Cadence 1.0 Improvements & New Features
💫 New features
View Functions added (FLIP 1056)
💡 Motivation
View functions enable developers to enhance the reliability and safety of their programs, facilitating a clearer understanding of the impacts of their own code and that of others.
Developers can mark their functions as view
, which disallows the function from performing state changes. That also makes the intent of functions clear to other programmers, as it allows them to distinguish between functions that change state and ones that do not.
ℹ️ Description
Cadence has added support for annotating functions with the view
keyword, which enforces that no “mutating” operations occur inside the body of the function. The view
keyword is placed before the fun
keyword in a function declaration or function expression.
If a function has no view
annotation, it is considered “non-view”, and users should encounter no difference in behavior in these functions from what they are used to.
If a function does have a view
annotation, then the following mutating operations are not allowed:
- Writing to, modifying, or destroying any resources
- Writing to or modifying any references
- Assigning to or modifying any variables that cannot be determined to have been created locally inside of the
view
function in question. In particular, this means that captured and global variables cannot be written in these functions - Calling a non-
view
function
This feature was proposed in FLIP 1056. To learn more, please consult the FLIP and documentation.
🔄 Adoption
You can adopt view functions by adding the view
modifier to all functions that do not perform mutating operations.
✨ Example
Before:
The function getCount
of a hypothetical NFT collection returns the number of NFTs in the collection.
_17access(all)_17resource Collection {_17_17 access(all)_17 var ownedNFTs: @{UInt64: NonFungibleToken.NFT}_17_17 init () {_17 self.ownedNFTs <- {}_17 }_17_17 access(all)_17 fun getCount(): Int {_17 returnself.ownedNFTs.length_17 }_17_17 /* ... rest of implementation ... */_17}
After:
The function getCount
does not perform any state changes, it only reads the length of the collection and returns it. Therefore it can be marked as view.
_10 access(all)_10 view fun getCount(): Int {_10// ^^^^ addedreturnself.ownedNFTs.length_10 }
Interface Inheritance Added (FLIP 40)
💡 Motivation
Previously, interfaces could not inherit from other interfaces, which required developers to repeat code. Interface inheritance allows code abstraction and code reuse.
ℹ️ Description and ✨ Example
Interfaces can now inherit from other interfaces of the same kind. This makes it easier for developers to structure their conformances and reduces a lot of redundant code.
For example, suppose there are two resource interfaces Receiver
and Vault
, and suppose all implementations of the Vault
would also need to conform to the interface Receiver
.
Previously, there was no way to enforce this. Anyone who implements the Vault
would have to explicitly specify that their concrete type also implements the Receiver
. But it was not always guaranteed that all implementations would follow this informal agreement.
With interface inheritance, the Vault
interface can now inherit/conform to the Receiver
interface.
_11access(all)_11resource interface Receiver {_11 access(all)_11 fun deposit(_ something:@AnyResource)_11}_11_11access(all)_11resource interface Vault: Receiver {_11 access(all)_11 fun withdraw(_ amount: Int):@Vault_11}
Thus, anyone implementing the Vault
interface would also have to implement the Receiver
interface as well.
_10access(all)_10resource MyVault: Vault {_10 // Required!_10 access(all)_10 fun withdraw(_ amount: Int):@Vault {}_10 // Required!_10 access(all)_10 fun deposit(_ something:@AnyResource) {}_10}
This feature was proposed in FLIP 40. To learn more, please consult the FLIP and documentation.
⚡ Breaking Improvements
Many of the improvements of Cadence 1.0 are fundamentally changing how Cadence works and how it is used. However, that also means it is necessary to break existing code to release this version, which will guarantee stability (no more planned breaking changes) going forward.
Once Cadence 1.0 is live, breaking changes will simply not be acceptable.
So we have, and need to use, this last chance to fix and improve Cadence, so it can deliver on its promise of being a language that provides security and safety, while also providing composability and simplicity.
We fully recognize the frustration developers feel when updates break their code, necessitating revisions. Nonetheless, we are convinced that this inconvenience is justified by the substantial enhancements to Cadence development. These improvements not only make development more effective and enjoyable but also empower developers to write and deploy immutable contracts.
The improvements were intentionally bundled into one release to avoid breaking Cadence programs multiple times.
2024-04-24 Public Capability Acquisition No Longer Returns Optional Capabilities (FLIP 242)
Note This is a recent change that may not be reflected in emulated migrations or all tools yet. Likewise, this may affect existing staged contracts which do not conform to this new requirement. Please ensure your contracts are updated and re-staged, if necessary, to match this new requirement.
💡 Motivation
In the initial implementation of the new Capability Controller API (a change that is new in Cadence 1.0, proposed in FLIP 798), capabilities.get<T>
would return an optional capability, Capability<T>?
. When the no capability was published under the requested path, or when type argument T
was not a subtype of the runtime type of the capability published under the requested path, the capability would be nil
.
This was a source of confusion among developers, as previously account.getCapability<T>
did not return an optional capability, but rather one that would simply fail capability.borrow
if the capability was invalid.
It was concluded that this new behaviour was not ideal, and that there a benefit to an invalid Capability not being nil
, even if it is not borrowable. A nil
capability lacked information that was previously available with an invalid capability - primarily the type and address of the capability. Developers may have wanted to make use of this information, and react to the capability being invalid, as opposed to an uninformative nil
value and encountering a panic scenario.
ℹ️ Description
The capabilities.get<T>
function now returns an invalid capability when no capability is published under the requested path, or when the type argument T
is not a subtype of the runtime type of the capability published under the requested path.
This capability has the following properties:
- Always return
false
whenCapability<T>.check
is called. - Always return
nil
whenCapability<T>.borrow
is called. - Have an ID of
0
. - Have a runtime type that is the same as the type requested in the type argument of
capabilities.get<T>
.
🔄 Adoption
If you have not updated your code to Cadence 1.0 yet, you will need to follow the same guidelines for updating to the Capability Controller API as you would have before, but will need to handle the new invalid capability type instead of an optional capability.
If you have already updated your code to use capabilities.get<T>
, and are handling the capability as an optional type, you may need to update your code to handle the new non-optional invalid capability type instead.
