@aztec/protocol-contracts 0.77.0 → 0.77.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -4,97 +4,7 @@
4
4
  "name": "AuthRegistry",
5
5
  "functions": [
6
6
  {
7
- "name": "_set_authorized",
8
- "is_unconstrained": true,
9
- "custom_attributes": [
10
- "public",
11
- "internal"
12
- ],
13
- "abi": {
14
- "error_types": {
15
- "16761564377371454734": {
16
- "error_kind": "string",
17
- "string": "Array index out of bounds"
18
- },
19
- "17843811134343075018": {
20
- "error_kind": "string",
21
- "string": "Stack too deep"
22
- },
23
- "206160798890201757": {
24
- "error_kind": "string",
25
- "string": "Storage slot 0 not allowed. Storage slots must start from 1."
26
- },
27
- "5019202896831570965": {
28
- "error_kind": "string",
29
- "string": "attempt to add with overflow"
30
- },
31
- "6304245522015439386": {
32
- "error_kind": "string",
33
- "string": "Function _set_authorized can only be called internally"
34
- }
35
- },
36
- "parameters": [
37
- {
38
- "name": "approver",
39
- "type": {
40
- "fields": [
41
- {
42
- "name": "inner",
43
- "type": {
44
- "kind": "field"
45
- }
46
- }
47
- ],
48
- "kind": "struct",
49
- "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
50
- },
51
- "visibility": "private"
52
- },
53
- {
54
- "name": "message_hash",
55
- "type": {
56
- "kind": "field"
57
- },
58
- "visibility": "private"
59
- },
60
- {
61
- "name": "authorize",
62
- "type": {
63
- "kind": "boolean"
64
- },
65
- "visibility": "private"
66
- }
67
- ],
68
- "return_type": null
69
- },
70
- "bytecode": "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",
71
- "debug_symbols": "7Z3bbts4EIbfxde54PnQVykWQZKmhQEjKZJ0gUWRd185sCQnHIvWjJoo5X8TVDV/c/RpxBmOKPr35tvt9a8fl9u77/ePmy9ff2929zdXT9v7u+7o9/PF5vphu9ttf1we//dG7f9oY14Ejz+v7vbHj09XD0+bL1pbYy82t3ffXv7tdPcl37e72+7IxOeLor2LOR2au6TC0DoponHyNhwaJ+/1ceN/LjqL4gmLXBwtCrFmUTC+tyhYV7HIhdxb5JJ/a5E9h1HIryx60UWeznmezitK55Qfro06OrmgCRJahbEPbccuAgVZp/5C6pyGtlYfzPHrMievypzg1mXOuujEddGJ66KT7LrMiasyJ5t1mRPe2xzfm2OUeWVO2TZm14fJmPP4zYaMk3b4ZmfU2NYTTY3OrrfCaDPd2Jv+e72Jx007fkZp8BPx8+An4acV+In4wf9E/Az8T8YP/ifjl8FPws9a8BPxS+An4ecM+In4RfCT8POYv1X5BdXzC7rgh/xFxC8gf5bxc+BX4ze0Da+b7vkl3L8yfph/iPhl3L8yfvA/CT+r4H8yfvA/ET+N+ouMH+a/In4G9RcZPzw/F/GzqL/I+GH+JuLnUH+R8XPgV0LBQ6ESikemS0BB+lpCCcgJCChINEsoEdGbgIKQTEBBnaqEkhCSCSgIySWUjDIRAQUhuYDiFEIyAQVVmhKKRppPQIGnlFDwkgEBpdGVs8aOUJx/C6XR5XRR9zsEmGgtu/ELQQeCFYI6jOcX0tsliS62eWMuSDDhLpYSbDONWJJgmwWjWQRjHLYWiLmIxY0u7VySYJvPEZcj6BVisZRgm0WuBQk2ukXDkgQRSaQEkc0ICRr4oJQgshkhQYtsRkoQ2YyQYKMLZpckiEgiJYhIIiToEUmkBNtcJrQgwUaX+c4imLXpzy+bkiBmdUKCcYEVkDr1jfXxE2maoPeuP1Gf9dHO9ZaiEnJ/plGHV9/8Ynz6xMan8ImNX+LRxscZXx81jjaK/tM7UAdl12VOWpU5el109LromHXRMXFV5pzxbvW7mhNWZc4ZhYyFzfmrdk4MZ5QxwG+KXwY/CT8P/5Pxg/+J+AX4n4xfAj8JvzOWGYPfFL8IfhJ+SYOfiF8APwm/jPmbZOfscEYNE/ym+CF/lvCL71/3/at2XosK+YuIn0b+LOMH/xPxM/A/GT/4n4ifxfxNxs+Dn4Qfnr8J+TnwE/HD/E3Ez2P+JuOH5x8ifgH5MwEFReUSSkSmS0BB+kpAQU5QQkkOUEooiN4llIyQTEBBnaqAkhRCMgEFIbmEolEmIqAgJBNQEJJLKAZVGgIK0vwSioWnEFAwppRQfJt5yuTO4ym2efsst/N4anRB9nJ7FqfU5o25IMGMu1hKsM2IuRzBrNqsoi23s1BudGnsggR1m/W5JQkiFksJtjlLX5Bgo8WfJQkikggJWmQzUoLwQSFBh2xGShDZjJQgshkhwUYXHC9JEJFESDAgkkgJIpJICSKSyHZ9znjSJCW4xOY/3A2QQ4zjZjD0BsgxxB5hcmPbeDA+fGLjl9i25aOM12qJZxsfaH113OiMq1hvzTBuWJdf9VG2Tsr2BiXlRuvJocClfn2Cy2NTaw/G1/e7WNx4pQbjjZk2PnanOqD3brqx1s7lYfR1WR03fznZRqtOVg1WWO3eDNodlTbjXoWKg68QVHyb665rVNqcvVSoBPgKRQW+QlFpc/ZqshmoKF9QiQ5UCCptriWrUElt5is1Km3ufFCh0ugmuTUqGG0pKhhtSyq60W1qa1TgKwSVRrdErVBxbf5S7vQ8SDf6C8w1KvAVgsoZlYQGqUQFKgQV+ApBJcFXKCquSSqVfCW1+avqFSrZggpBpc18ZZqKOWN3rxaptBmZa1Qw2hJUNEZbikoClZKKga8QVGyb9ZVpKtY4ikq0/Wq66Gyhod/9yq7vKPuyH/ptp2kN/X5PRRPna+h3OLQaVkd31z2VqsBR0TWKqspzVInVV2L1lVl9ZU5fTimWinO9nGb1pVnnRe9vUFPRo31VFTkqq1mqMHuMcfSPAWXVr2jOhtDMH5ccfRdP9xMZttHreSqaNF9DrwWZZpDmj5kuz+/H0/dtRTP/mnrN6Edz+qFjmu/9OkdTaOh4W9Ew+qFXdk9r6HXPFQ2jH8/ox4fK9SE0dFyfvqYhzNdERj9xfj7k6erstCYz7oU8fzwIyjA0ab5GW4aG0Y9hnI+Z7zvBKoZmvh+EzMkSQuZkCZGu9nUTpnHy5HWpyhwVvcKipqKvblVFZ5Dd09hBlUoa9Ai5z2J7lVNlX16zVJ6lyhxVoD3Kj2+Eea9KVeKoIqsv+p3UqipwVHQ+VFVlhiopx1GdmMnUVJ6jMqy+zInzisOLxz4XUT5Zw1JFjsp5jsorlopFwyeOKrAY0nmPtuOL4tbqUhU4qhO1jJrKsVSJozoxAtRUHBpZaZaK1ZdWLJVjqTjk84lobl0cVEGVqsRR0T/yXFM5xVIFjupE5lBTZY7qRA4wnTnkwMmIctQs1ey+nrujf68etlfXu9vHTrP/8NfdzdP2/u5w+PTfz/6T64ftbrf9cfnz4f7m9tuvh9vL3f3N/rONOvz52hU5L5wOe2v2h8abC+Pj/nB/Qk7H7tPc9dr1/D8=",
72
- "brillig_names": [
73
- "_set_authorized"
74
- ]
75
- },
76
- {
77
- "name": "sync_notes",
78
- "is_unconstrained": true,
79
- "custom_attributes": [],
80
- "abi": {
81
- "error_types": {
82
- "17843811134343075018": {
83
- "error_kind": "string",
84
- "string": "Stack too deep"
85
- }
86
- },
87
- "parameters": [],
88
- "return_type": null
89
- },
90
- "bytecode": "H4sIAAAAAAAA/7WTyw7CIBBFqcUo0sTEx39MU0y7dOHafyCtLHVRN+766dZkJkyI0QVwEzJMgMNcHoXwKjBKESGCHDEqjAs2Xs7tjDnEqVbBvin5HRijvvhLWH+jkFnk4QPxM50/rJBzmTyfe6F913PTrF8J/z5y+af7y+l//8OzRq9bzCvh/8P4uvfXx/M2ij/SbJGc0ptoOwAqvkT+EvmhJBvn8w+Yb4Svj6KMqNO1tnaNdfZkh8H0dhfwP+KH/QbzqHp4zgQAAA==",
91
- "debug_symbols": "ZY5bCsMgEEX3Mt9+RO0r2UoowSSTIIgGo4Ui7r1jCFTan8vc4XA5CWYc4zpou7gduj6BcZMK2llqKTMYvTZGr0P9hqYElwe/b8qWugflA3RctrJhgHY+7rukjUUbpCYemf3xshUnfeH8y95EfmaqL+W1Gg2eNku0UyUX3hv+eG7eTThHj8W4kqXs+ZWJhmZp+gM=",
92
- "brillig_names": [
93
- "sync_notes"
94
- ]
95
- },
96
- {
97
- "name": "consume",
7
+ "name": "public_dispatch",
98
8
  "is_unconstrained": true,
99
9
  "custom_attributes": [
100
10
  "public"
@@ -105,6 +15,11 @@
105
15
  "error_kind": "string",
106
16
  "string": "unauthorized"
107
17
  },
18
+ "16541607464495309456": {
19
+ "error_kind": "fmtstring",
20
+ "item_types": [],
21
+ "length": 16
22
+ },
108
23
  "16761564377371454734": {
109
24
  "error_kind": "string",
110
25
  "string": "Array index out of bounds"
@@ -121,73 +36,17 @@
121
36
  "error_kind": "string",
122
37
  "string": "attempt to add with overflow"
123
38
  },
124
- "715723737710351018": {
125
- "error_kind": "string",
126
- "string": "rejecting all"
127
- }
128
- },
129
- "parameters": [
130
- {
131
- "name": "on_behalf_of",
132
- "type": {
133
- "fields": [
134
- {
135
- "name": "inner",
136
- "type": {
137
- "kind": "field"
138
- }
139
- }
140
- ],
141
- "kind": "struct",
142
- "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
143
- },
144
- "visibility": "private"
145
- },
146
- {
147
- "name": "inner_hash",
148
- "type": {
149
- "kind": "field"
150
- },
151
- "visibility": "private"
152
- }
153
- ],
154
- "return_type": {
155
- "abi_type": {
156
- "kind": "field"
157
- },
158
- "visibility": "public"
159
- }
160
- },
161
- "bytecode": "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",
162
- "debug_symbols": "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",
163
- "brillig_names": [
164
- "consume"
165
- ]
166
- },
167
- {
168
- "name": "is_reject_all",
169
- "is_unconstrained": true,
170
- "custom_attributes": [
171
- "public",
172
- "view"
173
- ],
174
- "abi": {
175
- "error_types": {
176
- "16761564377371454734": {
177
- "error_kind": "string",
178
- "string": "Array index out of bounds"
179
- },
180
- "17843811134343075018": {
39
+ "5444967152290923376": {
181
40
  "error_kind": "string",
182
- "string": "Stack too deep"
41
+ "string": "Function is_consumable can only be called statically"
183
42
  },
184
- "206160798890201757": {
43
+ "6304245522015439386": {
185
44
  "error_kind": "string",
186
- "string": "Storage slot 0 not allowed. Storage slots must start from 1."
45
+ "string": "Function _set_authorized can only be called internally"
187
46
  },
188
- "5019202896831570965": {
47
+ "715723737710351018": {
189
48
  "error_kind": "string",
190
- "string": "attempt to add with overflow"
49
+ "string": "rejecting all"
191
50
  },
192
51
  "9474245853673257536": {
193
52
  "error_kind": "string",
@@ -196,40 +55,26 @@
196
55
  },
197
56
  "parameters": [
198
57
  {
199
- "name": "on_behalf_of",
58
+ "name": "selector",
200
59
  "type": {
201
- "fields": [
202
- {
203
- "name": "inner",
204
- "type": {
205
- "kind": "field"
206
- }
207
- }
208
- ],
209
- "kind": "struct",
210
- "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
60
+ "kind": "field"
211
61
  },
212
62
  "visibility": "private"
213
63
  }
214
64
  ],
215
- "return_type": {
216
- "abi_type": {
217
- "kind": "boolean"
218
- },
219
- "visibility": "public"
220
- }
65
+ "return_type": null
221
66
  },
222
- "bytecode": "JwACBAEoAAABBIBIJwAABAMnAgIEAScCAwQAHxgAAwACgEYuCIBGAAElAAAASyUAAABhLgQAAYBHKAIAAgSARycCAwQBOw0AAgADKACAQwQAAygAgEQEAAAoAIBFBAABJiUAAAO2HgIAAwknAgQAAQo4AwQFJAIABQAAAIIlAAAD3y0IAQMnAgUEAwAQAQUBJwMDBAEAKAMCBS0MBQYtDgQGACgGAgYtDgEGJwIBAAAtCAEEJwIFBAQAEAEFAScDBAQBACgEAgUtDAUGLQ4BBgAoBgIGLQ4BBgAoBgIGLQ4BBi0NBAUAKAUCBS0OBQQrAgAFAAAAAAAAAAACAAAAAAAAAAAtCAEGJwIHBAUAEAEHAScDBgQBACgGAgctDAcILQ4BCAAoCAIILQ4BCAAoCAIILQ4BCAAoCAIILQ4FCC0NBAUAKAUCBS0OBQQtCAEFAAABAgEtDgQFLQ0GBAAoBAIELQ4EBi0IAQQAAAECAS0OBgQtCAEGAAABAgEuCoBEAAYtCAEHAAABAgEnAggBAC0OCAcnAgkEAi4IgEQAAiMAAAGkDDgCCQokAgAKAAACUSMAAAG2LQ0HAgo4AggDJAIAAwAAAdAnAgkEADwJAQknAgIECS0IAAktDAUKLQwECy0MBgwtDAcNABAAAgAlAAAD8S0EAAAtDQUCLQ0EAy0NBgktDgIFLQ4DBC0OCQYnAgIBAS0OAgcBKAADgEUABC0NBAIKOAIBAwo4AwgBJAIAAQAAAjslAAAFSS8MAAIAARwMAQMBHAwDAgAcDAIBASYkAgAKAAACXiMAAAOlJwILBAIMOAILDCQCAAwAAAJ1JQAABVsAKAMCCwA4CwIMLQ0MCi0NBgstDQcMCjgMCA0kAgANAAACoScCDgQAPAkBDgsoAAuAQwAMJAIADAAAAzIjAAACti0NBQstDQQMLQ0GDS0NBw4nAhAEAww4DRARJAIAEQAAAt0lAAAFWy4EAAuAAygAgAQEAAQlAAAFbS4IgAUADwAoDwIQADgQDREtDgoRASgADYBFAAoOOA0KCyQCAAsAAAMdJQAABfstDg8FLQ4MBC0OCgYtDg4HIwAAA6UnAgsEDC0IAAwtDAUNLQwEDi0MBg8tDAcQABAACwAlAAAD8S0EAAAtDQULLQ0EDC0NBw0uBAALgAMoAIAEBAAEJQAABW0uCIAFAA4AKA4CDwEoAA+ARAAQLQ4KEC0ODgUtDgwELgqARQAGLQ4NByMAAAOlASgAAoBFAAotDAoCIwAAAaQoAIAEBHgADQAAAIAEgAMkAIADAAAD3ioBAAEF96Hzr6Wt1Mo8AQECJioBAAEFg3tIaD7pekA8AQECJiUAAAO2LgiARAAFIwAABAENKAAFgEMABiQCAAYAAARxIwAABBYtDQEFLQ0CBi0NAwctDQQIJwIJBAQtCAEKJwILBAUAEAELAScDCgQBACgGAgsnAgwEBAAoCgINPw8ACwANLQ0KBgAoBgIGLQ4GCi0OBQEtDgoCLQ4HAy0OCAQmLQ0DBgw4BQYHASgABYBFAAYkAgAHAAAEjyMAAAVALQ0BBy0NAggtDQMJLQ0ECicCDAQEDDgFDA0kAgANAAAEtiUAAAVbACgIAgwAOAwFDS0NDQsnAg0EAww4BQ0OJAIADgAABNslAAAFWwAoBwINADgNBQ4tDQ4MADgLDA0nAgwEBAw4BQwOJAIADgAABQUlAAAFWy4EAAiAAygAgAQEAAUlAAAFbS4IgAUACwAoCwIMADgMBQ4tDg0OLQ4HAS0OCwItDgkDLQ4KBCMAAAVALQwGBSMAAAQBKgEAAQUC3G4ngHYSnTwBAQImKgEAAQXonQn+oREtDjwBAQImLgGAA4AGCwCABgACgAckAIAHAAAFiCMAAAWTLgCAA4AFIwAABfouAAABgAUBAAABgAQAAQEAgAOABIAJLgCAA4AKLgCABYALCwCACoAJgAwkAIAMAAAF5i4BgAqACC4CgAiACwEAgAoAAoAKAQCACwACgAsjAAAFtSgBgAUEAAEDAIAGAAKABiMAAAX6JioBAAEFRafKcRlB5BU8AQECJi4AGMoYyg==",
223
- "debug_symbols": "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",
67
+ "bytecode": "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",
68
+ "debug_symbols": "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",
224
69
  "brillig_names": [
225
- "is_reject_all"
70
+ "public_dispatch"
226
71
  ]
227
72
  },
228
73
  {
229
- "name": "set_reject_all",
230
- "is_unconstrained": true,
74
+ "name": "set_authorized_private",
75
+ "is_unconstrained": false,
231
76
  "custom_attributes": [
232
- "public"
77
+ "private"
233
78
  ],
234
79
  "abi": {
235
80
  "error_types": {
@@ -241,9 +86,9 @@
241
86
  "error_kind": "string",
242
87
  "string": "Stack too deep"
243
88
  },
244
- "206160798890201757": {
89
+ "4939791462094160055": {
245
90
  "error_kind": "string",
246
- "string": "Storage slot 0 not allowed. Storage slots must start from 1."
91
+ "string": "Message not authorized by account"
247
92
  },
248
93
  "5019202896831570965": {
249
94
  "error_kind": "string",
@@ -252,405 +97,73 @@
252
97
  },
253
98
  "parameters": [
254
99
  {
255
- "name": "reject",
256
- "type": {
257
- "kind": "boolean"
258
- },
259
- "visibility": "private"
260
- }
261
- ],
262
- "return_type": null
263
- },
264
- "bytecode": "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",
265
- "debug_symbols": "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",
266
- "brillig_names": [
267
- "set_reject_all"
268
- ]
269
- },
270
- {
271
- "name": "process_log",
272
- "is_unconstrained": true,
273
- "custom_attributes": [],
274
- "abi": {
275
- "error_types": {
276
- "16775516380094354375": {
277
- "error_kind": "fmtstring",
278
- "item_types": [],
279
- "length": 40
280
- },
281
- "17843811134343075018": {
282
- "error_kind": "string",
283
- "string": "Stack too deep"
284
- }
285
- },
286
- "parameters": [
287
- {
288
- "name": "_log_plaintext",
100
+ "name": "inputs",
289
101
  "type": {
290
102
  "fields": [
291
103
  {
292
- "name": "storage",
293
- "type": {
294
- "kind": "array",
295
- "length": 18,
296
- "type": {
297
- "kind": "field"
298
- }
299
- }
300
- },
301
- {
302
- "name": "len",
104
+ "name": "call_context",
303
105
  "type": {
304
- "kind": "integer",
305
- "sign": "unsigned",
306
- "width": 32
307
- }
308
- }
309
- ],
310
- "kind": "struct",
311
- "path": "std::collections::bounded_vec::BoundedVec"
312
- },
313
- "visibility": "private"
314
- },
315
- {
316
- "name": "_tx_hash",
317
- "type": {
318
- "kind": "field"
319
- },
320
- "visibility": "private"
321
- },
322
- {
323
- "name": "_unique_note_hashes_in_tx",
324
- "type": {
325
- "fields": [
326
- {
327
- "name": "storage",
328
- "type": {
329
- "kind": "array",
330
- "length": 64,
331
- "type": {
332
- "kind": "field"
333
- }
106
+ "fields": [
107
+ {
108
+ "name": "msg_sender",
109
+ "type": {
110
+ "fields": [
111
+ {
112
+ "name": "inner",
113
+ "type": {
114
+ "kind": "field"
115
+ }
116
+ }
117
+ ],
118
+ "kind": "struct",
119
+ "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
120
+ }
121
+ },
122
+ {
123
+ "name": "contract_address",
124
+ "type": {
125
+ "fields": [
126
+ {
127
+ "name": "inner",
128
+ "type": {
129
+ "kind": "field"
130
+ }
131
+ }
132
+ ],
133
+ "kind": "struct",
134
+ "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
135
+ }
136
+ },
137
+ {
138
+ "name": "function_selector",
139
+ "type": {
140
+ "fields": [
141
+ {
142
+ "name": "inner",
143
+ "type": {
144
+ "kind": "integer",
145
+ "sign": "unsigned",
146
+ "width": 32
147
+ }
148
+ }
149
+ ],
150
+ "kind": "struct",
151
+ "path": "authwit::aztec::protocol_types::abis::function_selector::FunctionSelector"
152
+ }
153
+ },
154
+ {
155
+ "name": "is_static_call",
156
+ "type": {
157
+ "kind": "boolean"
158
+ }
159
+ }
160
+ ],
161
+ "kind": "struct",
162
+ "path": "authwit::aztec::protocol_types::abis::call_context::CallContext"
334
163
  }
335
164
  },
336
165
  {
337
- "name": "len",
338
- "type": {
339
- "kind": "integer",
340
- "sign": "unsigned",
341
- "width": 32
342
- }
343
- }
344
- ],
345
- "kind": "struct",
346
- "path": "std::collections::bounded_vec::BoundedVec"
347
- },
348
- "visibility": "private"
349
- },
350
- {
351
- "name": "_first_nullifier_in_tx",
352
- "type": {
353
- "kind": "field"
354
- },
355
- "visibility": "private"
356
- },
357
- {
358
- "name": "_recipient",
359
- "type": {
360
- "fields": [
361
- {
362
- "name": "inner",
363
- "type": {
364
- "kind": "field"
365
- }
366
- }
367
- ],
368
- "kind": "struct",
369
- "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
370
- },
371
- "visibility": "private"
372
- }
373
- ],
374
- "return_type": null
375
- },
376
- "bytecode": "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",
377
- "debug_symbols": "tZbdCoMgGIbvxWMP0tKv7VbGGFY2BLGwGozo3qdjP7EdvyfRK58+HvjAu7LONsv14kI/TOx4WpkfWjO7IaS0bpw10Xnvrpf9MivyRyj93DCNJuQ8zSbO7ChKeZCc2dDl/7KS6ZDeeZuSrDf+N0/vYaLPpBLbmScAoQE1GnAAA3SBBgg0QKIBJRpQoQEKDUCbrNEma7TJGm0yoU0mtMmENpnQJhPaZEKbTGiTCW0yQU3eUrqZ6Ezj7avh9Etod4Vnvo/2p/uMcWhtt0SbW9C3AOXXWEmuZL52tlfUBRe1SpAEegA=",
378
- "brillig_names": [
379
- "process_log"
380
- ]
381
- },
382
- {
383
- "name": "is_consumable",
384
- "is_unconstrained": true,
385
- "custom_attributes": [
386
- "public",
387
- "view"
388
- ],
389
- "abi": {
390
- "error_types": {
391
- "16761564377371454734": {
392
- "error_kind": "string",
393
- "string": "Array index out of bounds"
394
- },
395
- "17843811134343075018": {
396
- "error_kind": "string",
397
- "string": "Stack too deep"
398
- },
399
- "206160798890201757": {
400
- "error_kind": "string",
401
- "string": "Storage slot 0 not allowed. Storage slots must start from 1."
402
- },
403
- "5019202896831570965": {
404
- "error_kind": "string",
405
- "string": "attempt to add with overflow"
406
- },
407
- "5444967152290923376": {
408
- "error_kind": "string",
409
- "string": "Function is_consumable can only be called statically"
410
- }
411
- },
412
- "parameters": [
413
- {
414
- "name": "on_behalf_of",
415
- "type": {
416
- "fields": [
417
- {
418
- "name": "inner",
419
- "type": {
420
- "kind": "field"
421
- }
422
- }
423
- ],
424
- "kind": "struct",
425
- "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
426
- },
427
- "visibility": "private"
428
- },
429
- {
430
- "name": "message_hash",
431
- "type": {
432
- "kind": "field"
433
- },
434
- "visibility": "private"
435
- }
436
- ],
437
- "return_type": {
438
- "abi_type": {
439
- "kind": "boolean"
440
- },
441
- "visibility": "public"
442
- }
443
- },
444
- "bytecode": "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",
445
- "debug_symbols": "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",
446
- "brillig_names": [
447
- "is_consumable"
448
- ]
449
- },
450
- {
451
- "name": "unconstrained_is_consumable",
452
- "is_unconstrained": true,
453
- "custom_attributes": [],
454
- "abi": {
455
- "error_types": {
456
- "16761564377371454734": {
457
- "error_kind": "string",
458
- "string": "Array index out of bounds"
459
- },
460
- "17843811134343075018": {
461
- "error_kind": "string",
462
- "string": "Stack too deep"
463
- },
464
- "206160798890201757": {
465
- "error_kind": "string",
466
- "string": "Storage slot 0 not allowed. Storage slots must start from 1."
467
- },
468
- "5019202896831570965": {
469
- "error_kind": "string",
470
- "string": "attempt to add with overflow"
471
- }
472
- },
473
- "parameters": [
474
- {
475
- "name": "on_behalf_of",
476
- "type": {
477
- "fields": [
478
- {
479
- "name": "inner",
480
- "type": {
481
- "kind": "field"
482
- }
483
- }
484
- ],
485
- "kind": "struct",
486
- "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
487
- },
488
- "visibility": "private"
489
- },
490
- {
491
- "name": "message_hash",
492
- "type": {
493
- "kind": "field"
494
- },
495
- "visibility": "private"
496
- }
497
- ],
498
- "return_type": {
499
- "abi_type": {
500
- "kind": "boolean"
501
- },
502
- "visibility": "public"
503
- }
504
- },
505
- "bytecode": "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",
506
- "debug_symbols": "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",
507
- "brillig_names": [
508
- "unconstrained_is_consumable"
509
- ]
510
- },
511
- {
512
- "name": "set_authorized",
513
- "is_unconstrained": true,
514
- "custom_attributes": [
515
- "public"
516
- ],
517
- "abi": {
518
- "error_types": {
519
- "16761564377371454734": {
520
- "error_kind": "string",
521
- "string": "Array index out of bounds"
522
- },
523
- "17843811134343075018": {
524
- "error_kind": "string",
525
- "string": "Stack too deep"
526
- },
527
- "206160798890201757": {
528
- "error_kind": "string",
529
- "string": "Storage slot 0 not allowed. Storage slots must start from 1."
530
- },
531
- "5019202896831570965": {
532
- "error_kind": "string",
533
- "string": "attempt to add with overflow"
534
- }
535
- },
536
- "parameters": [
537
- {
538
- "name": "message_hash",
539
- "type": {
540
- "kind": "field"
541
- },
542
- "visibility": "private"
543
- },
544
- {
545
- "name": "authorize",
546
- "type": {
547
- "kind": "boolean"
548
- },
549
- "visibility": "private"
550
- }
551
- ],
552
- "return_type": null
553
- },
554
- "bytecode": "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",
555
- "debug_symbols": "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",
556
- "brillig_names": [
557
- "set_authorized"
558
- ]
559
- },
560
- {
561
- "name": "set_authorized_private",
562
- "is_unconstrained": false,
563
- "custom_attributes": [
564
- "private"
565
- ],
566
- "abi": {
567
- "error_types": {
568
- "16761564377371454734": {
569
- "error_kind": "string",
570
- "string": "Array index out of bounds"
571
- },
572
- "17843811134343075018": {
573
- "error_kind": "string",
574
- "string": "Stack too deep"
575
- },
576
- "4939791462094160055": {
577
- "error_kind": "string",
578
- "string": "Message not authorized by account"
579
- },
580
- "5019202896831570965": {
581
- "error_kind": "string",
582
- "string": "attempt to add with overflow"
583
- }
584
- },
585
- "parameters": [
586
- {
587
- "name": "inputs",
588
- "type": {
589
- "fields": [
590
- {
591
- "name": "call_context",
592
- "type": {
593
- "fields": [
594
- {
595
- "name": "msg_sender",
596
- "type": {
597
- "fields": [
598
- {
599
- "name": "inner",
600
- "type": {
601
- "kind": "field"
602
- }
603
- }
604
- ],
605
- "kind": "struct",
606
- "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
607
- }
608
- },
609
- {
610
- "name": "contract_address",
611
- "type": {
612
- "fields": [
613
- {
614
- "name": "inner",
615
- "type": {
616
- "kind": "field"
617
- }
618
- }
619
- ],
620
- "kind": "struct",
621
- "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
622
- }
623
- },
624
- {
625
- "name": "function_selector",
626
- "type": {
627
- "fields": [
628
- {
629
- "name": "inner",
630
- "type": {
631
- "kind": "integer",
632
- "sign": "unsigned",
633
- "width": 32
634
- }
635
- }
636
- ],
637
- "kind": "struct",
638
- "path": "authwit::aztec::protocol_types::abis::function_selector::FunctionSelector"
639
- }
640
- },
641
- {
642
- "name": "is_static_call",
643
- "type": {
644
- "kind": "boolean"
645
- }
646
- }
647
- ],
648
- "kind": "struct",
649
- "path": "authwit::aztec::protocol_types::abis::call_context::CallContext"
650
- }
651
- },
652
- {
653
- "name": "historical_header",
166
+ "name": "historical_header",
654
167
  "type": {
655
168
  "fields": [
656
169
  {
@@ -2068,169 +1581,647 @@
2068
1581
  "kind": "field"
2069
1582
  }
2070
1583
  }
2071
- ],
2072
- "kind": "struct",
2073
- "path": "authwit::aztec::protocol_types::block_header::BlockHeader"
1584
+ ],
1585
+ "kind": "struct",
1586
+ "path": "authwit::aztec::protocol_types::block_header::BlockHeader"
1587
+ }
1588
+ },
1589
+ {
1590
+ "name": "tx_context",
1591
+ "type": {
1592
+ "fields": [
1593
+ {
1594
+ "name": "chain_id",
1595
+ "type": {
1596
+ "kind": "field"
1597
+ }
1598
+ },
1599
+ {
1600
+ "name": "version",
1601
+ "type": {
1602
+ "kind": "field"
1603
+ }
1604
+ },
1605
+ {
1606
+ "name": "gas_settings",
1607
+ "type": {
1608
+ "fields": [
1609
+ {
1610
+ "name": "gas_limits",
1611
+ "type": {
1612
+ "fields": [
1613
+ {
1614
+ "name": "da_gas",
1615
+ "type": {
1616
+ "kind": "integer",
1617
+ "sign": "unsigned",
1618
+ "width": 32
1619
+ }
1620
+ },
1621
+ {
1622
+ "name": "l2_gas",
1623
+ "type": {
1624
+ "kind": "integer",
1625
+ "sign": "unsigned",
1626
+ "width": 32
1627
+ }
1628
+ }
1629
+ ],
1630
+ "kind": "struct",
1631
+ "path": "authwit::aztec::protocol_types::abis::gas::Gas"
1632
+ }
1633
+ },
1634
+ {
1635
+ "name": "teardown_gas_limits",
1636
+ "type": {
1637
+ "fields": [
1638
+ {
1639
+ "name": "da_gas",
1640
+ "type": {
1641
+ "kind": "integer",
1642
+ "sign": "unsigned",
1643
+ "width": 32
1644
+ }
1645
+ },
1646
+ {
1647
+ "name": "l2_gas",
1648
+ "type": {
1649
+ "kind": "integer",
1650
+ "sign": "unsigned",
1651
+ "width": 32
1652
+ }
1653
+ }
1654
+ ],
1655
+ "kind": "struct",
1656
+ "path": "authwit::aztec::protocol_types::abis::gas::Gas"
1657
+ }
1658
+ },
1659
+ {
1660
+ "name": "max_fees_per_gas",
1661
+ "type": {
1662
+ "fields": [
1663
+ {
1664
+ "name": "fee_per_da_gas",
1665
+ "type": {
1666
+ "kind": "field"
1667
+ }
1668
+ },
1669
+ {
1670
+ "name": "fee_per_l2_gas",
1671
+ "type": {
1672
+ "kind": "field"
1673
+ }
1674
+ }
1675
+ ],
1676
+ "kind": "struct",
1677
+ "path": "authwit::aztec::protocol_types::abis::gas_fees::GasFees"
1678
+ }
1679
+ },
1680
+ {
1681
+ "name": "max_priority_fees_per_gas",
1682
+ "type": {
1683
+ "fields": [
1684
+ {
1685
+ "name": "fee_per_da_gas",
1686
+ "type": {
1687
+ "kind": "field"
1688
+ }
1689
+ },
1690
+ {
1691
+ "name": "fee_per_l2_gas",
1692
+ "type": {
1693
+ "kind": "field"
1694
+ }
1695
+ }
1696
+ ],
1697
+ "kind": "struct",
1698
+ "path": "authwit::aztec::protocol_types::abis::gas_fees::GasFees"
1699
+ }
1700
+ }
1701
+ ],
1702
+ "kind": "struct",
1703
+ "path": "authwit::aztec::protocol_types::abis::gas_settings::GasSettings"
1704
+ }
1705
+ }
1706
+ ],
1707
+ "kind": "struct",
1708
+ "path": "authwit::aztec::protocol_types::transaction::tx_context::TxContext"
1709
+ }
1710
+ }
1711
+ ],
1712
+ "kind": "struct",
1713
+ "path": "authwit::aztec::protocol_types::abis::private_circuit_public_inputs::PrivateCircuitPublicInputs"
1714
+ },
1715
+ "visibility": "databus"
1716
+ }
1717
+ },
1718
+ "bytecode": "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",
1719
+ "debug_symbols": "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",
1720
+ "brillig_names": [
1721
+ "store_in_execution_cache_oracle_wrapper",
1722
+ "call_private_function_internal",
1723
+ "load",
1724
+ "notify_created_nullifier_oracle_wrapper",
1725
+ "store_in_execution_cache_oracle_wrapper",
1726
+ "enqueue_public_function_call_internal"
1727
+ ],
1728
+ "verification_key": "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"
1729
+ },
1730
+ {
1731
+ "name": "set_reject_all",
1732
+ "is_unconstrained": true,
1733
+ "custom_attributes": [
1734
+ "public"
1735
+ ],
1736
+ "abi": {
1737
+ "error_types": {
1738
+ "16761564377371454734": {
1739
+ "error_kind": "string",
1740
+ "string": "Array index out of bounds"
1741
+ },
1742
+ "17843811134343075018": {
1743
+ "error_kind": "string",
1744
+ "string": "Stack too deep"
1745
+ },
1746
+ "206160798890201757": {
1747
+ "error_kind": "string",
1748
+ "string": "Storage slot 0 not allowed. Storage slots must start from 1."
1749
+ },
1750
+ "5019202896831570965": {
1751
+ "error_kind": "string",
1752
+ "string": "attempt to add with overflow"
1753
+ }
1754
+ },
1755
+ "parameters": [
1756
+ {
1757
+ "name": "reject",
1758
+ "type": {
1759
+ "kind": "boolean"
1760
+ },
1761
+ "visibility": "private"
1762
+ }
1763
+ ],
1764
+ "return_type": null
1765
+ },
1766
+ "bytecode": "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",
1767
+ "debug_symbols": "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",
1768
+ "brillig_names": [
1769
+ "set_reject_all"
1770
+ ]
1771
+ },
1772
+ {
1773
+ "name": "_set_authorized",
1774
+ "is_unconstrained": true,
1775
+ "custom_attributes": [
1776
+ "public",
1777
+ "internal"
1778
+ ],
1779
+ "abi": {
1780
+ "error_types": {
1781
+ "16761564377371454734": {
1782
+ "error_kind": "string",
1783
+ "string": "Array index out of bounds"
1784
+ },
1785
+ "17843811134343075018": {
1786
+ "error_kind": "string",
1787
+ "string": "Stack too deep"
1788
+ },
1789
+ "206160798890201757": {
1790
+ "error_kind": "string",
1791
+ "string": "Storage slot 0 not allowed. Storage slots must start from 1."
