Gobra is a prototype verifier for Go programs, based on the Viper verification infrastructure.
We call annotated Go programs Gobra programs and use the file extension .gobra
for them. A tutorial can be found in docs/tutorial.md
. More examples can be found in src/test/resources
.
- Java 64-Bit (tested with version 11 and 15)
- SBT (tested with version 1.4.4)
- Git
- Install Z3 and Boogie.
Steps (iii) and (iv) are specific to Boogie and only necessary when using Carbon as verification backend. Gobra uses the Silicon verification backend by default.
- Get a Z3 executable. A precompiled executable can be downloaded here. We tested version 4.8.7 64-Bit.
- Set the environment variable
Z3_EXE
to the path of your Z3 executable. - Get a Boogie executable. Instructions for compilation are given here. Mono is required on Linux and macOS to run Boogie. Alternatively, extract a compiled version from the Viper release tools (Windows, Linux, macOS).
- Set the environment variable
BOOGIE_EXE
to the path of your Boogie executable.
- Clone
gobra
(this repository) in your computer. - Change directory to the
gobra
directory created in the previous step. - Run
git submodule update --init --recursive
to fetchviperserver
and its transitive dependencies (carbon
,silicon
andsilver
). - Run
sbt compile
to compile Gobra.
The command sbt assembly
can also be used to produce a fat jar file, which is located by default in target/scala
.
Gobra can be run either from sbt or from a compiled jar:
- running from sbt:
- change directory to the
gobra
directory obtained from cloning this repository. - run
sbt
. - inside the sbt shell, run
run - i path/to/file
(e.g.,run -i src/test/resources/regressions/examples/swap.gobra
)
- change directory to the
- running from a compiled jar:
- run
java -jar -Xss128m path/to/gobra.jar -i path/to/file
.
- run
More information about the available options in Gobra can be found by running run --help
in an sbt shell or java -jar path/to/gobra.jar --help
if you assembled Gobra.
In the gobra
directory, run the command sbt test
.
By default, Gobra runs in sbt on a forked JVM. This means that simply attaching a debugger to sbt will not work. There are two workarounds:
- Run Gobra in a non-forked JVM by first running
set fork := false
in sbt. This will allow you to attach a debugger to sbt normally. However, for unknown reasons, this causes issues with class resolution in the Viper backend, so actually only the parsing can really be debugged. - Attach the debugger to the forked JVM.
- Create a debug configuration in IntelliJ and specify to
Attach to remote JVM
, setlocalhost
as host, and a port (e.g. 5005). - Run
set javaOptions += "-agentlib:jdwp=transport=dt_socket,server=y,suspend=y,address=5005"
in sbt (use any port you like, just make sure to use the same one in the debugger). Now, the forked JVM can be debugged instead of the sbt JVM. This requires starting the debugger again every time a new VM is created, e.g. for everyrun
.
- Create a debug configuration in IntelliJ and specify to
- Let the debugger listen to the forked JVM.
- Create a debug configuration in IntelliJ and specify to
Listen to remote JVM
, enable auto restart, setlocalhost
as host, and a port (e.g. 5005). - Run
set javaOptions += "-agentlib:jdwp=transport=dt_socket,server=n,address=localhost:5005,suspend=y"
in sbt. Thanks to auto restart, the debugger keeps listening even when the JVM is restarted, e.g. for everyrun
. Note however that the debugger must be running/listening as otherwise the JVM will emit a connection refused error.
- Create a debug configuration in IntelliJ and specify to
- VerifiedSCION
- Security of protocol implementations via refinement w.r.t. a Tamarin model. In particular, implementations of the signed Diffie-Hellman and WireGuard protocols have been verified.
- Security of protocol implementations verified entirely within Gobra. In particular, implementations of the Needham-Schroeder-Lowe, signed Diffie-Hellman, and WireGuard protocols have been verified.
Most Gobra sources are licensed under the Mozilla Public License Version 2.0.
The LICENSE lists the exceptions to this rule.
Note that source files (whenever possible) should list their license in a short header.
Continuous integration checks these file headers.
The same checks can be performed locally by running npx github:viperproject/check-license-header#v1 check --config .github/license-check/config.json --strict
in this repository's root directory.
Do you still have questions? Open an issue or contact us on Zulip.