✨ Example
Before:
_10let capability = account.capabilities.get<&MyNFT.Collection>(/public/NFTCollection)_10if capability == nil {_10 // Handle the case where the capability is nil_10}
After:
_10let capability = account.capabilities.get<&MyNFT.Collection>(/public/NFTCollection)_10if !capability.check() {_10 // Handle the case where the capability is invalid_10}
2024-04-23 Matching Access Modifiers for Interface Implementation Members are now Required (FLIP 262)
Note This is a recent change that may not be reflected in emulated migrations or all tools yet. Likewise, this may affect existing staged contracts which do not conform to this new requirement. Please ensure your contracts are updated and re-staged, if necessary, to match this new requirement.
💡 Motivation
Previously, the access modifier of a member in a type conforming to / implementing an interface could not be more restrictive than the access modifier of the member in the interface. That meant an implementation may have choosen to use a more permissive access modifier than the interface.
This may have been surprising to developers, as they may have assumed that the access modifier of the member
in the interface was a requirement / maximum, not just a minimum, especially when using
a non-public / non-entitled access modifier (e.g. access(contract)
, access(account)
).
Requiring access modifiers of members in the implementation to match the access modifiers of members given in the interface, helps avoid confusion and potential footguns.
ℹ️ Description
If an interface member has an access modifier, a composite type that conforms to it / implements the interface must use exactly the same access modifier.
🔄 Adoption
Update the access modifiers of members in composite types that conform to / implement interfaces if they do not match the access modifiers of the members in the interface.
✨ Example
Before:
_11access(all)_11resource interface I {_11 access(account)_11 fun foo()_11}_11_11access(all)_11resource R: I {_11 access(all)_11 fun foo() {}_11}
After:
_11access(all)_11resource interface I {_11 access(account)_11 fun foo()_11}_11_11access(all)_11resource R: I {_11 access(account)_11 fun foo() {}_11}
Conditions No Longer Allow State Changes (FLIP 1056)
💡 Motivation
In the current version of Cadence, pre-conditions and post-conditions may perform state changes, e.g. by calling a function that performs a mutation. This may result in unexpected behavior, which might lead to bugs.
To make conditions predictable, they are no longer allowed to perform state changes.
ℹ️ Description
Pre-conditions and post-conditions are now considered view
contexts, meaning that any operations that would be prevented inside of a view
function are also not permitted in a pre-condition or post-condition.
This is to prevent underhanded code wherein a user modifies global or contract state inside of a condition, where they are meant to simply be asserting properties of that state.
In particular, since only expressions were permitted inside conditions already, this means that if users wish to call any functions in conditions, these functions must now be made view
functions.
This improvement was proposed in FLIP 1056. To learn more, please consult the FLIP and documentation.
🔄 Adoption
Conditions which perform mutations will now result in the error “Impure operation performed in view context”. Adjust the code in the condition so it does not perform mutations.
The condition may be considered mutating, because it calls a mutating, i.e. non-view
function. It might be possible to mark the called function as view
, and the body of the function may need to get updated in turn.
✨ Example
Before:
The function withdraw
of a hypothetical NFT collection interface allows the withdrawal of an NFT with a specific ID. In its post-condition, the function states that at the end of the function, the collection should have exactly one fewer item than at the beginning of the function.
_15access(all)_15resource interface Collection {_15_15 access(all)_15 fun getCount(): Int_15_15 access(all)_15 fun withdraw(id: UInt64):@NFT {_15 post {_15 getCount() == before(getCount()) - 1_15 }_15 }_15_15 /* ... rest of interface ... */_15}
After:
The calls to getCount
in the post-condition are not allowed and result in the error “Impure operation performed in view context”, because the getCount
function is considered a mutating function, as it does not have the view
modifier.
Here, as the getCount
function only performs a read-only operation and does not change any state, it can be marked as view
.
_10 access(all)_10 view fun getCount(): Int_10// ^^^^
Missing or Incorrect Argument Labels Get Reported
💡 Motivation
Previously, missing or incorrect argument labels of function calls were not reported. This had the potential to confuse developers or readers of programs, and could potentially lead to bugs.
ℹ️ Description
Function calls with missing argument labels are now reported with the error message “missing argument label”, and function calls with incorrect argument labels are now reported with the error message “incorrect argument label”.
🔄 Adoption
- Function calls with missing argument labels should be updated to include the required argument labels.
- Function calls with incorrect argument labels should be fixed by providing the correct argument labels.
✨ Example
Contract TestContract
deployed at address 0x1
:
_18access(all)_18contract TestContract {_18_18 access(all)_18 structTestStruct {_18_18 access(all)_18 let a: Int_18_18 access(all)_18 let b: String_18_18 init(first: Int, second: String) {_18 self.a = first_18 self.b = second_18 }_18 }_18}
Incorrect program:
The initializer of TestContract.TestStruct
expects the argument labels first
and second
.
However, the call of the initializer provides the incorrect argument label wrong
for the first argument, and is missing the label for the second argument.
_10// Script_10import TestContract from 0x1_10_10access(all)_10fun main() {_10 TestContract.TestStruct(wrong: 123, "abc")_10}
This now results in the following errors:
_11error: incorrect argument label_11 --> script:4:34_11 |_11 4 | TestContract.TestStruct(wrong: 123, "abc")_11 | ^^^^^ expected `first`, got `wrong`_11_11error: missing argument label: `second`_11 --> script:4:46_11 |_11 4 | TestContract.TestStruct(wrong: 123, "abc")_11 | ^^^^^
Corrected program:
_10// Script_10import TestContract from 0x1_10_10access(all)_10fun main() {_10 TestContract.TestStruct(first: 123, second: "abc")_10}
We would like to thank community member @justjoolz for reporting this bug.
Incorrect Operators In Reference Expressions Get Reported (FLIP 941)
💡 Motivation
Previously, incorrect operators in reference expressions were not reported.
This had the potential to confuse developers or readers of programs, and could potentially lead to bugs.
ℹ️ Description
The syntax for reference expressions is &v as &T
, which represents taking a reference to value v
as type T
.
Reference expressions that used other operators, such as as?
and as!
, e.g. &v as! &T
, were incorrect and were previously not reported as an error.
The syntax for reference expressions improved to just &v
. The type of the resulting reference must still be provided explicitly.
If the type is not explicitly provided, the error “cannot infer type from reference expression: requires an explicit type annotation” is reported.
For example, existing expressions like &v as &T
provide an explicit type, as they statically assert the type using as &T
. Such expressions thus keep working and do not have to be changed.
Another way to provide the type for the reference is by explicitly typing the target of the expression, for example, in a variable declaration, e.g. via let ref: &T = &v
.
This improvement was proposed in FLIP 941. To learn more, please consult the FLIP and documentation.
