The Move Book
Welcome to Move, a next-generation language for secure, sandboxed, and formally verified programming. It has been used as the smart contract language for several blockchains including Aptos. Move allows developers to write programs that flexibly manage and transfer assets, while providing the security and protections against attacks on those assets. However, Move has been developed with use cases in mind outside a blockchain context as well.
Move takes its cue from Rust by using resource types with move (hence the name) semantics as an explicit representation of digital assets, such as currency.
Who is the Aptos Move Book for?
Move was designed and created as a secure, verified, yet flexible programming language. The first use of Move was for the implementation of the Diem blockchain, and it is currently used on Aptos.
This book is suitable for developers with some programming experience and who want to begin understanding the core programming language and see examples of its usage.
Where Do I Start?
Begin by working through the Move Core Language Tutorial. The Primitive Types and Basic Concepts sections then walk through the language feature by feature, including modules and scripts. For an overview of what each release of the language adds, see Language Versions.
Build: 2026-05-08 03:43 UTC (debug build, aptos-core 9c0cd84311)
Integers
Move supports six unsigned integer types: u8, u16, u32, u64, u128, and u256. Values of these types range from 0 to a maximum that depends on the size of the type.
| Type | Value Range |
|---|---|
Unsigned 8-bit integer, u8 | 0 to 28 - 1 |
Unsigned 16-bit integer, u16 | 0 to 216 - 1 |
Unsigned 32-bit integer, u32 | 0 to 232 - 1 |
Unsigned 64-bit integer, u64 | 0 to 264 - 1 |
Unsigned 128-bit integer, u128 | 0 to 2128 - 1 |
Unsigned 256-bit integer, u256 | 0 to 2256 - 1 |
Since version 2.3, Move also supports signed integer types:
| Type | Value Range |
|---|---|
Signed 8-bit integer, i8 | -27 to 27 - 1 |
Signed 16-bit integer, i16 | -215 to 215 - 1 |
Signed 32-bit integer, i32 | -231 to 231 - 1 |
Signed 64-bit integer, i64 | -263 to 263 - 1 |
Signed 128-bit integer, i128 | -2127 to 2127 - 1 |
Signed 256-bit integer, i256 | -2255 to 2255 - 1 |
Literals
Literal values for these types are specified either as a sequence of digits (e.g., 112) or as hex literals, e.g., 0xFF. The type of the literal can optionally be added as a suffix, e.g., 112u8. If the type is not specified, the compiler will try to infer the type from the context where the literal is used. If the type cannot be inferred, it is assumed to be u64.
Number literals can be separated by underscores for grouping and readability (e.g., 1_234_5678, 1_000u128, 0xAB_CD_12_35).
To denote a negative number, prefix it with a - sign (e.g., -112).
If a literal is too large for its specified (or inferred) size range, an error is reported.
Examples
script {
fun example() {
// literals with explicit annotations;
let explicit_u8 = 1u8;
let explicit_u16 = 1u16;
let explicit_u32 = 1u32;
let explicit_u64 = 2u64;
let explicit_u128 = 3u128;
let explicit_u256 = 1u256;
let explicit_u64_underscored = 154_322_973u64;
let explicit_i8 = -1i8;
let explicit_i64 = -2i64;
// literals with simple inference
let simple_u8: u8 = 1;
let simple_u16: u16 = 1;
let simple_u32: u32 = 1;
let simple_u64: u64 = 2;
let simple_u128: u128 = 3;
let simple_u256: u256 = 1;
// literals with more complex inference
let complex_u8 = 1; // inferred: u8
// right hand argument to shift must be u8
let _unused = 10 << complex_u8;
let x: u8 = 38;
let complex_u8 = 2; // inferred: u8
// arguments to `+` must have the same type
let _unused = x + complex_u8;
let complex_u128 = 133_876; // inferred: u128
// inferred from function argument type
function_that_takes_u128(complex_u128);
// literals can be written in hex
let hex_u8: u8 = 0x1;
let hex_u16: u16 = 0x1BAE;
let hex_u32: u32 = 0xDEAD80;
let hex_u64: u64 = 0xCAFE;
let hex_u128: u128 = 0xDEADBEEF;
let hex_u256: u256 = 0x1123_456A_BCDE_F;
}
}
Operations
Arithmetic
Each of these types supports the same set of checked arithmetic operations. For all of these operations, both arguments (the left and right side operands) must be of the same type. If you need to operate over values of different types, you will need to first perform a cast. Similarly, if you expect the result of the operation to be too large for the integer type, perform a cast to a larger size before performing the operation.
All arithmetic operations abort instead of behaving in a way that mathematical integers would not (e.g., overflow, underflow, divide-by-zero).
| Syntax | Operation | Aborts If |
|---|---|---|
a + b | addition | Result is too large/small for the integer type |
a - b | subtraction | Result is less than zero |
a * b | multiplication | Result is too large/small for the integer type |
a % b | modular division | The divisor is 0 |
a / b | truncating division | The divisor is 0, or the result overflows |
-a | negation | Negated result too large (e.g. -MIN_I64) |
Bitwise
The unsigned integer types support the following bitwise operations that treat each number as a series of individual bits, either 0 or 1, instead of as numerical integer values.
Bitwise operations do not abort.
| Syntax | Operation | Description |
|---|---|---|
& | bitwise and | Performs a boolean and for each bit pairwise |
| | bitwise or | Performs a boolean or for each bit pairwise |
^ | bitwise xor | Performs a boolean exclusive or for each bit pairwise |
Bit Shifts
Similar to the bitwise operations, each unsigned integer type supports bit shifts. But unlike the other operations, the right-hand side operand (how many bits to shift by) must always be a u8 and need not match the left side operand (the number you are shifting).
Bit shifts abort if the number of bits to shift by is greater than or equal to 8, 16, 32, 64, 128 or 256 for u8, u16, u32, u64, u128 and u256 respectively.
| Syntax | Operation | Aborts if |
|---|---|---|
<< | shift left | Number of bits to shift by is greater than or equal to the size of the integer type |
>> | shift right | Number of bits to shift by is greater than or equal to the size of the integer type |
Comparisons
All integer types support the “comparison” operations. Both arguments need to be of the same type. If you need to compare integers of different types, you will need to cast one of them first.
Comparison operations do not abort.
| Syntax | Operation |
|---|---|
< | less than |
> | greater than |
<= | less than or equal to |
>= | greater than or equal to |
Equality
Like all types with drop in Move, all integer types support the “equal” and “not equal” operations. Both arguments need to be of the same type. If you need to compare integers of different types, you will need to cast one of them first.
Equality operations do not abort.
| Syntax | Operation |
|---|---|
== | equal |
!= | not equal |
For more details see the section on equality
Casting
Integer types of one size can be cast to integer types of another size. Integers are the only types in Move that support casting.
Casts do not truncate. Casting will abort if the result is too large or too small for the specified type.
| Syntax | Operation | Aborts if |
|---|---|---|
(e as T) | Cast integer expression e into an integer type T | e is too large or too small to represent as a T |
Any integer can be cast into any other integer type, including signed to unsigned and unsigned to signed, provided the target type is able to represent the source value.
For example:
(x as u8)(y as u16)(873u16 as u32)(2u8 as u64)(1 + 3 as u128)(4/2 + 12345 as u256)
Notice that since language version 2.0, casts don’t always need to be in parentheses. Thus, x as u8 is a valid expression.
Ownership
As with the other scalar values built-in to the language, integer values are implicitly copyable, meaning they can be copied without an explicit instruction such as copy.
Bool
bool is Move’s primitive type for boolean true and false values.
Literals
Literals for bool are either true or false.
Operations
Logical
bool supports three logical operations:
| Syntax | Description | Equivalent Expression |
|---|---|---|
&& | short-circuiting logical and | p && q is equivalent to if (p) q else false |
|| | short-circuiting logical or | p || q is equivalent to if (p) true else q |
! | logical negation | !p is equivalent to if (p) false else true |
Control Flow
bool values are used in several of Move’s control-flow constructs:
Ownership
As with the other scalar values built into the language, boolean values are implicitly copyable,
meaning they can be copied without an explicit instruction such as
copy.
Address
address is a built-in type in Move that is used to represent locations (sometimes called accounts) in global storage. An address value is a 256-bit (32-byte) identifier. At a given address, two things can be stored: Modules and Resources.
Although an address is a 256-bit integer under the hood, Move addresses are intentionally opaque—they cannot be created from integers, they do not support arithmetic operations, and they cannot be modified. Even though there might be interesting programs that would use such a feature (e.g., pointer arithmetic in C fills a similar niche), Move does not allow this dynamic behavior because it has been designed from the ground up to support static verification.
You can use runtime address values (values of type address) to access resources at that address. You cannot access modules at runtime via address values.
Addresses and Their Syntax
Addresses come in two flavors, named or numerical. The syntax for a named address follows the
same rules for any named identifier in Move. The syntax of a numerical address is not restricted
to hex-encoded values, and any valid u256 numerical value can be used as an
address value, e.g., 42, 0xCAFE, and 2021 are all valid numerical address
literals.
To distinguish when an address is being used in an expression context or not, the syntax when using an address differs depending on the context where it’s used:
- When an address is used as an expression the address must be prefixed by the
@character, i.e.,@<numerical_value>or@<named_address_identifier>. - Outside of expression contexts, the address may be written without the leading
@character, i.e.,<numerical_value>or<named_address_identifier>.
In general, you can think of @ as an operator that takes an address from being a namespace item to being an expression item.
Named Addresses
Named addresses are a feature that allows identifiers to be used in place of numerical values in any spot where addresses are used, and not just at the value level. Named addresses are declared and bound as top-level elements (outside of modules and scripts) in Move Packages, or passed as arguments to the Move compiler.
Named addresses only exist at the source language level and will be fully
substituted for their value at the bytecode level. Because of this, modules
and module members must be accessed through the module’s named address
and not through the numerical value assigned to the named address during
compilation, e.g., use my_addr::foo is not equivalent to use 0x2::foo
even if the Move program is compiled with my_addr set to 0x2. This
distinction is discussed in more detail in the section on Modules and Scripts.
Examples
script {
fun example() {
let a1: address = @0x1; // shorthand for 0x0000000000000000000000000000000000000000000000000000000000000001
let a2: address = @0x42; // shorthand for 0x0000000000000000000000000000000000000000000000000000000000000042
let a3: address = @0xDEADBEEF; // shorthand for 0x00000000000000000000000000000000000000000000000000000000DEADBEEF
let a4: address = @0x000000000000000000000000000000000000000000000000000000000000000A;
let a5: address = @std; // Assigns `a5` the value of the named address `std`
let a6: address = @66;
let a7: address = @0x42;
}
}
module 66::some_module { // Not in expression context, so no @ needed
use 0x1::other_module; // Not in expression context so no @ needed
use std::vector; // Can use a named address as a namespace item when using other modules
...
}
module std::other_module { // Can use a named address as a namespace item to declare a module
...
}
Global Storage Operations
The primary purpose of address values is to interact with the global storage operations.
address values are used with the exists, borrow_global, borrow_global_mut, and move_from operations.
The only global storage operation that does not use address is move_to, which uses signer.
Ownership
As with the other scalar values built-in to the language, address values are implicitly copyable, meaning they can be copied without an explicit instruction such as copy.
Vector
vector<T> is the only primitive collection type provided by Move. A vector<T> is a homogeneous
collection of T’s that can grow or shrink by pushing/popping values off the “end”.
A vector<T> can be instantiated with any type T. For example, vector<u64>, vector<address>,
vector<0x42::MyModule::MyResource>, and vector<vector<u8>> are all valid vector types.
Literals
General vector Literals
Vectors of any type can be created with vector literals.
| Syntax | Type | Description |
|---|---|---|
vector[] | vector[]: vector<T> where T is any single, non-reference type | An empty vector |
vector[e1, ..., en] | vector[e1, ..., en]: vector<T> where e_i: T s.t. 0 < i <= n and n > 0 | A vector with n elements (of length n) |
In these cases, the type of the vector is inferred, either from the element type or from the
vector’s usage. If the type cannot be inferred, or simply for added clarity, the type can be
specified explicitly:
vector<T>[]: vector<T>
vector<T>[e1, ..., en]: vector<T>
Example Vector Literals
script {
fun example() {
(vector[]: vector<bool>);
(vector[0u8, 1u8, 2u8]: vector<u8>);
(vector<u128>[]: vector<u128>);
(vector<address>[@0x42, @0x100]: vector<address>);
}
}
vector<u8> literals
A common use-case for vectors in Move is to represent “byte arrays”, which are represented with
vector<u8>. These values are often used for cryptographic purposes, such as a public key or a hash
result. These values are so common that specific syntax is provided to make the values more
readable, as opposed to having to use vector[] where each individual u8 value is specified in
numeric form.
There are currently two supported types of vector<u8> literals, byte strings and hex strings.
Byte Strings
Byte strings are quoted string literals prefixed by a b, e.g. b"Hello!\n".
These are ASCII encoded strings that allow for escape sequences. Currently, the supported escape sequences are:
| Escape Sequence | Description |
|---|---|
\n | New line (or Line feed) |
\r | Carriage return |
\t | Tab |
\\ | Backslash |
\0 | Null |
\" | Quote |
\xHH | Hex escape, inserts the hex byte sequence HH |
Hex Strings
Hex strings are quoted string literals prefixed by a x, e.g. x"48656C6C6F210A".
Each byte pair, ranging from 00 to FF, is interpreted as a hex-encoded u8 value. So each byte
pair corresponds to a single entry in the resulting vector<u8>.
Example String Literals
script {
fun byte_and_hex_strings() {
assert!(b"" == x"", 0);
assert!(b"Hello!\n" == x"48656C6C6F210A", 1);
assert!(b"\x48\x65\x6C\x6C\x6F\x21\x0A" == x"48656C6C6F210A", 2);
assert!(
b"\"Hello\tworld!\"\n \r \\Null=\0" ==
x"2248656C6C6F09776F726C6421220A200D205C4E756C6C3D00",
3
);
}
}
Operations
vector provides several operations via the std::vector module in the Move standard
library, as shown below. More operations may be added over time.
Up-to-date documentation on vector can be found here.
| Function | Description | Aborts? |
|---|---|---|
vector::empty<T>(): vector<T> | Create an empty vector that can store values of type T | Never |
vector::is_empty<T>(self: &vector<T>): bool | Return true if the vector self has no elements and false otherwise. | Never |
vector::singleton<T>(t: T): vector<T> | Create a vector of size 1 containing t | Never |
vector::length<T>(self: &vector<T>): u64 | Return the length of the vector self | Never |
vector::push_back<T>(self: &mut vector<T>, t: T) | Add t to the end of self | Never |
vector::pop_back<T>(self: &mut vector<T>): T | Remove and return the last element in self | If self is empty |
vector::borrow<T>(self: &vector<T>, i: u64): &T | Return an immutable reference to the element at index i | If i is not in bounds |
vector::borrow_mut<T>(self: &mut vector<T>, i: u64): &mut T | Return a mutable reference to the element at index i | If i is not in bounds |
vector::destroy_empty<T>(self: vector<T>) | Delete self | If self is not empty |
vector::append<T>(self: &mut vector<T>, other: vector<T>) | Add the elements in other to the end of self | Never |
vector::reverse_append<T>(self: &mut vector<T>, other: vector<T>) | Pushes all of the elements of the other vector into the self vector, in the reverse order as they occurred in other | Never |
vector::contains<T>(self: &vector<T>, e: &T): bool | Return true if e is in the vector self. Otherwise, returns false | Never |
vector::swap<T>(self: &mut vector<T>, i: u64, j: u64) | Swaps the elements at the ith and jth indices in the vector self | If i or j is out of bounds |
vector::reverse<T>(self: &mut vector<T>) | Reverses the order of the elements in the vector self in place | Never |
vector::reverse_slice<T>(self: &mut vector<T>, l: u64, r: u64) | Reverses the order of the elements [l, r) in the vector self in place | If l > r or if l or r is out of bounds |
vector::index_of<T>(self: &vector<T>, e: &T): (bool, u64) | Return (true, i) if e is in the vector self at index i. Otherwise, returns (false, 0) | Never |
vector::insert<T>(self: &mut vector<T>, i: u64, e: T) | Insert a new element e at position 0 <= i <= length, using O(length - i) time | If i is out of bounds |
vector::remove<T>(self: &mut vector<T>, i: u64): T | Remove the ith element of the vector self, shifting all subsequent elements. This is O(n) and preserves ordering of elements in the vector | If i is out of bounds |
vector::swap_remove<T>(self: &mut vector<T>, i: u64): T | Swap the ith element of the vector self with the last element and then pop the element, This is O(1), but does not preserve ordering of elements in the vector | If i is out of bounds |
vector::trim<T>(self: &mut vector<T>, new_len: u64): vector<T> | Trim the vector self to the smaller size new_len and return the evicted elements in order | If new_len > self.length() |
vector::trim_reverse<T>(self: &mut vector<T>, new_len: u64): vector<T> | Trim the vector self to the smaller size new_len and return the evicted elements in the reverse order | If new_len > self.length() |
vector::rotate<T>(self: &mut vector<T>, rot: u64): u64 | rotate(&mut [1, 2, 3, 4, 5], 2) -> [3, 4, 5, 1, 2] in place, returns the split point i.e., 3 in this example | If rot <= self.length() does not hold |
vector::rotate_slice<T>(self: &mut vector<T>, left: u64, rot: u64, right: u64): u64 | rotate a slice [left, right) with left <= rot <= right in place, returns the split point | If left <= rot <= right <= self.length() does not hold |
Example:
script {
use std::vector;
fun example() {
let v = vector::empty<u64>();
vector::push_back(&mut v, 5);
vector::push_back(&mut v, 6);
assert!(*vector::borrow(&v, 0) == 5, 42);
assert!(*vector::borrow(&v, 1) == 6, 42);
assert!(vector::pop_back(&mut v) == 6, 42);
assert!(vector::pop_back(&mut v) == 5, 42);
}
}
Index Notation for Vectors
Since language version 2.0
Index notation using square brackets ([]) is available for vector operations, simplifying syntax
and making programs easier to understand. The index notation is simply syntactic sugar that
is reduced to existing operations by the compiler; the named operations are also still supported.
The table below gives an overview of index notations for vectors:
| Indexing Syntax | Vector Operation |
|---|---|
&v[i] | vector::borrow(&v, i) |
&mut v[i] | vector::borrow_mut(&mut v, i) |
v[i] | *vector::borrow(&v, i) |
v[i] = x | *vector::borrow_mut(&mut v, i) = x |
&v[i].field | &vector::borrow(&v, i).field |
&mut v[i].field | &mut vector::borrow_mut(&mut v, i).field |
v[i].field | vector::borrow(&v, i).field |
v[i].field = x | vector::borrow_mut(&mut v, i).field = x |
As an example, here is a bubble sort algorithm for vectors using index notation:
fun bubble_sort(v: vector<u64>) {
use std::vector;
let n = vector::length(&v);
let i = 0;
while (i < n) {
let j = 0;
while (j < n - i - 1) {
if (v[j] > v[j + 1]) {
let t = v[j];
v[j] = v[j + 1];
v[j + 1] = t;
};
j = j + 1;
};
i = i + 1;
};
}
Destroying and copying vectors
Some behaviors of vector<T> depend on the abilities of the element type, T. For example, vectors
containing elements that do not have drop cannot be implicitly discarded like v in the example
above — they must be explicitly destroyed with vector::destroy_empty.
Note that vector::destroy_empty will abort at runtime unless vec contains zero elements:
script {
fun destroy_any_vector<T>(vec: vector<T>) {
vector::destroy_empty(vec) // deleting this line will cause a compiler error
}
}
But no error would occur for dropping a vector that contains elements with drop:
script {
fun destroy_droppable_vector<T: drop>(vec: vector<T>) {
// valid!
// nothing needs to be done explicitly to destroy the vector
}
}
Similarly, vectors cannot be copied unless the element type has copy. In other words, a
vector<T> has copy if and only if T has copy.
For more details see the sections on type abilities and generics.
Ownership
As mentioned above, vector values can be copied only if the
elements can be copied.
Signer
signer is a built-in Move resource type. A signer is a
capability that allows the holder to act on
behalf of a particular address. You can think of the native implementation as being:
module 0x1::signer {
struct signer has drop { a: address }
}
A signer is somewhat similar to a Unix UID in
that it represents a user authenticated by code outside of Move (e.g., by checking a cryptographic
signature or password).
Comparison to address
A Move program can create any address value without special permission using address literals:
script {
fun example() {
let a1 = @0x1;
let a2 = @0x2;
// ... and so on for every other possible address
}
}
However, signer values are special because they cannot be created via literals or
instructions — only by the Move VM. Before the VM runs a script with parameters of type signer, it
will automatically create signer values and pass them into the script:
script {
use std::signer;
fun main(s: signer) {
assert!(signer::address_of(&s) == @0x42, 0);
}
}
This script will abort with code 0 if the script is sent from any address other than 0x42.
A Move script can have an arbitrary number of signers as long as the signers are a prefix
to any other arguments. In other words, all of the signer arguments must come first:
script {
use std::signer;
fun main(s1: signer, s2: signer, x: u64, y: u8) {
// ...
}
}
This is useful for implementing multi-signer scripts that atomically act with the authority of
multiple parties. For example, an extension of the script above could perform an atomic currency
swap between s1 and s2.
signer Operators
The std::signer standard library module provides two utility functions over signer values:
| Function | Description |
|---|---|
signer::address_of(&signer): address | Return the address wrapped by this &signer. |
signer::borrow_address(&signer): &address | Return a reference to the address wrapped by this &signer. |
In addition, the move_to<T>(&signer, T) global storage operator
requires a &signer argument to publish a resource T under signer.address’s account. This
ensures that only an authenticated user can elect to publish a resource under their address.
Ownership
Unlike simple scalar values, signer values are not copyable, meaning they cannot be copied from
any operation whether it be through an explicit copy instruction
or through a dereference *.
References
Move has two types of references: immutable & and mutable &mut. Immutable references are read
only, and cannot modify the underlying value (or any of its fields). Mutable references allow for
modifications via a write through that reference. Move’s type system enforces an ownership
discipline that prevents reference errors.
For more details on the rules of references, see Structs and Resources.
Reference Operators
Move provides operators for creating and extending references as well as converting a mutable
reference to an immutable one. Here and elsewhere, we use the notation e: T for “expression e
has type T”.
| Syntax | Type | Description |
|---|---|---|
&e | &T where e: T and T is a non-reference type | Create an immutable reference to e |
&mut e | &mut T where e: T and T is a non-reference type | Create a mutable reference to e. |
&e.f | &T where e.f: T | Create an immutable reference to field f of struct e. |
&mut e.f | &mut T where e.f: T | Create a mutable reference to field f of struct e. |
freeze(e) | &T where e: &mut T | Convert the mutable reference e into an immutable reference. |
The &e.f and &mut e.f operators can be used both to create a new reference into a struct or to
extend an existing reference:
script {
fun example() {
let s = S { f: 10 };
let f_ref1: &u64 = &s.f; // works
let s_ref: &S = &s;
let f_ref2: &u64 = &s_ref.f; // also works
}
}
A reference expression with multiple fields works as long as both structs are in the same module:
module 0x42::example {
struct A { b: B }
struct B { c : u64 }
fun f(a: &A): &u64 {
&a.b.c
}
}
Finally, note that references to references are not allowed:
script {
fun example() {
let x = 7;
let y: &u64 = &x;
let z: &&u64 = &y; // will not compile
}
}
Reading and Writing Through References
Both mutable and immutable references can be read to produce a copy of the referenced value.
Only mutable references can be written. A write *x = v discards the value previously stored in x
and updates it with v.
Both operations use the C-like * syntax. However, note that a read is an expression, whereas a
write is a mutation that must occur on the left-hand side of an equals sign.
| Syntax | Type | Description |
|---|---|---|
*e | T where e is &T or &mut T | Read the value pointed to by e |
*e1 = e2 | () where e1: &mut T and e2: T | Update the value in e1 with e2. |
In order for a reference to be read, the underlying type must have the
copy ability as reading the reference creates a new copy of the value. This rule
prevents the copying of resource values:
module 0x42::coin {
struct Coin {} // Note does not have copy
fun copy_resource_via_ref_bad(c: Coin) {
let c_ref = &c;
let counterfeit: Coin = *c_ref; // not allowed!
pay(c);
pay(counterfeit);
}
}
Dually: in order for a reference to be written to, the underlying type must have the
drop ability as writing to the reference will discard (or “drop”) the old value.
This rule prevents the destruction of resource values:
module 0x42::coin {
struct Coin {} // Note does not have drop
fun destroy_resource_via_ref_bad(ten_coins: Coin, c: Coin) {
let ref = &mut ten_coins;
*ref = c; // not allowed--would destroy 10 coins!
}
}
freeze inference
A mutable reference can be used in a context where an immutable reference is expected:
script {
fun example() {
let x = 7;
let y: &u64 = &mut x;
}
}
This works because, under the hood, the compiler inserts freeze instructions where they are
needed. Here are a few more examples of freeze inference in action:
module 0x42::example {
fun takes_immut_returns_immut(x: &u64): &u64 { x }
// freeze inference on return value
fun takes_mut_returns_immut(x: &mut u64): &u64 { x }
fun expression_examples() {
let x = 0;
let y = 0;
takes_immut_returns_immut(&x); // no inference
takes_immut_returns_immut(&mut x); // inferred freeze(&mut x)
takes_mut_returns_immut(&mut x); // no inference
assert!(&x == &mut y, 42); // inferred freeze(&mut y)
}
fun assignment_examples() {
let x = 0;
let y = 0;
let imm_ref: &u64 = &x;
imm_ref = &x; // no inference
imm_ref = &mut y; // inferred freeze(&mut y)
}
}
Subtyping
With this freeze inference, the Move type checker can view &mut T as a subtype of &T. As shown
above, this means that anywhere a &T value is expected, a &mut T value can
also be used. This terminology is used in error messages to concisely indicate that a &mut T was
needed where a &T was supplied. For example
module 0x42::example {
fun read_and_assign(store: &mut u64, new_value: &u64) {
*store = *new_value
}
fun subtype_examples() {
let x: &u64 = &0;
let y: &mut u64 = &mut 1;
x = &mut 1; // valid
y = &2; // invalid!
read_and_assign(y, x); // valid
read_and_assign(x, y); // invalid!
}
}
will yield the following error messages
error:
┌── example.move:12:9 ───
│
12 │ y = &2; // invalid!
│ ^ Invalid assignment to local 'y'
·
12 │ y = &2; // invalid!
│ -- The type: '&{integer}'
·
9 │ let y: &mut u64 = &mut 1;
│ -------- Is not a subtype of: '&mut u64'
│
error:
┌── example.move:15:9 ───
│
15 │ read_and_assign(x, y); // invalid!
│ ^^^^^^^^^^^^^^^^^^^^^ Invalid call of '0x42::example::read_and_assign'. Invalid argument for parameter 'store'
·
8 │ let x: &u64 = &0;
│ ---- The type: '&u64'
·
3 │ fun read_and_assign(store: &mut u64, new_value: &u64) {
│ -------- Is not a subtype of: '&mut u64'
│
The only other type that currently has subtyping is tuples.
Ownership
Both mutable and immutable references can always be copied and extended even if there are existing copies or extensions of the same reference:
script {
fun reference_copies(s: &mut S) {
let s_copy1 = s; // ok
let s_extension = &mut s.f; // also ok
let s_copy2 = s; // still ok
// ...
}
}
This might be surprising for programmers familiar with Rust’s ownership system, which would reject the code above. Move’s type system is more permissive in its treatment of copies, but equally strict in ensuring unique ownership of mutable references before writes.
References Cannot Be Stored
References and tuples are the only types that cannot be stored as a field value of structs, which
also means that they cannot exist in global storage. All references created during program execution
will be destroyed when a Move program terminates; they are entirely ephemeral. This invariant is
also true for values of types without the store ability, but note that
references and tuples go a step further by never being allowed in structs in the first place.
This is another difference between Move and Rust, which allows references to be stored inside of structs.
Currently, Move cannot support this because references cannot be serialized, but every Move value must be serializable. This requirement comes from Move’s persistent global storage, which needs to serialize values to persist them across program executions. Structs can be written to global storage, and thus they must be serializable.
One could imagine a fancier, more expressive, type system that would allow references to be stored
in structs and ban those structs from existing in global storage. We could perhaps allow
references inside of structs that do not have the store ability, but that would
not completely solve the problem: Move has a fairly complex system for tracking static reference
safety, and this aspect of the type system would also have to be extended to support storing
references inside of structs. In short, Move’s type system (particularly the aspects around
reference safety) would have to expand to support stored references. But it is something we are
keeping an eye on as the language evolves.
Tuples and Unit
Move does not fully support tuples as one might expect coming from another language with them as a first-class value. However, in order to support multiple return values, Move has tuple-like expressions. These expressions do not result in a concrete value at runtime (there are no tuples in the bytecode), and as a result they are very limited: they can only appear in expressions (usually in the return position for a function); they cannot be bound to local variables; they cannot be stored in structs; and tuple types cannot be used to instantiate generics.
Similarly, unit () is a type created by the Move source language in order to be expression-based.
The unit value () does not result in any runtime value. We can consider unit () to be an empty
tuple, and any restrictions that apply to tuples also apply to unit.
It might feel weird to have tuples in the language at all given these restrictions. But one of the most common use cases for tuples in other languages is to allow functions to return multiple values. Some languages work around this by forcing the users to write structs that contain the multiple return values. However, in Move, you cannot put references inside of structs. This required Move to support multiple return values. These multiple return values are all pushed on the stack at the bytecode level. At the source level, these multiple return values are represented using tuples.
Literals
Tuples are created by a comma-separated list of expressions inside parentheses.
| Syntax | Type | Description |
|---|---|---|
() | (): () | Unit, the empty tuple, or the tuple of arity 0 |
(e1, ..., en) | (e1, ..., en): (T1, ..., Tn) where e_i: Ti s.t. 0 < i <= n and n > 0 | A n-tuple, a tuple of arity n, a tuple with n elements |
Note that (e) does not have type (e): (t), in other words there is no tuple with one element. If
there is only a single element inside the parentheses, the parentheses are only used for
disambiguation and do not carry any other special meaning.
Sometimes, tuples with two elements are called “pairs” and tuples with three elements are called “triples.”
Examples
module 0x42::example {
// all 3 of these functions are equivalent
// when no return type is provided, it is assumed to be `()`
fun returns_unit_1() { }
// there is an implicit () value in empty expression blocks
fun returns_unit_2(): () { }
// explicit version of `returns_unit_1` and `returns_unit_2`
fun returns_unit_3(): () { () }
fun returns_3_values(): (u64, bool, address) {
(0, false, @0x42)
}
fun returns_4_values(x: &u64): (&u64, u8, u128, vector<u8>) {
(x, 0, 1, b"foobar")
}
}
Operations
The only operation that can be done on tuples currently is destructuring.
Destructuring
For tuples of any size, they can be destructured in either a let binding or in an assignment.
For example:
module 0x42::example {
// all 3 of these functions are equivalent
fun returns_unit() {}
fun returns_2_values(): (bool, bool) { (true, false) }
fun returns_4_values(x: &u64): (&u64, u8, u128, vector<u8>) { (x, 0, 1, b"foobar") }
fun examples(cond: bool) {
let () = ();
let (x, y): (u8, u64) = (0, 1);
let (a, b, c, d) = (@0x0, 0, false, b"");
() = ();
(x, y) = if (cond) (1, 2) else (3, 4);
(a, b, c, d) = (@0x1, 1, true, b"1");
}
fun examples_with_function_calls() {
let () = returns_unit();
let (x, y): (bool, bool) = returns_2_values();
let (a, b, c, d) = returns_4_values(&0);
() = returns_unit();
(x, y) = returns_2_values();
(a, b, c, d) = returns_4_values(&1);
}
}
For more details, see Move Variables.
Subtyping
Along with references, tuples are the only other type that has subtyping in Move. Tuples have subtyping only in the sense that they subtype with references (in a covariant way).
For example:
script {
fun example() {
let x: &u64 = &0;
let y: &mut u64 = &mut 1;
// (&u64, &mut u64) is a subtype of (&u64, &u64)
// since &mut u64 is a subtype of &u64
let (a, b): (&u64, &u64) = (x, y);
// (&mut u64, &mut u64) is a subtype of (&u64, &u64)
// since &mut u64 is a subtype of &u64
let (c, d): (&u64, &u64) = (y, y);
// error! (&u64, &mut u64) is NOT a subtype of (&mut u64, &mut u64)
// since &u64 is NOT a subtype of &mut u64
let (e, f): (&mut u64, &mut u64) = (x, y);
}
}
Ownership
As mentioned above, tuple values don’t really exist at runtime. And currently they cannot be stored in local variables because of this (but it is likely that this feature will come soon). As such, tuples can currently only be moved, as copying them would require putting them into a local variable first.
Local Variables and Scope
Local variables in Move are lexically (statically) scoped. New variables are introduced with the
keyword let, which will shadow any previous local with the same name. Locals are mutable and can
be updated both directly and via a mutable reference.
Declaring Local Variables
let bindings
Move programs use let to bind variable names to values:
script {
fun example() {
let x = 1;
let y = x + x;
}
}
let can also be used without binding a value to the local.
script {
fun example() {
let x;
}
}
The local can then be assigned a value later.
script {
fun example() {
let x;
if (cond) {
x = 1
} else {
x = 0
}
}
}
This can be very helpful when trying to extract a value from a loop when a default value cannot be provided.
script {
fun example() {
let x;
let cond = true;
let i = 0;
loop {
(x, cond) = foo(i);
if (!cond) break;
i = i + 1;
}
}
}
Variables must be assigned before use
Move’s type system prevents a local variable from being used before it has been assigned.
script {
fun example() {
let x;
x + x; // ERROR!
}
}
script {
fun example() {
let x;
if (cond) x = 0;
x + x; // ERROR!
}
}
script {
fun example() {
let x;
while (cond) x = 0;
x + x; // ERROR!
}
}
Valid variable names
Variable names can contain underscores _, letters a to z, letters A to Z, and digits 0
to 9. Variable names must start with either an underscore _ or a letter a through z. They
cannot start with uppercase letters.
script {
fun example() {
// all valid
let x = e;
let _x = e;
let _A = e;
let x0 = e;
let xA = e;
let foobar_123 = e;
// all invalid
let X = e; // ERROR!
let Foo = e; // ERROR!
}
}
Type annotations
The type of a local variable can almost always be inferred by Move’s type system. However, Move allows explicit type annotations that can be useful for readability, clarity, or debuggability. The syntax for adding a type annotation is:
script {
fun example() {
let x: T = e; // "Variable x of type T is initialized to expression e"
}
}
Some examples of explicit type annotations:
module 0x42::example {
struct S { f: u64, g: u64 }
fun annotated() {
let u: u8 = 0;
let b: vector<u8> = b"hello";
let a: address = @0x0;
let (x, y): (&u64, &mut u64) = (&0, &mut 1);
let S { f, g: f2 }: S = S { f: 0, g: 1 };
}
}
Note that the type annotations must always be to the right of the pattern:
script {
fun example() {
let (x: &u64, y: &mut u64) = (&0, &mut 1); // ERROR! should be let (x, y): ... =
}
}
When annotations are necessary
In some cases, a local type annotation is required if the type system cannot infer the type. This commonly occurs when the type argument for a generic type cannot be inferred. For example:
script {
fun example() {
let _v1 = vector::empty(); // ERROR!
// ^^^^^^^^^^^^^^^ Could not infer this type. Try adding an annotation
let v2: vector<u64> = vector::empty(); // no error
}
}
In a rarer case, the type system might not be able to infer a type for divergent code (where all the
following code is unreachable). Both return and abort are expressions
and can have any type. A loop has type () if it has a break, but if there is no
break out of the loop, it could have any type. If these types cannot be inferred, a type
annotation is required. For example, this code:
script {
fun example() {
let a: u8 = return ();
let b: bool = abort 0;
let c: signer = loop ();
let x = return (); // ERROR!
// ^ Could not infer this type. Try adding an annotation
let y = abort 0; // ERROR!
// ^ Could not infer this type. Try adding an annotation
let z = loop (); // ERROR!
// ^ Could not infer this type. Try adding an annotation
}
}
Adding type annotations to this code will expose other errors about dead code or unused local variables, but the example is still helpful for understanding this problem.
Multiple declarations with tuples
let can introduce more than one local at a time using tuples. The locals declared inside the
parentheses are initialized to the corresponding values from the tuple.
script {
fun example() {
let () = ();
let (x0, x1) = (0, 1);
let (y0, y1, y2) = (0, 1, 2);
let (z0, z1, z2, z3) = (0, 1, 2, 3);
}
}
The type of the expression must match the arity of the tuple pattern exactly.
script {
fun example() {
let (x, y) = (0, 1, 2); // ERROR!
let (x, y, z, q) = (0, 1, 2); // ERROR!
}
}
You cannot declare more than one local with the same name in a single let.
script {
fun example() {
let (x, x) = 0; // ERROR!
