@aztec/bb-prover 0.87.3-nightly.20250528 → 0.87.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dest/avm_proving_tests/avm_proving_tester.d.ts +10 -3
- package/dest/avm_proving_tests/avm_proving_tester.d.ts.map +1 -1
- package/dest/avm_proving_tests/avm_proving_tester.js +62 -18
- package/dest/bb/execute.d.ts +24 -5
- package/dest/bb/execute.d.ts.map +1 -1
- package/dest/bb/execute.js +104 -16
- package/dest/prover/server/bb_prover.d.ts +5 -5
- package/dest/prover/server/bb_prover.d.ts.map +1 -1
- package/dest/prover/server/bb_prover.js +13 -22
- package/dest/test/test_circuit_prover.d.ts +2 -2
- package/dest/test/test_circuit_prover.d.ts.map +1 -1
- package/dest/test/test_circuit_prover.js +2 -2
- package/dest/verification_key/verification_key_data.d.ts +0 -6
- package/dest/verification_key/verification_key_data.d.ts.map +1 -1
- package/dest/verification_key/verification_key_data.js +16 -16
- package/package.json +16 -16
- package/src/avm_proving_tests/avm_proving_tester.ts +87 -30
- package/src/bb/execute.ts +123 -22
- package/src/prover/server/bb_prover.ts +30 -48
- package/src/test/test_circuit_prover.ts +5 -7
- package/src/verification_key/verification_key_data.ts +13 -20
|
@@ -7,12 +7,19 @@ import { type BBResult, type BBSuccess } from '../bb/execute.js';
|
|
|
7
7
|
export declare class AvmProvingTester extends PublicTxSimulationTester {
|
|
8
8
|
private bbWorkingDirectory;
|
|
9
9
|
private checkCircuitOnly;
|
|
10
|
-
constructor(bbWorkingDirectory: string, checkCircuitOnly: boolean,
|
|
10
|
+
constructor(bbWorkingDirectory: string, checkCircuitOnly: boolean, merkleTree: MerkleTreeWriteOperations, contractDataSource: SimpleContractDataSource, globals?: GlobalVariables);
|
|
11
11
|
static new(checkCircuitOnly?: boolean, globals?: GlobalVariables): Promise<AvmProvingTester>;
|
|
12
12
|
prove(avmCircuitInputs: AvmCircuitInputs): Promise<BBResult>;
|
|
13
|
-
verify(proofRes: BBSuccess
|
|
14
|
-
proveVerify(avmCircuitInputs: AvmCircuitInputs): Promise<void>;
|
|
13
|
+
verify(proofRes: BBSuccess): Promise<BBResult>;
|
|
15
14
|
simProveVerify(sender: AztecAddress, setupCalls: TestEnqueuedCall[], appCalls: TestEnqueuedCall[], teardownCall: TestEnqueuedCall | undefined, expectRevert: boolean | undefined, feePayer?: AztecAddress): Promise<void>;
|
|
16
15
|
simProveVerifyAppLogic(appCall: TestEnqueuedCall, expectRevert?: boolean): Promise<void>;
|
|
17
16
|
}
|
|
17
|
+
export declare class AvmProvingTesterV2 extends PublicTxSimulationTester {
|
|
18
|
+
private bbWorkingDirectory;
|
|
19
|
+
constructor(bbWorkingDirectory: string, contractDataSource: SimpleContractDataSource, merkleTrees: MerkleTreeWriteOperations, globals?: GlobalVariables);
|
|
20
|
+
static new(globals?: GlobalVariables): Promise<AvmProvingTesterV2>;
|
|
21
|
+
proveV2(avmCircuitInputs: AvmCircuitInputs): Promise<BBResult>;
|
|
22
|
+
verifyV2(proofRes: BBSuccess, publicInputs: AvmCircuitPublicInputs): Promise<BBResult>;
|
|
23
|
+
simProveVerifyV2(sender: AztecAddress, setupCalls: TestEnqueuedCall[], appCalls: TestEnqueuedCall[], teardownCall: TestEnqueuedCall | undefined, expectRevert: boolean | undefined, feePayer?: AztecAddress): Promise<void>;
|
|
24
|
+
}
|
|
18
25
|
//# sourceMappingURL=avm_proving_tester.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"avm_proving_tester.d.ts","sourceRoot":"","sources":["../../src/avm_proving_tests/avm_proving_tester.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,wBAAwB,EACxB,wBAAwB,EACxB,KAAK,gBAAgB,EACtB,MAAM,kCAAkC,CAAC;AAC1C,OAAO,EAAE,KAAK,gBAAgB,EAAE,sBAAsB,EAAE,MAAM,mBAAmB,CAAC;AAClF,OAAO,EAAE,YAAY,EAAE,MAAM,6BAA6B,CAAC;AAC3D,OAAO,KAAK,EAAE,yBAAyB,EAAE,MAAM,iCAAiC,CAAC;AACjF,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,kBAAkB,CAAC;
|
|
1
|
+
{"version":3,"file":"avm_proving_tester.d.ts","sourceRoot":"","sources":["../../src/avm_proving_tests/avm_proving_tester.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,wBAAwB,EACxB,wBAAwB,EACxB,KAAK,gBAAgB,EACtB,MAAM,kCAAkC,CAAC;AAC1C,OAAO,EAAE,KAAK,gBAAgB,EAAE,sBAAsB,EAAE,MAAM,mBAAmB,CAAC;AAClF,OAAO,EAAE,YAAY,EAAE,MAAM,6BAA6B,CAAC;AAC3D,OAAO,KAAK,EAAE,yBAAyB,EAAE,MAAM,iCAAiC,CAAC;AACjF,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,kBAAkB,CAAC;AAQxD,OAAO,EACL,KAAK,QAAQ,EACb,KAAK,SAAS,EAMf,MAAM,kBAAkB,CAAC;AAK1B,qBAAa,gBAAiB,SAAQ,wBAAwB;IAE1D,OAAO,CAAC,kBAAkB;IAC1B,OAAO,CAAC,gBAAgB;gBADhB,kBAAkB,EAAE,MAAM,EAC1B,gBAAgB,EAAE,OAAO,EACjC,UAAU,EAAE,yBAAyB,EACrC,kBAAkB,EAAE,wBAAwB,EAC5C,OAAO,CAAC,EAAE,eAAe;WAMd,GAAG,CAAC,gBAAgB,GAAE,OAAe,EAAE,OAAO,CAAC,EAAE,eAAe;IAQvE,KAAK,CAAC,gBAAgB,EAAE,gBAAgB,GAAG,OAAO,CAAC,QAAQ,CAAC;IAe5D,MAAM,CAAC,QAAQ,EAAE,SAAS,GAAG,OAAO,CAAC,QAAQ,CAAC;IAgBvC,cAAc,CACzB,MAAM,EAAE,YAAY,EACpB,UAAU,EAAE,gBAAgB,EAAE,EAC9B,QAAQ,EAAE,gBAAgB,EAAE,EAC5B,YAAY,EAAE,gBAAgB,GAAG,SAAS,EAC1C,YAAY,EAAE,OAAO,GAAG,SAAS,EACjC,QAAQ,eAAS;IAWN,sBAAsB,CAAC,OAAO,EAAE,gBAAgB,EAAE,YAAY,CAAC,EAAE,OAAO;CAWtF;AAED,qBAAa,kBAAmB,SAAQ,wBAAwB;IAE5D,OAAO,CAAC,kBAAkB;gBAAlB,kBAAkB,EAAE,MAAM,EAClC,kBAAkB,EAAE,wBAAwB,EAC5C,WAAW,EAAE,yBAAyB,EACtC,OAAO,CAAC,EAAE,eAAe;WAKd,GAAG,CAAC,OAAO,CAAC,EAAE,eAAe;IAQpC,OAAO,CAAC,gBAAgB,EAAE,gBAAgB,GAAG,OAAO,CAAC,QAAQ,CAAC;IAU9D,QAAQ,CAAC,QAAQ,EAAE,SAAS,EAAE,YAAY,EAAE,sBAAsB,GAAG,OAAO,CAAC,QAAQ,CAAC;IAW/E,gBAAgB,CAC3B,MAAM,EAAE,YAAY,EACpB,UAAU,EAAE,gBAAgB,EAAE,EAC9B,QAAQ,EAAE,gBAAgB,EAAE,EAC5B,YAAY,EAAE,gBAAgB,GAAG,SAAS,EAC1C,YAAY,EAAE,OAAO,GAAG,SAAS,EACjC,QAAQ,eAAS;CAYpB"}
|
|
@@ -1,22 +1,25 @@
|
|
|
1
1
|
import { PublicTxSimulationTester, SimpleContractDataSource } from '@aztec/simulator/public/fixtures';
|
|
2
2
|
import { AztecAddress } from '@aztec/stdlib/aztec-address';
|
|
3
|
+
import { VerificationKeyData } from '@aztec/stdlib/vks';
|
|
3
4
|
import { NativeWorldStateService } from '@aztec/world-state';
|
|
4
5
|
import fs from 'node:fs/promises';
|
|
5
6
|
import { tmpdir } from 'node:os';
|
|
6
7
|
import path from 'path';
|
|
7
|
-
import { BB_RESULT,
|
|
8
|
+
import { BB_RESULT, generateAvmProof, generateAvmProofV2, verifyAvmProof, verifyAvmProofV2 } from '../bb/execute.js';
|
|
9
|
+
import { extractAvmVkData } from '../verification_key/verification_key_data.js';
|
|
8
10
|
const BB_PATH = path.resolve('../../barretenberg/cpp/build/bin/bb');
|
|
9
11
|
export class AvmProvingTester extends PublicTxSimulationTester {
|
|
10
12
|
bbWorkingDirectory;
|
|
11
13
|
checkCircuitOnly;
|
|
12
|
-
constructor(bbWorkingDirectory, checkCircuitOnly,
|
|
13
|
-
super(
|
|
14
|
+
constructor(bbWorkingDirectory, checkCircuitOnly, merkleTree, contractDataSource, globals){
|
|
15
|
+
super(merkleTree, contractDataSource, globals), this.bbWorkingDirectory = bbWorkingDirectory, this.checkCircuitOnly = checkCircuitOnly;
|
|
14
16
|
}
|
|
17
|
+
// overriding parent class' create is a pain, so we use a different nam
|
|
15
18
|
static async new(checkCircuitOnly = false, globals) {
|
|
16
19
|
const bbWorkingDirectory = await fs.mkdtemp(path.join(tmpdir(), 'bb-'));
|
|
17
20
|
const contractDataSource = new SimpleContractDataSource();
|
|
18
21
|
const merkleTrees = await (await NativeWorldStateService.tmp()).fork();
|
|
19
|
-
return new AvmProvingTester(bbWorkingDirectory, checkCircuitOnly,
|
|
22
|
+
return new AvmProvingTester(bbWorkingDirectory, checkCircuitOnly, merkleTrees, contractDataSource, globals);
|
|
20
23
|
}
|
|
21
24
|
async prove(avmCircuitInputs) {
|
|
22
25
|
// Then we prove.
