Please check the build logs for more information.
See Builds for ideas on how to fix a failed build, or Metadata for how to configure docs.rs builds.
If you believe this is docs.rs' fault, open an issue.
Node Server
- Node Server
Introduction
Node Server is a component in node that facilitates node administration and enables communication with the logic of an application (loaded wasm) in participating contexts.
Node Server component is split into 4 parts:
Build Modes
The node server supports two authentication modes that can be selected at runtime:
Default mode (external auth)
- The node expects an external
mero-authdeployment and continues to forward authentication traffic to it, matching the current production setup. - Existing configuration files work without modification.
Embedded auth mode
- Choose the mode at runtime:
merod run --auth-mode embeddedor setnetwork.server.auth_mode = "embedded"inconfig.toml. - The node boots the embedded
mero-authservice, mounts its/authand/adminroutes, and guards the JSON-RPC, admin, WebSocket, and SSE endpoints with the bundled JWT middleware. - When
auth_mode = "embedded"but there is no[network.server.embedded_auth]block, the service defaults to a local RocksDB store under the node's home directory (auth/) and enables only theuser_passwordprovider. merod init --auth-mode embeddedwrites those defaults during node initialization; use--auth-storage-path <dir>to move the RocksDB data or--auth-storage memoryfor an ephemeral setup.- Switching back to proxy mode is as simple as running with
--auth-mode proxy(or removing theauth_modeline), keeping existing deployments compatible.
Configuring server.embedded_auth
When embedded mode is active you can inline authentication settings under
network.server.embedded_auth. The schema matches mero-auth configuration; for example:
[]
= "0.0.0.0:3001"
[]
= "calimero-auth"
= 3600
= 2_592_000
[]
= "rocksdb"
= "data/auth"
[]
= true
Omitting the block leaves the embedded defaults in place (RocksDB storage at
auth/, username/password authentication). External deployments can keep existing
configs unchanged while opting in environment by environment.
merod init with embedded auth
To initialize a node with embedded authentication, use the --auth-mode embedded flag:
By default, this will configure RocksDB storage at auth/ within the node's home directory.
You can customize the storage:
--auth-storage-path <PATH>: Specify a custom path for RocksDB storage.--auth-storage memory: Use in-memory storage (for testing, not persistent).
Example with in-memory storage:
CI/CD expectations
- Build the node once:
cargo build -p calimero-server. - Publish or package the single artefact; operators select the mode through configuration or the CLI flag.
- For the embedded auth build, ensure the environment exposes the frontend assets:
CALIMERO_AUTH_FRONTEND_SRCpointing to a release archive or local build, orCALIMERO_AUTH_FRONTEND_PATHpointing to a prebuilt directory.- When pulling from GitHub, set
CALIMERO_AUTH_FRONTEND_ASSETto use a release asset; otherwise the build downloads a source archive from the tag inCALIMERO_AUTH_FRONTEND_VERSION. IfCALIMERO_AUTH_FRONTEND_VERSIONislatest, it resolves the latest release tag via the GitHub release redirect and falls back to the branch inCALIMERO_AUTH_FRONTEND_REF(defaults tomaster) if the tag cannot be determined.
- When running integration suites, exercise at least one smoke test in each mode to
confirm
/authendpoints are reachable in embedded mode and that the proxy mode continues to rely on the external service.
1. Admin API
The Admin API component of the Node Server exposes API for connection with the node and its functionalities. It is primarily utilized by the Admin Dashboard to query and manage various aspects of the node, including:
- Identity information
- Root keys
- Client keys
- Installed applications
- Started contexts
Data Querying: The Admin API allows the Admin Dashboard to fetch important data from the node, such as identity details, root and client keys, and information about installed and active applications.
Application Management: The API provides functionalities for managing applications and contexts, allowing for the installation and uninstallation of applications and starting contexts.
Key Management: Administrators can manage root and client keys through the API, ensuring secure access and control over the node.
Authentication: The Admin API facilitates user authentication via selected wallets, currently supporting MetaMask and NEAR networks. Authentication details will be explained in later sections.
Integration with Web Applications: The authentication mechanism is also used by web applications designed for applications (loaded wasm) in participating context, ensuring secure and authenticated access.
2. JSON rpc
The JSON rpc component of the Node Server facilitates communication between the clients and the context. This allows seamless interaction and data management for applications.
The JSON rpc interface provides two primary methods:
- Query
- Mutate
Query Method
The Query method retrieves data from the application in participating context.
For instance, in the Only Peers forum application, posts and comments stored in
the application's storage can be queried using the JSON rpc interface. This
enables users to fetch and display content from the forum.
Mutate Method
The Mutate method allows modification of the application's data in
participating context. For example, in the Only Peers forum application, users
can create new posts or comments. The Mutate method updates the application's
storage with these new entries, facilitating dynamic content creation and
interaction within the application.
