Readme v.1.5.0.
The details of the BRFC mAPI Specification are available in BRFC mAPI Specification.
The golang (v1.1) implementation is no longer being maintained and has been moved to the golang-v1.1 branch.
The REST API can also be seen in the Swagger UI.
For support and general discussion of both the mAPI standard and the mAPI Reference Implementation, please join the following telegram group.
mAPI Reference Implementation requires access to Bitcoin SV node version 1.0.10 or newer. See Managing nodes for details how to connect to a bitcoin node.
For running in production, use Docker. Docker images can be downloaded from docker hub, or created as part of the build. See Deploying docker images for details on how to run them.
A SSL server certificate is required for installation. You can obtain the certificate from your IT support team. There are also services that issue free SSL certificates, such as letsencrypt.org. The certificate must be issued for the host with a fully qualified domain name. To use the server side certificate, you need to export it (including its corresponding private key) in PFX file format (*.pfx).
For setting up a development environment, optionally using Prometheus (a monitoring system & time series database) and Grafana (an open observability platform) see development.
mAPI Reference Implementation v1.5.0 implements mAPI Specification v1.5.0, which provides additional features for querying transaction data.
mAPI Reference Implementation has greatly improved resilience against adversities.
mAPI Reference Implementation records submitted transactions and monitors nodes’ mempool, so that if node fails after it has received a transaction, mAPI Reference Implementation resubmits the transaction on behalf of the user, where available.
If mAPI Reference Implementation resubmits a transaction or submits a transaction that has already been mined, and node returns an error such as TransactionAlreadyKnown, then mAPI Reference Implementation maps that into a successful result for the user.
If mAPI Reference Implementation gets mixed results from multiple nodes, it maps that into a successful result for the user.
If mAPI Reference Implementation returns a HTTP code 4xx (such as invalid input) then the user has an opportunity to fix the error and resubmit the transaction.
If mAPI Reference Implementation returns a HTTP code 5xx, then the user can try again later.
An indication that the transaction may be resubmitted is given by the submit transaction response payload failureRetryable
flag.
Where appropriate, warnings are given for non-existent DSNT transaction outputs. See DSNT specification.
mAPI Reference Implementation enables the user to obtain the Merkle proof for a transaction by querying it.
mAPI Reference Implementation enables the user to query various attributes of transaction outputs.
The mAPI Reference Implementation exposes different REST API interfaces:
It also provides a JSON Web Tokens (JWT) Manager to enable authenticated users to obtain special policy rates.
The public interface can be used to submit transactions and query transaction status. It is accessible to both authenticated and unauthenticated users, but authenticated users might get special fee rates.
The endpoints are implemented in accordance with the BRFC mAPI Specification and are summarised below.
The possibility of using JWT means that each REST command may additionally respond with HTTP code 401, Unauthorized if any supplied JWT token is invalid.
Note: Any /mapi/
REST call will return 5xx if node is unresponsive or the database is down.
GET /mapi/policyQuote
Responds with a policy quotation. This is a superset of the fee quotation (below).
The administrator may wish to offer special policy quotes to specific customers. The mAPI Reference Implementation supports JWT issued to authenticated users. The authenticated users include the JWT in their HTTP header and, as a result, receive special policy quotes.
If no JWT is supplied, then the call is anonymous (unauthenticated), and the default policy quote is supplied. If a JWT (created by the mAPI JWT Manager user or other JWT provider) is supplied, then the caller will receive the corresponding special policy quote. For this version of the mAPI Reference Implementation, the JWT must be created by the JWT manager and issued to the customer manually.
$ curl -H "Authorization:Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJleHAiOiIyMDIwLTEwLTE0VDExOjQ0OjA3LjEyOTAwOCswMTowMCIsIm5hbWUiOiJsb3cifQ.LV8kz02bwxZ21qgqCvmgWfbGZCtdSo9px47wQ3_6Zrk" localhost:5051/mapi/policyQuote
GET /mapi/feeQuote
Responds with a fee quotation. This is a subset of the policy quotation (above).
POST /mapi/tx
The body may also be binary.