🔄 Adoption
Reference expressions which use an operator other than as
need to be changed to use the as
operator.
In cases where the type is already explicit, the static type assertion (as &T
) can be removed.
✨ Example
Incorrect program:
The reference expression uses the incorrect operator as!
.
_10let number = 1_10let ref = &number as! &Int
This now results in the following error:
_10error: cannot infer type from reference expression: requires an explicit type annotation_10 --> test:3:17_10 |_103 |let ref = &number as! &Int_10 | ^
Corrected program:
_10let number = 1_10let ref = &number as &Int
Alternatively, the same code can now also be written as follows:
_10let number = 1_10let ref: &Int = &number
Tightening Of Naming Rules
💡 Motivation
Previously, Cadence allowed language keywords (e.g. continue
, for
, etc.) to be used as names. For example, the following program was allowed:
_10fun continue(import: Int, break: String) { ... }
This had the potential to confuse developers or readers of programs, and could potentially lead to bugs.
ℹ️ Description
Most language keywords are no longer allowed to be used as names. Some keywords are still allowed to be used as names, as they have limited significance within the language. These allowed keywords are as follows:
from
: only used in import statementsimport foo from ...
account
: used in access modifiersaccess(account) let ...
all
: used in access modifieraccess(all) let ...
view
: used as modifier for function declarations and expressionsview fun foo()...
, letf = view fun () ...
Any other keywords will raise an error during parsing, such as:
_10let break: Int = 0_10// ^ error: expected identifier after start of variable declaration, got keyword break
🔄 Adoption
Names which use language keywords must be renamed.
✨ Example
Before: A variable is named after a language keyword.
_10let contract = signer.borrow<&MyContract>(name: "MyContract")_10// ^ error: expected identifier after start of variable declaration, got keyword contract
After: The variable is renamed to avoid the clash with the language keyword.
_10let myContract = signer.borrow<&MyContract>(name: "MyContract")
Result of toBigEndianBytes()
for U?Int(128|256)
Fixed
💡 Motivation
Previously, the implementation of .toBigEndianBytes()
was incorrect for the large integer types Int128
, Int256
, UInt128
, and UInt256
.
This had the potential to confuse developers or readers of programs, and could potentially lead to bugs.
ℹ️ Description
Calling the toBigEndianBytes
function on smaller sized integer types returns the exact number of bytes that fit into the type, left-padded with zeros. For instance, Int64(1).toBigEndianBytes()
returns an array of 8 bytes, as the size of Int64
is 64 bits, 8 bytes.
Previously, the toBigEndianBytes
function erroneously returned variable-length byte arrays without padding for the large integer types Int128
, Int256
, UInt128
, and UInt256
. This was inconsistent with the smaller fixed-size numeric types, such as Int8
, and Int32
.
To fix this inconsistency, Int128
and UInt128
now always return arrays of 16 bytes, while Int256
and UInt256
return 32 bytes.
✨ Example
_10let someNum: UInt128 = 123456789_10let someBytes: [UInt8] = someNum.toBigEndianBytes()_10// OLD behavior;_10// someBytes = [7, 91, 205, 21]_10// NEW behavior:_10// someBytes = [0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 7, 91, 205, 21]
🔄 Adoption
Programs that use toBigEndianBytes
directly, or indirectly by depending on other programs, should be checked for how the result of the function is used. It might be necessary to adjust the code to restore existing behavior.
If a program relied on the previous behavior of truncating the leading zeros, then the old behavior can be recovered by first converting to a variable-length type, Int
or UInt
, as the toBigEndianBytes
function retains the variable-length byte representations, i.e. the result has no padding bytes.
_10let someNum: UInt128 = 123456789_10let someBytes: [UInt8] = UInt(someNum).toBigEndianBytes()_10// someBytes = [7, 91, 205, 21]
Syntax for Function Types Improved (FLIP 43)
💡 Motivation
Previously, function types were expressed using a different syntax from function declarations or expressions. The previous syntax was unintuitive for developers, making it hard to write and read code that used function types.
ℹ️ Description and ✨ examples
Function types are now expressed using the fun
keyword, just like expressions and declarations. This improves readability and makes function types more obvious.
For example, given the following function declaration:
_10fun foo(n: Int8, s: String): Int16 { /* ... */ }
The function foo
now has the type fun(Int8, String): Int16
.
The :
token is right-associative, so functions that return other functions can have their types written without nested parentheses:
_10fun curriedAdd(_ x: Int): fun(Int): Int {_10 return fun(_ y: Int): Int {_10 return x+ y_10 }_10}_10// function `curriedAdd` has the type `fun(Int): fun(Int): Int`
To further bring the syntax for function types closer to the syntax of function declarations expressions, it is now possible to omit the return type, in which case the return type defaults to Void
.
_10fun logTwice(_ value: AnyStruct) {// Return type is implicitly `Void`_10 log(value)_10 log(value)_10}_10_10// The function types of these variables are equivalent_10let logTwice1: fun(AnyStruct): Void = logTwice_10let logTwice2: fun(AnyStruct) = logTwice
As a bonus consequence, it is now allowed for any type to be parenthesized. This is useful for complex type signatures, or for expressing optional functions:
_10// A function that returns an optional Int16_10let optFun1: fun (Int8): Int16? =_10 fun (_: Int8): Int? { return nil }_10_10// An optional function that returns an Int16_10let optFun2: (fun (Int8): Int16)? = nil
This improvement was proposed in FLIP 43.
🔄 Adoption
Programs that use the old function type syntax need to be updated by replacing the surrounding parentheses of function types with the fun
keyword.
Before:
_10let baz: ((Int8, String): Int16) = foo_10 // ^ ^_10 // surrounding parentheses of function type
After:
_10let baz: fun (Int8, String): Int16 = foo
Entitlements and Safe Down-casting (FLIP 54 & FLIP 94)
💡 Motivation
Previously, Cadence’s main access-control mechanism, restricted reference types, has been a source of confusion and mistakes for contract developers.
Developers new to Cadence often were surprised and did not understand why access-restricted functions, like the withdraw
function of the fungible token Vault
resource type, were declared as pub
, making the function publicly accessible – access would later be restricted through a restricted type.
It was too easy to accidentally give out a Capability
with a more permissible type than intended, leading to security problems.
Additionally, because what fields and functions were available to a reference depended on what the type of the reference was, references could not be downcast, leading to ergonomic issues.
ℹ️ Description
Access control has improved significantly.
