@version 1
condition triggered_by: transaction, on: provision(_evm_contract, _endpoints, _signature, _evm_pool), as: [
previous_public_key: (
# Transaction is not yet validated so we need to use previous address
# to get the genesis address
previous_address = Chain.get_previous_address()
Chain.get_genesis_address(previous_address) == 0x00002075E9FB5329C7F5149802EB75F925D79B5FEC5BFCF09DC81993CB9C39FEAF5D
)
]
actions triggered_by: transaction, on: provision(evm_contract, endpoints, signature, evm_pool) do
endpoints = Json.to_string(endpoints)
Contract.set_code """
@version 1
condition triggered_by: transaction, on: refund(), as: [
content: (
valid? = false
abi_data = Evm.abi_encode("status()")
tx = [to: "#{evm_contract}", data: "0x\#{abi_data}"]
request = [jsonrpc: "2.0", id: "1", method: "eth_call", params: [tx, "latest"]]
headers = ["Content-Type": "application/json"]
body = Json.to_string(request)
evm_responses = query_evm_apis(#{endpoints}, "POST", headers, body)
for res in evm_responses do
if !valid? && res.status == 200 && Json.is_valid?(res.body) do
response = Json.parse(res.body)
result = Map.get(response, "result")
if result != nil do
decoded_abi = Evm.abi_decode("(uint)", result)
# Refund status is 2
valid? = List.at(decoded_abi, 0) == 2
end
end
end
valid?
)
]
actions triggered_by: transaction, on: refund() do
Contract.set_type "transfer"
# Send back UCO to bridge pool
Contract.add_uco_transfer to: 0x00002075E9FB5329C7F5149802EB75F925D79B5FEC5BFCF09DC81993CB9C39FEAF5D, amount: 474060
Contract.set_code \"""
@version 1
export fun info() do
[
evm_contract: #{evm_contract},
evm_pool: #{evm_pool},
ae_pool: 0x00002075E9FB5329C7F5149802EB75F925D79B5FEC5BFCF09DC81993CB9C39FEAF5D,
status: 2 # REFUNDED
]
end
\"""
end
condition triggered_by: transaction, on: reveal_secret(secret), as: [
content: Crypto.hash(String.to_hex(secret)) == 0xFCE70408CB9D0A1AC35D6E59A45CAAEB6335C3B6DD04022ABCB4684B26F74C18,
address: (
valid? = false
abi_data = Evm.abi_encode("status()")
tx = [to: "#{evm_contract}", data: "0x\#{abi_data}"]
request = [jsonrpc: "2.0", id: "1", method: "eth_call", params: [tx, "latest"]]
headers = ["Content-Type": "application/json"]
body = Json.to_string(request)
responses = query_evm_apis(#{endpoints}, "POST", headers, body)
for res in responses do
if !valid? && res.status == 200 && Json.is_valid?(res.body) do
response = Json.parse(res.body)
result = Map.get(response, "result")
if result != nil do
decoded_abi = Evm.abi_decode("(uint)", result)
# Withdrawn status is 1
valid? = List.at(decoded_abi, 0) == 1
end
end
end
valid?
)
]
actions triggered_by: transaction, on: reveal_secret(secret) do
Contract.set_type "transfer"
Contract.add_uco_transfer to: 0x00005764C636273320C095EE4260079789442A25B2CC6A2981A51C77D7F4982A11CE, amount: 474060
Contract.set_code \"""
@version 1
export fun info() do
[
evm_contract: #{evm_contract},
evm_pool: #{evm_pool},
ae_pool: 0x00002075E9FB5329C7F5149802EB75F925D79B5FEC5BFCF09DC81993CB9C39FEAF5D,
status: 1 # WITHDRAWN
]
end
\"""
end
fun query_evm_apis(endpoints, method, headers, body) do
requests = []
for endpoint in endpoints do
requests = List.append(requests, url: endpoint, method: method, headers: headers, body: body)
end
Http.request_many(requests, false)
end
export fun get_provision_signature() do
[
r: 0x#{signature.r},
s: 0x#{signature.s},
v: #{signature.v}
]
end
export fun info() do
[
evm_contract: #{evm_contract},
evm_pool: #{evm_pool},
ae_pool: 0x00002075E9FB5329C7F5149802EB75F925D79B5FEC5BFCF09DC81993CB9C39FEAF5D,
status: 0 # PENDING
]
end
"""
end
export fun info() do
[
ae_pool: 0x00002075E9FB5329C7F5149802EB75F925D79B5FEC5BFCF09DC81993CB9C39FEAF5D,
status: 0 # PENDING
]
end
Content (0 B)
State (0 B)
-
Secret shared with 1 key
Encoded secret
487CEFE14A4F91C2F1A00B0D3027FC8A2188EBD0095DCA9923FCD4B477D02D011F04D43FFFE6AADD34B38F5959D0A9D20AFE9EA6735A5BBD5E8DD00D
Authorized keys
- 000122A6CD9ED07E46835D6E88E5BD0BEE84C3F5E5DBF8E916AD9B2EC912C44AFEC2
-
Resolved 00002075...AF5Drequest_funds
[ 1744391220, 474060, "00005764c636273320c095ee4260079789442a25b2cc6a2981a51c77d7f4982a11ce", "fce70408cb9d0a1ac35d6e59a45caaeb6335c3b6dd04022abcb4684b26f74c18", "0x94043acd5304128e161019b1e93e872b597edd0523dc007d2ec6cf76c0ef3da3", "0xDF5720D45649beb12FCa99e32ddBba0e193D3654", 56 ]
Inputs (0)
Contract inputs (0)
Unspent outputs (0)
Previous public key
00018D09E79C874A99563DAD088E2BAA9242DBBDB853073480588DB5398D1ECE9CE7
Previous signature
A6326F9BF80024A0F05CC741818B5FA2B6D253103FFCE06C6517385665F522FDD4ED508DF0123F9C67BD4284E904A0B7EA45E0E6BD7A11B941A8E5896349A800
Origin signature
30450221009435BA06B4DAE963DCAB4931B42D9D2072C677D1DCA76AC24629CE0356AC396C02207E5AB4209CFB4D477D650B0E2DE4E515A792B1D041B4C8CB81D392BA525E4C2A
Proof of work
010104AB41291F847A601055AEDD1AF24FF76FA970D6441E2DCA3818A8319B004C96B27B8FEB1DA31A044BA0A4800B4353359735719EBB3A05F98393A9CC599C3FAFD6
Proof of integrity
0091DA0039467F81DE41655FAF59C898CB0ABAD1669739E0C83040E4129ABCB3AC
Coordinator signature
E033C6E2690BFA9EA3E3956AC1B6ACD1C0C01E34F245024E88BA80B8245D209756DAEE5C902D64DCF193B896F9CC157C977B9B3CD93D0FD51A86DF3AB04C1C0B
Validator #1 public key
00011F1FFF7727694787311C352B9A43409DB7408489657A505BEE218A4735CAB47D
Validator #1 signature
E4DA2CE3D941C1F804EB0ED92EFB1138F8F01C2710D9A150880A985BCFD110B59D7D7DD3ABDA8B4B5A0FB75BDD6B5291CFB809DE9F316577FEECF4AD6E5FB408
Validator #2 public key
0001792F993267EB4B7CF6106DC257E9E5E2D9915D27CF6ECFE072D0E4F68290F45C
Validator #2 signature
9F615506E6D345CF630CF4A4F57DA43E1525CE76B6EDC874DD2DD7227A28311430C4422D032D4F3987C16D912B94D5254ED3E9EA7E90573D09B696ED4959200F