Type
CONTRACT
Validation date
2023-11-14 16:35:52 UTC
Fee
0.40091765 UCO

Code (1.01 KB)

@version 1

condition triggered_by: transaction, on: provision(_evm_contract, _url), as: [
previous_public_key: (
   # Transaction is not yet validated so we need to use previous address
  # to get the genesis address
  previous_address = Chain.get_previous_address()
  Chain.get_genesis_address(previous_address) == 0x000018D60115ECE0C7558A46B4693749BF6BEAB524FDDCCF9B10B910619E4EE08801
 )
]

actions triggered_by: transaction, on: provision(evm_contract, url) do
  next_code = """
    @version 1

  # Automate the refunding after the given timestamp
  actions triggered_by: datetime, at: 1699986840 do
    Contract.set_type "transfer"
    # Send back UCO to bridge pool
  Contract.add_uco_transfer to: 0x000018D60115ECE0C7558A46B4693749BF6BEAB524FDDCCF9B10B910619E4EE08801, amount: 14.925

    Contract.set_code ""
  end

  condition triggered_by: transaction, on: refund(), as: [
    timestamp: timestamp >= 1699986840
  ]

  actions triggered_by: transaction, on: refund() do
    Contract.set_type "transfer"
    # Send back UCO to bridge pool
  Contract.add_uco_transfer to: 0x000018D60115ECE0C7558A46B4693749BF6BEAB524FDDCCF9B10B910619E4EE08801, amount: 14.925

    Contract.set_code ""
  end

  condition triggered_by: transaction, on: reveal_secret(secret), as: [
    content: Crypto.hash(String.to_hex(secret)) == 0x30EEDB7116BA20434CD57B9FEA5A8AC129E331FD1EC9A64BE74949F3506F8FB9,
    address: (
      valid? = false

      abi_data = Evm.abi_encode("status()")
      tx = [to: "#{evm_contract}", data: "0x\#{abi_data}"]
      request = [jsonrpc: "2.0", id: "1", method: "eth_call", params: [tx, "latest"]]

      headers = ["Content-Type": "application/json"]
      body = Json.to_string(request)

      res = Http.request("#{url}", "POST", headers, body)
      if res.status == 200 && Json.is_valid?(res.body) do
        response = Json.parse(res.body)
        result = Map.get(response, "result")
        
        if result != nil do
          decoded_abi = Evm.abi_decode("(uint)", result)
          # Withdrawn status is 1
          valid? = List.at(decoded_abi, 0) == 1
        end
      end

      valid?
    )
  ]

  actions triggered_by: transaction, on: reveal_secret(secret) do
    Contract.set_type "transfer"
    Contract.add_uco_transfer to: 0x0000834AD179A291856494A6ECA9AA855AAE0F28E5F221666CBD11D2FF96B2A0FE19, amount: 14.880225
  Contract.add_uco_transfer to: 0x0000749d250560bf06c079832e0e9a24509b1e440a45c33bd9448b41b6a056fc6201, amount: 0.044775

    Contract.set_code ""
  end

  """

  Contract.set_code next_code
end

Content (0 B)

State (0 B)

Movements (0)

Ownerships (1)

  • Secret shared with 1 key

    Encoded secret

    180EAC070152E07B6BFEFA520EE508B9E1541D0494ED75E8ECB4750FA22DBE2EFDD49A0C71D7714185D74EB1E52D7C4212F65AAD54E33DD89095AAE5

    Authorized keys

    • 00017877BCF4122095926A49489009649603AB129822A19EF9D573B8FD714911ED7F

Contract recipients (1)

Inputs (0)

Contract inputs (0)

Unspent outputs (1)

Proofs and signatures

Previous public key

00010E75780BA3B8D7EA8E7B07AEC3720FF98F5A257855D88349DB934E14BD61CDA2

Previous signature

F2725BE412A72383ADD98D710B2F758FC6CCE0A8B5FB6E56585F9A041F1DD3686D0536D8E22D1C79489D8B595986B67103A44BDC827B970CDB90B46C2B1BA208

Origin signature

3044022001A3AFD5181268146AD708C80CEA935AC18A5C32DE2297E741040AA86D8B0C2602206172DD8DDB9A545E68799CEA78F7D8C05337116C947F2A33653C674E5092386A

Proof of work

010104AB41291F847A601055AEDD1AF24FF76FA970D6441E2DCA3818A8319B004C96B27B8FEB1DA31A044BA0A4800B4353359735719EBB3A05F98393A9CC599C3FAFD6

Proof of integrity

00C32A2F56153B459C1F852F90F4D19D75CA1E8906D53672AD9DDC2EB5DAE30672

Coordinator signature

DFACFA0ABD15F7C623256D54F95BB3D8B6369BBB65698159E6A826C4636ACF143506433BD413D90E0836ED1318B2B85F5494CD8A094B84DA47E19C0BE662CC08

Validator #1 public key

0001B0A94804BF8ECC9897075C6207FF63EF4D339F57A0349888E6B77CD47DB53EF3

Validator #1 signature

A502BF6740C9D819E37077CBBAE38D9886E1212E4901B2A5CCA99696FC33E7D25E8547A5A5D1B1742935DBD9E0D2843DF2118D501B78D2F5D1E63D6B49EF210D

Validator #2 public key

00011B58ED42235461734EAF253BD97A80B92899ABCC3BE680D44B6825DD2A88A947

Validator #2 signature

B1B816CAD89E21ED8956BE0090CE45292D8E95C0B4106CC2085AEB89E41D773BA47DDA8FD80A12B325CD612EB0152859DE8A24C7B8297BDF7BDB2210B521010B