@aztec/protocol-contracts 4.0.0-rc.5 → 4.0.0-rc.6
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
|
@@ -2327,7 +2327,7 @@
|
|
|
2327
2327
|
}
|
|
2328
2328
|
},
|
|
2329
2329
|
"bytecode": "H4sIAAAAAAAA/+1cT2wcVxnf+f9v7TRJa7usHQepICEhVXUQ4oYSO2nW2CRyGk5IZZMdzIr1rtldR7HEgYUDF5B2nVQIcaJ2TFAJVCiVUIEDEvQCiwoSVK1yqdRTe+ilf6SeOlvvzHzz3nzvzZudkRPJOW32zft9b773/fm973trZaf/i1e2OrV6rbP9fK39/PVmo721UblWd+V+96VzrVq9XltfrNTrtws73f0rtcZ63b3V6+/8/XSB/U8qcB8piAFKfMD+EHFj01v8rV6Pj7hTkHp92RMer4EH8kL3zqL3386t7v5SreVe78jd35QbHXfdbe1ePbPAl0DOl4Tm/2iVnF8Qk7/a3RvuXX8ywLm75tYrndoNVxFDkmkEVQyh0P3dcC3VSqey2NzcDl5pGa4JgO+uNm/shF9I4fPEiOyPfGP0tlOjJ0Zfr0AQ6i0Ed3RlbE1K3b0rneZmP/IGAIzY8cU7F2puvcqFLZITl8SWRQk+L7q9xPwLCRdOTXw2EPzi1WfEXezimC5aFnSM/TW3s9VqjGxvIH27+9KFZsutrTeGX7zw5lOj2HK23XZbncXmxqa30V50udSqXK+733Jb7Vqz0ev1u/dW3Y1ma/tstdpy2+1g/4OYdqDPKPqfRuDPup2rB5+8l+m4NzsPCtMkIPAtbERDR3R0xEBHTHTEQkdsdMRBR4royAQ6MomOHENHHkNHjqMjJ9CRk+jI4+jIE+jIFDqC28EMOvIkOvK5oWFFDfIR+1/EvbmPfPUrQph7V59Z+Br7W/5Kez06yZQSRtOYPD2bZOr7a1dWycQ6F7IWCvSUWJRUPS5Za1Ra296kS5svBMC7noEd7IMvCUi4V25UD2IgIXxONMRHhYciAvH0O8ukNubh0u54Kbzlxo/OYuLmaXHzoTgWZCl7yJg9LYmp9RSpoVMhS8V1N0eOnQ4JS6yNFEgbKcAV+1n3WpTzgWcKNJME67p3IPIzD7m0eRtA75//wVal3o5hoBdo1c0JcZYCapAjoR4IfElonctbG5vl70Ktn/GVIB8jX7X0sHpwKT8PLj2UHixlDymPfZhJ58GlLD1Yzs+DZZYHI7tRinNAme2ApWXggN4nYkdCkjjK9eQjxwEnRB45CYge8sgUYHyjRwitTTOCgaA/TosHgxIeDKYzCgYl2pWm0WAwC5dGudksPC0h4mZpcbMMz52Fx6zMIfXsIY3sIc3sIa3sIe3sIZ3sIYvZQ05kDzmZPeSx7CEfyx5Szh7yRPaQx7OHfDx7yCeyhzyZPeRU9pAz2UM+iZbPpcRJPRRE9QSS1Bo+OfHR2+QqNAY50cX4wYw4OdFxcqJlRE50esc0lJwYcGnUbhoJyIlBizMYBmJwmfER4BHgEeAR4BHgEeDhA1JjMkyr415VmKIRNNECCZHRlbCtvjesIPX/9SrKFO6ueC23575XaURVE7kdQZeh9IG07GP/tbu30qxU4ShUVZ4M0OAwwGn/A7kKk8EALTHta+IM0MIZoJkRA7RoazdRBmjDpVHWbnNdy6aF2QzXehQAQRxgub8ZY5NiO2jwnfe/2FuZfOc1YpzXHEiaj/0/ynkV+KKYYFqdSnglhkQ0oL6S26sOQxCJaUa8CavKq0NUZCGRBoACX4S4o6OKxgO/QH+CPmmNIDUBxRqhYilLNBMczlQGZJm1+6rAInWYvEhMFS4Y3Sstulcx1/PovTLy2yuFu1cqwwnK9F6pCVWkCMhTGTGMdb9RZaQ/Lff0p+HpT80o/WmMvZEFqiZAwXfP1SvXv3+uebN7/3Kz7daqzcbCZbe1sdXxnmw2dmB9SYVkSGVmENTLFMZq6BgbudWJmbI0NlmVxXdbxXdbyWi3VfZuwzuMfxzdYRzuSGXdXXMr1X73txfdyubZVquyDX1E6nfvHHxJ3IqUbqM31mT8Lhs6IiGXMS/eHve+GaIuWSh7S/DtyEawAp8Dt1JYrWkFaSpHBAGs4M4rTgFkAd5n4q9qQQaIIq5u1RHlLWGTHISo2TAo0kTNGUjFIEN9EQMvxqVjXqyboCcV4bpI1ThgKp7Di9EcbsH5WA4388vhFjeHO7QaLAbfcqC2UkCWWUbsCCDa4SIxq/i9b3IHl0xQw3NiDK84kGYDtX4JFYFYtcO2ag98nm/VE2msepKeNAHXRWofmPwkbtVO1KpNOB+zais/qza5Vl1kRL0YZlpMZ4NmGPYYgTSVVZfzsuqn+VZtp7NqeyAtHEqspq3aThSrHTRW2w9nrLYZgXWJWcNx2OWD5Mdck3HesuBjAuVGO/fzlp1/uZG1N3KamCJ03rLhectRORW7VDUt6kgFAHllOp2JnHw501yNxlZ9gVBGZc5Kxa8tJFjq7GBpDaQ1ECzzCjczeYUbWSipAa2wGCW70mwxTFAP2zxjKezmanxwUaK7PPq2EAoJdtifMJAqVNAJAhP8wRO+pLf+8eH/7y8vbHT3nmtVhr9gpfpB9I8hySMlKKvJo1MnXe/i9JAk/wOeSvXhmTBWqsaovAm3vwRuMRm5JxUj/1tMhsgtJpPpSCa3QySY7R8FQFbcidgoWkRdqt2ICpRDwsVrWw2k7TGazlp80/m1APyH6VaNpmiqqqNxJym7V7aukZKA0rEF7sedXYD+dr/ZjN5IDKcOS2u0YrSB9HKgmJ/gimEtF207GMwjV6RbSK/MGEg/DZLwl1n8QxXgNAZewktC7DHSAnY8lrL8nH++iyEN0pikQWOfrtGkZKNVC+sw+mn8qoXFrNWyzls2M76hjN+IpTUXIz4ZZ9G/CnztZYHUZSZquhppkiF6iLCYvqtFPCrO4n/NL5doiDMZLGfyAtYe35msNM4US9vBqkjda9CMUGeS0Oa0dhjFEn5zWhNrTmtQxSxnUvi2L8XmNznMb1hb6sVLrchPISN35mkjkgfS/WA1f2P1rVRWu1QSaJPJDL4VaV/hl97G/Ys+Kai6glN1OSOqrqRxVY2pYIH6jwLrP5rKNGA5qcmkeFOxtjw0GKzHqSdYkcmoKae7jGWm6XHaNO82uZOsfU4dX4lPTP8OYuPToizP5LC8/xwKyzOzYXlGEpanH+YNN0vshluSlrwldMNNh+CpqChmFUyyFeHfse2jt9P3piyWTXvQ7/Bt2klj0zHtLAeuitGZKuI2bUVtWofzD+HkoqcpFesMsmWns0Ad77caY9p0OS+b/oBv02YamzYH0seHEqct9g2OpDad6Cay/rDeRF5iVhstVsg1BJpkOoNtR360ijlsDNs2c2fbJs629YzYtsn8KVOKiCLEtk3Iti0229bT9UT5ra5hdXnMBtOrf/78Gz8+M1NN0GA6sOfR13roqrHGYUBOS86RqV6ZMZCn/JeSZ6LBQAtF+U98AXlCuJ+E/I0ti5yghBMiku3wgcj3DhZaRl8XY9QTYFmUeooD+SliA8xwmm97pGwzXrZNvpyNuY0PSE5wwgn+jsxhhijaB/PNbUy7fse8fF5+5WfzfLseU9Drxnsf/PO19V7ugkp/cV//+oN3H+QuSFNLvzz9h++scAV9CouLWy7KXAAA",
|
|
2330
|
-
"debug_symbols": "
|
|
2330
|
+
"debug_symbols": "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"
|
|
2331
2331
|
}
|
|
2332
2332
|
],
|
|
2333
2333
|
"outputs": {
|
|
@@ -2654,7 +2654,7 @@
|
|
|
2654
2654
|
},
|
|
2655
2655
|
"309": {
|
|
2656
2656
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/noir-protocol-circuits/crates/types/src/abis/block_header.nr",
|
|
2657
|
-
"source": "use crate::{\n abis::{\n append_only_tree_snapshot::AppendOnlyTreeSnapshot, global_variables::GlobalVariables,\n state_reference::StateReference,\n },\n constants::{BLOCK_HEADER_LENGTH, DOM_SEP__BLOCK_HEADER_HASH, GENESIS_BLOCK_HEADER_HASH},\n hash::poseidon2_hash_with_separator,\n traits::{Deserialize, Empty, Hash, Serialize},\n};\nuse std::meta::derive;\n\n// docs:start:block-header\n#[derive(Deserialize, Eq, Serialize)]\npub struct BlockHeader {\n pub last_archive: AppendOnlyTreeSnapshot,\n pub state: StateReference,\n\n // The hash of the sponge blob for this block, which commits to the tx effects added in this block.\n // Note: it may also include tx effects from previous blocks within the same checkpoint.\n // When proving tx effects from this block only, we must refer to the `sponge_blob_hash` in the previous block\n // header to show that the effect was added after the previous block.\n // The previous block header can be validated using a membership proof of the last leaf in `last_archive`.\n pub sponge_blob_hash: Field,\n\n pub global_variables: GlobalVariables,\n pub total_fees: Field,\n pub total_mana_used: Field,\n}\n// docs:end:block-header\n\nimpl Empty for BlockHeader {\n fn empty() -> Self {\n Self {\n last_archive: AppendOnlyTreeSnapshot::empty(),\n state: StateReference::empty(),\n sponge_blob_hash: 0,\n global_variables: GlobalVariables::empty(),\n total_fees: 0,\n total_mana_used: 0,\n }\n }\n}\n\nimpl Hash for BlockHeader {\n fn hash(self) -> Field {\n poseidon2_hash_with_separator(self.serialize(), DOM_SEP__BLOCK_HEADER_HASH)\n }\n}\n\n#[test]\nfn serialization_of_empty() {\n let header = BlockHeader::empty();\n // We use the BLOCK_HEADER_LENGTH constant to ensure that there is a match\n // between the derived trait implementation and the constant.\n let serialized: [Field; BLOCK_HEADER_LENGTH] = header.serialize();\n let deserialized = BlockHeader::deserialize(serialized);\n assert(header.eq(deserialized));\n}\n\n#[test]\nfn hash_of_genesis_block_header() {\n let mut header = BlockHeader::empty();\n // The following values are taken from world_state.test.cpp > WorldStateTest.GetInitialTreeInfoForAllTrees.\n header.state.l1_to_l2_message_tree.root =\n 0x0d582c10ff8115413aa5b70564fdd2f3cefe1f33a1e43a47bc495081e91e73e5;\n header.state.partial.note_hash_tree.root =\n 0x2ac5dda169f6bb3b9ca09bbac34e14c94d1654597db740153a1288d859a8a30a;\n header.state.partial.nullifier_tree.root =\n 0x1ec3788cd1c32e54d889d67fe29e481114f9d4afe9b44b229aa29d8ad528dd31;\n header.state.partial.nullifier_tree.next_available_leaf_index = 128;\n header.state.partial.public_data_tree.root =\n 0x23c08a6b1297210c5e24c76b9a936250a1ce2721576c26ea797c7ec35f9e46a9;\n header.state.partial.public_data_tree.next_available_leaf_index = 128;\n\n let hash = header.hash();\n assert_eq(hash, GENESIS_BLOCK_HEADER_HASH);\n}\n\n#[test]\nfn hash_of_empty_block_header_match_typescript() {\n let header = BlockHeader::empty();\n let hash = header.hash();\n\n // Value from block_header.test.ts \"computes empty hash\" test\n let test_data_empty_hash = 0x0bdc537052dea0f80db9698585dff9f32063b86b6d4934ac17c30c81e8e416d3;\n assert_eq(hash, test_data_empty_hash);\n}\n"
|
|
2657
|
+
"source": "use crate::{\n abis::{\n append_only_tree_snapshot::AppendOnlyTreeSnapshot, global_variables::GlobalVariables,\n state_reference::StateReference,\n },\n constants::{BLOCK_HEADER_LENGTH, DOM_SEP__BLOCK_HEADER_HASH, GENESIS_BLOCK_HEADER_HASH},\n hash::poseidon2_hash_with_separator,\n traits::{Deserialize, Empty, Hash, Serialize},\n};\nuse std::meta::derive;\n\n// docs:start:block-header\n#[derive(Deserialize, Eq, Serialize)]\npub struct BlockHeader {\n pub last_archive: AppendOnlyTreeSnapshot,\n pub state: StateReference,\n\n // The hash of the sponge blob for this block, which commits to the tx effects added in this block.\n // Note: it may also include tx effects from previous blocks within the same checkpoint.\n // When proving tx effects from this block only, we must refer to the `sponge_blob_hash` in the previous block\n // header to show that the effect was added after the previous block.\n // The previous block header can be validated using a membership proof of the last leaf in `last_archive`.\n pub sponge_blob_hash: Field,\n\n pub global_variables: GlobalVariables,\n pub total_fees: Field,\n pub total_mana_used: Field,\n}\n// docs:end:block-header\n\nimpl BlockHeader {\n pub fn chain_id(self) -> Field {\n self.global_variables.chain_id\n }\n\n pub fn version(self) -> Field {\n self.global_variables.version\n }\n\n pub fn block_number(self) -> u32 {\n self.global_variables.block_number\n }\n\n pub fn timestamp(self) -> u64 {\n self.global_variables.timestamp\n }\n}\n\nimpl Empty for BlockHeader {\n fn empty() -> Self {\n Self {\n last_archive: AppendOnlyTreeSnapshot::empty(),\n state: StateReference::empty(),\n sponge_blob_hash: 0,\n global_variables: GlobalVariables::empty(),\n total_fees: 0,\n total_mana_used: 0,\n }\n }\n}\n\nimpl Hash for BlockHeader {\n fn hash(self) -> Field {\n poseidon2_hash_with_separator(self.serialize(), DOM_SEP__BLOCK_HEADER_HASH)\n }\n}\n\n#[test]\nfn serialization_of_empty() {\n let header = BlockHeader::empty();\n // We use the BLOCK_HEADER_LENGTH constant to ensure that there is a match\n // between the derived trait implementation and the constant.\n let serialized: [Field; BLOCK_HEADER_LENGTH] = header.serialize();\n let deserialized = BlockHeader::deserialize(serialized);\n assert(header.eq(deserialized));\n}\n\n#[test]\nfn hash_of_genesis_block_header() {\n let mut header = BlockHeader::empty();\n // The following values are taken from world_state.test.cpp > WorldStateTest.GetInitialTreeInfoForAllTrees.\n header.state.l1_to_l2_message_tree.root =\n 0x0d582c10ff8115413aa5b70564fdd2f3cefe1f33a1e43a47bc495081e91e73e5;\n header.state.partial.note_hash_tree.root =\n 0x2ac5dda169f6bb3b9ca09bbac34e14c94d1654597db740153a1288d859a8a30a;\n header.state.partial.nullifier_tree.root =\n 0x1ec3788cd1c32e54d889d67fe29e481114f9d4afe9b44b229aa29d8ad528dd31;\n header.state.partial.nullifier_tree.next_available_leaf_index = 128;\n header.state.partial.public_data_tree.root =\n 0x23c08a6b1297210c5e24c76b9a936250a1ce2721576c26ea797c7ec35f9e46a9;\n header.state.partial.public_data_tree.next_available_leaf_index = 128;\n\n let hash = header.hash();\n assert_eq(hash, GENESIS_BLOCK_HEADER_HASH);\n}\n\n#[test]\nfn hash_of_empty_block_header_match_typescript() {\n let header = BlockHeader::empty();\n let hash = header.hash();\n\n // Value from block_header.test.ts \"computes empty hash\" test\n let test_data_empty_hash = 0x0bdc537052dea0f80db9698585dff9f32063b86b6d4934ac17c30c81e8e416d3;\n assert_eq(hash, test_data_empty_hash);\n}\n"
|
|
2658
2658
|
},
|
|
2659
2659
|
"387": {
|
|
2660
2660
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/noir-protocol-circuits/crates/types/src/hash.nr",
|
|
@@ -1878,7 +1878,7 @@
|
|
|
1878
1878
|
}
|
|
1879
1879
|
},
|
|
1880
1880
|
"bytecode": "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",
|
|
1881
|
-
"debug_symbols": "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",
|
|
1881
|
+
"debug_symbols": "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",
|
|
1882
1882
|
"verification_key": "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"
|
|
1883
1883
|
},
|
|
1884
1884
|
{
|
|
@@ -2743,11 +2743,11 @@
|
|
|
2743
2743
|
},
|
|
2744
2744
|
"70": {
|
|
2745
2745
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/context/private_context.nr",
|
|
2746
|
-
"source": "use crate::{\n context::{inputs::PrivateContextInputs, NoteExistenceRequest, NullifierExistenceRequest, ReturnsHash},\n hash::{hash_args, hash_calldata_array},\n keys::constants::{NULLIFIER_INDEX, NUM_KEY_TYPES, OUTGOING_INDEX, public_key_domain_separators},\n messaging::process_l1_to_l2_message,\n oracle::{\n block_header::get_block_header_at,\n call_private_function::call_private_function_internal,\n enqueue_public_function_call::{\n is_side_effect_counter_revertible_oracle_wrapper, notify_enqueued_public_function_call,\n notify_set_min_revertible_side_effect_counter, notify_set_public_teardown_function_call,\n },\n execution_cache,\n key_validation_request::get_key_validation_request,\n logs::notify_created_contract_class_log,\n notes::notify_nullified_note,\n nullifiers::notify_created_nullifier,\n },\n};\nuse crate::protocol::{\n abis::{\n block_header::BlockHeader,\n call_context::CallContext,\n function_selector::FunctionSelector,\n gas_settings::GasSettings,\n log_hash::LogHash,\n note_hash::NoteHash,\n nullifier::Nullifier,\n private_call_request::PrivateCallRequest,\n private_circuit_public_inputs::PrivateCircuitPublicInputs,\n private_log::{PrivateLog, PrivateLogData},\n public_call_request::PublicCallRequest,\n validation_requests::{KeyValidationRequest, KeyValidationRequestAndSeparator},\n },\n address::{AztecAddress, EthAddress},\n constants::{\n CONTRACT_CLASS_LOG_SIZE_IN_FIELDS, MAX_CONTRACT_CLASS_LOGS_PER_CALL, MAX_ENQUEUED_CALLS_PER_CALL,\n MAX_KEY_VALIDATION_REQUESTS_PER_CALL, MAX_L2_TO_L1_MSGS_PER_CALL, MAX_NOTE_HASH_READ_REQUESTS_PER_CALL,\n MAX_NOTE_HASHES_PER_CALL, MAX_NULLIFIER_READ_REQUESTS_PER_CALL, MAX_NULLIFIERS_PER_CALL,\n MAX_PRIVATE_CALL_STACK_LENGTH_PER_CALL, MAX_PRIVATE_LOGS_PER_CALL, MAX_TX_LIFETIME,\n NULL_MSG_SENDER_CONTRACT_ADDRESS, PRIVATE_LOG_SIZE_IN_FIELDS,\n },\n hash::poseidon2_hash,\n messaging::l2_to_l1_message::L2ToL1Message,\n side_effect::{Counted, scoped::Scoped},\n traits::{Empty, Hash, ToField},\n utils::arrays::{ClaimedLengthArray, trimmed_array_length_hint},\n};\n\n/// # PrivateContext\n///\n/// The **main interface** between an #[external(\"private\")] function and the Aztec blockchain.\n///\n/// An instance of the PrivateContext is initialized automatically at the outset of every private function, within the\n/// #[external(\"private\")] macro, so you'll never need to consciously instantiate this yourself.\n///\n/// The instance is always named `context`, and it is always be available within the body of every\n/// #[external(\"private\")] function in your smart contract.\n///\n/// > For those used to \"vanilla\" Noir, it might be jarring to have access to > `context` without seeing a declaration\n/// `let context = PrivateContext::new(...)` > within the body of your function. This is just a consequence of using >\n/// macros to tidy-up verbose boilerplate. You can use `nargo expand` to > expand all macros, if you dare.\n///\n/// Typical usage for a smart contract developer will be to call getter methods of the PrivateContext.\n///\n/// _Pushing_ data and requests to the context is mostly handled within aztec-nr's own functions, so typically a smart\n/// contract developer won't need to call any setter methods directly.\n///\n/// > Advanced users might occasionally wish to push data to the context > directly for lower-level control. If you\n/// find yourself doing this, please > open an issue on GitHub to describe your use case: it might be that > new\n/// functionality should be added to aztec-nr.\n///\n/// ## Responsibilities\n/// - Exposes contextual data to a private function:\n/// - Data relating to how this private function was called.\n/// - msg_sender\n/// - this_address - (the contract address of the private function being executed)\n/// - See `CallContext` for more data.\n/// - Data relating to the transaction in which this private function is being executed.\n/// - chain_id\n/// - version\n/// - gas_settings\n/// - Provides state access:\n/// - Access to the \"Anchor block\" header. Recall, a private function cannot read from the \"current\" block header, but\n/// must read from some historical block header, because as soon as private function execution begins (asynchronously,\n/// on a user's device), the public state of the chain (the \"current state\") will have progressed forward. We call this\n/// reference the \"Anchor block\". See `BlockHeader`.\n/// - Enables consumption of L1->L2 messages.\n/// - Enables calls to functions of other smart contracts:\n/// - Private function calls\n/// - Enqueueing of public function call requests (Since public functions are executed at a later time, by a block\n/// proposer, we say they are \"enqueued\").\n/// - Writes data to the blockchain:\n/// - New notes\n/// - New nullifiers\n/// - Private logs (for sending encrypted note contents or encrypted events)\n/// - New L2->L1 messages.\n/// - Provides args to the private function (handled by the #[external(\"private\")] macro).\n/// - Returns the return values of this private function (handled by the\n/// #[external(\"private\")] macro).\n/// - Makes Key Validation Requests.\n/// - Private functions are not allowed to see master secret keys, because we do not trust them. They are instead given\n/// \"app-siloed\" secret keys with a claim that they relate to a master public key. They can then request validation of\n/// this claim, by making a \"key validation request\" to the protocol's kernel circuits (which _are_ allowed to see\n/// certain master secret keys).\n///\n/// ## Advanced Responsibilities\n///\n/// - Ultimately, the PrivateContext is responsible for constructing the PrivateCircuitPublicInputs of the private\n/// function being executed. All private functions on Aztec must have public inputs which adhere to the rigid layout of\n/// the PrivateCircuitPublicInputs, in order to be compatible with the protocol's kernel circuits. A well-known\n/// misnomer:\n/// - \"public inputs\" contain both inputs and outputs of this function.\n/// - By \"outputs\" we mean a lot more side-effects than just the \"return values\" of the function.\n/// - Most of the so-called \"public inputs\" are kept _private_, and never leak to the outside world, because they are\n/// 'swallowed' by the protocol's kernel circuits before the tx is sent to the network. Only the following are exposed\n/// to the outside world:\n/// - New note_hashes\n/// - New nullifiers\n/// - New private logs\n/// - New L2->L1 messages\n/// - New enqueued public function call requests All the above-listed arrays of side-effects can be padded by the\n/// user's wallet (through instructions to the kernel circuits, via the PXE) to obscure their true lengths.\n///\n/// ## Syntax Justification\n///\n/// Both user-defined functions _and_ most functions in aztec-nr need access to the PrivateContext instance to\n/// read/write data. This is why you'll see the arguably-ugly pervasiveness of the \"context\" throughout your smart\n/// contract and the aztec-nr library. For example, `&mut context` is prevalent. In some languages, you can access and\n/// mutate a global variable (such as a PrivateContext instance) from a function without polluting the function's\n/// parameters. With Noir, a function must explicitly pass control of a mutable variable to another function, by\n/// reference. Since many functions in aztec-nr need to be able to push new data to the PrivateContext, they need to be\n/// handed a mutable reference _to_ the context as a parameter. For example, `Context` is prevalent as a generic\n/// parameter, to give better type safety at compile time. Many `aztec-nr` functions don't make sense if they're called\n/// in a particular runtime (private, public or utility), and so are intentionally only implemented over certain\n/// [Private|Public|Utility]Context structs. This gives smart contract developers a much faster feedback loop if\n/// they're making a mistake, as an error will be thrown by the LSP or when they compile their contract.\n///\n#[derive(Eq)]\npub struct PrivateContext {\n // docs:start:private-context\n pub inputs: PrivateContextInputs,\n pub side_effect_counter: u32,\n\n pub min_revertible_side_effect_counter: u32,\n pub is_fee_payer: bool,\n\n pub args_hash: Field,\n pub return_hash: Field,\n\n pub expiration_timestamp: u64,\n\n pub(crate) note_hash_read_requests: BoundedVec<Scoped<Counted<Field>>, MAX_NOTE_HASH_READ_REQUESTS_PER_CALL>,\n pub(crate) nullifier_read_requests: BoundedVec<Scoped<Counted<Field>>, MAX_NULLIFIER_READ_REQUESTS_PER_CALL>,\n key_validation_requests_and_separators: BoundedVec<KeyValidationRequestAndSeparator, MAX_KEY_VALIDATION_REQUESTS_PER_CALL>,\n\n pub note_hashes: BoundedVec<Counted<NoteHash>, MAX_NOTE_HASHES_PER_CALL>,\n pub nullifiers: BoundedVec<Counted<Nullifier>, MAX_NULLIFIERS_PER_CALL>,\n\n pub private_call_requests: BoundedVec<PrivateCallRequest, MAX_PRIVATE_CALL_STACK_LENGTH_PER_CALL>,\n pub public_call_requests: BoundedVec<Counted<PublicCallRequest>, MAX_ENQUEUED_CALLS_PER_CALL>,\n pub public_teardown_call_request: PublicCallRequest,\n pub l2_to_l1_msgs: BoundedVec<Counted<L2ToL1Message>, MAX_L2_TO_L1_MSGS_PER_CALL>,\n // docs:end:private-context\n\n // Header of a block whose state is used during private execution (not the block the transaction is included in).\n pub anchor_block_header: BlockHeader,\n\n pub private_logs: BoundedVec<Counted<PrivateLogData>, MAX_PRIVATE_LOGS_PER_CALL>,\n pub contract_class_logs_hashes: BoundedVec<Counted<LogHash>, MAX_CONTRACT_CLASS_LOGS_PER_CALL>,\n\n // Contains the last key validation request for each key type. This is used to cache the last request and avoid\n // fetching the same request multiple times. The index of the array corresponds to the key type (0 nullifier, 1\n // incoming, 2 outgoing, 3 tagging).\n pub last_key_validation_requests: [Option<KeyValidationRequest>; NUM_KEY_TYPES],\n\n pub expected_non_revertible_side_effect_counter: u32,\n pub expected_revertible_side_effect_counter: u32,\n}\n\nimpl PrivateContext {\n pub fn new(inputs: PrivateContextInputs, args_hash: Field) -> PrivateContext {\n PrivateContext {\n inputs,\n side_effect_counter: inputs.start_side_effect_counter + 1,\n min_revertible_side_effect_counter: 0,\n is_fee_payer: false,\n args_hash,\n return_hash: 0,\n expiration_timestamp: inputs.anchor_block_header.global_variables.timestamp + MAX_TX_LIFETIME,\n note_hash_read_requests: BoundedVec::new(),\n nullifier_read_requests: BoundedVec::new(),\n key_validation_requests_and_separators: BoundedVec::new(),\n note_hashes: BoundedVec::new(),\n nullifiers: BoundedVec::new(),\n anchor_block_header: inputs.anchor_block_header,\n private_call_requests: BoundedVec::new(),\n public_call_requests: BoundedVec::new(),\n public_teardown_call_request: PublicCallRequest::empty(),\n l2_to_l1_msgs: BoundedVec::new(),\n private_logs: BoundedVec::new(),\n contract_class_logs_hashes: BoundedVec::new(),\n last_key_validation_requests: [Option::none(); NUM_KEY_TYPES],\n expected_non_revertible_side_effect_counter: 0,\n expected_revertible_side_effect_counter: 0,\n }\n }\n\n /// Returns the contract address that initiated this function call.\n ///\n /// This is similar to `msg.sender` in Solidity (hence the name).\n ///\n /// Important Note: Since Aztec doesn't have a concept of an EoA (Externally-owned Account), the msg_sender is\n /// \"none\" for the first function call of every transaction. The first function call of a tx is likely to be a call\n /// to the user's account contract, so this quirk will most often be handled by account contract developers.\n ///\n /// # Returns\n /// * `Option<AztecAddress>` - The address of the smart contract that called this function (be it an app contract\n /// or a user's account contract). Returns `Option<AztecAddress>::none` for the first function call of the tx. No\n /// other _private_ function calls in the tx will have a `none` msg_sender, but _public_ function calls might (see\n /// the PublicContext).\n pub fn maybe_msg_sender(self) -> Option<AztecAddress> {\n let maybe_msg_sender = self.inputs.call_context.msg_sender;\n if maybe_msg_sender == NULL_MSG_SENDER_CONTRACT_ADDRESS {\n Option::none()\n } else {\n Option::some(maybe_msg_sender)\n }\n }\n\n /// Returns the contract address of the current function being executed.\n ///\n /// This is equivalent to `address(this)` in Solidity (hence the name). Use this to identify the current contract's\n /// address, commonly needed for access control or when interacting with other contracts.\n ///\n /// # Returns\n /// * `AztecAddress` - The contract address of the current function being executed.\n ///\n pub fn this_address(self) -> AztecAddress {\n self.inputs.call_context.contract_address\n }\n\n /// Returns the chain ID of the current network.\n ///\n /// This is similar to `block.chainid` in Solidity. Returns the unique identifier for the blockchain network this\n /// transaction is executing on.\n ///\n /// Helps prevent cross-chain replay attacks. Useful if implementing multi-chain contract logic.\n ///\n /// # Returns\n /// * `Field` - The chain ID as a field element\n ///\n pub fn chain_id(self) -> Field {\n self.inputs.tx_context.chain_id\n }\n\n /// Returns the Aztec protocol version that this transaction is executing under. Different versions may have\n /// different rules, opcodes, or cryptographic primitives.\n ///\n /// This is similar to how Ethereum has different EVM versions.\n ///\n /// Useful for forward/backward compatibility checks\n ///\n /// Not to be confused with contract versions; this is the protocol version.\n ///\n /// # Returns\n /// * `Field` - The protocol version as a field element\n ///\n pub fn version(self) -> Field {\n self.inputs.tx_context.version\n }\n\n /// Returns the gas settings for the current transaction.\n ///\n /// This provides information about gas limits and pricing for the transaction, similar to `tx.gasprice` and gas\n /// limits in Ethereum. However, Aztec has a more sophisticated gas model with separate accounting for L2\n /// computation and data availability (DA) costs.\n ///\n /// # Returns\n /// * `GasSettings` - Struct containing gas limits and fee information\n ///\n pub fn gas_settings(self) -> GasSettings {\n self.inputs.tx_context.gas_settings\n }\n\n /// Returns the function selector of the currently executing function.\n ///\n /// Low-level function: Ordinarily, smart contract developers will not need to access this.\n ///\n /// This is similar to `msg.sig` in Solidity, which returns the first 4 bytes of the function signature. In Aztec,\n /// the selector uniquely identifies which function within the contract is being called.\n ///\n /// # Returns\n /// * `FunctionSelector` - The 4-byte function identifier\n ///\n /// # Advanced\n /// Only #[external(\"private\")] functions have a function selector as a protocol- enshrined concept. The function\n /// selectors of private functions are baked into the preimage of the contract address, and are used by the\n /// protocol's kernel circuits to identify each private function and ensure the correct one is being executed.\n ///\n /// Used internally for function dispatch and call verification.\n ///\n pub fn selector(self) -> FunctionSelector {\n self.inputs.call_context.function_selector\n }\n\n /// Returns the hash of the arguments passed to the current function.\n ///\n /// Very low-level function: You shouldn't need to call this. The #[external(\"private\")] macro calls this, and it\n /// makes the arguments neatly available to the body of your private function.\n ///\n /// # Returns\n /// * `Field` - Hash of the function arguments\n ///\n /// # Advanced\n /// * Arguments are hashed to reduce proof size and verification time\n /// * Enables efficient argument passing in recursive function calls\n /// * The hash can be used to retrieve the original arguments from the PXE.\n ///\n pub fn get_args_hash(self) -> Field {\n self.args_hash\n }\n\n /// Pushes a new note_hash to the Aztec blockchain's global Note Hash Tree (a state tree).\n ///\n /// A note_hash is a commitment to a piece of private state.\n ///\n /// Low-level function: Ordinarily, smart contract developers will not need to manually call this. Aztec-nr's state\n /// variables (see `../state_vars/`) are designed to understand when to create and push new note hashes.\n ///\n /// # Arguments\n /// * `note_hash` - The new note_hash.\n ///\n /// # Advanced\n /// From here, the protocol's kernel circuits will take over and insert the note_hash into the protocol's \"note\n /// hash tree\" (in the Base Rollup circuit). Before insertion, the protocol will:\n /// - \"Silo\" the `note_hash` with the contract address of this function, to yield a `siloed_note_hash`. This\n /// prevents state collisions between different smart contracts.\n /// - Ensure uniqueness of the `siloed_note_hash`, to prevent Faerie-Gold attacks, by hashing the\n /// `siloed_note_hash` with a unique value, to yield a `unique_siloed_note_hash` (see the protocol spec for more).\n ///\n /// In addition to calling this function, aztec-nr provides the contents of the newly-created note to the PXE, via\n /// the `notify_created_note` oracle.