Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: VK tree #6914

Merged
merged 76 commits into from
Jul 8, 2024
Merged
Show file tree
Hide file tree
Changes from 67 commits
Commits
Show all changes
76 commits
Select commit Hold shift + click to select a range
2895dbd
feat: first implementation of vk tree
sirasistant Jun 5, 2024
ffd8f39
fix
sirasistant Jun 5, 2024
3152f92
fix
sirasistant Jun 5, 2024
9413ef5
update vks to vkdata
sirasistant Jun 5, 2024
72d114f
adding vk tree root to tx context
sirasistant Jun 6, 2024
acb574d
Merge branch 'master' into arv/constrained_vks
sirasistant Jun 25, 2024
9209612
vk tree verification
sirasistant Jun 25, 2024
4f25a89
more changes to accomodate vk tree
sirasistant Jun 26, 2024
5d22817
fix padding txs
sirasistant Jun 26, 2024
6b7c305
remove logs
sirasistant Jun 26, 2024
8230f44
earthly test
sirasistant Jun 26, 2024
232ed0b
Merge branch 'master' into arv/constrained_vks
sirasistant Jun 26, 2024
d82ac6b
Merge branch 'master' into arv/constrained_vks
sirasistant Jun 27, 2024
2e5eaa3
tsconfig
sirasistant Jun 27, 2024
ce8665e
fmt
sirasistant Jun 27, 2024
a070098
remove dependency cycle
sirasistant Jun 27, 2024
71ae9cb
fix
sirasistant Jun 27, 2024
c3884ea
revert webpack change
sirasistant Jun 27, 2024
0ac3dd3
fix tsconfig
sirasistant Jun 27, 2024
9f1cf2b
make sign type more concrete
sirasistant Jun 27, 2024
7096d87
fix test
sirasistant Jun 27, 2024
c5c5592
fix another test
sirasistant Jun 27, 2024
9428140
fix visibility
sirasistant Jun 27, 2024
06377c8
fmt
sirasistant Jun 27, 2024
965633b
fixes for proving tests
sirasistant Jun 27, 2024
c59bb12
Merge branch 'master' into arv/constrained_vks
sirasistant Jun 27, 2024
881482f
fix integration l1 publisher test
sirasistant Jun 27, 2024
290f807
fix prover client tests
sirasistant Jun 27, 2024
dfdf1c7
prover test fixes
sirasistant Jun 27, 2024
db20d77
Merge branch 'master' into arv/constrained_vks
sirasistant Jun 27, 2024
cee1031
vk tree in root rollup public inputs
sirasistant Jun 28, 2024
8213acd
fix tests
sirasistant Jun 28, 2024
367b5bd
merge master
sirasistant Jun 28, 2024
634a087
Merge branch 'master' into arv/constrained_vks
sirasistant Jun 28, 2024
48b1961
fix
sirasistant Jun 28, 2024
de31c72
vk tree in circuits tests
sirasistant Jun 28, 2024
71a7733
remove extraneous members
sirasistant Jun 28, 2024
72efde1
vk tree in parity
sirasistant Jun 28, 2024
106b2ed
fmt
sirasistant Jun 28, 2024
cba6563
add vk tree root in contract
sirasistant Jun 28, 2024
52f7181
yarn-project test fixes
sirasistant Jun 28, 2024
5dd7bc4
fix tsconfig
sirasistant Jun 28, 2024
f9c8417
remove comment
sirasistant Jun 28, 2024
ef46b5b
Merge branch 'master' into arv/constrained_vks
sirasistant Jun 28, 2024
1884519
fix root tests
sirasistant Jul 1, 2024
eafefa8
contract and circuit tests for vk tree
sirasistant Jul 1, 2024
bb033a4
Merge branch 'master' into arv/constrained_vks
sirasistant Jul 1, 2024
9a2e034
