[dependencies]
mtnmomo = "0.1.9"or you can use cargo add
cargo add mtnmomo
This library includes integration tests that require access to the MTN MoMo API. To skip these tests during development, you can use the skip-integration-tests feature:
# Run unit tests only (skip integration tests)
cargo test --features skip-integration-tests
# Or use the make command
make unit_testTo run the full integration tests (requires MTN MoMo API credentials):
# Run all tests including integration tests
make integration_test
# or
cargo test --test '*'This package provides for an easy way to connect to MTN MoMo API, it provides for the following products:
- Collection
- Disbursements
- Remittance
- Provisioning in case of sandbox environment
use mtnmomo::Momo;
use uuid::Uuid;
use dotenv::dotenv;
use std::env;
#[tokio::main]
async fn main() {
dotenv().ok();
let mtn_url = env::var("MTN_URL").expect("MTN_COLLECTION_URL must be set"); // https://sandbox.momodeveloper.mtn.com
let primary_key = env::var("MTN_COLLECTION_PRIMARY_KEY").expect("PRIMARY_KEY must be set");
let secondary_key = env::var("MTN_COLLECTION_SECONDARY_KEY").expect("SECONDARY_KEY must be set");
let momo = Momo::new_with_provisioning(mtn_url, primary_key.clone(), "webhook.site").await.unwrap();
let collection = momo.collection(primary_key, secondary_key);
}After initializing the Momo struct, you can then use the collection, disbursement or remittance methods to initialize the respective products. The products have methods that you can use to interact with the API. For example, to request a payment from a customer, you can use the request_to_pay method of the Collection product.
mtnmomo::Momo::new_with_provisioning is used to initialize the Momo struct with the sandbox environment.
mtnmomo::Momo::new is used to initialize the Momo struct with the production environment.
use mtnmomo::{Momo, Party, PartyIdType, Currency, RequestToPay};
use uuid::Uuid;
use dotenv::dotenv;
use std::env;
#[tokio::main]
async fn main() {
dotenv().ok();
let mtn_url = env::var("MTN_URL").expect("MTN_COLLECTION_URL must be set"); // https://sandbox.momodeveloper.mtn.com
let primary_key = env::var("MTN_COLLECTION_PRIMARY_KEY").expect("PRIMARY_KEY must be set");
let secondary_key = env::var("MTN_COLLECTION_SECONDARY_KEY").expect("SECONDARY_KEY must be set");
let momo = Momo::new_with_provisioning(mtn_url, primary_key.clone(), "webhook.site").await.unwrap();
let collection = momo.collection(primary_key, secondary_key);
let payer : Party = Party {
party_id_type: PartyIdType::MSISDN,
party_id: "46733123450".to_string(), // Use MTN sandbox test number
};
let request = RequestToPay::new("100".to_string(), Currency::EUR, payer, "test_payer_message".to_string(), "test_payee_note".to_string());
let result = collection.request_to_pay(request, Some("http://webhook.site/callback")).await;
}The above code will request a payment of 100 EUR from the customer with the phone number "46733123450" (MTN sandbox test number). In the sandbox environment, this test number will simulate a successful payment. The customer will receive a prompt on their phone to confirm the payment. If the customer confirms the payment, the payment will be processed and the customer will receive a confirmation message. If the customer declines the payment, the payment will not be processed and the customer will receive a message informing them that the payment was declined.
When using the sandbox environment, you should use MTN's predefined test phone numbers:
46733123450- Successful payment46733123451- Payment rejection46733123452- Payment expiry46733123453- Ongoing payment46733123454- Delayed payment (succeeds after 30 seconds)
This library includes an optional callback server feature for handling MTN MoMo webhooks. The callback server runs on port 8500 (localhost only) and processes payment notifications from MTN MoMo API.
