@version 1 condition triggered_by: transaction, on: provision(_evm_contract, _endpoints, _signature, _evm_pool), as: [ previous_public_key: ( # Transaction is not yet validated so we need to use previous address # to get the genesis address previous_address = Chain.get_previous_address() Chain.get_genesis_address(previous_address) == 0x000018D60115ECE0C7558A46B4693749BF6BEAB524FDDCCF9B10B910619E4EE08801 ) ] actions triggered_by: transaction, on: provision(evm_contract, endpoints, signature, evm_pool) do endpoints = Json.to_string(endpoints) Contract.set_code """ @version 1 condition triggered_by: transaction, on: refund(), as: [ content: ( valid? = false abi_data = Evm.abi_encode("status()") tx = [to: "#{evm_contract}", data: "0x\#{abi_data}"] request = [jsonrpc: "2.0", id: "1", method: "eth_call", params: [tx, "latest"]] headers = ["Content-Type": "application/json"] body = Json.to_string(request) evm_responses = query_evm_apis(#{endpoints}, "POST", headers, body) for res in evm_responses do if !valid? && res.status == 200 && Json.is_valid?(res.body) do response = Json.parse(res.body) result = Map.get(response, "result") if result != nil do decoded_abi = Evm.abi_decode("(uint)", result) # Refund status is 2 valid? = List.at(decoded_abi, 0) == 2 end end end valid? ) ] actions triggered_by: transaction, on: refund() do Contract.set_type "transfer" # Send back UCO to bridge pool Contract.add_uco_transfer to: 0x000018D60115ECE0C7558A46B4693749BF6BEAB524FDDCCF9B10B910619E4EE08801, amount: 1.0e-5 Contract.set_code \""" @version 1 export fun info() do [ evm_contract: #{evm_contract}, evm_pool: #{evm_pool}, ae_pool: 0x000018D60115ECE0C7558A46B4693749BF6BEAB524FDDCCF9B10B910619E4EE08801, status: 2 # REFUNDED ] end \""" end condition triggered_by: transaction, on: reveal_secret(secret), as: [ content: Crypto.hash(String.to_hex(secret)) == 0xAA194638D07DDC037B567BC4DDFD140448A7F82AC82379101DC4750C00261ABE, address: ( valid? = false abi_data = Evm.abi_encode("status()") tx = [to: "#{evm_contract}", data: "0x\#{abi_data}"] request = [jsonrpc: "2.0", id: "1", method: "eth_call", params: [tx, "latest"]] headers = ["Content-Type": "application/json"] body = Json.to_string(request) responses = query_evm_apis(#{endpoints}, "POST", headers, body) for res in responses do if !valid? && res.status == 200 && Json.is_valid?(res.body) do response = Json.parse(res.body) result = Map.get(response, "result") if result != nil do decoded_abi = Evm.abi_decode("(uint)", result) # Withdrawn status is 1 valid? = List.at(decoded_abi, 0) == 1 end end end valid? ) ] actions triggered_by: transaction, on: reveal_secret(secret) do Contract.set_type "transfer" Contract.add_uco_transfer to: 0x00000BC0EBA2DBCE4455B46F5E51AFAABA6EB4C7FBA1D4E2E6DABD55DC70F9A04D6F, amount: 1.0e-5 Contract.set_code \""" @version 1 export fun info() do [ evm_contract: #{evm_contract}, evm_pool: #{evm_pool}, ae_pool: 0x000018D60115ECE0C7558A46B4693749BF6BEAB524FDDCCF9B10B910619E4EE08801, status: 1 # WITHDRAWN ] end \""" end fun query_evm_apis(endpoints, method, headers, body) do requests = [] for endpoint in endpoints do requests = List.append(requests, url: endpoint, method: method, headers: headers, body: body) end Http.request_many(requests, false) end export fun get_provision_signature() do [ r: 0x#{signature.r}, s: 0x#{signature.s}, v: #{signature.v} ] end export fun info() do [ evm_contract: #{evm_contract}, evm_pool: #{evm_pool}, ae_pool: 0x000018D60115ECE0C7558A46B4693749BF6BEAB524FDDCCF9B10B910619E4EE08801, status: 0 # PENDING ] end """ end export fun info() do [ ae_pool: 0x000018D60115ECE0C7558A46B4693749BF6BEAB524FDDCCF9B10B910619E4EE08801, status: 0 # PENDING ] end
Content (0 B)
State (0 B)
-
Secret shared with 1 key
Encoded secret
6A04A7A2ACEE89167FFA5A0699CC2BCCC1B8B35EDA4496F6BF1C9B446BCDF9799BC492F45CBDB137AE7E3855A1A7872333EBE46816F495D845DDE5BE
Authorized keys
- 00017877BCF4122095926A49489009649603AB129822A19EF9D573B8FD714911ED7F
-
Resolved 000018D6...8801request_funds
[ 1730912040, 1.0e-5, "00000bc0eba2dbce4455b46f5e51afaaba6eb4c7fba1d4e2e6dabd55dc70f9a04d6f", "aa194638d07ddc037b567bc4ddfd140448a7f82ac82379101dc4750c00261abe", "0xda8afe7fbc53ae1e857171a896dd35068ff636ce34351d1e3b29a521c3a21567", "0x2F915feC3824Ee652066ed40F9258686A3C454Ac", 97 ]
Inputs (0)
Contract inputs (0)
Unspent outputs (1)
-
From 00008DB4...5D9EAt 2024-11-06 14:56:09 UTCAmount 0.84072431 UCO
Previous public key
00011D72608FA1756C749D69E3CA11C71ADD6B00A518FE9D931E429DCFDDA840A0CA
Previous signature
3306108A72C44A793D46B647E71A39AEF5BC0332906D2F334B0BE2C066B7908B5F0D31EE23BB24E615E96500EFAAD1316911F76F0366DD686D540632FB71E409
Origin signature
3045022100CB95758C9EAC6A04275A17A5A478BAC9E9A4AD86F830493CA88BDE62171FB8750220213344AE7149BDBFDDAA91094430AAE21FC07B9DA951B7619EDEB3CB9BA304D9
Proof of work
010104AB41291F847A601055AEDD1AF24FF76FA970D6441E2DCA3818A8319B004C96B27B8FEB1DA31A044BA0A4800B4353359735719EBB3A05F98393A9CC599C3FAFD6
Proof of integrity
0097793FEEDA8230C30448AE2FDB24631669DB13715A7987602B39B5C754328362
Coordinator signature
D557C9ECF0909B8E4A3365C3713763B0227DB831DE76EA6CC9034C59DB7D97848F6670AC572A0455ED09CF85EB1D4EAFDFE8794D6ACE02F6093763A40C858104
Validator #1 public key
0001923076BC39A300949685070A2979143FFD0CFDF5BE286915C8D0CE0FE2117B8F
Validator #1 signature
78EE33422E6661F7BE1B84582A78C1A96E11BF626B2E09CCF4C5B66756566FFA28646357361210D6176DE4E803A63AFC13C4EDB2F0F36D5DBB2BD6135195390A
Validator #2 public key
00013F0000490CECA80A76E7199D7B53E23583A16E24EF761384EC642713056C33D7
Validator #2 signature
9B720D3F3AF848A5317B592A39F9E20E92910A2316845E9ABB7631943B082C79C7AB549076D7130C0C09E0682F0EED5EA0CE52EE20E01ED1B1E95FF2F48A5E03