@version 1 #################################### # EVM => Archethic : Request funds # #################################### condition triggered_by: transaction, on: request_funds(end_time, amount, user_address, secret_hash), as: [ type: "contract", code: valid_chargeable_code?(end_time, amount, user_address, secret_hash), timestamp: ( # End time cannot be less than now or more than 1 day now = Time.now() end_time > now && end_time <= (now + 86400) ), content: ( # Ensure the pool has enough UCO to send the requested fund balance = Chain.get_uco_balance(contract.address) balance >= amount ), address: ( # Here ensure Ethereum contract exists and check rules # How to ensure Ethereum contract is a valid one ? # Maybe get the ABI of HTLC on github and compare it to the one on Ethereum # Then control rules true ) ] actions triggered_by: transaction, on: request_funds(_end_time, amount, _user_address, _secret_hash) do Contract.set_type "transfer" Contract.add_uco_transfer to: transaction.address, amount: amount end ########################################## # Archethic => EVM : Request secret hash # ########################################## condition triggered_by: transaction, on: request_secret_hash(htlc_genesis_address, amount, user_address, chain_id), as: [ type: "transfer", code: valid_signed_code?(htlc_genesis_address, amount, user_address), previous_public_key: ( # Ensure contract has enough fund to withdraw previous_address = Chain.get_previous_address() balance = Chain.get_uco_balance(previous_address) balance >= amount ), content: List.in?([11155111,80001,97], chain_id), uco_transfers: ( htlc_genesis_address = String.to_hex(htlc_genesis_address) Map.get(htlc_genesis_address) == amount ) ] actions triggered_by: transaction, on: request_secret_hash(htlc_genesis_address, _amount, _user_address, chain_id) do # Here delete old secret that hasn't been used before endTime contract_content = Map.new() if Json.is_valid?(contract.content) do contract_content = Json.parse(contract.content) end for key in Map.keys(contract_content) do htlc_map = Map.get(contract_content, key) if htlc_map.end_time <= Time.now() do contract_content = Map.delete(contract_content, key) end end secret = Crypto.hmac(transaction.address) secret_hash = Crypto.hash(secret, "sha256") # Build signature for EVM decryption signature = sign_for_evm(secret_hash, chain_id) # Calculate endtime now + 2 hours now = Time.now() end_time = now - Math.rem(now, 60) + 7200 # Add secret and signature in content htlc_map = [ hmac_address: transaction.address, end_time: end_time, chain_id: chain_id ] htlc_genesis_address = String.to_hex(htlc_genesis_address) contract_content = Map.set(contract_content, htlc_genesis_address, htlc_map) Contract.set_content Json.to_string(contract_content) Contract.add_recipient address: htlc_genesis_address, action: "set_secret_hash", args: [secret_hash, signature, end_time] end #################################### # Archethic => EVM : Reveal secret # #################################### condition triggered_by: transaction, on: reveal_secret(htlc_genesis_address), as: [ type: "transfer", content: ( # Ensure htlc_genesis_address exists in pool state # and end_time has not been reached valid? = false if Json.is_valid?