|
|
@@ -24,32 +27,73 @@ export class AvmProvingTester extends PublicTxSimulationTester {
|
|
|
24
27
|
if (proofRes.status === BB_RESULT.FAILURE) {
|
|
25
28
|
this.logger.error(`Proof generation failed: ${proofRes.reason}`);
|
|
26
29
|
}
|
|
27
|
-
expect(proofRes.status).toEqual(BB_RESULT.SUCCESS);
|
|
28
30
|
return proofRes;
|
|
29
31
|
}
|
|
30
|
-
async verify(proofRes
|
|
32
|
+
async verify(proofRes) {
|
|
31
33
|
if (this.checkCircuitOnly) {
|
|
32
|
-
// Skip verification if we
|
|
33
|
-
// Check-circuit
|
|
34
|
+
// Skip verification if we're only checking the circuit.
|
|
35
|
+
// Check-circuit doesn't generate a proof to verify.
|
|
34
36
|
return proofRes;
|
|
35
37
|
}
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
const
|
|
42
|
-
|
|
38
|
+
// Then we test VK extraction and serialization.
|
|
39
|
+
const succeededRes = proofRes;
|
|
40
|
+
const vkData = await extractAvmVkData(succeededRes.vkPath);
|
|
41
|
+
VerificationKeyData.fromBuffer(vkData.toBuffer());
|
|
42
|
+
// Then we verify.
|
|
43
|
+
const rawVkPath = path.join(succeededRes.vkPath, 'vk');
|
|
44
|
+
return await verifyAvmProof(BB_PATH, succeededRes.proofPath, rawVkPath, this.logger);
|
|
43
45
|
}
|
|
44
46
|
async simProveVerify(sender, setupCalls, appCalls, teardownCall, expectRevert, feePayer = sender) {
|
|
45
47
|
const simRes = await this.simulateTx(sender, setupCalls, appCalls, teardownCall, feePayer);
|
|
46
48
|
expect(simRes.revertCode.isOK()).toBe(expectRevert ? false : true);
|
|
47
49
|
const avmCircuitInputs = simRes.avmProvingRequest.inputs;
|
|
48
|
-
await this.
|
|
50
|
+
const provingRes = await this.prove(avmCircuitInputs);
|
|
51
|
+
expect(provingRes.status).toEqual(BB_RESULT.SUCCESS);
|
|
52
|
+
const verificationRes = await this.verify(provingRes);
|
|
53
|
+
expect(verificationRes.status).toBe(BB_RESULT.SUCCESS);
|
|
49
54
|
}
|
|
50
55
|
async simProveVerifyAppLogic(appCall, expectRevert) {
|
|
51
|
-
await this.
|
|
56
|
+
const simRes = await this.simulateTx(/*sender=*/ AztecAddress.fromNumber(42), /*setupCalls=*/ [], [
|
|
52
57
|
appCall
|
|
53
|
-
]
|
|
58
|
+
]);
|
|
59
|
+
expect(simRes.revertCode.isOK()).toBe(expectRevert ? false : true);
|
|
60
|
+
const avmCircuitInputs = simRes.avmProvingRequest.inputs;
|
|
61
|
+
const provingRes = await this.prove(avmCircuitInputs);
|
|
62
|
+
expect(provingRes.status).toEqual(BB_RESULT.SUCCESS);
|
|
63
|
+
const verificationRes = await this.verify(provingRes);
|
|
64
|
+
expect(verificationRes.status).toBe(BB_RESULT.SUCCESS);
|
|
65
|
+
}
|
|
66
|
+
}
|
|
67
|
+
export class AvmProvingTesterV2 extends PublicTxSimulationTester {
|
|
68
|
+
bbWorkingDirectory;
|
|
69
|
+
constructor(bbWorkingDirectory, contractDataSource, merkleTrees, globals){
|
|
70
|
+
super(merkleTrees, contractDataSource, globals), this.bbWorkingDirectory = bbWorkingDirectory;
|
|
71
|
+
}
|
|
72
|
+
static async new(globals) {
|
|
73
|
+
const bbWorkingDirectory = await fs.mkdtemp(path.join(tmpdir(), 'bb-'));
|
|
74
|
+
const contractDataSource = new SimpleContractDataSource();
|
|
75
|
+
const merkleTrees = await (await NativeWorldStateService.tmp()).fork();
|
|
76
|
+
return new AvmProvingTesterV2(bbWorkingDirectory, contractDataSource, merkleTrees, globals);
|
|
77
|
+
}
|
|
78
|
+
async proveV2(avmCircuitInputs) {
|
|
79
|
+
// Then we prove.
|
|
80
|
+
const proofRes = await generateAvmProofV2(BB_PATH, this.bbWorkingDirectory, avmCircuitInputs, this.logger);
|
|
81
|
+
if (proofRes.status === BB_RESULT.FAILURE) {
|
|
82
|
+
this.logger.error(`Proof generation failed: ${proofRes.reason}`);
|
|
83
|
+
}
|
|
84
|
+
expect(proofRes.status).toEqual(BB_RESULT.SUCCESS);
|
|
85
|
+
return proofRes;
|
|
86
|
+
}
|
|
87
|
+
async verifyV2(proofRes, publicInputs) {
|
|
88
|
+
return await verifyAvmProofV2(BB_PATH, this.bbWorkingDirectory, proofRes.proofPath, publicInputs, proofRes.vkPath, this.logger);
|
|
89
|
+
}
|
|
90
|
+
async simProveVerifyV2(sender, setupCalls, appCalls, teardownCall, expectRevert, feePayer = sender) {
|
|
91
|
+
const simRes = await this.simulateTx(sender, setupCalls, appCalls, teardownCall, feePayer);
|
|
92
|
+
expect(simRes.revertCode.isOK()).toBe(expectRevert ? false : true);
|
|
93
|
+
const avmCircuitInputs = simRes.avmProvingRequest.inputs;
|
|
94
|
+
const provingRes = await this.proveV2(avmCircuitInputs);
|
|
95
|
+
expect(provingRes.status).toEqual(BB_RESULT.SUCCESS);
|
|
96
|
+
const verificationRes = await this.verifyV2(provingRes, avmCircuitInputs.publicInputs);
|
|
97
|
+
expect(verificationRes.status).toBe(BB_RESULT.SUCCESS);
|
|
54
98
|
}
|
|
55
99
|
}
|
package/dest/bb/execute.d.ts
CHANGED
|
@@ -22,7 +22,7 @@ export type BBSuccess = {
|
|
|
22
22
|
/** Full path of the public key. */
|
|
23
23
|
pkPath?: string;
|
|
24
24
|
/** Base directory for the VKs (raw, fields). */
|
|
25
|
-
|
|
25
|
+
vkPath?: string;
|
|
26
26
|
/** Full path of the proof. */
|
|
27
27
|
proofPath?: string;
|
|
28
28
|
/** Full path of the contract. */
|
|
@@ -36,6 +36,7 @@ export type BBFailure = {
|
|
|
36
36
|
retry?: boolean;
|
|
37
37
|
};
|
|
38
38
|
export type BBResult = BBSuccess | BBFailure;
|
|
39
|
+
export type VerificationFunction = typeof verifyProof | typeof verifyAvmProof;
|
|
39
40
|
type BBExecResult = {
|
|
40
41
|
status: BB_RESULT;
|
|
41
42
|
exitCode: number;
|
|
@@ -78,11 +79,20 @@ export declare function generateTubeProof(pathToBB: string, workingDirectory: st
|
|
|
78
79
|
* @param pathToBB - The full path to the bb binary
|
|
79
80
|
* @param workingDirectory - A working directory for use by bb
|
|
80
81
|
* @param input - The inputs for the public function to be proven
|
|
81
|
-
* @param
|
|
82
|
-
* @
|
|
82
|
+
* @param log - A logging function
|
|
83
|
+
* @returns An object containing a result indication, the location of the proof and the duration taken
|
|
84
|
+
*/
|
|
85
|
+
export declare function generateAvmProofV2(pathToBB: string, workingDirectory: string, input: AvmCircuitInputs, logger: Logger): Promise<BBFailure | BBSuccess>;
|
|
86
|
+
/**
|
|
87
|
+
* Used for generating AVM proofs (or doing check-circuit).
