Levitation protocol is a modular decentralized sequencer (DS) platform that enables running multiple Zero Knowledge Rollups.
See Levitation protocol overview for more detail
This is repo is a Polygon Hermez module for Levitation.
Thanks to the Hermez team for all the code we are just making little tweaks!
For Levitation we need to inject little tweaks to the ZkEVM node. This is the frond end node that implements ETH API. Other components do not need to be modified much.
The tweaks are kept to minimum and marked with //LEVITATION_BEGIN
and //LEVITATION_END
comments in the code,
so we can keep pulling from ZKEVM node repo.
Development Milestones:
- Store transactions in decentralized sequencer on receipt (we are here now)
- Pull from DS into node and prove a block
- Push proven block back to DS
- Push from DS to ETH mainnet
- Schedule operation of multiple nodes in time-slots
- Identify possible node mis misbehaviors and punish on-chain
git clone --recurse-submodules https://github.com/skalenetwork/levitation_module_polygon_hermez.git
cd levitation_module_polygon_hermez
Install Go Version 1.20
sudo add-apt-repository ppa:longsleep/golang-backports
sudo apt-get update
sudo apt-get install golang-go
Build node
make build
cd test
Compile smartcontracts
make compile-scs
This will run all node Go tests using the build node binary, and span a number five containers that run other components.
The components include
- a test ETH l1 network based on a geth docker container zkevm-mock-l1-network
- zkevm-prover that does number crunching
- three postgres instances zkevm-event-db, zkevm-pool-db and zkevm-state-db,
hermeznetwork/geth-zkevm-contracts:v2.0.0-RC1-fork.5-geth1.12.0 0.0.0.0:8545-8546->8545-8546/tcp, :::8545-8546->8545-8546/tcp, 30303/tcp, 30303/udp zkevm-mock-l1-network
hermeznetwork/zkevm-prover:v0.2.0-RC3 0.0.0.0:50052->50052/tcp, :::50052->50052/tcp, 0.0.0.0:50061->50061/tcp, :::50061->50061/tcp, 0.0.0.0:50071->50071/tcp, :::50071->50071/tcp zkevm-prover
postgres 0.0.0.0:5435->5432/tcp, :::5435->5432/tcp zkevm-event-db
postgres 0.0.0.0:5433->5432/tcp, :::5433->5432/tcp zkevm-pool-db
postgres 0.0.0.0:5432->5432/tcp, :::5432->5432/tcp zkevm-state-db
The node binary will run outside docker. Note that it will not rebuild the binary if you make code changes.
Note, that it will not rebuild the local node docker image.
cd test
sudo ZKPROVER_URI=127.0.0.1 make test-full-non-e2e
zkEVM Node is a Go implementation of a node that operates zkEVM.
Since this is an implementation of a protocol it's fundamental to understand it, here you can find the specification of the protocol.
Glossary:
- L1: Base blockchain where the rollup smart contracts are deployed. It's Ethereum or a testnet of Ethereum, but it could be any EVM compatible blockchain.
- L2: the rollup network aka the Polygon zkEVM network.
- Batch: a group of transactions that are executed/proved, using the zkEVM prover and sent to / synchronized from L1
- Sequencer: the actor that is responsible for selecting transactions, putting them in a specific order, and sending them in batches to L1
- Trusted sequencer: sequencer that has special privileges, there can only be one trusted sequencer. The privileges granted to the trusted sequencer allow it to forecast the batches that will be applied to L1. This way it can commit to a specific sequence before interacting with L1. This is done to achieve fast finality and reduce costs associated with using the network (lower gas fees)
- Permissionless sequencer: sequencer role that can be performed by anyone. It has competitive disadvantages compared to the trusted sequencer (slow finality, MEV attacks). Its main purpose is to provide censorship resistance and unstoppability features to the network.
- Sequence: Group of batches and other metadata that the trusted sequencer sends to L1 to update the state
- Forced batch: batch that is sent by permissionless sequencers to L1 to update the state
- L2 Block: Same as an L1 block, but for L2. This is mostly used by the JSON RPC interface. Currently, all the L2 Blocks are set to only include one transaction, this is done to achieve instant finality: it's not necessary to close a batch to allow the JSON RPC to expose results of already processed transactions
- Trusted state: state reached through processing transactions that have been shared by the trusted sequencer. This state is considered trusted as the trusted sequencer could commit to a certain sequence, and then send a different one to L1
- Virtual state: state reached through processing transactions that have already been submitted to L1. These transactions are sent in batches by either trusted or permissionless sequencers. Those batches are also called virtual batches. Note that this state is trustless as it relies on L1 security assumptions
- Consolidated state: state that is proven on-chain by submitting a ZKP (Zero Knowledge Proof) that proves the execution of a sequence of the last virtual batch.
