solidity/libsolidity/interface/CompilerStack.cpp

1728 lines
56 KiB
C++
Raw Normal View History

/*
This file is part of solidity.
solidity is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.
solidity is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with solidity. If not, see <http://www.gnu.org/licenses/>.
*/
// SPDX-License-Identifier: GPL-3.0
/**
* @author Christian <c@ethdev.com>
2015-01-09 06:39:30 +00:00
* @author Gav Wood <g@ethdev.com>
* @date 2014
* Full-stack compiler that converts a source code string to bytecode.
*/
#include <libsolidity/interface/CompilerStack.h>
#include <libsolidity/analysis/ControlFlowAnalyzer.h>
2018-05-04 13:58:10 +00:00
#include <libsolidity/analysis/ControlFlowGraph.h>
2018-12-17 18:24:42 +00:00
#include <libsolidity/analysis/ContractLevelChecker.h>
2020-04-07 17:31:48 +00:00
#include <libsolidity/analysis/DeclarationTypeChecker.h>
2018-12-17 18:24:42 +00:00
#include <libsolidity/analysis/DocStringAnalyser.h>
2020-06-29 12:30:09 +00:00
#include <libsolidity/analysis/DocStringTagParser.h>
2015-10-20 22:21:52 +00:00
#include <libsolidity/analysis/GlobalContext.h>
#include <libsolidity/analysis/NameAndTypeResolver.h>
#include <libsolidity/analysis/PostTypeChecker.h>
2018-12-17 18:24:42 +00:00
#include <libsolidity/analysis/StaticAnalyzer.h>
#include <libsolidity/analysis/SyntaxChecker.h>
2020-08-06 12:46:04 +00:00
#include <libsolidity/analysis/Scoper.h>
2018-12-17 18:24:42 +00:00
#include <libsolidity/analysis/TypeChecker.h>
2017-08-28 17:48:34 +00:00
#include <libsolidity/analysis/ViewPureChecker.h>
2020-03-10 17:15:50 +00:00
#include <libsolidity/analysis/ImmutableValidator.h>
2018-12-17 18:24:42 +00:00
#include <libsolidity/ast/AST.h>
#include <libsolidity/ast/TypeProvider.h>
2019-09-11 19:16:35 +00:00
#include <libsolidity/ast/ASTJsonImporter.h>
2015-10-20 22:21:52 +00:00
#include <libsolidity/codegen/Compiler.h>
#include <libsolidity/formal/ModelChecker.h>
2017-05-10 09:54:23 +00:00
#include <libsolidity/interface/ABI.h>
2017-05-10 09:56:21 +00:00
#include <libsolidity/interface/Natspec.h>
2017-04-10 13:00:24 +00:00
#include <libsolidity/interface/GasEstimator.h>
#include <libsolidity/interface/StorageLayout.h>
2018-12-17 18:24:42 +00:00
#include <libsolidity/interface/Version.h>
#include <libsolidity/parsing/Parser.h>
2019-03-04 22:26:46 +00:00
#include <libsolidity/codegen/ir/IRGenerator.h>
2018-11-08 23:21:37 +00:00
#include <libyul/YulString.h>
2019-06-18 16:11:04 +00:00
#include <libyul/AsmPrinter.h>
#include <libyul/AsmJsonConverter.h>
2019-06-18 16:11:04 +00:00
#include <libyul/AssemblyStack.h>
#include <libyul/AsmParser.h>
#include <libyul/AST.h>
2018-11-08 23:21:37 +00:00
#include <liblangutil/Scanner.h>
#include <liblangutil/SemVerHandler.h>
#include <libevmasm/Exceptions.h>
#include <libsolutil/SwarmHash.h>
#include <libsolutil/IpfsHash.h>
#include <libsolutil/JSON.h>
2016-11-14 10:46:43 +00:00
#include <json/json.h>
#include <boost/algorithm/string/replace.hpp>
2020-04-01 03:04:29 +00:00
#include <utility>
using namespace std;
2019-12-11 16:31:36 +00:00
using namespace solidity;
using namespace solidity::langutil;
using namespace solidity::frontend;
using solidity::util::errinfo_comment;
using solidity::util::toHex;
static int g_compilerStackCounts = 0;
2020-04-01 03:04:29 +00:00
CompilerStack::CompilerStack(ReadCallback::Callback _readFile):
m_readFile{std::move(_readFile)},
2020-05-19 12:14:46 +00:00
m_enabledSMTSolvers{smtutil::SMTSolverChoice::All()},
m_errorReporter{m_errorList}
{
// Because TypeProvider is currently a singleton API, we must ensure that
// no more than one entity is actually using it at a time.
solAssert(g_compilerStackCounts == 0, "You shall not have another CompilerStack aside me.");
++g_compilerStackCounts;
}
CompilerStack::~CompilerStack()
{
--g_compilerStackCounts;
TypeProvider::reset();
}
std::optional<CompilerStack::Remapping> CompilerStack::parseRemapping(string const& _remapping)
2018-08-09 18:37:49 +00:00
{
auto eq = find(_remapping.begin(), _remapping.end(), '=');
if (eq == _remapping.end())
return {};
auto colon = find(_remapping.begin(), eq, ':');
Remapping r;
r.context = colon == eq ? string() : string(_remapping.begin(), colon);
r.prefix = colon == eq ? string(_remapping.begin(), eq) : string(colon + 1, eq);
r.target = string(eq + 1, _remapping.end());
if (r.prefix.empty())
return {};
return r;
}
void CompilerStack::setRemappings(vector<Remapping> const& _remappings)
{
2020-07-08 20:08:50 +00:00
if (m_stackState >= ParsedAndImported)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Must set remappings before parsing."));
for (auto const& remapping: _remappings)
2018-08-09 18:37:49 +00:00
solAssert(!remapping.prefix.empty(), "");
m_remappings = _remappings;
}
void CompilerStack::setViaIR(bool _viaIR)
{
if (m_stackState >= ParsedAndImported)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Must set viaIR before parsing."));
m_viaIR = _viaIR;
}
void CompilerStack::setEVMVersion(langutil::EVMVersion _version)
{
2020-07-08 20:08:50 +00:00
if (m_stackState >= ParsedAndImported)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Must set EVM version before parsing."));
m_evmVersion = _version;
}
2020-11-02 20:20:20 +00:00
void CompilerStack::setModelCheckerSettings(ModelCheckerSettings _settings)
{
if (m_stackState >= ParsedAndImported)
2020-11-02 20:20:20 +00:00
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Must set model checking settings before parsing."));
m_modelCheckerSettings = _settings;
}
2020-05-19 12:14:46 +00:00
void CompilerStack::setSMTSolverChoice(smtutil::SMTSolverChoice _enabledSMTSolvers)
2019-12-03 15:50:28 +00:00
{
2020-07-08 20:08:50 +00:00
if (m_stackState >= ParsedAndImported)
2019-12-03 15:50:28 +00:00
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Must set enabled SMT solvers before parsing."));
m_enabledSMTSolvers = _enabledSMTSolvers;
}
2019-12-11 16:31:36 +00:00
void CompilerStack::setLibraries(std::map<std::string, util::h160> const& _libraries)
{
2020-07-08 20:08:50 +00:00
if (m_stackState >= ParsedAndImported)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Must set libraries before parsing."));
m_libraries = _libraries;
}
void CompilerStack::setOptimiserSettings(bool _optimize, unsigned _runs)
2017-07-17 11:12:00 +00:00
{
OptimiserSettings settings = _optimize ? OptimiserSettings::standard() : OptimiserSettings::minimal();
2017-07-17 11:12:00 +00:00
settings.expectedExecutionsPerDeployment = _runs;
setOptimiserSettings(std::move(settings));
}
void CompilerStack::setOptimiserSettings(OptimiserSettings _settings)
{
2020-07-08 20:08:50 +00:00
if (m_stackState >= ParsedAndImported)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Must set optimiser settings before parsing."));
2017-07-17 11:12:00 +00:00
m_optimiserSettings = std::move(_settings);
}
void CompilerStack::setRevertStringBehaviour(RevertStrings _revertStrings)
{
2020-07-08 20:08:50 +00:00
if (m_stackState >= ParsedAndImported)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Must set revert string settings before parsing."));
2020-01-22 14:48:56 +00:00
solUnimplementedAssert(_revertStrings != RevertStrings::VerboseDebug, "");
m_revertStrings = _revertStrings;
}
void CompilerStack::useMetadataLiteralSources(bool _metadataLiteralSources)
{
2020-07-08 20:08:50 +00:00
if (m_stackState >= ParsedAndImported)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Must set use literal sources before parsing."));
m_metadataLiteralSources = _metadataLiteralSources;
}
2019-09-06 17:11:07 +00:00
void CompilerStack::setMetadataHash(MetadataHash _metadataHash)
{
2020-07-08 20:08:50 +00:00
if (m_stackState >= ParsedAndImported)
2019-09-06 17:11:07 +00:00
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Must set metadata hash before parsing."));
