2020-04-07 17:31:48 +00:00
|
|
|
/*
|
|
|
|
This file is part of solidity.
|
|
|
|
|
|
|
|
solidity is free software: you can redistribute it and/or modify
|
|
|
|
it under the terms of the GNU General Public License as published by
|
|
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
solidity is distributed in the hope that it will be useful,
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
GNU General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
|
|
along with solidity. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
2020-07-17 14:54:12 +00:00
|
|
|
// SPDX-License-Identifier: GPL-3.0
|
2020-04-07 17:31:48 +00:00
|
|
|
|
|
|
|
#include <libsolidity/analysis/DeclarationTypeChecker.h>
|
|
|
|
|
|
|
|
#include <libsolidity/analysis/ConstantEvaluator.h>
|
|
|
|
|
|
|
|
#include <libsolidity/ast/TypeProvider.h>
|
|
|
|
|
|
|
|
#include <liblangutil/ErrorReporter.h>
|
|
|
|
|
2020-04-15 09:37:39 +00:00
|
|
|
#include <libsolutil/Algorithms.h>
|
|
|
|
|
2020-04-07 17:31:48 +00:00
|
|
|
#include <boost/range/adaptor/transformed.hpp>
|
|
|
|
|
|
|
|
using namespace std;
|
|
|
|
using namespace solidity::langutil;
|
|
|
|
using namespace solidity::frontend;
|
|
|
|
|
|
|
|
bool DeclarationTypeChecker::visit(ElementaryTypeName const& _typeName)
|
|
|
|
{
|
2020-04-14 14:36:37 +00:00
|
|
|
if (_typeName.annotation().type)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
_typeName.annotation().type = TypeProvider::fromElementaryTypeName(_typeName.typeName());
|
|
|
|
if (_typeName.stateMutability().has_value())
|
2020-04-07 17:31:48 +00:00
|
|
|
{
|
2020-04-14 14:36:37 +00:00
|
|
|
// for non-address types this was already caught by the parser
|
|
|
|
solAssert(_typeName.annotation().type->category() == Type::Category::Address, "");
|
|
|
|
switch (*_typeName.stateMutability())
|
2020-04-07 17:31:48 +00:00
|
|
|
{
|
2020-04-14 14:36:37 +00:00
|
|
|
case StateMutability::Payable:
|
|
|
|
_typeName.annotation().type = TypeProvider::payableAddress();
|
|
|
|
break;
|
|
|
|
case StateMutability::NonPayable:
|
|
|
|
_typeName.annotation().type = TypeProvider::address();
|
|
|
|
break;
|
|
|
|
default:
|
2020-05-20 21:56:25 +00:00
|
|
|
m_errorReporter.typeError(
|
|
|
|
2311_error,
|
2020-04-14 14:36:37 +00:00
|
|
|
_typeName.location(),
|
|
|
|
"Address types can only be payable or non-payable."
|
|
|
|
);
|
|
|
|
break;
|
2020-04-07 17:31:48 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2020-04-14 14:36:37 +00:00
|
|
|
bool DeclarationTypeChecker::visit(StructDefinition const& _struct)
|
|
|
|
{
|
|
|
|
if (_struct.annotation().recursive.has_value())
|
|
|
|
{
|
|
|
|
if (!m_currentStructsSeen.empty() && *_struct.annotation().recursive)
|
|
|
|
m_recursiveStructSeen = true;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (m_currentStructsSeen.count(&_struct))
|
|
|
|
{
|
|
|
|
_struct.annotation().recursive = true;
|
|
|
|
m_recursiveStructSeen = true;
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool previousRecursiveStructSeen = m_recursiveStructSeen;
|
|
|
|
bool hasRecursiveChild = false;
|
|
|
|
|
|
|
|
m_currentStructsSeen.insert(&_struct);
|
|
|
|
|
2020-04-15 09:37:39 +00:00
|
|
|
for (auto const& member: _struct.members())
|
2020-04-14 14:36:37 +00:00
|
|
|
{
|
|
|
|
m_recursiveStructSeen = false;
|
2020-04-15 09:37:39 +00:00
|
|
|
member->accept(*this);
|
|
|
|
solAssert(member->annotation().type, "");
|
|
|
|
solAssert(member->annotation().type->canBeStored(), "Type cannot be used in struct.");
|
2020-04-14 14:36:37 +00:00
|
|
|
if (m_recursiveStructSeen)
|
|
|
|
hasRecursiveChild = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!_struct.annotation().recursive.has_value())
|
|
|
|
_struct.annotation().recursive = hasRecursiveChild;
|
|
|
|
m_recursiveStructSeen = previousRecursiveStructSeen || *_struct.annotation().recursive;
|
|
|
|
m_currentStructsSeen.erase(&_struct);
|
|
|
|
if (m_currentStructsSeen.empty())
|
|
|
|
m_recursiveStructSeen = false;
|
|
|
|
|
2020-04-15 09:37:39 +00:00
|
|
|
// Check direct recursion, fatal error if detected.