Merge branch 'master' into arv/constrained_vks
sirasistant Jul 3, 2024
f66d412
chore: constants
sirasistant Jul 3, 2024
4d76e6f
refactor vk gen
sirasistant Jul 3, 2024
6c0a720
Merge branch 'master' into arv/constrained_vks
sirasistant Jul 3, 2024
d31a754
fmt
sirasistant Jul 3, 2024
d0fd3ad
Update yarn-project/prover-client/src/orchestrator/orchestrator_mixed…
sirasistant Jul 3, 2024
c792c45
VK caching
sirasistant Jul 4, 2024
d59140e
Merge branch 'master' into arv/constrained_vks
sirasistant Jul 4, 2024
d50d7a0
ci generate credentials file
sirasistant Jul 4, 2024
74a3fd9
Merge branch 'master' into arv/constrained_vks
sirasistant Jul 4, 2024
0335e41
constants gen
sirasistant Jul 4, 2024
ba03566
pass aws creds to earthly
sirasistant Jul 4, 2024
12f2e5e
fix credentials
sirasistant Jul 4, 2024
8a82a4e
add secrets to missing gh actions
sirasistant Jul 4, 2024
4244e47
fix ci.yml
sirasistant Jul 4, 2024
1ac4a29
hopefully fix gates report
sirasistant Jul 4, 2024
9e9a174
Merge branch 'master' into arv/constrained_vks
sirasistant Jul 4, 2024
8eac5b0
fixes
sirasistant Jul 4, 2024
ffeaaa1
Merge branch 'arv/constrained_vks' of github.com:AztecProtocol/aztec-…
sirasistant Jul 4, 2024
3e33f52
whitespace ):
sirasistant Jul 4, 2024
ad69061
Update yarn-project/end-to-end/package.json
sirasistant Jul 5, 2024
fb1eed1
fix test
sirasistant Jul 5, 2024
4b40d91
Merge branch 'arv/constrained_vks' of github.com:AztecProtocol/aztec-…
sirasistant Jul 5, 2024
cae06fb
Merge branch 'master' into arv/constrained_vks
sirasistant Jul 5, 2024
9c49d63
feat: remove vk tree root from calldata
sirasistant Jul 5, 2024
0c265bb
artifact hash format
sirasistant Jul 5, 2024
5ce5c49
chore: update block result
sirasistant Jul 5, 2024
e6ae1fc
Merge branch 'master' into arv/constrained_vks
sirasistant Jul 5, 2024
e33c3cc
Merge branch 'master' into arv/constrained_vks
sirasistant Jul 8, 2024
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
32 changes: 27 additions & 5 deletions .github/workflows/ci.yml
Original file line number Diff line number Diff line change
Expand Up @@ -98,7 +98,11 @@ jobs:
# prepare images locally, tagged by commit hash
- name: "Build E2E Image"
timeout-minutes: 40
run: earthly-ci ./yarn-project+export-e2e-test-images
run: |
earthly-ci \
--secret AWS_ACCESS_KEY_ID=${{ secrets.AWS_ACCESS_KEY_ID }} \
--secret AWS_SECRET_ACCESS_KEY=${{ secrets.AWS_SECRET_ACCESS_KEY }} \
./yarn-project+export-e2e-test-images
# We base our e2e list used in e2e-x86 off the targets in ./yarn-project/end-to-end
# (Note ARM uses just 2 tests as a smoketest)
- name: Create list of non-bench end-to-end jobs
Expand Down Expand Up @@ -377,7 +381,11 @@ jobs:
- name: "Format noir-projects"
working-directory: ./noir-projects/
timeout-minutes: 40
run: earthly-ci --no-output ./+format
run: |
earthly-ci --no-output \
--secret AWS_ACCESS_KEY_ID=${{ secrets.AWS_ACCESS_KEY_ID }} \
--secret AWS_SECRET_ACCESS_KEY=${{ secrets.AWS_SECRET_ACCESS_KEY }} \
./+format