m_metadataHash = _metadataHash;
}
void CompilerStack::addSMTLib2Response(h256 const& _hash, string const& _response)
{
2020-07-08 20:08:50 +00:00
if (m_stackState >= ParsedAndImported)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Must add SMTLib2 responses before parsing."));
m_smtlib2Responses[_hash] = _response;
}
void CompilerStack::reset(bool _keepSettings)
{
m_stackState = Empty;
m_hasError = false;
m_sources.clear();
m_smtlib2Responses.clear();
m_unhandledSMTLib2Queries.clear();
if (!_keepSettings)
{
m_remappings.clear();
m_libraries.clear();
m_viaIR = false;
m_evmVersion = langutil::EVMVersion();
2020-11-02 20:20:20 +00:00
m_modelCheckerSettings = ModelCheckerSettings{};
2020-05-19 12:14:46 +00:00
m_enabledSMTSolvers = smtutil::SMTSolverChoice::All();
2019-03-04 22:26:46 +00:00
m_generateIR = false;
2019-12-09 16:36:12 +00:00
m_generateEwasm = false;
m_revertStrings = RevertStrings::Default;
m_optimiserSettings = OptimiserSettings::minimal();
m_metadataLiteralSources = false;
2019-09-06 17:11:07 +00:00
m_metadataHash = MetadataHash::IPFS;
2020-07-08 20:08:50 +00:00
m_stopAfter = State::CompilationSuccessful;
}
m_globalContext.reset();
m_sourceOrder.clear();
m_contracts.clear();
m_errorReporter.clear();
TypeProvider::reset();
}
2019-04-06 23:48:37 +00:00
void CompilerStack::setSources(StringMap _sources)
2019-03-20 17:57:40 +00:00
{
if (m_stackState == SourcesSet)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Cannot change sources once set."));
if (m_stackState != Empty)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Must set sources before parsing."));
2019-04-06 23:48:37 +00:00
for (auto source: _sources)
m_sources[source.first].scanner = make_shared<Scanner>(CharStream(/*content*/std::move(source.second), /*name*/source.first));
2019-03-20 17:57:40 +00:00
m_stackState = SourcesSet;
}
2015-09-21 17:43:56 +00:00
bool CompilerStack::parse()
{
2018-09-17 14:13:21 +00:00
if (m_stackState != SourcesSet)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Must call parse only after the SourcesSet state."));
m_errorReporter.clear();
2015-09-21 17:43:56 +00:00
if (SemVerVersion{string(VersionString)}.isPrerelease())
m_errorReporter.warning(3805_error, "This is a pre-release compiler version, please do not use it in production.");
2019-09-11 19:16:35 +00:00
Parser parser{m_errorReporter, m_evmVersion, m_parserErrorRecovery};
2016-01-12 00:04:39 +00:00
vector<string> sourcesToParse;
for (auto const& s: m_sources)
sourcesToParse.push_back(s.first);
2020-07-08 20:08:50 +00:00
2016-01-12 00:04:39 +00:00
for (size_t i = 0; i < sourcesToParse.size(); ++i)
{
2016-01-12 00:04:39 +00:00
string const& path = sourcesToParse[i];
Source& source = m_sources[path];
source.scanner->reset();
2019-09-11 19:16:35 +00:00
source.ast = parser.parse(source.scanner);
2016-01-12 00:04:39 +00:00
if (!source.ast)
solAssert(!Error::containsOnlyWarnings(m_errorReporter.errors()), "Parser returned null but did not report error.");
2015-12-15 14:46:03 +00:00
else
2016-01-12 00:04:39 +00:00
{
source.ast->annotation().path = path;
2020-07-08 20:08:50 +00:00
if (m_stopAfter >= ParsedAndImported)
for (auto const& newSource: loadMissingSources(*source.ast, path))
{
string const& newPath = newSource.first;
string const& newContents = newSource.second;
m_sources[newPath].scanner = make_shared<Scanner>(CharStream(newContents, newPath));
sourcesToParse.push_back(newPath);
}
2016-01-12 00:04:39 +00:00
}
}
2020-07-08 20:08:50 +00:00
if (m_stopAfter <= Parsed)
m_stackState = Parsed;
else
m_stackState = ParsedAndImported;
if (!Error::containsOnlyWarnings(m_errorReporter.errors()))
m_hasError = true;
2020-07-08 20:08:50 +00:00
storeContractDefinitions();
return !m_hasError;
}
2019-09-11 19:16:35 +00:00
void CompilerStack::importASTs(map<string, Json::Value> const& _sources)
{
if (m_stackState != Empty)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Must call importASTs only before the SourcesSet state."));
m_sourceJsons = _sources;
map<string, ASTPointer<SourceUnit>> reconstructedSources = ASTJsonImporter(m_evmVersion).jsonToSourceUnit(m_sourceJsons);
for (auto& src: reconstructedSources)
{
string const& path = src.first;
Source source;
source.ast = src.second;
string srcString = util::jsonCompactPrint(m_sourceJsons[src.first]);
ASTPointer<Scanner> scanner = make_shared<Scanner>(langutil::CharStream(srcString, src.first));
source.scanner = scanner;
m_sources[path] = source;
}
2020-07-08 20:08:50 +00:00
m_stackState = ParsedAndImported;
2019-09-11 19:16:35 +00:00
m_importedSources = true;
2020-07-08 20:08:50 +00:00
storeContractDefinitions();
2019-09-11 19:16:35 +00:00
}
bool CompilerStack::analyze()
{
2020-07-08 20:08:50 +00:00
if (m_stackState != ParsedAndImported || m_stackState >= AnalysisPerformed)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Must call analyze only after parsing was performed."));
resolveImports();
2020-08-06 12:46:04 +00:00
for (Source const* source: m_sourceOrder)
if (source->ast)
Scoper::assignScopes(*source->ast);
2015-10-26 14:13:36 +00:00
bool noErrors = true;
try
{
SyntaxChecker syntaxChecker(m_errorReporter, m_optimiserSettings.runYulOptimiser);
for (Source const* source: m_sourceOrder)
if (source->ast && !syntaxChecker.checkSyntax(*source->ast))
noErrors = false;
DocStringTagParser docStringTagParser(m_errorReporter);
2020-06-29 12:30:09 +00:00
for (Source const* source: m_sourceOrder)
if (source->ast && !docStringTagParser.parseDocStrings(*source->ast))
2020-06-29 12:30:09 +00:00
noErrors = false;
2018-04-05 12:25:51 +00:00
m_globalContext = make_shared<GlobalContext>();
2020-05-14 09:56:10 +00:00
// We need to keep the same resolver during the whole process.
NameAndTypeResolver resolver(*m_globalContext, m_evmVersion, m_errorReporter);
2017-08-28 17:48:34 +00:00
for (Source const* source: m_sourceOrder)
if (source->ast && !resolver.registerDeclarations(*source->ast))
2018-04-05 12:25:51 +00:00
return false;
2017-08-28 17:48:34 +00:00
2018-04-05 12:25:51 +00:00
map<string, SourceUnit const*> sourceUnitsByName;
for (auto& source: m_sources)
sourceUnitsByName[source.first] = source.second.ast.get();
for (Source const* source: m_sourceOrder)
if (source->ast && !resolver.performImports(*source->ast, sourceUnitsByName))
2018-04-05 12:25:51 +00:00
return false;
2017-08-28 17:48:34 +00:00
resolver.warnHomonymDeclarations();
2020-06-11 15:17:07 +00:00
for (Source const* source: m_sourceOrder)
if (source->ast && !resolver.resolveNamesAndTypes(*source->ast))
return false;
2020-04-07 17:31:48 +00:00
DeclarationTypeChecker declarationTypeChecker(m_errorReporter, m_evmVersion);
for (Source const* source: m_sourceOrder)
if (source->ast && !declarationTypeChecker.check(*source->ast))
return false;
// Next, we check inheritance, overrides, function collisions and other things at
// contract or function level.
// This also calculates whether a contract is abstract, which is needed by the
// type checker.
ContractLevelChecker contractLevelChecker(m_errorReporter);
for (Source const* source: m_sourceOrder)
if (auto sourceAst = source->ast)
noErrors = contractLevelChecker.check(*sourceAst);
2020-06-29 12:30:09 +00:00
// Requires ContractLevelChecker
DocStringAnalyser docStringAnalyser(m_errorReporter);
for (Source const* source: m_sourceOrder)
if (source->ast && !docStringAnalyser.analyseDocStrings(*source->ast))
noErrors = false;
2021-01-29 19:15:26 +00:00
// Now we run full type checks that go down to the expression level. This
// cannot be done earlier, because we need cross-contract types and information
// about whether a contract is abstract for the `new` expression.
// This populates the `type` annotation for all expressions.
//
// Note: this does not resolve overloaded functions. In order to do that, types of arguments are needed,
// which is only done one step later.
