t-pool / indigo

Indigo - Proof of Authority Ethereum Blockchain

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Indigo

Indigo an Ethereum Proof of Authority blockchain. Indigo is based on and heavily modifies the amazing work done by GoChain. Currently, work in progress to add new features and better integrations with the Fulcrum ecosystem.

Building the source

Building indigo requires both a Go (version 1.9 or later) and a C compiler. You can install them using your favourite package manager. Once the dependencies are installed, run:

# install dependencies, one time only
make dep
# build indigo
make indigo

or, to build the full suite of utilities:

make all

Executables

The Indigo project comes with several wrappers/executables found in the cmd directory.

Command Description
indigo Our main Indigo CLI client. It is the entry point into the Indigo network (main-, test- or private net), capable of running as a full node (default) archive node (retaining all historical state) or a light node (retrieving data live). It can be used by other processes as a gateway into the Indigo network via JSON RPC endpoints exposed on top of HTTP, WebSocket and/or IPC transports. indigo --help and the CLI Wiki page for command line options.
abigen Source code generator to convert Indigo contract definitions into easy to use, compile-time type-safe Go packages. It operates on plain Ethereum contract ABIs with expanded functionality if the contract bytecode is also available. However it also accepts Solidity source files, making development much more streamlined. Please see our Native DApps wiki page for details.
bootnode Stripped down version of our Indigo client implementation that only takes part in the network node discovery protocol, but does not run any of the higher level application protocols. It can be used as a lightweight bootstrap node to aid in finding peers in private networks.
evm Developer utility version of the EVM (Ethereum Virtual Machine) that is capable of running bytecode snippets within a configurable environment and execution mode. Its purpose is to allow isolated, fine-grained debugging of EVM opcodes (e.g. evm --code 60ff60ff --debug).
gethrpctest Developer utility tool to support our ethereum/rpc-test test suite which validates baseline conformity to the Ethereum JSON RPC specs. Please see the test suite's readme for details.
rlpdump Developer utility tool to convert binary RLP (Recursive Length Prefix) dumps (data encoding used by the Ethereum protocol both network as well as consensus wise) to user friendlier hierarchical representation (e.g. rlpdump --hex CE0183FFFFFFC4C304050583616263).
swarm swarm daemon and tools. This is the entrypoint for the swarm network. swarm --help for command line options and subcommands. See https://swarm-guide.readthedocs.io for swarm documentation.

Running Indigo

Full node on the main Indigo network

By far the most common scenario is people wanting to simply interact with the Indigo network: create accounts; transfer funds; deploy and interact with contracts. For this particular use-case the user doesn't care about years-old historical data, so we can fast-sync quickly to the current state of the network. To do so:

$ indigo console

This command will:

  • Start Indigo in fast sync mode (default, can be changed with the --syncmode flag), causing it to download more data in exchange for avoiding processing the entire history of the Indigo network, which is very CPU intensive.
  • Start up Indigo's built-in interactive JavaScript console, (via the trailing console subcommand) through which you can invoke all official web3 methods as well as Indigo's own management APIs. This too is optional and if you leave it out you can always attach to an already running Indigo instance with indigo attach.

Full node on the Indigo test network

Transitioning towards developers, if you'd like to play around with creating Indigo contracts, you almost certainly would like to do that without any real money involved until you get the hang of the entire system. In other words, instead of attaching to the main network, you want to join the test network with your node, which is fully equivalent to the main network, but with play-GOC only.

$ indigo --testnet console

The console subcommand have the exact same meaning as above and they are equally useful on the testnet too. Please see above for their explanations if you've skipped to here.

Specifying the --testnet flag however will reconfigure your Indigo instance a bit:

  • Instead of using the default data directory (~/.indigo on Linux for example), Indigo will nest itself one level deeper into a testnet subfolder (~/.indigo/testnet on Linux). Note, on OSX and Linux this also means that attaching to a running testnet node requires the use of a custom endpoint since indigo attach will try to attach to a production node endpoint by default. E.g. indigo attach <datadir>/testnet/indigo.ipc. Windows users are not affected by this.
  • Instead of connecting the main Indigo network, the client will connect to the test network, which uses different P2P bootnodes, different network IDs and genesis states.