- Invalid transaction: a transaction that can't be processed and doesn't affect the state. Note that such a transaction could be included in a virtual batch. The reason for a transaction to be invalid could be related to the Ethereum protocol (invalid nonce, not enough balance, ...) or due to limitations introduced by the zkEVM (each batch can make use of a limited amount of resources such as the total amount of keccak hashes that can be computed)
- Reverted transaction: a transaction that is executed, but is reverted (because of smart contract logic). The main difference with invalid transaction is that this transaction modifies the state, at least to increment nonce of the sender.
- Proof of Efficiency (PoE): name of the protocol used by the network, it's enforced by the smart contracts
The diagram represents the main components of the software and how they interact between them. Note that this reflects a single entity running a node, in particular a node that acts as the trusted sequencer. But there are many entities running nodes in the network, and each of these entities can perform different roles. More on this later.
- (JSON) RPC: an interface that allows users (metamask, etherscan, ...) to interact with the node. Fully compatible with Ethereum RPC + some extra endpoints specifics of the network. It interacts with the
state
to get data and process transactions and with thepool
to store transactions - Pool: DB that stores transactions by the
RPC
to be selected/discarded by thesequencer
later on - Trusted Sequencer: get transactions from the
pool
, check if they are valid by processing them using thestate
, and create sequences. Once transactions are added into the state, they are immediately available through therpc
. Sequences are sent to L1 using theetherman
- Permissionless Sequencer: coming soon
- Etherman: abstraction that implements the needed methods to interact with the Ethereum network and the relevant smart contracts.
- Synchronizer: Updates the
state
by fetching data from Ethereum through theetherman
. If the node is not atrusted sequencer
it also updates the state with the data fetched from therpc
of thetrusted sequencer
. It also detects and handles reorgs that can happen if thetrusted sequencer
sends different data in the rpc vs the sequences sent to L1 (trusted vs virtual state) - State: Responsible for managing the state data (batches, blocks, transactions, ...) that is stored on the
state SB
. It also handles the integration with theexecutor
and theMerkletree
service - State DB: persistence layer for the state data (except the Merkletree that is handled by the
Merkletree
service) - Aggregator: consolidates batches by generating ZKPs (Zero Knowledge proofs). To do so it gathers the necessary data that the
prover
needs as input through thestate
and sends a request to it. Once the proof is generated it's sent to Ethereum through theetherman
- Prover/Executor: service that generates ZK proofs. Note that this component is not implemented in this repository, and it's treated as a "black box" from the perspective of the node. The prover/executor has two implementations: JS reference implementation and C production-ready implementation. Although it's the same software/service, it has two very different purposes:
- Provide an EVM implementation that allows processing transactions and getting all needed results metadata (state root, receipts, logs, ...)
- Generate ZKPs
- Merkletree: service that stores the Merkletree, containing all the account information (balances, nonces, smart contract code, and smart contract storage). This component is also not implemented in this repo and is consumed as an external service by the node. The implementation can be found here
The node software is designed to support the execution of multiple roles. Each role requires different services to work. Most of the services can run in different instances, and the JSON RPC can run in many instances (all the other services must have a single instance)
This role can be performed by anyone.
Required services and components:
- JSON RPC: can run in a separated instance, and can have multiple instances
- Synchronizer: single instance that can run on a separate instance
- Executor & Merkletree: service that can run on a separate instance
- State DB: Postgres SQL that can be run in a separate instance
There must be only one synchronizer, and it's recommended that it has exclusive access to an executor instance, although it's not necessary. This role can perfectly be run in a single instance, however, the JSON RPC and executor services can benefit from running in multiple instances, if the performance decreases due to the number of requests received
This role can only be performed by a single entity. This is enforced in the smart contract, as the related methods of the trusted sequencer can only be performed by the owner of a particular private key.
Required services and components:
- JSON RPC: can run in a separated instance, and can have multiple instances
- Sequencer & Synchronizer: single instance that needs to run together
- Executor & Merkletree: service that can run on a separate instance
- Pool DB: Postgres SQL that can be run in a separate instance
- State DB: Postgres SQL that can be run in a separate instance
Note that the JSON RPC is required to receive transactions. It's recommended that the JSON RPC runs on separated instances, and potentially more than one (depending on the load of the network). It's also recommended that the JSON RPC and the Sequencer don't share the same executor instance, to make sure that the sequencer has exclusive access to an executor
TBD
This role can be performed by anyone.
Required services and components:
- Synchronizer: single instance that can run on a separated instance
- Executor & Merkletree: service that can run on a separate instance
- State DB: Postgres SQL that can be run in a separate instance
- Aggregator: single instance that can run on a separated instance
- Prover: single instance that can run on a separated instance
- Executor: single instance that can run on a separated instance
It's recommended that the prover is run on a separate instance, as it has important hardware requirements. On the other hand, all the other components can run on a single instance,
It's recommended to use make
for building, and testing the code, ... Run make help
to get a list of the available commands.
- Go 1.19
- Docker
- Docker Compose
- Make
- GCC