A Docker Compose file and auxiliary scripts for running a Polymesh development environment.
- Docker Desktop (or Docker Engine + Compose V2) installed and running. Download and setup instructions: https://docs.docker.com/get-docker/
- The Docker daemon must be running (
docker psshould respond).
- Configuration: Copy an environment file (e.g.,
envs/7.2or.env.example) to.envin the project root:cp envs/7.2 .env. This file specifies the Docker images to use. Alternatively, provide the path directly:docker compose --env-file=envs/7.2 up. - Start: Run
docker compose up -dto start the services in detached mode. - Stop: Run
docker compose downto stop the services.docker compose down --volumeswill also remove associated volumes (chain data, database data, vault data), this will reset the environment. - Restart: To apply changes (e.g., updated
.envfile), rundocker compose down && docker compose up -d.
This setup will launch the following services:
polymesh-node: A single Polymesh node running in development mode (--chain=dev).postgres: PostgreSQL database, primarily for the Subquery indexer.subquery-node: Polymesh Subquery indexer service.subquery-graphql: GraphQL API server for querying indexed data.polymesh-rest-api-local-sm: The Polymesh REST API service that uses local signers (Alice, Bob, Charlie, etc)polymesh-rest-api-vault-sm: The Polymesh REST API service with HashiCorp Vault as the signing manager.polymesh-rest-api-vault-sm-init: Creates test accounts and identities via the REST API.vault: HashiCorp Vault for key management.vault-init: Initializes and unseals Vault on first run, unseals on subsequent runs.environment-ready: Indicates when the core services and initial setup scripts have completed successfully.
The environment involves several services starting up and performing initial setup tasks (like Vault unsealing and REST API account creation). To check when the environment is fully ready, especially on the first launch, use the environment-ready service logs:
docker compose logs environment-readyWait for the message indicating completion:
************************************************************************************
*** Polymesh Environment Ready! (Total initialization time: XXs) ***
************************************************************************************
If the environment was already initialized in a previous run, it will indicate readiness much faster.
This environment supports usage of either the Local or Vault Signing Manager
Local signing manager uses predefined, publicly known keys (Alice, Bob, Charlie). Vault signing manager uses the HashiCorp Vault to store the keys.
To facilitate this choice, the environment runs two independent instances of the Polymesh REST API: one configured to use local signers, and another configured to use Vault as the signing manager.
Vault Automation:
- The
vault-initservice automatically initializes Vault (on the very first run with the profile) and unseals it every time the services start. - It creates one unseal key and a root token, storing them in the
vault-root-tokennamed volume (accessible within thevault-initcontainer at/vault-token/as.unseal_keyand.token). - It also automatically enables the
transitsecrets engine and creates ED25519 keys namedadmin,signer1,signer2,signer3, andsigner4. - The Vault UI is available at
http://localhost:8200(default port) for inspection.
Using Vault with REST API & SDK:
- The
polymesh-rest-api-vault-smservice is automatically configured to use the Vault instance (http://vault:8200) and obtains the necessary root token from the sharedvault-root-tokenvolume. No manualVAULT_TOKENenvironment variable is needed for the REST API service itself. - The REST API uses the Hashiorp Vault Signing Manager. Signer names follow the pattern
{key_name}-{key_version}, e.g.,admin-1,signer1-1. - If you intend to use the Polymesh SDK directly with this Vault instance from your host machine or another application, you will need the Vault address (
http://localhost:8200) and the root token. You can retrieve the token from the runningvault-initcontainer (on its first/only run) or the volume if needed, but typically you'd generate a more scoped token via the Vault UI or CLI for external applications. The root token is printed by thevault-initservice logs during setup:docker compose logs vault-init.
Automated Account Setup:
- When the REST API becomes available, the
polymesh-rest-api-vault-sm-initservice automatically:- Retrieves addresses for the
admin,signer1,signer2,signer3, andsigner4keys from Vault via the REST API. - Makes the
adminkey's account a CDD provider on the dev chain. - Creates on-chain Identities for
signer1,signer2,signer3, andsigner4, funding them with initial POLYX.
- Retrieves addresses for the
- The addresses and DIDs of the signers are printed by the
polymesh-rest-api-initlogs and stored in therest-api-accounts-initvolume for persistence checks.
You can connect the Testnet Polymesh Portal to your local node. Go to Settings -> Click the RPC URL section in the Portal and use these settings:
- Node RPC URL:
ws://localhost:9944(or your customPOLYMESH_CHAIN_WS_PORTif changed) - Middleware URL:
http://localhost:3000(or your customPOLYMESH_SUBQUERY_GRAPHQL_PORTif changed)
(Image path assumes it's correctly located relative to the README)
curl --silent http://localhost:3004/signer/alice -H 'accept: application/json' | jq
{
"address": "5GrwvaEF5zXb26Fz9rcQpDWS57CtERHpNehXCPcNoHGKutQY"
}curl --silent http://localhost:3005/signer/signer1-1 -H 'accept: application/json' | jq
{
"address": "5Fdg1TDCX5iJarXjEsLn1gffVeddLvcQ7Jzh8gBV6W19yLxK"
}