@devtion/backend 0.0.0-7e983e3 → 0.0.0-8bb9489

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@devtion/backend",
3
- "version": "0.0.0-7e983e3",
3
+ "version": "0.0.0-8bb9489",
4
4
  "description": "MPC Phase 2 backend for Firebase services management",
5
5
  "repository": "git@github.com:privacy-scaling-explorations/p0tion.git",
6
6
  "homepage": "https://github.com/privacy-scaling-explorations/p0tion",
@@ -67,7 +67,7 @@
67
67
  "@aws-sdk/client-ssm": "^3.357.0",
68
68
  "@aws-sdk/middleware-endpoint": "^3.329.0",
69
69
  "@aws-sdk/s3-request-presigner": "^3.329.0",
70
- "@p0tion/actions": "^1.0.5",
70
+ "@devtion/actions": "latest",
71
71
  "blakejs": "^1.2.1",
72
72
  "dotenv": "^16.0.3",
73
73
  "ethers": "5.7.2",
@@ -85,5 +85,5 @@
85
85
  "publishConfig": {
86
86
  "access": "public"
87
87
  },
88
- "gitHead": "afae72061a3b366b05508de53fe91e9b254cc3d5"
88
+ "gitHead": "183d8a9e86db61fe1c713898c0abce990a7e6004"
89
89
  }
@@ -18,7 +18,7 @@ import {
18
18
  vmBootstrapCommand,
19
19
  vmDependenciesAndCacheArtifactsCommand,
20
20
  vmBootstrapScriptFilename
21
- } from "@p0tion/actions"
21
+ } from "@devtion/actions"
22
22
  import { encode } from "html-entities"
23
23
  import { SetupCeremonyData } from "../types/index"
24
24
  import { COMMON_ERRORS, logAndThrowError, printLog, SPECIFIC_ERRORS } from "../lib/errors"
@@ -146,7 +146,7 @@ export const setupCeremony = functions
146
146
  // Check if using the VM approach for contribution verification.
147
147
  if (circuit.verification.cfOrVm === CircuitContributionVerificationMechanism.VM) {
148
148
  // VM command to be run at the startup.
149
- const startupCommand = vmBootstrapCommand(bucketName)
149
+ const startupCommand = vmBootstrapCommand(`${bucketName}/circuits/${circuit.name!}`)
150
150
 
151
151
  // Get EC2 client.
152
152
  const ec2Client = await createEC2Client()
@@ -165,7 +165,12 @@ export const setupCeremony = functions
165
165
  printLog(`Check VM dependencies and cache artifacts commands ${vmCommands.join("\n")}`, LogLevel.DEBUG)
166
166
 
167
167
  // Upload the post-startup commands script file.
168
- await uploadFileToBucketNoFile(bucketName, vmBootstrapScriptFilename, vmCommands.join("\n"))
168
+ printLog(`Uploading VM post-startup commands script file ${vmBootstrapScriptFilename}`, LogLevel.DEBUG)
169
+ await uploadFileToBucketNoFile(
170
+ bucketName,
171
+ `circuits/${circuit.name!}/${vmBootstrapScriptFilename}`,
172
+ vmCommands.join("\n")
173
+ )
169
174
 
170
175
  // Compute the VM disk space requirement (in GB).
171
176
  const vmDiskSize = computeDiskSizeForVM(circuit.zKeySizeInBytes!, circuit.metadata?.pot!)
@@ -37,7 +37,7 @@ import {
37
37
  createCustomLoggerForFile,
38
38
  retrieveCommandStatus,
39
39
  stopEC2Instance
40
- } from "@p0tion/actions"
40
+ } from "@devtion/actions"
41
41
  import { zKey } from "snarkjs"
42
42
  import { CommandInvocationStatus, SSMClient } from "@aws-sdk/client-ssm"
43
43
  import { FinalizeCircuitData, VerifyContributionData } from "../types/index"
@@ -58,6 +58,7 @@ import {
58
58
  uploadFileToBucket
59
59
  } from "../lib/utils"
60
60
  import { EC2Client } from "@aws-sdk/client-ec2"
61
+ import { HttpsError } from "firebase-functions/v2/https"
61
62
 