1792
+ },
1793
+ "5019202896831570965": {
1794
+ "error_kind": "string",
1795
+ "string": "attempt to add with overflow"
1796
+ },
1797
+ "6304245522015439386": {
1798
+ "error_kind": "string",
1799
+ "string": "Function _set_authorized can only be called internally"
1800
+ }
1801
+ },
1802
+ "parameters": [
1803
+ {
1804
+ "name": "approver",
1805
+ "type": {
1806
+ "fields": [
1807
+ {
1808
+ "name": "inner",
1809
+ "type": {
1810
+ "kind": "field"
1811
+ }
1812
+ }
1813
+ ],
1814
+ "kind": "struct",
1815
+ "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
1816
+ },
1817
+ "visibility": "private"
1818
+ },
1819
+ {
1820
+ "name": "message_hash",
1821
+ "type": {
1822
+ "kind": "field"
1823
+ },
1824
+ "visibility": "private"
1825
+ },
1826
+ {
1827
+ "name": "authorize",
1828
+ "type": {
1829
+ "kind": "boolean"
1830
+ },
1831
+ "visibility": "private"
1832
+ }
1833
+ ],
1834
+ "return_type": null
1835
+ },
1836
+ "bytecode": "JwACBAEoAAABBIBKJwAABAMnAgQEAycCBQQAHxgABQAEgEcdAIBJgEkBLgiARwABLgiASAACLgiASQADJQAAAFglAAAAdSgCAAEEgEonAgIEADsNAAEAAigAgEMEAAMoAIBEAQAAKACARQQAACgAgEYEAAEmJQAABOEeAgAFAR4CAAYACjgFBgckAgAHAAAAliUAAAUKJwIFAAItCAEGJwIHBAMAEAEHAScDBgQBACgGAgctDAcILQ4FCAAoCAIILQ4BCCcCAQAALQgBBScCBwQEABABBwEnAwUEAQAoBQIHLQwHCC0OAQgAKAgCCC0OAQgAKAgCCC0OAQgtDQUHACgHAgctDgcFKwIABwAAAAAAAAAAAgAAAAAAAAAALQgBCCcCCQQFABABCQEnAwgEAQAoCAIJLQwJCi0OAQoAKAoCCi0OAQoAKAoCCi0OAQoAKAoCCi0OBwotDQUJACgJAgktDgkFLQgBCQAAAQIBLQ4FCS0NCAUAKAUCBS0OBQgtCAEFAAABAgEtDggFLQgBCAAAAQIBLgqARQAILQgBCgAAAQIBLgqARAAKJwILBAIuCIBFAAQjAAABugw4BAsMJAIADAAABG4jAAABzC0NCgYLKAAGgEQADCQCAAwAAAHpJwINBAA8CQENJwIGBAwtCAAMLQwJDS0MBQ4tDAgPLQwKEAAQAAYAJQAABRwtBAAALQ0JBi0NBQwtDQgNLQ4GCS0ODAUtDg0IJwIFAQEtDgUKASgADIBGAAgtDQgGCjgGAQgLKAAIgEQACSQCAAkAAAJXJQAABnQtCAEIJwIJBAMAEAEJAScDCAQBACgIAgktDAkKLQ4GCgAoCgIKLQ4CCi0IAQInAgYEBAAQAQYBJwMCBAEAKAICBi0MBgktDgEJACgJAgktDgEJACgJAgktDgEJLQ0CBgAoBgIGLQ4GAi0IAQYnAgkEBQAQAQkBJwMGBAEAKAYCCS0MCQotDgEKACgKAgotDgEKACgKAgotDgEKACgKAgotDgcKLQ0CBwAoBwIHLQ4HAi0IAQcAAAECAS0OAgctDQYCACgCAgItDgIGLQgBAgAAAQIBLQ4GAi0IAQYAAAECAS4KgEUABi0IAQkAAAECAS4KgEQACS4IgEUABCMAAANXDDgECwokAgAKAAAD+yMAAANpLQ0JBAsoAASARAAIJAIACAAAA4YnAgoEADwJAQonAgQECi0IAAotDAcLLQwCDC0MBg0tDAkOABAABAAlAAAFHC0EAAAtDQcELQ0CCC0NBgotDgQHLQ4IAi0OCgYtDgUJASgACIBGAAQtDQQCCjgCAQQLKAAEgEQAASQCAAEAAAPvJQAABnQcDAMBADAMAAEAAiYkAgAKAAAECCMAAARdJwIMBAIMOAQMDSQCAA0AAAQfJQAABoYAKAgCDAA4DAQNLQ0NCicCDAQNLQgADS0MBw4tDAIPLQwGEC0MCREtDAoSABAADAAlAAAGmC0EAAAjAAAEXQEoAASARgAKLQwKBCMAAANXJAIADAAABHsjAAAE0CcCDQQCDDgEDQ4kAgAOAAAEkiUAAAaGACgGAg0AOA0EDi0NDgwnAg0EDi0IAA4tDAkPLQwFEC0MCBEtDAoSLQwMEwAQAA0AJQAABpgtBAAAIwAABNABKAAEgEYADC0MDAQjAAABuigAgAQEeAANAAAAgASAAyQAgAMAAAUJKgEAAQX3ofOvpa3UyjwBAQImKgEAAQVXfS3mpJPKGjwBAQImJQAABOEuCIBFAAUjAAAFLA0oAAWAQwAGJAIABgAABZwjAAAFQS0NAQUtDQIGLQ0DBy0NBAgnAgkEBC0IAQonAgsEBQAQAQsBJwMKBAEAKAYCCycCDAQEACgKAg0/DwALAA0tDQoGACgGAgYtDgYKLQ4FAS0OCgItDgcDLQ4IBCYtDQMGDDgFBgcBKAAFgEYABiQCAAcAAAW6IwAABmstDQEHLQ0CCC0NAwktDQQKJwIMBAQMOAUMDSQCAA0AAAXhJQAABoYAKAgCDAA4DAUNLQ0NCycCDQQDDDgFDQ4kAgAOAAAGBiUAAAaGACgHAg0AOA0FDi0NDgwAOAsMDScCDAQEDDgFDA4kAgAOAAAGMCUAAAaGLgQACIADKACABAQABSUAAAfDLgiABQALACgLAgwAOAwFDi0ODQ4tDgcBLQ4LAi0OCQMtDgoEIwAABmstDAYFIwAABSwqAQABBQLcbieAdhKdPAEBAiYqAQABBeidCf6hES0OPAEBAiYlAAAE4S0NAwYtDQQHCygAB4BEAAgkAgAIAAAGvicCCQQAPAkBCQsoAAaAQwAHJAIABwAAB08jAAAG0y0NAQYtDQIHLQ0DCC0NBAknAgsEAww4CAsMJAIADAAABvolAAAGhi4EAAaAAygAgAQEAAQlAAAHwy4IgAUACgAoCgILADgLCAwtDgUMASgACIBGAAUOOAgFBiQCAAYAAAc6JQAACFEtDgoBLQ4HAi0OBQMtDgkEIwAAB8InAgYEBy0IAActDAEILQwCCS0MAwotDAQLABAABgAlAAAFHC0EAAAtDQEGLQ0CBy0NBAguBAAGgAMoAIAEBAAEJQAAB8MuCIAFAAkAKAkCCgEoAAqARQALLQ4FCy0OCQEtDgcCLgqARgADLQ4IBCMAAAfCJi4BgAOABgsAgAYAAoAHJACABwAAB94jAAAH6S4AgAOABSMAAAhQLgAAAYAFAQAAAYAEAAEBAIADgASACS4AgAOACi4AgAWACwsAgAqACYAMJACADAAACDwuAYAKgAguAoAIgAsBAIAKAAKACgEAgAsAAoALIwAACAsoAYAFBAABAwCABgACgAYjAAAIUCYqAQABBUWnynEZQeQVPAEBAiYuABjKGMo=",
1837
+ "debug_symbols": "7Z3bbts4EIbfxde54PnQVykWQZKmhQEjKXJYYBHk3VcOLCkJx6I1oyZK+d8EVc3fHH0acYYjin7a/Li+fPx1vr35eXu/+fb9abO7vbp42N7edEdPz2eby7vtbrf9df76vzdq/0cb8yK4/31xsz++f7i4e9h809omc7a5vvmx/7dTqvuSn9vddXdk4vNZ0d4lnQ7NXTJhaJ0U0Th5Hw6Nk4/6deN/zjqLIm2RU2G06FUfRywKzvcWBe8qFrmUB4uUf2+RPYWRSW8setFFns55ns4rSueUH66NSuPJBU2Q0CrYoQ9txy4CBVmn4ZLk0RyrD+b4dZmTV2VOcOsyZ1104rroxHXRSXZd5sRVmZPNuswJH23OEF6NMm/MKdvGPITJmPP4zYaMk3b4ZmfGlMB4oqnR2fVWGG2mG3vTf6/fB/OxacfPKA1+In4e/CT8tAI/ET/4n4ifgf/J+MH/ZPwy+En4WQt+In4J/CT8nAE/Eb8IfhJ+HvO3Kr+gen5BF/yQv4j4BeTPMn4O/Gr8hrbhbdM9v4T7V8YP8w8Rv4z7V8YP/ifhZxX8T8YP/ifip1F/kfHD/FfEz6D+IuOH5+cifhb1Fxk/zN9E/BzqLzJ+DvxKKHgoVELxyHQJKEhfSygBOQEBBYlmCSUiehNQEJIJKKhTlVASQjIBBSG5hJJRJiKgICQXUJxCSCagoEpTQtFI8wko8JQSCl4yIKA0unLW2BGK8++hNLqcLup+hwATrWU3fiHoQLBCUIfx/EJ6vyTRxTZvzAUJJtzFUoJtphFLEmyzYDSLYIzD1gIxF7G40aWdSxJs8znicgS9QiyWEmyzyLUgwUa3aFiSICKJlCCyGSFBAx+UEkQ2IyRokc1ICSKbERJsdMHskgQRSaQEEUmEBD0iiZRgm8uEFiTY6DLfWQSzHjbVzqYkiFmdkGBcYAWkTn1j/fqJNE2wGzf6E/XZjU8dtKWohNyfadThzTe/GJ++sPEpfGHjl3i08XnG10eNVxtF/+kdqIOy6zInrcocvS46el10zLromLgqc054t/pDzQmrMueEQsbC5vxVOyeGE8oY4DfFL4OfhJ+H/8n4wf9E/AL8T8YvgZ+E3wnLjMFvil8EPwm/pMFPxC+An4RfxvxNsnN2OKGGCX5T/JA/S/jFj6/7/lU7r0WF/EXETyN/lvGD/4n4GfifjB/8T8TPYv4m4+fBT8IPz9+E/Bz4ifhh/ibi5zF/k/HD8w8Rv4D8mYCConIJJSLTJaAgfSWgICcooSQHKCUURO8SSkZIJqCgTlVASQohmYCCkFxC0SgTEVAQkgkoCMklFIMqDQEFaX4JxcJTCCgYU0oovs08ZXLn8RTbvH2W23k8Nboge7k9i1Nq88ZckGDGXSwl2GbEXI5gVm1W0ZbbWSg3ujR2QYK6zfrckgQRi6UE25ylL0iw0eLPkgQRSYQELbIZKUH4oJCgQzYjJYhsRkoQ2YyQYKMLjpckiEgiJBgQSaQEEUmkBBFJZLs+ZzxpkhJcYvMf7gbIIalxMxh6A+QYYo8wubFtPBgfvrDxS2zb8lnGa7XEs41PtL46bnTGVay3Zhg3rMtv+ihbJ+V7g5IKo/XkUOBSvz7B5bGptQfj6/tdLG68UYPxzkwbH9Pw1TFFN91YaxfyMPp6rV43fznZRqtOVg1WWO3eDdodlTbjXoWKg68QVHyb665rVNqcvVSoBPgKRQW+QlFpc/ZqshmoKF9QiQ5UCCptriWrUElt5is1Km3ufFCh0ugmuTUqGG0pKhhtSyq60W1qa1TgKwSVRrdErVBxbf5S7vQ8SDf6C8w1KvAVgsoJlYQGqUQFKgQV+ApBJcFXKCquSSqVfCW1+avqFSrZggpBpc18ZZqKOWF3rxaptBmZa1Qw2hJUNEZbikoClZKKga8QVGyb9ZVpKtY4ikq0/Wq66Gyhod/9yq7vKPuyH/ptp2kN/X5PRRPna+h3OLQaVkd31z2VqsBR0TWKqspzVInVV2L1lVl9ZU5fTimWinO9nGb1pVnnRe9vUFPRo31VFTkqq1mqMHuMcfSPAWXVr2jOhtDMH5ccfRdP9xMZttHreSqaNF9DrwWZZpDmj5kuz+/H0/dtRTP/mnrN6Edz+qFjmu/9OkdTaOh4W9Ew+qFXdk9r6HXPFQ2jH8/ox4fK9SE0dFyfvqYhzNdERj9xfj7k6erstCYz7oU8fzwIyjA0ab5GW4aG0Y9hnI+Z7zvBKoZmvh+EzMkSQuZkCZGu9nUTpnHy5HWpyhwVvcKipqKvblVFZ5Dd09hBlUoa9Ai5z2J7lVNlX16zVJ6lyhxVoD3Kj2+Eea9KVeKoIqsv+p3UqipwVHQ+VFVlhiopx1EdmcnUVJ6jMqy+zJHzisOLxz4XUT5Zw1JFjsp5jsorlopFwyeOKrAY0nmPtuOL4tbqUhU4qiO1jJrKsVSJozoyAtRUHBpZaZaK1ZdWLJVjqTjk85Fobl0cVEGVqsRR0T/yXFM5xVIFjupI5lBTZY7qSA4wnTnkwMmIctQs1ey+nrujfy/utheXu+v7TrP/8PHm6mF7e3M4fPjvd//J5d12t9v+Ov99d3t1/ePx7vp8d3u1/2yjDn++d0XOM6fD3pr9ofHmzPi4P9yfkNOx+zR3vXY9/w8=",
1838
+ "brillig_names": [
1839
+ "_set_authorized"
1840
+ ]
1841
+ },
1842
+ {
1843
+ "name": "consume",
1844
+ "is_unconstrained": true,
1845
+ "custom_attributes": [
1846
+ "public"
1847
+ ],
1848
+ "abi": {
1849
+ "error_types": {
1850
+ "12737498021964987455": {
1851
+ "error_kind": "string",
1852
+ "string": "unauthorized"
1853
+ },
1854
+ "16761564377371454734": {
1855
+ "error_kind": "string",
1856
+ "string": "Array index out of bounds"
1857
+ },
1858
+ "17843811134343075018": {
1859
+ "error_kind": "string",
1860
+ "string": "Stack too deep"
1861
+ },
1862
+ "206160798890201757": {
1863
+ "error_kind": "string",
1864
+ "string": "Storage slot 0 not allowed. Storage slots must start from 1."
1865
+ },
1866
+ "5019202896831570965": {
1867
+ "error_kind": "string",
1868
+ "string": "attempt to add with overflow"
1869
+ },
1870
+ "715723737710351018": {
1871
+ "error_kind": "string",
1872
+ "string": "rejecting all"
1873
+ }
1874
+ },
1875
+ "parameters": [
1876
+ {
1877
+ "name": "on_behalf_of",
1878
+ "type": {
1879
+ "fields": [
1880
+ {
1881
+ "name": "inner",
1882
+ "type": {
1883
+ "kind": "field"
1884
+ }
1885
+ }
1886
+ ],
1887
+ "kind": "struct",
1888
+ "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
1889
+ },
1890
+ "visibility": "private"
1891
+ },
1892
+ {
1893
+ "name": "inner_hash",
1894
+ "type": {
1895
+ "kind": "field"
1896
+ },
1897
+ "visibility": "private"
1898
+ }
1899
+ ],
1900
+ "return_type": {
1901
+ "abi_type": {
1902
+ "kind": "field"
1903
+ },
1904
+ "visibility": "public"
1905
+ }
1906
+ },
1907
+ "bytecode": "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",
1908
+ "debug_symbols": "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",
1909
+ "brillig_names": [
1910
+ "consume"
1911
+ ]
1912
+ },
1913
+ {
1914
+ "name": "unconstrained_is_consumable",
1915
+ "is_unconstrained": true,
1916
+ "custom_attributes": [],
1917
+ "abi": {
1918
+ "error_types": {
1919
+ "16761564377371454734": {
1920
+ "error_kind": "string",
1921
+ "string": "Array index out of bounds"
1922
+ },
1923
+ "17843811134343075018": {
1924
+ "error_kind": "string",
1925
+ "string": "Stack too deep"
1926
+ },
1927
+ "206160798890201757": {
1928
+ "error_kind": "string",
1929
+ "string": "Storage slot 0 not allowed. Storage slots must start from 1."
1930
+ },
1931
+ "5019202896831570965": {
1932
+ "error_kind": "string",
1933
+ "string": "attempt to add with overflow"
1934
+ }
1935
+ },
1936
+ "parameters": [
1937
+ {
1938
+ "name": "on_behalf_of",
1939
+ "type": {
1940
+ "fields": [
1941
+ {
1942
+ "name": "inner",
1943
+ "type": {
1944
+ "kind": "field"
1945
+ }
1946
+ }
1947
+ ],
1948
+ "kind": "struct",
1949
+ "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
1950
+ },
1951
+ "visibility": "private"
1952
+ },
1953
+ {
1954
+ "name": "message_hash",
1955
+ "type": {
1956
+ "kind": "field"
1957
+ },
1958
+ "visibility": "private"
1959
+ }
1960
+ ],
1961
+ "return_type": {
1962
+ "abi_type": {
1963
+ "kind": "boolean"
1964
+ },
1965
+ "visibility": "public"
1966
+ }
1967
+ },
1968
+ "bytecode": "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",
1969
+ "debug_symbols": "7Z3dTt04FIXf5VxzYW//z6tUIwSUVkdCUAEdaVTx7pODTpJDt4mxd9TJwesGNcUr2fmcn7Uc4vzafb29/vn9cn//7eFp99eXX7u7h5ur5/3D/bD06+Vid/24v7vbf788/e+dOvwg9dr+6cfV/WHx6fnq8Xn3l1aK0sXu9v7r4d/D0rCOb/u722GJwssFax+VO7aOZKa2kTJNHY1NnTtZrdMvf1/sSK9SjfNjNSEuV2PNuGLrI6uG1qgmKXNsnXRYrsZPGD15Vo1ZpRqrx2qcLVQT1bFpULynbK4ap6dinHbzLnidWb9WfiSjtZ4PG+1zhes4dqpOc0+ZAemhGrepavymqgmbqiZuqpq0pWqM2lQ1elPV0KaqMZuq5o9fi6cbLCl6Uw1vG5Idb2ohpXnNFFWmtZnWbGm+55DLNCWd7FgFaVpu7Ghcr6Nw2vSAzwGfBJ8HPgm+AHwSfBH4JPgS8AnwWQV8Enwa+CT4CPgk+AzwSfBZ4JPgQ+oQ4UPqKOLz4/itO+z/W3xIHSJ8SB0ifEgdRXxTW/+26YDPIXWI8CF1iPAhdYjwIXWI8Fngk+BD6hDhQ+oQ4UPqEOFD6hDhQ+qQ4PNIHSJ8SB0ifEgdInxIHZyJBRPGBPmAM4Hp50zg5DkT2HPOBJ6bMQkw0pwJ3DFnAsvLmcDHciYWTBgT+FjOBD6WM4GP5UzgYzkT+FjGJMLHciZ93ovJzEys+51Jn9fYoMf9o2BMc+MDwD4vyDUAtZ/3z8ff/94w9nn1Xg9g6vNSvyLAPsc3VgTY52BIFcAQpkkCQvr9Lpz6HDlZEaAFQBnAPsdkVgTY5wDOigCRRIQAkUSEAJFEZAC1QhSREkQWkRJEGJESRBqRErQgKCSIPCIliEAiJYhEIiWISCIliExSJJg0jfuXiBHUyCRSgitkEh3juIXTh9B5gs5N54RLdn7aoE2Oik9jHUH7N2t+LZ7OuXhzzsXbcy6+7D+DWfWqsTSJtNZ+W+WEbZUTt1VO2lQ5pLZVjt5WObStcsy2yrF/upxPNRGiJgd+In4e/ET8AviJ+EXwE/FL4CfhZxT4ifhp8BPxI/AT8TPgJ+JnwU/ED/lDMhe2NsgfMn7IHzJ+yB+SmdW0Qf4Q8bPIHzJ+yB8yfsgfMn7IHzJ+FvxE/JA/ZPyQP2T8kD9k/JA/ZPyQP0T8HPKHjB/yRwYKQkUGCpJCBooFFA4Fnj4DBUY9AwXuOwMFljoDBT6ZQ/EwvxkocLQZKHC0GShwtBkoFlA4FDjaDBQ42gwUONoMFDhaDiX06VMWJxvXH/gaymeEst5s4zr0eatab65iHfq8r61JsM+b4JoE+7xjrkmwzwGjFWcWin2OLq1JsE+LtybBPset1iTY5yDXmgQtCAoJIpNICSKTSAkik0gJIpNICSKTCAkmZBIpQWQSKUFkEilBZBIpQQuCQoLIJMJZnxMyiZTgCpmkdQJkH9U8GUx+AuTgw4gw2rltOBYfz7n4dL7Fk1LnXHzZfyYqFO/SOCOK9tq92UTmhB2i/3jCkppnsI2UPWF9nK4xxi83Dnq6xPh4gjBXhY3z/qk3bV+hUJ9Q9DSzjQkcigEUDsUCCofiAIVD8YDCoQRA4VAioHAo6fNAUTOUVIBiaKrZGD3bN2Oy+UaFKb+pOK/buFzrOCWnaGyhrZ86x5/s3qHtoXM+8MkmdM7/1jl/3uGHuXPILPN2YUzk7pSJOdZOZ1y7OePa+3w6a9RUxen5TEcofT5wLUDp8xnqMhTq87FoAUqfTzoLUPp8eFmA0ufzyAIU2+f7aYkmKMoxKH0+NSxA6fNBYAFKn462AKVPR1uA0qejXYbS6XetClA6fWV8GUqfjrYApU9HW4AC88ahfOADHsWPsH+67POBr3J0CIUAhUMxgMKhWEDhUBygcCgeUDiU0CWUgk+JgMKhJEBhUFyfjrYApU9HW4DSp6MtQOnT0RagWEDhUPp0tAUofTraAhSYNw4lZH1KMCOTYA2TZK/NyY6bSY5vxdZLXL3E10uyKUer6e9Qhx6PTBRbRKlBlJ/9riTSLSJqEZkWkW0RuRaRbxG1HBGx5YiILUdEajkiUssRkVqOiPyUAIuXk/w78EmNMzQn4pL6Ez3/ru3SVkz+Dddlia6XUL2k+gJslK2XuHqJr5eEekmsl6RqSf7tjuTGIzkFYhJdL6F6iamX2HqJq5f4ekmp9zOS+t7X9b2f/1vmZYmul1C9pP7cp/pzn+rPfao/96n+3Kf63qf63jf1vW/qe9/U975tMFzG2hZR3nBpM+cfp5nIt4hCiyi2iPKGS3s3iSIDkR+e01ZN7yhZxbaUH74qiWyLyLWI8v3kaKLnnGKi0CKKLaLUIMp/hq4k0i0iahGZFpFtEbkWUcsR4d85IqaX7LRL7P7tY4soNYiCahHpFhG1iEyLyLaI8p1r5mmhhtsXE4UWUWwRpQbROyMjBZFuEVGLyLSIbIvItYhajojYckS8MzIy3PUnkWcXlndGRpZF74yMFES6RUQtItMisi2iFkuQH1IpiUKLKNaKXoalf64e91fXd7dPg+bwy5/3N8/7h/vj4vO/P8bfXD/u7+723y9/PD7c3H79+Xh7efdwc/jdTh1/fBnWf2GJhmJeQz55fUHeHxYPR4Md7nmW3LDVYcv/AQ==",
1970
+ "brillig_names": [
1971
+ "unconstrained_is_consumable"
1972
+ ]
1973
+ },
1974
+ {
1975
+ "name": "set_authorized",
1976
+ "is_unconstrained": true,
1977
+ "custom_attributes": [
1978
+ "public"
1979
+ ],
1980
+ "abi": {
1981
+ "error_types": {
1982
+ "16761564377371454734": {
1983
+ "error_kind": "string",
1984
+ "string": "Array index out of bounds"
1985
+ },
1986
+ "17843811134343075018": {
1987
+ "error_kind": "string",
1988
+ "string": "Stack too deep"
1989
+ },
1990
+ "206160798890201757": {
1991
+ "error_kind": "string",
1992
+ "string": "Storage slot 0 not allowed. Storage slots must start from 1."
1993
+ },
1994
+ "5019202896831570965": {
1995
+ "error_kind": "string",
1996
+ "string": "attempt to add with overflow"
1997
+ }
1998
+ },
1999
+ "parameters": [
2000
+ {
2001
+ "name": "message_hash",
2002
+ "type": {
2003
+ "kind": "field"
2004
+ },
2005
+ "visibility": "private"
2006
+ },
2007
+ {
2008
+ "name": "authorize",
2009
+ "type": {
2010
+ "kind": "boolean"
2011
+ },
2012
+ "visibility": "private"
2013
+ }
2014
+ ],
2015
+ "return_type": null
2016
+ },
2017
+ "bytecode": "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",
2018
+ "debug_symbols": "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",
2019
+ "brillig_names": [
2020
+ "set_authorized"
2021
+ ]
2022
+ },
2023
+ {
2024
+ "name": "is_reject_all",
2025
+ "is_unconstrained": true,
2026
+ "custom_attributes": [
2027
+ "public",
2028
+ "view"
2029
+ ],
2030
+ "abi": {
2031
+ "error_types": {
2032
+ "16761564377371454734": {
2033
+ "error_kind": "string",
2034
+ "string": "Array index out of bounds"
2035
+ },
2036
+ "17843811134343075018": {
2037
+ "error_kind": "string",
2038
+ "string": "Stack too deep"
2039
+ },
2040
+ "206160798890201757": {
2041
+ "error_kind": "string",
2042
+ "string": "Storage slot 0 not allowed. Storage slots must start from 1."
2043
+ },
2044
+ "5019202896831570965": {
2045
+ "error_kind": "string",
2046
+ "string": "attempt to add with overflow"
2047
+ },
2048
+ "9474245853673257536": {
2049
+ "error_kind": "string",
2050
+ "string": "Function is_reject_all can only be called statically"
2051
+ }
2052
+ },
2053
+ "parameters": [
2054
+ {
2055
+ "name": "on_behalf_of",
2056
+ "type": {
2057
+ "fields": [
2058
+ {
2059
+ "name": "inner",
2060
+ "type": {
2061
+ "kind": "field"
2062
+ }
2063
+ }
2064
+ ],
2065
+ "kind": "struct",
2066
+ "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
2067
+ },
2068
+ "visibility": "private"
2069
+ }
2070
+ ],
2071
+ "return_type": {
2072
+ "abi_type": {
2073
+ "kind": "boolean"
2074
+ },
2075
+ "visibility": "public"
2076
+ }
2077
+ },
2078
+ "bytecode": "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",
2079
+ "debug_symbols": "7Z3dbuI6EMffheteePztfZXVUUVbtkJCUFF6pKNq3/0klIQPW2TtsSpY/28QAU9m/IuTGdtj53P2snj6eH1crn9t3mc/fn7OVpvn+W65WXdHn78fZk/b5Wq1fH08/Xkm+g8Sci/w/jZf98fvu/l2N/tBFIR5mC3WL/vv0nUn+bVcLbqj/ntU3omgDsUdiTCW9iJROEhtD4WDtGeF/3noLHJ/YlE4s6iXI1koV6hPmjI5JVJyWstBTGttRylLCYIkrBp1kDqqsKmLQ37ATcGPZRUdzNG3ZU64KXP0bdHRt0XH3BYd42/KHCtvyxx3U+Y4+m5zzGCOFPLMnIQ/C3oww4VwPLNMOjQ1nllLcSxrEkUlBT1YIUleL2zkcF5z4oG7ont+Fvw4/LwAPxY/A34cfgHtj8cP7Y/DTwq0Px4/DX4sfh78OPxIgR+LnwM/Dj8pwY/FD/23SX5WDPz6+p/zU4hfePwQP/P4BfCb4jeWtedFe34W9y+PnwY/Fj/cvyx+Du2Pxw/tj8XPo/3x+GH8hcUvoP/L44fxFw4/JTB/zuOH8RcWP0L/jccP4y88foifYygSk0IJKIh0YygK4WsCCmKCGIpGoJmAAu+dgAKXHEP5/hz5e4AClxxDsXDJCSgYJoqhYO1ECgpccgwFqxxSUBDmx1CwHiEFBc+UCIrGyoEEFNkmFKmOULS5hKLaDPMdhcEKp1Rx4Z6gbrNPkEOQ7LF+1lNEsM0OREWCpk0nWJFgo7muNQlqEJwi6Ny434ILkS9uNN+1IkHX5uRqTYLwxUyCvs2Rv5oEEc1wCcKTMAkGDYJMgmiDPIJGIJrhEkQ0wyRIiGa4BBHNcAnCkzAJNpp0XJMgPAmTYKPpzDUJtpkUkUUwkBzqF2RE8Pv3iv7rCFaYLybvBw2nM9JpgsaM94T14rhHE6kUFWfdgNDrY1n3ZbxR92z8PZO39o6N/4NcTmumjFdhfGrYcxUJc4wdquqMn3hXg1NH47Ww1wt3dow7JvU2qdPi+7q6b6+rGetqhb5uvnHDs+kUi1Jf18nLO7b9frnbRtdpKzFaoUhfOErb6MDJBBS0lBiK1IASQ2lzzOc6FIWWkoCClhJD0W0O+MkgRyjCTHR0xdgr7qrqI4JtDvhVJGjajICyCJI61s9QRLDNcKkiwUaTUmsSbNO9ViTYaFJqHkFrxvr5yJM0moyVRVCLcVxPi6gNhjaXedUj6ESb05c1CSKaYRJsdEPHLIJGjvUzRkQE20zGqkiw1VXUFQnCFzMJKkTUXILo1TEJakQzTIIYH2QTxBg1k2CjG/rVJIg2yCTY6FaBeQTHBCQyQUYEEc0wCTb6qqaKBBt92VBNgvAkPIK+0RcO1SSI8UEuQfhiJkHC+OAkQXVcpKTU5TyJb3S5a02C8MVMggq+mEsQvphLEL6YSRB51GyCiGaYBA3aIJcgohkmQYtohksQ0QyXIKKZaYLajQTt5UyTb/T9SxUJeozycwnCFzMJBsSDXILok/AIBuTycwkil5+5GiKQBkEmQTwHmQQb3bulIkHk8l8Q7KCQkMmemhs3+HJaRTLpjPSgB0XBxHqMKJDRBTI+Xyadm3t904nuJ1cilc7BnJSyJVK+SJcv0hWKdIUSXSSoSKrkehEV6aKieqVXvE1K6SIpXyKlZJGUy37GkE5yD2J4xWiQCZn85xKl7+LrelyBbekRsQmZkC/jVT4Dn//MpJCvR6bv2wmZ/GsqqUAPFehJ36/BDO06OBnLmHwZVaAn/brd6zLpOegJmQI9pkBPembt5PokZNJ+/fo1tS5fxhXo8aJAxuTLhIJ7IeQ/D5RQBTIhX4Z0gUyBHllQH5nfdpSiApnMdvC7O/p3vl3On1aL906i//Nj/bxbbtaHw91/b8M/T9vlarV8fXzbbp4XLx/bxeNq89z/NxOHj59dg3+QQe0juO6w3y6bvg77ysigu39tp7XT/D8=",
2080
+ "brillig_names": [
2081
+ "is_reject_all"
2082
+ ]
2083
+ },
2084
+ {
2085
+ "name": "process_log",
2086
+ "is_unconstrained": true,
2087
+ "custom_attributes": [],
2088
+ "abi": {
2089
+ "error_types": {
2090
+ "16775516380094354375": {
2091
+ "error_kind": "fmtstring",
2092
+ "item_types": [],
2093
+ "length": 40
2094
+ },
2095
+ "17843811134343075018": {
2096
+ "error_kind": "string",
2097
+ "string": "Stack too deep"
2098
+ }
2099
+ },
2100
+ "parameters": [
2101
+ {
2102
+ "name": "_log_plaintext",
2103
+ "type": {
2104
+ "fields": [
2105
+ {
2106
+ "name": "storage",
2107
+ "type": {
2108
+ "kind": "array",
2109
+ "length": 18,
2110
+ "type": {
2111
+ "kind": "field"
2112
+ }
2113
+ }
2114
+ },
2115
+ {
2116
+ "name": "len",
2117
+ "type": {
2118
+ "kind": "integer",
2119
+ "sign": "unsigned",
2120
+ "width": 32
2121
+ }
2074
2122
  }
2075
- },
2076
- {
2077
- "name": "tx_context",
2078
- "type": {
2079
- "fields": [
2080
- {
2081
- "name": "chain_id",
2082
- "type": {
2083
- "kind": "field"
2084
- }
2085
- },
2086
- {
2087
- "name": "version",
2088
- "type": {
2089
- "kind": "field"
2090
- }
2091
- },
2092
- {
2093
- "name": "gas_settings",
2094
- "type": {
2095
- "fields": [
2096
- {
2097
- "name": "gas_limits",
2098
- "type": {
2099
- "fields": [
2100
- {
2101
- "name": "da_gas",
2102
- "type": {
2103
- "kind": "integer",
2104
- "sign": "unsigned",
2105
- "width": 32
2106
- }
2107
- },
2108
- {
2109
- "name": "l2_gas",
2110
- "type": {
2111
- "kind": "integer",
2112
- "sign": "unsigned",
2113
- "width": 32
2114
- }
2115
- }
2116
- ],
2117
- "kind": "struct",
2118
- "path": "authwit::aztec::protocol_types::abis::gas::Gas"
2119
- }
2120
- },
2121
- {
2122
- "name": "teardown_gas_limits",
2123
- "type": {
2124
- "fields": [
2125
- {
2126
- "name": "da_gas",
2127
- "type": {
2128
- "kind": "integer",
2129
- "sign": "unsigned",
2130
- "width": 32
2131
- }
2132
- },
2133
- {
2134
- "name": "l2_gas",
2135
- "type": {
2136
- "kind": "integer",
2137
- "sign": "unsigned",
2138
- "width": 32
2139
- }
2140
- }
2141
- ],
2142
- "kind": "struct",
2143
- "path": "authwit::aztec::protocol_types::abis::gas::Gas"
2144
- }
2145
- },
2146
- {
2147
- "name": "max_fees_per_gas",
2148
- "type": {
2149
- "fields": [
2150
- {
2151
- "name": "fee_per_da_gas",
2152
- "type": {
2153
- "kind": "field"
2154
- }
2155
- },
2156
- {
2157
- "name": "fee_per_l2_gas",
2158
- "type": {
2159
- "kind": "field"
2160
- }
2161
- }
2162
- ],
2163
- "kind": "struct",
2164
- "path": "authwit::aztec::protocol_types::abis::gas_fees::GasFees"
2165
- }
2166
- },
2167
- {
2168
- "name": "max_priority_fees_per_gas",
2169
- "type": {
2170
- "fields": [
2171
- {
2172
- "name": "fee_per_da_gas",
2173
- "type": {
2174
- "kind": "field"
2175
- }
2176
- },
2177
- {
2178
- "name": "fee_per_l2_gas",
2179
- "type": {
2180
- "kind": "field"
2181
- }
2182
- }
2183
- ],
2184
- "kind": "struct",
2185
- "path": "authwit::aztec::protocol_types::abis::gas_fees::GasFees"
2186
- }
2187
- }
2188
- ],
2189
- "kind": "struct",
2190
- "path": "authwit::aztec::protocol_types::abis::gas_settings::GasSettings"
2191
- }
2123
+ ],
2124
+ "kind": "struct",
2125
+ "path": "std::collections::bounded_vec::BoundedVec"
2126
+ },
2127
+ "visibility": "private"
2128
+ },
2129
+ {
2130
+ "name": "_tx_hash",
2131
+ "type": {
2132
+ "kind": "field"
2133
+ },
2134
+ "visibility": "private"
2135
+ },
2136
+ {
2137
+ "name": "_unique_note_hashes_in_tx",
2138
+ "type": {
2139
+ "fields": [
2140
+ {
2141
+ "name": "storage",
2142
+ "type": {
2143
+ "kind": "array",
2144
+ "length": 64,
2145
+ "type": {
2146
+ "kind": "field"
2192
2147
  }
2193
- ],
2194
- "kind": "struct",
2195
- "path": "authwit::aztec::protocol_types::transaction::tx_context::TxContext"
2148
+ }
2149
+ },
2150
+ {
2151
+ "name": "len",
2152
+ "type": {
2153
+ "kind": "integer",
2154
+ "sign": "unsigned",
2155
+ "width": 32
2156
+ }
2196
2157
  }
2197
- }
2198
- ],
2199
- "kind": "struct",
2200
- "path": "authwit::aztec::protocol_types::abis::private_circuit_public_inputs::PrivateCircuitPublicInputs"
2158
+ ],
2159
+ "kind": "struct",
2160
+ "path": "std::collections::bounded_vec::BoundedVec"
2161
+ },
2162
+ "visibility": "private"
2201
2163
  },
2202
- "visibility": "databus"
2203
- }
2164
+ {
2165
+ "name": "_first_nullifier_in_tx",
2166
+ "type": {
2167
+ "kind": "field"
2168
+ },
2169
+ "visibility": "private"
2170
+ },
2171
+ {
2172
+ "name": "_recipient",
2173
+ "type": {
2174
+ "fields": [
2175
+ {
2176
+ "name": "inner",
2177
+ "type": {
2178
+ "kind": "field"
2179
+ }
2180
+ }
2181
+ ],
2182
+ "kind": "struct",
2183
+ "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
2184
+ },
2185
+ "visibility": "private"
2186
+ }
2187
+ ],
2188
+ "return_type": null
2204
2189
  },
2205
- "bytecode": "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",
2206
- "debug_symbols": "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",
2190
+ "bytecode": "H4sIAAAAAAAA/+Wc6XLbNhDHKZu0TcmyZPmK3Svp3bRpKYnU0dNt0/u+lM+KYz8HHyPta7Rf2qer/jFXWsHojDteTPxPMMOhpYV2f1wuARBYuBadl8nsqFV/x9V5vTrj+060XKTucXXOrla6hrqyUIw1AsYVAsZVAsaYgDEhYFwjYFwnYNwgYEwJGOsEjA0Cxk0CxiYB4xYBY4uAsU3AuB2AMQRnh4Rzx5BTj+1D8e5G1z9G9wgY9wkYDwgYbxAwHhIwHhEwPkPA+CwB43MEjM8TML5AwHiTgPEWAeOLBIwvETC+TMD4CgHjqwSMrxEwvk7A+AYB420CxjcJGN8iYLxDwPg2AeM7BIwZAWOXgLFHwNgnYMwJGAsCxgEB45CAcUTAOCZgfJeA8T0CxvcJGD8gYPyQgPEjAsZjAsaPCRg/IWD8lIDxLgHjZwSMnxMwfkHA+CUB41cEjF8TMH5DwPgtAeN3BIzfEzD+QMD4IwHjTwSMPxMw/hKAMQTnryScv5FwTgJxRvcc6JXZgY1b2BiFjUfY2IONM9iYgo0f2FiBjQvYGIDEeyS2I3G8PTuQ+IykYiTsIgkWSaZI4kSSJJIQkeSHJDokqSEJDElWSGJCktDN2XFrdiCJBEkaSIJAkgEW8bFIjkVoLPJiERWLlFgExCIbFrGwSISrwiIHFhEwSY9JcEwyYxIXk6SYhMQkHybRMEmFSSBMsmASQyYJ8JKLl0i8pOElCC8ZGMRjkIxBKAZ5GERhkIJBADpZdGLoJNAIo5FDI4KHFA8AgmsS/XeRIPmnOqfVeUXJDTfRdVPHrqX+UTa+n3quz5C/n1Y6N4LoL4aiPw3Dn8lG27vlQr++FrG7Wp0n5cKXk3KZSeo8VHUeOnXkesLc7zwP669ur+n4KFLXIrbrYWz3a449fV+0TOzXo5Cxeb4pWdsTHtc/0nY0pU654Kk5sri8eB0iS5RM7i/s3Fb13NjacGTCgiLx21S+kXKvksk9jZVOu3gtRmHjNc8eX7zm3ScxXmNHFpcXr+P/xquOLTdek2hRpC0V2ZqS/e7I1pXsj3Jhu1Acg+rvsG3yeR+snz3rPmzHw69toayXC39IDK6q7xLlv0f+0fUdWapkcblsp159jpUdrUs4Eqd+Xn1uVec19Rv5fdtjf82xv8Tt+c71S+qpn3rqI9buVH83qgMx9Jf8Jrr47OI4rj5nVyrDwtdO2ukfdH1toaH+U9HfCKK/l4n+zTD8836qGeb+DkT/Vhj+efy0wvD3RH87DP+Z6N8Owz9/j+kE0V/Mx+U7Yfjn8b8bxv9z/r0w/HP9+2H45/f3IIz+sYw7bkSL4o4zD9X3dv1/b3zZcabYrzusocaZhw6P6x89zoTsyMPa9sjcZ/TIY+fIY8ena9NQ14Ghrm1DXQ1DXfuGutqGuuqGuvYMdbUMdaWGuizvo6W/LGN111CXZaxuGeq6ru2E5fNo6fvrGqsbhrosY8IyVi39tWOoy7KNthwDNA11WfYdls/QdY2vp6H9CtEPhV0PzDLfPFhkp987D2aoPxNfS6zquW9tU64vcer/6fh5M4ife1N5J5M2SPvCN1dlabvm2Isi//us2G96eIS77pFd5R/Mno5OTsf383wwzIuifzKsOfqF1f1OzzvrPkfX970b++bVDH098q3xtJRfUWIl23JkiZIJo17j8c07WvJfxv/aftsjc8del72XnWg51vTz2IgWz3Bc2l/7cHTeljxirPQn0fIabuTYT5z6f1ef3bbuqs/I2XDaPetPz6bF9MGD/GTacfRrH8JP/wJJ9PoyCV0AAA==",
2191
+ "debug_symbols": "tZZBCsMgEEXv4tpFNNWxvUopxSSmCGKCSQol5O7VUtrQrv9GZmT0ufDBX1nnmuV29bEfJnY6rywMrZ39EHO3bpw1yYfgb9f9NqvKIpR+HZhGG0s/zTbN7CRqaQxnLnalrmuTL+l9cLmTuf6bJ/keJvpMKrFdeAYQGmDQgCMYoCs0QKABEg2o0YADGqDQALTJGm2yRpus0SYT2mRCm0xokwltMqFNJrTJhDaZ0CYT1OQtd3ebvG2CeyecfontLvDMj9H9ZJ8xDa3rluRKCvoGoPIbD5IrWZ5d7BWm4sKoDMmgJw==",
2207
2192
  "brillig_names": [
2208
- "store_in_execution_cache_oracle_wrapper",
2209
- "call_private_function_internal",
2210
- "load",
2211
- "notify_created_nullifier_oracle_wrapper",
2212
- "store_in_execution_cache_oracle_wrapper",
2213
- "enqueue_public_function_call_internal"
2214
- ],
2215
- "verification_key": "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"
2193
+ "process_log"
2194
+ ]
2216
2195
  },
2217
2196
  {
2218
- "name": "public_dispatch",
2197
+ "name": "sync_notes",
2198
+ "is_unconstrained": true,
2199
+ "custom_attributes": [],
2200
+ "abi": {
2201
+ "error_types": {
2202
+ "17843811134343075018": {
2203
+ "error_kind": "string",
2204
+ "string": "Stack too deep"
2205
+ }
2206
+ },
2207
+ "parameters": [],
2208
+ "return_type": null
2209
+ },
2210
+ "bytecode": "H4sIAAAAAAAA/7WTyw7CIBBFqcUo0sTEx39MU0y7dOHafyCtLHVRN+766dZkJkyI0QVwEzJMgMNcHoXwKjBKESGCHDEqjAs2Xs7tjDnEqVbBvin5HRijvvhLWH+jkFnk4QPxM50/rJBzmTyfe6F913PTrF8J/z5y+af7y+l//8OzRq9bzCvh/8P4uvfXx/M2ij/SbJGc0ptoOwAqvkT+EvmhJBvn8w+Yb4Svj6KMqNO1tnaNdfZkh8H0dhfwP+KH/QbzqHp4zgQAAA==",
2211
+ "debug_symbols": "ZY5bCoMwEEX3Mt/5MLGV6lakSNRRAiGRPAolZO+diNDQ/lzmDofLSbDiHPdJmc16GMYE2i4yKGuopcxgdkprtU/1G5oSvD15f0hTqg/SBRh424uOAZr1vLueNjalkZp4ZPbHE37RN86/bCfyM1N9SafkrPGy2aJZKrnwPvDH83B2wTU6LMaVLOXI70w0NEvTHw==",
2212
+ "brillig_names": [
2213
+ "sync_notes"
2214
+ ]
2215
+ },
2216
+ {
2217
+ "name": "is_consumable",
2219
2218
  "is_unconstrained": true,
2220
2219
  "custom_attributes": [
2221
- "public"
2220
+ "public",
2221
+ "view"
2222
2222
  ],
2223
2223
  "abi": {
2224
2224
  "error_types": {
2225
- "12737498021964987455": {
2226
- "error_kind": "string",
2227
- "string": "unauthorized"
2228
- },
2229
- "16541607464495309456": {
2230
- "error_kind": "fmtstring",
2231
- "item_types": [],
2232
- "length": 16
2233
- },
2234
2225
  "16761564377371454734": {
2235
2226
  "error_kind": "string",
2236
2227
  "string": "Array index out of bounds"
@@ -2250,35 +2241,44 @@
2250
2241
  "5444967152290923376": {
2251
2242
  "error_kind": "string",
2252
2243
  "string": "Function is_consumable can only be called statically"
2253
- },
2254
- "6304245522015439386": {
2255
- "error_kind": "string",
2256
- "string": "Function _set_authorized can only be called internally"
2257
- },
2258
- "715723737710351018": {
2259
- "error_kind": "string",
2260
- "string": "rejecting all"
2261
- },
2262
- "9474245853673257536": {
2263
- "error_kind": "string",
2264
- "string": "Function is_reject_all can only be called statically"
2265
2244
  }
2266
2245
  },
2267
2246
  "parameters": [
2268
2247
  {
2269
- "name": "selector",
2248
+ "name": "on_behalf_of",
2249
+ "type": {
2250
+ "fields": [
2251
+ {
2252
+ "name": "inner",
2253
+ "type": {
2254
+ "kind": "field"
2255
+ }
2256
+ }
2257
+ ],
2258
+ "kind": "struct",
2259
+ "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
2260
+ },
2261
+ "visibility": "private"
2262
+ },
2263
+ {
2264
+ "name": "message_hash",
2270
2265
  "type": {
2271
2266
  "kind": "field"
2272
2267
  },
2273
2268
  "visibility": "private"
2274
2269
  }
2275
2270
  ],
2276
- "return_type": null
2271
+ "return_type": {
2272
+ "abi_type": {
2273
+ "kind": "boolean"
2274
+ },
2275
+ "visibility": "public"
2276
+ }
2277
2277
  },
2278
- "bytecode": "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",
2279
