From 75dc8f2ec1f46ed5c2928aad2b87d495ffa26980 Mon Sep 17 00:00:00 2001 From: boneyard93501 <4523011+boneyard93501@users.noreply.github.com> Date: Sun, 26 Jun 2022 17:33:31 -0500 Subject: [PATCH] update Readme.md --- aqua-examples/evm-integration/README.md | 688 +++++++++++++++++++++++- 1 file changed, 687 insertions(+), 1 deletion(-) diff --git a/aqua-examples/evm-integration/README.md b/aqua-examples/evm-integration/README.md index 242c0e7..0bc2588 100644 --- a/aqua-examples/evm-integration/README.md +++ b/aqua-examples/evm-integration/README.md @@ -1,3 +1,689 @@ # EVM Integration Examples -Documentation coming soon. +## Overview + +The [Ethereum virtual machine](https://ethereum.org/en/developers/docs/evm/) (EVM) is available across a variety of L1, L2 and sidechains with implementations ranging from straight clones to [compatible or equivalent](https://metisdao.medium.com/evm-equivalence-vs-evm-compatibility-199bd66f455d) incarnations. [Ethereum JSON RPC](https://ethereum.github.io/execution-apis/api-documentation/) is the base API to access EVM functionality and the underlying request model for the various web3 libraries such as [ethers](https://docs.ethers.io/v5/) or [ethers-rs](https://docs.rs/ethers/0.1.3/ethers/). In theory, and sometimes even practice, this allows developers to reuse their contracts and Web3 code across different chains with no changes but a few parameters. + +While many of the various EVM chains provide the Web3 benefits desired, running (blockchain) clients tends to be a resource intensive adventure. Not surprisingly, a myriad of hosted node providers, such as [Infura](https://infura.io/), [Alchemy](https://www.alchemy.com/) and many more, provide relatively cheap access to a variety of chains. Alas, the benefits of convenience and low-to-no cost, the typical siren call of Web2 SaaS, comes at the price of introducing a single point of failure, trust in not finding your (personal) data on some blackhat site right beside the data from all the other "secure" SaaS vendors, and high exit barriers when adopting a hosting provider's specific API, thereby introducing a nontrivial chokepoint in your DApp. Morallis has a very strong [PoV](https://moralis.io/ethereum-rpc-nodes-what-they-are-and-why-you-shouldnt-use-them/) trying to convince developers to abandon open and common standards and lock into their custom APIs with high exit barriers. Of course, we'll ignore this rather self-serving piece of advice and embark on a journey in line with our Web3 ethos. + +In this tutorial, we illustrate how Fluence and Aqua can help DApp developers minimize and even eliminate centralized points of failure undermining the Web3 benefits of their DApp. + + +## Setting Up + +If you haven't set up your Fluence and Aqua development environment, head over to the [setup docs](https://doc.fluence.dev/docs/tutorials_tutorials/recipes_setting_up); if you're not familiar with Fluence and Aqua, give the [developer docs](https://doc.fluence.dev) a gander. + +In addition to the Fluence setup, you ought to sign up for a few hosted (EVM) node providers with JSON-RPC access as discussed below. + +### Selecting Providers + +A large number of EVM nodes are hosted by centralized providers such as [Alchemy](https://www.alchemy.com/), which isn't all that surprising how resource intensive it is to self-host nodes. The following hosting providers offer free JSON-RPC access but feel free to substitute as you see fit: + +* [Infura](https://infura.io/) + * need to sign up for a free account and get API lkey + * for Ethereum mainnet, our uri is: + +* [Alchemy](https://www.alchemy.com/) + * need to sign up for a free account and get