62
63
  dotenv.config()
63
64
 
@@ -131,6 +132,7 @@ const coordinate = async (
131
132
 
132
133
  newParticipantStatus = ParticipantStatus.CONTRIBUTING
133
134
  newContributionStep = ParticipantContributionStep.DOWNLOADING
135
+ newCurrentContributorId = participant.id
134
136
  }
135
137
  // Scenario (B).
136
138
  else if (participantIsNotCurrentContributor) {
@@ -213,113 +215,80 @@ const coordinate = async (
213
215
  * Wait until the command has completed its execution inside the VM.
214
216
  * @dev this method implements a custom interval to check 5 times after 1 minute if the command execution
215
217
  * has been completed or not by calling the `retrieveCommandStatus` method.
216
- * @param {any} resolve the promise.
217
- * @param {any} reject the promise.
218
218
  * @param {SSMClient} ssm the SSM client.
219
219
  * @param {string} vmInstanceId the unique identifier of the VM instance.
220
220
  * @param {string} commandId the unique identifier of the VM command.
221
221
  * @returns <Promise<void>> true when the command execution succeed; otherwise false.
222
222
  */
223
- const waitForVMCommandExecution = (
224
- resolve: any,
225
- reject: any,
226
- ssm: SSMClient,
227
- vmInstanceId: string,
228
- commandId: string
229
- ) => {
230
- const interval = setInterval(async () => {
231
- try {
232
- // Get command status.
233
- const cmdStatus = await retrieveCommandStatus(ssm, vmInstanceId, commandId)
234
- printLog(`Checking command ${commandId} status => ${cmdStatus}`, LogLevel.DEBUG)
235
-
236
- if (cmdStatus === CommandInvocationStatus.SUCCESS) {
237
- printLog(`Command ${commandId} successfully completed`, LogLevel.DEBUG)
238
-
239
- // Resolve the promise.
240
- resolve()
241
- } else if (cmdStatus === CommandInvocationStatus.FAILED) {
242
- logAndThrowError(SPECIFIC_ERRORS.SE_VM_FAILED_COMMAND_EXECUTION)
243
- reject()
244
- } else if (cmdStatus === CommandInvocationStatus.TIMED_OUT) {
245
- logAndThrowError(SPECIFIC_ERRORS.SE_VM_TIMEDOUT_COMMAND_EXECUTION)
246
- reject()
247
- } else if (cmdStatus === CommandInvocationStatus.CANCELLED) {
248
- logAndThrowError(SPECIFIC_ERRORS.SE_VM_CANCELLED_COMMAND_EXECUTION)
249
- reject()
250
- } else if (cmdStatus === CommandInvocationStatus.DELAYED) {
251
- logAndThrowError(SPECIFIC_ERRORS.SE_VM_DELAYED_COMMAND_EXECUTION)
252
- reject()
253
- }
254
- } catch (error: any) {
255
- printLog(`Invalid command ${commandId} execution`, LogLevel.DEBUG)
223
+ const waitForVMCommandExecution = (ssm: SSMClient, vmInstanceId: string, commandId: string): Promise<void> =>
224
+ new Promise((resolve, reject) => {
225
+ const poll = async () => {
226
+ try {
227
+ // Get command status.
228
+ const cmdStatus = await retrieveCommandStatus(ssm, vmInstanceId, commandId)
229
+ printLog(`Checking command ${commandId} status => ${cmdStatus}`, LogLevel.DEBUG)
230
+
231
+ let error: HttpsError | undefined
232
+ switch (cmdStatus) {
233
+ case CommandInvocationStatus.CANCELLING:
234
+ case CommandInvocationStatus.CANCELLED: {
235
+ error = SPECIFIC_ERRORS.SE_VM_CANCELLED_COMMAND_EXECUTION
236
+ break
237
+ }
238
+ case CommandInvocationStatus.DELAYED: {
239
+ error = SPECIFIC_ERRORS.SE_VM_DELAYED_COMMAND_EXECUTION
240
+ break
241
+ }
242
+ case CommandInvocationStatus.FAILED: {
243
+ error = SPECIFIC_ERRORS.SE_VM_FAILED_COMMAND_EXECUTION
244
+ break
245
+ }
246
+ case CommandInvocationStatus.TIMED_OUT: {
247
+ error = SPECIFIC_ERRORS.SE_VM_TIMEDOUT_COMMAND_EXECUTION
248
+ break
249
+ }
250
+ case CommandInvocationStatus.IN_PROGRESS:
251
+ case CommandInvocationStatus.PENDING: {
252
+ // wait a minute and poll again
253
+ setTimeout(poll, 60000)
254
+ return
255
+ }
256
+ case CommandInvocationStatus.SUCCESS: {
257
+ printLog(`Command ${commandId} successfully completed`, LogLevel.DEBUG)
258
+
259
+ // Resolve the promise.
260
+ resolve()
261
+ return
262
+ }
263
+ default: {
264
+ logAndThrowError(SPECIFIC_ERRORS.SE_VM_UNKNOWN_COMMAND_STATUS)
265
+ }
266
+ }
256
267
 