- "debug_symbols": "7V3bziSnrn6Xuc4FYMB4vcrSVpTTikYaJVEOW9qK8u67/kNX9z9NNattTFc1vkkyk/r6wx8uMKYwf3/68afv//r528+//OfXPz79699/f/ry6w/f/fn511+WP/39zzefvv/985cvn3/+9vKvP7mXf/gSXgF//PbdLy9//uPP737/89O/wAX65tNPv/y4/KdPuPzEfz5/+enTv3xw//zPN588eRYq11ABfX5HLf9ZvkYF51koFpdncfnEQQXHQrG4gMUFkYUiDioCC1U4KKz2so/RvaN88v4D6pvrp1104fS4ixHW58s7SRpAUtwIkhGW0AhLaIAl4Kqe7FM8+aTPPn/tk+CQg/KBhcocVH28aqISC0UcFLCUh8JBxerY6InSaeRxHq5RxEElYKGQg8qehWJxYWChWFyFZdfG0HcDdT1gFH8KigrE9VlI6ZVhY9zryRDVGYoywzLiqjOgNoNXt2FjXO/IEHp4q8OVAa8ZkjoDaTMAqDMUbYaobkNEbYZUHfMjlRNB8rFBgBlOYQBSvgwD8I0iqVNkp0+R1SlQ3wrU74ui71FF3wrS7wsaYAWJKbzLfl3KIa1PZ195OOL607G4fLnsqwxMaW18Scl/tUZMLnZoO8Da9uxut315Yn3YX46qGWtPl3XpQ+fsCXh8a3s5bts9HLjtB9Y9HFj3cGDdIRy47fm4bY/+wG1Pu257WlP7LnxoeyWCoJjWCILOvxyqUzasvxzDuckhVR4NnuKpFcGHy4dfFEzOFBQqGE1BmYLZfFCqoI2DQgXRfFCqoI2DUgX3Hb0fQMGy7zXEERTc90rmAAqSzSRSBW0mkSpIpqBIwez2nQU8goJoCsoU9BbNSBW0aEaoYLBoRqqg5WakClo0I1QQLJqRKmi5GaGC0aIZqYIWzQgVTPve6z6CghbNSBW0aEaoYI6moExBNB9sKhjgrGBMXymIztbFTQVxPZ8TEOBKQZtJpAraWyxUcOffWB9BQcvyCxUMtiaRKmgziVBBsGhGqqD5oFRBi2aECsbR0Ywvp5/2l0ukuoLpXKUk0WXpGqg1JNPJUrysaJJfz33g8Dze4yylWSzNOIul2HknpKRLS18ZUJuheHWGpM5A2gwE6gzaPV0cqDOo2+CDOoO6DcGrMyR1Bu03roC6t0LfnvYuNeYpCOvDEM+FHzzWQsTldV3LzLh4rjNTDT1jOaW4I12UpIHXcLJ03rDvbqhzq6Eh3DYUF1lOE3JJ8fbD3sdIa6sjucvHX4WpV/LMeVVmidObypT18eW/6evSjKVeSK83CQ4gyWEEyQhL6ge0GqWES0EOigKjXGxhlS0mVtliqhfK6FuhlAIOIKmXnuhNMsKSOMKSOMKSxCnGSolTjJXqHxQ0UZxirISBheKU3KWNQqItFEt5ciyUdhlI75zXp0j6FKRO4UGfoqhTBH0rAqpTQA+nvVVwcqHI6hTR6VNEfQpSp0j6VqSiTpHlC8ZGIcWFI+tzoB/AgfocZYAdZUB/0AC/In07vPMDOAbY4Tt8LRDjutKOFxza1UyXxndIcsawBrXxIsf2liD0vseZyRZF1Kco6hQ9Sj62KLI6RdTv7qhvRdK3Ium/elnfiqz/6mX9Vw/1Xz3Ud9rSubtxp3sxi6Vp35Y+ajPGb9zv10heLzDO5XTLvxwPFvW3JxYUjWDxMISljGAJQ2ypX07YuoJy457BJiwPuDJwYUkjWNANYRliSxliSxliC3Gur1tgnG0MDy7wYJkF844HSzwYsWABeLDCgsHd+ck3GLFgEXgwZMGS58F4bDnwYDw25NmGiQUrjgfjOVcpLBjxOoBYbNEBD8Zj84EH088ZxuAGcCR9DvADOAbYEQf0RxzgV2mAHWlAf+QBdnTIXC1LzHUs8f5D3v6NgtQpEPQpUJ2iw95ckyLpU+h3N+lbQepW9LhEr0mhb4UHfQr1Vy8Fr0+R9Ck6dzekKwqI+hRFnaLDMYYmRVan6BDnNCn0uzvpO23WtyLrOy32cNr1fOtCcbV3lorTpyjqFB1OWIYQTtt0Hyp9qX+LkqiDPmG9FngxA283PqE/Wbp4WGNDsmQ87UiWTFeN73FDQljyyKenwZVG40s5WZrKx33ASuPxrDymcN34Dsove7Jr41tuExzmtXSDI3fRUVD9Ojiffrssj68Ph42t4/W7zFjCWRlYDH+1tkfcdiBrcSZrQ5jK2qn6FqbqW5iqbztcu3wka9NM1vZYrB3I2jiVtTSTtXmqyDFPtSrAqaILnCq6KDuPLoI/W3uxPK9b+6Aq+R7dzt+Qg6i48zfvGCp6e6N7qLjzdcgxVAw7X98cREXzxR4q7nw9dgwVYefrvIOoaJFOBxX3nhk9iIo2u/RQ0WaXDiruPUN8EBV3np08horZcjo9VLRIp4OKaJFODxUt0umgYrGcTg8Vo6nYQUWLdDqoSJbT6aGiRTpyFYuzSKeHitlUlKvoLdLpoWI0FTuoaPnFDiqCqfjfqLgYtqp4YeJJxWSRzifpHby+WH6xi4oW6XRQES3S6aFiNBU7qGg5nQ4qFptdeqhokU4HFcl8sYeKFunIVSTXIdIBXItRROduq+hdPl9sfFlTM2Pt6bKW16VzlQvw+N74eOTG04Eb74+svD+y8uHIyne4Gulxje9RVOJxjccDN77Hh82KjV9n4+DCh8bvJ9NLPSrtTS5h2neodAgJzQulEmYbC8USmhdKJUQbC8USRpNQKuG+lxNHkLDse1FzCAltOpFKSDadiCVMJqFUwn3nBfcvYXA9alvPLqEFNVIJvQU1YgktqJFKGCxTI5bQghqxhBbUSCXscZ3T7BJaUCOVMFpQI5Zw35vgR5AwWVAjltCCGqmE2fKFUgnRvFB27i84sjWy7PPj4J1NJ2IJ7UUWS2hrZKmE3hL/YgltdSKV0FKucgktqJFKCOaFYgktqBFLODqo8euF4/5ytVSXMKV4sjSRP1+S7aHWkEwnU9HnD7/8aurwvN7jTB2ePHqcqRnmMbXz9ojHS1NfKRD0KVCdonh9iqRPQeoUpN/dpG5FcKBPof7qBa9vhVd/9ULw+hRJn0LfaaFzd0O+pijqFL23m2sUWZ2i95nNGkXUp9Dv7qzvtFnfCtR3WuzgtDGtK7eI6YqiRy38FkWHYTC5sD4dqOv6+lY5gGUIhyM3vhy38dDjXmfFxh9g3x16XOo8uYQ9bnSeXULzQqmEwcZCsYTmhVIJwcZCsYTJJJRKuO/lxBEkjPte1BxCQptOpBImm07EEmaTUChhj8/7Z5cwmoRSCS2okUqIFtSIJbSgRiphsUyNWEILaqQSkgU1YgktUyOW0IIaoYTRWVAjlnDfm+BHkNBbUCOW0IIaqYTB8oVSCcG8UFiIISZbIwtPi8Vs04lYQnuRpRKirZHFEkaTUCqhrU6kElrKVS6hBTVSCcm8UCyhBTVCCZMbHdQ87Bx7Gp7Xe5ypw5NHjzO1x5XDRzG18/ZIvDpAmCDqUxR1ihj0KbI6RXL6FPrdnfWtyAOs0H/1UN8K1H/1iv6rV/RfPdJ3Wurc3Tk35i0Ia+wK8TzJeayFjcU59/50ceEcvVbDUSzu9NNYUrz9sPcx0hpER3KXj78ok+shaSBYw2lK+EGaN1hiwTyPzTPZiAWrBzltGI8NeGz1ib0Jq58tacOQBUuBB+Ox1e/DbsPqbGWNPANl1xgcvCt5DVRduVhTnt6zej2K7ix5BEu99FZ3liG2ULX3wYXTsAm+4jToMgtWH1qWQfo0/vt0uW7ZsCmuM9Hy3/HKJgxlBEu9uFF3liG2xCG2xCG21E8d+fPa2OfL9e7JNetLhzYs8WDEgtVPEbRhhQWrh9dtGK8DyPNg1QHs5RbgNR96mTytOlVZ05YFzhElpLe0ZanXeulLkdUp6rFnX4qoT0HqFEHfio0ZqicF9HBahysFfqCoDMzL27m+qOHiy6Qc3hoU3d4apN/PUd9bE+hT6A+x9bVLXwr9IRb1rahfVtWXgsa+qAFoXaFGd35RAfJbgwrurEGk38+k7q3knD5F1KdQn0rJgz6FvhUh6FNkzRf1lQK8PkXSpyB1ii7RTYNC34ou0U2DQv51GeY1x4qULxepb5vplP0AjqzP0aGqcJtjgB1lQH+UAX5FA+wg9f4A5/wADvmRaX+5r7lsbPoPLNfPR1x/PS4pnn8uUpWVYSqtBpSU/D8f85rgvOvR/ojn9mdstX9ZN5/an6Gx11piXoODWNJ1+7vrn+m6l4MbwlJGsHS4PmFZvqwe6MqH6ufiL05vFcheGo8HbnyHb7oe2PgjK5+OrHw6svIdYtQHNj4duPEdzvo9sPFx143f/7n3RUIyCYUSln2HSoeQ0LxQKiHZWCiW0LxQKKF3NhaKJdx3IH8ECf2+lxOHkHDfi5pDSGjTiVTCYNOJWMJiEgolhH3nBQ8hYTYJhRJGC2rEElpQI5bQghqphB1qEUwvoQU1UgmzBTViCS1TI5UQLagRS2hBjVTCsu9N8ENIGE1CqYQW1EglJMsXCiUMzrywKeHNixAgBFsjNyW8Wa0VQofyjNNLaC+yVMKdf4p9CAkt8S+VMNnqRCyhTSdiCS2okUqYzQvFElpQI5UQRwc1j6ojD2F4Xu+BppZpTKU8i6ngOm+PXByieivPvVBkdQrv9CmiPkVRpwhBn0K/u0HfCtC3Iuq/elHfiqT/6iX9Vy/pv3pZ32lz3+5epqXGvHXnRQiwlipy8VydoxqOxnJKgEe6KGsEbyEmdN7V727po658WJSpF7zPa6X0l+i9IU2rsDpAvXhyd5Y8gqVeZqg7ywhbouMUvF9mosyC1fdQ+pY8X1jKCJYRReIXliG2pCG2pCG2ZE69ddi4YboNSzwYsWAFeLDCglHgwVgdkJznwbSrMUPyQZ8iq1MEp08R9SlInQL0rYCiThH3VfAeNq5UfGSD5KvEVpXF1GGZ2OTIMICD9DlwgB04oD/KAL8qA+ygAf1B+nZkJ8+jLMv9cxjilzXVB5ZKmxyuS/Rl2XV7iU4hnH6bQqSvA9rcofrGV+1Hd62SDyNYutQjbbN0OH8Qz7Ve49UVopDB6VNEfYqiTtHjg7UWRVanSPrdnfStyPpWZP1XD/WtQP1XD/VfvaL/6hV9p6XO3Z3TNUXSpyBtCuxR6KxFgeoUPQpltSjUuxuD06cYYIW+09aLuofzQj98jPBc9fuWU4MSnvPH79dTAbLuxgZk3Y0NG7e6NmGJx8a6GxswBx6Mx4Y8to3bq1uw4nmwxIKR48GYbJxL5aG4jZes593ZC0sZweLDEBYcwRKG2FIfYlt7taW+cGvCNi6O7rvJV+rfrXdnoREsOMQWHGJLGWILb2Oy8DYmibcxSS7xYKydYdq4a7oJY+0Mb12e2IQhCwZ333r3Biss2P0bZ2+wzILdvyv2BuOx3X+v8BuMx4Y82zbGwyaMWLDCc677L+F9hRGvA4jDFp0LPBiPzXseTL6ObWwBLRykzxGiPkeHXYc2xwg7BvRHHOBXcYAdaUB/pAF2dPhM4YHbsEv7S+/2X29dRocwgqXDha//DUuHzQHypx6MFM8c2hd5Rddj2+FxjU/Hbbx3B1beuyMr74+sfI/zlo9rfDlw43tcifG4xuOuG7//+nyxy2UUs0u471DpCBJG80KxhDYWSiVM5oViCW0slEqY9x3IH0LCaBJKJdz3ouYIEqJNJ2IJbTqRStghXTy9hPvOCx5CQjIJhRJSNAmlElpQI5QwOAtqxBJapkYqobegRiyhBTVSCYNlasQSRpNQKqEFNVIJYd+b4IeQ0IIaqYTRghqxhJYvlEqYzQubEt68sDGGYmvkpoQ3b5VZJLTpRCoh2YssltDWyGIJLfEvlBCcrU7EEtp0IpXQW1AjltC8UCphsKBGLOHooOZR991FGJ7Xe5ypw5NHDzSVpjG1x2Vol6ZeFH16K+K3UJA6RQZ9ClSnQK9PkfQp9Lu76FtR9K0g/VeP1K2IDvQp1F+96L0+RdKn6NzdmK8oem+n1yiKOkXvM6k1iqxOEZ0+hX53R32nTfpWJH2n3SjL268Y8kLBKeEbI6uE7wLjsRUeW8ksGHkejMW2cc1dG5ZYMO94sMiDEQsWeGyhsGAwoOjuwoIjWOor9u4seQRLGmJLvrv332DIgiGPDXlshcdWeGzEYyMW28YlXm0Yj83z2DyPLfDYQmbBwPNgPLbIY4s8tno13TYs8mDEgmXgwQoLxhuCMm8IyoXX3YXX3cTr7o3LF5owVnejizwYq7vRAw/G6m7kjVzIG7mQN3IhsLobo+PBeN0dec6VeN2deM7FC56QFzwh8robec5VeN1deM5VTz4vm43r5RpwcVlSPdjF0yUJeF7lpLdMAtajrG6/X+rL0X6/X1+3dvz9qPz7uv1bgnL762vrfr9fDws7/n7W/f2k3P6k3P76SN7x95X9B5X9H5Xf36LcfuX5pZDu+E9Od/ynndfb3cU3YODWVsCFGu/fgNHOq/4eQkLzQqmEVjhXLKGdGZVLaF4olTCZF4oltKNmTQkDhVVCd3XslqxwrlzCaBJKJbS4UCqhFc6VS2hBjVTCYtOJWEKbTsQS2vl5qYRWOFcoYXJWgkAsYY+zqG79Pjy6kiZbIy8SFpNQKGE0L5RK2CPZNbuE2SQUSpjNC8USmhdKJURnEgrjwh5n/meXkExCoYTF4kKxhGgSCiUkC2rEEtp0IpbQphOhhN5Fk1AqoXmhVEJv+UKphFEuYUhupUiBZlsj+wQmoVRC80KphB2SXbNL2KEA5PQSmhdKJSzmhWIJk0kojAvJmYRSCaNJKJXQ4kKhhD3u855eQgtqpBJ6m07EEtp0IpaQTEKhhMG8UCohWL5QKmGHC0cC4EmVEN0Tfq5+e40cOhxjnF1CNC+UStgj2TW7hNkkFEpI5oViCc0LhRKCcyahLC4El0xCqYRkEgol9BYXiiVEk1AoYbCgRiyhTSdiCW06kUoI0SSUSmheKJUwWr5QKiF2kNCXtFLExufqwWGmVRZyeH4cKo+X4E+/XZZdhYYuD1smdzjJaCpCMV/soGKPrNf0KkbnTcUOKpovdlDRmy/2UDGZiuJ4ccGbih1UjKZiBxUtXuygIgRTsYOKFul0UDHa7NJDRZtdeqhIpqJcxWS+2EHFbPnFDiqSXEXvYN0BcHm678Fih8OPk0uYnHmhVMIOCbHpJcwmoVDCYF4oltC8UCohOJNQFhcmSCahVEIyCYUSRosLxRKiSSiUMFlQI5bQphOxhDadSCXscKvy9BKaF0olRMsXCiXMsTojF3/Kzxc4KwjpBMoMUHIcUOSACgNU3wRpgThM9bvAW6C65A5XEF6D6pcVb4MqPpz9ydV8Dhfuk8MbBQVtCqyfz71tOtaPUzZA9dNvDVA9RdIA5apsqZze1VSgAsoMUP0+s+zdOyhDroASA1Q4TPWv8hug+lZbC8RgKg44oKrvpXVayu7aI0p916EFygxQ4DAFDhNwmOr5shaoOkbkdZ5cBt1rUH1B3wClwABlxwElDogjRP2AEa6pYfTnYRkWj38F1UvItECpAQpwBaJ6mZAWiMNU//542Ug4jbABv46gqP61bQND92OAwQMMnsjgqR+VvI1JDJ7EsKf+Gt3GIMMP6hFayqepIr0sKb7C1KfMBiYxMHXdKJ5GBR+uMPVJtoEp92Kyc8DAMHg8g8fj/ZjA4AkMezbGg9sYuh8T0/2Y+lrvNqb+LgRc10UBAa5RVRV8Pi/Uc/FXqPqqpYHy9XmoiUosVLWnPOK6VkJKV6h6xeQmqnBQIbBQmYOqr7GaKJYawFI+srgiS/nEUj6xlM8s5TNLjcxSA1lq1FOHnvxpMe0pXKPqlScbqI065ncmE8tqDpV/LpOJbxRFnaI+r/Wl0LcC9K0AfSti0KfI6hT13eC+FKkDxS7y+H4NnkK4jp7Cxjj9hIbGSQzFWXoUZ3lHyyw9WmZ5R0uZxFAKsxia5zB0o/b2Mxo6yWC0Ucf6CQ31MIuhOImhYZLpBcIs0wvMMr3AJKuXjYrCT2honGV6iZOsXiDNMr2kWaaX7GcxdJbpJc8yvWCcxNDyND0a4GxovNrfjf5pYt3bH9tsFLl9RkOfxnUbhoaniXVbhj5NKqVhKDxNZNQydJbBKM4yvcRpenSW6SXVpxdfTod5/GU89WLoK2xjdXcDdt20lOL5zAueP9f3ULMZ8+m4HpaLI8P4bkcJLDvI8WCFA9so/deG4b7EThtR5uMaFGBnDdoYPx7XoLQ3H8o786EcniYsu1kxbjH0aVKQDUOfJ9BuGfo00UrD0Pg0mbmWobP0aJqlR9PTbOXdrFeTN8q0PKOhT5OwahiKTzOPtgx9mvRGy9Dn2fi5bWiZZTAqswxGz/Ode8vQSXoU3dOsRxuGbtSQuFUdLCMEDqgq6c2iWBnrhQZbIA5TPehvgYgByhymzGHCjaIiN4piveSsGKB6qrsF4jARh4kYTMV5Duj+8lu51I8mtECFAarn2Rqges6qBeII0SXFcPNsd0mgT6F+lL9kfSuyvhWobwWiOkXx+hTqZRUKTXL0YqOY4DMaOsm3sRtFG5/Q0Of5ZLRl6DQ9Oss7+jyfjLYMneT0LT3PTnbL0FkGo1nOatLzbNm3DJ3krCbNclaT0izTyyxnNWmWs5o0S2k6muWsJuEs08vzbNm3DJ1leqFZppdJStOhm6Q03WLoHNPLYugc61F04Wl69GbNA3STnNXEjatMntHQp3HdlqFPE+s2DM1Pk0ppGfo0kVHD0OdZeLcMnWV6eZ6a8C1DZ5leCuf0PrqN1d2jTiyj98ixw4fEggHwYCyxfQw7Ezu5vTWo7KxBG+PH4xpEO/Oh4HbmQ+F5qpHePH2L4Xl2uFqGztKjz7Px0zJ0jlIA+ER3ErUMnaVHaY7Tt4uhcxR3QHBznL5dDJ3jUCrC83zn3jL0aaaXlqGzDEbPcydRy9A5SgEsubpZejTOUVIHoX54tqwJ2gLnsPH9aPICKgxQ/Zb5FigzQPUdgRYoMUDEYaLIAdUld7iC8AoU60HSNqjiw9mfXM3ncOE+ObxR1GftrhT1wzUN0+vnNxqgiAxQ/XP7BmgrFwu0ji/5Yz6wMmakeMpLYsq0Pl0dMpYhbc00Qsm3H17aEd3aEEC4fPy1/Vt1me9rP5zbf5H9rDYp4bmgytlUgHc9Nw4yP6o9ye1Ln5T83VVqFlDigO4vzrJ4b+SAOEz1GggNUL2iSwvEYSIOU33j82ZxFsx1D22BEgPkOUyewxQ4TPUPDlug+wvOYIbMAEXPAREDtFH1qQFiCFG2lvprCLQE2uXrULVsrZtvozYWoct2+ToSJ3+FAsdCFQ5q47bMFmrj44KcVlS5VmOjkE1063Qf3TVXPXRvojIHtfE5TwtV96gUVg1Tctco4qCIw0UbmdkWCjmojeu9G6j66NlEJQ5q48B8C5U5qMji2vg8+xxn+WWyvkJtVNRqoQoHtbGV3EBtFAtuoVhqbGyNNlCFpeHGxyTgVxSAv0bh/aji6tXwmqjEQhEHtTECtFAsNUJgoVhcwFIeWMoDS/mN2fy8/PaQ3TWKOKiNz4MaqI1vbVoo5KA2IocGaiMGaKHi/ZFD2frYtIGiwEJxuDY+tcQ1lbAku64w9bQuxZPrUkrXGLwfU59NGpjEwND9sX/Z+uKxhSoc1Na3FA0Uhys4YKFYXJ7F5VlcIbJQLC5g2QXIQW3tJjVQiYXivCmhvva/OcaEetRK7nTqkcI1hjEubXx3dpunMNpWH9MbmHw3BuqZt5sagLt/zNz4cqSBKfdjAjAwDB5g8NTfV0onvyYMV5j6fNvAMHjq6fXbmOwYGAYPMnjqX/xe9E8NQ/f3aYkMDIOH7o+HYj3L08Dc/y5s3CN/GxMcA5Pvx4BnYBg8kWFPjAwMo3/SnX7wz/Kn//3u98/fff/lpz8WxMv//OuXH/78/Osv73/88/9+O/2f73///OXL55+//e33X3/46ce/fv/p2y+//vDy/z6593/822Ogb5ZI2y2teRk2/bKB+M2SN4nLn1/nhSWnvPzF8jcvf+Ffn1hWV8s/aGnL0p7/Bw==",
2278
+ "bytecode": "JwACBAEoAAABBIBKJwAABAMnAgMEAicCBAQAHxgABAADgEcuCIBHAAEuCIBIAAIlAAAAUSUAAABuLgQAAYBJKAIAAgSASScCAwQBOw0AAgADKACAQwQAAygAgEQBAAAoAIBFBAAAKACARgQAASYlAAAE5B4CAAQJJwIFAAEKOAQFBiQCAAYAAACPJQAABQ0nAgQAAi0IAQUnAgYEAwAQAQYBJwMFBAEAKAUCBi0MBgctDgQHACgHAgctDgEHJwIBAAAtCAEEJwIGBAQAEAEGAScDBAQBACgEAgYtDAYHLQ4BBwAoBwIHLQ4BBwAoBwIHLQ4BBy0NBAYAKAYCBi0OBgQrAgAGAAAAAAAAAAACAAAAAAAAAAAtCAEHJwIIBAUAEAEIAScDBwQBACgHAggtDAgJLQ4BCQAoCQIJLQ4BCQAoCQIJLQ4BCQAoCQIJLQ4GCS0NBAgAKAgCCC0OCAQtCAEIAAABAgEtDgQILQ0HBAAoBAIELQ4EBy0IAQQAAAECAS0OBwQtCAEHAAABAgEuCoBFAActCAEJAAABAgEuCoBEAAknAgoEAi4IgEUAAyMAAAGzDDgDCgskAgALAAAEcSMAAAHFLQ0JBQsoAAWARAALJAIACwAAAeInAgwEADwJAQwnAgUECy0IAAstDAgMLQwEDS0MBw4tDAkPABAABQAlAAAFHy0EAAAtDQgFLQ0ECy0NBwwtDgUILQ4LBC0ODAcnAgQBAS0OBAkBKAALgEYABy0NBwUKOAUBBwsoAAeARAAIJAIACAAAAlAlAAAGdy0IAQcnAggEAwAQAQgBJwMHBAEAKAcCCC0MCAktDgUJACgJAgktDgIJLQgBAicCBQQEABABBQEnAwIEAQAoAgIFLQwFCC0OAQgAKAgCCC0OAQgAKAgCCC0OAQgtDQIFACgFAgUtDgUCLQgBBScCCAQFABABCAEnAwUEAQAoBQIILQwICS0OAQkAKAkCCS0OAQkAKAkCCS0OAQkAKAkCCS0OBgktDQIGACgGAgYtDgYCLQgBBgAAAQIBLQ4CBi0NBQIAKAICAi0OAgUtCAECAAABAgEtDgUCLQgBBQAAAQIBLgqARQAFLQgBCAAAAQIBLgqARAAILgiARQADIwAAA1AMOAMKCSQCAAkAAAP+IwAAA2ItDQgDCygAA4BEAAckAgAHAAADfycCCQQAPAkBCScCAwQJLQgACS0MBgotDAILLQwFDC0MCA0AEAADACUAAAUfLQQAAC0NBgMtDQIHLQ0FCS0OAwYtDgcCLQ4JBS0OBAgBKAAHgEYAAy0NAwIKOAIBAwsoAAOARAABJAIAAQAAA+glAAAGdy8MAAIAARwMAQMBHAwDAgAcDAIBASYkAgAJAAAECyMAAARgJwILBAIMOAMLDCQCAAwAAAQiJQAABokAKAcCCwA4CwMMLQ0MCScCCwQMLQgADC0MBg0tDAIOLQwFDy0MCBAtDAkRABAACwAlAAAGmy0EAAAjAAAEYAEoAAOARgAJLQwJAyMAAANQJAIACwAABH4jAAAE0ycCDAQCDDgDDA0kAgANAAAElSUAAAaJACgFAgwAOAwDDS0NDQsnAgwEDS0IAA0tDAgOLQwEDy0MBxAtDAkRLQwLEgAQAAwAJQAABpstBAAAIwAABNMBKAADgEYACy0MCwMjAAABsygAgAQEeAANAAAAgASAAyQAgAMAAAUMKgEAAQX3ofOvpa3UyjwBAQImKgEAAQVLkGjGvfiDcDwBAQImJQAABOQuCIBFAAUjAAAFLw0oAAWAQwAGJAIABgAABZ8jAAAFRC0NAQUtDQIGLQ0DBy0NBAgnAgkEBC0IAQonAgsEBQAQAQsBJwMKBAEAKAYCCycCDAQEACgKAg0/DwALAA0tDQoGACgGAgYtDgYKLQ4FAS0OCgItDgcDLQ4IBCYtDQMGDDgFBgcBKAAFgEYABiQCAAcAAAW9IwAABm4tDQEHLQ0CCC0NAwktDQQKJwIMBAQMOAUMDSQCAA0AAAXkJQAABokAKAgCDAA4DAUNLQ0NCycCDQQDDDgFDQ4kAgAOAAAGCSUAAAaJACgHAg0AOA0FDi0NDgwAOAsMDScCDAQEDDgFDA4kAgAOAAAGMyUAAAaJLgQACIADKACABAQABSUAAAfGLgiABQALACgLAgwAOAwFDi0ODQ4tDgcBLQ4LAi0OCQMtDgoEIwAABm4tDAYFIwAABS8qAQABBQLcbieAdhKdPAEBAiYqAQABBeidCf6hES0OPAEBAiYlAAAE5C0NAwYtDQQHCygAB4BEAAgkAgAIAAAGwScCCQQAPAkBCQsoAAaAQwAHJAIABwAAB1IjAAAG1i0NAQYtDQIHLQ0DCC0NBAknAgsEAww4CAsMJAIADAAABv0lAAAGiS4EAAaAAygAgAQEAAQlAAAHxi4IgAUACgAoCgILADgLCAwtDgUMASgACIBGAAUOOAgFBiQCAAYAAAc9JQAACFQtDgoBLQ4HAi0OBQMtDgkEIwAAB8UnAgYEBy0IAActDAEILQwCCS0MAwotDAQLABAABgAlAAAFHy0EAAAtDQEGLQ0CBy0NBAguBAAGgAMoAIAEBAAEJQAAB8YuCIAFAAkAKAkCCgEoAAqARQALLQ4FCy0OCQEtDgcCLgqARgADLQ4IBCMAAAfFJi4BgAOABgsAgAYAAoAHJACABwAAB+EjAAAH7C4AgAOABSMAAAhTLgAAAYAFAQAAAYAEAAEBAIADgASACS4AgAOACi4AgAWACwsAgAqACYAMJACADAAACD8uAYAKgAguAoAIgAsBAIAKAAKACgEAgAsAAoALIwAACA4oAYAFBAABAwCABgACgAYjAAAIUyYqAQABBUWnynEZQeQVPAEBAiYuABjKGMo=",
2279
+ "debug_symbols": "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",
2280
2280
  "brillig_names": [
2281
- "public_dispatch"
2281
+ "is_consumable"
2282
2282
  ]
2283
2283
  }
2284
2284
  ],
@@ -2361,10 +2361,16 @@
2361
2361
  "kind": "struct",
2362
2362
  "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
2363
2363
  }
2364
+ },
2365
+ {
2366
+ "name": "message_hash",
2367
+ "type": {
2368
+ "kind": "field"
2369
+ }
2364
2370
  }
2365
2371
  ],
2366
2372
  "kind": "struct",
2367
- "path": "AuthRegistry::is_reject_all_parameters"
2373
+ "path": "AuthRegistry::is_consumable_parameters"
2368
2374
  }
2369
2375
  },
2370
2376
  {
@@ -2375,7 +2381,7 @@
2375
2381
  }
2376
2382
  ],
2377
2383
  "kind": "struct",
2378
- "path": "AuthRegistry::is_reject_all_abi"
2384
+ "path": "AuthRegistry::is_consumable_abi"
2379
2385
  },
2380
2386
  {
2381
2387
  "fields": [
@@ -2384,40 +2390,25 @@
2384
2390
  "type": {
2385
2391
  "fields": [
2386
2392
  {
2387
- "name": "on_behalf_of",
2393
+ "name": "message_hash",
2388
2394
  "type": {
2389
- "fields": [
2390
- {
2391
- "name": "inner",
2392
- "type": {
2393
- "kind": "field"
2394
- }
2395
- }
2396
- ],
2397
- "kind": "struct",
2398
- "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
2395
+ "kind": "field"
2399
2396
  }
2400
2397
  },
2401
2398
  {
2402
- "name": "message_hash",
2399
+ "name": "authorize",
2403
2400
  "type": {
2404
- "kind": "field"
2401
+ "kind": "boolean"
2405
2402
  }
2406
2403
  }
2407
2404
  ],
2408
2405
  "kind": "struct",
2409
- "path": "AuthRegistry::is_consumable_parameters"
2410
- }
2411
- },
2412
- {
2413
- "name": "return_type",
2414
- "type": {
2415
- "kind": "boolean"
2406
+ "path": "AuthRegistry::set_authorized_parameters"
2416
2407
  }
2417
2408
  }
2418
2409
  ],
2419
2410
  "kind": "struct",
2420
- "path": "AuthRegistry::is_consumable_abi"
2411
+ "path": "AuthRegistry::set_authorized_abi"
2421
2412
  },
2422
2413
  {
2423
2414
  "fields": [
@@ -2426,7 +2417,7 @@
2426
2417
  "type": {
2427
2418
  "fields": [
2428
2419
  {
2429
- "name": "on_behalf_of",
2420
+ "name": "approver",
2430
2421
  "type": {
2431
2422
  "fields": [
2432
2423
  {
@@ -2441,25 +2432,46 @@
2441
2432
  }
2442
2433
  },
2443
2434
  {
2444
- "name": "inner_hash",
2435
+ "name": "message_hash",
2445
2436
  "type": {
2446
2437
  "kind": "field"
2447
2438
  }
2439
+ },
2440
+ {
2441
+ "name": "authorize",
2442
+ "type": {
2443
+ "kind": "boolean"
2444
+ }
2448
2445
  }
2449
2446
  ],
2450
2447
  "kind": "struct",
2451
- "path": "AuthRegistry::consume_parameters"
2448
+ "path": "AuthRegistry::_set_authorized_parameters"
2452
2449
  }
2453
- },
2450
+ }
2451
+ ],
2452
+ "kind": "struct",
2453
+ "path": "AuthRegistry::_set_authorized_abi"
2454
+ },
2455
+ {
2456
+ "fields": [
2454
2457
  {
2455
- "name": "return_type",
2458
+ "name": "parameters",
2456
2459
  "type": {
2457
- "kind": "field"
2460
+ "fields": [
2461
+ {
2462
+ "name": "reject",
2463
+ "type": {
2464
+ "kind": "boolean"
2465
+ }
2466
+ }
2467
+ ],
2468
+ "kind": "struct",
2469
+ "path": "AuthRegistry::set_reject_all_parameters"
2458
2470
  }
2459
2471
  }
2460
2472
  ],
2461
2473
  "kind": "struct",
2462
- "path": "AuthRegistry::consume_abi"
2474
+ "path": "AuthRegistry::set_reject_all_abi"
2463
2475
  },
2464
2476
  {
2465
2477
  "fields": [
@@ -2496,12 +2508,12 @@
2496
2508
  }
2497
2509
  ],
2498
2510
  "kind": "struct",
2499
- "path": "AuthRegistry::_set_authorized_parameters"
2511
+ "path": "AuthRegistry::set_authorized_private_parameters"
2500
2512
  }
2501
2513
  }
2502
2514
  ],
2503
2515
  "kind": "struct",
2504
- "path": "AuthRegistry::_set_authorized_abi"
2516
+ "path": "AuthRegistry::set_authorized_private_abi"
2505
2517
  },
2506
2518
  {
2507
2519
  "fields": [
@@ -2510,46 +2522,34 @@
2510
2522
  "type": {
2511
2523
  "fields": [
2512
2524
  {
2513
- "name": "message_hash",
2514
- "type": {
2515
- "kind": "field"
2516
- }
2517
- },
2518
- {
2519
- "name": "authorize",
2525
+ "name": "on_behalf_of",
2520
2526
  "type": {
2521
- "kind": "boolean"
2527
+ "fields": [
2528
+ {
2529
+ "name": "inner",
2530
+ "type": {
2531
+ "kind": "field"
2532
+ }
2533
+ }
2534
+ ],
2535
+ "kind": "struct",
2536
+ "path": "authwit::aztec::protocol_types::address::aztec_address::AztecAddress"
2522
2537
  }
2523
2538
  }
2524
2539
  ],
2525
2540
  "kind": "struct",
2526
- "path": "AuthRegistry::set_authorized_parameters"
2541
+ "path": "AuthRegistry::is_reject_all_parameters"
2527
2542
  }
2528
- }
2529
- ],
2530
- "kind": "struct",
2531
- "path": "AuthRegistry::set_authorized_abi"
2532
- },
2533
- {
2534
- "fields": [
2543
+ },
2535
2544
  {
2536
- "name": "parameters",
2545
+ "name": "return_type",
2537
2546
  "type": {
2538
- "fields": [
2539
- {
2540
- "name": "reject",
2541
- "type": {
2542
- "kind": "boolean"
2543
- }
2544
- }
2545
- ],
2546
- "kind": "struct",
2547
- "path": "AuthRegistry::set_reject_all_parameters"
2547
+ "kind": "boolean"
2548
2548
  }
2549
2549
  }
2550
2550
  ],
2551
2551
  "kind": "struct",
2552
- "path": "AuthRegistry::set_reject_all_abi"
2552
+ "path": "AuthRegistry::is_reject_all_abi"
2553
2553
  },
2554
2554
  {
2555
2555
  "fields": [
@@ -2558,7 +2558,7 @@
2558
2558
  "type": {
2559
2559
  "fields": [
2560
2560
  {
2561
- "name": "approver",
2561
+ "name": "on_behalf_of",
2562
2562
  "type": {
2563
2563
  "fields": [
2564
2564
  {
@@ -2573,25 +2573,25 @@
2573
2573
  }
2574
2574
  },
2575
2575
  {
2576
- "name": "message_hash",
2576
+ "name": "inner_hash",
2577
2577
  "type": {
2578
2578
  "kind": "field"
2579
2579
  }
2580
- },
2581
- {
2582
- "name": "authorize",
2583
- "type": {
2584
- "kind": "boolean"
2585
- }
2586
2580
  }
2587
2581
  ],
2588
2582
  "kind": "struct",
2589
- "path": "AuthRegistry::set_authorized_private_parameters"
2583
+ "path": "AuthRegistry::consume_parameters"
2584
+ }
2585
+ },
2586
+ {
2587
+ "name": "return_type",
2588
+ "type": {
2589
+ "kind": "field"
2590
2590
  }
2591
2591
  }
2592
2592
  ],
2593
2593
  "kind": "struct",
2594
- "path": "AuthRegistry::set_authorized_private_abi"
2594
+ "path": "AuthRegistry::consume_abi"
2595
2595
  }
2596
2596
  ]
2597
2597
  }
@@ -2603,15 +2603,15 @@
2603
2603
  },
2604
2604
  "127": {
2605
2605
  "path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/macros/functions/utils.nr",
2606
- "source": "use crate::macros::{\n functions::{abi_export::create_fn_abi_export, call_interface_stubs::stub_fn, stub_registry},\n notes::NOTES,\n utils::{\n add_to_hasher, fn_has_noinitcheck, get_fn_visibility, is_fn_initializer, is_fn_internal,\n is_fn_private, is_fn_view, modify_fn_body, module_has_initializer, module_has_storage,\n },\n};\nuse protocol_types::meta::generate_serialize_to_fields;\nuse std::meta::type_of;\n\npub(crate) comptime fn transform_private(f: FunctionDefinition) -> Quoted {\n let fn_abi = create_fn_abi_export(f);\n let fn_stub = stub_fn(f);\n stub_registry::register(f.module(), fn_stub);\n\n // If a function is further modified as unconstrained, we throw an error\n if f.is_unconstrained() {\n let name = f.name();\n panic(\n f\"Function {name} is annotated with #[private] but marked as unconstrained, remove unconstrained keyword\",\n );\n }\n\n let module_has_initializer = module_has_initializer(f.module());\n let module_has_storage = module_has_storage(f.module());\n\n // Private functions undergo a lot of transformations from their Aztec.nr form into a circuit that can be fed to the\n // Private Kernel Circuit.\n // First we change the function signature so that it also receives `PrivateContextInputs`, which contain information\n // about the execution context (e.g. the caller).\n let original_params = f.parameters();\n f.set_parameters(&[(\n quote { inputs },\n quote { crate::context::inputs::private_context_inputs::PrivateContextInputs }.as_type(),\n )]\n .append(original_params));\n\n let mut body = f.body().as_block().unwrap();\n\n // The original params are hashed and passed to the `context` object, so that the kernel can verify we've received\n // the correct values.\n // TODO: Optimize args_hasher for small number of arguments\n let args_hasher_name = quote { args_hasher };\n let args_hasher = original_params.fold(\n quote {\n let mut $args_hasher_name = dep::aztec::hash::ArgsHasher::new();\n },\n |args_hasher, param: (Quoted, Type)| {\n let (name, typ) = param;\n let appended_arg = add_to_hasher(args_hasher_name, name, typ);\n quote {\n $args_hasher\n $appended_arg\n }\n },\n );\n\n let context_creation = quote { let mut context = dep::aztec::context::private_context::PrivateContext::new(inputs, args_hasher.hash()); };\n\n // Modifications introduced by the different marker attributes.\n let internal_check = if is_fn_internal(f) {\n create_internal_check(f)\n } else {\n quote {}\n };\n\n let view_check = if is_fn_view(f) {\n create_view_check(f)\n } else {\n quote {}\n };\n\n let (assert_initializer, mark_as_initialized) = if is_fn_initializer(f) {\n (create_assert_correct_initializer_args(f), create_mark_as_initialized(f))\n } else {\n (quote {}, quote {})\n };\n\n let storage_init = if module_has_storage {\n quote {\n // Some functions don't access storage, but it'd be quite difficult to only inject this variable if it is\n // referenced. We instead ignore 'unused variable' warnings for it.\n #[allow(unused_variables)]\n let storage = Storage::init(&mut context);\n }\n } else {\n quote {}\n };\n\n // Initialization checks are not included in contracts that don't have initializers.\n let init_check = if module_has_initializer & !is_fn_initializer(f) & !fn_has_noinitcheck(f) {\n create_init_check(f)\n } else {\n quote {}\n };\n\n // All private functions perform note discovery, since they may need to access notes. This is slightly inefficient\n // and could be improved by only doing it once we actually attempt to read any.\n let note_discovery_call = if NOTES.len() > 0 {\n create_note_discovery_call()\n } else {\n quote {}\n };\n\n // Finally, we need to change the return type to be `PrivateCircuitPublicInputs`, which is what the Private Kernel\n // circuit expects.\n let return_value_var_name = quote { macro__returned__values };\n\n let return_value_type = f.return_type();\n let return_value = if body.len() == 0 {\n quote {}\n } else if return_value_type != type_of(()) {\n // The original return value is passed to a second args hasher which the context receives.\n let (body_without_return, last_body_expr) = body.pop_back();\n let return_value = last_body_expr.quoted();\n let return_value_assignment =\n quote { let $return_value_var_name: $return_value_type = $return_value; };\n let return_hasher_name = quote { return_hasher };\n let return_value_into_hasher =\n add_to_hasher(return_hasher_name, return_value_var_name, return_value_type);\n\n body = body_without_return;\n\n quote {\n let mut $return_hasher_name = dep::aztec::hash::ArgsHasher::new();\n $return_value_assignment\n $return_value_into_hasher\n context.set_return_hash($return_hasher_name);\n }\n } else {\n let (body_without_return, last_body_expr) = body.pop_back();\n if !last_body_expr.has_semicolon()\n & last_body_expr.as_for().is_none()\n & last_body_expr.as_assert().is_none()\n & last_body_expr.as_for_range().is_none()\n & last_body_expr.as_assert_eq().is_none()\n & last_body_expr.as_let().is_none() {\n let unused_return_value_name = f\"_{return_value_var_name}\".quoted_contents();\n body = body_without_return.push_back(\n quote { let $unused_return_value_name = $last_body_expr; }.as_expr().unwrap(),\n );\n }\n quote {}\n };\n\n let context_finish = quote { context.finish() };\n\n let to_prepend = quote {\n $args_hasher\n $context_creation\n $assert_initializer\n $init_check\n $internal_check\n $view_check\n $storage_init\n $note_discovery_call\n };\n\n let to_append = quote {\n $return_value\n $mark_as_initialized\n $context_finish\n };\n let modified_body = modify_fn_body(body, to_prepend, to_append);\n f.set_body(modified_body);\n f.set_return_type(\n quote { dep::protocol_types::abis::private_circuit_public_inputs::PrivateCircuitPublicInputs }\n .as_type(),\n );\n f.set_return_data();\n\n fn_abi\n}\n\npub(crate) comptime fn transform_public(f: FunctionDefinition) -> Quoted {\n let fn_abi = create_fn_abi_export(f);\n let fn_stub = stub_fn(f);\n stub_registry::register(f.module(), fn_stub);\n\n // If a function is further modified as unconstrained, we throw an error\n if f.is_unconstrained() {\n let name = f.name();\n panic(\n f\"Function {name} is annotated with #[public] but marked as unconstrained, remove unconstrained keyword\",\n );\n }\n\n let module_has_initializer = module_has_initializer(f.module());\n let module_has_storage = module_has_storage(f.module());\n\n // Public functions undergo a lot of transformations from their Aztec.nr form.\n let original_params = f.parameters();\n let args_len = original_params\n .map(|(name, typ): (Quoted, Type)| {\n generate_serialize_to_fields(name, typ, &[], false).0.len()\n })\n .fold(0, |acc: u32, val: u32| acc + val);\n\n // Unlike in the private case, in public the `context` does not need to receive the hash of the original params.\n let context_creation = quote {\n let mut context = dep::aztec::context::public_context::PublicContext::new(|| {\n // We start from 1 because we skip the selector for the dispatch function.\n let serialized_args : [Field; $args_len] = dep::aztec::context::public_context::calldata_copy(1, $args_len);\n dep::aztec::hash::hash_args_array(serialized_args)\n });\n };\n\n // Modifications introduced by the different marker attributes.\n let internal_check = if is_fn_internal(f) {\n create_internal_check(f)\n } else {\n quote {}\n };\n\n let view_check = if is_fn_view(f) {\n create_view_check(f)\n } else {\n quote {}\n };\n\n let (assert_initializer, mark_as_initialized) = if is_fn_initializer(f) {\n (create_assert_correct_initializer_args(f), create_mark_as_initialized(f))\n } else {\n (quote {}, quote {})\n };\n\n let storage_init = if module_has_storage {\n // Some functions don't access storage, but it'd be quite difficult to only inject this variable if it is\n // referenced. We instead ignore 'unused variable' warnings for it.\n quote {\n #[allow(unused_variables)]\n let storage = Storage::init(&mut context);\n }\n } else {\n quote {}\n };\n\n // Initialization checks are not included in contracts that don't have initializers.\n let init_check = if module_has_initializer & !fn_has_noinitcheck(f) & !is_fn_initializer(f) {\n create_init_check(f)\n } else {\n quote {}\n };\n\n let to_prepend = quote {\n $context_creation\n $assert_initializer\n $init_check\n $internal_check\n $view_check\n $storage_init\n };\n\n let to_append = quote {\n $mark_as_initialized\n };\n\n let body = f.body().as_block().unwrap();\n let modified_body = modify_fn_body(body, to_prepend, to_append);\n f.set_body(modified_body);\n\n // All public functions are automatically made unconstrained, even if they were not marked as such. This is because\n // instead of compiling into a circuit, they will compile to bytecode that will be later transpiled into AVM\n // bytecode.\n f.set_unconstrained(true);\n f.set_return_public(true);\n\n fn_abi\n}\n\npub(crate) comptime fn transform_unconstrained(f: FunctionDefinition) {\n let context_creation = quote { let mut context = dep::aztec::context::unconstrained_context::UnconstrainedContext::new(); };\n let module_has_storage = module_has_storage(f.module());\n\n let storage_init = if module_has_storage {\n quote {\n // Some functions don't access storage, but it'd be quite difficult to only inject this variable if it is\n // referenced. We instead ignore 'unused variable' warnings for it.\n #[allow(unused_variables)]\n let storage = Storage::init(context);\n }\n } else {\n quote {}\n };\n\n // All unconstrained functions perform note discovery, since they may need to access notes. This is slightly\n // inefficient and could be improved by only doing it once we actually attempt to read any.\n let note_discovery_call = if NOTES.len() > 0 {\n create_note_discovery_call()\n } else {\n quote {}\n };\n\n let to_prepend = quote {\n $context_creation\n $storage_init\n $note_discovery_call\n };\n let body = f.body().as_block().unwrap();\n let modified_body = modify_fn_body(body, to_prepend, quote {});\n f.set_return_public(true);\n f.set_body(modified_body);\n}\n\ncomptime fn create_internal_check(f: FunctionDefinition) -> Quoted {\n let name = f.name();\n let assertion_message = f\"Function {name} can only be called internally\";\n quote { assert(context.msg_sender() == context.this_address(), $assertion_message); }\n}\n\ncomptime fn create_view_check(f: FunctionDefinition) -> Quoted {\n let name = f.name();\n let assertion_message = f\"Function {name} can only be called statically\";\n if is_fn_private(f) {\n // Here `context` is of type context::PrivateContext\n quote { assert(context.inputs.call_context.is_static_call == true, $assertion_message); }\n } else {\n // Here `context` is of type context::PublicContext\n quote { assert(context.is_static_call(), $assertion_message); }\n }\n}\n\ncomptime fn create_assert_correct_initializer_args(f: FunctionDefinition) -> Quoted {\n let fn_visibility = get_fn_visibility(f);\n f\"dep::aztec::macros::functions::initialization_utils::assert_initialization_matches_address_preimage_{fn_visibility}(context);\"\n .quoted_contents()\n}\n\ncomptime fn create_mark_as_initialized(f: FunctionDefinition) -> Quoted {\n let fn_visibility = get_fn_visibility(f);\n f\"dep::aztec::macros::functions::initialization_utils::mark_as_initialized_{fn_visibility}(&mut context);\"\n .quoted_contents()\n}\n\ncomptime fn create_init_check(f: FunctionDefinition) -> Quoted {\n let fn_visibility = get_fn_visibility(f);\n f\"dep::aztec::macros::functions::initialization_utils::assert_is_initialized_{fn_visibility}(&mut context);\"\n .quoted_contents()\n}\n\n/// Injects a call to `aztec::discovery::discover_new_notes`, causing for new notes to be added to PXE and made\n/// available for the current execution.\ncomptime fn create_note_discovery_call() -> Quoted {\n quote {\n /// Safety: note discovery returns nothing and is performed solely for its side-effects. It is therefore always\n /// safe to call.\n unsafe {\n dep::aztec::discovery::discover_new_notes(\n context.this_address(),\n _compute_note_hash_and_nullifier,\n )\n };\n }\n}\n"
2606
+ "source": "use crate::macros::{\n functions::{abi_export::create_fn_abi_export, call_interface_stubs::stub_fn, stub_registry},\n notes::NOTES,\n utils::{\n add_to_hasher, fn_has_noinitcheck, get_fn_visibility, is_fn_initializer, is_fn_internal,\n is_fn_private, is_fn_view, modify_fn_body, module_has_initializer, module_has_storage,\n },\n};\nuse protocol_types::meta::generate_serialize_to_fields;\nuse std::meta::type_of;\n\npub(crate) comptime fn transform_private(f: FunctionDefinition) -> Quoted {\n let fn_abi = create_fn_abi_export(f);\n let fn_stub = stub_fn(f);\n stub_registry::register(f.module(), fn_stub);\n\n // If a function is further modified as unconstrained, we throw an error\n if f.is_unconstrained() {\n let name = f.name();\n panic(\n f\"Function {name} is annotated with #[private] but marked as unconstrained, remove unconstrained keyword\",\n );\n }\n\n let module_has_initializer = module_has_initializer(f.module());\n let module_has_storage = module_has_storage(f.module());\n\n // Private functions undergo a lot of transformations from their Aztec.nr form into a circuit that can be fed to the\n // Private Kernel Circuit.\n // First we change the function signature so that it also receives `PrivateContextInputs`, which contain information\n // about the execution context (e.g. the caller).\n let original_params = f.parameters();\n f.set_parameters(&[(\n quote { inputs },\n quote { crate::context::inputs::private_context_inputs::PrivateContextInputs }.as_type(),\n )]\n .append(original_params));\n\n let mut body = f.body().as_block().unwrap();\n\n // The original params are hashed and passed to the `context` object, so that the kernel can verify we've received\n // the correct values.\n // TODO: Optimize args_hasher for small number of arguments\n let args_hasher_name = quote { args_hasher };\n let args_hasher = original_params.fold(\n quote {\n let mut $args_hasher_name = dep::aztec::hash::ArgsHasher::new();\n },\n |args_hasher, param: (Quoted, Type)| {\n let (name, typ) = param;\n let appended_arg = add_to_hasher(args_hasher_name, name, typ);\n quote {\n $args_hasher\n $appended_arg\n }\n },\n );\n\n let context_creation = quote {\n let mut context = dep::aztec::context::private_context::PrivateContext::new(inputs, dep::aztec::protocol_types::traits::Hash::hash($args_hasher_name));\n };\n\n // Modifications introduced by the different marker attributes.\n let internal_check = if is_fn_internal(f) {\n create_internal_check(f)\n } else {\n quote {}\n };\n\n let view_check = if is_fn_view(f) {\n create_view_check(f)\n } else {\n quote {}\n };\n\n let (assert_initializer, mark_as_initialized) = if is_fn_initializer(f) {\n (create_assert_correct_initializer_args(f), create_mark_as_initialized(f))\n } else {\n (quote {}, quote {})\n };\n\n let storage_init = if module_has_storage {\n quote {\n // Some functions don't access storage, but it'd be quite difficult to only inject this variable if it is\n // referenced. We instead ignore 'unused variable' warnings for it.\n #[allow(unused_variables)]\n let storage = Storage::init(&mut context);\n }\n } else {\n quote {}\n };\n\n // Initialization checks are not included in contracts that don't have initializers.\n let init_check = if module_has_initializer & !is_fn_initializer(f) & !fn_has_noinitcheck(f) {\n create_init_check(f)\n } else {\n quote {}\n };\n\n // All private functions perform note discovery, since they may need to access notes. This is slightly inefficient\n // and could be improved by only doing it once we actually attempt to read any.\n let note_discovery_call = if NOTES.len() > 0 {\n create_note_discovery_call()\n } else {\n quote {}\n };\n\n // Finally, we need to change the return type to be `PrivateCircuitPublicInputs`, which is what the Private Kernel\n // circuit expects.\n let return_value_var_name = quote { macro__returned__values };\n\n let return_value_type = f.return_type();\n let return_value = if body.len() == 0 {\n quote {}\n } else if return_value_type != type_of(()) {\n // The original return value is passed to a second args hasher which the context receives.