{
"rawtx": "[transaction_hex_string]",
"callbackUrl": "https://your.service.callback/endpoint",
"callbackToken": "Authorization: <your_authorization_header>",
"merkleProof": true,
"merkleFormat": "TSC",
"dsCheck": true
}
Users may either poll the status of the transactions they have submitted, or employ the callback mechanism. Double spend and Merkle proof notifications will be sent to the callbackURL if supplied. Where recipients are using SPV Channels, this requires the channel to be set up and ready to receive messages.
There is a small possibility that no response will be forthcoming due to exceptional circumstances such as the node being reset.
Therefore the user may wish to keep a record of all transactions submitted, and if no response is obtained within an acceptable timescale (several seconds), the transaction may be resubmitted.
A JWT may be supplied as above, in order to authenticate the user and cause the associated special policy quote to be applied in computation of the Submit Transaction cost.
In the advent of node failing during transaction submission, authenticated users' transaction and policy quote data is available to enable resubmission of the same transaction by the same user.
GET /mapi/tx/{txid}?merkleProof=Boolean&merkleFormat=TSC
Responds with the status of the transaction with optional Merkle proof information.
POST /mapi/txs
This is similar to Submit Transaction, but an array of transactions may be sent.
POST /mapi/txouts?includeMempool=Boolean&returnField=confirmations
{
[
{ "txid": "0bc1733f05aae146c3641fd...57f60f19a430ffe867020619d54800", "n": 0 },
{ "txid": "d013adf525ed5feaffc6e9d...40566470181f099f1560343cdcfd00", "n": 0 },
{ "txid": "d013adf525ed5feaffc6e9d...40566470181f099f1560343cdcfd00", "n": 1 }
]
}
The Administrator Interface of the mAPI Reference Implementation manages policy quotes, nodes and special policy fee rates for the Public API.
These services are only available to the administrator. Authentication is performed through the Api-Key HTTP header. The value provided must match the one stored in the configuration variable RestAdminAPIKey
.
Note: Any /api/v1/
REST call will return 5xx if the database is down.
Policy Quotes may be specified for the unauthenticated users, or specific authenticated users.
To create a new policy quote use the following:
POST api/v1/PolicyQuote
Example with curl - add a policyQuote valid from 01/10/2022 for unauthenticated (anonymous) users (where identity is null):
$ curl -H "Api-Key: [RestAdminAPIKey]" \
-H "Content-Type: application/json" \
-X POST https://localhost:5051/api/v1/PolicyQuote \
-d "{ \"validFrom\": \"2022-10-01T12:00:00\", \
\"identity\": null, \"identityProvider\": null, \
\"fees\": [ \
{ \
\"feeType\": \"standard\", \
\"miningFee\": { \"satoshis\": 100, \"bytes\": 200 }, \
\"relayFee\": { \"satoshis\": 100, \"bytes\": 200 } }, \
{ \"feeType\": \"data\", \
\"miningFee\": { \"satoshis\": 100, \"bytes\": 200 }, \
\"relayFee\": { \"satoshis\": 100, \"bytes\": 200 } \
}], \
\"policies\": { \
\"skipscriptflags\": [\"MINIMALDATA\", \"DERSIG\", \
\"NULLDUMMY\", \"CLEANSTACK\"], \
\"maxtxsizepolicy\": 99999, \
\"datacarriersize\": 100000, \
\"maxscriptsizepolicy\": 100000, \
\"maxscriptnumlengthpolicy\": 100000, \
\"maxstackmemoryusagepolicy\": 10000000, \
\"limitancestorcount\": 1000, \
\"limitcpfpgroupmemberscount\": 10, \
\"acceptnonstdoutputs\": true, \
\"datacarrier\": true, \
\"maxstdtxvalidationduration\": 99, \
\"maxnonstdtxvalidationduration\": 100 \
} \
}"
Note: BSV Node v1.0.11 onwards no longer support "dustrelayfee" and "dustlimitfactor" policies and they must not be set. Doing so will cause an error when the user submits a transaction.
