_FILENAME, generateAvmProof, generateProof, generateTubeProof, verifyAvmProof, verifyProof } from '../bb/execute.js';
18
25
  import { getUltraHonkFlavorForCircuit } from '../honk.js';
19
26
  import { ProverInstrumentation } from '../instrumentation.js';
20
27
  import { mapProtocolArtifactNameToCircuitName } from '../stats.js';
@@ -25,444 +32,392 @@ const logger = createLogger('bb-prover');
25
32
  const SERVER_CIRCUIT_RECURSIVE = true;
26
33
  /**
27
34
  * Prover implementation that uses barretenberg native proving
28
- */
29
- let BBNativeRollupProver = (() => {
30
- var _a;
31
- let _instanceExtraInitializers = [];
32
- let _getBaseParityProof_decorators;
33
- let _getRootParityProof_decorators;
34
- let _getAvmProof_decorators;
35
- return _a = class BBNativeRollupProver {
36
- constructor(config, telemetry) {
37
- this.config = (__runInitializers(this, _instanceExtraInitializers), config);
38
- this.instrumentation = new ProverInstrumentation(telemetry, 'BBNativeRollupProver');
35
+ */ export class BBNativeRollupProver {
36
+ config;
37
+ instrumentation;
38
+ constructor(config, telemetry){
39
+ this.config = config;
40
+ this.instrumentation = new ProverInstrumentation(telemetry, 'BBNativeRollupProver');
41
+ }
42
+ get tracer() {
43
+ return this.instrumentation.tracer;
44
+ }
45
+ static async new(config, telemetry = getTelemetryClient()) {
46
+ await fs.access(config.acvmBinaryPath, fs.constants.R_OK);
47
+ await fs.mkdir(config.acvmWorkingDirectory, {
48
+ recursive: true
49
+ });
50
+ await fs.access(config.bbBinaryPath, fs.constants.R_OK);
51
+ await fs.mkdir(config.bbWorkingDirectory, {
52
+ recursive: true
53
+ });
54
+ logger.info(`Using native BB at ${config.bbBinaryPath} and working directory ${config.bbWorkingDirectory}`);
55
+ logger.info(`Using native ACVM at ${config.acvmBinaryPath} and working directory ${config.acvmWorkingDirectory}`);
56
+ return new BBNativeRollupProver(config, telemetry);
57
+ }
58
+ /**
59
+ * Simulates the base parity circuit from its inputs.
60
+ * @param inputs - Inputs to the circuit.
61
+ * @returns The public inputs of the parity circuit.
62
+ */ async getBaseParityProof(inputs) {
63
+ const { circuitOutput, proof } = await this.createRecursiveProof(inputs, 'BaseParityArtifact', RECURSIVE_PROOF_LENGTH, convertBaseParityInputsToWitnessMap, convertBaseParityOutputsFromWitnessMap);
64
+ const verificationKey = this.getVerificationKeyDataForCircuit('BaseParityArtifact');
65
+ await this.verifyProof('BaseParityArtifact', proof.binaryProof);
66
+ return makePublicInputsAndRecursiveProof(circuitOutput, proof, verificationKey);
67
+ }
68
+ /**
69
+ * Simulates the root parity circuit from its inputs.
70
+ * @param inputs - Inputs to the circuit.
71
+ * @returns The public inputs of the parity circuit.
72
+ */ async getRootParityProof(inputs) {
73
+ const { circuitOutput, proof } = await this.createRecursiveProof(inputs, 'RootParityArtifact', NESTED_RECURSIVE_PROOF_LENGTH, convertRootParityInputsToWitnessMap, convertRootParityOutputsFromWitnessMap);
74
+ const verificationKey = this.getVerificationKeyDataForCircuit('RootParityArtifact');
75
+ await this.verifyProof('RootParityArtifact', proof.binaryProof);
76
+ return makePublicInputsAndRecursiveProof(circuitOutput, proof, verificationKey);
77
+ }
78
+ /**
79
+ * Creates an AVM proof and verifies it.
80
+ * @param inputs - The inputs to the AVM circuit.
81
+ * @returns The proof.
82
+ */ async getAvmProof(inputs) {
83
+ const proofAndVk = await this.createAvmProof(inputs);
84
+ await this.verifyAvmProof(proofAndVk.proof.binaryProof, proofAndVk.verificationKey);
85
+ return proofAndVk;
86
+ }
87
+ /**
88
+ * Simulates the base rollup circuit from its inputs.
89
+ * @param inputs - Inputs to the circuit.
90
+ * @returns The public inputs as outputs of the simulation.
91
+ */ async getPrivateBaseRollupProof(inputs) {
92
+ const artifactName = 'PrivateBaseRollupArtifact';
93
+ const { circuitOutput, proof } = await this.createRecursiveProof(inputs, artifactName, NESTED_RECURSIVE_ROLLUP_HONK_PROOF_LENGTH, convertPrivateBaseRollupInputsToWitnessMap, convertPrivateBaseRollupOutputsFromWitnessMap);
94
+ const verificationKey = this.getVerificationKeyDataForCircuit(artifactName);
95
+ await this.verifyProof(artifactName, proof.binaryProof);
96
+ return makePublicInputsAndRecursiveProof(circuitOutput, proof, verificationKey);
97
+ }
98
+ /**
99
+ * Requests that the public kernel tail circuit be executed and the proof generated
100
+ * @param kernelRequest - The object encapsulating the request for a proof
101
+ * @returns The requested circuit's public inputs and proof
102
+ */ async getPublicBaseRollupProof(inputs) {
103
+ const artifactName = 'PublicBaseRollupArtifact';
104
+ const { circuitOutput, proof } = await this.createRecursiveProof(inputs, artifactName, NESTED_RECURSIVE_ROLLUP_HONK_PROOF_LENGTH, convertPublicBaseRollupInputsToWitnessMap, convertPublicBaseRollupOutputsFromWitnessMap);
105
+ const verificationKey = this.getVerificationKeyDataForCircuit(artifactName);
106
+ await this.verifyProof(artifactName, proof.binaryProof);
107
+ return makePublicInputsAndRecursiveProof(circuitOutput, proof, verificationKey);
108
+ }
109
+ /**
110
+ * Simulates the merge rollup circuit from its inputs.
111
+ * @param input - Inputs to the circuit.
112
+ * @returns The public inputs as outputs of the simulation.
113
+ */ async getMergeRollupProof(input) {
114
+ const { circuitOutput, proof } = await this.createRecursiveProof(input, 'MergeRollupArtifact', NESTED_RECURSIVE_ROLLUP_HONK_PROOF_LENGTH, convertMergeRollupInputsToWitnessMap, convertMergeRollupOutputsFromWitnessMap);
115
+ const verificationKey = this.getVerificationKeyDataForCircuit('MergeRollupArtifact');
116
+ await this.verifyProof('MergeRollupArtifact', proof.binaryProof);
117
+ return makePublicInputsAndRecursiveProof(circuitOutput, proof, verificationKey);
118
+ }
119
+ /**
120
+ * Simulates the block root rollup circuit from its inputs.
121
+ * @param input - Inputs to the circuit.
122
+ * @returns The public inputs as outputs of the simulation.
123
+ */ async getBlockRootRollupProof(input) {
124
+ const { circuitOutput, proof } = await this.createRecursiveProof(input, 'BlockRootRollupArtifact', NESTED_RECURSIVE_ROLLUP_HONK_PROOF_LENGTH, convertBlockRootRollupInputsToWitnessMap, convertBlockRootRollupOutputsFromWitnessMap);
125
+ const verificationKey = this.getVerificationKeyDataForCircuit('BlockRootRollupArtifact');
126
+ await this.verifyProof('BlockRootRollupArtifact', proof.binaryProof);
127
+ return makePublicInputsAndRecursiveProof(circuitOutput, proof, verificationKey);
128
+ }
129
+ async getSingleTxBlockRootRollupProof(input) {
130
+ const { circuitOutput, proof } = await this.createRecursiveProof(input, 'SingleTxBlockRootRollupArtifact', NESTED_RECURSIVE_ROLLUP_HONK_PROOF_LENGTH, convertSingleTxBlockRootRollupInputsToWitnessMap, convertSingleTxBlockRootRollupOutputsFromWitnessMap);
131
+ const verificationKey = this.getVerificationKeyDataForCircuit('SingleTxBlockRootRollupArtifact');
132
+ await this.verifyProof('SingleTxBlockRootRollupArtifact', proof.binaryProof);
133
+ return makePublicInputsAndRecursiveProof(circuitOutput, proof, verificationKey);
134
+ }
135
+ /**
136
+ * Simulates the empty block root rollup circuit from its inputs.
137
+ * @param input - Inputs to the circuit.
138
+ * @returns The public inputs as outputs of the simulation.
139
+ */ async getEmptyBlockRootRollupProof(input) {
140
+ const { circuitOutput, proof } = await this.createRecursiveProof(input, 'EmptyBlockRootRollupArtifact', NESTED_RECURSIVE_ROLLUP_HONK_PROOF_LENGTH, convertEmptyBlockRootRollupInputsToWitnessMap, convertEmptyBlockRootRollupOutputsFromWitnessMap);
141
+ const verificationKey = this.getVerificationKeyDataForCircuit('EmptyBlockRootRollupArtifact');
142
+ await this.verifyProof('EmptyBlockRootRollupArtifact', proof.binaryProof);
143
+ return makePublicInputsAndRecursiveProof(circuitOutput, proof, verificationKey);
144
+ }
145
+ /**
146
+ * Simulates the block merge rollup circuit from its inputs.
147
+ * @param input - Inputs to the circuit.
148
+ * @returns The public inputs as outputs of the simulation.
149
+ */ async getBlockMergeRollupProof(input) {
150
+ const { circuitOutput, proof } = await this.createRecursiveProof(input, 'BlockMergeRollupArtifact', NESTED_RECURSIVE_ROLLUP_HONK_PROOF_LENGTH, convertBlockMergeRollupInputsToWitnessMap, convertBlockMergeRollupOutputsFromWitnessMap);
151
+ const verificationKey = this.getVerificationKeyDataForCircuit('BlockMergeRollupArtifact');
152
+ await this.verifyProof('BlockMergeRollupArtifact', proof.binaryProof);
153
+ return makePublicInputsAndRecursiveProof(circuitOutput, proof, verificationKey);
154
+ }
155
+ /**
156
+ * Simulates the root rollup circuit from its inputs.
157
+ * @param input - Inputs to the circuit.
158
+ * @returns The public inputs as outputs of the simulation.
