From 4750599a840828ff4d8093ea97664795fa37bf4f Mon Sep 17 00:00:00 2001 From: Izaak Meckler Date: Fri, 3 Jun 2022 12:18:30 -0700 Subject: [PATCH 01/15] expgose add_lagrange_basis function on srs --- .../stubs/binding_generation/src/main.rs | 2 ++ .../crypto/kimchi_bindings/stubs/kimchi_bindings.ml | 6 ++++++ src/lib/crypto/kimchi_bindings/stubs/src/srs.rs | 12 ++++++++++++ src/lib/crypto/kimchi_bindings/wasm/src/srs.rs | 11 +++++++++++ 4 files changed, 31 insertions(+) diff --git a/src/lib/crypto/kimchi_bindings/stubs/binding_generation/src/main.rs b/src/lib/crypto/kimchi_bindings/stubs/binding_generation/src/main.rs index 7b4792b87a9..ad05dcc8d47 100644 --- a/src/lib/crypto/kimchi_bindings/stubs/binding_generation/src/main.rs +++ b/src/lib/crypto/kimchi_bindings/stubs/binding_generation/src/main.rs @@ -334,6 +334,7 @@ fn generate_kimchi_bindings(mut w: impl std::io::Write, env: &mut Env) { decl_func!(w, env, caml_fp_srs_write => "write"); decl_func!(w, env, caml_fp_srs_read => "read"); decl_func!(w, env, caml_fp_srs_lagrange_commitment => "lagrange_commitment"); + decl_func!(w, env, caml_fp_srs_add_lagrange_basis=> "add_lagrange_basis"); decl_func!(w, env, caml_fp_srs_commit_evaluations => "commit_evaluations"); decl_func!(w, env, caml_fp_srs_b_poly_commitment => "b_poly_commitment"); decl_func!(w, env, caml_fp_srs_batch_accumulator_check => "batch_accumulator_check"); @@ -347,6 +348,7 @@ fn generate_kimchi_bindings(mut w: impl std::io::Write, env: &mut Env) { decl_func!(w, env, caml_fq_srs_write => "write"); decl_func!(w, env, caml_fq_srs_read => "read"); decl_func!(w, env, caml_fq_srs_lagrange_commitment => "lagrange_commitment"); + decl_func!(w, env, caml_fq_srs_add_lagrange_basis=> "add_lagrange_basis"); decl_func!(w, env, caml_fq_srs_commit_evaluations => "commit_evaluations"); decl_func!(w, env, caml_fq_srs_b_poly_commitment => "b_poly_commitment"); decl_func!(w, env, caml_fq_srs_batch_accumulator_check => "batch_accumulator_check"); diff --git a/src/lib/crypto/kimchi_bindings/stubs/kimchi_bindings.ml b/src/lib/crypto/kimchi_bindings/stubs/kimchi_bindings.ml index 28b497c0009..f2e1daf5530 100644 --- a/src/lib/crypto/kimchi_bindings/stubs/kimchi_bindings.ml +++ b/src/lib/crypto/kimchi_bindings/stubs/kimchi_bindings.ml @@ -105,6 +105,9 @@ module Protocol = struct -> Pasta_bindings.Fq.t Kimchi_types.or_infinity Kimchi_types.poly_comm = "caml_fp_srs_lagrange_commitment" + external add_lagrange_basis : t -> int -> unit + = "caml_fp_srs_add_lagrange_basis" + external commit_evaluations : t -> int @@ -144,6 +147,9 @@ module Protocol = struct -> Pasta_bindings.Fp.t Kimchi_types.or_infinity Kimchi_types.poly_comm = "caml_fq_srs_lagrange_commitment" + external add_lagrange_basis : t -> int -> unit + = "caml_fq_srs_add_lagrange_basis" + external commit_evaluations : t -> int diff --git a/src/lib/crypto/kimchi_bindings/stubs/src/srs.rs b/src/lib/crypto/kimchi_bindings/stubs/src/srs.rs index 33d5c48efce..df66351e922 100644 --- a/src/lib/crypto/kimchi_bindings/stubs/src/srs.rs +++ b/src/lib/crypto/kimchi_bindings/stubs/src/srs.rs @@ -94,6 +94,18 @@ macro_rules! impl_srs { Ok(srs.commit_non_hiding(&p, None).into()) } + #[ocaml_gen::func] + #[ocaml::func] + pub fn [<$name:snake _add_lagrange_basis>]( + srs: $name, + log2_size: ocaml::Int, + ) { + let ptr: &mut commitment_dlog::srs::SRS = + unsafe { &mut *(std::sync::Arc::as_ptr(&srs) as *mut _) }; + let domain = EvaluationDomain::<$F>::new(1 << (log2_size as usize)).expect("invalid domain size"); + ptr.add_lagrange_basis(domain); + } + #[ocaml_gen::func] #[ocaml::func] pub fn [<$name:snake _commit_evaluations>]( diff --git a/src/lib/crypto/kimchi_bindings/wasm/src/srs.rs b/src/lib/crypto/kimchi_bindings/wasm/src/srs.rs index 28ab76f3011..5886380e67a 100644 --- a/src/lib/crypto/kimchi_bindings/wasm/src/srs.rs +++ b/src/lib/crypto/kimchi_bindings/wasm/src/srs.rs @@ -73,6 +73,17 @@ macro_rules! impl_srs { Arc::new(SRS::create(depth as usize)).into() } + #[wasm_bindgen] + pub fn [<$name:snake _add_lagrange_basis>]( + srs: &[], + log2_size: i32, + ) { + let ptr: &mut commitment_dlog::srs::SRS<$G> = + unsafe { &mut *(std::sync::Arc::as_ptr(&srs) as *mut _) }; + let domain = EvaluationDomain::<$F>::new(1 << (log2_size as usize)).expect("invalid domain size"); + ptr.add_lagrange_basis(domain); + } + #[wasm_bindgen] pub fn [<$name:snake _write>]( append: Option, From 6470bac3e1c67170346b4ef66e54d2b9649a03e2 Mon Sep 17 00:00:00 2001 From: Izaak Meckler Date: Fri, 3 Jun 2022 12:20:34 -0700 Subject: [PATCH 02/15] separate out proofs_verified --- .../pickles/composition_types/branch_data.ml | 54 +------- .../pickles/composition_types/branch_data.mli | 21 +-- src/lib/pickles_base/proofs_verified.ml | 126 ++++++++++++++++++ 3 files changed, 135 insertions(+), 66 deletions(-) create mode 100644 src/lib/pickles_base/proofs_verified.ml diff --git a/src/lib/pickles/composition_types/branch_data.ml b/src/lib/pickles/composition_types/branch_data.ml index befbab43e75..3f0bcbbaf7d 100644 --- a/src/lib/pickles/composition_types/branch_data.ml +++ b/src/lib/pickles/composition_types/branch_data.ml @@ -4,46 +4,7 @@ open Pickles_types (** Data specific to a branch of a proof-system that's necessary for finalizing the deferred-values in a wrap proof of that branch. *) -(** Inside the circuit, we will represent a value of this type - as a sequence of 2 bits: - 00: N0 - 10: N1 - 11: N2 *) -module Proofs_verified = struct - [%%versioned - module Stable = struct - module V1 = struct - type t = N0 | N1 | N2 - [@@deriving sexp, sexp, compare, yojson, hash, equal] - - let to_latest = Fn.id - end - end] - - module Checked = struct - type 'f boolean = 'f Snarky_backendless.Cvar.t Snarky_backendless.Boolean.t - - type 'f t = ('f boolean, Nat.N2.n) Vector.t - end - - let to_mask : t -> (bool, Nat.N2.n) Vector.t = function - | N0 -> - [ false; false ] - | N1 -> - [ true; false ] - | N2 -> - [ true; true ] - - let of_mask_exn : (bool, Nat.N2.n) Vector.t -> t = function - | [ false; false ] -> - N0 - | [ true; false ] -> - N1 - | [ true; true ] -> - N2 - | [ false; true ] -> - failwith "Invalid mask" -end +module Proofs_verified = Pickles_base.Proofs_verified module Domain_log2 = struct [%%versioned @@ -98,14 +59,15 @@ let pack (type f) (* shift domain_log2 over by 2 bits (multiply by 4) *) times4 domain_log2 + project - (Pickles_types.Vector.to_list (Proofs_verified.to_mask proofs_verified)) + (Pickles_types.Vector.to_list + (Proofs_verified.Prefix_mask.there proofs_verified) ) let unpack (type f) (module Impl : Snarky_backendless.Snark_intf.Run with type field = f) (x : f) : t = match Impl.Field.Constant.unpack x with | x0 :: x1 :: y0 :: y1 :: y2 :: y3 :: y4 :: y5 :: y6 :: y7 :: _ -> - { proofs_verified = Proofs_verified.of_mask_exn [ x0; x1 ] + { proofs_verified = Proofs_verified.Prefix_mask.back [ x0; x1 ] ; domain_log2 = Domain_log2.of_bits_msb [ y7; y6; y5; y4; y3; y2; y1; y0 ] } | _ -> @@ -113,7 +75,7 @@ let unpack (type f) module Checked = struct type 'f t = - { proofs_verified_mask : 'f Proofs_verified.Checked.t + { proofs_verified_mask : 'f Proofs_verified.Prefix_mask.Checked.t ; domain_log2 : 'f Snarky_backendless.Cvar.t } [@@deriving hlist] @@ -141,10 +103,8 @@ let typ (type f) (assert_16_bits : Impl.Field.t -> unit) : (f Checked.t, t) Impl.Typ.t = let open Impl in let proofs_verified_mask : - (f Proofs_verified.Checked.t, Proofs_verified.t) Typ.t = - Typ.transport - (Vector.typ Boolean.typ Nat.N2.n) - ~there:Proofs_verified.to_mask ~back:Proofs_verified.of_mask_exn + (f Proofs_verified.Prefix_mask.Checked.t, Proofs_verified.t) Typ.t = + Proofs_verified.Prefix_mask.typ (module Impl) in let domain_log2 : (Field.t, Domain_log2.t) Typ.t = let (Typ t) = diff --git a/src/lib/pickles/composition_types/branch_data.mli b/src/lib/pickles/composition_types/branch_data.mli index db377665f4c..2e5a530f578 100644 --- a/src/lib/pickles/composition_types/branch_data.mli +++ b/src/lib/pickles/composition_types/branch_data.mli @@ -1,22 +1,5 @@ open Core_kernel - -module Proofs_verified : sig - [%%versioned: - module Stable : sig - module V1 : sig - type t = N0 | N1 | N2 - [@@deriving sexp, sexp, compare, yojson, hash, equal] - end - end] - - module Checked : sig - type 'f boolean = 'f Snarky_backendless.Cvar.t Snarky_backendless.Boolean.t - - open Pickles_types - - type 'f t = ('f boolean, Nat.N2.n) Vector.t - end -end +module Proofs_verified = Pickles_base.Proofs_verified module Domain_log2 : sig [%%versioned: @@ -42,7 +25,7 @@ end] module Checked : sig type 'f t = - { proofs_verified_mask : 'f Proofs_verified.Checked.t + { proofs_verified_mask : 'f Proofs_verified.Prefix_mask.Checked.t ; domain_log2 : 'f Snarky_backendless.Cvar.t } diff --git a/src/lib/pickles_base/proofs_verified.ml b/src/lib/pickles_base/proofs_verified.ml new file mode 100644 index 00000000000..bdfa1823c4e --- /dev/null +++ b/src/lib/pickles_base/proofs_verified.ml @@ -0,0 +1,126 @@ +open Core_kernel +open Pickles_types + +[%%versioned +module Stable = struct + module V1 = struct + type t = N0 | N1 | N2 + [@@deriving sexp, sexp, compare, yojson, hash, equal] + + let to_latest = Fn.id + end +end] + +let to_int : t -> int = function N0 -> 0 | N1 -> 1 | N2 -> 2 + +(** Inside the circuit, we use two different representations for this type, + depending on what we need it for. + + Sometimes, we use it for masking out a list of 2 points by taking the + a prefix of length 0, 1, or 2. In this setting, we we will represent a value + of this type as a sequence of 2 bits like so: + 00: N0 + 10: N1 + 11: N2 + + We call this a **prefix mask**. + + Sometimes, we use it to select something from a list of 3 values. In this + case, we will represent a value of this type as a sequence of 3 bits like so: + + 100: N0 + 010: N1 + 001: N2 + + We call this a **one-hot vector** as elsewhere. +*) + +type proofs_verified = t + +let of_nat (type n) (n : n Nat.t) : t = + match n with + | Z -> + N0 + | S Z -> + N1 + | S (S Z) -> + N2 + | _ -> + failwithf "Proofs_verified.of_nat: got %d" (Nat.to_int n) () + +type 'f boolean = 'f Snarky_backendless.Cvar.t Snarky_backendless.Boolean.t + +module Prefix_mask = struct + module Checked = struct + type 'f t = ('f boolean, Nat.N2.n) Vector.t + end + + let there : proofs_verified -> (bool, Nat.N2.n) Vector.t = function + | N0 -> + [ false; false ] + | N1 -> + [ true; false ] + | N2 -> + [ true; true ] + + let back : (bool, Nat.N2.n) Vector.t -> proofs_verified = function + | [ false; false ] -> + N0 + | [ true; false ] -> + N1 + | [ true; true ] -> + N2 + | [ false; true ] -> + failwith "Invalid mask" + + let create = there + + let typ (type f) + (module Impl : Snarky_backendless.Snark_intf.Run with type field = f) : + (f Checked.t, proofs_verified) Impl.Typ.t = + let open Impl in + Typ.transport (Vector.typ Boolean.typ Nat.N2.n) ~there ~back +end + +module One_hot = struct + module Checked = struct + type 'f t = ('f, Nat.N3.n) One_hot_vector.t + + let to_input (type f) (t : f t) = + Random_oracle_input.Chunked.packeds + (Array.map + (Vector.to_array (t :> (f boolean, Nat.N3.n) Vector.t)) + ~f:(fun b -> ((b :> f Snarky_backendless.Cvar.t), 1)) ) + end + + let there : proofs_verified -> int = function N0 -> 0 | N1 -> 1 | N2 -> 2 + + let back : int -> proofs_verified = function + | 0 -> + N0 + | 1 -> + N1 + | 2 -> + N2 + | _ -> + failwith "Invalid mask" + + let to_input ~zero ~one (type f) (t : t) = + let one_hot = + match t with + | N0 -> + [| one; zero; zero |] + | N1 -> + [| zero; one; zero |] + | N2 -> + [| zero; zero; one |] + in + Random_oracle_input.Chunked.packeds (Array.map one_hot ~f:(fun b -> (b, 1))) + + let typ (type f) + (module Impl : Snarky_backendless.Snark_intf.Run with type field = f) : + (f Checked.t, proofs_verified) Impl.Typ.t = + let module M = One_hot_vector.Make (Impl) in + let open Impl in + Typ.transport (M.typ Nat.N3.n) ~there ~back +end From 0675d0e7531c4329682ac37bccea12694993831b Mon Sep 17 00:00:00 2001 From: Izaak Meckler Date: Fri, 3 Jun 2022 12:20:57 -0700 Subject: [PATCH 03/15] add convenience functions to vector --- src/lib/pickles_types/vector.ml | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/src/lib/pickles_types/vector.ml b/src/lib/pickles_types/vector.ml index 45027c65bc6..af079c4151a 100644 --- a/src/lib/pickles_types/vector.ml +++ b/src/lib/pickles_types/vector.ml @@ -15,6 +15,10 @@ end include T +let hd (type a n) (t : (a, n s) t) : a = match t with x :: _ -> x + +let unsingleton (type a) ([ x ] : (a, z s) t) : a = x + let rec iter : type a n. (a, n) t -> f:(a -> unit) -> unit = fun t ~f -> match t with [] -> () | x :: xs -> f x ; iter xs ~f From af720707aa7f998d5186719368cc7b5bac3e9b50 Mon Sep 17 00:00:00 2001 From: Izaak Meckler Date: Fri, 3 Jun 2022 12:21:42 -0700 Subject: [PATCH 04/15] replace max_width field with max_proofs_verified --- src/lib/pickles_base/dune | 1 + .../pickles_base/side_loaded_verification_key.ml | 14 +++++++------- 2 files changed, 8 insertions(+), 7 deletions(-) diff --git a/src/lib/pickles_base/dune b/src/lib/pickles_base/dune index 1ab6335a75e..a142c81e5e2 100644 --- a/src/lib/pickles_base/dune +++ b/src/lib/pickles_base/dune @@ -18,4 +18,5 @@ snarky.backendless random_oracle_input pickles_types + pickles.one_hot_vector )) diff --git a/src/lib/pickles_base/side_loaded_verification_key.ml b/src/lib/pickles_base/side_loaded_verification_key.ml index 9f7cb15dd06..b894a8a9d3f 100644 --- a/src/lib/pickles_base/side_loaded_verification_key.ml +++ b/src/lib/pickles_base/side_loaded_verification_key.ml @@ -148,7 +148,7 @@ module Repr = struct module Stable = struct module V2 = struct type 'g t = - { max_width : Width.Stable.V1.t + { max_proofs_verified : Proofs_verified.Stable.V1.t ; wrap_index : 'g Plonk_verification_key_evals.Stable.V2.t } [@@deriving sexp, equal, compare, yojson] @@ -162,8 +162,8 @@ module Poly = struct [%%versioned module Stable = struct module V2 = struct - type ('g, 'vk) t = - { max_width : Width.Stable.V1.t + type ('g, 'proofs_verified, 'vk) t = + { max_proofs_verified : 'proofs_verified ; wrap_index : 'g Plonk_verification_key_evals.Stable.V2.t ; wrap_vk : 'vk option } @@ -191,12 +191,12 @@ let wrap_index_to_input (type gs f) (g : gs -> f array) t = let width_size = Nat.to_int Width.Length.n let to_input (type a) ~(field_of_int : int -> a) : - (a * a, _) Poly.t -> a Random_oracle_input.Chunked.t = + (a * a, _, _) Poly.t -> a Random_oracle_input.Chunked.t = let open Random_oracle_input.Chunked in - fun { max_width; wrap_index } : _ Random_oracle_input.Chunked.t -> - let width w = (field_of_int (Width.to_int w), width_size) in + fun { max_proofs_verified; wrap_index } : _ Random_oracle_input.Chunked.t -> List.reduce_exn ~f:append - [ packed (width max_width) + [ Proofs_verified.One_hot.to_input ~zero:(field_of_int 0) + ~one:(field_of_int 1) max_proofs_verified ; wrap_index_to_input (Fn.compose Array.of_list (fun (x, y) -> [ x; y ])) wrap_index From 84ebb3981d45073ae0c992853c11ff2165ec2b37 Mon Sep 17 00:00:00 2001 From: Izaak Meckler Date: Fri, 3 Jun 2022 