Contributing
Help is always appreciated!
To get started, you can try Building from Source in order to familiarize yourself with the components of Solidity and the build process. Also, it may be useful to become well-versed at writing smart-contracts in Solidity.
In particular, we need help in the following areas:
Improving the documentation
Responding to questions from other users on StackExchange and the Solidity Gitter
Fixing and responding to Solidity’s GitHub issues, especially those tagged as good first issue which are meant as introductory issues for external contributors.
Please note that this project is released with a Contributor Code of Conduct. By participating in this project - in the issues, pull requests, or Gitter channels - you agree to abide by its terms.
How to Report Issues
To report an issue, please use the GitHub issues tracker. When reporting issues, please mention the following details:
Which version of Solidity you are using
What was the source code (if applicable)
Which platform are you running on
How to reproduce the issue
What was the result of the issue
What the expected behaviour is
Reducing the source code that caused the issue to a bare minimum is always very helpful and sometimes even clarifies a misunderstanding.
Workflow for Pull Requests
In order to contribute, please fork off of the develop
branch and make your changes there. Your commit messages should detail why you made your change in addition to what you did (unless it is a tiny change).
If you need to pull in any changes from develop
after making your fork (for example, to resolve potential merge conflicts), please avoid using git merge
and instead, git rebase
your branch. This will help us review your change more easily.
Additionally, if you are writing a new feature, please ensure you add appropriate test cases under test/
(see below).
However, if you are making a larger change, please consult with the Solidity Development Gitter channel (different from the one mentioned above, this one is focused on compiler and language development instead of language use) first.
New features and bugfixes should be added to the Changelog.md
file: please follow the style of previous entries, when applicable.
Finally, please make sure you respect the coding style for this project. Also, even though we do CI testing, please test your code and ensure that it builds locally before submitting a pull request.
Thank you for your help!
Running the compiler tests
The ./scripts/tests.sh
script executes most Solidity tests and runs aleth
automatically if it is in the path, but does not download it, so you need to install it first. Please read on for the details.
Solidity includes different types of tests, most of them bundled into the soltest
application. Some of them require the aleth
client in testing mode, others require libz3
.
To run a basic set of tests that require neither aleth
nor libz3
, run ./scripts/soltest.sh --no-ipc --no-smt
. This script runs ./build/test/soltest
internally.
Those working in a Windows environment wanting to run the above basic sets without aleth or libz3 in Git Bash, you would have to do: ./build/test/RelWithDebInfo/soltest.exe -- --no-ipc --no-smt
. If you’re running this in plain Command Prompt, use .\build\test\RelWithDebInfo\soltest.exe -- --no-ipc --no-smt
.
The option --no-smt
disables the tests that require libz3
and --no-ipc
disables those that require aleth
.
If you want to run the ipc tests (that test the semantics of the generated code), you need to install aleth and run it in testing mode: aleth --test -d /tmp/testeth
(make sure to rename it).
To run the actual tests, use: ./scripts/soltest.sh --ipcpath /tmp/testeth/geth.ipc
.
To run a subset of tests, you can use filters: ./scripts/soltest.sh -t TestSuite/TestName --ipcpath /tmp/testeth/geth.ipc
, where TestName
can be a wildcard *
.
For example, here’s an example test you might run; ./scripts/soltest.sh -t "yulOptimizerTests/disambiguator/*" --no-ipc --no-smt
. This will test all the tests for the disambiguator.
To get a list of all tests, use ./build/test/soltest --list_content=HRF -- --ipcpath /tmp/irrelevant
.
If you want to debug using GDB, make sure you build differently than the “usual”. For example, you could run the following command in your build
folder:
This will create symbols such that when you debug a test using the --debug
flag, you will have acecess to functions and varialbes in which you can break or print with.
The script ./scripts/tests.sh
also runs commandline tests and compilation tests in addition to those found in soltest
.
The CI runs additional tests (including solc-js
and testing third party Solidity frameworks) that require compiling the Emscripten target.
You can not use some versions of aleth
for testing. We suggest using the same version that the Solidity continuous integration tests use. Currently the CI uses d661ac4fec0aeffbedcdc195f67f5ded0c798278
of aleth
.