159
+ */ async getRootRollupProof(input) {
160
+ const { circuitOutput, proof } = await this.createProof(input, 'RootRollupArtifact', convertRootRollupInputsToWitnessMap, convertRootRollupOutputsFromWitnessMap);
161
+ const recursiveProof = makeRecursiveProofFromBinary(proof, NESTED_RECURSIVE_PROOF_LENGTH);
162
+ const verificationKey = this.getVerificationKeyDataForCircuit('RootRollupArtifact');
163
+ await this.verifyProof('RootRollupArtifact', proof);
164
+ return makePublicInputsAndRecursiveProof(circuitOutput, recursiveProof, verificationKey);
165
+ }
166
+ async generateProofWithBB(input, circuitType, convertInput, convertOutput, workingDirectory) {
167
+ // Have the ACVM write the partial witness here
168
+ const outputWitnessFile = path.join(workingDirectory, 'partial-witness.gz');
169
+ // Generate the partial witness using the ACVM
170
+ // A further temp directory will be created beneath ours and then cleaned up after the partial witness has been copied to our specified location
171
+ const simulator = new NativeACVMSimulator(this.config.acvmWorkingDirectory, this.config.acvmBinaryPath, outputWitnessFile);
172
+ const artifact = ServerCircuitArtifacts[circuitType];
173
+ logger.debug(`Generating witness data for ${circuitType}`);
174
+ const inputWitness = convertInput(input);
175
+ const timer = new Timer();
176
+ const outputWitness = await simulator.executeProtocolCircuit(inputWitness, artifact);
177
+ const output = convertOutput(outputWitness);
178
+ const circuitName = mapProtocolArtifactNameToCircuitName(circuitType);
179
+ this.instrumentation.recordDuration('witGenDuration', circuitName, timer);
180
+ this.instrumentation.recordSize('witGenInputSize', circuitName, input.toBuffer().length);
181
+ this.instrumentation.recordSize('witGenOutputSize', circuitName, output.toBuffer().length);
182
+ logger.info(`Generated witness`, {
183
+ circuitName,
184
+ duration: timer.ms(),
185
+ inputSize: input.toBuffer().length,
186
+ outputSize: output.toBuffer().length,
187
+ eventName: 'circuit-witness-generation'
188
+ });
189
+ // Now prove the circuit from the generated witness
190
+ logger.debug(`Proving ${circuitType}...`);
191
+ const provingResult = await generateProof(this.config.bbBinaryPath, workingDirectory, circuitType, Buffer.from(artifact.bytecode, 'base64'), SERVER_CIRCUIT_RECURSIVE, outputWitnessFile, getUltraHonkFlavorForCircuit(circuitType), logger.debug);
192
+ if (provingResult.status === BB_RESULT.FAILURE) {
193
+ logger.error(`Failed to generate proof for ${circuitType}: ${provingResult.reason}`);
194
+ throw new ProvingError(provingResult.reason, provingResult, provingResult.retry);
195
+ }
196
+ return {
197
+ circuitOutput: output,
198
+ provingResult
199
+ };
200
+ }
201
+ async createProof(input, circuitType, convertInput, convertOutput) {
202
+ const operation = async (bbWorkingDirectory)=>{
203
+ const { provingResult, circuitOutput: output } = await this.generateProofWithBB(input, circuitType, convertInput, convertOutput, bbWorkingDirectory);
204
+ // Read the binary proof
205
+ const rawProof = await fs.readFile(`${provingResult.proofPath}/${PROOF_FILENAME}`);
206
+ const vkData = this.getVerificationKeyDataForCircuit(circuitType);
207
+ const proof = new Proof(rawProof, vkData.numPublicInputs);
208
+ const circuitName = mapProtocolArtifactNameToCircuitName(circuitType);
209
+ this.instrumentation.recordDuration('provingDuration', circuitName, provingResult.durationMs);
210
+ this.instrumentation.recordSize('proofSize', circuitName, proof.buffer.length);
211
+ this.instrumentation.recordSize('circuitPublicInputCount', circuitName, vkData.numPublicInputs);
212
+ this.instrumentation.recordSize('circuitSize', circuitName, vkData.circuitSize);
213
+ logger.info(`Generated proof for ${circuitType} in ${Math.ceil(provingResult.durationMs)} ms`, {
214
+ circuitName,
215
+ // does not include reading the proof from disk
216
+ duration: provingResult.durationMs,
217
+ proofSize: proof.buffer.length,
218
+ eventName: 'circuit-proving',
219
+ // circuitOutput is the partial witness that became the input to the proof
220
+ inputSize: output.toBuffer().length,
221
+ circuitSize: vkData.circuitSize,
222
+ numPublicInputs: vkData.numPublicInputs
223
+ });
224
+ return {
225
+ circuitOutput: output,
226
+ proof
227
+ };
228
+ };
229
+ return await this.runInDirectory(operation);
230
+ }
231
+ async generateAvmProofWithBB(input, workingDirectory) {
232
+ logger.info(`Proving avm-circuit for ${input.functionName}...`);
233
+ const provingResult = await generateAvmProof(this.config.bbBinaryPath, workingDirectory, input, logger);
234
+ if (provingResult.status === BB_RESULT.FAILURE) {
235
+ logger.error(`Failed to generate AVM proof for ${input.functionName}: ${provingResult.reason}`);
236
+ throw new ProvingError(provingResult.reason, provingResult, provingResult.retry);
237
+ }
238
+ return provingResult;
239
+ }
240
+ async generateTubeProofWithBB(bbWorkingDirectory, input) {
241
+ logger.debug(`Proving tube...`);
242
+ const hasher = crypto.createHash('sha256');
243
+ hasher.update(input.toBuffer());
244
+ await writeToOutputDirectory(input.clientIVCData, bbWorkingDirectory);
245
+ const provingResult = await generateTubeProof(this.config.bbBinaryPath, bbWorkingDirectory, logger.verbose);
246
+ if (provingResult.status === BB_RESULT.FAILURE) {
247
+ logger.error(`Failed to generate proof for tube circuit: ${provingResult.reason}`);
248
+ throw new ProvingError(provingResult.reason, provingResult, provingResult.retry);
249
+ }
250
+ return provingResult;
251
+ }
252
+ async createAvmProof(input) {
253
+ const operation = async (bbWorkingDirectory)=>{
254
+ const provingResult = await this.generateAvmProofWithBB(input, bbWorkingDirectory);
255
+ // TODO(https://github.com/AztecProtocol/aztec-packages/issues/6773): this VK data format is wrong.
256
+ // In particular, the number of public inputs, etc will be wrong.
257
+ const verificationKey = await extractAvmVkData(provingResult.vkPath);
258
+ const avmProof = await this.readAvmProofAsFields(provingResult.proofPath, verificationKey);
259
+ const circuitType = 'avm-circuit';
260
+ const appCircuitName = 'unknown';
261
+ this.instrumentation.recordAvmDuration('provingDuration', appCircuitName, provingResult.durationMs);
262
+ this.instrumentation.recordAvmSize('proofSize', appCircuitName, avmProof.binaryProof.buffer.length);
263
+ this.instrumentation.recordAvmSize('circuitPublicInputCount', appCircuitName, verificationKey.numPublicInputs);
264
+ this.instrumentation.recordAvmSize('circuitSize', appCircuitName, verificationKey.circuitSize);
265
+ logger.info(`Generated proof for ${circuitType}(${input.functionName}) in ${Math.ceil(provingResult.durationMs)} ms`, {
266
+ circuitName: circuitType,
267
+ appCircuitName: input.functionName,
268
+ // does not include reading the proof from disk
269
+ duration: provingResult.durationMs,
270
+ proofSize: avmProof.binaryProof.buffer.length,
271
+ eventName: 'circuit-proving',
272
+ inputSize: input.serializeWithMessagePack().length,
273
+ circuitSize: verificationKey.circuitSize,
274
+ numPublicInputs: verificationKey.numPublicInputs
275
+ });
276
+ return makeProofAndVerificationKey(avmProof, verificationKey);
277
+ };
278
+ return await this.runInDirectory(operation);
279
+ }
280
+ async getTubeProof(input) {
281
+ const operation = async (bbWorkingDirectory)=>{
282
+ logger.debug(`createTubeProof: ${bbWorkingDirectory}`);
283
+ const provingResult = await this.generateTubeProofWithBB(bbWorkingDirectory, input);
284
+ // Read the proof as fields
285
+ // TODO(AD): this is the only remaining use of extractVkData.
286
+ const tubeVK = await extractVkData(provingResult.vkPath);
287
+ const tubeProof = await this.readProofAsFields(provingResult.proofPath, tubeVK, TUBE_PROOF_LENGTH);
288
+ this.instrumentation.recordDuration('provingDuration', 'tubeCircuit', provingResult.durationMs);
289
+ this.instrumentation.recordSize('proofSize', 'tubeCircuit', tubeProof.binaryProof.buffer.length);
290
+ this.instrumentation.recordSize('circuitPublicInputCount', 'tubeCircuit', tubeVK.numPublicInputs);
291
+ this.instrumentation.recordSize('circuitSize', 'tubeCircuit', tubeVK.circuitSize);
292
+ // Sanity check the tube proof (can be removed later)
293
+ await this.verifyWithKey('ultra_rollup_honk', tubeVK, tubeProof.binaryProof);
294
+ logger.info(`Generated proof for tubeCircuit in ${Math.ceil(provingResult.durationMs)} ms, size: ${tubeProof.proof.length} fields`);
295
+ return makeProofAndVerificationKey(tubeProof, tubeVK);
296
+ };
297
+ return await this.runInDirectory(operation);
298
+ }
299
+ /**
300
+ * Executes a circuit and returns its outputs and corresponding proof with embedded aggregation object
301
+ * @param witnessMap - The input witness
302
+ * @param circuitType - The type of circuit to be executed
303
+ * @param proofLength - The length of the proof to be generated. This is a dummy parameter to aid in type checking
304
+ * @param convertInput - Function for mapping the input object to a witness map.
305
+ * @param convertOutput - Function for parsing the output witness to it's corresponding object
306
+ * @returns The circuits output object and it's proof
307
+ */ async createRecursiveProof(input, circuitType, proofLength, convertInput, convertOutput) {
308
+ // this probably is gonna need to call client ivc
309
+ const operation = async (bbWorkingDirectory)=>{
310
+ const { provingResult, circuitOutput: output } = await this.generateProofWithBB(input, circuitType, convertInput, convertOutput, bbWorkingDirectory);
311
+ const vkData = this.getVerificationKeyDataForCircuit(circuitType);
312
+ // Read the proof as fields
313
+ const proof = await this.readProofAsFields(provingResult.proofPath, vkData, proofLength);
314
+ const circuitName = mapProtocolArtifactNameToCircuitName(circuitType);
315
+ this.instrumentation.recordDuration('provingDuration', circuitName, provingResult.durationMs);
316
+ this.instrumentation.recordSize('proofSize', circuitName, proof.binaryProof.buffer.length);
317
+ this.instrumentation.recordSize('circuitPublicInputCount', circuitName, vkData.numPublicInputs);
318
+ this.instrumentation.recordSize('circuitSize', circuitName, vkData.circuitSize);
319
+ logger.info(`Generated proof for ${circuitType} in ${Math.ceil(provingResult.durationMs)} ms, size: ${proof.proof.length} fields`, {
320
+ circuitName,
321
+ circuitSize: vkData.circuitSize,
322
+ duration: provingResult.durationMs,
323
+ inputSize: output.toBuffer().length,
324
+ proofSize: proof.binaryProof.buffer.length,
325
+ eventName: 'circuit-proving',
326
+ numPublicInputs: vkData.numPublicInputs
327
+ });
328
+ return {
329
+ circuitOutput: output,
330
+ proof
331
+ };
332
+ };
333
+ return await this.runInDirectory(operation);
334
+ }
335
+ /**
336
+ * Verifies a proof, will generate the verification key if one is not cached internally
337
+ * @param circuitType - The type of circuit whose proof is to be verified
338
+ * @param proof - The proof to be verified
339
+ */ async verifyProof(circuitType, proof) {
340
+ const verificationKey = this.getVerificationKeyDataForCircuit(circuitType);
341
+ return await this.verifyWithKey(getUltraHonkFlavorForCircuit(circuitType), verificationKey, proof);
342
+ }
343
+ async verifyAvmProof(proof, verificationKey) {
344
+ return await this.verifyWithKeyInternal(proof, verificationKey, (proofPath, vkPath)=>verifyAvmProof(this.config.bbBinaryPath, proofPath, vkPath, logger));
345
+ }
346
+ async verifyWithKey(flavor, verificationKey, proof) {
347
+ return await this.verifyWithKeyInternal(proof, verificationKey, (proofPath, vkPath)=>verifyProof(this.config.bbBinaryPath, proofPath, vkPath, flavor, logger));
348
+ }
349
+ async verifyWithKeyInternal(proof, verificationKey, verificationFunction) {
350
+ const operation = async (bbWorkingDirectory)=>{
351
+ const proofFileName = path.join(bbWorkingDirectory, PROOF_FILENAME);
352
+ const verificationKeyPath = path.join(bbWorkingDirectory, VK_FILENAME);
353
+ await fs.writeFile(proofFileName, proof.buffer);
354
+ await fs.writeFile(verificationKeyPath, verificationKey.keyAsBytes);
355
+ const result = await verificationFunction(proofFileName, verificationKeyPath);
356
+ if (result.status === BB_RESULT.FAILURE) {
357
+ const errorMessage = `Failed to verify proof from key!`;
358
+ throw new ProvingError(errorMessage, result, result.retry);
39
359
  }
40
- get tracer() {
41
- return this.instrumentation.tracer;
42
- }
43
- static async new(config, telemetry = getTelemetryClient()) {
44
- await fs.access(config.acvmBinaryPath, fs.constants.R_OK);
45
- await fs.mkdir(config.acvmWorkingDirectory, { recursive: true });
46
- await fs.access(config.bbBinaryPath, fs.constants.R_OK);
47
- await fs.mkdir(config.bbWorkingDirectory, { recursive: true });
48
- logger.info(`Using native BB at ${config.bbBinaryPath} and working directory ${config.bbWorkingDirectory}`);
49
- logger.info(`Using native ACVM at ${config.acvmBinaryPath} and working directory ${config.acvmWorkingDirectory}`);
50
- return new _a(config, telemetry);
51
- }
52
- /**
53
- * Simulates the base parity circuit from its inputs.
54
- * @param inputs - Inputs to the circuit.
55
- * @returns The public inputs of the parity circuit.
56
- */
57
- async getBaseParityProof(inputs) {
58
- const { circuitOutput, proof } = await this.createRecursiveProof(inputs, 'BaseParityArtifact', RECURSIVE_PROOF_LENGTH, convertBaseParityInputsToWitnessMap, convertBaseParityOutputsFromWitnessMap);
59
- const verificationKey = this.getVerificationKeyDataForCircuit('BaseParityArtifact');
60
- await this.verifyProof('BaseParityArtifact', proof.binaryProof);
61
- return makePublicInputsAndRecursiveProof(circuitOutput, proof, verificationKey);
62
- }
63
- /**
64
- * Simulates the root parity circuit from its inputs.
65
- * @param inputs - Inputs to the circuit.
66
- * @returns The public inputs of the parity circuit.
67
- */
68
- async getRootParityProof(inputs) {
69
- const { circuitOutput, proof } = await this.createRecursiveProof(inputs, 'RootParityArtifact', NESTED_RECURSIVE_PROOF_LENGTH, convertRootParityInputsToWitnessMap, convertRootParityOutputsFromWitnessMap);
70
- const verificationKey = this.getVerificationKeyDataForCircuit('RootParityArtifact');
71
- await this.verifyProof('RootParityArtifact', proof.binaryProof);
72
- return makePublicInputsAndRecursiveProof(circuitOutput, proof, verificationKey);
73
- }
74
- /**
75
- * Creates an AVM proof and verifies it.