When giving another user a reference or Capability
to a value you own, the fields and functions that the user can access is determined by the type of the reference or Capability
.
Previously, access to a value of type T
, e.g. via a reference &T
, would give access to all fields and functions of T
. Access could be restricted, by using a restricted type. For example, a restricted reference &T{I}
could only access members that were pub
on I
. Since references could not be downcast, any members defined on T
but not on I
were unavailable to this reference, even if they were pub
.
Access control is now handled using a new feature called Entitlements, as originally proposed across FLIP 54 and FLIP 94.
A reference can now be “entitled” to certain facets of an object. For example, the reference auth(Withdraw) &Vault
is entitled to access fields and functions of Vault
which require the Withdraw
entitlement.
Entitlements can be are declared using the new entitlement
syntax.
Members can be made to require entitlements using the access modifier syntax access(E)
, where E
is an entitlement that the user must posses.
For example:
_10entitlement Withdraw_10_10access(Withdraw)_10fun withdraw(amount: UFix64): @Vault
References can now always be down-casted, the standalone auth
modifier is not necessary anymore, and got removed.
For example, the reference &{Provider}
can now be downcast to &Vault
, so access control is now handled entirely through entitlements, rather than types.
To learn more, please refer to the documentation.
🔄 Adoption
The access modifiers of fields and functions need to be carefully audited and updated.
Fields and functions that have the pub
access modifier are now callable by anyone with any reference to that type. If access to the member should be restricted, the pub
access modifier needs to be replaced with an entitlement access modifier.
When creating a Capability
or a reference to a value, it must be carefully considered which entitlements are provided to the recipient of that Capability
or reference – only the entitlements which are necessary and not more should be include in the auth
modifier of the reference type.
✨ Example
Before:
The Vault
resource was originally written like so:
_23access(all)_23resource interface Provider {_23 access(all)_23 funwithdraw(amount:UFix64): @Vault {_23 // ..._23 }_23}_23_23access(all)_23resource Vault: Provider, Receiver, Balance {_23 access(all)_23 fun withdraw(amount:UFix64): @Vault {_23 // ..._23 }_23_23 access(all)_23 fun deposit(from: @Vault) {_23 // ..._23 }_23_23 access(all)_23 var balance: UFix64_23}
After:
The Vault
resource might now be written like this:
_26access(all) entitlement Withdraw_26_26access(all)_26resource interface Provider {_26 access(Withdraw)_26 funwithdraw(amount:UFix64): @Vault {_26 // ..._26 }_26}_26_26access(all)_26resource Vault: Provider, Receiver, Balance {_26_26 access(Withdraw)// withdrawal requires permission_26 fun withdraw(amount:UFix64): @Vault {_26 // ..._26 }_26_26 access(all)_26 fun deposit(from: @Vault) {_26 // ..._26 }_26_26 access(all)_26 var balance: UFix64_26}
Here, the access(Withdraw)
syntax means that a reference to Vault
must possess the Withdraw
entitlement in order to be allowed to call the withdraw
function, which can be given when a reference or Capability
is created by using a new syntax: auth(Withdraw) &Vault
.
This would allow developers to safely downcast &{Provider}
references to &Vault
references if they want to access functions like deposit
and balance
, without enabling them to call withdraw
.
Removal of pub
and priv
Access Modifiers (FLIP 84)
💡 Motivation
With the previously mentioned entitlements feature, which uses access(E)
syntax to denote entitled access, the pub
, priv
and pub(set)
modifiers became the only access modifiers that did not use the access
syntax.
This made the syntax inconsistent, making it harder to read and understand programs.
In addition, pub
and priv
already had alternatives/equivalents: access(all)
and access(self)
.
ℹ️ Description
The pub
, priv
and pub(set)
access modifiers are being removed from the language, in favor of their more explicit access(all)
and access(self)
equivalents (for pub
and priv
, respectively).
This makes access modifiers more uniform and better match the new entitlements syntax.
This improvement was originally proposed in FLIP 84.
🔄 Adoption
Users should replace any pub
modifiers with access(all)
, and any priv
modifiers with access(self)
.
Fields that were defined as pub(set)
will no longer be publicly assignable, and no access modifier now exists that replicates this old behavior. If the field should stay publicly assignable, a access(all)
setter function that updates the field needs to be added, and users have to switch to using it instead of directly assigning to the field.
✨ Example
Before:
Types and members could be declared with pub
and priv
:
_10pub resource interface Collection {_10 pub fun getCount(): Int_10_10 priv fun myPrivateFunction()_10_10 pub(set) let settableInt: Int_10_10 /* ... rest of interface ... */_10}
After:
The same behavior can be achieved with access(all)
and access(self)
_18access(all)_18resource interface Collection {_18_18 access(all)_18 fun getCount(): Int_18_18 access(self)_18 fun myPrivateFunction()_18_18 access(all)_18 let settableInt: Int_18_18 // Add a public setter method, replacing pub(set)_18 access(all)_18 fun setIntValue(_ i:Int): Int_18_18 /* ... rest of interface ... */_18}
Replacement of Restricted Types with Intersection Types (FLIP 85)
💡 Motivation
With the improvements to access control enabled by entitlements and safe down-casting, the restricted type feature is redundant.
ℹ️ Description
Restricted types have been removed. All types, including references, can now be down-casted, restricted types are no longer used for access control.
At the same time intersection types got introduced. Intersection types have the syntax {I1, I2, ... In}
, where all elements of the set of types (I1, I2, ... In
) are interface types. A value is part of the intersection type if it conforms to all the interfaces in the intersection type’s interface set. This functionality is equivalent to restricted types that restricted AnyStruct
and AnyResource.
This improvement was proposed in FLIP 85. To learn more, please consult the FLIP and documentation.
🔄 Adoption
Code that relies on the restriction behavior of restricted types can be safely changed to just use the concrete type directly, as entitlements will make this safe. For example, &Vault{Balance}
can be replaced with just &Vault
, as access to &Vault
only provides access to safe operations, like getting the balance – privileged operations, like withdrawal, need additional entitlements.
Code that uses AnyStruct
or AnyResource
explicitly as the restricted type, e.g. in a reference, &AnyResource{I}
, needs to remove the use of AnyStruct
/ AnyResource
. Code that already uses the syntax &{I}
can stay as-is.
✨ Example
Before:
This function accepted a reference to a T
value, but restricted what functions were allowed to be called on it to those defined on the X
, Y
, and Z
interfaces.