noir-test:
needs: [setup, changes]
Expand Down Expand Up @@ -430,7 +438,11 @@ jobs:
concurrency_key: noir-projects-x86
- name: "Noir Projects"
timeout-minutes: 40
run: earthly-ci --no-output ./noir-projects/+test
run: |
earthly-ci --no-output \
--secret AWS_ACCESS_KEY_ID=${{ secrets.AWS_ACCESS_KEY_ID }} \
--secret AWS_SECRET_ACCESS_KEY=${{ secrets.AWS_SECRET_ACCESS_KEY }} \
./noir-projects/+test

avm-format:
needs: [setup, changes]
Expand Down Expand Up @@ -515,7 +527,14 @@ jobs:
- name: "Docs Preview"
if: github.event.number
timeout-minutes: 40
run: earthly-ci --no-output ./docs/+deploy-preview --ENV=staging --PR=${{ github.event.number }} --AZTEC_BOT_COMMENTER_GITHUB_TOKEN=${{ secrets.AZTEC_BOT_GITHUB_TOKEN }} --NETLIFY_AUTH_TOKEN=${{ secrets.NETLIFY_AUTH_TOKEN }} --NETLIFY_SITE_ID=${{ secrets.NETLIFY_SITE_ID }}
run: |
earthly-ci --no-output \
--secret AWS_ACCESS_KEY_ID=${{ secrets.AWS_ACCESS_KEY_ID }} \
--secret AWS_SECRET_ACCESS_KEY=${{ secrets.AWS_SECRET_ACCESS_KEY }} \
./docs/+deploy-preview --ENV=staging --PR=${{ github.event.number }} \
--AZTEC_BOT_COMMENTER_GITHUB_TOKEN=${{ secrets.AZTEC_BOT_GITHUB_TOKEN }} \
--NETLIFY_AUTH_TOKEN=${{ secrets.NETLIFY_AUTH_TOKEN }} \
--NETLIFY_SITE_ID=${{ secrets.NETLIFY_SITE_ID }}

bb-bench:
runs-on: ubuntu-20.04
Expand Down Expand Up @@ -617,7 +636,10 @@ jobs:
working-directory: ./noir-projects/
timeout-minutes: 40
run: |
earthly-ci --artifact +gates-report/gates_report.json
earthly-ci \
--secret AWS_ACCESS_KEY_ID=${{ secrets.AWS_ACCESS_KEY_ID }} \
--secret AWS_SECRET_ACCESS_KEY=${{ secrets.AWS_SECRET_ACCESS_KEY }} \
--artifact +gates-report/gates_report.json
mv gates_report.json ../protocol_circuits_report.json

- name: Compare gates reports
Expand Down
27 changes: 23 additions & 4 deletions l1-contracts/src/core/Rollup.sol
Original file line number Diff line number Diff line change
Expand Up @@ -45,17 +45,25 @@ contract Rollup is IRollup {
// See https://github.com/AztecProtocol/aztec-packages/issues/1614
uint256 public lastWarpedBlockTs;

bytes32 public vkTreeRoot;

using EnumerableSet for EnumerableSet.AddressSet;

EnumerableSet.AddressSet private sequencers;

constructor(IRegistry _registry, IAvailabilityOracle _availabilityOracle, IERC20 _gasToken) {
constructor(
IRegistry _registry,
IAvailabilityOracle _availabilityOracle,
IERC20 _gasToken,
bytes32 _vkTreeRoot
) {
verifier = new MockVerifier();
REGISTRY = _registry;
AVAILABILITY_ORACLE = _availabilityOracle;
GAS_TOKEN = _gasToken;
INBOX = new Inbox(address(this), Constants.L1_TO_L2_MSG_SUBTREE_HEIGHT);
OUTBOX = new Outbox(address(this));
vkTreeRoot = _vkTreeRoot;
VERSION = 1;
}

Expand Down Expand Up @@ -85,6 +93,10 @@ contract Rollup is IRollup {
verifier = IVerifier(_verifier);
}

function setVkTreeRoot(bytes32 _vkTreeRoot) external {
vkTreeRoot = _vkTreeRoot;
}

