Skip to content

Decentralized Levitation Sequencer Module to run Polygon Hermez on SKALE chains

License

Notifications You must be signed in to change notification settings

skalenetwork/levitation_module_polygon_hermez

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

What is Levitation?

Levitation protocol is a modular decentralized sequencer (DS) platform that enables running multiple Zero Knowledge Rollups.

See Levitation protocol overview for more detail

This is repo is a Polygon Hermez module for Levitation.

Thanks to the Hermez team for all the code we are just making little tweaks!

For Levitation we need to inject little tweaks to the ZkEVM node. This is the frond end node that implements ETH API. Other components do not need to be modified much.

The tweaks are kept to minimum and marked with //LEVITATION_BEGIN and //LEVITATION_END comments in the code, so we can keep pulling from ZKEVM node repo.

Development Milestones:

  • Store transactions in decentralized sequencer on receipt (we are here now)
  • Pull from DS into node and prove a block
  • Push proven block back to DS
  • Push from DS to ETH mainnet
  • Schedule operation of multiple nodes in time-slots
  • Identify possible node mis misbehaviors and punish on-chain

Clone repo

git clone --recurse-submodules https://github.com/skalenetwork/levitation_module_polygon_hermez.git
cd levitation_module_polygon_hermez

Build on Ubuntu 22

Install Go Version 1.20

sudo add-apt-repository ppa:longsleep/golang-backports
sudo apt-get update
sudo apt-get install golang-go

Build node

make build

Simple way to run tests

cd test

Compile smartcontracts

make compile-scs

This will run all node Go tests using the build node binary, and span a number five containers that run other components.

The components include

  • a test ETH l1 network based on a geth docker container zkevm-mock-l1-network
  • zkevm-prover that does number crunching
  • three postgres instances zkevm-event-db, zkevm-pool-db and zkevm-state-db,
hermeznetwork/geth-zkevm-contracts:v2.0.0-RC1-fork.5-geth1.12.0   0.0.0.0:8545-8546->8545-8546/tcp, :::8545-8546->8545-8546/tcp, 30303/tcp, 30303/udp                                                           zkevm-mock-l1-network
hermeznetwork/zkevm-prover:v0.2.0-RC3                             0.0.0.0:50052->50052/tcp, :::50052->50052/tcp, 0.0.0.0:50061->50061/tcp, :::50061->50061/tcp, 0.0.0.0:50071->50071/tcp, :::50071->50071/tcp   zkevm-prover
postgres                                                          0.0.0.0:5435->5432/tcp, :::5435->5432/tcp                                                                                                     zkevm-event-db
postgres                                                          0.0.0.0:5433->5432/tcp, :::5433->5432/tcp                                                                                                     zkevm-pool-db
postgres                                                          0.0.0.0:5432->5432/tcp, :::5432->5432/tcp                                                                                                     zkevm-state-db

The node binary will run outside docker. Note that it will not rebuild the binary if you make code changes.

Note, that it will not rebuild the local node docker image.

cd test
sudo ZKPROVER_URI=127.0.0.1  make test-full-non-e2e

zkEVM Node

zkEVM Node is a Go implementation of a node that operates zkEVM.

Since this is an implementation of a protocol it's fundamental to understand it, here you can find the specification of the protocol.

Glossary:

  • L1: Base blockchain where the rollup smart contracts are deployed. It's Ethereum or a testnet of Ethereum, but it could be any EVM compatible blockchain.
  • L2: the rollup network aka the Polygon zkEVM network.
  • Batch: a group of transactions that are executed/proved, using the zkEVM prover and sent to / synchronized from L1
  • Sequencer: the actor that is responsible for selecting transactions, putting them in a specific order, and sending them in batches to L1
  • Trusted sequencer: sequencer that has special privileges, there can only be one trusted sequencer. The privileges granted to the trusted sequencer allow it to forecast the batches that will be applied to L1. This way it can commit to a specific sequence before interacting with L1. This is done to achieve fast finality and reduce costs associated with using the network (lower gas fees)
  • Permissionless sequencer: sequencer role that can be performed by anyone. It has competitive disadvantages compared to the trusted sequencer (slow finality, MEV attacks). Its main purpose is to provide censorship resistance and unstoppability features to the network.
  • Sequence: Group of batches and other metadata that the trusted sequencer sends to L1 to update the state
  • Forced batch: batch that is sent by permissionless sequencers to L1 to update the state
  • L2 Block: Same as an L1 block, but for L2. This is mostly used by the JSON RPC interface. Currently, all the L2 Blocks are set to only include one transaction, this is done to achieve instant finality: it's not necessary to close a batch to allow the JSON RPC to expose results of already processed transactions
  • Trusted state: state reached through processing transactions that have been shared by the trusted sequencer. This state is considered trusted as the trusted sequencer could commit to a certain sequence, and then send a different one to L1
  • Virtual state: state reached through processing transactions that have already been submitted to L1. These transactions are sent in batches by either trusted or permissionless sequencers. Those batches are also called virtual batches. Note that this state is trustless as it relies on L1 security assumptions
  • Consolidated state: state that is proven on-chain by submitting a ZKP (Zero Knowledge Proof) that proves the execution of a sequence of the last virtual batch.
  • Invalid transaction: a transaction that can't be processed and doesn't affect the state. Note that such a transaction could be included in a virtual batch. The reason for a transaction to be invalid could be related to the Ethereum protocol (invalid nonce, not enough balance, ...) or due to limitations introduced by the zkEVM (each batch can make use of a limited amount of resources such as the total amount of keccak hashes that can be computed)
  • Reverted transaction: a transaction that is executed, but is reverted (because of smart contract logic). The main difference with invalid transaction is that this transaction modifies the state, at least to increment nonce of the sender.
  • Proof of Efficiency (PoE): name of the protocol used by the network, it's enforced by the smart contracts

Architecture

The diagram represents the main components of the software and how they interact between them. Note that this reflects a single entity running a node, in particular a node that acts as the trusted sequencer. But there are many entities running nodes in the network, and each of these entities can perform different roles. More on this later.

