零一企业以太坊使用的quorum源代码

xinstitute 80cf56d673 first commit před 10 měsíci
.github 80cf56d673 first commit před 10 měsíci
accounts 80cf56d673 first commit před 10 měsíci
build 80cf56d673 first commit před 10 měsíci
cmd 80cf56d673 first commit před 10 měsíci
common 80cf56d673 first commit před 10 měsíci
consensus 80cf56d673 first commit před 10 měsíci
console 80cf56d673 first commit před 10 měsíci
containers 80cf56d673 first commit před 10 měsíci
contracts 80cf56d673 first commit před 10 měsíci
core 80cf56d673 first commit před 10 měsíci
crypto 80cf56d673 first commit před 10 měsíci
docs 80cf56d673 first commit před 10 měsíci
eth 80cf56d673 first commit před 10 měsíci
ethclient 80cf56d673 first commit před 10 měsíci
ethdb 80cf56d673 first commit před 10 měsíci
ethstats 80cf56d673 first commit před 10 měsíci
event 80cf56d673 first commit před 10 měsíci
extension 80cf56d673 first commit před 10 měsíci
graphql 80cf56d673 first commit před 10 měsíci
internal 80cf56d673 first commit před 10 měsíci
les 80cf56d673 first commit před 10 měsíci
light 80cf56d673 first commit před 10 měsíci
log 80cf56d673 first commit před 10 měsíci
metrics 80cf56d673 first commit před 10 měsíci
miner 80cf56d673 first commit před 10 měsíci
mobile 80cf56d673 first commit před 10 měsíci
multitenancy 80cf56d673 first commit před 10 měsíci
node 80cf56d673 first commit před 10 měsíci
p2p 80cf56d673 first commit před 10 měsíci
params 80cf56d673 first commit před 10 měsíci
permission 80cf56d673 first commit před 10 měsíci
plugin 80cf56d673 first commit před 10 měsíci
private 80cf56d673 first commit před 10 měsíci
qlight 80cf56d673 first commit před 10 měsíci
raft 80cf56d673 first commit před 10 měsíci
rlp 80cf56d673 first commit před 10 měsíci
rpc 80cf56d673 first commit před 10 měsíci
signer 80cf56d673 first commit před 10 měsíci
swarm 80cf56d673 first commit před 10 měsíci
tests 80cf56d673 first commit před 10 měsíci
trie 80cf56d673 first commit před 10 měsíci
.bintray.json 80cf56d673 first commit před 10 měsíci
.dockerignore 80cf56d673 first commit před 10 měsíci
.gitattributes 80cf56d673 first commit před 10 měsíci
.gitignore 80cf56d673 first commit před 10 měsíci
.gitmodules 80cf56d673 first commit před 10 měsíci
.golangci.yml 80cf56d673 first commit před 10 měsíci
.mailmap 80cf56d673 first commit před 10 měsíci
.travis.yml 80cf56d673 first commit před 10 měsíci
AUTHORS 80cf56d673 first commit před 10 měsíci
BUILDING.md 80cf56d673 first commit před 10 měsíci
COPYING 80cf56d673 first commit před 10 měsíci
COPYING.LESSER 80cf56d673 first commit před 10 měsíci
Dockerfile 80cf56d673 first commit před 10 měsíci
Dockerfile.alltools 80cf56d673 first commit před 10 měsíci
Makefile 80cf56d673 first commit před 10 měsíci
NOTES.md 80cf56d673 first commit před 10 měsíci
README.md 80cf56d673 first commit před 10 měsíci
SECURITY.md 80cf56d673 first commit před 10 měsíci
appveyor.yml 80cf56d673 first commit před 10 měsíci
circle.yml 80cf56d673 first commit před 10 měsíci
go.mod 80cf56d673 first commit před 10 měsíci
go.sum 80cf56d673 first commit před 10 měsíci
interfaces.go 80cf56d673 first commit před 10 měsíci
logo.png 80cf56d673 first commit před 10 měsíci
mkdocs.yml 80cf56d673 first commit před 10 měsíci
oss-fuzz.sh 80cf56d673 first commit před 10 měsíci

README.md

Build Check Docker Pulls Discord

GoQuorum is an Ethereum-based distributed ledger protocol with transaction/contract privacy and new consensus mechanisms.

GoQuorum is a fork of go-ethereum and is updated in line with go-ethereum releases.