257
- if (!error.toString().includes(commandId)) logAndThrowError(COMMON_ERRORS.CM_INVALID_COMMAND_EXECUTION)
268
+ if (error) {
269
+ logAndThrowError(error)
270
+ }
271
+ } catch (error: any) {
272
+ printLog(`Invalid command ${commandId} execution`, LogLevel.DEBUG)
258
273
 
259
- // Reject the promise.
260
- reject()
261
- } finally {
262
- // Clear the interval.
263
- clearInterval(interval)
264
- }
265
- }, 60000) // 1 minute.
266
- }
274
+ const ec2 = await createEC2Client()
267
275
 
268
- /**
269
- * Wait until the artifacts have been downloaded.
270
- * @param {any} resolve the promise.
271
- * @param {any} reject the promise.
272
- * @param {string} potTempFilePath the tmp path to the locally downloaded pot file.
273
- * @param {string} firstZkeyTempFilePath the tmp path to the locally downloaded first zkey file.
274
- * @param {string} lastZkeyTempFilePath the tmp path to the locally downloaded last zkey file.
275
- */
276
- const waitForFileDownload = (
277
- resolve: any,
278
- reject: any,
279
- potTempFilePath: string,
280
- firstZkeyTempFilePath: string,
281
- lastZkeyTempFilePath: string,
282
- circuitId: string,
283
- participantId: string
284
- ) => {
285
- const maxWaitTime = 5 * 60 * 1000 // 5 minutes
286
- // every second check if the file download was completed
287
- const interval = setInterval(async () => {
288
- printLog(`Verifying that the artifacts were downloaded for circuit ${circuitId} and participant ${participantId}`, LogLevel.DEBUG)
289
- try {
290
- // check if files have been downloaded
291
- if (!fs.existsSync(potTempFilePath)) {
292
- printLog(`Pot file not found at ${potTempFilePath}`, LogLevel.DEBUG)
293
- }
294
- if (!fs.existsSync(firstZkeyTempFilePath)) {
295
- printLog(`First zkey file not found at ${firstZkeyTempFilePath}`, LogLevel.DEBUG)
296
- }
297
- if (!fs.existsSync(lastZkeyTempFilePath)) {
298
- printLog(`Last zkey file not found at ${lastZkeyTempFilePath}`, LogLevel.DEBUG)
299
- }
276
+ // if it errors out, let's just log it as a warning so the coordinator is aware
277
+ try {
278
+ await stopEC2Instance(ec2, vmInstanceId)
279
+ } catch (error: any) {
280
+ printLog(`Error while stopping VM instance ${vmInstanceId} - Error ${error}`, LogLevel.WARN)
281
+ }
282
+
283
+ if (!error.toString().includes(commandId)) logAndThrowError(COMMON_ERRORS.CM_INVALID_COMMAND_EXECUTION)
300
284
 
