@version 1
####################################
# EVM => Archethic : Request funds #
####################################
condition triggered_by: transaction, on: request_funds(end_time, amount, user_address, secret_hash), as: [
type: "contract",
code: valid_chargeable_code?(end_time, amount, user_address, secret_hash),
timestamp: (
# End time cannot be less than now or more than 1 day
now = Time.now()
end_time > now && end_time <= (now + 86400)
),
content: (
# Ensure the pool has enough UCO to send the requested fund
balance = Chain.get_uco_balance(contract.address)
balance >= amount
),
address: (
# Here ensure Ethereum contract exists and check rules
# How to ensure Ethereum contract is a valid one ?
# Maybe get the ABI of HTLC on github and compare it to the one on Ethereum
# Then control rules
true
)
]
actions triggered_by: transaction, on: request_funds(_end_time, amount, _user_address, _secret_hash) do
Contract.set_type "transfer"
Contract.add_uco_transfer to: transaction.address, amount: amount
end
##########################################
# Archethic => EVM : Request secret hash #
##########################################
condition triggered_by: transaction, on: request_secret_hash(htlc_genesis_address, amount, user_address, chain_id), as: [
type: "transfer",
code: valid_signed_code?(htlc_genesis_address, amount, user_address),
previous_public_key: (
# Ensure contract has enough fund to withdraw
previous_address = Chain.get_previous_address()
balance = Chain.get_uco_balance(previous_address)
balance >= amount
),
content: List.in?([11155111,80001,97], chain_id),
uco_transfers: (
htlc_genesis_address = String.to_hex(htlc_genesis_address)
Map.get(htlc_genesis_address) == amount
)
]
actions triggered_by: transaction, on: request_secret_hash(htlc_genesis_address, _amount, _user_address, chain_id) do
# Here delete old secret that hasn't been used before endTime
contract_content = Map.new()
if Json.is_valid?(contract.content) do
contract_content = Json.parse(contract.content)
end
for key in Map.keys(contract_content) do
htlc_map = Map.get(contract_content, key)
if htlc_map.end_time <= Time.now() do
contract_content = Map.delete(contract_content, key)
end
end
secret = Crypto.hmac(transaction.address)
secret_hash = Crypto.hash(secret, "sha256")
# Build signature for EVM decryption
signature = sign_for_evm(secret_hash, chain_id)
# Calculate endtime now + 2 hours
now = Time.now()
end_time = now - Math.rem(now, 60) + 7200
# Add secret and signature in content
htlc_map = [
hmac_address: transaction.address,
end_time: end_time,
chain_id: chain_id
]
htlc_genesis_address = String.to_hex(htlc_genesis_address)
contract_content = Map.set(contract_content, htlc_genesis_address, htlc_map)
Contract.set_content Json.to_string(contract_content)
Contract.add_recipient address: htlc_genesis_address, action: "set_secret_hash", args: [secret_hash, signature, end_time]
end
####################################
# Archethic => EVM : Reveal secret #
####################################
condition triggered_by: transaction, on: reveal_secret(htlc_genesis_address), as: [
type: "transfer",
content: (
# Ensure htlc_genesis_address exists in pool state
# and end_time has not been reached
valid? = false
if Json.is_valid?(contract.content) do
htlc_genesis_address = String.to_hex(htlc_genesis_address)
htlc_map = Map.get(Json.parse(contract.content), htlc_genesis_address)
if htlc_map != nil do
valid? = htlc_map.end_time > Time.now()
end
end
valid?
),
address: (
# Here ensure Ethereum contract exists and check rules
# How to ensure Ethereum contract is a valid one ?
# Maybe get the ABI of HTLC on github and compare it to the one on Ethereum
# Then control rules
true
)
]
actions triggered_by: transaction, on: reveal_secret(htlc_genesis_address) do
contract_content = Json.parse(contract.content)
htlc_genesis_address = String.to_hex(htlc_genesis_address)
htlc_map = Map.get(contract_content, htlc_genesis_address)
contract_content = Map.delete(contract_content, htlc_genesis_address)
secret = Crypto.hmac(htlc_map.hmac_address)
# Do not use chain ID in signature for the secret reveal
signature = sign_for_evm(secret, nil)
Contract.set_content Json.to_string(contract_content)
Contract.add_recipient address: htlc_genesis_address, action: "reveal_secret", args: [secret, signature]
end
condition triggered_by: transaction, on: update_code(new_code), as: [
previous_public_key: (
# Pool code can only be updated from the master chain if the bridge
# Transaction is not yet validated so we need to use previous address
# to get the genesis address
previous_address = Chain.get_previous_address()
Chain.get_genesis_address(previous_address) == 0x000020a6911478356ca264174e35d26021fb4cbe870703bb7c3859e01cdb34bcd823
),
code: Code.is_valid?(new_code)
]
actions triggered_by: transaction, on: update_code(new_code) do
Contract.set_type "contract"
# Keep contract state
Contract.set_content contract.content
Contract.set_code new_code
end
####################
# Public functions #
####################
export fun get_token_address() do
"UCO"
end
#####################
# Private functions #
#####################
fun valid_chargeable_code?(end_time, amount, user_address, secret_hash) do
args = [
end_time,
user_address,
0x000018d60115ece0c7558a46b4693749bf6beab524fddccf9b10b910619e4ee08801,
secret_hash,
"UCO",
amount
]
expected_code = Contract.call_function(0x0000795bfd6ca2f5ea9f378c20775caf798e9bfbff6aec94bf87ad8d59233b4fa299, "get_chargeable_htlc", args)
Code.is_same?(expected_code, transaction.code)
end
fun valid_signed_code?(htlc_address, amount, user_address) do
valid? = false
htlc_address = String.to_hex(htlc_address)
last_htlc_transaction = Chain.get_last_transaction(htlc_address)
if last_htlc_transaction != nil do
args = [
user_address,
0x000018d60115ece0c7558a46b4693749bf6beab524fddccf9b10b910619e4ee08801,
"UCO",
amount
]
expected_code = Contract.call_function(0x0000795bfd6ca2f5ea9f378c20775caf798e9bfbff6aec94bf87ad8d59233b4fa299, "get_signed_htlc", args)
valid? = Code.is_same?(expected_code, last_htlc_transaction.code)
end
valid?
