Upgrade Information
- Chain upgrade point: November 12th 2025, 14:00 UTC (approximately) at height
40007500 - Go version: v1.23
- Release: v9.0.0
Chain ID
The chain-id of the network will remain the same,pion-1. This is because an in-place migration of state will take place, i.e., this upgrade does not export any state.
System Requirements
- RAM: 64GB RAM is recommended to ensure a smooth upgrade
- Disk Space: Ensure you have enough disk space for the upgrade, as the state can grow twice during the upgrade process
Backups
Prior to the upgrade, validators are encouraged to take a full data snapshot. Snapshotting depends heavily on infrastructure, but generally this can be done by backing up the.neutrond directory. If you use Cosmovisor to upgrade, by default, Cosmovisor will backup your data upon upgrade. See below upgrade using cosmovisor section.
Current Runtime
The Neutron testnet network,pion-1, is currently running Neutron v8.0.0-rc0. We anticipate that operators who are running on v8.0.0-rc0, will be able to upgrade successfully. Validators are expected to ensure that their systems are up-to-date and capable of performing the upgrade. This includes running the correct binary, or if building from source, building with go 1.23.
Target Runtime
The Neutron testnet network,pion-1, will run Neutron v9.0.0. Operators MUST use this version post-upgrade to remain connected to the network.
Create the Updated Neutron Binary
Clone or Update Repository
Go to neutron directory if present else clone the repository:Build from Source
Follow these steps if neutron repo already present:Verify Installation
Check the new neutron version, verify the latest commit hash:Or Verify Downloaded Binary
Or check checksum of the binary if you decided to download it:LibWasm Version Check
Make sure you are using the proper version of libwasm. You can check the version you are currently using by running the following command:2.2.4.
If the version on your machine is different you MUST change it immediately!
Ways to Change LibWasmVM
- Use a statically built Neutrond binary from an official Neutron release: v9.0.0
-
Manual linking (if built from source): If you built Neutron binary by yourself, libwasmvm should be loaded dynamically in your binary and somehow, the wrong libwasmvm library was present on your machine. You can change it by downloading the proper one and linking it to the Neutron binary manually:
Upgrade Steps
There are 2 major ways to upgrade a node:- Manual upgrade
- Upgrade using Cosmovisor
- Either by manually preparing the new binary
- Or by using the auto-download functionality (this is not yet recommended)
Method I: Manual Upgrade
Make sure Neutron v9.0.0 is installed by either downloading a compatible binary, or building from source. Building from source requires Golang 1.23.x.1
Run Current Version
Run Neutron v8.0.0-rc0 till upgrade height, the node will panic:
2
Stop and Switch Binary
Stop the node, and switch the binary to Neutron v9.0.0 and re-start by
neutrond start.3
Wait for Network
It may take several minutes to a few hours until validators with a total sum voting power > 2/3 to complete their node upgrades. After that, the chain can continue to produce blocks.
Method II: Upgrade using Cosmovisor
Preparation
Install the latest version of Cosmovisor (1.5.0):Setup Directory Structure
1
Create Cosmovisor Folder
Create a Cosmovisor folder inside
$NEUTRON_HOME and move Neutron v8.0.0-rc0 into $NEUTRON_HOME/cosmovisor/genesis/bin:2
Prepare v9.0.0 Binary
Build Neutron v9.0.0, and move neutrond v9.0.0 to
$NEUTRON_HOME/cosmovisor/upgrades/v9.0.0/bin:3
Verify Structure
Then you should get the following structure:
Start with Cosmovisor
Export the environmental variables:Skipping the invariant checks is strongly encouraged since it decreases the upgrade time significantly and since there are some other improvements coming to the crisis module in the next release of the Cosmos SDK.
Expected Upgrade Result
When the upgrade block height is reached, Neutron will panic and stop. After upgrade, the chain will continue to produce blocks when validators with a total sum voting power > 2/3 complete their node upgrades.Upgrade Duration
Most likely it takes a couple of minutes.Rollback Plan
During the network upgrade, core Neutron team will be keeping an ever vigilant eye and communicating with operators on the status of their upgrades. During this time, the core team will listen to operator needs to determine if the upgrade is experiencing unintended challenges. In the event of unexpected challenges, the core team, after conferring with operators and attaining social consensus, may choose to declare that the upgrade will be skipped. Steps to skip this upgrade proposal are simply to resume the pion-1 network with the (downgraded) v8.0.0-rc0 binary using the following command:There is no particular need to restore a state snapshot prior to the upgrade height, unless specifically directed by core Neutron team.
Risks
As a validator performing the upgrade procedure on your consensus nodes carries a heightened risk of double-signing and being slashed. The most important piece of this procedure is verifying your software version and genesis file hash before starting your validator and signing. The riskiest thing a validator can do is discover that they made a mistake and repeat the upgrade procedure again during the network startup. If you discover a mistake in the process, the best thing to do is wait for the network to start before correcting it.FAQ
My node restarted in the middle of upgrade process (OOM killed, hardware issues, etc), is it safe to just proceed with the upgrade?
My node restarted in the middle of upgrade process (OOM killed, hardware issues, etc), is it safe to just proceed with the upgrade?
No. Most likely the upgrade will be completed successfully. But you get AppHash error after the network gets up. It’s a lot safer to restart full process from scratch (recover the node from a backup).To perform an upgrade you need to keep your
./data/priv_validator_state.json file when you are applying a snapshot from the backup. This will help you avoid the risk of slashing due to double signing.Additional Resources
- Testnet upgrade notes: GitHub - cosmos-testnets/v9.0.0_upgrade.md
- Release notes: v9.0.0 Release