2018-04-05 12:25:51 +00:00
TypeChecker typeChecker(m_evmVersion, m_errorReporter);
for (Source const* source: m_sourceOrder)
2020-06-11 15:17:07 +00:00
if (source->ast && !typeChecker.checkTypeRequirements(*source->ast))
noErrors = false;
2018-04-05 12:25:51 +00:00
if (noErrors)
{
for (Source const* source: m_sourceOrder)
if (source->ast)
for (ASTPointer<ASTNode> const& node: source->ast->nodes())
if (auto const* contractDefinition = dynamic_cast<ContractDefinition*>(node.get()))
{
Contract& contractState = m_contracts.at(contractDefinition->fullyQualifiedName());
contractState.contract->annotation().creationCallGraph = make_unique<CallGraph>(
FunctionCallGraphBuilder::buildCreationGraph(
*contractDefinition
)
);
contractState.contract->annotation().deployedCallGraph = make_unique<CallGraph>(
FunctionCallGraphBuilder::buildDeployedGraph(
*contractDefinition,
**contractState.contract->annotation().creationCallGraph
)
);
}
}
2018-04-05 12:25:51 +00:00
if (noErrors)
{
// Checks that can only be done when all types of all AST nodes are known.
2018-04-05 12:25:51 +00:00
PostTypeChecker postTypeChecker(m_errorReporter);
for (Source const* source: m_sourceOrder)
if (source->ast && !postTypeChecker.check(*source->ast))
2018-04-05 12:25:51 +00:00
noErrors = false;
if (!postTypeChecker.finalize())
noErrors = false;
2018-04-05 12:25:51 +00:00
}
2020-03-10 17:15:50 +00:00
// Check that immutable variables are never read in c'tors and assigned
// exactly once
if (noErrors)
for (Source const* source: m_sourceOrder)
if (source->ast)
for (ASTPointer<ASTNode> const& node: source->ast->nodes())
if (ContractDefinition* contract = dynamic_cast<ContractDefinition*>(node.get()))
ImmutableValidator(m_errorReporter, *contract).analyze();
2018-05-04 13:58:10 +00:00
if (noErrors)
{
// Control flow graph generator and analyzer. It can check for issues such as
// variable is used before it is assigned to.
2018-05-04 13:58:10 +00:00
CFG cfg(m_errorReporter);
for (Source const* source: m_sourceOrder)
if (source->ast && !cfg.constructFlow(*source->ast))
2018-05-04 13:58:10 +00:00
noErrors = false;
if (noErrors)
{
ControlFlowAnalyzer controlFlowAnalyzer(cfg, m_errorReporter);
for (Source const* source: m_sourceOrder)
if (source->ast && !controlFlowAnalyzer.analyze(*source->ast))
noErrors = false;
}
2018-05-04 13:58:10 +00:00
}
2018-04-05 12:25:51 +00:00
if (noErrors)
{
// Checks for common mistakes. Only generates warnings.
2018-04-05 12:25:51 +00:00
StaticAnalyzer staticAnalyzer(m_errorReporter);
for (Source const* source: m_sourceOrder)
if (source->ast && !staticAnalyzer.analyze(*source->ast))
2018-04-05 12:25:51 +00:00
noErrors = false;
}
if (noErrors)
{
// Check for state mutability in every function.
2018-04-05 12:25:51 +00:00
vector<ASTPointer<ASTNode>> ast;
for (Source const* source: m_sourceOrder)
if (source->ast)
ast.push_back(source->ast);
2018-04-05 12:25:51 +00:00
if (!ViewPureChecker(ast, m_errorReporter).check())
noErrors = false;
}
2017-07-06 09:05:05 +00:00
2018-04-05 12:25:51 +00:00
if (noErrors)
{
2020-11-02 20:20:20 +00:00
ModelChecker modelChecker(m_errorReporter, m_smtlib2Responses, m_modelCheckerSettings, m_readFile, m_enabledSMTSolvers);
2018-04-05 12:25:51 +00:00
for (Source const* source: m_sourceOrder)
if (source->ast)
modelChecker.analyze(*source->ast);
m_unhandledSMTLib2Queries += modelChecker.unhandledQueries();
2018-04-05 12:25:51 +00:00
}
}
catch (FatalError const&)
{
if (m_errorReporter.errors().empty())
throw; // Something is weird here, rather throw again.
noErrors = false;
}
m_stackState = AnalysisPerformed;
if (!noErrors)
m_hasError = true;
return !m_hasError;
}
2020-07-08 20:08:50 +00:00
bool CompilerStack::parseAndAnalyze(State _stopAfter)
{
2020-07-08 20:08:50 +00:00
m_stopAfter = _stopAfter;
bool success = parse();
2020-07-08 20:08:50 +00:00
if (m_stackState >= m_stopAfter)
return success;
if (success || m_parserErrorRecovery)
success = analyze();
return success;
}
bool CompilerStack::isRequestedSource(string const& _sourceName) const
{
return
m_requestedContractNames.empty() ||
m_requestedContractNames.count("") ||
m_requestedContractNames.count(_sourceName);
}
bool CompilerStack::isRequestedContract(ContractDefinition const& _contract) const
{
/// In case nothing was specified in outputSelection.
if (m_requestedContractNames.empty())
return true;
for (auto const& key: vector<string>{"", _contract.sourceUnitName()})
{
auto const& it = m_requestedContractNames.find(key);
if (it != m_requestedContractNames.end())
if (it->second.count(_contract.name()) || it->second.count(""))
return true;
}
return false;
}
2020-07-08 20:08:50 +00:00
bool CompilerStack::compile(State _stopAfter)
{
2020-07-08 20:08:50 +00:00
m_stopAfter = _stopAfter;
if (m_stackState < AnalysisPerformed)
2020-07-08 20:08:50 +00:00
if (!parseAndAnalyze(_stopAfter))
2015-09-21 17:43:56 +00:00
return false;
2020-07-08 20:08:50 +00:00
if (m_stackState >= m_stopAfter)
return true;
if (m_hasError)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Called compile with errors."));
// Only compile contracts individually which have been requested.
map<ContractDefinition const*, shared_ptr<Compiler const>> otherCompilers;
for (Source const* source: m_sourceOrder)
2015-08-31 16:44:29 +00:00
for (ASTPointer<ASTNode> const& node: source->ast->nodes())
2015-10-07 13:57:17 +00:00
if (auto contract = dynamic_cast<ContractDefinition const*>(node.get()))
if (isRequestedContract(*contract))
2019-03-04 22:26:46 +00:00
{
try
{
if (m_viaIR || m_generateIR || m_generateEwasm)
generateIR(*contract);
if (m_generateEvmBytecode)
{
if (m_viaIR)
generateEVMFromIR(*contract);
else
compileContract(*contract, otherCompilers);
}
if (m_generateEwasm)
generateEwasm(*contract);
}
catch (Error const& _error)
{
if (_error.type() != Error::Type::CodeGenerationError)
throw;
m_errorReporter.error(_error.errorId(), _error.type(), SourceLocation(), _error.what());
return false;
}
catch (UnimplementedFeatureError const& _unimplementedError)
{
if (
SourceLocation const* sourceLocation =
boost::get_error_info<langutil::errinfo_sourceLocation>(_unimplementedError)
)
{
string const* comment = _unimplementedError.comment();
m_errorReporter.error(
1834_error,
Error::Type::CodeGenerationError,
*sourceLocation,
"Unimplemented feature error" +
((comment && !comment->empty()) ? ": " + *comment : string{}) +
" in " +
_unimplementedError.lineInfo()
);
return false;
}
else
throw;
}
2019-03-04 22:26:46 +00:00
}
2017-04-28 13:24:59 +00:00
m_stackState = CompilationSuccessful;
this->link();
2015-09-21 17:43:56 +00:00
return true;
}
2016-11-14 10:46:43 +00:00
void CompilerStack::link()
2015-09-11 17:35:01 +00:00
{
solAssert(m_stackState >= CompilationSuccessful, "");
2015-09-11 17:35:01 +00:00
for (auto& contract: m_contracts)
{
2016-11-14 10:46:43 +00:00
contract.second.object.link(m_libraries);
contract.second.runtimeObject.link(m_libraries);
2015-09-11 17:35:01 +00:00
}
}
vector<string> CompilerStack::contractNames() const
{
2020-07-08 20:08:50 +00:00
if (m_stackState < Parsed)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Parsing was not successful."));
vector<string> contractNames;
for (auto const& contract: m_contracts)
contractNames.push_back(contract.first);
return contractNames;
}
string const CompilerStack::lastContractName() const
{
if (m_stackState < AnalysisPerformed)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Parsing was not successful."));
// try to find some user-supplied contract
string contractName;
for (auto const& it: m_sources)
for (ASTPointer<ASTNode> const& node: it.second.ast->nodes())
if (auto contract = dynamic_cast<ContractDefinition const*>(node.get()))
contractName = contract->fullyQualifiedName();
return contractName;
}
2019-12-11 16:31:36 +00:00
evmasm::AssemblyItems const* CompilerStack::assemblyItems(string const& _contractName) const
2015-03-02 00:13:10 +00:00
{
2018-12-18 17:27:38 +00:00
if (m_stackState != CompilationSuccessful)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Compilation was not successful."));
2015-08-31 16:44:29 +00:00
Contract const& currentContract = contract(_contractName);
return currentContract.evmAssembly ? &currentContract.evmAssembly->items() : nullptr;
2015-03-02 00:13:10 +00:00
}
2019-12-11 16:31:36 +00:00
evmasm::AssemblyItems const* CompilerStack::runtimeAssemblyItems(string const& _contractName) const
2015-03-02 00:13:10 +00:00
{
2018-12-18 17:27:38 +00:00
if (m_stackState != CompilationSuccessful)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Compilation was not successful."));
2015-08-31 16:44:29 +00:00
Contract const& currentContract = contract(_contractName);
return currentContract.evmRuntimeAssembly ? &currentContract.evmRuntimeAssembly->items() : nullptr;
2015-03-02 00:13:10 +00:00
}
Json::Value CompilerStack::generatedSources(string const& _contractName, bool _runtime) const
{
if (m_stackState != CompilationSuccessful)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Compilation was not successful."));
Contract const& c = contract(_contractName);
util::LazyInit<Json::Value const> const& sources =
_runtime ?
