A Docker Compose file and auxiliary scripts for running a Polymesh development environment.
- Docker Desktop (or Docker Engine + Compose V2) installed and running. Download and setup instructions: https://docs.docker.com/get-docker/
- The Docker daemon must be running (
docker ps
should respond).
- Configuration: Copy an environment file (e.g.,
envs/7.2
or.env.example
) to.env
in the project root:cp envs/7.2 .env
. This file specifies the Docker images to use. Alternatively, provide the path directly:docker compose --env-file=envs/7.2 up
. - Start: Run
docker compose up -d
to start the services in detached mode. - Stop: Run
docker compose down
to stop the services.docker compose down --volumes
will also remove associated volumes (chain data, database data, vault data), this will reset the environment. - Restart: To apply changes (e.g., updated
.env
file), rundocker compose down && docker compose up -d
.
This setup will launch the following services:
polymesh-node
: A single Polymesh node running in development mode (--chain=dev
).postgres
: PostgreSQL database, primarily for the Subquery indexer.subquery-node
: Polymesh Subquery indexer service.subquery-graphql
: GraphQL API server for querying indexed data.polymesh-rest-api-local-sm
: The Polymesh REST API service that uses local signers (Alice, Bob, Charlie, etc)polymesh-rest-api-vault-sm
: The Polymesh REST API service with HashiCorp Vault as the signing manager.polymesh-rest-api-vault-sm-init
: Creates test accounts and identities via the REST API.vault
: HashiCorp Vault for key management.vault-init
: Initializes and unseals Vault on first run, unseals on subsequent runs.environment-ready
: Indicates when the core services and initial setup scripts have completed successfully.
The environment involves several services starting up and performing initial setup tasks (like Vault unsealing and REST API account creation). To check when the environment is fully ready, especially on the first launch, use the environment-ready
service logs:
docker compose logs environment-ready
Wait for the message indicating completion:
************************************************************************************
*** Polymesh Environment Ready! (Total initialization time: XXs) ***
************************************************************************************
If the environment was already initialized in a previous run, it will indicate readiness much faster.
This environment supports usage of either the Local or Vault Signing Manager
Local signing manager uses predefined, publicly known keys (Alice, Bob, Charlie). Vault signing manager uses the HashiCorp Vault to store the keys.
To facilitate this choice, the environment runs two independent instances of the Polymesh REST API: one configured to use local signers, and another configured to use Vault as the signing manager.
Vault Automation:
- The
vault-init
service automatically initializes Vault (on the very first run with the profile) and unseals it every time the services start. - It creates one unseal key and a root token, storing them in the
vault-root-token
named volume (accessible within thevault-init
container at/vault-token/
as.unseal_key
and.token
). - It also automatically enables the
transit
secrets engine and creates ED25519 keys namedadmin
,signer1
,signer2
,signer3
, andsigner4
. - The Vault UI is available at
http://localhost:8200
(default port) for inspection.
Using Vault with REST API & SDK:
- The
polymesh-rest-api-vault-sm
service is automatically configured to use the Vault instance (http://vault:8200
) and obtains the necessary root token from the sharedvault-root-token
volume. No manualVAULT_TOKEN
environment variable is needed for the REST API service itself. - The REST API uses the Hashiorp Vault Signing Manager. Signer names follow the pattern
{key_name}-{key_version}
, e.g.,admin-1
,signer1-1
. - If you intend to use the Polymesh SDK directly with this Vault instance from your host machine or another application, you will need the Vault address (
http://localhost:8200
) and the root token. You can retrieve the token from the runningvault-init
container (on its first/only run) or the volume if needed, but typically you'd generate a more scoped token via the Vault UI or CLI for external applications. The root token is printed by thevault-init
service logs during setup:docker compose logs vault-init
.
Automated Account Setup:
- When the REST API becomes available, the
polymesh-rest-api-vault-sm-init
service automatically:- Retrieves addresses for the
admin
,signer1
,signer2
,signer3
, andsigner4
keys from Vault via the REST API. - Makes the
admin
key's account a CDD provider on the dev chain. - Creates on-chain Identities for
signer1
,signer2
,signer3
, andsigner4
, funding them with initial POLYX.
- Retrieves addresses for the
- The addresses and DIDs of the signers are printed by the
polymesh-rest-api-init
logs and stored in therest-api-accounts-init
volume for persistence checks.
You can connect the Testnet Polymesh Portal to your local node. Go to Settings
-> Click the RPC URL
section in the Portal and use these settings:
- Node RPC URL:
ws://localhost:9944
(or your customPOLYMESH_CHAIN_WS_PORT
if changed) - Middleware URL:
http://localhost:3000
(or your customPOLYMESH_SUBQUERY_GRAPHQL_PORT
if changed)
(Image path assumes it's correctly located relative to the README)
curl --silent http://localhost:3004/signer/alice -H 'accept: application/json' | jq
{
"address": "5GrwvaEF5zXb26Fz9rcQpDWS57CtERHpNehXCPcNoHGKutQY"
}
curl --silent http://localhost:3005/signer/signer1-1 -H 'accept: application/json' | jq
{
"address": "5Fdg1TDCX5iJarXjEsLn1gffVeddLvcQ7Jzh8gBV6W19yLxK"
}