|
|
|
|
auto visitor = [&](StructDefinition const& _struct, auto& _cycleDetector, size_t _depth)
|
|
|
|
{
|
|
|
|
if (_depth >= 256)
|
2020-05-21 15:38:47 +00:00
|
|
|
m_errorReporter.fatalDeclarationError(
|
|
|
|
5651_error,
|
|
|
|
_struct.location(),
|
|
|
|
"Struct definition exhausts cyclic dependency validator."
|
|
|
|
);
|
2020-04-15 09:37:39 +00:00
|
|
|
|
|
|
|
for (ASTPointer<VariableDeclaration> const& member: _struct.members())
|
|
|
|
{
|
|
|
|
Type const* memberType = member->annotation().type;
|
2020-06-03 10:38:35 +00:00
|
|
|
|
|
|
|
if (auto arrayType = dynamic_cast<ArrayType const*>(memberType))
|
|
|
|
memberType = arrayType->finalBaseType(true);
|
|
|
|
|
2020-04-15 09:37:39 +00:00
|
|
|
if (auto structType = dynamic_cast<StructType const*>(memberType))
|
|
|
|
if (_cycleDetector.run(structType->structDefinition()))
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
};
|
2020-06-03 10:38:35 +00:00
|
|
|
if (util::CycleDetector<StructDefinition>(visitor).run(_struct))
|
2020-05-20 21:56:25 +00:00
|
|
|
m_errorReporter.fatalTypeError(2046_error, _struct.location(), "Recursive struct definition.");
|
2020-04-15 09:37:39 +00:00
|
|
|
|
2020-04-14 14:36:37 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2020-04-07 17:31:48 +00:00
|
|
|
void DeclarationTypeChecker::endVisit(UserDefinedTypeName const& _typeName)
|
|
|
|
{
|
2020-04-14 14:36:37 +00:00
|
|
|
if (_typeName.annotation().type)
|
|
|
|
return;
|
|
|
|
|
2020-04-07 17:31:48 +00:00
|
|
|
Declaration const* declaration = _typeName.annotation().referencedDeclaration;
|
|
|
|
solAssert(declaration, "");
|
|
|
|
|
|
|
|
if (StructDefinition const* structDef = dynamic_cast<StructDefinition const*>(declaration))
|
2020-04-14 14:36:37 +00:00
|
|
|
{
|
|
|
|
if (!m_insideFunctionType && !m_currentStructsSeen.empty())
|
|
|
|
structDef->accept(*this);
|
2020-04-07 17:31:48 +00:00
|
|
|
_typeName.annotation().type = TypeProvider::structType(*structDef, DataLocation::Storage);
|
2020-04-14 14:36:37 +00:00
|
|
|
}
|
2020-04-07 17:31:48 +00:00
|
|
|
else if (EnumDefinition const* enumDef = dynamic_cast<EnumDefinition const*>(declaration))
|
|
|
|
_typeName.annotation().type = TypeProvider::enumType(*enumDef);
|
|
|
|
else if (ContractDefinition const* contract = dynamic_cast<ContractDefinition const*>(declaration))
|
2020-10-16 15:25:37 +00:00
|
|
|
{
|
|
|
|
if (contract->isLibrary())
|
|
|
|
m_errorReporter.typeError(1130_error, _typeName.location(), "Invalid use of a library name.");
|
2020-04-07 17:31:48 +00:00
|
|
|
_typeName.annotation().type = TypeProvider::contract(*contract);
|
2020-10-16 15:25:37 +00:00
|
|
|
}
|
2020-04-07 17:31:48 +00:00
|
|
|
else
|
|
|
|
{
|
|
|
|
_typeName.annotation().type = TypeProvider::emptyTuple();
|
2020-05-21 15:38:47 +00:00
|
|
|
m_errorReporter.fatalTypeError(
|
2020-05-26 12:37:31 +00:00
|
|
|
5172_error,
|
2020-05-21 15:38:47 +00:00
|
|
|
_typeName.location(),
|
|
|
|
"Name has to refer to a struct, enum or contract."