12:22:14 -0700 Subject: [PATCH 05/15] expose one_hot_vector type outside functor --- src/lib/pickles/one_hot_vector/one_hot_vector.ml | 9 ++++++--- src/lib/pickles/one_hot_vector/one_hot_vector.mli | 6 +++++- 2 files changed, 11 insertions(+), 4 deletions(-) diff --git a/src/lib/pickles/one_hot_vector/one_hot_vector.ml b/src/lib/pickles/one_hot_vector/one_hot_vector.ml index 08f77674fd0..fc902fb0e83 100644 --- a/src/lib/pickles/one_hot_vector/one_hot_vector.ml +++ b/src/lib/pickles/one_hot_vector/one_hot_vector.ml @@ -5,10 +5,13 @@ module Constant = struct type t = int end +(* TODO: Optimization(?) Have this have length n - 1 since the last one is + determined by the remaining ones. *) +type ('f, 'n) t = + ('f Snarky_backendless.Cvar.t Snarky_backendless.Boolean.t, 'n) Vector.t + module T (Impl : Snarky_backendless.Snark_intf.Run) = struct - (* TODO: Optimization. Have this have length n - 1 since the last one is - determined by the remaining ones. *) - type 'n t = (Impl.Boolean.var, 'n) Vector.t + type nonrec 'n t = (Impl.field, 'n) t end module Make (Impl : Snarky_backendless.Snark_intf.Run) = struct diff --git a/src/lib/pickles/one_hot_vector/one_hot_vector.mli b/src/lib/pickles/one_hot_vector/one_hot_vector.mli index 50d558f2e25..7591d259399 100644 --- a/src/lib/pickles/one_hot_vector/one_hot_vector.mli +++ b/src/lib/pickles/one_hot_vector/one_hot_vector.mli @@ -4,8 +4,12 @@ module Constant : sig type t = int end +type ('f, 'n) t = + private + ('f Snarky_backendless.Cvar.t Snarky_backendless.Boolean.t, 'n) Vector.t + module T (Impl : Snarky_backendless.Snark_intf.Run) : sig - type 'n t = private (Impl.Boolean.var, 'n) Vector.t + type nonrec 'n t = (Impl.field, 'n) t end module Make (Impl : Snarky_backendless.Snark_intf.Run) : sig From 7458cf711a9a218c72f988d38db0f8c974bd7f9a Mon Sep 17 00:00:00 2001 From: Izaak Meckler Date: Fri, 3 Jun 2022 12:22:40 -0700 Subject: [PATCH 06/15] update side loaded verification key --- .../pickles/side_loaded_verification_key.ml | 45 ++++++++++++------- 1 file changed, 29 insertions(+), 16 deletions(-) diff --git a/src/lib/pickles/side_loaded_verification_key.ml b/src/lib/pickles/side_loaded_verification_key.ml index b9d6c0ca510..96d0cd04ac4 100644 --- a/src/lib/pickles/side_loaded_verification_key.ml +++ b/src/lib/pickles/side_loaded_verification_key.ml @@ -178,7 +178,11 @@ end module Stable = struct module V2 = struct module T = struct - type t = (Backend.Tock.Curve.Affine.t, Vk.t) Poly.Stable.V2.t + type t = + ( Backend.Tock.Curve.Affine.t + , Pickles_base.Proofs_verified.Stable.V1.t + , Vk.t ) + Poly.Stable.V2.t [@@deriving hash] let to_latest = Fn.id @@ -187,13 +191,17 @@ module Stable = struct let version_byte = Base58_check.Version_bytes.verification_key - let to_repr { Poly.max_width; wrap_index; wrap_vk = _ } = - { Repr.Stable.V2.max_width; wrap_index } + let to_repr { Poly.max_proofs_verified; wrap_index; wrap_vk = _ } = + { Repr.Stable.V2.max_proofs_verified; wrap_index } - let of_repr ({ Repr.Stable.V2.max_width; wrap_index = c } : R.Stable.V2.t) - : t = + let of_repr + ({ Repr.Stable.V2.max_proofs_verified; wrap_index = c } : + R.Stable.V2.t ) : t = let d = - (Common.wrap_domains ~proofs_verified:(Width.to_int max_width)).h + (Common.wrap_domains + ~proofs_verified: + (Pickles_base.Proofs_verified.to_int max_proofs_verified) ) + .h in let log2_size = Import.Domain.log2_size d in let max_quot_size = Common.max_quot_size_int (Import.Domain.size d) in @@ -231,7 +239,7 @@ module Stable = struct ; lookup_index = None } ) in - { Poly.max_width; wrap_index = c; wrap_vk } + { Poly.max_proofs_verified; wrap_index = c; wrap_vk } (* Proxy derivers to [R.t]'s, ignoring [wrap_vk] *) @@ -277,7 +285,7 @@ Stable.Latest. , compare )] let dummy : t = - { max_width = Width.zero + { max_proofs_verified = N2 ; wrap_index = (let g = Backend.Tock.Curve.(to_affine_exn one) in { sigma_comm = Vector.init Plonk_types.Permuts.n ~f:(fun _ -> g) @@ -297,8 +305,8 @@ module Checked = struct open Impl type t = - { (* TODO: Not sure this is used *) - max_width : Width.Checked.t + { max_proofs_verified : + Impl.field Pickles_base.Proofs_verified.One_hot.Checked.t (** The maximum of all of the [step_widths]. *) ; wrap_index : Inner_curve.t Plonk_verification_key_evals.t (** The plonk verification key for the 'wrapping' proof that this key @@ -312,10 +320,13 @@ module Checked = struct let to_input = let open Random_oracle_input.Chunked in - fun { max_width; wrap_index } : _ Random_oracle_input.Chunked.t -> - let width w = (Width.Checked.to_field w, width_size) in + fun { max_proofs_verified; wrap_index } : _ Random_oracle_input.Chunked.t -> + let max_proofs_verified = + Pickles_base.Proofs_verified.One_hot.Checked.to_input + max_proofs_verified + in List.reduce_exn ~f:append - [ packed (width max_width) + [ max_proofs_verified ; wrap_index_to_input (Fn.compose Array.of_list Inner_curve.to_field_elements) wrap_index @@ -339,9 +350,11 @@ let typ : (Checked.t, t) Impls.Step.Typ.t = let open Step_main_inputs in let open Impl in Typ.of_hlistable - [ Width.typ; Plonk_verification_key_evals.typ Inner_curve.typ ] + [ Pickles_base.Proofs_verified.One_hot.typ (module Impls.Step) + ; Plonk_verification_key_evals.typ Inner_curve.typ + ] ~var_to_hlist:Checked.to_hlist ~var_of_hlist:Checked.of_hlist ~value_of_hlist:(fun _ -> failwith "Side_loaded_verification_key: value_of_hlist" ) - ~value_to_hlist:(fun { Poly.wrap_index; max_width; _ } -> - [ max_width; wrap_index ] ) + ~value_to_hlist:(fun { Poly.wrap_index; max_proofs_verified; _ } -> + [ max_proofs_verified; wrap_index ] ) From eb9f88b910d1523a4b992fe1a5d0e698f1653aa9 Mon Sep 17 00:00:00 2001 From: Izaak Meckler Date: Fri, 3 Jun 2022 12:23:20 -0700 Subject: [PATCH 07/15] make domain dynamic for public input commitment for circuit for verifying wrap proofs --- src/lib/pickles/step_verifier.ml | 153 +++++++++++++++++++++++++++---- 1 file changed, 133 insertions(+), 20 deletions(-) diff --git a/src/lib/pickles/step_verifier.ml b/src/lib/pickles/step_verifier.ml index b459f43b4bb..0fa812eb116 100644 --- a/src/lib/pickles/step_verifier.ml +++ b/src/lib/pickles/step_verifier.ml @@ -107,25 +107,27 @@ struct let ( + ) = Ops.add_fast end + module Public_input_scalar = struct + type t = Field.t + + let typ = Field.typ + + module Constant = struct + include Field.Constant + + let to_bigint = Impl.Bigint.of_field + end + end + let multiscale_known (ts : ( [ `Field of Field.t | `Packed_bits of Field.t * int ] * Inner_curve.Constant.t ) array ) = + let module F = Public_input_scalar in let rec pow2pow x i = if i = 0 then x else pow2pow Inner_curve.Constant.(x + x) (i - 1) in - let module F = struct - type t = Field.t - - let typ = Field.typ - - module Constant = struct - include Field.Constant - - let to_bigint = Impl.Bigint.of_field - end - end in with_label __LOC__ (fun () -> let correction, acc = Array.mapi ts ~f:(fun i (s, x) -> @@ -339,9 +341,108 @@ struct | _ -> assert false + module O = One_hot_vector.Make (Impl) + open Tuple_lib + + let public_input_commitment_dynamic (type n) (which : n O.t) + (domains : (Domains.t, n) Vector.t) ~public_input = + (* + let domains : (Domains.t, Nat.N3.n) Vector.t = + Vector.map ~f:(fun proofs_verified -> Common.wrap_domains ~proofs_verified) + [ 0; 1 ; 2 ] + in *) + let precomputations = Precomputed.Lagrange_precomputations.pallas in + let lagrange_commitment (d : Domains.t) (i : int) : Inner_curve.Constant.t = + let d = + Precomputed.Lagrange_precomputations.index_of_domain_log2 + (Domain.log2_size d.h) + in + match precomputations.