yarn install
yarn db:migrate up
yarn lint:check
yarn test
With defaults:
yarn start
Starting at an arbitrary block (only works immediately after initial DB migration):
START_HEIGHT=800000 yarn start
You can run the ar.io gateway as a standalone docker container:
docker build . -t ar-io-core:latest
docker run -p 4000:4000 -v ar-io-data:/app/data ar-io-core:latest
To run with a specified start height (sets height on first run only):
docker run -e START_HEIGHT=800000 -v $PWD/data/:/app/data ar-io-core:latest
You can also run Envoy alongside an ar.io
node via Docker Compose. Envoy
will proxy routes to arweave.net
not yet implemented in the ar.io node.
docker compose up --build
Once running, requests can be directed to Envoy server at localhost:3000
.
You can run a Turbo ANS-104 data item bundler as a sidecar to the ar.io gateway service. This will allow the deployed system to accept data items and bundle them into a single transaction before submitting them to the network. The bundler's APIs will be reachable at the /bundler/
path. For more information on its APIs, you can access docs at /bundler/api-docs/
.
Note: A local bundler configured to integrate with an ar.io node relies upon GraphQL indexing of recently bundled and uploaded data to manage its pipeline operations. The ar.io node should have its indexes synced up to Arweave's current block height minus 18 blocks before starting up the bundler's services stack.
Bundling services are most easily managed via an independent docker compose file whose services share their network with that of the core services docker compose stack. This allows you to spin the services up when your core service is prepared to integrate with it, or down whenever you want without affecting your core services stack.
To get started, supply the required environment variables in an environment variables file (e.g. .env.bundler
) for the integration, most notably:
BUNDLER_ARWEAVE_WALLET
: a stringified JWK wallet used for uploading bundles to Arweave.ALLOW_LISTED_ADDRESSES
: a comma-separated list of allowed uploader wallet addresses (normalized). See Managing Bundler Access for more permissioning options.
See the .env.bundler.example
file for other important configuration options, including settings for serving bundler-uploaded data items instantly from your gateway.
Once environment variables are set, run docker compose with the bundler-specific compose file.
docker compose --env-file ./.env.bundler --file docker-compose.bundler.yaml up
Now, the bundler service will be running alongside the ar.io gateway. Your gateway will now accept data items at <your gateway url>/bundler/tx
🚀
By default, the bundler will only accept data items uploaded by data item signers whose normalized wallet addresses are in the ALLOW_LISTED_ADDRESSES
list. But the following other permissioning configuration schemes are possible:
Scheme | ALLOW_LISTED_ADDRESSES | SKIP_BALANCE_CHECKS | ALLOW_LISTED_SIGNATURE_TYPES | PAYMENT_SERVICE_BASE_URL |
---|---|---|---|---|
Allow specific wallets | comma-separated normalized wallet addresses | false | EMPTY or supplied | EMPTY |
Allow specific chains | EMPTY or supplied | false | arbundles sigtype int | EMPTY |
Allow all | n/a | true | n/a | n/a |
Allow none | EMPTY | false | EMPTY | EMPTY |
Allow payers | EMPTY or supplied | false | EMPTY or supplied | your payment svc url |
AO Compute Units are useful for interacting with AO Processes in manner that avoids Process side effects and that does not require gas payment via "Dry Runs".
AO CU's rely on bundlers to periodically upload checkpoint data for evaluated Process memory. Additionally, they rely on gateway GQL to find those checkpoints, Scheduler assignments for each Process, and more. The indexing workload to support arbitrary AO Processes is effectively the indexing workload for most of Arweave's recent history. However, most recent AO Testnet Processes's data was bundled by Turbo in dedicated bundles with the tag:
Bundler-App-Name: AO
Including that tag filter in your indexing filters and indexing data from block height 1378000 forward should include the vast majority of the needed testnet data.
If you control your own SU and can easily identify its L1 data transactions' tags, you can simply filter on those from a block height that captures all of the SU data for your processes of interest.
Similarly to the bundler sidecar, the CU service is most easily managed via an independent docker compose file whose services share their network with that of the core services docker compose stack.
To get started, supply the required environment variables in an environment variables file (e.g. .env.ao
) for the integration, most notably:
CU_WALLET
: a stringified JWK wallet used for uploading CU checkpoints to Arweave.PROCESS_CHECKPOINT_TRUSTED_OWNERS
: a comma-separated list of CU checkpoint uploader wallet addresses(normalized).
See the .env.ao.example
or the environment overrides in docker-compose.ao.yaml
file for other important configuration options.
Once environment variables are set, run docker compose with the ao-specific compose file.
docker compose --env-file ./.env.ao --file docker-compose.ao.yaml up
Now, the CU service will be running alongside the ar.io gateway. Within the docker network it can be reached at http://envoy:3000/ao/cu
and http://ao-cu:6363
. From the docker host machine, it can be reached at http://localhost:3000/ao/cu
and http://localhost:6363
. From your custom domain configured to forward traffic to envoy, it can be reached at <your gateway url>/ao/cu
.
When running via docker compose
, it will read a .env
file in the project root
directory and use the environment variables set there.
Add the following to your .env
file to proxy GraphQL to another server while
using the ar.io gateway to serve data (using arweave.net GraphQL as an example):
GRAPHQL_HOST=arweave.net
GRAPHQL_PORT=443
The ar.io gateway supports unbundling and indexing ANS-104 bundle data. To
enable this add the following environment variables to your .env
file:
ANS104_UNBUNDLE_FILTER="<filter string>"
ANS104_INDEX_FILTER="<filter string>"
ANS104_UNBUNDLE_FILTER
determines which TXs and data items (in the case of
nested bundles) are unbundled, and ANS104_INDEX_FILTER
determines which data
items within a bundle get indexed.