/**
* @notice Process an incoming L2 block and progress the state
* @param _header - The L2 block header
Expand All @@ -94,6 +106,7 @@ contract Rollup is IRollup {
function process(
bytes calldata _header,
bytes32 _archive,
bytes32 _vkTreeRoot,
bytes calldata _aggregationObject,
bytes calldata _proof
) external override(IRollup) {
Expand All @@ -112,18 +125,24 @@ contract Rollup is IRollup {
revert Errors.Rollup__InvalidSequencer(msg.sender);
}

if (_vkTreeRoot != vkTreeRoot) {
revert Errors.Rollup__InvalidVkTreeRoot(vkTreeRoot, _vkTreeRoot);
}

bytes32[] memory publicInputs =
new bytes32[](2 + Constants.HEADER_LENGTH + Constants.AGGREGATION_OBJECT_LENGTH);
new bytes32[](3 + Constants.HEADER_LENGTH + Constants.AGGREGATION_OBJECT_LENGTH);
// the archive tree root
publicInputs[0] = _archive;
// this is the _next_ available leaf in the archive tree
// normally this should be equal to the block number (since leaves are 0-indexed and blocks 1-indexed)
// but in yarn-project/merkle-tree/src/new_tree.ts we prefill the tree so that block N is in leaf N
publicInputs[1] = bytes32(header.globalVariables.blockNumber + 1);

publicInputs[2] = _vkTreeRoot;

bytes32[] memory headerFields = HeaderLib.toFields(header);
for (uint256 i = 0; i < headerFields.length; i++) {
publicInputs[i + 2] = headerFields[i];
publicInputs[i + 3] = headerFields[i];
}

// the block proof is recursive, which means it comes with an aggregation object
Expand All @@ -135,7 +154,7 @@ contract Rollup is IRollup {
assembly {
part := calldataload(add(_aggregationObject.offset, mul(i, 32)))
}
publicInputs[i + 2 + Constants.HEADER_LENGTH] = part;
publicInputs[i + 3 + Constants.HEADER_LENGTH] = part;
}