|
|
88
|
+
* It is assumed that the working directory is a temporary and/or random directory used solely for generating this proof.
|
|
89
|
+
* @param pathToBB - The full path to the bb binary
|
|
90
|
+
* @param workingDirectory - A working directory for use by bb
|
|
91
|
+
* @param bytecode - The AVM bytecode for the public function to be proven (expected to be decompressed)
|
|
92
|
+
* @param log - A logging function
|
|
83
93
|
* @returns An object containing a result indication, the location of the proof and the duration taken
|
|
84
94
|
*/
|
|
85
|
-
export declare function generateAvmProof(pathToBB: string, workingDirectory: string,
|
|
95
|
+
export declare function generateAvmProof(pathToBB: string, workingDirectory: string, _input: AvmCircuitInputs, logger: Logger, checkCircuitOnly?: boolean): Promise<BBFailure | BBSuccess>;
|
|
86
96
|
/**
|
|
87
97
|
* Used for verifying proofs of noir circuits
|
|
88
98
|
* @param pathToBB - The full path to the bb binary
|
|
@@ -92,7 +102,16 @@ export declare function generateAvmProof(pathToBB: string, workingDirectory: str
|
|
|
92
102
|
* @returns An object containing a result indication and duration taken
|
|
93
103
|
*/
|
|
94
104
|
export declare function verifyProof(pathToBB: string, proofFullPath: string, verificationKeyPath: string, ultraHonkFlavor: UltraHonkFlavor, log: Logger): Promise<BBFailure | BBSuccess>;
|
|
95
|
-
|
|
105
|
+
/**
|
|
106
|
+
* Used for verifying proofs of the AVM
|
|
107
|
+
* @param pathToBB - The full path to the bb binary
|
|
108
|
+
* @param proofFullPath - The full path to the proof to be verified
|
|
109
|
+
* @param verificationKeyPath - The full path to the circuit verification key
|
|
110
|
+
* @param log - A logging function
|
|
111
|
+
* @returns An object containing a result indication and duration taken
|
|
112
|
+
*/
|
|
113
|
+
export declare function verifyAvmProof(pathToBB: string, proofFullPath: string, verificationKeyPath: string, logger: Logger): Promise<BBFailure | BBSuccess>;
|
|
114
|
+
export declare function verifyAvmProofV2(pathToBB: string, workingDirectory: string, proofFullPath: string, publicInputs: AvmCircuitPublicInputs, verificationKeyPath: string, logger: Logger): Promise<BBFailure | BBSuccess>;
|
|
96
115
|
/**
|
|
97
116
|
* Verifies a ClientIvcProof
|
|
98
117
|
* TODO(#7370) The verification keys should be supplied separately
|
package/dest/bb/execute.d.ts.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"execute.d.ts","sourceRoot":"","sources":["../../src/bb/execute.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,EAAE,MAAM,uBAAuB,CAAC;AAE3D,OAAO,KAAK,EAAE,gBAAgB,EAAE,sBAAsB,EAAE,MAAM,mBAAmB,CAAC;AAOlF,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,YAAY,CAAC;AAElD,eAAO,MAAM,WAAW,OAAO,CAAC;AAChC,eAAO,MAAM,kBAAkB,mBAAmB,CAAC;AACnD,eAAO,MAAM,sBAAsB,kBAAkB,CAAC;AACtD,eAAO,MAAM,6BAA6B,8BAA8B,CAAC;AACzE,eAAO,MAAM,cAAc,UAAU,CAAC;AACtC,eAAO,MAAM,qBAAqB,sBAAsB,CAAC;AACzD,eAAO,MAAM,mBAAmB,mBAAmB,CAAC;AACpD,eAAO,MAAM,qBAAqB,qBAAqB,CAAC;AACxD,eAAO,MAAM,0BAA0B,0BAA0B,CAAC;AAClE,eAAO,MAAM,0BAA0B,UAAU,CAAC;AAElD,oBAAY,SAAS;IACnB,OAAO,IAAA;IACP,OAAO,IAAA;IACP,eAAe,IAAA;CAChB;AAED,MAAM,MAAM,SAAS,GAAG;IACtB,MAAM,EAAE,SAAS,CAAC,OAAO,GAAG,SAAS,CAAC,eAAe,CAAC;IACtD,UAAU,EAAE,MAAM,CAAC;IACnB,mCAAmC;IACnC,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,gDAAgD;IAChD,
|
|
1
|
+
{"version":3,"file":"execute.d.ts","sourceRoot":"","sources":["../../src/bb/execute.ts"],"names":[],"mappings":"AACA,OAAO,KAAK,EAAE,KAAK,EAAE,MAAM,EAAE,MAAM,uBAAuB,CAAC;AAE3D,OAAO,KAAK,EAAE,gBAAgB,EAAE,sBAAsB,EAAE,MAAM,mBAAmB,CAAC;AAOlF,OAAO,KAAK,EAAE,eAAe,EAAE,MAAM,YAAY,CAAC;AAElD,eAAO,MAAM,WAAW,OAAO,CAAC;AAChC,eAAO,MAAM,kBAAkB,mBAAmB,CAAC;AACnD,eAAO,MAAM,sBAAsB,kBAAkB,CAAC;AACtD,eAAO,MAAM,6BAA6B,8BAA8B,CAAC;AACzE,eAAO,MAAM,cAAc,UAAU,CAAC;AACtC,eAAO,MAAM,qBAAqB,sBAAsB,CAAC;AACzD,eAAO,MAAM,mBAAmB,mBAAmB,CAAC;AACpD,eAAO,MAAM,qBAAqB,qBAAqB,CAAC;AACxD,eAAO,MAAM,0BAA0B,0BAA0B,CAAC;AAClE,eAAO,MAAM,0BAA0B,UAAU,CAAC;AAElD,oBAAY,SAAS;IACnB,OAAO,IAAA;IACP,OAAO,IAAA;IACP,eAAe,IAAA;CAChB;AAED,MAAM,MAAM,SAAS,GAAG;IACtB,MAAM,EAAE,SAAS,CAAC,OAAO,GAAG,SAAS,CAAC,eAAe,CAAC;IACtD,UAAU,EAAE,MAAM,CAAC;IACnB,mCAAmC;IACnC,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,gDAAgD;IAChD,MAAM,CAAC,EAAE,MAAM,CAAC;IAChB,8BAA8B;IAC9B,SAAS,CAAC,EAAE,MAAM,CAAC;IACnB,iCAAiC;IACjC,YAAY,CAAC,EAAE,MAAM,CAAC;IACtB,0CAA0C;IAC1C,WAAW,CAAC,EAAE,MAAM,CAAC;CACtB,CAAC;AAEF,MAAM,MAAM,SAAS,GAAG;IACtB,MAAM,EAAE,SAAS,CAAC,OAAO,CAAC;IAC1B,MAAM,EAAE,MAAM,CAAC;IACf,KAAK,CAAC,EAAE,OAAO,CAAC;CACjB,CAAC;AAEF,MAAM,MAAM,QAAQ,GAAG,SAAS,GAAG,SAAS,CAAC;AAE7C,MAAM,MAAM,oBAAoB,GAAG,OAAO,WAAW,GAAG,OAAO,cAAc,CAAC;AAE9E,KAAK,YAAY,GAAG;IAClB,MAAM,EAAE,SAAS,CAAC;IAClB,QAAQ,EAAE,MAAM,CAAC;IACjB,MAAM,EAAE,MAAM,GAAG,SAAS,CAAC;CAC5B,CAAC;AAEF;;;;;;;;;GASG;AACH,wBAAgB,SAAS,CACvB,QAAQ,EAAE,MAAM,EAChB,OAAO,EAAE,MAAM,EACf,IAAI,EAAE,MAAM,EAAE,EACd,MAAM,EAAE,KAAK,EACb,OAAO,CAAC,EAAE,MAAM,EAChB,YAAY,IAAI,MAAM,MAAM,cAAe,GAC1C,OAAO,CAAC,YAAY,CAAC,CAoDvB;AAED,wBAAsB,uBAAuB,CAC3C,QAAQ,EAAE,MAAM,EAChB,gBAAgB,EAAE,MAAM,EACxB,UAAU,EAAE,MAAM,EAClB,GAAG,EAAE,KAAK,EACV,OAAO,UAAQ,GACd,OAAO,CAAC,SAAS,GAAG,SAAS,CAAC,CAoDhC;AAmBD;;;;;;;;;;GAUG;AACH,wBAAsB,aAAa,CACjC,QAAQ,EAAE,MAAM,EAChB,gBAAgB,EAAE,MAAM,EACxB,WAAW,EAAE,MAAM,EACnB,QAAQ,EAAE,MAAM,EAChB,SAAS,EAAE,OAAO,EAClB,gBAAgB,EAAE,MAAM,EACxB,MAAM,EAAE,eAAe,EACvB,GAAG,EAAE,KAAK,GACT,OAAO,CAAC,SAAS,GAAG,SAAS,CAAC,CAiEhC;AAED;;;;;GAKG;AACH,wBAAsB,iBAAiB,CACrC,QAAQ,EAAE,MAAM,EAChB,gBAAgB,EAAE,MAAM,EACxB,MAAM,EAAE,MAAM,EACd,GAAG,EAAE,KAAK,GACT,OAAO,CAAC,SAAS,GAAG,SAAS,CAAC,CAuDhC;AAED;;;;;;;;GAQG;AACH,wBAAsB,kBAAkB,CACtC,QAAQ,EAAE,MAAM,EAChB,gBAAgB,EAAE,MAAM,EACxB,KAAK,EAAE,gBAAgB,EACvB,MAAM,EAAE,MAAM,GACb,OAAO,CAAC,SAAS,GAAG,SAAS,CAAC,CA+DhC;AAED;;;;;;;;GAQG;AACH,wBAAsB,gBAAgB,CACpC,QAAQ,EAAE,MAAM,EAChB,gBAAgB,EAAE,MAAM,EACxB,MAAM,EAAE,gBAAgB,EACxB,MAAM,EAAE,MAAM,EACd,gBAAgB,GAAE,OAAe,GAChC,OAAO,CAAC,SAAS,GAAG,SAAS,CAAC,CAwEhC;AAED;;;;;;;GAOG;AACH,wBAAsB,WAAW,CAC/B,QAAQ,EAAE,MAAM,EAChB,aAAa,EAAE,MAAM,EACrB,mBAAmB,EAAE,MAAM,EAC3B,eAAe,EAAE,eAAe,EAChC,GAAG,EAAE,MAAM,GACV,OAAO,CAAC,SAAS,GAAG,SAAS,CAAC,CAShC;AAED;;;;;;;GAOG;AACH,wBAAsB,cAAc,CAClC,QAAQ,EAAE,MAAM,EAChB,aAAa,EAAE,MAAM,EACrB,mBAAmB,EAAE,MAAM,EAC3B,MAAM,EAAE,MAAM,GACb,OAAO,CAAC,SAAS,GAAG,SAAS,CAAC,CAEhC;AAED,wBAAsB,gBAAgB,CACpC,QAAQ,EAAE,MAAM,EAChB,gBAAgB,EAAE,MAAM,EACxB,aAAa,EAAE,MAAM,EACrB,YAAY,EAAE,sBAAsB,EACpC,mBAAmB,EAAE,MAAM,EAC3B,MAAM,EAAE,MAAM,GACb,OAAO,CAAC,SAAS,GAAG,SAAS,CAAC,CAmBhC;AAED;;;;;;;GAOG;AACH,wBAAsB,oBAAoB,CACxC,QAAQ,EAAE,MAAM,EAChB,SAAS,EAAE,MAAM,EACjB,OAAO,EAAE,MAAM,EACf,GAAG,EAAE,KAAK,GACT,OAAO,CAAC,SAAS,GAAG,SAAS,CAAC,CA2BhC;AAkED,wBAAsB,kCAAkC,CACtD,QAAQ,EAAE,MAAM,EAChB,UAAU,EAAE,MAAM,EAClB,YAAY,EAAE,MAAM,EACpB,GAAG,EAAE,KAAK,GACT,OAAO,CAAC,SAAS,GAAG,SAAS,CAAC,CA8ChC;AAED;;;;;;;;GAQG;AACH,wBAAsB,0BAA0B,CAC9C,QAAQ,EAAE,MAAM,EAChB,gBAAgB,EAAE,MAAM,EACxB,WAAW,EAAE,MAAM,EACnB,QAAQ,EAAE,MAAM,EAChB,MAAM,EAAE,eAAe,GAAG,WAAW,EACrC,GAAG,EAAE,KAAK,GACT,OAAO,CAAC,SAAS,GAAG,SAAS,CAAC,CA0DhC"}
|
package/dest/bb/execute.js
CHANGED
|
@@ -145,7 +145,7 @@ export async function executeBbClientIvcProof(pathToBB, workingDirectory, inputs
|
|
|
145
145
|
durationMs,
|
|
146
146
|
proofPath: `${outputPath}`,
|
|
147
147
|
pkPath: undefined,
|
|
148
|
-
|
|
148
|
+
vkPath: `${outputPath}`
|
|
149
149
|
};
|
|
150
150
|
}
|
|
151
151
|
// Not a great error message here but it is difficult to decipher what comes from bb
|
|
@@ -263,7 +263,7 @@ function getArgs(flavor) {
|
|
|
263
263
|
durationMs: duration,
|
|
264
264
|
proofPath: `${outputPath}`,
|
|
265
265
|
pkPath: undefined,
|
|
266
|
-
|
|
266
|
+
vkPath: `${outputPath}`
|
|
267
267
|
};
|
|
268
268
|
}
|
|
269
269
|
// Not a great error message here but it is difficult to decipher what comes from bb
|
|
@@ -332,7 +332,7 @@ function getArgs(flavor) {
|
|
|
332
332
|
durationMs,
|
|
333
333
|
proofPath: outputPath,
|
|
334
334
|
pkPath: undefined,
|
|
335
|
-
|
|
335
|
+
vkPath: outputPath
|
|
336
336
|
};
|
|
337
337
|
}
|
|
338
338
|
// Not a great error message here but it is difficult to decipher what comes from bb
|
|
@@ -354,10 +354,9 @@ function getArgs(flavor) {
|
|
|
354
354
|
* @param pathToBB - The full path to the bb binary
|
|
355
355
|
* @param workingDirectory - A working directory for use by bb
|
|
356
356
|
* @param input - The inputs for the public function to be proven
|
|
357
|
-
* @param
|
|
358
|
-
* @param checkCircuitOnly - A boolean to toggle a "check-circuit only" operation instead of proving.
|
|
357
|
+
* @param log - A logging function
|
|
359
358
|
* @returns An object containing a result indication, the location of the proof and the duration taken
|
|
360
|
-
*/ export async function
|
|
359
|
+
*/ export async function generateAvmProofV2(pathToBB, workingDirectory, input, logger) {
|
|
361
360
|
// Check that the working directory exists
|
|
362
361
|
try {
|
|
363
362
|
await fs.access(workingDirectory);
|
|
@@ -399,11 +398,90 @@ function getArgs(flavor) {
|
|
|
399
398
|
args.push(loggingArg);
|
|
400
399
|
}
|
|
401
400
|
const timer = new Timer();
|
|
402
|
-
const
|
|
401
|
+
const logFunction = (message)=>{
|
|
402
|
+
logger.verbose(`AvmCircuit (prove) BB out - ${message}`);
|
|
403
|
+
};
|
|
404
|
+
const result = await executeBB(pathToBB, 'avm2_prove', args, logFunction);
|
|
405
|
+
const duration = timer.ms();
|
|
406
|
+
if (result.status == 0) {
|
|
407
|
+
return {
|
|
408
|
+
status: 0,
|
|
409
|
+
durationMs: duration,
|
|
410
|
+
proofPath: join(outputPath, PROOF_FILENAME),
|
|
411
|
+
pkPath: undefined,
|
|
412
|
+
vkPath: join(outputPath, VK_FILENAME)
|
|
413
|
+
};
|
|
414
|
+
}
|
|
415
|
+
// Not a great error message here but it is difficult to decipher what comes from bb
|
|
416
|
+
return {
|
|
417
|
+
status: 1,
|
|
418
|
+
reason: `Failed to generate proof. Exit code ${result.exitCode}. Signal ${result.signal}.`,
|
|
419
|
+
retry: !!result.signal
|
|
420
|
+
};
|
|
421
|
+
} catch (error) {
|
|
422
|
+
return {
|
|
423
|
+
status: 1,
|
|
424
|
+
reason: `${error}`
|
|
425
|
+
};
|
|
426
|
+
}
|
|
427
|
+
}
|
|
428
|
+
/**
|
|
429
|
+
* Used for generating AVM proofs (or doing check-circuit).
|
|
430
|
+
* It is assumed that the working directory is a temporary and/or random directory used solely for generating this proof.
|
|
431
|
+
* @param pathToBB - The full path to the bb binary
|
|
432
|
+
* @param workingDirectory - A working directory for use by bb
|
|
433
|
+
* @param bytecode - The AVM bytecode for the public function to be proven (expected to be decompressed)
|
|
434
|
+
* @param log - A logging function
|
|
435
|
+
* @returns An object containing a result indication, the location of the proof and the duration taken
|
|
436
|
+
*/ export async function generateAvmProof(pathToBB, workingDirectory, _input, logger, checkCircuitOnly = false) {
|
|
437
|
+
// Check that the working directory exists
|
|
438
|
+
try {
|
|
439
|
+
await fs.access(workingDirectory);
|
|
440
|
+
} catch {
|
|
441
|
+
return {
|
|
442
|
+
status: 1,
|
|
443
|
+
reason: `Working directory ${workingDirectory} does not exist`
|
|
444
|
+
};
|
|
445
|
+
}
|
|
446
|
+
// Paths for the inputs
|
|
447
|
+
const publicInputsPath = join(workingDirectory, AVM_PUBLIC_INPUTS_FILENAME);
|
|
448
|
+
// The proof is written to e.g. /workingDirectory/proof
|
|
449
|
+
const outputPath = workingDirectory;
|
|
450
|
+
const filePresent = async (file)=>await fs.access(file, fs.constants.R_OK).then((_)=>true).catch((_)=>false);
|
|
451
|
+
const binaryPresent = await filePresent(pathToBB);
|
|
452
|
+
if (!binaryPresent) {
|
|
453
|
+
return {
|
|
454
|
+
status: 1,
|
|
455
|
+
reason: `Failed to find bb binary at ${pathToBB}`
|
|
456
|
+
};
|
|
457
|
+
}
|
|
458
|
+
try {
|
|
459
|
+
// Write the inputs to the working directory.
