Erik Kundt
a69a344d70
Adjusts documentation to read-only array length.
2019-11-19 21:11:14 +01:00
Daniel Kirchner
3321fc56ea
Split fallback function and introduce "fallback()" and "receive()" syntax.
2019-11-04 17:17:58 +01:00
Erik Kundt
ec53899a10
Fixes source extraction from docs.
2019-10-23 22:13:24 +02:00
Leonardo Alt
df0b54d7c7
[DOCS] Clearing mappings
2019-09-17 11:58:00 +02:00
Guy
2734eae6fb
Added a reference to an extended list of security recommendations.
2019-05-22 10:56:25 +03:00
Chris Ward
dfeb1dec9e
Add rounding warning
...
Move warning
2019-04-04 16:41:07 +02:00
Leonardo Alt
9a612d1250
[SMTChecker] Docs
2019-03-27 16:31:51 +01:00
chriseth
8d401ba936
Update pragmas.
2019-03-05 18:10:09 +01:00
Chris Ward
96fae0c220
Move FAQ item about truncation checks
...
Move warning
Updates from feedback
Link to security note and fix link rendering
Move solution to security docs and turn warning to a warning
2019-01-22 13:54:58 +02:00
Chris Ward
cefc6c433e
Update non-existant pragma 0.4.99 to 0.5.0
...
Use correct syntax for pragma
Change pragma syntax
One more change to pragma syntax
2019-01-07 14:20:10 +01:00
chriseth
4e69ff2ee5
[DOCS] Security updates.
2018-09-27 16:19:21 +02:00
chriseth
b43e9f27f8
Pitfalls regarding over/underflows
2018-09-27 14:55:05 +02:00
Alex Beregszaszi
e3e9ce53d7
Set 0.5.x specific example code to be compilable with >0.4.99 <0.6.0 (e.g. 0.5.x only)
2018-09-25 19:04:34 +01:00
Alex Beregszaszi
3ca00c73f9
Update version pragma in all documentation examples
2018-09-25 19:03:25 +01:00
Daniel Kirchner
12aaca1645
Add payable and non-payable state mutability to AddressType.
2018-09-13 15:15:49 +02:00
Daniel Kirchner
cf69433f23
Update documentation.
2018-09-04 13:31:10 +02:00
Daniel Kirchner
db48925907
Add some more documentation.
2018-08-15 17:06:42 +02:00
Chris Ward
0ad646635f
Small clarifications around the 2300 gas stipend from transfer and send
2018-08-01 16:21:29 +01:00
Christian Parpart
396bf11858
enforce interface-functions to be external-declared
...
- libsolidity: Enforce interface-functions must be external-declared.
- Changelog adapted to reflect changes wrt. functions in interfaces.
- test: Adjustments according to prior interface-function changes.
- tests: Adapting SolidityEndToEndTest to interface-function change.
- docs: Adapted documentation to interface-function change.
2018-07-16 12:15:36 +02:00
Christian Parpart
133fbdbf18
documentation: adjustments to not use the "var" keyword
2018-07-03 10:53:09 +02:00
Erik Kundt
2031e8e0c1
Adds review suggestions.
2018-07-02 16:46:54 +02:00
Erik Kundt
e16e37f507
Updates docs to new constructor syntax.
2018-07-02 16:25:54 +02:00
chriseth
eeef82b2d7
Fallback function has to be external: backwards-compatible changes.
2018-06-29 00:23:52 +02:00
chriseth
17493e64ed
Documentation.
2018-06-25 17:17:18 +02:00
Daniel Kirchner
1a014f83cc
Prefer view over constant in the documentation.
2018-05-09 15:06:47 +02:00
chriseth
3710fb59f0
Update security considerations.
2018-04-17 12:04:36 +02:00
Jim McDonald
6e521d59b0
Fix Solidity warnings
2017-12-12 18:47:30 +00:00
Alex Beregszaszi
37b06884b2
Correct that ether transfers _can_ always include code execution in re-entrancy example
2017-12-12 03:31:30 +00:00
Evgeny Medvedev
2f6f81640b
Add another contract with call to demonstrate re-entrancy vulnerability.