The parameters above are:
Parameter | Description |
---|---|
validFrom |
the timestamp from when the policy is valid. Only one policy should be valid for each identity (or the anonymous user) at any one time |
identity |
the identity of the user, or null for the anonymous user |
identityProvider |
the identity of the JWT authority, or null for the anonymous user |
fees |
fees charged by the miner (see feeSpec BRFC) |
callbacks |
IP addresses of DSNT servers (see specification) such as this mAPI reference implementation |
policies |
values of miner policies as configured by the administrator (below) |
To get a list of all policy quotes matching one or more criteria, use the following:
GET api/v1/PolicyQuote
You can filter fee quotes by providing additional optional criteria in the query string:
identity
- returns only fee quotes for users that authenticate with a JWT token that was issued to the specified identity
identityProvider
- returns only fee quotes for users that authenticate with a JWT token that was issued by the specified token authorityanonymous
- specify true
to return only fee quotes for anonymous (unauthenticated) userscurrent
- specify true
to return only fee quotes that are currently validvalid
- specify true
to return only fee quotes that are valid within QUOTE_EXPIRY_MINUTES (configured in the .env file)To get a list of all policy quotes (including expired ones) for all users use GET api/v1/PolicyQuote without filters.
To get a specific policy quote by identity
use:
GET api/v1/PolicyQuote/{identity}
Note: it is not possible to delete or update a policy quote once it is published, but it can be made obsolete by publishing a new policy quote.
Administrators can get the list of transactions that were sent to node but are not marked as accepted in the database with a given policyQuoteId {id} or a given identity {identity} for authenticated users or a given identityProvider {IDP} use:
GET api/v1/unconfirmedTxs?policyQuoteId={PQID}&identity={ID}&identityProvider={IDP}
At least one parameter must be supplied. The others are optional.
If no policies match the request, the response is HTTP code 400 “BadRequest”.
Administrators can delete the list of transactions that were sent to node but are not marked as accepted in the database with a given policyQuoteId {id} or a given identity {identity} for authenticated users or a given identityProvider {IDP} use:
DELETE api/v1/unconfirmedTxs?policyQuoteId={PQID}&identity={ID}&identityProvider={IDP}
At least one parameter must be supplied. The others are optional.
If no policies match the request, the response is HTTP code 400 “BadRequest”. A successful deletion will result in HTTP code 204 “NoContent”.
The reference implementation can communicate with one or more instances of bitcoind nodes.
Each node that is being added to the Merchant API must have zmq notifications enabled (pubhashblock, pubinvalidtx, pubdiscardedfrommempool) as well as invalidtxsink
set to ZMQ
. When enabling zmq notifications on the node, ensure that the URI that will be used for zmq notification is accessible from the host where the MerchantAPI will be running (WARNING: localhost (127.0.0.1) should only be used if bitcoin node and Merchant API are running on same host)
To create a new connection to a bitcoind instance use:
POST api/v1/Node
For example, to add a node with curl:
curl -H "Api-Key: [RestAdminAPIKey]" \
-H "Content-Type: application/json" \
-X POST https://localhost:5051/api/v1/Node \
-d "{ \"id\" : \"[host:port]\", \
\"username\": \"[username]\", \
\"password\": \"[password]\", \
\"remarks\": \"[remarks]\", \
\"zmqNotificationsEndpoint\": \"tcp://a.b.c.d:port\" \
}"
To update parameters for an existing bitcoind instance use:
PUT api/v1/Node/{nodeId}
To update a node's fields created with curl, use the authorization Api-Key: [RestAdminAPIKey]
and Content-Type: application/json
with the following JSON request body:
{
"id": "[host:port]",
"username": "[username]",
"password": "[newPassword]",
"remarks": "[remarks]",
"zmqNotificationsEndpoint": "[zmqNotificationsEndpoint]"
}
To remove a connection to an existing bitcoind instance, use:
DELETE api/v1/Node/{nodeId}
To get the list of parameters for a specific node, use:
GET api/v1/Node/{nodeId}
To get the list of parameters for all nodes, use:
GET api/v1/Node
NOTE: When returning connection parameters, the password is not returned for security reasons.