\n let (body_without_return, last_body_expr) = body.pop_back();\n let return_value = last_body_expr.quoted();\n let return_value_assignment =\n quote { let $return_value_var_name: $return_value_type = $return_value; };\n let return_hasher_name = quote { return_hasher };\n let return_value_into_hasher =\n add_to_hasher(return_hasher_name, return_value_var_name, return_value_type);\n\n body = body_without_return;\n\n quote {\n let mut $return_hasher_name = dep::aztec::hash::ArgsHasher::new();\n $return_value_assignment\n $return_value_into_hasher\n context.set_return_hash($return_hasher_name);\n }\n } else {\n let (body_without_return, last_body_expr) = body.pop_back();\n if !last_body_expr.has_semicolon()\n & last_body_expr.as_for().is_none()\n & last_body_expr.as_assert().is_none()\n & last_body_expr.as_for_range().is_none()\n & last_body_expr.as_assert_eq().is_none()\n & last_body_expr.as_let().is_none() {\n let unused_return_value_name = f\"_{return_value_var_name}\".quoted_contents();\n body = body_without_return.push_back(\n quote { let $unused_return_value_name = $last_body_expr; }.as_expr().unwrap(),\n );\n }\n quote {}\n };\n\n let context_finish = quote { context.finish() };\n\n let to_prepend = quote {\n $args_hasher\n $context_creation\n $assert_initializer\n $init_check\n $internal_check\n $view_check\n $storage_init\n $note_discovery_call\n };\n\n let to_append = quote {\n $return_value\n $mark_as_initialized\n $context_finish\n };\n let modified_body = modify_fn_body(body, to_prepend, to_append);\n f.set_body(modified_body);\n f.set_return_type(\n quote { dep::protocol_types::abis::private_circuit_public_inputs::PrivateCircuitPublicInputs }\n .as_type(),\n );\n f.set_return_data();\n\n fn_abi\n}\n\npub(crate) comptime fn transform_public(f: FunctionDefinition) -> Quoted {\n let fn_abi = create_fn_abi_export(f);\n let fn_stub = stub_fn(f);\n stub_registry::register(f.module(), fn_stub);\n\n // If a function is further modified as unconstrained, we throw an error\n if f.is_unconstrained() {\n let name = f.name();\n panic(\n f\"Function {name} is annotated with #[public] but marked as unconstrained, remove unconstrained keyword\",\n );\n }\n\n let module_has_initializer = module_has_initializer(f.module());\n let module_has_storage = module_has_storage(f.module());\n\n // Public functions undergo a lot of transformations from their Aztec.nr form.\n let original_params = f.parameters();\n let args_len = original_params\n .map(|(name, typ): (Quoted, Type)| {\n generate_serialize_to_fields(name, typ, &[], false).0.len()\n })\n .fold(0, |acc: u32, val: u32| acc + val);\n\n // Unlike in the private case, in public the `context` does not need to receive the hash of the original params.\n let context_creation = quote {\n let mut context = dep::aztec::context::public_context::PublicContext::new(|| {\n // We start from 1 because we skip the selector for the dispatch function.\n let serialized_args : [Field; $args_len] = dep::aztec::context::public_context::calldata_copy(1, $args_len);\n dep::aztec::hash::hash_args_array(serialized_args)\n });\n };\n\n // Modifications introduced by the different marker attributes.\n let internal_check = if is_fn_internal(f) {\n create_internal_check(f)\n } else {\n quote {}\n };\n\n let view_check = if is_fn_view(f) {\n create_view_check(f)\n } else {\n quote {}\n };\n\n let (assert_initializer, mark_as_initialized) = if is_fn_initializer(f) {\n (create_assert_correct_initializer_args(f), create_mark_as_initialized(f))\n } else {\n (quote {}, quote {})\n };\n\n let storage_init = if module_has_storage {\n // Some functions don't access storage, but it'd be quite difficult to only inject this variable if it is\n // referenced. We instead ignore 'unused variable' warnings for it.\n quote {\n #[allow(unused_variables)]\n let storage = Storage::init(&mut context);\n }\n } else {\n quote {}\n };\n\n // Initialization checks are not included in contracts that don't have initializers.\n let init_check = if module_has_initializer & !fn_has_noinitcheck(f) & !is_fn_initializer(f) {\n create_init_check(f)\n } else {\n quote {}\n };\n\n let to_prepend = quote {\n $context_creation\n $assert_initializer\n $init_check\n $internal_check\n $view_check\n $storage_init\n };\n\n let to_append = quote {\n $mark_as_initialized\n };\n\n let body = f.body().as_block().unwrap();\n let modified_body = modify_fn_body(body, to_prepend, to_append);\n f.set_body(modified_body);\n\n // All public functions are automatically made unconstrained, even if they were not marked as such. This is because\n // instead of compiling into a circuit, they will compile to bytecode that will be later transpiled into AVM\n // bytecode.\n f.set_unconstrained(true);\n f.set_return_public(true);\n\n fn_abi\n}\n\npub(crate) comptime fn transform_unconstrained(f: FunctionDefinition) {\n let context_creation = quote { let mut context = dep::aztec::context::unconstrained_context::UnconstrainedContext::new(); };\n let module_has_storage = module_has_storage(f.module());\n\n let storage_init = if module_has_storage {\n quote {\n // Some functions don't access storage, but it'd be quite difficult to only inject this variable if it is\n // referenced. We instead ignore 'unused variable' warnings for it.\n #[allow(unused_variables)]\n let storage = Storage::init(context);\n }\n } else {\n quote {}\n };\n\n // All unconstrained functions perform note discovery, since they may need to access notes. This is slightly\n // inefficient and could be improved by only doing it once we actually attempt to read any.\n let note_discovery_call = if NOTES.len() > 0 {\n create_note_discovery_call()\n } else {\n quote {}\n };\n\n let to_prepend = quote {\n $context_creation\n $storage_init\n $note_discovery_call\n };\n let body = f.body().as_block().unwrap();\n let modified_body = modify_fn_body(body, to_prepend, quote {});\n f.set_return_public(true);\n f.set_body(modified_body);\n}\n\ncomptime fn create_internal_check(f: FunctionDefinition) -> Quoted {\n let name = f.name();\n let assertion_message = f\"Function {name} can only be called internally\";\n quote { assert(context.msg_sender() == context.this_address(), $assertion_message); }\n}\n\ncomptime fn create_view_check(f: FunctionDefinition) -> Quoted {\n let name = f.name();\n let assertion_message = f\"Function {name} can only be called statically\";\n if is_fn_private(f) {\n // Here `context` is of type context::PrivateContext\n quote { assert(context.inputs.call_context.is_static_call == true, $assertion_message); }\n } else {\n // Here `context` is of type context::PublicContext\n quote { assert(context.is_static_call(), $assertion_message); }\n }\n}\n\ncomptime fn create_assert_correct_initializer_args(f: FunctionDefinition) -> Quoted {\n let fn_visibility = get_fn_visibility(f);\n f\"dep::aztec::macros::functions::initialization_utils::assert_initialization_matches_address_preimage_{fn_visibility}(context);\"\n .quoted_contents()\n}\n\ncomptime fn create_mark_as_initialized(f: FunctionDefinition) -> Quoted {\n let fn_visibility = get_fn_visibility(f);\n f\"dep::aztec::macros::functions::initialization_utils::mark_as_initialized_{fn_visibility}(&mut context);\"\n .quoted_contents()\n}\n\ncomptime fn create_init_check(f: FunctionDefinition) -> Quoted {\n let fn_visibility = get_fn_visibility(f);\n f\"dep::aztec::macros::functions::initialization_utils::assert_is_initialized_{fn_visibility}(&mut context);\"\n .quoted_contents()\n}\n\n/// Injects a call to `aztec::discovery::discover_new_notes`, causing for new notes to be added to PXE and made\n/// available for the current execution.\ncomptime fn create_note_discovery_call() -> Quoted {\n quote {\n /// Safety: note discovery returns nothing and is performed solely for its side-effects. It is therefore always\n /// safe to call.\n unsafe {\n dep::aztec::discovery::discover_new_notes(\n context.this_address(),\n _compute_note_hash_and_nullifier,\n )\n };\n }\n}\n"
2607
2607
  },
2608
2608
  "128": {
2609
2609
  "path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/macros/mod.nr",
2610
- "source": "pub mod dispatch;\npub mod functions;\npub mod utils;\npub mod notes;\npub mod storage;\npub mod events;\n\nuse functions::{stub_registry, utils::transform_unconstrained};\nuse notes::{generate_note_export, NOTES};\nuse storage::STORAGE_LAYOUT_NAME;\n\nuse dispatch::generate_public_dispatch;\nuse utils::{get_trait_impl_method, module_has_storage};\n\nuse crate::discovery::MAX_NOTE_PACKED_LEN;\n\n/// Marks a contract as an Aztec contract, generating the interfaces for its functions and notes, as well as injecting\n/// the `process_log` and `sync_notes` functions PXE requires in order to discover notes.\n/// Note: This is a module annotation, so the returned quote gets injected inside the module (contract) itself.\npub comptime fn aztec(m: Module) -> Quoted {\n let interface = generate_contract_interface(m);\n let unconstrained_functions = m.functions().filter(|f: FunctionDefinition| {\n f.is_unconstrained() & !f.has_named_attribute(\"test\") & !f.has_named_attribute(\"public\")\n });\n for f in unconstrained_functions {\n transform_unconstrained(f);\n }\n\n let contract_library_method_compute_note_hash_and_nullifier =\n generate_contract_library_method_compute_note_hash_and_nullifier();\n let process_log = generate_process_log();\n let note_exports = generate_note_exports();\n let public_dispatch = generate_public_dispatch(m);\n let sync_notes = generate_sync_notes();\n\n quote {\n $note_exports\n $interface\n $contract_library_method_compute_note_hash_and_nullifier\n $process_log\n $public_dispatch\n $sync_notes\n }\n}\n\ncomptime fn generate_contract_interface(m: Module) -> Quoted {\n let module_name = m.name();\n let contract_stubs = stub_registry::get(m);\n let fn_stubs_quote = if contract_stubs.is_some() {\n contract_stubs.unwrap().join(quote {})\n } else {\n quote {}\n };\n\n let has_storage_layout = module_has_storage(m) & STORAGE_LAYOUT_NAME.get(m).is_some();\n let storage_layout_getter = if has_storage_layout {\n let storage_layout_name = STORAGE_LAYOUT_NAME.get(m).unwrap();\n quote {\n pub fn storage_layout() -> StorageLayoutFields {\n $storage_layout_name.fields\n }\n }\n } else {\n quote {}\n };\n\n let library_storage_layout_getter = if has_storage_layout {\n quote {\n #[contract_library_method]\n $storage_layout_getter\n }\n } else {\n quote {}\n };\n\n quote {\n pub struct $module_name {\n pub target_contract: dep::aztec::protocol_types::address::AztecAddress\n }\n\n impl $module_name {\n $fn_stubs_quote\n\n pub fn at(\n addr: aztec::protocol_types::address::AztecAddress\n ) -> Self {\n Self { target_contract: addr }\n }\n\n pub fn interface() -> Self {\n Self { target_contract: aztec::protocol_types::address::AztecAddress::zero() }\n }\n\n $storage_layout_getter\n }\n\n #[contract_library_method]\n pub fn at(\n addr: aztec::protocol_types::address::AztecAddress\n ) -> $module_name {\n $module_name { target_contract: addr }\n }\n\n #[contract_library_method]\n pub fn interface() -> $module_name {\n $module_name { target_contract: aztec::protocol_types::address::AztecAddress::zero() }\n }\n\n $library_storage_layout_getter\n\n }\n}\n\n/// Generates a contract library method called `_compute_note_hash_and_nullifier` which is used for note\n/// discovery (to create the `aztec::discovery::ComputeNoteHashAndNullifier` function) and to implement the\n/// `compute_note_hash_and_nullifier` unconstrained contract function.\ncomptime fn generate_contract_library_method_compute_note_hash_and_nullifier() -> Quoted {\n let notes = NOTES.entries();\n\n let mut max_note_packed_len: u32 = 0;\n if notes.len() > 0 {\n max_note_packed_len = notes.fold(\n 0,\n |acc, (_, (_, len, _, _)): (Type, (StructDefinition, u32, Field, [(Quoted, u32, bool)]))| {\n if len > acc {\n len\n } else {\n acc\n }\n },\n );\n\n if max_note_packed_len > MAX_NOTE_PACKED_LEN {\n panic(\n f\"One of the notes has packed len {max_note_packed_len} but the maximum is {MAX_NOTE_PACKED_LEN}\",\n );\n }\n\n // Contracts that do define notes produce an if-else chain where `note_type_id` is matched against the\n // `get_note_type_id()` function of each note type that we know of, in order to identify the note type. Once we\n // know it we call we correct `unpack` method from the `Packable` trait to obtain the underlying note type, and\n // compute the note hash (non-siloed) and inner nullifier (also non-siloed).\n\n let mut if_note_type_id_match_statements_list = &[];\n for i in 0..notes.len() {\n let (typ, (_, packed_note_length, _, _)) = notes[i];\n\n let get_note_type_id = get_trait_impl_method(\n typ,\n quote { crate::note::note_interface::NoteType },\n quote { get_id },\n );\n let unpack = get_trait_impl_method(\n typ,\n quote { crate::protocol_types::traits::Packable<_> },\n quote { unpack },\n );\n\n let compute_note_hash = get_trait_impl_method(\n typ,\n quote { crate::note::note_interface::NoteHash },\n quote { compute_note_hash },\n );\n\n let compute_nullifier_unconstrained = get_trait_impl_method(\n typ,\n quote { crate::note::note_interface::NoteHash },\n quote { compute_nullifier_unconstrained },\n );\n\n let if_or_else_if = if i == 0 {\n quote { if }\n } else {\n quote { else if }\n };\n\n if_note_type_id_match_statements_list = if_note_type_id_match_statements_list.push_back(\n quote {\n $if_or_else_if note_type_id == $get_note_type_id() {\n // As an extra safety check we make sure that the packed_note BoundedVec has the expected\n // length, since we're about to interpret it's raw storage as a fixed-size array by calling the\n // unpack function on it.\n let expected_len = $packed_note_length;\n let actual_len = packed_note.len();\n assert(\n actual_len == expected_len,\n f\"Expected packed note of length {expected_len} but got {actual_len} for note type id {note_type_id}\"\n );\n\n let note = $unpack(aztec::utils::array::subarray(packed_note.storage(), 0));\n\n let note_hash = $compute_note_hash(note, storage_slot);\n \n // The note discovery process finds settled notes, that is, notes that were created in prior\n // transactions and are therefore already part of the note hash tree. We therefore compute the\n // nullification note hash by treating the note as a settled note with the provided nonce.\n let note_hash_for_nullify = aztec::note::utils::compute_note_hash_for_nullify(\n aztec::note::retrieved_note::RetrievedNote{ \n note, \n contract_address, \n metadata: aztec::note::note_metadata::SettledNoteMetadata::new(nonce).into() \n }, \n storage_slot,\n );\n\n let inner_nullifier = $compute_nullifier_unconstrained(note, note_hash_for_nullify);\n\n Option::some(\n aztec::discovery::NoteHashAndNullifier {\n note_hash, inner_nullifier\n }\n )\n }\n },\n );\n }\n\n let if_note_type_id_match_statements = if_note_type_id_match_statements_list.join(quote {});\n\n quote {\n /// Unpacks an array into a note corresponding to `note_type_id` and then computes its note hash\n /// (non-siloed) and inner nullifier (non-siloed) assuming the note has been inserted into the note hash\n /// tree with `nonce`.\n ///\n /// The signature of this function notably matches the `aztec::discovery::ComputeNoteHashAndNullifier` type,\n /// and so it can be used to call functions from that module such as `discover_new_notes`, `do_process_log`\n /// and `process_private_note_log`.\n ///\n /// This function is automatically injected by the `#[aztec]` macro.\n #[contract_library_method]\n unconstrained fn _compute_note_hash_and_nullifier(\n packed_note: BoundedVec<Field, aztec::discovery::MAX_NOTE_PACKED_LEN>,\n storage_slot: Field,\n note_type_id: Field,\n contract_address: aztec::protocol_types::address::AztecAddress,\n nonce: Field,\n ) -> pub Option<aztec::discovery::NoteHashAndNullifier> {\n $if_note_type_id_match_statements\n else {\n Option::none()\n }\n }\n }\n } else {\n // Contracts with no notes still implement this function to avoid having special-casing, the implementation\n // simply throws immediately.\n quote {\n /// This contract does not use private notes, so this function should never be called as it will\n /// unconditionally fail.\n ///\n /// This function is automatically injected by the `#[aztec]` macro.\n #[contract_library_method]\n unconstrained fn _compute_note_hash_and_nullifier(\n _packed_note: BoundedVec<Field, aztec::discovery::MAX_NOTE_PACKED_LEN>,\n _storage_slot: Field,\n _note_type_id: Field,\n _contract_address: aztec::protocol_types::address::AztecAddress,\n ) -> pub Option<aztec::discovery::NoteHashAndNullifier> {\n panic(f\"This contract does not use private notes\")\n }\n }\n }\n}\n\ncomptime fn generate_process_log() -> Quoted {\n // This mandatory function processes a log emitted by the contract. This is currently used to process private logs\n // and perform note discovery of either private notes or partial notes.\n // The bulk of the work of this function is done by aztec::discovery::do_process_log, so all we need to do is call\n // that function.\n\n // We'll produce the entire body of the function in one go and then insert it into the function.\n let notes = NOTES.entries();\n\n if notes.len() > 0 {\n quote {\n unconstrained fn process_log(\n log_plaintext: BoundedVec<Field, dep::aztec::protocol_types::constants::PRIVATE_LOG_SIZE_IN_FIELDS>,\n tx_hash: Field,\n unique_note_hashes_in_tx: BoundedVec<Field, dep::aztec::protocol_types::constants::MAX_NOTE_HASHES_PER_TX>,\n first_nullifier_in_tx: Field,\n recipient: aztec::protocol_types::address::AztecAddress,\n ) {\n // Because this unconstrained function is injected after the contract is processed by the macros, it'll not\n // be modified by the macros that alter unconstrained functions. As such, we need to manually inject the\n // unconstrained execution context since it will not be available otherwise.\n let context = dep::aztec::context::unconstrained_context::UnconstrainedContext::new();\n\n // TODO(#10727): allow other contracts to process logs and deliver notes\n let contract_address = context.this_address();\n\n aztec::discovery::private_logs::do_process_log(\n contract_address,\n log_plaintext,\n tx_hash,\n unique_note_hashes_in_tx,\n first_nullifier_in_tx,\n recipient,\n _compute_note_hash_and_nullifier,\n );\n }\n }\n } else {\n // Contracts with no notes still implement this function to avoid having special-casing, the implementation\n // simply throws immediately.\n quote {\n unconstrained fn process_log(\n _log_plaintext: BoundedVec<Field, dep::aztec::protocol_types::constants::PRIVATE_LOG_SIZE_IN_FIELDS>,\n _tx_hash: Field,\n _unique_note_hashes_in_tx: BoundedVec<Field, dep::aztec::protocol_types::constants::MAX_NOTE_HASHES_PER_TX>,\n _first_nullifier_in_tx: Field,\n _recipient: aztec::protocol_types::address::AztecAddress,\n ) {\n panic(f\"This contract does not use private notes\")\n }\n }\n }\n}\n\ncomptime fn generate_note_exports() -> Quoted {\n let notes = NOTES.values();\n // Second value in each tuple is `note_packed_len` and that is ignored here because it's only used when\n // generating partial note helper functions.\n notes\n .map(|(s, _, note_type_id, fields): (StructDefinition, u32, Field, [(Quoted, u32, bool)])| {\n generate_note_export(s, note_type_id, fields)\n })\n .join(quote {})\n}\n\ncomptime fn generate_sync_notes() -> Quoted {\n quote {\n unconstrained fn sync_notes() {\n aztec::oracle::note_discovery::sync_notes();\n }\n }\n}\n"
2610
+ "source": "pub mod dispatch;\npub mod functions;\npub mod utils;\npub mod notes;\npub mod storage;\npub mod events;\n\nuse functions::{stub_registry, utils::transform_unconstrained};\nuse notes::{generate_note_export, NOTES};\nuse storage::STORAGE_LAYOUT_NAME;\n\nuse dispatch::generate_public_dispatch;\nuse utils::{get_trait_impl_method, module_has_storage};\n\nuse crate::discovery::MAX_NOTE_PACKED_LEN;\n\n/// Marks a contract as an Aztec contract, generating the interfaces for its functions and notes, as well as injecting\n/// the `process_log` and `sync_notes` functions PXE requires in order to discover notes.\n/// Note: This is a module annotation, so the returned quote gets injected inside the module (contract) itself.\npub comptime fn aztec(m: Module) -> Quoted {\n let interface = generate_contract_interface(m);\n let unconstrained_functions = m.functions().filter(|f: FunctionDefinition| {\n f.is_unconstrained() & !f.has_named_attribute(\"test\") & !f.has_named_attribute(\"public\")\n });\n for f in unconstrained_functions {\n transform_unconstrained(f);\n }\n\n let contract_library_method_compute_note_hash_and_nullifier =\n generate_contract_library_method_compute_note_hash_and_nullifier();\n let process_log = generate_process_log();\n let note_exports = generate_note_exports();\n let public_dispatch = generate_public_dispatch(m);\n let sync_notes = generate_sync_notes();\n\n quote {\n $note_exports\n $interface\n $contract_library_method_compute_note_hash_and_nullifier\n $process_log\n $public_dispatch\n $sync_notes\n }\n}\n\ncomptime fn generate_contract_interface(m: Module) -> Quoted {\n let module_name = m.name();\n let contract_stubs = stub_registry::get(m);\n let fn_stubs_quote = if contract_stubs.is_some() {\n contract_stubs.unwrap().join(quote {})\n } else {\n quote {}\n };\n\n let has_storage_layout = module_has_storage(m) & STORAGE_LAYOUT_NAME.get(m).is_some();\n let storage_layout_getter = if has_storage_layout {\n let storage_layout_name = STORAGE_LAYOUT_NAME.get(m).unwrap();\n quote {\n pub fn storage_layout() -> StorageLayoutFields {\n $storage_layout_name.fields\n }\n }\n } else {\n quote {}\n };\n\n let library_storage_layout_getter = if has_storage_layout {\n quote {\n #[contract_library_method]\n $storage_layout_getter\n }\n } else {\n quote {}\n };\n\n quote {\n pub struct $module_name {\n pub target_contract: dep::aztec::protocol_types::address::AztecAddress\n }\n\n impl $module_name {\n $fn_stubs_quote\n\n pub fn at(\n addr: aztec::protocol_types::address::AztecAddress\n ) -> Self {\n Self { target_contract: addr }\n }\n\n pub fn interface() -> Self {\n Self { target_contract: aztec::protocol_types::address::AztecAddress::zero() }\n }\n\n $storage_layout_getter\n }\n\n #[contract_library_method]\n pub fn at(\n addr: aztec::protocol_types::address::AztecAddress\n ) -> $module_name {\n $module_name { target_contract: addr }\n }\n\n #[contract_library_method]\n pub fn interface() -> $module_name {\n $module_name { target_contract: aztec::protocol_types::address::AztecAddress::zero() }\n }\n\n $library_storage_layout_getter\n\n }\n}\n\n/// Generates a contract library method called `_compute_note_hash_and_nullifier` which is used for note\n/// discovery (to create the `aztec::discovery::ComputeNoteHashAndNullifier` function) and to implement the\n/// `compute_note_hash_and_nullifier` unconstrained contract function.\ncomptime fn generate_contract_library_method_compute_note_hash_and_nullifier() -> Quoted {\n let notes = NOTES.entries();\n\n let mut max_note_packed_len: u32 = 0;\n if notes.len() > 0 {\n max_note_packed_len = notes.fold(\n 0,\n |acc, (_, (_, len, _, _)): (Type, (StructDefinition, u32, Field, [(Quoted, u32, bool)]))| {\n if len > acc {\n len\n } else {\n acc\n }\n },\n );\n\n if max_note_packed_len > MAX_NOTE_PACKED_LEN {\n panic(\n f\"One of the notes has packed len {max_note_packed_len} but the maximum is {MAX_NOTE_PACKED_LEN}\",\n );\n }\n\n // Contracts that do define notes produce an if-else chain where `note_type_id` is matched against the\n // `get_note_type_id()` function of each note type that we know of, in order to identify the note type. Once we\n // know it we call we correct `unpack` method from the `Packable` trait to obtain the underlying note type, and\n // compute the note hash (non-siloed) and inner nullifier (also non-siloed).\n\n let mut if_note_type_id_match_statements_list = &[];\n for i in 0..notes.len() {\n let (typ, (_, packed_note_length, _, _)) = notes[i];\n\n let get_note_type_id = get_trait_impl_method(\n typ,\n quote { crate::note::note_interface::NoteType },\n quote { get_id },\n );\n let unpack = get_trait_impl_method(\n typ,\n quote { crate::protocol_types::traits::Packable<_> },\n quote { unpack },\n );\n\n let compute_note_hash = get_trait_impl_method(\n typ,\n quote { crate::note::note_interface::NoteHash },\n quote { compute_note_hash },\n );\n\n let compute_nullifier_unconstrained = get_trait_impl_method(\n typ,\n quote { crate::note::note_interface::NoteHash },\n quote { compute_nullifier_unconstrained },\n );\n\n let if_or_else_if = if i == 0 {\n quote { if }\n } else {\n quote { else if }\n };\n\n if_note_type_id_match_statements_list = if_note_type_id_match_statements_list.push_back(\n quote {\n $if_or_else_if note_type_id == $get_note_type_id() {\n // As an extra safety check we make sure that the packed_note BoundedVec has the expected\n // length, since we're about to interpret it's raw storage as a fixed-size array by calling the\n // unpack function on it.\n let expected_len = $packed_note_length;\n let actual_len = packed_note.len();\n assert(\n actual_len == expected_len,\n f\"Expected packed note of length {expected_len} but got {actual_len} for note type id {note_type_id}\"\n );\n\n let note = $unpack(aztec::utils::array::subarray(packed_note.storage(), 0));\n\n let note_hash = $compute_note_hash(note, storage_slot);\n \n // The note discovery process finds settled notes, that is, notes that were created in prior\n // transactions and are therefore already part of the note hash tree. We therefore compute the\n // nullification note hash by treating the note as a settled note with the provided nonce.\n let note_hash_for_nullify = aztec::note::utils::compute_note_hash_for_nullify(\n aztec::note::retrieved_note::RetrievedNote{ \n note, \n contract_address, \n metadata: aztec::note::note_metadata::SettledNoteMetadata::new(nonce).into() \n }, \n storage_slot,\n );\n\n let inner_nullifier = $compute_nullifier_unconstrained(note, note_hash_for_nullify);\n\n Option::some(\n aztec::discovery::NoteHashAndNullifier {\n note_hash, inner_nullifier\n }\n )\n }\n },\n );\n }\n\n let if_note_type_id_match_statements = if_note_type_id_match_statements_list.join(quote {});\n\n quote {\n /// Unpacks an array into a note corresponding to `note_type_id` and then computes its note hash\n /// (non-siloed) and inner nullifier (non-siloed) assuming the note has been inserted into the note hash\n /// tree with `nonce`.\n ///\n /// The signature of this function notably matches the `aztec::discovery::ComputeNoteHashAndNullifier` type,\n /// and so it can be used to call functions from that module such as `discover_new_notes`, `do_process_log`\n /// and `process_private_note_log`.\n ///\n /// This function is automatically injected by the `#[aztec]` macro.\n #[contract_library_method]\n unconstrained fn _compute_note_hash_and_nullifier(\n packed_note: BoundedVec<Field, aztec::discovery::MAX_NOTE_PACKED_LEN>,\n storage_slot: Field,\n note_type_id: Field,\n contract_address: aztec::protocol_types::address::AztecAddress,\n nonce: Field,\n ) -> Option<aztec::discovery::NoteHashAndNullifier> {\n $if_note_type_id_match_statements\n else {\n Option::none()\n }\n }\n }\n } else {\n // Contracts with no notes still implement this function to avoid having special-casing, the implementation\n // simply throws immediately.\n quote {\n /// This contract does not use private notes, so this function should never be called as it will\n /// unconditionally fail.\n ///\n /// This function is automatically injected by the `#[aztec]` macro.\n #[contract_library_method]\n unconstrained fn _compute_note_hash_and_nullifier(\n _packed_note: BoundedVec<Field, aztec::discovery::MAX_NOTE_PACKED_LEN>,\n _storage_slot: Field,\n _note_type_id: Field,\n _contract_address: aztec::protocol_types::address::AztecAddress,\n ) -> pub Option<aztec::discovery::NoteHashAndNullifier> {\n panic(f\"This contract does not use private notes\")\n }\n }\n }\n}\n\ncomptime fn generate_process_log() -> Quoted {\n // This mandatory function processes a log emitted by the contract. This is currently used to process private logs\n // and perform note discovery of either private notes or partial notes.\n // The bulk of the work of this function is done by aztec::discovery::do_process_log, so all we need to do is call\n // that function.\n\n // We'll produce the entire body of the function in one go and then insert it into the function.\n let notes = NOTES.entries();\n\n if notes.len() > 0 {\n quote {\n unconstrained fn process_log(\n log_plaintext: BoundedVec<Field, dep::aztec::protocol_types::constants::PRIVATE_LOG_SIZE_IN_FIELDS>,\n tx_hash: Field,\n unique_note_hashes_in_tx: BoundedVec<Field, dep::aztec::protocol_types::constants::MAX_NOTE_HASHES_PER_TX>,\n first_nullifier_in_tx: Field,\n recipient: aztec::protocol_types::address::AztecAddress,\n ) {\n // Because this unconstrained function is injected after the contract is processed by the macros, it'll not\n // be modified by the macros that alter unconstrained functions. As such, we need to manually inject the\n // unconstrained execution context since it will not be available otherwise.\n let context = dep::aztec::context::unconstrained_context::UnconstrainedContext::new();\n\n // TODO(#10727): allow other contracts to process logs and deliver notes\n let contract_address = context.this_address();\n\n aztec::discovery::private_logs::do_process_log(\n contract_address,\n log_plaintext,\n tx_hash,\n unique_note_hashes_in_tx,\n first_nullifier_in_tx,\n recipient,\n _compute_note_hash_and_nullifier,\n );\n }\n }\n } else {\n // Contracts with no notes still implement this function to avoid having special-casing, the implementation\n // simply throws immediately.\n quote {\n unconstrained fn process_log(\n _log_plaintext: BoundedVec<Field, dep::aztec::protocol_types::constants::PRIVATE_LOG_SIZE_IN_FIELDS>,\n _tx_hash: Field,\n _unique_note_hashes_in_tx: BoundedVec<Field, dep::aztec::protocol_types::constants::MAX_NOTE_HASHES_PER_TX>,\n _first_nullifier_in_tx: Field,\n _recipient: aztec::protocol_types::address::AztecAddress,\n ) {\n panic(f\"This contract does not use private notes\")\n }\n }\n }\n}\n\ncomptime fn generate_note_exports() -> Quoted {\n let notes = NOTES.values();\n // Second value in each tuple is `note_packed_len` and that is ignored here because it's only used when\n // generating partial note helper functions.\n notes\n .map(|(s, _, note_type_id, fields): (StructDefinition, u32, Field, [(Quoted, u32, bool)])| {\n generate_note_export(s, note_type_id, fields)\n })\n .join(quote {})\n}\n\ncomptime fn generate_sync_notes() -> Quoted {\n quote {\n unconstrained fn sync_notes() {\n aztec::oracle::note_discovery::sync_notes();\n }\n }\n}\n"
2611
2611
  },
2612
2612
  "130": {
2613
2613
  "path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/macros/storage/mod.nr",
2614
