Type
CONTRACT
Validation date
2023-11-23 23:03:46 UTC
Fee
0.65600224 UCO

Code (1.07 KB)

@version 1

condition triggered_by: transaction, on: provision(_evm_contract, _url), as: [
previous_public_key: (
   # Transaction is not yet validated so we need to use previous address
  # to get the genesis address
  previous_address = Chain.get_previous_address()
  Chain.get_genesis_address(previous_address) == 0x00008DD22E7496E86901E9B276A1BE6F9512EB09980CC04C7B76495EF37D5666A709
 )
]

actions triggered_by: transaction, on: provision(evm_contract, url) do
  next_code = """
    @version 1

  # Automate the refunding after the given timestamp
  actions triggered_by: datetime, at: 1700787720 do
    Contract.set_type "transfer"
    # Burn the non withdrawed tokens
  Contract.add_token_transfer to: 0x00000000000000000000000000000000000000000000000000000000000000000000, amount: 0.05094177, token_address: 0x0000288BF6F0E12457B125DC54D2DFA4EB010BE3073CF02E10FB79B696180F55B827

    Contract.set_code ""
  end

  condition triggered_by: transaction, on: refund(), as: [
    timestamp: timestamp >= 1700787720
  ]

  actions triggered_by: transaction, on: refund() do
    Contract.set_type "transfer"
    # Burn the non withdrawed tokens
  Contract.add_token_transfer to: 0x00000000000000000000000000000000000000000000000000000000000000000000, amount: 0.05094177, token_address: 0x0000288BF6F0E12457B125DC54D2DFA4EB010BE3073CF02E10FB79B696180F55B827

    Contract.set_code ""
  end

  condition triggered_by: transaction, on: reveal_secret(secret), as: [
    content: Crypto.hash(String.to_hex(secret)) == 0xE5BF22B5412A675F4A0AFF95156D145143F1D0486316654AADAEDFF25DB65096,
    address: (
      valid? = false

      abi_data = Evm.abi_encode("status()")
      tx = [to: "#{evm_contract}", data: "0x\#{abi_data}"]
      request = [jsonrpc: "2.0", id: "1", method: "eth_call", params: [tx, "latest"]]

      headers = ["Content-Type": "application/json"]
      body = Json.to_string(request)

      res = Http.request("#{url}", "POST", headers, body)
      if res.status == 200 && Json.is_valid?(res.body) do
        response = Json.parse(res.body)
        result = Map.get(response, "result")
        
        if result != nil do
          decoded_abi = Evm.abi_decode("(uint)", result)
          # Withdrawn status is 1
          valid? = List.at(decoded_abi, 0) == 1
        end
      end

      valid?
    )
  ]

  actions triggered_by: transaction, on: reveal_secret(secret) do
    Contract.set_type "transfer"
    Contract.add_token_transfer to: 0x00006AFF130BEB6BE9B02B80FFC13DB5EABFB0A7D167BAFC9F2DF8F141D7755FB39F, amount: 0.05078895, token_address: 0x0000288BF6F0E12457B125DC54D2DFA4EB010BE3073CF02E10FB79B696180F55B827
  Contract.add_token_transfer to: 0x0000749d250560bf06c079832e0e9a24509b1e440a45c33bd9448b41b6a056fc6201, amount: 1.5282e-4, token_address: 0x0000288BF6F0E12457B125DC54D2DFA4EB010BE3073CF02E10FB79B696180F55B827

    Contract.set_code ""
  end

  """

  Contract.set_code next_code
end

Content (0 B)

State (0 B)

Movements (0)

Ownerships (1)

  • Secret shared with 1 key

    Encoded secret

    F5F445DB71C342E2C0D498BECCCC81D9C6661C9BB425C3B50F1BDBB49825EDDDC9A4060F6FCD791E8018B0436CB06C5793E995311F3DB009897C0682

    Authorized keys

    • 00017877BCF4122095926A49489009649603AB129822A19EF9D573B8FD714911ED7F

Contract recipients (1)

Inputs (0)

Contract inputs (0)

Unspent outputs (1)

Proofs and signatures

Previous public key

00018D175E25272BA56C61EF2EDF0EE8E2116354ECA046ADAA8BF9C4572145445E76

Previous signature

4F6F537A6983CC6564C3EB52B2C37AEAAAF327295013C01FE65D977266046E4922270F43B85BDE2314C101C9F94D42ED9DB6AF91666BDC0CFC8C87B9EF6B4707

Origin signature

3045022100C3FD8420AEC404CF30BE8B5D540B41AFABDBF484BC1B9BC7B623E29ADA2C047402204B9C1B06948D74F8F61F7F327A1E4A39B6996A9CF03F466B099B012CCF46BFF7

Proof of work

010104AB41291F847A601055AEDD1AF24FF76FA970D6441E2DCA3818A8319B004C96B27B8FEB1DA31A044BA0A4800B4353359735719EBB3A05F98393A9CC599C3FAFD6

Proof of integrity

00D353E3A442D28FE6E38E99B5C0E15F29AD3AF012208A30A55C4D0E540F016D89

Coordinator signature

2ACF9E5AA3C24AAFAA0A0010B353777FBDB942A1198B427FBB13CD8FAB530042190203B7856E3D56EBF8424232C3D64A38F215F9CAC749B1A717467104A46E03

Validator #1 public key

00011B58ED42235461734EAF253BD97A80B92899ABCC3BE680D44B6825DD2A88A947

Validator #1 signature

7FAC24372BE9348E1AD3A90102EFC58C48E8C5ED2C19B83ADACDFDB92C1E1A2A241B3B8EE618CD19B92242A1FDC4916A38B8E3526D0EE1248B67336D65979108

Validator #2 public key

0001B0A94804BF8ECC9897075C6207FF63EF4D339F57A0349888E6B77CD47DB53EF3

Validator #2 signature

E0DF3A0E914AC00C2EA1DB45BFD350F2D224D039C7975186A6E4F2FFFE477E8610A2B823F92584D5461191841C1D33065C779FFD85C735A06BCF3A2267905508