76
- * @param inputs - The inputs to the AVM circuit.
77
- * @returns The proof.
78
- */
79
- async getAvmProof(inputs) {
80
- const proofAndVk = await this.createAvmProof(inputs);
81
- await this.verifyAvmProof(proofAndVk.proof.binaryProof, proofAndVk.verificationKey);
82
- return proofAndVk;
83
- }
84
- /**
85
- * Simulates the base rollup circuit from its inputs.
86
- * @param inputs - Inputs to the circuit.
87
- * @returns The public inputs as outputs of the simulation.
88
- */
89
- async getPrivateBaseRollupProof(inputs) {
90
- const artifactName = 'PrivateBaseRollupArtifact';
91
- const { circuitOutput, proof } = await this.createRecursiveProof(inputs, artifactName, NESTED_RECURSIVE_ROLLUP_HONK_PROOF_LENGTH, convertPrivateBaseRollupInputsToWitnessMap, convertPrivateBaseRollupOutputsFromWitnessMap);
92
- const verificationKey = this.getVerificationKeyDataForCircuit(artifactName);
93
- await this.verifyProof(artifactName, proof.binaryProof);
94
- return makePublicInputsAndRecursiveProof(circuitOutput, proof, verificationKey);
95
- }
96
- /**
97
- * Requests that the public kernel tail circuit be executed and the proof generated
98
- * @param kernelRequest - The object encapsulating the request for a proof
99
- * @returns The requested circuit's public inputs and proof
100
- */
101
- async getPublicBaseRollupProof(inputs) {
102
- const artifactName = 'PublicBaseRollupArtifact';
103
- const { circuitOutput, proof } = await this.createRecursiveProof(inputs, artifactName, NESTED_RECURSIVE_ROLLUP_HONK_PROOF_LENGTH, convertPublicBaseRollupInputsToWitnessMap, convertPublicBaseRollupOutputsFromWitnessMap);
104
- const verificationKey = this.getVerificationKeyDataForCircuit(artifactName);
105
- await this.verifyProof(artifactName, proof.binaryProof);
106
- return makePublicInputsAndRecursiveProof(circuitOutput, proof, verificationKey);
107
- }
108
- /**
109
- * Simulates the merge rollup circuit from its inputs.
110
- * @param input - Inputs to the circuit.
111
- * @returns The public inputs as outputs of the simulation.
112
- */
113
- async getMergeRollupProof(input) {
114
- const { circuitOutput, proof } = await this.createRecursiveProof(input, 'MergeRollupArtifact', NESTED_RECURSIVE_ROLLUP_HONK_PROOF_LENGTH, convertMergeRollupInputsToWitnessMap, convertMergeRollupOutputsFromWitnessMap);
115
- const verificationKey = this.getVerificationKeyDataForCircuit('MergeRollupArtifact');
116
- await this.verifyProof('MergeRollupArtifact', proof.binaryProof);
117
- return makePublicInputsAndRecursiveProof(circuitOutput, proof, verificationKey);
118
- }
119
- /**
120
- * Simulates the block root rollup circuit from its inputs.
121
- * @param input - Inputs to the circuit.
122
- * @returns The public inputs as outputs of the simulation.
123
- */
124
- async getBlockRootRollupProof(input) {
125
- const { circuitOutput, proof } = await this.createRecursiveProof(input, 'BlockRootRollupArtifact', NESTED_RECURSIVE_ROLLUP_HONK_PROOF_LENGTH, convertBlockRootRollupInputsToWitnessMap, convertBlockRootRollupOutputsFromWitnessMap);
126
- const verificationKey = this.getVerificationKeyDataForCircuit('BlockRootRollupArtifact');
127
- await this.verifyProof('BlockRootRollupArtifact', proof.binaryProof);
128
- return makePublicInputsAndRecursiveProof(circuitOutput, proof, verificationKey);
129
- }
130
- async getSingleTxBlockRootRollupProof(input) {
131
- const { circuitOutput, proof } = await this.createRecursiveProof(input, 'SingleTxBlockRootRollupArtifact', NESTED_RECURSIVE_ROLLUP_HONK_PROOF_LENGTH, convertSingleTxBlockRootRollupInputsToWitnessMap, convertSingleTxBlockRootRollupOutputsFromWitnessMap);
132
- const verificationKey = this.getVerificationKeyDataForCircuit('SingleTxBlockRootRollupArtifact');
133
- await this.verifyProof('SingleTxBlockRootRollupArtifact', proof.binaryProof);
134
- return makePublicInputsAndRecursiveProof(circuitOutput, proof, verificationKey);
135
- }
136
- /**
137
- * Simulates the empty block root rollup circuit from its inputs.
138
- * @param input - Inputs to the circuit.
139
- * @returns The public inputs as outputs of the simulation.
140
- */
141
- async getEmptyBlockRootRollupProof(input) {
142
- const { circuitOutput, proof } = await this.createRecursiveProof(input, 'EmptyBlockRootRollupArtifact', NESTED_RECURSIVE_ROLLUP_HONK_PROOF_LENGTH, convertEmptyBlockRootRollupInputsToWitnessMap, convertEmptyBlockRootRollupOutputsFromWitnessMap);
143
- const verificationKey = this.getVerificationKeyDataForCircuit('EmptyBlockRootRollupArtifact');
144
- await this.verifyProof('EmptyBlockRootRollupArtifact', proof.binaryProof);
145
- return makePublicInputsAndRecursiveProof(circuitOutput, proof, verificationKey);
146
- }
147
- /**
148
- * Simulates the block merge rollup circuit from its inputs.
149
- * @param input - Inputs to the circuit.
150
- * @returns The public inputs as outputs of the simulation.
151
- */
152
- async getBlockMergeRollupProof(input) {
153
- const { circuitOutput, proof } = await this.createRecursiveProof(input, 'BlockMergeRollupArtifact', NESTED_RECURSIVE_ROLLUP_HONK_PROOF_LENGTH, convertBlockMergeRollupInputsToWitnessMap, convertBlockMergeRollupOutputsFromWitnessMap);
154
- const verificationKey = this.getVerificationKeyDataForCircuit('BlockMergeRollupArtifact');
155
- await this.verifyProof('BlockMergeRollupArtifact', proof.binaryProof);
156
- return makePublicInputsAndRecursiveProof(circuitOutput, proof, verificationKey);
157
- }
158
- /**
159
- * Simulates the root rollup circuit from its inputs.
160
- * @param input - Inputs to the circuit.
161
- * @returns The public inputs as outputs of the simulation.
162
- */
163
- async getRootRollupProof(input) {
164
- const { circuitOutput, proof } = await this.createProof(input, 'RootRollupArtifact', convertRootRollupInputsToWitnessMap, convertRootRollupOutputsFromWitnessMap);
165
- const recursiveProof = makeRecursiveProofFromBinary(proof, NESTED_RECURSIVE_PROOF_LENGTH);
166
- const verificationKey = this.getVerificationKeyDataForCircuit('RootRollupArtifact');
167
- await this.verifyProof('RootRollupArtifact', proof);
168
- return makePublicInputsAndRecursiveProof(circuitOutput, recursiveProof, verificationKey);
169
- }
170
- async generateProofWithBB(input, circuitType, convertInput, convertOutput, workingDirectory) {
171
- // Have the ACVM write the partial witness here
172
- const outputWitnessFile = path.join(workingDirectory, 'partial-witness.gz');
173
- // Generate the partial witness using the ACVM
174
- // A further temp directory will be created beneath ours and then cleaned up after the partial witness has been copied to our specified location
175
- const simulator = new NativeACVMSimulator(this.config.acvmWorkingDirectory, this.config.acvmBinaryPath, outputWitnessFile);
176
- const artifact = ServerCircuitArtifacts[circuitType];
177
- logger.debug(`Generating witness data for ${circuitType}`);
178
- const inputWitness = convertInput(input);
179
- const timer = new Timer();
180
- const outputWitness = await simulator.executeProtocolCircuit(inputWitness, artifact);
181
- const output = convertOutput(outputWitness);
182
- const circuitName = mapProtocolArtifactNameToCircuitName(circuitType);
183
- this.instrumentation.recordDuration('witGenDuration', circuitName, timer);
184
- this.instrumentation.recordSize('witGenInputSize', circuitName, input.toBuffer().length);
185
- this.instrumentation.recordSize('witGenOutputSize', circuitName, output.toBuffer().length);
186
- logger.info(`Generated witness`, {
187
- circuitName,
188
- duration: timer.ms(),
189
- inputSize: input.toBuffer().length,
190
- outputSize: output.toBuffer().length,
191
- eventName: 'circuit-witness-generation',
192
- });
193
- // Now prove the circuit from the generated witness
194
- logger.debug(`Proving ${circuitType}...`);
195
- const provingResult = await generateProof(this.config.bbBinaryPath, workingDirectory, circuitType, Buffer.from(artifact.bytecode, 'base64'), SERVER_CIRCUIT_RECURSIVE, outputWitnessFile, getUltraHonkFlavorForCircuit(circuitType), logger.debug);
196
- if (provingResult.status === BB_RESULT.FAILURE) {
197
- logger.error(`Failed to generate proof for ${circuitType}: ${provingResult.reason}`);
198
- throw new ProvingError(provingResult.reason, provingResult, provingResult.retry);
199
- }
200
- return {
201
- circuitOutput: output,
202
- provingResult,
203
- };
204
- }
205
- async createProof(input, circuitType, convertInput, convertOutput) {
206
- const operation = async (bbWorkingDirectory) => {
207
- const { provingResult, circuitOutput: output } = await this.generateProofWithBB(input, circuitType, convertInput, convertOutput, bbWorkingDirectory);
208
- // Read the binary proof
209
- const rawProof = await fs.readFile(`${provingResult.proofPath}/${PROOF_FILENAME}`);
210
- const vkData = this.getVerificationKeyDataForCircuit(circuitType);
211
- const proof = new Proof(rawProof, vkData.numPublicInputs);
212
- const circuitName = mapProtocolArtifactNameToCircuitName(circuitType);
213
- this.instrumentation.recordDuration('provingDuration', circuitName, provingResult.durationMs);
214
- this.instrumentation.recordSize('proofSize', circuitName, proof.buffer.length);
215
- this.instrumentation.recordSize('circuitPublicInputCount', circuitName, vkData.numPublicInputs);
216
- this.instrumentation.recordSize('circuitSize', circuitName, vkData.circuitSize);
217
- logger.info(`Generated proof for ${circuitType} in ${Math.ceil(provingResult.durationMs)} ms`, {
218
- circuitName,
219
- // does not include reading the proof from disk
220
- duration: provingResult.durationMs,
221
- proofSize: proof.buffer.length,
222
- eventName: 'circuit-proving',
223
- // circuitOutput is the partial witness that became the input to the proof
224
- inputSize: output.toBuffer().length,
225
- circuitSize: vkData.circuitSize,
226
- numPublicInputs: vkData.numPublicInputs,
227
- });
228
- return { circuitOutput: output, proof };
229
- };
230
- return await this.runInDirectory(operation);
231
- }
232
- async generateAvmProofWithBB(input, workingDirectory) {
233
- logger.info(`Proving avm-circuit for ${input.functionName}...`);
234
- const provingResult = await generateAvmProof(this.config.bbBinaryPath, workingDirectory, input, logger);
235
- if (provingResult.status === BB_RESULT.FAILURE) {
236
- logger.error(`Failed to generate AVM proof for ${input.functionName}: ${provingResult.reason}`);
237
- throw new ProvingError(provingResult.reason, provingResult, provingResult.retry);
238
- }
239
- return provingResult;
240
- }
241
- async generateTubeProofWithBB(bbWorkingDirectory, input) {
242
- logger.debug(`Proving tube...`);
243
- const hasher = crypto.createHash('sha256');
244
- hasher.update(input.toBuffer());
245
- await writeToOutputDirectory(input.clientIVCData, bbWorkingDirectory);
246
- const provingResult = await generateTubeProof(this.config.bbBinaryPath, bbWorkingDirectory, logger.verbose);
247
- if (provingResult.status === BB_RESULT.FAILURE) {
248
- logger.error(`Failed to generate proof for tube circuit: ${provingResult.reason}`);
249
- throw new ProvingError(provingResult.reason, provingResult, provingResult.retry);
250
- }
251
- return provingResult;
252
- }
253
- async createAvmProof(input) {
254
- const operation = async (bbWorkingDirectory) => {
255
- const provingResult = await this.generateAvmProofWithBB(input, bbWorkingDirectory);
256
- // TODO(https://github.com/AztecProtocol/aztec-packages/issues/6773): this VK data format is wrong.
257
- // In particular, the number of public inputs, etc will be wrong.
