@version 1
condition triggered_by: transaction, on: provision(_evm_contract, _endpoints, _signature, _evm_pool), as: [
previous_public_key: (
# Transaction is not yet validated so we need to use previous address
# to get the genesis address
previous_address = Chain.get_previous_address()
Chain.get_genesis_address(previous_address) == 0x00002075E9FB5329C7F5149802EB75F925D79B5FEC5BFCF09DC81993CB9C39FEAF5D
)
]
actions triggered_by: transaction, on: provision(evm_contract, endpoints, signature, evm_pool) do
endpoints = Json.to_string(endpoints)
Contract.set_code """
@version 1
condition triggered_by: transaction, on: refund(), as: [
content: (
valid? = false
abi_data = Evm.abi_encode("status()")
tx = [to: "#{evm_contract}", data: "0x\#{abi_data}"]
request = [jsonrpc: "2.0", id: "1", method: "eth_call", params: [tx, "latest"]]
headers = ["Content-Type": "application/json"]
body = Json.to_string(request)
evm_responses = query_evm_apis(#{endpoints}, "POST", headers, body)
for res in evm_responses do
if !valid? && res.status == 200 && Json.is_valid?(res.body) do
response = Json.parse(res.body)
result = Map.get(response, "result")
if result != nil do
decoded_abi = Evm.abi_decode("(uint)", result)
# Refund status is 2
valid? = List.at(decoded_abi, 0) == 2
end
end
end
valid?
)
]
actions triggered_by: transaction, on: refund() do
Contract.set_type "transfer"
# Send back UCO to bridge pool
Contract.add_uco_transfer to: 0x00002075E9FB5329C7F5149802EB75F925D79B5FEC5BFCF09DC81993CB9C39FEAF5D, amount: 10
Contract.set_code \"""
@version 1
export fun info() do
[
evm_contract: #{evm_contract},
evm_pool: #{evm_pool},
ae_pool: 0x00002075E9FB5329C7F5149802EB75F925D79B5FEC5BFCF09DC81993CB9C39FEAF5D,
status: 2 # REFUNDED
]
end
\"""
end
condition triggered_by: transaction, on: reveal_secret(secret), as: [
content: Crypto.hash(String.to_hex(secret)) == 0xB9459623DF0D8EABB84469315BB49BCA6F02B0CE2A3B1A1E5BBD4E2250A9F9C4,
address: (
valid? = false
abi_data = Evm.abi_encode("status()")
tx = [to: "#{evm_contract}", data: "0x\#{abi_data}"]
request = [jsonrpc: "2.0", id: "1", method: "eth_call", params: [tx, "latest"]]
headers = ["Content-Type": "application/json"]
body = Json.to_string(request)
responses = query_evm_apis(#{endpoints}, "POST", headers, body)
for res in responses do
if !valid? && res.status == 200 && Json.is_valid?(res.body) do
response = Json.parse(res.body)
result = Map.get(response, "result")
if result != nil do
decoded_abi = Evm.abi_decode("(uint)", result)
# Withdrawn status is 1
valid? = List.at(decoded_abi, 0) == 1
end
end
end
valid?
)
]
actions triggered_by: transaction, on: reveal_secret(secret) do
Contract.set_type "transfer"
Contract.add_uco_transfer to: 0x000082DFEEAB7E343E6CBA48892E378B1EA0D9D62EB21A92420936F9C4A66150D9EA, amount: 10
Contract.set_code \"""
@version 1
export fun info() do
[
evm_contract: #{evm_contract},
evm_pool: #{evm_pool},
ae_pool: 0x00002075E9FB5329C7F5149802EB75F925D79B5FEC5BFCF09DC81993CB9C39FEAF5D,
status: 1 # WITHDRAWN
]
end
\"""
end
fun query_evm_apis(endpoints, method, headers, body) do
requests = []
for endpoint in endpoints do
requests = List.append(requests, url: endpoint, method: method, headers: headers, body: body)
end
Http.request_many(requests, false)
end
export fun get_provision_signature() do
[
r: 0x#{signature.r},
s: 0x#{signature.s},
v: #{signature.v}
]
end
export fun info() do
[
evm_contract: #{evm_contract},
evm_pool: #{evm_pool},
ae_pool: 0x00002075E9FB5329C7F5149802EB75F925D79B5FEC5BFCF09DC81993CB9C39FEAF5D,
status: 0 # PENDING
]
end
"""
end
export fun info() do
[
ae_pool: 0x00002075E9FB5329C7F5149802EB75F925D79B5FEC5BFCF09DC81993CB9C39FEAF5D,
status: 0 # PENDING
]
end
Content (0 B)
State (0 B)
-
Secret shared with 1 key
Encoded secret
E5BBD1B47EDA515F0817E8A792AB49CD7CB43914DA99068B5BEA00CE28CBCBC2366CCA5D4782CBAFBFB8879EF3485DB55A33F05C4BA3BE3D0229067F
Authorized keys
- 000122A6CD9ED07E46835D6E88E5BD0BEE84C3F5E5DBF8E916AD9B2EC912C44AFEC2
-
Resolved 00002075...AF5Drequest_funds
[ 1745019300, 10, "000082dfeeab7e343e6cba48892e378b1ea0d9d62eb21a92420936f9c4a66150d9ea", "b9459623df0d8eabb84469315bb49bca6f02b0ce2a3b1a1e5bbd4e2250a9f9c4", "0x0408469cb81f738f087b5e528a96e80cafcff8b810d60a0c68e0181cca0e9185", "0x1e1CF9211d35822A1986A8a8C9A7d6be4243AB9C", 137 ]
Inputs (0)
Contract inputs (0)
Unspent outputs (0)
Previous public key
0001602ACC130007384F05472D664B871B885E841C4C18E067490CC577909DE6D2ED
Previous signature
8A240EE3B82FBE3D95CE632306ADAA57315EEDEE05AB7BAA46D9ED106A290250CFE5C2934F9DBFE9AF30C185DC12A1090CAB4A56753D648D15A4FB06D8DA2B02
Origin signature
3045022100F4893D6512E741922EFCF5958ACC87C6E77D0D4B50E82B111B0B054923DBB9CD0220286077E39AD74DC225BC1F6284AF5FEE0328A269DA229328E6BDA8F9F570028D
Proof of work
010104AB41291F847A601055AEDD1AF24FF76FA970D6441E2DCA3818A8319B004C96B27B8FEB1DA31A044BA0A4800B4353359735719EBB3A05F98393A9CC599C3FAFD6
Proof of integrity
0034AD202BA74EAEBB18F14D37BFC077652C3E53A2A72F4D9781D02CD9FA381D5A
Coordinator signature
23D988D17C65426FB3EC9822B4439DF5F8E85F08DF9AA8559284BA487A310FDFF1EB96C37D053827196A07BD00DA6AE261474CEE946C303986B571899C778F0D
Validator #1 public key
00012E30765FFC72AF99D9420F389600BD6517D9BC763BE7B9FF74AE63814F42E8BA
Validator #1 signature
8E3F0716E89CD5E987BFEB3B314BBEFEEF2BFE55ECDB12FEB5D7D3C4A91BA11EFD4C4DCA061F87EEC2A047301B8D4B6DBCA8921BC569C6063B32F86F01B90D08
Validator #2 public key
00011F1FFF7727694787311C352B9A43409DB7408489657A505BEE218A4735CAB47D
Validator #2 signature
44B12CDE8F4C5D15BE5DB5419F6F3554AA0A5C399F3A4AB6B072811081841344D1079C262FDDAF955DB641CFC10F751555DE3698A76627ED1DBB1EFA8EEEDD06