tx · BKYcJb2hULXQrJwYvm5SCsetNEixGvZWWMFRceeamERy 3N9J3wuPH3fe1vTsLwJSticprdzZWXzZtMb: -0.01000000 Waves 2022.05.10 15:00 [2045543] smart account 3N9J3wuPH3fe1vTsLwJSticprdzZWXzZtMb > SELF 0.00000000 Waves
{ "type": 13, "id": "BKYcJb2hULXQrJwYvm5SCsetNEixGvZWWMFRceeamERy", "fee": 1000000, "feeAssetId": null, "timestamp": 1652184017198, "version": 2, "chainId": 84, "sender": "3N9J3wuPH3fe1vTsLwJSticprdzZWXzZtMb", "senderPublicKey": "6YTEFQ5JhfL8TsLSjyXNG4TVYq2Jmu3nkmXvxD1Nj5mn", "proofs": [ "2WoxqWEEuzNuA3THo3uT4Y21XNiJ7YBitLgfxGrhnif4X5jfZiWtK6vYbTKua4NtCMv3pXAqy1BbxPekUvs62qX8" ], "script": "base64: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", "height": 2045543, "applicationStatus": "succeeded", "spentComplexity": 0 } View: original | compacted Prev: DQnU6HUeVHycVnwQhHCT6nFvBnfDsbymq5jffsRRhmte Next: 9PRY8NtqmKyvqp7prE1fzSwiumYzyLExDVKHx2kqEhsa Full:
Old | New | Differences | |
---|---|---|---|
1 | 1 | {-# STDLIB_VERSION 5 #-} | |
2 | 2 | {-# SCRIPT_TYPE ACCOUNT #-} | |
3 | 3 | {-# CONTENT_TYPE DAPP #-} | |
4 | 4 | let keyLockRecipient = "_lr" | |
5 | 5 | ||
6 | 6 | let keyLockAmount = "_la" | |
7 | 7 | ||
8 | 8 | let keyLockDestination = "_ld" | |
9 | 9 | ||
10 | 10 | let keyLockAssetSource = "_las" | |
11 | 11 | ||
12 | 12 | let keyVersion = "_v" | |
13 | 13 | ||
14 | 14 | let keyBridge = "_b" | |
15 | 15 | ||
16 | 16 | let keyOracle = "_o" | |
17 | 17 | ||
18 | 18 | let keyAdmin = "_a" | |
19 | 19 | ||
20 | 20 | let keyUnlock = "_u" | |
21 | 21 | ||
22 | 22 | let errUnauthorized = "unauthorized" | |
23 | 23 | ||
24 | 24 | let errUninitialized = "uninitialized" | |
25 | 25 | ||
26 | 26 | let errInvalidSignature = "invalid signature" | |
27 | 27 | ||
28 | 28 | let errAlreadyClaimed = "claimed" | |
29 | 29 | ||
30 | 30 | let errAlreadyLocked = "locked" | |
31 | 31 | ||
32 | 32 | let errBridgeOnly = "not bridge" | |
33 | 33 | ||
34 | 34 | let errInvalidLockId = "invalid lockId" | |
35 | 35 | ||
36 | 36 | let chainWaves = "V0FWRQ==" | |
37 | 37 | ||
38 | 38 | func invalidCaller (i,key) = match getBinary(key) { | |
39 | 39 | case authority: ByteVector => | |
40 | 40 | (authority != i.caller.bytes) | |
41 | 41 | case _ => | |
42 | 42 | false | |
43 | 43 | } | |
44 | 44 | ||
45 | 45 | ||
46 | 46 | func assertCallerIsBridge (i) = if (invalidCaller(i, keyBridge)) | |
47 | 47 | then throw(errBridgeOnly) | |
48 | 48 | else unit | |
49 | 49 | ||
50 | 50 | ||
51 | 51 | func assertValidLockId (lockId) = { | |
52 | 52 | let version = valueOrErrorMessage(getBinary(keyVersion), errUninitialized) | |
53 | 53 | if (if ((size(lockId) != 16)) | |
54 | 54 | then true | |
55 | 55 | else (take(lockId, 1) != version)) | |
56 | 56 | then throw(errInvalidLockId) | |
57 | 57 | else unit | |
58 | 58 | } | |
59 | 59 | ||
60 | 60 | ||
61 | 61 | func assertLockNotExists (lockRecipientKey) = match getBinary(lockRecipientKey) { | |
62 | 62 | case t: ByteVector => | |
63 | 63 | throw(errAlreadyLocked) | |
64 | 64 | case _ => | |
65 | 65 | unit | |
66 | 66 | } | |
67 | 67 | ||
68 | 68 | ||
69 | 69 | @Callable(i) | |
70 | 70 | func setAdmin (newAdmin) = if (invalidCaller(i, keyAdmin)) | |