To view the status of Block Parser use:
GET api/v1/status/blockparser
Producing an output similar to:
{
"blocksProcessed": 136,
"blocksParsed": 136,
"...",
"lastBlockParseTime": {
"totalSeconds": 0.0769461,
"..."
},
"..."
}
To get information about all submitted transactions use:
GET api/v1/status/tx
Producing an output similar to:
{
"request": 123,
"txAuthenticatedUser": 100,
"txAnonymousUser": 23,
"tx": 123,
"avgBatch": 10,
"txSentToNode": 123,
"txAcceptedByNode": 123,
"txRejectedByNode": 0,
"txSubmitException": 0,
"txResponseSuccess": 110,
"txResponseFailure": 10,
"txResponseException": 3,
"submitTxDescription":
"Number of requests: 123, all transactions processed: 123 (authenticated: 100, anonymous: 23). \
Average batch: 10. \
Transactions sent to node: 123. \
Accepted by node: 123, rejected by node: 0, submit exceptions: 1. \
Transaction responses with success: 110, failure: 10 (retryable: 0), processing/exceptions: 3. \
All missing inputs: 6 (resent: 1, was mined: 2, invalid block: 3)."
}
To check the status of ZMQ subscriptions use:
GET api/v1/status/zmq
The reference implementation contains a JWT Manager that can be used to generate and verify validity of the JWTs. The JWT Manager supports symmetric encryption HS256
.
JWTs may be supplied by the administrator to users, who can then supply them when they invoke the public interface REST API calls.
The JWT authenticates the user and ensures that a special policy quote is applied.
The following command line options can be specified when generating a JWT:
Options:
-n, --name <name> (REQUIRED) Unique name of the subject that the token is being issued to
-d, --days <days> (REQUIRED) Days the token will be valid for
-k, --key <key> (REQUIRED) Shared secret used to sign the token (at least 16 characters)
-i, --issuer <issuer> (REQUIRED) Unique issuer of the token (for example the URI identifying the miner)
-a, --audience <audience> Intended audience for this JWT [default: merchant_api]
For example, generate the JWT by running this command:
$ TokenManager generate -n specialuser -i http://mysite.com -k thisisadevelopmentkey -d 1000
Token:{"alg":"HS256","typ":"JWT"}.{"sub":"specialuser","nbf":1599494789,"exp":1685894789,"iat":1599494789,"iss":"http://mysite.com","aud":"merchant_api"}
Valid until UTC: 4. 06. 2023 16:06:29
The following should be used as the authorization header:
Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiJzcGVjaWFsdXNlciIsIm5iZiI6MTU5OTQ5NDc4OSwiZXhwIjoxNjg1ODk0Nzg5LCJpYXQiOjE1OTk0OTQ3ODksImlzcyI6Imh0dHA6Ly9teXNpdGUuY29tIiwiYXVkIjoibWVyY2hhbnRfYXBpIn0.xbtwEKdbGv1AasXe_QYsmb5sURyrcr-812cX-Ps98Yk
Any authenticated user supplying this JWT will have a special policy quote applied. The special policy quote needs to be configured via the administrator interface as described above.
To validate a JWT, use the validate
command:
$ TokenManager validate -k thisisadevelopmentkey -t eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiJzcGVjaWFsdXNlciIsIm5iZiI6MTU5OTQ5NDc4OSwiZXhwIjoxNjg1ODk0Nzg5LCJpYXQiOjE1OTk0OTQ3ODksImlzcyI6Imh0dHA6Ly9teXNpdGUuY29tIiwiYXVkIjoibWVyY2hhbnRfYXBpIn0.xbtwEKdbGv1AasXe_QYsmb5sURyrcr-812cX-Ps98Yk
Token signature and time constraints are validated. Issuer and audience are not validated.
