Skip to content

Reading logs in superchain interop #1501

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 22 commits into from
Mar 22, 2025
Merged
Show file tree
Hide file tree
Changes from 5 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 2 additions & 0 deletions pages/stack/interop.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -17,6 +17,8 @@ Documentation covering explainers and tutorials for using Superchain interop.

<Card title="Superchain interop message passing" href="/stack/interop/message-passing" icon={<img src="/img/icons/shapes.svg" />} />

<Card title="Superchain interop logs" href="/stack/interop/reading-logs" icon={<img src="/img/icons/shapes.svg" />} />

<Card title="Superchain interop compatible tokens" href="/stack/interop/compatible-tokens" icon={<img src="/img/icons/shapes.svg" />} />

<Card title="OP Supervisor" href="/stack/interop/op-supervisor" icon={<img src="/img/icons/shapes.svg" />} />
Expand Down
1 change: 1 addition & 0 deletions pages/stack/interop/_meta.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@
"explainer": "Superchain interop explainer",
"predeploy": "Superchain interop predeploys",
"message-passing": "Superchain interop message passing",
"reading-logs": "Superchain interop logs",
"op-supervisor": "OP Supervisor",
"superchain-weth": "Superchain ETH",
"superchain-erc20": "SuperchainERC20",
Expand Down
252 changes: 252 additions & 0 deletions pages/stack/interop/reading-logs.mdx
Original file line number Diff line number Diff line change
@@ -0,0 +1,252 @@
---
title: Reading Logs in Superchain Interop
lang: en-US
description: Learn how to reference logs from one chain on another within the Superchain.
---

import { Callout } from 'nextra/components'
import { InteropCallout } from '@/components/WipCallout'

<InteropCallout />

# Reading logs in superchain interop

Superchain interop enables developers to leverage current and historical logs from other blockchains within the Superchain interop cluster directly on their local chain.
This allows for cross-chain log consumption with low latency in a trust-minimized way.

## Overview

Instead of relying solely on [L2ToL2CrossDomainMessenger](https://github.com/ethereum-optimism/optimism/blob/develop/packages/contracts-bedrock/src/L2/L2ToL2CrossDomainMessenger.sol), developers can use [`CrossL2Inbox#validateMessage`](https://github.com/ethereum-optimism/optimism/blob/af091753917c1d7101314cbfe8ac5cbc2efe0e5e/packages/contracts-bedrock/src/L2/CrossL2Inbox.sol#L49) and treat `CrossL2Inbox` as an oracle for logs that occurred on different chains or even their local chain.

This enables developers to:

* Reference attestations or events from other chains.
* Build cross-chain applications that react to events happening across the Superchain.
* Create novel dApps that leverage data from multiple chains.

## Why use `CrossL2Inbox`?

* **Lower latency**: Directly reference logs without waiting for cross-chain message confirmation.
* **Trust-minimized**: Uses cryptographic validation rather than relying on off-chain relayers.
* **Flexibility**: Can be used to validate events from another chain or even the same chain.

## How it works

### Architecture

The process works through the [`CrossL2Inbox`](https://github.com/ethereum-optimism/optimism/blob/af091753917c1d7101314cbfe8ac5cbc2efe0e5e/packages/contracts-bedrock/src/L2/CrossL2Inbox.sol#L33) contract, which serves as an oracle for logs from other chains in the Superchain:

1. A smart contract on `Chain A` emits a log (event)
2. Your contract on `Chain B` calls `CrossL2Inbox#validateMessage` with the log's identifier
3. The `CrossL2Inbox` contract verifies the log's authenticity
4. Your contract can then use the validated log data

### Key components

* **Identifier**: A struct containing information about the log, including `chainId`, `origin` (contract address), and other log metadata
* **validateMessage**: Function that verifies a log's authenticity before allowing its use

## Example: cross-chain attestation verification

Let's walk through a practical example of verifying an Ethereum Attestation Service (EAS) attestation across chains.

### Source chain: creating an attestation

On the source chain (e.g., OP Mainnet), a user creates an attestation using EAS:

```mermaid
sequenceDiagram
participant User
participant App as Application
participant EAS as EAS Contract
participant Log as Event Log

User->>App: Request attestation
App->>EAS: createAttestation()
EAS->>Log: Emit AttestationCreated event
Note over Log: Event contains attestation data
```

1. The user initiates a request for an attestation through an application.

2. The application calls the `createAttestation()` function on the EAS (Ethereum Attestation Service) contract on the source chain.

3. The EAS contract processes the attestation request and emits an `AttestationCreated` event.

4. The event is recorded in the chain's log, containing all necessary attestation data.

### Destination chain: verifying the attestation

On the destination chain (e.g., Base), a DeFi application wants to verify this attestation:

```mermaid
sequenceDiagram
participant User
participant DeFi as DeFi Application
participant Verifier as AttestationVerifier
participant CrossL2 as CrossL2Inbox
participant OP as OP-Supervisor Node

User->>DeFi: Request access using attestation
DeFi->>Verifier: verifyAttestation(id, attestationEvent)
Verifier->>CrossL2: validateMessage(id, keccak256(attestationEvent))
CrossL2->>OP: Check if log exists
OP-->>CrossL2: Confirm log validity
CrossL2-->>Verifier: Return validation result
Verifier-->>DeFi: Return verification status
DeFi-->>User: Grant access based on attestation
```

1. The user requests access to a DeFi application on the destination chain, referencing an attestation created on the source chain.