- "source": "use std::{collections::umap::UHashMap, hash::{BuildHasherDefault, poseidon2::Poseidon2Hasher}};\n\nuse super::utils::get_storage_size;\nuse super::utils::is_note;\n\n/// Stores a map from a module to the name of the struct that describes its storage layout.\n/// This is then used when generating a `storage_layout()` getter on the contract struct.\npub comptime mut global STORAGE_LAYOUT_NAME: UHashMap<Module, Quoted, BuildHasherDefault<Poseidon2Hasher>> =\n UHashMap::default();\n\n/// Marks a struct as the one describing the storage layout of a contract. Only a single struct in the entire contract\n/// should have this macro (or `storage_no_init`) applied to it.\n/// The contract's storage is accessed via the `storage` variable, which will will automatically be made available in\n/// all functions as an instance of the struct this macro was applied to.\npub comptime fn storage(s: StructDefinition) -> Quoted {\n // This macro performs three things:\n // - it marks the contract as having storage, so that `macros::utils::module_has_storage` will return true and\n // functions will have the storage variable injected and initialized via the `init` function.\n // - it implements said `init` function by allocating appropriate storage slots to each state variable.\n // - it exposes the storage layout by creating a `StorageLayout` struct that is exposed via the `abi(storage)`\n // macro.\n let mut slot: u32 = 1;\n let mut storage_vars_constructors = &[];\n let mut storage_layout_fields = &[];\n let mut storage_layout_constructors = &[];\n\n // TODO(#8658): uncomment the code below to inject the Context type parameter.\n //let mut new_storage_fields = &[];\n //let context_generic = s.add_generic(\"Context\");\n for field in s.fields_as_written() {\n // FIXME: This doesn't handle field types with generics\n let (name, typ) = field;\n let (storage_field_constructor, storage_size) =\n generate_storage_field_constructor(typ, quote { $slot }, false);\n storage_vars_constructors =\n storage_vars_constructors.push_back(quote { $name: $storage_field_constructor });\n // We have `Storable` in a separate `.nr` file instead of defining it in the last quote of this function\n // because that way a dev gets a more reasonable error if he defines a struct with the same name in\n // a contract.\n storage_layout_fields =\n storage_layout_fields.push_back(quote { pub $name: dep::aztec::prelude::Storable });\n storage_layout_constructors = storage_layout_constructors.push_back(\n quote { $name: dep::aztec::prelude::Storable { slot: $slot } },\n );\n //let with_context_generic = add_context_generic(typ, context_generic);\n //println(with_context_generic);\n //new_storage_fields = new_storage_fields.push_back((name, with_context_generic ));\n slot += storage_size;\n }\n\n //s.set_fields(new_storage_fields);\n let storage_vars_constructors = storage_vars_constructors.join(quote {,});\n let storage_impl = quote {\n impl<Context> Storage<Context> {\n fn init(context: Context) -> Self {\n Self {\n $storage_vars_constructors\n }\n }\n }\n };\n\n let storage_layout_fields = storage_layout_fields.join(quote {,});\n let storage_layout_constructors = storage_layout_constructors.join(quote {,});\n\n let module = s.module();\n let module_name = module.name();\n let storage_layout_name = f\"STORAGE_LAYOUT_{module_name}\".quoted_contents();\n let (module_name_str, module_name_len) = module_name.as_str_quote();\n STORAGE_LAYOUT_NAME.insert(module, storage_layout_name);\n\n quote {\n $storage_impl\n\n pub struct StorageLayoutFields {\n $storage_layout_fields\n }\n\n pub struct StorageLayout<let N: u32> {\n pub contract_name: str<N>,\n pub fields: StorageLayoutFields\n }\n\n #[abi(storage)]\n pub global $storage_layout_name: StorageLayout<$module_name_len> = StorageLayout {\n contract_name: $module_name_str,\n fields: StorageLayoutFields { $storage_layout_constructors }\n };\n }\n}\n\n/// Same as `storage`, except the user is in charge of providing an implementation of the `init` constructor function\n/// with signature `fn init<Context>(context: Context) -> Self`, which allows for manual control of storage slot\n/// allocation. Similarly, no `StorageLayout` struct will be created.\n/// Only a single struct in the entire contract should have this macro (or `storage`) applied to it.\npub comptime fn storage_no_init(_s: StructDefinition) {\n // All `storage` does is provide the `init` implementation, so we don't need to do anything here. Applying this\n // macro however will cause for `macros::utils::module_has_storage` to return true, resulting in the injection of\n // the `storage` variable.\n}\n\n/// Returns the expression required to initialize a state variable with a given slot, along with its serialization size,\n/// i.e. how many contiguous storage slots the variable requires.\ncomptime fn generate_storage_field_constructor(\n typ: Type,\n slot: Quoted,\n parent_is_map: bool,\n) -> (Quoted, u32) {\n assert(\n typ.as_struct().is_some(),\n \"Storage containers must be generic structs of the form `Container<_, Context>`, or Map<Key, _, Context>\",\n );\n let (container_struct, generics) = typ.as_struct().unwrap();\n let struct_name = container_struct.name();\n\n if is_storage_map(typ) {\n // Map state variables recursively initialize their contents - this includes nested maps.\n let (value_constructor, _) =\n generate_storage_field_constructor(generics[1], quote { slot }, true);\n (quote { $struct_name::new(context, $slot, | context, slot | { $value_constructor }) }, 1)\n } else {\n let storage_size = if parent_is_map {\n // Variables inside a map do not require contiguous slots since the map slot derivation is assumed to result\n // in slots very far away from one another.\n 1\n } else {\n let (_, container_struct_generics) = typ.as_struct().unwrap();\n let stored_struct = container_struct_generics[0];\n\n if is_note(stored_struct) {\n // Private notes always occupy a single slot, since the slot is only used as a state variable\n // identifier.\n 1\n } else {\n get_storage_size(typ)\n }\n };\n\n // We assume below that all state variables implement `fn new<Context>(context: Context, slot: Field) -> Self`.\n (quote { $struct_name::new(context, $slot)}, storage_size)\n }\n}\n\n/// Returns true if `typ` is `state_vars::map::Map`.\ncomptime fn is_storage_map(typ: Type) -> bool {\n if typ.as_struct().is_some() {\n let (def, generics) = typ.as_struct().unwrap();\n let maybe_map = if (def.name() == quote { Map }) & (generics.len() == 3) {\n let maybe_key = generics[0];\n let maybe_value = generics[1];\n let maybe_context = generics[2];\n quote { crate::state_vars::map::Map<$maybe_key, $maybe_value, $maybe_context> }.as_type()\n } else {\n quote {()}.as_type()\n };\n typ == maybe_map\n } else {\n false\n }\n}\n\ncomptime fn add_context_generic(typ: Type, context_generic: Type) -> Type {\n let (def, mut generics) = typ.as_struct().expect(\n f\"Storage containers must be generic structs of the form `Container<..., Context>`\",\n );\n let name = def.name();\n\n if is_storage_map(typ) {\n generics[generics.len() - 2] = add_context_generic(generics[1], context_generic);\n generics[generics.len() - 1] = context_generic;\n } else {\n generics[generics.len() - 1] = context_generic;\n }\n\n let generics = generics.map(|typ: Type| quote {$typ}).join(quote {,});\n quote { $name<$generics> }.as_type()\n}\n"
2614
+ "source": "use std::{collections::umap::UHashMap, hash::{BuildHasherDefault, poseidon2::Poseidon2Hasher}};\n\nuse super::utils::AsStrQuote;\nuse super::utils::get_storage_size;\nuse super::utils::is_note;\n\n/// Stores a map from a module to the name of the struct that describes its storage layout.\n/// This is then used when generating a `storage_layout()` getter on the contract struct.\npub comptime mut global STORAGE_LAYOUT_NAME: UHashMap<Module, Quoted, BuildHasherDefault<Poseidon2Hasher>> =\n UHashMap::default();\n\n/// Marks a struct as the one describing the storage layout of a contract. Only a single struct in the entire contract\n/// should have this macro (or `storage_no_init`) applied to it.\n/// The contract's storage is accessed via the `storage` variable, which will will automatically be made available in\n/// all functions as an instance of the struct this macro was applied to.\npub comptime fn storage(s: StructDefinition) -> Quoted {\n // This macro performs three things:\n // - it marks the contract as having storage, so that `macros::utils::module_has_storage` will return true and\n // functions will have the storage variable injected and initialized via the `init` function.\n // - it implements said `init` function by allocating appropriate storage slots to each state variable.\n // - it exposes the storage layout by creating a `StorageLayout` struct that is exposed via the `abi(storage)`\n // macro.\n let mut slot: u32 = 1;\n let mut storage_vars_constructors = &[];\n let mut storage_layout_fields = &[];\n let mut storage_layout_constructors = &[];\n\n // TODO(#8658): uncomment the code below to inject the Context type parameter.\n //let mut new_storage_fields = &[];\n //let context_generic = s.add_generic(\"Context\");\n for field in s.fields_as_written() {\n // FIXME: This doesn't handle field types with generics\n let (name, typ) = field;\n let (storage_field_constructor, storage_size) =\n generate_storage_field_constructor(typ, quote { $slot }, false);\n storage_vars_constructors =\n storage_vars_constructors.push_back(quote { $name: $storage_field_constructor });\n // We have `Storable` in a separate `.nr` file instead of defining it in the last quote of this function\n // because that way a dev gets a more reasonable error if he defines a struct with the same name in\n // a contract.\n storage_layout_fields =\n storage_layout_fields.push_back(quote { pub $name: dep::aztec::prelude::Storable });\n storage_layout_constructors = storage_layout_constructors.push_back(\n quote { $name: dep::aztec::prelude::Storable { slot: $slot } },\n );\n //let with_context_generic = add_context_generic(typ, context_generic);\n //println(with_context_generic);\n //new_storage_fields = new_storage_fields.push_back((name, with_context_generic ));\n slot += storage_size;\n }\n\n //s.set_fields(new_storage_fields);\n let storage_vars_constructors = storage_vars_constructors.join(quote {,});\n let storage_impl = quote {\n impl<Context> Storage<Context> {\n fn init(context: Context) -> Self {\n Self {\n $storage_vars_constructors\n }\n }\n }\n };\n\n let storage_layout_fields = storage_layout_fields.join(quote {,});\n let storage_layout_constructors = storage_layout_constructors.join(quote {,});\n\n let module = s.module();\n let module_name = module.name();\n let storage_layout_name = f\"STORAGE_LAYOUT_{module_name}\".quoted_contents();\n let (module_name_str, module_name_len) = module_name.as_str_quote();\n STORAGE_LAYOUT_NAME.insert(module, storage_layout_name);\n\n quote {\n $storage_impl\n\n pub struct StorageLayoutFields {\n $storage_layout_fields\n }\n\n pub struct StorageLayout<let N: u32> {\n pub contract_name: str<N>,\n pub fields: StorageLayoutFields\n }\n\n #[abi(storage)]\n pub global $storage_layout_name: StorageLayout<$module_name_len> = StorageLayout {\n contract_name: $module_name_str,\n fields: StorageLayoutFields { $storage_layout_constructors }\n };\n }\n}\n\n/// Same as `storage`, except the user is in charge of providing an implementation of the `init` constructor function\n/// with signature `fn init<Context>(context: Context) -> Self`, which allows for manual control of storage slot\n/// allocation. Similarly, no `StorageLayout` struct will be created.\n/// Only a single struct in the entire contract should have this macro (or `storage`) applied to it.\npub comptime fn storage_no_init(_s: StructDefinition) {\n // All `storage` does is provide the `init` implementation, so we don't need to do anything here. Applying this\n // macro however will cause for `macros::utils::module_has_storage` to return true, resulting in the injection of\n // the `storage` variable.\n}\n\n/// Returns the expression required to initialize a state variable with a given slot, along with its serialization size,\n/// i.e. how many contiguous storage slots the variable requires.\ncomptime fn generate_storage_field_constructor(\n typ: Type,\n slot: Quoted,\n parent_is_map: bool,\n) -> (Quoted, u32) {\n assert(\n typ.as_struct().is_some(),\n \"Storage containers must be generic structs of the form `Container<_, Context>`, or Map<Key, _, Context>\",\n );\n let (container_struct, generics) = typ.as_struct().unwrap();\n let struct_name = container_struct.name();\n\n if is_storage_map(typ) {\n // Map state variables recursively initialize their contents - this includes nested maps.\n let (value_constructor, _) =\n generate_storage_field_constructor(generics[1], quote { slot }, true);\n (quote { $struct_name::new(context, $slot, | context, slot | { $value_constructor }) }, 1)\n } else {\n let storage_size = if parent_is_map {\n // Variables inside a map do not require contiguous slots since the map slot derivation is assumed to result\n // in slots very far away from one another.\n 1\n } else {\n let (_, container_struct_generics) = typ.as_struct().unwrap();\n let stored_struct = container_struct_generics[0];\n\n if is_note(stored_struct) {\n // Private notes always occupy a single slot, since the slot is only used as a state variable\n // identifier.\n 1\n } else {\n get_storage_size(typ)\n }\n };\n\n // We assume below that all state variables implement `fn new<Context>(context: Context, slot: Field) -> Self`.\n (quote { $struct_name::new(context, $slot)}, storage_size)\n }\n}\n\n/// Returns true if `typ` is `state_vars::map::Map`.\ncomptime fn is_storage_map(typ: Type) -> bool {\n if typ.as_struct().is_some() {\n let (def, generics) = typ.as_struct().unwrap();\n let maybe_map = if (def.name() == quote { Map }) & (generics.len() == 3) {\n let maybe_key = generics[0];\n let maybe_value = generics[1];\n let maybe_context = generics[2];\n quote { crate::state_vars::map::Map<$maybe_key, $maybe_value, $maybe_context> }.as_type()\n } else {\n quote {()}.as_type()\n };\n typ == maybe_map\n } else {\n false\n }\n}\n\ncomptime fn add_context_generic(typ: Type, context_generic: Type) -> Type {\n let (def, mut generics) = typ.as_struct().expect(\n f\"Storage containers must be generic structs of the form `Container<..., Context>`\",\n );\n let name = def.name();\n\n if is_storage_map(typ) {\n generics[generics.len() - 2] = add_context_generic(generics[1], context_generic);\n generics[generics.len() - 1] = context_generic;\n } else {\n generics[generics.len() - 1] = context_generic;\n }\n\n let generics = generics.map(|typ: Type| quote {$typ}).join(quote {,});\n quote { $name<$generics> }.as_type()\n}\n"
2615
2615
  },
2616
2616
  "148": {
2617
2617
  "path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/oracle/call_private_function.nr",
@@ -2639,7 +2639,7 @@
2639
2639
  },
2640
2640
  "165": {
2641
2641
  "path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/oracle/storage.nr",
2642
- "source": "use dep::protocol_types::{address::AztecAddress, traits::Packable};\n\n#[oracle(storageRead)]\nunconstrained fn storage_read_oracle<let N: u32>(\n address: Field,\n storage_slot: Field,\n block_number: Field,\n length: Field,\n) -> [Field; N] {}\n\npub unconstrained fn raw_storage_read<let N: u32>(\n address: AztecAddress,\n storage_slot: Field,\n block_number: u32,\n) -> [Field; N] {\n storage_read_oracle(\n address.to_field(),\n storage_slot,\n block_number as Field,\n N as Field,\n )\n}\n\npub unconstrained fn storage_read<T, let N: u32>(\n address: AztecAddress,\n storage_slot: Field,\n block_number: u32,\n) -> T\nwhere\n T: Packable<N>,\n{\n T::unpack(raw_storage_read(address, storage_slot, block_number))\n}\n\nmod tests {\n use crate::oracle::storage::{raw_storage_read, storage_read};\n use dep::protocol_types::{address::AztecAddress, traits::{FromField, Packable}};\n\n use crate::test::mocks::mock_struct::MockStruct;\n use std::test::OracleMock;\n\n global address: AztecAddress = AztecAddress::from_field(29);\n global slot: Field = 7;\n global block_number: u32 = 17;\n\n #[test]\n unconstrained fn test_raw_storage_read() {\n let written = MockStruct { a: 13, b: 42 };\n\n let _ = OracleMock::mock(\"storageRead\").returns(written.pack());\n\n let read: [Field; 2] = raw_storage_read(address, slot, block_number);\n assert_eq(read[0], 13);\n assert_eq(read[1], 42);\n }\n\n #[test]\n unconstrained fn test_storage_read() {\n let written = MockStruct { a: 13, b: 42 };\n\n let _ = OracleMock::mock(\"storageRead\").returns(written.pack());\n\n let read: MockStruct = storage_read(address, slot, block_number);\n assert_eq(read.a, 13);\n assert_eq(read.b, 42);\n }\n}\n"
2642
+ "source": "use dep::protocol_types::{address::AztecAddress, traits::{Packable, ToField}};\n\n#[oracle(storageRead)]\nunconstrained fn storage_read_oracle<let N: u32>(\n address: Field,\n storage_slot: Field,\n block_number: Field,\n length: Field,\n) -> [Field; N] {}\n\npub unconstrained fn raw_storage_read<let N: u32>(\n address: AztecAddress,\n storage_slot: Field,\n block_number: u32,\n) -> [Field; N] {\n storage_read_oracle(\n address.to_field(),\n storage_slot,\n block_number as Field,\n N as Field,\n )\n}\n\npub unconstrained fn storage_read<T, let N: u32>(\n address: AztecAddress,\n storage_slot: Field,\n block_number: u32,\n) -> T\nwhere\n T: Packable<N>,\n{\n T::unpack(raw_storage_read(address, storage_slot, block_number))\n}\n\nmod tests {\n use crate::oracle::storage::{raw_storage_read, storage_read};\n use dep::protocol_types::{address::AztecAddress, traits::{FromField, Packable}};\n\n use crate::test::mocks::mock_struct::MockStruct;\n use std::test::OracleMock;\n\n global address: AztecAddress = AztecAddress::from_field(29);\n global slot: Field = 7;\n global block_number: u32 = 17;\n\n #[test]\n unconstrained fn test_raw_storage_read() {\n let written = MockStruct { a: 13, b: 42 };\n\n let _ = OracleMock::mock(\"storageRead\").returns(written.pack());\n\n let read: [Field; 2] = raw_storage_read(address, slot, block_number);\n assert_eq(read[0], 13);\n assert_eq(read[1], 42);\n }\n\n #[test]\n unconstrained fn test_storage_read() {\n let written = MockStruct { a: 13, b: 42 };\n\n let _ = OracleMock::mock(\"storageRead\").returns(written.pack());\n\n let read: MockStruct = storage_read(address, slot, block_number);\n assert_eq(read.a, 13);\n assert_eq(read.b, 42);\n }\n}\n"
2643
2643
  },
2644
2644
  "167": {
2645
2645
  "path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/state_vars/map.nr",
@@ -2695,7 +2695,7 @@
2695
2695
  },
2696
2696
  "63": {
2697
2697
  "path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/authwit/src/auth.nr",
2698
- "source": "use dep::aztec::{context::{gas::GasOpts, PrivateContext, PublicContext}, hash::hash_args_array};\nuse dep::aztec::protocol_types::{\n abis::function_selector::FunctionSelector,\n address::AztecAddress,\n constants::{\n CANONICAL_AUTH_REGISTRY_ADDRESS, GENERATOR_INDEX__AUTHWIT_INNER,\n GENERATOR_INDEX__AUTHWIT_NULLIFIER, GENERATOR_INDEX__AUTHWIT_OUTER,\n },\n hash::poseidon2_hash_with_separator,\n};\n\n/**\n * Authenticaion witness helper library\n *\n * Authentication Witness is a scheme for authenticating actions on Aztec, so users can allow third-parties\n * (e.g. protocols or other users) to execute an action on their behalf.\n *\n * This library provides helper functions to manage such witnesses.\n * The authentication witness, is some \"witness\" (data) that authenticates a `message_hash`.\n * The simplest example of an authentication witness, is a signature. The signature is the \"evidence\",\n * that the signer has seen the message, agrees with it, and has allowed it.\n * It does not need to be a signature. It could be any kind of \"proof\" that the message is allowed.\n * Another proof could be knowing some kind of secret, or having some kind of \"token\" that allows the message.\n *\n * The `message_hash` is a hash of the following structure:\n * hash(consumer, chain_id, version, inner_hash)\n * - consumer: the address of the contract that is \"consuming\" the message,\n * - chain_id: the chain id of the chain that the message is being consumed on,\n * - version: the version of the chain that the message is being consumed on,\n * - inner_hash: the hash of the \"inner\" message that is being consumed, this is the \"actual\" message or action.\n *\n * While the `inner_hash` could be anything, such as showing you signed a specific message, it will often be\n * a hash of the \"action\" to approve, along with who made the call. As part of this library, we provide a few\n * helper functions to deal with such messages.\n *\n * For example, we provide helper function that is used for checking that the message is an encoding of the current call.\n * This can be used to let some contract \"allow\" another contract to act on its behalf, as long as it can\n * show that it is acting on behalf of the contract.\n *\n * If we take a case of allowing a contract to transfer tokens on behalf of an account, the `inner_hash` can be\n * derived as:\n * inner_hash = hash(caller, \"transfer\", hash(to, amount))\n *\n * Where the `caller` would be the address of the contract that is trying to transfer the tokens, and `to` and `amount`\n * the arguments for the transfer.\n *\n * Note that we have both a `caller` and a `consumer`, the `consumer` will be the contract that is consuming the message,\n * in the case of the transfer, it would be the `Token` contract itself, while the caller, will be the actor that is\n * allowed to transfer the tokens.\n *\n *\n * The authentication mechanism works differently in public and private contexts. In private, we recall that everything\n * is executed on the user's device, so we can use `oracles` to \"ask\" the user (not contract) for information. In public\n * we cannot do this, since it is executed by the sequencer (someone else). Therefore we can instead use a \"registry\"\n * to store the messages that we have approved.\n *\n * A simple example would be a \"token\" that is being \"pulled\" from one account into another. We will first outline\n * how this would look in private, and then in public later.\n *\n * Say that a user `Alice` wants to deposit some tokens into a DeFi protocol (say a DEX).\n * `Alice` would make a `deposit` transaction, that she is executing using her account contract.\n * The account would call the `DeFi` contract to execute `deposit`, which would try to pull funds from the `Token`\n * contract. Since the `DeFi` contract is trying to pull funds from an account that is not its own, it needs to\n * convince the `Token` contract that it is allowed to do so.\n *\n * This is where the authentication witness comes in The `Token` contract computes a `message_hash` from the\n * `transfer` call, and then asks `Alice Account` contract to verify that the `DeFi` contract is allowed to\n * execute that call.\n *\n * `Alice Account` contract can then ask `Alice` if she wants to allow the `DeFi` contract to pull funds from her\n * account. If she does, she will sign the `message_hash` and return the signature to the `Alice Account` which\n * will validate it and return success to the `Token` contract which will then allow the `DeFi` contract to pull\n * funds from `Alice`.\n *\n * To ensure that the same \"approval\" cannot be used multiple times, we also compute a `nullifier` for the\n * authentication witness, and emit it from the `Token` contract (consumer).\n *\n * Note that we can do this flow as we are in private were we can do oracle calls out from contracts.\n *\n *\n * Person Contract Contract Contract\n * Alice Alice Account Token DeFi\n * | | | |\n * | Defi.deposit(Token, 1000) | |\n * |----------------->| | |\n * | | deposit(Token, 1000) |\n * | |---------------------------------------->|\n * | | | |\n * | | | transfer(Alice, Defi, 1000)\n * | | |<---------------------|\n * | | | |\n * | | Check if Defi may call transfer(Alice, Defi, 1000)\n * | |<-----------------| |\n * | | | |\n * | Please give me AuthWit for DeFi | |\n * | calling transfer(Alice, Defi, 1000) | |\n * |<-----------------| | |\n * | | | |\n * | | | |\n * | AuthWit for transfer(Alice, Defi, 1000) |\n * |----------------->| | |\n * | | AuthWit validity | |\n * | |----------------->| |\n * | | | |\n * | | throw if invalid AuthWit |\n * | | | |\n * | | emit AuthWit nullifier |\n * | | | |\n * | | transfer(Alice, Defi, 1000) |\n * | | | |\n * | | | |\n * | | | success |\n * | | |--------------------->|\n * | | | |\n * | | | |\n * | | | deposit(Token, 1000)\n * | | | |\n * | | | |\n *\n *\n * If we instead were in public, we cannot do the same flow. Instead we would use an authentication registry to store\n * the messages that we have approved.\n *\n * To approve a message, `Alice Account` can make a `set_authorized` call to the registry, to set a `message_hash`\n * as authorized. This is essentially a mapping from `message_hash` to `true` for `Alice Contract`. Every account\n * has its own map in the registry, so `Alice` cannot approve a message for `Bob`.\n *\n * The `Token` contract can then try to \"spend\" the approval by calling `consume` on the registry. If the message\n * was approved, the value is updated to `false`, and we return the success flag. For more information on the\n * registry, see `main.nr` in `auth_registry_contract`.\n *\n * Person Contract Contract Contract Contract\n * Alice Alice Account Registry Token DeFi\n * | | | | |\n * | Registry.set_authorized(..., true) | | |\n * |----------------->| | | |\n * | | set_authorized(..., true) | |\n * | |------------------->| | |\n * | | | | |\n * | | set authorized to true | |\n * | | | | |\n * | | | | |\n * | Defi.deposit(Token, 1000) | | |\n * |----------------->| | | |\n * | | deposit(Token, 1000) | |\n * | |-------------------------------------------------------------->|\n * | | | | |\n * | | | transfer(Alice, Defi, 1000) |\n * | | | |<---------------------|\n * | | | | |\n * | | | Check if Defi may call transfer(Alice, Defi, 1000)\n * | | |<------------------| |\n * | | | | |\n * | | throw if invalid AuthWit | |\n * | | | | |\n * | | | | |\n * | | set authorized to false | |\n * | | | | |\n * | | | | |\n * | | | AuthWit validity | |\n * | | |------------------>| |\n * | | | | |\n * | | | | transfer(Alice, Defi, 1000)\n * | | | |<-------------------->|\n * | | | | |\n * | | | | success |\n * | | | |--------------------->|\n * | | | | |\n * | | | | deposit(Token, 1000)\n * | | | | |\n *\n *\n * --- FAQ ---\n * Q: Why are we using a success flag of `poseidon2_hash_bytes(\"IS_VALID()\")` instead of just returning a boolean?\n * A: We want to make sure that we don't accidentally return `true` if there is a collision in the function selector.\n * By returning a hash of `IS_VALID()`, it becomes very unlikely that there is both a collision and we return\n * a success flag.\n *\n * Q: Why are we using static calls?\n * A: We are using static calls to ensure that the account contract cannot re-enter. If it was a normal call, it\n * could make a new call and do a re-entry attack. Using a static ensures that it cannot update any state.\n *\n * Q: Would it not be cheaper to use a nullifier instead of updating state in public?\n * A: At a quick glance, a public state update + nullifier is 96 bytes, but two state updates are 128, so it would be\n * cheaper to use a nullifier, if this is the way it would always be done. However, if both the approval and the\n * consumption is done in the same transaction, then we will be able to squash the updates (only final tx state diff is posted to DA), and now it is cheaper.\n *\n * Q: Why is the chain id and the version part of the message hash?\n * A: The chain id and the version is part of the message hash to ensure that the message is only valid on a specific\n * chain to avoid a case where the same message could be used across multiple chains.\n */\n\nglobal IS_VALID_SELECTOR: Field = 0x47dacd73; // 4 last bytes of poseidon2_hash_bytes(\"IS_VALID()\")\n\n/**\n * Assert that `on_behalf_of` has authorized the current call with a valid authentication witness\n *\n * Compute the `inner_hash` using the `msg_sender`, `selector` and `args_hash` and then make a call out to the\n * `on_behalf_of` contract to verify that the `inner_hash` is valid.\n *\n * @param on_behalf_of The address that has allegedly authorized the current call\n */\n// docs:start:assert_current_call_valid_authwit\npub fn assert_current_call_valid_authwit(context: &mut PrivateContext, on_behalf_of: AztecAddress) {\n let inner_hash = compute_inner_authwit_hash([\n context.msg_sender().to_field(),\n context.selector().to_field(),\n context.args_hash,\n ]);\n assert_inner_hash_valid_authwit(context, on_behalf_of, inner_hash);\n}\n// docs:end:assert_current_call_valid_authwit\n\n/**\n * Assert that a specific `inner_hash` is valid for the `on_behalf_of` address\n *\n * Used as an internal function for `assert_current_call_valid_authwit` and can be used as a standalone function when\n * the `inner_hash` is from a different source, e.g., say a block of text etc.\n *\n * @param on_behalf_of The address that has allegedly authorized the current call\n * @param inner_hash The hash of the message to authorize\n */\npub fn assert_inner_hash_valid_authwit(\n context: &mut PrivateContext,\n on_behalf_of: AztecAddress,\n inner_hash: Field,\n) {\n // We perform a static call here and not a standard one to ensure that the account contract cannot re-enter.\n let result: Field = context\n .static_call_private_function(\n on_behalf_of,\n comptime { FunctionSelector::from_signature(\"verify_private_authwit(Field)\") },\n [inner_hash],\n )\n .get_preimage();\n assert(result == IS_VALID_SELECTOR, \"Message not authorized by account\");\n // Compute the nullifier, similar computation to the outer hash, but without the chain_id and version.\n // Those should already be handled in the verification, so we just need something to nullify, that allows the same inner_hash for multiple actors.\n let nullifier = compute_authwit_nullifier(on_behalf_of, inner_hash);\n context.push_nullifier(nullifier);\n}\n\n/**\n * Assert that `on_behalf_of` has authorized the current call in the authentication registry\n *\n * Compute the `inner_hash` using the `msg_sender`, `selector` and `args_hash` and then make a call out to the\n * `on_behalf_of` contract to verify that the `inner_hash` is valid.\n *\n * Note that the authentication registry will take the `msg_sender` into account as the consumer, so this will only\n * work if the `msg_sender` is the same as the `consumer` when the `message_hash` was inserted into the registry.\n *\n * @param on_behalf_of The address that has allegedly authorized the current call\n */\n// docs:start:assert_current_call_valid_authwit_public\npub unconstrained fn assert_current_call_valid_authwit_public(\n context: &mut PublicContext,\n on_behalf_of: AztecAddress,\n) {\n let inner_hash = compute_inner_authwit_hash([\n (*context).msg_sender().to_field(),\n (*context).selector().to_field(),\n (*context).get_args_hash(),\n ]);\n assert_inner_hash_valid_authwit_public(context, on_behalf_of, inner_hash);\n}\n// docs:end:assert_current_call_valid_authwit_public\n\n/**\n * Assert that `on_behalf_of` has authorized a specific `inner_hash` in the authentication registry\n *\n * Compute the `inner_hash` using the `msg_sender`, `selector` and `args_hash` and then make a call out to the\n * `on_behalf_of` contract to verify that the `inner_hash` is valid.\n *\n * Note that the authentication registry will take the `msg_sender` into account as the consumer, so this will only\n * work if the `msg_sender` is the same as the `consumer` when the `message_hash` was inserted into the registry.\n *\n * @param on_behalf_of The address that has allegedly authorized the `inner_hash`\n */\npub unconstrained fn assert_inner_hash_valid_authwit_public(\n context: &mut PublicContext,\n on_behalf_of: AztecAddress,\n inner_hash: Field,\n) {\n let results: [Field] = context.call_public_function(\n CANONICAL_AUTH_REGISTRY_ADDRESS,\n comptime { FunctionSelector::from_signature(\"consume((Field),Field)\") },\n [on_behalf_of.to_field(), inner_hash].as_slice(),\n GasOpts::default(),\n );\n assert(results.len() == 1, \"Invalid response from registry\");\n assert(results[0] == IS_VALID_SELECTOR, \"Message not authorized by account\");\n}\n\n/**\n * Compute the `message_hash` from a function call to be used by an authentication witness\n *\n * Useful for when you need a non-account contract to approve during execution. For example if you need a contract\n * to make a call to nested contract, e.g., contract A wants to exit token T to L1 using bridge B, so it needs to allow\n * B to transfer T on its behalf.\n *\n * @param caller The address of the contract that is calling the function, in the example above, this would be B\n * @param consumer The address of the contract that is consuming the message, in the example above, this would be T\n * @param chain_id The chain id of the chain that the message is being consumed on\n * @param version The version of the chain that the message is being consumed on\n * @param selector The function selector of the function that is being called\n * @param args The arguments of the function that is being called\n */\n// docs:start:compute_authwit_message_hash_from_call\npub fn compute_authwit_message_hash_from_call<let N: u32>(\n caller: AztecAddress,\n consumer: AztecAddress,\n chain_id: Field,\n version: Field,\n selector: FunctionSelector,\n args: [Field; N],\n) -> Field {\n let args_hash = hash_args_array(args);\n let inner_hash =\n compute_inner_authwit_hash([caller.to_field(), selector.to_field(), args_hash]);\n compute_authwit_message_hash(consumer, chain_id, version, inner_hash)\n}\n// docs:end:compute_authwit_message_hash_from_call\n\n/**\n * Computes the `inner_hash` of the authentication witness\n *\n * This is used internally, but also useful in cases where you want to compute the `inner_hash` for a specific message\n * that is not necessarily a call, but just some \"bytes\" or text.\n *\n * @param args The arguments to hash\n */\npub fn compute_inner_authwit_hash<let N: u32>(args: [Field; N]) -> Field {\n poseidon2_hash_with_separator(args, GENERATOR_INDEX__AUTHWIT_INNER)\n}\n\n/**\n * Computes the `authwit_nullifier` for a specific `on_behalf_of` and `inner_hash`\n *\n * Using the `on_behalf_of` and the `inner_hash` to ensure that the nullifier is siloed for a specific `on_behalf_of`.\n *\n * @param on_behalf_of The address that has authorized the `inner_hash`\n * @param inner_hash The hash of the message to authorize\n */\npub fn compute_authwit_nullifier(on_behalf_of: AztecAddress, inner_hash: Field) -> Field {\n poseidon2_hash_with_separator(\n [on_behalf_of.to_field(), inner_hash],\n GENERATOR_INDEX__AUTHWIT_NULLIFIER,\n )\n}\n\n/**\n * Computes the `message_hash` for the authentication witness\n *\n * @param consumer The address of the contract that is consuming the message\n * @param chain_id The chain id of the chain that the message is being consumed on\n * @param version The version of the chain that the message is being consumed on\n * @param inner_hash The hash of the \"inner\" message that is being consumed\n */\npub fn compute_authwit_message_hash(\n consumer: AztecAddress,\n chain_id: Field,\n version: Field,\n inner_hash: Field,\n) -> Field {\n poseidon2_hash_with_separator(\n [consumer.to_field(), chain_id, version, inner_hash],\n GENERATOR_INDEX__AUTHWIT_OUTER,\n )\n}\n\n/**\n * Helper function to set the authorization status of a message hash\n *\n * Wraps a public call to the authentication registry to set the authorization status of a `message_hash`\n *\n * @param message_hash The hash of the message to authorize\n * @param authorize True if the message should be authorized, false if it should be revoked\n */\npub unconstrained fn set_authorized(\n context: &mut PublicContext,\n message_hash: Field,\n authorize: bool,\n) {\n let res = context.call_public_function(\n CANONICAL_AUTH_REGISTRY_ADDRESS,\n comptime { FunctionSelector::from_signature(\"set_authorized(Field,bool)\") },\n [message_hash, authorize as Field].as_slice(),\n GasOpts::default(),\n );\n assert(res.len() == 0);\n}\n\n/**\n * Helper function to reject all authwits\n *\n * Wraps a public call to the authentication registry to set the `reject_all` flag\n *\n * @param reject True if all authwits should be rejected, false otherwise\n */\npub unconstrained fn set_reject_all(context: &mut PublicContext, reject: bool) {\n let res = context.call_public_function(\n CANONICAL_AUTH_REGISTRY_ADDRESS,\n comptime { FunctionSelector::from_signature(\"set_reject_all(bool)\") },\n [context.this_address().to_field(), reject as Field].as_slice(),\n GasOpts::default(),\n );\n assert(res.len() == 0);\n}\n"