|
|
460
|
+
// WARNING: Not writing the inputs since VM1 is disabled!
|
|
461
|
+
// await fs.writeFile(publicInputsPath, input.publicInputs.toBuffer());
|
|
462
|
+
// if (!(await filePresent(publicInputsPath))) {
|
|
463
|
+
// return { status: BB_RESULT.FAILURE, reason: `Could not write publicInputs at ${publicInputsPath}` };
|
|
464
|
+
// }
|
|
465
|
+
// await fs.writeFile(avmHintsPath, input.avmHints.toBuffer());
|
|
466
|
+
// if (!(await filePresent(avmHintsPath))) {
|
|
467
|
+
// return { status: BB_RESULT.FAILURE, reason: `Could not write avmHints at ${avmHintsPath}` };
|
|
468
|
+
// }
|
|
469
|
+
const args = [
|
|
470
|
+
'--avm-public-inputs',
|
|
471
|
+
publicInputsPath,
|
|
472
|
+
'-o',
|
|
473
|
+
outputPath
|
|
474
|
+
];
|
|
475
|
+
const loggingArg = logger.level === 'debug' || logger.level === 'trace' ? '-d' : logger.level === 'verbose' ? '-v' : '';
|
|
476
|
+
if (loggingArg !== '') {
|
|
477
|
+
args.push(loggingArg);
|
|
478
|
+
}
|
|
479
|
+
const timer = new Timer();
|
|
480
|
+
const cmd = checkCircuitOnly ? 'check_circuit' : 'prove';
|
|
403
481
|
const logFunction = (message)=>{
|
|
404
482
|
logger.verbose(`AvmCircuit (${cmd}) BB out - ${message}`);
|
|
405
483
|
};
|
|
406
|
-
const result = await executeBB(pathToBB, cmd
|
|
484
|
+
const result = await executeBB(pathToBB, `avm_${cmd}`, args, logFunction);
|
|
407
485
|
const duration = timer.ms();
|
|
408
486
|
if (result.status == 0) {
|
|
409
487
|
return {
|
|
@@ -411,7 +489,7 @@ function getArgs(flavor) {
|
|
|
411
489
|
durationMs: duration,
|
|
412
490
|
proofPath: join(outputPath, PROOF_FILENAME),
|
|
413
491
|
pkPath: undefined,
|
|
414
|
-
|
|
492
|
+
vkPath: outputPath
|
|
415
493
|
};
|
|
416
494
|
}
|
|
417
495
|
// Not a great error message here but it is difficult to decipher what comes from bb
|
|
@@ -437,7 +515,17 @@ function getArgs(flavor) {
|
|
|
437
515
|
*/ export async function verifyProof(pathToBB, proofFullPath, verificationKeyPath, ultraHonkFlavor, log) {
|
|
438
516
|
return await verifyProofInternal(pathToBB, proofFullPath, verificationKeyPath, `verify`, log, getArgs(ultraHonkFlavor));
|
|
439
517
|
}
|
|
440
|
-
|
|
518
|
+
/**
|
|
519
|
+
* Used for verifying proofs of the AVM
|
|
520
|
+
* @param pathToBB - The full path to the bb binary
|
|
521
|
+
* @param proofFullPath - The full path to the proof to be verified
|
|
522
|
+
* @param verificationKeyPath - The full path to the circuit verification key
|
|
523
|
+
* @param log - A logging function
|
|
524
|
+
* @returns An object containing a result indication and duration taken
|
|
525
|
+
*/ export async function verifyAvmProof(pathToBB, proofFullPath, verificationKeyPath, logger) {
|
|
526
|
+
return await verifyProofInternal(pathToBB, proofFullPath, verificationKeyPath, 'avm_verify', logger);
|
|
527
|
+
}
|
|
528
|
+
export async function verifyAvmProofV2(pathToBB, workingDirectory, proofFullPath, publicInputs, verificationKeyPath, logger) {
|
|
441
529
|
const inputsBuffer = publicInputs.serializeWithMessagePack();
|
|
442
530
|
// Write the inputs to the working directory.
|
|
443
531
|
const filePresent = async (file)=>await fs.access(file, fs.constants.R_OK).then((_)=>true).catch((_)=>false);
|
|
@@ -449,7 +537,7 @@ export async function verifyAvmProof(pathToBB, workingDirectory, proofFullPath,
|
|
|
449
537
|
reason: `Could not write avm inputs to ${avmInputsPath}`
|
|
450
538
|
};
|
|
451
539
|
}
|
|
452
|
-
return await verifyProofInternal(pathToBB, proofFullPath, verificationKeyPath, '
|
|
540
|
+
return await verifyProofInternal(pathToBB, proofFullPath, verificationKeyPath, 'avm2_verify', logger, [
|
|
453
541
|
'--avm-public-inputs',
|
|
454
542
|
avmInputsPath
|
|
455
543
|
]);
|
|
@@ -521,14 +609,14 @@ export async function verifyAvmProof(pathToBB, workingDirectory, proofFullPath,
|
|
|
521
609
|
const logFunction = (message)=>{
|
|
522
610
|
logger.verbose(`bb-prover (verify) BB out - ${message}`);
|
|
523
611
|
};
|
|
612
|
+
// take proofFullPath and remove the suffix past the / to get the directory
|
|
613
|
+
const proofDir = proofFullPath.substring(0, proofFullPath.lastIndexOf('/'));
|
|
614
|
+
const publicInputsFullPath = join(proofDir, '/public_inputs');
|
|
615
|
+
logger.debug(`public inputs path: ${publicInputsFullPath}`);
|
|
524
616
|
try {
|
|
525
617
|
let args;
|
|
618
|
+
// Specify the public inputs path in the case of UH verification.
|
|
526
619
|
if (command == 'verify') {
|
|
527
|
-
// Specify the public inputs path in the case of UH verification.
|
|
528
|
-
// Take proofFullPath and remove the suffix past the / to get the directory.
|
|
529
|
-
const proofDir = proofFullPath.substring(0, proofFullPath.lastIndexOf('/'));
|
|
530
|
-
const publicInputsFullPath = join(proofDir, '/public_inputs');
|
|
531
|
-
logger.debug(`public inputs path: ${publicInputsFullPath}`);
|
|
532
620
|
args = [
|
|
533
621
|
'-p',
|
|
534
622
|
proofFullPath,
|
|
@@ -1,10 +1,10 @@
|
|
|
1
|
-
import {
|
|
1
|
+
import { AVM_PROOF_LENGTH_IN_FIELDS, NESTED_RECURSIVE_PROOF_LENGTH, NESTED_RECURSIVE_ROLLUP_HONK_PROOF_LENGTH, RECURSIVE_PROOF_LENGTH, TUBE_PROOF_LENGTH } from '@aztec/constants';
|
|
2
2
|
import { type ServerProtocolArtifact } from '@aztec/noir-protocol-circuits-types/server';
|
|
3
|
-
import type { AvmCircuitInputs
|
|
3
|
+
import type { AvmCircuitInputs } from '@aztec/stdlib/avm';
|
|
4
4
|
import { type ProofAndVerificationKey, type PublicInputsAndRecursiveProof, type ServerCircuitProver } from '@aztec/stdlib/interfaces/server';
|
|
5
5
|
import type { BaseParityInputs, ParityPublicInputs, RootParityInputs } from '@aztec/stdlib/parity';
|
|
6
6
|
import { Proof } from '@aztec/stdlib/proofs';
|
|
7
|
-
import {
|
|
7
|
+
import type { BaseOrMergeRollupPublicInputs, BlockMergeRollupInputs, BlockRootOrBlockMergePublicInputs, BlockRootRollupInputs, EmptyBlockRootRollupInputs, MergeRollupInputs, PrivateBaseRollupInputs, PublicBaseRollupInputs, RootRollupInputs, RootRollupPublicInputs, SingleTxBlockRootRollupInputs, TubeInputs } from '@aztec/stdlib/rollup';
|
|
8
8
|
import type { VerificationKeyData } from '@aztec/stdlib/vks';
|
|
9
9
|
import { type TelemetryClient } from '@aztec/telemetry-client';
|
|
10
10
|
import type { ACVMConfig, BBConfig } from '../../config.js';
|
|
@@ -38,7 +38,7 @@ export declare class BBNativeRollupProver implements ServerCircuitProver {
|
|
|
38
38
|
* @param inputs - The inputs to the AVM circuit.
|
|
39
39
|
* @returns The proof.