\n ///\n /// > Advanced users might occasionally wish to push data to the context > directly for lower-level control. If you\n /// find yourself doing this, > please open an issue on GitHub to describe your use case: it might be > that new\n /// functionality should be added to aztec-nr.\n ///\n pub fn push_note_hash(&mut self, note_hash: Field) {\n self.note_hashes.push(Counted::new(note_hash, self.next_counter()));\n }\n\n /// Pushes a new nullifier to the Aztec blockchain's global Nullifier Tree (a state tree).\n ///\n /// See also: `push_nullifier_for_note_hash`.\n ///\n /// Low-level function: Ordinarily, smart contract developers will not need to manually call this. Aztec-nr's state\n /// variables (see `../state_vars/`) are designed to understand when to create and push new nullifiers.\n ///\n /// A nullifier can only be emitted once. Duplicate nullifier insertions are rejected by the protocol.\n ///\n /// Generally, a nullifier is emitted to prevent an action from happening more than once, in such a way that the\n /// action cannot be linked (by an observer of the blockchain) to any earlier transactions.\n ///\n /// I.e. a nullifier is a random-looking, but deterministic record of a private, one-time action, which does not\n /// leak what action has been taken, and which preserves the property of \"tx unlinkability\".\n ///\n /// Usually, a nullifier will be emitted to \"spend\" a note (a piece of private state), without revealing which\n /// specific note is being spent.\n ///\n /// (Important: in such cases, use the below `push_nullifier_for_note_hash`).\n ///\n /// Sometimes, a nullifier might be emitted completely unrelated to any notes. Examples include initialization of a\n /// new contract; initialization of a PrivateMutable, or signalling in Semaphore-like applications. This\n /// `push_nullifier` function serves such use cases.\n ///\n /// # Arguments\n /// * `nullifier`\n ///\n /// # Advanced\n /// From here, the protocol's kernel circuits will take over and insert the nullifier into the protocol's\n /// \"nullifier tree\" (in the Base Rollup circuit). Before insertion, the protocol will:\n /// - \"Silo\" the `nullifier` with the contract address of this function, to yield a `siloed_nullifier`. This\n /// prevents state collisions between different smart contracts.\n /// - Ensure the `siloed_nullifier` is unique (the nullifier tree is an indexed merkle tree which supports\n /// efficient non-membership proofs).\n ///\n pub fn push_nullifier(&mut self, nullifier: Field) {\n notify_created_nullifier(nullifier);\n self.nullifiers.push(Nullifier { value: nullifier, note_hash: 0 }.count(self.next_counter()));\n }\n\n /// Pushes a nullifier that corresponds to a specific note hash.\n ///\n /// Low-level function: Ordinarily, smart contract developers will not need to manually call this. Aztec-nr's state\n /// variables (see `../state_vars/`) are designed to understand when to create and push new nullifiers.\n ///\n /// This is a specialized version of `push_nullifier` that links a nullifier to the specific note hash it's\n /// nullifying. This is the most common usage pattern for nullifiers. See `push_nullifier` for more explanation on\n /// nullifiers.\n ///\n /// # Arguments\n /// * `nullifier`\n /// * `nullified_note_hash` - The note hash of the note being nullified\n ///\n /// # Advanced\n ///Important: usage of this function doesn't mean that the world will _see_ that this nullifier relates to the\n /// given nullified_note_hash (as that would violate \"tx unlinkability\"); it simply informs the user's PXE about\n /// the relationship (via `notify_nullified_note`). The PXE can then use this information to feed hints to the\n /// kernel circuits for \"squashing\" purposes: If a note is nullified during the same tx which created it, we can\n /// \"squash\" (delete) the note and nullifier (and any private logs associated with the note), to save on data\n /// emission costs.\n ///\n pub fn push_nullifier_for_note_hash(&mut self, nullifier: Field, nullified_note_hash: Field) {\n let nullifier_counter = self.next_counter();\n notify_nullified_note(nullifier, nullified_note_hash, nullifier_counter);\n self.nullifiers.push(Nullifier { value: nullifier, note_hash: nullified_note_hash }.count(nullifier_counter));\n }\n\n /// Returns the anchor block header - the historical block header that this private function is reading from.\n ///\n /// A private function CANNOT read from the \"current\" block header, but must read from some older block header,\n /// because as soon as private function execution begins (asynchronously, on a user's device), the public state of\n /// the chain (the \"current state\") will have progressed forward.\n ///\n /// # Returns\n /// * `BlockHeader` - The anchor block header.\n ///\n /// # Advanced\n /// * All private functions of a tx read from the same anchor block header.\n /// * The protocol asserts that the `expiration_timestamp` of every tx is at most 24 hours beyond the timestamp of\n /// the tx's chosen anchor block header. This enables the network's nodes to safely prune old txs from the mempool.\n /// Therefore, the chosen block header _must_ be one from within the last 24 hours.\n ///\n pub fn get_anchor_block_header(self) -> BlockHeader {\n self.anchor_block_header\n }\n\n /// Returns the header of any historical block at or before the anchor block.\n ///\n /// This enables private contracts to access information from even older blocks than the anchor block header.\n ///\n /// Useful for time-based contract logic that needs to compare against multiple historical points.\n ///\n /// # Arguments\n /// * `block_number` - The block number to retrieve (must be <= anchor block number)\n ///\n /// # Returns\n /// * `BlockHeader` - The header of the requested historical block\n ///\n /// # Advanced\n /// This function uses an oracle to fetch block header data from the user's PXE. Depending on how much blockchain\n /// data the user's PXE has been set up to store, this might require a query from the PXE to another Aztec node to\n /// get the data. > This is generally true of all oracle getters (see `../oracle`).\n ///\n /// Each block header gets hashed and stored as a leaf in the protocol's Archive Tree. In fact, the i-th block\n /// header gets stored at the i-th leaf index of the Archive Tree. Behind the scenes, this `get_block_header_at`\n /// function will add Archive Tree merkle-membership constraints (~3k) to your smart contract function's circuit,\n /// to prove existence of the block header in the Archive Tree.\n ///\n /// Note: we don't do any caching, so avoid making duplicate calls for the same block header, because each call\n /// will add duplicate constraints.\n ///\n /// Calling this function is more expensive (constraint-wise) than getting the anchor block header (via\n /// `get_block_header`). This is because the anchor block's merkle membership proof is handled by Aztec's protocol\n /// circuits, and is only performed once for the entire tx because all private functions of a tx share a common\n /// anchor block header. Therefore, the cost (constraint-wise) of calling `get_block_header` is effectively free.\n ///\n pub fn get_block_header_at(self, block_number: u32) -> BlockHeader {\n get_block_header_at(block_number, self)\n }\n\n /// Sets the hash of the return values for this private function.\n ///\n /// Very low-level function: this is called by the #[external(\"private\")] macro.\n ///\n /// # Arguments\n /// * `serialized_return_values` - The serialized return values as a field array\n ///\n pub fn set_return_hash<let N: u32>(&mut self, serialized_return_values: [Field; N]) {\n let return_hash = hash_args(serialized_return_values);\n self.return_hash = return_hash;\n execution_cache::store(serialized_return_values, return_hash);\n }\n\n /// Builds the PrivateCircuitPublicInputs for this private function, to ensure compatibility with the protocol's\n /// kernel circuits.\n ///\n /// Very low-level function: This function is automatically called by the #[external(\"private\")] macro.\n pub fn finish(self) -> PrivateCircuitPublicInputs {\n PrivateCircuitPublicInputs {\n call_context: self.inputs.call_context,\n args_hash: self.args_hash,\n returns_hash: self.return_hash,\n min_revertible_side_effect_counter: self.min_revertible_side_effect_counter,\n is_fee_payer: self.is_fee_payer,\n expiration_timestamp: self.expiration_timestamp,\n note_hash_read_requests: ClaimedLengthArray::from_bounded_vec(self.note_hash_read_requests),\n nullifier_read_requests: ClaimedLengthArray::from_bounded_vec(self.nullifier_read_requests),\n key_validation_requests_and_separators: ClaimedLengthArray::from_bounded_vec(\n self.key_validation_requests_and_separators,\n ),\n note_hashes: ClaimedLengthArray::from_bounded_vec(self.note_hashes),\n nullifiers: ClaimedLengthArray::from_bounded_vec(self.nullifiers),\n private_call_requests: ClaimedLengthArray::from_bounded_vec(self.private_call_requests),\n public_call_requests: ClaimedLengthArray::from_bounded_vec(self.public_call_requests),\n public_teardown_call_request: self.public_teardown_call_request,\n l2_to_l1_msgs: ClaimedLengthArray::from_bounded_vec(self.l2_to_l1_msgs),\n start_side_effect_counter: self.inputs.start_side_effect_counter,\n end_side_effect_counter: self.side_effect_counter,\n private_logs: ClaimedLengthArray::from_bounded_vec(self.private_logs),\n contract_class_logs_hashes: ClaimedLengthArray::from_bounded_vec(self.contract_class_logs_hashes),\n anchor_block_header: self.anchor_block_header,\n tx_context: self.inputs.tx_context,\n expected_non_revertible_side_effect_counter: self.expected_non_revertible_side_effect_counter,\n expected_revertible_side_effect_counter: self.expected_revertible_side_effect_counter,\n }\n }\n\n /// Designates this contract as the fee payer for the transaction.\n ///\n /// Unlike Ethereum, where the transaction sender always pays fees, Aztec allows any contract to voluntarily pay\n /// transaction fees. This enables patterns like sponsored transactions or fee abstraction where users don't need\n /// to hold fee-juice themselves. (Fee juice is a fee-paying asset for Aztec).\n ///\n /// Only one contract per transaction can declare itself as the fee payer, and it must have sufficient fee-juice\n /// balance (>= the gas limits specified in the TxContext) by the time we reach the public setup phase of the tx.\n ///\n pub fn set_as_fee_payer(&mut self) {\n crate::protocol::logging::debug_log_format(\"Setting {0} as fee payer\", [self.this_address().to_field()]);\n self.is_fee_payer = true;\n }\n\n pub fn in_revertible_phase(&mut self) -> bool {\n let current_counter = self.side_effect_counter;\n\n // Safety: Kernel will validate that the claim is correct by validating the expected counters.\n let is_revertible = unsafe { is_side_effect_counter_revertible_oracle_wrapper(current_counter) };\n\n if is_revertible {\n if (self.expected_revertible_side_effect_counter == 0)\n | (current_counter < self.expected_revertible_side_effect_counter) {\n self.expected_revertible_side_effect_counter = current_counter;\n }\n } else if current_counter > self.expected_non_revertible_side_effect_counter {\n self.expected_non_revertible_side_effect_counter = current_counter;\n }\n\n is_revertible\n }\n\n /// Declares the end of the \"setup phase\" of this tx.\n ///\n /// Only one function per tx can declare the end of the setup phase.\n ///\n /// Niche function: Only wallet developers and paymaster contract developers (aka Fee-payment contracts) will need\n /// to make use of this function.\n ///\n /// Aztec supports a three-phase execution model: setup, app logic, teardown. The phases exist to enable a fee\n /// payer to take on the risk of paying a transaction fee, safe in the knowledge that their payment (in whatever\n /// token or method the user chooses) will succeed, regardless of whether the app logic will succeed. The \"setup\"\n /// phase enables such a payment to be made, because the setup phase _cannot revert_: a reverting function within\n /// the setup phase would result in an invalid block which cannot be proven. Any side-effects generated during that\n /// phase are guaranteed to be inserted into Aztec's state trees (except for squashed notes & nullifiers, of\n /// course).\n ///\n /// Even though the end of the setup phase is declared within a private function, you might have noticed that\n /// _public_ functions can also execute within the setup phase. This is because any public function calls which\n /// were enqueued _within the setup phase_ by a private function are considered part of the setup phase.\n ///\n /// # Advanced\n /// * Sets the minimum revertible side effect counter of this tx to be the PrivateContext's _current_ side effect\n /// counter.\n ///\n pub fn end_setup(&mut self) {\n // Incrementing the side effect counter when ending setup ensures non ambiguity for the counter where we change\n // phases.\n self.side_effect_counter += 1;\n // crate::protocol::logging::debug_log_format(\n // \"Ending setup at counter {0}\",\n // [self.side_effect_counter as Field]\n // );\n self.min_revertible_side_effect_counter = self.next_counter();\n notify_set_min_revertible_side_effect_counter(self.min_revertible_side_effect_counter);\n }\n\n /// Sets a deadline (an \"include-by timestamp\") for when this transaction must be included in a block.\n ///\n /// Other functions in this tx might call this setter with differing values for the include-by timestamp. To ensure\n /// that all functions' deadlines are met, the _minimum_ of all these include-by timestamps will be exposed when\n /// this tx is submitted to the network.\n ///\n /// If the transaction is not included in a block by its include-by timestamp, it becomes invalid and it will never\n /// be included.\n ///\n /// This expiry timestamp is publicly visible. See the \"Advanced\" section for privacy concerns.\n ///\n /// # Arguments\n /// * `expiration_timestamp` - Unix timestamp (seconds) deadline for inclusion. The include-by timestamp of this tx\n /// will be _at most_ the timestamp specified.\n ///\n /// # Advanced\n /// * If multiple functions set differing `expiration_timestamp`s, the kernel circuits will set it to be the\n /// _minimum_ of the two. This ensures the tx expiry requirements of all functions in the tx are met.\n /// * Rollup circuits will reject expired txs.\n /// * The protocol enforces that all transactions must be included within 24 hours of their chosen anchor block's\n /// timestamp, to enable safe mempool pruning.\n /// * The DelayedPublicMutable design makes heavy use of this functionality, to enable private functions to read\n /// public state.\n /// * A sophisticated Wallet should cleverly set an include-by timestamp to improve the privacy of the user and the\n /// network as a whole. For example, if a contract interaction sets include-by to some publicly-known value (e.g.\n /// the time when a contract upgrades), then the wallet might wish to set an even lower one to avoid revealing that\n /// this tx is interacting with said contract. Ideally, all wallets should standardize on an approach in order to\n /// provide users with a large anonymity set -- although the exact approach\n /// will need to be discussed. Wallets that deviate from a standard might accidentally reveal which wallet each\n /// transaction originates from.\n ///\n // docs:start:expiration-timestamp\n pub fn set_expiration_timestamp(&mut self, expiration_timestamp: u64) {\n // docs:end:expiration-timestamp\n self.expiration_timestamp = std::cmp::min(self.expiration_timestamp, expiration_timestamp);\n }\n\n /// Asserts that a note has been created.\n ///\n /// This function will cause the transaction to fail unless the requested note exists. This is the preferred\n /// mechanism for performing this check, and the only one that works for pending notes.\n ///\n /// ## Pending Notes\n ///\n /// Both settled notes (created in prior transactions) and pending notes (created in the current transaction) will\n /// be considered by this function. Pending notes must have been created **before** this call is made for the check\n /// to pass.\n ///\n /// ## Historical Notes\n ///\n /// If you need to assert that a note existed _by some specific block in the past_, instead of simply proving that\n /// it exists by the current anchor block, use [`crate::history::note::assert_note_existed_by`] instead.\n ///\n /// ## Cost\n ///\n /// This uses up one of the call's kernel note hash read requests, which are limited. Like all kernel requests,\n /// proving time costs are only incurred when the total number of requests exceeds the kernel's capacity, requiring\n /// an additional invocation of the kernel reset circuit.\n pub fn assert_note_exists(&mut self, note_existence_request: NoteExistenceRequest) {\n // Note that the `note_hash_read_requests` array does not hold `NoteExistenceRequest` objects, but rather a\n // custom kernel type. We convert from the aztec-nr type into it.\n\n let note_hash = note_existence_request.note_hash();\n let contract_address = note_existence_request.maybe_contract_address().unwrap_or(AztecAddress::zero());\n\n let side_effect = Scoped::new(\n Counted::new(note_hash, self.next_counter()),\n contract_address,\n );\n\n self.note_hash_read_requests.push(side_effect);\n }\n\n /// Asserts that a nullifier has been emitted.\n ///\n /// This function will cause the transaction to fail unless the requested nullifier exists. This is the preferred\n /// mechanism for performing this check, and the only one that works for pending nullifiers.\n ///\n /// ## Pending Nullifiers\n ///\n /// Both settled nullifiers (emitted in prior transactions) and pending nullifiers (emitted in the current\n /// transaction) will be considered by this function. Pending nullifiers must have been emitted **before** this\n /// call is made for the check to pass.\n ///\n /// ## Historical Nullifiers\n ///\n /// If you need to assert that a nullifier existed _by some specific block in the past_, instead of simply proving\n /// that it exists by the current anchor block, use [`crate::history::nullifier::assert_nullifier_existed_by`]\n /// instead.\n ///\n /// ## Public vs Private\n ///\n /// In general, it is unsafe to check for nullifier non-existence in private, as that will not consider the\n /// possibility of the nullifier having been emitted in any transaction between the anchor block and the inclusion\n /// block. Private functions instead prove existence via this function and 'prove' non-existence by _emitting_ the\n /// nullifer, which would cause the transaction to fail if the nullifier existed.\n ///\n /// This is not the case in public functions, which do have access to the tip of the blockchain and so can reliably\n /// prove whether a nullifier exists or not via\n /// [`crate::context::public_context::PublicContext::nullifier_exists_unsafe`].\n ///\n /// ## Cost\n ///\n /// This uses up one of the call's kernel nullifier read requests, which are limited. Like all kernel requests,\n /// proving time costs are only incurred when the total number of requests exceeds the kernel's capacity, requiring\n /// an additional invocation of the kernel reset circuit.\n pub fn assert_nullifier_exists(&mut self, nullifier_existence_request: NullifierExistenceRequest) {\n let nullifier = nullifier_existence_request.nullifier();\n let contract_address = nullifier_existence_request.maybe_contract_address().unwrap_or(AztecAddress::zero());\n\n let request = Scoped::new(\n Counted::new(nullifier, self.next_counter()),\n contract_address,\n );\n\n self.nullifier_read_requests.push(request);\n }\n\n /// Requests the app-siloed nullifier hiding key (nhk_app) for the given (hashed) master nullifier public key\n /// (npk_m), from the user's PXE.\n ///\n /// Advanced function: Only needed if you're designing your own notes and/or nullifiers.\n ///\n /// Contracts are not allowed to compute nullifiers for other contracts, as that would let them read parts of their\n /// private state. Because of this, a contract is only given an \"app-siloed key\", which is constructed by\n /// hashing the user's master nullifier hiding key with the contract's address. However, because contracts cannot\n /// be trusted with a user's master nullifier hiding key (because we don't know which contracts are honest or\n /// malicious), the PXE refuses to provide any master secret keys to any app smart contract function. This means\n /// app functions are unable to prove that the derivation of an app-siloed nullifier hiding key has been computed\n /// correctly. Instead, an app function can request to the kernel (via `request_nhk_app`) that it validates the\n /// siloed derivation, since the kernel has been vetted to not leak any master secret keys.\n ///\n /// A common nullification scheme is to inject a nullifier hiding key into the preimage of a nullifier, to make the\n /// nullifier deterministic but random-looking. This function enables that flow.\n ///\n /// # Arguments\n /// * `npk_m_hash` - A hash of the master nullifier public key of the user whose PXE is executing this function.\n ///\n /// # Returns\n /// * The app-siloed nullifier hiding key that corresponds to the given `npk_m_hash`.\n ///\n pub fn request_nhk_app(&mut self, npk_m_hash: Field) -> Field {\n self.request_sk_app(npk_m_hash, NULLIFIER_INDEX)\n }\n\n /// Requests the app-siloed nullifier secret key (nsk_app) for the given (hashed) master nullifier public key\n /// (npk_m), from the user's PXE.\n ///\n /// See `request_nsk_app` and `request_sk_app` for more info.\n ///\n /// The intention of the \"outgoing\" keypair is to provide a second secret key for all of a user's outgoing activity\n /// (i.e. for notes that a user creates, as opposed to notes that a user receives from others). The separation of\n /// incoming and outgoing data was a distinction made by zcash, with the intention of enabling a user to optionally\n /// share with a 3rd party a controlled view of only incoming or outgoing notes. Similar functionality of sharing\n /// select data can be achieved with offchain zero-knowledge proofs. It is up to an app developer whether they\n /// choose to make use of a user's outgoing keypair within their application logic, or instead simply use the same\n /// keypair (the address keypair (which is effectively the same as the \"incoming\" keypair)) for all incoming &\n /// outgoing messages to a user.\n ///\n /// Currently, all of the exposed encryption functions in aztec-nr ignore the outgoing viewing keys, and instead\n /// encrypt all note logs and event logs to a user's address public key.\n ///\n /// # Arguments\n /// * `ovpk_m_hash` - Hash of the outgoing viewing public key master\n ///\n /// # Returns\n /// * The application-specific outgoing viewing secret key\n ///\n pub fn request_ovsk_app(&mut self, ovpk_m_hash: Field) -> Field {\n self.request_sk_app(ovpk_m_hash, OUTGOING_INDEX)\n }\n\n /// Pushes a Key Validation Request to the kernel.\n ///\n /// Private functions are not allowed to see a user's master secret keys, because we do not trust them. They are\n /// instead given \"app-siloed\" secret keys with a claim that they relate to a master public key. They can then\n /// request validation of this claim, by making a \"key validation request\" to the protocol's kernel circuits (which\n /// _are_ allowed to see certain master secret keys).\n ///\n /// When a Key Validation Request tuple of (sk_app, Pk_m, app_address) is submitted to the kernel, it will perform\n /// the following derivations to validate the relationship between the claimed sk_app and the user's Pk_m:\n ///\n /// (sk_m) ----> * G ----> Pk_m\n /// | |\n /// v We use the kernel to prove this\n /// h(sk_m, app_address) | sk_app-Pk_m relationship, because app\n /// | circuits must not be trusted to see sk_m.\n /// v |\n /// sk_app - - - - - - - - -\n ///\n /// The function is named \"request_\" instead of \"get_\" to remind the user that a Key Validation Request will be\n /// emitted to the kernel.\n ///\n fn request_sk_app(&mut self, pk_m_hash: Field, key_index: Field) -> Field {\n let cached_request =\n self.last_key_validation_requests[key_index as u32].unwrap_or(KeyValidationRequest::empty());\n\n if cached_request.pk_m.hash() == pk_m_hash {\n // We get a match so the cached request is the latest one\n cached_request.sk_app\n } else {\n // We didn't get a match meaning the cached result is stale Typically we'd validate keys by showing that\n // they are the preimage of `pk_m_hash`, but that'd require the oracle returning the master secret keys,\n // which could cause malicious contracts to leak it or learn about secrets from other contracts. We\n // therefore silo secret keys, and rely on the private kernel to validate that we siloed secret key\n // corresponds to correct siloing of the master secret key that hashes to `pk_m_hash`.\n\n // Safety: Kernels verify that the key validation request is valid and below we verify that a request for\n // the correct public key has been received.\n let request = unsafe { get_key_validation_request(pk_m_hash, key_index) };\n assert_eq(request.pk_m.hash(), pk_m_hash, \"Obtained invalid key validation request\");\n\n self.key_validation_requests_and_separators.push(\n KeyValidationRequestAndSeparator {\n request,\n key_type_domain_separator: public_key_domain_separators[key_index as u32],\n },\n );\n self.last_key_validation_requests[key_index as u32] = Option::some(request);\n request.sk_app\n }\n }\n\n /// Sends an \"L2 -> L1 message\" from this function (Aztec, L2) to a smart contract on Ethereum (L1). L1 contracts\n /// which are designed to send/receive messages to/from Aztec are called \"Portal Contracts\".\n ///\n /// Common use cases include withdrawals, cross-chain asset transfers, and triggering L1 actions based on L2 state\n /// changes.\n ///\n /// The message will be inserted into an Aztec \"Outbox\" contract on L1, when this transaction's block is proposed\n /// to L1. Sending the message will not result in any immediate state changes in the target portal contract. The\n /// message will need to be manually consumed from the Outbox through a separate Ethereum transaction: a user will\n /// need to call a function of the portal contract -- a function specifically designed to make a call to the Outbox\n /// to consume the message. The message will only be available for consumption once the _epoch_ proof has been\n /// submitted. Given that there are multiple Aztec blocks within an epoch, it might take some time for this epoch\n /// proof to be submitted -- especially if the block was near the start of an epoch.\n ///\n /// # Arguments\n /// * `recipient` - Ethereum address that will receive the message\n /// * `content` - Message content (32 bytes as a Field element). This content has a very\n /// specific layout. docs:start:context_message_portal\n pub fn message_portal(&mut self, recipient: EthAddress, content: Field) {\n let message = L2ToL1Message { recipient, content };\n self.l2_to_l1_msgs.push(message.count(self.next_counter()));\n }\n\n /// Consumes a message sent from Ethereum (L1) to Aztec (L2).\n ///\n /// Common use cases include token bridging, cross-chain governance, and triggering L2 actions based on L1 events.\n ///\n /// Use this function if you only want the message to ever be \"referred to\" once. Once consumed using this method,\n /// the message cannot be consumed again, because a nullifier is emitted. If your use case wants for the message to\n /// be read unlimited times, then you can always read any historic message from the L1-to-L2 messages tree;\n /// messages never technically get deleted from that tree.\n ///\n /// The message will first be inserted into an Aztec \"Inbox\" smart contract on L1. Sending the message will not\n /// result in any immediate state changes in the target L2 contract. The message will need to be manually consumed\n /// by the target contract through a separate Aztec transaction. The message will not be available for consumption\n /// immediately. Messages get copied over from the L1 Inbox to L2 by the next Proposer in batches. So you will need\n /// to wait until the messages are copied before you can consume them.\n ///\n /// # Arguments\n /// * `content` - The message content that was sent from L1\n /// * `secret` - Secret value used for message privacy (if needed)\n /// * `sender` - Ethereum address that sent the message\n /// * `leaf_index` - Index of the message in the L1-to-L2 message tree\n ///\n /// # Advanced\n /// Validates message existence in the L1-to-L2 message tree and nullifies the message to prevent\n /// double-consumption.