2698
+ "source": "use dep::aztec::{context::{gas::GasOpts, PrivateContext, PublicContext}, hash::hash_args_array};\nuse dep::aztec::protocol_types::{\n abis::function_selector::FunctionSelector,\n address::AztecAddress,\n constants::{\n CANONICAL_AUTH_REGISTRY_ADDRESS, GENERATOR_INDEX__AUTHWIT_INNER,\n GENERATOR_INDEX__AUTHWIT_NULLIFIER, GENERATOR_INDEX__AUTHWIT_OUTER,\n },\n hash::poseidon2_hash_with_separator,\n traits::ToField,\n};\n\n/**\n * Authenticaion witness helper library\n *\n * Authentication Witness is a scheme for authenticating actions on Aztec, so users can allow third-parties\n * (e.g. protocols or other users) to execute an action on their behalf.\n *\n * This library provides helper functions to manage such witnesses.\n * The authentication witness, is some \"witness\" (data) that authenticates a `message_hash`.\n * The simplest example of an authentication witness, is a signature. The signature is the \"evidence\",\n * that the signer has seen the message, agrees with it, and has allowed it.\n * It does not need to be a signature. It could be any kind of \"proof\" that the message is allowed.\n * Another proof could be knowing some kind of secret, or having some kind of \"token\" that allows the message.\n *\n * The `message_hash` is a hash of the following structure:\n * hash(consumer, chain_id, version, inner_hash)\n * - consumer: the address of the contract that is \"consuming\" the message,\n * - chain_id: the chain id of the chain that the message is being consumed on,\n * - version: the version of the chain that the message is being consumed on,\n * - inner_hash: the hash of the \"inner\" message that is being consumed, this is the \"actual\" message or action.\n *\n * While the `inner_hash` could be anything, such as showing you signed a specific message, it will often be\n * a hash of the \"action\" to approve, along with who made the call. As part of this library, we provide a few\n * helper functions to deal with such messages.\n *\n * For example, we provide helper function that is used for checking that the message is an encoding of the current call.\n * This can be used to let some contract \"allow\" another contract to act on its behalf, as long as it can\n * show that it is acting on behalf of the contract.\n *\n * If we take a case of allowing a contract to transfer tokens on behalf of an account, the `inner_hash` can be\n * derived as:\n * inner_hash = hash(caller, \"transfer\", hash(to, amount))\n *\n * Where the `caller` would be the address of the contract that is trying to transfer the tokens, and `to` and `amount`\n * the arguments for the transfer.\n *\n * Note that we have both a `caller` and a `consumer`, the `consumer` will be the contract that is consuming the message,\n * in the case of the transfer, it would be the `Token` contract itself, while the caller, will be the actor that is\n * allowed to transfer the tokens.\n *\n *\n * The authentication mechanism works differently in public and private contexts. In private, we recall that everything\n * is executed on the user's device, so we can use `oracles` to \"ask\" the user (not contract) for information. In public\n * we cannot do this, since it is executed by the sequencer (someone else). Therefore we can instead use a \"registry\"\n * to store the messages that we have approved.\n *\n * A simple example would be a \"token\" that is being \"pulled\" from one account into another. We will first outline\n * how this would look in private, and then in public later.\n *\n * Say that a user `Alice` wants to deposit some tokens into a DeFi protocol (say a DEX).\n * `Alice` would make a `deposit` transaction, that she is executing using her account contract.\n * The account would call the `DeFi` contract to execute `deposit`, which would try to pull funds from the `Token`\n * contract. Since the `DeFi` contract is trying to pull funds from an account that is not its own, it needs to\n * convince the `Token` contract that it is allowed to do so.\n *\n * This is where the authentication witness comes in The `Token` contract computes a `message_hash` from the\n * `transfer` call, and then asks `Alice Account` contract to verify that the `DeFi` contract is allowed to\n * execute that call.\n *\n * `Alice Account` contract can then ask `Alice` if she wants to allow the `DeFi` contract to pull funds from her\n * account. If she does, she will sign the `message_hash` and return the signature to the `Alice Account` which\n * will validate it and return success to the `Token` contract which will then allow the `DeFi` contract to pull\n * funds from `Alice`.\n *\n * To ensure that the same \"approval\" cannot be used multiple times, we also compute a `nullifier` for the\n * authentication witness, and emit it from the `Token` contract (consumer).\n *\n * Note that we can do this flow as we are in private were we can do oracle calls out from contracts.\n *\n *\n * Person Contract Contract Contract\n * Alice Alice Account Token DeFi\n * | | | |\n * | Defi.deposit(Token, 1000) | |\n * |----------------->| | |\n * | | deposit(Token, 1000) |\n * | |---------------------------------------->|\n * | | | |\n * | | | transfer(Alice, Defi, 1000)\n * | | |<---------------------|\n * | | | |\n * | | Check if Defi may call transfer(Alice, Defi, 1000)\n * | |<-----------------| |\n * | | | |\n * | Please give me AuthWit for DeFi | |\n * | calling transfer(Alice, Defi, 1000) | |\n * |<-----------------| | |\n * | | | |\n * | | | |\n * | AuthWit for transfer(Alice, Defi, 1000) |\n * |----------------->| | |\n * | | AuthWit validity | |\n * | |----------------->| |\n * | | | |\n * | | throw if invalid AuthWit |\n * | | | |\n * | | emit AuthWit nullifier |\n * | | | |\n * | | transfer(Alice, Defi, 1000) |\n * | | | |\n * | | | |\n * | | | success |\n * | | |--------------------->|\n * | | | |\n * | | | |\n * | | | deposit(Token, 1000)\n * | | | |\n * | | | |\n *\n *\n * If we instead were in public, we cannot do the same flow. Instead we would use an authentication registry to store\n * the messages that we have approved.\n *\n * To approve a message, `Alice Account` can make a `set_authorized` call to the registry, to set a `message_hash`\n * as authorized. This is essentially a mapping from `message_hash` to `true` for `Alice Contract`. Every account\n * has its own map in the registry, so `Alice` cannot approve a message for `Bob`.\n *\n * The `Token` contract can then try to \"spend\" the approval by calling `consume` on the registry. If the message\n * was approved, the value is updated to `false`, and we return the success flag. For more information on the\n * registry, see `main.nr` in `auth_registry_contract`.\n *\n * Person Contract Contract Contract Contract\n * Alice Alice Account Registry Token DeFi\n * | | | | |\n * | Registry.set_authorized(..., true) | | |\n * |----------------->| | | |\n * | | set_authorized(..., true) | |\n * | |------------------->| | |\n * | | | | |\n * | | set authorized to true | |\n * | | | | |\n * | | | | |\n * | Defi.deposit(Token, 1000) | | |\n * |----------------->| | | |\n * | | deposit(Token, 1000) | |\n * | |-------------------------------------------------------------->|\n * | | | | |\n * | | | transfer(Alice, Defi, 1000) |\n * | | | |<---------------------|\n * | | | | |\n * | | | Check if Defi may call transfer(Alice, Defi, 1000)\n * | | |<------------------| |\n * | | | | |\n * | | throw if invalid AuthWit | |\n * | | | | |\n * | | | | |\n * | | set authorized to false | |\n * | | | | |\n * | | | | |\n * | | | AuthWit validity | |\n * | | |------------------>| |\n * | | | | |\n * | | | | transfer(Alice, Defi, 1000)\n * | | | |<-------------------->|\n * | | | | |\n * | | | | success |\n * | | | |--------------------->|\n * | | | | |\n * | | | | deposit(Token, 1000)\n * | | | | |\n *\n *\n * --- FAQ ---\n * Q: Why are we using a success flag of `poseidon2_hash_bytes(\"IS_VALID()\")` instead of just returning a boolean?\n * A: We want to make sure that we don't accidentally return `true` if there is a collision in the function selector.\n * By returning a hash of `IS_VALID()`, it becomes very unlikely that there is both a collision and we return\n * a success flag.\n *\n * Q: Why are we using static calls?\n * A: We are using static calls to ensure that the account contract cannot re-enter. If it was a normal call, it\n * could make a new call and do a re-entry attack. Using a static ensures that it cannot update any state.\n *\n * Q: Would it not be cheaper to use a nullifier instead of updating state in public?\n * A: At a quick glance, a public state update + nullifier is 96 bytes, but two state updates are 128, so it would be\n * cheaper to use a nullifier, if this is the way it would always be done. However, if both the approval and the\n * consumption is done in the same transaction, then we will be able to squash the updates (only final tx state diff is posted to DA), and now it is cheaper.\n *\n * Q: Why is the chain id and the version part of the message hash?\n * A: The chain id and the version is part of the message hash to ensure that the message is only valid on a specific\n * chain to avoid a case where the same message could be used across multiple chains.\n */\n\nglobal IS_VALID_SELECTOR: Field = 0x47dacd73; // 4 last bytes of poseidon2_hash_bytes(\"IS_VALID()\")\n\n/**\n * Assert that `on_behalf_of` has authorized the current call with a valid authentication witness\n *\n * Compute the `inner_hash` using the `msg_sender`, `selector` and `args_hash` and then make a call out to the\n * `on_behalf_of` contract to verify that the `inner_hash` is valid.\n *\n * @param on_behalf_of The address that has allegedly authorized the current call\n */\n// docs:start:assert_current_call_valid_authwit\npub fn assert_current_call_valid_authwit(context: &mut PrivateContext, on_behalf_of: AztecAddress) {\n let inner_hash = compute_inner_authwit_hash([\n context.msg_sender().to_field(),\n context.selector().to_field(),\n context.args_hash,\n ]);\n assert_inner_hash_valid_authwit(context, on_behalf_of, inner_hash);\n}\n// docs:end:assert_current_call_valid_authwit\n\n/**\n * Assert that a specific `inner_hash` is valid for the `on_behalf_of` address\n *\n * Used as an internal function for `assert_current_call_valid_authwit` and can be used as a standalone function when\n * the `inner_hash` is from a different source, e.g., say a block of text etc.\n *\n * @param on_behalf_of The address that has allegedly authorized the current call\n * @param inner_hash The hash of the message to authorize\n */\npub fn assert_inner_hash_valid_authwit(\n context: &mut PrivateContext,\n on_behalf_of: AztecAddress,\n inner_hash: Field,\n) {\n // We perform a static call here and not a standard one to ensure that the account contract cannot re-enter.\n let result: Field = context\n .static_call_private_function(\n on_behalf_of,\n comptime { FunctionSelector::from_signature(\"verify_private_authwit(Field)\") },\n [inner_hash],\n )\n .get_preimage();\n assert(result == IS_VALID_SELECTOR, \"Message not authorized by account\");\n // Compute the nullifier, similar computation to the outer hash, but without the chain_id and version.\n // Those should already be handled in the verification, so we just need something to nullify, that allows the same inner_hash for multiple actors.\n let nullifier = compute_authwit_nullifier(on_behalf_of, inner_hash);\n context.push_nullifier(nullifier);\n}\n\n/**\n * Assert that `on_behalf_of` has authorized the current call in the authentication registry\n *\n * Compute the `inner_hash` using the `msg_sender`, `selector` and `args_hash` and then make a call out to the\n * `on_behalf_of` contract to verify that the `inner_hash` is valid.\n *\n * Note that the authentication registry will take the `msg_sender` into account as the consumer, so this will only\n * work if the `msg_sender` is the same as the `consumer` when the `message_hash` was inserted into the registry.\n *\n * @param on_behalf_of The address that has allegedly authorized the current call\n */\n// docs:start:assert_current_call_valid_authwit_public\npub unconstrained fn assert_current_call_valid_authwit_public(\n context: &mut PublicContext,\n on_behalf_of: AztecAddress,\n) {\n let inner_hash = compute_inner_authwit_hash([\n (*context).msg_sender().to_field(),\n (*context).selector().to_field(),\n (*context).get_args_hash(),\n ]);\n assert_inner_hash_valid_authwit_public(context, on_behalf_of, inner_hash);\n}\n// docs:end:assert_current_call_valid_authwit_public\n\n/**\n * Assert that `on_behalf_of` has authorized a specific `inner_hash` in the authentication registry\n *\n * Compute the `inner_hash` using the `msg_sender`, `selector` and `args_hash` and then make a call out to the\n * `on_behalf_of` contract to verify that the `inner_hash` is valid.\n *\n * Note that the authentication registry will take the `msg_sender` into account as the consumer, so this will only\n * work if the `msg_sender` is the same as the `consumer` when the `message_hash` was inserted into the registry.\n *\n * @param on_behalf_of The address that has allegedly authorized the `inner_hash`\n */\npub unconstrained fn assert_inner_hash_valid_authwit_public(\n context: &mut PublicContext,\n on_behalf_of: AztecAddress,\n inner_hash: Field,\n) {\n let results: [Field] = context.call_public_function(\n CANONICAL_AUTH_REGISTRY_ADDRESS,\n comptime { FunctionSelector::from_signature(\"consume((Field),Field)\") },\n [on_behalf_of.to_field(), inner_hash].as_slice(),\n GasOpts::default(),\n );\n assert(results.len() == 1, \"Invalid response from registry\");\n assert(results[0] == IS_VALID_SELECTOR, \"Message not authorized by account\");\n}\n\n/**\n * Compute the `message_hash` from a function call to be used by an authentication witness\n *\n * Useful for when you need a non-account contract to approve during execution. For example if you need a contract\n * to make a call to nested contract, e.g., contract A wants to exit token T to L1 using bridge B, so it needs to allow\n * B to transfer T on its behalf.\n *\n * @param caller The address of the contract that is calling the function, in the example above, this would be B\n * @param consumer The address of the contract that is consuming the message, in the example above, this would be T\n * @param chain_id The chain id of the chain that the message is being consumed on\n * @param version The version of the chain that the message is being consumed on\n * @param selector The function selector of the function that is being called\n * @param args The arguments of the function that is being called\n */\n// docs:start:compute_authwit_message_hash_from_call\npub fn compute_authwit_message_hash_from_call<let N: u32>(\n caller: AztecAddress,\n consumer: AztecAddress,\n chain_id: Field,\n version: Field,\n selector: FunctionSelector,\n args: [Field; N],\n) -> Field {\n let args_hash = hash_args_array(args);\n let inner_hash =\n compute_inner_authwit_hash([caller.to_field(), selector.to_field(), args_hash]);\n compute_authwit_message_hash(consumer, chain_id, version, inner_hash)\n}\n// docs:end:compute_authwit_message_hash_from_call\n\n/**\n * Computes the `inner_hash` of the authentication witness\n *\n * This is used internally, but also useful in cases where you want to compute the `inner_hash` for a specific message\n * that is not necessarily a call, but just some \"bytes\" or text.\n *\n * @param args The arguments to hash\n */\npub fn compute_inner_authwit_hash<let N: u32>(args: [Field; N]) -> Field {\n poseidon2_hash_with_separator(args, GENERATOR_INDEX__AUTHWIT_INNER)\n}\n\n/**\n * Computes the `authwit_nullifier` for a specific `on_behalf_of` and `inner_hash`\n *\n * Using the `on_behalf_of` and the `inner_hash` to ensure that the nullifier is siloed for a specific `on_behalf_of`.\n *\n * @param on_behalf_of The address that has authorized the `inner_hash`\n * @param inner_hash The hash of the message to authorize\n */\npub fn compute_authwit_nullifier(on_behalf_of: AztecAddress, inner_hash: Field) -> Field {\n poseidon2_hash_with_separator(\n [on_behalf_of.to_field(), inner_hash],\n GENERATOR_INDEX__AUTHWIT_NULLIFIER,\n )\n}\n\n/**\n * Computes the `message_hash` for the authentication witness\n *\n * @param consumer The address of the contract that is consuming the message\n * @param chain_id The chain id of the chain that the message is being consumed on\n * @param version The version of the chain that the message is being consumed on\n * @param inner_hash The hash of the \"inner\" message that is being consumed\n */\npub fn compute_authwit_message_hash(\n consumer: AztecAddress,\n chain_id: Field,\n version: Field,\n inner_hash: Field,\n) -> Field {\n poseidon2_hash_with_separator(\n [consumer.to_field(), chain_id, version, inner_hash],\n GENERATOR_INDEX__AUTHWIT_OUTER,\n )\n}\n\n/**\n * Helper function to set the authorization status of a message hash\n *\n * Wraps a public call to the authentication registry to set the authorization status of a `message_hash`\n *\n * @param message_hash The hash of the message to authorize\n * @param authorize True if the message should be authorized, false if it should be revoked\n */\npub unconstrained fn set_authorized(\n context: &mut PublicContext,\n message_hash: Field,\n authorize: bool,\n) {\n let res = context.call_public_function(\n CANONICAL_AUTH_REGISTRY_ADDRESS,\n comptime { FunctionSelector::from_signature(\"set_authorized(Field,bool)\") },\n [message_hash, authorize as Field].as_slice(),\n GasOpts::default(),\n );\n assert(res.len() == 0);\n}\n\n/**\n * Helper function to reject all authwits\n *\n * Wraps a public call to the authentication registry to set the `reject_all` flag\n *\n * @param reject True if all authwits should be rejected, false otherwise\n */\npub unconstrained fn set_reject_all(context: &mut PublicContext, reject: bool) {\n let res = context.call_public_function(\n CANONICAL_AUTH_REGISTRY_ADDRESS,\n comptime { FunctionSelector::from_signature(\"set_reject_all(bool)\") },\n [context.this_address().to_field(), reject as Field].as_slice(),\n GasOpts::default(),\n );\n assert(res.len() == 0);\n}\n"
2699
2699
  },
2700
2700
  "72": {
2701
2701
  "path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/context/call_interfaces.nr",
@@ -2703,11 +2703,11 @@
2703
2703
  },
2704
2704
  "79": {
2705
2705
  "path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/context/private_context.nr",
2706
- "source": "use dep::protocol_types::debug_log::debug_log_format;\n\nuse crate::{\n context::{inputs::PrivateContextInputs, returns_hash::ReturnsHash},\n hash::{ArgsHasher, hash_args_array},\n keys::constants::{NULLIFIER_INDEX, NUM_KEY_TYPES, OUTGOING_INDEX, sk_generators},\n messaging::process_l1_to_l2_message,\n oracle::{\n block_header::get_block_header_at,\n call_private_function::call_private_function_internal,\n enqueue_public_function_call::{\n enqueue_public_function_call_internal, notify_set_min_revertible_side_effect_counter,\n set_public_teardown_function_call_internal,\n },\n execution_cache,\n key_validation_request::get_key_validation_request,\n notes::{notify_created_nullifier, notify_nullified_note},\n },\n};\nuse dep::protocol_types::{\n abis::{\n call_context::CallContext,\n function_selector::FunctionSelector,\n gas_settings::GasSettings,\n log::Log,\n log_hash::LogHash,\n max_block_number::MaxBlockNumber,\n note_hash::NoteHash,\n nullifier::Nullifier,\n private_call_request::PrivateCallRequest,\n private_circuit_public_inputs::PrivateCircuitPublicInputs,\n private_log::PrivateLogData,\n public_call_request::PublicCallRequest,\n read_request::ReadRequest,\n side_effect::Counted,\n validation_requests::{KeyValidationRequest, KeyValidationRequestAndGenerator},\n },\n address::{AztecAddress, EthAddress},\n block_header::BlockHeader,\n constants::{\n MAX_CONTRACT_CLASS_LOGS_PER_CALL, MAX_ENQUEUED_CALLS_PER_CALL,\n MAX_KEY_VALIDATION_REQUESTS_PER_CALL, MAX_L2_TO_L1_MSGS_PER_CALL,\n MAX_NOTE_HASH_READ_REQUESTS_PER_CALL, MAX_NOTE_HASHES_PER_CALL,\n MAX_NULLIFIER_READ_REQUESTS_PER_CALL, MAX_NULLIFIERS_PER_CALL,\n MAX_PRIVATE_CALL_STACK_LENGTH_PER_CALL, MAX_PRIVATE_LOGS_PER_CALL,\n PRIVATE_LOG_SIZE_IN_FIELDS, PUBLIC_DISPATCH_SELECTOR,\n },\n messaging::l2_to_l1_message::L2ToL1Message,\n traits::Empty,\n};\n\n// When finished, one can call .finish() to convert back to the abi\npub struct PrivateContext {\n // docs:start:private-context\n pub inputs: PrivateContextInputs,\n pub side_effect_counter: u32,\n\n pub min_revertible_side_effect_counter: u32,\n pub is_fee_payer: bool,\n\n pub args_hash: Field,\n pub return_hash: Field,\n\n pub max_block_number: MaxBlockNumber,\n\n pub note_hash_read_requests: BoundedVec<ReadRequest, MAX_NOTE_HASH_READ_REQUESTS_PER_CALL>,\n pub nullifier_read_requests: BoundedVec<ReadRequest, MAX_NULLIFIER_READ_REQUESTS_PER_CALL>,\n key_validation_requests_and_generators: BoundedVec<KeyValidationRequestAndGenerator, MAX_KEY_VALIDATION_REQUESTS_PER_CALL>,\n\n pub note_hashes: BoundedVec<NoteHash, MAX_NOTE_HASHES_PER_CALL>,\n pub nullifiers: BoundedVec<Nullifier, MAX_NULLIFIERS_PER_CALL>,\n\n pub private_call_requests: BoundedVec<PrivateCallRequest, MAX_PRIVATE_CALL_STACK_LENGTH_PER_CALL>,\n pub public_call_requests: BoundedVec<Counted<PublicCallRequest>, MAX_ENQUEUED_CALLS_PER_CALL>,\n pub public_teardown_call_request: PublicCallRequest,\n pub l2_to_l1_msgs: BoundedVec<L2ToL1Message, MAX_L2_TO_L1_MSGS_PER_CALL>,\n // docs:end:private-context\n\n // Header of a block whose state is used during private execution (not the block the transaction is included in).\n pub historical_header: BlockHeader,\n\n pub private_logs: BoundedVec<PrivateLogData, MAX_PRIVATE_LOGS_PER_CALL>,\n pub contract_class_logs_hashes: BoundedVec<LogHash, MAX_CONTRACT_CLASS_LOGS_PER_CALL>,\n\n // Contains the last key validation request for each key type. This is used to cache the last request and avoid\n // fetching the same request multiple times.\n // The index of the array corresponds to the key type (0 nullifier, 1 incoming, 2 outgoing, 3 tagging).\n pub last_key_validation_requests: [Option<KeyValidationRequest>; NUM_KEY_TYPES],\n}\n\nimpl PrivateContext {\n pub fn new(inputs: PrivateContextInputs, args_hash: Field) -> PrivateContext {\n PrivateContext {\n inputs,\n side_effect_counter: inputs.start_side_effect_counter + 1,\n min_revertible_side_effect_counter: 0,\n is_fee_payer: false,\n args_hash,\n return_hash: 0,\n max_block_number: MaxBlockNumber::empty(),\n note_hash_read_requests: BoundedVec::new(),\n nullifier_read_requests: BoundedVec::new(),\n key_validation_requests_and_generators: BoundedVec::new(),\n note_hashes: BoundedVec::new(),\n nullifiers: BoundedVec::new(),\n historical_header: inputs.historical_header,\n private_call_requests: BoundedVec::new(),\n public_call_requests: BoundedVec::new(),\n public_teardown_call_request: PublicCallRequest::empty(),\n l2_to_l1_msgs: BoundedVec::new(),\n private_logs: BoundedVec::new(),\n contract_class_logs_hashes: BoundedVec::new(),\n last_key_validation_requests: [Option::none(); NUM_KEY_TYPES],\n }\n }\n\n pub fn msg_sender(self) -> AztecAddress {\n self.inputs.call_context.msg_sender\n }\n\n pub fn this_address(self) -> AztecAddress {\n self.inputs.call_context.contract_address\n }\n\n pub fn chain_id(self) -> Field {\n self.inputs.tx_context.chain_id\n }\n\n pub fn version(self) -> Field {\n self.inputs.tx_context.version\n }\n\n pub fn gas_settings(self) -> GasSettings {\n self.inputs.tx_context.gas_settings\n }\n\n pub fn selector(self) -> FunctionSelector {\n self.inputs.call_context.function_selector\n }\n\n pub fn get_args_hash(self) -> Field {\n self.args_hash\n }\n\n pub fn push_note_hash(&mut self, note_hash: Field) {\n self.note_hashes.push(NoteHash { value: note_hash, counter: self.next_counter() });\n\n // WARNING(https://github.com/AztecProtocol/aztec-packages/issues/10558): if you delete this debug_log_format line, some tests fail.\n debug_log_format(\n \"Context.note_hashes, after pushing new note hash: {0}\",\n self.note_hashes.storage().map(|nh: NoteHash| nh.value),\n );\n }\n\n pub fn push_nullifier(&mut self, nullifier: Field) {\n notify_created_nullifier(nullifier);\n self.nullifiers.push(\n Nullifier { value: nullifier, note_hash: 0, counter: self.next_counter() },\n );\n }\n\n pub fn push_nullifier_for_note_hash(&mut self, nullifier: Field, nullified_note_hash: Field) {\n let nullifier_counter = self.next_counter();\n notify_nullified_note(nullifier, nullified_note_hash, nullifier_counter);\n self.nullifiers.push(\n Nullifier {\n value: nullifier,\n note_hash: nullified_note_hash,\n counter: nullifier_counter,\n },\n );\n }\n\n // Returns the header of a block whose state is used during private execution (not the block the transaction is\n // included in).\n pub fn get_block_header(self) -> BlockHeader {\n self.historical_header\n }\n\n // Returns the header of an arbitrary block whose block number is less than or equal to the block number\n // of historical header.\n pub fn get_block_header_at(self, block_number: u32) -> BlockHeader {\n get_block_header_at(block_number, self)\n }\n\n pub fn set_return_hash(&mut self, returns_hasher: ArgsHasher) {\n execution_cache::store(returns_hasher.fields);\n self.return_hash = returns_hasher.hash();\n }\n\n pub fn finish(self) -> PrivateCircuitPublicInputs {\n PrivateCircuitPublicInputs {\n call_context: self.inputs.call_context,\n args_hash: self.args_hash,\n returns_hash: self.return_hash,\n min_revertible_side_effect_counter: self.min_revertible_side_effect_counter,\n is_fee_payer: self.is_fee_payer,\n max_block_number: self.max_block_number,\n note_hash_read_requests: self.note_hash_read_requests.storage(),\n nullifier_read_requests: self.nullifier_read_requests.storage(),\n key_validation_requests_and_generators: self\n .key_validation_requests_and_generators\n .storage(),\n note_hashes: self.note_hashes.storage(),\n nullifiers: self.nullifiers.storage(),\n private_call_requests: self.private_call_requests.storage(),\n public_call_requests: self.public_call_requests.storage(),\n public_teardown_call_request: self.public_teardown_call_request,\n l2_to_l1_msgs: self.l2_to_l1_msgs.storage(),\n start_side_effect_counter: self.inputs.start_side_effect_counter,\n end_side_effect_counter: self.side_effect_counter,\n private_logs: self.private_logs.storage(),\n contract_class_logs_hashes: self.contract_class_logs_hashes.storage(),\n historical_header: self.historical_header,\n tx_context: self.inputs.tx_context,\n }\n }\n\n pub fn set_as_fee_payer(&mut self) {\n dep::protocol_types::debug_log::debug_log_format(\n \"Setting {0} as fee payer\",\n [self.this_address().to_field()],\n );\n self.is_fee_payer = true;\n }\n\n pub fn end_setup(&mut self) {\n // dep::protocol_types::debug_log::debug_log_format(\n // \"Ending setup at counter {0}\",\n // [self.side_effect_counter as Field]\n // );\n self.min_revertible_side_effect_counter = self.side_effect_counter;\n notify_set_min_revertible_side_effect_counter(self.min_revertible_side_effect_counter);\n }\n\n // docs:start:max-block-number\n pub fn set_tx_max_block_number(&mut self, max_block_number: u32) {\n // docs:end:max-block-number\n self.max_block_number =\n MaxBlockNumber::min_with_u32(self.max_block_number, max_block_number);\n }\n\n pub fn push_note_hash_read_request(&mut self, note_hash: Field) {\n let side_effect = ReadRequest { value: note_hash, counter: self.next_counter() };\n self.note_hash_read_requests.push(side_effect);\n }\n\n pub fn push_nullifier_read_request(&mut self, nullifier: Field) {\n let request = ReadRequest { value: nullifier, counter: self.next_counter() };\n self.nullifier_read_requests.push(request);\n }\n\n pub fn request_nsk_app(&mut self, npk_m_hash: Field) -> Field {\n self.request_sk_app(npk_m_hash, NULLIFIER_INDEX)\n }\n\n pub fn request_ovsk_app(&mut self, ovpk_m_hash: Field) -> Field {\n self.request_sk_app(ovpk_m_hash, OUTGOING_INDEX)\n }\n\n fn request_sk_app(&mut self, pk_m_hash: Field, key_index: Field) -> Field {\n let cached_request =\n self.last_key_validation_requests[key_index].unwrap_or(KeyValidationRequest::empty());\n\n if cached_request.pk_m.hash() == pk_m_hash {\n // We get a match so the cached request is the latest one\n cached_request.sk_app\n } else {\n // We didn't get a match meaning the cached result is stale\n // Typically we'd validate keys by showing that they are the preimage of `pk_m_hash`, but that'd require\n // the oracle returning the master secret keys, which could cause malicious contracts to leak it or learn\n // about secrets from other contracts. We therefore silo secret keys, and rely on the private kernel to\n // validate that we siloed secret key corresponds to correct siloing of the master secret key that hashes\n // to `pk_m_hash`.