@version 1 condition triggered_by: transaction, on: provision(_evm_contract, _endpoints, _signature, _evm_pool), as: [ previous_public_key: ( # Transaction is not yet validated so we need to use previous address # to get the genesis address previous_address = Chain.get_previous_address() Chain.get_genesis_address(previous_address) == 0x000018D60115ECE0C7558A46B4693749BF6BEAB524FDDCCF9B10B910619E4EE08801 ) ] actions triggered_by: transaction, on: provision(evm_contract, endpoints, signature, evm_pool) do endpoints = Json.to_string(endpoints) Contract.set_code """ @version 1 condition triggered_by: transaction, on: refund(), as: [ content: ( valid? = false abi_data = Evm.abi_encode("status()") tx = [to: "#{evm_contract}", data: "0x\#{abi_data}"] request = [jsonrpc: "2.0", id: "1", method: "eth_call", params: [tx, "latest"]] headers = ["Content-Type": "application/json"] body = Json.to_string(request) evm_responses = query_evm_apis(#{endpoints}, "POST", headers, body) for res in evm_responses do if !valid? && res.status == 200 && Json.is_valid?(res.body) do response = Json.parse(res.body) result = Map.get(response, "result") if result != nil do decoded_abi = Evm.abi_decode("(uint)", result) # Refund status is 2 valid? = List.at(decoded_abi, 0) == 2 end end end valid? ) ] actions triggered_by: transaction, on: refund() do Contract.set_type "transfer" # Send back UCO to bridge pool Contract.add_uco_transfer to: 0x000018D60115ECE0C7558A46B4693749BF6BEAB524FDDCCF9B10B910619E4EE08801, amount: 1.0e-5 Contract.set_code \""" @version 1 export fun info() do [ evm_contract: #{evm_contract}, evm_pool: #{evm_pool}, ae_pool: 0x000018D60115ECE0C7558A46B4693749BF6BEAB524FDDCCF9B10B910619E4EE08801, status: 2 # REFUNDED ] end \""" end condition triggered_by: transaction, on: reveal_secret(secret), as: [ content: Crypto.hash(String.to_hex(secret)) == 0xBD4244142A0F1D777F234AFFE5CF549C955E1B5D0C6D674D90ADC2946D120555, address: ( valid? = false abi_data = Evm.abi_encode("status()") tx = [to: "#{evm_contract}", data: "0x\#{abi_data}"] request = [jsonrpc: "2.0", id: "1", method: "eth_call", params: [tx, "latest"]] headers = ["Content-Type": "application/json"] body = Json.to_string(request) responses = query_evm_apis(#{endpoints}, "POST", headers, body) for res in responses do if !valid? && res.status == 200 && Json.is_valid?(res.body) do response = Json.parse(res.body) result = Map.get(response, "result") if result != nil do decoded_abi = Evm.abi_decode("(uint)", result) # Withdrawn status is 1 valid? = List.at(decoded_abi, 0) == 1 end end end valid? ) ] actions triggered_by: transaction, on: reveal_secret(secret) do Contract.set_type "transfer" Contract.add_uco_transfer to: 0x00000BC0EBA2DBCE4455B46F5E51AFAABA6EB4C7FBA1D4E2E6DABD55DC70F9A04D6F, amount: 1.0e-5 Contract.set_code \""" @version 1 export fun info() do [ evm_contract: #{evm_contract}, evm_pool: #{evm_pool}, ae_pool: 0x000018D60115ECE0C7558A46B4693749BF6BEAB524FDDCCF9B10B910619E4EE08801, status: 1 # WITHDRAWN ] end \""" end fun query_evm_apis(endpoints, method, headers, body) do requests = [] for endpoint in endpoints do requests = List.append(requests, url: endpoint, method: method, headers: headers, body: body) end Http.request_many(requests, false) end export fun get_provision_signature() do [ r: 0x#{signature.r}, s: 0x#{signature.s}, v: #{signature.v} ] end export fun info() do [ evm_contract: #{evm_contract}, evm_pool: #{evm_pool}, ae_pool: 0x000018D60115ECE0C7558A46B4693749BF6BEAB524FDDCCF9B10B910619E4EE08801, status: 0 # PENDING ] end """ end export fun info() do [ ae_pool: 0x000018D60115ECE0C7558A46B4693749BF6BEAB524FDDCCF9B10B910619E4EE08801, status: 0 # PENDING ] end
Content (0 B)
State (0 B)
-
Secret shared with 1 key
Encoded secret
63EAE04A2B532E613F2A030B7395F497916345F315770D664F54118D0F318EBE92C7160C7449247B3562E398F4448CAA25F87CB080824EF21F3DCEEA
Authorized keys
- 00017877BCF4122095926A49489009649603AB129822A19EF9D573B8FD714911ED7F
-
Resolved 000018D6...8801request_funds
[ 1730831280, 1.0e-5, "00000bc0eba2dbce4455b46f5e51afaaba6eb4c7fba1d4e2e6dabd55dc70f9a04d6f", "bd4244142a0f1d777f234affe5cf549c955e1b5d0c6d674d90adc2946d120555", "0xf78547252b115c884f3393f49b162b8303117b6ed43d4f1a3f8fba4305329e16", "0x7DAdAcA68BF4502544193d9e5EB7795Ca54ace3b", 97 ]
Inputs (0)
Contract inputs (0)
Unspent outputs (1)
-
From 0000564D...FF01At 2024-11-05 16:28:51 UTCAmount 0.89295411 UCO
Previous public key
0001311D8A5AFA979CBCD57605301B7F7311ADF020E11B17B62CB6518B10BB86E129
Previous signature
5B016421B51544D1C7B2D92C05C83B9BE303649280F38B55CF43081641C18338D88B740C57922230D238EB2197F249BEC222DB03572FD71E7FC3FC0E1EBACE02
Origin signature
30440220461BC5CA7FF082C7E39803B193529B630F2948E1EB3C57795801AF75106EB6C5022065CAE12406170BA7717128A3E77891D140D693BE004D5F1561B431C8AC9FA0DF
Proof of work
010104AB41291F847A601055AEDD1AF24FF76FA970D6441E2DCA3818A8319B004C96B27B8FEB1DA31A044BA0A4800B4353359735719EBB3A05F98393A9CC599C3FAFD6
Proof of integrity
00CBCFFA7A9142094730DD87E0C20556C5ABD257A0D4253BC06C613180172E4324
Coordinator signature
2F60DEF349B256A19A9490294926FC6E1F81D1504B12CAF60AD0D1D0828028DAD32AAD3A6B3EEF264611787D323D67254CA5A4CA212CB4DF74324CF99FB18B00
Validator #1 public key
0001AAFBD70CD1928E509736D7A3F072694F7AD7AA7BF5716FB0239146EE4B633F45
Validator #1 signature
6D376296D8479E60999DAF6CD99FE033D2A6671AE8DA03F75DB59996E1BAAAAD95AAFF2175560CD4A249BFCA1516AF74E82A932D7441CF0395CF8D6F40A84B02
Validator #2 public key
00013F0000490CECA80A76E7199D7B53E23583A16E24EF761384EC642713056C33D7
Validator #2 signature
0861DAF0E076BFFB31B14E7E6D8E5144D2ABAB5BCBE3580F96F7F84A5F3FE199082A4EBE98A7CDD37474EC53655489CA53F694B63056DC769A0E60F00FC00407