Go Node and SDK for the NEO blockchain
Find a file
Alexey Savchuk df9247c00b services/rpcsrv: Return a new server by pointer
Before, a new server was returned by value which could cause
a panic `unlock of unlocked mutex` on SIGHUP handling. It's
because the new server overwrites a locked mutex of the already
existing server.

oct‚ 22 13:51:15 node1 neo-go[1183338]: fatal error: sync: Unlock of unlocked RWMutex
oct‚ 22 13:51:15 node1 neo-go[1183338]: goroutine 538 [running]:
oct‚ 22 13:51:15 node1 neo-go[1183338]: sync.fatal({0xf83d64?, 0xc001085880?})
oct‚ 22 13:51:15 node1 neo-go[1183338]:         runtime/panic.go:1007 +0x18
oct‚ 22 13:51:15 node1 neo-go[1183338]: sync.(*RWMutex).Unlock(0xc00019a4c8)
oct‚ 22 13:51:15 node1 neo-go[1183338]:         sync/rwmutex.go:208 +0x45
oct‚ 22 13:51:15 node1 neo-go[1183338]: github.com/nspcc-dev/neo-go/pkg/services/rpcsrv.(*Server).dropSubscriber(0xc00019a2c8, 0xc000a77740)
oct‚ 22 13:51:15 node1 neo-go[1183338]:         github.com/nspcc-dev/neo-go/pkg/services/rpcsrv/server.go:825 +0xce
oct‚ 22 13:51:15 node1 neo-go[1183338]: github.com/nspcc-dev/neo-go/pkg/services/rpcsrv.(*Server).handleWsReads(0xc00019a2c8, 0xc0034478c0, 0xc000af5f80, 0xc000a7
7740)
oct‚ 22 13:51:15 node1 neo-go[1183338]:         github.com/nspcc-dev/neo-go/pkg/services/rpcsrv/server.go:810 +0x266
oct‚ 22 13:51:15 node1 neo-go[1183338]: github.com/nspcc-dev/neo-go/pkg/services/rpcsrv.(*Server).handleHTTPRequest(0xc00019a2c8, {0x11c3900, 0xc003437dc0}, 0xc00
31945a0)
oct‚ 22 13:51:15 node1 neo-go[1183338]:         github.com/nspcc-dev/neo-go/pkg/services/rpcsrv/server.go:582 +0x54a
oct‚ 22 13:51:15 node1 neo-go[1183338]: net/http.HandlerFunc.ServeHTTP(0x471779?, {0x11c3900?, 0xc003437dc0?}, 0xc000943b68?)
oct‚ 22 13:51:15 node1 neo-go[1183338]:         net/http/server.go:2171 +0x29
oct‚ 22 13:51:15 node1 neo-go[1183338]: net/http.serverHandler.ServeHTTP({0xc000a77680?}, {0x11c3900?, 0xc003437dc0?}, 0x6?)
oct‚ 22 13:51:15 node1 neo-go[1183338]:         net/http/server.go:3142 +0x8e
oct‚ 22 13:51:15 node1 neo-go[1183338]: net/http.(*conn).serve(0xc0032030e0, {0x11c5220, 0xc000a76960})
oct‚ 22 13:51:15 node1 neo-go[1183338]:         net/http/server.go:2044 +0x5e8
oct‚ 22 13:51:15 node1 neo-go[1183338]: created by net/http.(*Server).Serve in goroutine 534
oct‚ 22 13:51:15 node1 neo-go[1183338]:         net/http/server.go:3290 +0x4b4

Signed-off-by: Alexey Savchuk <alexey.a.savchuk@yandex.com>
2024-11-05 15:05:25 +03:00
.docker *: migrate to Docker Compose V2 2024-08-06 15:51:17 +03:00
.github workflows: remove macos-12 support 2024-11-02 13:08:12 +03:00
cli services/rpcsrv: Return a new server by pointer 2024-11-05 15:05:25 +03:00
config BlockFetcher/BlockUploader: fix and add additional attributes 2024-10-23 13:52:06 +03:00
docs cli: add flag for skipping block uploading in upload-bin 2024-10-31 18:39:40 +03:00
examples nns: update neo-go dependency 2024-10-16 16:04:54 +03:00
internal services/rpcsrv: Return a new server by pointer 2024-11-05 15:05:25 +03:00
pkg services/rpcsrv: Return a new server by pointer 2024-11-05 15:05:25 +03:00
scripts scripts: keep go.mod tidy 2024-10-10 11:36:45 +03:00
.dockerignore Fix build node and docker-image 2019-08-26 19:32:09 +03:00
.gitignore linter: use org-wide version of linter 2024-09-25 21:47:45 +03:00
.gitmodules vm: update json tests to neo3 branch 2020-04-17 11:46:31 +03:00
CHANGELOG.md CHANGELOG: release 0.106.3 2024-07-29 18:35:16 +03:00
codecov.yml codecov: adjust codecov config and remove CircleCI coverage job 2022-02-03 16:21:15 +03:00
CONTRIBUTING.md [#2442] English Check 2022-05-04 19:48:27 +03:00
Dockerfile *: bump min Go to 1.21, use 1.23 by default 2024-08-23 19:11:06 +03:00
Dockerfile.wsc *: bump min Go to 1.21, use 1.23 by default 2024-08-23 19:11:06 +03:00
go.mod Merge pull request #3515 from nspcc-dev/block-fetcher 2024-09-12 11:45:31 +05:00
go.sum cli: add upload-bin 2024-10-17 11:56:07 +03:00
LICENSE.md *: update LICENSE.md 2023-08-23 14:26:45 +03:00
Makefile Makefile: adjust lint target 2024-10-11 12:41:06 +03:00
neo-go.service.template service file templating 2019-11-13 15:05:13 +03:00
README.md go.mod: update to Go 1.22+ 2024-08-30 17:00:11 +03:00
ROADMAP.md ROADMAP: update roadmap 2024-05-21 14:26:05 +03:00