if (!verifier.verify(_proof, publicInputs)) {
Expand Down
1 change: 1 addition & 0 deletions l1-contracts/src/core/interfaces/IRollup.sol
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@ interface IRollup {
function process(
bytes calldata _header,
bytes32 _archive,
bytes32 _vkTreeRoot,
bytes calldata _aggregationObject,
bytes memory _proof
) external;
Expand Down
38 changes: 28 additions & 10 deletions l1-contracts/src/core/libraries/ConstantsGen.sol
Original file line number Diff line number Diff line change
Expand Up @@ -49,13 +49,12 @@ library Constants {
uint256 internal constant MAX_UNENCRYPTED_LOGS_PER_TX = 8;
uint256 internal constant MAX_PUBLIC_DATA_HINTS = 128;
uint256 internal constant NUMBER_OF_L1_L2_MESSAGES_PER_ROLLUP = 16;
uint256 internal constant VK_TREE_HEIGHT = 3;
uint256 internal constant VK_TREE_HEIGHT = 5;
uint256 internal constant FUNCTION_TREE_HEIGHT = 5;
uint256 internal constant NOTE_HASH_TREE_HEIGHT = 32;
uint256 internal constant PUBLIC_DATA_TREE_HEIGHT = 40;
uint256 internal constant NULLIFIER_TREE_HEIGHT = 20;
uint256 internal constant L1_TO_L2_MSG_TREE_HEIGHT = 16;
uint256 internal constant ROLLUP_VK_TREE_HEIGHT = 8;
uint256 internal constant ARTIFACT_FUNCTION_TREE_MAX_HEIGHT = 5;
uint256 internal constant NULLIFIER_TREE_ID = 0;
uint256 internal constant NOTE_HASH_TREE_ID = 1;
Expand All @@ -71,6 +70,25 @@ library Constants {
uint256 internal constant PUBLIC_DATA_SUBTREE_SIBLING_PATH_LENGTH = 34;
uint256 internal constant L1_TO_L2_MSG_SUBTREE_HEIGHT = 4;
uint256 internal constant L1_TO_L2_MSG_SUBTREE_SIBLING_PATH_LENGTH = 12;
uint256 internal constant PRIVATE_KERNEL_INIT_INDEX = 0;
uint256 internal constant PRIVATE_KERNEL_INNER_INDEX = 1;
uint256 internal constant PRIVATE_KERNEL_RESET_FULL_INDEX = 2;
uint256 internal constant PRIVATE_KERNEL_RESET_BIG_INDEX = 3;
uint256 internal constant PRIVATE_KERNEL_RESET_MEDIUM_INDEX = 4;
uint256 internal constant PRIVATE_KERNEL_RESET_SMALL_INDEX = 5;
uint256 internal constant PRIVATE_KERNEL_TAIL_INDEX = 10;
uint256 internal constant PRIVATE_KERNEL_TAIL_TO_PUBLIC_INDEX = 11;
uint256 internal constant EMPTY_NESTED_INDEX = 12;
uint256 internal constant PRIVATE_KERNEL_EMPTY_INDEX = 13;
uint256 internal constant PUBLIC_KERNEL_SETUP_INDEX = 14;
uint256 internal constant PUBLIC_KERNEL_APP_LOGIC_INDEX = 15;
uint256 internal constant PUBLIC_KERNEL_TEARDOWN_INDEX = 16;
uint256 internal constant PUBLIC_KERNEL_TAIL_INDEX = 17;
uint256 internal constant BASE_PARITY_INDEX = 18;
uint256 internal constant ROOT_PARITY_INDEX = 19;
uint256 internal constant BASE_ROLLUP_INDEX = 20;
uint256 internal constant MERGE_ROLLUP_INDEX = 21;
uint256 internal constant ROOT_ROLLUP_INDEX = 22;
uint256 internal constant FUNCTION_SELECTOR_NUM_BYTES = 4;
uint256 internal constant ARGS_HASH_CHUNK_LENGTH = 16;
uint256 internal constant ARGS_HASH_CHUNK_COUNT = 16;
Expand Down Expand Up @@ -142,7 +160,7 @@ library Constants {
uint256 internal constant SCOPED_ENCRYPTED_LOG_HASH_LENGTH = 5;
uint256 internal constant NOTE_LOG_HASH_LENGTH = 4;
uint256 internal constant NOTE_HASH_LENGTH = 2;
uint256 internal constant SCOPED_NOTE_HASH_LENGTH = 4;
uint256 internal constant SCOPED_NOTE_HASH_LENGTH = 3;
uint256 internal constant NULLIFIER_LENGTH = 3;
uint256 internal constant SCOPED_NULLIFIER_LENGTH = 4;
uint256 internal constant CALLER_CONTEXT_LENGTH = 3;
Expand All @@ -164,15 +182,15 @@ library Constants {
uint256 internal constant VALIDATION_REQUESTS_LENGTH = 1026;
uint256 internal constant PUBLIC_DATA_UPDATE_REQUEST_LENGTH = 3;
uint256 internal constant COMBINED_ACCUMULATED_DATA_LENGTH = 333;
uint256 internal constant COMBINED_CONSTANT_DATA_LENGTH = 40;
uint256 internal constant COMBINED_CONSTANT_DATA_LENGTH = 41;
uint256 internal constant CALL_REQUEST_LENGTH = 7;
uint256 internal constant PRIVATE_ACCUMULATED_DATA_LENGTH = 1152;
uint256 internal constant PRIVATE_KERNEL_CIRCUIT_PUBLIC_INPUTS_LENGTH = 2227;
uint256 internal constant PRIVATE_ACCUMULATED_DATA_LENGTH = 1088;
uint256 internal constant PRIVATE_KERNEL_CIRCUIT_PUBLIC_INPUTS_LENGTH = 2164;
uint256 internal constant PUBLIC_ACCUMULATED_DATA_LENGTH = 983;
uint256 internal constant PUBLIC_KERNEL_CIRCUIT_PUBLIC_INPUTS_LENGTH = 3258;
uint256 internal constant KERNEL_CIRCUIT_PUBLIC_INPUTS_LENGTH = 383;
uint256 internal constant CONSTANT_ROLLUP_DATA_LENGTH = 14;
uint256 internal constant BASE_OR_MERGE_PUBLIC_INPUTS_LENGTH = 31;
uint256 internal constant PUBLIC_KERNEL_CIRCUIT_PUBLIC_INPUTS_LENGTH = 3259;
uint256 internal constant KERNEL_CIRCUIT_PUBLIC_INPUTS_LENGTH = 384;
uint256 internal constant CONSTANT_ROLLUP_DATA_LENGTH = 11;
uint256 internal constant BASE_OR_MERGE_PUBLIC_INPUTS_LENGTH = 28;
uint256 internal constant ENQUEUE_PUBLIC_FUNCTION_CALL_RETURN_LENGTH = 9;
uint256 internal constant GET_NOTES_ORACLE_RETURN_LENGTH = 674;
uint256 internal constant NOTE_HASHES_NUM_BYTES_PER_BASE_ROLLUP = 2048;
Expand Down
1 change: 1 addition & 0 deletions l1-contracts/src/core/libraries/Errors.sol
Original file line number Diff line number Diff line change
Expand Up @@ -47,6 +47,7 @@ library Errors {
error Rollup__TimestampTooOld(); // 0x72ed9c81
error Rollup__UnavailableTxs(bytes32 txsHash); // 0x414906c3
error Rollup__InvalidSequencer(address sequencer); // 0xa127a106
error Rollup__InvalidVkTreeRoot(bytes32 expected, bytes32 actual); // 0x0c6bdee9