c.runtimeGeneratedSources :
c.generatedSources;
return sources.init([&]{
Json::Value sources{Json::arrayValue};
// If there is no compiler, then no bytecode was generated and thus no
// sources were generated.
if (c.compiler)
{
string source =
_runtime ?
c.compiler->runtimeGeneratedYulUtilityCode() :
c.compiler->generatedYulUtilityCode();
if (!source.empty())
{
string sourceName = CompilerContext::yulUtilityFileName();
unsigned sourceIndex = sourceIndices()[sourceName];
ErrorList errors;
ErrorReporter errorReporter(errors);
auto scanner = make_shared<langutil::Scanner>(langutil::CharStream(source, sourceName));
yul::EVMDialect const& dialect = yul::EVMDialect::strictAssemblyForEVM(m_evmVersion);
shared_ptr<yul::Block> parserResult = yul::Parser{errorReporter, dialect}.parse(scanner, false);
solAssert(parserResult, "");
sources[0]["ast"] = yul::AsmJsonConverter{sourceIndex}(*parserResult);
sources[0]["name"] = sourceName;
sources[0]["id"] = sourceIndex;
sources[0]["language"] = "Yul";
sources[0]["contents"] = move(source);
}
}
return sources;
});
}
2016-07-01 08:14:50 +00:00
string const* CompilerStack::sourceMapping(string const& _contractName) const
{
2018-12-18 17:27:38 +00:00
if (m_stackState != CompilationSuccessful)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Compilation was not successful."));
2016-07-01 08:14:50 +00:00
Contract const& c = contract(_contractName);
if (!c.sourceMapping)
{
if (auto items = assemblyItems(_contractName))
c.sourceMapping.emplace(evmasm::AssemblyItem::computeSourceMapping(*items, sourceIndices()));
2016-07-01 08:14:50 +00:00
}
return c.sourceMapping ? &*c.sourceMapping : nullptr;
2016-07-01 08:14:50 +00:00
}
string const* CompilerStack::runtimeSourceMapping(string const& _contractName) const
{
2018-12-18 17:27:38 +00:00
if (m_stackState != CompilationSuccessful)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Compilation was not successful."));
2016-07-01 08:14:50 +00:00
Contract const& c = contract(_contractName);
if (!c.runtimeSourceMapping)
{
if (auto items = runtimeAssemblyItems(_contractName))
c.runtimeSourceMapping.emplace(
evmasm::AssemblyItem::computeSourceMapping(*items, sourceIndices())
);
2016-07-01 08:14:50 +00:00
}
return c.runtimeSourceMapping ? &*c.runtimeSourceMapping : nullptr;
2016-07-01 08:14:50 +00:00
}
std::string const CompilerStack::filesystemFriendlyName(string const& _contractName) const
{
if (m_stackState < AnalysisPerformed)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("No compiled contracts found."));
// Look up the contract (by its fully-qualified name)
Contract const& matchContract = m_contracts.at(_contractName);
// Check to see if it could collide on name
for (auto const& contract: m_contracts)
{
if (contract.second.contract->name() == matchContract.contract->name() &&
contract.second.contract != matchContract.contract)
{
// If it does, then return its fully-qualified name, made fs-friendly
std::string friendlyName = boost::algorithm::replace_all_copy(_contractName, "/", "_");
boost::algorithm::replace_all(friendlyName, ":", "_");
boost::algorithm::replace_all(friendlyName, ".", "_");
return friendlyName;
}
}
// If no collision, return the contract's name
2016-12-16 12:22:42 +00:00
return matchContract.contract->name();
}
2019-03-04 22:26:46 +00:00
string const& CompilerStack::yulIR(string const& _contractName) const
{
if (m_stackState != CompilationSuccessful)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Compilation was not successful."));
return contract(_contractName).yulIR;
}
string const& CompilerStack::yulIROptimized(string const& _contractName) const
{
if (m_stackState != CompilationSuccessful)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Compilation was not successful."));
return contract(_contractName).yulIROptimized;
}
2019-12-09 16:36:12 +00:00
string const& CompilerStack::ewasm(string const& _contractName) const
2019-06-18 16:11:04 +00:00
{
if (m_stackState != CompilationSuccessful)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Compilation was not successful."));
2019-12-09 16:36:12 +00:00
return contract(_contractName).ewasm;
2019-06-18 16:11:04 +00:00
}
2019-12-11 16:31:36 +00:00
evmasm::LinkerObject const& CompilerStack::ewasmObject(string const& _contractName) const
2019-10-31 17:42:14 +00:00
{
if (m_stackState != CompilationSuccessful)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Compilation was not successful."));
2019-12-09 16:36:12 +00:00
return contract(_contractName).ewasmObject;
2019-10-31 17:42:14 +00:00
}
2019-12-11 16:31:36 +00:00
evmasm::LinkerObject const& CompilerStack::object(string const& _contractName) const
{
2018-12-18 17:27:38 +00:00
if (m_stackState != CompilationSuccessful)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Compilation was not successful."));
return contract(_contractName).object;
}
2019-12-11 16:31:36 +00:00
evmasm::LinkerObject const& CompilerStack::runtimeObject(string const& _contractName) const
{
2018-12-18 17:27:38 +00:00
if (m_stackState != CompilationSuccessful)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Compilation was not successful."));
return contract(_contractName).runtimeObject;
}
/// TODO: cache this string
2017-08-30 01:17:15 +00:00
string CompilerStack::assemblyString(string const& _contractName, StringMap _sourceCodes) const
{
2018-12-18 17:27:38 +00:00
if (m_stackState != CompilationSuccessful)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Compilation was not successful."));
2015-08-31 16:44:29 +00:00
Contract const& currentContract = contract(_contractName);
if (currentContract.evmAssembly)
return currentContract.evmAssembly->assemblyString(_sourceCodes);
else
2017-08-30 01:17:15 +00:00
return string();
}
/// TODO: cache the JSON
Json::Value CompilerStack::assemblyJSON(string const& _contractName) const
{
2018-12-18 17:27:38 +00:00
if (m_stackState != CompilationSuccessful)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Compilation was not successful."));
Contract const& currentContract = contract(_contractName);
if (currentContract.evmAssembly)
return currentContract.evmAssembly->assemblyJSON(sourceIndices());
else
return Json::Value();
}
2016-07-01 08:14:50 +00:00
vector<string> CompilerStack::sourceNames() const
{
vector<string> names;
for (auto const& s: m_sources)
names.push_back(s.first);
return names;
}
map<string, unsigned> CompilerStack::sourceIndices() const
{
map<string, unsigned> indices;
unsigned index = 0;
2016-07-01 08:14:50 +00:00
for (auto const& s: m_sources)
indices[s.first] = index++;
solAssert(!indices.count(CompilerContext::yulUtilityFileName()), "");
indices[CompilerContext::yulUtilityFileName()] = index++;
2016-07-01 08:14:50 +00:00
return indices;
}
Json::Value const& CompilerStack::contractABI(string const& _contractName) const
{
if (m_stackState < AnalysisPerformed)
2018-12-18 17:27:38 +00:00
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Analysis was not successful."));
2017-05-10 09:54:23 +00:00
return contractABI(contract(_contractName));
}
2017-05-06 17:02:56 +00:00
Json::Value const& CompilerStack::contractABI(Contract const& _contract) const
{
if (m_stackState < AnalysisPerformed)
2018-12-18 17:27:38 +00:00
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Analysis was not successful."));
2017-05-10 09:54:23 +00:00
solAssert(_contract.contract, "");
return _contract.abi.init([&]{ return ABI::generate(*_contract.contract); });