}
}
Multiple declarations with structs
let can also introduce more than one local at a time when destructuring (or matching against) a
struct. In this form, the let creates a set of local variables that are initialized to the values
of the fields from a struct. The syntax looks like this:
script {
fun example() {
struct T { f1: u64, f2: u64 }
}
}
script {
fun example() {
let T { f1: local1, f2: local2 } = T { f1: 1, f2: 2 };
// local1: u64
// local2: u64
}
}
Here is a more complicated example:
module 0x42::example {
struct X { f: u64 }
struct Y { x1: X, x2: X }
fun new_x(): X {
X { f: 1 }
}
fun example() {
let Y { x1: X { f }, x2 } = Y { x1: new_x(), x2: new_x() };
assert!(f + x2.f == 2, 42);
let Y { x1: X { f: f1 }, x2: X { f: f2 } } = Y { x1: new_x(), x2: new_x() };
assert!(f1 + f2 == 2, 42);
}
}
Fields of structs can serve double duty, identifying the field to bind and the name of the variable. This is sometimes referred to as punning.
script {
fun example() {
let X { f } = e;
}
}
is equivalent to:
script {
fun example() {
let X { f: f } = e;
}
}
As shown with tuples, you cannot declare more than one local with the same name in a single let.
script {
fun example() {
let Y { x1: x, x2: x } = e; // ERROR!
}
}
Destructuring against references
In the examples above for structs, the bound value in the let was moved, destroying the struct value and binding its fields.
script {
fun example() {
struct T { f1: u64, f2: u64 }
}
}
script {
fun example() {
let T { f1: local1, f2: local2 } = T { f1: 1, f2: 2 };
// local1: u64
// local2: u64
}
}
In this scenario the struct value T { f1: 1, f2: 2 } no longer exists after the let.
If you wish instead to not move and destroy the struct value, you can borrow each of its fields. For example:
script {
fun example() {
let t = T { f1: 1, f2: 2 };
let T { f1: local1, f2: local2 } = &t;
// local1: &u64
// local2: &u64
}
}
And similarly with mutable references:
script {
fun example() {
let t = T { f1: 1, f2: 2 };
let T { f1: local1, f2: local2 } = &mut t;
// local1: &mut u64
// local2: &mut u64
}
}
This behavior can also work with nested structs.
module 0x42::example {
struct X { f: u64 }
struct Y { x1: X, x2: X }
fun new_x(): X {
X { f: 1 }
}
fun example() {
let y = Y { x1: new_x(), x2: new_x() };
let Y { x1: X { f }, x2 } = &y;
assert!(*f + x2.f == 2, 42);
let Y { x1: X { f: f1 }, x2: X { f: f2 } } = &mut y;
*f1 = *f1 + 1;
*f2 = *f2 + 1;
assert!(*f1 + *f2 == 4, 42);
}
}
Ignoring Values
In let bindings, it is often helpful to ignore some values. Local variables that start with _
will be ignored and not introduce a new variable
module 0x42::example {
fun three(): (u64, u64, u64) {
(0, 1, 2)
}
fun example() {
let (x1, _, z1) = three();
let (x2, _y, z2) = three();
assert!(x1 + z1 == x2 + z2, 42);
}
}
This can be necessary at times as the compiler will error on unused local variables
module 0x42::example {
fun example() {
let (x1, y, z1) = three(); // ERROR!
// ^ unused local 'y'
}
}
General let grammar
All the different structures in let can be combined! With that, we arrive at this general
grammar for let statements:
let-binding → let pattern-or-list type-annotationopt initializeropt
pattern-or-list → pattern | ( pattern-list )
pattern-list → pattern ,opt | pattern , pattern-list
type-annotation → : type
initializer → = expression
The general term for the item that introduces the bindings is a pattern. The pattern serves to both destructure data (possibly recursively) and introduce the bindings. The pattern grammar is as follows:
pattern → local-variable | struct-type { field-binding-list }
field-binding-list → field-binding ,opt | field-binding , field-binding-list
field-binding → field | field : pattern
A few concrete examples with this grammar applied:
script {
fun example() {
let (x, y): (u64, u64) = (0, 1);
// ^ local-variable
// ^ pattern
// ^ local-variable
// ^ pattern
// ^ pattern-list
// ^^^^ pattern-list
// ^^^^^^ pattern-or-list
// ^^^^^^^^^^^^ type-annotation
// ^^^^^^^^ initializer
// ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ let-binding
let Foo { f, g: x } = Foo { f: 0, g: 1 };
// ^^^ struct-type
// ^ field
// ^ field-binding
// ^ field
// ^ local-variable
// ^ pattern
// ^^^^ field-binding
// ^^^^^^^ field-binding-list
// ^^^^^^^^^^^^^^^ pattern
// ^^^^^^^^^^^^^^^ pattern-or-list
// ^^^^^^^^^^^^^^^^^^^^ initializer
// ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ let-binding
}
}
Mutations
Assignments
After the local is introduced (either by let or as a function parameter), the local can be
modified via an assignment:
script {
fun example(e: u8) {
let x = 0;
x = e
}
}
Unlike let bindings, assignments are expressions. In some languages, assignments return the value
that was assigned, but in Move, the type of any assignment is always ().
script {
fun example(e: u8) {
let x = 0;
(x = e) == ()
}
}
Practically, assignments being expressions means that they can be used without adding a new
expression block with braces ({…}).
script {
fun example(e: u8) {
let x = 0;
if (cond) x = 1 else x = 2;
}
}
The assignment uses the same pattern syntax scheme as let bindings:
module 0x42::example {
struct X { f: u64 }
fun new_x(): X {
X { f: 1 }
}
// This example will complain about unused variables and assignments.
fun example() {
let (x, _, z) = (0, 1, 3);
let (x, y, f, g);
(X { f }, X { f: x }) = (new_x(), new_x());
assert!(f + x == 2, 42);
(x, y, z, f, _, g) = (0, 0, 0, 0, 0, 0);
}
}
Note that a local variable can only have one type, so the type of the local cannot change between assignments.
script {
fun example() {
let x;
x = 0;
x = false; // ERROR!
}
}
Mutating through a reference
In addition to directly modifying a local with assignment, a local can be modified via a mutable
reference &mut.
script {
fun example() {
let x = 0;
let r = &mut x;
*r = 1;
assert!(x == 1, 42);
}
}
This is particularly useful if either:
(1) You want to modify different variables depending on some condition.
script {
fun example() {
let x = 0;
let y = 1;
let r = if (cond) {
&mut x
} else {
&mut y
};
*r = *r + 1;
}
}
(2) You want another function to modify your local value.
script {
fun example() {
let x = 0;
modify_ref(&mut x);
}
}
This sort of modification is how you modify structs and vectors!
script {
use 0x1::vector;
fun example() {
let v = vector::empty();
vector::push_back(&mut v, 100);
assert!(*vector::borrow(&v, 0) == 100, 42);
}
}
For more details, see Move references.
Compound Assignments
Since language version 2.1
Move also supports compound assignment operators. These are like an assignment to a variable, or a mutation through a reference, except that the assigned location must already have a value, which is read and operated on before being stored back into the location. Currently these are only applicable to numeric values.
| Syntax | Description |
|---|---|
+= | Performs addition and updates the left-hand value |
-= | Performs subtraction and updates the left-hand value |
*= | Performs multiplication and updates the left-hand value |
%= | Performs modular division and updates the left-hand value |
/= | Performs truncating division and updates the left-hand value |
&= | Performs bitwise and updates the left-hand value |
|= | Performs bitwise or and updates the left-hand value |
^= | Performs bitwise xor and updates the left-hand value |
<<= | Performs shift left and updates the left-hand value |
>>= | Performs shift right and updates the left-hand value |
For e1 += e2, the modifying operand e2 is evaluated first, followed by the assigned operand e1.
The result of performing + on the operand values is then stored in the left-hand side location.
The assigned operand is only evaluated once. Similarly for all other operations listed in the table above.
module 0x42::example {
struct S { f: u64 }
fun example() {
let x = 41;
x += 1;
assert!(x == 42);
let y = 41;
let p = &mut y;
*p += 1;
assert!(*p == 42);
let z = S { f: 41 };
z.f += 1;
assert!(z.f == 42);
}
}
Scopes
Any local declared with let is available for any subsequent expression, within that scope.
Scopes are declared with expression blocks, {…}.
Locals cannot be used outside the declared scope.
script {
fun example() {
let x = 0;
{
let y = 1;
};
x + y // ERROR!
// ^ unbound local 'y'
}
}
But, locals from an outer scope can be used in a nested scope.
script {
fun example() {
{
let x = 0;
{
let y = x + 1; // valid
}
}
}
}
Locals can be mutated in any scope where they are accessible. That mutation survives with the local, regardless of the scope that performed the mutation.
script {
fun example() {
let x = 0;
x = x + 1;
assert!(x == 1, 42);
{
x = x + 1;
assert!(x == 2, 42);
};
assert!(x == 2, 42);
}
}
Expression Blocks
An expression block is a series of statements separated by semicolons (;). The resulting value of
an expression block is the value of the last expression in the block.
script {
fun example() {
{ let x = 1; let y = 1; x + y }
}
}
In this example, the result of the block is x + y.
A statement can be either a let declaration or an expression. Remember that assignments (x = e)
are expressions of type ().
script {
fun example() {
{ let x; let y = 1; x = 1; x + y }
}
}
Function calls are another common expression of type (). Function calls that modify data are
commonly used as statements.
script {
fun example() {
{ let v = vector::empty(); vector::push_back(&mut v, 1); v }
}
}
This is not just limited to () types—any expression can be used as a statement in a sequence!
script {
fun example() {
{
let x = 0;
x + 1; // value is discarded
x + 2; // value is discarded
b"hello"; // value is discarded
}
}
}
But! If the expression contains a resource (a value without the drop ability),
you will get an error. This is because Move’s type system guarantees that any value that is dropped
has the drop ability. (Ownership must be transferred or the value must be
explicitly destroyed within its declaring module.)
script {
fun example() {
{
let x = 0;
Coin { value: x }; // ERROR!
// ^^^^^^^^^^^^^^^^^ unused value without the `drop` ability
x
}
}
}
If a final expression is not present in a block—that is, if there is a trailing semicolon ;,
there is an implicit unit () value. Similarly, if the expression block is empty, there is an
implicit unit () value.
script {
fun example() {
// Both are equivalent
{ x = x + 1; 1 / x; };
{ x = x + 1; 1 / x; () };
}
}
script {
fun example() {
// Both are equivalent
{}
{ () }
}
}
An expression block is itself an expression and can be used anyplace an expression is used. (Note: The body of a function is also an expression block, but the function body cannot be replaced by another expression.)
script {
fun example() {
let my_vector: vector<vector<u8>> = {
let v = vector::empty();
vector::push_back(&mut v, b"hello");
vector::push_back(&mut v, b"goodbye");
v
};
}
}
(The type annotation is not needed in this example and only added for clarity.)
Shadowing
If a let introduces a local variable with a name already in scope, that previous variable can no
longer be accessed for the rest of this scope. This is called shadowing.
script {
fun example() {
let x = 0;
assert!(x == 0, 42);
let x = 1; // x is shadowed
assert!(x == 1, 42);
}
}
When a local is shadowed, it does not need to retain the same type as before.
script {
fun example() {
let x = 0;
assert!(x == 0, 42);
let x = b"hello"; // x is shadowed
assert!(x == b"hello", 42);
}
}
After a local is shadowed, the value stored in the local still exists, but will no longer be
accessible. This is important to keep in mind with values of types without the
drop ability, as ownership of the value must be transferred by the end of the
function.
module 0x42::example {
struct Coin has store { value: u64 }
fun unused_resource(): Coin {
let x = Coin { value: 0 }; // ERROR!
// ^ This local still contains a value without the `drop` ability
x.value = 1;
let x = Coin { value: 10 };
x
// ^ Invalid return
}
}
When a local is shadowed inside a scope, the shadowing only remains for that scope. The shadowing is gone once that scope ends.
script {
fun example() {
let x = 0;
{
let x = 1;
assert!(x == 1, 42);
};
assert!(x == 0, 42);
}
}
Remember, locals can change type when they are shadowed.
script {
fun example() {
let x = 0;
{
let x = b"hello";
assert!(x = b"hello", 42);
};
assert!(x == 0, 42);
}
}
Move and Copy
All local variables in Move can be used in two ways, either by move or copy. If one or the other
is not specified, the Move compiler is able to infer whether a copy or a move should be used.
This means that in all the examples above, a move or a copy would be inserted by the
compiler. A local variable cannot be used without the use of move or copy.
copy will likely feel the most familiar coming from other programming languages, as it creates a
new copy of the value inside the variable to use in that expression. With copy, the local
variable can be used more than once.
script {
fun example() {
let x = 0;
let y = copy x + 1;
let z = copy x + 2;
}
}
Any value with the copy ability can be copied in this way.
move takes the value out of the local variable without copying the data. After a move occurs,
the local variable is unavailable.
script {
fun example() {
let x = 1;
let y = move x + 1;
// ------ Local was moved here
let z = move x + 2; // Error!
// ^^^^^^ Invalid usage of local 'x'
y + z;
}
}
Safety
Move’s type system will prevent a value from being used after it is moved. This is the same safety
check described in let declaration that prevents local variables from being used
before they are assigned a value.
Inference
As mentioned above, the Move compiler will infer a copy or move if one is not indicated. The
algorithm for doing so is quite simple:
- Any value with the
copyability is given acopy. - Any reference (both mutable
&mutand immutable&) is given acopy.- Except under special circumstances where it is made a
movefor predictable borrow checker errors.
- Except under special circumstances where it is made a
- Any other value is given a
move. - If the compiler can prove that the source value with copy ability is not used after the assignment, then a move may be used instead of a copy for performance, but this will be invisible to the programmer (except in possible decreased time or gas cost).
For example:
module 0x42::example {
struct Foo {
f: u64
}
struct Coin has copy {
value: u64
}
fun example() {
let s = b"hello";
let foo = Foo { f: 0 };
let coin = Coin { value: 0 };
let s2 = s; // copy
let foo2 = foo; // move
let coin2 = coin; // copy
let x = 0;
let b = false;
let addr = @0x42;
let x_ref = &x;
let coin_ref = &mut coin2;
let x2 = x; // copy
let b2 = b; // copy
let addr2 = @0x42; // copy
let x_ref2 = x_ref; // copy
let coin_ref2 = coin_ref; // copy
}
}
Equality
Move supports two equality operations == and !=
Operations
| Syntax | Operation | Description |
|---|---|---|
== | equal | Returns true if the two operands have the same value, false otherwise |
!= | not equal | Returns true if the two operands have different values, false otherwise |
Typing
Both the equal (==) and not-equal (!=) operations only work if both operands are the same type
script {
fun example() {
0 == 0; // `true`
1u128 == 2u128; // `false`
b"hello" != x"00"; // `true`
}
}
Equality and non-equality also work over user-defined types!
module 0x42::example {
struct S has copy, drop { f: u64, s: vector<u8> }
fun always_true(): bool {
let s = S { f: 0, s: b"" };
// parens are not needed but added for clarity in this example
(copy s) == s
}
fun always_false(): bool {
let s = S { f: 0, s: b"" };
// parens are not needed but added for clarity in this example
(copy s) != s
}
}
If the operands have different types, there is a type checking error
script {
fun example() {
1u8 == 1u128; // ERROR!
// ^^^^^ expected an argument of type 'u8'
b"" != 0; // ERROR!
// ^ expected an argument of type 'vector<u8>'
}
}
Typing with references
When comparing references, the type of the reference (immutable or mutable) does
not matter. This means that you can compare an immutable & reference with a mutable one &mut of
the same underlying type.
script {
fun example() {
let i = &0;
let m = &mut 1;
i == m; // `false`
m == i; // `false`
m == m; // `true`
i == i; // `true`
}
}
The above is equivalent to applying an explicit freeze to each mutable reference where needed
script {
fun example() {
let i = &0;
let m = &mut 1;
i == freeze(m); // `false`
freeze(m) == i; // `false`
m == m; // `true`
i == i; // `true`
}
}
But again, the underlying type must be the same type
script {
fun example() {
let i = &0;
let s = &b"";
i == s; // ERROR!
// ^ expected an argument of type '&u64'
}
}
Restrictions
Both == and != consume the value when comparing them. As a result, the type system enforces that
the type must have drop. Recall that without the
drop ability, ownership must be transferred by the end of the function, and such
values can only be explicitly destroyed within their declaring module. If these were used directly
with either equality == or non-equality !=, the value would be destroyed which would break
drop ability safety guarantees!
module 0x42::example {
struct Coin has store { value: u64 }
fun invalid(c1: Coin, c2: Coin) {
c1 == c2 // ERROR!
// ^^ ^^ These resources would be destroyed!
}
}
But, a programmer can always borrow the value first instead of directly comparing the value, and
reference types have the drop ability. For example
module 0x42::example {
struct Coin has store { value: u64 }
fun swap_if_equal(c1: Coin, c2: Coin): (Coin, Coin) {
let are_equal = &c1 == &c2; // valid
if (are_equal) (c2, c1) else (c1, c2)
}
}
Avoid Extra Copies
While a programmer can compare any value whose type has drop, a programmer
should often compare by reference to avoid expensive copies.
script {
fun example() {
let v1: vector<u8> = function_that_returns_vector();
let v2: vector<u8> = function_that_returns_vector();
assert!(copy v1 == copy v2, 42);
// ^^^^ ^^^^
use_two_vectors(v1, v2);
let s1: Foo = function_that_returns_large_struct();
let s2: Foo = function_that_returns_large_struct();
assert!(copy s1 == copy s2, 42);
// ^^^^ ^^^^
use_two_foos(s1, s2);
}
}
This code is perfectly acceptable (assuming Foo has drop), just not efficient.
The highlighted copies can be removed and replaced with borrows
script {
fun example() {
let v1: vector<u8> = function_that_returns_vector();
let v2: vector<u8> = function_that_returns_vector();
assert!(&v1 == &v2, 42);
// ^ ^
use_two_vectors(v1, v2);
let s1: Foo = function_that_returns_large_struct();
let s2: Foo = function_that_returns_large_struct();
assert!(&s1 == &s2, 42);
// ^ ^
use_two_foos(s1, s2);
}
}
The efficiency of the == itself remains the same, but the copys are removed and thus the program
is more efficient.
Comparison
Move supports four comparison operations <, >, <=, and >=.
Operations
| Syntax | Operation |
|---|---|
< | less than |
> | greater than |
<= | less than or equal to |
>= | greater than or equal to |
Typing
Comparison operations only work if both operands have the same type.
script {
fun example() {
0 >= 0; // `true`
1u128 > 2u128; // `false`
}
}
If the operands have different types, there is a type checking error.
script {
fun example() {
1u8 >= 1u128; // ERROR!
// ^^^^^ expected an argument of type `u8`
}
}
Prior to language version 2.2, comparison operations only worked with integer types. Since language version 2.2, comparison operations work with all types.
| Type | Semantics |
|---|---|
| integer | compare by the numerical value |
bool | true being larger than false |
address | compare as 256-bit unsigned integers |
signer | compare by the address wrapped by the signer |
struct | compare by field values first, and then by the number of fields. |
vector | compare by element values first, and then by the number of elements |
| function value | compare in order by module address, module name, function name, argument type list, and captured value list |
| reference | compare by the value being referenced |
module 0x42::example {
struct S has copy, drop { f: u64, s: vector<u8> }
fun true_example(): bool {
let s1 = S { f: 0, s: b"" };
let s2 = S { f: 1, s: b"" };
// return true
s1 < s2
}
fun false_example(): bool {
let s1 = S { f: 0, s: b"abc" };
let s2 = S { f: 0, s: b"" };
// return false
s1 < s2
}
}
Typing with references
When comparing references, the values being referenced are compared. The type of the reference (immutable or mutable) does
not matter. This means that you can compare an immutable & reference with a mutable one &mut of
the same underlying type.
script {
fun example() {
let i = &0u64;
let m = &mut 1u64;
i > m; // `false`
m < i; // `false`
m >= m; // `true`
i <= i; // `true`
}
}
The above is equivalent to applying an explicit freeze to each mutable reference where needed:
script {
fun example() {
let i = &0u64;
let m = &mut 1u64;
i > freeze(m); // `false`
freeze(m) < i; // `false`
m >= m; // `true`
i <= i; // `true`
}
}
But again, the underlying type must be the same.
script {
fun example() {
let i = &0u64;
let s = &b"";
i > s; // ERROR!
// ^ expected an argument of type '&u64'
}
}
Comparing to == and !=
Comparison operations consume operands for integers but automatically borrow them for non-integer types.
This differs from the equality == and inequality != operations, which always consume their operands
and mandate the drop ability.
module 0x42::example {
struct Coin has store { value: u64 }
fun invalid(c1: Coin, c2: Coin) {
c1 <= c2 // OK!
c1 == c2 // ERROR!
// ^^ ^^ These resources would be destroyed!
}
}
Abort and Assert
return and abort are two control flow constructs that end execution, one for
the current function and one for the entire transaction.
More information on return can be found in the linked section.
abort
abort is an expression that takes one argument: an abort code of type u64. For example:
abort 42
The abort expression halts execution of the current function and reverts all changes made to global
state by the current transaction. There is no mechanism for “catching” or otherwise handling an
abort.
Luckily, in Move transactions are all or nothing, meaning any changes to global storage are made all at once only if the transaction succeeds. Because of this transactional commitment of changes, after an abort there is no need to worry about backing out changes. While this approach is lacking in flexibility, it is incredibly simple and predictable.
Similar to return, abort is useful for exiting control flow when some
condition cannot be met.
In this example, the function will pop two items off of the vector, but will abort early if the vector does not have two items
script {
use std::vector;
fun pop_twice<T>(v: &mut vector<T>): (T, T) {
if (vector::length(v) < 2) abort 42;
(vector::pop_back(v), vector::pop_back(v))
}
}
This is even more useful deep inside a control-flow construct. For example, this function checks
that all numbers in the vector are less than the specified bound, and aborts otherwise:
script {
use std::vector;
fun check_vec(v: &vector<u64>, bound: u64) {
let i = 0;
let n = vector::length(v);
while (i < n) {
let cur = *vector::borrow(v, i);
if (cur > bound) abort 42;
i = i + 1;
}
}
}
assert
assert is a builtin, macro-like operation provided by the Move compiler. It takes two arguments, a
condition of type bool and a code of type u64
assert!(condition: bool, code: u64)
assert!(condition: bool) // Since Move 2.0
Since the operation is a macro, it must be invoked with the !. This is to convey that the
arguments to assert are call-by-expression. In other words, assert is not a normal function and
does not exist at the bytecode level. It is replaced inside the compiler with
if (condition) () else abort code
Since Move 2.0, assert without an error code is supported. If this assert is used, the
abort code 0xCA26CBD9BE0B0000 is generated. In terms of the std::error convention, this code has
category std::error::INTERNAL and reason 0.
assert is more commonly used than just abort by itself. The abort examples above can be
rewritten using assert
script {
use std::vector;
fun pop_twice<T>(v: &mut vector<T>): (T, T) {
assert!(vector::length(v) >= 2, 42); // Now uses 'assert'
(vector::pop_back(v), vector::pop_back(v))
}
}
and
script {
use std::vector;
fun check_vec(v: &vector<u64>, bound: u64) {
let i = 0;
let n = vector::length(v);
while (i < n) {
let cur = *vector::borrow(v, i);
assert!(cur <= bound, 42); // Now uses 'assert'
i = i + 1;
}
}
}
Note that because the operation is replaced with this if-else, the argument for the code is not
always evaluated. For example:
assert!(true, 1 / 0)
Will not result in an arithmetic error, it is equivalent to
if (true) () else (1 / 0)
So the arithmetic expression is never evaluated!
Abort codes in the Move VM
When using abort, it is important to understand how the u64 code will be used by the VM.
Normally, after successful execution, the Move VM produces a change-set for the changes made to global storage (added/removed resources, updates to existing resources, etc.).
If an abort is reached, the VM will instead indicate an error. Included in that error will be two
pieces of information:
- The module that produced the abort (address and name)
- The abort code.
For example
module 0x42::example {
public fun aborts() {
abort 42
}
}
script {
fun always_aborts() {
0x2::example::aborts()
}
}
If a transaction, such as the script always_aborts above, calls 0x2::example::aborts, the VM
would produce an error that indicated the module 0x2::example and the code 42.
This can be useful for having multiple aborts being grouped together inside a module.
In this example, the module has two separate error codes used in multiple functions
module 0x42::example {
use std::vector;
const EMPTY_VECTOR: u64 = 0;
const INDEX_OUT_OF_BOUNDS: u64 = 1;
// move i to j, move j to k, move k to i
public fun rotate_three<T>(v: &mut vector<T>, i: u64, j: u64, k: u64) {
let n = vector::length(v);
assert!(n > 0, EMPTY_VECTOR);
assert!(i < n, INDEX_OUT_OF_BOUNDS);
assert!(j < n, INDEX_OUT_OF_BOUNDS);
assert!(k < n, INDEX_OUT_OF_BOUNDS);
vector::swap(v, i, k);
vector::swap(v, j, k);
}
public fun remove_twice<T>(v: &mut vector<T>, i: u64, j: u64): (T, T) {
let n = vector::length(v);
assert!(n > 0, EMPTY_VECTOR);
assert!(i < n, INDEX_OUT_OF_BOUNDS);
assert!(j < n, INDEX_OUT_OF_BOUNDS);
assert!(i > j, INDEX_OUT_OF_BOUNDS);
(vector::remove<T>(v, i), vector::remove<T>(v, j))
}
}
The type of abort
The abort i expression can have any type! This is because both constructs break from the normal
control flow, so they never need to evaluate to the value of that type.
The following are not useful, but they will type check
let y: address = abort 0;
This behavior can be helpful in situations where you have a branching instruction that produces a value on some branches, but not all. For example:
script {
fun example() {
let b =
if (x == 0) false
else if (x == 1) true
else abort 42;
// ^^^^^^^^ `abort 42` has type `bool`
}
}
Conditionals
An if expression specifies that some code should only be evaluated if a certain condition is true. For example:
script {
fun example() {
if (x > 5) x = x - 5
}
}
The condition must be an expression of type bool.
An if expression can optionally include an else clause to specify another expression to evaluate when the condition is false.
script {
fun example() {
if (y <= 10) y = y + 1 else y = 10
}
}
Either the “true” branch or the “false” branch will be evaluated, but not both. Either branch can be a single expression or an expression block.
The conditional expressions may produce values so that the if expression has a result.
script {
fun example() {
let z = if (x < 100) x else 100;
}
}
The expressions in the true and false branches must have compatible types. For example:
script {
fun example() {
// x and y must be u64 integers
let maximum: u64 = if (x > y) x else y;
// ERROR! branches different types
let z = if (maximum < 10) 10u8 else 100u64;
// ERROR! branches different types, as default false-branch is () not u64
if (maximum >= 10) maximum;
}
}
If the else clause is not specified, the false branch defaults to the unit value. The following are equivalent:
script {
fun example() {
if (condition) true_branch // implied default: else ()
if (condition) true_branch else ()
}
}
Commonly, if expressions are used in conjunction with expression blocks.
script {
fun example() {
let maximum = if (x > y) x else y;
if (maximum < 10) {
x = x + 10;
y = y + 10;
} else if (x >= 10 && y >= 10) {
x = x - 10;
y = y - 10;
}
}
}
Grammar for Conditionals
if-expression → if ( expression ) expression else-clauseopt
else-clause → else expression
While, For, and Loop
Move offers three constructs for looping: while, for, and loop.
while loops
The while construct repeats the body (an expression of type unit) until the condition (an expression of type bool) evaluates to false.
Here is an example of a simple while loop that computes the sum of the numbers from 1 to n:
script {
fun sum(n: u64): u64 {
let sum = 0;
let i = 1;
while (i <= n) {
sum = sum + i;
i = i + 1
};
sum
}
}
Infinite loops are allowed:
script {
fun foo() {
while (true) { }
}
}
break
The break expression can be used to exit a loop before the condition evaluates to false. For example, this loop uses break to find the smallest factor of n that’s greater than 1:
script {
fun smallest_factor(n: u64): u64 {
// assuming the input is not 0 or 1
let i = 2;
while (i <= n) {
if (n % i == 0) break;
i = i + 1
};
i
}
}
The break expression cannot be used outside of a loop.
continue
The continue expression skips the rest of the loop and continues to the next iteration. This loop uses continue to compute the sum of 1, 2, ..., n, except when the number is divisible by 10:
script {
fun sum_intermediate(n: u64): u64 {
let sum = 0;
let i = 0;
while (i < n) {
i = i + 1;
if (i % 10 == 0) continue;
sum = sum + i;
};
sum
}
}
The continue expression cannot be used outside of a loop.
The type of break and continue
break and continue, much like return and abort, can have any type. The following examples illustrate where this flexible typing can be helpful:
script {
fun pop_smallest_while_not_equal(
v1: vector<u64>,
v2: vector<u64>,
): vector<u64> {
let result = vector::empty();
while (!vector::is_empty(&v1) && !vector::is_empty(&v2)) {
let u1 = *vector::borrow(&v1, vector::length(&v1) - 1);
let u2 = *vector::borrow(&v2, vector::length(&v2) - 1);
let popped =
if (u1 < u2) vector::pop_back(&mut v1)
else if (u2 < u1) vector::pop_back(&mut v2)
else break; // Here, `break` has type `u64`
vector::push_back(&mut result, popped);
};
result
}
}
script {
fun pick(
indexes: vector<u64>,
v1: &vector<address>,
v2: &vector<address>
): vector<address> {
let len1 = vector::length(v1);
let len2 = vector::length(v2);
let result = vector::empty();
while (!vector::is_empty(&indexes)) {
let index = vector::pop_back(&mut indexes);
let chosen_vector =
if (index < len1) v1
else if (index < len2) v2
else continue; // Here, `continue` has type `&vector<address>`
vector::push_back(&mut result, *vector::borrow(chosen_vector, index))
};
result
}
}
The for expression
The for expression iterates over a range defined using integer-typed lower_bound (inclusive) and upper_bound (non-inclusive) expressions, executing its loop body for each element of the range. for is designed for scenarios where the number of iterations of a loop is determined by a specific range.
Here is an example of a for loop that computes the sum of the elements in a range from 0 to n-1:
script {
fun sum(n: u64): u64 {
let sum = 0;
for (i in 0..n) {
sum = sum + i;
};
sum
}
}
The loop iterator variable (i in the above example) currently must be a numeric type (inferred from the bounds), and the bounds 0 and n here can be replaced by arbitrary numeric expressions. Each is only evaluated once at the start of the loop. The iterator variable i is assigned the lower_bound (in this case 0) and incremented after each loop iteration; the loop exits when the iterator i reaches or exceeds upper_bound (in this case n).
break and continue in for loops
Similar to while loops, the break expression can be used in for loops to exit prematurely. The continue expression can be used to skip the current iteration and move to the next. Here’s an example that demonstrates the use of both break and continue. The loop will iterate through numbers from 0 to n-1, summing them up. It will skip numbers that are divisible by 3 (using continue) and stop when it encounters a number greater than 10 (using break):
script {
fun sum_conditional(n: u64): u64 {
let sum = 0;
for (iter in 0..n) {
if (iter > 10) {
break; // Exit the loop if the number is greater than 10
};
if (iter % 3 == 0) {
continue; // Skip the current iteration if the number is divisible by 3
};
sum = sum + iter;
};
sum
}
}
The loop expression
The loop expression repeats the loop body (an expression with type ()) until it hits a break
Without a break, the loop will continue forever
script {
fun foo() {
let i = 0;
loop { i = i + 1 }
}
}
Here is an example that uses loop to write the sum function:
script {
fun sum(n: u64): u64 {
let sum = 0;
let i = 0;
loop {
i = i + 1;
if (i > n) break;
sum = sum + i
};
sum
}
}
As you might expect, continue can also be used inside a loop. Here is sum_intermediate from above rewritten using loop instead of while
script {
fun sum_intermediate(n: u64): u64 {
let sum = 0;
let i = 0;
loop {
i = i + 1;
if (i % 10 == 0) continue;
if (i > n) break;
sum = sum + i
};
sum
}
}
The type of while, loop, and for expression
Move loops are typed expressions. The while and for expressions always have type ().
script {
fun example() {
let () = while (i < 10) { i = i + 1 };
let () = for (i in 0..10) {};
}
}
If a loop contains a break, the expression has type unit ()
script {
fun example() {
(loop { if (i < 10) i = i + 1 else break }: ());
let () = loop { if (i < 10) i = i + 1 else break };
}
}
If loop does not have a break or a continue, loop can have any type much like return, abort, break, and continue.
script {
fun example() {
(loop (): u64);
(loop (): address);
(loop (): &vector<vector<u8>>);
}
}
Loop Labels
Since language version 2.1
A while or loop statement can have a label that can be referred to by a break or continue statement. In the presence of nested loops, this allows referring to outer loops. Example:
script {
fun example(x: u64): u64 {
'label1: while (x > 10) {
loop {
if (x % 2 == 0) {
x -= 1;
continue 'label1;
} else if (x < 10) {
break 'label1
} else
x -= 2
}
};
x
}
}
Functions
Function syntax in Move is shared between module functions and script functions. Functions inside of modules are reusable, whereas script functions are only used once to invoke a transaction.
Declaration
Functions are declared with the fun keyword followed by the function name, type parameters, parameters, a return type, acquires annotations, and finally the function body.
fun <identifier><[type_parameters: constraint],*>([identifier: type],*): <return_type> <acquires [identifier],*> <function_body>
For example
fun foo<T1, T2>(x: u64, y: T1, z: T2): (T2, T1, u64) { (z, y, x) }
Visibility
Module functions, by default, can only be called within the same module. These internal (sometimes called private) functions cannot be called from other modules or from scripts.
address 0x42 {
module m {
fun foo(): u64 { 0 }
fun calls_foo(): u64 { foo() } // valid
}
module other {
fun calls_m_foo(): u64 {
0x42::m::foo() // ERROR!
// ^^^^^ `foo` is internal to `0x42::m`
}
}
}
script {
fun calls_m_foo(): u64 {
0x42::m::foo() // ERROR!
// ^^^^^ `foo` is internal to `0x42::m`
}
}
To allow access from other modules or from scripts, the function must be declared public or public(friend).
public visibility
A public function can be called by any function defined in any module or script. As shown in the following example, a public function can be called by:
- other functions defined in the same module,
- functions defined in another module, or
- the function defined in a script.
There are also no restrictions on what argument types a public function can take or on what its return type can be.
address 0x42 {
module m {
public fun foo(): u64 { 0 }
fun calls_foo(): u64 { foo() } // valid
}
module other {
fun calls_m_foo(): u64 {
0x42::m::foo() // valid
}
}
}
script {
fun calls_m_foo(): u64 {
0x42::m::foo() // valid
}
}
package visibility
Since language version 2.0
A package function can only be called within the same package. The notion of a package is
defined by the hosting environment of Move, and not explicit in the language. Typically, the package
is defined by a manifest file Move.toml which is processed by the build environment.
The following works, provided the two modules belong to the same package and are at the same address:
module 0x42::m {
package fun foo(): u64 { 0 }
}
module 0x42::other {
fun calls_m_foo(): u64 {
0x42::m::foo() // valid
}
}
An attempt to access 0x42::m::foo from another package will fail at compile time.
In addition to the notation package fun, the longer notation public(package) fun is also supported.
Notice that package visibility is a compile-time concept that is reduced by the compiler to friend visibility (described below), which can be verified by the Move VM. The Move VM guarantees that friend functions cannot be called across address boundaries, independent of what package system a compilation environment supports.
public(friend) visibility
Since language version 2.0, friend fun replaces public(friend) fun. The old notation is still supported.
The public(friend) visibility modifier is a more restricted form of the public modifier to give more control about where a function can be used. A public(friend) function can be called by:
- other functions defined in the same module, or
- functions defined in modules which are explicitly specified in the friend list (see Friends on how to specify the friend list), and which reside at the same address.
Note that since we cannot declare a script to be a friend of a module, the functions defined in scripts can never call a public(friend) function.
address 0x42 {
module m {
friend 0x42::n; // friend declaration
public(friend) fun foo(): u64 { 0 }
friend fun foo2(): u64 { 0 } // Since Move 2.0
fun calls_foo(): u64 { foo() } // valid
fun calls_foo2(): u64 { foo2() } // valid, since Move 2.0
}
module n {
fun calls_m_foo(): u64 {
0x42::m::foo() // valid
}
fun calls_m_foo2(): u64 {
0x42::m::foo2() // valid, since Move 2.0
}
}
module other {
fun calls_m_foo(): u64 {
0x42::m::foo() // ERROR!
// ^^^^^ `foo` can only be called from a `friend` of module `0x42::m`
}
fun calls_m_foo2(): u64 {
0x42::m::foo2() // ERROR!
// ^^^^^^ `foo2` can only be called from a `friend` of module `0x42::m`
}
}
}
script {
fun calls_m_foo(): u64 {
0x42::m::foo() // ERROR!
// ^^^^^ `foo` can only be called from a `friend` of module `0x42::m`
}
}
entry modifier
The entry modifier is designed to allow module functions to be safely and directly invoked much like scripts. This allows module writers to specify which functions can be invoked to begin execution. The module writer then knows that any non-entry function will be called from a Move program already in execution.
Essentially, entry functions are the “main” functions of a module, and they specify where Move programs start executing.
Note, though, that an entry function can still be called by other Move functions. So while they can serve as the start of a Move program, they aren’t restricted to that case.
For example:
address 0x42 {
module m {
public entry fun foo() {}
fun calls_foo() { foo(); } // valid!
}
module n {
fun calls_m_foo() {
0x42::m::foo(); // valid!
}
}
module other {
public entry fun calls_m_foo() {
0x42::m::foo(); // valid!
}
}
}
script {
fun calls_m_foo() {
0x42::m::foo(); // valid!
}
}
Even internal functions can be marked as entry! This lets you guarantee that the function is called only at the beginning of execution (assuming you do not call it elsewhere in your module)
address 0x42 {
module m {
entry fun foo() {} // valid! entry functions do not have to be public
}
module n {
fun calls_m_foo() {
0x42::m::foo(); // ERROR!
// ^^^^^ `foo` is internal to `0x42::m`
}
}
module other {
public entry fun calls_m_foo() {
0x42::m::foo(); // ERROR!
// ^^^^^ `foo` is internal to `0x42::m`
}
}
}
script {
fun calls_m_foo() {
0x42::m::foo(); // ERROR!
// ^^^^^ `foo` is internal to `0x42::m`
}
}
Entry functions can accept parameters of the following types: primitive types, references to a
signer, vectors (where the element type is itself acceptable),
and certain standard library types such as String, Object, and Option.
Entry functions must not have any return values.
Since language version 2.4: public structs and enums can also be used as entry and view function arguments, provided the type has the copy ability and does not have the key ability. All field types must themselves be valid argument types, recursively. This requirement on copy ensures that no resource type can be constructed from transaction arguments, preserving Move’s resource safety guarantees.
Name
Function names can start with letters a to z or letters A to Z. After the first character, function names can contain underscores _, letters a to z, letters A to Z, or digits 0 to 9.
module 0x42::example {
// all valid
fun FOO() {}
fun bar_42() {}
fun bAZ19() {}
// invalid
fun _bAZ19() {} // Function names cannot start with '_'
}
Type Parameters
After the name, functions can have type parameters
module 0x42::example {
fun id<T>(x: T): T { x }
fun example<T1: copy, T2>(x: T1, y: T2): (T1, T1, T2) { (copy x, x, y) }
}
For more details, see Move generics.
Parameters
Function parameters are declared with a local variable name followed by a type annotation:
module 0x42::example {
fun add(x: u64, y: u64): u64 { x + y }
}
We read this as x has type u64
A function does not have to have any parameters at all.
module 0x42::example {
fun useless() {}
}
This is very common for functions that create new or empty data structures
module 0x42::example {
struct Counter { count: u64 }
fun new_counter(): Counter {
Counter { count: 0 }
}
}
Acquires
When a function accesses a resource using move_from, borrow_global, or borrow_global_mut, the function must indicate that it acquires that resource. This is then used by Move’s type system to ensure the references into global storage are safe, specifically that there are no dangling references into global storage.
module 0x42::example {
struct Balance has key { value: u64 }
public fun add_balance(s: &signer, value: u64) {
move_to(s, Balance { value })
}
public fun extract_balance(addr: address): u64 acquires Balance {
let Balance { value } = move_from<Balance>(addr); // acquires needed
value
}
}
acquires annotations must also be added for transitive calls within the module. Calls to these functions from another module do not need to be annotated with these acquires because one module cannot access resources declared in another module — so the annotation is not needed to ensure reference safety.
module 0x42::example {
struct Balance has key { value: u64 }
public fun add_balance(s: &signer, value: u64) {
move_to(s, Balance { value })
}
public fun extract_balance(addr: address): u64 acquires Balance {
let Balance { value } = move_from<Balance>(addr); // acquires needed
value
}
public fun extract_and_add(sender: address, receiver: &signer) acquires Balance {
let value = extract_balance(sender); // acquires needed here
add_balance(receiver, value)
}
}
module 0x42::other {
fun extract_balance(addr: address): u64 {
0x42::example::extract_balance(addr) // no acquires needed
}
}
A function can acquire as many resources as it needs to
module 0x42::example {
use std::vector;
struct Balance has key { value: u64 }
struct Box<T> has key { items: vector<T> }
public fun store_two<Item1: store, Item2: store>(
addr: address,
item1: Item1,
item2: Item2,
) acquires Balance, Box {
let balance = borrow_global_mut<Balance>(addr); // acquires needed
balance.value = balance.value - 2;
let box1 = borrow_global_mut<Box<Item1>>(addr); // acquires needed
vector::push_back(&mut box1.items, item1);
let box2 = borrow_global_mut<Box<Item2>>(addr); // acquires needed
vector::push_back(&mut box2.items, item2);
}
}
Return type
After the parameters, a function specifies its return type.
module 0x42::example {
fun zero(): u64 { 0 }
}
Here : u64 indicates that the function’s return type is u64.
Note: A function can return an immutable
&or mutable&mutreference if derived from an input reference. Keep in mind that this means a function cannot return a reference to global storage unless it is an inline function.
Using tuples, a function can return multiple values:
module 0x42::example {
fun one_two_three(): (u64, u64, u64) { (0, 1, 2) }
}
If no return type is specified, the function has an implicit return type of unit (). These functions are equivalent:
module 0x42::example {
fun just_unit1(): () { () }
fun just_unit2() { () }
fun just_unit3() {}
}
script functions must have a return type of unit ():
script {
fun do_nothing() {}
}
As mentioned in the tuples section, these tuple “values” are virtual and do not exist at runtime. So for a function that returns unit (), it will not be returning any value at all during execution.
Function body
A function’s body is an expression block. The return value of the function is the last value in the sequence
module 0x42::example {
fun example(): u64 {
let x = 0;
x = x + 1;
x // returns 'x'
}
}
See the section below for more information on returns
For more information on expression blocks, see Move variables.
Native Functions
Some functions do not have a body specified, and instead have the body provided by the VM. These functions are marked native.
Without modifying the VM source code, a programmer cannot add new native functions. Furthermore, it is the intent that native functions are used for either standard library code or for functionality needed for the given Move environment.
Most native functions you will likely see are in standard library code such as vector
module std::vector {
native public fun empty<Element>(): vector<Element>;
// ...
}
Calling
When calling a function, the name can be specified either through an alias or fully qualified
module 0x42::example {
public fun zero(): u64 { 0 }
}
script {
use 0x42::example::{Self, zero};
fun call_zero() {
// With the `use` above all of these calls are equivalent
0x42::example::zero();
example::zero();
zero();
}
}
When calling a function, an argument must be given for every parameter.
module 0x42::example {
public fun takes_none(): u64 { 0 }
public fun takes_one(x: u64): u64 { x }
public fun takes_two(x: u64, y: u64): u64 { x + y }
public fun takes_three(x: u64, y: u64, z: u64): u64 { x + y + z }
}
script {
use 0x42::example;
fun call_all() {
example::takes_none();
example::takes_one(0);
example::takes_two(0, 1);
example::takes_three(0, 1, 2);
}
}
Type arguments can be either specified or inferred. Both calls are equivalent.
module 0x42::example {
public fun id<T>(x: T): T { x }
}
script {
use 0x42::example;
fun call_all() {
example::id(0);
example::id<u64>(0);
}
}
For more details, see Move generics.
Returning values
The result of a function, its “return value”, is the final value of its function body. For example
module 0x42::example {
fun add(x: u64, y: u64): u64 {
x + y
}
}
As mentioned above, the function’s body is an expression block. The expression block can be a sequence of various statements, and the final expression in the block will be the value of that block.
module 0x42::example {
fun double_and_add(x: u64, y: u64): u64 {
let double_x = x * 2;
let double_y = y * 2;
double_x + double_y
}
}
The return value here is double_x + double_y
return expression
A function implicitly returns the value that its body evaluates to. However, functions can also use the explicit return expression:
module 0x42::example {
fun f1(): u64 { return 0 }
fun f2(): u64 { 0 }
}
These two functions are equivalent. In this slightly more involved example, the function subtracts two u64 values, but returns early with 0 if the second value is too large:
module 0x42::example {
fun safe_sub(x: u64, y: u64): u64 {
if (y > x) return 0;
x - y
}
}
Note that the body of this function could also have been written as if (y > x) 0 else x - y.
However, where return really shines is in exiting deep within other control flow constructs. In this example, the function iterates through a vector to find the index of a given value:
module 0x42::example {
use std::vector;
use std::option::{Self, Option};
fun index_of<T>(v: &vector<T>, target: &T): Option<u64> {
let i = 0;
let n = vector::length(v);
while (i < n) {
if (vector::borrow(v, i) == target) return option::some(i);
i = i + 1
};
option::none()
}
}
Using return without an argument is shorthand for return (). That is, the following two functions are equivalent:
module 0x42::example {
fun foo1() { return }
fun foo2() { return () }
}
Inline Functions
Inline functions are functions whose bodies are expanded in place at the caller location during compile time. Thus, inline functions do not appear in Move bytecode as separate functions: all calls to them are expanded away by the compiler. In certain circumstances, they may lead to faster execution and save gas. However, users should be aware that they could lead to larger bytecode size: excessive inlining potentially triggers various size restrictions.
One can define an inline function by adding the inline keyword to a function declaration as shown below:
module 0x42::example {
inline fun percent(x: u64, y: u64): u64 { x * 100 / y }
}
If we call this inline function as percent(2, 200), the compiler will replace this call with the inline function’s body, as if the user has written 2 * 100 / 200.
Function parameters and lambda expressions
Inline functions support function parameters, which accept lambda expressions (i.e., anonymous functions) as arguments. This feature allows writing several common programming patterns elegantly. Similar to inline functions, lambda expressions are also expanded at call site.
A lambda expression includes a list of parameter names (enclosed within ||) followed by the body.
Some simple examples are: |x| x + 1, |x, y| x + y, || 1, || { 1 }.
A lambda’s body can refer to variables available in the scope where the lambda is defined: this is also known as capturing.
Such variables can be read or written (if mutable) by the lambda expression.
The type of function parameter is written as |<list of parameter types>| <return type>.
For example, when the function parameter type is |u64, u64| bool, any lambda expression that takes two u64 parameters and returns a bool value can be provided as the argument.
Below is an example that showcases many of these concepts in action (this example is taken from the std::vector module):
module 0x42::example {
/// Fold the function over the elements.
/// E.g, `fold(vector[1,2,3], 0, f)` is the same as `f(f(f(0, 1), 2), 3)`.
public inline fun fold<Accumulator, Element>(
v: vector<Element>,
init: Accumulator,
f: |Accumulator, Element|Accumulator
): Accumulator {
let accu = init;
// Note: `for_each` is an inline function, but is not shown here.
for_each(v, |elem| accu = f(accu, elem));
accu
}
}
The type signature of the elided public inline function for_each is fun for_each<Element>(v: vector<Element>, f: |Element|).
Its second parameter f is a function parameter which accepts any lambda expression that consumes an Element and returns nothing.
In the code example, we use the lambda expression |elem| accu = f(accu, elem) as an argument to this function parameter.
Note that this lambda expression captures the variable accu from the outer scope.
Current restrictions
There are plans to loosen some of these restrictions in the future, but for now,
- Only inline functions can have function parameters.
- Only explicit lambda expressions can be passed as an argument to an inline function’s function parameters.
- Inline functions and lambda expressions
- cannot have
returnexpressions; or freebreakorcontinueexpressions (occurring outside of a loop) - cannot return lambda expressions.
- cannot have
- Cyclic recursion involving only inline functions is not allowed.
- Parameters in lambda expressions must not be type annotated (e.g.,
|x: u64| x + 1is not allowed): their types are inferred.
Additional considerations
- Avoid using module-private constants/methods in public inline functions. When such inline functions are called outside of that module, an in-place expansion at call site leads to invalid access of the private constants/methods.
- Avoid marking large functions that are called at different locations as inline. Also avoid inline functions calling lots of other inline functions transitively. These may lead to excessive inlining and increase the bytecode size.
- Inline functions can be useful for returning references to global storage, which non-inline functions cannot do.
Inline functions and references
As mentioned briefly in a “tip” above inline functions can use references more freely than normal functions.
For example, actual arguments to a call to a non-inline function may not be aliased unsafely
(multiple & parameters referring to the same object, with at least one of them &mut),
but calls to inline functions do not necessarily have that restriction, as long as no reference
usage conflicts remain after the function is inlined.
inline fun add(dest: &mut u64, a: &u64, b: &u64) {
*dest = *a + *b;
}
fun user(...) {
...
x = 3;
add(&mut x, &x, &x); // legal only because of inlining
...
}
A reference-typed value returned from a non-inline function must be derived from a reference parameter passed to the function, but this need not be the case for an inline function, as long as the referred value is in the function scope after inlining.
The exact details of reference safety and “borrow checking” are complex and documented elsewhere.
Advanced Move users find new expressiveness by understanding that
“borrow checking” happens only after all inline function calls are expanded.
However, with this power comes new responsibility: documentation of a nontrivial inline function should
probably explain any underlying restrictions on reference parameters and results at a call site.
Dot (receiver) function call style
Since language version 2.0
By using the well-known name self as the first parameter for a function declaration, one can enable calling this function with the . syntax – often also called receiver style syntax. Example:
module 0x42::example {
struct S {}
fun foo(self: &S, x: u64) { /* ... */ }
//...
fun example() {
let s = S {};
s.foo(1);
}
}
The call s.foo(1) is syntactic sugar for foo(&s, 1). Notice that the compiler automatically inserts the reference operator. The 2nd, old notation is still available for foo, so one can incrementally introduce the new call style without breaking existing code.
The type of the self argument can be a struct or an immutable or mutable reference to a struct. The struct must be declared in the same module as the function.
Notice that you do not need to use the modules which introduce receiver functions. The compiler will find those functions automatically based on the argument type of s in a call like s.foo(1). This, in combination with the automatic insertion of reference operators, can make code using this syntax significantly more concise.
The receiver style syntax can also be used on generic functions, like shown below for the generic function std::vector::remove<T>(self: &mut vector<T>, i: u64): T.
module 0x42::example {
fun bar() {
let v = vector[1, 2, 3];
let e1 = v.remove(0); // type params inferred for `remove<T>`
assert!(e1 == 1);
let e2 = v.remove::<u8>(0); // type params explicitly specified
assert!(e2 == 2);
}
}
Function Values
Since language version 2.2
Move supports function values as first-class citizens of the language. A function value is constructed from the name of a function or by a lambda expression, and is evaluated by passing parameters to it and causing the underlying function to be executed. This feature is often called dynamic dispatch. Which concrete function is called is not known to the caller and is determined by the runtime value. Dynamic dispatch is an important tool for composing applications. Move makes dynamic dispatch safe by providing builtin protection mechanisms against reentrancy, which can be further refined by user choice.
Function Types
The type of function values is already known from inline functions. A function type is denoted, for example, as |u64|bool, indicating a function that takes a number and returns a boolean. Lists of types are separated by commas, as in |u64, bool|(bool, u8).
Function types can have associated abilities, written as |u64|bool has copy. Multiple abilities are separated by plus, as in |u64|bool has copy+drop. If no abilities are provided, the value can be only moved around and evaluated (for evaluation of function values, see below).
Function values can be stored in fields of structs or enums. In this case, the field type inherits the abilities of the struct:
struct S has key {
func: |u64| bool /* has store */ // not needed since inherited
}
Operations on Functions
A function value is evaluated by providing the corresponding number of parameters, similarly to calling a named function. During evaluation, the function value is consumed. Hence if the value needs to be evaluated multiple times, its type must have the copy ability:
let f: |u64|bool has copy = |x| x > 0;
assert!(f(1) == f(2))
Function values support equality and ordering. Note that those relations are based on the name of the underlying function behind a runtime value, and do not reflect semantic equivalence.
Function Type Wrappers
Function types, especially those with abilities, can be verbose, and repetitive when the same function type appears many times in the code. For this purpose, Move recognizes struct wrappers around function types as a special case. They can be used to effectively create named function types:
struct Predicate<T>(|&T|bool) has copy;
Move supports this feature by automatically converting function values into the wrapper type and vice versa. Examples:
let f: Predicate<u64> = |x| *x > 0; // lambda converts to Predicate
assert!(f(&22)) // Predicate callable
Denoting Function Values
Function values can be constructed by directly using a function name. The resulting function type is derived from the signature of the underlying function, with abilities copy+drop. If the function is public, those function values have the store ability as well:
public fun is_even(x: u64): bool { x % 2 == 0 }
fun is_odd(x: u64): bool { x % 2 == 1 }
...
let f: |u64|bool has copy+drop+store = is_even;
let g: |u64|bool has copy+drop = is_odd;
A persistent function is required to build a storable function value because it needs to be guaranteed that the underlying function exists and can be safely restored from storage at any point in the future. However, a code upgrade may change the underlying implementation of the function, while its signature is persistent.
While public and entry functions are persistent by default, a non-public function needs to be marked with the attribute #[persistent] to become storable:
#[persistent] fun is_odd(x: u64): bool { x % 2 == 1 }
...
let g: |u64|bool has copy+drop+store = is_odd;
Using the #[persistent] attribute is preferred if the only objective is to make a function storable, avoiding security implications with public or entry visibility.
Lambda Expressions and Closures
Function values can be denoted by lambda expressions (as also available as parameters for inline functions). Lambda expressions can capture context variables by value: those values are moved (or copied) into a closure, from where they are produced when the function is evaluated. Examples:
struct S(u64); // cannot be copied or dropped
...
let s = S(1);
let add = |y| { let S(x) = s; x + y }; // s will be moved into the closure
assert!(add(2) == 3)
Closures with captured values are lexicographically ordered using first the name of the underlying function (which may be generated from lambda lifting), and then the captured values.
The type of the closure constructed by a lambda expression is inferred from the expression (for example, the type of add in the example above is inferred as |u64|u64). The abilities of this function type are derived as follows. By default, the function underlying a closure is a private function, so the function itself is copy+drop (and not store). This is intersected with the abilities of all the captured context variables. However, there is a special case for lambdas where instead of a private function an underlying persistent function can be identified, such that the lambda just ‘delays’ certain arguments of this function. This pattern is also called ‘currying’ in functional programming (named after the mathematician Curry). Here are some examples:
#[persistent] fun add(x: u64, y: u64) { x + y }
...
let x = 22;
let f: |u64|u64 has copy+drop+store = |y| add(x, y); // 1st argument captured, 2nd argument delayed
let f: |u64|u64 has copy+drop+store = |y| add(y, x); // 1st argument delayed, 2nd argument captured
Notice it is not possible to capture reference values at this point of time in Move. Thus, the following code does not compile:
let x = &22;
let f = |y| add(*x, y) // DOES NOT COMPILE
Related, it is not possible to mutate any locals in the context of a lambda. Specifically, the following pattern as known from lambdas with inline functions, is not supported:
let x = 0;
collection.for_each(|e| x += e) // DOES NOT COMPILE
However, the actual parameters of lambdas can be references, only captured values are restricted. For example:
let x = 22;
let f : |&u64|u64 = |y| add(x, *y)
Reentrancy Check
Via dynamic dispatch of function values, reentrancy of modules in a chain of function calls is possible. If module m1 uses module m2, and m1 calls m2::f passing a function value to it, this function value can callback into m1. This situation is called reentrancy, and is not possible in Move without function values, since the module usage relation is acyclic.
The Move VM dynamically detects reentrancy of a module and locks all resources declared in that module from being accessed. Thus, during reentrancy of m, calling resource operations like &m::R[addr], &mut m::R[addr], and move_from<m::R> leads to an abort. Here is an example:
module 0x42::caller {
use 0x42::callee;
struct R{ count: u64 } has key;
fun calling() acquires R {
let r = &mut R[@addr];
// This callback is OK, because `R` is not accessed
callee::call_me(r, |x| do_something(x))
// This callback will lead to reentrancy runtime error
callee::call_me(r, |_| R[@addr].count += 1)
r.call_count += 1
}
fun do_something(r: &mut R) { .. }
}
module 0x42::callee {
fun call_me<T(x: &mut T, action: |&mut T|) {
action(x)
}
}
Notice that dispatching a function value to a concrete function in the same module is also considered to be reentrancy. If the function callee::call_me would be moved into the module caller, the same semantics is in effect.
The default reentrancy check ensures consistency of Move’s reference semantics and suppresses side effects of reentrancy for the resources owned by the re-entered module. However, re-entered code is allowed to still access resource state managed by modules outside the reentrancy path. Such state accesses can be considered bad design, but they exist.
For these purposes, the #[module_lock] attribute can be attached to a function:
module 0x42::account { ... }
module 0x42::caller {
#[module_lock] // without this lock, the notify call could withdraw more than intended.
fun transfer(from: address, to: address, amount: u64, notify: |u64|) {
// Oops. This should be really differently designed, using `Coin` type and moving it.
assert!(account::balance(from) - MIN_BALANCE >= amount);
account::deposit(to, amount)
notify(amount); // attempt to re-enter `transfer` is blocked
account::withdraw(from, amount);
}
}
While a function with this attribute is running, all calls reentering any module will lead to an abort, providing stronger protection.
The #[module_lock] restriction is not the default behavior because it is too strong for typical patterns of higher-order programming. For example, collection.find(|x| cond(x)) will lead to a reentrancy of the module that contains this expression, from the module that defines the collection type.
Structs and Resources
A struct is a user-defined data structure containing typed fields. Structs can store any non-reference type, including other structs.
We often refer to struct values as resources if they cannot be copied and cannot be dropped. In this case, resource values must have ownership transferred by the end of the function. This property makes resources particularly well suited for defining global storage schemas or for representing important values (such as a token).
By default, structs are linear and ephemeral. By this we mean that they: cannot be copied, cannot be dropped, and cannot be stored in global storage. This means that all values have to have ownership transferred (linear) and the values must be dealt with by the end of the program’s execution (ephemeral). We can relax this behavior by giving the struct abilities which allow values to be copied or dropped and also to be stored in global storage or to define global storage schemas.
Defining Structs
Structs must be defined inside a module:
module 0x2::m {
struct Foo { x: u64, y: bool }
struct Bar {}
struct Baz { foo: Foo, }
// ^ note: it is fine to have a trailing comma
}
Structs cannot be recursive, so the following definition is invalid:
module 0x2::m {
struct Foo { x: Foo }
// ^ error! Foo cannot contain Foo
}
For positional structs that use numbered instead of named fields, see the positional structs section.
As mentioned above: by default, a struct declaration is linear and ephemeral. So to allow the value
to be used with certain operations (that copy it, drop it, store it in global storage, or use it as
a storage schema), structs can be granted abilities by annotating them with
has <ability>:
module 0x2::m {
struct Foo has copy, drop { x: u64, y: bool }
}
For more details, see the annotating structs section.
Naming
Structs must start with a capital letter A to Z. After the first letter, struct names can
contain underscores _, letters a to z, letters A to Z, or digits 0 to 9.
module 0x2::m {
struct Foo {}
struct BAR {}
struct B_a_z_4_2 {}
}
This naming restriction of starting with A to Z is in place to give room for future language
features. It may or may not be removed later.
Using Structs
Creating Structs
Values of a struct type can be created (or “packed”) by indicating the struct name, followed by a value for each field:
module 0x2::m {
struct Foo has drop { x: u64, y: bool }
struct Baz has drop { foo: Foo }
fun example() {
let foo = Foo { x: 0, y: false };
let baz = Baz { foo };
}
}
If you initialize a struct field with a local variable whose name is the same as the field, you can use the following shorthand:
module 0x2::m {
fun example() {
let baz = Baz { foo: foo };
// is equivalent to
let baz = Baz { foo };
}
}
This is sometimes called “field name punning”.
Destroying Structs via Pattern Matching
Struct values can be destroyed by pattern matching them in let bindings or assignments.
module 0x2::m {
struct Foo { x: u64, y: bool }
struct Bar { foo: Foo }
struct Baz {}
fun example_destroy_foo() {
let foo = Foo { x: 3, y: false };
let Foo { x, y: foo_y } = foo;
// ^ shorthand for `x: x`
// two new bindings
// x: u64 = 3
// foo_y: bool = false
}
fun example_destroy_foo_wildcard() {
let foo = Foo { x: 3, y: false };
let Foo { x, y: _ } = foo;
// only one new binding since y was bound to a wildcard
// x: u64 = 3
}
fun example_destroy_foo_assignment() {
let x: u64;
let y: bool;
Foo { x, y } = Foo { x: 3, y: false };
// mutating existing variables x & y
// x = 3, y = false
}
fun example_foo_ref() {
let foo = Foo { x: 3, y: false };
let Foo { x, y } = &foo;
// two new bindings
// x: &u64
// y: &bool
}
fun example_foo_ref_mut() {
let foo = Foo { x: 3, y: false };
let Foo { x, y } = &mut foo;
// two new bindings
// x: &mut u64
// y: &mut bool
}
fun example_destroy_bar() {
let bar = Bar { foo: Foo { x: 3, y: false } };
let Bar { foo: Foo { x, y } } = bar;
// ^ nested pattern
// two new bindings
// x: u64 = 3
// y: bool = false
}
fun example_destroy_baz() {
let baz = Baz {};
let Baz {} = baz;
}
}
Borrowing Structs and Fields
The & and &mut operators can be used to create references to structs or fields. These examples
include some optional type annotations (e.g., : &Foo) to demonstrate the type of operations.
module 0x2::m {
fun example() {
let foo = Foo { x: 3, y: true };
let foo_ref: &Foo = &foo;
let y: bool = foo_ref.y; // reading a field via a reference to the struct
let x_ref: &u64 = &foo.x;
let x_ref_mut: &mut u64 = &mut foo.x;
*x_ref_mut = 42; // modifying a field via a mutable reference
}
}
It is possible to borrow inner fields of nested structs:
module 0x2::m {
fun example() {
let foo = Foo { x: 3, y: true };
let bar = Bar { foo };
let x_ref = &bar.foo.x;
}
}
You can also borrow a field via a reference to a struct:
module 0x2::m {
fun example() {
let foo = Foo { x: 3, y: true };
let foo_ref = &foo;
let x_ref = &foo_ref.x;
// this has the same effect as let x_ref = &foo.x
}
}
Reading and Writing Fields
If a field is copyable, you can read and copy a field’s value by dereferencing the borrowed field:
module 0x2::m {
fun example() {
let foo = Foo { x: 3, y: true };
let bar = Bar { foo: copy foo };
let x: u64 = *&foo.x;
let y: bool = *&foo.y;
let foo2: Foo = *&bar.foo;
}
}
The dot operator can be used to read and copy any copyable field of a struct without explicit borrowing and dereferencing:
module 0x2::m {
fun example() {
let foo = Foo { x: 3, y: true };
let x = foo.x; // x == 3
let y = foo.y; // y == true
let bar = Bar { foo };
let foo2: Foo = *&bar.foo; // `Foo` must be copyable
let foo3: Foo = bar.foo; // same as the statement above
}
}
Dot operators can be chained to access nested fields:
module 0x2::m {
fun example() {
let baz = Baz { foo: Foo { x: 3, y: true } };
let x = baz.foo.x; // x = 3;
}
}
Furthermore, the dot syntax can be used to modify fields.
module 0x2::m {
fun example() {
let foo = Foo { x: 3, y: true };
foo.x = 42; // foo = Foo { x: 42, y: true }
foo.y = !foo.y; // foo = Foo { x: 42, y: false }
let bar = Bar { foo }; // bar = Bar { foo: Foo { x: 42, y: false } }
bar.foo.x = 52; // bar = Bar { foo: Foo { x: 52, y: false } }
bar.foo = Foo { x: 62, y: true }; // bar = Bar { foo: Foo { x: 62, y: true } }
}
}
The dot syntax also works via a reference to a struct:
module 0x2::m {
fun example() {
let foo = Foo { x: 3, y: true };
let foo_ref = &mut foo;
foo_ref.x = foo_ref.x + 1;
}
}
Privileged Struct Operations
Most struct operations on a struct type T can only be performed inside the module that declares
T:
- Struct types can only be created (“packed”), destroyed (“unpacked”) inside the module that defines the struct.
- The fields of a struct are only accessible inside the module that defines the struct.
Following these rules, if you want to modify your struct outside the module, you will need to provide public APIs for them. The end of the chapter contains some examples of this.
However, struct types are always visible to another module or script:
// m.move
module 0x2::m {
struct Foo has drop { x: u64 }
public fun new_foo(): Foo {
Foo { x: 42 }
}
}
// n.move
module 0x2::n {
use 0x2::m;
struct Wrapper has drop {
foo: m::Foo
}
fun f1(foo: m::Foo) {
let x = foo.x;
// ^ error! cannot access fields of `foo` here
}
fun f2() {
let foo_wrapper = Wrapper { foo: m::new_foo() };
}
}
By default, structs do not have visibility modifiers—all struct operations are restricted to the defining module. Move 2.4 introduces explicit visibility modifiers; see Struct Visibility below.
Struct Visibility
Since language version 2.4
By default, struct construction, destruction, and field access are module-private, as described in Privileged Struct Operations. Move 2.4 introduces explicit visibility modifiers that allow external modules to perform these operations. See Struct and Enum Visibility for shared rules on visibility levels, performance, restrictions, transaction arguments, and upgradability.
Syntax
Place the modifier before the struct keyword:
module 0x42::shapes {
// Accessible from any module
public struct Point {
x: u64,
y: u64,
}
// Accessible from modules in the same package
package struct Config {
value: u64,
}
}
module 0x42::lib {
friend 0x42::consumer;
// Accessible only from declared friend modules
friend struct Token {
amount: u64,
}
}
Cross-Module Access
External modules with sufficient visibility can construct and destruct the struct, and read and mutate its fields.
module 0x42::shapes {
public struct Point {
x: u64,
y: u64,
}
}
module 0x42::user {
use 0x42::shapes::Point;
fun mirror(p: Point): Point {
let Point { x, y } = p; // destruct
Point { x: y, y: x } // construct
}
fun shift_x(p: &mut Point, delta: u64) {
p.x = p.x + delta; // read and write to fields
}
}
Ownership
As mentioned above in Defining Structs, structs are by default linear and ephemeral. This means they cannot be copied or dropped. This property can be very useful when modeling real-world resources like money, as you do not want money to be duplicated or get lost in circulation.
module 0x2::m {
struct Foo { x: u64 }
public fun copying_resource() {
let foo = Foo { x: 100 };
let foo_copy = copy foo; // error! 'copy'-ing requires the 'copy' ability
let foo_ref = &foo;
let another_copy = *foo_ref // error! dereference requires the 'copy' ability
}
public fun destroying_resource1() {
let foo = Foo { x: 100 };
// error! when the function returns, foo still contains a value.
// This destruction requires the 'drop' ability
}
public fun destroying_resource2(f: &mut Foo) {
*f = Foo { x: 100 } // error!
// destroying the old value via a write requires the 'drop' ability
}
}
To fix the second example (fun destroying_resource1), you would need to manually “unpack” the
resource:
module 0x2::m {
struct Foo { x: u64 }
public fun destroying_resource1_fixed() {
let foo = Foo { x: 100 };
let Foo { x: _ } = foo;
}
}
Recall that you are only able to deconstruct a resource within the module in which it is defined. This can be leveraged to enforce certain invariants in a system, for example, conservation of money.
If on the other hand, your struct does not represent something valuable, you can add the abilities
copy and drop to get a struct value that might feel more familiar from other programming
languages:
module 0x2::m {
struct Foo has copy, drop { x: u64 }
public fun run() {
let foo = Foo { x: 100 };
let foo_copy = copy foo;
// ^ this code copies foo, whereas `let x = foo` or
// `let x = move foo` both move foo
let x = foo.x; // x = 100
let x_copy = foo_copy.x; // x = 100
// both foo and foo_copy are implicitly discarded when the function returns
}
}
Positional Structs
Since language version 2.0
A struct can be declared to have positional fields, fields that are not named but numbered. Positional structs behave similarly to regular structs, except they provide a different syntax that may be more suitable for use cases with only a few fields.
Fields of positional structs are assigned in the order they appear. In the example
below, field 0 is of type u64 and field 1 is of type u8:
module 0x2::m {
struct Pair(u64, u8);
}
Abilities for positional structs are declared after and not before the field list,
module 0x2::m {
struct Pair(u64, u8) has copy, drop;
}
For pure type tags, often used for phantom types in Move code, the list of arguments can be also completely omitted:
module 0x2::m {
struct TypeTag has copy, drop;
}
Values of positional structs are created and deconstructed using
PositionalStructs(arguments), as shown below:
module 0x2::m {
fun work() {
let value = Pair(1, true);
let Pair(number, boolean) = value;
assert!(number == 1 && boolean == true);
}
}
Fields of positional structs can be accessed using the position as a field selector. For example, in the code above, value.0 and value.1 can be used to access the two fields without deconstructing value.
Partial Patterns
Since language version 2.0
Patterns can use the .. notation to match any remaining, non-listed fields in structs or variants with named fields, and omitted fields at either the beginning or end of a struct or variant with positional fields. Here are
some examples:
module 0x2::m {
struct Foo{ x: u8, y: u16, z: u32 }
struct Bar(u8, u16, u32);
fun foo_get_x(self: &Foo): u16 {
let Foo{y, ..} = self;
x
}
fun bar_get_0(self: &Foo): u8 {
let Bar(x, ..) = self;
x
}
fun bar_get_2(self: &Foo): u52 {
// For positional structs, one can also put the
// .. at the beginning.
let Bar(.., z) = self;
z
}
}
Notice that partial patterns can currently not be used as the left-hand side of assignment.
While one can use let Bar(x, ..) = v, we do not yet support let x; Bar(x, ..) = v.
Storing Resources in Global Storage
Structs with the key ability can be saved directly in
persistent global storage. All values stored within those key
structs must have the store ability. See the ability and
global storage chapters for more detail.
Examples
Here are two short examples of how you might use structs to represent valuable data (in the case of
Coin) or more classical data (in the case of Point and Circle).
Example 1: Coin
module 0x2::m {
// We do not want the Coin to be copied because that would be duplicating this "money",
// so we do not give the struct the 'copy' ability.
// Similarly, we do not want programmers to destroy coins, so we do not give the struct the
// 'drop' ability.
// However, we *want* users of the modules to be able to store this coin in persistent global
// storage, so we grant the struct the 'store' ability. This struct will only be inside of
// other resources inside of global storage, so we do not give the struct the 'key' ability.
struct Coin has store {
value: u64,
}
public fun mint(value: u64): Coin {
// You would want to gate this function with some form of access control to prevent
// anyone using this module from minting an infinite amount of coins.
Coin { value }
}
public fun withdraw(coin: &mut Coin, amount: u64): Coin {
assert!(coin.value >= amount, 1000);
coin.value = coin.value - amount;
Coin { value: amount }
}
public fun deposit(coin: &mut Coin, other: Coin) {
let Coin { value } = other;
coin.value = coin.value + value;
}
public fun split(coin: Coin, amount: u64): (Coin, Coin) {
let other = withdraw(&mut coin, amount);
(coin, other)
}
public fun merge(coin1: Coin, coin2: Coin): Coin {
deposit(&mut coin1, coin2);
coin1
}
public fun destroy_zero(coin: Coin) {
let Coin { value } = coin;
assert!(value == 0, 1001);
}
}
Example 2: Geometry
module 0x2::point {
struct Point has copy, drop, store {
x: u64,
y: u64,
}
public fun new(x: u64, y: u64): Point {
Point {
x, y
}
}
public fun x(p: &Point): u64 {
p.x
}
public fun y(p: &Point): u64 {
p.y
}
fun abs_sub(a: u64, b: u64): u64 {
if (a < b) {
b - a
}
else {
a - b
}
}
public fun dist_squared(p1: &Point, p2: &Point): u64 {
let dx = abs_sub(p1.x, p2.x);
let dy = abs_sub(p1.y, p2.y);
dx*dx + dy*dy
}
}
module 0x2::circle {
use 0x2::point::{Self, Point};
struct Circle has copy, drop, store {
center: Point,
radius: u64,
}
public fun new(center: Point, radius: u64): Circle {
Circle { center, radius }
}
public fun overlaps(c1: &Circle, c2: &Circle): bool {
let dist_squared_value = point::dist_squared(&c1.center, &c2.center);
let r1 = c1.radius;
let r2 = c2.radius;
dist_squared_value <= r1*r1 + 2*r1*r2 + r2*r2
}
}
Enums
Since language version 2.0
Enum types are similar to struct types but support defining multiple variants of the data layout. Each variant has its own distinct set of fields. Enum variants are supported in expressions, with tools for testing, matching, and deconstructing them.
Declaration of Enum Types
An enum type declaration lists the number of different variants, as seen in the example below:
enum Shape {
Circle{radius: u64},
Rectangle{width: u64, height: u64}
}
There can be zero or more fields for an enum variant. If no arguments are given, the braces can also be omitted, declaring simple values:
enum Color {
Red, Blue, Green
}
Like struct types, enum types can have abilities. For example, the Color enum type would be appropriately declared as copyable, droppable, and storable, like primitive number types:
enum Color has copy, drop, store, key { Red, Blue, Green }
Enum types can also have the key ability and appear as roots of data in global storage. A common usage of enums in this context is versioning of data:
enum VersionedData has key {
V1{name: String}
V2{name: String, age: u64}
}
Similar to structs, enum types can be generic and take positional arguments. For example, the type below represents a generic result type, where the variant constructors use positional instead of named arguments (see also positional structs).
enum Result<T> has copy, drop, store {
Err(u64),
Ok(T)
}
Constructing Enum Values
An enum value is constructed similarly to a struct value:
let s: String;
let data = VersionedData::V1{name: s};
If the enum variant has no fields, the braces can also be omitted:
let color = Color::Blue;
Name Resolution for Enum Variants
The variant names for an enum need to be qualified by the enum type name, as in VersionedData::V1.
Note: Aliasing via the
useclause is currently not supported for enum variants, but will be added in later language versions.
In certain cases (such as match expressions, below), the Move compiler can infer the enum type from the context, and the qualification by the type name may be omitted:
fun f(data: VersionedData) {
match (data) { V1{..} => .., ..} // simple variant name OK
}
Matching Enum Values
The value of an enum value can be inspected using a match expression. For example:
fun area(self: &Shape): u64 {
match (self) {
Circle{radius} => mul_with_pi(*radius * *radius),
Rectangle{width, height} => *width * *height
}
}
Notice above that the value matched is an immutable reference to an enum value. A match expression can also consume a value, or match over a mutable reference for interior updates:
fun scale_radius(self: &mut Shape, factor: u64) {
match (self) {
Circle{radius: r} => *r = *r * factor,
_ => {} // do nothing if not a Circle
}
}
The patterns provided in the match expression are evaluated sequentially, in order of textual occurrence, until a match is found. It is a compile-time error if not all known patterns are covered.
Patterns can be nested and contain conditions, as in the following example:
let r : Result<Result<u64>> = Ok(Err(42));
let v = match (r) {
Ok(Err(c)) if c < 42 => 0,
Ok(Err(c)) if c >= 42 => 1,
Ok(_) => 2,
_ => 3
};
assert!(v == 1);
Notice that in the above example, the last match clause (_) covers both patterns Ok(Err(_)) and Err(_). Although at execution time, the earlier clauses match Ok(Err(c)) for all values of c, the compiler cannot be sure all cases are covered due to the conditionals: conditions in match expressions are not considered when tracking coverage. Thus the first two clauses in the match expression above are not sufficient for match completeness, and an additional clause is required to avoid a compiler error.
Testing Enum Variants
With the is operator, one can examine whether a given enum value is of a given variant:
let data: VersionedData;
if (data is VersionedData::V1) { .. }
The operator allows specifying a list of variants, separated by “|” characters. The variants need not be qualified by the enum name if the type of the expression being tested is known:
assert!(data is V1|V2);
Selecting From Enum Values
It is possible to directly select a field from an enum value. Recall the definition of versioned data:
enum VersionedData has key {
V1{name: String}
V2{name: String, age: u64}
}
One can write code as below to directly select the fields of variants:
let s: String;
let data1 = VersionedData::V1{name: s};
let data2 = VersionedData::V2{name: s, age: 20};
assert!(data1.name == data2.name)
assert!(data2.age == 20);
Notice that field selection aborts if the enum value has no variant with the given field. This is the case for data1.age.
The abort code used for this case is 0xCA26CBD9BE0B0001. In terms of the std::error convention, this code has
category std::error::INTERNAL and reason 1.
Field selection is only possible if the field is uniquely named and typed throughout all variants. Thus, the following yields a compile-time error:
enum VersionedData has key {
V1{name: String}
V2{name: u64}
}
data.name
// ^^^^^ compile time error that `name` field selection is ambiguous
Using Enums Patterns in Lets
An enum variant pattern may be used in a let statement:
let data: VersionData;
let V1{name} = data;
Unpacking the enum value will abort if the variant is not the expected one. To ensure that all variants of an enum are handled, a match expression is recommended instead of a let. The match is checked at compile time, ensuring that all variants are covered. In some cases, tools like the Move Prover can be used to verify that unexpected aborts cannot happen with a let.
Destroying Enums via Pattern Matching
Similar to struct values, enum values can be destroyed by explicitly unpacking them. Enums can be unpacked with pattern matching in a match expression, enum pattern in a let binding, or enum pattern in an assignment.
// Note: `Shape` has no `drop` ability, so must be destroyed with explicit unpacking.
enum Shape {
Circle{radius: u64},
Rectangle{width: u64, height: u64}
}
fun destroy_empty(self: Shape) {
match (self) {
Shape::Circle{radius} => assert!(radius == 0),
Shape::Rectangle{width, height: _} => assert!(width == 0),
}
}
fun example_destroy_shapes() {
let c = Shape::Circle{radius: 0};
let r = Shape::Rectangle{width: 0, height: 0};
c.destroy_empty();
r.destroy_empty();
}
Enum Visibility
Since language version 2.4
By default, enum construction, deconstruction, matching, and field selection are restricted to the defining module. Move 2.4 introduces explicit visibility modifiers for enums, following the same model described in Struct and Enum Visibility.
Syntax
Place the modifier before the enum keyword. For enums with abilities, the has clause follows the variant list as usual:
module 0x42::types {
// Accessible from any module
public enum Color has copy, drop {
Red, Green, Blue,
}
// Accessible from modules in the same package
package enum Status has drop {
Active,
Inactive,
}
}
module 0x42::lib {
friend 0x42::consumer;
// Accessible only from declared friend modules
friend enum Event has drop {
Created, Updated, Deleted,
}
}
Cross-Module Access
External modules with sufficient visibility can construct and destruct the enum, test variants, select fields from variants, and mutate them.
module 0x42::types {
public enum Shape has drop {
Circle { radius: u64 },
Rectangle { width: u64, height: u64 },
}
}
module 0x42::user {
use 0x42::types::Shape;
fun area(s: Shape): u64 {
match (s) {
Shape::Circle { radius } => radius * radius,
Shape::Rectangle { width, height } => width * height,
}
}
fun is_circle(s: &Shape): bool {
s is Shape::Circle
}
}
Enum Type Upgrade Compatibility
An enum type can be upgraded by another enum type if the new type only adds new variants at the end of the variant list. All variants present in the old enum type must also appear in the new type, in the same order and starting from the beginning. Consider the VersionedData type, which might have begun with a single version:
enum VersionedData has key {
V1{name: String}
}
This type could be upgraded to the version we used so far in this text:
enum VersionedData has key {
V1{name: String}
V2{name: String, age: u64}
}
The following upgrade would not be allowed, since the order of variants must be preserved:
enum VersionedData has key {
V2{name: String, age: u64} // not a compatible upgrade
V1{name: String}
}
Struct and Enum Visibility
Since language version 2.4
By default, struct and enum construction, destruction, and field access are restricted to the defining module. Move 2.4 introduces explicit visibility modifiers that allow external modules to perform these operations.
Visibility Levels
Three modifiers are available, mirroring the function visibility keywords:
| Modifier | Accessible from |
|---|---|
public | Any module |
package | All modules in the same package |
friend | Modules declared as friend in the defining module |
public(package) and public(friend) are accepted as aliases for package and friend respectively, but are discouraged and will be deprecated. Prefer the shorthand forms.
Performance Consideration
Cross-module type operations are currently compiled into function calls rather than direct bytecode instructions. Thus, they are not a zero-cost abstraction yet: they are more expensive than the equivalent operations performed within the defining module. This is expected to change in the future with VM improvements. In the meantime, use visibility modifiers only when the cross-module access is genuinely needed.
Restrictions
Types with the key ability cannot have visibility modifiers. Types stored as roots in global storage must remain module-private to preserve global storage access control.
// ERROR: types with the key ability cannot be public, package, or friend
public struct Resource has key { value: u64 }
public enum VersionedData has key { V1 { name: vector<u8> } }
Global storage operations remain module-only. Even for public types, move_to, move_from, borrow_global, and borrow_global_mut are restricted to the defining module.
Transaction Arguments
public structs and enums can be passed as entry and view function arguments if the type has the copy ability and does not have the key ability. All field types must themselves be valid argument types, recursively.
module 0x42::types {
public struct Point has copy, drop {
x: u64,
y: u64,
}
public enum Direction has copy, drop {
North, South, East, West,
}
// Both Point and Direction can be passed directly as transaction arguments
entry fun move_to_point(s: &signer, destination: Point) { .. }
entry fun move_player(s: &signer, dir: Direction) { .. }
}
Upgradability
Visibility can be broadened in a package upgrade but not narrowed:
- A private type can be upgraded to
package,friend, orpublic. - A
friendorpackagetype can be upgraded topublic. - A
friendorpackagetype can be downgraded back to private.
Constants
Constants are a way of giving a name to shared, static values inside of a module or script.
The constant’s value must be known at compile time. The constant’s value is stored in the compiled module or script, and each time the constant is used, a new copy of that value is made.
Declaration
Constant declarations begin with the const keyword, followed by a name, a type, and a value. They
can exist in either a script or module
const <name>: <type> = <expression>;
For example
script {
const MY_ERROR_CODE: u64 = 0;
fun main(input: u64) {
assert!(input > 0, MY_ERROR_CODE);
}
}
module 0x42::example {
const MY_ADDRESS: address = @0x42;
public fun permissioned(s: &signer) {
assert!(std::signer::address_of(s) == MY_ADDRESS, 0);
}
}
Naming
Constants must start with a capital letter A to Z. After the first letter, constant names can
contain underscores _, letters a to z, letters A to Z, or digits 0 to 9.
script {
const FLAG: bool = false;
const MY_ERROR_CODE: u64 = 0;
const ADDRESS_42: address = @0x42;
}
Even though you can use letters a to z in a constant, the
general style guidelines are to use just uppercase letters A to Z,
with underscores _ between each word.
This naming restriction of starting with A to Z is in place to give room for future language
features. It may or may not be removed later.
Visibility
public constants are not currently supported. const values can be used only in the declaring
module.
Valid Expressions
Currently, constants are limited to the primitive types bool, u8, u16, u32, u64, u128, u256, address, and
vector<u8>. Future support for other vector values (besides the “string”-style literals) will
come later.
Values
Commonly, consts are assigned a simple value, or literal, of their type. For example
script {
const MY_BOOL: bool = false;
const MY_ADDRESS: address = @0x70DD;
const BYTES: vector<u8> = b"hello world";
const HEX_BYTES: vector<u8> = x"DEADBEEF";
}
Complex Expressions
In addition to literals, constants can include more complex expressions, as long as the compiler is able to reduce the expression to a value at compile time.
Currently, equality operations, all boolean operations, all bitwise operations, and all arithmetic operations can be used.
script {
const RULE: bool = true && false;
const CAP: u64 = 10 * 100 + 1;
const SHIFTY: u8 = {
(1 << 1) * (1 << 2) * (1 << 3) * (1 << 4)
};
const HALF_MAX: u128 = 340282366920938463463374607431768211455 / 2;
const REM: u256 = 57896044618658097711785492504343953926634992332820282019728792003956564819968 % 654321;
const EQUAL: bool = 1 == 1;
}
If the operation results in a runtime exception, the compiler will give an error that it is unable to generate the constant’s value:
script {
const DIV_BY_ZERO: u64 = 1 / 0; // error!
const SHIFT_BY_A_LOT: u64 = 1 << 100; // error!
const NEGATIVE_U64: u64 = 0 - 1; // error!
}
Note that constants cannot currently refer to other constants. This feature, along with support for other expressions, will be added in the future.
Builtin Constants
Builtin constants are predefined named values which can be used from anywhere in the code. The following constants are supported:
since language version 2.2
| Name | Value |
|---|---|
__COMPILE_FOR_TESTING__: bool | true when compiling unit tests, false otherwise |
since language version 2.3
| Name | Value |
|---|---|
MAX_U8: u8 | 28 - 1 |
MAX_U16: u16 | 216 - 1 |
MAX_U32: u32 | 232 - 1 |
MAX_U64: u64 | 264 - 1 |
MAX_U128: u128 | 2128 - 1 |
MAX_U256: u256 | 2256 - 1 |
MAX_I8: i8 | 27 - 1 |
MAX_I16: i16 | 215 - 1 |
MAX_I32: i32 | 231 - 1 |
MAX_I64: i64 | 263 - 1 |
MAX_I128: i128 | 2127 - 1 |
MAX_I256: i256 | 2255 - 1 |
MIN_I8: i8 | -27 |
MIN_I16: i16 | -215 |
MIN_I32: i32 | -231 |
MIN_I64: i64 | -263 |
MIN_I128: i128 | -2127 |
MIN_I256: i256 | -2255 |
A builtin constant can be shadowed by a user declaration. For example, the below code is valid in language version 2.3, and the builtin constant will simply be shadowed:
module 0x44::m {
const MAX_U8: u8 = 255; // User defined constant shadowing builtin constant
}
Generics
Generics can be used to define functions and structs over different input data types. This language feature is sometimes referred to as parametric polymorphism. In Move, we will often use the term generics interchangeably with type parameters and type arguments.
Generics are commonly used in library code, such as in vector, to declare code that works over any possible instantiation (that satisfies the specified constraints). In other frameworks, generic code can sometimes be used to interact with global storage in many different ways that all still share the same implementation.
Declaring Type Parameters
Both functions and structs can take a list of type parameters in their signatures, enclosed by a pair of angle brackets <...>.
Generic Functions
Type parameters for functions are placed after the function name and before the (value) parameter list. The following code defines a generic identity function that takes a value of any type and returns that value unchanged.
module 0x42::example {
fun id<T>(x: T): T {
// this type annotation is unnecessary but valid
(x: T)
}
}
Once defined, the type parameter T can be used in parameter types, return types, and inside the function body.
Generic Structs
Type parameters for structs are placed after the struct name, and can be used to name the types of the fields.
module 0x42::example {
struct Foo<T> has copy, drop { x: T }
struct Bar<T1, T2> has copy, drop {
x: T1,
y: vector<T2>,
}
}
Note that type parameters do not have to be used.
Type Arguments
Calling Generic Functions
When calling a generic function, one can specify the type arguments for the function’s type parameters in a list enclosed by a pair of angle brackets.
module 0x42::example {
fun foo() {
let x = id<bool>(true);
}
}
If you do not specify the type arguments, Move’s type inference will supply them for you.
Using Generic Structs
Similarly, one can attach a list of type arguments for the struct’s type parameters when constructing or destructing values of generic types.
module 0x42::example {
fun foo() {
let foo = Foo<bool> { x: true };
let Foo<bool> { x } = foo;
}
}
If you do not specify the type arguments, Move’s type inference will supply them for you.
Type Argument Mismatch
If you specify the type arguments, and they conflict with the actual values supplied, an error will be given:
module 0x42::example {
fun foo() {
let x = id<u64>(true); // error! true is not a u64
}
}
and similarly:
module 0x42::example {
fun foo() {
let foo = Foo<bool> { x: 0 }; // error! 0 is not a bool
let Foo<address> { x } = foo; // error! bool is incompatible with address
}
}
Type Inference
In most cases, the Move compiler will be able to infer the type arguments, so you don’t have to write them down explicitly. Here’s what the examples above would look like if we omit the type arguments:
module 0x42::example {
fun foo() {
let x = id(true);
// ^ <bool> is inferred
let foo = Foo { x: true };
// ^ <bool> is inferred
let Foo { x } = foo;
// ^ <bool> is inferred
}
}
Note: when the compiler is unable to infer the types, you’ll need to annotate them manually. A common scenario is to call a function with type parameters appearing only at return positions.
module 0x2::m {
use std::vector;
fun foo() {
// let v = vector::new();
// ^ The compiler cannot figure out the element type.
let v = vector::new<u64>();
// ^~~~~ Must annotate manually.
}
}
However, the compiler will be able to infer the type if that return value is used later in that function:
module 0x2::m {
use std::vector;
fun foo() {
let v = vector::new();
// ^ <u64> is inferred
vector::push_back(&mut v, 42);
}
}
Unused Type Parameters
For a struct definition, an unused type parameter is one that does not appear in any field defined in the struct, but is checked statically at compile time. Move allows unused type parameters so the following struct definition is valid:
module 0x2::m {
struct Foo<T> {
foo: u64
}
}
This can be convenient when modeling certain concepts. Here is an example:
module 0x2::m {
// Currency Specifiers
struct Currency1 {}
struct Currency2 {}
// A generic coin type that can be instantiated using a currency
// specifier type.
// e.g. Coin<Currency1>, Coin<Currency2> etc.
struct Coin<Currency> has store {
value: u64
}
// Write code generically about all currencies
public fun mint_generic<Currency>(value: u64): Coin<Currency> {
Coin { value }
}
// Write code concretely about one currency
public fun mint_concrete(value: u64): Coin<Currency1> {
Coin { value }
}
}
In this example,
struct Coin<Currency> is generic on the Currency type parameter,
which specifies the currency of the coin and
allows code to be written either
generically on any currency or
concretely on a specific currency.
This genericity applies even when the Currency type parameter
does not appear in any of the fields defined in Coin.
Phantom Type Parameters
In the example above,
although struct Coin asks for the store ability,
neither Coin<Currency1> nor Coin<Currency2> will have the store ability.
This is because of the rules for
Conditional Abilities and Generic Types
and the fact that Currency1 and Currency2 don’t have the store ability,
despite the fact that they are not even used in the body of struct Coin.
This might cause some unpleasant consequences.
For example, we are unable to put Coin<Currency1> into a wallet in the global storage.
One possible solution would be to
add spurious ability annotations to Currency1 and Currency2
(i.e., struct Currency1 has store {}).
But, this might lead to bugs or security vulnerabilities
because it weakens the types with unnecessary ability declarations.
For example, we would never expect a resource in the global storage to have a field in type Currency1,
but this would be possible with the spurious store ability.
Moreover, the spurious annotations would be infectious,
requiring many functions generic on the unused type parameter to also include the necessary constraints.
Phantom type parameters solve this problem.
Unused type parameters can be marked as phantom type parameters,
which do not participate in the ability derivation for structs.
In this way,
arguments to phantom type parameters are not considered when deriving the abilities for generic types,
thus avoiding the need for spurious ability annotations.
For this relaxed rule to be sound,
Move’s type system guarantees that a parameter declared as phantom is either
not used at all in the struct definition, or
it is only used as an argument to type parameters also declared as phantom.
Declaration
In a struct definition
a type parameter can be declared as phantom by adding the phantom keyword before its declaration.
If a type parameter is declared as phantom we say it is a phantom type parameter.
When defining a struct, Move’s type checker ensures that every phantom type parameter is either
not used inside the struct definition or
it is only used as an argument to a phantom type parameter.
More formally, if a type is used as an argument to a phantom type parameter we say the type appears in phantom position. With this definition in place, the rule for the correct use of phantom parameters can be specified as follows: A phantom type parameter can only appear in phantom position.
The following two examples show valid uses of phantom parameters.
In the first one,
the parameter T1 is not used at all inside the struct definition.
In the second one, the parameter T1 is only used as an argument to a phantom type parameter.
module 0x2::m {
struct S1<phantom T1, T2> { f: u64 }
// ^^
// Ok: T1 does not appear inside the struct definition
struct S2<phantom T1, T2> { f: S1<T1, T2> }
// ^^
// Ok: T1 appears in phantom position
}
The following code shows examples of violations of the rule:
module 0x2::m {
struct S1<phantom T> { f: T }
// ^
// Error: Not a phantom position
struct S2<T> { f: T }
struct S3<phantom T> { f: S2<T> }
// ^
// Error: Not a phantom position
}
Instantiation
When instantiating a struct, the arguments to phantom parameters are excluded when deriving the struct abilities. For example, consider the following code:
module 0x2::m {
struct S<T1, phantom T2> has copy { f: T1 }
struct NoCopy {}
struct HasCopy has copy {}
}
Consider now the type S<HasCopy, NoCopy>.
Since S is defined with copy and all non-phantom arguments have copy
then S<HasCopy, NoCopy> also has copy.
Phantom Type Parameters with Ability Constraints
Ability constraints and phantom type parameters are orthogonal features in the sense that phantom parameters can be declared with ability constraints. When instantiating a phantom type parameter with an ability constraint, the type argument has to satisfy that constraint, even though the parameter is phantom. For example, the following definition is perfectly valid:
module 0x2::m {
struct S<phantom T: copy> {}
}
The usual restrictions apply and T can only be instantiated with arguments having copy.
Constraints
In the examples above, we have demonstrated how one can use type parameters to define “unknown” types that can be plugged in by callers at a later time. This however means the type system has little information about the type and has to perform checks in a very conservative way. In some sense, the type system must assume the worst case scenario for an unconstrained generic. Simply put, by default generic type parameters have no abilities.
This is where constraints come into play: they offer a way to specify what properties these unknown types have so the type system can allow operations that would otherwise be unsafe.
Declaring Constraints
Constraints can be imposed on type parameters using the following syntax.
// T is the name of the type parameter
T: <ability> (+ <ability>)*
The <ability> can be any of the four abilities, and a type parameter can be constrained with multiple abilities at once. So all the following would be valid type parameter declarations:
T: copy
T: copy + drop
T: copy + drop + store + key
Verifying Constraints
Constraints are checked at call sites so the following code won’t compile.
module 0x2::m {
struct Foo<T: key> { x: T }
struct Bar { x: Foo<u8> }
// ^ error! u8 does not have 'key'
struct Baz<T> { x: Foo<T> }
// ^ error! T does not have 'key'
}
module 0x2::m {
struct R {}
fun unsafe_consume<T>(x: T) {
// error! x does not have 'drop'
}
fun consume<T: drop>(x: T) {
// valid!
// x will be dropped automatically
}
fun foo() {
let r = R {};
consume<R>(r);
// ^ error! R does not have 'drop'
}
}
module 0x2::m {
struct R {}
fun unsafe_double<T>(x: T) {
(copy x, x)
// error! x does not have 'copy'
}
fun double<T: copy>(x: T) {
(copy x, x) // valid!
}
fun foo(): (R, R) {
let r = R {};
double<R>(r)
// ^ error! R does not have 'copy'
}
}
For more information, see the abilities section on conditional abilities and generic types.
Limitations on Recursions
Recursive Structs
Generic structs cannot contain fields of the same type, either directly or indirectly, even with different type arguments. All the following struct definitions are invalid:
module 0x2::m {
struct Foo<T> {
x: Foo<u64> // error! 'Foo' containing 'Foo'
}
struct Bar<T> {
x: Bar<T> // error! 'Bar' containing 'Bar'
}
// error! 'A' and 'B' forming a cycle, which is not allowed either.
struct A<T> {
x: B<T, u64>
}
struct B<T1, T2> {
x: A<T1>,
y: A<T2>
}
}
Advanced Topic: Type-level Recursions
Move allows generic functions to be called recursively. However, when used in combination with generic structs, this could create an infinite number of types in certain cases, and allowing this means adding unnecessary complexity to the compiler, VM, and other language components. Therefore, such recursions are forbidden.
Allowed:
module 0x2::m {
struct A<T> {}
// Finitely many types -- allowed.
// foo1<T> -> foo1<T> -> foo1<T> -> ... is valid
fun foo1<T>() {
foo1<T>();
}
// Finitely many types -- allowed.
// foo2<T> -> foo2<A<u64>> -> foo2<A<u64>> -> ... is valid
fun foo2<T>() {
foo2<A<u64>>();
}
}
Not allowed:
module 0x2::m {
struct A<T> {}
// Infinitely many types -- NOT allowed.
// error!
// foo<T> -> foo<A<T>> -> foo<A<A<T>>> -> ...
fun foo<T>() {
foo<A<T>>();
}
}
module 0x2::n {
struct A<T> {}
// Infinitely many types -- NOT allowed.
// error!
// foo<T1, T2> -> bar<T2, T1> -> foo<T2, A<T1>>
// -> bar<A<T1>, T2> -> foo<A<T1>, A<T2>>
// -> bar<A<T2>, A<T1>> -> foo<A<T2>, A<A<T1>>>
// -> ...
fun foo<T1, T2>() {
bar<T2, T1>();
}
fun bar<T1, T2>() {
foo<T1, A<T2>>();
}
}
Note that the check for type-level recursions is based on a conservative analysis of the call sites and does NOT take control flow or runtime values into account.
module 0x2::m {
struct A<T> {}
fun foo<T>(n: u64) {
if (n > 0) {
foo<A<T>>(n - 1);
};
}
}
The function in the example above will technically terminate for any given input and therefore create only finitely many types, but it is still considered invalid by Move’s type system.
Abilities
Abilities are a typing feature in Move that controls what actions are permissible for values of a given type. This system grants fine-grained control over the “linear” typing behavior of values, as well as if and how values are used in global storage. This is implemented by gating access to certain bytecode instructions so that for a value to be used with the bytecode instruction, it must have the ability required (if one is required at all—not every instruction is gated by an ability).
The Four Abilities
The four abilities are:
copy- Allows values of types with this ability to be copied.
drop- Allows values of types with this ability to be popped/dropped.
store- Allows values of types with this ability to exist inside a struct in global storage.
key- Allows the type to serve as a key for global storage operations.
copy
The copy ability allows values of types with that ability to be copied. It gates the ability to copy values out of local variables with the copy operator and to copy values via references with dereference *e.
If a value has copy, all values contained inside of that value have copy.
drop
The drop ability allows values of types with that ability to be dropped. By dropped, we mean that value is not transferred and is effectively destroyed as the Move program executes. As such, this ability gates the ability to ignore values in a multitude of locations, including:
- not using the value in a local variable or parameter
- not using the value in a sequence via
; - overwriting values in variables in assignments
- overwriting values via references when writing
*e1 = e2.
If a value has drop, all values contained inside of that value have drop.
store
The store ability allows values of types with this ability to exist inside a struct (resource) in global storage, but not necessarily as a top-level resource in global storage. This is the only ability that does not directly gate an operation. Instead, it gates the existence in global storage when used in tandem with key.
If a value has store, all values contained inside of that value have store.
key
The key ability allows the type to serve as a key for global storage operations. It gates all global storage operations, so in order for a type to be used with move_to, borrow_global, move_from, etc., the type must have the key ability. Note that the operations still must be used in the module where the key type is defined (in a sense, the operations are private to the defining module).
If a value has key, all values contained inside of that value have store. This is the only ability with this sort of asymmetry.
Builtin Types
Most primitive, builtin types have copy, drop, and store except for signer, which just has drop.
bool,u8,u16,u32,u64,u128,u256, andaddressall havecopy,drop, andstore.signerhasdrop- Cannot be copied and cannot be put into global storage
vector<T>may havecopy,drop, andstoredepending on the abilities ofT.- See Conditional Abilities and Generic Types for more details.
- Immutable references
&and mutable references&mutboth havecopyanddrop.- This refers to copying and dropping the reference itself, not what they refer to.
- References cannot appear in global storage, hence they do not have
store.
None of the primitive types have key, meaning none of them can be used directly with the global storage operations.
Annotating Structs
To declare that a struct has an ability, it is declared with has <ability> after the struct name but before the fields. For example:
module 0x42::example {
struct Ignorable has drop { f: u64 }
struct Pair has copy, drop, store { x: u64, y: u64 }
}
In this case: Ignorable has the drop ability. Pair has copy, drop, and store.
All of these abilities have strong guarantees over these gated operations. The operation can be performed on the value only if it has that ability; even if the value is deeply nested inside some other collection!
As such: when declaring a struct’s abilities, certain requirements are placed on the fields. All fields must satisfy these constraints. These rules are necessary so that structs satisfy the reachability rules for the abilities given above. If a struct is declared with the ability…
copy, all fields must havecopy.drop, all fields must havedrop.store, all fields must havestore.key, all fields must havestore.keyis the only ability currently that doesn’t require itself.
For example:
module 0x42::example {
// A struct without any abilities
struct NoAbilities {}
struct WantsCopy has copy {
f: NoAbilities, // ERROR 'NoAbilities' does not have 'copy'
}
}
and similarly:
module 0x42::example {
// A struct without any abilities
struct NoAbilities {}
struct MyResource has key {
f: NoAbilities, // Error 'NoAbilities' does not have 'store'
}
}
Conditional Abilities and Generic Types
When abilities are annotated on a generic type, not all instances of that type are guaranteed to have that ability. Consider this struct declaration:
module 0x42::example {
struct Cup<T> has copy, drop, store, key { item: T }
}
It might be very helpful if Cup could hold any type, regardless of its abilities. The type system can see the type parameter, so it should be able to remove abilities from Cup if it sees a type parameter that would violate the guarantees for that ability.
This behavior might sound a bit confusing at first, but it might be more understandable if we think about collection types. We could consider the builtin type vector to have the following type declaration:
vector<T> has copy, drop, store;
We want vectors to work with any type. We don’t want separate vector types for different abilities. So what are the rules we would want? Precisely the same ones we would want for the field rules above. So, it would be safe to copy a vector value only if the inner elements can be copied. It would be safe to ignore a vector value only if the inner elements can be ignored/dropped. And, it would be safe to put a vector in global storage only if the inner elements can be in global storage.
To have this extra expressiveness, a type might not have all the abilities it was declared with, depending on the instantiation of that type; instead, the abilities a type will have depend on both its declaration and its type arguments. For any type, type parameters are pessimistically assumed to be used inside the struct, so the abilities are only granted if the type parameters meet the requirements described above for fields. Taking Cup from above as an example:
Cuphas the abilitycopyonly ifThascopy.- It has
droponly ifThasdrop. - It has
storeonly ifThasstore. - It has
keyonly ifThasstore.
Here are examples for this conditional system for each ability:
Example: conditional copy
module 0x42::example {
struct NoAbilities {}
struct S has copy, drop { f: bool }
struct Cup<T> has copy, drop, store { item: T }
fun example(c_x: Cup<u64>, c_s: Cup<S>) {
// Valid, 'Cup<u64>' has 'copy' because 'u64' has 'copy'
let c_x2 = copy c_x;
// Valid, 'Cup<S>' has 'copy' because 'S' has 'copy'
let c_s2 = copy c_s;
}
fun invalid(c_account: Cup<signer>, c_n: Cup<NoAbilities>) {
// Invalid, 'Cup<signer>' does not have 'copy'.
// Even though 'Cup' was declared with copy, the instance does not have 'copy'
// because 'signer' does not have 'copy'
let c_account2 = copy c_account;
// Invalid, 'Cup<NoAbilities>' does not have 'copy'
// because 'NoAbilities' does not have 'copy'
let c_n2 = copy c_n;
}
}
Example: conditional drop
module 0x42::example {
struct NoAbilities {}
struct S has copy, drop { f: bool }
struct Cup<T> has copy, drop, store { item: T }
fun unused() {
Cup<bool> { item: true }; // Valid, 'Cup<bool>' has 'drop'
Cup<S> { item: S { f: false } }; // Valid, 'Cup<S>' has 'drop'
}
fun left_in_local(c_account: Cup<signer>): u64 {
let c_b = Cup<bool> { item: true };
let c_s = Cup<S> { item: S { f: false } };
// Valid return: 'c_account', 'c_b', and 'c_s' have values
// but 'Cup<signer>', 'Cup<bool>', and 'Cup<S>' have 'drop'
0
}
fun invalid_unused() {
// Invalid, Cannot ignore 'Cup<NoAbilities>' because it does not have 'drop'.
// Even though 'Cup' was declared with 'drop', the instance does not have 'drop'
// because 'NoAbilities' does not have 'drop'
Cup<NoAbilities> { item: NoAbilities {} };
}
fun invalid_left_in_local(): u64 {
let c_n = Cup<NoAbilities> { item: NoAbilities {} };
// Invalid return: 'c_n' has a value
// and 'Cup<NoAbilities>' does not have 'drop'
0
}
}
Example: conditional store
module 0x42::example {
struct Cup<T> has copy, drop, store { item: T }
// 'MyInnerResource' is declared with 'store' so all fields need 'store'
struct MyInnerResource has store {
yes: Cup<u64>,
// Valid, 'Cup<u64>' has 'store'
// no: Cup<signer>, Invalid, 'Cup<signer>' does not have 'store'
}
// 'MyResource' is declared with 'key' so all fields need 'store'
struct MyResource has key {
yes: Cup<u64>,
// Valid, 'Cup<u64>' has 'store'
inner: Cup<MyInnerResource>,
// Valid, 'Cup<MyInnerResource>' has 'store'
// no: Cup<signer>, Invalid, 'Cup<signer>' does not have 'store'
}
}
Example: conditional key
module 0x42::example {
struct NoAbilities {}
struct MyResource<T> has key { f: T }
fun valid(account: &signer) acquires MyResource {
let addr = signer::address_of(account);
// Valid, 'MyResource<u64>' has 'key'
let has_resource = exists<MyResource<u64>>(addr);
if (!has_resource) {
// Valid, 'MyResource<u64>' has 'key'
move_to(account, MyResource<u64> { f: 0 })
};
// Valid, 'MyResource<u64>' has 'key'
let r = borrow_global_mut<MyResource<u64>>(addr)
r.f = r.f + 1;
}
fun invalid(account: &signer) {
// Invalid, 'MyResource<NoAbilities>' does not have 'key'
let has_it = exists<MyResource<NoAbilities>>(addr);
// Invalid, 'MyResource<NoAbilities>' does not have 'key'
let NoAbilities {} = move_from<NoAbilities>(addr);
// Invalid, 'MyResource<NoAbilities>' does not have 'key'
move_to(account, NoAbilities {});
// Invalid, 'MyResource<NoAbilities>' does not have 'key'
borrow_global<NoAbilities>(addr);
}
}
Uses and Aliases
The use syntax can be used to create aliases to members in other modules. use can be used to
create aliases that last either for the entire module, or for a given expression block scope.
Syntax
There are several different syntax cases for use. Starting with the most simple, we have the
following for creating aliases to other modules
use <address>::<module name>;
use <address>::<module name> as <module alias name>;
For example
script {
use std::vector;
use std::vector as V;
}
use std::vector; introduces an alias vector for std::vector. This means that anywhere you
would want to use the module name std::vector (assuming this use is in scope), you could use
vector instead. use std::vector; is equivalent to use std::vector as vector;
Similarly use std::vector as V; would let you use V instead of std::vector
module 0x42::example {
use std::vector;
use std::vector as V;
fun new_vecs(): (vector<u8>, vector<u8>, vector<u8>) {
let v1 = std::vector::empty();
let v2 = vector::empty();
let v3 = V::empty();
(v1, v2, v3)
}
}
If you want to import a specific module member (such as a function, struct, or constant), you can use the following syntax.
use <address>::<module name>::<module member>;
use <address>::<module name>::<module member> as <member alias>;
For example
script {
use std::vector::empty;
use std::vector::empty as empty_vec;
}
This would let you use the function std::vector::empty without full qualification. Instead, you
could use empty and empty_vec respectively. Again, use std::vector::empty; is equivalent to
use std::vector::empty as empty;
module 0x42::example {
use std::vector::empty;
use std::vector::empty as empty_vec;
fun new_vecs(): (vector<u8>, vector<u8>, vector<u8>) {
let v1 = std::vector::empty();
let v2 = empty();
let v3 = empty_vec();
(v1, v2, v3)
}
}
If you want to add aliases for multiple module members at once, you can do so with the following syntax
use <address>::<module name>::{<module member>, <module member> as <member alias> ... };
For example
module 0x42::example {
use std::vector::{push_back, length as len, pop_back};
fun swap_last_two<T>(v: &mut vector<T>) {
assert!(len(v) >= 2, 42);
let last = pop_back(v);
let second_to_last = pop_back(v);
push_back(v, last);
push_back(v, second_to_last)
}
}
If you need to add an alias to the module itself in addition to module members, you can do that in a
single use using Self. Self is a member of sorts that refers to the module.
script {
use std::vector::{Self, empty};
}
For clarity, all the following are equivalent:
script {
use std::vector;
use std::vector as vector;
use std::vector::Self;
use std::vector::Self as vector;
use std::vector::{Self};
use std::vector::{Self as vector};
}
If needed, you can have as many aliases for any item as you like
module 0x42::example {
use std::vector::{
Self,
Self as V,
length,
length as len,
};
fun pop_twice<T>(v: &mut vector<T>): (T, T) {
// all options available given the `use` above
assert!(vector::length(v) > 1, 42);
assert!(V::length(v) > 1, 42);
assert!(length(v) > 1, 42);
assert!(len(v) > 1, 42);
(vector::pop_back(v), vector::pop_back(v))
}
}
Inside a module
Inside a module all use declarations are usable regardless of the order of declaration.
module 0x42::example {
use std::vector;
fun example(): vector<u8> {
let v = empty();
vector::push_back(&mut v, 0);
vector::push_back(&mut v, 10);
v
}
use std::vector::empty;
}
The aliases declared by use in the module are usable within that module.
Additionally, the aliases introduced cannot conflict with other module members. See Uniqueness for more details
Inside an expression
You can add use declarations to the beginning of any expression block
module 0x42::example {
fun example(): vector<u8> {
use std::vector::{empty, push_back};
let v = empty();
push_back(&mut v, 0);
push_back(&mut v, 10);
v
}
}
As with let, the aliases introduced by use in an expression block are removed at the end of that
block.
module 0x42::example {
fun example(): vector<u8> {
let result = {
use std::vector::{empty, push_back};
let v = empty();
push_back(&mut v, 0);
push_back(&mut v, 10);
v
};
result
}
}
Attempting to use the alias after the block ends will result in an error
module 0x42::example {
fun example(): vector<u8> {
let result = {
use std::vector::{empty, push_back};
let v = empty();
push_back(&mut v, 0);
push_back(&mut v, 10);
v
};
let v2 = empty(); // ERROR!
// ^^^^^ unbound function 'empty'
result
}
}
Any use must be the first item in the block. If the use comes after any expression or let, it
will result in a parsing error
script {
fun example() {
{
let x = 0;
use std::vector; // ERROR!
let v = vector::empty();
}
}
}
Naming rules
Aliases must follow the same rules as other module members. This means that aliases to structs or
constants must start with A to Z
address 0x42 {
module data {
struct S {}
const FLAG: bool = false;
fun foo() {}
}
module example {
use 0x42::data::{
S as s, // ERROR!
FLAG as fLAG, // ERROR!
foo as FOO, // valid
foo as bar, // valid
};
}
}
Uniqueness
Inside a given scope, all aliases introduced by use declarations must be unique.
For a module, this means aliases introduced by use cannot overlap
module 0x42::example {
use std::vector::{empty as foo, length as foo}; // ERROR!
// ^^^ duplicate 'foo'
use std::vector::empty as bar;
use std::vector::length as bar; // ERROR!
// ^^^ duplicate 'bar'
}
And, they cannot overlap with any of the module’s other members
address 0x42 {
module data {
struct S {}
}
module example {
use 0x42::data::S;
struct S { value: u64 } // ERROR!
// ^ conflicts with alias 'S' above
}
}
Inside an expression block, they cannot overlap with each other, but they can shadow other aliases or names from an outer scope
Shadowing
use aliases inside of an expression block can shadow names (module members or aliases) from the
outer scope. As with shadowing of locals, the shadowing ends at the end of the expression block;
module 0x42::example {
struct WrappedVector { vec: vector<u64> }
fun empty(): WrappedVector {
WrappedVector { vec: std::vector::empty() }
}
fun example1(): (WrappedVector, WrappedVector) {
let vec = {
use std::vector::{empty, push_back};
// 'empty' now refers to std::vector::empty
let v = empty();
push_back(&mut v, 0);
push_back(&mut v, 1);
push_back(&mut v, 10);
v
};
// 'empty' now refers to Self::empty
(empty(), WrappedVector { vec })
}
fun example2(): (WrappedVector, WrappedVector) {
use std::vector::{empty, push_back};
let w: WrappedVector = {
use 0x42::example::empty;
empty()
};
push_back(&mut w.vec, 0);
push_back(&mut w.vec, 1);
push_back(&mut w.vec, 10);
let vec = empty();
push_back(&mut vec, 0);
push_back(&mut vec, 1);
push_back(&mut vec, 10);
(w, WrappedVector { vec })
}
}
Unused Use or Alias
An unused use will result in an error
module 0x42::example {
use std::vector::{empty, push_back}; // ERROR!
// ^^^^^^^^^ unused alias 'push_back'
fun example(): vector<u8> {
empty()
}
}
Friends
The friend syntax is used to declare modules that are trusted by the current module.
A trusted module is allowed to call any function defined in the current module that has the public(friend) visibility.
For details on function visibilities, please refer to the Visibility section in Functions.
Friend declaration
A module can declare other modules as friends via friend declaration statements, in the format of
-
friend <address::name>— friend declaration using fully qualified module name like the example below, ormodule 0x42::a { friend 0x42::b; } -
friend <module-name-alias>— friend declaration using a module name alias, where the module alias is introduced via theusestatement.module 0x42::a { use 0x42::b; friend b; }
A module may have multiple friend declarations, and the union of all the friend modules forms the friend list.
In the example below, both 0x42::B and 0x42::C are considered as friends of 0x42::A.
module 0x42::a {
friend 0x42::b;
friend 0x42::c;
}
Unlike use statements, friend can only be declared in the module scope and not in the expression block scope.
friend declarations may be located anywhere a top-level construct (e.g., use, function, struct, etc.) is allowed.
However, for readability, it is advised to place friend declarations near the beginning of the module definition.
Note that the concept of friendship does not apply to Move scripts:
- A Move script cannot declare
friendmodules as doing so is considered meaningless: there is no mechanism to call the function defined in a script. - A Move module cannot declare
friendscripts either, because scripts are ephemeral code snippets that are never published to global storage.
Friend declaration rules
Friend declarations are subject to the following rules:
-
A module cannot declare itself as a friend.
module 0x42::m { friend Self; // ERROR! // ^^^^ Cannot declare the module itself as a friend } module 0x43::m { friend 0x43::M; // ERROR // ^^^^^^^ Cannot declare the module itself as a friend } -
Friend modules must be known by the compiler
module 0x42::m { friend 0x42::nonexistent; // ERROR! // ^^^^^^^^^^^^^^^^^ Unbound module '0x42::nonexistent' } -
Friend modules must be within the same account address. (Note: this is not a technical requirement but rather a policy decision which may be relaxed later.)
module 0x42::m {} module 0x43::n { friend 0x42::m; // ERROR! // ^^^^^^^ Cannot declare modules out of the current address as a friend } -
Friend relationships cannot create cyclic module dependencies.
Cycles are not allowed in the friend relationships, e.g., the relation
0x2::afriends0x2::bfriends0x2::cfriends0x2::ais not allowed. More generally, declaring a friend module adds a dependency upon the current module to the friend module (because the purpose is for the friend to call functions in the current module). If that friend module is already used, either directly or transitively, a cycle of dependencies would be created.address 0x2 { module a { use 0x2::c; friend 0x2::b; public fun a() { c::c() } } module b { friend 0x2::c; // ERROR! // ^^^^^^ This friend relationship creates a dependency cycle: '0x2::b' is a friend of '0x2::a' uses '0x2::c' is a friend of '0x2::b' } module c { public fun c() {} } } -
The friend list for a module cannot contain duplicates.
address 0x42 { module a {} module m { use 0x42::a as aliased_a; friend 0x42::A; friend aliased_a; // ERROR! // ^^^^^^^^^ Duplicate friend declaration '0x42::a'. Friend declarations in a module must be unique } }
Modules and Scripts
Move has two different types of programs: modules and scripts. Modules are libraries that define struct types along with functions that operate on these types. Struct types define the schema of Move’s global storage, and module functions define the rules for updating storage. Modules themselves are also stored in global storage. A script is an executable entrypoint similar to a main function in a conventional language. A script typically calls functions of a published module that perform updates to global storage. Scripts are ephemeral code snippets that are not published in global storage.
A Move source file (or compilation unit) may contain multiple modules and scripts. However, publishing a module and executing a script are separate VM operations.
Syntax
Scripts
Note: To learn how to publish and execute a Move script, follow the Move Scripts example.
A script has the following structure:
script {
<use>*
<constants>*
fun <identifier><[type parameters: constraint]*>([identifier: type]*) <function_body>
}
A script block must start with all of its use declarations, followed by any constants and (finally) the main
function declaration.
The main function can have any name (i.e., it need not be called main), is the only function in a script block, can have any number of
arguments, and must not return a value. Here is an example with each of these components:
script {
// Import the debug module published at the named account address std.
use std::debug;
const ONE: u64 = 1;
fun main(x: u64) {
let sum = x + ONE;
debug::print(&sum)
}
}
Scripts have very limited power—they cannot declare friends or struct types, and they cannot access global storage. Their primary purpose is to invoke module functions.
Modules
A module has the following syntax:
module <address>::<identifier> {
(<use> | <friend> | <type> | <function> | <constant>)*
}
where <address> is a valid named or literal address.
For example:
module 0x42::example {
struct Example has copy, drop { i: u64 }
use std::debug;
friend 0x42::another_example;
const ONE: u64 = 1;
public fun print(x: u64) {
let sum = x + ONE;
let example = Example { i: sum };
debug::print(&sum)
}
}
The module 0x42::example part specifies that the module example will be published under the account address 0x42 in global storage.
Modules can also be declared using named addresses. For example:
module example_addr::example {
struct Example has copy, drop { a: address }
use std::debug;
friend example_addr::another_example;
public fun print() {
let example = Example { a: @example_addr };
debug::print(&example)
}
}
Because named addresses only exist at the source language level and during compilation, named addresses will be fully substituted for their value at the bytecode level. For example if we had the following code:
script {
fun example() {
my_addr::m::foo(@my_addr);
}
}
and we compiled it with my_addr set to 0xC0FFEE, then it would be equivalent
to the following operationally:
script {
fun example() {
0xC0FFEE::m::foo(@0xC0FFEE);
}
}
However, at the source level, these are not equivalent—the function
m::foo must be accessed through the my_addr named address, and not through
the numerical value assigned to that address.
Module names can start with letters a to z or letters A to Z. After the first character, module names can contain underscores _, letters a to z, letters A to Z, or digits 0 to 9.
module my_module {}
module foo_bar_42 {}
Typically, module names start with a lowercase letter. A module named my_module should be stored in a source file named my_module.move.
All elements inside a module block can appear in any order.
Fundamentally, a module is a collection of types and functions.
The use keyword is used to import types from other modules.
The friend keyword specifies a list of trusted modules.
The const keyword defines private constants that can be used in the functions of a module.
Packages
Packages allow Move programmers to more easily re-use code and share it across projects. The Move package system allows programmers to easily do the following:
- Define a package containing Move code;
- Parameterize a package by named addresses;
- Import and use packages in other Move code and instantiate named addresses;
- Build packages and generate associated compilation artifacts from packages; and
- Work with a common interface around compiled Move artifacts.
Package Layout and Manifest Syntax
A Move package source directory contains a Move.toml package manifest
file along with a set of subdirectories:
a_move_package/
├── Move.toml
├── sources (required)/
│ ├── module.move
│ └── *.move
├── examples (optional, test & dev mode)/
├── scripts (optional, can also put in sources)/
├── doc_templates (optional)/
└── tests (optional, test mode)/
The directories marked required must be present in order for the directory
to be considered a Move package and to be compiled. Optional directories can
be present, and if so will be included in the compilation process. Depending on
the mode that the package is built with (test or dev), the tests and
examples directories will be included as well.
The sources directory can contain both Move modules and Move scripts (both
Move scripts and modules containing script functions). The examples
directory can hold additional code to be used only for development and/or
tutorial purposes that will not be included when compiled outside test or
dev mode.
A scripts directory is supported so Move scripts can be separated
from modules if that is desired by the package author. The scripts
directory will always be included for compilation if it is present.
Documentation will be built using any documentation templates present in
the doc_templates directory.
Move.toml
The Move package manifest is defined within the Move.toml file and has the
following syntax. Optional fields are marked with *, + denotes
one or more elements:
[package]
name = <string> # e.g., "MoveStdlib"
version = "<uint>.<uint>.<uint>" # e.g., "0.1.1"
license* = <string> # e.g., "MIT", "GPL", "Apache 2.0"
authors* = [<string>] # e.g., ["Joe Smith (joesmith@noemail.com)", "Jane Smith (janesmith@noemail.com)"]
[addresses] # (Optional section) Declares named addresses in this package and instantiates named addresses in the package graph
# One or more lines declaring named addresses in the following format
<addr_name> = "_" | "<hex_address>" # e.g., std = "_" or my_addr = "0xC0FFEECAFE"
[dependencies] # (Optional section) Paths to dependencies and instantiations or renamings of named addresses from each dependency
# One or more lines declaring dependencies in the following format
<string> = { local = <string>, addr_subst* = { (<string> = (<string> | "<hex_address>"))+ } } # local dependencies
<string> = { git = <URL ending in .git>, subdir=<path to dir containing Move.toml inside git repo>, rev=<git commit hash or branch name>, addr_subst* = { (<string> = (<string> | "<hex_address>"))+ } } # git dependencies
[dev-addresses] # (Optional section) Same as [addresses] section, but only included in "dev" and "test" modes
# One or more lines declaring dev named addresses in the following format
<addr_name> = "_" | "<hex_address>" # e.g., std = "_" or my_addr = "0xC0FFEECAFE"
[dev-dependencies] # (Optional section) Same as [dependencies] section, but only included in "dev" and "test" modes
# One or more lines declaring dev dependencies in the following format
<string> = { local = <string>, addr_subst* = { (<string> = (<string> | <address>))+ } }
An example of a minimal package manifest:
[package]
name = "AName"
version = "0.0.0"
An example of a more standard package manifest that also includes the Move
standard library and instantiates the named address Std from it with the
address value 0x1:
[package]
name = "AName"
version = "0.0.0"
license = "Apache 2.0"
[addresses]
address_to_be_filled_in = "_"
specified_address = "0xB0B"
[dependencies]
# Local dependency
LocalDep = { local = "projects/move-awesomeness", addr_subst = { "std" = "0x1" } }
# Git dependency
MoveStdlib = { git = "https://github.com/aptos-labs/aptos-framework", subdir="move-stdlib", rev = "mainnet" }
[dev-addresses] # For use when developing this module
address_to_be_filled_in = "0x101010101"
Most of the sections in the package manifest are self-explanatory, but named addresses can be a bit difficult to understand, so it’s worth examining them in a bit more detail.
Named Addresses During Compilation
Recall that Move has named addresses and that named addresses cannot be declared in Move. Because of this, until now named addresses and their values needed to be passed to the compiler on the command line. With the Move package system this is no longer needed, and you can declare named addresses in the package, instantiate other named addresses in scope, and rename named addresses from other packages within the Move package system manifest file. Let’s go through each of these individually:
Declaration
Let’s say we have a Move module in example_pkg/sources/A.move as follows:
module named_addr::A {
public fun x(): address { @named_addr }
}
We could in example_pkg/Move.toml declare the named address named_addr in
two different ways. The first:
[package]
name = "ExamplePkg"
# ...
[addresses]
named_addr = "_"
Declares named_addr as a named address in the package ExamplePkg and
that this address can be any valid address value. Therefore, an importing
package can pick the value of the named address named_addr to be any address
it wishes. Intuitively you can think of this as parameterizing the package
ExamplePkg by the named address named_addr, and the package can then be
instantiated later on by an importing package.
named_addr can also be declared as:
[package]
name = "ExamplePkg"
# ...
[addresses]
named_addr = "0xCAFE"
which states that the named address named_addr is exactly 0xCAFE and cannot be
changed. This is useful so other importing packages can use this named
address without needing to worry about the exact value assigned to it.
With these two different declaration methods, there are two ways that information about named addresses can flow in the package graph:
- The former (“unassigned named addresses”) allows named address values to flow from the importation site to the declaration site.
- The latter (“assigned named addresses”) allows named address values to flow from the declaration site upwards in the package graph to usage sites.
With these two methods for flowing named address information throughout the package graph the rules around scoping and renaming become important to understand.
Scoping and Renaming of Named Addresses
A named address N in a package P is in scope if:
- It declares a named address
N; or - A package in one of
P’s transitive dependencies declares the named addressNand there is a dependency path in the package graph betweenPand the declaring package ofNwith no renaming ofN.
Additionally, every named address in a package is exported. Because of this and
the above scoping rules each package can be viewed as coming with a set of
named addresses that will be brought into scope when the package is imported,
e.g., if the ExamplePkg package was imported, that importation would bring
into scope the named_addr named address. Because of this, if P imports two
packages P1 and P2 both of which declare a named address N an issue
arises in P: which “N” is meant when N is referred to in P? The one
from P1 or P2? To prevent this ambiguity around which package a named
address is coming from, we enforce that the sets of scopes introduced by all
dependencies in a package are disjoint, and provide a way to rename named
addresses when the package that brings them into scope is imported.
Renaming a named address when importing can be done as follows in our P,
P1, and P2 example above:
[package]
name = "P"
# ...
[dependencies]
P1 = { local = "some_path_to_P1", addr_subst = { "P1N" = "N" } }
P2 = { local = "some_path_to_P2" }
With this renaming N refers to the N from P2 and P1N will refer to N
coming from P1:
module N::A {
public fun x(): address { @P1N }
}
It is important to note that renaming is not local: once a named address N
has been renamed to N2 in a package P, all packages that import P will not
see N but only N2 unless N is reintroduced from outside of P. This is
why rule (2) in the scoping rules at the start of this section specifies a
“dependency path in the package graph between P and the declaring
package of N with no renaming of N.”
Instantiation
Named addresses can be instantiated multiple times across the package graph as long as it is always with the same value. It is an error if the same named address (regardless of renaming) is instantiated with differing values across the package graph.
A Move package can only be compiled if all named addresses resolve to a value.
This presents issues if the package wishes to expose an uninstantiated named
address. This is what the [dev-addresses] section solves. This section can
set values for named addresses, but cannot introduce any named addresses.
Additionally, only the [dev-addresses] in the root package are included in
dev mode. For example, a root package with the following manifest would not compile
outside of dev mode since named_addr would be uninstantiated:
[package]
name = "ExamplePkg"
# ...
[addresses]
named_addr = "_"
[dev-addresses]
named_addr = "0xC0FFEE"
Usage, Artifacts, and Data Structures
The Move package system comes with a command line option as part of the Move
CLI move <flags> <command> <command_flags>. Unless a
particular path is provided, all package commands will run in the current working
directory. The full list of commands and flags for the Move CLI can be found by
running move --help.
Usage
A package can be compiled either through the Move CLI commands, or as a library
command in Rust with the function compile_package. This will create a
CompiledPackage that holds the compiled bytecode along with other compilation
artifacts (source maps, documentation, ABIs) in memory. This CompiledPackage
can be converted to an OnDiskPackage and vice versa – the latter being the data of
the CompiledPackage laid out in the file system in the following format:
a_move_package/
├── .../
└── build/
├── dependency_name/
│ ├── BuildInfo.yaml
│ ├── bytecode_modules/
│ │ ├── module_name.mv
│ │ └── *.mv
│ ├── source_maps/
│ │ ├── module_name.mvsm
│ │ └── *.mvsm
│ ├── bytecode_scripts/
│ │ ├── script_name.mv
│ │ └── *.mv
│ ├── abis/
│ │ ├── script_name.abi
│ │ ├── *.abi
│ │ └── module_name/
│ │ ├── function_name.abi
│ │ └── *.abi
│ └── sources/
│ └── module_name.move
└── dependency_name2 .../
See the move-package crate for more information on these data structures and
how to use the Move package system as a Rust library.
Using Bytecode for Dependencies
Move bytecode can be used as dependencies when the Move source code for those dependencies is not available locally. To use this feature, you will need to co-locate the files in directories at the same level and then specify their paths in the corresponding Move.toml files.
Requirements and limitations
Using local bytecode as dependencies requires bytecode files to be downloaded locally, and the actual address for each named address must be specified in either Move.toml or through --named-addresses.
Note that both the aptos move prove and aptos move test commands currently do not support bytecode as dependencies.
Recommended structure
We use an example to illustrate the development flow of using this feature. Suppose we want to compile the package A. The package layout is:
A/
├── Move.toml
└── sources/
└── AModule.move
A.move is defined below, depending on the modules Bar and Foo:
module A::AModule {
use B::Bar;
use C::Foo;
public fun foo(): u64 {
Bar::foo() + Foo::bar()
}
}
Suppose the source of Bar and Foo are not available but the corresponding bytecode Bar.mv and Foo.mv are available locally. To use them as dependencies, we would:
Specify Move.toml for Bar and Foo. Note that named addresses are already instantiated with the actual address in the bytecode. In our example, the actual address for C is already bound to 0x3. As a result, the [addresses] section must specify C as 0x3, as shown below:
[package]
name = "Foo"
version = "0.0.0"
[addresses]
C = "0x3"
Place the bytecode file and the corresponding Move.toml file in the same directory with the bytecode in a build subdirectory. Note an empty sources directory is required. For instance, the layout of the folder B (for the package Bar) and C (for the package Foo) would resemble:
workspace/
├── A/
│ ├── Move.toml
│ └── sources/
│ └── AModule.move
├── B/
│ ├── Move.toml
│ ├── sources/
│ └── build/
│ └── Bar.mv
└── C/
├── Move.toml
├── sources/
└── build/
└── Foo/
└── bytecode_modules/
└── Foo.mv
Specify [dependencies] in the Move.toml of the target (first) package with the location of the dependent (secondary) packages. For instance, assuming all three package directories are at the same level, Move.toml of A would resemble:
[package]
name = "A"
version = "0.0.0"
[addresses]
A = "0x2"
[dependencies]
Bar = { local = "../B" }
Foo = { local = "../C" }
Note that if both the bytecode and the source code of the same package exist in the search paths, the compiler will complain that the declaration is duplicated.
Overriding the Standard Libraries
When working with third-party packages, you might encounter issues where different versions of the Move and Aptos standard library packages are referenced.
This can lead to package resolution failures.
"Error": "Move compilation failed:
Unable to resolve packages for package 'C':
While resolving dependency 'B' in package 'C':
Unable to resolve package dependency 'B':
While resolving dependency 'AptosFramework' in package 'B':
Unable to resolve package dependency 'AptosFramework':
Conflicting dependencies found: package 'AptosFramework' conflicts with 'AptosFramework'
To resolve this, you can override the standard library packages using a command-line option. This allows you to enforce a specific version of the standard libraries across your entire dependency tree.
You can apply the override to commands like aptos move compile, aptos move run, and others. Here is the syntax:
--override-std <network name>
Where network_name can be one of the following:
- devnet
- testnet
- mainnet
Package Upgrades
Move code (e.g., Move modules) on the Aptos blockchain can be upgraded. This allows code owners and module developers to update and evolve their contracts under a single, stable, well-known account address that doesn’t change. If a module upgrade happens, all consumers of that module will automatically receive the latest version of the code (e.g., the next time they interact with it).
The Aptos blockchain natively supports different upgrade policies, which allow Move developers to explicitly define the constraints around how their Move code can be upgraded. The default policy is backwards compatible. This means that code upgrades are accepted only if they guarantee that no existing resource storage or public APIs are broken by the upgrade (including public functions). This compatibility checking is possible because of Move’s strongly typed bytecode semantics.
We note, however, that even compatible upgrades can have hazardous effects on applications and dependent Move code (for example, if the semantics of the underlying module are modified). As a result, developers should be careful when depending on third-party Move code that can be upgraded on-chain. See Security considerations for dependencies for more details.
How it works
Move code upgrades on the Aptos blockchain happen at the Move package
granularity. A package specifies an upgrade policy in the Move.toml manifest:
[package]
name = "MyApp"
version = "0.0.1"
upgrade_policy = "compatible"
...
Note: Aptos checks compatibility at the time a Move package is published via an Aptos transaction. This transaction will abort if deemed incompatible.
How to upgrade
To upgrade already published Move code, simply attempt to republish the code at the same address where it was previously published. This can be done by following the instructions for code compilation and publishing using the Aptos CLI. For an example, see the Your First Move Module tutorial.
Upgrade policies
There are two different upgrade policies currently supported by Aptos:
compatible: these upgrades must be backwards compatible, specifically:- For storage, all old struct declarations must be the same in the new code. This ensures that the existing state of storage is correctly interpreted by the new code. However, new struct declarations can be added.
- For APIs, all existing public functions must have the same signature as before. New functions, including public and entry functions, can be added.
immutable: the code is not upgradeable and is guaranteed to stay the same forever.
Those policies are ordered by strength such that compatible < immutable,
i.e., compatible is weaker than immutable. The policy of a package on-chain can
only get stronger, not weaker. Moreover, the policy of all dependencies of a
package must be stronger or equal to the policy of the given package. For example,
an immutable package cannot refer directly or indirectly to a compatible package.
This gives users the guarantee that no unexpected updates can happen under the hood.
Note that there is one exception to the above rule: framework packages
installed at addresses 0x1 to 0xa are exempted from the dependency check.
This is necessary so one can define an immutable package based on the standard
libraries, which have the compatible policy to allow critical upgrades and fixes.
Compatibility rules
When using compatible upgrade policy, a module package can be upgraded. However, updates to existing modules already
published previously need to be compatible and follow the rules below:
- All existing structs’ fields cannot be updated. This means no new fields can be added and existing fields cannot be modified.
- All public and entry functions cannot change their signature (argument types, type arguments, return types). However, argument names can change.
public(friend)functions are treated as private and thus their signature can arbitrarily change. This is safe as only modules in the same package can call friend functions anyway, and they need to be updated if the signature changes.- Enum type upgrade compatibility rules.
- Existing abilities on a struct/enum type cannot be removed (but abilities can be added).
When updating your modules, if you see an incompatible error, make sure to check the above rules and fix any violations.
Security considerations for dependencies
As mentioned above, even compatible upgrades can have disastrous effects for applications that depend on the upgraded code. These effects can come from bugs, but they can also be the result of malicious upgrades. For example, an upgraded dependency can suddenly make all functions abort, breaking the operation of your Move code. Alternatively, an upgraded dependency can make all functions suddenly cost much more gas to execute than before the upgrade. As a result, dependencies on upgradeable packages need to be handled with care:
- The safest dependency is, of course, an
immutablepackage. This guarantees that the dependency will never change, including its transitive dependencies. In order to update an immutable package, the owner would have to introduce a new major version, which is practically like deploying a new, separate and independent package. This is because major versioning can be expressed only by name (e.g.,module feature_v1andmodule feature_v2). However, not all package owners like to publish their code asimmutable, because this takes away the ability to fix bugs and update the code in place. - If you have a dependency on a
compatiblepackage, it is highly recommended you know and understand the entity publishing the package. The highest level of assurance is when the package is governed by a Decentralized Autonomous Organization (DAO) where no single user can initiate an upgrade; a vote or similar has to be taken. This is the case for the Aptos framework.
Programmatic upgrade
In general, Aptos offers, via the Move module aptos_framework::code,
ways to publish code from anywhere in your smart contracts. However,
notice that code published in the current transaction can be executed
only after that transaction ends.
The Aptos framework itself, including all the on-chain administration logic, is
an example of a programmatic upgrade. The framework is marked as compatible.
Upgrades happen via specific generated governance scripts. For more details,
see Aptos Governance.
Unit Tests
Unit testing for Move adds three new annotations to the Move source language:
#[test]#[test_only], and#[expected_failure].
They respectively mark a function as a test, mark a module or module member (use, function, or struct) as code to be included for testing only, and mark that a test is expected to fail. These annotations can be placed on a function with any visibility. Whenever a module or module member is annotated as #[test_only] or #[test], it will not be included in the compiled bytecode unless it is compiled for testing.
Testing Annotations: Their Meaning and Usage
Both the #[test] and #[expected_failure] annotations can be used either with or without arguments.
Without arguments, the #[test] annotation can only be placed on a function with no parameters. This annotation simply marks this function as a test to be run by the unit testing harness.
module 0x42::example {
#[test] // OK
fun this_is_a_test() { /* ... */ }
#[test] // Will fail to compile since the test takes an argument
fun this_is_not_correct(arg: signer) { /* ... */ }
}
Expected Failure
A test can also be annotated as an #[expected_failure]. This
annotation marks that the test is expected to raise an error.
You can ensure that a test is aborting with a specific abort <code>
by annotating it with #[expected_failure(abort_code = <code>)],
corresponding to the parameter to an abort statement (or
failing assert! macro).
Instead of an abort_code, an expected_failure may specify program
execution errors, such as arithmetic_error, major_status,
vector_error, and out_of_gas. For more specificity, a
minor_status may optionally be specified.
If the error is expected from a specific location, that may also be specified:
#[expected_failure(abort_code = <code>, location = <loc>)].
If the test then fails with the right error but in a different module, the test will also fail.
Note that <loc> can be Self (the current module) or a qualified name, e.g., vector::std.
Only functions that have the #[test] annotation can also be annotated as #[expected_failure].
module 0x42::example {
#[test]
#[expected_failure]
public fun this_test_will_abort_and_pass() { abort 1 }
#[test]
#[expected_failure]
public fun test_will_error_and_pass() { 1/0; }
#[test]
#[expected_failure(abort_code = 0, location = Self)]
public fun test_will_error_and_fail() { 1/0; }
#[test, expected_failure] // Can have multiple in one attribute. This test will pass.
public fun this_other_test_will_abort_and_pass() { abort 1 }
#[test]
#[expected_failure(vector_error, minor_status = 1, location = Self)]
fun borrow_out_of_range() { /* ... */ }
#[test]
#[expected_failure(abort_code = 26113, location = extensions::table)]
fun test_destroy_fails() { /* ... */ }
}
Test parameters
With arguments, a test annotation takes the form #[test(<param_name_1> = <address>, ..., <param_name_n> = <address>)]. If a function is annotated in such a manner, the function’s parameters must be a permutation of the parameters <param_name_1>, ..., <param_name_n>, i.e., the order of these parameters as they occur in the function and their order in the test annotation do not have to be the same, but they must be able to be matched up with each other by name.
Only parameters with a type of signer are supported as test parameters. If a parameter other than signer is supplied, the test will result in an error when run.
module 0x42::example {
#[test(arg = @0xC0FFEE)] // OK
fun this_is_correct_now(arg: signer) { /* ... */ }
#[test(wrong_arg_name = @0xC0FFEE)] // Not correct: arg name doesn't match
fun this_is_incorrect(arg: signer) { /* ... */ }
#[test(a = @0xC0FFEE, b = @0xCAFE)] // OK. We support multiple signer arguments, but you must always provide a value for that argument
fun this_works(a: signer, b: signer) { /* ... */ }
// somewhere a named address is declared
#[test_only] // test-only named addresses are supported
address TEST_NAMED_ADDR = @0x1;
...
#[test(arg = @TEST_NAMED_ADDR)] // Named addresses are supported!
fun this_is_correct_now(arg: signer) { /* ... */ }
}
Arbitrary code to support tests
A module and any of its members can be declared as test only. In such a case the item will only be included in the compiled Move bytecode when compiled in test mode. Additionally, when compiled outside of test mode, any non-test uses of a #[test_only] module will raise an error during compilation.
#[test_only] // test only attributes can be attached to modules
module 0x42::abc { /*... */ }
module 0x42::other {
#[test_only] // test only attributes can be attached to named addresses
address ADDR = @0x1;
#[test_only] // .. to uses
use 0x1::some_other_module;
#[test_only] // .. to structs
struct SomeStruct { /* ... */ }
#[test_only] // .. and functions. Can only be called from test code, but not a test
fun test_only_function(/* ... */) { /* ... */ }
}
Running Unit Tests
Unit tests for a Move package can be run with the aptos move test command. See package for more info.
When running tests, every test will either PASS, FAIL, or TIMEOUT. If a test case fails, the location of the failure along with the function name that caused the failure will be reported if possible. You can see an example of this below.
A test will be marked as timing out if it exceeds the maximum number of instructions that can be executed for any single test. This bound can be changed using the options below, and its default value is set to 100000 instructions. Additionally, while the result of a test is always deterministic, tests are run in parallel by default, so the ordering of test results in a test run is non-deterministic unless running with only one thread (see OPTIONS below).
There are also a number of options that can be passed to the unit testing binary to fine-tune testing and to help debug failing tests. These can be found using the help flag:
$ aptos move test -h
Example
A simple module using some of the unit testing features is shown in the following example:
First create an empty package inside an empty directory:
$ aptos move init --name TestExample
Next add the following to the Move.toml:
[dependencies]
MoveStdlib = { git = "https://github.com/aptos-labs/aptos-framework.git", subdir="aptos-move/framework/move-stdlib", rev = "main", addr_subst = { "std" = "0x1" } }
Next add the following module under the sources directory:
// filename: sources/my_module.move
module 0x1::my_module {
struct MyCoin has key { value: u64 }
public fun make_sure_non_zero_coin(coin: MyCoin): MyCoin {
assert!(coin.value > 0, 0);
coin
}
public fun has_coin(addr: address): bool {
exists<MyCoin>(addr)
}
#[test]
fun make_sure_non_zero_coin_passes() {
let coin = MyCoin { value: 1 };
let MyCoin { value: _ } = make_sure_non_zero_coin(coin);
}
#[test]
// Or #[expected_failure] if we don't care about the abort code
#[expected_failure(abort_code = 0, location = Self)]
fun make_sure_zero_coin_fails() {
let coin = MyCoin { value: 0 };
let MyCoin { value: _ } = make_sure_non_zero_coin(coin);
}
#[test_only] // test only helper function
fun publish_coin(account: &signer) {
move_to(account, MyCoin { value: 1 })
}
#[test(a = @0x1, b = @0x2)]
fun test_has_coin(a: signer, b: signer) {
publish_coin(&a);
publish_coin(&b);
assert!(has_coin(@0x1), 0);
assert!(has_coin(@0x2), 1);
assert!(!has_coin(@0x3), 1);
}
}
Running Tests
You can then run these tests with the aptos move test command:
$ aptos move test
BUILDING MoveStdlib
BUILDING TestExample
Running Move unit tests
[ PASS ] 0x1::my_module::make_sure_non_zero_coin_passes
[ PASS ] 0x1::my_module::make_sure_zero_coin_fails
[ PASS ] 0x1::my_module::test_has_coin
Test result: OK. Total tests: 3; passed: 3; failed: 0
Using Test Flags
-f <str> or --filter <str>
This will only run tests whose fully qualified name contains <str>. For example if we wanted to only run tests with "zero_coin" in their name:
$ aptos move test -f zero_coin
CACHED MoveStdlib
BUILDING TestExample
Running Move unit tests
[ PASS ] 0x1::my_module::make_sure_non_zero_coin_passes
[ PASS ] 0x1::my_module::make_sure_zero_coin_fails
Test result: OK. Total tests: 2; passed: 2; failed: 0
--coverage
This will compute code coverage from test cases and generate a coverage summary.
$ aptos move test --coverage
INCLUDING DEPENDENCY AptosFramework
INCLUDING DEPENDENCY AptosStdlib
INCLUDING DEPENDENCY MoveStdlib
BUILDING TestExample
Running Move unit tests
[ PASS ] 0x1::my_module::make_sure_non_zero_coin_passes
[ PASS ] 0x1::my_module::make_sure_zero_coin_fails
[ PASS ] 0x1::my_module::test_has_coin
Test result: OK. Total tests: 3; passed: 3; failed: 0
+-------------------------+
| Move Coverage Summary |
+-------------------------+
Module 0000000000000000000000000000000000000000000000000000000000000001::my_module
>>> % Module coverage: 100.00
+-------------------------+
| % Move Coverage: 100.00 |
+-------------------------+
Please use `aptos move coverage -h` for more detailed source or bytecode test coverage of this package
Then by running aptos move coverage, we can get more detailed coverage information. These can be found using the help flag:
$ aptos move coverage -h
Global Storage - Structure
The purpose of Move programs is to read from and write to tree-shaped persistent global storage. Programs cannot access the filesystem, network, or any other data outside of this tree.
In pseudocode, the global storage looks something like:
module 0x42::example {
struct GlobalStorage {
resources: Map<(address, ResourceType), ResourceValue>,
modules: Map<(address, ModuleName), ModuleBytecode>
}
}
Structurally, global storage is a forest consisting of trees rooted at an account address. Each address can store both resource data values and module code values. As the pseudocode above indicates, each address can store at most one resource value of a given type and at most one module with a given name.
Global Storage - Operators
Move programs can create, delete, and update resources in global storage using the following five instructions:
| Operation | Description | Aborts? |
|---|---|---|
move_to<T>(&signer,T) | Publish T under signer.address | If signer.address already holds a T |
move_from<T>(address): T | Remove T from address and return it | If address does not hold a T |
borrow_global_mut<T>(address): &mut T | Return a mutable reference to the T stored under address | If address does not hold a T |
borrow_global<T>(address): &T | Return an immutable reference to the T stored under address | If address does not hold a T |
exists<T>(address): bool | Return true if a T is stored under address | Never |
Each of these instructions is parameterized by a type T with the key ability. However, each type T must be declared in the current module. This ensures that a resource can only be manipulated via the API exposed by its defining module. The instructions also take either an address or &signer representing the account address where the resource of type T is stored.
See also index notation ([]) for accessing global storage.
References to resources
References to global resources returned by borrow_global or borrow_global_mut mostly behave like references to local storage: they can be extended, read, and written using ordinary reference operators and passed as arguments to other functions. However, there is one important difference between local and global references: a function cannot return a reference that points into global storage. For example, these two functions will each fail to compile:
module 0x42::example {
struct R has key { f: u64 }
// will not compile
fun ret_direct_resource_ref_bad(a: address): &R {
borrow_global<R>(a) // error!
}
// also will not compile
fun ret_resource_field_ref_bad(a: address): &u64 {
&borrow_global<R>(a).f // error!
}
}
Move must enforce this restriction to guarantee absence of dangling references to global storage. This section contains much more detail for the interested reader.
Global storage operators with generics
Global storage operations can be applied to generic resources with both instantiated and uninstantiated generic type parameters:
module 0x42::example {
struct Container<T> has key { t: T }
// Publish a Container storing a type T of the caller's choosing
fun publish_generic_container<T>(account: &signer, t: T) {
move_to<Container<T>>(account, Container { t })
}
/// Publish a container storing a u64
fun publish_instantiated_generic_container(account: &signer, t: u64) {
move_to<Container<u64>>(account, Container { t })
}
}
The ability to index into global storage via a type parameter chosen at runtime is a powerful Move feature known as storage polymorphism. For more on the design patterns enabled by this feature, see Move generics.
Example: Counter
The simple Counter module below exercises each of the five global storage operators. The API exposed by this module allows:
- Anyone to publish a
Counterresource under their account - Anyone to check if a
Counterexists under any address - Anyone to read or increment the value of a
Counterresource under any address - An account that stores a
Counterresource to reset it to zero - An account that stores a
Counterresource to remove and delete it
module 0x42::counter {
use std::signer;
/// Resource that wraps an integer counter
struct Counter has key { i: u64 }
/// Publish a `Counter` resource with value `i` under the given `account`
public fun publish(account: &signer, i: u64) {
// "Pack" (create) a Counter resource. This is a privileged operation that
// can only be done inside the module that declares the `Counter` resource
move_to(account, Counter { i })
}
/// Read the value in the `Counter` resource stored at `addr`
public fun get_count(addr: address): u64 acquires Counter {
borrow_global<Counter>(addr).i
}
/// Increment the value of `addr`'s `Counter` resource
public fun increment(addr: address) acquires Counter {
let c_ref = &mut borrow_global_mut<Counter>(addr).i;
*c_ref = *c_ref + 1
}
/// Reset the value of `account`'s `Counter` to 0
public fun reset(account: &signer) acquires Counter {
let c_ref = &mut borrow_global_mut<Counter>(signer::address_of(account)).i;
*c_ref = 0
}
/// Delete the `Counter` resource under `account` and return its value
public fun delete(account: &signer): u64 acquires Counter {
// remove the Counter resource
let c = move_from<Counter>(signer::address_of(account));
// "Unpack" the `Counter` resource into its fields. This is a
// privileged operation that can only be done inside the module
// that declares the `Counter` resource
let Counter { i } = c;
i
}
/// Return `true` if `addr` contains a `Counter` resource
public fun exists_at(addr: address): bool {
exists<Counter>(addr)
}
}
Annotating functions with acquires
Note: Since language version 2.2, acquires annotations are optional. If no acquires is given, it will be inferred.
In the counter example, you might have noticed that the get_count, increment, reset, and delete functions are annotated with acquires Counter. A Move function m::f must be annotated with acquires T if and only if:
- The body of
m::fcontains amove_from<T>,borrow_global_mut<T>, orborrow_global<T>instruction, or - The body of
m::finvokes a functionm::gdeclared in the same module that is annotated withacquires
For example, the following function inside Counter would need an acquires annotation:
module 0x42::example {
// Needs `acquires` because `increment` is annotated with `acquires`
fun call_increment(addr: address): u64 acquires Counter {
counter::increment(addr)
}
}
However, the same function outside Counter would not need an annotation:
module 0x43::m {
use 0x42::counter;
// Ok. Only need annotation when resource acquired by callee is declared
// in the same module
fun call_increment(addr: address): u64 {
counter::increment(addr)
}
}
If a function touches multiple resources, it needs multiple acquires:
module 0x42::two_resources {
struct R1 has key { f: u64 }
struct R2 has key { g: u64 }
fun double_acquires(a: address): u64 acquires R1, R2 {
borrow_global<R1>(a).f + borrow_global<R2>(a).g
}
}
The acquires annotation does not take generic type parameters into account:
module 0x42::m {
struct R<T> has key { t: T }
// `acquires R`, not `acquires R<T>`
fun acquire_generic_resource<T: store>(a: address) acquires R {
let _ = borrow_global<R<T>>(a);
}
// `acquires R`, not `acquires R<u64>
fun acquire_instantiated_generic_resource(a: address) acquires R {
let _ = borrow_global<R<u64>>(a);
}
}
Finally: redundant acquires are not allowed. Adding this function inside Counter will result in a compilation error:
module 0x42::m {
// This code will not compile because the body of the function does not use a global
// storage instruction or invoke a function with `acquires`
fun redundant_acquires_bad() acquires Counter {}
}
For more information on acquires, see Move functions.
Reference Safety For Global Resources
Move prohibits returning global references and requires the acquires annotation to prevent dangling references. This allows Move to live up to its promise of static reference safety (i.e., no dangling references, no null or nil dereferences) for all reference types.
This example illustrates how the Move type system uses acquires to prevent a dangling reference:
module 0x42::dangling {
struct T has key { f: u64 }
fun borrow_then_remove_bad(a: address) acquires T {
let t_ref: &mut T = borrow_global_mut<T>(a);
let t = remove_t(a); // type system complains here
// t_ref now dangling!
let uh_oh = *&t_ref.f;
}
fun remove_t(a: address): T acquires T {
move_from<T>(a)
}
}
In this code, line 6 acquires a reference to the T stored at address a in global storage. The callee remove_t then removes the value, which makes t_ref a dangling reference.
Fortunately, this cannot happen because the type system will reject this program. The acquires annotation on remove_t lets the type system know that line 7 is dangerous, without having to recheck or introspect the body of remove_t separately!
The restriction on returning global references prevents a similar, but even more insidious problem:
address 0x42 {
module m1 {
struct T has key {}
public fun ret_t_ref(a: address): &T acquires T {
borrow_global<T>(a) // error! type system complains here
}
public fun remove_t(a: address) acquires T {
let T {} = move_from<T>(a);
}
}
module m2 {
fun borrow_then_remove_bad(a: address) {
let t_ref = m1::ret_t_ref(a);
let t = m1::remove_t(a); // t_ref now dangling!
}
}
}
Line 16 acquires a reference to a global resource m1::T, then line 17 removes that same resource, which makes t_ref dangle. In this case, acquires annotations do not help us because the borrow_then_remove_bad function is outside the m1 module that declares T (recall that acquires annotations can only be used for resources declared in the current module). Instead, the type system avoids this problem by preventing the return of a global reference at line 6.
Fancier type systems that would allow returning global references without sacrificing reference safety are possible, and we may consider them in future iterations of Move. We chose the current design because it strikes a good balance between expressiveness, annotation burden, and type system complexity.
Index Notation for Storage Operators
Since language version 2.0
Instead of the verbose borrow_global and borrow_global_mut functions, one
can also use index notations to access global storage.
The table below gives an overview of index notations for storage:
| Indexing Syntax | Storage Operation |
|---|---|
&T[address] | borrow_global<T>(address) |
&mut T[address] | borrow_global_mut<T>(address) |
T[address] | *borrow_global<T>(address) |
T[address] = x | *borrow_global_mut<T>(address) = x |
&T[address].field | &borrow_global<T>(address).field |
&mut T[address].field | &mut borrow_global_mut<T>(address).field |
T[address].field | borrow_global<T>(address).field |
T[address].field = x | borrow_global_mut<T>(address).field = x |
Here T represents a generic resource type that can take type parameters.
Notice that T[address].field fetches a reference to the resource from storage and then makes a copy of the field value (which must
have the copy ability); it is a shortcut for *&T[address].field.
Examples:
struct R has key, drop { value: bool }
fun f1() acquires R {
let x = &mut R[@0x1];
x.value = false;
assert!(R[@0x1].value == false);
R[@0x1].value = true;
assert!(R[@0x1].value == true);
}
Move Specification Language
This chapter describes the Move specification language (MSL), a subset of the Move language that supports specification of the behavior of Move programs. MSL works together with the Move Prover, a tool that can statically verify the correctness of MSL specifications against Move programs. In contrast to traditional testing, verification of MSL is exhaustive and holds for all possible inputs and global states of a Move module or Move script. At the same time, this verification of MSL is fast and automated enough that it can be used at a similar place in the developer workflow where tests are typically conducted (for example, for qualification of pull requests in continuous integration).
While the Move programming language at this point is stable, the subset represented by MSL should be considered evolving. This has no impact on platform stability, since MSL is not running in production; yet MSL is used for offline quality assurance where it is continuously improved for evolving objectives.
This document describes the language only; see Use the Move Prover for instructions. The reader is expected to have basic knowledge of the Move language, as well as basic principles of pre- and post-condition specifications. (See for example the Design by contract). For examples of specifications, we refer to the Aptos framework documentation, which has specifications embedded.
Expressions
Expressions in MSL are a subset of Move program expressions plus a set of additional constructs, as discussed in the following sections.
Type System
The type system of MSL is similar to that of Move, with the following differences:
- There are two types of encodings for integer types:
numandbv(bit vector). If an integer (either a constant or a variable) is not involved in any bitwise operations directly or indirectly, regardless of its type in Move (u8,u16,u32,u64,u128andu256), it is treated as the same type. In specifications, this type is callednum, which is an arbitrary precision signed integer type. When MSL refers to a Move name that represents au8or such, it will be automatically widened tonum. This allows writing MSL expressions likex + 1 <= MAX_U128orx - y >= 0without needing to worry about overflow or underflow. Unlikenum,bvcannot and does not need to be explicitly used in specifications: if an integer is involved in bitwise operations such as&,|, or^, it will be automatically encoded asbvat the backend. Moreover, abvinteger has a fixed precision, which is consistent with its precision in Move (bv8,bv16,bv32,bv64,bv128, andbv256). Note that, in general, usingbvis not as efficient asnumin the SMT solver such as Z3. Consequently, the Move Prover has some restrictions when using bitwise operations, which are stated in detail below. - The Move types
&T,&mut T, andTare considered equivalent for MSL. Equality is interpreted as value equality. There is no need to worry about dereferencing a reference from the Move program: these are automatically dereferenced as needed. This simplification is possible because MSL cannot modify values from a Move program, and the program cannot directly reason about reference equality (which eliminates the need for doing so in MSL). (Note that there is also a restriction in expressiveness coming with this, namely for functions that return&mut T. However, this is rarely hit in practice, and there are workarounds). - There is the additional type
type, which is the type of all types. It can be used only in quantifiers. - There is the additional type
range, which represents an integer range (and the notationn..mto denote a value).
Naming
Name resolution in MSL works similarly to the Move language. use declarations can introduce aliases for
imported names. MSL functions and variable names must start with a lowercase letter. Schema names
are treated like types and must start with a capital letter. (Schemas are a named construct
discussed later).
Move functions, MSL functions, Move types, and schemas all share the same namespace and are
therefore unambiguous if aliased via a Move use clause. Because of the common name space, an MSL
function cannot have the same name as a Move function. This is often handled via the convention to
prefix MSL functions as in spec_has_access when the related Move function is called has_access.
Operators
All Move operators are supported in MSL, except &, &mut, and * (dereference).
In addition to the existing operators, vector subscript v[i], slicing v[i..j], and range
construction i..j are supported (the type of integer ranges is a new builtin type called range). Moreover, boolean implication p ==> q is supported as a more intuitive form than !p || q.
Function calls
In MSL expressions, functions can be called like in Move. However, the callee must either be an MSL helper function or a pure Move function.
Move functions are considered pure if they do not modify global state and do not use Move expression features that are not supported in MSL expressions (as defined in this document).
There is one extension. If a Move function definition contains a direct assert, this will be
ignored when it is called from an MSL expression, and the function will be considered pure. For
example:
module 0x42::m {
fun get(addr: address): &T {
assert(exists<T>(addr), ERROR_CODE);
borrow_global<T>(addr)
}
}
This function is pure and can be called from an MSL expression. The assertion will be ignored, and the function will be interpreted as:
module 0x42::m {
spec fun get(addr: address): T { global<T>(addr) }
}
This is justified by the fact that MSL has partial semantics.
Statements
Limited sequencing of the form { let x = foo(); x + x } is supported, as well as if-then-else.
Other statement forms of the Move language are not supported.
Pack and unpack
Pack expressions are supported. Unpack expressions are currently not supported.
Quantifiers
Universal and existential quantification is supported. The general form is:
forall <binding>, ..., <binding> [ where <exp> ] : <exp>
exists <binding>, ..., <binding> [ where <exp> ] : <exp>
- Bindings can either be of the form
name: <type>orname in <exp>. For the second form, the expression must either be arangeor a vector. - The optional constraint
where <exp>allows restricting the quantified range.forall x: T where p: qis equivalent toforall x: T : p ==> qandexists x: T where p: qis equivalent toexists x: T : p && q.
Choice operator
The choice operator allows selecting a value that satisfies a predicate:
choose a: address where exists<R>(a) && global<R>(a).value > 0
If the predicate is not satisfiable, the result of the choice will be undetermined. (See partial semantics).
The choice also comes in a form to select the minimal value from a set of integers, as in:
choose min i: num where in_range(v, i) && v[i] == 2
Cast operator
In the specification language, we can use the same syntax (e as T) to cast an expression e with one integer type to T, an integer type of another size.
Shift operator
Shift operators << and >> are supported in the specification language, and both of them have the same semantics as in the Move language. As for abort, if a value v has width n, then v << m or v >> m will abort if m >= n.
Bitwise operators
Move programs using bitwise operators &, |, and ^ can be verified by the prover, and these operators are also supported in the specification language.
Due to encoding and efficiency issues, using bitwise operators has more caveats:
-
Integers involved in bitwise operations are encoded as
bvtypes at the backend, and two encodings of integers are not compatible. For instance, if a variablevis involved in a bitwise operation such asv & 2orv = a ^ b, then when it is used in an arithmetic operationv * wor a shift operationv << w,wwill be implicitly cast to abvtype in the Move program. However, the specification language does not support implicit type cast so users must explicitly use the built-in functionint2bvin the specification:v << int2bv(w). Note that since eachbvtype has a fixed length (from 8 to 256), values of typenumcannot be converted intobv. -
Verification of
bvtypes is not efficient and may lead to timeout. As a result, users may prefer isolating bitwise operations from other operations and not usingint2bvif possible. Moreover, users need to use pragmas to explicitly specify which integer-typed function arguments or struct fields will be used in bitwise computations:
module 0x42::m {
struct C has drop {
a: u64,
b: u64
}
spec C {
// b, the second field of C, will be of bv type
pragma bv = b"1";
}
public fun foo_generic<T>(i: T): T {
i
}
spec foo_generic {
// The first parameter will be of bv type if T is instantiated as a number type
pragma bv = b"0";
// The first return value will be of bv type if T is instantiated as a number type
pragma bv_ret = b"0";
}
public fun test(i: C): u64 {
let x1 = foo_generic(C.b);
x1 ^ x1
}
spec test {
// Explicit type cast is mandatory for generating correct boogie program
ensures result == (0 as u64);
}
}
Note that if arguments or fields of a generic function or struct are specified with bv types,
they will be of bv types in all instances of the function or the struct when the instantiated type is an integer type.
- Values with integer types in vectors and tables can be encoded as
bvtypes; indices and keys in tables cannot bebvtypes for now. Using other types will lead to internal errors.
Built-in functions
MSL supports a number of built-in constants and functions. Most of them are not available in the Move language:
MAX_U8: num,MAX_U64: num,MAX_U128: numreturn the maximum value of the corresponding type.exists<T>(address): boolreturns true if the resourceTexists at the address.global<T>(address): Treturns the resource value at the address.len<T>(vector<T>): numreturns the length of the vector.update<T>(vector<T>, num, T>): vector<T>returns a new vector with the element replaced at the given index.vec<T>(): vector<T>returns an empty vector.vec<T>(x): vector<T>returns a singleton vector.concat<T>(vector<T>, vector<T>): vector<T>returns the concatenation of the parameters.contains<T>(vector<T>, T): boolreturns true if the element is in the vector.index_of<T>(vector<T>, T): numreturns the index of the element in the vector, or the length of the vector if it does not contain it.range<T>(vector<T>): rangereturns the index range of the vector.in_range<T>(vector<T>, num): boolreturns true if the number is in the index range of the vector.in_range<T>(range, num): boolreturns true if the number is in the range.update_field(S, F, T): Supdates a field in a struct, preserving the values of other fields, whereSis some struct,Fthe name of a field inS, andTa value for this field.old(T): Tdelivers the value of the passed argument at point of entry into a Move function. This is allowed inensurespost-conditions, inline spec blocks (with additional restrictions), and certain forms of invariants, as discussed later.TRACE(T): Tis semantically the identity function and causes visualization of the argument’s value in error messages created by the prover.int2bv(v)explicitly converts an integervinto itsbvrepresentation.bv2int(b)explicitly converts abvintegerbinto thenumrepresentation. However, its use is not encouraged due to efficiency issues.
Built-in functions live in an unnamed outer scope of a module. If the module defines a function len,
then this definition will shadow that of the according built-in function. To access the built-in
function in such a situation, one can use the notation ::len(v).
Partial semantics
In MSL, expressions have partial semantics. This is in contrast to Move program expressions, which have total semantics, since they either deliver a value or abort.
An expression e[X] that depends on some variables X may have a known interpretation for
some assignments to variables in X but is unknown for others. An unknown interpretation for a
sub-expression causes no issue if its value is not needed for the overall expression result.
Therefore, it does not matter if we say y != 0 && x / y > 0
or x / y > 0 && y != 0: boolean operators are commutative.
This basic principle applies to higher-level language constructs. For example, in specifications,
it does not matter in which order conditions are supplied: aborts_if y != 0; ensures result == x / y; is the same as
ensures result == x / y; aborts_if y != 0;. Also, aborts_if P; aborts_if Q; is the same
as aborts_if Q || P.
Moreover, the principle of partial semantics is inherited to specification helper functions, which behave transparently. Specifically, inlining those functions is equivalent to calling them (call-by-expression parameter passing semantics).
Specifications
Specifications are contained in so-called specification blocks (abbreviated spec block) that can appear as module members and inside Move functions. The various types of spec blocks are shown below, and will be discussed in subsequent sections.
module addr::M {
struct Counter has key {
value: u8,
}
public fun increment(a: address) acquires Counter {
let r = borrow_global_mut<Counter>(a);
spec {
// spec block targeting this code position
// ...
};
r.value = r.value + 1;
}
spec increment {
// spec block targeting function increment
// ...
}
spec Counter {
// spec block targeting struct Counter
// ...
}
spec schema Schema {
// spec block declaring a schema
// ...
}
spec fun f(x: num): num {
// spec block declaring a helper function
// ...
}
spec module {
// spec block targeting the whole module
// ...
}
}
Apart from spec blocks inside Move functions, the textual position of a spec block is irrelevant. Also, a spec block for a struct, function, or module can be repeated multiple times, accumulating the content.
Separating specifications
Instead of putting specifications into the same module as the regular Move definitions, one can also put them into a separate “specification” module, which can live in the same or a different file:
module addr::M {
//...
}
spec addr::M {
spec increment { /* ... */ }
}
The syntax of a specification module is the same as for a regular module; however, Move functions and structures are not allowed.
A specification module must be compiled together with the Move module it is targeting and cannot be compiled and verified standalone.
In case Move definitions are far apart (e.g., in different files), it is possible to augment the specification of a Move function with a signature of this function to give sufficient context to understand the specification. This syntax is optionally enabled in regular and in specification modules:
module 0x42::m {
public fun increment(a: address) acquires Counter { /* ... */ }
// ...
spec increment(a: address) { /* ... */ }
}
Pragmas and properties
Pragmas and properties are a generic mechanism to influence interpretation of specifications. They are also an extension point to experiment with new concepts before they become part of the mainstream syntax. Here we give a brief introduction into their general syntax; individual instances are discussed later.
The general form of a pragma is:
module 0x42::m {
spec item {
pragma <name> = <literal>;
}
}
The general form of a property is:
module 0x42::m {
spec item {
<directive> [<name> = <literal>] <content>; // ensures, aborts_if, include, etc..
}
}
The <literal> can be any value supported by MSL (or the Move language). A value assignment can
also be omitted, in which case a default is used. For example, it is common to use pragma option;
as a shortcut for pragma option = true;.
Instead of a single pragma or property, a list can also be provided, as in invariant [global, isolated] P.
Pragma inheritance
A pragma in a module spec block sets a value that applies to all other spec blocks in the module. A pragma in a function or struct spec block can override this value for the function or struct. Furthermore, the default value of some pragmas can be defined via the prover configuration.
As an example, we look at the verify pragma. This pragma is used to turn verification on or off.
module 0x42::m {
spec module {
pragma verify = false; // By default, do not verify specs in this module ...
}
spec increment {
pragma verify = true; // ... but do verify this function.
// ...
}
}
General pragmas and properties
A number of pragmas control general behavior of verification. Those are listed in the table below.
| Name | Description |
|---|---|
verify | Turns on or off verification. |
intrinsic | Marks a function to skip the Move implementation and use a prover-native implementation. This makes a function behave like a native function even if it is not so in Move. |
timeout | Sets a timeout (in seconds) for a function or module. Overrides the timeout provided by command-line flags. |
verify_duration_estimate | Sets an estimate (in seconds) for how long the verification of a function takes. If the configured timeout is less than this value, verification will be skipped. |
seed | Sets a random seed for a function or module. Overrides the seed provided by command-line flags. |
The following properties control general behavior of verification:
| Name | Description |
|---|---|
[deactivated] | Excludes the associated condition from verification. |
Pre and post state
Multiple conditions in spec blocks work with a pre and post state, relating them to each other.
Function specifications are one example of this: in the ensures P condition, the pre-state (at
function entry) and the post-state (at function exit) are related via the predicate P. However,
the concept is more general and also applies to invariants, where the pre-state is before and the
post-state is after a global update.
In contexts where a pre/post-state is active, expressions are evaluated implicitly in the
post-state. To evaluate an expression in a pre-state, one uses the built-in function old(exp),
which evaluates its parameter in the pre-state and returns its value. It is important to understand
that every sub-expression in exp is computed in the pre-state as well, including calls to helper
functions.
The ‘state’ in question here consists of assignments to global resource memory, as well as to any
parameters of the function of type &mut T. Examples:
module 0x42::m {
fun increment(counter: &mut u64) { *counter = *counter + 1 }
spec increment {
ensures counter == old(counter) + 1;
}
fun increment_R(addr: address) {
let r = borrow_global_mut<R>(addr);
r.value = r.value + 1;
}
spec increment_R {
ensures global<R>(addr).value == old(global<R>(addr).value) + 1;
}
}
Helper functions
MSL allows defining helper functions. Those functions can then be used in expressions.
Helper functions are defined using the following syntax:
module 0x42::m {
spec fun exists_balance<Currency>(a: address): bool { exists<Balance<Currency>>(a) }
}
As seen in the example, helper functions can be generic. Moreover, they can access global state.
Definitions of helper functions are neutral regarding whether they apply to
a pre- or post-state. They are evaluated in the currently active state. For
instance, in order to see whether a balance existed in the pre-state, one
uses old(exists_balance<Currency>(a)). Consequently, the expression old(..) is not allowed
within the definition of a helper function.
Helper functions are partial functions; see the discussion of partial semantics.
Uninterpreted functions
A helper function can be defined as uninterpreted by simply omitting its body:
module 0x42::m {
spec fun something(x: num): num;
}
An uninterpreted function is one to which the prover is allowed to assign some arbitrary meaning, as long as it is consistent within a given verification context. Uninterpreted functions are a useful tool for abstraction in specifications (see also abstract specifications).
Axioms
The meaning of helper functions can be further constrained by using axioms. Currently, axioms must be contained in module spec blocks:
module 0x42::m {
spec module {
axiom forall x: num: something(x) == x + 1;
}
}
Axioms should be used with care as they can introduce unsoundness in the specification logic via
contradicting assumptions. The Move Prover supports a smoke test for detecting unsoundness via
the --check-inconsistency flag.
Let bindings
A spec block can contain let bindings that introduce names for expressions:
module 0x42::m {
fun get_R(account: signer): R { /* ... */ }
spec get_R {
let addr = signer::spec_address_of(account);
aborts_if addr != ROOT;
ensures result == global<R>(addr);
}
}
In a spec block that has a pre-state and post-state (like a function specification), the let name = e
form will evaluate e in the pre-state. In order to evaluate an expression in the post-state, use let post name = e. In the rhs expression of this form, one can use old(..) to refer to the
pre-state.
Aborts_if condition
The aborts_if condition is a spec block member that can appear only in a function context. It
specifies conditions under which the function aborts.
In the following example, we specify that the function increment aborts if the Counter resource
does not exist at address a (recall that a is the name of the parameter of increment).
module 0x42::m {
spec increment {
aborts_if !exists<Counter>(a);
}
}
If a function has more than one aborts_if condition, those conditions are or-ed with each other.
The evaluation of the combined aborts condition (or-ed from each individual condition) depends on
the value of the pragma aborts_if_is_partial. If this value is false (the default), the function
aborts if and only if the combined aborts condition is true. In this case, the above aborts
specification for increment will lead to a verification error, since there are additional
situations where increment can abort, namely if incrementing Counter.value would lead to an
overflow. To fix this, the specification can be completed like this:
module 0x42::m {
spec increment {
pragma aborts_if_is_partial = false; // This is the default, but added here for illustration.
aborts_if !exists<Counter>(a);
aborts_if global<Counter>(a).value == 255;
}
}
If the value of aborts_if_is_partial is true, the combined aborts condition (the or-ed individual
conditions) only implies that the function aborts. Formally, if A is the combined aborts condition, then
with aborts_if_is_partial = true, we have A ==> function_aborts; otherwise we have
A <==> function_aborts. Therefore, the following does verify:
module 0x42::m {
spec increment {
pragma aborts_if_is_partial = true;
aborts_if !exists<Counter>(a);
}
}
Note that there is a certain risk in setting
aborts_if_is_partialto true, and best practice is to avoid it in specifications of public functions and Move scripts once those are considered finalized. This is because changing the code after finalization of the spec can add new (non-trivial, undesired) abort situations the original specification did not anticipate yet will nevertheless silently pass verification.
If no aborts condition is specified for a function, abort behavior is unspecified. The function may
or may not abort, and verification will not raise any errors, whether aborts_if_is_partial is set
or not. In order to state that a function never aborts, use aborts_if false. One can use the
pragma aborts_if_is_strict to change this behavior; this is equivalent to an aborts_if false being added to each function that does not have an explicit aborts_if clause.
Aborts_if condition with code
The aborts_if condition can be augmented with code:
module 0x42::m {
fun get_value(addr: address): u64 {
aborts(exists<Counter>(addr), 3);
borrow_global<Counter>(addr).value
}
spec get_value {
aborts_if !exists<Counter>(addr) with 3;
}
}
It is a verification error if the above function does not abort with code 3 under the given
condition.
In order to specify a direct VM abort, one can use the special constant EXECUTION_FAILURE:
module 0x42::m {
fun get(addr: address): &Counter acquires Counter {
borrow_global<Counter>(addr)
}
spec get {
aborts_if !exists<Counter>(addr) with EXECUTION_FAILURE;
}
}
This same constant can be used for all other VM failures (division by zero, overflow, etc.).
Aborts_with condition
The aborts_with condition allows specifying with which codes a function can abort, independent
of the condition under which it aborts. It is similar to a throws clause in languages like Java.
module 0x42::m {
fun get_one_off(addr: address): u64 {
aborts(exists<Counter>(addr), 3);
borrow_global<Counter>(addr).value - 1
}
spec get_one_off {
aborts_with 3, EXECUTION_FAILURE;
}
}
If the function aborts with any other or none of the specified codes, a verification error will be produced.
The aborts_with condition can be combined with aborts_if conditions. In this case, the aborts_with
specifies any other codes with which the function may abort, in addition to the ones given in the aborts_if:
module 0x42::m {
spec get_one_off {
aborts_if !exists<Counter>(addr) with 3;
aborts_with EXECUTION_FAILURE;
}
}
Requires condition
The requires condition is a spec block member that postulates a pre-condition for a function. The
Move Prover will produce verification errors for functions that are called with violating
pre-conditions.
A requires is different from an aborts_if: in the latter case, the function can be called, and
any aborts it produces will be propagated to the caller context. In the requires case, the Move Prover
will not allow the function to be called in the first place. Nevertheless, the function can still
be called at runtime if verification is skipped. Because of this, requires are rare in Move
specifications, and aborts_if are more common. Specifically, requires should be avoided for public APIs.
An example of requires is:
module 0x42::m {
spec increment {
requires global<Counter>(a).value < 255;
}
}
Ensures condition
The ensures condition postulates a post-condition for a function that must be satisfied when the
function terminates successfully (i.e., does not abort). The Move Prover will verify each ensures to
this end.
An example for the ensures condition is the following:
module 0x42::m {
spec increment {
ensures global<Counter>(a) == old(global<Counter>(a)) + 1;
}
}
Within the expression for the ensures condition, one can use the old function, as discussed in
Pre and post state.
Modifies condition
The modifies condition is used to provide permissions to a function to modify global storage. The
annotation itself comprises a list of global access expressions. It is specifically used together
with opaque function specifications.
module 0x42::m {
struct S has key {
x: u64
}
fun mutate_at(addr: address) acquires S {
let s = borrow_global_mut<S>(addr);
s.x = 2;
}
spec mutate_at {
pragma opaque;
modifies global<S>(addr);
}
}
In general, a global access expression has the form global<type_expr>(address_expr). The
address-valued expression is evaluated in the pre-state of the annotated function.
module 0x42::m {
fun read_at(addr: address): u64 acquires S {
let s = borrow_global<S>(addr);
s.x
}
fun mutate_S_test(addr1: address, addr2: address): bool acquires T {
assert(addr1 != addr2, 43);
let x = read_at(addr2);
mutate_at(
addr1
); // Note we are mutating a different address than the one read before and after
x == read_at(addr2)
}
spec mutate_S_test {
aborts_if addr1 == addr2;
ensures result == true;
}
}
In the function mutate_S_test, the assertion in the spec block is expected to hold. A benefit of
the modifies specification on mutate_at is that this assertion can be proved whether or not mutate_at is inlined.
If the modifies annotation is omitted on a function, then that function is deemed to have all
possible permissions for those resources it may modify during its execution. The set of all
resources that may be modified by a function is obtained via an interprocedural analysis of the
code. In the example above, mutate_S_test does not have a modifies specification and modifies
resource S via the call to mutate_at. Therefore, it is considered to have modified S at any
possible address. Instead, if the programmer adds modifies global<S>(addr1)
to the specification of mutate_S_test, then the call to mutate_at is checked to make sure that
modify permissions granted to mutate_S_test cover the permissions it grants to mutate_at.
Invariant condition
The invariant condition can be applied to structs and at the global level.
Function invariants
The invariant condition on a function is simply a shortcut for a requires and ensures with the
same predicate.
Thus, the following spec block:
module 0x42::m {
spec increment {
invariant global<Counter>(a).value < 128;
}
}
… is equivalent to:
module 0x42::m {
spec increment {
requires global<Counter>(a).value < 128;
ensures global<Counter>(a).value < 128;
}
}
Struct invariants
When the invariant condition is applied to a struct, it expresses a well-formedness property of
the struct data. Any instance of this struct that is currently not mutated will satisfy this
property (with exceptions as outlined below).
For example, we can postulate an invariant on our counter that it must never exceed the value of 127:
module 0x42::m {
spec Counter {
invariant value < 128;
}
}
A struct invariant is checked by the Move Prover whenever the struct value is constructed (packed). While
the struct is mutated (e.g., via a &mut Counter) the invariant does not hold (but see exception
below). In general, we consider mutation as an implicit unpack, and end of mutation as a pack.
The Move language semantics unambiguously identifies the point when mutation ends and starts. This follows from the borrow semantics of Move and includes mutation via an enclosing struct. (The mutation of an inner struct ends when the mutation of the root struct where mutation started ends).
There is one exception to this rule. When a mutable reference to a struct declared in module M is passed into a public function of M which does by itself not return any other mutable reference (which could be borrowed from the input parameter), we treat this parameter as “packed”. That means, on function entry, we will unpack it and on function exit we will pack again, enforcing the invariant. This reflects that in Move, struct data can be mutated only within the module that declares the struct; so for an outside caller of the public function, the mutable reference can actually not be mutated unless by calling public functions of module M again. It is a significant simplification of the verification problem to exploit this in the semantics.
Global invariants
A global invariant appears as a member of a module. It can express a condition over the global state
of the Move program, as represented by resources stored in memory. For example, the below invariant
states that a Counter resource stored at any given address can never be zero:
module addr::M {
invariant forall a: addr where exists<Counter>(a): global<Counter>(a).value > 0;
}
A global invariant is assumed to hold when data is read from the global state, and is asserted (and may fail to verify) at the moment the state is updated. For example, the below function will never abort with arithmetic underflow because the counter value is always greater than zero; however, it will create a verification error since the counter can drop to zero:
module 0x42::m {
fun decrement_ad(addr: address) acquires Counter {
let counter = borrow_global_mut<Counter>(addr);
let new_value = counter.value - 1; // Will not abort because counter.value > 0
*counter.value = new_value; // Fails verification since value can drop to zero
}
}
Notice that type parameters are supported in global invariants. For example, the invariant above can be rewritten into the below one if Counter is generic:
module addr::M {
invariant<T> forall a: addr where exists<Counter<T>>(a): global<Counter<T>>(a).value > 0;
}
Disabling invariants
There are times when a global invariant holds almost everywhere, except for a brief interval inside a function. In current Move code, this often occurs when something (e.g., an account) is being set up and several structs are published together. Almost everywhere, an invariant holds that all the structs are published or none of them are. But the code that publishes the structs must do so sequentially. While the structs are being published, there will be a point where some are published and others are not.
In order to verify invariants that hold except during small regions, there is a feature to allow users to disable invariants temporarily. Consider the following code fragment:
module 0x42::m {
fun setup() {
publish1();
publish2();
}
}
where publish1 and publish2 publish two different structs, T1 and T2 at address a.
module addr::M {
invariant [global] exists<T1>(a) == exists<T2>(a)
}
As written, the Move Prover will report that the invariant is violated after the call to publish1 and before the call to publish2. If either of publish1 or publish2 is without the other, the Move Prover
will also report a violation of the invariant.
By default, a global invariant is checked immediately after the instruction I that touches the resources mentioned in the global invariant. The [suspendable] attribute (on the invariant) together with two pragmas (specified in a function spec block) provide fine-grained control over where this invariant is checked:
disable_invariants_in_body: the invariant will be checked at the end of the function whereIresides.delegate_invariants_to_caller: the invariant will be checked by all callers of the function whereIresides.
For the example above, we can add the pragma disable_invariants_in_body:
module 0x42::m {
spec setup {
pragma disable_invariants_in_body;
}
}
which says that invariants are not required to hold while setup is executing but are assumed to hold on entry to and exit from setup.
This pragma changes the Move Prover’s behavior. The invariants are assumed on entry to setup but not proved during or after publish1 and publish2. Instead, all invariants that could be invalidated in the
body of setup are asserted and proved at the point of return from setup. A consequence of this processing is that the user may need to provide stronger post-conditions on publish1 and publish2 to
make it possible to prove the invariants on exit from setup.
Another consequence of this processing is that invariants cannot safely be assumed to hold during the execution of publish1 and publish2 (unless nothing in the body of setup changes state
mentioned in the invariant). Therefore, if proving a post-condition requires the invariant to be assumed, the post-condition will fail.
In the example, invariants hold at the call sites of setup but not in the body. For publish1, invariants don’t necessarily hold at the call site or in the body of the function. In the example, that
behavior is implied because publish1 is called in a context where invariants are disabled.
When invariants are disabled in setup in the above example, the Move Prover cannot assume them on entry to publish1 and publish2 and should not try to prove them on exit from those functions. The Move Prover
would have the same behavior for any functions called by publish1 or publish2. The Move Prover automatically adopts this behavior when invariants are disabled in a calling function, but it is possible for the user to declare that a function be treated like publish1.
For example, if publish2 is only called from the setup function above, and we did not disable invariants in setup, we could achieve a similar effect by using the pragma delegate_invariants_to_caller, instead.
module 0x42::m {
spec setup {
pragma delegate_invariants_to_caller;
}
}
This would be legal only if setup is a private or public (friend) function. The difference between this and disabling invariants in setup is that the invariants would not be assumed at the beginning of setup and would be proved after setup returns at each site where it is called.
While both pragmas disable invariants in the body of a function, the difference is that disable_invariants_in_body assumes invariants on entry and proves them on exit, while delegate_invariants_to_caller does neither.
There are some limitations on how these pragmas can be used. disable_invariants_in_body cannot be declared for functions where invariants are delegated to a caller, either explicitly via the pragma
or implicitly because the function is called in a context where invariants have been disabled. (This restriction is to ensure consistent processing, because one pragma assumes that invariants hold
in the calling context and the other does not.) Second, it is illegal for a public or script function to delegate invariant checking to its callers (since the Move Prover does not know all the call sites), unless the function cannot possibly invalidate an invariant because it doesn’t change any of the state mentioned in exists and global expressions appearing in the invariant.
Update invariants
The update form of a global invariant allows expressing a relation between the pre-state and post-state of a global state update. For example, the following invariant states that the counter must decrease monotonically whenever it is updated:
module addr::M {
invariant update [global] forall a: addr where old(exists<Counter>(a)) && exists<Counter>(addr):
global<Counter>(a).value <= old(global<Counter>(a));
}
Isolated global invariants
A global invariant can be marked as [isolated] to indicate that it is not relevant for proving
other properties of the program. An isolated global invariant will not be assumed when the related
global state is read. It will only be assumed before the state is updated to help prove that the
invariant still holds after the update. This feature is for improving performance in situations
where there are many global invariants, but they have no direct influence on verification.
Modular verification and global invariants
Certain usage of global invariants leads to verification problems that cannot be checked in a modular fashion. “Modular” here means that a module can be verified standalone and proven to be universally correct in all usage contexts (if preconditions are met).
A non-modular verification problem may arise if a global invariant refers to state from multiple modules. Consider a situation where module M1 uses module M2, and M1 contains the following invariant, with the helper function condition referring to global state of each respective module:
module addr::M1 {
invariant M1::condition() ==> M2::condition();
}
When we verify M1 standalone, the Move Prover will determine that it also needs to verify functions in M2, namely those which update the M2 memory such that the invariant in M1 can fail.
Assume and assert conditions in code
A spec block might also occur anywhere an ordinary Move statement block can occur. Here is an example:
module 0x42::m {
fun simple1(x: u64, y: u64) {
let z;
y = x;
z = x + y;
spec {
assert x == y;
assert z == 2 * x;
}
}
}
In such inline spec blocks, only a subset of conditions are permitted:
assumeandassertstatements are allowed in any code locations.- loop
invariantstatements are allowed only in code locations that represent loop headers.
An assert statement inside a spec block indicates a condition that must hold when control reaches
that block. If the condition does not hold, an error is reported by the Move Prover. An assume
statement, on the other hand, blocks executions violating the condition in the statement. The
function simple2 shown below is verified by the Move Prover. However, if the first spec block
containing the assume statement is removed, Move Prover will show a violation to the assert
statement in the second spec block.
module 0x42::m {
fun simple2(x: u64, y: u64) {
let z: u64;
spec {
assume x > y;
};
z = x + y;
spec {
assert z > 2 * y;
}
}
}
Loop invariants
An invariant statement encodes a loop invariant and must be placed at a loop head, as in the
following example:
module 0x42::m {
fun simple3(n: u64) {
let x = 0;
loop {
spec {
invariant x <= n;
};
if (x < n) {
x = x + 1
} else {
break
}
};
spec {
assert x == n;
}
}
}
A loop invariant is translated into two assert statements and one assume statement to facilitate inductive reasoning about properties of the loop. Specifically, a loop invariant is translated to:
- An
assertstatement that confirms the invariant holds when the loop is first encountered in the execution – establishing the base case. - An
assumestatement that encodes the property that the invariant holds at loop iterationI. - An
assertstatement that checks whether the invariant continues to hold at loop iterationI+1.