The following types of filters are supported:
{ "never": true } # the default
{ "always": true }
{ "attributes": { "owner_address": <owner address>, ... }}
{ "tags": [{ "name": <utf8 tag name>, "value": <utf8 tag value> }, { "name": <utf8 tag name> }, ...]}
{ "and": [ <nested filter>, ... ]}
{ "or": [ <nested filter>, ... ]}
{ "not": [ <nested filter>, ... ]}
Place an ANS-104 bundle at the start of the queue for unbundling and indexing on your gateway:
curl -X PUT -H "Authorization: Bearer <ADMIN_KEY>" \
-H "Content-Type: application/json" \
"http://<HOST>:<PORT>/ar-io/admin/queue-tx" \
-d '{ "id": "<ID>" }'
Note: ANS-104 indexing support is currently experimental. It has been tested successfully with small sets of bundles (using filters), but you may still encounter problems with it when indexing larger sets of transactions.
The ar.io gateway includes a feature to emit webhooks to specified servers when a transaction or data item is indexed and matches a predefined filter. This feature allows for real-time notifications and integrations based on the transaction and data indexing.
To use this feature, you need to set up two environment variables in your .env
file:
-
WEBHOOK_TARGET_SERVERS: This is a comma-separated list of servers where the webhooks will be sent.
Format:
WEBHOOK_TARGET_SERVERS="<server1>,<server2>,..."
-
WEBHOOK_INDEX_FILTER: This filter determines which transactions or data items will trigger the webhook emission.
-
WEBHOOK_BLOCK_FILTER: This filter determines which blocks will trigger the webhook emission.
The filter syntax is identical to ANS104_INDEX_FILTER
. Supported filter types include:
{ "never": true }
(default){ "always": true }
{ "attributes": { "owner": <owner key>, ... }}
{ "tags": [{ "name": <utf8 tag name>, "value": <utf8 tag value> }, { "name": <utf8 tag name> }, ...]}
{ "and": [ <nested filter>, ... ]}
{ "or": [ <nested filter>, ... ]}
Example: WEBHOOK_INDEX_FILTER="{ "tags": [{ "name": "App-Name", "value": "MyApp" }, { "name": "IPFS-Add" }]}"
After setting up the environment variables, the ar.io gateway will monitor for transactions or data items that match the WEBHOOK_INDEX_FILTER
. Once a match is found, a webhook will be emitted to all the servers listed in WEBHOOK_TARGET_SERVERS
.
Ensure that the target servers are configured to receive and process these webhooks appropriately.
Add the following to your .env
file to enable ArNS resolution:
ARNS_ROOT_HOST=<gateway-hostname>
For example if your gateway's hostname was my-gateway.net
your .env
would
contain the following:
ARNS_ROOT_HOST=my-gateway.net
This would allow you to resolve names like my-arns-name.my-gateway.net
provided
you correctly configured a wildcard DNS entry for your gateway.
Note: ArNS data ID resolution is currently delegated to arweave.dev
. Routing is
handled locally, but ArNS state is not yet computed locally. Local ArNS state
computation will be added in a future release. Also, be aware, ArNS is still using
a test contract. Resolved names should be considered temporary.
In order to participate in the ar.io network, gateways need
to associate themselves with a wallet. This can be configured by setting the
AR_IO_WALLET
environment variable. Once set, the associated wallet address is
visible via the /ar-io/info
endpoint.
Similarly, network participants must make observations of other gateways and
submit them. The wallet for this is configured using the OBSERVER_WALLET
environment variable. An associated key file is also required to upload
observation reports. The key file must be placed in
./wallets/<OBSERVER_WALLET>.json
(<OBSERVER_WALLET>
should be replaced with
the address of the wallet you are using).
HTTP endpoints under '/ar-io/admin' are protected by an admin API key. On startup,
the admin key is read from the ADMIN_API_KEY
environment variable. If no key is
set, a random key is generated and logged. To make a request to an admin endpoint
add an Authorization: Bearer <ADMIN_API_KEY>
header to your request.
Block a specific TX/data item ID on your gateway:
curl -X PUT -H "Authorization: Bearer <ADMIN_KEY>" \
-H "Content-Type: application/json" \
"http://<HOST>:<PORT>/ar-io/admin/block-data" \
-d '{ "id": "<ID>", "notes": "Example notes", "source": "Example source" }'
notes
and source
are for documentation only. source
is intended to be an
identifier of a particular source of IDs to block (e.g. the name of a
blocklist). notes
is a text field that can be used to further describe why a
particular ID is blocked.
The ar-io-node leverages Prometheus to collect metrics from the system and recommends Grafana to visualize them. To access a templated Grafana dashboard for the ar.io gateway, you can run:
docker compose --file docker-compose.grafana.yaml up -d
Once the dashboard is running, you can access it at
http://localhost:1024/grafana
and login with the username and password
admin
.
This dashboard is pre-configured to work with the ar.io gateway metrics exposed
via the ar-io-core
service and is ready to be used without any additional
configuration for simple observability. You can modify the dashboard to better
fit your needs by editing the dashboard.json
file. Refer to the Grafana
documentation to learn more about how to create and modify Grafana dashboards
using JSON model files.
- Code to interfaces.
- Separate IO from application logic.
- Make processes idempotent whenever possible.
- Separate mutable from immutable data.
- Avoid trusting data when the cost to validate it is low.
- To support rapid development iteration, All system components must be runnable in a single process.
- Keep the compile test suite blazingly fast.
- In general, prefer in-memory implementations over mocks and stubs.
- In general, prefer sociable over solitary tests.
- Commit messages should describe both what is being changed and why it is being changed.
- Make liberal use of Prometheus metrics to aid in monitoring and debugging.
- Follow the Prometheus metrics naming recommendations.