\n\n // Safety: Kernels verify that the key validation request is valid and below we verify that a request\n // for the correct public key has been received.\n let request = unsafe { get_key_validation_request(pk_m_hash, key_index) };\n assert_eq(request.pk_m.hash(), pk_m_hash, \"Obtained invalid key validation request\");\n\n self.key_validation_requests_and_generators.push(\n KeyValidationRequestAndGenerator {\n request,\n sk_app_generator: sk_generators[key_index],\n },\n );\n self.last_key_validation_requests[key_index] = Option::some(request);\n request.sk_app\n }\n }\n\n // docs:start:context_message_portal\n pub fn message_portal(&mut self, recipient: EthAddress, content: Field) {\n // docs:end:context_message_portal\n let message = L2ToL1Message { recipient, content, counter: self.next_counter() };\n self.l2_to_l1_msgs.push(message);\n }\n\n // docs:start:context_consume_l1_to_l2_message\n // docs:start:consume_l1_to_l2_message\n pub fn consume_l1_to_l2_message(\n &mut self,\n content: Field,\n secret: Field,\n sender: EthAddress,\n leaf_index: Field,\n ) {\n // docs:end:context_consume_l1_to_l2_message\n let nullifier = process_l1_to_l2_message(\n self.historical_header.state.l1_to_l2_message_tree.root,\n self.this_address(),\n sender,\n self.chain_id(),\n self.version(),\n content,\n secret,\n leaf_index,\n );\n\n // Push nullifier (and the \"commitment\" corresponding to this can be \"empty\")\n self.push_nullifier(nullifier)\n }\n // docs:end:consume_l1_to_l2_message\n\n pub fn emit_private_log(&mut self, log: [Field; PRIVATE_LOG_SIZE_IN_FIELDS]) {\n let counter = self.next_counter();\n let private_log = PrivateLogData { log: Log::new(log), note_hash_counter: 0, counter };\n self.private_logs.push(private_log);\n }\n\n pub fn emit_raw_note_log(\n &mut self,\n log: [Field; PRIVATE_LOG_SIZE_IN_FIELDS],\n note_hash_counter: u32,\n ) {\n let counter = self.next_counter();\n let private_log = PrivateLogData { log: Log::new(log), note_hash_counter, counter };\n self.private_logs.push(private_log);\n }\n\n pub fn call_private_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) -> ReturnsHash {\n let args_hash = hash_args_array(args);\n execution_cache::store(args);\n self.call_private_function_with_args_hash(\n contract_address,\n function_selector,\n args_hash,\n false,\n )\n }\n\n pub fn static_call_private_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) -> ReturnsHash {\n let args_hash = hash_args_array(args);\n execution_cache::store(args);\n self.call_private_function_with_args_hash(\n contract_address,\n function_selector,\n args_hash,\n true,\n )\n }\n\n pub fn call_private_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) -> ReturnsHash {\n self.call_private_function_with_args_hash(contract_address, function_selector, 0, false)\n }\n\n pub fn static_call_private_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) -> ReturnsHash {\n self.call_private_function_with_args_hash(contract_address, function_selector, 0, true)\n }\n\n pub fn call_private_function_with_args_hash(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n is_static_call: bool,\n ) -> ReturnsHash {\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n let start_side_effect_counter = self.side_effect_counter;\n\n // Safety: The oracle simulates the private call and returns the value of the side effects counter after\n // execution of the call (which means that end_side_effect_counter - start_side_effect_counter is\n // the number of side effects that took place), along with the hash of the return values. We validate these\n // by requesting a private kernel iteration in which the return values are constrained to hash\n // to `returns_hash` and the side effects counter to increment from start to end.\n let (end_side_effect_counter, returns_hash) = unsafe {\n call_private_function_internal(\n contract_address,\n function_selector,\n args_hash,\n start_side_effect_counter,\n is_static_call,\n )\n };\n\n self.private_call_requests.push(\n PrivateCallRequest {\n call_context: CallContext {\n msg_sender: self.this_address(),\n contract_address,\n function_selector,\n is_static_call,\n },\n args_hash,\n returns_hash,\n start_side_effect_counter,\n end_side_effect_counter,\n },\n );\n\n // TODO (fees) figure out why this crashes the prover and enable it\n // we need this in order to pay fees inside child call contexts\n // assert(\n // (item.public_inputs.min_revertible_side_effect_counter == 0 as u32)\n // | (item.public_inputs.min_revertible_side_effect_counter\n // > self.min_revertible_side_effect_counter)\n // );\n // if item.public_inputs.min_revertible_side_effect_counter\n // > self.min_revertible_side_effect_counter {\n // self.min_revertible_side_effect_counter = item.public_inputs.min_revertible_side_effect_counter;\n // }\n self.side_effect_counter = end_side_effect_counter + 1;\n ReturnsHash::new(returns_hash)\n }\n\n pub fn call_public_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) {\n let args_hash = hash_args_array(args);\n execution_cache::store(args);\n self.call_public_function_with_args_hash(\n contract_address,\n function_selector,\n args_hash,\n false,\n )\n }\n\n pub fn static_call_public_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) {\n let args_hash = hash_args_array(args);\n execution_cache::store(args);\n self.call_public_function_with_args_hash(\n contract_address,\n function_selector,\n args_hash,\n true,\n )\n }\n\n pub fn call_public_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) {\n self.call_public_function_with_args_hash(contract_address, function_selector, 0, false)\n }\n\n pub fn static_call_public_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) {\n self.call_public_function_with_args_hash(contract_address, function_selector, 0, true)\n }\n\n pub fn call_public_function_with_args_hash(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n is_static_call: bool,\n ) {\n let counter = self.next_counter();\n\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n // Safety: TODO(https://github.com/AztecProtocol/aztec-packages/issues/8985): Fix this.\n // WARNING: This is insecure and should be temporary!\n // The oracle hashes the arguments and returns a new args_hash.\n // new_args = [selector, ...old_args], so as to make it suitable to call the public dispatch function.\n // We don't validate or compute it in the circuit because a) it's harder to do with slices, and\n // b) this is only temporary.\n let args_hash = unsafe {\n enqueue_public_function_call_internal(\n contract_address,\n function_selector,\n args_hash,\n counter,\n is_static_call,\n )\n };\n\n // Public calls are rerouted through the dispatch function.\n let function_selector = comptime { FunctionSelector::from_field(PUBLIC_DISPATCH_SELECTOR) };\n\n let call_request = PublicCallRequest {\n msg_sender: self.this_address(),\n contract_address,\n function_selector,\n is_static_call,\n args_hash,\n };\n\n self.public_call_requests.push(Counted::new(call_request, counter));\n }\n\n pub fn set_public_teardown_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) {\n let args_hash = hash_args_array(args);\n execution_cache::store(args);\n self.set_public_teardown_function_with_args_hash(\n contract_address,\n function_selector,\n args_hash,\n false,\n )\n }\n\n pub fn set_public_teardown_function_with_args_hash(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n is_static_call: bool,\n ) {\n let counter = self.next_counter();\n\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n // Safety: TODO(https://github.com/AztecProtocol/aztec-packages/issues/8985): Fix this.\n // WARNING: This is insecure and should be temporary!\n // The oracle hashes the arguments and returns a new args_hash.\n // new_args = [selector, ...old_args], so as to make it suitable to call the public dispatch function.\n // We don't validate or compute it in the circuit because a) it's harder to do with slices, and\n // b) this is only temporary.\n let args_hash = unsafe {\n set_public_teardown_function_call_internal(\n contract_address,\n function_selector,\n args_hash,\n counter,\n is_static_call,\n )\n };\n\n let function_selector = comptime { FunctionSelector::from_field(PUBLIC_DISPATCH_SELECTOR) };\n\n self.public_teardown_call_request = PublicCallRequest {\n msg_sender: self.this_address(),\n contract_address,\n function_selector,\n is_static_call,\n args_hash,\n };\n }\n\n fn next_counter(&mut self) -> u32 {\n let counter = self.side_effect_counter;\n self.side_effect_counter += 1;\n counter\n }\n}\n\nimpl Empty for PrivateContext {\n fn empty() -> Self {\n PrivateContext {\n inputs: PrivateContextInputs::empty(),\n side_effect_counter: 0 as u32,\n min_revertible_side_effect_counter: 0 as u32,\n is_fee_payer: false,\n args_hash: 0,\n return_hash: 0,\n max_block_number: MaxBlockNumber::empty(),\n note_hash_read_requests: BoundedVec::new(),\n nullifier_read_requests: BoundedVec::new(),\n key_validation_requests_and_generators: BoundedVec::new(),\n note_hashes: BoundedVec::new(),\n nullifiers: BoundedVec::new(),\n private_call_requests: BoundedVec::new(),\n public_call_requests: BoundedVec::new(),\n public_teardown_call_request: PublicCallRequest::empty(),\n l2_to_l1_msgs: BoundedVec::new(),\n historical_header: BlockHeader::empty(),\n private_logs: BoundedVec::new(),\n contract_class_logs_hashes: BoundedVec::new(),\n last_key_validation_requests: [Option::none(); NUM_KEY_TYPES],\n }\n }\n}\n"
2706
+ "source": "use dep::protocol_types::debug_log::debug_log_format;\n\nuse crate::{\n context::{inputs::PrivateContextInputs, returns_hash::ReturnsHash},\n hash::{ArgsHasher, hash_args_array},\n keys::constants::{NULLIFIER_INDEX, NUM_KEY_TYPES, OUTGOING_INDEX, sk_generators},\n messaging::process_l1_to_l2_message,\n oracle::{\n block_header::get_block_header_at,\n call_private_function::call_private_function_internal,\n enqueue_public_function_call::{\n enqueue_public_function_call_internal, notify_set_min_revertible_side_effect_counter,\n set_public_teardown_function_call_internal,\n },\n execution_cache,\n key_validation_request::get_key_validation_request,\n notes::{notify_created_nullifier, notify_nullified_note},\n },\n};\nuse dep::protocol_types::{\n abis::{\n call_context::CallContext,\n function_selector::FunctionSelector,\n gas_settings::GasSettings,\n log::Log,\n log_hash::LogHash,\n max_block_number::MaxBlockNumber,\n note_hash::NoteHash,\n nullifier::Nullifier,\n private_call_request::PrivateCallRequest,\n private_circuit_public_inputs::PrivateCircuitPublicInputs,\n private_log::PrivateLogData,\n public_call_request::PublicCallRequest,\n read_request::ReadRequest,\n side_effect::Counted,\n validation_requests::{KeyValidationRequest, KeyValidationRequestAndGenerator},\n },\n address::{AztecAddress, EthAddress},\n block_header::BlockHeader,\n constants::{\n MAX_CONTRACT_CLASS_LOGS_PER_CALL, MAX_ENQUEUED_CALLS_PER_CALL,\n MAX_KEY_VALIDATION_REQUESTS_PER_CALL, MAX_L2_TO_L1_MSGS_PER_CALL,\n MAX_NOTE_HASH_READ_REQUESTS_PER_CALL, MAX_NOTE_HASHES_PER_CALL,\n MAX_NULLIFIER_READ_REQUESTS_PER_CALL, MAX_NULLIFIERS_PER_CALL,\n MAX_PRIVATE_CALL_STACK_LENGTH_PER_CALL, MAX_PRIVATE_LOGS_PER_CALL,\n PRIVATE_LOG_SIZE_IN_FIELDS, PUBLIC_DISPATCH_SELECTOR,\n },\n messaging::l2_to_l1_message::L2ToL1Message,\n traits::{Empty, FromField, Hash, ToField},\n};\n\n// When finished, one can call .finish() to convert back to the abi\npub struct PrivateContext {\n // docs:start:private-context\n pub inputs: PrivateContextInputs,\n pub side_effect_counter: u32,\n\n pub min_revertible_side_effect_counter: u32,\n pub is_fee_payer: bool,\n\n pub args_hash: Field,\n pub return_hash: Field,\n\n pub max_block_number: MaxBlockNumber,\n\n pub note_hash_read_requests: BoundedVec<ReadRequest, MAX_NOTE_HASH_READ_REQUESTS_PER_CALL>,\n pub nullifier_read_requests: BoundedVec<ReadRequest, MAX_NULLIFIER_READ_REQUESTS_PER_CALL>,\n key_validation_requests_and_generators: BoundedVec<KeyValidationRequestAndGenerator, MAX_KEY_VALIDATION_REQUESTS_PER_CALL>,\n\n pub note_hashes: BoundedVec<NoteHash, MAX_NOTE_HASHES_PER_CALL>,\n pub nullifiers: BoundedVec<Nullifier, MAX_NULLIFIERS_PER_CALL>,\n\n pub private_call_requests: BoundedVec<PrivateCallRequest, MAX_PRIVATE_CALL_STACK_LENGTH_PER_CALL>,\n pub public_call_requests: BoundedVec<Counted<PublicCallRequest>, MAX_ENQUEUED_CALLS_PER_CALL>,\n pub public_teardown_call_request: PublicCallRequest,\n pub l2_to_l1_msgs: BoundedVec<L2ToL1Message, MAX_L2_TO_L1_MSGS_PER_CALL>,\n // docs:end:private-context\n\n // Header of a block whose state is used during private execution (not the block the transaction is included in).\n pub historical_header: BlockHeader,\n\n pub private_logs: BoundedVec<PrivateLogData, MAX_PRIVATE_LOGS_PER_CALL>,\n pub contract_class_logs_hashes: BoundedVec<LogHash, MAX_CONTRACT_CLASS_LOGS_PER_CALL>,\n\n // Contains the last key validation request for each key type. This is used to cache the last request and avoid\n // fetching the same request multiple times.\n // The index of the array corresponds to the key type (0 nullifier, 1 incoming, 2 outgoing, 3 tagging).\n pub last_key_validation_requests: [Option<KeyValidationRequest>; NUM_KEY_TYPES],\n}\n\nimpl PrivateContext {\n pub fn new(inputs: PrivateContextInputs, args_hash: Field) -> PrivateContext {\n PrivateContext {\n inputs,\n side_effect_counter: inputs.start_side_effect_counter + 1,\n min_revertible_side_effect_counter: 0,\n is_fee_payer: false,\n args_hash,\n return_hash: 0,\n max_block_number: MaxBlockNumber::empty(),\n note_hash_read_requests: BoundedVec::new(),\n nullifier_read_requests: BoundedVec::new(),\n key_validation_requests_and_generators: BoundedVec::new(),\n note_hashes: BoundedVec::new(),\n nullifiers: BoundedVec::new(),\n historical_header: inputs.historical_header,\n private_call_requests: BoundedVec::new(),\n public_call_requests: BoundedVec::new(),\n public_teardown_call_request: PublicCallRequest::empty(),\n l2_to_l1_msgs: BoundedVec::new(),\n private_logs: BoundedVec::new(),\n contract_class_logs_hashes: BoundedVec::new(),\n last_key_validation_requests: [Option::none(); NUM_KEY_TYPES],\n }\n }\n\n pub fn msg_sender(self) -> AztecAddress {\n self.inputs.call_context.msg_sender\n }\n\n pub fn this_address(self) -> AztecAddress {\n self.inputs.call_context.contract_address\n }\n\n pub fn chain_id(self) -> Field {\n self.inputs.tx_context.chain_id\n }\n\n pub fn version(self) -> Field {\n self.inputs.tx_context.version\n }\n\n pub fn gas_settings(self) -> GasSettings {\n self.inputs.tx_context.gas_settings\n }\n\n pub fn selector(self) -> FunctionSelector {\n self.inputs.call_context.function_selector\n }\n\n pub fn get_args_hash(self) -> Field {\n self.args_hash\n }\n\n pub fn push_note_hash(&mut self, note_hash: Field) {\n self.note_hashes.push(NoteHash { value: note_hash, counter: self.next_counter() });\n\n // WARNING(https://github.com/AztecProtocol/aztec-packages/issues/10558): if you delete this debug_log_format line, some tests fail.\n debug_log_format(\n \"Context.note_hashes, after pushing new note hash: {0}\",\n self.note_hashes.storage().map(|nh: NoteHash| nh.value),\n );\n }\n\n pub fn push_nullifier(&mut self, nullifier: Field) {\n notify_created_nullifier(nullifier);\n self.nullifiers.push(\n Nullifier { value: nullifier, note_hash: 0, counter: self.next_counter() },\n );\n }\n\n pub fn push_nullifier_for_note_hash(&mut self, nullifier: Field, nullified_note_hash: Field) {\n let nullifier_counter = self.next_counter();\n notify_nullified_note(nullifier, nullified_note_hash, nullifier_counter);\n self.nullifiers.push(\n Nullifier {\n value: nullifier,\n note_hash: nullified_note_hash,\n counter: nullifier_counter,\n },\n );\n }\n\n // Returns the header of a block whose state is used during private execution (not the block the transaction is\n // included in).\n pub fn get_block_header(self) -> BlockHeader {\n self.historical_header\n }\n\n // Returns the header of an arbitrary block whose block number is less than or equal to the block number\n // of historical header.\n pub fn get_block_header_at(self, block_number: u32) -> BlockHeader {\n get_block_header_at(block_number, self)\n }\n\n pub fn set_return_hash(&mut self, returns_hasher: ArgsHasher) {\n execution_cache::store(returns_hasher.fields);\n self.return_hash = returns_hasher.hash();\n }\n\n pub fn finish(self) -> PrivateCircuitPublicInputs {\n PrivateCircuitPublicInputs {\n call_context: self.inputs.call_context,\n args_hash: self.args_hash,\n returns_hash: self.return_hash,\n min_revertible_side_effect_counter: self.min_revertible_side_effect_counter,\n is_fee_payer: self.is_fee_payer,\n max_block_number: self.max_block_number,\n note_hash_read_requests: self.note_hash_read_requests.storage(),\n nullifier_read_requests: self.nullifier_read_requests.storage(),\n key_validation_requests_and_generators: self\n .key_validation_requests_and_generators\n .storage(),\n note_hashes: self.note_hashes.storage(),\n nullifiers: self.nullifiers.storage(),\n private_call_requests: self.private_call_requests.storage(),\n public_call_requests: self.public_call_requests.storage(),\n public_teardown_call_request: self.public_teardown_call_request,\n l2_to_l1_msgs: self.l2_to_l1_msgs.storage(),\n start_side_effect_counter: self.inputs.start_side_effect_counter,\n end_side_effect_counter: self.side_effect_counter,\n private_logs: self.private_logs.storage(),\n contract_class_logs_hashes: self.contract_class_logs_hashes.storage(),\n historical_header: self.historical_header,\n tx_context: self.inputs.tx_context,\n }\n }\n\n pub fn set_as_fee_payer(&mut self) {\n dep::protocol_types::debug_log::debug_log_format(\n \"Setting {0} as fee payer\",\n [self.this_address().to_field()],\n );\n self.is_fee_payer = true;\n }\n\n pub fn end_setup(&mut self) {\n // dep::protocol_types::debug_log::debug_log_format(\n // \"Ending setup at counter {0}\",\n // [self.side_effect_counter as Field]\n // );\n self.min_revertible_side_effect_counter = self.side_effect_counter;\n notify_set_min_revertible_side_effect_counter(self.min_revertible_side_effect_counter);\n }\n\n // docs:start:max-block-number\n pub fn set_tx_max_block_number(&mut self, max_block_number: u32) {\n // docs:end:max-block-number\n self.max_block_number =\n MaxBlockNumber::min_with_u32(self.max_block_number, max_block_number);\n }\n\n pub fn push_note_hash_read_request(&mut self, note_hash: Field) {\n let side_effect = ReadRequest { value: note_hash, counter: self.next_counter() };\n self.note_hash_read_requests.push(side_effect);\n }\n\n pub fn push_nullifier_read_request(&mut self, nullifier: Field) {\n let request = ReadRequest { value: nullifier, counter: self.next_counter() };\n self.nullifier_read_requests.push(request);\n }\n\n pub fn request_nsk_app(&mut self, npk_m_hash: Field) -> Field {\n self.request_sk_app(npk_m_hash, NULLIFIER_INDEX)\n }\n\n pub fn request_ovsk_app(&mut self, ovpk_m_hash: Field) -> Field {\n self.request_sk_app(ovpk_m_hash, OUTGOING_INDEX)\n }\n\n fn request_sk_app(&mut self, pk_m_hash: Field, key_index: Field) -> Field {\n let cached_request =\n self.last_key_validation_requests[key_index].unwrap_or(KeyValidationRequest::empty());\n\n if cached_request.pk_m.hash() == pk_m_hash {\n // We get a match so the cached request is the latest one\n cached_request.sk_app\n } else {\n // We didn't get a match meaning the cached result is stale\n // Typically we'd validate keys by showing that they are the preimage of `pk_m_hash`, but that'd require\n // the oracle returning the master secret keys, which could cause malicious contracts to leak it or learn\n // about secrets from other contracts. We therefore silo secret keys, and rely on the private kernel to\n // validate that we siloed secret key corresponds to correct siloing of the master secret key that hashes\n // to `pk_m_hash`.\n\n // Safety: Kernels verify that the key validation request is valid and below we verify that a request\n // for the correct public key has been received.\n let request = unsafe { get_key_validation_request(pk_m_hash, key_index) };\n assert_eq(request.pk_m.hash(), pk_m_hash, \"Obtained invalid key validation request\");\n\n self.key_validation_requests_and_generators.push(\n KeyValidationRequestAndGenerator {\n request,\n sk_app_generator: sk_generators[key_index],\n },\n );\n self.last_key_validation_requests[key_index] = Option::some(request);\n request.sk_app\n }\n }\n\n // docs:start:context_message_portal\n pub fn message_portal(&mut self, recipient: EthAddress, content: Field) {\n // docs:end:context_message_portal\n let message = L2ToL1Message { recipient, content, counter: self.next_counter() };\n self.l2_to_l1_msgs.push(message);\n }\n\n // docs:start:context_consume_l1_to_l2_message\n // docs:start:consume_l1_to_l2_message\n pub fn consume_l1_to_l2_message(\n &mut self,\n content: Field,\n secret: Field,\n sender: EthAddress,\n leaf_index: Field,\n ) {\n // docs:end:context_consume_l1_to_l2_message\n let nullifier = process_l1_to_l2_message(\n self.historical_header.state.l1_to_l2_message_tree.root,\n self.this_address(),\n sender,\n self.chain_id(),\n self.version(),\n content,\n secret,\n leaf_index,\n );\n\n // Push nullifier (and the \"commitment\" corresponding to this can be \"empty\")\n self.push_nullifier(nullifier)\n }\n // docs:end:consume_l1_to_l2_message\n\n pub fn emit_private_log(&mut self, log: [Field; PRIVATE_LOG_SIZE_IN_FIELDS]) {\n let counter = self.next_counter();\n let private_log = PrivateLogData { log: Log::new(log), note_hash_counter: 0, counter };\n self.private_logs.push(private_log);\n }\n\n pub fn emit_raw_note_log(\n &mut self,\n log: [Field; PRIVATE_LOG_SIZE_IN_FIELDS],\n note_hash_counter: u32,\n ) {\n let counter = self.next_counter();\n let private_log = PrivateLogData { log: Log::new(log), note_hash_counter, counter };\n self.private_logs.push(private_log);\n }\n\n pub fn call_private_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) -> ReturnsHash {\n let args_hash = hash_args_array(args);\n execution_cache::store(args);\n self.call_private_function_with_args_hash(\n contract_address,\n function_selector,\n args_hash,\n false,\n )\n }\n\n pub fn static_call_private_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) -> ReturnsHash {\n let args_hash = hash_args_array(args);\n execution_cache::store(args);\n self.call_private_function_with_args_hash(\n contract_address,\n function_selector,\n args_hash,\n true,\n )\n }\n\n pub fn call_private_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) -> ReturnsHash {\n self.call_private_function_with_args_hash(contract_address, function_selector, 0, false)\n }\n\n pub fn static_call_private_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) -> ReturnsHash {\n self.call_private_function_with_args_hash(contract_address, function_selector, 0, true)\n }\n\n pub fn call_private_function_with_args_hash(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n is_static_call: bool,\n ) -> ReturnsHash {\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n let start_side_effect_counter = self.side_effect_counter;\n\n // Safety: The oracle simulates the private call and returns the value of the side effects counter after\n // execution of the call (which means that end_side_effect_counter - start_side_effect_counter is\n // the number of side effects that took place), along with the hash of the return values. We validate these\n // by requesting a private kernel iteration in which the return values are constrained to hash\n // to `returns_hash` and the side effects counter to increment from start to end.\n let (end_side_effect_counter, returns_hash) = unsafe {\n call_private_function_internal(\n contract_address,\n function_selector,\n args_hash,\n start_side_effect_counter,\n is_static_call,\n )\n };\n\n self.private_call_requests.push(\n PrivateCallRequest {\n call_context: CallContext {\n msg_sender: self.this_address(),\n contract_address,\n function_selector,\n is_static_call,\n },\n args_hash,\n returns_hash,\n start_side_effect_counter,\n end_side_effect_counter,\n },\n );\n\n // TODO (fees) figure out why this crashes the prover and enable it\n // we need this in order to pay fees inside child call contexts\n // assert(\n // (item.public_inputs.min_revertible_side_effect_counter == 0 as u32)\n // | (item.public_inputs.min_revertible_side_effect_counter\n // > self.min_revertible_side_effect_counter)\n // );\n // if item.public_inputs.min_revertible_side_effect_counter\n // > self.min_revertible_side_effect_counter {\n // self.min_revertible_side_effect_counter = item.public_inputs.min_revertible_side_effect_counter;\n // }\n self.side_effect_counter = end_side_effect_counter + 1;\n ReturnsHash::new(returns_hash)\n }\n\n pub fn call_public_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) {\n let args_hash = hash_args_array(args);\n execution_cache::store(args);\n self.call_public_function_with_args_hash(\n contract_address,\n function_selector,\n args_hash,\n false,\n )\n }\n\n pub fn static_call_public_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) {\n let args_hash = hash_args_array(args);\n execution_cache::store(args);\n self.call_public_function_with_args_hash(\n contract_address,\n function_selector,\n args_hash,\n true,\n )\n }\n\n pub fn call_public_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) {\n self.call_public_function_with_args_hash(contract_address, function_selector, 0, false)\n }\n\n pub fn static_call_public_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) {\n self.call_public_function_with_args_hash(contract_address, function_selector, 0, true)\n }\n\n pub fn call_public_function_with_args_hash(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n is_static_call: bool,\n ) {\n let counter = self.next_counter();\n\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n // Safety: TODO(https://github.com/AztecProtocol/aztec-packages/issues/8985): Fix this.\n // WARNING: This is insecure and should be temporary!\n // The oracle hashes the arguments and returns a new args_hash.\n // new_args = [selector, ...old_args], so as to make it suitable to call the public dispatch function.\n // We don't validate or compute it in the circuit because a) it's harder to do with slices, and\n // b) this is only temporary.\n let args_hash = unsafe {\n enqueue_public_function_call_internal(\n contract_address,\n function_selector,\n args_hash,\n counter,\n is_static_call,\n )\n };\n\n // Public calls are rerouted through the dispatch function.\n let function_selector = comptime { FunctionSelector::from_field(PUBLIC_DISPATCH_SELECTOR) };\n\n let call_request = PublicCallRequest {\n msg_sender: self.this_address(),\n contract_address,\n function_selector,\n is_static_call,\n args_hash,\n };\n\n self.public_call_requests.push(Counted::new(call_request, counter));\n }\n\n pub fn set_public_teardown_function<let ARGS_COUNT: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ARGS_COUNT],\n ) {\n let args_hash = hash_args_array(args);\n execution_cache::store(args);\n self.set_public_teardown_function_with_args_hash(\n contract_address,\n function_selector,\n args_hash,\n false,\n )\n }\n\n pub fn set_public_teardown_function_with_args_hash(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n is_static_call: bool,\n ) {\n let counter = self.next_counter();\n\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n // Safety: TODO(https://github.com/AztecProtocol/aztec-packages/issues/8985): Fix this.\n // WARNING: This is insecure and should be temporary!\n // The oracle hashes the arguments and returns a new args_hash.\n // new_args = [selector, ...old_args], so as to make it suitable to call the public dispatch function.\n // We don't validate or compute it in the circuit because a) it's harder to do with slices, and\n // b) this is only temporary.\n let args_hash = unsafe {\n set_public_teardown_function_call_internal(\n contract_address,\n function_selector,\n args_hash,\n counter,\n is_static_call,\n )\n };\n\n let function_selector = comptime { FunctionSelector::from_field(PUBLIC_DISPATCH_SELECTOR) };\n\n self.public_teardown_call_request = PublicCallRequest {\n msg_sender: self.this_address(),\n contract_address,\n function_selector,\n is_static_call,\n args_hash,\n };\n }\n\n fn next_counter(&mut self) -> u32 {\n let counter = self.side_effect_counter;\n self.side_effect_counter += 1;\n counter\n }\n}\n\nimpl Empty for PrivateContext {\n fn empty() -> Self {\n PrivateContext {\n inputs: PrivateContextInputs::empty(),\n side_effect_counter: 0 as u32,\n min_revertible_side_effect_counter: 0 as u32,\n is_fee_payer: false,\n args_hash: 0,\n return_hash: 0,\n max_block_number: MaxBlockNumber::empty(),\n note_hash_read_requests: BoundedVec::new(),\n nullifier_read_requests: BoundedVec::new(),\n key_validation_requests_and_generators: BoundedVec::new(),\n note_hashes: BoundedVec::new(),\n nullifiers: BoundedVec::new(),\n private_call_requests: BoundedVec::new(),\n public_call_requests: BoundedVec::new(),\n public_teardown_call_request: PublicCallRequest::empty(),\n l2_to_l1_msgs: BoundedVec::new(),\n historical_header: BlockHeader::empty(),\n private_logs: BoundedVec::new(),\n contract_class_logs_hashes: BoundedVec::new(),\n last_key_validation_requests: [Option::none(); NUM_KEY_TYPES],\n }\n }\n}\n"
2707
2707
  },
2708
2708
  "80": {
2709
2709
  "path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/context/public_context.nr",
2710