|
|
40
40
|
*/
|
|
41
|
-
getAvmProof(inputs: AvmCircuitInputs
|
|
41
|
+
getAvmProof(inputs: AvmCircuitInputs): Promise<ProofAndVerificationKey<typeof AVM_PROOF_LENGTH_IN_FIELDS>>;
|
|
42
42
|
/**
|
|
43
43
|
* Simulates the base rollup circuit from its inputs.
|
|
44
44
|
* @param inputs - Inputs to the circuit.
|
|
@@ -104,7 +104,7 @@ export declare class BBNativeRollupProver implements ServerCircuitProver {
|
|
|
104
104
|
* @param proof - The proof to be verified
|
|
105
105
|
*/
|
|
106
106
|
verifyProof(circuitType: ServerProtocolArtifact, proof: Proof): Promise<void>;
|
|
107
|
-
verifyAvmProof(proof: Proof, verificationKey: VerificationKeyData
|
|
107
|
+
verifyAvmProof(proof: Proof, verificationKey: VerificationKeyData): Promise<void>;
|
|
108
108
|
verifyWithKey(flavor: UltraHonkFlavor, verificationKey: VerificationKeyData, proof: Proof): Promise<void>;
|
|
109
109
|
private verifyWithKeyInternal;
|
|
110
110
|
/**
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"bb_prover.d.ts","sourceRoot":"","sources":["../../../src/prover/server/bb_prover.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,
|
|
1
|
+
{"version":3,"file":"bb_prover.d.ts","sourceRoot":"","sources":["../../../src/prover/server/bb_prover.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,0BAA0B,EAC1B,6BAA6B,EAC7B,yCAAyC,EAEzC,sBAAsB,EACtB,iBAAiB,EAClB,MAAM,kBAAkB,CAAC;AAK1B,OAAO,EACL,KAAK,sBAAsB,EAsB5B,MAAM,4CAA4C,CAAC;AAIpD,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,mBAAmB,CAAC;AAE1D,OAAO,EACL,KAAK,uBAAuB,EAC5B,KAAK,6BAA6B,EAClC,KAAK,mBAAmB,EAGzB,MAAM,iCAAiC,CAAC;AACzC,OAAO,KAAK,EAAE,gBAAgB,EAAE,kBAAkB,EAAE,gBAAgB,EAAE,MAAM,sBAAsB,CAAC;AACnG,OAAO,EAAE,KAAK,EAAgD,MAAM,sBAAsB,CAAC;AAC3F,OAAO,KAAK,EACV,6BAA6B,EAC7B,sBAAsB,EACtB,iCAAiC,EACjC,qBAAqB,EACrB,0BAA0B,EAC1B,iBAAiB,EACjB,uBAAuB,EACvB,sBAAsB,EACtB,gBAAgB,EAChB,sBAAsB,EACtB,6BAA6B,EAC7B,UAAU,EACX,MAAM,sBAAsB,CAAC;AAE9B,OAAO,KAAK,EAAE,mBAAmB,EAAE,MAAM,mBAAmB,CAAC;AAC7D,OAAO,EAAc,KAAK,eAAe,EAAiC,MAAM,yBAAyB,CAAC;AAmB1G,OAAO,KAAK,EAAE,UAAU,EAAE,QAAQ,EAAE,MAAM,iBAAiB,CAAC;AAC5D,OAAO,EAAE,KAAK,eAAe,EAAgC,MAAM,eAAe,CAAC;AAYnF,MAAM,WAAW,cAAe,SAAQ,QAAQ,EAAE,UAAU;IAE1D,aAAa,CAAC,EAAE,sBAAsB,EAAE,CAAC;CAC1C;AAED;;GAEG;AACH,qBAAa,oBAAqB,YAAW,mBAAmB;IAI5D,OAAO,CAAC,MAAM;IAHhB,OAAO,CAAC,eAAe,CAAwB;gBAGrC,MAAM,EAAE,cAAc,EAC9B,SAAS,EAAE,eAAe;IAK5B,IAAI,MAAM,6CAET;WAEY,GAAG,CAAC,MAAM,EAAE,cAAc,EAAE,SAAS,GAAE,eAAsC;IAW1F;;;;OAIG;IAEU,kBAAkB,CAC7B,MAAM,EAAE,gBAAgB,GACvB,OAAO,CAAC,6BAA6B,CAAC,kBAAkB,EAAE,OAAO,sBAAsB,CAAC,CAAC;IAe5F;;;;OAIG;IAEU,kBAAkB,CAC7B,MAAM,EAAE,gBAAgB,GACvB,OAAO,CAAC,6BAA6B,CAAC,kBAAkB,EAAE,OAAO,6BAA6B,CAAC,CAAC;IAenG;;;;OAIG;IAIU,WAAW,CACtB,MAAM,EAAE,gBAAgB,GACvB,OAAO,CAAC,uBAAuB,CAAC,OAAO,0BAA0B,CAAC,CAAC;IAMtE;;;;OAIG;IACU,yBAAyB,CACpC,MAAM,EAAE,uBAAuB,GAC9B,OAAO,CACR,6BAA6B,CAAC,6BAA6B,EAAE,OAAO,yCAAyC,CAAC,CAC/G;IAkBD;;;;OAIG;IACU,wBAAwB,CACnC,MAAM,EAAE,sBAAsB,GAC7B,OAAO,CACR,6BAA6B,CAAC,6BAA6B,EAAE,OAAO,yCAAyC,CAAC,CAC/G;IAkBD;;;;OAIG;IACU,mBAAmB,CAC9B,KAAK,EAAE,iBAAiB,GACvB,OAAO,CACR,6BAA6B,CAAC,6BAA6B,EAAE,OAAO,yCAAyC,CAAC,CAC/G;IAgBD;;;;OAIG;IACU,uBAAuB,CAClC,KAAK,EAAE,qBAAqB,GAC3B,OAAO,CACR,6BAA6B,CAAC,iCAAiC,EAAE,OAAO,yCAAyC,CAAC,CACnH;IAgBY,+BAA+B,CAC1C,KAAK,EAAE,6BAA6B,GACnC,OAAO,CACR,6BAA6B,CAAC,iCAAiC,EAAE,OAAO,yCAAyC,CAAC,CACnH;IAgBD;;;;OAIG;IACU,4BAA4B,CACvC,KAAK,EAAE,0BAA0B,GAChC,OAAO,CACR,6BAA6B,CAAC,iCAAiC,EAAE,OAAO,yCAAyC,CAAC,CACnH;IAgBD;;;;OAIG;IACU,wBAAwB,CACnC,KAAK,EAAE,sBAAsB,GAC5B,OAAO,CACR,6BAA6B,CAAC,iCAAiC,EAAE,OAAO,yCAAyC,CAAC,CACnH;IAgBD;;;;OAIG;IACU,kBAAkB,CAC7B,KAAK,EAAE,gBAAgB,GACtB,OAAO,CAAC,6BAA6B,CAAC,sBAAsB,CAAC,CAAC;YAkBnD,mBAAmB;YAoEnB,WAAW;YAyCX,sBAAsB;YAatB,uBAAuB;YAsBvB,cAAc;IAsCf,YAAY,CAAC,KAAK,EAAE,UAAU,GAAG,OAAO,CAAC,uBAAuB,CAAC,OAAO,iBAAiB,CAAC,CAAC;IA6BxG;;;;;;;;OAQG;YACW,oBAAoB;IAqDlC;;;;OAIG;IACU,WAAW,CAAC,WAAW,EAAE,sBAAsB,EAAE,KAAK,EAAE,KAAK;IAK7D,cAAc,CAAC,KAAK,EAAE,KAAK,EAAE,eAAe,EAAE,mBAAmB;IAMjE,aAAa,CAAC,MAAM,EAAE,eAAe,EAAE,eAAe,EAAE,mBAAmB,EAAE,KAAK,EAAE,KAAK;YAMxF,qBAAqB;IA2BnC;;;;OAIG;IACH,OAAO,CAAC,gCAAgC;YAQ1B,oBAAoB;IAelC,OAAO,CAAC,cAAc;CAYvB"}
|
|
@@ -4,7 +4,7 @@ function _ts_decorate(decorators, target, key, desc) {
|
|
|
4
4
|
else for(var i = decorators.length - 1; i >= 0; i--)if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
5
5
|
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
6
6
|
}
|
|
7
|
-
import {
|
|
7
|
+
import { AVM_PROOF_LENGTH_IN_FIELDS, NESTED_RECURSIVE_PROOF_LENGTH, NESTED_RECURSIVE_ROLLUP_HONK_PROOF_LENGTH, PAIRING_POINTS_SIZE, RECURSIVE_PROOF_LENGTH, TUBE_PROOF_LENGTH } from '@aztec/constants';
|
|
8
8
|
import { Fr } from '@aztec/foundation/fields';
|
|
9
9
|
import { runInDirectory } from '@aztec/foundation/fs';
|
|
10
10
|
import { createLogger } from '@aztec/foundation/log';
|
|
@@ -15,7 +15,6 @@ import { NativeACVMSimulator } from '@aztec/simulator/server';
|
|
|
15
15
|
import { ProvingError } from '@aztec/stdlib/errors';
|
|
16
16
|
import { makeProofAndVerificationKey, makePublicInputsAndRecursiveProof } from '@aztec/stdlib/interfaces/server';
|
|
17
17
|
import { Proof, RecursiveProof, makeRecursiveProofFromBinary } from '@aztec/stdlib/proofs';
|
|
18
|
-
import { enhanceProofWithPiValidationFlag } from '@aztec/stdlib/rollup';
|
|
19
18
|
import { Attributes, getTelemetryClient, trackSpan } from '@aztec/telemetry-client';
|
|
20
19
|
import crypto from 'crypto';
|
|
21
20
|
import { promises as fs } from 'fs';
|
|
@@ -79,11 +78,9 @@ const SERVER_CIRCUIT_RECURSIVE = true;
|
|
|
79
78
|
* Creates an AVM proof and verifies it.
