@version 1
####################################
# EVM => Archethic : Request funds #
####################################
condition triggered_by: transaction, on: request_funds(end_time, amount, user_address, secret_hash, evm_tx_address, evm_contract, chain_id), as: [
type: "contract",
code: valid_chargeable_code?(end_time, amount, user_address, secret_hash),
timestamp: (
# End time cannot be less than now or more than 1 day
now = Time.now()
end_time > now && end_time <= now + 86400
),
uco_transfers: (
# Ensure the pool has enough UCO to send the requested fund
balance = Chain.get_uco_balance(contract.address)
balance >= amount
),
content: List.in?([11155111,80001,97], chain_id),
token_transfers: !contract_already_charged?(Json.parse(contract.content), chain_id, evm_contract),
address: (
valid? = false
tx_receipt_request = get_tx_receipt_request(evm_tx_address)
call_status_request = get_call_request(evm_contract, "status()", 2)
call_enough_funds_request = get_call_request(evm_contract, "enoughFunds()", 3)
call_hash_request = get_call_request(evm_contract, "hash()", 4)
call_end_time_request = get_call_request(evm_contract, "lockTime()", 5)
call_amount_request = get_call_request(evm_contract, "amount()", 6)
body = Json.to_string([
tx_receipt_request,
call_status_request,
call_enough_funds_request,
call_hash_request,
call_end_time_request,
call_amount_request
])
chain_data = get_chain_data(chain_id)
headers = ["Content-Type": "application/json"]
res = Http.request(chain_data.endpoint, "POST", headers, body)
if res.status == 200 && Json.is_valid?(res.body) do
responses = Json.parse(res.body)
tx_receipt = get_response(responses, 1)
call_status = get_response(responses, 2)
call_enough_funds = get_response(responses, 3)
call_hash = get_response(responses, 4)
call_end_time = get_response(responses, 5)
call_amount = get_response(responses, 6)
if !any_nil?([tx_receipt, call_status, call_enough_funds, call_hash, call_end_time, call_amount]) do
# event = Crypto.hash("ContractMinted(address,uint256)", "keccak256")
event = "0x8640c3cb3cba5653efe5a3766dc7a9fb9b02102a9f97fbe9ea39f0082c3bf497"
valid_tx_receipt? = valid_tx_receipt?(tx_receipt, chain_data.proxy_address, evm_contract, event)
# Pending is status 0
valid_status? = valid_status?(call_status, 0)
enough_funds? = enough_funds?(call_enough_funds)
valid_hash? = valid_hash?(call_hash, secret_hash)
valid_end_time? = valid_end_time?(call_end_time, end_time)
valid_amount? = valid_amount?(call_amount, amount, chain_data.decimals)
valid? = valid_tx_receipt? && valid_status? && enough_funds? && valid_hash? && valid_end_time? && valid_amount?
end
end
valid?