(contract.content) do htlc_genesis_address = String.to_hex(htlc_genesis_address) htlc_map = Map.get(Json.parse(contract.content), htlc_genesis_address) if htlc_map != nil do valid? = htlc_map.end_time > Time.now() end end valid? ), address: ( # Here ensure Ethereum contract exists and check rules # How to ensure Ethereum contract is a valid one ? # Maybe get the ABI of HTLC on github and compare it to the one on Ethereum # Then control rules true ) ] actions triggered_by: transaction, on: reveal_secret(htlc_genesis_address) do contract_content = Json.parse(contract.content) htlc_genesis_address = String.to_hex(htlc_genesis_address) htlc_map = Map.get(contract_content, htlc_genesis_address) contract_content = Map.delete(contract_content, htlc_genesis_address) secret = Crypto.hmac(htlc_map.hmac_address) # Do not use chain ID in signature for the secret reveal signature = sign_for_evm(secret, nil) Contract.set_content Json.to_string(contract_content) Contract.add_recipient address: htlc_genesis_address, action: "reveal_secret", args: [secret, signature] end condition triggered_by: transaction, on: update_code(new_code), as: [ previous_public_key: ( # Pool code can only be updated from the master chain if the bridge # Transaction is not yet validated so we need to use previous address # to get the genesis address previous_address = Chain.get_previous_address() Chain.get_genesis_address(previous_address) == 0x000020a6911478356ca264174e35d26021fb4cbe870703bb7c3859e01cdb34bcd823 ), code: Code.is_valid?(new_code) ] actions triggered_by: transaction, on: update_code(new_code) do Contract.set_type "contract" # Keep contract state Contract.set_content contract.content Contract.set_code new_code end #################### # Public functions # #################### export fun get_token_address() do "UCO" end ##################### # Private functions # ##################### fun valid_chargeable_code?(end_time, amount, user_address, secret_hash) do args = [ end_time, user_address, 0x000018d60115ece0c7558a46b4693749bf6beab524fddccf9b10b910619e4ee08801, secret_hash, "UCO", amount ] expected_code = Contract.call_function(0x0000795bfd6ca2f5ea9f378c20775caf798e9bfbff6aec94bf87ad8d59233b4fa299, "get_chargeable_htlc", args) Code.is_same?(expected_code, transaction.code) end fun valid_signed_code?(htlc_address, amount, user_address) do valid? = false htlc_address = String.to_hex(htlc_address) last_htlc_transaction = Chain.get_last_transaction(htlc_address) if last_htlc_transaction != nil do args = [ user_address, 0x000018d60115ece0c7558a46b4693749bf6beab524fddccf9b10b910619e4ee08801, "UCO", amount ] expected_code = Contract.call_function(0x0000795bfd6ca2f5ea9f378c20775caf798e9bfbff6aec94bf87ad8d59233b4fa299, "get_signed_htlc", args) valid? = Code.is_same?(expected_code, last_htlc_transaction.code) end valid? end fun sign_for_evm(data, chain_id) do hash = data if chain_id != nil do # Perform a first hash to combine data and chain_id abi_data = Evm.abi_encode("(bytes32,uint)", [data, chain_id]) hash = Crypto.hash(abi_data, "keccak256") end prefix = String.to_hex("\x19Ethereum Signed Message:\n32") signature_payload = Crypto.hash("#{prefix}#{hash}", "keccak256") sig = Crypto.sign_with_recovery(signature_payload) if sig.v == 0 do sig = Map.set(sig, "v", 27) else sig = Map.set(sig, "v", 28) end sig end