301
- // if all files were downloaded
302
- if (fs.existsSync(potTempFilePath) && fs.existsSync(firstZkeyTempFilePath) && fs.existsSync(lastZkeyTempFilePath)) {
303
- printLog(`All required files are present on disk.`, LogLevel.INFO)
304
- // resolve the promise
305
- resolve()
285
+ // Reject the promise.
286
+ reject()
306
287
  }
307
- } catch (error: any) {
308
- // if we have an error then we print it as a warning and reject
309
- printLog(`Error while downloading files: ${error}`, LogLevel.WARN)
310
- reject()
311
- } finally {
312
- printLog(`Clearing the interval for file download. Circuit ${circuitId} and participant ${participantId}`, LogLevel.DEBUG)
313
- clearInterval(interval)
314
288
  }
315
- }, 5000)
316
289
 
317
- // we want to clean in 5 minutes in case
318
- setTimeout(() => {
319
- clearInterval(interval)
320
- reject(new Error('Timeout exceeded while waiting for files to be downloaded.'))
321
- }, maxWaitTime)
322
- }
290
+ setTimeout(poll, 60000)
291
+ })
323
292
 
324
293
  /**
325
294
  * This method is used to coordinate the waiting queues of ceremony circuits.
@@ -341,7 +310,7 @@ const waitForFileDownload = (
341
310
  * - Just completed a contribution or all contributions for each circuit. If yes, coordinate (multi-participant scenario).
342
311
  */
343
312
  export const coordinateCeremonyParticipant = functionsV1
344
- .region('europe-west1')
313
+ .region("europe-west1")
345
314
  .runWith({
346
315
  memory: "512MB"
347
316
  })
@@ -442,7 +411,6 @@ export const coordinateCeremonyParticipant = functionsV1
442
411
  }
443
412
  })
444
413
 
445
-
446
414
  /**
447
415
  * Recursive function to check whether an EC2 is in a running state
448
416
  * @notice required step to run commands
@@ -451,16 +419,12 @@ export const coordinateCeremonyParticipant = functionsV1
451
419
  * @param attempts <number> - how many times to retry before failing
452
420
  * @returns <Promise<boolean>> - whether the VM was started
453
421
  */
454
- const checkIfVMRunning = async (
455
- ec2: EC2Client,
456
- vmInstanceId: string,
457
- attempts = 5
458
- ): Promise<boolean> => {
422
+ const checkIfVMRunning = async (ec2: EC2Client, vmInstanceId: string, attempts = 5): Promise<boolean> => {
459
423
  // if we tried 5 times, then throw an error
460
424
  if (attempts <= 0) logAndThrowError(SPECIFIC_ERRORS.SE_VM_NOT_RUNNING)
461
425
 
462
- await sleep(60000); // Wait for 1 min
463
- const isVMRunning = await checkIfRunning(ec2, vmInstanceId)
426
+ await sleep(60000) // Wait for 1 min
427
+ const isVMRunning = await checkIfRunning(ec2, vmInstanceId)
464
428
 
465
429
  if (!isVMRunning) {
466
430
  printLog(`VM not running, ${attempts - 1} attempts remaining. Retrying in 1 minute...`, LogLevel.DEBUG)
@@ -497,7 +461,7 @@ const checkIfVMRunning = async (
497
461
  * 2) Send all updates atomically to the Firestore database.
498
462
  */
499
463
  export const verifycontribution = functionsV2.https.onCall(
500
- { memory: "16GiB", timeoutSeconds: 3600, region: 'europe-west1' },
464
+ { memory: "16GiB", timeoutSeconds: 3600, region: "europe-west1" },
501
465
  async (request: functionsV2.https.CallableRequest<VerifyContributionData>): Promise<any> => {
502
466
  if (!request.auth || (!request.auth.token.participant && !request.auth.token.coordinator))
503
467
  logAndThrowError(SPECIFIC_ERRORS.SE_AUTH_NO_CURRENT_AUTH_USER)
@@ -665,9 +629,6 @@ export const verifycontribution = functionsV2.https.onCall(
665
629
  verificationTranscriptTemporaryLocalPath,
666
630
  true
667
631
  )
668
-
669
- // Stop VM instance.
670
- await stopEC2Instance(ec2, vmInstanceId)
671
632
  } else {
672
633
  // Upload verification transcript.
673
634
  /// nb. do not use multi-part upload here due to small file size.
@@ -744,6 +705,17 @@ export const verifycontribution = functionsV2.https.onCall(
744
705
  })
745
706
  }
746
707
 