_32access(all)_32resource interface X {_32 access(all)_32 fun foo()_32}_32_32access(all)_32resource interface Y {_32 access(all)_32 fun bar()_32}_32_32access(all)_32resource interface Z {_32 access(all)_32 fun baz()_32}_32_32access(all)_32resource T: X, Y, Z {_32 // implement interfaces_32 access(all)_32 fun qux() {_32 // ..._32 }_32}_32_32access(all)_32fun exampleFun(param: &T{X, Y, Z}) {_32 // `param` cannot call `qux` here, because it is restricted to_32 // `X`, `Y` and `Z`._32}
After: This function can be safely rewritten as:
_33access(all)_33resource interface X {_33 access(all)_33 fun foo()_33}_33_33access(all)_33resource interface Y {_33 access(all)_33 fun bar()_33}_33_33resource interface Z {_33 access(all)_33 fun baz()_33}_33_33access(all)_33entitlement Q_33_33access(all)_33resource T: X, Y, Z {_33 // implement interfaces_33 access(Q)_33 fun qux() {_33 // ..._33 }_33}_33_33access(all)_33fun exampleFun(param: &T) {_33 // `param` still cannot call `qux` here, because it lacks entitlement `Q`_33}
Any functions on T
that the author of T
does not want users to be able to call publicly should be defined with entitlements, and thus will not be accessible to the unauthorized param
reference, like with qux
above.
Account Access Got Improved (FLIP 92)
💡 Motivation
Previously, access to accounts was granted wholesale: Users would sign a transaction, authorizing the code of the transaction to perform any kind of operation, for example, write to storage, but also add keys or contracts.
Users had to trust that a transaction would only perform supposed access, e.g. storage access to withdraw tokens, but still had to grant full access, which would allow the transaction to perform other operations.
Dapp developers who require users to sign transactions should be able to request the minimum amount of access to perform the intended operation, i.e. developers should be able to follow the principle of least privilege (PoLA).
This allows users to trust the transaction and Dapp.
ℹ️ Description
Previously, access to accounts was provided through the built-in types AuthAccount
and PublicAccount
: AuthAccount
provided full write access to an account, whereas PublicAccount
only provided read access.
With the introduction of entitlements, this access is now expressed using entitlements and references, and only a single Account
type is necessary. In addition, storage related functionality were moved to the field Account.storage
.
Access to administrative account operations, such as writing to storage, adding keys, or adding contracts, is now gated by both coarse grained entitlements (e.g. Storage
, which grants access to all storage related functions, and Keys
, which grants access to all key management functions), as well as fine-grained entitlements (e.g. SaveValue
to save a value to storage, or AddKey
to add a new key to the account).
Transactions can now request the particular entitlements necessary to perform the operations in the transaction.
This improvement was proposed in FLIP 92. To learn more, consult the FLIP and the documentation.
🔄 Adoption
Code that previously used PublicAccount
can simply be replaced with an unauthorized account reference, &Account.
Code that previously used AuthAccount
must be replaced with an authorized account reference. Depending on what functionality of the account is accessed, the appropriate entitlements have to be specified.
For example, if the save
function of AuthAccount
was used before, the function call must be replaced with storage.save
, and the SaveValue
or Storage
entitlement is required.
✨ Example
Before:
The transactions wants to save a value to storage. It must request access to the whole account, even though it does not need access beyond writing to storage.
_10transaction {_10 prepare(signer: AuthAccount) {_10 signer.save("Test", to: /storage/test)_10 }_10}
After:
The transaction requests the fine-grained account entitlement SaveValue
, which allows the transaction to call the save
function.
_10transaction {_10 prepare(signer: auth(SaveValue)&Account) {_10 signer.storage.save("Test", to: /storage/test)_10 }_10}
If the transaction attempts to perform other operations, such as adding a new key, it is rejected:
_10transaction {_10 prepare(signer: auth(SaveValue)&Account) {_10 signer.storage.save("Test", to: /storage/test)_10 signer.keys.add(/* ... */)_10 // ^^^ Error: Cannot call function, requires `AddKey` or `Keys` entitlement_10 }_10}
Deprecated Key Management API Got Removed
💡 Motivation
Cadence provides two key management APIs:
- The original, low-level API, which worked with RLP-encoded keys
- The improved, high-level API, which works with convenient data types like
PublicKey
,HashAlgorithm
, andSignatureAlgorithm
The improved API was introduced, as the original API was difficult to use and error-prone. The original API was deprecated in early 2022.
ℹ️ Description
The original account key management API, got removed. Instead, the improved key management API should be used. To learn more,
🔄 Adoption
Replace uses of the original account key management API functions with equivalents of the improved API:
Removed | Replacement |
---|---|
AuthAccount.addPublicKey | Account.keys.add |
AuthAccount.removePublicKey | Account.keys.revoke |
To learn more, please refer to the documentation.
✨ Example
Before:
_10transaction(encodedPublicKey: [UInt8]) {_10 prepare(signer: AuthAccount) {_10 signer.addPublicKey(encodedPublicKey)_10 }_10}
After:
_12transaction(publicKey: [UInt8]) {_12 prepare(signer: auth(Keys) &Account) {_12 signer.keys.add(_12 publicKey: PublicKey(_12 publicKey: publicKey,_12 signatureAlgorithm: SignatureAlgorithm.ECDSA_P256_12 ),_12 hashAlgorithm: HashAlgorithm.SHA3_256,_12 weight: 100.0_12 )_12 }_12}
Resource Tracking for Optional Bindings Improved
💡 Motivation
Previously, resource tracking for optional bindings (”if-let statements”) was implemented incorrectly, leading to errors for valid code. This required developers to add workarounds to their code.
ℹ️ Description
Resource tracking for optional bindings (”if-let statements”) was fixed.
For example, the following program used to be invalid, reporting a resource loss error for optR
:
_12resource R {}_12fun asOpt(_ r: @R): @R? {_12 return <-r_12}_12_12fun test() {_12 let r <- create R()_12 let optR <- asOpt(<-r)_12 if let r2 <- optR {_12 destroy r2_12 }_12}
This program is now considered valid.
🔄 Adoption
New programs do not need workarounds anymore, and can be written naturally.
Programs that previously resolved the incorrect resource loss error with a workaround, for example by invalidating the resource also in the else-branch or after the if-statement, are now invalid:
_10fun test() {_10 let r <- createR()_10 let optR <-asOpt(<-r)_10 if let r2 <- optR {_10 destroy r2_10 } else {_10 destroy optR_10 // unnecessary, but added to avoid error_10 }_10}
The unnecessary workaround needs to be removed.
