Backend service API for use with reverse proxies to deploy an HTTP ENS/GNS gateway capable of resolving IPFS, IPNS, Arweave, Arweave Name System (ArNS), and Swarm content.
Upstream proxies can forward ENS and GNS hostnames for resolution and properly route them to the appropriate storage gateway path and destination via the following response headers (IPFS example below):
X-Content-Location: ${cid}.ipfs.dweb.link
X-Content-Path: /
X-Content-Storage-Type: ipfs-ns
Gateway request flow
Environment Variable | Default | Description |
---|---|---|
LISTEN_PORT |
8888 |
Proxy API listener port. |
IPFS_SUBDOMAIN_SUPPORT |
"false" |
Return IPFS gateway destination in subdomain format, i.e. ${cid|peerId}.${ipfs|ipns}.dweb.link . Otherwise results are returned as dweb.link/ipfs/${cid} . Note that dweb.link is just an example and not a default value in this context. Please see IPFS_TARGET for more information. |
IPFS_AUTH_KEY |
null |
Basic authentication for IPFS_KUBO_API_URL . |
IPFS_KUBO_API_URL |
undefined |
URL to Kubo /api/v0/name/resolve service. This setting performs IPNS name resolution and PeerId conversion to CIDv1 identifiers during the contentHash lookup process. Note, this does not enable or disable IPNS support (as this is performed by the IPFS backend) but rather attempts to use resolved CID values as cache keys as opposed to peerIds. Please read the official IPFS documentation for more information. |
ARWEAVE_TARGET |
"https://arweave.net" |
Arweave gateway FQDN. |
SWARM_TARGET |
"https://api.gateway.ethswarm.org" |
Swarm gateway FQDN. |
IPFS_TARGET |
http://localhost:8080 |
FQDN of IPFS gateway backend to use for requests. |
REDIS_URL |
"redis://127.0.0.1:6379" |
Redis server endpoint. |
CACHE_TTL |
"300" |
TTL to persist resolved records |
ASK_ENABLED |
"false" |
Whether to spawn a special listener for responding to |
ASK_LISTEN_PORT |
"9090" |
Ask listener port. |
ETH_RPC_ENDPOINT |
"http://192.168.1.7:8845" |
Primary RPC provider FQDN for ENS resolution. |
ETH_RPC_ENDPOINT_FAILOVER_PRIMARY |
null |
Secondary failover RPC provider FQDN. |
GNO_RPC_ENDPOINT |
https://rpc.gnosischain.com |
Primary RPC endpoint for Gnosis. |
DOMAINSAPI_ENDPOINT |
null |
API endpoint for custom domain routing logic. Can be set to any endpoint that returns a 200 if you do not need this feature. |
LOG_LEVEL |
"info" |
Set the logging level. |
LIMO_HOSTNAME_SUBSTITUTION_CONFIG |
{ "eth.limo": "eth", "eth.local": "eth", "gno.limo": "gno", "gno.local": "gno" } |
The domains and services corresponding to each domain name for gateway operations. When set via an environment variable, this must be a base64 encoded JSON object. |
DOMAIN_TLD_HOSTNAME |
"eth" |
Subdomain to use with gateway (naming service dependent). For example, ens.eth.limo . Contingent upon the setting of DOMAIN_TLD for gateway operations. |
DNSQUERY_ENABLED |
"true" |
Enable DNS over HTTPS (DoH) listener. |
DNSQUERY_LISTEN_PORT |
"11000" |
Listener port for DoH. |
PURGE_CACHE_ON_START |
"false" |
Indicates whether to purge the entire Redis cache upon server startup. |
PURGE_CACHE_COUNT |
"20000" |
Number of keys to purge if PURGE_CACHE_ON_START is enabled. |
PURGE_CACHE_PATTERN |
"*.${DOMAIN_TLD_HOSTNAME}" |
Key pattern to purge if PURGE_CACHE_ON_START is enabled. |
SW_BUNDLE_PUBLIC_URL |
"" |
Optional value if using service workers instead of the API. Set this to the parent wildcard domain you will be serving traffic from, i.e. setting this value to eth.example.com would support ens.eth.example.com , etc. |
SERVICE_WORKER_TRUSTLESS |
"false" |
Optional value if using service workers instead of the API. Set this to "true" to enable trustless IPFS gateway mode. You must also set IPFS_TARGET to the hostname of a gateway running in trustless mode. |
- Start Redis (using any method)
podman pull docker.io/library/redis
podman run --net=host docker.io/library/redis
(Note you can also use docker
instead of podman
)
-
Configure the necessary environment variables listed above
-
Start the ENS dWeb Proxy API
./bin/build.sh
# (optional) run test suites
npm run test
./bin/runDev.sh
- Make a request
$ curl http://localhost:8888 -H 'Host: ens.eth' -sD - -o /dev/null
HTTP/1.1 200 OK
X-Powered-By: Express
X-Content-Location: k51qzi5uqu5dipklqpo2uq7advlajxx5wxob0mwyqbxb5zu4htblc4bjipy834.ipns.dweb.link
X-Content-Path: /
X-Content-Storage-Type: ipns-ns
Date: Fri, 29 Mar 2024 17:11:14 GMT
Connection: keep-alive
Keep-Alive: timeout=5
Transfer-Encoding: chunked
podman pull docker.io/library/redis
podman run --net=host docker.io/library/redis
buildah bud -t dweb-api-proxy .
# Make sure to pass the necessary environment variables with "-e" flags
podman run --rm -it --net=host -e "ETH_RPC_ENDPOINT=${ETH_RPC_ENDPOINT}" dweb-api-proxy
(Note you can also use docker
instead of buildah
)
Start dweb-proxy-api
with the correct environment variables and install Caddy server.
Use the following Caddyfile
configuration (localhost example):
{
admin off
auto_https off
local_certs
log {
level DEBUG
format console
}
}
&(dweb-api) {
reverse_proxy localhost:8888 {
transport http
method GET
header_up Host (.*[-a-z0-9]+\.eth) $1
@proxy status 200
handle_response @proxy {
@trailing vars_regexp trailing {rp.header.X-Content-Path} ^(.*)/$
reverse_proxy @trailing {rp.header.X-Content-Location} {
rewrite {re.trailing.1}{uri}
header_up Host {rp.header.X-Content-Location}
header_up -X-Forwarded-Host
transport http {
dial_timeout 2s
}
@redirect301 status 301
handle_response @redirect301 {
redir {rp.header.Location} permanent
}
}
}
}
}
:8443 {
log {
level INFO
format console
}
bind 0.0.0.0
tls internal {
on_demand
}
invoke dweb-api
}
You can use this Caddyfile
as a starting point for more advanced configurations, however this is sufficient for use as a local gateway (you may wish to use port 443 instead of 8443).
Depending on your environment, either edit /etc/hosts
or configure a stub-resolver for systemd-resolved
(this will let you route all eth.
queries to your local gateway).
For example, using /etc/hosts
:
127.0.0.1 localhost ens.eth
::1 localhost ens.eth
Save the file, launch Caddy (caddy run
) and then open a browser and navigate to https://ens.eth:8443
.
All static assets for supporting service worker resolution are located in packages/dweb-api-serviceworker/dist
. We recommend using an HTTP server such as Caddy or Nginx to serve this content (any CDN will work as well). The SW_BUNDLE_PUBLIC_URL
environment variable should be set to the domain you will be serving traffic from. For example, if you are serving traffic from *.eth.example.com
, set SW_BUNDLE_PUBLIC_URL
to eth.example.com
in order to resolve ens.eth.example.com
.