NeoGo logo

Go Node and SDK for the Neo blockchain.


codecov GithubWorkflows Tests Report GoDoc GitHub release (latest SemVer) License

Overview

NeoGo is a complete platform for distributed application development built on top of and compatible with the Neo project. This includes, but not limited to (see documentation for more details):

The protocol implemented here is Neo N3-compatible, however you can also find an implementation of the Neo Legacy protocol in the master-2.x branch and releases before 0.80.0 (0.7X.Y track).

Getting started

Installation

NeoGo is distributed as a single binary that includes all the functionality provided (but smart contract compiler requires Go compiler to operate). You can grab it from releases page, use a Docker image (see Docker Hub for various releases of NeoGo, :latest points to the latest release) or build yourself.

Building

Building NeoGo requires Go 1.22+ and make:

make

The resulting binary is bin/neo-go. Notice that using some random revision from the master branch is not recommended (it can have any number of incompatibilities and bugs depending on the development stage), please use tagged released versions.

Building on Windows

To build NeoGo on Windows platform we recommend you to install make from MinGW package. Then, you can build NeoGo with:

make

The resulting binary is bin/neo-go.exe.

Running a node

A node needs to connect to some network, either local one (usually referred to as privnet) or public (like mainnet or testnet). Network configuration is stored in a file and NeoGo allows you to store multiple files in one directory (./config by default) and easily switch between them using network flags.

To start Neo node on a private network, use:

./bin/neo-go node

Or specify a different network with an appropriate flag like this:

./bin/neo-go node --mainnet

Available network flags:

  • --mainnet, -m
  • --privnet, -p
  • --testnet, -t

To run a consensus/committee node, refer to consensus documentation.

If you're running a node on Windows, please turn off or configure Windows Firewall appropriately (allowing inbound connections to the P2P port).

Docker

By default, the CMD is set to run a node on privnet. So, to do this, simply run:

docker run -d --name neo-go -p 20332:20332 -p 20331:20331 nspccdev/neo-go

Which will start a node on privnet and expose node's ports 20332 (P2P protocol) and 20331 (JSON-RPC server).

Importing mainnet/testnet dump files

If you want to jump-start your mainnet or testnet node with chain archives provided by NGD, follow these instructions:

$ wget .../chain.acc.zip # chain dump file
$ unzip chain.acc.zip
$ ./bin/neo-go db restore -m -i chain.acc # for testnet use '-t' flag instead of '-m'

The process differs from the C# node in that block importing is a separate mode. After it ends, the node can be started normally.

Running a private network

Refer to consensus node documentation.

Smart contract development

Please refer to NeoGo smart contract development workshop that shows some simple contracts that can be compiled/deployed/run using NeoGo compiler, SDK and a private network. For details on how Go code is translated to Neo VM bytecode and what you can and can not do in a smart contract, please refer to the compiler documentation.

Refer to examples for more Neo smart contract examples written in Go.

Wallets

NeoGo wallet is just a NEP-6 file that is used by CLI commands to sign various things. CLI commands are not a direct part of the node, but rather a part of the NeoGo binary, their implementations use RPC to query data from the blockchain and perform any required actions. It's not required to open a wallet on an RPC node (unless your node provides some service for the network like consensus or oracle nodes do).

Monitoring

NeoGo provides Prometheus and Pprof services that can be enabled in the node in order to provide additional monitoring and debugging data.

Configuring any of the two services is easy, add the following section (Pprof instead of Prometheus if you need that) to the respective config/protocol.*.yml:

  Prometheus:
    Enabled: true
    Addresses:
      - ":2112"

where you can switch on/off and define port. Prometheus is enabled and Pprof is disabled by default.

Contributing

Feel free to contribute to this project after reading the contributing guidelines.

Before starting to work on a certain topic, create a new issue first describing the feature/topic you are going to implement.

Contact

License

  • Open-source MIT