|
|
80
79
|
* @param inputs - The inputs to the AVM circuit.
|
|
81
80
|
* @returns The proof.
|
|
82
|
-
*/ async getAvmProof(inputs
|
|
81
|
+
*/ async getAvmProof(inputs) {
|
|
83
82
|
const proofAndVk = await this.createAvmProof(inputs);
|
|
84
|
-
await this.verifyAvmProof(proofAndVk.proof.binaryProof, proofAndVk.verificationKey
|
|
85
|
-
// TODO(#14234)[Unconditional PIs validation]: remove next lines and directly return proofAndVk
|
|
86
|
-
proofAndVk.proof.proof = enhanceProofWithPiValidationFlag(proofAndVk.proof.proof, skipPublicInputsValidation);
|
|
83
|
+
await this.verifyAvmProof(proofAndVk.proof.binaryProof, proofAndVk.verificationKey);
|
|
87
84
|
return proofAndVk;
|
|
88
85
|
}
|
|
89
86
|
/**
|
|
@@ -256,7 +253,7 @@ const SERVER_CIRCUIT_RECURSIVE = true;
|
|
|
256
253
|
const provingResult = await this.generateAvmProofWithBB(input, bbWorkingDirectory);
|
|
257
254
|
// TODO(https://github.com/AztecProtocol/aztec-packages/issues/6773): this VK data format is wrong.
|
|
258
255
|
// In particular, the number of public inputs, etc will be wrong.
|
|
259
|
-
const verificationKey = await extractAvmVkData(provingResult.
|
|
256
|
+
const verificationKey = await extractAvmVkData(provingResult.vkPath);
|
|
260
257
|
const avmProof = await this.readAvmProofAsFields(provingResult.proofPath, verificationKey);
|
|
261
258
|
const circuitType = 'avm-circuit';
|
|
262
259
|
const appCircuitName = 'unknown';
|
|
@@ -285,7 +282,7 @@ const SERVER_CIRCUIT_RECURSIVE = true;
|
|
|
285
282
|
const provingResult = await this.generateTubeProofWithBB(bbWorkingDirectory, input);
|
|
286
283
|
// Read the proof as fields
|
|
287
284
|
// TODO(AD): this is the only remaining use of extractVkData.
|
|
288
|
-
const tubeVK = await extractVkData(provingResult.
|
|
285
|
+
const tubeVK = await extractVkData(provingResult.vkPath);
|
|
289
286
|
const tubeProof = await readProofAsFields(provingResult.proofPath, tubeVK, TUBE_PROOF_LENGTH, logger);
|
|
290
287
|
this.instrumentation.recordDuration('provingDuration', 'tubeCircuit', provingResult.durationMs);
|
|
291
288
|
this.instrumentation.recordSize('proofSize', 'tubeCircuit', tubeProof.binaryProof.buffer.length);
|
|
@@ -342,8 +339,8 @@ const SERVER_CIRCUIT_RECURSIVE = true;
|
|
|
342
339
|
const verificationKey = this.getVerificationKeyDataForCircuit(circuitType);
|
|
343
340
|
return await this.verifyWithKey(getUltraHonkFlavorForCircuit(circuitType), verificationKey, proof);
|
|
344
341
|
}
|
|
345
|
-
async verifyAvmProof(proof, verificationKey
|
|
346
|
-
return await this.verifyWithKeyInternal(proof, verificationKey, (proofPath, vkPath)=>verifyAvmProof(this.config.bbBinaryPath,
|
|
342
|
+
async verifyAvmProof(proof, verificationKey) {
|
|
343
|
+
return await this.verifyWithKeyInternal(proof, verificationKey, (proofPath, vkPath)=>verifyAvmProof(this.config.bbBinaryPath, proofPath, vkPath, logger));
|
|
347
344
|
}
|
|
348
345
|
async verifyWithKey(flavor, verificationKey, proof) {
|
|
349
346
|
return await this.verifyWithKeyInternal(proof, verificationKey, (proofPath, vkPath)=>verifyProof(this.config.bbBinaryPath, proofPath, vkPath, flavor, logger));
|
|
@@ -378,18 +375,12 @@ const SERVER_CIRCUIT_RECURSIVE = true;
|
|
|
378
375
|
return vk;
|
|
379
376
|
}
|
|
380
377
|
async readAvmProofAsFields(proofFilename, vkData) {
|
|
381
|
-
const
|
|
382
|
-
const reader = BufferReader.asReader(
|
|
383
|
-
const
|
|
384
|
-
|
|
385
|
-
|
|
386
|
-
|
|
387
|
-
if (proofFields.length > AVM_V2_PROOF_LENGTH_IN_FIELDS_PADDED) {
|
|
388
|
-
throw new Error(`Proof has ${proofFields.length} fields, expected no more than ${AVM_V2_PROOF_LENGTH_IN_FIELDS_PADDED}.`);
|
|
389
|
-
}
|
|
390
|
-
const proofFieldsPadded = proofFields.concat(Array(AVM_V2_PROOF_LENGTH_IN_FIELDS_PADDED - proofFields.length).fill(new Fr(0)));
|
|
391
|
-
const proof = new Proof(rawProofBuffer, vkData.numPublicInputs);
|
|
392
|
-
return new RecursiveProof(proofFieldsPadded, proof, true, AVM_V2_PROOF_LENGTH_IN_FIELDS_PADDED);
|
|
378
|
+
const rawProof = await fs.readFile(proofFilename);
|
|
379
|
+
const reader = BufferReader.asReader(rawProof);
|
|
380
|
+
const fields = reader.readArray(rawProof.length / Fr.SIZE_IN_BYTES, Fr);
|
|
381
|
+
const fieldsWithoutPublicCols = fields.slice(-1 * AVM_PROOF_LENGTH_IN_FIELDS);
|
|
382
|
+
const proof = new Proof(rawProof, vkData.numPublicInputs);
|
|
383
|
+
return new RecursiveProof(fieldsWithoutPublicCols, proof, true, AVM_PROOF_LENGTH_IN_FIELDS);
|
|
393
384
|
}
|
|
394
385
|
runInDirectory(fn) {
|
|
395
386
|
return runInDirectory(this.config.bbWorkingDirectory, (dir)=>fn(dir).catch((err)=>{
|
|
@@ -1,4 +1,4 @@
|
|
|
1
|
-
import {
|
|
1
|
+
import { AVM_PROOF_LENGTH_IN_FIELDS, NESTED_RECURSIVE_PROOF_LENGTH, NESTED_RECURSIVE_ROLLUP_HONK_PROOF_LENGTH, RECURSIVE_PROOF_LENGTH, TUBE_PROOF_LENGTH } from '@aztec/constants';
|
|
2
2
|
import { type ServerProtocolArtifact } from '@aztec/noir-protocol-circuits-types/server';
|
|
3
3
|
import { type SimulationProvider } from '@aztec/simulator/server';
|
|
4
4
|
import type { AvmCircuitInputs } from '@aztec/stdlib/avm';
|
|
@@ -72,7 +72,7 @@ export declare class TestCircuitProver implements ServerCircuitProver {
|
|
|
72
72
|
* @returns The public inputs as outputs of the simulation.