258
- const verificationKey = await extractAvmVkData(provingResult.vkPath);
259
- const avmProof = await this.readAvmProofAsFields(provingResult.proofPath, verificationKey);
260
- const circuitType = 'avm-circuit';
261
- const appCircuitName = 'unknown';
262
- this.instrumentation.recordAvmDuration('provingDuration', appCircuitName, provingResult.durationMs);
263
- this.instrumentation.recordAvmSize('proofSize', appCircuitName, avmProof.binaryProof.buffer.length);
264
- this.instrumentation.recordAvmSize('circuitPublicInputCount', appCircuitName, verificationKey.numPublicInputs);
265
- this.instrumentation.recordAvmSize('circuitSize', appCircuitName, verificationKey.circuitSize);
266
- logger.info(`Generated proof for ${circuitType}(${input.functionName}) in ${Math.ceil(provingResult.durationMs)} ms`, {
267
- circuitName: circuitType,
268
- appCircuitName: input.functionName,
269
- // does not include reading the proof from disk
270
- duration: provingResult.durationMs,
271
- proofSize: avmProof.binaryProof.buffer.length,
272
- eventName: 'circuit-proving',
273
- inputSize: input.toBuffer().length,
274
- circuitSize: verificationKey.circuitSize, // FIX: wrong in VK
275
- numPublicInputs: verificationKey.numPublicInputs, // FIX: wrong in VK
276
- });
277
- return makeProofAndVerificationKey(avmProof, verificationKey);
278
- };
279
- return await this.runInDirectory(operation);
280
- }
281
- async getTubeProof(input) {
282
- const operation = async (bbWorkingDirectory) => {
283
- logger.debug(`createTubeProof: ${bbWorkingDirectory}`);
284
- const provingResult = await this.generateTubeProofWithBB(bbWorkingDirectory, input);
285
- // Read the proof as fields
286
- // TODO(AD): this is the only remaining use of extractVkData.
287
- const tubeVK = await extractVkData(provingResult.vkPath);
288
- const tubeProof = await this.readProofAsFields(provingResult.proofPath, tubeVK, TUBE_PROOF_LENGTH);
289
- this.instrumentation.recordDuration('provingDuration', 'tubeCircuit', provingResult.durationMs);
290
- this.instrumentation.recordSize('proofSize', 'tubeCircuit', tubeProof.binaryProof.buffer.length);
291
- this.instrumentation.recordSize('circuitPublicInputCount', 'tubeCircuit', tubeVK.numPublicInputs);
292
- this.instrumentation.recordSize('circuitSize', 'tubeCircuit', tubeVK.circuitSize);
293
- // Sanity check the tube proof (can be removed later)
294
- await this.verifyWithKey('ultra_rollup_honk', tubeVK, tubeProof.binaryProof);
295
- logger.info(`Generated proof for tubeCircuit in ${Math.ceil(provingResult.durationMs)} ms, size: ${tubeProof.proof.length} fields`);
296
- return makeProofAndVerificationKey(tubeProof, tubeVK);
297
- };
298
- return await this.runInDirectory(operation);
299
- }
300
- /**
301
- * Executes a circuit and returns its outputs and corresponding proof with embedded aggregation object
302
- * @param witnessMap - The input witness
303
- * @param circuitType - The type of circuit to be executed
304
- * @param proofLength - The length of the proof to be generated. This is a dummy parameter to aid in type checking
305
- * @param convertInput - Function for mapping the input object to a witness map.
306
- * @param convertOutput - Function for parsing the output witness to it's corresponding object
307
- * @returns The circuits output object and it's proof
308
- */
309
- async createRecursiveProof(input, circuitType, proofLength, convertInput, convertOutput) {
310
- // this probably is gonna need to call client ivc
311
- const operation = async (bbWorkingDirectory) => {
312
- const { provingResult, circuitOutput: output } = await this.generateProofWithBB(input, circuitType, convertInput, convertOutput, bbWorkingDirectory);
313
- const vkData = this.getVerificationKeyDataForCircuit(circuitType);
314
- // Read the proof as fields
315
- const proof = await this.readProofAsFields(provingResult.proofPath, vkData, proofLength);
316
- const circuitName = mapProtocolArtifactNameToCircuitName(circuitType);
317
- this.instrumentation.recordDuration('provingDuration', circuitName, provingResult.durationMs);
318
- this.instrumentation.recordSize('proofSize', circuitName, proof.binaryProof.buffer.length);
319
- this.instrumentation.recordSize('circuitPublicInputCount', circuitName, vkData.numPublicInputs);
320
- this.instrumentation.recordSize('circuitSize', circuitName, vkData.circuitSize);
321
- logger.info(`Generated proof for ${circuitType} in ${Math.ceil(provingResult.durationMs)} ms, size: ${proof.proof.length} fields`, {
322
- circuitName,
323
- circuitSize: vkData.circuitSize,
324
- duration: provingResult.durationMs,
325
- inputSize: output.toBuffer().length,
326
- proofSize: proof.binaryProof.buffer.length,
327
- eventName: 'circuit-proving',
328
- numPublicInputs: vkData.numPublicInputs,
329
- });
330
- return {
331
- circuitOutput: output,
332
- proof,
333
- };
334
- };
335
- return await this.runInDirectory(operation);
336
- }
337
- /**
338
- * Verifies a proof, will generate the verification key if one is not cached internally
339
- * @param circuitType - The type of circuit whose proof is to be verified
340
- * @param proof - The proof to be verified
341
- */
342
- async verifyProof(circuitType, proof) {
343
- const verificationKey = this.getVerificationKeyDataForCircuit(circuitType);
344
- return await this.verifyWithKey(getUltraHonkFlavorForCircuit(circuitType), verificationKey, proof);
345
- }
346
- async verifyAvmProof(proof, verificationKey) {
347
- return await this.verifyWithKeyInternal(proof, verificationKey, (proofPath, vkPath) => verifyAvmProof(this.config.bbBinaryPath, proofPath, vkPath, logger));
348
- }
349
- async verifyWithKey(flavor, verificationKey, proof) {
350
- return await this.verifyWithKeyInternal(proof, verificationKey, (proofPath, vkPath) => verifyProof(this.config.bbBinaryPath, proofPath, vkPath, flavor, logger));
351
- }
352
- async verifyWithKeyInternal(proof, verificationKey, verificationFunction) {
353
- const operation = async (bbWorkingDirectory) => {
354
- const proofFileName = path.join(bbWorkingDirectory, PROOF_FILENAME);
355
- const verificationKeyPath = path.join(bbWorkingDirectory, VK_FILENAME);
356
- await fs.writeFile(proofFileName, proof.buffer);
357
- await fs.writeFile(verificationKeyPath, verificationKey.keyAsBytes);
358
- const result = await verificationFunction(proofFileName, verificationKeyPath);
359
- if (result.status === BB_RESULT.FAILURE) {
360
- const errorMessage = `Failed to verify proof from key!`;
361
- throw new ProvingError(errorMessage, result, result.retry);
362
- }
363
- logger.info(`Successfully verified proof from key in ${result.durationMs} ms`);
364
- };
365
- await this.runInDirectory(operation);
366
- }
367
- /**
368
- * Will check a recursive proof argument for validity of it's 'fields' format of proof and convert if required
369
- * @param proof - The input proof that may need converting
370
- * @returns - The valid proof
371
- */
372
- async ensureValidProof(proof, // WORKTODO
373
- circuit, vk) {
374
- // If the 'fields' proof is already valid then simply return
375
- // This will be false for proofs coming from clients
376
- if (proof.fieldsValid) {
377
- return proof;
378
- }
379
- const operation = async (bbWorkingDirectory) => {
380
- const numPublicInputs = vk.numPublicInputs - AGGREGATION_OBJECT_LENGTH - IPA_CLAIM_LENGTH;
381
- const proofFullFilename = path.join(bbWorkingDirectory, PROOF_FILENAME);
382
- const vkFullFilename = path.join(bbWorkingDirectory, VK_FILENAME);
383
- logger.debug(`Converting proof to fields format for circuit ${circuit}, directory ${bbWorkingDirectory}, num public inputs: ${vk.numPublicInputs}, proof length ${proof.binaryProof.buffer.length}, vk length ${vk.keyAsBytes.length}`);
384
- await fs.writeFile(proofFullFilename, proof.binaryProof.buffer);
385
- await fs.writeFile(vkFullFilename, vk.keyAsBytes);
386
- const logFunction = (message) => {
387
- logger.debug(`${circuit} BB out - ${message}`);
388
- };
389
- const result = await writeProofAsFields(this.config.bbBinaryPath, bbWorkingDirectory, PROOF_FILENAME, vkFullFilename, logFunction);
390
- if (result.status === BB_RESULT.FAILURE) {
391
- const errorMessage = `Failed to convert ${circuit} proof to fields, ${result.reason}`;
392
- throw new ProvingError(errorMessage, result, result.retry);
393
- }
394
- const proofString = await fs.readFile(path.join(bbWorkingDirectory, PROOF_FIELDS_FILENAME), {
395
- encoding: 'utf-8',
396
- });
397
- const json = JSON.parse(proofString);
398
- const fields = json
399
- .slice(0, 3)
400
- .map(Fr.fromHexString)
401
- .concat(json.slice(3 + numPublicInputs).map(Fr.fromHexString));
402
- return new RecursiveProof(fields, new Proof(proof.binaryProof.buffer, vk.numPublicInputs), true, NESTED_RECURSIVE_PROOF_LENGTH);
403
- };
404
- return await this.runInDirectory(operation);
405
- }
406
- /**
407
- * Returns the verification key data for a circuit.