)
]
actions triggered_by: transaction, on: request_funds(end_time, amount, _, _, _, evm_contract, chain_id) do
chain_data = get_chain_data(chain_id)
contract_content = Json.parse(contract.content)
# Delete old contract where end_time is over
charged_contracts = Map.get(contract_content, "charged_contracts", Map.new())
charged_contracts = delete_old_charged_contracts(charged_contracts)
# Update state to keep contract already used
new_charged_contracts = add_charged_contracts(charged_contracts, chain_id, evm_contract, end_time)
contract_content = Map.set(contract_content, "charged_contracts", new_charged_contracts)
Contract.set_content(Json.to_string(contract_content))
Contract.set_type("transfer")
Contract.add_recipient(
address: transaction.address,
action: "provision",
args: [evm_contract, chain_data.endpoint]
)
Contract.add_uco_transfer(to: transaction.address, amount: amount)
end
##########################################
# Archethic => EVM : Request secret hash #
##########################################
condition triggered_by: transaction, on: request_secret_hash(htlc_genesis_address, amount, user_address, chain_id), as: [
type: "transfer",
code: valid_signed_code?(htlc_genesis_address, amount, user_address),
previous_public_key:
(
# Ensure contract has enough fund to withdraw
previous_address = Chain.get_previous_address()
balance = Chain.get_uco_balance(previous_address)
balance >= amount
),
content: List.in?([11155111,80001,97], chain_id),
uco_transfers:
(
htlc_genesis_address = String.to_hex(htlc_genesis_address)
Map.get(htlc_genesis_address) == amount
)
]
actions triggered_by: transaction, on: request_secret_hash(htlc_genesis_address, amount, _user_address, chain_id) do
# Here delete old secret that hasn't been used before endTime
contract_content = Json.parse(contract.content)
requested_secrets = Map.get(contract_content, "requested_secrets", Map.new())
requested_secrets = delete_unused_secrets(requested_secrets)
secret = Crypto.hmac(transaction.address)
secret_hash = Crypto.hash(secret, "sha256")
# Build signature for EVM decryption
signature = sign_for_evm(secret_hash, chain_id)
# Calculate endtime now + 2 hours
now = Time.now()
end_time = now - Math.rem(now, 60) + 7200
# Add secret and signature in content
htlc_map = [
hmac_address: transaction.address,
end_time: end_time,
chain_id: chain_id
]
htlc_genesis_address = String.to_hex(htlc_genesis_address)
new_requested_secrest = Map.set(requested_secrets, htlc_genesis_address, htlc_map)
contract_content = Map.set(contract_content, "requested_secrets", new_requested_secrest)
Contract.set_content(Json.to_string(contract_content))
Contract.add_recipient(
address: htlc_genesis_address,
action: "set_secret_hash",
args: [secret_hash, signature, end_time]
)
end
####################################
# Archethic => EVM : Reveal secret #
####################################
condition triggered_by: transaction, on: reveal_secret(htlc_genesis_address, evm_tx_address, evm_contract), as: [
type: "transfer",
content: (
# Ensure htlc_genesis_address exists in pool state
# and end_time has not been reached
valid? = false
contract_content = Json.parse(contract.content)
htlc_genesis_address = String.to_hex(htlc_genesis_address)
requested_secrets = Map.get(contract_content, "requested_secrets", Map.new())
htlc_map = Map.get(requested_secrets, htlc_genesis_address)
if htlc_map != nil do
valid? = htlc_map.end_time > Time.now()
end
valid?
),
address: (
valid? = false
htlc_map = nil
contract_content = Json.parse(contract.content)
htlc_genesis_address = String.to_hex(htlc_genesis_address)
requested_secrets = Map.get(contract_content, "requested_secrets", Map.new())
htlc_map = Map.get(requested_secrets, htlc_genesis_address)
if htlc_map != nil do
tx_receipt_request = get_tx_receipt_request(evm_tx_address)
call_status_request = get_call_request(evm_contract, "status()", 2)
call_enough_funds_request = get_call_request(evm_contract, "enoughFunds()", 3)
call_hash_request = get_call_request(evm_contract, "hash()", 4)
call_end_time_request = get_call_request(evm_contract, "lockTime()", 5)
call_amount_request = get_call_request(evm_contract, "amount()", 6)
body = Json.to_string([
tx_receipt_request,
call_status_request,
call_enough_funds_request,
call_hash_request,
call_end_time_request,
call_amount_request
])
chain_data = get_chain_data(htlc_map.chain_id)
headers = ["Content-Type": "application/json"]
res = Http.request(chain_data.endpoint, "POST", headers, body)
if res.status == 200 && Json.is_valid?(res.body) do
responses = Json.parse(res.body)
tx_receipt = get_response(responses, 1)
call_status = get_response(responses, 2)
call_enough_funds = get_response(responses, 3)
call_hash = get_response(responses, 4)
call_end_time = get_response(responses, 5)
call_amount = get_response(responses, 6)
if !any_nil?([tx_receipt, call_status, call_enough_funds, call_hash, call_end_time, call_amount]) do
# event = Crypto.hash("ContractProvisioned(address,uint256)", "keccak256")
event = "0x0c5d1829e93110ff9c24aa8ac41893b65509108384b3036d4f73ffccb235e9ec"
secret = Crypto.hmac(htlc_map.hmac_address)
secret_hash = Crypto.hash(secret, "sha256")
htlc_data = Contract.call_function(htlc_genesis_address, "get_htlc_data", [])
valid_tx_receipt? = valid_tx_receipt?(tx_receipt, chain_data.proxy_address, evm_contract, event)
# Pending is status 0
valid_status? = valid_status?(call_status, 0)
enough_funds? = enough_funds?(call_enough_funds)
valid_hash? = valid_hash?(call_hash, secret_hash)
valid_end_time? = valid_end_time?(call_end_time, htlc_map.end_time)
valid_amount? = valid_amount?(call_amount, htlc_data.amount, chain_data.decimals)
valid? = valid_tx_receipt? && valid_status? && enough_funds? && valid_hash? && valid_end_time? && valid_amount?
