@version 1
condition triggered_by: transaction, on: provision(_evm_contract, _endpoints, _signature, _evm_pool), as: [
previous_public_key: (
# Transaction is not yet validated so we need to use previous address
# to get the genesis address
previous_address = Chain.get_previous_address()
Chain.get_genesis_address(previous_address) == 0x00002075E9FB5329C7F5149802EB75F925D79B5FEC5BFCF09DC81993CB9C39FEAF5D
)
]
actions triggered_by: transaction, on: provision(evm_contract, endpoints, signature, evm_pool) do
endpoints = Json.to_string(endpoints)
Contract.set_code """
@version 1
condition triggered_by: transaction, on: refund(), as: [
content: (
valid? = false
abi_data = Evm.abi_encode("status()")
tx = [to: "#{evm_contract}", data: "0x\#{abi_data}"]
request = [jsonrpc: "2.0", id: "1", method: "eth_call", params: [tx, "latest"]]
headers = ["Content-Type": "application/json"]
body = Json.to_string(request)
evm_responses = query_evm_apis(#{endpoints}, "POST", headers, body)
for res in evm_responses do
if !valid? && res.status == 200 && Json.is_valid?(res.body) do
response = Json.parse(res.body)
result = Map.get(response, "result")
if result != nil do
decoded_abi = Evm.abi_decode("(uint)", result)
# Refund status is 2
valid? = List.at(decoded_abi, 0) == 2
end
end
end
valid?
)
]
actions triggered_by: transaction, on: refund() do
Contract.set_type "transfer"
# Send back UCO to bridge pool
Contract.add_uco_transfer to: 0x00002075E9FB5329C7F5149802EB75F925D79B5FEC5BFCF09DC81993CB9C39FEAF5D, amount: 1.0e-6
Contract.set_code \"""
@version 1
export fun info() do
[
evm_contract: #{evm_contract},
evm_pool: #{evm_pool},
ae_pool: 0x00002075E9FB5329C7F5149802EB75F925D79B5FEC5BFCF09DC81993CB9C39FEAF5D,
status: 2 # REFUNDED
]
end
\"""
end
condition triggered_by: transaction, on: reveal_secret(secret), as: [
content: Crypto.hash(String.to_hex(secret)) == 0xD7359F62F1FA895FB52745B4F680C17C2C8A9153DCB077E2059CFEEF724A5790,
address: (
valid? = false
abi_data = Evm.abi_encode("status()")
tx = [to: "#{evm_contract}", data: "0x\#{abi_data}"]
request = [jsonrpc: "2.0", id: "1", method: "eth_call", params: [tx, "latest"]]
headers = ["Content-Type": "application/json"]
body = Json.to_string(request)
responses = query_evm_apis(#{endpoints}, "POST", headers, body)
for res in responses do
if !valid? && res.status == 200 && Json.is_valid?(res.body) do
response = Json.parse(res.body)
result = Map.get(response, "result")
if result != nil do
decoded_abi = Evm.abi_decode("(uint)", result)
# Withdrawn status is 1
valid? = List.at(decoded_abi, 0) == 1
end
end
end
valid?
)
]
actions triggered_by: transaction, on: reveal_secret(secret) do
Contract.set_type "transfer"
Contract.add_uco_transfer to: 0x000063BD64EF5CAFA303A612936AEA541B7C4539B6DEA64E85180B048679BE5F7355, amount: 1.0e-6
Contract.set_code \"""
@version 1
export fun info() do
[
evm_contract: #{evm_contract},
evm_pool: #{evm_pool},
ae_pool: 0x00002075E9FB5329C7F5149802EB75F925D79B5FEC5BFCF09DC81993CB9C39FEAF5D,
status: 1 # WITHDRAWN
]
end
\"""
end
fun query_evm_apis(endpoints, method, headers, body) do
requests = []
for endpoint in endpoints do
requests = List.append(requests, url: endpoint, method: method, headers: headers, body: body)
end
Http.request_many(requests, false)
end
export fun get_provision_signature() do
[
r: 0x#{signature.r},
s: 0x#{signature.s},
v: #{signature.v}
]
end
export fun info() do
[
evm_contract: #{evm_contract},
evm_pool: #{evm_pool},
ae_pool: 0x00002075E9FB5329C7F5149802EB75F925D79B5FEC5BFCF09DC81993CB9C39FEAF5D,
status: 0 # PENDING
]
end
"""
end
export fun info() do
[
ae_pool: 0x00002075E9FB5329C7F5149802EB75F925D79B5FEC5BFCF09DC81993CB9C39FEAF5D,
status: 0 # PENDING
]
end
Content (0 B)
State (0 B)
-
Secret shared with 1 key
Encoded secret
7AB336976DC8FF0DE49350E1F06CCA896CB1BBD45E270C385BB1FC2C22E9A92E27D7900C9629A0E7F2492C361A9AED14467CAFCE3C035F5C28AE75B8
Authorized keys
- 000122A6CD9ED07E46835D6E88E5BD0BEE84C3F5E5DBF8E916AD9B2EC912C44AFEC2
-
Resolved 00002075...AF5Drequest_funds
[ 1744899480, 1.0e-6, "000063bd64ef5cafa303a612936aea541b7c4539b6dea64e85180b048679be5f7355", "d7359f62f1fa895fb52745b4f680c17c2c8a9153dcb077e2059cfeef724a5790", "0xad0c10481f06b9a90d7312ab7890f92b8e389a7767bc71cd20a068a7a0555c26", "0xDc648145384DeB04Bd06915EA1e1c5Bd0eAA67C8", 137 ]
Inputs (0)
Contract inputs (0)
Unspent outputs (0)
Previous public key
000142D7D465FBC1546126A8DC4633370BC3DABD4C82B2D5A005D5C81CF25B1B65D7
Previous signature
AA104B968972670A3C1B9831733736E370954F9DCD0A8A8E0E0FFAA3987EEF6A21408FC27C9B9475CA0DA4C68D64FB022AC232DE2BAE7CE433FD7215EAE8CD01
Origin signature
3044022065FEF274CFE7640A719CFC267F4FDE953F9CB40461F59880A349689F674C90C00220242F0DDF0C93CF0E2ABB7589DB9EE83BD9B7D36F16717DCE7B66D87BDFCA6D97
Proof of work
010104AB41291F847A601055AEDD1AF24FF76FA970D6441E2DCA3818A8319B004C96B27B8FEB1DA31A044BA0A4800B4353359735719EBB3A05F98393A9CC599C3FAFD6
Proof of integrity
000EDA98883C97A0005104230E4877E308A6F8CC3F5949E22B8F4CBC26DAC00C74
Coordinator signature
26128FB52CC13D4E2DEB989B4BC61AEB4189E88B623CBFE947B645FBD3AE29198B7A6A5438182F39FE9615C3E29539435A0F3F7ABC92C4858BA428CF89DBBC0D
Validator #1 public key
0001792F993267EB4B7CF6106DC257E9E5E2D9915D27CF6ECFE072D0E4F68290F45C
Validator #1 signature
DB62CADE4650ADEABA44C9E1A6263182A3DBA63F9D59159D2CB022619DDB27855BCFFC109CC9247258906B23A5753BFEDB9023D659A76BB546B83244672DF500
Validator #2 public key
00012CC694F3778B7CE23048863456192AAE5346C3FF4DE6C0CE7742B4B037C85625
Validator #2 signature
7BD8374CC7FAC65BEA8B5E7778EB12C91DCD752BBF5CF425C94CDE488F4814C8517B80942AE739128736436BE7233A01FABA526557A2F141AF4538D035919604