Note: Although there are some internal protective measures to prevent transactions from crossing over between the main network and test network, you should make sure to always use separate accounts for play-money and real-money. Unless you manually move accounts, Indigo will by default correctly separate the two networks and will not make any accounts available between them.

Configuration

As an alternative to passing the numerous flags to the indigo binary, you can also pass a configuration file via:

$ indigo --config /path/to/your_config.toml

To get an idea how the file should look like you can use the dumpconfig subcommand to export your existing configuration:

$ indigo --your-favourite-flags dumpconfig

Programatically interfacing Indigo nodes

As a developer, sooner rather than later you'll want to start interacting with Indigo network via your own programs and not manually through the console. To aid this, Indigo has built in support for a JSON-RPC based APIs (standard APIs and Indigo specific APIs). These can be exposed via HTTP, WebSockets and IPC (unix sockets on unix based platforms, and named pipes on Windows).

The IPC interface is enabled by default and exposes all the APIs supported by Indigo, whereas the HTTP and WS interfaces need to manually be enabled and only expose a subset of APIs due to security reasons. These can be turned on/off and configured as you'd expect.

HTTP based JSON-RPC API options:

  • --rpc Enable the HTTP-RPC server
  • --rpcaddr HTTP-RPC server listening interface (default: "localhost")
  • --rpcport HTTP-RPC server listening port (default: 8545)
  • --rpcapi API's offered over the HTTP-RPC interface (default: "eth,net,web3")
  • --rpccorsdomain Comma separated list of domains from which to accept cross origin requests (browser enforced)
  • --ws Enable the WS-RPC server
  • --wsaddr WS-RPC server listening interface (default: "localhost")
  • --wsport WS-RPC server listening port (default: 8546)
  • --wsapi API's offered over the WS-RPC interface (default: "eth,net,web3")
  • --wsorigins Origins from which to accept websockets requests
  • --ipcdisable Disable the IPC-RPC server
  • --ipcapi API's offered over the IPC-RPC interface (default: "admin,debug,eth,miner,net,personal,shh,txpool,web3")
  • --ipcpath Filename for IPC socket/pipe within the datadir (explicit paths escape it)

You'll need to use your own programming environments' capabilities (libraries, tools, etc) to connect via HTTP, WS or IPC to a Indigo node configured with the above flags and you'll need to speak JSON-RPC on all transports. You can reuse the same connection for multiple requests!

Note: Please understand the security implications of opening up an HTTP/WS based transport before doing so! Hackers on the internet are actively trying to subvert Indigo nodes with exposed APIs! Further, all browser tabs can access locally running webservers, so malicious webpages could try to subvert locally available APIs!

Contribution

Thank you for considering to help out with the source code! We welcome contributions from anyone on the internet, and are grateful for even the smallest of fixes!

If you'd like to contribute to Indigo, please fork, fix, commit and send a pull request for the maintainers to review and merge into the main code base.

Please make sure your contributions adhere to our coding guidelines:

  • Code must adhere to the official Go formatting guidelines (i.e. uses gofmt).
  • Code must be documented adhering to the official Go commentary guidelines.
  • Pull requests need to be based on and opened against the master branch.
  • Commit messages should be prefixed with the package(s) they modify.
    • E.g. "indigo, rpc: make trace configs optional"

License

The indigo library (i.e. all code outside of the cmd directory) is licensed under the GNU Lesser General Public License v3.0, also included in our repository in the COPYING.LESSER file.

The indigo binaries (i.e. all code inside of the cmd directory) is licensed under the GNU General Public License v3.0, also included in our repository in the COPYING file.

About

Indigo - Proof of Authority Ethereum Blockchain

License:GNU Lesser General Public License v3.0


Languages

Language:Go 82.6%Language:C 7.5%Language:JavaScript 6.0%Language:C++ 1.2%Language:Assembly 0.6%Language:Java 0.4%Language:Python 0.4%Language:M4 0.3%Language:NSIS 0.3%Language:Shell 0.3%Language:HTML 0.2%Language:Makefile 0.2%Language:Dockerfile 0.0%Language:Ruby 0.0%Language:CSS 0.0%