@version 1 condition triggered_by: transaction, on: refund(), as: [ content: ( valid? = false abi_data = Evm.abi_encode("status()") tx = [to: "0x36c0D4675682F307f03329e7eC57833e2D4467fe", data: "0x#{abi_data}"] request = [jsonrpc: "2.0", id: "1", method: "eth_call", params: [tx, "latest"]] headers = ["Content-Type": "application/json"] body = Json.to_string(request) evm_responses = query_evm_apis(["https://polygon-mainnet.infura.io/v3/3a7a2dbdbec046a4961550ddf8c7d78a","https://polygon-mainnet.g.alchemy.com/v2/0aM2uAp3J-LsOlijDBZ3aZiCUvZdjiHb"], "POST", headers, body) for res in evm_responses do if !valid? && res.status == 200 && Json.is_valid?(res.body) do response = Json.parse(res.body) result = Map.get(response, "result") if result != nil do decoded_abi = Evm.abi_decode("(uint)", result) # Refund status is 2 valid? = List.at(decoded_abi, 0) == 2 end end end valid? ) ] actions triggered_by: transaction, on: refund() do Contract.set_type "transfer" # Burn the non withdrawed tokens Contract.add_token_transfer to: 0x00000000000000000000000000000000000000000000000000000000000000000000, amount: 0.0561666, token_address: 0x0000457EACA7FBAA96DB4A8D506A0B69684F546166FBF3C55391B1461907EFA58EAF Contract.set_code """ @version 1 export fun info() do [ evm_contract: 0x36c0D4675682F307f03329e7eC57833e2D4467fe, evm_pool: 0xbc6df50b5c5dd12c93c2b98828befdd8095388ca, ae_pool: 0x0000EC74226E85766FE5ADE9FFEA53D453F569799142F9FF248DCF532CEBFF4B3D32, status: 2 # REFUNDED ] end """ end condition triggered_by: transaction, on: reveal_secret(secret), as: [ content: Crypto.hash(String.to_hex(secret)) == 0xBD0453A0E966350451C9E6D3E476E5C0260582FE1293970FADBFCE5EA35B86CC, address: ( valid? = false abi_data = Evm.abi_encode("status()") tx = [to: "0x36c0D4675682F307f03329e7eC57833e2D4467fe", data: "0x#{abi_data}"] request = [jsonrpc: "2.0", id: "1", method: "eth_call", params: [tx, "latest"]] headers = ["Content-Type": "application/json"] body = Json.to_string(request) responses = query_evm_apis(["https://polygon-mainnet.infura.io/v3/3a7a2dbdbec046a4961550ddf8c7d78a","https://polygon-mainnet.g.alchemy.com/v2/0aM2uAp3J-LsOlijDBZ3aZiCUvZdjiHb"], "POST", headers, body) for res in responses do if !valid? && res.status == 200 && Json.is_valid?(res.body) do response = Json.parse(res.body) result = Map.get(response, "result") if result != nil do decoded_abi = Evm.abi_decode("(uint)", result) # Withdrawn status is 1 valid? = List.at(decoded_abi, 0) == 1 end end end valid? ) ] actions triggered_by: transaction, on: reveal_secret(secret) do Contract.set_type "transfer" Contract.add_token_transfer to: 0x00009E5EE80B7C5103AA4DB54611751B3E86D29BCC69561F86B44337FC92078B85B2, amount: 0.0561666, token_address: 0x0000457EACA7FBAA96DB4A8D506A0B69684F546166FBF3C55391B1461907EFA58EAF Contract.set_code """ @version 1 export fun info() do [ evm_contract: 0x36c0D4675682F307f03329e7eC57833e2D4467fe, evm_pool: 0xbc6df50b5c5dd12c93c2b98828befdd8095388ca, ae_pool: 0x0000EC74226E85766FE5ADE9FFEA53D453F569799142F9FF248DCF532CEBFF4B3D32, status: 1 # WITHDRAWN ] end """ end fun query_evm_apis(endpoints, method, headers, body) do requests = [] for endpoint in endpoints do requests = List.append(requests, url: endpoint, method: method, headers: headers, body: body) end Http.request_many(requests, false) end export fun get_provision_signature() do [ r: 0xD3A461EF2EABBC8CA109741DD02C206B6721ABCD841E9315DCCCA51EC51BD3BB, s: 0x3266FE5F95D08B2CDF12C5F6AF0FD0B28C0F41A8C418B557D22AD3D514B6C0AA, v: 28 ] end export fun info() do [ evm_contract: 0x36c0D4675682F307f03329e7eC57833e2D4467fe, evm_pool: 0xbc6df50b5c5dd12c93c2b98828befdd8095388ca, ae_pool: 0x0000EC74226E85766FE5ADE9FFEA53D453F569799142F9FF248DCF532CEBFF4B3D32, status: 0 # PENDING ] end
Content (0 B)
State (0 B)
-
Secret shared with 1 key
Encoded secret
3F7A5F42F8A80519F2C6565AFE2C30094214644A23616BA80EF231457D85B6AB35393244412DD86AF47C9E49BDF6A0C6B5F61CC07DD42901C1C81865
Authorized keys
- 000122A6CD9ED07E46835D6E88E5BD0BEE84C3F5E5DBF8E916AD9B2EC912C44AFEC2
Contract recipients (0)
Inputs (0)
Contract inputs (0)
Unspent outputs (0)
Previous public key
00011A7202641B328E06F382026BE4744CD6F2EAC7F125F99E38AF07B60FF307F70A
Previous signature
A3CA6A99532EE7F00E8921329CC785402D8ADE7132EAEA545972F68DFE5C0F255F8B56683369F436086BDE039247001448496E6DE0FE535FA368247E1806D409
Origin signature
3045022100E92FAAFEF6050583AC0DBBC6A0B5C2FE5D09B626F898ED34959EB69FF7743A7F02200F413411551DF52CB4BA93A53B0C434A2776F4C73A853747309754005A758E61
Proof of work
0102040D124FAC452044BFB96457964701F243EF5E0CB79CE710AEC9A910CC29252B1953B09F0E41D9777CBCBDA7DDCE36F79B13D5DC0DECC2CD21C9A640CFBA16B4B3
Proof of integrity
00686164801459CA50B9C434F60A08D96739BDFA86C6DD22E4901A102D08EA8B33
Coordinator signature
B7ED28D042584DC218A73D51C8E0FC9F45B95F64B766972D44A3AF22BFDBBA2D131C71DB9648943DB48EE566DCA537A0D3E820D8FE8EF9902560608AA93C6003
Validator #1 public key
00011518CD02E2B0009F828843512538A3F44A9CB493EB5E288376E4E45AD727AB3E
Validator #1 signature
34408BBA7C5B89D4F24E33833468BB169B3B75C99BD920ECAB9531664CFAE135AA6850167DAA7F5F7C90063DEF70BFDB83B5FA76C4C9ACED6FB9F5ADB45C8806