\n pub fn consume_l1_to_l2_message(&mut self, content: Field, secret: Field, sender: EthAddress, leaf_index: Field) {\n let nullifier = process_l1_to_l2_message(\n self.anchor_block_header.state.l1_to_l2_message_tree.root,\n self.this_address(),\n sender,\n self.chain_id(),\n self.version(),\n content,\n secret,\n leaf_index,\n );\n\n // Push nullifier (and the \"commitment\" corresponding to this can be \"empty\")\n self.push_nullifier(nullifier)\n }\n\n /// Emits a private log (an array of Fields) that will be published to an Ethereum blob.\n ///\n /// Private logs are intended for the broadcasting of ciphertexts: that is, encrypted events or encrypted note\n /// contents. Since the data in the logs is meant to be _encrypted_, private_logs are broadcast to publicly-visible\n /// Ethereum blobs. The intended recipients of such encrypted messages can then discover and decrypt these\n /// encrypted logs using their viewing secret key. (See `../messages/discovery` for more details).\n ///\n /// Important note: This function DOES NOT _do_ any encryption of the input `log` fields. This function blindly\n /// publishes whatever input `log` data is fed into it, so the caller of this function should have already\n /// performed the encryption, and the `log` should be the result of that encryption.\n ///\n /// The protocol does not dictate what encryption scheme should be used: a smart contract developer can choose\n /// whatever encryption scheme they like. Aztec-nr includes some off-the-shelf encryption libraries that developers\n /// might wish to use, for convenience. These libraries not only encrypt a plaintext (to produce a ciphertext);\n /// they also prepend the ciphertext with a `tag` and `ephemeral public key` for easier message discovery. This is\n /// a very dense topic, and we will be writing more libraries and docs soon.\n ///\n /// > Currently, AES128 CBC encryption is the main scheme included in > aztec.nr. > We are currently making\n /// significant changes to the interfaces of the > encryption library.\n ///\n /// In some niche use cases, an app might be tempted to publish _un-encrypted_ data via a private log, because\n /// _public logs_ are not available to private functions. Be warned that emitting public data via private logs is\n /// strongly discouraged, and is considered a \"privacy anti-pattern\", because it reveals identifiable information\n /// about _which_ function has been executed. A tx which leaks such information does not contribute to the privacy\n /// set of the network.\n ///\n /// * Unlike `emit_raw_note_log`, this log is not tied to any specific note\n ///\n /// # Arguments\n /// * `log` - The log data that will be publicly broadcast (so make sure it's already been encrypted before you\n /// call this function). Private logs are bounded in size (PRIVATE_LOG_SIZE_IN_FIELDS), to encourage all logs from\n /// all smart contracts look identical.\n /// * `length` - The actual length of the `log` (measured in number of Fields). Although the input log has a max\n /// size of PRIVATE_LOG_SIZE_IN_FIELDS, the latter values of the array might all be 0's for small logs. This\n /// `length` should reflect the trimmed length of the array. The protocol's kernel circuits can then append random\n /// fields as \"padding\" after the `length`, so that the logs of this smart contract look indistinguishable from\n /// (the same length as) the logs of all other applications. It's up to wallets how much padding to apply, so\n /// ideally all wallets should agree on standards for this.\n pub fn emit_private_log(&mut self, log: [Field; PRIVATE_LOG_SIZE_IN_FIELDS], length: u32) {\n let counter = self.next_counter();\n let private_log = PrivateLogData { log: PrivateLog::new(log, length), note_hash_counter: 0 }.count(counter);\n self.private_logs.push(private_log);\n }\n\n // TODO: rename.\n /// Emits a private log that is explicitly tied to a newly-emitted note_hash, to convey to the kernel: \"this log\n /// relates to this note\".\n ///\n /// This linkage is important in case the note gets squashed (due to being read later in this same tx), since we\n /// can then squash the log as well.\n ///\n /// See `emit_private_log` for more info about private log emission.\n ///\n /// # Arguments\n /// * `log` - The log data as an array of Field elements\n /// * `length` - The actual length of the `log` (measured in number of Fields).\n /// * `note_hash_counter` - The side-effect counter that was assigned to the new note_hash when it was pushed to\n /// this `PrivateContext`.\n ///\n /// Important: If your application logic requires the log to always be emitted regardless of note squashing,\n /// consider using `emit_private_log` instead, or emitting additional events.\n ///\n pub fn emit_raw_note_log(&mut self, log: [Field; PRIVATE_LOG_SIZE_IN_FIELDS], length: u32, note_hash_counter: u32) {\n let counter = self.next_counter();\n let private_log = PrivateLogData { log: PrivateLog::new(log, length), note_hash_counter };\n self.private_logs.push(private_log.count(counter));\n }\n\n pub fn emit_contract_class_log<let N: u32>(&mut self, log: [Field; N]) {\n let contract_address = self.this_address();\n let counter = self.next_counter();\n\n let log_to_emit: [Field; CONTRACT_CLASS_LOG_SIZE_IN_FIELDS] =\n log.concat([0; CONTRACT_CLASS_LOG_SIZE_IN_FIELDS - N]);\n // Note: the length is not always N, it is the number of fields we want to broadcast, omitting trailing zeros\n // to save blob space.\n // Safety: The below length is constrained in the base rollup, which will make sure that all the fields beyond\n // length are zero. However, it won't be able to check that we didn't add extra padding (trailing zeroes) or\n // that we cut trailing zeroes from the end.\n let length = unsafe { trimmed_array_length_hint(log_to_emit) };\n // We hash the entire padded log to ensure a user cannot pass a shorter length and so emit incorrect shorter\n // bytecode.\n let log_hash = poseidon2_hash(log_to_emit);\n // Safety: the below only exists to broadcast the raw log, so we can provide it to the base rollup later to be\n // constrained.\n unsafe {\n notify_created_contract_class_log(contract_address, log_to_emit, length, counter);\n }\n\n self.contract_class_logs_hashes.push(LogHash { value: log_hash, length: length }.count(counter));\n }\n\n /// Calls a private function on another contract (or the same contract).\n ///\n /// Very low-level function.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `args` - Array of arguments to pass to the called function\n ///\n /// # Returns\n /// * `ReturnsHash` - Hash of the called function's return values. Use `.get_preimage()` to extract the actual\n /// return values.\n ///\n /// This enables contracts to interact with each other while maintaining privacy. This \"composability\" of private\n /// contract functions is a key feature of the Aztec network.\n ///\n /// If a user's transaction includes multiple private function calls, then by the design of Aztec, the following\n /// information will remain private[1]:\n /// - The function selectors and contract addresses of all private function calls will remain private, so an\n /// observer of the public mempool will not be able to look at a tx and deduce which private functions have been\n /// executed.\n /// - The arguments and return values of all private function calls will remain private.\n /// - The person who initiated the tx will remain private.\n /// - The notes and nullifiers and private logs that are emitted by all private function calls will (if designed\n /// well) not leak any user secrets, nor leak which functions have been executed.\n ///\n /// [1] Caveats: Some of these privacy guarantees depend on how app developers design their smart contracts. Some\n /// actions _can_ leak information, such as:\n /// - Calling an internal public function.\n /// - Calling a public function and not setting msg_sender to Option::none (feature not built yet - see github).\n /// - Calling any public function will always leak details about the nature of the transaction, so devs should be\n /// careful in their contract designs. If it can be done in a private function, then that will give the best\n /// privacy.\n /// - Not padding the side-effects of a tx to some standardized, uniform size. The kernel circuits can take hints\n /// to pad side-effects, so a wallet should be able to request for a particular amount of padding. Wallets should\n /// ideally agree on some standard.\n /// - Padding should include:\n /// - Padding the lengths of note & nullifier arrays\n /// - Padding private logs with random fields, up to some standardized size. See also:\n /// https://docs.aztec.network/developers/resources/considerations/privacy_considerations\n ///\n /// # Advanced\n /// * The call is added to the private call stack and executed by kernel circuits after this function completes\n /// * The called function can modify its own contract's private state\n /// * Side effects from the called function are included in this transaction\n /// * The call inherits the current transaction's context and gas limits\n ///\n pub fn call_private_function<let ArgsCount: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ArgsCount],\n ) -> ReturnsHash {\n let args_hash = hash_args(args);\n execution_cache::store(args, args_hash);\n self.call_private_function_with_args_hash(contract_address, function_selector, args_hash, false)\n }\n\n /// Makes a read-only call to a private function on another contract.\n ///\n /// This is similar to Solidity's `staticcall`. The called function cannot modify state, emit L2->L2 messages, nor\n /// emit events. Any nested calls are constrained to also be staticcalls.\n ///\n /// See `call_private_function` for more general info on private function calls.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract to call\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `args` - Array of arguments to pass to the called function\n ///\n /// # Returns\n /// * `ReturnsHash` - Hash of the called function's return values. Use `.get_preimage()` to extract the actual\n /// return values.\n ///\n pub fn static_call_private_function<let ArgsCount: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ArgsCount],\n ) -> ReturnsHash {\n let args_hash = hash_args(args);\n execution_cache::store(args, args_hash);\n self.call_private_function_with_args_hash(contract_address, function_selector, args_hash, true)\n }\n\n /// Calls a private function that takes no arguments.\n ///\n /// This is a convenience function for calling private functions that don't require any input parameters. It's\n /// equivalent to `call_private_function` but slightly more efficient to use when no arguments are needed.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n ///\n /// # Returns\n /// * `ReturnsHash` - Hash of the called function's return values. Use `.get_preimage()` to extract the actual\n /// return values.\n ///\n pub fn call_private_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) -> ReturnsHash {\n self.call_private_function_with_args_hash(contract_address, function_selector, 0, false)\n }\n\n /// Makes a read-only call to a private function which takes no arguments.\n ///\n /// This combines the optimisation of `call_private_function_no_args` with the safety of\n /// `static_call_private_function`.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n ///\n /// # Returns\n /// * `ReturnsHash` - Hash of the called function's return values. Use `.get_preimage()` to extract the actual\n /// return values.\n ///\n pub fn static_call_private_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) -> ReturnsHash {\n self.call_private_function_with_args_hash(contract_address, function_selector, 0, true)\n }\n\n /// Low-level private function call.\n ///\n /// This is the underlying implementation used by all other private function call methods. Instead of taking raw\n /// arguments, it accepts a hash of the arguments.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `args_hash` - Pre-computed hash of the function arguments\n /// * `is_static_call` - Whether this should be a read-only call\n ///\n /// # Returns\n /// * `ReturnsHash` - Hash of the called function's return values\n ///\n pub fn call_private_function_with_args_hash(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n is_static_call: bool,\n ) -> ReturnsHash {\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n let start_side_effect_counter = self.side_effect_counter;\n\n // Safety: The oracle simulates the private call and returns the value of the side effects counter after\n // execution of the call (which means that end_side_effect_counter - start_side_effect_counter is the number of\n // side effects that took place), along with the hash of the return values. We validate these by requesting a\n // private kernel iteration in which the return values are constrained to hash to `returns_hash` and the side\n // effects counter to increment from start to end.\n let (end_side_effect_counter, returns_hash) = unsafe {\n call_private_function_internal(\n contract_address,\n function_selector,\n args_hash,\n start_side_effect_counter,\n is_static_call,\n )\n };\n\n self.private_call_requests.push(\n PrivateCallRequest {\n call_context: CallContext {\n msg_sender: self.this_address(),\n contract_address,\n function_selector,\n is_static_call,\n },\n args_hash,\n returns_hash,\n start_side_effect_counter,\n end_side_effect_counter,\n },\n );\n\n // TODO (fees) figure out why this crashes the prover and enable it we need this in order to pay fees inside\n // child call contexts assert(\n // (item.public_inputs.min_revertible_side_effect_counter == 0 as u32)\n // | (item.public_inputs.min_revertible_side_effect_counter\n // > self.min_revertible_side_effect_counter)\n // ); if item.public_inputs.min_revertible_side_effect_counter\n // > self.min_revertible_side_effect_counter { self.min_revertible_side_effect_counter =\n // item.public_inputs.min_revertible_side_effect_counter; }\n self.side_effect_counter = end_side_effect_counter + 1; // TODO: call `next_counter`\n // instead, for consistency\n ReturnsHash::new(returns_hash)\n }\n\n /// Enqueues a call to a public function to be executed later.\n ///\n /// Unlike private functions which execute immediately on the user's device, public function calls are \"enqueued\"\n /// and executed some time later by a block proposer.\n ///\n /// This means a public function cannot return any values back to a private function, because by the time the\n /// public function is being executed, the private function which called it has already completed execution. (In\n /// fact, the private function has been executed and proven, along with all other private function calls of the\n /// user's tx. A single proof of the tx has been submitted to the Aztec network, and some time later a proposer has\n /// picked the tx up from the mempool and begun executing all of the enqueued public functions).\n ///\n /// # Privacy warning Enqueueing a public function call is an inherently leaky action. Many interesting applications will require some interaction with public state, but smart contract developers should try to use public function calls sparingly, and carefully. _Internal_ public function calls are especially leaky, because they completely leak which private contract made the call. See also: https://docs.aztec.network/developers/resources/considerations/privacy_considerations\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `args` - Array of arguments to pass to the public function\n /// * `hide_msg_sender` - the called function will see a \"null\" value for `msg_sender` if set to `true`\n ///\n pub fn call_public_function<let ArgsCount: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ArgsCount],\n hide_msg_sender: bool,\n ) {\n let calldata = [function_selector.to_field()].concat(args);\n let calldata_hash = hash_calldata_array(calldata);\n execution_cache::store(calldata, calldata_hash);\n self.call_public_function_with_calldata_hash(contract_address, calldata_hash, false, hide_msg_sender)\n }\n\n /// Enqueues a read-only call to a public function.\n ///\n /// This is similar to Solidity's `staticcall`. The called function cannot modify state or emit events. Any nested\n /// calls are constrained to also be staticcalls.\n ///\n /// See also `call_public_function` for more important information about making private -> public function calls.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `args` - Array of arguments to pass to the public function\n /// * `hide_msg_sender` - the called function will see a \"null\" value for `msg_sender` if set to `true`\n ///\n pub fn static_call_public_function<let ArgsCount: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ArgsCount],\n hide_msg_sender: bool,\n ) {\n let calldata = [function_selector.to_field()].concat(args);\n let calldata_hash = hash_calldata_array(calldata);\n execution_cache::store(calldata, calldata_hash);\n self.call_public_function_with_calldata_hash(contract_address, calldata_hash, true, hide_msg_sender)\n }\n\n /// Enqueues a call to a public function that takes no arguments.\n ///\n /// This is an optimisation for calling public functions that don't take any input parameters. It's otherwise\n /// equivalent to `call_public_function`.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `hide_msg_sender` - the called function will see a \"null\" value for `msg_sender` if set to `true`\n ///\n pub fn call_public_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n hide_msg_sender: bool,\n ) {\n let calldata_hash = hash_calldata_array([function_selector.to_field()]);\n self.call_public_function_with_calldata_hash(contract_address, calldata_hash, false, hide_msg_sender)\n }\n\n /// Enqueues a read-only call to a public function with no arguments.\n ///\n /// This combines the optimisation of `call_public_function_no_args` with the safety of\n /// `static_call_public_function`.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `hide_msg_sender` - the called function will see a \"null\" value for `msg_sender` if set to `true`\n ///\n pub fn static_call_public_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n hide_msg_sender: bool,\n ) {\n let calldata_hash = hash_calldata_array([function_selector.to_field()]);\n self.call_public_function_with_calldata_hash(contract_address, calldata_hash, true, hide_msg_sender)\n }\n\n /// Low-level public function call.\n ///\n /// This is the underlying implementation used by all other public function call methods. Instead of taking raw\n /// arguments, it accepts a hash of the arguments.\n ///\n /// Advanced function: Most developers should use `call_public_function` or `static_call_public_function` instead.\n /// This function is exposed for performance optimization and advanced use cases.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `calldata_hash` - Hash of the function calldata\n /// * `is_static_call` - Whether this should be a read-only call\n /// * `hide_msg_sender` - the called function will see a \"null\" value for `msg_sender` if set to `true`\n ///\n pub fn call_public_function_with_calldata_hash(\n &mut self,\n contract_address: AztecAddress,\n calldata_hash: Field,\n is_static_call: bool,\n hide_msg_sender: bool,\n ) {\n let counter = self.next_counter();\n\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n\n notify_enqueued_public_function_call(contract_address, calldata_hash, counter, is_static_call);\n\n let msg_sender = if hide_msg_sender {\n NULL_MSG_SENDER_CONTRACT_ADDRESS\n } else {\n self.this_address()\n };\n\n let call_request = PublicCallRequest { msg_sender, contract_address, is_static_call, calldata_hash };\n\n self.public_call_requests.push(Counted::new(call_request, counter));\n }\n\n /// Enqueues a public function call, and designates it to be the teardown function for this tx. Only one teardown\n /// function call can be made by a tx.\n ///\n /// Niche function: Only wallet developers and paymaster contract developers (aka Fee-payment contracts) will need\n /// to make use of this function.\n ///\n /// Aztec supports a three-phase execution model: setup, app logic, teardown. The phases exist to enable a fee\n /// payer to take on the risk of paying a transaction fee, safe in the knowledge that their payment (in whatever\n /// token or method the user chooses) will succeed, regardless of whether the app logic will succeed. The \"setup\"\n /// phase ensures the fee payer has sufficient balance to pay the proposer their fees. The teardown phase is\n /// primarily intended to: calculate exactly how much the user owes, based on gas consumption, and refund the user\n /// any change.\n ///\n /// Note: in some cases, the cost of refunding the user (i.e. DA costs of tx side-effects) might exceed the refund\n /// amount. For app logic with fairly stable and predictable gas consumption, a material refund amount is unlikely.\n /// For app logic with unpredictable gas consumption, a refund might be important to the user (e.g. if a hefty\n /// function reverts very early). Wallet/FPC/Paymaster developers should be mindful of this.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the teardown function\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `args` - An array of fields to pass to the function.\n /// * `hide_msg_sender` - the called function will see a \"null\" value for `msg_sender` if set to `true`\n pub fn set_public_teardown_function<let ArgsCount: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ArgsCount],\n hide_msg_sender: bool,\n ) {\n let calldata = [function_selector.to_field()].concat(args);\n let calldata_hash = hash_calldata_array(calldata);\n execution_cache::store(calldata, calldata_hash);\n self.set_public_teardown_function_with_calldata_hash(contract_address, calldata_hash, false, hide_msg_sender)\n }\n\n /// Low-level function to set the public teardown function.\n ///\n /// This is the underlying implementation for setting the teardown function call that will execute at the end of\n /// the transaction. Instead of taking raw arguments, it accepts a hash of the arguments.\n ///\n /// Advanced function: Most developers should use `set_public_teardown_function` instead.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the teardown function\n /// * `calldata_hash` - Hash of the function calldata\n /// * `is_static_call` - Whether this should be a read-only call\n /// * `hide_msg_sender` - the called function will see a \"null\" value for `msg_sender` if set to `true`\n ///\n pub fn set_public_teardown_function_with_calldata_hash(\n &mut self,\n contract_address: AztecAddress,\n calldata_hash: Field,\n is_static_call: bool,\n hide_msg_sender: bool,\n ) {\n let counter = self.next_counter();\n\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n\n notify_set_public_teardown_function_call(contract_address, calldata_hash, counter, is_static_call);\n\n let msg_sender = if hide_msg_sender {\n NULL_MSG_SENDER_CONTRACT_ADDRESS\n } else {\n self.this_address()\n };\n\n self.public_teardown_call_request =\n PublicCallRequest { msg_sender, contract_address, is_static_call, calldata_hash };\n }\n\n /// Increments the side-effect counter.\n ///\n /// Very low-level function.\n ///\n /// # Advanced\n ///\n /// Every side-effect of a private function is given a \"side-effect counter\", based on when it is created. This\n /// PrivateContext is in charge of assigning the counters.\n ///\n /// The reason we have side-effect counters is complicated. Consider this illustrative pseudocode of inter-contract\n /// function calls:\n /// ```\n /// contract A {\n /// let x = 5; // pseudocode for storage var x.\n /// fn a1 {\n /// read x; // value: 5, counter: 1.\n /// x = x + 1;\n /// write x; // value: 6, counter: 2.\n ///\n /// B.b(); // start_counter: 2, end_counter: 4\n ///\n /// read x; // value: 36, counter: 5.\n /// x = x + 1;\n /// write x; // value: 37, counter: 6.\n /// }\n ///\n /// fn a2 {\n /// read x; // value: 6, counter: 3.\n /// x = x * x;\n /// write x; // value: 36, counter: 4.\n /// }\n /// }\n ///\n /// contract B {\n /// fn b() {\n /// A.a2();\n /// }\n /// }\n /// ```\n ///\n /// Suppose a1 is the first function called. The comments show the execution counter of each side-effect, and what\n /// the new value of `x` is.\n ///\n /// These (private) functions are processed by Aztec's kernel circuits in an order that is different from execution\n /// order: All of A.a1 is proven before B.b is proven, before A.a2 is proven. So when we're in the 2nd execution\n /// frame of A.a1 (after the call to B.b), the circuit needs to justify why x went from being `6` to `36`. But the\n /// circuit doesn't know why, and given the order of proving, the kernel hasn't _seen_ a value of 36 get written\n /// yet. The kernel needs to track big arrays of all side-effects of all private functions in a tx. Then, as it\n /// recurses and processes B.b(), it will eventually see a value of 36 get written.\n ///\n /// Suppose side-effect counters weren't exposed: The kernel would only see this ordering (in order of proof\n /// verification): [ A.a1.read, A.a1.write, A.a1.read, A.a1.write, A.a2.read, A.a2.write ]\n /// [ 5, 6, 36, 37, 6, 36 ]\n /// The kernel wouldn't know _when_ B.b() was called within A.a1(), because it can't see what's going on within an\n /// app circuit. So the kernel wouldn't know that the ordering of reads and writes should actually be: [ A.a1.read,\n /// A.a1.write, A.a2.read, A.a2.write, A.a1.read, A.a1.write ]\n /// [ 5, 6, 6, 36, 36, 37 ]\n ///\n /// And so, we introduced side-effect counters: every private function must assign side-effect counters alongside\n /// every side-effect that it emits, and also expose to the kernel the counters that it started and ended with.\n /// This gives the kernel enough information to arrange all side-effects in the correct order. It can then catch\n /// (for example) if a function tries to read state before it has been written (e.g. if A.a2() maliciously tried to\n /// read a value of x=37) (e.g. if A.a1() maliciously tried to read x=6).\n ///\n /// If a malicious app contract _lies_ and does not count correctly:\n /// - It cannot lie about its start and end counters because the kernel will catch this.\n /// - It _could_ lie about its intermediate counters:\n /// - 1. It could not increment its side-effects correctly\n /// - 2. It could label its side-effects with counters outside of its start and end counters' range. The kernel\n /// will catch 2. The kernel will not catch 1., but this would only cause corruption to the private state of the\n /// malicious contract, and not any other contracts (because a contract can only modify its own state). If a \"good\"\n /// contract is given _read access_ to a maliciously-counting contract (via an external getter function, or by\n /// reading historic state from the archive tree directly), and they then make state changes to their _own_ state\n /// accordingly, that could be dangerous. Developers should be mindful not to trust the claimed innards of external\n /// contracts unless they have audited/vetted the contracts including vetting the side-effect counter\n /// incrementation. This is a similar paradigm to Ethereum smart contract development: you must vet external\n /// contracts that your contract relies upon, and you must not make any presumptions about their claimed behaviour.\n /// (Hopefully if a contract imports a version of aztec-nr, we will get contract verification tooling that can\n /// validate the authenticity of the imported aztec-nr package, and hence infer that the side- effect counting will\n /// be correct, without having to re-audit such logic for every contract).\n ///\n fn next_counter(&mut self) -> u32 {\n let counter = self.side_effect_counter;\n self.side_effect_counter += 1;\n counter\n }\n}\n\nimpl Empty for PrivateContext {\n fn empty() -> Self {\n PrivateContext {\n inputs: PrivateContextInputs::empty(),\n side_effect_counter: 0 as u32,\n min_revertible_side_effect_counter: 0 as u32,\n is_fee_payer: false,\n args_hash: 0,\n return_hash: 0,\n expiration_timestamp: 0,\n note_hash_read_requests: BoundedVec::new(),\n nullifier_read_requests: BoundedVec::new(),\n key_validation_requests_and_separators: BoundedVec::new(),\n note_hashes: BoundedVec::new(),\n nullifiers: BoundedVec::new(),\n private_call_requests: BoundedVec::new(),\n public_call_requests: BoundedVec::new(),\n public_teardown_call_request: PublicCallRequest::empty(),\n l2_to_l1_msgs: BoundedVec::new(),\n anchor_block_header: BlockHeader::empty(),\n private_logs: BoundedVec::new(),\n contract_class_logs_hashes: BoundedVec::new(),\n last_key_validation_requests: [Option::none(); NUM_KEY_TYPES],\n expected_non_revertible_side_effect_counter: 0,\n expected_revertible_side_effect_counter: 0,\n }\n }\n}\n"
|
|
2746
|
+
