A syscoin-core docker image with support for the following platforms:
amd64
(x86_64)arm32v7
(armv7)arm64
(aarch64, armv8)
4.3
,latest
(4.3/Dockerfile) [multi-arch]4.3-alpine
(4.3/alpine/Dockerfile)
Multi-architecture builds
The newest images (Debian-based, 0.19+) provide built-in support for multiple architectures. Running docker pull
on any of the supported platforms will automatically choose the right image for you as all of the manifests and artifacts are pushed to the Docker registry.
Picking the right tag
syscoin/syscoin-core:latest
: points to the latest stable release available of Syscoin Core. Caution when using in production as blindly upgrading Syscoin Core is a risky procedure.syscoin/syscoin-core:alpine
: same as above but using the Alpine Linux distribution (a resource efficient Linux distribution with security in mind, but not officially supported by the Syscoin Core team — use at your own risk).syscoin/syscoin-core:<version>
: based on a slim Debian image, this tag format points to a specific version branch (e.g.4.2
) or release of Syscoin Core (e.g.4.2.1
). Uses the pre-compiled binaries which are distributed by the Syscoin Core team.syscoin/syscoin-core:<version>-alpine
: same as above but using the Alpine Linux distribution.
Syscoin Core is a reference client that implements the Syscoin protocol for remote procedure call (RPC) use. It is also the second Syscoin client in the network's history. Learn more about Syscoin Core on the Syscoin Developer Reference docs.
This image contains the main binaries from the Syscoin Core project - syscoind
, syscoin-cli
and syscoin-tx
. It behaves like a binary, so you can pass any arguments to the image and they will be forwarded to the syscoind
binary:
❯ docker run --rm -it syscoin/syscoin-core \
-printtoconsole \
-regtest=1 \
-rpcallowip=172.17.0.0/16 \
-rpcauth='foo:7d9ba5ae63c3d4dc30583ff4fe65a67e$9e3634e81c11659e3de036d0bf88f89cd169c1039e6e09607562d54765c649cc'
Note: learn more about how -rpcauth
works for remote authentication.
By default, syscoind
will run as user syscoin
for security reasons and with its default data dir (~/.syscoin
). If you'd like to customize where syscoin-core
stores its data, you must use the BITCOIN_DATA
environment variable. The directory will be automatically created with the correct permissions for the syscoin
user and syscoin-core
automatically configured to use it.
❯ docker run --env BITCOIN_DATA=/var/lib/syscoin-core --rm -it syscoin/syscoin-core \
-printtoconsole \
-regtest=1
You can also mount a directory in a volume under /home/syscoin/.syscoin
in case you want to access it on the host:
❯ docker run -v ${PWD}/data:/home/syscoin/.syscoin -it --rm syscoin/syscoin-core \
-printtoconsole \
-regtest=1
You can optionally create a service using docker-compose
:
syscoin-core:
image: syscoin/syscoin-core
command:
-printtoconsole
-regtest=1
There are two communications methods to interact with a running Syscoin Core daemon.
The first one is using a cookie-based local authentication. It doesn't require any special authentication information as running a process locally under the same user that was used to launch the Syscoin Core daemon allows it to read the cookie file previously generated by the daemon for clients. The downside of this method is that it requires local machine access.
The second option is making a remote procedure call using a username and password combination. This has the advantage of not requiring local machine access, but in order to keep your credentials safe you should use the newer rpcauth
authentication mechanism.
Start by launch the Syscoin Core daemon:
❯ docker run --rm --name syscoin-server -it syscoin/syscoin-core \
-printtoconsole \
-regtest=1
Then, inside the running syscoin-server
container, locally execute the query to the daemon using syscoin-cli
:
❯ docker exec --user syscoin syscoin-server syscoin-cli -regtest getmininginfo
{
"blocks": 0,
"currentblocksize": 0,
"currentblockweight": 0,
"currentblocktx": 0,
"difficulty": 4.656542373906925e-10,
"errors": "",
"networkhashps": 0,
"pooledtx": 0,
"chain": "regtest"
}
In the background, syscoin-cli
read the information automatically from /home/syscoin/.syscoin/regtest/.cookie
. In production, the path would not contain the regtest part.
