Go to file
Jitendra Bhurat 2608b97ae5 Updated the comment for checkIfNodeIsActive() to fix typo 2020-02-04 12:26:51 -05:00
.github update CONTRIBUTING.md with quorum wiki 2019-02-27 14:03:53 +08:00
accounts Merge remote-tracking branch 'remotes/origin/master' into permissions-master-merge 2019-10-04 11:20:58 +08:00
bmt swarm: network rewrite merge 2018-06-21 21:10:31 +02:00
build ignore swarm package when running tests for PR 2019-05-20 15:54:50 -04:00
cmd remove duplicated flag group: ETHASH (#924) 2020-01-13 09:10:26 -05:00
common Update file descriptor limits for macOS (#892) 2019-12-03 10:13:33 -05:00
consensus Add ability to see this nodes public address (that is used for signing) (#856) 2019-10-29 00:27:46 -04:00
console Bugfix/geth console displays incorrect block timestamp (#762) 2019-07-17 17:11:37 -04:00
containers Merge remote-tracking branch 'remotes/geth/release/1.8' into merge-193 2018-07-24 16:11:05 +08:00
contracts contracts/ens: expose Add and SetAddr in ENS (#17661) 2018-09-28 22:46:41 +02:00
core Rename the transaction manager package to make it more neutral (#895) 2020-01-08 11:15:55 -05:00
crypto Update file descriptor limits for macOS (#892) 2019-12-03 10:13:33 -05:00
dashboard Updating packages -- IGNORE WHEN MERGING UPSTREAM GETH (#743) 2019-06-17 15:59:41 -04:00
docs Merge branch 'master' into fix/raft-cluster-api 2020-02-01 12:55:43 +08:00
eth fix debug.traceTransaction VM in read-only mode error for public tx (#875) 2019-11-07 08:44:33 -05:00
ethclient Quorum private transaction support for Abigen (#819) 2019-10-01 12:49:26 -04:00
ethdb ethdb, rpc: support building on js/wasm (#17709) 2018-10-16 00:47:25 +02:00
ethstats ethstats: pass engine protocol name for quorum 2018-10-12 00:43:30 +08:00
event event/filter: delete unused package (#18063) 2018-11-08 14:26:29 +02:00
internal Add Quorum eth namespace RPC methods to console (#922) 2020-01-08 10:41:44 -05:00
les permission: refactor hex node id to avoid many changes 2019-09-09 16:19:57 -04:00
light Merge branch 'goeth-1.8.18' into geth-upgrade-1.8.18 2019-01-29 19:08:14 +08:00
log Quorum raft upgrade v3.3.13 (#887) 2019-12-04 09:24:31 -05:00
metrics metrics, p2p: add ephemeral registry (#18067) 2018-11-09 10:20:51 +01:00
miner Optimize travis and fix flaky tests (#873) 2019-11-06 12:05:14 -05:00
mobile Quorum private transaction support for Abigen (#819) 2019-10-01 12:49:26 -04:00
node permission: [WIP] start permission service 2019-08-20 09:33:54 -04:00
p2p p2p: fix connection leakage when peer is not authorized to connect (#897) 2019-12-03 15:36:31 -05:00
params Quorum v2.4.0 2019-12-04 13:18:33 -05:00
permission Moved event subscription out of go func to avoid race condition where in the event broadcast was completed even before the subscription was done in go func, resulting in permissions service not starting for the node. (#866) 2019-11-04 13:54:39 -05:00
private Rename the transaction manager package to make it more neutral (#895) 2020-01-08 11:15:55 -05:00
raft Updated the comment for checkIfNodeIsActive() to fix typo 2020-02-04 12:26:51 -05:00
rlp rlp: fix comment typo (#17640) 2018-09-11 18:05:28 +03:00
rpc Setting maxRequestContentLength to 5mb (#898) 2019-12-04 10:53:42 -05:00
signer signer: remove ineffectual assignments (#18049) 2018-11-07 14:55:54 +02:00
swarm Merge branch 'goeth-1.8.18' into geth-upgrade-1.8.18 2019-01-29 19:08:50 +08:00
tests Merge branch 'goeth-1.8.18' into geth-upgrade-1.8.18 2019-01-29 19:08:14 +08:00
trie Fix for overflow in parent tracking (cherrypicking go-ethereum#18165 pull) (#876) 2019-11-13 11:09:54 -05:00
vendor Quorum raft upgrade v3.3.13 (#887) 2019-12-04 09:24:31 -05:00
whisper whisper test: reduce the number of nodes in TestSimulation to reduce memory consumption while running in travis 2019-05-07 18:27:30 +08:00
.bintray.json Binaries distribution to Bintray (#623) 2019-01-23 15:10:09 -05:00
.dockerignore Docker: Add git commit hash (#554) 2018-10-22 15:00:03 -04:00
.gitattributes Merge attempt 2018-05-31 14:16:44 +08:00
.gitignore Automate release (#899) 2019-12-04 12:04:29 -05:00
.gitmodules Geth 1.7.2 rebase and addition of Istanbul BFT (#207) 2017-10-31 18:24:11 -04:00
.mailmap Merge attempt 2018-05-31 14:16:44 +08:00
.travis.yml Disabling swarm tests (#896) 2019-11-29 10:56:03 -05:00
AUTHORS all: switch out defunct set library to different one (#16873) 2018-07-16 10:54:19 +03:00
BUILDING.md Update BUILDING, adding Windows info 2019-02-25 12:39:46 -05:00
COPYING all: update license information 2015-07-07 14:12:44 +02:00
COPYING.LESSER all: update license information 2015-07-07 14:12:44 +02:00
Dockerfile Merge remote-tracking branch 'quorum/master' into geth-upgrade-1.8.16 2018-11-29 16:57:27 +08:00
Dockerfile.alltools travis, Dockerfile, appveyor, build: bump to Go 1.11 2018-09-19 11:29:29 +03:00
Makefile Automate release (#899) 2019-12-04 12:04:29 -05:00
NOTES.md Update NOTES.md 2018-12-03 10:04:37 -05:00
README.md readme: add badges for Docker Hub 2019-12-09 09:46:39 -05:00
appveyor.yml travis, appveyor: bump to Go 1.11.2 (#18031) 2018-11-07 13:17:41 +02:00
circle.yml circleci: enable docker based hive testing 2016-07-15 16:07:34 +03:00
interfaces.go eth/filters, ethereum: EIP-234 add blockHash param for eth_getLogs 2018-07-12 18:16:32 +03:00
logo.png Logo update 2019-05-02 17:55:22 -04:00
mkdocs.yml added api documentation for raft apis. 2020-01-31 12:26:25 +08:00

