@version 1 #################################### # EVM => Archethic : Request funds # #################################### condition triggered_by: transaction, on: request_funds(end_time, amount, user_address, secret_hash), as: [ type: "contract", code: valid_chargeable_code?(end_time, amount, user_address, secret_hash), timestamp: ( # End time cannot be less than now or more than 1 day now = Time.now() end_time > now && end_time <= (now + 86400) ), content: ( # Ensure the pool has enough UCO to send the requested fund balance = Chain.get_uco_balance(contract.address) balance >= amount ), address: ( # Here ensure Ethereum contract exists and check rules # How to ensure Ethereum contract is a valid one ? # Maybe get the ABI of HTLC on github and compare it to the one on Ethereum # Then control rules true ) ] actions triggered_by: transaction, on: request_funds(_end_time, amount, _user_address, _secret_hash) do Contract.set_type "transfer" Contract.add_uco_transfer to: transaction.address, amount: amount end ########################################## # Archethic => EVM : Request secret hash # ########################################## condition triggered_by: transaction, on: request_secret_hash(htlc_genesis_address, amount, user_address, chain_id), as: [ type: "transfer", code: valid_signed_code?(htlc_genesis_address, amount, user_address), previous_public_key: ( # Ensure contract has enough fund to withdraw previous_address = Chain.get_previous_address() balance = Chain.get_uco_balance(previous_address) balance >= amount ), content: List.in?([11155111,80001,97], chain_id), uco_transfers: ( htlc_genesis_address = String.to_hex(htlc_genesis_address) Map.get(htlc_genesis_address) == amount ) ] actions triggered_by: transaction, on: request_secret_hash(htlc_genesis_address, _amount, _user_address, chain_id) do # Here delete old secret that hasn't been used before endTime contract_content = Map.new() if Json.is_valid?(contract.content) do contract_content = Json.parse(contract.content) end for key in Map.keys(contract_content) do htlc_map = Map.get(contract_content, key) if htlc_map.end_time <= Time.now() do contract_content = Map.delete(contract_content, key) end end secret = Crypto.hmac(transaction.address) secret_hash = Crypto.hash(secret, "sha256") # Build signature for EVM decryption signature = sign_for_evm(secret_hash, chain_id) # Calculate endtime now + 2 hours now = Time.now() end_time = now - Math.rem(now, 60) + 7200 # Add secret and signature in content htlc_map = [ hmac_address: transaction.address, end_time: end_time, chain_id: chain_id ] htlc_genesis_address = String.to_hex(htlc_genesis_address) contract_content = Map.set(contract_content, htlc_genesis_address, htlc_map) Contract.set_content Json.to_string(contract_content) Contract.add_recipient address: htlc_genesis_address, action: "set_secret_hash", args: [secret_hash, signature, end_time] end #################################### # Archethic => EVM : Reveal secret # #################################### condition triggered_by: transaction, on: reveal_secret(htlc_genesis_address), as: [ type: "transfer", content: ( # Ensure htlc_genesis_address exists in pool state # and end_time has not been reached valid? = false if Json.is_valid?(contract.content) do htlc_genesis_address = String.to_hex(htlc_genesis_address) htlc_map = Map.get(Json.parse(contract.content), htlc_genesis_address) if htlc_map != nil do valid? = htlc_map.end_time > Time.now() end end valid? ), address: ( # Here ensure Ethereum contract exists and check rules # How to ensure Ethereum contract is a valid one ? # Maybe get the ABI of HTLC on github and compare it to the one on Ethereum # Then control rules true ) ] actions triggered_by: transaction, on: reveal_secret(htlc_genesis_address) do contract_content = Json.parse(contract.content) htlc_genesis_address = String.to_hex(htlc_genesis_address) htlc_map = Map.get(contract_content, htlc_genesis_address) contract_content = Map.delete(contract_content, htlc_genesis_address) secret = Crypto.hmac(htlc_map.hmac_address) # Do not use chain ID in signature for the secret reveal signature = sign_for_evm(secret, nil) Contract.set_content Json.to_string(contract_content) Contract.add_recipient address: htlc_genesis_address, action: "reveal_secret", args: [secret, signature] end condition triggered_by: transaction, on: update_code(new_code), as: [ previous_public_key: ( # Pool code can only be updated from the master chain if the bridge # Transaction is not yet validated so we need to use previous address # to get the genesis address previous_address = Chain.get_previous_address() Chain.get_genesis_address(previous_address) == 0x000020a6911478356ca264174e35d26021fb4cbe870703bb7c3859e01cdb34bcd823 ), code: Code.is_valid?