@version 1
condition triggered_by: transaction, on: provision(_evm_contract, _endpoints, _signature, _evm_pool), as: [
previous_public_key: (
# Transaction is not yet validated so we need to use previous address
# to get the genesis address
previous_address = Chain.get_previous_address()
Chain.get_genesis_address(previous_address) == 0x00002075E9FB5329C7F5149802EB75F925D79B5FEC5BFCF09DC81993CB9C39FEAF5D
)
]
actions triggered_by: transaction, on: provision(evm_contract, endpoints, signature, evm_pool) do
endpoints = Json.to_string(endpoints)
Contract.set_code """
@version 1
condition triggered_by: transaction, on: refund(), as: [
content: (
valid? = false
abi_data = Evm.abi_encode("status()")
tx = [to: "#{evm_contract}", data: "0x\#{abi_data}"]
request = [jsonrpc: "2.0", id: "1", method: "eth_call", params: [tx, "latest"]]
headers = ["Content-Type": "application/json"]
body = Json.to_string(request)
evm_responses = query_evm_apis(#{endpoints}, "POST", headers, body)
for res in evm_responses do
if !valid? && res.status == 200 && Json.is_valid?(res.body) do
response = Json.parse(res.body)
result = Map.get(response, "result")
if result != nil do
decoded_abi = Evm.abi_decode("(uint)", result)
# Refund status is 2
valid? = List.at(decoded_abi, 0) == 2
end
end
end
valid?
)
]
actions triggered_by: transaction, on: refund() do
Contract.set_type "transfer"
# Send back UCO to bridge pool
Contract.add_uco_transfer to: 0x00002075E9FB5329C7F5149802EB75F925D79B5FEC5BFCF09DC81993CB9C39FEAF5D, amount: 91250
Contract.set_code \"""
@version 1
export fun info() do
[
evm_contract: #{evm_contract},
evm_pool: #{evm_pool},
ae_pool: 0x00002075E9FB5329C7F5149802EB75F925D79B5FEC5BFCF09DC81993CB9C39FEAF5D,
status: 2 # REFUNDED
]
end
\"""
end
condition triggered_by: transaction, on: reveal_secret(secret), as: [
content: Crypto.hash(String.to_hex(secret)) == 0x9BF3C502E3E0B3C0A1CB91D30B84FB41E923E958019878FCD7D3E3A93C0D032F,
address: (
valid? = false
abi_data = Evm.abi_encode("status()")
tx = [to: "#{evm_contract}", data: "0x\#{abi_data}"]
request = [jsonrpc: "2.0", id: "1", method: "eth_call", params: [tx, "latest"]]
headers = ["Content-Type": "application/json"]
body = Json.to_string(request)
responses = query_evm_apis(#{endpoints}, "POST", headers, body)
for res in responses do
if !valid? && res.status == 200 && Json.is_valid?(res.body) do
response = Json.parse(res.body)
result = Map.get(response, "result")
if result != nil do
decoded_abi = Evm.abi_decode("(uint)", result)
# Withdrawn status is 1
valid? = List.at(decoded_abi, 0) == 1
end
end
end
valid?
)
]
actions triggered_by: transaction, on: reveal_secret(secret) do
Contract.set_type "transfer"
Contract.add_uco_transfer to: 0x0000E9F9DAF9D5892AA9FF6890A27B8A83E8D37FA466C4950C4A1802A439383E849E, amount: 91250
Contract.set_code \"""
@version 1
export fun info() do
[
evm_contract: #{evm_contract},
evm_pool: #{evm_pool},
ae_pool: 0x00002075E9FB5329C7F5149802EB75F925D79B5FEC5BFCF09DC81993CB9C39FEAF5D,
status: 1 # WITHDRAWN
]
end
\"""
end
fun query_evm_apis(endpoints, method, headers, body) do
requests = []
for endpoint in endpoints do
requests = List.append(requests, url: endpoint, method: method, headers: headers, body: body)
end
Http.request_many(requests, false)
end
export fun get_provision_signature() do
[
r: 0x#{signature.r},
s: 0x#{signature.s},
v: #{signature.v}
]
end
export fun info() do
[
evm_contract: #{evm_contract},
evm_pool: #{evm_pool},
ae_pool: 0x00002075E9FB5329C7F5149802EB75F925D79B5FEC5BFCF09DC81993CB9C39FEAF5D,
status: 0 # PENDING
]
end
"""
end
export fun info() do
[
ae_pool: 0x00002075E9FB5329C7F5149802EB75F925D79B5FEC5BFCF09DC81993CB9C39FEAF5D,
status: 0 # PENDING
]
end
Content (0 B)
State (0 B)
-
Secret shared with 1 key
Encoded secret
7A928D8031145BC7EBA67BBEC84AF6ECE236F69F9B21D876E9133C026F350BF31D72D3217A7A932D88F3AA6FE4FD1E9A38F4DAA2CFB9743825ECD260
Authorized keys
- 000122A6CD9ED07E46835D6E88E5BD0BEE84C3F5E5DBF8E916AD9B2EC912C44AFEC2
-
Resolved 00002075...AF5Drequest_funds
[ 1745171340, 91250, "0000e9f9daf9d5892aa9ff6890a27b8a83e8d37fa466c4950c4a1802a439383e849e", "9bf3c502e3e0b3c0a1cb91d30b84fb41e923e958019878fcd7d3e3a93c0d032f", "0x36e8c3955c43df9e67fa3769c66a31fa53daacf21d07ab527f7741e0e94b4e91", "0x6Cf167D4b0Ac523f1019304E73ac30B83E0BF056", 1 ]
Inputs (0)
Contract inputs (0)
Unspent outputs (0)
Previous public key
0001B0241DC857424600198ECCA144C66C153557308EFC4AEF41DA6C0F5744219189
Previous signature
9592DAB61E6F0A01994B6151D39F14DF37BE29EF4DA36EFCCF496EA5F9C7F294A5BCFFE2FE73172C38468A036C2E73B030FEE5A4A93BC426EC22BFAA876E7809
Origin signature
3044022029F98CCBA2E627707AC25AC530B49F3F91AE1C9B1CDCD534B0B2C3F9FCB423AA022020038995C99894FA6CD8BB9E332614E5F29B1313413A4D3CC0D4C30C53E189CD
Proof of work
010104AB41291F847A601055AEDD1AF24FF76FA970D6441E2DCA3818A8319B004C96B27B8FEB1DA31A044BA0A4800B4353359735719EBB3A05F98393A9CC599C3FAFD6
Proof of integrity
006693FB36A7747530419BAAD3AC252874831F3F6C2D128B321DD495C231C9E95C
Coordinator signature
0F69E130BE5568C62C3EEF3E1F68E18C78085DF93035549A799AD239353EBD068125C91B843D30ACE02ADBD93562F994D9471BC5CFAAE0BB90FD32C2E4240B0A
Validator #1 public key
00019AD94822B40BF5D4B6874848D7BAB37D351DAB7CFEE31B5A44D58A5961DAB123
Validator #1 signature
42428D422503A0DDBFCF363F71A505008D2E80DBEC3205125266BA4441DDB1C3A7813A8B4AEA4370BE1B91321FEAAB03A965B4176F1066D550A11BA7C7EC230C
Validator #2 public key
00012E30765FFC72AF99D9420F389600BD6517D9BC763BE7B9FF74AE63814F42E8BA
Validator #2 signature
F45530344DB5595E9ACB1E3324961B53B8000475FBA48E9803B31BA318685961D29868DB95BE6E997AFE3A1588D83CC1021FEB02DDDAC9B008A949A80DD10B0B