Expressions and Control Structures
Expressions and Control Structures
Control Structures
Most of the control structures known from curly-braces languages are available in Solidity:
There is: if
, else
, while
, do
, for
, break
, continue
, return
, with the usual semantics known from C or JavaScript.
Parentheses can not be omitted for conditionals, but curly brances can be omitted around single-statement bodies.
Note that there is no type conversion from non-boolean to boolean types as there is in C and JavaScript, so if (1) { ... }
is not valid Solidity.
Function Calls
Internal Function Calls
Functions of the current contract can be called directly (“internally”), also recursively, as seen in this nonsensical example:
These function calls are translated into simple jumps inside the EVM. This has the effect that the current memory is not cleared, i.e. passing memory references to internally-called functions is very efficient. Only functions of the same contract can be called internally.
You should still avoid excessive recursion, as every internal function call uses up at least one stack slot and there are at most 1024 slots available.
External Function Calls
The expressions this.g(8);
and c.g(2);
(where c
is a contract instance) are also valid function calls, but this time, the function will be called “externally”, via a message call and not directly via jumps. Please note that function calls on this
cannot be used in the constructor, as the actual contract has not been created yet.
Functions of other contracts have to be called externally. For an external call, all function arguments have to be copied to memory.
A function call from one contract to another does not create its own transaction, it is a message call as part of the overall transaction.
When calling functions of other contracts, you can specify the amount of Wei or gas sent with the call with the special options .value()
and .gas()
, respectively. Any Wei you send to the contract is added to the total balance of the contract:
You need to use the modifier payable
with the info
function because otherwise, the .value()
option would not be available.
Be careful that feed.info.value(10).gas(800)
only locally sets the value
and amount of gas
sent with the function call, and the parentheses at the end perform the actual call. So in this case, the function is not called.
Function calls cause exceptions if the called contract does not exist (in the sense that the account does not contain code) or if the called contract itself throws an exception or goes out of gas.
Any interaction with another contract imposes a potential danger, especially if the source code of the contract is not known in advance. The current contract hands over control to the called contract and that may potentially do just about anything. Even if the called contract inherits from a known parent contract, the inheriting contract is only required to have a correct interface. The implementation of the contract, however, can be completely arbitrary and thus, pose a danger. In addition, be prepared in case it calls into other contracts of your system or even back into the calling contract before the first call returns. This means that the called contract can change state variables of the calling contract via its functions. Write your functions in a way that, for example, calls to external functions happen after any changes to state variables in your contract so your contract is not vulnerable to a reentrancy exploit.
Named Calls and Anonymous Function Parameters
Function call arguments can be given by name, in any order, if they are enclosed in { }
as can be seen in the following example. The argument list has to coincide by name with the list of parameters from the function declaration, but can be in arbitrary order.
Omitted Function Parameter Names
The names of unused parameters (especially return parameters) can be omitted. Those parameters will still be present on the stack, but they are inaccessible.
Creating Contracts via new
new
A contract can create other contracts using the new
keyword. The full code of the contract being created has to be known when the creating contract is compiled so recursive creation-dependencies are not possible.
As seen in the example, it is possible to send Ether while creating an instance of D
using the .value()
option, but it is not possible to limit the amount of gas. If the creation fails (due to out-of-stack, not enough balance or other problems), an exception is thrown.
Order of Evaluation of Expressions
The evaluation order of expressions is not specified (more formally, the order in which the children of one node in the expression tree are evaluated is not specified, but they are of course evaluated before the node itself). It is only guaranteed that statements are executed in order and short-circuiting for boolean expressions is done. See Order of Precedence of Operators for more information.
Assignment
Destructuring Assignments and Returning Multiple Values
Solidity internally allows tuple types, i.e. a list of objects of potentially different types whose number is a constant at compile-time. Those tuples can be used to return multiple values at the same time. These can then either be assigned to newly declared variables or to pre-existing variables (or LValues in general).
Tuples are not proper types in Solidity, they can only be used to form syntactic groupings of expressions.
It is not possible to mix variable declarations and non-declaration assignments, i.e. the following is not valid: (x, uint y) = (1, 2);
Prior to version 0.5.0 it was possible to assign to tuples of smaller size, either filling up on the left or on the right side (which ever was empty). This is now disallowed, so both sides have to have the same number of components.
Be careful when assigning to multiple variables at the same time when reference types are involved, because it could lead to unexpected copying behaviour.
Complications for Arrays and Structs
The semantics of assignments are a bit more complicated for non-value types like arrays and structs. Assigning to a state variable always creates an independent copy. On the other hand, assigning to a local variable creates an independent copy only for elementary types, i.e. static types that fit into 32 bytes. If structs or arrays (including bytes
and string
) are assigned from a state variable to a local variable, the local variable holds a reference to the original state variable. A second assignment to the local variable does not modify the state but only changes the reference. Assignments to members (or elements) of the local variable do change the state.