(new_code) ] actions triggered_by: transaction, on: update_code(new_code) do Contract.set_type "contract" # Keep contract state Contract.set_content contract.content Contract.set_code new_code end #################### # Public functions # #################### export fun get_token_address() do "UCO" end ##################### # Private functions # ##################### fun valid_chargeable_code?(end_time, amount, user_address, secret_hash) do args = [ end_time, user_address, 0x000018d60115ece0c7558a46b4693749bf6beab524fddccf9b10b910619e4ee08801, secret_hash, "UCO", amount ] expected_code = Contract.call_function(0x0000795bfd6ca2f5ea9f378c20775caf798e9bfbff6aec94bf87ad8d59233b4fa299, "get_chargeable_htlc", args) Code.is_same?(expected_code, transaction.code) end fun valid_signed_code?(htlc_address, amount, user_address) do valid? = false htlc_address = String.to_hex(htlc_address) last_htlc_transaction = Chain.get_last_transaction(htlc_address) if last_htlc_transaction != nil do args = [ user_address, 0x000018d60115ece0c7558a46b4693749bf6beab524fddccf9b10b910619e4ee08801, "UCO", amount ] expected_code = Contract.call_function(0x0000795bfd6ca2f5ea9f378c20775caf798e9bfbff6aec94bf87ad8d59233b4fa299, "get_signed_htlc", args) valid? = Code.is_same?(expected_code, last_htlc_transaction.code) end valid? end fun sign_for_evm(data, chain_id) do hash = data if chain_id != nil do # Perform a first hash to combine data and chain_id abi_data = Evm.abi_encode("(bytes32,uint)", [data, chain_id]) hash = Crypto.hash(abi_data, "keccak256") end prefix = String.to_hex("\x19Ethereum Signed Message:\n32") signature_payload = Crypto.hash("#{prefix}#{hash}", "keccak256") sig = Crypto.sign_with_recovery(signature_payload) if sig.v == 0 do sig = Map.set(sig, "v", 27) else sig = Map.set(sig, "v", 28) end sig end
{ "0000003AE6320FD2131479ABB7E133646DE3A95ABEACB8638FF29F15E8D8C1B9E660": { "chain_id": 11155111, "end_time": 1697803200, "hmac_address": "0000AFC53C90A5F29E93103D3A9EF8C76700EC0DBE294108BCE1E764F6C274BDFF51" }, "00008B502CF859CD0BEB2BC89FDA72F3C7F9901B482B7CB133EF2572645BED711AE1": { "chain_id": 11155111, "end_time": 1697802120, "hmac_address": "0000DE1FED4D061653CEED0FF4A0DC7F686D6639192537756A3C526B7A3338B3C451" }, "0000CF1172FC915739196B86FA1D30989F443F0E69D22F224CA3A54DA69CBEF93FB5": { "chain_id": 11155111, "end_time": 1697801880, "hmac_address": "00009095B8C9711D3A86C1110D6495656AF4C1B9EFB506EFCD1BD9D247884C6D836F" }, "0000D35B8492869E2AD2B726DD6F7631F101A6730336C51CA8F74A495993535AF702": { "chain_id": 11155111, "end_time": 1697803020, "hmac_address": "00008F4AF87F5D2436267526AC57FEB3FB0FB21BA588855ACC081EBA09E811FA3F58" } }
State (0 B)
-
Secret shared with 1 key
Encoded secret
C5888E1E3AB70E89470080D653DF3453478D3DC591E74A84B3446B26EA2F5797F457B6E269E98F202B690200F99BE7624DA1A238EA15558FC8F1767D
Authorized keys
- 00017877BCF4122095926A49489009649603AB129822A19EF9D573B8FD714911ED7F
-
Resolved 00006C9D...B731reveal_secret
[ "50617CD7DE9D27B4AD416B2BD9738F371B4158C13AFA9C7E2F54726AD83410B2", { "r": "7036BF6C50DE35A26A1714B8E545EB22369E55380D32B7BD080B775C5D57AEEB", "s": "33B79C25A75841BC504506E4427BF8F7A136A6690009E00950CF8C93A27A1F49", "v": 27 } ]
Inputs (0)
Contract inputs (0)
Unspent outputs (1)
-
From 0000DA83...34D1At 2023-10-20 10:06:35 UTCAmount 248.06494885 UCO
Previous public key
0001961A8E9A33A8F5090BD9F35A38F01F196CEBDF1C1E7849885E687D6EA9270477
Previous signature
702DE81510B51332D2B97BC56E03060EBE0EB806BB85E8428E5717269289CAED1DD7B25B7CD34EFDA5AEA6B99D0A1BA0BBE3D2A7162E1E1943FE9302596FA70A
Origin signature
30440220089A68E906E13F329C48F34AE8D7F5EB5C7FEF8B146AD4765E49E000349B1501022057D420B1597454484F79B28F8E5E37B2A594271F3B5822F3DB6E171D55FCD448
Proof of work
010104AB672F1E69B064D192819F1797C1926F158DBA8F3924AC732B4C4D70D0C8EA0A0D6506E5896C9C2524D2BE26CB5016287E1816A597C408008BA36FCB154A7765
Proof of integrity
00DA974034E291D7B644141749A6893239D5F90F6A7A1463ED37CE1F0315F2BBFF
Coordinator signature
9FCB594BE02EEFEBEAC1CE514F1F6E74A1C4F67D9AF23E747B880184323084ACD56D0C1FA310B2E83BC41AFED20A95AF73F1FA774F4C87839305E3C05B840D0F
Validator #1 public key
0001500FBE298B79FFBDD5CCA1798F30FD88A53D26EC39DE5DDE1F4137B032A4BC34
Validator #1 signature
19B11373E2108990A6579BFC6F2B9BD283E865FCF213771E8902BC4A7D430CCA925FDC2ECE240D775562B32FEAC8495C4FD01698A3CDBE92F37348C622BF5408
Validator #2 public key
00018A312AFA617E98B343D09AD2E73F0AB661DB0A59FB986D5DB8CE7664E14C25FC
Validator #2 signature
C05FF06E952717FCA85CC5D68DA3F765B3A8BBEA92B5E0472044FFC5C4889054AD14B471CE154F269FFF5BE242FD0EF84718C7DF582EA6275F684EE3EAAC2609