2017-05-06 17:02:56 +00:00
}
Json::Value const& CompilerStack::storageLayout(string const& _contractName) const
{
if (m_stackState < AnalysisPerformed)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Analysis was not successful."));
return storageLayout(contract(_contractName));
}
Json::Value const& CompilerStack::storageLayout(Contract const& _contract) const
{
if (m_stackState < AnalysisPerformed)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Analysis was not successful."));
solAssert(_contract.contract, "");
return _contract.storageLayout.init([&]{ return StorageLayout().generate(*_contract.contract); });
}
2017-07-27 10:28:04 +00:00
Json::Value const& CompilerStack::natspecUser(string const& _contractName) const
2016-11-14 10:46:43 +00:00
{
if (m_stackState < AnalysisPerformed)
2018-12-18 17:27:38 +00:00
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Analysis was not successful."));
2017-07-27 10:28:04 +00:00
return natspecUser(contract(_contractName));
2016-11-14 10:46:43 +00:00
}
2017-07-27 10:28:04 +00:00
Json::Value const& CompilerStack::natspecUser(Contract const& _contract) const
{
if (m_stackState < AnalysisPerformed)
2018-12-18 17:27:38 +00:00
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Analysis was not successful."));
solAssert(_contract.contract, "");
2015-07-15 14:23:10 +00:00
return _contract.userDocumentation.init([&]{ return Natspec::userDocumentation(*_contract.contract); });
2017-07-27 10:28:04 +00:00
}
Json::Value const& CompilerStack::natspecDev(string const& _contractName) const
{
if (m_stackState < AnalysisPerformed)
2018-12-18 17:27:38 +00:00
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Analysis was not successful."));
2017-07-27 10:28:04 +00:00
return natspecDev(contract(_contractName));
}
Json::Value const& CompilerStack::natspecDev(Contract const& _contract) const
{
if (m_stackState < AnalysisPerformed)
2018-12-18 17:27:38 +00:00
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Analysis was not successful."));
2017-07-27 10:28:04 +00:00
solAssert(_contract.contract, "");
return _contract.devDocumentation.init([&]{ return Natspec::devDocumentation(*_contract.contract); });
}
Json::Value CompilerStack::methodIdentifiers(string const& _contractName) const
{
if (m_stackState < AnalysisPerformed)
2018-12-18 17:27:38 +00:00
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Analysis was not successful."));
Json::Value methodIdentifiers(Json::objectValue);
for (auto const& it: contractDefinition(_contractName).interfaceFunctions())
2018-12-05 19:34:27 +00:00
methodIdentifiers[it.second->externalSignature()] = it.first.hex();
return methodIdentifiers;
}
2017-05-19 15:10:32 +00:00
string const& CompilerStack::metadata(string const& _contractName) const
2016-11-14 10:46:43 +00:00
{
if (m_stackState < AnalysisPerformed)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Analysis was not successful."));
return metadata(contract(_contractName));
}
2020-07-28 21:20:49 +00:00
bytes CompilerStack::cborMetadata(string const& _contractName) const
{
if (m_stackState < AnalysisPerformed)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Analysis was not successful."));
return createCBORMetadata(contract(_contractName));
}
string const& CompilerStack::metadata(Contract const& _contract) const
{
if (m_stackState < AnalysisPerformed)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Analysis was not successful."));
2016-11-14 10:46:43 +00:00
solAssert(_contract.contract, "");
return _contract.metadata.init([&]{ return createMetadata(_contract); });
2016-11-14 10:46:43 +00:00
}
2015-08-31 16:44:29 +00:00
Scanner const& CompilerStack::scanner(string const& _sourceName) const
{
if (m_stackState < SourcesSet)
2017-05-26 09:13:32 +00:00
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("No sources set."));
2015-08-31 16:44:29 +00:00
return *source(_sourceName).scanner;
}
SourceUnit const& CompilerStack::ast(string const& _sourceName) const
{
2020-07-08 20:08:50 +00:00
if (m_stackState < Parsed)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Parsing not yet performed."));
if (!source(_sourceName).ast && !m_parserErrorRecovery)
2017-05-06 16:47:08 +00:00
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Parsing was not successful."));
2015-08-31 16:44:29 +00:00
return *source(_sourceName).ast;
}
2015-08-31 16:44:29 +00:00
ContractDefinition const& CompilerStack::contractDefinition(string const& _contractName) const
{
if (m_stackState < AnalysisPerformed)
2018-12-18 17:27:38 +00:00
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Analysis was not successful."));
2015-08-31 16:44:29 +00:00
return *contract(_contractName).contract;
}
2017-06-01 12:28:32 +00:00
size_t CompilerStack::functionEntryPoint(
std::string const& _contractName,
FunctionDefinition const& _function
) const
{
2018-12-18 17:27:38 +00:00
if (m_stackState != CompilationSuccessful)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Compilation was not successful."));
2017-06-01 12:28:32 +00:00
shared_ptr<Compiler> const& compiler = contract(_contractName).compiler;
if (!compiler)
return 0;
2019-12-11 16:31:36 +00:00
evmasm::AssemblyItem tag = compiler->functionEntryLabel(_function);
if (tag.type() == evmasm::UndefinedItem)
2017-06-01 12:28:32 +00:00
return 0;
evmasm::AssemblyItems const& items = compiler->runtimeAssembly().items();
2017-06-01 12:28:32 +00:00
for (size_t i = 0; i < items.size(); ++i)
2019-12-11 16:31:36 +00:00
if (items.at(i).type() == evmasm::Tag && items.at(i).data() == tag.data())
2017-06-01 12:28:32 +00:00
return i;
return 0;
}
tuple<int, int, int, int> CompilerStack::positionFromSourceLocation(SourceLocation const& _sourceLocation) const
{
int startLine;
int startColumn;
int endLine;
int endColumn;
tie(startLine, startColumn) = scanner(_sourceLocation.source->name()).translatePositionToLineColumn(_sourceLocation.start);
tie(endLine, endColumn) = scanner(_sourceLocation.source->name()).translatePositionToLineColumn(_sourceLocation.end);
return make_tuple(++startLine, ++startColumn, ++endLine, ++endColumn);
}
2018-12-18 15:38:25 +00:00
h256 const& CompilerStack::Source::keccak256() const
{
if (keccak256HashCached == h256{})
2019-12-11 16:31:36 +00:00
keccak256HashCached = util::keccak256(scanner->source());
2018-12-18 15:38:25 +00:00
return keccak256HashCached;
}
h256 const& CompilerStack::Source::swarmHash() const
{
if (swarmHashCached == h256{})
2019-12-11 16:31:36 +00:00
swarmHashCached = util::bzzr1Hash(scanner->source());
2018-12-18 15:38:25 +00:00
return swarmHashCached;
}
string const& CompilerStack::Source::ipfsUrl() const
{
if (ipfsUrlCached.empty())
2020-02-27 15:47:20 +00:00
ipfsUrlCached = "dweb:/ipfs/" + util::ipfsHashBase58(scanner->source());
return ipfsUrlCached;
}
StringMap CompilerStack::loadMissingSources(SourceUnit const& _ast, std::string const& _sourcePath)
2016-01-12 00:04:39 +00:00
{
2020-07-08 20:08:50 +00:00
solAssert(m_stackState < ParsedAndImported, "");
2016-01-12 00:04:39 +00:00
StringMap newSources;
try
{
for (auto const& node: _ast.nodes())
if (ImportDirective const* import = dynamic_cast<ImportDirective*>(node.get()))
2016-01-12 00:04:39 +00:00
{
solAssert(!import->path().empty(), "Import path cannot be empty.");
string importPath = util::absolutePath(import->path(), _sourcePath);
// The current value of `path` is the absolute path as seen from this source file.
