Skip to content

Commit

Permalink
Remove deprecated mermaid diagram and execution trace (kkrt-labs#577)
Browse files Browse the repository at this point in the history
Cleaning a bit the readme as some diagrams were not up to date
  • Loading branch information
Eikix authored May 23, 2023
1 parent c19cacd commit 293c229
Showing 1 changed file with 6 additions and 36 deletions.
42 changes: 6 additions & 36 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@ It is a work in progress, and it is not ready for production.

## Supported opcodes

We support 100% of EVM [opcodes](docs/supported_opcodes.md).
We support 100% of EVM [opcodes](docs/supported_opcodes.md) and 8 out of 9 precompiles.

## Documentation

Expand All @@ -67,9 +67,12 @@ We support 100% of EVM [opcodes](docs/supported_opcodes.md).
[Warp](https://github.com/NethermindEth/warp) for a Solidity -> Cairo
transpiler



<!-- TODO: Add updated sequence diagram for different operations on Kakarot when it is up-to-date
### Main execution flow
```mermaid
mermaid
sequenceDiagram
title Simple bytecode execution flow example: [PUSH1 0x01 PUSH1 0x02 ADD]
actor User
Expand Down Expand Up @@ -103,40 +106,7 @@ sequenceDiagram
EVMInstructions->>-Kakarot: ctx
end
Kakarot->>-User: ctx
```

### Execution sample

Execution of a simple EVM bytecode program on Kakarot.

The bytecode is the following:

```console
6001600503600301610166016002026105b40460020500
```

Which corresponds to the following EVM program:

```console
0x60 - PUSH1
0x60 - PUSH1
0x03 - SUB
0x60 - PUSH1
0x01 - ADD
0x61 - PUSH2
0x01 - ADD
0x60 - PUSH1
0x02 - MUL
0x61 - PUSH2
0x04 - DIV
0x60 - PUSH1
0x05 - SDIV
0x00 - STOP
```

Here is the execution trace of the program on Kakarot:

![Tutorial](docs/img/sample_execution.png)
-->

## Getting started

Expand Down

0 comments on commit 293c229

Please sign in to comment.