|
|
73
73
|
*/
|
|
74
74
|
getRootRollupProof(input: RootRollupInputs): Promise<PublicInputsAndRecursiveProof<RootRollupPublicInputs>>;
|
|
75
|
-
getAvmProof(_inputs: AvmCircuitInputs): Promise<ProofAndVerificationKey<typeof
|
|
75
|
+
getAvmProof(_inputs: AvmCircuitInputs): Promise<ProofAndVerificationKey<typeof AVM_PROOF_LENGTH_IN_FIELDS>>;
|
|
76
76
|
private applyDelay;
|
|
77
77
|
verifyProof(_1: ServerProtocolArtifact, _2: Proof): Promise<void>;
|
|
78
78
|
private simulate;
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"test_circuit_prover.d.ts","sourceRoot":"","sources":["../../src/test/test_circuit_prover.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,
|
|
1
|
+
{"version":3,"file":"test_circuit_prover.d.ts","sourceRoot":"","sources":["../../src/test/test_circuit_prover.ts"],"names":[],"mappings":"AAAA,OAAO,EACL,0BAA0B,EAE1B,6BAA6B,EAC7B,yCAAyC,EACzC,sBAAsB,EACtB,iBAAiB,EAClB,MAAM,kBAAkB,CAAC;AAI1B,OAAO,EACL,KAAK,sBAAsB,EAuB5B,MAAM,4CAA4C,CAAC;AAGpD,OAAO,EAAE,KAAK,kBAAkB,EAAsD,MAAM,yBAAyB,CAAC;AACtH,OAAO,KAAK,EAAE,gBAAgB,EAAE,MAAM,mBAAmB,CAAC;AAC1D,OAAO,EACL,KAAK,uBAAuB,EAC5B,KAAK,6BAA6B,EAClC,KAAK,mBAAmB,EAGzB,MAAM,iCAAiC,CAAC;AACzC,OAAO,KAAK,EAAE,gBAAgB,EAAE,kBAAkB,EAAE,gBAAgB,EAAE,MAAM,sBAAsB,CAAC;AACnG,OAAO,EAAE,KAAK,KAAK,EAAmE,MAAM,sBAAsB,CAAC;AACnH,OAAO,KAAK,EACV,6BAA6B,EAC7B,sBAAsB,EACtB,iCAAiC,EACjC,qBAAqB,EACrB,0BAA0B,EAC1B,iBAAiB,EACjB,uBAAuB,EACvB,sBAAsB,EACtB,gBAAgB,EAChB,sBAAsB,EACtB,6BAA6B,EAC7B,UAAU,EACX,MAAM,sBAAsB,CAAC;AAE9B,OAAO,EAAE,KAAK,eAAe,EAAiC,MAAM,yBAAyB,CAAC;AAM9F,KAAK,SAAS,GACV;IACE,mBAAmB,EAAE,OAAO,CAAC;IAC7B,iBAAiB,CAAC,EAAE,MAAM,CAAC;CAC5B,GACD;IACE,mBAAmB,EAAE,WAAW,CAAC;IACjC,qBAAqB,CAAC,EAAE,MAAM,CAAC;CAChC,CAAC;AAEN;;;GAGG;AACH,qBAAa,iBAAkB,YAAW,mBAAmB;IAMzD,OAAO,CAAC,kBAAkB,CAAC;IAC3B,OAAO,CAAC,IAAI;IANd,OAAO,CAAC,aAAa,CAAgC;IACrD,OAAO,CAAC,eAAe,CAAwB;IAC/C,OAAO,CAAC,MAAM,CAAyC;gBAG7C,kBAAkB,CAAC,EAAE,kBAAkB,YAAA,EACvC,IAAI,GAAE,SAAkE,EAChF,SAAS,GAAE,eAAsC;IAKnD,IAAI,MAAM,6CAET;IAED;;;;OAIG;IAEI,kBAAkB,CACvB,MAAM,EAAE,gBAAgB,GACvB,OAAO,CAAC,6BAA6B,CAAC,kBAAkB,EAAE,OAAO,sBAAsB,CAAC,CAAC;IAY5F;;;;OAIG;IAEI,kBAAkB,CACvB,MAAM,EAAE,gBAAgB,GACvB,OAAO,CAAC,6BAA6B,CAAC,kBAAkB,EAAE,OAAO,6BAA6B,CAAC,CAAC;IAY5F,YAAY,CAAC,UAAU,EAAE,UAAU,GAAG,OAAO,CAAC,uBAAuB,CAAC,OAAO,iBAAiB,CAAC,CAAC;IAOhG,yBAAyB,CAC9B,MAAM,EAAE,uBAAuB,GAC9B,OAAO,CACR,6BAA6B,CAAC,6BAA6B,EAAE,OAAO,yCAAyC,CAAC,CAC/G;IAaM,wBAAwB,CAC7B,MAAM,EAAE,sBAAsB,GAC7B,OAAO,CACR,6BAA6B,CAAC,6BAA6B,EAAE,OAAO,yCAAyC,CAAC,CAC/G;IAYD;;;;OAIG;IAEI,mBAAmB,CACxB,KAAK,EAAE,iBAAiB,GACvB,OAAO,CACR,6BAA6B,CAAC,6BAA6B,EAAE,OAAO,yCAAyC,CAAC,CAC/G;IAYD;;;;OAIG;IAEI,uBAAuB,CAC5B,KAAK,EAAE,qBAAqB,GAC3B,OAAO,CACR,6BAA6B,CAAC,iCAAiC,EAAE,OAAO,yCAAyC,CAAC,CACnH;IAaY,+BAA+B,CAC1C,KAAK,EAAE,6BAA6B,GACnC,OAAO,CACR,6BAA6B,CAAC,iCAAiC,EAAE,OAAO,yCAAyC,CAAC,CACnH;IAYD;;;;OAIG;IAEI,4BAA4B,CACjC,KAAK,EAAE,0BAA0B,GAChC,OAAO,CACR,6BAA6B,CAAC,iCAAiC,EAAE,OAAO,yCAAyC,CAAC,CACnH;IAYD;;;;OAIG;IAEI,wBAAwB,CAC7B,KAAK,EAAE,sBAAsB,GAC5B,OAAO,CACR,6BAA6B,CAAC,iCAAiC,EAAE,OAAO,yCAAyC,CAAC,CACnH;IAYD;;;;OAIG;IAEI,kBAAkB,CAAC,KAAK,EAAE,gBAAgB,GAAG,OAAO,CAAC,6BAA6B,CAAC,sBAAsB,CAAC,CAAC;IAY3G,WAAW,CAAC,OAAO,EAAE,gBAAgB,GAAG,OAAO,CAAC,uBAAuB,CAAC,OAAO,0BAA0B,CAAC,CAAC;YAYpG,UAAU;IAejB,WAAW,CAAC,EAAE,EAAE,sBAAsB,EAAE,EAAE,EAAE,KAAK,GAAG,OAAO,CAAC,IAAI,CAAC;YAI1D,QAAQ;CA8CvB"}
|
|
@@ -4,7 +4,7 @@ function _ts_decorate(decorators, target, key, desc) {
|
|
|
4
4
|
else for(var i = decorators.length - 1; i >= 0; i--)if (d = decorators[i]) r = (c < 3 ? d(r) : c > 3 ? d(target, key, r) : d(target, key)) || r;
|
|
5
5
|
return c > 3 && r && Object.defineProperty(target, key, r), r;
|
|
6
6
|
}
|
|
7
|
-
import {
|
|
7
|
+
import { AVM_PROOF_LENGTH_IN_FIELDS, AVM_VERIFICATION_KEY_LENGTH_IN_FIELDS, NESTED_RECURSIVE_PROOF_LENGTH, NESTED_RECURSIVE_ROLLUP_HONK_PROOF_LENGTH, RECURSIVE_PROOF_LENGTH, TUBE_PROOF_LENGTH } from '@aztec/constants';
|
|
8
8
|
import { createLogger } from '@aztec/foundation/log';
|
|
9
9
|
import { sleep } from '@aztec/foundation/sleep';
|
|
10
10
|
import { Timer } from '@aztec/foundation/timer';
|
|
@@ -105,7 +105,7 @@ import { PROOF_DELAY_MS, WITGEN_DELAY_MS } from './delay_values.js';
|
|
|
105
105
|
// We can't simulate the AVM because we don't have enough context to do so (e.g., DBs).
|
|
106
106
|
// We just return an empty proof and VK data.
|
|
107
107
|
this.logger.debug('Skipping AVM simulation in TestCircuitProver.');
|
|
108
|
-
return this.applyDelay(ProvingRequestType.PUBLIC_VM, ()=>makeProofAndVerificationKey(makeEmptyRecursiveProof(
|
|
108
|
+
return this.applyDelay(ProvingRequestType.PUBLIC_VM, ()=>makeProofAndVerificationKey(makeEmptyRecursiveProof(AVM_PROOF_LENGTH_IN_FIELDS), VerificationKeyData.makeFake(AVM_VERIFICATION_KEY_LENGTH_IN_FIELDS)));
|
|
109
109
|
}
|
|
110
110
|
async applyDelay(type, fn) {
|
|
111
111
|
const timer = new Timer();
|
|
@@ -5,11 +5,5 @@ import { VerificationKeyData } from '@aztec/stdlib/vks';
|
|
|
5
5
|
* @returns The verification key data
|
|
6
6
|
*/
|
|
7
7
|
export declare function extractVkData(vkDirectoryPath: string): Promise<VerificationKeyData>;
|
|
8
|
-
/**
|
|
9
|
-
* Reads the verification key data stored in a binary file at the specified directory location and parses into a VerificationKeyData.
|
|
10
|
-
* We do not assume any JSON file available but only the binary version, contrary to the above extractVkData() method.
|
|
11
|
-
* @param vkDirectoryPath - The directory containing the verification key binary data file.
|
|
12
|
-
* @returns The verification key data
|
|
13
|
-
*/
|
|
14
8
|
export declare function extractAvmVkData(vkDirectoryPath: string): Promise<VerificationKeyData>;
|
|
15
9
|
//# sourceMappingURL=verification_key_data.d.ts.map
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"verification_key_data.d.ts","sourceRoot":"","sources":["../../src/verification_key/verification_key_data.ts"],"names":[],"mappings":"
|
|
1
|
+
{"version":3,"file":"verification_key_data.d.ts","sourceRoot":"","sources":["../../src/verification_key/verification_key_data.ts"],"names":[],"mappings":"AAGA,OAAO,EAA2B,mBAAmB,EAAE,MAAM,mBAAmB,CAAC;AAQjF;;;;GAIG;AACH,wBAAsB,aAAa,CAAC,eAAe,EAAE,MAAM,GAAG,OAAO,CAAC,mBAAmB,CAAC,CAWzF;AAGD,wBAAsB,gBAAgB,CAAC,eAAe,EAAE,MAAM,GAAG,OAAO,CAAC,mBAAmB,CAAC,CAc5F"}
|