Type
CONTRACT
Validation date
2023-12-06 07:46:55 UTC
Fee
0.7323301 UCO

Code (1.07 KB)

@version 1

condition triggered_by: transaction, on: provision(_evm_contract, _url), as: [
previous_public_key: (
   # Transaction is not yet validated so we need to use previous address
  # to get the genesis address
  previous_address = Chain.get_previous_address()
  Chain.get_genesis_address(previous_address) == 0x0000072E418B60C6DABD272BC2728B17B352B8104F068D11365D50134F96A4199609
 )
]

actions triggered_by: transaction, on: provision(evm_contract, url) do
  next_code = """
    @version 1

  # Automate the refunding after the given timestamp
  actions triggered_by: datetime, at: 1701855960 do
    Contract.set_type "transfer"
    # Burn the non withdrawed tokens
  Contract.add_token_transfer to: 0x00000000000000000000000000000000000000000000000000000000000000000000, amount: 0.60531908, token_address: 0x00001A4AB7AD0CE2B494C965C66FF2962692A5FE5ECB71B345ABB53BAD88A83A01F1

    Contract.set_code ""
  end

  condition triggered_by: transaction, on: refund(), as: [
    timestamp: timestamp >= 1701855960
  ]

  actions triggered_by: transaction, on: refund() do
    Contract.set_type "transfer"
    # Burn the non withdrawed tokens
  Contract.add_token_transfer to: 0x00000000000000000000000000000000000000000000000000000000000000000000, amount: 0.60531908, token_address: 0x00001A4AB7AD0CE2B494C965C66FF2962692A5FE5ECB71B345ABB53BAD88A83A01F1

    Contract.set_code ""
  end

  condition triggered_by: transaction, on: reveal_secret(secret), as: [
    content: Crypto.hash(String.to_hex(secret)) == 0x9F701D565E562024F4C31E946259CE4F9FAF87997B68BA114568AF8BD0FC1E01,
    address: (
      valid? = false

      abi_data = Evm.abi_encode("status()")
      tx = [to: "#{evm_contract}", data: "0x\#{abi_data}"]
      request = [jsonrpc: "2.0", id: "1", method: "eth_call", params: [tx, "latest"]]

      headers = ["Content-Type": "application/json"]
      body = Json.to_string(request)

      res = Http.request("#{url}", "POST", headers, body)
      if res.status == 200 && Json.is_valid?(res.body) do
        response = Json.parse(res.body)
        result = Map.get(response, "result")
        
        if result != nil do
          decoded_abi = Evm.abi_decode("(uint)", result)
          # Withdrawn status is 1
          valid? = List.at(decoded_abi, 0) == 1
        end
      end

      valid?
    )
  ]

  actions triggered_by: transaction, on: reveal_secret(secret) do
    Contract.set_type "transfer"
    Contract.add_token_transfer to: 0x0000F25C3DF408399FD5CC26D5A53C4081F6D6600B04B5EF4E41836D384F8B84C772, amount: 0.60350313, token_address: 0x00001A4AB7AD0CE2B494C965C66FF2962692A5FE5ECB71B345ABB53BAD88A83A01F1
  Contract.add_token_transfer to: 0x0000749d250560bf06c079832e0e9a24509b1e440a45c33bd9448b41b6a056fc6201, amount: 0.00181595, token_address: 0x00001A4AB7AD0CE2B494C965C66FF2962692A5FE5ECB71B345ABB53BAD88A83A01F1

    Contract.set_code ""
  end

  """

  Contract.set_code next_code
end

Content (0 B)

State (0 B)

Movements (0)

Ownerships (1)

  • Secret shared with 1 key

    Encoded secret

    02941B7A53F432996094581B8A50017F0F7EE77A37D0EBAF6F6DF92574E018FFE4AC8FC9F7E3A4165923C9F8013204D74750CA72A60C35193E01A7E8

    Authorized keys

    • 00017877BCF4122095926A49489009649603AB129822A19EF9D573B8FD714911ED7F

Contract recipients (1)

Inputs (0)

Contract inputs (0)

Unspent outputs (1)

Proofs and signatures

Previous public key

0001A238D7118F1FB29038C8FA583CA85AB48C196A23E790DCECACB7E85E8CBAFF2A

Previous signature

8546A1D775A0154D4C172D6063CB0564E2F7B958786A8110EED4087EBBC9CFDE691E1FE5CF67E8AF2594F44EDC7087CB69DF36898EF9A378700FA083AC8CB00F

Origin signature

30440220372152442830198DE71E7C07B8A13AD2C1F83780DE33454ED7DF3C223B5D05EA022075E44A380CDE2634A2B5C5E75CF829B4FA9DC61A2D66458E5A238AD44D7B1D40

Proof of work

010104AB41291F847A601055AEDD1AF24FF76FA970D6441E2DCA3818A8319B004C96B27B8FEB1DA31A044BA0A4800B4353359735719EBB3A05F98393A9CC599C3FAFD6

Proof of integrity

00C1FE4ACC1CD33AA56AC8EE4CBB92D6FBC40BF172CB9A1BB38217EC16C5276035

Coordinator signature

63D936A29B929DC7B904F2E85C7FF1E1098E19F8B238FA0F73864DFBD5A1E10F0DBFF1DB57196D1A7AA5C7C82AC9A4663134FEBE22A3CAB40A5AD6BFACF84F0D

Validator #1 public key

0001B0A94804BF8ECC9897075C6207FF63EF4D339F57A0349888E6B77CD47DB53EF3

Validator #1 signature

2D7EA7E477503BB1C12BF3D7453701DA492FA99AF432CFD71E638626E30274E08268377C9F9D5190C9D86E2F1FB0A4FBD6D2048913D07E5DDCF1ACC15D904409

Validator #2 public key

000151C124A6211CD402FD1CFE560C5DB51ED0CBEF44B09B21A41206028E7E5942BF

Validator #2 signature

87DACDA3DDE627AB2D40020EE78E42E9405AC7FDEF26481D400410A8F0B0AA88B7113560A02DED7CD1FE20AB85D5B99444C5CE3EEB21E895798AAD055D4C6306