// Registry
error Registry__RollupNotRegistered(address rollup); // 0xa1fee4cf
Expand Down
33 changes: 27 additions & 6 deletions l1-contracts/test/Rollup.t.sol
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,7 @@ contract RollupTest is DecoderBase {
registry = new Registry();
availabilityOracle = new AvailabilityOracle();
portalERC20 = new PortalERC20();
rollup = new Rollup(registry, availabilityOracle, IERC20(address(portalERC20)));
rollup = new Rollup(registry, availabilityOracle, IERC20(address(portalERC20)), bytes32(0));
inbox = Inbox(address(rollup.INBOX()));
outbox = Outbox(address(rollup.OUTBOX()));

Expand Down Expand Up @@ -85,7 +85,7 @@ contract RollupTest is DecoderBase {
availabilityOracle.publish(body);

vm.expectRevert(abi.encodeWithSelector(Errors.Rollup__InvalidChainId.selector, 0x420, 31337));
rollup.process(header, archive, bytes(""), bytes(""));
rollup.process(header, archive, bytes32(0), bytes(""), bytes(""));
}

function testRevertInvalidVersion() public {
Expand All @@ -101,7 +101,7 @@ contract RollupTest is DecoderBase {
availabilityOracle.publish(body);

vm.expectRevert(abi.encodeWithSelector(Errors.Rollup__InvalidVersion.selector, 0x420, 1));
rollup.process(header, archive, bytes(""), bytes(""));
rollup.process(header, archive, bytes32(0), bytes(""), bytes(""));
}

function testRevertTimestampInFuture() public {
Expand All @@ -118,7 +118,7 @@ contract RollupTest is DecoderBase {
availabilityOracle.publish(body);

vm.expectRevert(abi.encodeWithSelector(Errors.Rollup__TimestampInFuture.selector));
rollup.process(header, archive, bytes(""), bytes(""));
rollup.process(header, archive, bytes32(0), bytes(""), bytes(""));
}

