Type
CONTRACT
Validation date
2023-12-02 06:57:41 UTC
Fee
0.72429716 UCO

Code (1.07 KB)

@version 1

condition triggered_by: transaction, on: provision(_evm_contract, _url), as: [
previous_public_key: (
   # Transaction is not yet validated so we need to use previous address
  # to get the genesis address
  previous_address = Chain.get_previous_address()
  Chain.get_genesis_address(previous_address) == 0x000066706D704329CA8C2A4153991E2DDACC968622CA10217CA14952EB7ABB966C30
 )
]

actions triggered_by: transaction, on: provision(evm_contract, url) do
  next_code = """
    @version 1

  # Automate the refunding after the given timestamp
  actions triggered_by: datetime, at: 1701507420 do
    Contract.set_type "transfer"
    # Burn the non withdrawed tokens
  Contract.add_token_transfer to: 0x00000000000000000000000000000000000000000000000000000000000000000000, amount: 1.15080042, token_address: 0x00003DF600E329199BF3EE8FBE2B8223413D70BCDD97E15089E6A74D94DE3F1173B4

    Contract.set_code ""
  end

  condition triggered_by: transaction, on: refund(), as: [
    timestamp: timestamp >= 1701507420
  ]

  actions triggered_by: transaction, on: refund() do
    Contract.set_type "transfer"
    # Burn the non withdrawed tokens
  Contract.add_token_transfer to: 0x00000000000000000000000000000000000000000000000000000000000000000000, amount: 1.15080042, token_address: 0x00003DF600E329199BF3EE8FBE2B8223413D70BCDD97E15089E6A74D94DE3F1173B4

    Contract.set_code ""
  end

  condition triggered_by: transaction, on: reveal_secret(secret), as: [
    content: Crypto.hash(String.to_hex(secret)) == 0xBE2FB16EE9C87D50E5EBCBA6F1D308DEF47B958BC97EDF318FC7EC859006D8FF,
    address: (
      valid? = false

      abi_data = Evm.abi_encode("status()")
      tx = [to: "#{evm_contract}", data: "0x\#{abi_data}"]
      request = [jsonrpc: "2.0", id: "1", method: "eth_call", params: [tx, "latest"]]

      headers = ["Content-Type": "application/json"]
      body = Json.to_string(request)

      res = Http.request("#{url}", "POST", headers, body)
      if res.status == 200 && Json.is_valid?(res.body) do
        response = Json.parse(res.body)
        result = Map.get(response, "result")
        
        if result != nil do
          decoded_abi = Evm.abi_decode("(uint)", result)
          # Withdrawn status is 1
          valid? = List.at(decoded_abi, 0) == 1
        end
      end

      valid?
    )
  ]

  actions triggered_by: transaction, on: reveal_secret(secret) do
    Contract.set_type "transfer"
    Contract.add_token_transfer to: 0x0000F25C3DF408399FD5CC26D5A53C4081F6D6600B04B5EF4E41836D384F8B84C772, amount: 1.14734802, token_address: 0x00003DF600E329199BF3EE8FBE2B8223413D70BCDD97E15089E6A74D94DE3F1173B4
  Contract.add_token_transfer to: 0x0000749d250560bf06c079832e0e9a24509b1e440a45c33bd9448b41b6a056fc6201, amount: 0.0034524, token_address: 0x00003DF600E329199BF3EE8FBE2B8223413D70BCDD97E15089E6A74D94DE3F1173B4

    Contract.set_code ""
  end

  """

  Contract.set_code next_code
end

Content (0 B)

State (0 B)

Movements (0)

Ownerships (1)

  • Secret shared with 1 key

    Encoded secret

    40E7BC72371747DE2E6A6EA2DC3E06610F9A9704D1A7E096173AB369C78CC8B04EF97E3DD7740B03A27F23B3490DFEA7963AA91A689D427AB8EA8F97

    Authorized keys

    • 00017877BCF4122095926A49489009649603AB129822A19EF9D573B8FD714911ED7F

Contract recipients (1)

Inputs (0)

Contract inputs (0)

Unspent outputs (1)

Proofs and signatures

Previous public key

0001D9945275887328395938840575539B6C2A0C735B2AEBE1444A4A069B4A2D8A1F

Previous signature

ECA75C26F740E7D937B956B472EBE3D2CB928740C5D070493041716415532FAC24DE0887D6BD8638E78FC9AF66E8ABF6F5EC88F0FB58657BEE9D987E54991003

Origin signature

3045022100EE6B5E34E059C882E63B0D5E17A9DE1935216A2D48A793EA0BD26621F5B4898202207F07515FF63193C5A378110D70ADD1A03F629023F9837DFFA6DE7125D2B31FAF

Proof of work

010104AB41291F847A601055AEDD1AF24FF76FA970D6441E2DCA3818A8319B004C96B27B8FEB1DA31A044BA0A4800B4353359735719EBB3A05F98393A9CC599C3FAFD6

Proof of integrity

00799613A9862D2BE1E7ED612307AFEE89B4EC82BEA23E5C9299FACEACACC5211B

Coordinator signature

D06E5C5B445D492B98B286247AC677C4AD0F41B1DA61442114584783045D805F51051AF0C85AB49F680BEF6DB53B35E11B08BBA9A0439A5D86B7FA695D04C903

Validator #1 public key

000151C124A6211CD402FD1CFE560C5DB51ED0CBEF44B09B21A41206028E7E5942BF

Validator #1 signature

848F2471F07DC29E93AEB05A8E2569743358AB1EFB7173B3F84C178DDA05CF7C91B1B7B9D8EBC37B0F8F96935920633A29EDC4842103BED148F6568ED1ADF204

Validator #2 public key

0001B0A94804BF8ECC9897075C6207FF63EF4D339F57A0349888E6B77CD47DB53EF3

Validator #2 signature

B98D175629A9F541207C9C64492BD9D5168EB0CF7E279678B1B96B9B8D4DDEE9A1AD3F1BC6A5B0EE5E569831F939EB17CD0AFF6D9B85BEDC0DACD4A97E28D105