708
+ // Stop VM instance
709
+ if (isUsingVM) {
710
+ // using try and catch as the VM stopping function can throw
711
+ // however we want to continue without stopping as the
712
+ // verification was valid, and inform the coordinator
713
+ try {
714
+ await stopEC2Instance(ec2, vmInstanceId)
715
+ } catch (error: any) {
716
+ printLog(`Error while stopping VM instance ${vmInstanceId} - Error ${error}`, LogLevel.WARN)
717
+ }
718
+ }
747
719
  // Step (1.A.4.C)
748
720
  if (!isFinalizing) {
749
721
  // Step (1.A.4.C.1)
@@ -764,6 +736,8 @@ export const verifycontribution = functionsV2.https.onCall(
764
736
  : verifyCloudFunctionTime
765
737
 
766
738
  // Prepare tx to update circuit average contribution/verification time.
739
+ const updatedCircuitDoc = await getDocumentById(getCircuitsCollectionPath(ceremonyId), circuitId)
740
+ const { waitingQueue: updatedWaitingQueue } = updatedCircuitDoc.data()!
767
741
  /// @dev this must happen only for valid contributions.
768
742
  batch.update(circuitDoc.ref, {
769
743
  avgTimings: {
@@ -776,7 +750,7 @@ export const verifycontribution = functionsV2.https.onCall(
776
750
  : avgVerifyCloudFunctionTime
777
751
  },
778
752
  waitingQueue: {
779
- ...waitingQueue,
753
+ ...updatedWaitingQueue,
780
754
  completedContributions: isContributionValid
781
755
  ? completedContributions + 1
782
756
  : completedContributions,
@@ -835,9 +809,7 @@ export const verifycontribution = functionsV2.https.onCall(
835
809
  printLog(`Starting the execution of command ${commandId}`, LogLevel.DEBUG)
836
810
 
837
811
  // Step (1.A.3.3).
838
- return new Promise<void>((resolve, reject) =>
839
- waitForVMCommandExecution(resolve, reject, ssm, vmInstanceId, commandId)
840
- )
812
+ return waitForVMCommandExecution(ssm, vmInstanceId, commandId)
841
813
  .then(async () => {
842
814
  // Command execution successfully completed.
843
815
  printLog(`Command ${commandId} execution has been successfully completed`, LogLevel.DEBUG)
@@ -849,76 +821,57 @@ export const verifycontribution = functionsV2.https.onCall(
849
821
 
850
822
  logAndThrowError(COMMON_ERRORS.CM_INVALID_COMMAND_EXECUTION)
851
823
  })
852
- } else {
853
- // CF approach.
854
- printLog(`CF mechanism`, LogLevel.DEBUG)
855
-
856
- const potStoragePath = getPotStorageFilePath(files.potFilename)
857
- const firstZkeyStoragePath = getZkeyStorageFilePath(prefix, `${prefix}_${genesisZkeyIndex}.zkey`)
858
- // Prepare temporary file paths.
859
- // (nb. these are needed to download the necessary artifacts for verification from AWS S3).
860
- verificationTranscriptTemporaryLocalPath = createTemporaryLocalPath(
861
- verificationTranscriptCompleteFilename
862
- )
863
- const potTempFilePath = createTemporaryLocalPath(`${circuitId}_${participantDoc.id}.pot`)
864
- const firstZkeyTempFilePath = createTemporaryLocalPath(`${circuitId}_${participantDoc.id}_genesis.zkey`)
865
- const lastZkeyTempFilePath = createTemporaryLocalPath(`${circuitId}_${participantDoc.id}_last.zkey`)
866
-
867
- // Create and populate transcript.
868
- const transcriptLogger = createCustomLoggerForFile(verificationTranscriptTemporaryLocalPath)
869
- transcriptLogger.info(
870
- `${
871
- isFinalizing ? `Final verification` : `Verification`
872
- } transcript for ${prefix} circuit Phase 2 contribution.\n${
873
- isFinalizing ? `Coordinator ` : `Contributor # ${Number(lastZkeyIndex)}`
874
- } (${contributorOrCoordinatorIdentifier})\n`
875
- )
876
-
877
- // Step (1.A.2).
878
- await downloadArtifactFromS3Bucket(bucketName, potStoragePath, potTempFilePath)
879
- await downloadArtifactFromS3Bucket(bucketName, firstZkeyStoragePath, firstZkeyTempFilePath)
880
- await downloadArtifactFromS3Bucket(bucketName, lastZkeyStoragePath, lastZkeyTempFilePath)
824
+ }
881
825
 