Before setting up remote authentication, you will need to generate the rpcauth
line that will hold the credentials for the Syscoind Core daemon. You can either do this yourself by constructing the line with the format <user>:<salt>$<hash>
or use the official rpcauth.py
script to generate this line for you, including a random password that is printed to the console.
Note: This is a Python 3 script. use [...] | python3 - <username>
when executing on macOS.
Example:
❯ curl -sSL https://raw.githubusercontent.com/syscoin/syscoin/master/share/rpcauth/rpcauth.py | python - <username>
String to be appended to syscoin.conf:
rpcauth=foo:7d9ba5ae63c3d4dc30583ff4fe65a67e$9e3634e81c11659e3de036d0bf88f89cd169c1039e6e09607562d54765c649cc
Your password:
qDDZdeQ5vw9XXFeVnXT4PZ--tGN2xNjjR4nrtyszZx0=
Note that for each run, even if the username remains the same, the output will be always different as a new salt and password are generated.
Now that you have your credentials, you need to start the Syscoin Core daemon with the -rpcauth
option. Alternatively, you could append the line to a syscoin.conf
file and mount it on the container.
Let's opt for the Docker way:
❯ docker run --rm --name syscoin-server -it syscoin/syscoin-core \
-printtoconsole \
-regtest=1 \
-rpcallowip=172.17.0.0/16 \
-rpcauth='foo:7d9ba5ae63c3d4dc30583ff4fe65a67e$9e3634e81c11659e3de036d0bf88f89cd169c1039e6e09607562d54765c649cc'
Two important notes:
- Some shells require escaping the rpcauth line (e.g. zsh), as shown above.
- It is now perfectly fine to pass the rpcauth line as a command line argument. Unlike
-rpcpassword
, the content is hashed so even if the arguments would be exposed, they would not allow the attacker to get the actual password.
You can now connect via syscoin-cli
or any other compatible client. You will still have to define a username and password when connecting to the Syscoin Core RPC server.
To avoid any confusion about whether or not a remote call is being made, let's spin up another container to execute syscoin-cli
and connect it via the Docker network using the password generated above:
❯ docker run -it --link syscoin-server --rm syscoin/syscoin-core \
syscoin-cli \
-rpcconnect=syscoin-server \
-regtest \
-rpcuser=foo\
-stdinrpcpass \
getbalance
Enter the password qDDZdeQ5vw9XXFeVnXT4PZ--tGN2xNjjR4nrtyszZx0=
and hit enter:
0.00000000
Note: under Syscoin Core < 0.16, use -rpcpassword="qDDZdeQ5vw9XXFeVnXT4PZ--tGN2xNjjR4nrtyszZx0="
instead of -stdinrpcpass
.
Done!
Depending on the network (mode) the Syscoin Core daemon is running as well as the chosen runtime flags, several default ports may be available for mapping.
Ports can be exposed by mapping all of the available ones (using -P
and based on what EXPOSE
documents) or individually by adding -p
. This mode allows assigning a dynamic port on the host (-p <port>
) or assigning a fixed port -p <hostPort>:<containerPort>
.
Example for running a node in regtest
mode mapping JSON-RPC/REST (18443) and P2P (18444) ports:
docker run --rm -it \
-p 18443:18443 \
-p 18444:18444 \
syscoin/syscoin-core \
-printtoconsole \
-regtest=1 \
-rpcallowip=172.17.0.0/16 \
-rpcbind=0.0.0.0 \
-rpcauth='foo:7d9ba5ae63c3d4dc30583ff4fe65a67e$9e3634e81c11659e3de036d0bf88f89cd169c1039e6e09607562d54765c649cc'
To test that mapping worked, you can send a JSON-RPC curl request to the host port:
curl --data-binary '{"jsonrpc":"1.0","id":"1","method":"getnetworkinfo","params":[]}' http://foo:[email protected]:18443/
- JSON-RPC/REST: 8368
- P2P: 8369
- Testnet JSON-RPC: 18368
- P2P: 18369
- JSON-RPC/REST: 18443
- P2P: 18444
- JSON-RPC/REST: 38332
- P2P: 38333
This image is officially supported on Docker version 17.09, with support for older versions provided on a best-effort basis.
License information for the software contained in this image.
License information for the syscoin/docker-syscoin-core docker project.