end
fun sign_for_evm(data, chain_id) do
hash = data
if chain_id != nil do
# Perform a first hash to combine data and chain_id
abi_data = Evm.abi_encode("(bytes32,uint)", [data, chain_id])
hash = Crypto.hash(abi_data, "keccak256")
end
prefix = String.to_hex("\x19Ethereum Signed Message:\n32")
signature_payload = Crypto.hash("#{prefix}#{hash}", "keccak256")
sig = Crypto.sign_with_recovery(signature_payload)
if sig.v == 0 do
sig = Map.set(sig, "v", 27)
else
sig = Map.set(sig, "v", 28)
end
sig
end
{
"0000003AE6320FD2131479ABB7E133646DE3A95ABEACB8638FF29F15E8D8C1B9E660": {
"chain_id": 11155111,
"end_time": 1697803200,
"hmac_address": "0000AFC53C90A5F29E93103D3A9EF8C76700EC0DBE294108BCE1E764F6C274BDFF51"
},
"00008B502CF859CD0BEB2BC89FDA72F3C7F9901B482B7CB133EF2572645BED711AE1": {
"chain_id": 11155111,
"end_time": 1697802120,
"hmac_address": "0000DE1FED4D061653CEED0FF4A0DC7F686D6639192537756A3C526B7A3338B3C451"
},
"0000CF1172FC915739196B86FA1D30989F443F0E69D22F224CA3A54DA69CBEF93FB5": {
"chain_id": 11155111,
"end_time": 1697801880,
"hmac_address": "00009095B8C9711D3A86C1110D6495656AF4C1B9EFB506EFCD1BD9D247884C6D836F"
},
"0000D35B8492869E2AD2B726DD6F7631F101A6730336C51CA8F74A495993535AF702": {
"chain_id": 11155111,
"end_time": 1697803020,
"hmac_address": "00008F4AF87F5D2436267526AC57FEB3FB0FB21BA588855ACC081EBA09E811FA3F58"
}
}
State (0 B)
-
Secret shared with 1 key
Encoded secret
F5C78C3026EE80EFB5AE9B16A72DB1DD4FF450CF2D6657F0B3A2DC1ABDC5EB36472E564D0F095AAB2EDD2246DC727DF5828F1F5C8D3791B52261EAF7
Authorized keys
- 00017877BCF4122095926A49489009649603AB129822A19EF9D573B8FD714911ED7F
-
Resolved 00007513...0A2Fset_secret_hash
[ "B04D9E14F2A36A36107CD249939C84D06D988FF92AFF5F993649B8DEAF72E29D", { "r": "A976AA30449FD8EBAC4149F1B25EEC839EAC0EFC9F8B76BC02D3E3B1FF6CD44E", "s": "04DF29903CD7AF082AF3C39CB25C71E2F93B221C2219F19914547B0A2145B8BC", "v": 28 }, 1697803200 ]
Inputs (0)
Contract inputs (0)
Unspent outputs (1)
-
From 00007E30...8B96At 2023-10-20 10:00:30 UTCAmount 248.06494885 UCO
Previous public key
0001E0A630E1094410B2496E1EF94512D932040CF498D8DCC610AFBC004B0607210D
Previous signature
2E9559F9250E36A662FE72338828D7E585838D9D84ECC3CE139B93D209A4F9324889500D38F3A7580CE59B53D0791A70992EEA9B996BB2E93BA706872CEE180F
Origin signature
304502202F4D865550A482F2BD60F8035DEE648A1AA8A372D4ADB2600B3C4A3288DFB8BC0221008C0366677362D62FEE1EAC452762BFA02164DCA238CD648F0381D3479475080C
Proof of work
010104AB672F1E69B064D192819F1797C1926F158DBA8F3924AC732B4C4D70D0C8EA0A0D6506E5896C9C2524D2BE26CB5016287E1816A597C408008BA36FCB154A7765
Proof of integrity
009B77830C36E60CC8E03CCED20D85A2007C611110882B88946368E5D197FD77E3
Coordinator signature
74D54876B5F2DBB75CAA31BAA3434EFF2FE7BF9D69430C11453BAE498CA45BEC7EC0CAF63E7E37D3093297A073C87D16A927D6D16B454D127014E8FA54B86508
Validator #1 public key
0001500FBE298B79FFBDD5CCA1798F30FD88A53D26EC39DE5DDE1F4137B032A4BC34
Validator #1 signature
91B1E28569F737B544C10AD7526EE4AC4AAF60DDEB7B8C3D85AD8D3C298F5FB3691003FE110366834ACA1AC4DC73E6B5BE6B5B6363C2E3C0AF385F80DD78CC01
Validator #2 public key
00018A312AFA617E98B343D09AD2E73F0AB661DB0A59FB986D5DB8CE7664E14C25FC
Validator #2 signature
B561534388D0AB8D1FA36CF3FFE3A64B554A5F00B5E8F0438AC7423B9EFF545D115F32769B44680BC3DA845D41BEC4B0E728077A31455A21361159DE18905B0D