tx · BKYcJb2hULXQrJwYvm5SCsetNEixGvZWWMFRceeamERy

3N9J3wuPH3fe1vTsLwJSticprdzZWXzZtMb:  -0.01000000 Waves

2022.05.10 15:00 [2045543] smart account 3N9J3wuPH3fe1vTsLwJSticprdzZWXzZtMb > SELF 0.00000000 Waves

{ "type": 13, "id": "BKYcJb2hULXQrJwYvm5SCsetNEixGvZWWMFRceeamERy", "fee": 1000000, "feeAssetId": null, "timestamp": 1652184017198, "version": 2, "chainId": 84, "sender": "3N9J3wuPH3fe1vTsLwJSticprdzZWXzZtMb", "senderPublicKey": "6YTEFQ5JhfL8TsLSjyXNG4TVYq2Jmu3nkmXvxD1Nj5mn", "proofs": [ "2WoxqWEEuzNuA3THo3uT4Y21XNiJ7YBitLgfxGrhnif4X5jfZiWtK6vYbTKua4NtCMv3pXAqy1BbxPekUvs62qX8" ], "script": "base64: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", "height": 2045543, "applicationStatus": "succeeded", "spentComplexity": 0 } View: original | compacted Prev: DQnU6HUeVHycVnwQhHCT6nFvBnfDsbymq5jffsRRhmte Next: 9PRY8NtqmKyvqp7prE1fzSwiumYzyLExDVKHx2kqEhsa Full:
OldNewDifferences
11 {-# STDLIB_VERSION 5 #-}
22 {-# SCRIPT_TYPE ACCOUNT #-}
33 {-# CONTENT_TYPE DAPP #-}
44 let keyLockRecipient = "_lr"
55
66 let keyLockAmount = "_la"
77
88 let keyLockDestination = "_ld"
99
1010 let keyLockAssetSource = "_las"
1111
1212 let keyVersion = "_v"
1313
1414 let keyBridge = "_b"
1515
1616 let keyOracle = "_o"
1717
1818 let keyAdmin = "_a"
1919
2020 let keyUnlock = "_u"
2121
2222 let errUnauthorized = "unauthorized"
2323
2424 let errUninitialized = "uninitialized"
2525
2626 let errInvalidSignature = "invalid signature"
2727
2828 let errAlreadyClaimed = "claimed"
2929
3030 let errAlreadyLocked = "locked"
3131
3232 let errBridgeOnly = "not bridge"
3333
3434 let errInvalidLockId = "invalid lockId"
3535
3636 let chainWaves = "V0FWRQ=="
3737
3838 func invalidCaller (i,key) = match getBinary(key) {
3939 case authority: ByteVector =>
4040 (authority != i.caller.bytes)
4141 case _ =>
4242 false
4343 }
4444
4545
4646 func assertCallerIsBridge (i) = if (invalidCaller(i, keyBridge))
4747 then throw(errBridgeOnly)
4848 else unit
4949
5050
5151 func assertValidLockId (lockId) = {
5252 let version = valueOrErrorMessage(getBinary(keyVersion), errUninitialized)
5353 if (if ((size(lockId) != 16))
5454 then true
5555 else (take(lockId, 1) != version))
5656 then throw(errInvalidLockId)
5757 else unit
5858 }
5959
6060
6161 func assertLockNotExists (lockRecipientKey) = match getBinary(lockRecipientKey) {
6262 case t: ByteVector =>
6363 throw(errAlreadyLocked)
6464 case _ =>
6565 unit
6666 }
6767
6868
6969 @Callable(i)
7070 func setAdmin (newAdmin) = if (invalidCaller(i, keyAdmin))
7171 then throw(errUnauthorized)
7272 else [BinaryEntry(keyAdmin, newAdmin)]
7373
7474
7575
7676 @Callable(i)
7777 func setConfig (version,bridge,oracle) = if (invalidCaller(i, keyAdmin))
7878 then throw(errUnauthorized)
7979 else [BinaryEntry(keyVersion, version), BinaryEntry(keyBridge, bridge), BinaryEntry(keyOracle, oracle)]
8080
8181
8282
8383 @Callable(i)
8484 func createUnlock (lockId,recipient,amount,lockSource,tokenSourceAndAddress,signature) = {
8585 let checkLockId = assertValidLockId(lockId)
8686 if ((checkLockId == checkLockId))
8787 then {
8888 let checkCaller = assertCallerIsBridge(i)
8989 if ((checkCaller == checkCaller))
9090 then {
9191 let lockIdStr = toBase64String(lockId)
9292 let lockSourceStr = toBase64String(lockSource)
9393 let unlockKey = (((lockSourceStr + "_") + lockIdStr) + keyUnlock)
9494 if (isDefined(getBoolean(unlockKey)))
9595 then throw(errAlreadyClaimed)
9696 else {
9797 let message = makeString([toBase64String(lockId), toBase64String(recipient), toString(amount), toBase64String(lockSource), toBase64String(tokenSourceAndAddress), chainWaves], "_")
9898 let hash = keccak256(toBytes(message))
9999 let recoveredKey = ecrecover(hash, signature)
100100 if ((recoveredKey != getBinaryValue(keyOracle)))
101101 then throw(errInvalidSignature)
102102 else $Tuple2([BooleanEntry(unlockKey, true)], true)
103103 }
104104 }
105105 else throw("Strict value is not equal to itself.")
106106 }
107107 else throw("Strict value is not equal to itself.")
108108 }
109109
110110
111111
112112 @Callable(i)
113113 func createLock (lockId,recipient,amount,lockDestination,tokenSourceAndAddress) = {
114114 let lockIdStr = toBase64String(lockId)
115115 let lockRecipientKey = (lockIdStr + keyLockRecipient)
116116 let checkCaller = assertCallerIsBridge(i)
117117 if ((checkCaller == checkCaller))
118118 then {
119119 let checkLockId = assertValidLockId(lockId)
120120 if ((checkLockId == checkLockId))
121121 then {
122122 let checkLock = assertLockNotExists(lockRecipientKey)
123123 if ((checkLock == checkLock))
124124 then [BinaryEntry((lockIdStr + keyLockRecipient), recipient), IntegerEntry((lockIdStr + keyLockAmount), amount), BinaryEntry((lockIdStr + keyLockDestination), lockDestination), BinaryEntry((lockIdStr + keyLockAssetSource), tokenSourceAndAddress)]
125125 else throw("Strict value is not equal to itself.")
126126 }
127127 else throw("Strict value is not equal to itself.")
128128 }
129129 else throw("Strict value is not equal to itself.")
130130 }
131131
132132

github/deemru/w8io/c3f4982 
26.71 ms