71 | 71 | then throw(errUnauthorized) | |
72 | 72 | else [BinaryEntry(keyAdmin, newAdmin)] | |
73 | 73 | ||
74 | 74 | ||
75 | 75 | ||
76 | 76 | @Callable(i) | |
77 | 77 | func setConfig (version,bridge,oracle) = if (invalidCaller(i, keyAdmin)) | |
78 | 78 | then throw(errUnauthorized) | |
79 | 79 | else [BinaryEntry(keyVersion, version), BinaryEntry(keyBridge, bridge), BinaryEntry(keyOracle, oracle)] | |
80 | 80 | ||
81 | 81 | ||
82 | 82 | ||
83 | 83 | @Callable(i) | |
84 | 84 | func createUnlock (lockId,recipient,amount,lockSource,tokenSourceAndAddress,signature) = { | |
85 | 85 | let checkLockId = assertValidLockId(lockId) | |
86 | 86 | if ((checkLockId == checkLockId)) | |
87 | 87 | then { | |
88 | 88 | let checkCaller = assertCallerIsBridge(i) | |
89 | 89 | if ((checkCaller == checkCaller)) | |
90 | 90 | then { | |
91 | 91 | let lockIdStr = toBase64String(lockId) | |
92 | 92 | let lockSourceStr = toBase64String(lockSource) | |
93 | 93 | let unlockKey = (((lockSourceStr + "_") + lockIdStr) + keyUnlock) | |
94 | 94 | if (isDefined(getBoolean(unlockKey))) | |
95 | 95 | then throw(errAlreadyClaimed) | |
96 | 96 | else { | |
97 | 97 | let message = makeString([toBase64String(lockId), toBase64String(recipient), toString(amount), toBase64String(lockSource), toBase64String(tokenSourceAndAddress), chainWaves], "_") | |
98 | 98 | let hash = keccak256(toBytes(message)) | |
99 | 99 | let recoveredKey = ecrecover(hash, signature) | |
100 | 100 | if ((recoveredKey != getBinaryValue(keyOracle))) | |
101 | 101 | then throw(errInvalidSignature) | |
102 | 102 | else $Tuple2([BooleanEntry(unlockKey, true)], true) | |
103 | 103 | } | |
104 | 104 | } | |
105 | 105 | else throw("Strict value is not equal to itself.") | |
106 | 106 | } | |
107 | 107 | else throw("Strict value is not equal to itself.") | |
108 | 108 | } | |
109 | 109 | ||
110 | 110 | ||
111 | 111 | ||
112 | 112 | @Callable(i) | |
113 | 113 | func createLock (lockId,recipient,amount,lockDestination,tokenSourceAndAddress) = { | |
114 | 114 | let lockIdStr = toBase64String(lockId) | |
115 | 115 | let lockRecipientKey = (lockIdStr + keyLockRecipient) | |
116 | 116 | let checkCaller = assertCallerIsBridge(i) | |
117 | 117 | if ((checkCaller == checkCaller)) | |
118 | 118 | then { | |
119 | 119 | let checkLockId = assertValidLockId(lockId) | |
120 | 120 | if ((checkLockId == checkLockId)) | |
121 | 121 | then { | |
122 | 122 | let checkLock = assertLockNotExists(lockRecipientKey) | |
123 | 123 | if ((checkLock == checkLock)) | |
124 | 124 | then [BinaryEntry((lockIdStr + keyLockRecipient), recipient), IntegerEntry((lockIdStr + keyLockAmount), amount), BinaryEntry((lockIdStr + keyLockDestination), lockDestination), BinaryEntry((lockIdStr + keyLockAssetSource), tokenSourceAndAddress)] | |
125 | 125 | else throw("Strict value is not equal to itself.") | |
126 | 126 | } | |
127 | 127 | else throw("Strict value is not equal to itself.") | |
128 | 128 | } | |
129 | 129 | else throw("Strict value is not equal to itself.") | |
130 | 130 | } | |
131 | 131 | ||
132 | 132 |
github/deemru/w8io/c3f4982 25.76 ms ◑