Key enhancements over go-ethereum:

  • Privacy - GoQuorum supports private transactions and private contracts through public/private state separation, and utilises peer-to-peer encrypted message exchanges (see Tessera) for directed transfer of private data to network participants
  • Alternative Consensus Mechanisms - with no need for POW/POS in a permissioned network, GoQuorum instead offers multiple consensus mechanisms that are more appropriate for consortium chains:
    • QBFT - Improved version of IBFT that is interoperable with Hyperledger Besu
    • Istanbul BFT - a PBFT-inspired consensus algorithm with transaction finality, by AMIS.
    • Clique POA Consensus - a default POA consensus algorithm bundled with Go Ethereum.
    • Raft-based Consensus - a consensus model for faster blocktimes, transaction finality, and on-demand block creation
  • Peer Permissioning - node/peer permissioning, ensuring only known parties can join the network
  • Account Management - GoQuorum introduced account plugins, which allows GoQuorum or clef to be extended with alternative methods of managing accounts including external vaults.
  • Pluggable Architecture - allows adding additional features as plugins to the core geth, providing extensibility, flexibility, and distinct isolation of GoQuorum features.
  • Higher Performance - GoQuorum offers significantly higher performance throughput than public geth

Architecture

GoQuorum Tessera Privacy Flow

The above diagram is very high-level overview of component architecture used by GoQuorum. For more in-depth discussion of the components and how they interact, please refer to lifecycle of a private transaction.

Quickstart

The easiest way to get started is to use * quorum-dev-quickstart - a command line tool that allows users to set up a development GoQuorum network on their local machine in less than 2 minutes.

GoQuorum Projects

Check out some of the interesting projects we are actively working on:

Official Docker Containers

The official docker containers can be found under https://hub.docker.com/u/quorumengineering/

Third Party Tools/Libraries

The following GoQuorum-related libraries/applications have been created by Third Parties and as such are not specifically endorsed by J.P. Morgan. A big thanks to the developers for improving the tooling around GoQuorum!

Contributing

GoQuorum is built on open source and we invite you to contribute enhancements. Upon review you will be required to complete a Contributor License Agreement (CLA) before we are able to merge. If you have any questions about the contribution process, please feel free to send an email to info@goquorum.com. Please see the Contributors guide for more information about the process.

Reporting Security Bugs

Security is part of our commitment to our users. At GoQuorum we have a close relationship with the security community, we understand the realm, and encourage security researchers to become part of our mission of building secure reliable software. This section explains how to submit security bugs, and what to expect in return.

All security bugs in GoQuorum and its ecosystem (Tessera, Cakeshop, ..etc) should be reported by email to security-quorum@consensys.net. Please use the prefix [security] in your subject. This email is delivered to GoQuorum security team. Your email will be acknowledged, and you'll receive a more detailed response to your email as soon as possible indicating the next steps in handling your report. After the initial reply to your report, the security team will endeavor to keep you informed of the progress being made towards a fix and full announcement.

If you have not received a reply to your email or you have not heard from the security team please contact any team member through GoQuorum slack security channel. Please note that GoQuorum discord channels are public discussion forum. When escalating to this medium, please do not disclose the details of the issue. Simply state that you're trying to reach a member of the security team.

Responsible Disclosure Process

GoQuorum project uses the following responsible disclosure process:

  • Once the security report is received it is assigned a primary handler. This person coordinates the fix and release process.
  • The issue is confirmed and a list of affected software is determined.
  • Code is audited to find any potential similar problems.
  • If it is determined, in consultation with the submitter, that a CVE-ID is required, the primary handler will trigger the process.
  • Fixes are applied to the public repository and a new release is issued.
  • On the date that the fixes are applied, announcements are sent to Quorum-announce.
  • At this point you would be able to disclose publicly your finding.

Note: This process can take some time. Every effort will be made to handle the security bug in as timely a manner as possible, however it's important that we follow the process described above to ensure that disclosures are handled consistently.

Receiving Security Updates

The best way to receive security announcements is to subscribe to the Quorum-announce mailing list/channel. Any messages pertaining to a security issue will be prefixed with [security].

Comments on This Policy If you have any suggestions to improve this policy, please send an email to info@goquorum.com for discussion.

License

The go-ethereum library (i.e. all code outside of the cmd directory) is licensed under the GNU Lesser General Public License v3.0, also included in our repository in the COPYING.LESSER file.

The go-ethereum binaries (i.e. all code inside of the cmd directory) is licensed under the GNU General Public License v3.0, also included in our repository in the COPYING file.

Any project planning to use the crypto/secp256k1 sub-module must use the specific secp256k1 standalone library licensed under 3-clause BSD.