Browse Source

migrate to 0.4.4

Manuel Araoz 9 years ago
parent
commit
83f4104699

+ 1 - 1
contracts/Bounty.sol

@@ -1,4 +1,4 @@
-pragma solidity ^0.4.0;
+pragma solidity ^0.4.4;
 import './PullPayment.sol';
 import './Killable.sol';
 

+ 1 - 1
contracts/ERC20.sol

@@ -1,4 +1,4 @@
-pragma solidity ^0.4.0;
+pragma solidity ^0.4.4;
 
 
 // see https://github.com/ethereum/EIPs/issues/20

+ 1 - 1
contracts/Killable.sol

@@ -1,4 +1,4 @@
-pragma solidity ^0.4.0;
+pragma solidity ^0.4.4;
 import "./Ownable.sol";
 
 /*

+ 1 - 1
contracts/LimitFunds.sol

@@ -1,4 +1,4 @@
-pragma solidity ^0.4.0;
+pragma solidity ^0.4.4;
 contract LimitFunds {
 
   uint LIMIT = 5000;

+ 1 - 1
contracts/Migrations.sol

@@ -1,4 +1,4 @@
-pragma solidity ^0.4.0;
+pragma solidity ^0.4.4;
 contract Migrations {
   address public owner;
   uint public last_completed_migration;

+ 1 - 1
contracts/Ownable.sol

@@ -1,4 +1,4 @@
-pragma solidity ^0.4.0;
+pragma solidity ^0.4.4;
 
 /*
  * Ownable

+ 1 - 1
contracts/PullPayment.sol

@@ -1,4 +1,4 @@
-pragma solidity ^0.4.0;
+pragma solidity ^0.4.4;
 /*
  * PullPayment
  * Base contract supporting async send for pull payments.

+ 0 - 9
contracts/Rejector.sol

@@ -1,9 +0,0 @@
-pragma solidity ^0.4.0;
-/*
- * Rejector
- * Base contract for rejecting direct deposits.
- * Fallback function throws immediately.
- */
-contract Rejector {
-  function() { throw; }
-}

+ 1 - 1
contracts/SafeMath.sol

@@ -1,4 +1,4 @@
-pragma solidity ^0.4.0;
+pragma solidity ^0.4.4;
 
 /**
  * Math operations with safety checks

+ 1 - 1
contracts/StandardToken.sol

@@ -1,4 +1,4 @@
-pragma solidity ^0.4.0;
+pragma solidity ^0.4.4;
 
 import './ERC20.sol';
 import './SafeMath.sol';

+ 1 - 1
contracts/Stoppable.sol

@@ -1,4 +1,4 @@
-pragma solidity ^0.4.0;
+pragma solidity ^0.4.4;
 
 import "./Ownable.sol";
 /*

+ 1 - 1
contracts/examples/BadArrayUse.sol

@@ -1,4 +1,4 @@
-pragma solidity ^0.4.0;
+pragma solidity ^0.4.4;
 import '../PullPayment.sol';
 
 // UNSAFE CODE, DO NOT USE!

+ 1 - 1
contracts/examples/BadFailEarly.sol

@@ -1,4 +1,4 @@
-pragma solidity ^0.4.0;
+pragma solidity ^0.4.4;
 // UNSAFE CODE, DO NOT USE!
 
 contract BadFailEarly {

+ 1 - 1
contracts/examples/BadPushPayments.sol

@@ -1,4 +1,4 @@
-pragma solidity ^0.4.0;
+pragma solidity ^0.4.4;
 // UNSAFE CODE, DO NOT USE!
 
 contract BadPushPayments {

+ 1 - 1
contracts/examples/GoodArrayUse.sol

@@ -1,4 +1,4 @@
-pragma solidity ^0.4.0;
+pragma solidity ^0.4.4;
 import '../PullPayment.sol';
 
 contract GoodArrayUse is PullPayment {

+ 1 - 1
contracts/examples/GoodFailEarly.sol

@@ -1,4 +1,4 @@
-pragma solidity ^0.4.0;
+pragma solidity ^0.4.4;
 
 contract GoodFailEarly {
 

+ 1 - 1
contracts/examples/GoodPullPayments.sol

@@ -1,4 +1,4 @@
-pragma solidity ^0.4.0;
+pragma solidity ^0.4.4;
 contract GoodPullPayments {
   address highestBidder;
   uint highestBid;

+ 2 - 4
contracts/examples/ProofOfExistence.sol

@@ -1,12 +1,10 @@
-pragma solidity ^0.4.0;
-
-import "../Rejector.sol";
+pragma solidity ^0.4.4;
 
 /*
  * Proof of Existence example contract
  * see https://medium.com/zeppelin-blog/the-hitchhikers-guide-to-smart-contracts-in-ethereum-848f08001f05
  */
-contract ProofOfExistence is Rejector {
+contract ProofOfExistence {
 
   mapping (bytes32 => bool) public proofs;
 

+ 1 - 1
contracts/examples/PullPaymentBid.sol

@@ -1,4 +1,4 @@
-pragma solidity ^0.4.0;
+pragma solidity ^0.4.4;
 
 import '../PullPayment.sol';
 

+ 1 - 1
contracts/examples/StoppableBid.sol

@@ -1,4 +1,4 @@
-pragma solidity ^0.4.0;
+pragma solidity ^0.4.4;
 
 import '../PullPayment.sol';
 import '../Stoppable.sol';

+ 1 - 1
contracts/test-helpers/InsecureTargetMock.sol

@@ -1,4 +1,4 @@
-pragma solidity ^0.4.0;
+pragma solidity ^0.4.4;
 
 contract InsecureTargetMock {
   function checkInvariant() returns(bool){

+ 1 - 1
contracts/test-helpers/PullPaymentMock.sol

@@ -1,4 +1,4 @@
-pragma solidity ^0.4.0;
+pragma solidity ^0.4.4;
 import '../PullPayment.sol';
 
 // mock class using PullPayment

+ 1 - 1
contracts/test-helpers/SecureTargetMock.sol

@@ -1,4 +1,4 @@
-pragma solidity ^0.4.0;
+pragma solidity ^0.4.4;
 
 contract SecureTargetMock {
   function checkInvariant() returns(bool){

+ 1 - 1
contracts/test-helpers/StandardTokenMock.sol

@@ -1,4 +1,4 @@
-pragma solidity ^0.4.0;
+pragma solidity ^0.4.4;
 import '../StandardToken.sol';
 
 // mock class using StandardToken

+ 1 - 1
contracts/test-helpers/StoppableMock.sol

@@ -1,4 +1,4 @@
-pragma solidity ^0.4.0;
+pragma solidity ^0.4.4;
 import '../Stoppable.sol';
 
 // mock class using Stoppable

+ 1 - 1
contracts/token/CrowdsaleToken.sol

@@ -1,4 +1,4 @@
-pragma solidity ^0.4.0;
+pragma solidity ^0.4.4;
 
 import "../StandardToken.sol";
 

+ 1 - 1
contracts/token/SimpleToken.sol

@@ -1,4 +1,4 @@
-pragma solidity ^0.4.0;
+pragma solidity ^0.4.4;
 
 import "../StandardToken.sol";
 

+ 1 - 1
test/TestOwnable.sol

@@ -1,4 +1,4 @@
-pragma solidity ^0.4.0;
+pragma solidity ^0.4.4;
 import "truffle/Assert.sol";
 import "truffle/DeployedAddresses.sol";
 import "../contracts/Ownable.sol";