// We first have to apply remappings before we can store the actual absolute path
// as seen globally.
importPath = applyRemapping(importPath, _sourcePath);
import->annotation().absolutePath = importPath;
if (m_sources.count(importPath) || newSources.count(importPath))
continue;
ReadCallback::Result result{false, string("File not supplied initially.")};
if (m_readFile)
result = m_readFile(ReadCallback::kindString(ReadCallback::Kind::ReadFile), importPath);
if (result.success)
newSources[importPath] = result.responseOrErrorMessage;
else
{
m_errorReporter.parserError(
6275_error,
import->location(),
string("Source \"" + importPath + "\" not found: " + result.responseOrErrorMessage)
);
continue;
}
2016-01-12 00:04:39 +00:00
}
}
catch (FatalError const&)
{
solAssert(m_errorReporter.hasErrors(), "");
}
2016-01-12 00:04:39 +00:00
return newSources;
}
string CompilerStack::applyRemapping(string const& _path, string const& _context)
{
2020-07-08 20:08:50 +00:00
solAssert(m_stackState < ParsedAndImported, "");
// Try to find the longest prefix match in all remappings that are active in the current context.
auto isPrefixOf = [](string const& _a, string const& _b)
{
if (_a.length() > _b.length())
return false;
return std::equal(_a.begin(), _a.end(), _b.begin());
};
size_t longestPrefix = 0;
size_t longestContext = 0;
string bestMatchTarget;
for (auto const& redir: m_remappings)
{
2019-12-11 16:31:36 +00:00
string context = util::sanitizePath(redir.context);
string prefix = util::sanitizePath(redir.prefix);
// Skip if current context is closer
if (context.length() < longestContext)
continue;
// Skip if redir.context is not a prefix of _context
if (!isPrefixOf(context, _context))
continue;
// Skip if we already have a closer prefix match.
if (prefix.length() < longestPrefix && context.length() == longestContext)
continue;
// Skip if the prefix does not match.
if (!isPrefixOf(prefix, _path))
continue;
longestContext = context.length();
longestPrefix = prefix.length();
2019-12-11 16:31:36 +00:00
bestMatchTarget = util::sanitizePath(redir.target);
}
string path = bestMatchTarget;
path.append(_path.begin() + static_cast<string::difference_type>(longestPrefix), _path.end());
return path;
}
void CompilerStack::resolveImports()
{
2020-07-08 20:08:50 +00:00
solAssert(m_stackState == ParsedAndImported, "");
// topological sorting (depth first search) of the import graph, cutting potential cycles
vector<Source const*> sourceOrder;
set<Source const*> sourcesSeen;
2016-01-12 00:04:39 +00:00
function<void(Source const*)> toposort = [&](Source const* _source)
{
if (sourcesSeen.count(_source))
return;
sourcesSeen.insert(_source);
if (_source->ast)
for (ASTPointer<ASTNode> const& node: _source->ast->nodes())
if (ImportDirective const* import = dynamic_cast<ImportDirective*>(node.get()))
{
string const& path = *import->annotation().absolutePath;
solAssert(m_sources.count(path), "");
import->annotation().sourceUnit = m_sources[path].ast.get();
toposort(&m_sources[path]);
}
sourceOrder.push_back(_source);
};
for (auto const& sourcePair: m_sources)
if (isRequestedSource(sourcePair.first))
toposort(&sourcePair.second);
swap(m_sourceOrder, sourceOrder);
}
2020-07-08 20:08:50 +00:00
void CompilerStack::storeContractDefinitions()
{
for (auto const& pair: m_sources)
if (pair.second.ast)
for (
ContractDefinition const* contract:
ASTNode::filteredNodes<ContractDefinition>(pair.second.ast->nodes())
)
{
string fullyQualifiedName = *pair.second.ast->annotation().path + ":" + contract->name();
// Note that we now reference contracts by their fully qualified names, and
// thus contracts can only conflict if declared in the same source file. This
// should already cause a double-declaration error elsewhere.
if (!m_contracts.count(fullyQualifiedName))
m_contracts[fullyQualifiedName].contract = contract;
}
}
namespace
{
bool onlySafeExperimentalFeaturesActivated(set<ExperimentalFeature> const& features)
{
for (auto const feature: features)
if (!ExperimentalFeatureWithoutWarning.count(feature))
return false;
return true;
}
}
2015-10-07 13:57:17 +00:00
void CompilerStack::compileContract(
ContractDefinition const& _contract,
map<ContractDefinition const*, shared_ptr<Compiler const>>& _otherCompilers
2015-10-07 13:57:17 +00:00
)
{
solAssert(m_stackState >= AnalysisPerformed, "");
if (m_hasError)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Called compile with errors."));
if (_otherCompilers.count(&_contract))
2015-10-07 13:57:17 +00:00
return;
2015-10-07 13:57:17 +00:00
for (auto const* dependency: _contract.annotation().contractDependencies)
compileContract(*dependency, _otherCompilers);
2015-10-07 13:57:17 +00:00
if (!_contract.canBeDeployed())
return;
Contract& compiledContract = m_contracts.at(_contract.fullyQualifiedName());
shared_ptr<Compiler> compiler = make_shared<Compiler>(m_evmVersion, m_revertStrings, m_optimiserSettings);
compiledContract.compiler = compiler;
2020-07-28 21:20:49 +00:00
bytes cborEncodedMetadata = createCBORMetadata(compiledContract);
try
{
// Run optimiser and compile the contract.
compiler->compileContract(_contract, _otherCompilers, cborEncodedMetadata);
}
2019-12-11 16:31:36 +00:00
catch(evmasm::OptimizerException const&)
{
solAssert(false, "Optimizer exception during compilation");
}
compiledContract.evmAssembly = compiler->assemblyPtr();
solAssert(compiledContract.evmAssembly, "");
try
{
// Assemble deployment (incl. runtime) object.
compiledContract.object = compiledContract.evmAssembly->assemble();
}
2019-12-11 16:31:36 +00:00
catch(evmasm::AssemblyException const&)
{
solAssert(false, "Assembly exception for bytecode");
}
solAssert(compiledContract.object.immutableReferences.empty(), "Leftover immutables.");
compiledContract.evmRuntimeAssembly = compiler->runtimeAssemblyPtr();
solAssert(compiledContract.evmRuntimeAssembly, "");
try
{
// Assemble runtime object.
compiledContract.runtimeObject = compiledContract.evmRuntimeAssembly->assemble();
}
2019-12-11 16:31:36 +00:00
catch(evmasm::AssemblyException const&)
{
solAssert(false, "Assembly exception for deployed bytecode");
}
// Throw a warning if EIP-170 limits are exceeded:
2020-11-17 13:13:51 +00:00
// If contract creation returns data with length greater than 0x6000 (214 + 213) bytes,
// contract creation fails with an out of gas error.
if (
m_evmVersion >= langutil::EVMVersion::spuriousDragon() &&
compiledContract.runtimeObject.bytecode.size() > 0x6000
)
m_errorReporter.warning(
5574_error,
_contract.location(),
"Contract code size exceeds 24576 bytes (a limit introduced in Spurious Dragon). "
"This contract may not be deployable on mainnet. "
"Consider enabling the optimizer (with a low \"runs\" value!), "
"turning off revert strings, or using libraries."
);
_otherCompilers[compiledContract.contract] = compiler;
2015-10-07 13:57:17 +00:00
}
2019-03-04 22:26:46 +00:00
void CompilerStack::generateIR(ContractDefinition const& _contract)
{
solAssert(m_stackState >= AnalysisPerformed, "");
if (m_hasError)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Called generateIR with errors."));
2019-03-04 22:26:46 +00:00
Contract& compiledContract = m_contracts.at(_contract.fullyQualifiedName());
if (!compiledContract.yulIR.empty())
return;
if (!*_contract.sourceUnit().annotation().useABICoderV2)
m_errorReporter.warning(
2066_error,
_contract.location(),
"Contract requests the ABI coder v1, which is incompatible with the IR. "
"Using ABI coder v2 instead."
);
string dependenciesSource;
2019-03-04 22:26:46 +00:00
for (auto const* dependency: _contract.annotation().contractDependencies)
generateIR(*dependency);
if (!_contract.canBeDeployed())
return;
map<ContractDefinition const*, string_view const> otherYulSources;
for (auto const& pair: m_contracts)
otherYulSources.emplace(pair.second.contract, pair.second.yulIR);
2019-03-04 22:26:46 +00:00
2020-01-22 14:48:56 +00:00
IRGenerator generator(m_evmVersion, m_revertStrings, m_optimiserSettings);
tie(compiledContract.yulIR, compiledContract.yulIROptimized) = generator.run(_contract, otherYulSources);
2019-03-04 22:26:46 +00:00
}
void CompilerStack::generateEVMFromIR(ContractDefinition const& _contract)
{
solAssert(m_stackState >= AnalysisPerformed, "");
if (m_hasError)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Called generateEVMFromIR with errors."));
if (!_contract.canBeDeployed())
return;
Contract& compiledContract = m_contracts.at(_contract.fullyQualifiedName());
solAssert(!compiledContract.yulIROptimized.empty(), "");
if (!compiledContract.object.bytecode.empty())
return;
// Re-parse the Yul IR in EVM dialect
yul::AssemblyStack stack(m_evmVersion, yul::AssemblyStack::Language::StrictAssembly, m_optimiserSettings);
stack.parseAndAnalyze("", compiledContract.yulIROptimized);
stack.optimize();
//cout << yul::AsmPrinter{}(*stack.parserResult()->code) << endl;
// TODO: support passing metadata
2020-11-17 13:13:51 +00:00
// TODO: use stack.assemble here!
yul::MachineAssemblyObject init;
yul::MachineAssemblyObject runtime;
std::tie(init, runtime) = stack.assembleWithDeployed(IRNames::deployedObject(_contract));
2020-11-17 13:13:51 +00:00
compiledContract.object = std::move(*init.bytecode);
compiledContract.runtimeObject = std::move(*runtime.bytecode);
// TODO: refactor assemblyItems, runtimeAssemblyItems, generatedSources,
// assemblyString, assemblyJSON, and functionEntryPoints to work with this code path
2020-11-17 13:13:51 +00:00
// Throw a warning if EIP-170 limits are exceeded:
// If contract creation returns data with length greater than 0x6000 (214 + 213) bytes,
// contract creation fails with an out of gas error.
if (
m_evmVersion >= langutil::EVMVersion::spuriousDragon() &&
compiledContract.runtimeObject.bytecode.size() > 0x6000
)
m_errorReporter.warning(
9609_error,
_contract.location(),
"Contract code size exceeds 24576 bytes (a limit introduced in Spurious Dragon). "
"This contract may not be deployable on mainnet. "
"Consider enabling the optimizer (with a low \"runs\" value!), "
"turning off revert strings, or using libraries."