|
|
|
|
);
|
2020-04-07 17:31:48 +00:00
|
|
|
}
|
|
|
|
}
|
2020-05-21 15:38:47 +00:00
|
|
|
|
2020-04-14 14:36:37 +00:00
|
|
|
bool DeclarationTypeChecker::visit(FunctionTypeName const& _typeName)
|
2020-04-07 17:31:48 +00:00
|
|
|
{
|
2020-04-14 14:36:37 +00:00
|
|
|
if (_typeName.annotation().type)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
bool previousInsideFunctionType = m_insideFunctionType;
|
|
|
|
m_insideFunctionType = true;
|
|
|
|
_typeName.parameterTypeList()->accept(*this);
|
|
|
|
_typeName.returnParameterTypeList()->accept(*this);
|
|
|
|
m_insideFunctionType = previousInsideFunctionType;
|
|
|
|
|
2020-04-07 17:31:48 +00:00
|
|
|
switch (_typeName.visibility())
|
|
|
|
{
|
|
|
|
case Visibility::Internal:
|
|
|
|
case Visibility::External:
|
|
|
|
break;
|
|
|
|
default:
|
2020-05-21 15:38:47 +00:00
|
|
|
m_errorReporter.fatalTypeError(
|
2020-05-26 12:37:31 +00:00
|
|
|
6012_error,
|
2020-05-21 15:38:47 +00:00
|
|
|
_typeName.location(),
|
|
|
|
"Invalid visibility, can only be \"external\" or \"internal\"."
|
|
|
|
);
|
2020-04-14 14:36:37 +00:00
|
|
|
return false;
|
2020-04-07 17:31:48 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (_typeName.isPayable() && _typeName.visibility() != Visibility::External)
|
|
|
|
{
|
2020-05-21 15:38:47 +00:00
|
|
|
m_errorReporter.fatalTypeError(
|
2020-05-26 12:37:31 +00:00
|
|
|
7415_error,
|
2020-05-21 15:38:47 +00:00
|
|
|
_typeName.location(),
|
|
|
|
"Only external function types can be payable."
|
|
|
|
);
|
2020-04-14 14:36:37 +00:00
|
|
|
return false;
|
2020-04-07 17:31:48 +00:00
|
|
|
}
|
|
|
|
_typeName.annotation().type = TypeProvider::function(_typeName);
|
2020-04-14 14:36:37 +00:00
|
|
|
return false;
|
2020-04-07 17:31:48 +00:00
|
|
|
}
|
2020-05-21 15:38:47 +00:00
|
|
|
|
2020-04-07 17:31:48 +00:00
|
|
|
void DeclarationTypeChecker::endVisit(Mapping const& _mapping)
|
|
|
|
{
|
2020-04-14 14:36:37 +00:00
|
|
|
if (_mapping.annotation().type)
|
|
|
|
return;
|
|
|
|
|
2020-04-07 17:31:48 +00:00
|
|
|
if (auto const* typeName = dynamic_cast<UserDefinedTypeName const*>(&_mapping.keyType()))
|
2020-10-16 15:25:37 +00:00
|
|
|
switch (typeName->annotation().type->category())
|
2020-04-07 17:31:48 +00:00
|
|
|
{
|
2020-10-16 15:25:37 +00:00
|
|
|
case Type::Category::Enum:
|
|
|
|
case Type::Category::Contract:
|
|
|
|
break;
|
|
|
|
default:
|
2020-04-07 17:31:48 +00:00
|
|
|
m_errorReporter.fatalTypeError(
|
2020-10-16 15:25:37 +00:00
|
|
|
7804_error,
|
2020-04-07 17:31:48 +00:00
|
|
|
typeName->location(),
|
2020-10-16 15:25:37 +00:00
|
|
|
"Only elementary types, contract types or enums are allowed as mapping keys."
