Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore: Update SDK example for app and EVM proofs #1163

Merged
merged 4 commits into from
Jan 4, 2025
Merged
Show file tree
Hide file tree
Changes from 2 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
74 changes: 55 additions & 19 deletions book/src/advanced-usage/sdk.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,41 +2,41 @@

While the CLI provides a convenient way to build, prove, and verify programs, you may want more fine-grained control over the process. The OpenVM Rust SDK allows you to customize various aspects of the workflow programmatically.

For more information on the basic CLI flow, see [Overview of Basic Usage](../writing-apps/overview.md). Writing a guest program is the same as in the CLI.
For more information on the basic CLI flow, see [Overview of Basic Usage](../../writing-apps/overview.md). Writing a guest program is the same as in the CLI.
ytham marked this conversation as resolved.
Show resolved Hide resolved

## Imports and Setup

If you have a guest program and would like to try running the **host program** specified below, you can do so by adding the following imports and setup at the top of the file. You may need to modify the imports and/or the `SomeStruct` struct to match your program.
If you have a guest program and would like to try running the **host program** specified in the next section, you can do so by adding the following imports and setup at the top of the file. You may need to modify the imports and/or the `SomeStruct` struct to match your program.

```rust,no_run,noplayground
{{ #include ../../../crates/sdk/examples/sdk.rs:dependencies }}
{{ #include ../../../crates/sdk/examples/sdk_app.rs:dependencies }}
```

## Building and Transpiling a Program

The SDK provides lower-level control over the building and transpiling process.

```rust,no_run,noplayground
{{ #include ../../../crates/sdk/examples/sdk.rs:build }}
{{ #include ../../../crates/sdk/examples/sdk.rs:read_elf}}
{{ #include ../../../crates/sdk/examples/sdk_app.rs:build }}
{{ #include ../../../crates/sdk/examples/sdk_app.rs:read_elf}}

{{ #include ../../../crates/sdk/examples/sdk.rs:transpilation }}
{{ #include ../../../crates/sdk/examples/sdk_app.rs:transpilation }}
```

### Using `SdkVmConfig`

The `SdkVmConfig` struct allows you to specify the extensions and system configuration your VM will use. To customize your own configuration, you can use the `SdkVmConfig::builder()` method and set the extensions and system configuration you want.

```rust,no_run,noplayground
{{ #include ../../../crates/sdk/examples/sdk.rs:vm_config }}
{{ #include ../../../crates/sdk/examples/sdk_app.rs:vm_config }}
```

## Running a Program

To run your program and see the public value output, you can do the following:

```rust,no_run,noplayground
{{ #include ../../../crates/sdk/examples/sdk.rs:execution }}
{{ #include ../../../crates/sdk/examples/sdk_app.rs:execution }}
```

### Using `StdIn`
Expand All @@ -46,37 +46,73 @@ The `StdIn` struct allows you to format any serializable type into a VM-readable
> **Generating CLI Bytes**
> To get the VM byte representation of a serializable struct `data` (i.e. for use in the CLI), you can print out the result of `openvm::serde::to_vec(data).unwrap()` in a Rust host program.

## Generating Proofs
## Generating and Verifying Proofs

There are two types of proofs that you can generate, with the sections below continuing from this point.

- [App Proof](#app-proof): Generates a STARK proof of the guest program
ytham marked this conversation as resolved.
Show resolved Hide resolved
- [EVM Proof](#evm-proof): Generates a halo2 proof that can be posted on-chain

## App Proof

### Generating App Proofs

After building and transpiling a program, you can then generate a proof. To do so, you need to commit your `VmExe`, generate an `AppProvingKey`, format your input into `StdIn`, and then generate a proof.

```rust,no_run,noplayground
{{ #include ../../../crates/sdk/examples/sdk.rs:proof_generation }}
{{ #include ../../../crates/sdk/examples/sdk_app.rs:proof_generation }}
```

## Verifying Proofs
### Verifying App Proofs

After generating a proof, you can verify it. To do so, you need your verifying key (which you can get from your `AppProvingKey`) and the output of your `generate_app_proof` call.

```rust,no_run,noplayground
{{ #include ../../../crates/sdk/examples/sdk.rs:verification }}
{{ #include ../../../crates/sdk/examples/sdk_app.rs:verification }}
```

## End-to-end EVM Proof Generation and Verification
## EVM Proof

Generating and verifying an EVM proof is an extension of the above process.
### Setup

```rust,no_run,noplayground
{{ #include ../../../crates/sdk/examples/sdk.rs:evm_verification }}
To generate an EVM proof, you'll first need to ensure that you have followed the [CLI installation steps](../../getting-started/install.md). get the appropraite KZG params by running the following command.