Token:
{"alg":"HS256","typ":"JWT"}.{"sub":"specialuser","nbf":1599494789,"exp":1685894789,"iat":1599494789,"iss":"http://mysite.com","aud":"merchant_api"}
For each transaction that is submitted to mAPI Reference Implementation it is possible for the submitter to include a DSNT output in the transaction according to the DSNT specification. The submitter may later receive a notification of a double spend or merkle proof via a callback URL that they included with the submit transaction request. mAPI Reference Implementation processes all requested notifications and sends them out as described below:
NOTIFICATION_MAX_NOTIFICATIONS_IN_BATCH
)NOTIFICATION_SLOW_HOST_THRESHOLD_MS
)The mAPI Reference Implementation Submit Transaction command enables use of Peer Channels for the message broker. This provides a secure transport mechanism to send messages from the miner to a merchant. Merchants or service providers may use other messaging systems to achieve the same goal.
Download docker images from here.
Or see below for building an image from this source kit.
Create a config
folder and save the SSL server certificate file (config
folder. This server certificate is required to set up TLS (SSL).
Copy the .crt files with the root and intermediate CA certificates that issued the SSL server certificates which are used by the callback endpoint. Each certificate must be exported as a Base-64 encoded X.509 file with a .crt extension type. This step is required if the callback endpoint uses SSL server certificates issued by an untrusted CA (such as a self signed certificate).
Create and copy the providers.json file into the config folder. A sample provider.json file is shown below:
{
"IdentityProviders": {
"Providers": [
{
"Issuer": "http://mysite.com",
"Audience": "http://myaudience.com",
"Algorithm": "HS256",
"SymmetricSecurityKey": "thisisadevelopmentkey"
}
]
}
}
Parameter | Description |
---|---|
Issuer | Token issuer |
Audience | Token audience |
Algorithm | (optional) Signing algorithm allowed for the token (if not set, HS256 will be used) |
SymmetricSecurityKey | Symmetric security key that the token should be signed with |
Populate all environment variables in the .env
file in the target folder:
Parameter | Description |
---|---|
Communications | |
HTTPSPORT | https port where the application will listen/run |
CERTIFICATEPASSWORD | Password of the *.pfx file in the config folder |
CERTIFICATEFILENAME | |
RESTADMIN_APIKEY | Authorization key for accessing administration interface |
ENABLEHTTP | Enables requests through http port when set to True. This should only be used for testing and must be set to False in the production environment in order to maintain security |
HTTPPORT | Http port where the application will listen/run. Default: port 80 |
RPC | |
RPC_CLIENT_REQUEST_TIMEOUT_SEC | Request timeout for single RPC call (without retries). Must match node's config RpcServerTimeout value. Default: 60 seconds |
RPC_CLIENT_MULTI_REQUEST_TIMEOUT_SEC | Request timeout for multi-RPC call (with retries). Default: 20 seconds |
RPC_CLIENT_NUM_OF_RETRIES | Maximum number of retries for multi-RPC call. Default: 3 |
RPC_CLIENT_WAIT_BETWEEN_RETRIES_MS | Wait between multi-RPC calls. Default: 100 milliseconds |
RPC_CLIENT_RPC_CALLS_ON_STARTUP_RETRIES | Number of retries for multi-RPC call on start-up. Default: 3 |
RPC_CLIENT_RPC_GET_BLOCK_TIMEOUT_MINUTES | Request timeout for RPC call GetBlock as stream. Default: 10 minutes |
RPC_CLIENT_RPC_GET_RAW_MEMPOOL_TIMEOUT_MINUTES | Request timeout for RPC call GetRawMempool. Default: 2 minutes |
ZMQ | |
ZMQ_CONNECTION_RPC_RESPONSE_TIMEOUT_SEC | Timeout for ZMQ subscription service RPC request calls. Default: 5 seconds |