README.md

Quorum Slack Build Status Docker Cloud Build Status Documentation Status Download Docker Pulls

Quorum is an Ethereum-based distributed ledger protocol with transaction/contract privacy and new consensus mechanisms.

Quorum is a fork of go-ethereum and is updated in line with go-ethereum releases.

Key enhancements over go-ethereum:

  • Privacy - Quorum supports private transactions and private contracts through public/private state separation, and utilises peer-to-peer encrypted message exchanges (see Constellation and Tessera) for directed transfer of private data to network participants
  • Alternative Consensus Mechanisms - with no need for POW/POS in a permissioned network, Quorum instead offers multiple consensus mechanisms that are more appropriate for consortium chains:
    • Raft-based Consensus - a consensus model for faster blocktimes, transaction finality, and on-demand block creation
    • Istanbul BFT - a PBFT-inspired consensus algorithm with transaction finality, by AMIS.
  • Peer Permissioning - node/peer permissioning using smart contracts, ensuring only known parties can join the network
  • Higher Performance - Quorum offers significantly higher performance than public geth

Architecture

Quorum Tessera Privacy Flow

The above diagram is a high-level overview of the privacy architecture used by Quorum. For more in-depth discussion of the components, refer to the documentation site.

Quickstart

The quickest way to get started with Quorum is by following instructions in the Quorum Examples repository. This allows you to quickly create a network of Quorum nodes, and includes a step-by-step demonstration of the privacy features of Quorum.

Further Reading

Further documentation can be found in the docs folder and on the documentation site.

Official Docker Containers

The official docker containers can be found under https://hub.docker.com/u/quorumengineering/

See also

Third Party Tools/Libraries

The following Quorum-related libraries/applications have been created by Third Parties and as such are not specifically endorsed by J.P. Morgan. A big thanks to the developers for improving the tooling around Quorum!

Contributing

Quorum is built on open source and we invite you to contribute enhancements. Upon review you will be required to complete a Contributor License Agreement (CLA) before we are able to merge. If you have any questions about the contribution process, please feel free to send an email to info@goquorum.com.

Reporting Security Bugs

Security is part of our commitment to our users. At Quorum we have a close relationship with the security community, we understand the realm, and encourage security researchers to become part of our mission of building secure reliable software. This section explains how to submit security bugs, and what to expect in return.

All security bugs in Quorum and its ecosystem (Tessera, Constellation, Cakeshop, ..etc) should be reported by email to info@goquorum.com. Please use the prefix [security] in your subject. This email is delivered to Quorum security team. Your email will be acknowledged, and you'll receive a more detailed response to your email as soon as possible indicating the next steps in handling your report. After the initial reply to your report, the security team will endeavor to keep you informed of the progress being made towards a fix and full announcement.

If you have not received a reply to your email or you have not heard from the security team please contact any team member through quorum slack security channel. Please note that Quorum slack channels are public discussion forum. When escalating to this medium, please do not disclose the details of the issue. Simply state that you're trying to reach a member of the security team.

Responsible Disclosure Process

Quorum project uses the following responsible disclosure process:

  • Once the security report is received it is assigned a primary handler. This person coordinates the fix and release process.
  • The issue is confirmed and a list of affected software is determined.
  • Code is audited to find any potential similar problems.
  • If it is determined, in consultation with the submitter, that a CVE-ID is required, the primary handler will trigger the process.
  • Fixes are applied to the public repository and a new release is issued.
  • On the date that the fixes are applied, announcements are sent to Quorum-announce.
  • At this point you would be able to disclose publicly your finding.

Note: This process can take some time. Every effort will be made to handle the security bug in as timely a manner as possible, however it's important that we follow the process described above to ensure that disclosures are handled consistently.

Receiving Security Updates

The best way to receive security announcements is to subscribe to the Quorum-announce mailing list/channel. Any messages pertaining to a security issue will be prefixed with [security].

Comments on This Policy If you have any suggestions to improve this policy, please send an email to info@goquorum.com for discussion.

License

The go-ethereum library (i.e. all code outside of the cmd directory) is licensed under the GNU Lesser General Public License v3.0, also included in our repository in the COPYING.LESSER file.

The go-ethereum binaries (i.e. all code inside of the cmd directory) is licensed under the GNU General Public License v3.0, also included in our repository in the COPYING file.