Writing and running syntax tests
Syntax tests check that the compiler generates the correct error messages for invalid code and properly accepts valid code. They are stored in individual files inside the tests/libsolidity/syntaxTests
folder. These files must contain annotations, stating the expected result(s) of the respective test. The test suite compiles and checks them against the given expectations.
For example: ./test/libsolidity/syntaxTests/double_stateVariable_declaration.sol
A syntax test must contain at least the contract under test itself, followed by the separator // ----
. The comments that follow the separator are used to describe the expected compiler errors or warnings. The number range denotes the location in the source where the error occurred. If you want the contract to compile without any errors or warning you can leave out the separator and the comments that follow it.
In the above example, the state variable variable
was declared twice, which is not allowed. This results in a DeclarationError
stating that the identifier was already declared.
The isoltest
tool is used for these tests and you can find it under ./build/test/tools/
. It is an interactive tool which allows editing of failing contracts using your preferred text editor. Let’s try to break this test by removing the second declaration of variable
:
Running ./build/test/isoltest
again results in a test failure:
isoltest
prints the expected result next to the obtained result, and also provides a way to edit, update or skip the current contract file, or quit the application.
It offers several options for failing tests:
edit
:isoltest
tries to open the contract in an editor so you can adjust it. It either uses the editor given on the command line (asisoltest --editor /path/to/editor
), in the environment variableEDITOR
or just/usr/bin/editor
(in that order).update
: Updates the expectations for contract under test. This updates the annotations by removing unmet expectations and adding missing expectations. The test is then run again.skip
: Skips the execution of this particular test.quit
: Quitsisoltest
.
All of these options apply to the current contract, expect quit
which stops the entire testing process.
Automatically updating the test above changes it to
and re-run the test. It now passes again:
Choose a name for the contract file that explains what it tests, e.g. double_variable_declaration.sol
. Do not put more than one contract into a single file, unless you are testing inheritance or cross-contract calls. Each file should test one aspect of your new feature.
Running the Fuzzer via AFL
Fuzzing is a technique that runs programs on more or less random inputs to find exceptional execution states (segmentation faults, exceptions, etc). Modern fuzzers are clever and run a directed search inside the input. We have a specialized binary called solfuzzer
which takes source code as input and fails whenever it encounters an internal compiler error, segmentation fault or similar, but does not fail if e.g., the code contains an error. This way, fuzzing tools can find internal problems in the compiler.
We mainly use AFL for fuzzing. You need to download and install the AFL packages from your repositories (afl, afl-clang) or build them manually. Next, build Solidity (or just the solfuzzer
binary) with AFL as your compiler:
At this stage you should be able to see a message similar to the following:
If the instrumentation messages did not appear, try switching the cmake flags pointing to AFL’s clang binaries:
Otherwise, upon execution the fuzzer halts with an error saying binary is not instrumented:
Next, you need some example source files. This makes it much easier for the fuzzer to find errors. You can either copy some files from the syntax tests or extract test files from the documentation or the other tests:
The AFL documentation states that the corpus (the initial input files) should not be too large. The files themselves should not be larger than 1 kB and there should be at most one input file per functionality, so better start with a small number of. There is also a tool called afl-cmin
that can trim input files that result in similar behaviour of the binary.
Now run the fuzzer (the -m
extends the size of memory to 60 MB):
The fuzzer creates source files that lead to failures in /tmp/fuzzer_reports
. Often it finds many similar source files that produce the same error. You can use the tool scripts/uniqueErrors.sh
to filter out the unique errors.
Whiskers
Whiskers is a string templating system similar to Mustache. It is used by the compiler in various places to aid readability, and thus maintainability and verifiability, of the code.
The syntax comes with a substantial difference to Mustache. The template markers {{
and }}
are replaced by <
and >
in order to aid parsing and avoid conflicts with Inline Assembly (The symbols <
and >
are invalid in inline assembly, while {
and }
are used to delimit blocks). Another limitation is that lists are only resolved one depth and they do not recurse. This may change in the future.
A rough specification is the following:
Any occurrence of is replaced by the string-value of the supplied variable name
without any escaping and without iterated replacements. An area can be delimited by <#name>...
. It is replaced by as many concatenations of its contents as there were sets of variables supplied to the template system, each time replacing any items by their respective value. Top-level variables can also be used inside such areas.
Last updated