882
- await sleep(6000)
826
+ // CF approach.
827
+ printLog(`CF mechanism`, LogLevel.DEBUG)
828
+
829
+ const potStoragePath = getPotStorageFilePath(files.potFilename)
830
+ const firstZkeyStoragePath = getZkeyStorageFilePath(prefix, `${prefix}_${genesisZkeyIndex}.zkey`)
831
+ // Prepare temporary file paths.
832
+ // (nb. these are needed to download the necessary artifacts for verification from AWS S3).
833
+ verificationTranscriptTemporaryLocalPath = createTemporaryLocalPath(verificationTranscriptCompleteFilename)
834
+ const potTempFilePath = createTemporaryLocalPath(`${circuitId}_${participantDoc.id}.pot`)
835
+ const firstZkeyTempFilePath = createTemporaryLocalPath(`${circuitId}_${participantDoc.id}_genesis.zkey`)
836
+ const lastZkeyTempFilePath = createTemporaryLocalPath(`${circuitId}_${participantDoc.id}_last.zkey`)
837
+
838
+ // Create and populate transcript.
839
+ const transcriptLogger = createCustomLoggerForFile(verificationTranscriptTemporaryLocalPath)
840
+ transcriptLogger.info(
841
+ `${
842
+ isFinalizing ? `Final verification` : `Verification`
843
+ } transcript for ${prefix} circuit Phase 2 contribution.\n${
844
+ isFinalizing ? `Coordinator ` : `Contributor # ${Number(lastZkeyIndex)}`
845
+ } (${contributorOrCoordinatorIdentifier})\n`
846
+ )
883
847
 
884
- // wait until the files are actually downloaded
885
- return new Promise<void>((resolve, reject) =>
886
- waitForFileDownload(resolve, reject, potTempFilePath, firstZkeyTempFilePath, lastZkeyTempFilePath, circuitId, participantDoc.id)
887
- )
888
- .then(async () => {
889
- printLog(`Downloads from AWS S3 bucket completed - ceremony ${ceremonyId} circuit ${circuitId}`, LogLevel.DEBUG)
890
-
891
- // Step (1.A.4).
892
- isContributionValid = await zKey.verifyFromInit(
893
- firstZkeyTempFilePath,
894
- potTempFilePath,
895
- lastZkeyTempFilePath,
896
- transcriptLogger
897
- )
898
-
899
- // Compute contribution hash.
900
- lastZkeyBlake2bHash = await blake512FromPath(lastZkeyTempFilePath)
901
-
902
- // Free resources by unlinking temporary folders.
903
- // Do not free-up verification transcript path here.
904
- try {
905
- fs.unlinkSync(potTempFilePath)
906
- fs.unlinkSync(firstZkeyTempFilePath)
907
- fs.unlinkSync(lastZkeyTempFilePath)
908
- } catch (error: any) {
909
- printLog(`Error while unlinking temporary files - Error ${error}`, LogLevel.WARN)
910
- }
848
+ // Step (1.A.2).
849
+ await downloadArtifactFromS3Bucket(bucketName, potStoragePath, potTempFilePath)
850
+ await downloadArtifactFromS3Bucket(bucketName, firstZkeyStoragePath, firstZkeyTempFilePath)
851
+ await downloadArtifactFromS3Bucket(bucketName, lastZkeyStoragePath, lastZkeyTempFilePath)
911
852
 