ZMQ_STATS_LOG_PERIOD_MIN | Periodically log ZMQ statistics about nodes and subscriptions every n minutes. Default: 10 minutes |
ZMQ_CONNECTION_TEST_INTERVAL_SEC | How often the ZMQ subscription service tests that the connection with the node is still alive. Default: 60 seconds |
Logging | |
LOG_LEVEL_DEFAULT | Log levels 0..6 (Trace, Debug, Information, Warning, Error, Critical, None) defined here: https://learn.microsoft.com/en-us/aspnet/core/fundamentals/logging/?view=aspnetcore-6.0#log-level |
LOG_LEVEL_MICROSOFT | The log level for the general Microsoft components |
LOG_LEVEL_MICROSOFT_HOSTING_LIFETIME | The log level for the Microsoft.Hosting.Lifetime component |
LOG_LEVEL_HTTPCLIENT | The log level for the System.Net.Http.HttpClient component |
Blockchain | |
MAX_BLOCK_CHAIN_LENGTH_FOR_FORK | Verify block chain and parse blocks up to this limit. Default: 432 |
ENABLE_MISSING_PARENTS_RESUBMISSION | If true, and a transaction is reported to having missing inputs, then the program will resubmit any missing input transactions it holds. Node must have txindex=1 in bitcoin.conf. Default: false |
RESUBMIT_KNOWN_TRANSACTIONS | If true, submitted transactions will be sent to node even if they already exist in the database. Default: false |
MinerId | |
WIF_PRIVATEKEY | Private key that is used to sign responses (must be omitted if miner ID settings are specified, and vice versa) |
MINERID_SERVER_URL | URL pointing to the MinerID REST endpoint |
MINERID_SERVER_ALIAS | Alias to be used when communicating with the endpoint |
MINERID_SERVER_AUTHENTICATION | HTTP authentication header that will be used to when communicating with the endpoint, this should include the Bearer authentication keyword, for example:Bearer 2b4a73f333b0aa1a1dfb52….421d78e2efe183df9 |
MINERID_SERVER_REQUEST_TIMEOUT_SEC REST | request timeout for minerId. Default: 100 seconds |
Mempool Checker | |
MEMPOOL_CHECKER_DISABLED | Disable mempoolChecker service. Default: false |
MEMPOOL_CHECKER_INTERVAL_SEC | Interval when mempoolChecker will check and resubmit missing transactions if successful on previous try (errors Missing inputs and Already known are treated as success). Default: 60 (minimum 10) |
MEMPOOL_CHECKER_UNSUCCESSFUL_INTERVAL_SEC | Interval when mempoolChecker will check and resubmit transactions if previous try was terminated with an error (timeout, database exception) or not all of them were successfully submitted. Default: 10 |
MEMPOOL_CHECKER_BLOCKPARSER_QUEUED_MAX | Force submitting of transactions, even if some blocks are not parsed yet. Default:0 |
MEMPOOL_CHECKER_MISSING_INPUTS_RETRIES | How often transactions with missing inputs should be resubmitted. Default: 5 |
Double Spends | |
DELTA_BLOCKHEIGHT_FOR_DOUBLESPENDCHECK | Number of old blocks that are checked for double spends |
DS_HOST_BAN_TIME_SEC | See below |
DS_MAX_NUM_OF_TX_QUERIES | See below |
DS_CACHED_TX_REQUESTS_COOLDOWN_PERIOD_SEC | See below |
DS_MAX_NUM_OF_UNKNOWN_QUERIES | Maximum number of queries for unknown transaction ids allowed before a host will be banned |
DS_UNKNOWN_TX_QUERY_COOLDOWN_PERIOD_SEC | How long unknown transactions queries will be stored, before being discarded |
DS_SCRIPT_VALIDATION_TIMEOUT_SEC | Total time for script validation when nodes RPC method verifyScript will be called |
Database | |
DBCONNECTION_STARTUP_TEST_CONNECTION_MAX_RETRIES | On start-up try to connect to mAPI Reference Implementation database for the max specified number of retries. Default: 10 |
DBCONNECTION_STARTUP_COMMAND_TIMEOUT_MINUTES | If not null, override command timeout for the start-up database scripts execution - if null, the default command timeout is 30 seconds. Default: null |
DBCONNECTION_OPEN_CONNECTION_TIMEOUT_SEC | Database open connection timeout. Default: 30 seconds |
