@version 1 # Automate the refunding after the given timestamp actions triggered_by: datetime, at: 1700220780 do Contract.set_type "transfer" # Send back UCO to bridge pool Contract.add_uco_transfer to: 0x000018D60115ECE0C7558A46B4693749BF6BEAB524FDDCCF9B10B910619E4EE08801, amount: 9.95 Contract.set_code "" end condition triggered_by: transaction, on: refund(), as: [ timestamp: timestamp >= 1700220780 ] actions triggered_by: transaction, on: refund() do Contract.set_type "transfer" # Send back UCO to bridge pool Contract.add_uco_transfer to: 0x000018D60115ECE0C7558A46B4693749BF6BEAB524FDDCCF9B10B910619E4EE08801, amount: 9.95 Contract.set_code "" end condition triggered_by: transaction, on: reveal_secret(secret), as: [ content: Crypto.hash(String.to_hex(secret)) == 0x63C1491AD1EAEC366E89789C13C1F6199D586E7C194C495BF21EDFACDE486E3A, address: ( valid? = false abi_data = Evm.abi_encode("status()") tx = [to: "0x8a75dcf34f38d867fd230b83681bc4fe3edb26f2", data: "0x#{abi_data}"] request = [jsonrpc: "2.0", id: "1", method: "eth_call", params: [tx, "latest"]] headers = ["Content-Type": "application/json"] body = Json.to_string(request) res = Http.request("https://sepolia.infura.io/v3/3a7a2dbdbec046a4961550ddf8c7d78a", "POST", headers, body) if res.status == 200 && Json.is_valid?(res.body) do response = Json.parse(res.body) result = Map.get(response, "result") if result != nil do decoded_abi = Evm.abi_decode("(uint)", result) # Withdrawn status is 1 valid? = List.at(decoded_abi, 0) == 1 end end valid? ) ] actions triggered_by: transaction, on: reveal_secret(secret) do Contract.set_type "transfer" Contract.add_uco_transfer to: 0x00000BC0EBA2DBCE4455B46F5E51AFAABA6EB4C7FBA1D4E2E6DABD55DC70F9A04D6F, amount: 9.92015 Contract.add_uco_transfer to: 0x0000749d250560bf06c079832e0e9a24509b1e440a45c33bd9448b41b6a056fc6201, amount: 0.02985 Contract.set_code "" end
Content (0 B)
State (0 B)
-
Secret shared with 1 key
Encoded secret
3E403FCA1053B4858679D1526792A37CE600EE94A8E4CC4B879E4FB8EF9AAA979E8E87538F2C440F5E9B72CB98D6C015CB6BA8B6E072F514C16F36CD
Authorized keys
- 00017877BCF4122095926A49489009649603AB129822A19EF9D573B8FD714911ED7F
Contract recipients (0)
Inputs (0)
Contract inputs (0)
Unspent outputs (1)
-
From 00001AC6...2755At 2023-11-17 09:33:39 UTCAmount 10.17169633 UCO
Previous public key
000100C19AC60434F3659F00BFBFCCAE377A713396E86729166ABC1B738BF2A3249F
Previous signature
3AF92688077A3D3226A95564BCB332005DB62266DB554554E18238DBFD7911FB60DA39A65008309188E3C75D01C24487A080BF0ADDAB7C3BAFA447ADEED9BF0D
Origin signature
3045022100A91D31D7B5FC496DCD44D34A9FCAAFB6469425E5227E9E01DB6E77C5D9EA2B4702203CEE931337A3172312EA778A447AEF3E4A876424F8DBD64010B5A8B6C5C9B9C0
Proof of work
010204B3B2A53580086B9F36919CF40ABC55904729F78BF43673E216FAC1EB2451DD1E521879C6588F0CB09B150A103A39A73E2816B5ADF51F0721348BA3A66C33023B
Proof of integrity
00C1B2B072EF1C59C51E29273E8C09883259663D30E1A8ADA391CC3EBC748EF711
Coordinator signature
ED6448CF8796F0C6A4E64E295A75D1ED438172B3F4CF297F8A134A0AD3BA31350433CA29D15D26818CC1519CF01E105FDE5240D84D2BD4F2E16DA8D11AAF8E0F
Validator #1 public key
00011B58ED42235461734EAF253BD97A80B92899ABCC3BE680D44B6825DD2A88A947
Validator #1 signature
98E692B1CF8800BE1DB6DCC973230F6DD1630F0BEFA3EBB1A0212A00BD723995CCAEA135A70792E528D9B68A11D96A47E9C87D3D567E17C40CD2CE5D58593108
Validator #2 public key
0001B0A94804BF8ECC9897075C6207FF63EF4D339F57A0349888E6B77CD47DB53EF3
Validator #2 signature
DF6F1D9D6CEA61B1D61C879027D865EDFC6EE739F3C8A74B38ECD1722F3E0F83951A5DC74E0EEC2E78C22437ABA160A36C6083EA9A03D03F0CDE13BBED3AC106