Definite Return Analysis Got Improved
💡 Motivation
Definite return analysis determines if a function always exits, in all possible execution paths, e.g. through a return
statement, or by calling a function that never returns, like panic
.
This analysis was incomplete and required developers to add workarounds to their code.
ℹ️ Description
The definite return analysis got significantly improved.
This means that the following program is now accepted: both branches of the if-statement exit, one using a return
statement, the other using a function that never returns, panic
:
_10resource R {}_10_10fun mint(id: UInt64):@R {_10 if id > 100 {_10 return <- create R()_10 } else {_10 panic("bad id")_10 }_10}
The program above was previously rejected with a “missing return statement” error – even though we can convince ourselves that the function will exit in both branches of the if-statement, and that any code after the if-statement is unreachable, the type checker was not able to detect that – it now does.
🔄 Adoption
New programs do not need workarounds anymore, and can be written naturally. Programs that previously resolved the incorrect error with a workaround, for example by adding an additional exit at the end of the function, are now invalid:
_12resource R {}_12_12fun mint(id: UInt64):@R {_12 if id > 100 {_12 return <- create R()_12 } else {_12 panic("bad id")_12 }_12_12 // unnecessary, but added to avoid error_12 panic("unreachable")_12}
The improved type checker now detects and reports the unreachable code after the if-statement as an error:
_10error: unreachable statement_10--> test.cdc:12:4_10 |_1012| panic("unreachable")_10 | ^^^^^^^^^^^^^^^^^^^^_10exit status 1
To make the code valid, simply remove the unreachable code.
Semantics for Variables in For-Loop Statements Got Improved (FLIP 13)
💡 Motivation
Previously, the iteration variable of for-in
loops was re-assigned on each iteration.
Even though this is a common behavior in many programming languages, it is surprising behavior and a source of bugs.
The behavior was improved to the often assumed/expected behavior of a new iteration variable being introduced for each iteration, which reduces the likelihood for a bug.
ℹ️ Description
The behavior of for-in
loops improved, so that a new iteration variable is introduced for each iteration.
This change only affects few programs, as the behavior change is only noticeable if the program captures the iteration variable in a function value (closure).
This improvement was proposed in FLIP 13. To learn more, consult the FLIP and documentation.
✨ Example
Previously, values
would result in [3, 3, 3]
, which might be surprising and unexpected. This is because x
was reassigned the current array element on each iteration, leading to each function in fs
returning the last element of the array.
_14// Capture the values of the array [1, 2, 3]_14let fs: [((): Int)] = []_14for x in [1, 2, 3] {_14 // Create a list of functions that return the array value_14 fs.append(fun (): Int {_14 return x_14 })_14}_14_14// Evaluate each function and gather all array values_14let values: [Int] = []_14for f in fs {_14 values.append(f())_14}
References to Resource-Kinded Values Get Invalidated When the Referenced Values Are Moved (FLIP 1043)
💡 Motivation
Previously, when a reference is taken to a resource, that reference remains valid even if the resource was moved, for example when created and moved into an account, or moved from one account into another.
In other words, references to resources stayed alive forever. This could be a potential safety foot-gun, where one could gain/give/retain unintended access to resources through references.
ℹ️ Description
References are now invalidated if the referenced resource is moved after the reference was taken. The reference is invalidated upon the first move, regardless of the origin and the destination.
This feature was proposed in FLIP 1043. To learn more, please consult the FLIP and documentation.
✨ Example
_11// Create a resource._11let r <-createR()_11_11// And take a reference._11let ref = &r as &R_11_11// Then move the resource into an account._11account.save(<-r, to: /storage/r)_11_11// Update the reference._11ref.id = 2
Old behavior:
_10_10// This will also update the referenced resource in the account._10ref.id = 2
The above operation will now result in a static error.
_10_10// Trying to update/access the reference will produce a static error:_10// "invalid reference: referenced resource may have been moved or destroyed"_10ref.id = 2
However, not all scenarios can be detected statically. e.g:
_10fun test(ref: &R) {_10 ref.id = 2_10}
In the above function, it is not possible to determine whether the resource to which the reference was taken has been moved or not. Therefore, such cases are checked at run-time, and a run-time error will occur if the resource has been moved.
🔄 Adoption
Review code that uses references to resources, and check for cases where the referenced resource is moved. Such code may now be reported as invalid, or result in the program being aborted with an error when a reference to a moved resource is de-referenced.
Capability Controller API Replaced Existing Linking-based Capability API (FLIP 798)
💡 Motivation
Cadence encourages a capability-based security model. Capabilities are themselves a new concept that most Cadence programmers need to understand.
The existing API for capabilities was centered around “links” and “linking”, and the associated concepts of the public and private storage domains, led to capabilities being even confusing and awkward to use. An better API is easier to understand and easier to work with.
ℹ️ Description
The existing linking-based capability API has been replaced by a more powerful and easier to use API based on the notion of Capability Controllers. The new API makes the creation of new and the revocation of existing capabilities simpler.
This improvement was proposed in FLIP 798. To learn more, consult the FLIP and the documentation.
🔄 Adoption
Existing uses of the linking-based capability API must be replaced with the new Capability Controller API.
Removed | Replacement |
---|---|
AuthAccount.link , with private path | Account.capabilities.storage.issue |
AuthAccount.link , with public path | Account.capabilities.storage.issue and Account.capabilities.publish |
AuthAccount.linkAccount | AuthAccount.capabilities.account.issue |
AuthAccount.unlink , with private path | - Get capability controller: Account.capabilities.storage/account.get - Revoke controller: Storage/AccountCapabilityController.delete |
AuthAccount.unlink , with public path | - Get capability controller: Account.capabilities.storage/account.get - Revoke controller: Storage/AccountCapabilityController.delete - Unpublish capability: Account.capabilities.unpublish |
AuthAccount/PublicAccount.getCapability | Account.capabilities.get |
AuthAccount/PublicAccount.getCapability with followed borrow | Account.capabilities.borrow |
AuthAccount.getLinkTarget | N/A |
✨ Example
Assume there is a Counter
resource which stores a count, and it implements an interface HasCount
which is used to allow read access to the count.
_15access(all)_15resource interface HasCount {_15 access(all)_15 count: Int_15}_15_15access(all)_15resource Counter: HasCount {_15 access(all)_15 var count: Int_15_15 init(count: Int) {_15 self.count = count_15 }_15}
Granting access, before:
_12transaction {_12 prepare(signer: AuthAccount) {_12 signer.save(_12 <-create Counter(count: 42),_12 to: /storage/counter_12 )_12 signer.link<&{HasCount}>(_12 /public/hasCount,_12 target: /storage/counter_12 )_12 }_12}
Granting access, after:
_12transaction {_12 prepare(signer: auth(Storage, Capabilities)&Account) {_12 signer.save(_12 <-create Counter(count: 42),_12 to: /storage/counter_12 )_12 let cap = signer.capabilities.storage.issue<&{HasCount}>(_12 /storage/counter_12 )_12 signer.capabilities.publish(cap, at: /public/hasCount)_12 }_12}
Getting access, before:
_10access(all)_10fun main(): Int {_10 let counterRef = getAccount(0x1)_10 .getCapabilities<&{HasCount}>(/public/hasCount)_10 .borrow()!_10 return counterRef.count_10}
Getting access, after:
_10access(all)_10fun main(): Int {_10 let counterRef = getAccount(0x1)_10 .capabilities_10 .borrow<&{HasCount}>(/public/hasCount)!_10 return counterRef.count_10}
External Mutation Improvement (FLIP 89 & FLIP 86)
💡 Motivation
A previous version of Cadence (“Secure Cadence”), attempted to prevent a common safety foot-gun: Developers might use the let
keyword for a container-typed field, assuming it would be immutable.
Though Secure Cadence implements the Cadence mutability restrictions FLIP, it did not fully solve the problem / prevent the foot-gun and there were still ways to mutate such fields, so a proper solution was devised.
To learn more about the problem and motivation to solve it, please read the associated Vision document.
ℹ️ Description
The mutability of containers (updating a field of a composite value, key of a map, or index of an array) through references has changed: When a field/element is accessed through a reference, a reference to the accessed inner object is returned, instead of the actual object. These returned references are unauthorized by default, and the author of the object (struct/resource/etc.) can control what operations are permitted on these returned references by using entitlements and entitlement mappings. This improvement was proposed in two FLIPs:
To learn more, please consult the FLIPs and the documentation.
🔄 Adoption
As mentioned in the previous section, the most notable change in this improvement is that, when a field/element is accessed through a reference, a reference to the accessed inner object is returned, instead of the actual object. So developers would need to change their code to:
- Work with references, instead of the actual object, when accessing nested objects through a reference.
- Use proper entitlements for fields when they declare their own
struct
andresource
types.
✨ Example
Consider the below resource collection:
_15pub resource MasterCollection {_15 pub let kittyCollection: @Collection_15 pub let topshotCollection: @Collection_15}_15_15pub resource Collection {_15 pub(set)_15 var id: String_15_15 access(all)_15 var ownedNFTs: @{UInt64: NonFungibleToken.NFT}_15_15 access(all)_15 fun deposit(token:@NonFungibleToken.NFT) {... }_15}
Earlier, it was possible to mutate the inner collections, even if someone only had a reference to the MasterCollection
. e.g:
_10var masterCollectionRef:&MasterCollection =... // Directly updating the field_10masterCollectionRef.kittyCollection.id = "NewID"_10_10// Calling a mutating function_10masterCollectionRef.kittyCollection.deposit(<-nft)_10_10// Updating via the referencelet ownedNFTsRef=&masterCollectionRef.kittyCollection.ownedNFTs as &{UInt64: NonFungibleToken.NFT}_10destroy ownedNFTsRef.insert(key: 1234, <-nft)
Once this change is introduced, the above collection can be re-written as below:
_36pub resource MasterCollection {_36 access(KittyCollectorMapping)_36 let kittyCollection: @Collection_36_36 access(TopshotCollectorMapping)_36 let topshotCollection: @Collection_36}_36_36pub resource Collection {_36 pub(set)_36 var id: String_36_36 access(Identity)_36 var ownedNFTs: @{UInt64: NonFungibleToken.NFT}_36_36 access(Insert)_36 fun deposit(token:@NonFungibleToken.NFT) { /* ... */ }_36}_36_36// Entitlements and mappings for `kittyCollection`_36_36entitlement KittyCollector_36_36entitlement mapping KittyCollectorMapping {_36 KittyCollector -> Insert_36 KittyCollector -> Remove_36}_36_36// Entitlements and mappings for `topshotCollection`_36_36entitlement TopshotCollector_36_36entitlement mapping TopshotCollectorMapping {_36 TopshotCollector -> Insert_36 TopshotCollector -> Remove_36}
Then for a reference with no entitlements, none of the previously mentioned operations would be allowed:
_13var masterCollectionRef:&MasterCollection <- ... // Error: Cannot update the field. Doesn't have sufficient entitlements._13masterCollectionRef.kittyCollection.id = "NewID"_13_13// Error: Cannot directly update the dictionary. Doesn't have sufficient entitlements._13destroy masterCollectionRef.kittyCollection.ownedNFTs.insert(key: 1234,<-nft)_13destroy masterCollectionRef.ownedNFTs.remove(key: 1234)_13_13// Error: Cannot call mutating function. Doesn't have sufficient entitlements._13masterCollectionRef.kittyCollection.deposit(<-nft)_13_13// Error: `masterCollectionRef.kittyCollection.ownedNFTs` is already a non-auth reference.// Thus cannot update the dictionary. Doesn't have sufficient entitlements._13let ownedNFTsRef = &masterCollectionRef.kittyCollection.ownedNFTsas&{UInt64: NonFungibleToken.NFT}_13destroy ownedNFTsRef.insert(key: 1234, <-nft)
To perform these operations on the reference, one would need to have obtained a reference with proper entitlements:
_10var masterCollectionRef: auth{KittyCollector} &MasterCollection <- ... // Directly updating the field_10masterCollectionRef.kittyCollection.id = "NewID"_10_10// Updating the dictionary_10destroy masterCollectionRef.kittyCollection.ownedNFTs.insert(key: 1234, <-nft)_10destroy masterCollectionRef.kittyCollection.ownedNFTs.remove(key: 1234)_10_10// Calling a mutating function_10masterCollectionRef.kittyCollection.deposit(<-nft)
Removal Of Nested Type Requirements (FLIP 118)
💡 Motivation
Nested Type Requirements 3 were a fairly advanced concept of the language.
Just like an interface could require a conforming type to provide a certain field or function, it could also have required the conforming type to provide a nested type.