"source": "use crate::{\n context::{inputs::PrivateContextInputs, NoteExistenceRequest, NullifierExistenceRequest, ReturnsHash},\n hash::{hash_args, hash_calldata_array},\n keys::constants::{NULLIFIER_INDEX, NUM_KEY_TYPES, OUTGOING_INDEX, public_key_domain_separators},\n messaging::process_l1_to_l2_message,\n oracle::{\n block_header::get_block_header_at,\n call_private_function::call_private_function_internal,\n enqueue_public_function_call::{\n is_side_effect_counter_revertible_oracle_wrapper, notify_enqueued_public_function_call,\n notify_set_min_revertible_side_effect_counter, notify_set_public_teardown_function_call,\n },\n execution_cache,\n key_validation_request::get_key_validation_request,\n logs::notify_created_contract_class_log,\n notes::notify_nullified_note,\n nullifiers::notify_created_nullifier,\n },\n};\nuse crate::protocol::{\n abis::{\n block_header::BlockHeader,\n call_context::CallContext,\n function_selector::FunctionSelector,\n gas_settings::GasSettings,\n log_hash::LogHash,\n note_hash::NoteHash,\n nullifier::Nullifier,\n private_call_request::PrivateCallRequest,\n private_circuit_public_inputs::PrivateCircuitPublicInputs,\n private_log::{PrivateLog, PrivateLogData},\n public_call_request::PublicCallRequest,\n validation_requests::{KeyValidationRequest, KeyValidationRequestAndSeparator},\n },\n address::{AztecAddress, EthAddress},\n constants::{\n CONTRACT_CLASS_LOG_SIZE_IN_FIELDS, MAX_CONTRACT_CLASS_LOGS_PER_CALL, MAX_ENQUEUED_CALLS_PER_CALL,\n MAX_KEY_VALIDATION_REQUESTS_PER_CALL, MAX_L2_TO_L1_MSGS_PER_CALL, MAX_NOTE_HASH_READ_REQUESTS_PER_CALL,\n MAX_NOTE_HASHES_PER_CALL, MAX_NULLIFIER_READ_REQUESTS_PER_CALL, MAX_NULLIFIERS_PER_CALL,\n MAX_PRIVATE_CALL_STACK_LENGTH_PER_CALL, MAX_PRIVATE_LOGS_PER_CALL, MAX_TX_LIFETIME,\n NULL_MSG_SENDER_CONTRACT_ADDRESS, PRIVATE_LOG_SIZE_IN_FIELDS,\n },\n hash::poseidon2_hash,\n messaging::l2_to_l1_message::L2ToL1Message,\n side_effect::{Counted, scoped::Scoped},\n traits::{Empty, Hash, ToField},\n utils::arrays::{ClaimedLengthArray, trimmed_array_length_hint},\n};\n\n/// # PrivateContext\n///\n/// The **main interface** between an #[external(\"private\")] function and the Aztec blockchain.\n///\n/// An instance of the PrivateContext is initialized automatically at the outset of every private function, within the\n/// #[external(\"private\")] macro, so you'll never need to consciously instantiate this yourself.\n///\n/// The instance is always named `context`, and it is always be available within the body of every\n/// #[external(\"private\")] function in your smart contract.\n///\n/// > For those used to \"vanilla\" Noir, it might be jarring to have access to > `context` without seeing a declaration\n/// `let context = PrivateContext::new(...)` > within the body of your function. This is just a consequence of using >\n/// macros to tidy-up verbose boilerplate. You can use `nargo expand` to > expand all macros, if you dare.\n///\n/// Typical usage for a smart contract developer will be to call getter methods of the PrivateContext.\n///\n/// _Pushing_ data and requests to the context is mostly handled within aztec-nr's own functions, so typically a smart\n/// contract developer won't need to call any setter methods directly.\n///\n/// > Advanced users might occasionally wish to push data to the context > directly for lower-level control. If you\n/// find yourself doing this, please > open an issue on GitHub to describe your use case: it might be that > new\n/// functionality should be added to aztec-nr.\n///\n/// ## Responsibilities\n/// - Exposes contextual data to a private function:\n/// - Data relating to how this private function was called.\n/// - msg_sender\n/// - this_address - (the contract address of the private function being executed)\n/// - See `CallContext` for more data.\n/// - Data relating to the transaction in which this private function is being executed.\n/// - chain_id\n/// - version\n/// - gas_settings\n/// - Provides state access:\n/// - Access to the \"Anchor block\" header. Recall, a private function cannot read from the \"current\" block header, but\n/// must read from some historical block header, because as soon as private function execution begins (asynchronously,\n/// on a user's device), the public state of the chain (the \"current state\") will have progressed forward. We call this\n/// reference the \"Anchor block\". See `BlockHeader`.\n/// - Enables consumption of L1->L2 messages.\n/// - Enables calls to functions of other smart contracts:\n/// - Private function calls\n/// - Enqueueing of public function call requests (Since public functions are executed at a later time, by a block\n/// proposer, we say they are \"enqueued\").\n/// - Writes data to the blockchain:\n/// - New notes\n/// - New nullifiers\n/// - Private logs (for sending encrypted note contents or encrypted events)\n/// - New L2->L1 messages.\n/// - Provides args to the private function (handled by the #[external(\"private\")] macro).\n/// - Returns the return values of this private function (handled by the\n/// #[external(\"private\")] macro).\n/// - Makes Key Validation Requests.\n/// - Private functions are not allowed to see master secret keys, because we do not trust them. They are instead given\n/// \"app-siloed\" secret keys with a claim that they relate to a master public key. They can then request validation of\n/// this claim, by making a \"key validation request\" to the protocol's kernel circuits (which _are_ allowed to see\n/// certain master secret keys).\n///\n/// ## Advanced Responsibilities\n///\n/// - Ultimately, the PrivateContext is responsible for constructing the PrivateCircuitPublicInputs of the private\n/// function being executed. All private functions on Aztec must have public inputs which adhere to the rigid layout of\n/// the PrivateCircuitPublicInputs, in order to be compatible with the protocol's kernel circuits. A well-known\n/// misnomer:\n/// - \"public inputs\" contain both inputs and outputs of this function.\n/// - By \"outputs\" we mean a lot more side-effects than just the \"return values\" of the function.\n/// - Most of the so-called \"public inputs\" are kept _private_, and never leak to the outside world, because they are\n/// 'swallowed' by the protocol's kernel circuits before the tx is sent to the network. Only the following are exposed\n/// to the outside world:\n/// - New note_hashes\n/// - New nullifiers\n/// - New private logs\n/// - New L2->L1 messages\n/// - New enqueued public function call requests All the above-listed arrays of side-effects can be padded by the\n/// user's wallet (through instructions to the kernel circuits, via the PXE) to obscure their true lengths.\n///\n/// ## Syntax Justification\n///\n/// Both user-defined functions _and_ most functions in aztec-nr need access to the PrivateContext instance to\n/// read/write data. This is why you'll see the arguably-ugly pervasiveness of the \"context\" throughout your smart\n/// contract and the aztec-nr library. For example, `&mut context` is prevalent. In some languages, you can access and\n/// mutate a global variable (such as a PrivateContext instance) from a function without polluting the function's\n/// parameters. With Noir, a function must explicitly pass control of a mutable variable to another function, by\n/// reference. Since many functions in aztec-nr need to be able to push new data to the PrivateContext, they need to be\n/// handed a mutable reference _to_ the context as a parameter. For example, `Context` is prevalent as a generic\n/// parameter, to give better type safety at compile time. Many `aztec-nr` functions don't make sense if they're called\n/// in a particular runtime (private, public or utility), and so are intentionally only implemented over certain\n/// [Private|Public|Utility]Context structs. This gives smart contract developers a much faster feedback loop if\n/// they're making a mistake, as an error will be thrown by the LSP or when they compile their contract.\n///\n#[derive(Eq)]\npub struct PrivateContext {\n // docs:start:private-context\n pub inputs: PrivateContextInputs,\n pub side_effect_counter: u32,\n\n pub min_revertible_side_effect_counter: u32,\n pub is_fee_payer: bool,\n\n pub args_hash: Field,\n pub return_hash: Field,\n\n pub expiration_timestamp: u64,\n\n pub(crate) note_hash_read_requests: BoundedVec<Scoped<Counted<Field>>, MAX_NOTE_HASH_READ_REQUESTS_PER_CALL>,\n pub(crate) nullifier_read_requests: BoundedVec<Scoped<Counted<Field>>, MAX_NULLIFIER_READ_REQUESTS_PER_CALL>,\n key_validation_requests_and_separators: BoundedVec<KeyValidationRequestAndSeparator, MAX_KEY_VALIDATION_REQUESTS_PER_CALL>,\n\n pub note_hashes: BoundedVec<Counted<NoteHash>, MAX_NOTE_HASHES_PER_CALL>,\n pub nullifiers: BoundedVec<Counted<Nullifier>, MAX_NULLIFIERS_PER_CALL>,\n\n pub private_call_requests: BoundedVec<PrivateCallRequest, MAX_PRIVATE_CALL_STACK_LENGTH_PER_CALL>,\n pub public_call_requests: BoundedVec<Counted<PublicCallRequest>, MAX_ENQUEUED_CALLS_PER_CALL>,\n pub public_teardown_call_request: PublicCallRequest,\n pub l2_to_l1_msgs: BoundedVec<Counted<L2ToL1Message>, MAX_L2_TO_L1_MSGS_PER_CALL>,\n // docs:end:private-context\n\n // Header of a block whose state is used during private execution (not the block the transaction is included in).\n pub anchor_block_header: BlockHeader,\n\n pub private_logs: BoundedVec<Counted<PrivateLogData>, MAX_PRIVATE_LOGS_PER_CALL>,\n pub contract_class_logs_hashes: BoundedVec<Counted<LogHash>, MAX_CONTRACT_CLASS_LOGS_PER_CALL>,\n\n // Contains the last key validation request for each key type. This is used to cache the last request and avoid\n // fetching the same request multiple times. The index of the array corresponds to the key type (0 nullifier, 1\n // incoming, 2 outgoing, 3 tagging).\n pub last_key_validation_requests: [Option<KeyValidationRequest>; NUM_KEY_TYPES],\n\n pub expected_non_revertible_side_effect_counter: u32,\n pub expected_revertible_side_effect_counter: u32,\n}\n\nimpl PrivateContext {\n pub fn new(inputs: PrivateContextInputs, args_hash: Field) -> PrivateContext {\n PrivateContext {\n inputs,\n side_effect_counter: inputs.start_side_effect_counter + 1,\n min_revertible_side_effect_counter: 0,\n is_fee_payer: false,\n args_hash,\n return_hash: 0,\n expiration_timestamp: inputs.anchor_block_header.timestamp() + MAX_TX_LIFETIME,\n note_hash_read_requests: BoundedVec::new(),\n nullifier_read_requests: BoundedVec::new(),\n key_validation_requests_and_separators: BoundedVec::new(),\n note_hashes: BoundedVec::new(),\n nullifiers: BoundedVec::new(),\n anchor_block_header: inputs.anchor_block_header,\n private_call_requests: BoundedVec::new(),\n public_call_requests: BoundedVec::new(),\n public_teardown_call_request: PublicCallRequest::empty(),\n l2_to_l1_msgs: BoundedVec::new(),\n private_logs: BoundedVec::new(),\n contract_class_logs_hashes: BoundedVec::new(),\n last_key_validation_requests: [Option::none(); NUM_KEY_TYPES],\n expected_non_revertible_side_effect_counter: 0,\n expected_revertible_side_effect_counter: 0,\n }\n }\n\n /// Returns the contract address that initiated this function call.\n ///\n /// This is similar to `msg.sender` in Solidity (hence the name).\n ///\n /// Important Note: Since Aztec doesn't have a concept of an EoA (Externally-owned Account), the msg_sender is\n /// \"none\" for the first function call of every transaction. The first function call of a tx is likely to be a call\n /// to the user's account contract, so this quirk will most often be handled by account contract developers.\n ///\n /// # Returns\n /// * `Option<AztecAddress>` - The address of the smart contract that called this function (be it an app contract\n /// or a user's account contract). Returns `Option<AztecAddress>::none` for the first function call of the tx. No\n /// other _private_ function calls in the tx will have a `none` msg_sender, but _public_ function calls might (see\n /// the PublicContext).\n pub fn maybe_msg_sender(self) -> Option<AztecAddress> {\n let maybe_msg_sender = self.inputs.call_context.msg_sender;\n if maybe_msg_sender == NULL_MSG_SENDER_CONTRACT_ADDRESS {\n Option::none()\n } else {\n Option::some(maybe_msg_sender)\n }\n }\n\n /// Returns the contract address of the current function being executed.\n ///\n /// This is equivalent to `address(this)` in Solidity (hence the name). Use this to identify the current contract's\n /// address, commonly needed for access control or when interacting with other contracts.\n ///\n /// # Returns\n /// * `AztecAddress` - The contract address of the current function being executed.\n ///\n pub fn this_address(self) -> AztecAddress {\n self.inputs.call_context.contract_address\n }\n\n /// Returns the chain ID of the current network.\n ///\n /// This is similar to `block.chainid` in Solidity. Returns the unique identifier for the blockchain network this\n /// transaction is executing on.\n ///\n /// Helps prevent cross-chain replay attacks. Useful if implementing multi-chain contract logic.\n ///\n /// # Returns\n /// * `Field` - The chain ID as a field element\n ///\n pub fn chain_id(self) -> Field {\n self.inputs.tx_context.chain_id\n }\n\n /// Returns the Aztec protocol version that this transaction is executing under. Different versions may have\n /// different rules, opcodes, or cryptographic primitives.\n ///\n /// This is similar to how Ethereum has different EVM versions.\n ///\n /// Useful for forward/backward compatibility checks\n ///\n /// Not to be confused with contract versions; this is the protocol version.\n ///\n /// # Returns\n /// * `Field` - The protocol version as a field element\n ///\n pub fn version(self) -> Field {\n self.inputs.tx_context.version\n }\n\n /// Returns the gas settings for the current transaction.\n ///\n /// This provides information about gas limits and pricing for the transaction, similar to `tx.gasprice` and gas\n /// limits in Ethereum. However, Aztec has a more sophisticated gas model with separate accounting for L2\n /// computation and data availability (DA) costs.\n ///\n /// # Returns\n /// * `GasSettings` - Struct containing gas limits and fee information\n ///\n pub fn gas_settings(self) -> GasSettings {\n self.inputs.tx_context.gas_settings\n }\n\n /// Returns the function selector of the currently executing function.\n ///\n /// Low-level function: Ordinarily, smart contract developers will not need to access this.\n ///\n /// This is similar to `msg.sig` in Solidity, which returns the first 4 bytes of the function signature. In Aztec,\n /// the selector uniquely identifies which function within the contract is being called.\n ///\n /// # Returns\n /// * `FunctionSelector` - The 4-byte function identifier\n ///\n /// # Advanced\n /// Only #[external(\"private\")] functions have a function selector as a protocol- enshrined concept. The function\n /// selectors of private functions are baked into the preimage of the contract address, and are used by the\n /// protocol's kernel circuits to identify each private function and ensure the correct one is being executed.\n ///\n /// Used internally for function dispatch and call verification.\n ///\n pub fn selector(self) -> FunctionSelector {\n self.inputs.call_context.function_selector\n }\n\n /// Returns the hash of the arguments passed to the current function.\n ///\n /// Very low-level function: You shouldn't need to call this. The #[external(\"private\")] macro calls this, and it\n /// makes the arguments neatly available to the body of your private function.\n ///\n /// # Returns\n /// * `Field` - Hash of the function arguments\n ///\n /// # Advanced\n /// * Arguments are hashed to reduce proof size and verification time\n /// * Enables efficient argument passing in recursive function calls\n /// * The hash can be used to retrieve the original arguments from the PXE.\n ///\n pub fn get_args_hash(self) -> Field {\n self.args_hash\n }\n\n /// Pushes a new note_hash to the Aztec blockchain's global Note Hash Tree (a state tree).\n ///\n /// A note_hash is a commitment to a piece of private state.\n ///\n /// Low-level function: Ordinarily, smart contract developers will not need to manually call this. Aztec-nr's state\n /// variables (see `../state_vars/`) are designed to understand when to create and push new note hashes.\n ///\n /// # Arguments\n /// * `note_hash` - The new note_hash.\n ///\n /// # Advanced\n /// From here, the protocol's kernel circuits will take over and insert the note_hash into the protocol's \"note\n /// hash tree\" (in the Base Rollup circuit). Before insertion, the protocol will:\n /// - \"Silo\" the `note_hash` with the contract address of this function, to yield a `siloed_note_hash`. This\n /// prevents state collisions between different smart contracts.\n /// - Ensure uniqueness of the `siloed_note_hash`, to prevent Faerie-Gold attacks, by hashing the\n /// `siloed_note_hash` with a unique value, to yield a `unique_siloed_note_hash` (see the protocol spec for more).\n ///\n /// In addition to calling this function, aztec-nr provides the contents of the newly-created note to the PXE, via\n /// the `notify_created_note` oracle.\n ///\n /// > Advanced users might occasionally wish to push data to the context > directly for lower-level control. If you\n /// find yourself doing this, > please open an issue on GitHub to describe your use case: it might be > that new\n /// functionality should be added to aztec-nr.\n ///\n pub fn push_note_hash(&mut self, note_hash: Field) {\n self.note_hashes.push(Counted::new(note_hash, self.next_counter()));\n }\n\n /// Pushes a new nullifier to the Aztec blockchain's global Nullifier Tree (a state tree).\n ///\n /// See also: `push_nullifier_for_note_hash`.\n ///\n /// Low-level function: Ordinarily, smart contract developers will not need to manually call this. Aztec-nr's state\n /// variables (see `../state_vars/`) are designed to understand when to create and push new nullifiers.\n ///\n /// A nullifier can only be emitted once. Duplicate nullifier insertions are rejected by the protocol.\n ///\n /// Generally, a nullifier is emitted to prevent an action from happening more than once, in such a way that the\n /// action cannot be linked (by an observer of the blockchain) to any earlier transactions.\n ///\n /// I.e. a nullifier is a random-looking, but deterministic record of a private, one-time action, which does not\n /// leak what action has been taken, and which preserves the property of \"tx unlinkability\".\n ///\n /// Usually, a nullifier will be emitted to \"spend\" a note (a piece of private state), without revealing which\n /// specific note is being spent.\n ///\n /// (Important: in such cases, use the below `push_nullifier_for_note_hash`).\n ///\n /// Sometimes, a nullifier might be emitted completely unrelated to any notes. Examples include initialization of a\n /// new contract; initialization of a PrivateMutable, or signalling in Semaphore-like applications. This\n /// `push_nullifier` function serves such use cases.\n ///\n /// # Arguments\n /// * `nullifier`\n ///\n /// # Advanced\n /// From here, the protocol's kernel circuits will take over and insert the nullifier into the protocol's\n /// \"nullifier tree\" (in the Base Rollup circuit). Before insertion, the protocol will:\n /// - \"Silo\" the `nullifier` with the contract address of this function, to yield a `siloed_nullifier`. This\n /// prevents state collisions between different smart contracts.\n /// - Ensure the `siloed_nullifier` is unique (the nullifier tree is an indexed merkle tree which supports\n /// efficient non-membership proofs).\n ///\n pub fn push_nullifier(&mut self, nullifier: Field) {\n notify_created_nullifier(nullifier);\n self.nullifiers.push(Nullifier { value: nullifier, note_hash: 0 }.count(self.next_counter()));\n }\n\n /// Pushes a nullifier that corresponds to a specific note hash.\n ///\n /// Low-level function: Ordinarily, smart contract developers will not need to manually call this. Aztec-nr's state\n /// variables (see `../state_vars/`) are designed to understand when to create and push new nullifiers.\n ///\n /// This is a specialized version of `push_nullifier` that links a nullifier to the specific note hash it's\n /// nullifying. This is the most common usage pattern for nullifiers. See `push_nullifier` for more explanation on\n /// nullifiers.\n ///\n /// # Arguments\n /// * `nullifier`\n /// * `nullified_note_hash` - The note hash of the note being nullified\n ///\n /// # Advanced\n ///Important: usage of this function doesn't mean that the world will _see_ that this nullifier relates to the\n /// given nullified_note_hash (as that would violate \"tx unlinkability\"); it simply informs the user's PXE about\n /// the relationship (via `notify_nullified_note`). The PXE can then use this information to feed hints to the\n /// kernel circuits for \"squashing\" purposes: If a note is nullified during the same tx which created it, we can\n /// \"squash\" (delete) the note and nullifier (and any private logs associated with the note), to save on data\n /// emission costs.\n ///\n pub fn push_nullifier_for_note_hash(&mut self, nullifier: Field, nullified_note_hash: Field) {\n let nullifier_counter = self.next_counter();\n notify_nullified_note(nullifier, nullified_note_hash, nullifier_counter);\n self.nullifiers.push(Nullifier { value: nullifier, note_hash: nullified_note_hash }.count(nullifier_counter));\n }\n\n /// Returns the anchor block header - the historical block header that this private function is reading from.\n ///\n /// A private function CANNOT read from the \"current\" block header, but must read from some older block header,\n /// because as soon as private function execution begins (asynchronously, on a user's device), the public state of\n /// the chain (the \"current state\") will have progressed forward.\n ///\n /// # Returns\n /// * `BlockHeader` - The anchor block header.\n ///\n /// # Advanced\n /// * All private functions of a tx read from the same anchor block header.\n /// * The protocol asserts that the `expiration_timestamp` of every tx is at most 24 hours beyond the timestamp of\n /// the tx's chosen anchor block header. This enables the network's nodes to safely prune old txs from the mempool.\n /// Therefore, the chosen block header _must_ be one from within the last 24 hours.\n ///\n pub fn get_anchor_block_header(self) -> BlockHeader {\n self.anchor_block_header\n }\n\n /// Returns the header of any historical block at or before the anchor block.\n ///\n /// This enables private contracts to access information from even older blocks than the anchor block header.\n ///\n /// Useful for time-based contract logic that needs to compare against multiple historical points.\n ///\n /// # Arguments\n /// * `block_number` - The block number to retrieve (must be <= anchor block number)\n ///\n /// # Returns\n /// * `BlockHeader` - The header of the requested historical block\n ///\n /// # Advanced\n /// This function uses an oracle to fetch block header data from the user's PXE. Depending on how much blockchain\n /// data the user's PXE has been set up to store, this might require a query from the PXE to another Aztec node to\n /// get the data. > This is generally true of all oracle getters (see `../oracle`).\n ///\n /// Each block header gets hashed and stored as a leaf in the protocol's Archive Tree. In fact, the i-th block\n /// header gets stored at the i-th leaf index of the Archive Tree. Behind the scenes, this `get_block_header_at`\n /// function will add Archive Tree merkle-membership constraints (~3k) to your smart contract function's circuit,\n /// to prove existence of the block header in the Archive Tree.\n ///\n /// Note: we don't do any caching, so avoid making duplicate calls for the same block header, because each call\n /// will add duplicate constraints.\n ///\n /// Calling this function is more expensive (constraint-wise) than getting the anchor block header (via\n /// `get_block_header`). This is because the anchor block's merkle membership proof is handled by Aztec's protocol\n /// circuits, and is only performed once for the entire tx because all private functions of a tx share a common\n /// anchor block header. Therefore, the cost (constraint-wise) of calling `get_block_header` is effectively free.\n ///\n pub fn get_block_header_at(self, block_number: u32) -> BlockHeader {\n get_block_header_at(block_number, self)\n }\n\n /// Sets the hash of the return values for this private function.\n ///\n /// Very low-level function: this is called by the #[external(\"private\")] macro.\n ///\n /// # Arguments\n /// * `serialized_return_values` - The serialized return values as a field array\n ///\n pub fn set_return_hash<let N: u32>(&mut self, serialized_return_values: [Field; N]) {\n let return_hash = hash_args(serialized_return_values);\n self.return_hash = return_hash;\n execution_cache::store(serialized_return_values, return_hash);\n }\n\n /// Builds the PrivateCircuitPublicInputs for this private function, to ensure compatibility with the protocol's\n /// kernel circuits.\n ///\n /// Very low-level function: This function is automatically called by the #[external(\"private\")] macro.\n pub fn finish(self) -> PrivateCircuitPublicInputs {\n PrivateCircuitPublicInputs {\n call_context: self.inputs.call_context,\n args_hash: self.args_hash,\n returns_hash: self.return_hash,\n min_revertible_side_effect_counter: self.min_revertible_side_effect_counter,\n is_fee_payer: self.is_fee_payer,\n expiration_timestamp: self.expiration_timestamp,\n note_hash_read_requests: ClaimedLengthArray::from_bounded_vec(self.note_hash_read_requests),\n nullifier_read_requests: ClaimedLengthArray::from_bounded_vec(self.nullifier_read_requests),\n key_validation_requests_and_separators: ClaimedLengthArray::from_bounded_vec(\n self.key_validation_requests_and_separators,\n ),\n note_hashes: ClaimedLengthArray::from_bounded_vec(self.note_hashes),\n nullifiers: ClaimedLengthArray::from_bounded_vec(self.nullifiers),\n private_call_requests: ClaimedLengthArray::from_bounded_vec(self.private_call_requests),\n public_call_requests: ClaimedLengthArray::from_bounded_vec(self.public_call_requests),\n public_teardown_call_request: self.public_teardown_call_request,\n l2_to_l1_msgs: ClaimedLengthArray::from_bounded_vec(self.l2_to_l1_msgs),\n start_side_effect_counter: self.inputs.start_side_effect_counter,\n end_side_effect_counter: self.side_effect_counter,\n private_logs: ClaimedLengthArray::from_bounded_vec(self.private_logs),\n contract_class_logs_hashes: ClaimedLengthArray::from_bounded_vec(self.contract_class_logs_hashes),\n anchor_block_header: self.anchor_block_header,\n tx_context: self.inputs.tx_context,\n expected_non_revertible_side_effect_counter: self.expected_non_revertible_side_effect_counter,\n expected_revertible_side_effect_counter: self.expected_revertible_side_effect_counter,\n }\n }\n\n /// Designates this contract as the fee payer for the transaction.\n ///\n /// Unlike Ethereum, where the transaction sender always pays fees, Aztec allows any contract to voluntarily pay\n /// transaction fees. This enables patterns like sponsored transactions or fee abstraction where users don't need\n /// to hold fee-juice themselves. (Fee juice is a fee-paying asset for Aztec).\n ///\n /// Only one contract per transaction can declare itself as the fee payer, and it must have sufficient fee-juice\n /// balance (>= the gas limits specified in the TxContext) by the time we reach the public setup phase of the tx.\n ///\n pub fn set_as_fee_payer(&mut self) {\n crate::protocol::logging::debug_log_format(\"Setting {0} as fee payer\", [self.this_address().to_field()]);\n self.is_fee_payer = true;\n }\n\n pub fn in_revertible_phase(&mut self) -> bool {\n let current_counter = self.side_effect_counter;\n\n // Safety: Kernel will validate that the claim is correct by validating the expected counters.\n let is_revertible = unsafe { is_side_effect_counter_revertible_oracle_wrapper(current_counter) };\n\n if is_revertible {\n if (self.expected_revertible_side_effect_counter == 0)\n | (current_counter < self.expected_revertible_side_effect_counter) {\n self.expected_revertible_side_effect_counter = current_counter;\n }\n } else if current_counter > self.expected_non_revertible_side_effect_counter {\n self.expected_non_revertible_side_effect_counter = current_counter;\n }\n\n is_revertible\n }\n\n /// Declares the end of the \"setup phase\" of this tx.\n ///\n /// Only one function per tx can declare the end of the setup phase.\n ///\n /// Niche function: Only wallet developers and paymaster contract developers (aka Fee-payment contracts) will need\n /// to make use of this function.\n ///\n /// Aztec supports a three-phase execution model: setup, app logic, teardown. The phases exist to enable a fee\n /// payer to take on the risk of paying a transaction fee, safe in the knowledge that their payment (in whatever\n /// token or method the user chooses) will succeed, regardless of whether the app logic will succeed. The \"setup\"\n /// phase enables such a payment to be made, because the setup phase _cannot revert_: a reverting function within\n /// the setup phase would result in an invalid block which cannot be proven. Any side-effects generated during that\n /// phase are guaranteed to be inserted into Aztec's state trees (except for squashed notes & nullifiers, of\n /// course).