API lkey + * for Ethereum mainnet, our uri is: + +* [Linkpool](https://linkpool.io/) + * no need to sign up or need for an API key + * is a light client limiting historic queries + * for Ethereum mainnet, our uri is: https://main-light.eth.linkpool.io + * does not work with "Accept: application/json" but only "Content-Type: application/json" header + +## Oracleizing Hosting Provider Responses + +Centralized hosted nodes introduce at best a single point of failure and at worst, a nefarious actor creating havoc with your DApp. Hence, a centralized source of truth easily negates the benefits of the decentralized backend. Without giving up all of the convenience and cost savings of hosted blochchain nodes, we can route identical requests to multiple hosted providers and determine, against some subjective metric, the acceptability of the responses. That is, we [oracleize](https://en.wikipedia.org/wiki/Blockchain_oracle) hosted provider responses. See Figure 1. + +```mermaid + sequenceDiagram + title: Figure 1: Stylize Oracle Over Multiple Host Providers + + participant C as Client + participant R as Relay node + participant Pi as P2P Network + + loop for some nodes + C -> Pi: Deploy provider adapter + Pi -> C: Deployed provider service metadata + end + + C -> Pi: Deploy quorum service to one node + Pi -> C: Deployed quorum service metadata + + + par for all provider urls + R -> Pi: JSON-RPC Request + Pi -> R: JSON-RPC Response + end + + R -> Pi: Evaluate JSON-RPC responses + Pi -> R: Accept or Reject provider(s) or provider responses + + opt data to client peer + R -> C: provider responses, quorum, etc. + end +``` + +### Provider Adapter + +In order to interact with the hosted EVMs, we choose the lowest common but open and interoperable API denominator, i.e., Ethereum JSON-RPC, which provides us with flexibility and great reusability but also forgoes some of the conveniences available in the various web3 sdks or custom APIs. + +For illustrative purposes, let's say we want to make sure the provider is returning the `latest` block, which, while simple, is a pretty good indicator of provider "liveness." The method we want to call is [`eth_blockNumber`](https://ethereum.github.io/execution-apis/api-documentation/) which formats to the following request: + +```json +{ + "jsonrpc": "2.0", + "method": "eth_blockNumber", + "params": [], + "id": 1 +} +``` + +where `id` is the nonce. If we were to use `curl` on the command line: + +```bash +curl --data '{"method":"eth_blockNumber","params":[],"id":1,"jsonrpc":"2.0"}' -H "Content-Type: application/json" -X POST +``` + +we expect the following result: + +```json +{ + "id": 1, + "jsonrpc": "2.0", + "result": "0x4b7" // hex encoded latest block +} +``` + +Ok, let's create a Wasm service we can use to query multiple providers. Keep the curl command in mind as we'll need to use curl from our Wasm to make the provider call. + +`cd` into the `multi-provider-query` directory and have a look at `src/main.rs`: + +```rust +// src/main.rs +#[marine] +// see https://eth.wiki/json-rpc/API#eth_blocknumbers +fn get_block_number(provider: ProviderInfo) -> EVMResult { + let method = "eth_blockNumber"; + let params: Vec = vec![]; + let url = provider.url; + + let data = RpcData::new(method.to_owned(), params); + let data = serde_json::to_string(&data).unwrap(); + + let curl_cmd = curl_cmd_builder(url, data); + let response = get_curl_response(curl_cmd); + + if response.error.is_none() { + let raw_response = response.result.unwrap(); + let block_height = u64::from_str_radix(raw_response.trim_start_matches("0x"), 16); + + let result = match block_height { + Ok(r) => { + let j_res = serde_json::json!