3. Websocket
The WebSocket is used for subscribing to and unsubscribing from certain context running in the Node Server. Defined handlers manage subscription states for WebSocket connections, allowing clients to receive updates about specific contexts they are interested in. WebSocket handlers are essential for managing real-time subscriptions within the Node Server. They allow clients to dynamically subscribe to and unsubscribe from updates about various application contexts.
Important: WebSocket connections are unidirectional for events - the server
pushes events to subscribed clients. For executing transactions (mutate) or
reading state (query), clients must use the separate JSON-RPC endpoint. This
separation of concerns provides:
- WebSocket/SSE: Real-time event streaming (Server → Client)
- JSON-RPC: Execute transactions and queries (Client ↔ Server)
This architecture ensures efficient event streaming while maintaining reliable request/response patterns for state modifications.
Subscription Handling:
Websocket handles requests to subscribe to specific contexts and send responses back to the client with the subscribed context IDs.
Unsubscription Handling:
Websocket handle requests to unsubscribe from specific contexts and send responses back to the client with the unsubscribed context IDs.
4. Server Sent Event (SSE)
The Server-Sent Events (SSE) endpoint allows clients to subscribe to real-time updates for specific contexts running in the Node Server. Unlike WebSockets, which support two-way communication, SSE provides a one-way channel where the server continuously pushes updates to the client over a single long-lived HTTP connection. Subscriptions are automatically cleaned up after closing the connection.
The very first event received after opening the SSE stream is a connect event, which contains
a connection_id. This connection_id is required when making subscription requests.
SSE Subscription Handling:
To subscribe, the client must send a POST request to the /sse/subscription endpoint with
one or more contextIds.
SSE Unsubscription Handling:
To unsubscribe, the client must send a POST request to the /sse/subscription endpoint with
one or more contextIds.
Node Server Workflows
Client Login Workflow
sequenceDiagram
title Client Login Workflow
participant User
participant Admin Dashboard / Application
participant Crypto Wallet
participant Admin API
participant Node
User->>Admin Dashboard / Application: login
Admin Dashboard / Application->>Admin API: API call to request-challenge endpoint
Admin API-->>Admin Dashboard / Application: Return challenge object
Admin Dashboard / Application->>Crypto Wallet: Request to sign received challenge
Crypto Wallet-->>User: Request to sign challenge
User->>Crypto Wallet: Sign challenge
Crypto Wallet-->>Crypto Wallet: Sign challenge
Crypto Wallet-->>Admin Dashboard / Application: Signed challenge
Admin Dashboard / Application-->>Admin Dashboard / Application: Create auth headers
Admin Dashboard / Application->>Admin API: call add-client-key endpoint with signed challenge + auth header
Admin API->>Admin API: Verify auth headers
Admin API->>Admin API: Verify signature
Admin API->>Node: Check if any root key are stored
alt No root keys are stored
Admin API->>Node: Save root key
else Root key exists
Admin API->>Node: Save client key
end
Node->>Admin API: Key Stored response
Admin API->>Admin Dashboard / Application: Login successful response
Admin Dashboard / Application-->>Admin Dashboard / Application: Authorise user
JSON rpc Workflow
sequenceDiagram
title JSON rpc Workflow
participant User
participant Client
participant JSON rpc
participant Node
User->>Client: Query/Mutate action
Client->>JSON rpc: Request (query/mutate)
JSON rpc-->>JSON rpc: Processes request
JSON rpc->>Node: Request for JSON rpc action
Node->>Node: Perform action (query/mutate)
Node-->>JSON rpc: Response
JSON rpc-->>Client: Response for request
Websocket Workflow
sequenceDiagram
title WebSocket Subscription Workflow
participant Client
participant WebSocket
participant Node
Client->>WebSocket: Subscribe/Unsubscribe request
WebSocket->>Node: Handle subscribe/unsubscribe
Node-->>WebSocket: Subscription response
WebSocket-->>Client: Subscription messages (context application updates)
SSE Workflow
sequenceDiagram
title SSE Subscription Workflow
participant Client
participant SSE
participant Node
Client->>SSE: Open SSE connection
SSE-->>Client: Send `connect` event with `connection_id`
Client->>SSE: POST /sse/subscription (subscribe)
SSE->>Node: Register subscription for contextIds with connection_id
Node-->>SSE: Stream events for contextIds
SSE-->>Client: Push events as text/event-stream
Client->>SSE: POST /sse/subscription (unsubscribe)
SSE->>Node: Removes subscription for contextIds
Admin API endpoints
The Admin API endpoints are split into protected and unprotected routes, where protected routes require authentication.
Base path: /admin-api
Protected Routes
These routes require authentication. The authentication method depends on the auth mode:
- Proxy mode (default): Uses auth headers generated with
createAuthHeaderfrom thecalimero sdklibrary. - Embedded auth mode: Uses JWT tokens in the
Authorizationheader (e.g.,Authorization: Bearer <token>).
Auth Headers (Proxy Mode)
Parts of the Auth Headers:
wallet_type: Specifies the type of wallet used (e.g., NEAR).signing_key: Encoded public key used for signing the request.signature: Encoded signature generated from the payload hash.challenge: Encoded hash of the payload, serving as a challenge.context_id: Context identifier for additional request context. Optional for Admin Dashboard but mandatory for applications.
