diff options
author | chriseth <chris@ethereum.org> | 2017-10-18 17:59:40 +0800 |
---|---|---|
committer | GitHub <noreply@github.com> | 2017-10-18 17:59:40 +0800 |
commit | e854da1a8c2253704e412214e8115fd1c1c819f2 (patch) | |
tree | edc7f6a7cd392ee4681c16536f7692a05a4f1de4 | |
parent | e247524bd563371e2ed2b871a0185ad033c1de24 (diff) | |
parent | 8a8a71de84f5bd71fcea4d31d5a53fde7820ead6 (diff) | |
download | dexon-solidity-e854da1a8c2253704e412214e8115fd1c1c819f2.tar dexon-solidity-e854da1a8c2253704e412214e8115fd1c1c819f2.tar.gz dexon-solidity-e854da1a8c2253704e412214e8115fd1c1c819f2.tar.bz2 dexon-solidity-e854da1a8c2253704e412214e8115fd1c1c819f2.tar.lz dexon-solidity-e854da1a8c2253704e412214e8115fd1c1c819f2.tar.xz dexon-solidity-e854da1a8c2253704e412214e8115fd1c1c819f2.tar.zst dexon-solidity-e854da1a8c2253704e412214e8115fd1c1c819f2.zip |
Merge pull request #2925 from ethereum/tuple-value-check
Validate each tuple literal
-rw-r--r-- | Changelog.md | 1 | ||||
-rw-r--r-- | libsolidity/analysis/TypeChecker.cpp | 6 | ||||
-rw-r--r-- | test/libsolidity/SolidityNameAndTypeResolution.cpp | 49 |
3 files changed, 55 insertions, 1 deletions
diff --git a/Changelog.md b/Changelog.md index c9e76ee5..f4caefd8 100644 --- a/Changelog.md +++ b/Changelog.md @@ -24,6 +24,7 @@ Bugfixes: * Type Checker: Prevent duplicate event declarations. * Type Checker: Do not mark event parameters as shadowing state variables. * Type Checker: Allow ``gas`` in view functions. + * Type Checker: Validate each number literal in tuple expressions even if they are not assigned from. ### 0.4.17 (2017-09-21) diff --git a/libsolidity/analysis/TypeChecker.cpp b/libsolidity/analysis/TypeChecker.cpp index c2fba565..746e762e 100644 --- a/libsolidity/analysis/TypeChecker.cpp +++ b/libsolidity/analysis/TypeChecker.cpp @@ -1293,6 +1293,12 @@ bool TypeChecker::visit(TupleExpression const& _tuple) { components[i]->accept(*this); types.push_back(type(*components[i])); + + // Note: code generation will visit each of the expression even if they are not assigned from. + if (types[i]->category() == Type::Category::RationalNumber && components.size() > 1) + if (!dynamic_cast<RationalNumberType const&>(*types[i]).mobileType()) + m_errorReporter.fatalTypeError(components[i]->location(), "Invalid rational number."); + if (_tuple.isInlineArray()) solAssert(!!types[i], "Inline array cannot have empty components"); if (_tuple.isInlineArray()) diff --git a/test/libsolidity/SolidityNameAndTypeResolution.cpp b/test/libsolidity/SolidityNameAndTypeResolution.cpp index 2c720d03..9b0647bf 100644 --- a/test/libsolidity/SolidityNameAndTypeResolution.cpp +++ b/test/libsolidity/SolidityNameAndTypeResolution.cpp @@ -5537,7 +5537,7 @@ BOOST_AUTO_TEST_CASE(invalid_mobile_type) } } )"; - CHECK_ERROR(text, TypeError, "Invalid mobile type."); + CHECK_ERROR(text, TypeError, "Invalid rational number."); } BOOST_AUTO_TEST_CASE(warns_msg_value_in_non_payable_public_function) @@ -7096,6 +7096,53 @@ BOOST_AUTO_TEST_CASE(non_external_fallback) CHECK_ERROR(text, TypeError, "Fallback function must be defined as \"external\"."); } +BOOST_AUTO_TEST_CASE(invalid_literal_in_tuple) +{ + char const* text = R"( + contract C { + function f() pure public { + uint x; + (x, ) = (1E111); + } + } + )"; + CHECK_ERROR(text, TypeError, "is not implicitly convertible to expected type"); + text = R"( + contract C { + function f() pure public { + uint x; + (x, ) = (1, 1E111); + } + } + )"; + CHECK_ERROR(text, TypeError, "Invalid rational number."); + text = R"( + contract C { + function f() pure public { + uint x; + (x, ) = (1E111, 1); + } + } + )"; + CHECK_ERROR(text, TypeError, "Invalid rational number."); + text = R"( + contract C { + function f() pure public { + (2**270, 1); + } + } + )"; + CHECK_ERROR(text, TypeError, "Invalid rational number."); + text = R"( + contract C { + function f() pure public { + ((2**270) / 2**100, 1); + } + } + )"; + CHECK_SUCCESS(text); +} + BOOST_AUTO_TEST_CASE(warn_about_sha3) { char const* text = R"( |