2. The DeFi application calls `verifyAttestation()` on the `AttestationVerifier` contract, passing the attestation's identifier and event data.

3. The AttestationVerifier calls `validateMessage()` on the `CrossL2Inbox` contract, passing the attestation identifier and a hash of the event data.

4. The `CrossL2Inbox` contract interacts with the [`OP-Supervisor`](/stack/interop/op-supervisor) node to check if the specified log exists on the source chain.

5. The `OP-Supervisor` confirms the validity of the log to the `CrossL2Inbox` contract.

6. The `CrossL2Inbox` returns the validation result to the `AttestationVerifier`.

7. The `AttestationVerifier` returns the verification status to the DeFi application.

8. If validation is successful, the DeFi application grants the user access based on the verified attestation.

### Sample code for attestation verification

```solidity
// SPDX-License-Identifier: MIT
pragma solidity 0.8.25;

import { ICrossL2Inbox, Identifier } from "interfaces/L2/ICrossL2Inbox.sol";
import { Predeploys } from "src/libraries/Predeploys.sol";

contract AttestationVerifier {
address constant CROSS_L2_INBOX = 0x4200000000000000000000000000000000000014;
address constant EAS_CONTRACT = 0x4200000000000000000000000000000000000EAS; // Example address

// Event selector for AttestationCreated event
bytes32 constant ATTESTATION_CREATED_EVENT_SELECTOR =
0x831531dabaca5375ba77364edc9627be5638660e8b613d921b86766021d3c165; // Example selector

function verifyAttestation(
Identifier calldata _id,
bytes calldata _attestationEvent
) external returns (bool) {
// Ensure the log came from the EAS contract
require(_id.origin == EAS_CONTRACT, "Not from EAS contract");

// Validate the message through CrossL2Inbox
ICrossL2Inbox(CROSS_L2_INBOX).validateMessage(_id, keccak256(_attestationEvent));

// Decode the attestation event data
// (implementation depends on EAS event structure)

// Process the attestation
// For example, grant special permissions or better rates

return true;
}
}
```

## Implementation guide

To implement cross-chain log reading:

```mermaid
flowchart TD
A[1. Identify log to consume] --> B[2. Create Identifier struct]
B --> C[3. Call validateMessage]
C --> D[4. Process validated log data]

subgraph "Code Examples"
E["Identifier memory id = Identifier({
chainId: sourceChainId,
origin: sourceContractAddress,
// Other identifier parameters
});"]

F["ICrossL2Inbox(Predeploys.CROSS_L2_INBOX).validateMessage(id, keccak256(logData));"]
end

B -.-> E
C -.-> F
```

1. First, identify which log from another chain you want to consume in your application.

2. Create an Identifier struct that contains all necessary information about the log, including the chain ID and the contract address that emitted the log.

3. Call the `validateMessage()` function on the `CrossL2Inbox` contract, passing the identifier and a hash of the log data.

4. After validation, process the log data according to your application's requirements.

## Important considerations

* This feature works between chains within the same Superchain interop cluster
* The same functionality can be used on a single chain (for example, to maintain a consistent architecture)
* The `CrossL2Inbox` contract needs to be able to verify logs from the source chain
* Ensure your contract handles validation failures gracefully

## Comparison with `L2ToL2CrossDomainMessenger`

| Feature | L2ToL2CrossDomainMessenger | CrossL2Inbox#validateMessage |
| ---------- | -------------------------------- | ------------------------------------- |
| Purpose | Send messages between chains | Verify logs from other chains |
| Initiation | Active sending from source | Passive reading from destination |
| Use Case | Transfer tokens, trigger actions | Verify attestations, reference events |
| Flow | Push model | Pull model |

## End-to-End flow comparison

```mermaid
flowchart LR
subgraph "L2ToL2CrossDomainMessenger (Push Model)"
A[Source Contract] -->|sendMessage| B[Source L2ToL2CrossDomainMessenger]
B -->|emit event| C[Event Log]
C -.->|relayed by| D[Autorelayer]
D -->|relayMessage| E[Destination L2ToL2CrossDomainMessenger]
E -->|execute| F[Destination Contract]
end

subgraph "CrossL2Inbox (Pull Model)"
G[Source Contract] -->|emit event| H[Event Log]
H -.->|monitored by| I[OP-Supervisor]
J[Destination Contract] -->|validateMessage| K[CrossL2Inbox]
K <--->|verify log| I
end
```

This diagram compares the two approaches for cross-chain communication:

### L2ToL2CrossDomainMessenger (Push Model):

1. A source contract calls `sendMessage()` on the `L2ToL2CrossDomainMessenger`.

2. The messenger emits an event to the event log.

3. An autorelayer detects the event and relays it to the destination chain.

4. The destination `L2ToL2CrossDomainMessenger` receives the relayed message.

5. The destination messenger executes the message on the target contract.

### CrossL2Inbox (Pull Model):

1. A source contract emits an event to the event log.

2. The `OP-Supervisor` node monitors events across chains.

3. A destination contract calls `validateMessage()` on the `CrossL2Inbox`.

4. The `CrossL2Inbox` verifies the log's existence by communicating with the `OP-Supervisor`.

5. The destination contract receives verification and proceeds with its logic.

## Next steps

* [Build a revolutionary app](/app-developers/get-started) that uses multiple blockchains within the Superchain
* Learn how to [pass messages between blockchains](/stack/interop/tutorials/message-passing)
* Deploy a [SuperchainERC20](/stack/interop/tutorials/deploy-superchain-erc20) to the Superchain