|
2020-04-07 17:31:48 +00:00
|
|
|
);
|
2020-10-16 15:25:37 +00:00
|
|
|
break;
|
2020-04-07 17:31:48 +00:00
|
|
|
}
|
|
|
|
else
|
|
|
|
solAssert(dynamic_cast<ElementaryTypeName const*>(&_mapping.keyType()), "");
|
|
|
|
|
|
|
|
TypePointer keyType = _mapping.keyType().annotation().type;
|
|
|
|
TypePointer valueType = _mapping.valueType().annotation().type;
|
|
|
|
|
|
|
|
// Convert key type to memory.
|
|
|
|
keyType = TypeProvider::withLocationIfReference(DataLocation::Memory, keyType);
|
|
|
|
|
|
|
|
// Convert value type to storage reference.
|
|
|
|
valueType = TypeProvider::withLocationIfReference(DataLocation::Storage, valueType);
|
|
|
|
_mapping.annotation().type = TypeProvider::mapping(keyType, valueType);
|
|
|
|
}
|
|
|
|
|
|
|
|
void DeclarationTypeChecker::endVisit(ArrayTypeName const& _typeName)
|
|
|
|
{
|
2020-04-14 14:36:37 +00:00
|
|
|
if (_typeName.annotation().type)
|
|
|
|
return;
|
|
|
|
|
2020-04-07 17:31:48 +00:00
|
|
|
TypePointer baseType = _typeName.baseType().annotation().type;
|
|
|
|
if (!baseType)
|
|
|
|
{
|
|
|
|
solAssert(!m_errorReporter.errors().empty(), "");
|
|
|
|
return;
|
|
|
|
}
|
2020-10-16 15:25:37 +00:00
|
|
|
|
2020-07-27 18:31:51 +00:00
|
|
|
solAssert(baseType->storageBytes() != 0, "Illegal base type of storage size zero for array.");
|
2020-04-07 17:31:48 +00:00
|
|
|
if (Expression const* length = _typeName.length())
|
|
|
|
{
|
|
|
|
TypePointer& lengthTypeGeneric = length->annotation().type;
|
|
|
|
if (!lengthTypeGeneric)
|
|
|
|
lengthTypeGeneric = ConstantEvaluator(m_errorReporter).evaluate(*length);
|
|
|
|
RationalNumberType const* lengthType = dynamic_cast<RationalNumberType const*>(lengthTypeGeneric);
|
|
|
|
u256 lengthValue = 0;
|
|
|
|
if (!lengthType || !lengthType->mobileType())
|
2020-05-21 15:38:47 +00:00
|
|
|
m_errorReporter.typeError(
|
2020-05-26 12:37:31 +00:00
|
|
|
5462_error,
|
2020-05-21 15:38:47 +00:00
|
|
|
length->location(),
|
|
|
|
"Invalid array length, expected integer literal or constant expression."
|
|
|
|
);
|
2020-04-07 17:31:48 +00:00
|
|
|
else if (lengthType->isZero())
|
2020-05-26 12:37:31 +00:00
|
|
|
m_errorReporter.typeError(1406_error, length->location(), "Array with zero length specified.");
|
2020-04-07 17:31:48 +00:00
|
|
|
else if (lengthType->isFractional())
|
2020-05-26 12:37:31 +00:00
|
|
|
m_errorReporter.typeError(3208_error, length->location(), "Array with fractional length specified.");
|
2020-04-07 17:31:48 +00:00
|
|
|
else if (lengthType->isNegative())
|
2020-05-26 12:37:31 +00:00
|
|
|
m_errorReporter.typeError(3658_error, length->location(), "Array with negative length specified.");
|
2020-04-07 17:31:48 +00:00
|
|
|
else
|
|
|
|
lengthValue = lengthType->literalValue(nullptr);
|
|
|
|
_typeName.annotation().type = TypeProvider::array(DataLocation::Storage, baseType, lengthValue);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
_typeName.annotation().type = TypeProvider::array(DataLocation::Storage, baseType);
|
|
|
|
}
|
2020-05-21 15:38:47 +00:00
|
|
|
|
2020-04-07 17:31:48 +00:00
|
|
|
void DeclarationTypeChecker::endVisit(VariableDeclaration const& _variable)
|
|
|
|
{
|
|
|
|
if (_variable.annotation().type)
|
|
|
|
return;
|
|
|
|
|
2020-09-25 10:15:31 +00:00
|
|
|
if (_variable.isFileLevelVariable() && !_variable.isConstant())
|
|
|
|
m_errorReporter.declarationError(
|
|
|
|
8342_error,
|
|
|
|
_variable.location(),
|
|
|
|
"Only constant variables are allowed at file level."