1. Create Root Key
- Path:
/root-key - Method:
POST - Description: Creates a new root key in the node.
2. Install Application
- Path:
/install-application - Method:
POST - Description: Installs a new application in the node.
3. List Applications
- Path:
/applications - Method:
GET - Description: Lists all installed applications in the node.
4. Fetch DID
- Path:
/did - Method:
GET - Description: Fetches the DID (Decentralized Identifier) of the node.
5. Create Context
- Path:
/contexts - Method:
POST - Description: Creates a new context.
6. Delete Context
- Path:
/contexts/:context_id - Method:
DELETE - Description: Deletes a specific context by ID.
7. Get Context
- Path:
/contexts/:context_id - Method:
GET - Description: Retrieves details of a specific context by ID.
8. Get Context Users
- Path:
/contexts/:context_id/users - Method:
GET - Description: Lists users associated with a specific context.
9. Get Context Client Keys
- Path:
/contexts/:context_id/client-keys - Method:
GET - Description: Lists client keys for a specific context.
10. Get Context Storage
- Path:
/contexts/:context_id/storage - Method:
GET - Description: Retrieves storage information for a specific context.
11. List Contexts
- Path:
/contexts - Method:
GET - Description: Lists all contexts.
12. Delete Auth Keys
- Path:
/identity/keys - Method:
DELETE - Description: Deletes all root and client keys.
Unprotected Routes
These routes do not require authentication.
1. Health Check
- Path:
/admin-api/health - Method:
GET - Description: Checks the health of the API.
2. Authentication Status
- Path:
/admin-api/is-authed - Method:
GET - Description: Checks if the current request is authenticated.
3. Certificate
- Path:
/admin-api/certificate - Method:
GET - Description: Retrieves the node's certificate.
4. Request Challenge
- Path:
/request-challenge - Method:
POST - Description: Requests a challenge for authentication.
5. Add Client Key
- Path:
/add-client-key - Method:
POST - Description: Adds a new client key.
6. Install Dev Application
- Path:
/dev/install-application - Method:
POST - Description: Installs a development application.
7. Manage Dev Contexts
- Path:
/dev/contexts - Methods:
GET,POST - Description: Lists (
GET) and creates (POST) development contexts.
8. List Dev Applications
- Path:
/dev/applications - Method:
GET - Description: Lists all development applications.
JSON rpc endpoint
The JSON-rpc server endpoint is structured to handle various request types.
Base path: /jsonrpc
Note: When embedded auth mode is enabled, all JSON-RPC requests require authentication
via JWT tokens in the Authorization header (e.g., Authorization: Bearer <token>).
1. Handle JSON-rpc Request
- Path:
/jsonrpc - Method:
POST - Description: Handles incoming JSON-rpc requests, which can be
queryormutaterequests, processes them, and returns the appropriate response.
Websocket endpoints
The WebSocket, accessible at /ws, allows clients to dynamically subscribe to and unsubscribe from real-time updates about specific contexts within the Node Server.
Note: When embedded auth mode is enabled, WebSocket connections require authentication
via JWT tokens in the Authorization header during the initial handshake.
1. Handle WebSocket Request
- Path:
/ws - Method:
GET - Description: Handles incoming WebSocket requests, which can be subscribe or unsubscribe requests, processes them, and returns the appropriate response.
SSE endpoints
The SSE endpoint, accessible at /sse, allows clients to establish a real-time connection
to receive updates for specific contexts within the Node Server.
Note: When embedded auth mode is enabled, SSE connections require authentication
via JWT tokens in the Authorization header when opening the connection.
1. Establish SSE Connection
- Path:
/sse - Method:
GET - Description: Opens a long-lived HTTP connection for receiving server-sent events.
The very first message received is aconnectevent containing aconnection_id.
Thisconnection_idmust be used for subsequent subscription requests. - Example response (first event):
event: connect data: "connection_id"
2. Subscribe to Context
- Path:
/sse/subscription - Method:
POST - Description: Subscribes the active connection (identified by
connection_id) to one or morecontextIds.
After subscribing, updates for those contexts are streamed over the open SSE connection. - Example request:
POST /sse/subscription Content-Type: application/json { "id": "connection_id received from the connect event from GET /sse", "method": "subscribe", "params": { "contextIds": ["context_1"] } }
3. Unsubscribe from Context
- Path:
/sse/subscription - Method:
POST - Description: To unsubscribe, clients send an
unsubscriberequest similar to subscription request with one or morecontextIds. - Example request:
POST /sse/subscription Content-Type: application/json { "id": "connection_id received from the connect event from GET /sse", "method": "unsubscribe", "params": { "contextIds": ["context_1"] } }
Examples
Examples of Node Server usage can be found within the Admin Dashboard and the Only Peers example application. All communication with the node is exposed through calimero sdk library.