(d).(i) with + | [| g |] -> + Inner_curve.Constant.of_affine g + | _ -> + assert false + in + let select_curve_points (type k) + ~(points_for_domain : Domains.t -> (Inner_curve.Constant.t, k) Vector.t) + : (Inner_curve.t, k) Vector.t = + match domains with + | [] -> + assert false + | d :: ds -> + if Vector.for_all ds ~f:(fun d' -> Domain.equal d.h d'.h) then + Vector.map ~f:Inner_curve.constant (points_for_domain d) + else + Vector.map2 + (which :> (Boolean.var, n) Vector.t) + domains + ~f:(fun b d -> + let points = points_for_domain d in + Vector.map points ~f:(fun g -> + let x, y = Inner_curve.constant g in + Field.((b :> t) * x, (b :> t) * y) ) ) + |> Vector.reduce_exn + ~f:(Vector.map2 ~f:(Double.map2 ~f:Field.( + ))) + |> Vector.map ~f:(Double.map ~f:(Util.seal (module Impl))) + in + let lagrange i = + select_curve_points ~points_for_domain:(fun d -> + [ lagrange_commitment d i ] ) + |> Vector.unsingleton + in + let lagrange_with_correction (type n) ~input_length i : + (Inner_curve.t, Nat.N2.n) Vector.t = + let actual_shift = + (* TODO: num_bits should maybe be input_length - 1. *) + Ops.bits_per_chunk * Ops.chunks_needed ~num_bits:input_length + in + let rec pow2pow x i = + if i = 0 then x else pow2pow Inner_curve.Constant.(x + x) (i - 1) + in + select_curve_points ~points_for_domain:(fun d -> + let g = lagrange_commitment d i in + let open Inner_curve.Constant in + [ g; negate (pow2pow g actual_shift) ] ) + in + let x_hat = + let terms = + Array.mapi public_input ~f:(fun i x -> + match x with + | b, 1 -> + assert_ (Constraint.boolean (b :> Field.t)) ; + `Cond_add (Boolean.Unsafe.of_cvar b, lagrange i) + | x, n -> + `Add_with_correction + ((x, n), lagrange_with_correction ~input_length:n i) ) + in + let correction = + Array.reduce_exn + (Array.filter_map terms ~f:(function + | `Cond_add _ -> + None + | `Add_with_correction (_, [ _; corr ]) -> + Some corr ) ) + ~f:Ops.add_fast + in + Array.foldi terms ~init:correction ~f:(fun i acc term -> + match term with + | `Cond_add (b, g) -> + with_label __LOC__ (fun () -> + Inner_curve.if_ b ~then_:(Ops.add_fast g acc) ~else_:acc ) + | `Add_with_correction ((x, num_bits), [ g; _ ]) -> + Ops.add_fast acc + (Ops.scale_fast2' (module Public_input_scalar) g x ~num_bits) ) + |> Inner_curve.negate + in + x_hat + let incrementally_verify_proof (type b) - (module Proofs_verified : Nat.Add.Intf with type n = b) ~domain - ~verification_key:(m : _ Plonk_verification_key_evals.t) ~xi ~sponge + (module Proofs_verified : Nat.Add.Intf with type n = b) + ~(domain : + [ `Known of Domain.t + | `Side_loaded of + _ Composition_types.Branch_data.Proofs_verified.One_hot.Checked.t ] + ) ~verification_key:(m : _ Plonk_verification_key_evals.t) ~xi ~sponge ~(public_input : [ `Field of Field.t | `Packed_bits of Field.t * int ] array ) ~(sg_old : (_, Proofs_verified.n) Vector.t) ~advice @@ -362,10 +463,24 @@ struct let open Plonk_types.Messages in let x_hat = with_label "x_hat" (fun () -> - multiscale_known - (Array.mapi public_input ~f:(fun i x -> - (x, lagrange_commitment ~domain i) ) ) - |> Inner_curve.negate ) + match domain with + | `Known domain -> + multiscale_known + (Array.mapi public_input ~f:(fun i x -> + (x, lagrange_commitment ~domain i) ) ) + |> Inner_curve.negate + | `Side_loaded which -> + public_input_commitment_dynamic which + (Vector.map + ~f:(fun proofs_verified -> + Common.wrap_domains ~proofs_verified ) + [ 0; 1; 2 ] ) + ~public_input: + (Array.map public_input ~f:(function + | `Field x -> + (x, Public_input_scalar.Constant.size_in_bits) + | `Packed_bits (b, n) -> + (b, n) ) ) ) in let without = Type.Without_degree_bound in let absorb_g gs = absorb sponge without gs in @@ -487,8 +602,6 @@ struct let domain_generator ~log2_size = Backend.Tick.Field.domain_generator ~log2_size |> Impl.Field.constant - module O = One_hot_vector.Make (Impl) - let side_loaded_domain (type branches) = let open Side_loaded_verification_key in fun ~(log2_size : Field.t) -> @@ -700,7 +813,7 @@ struct (* TODO: This needs to handle the fact of variable length evaluations. Meaning it needs opt sponge. *) let finalize_other_proof (type b branches) - (module Proofs_verified : Nat.Add.Intf with type n = b) ~max_width + (module Proofs_verified : Nat.Add.Intf with type n = b) ~(step_domains : [ `Known of (Domains.t, branches) Vector.t | `Side_loaded ] ) ~(* TODO: Add "actual proofs verified" so that proofs don't From 1c377817f64557db28807c5b7a72b6128a385a21 Mon Sep 17 00:00:00 2001 From: Izaak Meckler Date: Fri, 3 Jun 2022 12:23:39 -0700 Subject: [PATCH 08/15] propagate change to rest of circuit --- src/lib/pickles/step_main.ml | 11 ++++------- 1 file changed, 4 insertions(+), 7 deletions(-) diff --git a/src/lib/pickles/step_main.ml b/src/lib/pickles/step_main.ml index 5a21c2e0fe0..cb46eb0554f 100644 --- a/src/lib/pickles/step_main.ml +++ b/src/lib/pickles/step_main.ml @@ -45,9 +45,8 @@ let verify_one sponge in (* TODO: Refactor args into an "unfinalized proof" struct *) - finalize_other_proof d.max_proofs_verified ~max_width:d.max_width - ~step_domains:d.step_domains ~sponge ~prev_challenges - proof_state.deferred_values prev_proof_evals ) + finalize_other_proof d.max_proofs_verified ~step_domains:d.step_domains + ~sponge ~prev_challenges proof_state.deferred_values prev_proof_evals ) in let branch_data = proof_state.deferred_values.branch_data in let statement = @@ -78,8 +77,7 @@ let verify_one in let verified = with_label __LOC__ (fun () -> - verify ~proofs_verified:d.max_proofs_verified - ~wrap_domain:d.wrap_domains.h + verify ~proofs_verified:d.max_proofs_verified ~wrap_domain:d.wrap_domain ~is_base_case:(Boolean.not should_verify) ~sg_old:prev_challenge_polynomial_commitments ~proof:wrap_proof ~wrap_verification_key:d.wrap_key statement unfinalized ) @@ -295,11 +293,10 @@ let step_main : `Known (Vector.map basic.proofs_verifieds ~f:Field.of_int) ; max_proofs_verified = (module Max_proofs_verified) - ; max_width = None ; typ = basic.typ ; var_to_field_elements = basic.var_to_field_elements ; value_to_field_elements = basic.value_to_field_elements - ; wrap_domains = basic.wrap_domains + ; wrap_domain = `Known basic.wrap_domains.h ; step_domains = `Known basic.step_domains ; wrap_key = dlog_plonk_index } From 64782d50a153f6531a88467a4073935ccb00bd23 Mon Sep 17 00:00:00 2001 From: Izaak Meckler Date: Fri, 3 Jun 2022 12:23:57 -0700 Subject: [PATCH 09/15] refactor branch_data --- src/lib/pickles/types_map.ml | 14 ++++++-------- 1 file changed, 6 insertions(+), 8 deletions(-) diff --git a/src/lib/pickles/types_map.ml b/src/lib/pickles/types_map.ml index 1177761cd39..5159f0a445a 100644 --- a/src/lib/pickles/types_map.ml +++ b/src/lib/pickles/types_map.ml @@ -152,9 +152,11 @@ module For_step = struct ; value_to_field_elements : 'a_value -> Tick.Field.t array ; var_to_field_elements : 'a_var -> Impls.Step.Field.t array ; wrap_key : inner_curve_var Plonk_verification_key_evals.t - ; wrap_domains : Domains.t + ; wrap_domain : + [ `Known of Domain.t + | `Side_loaded of + Impls.Step.field Pickles_base.Proofs_verified.One_hot.Checked.t ] ; step_domains : [ `Known of (Domains.t, 'branches) Vector.t | `Side_loaded ] - ; max_width : Side_loaded_verification_key.Width.Checked.t option } let of_side_loaded (type a b c d) @@ -183,11 +185,8 @@ module For_step = struct ; value_to_field_elements ; var_to_field_elements ; wrap_key = index.wrap_index - ; wrap_domains = - Common.wrap_domains - ~proofs_verified:(Nat.to_int (Nat.Add.n max_proofs_verified)) + ; wrap_domain = `Side_loaded index.max_proofs_verified ; step_domains = `Side_loaded - ; max_width = Some index.max_width } let of_compiled @@ -203,7 +202,6 @@ module For_step = struct } : _ Compiled.t ) = { branches - ; max_width = None ; max_proofs_verified ; proofs_verifieds = `Known (Vector.map proofs_verifieds ~f:Impls.Step.Field.of_int) @@ -213,7 +211,7 @@ module For_step = struct ; wrap_key = Plonk_verification_key_evals.map (Lazy.force wrap_key) ~f:Step_main_inputs.Inner_curve.constant - ; wrap_domains + ; wrap_domain = `Known wrap_domains.h ; step_domains = `Known step_domains } end From 40d2cee4c70b8b6c51d1c1ec95b7fd9ca2067810 Mon Sep 17 00:00:00 2001 From: Izaak Meckler Date: Fri, 3 Jun 2022 12:24:22 -0700 Subject: [PATCH 10/15] add side loaded verification unit test and precomputation for computing necessary lagrange bases --- src/lib/pickles/pickles.ml | 46 +++++++++++++++++++++++++++++++++++-- src/lib/pickles/pickles.mli | 2 ++ 2 files changed, 46 insertions(+), 2 deletions(-) diff --git a/src/lib/pickles/pickles.ml b/src/lib/pickles/pickles.ml index 452ac1ea945..bbc253ebb8e 100644 --- a/src/lib/pickles/pickles.ml +++ b/src/lib/pickles/pickles.ml @@ -818,8 +818,8 @@ module Side_loaded = struct let d = Types_map.lookup_compiled tag.Tag.id in { wrap_vk = Some (Lazy.force d.wrap_vk) ; wrap_index = Lazy.force d.wrap_key - ; max_width = - Width.of_int_exn (Nat.to_int (Nat.Add.n d.max_proofs_verified)) + ; max_proofs_verified = + Pickles_base.Proofs_verified.of_nat (Nat.Add.n d.max_proofs_verified) } module Max_width = Width.Max @@ -880,6 +880,12 @@ module Side_loaded = struct let verify ~value_to_field_elements ts = verify_promise ~value_to_field_elements ts |> Promise.to_deferred + + let srs_precomputation () : unit = + let srs = Tock.Keypair.load_urs () in + List.iter [ 0; 1; 2 ] ~f:(fun i -> + Kimchi_bindings.Protocol.SRS.Fq.add_lagrange_basis srs + (Domain.log2_size (Common.wrap_domains ~proofs_verified:i).h) ) end let compile_promise : @@ -994,6 +1000,42 @@ let%test_module "test no side-loaded" = let () = Tick.Keypair.set_urs_info [] + let%test_unit "test deserialization and verification for side-loaded keys" = + Side_loaded.srs_precomputation () ; + let pi = + match + "((statement((proof_state((deferred_values((plonk((alpha((inner(528cdbf16708a53a 1f90a7eea2e06f6a))))(beta(617e5a7fd6be366a de197122a4415175))(gamma(3ca35d4452181c99 10f08540ba61b0ec))(zeta((inner(9b9cb3eb89f99860 fc3f2a556b3da3b8))))))(combined_inner_product(Shifted_value 0x0823E56793B5592614ADBA4D0E5FE7182C36059EFA67B62FF348C298025ED3B1))(b(Shifted_value 0x15E6E583088F3839A0A24BA096058D311F80E63DC7C5F96961EDF0E8431B3A89))(xi((inner(5c78b5106dc9196b dd923608f3a2d7c7))))(bulletproof_challenges(((prechallenge((inner(0277f6aad9d835a5 d7ce644af1e0a623)))))((prechallenge((inner(7155c8ca270890a9 88210ef505d7463a)))))((prechallenge((inner(66dd09cf8c767ca8 49a1f3f0d02c27d1)))))((prechallenge((inner(b3af5b7fff77d3dd 7e3d53b2d699d210)))))((prechallenge((inner(1a7034722f39c680 dac0b920710a3baf)))))((prechallenge((inner(31a391963a1eda22 1768f963fda30dbd)))))((prechallenge((inner(ca6977bc2cd08f02 8cca080a3eea91de)))))((prechallenge((inner(ca1c4459c6db90e0 5dc97444224692b8)))))((prechallenge((inner(5a8691fe938d7766 ffa7b76d50545300)))))((prechallenge((inner(e28a6bd7885e2dce cffc710fd023fcf2)))))((prechallenge((inner(67c9cacdbec10152 dbbbb17446514cdc)))))((prechallenge((inner(b962690d4c6147fe 047ed2b6432ae9a8)))))((prechallenge((inner(247a3c026fd42a1f 30ffd3eb2e92f6e0)))))((prechallenge((inner(fb040a5f7ae1682a 67e88c03b46429fb)))))((prechallenge((inner(da7aaeb99142d490 e6df1ef2a27bd5dd)))))((prechallenge((inner(c9590ba2d65e774c 6513be976dbbd014)))))))(branch_data((proofs_verified N0)(domain_log2"\n")))))(sponge_digest_before_evaluations(345bca89a18be6eb 32b32bea9853ce51 e4b78bd09bbb68a5 0c6791fb08e0ca57))(me_only((challenge_polynomial_commitment(0x0F69B65A5855F3A398D0DFD0C131B9612C9F2061D2F06E676F612C48D827E1E6 0x0CCAF3F03F9D2C3C3D44E09A12106911FA699DF934F706E62131BAD639F30155))(old_bulletproof_challenges((((prechallenge((inner(3382b3c9ace6bf6f 79974358f9761863)))))((prechallenge((inner(dd3a2b06e9888797 dd7ae6402944a1c7)))))((prechallenge((inner(c6e8e530f49c9fcb 07ddbb65cda09cdd)))))((prechallenge((inner(532c59a287691a13 a921bcb02a656f7b)))))((prechallenge((inner(e29c77b18f10078b f85c5f00df6b0cee)))))((prechallenge((inner(1dbda72d07b09c87 4d1b97e2e95f26a0)))))((prechallenge((inner(9c75747c56805f11 a1fe6369facef1e8)))))((prechallenge((inner(5c2b8adfdbe9604d 5a8c718cf210f79b)))))((prechallenge((inner(22c0b35c51e06b48 a6888b7340a96ded)))))((prechallenge((inner(9007d7b55e76646e c1c68b39db4e8e12)))))((prechallenge((inner(4445e35e373f2bc9 9d40c715fc8ccde5)))))((prechallenge((inner(429882844bbcaa4e 97a927d7d0afb7bc)))))((prechallenge((inner(99ca3d5bfffd6e77 efe66a55155c4294)))))((prechallenge((inner(4b7db27121979954 951fa2e06193c840)))))((prechallenge((inner(2cd1ccbeb20747b3 5bd1de3cf264021d))))))(((prechallenge((inner(3382b3c9ace6bf6f 79974358f9761863)))))((prechallenge((inner(dd3a2b06e9888797 dd7ae6402944a1c7)))))((prechallenge((inner(c6e8e530f49c9fcb 07ddbb65cda09cdd)))))((prechallenge((inner(532c59a287691a13 a921bcb02a656f7b)))))((prechallenge((inner(e29c77b18f10078b f85c5f00df6b0cee)))))((prechallenge((inner(1dbda72d07b09c87 4d1b97e2e95f26a0)))))((prechallenge((inner(9c75747c56805f11 a1fe6369facef1e8)))))((prechallenge((inner(5c2b8adfdbe9604d 5a8c718cf210f79b)))))((prechallenge((inner(22c0b35c51e06b48 a6888b7340a96ded)))))((prechallenge((inner(9007d7b55e76646e c1c68b39db4e8e12)))))((prechallenge((inner(4445e35e373f2bc9 9d40c715fc8ccde5)))))((prechallenge((inner(429882844bbcaa4e 97a927d7d0afb7bc)))))((prechallenge((inner(99ca3d5bfffd6e77 efe66a55155c4294)))))((prechallenge((inner(4b7db27121979954 951fa2e06193c840)))))((prechallenge((inner(2cd1ccbeb20747b3 5bd1de3cf264021d))))))))))))(pass_through((app_state())(challenge_polynomial_commitments())(old_bulletproof_challenges())))))(prev_evals((evals(((public_input 0x1D5050ABC193FD8288FE8B09DA9A2AA8C4A95E796C33DFB712E8CCAD7367266A)(evals((w((0x2C33C173BDE9340BE941ECD209AB6E99ECA8BDCA1CA8BDA8DAC3E40C3315F696)(0x02AE92968344D1F59603BA015C29D7801897F6B59E5ED43A3BEE316D6A876C3B)(0x3D4FDD240284F096B0D9CE405C2016E7CAE49931D0571F27DA7A3DDB202FC437)(0x1D8A9A17ABDFF5975832B2EA4AEB94BADE6346A554EB24A51B3ECFF560D33748)(0x36F806F043D8F33F7FD89730FB69E5DAF323E8637D23D95694665AB1B29AD194)(0x21CE677E9416783DBA7310E2813D200104A0328DCA5CF2C0E632BFD719951CBD)(0x0A3464D5ABBDF1C1FA6C3CF5C5328CBED7D1402AD4990AF2D07CF6958700E079)(0x3067923AF93C85BC677715F78EFEE2B765F4712D92A18DD691B2D617245D2837)(0x1D75E1CCE4165FD19BBF1D834F0366E3330A916F252801ACC2A9FCCFE19BB03F)(0x29793C3D311353444C4FCF2BF62299893F69FCEF0ADF7345310DB7E736C21758)(0x3F90E2448CAB2639788EEF0EDBD4F87463082EAE0C52F710E0A57B4238577C09)(0x3E19E9E45C6CFCF0F7036D3A598E26BC4C250AB45049E19A81EF3F9C68E7B09E)(0x31CF2FC45C59E45E5B16A9FA357972AEF1F744388C81C886B28BDBC55815CE45)(0x24B310A418CB5815513DCC5B4DBF4B2C64BD94A2D4764294EEBDF4C7DE1B1B08)(0x3E748B8BF7F3F63235B650DB873BD652BC58DB1C67C94AF03B218DB58CA0EA86)))(z(0x3FA6741D84E11434D7918A459AD1B698B8F3616E2A901B3B17E9E0BA8C229A95))(s((0x2160285A788031C45B0E041C0C3E1322E1330C718B709999E677E4C82C1A8DEC)(0x2CC1EE1154F527B33A011A5F816AFC3C219892D0CC3A25501A90183A2221B847)(0x299366D7BDB50CD278BDB43FFCC1AF66CFD6C821203F980AC22A9E0178612FCC)(0x04204759E7D8E84C1122BCF65008ABAC017DE7DAE44B7E479D30773966EB6B0A)(0x08D5ABDB38CEEA6D50FC378FCCEA65116C298EE0307D827FF67447502C5C5A23)(0x0AB1B1605C07FB055414308FD9D3872D1184AC436BF62BE06BF68A429EB806C8)))(generic_selector(0x2073E57ECA097CDB4349F56A96DD870EF4232F547624BFDD7AFFDF8407826000))(poseidon_selector(0x1412641F378B7B4AA2DF1B29573E3BBA2E092E74D48CC8CA03BFBD88755F5DD5)))))((public_input 