end
end
end
valid?
)
]
actions triggered_by: transaction, on: reveal_secret(htlc_genesis_address, _evm_tx_address, _evm_contract) do
contract_content = Json.parse(contract.content)
requested_secrets = Map.get(contract_content, "requested_secrets", Map.new())
htlc_genesis_address = String.to_hex(htlc_genesis_address)
htlc_map = Map.get(requested_secrets, htlc_genesis_address)
requested_secrets = Map.delete(requested_secrets, htlc_genesis_address)
contract_content = Map.set(contract_content, "requested_secrets", requested_secrets)
secret = Crypto.hmac(htlc_map.hmac_address)
# Do not use chain ID in signature for the secret reveal
signature = sign_for_evm(secret, nil)
Contract.set_content(Json.to_string(contract_content))
Contract.add_recipient(
address: htlc_genesis_address,
action: "reveal_secret",
args: [secret, signature]
)
end
condition triggered_by: transaction, on: update_code(new_code), as: [
previous_public_key:
(
# Pool code can only be updated from the master chain if the bridge
# Transaction is not yet validated so we need to use previous address
# to get the genesis address
previous_address = Chain.get_previous_address()
Chain.get_genesis_address(previous_address) == 0x000020a6911478356ca264174e35d26021fb4cbe870703bb7c3859e01cdb34bcd823
),
code: Code.is_valid?(new_code)
]
actions triggered_by: transaction, on: update_code(new_code) do
Contract.set_type("contract")
# Keep contract state
Contract.set_content(contract.content)
Contract.set_code(new_code)
end
####################
# Public functions #
####################
export fun get_token_address() do
"UCO"
end
#####################
# Private functions #
#####################
fun contract_already_charged?(content, chain_id, evm_contract) do
chain_id = String.from_number(chain_id)
evm_contract = String.to_lowercase(evm_contract)
charged_contracts = Map.get(content, "charged_contracts", Map.new())
contracts = Map.get(charged_contracts, chain_id, Map.new())
Map.get(contracts, evm_contract, nil) != nil
end
fun add_charged_contracts(charged_contracts, chain_id, evm_contract, end_time) do
chain_id = String.from_number(chain_id)
evm_contract = String.to_lowercase(evm_contract)
contracts = Map.get(charged_contracts, chain_id, Map.new())
updated_contracts = Map.set(contracts, evm_contract, end_time)
Map.set(charged_contracts, chain_id, updated_contracts)
end
fun delete_old_charged_contracts(charged_contracts) do
now = Time.now()
for chain_id in Map.keys(charged_contracts) do
contracts = Map.get(charged_contracts, chain_id)
for address in Map.keys(contracts) do
contract_end_time = Map.get(contracts, address)
if contract_end_time <= now do
contracts = Map.delete(contracts, address)
end
end
charged_contracts = Map.set(charged_contracts, chain_id, contracts)
end
charged_contracts
end
fun delete_unused_secrets(requested_secrets) do
for address in Map.keys(requested_secrets) do
htlc_map = Map.get(requested_secrets, address)
if htlc_map.end_time <= Time.now() do
requested_secrets = Map.delete(requested_secrets, address)
end
end
requested_secrets
end
fun valid_chargeable_code?(end_time, amount, user_address, secret_hash) do
args = [
end_time,
user_address,