```bash
cargo openvm setup
```

> ⚠️ **WARNING**
> Generating an EVM proof will require a substantial amount of computation and memory. If you have run `cargo openvm setup` and don't need a specialized aggregation configuration, consider deserializing the proving key from the file `~/.openvm/agg.pk` instead of generating it.

> ⚠️ **WARNING**
> The aggregation proving key `agg_pk` above is large. Avoid cloning it if possible.
> `cargo openvm setup` requires very large amounts of computation and memory (~200 GB).

<details>
<summary>Also note that there are additional dependncies for the EVM Proof flow. Click here to show.</summary>
ytham marked this conversation as resolved.
Show resolved Hide resolved

```rust,no_run,noplayground
{{ #include ../../../crates/sdk/examples/sdk_app.rs:dependencies }}
```

</details>

Note that `DEFAULT_PARAMS_DIR` is the directory where Halo2 parameters are stored by the `cargo openvm setup` CLI command. For more information on the setup process, see the `EVM Level` section of the [verify](../writing-apps/verify.md) doc.
### Keygen

Now, you'll still need to generate the app proving key for the next step.

```rust,no_run,noplayground
{{ #include ../../../crates/sdk/examples/sdk_evm.rs:keygen }}
```

### EVM Proof Generation and Verification

You can now run the aggregation keygen, proof, and verification functions for the EVM proof. Note, you **do not** need to generate the app proof `generate_app_proof` with, as the EVM proof function will handle this automatically.

