Commit Graph

108 Commits

Author SHA1 Message Date
Erik Kundt
a69a344d70 Adjusts documentation to read-only array length. 2019-11-19 21:11:14 +01:00
Daniel Kirchner
3321fc56ea Split fallback function and introduce "fallback()" and "receive()" syntax. 2019-11-04 17:17:58 +01:00
Erik Kundt
ec53899a10 Fixes source extraction from docs. 2019-10-23 22:13:24 +02:00
Leonardo Alt
df0b54d7c7 [DOCS] Clearing mappings 2019-09-17 11:58:00 +02:00
Guy
2734eae6fb Added a reference to an extended list of security recommendations. 2019-05-22 10:56:25 +03:00
Chris Ward
dfeb1dec9e Add rounding warning
Move warning
2019-04-04 16:41:07 +02:00
Leonardo Alt
9a612d1250 [SMTChecker] Docs 2019-03-27 16:31:51 +01:00
chriseth
8d401ba936 Update pragmas. 2019-03-05 18:10:09 +01:00
Chris Ward
96fae0c220 Move FAQ item about truncation checks
Move warning

Updates from feedback

Link to security note and fix link rendering

Move solution to security docs and turn warning to a warning
2019-01-22 13:54:58 +02:00
Chris Ward
cefc6c433e Update non-existant pragma 0.4.99 to 0.5.0
Use correct syntax for pragma

