Type
CONTRACT
Validation date
2023-11-13 20:26:15 UTC
Fee
0.42027219 UCO

Code (1.01 KB)

@version 1

condition triggered_by: transaction, on: provision(_evm_contract, _url), as: [
previous_public_key: (
   # Transaction is not yet validated so we need to use previous address
  # to get the genesis address
  previous_address = Chain.get_previous_address()
  Chain.get_genesis_address(previous_address) == 0x000018D60115ECE0C7558A46B4693749BF6BEAB524FDDCCF9B10B910619E4EE08801
 )
]

actions triggered_by: transaction, on: provision(evm_contract, url) do
  next_code = """
    @version 1

  # Automate the refunding after the given timestamp
  actions triggered_by: datetime, at: 1699914120 do
    Contract.set_type "transfer"
    # Send back UCO to bridge pool
  Contract.add_uco_transfer to: 0x000018D60115ECE0C7558A46B4693749BF6BEAB524FDDCCF9B10B910619E4EE08801, amount: 5.8108

    Contract.set_code ""
  end

  condition triggered_by: transaction, on: refund(), as: [
    timestamp: timestamp >= 1699914120
  ]

  actions triggered_by: transaction, on: refund() do
    Contract.set_type "transfer"
    # Send back UCO to bridge pool
  Contract.add_uco_transfer to: 0x000018D60115ECE0C7558A46B4693749BF6BEAB524FDDCCF9B10B910619E4EE08801, amount: 5.8108

    Contract.set_code ""
  end

  condition triggered_by: transaction, on: reveal_secret(secret), as: [
    content: Crypto.hash(String.to_hex(secret)) == 0xA34EB77B417AA80ED930F9FD42E10E80FED72CBAB3706DD595C01F1ABFF726AF,
    address: (
      valid? = false

      abi_data = Evm.abi_encode("status()")
      tx = [to: "#{evm_contract}", data: "0x\#{abi_data}"]
      request = [jsonrpc: "2.0", id: "1", method: "eth_call", params: [tx, "latest"]]

      headers = ["Content-Type": "application/json"]
      body = Json.to_string(request)

      res = Http.request("#{url}", "POST", headers, body)
      if res.status == 200 && Json.is_valid?(res.body) do
        response = Json.parse(res.body)
        result = Map.get(response, "result")
        
        if result != nil do
          decoded_abi = Evm.abi_decode("(uint)", result)
          # Withdrawn status is 1
          valid? = List.at(decoded_abi, 0) == 1
        end
      end

      valid?
    )
  ]

  actions triggered_by: transaction, on: reveal_secret(secret) do
    Contract.set_type "transfer"
    Contract.add_uco_transfer to: 0x0000759C1C49FE321859E01B4ED0EB43EE43D4009FC61C064F9FE05FF1AF38A27F62, amount: 5.7933676
  Contract.add_uco_transfer to: 0x0000749d250560bf06c079832e0e9a24509b1e440a45c33bd9448b41b6a056fc6201, amount: 0.0174324

    Contract.set_code ""
  end

  """

  Contract.set_code next_code
end

Content (0 B)

State (0 B)

Movements (0)

Ownerships (1)

  • Secret shared with 1 key

    Encoded secret

    4DAD2C3D64282BB5AE6325AA4FBDB019A03E6640961191B472FD82254B66CD8328DFA0E5D6270D48100C6CFCE3CA9D4346F279428AAE9686F4757BAF

    Authorized keys

    • 00017877BCF4122095926A49489009649603AB129822A19EF9D573B8FD714911ED7F

Contract recipients (1)

Inputs (0)

Contract inputs (0)

Unspent outputs (1)

Proofs and signatures

Previous public key

000157C87CF5F9D1D53BD0AD96DB90243F45800722A326FAA5EB6D13F8185E428456

Previous signature

E2A04AC5E0AD61BB6F5EB3C286AFF56485EA0C8B0996A5C6BE91E184FFA2835AB0FB8B4575D7DD1ABB5B6C0CD035C62B5D167ADCC877FC0830EA99C68F6CC007

Origin signature

3045022100D1ECD9F0C09A2282FA1F6BEF56E23DBD7F9786856FE4C34E526D1AD13F26AB8B0220109B94462FF451B58D8F321903B030C9DBD431CABE61FB5DD9C5142DA906C1DD

Proof of work

010104AB41291F847A601055AEDD1AF24FF76FA970D6441E2DCA3818A8319B004C96B27B8FEB1DA31A044BA0A4800B4353359735719EBB3A05F98393A9CC599C3FAFD6

Proof of integrity

004754FAA0ADDA43136891832307F2940482E5D89371E45232B04A464A89BA2866

Coordinator signature

FE73F47E232015951666FE6BC269A70F4FDAED20EFDA997687162B432BE9513E939DD824B12118BC55E0F7005437FC04AF18955002FFF2EE14A857FB06ACAC0A

Validator #1 public key

00011B58ED42235461734EAF253BD97A80B92899ABCC3BE680D44B6825DD2A88A947

Validator #1 signature

14DC77E9878784BE16C9005A0FEE850BAABE64EE5640DB265F0CF5764AEB58214C1FA820CA8AC9F87753809945C35199E6BC08A2D862FA495551AE53665AB300

Validator #2 public key

0001B0A94804BF8ECC9897075C6207FF63EF4D339F57A0349888E6B77CD47DB53EF3

Validator #2 signature

38E5EEADD65EB45A5C044C8E3FA1A8C555CB4A3720FBE725F05A0A6C51FD9DD194D8C942CF01073B0F56B612B9FB0FA725AFD0CBB5E8950DFB827A65C078B00C