/era-compiler-solidity

The zkEVM Solidity compiler.

Primary LanguageRustApache License 2.0Apache-2.0

zkSync Era: Solidity Compiler

Logo

zkSync Era is a layer 2 rollup that uses zero-knowledge proofs to scale Ethereum without compromising on security or decentralization. As it’s EVM-compatible (with Solidity/Vyper), 99% of Ethereum projects can redeploy without needing to refactor or re-audit any code. zkSync Era also uses an LLVM-based compiler that will eventually enable developers to write smart contracts in popular languages such as C++ and Rust.

This repository contains the compiler from Solidity to zkEVM bytecode.

System Requirements

Supported platforms:

  • Linux: x86_64
    MUSL-based static builds do not depend on system libraries and can be run on any recent Linux distribution.
  • MacOS 11+: x86_64, arm64 (M1, M2)
  • Windows: x86_64
    Only Windows 10 has been tested so far, but other versions should be OK as well.

We recommend at least 4 GB of RAM available for the build process.

Building

  1. Install some tools system-wide:
    1.a. apt install cmake ninja-build clang-13 lld-13 parallel on a Debian-based Linux, with optional musl-tools if you need a musl build.
    1.b. pacman -S cmake ninja clang lld parallel on an Arch-based Linux.
    1.c. On MacOS, install the HomeBrew package manager (being careful to install it as the appropriate user), then brew install cmake ninja coreutils parallel. Install your choice of a recent LLVM/Clang compiler, e.g. via Xcode, Apple’s Command Line Tools, or your preferred package manager.
    1.d. Their equivalents with other package managers.

  2. Install Rust

    Currently we are not pinned to any specific version of Rust, so just install the latest stable build for your platform.
    Also install the musl target if you are compiling on Linux in order to distribute the binary:
    rustup target add x86_64-unknown-linux-musl

  3. Download a version of the solc compiler.
    If it is not named exactly solc and in your $PATH, see the --solc option below.

  4. Check out or clone the appropriate branch of this repository.

  5. Go to the project root and run git checkout <ref> with the tag, branch, or commit you want to build.

  6. Install the zkEVM LLVM framework builder:
    6.a. cargo install compiler-llvm-builder on MacOS, or Linux for personal use.
    6.b. cargo install compiler-llvm-builder --target x86_64-unknown-linux-musl on Linux for distribution.

    The builder is not the zkEVM LLVM framework itself; it is just a tool that clones our repository and runs the sequence of build commands. By default it is installed in ~/.cargo/bin/, which is recommended to be added to your $PATH. Execute zkevm-llvm --help for more information.
    If you need a specific branch of zkEVM LLVM, change it in the LLVM.lock file at the root of this repository.

  7. Run the builder to clone and build the zkevm LLVM framework at this repository root:
    7.1. zkevm-llvm clone
    7.2. zkevm-llvm build

  8. Build the Solidity compiler executable:
    8.a. cargo build --release on MacOS or Linux for personal use.
    8.b. cargo build --release --target x86_64-unknown-linux-musl on Linux for distribution.

  9. If you need to move the built binary elsewhere, grab it from the build directory:
    9.a. On MacOS or Linux for the default target: ./target/release/zksolc
    9.b. On Linux, if you are building for the target x86_64-unknown-linux-musl: ./target/x86_64-unknown-linux-musl/release/zksolc

Usage

Check ./target/*/zksolc --help for the compiler usage.

The solc compiler must be available in $PATH, or the --solc option must be used instead.

For big projects it is more convenient to use the compiler via the Hardhat plugin. For single-file contracts, or small projects, the CLI suffices.

CLI reference

--version

Print the version and exit.

<input_files>

Specify the input file paths.
Multiple Solidity files can be passed in the default Solidity mode.
Yul and LLVM IR modes currently support only a single file.

--base-path <path>

Set the given path as the root of the source tree instead of the root of the filesystem.
Passed to solc without changes.