912
- await completeVerification()
913
- })
914
- .catch((error: any) => {
915
- // Throw the new error
916
- const commonError = COMMON_ERRORS.CM_INVALID_REQUEST
917
- const additionalDetails = error.toString()
853
+ // Step (1.A.4).
854
+ isContributionValid = await zKey.verifyFromInit(
855
+ firstZkeyTempFilePath,
856
+ potTempFilePath,
857
+ lastZkeyTempFilePath,
858
+ transcriptLogger
859
+ )
918
860
 
919
- logAndThrowError(makeError(commonError.code, commonError.message, additionalDetails))
920
- })
861
+ // Compute contribution hash.
862
+ lastZkeyBlake2bHash = await blake512FromPath(lastZkeyTempFilePath)
863
+
864
+ // Free resources by unlinking temporary folders.
865
+ // Do not free-up verification transcript path here.
866
+ try {
867
+ fs.unlinkSync(potTempFilePath)
868
+ fs.unlinkSync(firstZkeyTempFilePath)
869
+ fs.unlinkSync(lastZkeyTempFilePath)
870
+ } catch (error: any) {
871
+ printLog(`Error while unlinking temporary files - Error ${error}`, LogLevel.WARN)
921
872
  }
873
+
874
+ await completeVerification()
922
875
  }
923
876
  }
924
877
  )
@@ -929,7 +882,7 @@ export const verifycontribution = functionsV2.https.onCall(
929
882
  * this does not happen if the participant is actually the coordinator who is finalizing the ceremony.
930
883
  */
931
884
  export const refreshParticipantAfterContributionVerification = functionsV1
932
- .region('europe-west1')
885
+ .region("europe-west1")
933
886
  .runWith({
934
887
  memory: "512MB"
935
888
  })
@@ -1012,7 +965,7 @@ export const refreshParticipantAfterContributionVerification = functionsV1
1012
965
  * and verification key extracted from the circuit final contribution (as part of the ceremony finalization process).
1013
966
  */
1014
967
  export const finalizeCircuit = functionsV1
1015
- .region('europe-west1')
968
+ .region("europe-west1")
1016
969
  .runWith({
1017
970
  memory: "512MB"
1018
971
  })
@@ -8,7 +8,7 @@ import {
8
8
  ParticipantContributionStep,
9
9
  getParticipantsCollectionPath,
10
10
  commonTerms
11
- } from "@p0tion/actions"
11
+ } from "@devtion/actions"
12
12
  import { FieldValue } from "firebase-admin/firestore"
13
13
  import {
14
14
  PermanentlyStoreCurrentContributionTimeAndHash,
@@ -44,7 +44,7 @@ dotenv.config()
44
44
  * @dev true when the participant can participate (1.A, 3.B, 1.D); otherwise false.
45
45
  */
46
46
  export const checkParticipantForCeremony = functions
47
- .region('europe-west1')
47
+ .region("europe-west1")
48
48
  .runWith({
49
49
  memory: "512MB"
50
50
  })
@@ -175,7 +175,7 @@ export const checkParticipantForCeremony = functions
175
175
  * 2) the participant has just finished the contribution for a circuit (contributionProgress != 0 && status = CONTRIBUTED && contributionStep = COMPLETED).
176
176
  */
177
177
  export const progressToNextCircuitForContribution = functions
178
- .region('europe-west1')
178
+ .region("europe-west1")
179
179
  .runWith({
180
180
  memory: "512MB"
181
181
  })
@@ -233,7 +233,7 @@ export const progressToNextCircuitForContribution = functions
233
233
  * 5) Completed contribution computation and verification.
234
234
  */
235
235
  export const progressToNextContributionStep = functions
236
- .region('europe-west1')
236
+ .region("europe-west1")
237
237
  .runWith({
238
238
  memory: "512MB"
239
239
  })
@@ -296,7 +296,7 @@ export const progressToNextContributionStep = functions
296
296
  * @dev enable the current contributor to resume a contribution from where it had left off.
297
297
  */
298
298
  export const permanentlyStoreCurrentContributionTimeAndHash = functions