- "source": "use crate::context::gas::GasOpts;\nuse crate::hash::{\n compute_l1_to_l2_message_hash, compute_l1_to_l2_message_nullifier, compute_secret_hash,\n};\nuse dep::protocol_types::abis::function_selector::FunctionSelector;\nuse dep::protocol_types::address::{AztecAddress, EthAddress};\nuse dep::protocol_types::constants::MAX_FIELD_VALUE;\nuse dep::protocol_types::traits::{Empty, Packable, Serialize};\n\npub struct PublicContext {\n pub args_hash: Option<Field>,\n pub compute_args_hash: fn() -> Field,\n}\n\nimpl PublicContext {\n pub fn new(compute_args_hash: fn() -> Field) -> Self {\n PublicContext { args_hash: Option::none(), compute_args_hash }\n }\n\n pub fn emit_public_log<T, let N: u32>(_self: &mut Self, log: T)\n where\n T: Serialize<N>,\n {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { emit_public_log(Serialize::serialize(log).as_slice()) };\n }\n\n pub fn note_hash_exists(_self: Self, note_hash: Field, leaf_index: Field) -> bool {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { note_hash_exists(note_hash, leaf_index) } == 1\n }\n\n pub fn l1_to_l2_msg_exists(_self: Self, msg_hash: Field, msg_leaf_index: Field) -> bool {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { l1_to_l2_msg_exists(msg_hash, msg_leaf_index) } == 1\n }\n\n pub fn nullifier_exists(_self: Self, unsiloed_nullifier: Field, address: AztecAddress) -> bool {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { nullifier_exists(unsiloed_nullifier, address.to_field()) } == 1\n }\n\n pub fn consume_l1_to_l2_message(\n &mut self,\n content: Field,\n secret: Field,\n sender: EthAddress,\n leaf_index: Field,\n ) {\n let secret_hash = compute_secret_hash(secret);\n let message_hash = compute_l1_to_l2_message_hash(\n sender,\n self.chain_id(),\n /*recipient=*/\n self.this_address(),\n self.version(),\n content,\n secret_hash,\n leaf_index,\n );\n let nullifier = compute_l1_to_l2_message_nullifier(message_hash, secret);\n\n assert(\n !self.nullifier_exists(nullifier, self.this_address()),\n \"L1-to-L2 message is already nullified\",\n );\n assert(\n self.l1_to_l2_msg_exists(message_hash, leaf_index),\n \"Tried to consume nonexistent L1-to-L2 message\",\n );\n\n self.push_nullifier(nullifier);\n }\n\n pub fn message_portal(_self: &mut Self, recipient: EthAddress, content: Field) {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { send_l2_to_l1_msg(recipient, content) };\n }\n\n pub unconstrained fn call_public_function(\n _self: &mut Self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field],\n gas_opts: GasOpts,\n ) -> [Field] {\n let args = args.push_front(function_selector.to_field());\n\n call(gas_for_call(gas_opts), contract_address, args);\n // Use success_copy to determine whether the call succeeded\n let success = success_copy();\n\n let result_data = returndata_copy(0, returndata_size());\n if !success {\n // Rethrow the revert data.\n avm_revert(result_data);\n }\n result_data\n }\n\n pub unconstrained fn static_call_public_function(\n _self: &mut Self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field],\n gas_opts: GasOpts,\n ) -> [Field] {\n let args = args.push_front(function_selector.to_field());\n\n call_static(gas_for_call(gas_opts), contract_address, args);\n // Use success_copy to determine whether the call succeeded\n let success = success_copy();\n\n let result_data = returndata_copy(0, returndata_size());\n if !success {\n // Rethrow the revert data.\n avm_revert(result_data);\n }\n result_data\n }\n\n pub fn push_note_hash(_self: &mut Self, note_hash: Field) {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { emit_note_hash(note_hash) };\n }\n pub fn push_nullifier(_self: &mut Self, nullifier: Field) {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { emit_nullifier(nullifier) };\n }\n\n pub fn this_address(_self: Self) -> AztecAddress {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n address()\n }\n }\n pub fn msg_sender(_self: Self) -> AztecAddress {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n sender()\n }\n }\n pub fn selector(_self: Self) -> FunctionSelector {\n // The selector is the first element of the calldata when calling a public function through dispatch.\n // Safety: AVM opcodes are constrained by the AVM itself\n let raw_selector: [Field; 1] = unsafe { calldata_copy(0, 1) };\n FunctionSelector::from_field(raw_selector[0])\n }\n pub fn get_args_hash(mut self) -> Field {\n if !self.args_hash.is_some() {\n self.args_hash = Option::some((self.compute_args_hash)());\n }\n\n self.args_hash.unwrap_unchecked()\n }\n pub fn transaction_fee(_self: Self) -> Field {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n transaction_fee()\n }\n }\n\n pub fn chain_id(_self: Self) -> Field {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n chain_id()\n }\n }\n pub fn version(_self: Self) -> Field {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n version()\n }\n }\n pub fn block_number(_self: Self) -> Field {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n block_number()\n }\n }\n pub fn timestamp(_self: Self) -> u64 {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n timestamp()\n }\n }\n pub fn fee_per_l2_gas(_self: Self) -> Field {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n fee_per_l2_gas()\n }\n }\n pub fn fee_per_da_gas(_self: Self) -> Field {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n fee_per_da_gas()\n }\n }\n\n pub fn l2_gas_left(_self: Self) -> Field {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n l2_gas_left()\n }\n }\n pub fn da_gas_left(_self: Self) -> Field {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n da_gas_left()\n }\n }\n pub fn is_static_call(_self: Self) -> bool {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { is_static_call() } == 1\n }\n\n pub fn raw_storage_read<let N: u32>(_self: Self, storage_slot: Field) -> [Field; N] {\n let mut out = [0; N];\n for i in 0..N {\n // Safety: AVM opcodes are constrained by the AVM itself\n out[i] = unsafe { storage_read(storage_slot + i as Field) };\n }\n out\n }\n\n pub fn storage_read<T, let N: u32>(self, storage_slot: Field) -> T\n where\n T: Packable<N>,\n {\n T::unpack(self.raw_storage_read(storage_slot))\n }\n\n pub fn raw_storage_write<let N: u32>(_self: Self, storage_slot: Field, values: [Field; N]) {\n for i in 0..N {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { storage_write(storage_slot + i as Field, values[i]) };\n }\n }\n\n pub fn storage_write<T, let N: u32>(self, storage_slot: Field, value: T)\n where\n T: Packable<N>,\n {\n self.raw_storage_write(storage_slot, value.pack());\n }\n}\n\n// Helper functions\nfn gas_for_call(user_gas: GasOpts) -> [Field; 2] {\n // It's ok to use the max possible gas here, because the gas will be\n // capped by the gas left in the (STATIC)CALL instruction.\n [user_gas.l2_gas.unwrap_or(MAX_FIELD_VALUE), user_gas.da_gas.unwrap_or(MAX_FIELD_VALUE)]\n}\n\n// Unconstrained opcode wrappers (do not use directly).\nunconstrained fn address() -> AztecAddress {\n address_opcode()\n}\nunconstrained fn sender() -> AztecAddress {\n sender_opcode()\n}\nunconstrained fn transaction_fee() -> Field {\n transaction_fee_opcode()\n}\nunconstrained fn chain_id() -> Field {\n chain_id_opcode()\n}\nunconstrained fn version() -> Field {\n version_opcode()\n}\nunconstrained fn block_number() -> Field {\n block_number_opcode()\n}\nunconstrained fn timestamp() -> u64 {\n timestamp_opcode()\n}\nunconstrained fn fee_per_l2_gas() -> Field {\n fee_per_l2_gas_opcode()\n}\nunconstrained fn fee_per_da_gas() -> Field {\n fee_per_da_gas_opcode()\n}\nunconstrained fn l2_gas_left() -> Field {\n l2_gas_left_opcode()\n}\nunconstrained fn da_gas_left() -> Field {\n da_gas_left_opcode()\n}\nunconstrained fn is_static_call() -> Field {\n is_static_call_opcode()\n}\nunconstrained fn note_hash_exists(note_hash: Field, leaf_index: Field) -> u1 {\n note_hash_exists_opcode(note_hash, leaf_index)\n}\nunconstrained fn emit_note_hash(note_hash: Field) {\n emit_note_hash_opcode(note_hash)\n}\nunconstrained fn nullifier_exists(nullifier: Field, address: Field) -> u1 {\n nullifier_exists_opcode(nullifier, address)\n}\nunconstrained fn emit_nullifier(nullifier: Field) {\n emit_nullifier_opcode(nullifier)\n}\nunconstrained fn emit_public_log(message: [Field]) {\n emit_public_log_opcode(message)\n}\nunconstrained fn l1_to_l2_msg_exists(msg_hash: Field, msg_leaf_index: Field) -> u1 {\n l1_to_l2_msg_exists_opcode(msg_hash, msg_leaf_index)\n}\nunconstrained fn send_l2_to_l1_msg(recipient: EthAddress, content: Field) {\n send_l2_to_l1_msg_opcode(recipient, content)\n}\nunconstrained fn call(gas: [Field; 2], address: AztecAddress, args: [Field]) {\n call_opcode(gas, address, args)\n}\n\nunconstrained fn call_static(gas: [Field; 2], address: AztecAddress, args: [Field]) {\n call_static_opcode(gas, address, args)\n}\n\npub unconstrained fn calldata_copy<let N: u32>(cdoffset: u32, copy_size: u32) -> [Field; N] {\n calldata_copy_opcode(cdoffset, copy_size)\n}\n\n// `success_copy` is placed immediately after the CALL opcode to get the success value\nunconstrained fn success_copy() -> bool {\n success_copy_opcode()\n}\n\nunconstrained fn returndata_size() -> u32 {\n returndata_size_opcode()\n}\n\nunconstrained fn returndata_copy(rdoffset: u32, copy_size: u32) -> [Field] {\n returndata_copy_opcode(rdoffset, copy_size)\n}\n\npub unconstrained fn avm_return(returndata: [Field]) {\n return_opcode(returndata)\n}\n\n// This opcode reverts using the exact data given. In general it should only be used\n// to do rethrows, where the revert data is the same as the original revert data.\n// For normal reverts, use Noir's `assert` which, on top of reverting, will also add\n// an error selector to the revert data.\nunconstrained fn avm_revert(revertdata: [Field]) {\n revert_opcode(revertdata)\n}\n\nunconstrained fn storage_read(storage_slot: Field) -> Field {\n storage_read_opcode(storage_slot)\n}\n\nunconstrained fn storage_write(storage_slot: Field, value: Field) {\n storage_write_opcode(storage_slot, value);\n}\n\nimpl Empty for PublicContext {\n fn empty() -> Self {\n PublicContext::new(|| 0)\n }\n}\n\n// AVM oracles (opcodes) follow, do not use directly.\n#[oracle(avmOpcodeAddress)]\nunconstrained fn address_opcode() -> AztecAddress {}\n\n#[oracle(avmOpcodeSender)]\nunconstrained fn sender_opcode() -> AztecAddress {}\n\n#[oracle(avmOpcodeTransactionFee)]\nunconstrained fn transaction_fee_opcode() -> Field {}\n\n#[oracle(avmOpcodeChainId)]\nunconstrained fn chain_id_opcode() -> Field {}\n\n#[oracle(avmOpcodeVersion)]\nunconstrained fn version_opcode() -> Field {}\n\n#[oracle(avmOpcodeBlockNumber)]\nunconstrained fn block_number_opcode() -> Field {}\n\n#[oracle(avmOpcodeTimestamp)]\nunconstrained fn timestamp_opcode() -> u64 {}\n\n#[oracle(avmOpcodeFeePerL2Gas)]\nunconstrained fn fee_per_l2_gas_opcode() -> Field {}\n\n#[oracle(avmOpcodeFeePerDaGas)]\nunconstrained fn fee_per_da_gas_opcode() -> Field {}\n\n#[oracle(avmOpcodeL2GasLeft)]\nunconstrained fn l2_gas_left_opcode() -> Field {}\n\n#[oracle(avmOpcodeDaGasLeft)]\nunconstrained fn da_gas_left_opcode() -> Field {}\n\n#[oracle(avmOpcodeIsStaticCall)]\nunconstrained fn is_static_call_opcode() -> Field {}\n\n#[oracle(avmOpcodeNoteHashExists)]\nunconstrained fn note_hash_exists_opcode(note_hash: Field, leaf_index: Field) -> u1 {}\n\n#[oracle(avmOpcodeEmitNoteHash)]\nunconstrained fn emit_note_hash_opcode(note_hash: Field) {}\n\n#[oracle(avmOpcodeNullifierExists)]\nunconstrained fn nullifier_exists_opcode(nullifier: Field, address: Field) -> u1 {}\n\n#[oracle(avmOpcodeEmitNullifier)]\nunconstrained fn emit_nullifier_opcode(nullifier: Field) {}\n\n// TODO(#11124): rename unencrypted to public in avm\n#[oracle(avmOpcodeEmitUnencryptedLog)]\nunconstrained fn emit_public_log_opcode(message: [Field]) {}\n\n#[oracle(avmOpcodeL1ToL2MsgExists)]\nunconstrained fn l1_to_l2_msg_exists_opcode(msg_hash: Field, msg_leaf_index: Field) -> u1 {}\n\n#[oracle(avmOpcodeSendL2ToL1Msg)]\nunconstrained fn send_l2_to_l1_msg_opcode(recipient: EthAddress, content: Field) {}\n\n#[oracle(avmOpcodeCalldataCopy)]\nunconstrained fn calldata_copy_opcode<let N: u32>(cdoffset: u32, copy_size: u32) -> [Field; N] {}\n\n#[oracle(avmOpcodeReturndataSize)]\nunconstrained fn returndata_size_opcode() -> u32 {}\n\n#[oracle(avmOpcodeReturndataCopy)]\nunconstrained fn returndata_copy_opcode(rdoffset: u32, copy_size: u32) -> [Field] {}\n\n#[oracle(avmOpcodeReturn)]\nunconstrained fn return_opcode(returndata: [Field]) {}\n\n// This opcode reverts using the exact data given. In general it should only be used\n// to do rethrows, where the revert data is the same as the original revert data.\n// For normal reverts, use Noir's `assert` which, on top of reverting, will also add\n// an error selector to the revert data.\n#[oracle(avmOpcodeRevert)]\nunconstrained fn revert_opcode(revertdata: [Field]) {}\n\n#[oracle(avmOpcodeCall)]\nunconstrained fn call_opcode(\n gas: [Field; 2], // gas allocation: [l2_gas, da_gas]\n address: AztecAddress,\n args: [Field],\n) {}\n\n#[oracle(avmOpcodeStaticCall)]\nunconstrained fn call_static_opcode(\n gas: [Field; 2], // gas allocation: [l2_gas, da_gas]\n address: AztecAddress,\n args: [Field],\n) {}\n\n#[oracle(avmOpcodeSuccessCopy)]\nunconstrained fn success_copy_opcode() -> bool {}\n\n#[oracle(avmOpcodeStorageRead)]\nunconstrained fn storage_read_opcode(storage_slot: Field) -> Field {}\n\n#[oracle(avmOpcodeStorageWrite)]\nunconstrained fn storage_write_opcode(storage_slot: Field, value: Field) {}\n"
2710
+ "source": "use crate::context::gas::GasOpts;\nuse crate::hash::{\n compute_l1_to_l2_message_hash, compute_l1_to_l2_message_nullifier, compute_secret_hash,\n};\nuse dep::protocol_types::abis::function_selector::FunctionSelector;\nuse dep::protocol_types::address::{AztecAddress, EthAddress};\nuse dep::protocol_types::constants::MAX_FIELD_VALUE;\nuse dep::protocol_types::traits::{Empty, FromField, Packable, Serialize, ToField};\n\npub struct PublicContext {\n pub args_hash: Option<Field>,\n pub compute_args_hash: fn() -> Field,\n}\n\nimpl PublicContext {\n pub fn new(compute_args_hash: fn() -> Field) -> Self {\n PublicContext { args_hash: Option::none(), compute_args_hash }\n }\n\n pub fn emit_public_log<T, let N: u32>(_self: &mut Self, log: T)\n where\n T: Serialize<N>,\n {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { emit_public_log(Serialize::serialize(log).as_slice()) };\n }\n\n pub fn note_hash_exists(_self: Self, note_hash: Field, leaf_index: Field) -> bool {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { note_hash_exists(note_hash, leaf_index) } == 1\n }\n\n pub fn l1_to_l2_msg_exists(_self: Self, msg_hash: Field, msg_leaf_index: Field) -> bool {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { l1_to_l2_msg_exists(msg_hash, msg_leaf_index) } == 1\n }\n\n pub fn nullifier_exists(_self: Self, unsiloed_nullifier: Field, address: AztecAddress) -> bool {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { nullifier_exists(unsiloed_nullifier, address.to_field()) } == 1\n }\n\n pub fn consume_l1_to_l2_message(\n &mut self,\n content: Field,\n secret: Field,\n sender: EthAddress,\n leaf_index: Field,\n ) {\n let secret_hash = compute_secret_hash(secret);\n let message_hash = compute_l1_to_l2_message_hash(\n sender,\n self.chain_id(),\n /*recipient=*/\n self.this_address(),\n self.version(),\n content,\n secret_hash,\n leaf_index,\n );\n let nullifier = compute_l1_to_l2_message_nullifier(message_hash, secret);\n\n assert(\n !self.nullifier_exists(nullifier, self.this_address()),\n \"L1-to-L2 message is already nullified\",\n );\n assert(\n self.l1_to_l2_msg_exists(message_hash, leaf_index),\n \"Tried to consume nonexistent L1-to-L2 message\",\n );\n\n self.push_nullifier(nullifier);\n }\n\n pub fn message_portal(_self: &mut Self, recipient: EthAddress, content: Field) {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { send_l2_to_l1_msg(recipient, content) };\n }\n\n pub unconstrained fn call_public_function(\n _self: &mut Self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field],\n gas_opts: GasOpts,\n ) -> [Field] {\n let args = args.push_front(function_selector.to_field());\n\n call(gas_for_call(gas_opts), contract_address, args);\n // Use success_copy to determine whether the call succeeded\n let success = success_copy();\n\n let result_data = returndata_copy(0, returndata_size());\n if !success {\n // Rethrow the revert data.\n avm_revert(result_data);\n }\n result_data\n }\n\n pub unconstrained fn static_call_public_function(\n _self: &mut Self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field],\n gas_opts: GasOpts,\n ) -> [Field] {\n let args = args.push_front(function_selector.to_field());\n\n call_static(gas_for_call(gas_opts), contract_address, args);\n // Use success_copy to determine whether the call succeeded\n let success = success_copy();\n\n let result_data = returndata_copy(0, returndata_size());\n if !success {\n // Rethrow the revert data.\n avm_revert(result_data);\n }\n result_data\n }\n\n pub fn push_note_hash(_self: &mut Self, note_hash: Field) {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { emit_note_hash(note_hash) };\n }\n pub fn push_nullifier(_self: &mut Self, nullifier: Field) {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { emit_nullifier(nullifier) };\n }\n\n pub fn this_address(_self: Self) -> AztecAddress {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n address()\n }\n }\n pub fn msg_sender(_self: Self) -> AztecAddress {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n sender()\n }\n }\n pub fn selector(_self: Self) -> FunctionSelector {\n // The selector is the first element of the calldata when calling a public function through dispatch.\n // Safety: AVM opcodes are constrained by the AVM itself\n let raw_selector: [Field; 1] = unsafe { calldata_copy(0, 1) };\n FunctionSelector::from_field(raw_selector[0])\n }\n pub fn get_args_hash(mut self) -> Field {\n if !self.args_hash.is_some() {\n self.args_hash = Option::some((self.compute_args_hash)());\n }\n\n self.args_hash.unwrap_unchecked()\n }\n pub fn transaction_fee(_self: Self) -> Field {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n transaction_fee()\n }\n }\n\n pub fn chain_id(_self: Self) -> Field {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n chain_id()\n }\n }\n pub fn version(_self: Self) -> Field {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n version()\n }\n }\n pub fn block_number(_self: Self) -> Field {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n block_number()\n }\n }\n pub fn timestamp(_self: Self) -> u64 {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n timestamp()\n }\n }\n pub fn fee_per_l2_gas(_self: Self) -> Field {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n fee_per_l2_gas()\n }\n }\n pub fn fee_per_da_gas(_self: Self) -> Field {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n fee_per_da_gas()\n }\n }\n\n pub fn l2_gas_left(_self: Self) -> Field {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n l2_gas_left()\n }\n }\n pub fn da_gas_left(_self: Self) -> Field {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n da_gas_left()\n }\n }\n pub fn is_static_call(_self: Self) -> bool {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { is_static_call() } == 1\n }\n\n pub fn raw_storage_read<let N: u32>(_self: Self, storage_slot: Field) -> [Field; N] {\n let mut out = [0; N];\n for i in 0..N {\n // Safety: AVM opcodes are constrained by the AVM itself\n out[i] = unsafe { storage_read(storage_slot + i as Field) };\n }\n out\n }\n\n pub fn storage_read<T, let N: u32>(self, storage_slot: Field) -> T\n where\n T: Packable<N>,\n {\n T::unpack(self.raw_storage_read(storage_slot))\n }\n\n pub fn raw_storage_write<let N: u32>(_self: Self, storage_slot: Field, values: [Field; N]) {\n for i in 0..N {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { storage_write(storage_slot + i as Field, values[i]) };\n }\n }\n\n pub fn storage_write<T, let N: u32>(self, storage_slot: Field, value: T)\n where\n T: Packable<N>,\n {\n self.raw_storage_write(storage_slot, value.pack());\n }\n}\n\n// Helper functions\nfn gas_for_call(user_gas: GasOpts) -> [Field; 2] {\n // It's ok to use the max possible gas here, because the gas will be\n // capped by the gas left in the (STATIC)CALL instruction.\n [user_gas.l2_gas.unwrap_or(MAX_FIELD_VALUE), user_gas.da_gas.unwrap_or(MAX_FIELD_VALUE)]\n}\n\n// Unconstrained opcode wrappers (do not use directly).\nunconstrained fn address() -> AztecAddress {\n address_opcode()\n}\nunconstrained fn sender() -> AztecAddress {\n sender_opcode()\n}\nunconstrained fn transaction_fee() -> Field {\n transaction_fee_opcode()\n}\nunconstrained fn chain_id() -> Field {\n chain_id_opcode()\n}\nunconstrained fn version() -> Field {\n version_opcode()\n}\nunconstrained fn block_number() -> Field {\n block_number_opcode()\n}\nunconstrained fn timestamp() -> u64 {\n timestamp_opcode()\n}\nunconstrained fn fee_per_l2_gas() -> Field {\n fee_per_l2_gas_opcode()\n}\nunconstrained fn fee_per_da_gas() -> Field {\n fee_per_da_gas_opcode()\n}\nunconstrained fn l2_gas_left() -> Field {\n l2_gas_left_opcode()\n}\nunconstrained fn da_gas_left() -> Field {\n da_gas_left_opcode()\n}\nunconstrained fn is_static_call() -> Field {\n is_static_call_opcode()\n}\nunconstrained fn note_hash_exists(note_hash: Field, leaf_index: Field) -> u1 {\n note_hash_exists_opcode(note_hash, leaf_index)\n}\nunconstrained fn emit_note_hash(note_hash: Field) {\n emit_note_hash_opcode(note_hash)\n}\nunconstrained fn nullifier_exists(nullifier: Field, address: Field) -> u1 {\n nullifier_exists_opcode(nullifier, address)\n}\nunconstrained fn emit_nullifier(nullifier: Field) {\n emit_nullifier_opcode(nullifier)\n}\nunconstrained fn emit_public_log(message: [Field]) {\n emit_public_log_opcode(message)\n}\nunconstrained fn l1_to_l2_msg_exists(msg_hash: Field, msg_leaf_index: Field) -> u1 {\n l1_to_l2_msg_exists_opcode(msg_hash, msg_leaf_index)\n}\nunconstrained fn send_l2_to_l1_msg(recipient: EthAddress, content: Field) {\n send_l2_to_l1_msg_opcode(recipient, content)\n}\nunconstrained fn call(gas: [Field; 2], address: AztecAddress, args: [Field]) {\n call_opcode(gas, address, args)\n}\n\nunconstrained fn call_static(gas: [Field; 2], address: AztecAddress, args: [Field]) {\n call_static_opcode(gas, address, args)\n}\n\npub unconstrained fn calldata_copy<let N: u32>(cdoffset: u32, copy_size: u32) -> [Field; N] {\n calldata_copy_opcode(cdoffset, copy_size)\n}\n\n// `success_copy` is placed immediately after the CALL opcode to get the success value\nunconstrained fn success_copy() -> bool {\n success_copy_opcode()\n}\n\nunconstrained fn returndata_size() -> u32 {\n returndata_size_opcode()\n}\n\nunconstrained fn returndata_copy(rdoffset: u32, copy_size: u32) -> [Field] {\n returndata_copy_opcode(rdoffset, copy_size)\n}\n\npub unconstrained fn avm_return(returndata: [Field]) {\n return_opcode(returndata)\n}\n\n// This opcode reverts using the exact data given. In general it should only be used\n// to do rethrows, where the revert data is the same as the original revert data.\n// For normal reverts, use Noir's `assert` which, on top of reverting, will also add\n// an error selector to the revert data.\nunconstrained fn avm_revert(revertdata: [Field]) {\n revert_opcode(revertdata)\n}\n\nunconstrained fn storage_read(storage_slot: Field) -> Field {\n storage_read_opcode(storage_slot)\n}\n\nunconstrained fn storage_write(storage_slot: Field, value: Field) {\n storage_write_opcode(storage_slot, value);\n}\n\nimpl Empty for PublicContext {\n fn empty() -> Self {\n PublicContext::new(|| 0)\n }\n}\n\n// AVM oracles (opcodes) follow, do not use directly.\n#[oracle(avmOpcodeAddress)]\nunconstrained fn address_opcode() -> AztecAddress {}\n\n#[oracle(avmOpcodeSender)]\nunconstrained fn sender_opcode() -> AztecAddress {}\n\n#[oracle(avmOpcodeTransactionFee)]\nunconstrained fn transaction_fee_opcode() -> Field {}\n\n#[oracle(avmOpcodeChainId)]\nunconstrained fn chain_id_opcode() -> Field {}\n\n#[oracle(avmOpcodeVersion)]\nunconstrained fn version_opcode() -> Field {}\n\n#[oracle(avmOpcodeBlockNumber)]\nunconstrained fn block_number_opcode() -> Field {}\n\n#[oracle(avmOpcodeTimestamp)]\nunconstrained fn timestamp_opcode() -> u64 {}\n\n#[oracle(avmOpcodeFeePerL2Gas)]\nunconstrained fn fee_per_l2_gas_opcode() -> Field {}\n\n#[oracle(avmOpcodeFeePerDaGas)]\nunconstrained fn fee_per_da_gas_opcode() -> Field {}\n\n#[oracle(avmOpcodeL2GasLeft)]\nunconstrained fn l2_gas_left_opcode() -> Field {}\n\n#[oracle(avmOpcodeDaGasLeft)]\nunconstrained fn da_gas_left_opcode() -> Field {}\n\n#[oracle(avmOpcodeIsStaticCall)]\nunconstrained fn is_static_call_opcode() -> Field {}\n\n#[oracle(avmOpcodeNoteHashExists)]\nunconstrained fn note_hash_exists_opcode(note_hash: Field, leaf_index: Field) -> u1 {}\n\n#[oracle(avmOpcodeEmitNoteHash)]\nunconstrained fn emit_note_hash_opcode(note_hash: Field) {}\n\n#[oracle(avmOpcodeNullifierExists)]\nunconstrained fn nullifier_exists_opcode(nullifier: Field, address: Field) -> u1 {}\n\n#[oracle(avmOpcodeEmitNullifier)]\nunconstrained fn emit_nullifier_opcode(nullifier: Field) {}\n\n// TODO(#11124): rename unencrypted to public in avm\n#[oracle(avmOpcodeEmitUnencryptedLog)]\nunconstrained fn emit_public_log_opcode(message: [Field]) {}\n\n#[oracle(avmOpcodeL1ToL2MsgExists)]\nunconstrained fn l1_to_l2_msg_exists_opcode(msg_hash: Field, msg_leaf_index: Field) -> u1 {}\n\n#[oracle(avmOpcodeSendL2ToL1Msg)]\nunconstrained fn send_l2_to_l1_msg_opcode(recipient: EthAddress, content: Field) {}\n\n#[oracle(avmOpcodeCalldataCopy)]\nunconstrained fn calldata_copy_opcode<let N: u32>(cdoffset: u32, copy_size: u32) -> [Field; N] {}\n\n#[oracle(avmOpcodeReturndataSize)]\nunconstrained fn returndata_size_opcode() -> u32 {}\n\n#[oracle(avmOpcodeReturndataCopy)]\nunconstrained fn returndata_copy_opcode(rdoffset: u32, copy_size: u32) -> [Field] {}\n\n#[oracle(avmOpcodeReturn)]\nunconstrained fn return_opcode(returndata: [Field]) {}\n\n// This opcode reverts using the exact data given. In general it should only be used\n// to do rethrows, where the revert data is the same as the original revert data.\n// For normal reverts, use Noir's `assert` which, on top of reverting, will also add\n// an error selector to the revert data.\n#[oracle(avmOpcodeRevert)]\nunconstrained fn revert_opcode(revertdata: [Field]) {}\n\n#[oracle(avmOpcodeCall)]\nunconstrained fn call_opcode(\n gas: [Field; 2], // gas allocation: [l2_gas, da_gas]\n address: AztecAddress,\n args: [Field],\n) {}\n\n#[oracle(avmOpcodeStaticCall)]\nunconstrained fn call_static_opcode(\n gas: [Field; 2], // gas allocation: [l2_gas, da_gas]\n address: AztecAddress,\n args: [Field],\n) {}\n\n#[oracle(avmOpcodeSuccessCopy)]\nunconstrained fn success_copy_opcode() -> bool {}\n\n#[oracle(avmOpcodeStorageRead)]\nunconstrained fn storage_read_opcode(storage_slot: Field) -> Field {}\n\n#[oracle(avmOpcodeStorageWrite)]\nunconstrained fn storage_write_opcode(storage_slot: Field, value: Field) {}\n"
2711
2711
  },
2712
2712
  "81": {
2713
2713
  "path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/context/returns_hash.nr",
@@ -2719,7 +2719,7 @@
2719
2719
  },
2720
2720
  "99": {
2721
2721
  "path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/hash.nr",
2722
- "source": "use crate::utils::to_bytes::{arr_to_be_bytes_arr, str_to_be_bytes_arr};\nuse dep::protocol_types::{\n address::{AztecAddress, EthAddress},\n constants::{\n GENERATOR_INDEX__FUNCTION_ARGS, GENERATOR_INDEX__MESSAGE_NULLIFIER,\n GENERATOR_INDEX__SECRET_HASH,\n },\n hash::{poseidon2_hash_with_separator, poseidon2_hash_with_separator_slice, sha256_to_field},\n point::Point,\n traits::Hash,\n};\n\npub use dep::protocol_types::hash::{compute_siloed_nullifier, pedersen_hash};\n\npub fn pedersen_commitment<let N: u32>(inputs: [Field; N], hash_index: u32) -> Point {\n std::hash::pedersen_commitment_with_separator(inputs, hash_index)\n}\n\npub fn compute_secret_hash(secret: Field) -> Field {\n poseidon2_hash_with_separator([secret], GENERATOR_INDEX__SECRET_HASH)\n}\n\npub fn compute_l1_to_l2_message_hash(\n sender: EthAddress,\n chain_id: Field,\n recipient: AztecAddress,\n version: Field,\n content: Field,\n secret_hash: Field,\n leaf_index: Field,\n) -> Field {\n let mut hash_bytes = [0 as u8; 224];\n let sender_bytes: [u8; 32] = sender.to_field().to_be_bytes();\n let chain_id_bytes: [u8; 32] = chain_id.to_be_bytes();\n let recipient_bytes: [u8; 32] = recipient.to_field().to_be_bytes();\n let version_bytes: [u8; 32] = version.to_be_bytes();\n let content_bytes: [u8; 32] = content.to_be_bytes();\n let secret_hash_bytes: [u8; 32] = secret_hash.to_be_bytes();\n let leaf_index_bytes: [u8; 32] = leaf_index.to_be_bytes();\n\n for i in 0..32 {\n hash_bytes[i] = sender_bytes[i];\n hash_bytes[i + 32] = chain_id_bytes[i];\n hash_bytes[i + 64] = recipient_bytes[i];\n hash_bytes[i + 96] = version_bytes[i];\n hash_bytes[i + 128] = content_bytes[i];\n hash_bytes[i + 160] = secret_hash_bytes[i];\n hash_bytes[i + 192] = leaf_index_bytes[i];\n }\n\n sha256_to_field(hash_bytes)\n}\n\n// The nullifier of a l1 to l2 message is the hash of the message salted with the secret\npub fn compute_l1_to_l2_message_nullifier(message_hash: Field, secret: Field) -> Field {\n poseidon2_hash_with_separator([message_hash, secret], GENERATOR_INDEX__MESSAGE_NULLIFIER)\n}\n\npub struct ArgsHasher {\n pub fields: [Field],\n}\n\nimpl Hash for ArgsHasher {\n fn hash(self) -> Field {\n hash_args(self.fields)\n }\n}\n\nimpl ArgsHasher {\n pub fn new() -> Self {\n Self { fields: [] }\n }\n\n pub fn add(&mut self, field: Field) {\n self.fields = self.fields.push_back(field);\n }\n\n pub fn add_multiple<let N: u32>(&mut self, fields: [Field; N]) {\n for i in 0..N {\n self.fields = self.fields.push_back(fields[i]);\n }\n }\n}\n\npub fn hash_args_array<let N: u32>(args: [Field; N]) -> Field {\n if args.len() == 0 {\n 0\n } else {\n poseidon2_hash_with_separator(args, GENERATOR_INDEX__FUNCTION_ARGS)\n }\n}\n\npub fn hash_args(args: [Field]) -> Field {\n if args.len() == 0 {\n 0\n } else {\n poseidon2_hash_with_separator_slice(args, GENERATOR_INDEX__FUNCTION_ARGS)\n }\n}\n\n#[test]\nunconstrained fn compute_var_args_hash() {\n let mut input = ArgsHasher::new();\n for i in 0..100 {\n input.add(i as Field);\n }\n let hash = input.hash();\n dep::std::println(hash);\n assert(hash == 0x19b0d74feb06ebde19edd85a28986c97063e84b3b351a8b666c7cac963ce655f);\n}\n"
2722
+ "source": "use dep::protocol_types::{\n address::{AztecAddress, EthAddress},\n constants::{\n GENERATOR_INDEX__FUNCTION_ARGS, GENERATOR_INDEX__MESSAGE_NULLIFIER,\n GENERATOR_INDEX__SECRET_HASH,\n },\n hash::{poseidon2_hash_with_separator, poseidon2_hash_with_separator_slice, sha256_to_field},\n point::Point,\n traits::{Hash, ToField},\n};\n\npub use dep::protocol_types::hash::{compute_siloed_nullifier, pedersen_hash};\n\npub fn pedersen_commitment<let N: u32>(inputs: [Field; N], hash_index: u32) -> Point {\n std::hash::pedersen_commitment_with_separator(inputs, hash_index)\n}\n\npub fn compute_secret_hash(secret: Field) -> Field {\n poseidon2_hash_with_separator([secret], GENERATOR_INDEX__SECRET_HASH)\n}\n\npub fn compute_l1_to_l2_message_hash(\n sender: EthAddress,\n chain_id: Field,\n recipient: AztecAddress,\n version: Field,\n content: Field,\n secret_hash: Field,\n leaf_index: Field,\n) -> Field {\n let mut hash_bytes = [0 as u8; 224];\n let sender_bytes: [u8; 32] = sender.to_field().to_be_bytes();\n let chain_id_bytes: [u8; 32] = chain_id.to_be_bytes();\n let recipient_bytes: [u8; 32] = recipient.to_field().to_be_bytes();\n let version_bytes: [u8; 32] = version.to_be_bytes();\n let content_bytes: [u8; 32] = content.to_be_bytes();\n let secret_hash_bytes: [u8; 32] = secret_hash.to_be_bytes();\n let leaf_index_bytes: [u8; 32] = leaf_index.to_be_bytes();\n\n for i in 0..32 {\n hash_bytes[i] = sender_bytes[i];\n hash_bytes[i + 32] = chain_id_bytes[i];\n hash_bytes[i + 64] = recipient_bytes[i];\n hash_bytes[i + 96] = version_bytes[i];\n hash_bytes[i + 128] = content_bytes[i];\n hash_bytes[i + 160] = secret_hash_bytes[i];\n hash_bytes[i + 192] = leaf_index_bytes[i];\n }\n\n sha256_to_field(hash_bytes)\n}\n\n// The nullifier of a l1 to l2 message is the hash of the message salted with the secret\npub fn compute_l1_to_l2_message_nullifier(message_hash: Field, secret: Field) -> Field {\n poseidon2_hash_with_separator([message_hash, secret], GENERATOR_INDEX__MESSAGE_NULLIFIER)\n}\n\npub struct ArgsHasher {\n pub fields: [Field],\n}\n\nimpl Hash for ArgsHasher {\n fn hash(self) -> Field {\n hash_args(self.fields)\n }\n}\n\nimpl ArgsHasher {\n pub fn new() -> Self {\n Self { fields: [] }\n }\n\n pub fn add(&mut self, field: Field) {\n self.fields = self.fields.push_back(field);\n }\n\n pub fn add_multiple<let N: u32>(&mut self, fields: [Field; N]) {\n for i in 0..N {\n self.fields = self.fields.push_back(fields[i]);\n }\n }\n}\n\npub fn hash_args_array<let N: u32>(args: [Field; N]) -> Field {\n if args.len() == 0 {\n 0\n } else {\n poseidon2_hash_with_separator(args, GENERATOR_INDEX__FUNCTION_ARGS)\n }\n}\n\npub fn hash_args(args: [Field]) -> Field {\n if args.len() == 0 {\n 0\n } else {\n poseidon2_hash_with_separator_slice(args, GENERATOR_INDEX__FUNCTION_ARGS)\n }\n}\n\n#[test]\nunconstrained fn compute_var_args_hash() {\n let mut input = ArgsHasher::new();\n for i in 0..100 {\n input.add(i as Field);\n }\n let hash = input.hash();\n dep::std::println(hash);\n assert(hash == 0x19b0d74feb06ebde19edd85a28986c97063e84b3b351a8b666c7cac963ce655f);\n}\n"
2723
2723
  }
2724
2724
  }
2725
2725
  }