To use the callback server, enable the callback-server feature:
[dependencies]
mtnmomo = { version = "0.1.9", features = ["callback-server"] }You can integrate the callback server directly into your application:
use mtnmomo::{CallbackServerConfig, start_callback_server};
use futures_util::StreamExt;
#[tokio::main]
async fn main() -> Result<(), Box<dyn std::error::Error>> {
// Configure the callback server (defaults to localhost:8500)
let config = CallbackServerConfig::default();
// Start the callback server
let mut callback_stream = start_callback_server(config).await?;
println!("Callback server started on http://127.0.0.1:8500");
println!("Health check available at: http://127.0.0.1:8500/health");
// Process incoming callbacks
while let Some(update) = callback_stream.next().await {
println!("Received callback from: {}", update.remote_address);
println!("Response: {:?}", update.response);
// Add your business logic here to handle different callback types
match &update.response {
mtnmomo::CallbackResponse::RequestToPaySuccess {
external_id,
amount,
currency,
..
} => {
println!("Processing successful payment: {} {} {}", external_id, amount, currency);
// Handle payment completion
}
mtnmomo::CallbackResponse::RequestToPayFailed {
external_id,
reason,
..
} => {
println!("Processing failed payment: {} {:?}", external_id, reason);
// Handle payment failure
}
_ => {
println!("Processing other callback type");
}
}
}
Ok(())
}When making API calls, use your callback server URLs through your reverse proxy:
// For payments
let callback_url = "https://your-domain.com/collection_request_to_pay";
let result = collection.request_to_pay(request, Some(callback_url)).await;
// For disbursements
let callback_url = "https://your-domain.com/disbursement_deposit_v1";
let result = disbursement.deposit(request, Some(callback_url)).await;The callback server provides endpoints for all MTN MoMo services:
-
Collection:
POST/PUT /collection_request_to_payPOST/PUT /collection_request_to_withdraw_v1POST/PUT /collection_request_to_withdraw_v2POST/PUT /collection_invoicePOST/PUT /collection_paymentPOST/PUT /collection_preapproval
-
Disbursements:
POST/PUT /disbursement_deposit_v1POST/PUT /disbursement_deposit_v2POST/PUT /disbursement_refund_v1POST/PUT /disbursement_refund_v2POST/PUT /disbursement_transfer
-
Remittances:
POST/PUT /remittance_cash_transferPOST/PUT /remittance_transfer
-
Health Check:
GET /health
For production deployments, use Caddy2 as a reverse proxy to handle TLS termination. Caddy2 automatically provisions and renews TLS certificates from Let's Encrypt.
- Install Caddy2:
# For Ubuntu/Debian
sudo apt install -y debian-keyring debian-archive-keyring apt-transport-https
curl -1sLf 'https://dl.cloudsmith.io/public/caddy/stable/gpg.key' | sudo gpg --dearmor -o /usr/share/keyrings/caddy-stable-archive-keyring.gpg
curl -1sLf 'https://dl.cloudsmith.io/public/caddy/stable/debian.deb.txt' | sudo tee /etc/apt/sources.list.d/caddy-stable.list
sudo apt update
sudo apt install caddy- Create a Caddyfile:
# /etc/caddy/Caddyfile
your-domain.com {
reverse_proxy 127.0.0.1:8500
}- Start Caddy:
sudo systemctl start caddy
sudo systemctl enable caddyWith this configuration:
- Caddy2 will automatically obtain a TLS certificate for
your-domain.com - All HTTPS traffic to
your-domain.comwill be forwarded to the callback server on port 8500 - The callback server receives plain HTTP traffic but clients connect via HTTPS
For local testing with a custom domain, you can use Caddy2 with a hosts file entry:
- Add an entry to your hosts file:
# /etc/hosts
127.0.0.1 test.domain.com- Create a Caddyfile for local testing:
# /etc/caddy/Caddyfile
test.domain.com {
reverse_proxy 127.0.0.1:8500
tls internal
}- Restart Caddy:
sudo systemctl restart caddyNow you can access your callback server at https://test.domain.com with a valid TLS certificate (internal CA for local testing).
- π‘ Complete Callback Coverage: Handles all MTN MoMo callback types
- π©Ί Health Monitoring: Built-in health check endpoint for load balancers
- π‘οΈ Production Ready: Graceful shutdown, structured logging, comprehensive error handling
- π§ Library Integration: Can be integrated directly into your application
- π Stream-based Processing: Process callbacks as a stream for easy integration
- π TLS with Caddy2: Production-ready TLS termination with automatic certificate management