This is an uncommon feature in other programming languages and hard to understand.
In addition, the value of nested type requirements was never realized. While it was previously used in the FT and NFT contracts, the addition of other language features like interface inheritance and events being emittable from interfaces, there were no more uses case compelling enough to justify a feature of this complexity.
ℹ️ Description
Contract interfaces can no longer declare any concrete types (struct
, resource
or enum
) in their declarations, as this would create a type requirement. event
declarations are still allowed, but these create an event
type limited to the scope of that contract interface; this event
is not inherited by any implementing contracts. Nested interface declarations are still permitted, however.
This improvement was proposed in FLIP 118.
🔄 Adoption
Any existing code that made use of the type requirements feature should be rewritten not to use this feature.
Event Definition And Emission In Interfaces (FLIP 111)
💡 Motivation
In order to support the removal of nested type requirements, events have been made define-able and emit-able from contract interfaces, as events were among the only common uses of the type requirements feature.
ℹ️ Description
Contract interfaces may now define event types, and these events can be emitted from function conditions and default implementations in those contract interfaces.
This improvement was proposed in FLIP 111.
🔄 Adoption
Contract interfaces that previously used type requirements to enforce that concrete contracts which implement the interface should also declare a specific event, should instead define and emit that event in the interface.
✨ Example
Before:
A contract interface like the one below (SomeInterface
) used a type requirement to enforce that contracts which implement the interface also define a certain event (Foo
):
_16contract interface SomeInterface {_16 event Foo()_16//^^^^^^^^^^^ type requirement_16_16 fun inheritedFunction()_16}_16_16contract MyContract: SomeInterface {_16 event Foo()_16//^^^^^^^^^^^ type definition to satisfy type requirement_16_16 fun inheritedFunction() {_16// ..._16 emit Foo()_16 }_16}
After:
This can be rewritten to emit the event directly from the interface, so that any contracts that implement Intf
will always emit Foo
when inheritedFunction
is called:
_10contract interface Intf {_10 event Foo()_10//^^^^^^^^^^^ type definition_10_10 fun inheritedFunction() {_10 pre {_10 emit Foo()_10 }_10 }_10}
Force Destruction of Resources (FLIP 131)
💡 Motivation
It was previously possible to panic in the body of a resource or attachment’s destroy
method, effectively preventing the destruction or removal of that resource from an account. This could be used as an attack vector by handing people undesirable resources or hydrating resources to make them extremely large or otherwise contain undesirable content.
ℹ️ Description
Contracts may no longer define destroy
functions on their resources, and are no longer required to explicitly handle the destruction of resource fields. These will instead be implicitly destroyed whenever a resource is destroyed.
Additionally, developers may define a ResourceDestroyed
event in the body of a resource definition using default arguments, which will be lazily evaluated and then emitted whenever a resource of that type is destroyed.
This improvement was proposed in FLIP 131.
🔄 Adoption
Contracts that previously used destroy methods will need to remove them, and potentially define a ResourceDestroyed event to track destruction if necessary.
✨ Example
A pair of resources previously written as:
_24event E(id: Int)_24_24resource SubResource {_24 let id: Int_24 init(id: Int) {_24 self.id = id_24 }_24_24 destroy() {_24 emit E(id: self.id)_24 }_24}_24_24resource R {_24 let subR: @SubResource_24_24 init(id: Int) {_24 self.subR <- create SubResource(id: id)_24 }_24_24 destroy() {_24 destroy self.subR_24 }_24}
can now be equivalently written as:
_16resource SubResource {_16 event ResourceDestroyed(id: Int = self.id)_16 let id: Int_16_16 init(id: Int) {_16 self.id = id_16 }_16}_16_16resource R {_16 let subR: @SubResource_16_16 init(id: Int) {_16 self.subR <- create SubResource(id: id)_16 }_16}
New domainSeparationTag
parameter added to Crypto.KeyList.verify
💡 Motivation
KeyList
’s verify
function used to hardcode the domain separation tag ("FLOW-V0.0-user"
) used to verify each signature from the list. This forced users to use the same domain tag and didn’t allow them to scope their signatures to specific use-cases and applications. Moreover, the verify
function didn’t mirror the PublicKey
signature verification behaviour which accepts a domain tag parameter.
ℹ️ Description
KeyList
’s verify
function requires an extra parameter to specify the domain separation tag used to verify the input signatures. The tag is is a single string
parameter and is used with all signatures. This mirrors the behaviour of the simple public key signature verification.
🔄 Adoption
Contracts that use KeyList
need to update the calls to verify
by adding the new domain separation tag parameter. Using the tag as "FLOW-V0.0-user"
would keep the exact same behaviour as before the breaking change. Applications may also define a new domain tag for their specific use-case and use it when generating valid signatures, for added security against signature replays. Check the signature verification doc and specifically hashing with a tag for details on how to generate valid signatures with a tag.
✨ Example
A previous call to KeyList
’s verify
is written as:
_10let isValid = keyList.verify(_10 signatureSet: signatureSet,_10 signedData: signedData_10)
can now be equivalently written as:
_10let isValid = keyList.verify(_10 signatureSet: signatureSet,_10 signedData: signedData,_10 domainSeparationTag: "FLOW-V0.0-user"_10)
Instead of the existing hardcoded domain separation tag, a new domain tag can be defined, but it has to be also used when generating valid signatures, e.g. "my_app_custom_domain_tag"
.
FT / NFT Standard changes
In addition to the upcoming language changes, the Cadence 1.0 upgrade also includes breaking changes to core contracts - such as the FungibleToken and NonFungibleToken standards. All Fungible & Non-Fungible Token contracts will need to be updated to the new standard.
These interfaces are being upgraded to allow for multiple tokens per contract, fix some issues with the original standards, and introduce other various improvements suggested by the community.
- Original Proposal: http://forum.flow.com/t/streamlined-token-standards-proposal/3075
- Fungible Token Changes PR: WIP: V2 FungibleToken Standard by joshuahannan · Pull Request #77 · onflow/flow-ft · GitHub 5
- NFT Changes PR: https://github.com/onflow/flow-nft/pull/126 8
It will involve upgrading your token contracts with changes to events, function signatures, resource interface conformances, and other small changes.
There are some existing guides for upgrading your token contracts to the new standard:
More Resources
If you have any questions or need help with the upgrade, feel free to reach out to the Flow team on the Flow Discord.
Help is also available during the Cadence 1.0 Office Hours each week at 10:00am PST on the Flow Developer Discord.