0x0EFC0CC4E8604CB4B337B237BB46916110F5604041669E38EB1712C78A86539D)(evals((w((0x30C812455D840F09B1A10D73E607F1CD23F0977E205946DD7252149C3C8EB2EB)(0x0301082FC85A85A5C5E48483CB231F64BE4E42ADB7AB73B973034F92C2008243)(0x1AC263C293B548E7862234481865A6C4255180F33D5FCB1E30360DC5AA4A8164)(0x2679B03901AA2A286DF1E2A90BC72A3AF57C13DD65B9BB11104DB9189ADBB970)(0x39F0CFE5133D4CC3B598F1F6EA16004661DF7BA6D1316C38E124C65EF4F21C95)(0x16457DFD6BF323BE13162779EB0F48CAD3AD8D4970E9E6433F275B2226CF99D9)(0x2AF436FE0FAF0CB905DD8202DDC42C09D1565CE415FD44F33178D94B1BF76127)(0x26A914F7D55AC312918D41FDA516342E929034C06D1970794C1156FF8690B0E6)(0x0BDDDB276B9CDF4B2C9B4C6B43F2F302D46E2A0104724D7779B714CC1C13D10C)(0x057C045F4DA7202317E4A47952BEF19D109475749FC8BF0ED9244FD6BDB20CC3)(0x3AD9805BE86345B3FE98367D2ADAAAF6A3B2A511B7011D354CC074BB0F0B618C)(0x0864BB2DF60F29BEBC8D55DEC2B6F199DF53CB650BD797D8C81AA7D39F7A494C)(0x375F21536B66E816DCFCE829495A7B429CA1EB658123DE8858B765DB26D1DC68)(0x34D1B59A33369350867EE0E538C68D693E19BD5F8F05FBDE52828A6AE39666CA)(0x381AD285334A7884690F3AB8412291FCB0D3357169C0F176D2A6DB8D2B3FC02B)))(z(0x2FB41536E4655C119BE5F0DED90391A8171C191B3A9764F765FBB6EBF2AABAC9))(s((0x3F5522A1D8A0ABFA8876B4185E9CA1F885663F55579C39F7352F981CB304CCEF)(0x2E0700D6F8A02C04B1DFE630896B59615F21C4B3B541E26EE63DBCFDFE59D658)(0x10F7327C833EB35B4499AD4A1EF0BCB66861822381DEB0CC6799E7182892BD26)(0x29AB8F4C7E256D2D7703E368F9101BED0215E08CEC87AA5499CFA7D1E9E11657)(0x16523DDF438ACF2C072DC7F00C41F1E3A5214761C77D2533970A9382B5B48D30)(0x0D684A460B348082F5EFB03F7A635B5358E52235821D36251D67644CE694ABC4)))(generic_selector(0x2B204B8595299D22CC83DE6E2A78D4AF39AAE8527FB4B297A35051F376AE10C6))(poseidon_selector(0x370C7DAC58DB1DAB1147DAA8BBF7EE1F1E2C2EAB64BEED885CA14FC86D786459)))))))(ft_eval1 0x0459DE9EA74B8CB38B54454FA0F59D375307B1210F7403526153D5CC1288DE63)))(proof((messages((w_comm(((0x3E2CF8FDB7F25CC3D523E88735CC8B0068A436A107D926977B4408955AFB5A7D 0x32CEE955EC5BFCF269A050C50C9ED868664F26AEDB4FCC96A2EB22C4E9031ACC))((0x2029F54CE3FE1255005DC6E0D56F45ED46D9294A2021AD7C4D9ECB9A2FC35DDC 0x20098E9EB437414F861C8BB5FDF3111EB3C6707DC156FFEE3F3B712FB67F4A2E))((0x1110AE3F05A3DF2FE4149EB7125B7CF315D01D6BFBDC4E1EBEA05ADD633470FD 0x30BAEF091C165B8FCFAFAA96C0FB9EB59A6FD98176897423043623AFB8DCB084))((0x3395D2993CCBB9C0A22BE321D70F5F01F39B83D78D7D3684DE7EFEF71C9EED94 0x3A99A078DA706F3C43B6C081DE5A09A69D2D308BA50B961CAC6A664E3D4E8E3E))((0x258C56FA32B555BFC3288F6EEAA11344E4430C51F3ED6A59F35F749F9FAF084E 0x1D47AC341EF7AA76F15F0239A494A541E018C113ACD62E87FAA7764E23251944))((0x2C04311B81ED29240DE9DA622C894323236DD623846E83C08309D1C552B06503 0x2438036EE7EF2EAEB9216A843692A2FA45F8B595107D9EA6C05523C8274DCDFE))((0x19C1DE13982583A22FAD04553082499C88055C0D707C09DC77650EBC14718F6C 0x2611B1FC721B8B73B109886E5A2960ABBC5A471472F2DE27F0B70989B0E640BF))((0x136550315A4440E22DB32906E3C7C955B96C735E4058F1AFF8BDCF75BE2324C8 0x34AB87A590CB4B9674F28A75F6CF92757E84E1649F32CABCBE0B76AED1A60E8D))((0x2EE8D5BEA4D460321B9BD1B58BD5F9EF76DF3D0DEBB015190D317C61C73584AC 0x3D330403E54BD189C55448170D59D6F9D3EF48C8095281F45588B92B6107535F))((0x370E23375707B4E74486415A153CB1F0111C2B950C87178FA85891CCAB0D3D8A 0x0E75C598E63688217BEFBB5DCA020433CE158D4F8070C63982275F8261A3CE95))((0x2EFA160350CC4282EE06AF463EC8CA6980AF07983A42B6275E42FC4AA6E685C8 0x0EECA9EDB51265182CBEC10EF3B0AAF81EFB53E9B919940194C2726B9A785D1C))((0x27FE69FF4A716E2DF1389CFCD4C425B050C00931CDD123C0C5BEA7DFFDD3D603 0x122E05931206355AAB60DBAE077D490887DD1CAA599BAC05458BC3F41428CBB6))((0x3663E1C1C27C6F163AB552E83B21FDDC5EBAA3B735EFFFE38BAE99B01D71D037 0x2C46C91336CE381F3900BD2A80C2B36A6BC90C5D53A579E02240BBABB2018E60))((0x26667E23A0085FDDA970D4CDC78D6A4D9C9F003061F40F5AE8F81986C0D6D260 0x2B05A9F120DAAA355F54E8D0B96A78A674898FB1830A4EB71356137C8984BDA5))((0x105D2491EEAE03D1AA4AD8908412F3ED0B988A43C4F33C81581C3A60FEE9721F 0x2DBAAD56BFA1DCDDE5CFE40480C8E8E57E0093FEB153D9D4F983407B3EA91412))))(z_comm((0x029EE7F64D3FFF1F6920D6F009304C2C8F9ABF2B769ACD69F7F78201A09F10BB 0x301449483BF3A688552192934E10391D7BE97E54BEB26F7A3F3B1A2443CA07EC)))(t_comm((0x27ED056E28864693AB1653F62ADF5C6F47DCCD070EF16A2E911283224015921E 0x1077284DD15F99143EFACBA85D3DD63608F222CD6D7CF7A793DFC64390B7DBD8)(0x07A10F95A4F55597F66C3C92BBF9D69A23C6EE86CE2C864FC0A35FB199980B89 0x2BC564EC06B8B7052F469C3EC74ADD32C1C713EFA19F26102E7C73520F90ED2C)(0x3F30E96C3D5A23170F94895565422C6D54B8C8594D154CB495BD808941848C21 0x17F853D3C5869042C600C71720610A21DD057D689A34CF08E6A7054B1BDDD70C)(0x0C27FA8D2829BCBDD90E245677394DF7151F7C4E94D95832962D7187FEB33432 0x0442C73BC7C37791DA9CE0BE6332F69166EF6E6F651E23D859207B1FADF9E1A9)(0x039B920067F59B3458F8CFA660BC585B705826906B88893B88CADE19930604C4 0x33AAA622113A14BB1408538B38CA5157BCC835546BC081BA2D39E5A636F7854B)(0x0E76AEE47485073ADB66E8827B7F11C99B74F5D360AF12C326DEBFF457ABB298 0x15D7F59BD6BD0E49B36BAE1A8E17073FAD3442B8268D50D327E87CD4374C9E2E)(0x24B17C42758CD977DA31A5D619D0B0CC885A074F13DF1B0D9036A5BE962FAA66 0x33ABF75964D4318F21AA7F3C889EA88C495E1322B29C81646C90190626AF93A0)))))(openings((proof((lr(((0x018E82B85F43380E32CEDAD571886DCDB651FD16C54AFACC8A5F0FCA1A35D77A 0x07558C8DE9362826F52ED1FC9F3FAC3E60BE6BF9A693F1A960CB2F54BF9AD308)(0x2DD34ADF732340CE166A3989C2863E00AA20EE8DD3681A6FC47948DDC2291919 0x39EFB3592924CF49F45D5B471ACD66BD6A9D72C7F034EC75703740737E068FF9))((0x05DD7845B0D19212ACDF666DD90F309999BF28719B2A1F70B228AF5D3E59A633 0x207799AB420155C6FFECDB3538B0EF2259EEF776A33A781AC4F3EF6BCEE60700)(0x3AAFC4E24A25D2AFF714F0008F2465496C62EB6C1F7562E605C38EC59DBDBC67 0x378F5BACCE5C4BD6FEF8630F68C439F8FE986F218A562B1EC054E07FC5824B59))((0x38E608E6C866AD1C61BC6F250A0AD7761B71C6E5E0F7A065F01B7B2F4F485D18 0x2F1CFCEE96584F592CDE05B0B3F936A8D1FB603A2984EECB1DB042BA6D81A6D9)(0x07AD6181A8E32C3898B06BF092E28D1C8E928293125609033979AEDDB9116BCE 0x35287F7AA2300ECA1CC58AE8141AB97411E00F61C65F5B1A98A58EF5918C363B))((0x3461FACE1BEB85F605E72FAF9A3C804CC3BF82FC2094583528F0C7EBA74DFB48 0x2212015E8CA2965FE0E8A4A06838CEDDED1EA531A139F5CFD1588DB5736381C3)(0x0DE143977BA8B3FC93D25434EEDA4921E8BDE5AD59E1181E6B456B4309057F08 0x24B094D4AC456EC3F55D46830F4E82BF07312A1FAA97D9138BF41F16F7E23A9A))((0x21E5645330DC73F6F6819176F8E90A0827117664A93B4D96E19DE8B2819689F2 0x1AC631D608FDEB1EEFFB6C18A720E40CF1408B0BE266A62BE8B7D0B46DAF0FD3)(0x00D73BE9C319319E4C12A8F9610C476D16F0878F032DE6D6664E77DAAA446387 0x12814F8638826EA6099E0691770FFE50F817CFB3C45C1F065EB0F85D6EE7BA8B))((0x27D05D5CE92F8375D15C7E28A4F6A02E1C240BBA18978329DCA072436CDB3B7B 0x1C994843BE3797E9A6F2AC6FCCAB1C9B1745E819143F2918A383D3D336C5846C)(0x1D8ABC594EDE311A74A3CEE7DE36E4065851C0ED03A4148F1A13AF8A4E1CE8B2 0x2C3207B67EE005C7FC5B1C072E980ADF9695F015AE26BF16AE32E83C06FCC611))((0x135DC0F98465E36AEFC4AFAF082F4594434B4A4374309CBD334750983A7811A4 0x11057C0DF6BD2CC7A505A6B39969070656CB39E4EC479DCFE42E01E70BA39114)(0x1E254D9B7E6BEDFE142264E1B93B1CA92B943264E48C8E276AABBC063E79C02B 0x2A617229F4D194F3BE3D15D38B777EA4ABBA28F3641B269F7A251FBFC511B25A))((0x1E9E3FA46A50EC7A42F370E9A429C21984FCF730FAAC8913EC6E50B9DBA0390C 0x19A7CD7A84C3E998ABFCAB1D1AB8DF1E9F57D5878ECB12636A8C0D008E466934)(0x3F2C2B737CD73658ACE3CC9242DD9A52E39836B138BCDB71658B1052C7FE9C83 