  • (JSON) RPC: an interface that allows users (metamask, etherscan, ...) to interact with the node. Fully compatible with Ethereum RPC + some extra endpoints specifics of the network. It interacts with the state to get data and process transactions and with the pool to store transactions
  • Pool: DB that stores transactions by the RPC to be selected/discarded by the sequencer later on
  • Trusted Sequencer: get transactions from the pool, check if they are valid by processing them using the state, and create sequences. Once transactions are added into the state, they are immediately available through the rpc. Sequences are sent to L1 using the etherman
  • Permissionless Sequencer: coming soon
  • Etherman: abstraction that implements the needed methods to interact with the Ethereum network and the relevant smart contracts.
  • Synchronizer: Updates the state by fetching data from Ethereum through the etherman. If the node is not a trusted sequencer it also updates the state with the data fetched from the rpc of the trusted sequencer. It also detects and handles reorgs that can happen if the trusted sequencer sends different data in the rpc vs the sequences sent to L1 (trusted vs virtual state)
  • State: Responsible for managing the state data (batches, blocks, transactions, ...) that is stored on the state SB. It also handles the integration with the executor and the Merkletree service
  • State DB: persistence layer for the state data (except the Merkletree that is handled by the Merkletree service)
  • Aggregator: consolidates batches by generating ZKPs (Zero Knowledge proofs). To do so it gathers the necessary data that the prover needs as input through the state and sends a request to it. Once the proof is generated it's sent to Ethereum through the etherman
  • Prover/Executor: service that generates ZK proofs. Note that this component is not implemented in this repository, and it's treated as a "black box" from the perspective of the node. The prover/executor has two implementations: JS reference implementation and C production-ready implementation. Although it's the same software/service, it has two very different purposes:
    • Provide an EVM implementation that allows processing transactions and getting all needed results metadata (state root, receipts, logs, ...)
    • Generate ZKPs
  • Merkletree: service that stores the Merkletree, containing all the account information (balances, nonces, smart contract code, and smart contract storage). This component is also not implemented in this repo and is consumed as an external service by the node. The implementation can be found here

Roles of the network

The node software is designed to support the execution of multiple roles. Each role requires different services to work. Most of the services can run in different instances, and the JSON RPC can run in many instances (all the other services must have a single instance)

RPC

This role can be performed by anyone.

Required services and components:

  • JSON RPC: can run in a separated instance, and can have multiple instances
  • Synchronizer: single instance that can run on a separate instance
  • Executor & Merkletree: service that can run on a separate instance
  • State DB: Postgres SQL that can be run in a separate instance

There must be only one synchronizer, and it's recommended that it has exclusive access to an executor instance, although it's not necessary. This role can perfectly be run in a single instance, however, the JSON RPC and executor services can benefit from running in multiple instances, if the performance decreases due to the number of requests received

Trusted sequencer

This role can only be performed by a single entity. This is enforced in the smart contract, as the related methods of the trusted sequencer can only be performed by the owner of a particular private key.

Required services and components:

  • JSON RPC: can run in a separated instance, and can have multiple instances
  • Sequencer & Synchronizer: single instance that needs to run together
  • Executor & Merkletree: service that can run on a separate instance
  • Pool DB: Postgres SQL that can be run in a separate instance
  • State DB: Postgres SQL that can be run in a separate instance

Note that the JSON RPC is required to receive transactions. It's recommended that the JSON RPC runs on separated instances, and potentially more than one (depending on the load of the network). It's also recommended that the JSON RPC and the Sequencer don't share the same executor instance, to make sure that the sequencer has exclusive access to an executor

Permissionless sequencer

TBD

Aggregator

This role can be performed by anyone.

Required services and components:

  • Synchronizer: single instance that can run on a separated instance
  • Executor & Merkletree: service that can run on a separate instance
  • State DB: Postgres SQL that can be run in a separate instance
  • Aggregator: single instance that can run on a separated instance
  • Prover: single instance that can run on a separated instance
  • Executor: single instance that can run on a separated instance

It's recommended that the prover is run on a separate instance, as it has important hardware requirements. On the other hand, all the other components can run on a single instance,

Development

It's recommended to use make for building, and testing the code, ... Run make help to get a list of the available commands.

Running the node

Requirements

  • Go 1.19
  • Docker
  • Docker Compose
  • Make
  • GCC

About

Decentralized Levitation Sequencer Module to run Polygon Hermez on SKALE chains

Topics

Resources

License

Code of conduct

Security policy

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Go 92.4%
  • Solidity 5.6%
  • Other 2.0%