Type
CONTRACT
Validation date
2023-11-15 06:46:21 UTC
Fee
0.43476924 UCO

Code (1.01 KB)

@version 1

condition triggered_by: transaction, on: provision(_evm_contract, _url), as: [
previous_public_key: (
   # Transaction is not yet validated so we need to use previous address
  # to get the genesis address
  previous_address = Chain.get_previous_address()
  Chain.get_genesis_address(previous_address) == 0x000018D60115ECE0C7558A46B4693749BF6BEAB524FDDCCF9B10B910619E4EE08801
 )
]

actions triggered_by: transaction, on: provision(evm_contract, url) do
  next_code = """
    @version 1

  # Automate the refunding after the given timestamp
  actions triggered_by: datetime, at: 1700037900 do
    Contract.set_type "transfer"
    # Send back UCO to bridge pool
  Contract.add_uco_transfer to: 0x000018D60115ECE0C7558A46B4693749BF6BEAB524FDDCCF9B10B910619E4EE08801, amount: 0.00995

    Contract.set_code ""
  end

  condition triggered_by: transaction, on: refund(), as: [
    timestamp: timestamp >= 1700037900
  ]

  actions triggered_by: transaction, on: refund() do
    Contract.set_type "transfer"
    # Send back UCO to bridge pool
  Contract.add_uco_transfer to: 0x000018D60115ECE0C7558A46B4693749BF6BEAB524FDDCCF9B10B910619E4EE08801, amount: 0.00995

    Contract.set_code ""
  end

  condition triggered_by: transaction, on: reveal_secret(secret), as: [
    content: Crypto.hash(String.to_hex(secret)) == 0xD635D7B5964027902BE3ACD0AFE9B12B4333CB2A4549B2DB650C3839EA5C20FF,
    address: (
      valid? = false

      abi_data = Evm.abi_encode("status()")
      tx = [to: "#{evm_contract}", data: "0x\#{abi_data}"]
      request = [jsonrpc: "2.0", id: "1", method: "eth_call", params: [tx, "latest"]]

      headers = ["Content-Type": "application/json"]
      body = Json.to_string(request)

      res = Http.request("#{url}", "POST", headers, body)
      if res.status == 200 && Json.is_valid?(res.body) do
        response = Json.parse(res.body)
        result = Map.get(response, "result")
        
        if result != nil do
          decoded_abi = Evm.abi_decode("(uint)", result)
          # Withdrawn status is 1
          valid? = List.at(decoded_abi, 0) == 1
        end
      end

      valid?
    )
  ]

  actions triggered_by: transaction, on: reveal_secret(secret) do
    Contract.set_type "transfer"
    Contract.add_uco_transfer to: 0x00000BC0EBA2DBCE4455B46F5E51AFAABA6EB4C7FBA1D4E2E6DABD55DC70F9A04D6F, amount: 0.00992015
  Contract.add_uco_transfer to: 0x0000749d250560bf06c079832e0e9a24509b1e440a45c33bd9448b41b6a056fc6201, amount: 2.985e-5

    Contract.set_code ""
  end

  """

  Contract.set_code next_code
end

Content (0 B)

State (0 B)

Movements (0)

Ownerships (1)

  • Secret shared with 1 key

    Encoded secret

    7FCB0AB0AA86A0463626B08B7362515E69EE596D6E6C7796F2248C239BFED41506730D1B6AA36B2FC016C6AF95052A435AED3E6635B73E61517EE7AB

    Authorized keys

    • 00017877BCF4122095926A49489009649603AB129822A19EF9D573B8FD714911ED7F

Contract recipients (1)

Inputs (0)

Contract inputs (0)

Unspent outputs (1)

Proofs and signatures

Previous public key

000139BDA93B709B835FADBC6D0EE338D9AEF3BA333FEC96C51CD39E460928899ED3

Previous signature

29442F7593249DBB21459AB3702C9FBF7241DDF59F46E4AB17A08F264A69AC471FA38735EE21B205B78FF76A207ABCCD4458F6F9A126B0B6D53FBE583066A50E

Origin signature

304402200712800C42463E65EE7E9920EAE3D6262286F62189FDAF8D11D6388C08A943F002204C8A3788E8AE25B3A929C4528F877EFDC73360B90A1F35429988EBA29FFBCF11

Proof of work

010104AB41291F847A601055AEDD1AF24FF76FA970D6441E2DCA3818A8319B004C96B27B8FEB1DA31A044BA0A4800B4353359735719EBB3A05F98393A9CC599C3FAFD6

Proof of integrity

0013B728563D570A62C0E55656D5D7D33704C97CF34E2D227E800E894784A9DA73

Coordinator signature

9B3F445028121559D559FE11004E5E3DC729D7616A2751C6D857050ACB8D19C4DB82BEC26FCB86517B244CF5CB369124432A70FF56ED02F94C73EAC8D385E60A

Validator #1 public key

0001B0A94804BF8ECC9897075C6207FF63EF4D339F57A0349888E6B77CD47DB53EF3

Validator #1 signature

7FA4C00E202283013613F9973D09846B2E15E75098597D5EECE4A45AD2A206F8D0FFFD7C513470A969FC90622C752287138AE5FA12878F56E75C9FC4F9EC5F0F

Validator #2 public key

00011B58ED42235461734EAF253BD97A80B92899ABCC3BE680D44B6825DD2A88A947

Validator #2 signature

68DAC96399B2C6F8FC431C4B0087371C92D694361DDB41369DB8C2E85566DC3A70A561983642FFE3C0A728DE80DCD3FC49AC9D8ED92795F999124E90248FAF01