0x000018d60115ece0c7558a46b4693749bf6beab524fddccf9b10b910619e4ee08801,
secret_hash,
"UCO",
amount
]
expected_code = Contract.call_function(0x0000795bfd6ca2f5ea9f378c20775caf798e9bfbff6aec94bf87ad8d59233b4fa299, "get_chargeable_htlc", args)
Code.is_same?(expected_code, transaction.code)
end
fun valid_signed_code?(htlc_address, amount, user_address) do
valid? = false
htlc_address = String.to_hex(htlc_address)
last_htlc_transaction = Chain.get_last_transaction(htlc_address)
if last_htlc_transaction != nil do
args = [
user_address,
0x000018d60115ece0c7558a46b4693749bf6beab524fddccf9b10b910619e4ee08801,
"UCO",
amount
]
expected_code = Contract.call_function(0x0000795bfd6ca2f5ea9f378c20775caf798e9bfbff6aec94bf87ad8d59233b4fa299, "get_signed_htlc", args)
valid? = Code.is_same?(expected_code, last_htlc_transaction.code)
end
valid?
end
fun get_chain_data(chain_id) do
data = Map.new()
if chain_id == 11155111 do
data = Map.set(data, "endpoint", "https://sepolia.infura.io/v3/3a7a2dbdbec046a4961550ddf8c7d78a")
data = Map.set(data, "proxy_address", "0x50b8b73327613468e5605ed59b980555daac354a")
data = Map.set(data, "decimals", 18)
end
if chain_id == 80001 do
data = Map.set(data, "endpoint", "https://polygon-mumbai.infura.io/v3/3a7a2dbdbec046a4961550ddf8c7d78a")
data = Map.set(data, "proxy_address", "0xe55915d112711127339f073e75185e6311dd72c8")
data = Map.set(data, "decimals", 18)
end
if chain_id == 97 do
data = Map.set(data, "endpoint", "https://data-seed-prebsc-1-s2.bnbchain.org:8545")
data = Map.set(data, "proxy_address", "0xacc408cb6d6d9c73c6003269d322cb78150fc137")
data = Map.set(data, "decimals", 18)
end
data
end
fun get_call_request(evm_contract, call, id) do
abi_data = Evm.abi_encode(call)
tx = [to: evm_contract, data: "0x#{abi_data}"]
[jsonrpc: "2.0", id: id, method: "eth_call", params: [tx, "latest"]]
end
fun get_response(responses, id) do
response = nil
for res in responses do
if res.id == id do
response = Map.get(res, "result")
end
end
response
end
fun any_nil?(list) do
nil? = false
for i in list do
if i == nil do
nil? = true
end
end
nil?
end
fun get_tx_receipt_request(evm_tx_address) do
[
jsonrpc: "2.0",
id: 1,
method: "eth_getTransactionReceipt",
params: [evm_tx_address]
]
end
fun valid_tx_receipt?(tx_receipt, proxy_address, evm_contract, expected_event) do
logs = nil
for log in tx_receipt.logs do
if String.to_lowercase(log.address) == proxy_address do
logs = log
end
end
if logs != nil do
# Transaction is valid
valid_status? = tx_receipt.status == "0x1"
# Transaction interacted with proxy address
valid_proxy_address? = String.to_lowercase(tx_receipt.to) == proxy_address
# Logs are comming from proxy address
valid_logs_address? = String.to_lowercase(logs.address) == proxy_address
# Pool contract emmited expected event
event = List.at(logs.topics, 0)
valid_event? = String.to_lowercase(event) == expected_event
# Contract minted match evm_contract in parameters
decoded_data = Evm.abi_decode("(address)", List.at(logs.topics, 1))
topic_address = List.at(decoded_data, 0)
valid_contract_address? = topic_address == String.to_lowercase(evm_contract)
valid_status? && valid_proxy_address? && valid_logs_address? && valid_event? && valid_contract_address?