```rust,no_run,noplayground
{{ #include ../../../crates/sdk/examples/sdk_evm.rs:evm_verification }}
```

> ⚠️ **WARNING**
> `cargo openvm setup` requires very large amounts of computation and memory (~200 GB).
> The aggregation proving key `agg_pk` above is large. Avoid cloning it if possible.

Note that `DEFAULT_PARAMS_DIR` is the directory where Halo2 parameters are stored by the `cargo openvm setup` CLI command. For more information on the setup process, see the `EVM Level` section of the [verify](../../writing-apps/verify.md) doc.
27 changes: 1 addition & 26 deletions crates/sdk/examples/sdk.rs → crates/sdk/examples/sdk_app.rs
Original file line number Diff line number Diff line change
Expand Up @@ -4,9 +4,8 @@ use std::{fs, sync::Arc};
use eyre::Result;
use openvm::platform::memory::MEM_SIZE;
use openvm_build::GuestOptions;
use openvm_native_recursion::halo2::utils::CacheHalo2ParamsReader;
use openvm_sdk::{
config::{AggConfig, AppConfig, SdkVmConfig},
config::{AppConfig, SdkVmConfig},
prover::AppProver,
Sdk, StdIn,
};
Expand Down Expand Up @@ -102,29 +101,5 @@ fn main() -> Result<(), Box<dyn std::error::Error>> {
sdk.verify_app_proof(&app_vk, &proof)?;
// ANCHOR_END: verification

// ANCHOR: evm_verification
// 11. Generate the aggregation proving key
const DEFAULT_PARAMS_DIR: &str = concat!(env!("HOME"), "/.openvm/params/");
let halo2_params_reader = CacheHalo2ParamsReader::new(DEFAULT_PARAMS_DIR);
let agg_config = AggConfig::default();
let agg_pk = sdk.agg_keygen(agg_config, &halo2_params_reader)?;

// 12. Generate the SNARK verifier contract
let verifier = sdk.generate_snark_verifier_contract(&halo2_params_reader, &agg_pk)?;

// 13. Generate an EVM proof
let proof = sdk.generate_evm_proof(
&halo2_params_reader,
app_pk,
app_committed_exe,
agg_pk,
stdin,
)?;

// 14. Verify the EVM proof
let success = sdk.verify_evm_proof(&verifier, &proof);
assert!(success);
// ANCHOR_END: evm_verification

Ok(())
}
112 changes: 112 additions & 0 deletions crates/sdk/examples/sdk_evm.rs
jonathanpwang marked this conversation as resolved.
Show resolved Hide resolved
Original file line number Diff line number Diff line change
@@ -0,0 +1,112 @@
// ANCHOR: dependencies
use std::{fs, sync::Arc};

use eyre::Result;
use openvm::platform::memory::MEM_SIZE;
use openvm_build::GuestOptions;
use openvm_native_recursion::halo2::utils::CacheHalo2ParamsReader;
use openvm_sdk::{
config::{AggConfig, AppConfig, SdkVmConfig},
Sdk, StdIn,
};
use openvm_stark_sdk::config::FriParameters;
use openvm_transpiler::elf::Elf;
use serde::{Deserialize, Serialize};

#[derive(Serialize, Deserialize)]
pub struct SomeStruct {
pub a: u64,
pub b: u64,
}
// ANCHOR_END: dependencies

#[allow(dead_code, unused_variables)]
fn read_elf() -> Result<(), Box<dyn std::error::Error>> {
// ANCHOR: read_elf
// 2b. Load the ELF from a file
let elf_bytes = fs::read("your_path_to_elf")?;
let elf = Elf::decode(&elf_bytes, MEM_SIZE as u32)?;
// ANCHOR_END: read_elf
Ok(())
}

#[allow(unused_variables, unused_doc_comments)]
fn main() -> Result<(), Box<dyn std::error::Error>> {
// ANCHOR: vm_config
let vm_config = SdkVmConfig::builder()
.system(Default::default())
.rv32i(Default::default())
.rv32m(Default::default())
.io(Default::default())
.build();
// ANCHOR_END: vm_config

/// to import example guest code in crate replace `target_path` for:
/// ```
/// use std::path::PathBuf;
///
/// let mut path = PathBuf::from(env!("CARGO_MANIFEST_DIR")).to_path_buf();
/// path.push("guest");
/// let target_path = path.to_str().unwrap();
/// ```
// ANCHOR: build
// 1. Build the VmConfig with the extensions needed.
let sdk = Sdk;

// 2a. Build the ELF with guest options and a target filter.
let guest_opts = GuestOptions::default();
let target_path = "your_path_project_root";
let elf = sdk.build(guest_opts, target_path, &Default::default())?;
// ANCHOR_END: build

// ANCHOR: transpilation
// 3. Transpile the ELF into a VmExe
let exe = sdk.transpile(elf, vm_config.transpiler())?;
// ANCHOR_END: transpilation

// ANCHOR: execution
// 4. Format your input into StdIn
let my_input = SomeStruct { a: 1, b: 2 }; // anything that can be serialized
let mut stdin = StdIn::default();
stdin.write(&my_input);
// ANCHOR_END: execution

// ANCHOR: keygen
// 5. Set app configuration
let app_log_blowup = 2;
let app_fri_params = FriParameters::standard_with_100_bits_conjectured_security(app_log_blowup);
let app_config = AppConfig::new(app_fri_params, vm_config);

// 6. Commit the exe
let app_committed_exe = sdk.commit_app_exe(app_fri_params, exe)?;

// 7. Generate an AppProvingKey
let app_pk = Arc::new(sdk.app_keygen(app_config)?);
// ANCHOR_END: keygen

// ANCHOR: evm_verification
// 8. Generate the aggregation proving key
const DEFAULT_PARAMS_DIR: &str = concat!(env!("HOME"), "/.openvm/params/");
let halo2_params_reader = CacheHalo2ParamsReader::new(DEFAULT_PARAMS_DIR);
let agg_config = AggConfig::default();
let agg_pk = sdk.agg_keygen(agg_config, &halo2_params_reader)?;

// 9. Generate the SNARK verifier contract
let verifier = sdk.generate_snark_verifier_contract(&halo2_params_reader, &agg_pk)?;

// 10. Generate an EVM proof
let proof = sdk.generate_evm_proof(
&halo2_params_reader,
app_pk,
app_committed_exe,
agg_pk,
stdin,
)?;

// 11. Verify the EVM proof
let success = sdk.verify_evm_proof(&verifier, &proof);
assert!(success);
// ANCHOR_END: evm_verification

Ok(())
}