|
|
|
|
);
|
|
|
|
if (_variable.isConstant() && (!_variable.isStateVariable() && !_variable.isFileLevelVariable()))
|
2020-05-21 15:38:47 +00:00
|
|
|
m_errorReporter.declarationError(
|
|
|
|
1788_error,
|
|
|
|
_variable.location(),
|
2020-09-25 10:15:31 +00:00
|
|
|
"The \"constant\" keyword can only be used for state variables or variables at file level."
|
2020-05-21 15:38:47 +00:00
|
|
|
);
|
2020-04-07 17:31:48 +00:00
|
|
|
if (_variable.immutable() && !_variable.isStateVariable())
|
2020-05-21 15:38:47 +00:00
|
|
|
m_errorReporter.declarationError(
|
|
|
|
8297_error,
|
|
|
|
_variable.location(),
|
|
|
|
"The \"immutable\" keyword can only be used for state variables."
|
|
|
|
);
|
2020-04-07 17:31:48 +00:00
|
|
|
|
|
|
|
using Location = VariableDeclaration::Location;
|
|
|
|
Location varLoc = _variable.referenceLocation();
|
|
|
|
DataLocation typeLoc = DataLocation::Memory;
|
|
|
|
|
|
|
|
set<Location> allowedDataLocations = _variable.allowedDataLocations();
|
|
|
|
if (!allowedDataLocations.count(varLoc))
|
|
|
|
{
|
|
|
|
auto locationToString = [](VariableDeclaration::Location _location) -> string
|
|
|
|
{
|
|
|
|
switch (_location)
|
|
|
|
{
|
|
|
|
case Location::Memory: return "\"memory\"";
|
|
|
|
case Location::Storage: return "\"storage\"";
|
|
|
|
case Location::CallData: return "\"calldata\"";
|
|
|
|
case Location::Unspecified: return "none";
|
|
|
|
}
|
|
|
|
return {};
|
|
|
|
};
|
|
|
|
|
|
|
|
string errorString;
|
|
|
|
if (!_variable.hasReferenceOrMappingType())
|
|
|
|
errorString = "Data location can only be specified for array, struct or mapping types";
|
|
|
|
else
|
|
|
|
{
|
|
|
|
errorString = "Data location must be " +
|
|
|
|
util::joinHumanReadable(
|
|
|
|
allowedDataLocations | boost::adaptors::transformed(locationToString),
|
|
|
|
", ",
|
|
|
|
" or "
|
|
|
|
);
|
2020-07-27 10:33:03 +00:00
|
|
|
if (_variable.isConstructorParameter())
|
|
|
|
errorString += " for constructor parameter";
|
|
|
|
else if (_variable.isCallableOrCatchParameter())
|
2020-04-07 17:31:48 +00:00
|
|
|
errorString +=
|
|
|
|
" for " +
|
|
|
|
string(_variable.isReturnParameter() ? "return " : "") +
|
|
|
|
"parameter in" +
|
|
|
|
string(_variable.isExternalCallableParameter() ? " external" : "") +
|
|
|
|
" function";
|
|
|
|
else
|
|
|
|
errorString += " for variable";
|
|
|
|
}
|
|
|
|
errorString += ", but " + locationToString(varLoc) + " was given.";
|
2020-05-26 12:37:31 +00:00
|
|
|
m_errorReporter.typeError(6651_error, _variable.location(), errorString);
|
2020-04-07 17:31:48 +00:00
|
|
|
|
|
|
|
solAssert(!allowedDataLocations.empty(), "");
|
|
|
|
varLoc = *allowedDataLocations.begin();
|
|
|
|
}
|
|
|
|
|
|
|
|
// Find correct data location.