);
}
2019-12-09 16:36:12 +00:00
void CompilerStack::generateEwasm(ContractDefinition const& _contract)
2019-06-18 16:11:04 +00:00
{
solAssert(m_stackState >= AnalysisPerformed, "");
if (m_hasError)
2019-12-09 16:36:12 +00:00
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Called generateEwasm with errors."));
if (!_contract.canBeDeployed())
return;
2019-06-18 16:11:04 +00:00
Contract& compiledContract = m_contracts.at(_contract.fullyQualifiedName());
solAssert(!compiledContract.yulIROptimized.empty(), "");
2019-12-09 16:36:12 +00:00
if (!compiledContract.ewasm.empty())
2019-06-18 16:11:04 +00:00
return;
// Re-parse the Yul IR in EVM dialect
yul::AssemblyStack stack(m_evmVersion, yul::AssemblyStack::Language::StrictAssembly, m_optimiserSettings);
stack.parseAndAnalyze("", compiledContract.yulIROptimized);
2019-06-18 16:11:04 +00:00
stack.optimize();
2019-12-09 16:36:12 +00:00
stack.translate(yul::AssemblyStack::Language::Ewasm);
stack.optimize();
2019-06-18 16:11:04 +00:00
//cout << yul::AsmPrinter{}(*stack.parserResult()->code) << endl;
2019-06-18 16:11:04 +00:00
2019-12-09 16:36:12 +00:00
// Turn into Ewasm text representation.
auto result = stack.assemble(yul::AssemblyStack::Machine::Ewasm);
compiledContract.ewasm = std::move(result.assembly);
compiledContract.ewasmObject = std::move(*result.bytecode);
2019-06-18 16:11:04 +00:00
}
2015-08-31 16:44:29 +00:00
CompilerStack::Contract const& CompilerStack::contract(string const& _contractName) const
{
solAssert(m_stackState >= AnalysisPerformed, "");
auto it = m_contracts.find(_contractName);
if (it != m_contracts.end())
return it->second;
// To provide a measure of backward-compatibility, if a contract is not located by its
// fully-qualified name, a lookup will be attempted purely on the contract's name to see
// if anything will satisfy.
2018-10-09 17:06:25 +00:00
if (_contractName.find(':') == string::npos)
{
for (auto const& contractEntry: m_contracts)
{
stringstream ss;
ss.str(contractEntry.first);
// All entries are <source>:<contract>
string source;
string foundName;
getline(ss, source, ':');
getline(ss, foundName, ':');
if (foundName == _contractName)
return contractEntry.second;
}
}
// If we get here, both lookup methods failed.
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Contract \"" + _contractName + "\" not found."));
}
2015-08-31 16:44:29 +00:00
CompilerStack::Source const& CompilerStack::source(string const& _sourceName) const
{
auto it = m_sources.find(_sourceName);
if (it == m_sources.end())
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Given source file not found."));
return it->second;
}
2016-07-01 08:14:50 +00:00
2017-05-19 15:10:32 +00:00
string CompilerStack::createMetadata(Contract const& _contract) const
2016-11-14 10:46:43 +00:00
{
Json::Value meta;
meta["version"] = 1;
2019-09-11 19:16:35 +00:00
meta["language"] = m_importedSources ? "SolidityAST" : "Solidity";
meta["compiler"]["version"] = VersionStringStrict;
2016-11-14 10:46:43 +00:00
2017-07-12 23:47:15 +00:00
/// All the source files (including self), which should be included in the metadata.
set<string> referencedSources;
referencedSources.insert(*_contract.contract->sourceUnit().annotation().path);
2017-07-12 23:47:15 +00:00
for (auto const sourceUnit: _contract.contract->sourceUnit().referencedSourceUnits(true))
referencedSources.insert(*sourceUnit->annotation().path);
2017-07-12 23:47:15 +00:00
2016-11-23 18:04:50 +00:00
meta["sources"] = Json::objectValue;
2016-11-14 10:46:43 +00:00
for (auto const& s: m_sources)
{
2017-07-12 23:47:15 +00:00
if (!referencedSources.count(s.first))
continue;
2016-11-14 10:46:43 +00:00
solAssert(s.second.scanner, "Scanner not available");
2018-12-18 15:38:25 +00:00
meta["sources"][s.first]["keccak256"] = "0x" + toHex(s.second.keccak256().asBytes());
if (optional<string> licenseString = s.second.ast->licenseString())
meta["sources"][s.first]["license"] = *licenseString;
if (m_metadataLiteralSources)
meta["sources"][s.first]["content"] = s.second.scanner->source();
else
{
meta["sources"][s.first]["urls"] = Json::arrayValue;
2019-06-18 14:08:50 +00:00
meta["sources"][s.first]["urls"].append("bzz-raw://" + toHex(s.second.swarmHash().asBytes()));
meta["sources"][s.first]["urls"].append(s.second.ipfsUrl());
}
2016-11-14 10:46:43 +00:00
}
2017-07-17 11:12:00 +00:00
static_assert(sizeof(m_optimiserSettings.expectedExecutionsPerDeployment) <= sizeof(Json::LargestUInt), "Invalid word size.");
solAssert(static_cast<Json::LargestUInt>(m_optimiserSettings.expectedExecutionsPerDeployment) < std::numeric_limits<Json::LargestUInt>::max(), "");
meta["settings"]["optimizer"]["runs"] = Json::Value(Json::LargestUInt(m_optimiserSettings.expectedExecutionsPerDeployment));
/// Backwards compatibility: If set to one of the default settings, do not provide details.