408
- * @param circuitType - The type of circuit for which the verification key is required
409
- * @returns The verification key data
410
- */
411
- getVerificationKeyDataForCircuit(circuitType) {
412
- const vk = ServerCircuitVks[circuitType];
413
- if (vk === undefined) {
414
- throw new Error('Could not find VK for server artifact ' + circuitType);
415
- }
416
- return vk;
417
- }
418
- async readProofAsFields(filePath, vkData, proofLength) {
419
- const proofFilename = path.join(filePath, PROOF_FILENAME);
420
- const proofFieldsFilename = path.join(filePath, PROOF_FIELDS_FILENAME);
421
- const [binaryProof, proofString] = await Promise.all([
422
- fs.readFile(proofFilename),
423
- fs.readFile(proofFieldsFilename, { encoding: 'utf-8' }),
424
- ]);
425
- const json = JSON.parse(proofString);
426
- let numPublicInputs = vkData.numPublicInputs - AGGREGATION_OBJECT_LENGTH;
427
- if (proofLength == NESTED_RECURSIVE_ROLLUP_HONK_PROOF_LENGTH) {
428
- numPublicInputs -= IPA_CLAIM_LENGTH;
429
- }
430
- assert(json.length - numPublicInputs == proofLength, 'Proof length mismatch');
431
- const fieldsWithoutPublicInputs = json
432
- .slice(0, 3)
433
- .map(Fr.fromHexString)
434
- .concat(json.slice(3 + numPublicInputs).map(Fr.fromHexString));
435
- logger.debug(`Circuit path: ${filePath}, complete proof length: ${json.length}, num public inputs: ${numPublicInputs}, circuit size: ${vkData.circuitSize}, is recursive: ${vkData.isRecursive}, raw length: ${binaryProof.length}`);
436
- return new RecursiveProof(fieldsWithoutPublicInputs, new Proof(binaryProof, numPublicInputs), true, proofLength);
437
- }
438
- async readAvmProofAsFields(proofFilename, vkData) {
439
- const rawProof = await fs.readFile(proofFilename);
440
- const reader = BufferReader.asReader(rawProof);
441
- const fields = reader.readArray(rawProof.length / Fr.SIZE_IN_BYTES, Fr);
442
- const fieldsWithoutPublicCols = fields.slice(-1 * AVM_PROOF_LENGTH_IN_FIELDS);
443
- const proof = new Proof(rawProof, vkData.numPublicInputs);
444
- return new RecursiveProof(fieldsWithoutPublicCols, proof, true, AVM_PROOF_LENGTH_IN_FIELDS);
445
- }
446
- runInDirectory(fn) {
447
- return runInDirectory(this.config.bbWorkingDirectory, (dir) => fn(dir).catch(err => {
448
- logger.error(`Error running operation at ${dir}: ${err}`);
449
- throw err;
450
- }), this.config.bbSkipCleanup);
451
- }
452
- },
453
- (() => {
454
- const _metadata = typeof Symbol === "function" && Symbol.metadata ? Object.create(null) : void 0;
455
- _getBaseParityProof_decorators = [trackSpan('BBNativeRollupProver.getBaseParityProof', { [Attributes.PROTOCOL_CIRCUIT_NAME]: 'base-parity' })];
456
- _getRootParityProof_decorators = [trackSpan('BBNativeRollupProver.getRootParityProof', { [Attributes.PROTOCOL_CIRCUIT_NAME]: 'root-parity' })];
457
- _getAvmProof_decorators = [trackSpan('BBNativeRollupProver.getAvmProof', inputs => ({
458
- [Attributes.APP_CIRCUIT_NAME]: inputs.functionName,
459
- }))];
460
- __esDecorate(_a, null, _getBaseParityProof_decorators, { kind: "method", name: "getBaseParityProof", static: false, private: false, access: { has: obj => "getBaseParityProof" in obj, get: obj => obj.getBaseParityProof }, metadata: _metadata }, null, _instanceExtraInitializers);
461
- __esDecorate(_a, null, _getRootParityProof_decorators, { kind: "method", name: "getRootParityProof", static: false, private: false, access: { has: obj => "getRootParityProof" in obj, get: obj => obj.getRootParityProof }, metadata: _metadata }, null, _instanceExtraInitializers);
462
- __esDecorate(_a, null, _getAvmProof_decorators, { kind: "method", name: "getAvmProof", static: false, private: false, access: { has: obj => "getAvmProof" in obj, get: obj => obj.getAvmProof }, metadata: _metadata }, null, _instanceExtraInitializers);
463
- if (_metadata) Object.defineProperty(_a, Symbol.metadata, { enumerable: true, configurable: true, writable: true, value: _metadata });
464
- })(),
465
- _a;
466
- })();
467
- export { BBNativeRollupProver };
468
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"bb_prover.js","sourceRoot":"","sources":["../../src/prover/bb_prover.ts"],"names":[],"mappings":";AAAA,kCAAkC;AAClC,OAAO,EAEL,YAAY,EAGZ,2BAA2B,EAC3B,iCAAiC,GAClC,MAAM,sBAAsB,CAAC;AAE9B,OAAO,EACL,yBAAyB,EACzB,0BAA0B,EAG1B,EAAE,EACF,gBAAgB,EAChB,6BAA6B,EAC7B,yCAAyC,EAEzC,KAAK,EACL,sBAAsB,EACtB,cAAc,EAEd,iBAAiB,EAEjB,4BAA4B,GAC7B,MAAM,oBAAoB,CAAC;AAe5B,OAAO,EAAE,cAAc,EAAE,MAAM,sBAAsB,CAAC;AACtD,OAAO,EAAE,YAAY,EAAE,MAAM,uBAAuB,CAAC;AACrD,OAAO,EAAE,YAAY,EAAE,MAAM,6BAA6B,CAAC;AAC3D,OAAO,EAAE,KAAK,EAAE,MAAM,yBAAyB,CAAC;AAChD,OAAO,EACL,sBAAsB,EAEtB,mCAAmC,EACnC,sCAAsC,EACtC,yCAAyC,EACzC,4CAA4C,EAC5C,wCAAwC,EACxC,2CAA2C,EAC3C,6CAA6C,EAC7C,gDAAgD,EAChD,oCAAoC,EACpC,uCAAuC,EACvC,0CAA0C,EAC1C,6CAA6C,EAC7C,yCAAyC,EACzC,4CAA4C,EAC5C,mCAAmC,EACnC,sCAAsC,EACtC,mCAAmC,EACnC,sCAAsC,EACtC,gDAAgD,EAChD,mDAAmD,GACpD,MAAM,4CAA4C,CAAC;AACpD,OAAO,EAAE,gBAAgB,EAAE,MAAM,yCAAyC,CAAC;AAC3E,OAAO,EAAE,mBAAmB,EAAE,MAAM,yBAAyB,CAAC;AAC9D,OAAO,EAAE,UAAU,EAAwB,kBAAkB,EAAE,SAAS,EAAE,MAAM,yBAAyB,CAAC;AAG1G,OAAO,EAAE,MAAM,EAAE,MAAM,SAAS,CAAC;AACjC,OAAO,MAAM,MAAM,QAAQ,CAAC;AAC5B,OAAO,EAAE,QAAQ,IAAI,EAAE,EAAE,MAAM,IAAI,CAAC;AACpC,OAAO,KAAK,IAAI,MAAM,MAAM,CAAC;AAE7B,OAAO,EAGL,SAAS,EACT,qBAAqB,EACrB,cAAc,EACd,WAAW,EACX,gBAAgB,EAChB,aAAa,EACb,iBAAiB,EACjB,cAAc,EACd,WAAW,EACX,kBAAkB,GACnB,MAAM,kBAAkB,CAAC;AAE1B,OAAO,EAAwB,4BAA4B,EAAE,MAAM,YAAY,CAAC;AAChF,OAAO,EAAE,qBAAqB,EAAE,MAAM,uBAAuB,CAAC;AAC9D,OAAO,EAAE,oCAAoC,EAAE,MAAM,aAAa,CAAC;AACnE,OAAO,EAAE,gBAAgB,EAAE,aAAa,EAAE,MAAM,8CAA8C,CAAC;AAC/F,OAAO,EAAE,sBAAsB,EAAE,MAAM,6BAA6B,CAAC;AAErE,MAAM,MAAM,GAAG,YAAY,CAAC,WAAW,CAAC,CAAC;AAEzC,6CAA6C;AAC7C,MAAM,wBAAwB,GAAG,IAAI,CAAC;AAOtC;;GAEG;IACU,oBAAoB;;;;;;sBAApB,oBAAoB;YAG/B,YAAoB,MAAsB,EAAE,SAA0B;gBAAlD,WAAM,IAHf,mDAAoB,EAGX,MAAM,EAAgB;gBACxC,IAAI,CAAC,eAAe,GAAG,IAAI,qBAAqB,CAAC,SAAS,EAAE,sBAAsB,CAAC,CAAC;YACtF,CAAC;YAED,IAAI,MAAM;gBACR,OAAO,IAAI,CAAC,eAAe,CAAC,MAAM,CAAC;YACrC,CAAC;YAED,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,MAAsB,EAAE,YAA6B,kBAAkB,EAAE;gBACxF,MAAM,EAAE,CAAC,MAAM,CAAC,MAAM,CAAC,cAAc,EAAE,EAAE,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC;gBAC1D,MAAM,EAAE,CAAC,KAAK,CAAC,MAAM,CAAC,oBAAoB,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;gBACjE,MAAM,EAAE,CAAC,MAAM,CAAC,MAAM,CAAC,YAAY,EAAE,EAAE,CAAC,SAAS,CAAC,IAAI,CAAC,CAAC;gBACxD,MAAM,EAAE,CAAC,KAAK,CAAC,MAAM,CAAC,kBAAkB,EAAE,EAAE,SAAS,EAAE,IAAI,EAAE,CAAC,CAAC;gBAC/D,MAAM,CAAC,IAAI,CAAC,sBAAsB,MAAM,CAAC,YAAY,0BAA0B,MAAM,CAAC,kBAAkB,EAAE,CAAC,CAAC;gBAC5G,MAAM,CAAC,IAAI,CAAC,wBAAwB,MAAM,CAAC,cAAc,0BAA0B,MAAM,CAAC,oBAAoB,EAAE,CAAC,CAAC;gBAElH,OAAO,IAAI,EAAoB,CAAC,MAAM,EAAE,SAAS,CAAC,CAAC;YACrD,CAAC;YAED;;;;eAIG;YAEI,KAAK,CAAC,kBAAkB,CAC7B,MAAwB;gBAExB,MAAM,EAAE,aAAa,EAAE,KAAK,EAAE,GAAG,MAAM,IAAI,CAAC,oBAAoB,CAC9D,MAAM,EACN,oBAAoB,EACpB,sBAAsB,EACtB,mCAAmC,EACnC,sCAAsC,CACvC,CAAC;gBAEF,MAAM,eAAe,GAAG,IAAI,CAAC,gCAAgC,CAAC,oBAAoB,CAAC,CAAC;gBACpF,MAAM,IAAI,CAAC,WAAW,CAAC,oBAAoB,EAAE,KAAK,CAAC,WAAW,CAAC,CAAC;gBAEhE,OAAO,iCAAiC,CAAC,aAAa,EAAE,KAAK,EAAE,eAAe,CAAC,CAAC;YAClF,CAAC;YAED;;;;eAIG;YAEI,KAAK,CAAC,kBAAkB,CAC7B,MAAwB;gBAExB,MAAM,EAAE,aAAa,EAAE,KAAK,EAAE,GAAG,MAAM,IAAI,CAAC,oBAAoB,CAC9D,MAAM,EACN,oBAAoB,EACpB,6BAA6B,EAC7B,mCAAmC,EACnC,sCAAsC,CACvC,CAAC;gBAEF,MAAM,eAAe,GAAG,IAAI,CAAC,gCAAgC,CAAC,oBAAoB,CAAC,CAAC;gBACpF,MAAM,IAAI,CAAC,WAAW,CAAC,oBAAoB,EAAE,KAAK,CAAC,WAAW,CAAC,CAAC;gBAEhE,OAAO,iCAAiC,CAAC,aAAa,EAAE,KAAK,EAAE,eAAe,CAAC,CAAC;YAClF,CAAC;YAED;;;;eAIG;YAII,KAAK,CAAC,WAAW,CACtB,MAAwB;gBAExB,MAAM,UAAU,GAAG,MAAM,IAAI,CAAC,cAAc,CAAC,MAAM,CAAC,CAAC;gBACrD,MAAM,IAAI,CAAC,cAAc,CAAC,UAAU,CAAC,KAAK,CAAC,WAAW,EAAE,UAAU,CAAC,eAAe,CAAC,CAAC;gBACpF,OAAO,UAAU,CAAC;YACpB,CAAC;YAED;;;;eAIG;YACI,KAAK,CAAC,yBAAyB,CACpC,MAA+B;gBAI/B,MAAM,YAAY,GAAG,2BAA2B,CAAC;gBAEjD,MAAM,EAAE,aAAa,EAAE,KAAK,EAAE,GAAG,MAAM,IAAI,CAAC,oBAAoB,CAC9D,MAAM,EACN,YAAY,EACZ,yCAAyC,EACzC,0CAA0C,EAC1C,6CAA6C,CAC9C,CAAC;gBAEF,MAAM,eAAe,GAAG,IAAI,CAAC,gCAAgC,CAAC,YAAY,CAAC,CAAC;gBAE5E,MAAM,IAAI,CAAC,WAAW,CAAC,YAAY,EAAE,KAAK,CAAC,WAAW,CAAC,CAAC;gBAExD,OAAO,iCAAiC,CAAC,aAAa,EAAE,KAAK,EAAE,eAAe,CAAC,CAAC;YAClF,CAAC;YAED;;;;eAIG;YACI,KAAK,CAAC,wBAAwB,CACnC,MAA8B;gBAI9B,MAAM,YAAY,GAAG,0BAA0B,CAAC;gBAEhD,MAAM,EAAE,aAAa,EAAE,KAAK,EAAE,GAAG,MAAM,IAAI,CAAC,oBAAoB,CAC9D,MAAM,EACN,YAAY,EACZ,yCAAyC,EACzC,yCAAyC,EACzC,4CAA4C,CAC7C,CAAC;gBAEF,MAAM,eAAe,GAAG,IAAI,CAAC,gCAAgC,CAAC,YAAY,CAAC,CAAC;gBAE5E,MAAM,IAAI,CAAC,WAAW,CAAC,YAAY,EAAE,KAAK,CAAC,WAAW,CAAC,CAAC;gBAExD,OAAO,iCAAiC,CAAC,aAAa,EAAE,KAAK,EAAE,eAAe,CAAC,CAAC;YAClF,CAAC;YAED;;;;eAIG;YACI,KAAK,CAAC,mBAAmB,CAC9B,KAAwB;gBAIxB,MAAM,EAAE,aAAa,EAAE,KAAK,EAAE,GAAG,MAAM,IAAI,CAAC,oBAAoB,CAC9D,KAAK,EACL,qBAAqB,EACrB,yCAAyC,EACzC,oCAAoC,EACpC,uCAAuC,CACxC,CAAC;gBAEF,MAAM,eAAe,GAAG,IAAI,CAAC,gCAAgC,CAAC,qBAAqB,CAAC,CAAC;gBAErF,MAAM,IAAI,CAAC,WAAW,CAAC,qBAAqB,EAAE,KAAK,CAAC,WAAW,CAAC,CAAC;gBAEjE,OAAO,iCAAiC,CAAC,aAAa,EAAE,KAAK,EAAE,eAAe,CAAC,CAAC;YAClF,CAAC;YAED;;;;eAIG;YACI,KAAK,CAAC,uBAAuB,CAClC,KAA4B;gBAI5B,MAAM,EAAE,aAAa,EAAE,KAAK,EAAE,GAAG,MAAM,IAAI,CAAC,oBAAoB,CAC9D,KAAK,EACL,yBAAyB,EACzB,yCAAyC,EACzC,wCAAwC,EACxC,2CAA2C,CAC5C,CAAC;gBAEF,MAAM,eAAe,GAAG,IAAI,CAAC,gCAAgC,CAAC,yBAAyB,CAAC,CAAC;gBAEzF,MAAM,IAAI,CAAC,WAAW,CAAC,yBAAyB,EAAE,KAAK,CAAC,WAAW,CAAC,CAAC;gBAErE,OAAO,iCAAiC,CAAC,aAAa,EAAE,KAAK,EAAE,eAAe,CAAC,CAAC;YAClF,CAAC;YAEM,KAAK,CAAC,+BAA+B,CAC1C,KAAoC;gBAIpC,MAAM,EAAE,aAAa,EAAE,KAAK,EAAE,GAAG,MAAM,IAAI,CAAC,oBAAoB,CAC9D,KAAK,EACL,iCAAiC,EACjC,yCAAyC,EACzC,gDAAgD,EAChD,mDAAmD,CACpD,CAAC;gBAEF,MAAM,eAAe,GAAG,IAAI,CAAC,gCAAgC,CAAC,iCAAiC,CAAC,CAAC;gBAEjG,MAAM,IAAI,CAAC,WAAW,CAAC,iCAAiC,EAAE,KAAK,CAAC,WAAW,CAAC,CAAC;gBAE7E,OAAO,iCAAiC,CAAC,aAAa,EAAE,KAAK,EAAE,eAAe,CAAC,CAAC;YAClF,CAAC;YAED;;;;eAIG;YACI,KAAK,CAAC,4BAA4B,CACvC,KAAiC;gBAIjC,MAAM,EAAE,aAAa,EAAE,KAAK,EAAE,GAAG,MAAM,IAAI,CAAC,oBAAoB,CAC9D,KAAK,EACL,8BAA8B,EAC9B,yCAAyC,EACzC,6CAA6C,EAC7C,gDAAgD,CACjD,CAAC;gBAEF,MAAM,eAAe,GAAG,IAAI,CAAC,gCAAgC,CAAC,8BAA8B,CAAC,CAAC;gBAE9F,MAAM,IAAI,CAAC,WAAW,CAAC,8BAA8B,EAAE,KAAK,CAAC,WAAW,CAAC,CAAC;gBAE1E,OAAO,iCAAiC,CAAC,aAAa,EAAE,KAAK,EAAE,eAAe,CAAC,CAAC;YAClF,CAAC;YAED;;;;eAIG;YACI,KAAK,CAAC,wBAAwB,CACnC,KAA6B;gBAI7B,MAAM,EAAE,aAAa,EAAE,KAAK,EAAE,GAAG,MAAM,IAAI,CAAC,oBAAoB,CAC9D,KAAK,EACL,0BAA0B,EAC1B,yCAAyC,EACzC,yCAAyC,EACzC,4CAA4C,CAC7C,CAAC;gBAEF,MAAM,eAAe,GAAG,IAAI,CAAC,gCAAgC,CAAC,0BAA0B,CAAC,CAAC;gBAE1F,MAAM,IAAI,CAAC,WAAW,CAAC,0BAA0B,EAAE,KAAK,CAAC,WAAW,CAAC,CAAC;gBAEtE,OAAO,iCAAiC,CAAC,aAAa,EAAE,KAAK,EAAE,eAAe,CAAC,CAAC;YAClF,CAAC;YAED;;;;eAIG;YACI,KAAK,CAAC,kBAAkB,CAC7B,KAAuB;gBAEvB,MAAM,EAAE,aAAa,EAAE,KAAK,EAAE,GAAG,MAAM,IAAI,CAAC,WAAW,CACrD,KAAK,EACL,oBAAoB,EACpB,mCAAmC,EACnC,sCAAsC,CACvC,CAAC;gBAEF,MAAM,cAAc,GAAG,4BAA4B,CAAC,KAAK,EAAE,6BAA6B,CAAC,CAAC;gBAE1F,MAAM,eAAe,GAAG,IAAI,CAAC,gCAAgC,CAAC,oBAAoB,CAAC,CAAC;gBAEpF,MAAM,IAAI,CAAC,WAAW,CAAC,oBAAoB,EAAE,KAAK,CAAC,CAAC;gBAEpD,OAAO,iCAAiC,CAAC,aAAa,EAAE,cAAc,EAAE,eAAe,CAAC,CAAC;YAC3F,CAAC;YAEO,KAAK,CAAC,mBAAmB,CAI/B,KAAY,EACZ,WAAmC,EACnC,YAA0C,EAC1C,aAAoD,EACpD,gBAAwB;gBAExB,+CAA+C;gBAC/C,MAAM,iBAAiB,GAAG,IAAI,CAAC,IAAI,CAAC,gBAAgB,EAAE,oBAAoB,CAAC,CAAC;gBAE5E,8CAA8C;gBAC9C,gJAAgJ;gBAChJ,MAAM,SAAS,GAAG,IAAI,mBAAmB,CACvC,IAAI,CAAC,MAAM,CAAC,oBAAoB,EAChC,IAAI,CAAC,MAAM,CAAC,cAAc,EAC1B,iBAAiB,CAClB,CAAC;gBAEF,MAAM,QAAQ,GAAG,sBAAsB,CAAC,WAAW,CAAC,CAAC;gBAErD,MAAM,CAAC,KAAK,CAAC,+BAA+B,WAAW,EAAE,CAAC,CAAC;gBAE3D,MAAM,YAAY,GAAG,YAAY,CAAC,KAAK,CAAC,CAAC;gBACzC,MAAM,KAAK,GAAG,IAAI,KAAK,EAAE,CAAC;gBAC1B,MAAM,aAAa,GAAG,MAAM,SAAS,CAAC,sBAAsB,CAAC,YAAY,EAAE,QAAQ,CAAC,CAAC;gBACrF,MAAM,MAAM,GAAG,aAAa,CAAC,aAAa,CAAC,CAAC;gBAE5C,MAAM,WAAW,GAAG,oCAAoC,CAAC,WAAW,CAAC,CAAC;gBACtE,IAAI,CAAC,eAAe,CAAC,cAAc,CAAC,gBAAgB,EAAE,WAAW,EAAE,KAAK,CAAC,CAAC;gBAC1E,IAAI,CAAC,eAAe,CAAC,UAAU,CAAC,iBAAiB,EAAE,WAAW,EAAE,KAAK,CAAC,QAAQ,EAAE,CAAC,MAAM,CAAC,CAAC;gBACzF,IAAI,CAAC,eAAe,CAAC,UAAU,CAAC,kBAAkB,EAAE,WAAW,EAAE,MAAM,CAAC,QAAQ,EAAE,CAAC,MAAM,CAAC,CAAC;gBAE3F,MAAM,CAAC,IAAI,CAAC,mBAAmB,EAAE;oBAC/B,WAAW;oBACX,QAAQ,EAAE,KAAK,CAAC,EAAE,EAAE;oBACpB,SAAS,EAAE,KAAK,CAAC,QAAQ,EAAE,CAAC,MAAM;oBAClC,UAAU,EAAE,MAAM,CAAC,QAAQ,EAAE,CAAC,MAAM;oBACpC,SAAS,EAAE,4BAA4B;iBACA,CAAC,CAAC;gBAE3C,mDAAmD;gBACnD,MAAM,CAAC,KAAK,CAAC,WAAW,WAAW,KAAK,CAAC,CAAC;gBAE1C,MAAM,aAAa,GAAG,MAAM,aAAa,CACvC,IAAI,CAAC,MAAM,CAAC,YAAY,EACxB,gBAAgB,EAChB,WAAW,EACX,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,QAAQ,EAAE,QAAQ,CAAC,EACxC,wBAAwB,EACxB,iBAAiB,EACjB,4BAA4B,CAAC,WAAW,CAAC,EACzC,MAAM,CAAC,KAAK,CACb,CAAC;gBAEF,IAAI,aAAa,CAAC,MAAM,KAAK,SAAS,CAAC,OAAO,EAAE,CAAC;oBAC/C,MAAM,CAAC,KAAK,CAAC,gCAAgC,WAAW,KAAK,aAAa,CAAC,MAAM,EAAE,CAAC,CAAC;oBACrF,MAAM,IAAI,YAAY,CAAC,aAAa,CAAC,MAAM,EAAE,aAAa,EAAE,aAAa,CAAC,KAAK,CAAC,CAAC;gBACnF,CAAC;gBAED,OAAO;oBACL,aAAa,EAAE,MAAM;oBACrB,aAAa;iBACd,CAAC;YACJ,CAAC;YAEO,KAAK,CAAC,WAAW,CACvB,KAAY,EACZ,WAAmC,EACnC,YAA0C,EAC1C,aAAoD;gBAEpD,MAAM,SAAS,GAAG,KAAK,EAAE,kBAA0B,EAAE,EAAE;oBACrD,MAAM,EAAE,aAAa,EAAE,aAAa,EAAE,MAAM,EAAE,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAC7E,KAAK,EACL,WAAW,EACX,YAAY,EACZ,aAAa,EACb,kBAAkB,CACnB,CAAC;oBAEF,wBAAwB;oBACxB,MAAM,QAAQ,GAAG,MAAM,EAAE,CAAC,QAAQ,CAAC,GAAG,aAAa,CAAC,SAAU,IAAI,cAAc,EAAE,CAAC,CAAC;oBACpF,MAAM,MAAM,GAAG,IAAI,CAAC,gCAAgC,CAAC,WAAW,CAAC,CAAC;oBAClE,MAAM,KAAK,GAAG,IAAI,KAAK,CAAC,QAAQ,EAAE,MAAM,CAAC,eAAe,CAAC,CAAC;oBAC1D,MAAM,WAAW,GAAG,oCAAoC,CAAC,WAAW,CAAC,CAAC;oBAEtE,IAAI,CAAC,eAAe,CAAC,cAAc,CAAC,iBAAiB,EAAE,WAAW,EAAE,aAAa,CAAC,UAAU,CAAC,CAAC;oBAC9F,IAAI,CAAC,eAAe,CAAC,UAAU,CAAC,WAAW,EAAE,WAAW,EAAE,KAAK,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;oBAC/E,IAAI,CAAC,eAAe,CAAC,UAAU,CAAC,yBAAyB,EAAE,WAAW,EAAE,MAAM,CAAC,eAAe,CAAC,CAAC;oBAChG,IAAI,CAAC,eAAe,CAAC,UAAU,CAAC,aAAa,EAAE,WAAW,EAAE,MAAM,CAAC,WAAW,CAAC,CAAC;oBAEhF,MAAM,CAAC,IAAI,CAAC,uBAAuB,WAAW,OAAO,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,KAAK,EAAE;wBAC7F,WAAW;wBACX,+CAA+C;wBAC/C,QAAQ,EAAE,aAAa,CAAC,UAAU;wBAClC,SAAS,EAAE,KAAK,CAAC,MAAM,CAAC,MAAM;wBAC9B,SAAS,EAAE,iBAAiB;wBAC5B,0EAA0E;wBAC1E,SAAS,EAAE,MAAM,CAAC,QAAQ,EAAE,CAAC,MAAM;wBACnC,WAAW,EAAE,MAAM,CAAC,WAAW;wBAC/B,eAAe,EAAE,MAAM,CAAC,eAAe;qBACV,CAAC,CAAC;oBAEjC,OAAO,EAAE,aAAa,EAAE,MAAM,EAAE,KAAK,EAAE,CAAC;gBAC1C,CAAC,CAAC;gBACF,OAAO,MAAM,IAAI,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC;YAC9C,CAAC;YAEO,KAAK,CAAC,sBAAsB,CAAC,KAAuB,EAAE,gBAAwB;gBACpF,MAAM,CAAC,IAAI,CAAC,2BAA2B,KAAK,CAAC,YAAY,KAAK,CAAC,CAAC;gBAEhE,MAAM,aAAa,GAAG,MAAM,gBAAgB,CAAC,IAAI,CAAC,MAAM,CAAC,YAAY,EAAE,gBAAgB,EAAE,KAAK,EAAE,MAAM,CAAC,CAAC;gBAExG,IAAI,aAAa,CAAC,MAAM,KAAK,SAAS,CAAC,OAAO,EAAE,CAAC;oBAC/C,MAAM,CAAC,KAAK,CAAC,oCAAoC,KAAK,CAAC,YAAY,KAAK,aAAa,CAAC,MAAM,EAAE,CAAC,CAAC;oBAChG,MAAM,IAAI,YAAY,CAAC,aAAa,CAAC,MAAM,EAAE,aAAa,EAAE,aAAa,CAAC,KAAK,CAAC,CAAC;gBACnF,CAAC;gBAED,OAAO,aAAa,CAAC;YACvB,CAAC;YAEO,KAAK,CAAC,uBAAuB,CAAC,kBAA0B,EAAE,KAAiB;gBACjF,MAAM,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC;gBAEhC,MAAM,MAAM,GAAG,MAAM,CAAC,UAAU,CAAC,QAAQ,CAAC,CAAC;gBAC3C,MAAM,CAAC,MAAM,CAAC,KAAK,CAAC,QAAQ,EAAE,CAAC,CAAC;gBAEhC,MAAM,sBAAsB,CAAC,KAAK,CAAC,aAAa,EAAE,kBAAkB,CAAC,CAAC;gBACtE,MAAM,aAAa,GAAG,MAAM,iBAAiB,CAAC,IAAI,CAAC,MAAM,CAAC,YAAY,EAAE,kBAAkB,EAAE,MAAM,CAAC,OAAO,CAAC,CAAC;gBAE5G,IAAI,aAAa,CAAC,MAAM,KAAK,SAAS,CAAC,OAAO,EAAE,CAAC;oBAC/C,MAAM,CAAC,KAAK,CAAC,8CAA8C,aAAa,CAAC,MAAM,EAAE,CAAC,CAAC;oBACnF,MAAM,IAAI,YAAY,CAAC,aAAa,CAAC,MAAM,EAAE,aAAa,EAAE,aAAa,CAAC,KAAK,CAAC,CAAC;gBACnF,CAAC;gBACD,OAAO,aAAa,CAAC;YACvB,CAAC;YAEO,KAAK,CAAC,cAAc,CAC1B,KAAuB;gBAEvB,MAAM,SAAS,GAAG,KAAK,EAAE,kBAA0B,EAAE,EAAE;oBACrD,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,sBAAsB,CAAC,KAAK,EAAE,kBAAkB,CAAC,CAAC;oBAEnF,mGAAmG;oBACnG,iEAAiE;oBACjE,MAAM,eAAe,GAAG,MAAM,gBAAgB,CAAC,aAAa,CAAC,MAAO,CAAC,CAAC;oBACtE,MAAM,QAAQ,GAAG,MAAM,IAAI,CAAC,oBAAoB,CAAC,aAAa,CAAC,SAAU,EAAE,eAAe,CAAC,CAAC;oBAE5F,MAAM,WAAW,GAAG,aAAsB,CAAC;oBAC3C,MAAM,cAAc,GAAG,SAAkB,CAAC;oBAC1C,IAAI,CAAC,eAAe,CAAC,iBAAiB,CAAC,iBAAiB,EAAE,cAAc,EAAE,aAAa,CAAC,UAAU,CAAC,CAAC;oBACpG,IAAI,CAAC,eAAe,CAAC,aAAa,CAAC,WAAW,EAAE,cAAc,EAAE,QAAQ,CAAC,WAAW,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;oBACpG,IAAI,CAAC,eAAe,CAAC,aAAa,CAAC,yBAAyB,EAAE,cAAc,EAAE,eAAe,CAAC,eAAe,CAAC,CAAC;oBAC/G,IAAI,CAAC,eAAe,CAAC,aAAa,CAAC,aAAa,EAAE,cAAc,EAAE,eAAe,CAAC,WAAW,CAAC,CAAC;oBAE/F,MAAM,CAAC,IAAI,CACT,uBAAuB,WAAW,IAAI,KAAK,CAAC,YAAY,QAAQ,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,KAAK,EACxG;wBACE,WAAW,EAAE,WAAW;wBACxB,cAAc,EAAE,KAAK,CAAC,YAAY;wBAClC,+CAA+C;wBAC/C,QAAQ,EAAE,aAAa,CAAC,UAAU;wBAClC,SAAS,EAAE,QAAQ,CAAC,WAAW,CAAC,MAAM,CAAC,MAAM;wBAC7C,SAAS,EAAE,iBAAiB;wBAC5B,SAAS,EAAE,KAAK,CAAC,QAAQ,EAAE,CAAC,MAAM;wBAClC,WAAW,EAAE,eAAe,CAAC,WAAW,EAAE,mBAAmB;wBAC7D,eAAe,EAAE,eAAe,CAAC,eAAe,EAAE,mBAAmB;qBACxC,CAChC,CAAC;oBAEF,OAAO,2BAA2B,CAAC,QAAQ,EAAE,eAAe,CAAC,CAAC;gBAChE,CAAC,CAAC;gBACF,OAAO,MAAM,IAAI,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC;YAC9C,CAAC;YAEM,KAAK,CAAC,YAAY,CAAC,KAAiB;gBACzC,MAAM,SAAS,GAAG,KAAK,EAAE,kBAA0B,EAAE,EAAE;oBACrD,MAAM,CAAC,KAAK,CAAC,oBAAoB,kBAAkB,EAAE,CAAC,CAAC;oBACvD,MAAM,aAAa,GAAG,MAAM,IAAI,CAAC,uBAAuB,CAAC,kBAAkB,EAAE,KAAK,CAAC,CAAC;oBAEpF,2BAA2B;oBAC3B,6DAA6D;oBAC7D,MAAM,MAAM,GAAG,MAAM,aAAa,CAAC,aAAa,CAAC,MAAO,CAAC,CAAC;oBAC1D,MAAM,SAAS,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,aAAa,CAAC,SAAU,EAAE,MAAM,EAAE,iBAAiB,CAAC,CAAC;oBAEpG,IAAI,CAAC,eAAe,CAAC,cAAc,CAAC,iBAAiB,EAAE,aAAa,EAAE,aAAa,CAAC,UAAU,CAAC,CAAC;oBAChG,IAAI,CAAC,eAAe,CAAC,UAAU,CAAC,WAAW,EAAE,aAAa,EAAE,SAAS,CAAC,WAAW,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;oBACjG,IAAI,CAAC,eAAe,CAAC,UAAU,CAAC,yBAAyB,EAAE,aAAa,EAAE,MAAM,CAAC,eAAe,CAAC,CAAC;oBAClG,IAAI,CAAC,eAAe,CAAC,UAAU,CAAC,aAAa,EAAE,aAAa,EAAE,MAAM,CAAC,WAAW,CAAC,CAAC;oBAElF,qDAAqD;oBACrD,MAAM,IAAI,CAAC,aAAa,CAAC,mBAAmB,EAAE,MAAM,EAAE,SAAS,CAAC,WAAW,CAAC,CAAC;oBAE7E,MAAM,CAAC,IAAI,CACT,sCAAsC,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,cACvE,SAAS,CAAC,KAAK,CAAC,MAClB,SAAS,CACV,CAAC;oBAEF,OAAO,2BAA2B,CAAC,SAAS,EAAE,MAAM,CAAC,CAAC;gBACxD,CAAC,CAAC;gBACF,OAAO,MAAM,IAAI,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC;YAC9C,CAAC;YAED;;;;;;;;eAQG;YACK,KAAK,CAAC,oBAAoB,CAKhC,KAAuB,EACvB,WAAmC,EACnC,WAAyB,EACzB,YAAqD,EACrD,aAA+D;gBAE/D,iDAAiD;gBACjD,MAAM,SAAS,GAAG,KAAK,EAAE,kBAA0B,EAAE,EAAE;oBACrD,MAAM,EAAE,aAAa,EAAE,aAAa,EAAE,MAAM,EAAE,GAAG,MAAM,IAAI,CAAC,mBAAmB,CAC7E,KAAK,EACL,WAAW,EACX,YAAY,EACZ,aAAa,EACb,kBAAkB,CACnB,CAAC;oBAEF,MAAM,MAAM,GAAG,IAAI,CAAC,gCAAgC,CAAC,WAAW,CAAC,CAAC;oBAClE,2BAA2B;oBAC3B,MAAM,KAAK,GAAG,MAAM,IAAI,CAAC,iBAAiB,CAAC,aAAa,CAAC,SAAU,EAAE,MAAM,EAAE,WAAW,CAAC,CAAC;oBAE1F,MAAM,WAAW,GAAG,oCAAoC,CAAC,WAAW,CAAC,CAAC;oBACtE,IAAI,CAAC,eAAe,CAAC,cAAc,CAAC,iBAAiB,EAAE,WAAW,EAAE,aAAa,CAAC,UAAU,CAAC,CAAC;oBAC9F,IAAI,CAAC,eAAe,CAAC,UAAU,CAAC,WAAW,EAAE,WAAW,EAAE,KAAK,CAAC,WAAW,CAAC,MAAM,CAAC,MAAM,CAAC,CAAC;oBAC3F,IAAI,CAAC,eAAe,CAAC,UAAU,CAAC,yBAAyB,EAAE,WAAW,EAAE,MAAM,CAAC,eAAe,CAAC,CAAC;oBAChG,IAAI,CAAC,eAAe,CAAC,UAAU,CAAC,aAAa,EAAE,WAAW,EAAE,MAAM,CAAC,WAAW,CAAC,CAAC;oBAChF,MAAM,CAAC,IAAI,CACT,uBAAuB,WAAW,OAAO,IAAI,CAAC,IAAI,CAAC,aAAa,CAAC,UAAU,CAAC,cAC1E,KAAK,CAAC,KAAK,CAAC,MACd,SAAS,EACT;wBACE,WAAW;wBACX,WAAW,EAAE,MAAM,CAAC,WAAW;wBAC/B,QAAQ,EAAE,aAAa,CAAC,UAAU;wBAClC,SAAS,EAAE,MAAM,CAAC,QAAQ,EAAE,CAAC,MAAM;wBACnC,SAAS,EAAE,KAAK,CAAC,WAAW,CAAC,MAAM,CAAC,MAAM;wBAC1C,SAAS,EAAE,iBAAiB;wBAC5B,eAAe,EAAE,MAAM,CAAC,eAAe;qBACV,CAChC,CAAC;oBAEF,OAAO;wBACL,aAAa,EAAE,MAAM;wBACrB,KAAK;qBACN,CAAC;gBACJ,CAAC,CAAC;gBACF,OAAO,MAAM,IAAI,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC;YAC9C,CAAC;YAED;;;;eAIG;YACI,KAAK,CAAC,WAAW,CAAC,WAAmC,EAAE,KAAY;gBACxE,MAAM,eAAe,GAAG,IAAI,CAAC,gCAAgC,CAAC,WAAW,CAAC,CAAC;gBAC3E,OAAO,MAAM,IAAI,CAAC,aAAa,CAAC,4BAA4B,CAAC,WAAW,CAAC,EAAE,eAAe,EAAE,KAAK,CAAC,CAAC;YACrG,CAAC;YAEM,KAAK,CAAC,cAAc,CAAC,KAAY,EAAE,eAAoC;gBAC5E,OAAO,MAAM,IAAI,CAAC,qBAAqB,CAAC,KAAK,EAAE,eAAe,EAAE,CAAC,SAAS,EAAE,MAAM,EAAE,EAAE,CACpF,cAAc,CAAC,IAAI,CAAC,MAAM,CAAC,YAAY,EAAE,SAAS,EAAE,MAAM,EAAE,MAAM,CAAC,CACpE,CAAC;YACJ,CAAC;YAEM,KAAK,CAAC,aAAa,CAAC,MAAuB,EAAE,eAAoC,EAAE,KAAY;gBACpG,OAAO,MAAM,IAAI,CAAC,qBAAqB,CAAC,KAAK,EAAE,eAAe,EAAE,CAAC,SAAS,EAAE,MAAM,EAAE,EAAE,CACpF,WAAW,CAAC,IAAI,CAAC,MAAM,CAAC,YAAY,EAAE,SAAS,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,CAAC,CACzE,CAAC;YACJ,CAAC;YAEO,KAAK,CAAC,qBAAqB,CACjC,KAAY,EACZ,eAAuC,EACvC,oBAA2F;gBAE3F,MAAM,SAAS,GAAG,KAAK,EAAE,kBAA0B,EAAE,EAAE;oBACrD,MAAM,aAAa,GAAG,IAAI,CAAC,IAAI,CAAC,kBAAkB,EAAE,cAAc,CAAC,CAAC;oBACpE,MAAM,mBAAmB,GAAG,IAAI,CAAC,IAAI,CAAC,kBAAkB,EAAE,WAAW,CAAC,CAAC;oBAEvE,MAAM,EAAE,CAAC,SAAS,CAAC,aAAa,EAAE,KAAK,CAAC,MAAM,CAAC,CAAC;oBAChD,MAAM,EAAE,CAAC,SAAS,CAAC,mBAAmB,EAAE,eAAe,CAAC,UAAU,CAAC,CAAC;oBAEpE,MAAM,MAAM,GAAG,MAAM,oBAAoB,CAAC,aAAa,EAAE,mBAAoB,CAAC,CAAC;oBAE/E,IAAI,MAAM,CAAC,MAAM,KAAK,SAAS,CAAC,OAAO,EAAE,CAAC;wBACxC,MAAM,YAAY,GAAG,kCAAkC,CAAC;wBACxD,MAAM,IAAI,YAAY,CAAC,YAAY,EAAE,MAAM,EAAE,MAAM,CAAC,KAAK,CAAC,CAAC;oBAC7D,CAAC;oBAED,MAAM,CAAC,IAAI,CAAC,2CAA2C,MAAM,CAAC,UAAU,KAAK,CAAC,CAAC;gBACjF,CAAC,CAAC;gBAEF,MAAM,IAAI,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC;YACvC,CAAC;YAED;;;;eAIG;YACI,KAAK,CAAC,gBAAgB,CAC3B,KAA2D,EAAE,WAAW;YACxE,OAA+B,EAC/B,EAAuB;gBAEvB,4DAA4D;gBAC5D,oDAAoD;gBACpD,IAAI,KAAK,CAAC,WAAW,EAAE,CAAC;oBACtB,OAAO,KAAK,CAAC;gBACf,CAAC;gBAED,MAAM,SAAS,GAAG,KAAK,EAAE,kBAA0B,EAAE,EAAE;oBACrD,MAAM,eAAe,GAAG,EAAE,CAAC,eAAe,GAAG,yBAAyB,GAAG,gBAAgB,CAAC;oBAC1F,MAAM,iBAAiB,GAAG,IAAI,CAAC,IAAI,CAAC,kBAAkB,EAAE,cAAc,CAAC,CAAC;oBACxE,MAAM,cAAc,GAAG,IAAI,CAAC,IAAI,CAAC,kBAAkB,EAAE,WAAW,CAAC,CAAC;oBAElE,MAAM,CAAC,KAAK,CACV,iDAAiD,OAAO,eAAe,kBAAkB,wBAAwB,EAAE,CAAC,eAAe,kBAAkB,KAAK,CAAC,WAAW,CAAC,MAAM,CAAC,MAAM,eAAe,EAAE,CAAC,UAAU,CAAC,MAAM,EAAE,CAC1N,CAAC;oBAEF,MAAM,EAAE,CAAC,SAAS,CAAC,iBAAiB,EAAE,KAAK,CAAC,WAAW,CAAC,MAAM,CAAC,CAAC