Scoping and Declarations
A variable which is declared will have an initial default value whose byte-representation is all zeros. The “default values” of variables are the typical “zero-state” of whatever the type is. For example, the default value for a bool
is false
. The default value for the uint
or int
types is 0
. For statically-sized arrays and bytes1
to bytes32
, each individual element will be initialized to the default value corresponding to its type. Finally, for dynamically-sized arrays, bytes
and string
, the default value is an empty array or string.
Scoping in Solidity follows the widespread scoping rules of C99 (and many other languages): Variables are visible from the point right after their declaration until the end of the smallest { }
-block that contains the declaration. As an exception to this rule, variables declared in the initialization part of a for-loop are only visible until the end of the for-loop.
Variables and other items declared outside of a code block, for example functions, contracts, user-defined types, etc., are visible even before they were declared. This means you can use state variables before they are declared and call functions recursively.
As a consequence, the following examples will compile without warnings, since the two variables have the same name but disjoint scopes.
As a special example of the C99 scoping rules, note that in the following, the first assignment to x
will actually assign the outer and not the inner variable. In any case, you will get a warning about the outer variable being shadowed.
Before version 0.5.0 Solidity followed the same scoping rules as JavaScript, that is, a variable declared anywhere within a function would be in scope for the entire function, regardless where it was declared. The following example shows a code snippet that used to compile but leads to an error starting from version 0.5.0.
Error handling: Assert, Require, Revert and Exceptions
Solidity uses state-reverting exceptions to handle errors. Such an exception will undo all changes made to the state in the current call (and all its sub-calls) and also flag an error to the caller. The convenience functions assert
and require
can be used to check for conditions and throw an exception if the condition is not met. The assert
function should only be used to test for internal errors, and to check invariants. The require
function should be used to ensure valid conditions, such as inputs, or contract state variables are met, or to validate return values from calls to external contracts. If used properly, analysis tools can evaluate your contract to identify the conditions and function calls which will reach a failing assert
. Properly functioning code should never reach a failing assert statement; if this happens there is a bug in your contract which you should fix.
There are two other ways to trigger exceptions: The revert
function can be used to flag an error and revert the current call. It is possible to provide a string message containing details about the error that will be passed back to the caller.
There used to be a keyword called throw
with the same semantics as revert()
which was deprecated in version 0.4.13 and removed in version 0.5.0.
When exceptions happen in a sub-call, they “bubble up” (i.e. exceptions are rethrown) automatically. Exceptions to this rule are send
and the low-level functions call
, delegatecall
and staticcall
– those return false
as their first return value in case of an exception instead of “bubbling up”.
The low-level functions call
, delegatecall
and staticcall
return true
as their first return value if the called account is non-existent, as part of the design of EVM. Existence must be checked prior to calling if desired.
Catching exceptions is not yet possible.
In the following example, you can see how require
can be used to easily check conditions on inputs and how assert
can be used for internal error checking. Note that you can optionally provide a message string for require
, but not for assert
.
An assert
-style exception is generated in the following situations:
If you access an array at a too large or negative index (i.e.
x[i]
wherei >= x.length
ori < 0
).If you access a fixed-length
bytesN
at a too large or negative index.If you divide or modulo by zero (e.g.
5 / 0
or23 % 0
).If you shift by a negative amount.
If you convert a value too big or negative into an enum type.
If you call a zero-initialized variable of internal function type.
If you call
assert
with an argument that evaluates to false.
A require
-style exception is generated in the following situations:
Calling
require
with an argument that evaluates tofalse
.If you call a function via a message call but it does not finish properly (i.e. it runs out of gas, has no matching function, or throws an exception itself), except when a low level operation
call
,send
,delegatecall
,callcode
orstaticcall
is used. The low level operations never throw exceptions but indicate failures by returningfalse
.If you create a contract using the
new
keyword but the contract creation does not finish properly (see above for the definition of “not finish properly”).If you perform an external function call targeting a contract that contains no code.
If your contract receives Ether via a public function without
payable
modifier (including the constructor and the fallback function).If your contract receives Ether via a public getter function.
If a
.transfer()
fails.
Internally, Solidity performs a revert operation (instruction 0xfd
) for a require
-style exception and executes an invalid operation (instruction 0xfe
) to throw an assert
-style exception. In both cases, this causes the EVM to revert all changes made to the state. The reason for reverting is that there is no safe way to continue execution, because an expected effect did not occur. Because we want to retain the atomicity of transactions, the safest thing to do is to revert all changes and make the whole transaction (or at least call) without effect. Note that assert
-style exceptions consume all gas available to the call, while require
-style exceptions will not consume any gas starting from the Metropolis release.
The following example shows how an error string can be used together with revert and require:
The provided string will be abi-encoded as if it were a call to a function Error(string)
. In the above example, revert("Not enough Ether provided.");
will cause the following hexadecimal data be set as error return data:
Last updated