({ "block-height": r }); + EVMResult { + provider: provider.name, + stdout: j_res.to_string(), + stderr: "".to_owned(), + } + } + Err(e) => { + let err = format!("unable to convert {} to u64 with error {}", raw_response, e); + EVMResult { + provider: provider.name, + stdout: "".to_owned(), + stderr: err, + } + } + }; + return result; + } + + EVMResult { + provider: provider.name, + stdout: "".to_owned(), + stderr: serde_json::to_string(&response.error).unwrap(), + } +} + +``` + +The `get_block_number` function implements a wrapper around the `eth_blockNumber` method and decodes the `hex` response to a json string. We could have implemented a more general function, say, `fn eth_rpc_wrapper(provider: ProviderInfo, method: String, parameters: Vec) -> EVMResult` and either returned the raw json rpc result or added per-method decoding match arms, which *you are encouraged* to implement for the methods of your choosing. + +Recall that the `#[marine]` macro brings the Fluence `marine-rust-sdk` into play to compile to the Wasi target and expose the appropriate interfaces. Moreover, note that we link the [`curl` module](./curl-adapter/) to enable our http calls. + +Note that not all providers follow the JSON-RPC style when it comes to error handling. For example, submitting an invalid API key to Alchemy, results in the error captured in the JSON-RPC response: + +```json +{ jsonrpc: "2.0", error: Some(RpcResponseError { code: -32000, message: "Must be authenticated!" }), result: None } +``` + +Infura, on the other hand, does not follow the JSON-RPC route and instead returns a string in stdout with no other error codes or indicators provided: + +```json +"invalid project id\n" +``` + +Infura-ating but such is life. We compensate for this idiosyncrasy with the following adjustment to an otherwise straight-forward curl response processor: + +```rust +fn get_curl_response(curl_cmd: Vec) -> RpcResponse { + let response = curl_request(curl_cmd); + let response = String::from_utf8(response.stdout).unwrap(); + + let response: Result = serde_json::from_str(&response); + match response { + Ok(r) => r, + Err(e) => RpcResponse { + jsonrpc: "".to_owned(), + error: Some(RpcResponseError { + code: -1, // we know it's not an EVM error + message: e.to_string(), + }), + result: None, + }, + } +``` + +Of course, other providers may provide even other response patterns and it is up to you to make the necessary adjustments. You may think the convenience of vendor lock-in doesn't look too bad right about now but trust yourself, it is a big risk and cost. + +At this point we're good to go and compile our code to Wasm: + +```bash +./scripts/build.sh +``` + +which should put `curl_adapter.wasm` and `multi_provider_query.wasm` in the `artifacts` directory. Before we deploy or service to one or more peers, let's check it out locally using the `marine` REPL: + +```bash +cd ../ # assuming your are still in the multi-provider-query directory +marine repl configs/Config.toml + +Welcome to the Marine REPL (version 0.16.2) +Minimal supported versions + sdk: 0.6.0 + interface-types: 0.20.0 + +app service was created with service id = 2429b9fb-c04a-4ed9-9062-400c39e86f72 +elapsed time 130.289671ms +``` + +Let's have a look at what we loaded: + +```python +1> interface +Loaded modules interface: +exported data types (combined from all modules): +data ProviderInfo: + url: string + name: string +data EVMResult: + provider: string + stdout: string + stderr: string +data MountedBinaryResult: + ret_code: i32 + error: string + stdout: []u8 + stderr: []u8 + +exported functions: +curl_adapter: + fn curl_request(cmd: []string) -> MountedBinaryResult +multi_provider_query: + fn get_block_number(provider: ProviderInfo) -> EVMResult + +2> +``` + +If you go back to the source files, you'll see that all the interfaces marked up with the `#[marine]` macro are exposed and available in the REPL. Moreover, note that both the `curl_adapter` and `multi_provider_query` WASM modules are available as the eponymous namespaces with the corresponding (exposed) functions. + +Without further ado, let's try to get the latest block with a couple of the provider urls: + +```python +2> call multi_provider_query get_block_number [{"name":"infura", "url":"https://mainnet.infura.io/v3/"}] +result: Object({"provider": String("infura"), "stderr": String(""), "stdout": String("{\"block-height\":15016773}")}) + elapsed time: 909.277016ms + +3> call multi_provider_query get_block_number [{"url":"https://main-light.eth.linkpool.io/", "name":"linkpool"}] +result: Object({"provider": String("linkpool"), "stderr": String(""), "stdout": String("{\"block-height\":15016773}")}) + elapsed time: 621.172593ms + +4> +``` + +Ok, so we called both Alchemy and Infura for the latest block height and got the same result, which is somewhat confidence inspiring. Let's check with a bad API key and keep in mind that we had to "coerce" the Infura response into the JSON-RPC format: + +```python + +4>call multi_provider_query get_block_number [{"name":"infura", "url":"https://mainnet.infura.io/v3/ \ + --log-level off +Going to upload a module... +Going to upload a module... +Now time to make a blueprint... +Blueprint id: +3bd81487cb43b76a5a67d5ebb417dd4afacb29f56d77492d8b21ad469acdfb8b +And your service id is: +"d9124884-3c42-43d6-9a1f-1b645d073c3f" + +``` + +Ok, one down, two to go: + +```bash + --addr /dns4/stage.fluence.dev/tcp/19005/wss/p2p/12D3KooWAKNos2KogexTXhrkMZzFYpLHuWJ4PgoAhurSAv7o5CWA \ + --config-path configs/deployment_cfg.json \ + --service multi-provider-query \ + --sk \ + --log-level off +Going to upload a module... +Going to upload a module... +Now time to make a blueprint... +Blueprint id: +3bd81487cb43b76a5a67d5ebb417dd4afacb29f56d77492d8b21ad469acdfb8b +And your service id is: +"3c321110-b069-42c6-b5e0-aed73d976a60" +``` + +and + +```bash + aqua remote deploy_service \ + --addr /dns4/stage.fluence.dev/tcp/19003/wss/p2p/12D3KooWMMGdfVEJ1rWe1nH1nehYDzNEHhg5ogdfiGk88AupCMnf \ + --config-path configs/deployment_cfg.json \ + --service multi-provider-query \ + --sk \ + --log-level off +Going to upload a module... +Going to upload a module... +Now time to make a blueprint... +Blueprint id: +3bd81487cb43b76a5a67d5ebb417dd4afacb29f56d77492d8b21ad469acdfb8b +And your service id is: +"84d4d018-0c13-4d6d-8c11-599a3919911c" +``` + +If you deloy the services, you're service ids are different, of course. Also, feel free to use different peers. Just with your keys, make sure you keep the (peer id, service id) in a safe place for future use. Now that we have our services deployed, it's time to create our Aqua script. + +### Aqua + +The Fluence protocol uses function addressability, i.e., (peer id, service id) tuples, to resolve services. In our model, function addresses are input parameters just like the provider urls. So we can capture our function addresses with a struct: + +```aqua +data FunctionAddress: + peer_id: string + service_id: string +``` + +Let's put it all together: + +```aqua + +data FunctionAddress: + peer_id: string + service_id: string + +-- from our WASM code +data ProviderInfo: + name: string + url: string + +-- from our WASM code +data EVMResult: + provider: string + stdout: string + stderr: string + +-- helper function to get length of []Provider +service MyOp("op"): + array_length(providers: []ProviderInfo) -> i64 + +service MyOp2("op"): + array_length(providers: []FunctionAddress) -> i64 + +-- from our WASM code +service MultiProviderQuery("service-id"): + get_block_number(provider: ProviderInfo) -> EVMResult + +-- finally, our Aqua function +func get_block_heights(providers: []ProviderInfo, addrs: []FunctionAddress) -> []EVMResult: + result: *EVMResult + result2: *string + + n <- MyOp.array_length(providers) -- get number of provider urls + n2 <- MyOp2.array_length(addrs) -- get number of services + + if n > 0: + for addr <- addrs par: + on addr.peer_id: + MultiProviderQuery addr.service_id + for provider <- providers: + result <- MultiProviderQuery.get_block_number(provider) + result2 <<- provider.name + -- join result[n2-1] + join result[n*n2-1] + <- result +``` + +The script we created is going to get us halfway to where we want to go. So let's try it from the command-line with `aqua-cli`, which is a bit unwieldy and we'll see in a bit how we can create a local client with Fluence JS. For now, quick and easy: + +```bash +aqua run \ + --addr /dns4/stage.fluence.dev/tcp/19004/wss/p2p/12D3KooWJ4bTHirdTFNZpCS72TAzwtdmavTBkkEXtzo6wHL25CtE \ + -i aqua \ + -f 'get_block_heights(arg1, arg2)' \ + --data '{"arg1": [{"name":"infura", "url":"https://mainnet.infura.io/v3/0cc023286cae4ab886598ecd14e256fd"}, + {"name":"alchemy","url":"https://eth-mainnet.alchemyapi.io/v2/2FLlm9t-xOm0CbGx-ORr81li1yD_cKP6"}, + {"name":"link", "url":"https://main-light.eth.linkpool.io"}], + "arg2": [{"peer_id":"12D3KooWJ4bTHirdTFNZpCS72TAzwtdmavTBkkEXtzo6wHL25CtE", "service_id":"d9124884-3c42-43d6-9a1f-1b645d073c3f"}, + {"peer_id":"12D3KooWAKNos2KogexTXhrkMZzFYpLHuWJ4PgoAhurSAv7o5CWA", "service_id":"3c321110-b069-42c6-b5e0-aed73d976a60"}, + {"peer_id":"12D3KooWMMGdfVEJ1rWe1nH1nehYDzNEHhg5ogdfiGk88AupCMnf", "service_id":"84d4d018-0c13-4d6d-8c11-599a3919911c"}]}' +``` + +which results in: + +```bash +[ + { + "provider": "infura", + "stderr": "", + "stdout": "{\"block-height\":15016806}" + }, + { + "provider": "alchemy", + "stderr": "", + "stdout": "{\"block-height\":15016806}" + }, + { + "provider": "link", + "stderr": "", + "stdout": "{\"block-height\":15016806}" + }, + { + "provider": "infura", + "stderr": "", + "stdout": "{\"block-height\":15016806}" + }, + { + "provider": "alchemy", + "stderr": "", + "stdout": "{\"block-height\":15016806}" + }, + { + "provider": "link", + "stderr": "", + "stdout": "{\"block-height\":15016806}" + }, + { + "provider": "infura", + "stderr": "", + "stdout": "{\"block-height\":15016806}" + }, + { + "provider": "alchemy", + "stderr": "", + "stdout": "{\"block-height\":15016806}" + }, + { + "provider": "link", + "stderr": "", + "stdout": "{\"block-height\":15016806}" + } +] +``` + +A quick scan suggests that all responses are equal across providers. That's a good start! However, we don't want to rely on manual inspection of our data but want to programmatically determine some sort of quorum. A possible quorum rule is the two-third rule but we need consider our response categories. For example: + +* blocknumber response -- "correct" +* blocknumber response -- "incorrect" +* no response + +In order to be able to apply a threshold decision like the 2/3 rule, we first need to determine the frequency distribution of our result set. `cd` into the `simple-quorum` directory to see a naive implementation: + +```rust +// simple-quorum/sar/main.rs +#[marine] +pub struct EVMResult { + pub provider: String, + pub stdout: String, + pub stderr: String, +} + +#[marine] +#[derive(Default, Debug)] +pub struct Oracle { + pub n: u32, + pub mode: u64, + pub freq: u32, + pub err_str: String, +} + +#[marine] +pub fn point_estimate(data: Vec, min_points: u32) -> Oracle { + if data.len() < min_points as usize { + return Oracle { + err_str: format!