diff options
author | Leonardo Alt <leo@ethereum.org> | 2018-07-05 20:32:32 +0800 |
---|---|---|
committer | Leonardo Alt <leo@ethereum.org> | 2018-07-12 18:53:49 +0800 |
commit | 3ebfcae8292da1d9f41ff20da1866c424404ee58 (patch) | |
tree | 0b6845c1598d81ed72ebe2b2d44272f6f51f284c /docs/contracts.rst | |
parent | c438b73f689b904152f4b8b636579317fb55e60a (diff) | |
download | dexon-solidity-3ebfcae8292da1d9f41ff20da1866c424404ee58.tar.gz dexon-solidity-3ebfcae8292da1d9f41ff20da1866c424404ee58.tar.zst dexon-solidity-3ebfcae8292da1d9f41ff20da1866c424404ee58.zip |
Update external tests and docs
Diffstat (limited to 'docs/contracts.rst')
-rw-r--r-- | docs/contracts.rst | 17 |
1 files changed, 8 insertions, 9 deletions
diff --git a/docs/contracts.rst b/docs/contracts.rst index a745bea8..e3dd04be 100644 --- a/docs/contracts.rst +++ b/docs/contracts.rst @@ -406,7 +406,7 @@ Constant State Variables State variables can be declared as ``constant``. In this case, they have to be assigned from an expression which is a constant at compile time. Any expression -that accesses storage, blockchain data (e.g. ``now``, ``this.balance`` or +that accesses storage, blockchain data (e.g. ``now``, ``address(this).balance`` or ``block.number``) or execution data (``msg.value`` or ``gasleft()``) or make calls to external contracts are disallowed. Expressions that might have a side-effect on memory allocation are allowed, but those that @@ -497,7 +497,7 @@ Functions can be declared ``pure`` in which case they promise not to read from o In addition to the list of state modifying statements explained above, the following are considered reading from the state: #. Reading from state variables. -#. Accessing ``this.balance`` or ``<address>.balance``. +#. Accessing ``address(this).balance`` or ``<address>.balance``. #. Accessing any of the members of ``block``, ``tx``, ``msg`` (with the exception of ``msg.sig`` and ``msg.data``). #. Calling any function not marked ``pure``. #. Using inline assembly that contains certain opcodes. @@ -571,7 +571,7 @@ Like any function, the fallback function can execute complex operations as long but do not define a fallback function throw an exception, sending back the Ether (this was different before Solidity v0.4.0). So if you want your contract to receive Ether, - you have to implement a fallback function. + you have to implement a payable fallback function. .. warning:: A contract without a payable fallback function can receive Ether as a recipient of a `coinbase transaction` (aka `miner block reward`) @@ -579,11 +579,11 @@ Like any function, the fallback function can execute complex operations as long A contract cannot react to such Ether transfers and thus also cannot reject them. This is a design choice of the EVM and Solidity cannot work around it. - It also means that ``this.balance`` can be higher than the sum of some manual accounting implemented in a contract (i.e. having a counter updated in the fallback function). + It also means that ``address(this).balance`` can be higher than the sum of some manual accounting implemented in a contract (i.e. having a counter updated in the fallback function). :: - pragma solidity ^0.4.0; + pragma solidity >0.4.24; contract Test { // This function is called for all messages sent to @@ -604,14 +604,13 @@ Like any function, the fallback function can execute complex operations as long contract Caller { function callTest(Test test) public { - test.call(abi.encodeWithSignature("nonExistingFunction()")); + address(test).call(abi.encodeWithSignature("nonExistingFunction()")); // results in test.x becoming == 1. - // The following will not compile, but even - // if someone sends ether to that contract, + // If someone sends ether to that contract, // the transaction will fail and reject the // Ether. - //test.send(2 ether); + address(test).send(2 ether); } } |