299
- .region('europe-west1')
299
+ .region("europe-west1")
300
300
  .runWith({
301
301
  memory: "512MB"
302
302
  })
@@ -355,7 +355,7 @@ export const permanentlyStoreCurrentContributionTimeAndHash = functions
355
355
  * @dev enable the current contributor to resume a multi-part upload from where it had left off.
356
356
  */
357
357
  export const temporaryStoreCurrentContributionMultiPartUploadId = functions
358
- .region('europe-west1')
358
+ .region("europe-west1")
359
359
  .runWith({
360
360
  memory: "512MB"
361
361
  })
@@ -409,7 +409,7 @@ export const temporaryStoreCurrentContributionMultiPartUploadId = functions
409
409
  * @dev enable the current contributor to resume a multi-part upload from where it had left off.
410
410
  */
411
411
  export const temporaryStoreCurrentContributionUploadedChunkData = functions
412
- .region('europe-west1')
412
+ .region("europe-west1")
413
413
  .runWith({
414
414
  memory: "512MB"
415
415
  })
@@ -469,7 +469,7 @@ export const temporaryStoreCurrentContributionUploadedChunkData = functions
469
469
  * contributed to every selected ceremony circuits (= DONE).
470
470
  */
471
471
  export const checkAndPrepareCoordinatorForFinalization = functions
472
- .region('europe-west1')
472
+ .region("europe-west1")
473
473
  .runWith({
474
474
  memory: "512MB"
475
475
  })
@@ -20,7 +20,7 @@ import {
20
20
  ParticipantContributionStep,
21
21
  formatZkeyIndex,
22
22
  getZkeyStorageFilePath
23
- } from "@p0tion/actions"
23
+ } from "@devtion/actions"
24
24
  import { getCeremonyCircuits, getDocumentById } from "../lib/utils"
25
25
  import { COMMON_ERRORS, logAndThrowError, makeError, printLog, SPECIFIC_ERRORS } from "../lib/errors"
26
26
  import { LogLevel } from "../types/enums"
@@ -193,8 +193,10 @@ export const createBucket = functions
193
193
  CORSConfiguration: {
194
194
  CORSRules: [
195
195
  {
196
- AllowedMethods: ["GET"],
197
- AllowedOrigins: ["*"]
196
+ AllowedMethods: ["GET", "PUT"],
197
+ AllowedOrigins: ["*"],
198
+ ExposeHeaders: ["ETag", "Content-Length"],
199
+ AllowedHeaders: ["*"]
198
200
  }
199
201
  ]
200
202
  }
@@ -407,7 +409,8 @@ export const startMultiPartUpload = functions
407
409
  export const generatePreSignedUrlsParts = functions
408
410
  .region("europe-west1")
409
411
  .runWith({
410
- memory: "512MB"
412
+ memory: "512MB",
413
+ timeoutSeconds: 300
411
414
  })
412
415
  .https.onCall(
413
416
  async (
@@ -9,7 +9,7 @@ import {
9
9
  ParticipantStatus,
10
10
  getTimeoutsCollectionPath,
11
11
  commonTerms
12
- } from "@p0tion/actions"
12
+ } from "@devtion/actions"
13
13
  import {
14
14
  getCeremonyCircuits,
15
15
  getCurrentServerTimestampInMillis,
@@ -174,7 +174,7 @@ export const checkAndRemoveBlockingContributor = functions
174
174
  const batch = firestore.batch()
175
175
 
176
176
  // Remove current contributor from waiting queue.
177
- contributors.shift(1)
177
+ contributors.shift()
178
178
 
179
179
  // Check if someone else is ready to start the contribution.
180
180
  if (contributors.length > 0) {
@@ -281,7 +281,8 @@ export const resumeContributionAfterTimeoutExpiration = functions
281
281
  if (status === ParticipantStatus.EXHUMED)
282
282
  await participantDoc.ref.update({
283
283
  status: ParticipantStatus.READY,
284
- lastUpdated: getCurrentServerTimestampInMillis()
284
+ lastUpdated: getCurrentServerTimestampInMillis(),
285
+ tempContributionData: {}
285
286
  })
286
287
  else logAndThrowError(SPECIFIC_ERRORS.SE_CONTRIBUTE_CANNOT_PROGRESS_TO_NEXT_CIRCUIT)
287
288