0x218E8EAB1F657EFEF1A281FE61A6B1CDD93033130FC664403EB1610AE20EFB3B))((0x063E8B50A90E7AFAA45B4AE2BB4F48537F14CFE82BEF31A110093999F0AB5333 0x10281C8C0E0174FA2121F435F35D9E8050637AA3F58E2A342DEB9C91798C47AC)(0x0D43AB0853C6C202A2CE3C39E9D1CDA61449A8A16A91012FFE58AFCBF675D3D6 0x3B5DADAAAE57CF6FB972C521FED1AC03B960851C0D44B6122EBB72A2258A4604))((0x18AE3885AC8AF0E6BD9C0E7785D83477ED6F5FE8A239AE2526141931D81EAB56 0x29FBB084D8FBE703D008E9CD70B702B3113B49F859C2A19B4406AD130D3731A2)(0x04AF99E720254B22E8DF368AE6FC273AC75A4639A6F3007369FD405532964CBE 0x124525E37EC615B1F57D54002836E35380548276C61D6B2539EA51C9015EED9C))((0x32A4ECA72864EEFFCF2D83B843B9BE4ADBCD45B972624811C894F916E4C81A30 0x3E6F57AB9CF53618664A7AD9862F65BF164EFFB42B7497B64A8844339318C365)(0x2F7EECC63F3EDF519A83E20D64E88213179264F93A2438A22A16335EB2853E6A 0x1D03C4087516EE01C13982505997CF5E13A8E4C228B4346DEFDCB1101E656494))((0x394C3F476F8DFAE68E5B4610E73239F7ACD8C5AE12E6F094B2D199D39308D87D 0x1A38D41C68C7BD3C6176D24F774641136D6C929811D86AE72E54598BB7DB27F4)(0x160CB44B2FAF93B0375D40E77D560091F066C8616B692FF842F90B6FEBC9BAB2 0x16C4E5ADA6534B5EA0406918AD2D64BC414EAFFBC723F27B359C524FF5FCE39C))((0x3FB19114E947FFDC540FB4284835CB74279DAB1CF3154F0874B0A0A5E63A3EEB 0x3D65D5B172CEF8D31F34A49AB0889F7A10A2238846B6B24569D68AA791F94CB6)(0x0F02699D800DB868A06E3EE4A0C158C90BC48A691E81744FFBCFDA32FF24DCF4 0x2714671243FD8237D339E0AC2C941EE9A642FDF6FCBBE031B42696FD69E831AB))((0x0521F6B05212DC975AF0007CD24D328B2ECED1C82791D2E606059B65BCBE554E 0x36BE6DAC4B773494121F7DD5F8507D36AE6ACC1DC99FA860DED1CA7AE8A3ED01)(0x38B51B590BF50CC6A24AB80474EB147A30C4AF3DD19A5654C1B105559BD14D4D 0x3E11DE8B1B4638FBD8C4D6836A747C0A81578A4D22B84AC58EC061FEB68B3177))((0x2D5328E0BA58995C7066774A463F8A902D7C2B97BD45C10B9D8B4D823DF106AC 0x26933A9C217727C9CDC4A4494D3E332B36BB997396FCA706099FFD3439BB4836)(0x0BB116BA807D12D4DF79557FFB7F60B48858601912530E3F49C890A34AED31CB 0x2462E0396ED302DD10A6EF43AE532333543F4A875599E83FBE4106644DDD3F8E))))(z_1 0x06A616C3A625F92ED65B5CA99D9A1DAAA476481B9C45E4553E7A8E436B13D570)(z_2 0x310AE40CBCE21FA0DC92D1DFE7DF49D939A579FF029F869118036BF8B370438C)(delta(0x366414F4FE9C3DDB27DA5A85452CEDBC65AFD104D1F5C241BE2E594F615ABBBC 0x0B4190D59EEA6EBF8B9316054439E92B5BFDC8CD9BB0C864783D5F1D785DF87E))(challenge_polynomial_commitment(0x1340C10B30AD07F4913C3CDD588C3E8A5A6E6DAC9947378FA97D11F52CCD4AE1 0x0B110AAD2D1957C9C6944439DED80C9CE9A0EAD35C96903AC1EADBC94AEB5D29))))(evals(((w((0x1BF1CE494D243FEF9253CB66CC3D6300A37ED4A230C154451779FA16F6AAEDD7)(0x2A9AB4178F95EAE6A3D608276A4BCD390A88DAF8C35196061ED79DADB747CA62)(0x2F272FD8DF352C035E81FC1A5C8664AABEF4F62962B7E3D03F6BF53C10C2B398)(0x0967B0F7F74E6558AB86D813EAB8490C43C569BAB9E72761C8D4086810A621B2)(0x3BE58E7E3C8DFFE8317E68E50729FFBD6E22E3FE43F3FD0C469F46768068550B)(0x2417CB5380DAD79780D62428CC09175FBE2DBC443E0767157589A7D581458D33)(0x206FA1779C5057CD0639666D2581A170B83CE654C654544C73F7DFD022FF1597)(0x3EC85737838ED8C4CB90D54523231C950FC641DAA8390AC6612995ADBBFC2947)(0x1A24C3397D2F39F1DFEECCCB66C78BE61279D5C22AD692C23DD5268133793F38)(0x1813C59133F4204F15554D891F94D802D26E2F18343D513E164706636CD7D6E4)(0x0534DF67954B7AAA90DBDFA81468B83F4182B927D5B418E531795998B9825BE3)(0x0F7FC2CEA19984972EE5732743ACDA4C6C406F03A852555019F213E43326B61A)(0x367ADA537033A054A65F0E145E6E79B56F054EEB8011F1EEE163E137D6366B89)(0x1B3232DFA316997F453D7A6F2005E6E096B54B3847F6FE8D581165887F85FD71)(0x0EDC1BCD8B78233F2C5E236D6D05265A586587AB0B1C0F5EE3A26E3EC45C8559)))(z(0x2D46727CABD1AD20E476E7ED8D664640D0565D3F01CBBF7C6258E2F436E0FB64))(s((0x16C1D17F88C267C43D4DFD19768583A2E9AB7AEC6975B09F139DF1AB5C41C815)(0x250EA67AD22E2661208B05E72B1054F60798FD58DDFE3333FAA9B5AB547C6745)(0x258A8C918280C265F825EB72C0B8C625665C2FAF60697D588EC6AACAC73D0B86)(0x072EFAAFC967EFE45BFF2EEC1A8CBF8A0B2CC1F44B25296DA33F73B3E48862D2)(0x3A23A8AA2A3D0DC85299DE4975C8485473C9C1D0D0D84A0BECFFD31351A6071D)(0x0DBC51C9DF923ACB44274742095761E599ED1D8F94EF8F414C151DCC5223A13F)))(generic_selector(0x1AB9C88B53C9CFD0A65823311711ABF1E13E5B352DC2D35C6D34A4508EF42C1D))(poseidon_selector(0x0D4DB96949873B90F365BCBC73B2A1AAE695533742F6472E050D024C47EF051F)))((w((0x044E2486D22B5737733C4933944865079C1D24CB1B62D5A5D99FB4A84D1A7806)(0x2B7D6F8FCA7A01770626488AD8540BDBAD1337C627CD8A9E63212A2A05831410)(0x2D92673EBC67FB88DC3053F021AA44F5ECC10FE56E9D8169EB28B63C86AE5766)(0x11BD17917D68A2E68F4E16998A89F15F53BCEE8524042E87316A917BE118B573)(0x1978EF73627746A050DFFFB981ACCAFDE1ED51690921994DBCEE69E44892C07A)(0x20B24CDDD02F9E3E3864B905A0E34C1910914A3990497208B44D9B7D2F9C04D8)(0x074347DE39DBB739163EC16F4AC610BAFE9328C7677A59ADB0E4949BEA72139F)(0x29F334283A097BEF545ED4BD25FE90538565AFB1ECCFBF12BB636F536950AAE5)(0x1D956F27A2C2B32F5108F9261BF08336CABF3F43A34D76549747C589AB268E26)(0x0F67F822B5005129FDDFA19806B63E2F9293651319E024F470A4E3C093C953FA)(0x07FE17373605026D0611EA8C56D5A5E012737A651B9DB4F2B6D3643E66AE8055)(0x050CA2177E768D190DB1B8EF36BFC9295796447C0F00F1C30D4EAD2C4CCF2576)(0x008B132B8DD971E8BD710E2176BA1A1486E982682603D7C99354FFDDD42ED0DF)(0x386E04A8455ACB87D0E73727740ECD7FD21607BBE70CE413AAA2ED5293FA203B)(0x29225BD92F00CC712E9F3FFCA7660592B80987BE8B35DDFF83194F0799DC3B44)))(z(0x2345A1A7FB004FF4B933E47E914BC762D3321AC74A1EB807F22F75F716A29745))(s((0x384F9DCC50FFCCCD17FE53094FDD6C6E3A189937EF2202055A9E84207D1F990F)(0x3E3C73F348C36B61D52D5DDFF36D766357B58A914875549471351BEAB35952CB)(0x193A462B9731E73C8622E658BAD0DB5A932213978DB3925DBB5ACF07F8AB2B4C)(0x2B6E71A35F8A6C161A22D6CA45CA5766378890C30EA61AF0A179CB6B5496E177)(0x03A7BF41CF46215871DC385F1C4AB03A8C3DD67EC3F789E425BAEC8ED2B4A65F)(0x23C3758C52FE243A5E63FD6AEC2218CC2A001A6F655F2E44F1A13E391FFA4BB8)))(generic_selector(0x2CC43F0A9D98CBE8E5B6FC354E9B090B910754181165DBE475E88A0A02F5A786))(poseidon_selector(0x22A81C50CBBE608CB6F8A807471424EB0A5167B392446F32E192E33EFDBFCE75)))))(ft_eval1 0x34AD5FA8AD38D9FB83534F851F0924BA3B9B43E1C45703F151A19BCCE71F4E7D))))))" + |> Side_loaded.Proof.of_base64 + with + | Error e -> + failwith e + | Ok pi -> + pi + in + let statement = + let transaction = + Backend.Tick.Field.t_of_sexp + (Atom + "0x2340A5795E22C7C923991D225400D0052B3A995C35BCCDC612E6205287419EC1" + ) + in + let at_party = + Backend.Tick.Field.t_of_sexp + (Atom + "0x2340A5795E22C7C923991D225400D0052B3A995C35BCCDC612E6205287419EC1" + ) + in + [| transaction; at_party |] + in + let vk = + Side_loaded.Verification_key.of_base58_check_exn + "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" + in + assert ( + Promise.block_on_async_exn (fun () -> + Side_loaded.verify_promise ~value_to_field_elements:Fn.id + [ (vk, statement, pi) ] ) ) + open Impls.Step let () = Snarky_backendless.Snark0.set_eval_constraints true diff --git a/src/lib/pickles/pickles.mli b/src/lib/pickles/pickles.mli index 0b3d838019c..76c5cf9160f 100644 --- a/src/lib/pickles/pickles.mli +++ b/src/lib/pickles/pickles.mli @@ -223,6 +223,8 @@ module Side_loaded : sig (* Must be called immediately before calling the prover for the inductive rule for which this tag is used as a predecessor. *) val in_prover : ('var, 'value, 'n1, 'n2) Tag.t -> Verification_key.t -> unit + + val srs_precomputation : unit -> unit end (** This compiles a series of inductive rules defining a set into a proof From 780979952b17b6834fd6b319443a83a658114d0b Mon Sep 17 00:00:00 2001 From: Izaak Meckler Date: Fri, 3 Jun 2022 12:24:42 -0700 Subject: [PATCH 11/15] call srs_precomputation in verifier process --- src/lib/verifier/prod.ml | 1 + 1 file changed, 1 insertion(+) diff --git a/src/lib/verifier/prod.ml b/src/lib/verifier/prod.ml index 783202b4f94..2060362fd05 100644 --- a/src/lib/verifier/prod.ml +++ b/src/lib/verifier/prod.ml @@ -50,6 +50,7 @@ module Worker_state = struct Memory_stats.log_memory_stats logger ~process:"verifier" ; match proof_level with | Full -> + Pickles.Side_loaded.srs_precomputation () ; Deferred.return (let module M = struct module T = Transaction_snark.Make (struct From 9a2e2db866787b14b9637a7b44ae8d03c29baacb Mon Sep 17 00:00:00 2001 From: mrmr1993 Date: Mon, 6 Jun 2022 17:50:07 +0100 Subject: [PATCH 12/15] Dump all failing replays for hash change --- buildkite/scripts/replayer-test.sh | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/buildkite/scripts/replayer-test.sh b/buildkite/scripts/replayer-test.sh index ddcb7d78e51..a0da43cb848 100755 --- a/buildkite/scripts/replayer-test.sh +++ b/buildkite/scripts/replayer-test.sh @@ -38,4 +38,6 @@ cd /workdir echo "Running replayer" mina-replayer --archive-uri postgres://postgres:$PGPASSWORD@localhost:5432/archive \ - --input-file $TEST_DIR/input.json --output-file /dev/null + --input-file $TEST_DIR/input.json --output-file /dev/null \ + --continue-on-error # DO NOT MERGE +exit 1 From ef7f158f7068f18bc37faf39d8ac72f02e005f8b Mon Sep 17 00:00:00 2001 From: mrmr1993 Date: Mon, 6 Jun 2022 19:04:01 +0100 Subject: [PATCH 13/15] Fixup expected hash in replayer test --- src/app/replayer/test/archive_db.sql | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/src/app/replayer/test/archive_db.sql b/src/app/replayer/test/archive_db.sql index a7877ab51fb..27e5dd46360 100644 --- a/src/app/replayer/test/archive_db.sql +++ b/src/app/replayer/test/archive_db.sql @@ -1860,7 +1860,7 @@ COPY public.accounts_created (block_id, account_identifier_id, creation_fee) FRO -- COPY public.blocks (id, state_hash, parent_id, parent_hash, creator_id, block_winner_id, snarked_ledger_hash_id, staking_epoch_data_id, next_epoch_data_id, min_window_density, total_currency, ledger_hash, height, global_slot_since_hard_fork, global_slot_since_genesis, "timestamp", chain_status) FROM stdin; -1 3NLDRvvByy2GMYivoFg7FADtNzjqZZ71jX2AZDVdxqtYLusb7AcV \N 3NKBXHShSYqxwWuxRiFXCSCNKmDVJaEgTHh4FRSYWzMTJ9MRseTC 5 5 1 1 2 77 11616000000065089 jxgSP5L3y7YLoG37xJ5XQmCGb7676TDuek4j3qZVs9LjUF6Gbd4 1 0 0 1651708749987 canonical +1 3NLDRvvByy2GMYivoFg7FADtNzjqZZ71jX2AZDVdxqtYLusb7AcV \N 3NKBXHShSYqxwWuxRiFXCSCNKmDVJaEgTHh4FRSYWzMTJ9MRseTC 5 5 1 1 2 77 11616000000065089 jxjJQUU4K3u2yXpLPCFqcYbqA3ZfTrEgn3Gqw96V5rwWRgkGZtr 1 0 0 1651708749987 canonical 2 3NKHwN7Hg65eGsM2fY3kn3m5KvVsK6GVFgAgVNoXDRnCRhr1UVWJ 1 3NLDRvvByy2GMYivoFg7FADtNzjqZZ71jX2AZDVdxqtYLusb7AcV 4 3 1 1 3 77 11616000000065089 jxHbatt2mrbNoNwFJJbZdWVqSHGejMcwbRkS85yJBy91eHZixxt 2 1 1 1651708944856 pending 3 3NLejSrDnJMo1BRVSq6fqzZMAupQRiA1eB98yEbh6SNxyiGXWYRJ 2 3NKHwN7Hg65eGsM2fY3kn3m5KvVsK6GVFgAgVNoXDRnCRhr1UVWJ 4 3 1 1 4 77 11616000000065089 jxiLr7L1xNDGtqRAh4UpA3bJC1C1Tvk8UoVboR3hkhNUppHP9Z1 3 2 2 1651709109987 pending 4 3NKRDvPbuYVUX23tMVCMA33U5Qrua6A4EFpTfyu4UJzsa27x97aY 3 3NLejSrDnJMo1BRVSq6fqzZMAupQRiA1eB98yEbh6SNxyiGXWYRJ 4 3 1 1 5 77 11616000000065089 jw7bVbZrKcaxZKEvm1xj2rqrmb42FNVuLQ6yyhJE9CmycZ9wzVY 4 3 3 1651709289987 pending @@ -2099,7 +2099,7 @@ COPY public.public_keys (id, value) FROM stdin; -- COPY public.snarked_ledger_hashes (id, value) FROM stdin; -1 jxgSP5L3y7YLoG37xJ5XQmCGb7676TDuek4j3qZVs9LjUF6Gbd4 +1 jxjJQUU4K3u2yXpLPCFqcYbqA3ZfTrEgn3Gqw96V5rwWRgkGZtr \. From 1b080db55fdc7c2cfc21c8f23e219c3e7618ca88 Mon Sep 17 00:00:00 2001 From: mrmr1993 Date: Mon, 6 Jun 2022 19:15:49 +0100 Subject: [PATCH 14/15] Revert "Dump all failing replays for hash change" This reverts commit 9a2e2db866787b14b9637a7b44ae8d03c29baacb. NOTE: fixing this programmatically from the log involves (from vim) :tabe src/app/replayer/test/archive_db.sql :vsplit ~/Downloads/mina_build_XXXXX_replayer-test.log You can set up a (slow) macro to perform all of the replacements with qq/expected_ledger_hash 2f""ayi"4f""syi"h:%s/a/s/g lq Then, for N the number of replacements, we run N@q and go grab a coffee. This *WILL* lock up your vim instance for some time. --- buildkite/scripts/replayer-test.sh | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/buildkite/scripts/replayer-test.sh b/buildkite/scripts/replayer-test.sh index a0da43cb848..ddcb7d78e51 100755 --- a/buildkite/scripts/replayer-test.sh +++ b/buildkite/scripts/replayer-test.sh @@ -38,6 +38,4 @@ cd /workdir echo "Running replayer" mina-replayer --archive-uri postgres://postgres:$PGPASSWORD@localhost:5432/archive \ - --input-file $TEST_DIR/input.json --output-file /dev/null \ - --continue-on-error # DO NOT MERGE -exit 1 + --input-file $TEST_DIR/input.json --output-file /dev/null From 3909b8c6c42ffaafc67979c087dfba7cf5dfa000 Mon Sep 17 00:00:00 2001 From: mrmr1993 Date: Mon, 6 Jun 2022 21:33:01 +0100 Subject: [PATCH 15/15] Update all expected replayer hashes --- src/app/replayer/test/archive_db.sql | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/src/app/replayer/test/archive_db.sql b/src/app/replayer/test/archive_db.sql index 27e5dd46360..c570b1d140d 100644 --- a/src/app/replayer/test/archive_db.sql +++ b/src/app/replayer/test/archive_db.sql @@ -1861,10 +1861,10 @@ COPY public.accounts_created (block_id, account_identifier_id, creation_fee) FRO COPY public.blocks (id, state_hash, parent_id, parent_hash, creator_id, block_winner_id, snarked_ledger_hash_id, staking_epoch_data_id, next_epoch_data_id, min_window_density, total_currency, ledger_hash, height, global_slot_since_hard_fork, global_slot_since_genesis, "timestamp", chain_status) FROM stdin; 1 3NLDRvvByy2GMYivoFg7FADtNzjqZZ71jX2AZDVdxqtYLusb7AcV \N 3NKBXHShSYqxwWuxRiFXCSCNKmDVJaEgTHh4FRSYWzMTJ9MRseTC 5 5 1 1 2 77 11616000000065089 jxjJQUU4K3u2yXpLPCFqcYbqA3ZfTrEgn3Gqw96V5rwWRgkGZtr 1 0 0 1651708749987 canonical -2 3NKHwN7Hg65eGsM2fY3kn3m5KvVsK6GVFgAgVNoXDRnCRhr1UVWJ 1 3NLDRvvByy2GMYivoFg7FADtNzjqZZ71jX2AZDVdxqtYLusb7AcV 4 3 1 1 3 77 11616000000065089 jxHbatt2mrbNoNwFJJbZdWVqSHGejMcwbRkS85yJBy91eHZixxt 2 1 1 1651708944856 pending -3 3NLejSrDnJMo1BRVSq6fqzZMAupQRiA1eB98yEbh6SNxyiGXWYRJ 2 3NKHwN7Hg65eGsM2fY3kn3m5KvVsK6GVFgAgVNoXDRnCRhr1UVWJ 4 3 1 1 4 77 11616000000065089 jxiLr7L1xNDGtqRAh4UpA3bJC1C1Tvk8UoVboR3hkhNUppHP9Z1 3 2 2 1651709109987 pending -4 3NKRDvPbuYVUX23tMVCMA33U5Qrua6A4EFpTfyu4UJzsa27x97aY 3 3NLejSrDnJMo1BRVSq6fqzZMAupQRiA1eB98yEbh6SNxyiGXWYRJ 4 3 1 1 5 77 11616000000065089 jw7bVbZrKcaxZKEvm1xj2rqrmb42FNVuLQ6yyhJE9CmycZ9wzVY 4 3 3 1651709289987 pending -5 3NLuycS3WqnYZBxgLTYBXv8a1qYaS6CSt2ZQ4cG3gi4rvD64yDsg 4 3NKRDvPbuYVUX23tMVCMA33U5Qrua6A4EFpTfyu4UJzsa27x97aY 4 3 1 1 6 77 11616000000065089 jx5XboJuVNJ4u8m7KpQi3SwtG4gE9cxE5toj8xDWYBBBY4urWh3 5 4 4 1651709469987 pending +2 3NKHwN7Hg65eGsM2fY3kn3m5KvVsK6GVFgAgVNoXDRnCRhr1UVWJ 1 3NLDRvvByy2GMYivoFg7FADtNzjqZZ71jX2AZDVdxqtYLusb7AcV 4 3 1 1 3 77 11616000000065089 jwtggYGqA1qVbLqrpuXoEksBi3ddT7GM1qVAbUMvDg2jz3nMj64 2 1 1 1651708944856 pending +3 3NLejSrDnJMo1BRVSq6fqzZMAupQRiA1eB98yEbh6SNxyiGXWYRJ 2 3NKHwN7Hg65eGsM2fY3kn3m5KvVsK6GVFgAgVNoXDRnCRhr1UVWJ 4 3 1 1 4 77 11616000000065089 jxcKVgdor95eAatRgWe3TZWrweSjxvAwvcZJ1g6TMHb4dcDVU7n 3 2 2 1651709109987 pending +4 3NKRDvPbuYVUX23tMVCMA33U5Qrua6A4EFpTfyu4UJzsa27x97aY 3 3NLejSrDnJMo1BRVSq6fqzZMAupQRiA1eB98yEbh6SNxyiGXWYRJ 4 3 1 1 5 77 11616000000065089 jwztmpmEC61N5QYkaMb1tbiNCDeNVhoyhj8bU7eKV65syUDEqT6 4 3 3 1651709289987 pending +5 3NLuycS3WqnYZBxgLTYBXv8a1qYaS6CSt2ZQ4cG3gi4rvD64yDsg 4 3NKRDvPbuYVUX23tMVCMA33U5Qrua6A4EFpTfyu4UJzsa27x97aY 4 3 1 1 6 77 11616000000065089 jwexhTzbjxHmy7wrbEPLzt3aQKsszzwoq9vYqkgdV43dCh6iq6A 5 4 4 1651709469987 pending \.