DBCONNECTION_OPEN_CONNECTION_MAX_RETRIES | Database open connection max retries - unless timeout is exceeded. Default: 3 |
CLEAN_UP_TX_AFTER_MEMPOOL_EXPIRED_DAYS | Number of days mempool transactions and blocks that are not on the active blockchain are kept. Must be the same as node’s config mempoolexpiry. Default: 14 days |
CLEAN_UP_TX_AFTER_DAYS | Number of days transactions and blocks that are on the active blockchain are kept in the database. Default: 3 days |
CLEAN_UP_TX_PERIOD_SEC | Time period of transactions clean-up check. Default: 1 hour |
Notifications | |
NOTIFICATION_NOTIFICATION_INTERVAL_SEC | Period when background service will retry sending notifications with an error |
NOTIFICATION_INSTANT_NOTIFICATION_TASKS | Maximum number of concurrent tasks for sending notifications to callback endpoints (must be between 2-100) |
NOTIFICATION_INSTANT_NOTIFICATIONS_QUEUE_SIZE | Maximum number of notifications waiting in instant queue before any new notifications will be scheduled for (slower) background delivery |
NOTIFICATION_MAX_NOTIFICATIONS_IN_BATCH | Maximum number of notifications per host being processed by delivery task at any one time |
NOTIFICATION_SLOW_HOST_THRESHOLD_MS | Callback response time threshold that determines whether host is deemed slow or fast |
NOTIFICATION_INSTANT_NOTIFICATIONS_SLOW_TASK_PERCENTAGE | Percent of notification tasks from NOTIFICATION_INSTANT_NOTIFICATION_TASKS that will be reserved for slow hosts |
NOTIFICATION_NO_OF_SAVED_EXECUTION_TIMES | Maximum number of callback response times saved for each host. Used to calculate average response time for a host |
NOTIFICATION_NOTIFICATIONS_RETRY_COUNT | Maximum number of retries for failed notifications, before abandoning retries |
NOTIFICATION_SLOW_HOST_RESPONSE_TIMEOUT_MS | Callback response timeout for slow host |
NOTIFICATION_FAST_HOST_RESPONSE_TIMEOUT_MS | Callback response timeout for fast host |
Policy Quotes | |
CALLBACK_IP_ADDRESSES | An array of IP addresses, separated by commas, which are sent to the merchant in response to GET PolicyQuote |
QUOTE_EXPIRY_MINUTES | Fee quote expiry period |
CHECK_FEE_DISABLED | Disable fee check |
Transaction Outputs | |
ALLOWED_TXOUT_FIELDS | Comma separated field names that may be used in the “returnField” parameter of the Query Transaction Outputs endpoint: scriptPubKey, scriptPubKeyLen, value, isStandard and confirmations |
DS_CACHED_TX_REQUESTS_COOLDOWN_PERIOD_SEC is how long the count of requests (queries or submits) for the same transaction id per host is accumulated, before being reset to 0. If the request count for the same transaction Id exceeds DS_MAX_NUM_OF_TX_QUERIES during this period, the host will be banned and removed from the whitelist. The host will have to desist from sending requests for the same transaction id for at least the cool-down period DS_HOST_BAN_TIME_SEC, before it will become acceptable (un-banned) and can successfully try again.
Run this command in the target folder to start the mAPI Reference Implementation application:
docker-compose up -d
The docker images are automatically pulled from the Docker Hub. Database updates are triggered when the application starts or when tests are run.
For development, the following will be needed:
To run the build script you must have git and docker installed. Get the source code with the git clone command. Build docker images for MerchantAPI App by running this command in the folder src/Deploy/
:
On Linux: ./build.sh
On Windows: build.bat
Upon a successful build, a new subfolder src/Deploy/Build
is created, where the .env
and docker-compose.yml
files will be found. The .env
file must be edited to enable deployment, as described above.
