@version 1
# Automate the refunding after the given timestamp
actions triggered_by: datetime, at: 1700389080 do
Contract.set_type "transfer"
# Send back UCO to bridge pool
Contract.add_uco_transfer to: 0x000018D60115ECE0C7558A46B4693749BF6BEAB524FDDCCF9B10B910619E4EE08801, amount: 0.995
Contract.set_code ""
end
condition triggered_by: transaction, on: refund(), as: [
timestamp: timestamp >= 1700389080
]
actions triggered_by: transaction, on: refund() do
Contract.set_type "transfer"
# Send back UCO to bridge pool
Contract.add_uco_transfer to: 0x000018D60115ECE0C7558A46B4693749BF6BEAB524FDDCCF9B10B910619E4EE08801, amount: 0.995
Contract.set_code ""
end
condition triggered_by: transaction, on: reveal_secret(secret), as: [
content: Crypto.hash(String.to_hex(secret)) == 0xF0D1FA8ED5BB89B1A6238315F9B10D09A72B585D44866278AAFA231C9D457A7C,
address: (
valid? = false
abi_data = Evm.abi_encode("status()")
tx = [to: "0x0cc521b8a6b9a637eb3a581307ac547efa571762", data: "0x#{abi_data}"]
request = [jsonrpc: "2.0", id: "1", method: "eth_call", params: [tx, "latest"]]
headers = ["Content-Type": "application/json"]
body = Json.to_string(request)
res = Http.request("https://polygon-mumbai.infura.io/v3/3a7a2dbdbec046a4961550ddf8c7d78a", "POST", headers, body)
if res.status == 200 && Json.is_valid?(res.body) do
response = Json.parse(res.body)
result = Map.get(response, "result")
if result != nil do
decoded_abi = Evm.abi_decode("(uint)", result)
# Withdrawn status is 1
valid? = List.at(decoded_abi, 0) == 1
end
end
valid?
)
]
actions triggered_by: transaction, on: reveal_secret(secret) do
Contract.set_type "transfer"
Contract.add_uco_transfer to: 0x0000D9E7B4300CC29670CA80010FE23292BEE4AE28057328732A0FF4CF11C319D81A, amount: 0.992015
Contract.add_uco_transfer to: 0x0000749d250560bf06c079832e0e9a24509b1e440a45c33bd9448b41b6a056fc6201, amount: 0.002985
Contract.set_code ""
end
Content (0 B)
State (0 B)
-
Secret shared with 1 key
Encoded secret
12EE4E3B2C5426AB3DFAB22B40E38511BDC116855AAB245215FE0B7D09CCED900773504473205FFA46EA5A50771D8BEC5522195EE107ADBEE1B964AE
Authorized keys
- 00017877BCF4122095926A49489009649603AB129822A19EF9D573B8FD714911ED7F
Contract recipients (0)
Inputs (0)
Contract inputs (0)
Unspent outputs (1)
-
From 000067EE...DC4DAt 2023-11-19 08:19:11 UTCAmount 1.22633073 UCO
Previous public key
0001242AF5DD8ADF2ED0A682B5BD2B521D01494FEDE46CC5AFD731590821281C8E13
Previous signature
45A4489A8F5F45A401D1D1A3C47156812D9194597134B18DAA2A636FC2CF33E6205597F232CAAAF4B108F5A9F5D666BF70C357D10BD22EB7D4A7F0E10C3E6900
Origin signature
3044022076D83113CE1B209F00EB5E9824D02F9222A7E9D499046591D5305C7B4F85EE17022071238B43CEEF5C424D84F8EDABF6D090BCEE479856AF7A60A33CDB28A11AA71E
Proof of work
010204B3B2A53580086B9F36919CF40ABC55904729F78BF43673E216FAC1EB2451DD1E521879C6588F0CB09B150A103A39A73E2816B5ADF51F0721348BA3A66C33023B
Proof of integrity
005EAEBA6A4821C70A334B5ABDC47CD82752B32AE7913C3F930801DECE01337CF5
Coordinator signature
77A3BBA7B484EDD1DE748E8A0CB6FAF983F942458765CCCD6FD76F04A585E09EE01602E1F8FDFC96E1B507FB7EC5A26870D564BE87112EE57735130778148600
Validator #1 public key
00011B58ED42235461734EAF253BD97A80B92899ABCC3BE680D44B6825DD2A88A947
Validator #1 signature
EA4DE4EDADAA5538BA0DC31DE576B3598FA50B80EB1440A5BCED6E89505D474A38ECB551E0906ACEA544096F280DE49EEE8C75338A11BD4FDDB7997A0012640B
Validator #2 public key
0001B0A94804BF8ECC9897075C6207FF63EF4D339F57A0349888E6B77CD47DB53EF3
Validator #2 signature
25DCAB8EDF28BAE1569B19D539F884980395BE587B8B7FCE56F19EC8BF594E63F4E9138316523D498ED36D162A808289CD13BF7633B653883B0C61E65304340C