Change pragma syntax

One more change to pragma syntax
2019-01-07 14:20:10 +01:00
chriseth
4e69ff2ee5 [DOCS] Security updates. 2018-09-27 16:19:21 +02:00
chriseth
b43e9f27f8 Pitfalls regarding over/underflows 2018-09-27 14:55:05 +02:00
Alex Beregszaszi
e3e9ce53d7 Set 0.5.x specific example code to be compilable with >0.4.99 <0.6.0 (e.g. 0.5.x only) 2018-09-25 19:04:34 +01:00
Alex Beregszaszi
3ca00c73f9 Update version pragma in all documentation examples 2018-09-25 19:03:25 +01:00
Daniel Kirchner
12aaca1645 Add payable and non-payable state mutability to AddressType. 2018-09-13 15:15:49 +02:00
Daniel Kirchner
cf69433f23 Update documentation. 2018-09-04 13:31:10 +02:00
Daniel Kirchner
db48925907 Add some more documentation. 2018-08-15 17:06:42 +02:00
Chris Ward
0ad646635f Small clarifications around the 2300 gas stipend from transfer and send 2018-08-01 16:21:29 +01:00
Christian Parpart
396bf11858 enforce interface-functions to be external-declared
- libsolidity: Enforce interface-functions must be external-declared.
- Changelog adapted to reflect changes wrt. functions in interfaces.
- test: Adjustments according to prior interface-function changes.
- tests: Adapting SolidityEndToEndTest to interface-function change.
- docs: Adapted documentation to interface-function change.
2018-07-16 12:15:36 +02:00
Christian Parpart
133fbdbf18 documentation: adjustments to not use the "var" keyword 2018-07-03 10:53:09 +02:00
Erik Kundt
2031e8e0c1 Adds review suggestions. 2018-07-02 16:46:54 +02:00
Erik Kundt
e16e37f507 Updates docs to new constructor syntax. 2018-07-02 16:25:54 +02:00
chriseth
eeef82b2d7 Fallback function has to be external: backwards-compatible changes. 2018-06-29 00:23:52 +02:00
chriseth
17493e64ed Documentation. 2018-06-25 17:17:18 +02:00
Daniel Kirchner
1a014f83cc Prefer view over constant in the documentation. 2018-05-09 15:06:47 +02:00
chriseth
3710fb59f0 Update security considerations. 2018-04-17 12:04:36 +02:00
Jim McDonald
6e521d59b0 Fix Solidity warnings 2017-12-12 18:47:30 +00:00
Alex Beregszaszi
37b06884b2 Correct that ether transfers _can_ always include code execution in re-entrancy example 2017-12-12 03:31:30 +00:00
Evgeny Medvedev
2f6f81640b Add another contract with call to demonstrate re-entrancy vulnerability.
Add another contract with call to demonstrate re-entrancy vulnerability as send explicitly sets gas to 2300 by default according to this commit 9ca7472 which makes it impossible to "get multiple refunds" because a non-zero CALL costs at least 9700 gas. This issue is discussed on Ethereum StackExchange https://ethereum.stackexchange.com/questions/30371/send-ether-reentrancy-attack-in-reality-how-could-fallback-function-make-a-mes/30616#30616
2017-12-12 03:31:00 +00:00
Alex Beregszaszi
23379e1061 Ensure each code snippet in the docs can be extracted for tests 2017-11-22 04:08:35 +00:00
Yoichi Hirai
a20e5fc048 Merge pull request #2636 from ethereum/docs-random
Random documentation fixes
2017-07-27 11:30:12 +02:00
Skiral Inc
7f7927fd1d fix misspell 2017-07-26 16:17:43 -07:00
Alex Beregszaszi
106763d08e Remove reference to Why3 2017-07-26 23:05:09 +01:00
Alex Beregszaszi
41e5b2c3c2 Fix bugs in example contracts 2017-07-13 21:47:29 +02:00
chriseth
d58a4e08da Corrections and some style. 2017-05-03 11:07:15 +01:00
chriseth
7e838fd4a8 Cleanup to make the docs more consistent. 2017-05-03 12:03:02 +02:00
Matt Wisniewski
2b4b86aa7f Update common-patterns.rst 2017-05-03 12:03:02 +02:00
chriseth
11d30ec04f Some changes after review. 2017-04-18 11:40:00 +02:00
chriseth
291ece2bdb List of known bugs. 2017-04-12 12:23:34 +02:00
Alex Beregszaszi
a0d6ac63cc Replace references to browser-solidity with Remix 2017-03-15 22:58:14 +00:00
Alex Beregszaszi
111d33d7ac Rename sha3 to keccak256 in the documentation 2016-10-06 16:34:41 +02:00
D-Nice
b4c2880bff Typo Fix
On line 126, though of changed to thought of.
2016-10-03 17:28:03 -04:00
chriseth
057db59844 Review suggestions. 2016-09-07 12:20:35 +02:00
chriseth
4f5a95d569 Update documentation to version 0.4.0. 2016-09-06 19:11:41 +02:00
Dimitry
183cd70c47 add "pragma solidity ^0.4.0;" to code examples 2016-09-05 14:54:54 +03:00
chriseth
eb241ff1b3 Documentation. 2016-08-30 15:32:28 +02:00
Denton Liu
ac799aff0e Remove trailing whitespaces 2016-08-24 11:43:55 -04:00
Denton Liu
82365f21c0 Link to withdraw pattern 2016-08-10 10:40:55 -04:00
Denton Liu
efb48659dd Add section about withdrawal pattern 2016-08-10 10:40:55 -04:00
DennisBPeterson
6a6f0623b0 Added tx.origin caution 2016-07-21 17:06:53 -04:00
chriseth
e10297a2ef Merge pull request #704 from ethereum/malleability
Expanded malleability risks.
2016-07-18 19:34:35 +02:00
Denton Liu
d94d2fc901 Repharse sentence 2016-07-08 12:27:04 -04:00
Denton Liu
ab3531ffc3 Incorporate corrections 2016-07-07 13:53:57 -04:00
chriseth
b71144dd53 Expanded malleability risks. 2016-07-06 18:33:38 +02:00
Denton Liu
811980afe6 Reformat code 2016-07-05 11:55:09 -04:00
Denton Liu
70e5af11ef Correct grammar and language 2016-07-05 11:55:09 -04:00
chriseth
3b494348ea Fixes. 2016-07-04 15:39:31 +02:00
chriseth
2df142c496 Security Considerations 2016-07-04 15:27:53 +02:00