Perform the following set up steps:
DBConnectionString
(the connection string used by mAPI Reference Implementation), DBConnectionStringDDL
(the same as DBConnectionString, but with a user that is the owner of the database - it is used to upgrade the database) and DBConnectionStringMaster
(the same as DBConnectionString, but with a user that has admin privileges - it is used to create the database) settings in src/MerchantAPI/APIGateway/APIGateway.Rest/appsettings.Development.json
and src/MerchantAPI/APIGateway/APIGateway.Test.Functional/appsettings.Development.json
so that they point to your PostgreSQL serverBitcoindFullPath
in src/MerchantAPI/APIGateway/APIGateway.Test.Functional/appsettings.Development.json
so that it points to the bitcoind executable used during functional testssrc/MerchantAPI/APIGateway.Database/APIGateway/Database/scripts
to create a databaseIssue this command in the src/Deploy/Build
folder:
docker load -i merchantapiapp.tar
cd src/MerchantAPI/APIGateway/APIGateway.Rest
dotnet run
To run mAPI reference implementation with Prometheus and Grafana issue this command in the src/Deploy/Build
folder:
docker-compose -f docker-compose.yml -f docker-compose-dev.yml up
NOTE: docker-compose-dev.yml
will only be created when using the build script in section Building docker images
Run individual tests or run all tests with:
cd src/MerchantAPI/APIGateway/APIGateway.Test.Functional/
dotnet test
Set all the environment variables, as described in Populate all environment variables
above.
The following table lists additional configuration connection strings in docker-compose.yml:
Setting | Description |
---|---|
ConnectionStrings section | |
DBConnectionString | connection string for CRUD access to PostgreSQL database |
DBConnectionStringDDL | is the same as DBConnectionString, but with a database owner |
DBConnectionStringMaster | is the same as DBConnectionString, but with a database owner that has admin privileges (usually postgres) |
mAPI Reference Implementation can be configured to use a standalone Postgres database instead of mapi-db Docker container by updating the following connection strings in docker-compose.yml:
Setting | Description |
---|---|
ConnectionStrings:DBConnectionString | connection string to a user who has mapi_crud role granted |
ConnectionStrings:DBConnectionStringDDL | connection string to a user who has DDL privileges |
An additional requirement is the existence of a mapi_crud role.
To execute commands from this example, connect to the database created for mAPI Reference Implementation with admin privileges.
In this example we will create the mapi_crud role and two user roles. One user role (myddluser) has DDL priveleges and the other (mycruduser), has CRUD privileges.
Create pa_crud role
CREATE ROLE "mapi_crud" WITH
NOLOGIN
NOSUPERUSER
INHERIT
NOCREATEDB
NOCREATEROLE
NOREPLICATION;
Create a DDL user and make it the owner of the public schema
CREATE ROLE myddluser LOGIN
PASSWORD 'mypassword'
NOSUPERUSER INHERIT NOCREATEDB NOCREATEROLE NOREPLICATION;
ALTER SCHEMA public OWNER TO myddluser;
Create CRUD user and grant mapi_crud role
CREATE ROLE mycruduser LOGIN
PASSWORD 'mypassword'
NOSUPERUSER INHERIT NOCREATEDB NOCREATEROLE NOREPLICATION;
GRANT mapi_crud TO mycruduser;
Prometheus is configured to run on http://localhost:9080/. Check whether endpoints with metrics are healthy on http://localhost:9080/targets. Observe the mAPI reference implementation operation on http://localhost:9080/graph.
Data is scraped from https://localhost:5051/metrics every 15s. This is where all the metrics that are generated during the execution of MRI are available from. Administrator authentication is performed using the Authorization HTTP header with Bearer [RestAdminAPIKey]. The RestAdminAPIKey value provided must match the one stored in the Prometheus configuration file 'api-key.txt'.
Available metrics include:
mAPI reference implementation is configured to use Prometheus on http://host.docker.internal:9080. Check Grafana's datasources on http://localhost:3000/datasources. There are these predefined dashboards: Block parser, Transactions submission, Callbacks and Mempool checker, which can be accessed at http://localhost:3000/dashboards. Note: if running mAPI reference implementation on Windows and localhost is unreachable, try accessing 'host.docker.internal' instead.
This dashboard displays statistical data for Block Parser
This dashboard displays statistical data for Transaction Submissions
This dashboard displays statistical data for Transaction Callbacks
This dashboard displays statistical data for Mempool Checker
Default credentials | |
---|---|
Username: | admin |
Password: | admin |