\n ///\n /// Even though the end of the setup phase is declared within a private function, you might have noticed that\n /// _public_ functions can also execute within the setup phase. This is because any public function calls which\n /// were enqueued _within the setup phase_ by a private function are considered part of the setup phase.\n ///\n /// # Advanced\n /// * Sets the minimum revertible side effect counter of this tx to be the PrivateContext's _current_ side effect\n /// counter.\n ///\n pub fn end_setup(&mut self) {\n // Incrementing the side effect counter when ending setup ensures non ambiguity for the counter where we change\n // phases.\n self.side_effect_counter += 1;\n // crate::protocol::logging::debug_log_format(\n // \"Ending setup at counter {0}\",\n // [self.side_effect_counter as Field]\n // );\n self.min_revertible_side_effect_counter = self.next_counter();\n notify_set_min_revertible_side_effect_counter(self.min_revertible_side_effect_counter);\n }\n\n /// Sets a deadline (an \"include-by timestamp\") for when this transaction must be included in a block.\n ///\n /// Other functions in this tx might call this setter with differing values for the include-by timestamp. To ensure\n /// that all functions' deadlines are met, the _minimum_ of all these include-by timestamps will be exposed when\n /// this tx is submitted to the network.\n ///\n /// If the transaction is not included in a block by its include-by timestamp, it becomes invalid and it will never\n /// be included.\n ///\n /// This expiry timestamp is publicly visible. See the \"Advanced\" section for privacy concerns.\n ///\n /// # Arguments\n /// * `expiration_timestamp` - Unix timestamp (seconds) deadline for inclusion. The include-by timestamp of this tx\n /// will be _at most_ the timestamp specified.\n ///\n /// # Advanced\n /// * If multiple functions set differing `expiration_timestamp`s, the kernel circuits will set it to be the\n /// _minimum_ of the two. This ensures the tx expiry requirements of all functions in the tx are met.\n /// * Rollup circuits will reject expired txs.\n /// * The protocol enforces that all transactions must be included within 24 hours of their chosen anchor block's\n /// timestamp, to enable safe mempool pruning.\n /// * The DelayedPublicMutable design makes heavy use of this functionality, to enable private functions to read\n /// public state.\n /// * A sophisticated Wallet should cleverly set an include-by timestamp to improve the privacy of the user and the\n /// network as a whole. For example, if a contract interaction sets include-by to some publicly-known value (e.g.\n /// the time when a contract upgrades), then the wallet might wish to set an even lower one to avoid revealing that\n /// this tx is interacting with said contract. Ideally, all wallets should standardize on an approach in order to\n /// provide users with a large anonymity set -- although the exact approach\n /// will need to be discussed. Wallets that deviate from a standard might accidentally reveal which wallet each\n /// transaction originates from.\n ///\n // docs:start:expiration-timestamp\n pub fn set_expiration_timestamp(&mut self, expiration_timestamp: u64) {\n // docs:end:expiration-timestamp\n self.expiration_timestamp = std::cmp::min(self.expiration_timestamp, expiration_timestamp);\n }\n\n /// Asserts that a note has been created.\n ///\n /// This function will cause the transaction to fail unless the requested note exists. This is the preferred\n /// mechanism for performing this check, and the only one that works for pending notes.\n ///\n /// ## Pending Notes\n ///\n /// Both settled notes (created in prior transactions) and pending notes (created in the current transaction) will\n /// be considered by this function. Pending notes must have been created **before** this call is made for the check\n /// to pass.\n ///\n /// ## Historical Notes\n ///\n /// If you need to assert that a note existed _by some specific block in the past_, instead of simply proving that\n /// it exists by the current anchor block, use [`crate::history::note::assert_note_existed_by`] instead.\n ///\n /// ## Cost\n ///\n /// This uses up one of the call's kernel note hash read requests, which are limited. Like all kernel requests,\n /// proving time costs are only incurred when the total number of requests exceeds the kernel's capacity, requiring\n /// an additional invocation of the kernel reset circuit.\n pub fn assert_note_exists(&mut self, note_existence_request: NoteExistenceRequest) {\n // Note that the `note_hash_read_requests` array does not hold `NoteExistenceRequest` objects, but rather a\n // custom kernel type. We convert from the aztec-nr type into it.\n\n let note_hash = note_existence_request.note_hash();\n let contract_address = note_existence_request.maybe_contract_address().unwrap_or(AztecAddress::zero());\n\n let side_effect = Scoped::new(\n Counted::new(note_hash, self.next_counter()),\n contract_address,\n );\n\n self.note_hash_read_requests.push(side_effect);\n }\n\n /// Asserts that a nullifier has been emitted.\n ///\n /// This function will cause the transaction to fail unless the requested nullifier exists. This is the preferred\n /// mechanism for performing this check, and the only one that works for pending nullifiers.\n ///\n /// ## Pending Nullifiers\n ///\n /// Both settled nullifiers (emitted in prior transactions) and pending nullifiers (emitted in the current\n /// transaction) will be considered by this function. Pending nullifiers must have been emitted **before** this\n /// call is made for the check to pass.\n ///\n /// ## Historical Nullifiers\n ///\n /// If you need to assert that a nullifier existed _by some specific block in the past_, instead of simply proving\n /// that it exists by the current anchor block, use [`crate::history::nullifier::assert_nullifier_existed_by`]\n /// instead.\n ///\n /// ## Public vs Private\n ///\n /// In general, it is unsafe to check for nullifier non-existence in private, as that will not consider the\n /// possibility of the nullifier having been emitted in any transaction between the anchor block and the inclusion\n /// block. Private functions instead prove existence via this function and 'prove' non-existence by _emitting_ the\n /// nullifer, which would cause the transaction to fail if the nullifier existed.\n ///\n /// This is not the case in public functions, which do have access to the tip of the blockchain and so can reliably\n /// prove whether a nullifier exists or not via\n /// [`crate::context::public_context::PublicContext::nullifier_exists_unsafe`].\n ///\n /// ## Cost\n ///\n /// This uses up one of the call's kernel nullifier read requests, which are limited. Like all kernel requests,\n /// proving time costs are only incurred when the total number of requests exceeds the kernel's capacity, requiring\n /// an additional invocation of the kernel reset circuit.\n pub fn assert_nullifier_exists(&mut self, nullifier_existence_request: NullifierExistenceRequest) {\n let nullifier = nullifier_existence_request.nullifier();\n let contract_address = nullifier_existence_request.maybe_contract_address().unwrap_or(AztecAddress::zero());\n\n let request = Scoped::new(\n Counted::new(nullifier, self.next_counter()),\n contract_address,\n );\n\n self.nullifier_read_requests.push(request);\n }\n\n /// Requests the app-siloed nullifier hiding key (nhk_app) for the given (hashed) master nullifier public key\n /// (npk_m), from the user's PXE.\n ///\n /// Advanced function: Only needed if you're designing your own notes and/or nullifiers.\n ///\n /// Contracts are not allowed to compute nullifiers for other contracts, as that would let them read parts of their\n /// private state. Because of this, a contract is only given an \"app-siloed key\", which is constructed by\n /// hashing the user's master nullifier hiding key with the contract's address. However, because contracts cannot\n /// be trusted with a user's master nullifier hiding key (because we don't know which contracts are honest or\n /// malicious), the PXE refuses to provide any master secret keys to any app smart contract function. This means\n /// app functions are unable to prove that the derivation of an app-siloed nullifier hiding key has been computed\n /// correctly. Instead, an app function can request to the kernel (via `request_nhk_app`) that it validates the\n /// siloed derivation, since the kernel has been vetted to not leak any master secret keys.\n ///\n /// A common nullification scheme is to inject a nullifier hiding key into the preimage of a nullifier, to make the\n /// nullifier deterministic but random-looking. This function enables that flow.\n ///\n /// # Arguments\n /// * `npk_m_hash` - A hash of the master nullifier public key of the user whose PXE is executing this function.\n ///\n /// # Returns\n /// * The app-siloed nullifier hiding key that corresponds to the given `npk_m_hash`.\n ///\n pub fn request_nhk_app(&mut self, npk_m_hash: Field) -> Field {\n self.request_sk_app(npk_m_hash, NULLIFIER_INDEX)\n }\n\n /// Requests the app-siloed nullifier secret key (nsk_app) for the given (hashed) master nullifier public key\n /// (npk_m), from the user's PXE.\n ///\n /// See `request_nsk_app` and `request_sk_app` for more info.\n ///\n /// The intention of the \"outgoing\" keypair is to provide a second secret key for all of a user's outgoing activity\n /// (i.e. for notes that a user creates, as opposed to notes that a user receives from others). The separation of\n /// incoming and outgoing data was a distinction made by zcash, with the intention of enabling a user to optionally\n /// share with a 3rd party a controlled view of only incoming or outgoing notes. Similar functionality of sharing\n /// select data can be achieved with offchain zero-knowledge proofs. It is up to an app developer whether they\n /// choose to make use of a user's outgoing keypair within their application logic, or instead simply use the same\n /// keypair (the address keypair (which is effectively the same as the \"incoming\" keypair)) for all incoming &\n /// outgoing messages to a user.\n ///\n /// Currently, all of the exposed encryption functions in aztec-nr ignore the outgoing viewing keys, and instead\n /// encrypt all note logs and event logs to a user's address public key.\n ///\n /// # Arguments\n /// * `ovpk_m_hash` - Hash of the outgoing viewing public key master\n ///\n /// # Returns\n /// * The application-specific outgoing viewing secret key\n ///\n pub fn request_ovsk_app(&mut self, ovpk_m_hash: Field) -> Field {\n self.request_sk_app(ovpk_m_hash, OUTGOING_INDEX)\n }\n\n /// Pushes a Key Validation Request to the kernel.\n ///\n /// Private functions are not allowed to see a user's master secret keys, because we do not trust them. They are\n /// instead given \"app-siloed\" secret keys with a claim that they relate to a master public key. They can then\n /// request validation of this claim, by making a \"key validation request\" to the protocol's kernel circuits (which\n /// _are_ allowed to see certain master secret keys).\n ///\n /// When a Key Validation Request tuple of (sk_app, Pk_m, app_address) is submitted to the kernel, it will perform\n /// the following derivations to validate the relationship between the claimed sk_app and the user's Pk_m:\n ///\n /// (sk_m) ----> * G ----> Pk_m\n /// | |\n /// v We use the kernel to prove this\n /// h(sk_m, app_address) | sk_app-Pk_m relationship, because app\n /// | circuits must not be trusted to see sk_m.\n /// v |\n /// sk_app - - - - - - - - -\n ///\n /// The function is named \"request_\" instead of \"get_\" to remind the user that a Key Validation Request will be\n /// emitted to the kernel.\n ///\n fn request_sk_app(&mut self, pk_m_hash: Field, key_index: Field) -> Field {\n let cached_request =\n self.last_key_validation_requests[key_index as u32].unwrap_or(KeyValidationRequest::empty());\n\n if cached_request.pk_m.hash() == pk_m_hash {\n // We get a match so the cached request is the latest one\n cached_request.sk_app\n } else {\n // We didn't get a match meaning the cached result is stale Typically we'd validate keys by showing that\n // they are the preimage of `pk_m_hash`, but that'd require the oracle returning the master secret keys,\n // which could cause malicious contracts to leak it or learn about secrets from other contracts. We\n // therefore silo secret keys, and rely on the private kernel to validate that we siloed secret key\n // corresponds to correct siloing of the master secret key that hashes to `pk_m_hash`.\n\n // Safety: Kernels verify that the key validation request is valid and below we verify that a request for\n // the correct public key has been received.\n let request = unsafe { get_key_validation_request(pk_m_hash, key_index) };\n assert_eq(request.pk_m.hash(), pk_m_hash, \"Obtained invalid key validation request\");\n\n self.key_validation_requests_and_separators.push(\n KeyValidationRequestAndSeparator {\n request,\n key_type_domain_separator: public_key_domain_separators[key_index as u32],\n },\n );\n self.last_key_validation_requests[key_index as u32] = Option::some(request);\n request.sk_app\n }\n }\n\n /// Sends an \"L2 -> L1 message\" from this function (Aztec, L2) to a smart contract on Ethereum (L1). L1 contracts\n /// which are designed to send/receive messages to/from Aztec are called \"Portal Contracts\".\n ///\n /// Common use cases include withdrawals, cross-chain asset transfers, and triggering L1 actions based on L2 state\n /// changes.\n ///\n /// The message will be inserted into an Aztec \"Outbox\" contract on L1, when this transaction's block is proposed\n /// to L1. Sending the message will not result in any immediate state changes in the target portal contract. The\n /// message will need to be manually consumed from the Outbox through a separate Ethereum transaction: a user will\n /// need to call a function of the portal contract -- a function specifically designed to make a call to the Outbox\n /// to consume the message. The message will only be available for consumption once the _epoch_ proof has been\n /// submitted. Given that there are multiple Aztec blocks within an epoch, it might take some time for this epoch\n /// proof to be submitted -- especially if the block was near the start of an epoch.\n ///\n /// # Arguments\n /// * `recipient` - Ethereum address that will receive the message\n /// * `content` - Message content (32 bytes as a Field element). This content has a very\n /// specific layout. docs:start:context_message_portal\n pub fn message_portal(&mut self, recipient: EthAddress, content: Field) {\n let message = L2ToL1Message { recipient, content };\n self.l2_to_l1_msgs.push(message.count(self.next_counter()));\n }\n\n /// Consumes a message sent from Ethereum (L1) to Aztec (L2).\n ///\n /// Common use cases include token bridging, cross-chain governance, and triggering L2 actions based on L1 events.\n ///\n /// Use this function if you only want the message to ever be \"referred to\" once. Once consumed using this method,\n /// the message cannot be consumed again, because a nullifier is emitted. If your use case wants for the message to\n /// be read unlimited times, then you can always read any historic message from the L1-to-L2 messages tree;\n /// messages never technically get deleted from that tree.\n ///\n /// The message will first be inserted into an Aztec \"Inbox\" smart contract on L1. Sending the message will not\n /// result in any immediate state changes in the target L2 contract. The message will need to be manually consumed\n /// by the target contract through a separate Aztec transaction. The message will not be available for consumption\n /// immediately. Messages get copied over from the L1 Inbox to L2 by the next Proposer in batches. So you will need\n /// to wait until the messages are copied before you can consume them.\n ///\n /// # Arguments\n /// * `content` - The message content that was sent from L1\n /// * `secret` - Secret value used for message privacy (if needed)\n /// * `sender` - Ethereum address that sent the message\n /// * `leaf_index` - Index of the message in the L1-to-L2 message tree\n ///\n /// # Advanced\n /// Validates message existence in the L1-to-L2 message tree and nullifies the message to prevent\n /// double-consumption.\n pub fn consume_l1_to_l2_message(&mut self, content: Field, secret: Field, sender: EthAddress, leaf_index: Field) {\n let nullifier = process_l1_to_l2_message(\n self.anchor_block_header.state.l1_to_l2_message_tree.root,\n self.this_address(),\n sender,\n self.chain_id(),\n self.version(),\n content,\n secret,\n leaf_index,\n );\n\n // Push nullifier (and the \"commitment\" corresponding to this can be \"empty\")\n self.push_nullifier(nullifier)\n }\n\n /// Emits a private log (an array of Fields) that will be published to an Ethereum blob.\n ///\n /// Private logs are intended for the broadcasting of ciphertexts: that is, encrypted events or encrypted note\n /// contents. Since the data in the logs is meant to be _encrypted_, private_logs are broadcast to publicly-visible\n /// Ethereum blobs. The intended recipients of such encrypted messages can then discover and decrypt these\n /// encrypted logs using their viewing secret key. (See `../messages/discovery` for more details).\n ///\n /// Important note: This function DOES NOT _do_ any encryption of the input `log` fields. This function blindly\n /// publishes whatever input `log` data is fed into it, so the caller of this function should have already\n /// performed the encryption, and the `log` should be the result of that encryption.\n ///\n /// The protocol does not dictate what encryption scheme should be used: a smart contract developer can choose\n /// whatever encryption scheme they like. Aztec-nr includes some off-the-shelf encryption libraries that developers\n /// might wish to use, for convenience. These libraries not only encrypt a plaintext (to produce a ciphertext);\n /// they also prepend the ciphertext with a `tag` and `ephemeral public key` for easier message discovery. This is\n /// a very dense topic, and we will be writing more libraries and docs soon.\n ///\n /// > Currently, AES128 CBC encryption is the main scheme included in > aztec.nr. > We are currently making\n /// significant changes to the interfaces of the > encryption library.\n ///\n /// In some niche use cases, an app might be tempted to publish _un-encrypted_ data via a private log, because\n /// _public logs_ are not available to private functions. Be warned that emitting public data via private logs is\n /// strongly discouraged, and is considered a \"privacy anti-pattern\", because it reveals identifiable information\n /// about _which_ function has been executed. A tx which leaks such information does not contribute to the privacy\n /// set of the network.\n ///\n /// * Unlike `emit_raw_note_log`, this log is not tied to any specific note\n ///\n /// # Arguments\n /// * `log` - The log data that will be publicly broadcast (so make sure it's already been encrypted before you\n /// call this function). Private logs are bounded in size (PRIVATE_LOG_SIZE_IN_FIELDS), to encourage all logs from\n /// all smart contracts look identical.\n /// * `length` - The actual length of the `log` (measured in number of Fields). Although the input log has a max\n /// size of PRIVATE_LOG_SIZE_IN_FIELDS, the latter values of the array might all be 0's for small logs. This\n /// `length` should reflect the trimmed length of the array. The protocol's kernel circuits can then append random\n /// fields as \"padding\" after the `length`, so that the logs of this smart contract look indistinguishable from\n /// (the same length as) the logs of all other applications. It's up to wallets how much padding to apply, so\n /// ideally all wallets should agree on standards for this.\n pub fn emit_private_log(&mut self, log: [Field; PRIVATE_LOG_SIZE_IN_FIELDS], length: u32) {\n let counter = self.next_counter();\n let private_log = PrivateLogData { log: PrivateLog::new(log, length), note_hash_counter: 0 }.count(counter);\n self.private_logs.push(private_log);\n }\n\n // TODO: rename.\n /// Emits a private log that is explicitly tied to a newly-emitted note_hash, to convey to the kernel: \"this log\n /// relates to this note\".\n ///\n /// This linkage is important in case the note gets squashed (due to being read later in this same tx), since we\n /// can then squash the log as well.\n ///\n /// See `emit_private_log` for more info about private log emission.\n ///\n /// # Arguments\n /// * `log` - The log data as an array of Field elements\n /// * `length` - The actual length of the `log` (measured in number of Fields).\n /// * `note_hash_counter` - The side-effect counter that was assigned to the new note_hash when it was pushed to\n /// this `PrivateContext`.\n ///\n /// Important: If your application logic requires the log to always be emitted regardless of note squashing,\n /// consider using `emit_private_log` instead, or emitting additional events.\n ///\n pub fn emit_raw_note_log(&mut self, log: [Field; PRIVATE_LOG_SIZE_IN_FIELDS], length: u32, note_hash_counter: u32) {\n let counter = self.next_counter();\n let private_log = PrivateLogData { log: PrivateLog::new(log, length), note_hash_counter };\n self.private_logs.push(private_log.count(counter));\n }\n\n pub fn emit_contract_class_log<let N: u32>(&mut self, log: [Field; N]) {\n let contract_address = self.this_address();\n let counter = self.next_counter();\n\n let log_to_emit: [Field; CONTRACT_CLASS_LOG_SIZE_IN_FIELDS] =\n log.concat([0; CONTRACT_CLASS_LOG_SIZE_IN_FIELDS - N]);\n // Note: the length is not always N, it is the number of fields we want to broadcast, omitting trailing zeros\n // to save blob space.\n // Safety: The below length is constrained in the base rollup, which will make sure that all the fields beyond\n // length are zero. However, it won't be able to check that we didn't add extra padding (trailing zeroes) or\n // that we cut trailing zeroes from the end.\n let length = unsafe { trimmed_array_length_hint(log_to_emit) };\n // We hash the entire padded log to ensure a user cannot pass a shorter length and so emit incorrect shorter\n // bytecode.\n let log_hash = poseidon2_hash(log_to_emit);\n // Safety: the below only exists to broadcast the raw log, so we can provide it to the base rollup later to be\n // constrained.\n unsafe {\n notify_created_contract_class_log(contract_address, log_to_emit, length, counter);\n }\n\n self.contract_class_logs_hashes.push(LogHash { value: log_hash, length: length }.count(counter));\n }\n\n /// Calls a private function on another contract (or the same contract).\n ///\n /// Very low-level function.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `args` - Array of arguments to pass to the called function\n ///\n /// # Returns\n /// * `ReturnsHash` - Hash of the called function's return values. Use `.get_preimage()` to extract the actual\n /// return values.\n ///\n /// This enables contracts to interact with each other while maintaining privacy. This \"composability\" of private\n /// contract functions is a key feature of the Aztec network.\n ///\n /// If a user's transaction includes multiple private function calls, then by the design of Aztec, the following\n /// information will remain private[1]:\n /// - The function selectors and contract addresses of all private function calls will remain private, so an\n /// observer of the public mempool will not be able to look at a tx and deduce which private functions have been\n /// executed.\n /// - The arguments and return values of all private function calls will remain private.\n /// - The person who initiated the tx will remain private.\n /// - The notes and nullifiers and private logs that are emitted by all private function calls will (if designed\n /// well) not leak any user secrets, nor leak which functions have been executed.\n ///\n /// [1] Caveats: Some of these privacy guarantees depend on how app developers design their smart contracts. Some\n /// actions _can_ leak information, such as:\n /// - Calling an internal public function.\n /// - Calling a public function and not setting msg_sender to Option::none (feature not built yet - see github).\n /// - Calling any public function will always leak details about the nature of the transaction, so devs should be\n /// careful in their contract designs. If it can be done in a private function, then that will give the best\n /// privacy.\n /// - Not padding the side-effects of a tx to some standardized, uniform size. The kernel circuits can take hints\n /// to pad side-effects, so a wallet should be able to request for a particular amount of padding. Wallets should\n /// ideally agree on some standard.\n /// - Padding should include:\n /// - Padding the lengths of note & nullifier arrays\n /// - Padding private logs with random fields, up to some standardized size. See also:\n /// https://docs.aztec.network/developers/resources/considerations/privacy_considerations\n ///\n /// # Advanced\n /// * The call is added to the private call stack and executed by kernel circuits after this function completes\n /// * The called function can modify its own contract's private state\n /// * Side effects from the called function are included in this transaction\n /// * The call inherits the current transaction's context and gas limits\n ///\n pub fn call_private_function<let ArgsCount: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ArgsCount],\n ) -> ReturnsHash {\n let args_hash = hash_args(args);\n execution_cache::store(args, args_hash);\n self.call_private_function_with_args_hash(contract_address, function_selector, args_hash, false)\n }\n\n /// Makes a read-only call to a private function on another contract.\n ///\n /// This is similar to Solidity's `staticcall`. The called function cannot modify state, emit L2->L2 messages, nor\n /// emit events. Any nested calls are constrained to also be staticcalls.\n ///\n /// See `call_private_function` for more general info on private function calls.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract to call\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `args` - Array of arguments to pass to the called function\n ///\n /// # Returns\n /// * `ReturnsHash` - Hash of the called function's return values. Use `.get_preimage()` to extract the actual\n /// return values.\n ///\n pub fn static_call_private_function<let ArgsCount: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ArgsCount],\n ) -> ReturnsHash {\n let args_hash = hash_args(args);\n execution_cache::store(args, args_hash);\n self.call_private_function_with_args_hash(contract_address, function_selector, args_hash, true)\n }\n\n /// Calls a private function that takes no arguments.\n ///\n /// This is a convenience function for calling private functions that don't require any input parameters. It's\n /// equivalent to `call_private_function` but slightly more efficient to use when no arguments are needed.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n ///\n /// # Returns\n /// * `ReturnsHash` - Hash of the called function's return values. Use `.get_preimage()` to extract the actual\n /// return values.\n ///\n pub fn call_private_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) -> ReturnsHash {\n self.call_private_function_with_args_hash(contract_address, function_selector, 0, false)\n }\n\n /// Makes a read-only call to a private function which takes no arguments.\n ///\n /// This combines the optimisation of `call_private_function_no_args` with the safety of\n /// `static_call_private_function`.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n ///\n /// # Returns\n /// * `ReturnsHash` - Hash of the called function's return values. Use `.get_preimage()` to extract the actual\n /// return values.\n ///\n pub fn static_call_private_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n ) -> ReturnsHash {\n self.call_private_function_with_args_hash(contract_address, function_selector, 0, true)\n }\n\n /// Low-level private function call.\n ///\n /// This is the underlying implementation used by all other private function call methods. Instead of taking raw\n /// arguments, it accepts a hash of the arguments.