You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: crates/cheatnet/src/runtime_extensions/native/call.rs
+4-1Lines changed: 4 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -11,14 +11,17 @@ use blockifier::execution::syscalls::hint_processor::{
11
11
use blockifier::execution::syscalls::syscall_base::SyscallHandlerBase;
12
12
use starknet_types_core::felt::Felt;
13
13
14
+
// Based on https://github.com/software-mansion-labs/sequencer/blob/57447e3e8897d4e7ce7f3ec8d23af58d5b6bf1a7/crates/blockifier/src/execution/syscalls/syscall_base.rs#L435
14
15
#[expect(clippy::mut_mut)]
15
-
#[allow(clippy::result_large_err)]
16
+
#[expect(clippy::result_large_err)]
16
17
pubfnexecute_inner_call(
18
+
// region: Modified blockifier code
17
19
syscall_handler_base:&mutSyscallHandlerBase,
18
20
cheatnet_state:&mutCheatnetState,
19
21
call:&mutCallEntryPoint,
20
22
remaining_gas:&mutu64,
21
23
) -> BaseSyscallResult<Vec<Felt>>{
24
+
// endregion
22
25
let revert_idx = syscall_handler_base.context.revert_infos.0.len();
0 commit comments