;oBAChE,MAAM,EAAE,CAAC,SAAS,CAAC,cAAc,EAAE,EAAE,CAAC,UAAU,CAAC,CAAC;oBAElD,MAAM,WAAW,GAAG,CAAC,OAAe,EAAE,EAAE;wBACtC,MAAM,CAAC,KAAK,CAAC,GAAG,OAAO,aAAa,OAAO,EAAE,CAAC,CAAC;oBACjD,CAAC,CAAC;oBAEF,MAAM,MAAM,GAAG,MAAM,kBAAkB,CACrC,IAAI,CAAC,MAAM,CAAC,YAAY,EACxB,kBAAkB,EAClB,cAAc,EACd,cAAc,EACd,WAAW,CACZ,CAAC;oBAEF,IAAI,MAAM,CAAC,MAAM,KAAK,SAAS,CAAC,OAAO,EAAE,CAAC;wBACxC,MAAM,YAAY,GAAG,qBAAqB,OAAO,qBAAqB,MAAM,CAAC,MAAM,EAAE,CAAC;wBACtF,MAAM,IAAI,YAAY,CAAC,YAAY,EAAE,MAAM,EAAE,MAAM,CAAC,KAAK,CAAC,CAAC;oBAC7D,CAAC;oBAED,MAAM,WAAW,GAAG,MAAM,EAAE,CAAC,QAAQ,CAAC,IAAI,CAAC,IAAI,CAAC,kBAAkB,EAAE,qBAAqB,CAAC,EAAE;wBAC1F,QAAQ,EAAE,OAAO;qBAClB,CAAC,CAAC;oBACH,MAAM,IAAI,GAAG,IAAI,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC;oBACrC,MAAM,MAAM,GAAG,IAAI;yBAChB,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC;yBACX,GAAG,CAAC,EAAE,CAAC,aAAa,CAAC;yBACrB,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,GAAG,eAAe,CAAC,CAAC,GAAG,CAAC,EAAE,CAAC,aAAa,CAAC,CAAC,CAAC;oBACjE,OAAO,IAAI,cAAc,CACvB,MAAM,EACN,IAAI,KAAK,CAAC,KAAK,CAAC,WAAW,CAAC,MAAM,EAAE,EAAE,CAAC,eAAe,CAAC,EACvD,IAAI,EACJ,6BAA6B,CAC9B,CAAC;gBACJ,CAAC,CAAC;gBACF,OAAO,MAAM,IAAI,CAAC,cAAc,CAAC,SAAS,CAAC,CAAC;YAC9C,CAAC;YAED;;;;eAIG;YACK,gCAAgC,CAAC,WAAmC;gBAC1E,MAAM,EAAE,GAAG,gBAAgB,CAAC,WAAW,CAAC,CAAC;gBACzC,IAAI,EAAE,KAAK,SAAS,EAAE,CAAC;oBACrB,MAAM,IAAI,KAAK,CAAC,wCAAwC,GAAG,WAAW,CAAC,CAAC;gBAC1E,CAAC;gBACD,OAAO,EAAE,CAAC;YACZ,CAAC;YAEO,KAAK,CAAC,iBAAiB,CAC7B,QAAgB,EAChB,MAA2B,EAC3B,WAAyB;gBAEzB,MAAM,aAAa,GAAG,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,cAAc,CAAC,CAAC;gBAC1D,MAAM,mBAAmB,GAAG,IAAI,CAAC,IAAI,CAAC,QAAQ,EAAE,qBAAqB,CAAC,CAAC;gBAEvE,MAAM,CAAC,WAAW,EAAE,WAAW,CAAC,GAAG,MAAM,OAAO,CAAC,GAAG,CAAC;oBACnD,EAAE,CAAC,QAAQ,CAAC,aAAa,CAAC;oBAC1B,EAAE,CAAC,QAAQ,CAAC,mBAAmB,EAAE,EAAE,QAAQ,EAAE,OAAO,EAAE,CAAC;iBACxD,CAAC,CAAC;gBAEH,MAAM,IAAI,GAAG,IAAI,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC;gBAErC,IAAI,eAAe,GAAG,MAAM,CAAC,eAAe,GAAG,yBAAyB,CAAC;gBACzE,IAAI,WAAW,IAAI,yCAAyC,EAAE,CAAC;oBAC7D,eAAe,IAAI,gBAAgB,CAAC;gBACtC,CAAC;gBAED,MAAM,CAAC,IAAI,CAAC,MAAM,GAAG,eAAe,IAAI,WAAW,EAAE,uBAAuB,CAAC,CAAC;gBAE9E,MAAM,yBAAyB,GAAG,IAAI;qBACnC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC;qBACX,GAAG,CAAC,EAAE,CAAC,aAAa,CAAC;qBACrB,MAAM,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,GAAG,eAAe,CAAC,CAAC,GAAG,CAAC,EAAE,CAAC,aAAa,CAAC,CAAC,CAAC;gBACjE,MAAM,CAAC,KAAK,CACV,iBAAiB,QAAQ,4BAA4B,IAAI,CAAC,MAAM,wBAAwB,eAAe,mBAAmB,MAAM,CAAC,WAAW,mBAAmB,MAAM,CAAC,WAAW,iBAAiB,WAAW,CAAC,MAAM,EAAE,CACvN,CAAC;gBAEF,OAAO,IAAI,cAAc,CAAC,yBAAyB,EAAE,IAAI,KAAK,CAAC,WAAW,EAAE,eAAe,CAAC,EAAE,IAAI,EAAE,WAAW,CAAC,CAAC;YACnH,CAAC;YAEO,KAAK,CAAC,oBAAoB,CAChC,aAAqB,EACrB,MAA2B;gBAE3B,MAAM,QAAQ,GAAG,MAAM,EAAE,CAAC,QAAQ,CAAC,aAAa,CAAC,CAAC;gBAElD,MAAM,MAAM,GAAG,YAAY,CAAC,QAAQ,CAAC,QAAQ,CAAC,CAAC;gBAC/C,MAAM,MAAM,GAAG,MAAM,CAAC,SAAS,CAAC,QAAQ,CAAC,MAAM,GAAG,EAAE,CAAC,aAAa,EAAE,EAAE,CAAC,CAAC;gBACxE,MAAM,uBAAuB,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC,CAAC,GAAG,0BAA0B,CAAC,CAAC;gBAE9E,MAAM,KAAK,GAAG,IAAI,KAAK,CAAC,QAAQ,EAAE,MAAM,CAAC,eAAe,CAAC,CAAC;gBAE1D,OAAO,IAAI,cAAc,CAAC,uBAAuB,EAAE,KAAK,EAAE,IAAI,EAAE,0BAA0B,CAAC,CAAC;YAC9F,CAAC;YAEO,cAAc,CAAI,EAA+B;gBACvD,OAAO,cAAc,CACnB,IAAI,CAAC,MAAM,CAAC,kBAAkB,EAC9B,CAAC,GAAW,EAAE,EAAE,CACd,EAAE,CAAC,GAAG,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,EAAE;oBAClB,MAAM,CAAC,KAAK,CAAC,8BAA8B,GAAG,KAAK,GAAG,EAAE,CAAC,CAAC;oBAC1D,MAAM,GAAG,CAAC;gBACZ,CAAC,CAAC,EACJ,IAAI,CAAC,MAAM,CAAC,aAAa,CAC1B,CAAC;YACJ,CAAC;;;;8CAjsBA,SAAS,CAAC,yCAAyC,EAAE,EAAE,CAAC,UAAU,CAAC,qBAAqB,CAAC,EAAE,aAAa,EAAE,CAAC;8CAuB3G,SAAS,CAAC,yCAAyC,EAAE,EAAE,CAAC,UAAU,CAAC,qBAAqB,CAAC,EAAE,aAAa,EAAE,CAAC;uCAuB3G,SAAS,CAAC,kCAAkC,EAAE,MAAM,CAAC,EAAE,CAAC,CAAC;oBACxD,CAAC,UAAU,CAAC,gBAAgB,CAAC,EAAE,MAAM,CAAC,YAAY;iBACnD,CAAC,CAAC;YA/CH,uMAAa,kBAAkB,6DAe9B;YAQD,uMAAa,kBAAkB,6DAe9B;YAUD,kLAAa,WAAW,6DAMvB;;;;;SAlFU,oBAAoB"}
360
+ logger.info(`Successfully verified proof from key in ${result.durationMs} ms`);
361
+ };
362
+ await this.runInDirectory(operation);
363
+ }
364
+ /**
365
+ * Returns the verification key data for a circuit.
366
+ * @param circuitType - The type of circuit for which the verification key is required
367
+ * @returns The verification key data
368
+ */ getVerificationKeyDataForCircuit(circuitType) {
369
+ const vk = ServerCircuitVks[circuitType];
370
+ if (vk === undefined) {
371
+ throw new Error('Could not find VK for server artifact ' + circuitType);
372
+ }
373
+ return vk;
374
+ }
375
+ async readProofAsFields(filePath, vkData, proofLength) {
376
+ const proofFilename = path.join(filePath, PROOF_FILENAME);
377
+ const proofFieldsFilename = path.join(filePath, PROOF_FIELDS_FILENAME);
378
+ const [binaryProof, proofString] = await Promise.all([
379
+ fs.readFile(proofFilename),
380
+ fs.readFile(proofFieldsFilename, {
381
+ encoding: 'utf-8'
382
+ })
383
+ ]);
384
+ const json = JSON.parse(proofString);
385
+ let numPublicInputs = vkData.numPublicInputs - AGGREGATION_OBJECT_LENGTH;
386
+ if (proofLength == NESTED_RECURSIVE_ROLLUP_HONK_PROOF_LENGTH) {
387
+ numPublicInputs -= IPA_CLAIM_LENGTH;
388
+ }
389
+ assert(json.length - numPublicInputs == proofLength, 'Proof length mismatch');
390
+ const fieldsWithoutPublicInputs = json.slice(0, 3).map(Fr.fromHexString).concat(json.slice(3 + numPublicInputs).map(Fr.fromHexString));
391
+ logger.debug(`Circuit path: ${filePath}, complete proof length: ${json.length}, num public inputs: ${numPublicInputs}, circuit size: ${vkData.circuitSize}, is recursive: ${vkData.isRecursive}, raw length: ${binaryProof.length}`);
392
+ return new RecursiveProof(fieldsWithoutPublicInputs, new Proof(binaryProof, numPublicInputs), true, proofLength);
393
+ }
394
+ async readAvmProofAsFields(proofFilename, vkData) {
395
+ const rawProof = await fs.readFile(proofFilename);
396
+ const reader = BufferReader.asReader(rawProof);
397
+ const fields = reader.readArray(rawProof.length / Fr.SIZE_IN_BYTES, Fr);
398
+ const fieldsWithoutPublicCols = fields.slice(-1 * AVM_PROOF_LENGTH_IN_FIELDS);
399
+ const proof = new Proof(rawProof, vkData.numPublicInputs);
400
+ return new RecursiveProof(fieldsWithoutPublicCols, proof, true, AVM_PROOF_LENGTH_IN_FIELDS);
401
+ }
402
+ runInDirectory(fn) {
403
+ return runInDirectory(this.config.bbWorkingDirectory, (dir)=>fn(dir).catch((err)=>{
404
+ logger.error(`Error running operation at ${dir}: ${err}`);
405
+ throw err;
406
+ }), this.config.bbSkipCleanup, logger);
407
+ }
408
+ }
409
+ _ts_decorate([
410
+ trackSpan('BBNativeRollupProver.getBaseParityProof', {
411
+ [Attributes.PROTOCOL_CIRCUIT_NAME]: 'base-parity'
412
+ })
413
+ ], BBNativeRollupProver.prototype, "getBaseParityProof", null);
414
+ _ts_decorate([
415
+ trackSpan('BBNativeRollupProver.getRootParityProof', {
416
+ [Attributes.PROTOCOL_CIRCUIT_NAME]: 'root-parity'
417
+ })
418
+ ], BBNativeRollupProver.prototype, "getRootParityProof", null);
419
+ _ts_decorate([
420
+ trackSpan('BBNativeRollupProver.getAvmProof', (inputs)=>({
421
+ [Attributes.APP_CIRCUIT_NAME]: inputs.functionName
422
+ }))
423
+ ], BBNativeRollupProver.prototype, "getAvmProof", null);