-
Notifications
You must be signed in to change notification settings - Fork 24
Constructor Documentation #11
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
The wasm code generated by SOLL is ready to deploy on the chain, which means the original Token contract is compiled into wasm binary format and is wrapped by a ewasm deployer (See the bottom section). SOLL uses the standard ABI for ETH 1.0 on runtime wasm bytecode. You can find the runtime wasm bytecode in your first decompiled wasm code. It will be located in the Or, using |
I see, but the ewasm deployer currently is embedded in SOLL right? In the sense that there is no sentinel contract as described in the eWasm docs. btw: how did you guys handle ewasm-precompiles? Like SHA1 SHA2 SHA3 operations that are native to EVM and now wasm |
Yes, the ewasm deployer is embedded in SOLL just like Solidity compiler does. When users want to deploy a smart contract on the chain, the deployed code should a deployer which contains its real runtime bytecode. You can use When users submit a transaction to deploy a smart contract, they have to use the deployment bytecode. When the ethereum client receives the deployment bytecode, it will (i) execute this contract to set up some initial value in this contract's storage and (ii) put the runtime bytecode into the contract's code section. Both the deployment and runtime bytecode are executed by ewasm VM, that's why they both adopt ECI.
The precompiles will be a list of smart contract addresses. When we have to call the precompiles, we just make a function call like |
I understand that in eWasm design doc it lists all the system contracts, but for now we cannot exactly use them since they have not been deployed. So for SOLL contracts we cannot test the SHA1 etc,. operations, which is also described in SOLL's developers guide that keccak256 such is not implemented. But if so, how did your example 0-0-3 work? Since it uses btw: do you know which file is the "ewasm deployer" embedded in SOLL? |
The The official testnet is down since we released SOLL 0.1.0. So we also provide a ewasm testnet with out own
If you mean how we implement |
Thanks for your report, I am closing this one now, we will add a new page to describe the constructor documentation soon :-) If you have other questions, please open a new issue and let us know. |
A documentation update is needed to close this project. Reopen until the constructor documentation is finished. |
When I was navigating the decompiled wasm code from the Token example, I found that there is no multiplexer structure in the
main
function for dealing with appropriate calldata, which according to the eWasm team (ewasm/design#159) should be present. I wonder if you guys are using the standard ABI for ETH 1.0 or some other mechanisms?The text was updated successfully, but these errors were encountered: