contracts

module
v1.5.6 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: May 21, 2019 License: GPL-2.0, GPL-3.0

README

The Consumer Contract Wallet

This repository contains the Smart Contracts needed to power the TokenCard, written in Solidity, for execution in the EVM.

Overview

The functionality encoded in the Smart Contracts found in this repository have been designed to help users protect their tokens, by holding them within their own instance of a Consumer Contract Wallet which they can configure to their liking. The functionality within the Consumer Contract Wallet has been designed to limit a user's exposure to loss of tokens in the event that a user has had their Private Key compromised.

Each user deploys their own instance of the Consumer Contract Wallet (wallet.sol) to the Ethereum Network which interacts with an exchange rate oracle (oracle.sol) that exists to provide exchange rates needed to secure a user's tokens. The individual Consumer Contract Wallet contracts use the Ethereum Name Service (ENS) to resolve the location of the exchange rate oracle, as well as to resolve the location of the controller contract, this controller contract is used for administrative purposes and has no real access to user's tokens. The controllers are used to perform 2FA functionality and are used to perform administrative tasks on the oracle.

High-level Architecture
                                    ┌──────────────────┐
  ┌────────────────┐                │                  │
┌─┤                │                │                  │
│ │                │    ┌─── ENS ───▶    oracle.sol    │
│ │                │    │           │                  │        ┌───────────────────┐
│ │                │    │           │                  │        │                   │
│ │   wallet.sol   ├────┘           └──────────────────┘        │                   │
│ │                ├────────── ENS ─────────────────────────────▶   controller.sol  │
│ │                ├─────┐           ┌───────────────┐          │                   │
│ │                │     │         ┌─┤               │          │                   │
│ │                │     │         | │   ERC20       │          └───────────────────┘
│ └──────────────┬─┘     └───────────▶   token.sol   │
└────────────────┘                 | │               │
                                   | │               │
                                   | └───────────────┘
                                   └───────────────┘

## Assumptions

  • Every user will have their own Public and Private key pair, aka the Owner Address.
  • Users SHOULD NEVER have to share the Private Key of their Owner Address with anyone.
  • There are a number of different "pots of tokens" for a given user:
    • The user’s entire ETH and ERC20 token assets stored within the Consumer Contract Wallet.
    • An amount of ETH used to pay for the gas - Gas Tank. The Gas Tank is a representation of the ETH on the user's Owner Address. It should be noted that this ETH is NOT protected by the security features in the Consumer Contract Wallet as it resides outside of the Smart Contract.

## Requirements

  • This Owner Address will own all of the user’s Smart Contracts and will be referred to as the Owner, this is sometime referred to as an Externally Owned Address
  • The Controller - Is a set of Addresses, owned and operated by Token Group Ltd, used to provide services to the end user
  • The Consumer Contract Wallet needs to allow its Owner to configure how they wish to secure their tokens in their wallet.
  • There needs to be a convenient way to "top-up" the amount of ETH that lives on our user’s Owner Address aka Gas Tank via the Smart Contracts
  • The wallet's design is intended to be as decentralised as possible. This will be achieved by eliminating access to user assets by third-parties and minimising reliance of third-party infrastructure in running the Consumer Contract Wallet.
  • Must help user protect their funds by minimising the risk in the event of their Owner Address's private key being compromised.

Security Features

In order to help users protect their tokens in the event that their Private Key gets compromised, we present the following security features:

  • A Whitelist of Addresses - akin to a whitelist of payees in a banking application, this whitelist should be configured with a list of trusted addresses for each Owner of the Consumer Contract Wallet.
  • Daily Spending Limit - denominated in ETH. This is used to define how much can a user can transfer in a given day if transferring assets to addresses outside their Whitelist.
  • Daily Gas Tank Top-up Limit - (Gas Tank) top-up daily limit denominated in ETH. This is used to define the daily limit of ETH that can be sent from a user's Consumer Contract Wallet to their Address; this ETH is what is used to pay the network for gas.
Configuration

There are three ways to configure a Consumer Contract Wallet:

  • via Constructor: Upon deployment of a new Consumer Contract Wallet the above security features can be configured by passing the desired values to the constructor of the Consumer Contract Wallet smart contract when deploying this to the Ethereum network. These are the values set when deploying a new instance of the Consumer Contract Wallet.
  • via a 1-time write pattern: Aside from default values passed in via the Constructor the user may do a 1-time write to the aforementioned Security Features. These allow the Address to change the values that power the security features. It is advised that users of the Consumer Contract Wallet set their security settings so that they can not longer be tampered with in the event that a user's private key is compromised. Users should set these values once, otherwise an attacker would be able to configure their Smart Contract.
  • via a 2FA pattern: Where a user can submitChange a new value for one of the Security Features, then one of the Controller addresses needs to either OK the value change, after the user performed some form of 2nd factor authentication the Controller may decide to respond with a confirmChange method or a cancelChange method.

Solidity code in the /contracts/ folder

wallet.sol is the primary Consumer Contract Wallet contract that helps user's secure their funds. The Wallet communicates with the oracle, the controllers, and other ERC20 contracts.

oracle.sol is an exchange rate oracle contract that stores exchange rates for a set of supported ERC20 tokens. Exchange rates are updated periodically by calling the Crypto Compare API through the Oraclize contract. It should noted that the Consumer Contract Wallet only protects the ERC20 tokens supported by the oracle in its Security Features, tokens not listed as supported by the oracle will not be secured by the Consumer Contract Wallet.

### Solidity code in the /contracts/internals/ folder

controllable.sol is an inheritable contract that integrates with the list of controllers and provides control functionality to the child contract.

controller.sol is a storage contract that stores a list of controller addresses which power the 'controllable.sol' contract.

date.sol is a simple date parsing contract with a single method, used to parse out a comparable number from the date in an HTTP header

json.sol a simple and bespoke JSON parser, this is not a generic JSON parser.

oraclize-resolver.sol OraclizeResolver implements on-chain contract address resolution, this is used for internal testing purposes ONLY.

ownable.sol is an inheritable contract that provides owner authentication functionality to the owned contract.

parseIntScientific.sol provides floating point in scientific notation (e.g. e-5) parsing functionality. This has been built to support floating point scientific notation returned in JSON.

### Solidity code in the /contracts/mocks/ folder

base64-exporter.sol is a mocked out version of a contract that pulls in the base64 encoder for unit testing purposes.

oraclize-connector.sol is a mocked out version of the oraclize-connector, this is for testing purposes only.

oraclize-resolver.sol is a mocked out version of the oraclize-resolver, which is used to locate the address of oraclize connector.

parseIntScientific-exporter.sol is a mocked out version of a contract that pulls in the parseIntScientific contract used to parse floating points that include scientific notation out of JSON.

token.sol is a partial implementation of the ERC20 token standard used for testing and development purposes.

### Solidity code in the /contracts/externals/ folder

All of the third-party code we rely on can be found in this folder. The below table details the third-party code used and their licenses.

File License
SafeMath.sol MIT
base64.sol GPLv3
ENS BSD2
oraclize MIT
strings.sol Apache v2

Building contracts

To build all contracts and generate corresponding Go bindings:

./build.sh

Running contract tests

Dependencies
  • go version >1.11 is required.
  • go modules (experimental in go 1.11) are needed. export GO111MODULE=on
Running

Get dependencies:

go mod vendor

Run tests:

go test -v ./test/...

Directories

Path Synopsis
cmd
pkg
test

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL