| Crates.io | cargo-concordium |
| lib.rs | cargo-concordium |
| version | 4.2.0 |
| created_at | 2023-05-11 06:56:11.207995+00 |
| updated_at | 2025-03-18 14:35:28.664056+00 |
| description | A tool to build and test smart contracts on the Concordium blockchain. |
| homepage | https://github.com/Concordium/concordium-smart-contract-tools |
| repository | https://github.com/Concordium/concordium-smart-contract-tools |
| max_upload_size | |
| id | 861862 |
| size | 270,816 |
cargo-concordium is a tool for building and testing smart contracts on the Concordium blockchain.
See developer documentation for guides on how to use the tool in detail.
This crate is a binary, and its versioning applies to the command-line API. There are no guarantees about internal crate API.
To start a new Concordium smart contract project, run the command:
cargo concordium init
This command will generate a new project from the templates in the template folder.
cargo concordium build -e --out contract.wasm.v1
will build a contract, embed the schema, and output the artifact to
contract.wasm.v1. This can be deployed to the chain or tested locally.
Since a contract running on the chain will typically not be able to recover from
panics, and error traces are not reported, it is useful not to bloat code size
with them. Setting panic=abort will make it so that the compiler will generate
simple Wasm traps on any panic that occurs. This option can be specified
either in .cargo/config or in the Cargo.toml file as
[profile.release]
# Don't unwind on panics, just trap.
panic = "abort"
The latter will only set this option in release builds, for debug builds use
[profile.dev]
# Don't unwind on panics, just trap.
panic = "abort"
instead.
Note that currently this is the default already for wasm32-unknown-unknown target.
An additional option that might be useful to minimize code size at the cost of some performance in some cases is
[profile.release]
# Tell `rustc` to optimize for small code size.
opt-level = "s"
or even opt-level = "z".
In some cases using opt-level=3 actually leads to smaller code sizes, presumably due to more inlining and dead code removal as a result.
A normal build with cargo concordium build is generally not reproducible since
some host information is embedded into the resulting binary. For this reason
cargo concordium supports so-called verifiable or reproducible builds that
always build the contract in a fixed environment specified as a Docker image.
The list of available images can be found on
DockerHub
Note that the image used to verify a build is part of the chain of trust. When verifying a build you must only use images you trust.
Both cargo concordium build and cargo concordium test support verifiable
builds, which can be requested by adding the option --verifiable to the build
command. The value of this option should be a docker image listed above. For example
cargo concordium build --verifiable docker.io/concordium/verifiable-sc:1.70.0 -o contract.wasm.v1 -e
This will build the smart contract, embed the schema (-e) and output it to a
contract.wasm.v1 file. In addition to this cargo concordium will also
produce a file contract.wasm.v1.tar that contains the exact sources that were
used to build the contract.
When constructing the tar archive cargo concordium will include the contents
of the package root subject to the following
.gitignore are ignored (both .gitignore in the package
directory and parent directories)target) will be ignored.ignore files will be ignored. The format
of this file should be the same as a .gitignore file.Information about the sources and the build will be embedded into
contract.wasm.v1 file. This information includes
tar filedocker.io/concordium/verifiable-sc:1.70.0 in the
example above)--source flag is provided. If this
is not provided the link can be embedded later. The source link should point
either to the tar file directly, or to a gzipped version of the file.The tar archive is meant to be published and its link embedded in the source
that is put to the chain. Before registering the module on the chain the tar
file should be uploaded somewhere that is accessible via http GET request.
Then the link should be embedded into the wasm.v1 file using the
edit-build-info command.
cargo concordium edit-build-info --module contract.wasm.v1 --source-link https://domain.com/contract.wasm.v1.tar --verify
The --verify flag is optional, and if it is set cargo concordium will
download the contents at the supplied link and verify that it matches the build
metadata that is already embedded in the module. If it does, the link is added
to the metadata.
To verify that a deployed module was built from given sources there is a cargo concordium verify-build command. This takes a path to the module and optionally
a path to the source tar archive. If the tar archive is not provided then it
will be downloaded from a link embedded in the module, if available. The source
link may also point to a gzipped tar archive.
For example
cargo concordium verify-build --module contract.wasm.v1
cargo concordium print-build-info --module contract.wasm.v1
Will print any embedded build information.
Cargo.lock file must be up to date for reproducible builds.crypto-primitives feature is not supported. This feature is only needed
for running tests and can be disabled for a build.The following are some example invocations of the cargo concordium binary's subcommand run.
cargo concordium run init --context init-context.json --parameter parameter.bin --source ./simple_game.wasm --out state.bin --amount 123
with input files
{
"metadata": {
"slotNumber": 1,
"blockHeight": 1,
"finalizedHeight": 1,
"slotTime": "2021-01-01T00:00:01Z"
},
"initOrigin": "3uxeCZwa3SxbksPWHwXWxCsaPucZdzNaXsRbkztqUUYRo1MnvF"
}
and parameter.bin as
00001111aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
(as a text file without a newline).
cargo concordium run receive --context receive-context.json --parameter parameter-receive.bin --source ./simple_game.wasm --state state-in.bin --amount 0 --name "receive_help_yourself" --balance 13 --out state-out.bin
where an example receive context is
{
"metadata": {
"slotNumber": 1,
"blockHeight": 1,
"finalizedHeight": 1,
"slotTime": "2021-01-01T00:00:01Z"
},
"invoker": "3uxeCZwa3SxbksPWHwXWxCsaPucZdzNaXsRbkztqUUYRo1MnvF",
"selfAddress": {"index": 0, "subindex": 0},
"selfBalance": 0,
"sender": {
"type": "Account",
"address": "3uxeCZwa3SxbksPWHwXWxCsaPucZdzNaXsRbkztqUUYRo1MnvF"
},
"owner": "3uxeCZwa3SxbksPWHwXWxCsaPucZdzNaXsRbkztqUUYRo1MnvF"
}
See --help or help option to cargo concordium run for an explanation of the options.
By default the compiled binary from a rust crate contains some information from the host machine, namely rust-related paths such as the path to .cargo. This can be seen by inspecting the produced binary:
Lets assume your username is tom and you have a smart contract foo located in your home folder, which you compiled in release-mode to WASM32.
By running the following command inside the foo folder, you will be able to see the paths included in the binary: strings target/wasm32-unknown-unknown/release/foo.wasm | grep tom
To remove the host information, the path prefixes can be remapped using a flag given to the compiler.
RUSTFLAGS=--remap-path-prefix=/home/tom=secret cargo build --release --target wasm32-unknown-unknown, where /home/tom is the prefix you want to change into secret.
The flag can be specified multiple times to remap multiple prefixes.
The flags can also be set permanently in the .cargo/config file in your crate, under the build section:
[build]
rustflags = ["--remap-path-prefix=/home/tom=secret"]