|
|
|
|
if (_variable.isEventParameter())
|
|
|
|
{
|
|
|
|
solAssert(varLoc == Location::Unspecified, "");
|
|
|
|
typeLoc = DataLocation::Memory;
|
|
|
|
}
|
2020-09-25 10:15:31 +00:00
|
|
|
else if (_variable.isFileLevelVariable())
|
|
|
|
{
|
|
|
|
solAssert(varLoc == Location::Unspecified, "");
|
|
|
|
typeLoc = DataLocation::Memory;
|
|
|
|
}
|
2020-04-07 17:31:48 +00:00
|
|
|
else if (_variable.isStateVariable())
|
|
|
|
{
|
|
|
|
solAssert(varLoc == Location::Unspecified, "");
|
|
|
|
typeLoc = (_variable.isConstant() || _variable.immutable()) ? DataLocation::Memory : DataLocation::Storage;
|
|
|
|
}
|
|
|
|
else if (
|
|
|
|
dynamic_cast<StructDefinition const*>(_variable.scope()) ||
|
|
|
|
dynamic_cast<EnumDefinition const*>(_variable.scope())
|
|
|
|
)
|
|
|
|
// The actual location will later be changed depending on how the type is used.
|
|
|
|
typeLoc = DataLocation::Storage;
|
|
|
|
else
|
|
|
|
switch (varLoc)
|
|
|
|
{
|
|
|
|
case Location::Memory:
|
|
|
|
typeLoc = DataLocation::Memory;
|
|
|
|
break;
|
|
|
|
case Location::Storage:
|
|
|
|
typeLoc = DataLocation::Storage;
|
|
|
|
break;
|
|
|
|
case Location::CallData:
|
|
|
|
typeLoc = DataLocation::CallData;
|
|
|
|
break;
|
|
|
|
case Location::Unspecified:
|
|
|
|
solAssert(!_variable.hasReferenceOrMappingType(), "Data location not properly set.");
|
|
|
|
}
|
|
|
|
|
2020-07-15 17:50:59 +00:00
|
|
|
TypePointer type = _variable.typeName().annotation().type;
|
2020-04-07 17:31:48 +00:00
|
|
|
if (auto ref = dynamic_cast<ReferenceType const*>(type))
|
|
|
|
{
|
|
|
|
bool isPointer = !_variable.isStateVariable();
|
|
|
|
type = TypeProvider::withLocation(ref, typeLoc, isPointer);
|
|
|
|
}
|
|
|
|
|
|
|
|
_variable.annotation().type = type;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2020-10-16 15:25:37 +00:00
|
|
|
bool DeclarationTypeChecker::visit(UsingForDirective const& _usingFor)
|
2020-06-17 15:44:48 +00:00
|
|
|
{
|
|
|
|
ContractDefinition const* library = dynamic_cast<ContractDefinition const*>(
|
|
|
|
_usingFor.libraryName().annotation().referencedDeclaration
|
|
|
|
);
|
2020-10-16 15:25:37 +00:00
|
|
|
|
2020-06-17 15:44:48 +00:00
|
|
|
if (!library || !library->isLibrary())
|
|
|
|
m_errorReporter.fatalTypeError(4357_error, _usingFor.libraryName().location(), "Library name expected.");
|
2020-10-16 15:25:37 +00:00
|
|
|
|
|
|
|
_usingFor.libraryName().annotation().type = TypeProvider::contract(*library);
|
|
|
|
if (_usingFor.typeName())
|
|
|
|
_usingFor.typeName()->accept(*this);
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool DeclarationTypeChecker::visit(InheritanceSpecifier const& _inheritanceSpecifier)
|
|
|
|
{
|
|
|
|
auto const* contract = dynamic_cast<ContractDefinition const*>(_inheritanceSpecifier.name().annotation().referencedDeclaration);
|
|
|
|
solAssert(contract, "");
|
|
|
|
if (contract->isLibrary())
|
|
|
|
{
|
|
|
|
m_errorReporter.typeError(
|
|
|
|
2571_error,
|
|
|
|
_inheritanceSpecifier.name().location(),
|
|
|
|
"Libraries cannot be inherited from."
|
|
|
|
);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
return true;
|
2020-06-17 15:44:48 +00:00
|
|
|
}
|
|
|
|
|
2020-04-07 17:31:48 +00:00
|
|
|
bool DeclarationTypeChecker::check(ASTNode const& _node)
|
|
|
|
{
|
2020-05-20 21:56:25 +00:00
|
|
|
auto watcher = m_errorReporter.errorWatcher();
|
2020-04-07 17:31:48 +00:00
|
|
|
_node.accept(*this);
|
2020-05-20 21:56:25 +00:00
|
|
|
return watcher.ok();
|
2020-04-07 17:31:48 +00:00
|
|
|
}
|