Referring to pre-state
Occasionally, we would like to refer to the pre-state of a mutable function argument in inline spec
blocks. In MSL, this can be done with the old(T) expression. Similar to the semantics of old(..)
in post conditions, an old(T) expression in an assume or assert statement always yields the
value of T at the function entry point. Here is an example that illustrates the use of
old(..) in an inline spec block:
module 0x42::m {
fun swap(x: &mut u64, y: &mut u64) {
let t = *x;
*x = *y;
*y = t;
spec {
assert x == old(y);
assert y == old(x);
};
}
}
The above example is trivial as the same property can be expressed with post conditions
(i.e., ensures) too. But there are cases where we must use old(..) to refer to the pre-state, especially in the specification of loop invariants. Consider the following example
where we verify that the vector_reverse function properly reverses the order of all elements
in a vector:
module 0x42::m {
fun verify_reverse<Element>(v: &mut vector<Element>) {
let vlen = vector::length(v);
if (vlen == 0) return;
let front_index = 0;
let back_index = vlen - 1;
while ({
spec {
assert front_index + back_index == vlen - 1;
assert forall i in 0..front_index: v[i] == old(v)[vlen - 1 - i];
assert forall i in 0..front_index: v[vlen - 1 - i] == old(v)[i];
assert forall j in front_index..back_index + 1: v[j] == old(v)[j];
assert len(v) == vlen;
};
(front_index < back_index)
}) {
vector::swap(v, front_index, back_index);
front_index = front_index + 1;
back_index = back_index - 1;
};
}
spec verify_reverse {
aborts_if false;
ensures forall i in 0..len(v): v[i] == old(v)[len(v) - 1 - i];
}
}
Note the usage of old(v) in the loop invariants. Without them, it is hard to express the
invariant that the vector is partially reversed while the loop is iterating and the rest
remain unchanged.
However, unlike the old(T) expressions in ensures conditions where T can be any valid
expression (e.g., old(v[i]) is allowed), the old(T) expressions in assert and assumes
statements accept only a single variable as T and that variable must be a function argument of
a mutable reference type. In the above example, old(v[i]) is not allowed, and we should use
old(v)[i] instead.
Specification variables
MSL supports spec variables, also called ghost variables in the verification community. These variables are used only in specifications and represent information derived from the global state of resources. An example use case is to compute the sum of all coins available in the system and specify that the sum can be changed only in certain scenarios.
We illustrate this feature by introducing a spec variable that maintains the sum of all Counter
resources from our running example. First, a spec variable is introduced via spec module block as
follows:
module 0x42::m {
spec module {
global sum_of_counters: num;
}
}
This value is going to be updated whenever a Counter is packed or unpacked. (Recall that mutation
is interpreted as an implicit unpack and pack):
module 0x42::m {
spec Counter {
invariant pack sum_of_counters = sum_of_counters + value;
invariant unpack sum_of_counters = sum_of_counters - value;
}
}
TODO:
invariant packandinvariant unpackare currently not implemented
Now we may for example want to specify that the sum of all Counter instances in the global state should never exceed a particular value. We can do this as follows:
module 0x42::m {
spec module {
invariant [global] sum_of_counters < 4711;
}
}
Note that spec variables can also be referenced from helper functions. Moreover, spec variables can be generic:
module 0x42::m {
spec module {
global some_generic_var<T>: num;
}
}
When using such a spec variable, a type parameter must be provided, as in some_generic_var<u64>. Effectively, a generic spec variable is like a family of variables indexed by types.
Schemas
Schemas are a means for structuring specifications by grouping properties together. Semantically, they are just syntactic sugar that expand to conditions on functions, structs, or modules.
Basic Schema Usage
Schemas are used as such:
module 0x42::m {
spec schema IncrementAborts {
a: address;
aborts_if !exists<Counter>(a);
aborts_if global<Counter>(a).value == 255;
}
spec increment {
include IncrementAborts;
}
}
Each schema may declare a number of typed variable names and a list of conditions over those variables. All supported condition types can be used in schemas. The schema can then be included in another spec block:
- If that spec block is for a function or a struct, all variable names the schema declares must be matched against existing names of compatible type in the context.
- If a schema is included in another schema, existing names are matched and must have the same type, but non-existing names will be added as new declarations to the inclusion context.
When a schema is included in another spec block, it will be checked whether the conditions it
contains are allowed in this block. For example, including the schema IncrementAborts into a
struct spec block will lead to a compile-time error.
When a schema is included, the names it declares can also be bound by expressions. For example, one can
write include IncrementAborts{a: some_helper_address()}. Effectively, not providing a binding is
equivalent to writing IncrementAborts{a: a} if a is an existing name in scope.
Schemas can be generic. Generic schemas must be fully instantiated where they are included; type inference is not available for schemas.
Schema expressions
When a schema is included, one can use a limited set of Boolean operators as follows:
P ==> SchemaExp: all conditions in the schema will be prefixed withP ==> ... Conditions that are not based on Boolean expressions will be rejected.if (P) SchemaExp1 else SchemaExp2: this is treated similarly to including bothP ==> SchemaExp1and!P ==> SchemaExp2.SchemaExp1 && SchemaExp2: this is treated as two includes for both schema expressions.
Schema apply operation
One of the main use cases for schemas is to be able to name a group of properties and then apply
those to a set of functions. This is achieved by the apply operator. The apply spec block member
can appear only in module spec blocks.
The general form of the apply operator is apply Schema to FunctionPattern, .. except FunctionPattern, ... Here, Schema can be a schema name or a schema name plus formal type arguments. FunctionPatterns consists of an optional visibility modifier public or internal (if not provided, both visibilities will match), a name pattern in the style of a shell file pattern (e.g., *, foo*, foo*bar, etc.), and finally an optional type argument list. All type arguments provided to Schema must be bound
in this list and vice versa.
The apply operator includes the given schema in all function spec blocks that match the patterns,
except those excluded via the except patterns.
A typical use of the apply operator is to provide common pre-conditions and post-conditions to all functions in
a module with some exceptions. Example:
module 0x42::m {
spec schema Unchanged {
let resource = global<R>(ADDR);
ensures resource == old(resource);
}
spec module {
// Enforce Unchanged for all functions except the initialize function.
apply Unchanged to * except initialize;
}
}
Notice that while with global invariants we can express similar things, we cannot express the restriction of the invariant to only specific functions.
Opaque specifications
With the pragma opaque, a function is declared to be solely defined by its specification at call
sites. In contrast, if this pragma is not provided, then the function’s implementation will be used
as the basis to verify the caller.
Using opaque requires the specification to be sufficiently complete for the verification problem at hand. Without opaque, the Move Prover will use the implementation as the source of truth for the definition of the function. But with opaque, if there is an aspect of the function definition unspecified, an arbitrary meaning will be assumed. For example, with the specification below, the increment function can abort under arbitrary conditions:
module 0x42::m {
spec increment {
pragma opaque;
// aborts_if !exists<Counter>(a); // We need to add this to make the function not abort arbitrarily
ensures global<Counter>(a) == old(global<Counter>(a)) + 1;
}
}
In general, opaque functions enable modular verification, as they abstract from the implementation
of functions, resulting in much faster verification.
If an opaque function modifies state, it is advised to use the modifies condition in its specification. If this is omitted, verification of the state changes will fail.
Abstract specifications
The [abstract] property allows specifying a function such that abstract semantics — different
from the actual implementation — are used at the call site. This is useful if the implementation
is too complex for verification, and abstract semantics are sufficient for verification goals.
The [concrete] property, in turn, allows specifying conditions that are verified against
the implementation but not used at the call site.
Consider the following example of a hash function. The actual value of the hash is not relevant for verification of callers, and we use an uninterpreted helper function delivering an arbitrary value chosen by the Move Prover. We can still specify the concrete implementation and verify its correctness:
module 0x42::m {
fun hash(v: vector<u8>): u64 {
<<sum up values>>(v)
}
spec hash {
pragma opaque;
aborts_if false;
ensures [concrete] result == << sum up values >> (v);
ensures [abstract] result == spec_hash_abstract(v);
}
spec fun abstract_hash(v: vector<u8>): u64; // uninterpreted function
}
The soundness of the abstraction is the responsibility of the specifier and not verified by the Move Prover.
NOTE: The abstract/concrete properties should only be used with opaque specifications, but the Move Prover currently does not generate an error if they are not.
NOTE: The
modifiesclause does not currently support abstract/concrete. Also, if no modifies is given, the modified state will be computed from the implementation anyway, possibly conflicting with[abstract]properties.
Documentation generation
The organization of specification blocks in a file is relevant for documentation generation – even though it is not for the semantics.
Expressiveness
The Move specification language is expressive enough to represent the full Move language semantics (formal argument outstanding) with one exception: functions that return a &mut T type.
Consider the following code:
module 0x42::m {
struct S { x: u64, y: u64 }
fun x_or_y(b: bool, s: &mut S): &mut u64 {
if (b) &mut s.x else &mut s.y
}
spec x_or_y {
ensures b ==> result == s.x;
ensures !b ==> result == s.y;
}
}
We are not able to specify the full semantics of x_or_y in MSL because we cannot capture the
semantics of mutable references. While we can say something about the value behind the reference at
function exit, subsequent effects as in *x_or_y(b, &mut s) = 2 cannot be specified.
However, the Move Prover does understand the meaning of such functions – the restriction is only
in what we can specify. Practically, this means we cannot make the function x_or_y opaque and must
let verification rely on the Move Prover working directly with the implementation. Specifically, we
can verify the following (which can then be opaque):
module 0x42::m {
fun x_or_y_test(s: S): S {
*x_or_y(true, &mut s) = 2;
s
}
spec x_or_y_test {
pragma opaque;
ensures result.x == 2;
ensures result.y == s.y;
}
}
Supporting resources
Compositional Specifications
Since language version 2.4
This chapter describes the constructs that allow specifications to be composed from other specifications, including reasoning about higher-order functions, the global state a function may read or write, and intermediate states between calls.
Behavioral Predicates
Overview
A key challenge in specifying higher-order functions is expressing the behavior of function parameters without knowing their implementation. Behavioral predicates solve this by lifting the specification clauses of a function — its preconditions, postconditions, and abort conditions — into first-class predicates that can be referenced in the specifications of other functions.
There are four behavioral predicates:
| Predicate | Meaning |
|---|---|
ensures_of<f>(args, result) | The postcondition of f applied to args yielding result |
aborts_of<f>(args) | The abort condition of f applied to args |
requires_of<f>(args) | The precondition of f applied to args |
result_of<f>(args) | A deterministic result selector: the value y such that ensures_of<f>(args, y) holds |
In all cases, f must be a name that refers to either a function parameter of function type or a concrete function.
ensures_of
The ensures_of<f>(args, result) predicate represents the postcondition of function f. When used in a specification, it asserts that whatever postcondition f guarantees will hold for the given arguments and result.
Consider a basic higher-order function that applies a function to an argument:
fun apply(f: |u64| u64, x: u64): u64 {
f(x)
}
spec apply {
ensures ensures_of<f>(x, result);
}
This specification says: whatever the postcondition of the function f is, it holds between the input x and the returned result.
When apply is transparent (the default — not marked pragma opaque), the prover inlines the function body and reasons through the actual implementation. This means closures without explicit inline specs work:
fun test_add_five(x: u64): u64 {
apply(|y| y + 5, x)
}
spec test_add_five {
ensures result == x + 5;
}
When apply is opaque (pragma opaque), the prover only sees the specification, not the implementation. In this case, closures must carry explicit inline specs (see Inline Closure Specifications below).
aborts_of
The aborts_of<f>(args) predicate represents the abort condition of function f. It is used in aborts_if clauses to propagate abort conditions from function parameters:
fun apply_may_abort(f: |u64| u64, x: u64): u64 {
f(x)
}
spec apply_may_abort {
aborts_if aborts_of<f>(x);
ensures ensures_of<f>(x, result);
}
Since apply_may_abort is transparent here, the prover inlines the body and resolves the closure’s abort behavior directly:
fun test_may_abort(x: u64): u64 {
apply_may_abort(|y| if (y == 0) abort 1 else y, x)
}
spec test_may_abort {
aborts_if x == 0;
ensures result == x;
}
For opaque higher-order functions, the closure would need an explicit inline spec with aborts_if conditions.
requires_of
The requires_of<f>(args) predicate represents the precondition of function f. It allows higher-order functions to place requirements on their callers based on what the passed function expects:
fun apply_no_abort(f: |u64| u64, x: u64): u64 {
f(x)
}
spec apply_no_abort {
requires !aborts_of<f>(x);
aborts_if false;
ensures ensures_of<f>(x, result);
}
This specifies that callers must pass arguments for which f will not abort. If a caller violates this, the prover reports an error:
fun test_fail(): u64 {
// FAILS: passing MAX_U64 violates !aborts_of<f>(x) since the closure aborts on MAX_U64
apply_no_abort(
|x| x + 1 spec { aborts_if x == MAX_U64; ensures result == x + 1; },
MAX_U64
)
}
The prover output:
error: precondition does not hold at this call
┌─ requires_of_err.move:6:9
│
6 │ requires !aborts_of<f>(x);
│ ^^^^^^^^^^^^^^^^^^^^^^^^^^
result_of
The result_of<f>(args) predicate is a deterministic result selector. Semantically, result_of<f>(x) denotes the value y such that ensures_of<f>(x, y) holds. It is particularly useful for specifying sequential applications and loop invariants:
fun apply_seq(f: |u64| u64 has copy, x: u64): u64 {
f(f(x))
}
spec apply_seq {
let y = result_of<f>(x);
requires requires_of<f>(x) && requires_of<f>(y);
aborts_if aborts_of<f>(x) || aborts_of<f>(y);
ensures result == result_of<f>(y);
}
Here result_of is used to name the intermediate value y — the result of the first application — and then specify that the final result is f applied to y.
result_of can also be used with known concrete functions:
fun double(x: u64): u64 { x * 2 }
spec double { ensures result == x * 2; }
fun test_known(): u64 { double(5) }
spec test_known {
ensures result == result_of<double>(5);
}
The existence of result_of<f>(args) implies that f is deterministic — it denotes the unique value y satisfying ensures_of<f>(args, y). This is why result_of also establishes functional behavior: if ensures_of<f>(x, y1) and ensures_of<f>(x, y2) both hold, then y1 == y2 == result_of<f>(x).
Inline Closure Specifications
When a closure is passed to an opaque higher-order function, the prover needs to know the closure’s specification to reason about it. Closures can carry inline specifications using the spec { ... } syntax:
fun test_guarded_apply(x: u64): u64 {
guarded_apply(|y| {
if (y > 500) abort 1;
y * 2
} spec {
aborts_if y > 500;
ensures result == y * 2;
}, x)
}
The inline specification provides the closure’s contract: its abort conditions and postconditions. The prover uses these to instantiate behavioral predicates at the call site.
When the higher-order function is transparent (not opaque), the prover can often derive the closure’s behavior from its implementation, making inline specs optional. However, for opaque functions, inline specs are required since the prover relies solely on specifications.
Opaque Higher-Order Functions
Opaque functions are verified only from their specifications, not their implementations. Behavioral predicates enable writing useful specifications for opaque higher-order functions:
fun apply_opaque(f: |u64| u64, x: u64): u64 {
f(x)
}
spec apply_opaque {
pragma opaque = true;
ensures ensures_of<f>(x, result);
}
At the call site, callers must provide closures with explicit inline specs:
fun test_opaque(x: u64): u64 {
apply_opaque(|y| y + 5 spec { ensures result == y + 5; }, x)
}
spec test_opaque {
ensures result == x + 5;
}
This approach enables modular verification: the implementation of apply_opaque is verified once against its specification, and callers are verified against the specification without seeing the implementation.
Mutable Reference Parameters
Behavioral predicates extend to closures with mutable reference parameters. When a function takes &mut T, it effectively has two outputs: the explicit return value and the modified reference. The predicates account for both:
fun apply_void_mut(f: |&mut u64|, x: &mut u64) { f(x) }
spec apply_void_mut {
// For void return with &mut param, result_of returns the modified value
ensures x == result_of<f>(old(x));
}
fun apply_mut(f: |&mut u64| u64, x: &mut u64): u64 { f(x) }
spec apply_mut {
// For non-void return with &mut, ensures_of takes (input, result, modified_param)
ensures ensures_of<f>(old(x), result, x);
}
When a closure both returns a value and modifies a &mut parameter, result_of returns a tuple (explicit_result, modified_value):
fun apply_mut_result(f: |&mut u64| u64, x: &mut u64): u64 { f(x) }
spec apply_mut_result {
ensures (result, x) == result_of<f>(old(x));
}
Tuple components can be extracted with let expressions:
spec apply_mut_extract {
ensures result == {let (r, _p) = result_of<f>(old(x)); r};
ensures x == {let (_r, p) = result_of<f>(old(x)); p};
}
Behavioral Predicates with Loops
Behavioral predicates integrate with loop invariants, enabling specification of functions like contains, index, and reduce over vectors:
fun contains(v: &vector<u64>, pred: |&u64| bool has copy + drop): bool {
let i = 0;
let len = std::vector::length(v);
while (i < len) {
if (pred(std::vector::borrow(v, i))) {
return true;
};
i = i + 1;
}
spec {
invariant i <= len;
invariant forall j in 0..i: !result_of<pred>(v[j]);
};
false
}
spec contains {
requires forall x in 0..len(v): !aborts_of<pred>(v[x]);
aborts_if false;
ensures result == (exists k in 0..len(v): result_of<pred>(v[k]));
}
Notice how result_of<pred> is used in both the loop invariant and the postcondition to express the predicate’s behavior over vector elements.
A recursive specification function can use result_of to define the semantics of a fold operation:
spec fun spec_reduce(reducer: |u64, u64|u64, v: vector<u64>, val: u64, end: u64): u64 {
if (end == 0) val
else {
let val = spec_reduce(reducer, v, val, end - 1);
result_of<reducer>(val, v[end - 1])
}
}
fun reduce(vec: vector<u64>, start: u64, reducer: |u64, u64|u64 has copy + drop): u64 {
// ... loop implementation ...
}
spec reduce {
ensures result == spec_reduce(reducer, vec, start, len(vec));
}
Access Specifiers and Frame Conditions
The modifies_of and reads_of Declarations
When a higher-order function takes a function parameter, the prover needs to know which global resources the parameter may read or write in order to establish frame conditions (what is unchanged after the call). Without modifies_of/reads_of declarations, the function parameter is treated as pure: its behavioral predicates can only reason about data arguments and return values, not global state. This is correct for transparent (non-opaque) higher-order functions, where the closure body is inlined and verified directly. For opaque higher-order functions whose parameters modify global state, modifies_of and/or reads_of declarations are required to make those effects visible to the specification.
The modifies_of and reads_of declarations in a function’s specification describe these resource access permissions:
spec apply {
pragma opaque;
reads_of<f> Config;
modifies_of<f>(a: address) Data[a];
ensures ensures_of<f>(x, result);
aborts_if aborts_of<f>(x);
}
The syntax is:
reads_of<param_name> Resource1, Resource2, ...;
modifies_of<param_name>(formal_params) Resource1[addr], Resource2[addr], ...;
reads_of names the resource types that the function parameter may read. It takes only type names — no address expressions or parenthesized parameters.
modifies_of names the resource types that the function parameter may modify, using Move-2 index syntax (e.g., Data[a]) to specify the address at which modification is permitted. The formal parameters are variables that can be used in the modify target expressions — for example, Data[a] where a is a formal parameter.
These declarations serve two purposes:
- Frame conditions: The prover uses access declarations to determine which resources are unchanged after a call. Resources declared with
reads_ofare guaranteed unchanged everywhere. Resources declared withmodifies_ofusing an address expression likeResource[a]are guaranteed unchanged at all addresses other thana. - Access validation: The compiler checks that closures passed to the function do not access resources beyond what is declared.
Functions can also declare reads and modifies directly in their spec blocks:
spec my_fun {
reads R, S;
modifies R[addr];
}
Both declarations are enforced. The prover checks that opaque functions have modifies clauses covering all resources they actually modify. If a function declares reads, the prover checks that every resource the function accesses is covered by either the reads or modifies declaration:
error: function `my_fun` accesses resource `S`
which is not covered by its `reads` or `modifies` declaration
If no reads declaration is present, no read checking is performed — the prover only checks modifies for opaque functions.
Read Access
When a resource is declared with reads_of, the prover becomes aware that the function parameter’s behavior depends on these resources, making it sensitive to their current values. As a secondary effect, reads_of resources are guaranteed unchanged after the function parameter executes, enabling frame conditions at the call site:
fun apply_reads(f: |address| u64, x: address): u64 {
f(x)
}
spec apply_reads {
pragma opaque;
reads_of<f> Data, Index;
ensures result == result_of<f>(x);
ensures ensures_of<f>(x, result);
}
Callers can rely on the frame condition — both Data and Index are unchanged after the call:
fun test_reads(addr: address): u64 acquires Data, Index {
apply_reads(|a| read_indexed(a) spec {
ensures result == Data[a].value + Index[a].pos;
}, addr)
}
spec test_reads {
ensures result == Data[addr].value + Index[addr].pos;
// Both resources are guaranteed unchanged since reads_of declares reads-only
ensures Data[addr] == old(Data[addr]);
ensures Index[addr] == old(Index[addr]);
}
Write Access
When a resource is declared with modifies_of, the function parameter may modify it. The modifies_of clause includes an address expression to specify where modification is permitted. The enclosing function’s modifies clause must also list the resource:
fun apply_writes(f: |address| u64, x: address): u64 {
f(x)
}
spec apply_writes {
pragma opaque;
modifies Data[x];
modifies_of<f>(a: address) Data[a];
ensures ensures_of<f>(x, result);
aborts_if aborts_of<f>(x);
}
The modifies_of<f>(a: address) Data[a] declaration says that f may only modify Data at address a (the formal parameter of the modifies_of declaration). This enables the prover to establish that Data is unchanged at all other addresses:
fun test_writes(addr: address): u64 acquires Data {
apply_writes(|a| set_data(a, 99) spec {
modifies Data[a];
ensures result == 99;
ensures Data[a].value == 99;
aborts_if !exists<Data>(a);
}, addr)
}
spec test_writes {
aborts_if !exists<Data>(addr);
ensures result == 99;
// Data at other addresses is unchanged
ensures forall a: address where a != addr:
Data[a] == old(Data[a]);
}
Mixed Access
Different resources can have different access modes declared separately. This is common when a function reads configuration state but writes data state:
fun apply_mixed(f: |address| u64, x: address): u64 {
f(x)
}
spec apply_mixed {
pragma opaque;
modifies Data[x];
reads_of<f> Config;
modifies_of<f>(a: address) Data[a];
ensures ensures_of<f>(x, result);
aborts_if aborts_of<f>(x);
}
Here, Config is guaranteed unchanged everywhere, and Data may only be modified at address a. The caller can rely on both frame conditions:
spec test_mixed {
// Config is unchanged since reads_of declares it as reads-only
ensures Config[addr] == old(Config[addr]);
// Data is unchanged at all addresses except addr
ensures forall a: address where a != addr:
Data[a] == old(Data[a]);
}
Access Validation
The compiler validates that closures passed to a function do not exceed the declared access. If a closure accesses resources not listed in reads_of or modifies_of, or writes to a resource declared with reads_of, the compiler reports an error. When no modifies_of/reads_of declarations exist for a parameter, no access validation is performed — the parameter is treated as pure (see above).
Too narrow (missing resource): The reads_of declares only Counter, but the closure also reads Config:
spec apply_narrow_read {
reads_of<f> Counter;
ensures ensures_of<f>(x, result);
}
fun test_narrow_read(addr: address): u64 acquires Counter, Config {
apply_narrow_read(|a| {
// ERROR: closure accesses Config which isn't in reads_of or modifies_of
if (Config[a].active) { Counter[a].value } else { 0 }
} spec { ... }, addr)
}
The prover reports:
error: function argument accesses resource `Config`
which is not declared in `modifies_of`/`reads_of` for `f`
Writes violation: The reads_of declares read access but the closure modifies the resource:
spec apply_reads_only {
reads_of<f> Counter;
ensures ensures_of<f>(x);
}
fun test_writes_violation(addr: address) acquires Counter {
apply_reads_only(|a| write_counter(a) spec {
// ERROR: closure writes Counter but reads_of only allows reads
modifies Counter[a];
...
}, addr);
}
The prover reports:
error: function argument writes resource `Counter`
but only `reads_of` (not `modifies_of`) is declared for `f`
Parameter forwarding: When wrapping a higher-order function, the wrapper’s access declarations must not exceed the callee’s:
spec apply_counter_only {
reads_of<f> Counter;
}
fun wrapper(g: |address| u64, x: address): u64 {
// ERROR: g may access Config (per wrapper's reads_of) but apply_counter_only only allows Counter
apply_counter_only(g, x)
}
spec wrapper {
reads_of<g> Counter, Config;
}
State Labels
Motivation
Behavioral predicates like ensures_of<f>(x, result) describe a relation between the pre-state and post-state of a function call. When a function makes a single call, there is one pre-state (the function’s entry) and one post-state (the function’s exit), and these are implicit. But when a function makes multiple state-modifying calls, intermediate states arise: the post-state of the first call becomes the pre-state of the second call. State labels make these intermediate states explicit.
Abstract State
State labels in specifications represent abstract snapshots of the global memory at particular points in a function’s execution. They are not tied to concrete program counters or bytecode offsets — instead, they name logical states that are connected by specification constraints.
A specification with state labels defines a system of constraints over a sequence of abstract states. Each constraint says something about the relationship between two states (or observes a single state). The verifier treats these states as symbolic: it introduces unconstrained memory variables for each labeled state and then assumes only what the specification constraints assert about them (see Mutation Primitives below for the primary mechanism that constrains how states relate to each other).
For example, in a specification with label S:
- The entry state is the function’s pre-state (accessible via
old()) - State
Sis an intermediate abstract state - The exit state is the function’s post-state (the default)
The constraints connect these states into a chain: entry → S → exit. Each link in the chain is established by a mutation primitive or a behavioral predicate that describes how global resources change between two states.
The |~ Operator
| Syntax | Meaning |
|---|---|
S1..S2 |~ expr | Evaluate expr with pre-state S1 and post-state S2 |
..S |~ expr | Evaluate expr with the function’s entry as pre-state; name the post-state S |
S.. |~ expr | Evaluate expr with pre-state S and the function’s exit as post-state |
S |~ expr | Evaluate expr in state S (single state, no transition) |
Defining and Using State Labels
State labels appear in two roles: defining a label establishes a new abstract state, while using a label references a previously defined state. The distinction determines how the verifier introduces and constrains memory variables.
Defining a label. A label is defined when it appears as the post-state (after ..) in one of these constructs:
- Mutation primitives:
..S |~ publish<R>(addr, val),..S |~ remove<R>(addr),..S |~ update<R>(addr, val). These are the primary state-defining operations — they specify exactly how global memory changes from the pre-state to the newly defined state S. See Mutation Primitives below. - Behavioral predicates:
..S |~ ensures_of<f>(x). This defines S as the post-state of callingf, constraining it byf’s specification. - Two-state spec functions:
..S |~ counter_increased(addr). This defines S as the post-state of a two-state spec function evaluation.
Using a label. A label is used when it appears as the pre-state (before ..) or as a single-state label:
S.. |~ expr— evaluateexprstarting from state SS |~ expr— observeexprin state S (single state, no transition)S |~ global<R>(addr)or equivalentlyS |~ R[addr]— read resource R at addr in state S
Every label that is defined must also be used (no orphaned labels), and every label that is used must have been defined (no dangling references). This ensures the chain of states is well-connected.
Mutation Primitives
Mutation primitives are specification-only builtins that describe how a global resource changes between two states. They are the fundamental building blocks for constraining abstract state transitions.
| Primitive | Meaning |
|---|---|
publish<R>(addr, value) | Resource R is created at addr with value. Requires R did not exist before. |
remove<R>(addr) | Resource R is removed from addr. Requires R existed before. |
update<R>(addr, value) | Resource R at addr is replaced with value. Requires R existed before. |
Each primitive is a boolean-valued expression that constrains the relationship between a pre-state and a post-state. When used with a state label range, the primitive defines how memory transitions between those states:
ensures ..S |~ publish<Counter>(addr, Counter{value: 0});
This says: transitioning from the entry state to state S, a Counter resource with value 0 is published at addr. The implicit assertion is that Counter did not exist at addr in the entry state.
Without state labels, mutation primitives describe the transition from the function’s entry to its exit:
spec create_counter(account: &signer, init_value: u64) {
ensures publish<Counter>(signer::address_of(account), Counter{value: init_value});
}
With state labels, mutation primitives chain together to describe sequences of state changes:
spec double_update(addr: address, v1: u64, v2: u64) {
// First update: entry → S
ensures ..S |~ update<Counter>(addr, update_field(old(Counter[addr]), value, v1));
// Second update: S → exit
ensures S.. |~ update<Counter>(addr, update_field(S |~ Counter[addr], value, v2));
}
Note how the second update reads Counter[addr] in state S (via S |~ Counter[addr]) to get the value after the first update, then modifies it further.
Conditional mutations use implications to describe path-dependent state changes:
spec conditional_remove(addr: address, cond: bool) {
ensures cond ==> remove<Counter>(addr);
}
Verification semantics. Under the hood, the verifier implements mutation primitives using a havoc-and-assume pattern:
- The memory for each modified resource type is havoced (set to an unconstrained value).
- Frame conditions constrain that unmodified resource types and unmodified addresses are unchanged.
- The mutation primitive constraints are assumed, pinning the havoced memory to the specified values.
This approach is sound and decoupled from the implementation — the verifier reasons about state transitions purely through the specification constraints, without tracking bytecode offsets or instruction ordering.
Examples
Two sequential state-modifying calls. Here ..S defines state S as the post-state of the first call, and S.. uses it as the pre-state of the second. The single-state form S |~ expr observes expr in state S (e.g., for abort checks):
fun double_remove(addr1: address, addr2: address): (Resource, Resource) acquires Resource {
let r1 = remove_resource(addr1);
let r2 = remove_resource(addr2);
(r1, r2)
}
spec double_remove {
// First removal: entry state → S
ensures ..S |~ result_1 == result_of<remove_resource>(addr1);
// Second removal: S → exit state
ensures S.. |~ result_2 == result_of<remove_resource>(addr2);
// Abort of second call checked in state S (after first removal)
aborts_if S |~ aborts_of<remove_resource>(addr2);
// Abort of first call checked in entry state (implicit)
aborts_if aborts_of<remove_resource>(addr1);
}
Create then read. The single-state form S |~ expr is useful for observing intermediate state:
fun create_then_read(account: &signer, addr: address): u64 acquires Resource {
move_to(account, Resource { value: 42 });
read_resource(addr)
}
spec create_then_read {
ensures S.. |~ result == result_of<read_resource>(addr);
ensures S |~ exists<Resource>(signer::address_of(account));
ensures S |~ Resource[signer::address_of(account)] == Resource{value: 42};
aborts_if S |~ aborts_of<read_resource>(addr);
aborts_if exists<Resource>(signer::address_of(account));
}
Three or more sequential calls. The full S1..S2 form chains intermediate states:
spec three_calls {
ensures ..s1 |~ ensures_of<f>(x);
ensures s1..s2 |~ ensures_of<g>(x);
ensures s2.. |~ ensures_of<h>(x);
}
Predicate Restrictions
Not all behavioral predicates can carry both pre and post labels:
requires_ofandaborts_ofdescribe conditions in a single state. They cannot have post-state labels:
spec apply_requires_err {
ensures ..post |~ requires_of<f>(x); // ERROR: post-state label not allowed on requires_of
}
ensures_ofandresult_ofdescribe state transitions and can carry both pre and post labels.
Validation Rules
The compiler enforces three rules on state labels:
- No orphaned labels: Every post-state label defined with
..Smust be referenced by some pre-state labelS..orS..Tin the same spec block.
spec apply_orphan_post {
ensures ..orphan |~ ensures_of<f>(x, result); // ERROR: 'orphan' is never referenced
}
- No cycles: State label references must form a directed acyclic graph.
spec apply_cycle {
ensures a..b |~ ensures_of<f>(x, result);
ensures b..a |~ ensures_of<f>(x, result); // ERROR: cyclic reference a -> b -> a
}
- No self-references: A label cannot reference itself.
spec apply_self_cycle {
ensures a..a |~ ensures_of<f>(x, result); // ERROR: self-referencing label
}
Two-State Specification Functions
Defining Two-State Spec Functions
A two-state specification function is a spec fun that uses old() to reference the pre-state while also reading the current (post) state. This allows expressing transition properties that relate state before and after a function executes:
spec fun counter_increased(addr: address): bool {
old(Counter[addr].value) < Counter[addr].value
}
This spec function evaluates to true when the Counter value at addr in the current state is strictly greater than its value in the pre-state. The prover detects the use of old() and automatically provides dual memory parameters (pre-state and post-state) when translating to the verification backend.
Using Two-State Spec Functions
Two-state spec functions are used in ensures clauses to express transition properties:
fun increment_if_active(addr: address) acquires Counter, Config {
if (Config[addr].active) {
Counter[addr].value = Counter[addr].value + 1;
};
}
spec increment_if_active {
pragma opaque;
modifies Counter[addr];
ensures Config[addr].active ==> counter_increased(addr);
}
The spec function counter_increased compactly expresses that the counter went up, without repeating the old() pattern in every specification that needs to say this.
Two-state spec functions can also be used with state labels. When used with |~, the old() references resolve to the labeled pre-state:
spec two_increments {
// First increment: entry → S
ensures ..S |~ counter_increased(addr);
// Second increment: S → exit
ensures S.. |~ counter_increased(addr);
}
Here counter_increased is evaluated twice with different state pairs: first between the function’s entry and state S, then between S and the function’s exit.
Spec functions without old() can be composed with two-state spec functions:
spec fun counter_is_positive(addr: address): bool {
Counter[addr].value > 0
}
spec fun counter_ok(addr: address): bool {
counter_is_positive(addr) // transitive: reads Counter in current state
}
The prover discovers the memory footprint of spec functions transitively through the call chain, so even wrapper spec functions that don’t directly reference a resource will receive the correct memory parameters.
Two-State Spec Functions with Behavioral Predicates
Two-state spec functions work seamlessly with behavioral predicates and closures. When a closure’s inline spec uses a two-state spec function, the prover correctly threads the state labels through the behavioral predicate evaluation:
spec fun counter_increased(addr: address): bool {
old(Counter[addr].value) < Counter[addr].value
}
fun apply(f: |address|, x: address) {
f(x)
}
spec apply {
pragma opaque;
reads_of<f> Config;
modifies_of<f>(a: address) Counter[a];
ensures ensures_of<f>(x);
aborts_if aborts_of<f>(x);
}
fun test_uses_old_in_closure(addr: address) acquires Counter, Config {
apply(|a| increment_if_active(a) spec {
modifies Counter[a];
ensures Config[a].active ==> counter_increased(a);
}, addr);
}
spec test_uses_old_in_closure {
// Config is read-only, so it's unchanged
ensures Config[addr] == old(Config[addr]);
}
The prover handles the dual-state memory parameters: old() inside counter_increased resolves to the state before the closure executed, while unqualified resource references resolve to the state after the closure executed. Combined with the reads_of declaration that marks Config as reads-only and the modifies_of declaration that restricts Counter modifications to address a, the prover can establish that Config is unchanged while Counter may have been modified.
Proofs and Inference
Since language version 2.4
This chapter describes the proof toolkit available alongside automated verification: explicit proof blocks and reusable lemmas that guide the SMT solver through hard verification tasks, and a weakest-precondition based inference engine that can derive specifications from code.
Proofs and Lemmas
Overview
Some verification tasks are too hard for an SMT solver to discharge automatically. The solver may time out on non-linear arithmetic, need a case split the heuristics miss, or require an intermediate fact that bridges a gap in reasoning. MSL addresses this with two complementary features:
- Proof blocks (
proof { ... }) attached to a function specification, containing structured hints — assertions, assumptions, case splits, and calculational chains — that guide the solver step by step. - Lemma declarations (
lemma name(...) { ... }) that state reusable theorems with their own specifications and optional proof bodies. Lemmas are applied at proof sites withapplyorforall...apply.
Together, these features let developers express proof strategies that would otherwise require restructuring the code or adding ghost state.
Proof Blocks
A proof block is attached to a spec block with the proof keyword:
fun double(x: u64): u64 {
x + x
}
spec double {
aborts_if 2 * x > MAX_U64;
ensures result == 2 * x;
} proof {
assert x + x == 2 * x;
}
The proof block contains proof statements that are emitted as assumptions and assertions during verification. Statements in a proof block execute in two contexts:
- Entry context (default): evaluated at the function’s entry point, before the body runs. The variable
resultis not available. - Post context (via
post): evaluated at the function’s return point, after the body runs. Bothresultandold()are available.
Proof blocks are local to the specification they are attached to. They do not change the executable Move code; they only influence verification by adding auxiliary verification conditions and assumptions.