( + "Expected at least {} points but only got {}.", + min_points, + data.len() + ), + ..<_>::default() + }; + } + + if data.len() < 1 { + return Oracle { + err_str: format!("Expected at least one timestamp."), + ..<_>::default() + }; + } + + let (freq, mode) = mode(data.iter()); + + Oracle { + n: data.len() as u32, + mode, + freq, + ..<_>::default() + } +} +``` + +Basically, our oracle service returns the block height with the most frequencies, which we can then compare to our quorum threshold. Let's deploy our service: + +```bash +aqua remote deploy_service \ + --addr /dns4/stage.fluence.dev/tcp/19005/wss/p2p/12D3KooWAKNos2KogexTXhrkMZzFYpLHuWJ4PgoAhurSAv7o5CWA \ + --config-path configs/deployment_cfg.json \ + --service simple-quorum \ + --sk \ + --log-level off +Going to upload a module... +Now time to make a blueprint... +Blueprint id: +750535a2c26feadd6fe985f430b9cf4f41c552973261c8ce22481ff8984f3b73 +And your service id is: +"8e2c0464-b066-4a53-95d5-8dc116b92909" +``` + +Next, we update our Aqua script and run the new workflow: + +```aqua +-- aqua/multi_provider.aqua +func get_block_height_quorum(providers: []ProviderInfo, addrs: []FunctionAddress, q_addr: QuorumService) -> Oracle: + result: *EVMResult + result2: *string + oracle: *Oracle + + n <- MyOp.array_length(providers) + n2 <- MyOp2.array_length(addrs) + + if n > 0: + for addr <- addrs par: + on addr.peer_id: + MultiProviderQuery addr.service_id + for provider <- providers: + result <- MultiProviderQuery.get_block_number(provider) + result2 <<- provider.name + -- join result[n2-1] + join result[n*n2-1] + + on q_addr.peer_id: + SimpleQuorum q_addr.service_id + oracle <-SimpleQuorum.point_estimate(result, 3) + + <- oracle[0] +``` + +In essence, we are building on our priot work and piping the array of EVMResults in the SimpleQuorum service to arrive at the oracle. Again, with `aqua cli`: + +```bash +aqua run \ + --addr /dns4/stage.fluence.dev/tcp/19004/wss/p2p/12D3KooWJ4bTHirdTFNZpCS72TAzwtdmavTBkkEXtzo6wHL25CtE \ + -i aqua \ + -f 'get_block_height_oracle(arg1, arg2, arg3)' \ + --data '{"arg1": [{"name":"infura", "url":"https://mainnet.infura.io/v3/0cc023286cae4ab886598ecd14e256fd"}, + {"name":"alchemy","url":"https://eth-mainnet.alchemyapi.io/v2/2FLlm9t-xOm0CbGx-ORr81li1yD_cKP6"}, + {"name":"link", "url":"https://main-light.eth.linkpool.io"}], + "arg2": [{"peer_id":"12D3KooWJ4bTHirdTFNZpCS72TAzwtdmavTBkkEXtzo6wHL25CtE", "service_id":"d9124884-3c42-43d6-9a1f-1b645d073c3f"}, + {"peer_id":"12D3KooWAKNos2KogexTXhrkMZzFYpLHuWJ4PgoAhurSAv7o5CWA", "service_id":"3c321110-b069-42c6-b5e0-aed73d976a60"}, + {"peer_id":"12D3KooWMMGdfVEJ1rWe1nH1nehYDzNEHhg5ogdfiGk88AupCMnf", "service_id":"84d4d018-0c13-4d6d-8c11-599a3919911c"}], + "arg3": {"peer_id":"12D3KooWAKNos2KogexTXhrkMZzFYpLHuWJ4PgoAhurSAv7o5CWA", "service_id":"8e2c0464-b066-4a53-95d5-8dc116b92909"}}' + +``` + +which returns our Oracle struct: + +```bash +{ + "err_str": "", + "freq": 9, + "mode": 15030597, + "n": 9 +} +``` + +So we have three (3) providers called from three (3) service instances, leaving us to reasonably expect nine responses and ideally none equal responses. First, we can add a threshold to out Aqua script to determine an *acceptable* point value against a threshold. Foe example: + +```aqua +func get_block_height_quorum(providers: []ProviderInfo, addrs: []FunctionAddress, q_addr: QuorumService, t_quorum: f64) -> Oracle, bool: + result: *EVMResult + result2: *string + oracle: *Oracle + quorum: *bool + + min_points = 3 -- minimum points we want in order to calculate an oracle + + n <- MyOp.array_length(providers) + n2 <- MyOp2.array_length(addrs) + + if n > 0: + for addr <- addrs par: + on addr.peer_id: + MultiProviderQuery addr.service_id + for provider <- providers: + result <- MultiProviderQuery.get_block_number(provider) + result2 <<- provider.name + -- join result[n2-1] + join result[n*n2-1] + + on q_addr.peer_id: + SimpleQuorum q_addr.service_id + oracle <-SimpleQuorum.point_estimate(result, min_points) + quorum <- SimpleQuorum.is_quorum(oracle[0].freq, oracle[0].n, t_quorum) + + <- oracle[0], quorum[0] + +``` + +The updates Aqua workflow now returns the highest frequency response and a boolean comparing the relative frequency ratio to some threshold value -- 0.66 in our example below: + +```bash +aqua run \ + --addr /dns4/stage.fluence.dev/tcp/19004/wss/p2p/12D3KooWJ4bTHirdTFNZpCS72TAzwtdmavTBkkEXtzo6wHL25CtE \ + -i aqua \ + -f 'get_block_height_quorum(arg1, arg2, arg3, 0.66)' \ + --data '{"arg1": [{"name":"infura", "url":"https://mainnet.infura.io/v3/0cc023286cae4ab886598ecd14e256fd"}, + {"name":"alchemy","url":"https://eth-mainnet.alchemyapi.io/v2/2FLlm9t-xOm0CbGx-ORr81li1yD_cKP6"}, + {"name":"link", "url":"https://main-light.eth.linkpool.io"}], + "arg2": [{"peer_id":"12D3KooWJ4bTHirdTFNZpCS72TAzwtdmavTBkkEXtzo6wHL25CtE", "service_id":"d9124884-3c42-43d6-9a1f-1b645d073c3f"}, + {"peer_id":"12D3KooWAKNos2KogexTXhrkMZzFYpLHuWJ4PgoAhurSAv7o5CWA", "service_id":"3c321110-b069-42c6-b5e0-aed73d976a60"}, + {"peer_id":"12D3KooWMMGdfVEJ1rWe1nH1nehYDzNEHhg5ogdfiGk88AupCMnf", "service_id":"84d4d018-0c13-4d6d-8c11-599a3919911c"}], + "arg3": {"peer_id":"12D3KooWAKNos2KogexTXhrkMZzFYpLHuWJ4PgoAhurSAv7o5CWA", "service_id":"b348351e-485c-4424-b0a9-3e4304ce9431"}}' +[ +{ + "err_str": "", + "freq": 9, + "mode": 15031112, + "n": 9 +}, +true +] + +``` + +In this case, all response values are of the same magnitude, which is encouraging, and we have a quorum against the 0.66 threshold value. + +## Summary + +We developed a model to decentralize EVM hosting providers for our DApps and implemented a stylized solution with Fluence and Aqua. Specifically, we queried multiple centralized hosted EVM providers using the open Ethereum JSON-RPC API and settled on pulling the `latest` block as an indicator of reliability and "liveness" as opposed to, say, (stale) caches, unreachability or nefarious behavior. + +Along our journey, we pretty much touched on every possible chokepoint and discussed what a feasible approach to a quorum might look like. However, we made a couple significant omissions: + +* we trusted the Fluence nodes, which is not necessarily the right course of action. If you don't trust the Fluence nodes, you can expand on our work by running each providers set across multiple nodes end then compare the results sets across nodes, for example. We are very much looking forward to your PR! +* we are satisfied with a probabilistic true-false quorum number, which may be enough for a lot of use cases. However, we can expand our analysis to introduce learning over response (failure) attributes to the process to develop trust weights for each provider. That might allow us to use smaller subsets of providers for each call and run "test" requests outside of our workflow to update provider trust weights and then just pick the most trusted providers at "run time." Ditto for Fluence providers. Again, we are looking forward to your PRs. + +Thank you for making it all the way to end and we hope that this little tutorial not only helped you learn a bit more about Fluence and Aqua but also provided a reminder on just how vigilant DApp developers need to be to be deserving of the *D*. \ No newline at end of file