else
false
end
end
fun valid_status?(call_status, expected_status) do
decoded_data = Evm.abi_decode("(uint)", call_status)
List.at(decoded_data, 0) == expected_status
end
fun enough_funds?(call_enough_funds) do
decoded_data = Evm.abi_decode("(bool)", call_enough_funds)
List.at(decoded_data, 0) == true
end
fun valid_hash?(call_hash, secret_hash) do
secret_hash = "0x#{String.to_lowercase(secret_hash)}"
decoded_data = Evm.abi_decode("(bytes32)", call_hash)
List.at(decoded_data, 0) == secret_hash
end
fun valid_end_time?(call_end_time, end_time) do
decoded_data = Evm.abi_decode("(uint256)", call_end_time)
List.at(decoded_data, 0) == end_time
end
fun valid_amount?(call_amount, amount, decimals) do
decoded_data = Evm.abi_decode("(uint256)", call_amount)
big_int_amount = List.at(decoded_data, 0)
decimal_amount = big_int_amount / Math.pow(10, decimals)
decimal_amount == amount
end
fun sign_for_evm(data, chain_id) do
hash = data
if chain_id != nil do
# Perform a first hash to combine data and chain_id
abi_data = Evm.abi_encode("(bytes32,uint)", [data, chain_id])
hash = Crypto.hash(abi_data, "keccak256")
end
prefix = String.to_hex("\x19Ethereum Signed Message:\n32")
signature_payload = Crypto.hash("#{prefix}#{hash}", "keccak256")
sig = Crypto.sign_with_recovery(signature_payload)
if sig.v == 0 do
sig = Map.set(sig, "v", 27)
else
sig = Map.set(sig, "v", 28)
end
sig
end
{
"charged_contracts": {
"11155111": {
"0xa8d2087e62937fb9c7aa2cbc5ed8f6673cb7f563": 1700003040
},
"80001": {
"0x015df6ce27d55c05b4d9c032af1b598bae892cb7": 1700000160,
"0x380840d4818b522894cc720a94a524afc6258b68": 1699997700,
"0x49d2b831beaf51218e3a0839124e0e13006817b2": 1699999200,
"0x536806fb37de347c94ce57b713780d4a6c65c162": 1700003280,
"0xf170d8181936682a09908b83e2bed0b791b75cfa": 1700000880
},
"97": {
"0xf1ca4e295b0504a8a3ce03c831af94bcc3c6ffda": 1699999860,
"0xffb8749ae585baa00820268c4118c0c9b4ce7d54": 1699996680
}
},
"requested_secrets": {
"00002B7BD810AF419B6CEC758A2739391B0DD2CDA6A430E0421B0CB52E7BDF0A12F6": {
"chain_id": 11155111,
"end_time": 1700009520,
"hmac_address": "000013ADE0B9D864229AF5DBE25417DAC2DB70C7FB1A5A14304D189189C10F14C556"
},
"00004E9381ABBC38EA49511D7E4F0B6AFC11FDBEBE88B1CAA7EBA5DA2DAB8356AF57": {
"chain_id": 97,
"end_time": 1700006160,
"hmac_address": "0000C55B372D7D45F1B7D84973DA9E1D3EDF07071BAFDAADFE626886813BF4285BFA"
},
"0000766C4554442C95CA47214983F9A9EB4DC34EE45F1F26634F231CCDC65CDDCE2A": {
"chain_id": 80001,
