Type
CONTRACT
Validation date
2023-11-08 14:34:41 UTC
Fee
0.43749191 UCO

Code (1 KB)

@version 1

condition triggered_by: transaction, on: provision(_evm_contract, _url), as: [
previous_public_key: (
   # Transaction is not yet validated so we need to use previous address
  # to get the genesis address
  previous_address = Chain.get_previous_address()
  Chain.get_genesis_address(previous_address) == 0x000018D60115ECE0C7558A46B4693749BF6BEAB524FDDCCF9B10B910619E4EE08801
 )
]

actions triggered_by: transaction, on: provision(evm_contract, url) do
  next_code = """
    @version 1

  # Automate the refunding after the given timestamp
  actions triggered_by: datetime, at: 1699461240 do
    Contract.set_type "transfer"
    # Send back UCO to bridge pool
  Contract.add_uco_transfer to: 0x000018D60115ECE0C7558A46B4693749BF6BEAB524FDDCCF9B10B910619E4EE08801, amount: 0.995

    Contract.set_code ""
  end

  condition triggered_by: transaction, on: refund(), as: [
    timestamp: timestamp >= 1699461240
  ]

  actions triggered_by: transaction, on: refund() do
    Contract.set_type "transfer"
    # Send back UCO to bridge pool
  Contract.add_uco_transfer to: 0x000018D60115ECE0C7558A46B4693749BF6BEAB524FDDCCF9B10B910619E4EE08801, amount: 0.995

    Contract.set_code ""
  end

  condition triggered_by: transaction, on: reveal_secret(secret), as: [
    content: Crypto.hash(String.to_hex(secret)) == 0xBA705C9CC7B57F4A251531C0FD12CE9F5303D607994ED67A770B2EBF2ED41D41,
    address: (
      valid? = false

      abi_data = Evm.abi_encode("status()")
      tx = [to: "#{evm_contract}", data: "0x\#{abi_data}"]
      request = [jsonrpc: "2.0", id: "1", method: "eth_call", params: [tx, "latest"]]

      headers = ["Content-Type": "application/json"]
      body = Json.to_string(request)

      res = Http.request("#{url}", "POST", headers, body)
      if res.status == 200 && Json.is_valid?(res.body) do
        response = Json.parse(res.body)
        result = Map.get(response, "result")
        
        if result != nil do
          decoded_abi = Evm.abi_decode("(uint)", result)
          # Withdrawn status is 1
          valid? = List.at(decoded_abi, 0) == 1
        end
      end

      valid?
    )
  ]

  actions triggered_by: transaction, on: reveal_secret(secret) do
    Contract.set_type "transfer"
    Contract.add_uco_transfer to: 0x00008DD40CD42287A3C8282065F5BCA7259AC7014CD73109B570E946A977687C7BD0, amount: 0.992015
  Contract.add_uco_transfer to: 0x0000749d250560bf06c079832e0e9a24509b1e440a45c33bd9448b41b6a056fc6201, amount: 0.002985

    Contract.set_code ""
  end

  """

  Contract.set_code next_code
end

Content (0 B)

State (0 B)

Movements (0)

Ownerships (1)

  • Secret shared with 1 key

    Encoded secret

    FF8DB98AF11D3173809B0D965C6558EAEC3E1F82718D53FCA64C2195B923048AFDCA4E12ED1D10929729FE07DDE22BC6AE7A0FC2CB0A4377F71A19BD

    Authorized keys

    • 00017877BCF4122095926A49489009649603AB129822A19EF9D573B8FD714911ED7F

Contract recipients (1)

Inputs (0)

Contract inputs (0)

Unspent outputs (1)

Proofs and signatures

Previous public key

00014A6E5313DA33EBA5F1439603443A1717FFDABAC7D84B6DA4793317B1A0E494DD

Previous signature

494865A1AA0DD7FB36DA700B6A35C97DD490D6B077C961E1746CAED432E32B000A386556B03E5751075F31E212ED0D1FD39403A68BD63896527FB5433641110C

Origin signature

304402201F5F0B068A3321A9BE2A73D342B63DC8B9E951A6BC3541A9C3D2291F9AFDB2DD0220783E4686CE3D6F2AE10683E4DAA7ED4B16ECB742B734A1A452DE4F05F54A7458

Proof of work

010104AB41291F847A601055AEDD1AF24FF76FA970D6441E2DCA3818A8319B004C96B27B8FEB1DA31A044BA0A4800B4353359735719EBB3A05F98393A9CC599C3FAFD6

Proof of integrity

00BBE8E760BFE488A80CDB87F077527A5E9BA2E05407133372DD822E432800BC39

Coordinator signature

4F3F763D3B3F1E330D33585327F705F52BF9637F7A7EF03E8EFE459A257C02A217188037C5B874BAA7051915AD91C8A20E2BD3C81558825BE7C4E8E2172F8201

Validator #1 public key

0001B0A94804BF8ECC9897075C6207FF63EF4D339F57A0349888E6B77CD47DB53EF3

Validator #1 signature

8DA1A7D87217FEB2B3312AF7F0EAE32CA5195AD7B4DDBDC17F807DAC8706EDDCE0A782D32A9C1A3C5E1BF3B17C385A09C118C073BAEF86AAED0E2E4C7582FC03

Validator #2 public key

00011B58ED42235461734EAF253BD97A80B92899ABCC3BE680D44B6825DD2A88A947

Validator #2 signature

B4686A7DFC429BBF5A5DFA79C5A23F2F309BE09E8B11E82053D29293B507E3857AE33911CAD0465A288CC9DAA41FB6C9FF39F819B500B7FAE4FDE9F758E06A02