OptimiserSettings settingsWithoutRuns = m_optimiserSettings;
// reset to default
settingsWithoutRuns.expectedExecutionsPerDeployment = OptimiserSettings::minimal().expectedExecutionsPerDeployment;
if (settingsWithoutRuns == OptimiserSettings::minimal())
meta["settings"]["optimizer"]["enabled"] = false;
else if (settingsWithoutRuns == OptimiserSettings::standard())
2017-07-17 11:12:00 +00:00
meta["settings"]["optimizer"]["enabled"] = true;
else
{
Json::Value details{Json::objectValue};
details["orderLiterals"] = m_optimiserSettings.runOrderLiterals;
2021-01-14 12:02:14 +00:00
details["inliner"] = m_optimiserSettings.runInliner;
2017-07-17 11:12:00 +00:00
details["jumpdestRemover"] = m_optimiserSettings.runJumpdestRemover;
details["peephole"] = m_optimiserSettings.runPeephole;
details["deduplicate"] = m_optimiserSettings.runDeduplicate;
details["cse"] = m_optimiserSettings.runCSE;
details["constantOptimizer"] = m_optimiserSettings.runConstantOptimiser;
details["yul"] = m_optimiserSettings.runYulOptimiser;
2019-02-26 18:55:13 +00:00
if (m_optimiserSettings.runYulOptimiser)
{
details["yulDetails"] = Json::objectValue;
details["yulDetails"]["stackAllocation"] = m_optimiserSettings.optimizeStackAllocation;
details["yulDetails"]["optimizerSteps"] = m_optimiserSettings.yulOptimiserSteps;
2019-02-26 18:55:13 +00:00
}
2017-07-17 11:12:00 +00:00
meta["settings"]["optimizer"]["details"] = std::move(details);
}
if (m_revertStrings != RevertStrings::Default)
meta["settings"]["debug"]["revertStrings"] = revertStringsToString(m_revertStrings);
if (m_metadataLiteralSources)
meta["settings"]["metadata"]["useLiteralContent"] = true;
2019-09-06 17:11:07 +00:00
static vector<string> hashes{"ipfs", "bzzr1", "none"};
meta["settings"]["metadata"]["bytecodeHash"] = hashes.at(unsigned(m_metadataHash));
if (m_viaIR)
meta["settings"]["viaIR"] = m_viaIR;
2018-02-21 22:45:08 +00:00
meta["settings"]["evmVersion"] = m_evmVersion.name();
2016-11-16 13:36:19 +00:00
meta["settings"]["compilationTarget"][_contract.contract->sourceUnitName()] =
*_contract.contract->annotation().canonicalName;
2016-11-14 10:46:43 +00:00
2016-11-23 18:04:50 +00:00
meta["settings"]["remappings"] = Json::arrayValue;
2016-11-14 10:46:43 +00:00
set<string> remappings;
for (auto const& r: m_remappings)
remappings.insert(r.context + ":" + r.prefix + "=" + r.target);
for (auto const& r: remappings)
meta["settings"]["remappings"].append(r);
2016-11-23 18:04:50 +00:00
meta["settings"]["libraries"] = Json::objectValue;
2016-11-14 10:46:43 +00:00
for (auto const& library: m_libraries)
meta["settings"]["libraries"][library.first] = "0x" + toHex(library.second.asBytes());
2017-05-06 17:02:56 +00:00
meta["output"]["abi"] = contractABI(_contract);
2017-07-27 10:28:04 +00:00
meta["output"]["userdoc"] = natspecUser(_contract);
meta["output"]["devdoc"] = natspecDev(_contract);
2016-11-14 10:46:43 +00:00
2019-12-11 16:31:36 +00:00
return util::jsonCompactPrint(meta);
2016-11-14 10:46:43 +00:00
}
class MetadataCBOREncoder
{
public:
void pushBytes(string const& key, bytes const& value)
{
m_entryCount++;
pushTextString(key);
pushByteString(value);
}
void pushString(string const& key, string const& value)
{
m_entryCount++;
pushTextString(key);
pushTextString(value);
}
void pushBool(string const& key, bool value)
{
m_entryCount++;
pushTextString(key);
pushBool(value);
}
bytes serialise() const
{
2019-12-12 23:39:29 +00:00
size_t size = m_data.size() + 1;
solAssert(size <= 0xffff, "Metadata too large.");
solAssert(m_entryCount <= 0x1f, "Too many map entries.");
// CBOR fixed-length map
bytes ret{static_cast<unsigned char>(0xa0 + m_entryCount)};
// The already encoded key-value pairs
ret += m_data;
// 16-bit big endian length
2019-12-11 16:31:36 +00:00
ret += util::toCompactBigEndian(size, 2);
return ret;
}
private:
void pushTextString(string const& key)
{
2019-12-12 23:39:29 +00:00
size_t length = key.size();
if (length < 24)
{
m_data += bytes{static_cast<unsigned char>(0x60 + length)};
m_data += key;
}
else if (length <= 256)
{
m_data += bytes{0x78, static_cast<unsigned char>(length)};
m_data += key;
}
else
solAssert(false, "Text string too large.");
}
void pushByteString(bytes const& key)
{
2019-12-12 23:39:29 +00:00
size_t length = key.size();
if (length < 24)
{
m_data += bytes{static_cast<unsigned char>(0x40 + length)};
m_data += key;
}
else if (length <= 256)
{
m_data += bytes{0x58, static_cast<unsigned char>(length)};
m_data += key;
}
else
solAssert(false, "Byte string too large.");
}
void pushBool(bool value)
{
if (value)
m_data += bytes{0xf5};
else
m_data += bytes{0xf4};
}
unsigned m_entryCount = 0;
bytes m_data;
};
2020-07-28 21:20:49 +00:00
bytes CompilerStack::createCBORMetadata(Contract const& _contract) const
2018-06-22 10:02:50 +00:00
{
if (m_metadataFormat == MetadataFormat::NoMetadata)
return bytes{};
2020-07-28 21:20:49 +00:00
bool const experimentalMode = !onlySafeExperimentalFeaturesActivated(
_contract.contract->sourceUnit().annotation().experimentalFeatures
);
string meta = metadata(_contract);
MetadataCBOREncoder encoder;
2019-09-06 17:11:07 +00:00
if (m_metadataHash == MetadataHash::IPFS)
2020-07-28 21:20:49 +00:00
encoder.pushBytes("ipfs", util::ipfsHash(meta));
2019-09-06 17:11:07 +00:00
else if (m_metadataHash == MetadataHash::Bzzr1)
2020-07-28 21:20:49 +00:00
encoder.pushBytes("bzzr1", util::bzzr1Hash(meta).asBytes());
2019-09-06 17:11:07 +00:00
else
solAssert(m_metadataHash == MetadataHash::None, "Invalid metadata hash");
if (experimentalMode || m_viaIR)
encoder.pushBool("experimental", true);
if (m_metadataFormat == MetadataFormat::WithReleaseVersionTag)
encoder.pushBytes("solc", VersionCompactBytes);
else
{
solAssert(
m_metadataFormat == MetadataFormat::WithPrereleaseVersionTag,
"Invalid metadata format."
);
encoder.pushString("solc", VersionStringStrict);
}
return encoder.serialise();
2018-06-22 10:02:50 +00:00
}
2017-04-10 13:00:24 +00:00
namespace
{
Json::Value gasToJson(GasEstimator::GasConsumption const& _gas)
{
if (_gas.isInfinite)
return Json::Value("infinite");
2017-04-10 13:00:24 +00:00
else
2019-12-11 16:31:36 +00:00
return Json::Value(util::toString(_gas.value));
2017-04-10 13:00:24 +00:00
}
}
Json::Value CompilerStack::gasEstimates(string const& _contractName) const
{
2018-12-18 17:27:38 +00:00
if (m_stackState != CompilationSuccessful)
BOOST_THROW_EXCEPTION(CompilerError() << errinfo_comment("Compilation was not successful."));
2017-04-10 13:00:24 +00:00
if (!assemblyItems(_contractName) && !runtimeAssemblyItems(_contractName))
return Json::Value();
using Gas = GasEstimator::GasConsumption;
GasEstimator gasEstimator(m_evmVersion);
2017-04-10 13:00:24 +00:00
Json::Value output(Json::objectValue);
2019-12-11 16:31:36 +00:00
if (evmasm::AssemblyItems const* items = assemblyItems(_contractName))
2017-04-10 13:00:24 +00:00
{
Gas executionGas = gasEstimator.functionalEstimation(*items);
2019-12-11 16:31:36 +00:00
Gas codeDepositGas{evmasm::GasMeter::dataGas(runtimeObject(_contractName).bytecode, false, m_evmVersion)};
2017-04-10 13:00:24 +00:00
Json::Value creation(Json::objectValue);
creation["codeDepositCost"] = gasToJson(codeDepositGas);
creation["executionCost"] = gasToJson(executionGas);
/// TODO: implement + overload to avoid the need of +=
executionGas += codeDepositGas;
creation["totalCost"] = gasToJson(executionGas);
output["creation"] = creation;
}
2019-12-11 16:31:36 +00:00
if (evmasm::AssemblyItems const* items = runtimeAssemblyItems(_contractName))
2017-04-10 13:00:24 +00:00
{
/// External functions
ContractDefinition const& contract = contractDefinition(_contractName);
Json::Value externalFunctions(Json::objectValue);
for (auto it: contract.interfaceFunctions())
{
string sig = it.second->externalSignature();
externalFunctions[sig] = gasToJson(gasEstimator.functionalEstimation(*items, sig));
2017-04-10 13:00:24 +00:00
}
if (contract.fallbackFunction())
/// This needs to be set to an invalid signature in order to trigger the fallback,
/// without the shortcut (of CALLDATSIZE == 0), and therefore to receive the upper bound.
/// An empty string ("") would work to trigger the shortcut only.
externalFunctions[""] = gasToJson(gasEstimator.functionalEstimation(*items, "INVALID"));
2017-04-10 13:00:24 +00:00
if (!externalFunctions.empty())
output["external"] = externalFunctions;
/// Internal functions
Json::Value internalFunctions(Json::objectValue);
for (auto const& it: contract.definedFunctions())
{
/// Exclude externally visible functions, constructor, fallback and receive ether function
if (it->isPartOfExternalInterface() || !it->isOrdinary())
2017-04-10 13:00:24 +00:00
continue;
size_t entry = functionEntryPoint(_contractName, *it);
GasEstimator::GasConsumption gas = GasEstimator::GasConsumption::infinite();
if (entry > 0)
gas = gasEstimator.functionalEstimation(*items, entry, *it);
2017-04-10 13:00:24 +00:00
2017-07-27 19:55:55 +00:00
/// TODO: This could move into a method shared with externalSignature()
2017-04-10 13:00:24 +00:00
FunctionType type(*it);
string sig = it->name() + "(";
auto paramTypes = type.parameterTypes();
for (auto it = paramTypes.begin(); it != paramTypes.end(); ++it)
sig += (*it)->toString() + (it + 1 == paramTypes.end() ? "" : ",");
sig += ")";
2017-07-27 19:55:55 +00:00
2017-04-10 13:00:24 +00:00
internalFunctions[sig] = gasToJson(gas);
}
if (!internalFunctions.empty())
output["internal"] = internalFunctions;
}
return output;
}