--include-path <path>

Make an additional source directory available to the default import callback. Use multiple times if required. Only use if the base path has a non-empty value.
Passed to solc without changes.

--allow-paths <path1,path2,...>

Allow a given path for imports. For multiple paths, separate with commas.
Passed to solc without changes.

-o, --output-dir <path>

Create one file per component and contract/file at the specified directory, if given.

--overwrite

Overwrite existing files (used together with -o).

-O, --optimization <level>

Set the LLVM optimization parameter -O[0 | 1 | 2 | 3 | s | z].
Use 3 for best performance and z for minimal size.

--disable-solc-optimizer

Disable the solc Yul/EVMLA optimizer.
Use it if your project uses the MSIZE instruction, or in other cases.
Beware that it will prevent libraries from being inlined.

--solc <path>

Specify the path to the solc executable. By default, the one in ${PATH} is used.
In Yul mode, solc is used for source code validation, as zksolc assumes that the input Yul is valid.
In LLVM IR mode, solc is unused.

-l, --libraries <string>

Specify addresses of deployable libraries. Syntax: name_1=address_1[,name_N=address_N]*.
Addresses are interpreted as hexadecimal strings prefixed with 0x.

--combined-json <options>

Output a single JSON document containing the specified information.
Available arguments: abi, hashes, metadata, devdoc, userdoc, storage-layout, ast, asm, bin, bin-runtime.

--standard-json

Switch to standard JSON input/output mode. Read from stdin, write the result to stdout.
This is the default used by the Hardhat plugin.

--yul

Switch to the Yul mode.
Only one input Yul file is allowed.
Cannot be used with the combined and standard JSON modes.

--llvm-ir

Switch to LLVM IR mode.
Only one input LLVM IR file is allowed.
Cannot be used with combined and standard JSON modes.

--zkasm

Switch to zkEVM assembly mode.
Only one input zkEVM assembly file is allowed.
Cannot be used with combined and standard JSON modes.

--force-evmla

Force use of the EVM legacy assembly pipeline.
Useful for early versions of solc 0.8.x, where Yul was considered highly experimental and contained more bugs than today.

--system-mode

Enable system contract compilation mode.
In this mode, zkEVM extensions are enabled. For example, calls to addresses 0xFFFF and less are substituted with special zkEVM instructions. In the Yul mode, the verbatim_* and throw instructions become available.

--metadata-hash

Set the metadata hash mode.
The only supported value is none that disables appending the metadata hash.
Is enabled by default.

--asm

Output zkEVM assembly of the contracts.

--bin

Output zkEVM bytecode of the contracts.

--debug-output-dir <path>

Dump all IR (Yul, EVMLA, LLVM IR, assembly) to files in the specified directory.
Only for testing and debugging.

--llvm-verify-each

Set the verify-each option in LLVM.
Only for testing and debugging.

--llvm-debug-logging

Set the debug-logging option in LLVM.
Only for testing and debugging.

Troubleshooting

  • If you get a “failed to authenticate when downloading repository… if the git CLI succeeds then net.git-fetch-with-cli may help here” error, then prepending the cargo command with CARGO_NET_GIT_FETCH_WITH_CLI=true may help.
  • On MacOS, git config --global credential.helper osxkeychain followed by cloning a repository manually with a personal access token may help.
  • Unset any LLVM-related environment variables you may have set, especially LLVM_SYS_<version>_PREFIX (see e.g. https://crates.io/crates/llvm-sys and https://llvm.org/docs/GettingStarted.html#local-llvm-configuration). To make sure: set | grep LLVM

License

The Solidity compiler is distributed under the terms of either

at your option.

Resources

zkSync Era compiler toolchain documentation

Solidity documentation

Official Links

Disclaimer

zkSync Era has been through extensive testing and audits, and although it is live, it is still in alpha state and will undergo further audits and bug bounty programs. We would love to hear our community's thoughts and suggestions about it! It's important to note that forking it now could potentially lead to missing important security updates, critical features, and performance improvements.