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `args_hash` - Pre-computed hash of the function arguments\n /// * `is_static_call` - Whether this should be a read-only call\n ///\n /// # Returns\n /// * `ReturnsHash` - Hash of the called function's return values\n ///\n pub fn call_private_function_with_args_hash(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args_hash: Field,\n is_static_call: bool,\n ) -> ReturnsHash {\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n let start_side_effect_counter = self.side_effect_counter;\n\n // Safety: The oracle simulates the private call and returns the value of the side effects counter after\n // execution of the call (which means that end_side_effect_counter - start_side_effect_counter is the number of\n // side effects that took place), along with the hash of the return values. We validate these by requesting a\n // private kernel iteration in which the return values are constrained to hash to `returns_hash` and the side\n // effects counter to increment from start to end.\n let (end_side_effect_counter, returns_hash) = unsafe {\n call_private_function_internal(\n contract_address,\n function_selector,\n args_hash,\n start_side_effect_counter,\n is_static_call,\n )\n };\n\n self.private_call_requests.push(\n PrivateCallRequest {\n call_context: CallContext {\n msg_sender: self.this_address(),\n contract_address,\n function_selector,\n is_static_call,\n },\n args_hash,\n returns_hash,\n start_side_effect_counter,\n end_side_effect_counter,\n },\n );\n\n // TODO (fees) figure out why this crashes the prover and enable it we need this in order to pay fees inside\n // child call contexts assert(\n // (item.public_inputs.min_revertible_side_effect_counter == 0 as u32)\n // | (item.public_inputs.min_revertible_side_effect_counter\n // > self.min_revertible_side_effect_counter)\n // ); if item.public_inputs.min_revertible_side_effect_counter\n // > self.min_revertible_side_effect_counter { self.min_revertible_side_effect_counter =\n // item.public_inputs.min_revertible_side_effect_counter; }\n self.side_effect_counter = end_side_effect_counter + 1; // TODO: call `next_counter`\n // instead, for consistency\n ReturnsHash::new(returns_hash)\n }\n\n /// Enqueues a call to a public function to be executed later.\n ///\n /// Unlike private functions which execute immediately on the user's device, public function calls are \"enqueued\"\n /// and executed some time later by a block proposer.\n ///\n /// This means a public function cannot return any values back to a private function, because by the time the\n /// public function is being executed, the private function which called it has already completed execution. (In\n /// fact, the private function has been executed and proven, along with all other private function calls of the\n /// user's tx. A single proof of the tx has been submitted to the Aztec network, and some time later a proposer has\n /// picked the tx up from the mempool and begun executing all of the enqueued public functions).\n ///\n /// # Privacy warning Enqueueing a public function call is an inherently leaky action. Many interesting applications will require some interaction with public state, but smart contract developers should try to use public function calls sparingly, and carefully. _Internal_ public function calls are especially leaky, because they completely leak which private contract made the call. See also: https://docs.aztec.network/developers/resources/considerations/privacy_considerations\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `args` - Array of arguments to pass to the public function\n /// * `hide_msg_sender` - the called function will see a \"null\" value for `msg_sender` if set to `true`\n ///\n pub fn call_public_function<let ArgsCount: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ArgsCount],\n hide_msg_sender: bool,\n ) {\n let calldata = [function_selector.to_field()].concat(args);\n let calldata_hash = hash_calldata_array(calldata);\n execution_cache::store(calldata, calldata_hash);\n self.call_public_function_with_calldata_hash(contract_address, calldata_hash, false, hide_msg_sender)\n }\n\n /// Enqueues a read-only call to a public function.\n ///\n /// This is similar to Solidity's `staticcall`. The called function cannot modify state or emit events. Any nested\n /// calls are constrained to also be staticcalls.\n ///\n /// See also `call_public_function` for more important information about making private -> public function calls.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `args` - Array of arguments to pass to the public function\n /// * `hide_msg_sender` - the called function will see a \"null\" value for `msg_sender` if set to `true`\n ///\n pub fn static_call_public_function<let ArgsCount: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ArgsCount],\n hide_msg_sender: bool,\n ) {\n let calldata = [function_selector.to_field()].concat(args);\n let calldata_hash = hash_calldata_array(calldata);\n execution_cache::store(calldata, calldata_hash);\n self.call_public_function_with_calldata_hash(contract_address, calldata_hash, true, hide_msg_sender)\n }\n\n /// Enqueues a call to a public function that takes no arguments.\n ///\n /// This is an optimisation for calling public functions that don't take any input parameters. It's otherwise\n /// equivalent to `call_public_function`.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `hide_msg_sender` - the called function will see a \"null\" value for `msg_sender` if set to `true`\n ///\n pub fn call_public_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n hide_msg_sender: bool,\n ) {\n let calldata_hash = hash_calldata_array([function_selector.to_field()]);\n self.call_public_function_with_calldata_hash(contract_address, calldata_hash, false, hide_msg_sender)\n }\n\n /// Enqueues a read-only call to a public function with no arguments.\n ///\n /// This combines the optimisation of `call_public_function_no_args` with the safety of\n /// `static_call_public_function`.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `hide_msg_sender` - the called function will see a \"null\" value for `msg_sender` if set to `true`\n ///\n pub fn static_call_public_function_no_args(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n hide_msg_sender: bool,\n ) {\n let calldata_hash = hash_calldata_array([function_selector.to_field()]);\n self.call_public_function_with_calldata_hash(contract_address, calldata_hash, true, hide_msg_sender)\n }\n\n /// Low-level public function call.\n ///\n /// This is the underlying implementation used by all other public function call methods. Instead of taking raw\n /// arguments, it accepts a hash of the arguments.\n ///\n /// Advanced function: Most developers should use `call_public_function` or `static_call_public_function` instead.\n /// This function is exposed for performance optimization and advanced use cases.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the function\n /// * `calldata_hash` - Hash of the function calldata\n /// * `is_static_call` - Whether this should be a read-only call\n /// * `hide_msg_sender` - the called function will see a \"null\" value for `msg_sender` if set to `true`\n ///\n pub fn call_public_function_with_calldata_hash(\n &mut self,\n contract_address: AztecAddress,\n calldata_hash: Field,\n is_static_call: bool,\n hide_msg_sender: bool,\n ) {\n let counter = self.next_counter();\n\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n\n notify_enqueued_public_function_call(contract_address, calldata_hash, counter, is_static_call);\n\n let msg_sender = if hide_msg_sender {\n NULL_MSG_SENDER_CONTRACT_ADDRESS\n } else {\n self.this_address()\n };\n\n let call_request = PublicCallRequest { msg_sender, contract_address, is_static_call, calldata_hash };\n\n self.public_call_requests.push(Counted::new(call_request, counter));\n }\n\n /// Enqueues a public function call, and designates it to be the teardown function for this tx. Only one teardown\n /// function call can be made by a tx.\n ///\n /// Niche function: Only wallet developers and paymaster contract developers (aka Fee-payment contracts) will need\n /// to make use of this function.\n ///\n /// Aztec supports a three-phase execution model: setup, app logic, teardown. The phases exist to enable a fee\n /// payer to take on the risk of paying a transaction fee, safe in the knowledge that their payment (in whatever\n /// token or method the user chooses) will succeed, regardless of whether the app logic will succeed. The \"setup\"\n /// phase ensures the fee payer has sufficient balance to pay the proposer their fees. The teardown phase is\n /// primarily intended to: calculate exactly how much the user owes, based on gas consumption, and refund the user\n /// any change.\n ///\n /// Note: in some cases, the cost of refunding the user (i.e. DA costs of tx side-effects) might exceed the refund\n /// amount. For app logic with fairly stable and predictable gas consumption, a material refund amount is unlikely.\n /// For app logic with unpredictable gas consumption, a refund might be important to the user (e.g. if a hefty\n /// function reverts very early). Wallet/FPC/Paymaster developers should be mindful of this.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the teardown function\n /// * `function_selector` - 4-byte identifier of the function to call\n /// * `args` - An array of fields to pass to the function.\n /// * `hide_msg_sender` - the called function will see a \"null\" value for `msg_sender` if set to `true`\n pub fn set_public_teardown_function<let ArgsCount: u32>(\n &mut self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; ArgsCount],\n hide_msg_sender: bool,\n ) {\n let calldata = [function_selector.to_field()].concat(args);\n let calldata_hash = hash_calldata_array(calldata);\n execution_cache::store(calldata, calldata_hash);\n self.set_public_teardown_function_with_calldata_hash(contract_address, calldata_hash, false, hide_msg_sender)\n }\n\n /// Low-level function to set the public teardown function.\n ///\n /// This is the underlying implementation for setting the teardown function call that will execute at the end of\n /// the transaction. Instead of taking raw arguments, it accepts a hash of the arguments.\n ///\n /// Advanced function: Most developers should use `set_public_teardown_function` instead.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract containing the teardown function\n /// * `calldata_hash` - Hash of the function calldata\n /// * `is_static_call` - Whether this should be a read-only call\n /// * `hide_msg_sender` - the called function will see a \"null\" value for `msg_sender` if set to `true`\n ///\n pub fn set_public_teardown_function_with_calldata_hash(\n &mut self,\n contract_address: AztecAddress,\n calldata_hash: Field,\n is_static_call: bool,\n hide_msg_sender: bool,\n ) {\n let counter = self.next_counter();\n\n let mut is_static_call = is_static_call | self.inputs.call_context.is_static_call;\n\n notify_set_public_teardown_function_call(contract_address, calldata_hash, counter, is_static_call);\n\n let msg_sender = if hide_msg_sender {\n NULL_MSG_SENDER_CONTRACT_ADDRESS\n } else {\n self.this_address()\n };\n\n self.public_teardown_call_request =\n PublicCallRequest { msg_sender, contract_address, is_static_call, calldata_hash };\n }\n\n /// Increments the side-effect counter.\n ///\n /// Very low-level function.\n ///\n /// # Advanced\n ///\n /// Every side-effect of a private function is given a \"side-effect counter\", based on when it is created. This\n /// PrivateContext is in charge of assigning the counters.\n ///\n /// The reason we have side-effect counters is complicated. Consider this illustrative pseudocode of inter-contract\n /// function calls:\n /// ```\n /// contract A {\n /// let x = 5; // pseudocode for storage var x.\n /// fn a1 {\n /// read x; // value: 5, counter: 1.\n /// x = x + 1;\n /// write x; // value: 6, counter: 2.\n ///\n /// B.b(); // start_counter: 2, end_counter: 4\n ///\n /// read x; // value: 36, counter: 5.\n /// x = x + 1;\n /// write x; // value: 37, counter: 6.\n /// }\n ///\n /// fn a2 {\n /// read x; // value: 6, counter: 3.\n /// x = x * x;\n /// write x; // value: 36, counter: 4.\n /// }\n /// }\n ///\n /// contract B {\n /// fn b() {\n /// A.a2();\n /// }\n /// }\n /// ```\n ///\n /// Suppose a1 is the first function called. The comments show the execution counter of each side-effect, and what\n /// the new value of `x` is.\n ///\n /// These (private) functions are processed by Aztec's kernel circuits in an order that is different from execution\n /// order: All of A.a1 is proven before B.b is proven, before A.a2 is proven. So when we're in the 2nd execution\n /// frame of A.a1 (after the call to B.b), the circuit needs to justify why x went from being `6` to `36`. But the\n /// circuit doesn't know why, and given the order of proving, the kernel hasn't _seen_ a value of 36 get written\n /// yet. The kernel needs to track big arrays of all side-effects of all private functions in a tx. Then, as it\n /// recurses and processes B.b(), it will eventually see a value of 36 get written.\n ///\n /// Suppose side-effect counters weren't exposed: The kernel would only see this ordering (in order of proof\n /// verification): [ A.a1.read, A.a1.write, A.a1.read, A.a1.write, A.a2.read, A.a2.write ]\n /// [ 5, 6, 36, 37, 6, 36 ]\n /// The kernel wouldn't know _when_ B.b() was called within A.a1(), because it can't see what's going on within an\n /// app circuit. So the kernel wouldn't know that the ordering of reads and writes should actually be: [ A.a1.read,\n /// A.a1.write, A.a2.read, A.a2.write, A.a1.read, A.a1.write ]\n /// [ 5, 6, 6, 36, 36, 37 ]\n ///\n /// And so, we introduced side-effect counters: every private function must assign side-effect counters alongside\n /// every side-effect that it emits, and also expose to the kernel the counters that it started and ended with.\n /// This gives the kernel enough information to arrange all side-effects in the correct order. It can then catch\n /// (for example) if a function tries to read state before it has been written (e.g. if A.a2() maliciously tried to\n /// read a value of x=37) (e.g. if A.a1() maliciously tried to read x=6).\n ///\n /// If a malicious app contract _lies_ and does not count correctly:\n /// - It cannot lie about its start and end counters because the kernel will catch this.\n /// - It _could_ lie about its intermediate counters:\n /// - 1. It could not increment its side-effects correctly\n /// - 2. It could label its side-effects with counters outside of its start and end counters' range. The kernel\n /// will catch 2. The kernel will not catch 1., but this would only cause corruption to the private state of the\n /// malicious contract, and not any other contracts (because a contract can only modify its own state). If a \"good\"\n /// contract is given _read access_ to a maliciously-counting contract (via an external getter function, or by\n /// reading historic state from the archive tree directly), and they then make state changes to their _own_ state\n /// accordingly, that could be dangerous. Developers should be mindful not to trust the claimed innards of external\n /// contracts unless they have audited/vetted the contracts including vetting the side-effect counter\n /// incrementation. This is a similar paradigm to Ethereum smart contract development: you must vet external\n /// contracts that your contract relies upon, and you must not make any presumptions about their claimed behaviour.\n /// (Hopefully if a contract imports a version of aztec-nr, we will get contract verification tooling that can\n /// validate the authenticity of the imported aztec-nr package, and hence infer that the side- effect counting will\n /// be correct, without having to re-audit such logic for every contract).\n ///\n fn next_counter(&mut self) -> u32 {\n let counter = self.side_effect_counter;\n self.side_effect_counter += 1;\n counter\n }\n}\n\nimpl Empty for PrivateContext {\n fn empty() -> Self {\n PrivateContext {\n inputs: PrivateContextInputs::empty(),\n side_effect_counter: 0 as u32,\n min_revertible_side_effect_counter: 0 as u32,\n is_fee_payer: false,\n args_hash: 0,\n return_hash: 0,\n expiration_timestamp: 0,\n note_hash_read_requests: BoundedVec::new(),\n nullifier_read_requests: BoundedVec::new(),\n key_validation_requests_and_separators: BoundedVec::new(),\n note_hashes: BoundedVec::new(),\n nullifiers: BoundedVec::new(),\n private_call_requests: BoundedVec::new(),\n public_call_requests: BoundedVec::new(),\n public_teardown_call_request: PublicCallRequest::empty(),\n l2_to_l1_msgs: BoundedVec::new(),\n anchor_block_header: BlockHeader::empty(),\n private_logs: BoundedVec::new(),\n contract_class_logs_hashes: BoundedVec::new(),\n last_key_validation_requests: [Option::none(); NUM_KEY_TYPES],\n expected_non_revertible_side_effect_counter: 0,\n expected_revertible_side_effect_counter: 0,\n }\n }\n}\n"
|
|
2747
2747
|
},
|
|
2748
2748
|
"73": {
|
|
2749
2749
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/context/utility_context.nr",
|
|
2750
|
-
"source": "use crate::oracle::{execution::get_utility_context, storage::storage_read};\nuse crate::protocol::{abis::block_header::BlockHeader, address::AztecAddress, traits::Packable};\n\n// If you'll modify this struct don't forget to update utility_context.ts as well.\npub struct UtilityContext {\n block_header: BlockHeader,\n contract_address: AztecAddress,\n}\n\nimpl UtilityContext {\n pub unconstrained fn new() -> Self {\n get_utility_context()\n }\n\n pub unconstrained fn at(contract_address: AztecAddress) -> Self {\n // We get a context with default contract address, and then we construct the final context with the provided\n // contract address.\n let default_context = get_utility_context();\n\n Self { block_header: default_context.block_header, contract_address }\n }\n\n pub fn block_header(self) -> BlockHeader {\n self.block_header\n }\n\n pub fn block_number(self) -> u32 {\n self.block_header.
|
|
2750
|
+
"source": "use crate::oracle::{execution::get_utility_context, storage::storage_read};\nuse crate::protocol::{abis::block_header::BlockHeader, address::AztecAddress, traits::Packable};\n\n// If you'll modify this struct don't forget to update utility_context.ts as well.\npub struct UtilityContext {\n block_header: BlockHeader,\n contract_address: AztecAddress,\n}\n\nimpl UtilityContext {\n pub unconstrained fn new() -> Self {\n get_utility_context()\n }\n\n pub unconstrained fn at(contract_address: AztecAddress) -> Self {\n // We get a context with default contract address, and then we construct the final context with the provided\n // contract address.\n let default_context = get_utility_context();\n\n Self { block_header: default_context.block_header, contract_address }\n }\n\n pub fn block_header(self) -> BlockHeader {\n self.block_header\n }\n\n pub fn block_number(self) -> u32 {\n self.block_header.block_number()\n }\n\n pub fn timestamp(self) -> u64 {\n self.block_header.timestamp()\n }\n\n pub fn this_address(self) -> AztecAddress {\n self.contract_address\n }\n\n pub fn version(self) -> Field {\n self.block_header.version()\n }\n\n pub fn chain_id(self) -> Field {\n self.block_header.chain_id()\n }\n\n pub unconstrained fn raw_storage_read<let N: u32>(self: Self, storage_slot: Field) -> [Field; N] {\n storage_read(self.block_header, self.this_address(), storage_slot)\n }\n\n pub unconstrained fn storage_read<T>(self, storage_slot: Field) -> T\n where\n T: Packable,\n {\n T::unpack(self.raw_storage_read(storage_slot))\n }\n}\n"
|
|
2751
2751
|
},
|
|
2752
2752
|
"76": {
|
|
2753
2753
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/event/event_interface.nr",
|
|
@@ -53,7 +53,7 @@
|
|
|
53
53
|
}
|
|
54
54
|
},
|
|
55
55
|
"bytecode": "JwACBAEoAAABBIBLJwAABEslAAAATycCAwQCJwIEBAAfCgADAAQASRwASUkCHABKSgQtCEkBLQhKAiUAAABuJwIBBEsnAgIEADsOAAIAAScAQwIDJwBEAgInAEUCAScARgIEJwBHAgYnAEgCBSYlAAAC/x4CAAQAHgIABQAeAgAGCScCBwEBJAIABgAAAJQlAAADJR4CAAYFHAoGCAAcCgIGAAoqCAYCDCoIBgkKIgFFBiQCAAYAAALoIwAAAL8KIgFEBRYKAgYkAgAFAAAC1iMAAADVCiIBQwgkAgAIAAACxCMAAADnCiIBRgokAgAKAAACrSMAAAD5CiIBSAoWCgkLJAIACgAAApYjAAABDwoiAUcGJAIABgAAAoQjAAABIScCAQJJJwICAm4nAgMCdicCBAJhJwIFAmwnAgYCaScCCAJkJwIJAiAnAgoCbycCCwJwJwIMAmUnAg0CcicCDgJ0LQgBDycCEAQSAAgBEAEnAw8EAQAiDwIQLQoQES0OAREAIhECES0OAhEAIhECES0OAxEAIhECES0OBBEAIhECES0OBREAIhECES0OBhEAIhECES0OCBEAIhECES0OCREAIhECES0OChEAIhECES0OCxEAIhECES0ODBEAIhECES0ODREAIhECES0OBBEAIhECES0ODhEAIhECES0OBhEAIhECES0OChEAIhECES0OAhEnAgEBACcCAgAACioBBwMkAgADAAAChCcCBAQTLQgBBScCBgQTAAgBBgEtCgUGKgMABgXQYRKgYVuWqAAiBgIGACIPAggnAgkEES0CCAMtAgYELQIJBSUAAAM3JwIIBBEAKgYIBi0OAgYAIgYCBjwOBAUtCgsBIwAAAo0tCgECIwAAAqQEKgsGAS0KAQIjAAACpC0KAggjAAACuxIqCQIBLQoBCCMAAAK7LQoIBSMAAALNLQoJBSMAAALNLQoFBCMAAALfLQoGBCMAAALfLQoEAyMAAALxLQoCAyMAAALxJAIAAwAAAv4lAAADaSYoAAAEBHhLDAAABAMkAAADAAADJCoBAAEF2sX11rRKMm08BAIBJioBAAEFZL7Lx4qT/3I8BAIBJgAAAwUHLQADCC0ABAkKAAgHCiQAAAoAAANoLQEIBi0EBgkAAAgCCAAACQIJIwAAA0QmKgEAAQUv0lArDpHQmTwEAgEm",
|
|
56
|
-
"debug_symbols": "tZfRbuIwEEX/
|
|
56
|
+
"debug_symbols": "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"
|
|
57
57
|
},
|
|
58
58
|
{
|
|
59
59
|
"name": "check_timestamp",
|
|
@@ -105,7 +105,7 @@
|
|
|
105
105
|
}
|
|
106
106
|
},
|
|
107
107
|
"bytecode": "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",
|
|
108
|
-
"debug_symbols": "
|
|
108
|
+
"debug_symbols": "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"
|
|
109
109
|
},
|
|
110
110
|
{
|
|
111
111
|
"name": "process_message",
|
|
@@ -409,7 +409,7 @@
|
|
|
409
409
|
}
|
|
410
410
|
},
|
|
411
411
|
"bytecode": "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",
|
|
412
|
-
"debug_symbols": "tVnbbhs5DP0XP+dBF0qU+itFUbiJUxgwnMBNFlgE+
|
|
412
|
+
"debug_symbols": "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"
|
|
413
413
|
},
|
|
414
414
|
{
|
|
415
415
|
"name": "sync_state",
|
|
@@ -954,11 +954,11 @@
|
|
|
954
954
|
},
|
|
955
955
|
"73": {
|
|
956
956
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/context/public_context.nr",
|
|
957
|
-
"source": "use crate::{\n context::gas::GasOpts,\n hash::{\n compute_l1_to_l2_message_hash, compute_l1_to_l2_message_nullifier, compute_secret_hash,\n compute_siloed_nullifier,\n },\n oracle::avm,\n};\nuse crate::protocol::{\n abis::function_selector::FunctionSelector,\n address::{AztecAddress, EthAddress},\n constants::{MAX_U32_VALUE, NULL_MSG_SENDER_CONTRACT_ADDRESS},\n traits::{Empty, FromField, Packable, Serialize, ToField},\n};\n\n/// # PublicContext\n///\n/// The **main interface** between an #[external(\"public\")] function and the Aztec blockchain.\n///\n/// An instance of the PublicContext is initialized automatically at the outset of every public function, within the\n/// #[external(\"public\")] macro, so you'll never need to consciously instantiate this yourself.\n///\n/// The instance is always named `context`, and it will always be available within the body of every\n/// #[external(\"public\")] function in your smart contract.\n///\n/// Typical usage for a smart contract developer will be to call getter methods of the PublicContext.\n///\n/// _Pushing_ data and requests to the context is mostly handled within aztec-nr's own functions, so typically a smart\n/// contract developer won't need to call any setter methods directly.\n///\n/// ## Responsibilities\n/// - Exposes contextual data to a public function:\n/// - Data relating to how this public function was called:\n/// - msg_sender, this_address\n/// - Data relating to the current blockchain state:\n/// - timestamp, block_number, chain_id, version\n/// - Gas and fee information\n/// - Provides state access:\n/// - Read/write public storage (key-value mapping)\n/// - Check existence of notes and nullifiers (Some patterns use notes & nullifiers to store public (not private)\n/// information)\n/// - Enables consumption of L1->L2 messages.\n/// - Enables calls to other public smart contract functions:\n/// - Writes data to the blockchain:\n/// - Updates to public state variables\n/// - New public logs (for events)\n/// - New L2->L1 messages\n/// - New notes & nullifiers (E.g. pushing public info to notes/nullifiers, or for completing \"partial notes\")\n///\n/// ## Key Differences from Private Execution\n///\n/// Unlike private functions -- which are executed on the user's device and which can only reference historic state --\n/// public functions are executed by a block proposer and are executed \"live\" on the _current_ tip of the chain. This\n/// means public functions can:\n/// - Read and write _current_ public state\n/// - Immediately see the effects of earlier transactions in the same block\n///\n/// Also, public functions are executed within a zkVM (the \"AVM\"), so that they can _revert_ whilst still ensuring\n/// payment to the proposer and prover. (Private functions cannot revert: they either succeed, or they cannot be\n/// included).\n///\n/// ## Optimising Public Functions\n///\n/// Using the AVM to execute public functions means they compile down to \"AVM bytecode\" instead of the ACIR that\n/// private functions (standalone circuits) compile to. Therefore the approach to optimising a public function is\n/// fundamentally different from optimising a public function.\n///\npub struct PublicContext {\n pub args_hash: Option<Field>,\n pub compute_args_hash: fn() -> Field,\n}\n\nimpl Eq for PublicContext {\n fn eq(self, other: Self) -> bool {\n (self.args_hash == other.args_hash)\n // Can't compare the function compute_args_hash\n }\n}\n\nimpl PublicContext {\n /// Creates a new PublicContext instance.\n ///\n /// Low-level function: This is called automatically by the #[external(\"public\")] macro, so you shouldn't need to\n /// be called directly by smart contract developers.\n ///\n /// # Arguments\n /// * `compute_args_hash` - Function to compute the args_hash\n ///\n /// # Returns\n /// * A new PublicContext instance\n ///\n pub fn new(compute_args_hash: fn() -> Field) -> Self {\n PublicContext { args_hash: Option::none(), compute_args_hash }\n }\n\n /// Emits a _public_ log that will be visible onchain to everyone.\n ///\n /// # Arguments\n /// * `log` - The data to log, must implement Serialize trait\n ///\n pub fn emit_public_log<T>(_self: Self, log: T)\n where\n T: Serialize,\n {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { avm::emit_public_log(Serialize::serialize(log).as_vector()) };\n }\n\n /// Checks if a given note hash exists in the note hash tree at a particular leaf_index.\n ///\n /// # Arguments\n /// * `note_hash` - The note hash to check for existence\n /// * `leaf_index` - The index where the note hash should be located\n ///\n /// # Returns\n /// * `bool` - True if the note hash exists at the specified index\n ///\n pub fn note_hash_exists(_self: Self, note_hash: Field, leaf_index: u64) -> bool {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { avm::note_hash_exists(note_hash, leaf_index) } == 1\n }\n\n /// Checks if a specific L1-to-L2 message exists in the L1-to-L2 message tree at a particular leaf index.\n ///\n /// Common use cases include token bridging, cross-chain governance, and triggering L2 actions based on L1 events.\n ///\n /// This function should be called before attempting to consume an L1-to-L2 message.\n ///\n /// # Arguments\n /// * `msg_hash` - Hash of the L1-to-L2 message to check\n /// * `msg_leaf_index` - The index where the message should be located\n ///\n /// # Returns\n /// * `bool` - True if the message exists at the specified index\n ///\n /// # Advanced\n /// * Uses the AVM l1_to_l2_msg_exists opcode for tree lookup\n /// * Messages are copied from L1 Inbox to L2 by block proposers\n ///\n pub fn l1_to_l2_msg_exists(_self: Self, msg_hash: Field, msg_leaf_index: Field) -> bool {\n // Safety: AVM opcodes are constrained by the AVM itself TODO(alvaro): Make l1l2msg leaf index a u64 upstream\n unsafe { avm::l1_to_l2_msg_exists(msg_hash, msg_leaf_index as u64) } == 1\n }\n\n /// Returns `true` if an `unsiloed_nullifier` has been emitted by `contract_address`.\n ///\n /// Note that unsiloed nullifiers are not the actual values stored in the nullifier tree: they are first siloed via\n /// [`crate::hash::compute_siloed_nullifier`] with the emitting contract's address.\n ///\n /// ## Use Cases\n ///\n /// Nullifiers are typically used as a _privacy-preserving_ record of a one-time action, but they can also be used\n /// to efficiently record _public_ one-time actions as well. This is cheaper than using public storage, and has the\n /// added benefit of the nullifier being emittable from a private function.\n ///\n /// An example is to check whether a contract has been published: we emit a nullifier that is deterministic and\n /// which has a _public_ preimage.\n ///\n /// ## Public vs Private\n ///\n /// In general, it is unsafe to check for nullifier non-existence in private, as that will not consider the\n /// possibility of the nullifier having been emitted in any transaction between the anchor block and the inclusion\n /// block. Private functions instead prove existence via\n /// [`crate::context::PrivateContext::assert_nullifier_exists`]\n /// and 'prove' non-existence by _emitting_ the nullifer, which would cause the transaction to fail if the\n /// nullifier existed.\n ///\n /// This is not the case in public functions, which do have access to the tip of the blockchain and so can reliably\n /// prove whether a nullifier exists or not.\n ///\n /// ## Safety\n ///\n /// While it is safe to rely on this function's return value to determine if a nullifier exists or not, it is often\n /// **not** safe to infer additional information from that. In particular, it is **unsafe** to infer that the\n /// existence of a nullifier emitted from a private function implies that all other side-effects of said private\n /// execution have been completed, more concretely that any enqueued public calls have been executed.\n ///\n /// This is because all private transaction effects are committed _before_ enqueued public functions are run (in\n /// order to not reveal detailed timing information about the transaction), so it is possible to observe a\n /// nullifier that was emitted alongside the enqueuing of a public call **before** said call has been completed.\n ///\n /// ## Cost\n ///\n /// This emits the `CHECKNULLIFIEREXISTS` opcode, which conceptually performs a merkle inclusion proof on the\n /// nullifier tree (both when the nullifier exists and when it doesn't).\n pub fn nullifier_exists_unsafe(_self: Self, unsiloed_nullifier: Field, contract_address: AztecAddress) -> bool {\n let siloed_nullifier = compute_siloed_nullifier(contract_address, unsiloed_nullifier);\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { avm::nullifier_exists(siloed_nullifier) } == 1\n }\n\n /// Consumes a message sent from Ethereum (L1) to Aztec (L2) -- effectively marking it as \"read\".\n ///\n /// Use this function if you only want the message to ever be \"referred to\" once. Once consumed using this method,\n /// the message cannot be consumed again, because a nullifier is emitted. If your use case wants for the message to\n /// be read unlimited times, then you can always read any historic message from the L1-to-L2 messages tree, using\n /// the `l1_to_l2_msg_exists` method. Messages never technically get deleted from that tree.\n ///\n /// The message will first be inserted into an Aztec \"Inbox\" smart contract on L1. It will not be available for\n /// consumption immediately. Messages get copied-over from the L1 Inbox to L2 by the next Proposer in batches. So\n /// you will need to wait until the messages are copied before you can consume them.\n ///\n /// # Arguments\n /// * `content` - The message content that was sent from L1\n /// * `secret` - Secret value used for message privacy (if needed)\n /// * `sender` - Ethereum address that sent the message\n /// * `leaf_index` - Index of the message in the L1-to-L2 message tree\n ///\n /// # Advanced\n /// * Validates message existence in the L1-to-L2 message tree\n /// * Prevents double-consumption by emitting a nullifier\n /// * Message hash is computed from all parameters + chain context\n /// * Will revert if message doesn't exist or was already consumed\n ///\n pub fn consume_l1_to_l2_message(self: Self, content: Field, secret: Field, sender: EthAddress, leaf_index: Field) {\n let secret_hash = compute_secret_hash(secret);\n let message_hash = compute_l1_to_l2_message_hash(\n sender,\n self.chain_id(),\n /*recipient=*/\n self.this_address(),\n self.version(),\n content,\n secret_hash,\n leaf_index,\n );\n let nullifier = compute_l1_to_l2_message_nullifier(message_hash, secret);\n\n assert(!self.nullifier_exists_unsafe(nullifier, self.this_address()), \"L1-to-L2 message is already nullified\");\n assert(self.l1_to_l2_msg_exists(message_hash, leaf_index), \"Tried to consume nonexistent L1-to-L2 message\");\n\n self.push_nullifier(nullifier);\n }\n\n /// Sends an \"L2 -> L1 message\" from this function (Aztec, L2) to a smart contract on Ethereum (L1). L1 contracts\n /// which are designed to send/receive messages to/from Aztec are called \"Portal Contracts\".\n ///\n /// Common use cases include withdrawals, cross-chain asset transfers, and triggering L1 actions based on L2 state\n /// changes.\n ///\n /// The message will be inserted into an Aztec \"Outbox\" contract on L1, when this transaction's block is proposed\n /// to L1. Sending the message will not result in any immediate state changes in the target portal contract. The\n /// message will need to be manually consumed from the Outbox through a separate Ethereum transaction: a user will\n /// need to call a function of the portal contract -- a function specifically designed to make a call to the Outbox\n /// to consume the message. The message will only be available for consumption once the _epoch_ proof has been\n /// submitted. Given that there are multiple Aztec blocks within an epoch, it might take some time for this epoch\n /// proof to be submitted -- especially if the block was near the start of an epoch.\n ///\n /// # Arguments\n /// * `recipient` - Ethereum address that will receive the message\n /// * `content` - Message content (32 bytes as a Field element)\n ///\n pub fn message_portal(_self: Self, recipient: EthAddress, content: Field) {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { avm::send_l2_to_l1_msg(recipient, content) };\n }\n\n /// Calls a public function on another contract.\n ///\n /// Will revert if the called function reverts or runs out of gas.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract to call\n /// * `function_selector` - Function to call on the target contract\n /// * `args` - Arguments to pass to the function\n /// * `gas_opts` - An optional allocation of gas to the called function.\n ///\n /// # Returns\n /// * `[Field]` - Return data from the called function\n ///\n pub unconstrained fn call_public_function<let N: u32>(\n _self: Self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; N],\n gas_opts: GasOpts,\n ) -> [Field] {\n let calldata = [function_selector.to_field()].concat(args);\n\n avm::call(\n gas_opts.l2_gas.unwrap_or(MAX_U32_VALUE),\n gas_opts.da_gas.unwrap_or(MAX_U32_VALUE),\n contract_address,\n calldata,\n );\n // Use success_copy to determine whether the call succeeded\n let success = avm::success_copy();\n\n let result_data = avm::returndata_copy(0, avm::returndata_size());\n if !success {\n // Rethrow the revert data.\n avm::revert(result_data);\n }\n result_data\n }\n\n /// Makes a read-only call to a public function on another contract.\n ///\n /// This is similar to Solidity's `staticcall`. The called function cannot modify state or emit events. Any nested\n /// calls are constrained to also be staticcalls.\n ///\n /// Useful for querying data from other contracts safely.\n ///\n /// Will revert if the called function reverts or runs out of gas.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract to call\n /// * `function_selector` - Function to call on the target contract\n /// * `args` - Array of arguments to pass to the called function\n /// * `gas_opts` - An optional allocation of gas to the called function.\n ///\n /// # Returns\n /// * `[Field]` - Return data from the called function\n ///\n pub unconstrained fn static_call_public_function<let N: u32>(\n _self: Self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; N],\n gas_opts: GasOpts,\n ) -> [Field] {\n let calldata = [function_selector.to_field()].concat(args);\n\n avm::call_static(\n gas_opts.l2_gas.unwrap_or(MAX_U32_VALUE),\n gas_opts.da_gas.unwrap_or(MAX_U32_VALUE),\n contract_address,\n calldata,\n );\n // Use success_copy to determine whether the call succeeded\n let success = avm::success_copy();\n\n let result_data = avm::returndata_copy(0, avm::returndata_size());\n if !success {\n // Rethrow the revert data.\n avm::revert(result_data);\n }\n result_data\n }\n\n /// Adds a new note hash to the Aztec blockchain's global Note Hash Tree.\n ///\n /// Notes are ordinarily constructed and emitted by _private_ functions, to ensure that both the content of the\n /// note, and the contract that emitted the note, stay private.\n ///\n /// There are however some useful patterns whereby a note needs to contain _public_ data. The ability to push a new\n /// note_hash from a _public_ function means that notes can be injected with public data immediately -- as soon as\n /// the public value is known. The slower alternative would be to submit a follow-up transaction so that a private\n /// function can inject the data. Both are possible on Aztec.\n ///\n /// Search \"Partial Note\" for a very common pattern which enables a note to be \"partially\" populated with some data\n /// in a _private_ function, and then later \"completed\" with some data in a public function.\n ///\n /// # Arguments\n /// * `note_hash` - The hash of the note to add to the tree\n ///\n /// # Advanced\n /// * The note hash will be siloed with the contract address by the protocol\n ///\n pub fn push_note_hash(_self: Self, note_hash: Field) {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { avm::emit_note_hash(note_hash) };\n }\n\n /// Adds a new nullifier to the Aztec blockchain's global Nullifier Tree.\n ///\n /// Whilst nullifiers are primarily intended as a _privacy-preserving_ record of a one-time action, they can also\n /// be used to efficiently record _public_ one-time actions too. Hence why you're seeing this function within the\n /// PublicContext. An example is to check whether a contract has been published: we emit a nullifier that is\n /// deterministic, but whose preimage is _not_ private.\n ///\n /// # Arguments\n /// * `nullifier` - A unique field element that represents the consumed state\n ///\n /// # Advanced\n /// * Nullifier is immediately added to the global nullifier tree\n /// * Emitted nullifiers are immediately visible to all subsequent transactions in the same block\n /// * Automatically siloed with the contract address by the protocol\n /// * Used for preventing double-spending and ensuring one-time actions\n ///\n pub fn push_nullifier(_self: Self, nullifier: Field) {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { avm::emit_nullifier(nullifier) };\n }\n\n /// Returns the address of the current contract being executed.\n ///\n /// This is equivalent to `address(this)` in Solidity (hence the name). Use this to identify the current contract's\n /// address, commonly needed for access control or when interacting with other contracts.\n ///\n /// # Returns\n /// * `AztecAddress` - The contract address of the current function being executed.\n ///\n pub fn this_address(_self: Self) -> AztecAddress {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n avm::address()\n }\n }\n\n /// Returns the contract address that initiated this function call.\n ///\n /// This is similar to `msg.sender` in Solidity (hence the name).\n ///\n /// Important Note: If the calling function is a _private_ function, then it had the option of hiding its address\n /// when enqueuing this public function call. In such cases, this method will return `Option<AztecAddress>::none`.\n /// If the calling function is a _public_ function, it will always return an `Option<AztecAddress>::some` (i.e. a\n /// non-null value).\n ///\n /// # Returns\n /// * `Option<AztecAddress>` - The address of the smart contract that called this function (be it an app contract\n /// or a user's account contract).\n ///\n /// # Advanced\n /// * Value is provided by the AVM sender opcode\n /// * In nested calls, this is the immediate caller, not the original transaction sender\n ///\n pub fn maybe_msg_sender(_self: Self) -> Option<AztecAddress> {\n // Safety: AVM opcodes are constrained by the AVM itself\n let maybe_msg_sender = unsafe { avm::sender() };\n if maybe_msg_sender == NULL_MSG_SENDER_CONTRACT_ADDRESS {\n Option::none()\n } else {\n Option::some(maybe_msg_sender)\n }\n }\n\n /// Returns the function selector of the currently-executing function.\n ///\n /// This is similar to `msg.sig` in Solidity, returning the first 4 bytes of the function signature.\n ///\n /// # Returns\n /// * `FunctionSelector` - The 4-byte function identifier\n ///\n /// # Advanced\n /// * Extracted from the first element of calldata\n /// * Used internally for function dispatch in the AVM\n ///\n pub fn selector(_self: Self) -> FunctionSelector {\n // The selector is the first element of the calldata when calling a public function through dispatch.\n // Safety: AVM opcodes are constrained by the AVM itself.\n let raw_selector: [Field; 1] = unsafe { avm::calldata_copy(0, 1) };\n FunctionSelector::from_field(raw_selector[0])\n }\n\n /// Returns the hash of the arguments passed to the current function.\n ///\n /// Very low-level function: The #[external(\"public\")] macro uses this internally. Smart contract developers\n /// typically won't need to access this directly as arguments are automatically made available.\n ///\n /// # Returns\n /// * `Field` - Hash of the function arguments\n ///\n pub fn get_args_hash(mut self) -> Field {\n if !self.args_hash.is_some() {\n self.args_hash = Option::some((self.compute_args_hash)());\n }\n\n self.args_hash.unwrap_unchecked()\n }\n\n /// Returns the \"transaction fee\" for the current transaction. This is the final tx fee that will be deducted from\n /// the fee_payer's \"fee-juice\" balance (in the protocol's Base Rollup circuit).\n ///\n /// # Returns\n /// * `Field` - The actual, final cost of the transaction, taking into account: the actual gas used during the\n /// setup and app-logic phases, and the fixed amount of gas that's been allocated by the user for the teardown\n /// phase. I.e. effectiveL2FeePerGas * l2GasUsed + effectiveDAFeePerGas * daGasUsed\n ///\n /// This will return `0` during the \"setup\" and \"app-logic\" phases of tx execution (because the final tx fee is not\n /// known at that time). This will only return a nonzero value during the \"teardown\" phase of execution, where the\n /// final tx fee can actually be computed.\n ///\n /// Regardless of _when_ this function is called during the teardown phase, it will always return the same final tx\n /// fee value. The teardown phase does not consume a variable amount of gas: it always consumes a pre-allocated\n /// amount of gas, as specified by the user when they generate their tx.\n ///\n pub fn transaction_fee(_self: Self) -> Field {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n avm::transaction_fee()\n }\n }\n\n /// Returns the chain ID of the current network.\n ///\n /// This is similar to `block.chainid` in Solidity. Returns the unique identifier for the blockchain network this\n /// transaction is executing on.\n ///\n /// Helps prevent cross-chain replay attacks. Useful if implementing multi-chain contract logic.\n ///\n /// # Returns\n /// * `Field` - The chain ID as a field element\n ///\n pub fn chain_id(_self: Self) -> Field {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n avm::chain_id()\n }\n }\n\n /// Returns the Aztec protocol version that this transaction is executing under. Different versions may have\n /// different rules, opcodes, or cryptographic primitives.\n ///\n /// This is similar to how Ethereum has different EVM versions.\n ///\n /// Useful for forward/backward compatibility checks\n ///\n /// Not to be confused with contract versions; this is the protocol version.\n ///\n /// # Returns\n /// * `Field` - The protocol version as a field element\n ///\n pub fn version(_self: Self) -> Field {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n avm::version()\n }\n }\n /// Returns the current block number.\n ///\n /// This is similar to `block.number` in Solidity.\n ///\n /// Note: the current block number is only available within a public function (as opposed to a private function).\n ///\n /// Note: the time intervals between blocks should not be relied upon as being consistent:\n /// - Timestamps of blocks fall within a range, rather than at exact regular intervals.\n /// - Slots can be missed.\n /// - Protocol upgrades can completely change the intervals between blocks (and indeed the current roadmap plans to\n /// reduce the time between blocks, eventually). Use `context.timestamp()` for more-reliable time-based logic.\n ///\n /// # Returns\n /// * `u32` - The current block number\n ///\n pub fn block_number(_self: Self) -> u32 {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n avm::block_number()\n }\n }\n\n /// Returns the timestamp of the current block.\n ///\n /// This is similar to `block.timestamp` in Solidity.\n ///\n /// All functions of all transactions in a block share the exact same timestamp (even though technically each\n /// transaction is executed one-after-the-other).\n ///\n /// Important note: Timestamps of Aztec blocks are not at reliably-fixed intervals. The proposer of the block has\n /// some flexibility to choose a timestamp which is in a valid _range_: Obviously the timestamp of this block must\n /// be strictly greater than that of the previous block, and must must be less than the timestamp of whichever\n /// ethereum block the aztec block is proposed to. Furthermore, if the timestamp is not deemed close enough to the\n /// actual current time, the committee of validators will not attest to the block.\n ///\n /// # Returns\n /// * `u64` - Unix timestamp in seconds\n ///\n pub fn timestamp(_self: Self) -> u64 {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n avm::timestamp()\n }\n }\n\n /// Returns the fee per unit of L2 gas for this transaction (aka the \"L2 gas price\"), as chosen by the user.\n ///\n /// L2 gas covers the cost of executing public functions and handling side-effects within the AVM.\n ///\n /// # Returns\n /// * `u128` - Fee per unit of L2 gas\n ///\n /// Wallet developers should be mindful that the choice of gas price (which is publicly visible) can leak\n /// information about the user, e.g.:\n /// - which wallet software the user is using;\n /// - the amount of time which has elapsed from the time the user's wallet chose a gas price (at the going rate),\n /// to the time of tx submission. This can give clues about the proving time, and hence the nature of the tx.\n /// - the urgency of the transaction (which is kind of unavoidable, if the tx is indeed urgent).\n /// - the wealth of the user.\n /// - the exact user (if the gas price is explicitly chosen by the user to be some unique number like 0.123456789,\n /// or their favorite number). Wallet devs might wish to consider fuzzing the choice of gas price.\n ///\n pub fn min_fee_per_l2_gas(_self: Self) -> u128 {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n avm::min_fee_per_l2_gas()\n }\n }\n\n /// Returns the fee per unit of DA (Data Availability) gas (aka the \"DA gas price\").\n ///\n /// DA gas covers the cost of making transaction data available on L1.\n ///\n /// See the warning in `min_fee_per_l2_gas` for how gas prices can be leaky.\n ///\n /// # Returns\n /// * `u128` - Fee per unit of DA gas\n ///\n pub fn min_fee_per_da_gas(_self: Self) -> u128 {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n avm::min_fee_per_da_gas()\n }\n }\n\n /// Returns the remaining L2 gas available for this transaction.\n ///\n /// Different AVM opcodes consume different amounts of gas.\n ///\n /// # Returns\n /// * `u32` - Remaining L2 gas units\n ///\n pub fn l2_gas_left(_self: Self) -> u32 {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n avm::l2_gas_left()\n }\n }\n\n /// Returns the remaining DA (Data Availability) gas available for this transaction.\n ///\n /// DA gas is consumed when emitting data that needs to be made available on L1, such as public logs or state\n /// updates. All of the side-effects from the private part of the tx also consume DA gas before execution of any\n /// public functions even begins.\n ///\n /// # Returns\n /// * `u32` - Remaining DA gas units\n ///\n pub fn da_gas_left(_self: Self) -> u32 {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n avm::da_gas_left()\n }\n }\n\n /// Checks if the current execution is within a staticcall context, where no state changes or logs are allowed to\n /// be emitted (by this function or any nested function calls).\n ///\n /// # Returns\n /// * `bool` - True if in staticcall context, false otherwise\n ///\n pub fn is_static_call(_self: Self) -> bool {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { avm::is_static_call() } == 1\n }\n\n /// Reads raw field values from public storage. Reads N consecutive storage slots starting from the given slot.\n ///\n /// Very low-level function. Users should typically use the public state variable abstractions to perform reads:\n /// PublicMutable & PublicImmutable.\n ///\n /// # Arguments\n /// * `storage_slot` - The starting storage slot to read from\n ///\n /// # Returns\n /// * `[Field; N]` - Array of N field values from consecutive storage slots\n ///\n /// # Generic Parameters\n /// * `N` - the number of consecutive slots to return, starting from the `storage_slot`.\n ///\n pub fn raw_storage_read<let N: u32>(self: Self, storage_slot: Field) -> [Field; N] {\n let mut out = [0; N];\n for i in 0..N {\n // Safety: AVM opcodes are constrained by the AVM itself\n out[i] = unsafe { avm::storage_read(storage_slot + i as Field, self.this_address().to_field()) };\n }\n out\n }\n\n /// Reads a typed value from public storage.\n ///\n /// Low-level function. Users should typically use the public state variable abstractions to perform reads:\n /// PublicMutable & PublicImmutable.\n ///\n /// # Arguments\n /// * `storage_slot` - The storage slot to read from\n ///\n /// # Returns\n /// * `T` - The deserialized value from storage\n ///\n /// # Generic Parameters\n /// * `T` - The type that the caller expects to read from the `storage_slot`.\n ///\n pub fn storage_read<T>(self, storage_slot: Field) -> T\n where\n T: Packable,\n {\n T::unpack(self.raw_storage_read(storage_slot))\n }\n\n /// Writes raw field values to public storage. Writes to N consecutive storage slots starting from the given slot.\n ///\n /// Very low-level function. Users should typically use the public state variable abstractions to perform writes:\n /// PublicMutable & PublicImmutable.\n ///\n /// Public storage writes take effect immediately.\n ///\n /// # Arguments\n /// * `storage_slot` - The starting storage slot to write to\n /// * `values` - Array of N Fields to write to storage\n ///\n pub fn raw_storage_write<let N: u32>(_self: Self, storage_slot: Field, values: [Field; N]) {\n for i in 0..N {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { avm::storage_write(storage_slot + i as Field, values[i]) };\n }\n }\n\n /// Writes a typed value to public storage.\n ///\n /// Low-level function. Users should typically use the public state variable abstractions to perform writes:\n /// PublicMutable & PublicImmutable.\n ///\n /// # Arguments\n /// * `storage_slot` - The storage slot to write to\n /// * `value` - The typed value to write to storage\n ///\n /// # Generic Parameters\n /// * `T` - The type to write to storage.\n ///\n pub fn storage_write<T>(self, storage_slot: Field, value: T)\n where\n T: Packable,\n {\n self.raw_storage_write(storage_slot, value.pack());\n }\n}\n\nimpl Empty for PublicContext {\n fn empty() -> Self {\n PublicContext::new(|| 0)\n }\n}\n"
|
|
957
|
+
"source": "use crate::{\n context::gas::GasOpts,\n hash::{\n compute_l1_to_l2_message_hash, compute_l1_to_l2_message_nullifier, compute_secret_hash,\n compute_siloed_nullifier,\n },\n oracle::avm,\n};\nuse crate::protocol::{\n abis::function_selector::FunctionSelector,\n address::{AztecAddress, EthAddress},\n constants::{MAX_U32_VALUE, NULL_MSG_SENDER_CONTRACT_ADDRESS},\n traits::{Empty, FromField, Packable, Serialize, ToField},\n};\n\n/// # PublicContext\n///\n/// The **main interface** between an #[external(\"public\")] function and the Aztec blockchain.\n///\n/// An instance of the PublicContext is initialized automatically at the outset of every public function, within the\n/// #[external(\"public\")] macro, so you'll never need to consciously instantiate this yourself.\n///\n/// The instance is always named `context`, and it will always be available within the body of every\n/// #[external(\"public\")] function in your smart contract.\n///\n/// Typical usage for a smart contract developer will be to call getter methods of the PublicContext.\n///\n/// _Pushing_ data and requests to the context is mostly handled within aztec-nr's own functions, so typically a smart\n/// contract developer won't need to call any setter methods directly.\n///\n/// ## Responsibilities\n/// - Exposes contextual data to a public function:\n/// - Data relating to how this public function was called:\n/// - msg_sender, this_address\n/// - Data relating to the current blockchain state:\n/// - timestamp, block_number, chain_id, version\n/// - Gas and fee information\n/// - Provides state access:\n/// - Read/write public storage (key-value mapping)\n/// - Check existence of notes and nullifiers (Some patterns use notes & nullifiers to store public (not private)\n/// information)\n/// - Enables consumption of L1->L2 messages.\n/// - Enables calls to other public smart contract functions:\n/// - Writes data to the blockchain:\n/// - Updates to public state variables\n/// - New public logs (for events)\n/// - New L2->L1 messages\n/// - New notes & nullifiers (E.g. pushing public info to notes/nullifiers, or for completing \"partial notes\")\n///\n/// ## Key Differences from Private Execution\n///\n/// Unlike private functions -- which are executed on the user's device and which can only reference historic state --\n/// public functions are executed by a block proposer and are executed \"live\" on the _current_ tip of the chain. This\n/// means public functions can:\n/// - Read and write _current_ public state\n/// - Immediately see the effects of earlier transactions in the same block\n///\n/// Also, public functions are executed within a zkVM (the \"AVM\"), so that they can _revert_ whilst still ensuring\n/// payment to the proposer and prover. (Private functions cannot revert: they either succeed, or they cannot be\n/// included).\n///\n/// ## Optimising Public Functions\n///\n/// Using the AVM to execute public functions means they compile down to \"AVM bytecode\" instead of the ACIR that\n/// private functions (standalone circuits) compile to. Therefore the approach to optimising a public function is\n/// fundamentally different from optimising a public function.\n///\npub struct PublicContext {\n pub args_hash: Option<Field>,\n pub compute_args_hash: fn() -> Field,\n}\n\nimpl Eq for PublicContext {\n fn eq(self, other: Self) -> bool {\n (self.args_hash == other.args_hash)\n // Can't compare the function compute_args_hash\n }\n}\n\nimpl PublicContext {\n /// Creates a new PublicContext instance.\n ///\n /// Low-level function: This is called automatically by the #[external(\"public\")] macro, so you shouldn't need to\n /// be called directly by smart contract developers.\n ///\n /// # Arguments\n /// * `compute_args_hash` - Function to compute the args_hash\n ///\n /// # Returns\n /// * A new PublicContext instance\n ///\n pub fn new(compute_args_hash: fn() -> Field) -> Self {\n PublicContext { args_hash: Option::none(), compute_args_hash }\n }\n\n /// Emits a _public_ log that will be visible onchain to everyone.\n ///\n /// # Arguments\n /// * `log` - The data to log, must implement Serialize trait\n ///\n pub fn emit_public_log<T>(_self: Self, log: T)\n where\n T: Serialize,\n {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { avm::emit_public_log(Serialize::serialize(log).as_vector()) };\n }\n\n /// Checks if a given note hash exists in the note hash tree at a particular leaf_index.\n ///\n /// # Arguments\n /// * `note_hash` - The note hash to check for existence\n /// * `leaf_index` - The index where the note hash should be located\n ///\n /// # Returns\n /// * `bool` - True if the note hash exists at the specified index\n ///\n pub fn note_hash_exists(_self: Self, note_hash: Field, leaf_index: u64) -> bool {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { avm::note_hash_exists(note_hash, leaf_index) } == 1\n }\n\n /// Checks if a specific L1-to-L2 message exists in the L1-to-L2 message tree at a particular leaf index.\n ///\n /// Common use cases include token bridging, cross-chain governance, and triggering L2 actions based on L1 events.\n ///\n /// This function should be called before attempting to consume an L1-to-L2 message.