...
Add another contract with call to demonstrate re-entrancy vulnerability as send explicitly sets gas to 2300 by default according to this commit 9ca7472
which makes it impossible to "get multiple refunds" because a non-zero CALL costs at least 9700 gas. This issue is discussed on Ethereum StackExchange https://ethereum.stackexchange.com/questions/30371/send-ether-reentrancy-attack-in-reality-how-could-fallback-function-make-a-mes/30616#30616
2017-12-12 03:31:00 +00:00
Alex Beregszaszi
23379e1061
Ensure each code snippet in the docs can be extracted for tests
2017-11-22 04:08:35 +00:00
Yoichi Hirai
a20e5fc048
Merge pull request #2636 from ethereum/docs-random
...
Random documentation fixes
2017-07-27 11:30:12 +02:00
Skiral Inc
7f7927fd1d
fix misspell
2017-07-26 16:17:43 -07:00
Alex Beregszaszi
106763d08e
Remove reference to Why3
2017-07-26 23:05:09 +01:00
Alex Beregszaszi
41e5b2c3c2
Fix bugs in example contracts
2017-07-13 21:47:29 +02:00
chriseth
d58a4e08da
Corrections and some style.
2017-05-03 11:07:15 +01:00
chriseth
7e838fd4a8
Cleanup to make the docs more consistent.
2017-05-03 12:03:02 +02:00
Matt Wisniewski
2b4b86aa7f
Update common-patterns.rst
2017-05-03 12:03:02 +02:00
chriseth
11d30ec04f
Some changes after review.
2017-04-18 11:40:00 +02:00
chriseth
291ece2bdb
List of known bugs.
2017-04-12 12:23:34 +02:00
Alex Beregszaszi
a0d6ac63cc
Replace references to browser-solidity with Remix
2017-03-15 22:58:14 +00:00
Alex Beregszaszi
111d33d7ac
Rename sha3 to keccak256 in the documentation
2016-10-06 16:34:41 +02:00
D-Nice
b4c2880bff
Typo Fix
...
On line 126, though of changed to thought of.
2016-10-03 17:28:03 -04:00
chriseth
057db59844
Review suggestions.
2016-09-07 12:20:35 +02:00
chriseth
4f5a95d569
Update documentation to version 0.4.0.
2016-09-06 19:11:41 +02:00
Dimitry
183cd70c47
add "pragma solidity ^0.4.0;" to code examples
2016-09-05 14:54:54 +03:00
chriseth
eb241ff1b3
Documentation.
2016-08-30 15:32:28 +02:00
Denton Liu
ac799aff0e
Remove trailing whitespaces
2016-08-24 11:43:55 -04:00
Denton Liu
82365f21c0
Link to withdraw pattern
2016-08-10 10:40:55 -04:00
Denton Liu
efb48659dd
Add section about withdrawal pattern
2016-08-10 10:40:55 -04:00
DennisBPeterson
6a6f0623b0
Added tx.origin caution
2016-07-21 17:06:53 -04:00
chriseth
e10297a2ef
Merge pull request #704 from ethereum/malleability
...
Expanded malleability risks.
2016-07-18 19:34:35 +02:00
Denton Liu
d94d2fc901
Repharse sentence
2016-07-08 12:27:04 -04:00
Denton Liu
ab3531ffc3
Incorporate corrections
2016-07-07 13:53:57 -04:00
chriseth
b71144dd53
Expanded malleability risks.
2016-07-06 18:33:38 +02:00
Denton Liu
811980afe6
Reformat code
2016-07-05 11:55:09 -04:00
Denton Liu
70e5af11ef
Correct grammar and language
2016-07-05 11:55:09 -04:00
chriseth
3b494348ea
Fixes.
2016-07-04 15:39:31 +02:00
chriseth
2df142c496
Security Considerations
2016-07-04 15:27:53 +02:00