function testRevertTimestampTooOld() public {
Expand All @@ -133,7 +133,28 @@ contract RollupTest is DecoderBase {
availabilityOracle.publish(body);

vm.expectRevert(abi.encodeWithSelector(Errors.Rollup__TimestampTooOld.selector));
rollup.process(header, archive, bytes(""), bytes(""));
rollup.process(header, archive, bytes32(0), bytes(""), bytes(""));
}

function testRevertWrongVkTreeRoot() public {
bytes32 expectedVkTreeRoot = bytes32(uint256(28));
bytes32 actualVkTreeRoot = bytes32(uint256(27));

rollup.setVkTreeRoot(expectedVkTreeRoot);

DecoderBase.Data memory data = load("empty_block_0").block;
bytes memory header = data.header;
bytes32 archive = data.archive;
bytes memory body = data.body;

availabilityOracle.publish(body);

vm.expectRevert(
abi.encodeWithSelector(
Errors.Rollup__InvalidVkTreeRoot.selector, expectedVkTreeRoot, actualVkTreeRoot
)
);
rollup.process(header, archive, actualVkTreeRoot, bytes(""), bytes(""));
}

function _testBlock(string memory name) public {
Expand All @@ -153,7 +174,7 @@ contract RollupTest is DecoderBase {
uint256 toConsume = inbox.toConsume();

vm.record();
rollup.process(header, archive, bytes(""), bytes(""));
rollup.process(header, archive, bytes32(0), bytes(""), bytes(""));

assertEq(inbox.toConsume(), toConsume + 1, "Message subtree not consumed");

Expand Down
3 changes: 2 additions & 1 deletion l1-contracts/test/portals/TokenPortal.t.sol
Original file line number Diff line number Diff line change
Expand Up @@ -59,7 +59,8 @@ contract TokenPortalTest is Test {
function setUp() public {
registry = new Registry();
portalERC20 = new PortalERC20();
rollup = new Rollup(registry, new AvailabilityOracle(), IERC20(address(portalERC20)));
rollup =
new Rollup(registry, new AvailabilityOracle(), IERC20(address(portalERC20)), bytes32(0));
inbox = rollup.INBOX();
outbox = rollup.OUTBOX();

Expand Down
3 changes: 2 additions & 1 deletion l1-contracts/test/portals/UniswapPortal.t.sol
Original file line number Diff line number Diff line change
Expand Up @@ -52,7 +52,8 @@ contract UniswapPortalTest is Test {

registry = new Registry();
PortalERC20 portalERC20 = new PortalERC20();
rollup = new Rollup(registry, new AvailabilityOracle(), IERC20(address(portalERC20)));
rollup =
new Rollup(registry, new AvailabilityOracle(), IERC20(address(portalERC20)), bytes32(0));
registry.upgrade(address(rollup), address(rollup.INBOX()), address(rollup.OUTBOX()));
portalERC20.mint(address(rollup), 1000000);

Expand Down
4 changes: 4 additions & 0 deletions noir-projects/Earthfile
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,8 @@ source:

# Install nargo
COPY ../noir/+nargo/nargo /usr/bin/nargo
# Install bb
COPY ../barretenberg/cpp/+preset-release/bin/bb /usr/src/barretenberg/cpp/build/bin/bb

WORKDIR /usr/src/noir-projects

Expand All @@ -25,6 +27,8 @@ build-contracts:

build-protocol-circuits:
FROM +source
RUN --secret AWS_ACCESS_KEY_ID --secret AWS_SECRET_ACCESS_KEY mkdir -p ~/.aws && \
bash -c 'echo -e "[default]\naws_access_key_id=$AWS_ACCESS_KEY_ID\naws_secret_access_key=$AWS_SECRET_ACCESS_KEY" > ~/.aws/credentials'
RUN cd noir-protocol-circuits && NARGO=nargo ./bootstrap.sh
SAVE ARTIFACT noir-protocol-circuits

Expand Down
Loading
Loading