\n ///\n /// # Arguments\n /// * `msg_hash` - Hash of the L1-to-L2 message to check\n /// * `msg_leaf_index` - The index where the message should be located\n ///\n /// # Returns\n /// * `bool` - True if the message exists at the specified index\n ///\n /// # Advanced\n /// * Uses the AVM l1_to_l2_msg_exists opcode for tree lookup\n /// * Messages are copied from L1 Inbox to L2 by block proposers\n ///\n pub fn l1_to_l2_msg_exists(_self: Self, msg_hash: Field, msg_leaf_index: Field) -> bool {\n // Safety: AVM opcodes are constrained by the AVM itself TODO(alvaro): Make l1l2msg leaf index a u64 upstream\n unsafe { avm::l1_to_l2_msg_exists(msg_hash, msg_leaf_index as u64) } == 1\n }\n\n /// Returns `true` if an `unsiloed_nullifier` has been emitted by `contract_address`.\n ///\n /// Note that unsiloed nullifiers are not the actual values stored in the nullifier tree: they are first siloed via\n /// [`crate::hash::compute_siloed_nullifier`] with the emitting contract's address.\n ///\n /// ## Use Cases\n ///\n /// Nullifiers are typically used as a _privacy-preserving_ record of a one-time action, but they can also be used\n /// to efficiently record _public_ one-time actions as well. This is cheaper than using public storage, and has the\n /// added benefit of the nullifier being emittable from a private function.\n ///\n /// An example is to check whether a contract has been published: we emit a nullifier that is deterministic and\n /// which has a _public_ preimage.\n ///\n /// ## Public vs Private\n ///\n /// In general, one should not attempt to prove nullifier non-existence in private, as that will not consider the\n /// possibility of the nullifier having been emitted in any transaction between the anchor block and the inclusion\n /// block. Private functions instead prove existence via\n /// [`crate::context::PrivateContext::assert_nullifier_exists`]\n /// and 'prove' non-existence by _emitting_ the nullifer, which would cause the transaction to fail if the\n /// nullifier existed.\n ///\n /// This is not the case in public functions, which **do** have access to the tip of the blockchain and so can\n /// reliably prove whether a nullifier exists or not.\n ///\n /// ## Safety\n ///\n /// While it is safe to rely on this function's return value to determine if a nullifier exists or not, it is often\n /// **not** safe to infer additional information from that. In particular, it is **unsafe** to infer that the\n /// existence of a nullifier emitted from a private function implies that all other side-effects of said private\n /// execution have been completed, more concretely that any enqueued public calls have been executed.\n ///\n /// For example, if a function in contract `A` privately emits nullifier `X` and then enqueues public function `Y`,\n /// then it is **unsafe** for a contract `B` to infer that `Y` has alredy executed simply because `X` exists.\n ///\n /// This is because **all** private transaction effects are committed _before_ enqueued public functions are run\n /// (in\n /// order to not reveal detailed timing information about the transaction), so it is possible to observe a\n /// nullifier that was emitted alongside the enqueuing of a public call **before** said call has been completed.\n ///\n /// ## Cost\n ///\n /// This emits the `CHECKNULLIFIEREXISTS` opcode, which conceptually performs a merkle inclusion proof on the\n /// nullifier tree (both when the nullifier exists and when it doesn't).\n pub fn nullifier_exists_unsafe(_self: Self, unsiloed_nullifier: Field, contract_address: AztecAddress) -> bool {\n let siloed_nullifier = compute_siloed_nullifier(contract_address, unsiloed_nullifier);\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { avm::nullifier_exists(siloed_nullifier) } == 1\n }\n\n /// Consumes a message sent from Ethereum (L1) to Aztec (L2) -- effectively marking it as \"read\".\n ///\n /// Use this function if you only want the message to ever be \"referred to\" once. Once consumed using this method,\n /// the message cannot be consumed again, because a nullifier is emitted. If your use case wants for the message to\n /// be read unlimited times, then you can always read any historic message from the L1-to-L2 messages tree, using\n /// the `l1_to_l2_msg_exists` method. Messages never technically get deleted from that tree.\n ///\n /// The message will first be inserted into an Aztec \"Inbox\" smart contract on L1. It will not be available for\n /// consumption immediately. Messages get copied-over from the L1 Inbox to L2 by the next Proposer in batches. So\n /// you will need to wait until the messages are copied before you can consume them.\n ///\n /// # Arguments\n /// * `content` - The message content that was sent from L1\n /// * `secret` - Secret value used for message privacy (if needed)\n /// * `sender` - Ethereum address that sent the message\n /// * `leaf_index` - Index of the message in the L1-to-L2 message tree\n ///\n /// # Advanced\n /// * Validates message existence in the L1-to-L2 message tree\n /// * Prevents double-consumption by emitting a nullifier\n /// * Message hash is computed from all parameters + chain context\n /// * Will revert if message doesn't exist or was already consumed\n ///\n pub fn consume_l1_to_l2_message(self: Self, content: Field, secret: Field, sender: EthAddress, leaf_index: Field) {\n let secret_hash = compute_secret_hash(secret);\n let message_hash = compute_l1_to_l2_message_hash(\n sender,\n self.chain_id(),\n /*recipient=*/\n self.this_address(),\n self.version(),\n content,\n secret_hash,\n leaf_index,\n );\n let nullifier = compute_l1_to_l2_message_nullifier(message_hash, secret);\n\n assert(!self.nullifier_exists_unsafe(nullifier, self.this_address()), \"L1-to-L2 message is already nullified\");\n assert(self.l1_to_l2_msg_exists(message_hash, leaf_index), \"Tried to consume nonexistent L1-to-L2 message\");\n\n self.push_nullifier(nullifier);\n }\n\n /// Sends an \"L2 -> L1 message\" from this function (Aztec, L2) to a smart contract on Ethereum (L1). L1 contracts\n /// which are designed to send/receive messages to/from Aztec are called \"Portal Contracts\".\n ///\n /// Common use cases include withdrawals, cross-chain asset transfers, and triggering L1 actions based on L2 state\n /// changes.\n ///\n /// The message will be inserted into an Aztec \"Outbox\" contract on L1, when this transaction's block is proposed\n /// to L1. Sending the message will not result in any immediate state changes in the target portal contract. The\n /// message will need to be manually consumed from the Outbox through a separate Ethereum transaction: a user will\n /// need to call a function of the portal contract -- a function specifically designed to make a call to the Outbox\n /// to consume the message. The message will only be available for consumption once the _epoch_ proof has been\n /// submitted. Given that there are multiple Aztec blocks within an epoch, it might take some time for this epoch\n /// proof to be submitted -- especially if the block was near the start of an epoch.\n ///\n /// # Arguments\n /// * `recipient` - Ethereum address that will receive the message\n /// * `content` - Message content (32 bytes as a Field element)\n ///\n pub fn message_portal(_self: Self, recipient: EthAddress, content: Field) {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { avm::send_l2_to_l1_msg(recipient, content) };\n }\n\n /// Calls a public function on another contract.\n ///\n /// Will revert if the called function reverts or runs out of gas.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract to call\n /// * `function_selector` - Function to call on the target contract\n /// * `args` - Arguments to pass to the function\n /// * `gas_opts` - An optional allocation of gas to the called function.\n ///\n /// # Returns\n /// * `[Field]` - Return data from the called function\n ///\n pub unconstrained fn call_public_function<let N: u32>(\n _self: Self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; N],\n gas_opts: GasOpts,\n ) -> [Field] {\n let calldata = [function_selector.to_field()].concat(args);\n\n avm::call(\n gas_opts.l2_gas.unwrap_or(MAX_U32_VALUE),\n gas_opts.da_gas.unwrap_or(MAX_U32_VALUE),\n contract_address,\n calldata,\n );\n // Use success_copy to determine whether the call succeeded\n let success = avm::success_copy();\n\n let result_data = avm::returndata_copy(0, avm::returndata_size());\n if !success {\n // Rethrow the revert data.\n avm::revert(result_data);\n }\n result_data\n }\n\n /// Makes a read-only call to a public function on another contract.\n ///\n /// This is similar to Solidity's `staticcall`. The called function cannot modify state or emit events. Any nested\n /// calls are constrained to also be staticcalls.\n ///\n /// Useful for querying data from other contracts safely.\n ///\n /// Will revert if the called function reverts or runs out of gas.\n ///\n /// # Arguments\n /// * `contract_address` - Address of the contract to call\n /// * `function_selector` - Function to call on the target contract\n /// * `args` - Array of arguments to pass to the called function\n /// * `gas_opts` - An optional allocation of gas to the called function.\n ///\n /// # Returns\n /// * `[Field]` - Return data from the called function\n ///\n pub unconstrained fn static_call_public_function<let N: u32>(\n _self: Self,\n contract_address: AztecAddress,\n function_selector: FunctionSelector,\n args: [Field; N],\n gas_opts: GasOpts,\n ) -> [Field] {\n let calldata = [function_selector.to_field()].concat(args);\n\n avm::call_static(\n gas_opts.l2_gas.unwrap_or(MAX_U32_VALUE),\n gas_opts.da_gas.unwrap_or(MAX_U32_VALUE),\n contract_address,\n calldata,\n );\n // Use success_copy to determine whether the call succeeded\n let success = avm::success_copy();\n\n let result_data = avm::returndata_copy(0, avm::returndata_size());\n if !success {\n // Rethrow the revert data.\n avm::revert(result_data);\n }\n result_data\n }\n\n /// Adds a new note hash to the Aztec blockchain's global Note Hash Tree.\n ///\n /// Notes are ordinarily constructed and emitted by _private_ functions, to ensure that both the content of the\n /// note, and the contract that emitted the note, stay private.\n ///\n /// There are however some useful patterns whereby a note needs to contain _public_ data. The ability to push a new\n /// note_hash from a _public_ function means that notes can be injected with public data immediately -- as soon as\n /// the public value is known. The slower alternative would be to submit a follow-up transaction so that a private\n /// function can inject the data. Both are possible on Aztec.\n ///\n /// Search \"Partial Note\" for a very common pattern which enables a note to be \"partially\" populated with some data\n /// in a _private_ function, and then later \"completed\" with some data in a public function.\n ///\n /// # Arguments\n /// * `note_hash` - The hash of the note to add to the tree\n ///\n /// # Advanced\n /// * The note hash will be siloed with the contract address by the protocol\n ///\n pub fn push_note_hash(_self: Self, note_hash: Field) {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { avm::emit_note_hash(note_hash) };\n }\n\n /// Adds a new nullifier to the Aztec blockchain's global Nullifier Tree.\n ///\n /// Whilst nullifiers are primarily intended as a _privacy-preserving_ record of a one-time action, they can also\n /// be used to efficiently record _public_ one-time actions too. Hence why you're seeing this function within the\n /// PublicContext. An example is to check whether a contract has been published: we emit a nullifier that is\n /// deterministic, but whose preimage is _not_ private.\n ///\n /// # Arguments\n /// * `nullifier` - A unique field element that represents the consumed state\n ///\n /// # Advanced\n /// * Nullifier is immediately added to the global nullifier tree\n /// * Emitted nullifiers are immediately visible to all subsequent transactions in the same block\n /// * Automatically siloed with the contract address by the protocol\n /// * Used for preventing double-spending and ensuring one-time actions\n ///\n pub fn push_nullifier(_self: Self, nullifier: Field) {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { avm::emit_nullifier(nullifier) };\n }\n\n /// Returns the address of the current contract being executed.\n ///\n /// This is equivalent to `address(this)` in Solidity (hence the name). Use this to identify the current contract's\n /// address, commonly needed for access control or when interacting with other contracts.\n ///\n /// # Returns\n /// * `AztecAddress` - The contract address of the current function being executed.\n ///\n pub fn this_address(_self: Self) -> AztecAddress {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n avm::address()\n }\n }\n\n /// Returns the contract address that initiated this function call.\n ///\n /// This is similar to `msg.sender` in Solidity (hence the name).\n ///\n /// Important Note: If the calling function is a _private_ function, then it had the option of hiding its address\n /// when enqueuing this public function call. In such cases, this method will return `Option<AztecAddress>::none`.\n /// If the calling function is a _public_ function, it will always return an `Option<AztecAddress>::some` (i.e. a\n /// non-null value).\n ///\n /// # Returns\n /// * `Option<AztecAddress>` - The address of the smart contract that called this function (be it an app contract\n /// or a user's account contract).\n ///\n /// # Advanced\n /// * Value is provided by the AVM sender opcode\n /// * In nested calls, this is the immediate caller, not the original transaction sender\n ///\n pub fn maybe_msg_sender(_self: Self) -> Option<AztecAddress> {\n // Safety: AVM opcodes are constrained by the AVM itself\n let maybe_msg_sender = unsafe { avm::sender() };\n if maybe_msg_sender == NULL_MSG_SENDER_CONTRACT_ADDRESS {\n Option::none()\n } else {\n Option::some(maybe_msg_sender)\n }\n }\n\n /// Returns the function selector of the currently-executing function.\n ///\n /// This is similar to `msg.sig` in Solidity, returning the first 4 bytes of the function signature.\n ///\n /// # Returns\n /// * `FunctionSelector` - The 4-byte function identifier\n ///\n /// # Advanced\n /// * Extracted from the first element of calldata\n /// * Used internally for function dispatch in the AVM\n ///\n pub fn selector(_self: Self) -> FunctionSelector {\n // The selector is the first element of the calldata when calling a public function through dispatch.\n // Safety: AVM opcodes are constrained by the AVM itself.\n let raw_selector: [Field; 1] = unsafe { avm::calldata_copy(0, 1) };\n FunctionSelector::from_field(raw_selector[0])\n }\n\n /// Returns the hash of the arguments passed to the current function.\n ///\n /// Very low-level function: The #[external(\"public\")] macro uses this internally. Smart contract developers\n /// typically won't need to access this directly as arguments are automatically made available.\n ///\n /// # Returns\n /// * `Field` - Hash of the function arguments\n ///\n pub fn get_args_hash(mut self) -> Field {\n if !self.args_hash.is_some() {\n self.args_hash = Option::some((self.compute_args_hash)());\n }\n\n self.args_hash.unwrap_unchecked()\n }\n\n /// Returns the \"transaction fee\" for the current transaction. This is the final tx fee that will be deducted from\n /// the fee_payer's \"fee-juice\" balance (in the protocol's Base Rollup circuit).\n ///\n /// # Returns\n /// * `Field` - The actual, final cost of the transaction, taking into account: the actual gas used during the\n /// setup and app-logic phases, and the fixed amount of gas that's been allocated by the user for the teardown\n /// phase. I.e. effectiveL2FeePerGas * l2GasUsed + effectiveDAFeePerGas * daGasUsed\n ///\n /// This will return `0` during the \"setup\" and \"app-logic\" phases of tx execution (because the final tx fee is not\n /// known at that time). This will only return a nonzero value during the \"teardown\" phase of execution, where the\n /// final tx fee can actually be computed.\n ///\n /// Regardless of _when_ this function is called during the teardown phase, it will always return the same final tx\n /// fee value. The teardown phase does not consume a variable amount of gas: it always consumes a pre-allocated\n /// amount of gas, as specified by the user when they generate their tx.\n ///\n pub fn transaction_fee(_self: Self) -> Field {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n avm::transaction_fee()\n }\n }\n\n /// Returns the chain ID of the current network.\n ///\n /// This is similar to `block.chainid` in Solidity. Returns the unique identifier for the blockchain network this\n /// transaction is executing on.\n ///\n /// Helps prevent cross-chain replay attacks. Useful if implementing multi-chain contract logic.\n ///\n /// # Returns\n /// * `Field` - The chain ID as a field element\n ///\n pub fn chain_id(_self: Self) -> Field {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n avm::chain_id()\n }\n }\n\n /// Returns the Aztec protocol version that this transaction is executing under. Different versions may have\n /// different rules, opcodes, or cryptographic primitives.\n ///\n /// This is similar to how Ethereum has different EVM versions.\n ///\n /// Useful for forward/backward compatibility checks\n ///\n /// Not to be confused with contract versions; this is the protocol version.\n ///\n /// # Returns\n /// * `Field` - The protocol version as a field element\n ///\n pub fn version(_self: Self) -> Field {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n avm::version()\n }\n }\n /// Returns the current block number.\n ///\n /// This is similar to `block.number` in Solidity.\n ///\n /// Note: the current block number is only available within a public function (as opposed to a private function).\n ///\n /// Note: the time intervals between blocks should not be relied upon as being consistent:\n /// - Timestamps of blocks fall within a range, rather than at exact regular intervals.\n /// - Slots can be missed.\n /// - Protocol upgrades can completely change the intervals between blocks (and indeed the current roadmap plans to\n /// reduce the time between blocks, eventually). Use `context.timestamp()` for more-reliable time-based logic.\n ///\n /// # Returns\n /// * `u32` - The current block number\n ///\n pub fn block_number(_self: Self) -> u32 {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n avm::block_number()\n }\n }\n\n /// Returns the timestamp of the current block.\n ///\n /// This is similar to `block.timestamp` in Solidity.\n ///\n /// All functions of all transactions in a block share the exact same timestamp (even though technically each\n /// transaction is executed one-after-the-other).\n ///\n /// Important note: Timestamps of Aztec blocks are not at reliably-fixed intervals. The proposer of the block has\n /// some flexibility to choose a timestamp which is in a valid _range_: Obviously the timestamp of this block must\n /// be strictly greater than that of the previous block, and must must be less than the timestamp of whichever\n /// ethereum block the aztec block is proposed to. Furthermore, if the timestamp is not deemed close enough to the\n /// actual current time, the committee of validators will not attest to the block.\n ///\n /// # Returns\n /// * `u64` - Unix timestamp in seconds\n ///\n pub fn timestamp(_self: Self) -> u64 {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n avm::timestamp()\n }\n }\n\n /// Returns the fee per unit of L2 gas for this transaction (aka the \"L2 gas price\"), as chosen by the user.\n ///\n /// L2 gas covers the cost of executing public functions and handling side-effects within the AVM.\n ///\n /// # Returns\n /// * `u128` - Fee per unit of L2 gas\n ///\n /// Wallet developers should be mindful that the choice of gas price (which is publicly visible) can leak\n /// information about the user, e.g.:\n /// - which wallet software the user is using;\n /// - the amount of time which has elapsed from the time the user's wallet chose a gas price (at the going rate),\n /// to the time of tx submission. This can give clues about the proving time, and hence the nature of the tx.\n /// - the urgency of the transaction (which is kind of unavoidable, if the tx is indeed urgent).\n /// - the wealth of the user.\n /// - the exact user (if the gas price is explicitly chosen by the user to be some unique number like 0.123456789,\n /// or their favorite number). Wallet devs might wish to consider fuzzing the choice of gas price.\n ///\n pub fn min_fee_per_l2_gas(_self: Self) -> u128 {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n avm::min_fee_per_l2_gas()\n }\n }\n\n /// Returns the fee per unit of DA (Data Availability) gas (aka the \"DA gas price\").\n ///\n /// DA gas covers the cost of making transaction data available on L1.\n ///\n /// See the warning in `min_fee_per_l2_gas` for how gas prices can be leaky.\n ///\n /// # Returns\n /// * `u128` - Fee per unit of DA gas\n ///\n pub fn min_fee_per_da_gas(_self: Self) -> u128 {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n avm::min_fee_per_da_gas()\n }\n }\n\n /// Returns the remaining L2 gas available for this transaction.\n ///\n /// Different AVM opcodes consume different amounts of gas.\n ///\n /// # Returns\n /// * `u32` - Remaining L2 gas units\n ///\n pub fn l2_gas_left(_self: Self) -> u32 {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n avm::l2_gas_left()\n }\n }\n\n /// Returns the remaining DA (Data Availability) gas available for this transaction.\n ///\n /// DA gas is consumed when emitting data that needs to be made available on L1, such as public logs or state\n /// updates. All of the side-effects from the private part of the tx also consume DA gas before execution of any\n /// public functions even begins.\n ///\n /// # Returns\n /// * `u32` - Remaining DA gas units\n ///\n pub fn da_gas_left(_self: Self) -> u32 {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe {\n avm::da_gas_left()\n }\n }\n\n /// Checks if the current execution is within a staticcall context, where no state changes or logs are allowed to\n /// be emitted (by this function or any nested function calls).\n ///\n /// # Returns\n /// * `bool` - True if in staticcall context, false otherwise\n ///\n pub fn is_static_call(_self: Self) -> bool {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { avm::is_static_call() } == 1\n }\n\n /// Reads raw field values from public storage. Reads N consecutive storage slots starting from the given slot.\n ///\n /// Very low-level function. Users should typically use the public state variable abstractions to perform reads:\n /// PublicMutable & PublicImmutable.\n ///\n /// # Arguments\n /// * `storage_slot` - The starting storage slot to read from\n ///\n /// # Returns\n /// * `[Field; N]` - Array of N field values from consecutive storage slots\n ///\n /// # Generic Parameters\n /// * `N` - the number of consecutive slots to return, starting from the `storage_slot`.\n ///\n pub fn raw_storage_read<let N: u32>(self: Self, storage_slot: Field) -> [Field; N] {\n let mut out = [0; N];\n for i in 0..N {\n // Safety: AVM opcodes are constrained by the AVM itself\n out[i] = unsafe { avm::storage_read(storage_slot + i as Field, self.this_address().to_field()) };\n }\n out\n }\n\n /// Reads a typed value from public storage.\n ///\n /// Low-level function. Users should typically use the public state variable abstractions to perform reads:\n /// PublicMutable & PublicImmutable.\n ///\n /// # Arguments\n /// * `storage_slot` - The storage slot to read from\n ///\n /// # Returns\n /// * `T` - The deserialized value from storage\n ///\n /// # Generic Parameters\n /// * `T` - The type that the caller expects to read from the `storage_slot`.\n ///\n pub fn storage_read<T>(self, storage_slot: Field) -> T\n where\n T: Packable,\n {\n T::unpack(self.raw_storage_read(storage_slot))\n }\n\n /// Writes raw field values to public storage. Writes to N consecutive storage slots starting from the given slot.\n ///\n /// Very low-level function. Users should typically use the public state variable abstractions to perform writes:\n /// PublicMutable & PublicImmutable.\n ///\n /// Public storage writes take effect immediately.\n ///\n /// # Arguments\n /// * `storage_slot` - The starting storage slot to write to\n /// * `values` - Array of N Fields to write to storage\n ///\n pub fn raw_storage_write<let N: u32>(_self: Self, storage_slot: Field, values: [Field; N]) {\n for i in 0..N {\n // Safety: AVM opcodes are constrained by the AVM itself\n unsafe { avm::storage_write(storage_slot + i as Field, values[i]) };\n }\n }\n\n /// Writes a typed value to public storage.\n ///\n /// Low-level function. Users should typically use the public state variable abstractions to perform writes:\n /// PublicMutable & PublicImmutable.\n ///\n /// # Arguments\n /// * `storage_slot` - The storage slot to write to\n /// * `value` - The typed value to write to storage\n ///\n /// # Generic Parameters\n /// * `T` - The type to write to storage.\n ///\n pub fn storage_write<T>(self, storage_slot: Field, value: T)\n where\n T: Packable,\n {\n self.raw_storage_write(storage_slot, value.pack());\n }\n}\n\nimpl Empty for PublicContext {\n fn empty() -> Self {\n PublicContext::new(|| 0)\n }\n}\n"
|
|
958
958
|
},
|
|
959
959
|
"75": {
|
|
960
960
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/context/utility_context.nr",
|
|
961
|
-
"source": "use crate::oracle::{execution::get_utility_context, storage::storage_read};\nuse crate::protocol::{abis::block_header::BlockHeader, address::AztecAddress, traits::Packable};\n\n// If you'll modify this struct don't forget to update utility_context.ts as well.\npub struct UtilityContext {\n block_header: BlockHeader,\n contract_address: AztecAddress,\n}\n\nimpl UtilityContext {\n pub unconstrained fn new() -> Self {\n get_utility_context()\n }\n\n pub unconstrained fn at(contract_address: AztecAddress) -> Self {\n // We get a context with default contract address, and then we construct the final context with the provided\n // contract address.\n let default_context = get_utility_context();\n\n Self { block_header: default_context.block_header, contract_address }\n }\n\n pub fn block_header(self) -> BlockHeader {\n self.block_header\n }\n\n pub fn block_number(self) -> u32 {\n self.block_header.
|
|
961
|
+
"source": "use crate::oracle::{execution::get_utility_context, storage::storage_read};\nuse crate::protocol::{abis::block_header::BlockHeader, address::AztecAddress, traits::Packable};\n\n// If you'll modify this struct don't forget to update utility_context.ts as well.\npub struct UtilityContext {\n block_header: BlockHeader,\n contract_address: AztecAddress,\n}\n\nimpl UtilityContext {\n pub unconstrained fn new() -> Self {\n get_utility_context()\n }\n\n pub unconstrained fn at(contract_address: AztecAddress) -> Self {\n // We get a context with default contract address, and then we construct the final context with the provided\n // contract address.\n let default_context = get_utility_context();\n\n Self { block_header: default_context.block_header, contract_address }\n }\n\n pub fn block_header(self) -> BlockHeader {\n self.block_header\n }\n\n pub fn block_number(self) -> u32 {\n self.block_header.block_number()\n }\n\n pub fn timestamp(self) -> u64 {\n self.block_header.timestamp()\n }\n\n pub fn this_address(self) -> AztecAddress {\n self.contract_address\n }\n\n pub fn version(self) -> Field {\n self.block_header.version()\n }\n\n pub fn chain_id(self) -> Field {\n self.block_header.chain_id()\n }\n\n pub unconstrained fn raw_storage_read<let N: u32>(self: Self, storage_slot: Field) -> [Field; N] {\n storage_read(self.block_header, self.this_address(), storage_slot)\n }\n\n pub unconstrained fn storage_read<T>(self, storage_slot: Field) -> T\n where\n T: Packable,\n {\n T::unpack(self.raw_storage_read(storage_slot))\n }\n}\n"
|
|
962
962
|
},
|
|
963
963
|
"76": {
|
|
964
964
|
"path": "/home/aztec-dev/aztec-packages/noir-projects/aztec-nr/aztec/src/contract_self.nr",
|
package/package.json
CHANGED
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
"name": "@aztec/protocol-contracts",
|
|
3
3
|
"homepage": "https://github.com/AztecProtocol/aztec-packages/tree/master/yarn-project/protocol-contracts",
|
|
4
4
|
"description": "Canonical Noir contracts for the Aztec Network",
|
|
5
|
-
"version": "4.0.0-rc.
|
|
5
|
+
"version": "4.0.0-rc.6",
|
|
6
6
|
"type": "module",
|
|
7
7
|
"exports": {
|
|
8
8
|
".": "./dest/index.js",
|
|
@@ -73,9 +73,9 @@
|
|
|
73
73
|
]
|
|
74
74
|
},
|
|
75
75
|
"dependencies": {
|
|
76
|
-
"@aztec/constants": "4.0.0-rc.
|
|
77
|
-
"@aztec/foundation": "4.0.0-rc.
|
|
78
|
-
"@aztec/stdlib": "4.0.0-rc.
|
|
76
|
+
"@aztec/constants": "4.0.0-rc.6",
|
|
77
|
+
"@aztec/foundation": "4.0.0-rc.6",
|
|
78
|
+
"@aztec/stdlib": "4.0.0-rc.6",
|
|
79
79
|
"lodash.chunk": "^4.2.0",
|
|
80
80
|
"lodash.omit": "^4.5.0",
|
|
81
81
|
"tslib": "^2.4.0"
|