{ "00000C22E15C9C1B5299886E4144F2777583135C18BEFE4C5D27BE644B39AE5F6F77": { "chain_id": 11155111, "end_time": 1697666460, "hmac_address": "000031CF3D089C4058DEADDEA1CD617019FB91B143960F777A6F73A9612C36031C2B" }, "00001D7183D1C64B29B8365A094C03C3C4493E86ECBFB025686F8A4E37221E8C48C4": { "chain_id": 11155111, "end_time": 1697671560, "hmac_address": "00009575AB3729FDD58FCC8626AFA1B204695502E764D05DD5849C67E8FCC1F2A975" }, "00002D87935C0344CF8036C729FCEB802F0A055BF9FCD3E2BD1CF120A2CFEBF315ED": { "chain_id": 11155111, "end_time": 1697670900, "hmac_address": "000054B70F6CCBFAF18955B8EDE0EDB7078C828D6C453A8819818FD096130D2DD01B" }, "000036A35BF369B25229DEAC2EE8797F8E1913FA603249466765BAA7BBAD6157397D": { "chain_id": 11155111, "end_time": 1697669160, "hmac_address": "0000C1A264D46545EA8B6FCF0F2AA79B25A97C4D005E805B11BE067556B3C9089EC4" }, "000043631C82F7C691E7D55A33C29AE9D25D6D011476A36DA3033F78CE684603CAC7": { "chain_id": 11155111, "end_time": 1697669220, "hmac_address": "00006F1967B17227A9B4695CD69F9F8F2E5A1AAB175002FA69157300A42CC62A34A7" }, "0000A5215EDE0C7660573FD1852EC407028D64BEBDF8F6BD9C49BF84A9ADA40CDE31": { "chain_id": 11155111, "end_time": 1697669520, "hmac_address": "00002D348BF496FA9ED902E780D5E9F2E29165F46ADDA65D40D770C7E8E09E37EA4F" }, "0000BD5E579B62A2394D4524624B7E32D54B43433B2B44AB079F3F00871DDBF79AD6": { "chain_id": 11155111, "end_time": 1697669340, "hmac_address": "0000FC3047F1490365C6CAC791C69841D16E6D59AA08F1F1C331499129A92DDB3BB3" }, "0000BD81E524120AC10B80A81AD7EEE56E0BE15AE2FB35B95EB1DBAF292F94E6A104": { "chain_id": 11155111, "end_time": 1697671020, "hmac_address": "00006931D29E278B864DAFD241F38877D34468E6250BE67307574A64A4C0EBD517AD" }, "0000CB84DC1D733CABB4AE3BBA95EB372CEA9DDBE1125F32A9D7B654048E10C9273D": { "chain_id": 11155111, "end_time": 1697669820, "hmac_address": "0000776E8C61B815A6F0FB446B66901859743C741221AE73ECD903E94203B6DC9122" } }
State (0 B)
-
Secret shared with 1 key
Encoded secret
94E13D260A8D0778D8461A47C1DA7203A3C56EF16D2E167695BBD4D240D0AD85223970F4EE8A0B024D8459897A2177E6D7F4415FB848EB3C4BE2E448
Authorized keys
- 00017877BCF4122095926A49489009649603AB129822A19EF9D573B8FD714911ED7F
-
Resolved 0000701C...DC46set_secret_hash
[ "40FD57A99EDDDBB97270D6C0A6C62AA03B44465D0CB105D8D6752D254A488490", { "r": "2BACAD88860075EF565D62BC2A611C02F7266E7E077486AFE99A4004583DB386", "s": "7D2F028EADBDEA823747E5775F73F5D5992EA8391FEA5A18AC8CEC557431A6AE", "v": 28 }, 1697671560 ]
Inputs (0)
Contract inputs (0)
Unspent outputs (1)
-
From 000026EC...9D88At 2023-10-18 21:26:38 UTCAmount 297.01734885 UCO
Previous public key
0001A1B9E8A70C91092444EB8E1081526FD6623F926AC9CDC449DEFB55B1E1FCED6F
Previous signature
3336D879DA709F3333C4E8002A20AD5CEDECE7BD65FC8ECB0AE92F88C6330C58470526F1F89D6A28532ADB75114AD4EC7D348D76102CB4AE06BC21B619EDB70D
Origin signature
3045022100B574EE93210F22DADEE4743E010D784E07F3A13D0136CCFB1D9A052573FF539002207F1C39670AF6D648DF65A29685579B8BBFA52162E90B96CAD7E806591AE50A97
Proof of work
0101046C39D56B717142B6EE14B0F8B2561ECA458F3D2D12C9977D613F78829419063211F9C21F7BB0D56B6523040A8156BE22B6E9D6332B88ED882574D12AE32F7A45
Proof of integrity
0084D276BB16E21605CAB365480AF3B15D41D38BD88EBBFB38F4136A27572FE5DA
Coordinator signature
A33E37B2E7A5E1A418B8A142A3E6DA781761311814FA36CB79D526C0C65DAF260296FA824B2918A24010828B7795F59ACD74B95352E44F84AAFD27CCFA11D301
Validator #1 public key
0001500FBE298B79FFBDD5CCA1798F30FD88A53D26EC39DE5DDE1F4137B032A4BC34
Validator #1 signature
2FFB9515E94992BF78B5F5B4156FA7CFF97058A683947768DDB9D4DB9662AF20086673B398DFD57CD4C461200954B6DFED4CE61CC4F771F234D0BA4B3949C90A
Validator #2 public key
00018A312AFA617E98B343D09AD2E73F0AB661DB0A59FB986D5DB8CE7664E14C25FC
Validator #2 signature
2D9441C0CB3E4F1DF034B216EC08927BD968FEFD389DB1DD539F3A2D0A20E9D1963B4E719CEEF0F5F1D8866D2C2E237A9C2800CD4B577CBD75B980C8D9048F09