Proof Statement Summary
The following table summarizes the proof statements currently supported:
| Statement | Context | Effect |
|---|---|---|
assert e; | entry, post | Prove e as a separate verification condition |
assume [trusted] e; | entry, post | Inject e as a trusted assumption; emits a warning |
let x = e; | entry, post | Bind a local proof name for later statements in the same scope |
if (c) { ... } else { ... } | entry, post | Split the proof into cases under the corresponding path conditions |
post stmt / post { ... } | entry only | Move the enclosed statement(s) to return-point checking |
calc(e1 == e2 <= e3 ...); | entry, post | Emit one verification condition per chain step |
split e; | entry, post | Create separate verification variants for boolean or enum cases |
apply lemma(args); | entry, post | Assert lemma preconditions and assume lemma postconditions |
forall ... apply lemma(args); | entry, post | Introduce a quantified lemma instantiation, optionally with triggers |
As a rule of thumb:
- Use
assertwhen the solver is missing an intermediate fact. - Use
calcwhen a proof is primarily algebraic rewriting. - Use
iforsplitwhen the prover needs explicit case analysis. - Use
applywhen you want to reuse a previously established theorem.
assert
An assert in a proof block emits a verification condition — the solver must prove it holds. Assertions serve as intermediate lemmas that break a hard proof into smaller steps:
fun weighted_avg_x2(x: u64, y: u64): u64 {
(3 * x + y) / 4 * 2
}
spec weighted_avg_x2 {
requires 3 * x + y <= MAX_U64;
ensures result == (3 * x + y) / 4 * 2;
ensures result <= 3 * x + y;
} proof {
let wx = 3 * x;
let sum = wx + y;
let half = sum / 4;
assert half <= sum;
assert half * 2 <= sum;
}
Each assert establishes a fact that helps the solver reach the postconditions step by step.
assume [trusted]
An assume [trusted] introduces a fact without proof. This is an escape hatch for properties the SMT solver cannot derive on its own. Trusted assumptions are unsound if wrong — use them sparingly and only for well-understood mathematical facts:
fun div3_le(x: u64): u64 { x / 3 }
spec div3_le {
ensures result <= x;
} proof {
assume [trusted] x / 3 <= x;
}
The [trusted] annotation is required. An unannotated assume is rejected so that trusted assumptions are always explicit in the source.
let Bindings
A let in a proof block names an intermediate value for use in subsequent statements. Let bindings are scoped to their enclosing block:
fun square_plus_one(x: u64): u64 {
(x + 1) * (x + 1)
}
spec square_plus_one {
requires x + 1 <= 4294967295;
ensures result == (x + 1) * (x + 1);
} proof {
let y = x + 1;
let r = y * y;
assert r == (x + 1) * (x + 1);
post assert r == result;
}
Let bindings make complex proofs readable by giving names to subexpressions.
- A binding introduced at entry can be used by later entry statements and by later
poststatements. - A binding introduced inside a nested block is scoped to that block.
- A binding introduced inside
post { ... }is available only inside that post block.
if/else Case Splits
An if/else in a proof block splits the verification into branches. Each branch adds its condition as an assumption, letting the solver reason about cases independently:
fun max(a: u64, b: u64): u64 {
if (a >= b) { a } else { b }
}
spec max {
ensures result >= a;
ensures result >= b;
ensures result == a || result == b;
} proof {
if (a >= b) {
post assert result == a;
assert a >= a;
assert a >= b;
} else {
post assert result == b;
assert b > a;
assert b >= b;
}
}
post Statements
The post prefix moves a statement to the return-point context, where result and old() are available. Without post, statements execute at the entry point where result is not yet defined:
fun double(x: u64): u64 {
x + x
}
spec double {
requires x + x <= MAX_U64;
ensures result == 2 * x;
} proof {
// Entry-point assertion (no result available)
assert x + x == 2 * x;
// Return-point assertion (result available)
post assert result == x + x;
}
A post block groups multiple post-context statements together:
fun shift_add(x: u64, y: u64): u64 {
x * 2 + y
}
spec shift_add {
requires x * 2 + y <= MAX_U64;
ensures result == x * 2 + y;
} proof {
let doubled = x * 2;
assert doubled + y <= MAX_U64;
post {
let expected = doubled + y;
assert result == expected;
}
}
Let bindings defined at entry are available inside post blocks. Let bindings inside a post block are scoped to that block.
post is intended for function proofs. Because lemmas have no return value, post statements are not meaningful inside lemma proofs.
calc Chains
A calc(...) statement expresses a step-by-step chain of equalities or inequalities. Each step is a separate verification condition, and the chain’s conclusion follows by transitivity:
fun add_three(x: u64): u64 {
x + 1 + 1 + 1
}
spec add_three {
requires x + 3 <= MAX_U64;
ensures result == x + 3;
} proof {
calc(
x + 1 + 1 + 1
== x + 2 + 1
== x + 3
);
}
Calc chains support mixed operators (==, <=, >=). The overall relation is the weakest one in the chain:
fun double_plus_one(x: u64): u64 {
2 * x + 1
}
spec double_plus_one {
requires 2 * x + 1 <= MAX_U64;
ensures result >= x;
} proof {
calc(
2 * x + 1
>= 2 * x
>= x
);
}
If any step in the chain is wrong, the prover reports an error at that specific step.
split
The split statement generates separate verification variants for each possible value of an expression. For a boolean expression, this creates two variants (true/false). For an enum, it creates one variant per constructor:
fun abs_diff(a: u64, b: u64): u64 {
if (a >= b) { a - b } else { b - a }
}
spec abs_diff {
ensures result == if (a >= b) { a - b } else { b - a };
} proof {
split a >= b;
}
Splitting on an enum:
enum Color has drop {
Red,
Green,
Blue,
}
fun color_code(c: Color): u64 {
match (c) {
Color::Red => 1,
Color::Green => 2,
Color::Blue => 3,
}
}
spec color_code {
ensures result >= 1;
ensures result <= 3;
} proof {
split c;
}
Each variant assumes the corresponding case and must independently satisfy all postconditions. If the postcondition is too strong for any variant, the prover reports an error for that variant.
Practical notes:
- The split expression must have type
boolor an enum type. - Multiple
splitstatements multiply the number of verification variants, so they should be used sparingly. splitis most useful when the function body already branches on the same condition or enum and the solver is failing to connect the cases.
Lemma Declarations
A lemma is a reusable theorem declared with spec lemma. It has a name, typed parameters, specification conditions (requires/ensures), and an optional proof body. Lemmas are specification-only declarations: they are not executable Move functions, and their result type is implicitly (). Without a proof body, the lemma is discharged as a verification condition — the prover must prove it holds for all inputs satisfying the preconditions. With a proof body, the proof block provides hints to guide the solver.
Here is a lemma proving that a recursive sum function is monotone. The proof is inductive — it applies itself on a smaller argument:
spec fun sum(n: num): num {
if (n == 0) { 0 } else { n + sum(n - 1) }
}
spec lemma monotonicity(x: num, y: num) {
requires 0 <= x;
requires x <= y;
ensures sum(x) <= sum(y);
} proof {
if (x < y) {
assert sum(y - 1) <= sum(y);
apply monotonicity(x, y - 1);
}
}
The base case (x == y) is trivial. The inductive step assumes x < y, asserts a one-step fact about sum, and recurses on (x, y - 1). The prover verifies both cases.
apply and forall...apply
The apply statement instantiates a lemma at a proof site. Operationally, it does two things:
- It emits proof obligations for the lemma’s
requiresclauses at the application site. - It makes the lemma’s
ensuresclauses available to the remainder of the current proof.
Multiple apply statements can be chained — each one’s conclusions are available to subsequent steps. If a lemma’s preconditions are not satisfied, the prover reports an error at the apply site.
The forall...apply variant instantiates a lemma universally for all values of the quantified variables. This is essential when the lemma needs to be available across all iterations of a loop or for a recursive function. Using the monotonicity lemma from above:
fun sum_up_to(n: u64): u64 {
if (n == 0) { 0 }
else { n + sum_up_to(n - 1) }
}
spec sum_up_to {
aborts_if sum(n) > MAX_U64;
ensures result == sum(n);
} proof {
forall x: num, y: num {sum(x), sum(y)} apply monotonicity(x, y);
}
The {sum(x), sum(y)} clause provides triggers — patterns that tell the SMT solver when to instantiate the quantified lemma. The solver will instantiate monotonicity(x, y) whenever it encounters terms matching sum(x) and sum(y). Without triggers, the solver may fail to instantiate the quantified lemma at the right points.
In practice:
- Prefer a plain
applywhen you need a theorem only for the current concrete arguments. - Use
forall...applywhen the proof needs a quantified fact that must be available at many later uses. - Add triggers when the quantified lemma mentions recursive spec functions or other terms the solver is unlikely to instantiate on its own.
Proofs with &mut Parameters
Proof blocks work with functions that take mutable reference parameters. In the entry context, &mut parameters refer to their original (pre-mutation) values. In the post context, old() accesses the pre-mutation value and the bare name accesses the post-mutation value:
struct Counter has drop {
value: u64,
}
fun increment(c: &mut Counter) {
c.value = c.value + 1;
}
spec increment {
requires c.value < MAX_U64;
ensures c.value == old(c.value) + 1;
} proof {
// Entry context: c.value is the original value
assert c.value < MAX_U64;
assert c.value + 1 <= MAX_U64;
}
Post-context statements can use old() to relate pre and post states, and result for return values:
fun add_and_return(c: &mut Counter, n: u64): u64 {
c.value = c.value + n;
c.value
}
spec add_and_return {
requires c.value + n <= MAX_U64;
ensures c.value == old(c.value) + n;
ensures result == c.value;
} proof {
assert c.value + n <= MAX_U64;
post assert c.value == old(c.value) + n;
post assert result == c.value;
}
Lemmas can be applied at post points with old() arguments to relate pre and post state:
spec lemma strict_increase(a: u64, b: u64) {
requires b == a + 1;
ensures a < b;
}
fun bump(c: &mut Counter) {
c.value = c.value + 1;
}
spec bump {
requires c.value < MAX_U64;
ensures c.value == old(c.value) + 1;
ensures old(c.value) < c.value;
} proof {
post apply strict_increase(old(c.value), c.value);
}
Lemma Shortcut Syntax
Lemmas can also be declared inside a spec module { ... } block using bare lemma (without the spec prefix). This is equivalent to top-level spec lemma and is useful when grouping multiple lemmas together:
spec module {
lemma add_zero_left(x: u64) {
ensures 0 + x == x;
}
lemma mul_comm(a: u64, b: u64) {
ensures a * b == b * a;
}
}
Note that if a function is literally named lemma, spec lemma { ... } (with { immediately after lemma) is parsed as the function’s spec block, not a lemma declaration, since the parser looks for an identifier after lemma to distinguish the two forms.
Specification Inference
With these constructs, the Move Prover now includes a specification inference engine that can automatically derive specifications for functions. This is a key ingredient for scaling formal verification: rather than requiring developers to manually annotate every function, the prover can infer many specifications automatically.
Weakest-Precondition Approach
The inference engine uses a weakest-precondition (WP) backward analysis over the function’s bytecode. Starting from the function’s exit point, it works backward through each instruction, accumulating the conditions that must hold for the function to satisfy its specification. For each state-changing operation (global writes, function calls, aborts), the analysis emits an appropriate specification condition:
- Direct mutations (e.g.,
Counter[addr].value = v) produceensuresconditions that relate the final state to the initial state usingupdate_field. - Opaque function calls produce behavioral predicate conditions (
ensures_of,aborts_of) that delegate to the callee’s specification. - Abort points produce
aborts_ifconditions. - Frame conditions (
modifies) are inferred from the set of global resources written by the function.
When multiple state-changing operations occur in sequence, the inference engine introduces state labels to distinguish intermediate states, producing a chain of constraints (e.g., ..S |~ ensures_of<f>(a) followed by S.. |~ ensures_of<g>(b)).
Loops and Invariants
The WP analysis requires that each loop in the function body has an explicit loop invariant. Without invariants, the analysis cannot reason across loop iterations and will produce vacuous (trivially true) specifications that are unsound for verification.
If a function contains loops without invariants, the inference engine will still produce output, but the inferred specifications should be treated as incomplete. For correct results, loop invariants must be provided by the developer (or AI – see below) before inference can derive meaningful specifications.
Integration with AI-Based Inference
The WP-based inference engine is designed to complement AI-based specification inference, specifically for loop invariants, as provided by the MoveFlow tool. The two approaches have complementary strengths:
- WP inference is precise and sound for straight-line code with opaque calls and mutations, but requires human-provided loop invariants and cannot guess high-level intent.
- AI-based inference can suggest loop invariants, high-level properties, and specifications for functions where WP analysis alone is insufficient.
A typical workflow combines both: AI-based tools propose candidate specifications (including loop invariants), and the WP engine fills in the precise arithmetic and frame conditions. The result is then verified by the Move Prover to ensure soundness.
CLI Overview
The aptos command-line tool ships every developer-facing utility for working with Move on Aptos. Compiling, testing, publishing, calling functions, debugging — they all live under aptos move.
This chapter covers the flags that appear across many aptos move subcommands. The chapters that follow describe the individual subcommands and only call out the flags that are specific to each.
For the authoritative list of flags on any subcommand, run:
aptos move <subcommand> --help
A typical Move project flow
Most developers move through these subcommands in roughly this order:
aptos move init— scaffold a new package.aptos move compile— compile sources to bytecode.aptos move test— run unit tests; add--coverageto record line coverage.aptos move lintandaptos move fmt— style and quality gates before commit.aptos move publish(ordeploy-objectfor code objects) — push to a network.aptos move run,view, orsimulate— invoke the published code.
Package options
The flags below come from MovePackageOptions and are accepted by most package-related subcommands: compile, compile-script, test, lint, fmt, prove, document, clean, publish, deploy-object, upgrade-object, verify-package, disassemble, and decompile.
| Flag | Meaning |
|---|---|
--package-dir <PATH> | Root of the Move package (the directory containing Move.toml). Defaults to the current directory. |
--output-dir <PATH> | Where to write build artifacts. Defaults to <package-dir>/build. |
--named-addresses <NAME=ADDR,...> | Bind named addresses declared in Move.toml. Example: --named-addresses alice=0x1234,bob=0x5678. |
--dev | Use [dev-addresses] and [dev-dependencies] from Move.toml. Implied during test. |
--override-std <NETWORK> | Pin the standard library version to a specific network: mainnet, testnet, or devnet. Useful when third-party dependencies disagree on framework versions. |
--skip-fetch-latest-git-deps | Don’t refresh git dependencies. Lets the build proceed offline. |
--language-version <X> | Target Move language version (e.g., 2.4). Defaults to the latest stable. |
--compiler-version <X> | Target compiler version. Must be at least 2. Defaults to the latest stable. |
--bytecode-version <N> | Target bytecode version. Inferred from --language-version if omitted. |
--skip-attribute-checks | Don’t error on unknown #[...] attributes in source. |
Transaction options
The flags below are accepted by every subcommand that submits a transaction: publish, deploy-object, upgrade-object, run, run-script, view, simulate.
| Flag | Meaning |
|---|---|
--profile <NAME> | Use a named profile from ~/.aptos/config.yaml (account address, key, network URL). Profiles are created with aptos init. |
--url <URL> | Override the REST endpoint from the profile. |
--sender-account <ADDR> | Override the sender address (useful when the authentication key has been rotated). |
--max-gas <N> | Cap the transaction’s gas. |
--gas-unit-price <N> | Set the gas unit price in Octa. |
--assume-yes / -y | Skip interactive confirmations. |
--local | Simulate the transaction locally instead of submitting it. |
--profile-gas | Locally simulate and emit a gas-usage flamegraph. |
Output and exit code
aptos move emits JSON to stdout on success and a non-zero exit code on failure. Most subcommands accept the standard Aptos CLI flags --output-yaml (human-readable YAML) and --output-json (default).
Develop
Subcommands used during local development: scaffolding, building, testing, formatting, and inspecting bytecode. Most accept the shared package options; only command-specific flags are listed below.
aptos move init
Scaffold a new Move package: creates Move.toml, an empty sources/ directory, and a tests/ directory.
aptos move init --name my_package
aptos move init --name my_package --template hello-blockchain
| Flag | Meaning |
|---|---|
--name <NAME> | Package name (required). |
--template <TEMPLATE> | Pre-populate with a template, e.g., hello-blockchain. |
--package-dir <PATH> | Where to create the package. Defaults to the current directory. |
--named-addresses <NAME=ADDR,...> | Pre-fill named addresses in Move.toml. Use _ as a placeholder for unassigned addresses. |
See also: Create Package, Start a Move package from a template.
aptos move compile (alias: build)
Compile a Move package to bytecode, writing artifacts under <package-dir>/build/.
aptos move compile
aptos move compile --named-addresses example=0x42 --save-metadata
| Flag | Meaning |
|---|---|
--save-metadata | Also write package metadata to build/. Required when constructing publish payloads manually. |
--included-artifacts <none|sparse|all> | Which artifacts to embed. none = bytecode only; sparse (default) = enough to reconstruct sources; all = everything. Drives publishing gas cost. |
--fetch-deps-only | Resolve and fetch dependencies, but skip the actual compile. |
See also: Compiling (Move).
aptos move compile-script (alias: build-script)
Compile a single script { ... } source file into a transaction script blob and report its hash.
aptos move compile-script --package-dir my_script_pkg
The package must contain exactly one script source. Use the resulting .mv with aptos move run-script.
See also: Compiling Move Scripts.
aptos move test
Run all functions annotated with #[test] in the package. Test code under tests/ and inside #[test_only] modules is included automatically.
aptos move test
aptos move test --filter coin # only tests whose name contains "coin"
aptos move test --coverage # record line coverage to .coverage_map.mvcov
aptos move test --fail-fast # stop after first failing test
| Flag | Meaning |
|---|---|
--filter <STR> / -f <STR> | Run only tests whose fully-qualified name contains STR. |
--coverage | Record bytecode coverage. Pair with aptos move coverage. |
--instructions <N> / -i <N> | Maximum instructions per test (default 100000). |
--ignore-compile-warnings | Don’t fail if the build emits warnings. |
--dump | Dump storage state on failure. |
--fail-fast | Abort on first failure. |
aptos move coverage
Inspect coverage data recorded by test --coverage. Three subcommands:
aptos move coverage summary # per-module coverage percentage
aptos move coverage summary --summarize-functions
aptos move coverage source --module my_module
aptos move coverage bytecode --module my_module
| Subcommand | Output |
|---|---|
summary | Per-module coverage. --csv switches to CSV; --summarize-functions adds per-function detail. |
source | Annotates Move source with coverage indicators. |
bytecode | Annotates a disassembled module with coverage indicators. |
aptos move prove
Run the Move Prover against the package’s spec blocks.
The prover relies on two external binaries — boogie and z3 — which the CLI doesn’t bundle. Install (or update) them once before running prove:
aptos update prover-dependencies
Then:
aptos move prove
aptos move prove --filter Counter --vc-timeout 60
| Flag | Meaning |
|---|---|
--filter <STR> / -f <STR> | Limit verification to modules whose file name matches. |
--only <FN> / -o <FN> | Verify only the named function (e.g., mod::increment or just increment). |
--verbosity <LEVEL> / -v | Diagnostic verbosity: error, warn, info, debug. |
--proc-cores <N> | Parallelism for verification conditions. |
--vc-timeout <SECS> | Per-function SMT solver timeout (soft). |
--random-seed <N> | Pin the prover’s random seed . |
--check-inconsistency | Smoke-check that specs aren’t contradicting themselves. |
--dump | Dump intermediate step results (bytecode, generated SMT, Z3 trace, …) to files alongside the package. Useful when debugging a verification failure. |
aptos move lint
Run the Move linter, which surfaces stylistic and correctness warnings beyond what the compiler itself reports.
aptos move lint
aptos move lint --checks strict
aptos move lint --checks "strict,-needless_visibility,cyclomatic_complexity"
aptos move lint --list-checks # show every available lint, grouped by tier
| Flag | Meaning |
|---|---|
--checks <SPEC> | Comma-separated list of tiers (default, strict, experimental, all) and individual lints. Prefix a name with - to exclude it. |
--list-checks | Print all available lints grouped by tier, then exit. |
See also: Aptos Move Lint.
aptos move fmt
Format Move source files in place using movefmt.
movefmt is a separate binary that the CLI doesn’t bundle. Install (or update) it once before running fmt:
aptos update movefmt
Then:
aptos move fmt # rewrite files in place
aptos move fmt --emit-mode diff # show a diff instead
aptos move fmt --emit-mode std-out # print to stdout
aptos move fmt --file-path src/foo.move src/bar.move
| Flag | Meaning |
|---|---|
--emit-mode <MODE> | One of overwrite (default), new-file, std-out, diff. |
--package-dir <PATH> | Format every .move file in the package. Mutually exclusive with --file-path. |
--file-path <PATH>... | Format a specific list of files. |
--config-path <PATH> | Use a specific movefmt.toml instead of searching. |
--config <KEY=VAL,...> | Override individual config entries from the command line. |
See also: Formatting Move Contracts.
aptos move document (alias: doc)
Generate Markdown documentation from /// doc-comments and spec blocks. Output lands in <package-dir>/build/<package>/doc/.
aptos move document
aptos move document --include-impl
| Flag | Meaning |
|---|---|
--include-impl | Include function implementations in the rendered docs (otherwise they’re collapsed to signatures). |
--landing-page-template <PATH> | Use a custom landing-page template. |
aptos move clean
Remove the build/ directory and other derived artifacts from a package. Prompts before deletion unless --assume-yes is set.
aptos move clean
aptos move clean --assume-yes
aptos move disassemble
Render Move bytecode as readable assembly (.mv.masm). Useful for inspecting downloaded packages or build output. Exactly one of --package-dir or --bytecode-path must be provided.
# A directory of .mv files (e.g., from `aptos move download --bytecode`)
aptos move disassemble --package-dir MyPkg/bytecode_modules
# A single .mv file
aptos move disassemble --bytecode-path build/MyPkg/bytecode_modules/my_module.mv
| Flag | Meaning |
|---|---|
--package-dir <PATH> | Process every .mv in the directory. |
--bytecode-path <PATH> | Process a single .mv file. |
--is-script | Treat the input as a transaction script rather than a module. |
--code-coverage-path <PATH> | Annotate the output with coverage from a .mvcov file. |
--print-metadata-only | Print only the bytecode/metadata version, then exit (with --bytecode-path). |
aptos move decompile
Decompile bytecode toward Move source (.mv.move). Same input shape as disassemble. The output is a best-effort approximation of the original source — useful for understanding on-chain code whose source isn’t available.
aptos move decompile --package-dir MyPkg/bytecode_modules
aptos move decompile --bytecode-path some_module.mv
Publish
Subcommands that publish a Move package to a network. All of them accept the shared package options and shared transaction options; only the command-specific flags are listed below.
Picking a publication pattern
Two patterns are supported side by side; pick based on how you want the package’s address to behave:
- Account publishing (
publish/deploy): the modules live at the signer’s account address. Simplest pattern. Upgrades happen by re-publishing from the same account. The signer owns upgrade authority and can’t transfer it. - Code-object publishing (
deploy-object/upgrade-object): the modules live at a separate, derived object address. Upgrade authority is held in a code object and can be transferred. Use this when modules need an address independent of any single account.
For code review and reproducibility, verify-package checks that on-chain bytecode matches a local source tree.
aptos move publish (alias: deploy)
Publish a package to the signer’s account.
aptos move publish --profile devnet
aptos move publish --named-addresses example=0x42 --included-artifacts sparse
| Flag | Meaning |
|---|---|
--included-artifacts <none|sparse|all> | What to embed in the on-chain package metadata (drives gas cost). Default sparse. |
--override-size-check | Skip the local size pre-check. Doesn’t bypass on-chain size limits. |
--chunked-publish | Publish in chunks via the large_packages framework module. Use for packages exceeding the single-transaction size limit. |
--chunk-size <BYTES> | Override chunk size for chunked publishing. |
Re-publishing this command upgrades the package in place, subject to the package upgrade rules.
See also: Working With Move Contracts, Package Upgrades.
aptos move deploy-object
Publish the package as a code object at a freshly derived object address. The chosen named address (passed by --address-name) is auto-bound to that object’s address before compile.
aptos move deploy-object \
--address-name example \
--profile devnet
| Flag | Meaning |
|---|---|
--address-name <NAME> | The named address in Move.toml whose binding will be set to the new object’s address. |
--included-artifacts, --override-size-check, --chunked-publish, --chunk-size | Same as publish. |
See also: Object Code Deployment, Package Upgrades.
aptos move upgrade-object
Upgrade a package previously published with deploy-object. The original --address-name is rebound to the existing object address (passed via --object-address) so the rebuild produces the same module ids. The new bytecode must satisfy the package upgrade rules against the version currently on-chain.
aptos move upgrade-object \
--address-name example \
--object-address 0xABC...123 \
--profile devnet
| Flag | Meaning |
|---|---|
--address-name <NAME> | Same named address used at deploy time. |
--object-address <ADDR> | Address of the existing code object. |
--included-artifacts, --override-size-check, --chunked-publish, --chunk-size | Same as publish. |
See also: Object Code Deployment, Package Upgrades.
aptos move verify-package
Build the package locally and verify that the on-chain copy matches.
aptos move verify-package --account 0xABC...123
| Flag | Meaning |
|---|---|
--account <ADDR> | Address of the on-chain package to verify against. |
--included-artifacts <none|sparse|all> | Match what was used at publish time. |
A package published with upgrade_policy = "arbitrary" cannot be verified — its content can change at any time, so the verifier refuses to depend on it.
aptos move build-publish-payload
Compile the package and write a serialized publish-transaction payload to a JSON file. Used for offline signing, governance proposals, and chunked-publish workflows.
aptos move build-publish-payload \
--json-output-file payload.json \
--included-artifacts sparse
| Flag | Meaning |
|---|---|
--json-output-file <PATH> | Where to write the payload JSON. |
Plus all publish flags. |
The resulting JSON can be submitted later with aptos governance or signed offline.
aptos move clear-staging-area
Remove the staging-area resource left on-chain by an aborted chunked publish. Run this when a --chunked-publish flow fails partway and you want to start over.
aptos move clear-staging-area --profile devnet
No command-specific flags beyond the transaction options.
Run
Subcommands for invoking already-published code on-chain or against a local simulator. Most of them accept the shared transaction options; only command-specific flags are listed below.
aptos move run
Call an entry function as a transaction.
aptos move run \
--function-id 0x42::counter::increment \
--args address:0xABC u64:1 \
--profile devnet
| Flag | Meaning |
|---|---|
--function-id <ADDR::MOD::FN> | Fully qualified entry function name. |
--type-args <TYPE>... | Type arguments separated by spaces, e.g., --type-args 0x1::aptos_coin::AptosCoin. |
--args <TYPED-ARG>... | Arguments as <TYPE>:<VALUE> pairs, separated by spaces. Supported types: address, bool, hex, string, u8, u16, u32, u64, u128, u256, raw. Vectors use JSON array syntax: 'u64:[1,2,3]'. |
--json-file <PATH> | Read function id, type args, and args from a JSON file instead of the command line. |
aptos move run-script
Run a transaction script. Either pass a precompiled .mv (--compiled-script-path) or a source file the CLI will compile first (--script-path, or via a script package’s --package-dir).
# Compile + run a script package
aptos move run-script \
--package-dir my_script_pkg \
--args u64:42
# Run a precompiled script
aptos move run-script \
--compiled-script-path build/MyPkg/bytecode_scripts/my_script.mv \
--args u64:42
| Flag | Meaning |
|---|---|
--script-path <PATH> | Path to a .move script source. The CLI compiles it before submitting. |
--compiled-script-path <PATH> | Path to a pre-compiled .mv script. |
--package-dir <PATH> | Compile a script package, then run it. |
--args <TYPED-ARG>... / --type-args <TYPE>... | Same shape as aptos move run. |
See also: Running Move Scripts.
aptos move view
Call a #[view] function. View functions don’t change state and don’t submit a transaction; the result is read directly from the fullnode.
aptos move view \
--function-id 0x42::counter::get_count \
--args address:0xABC \
--profile devnet
Same arg/type-arg shape as aptos move run. The output is a JSON array of return values.
aptos move simulate
Simulate a transaction without committing it. Useful for estimating gas, checking aborts, and previewing effects.
aptos move simulate \
--function-id 0x42::counter::increment \
--args address:0xABC u64:1 \
--profile devnet
aptos move simulate \
--function-id 0x42::counter::increment \
--args address:0xABC u64:1 \
--local # local VM instead of remote simulation
| Flag | Meaning |
|---|---|
--local | Simulate in a local VM (using the latest state pulled from the network), instead of asking the fullnode to simulate. |
Plus the same --function-id / --type-args / --args shape as run. |
aptos move replay
Re-execute a historical transaction in a local VM. Lets you reproduce, benchmark, and gas-profile committed transactions.
aptos move replay --network mainnet --txn-id 12345678
aptos move replay --network testnet --txn-id 87654321 --profile-gas
| Flag | Meaning |
|---|---|
--network <NET> | One of mainnet, testnet, devnet, or a <URL> to a fullnode. |
--txn-id <N> | Transaction “version” (the monotonically increasing sequence; sometimes called the txn id). |
--benchmark | Time the replay and report wall-clock numbers. |
--profile-gas | Generate a gas-usage report from the replay. |
--fold-unique-stack | Fold call graphs by stack trace in the gas report (smaller output). Requires --profile-gas. |
See also: Replaying Past Transactions.
aptos move list
List on-chain packages owned by an account.
aptos move list --account 0xABC...123 --profile devnet
| Flag | Meaning |
|---|---|
--account <ADDR> | Address whose packages to list. |
--query <packages> | Currently only packages is supported. |
The output enumerates each package with its upgrade policy, upgrade number, source digest, and constituent module names.
aptos move download
Download a published package’s source (or bytecode) from a network into a local directory. Pair with disassemble or decompile for inspection.
aptos move download \
--account 0xABC...123 \
--package MyPkg \
--output-dir ./downloads \
--profile mainnet
# Bytecode-only download (use with disassemble/decompile)
aptos move download --account 0xABC --package MyPkg --bytecode
| Flag | Meaning |
|---|---|
--account <ADDR> | Account that hosts the package. |
--package <NAME> | Package name as registered on-chain. |
--output-dir <PATH> | Where to write the package. Defaults to the current directory. |
--bytecode / -b | Also download the compiled .mv files (not just sources). |
--print-metadata | Print the package’s on-chain metadata before saving. |
A package published with upgrade_policy = "arbitrary" cannot be downloaded — depending on it isn’t safe.
Libraries
Aptos provides multiple useful libraries for developers. The complete up-to-date docs can be found here.
Move Coding Conventions
This section lays out some basic coding conventions for Move that the Move team has found helpful. These are only recommendations, and you should feel free to use other formatting guidelines and conventions if you have a preference for them.
Naming
- Module names: should be lowercase snake case, e.g.,
fixed_point32,vector. - Type names: should be camel case if they are not a native type, e.g.,
Coin,RoleId. - Function names: should be lowercase snake case, e.g.,
destroy_empty. - Constant names: should be upper camel case and begin with an
Eif they represent error codes (e.g.,EIndexOutOfBounds) and upper snake case if they represent a non-error value (e.g.,MIN_STAKE). - Generic type names: should be descriptive, or anti-descriptive where appropriate, e.g.,
TorElementfor the Vector generic type parameter. Most of the time the “main” type in a module should be the same name as the module e.g.,option::Option,fixed_point32::FixedPoint32. - Module file names: should be the same as the module name e.g.,
option.move. - Script file names: should be lowercase snake case and should match the name of the “main” function in the script.
- Mixed file names: If the file contains multiple modules and/or scripts, the file name should be lowercase snake case, where the name does not match any particular module/script inside.
Imports
- All module
usestatements should be at the top of the module. - Functions should be imported and used fully qualified from the module in which they are declared, and not imported at the top level.
- Types should be imported at the top-level. Where there are name clashes,
asshould be used to rename the type locally as appropriate.
For example, if there is a module:
module 0x1::foo {
struct Foo { }
const CONST_FOO: u64 = 0;
public fun do_foo(): Foo { Foo{} }
// ...
}
this would be imported and used as:
module 0x1::bar {
use 0x1::foo::{Self, Foo};
public fun do_bar(x: u64): Foo {
if (x == 10) {
foo::do_foo()
} else {
abort 0
}
}
// ...
}
And, if there is a local name-clash when importing two modules:
module 0x1::other_foo {
struct Foo {}
// ...
}
module 0x1::importer {
use 0x1::other_foo::Foo as OtherFoo;
use 0x1::foo::Foo;
// ...
}
Comments
- Each module, struct, and public function declaration should be commented.
- Move has doc comments
///, regular single-line comments//, block comments/* */, and block doc comments/** */. - Starting Aptos CLI 7.4.0, UTF-8 characters are allowed in comments.
Comments Example
Doc comments must be directly above the item they are commenting on. For example, the following is valid:
/// My awesome module, doc comment can be used here
module 0x42::example { // double slash can be anywhere
// Double slash can be anywhere
/// My awesome constant
const MY_VALUE: u64 = 5;
/// My awesome error message
const E_MY_ERROR: u64 = 10;
#[view]
/// My awesome view function
fun show_me_the_money() {
// ...
}
/* Similarly block comments can be anywhere */
}
Below are examples of doc comments /// that will fail:
module 0x42::example {
/// My awesome view function <- must be below the annotation, right above the thing commented
#[view]
fun show_me_the_money() {
// ...
/// Within a function
}
/// Not attached to anything
}
Formatting
The Move team plans to write an auto-formatter to enforce formatting conventions. However, in the meantime:
- Four space indentation should be used except for
scriptandaddressblocks whose contents should not be indented. - Lines should be broken if they are longer than 100 characters.
- Structs and constants should be declared before all functions in a module.
Language Versions
The Move 2 language releases are described on this page. The reference documentation of the new features is integrated into the book, and marked in the text with “Since language version 2.n”.
Move 2.4
The Move 2.4 language release adds the following features to Move:
- Struct and Enum Visibility Modifiers: Structs and enums can now be declared with
public,package, orfriendvisibility modifiers. This allows external modules to construct, destruct, pattern-match, and access or modify fields of the type, lifting the previous restriction that limited all such operations to the defining module. See the reference docs for structs and enums. - Compositional Specifications for the Move Prover: The Move Specification Language gains a set of compositional constructs supporting higher-order functions, frame conditions, intermediate-state reasoning, and proof guidance. See the reference docs for Behavioral Predicates, Access Specifiers and Frame Conditions, State Labels, Two-State Specification Functions, Proofs and Lemmas, and Specification Inference.
Move 2.3
The Move 2.3 language release adds the following features to Move:
- Signed Integer Types: Move now supports
i8,i16,i32,i64,i128, andi256signed integer types. See the reference doc here. - Builtin Constants: Move now supports a number of builtin constants, namely min/max values for integer types (e.g.
MAX_U64,MIN_I32), as well as a constant to determine whether code is running in testing mode. See the reference doc here.
Move 2.2
The Move 2.2 language release adds the following features to Move:
- Optional Acquires: The
acquiresannotation on function declarations can be omitted, to be inferred by the compiler. - Function Values: Move now supports function values, which can be passed around as parameters and stored in resources. See the reference doc here.
- Comparison Operations: Move now supports comparison operations (
<,>,<=,>=) on all types. See the reference doc here.
Move 2.1
The Move 2.1 language release adds the following features to Move:
-
Compound Assignments: One can now use
x += n,x -= n, etc. to combine assignments and arithmetic operations. See the reference doc here for the supported operations. -
Loop Labels: One can now use labels for loops and have a
breakorcontinueexpression refer to those labels. This makes it possible to continue or break outer loops from within nested loops. See the reference doc here. -
Underscore function parameters are wildcards, not symbols: Function parameters named
_no longer act like variables: they do not bind a value, and multiple such parameters to a function do not cause a conflict. Using_in a value expression will yield an error, as it has no value. This makes the behavior of_more like the wildcard it is in patterns andletexpressions, where it does not bind a value.
Move 2.0
The Move 2.0 language release adds the following features to Move:
-
Enum Types: add the option to define different variants of data layout in one storable type. They are documented in the Enum Type section.
-
Receiver Style Functions: add the ability to call functions in the familiar notation
value.func(arg). They are documented in this section. -
Index Notation: allows access to elements of vectors and of resource storage with notations like
&mut vector[index]or&mut Resource[addr]. -
Positional Structs: allow defining wrapper types such as
struct Wrapped(u64). Positional structs are described here. Enum variants can also be positional. -
Dot-dot pattern wildcards: enable statements like
let Struct{x, ..} = valueto match selective parts of data. They are described here. These patterns are also allowed for enum variants. -
Package visibility: allows declaring a function to be visible anywhere inside, but not outside, a package. Friend functions continue to be supported, although package visibility is in many cases more suitable. As a more concise notation, package and friend functions can be declared as
package funorfriend fun, respectively, instead of the longerpublic(package) funandpublic(friend) fun. This feature is documented here. -
Assert abort code optional: The
assert!macro can now be used with just one argument, omitting the abort code, in which case a default code will be chosen. See here. -
New Cast Syntax: Until now, casts always had to be in parentheses, requiring code like
function((x as u256)). This requirement is now dropped and casts can be top-level expressions without parentheses, as infunction(x as u256). One still needs to write(x as u64) + (y as u64)in expressions. This similarly applies to the new enum variant test,data is VersionedData::V1. -
Well-defined evaluation order: The evaluation order in the cases below is now well-defined (these were previously unspecified):
- The (a) arguments to a function call and the (b) operand expressions in a binary operation are both evaluated from left to right.
- Given a “mutate” expression (see mutating through a reference) of the form
*lexp = rexp, wherelexpis an expression of type&mut Tandrexpis an expression of typeT,rexpis evaluated first, followed bylexp.
-
Bug fix for acquires annotation: A function should be annotated with
acquiresif and only if it accesses a resource usingmove_from,borrow_global, orborrow_global_mut, either directly or transitively through a call. Otherwise, it is an error. Previously, when the transitive call graph included a cycle, such errors were not reported: this was incorrect behavior. We have now corrected this behavior to report these errors even when the transitive call graph has cycles.