"end_time": 1700006520,
"hmac_address": "00005D225CDD04CF105D522E40A4ACA6A0E10CE680664A640A94992DBD42B6296C89"
},
"000084F1EA1311967FB083C6C3BC9BB37C749D256B21A667E972C42436203BA39AC8": {
"chain_id": 97,
"end_time": 1700006400,
"hmac_address": "0000BF3A13E9847846E65DF043754DB3BB59E204FFE206172D83D1FCCCFC806381E6"
},
"0000B6F88B6F1553AF02B46E488F5888EF1B7040D55184D3AC26CF0C8282BE849FED": {
"chain_id": 80001,
"end_time": 1700010900,
"hmac_address": "0000B3E4DF8D8BDE24C924B0977DD44EE663E41260A66F714239671293EF5ED1AB16"
}
}
}
State (0 B)
-
Secret shared with 1 key
Encoded secret
FEB3AEF580C43C55C38A1F40DD02099D63D25B2F6F522A85F7F53D2064F96F03222A65430B8A32E4C79AB7E0441D48A4F36CB13E2DF3ACBDB4F59E6B
Authorized keys
- 00017877BCF4122095926A49489009649603AB129822A19EF9D573B8FD714911ED7F
-
Resolved 0000E6EB...2581reveal_secret
[ "427A4D717D5A81BE1BAA56924F9D878057E1D35F89676BC8F78B8E7769F1ACA0", { "r": "C57BBF7D99075F743024543D9B50FB0B9A6079D62010ABE4E3925B8A4B4D1514", "s": "450BCD544E9A71517E903EC4A0E3938B088AF905917E41AC9E69D32A60AEAF53", "v": 28 } ]
Inputs (0)
Contract inputs (0)
Unspent outputs (1)
-
From 0000A2AC...AD9BAt 2023-11-14 23:50:09 UTCAmount 1,000,212.43033732 UCO
Previous public key
0001E09964E02F242D7342CCB44F12D4048CC88EB7D60FFEA01D20243E2B492CDF6B
Previous signature
FC5811E9EF10C67F84C8D42B73CDDDD19CB8402FB36A87A6574445A51DC1FA61FE484420DEB79B10CFAFE9A58ED83A657C78F4AB531AEFA555BFDAEE9BBAAE0B
Origin signature
304602210081180E7E1B89CC499373B04B6075B734F971732B0799EFEAC7A48AD4F871B08D022100B81D4AEF63A35EC135E2489007C48BD66211CC9F5FE182A256AE362BA32E1B48
Proof of work
0101046C39D56B717142B6EE14B0F8B2561ECA458F3D2D12C9977D613F78829419063211F9C21F7BB0D56B6523040A8156BE22B6E9D6332B88ED882574D12AE32F7A45
Proof of integrity
00BD92FE2C730A2C1D04979D8505F089FCE689CCD4DE457F200DE6D009D5A3359B
Coordinator signature
DF086F4BB4C40D78A676A9B6B3F454D4B31BD0A3C70580CDF69E42C4FCB048A623BB9FDA439DC3BD1439F0A23AC589D592C7FE2B0413C59B673EE2D4449D240B
Validator #1 public key
00011B58ED42235461734EAF253BD97A80B92899ABCC3BE680D44B6825DD2A88A947
Validator #1 signature
6044A1846D38FE8CAD025E9A62FFCD0B66C78292059EF2D7149070B58505D20999B4E7424072A7E438AB4AB72E21E4C6E7551CC846B2A0D230E7934AE2D1EF06
Validator #2 public key
0001B0A94804BF8ECC9897075C6207FF63EF4D339F57A0349888E6B77CD47DB53EF3
Validator #2 signature
3C92DF6C55D228F6D9EDDB51AFF93B9F7B5C267E7D61F33E485F5F4D854D263D0D719E7FDC4F1D4B9A32332E8903F96CF44864D405EABB8F5A48D5FA223CBB0F