| description | Blockchain services connecting your institutional users and lab access control system to the blockchain |
|---|
Spring Boot service for DecentraLabs that provides:
- Authentication and authorization (
SAML,WebAuthnonboarding, JWT/JWKS) - Institutional wallet and treasury operations
- Intent submission and authorization flows
- Provider/consumer institutional provisioning
While it is designed so that it can be deployed as an independent container (use case for lab institutional consumers), it is also included in the Lab Gateway (use case for lab institutional providers).
blockchain-services supports two deployment modes:
-
provider+consumermode This is the full mode used whenblockchain-servicesruns together with Lab Gateway. The institution acts as a lab provider and can also fund reservations for its own users. Available capabilities:- SAML/OIDC/JWKS authentication endpoints
- provider registration and provider provisioning tokens
- provider settlement and payout operations
- wallet, treasury, intents, and consumer funding flows
-
consumer-onlymode This is the standalone mode for institutions that do not publish labs and do not provide auth endpoints for third-party access. The institution only funds reservation and access costs for its own users. Available capabilities:- institutional wallet creation/import
- treasury and reservation funding operations
- consumer provisioning token application and consumer registration
- intents and local administrative dashboard Not available in this mode:
- SAML/OIDC/JWKS provider endpoints
- manual provider registration UI
- provider settlement and payout operations
This service provides four main components:
- Authentication and Authorization Service: institutional SAML2 JWT authentication, OIDC/JWKS discovery, and WebAuthn support.
- Institutional Wallet and Treasury: Ethereum wallet management and treasury operations for institutional lab providers and consumers.
- Intent Authorization and Execution: signed intent intake, WebAuthn ceremony, and on-chain execution/status tracking.
- Institution Provisioning: provider/consumer token application and Marketplace registration flows.
Together, they bridge institutional access control systems (such as Lab Gateway) with blockchain smart contracts in one backend.
- SAML2 Integration: dual-path SSO flows (
/auth/saml-authand/auth/saml-auth2). - JWT Management: OIDC/JWKS discovery, JWT issuance, and claim/scope-based access checks.
- Smart Contract Validation: direct on-chain reservation/booking queries for booking-aware flows.
- Wallet Management: create/import/reveal institutional wallets encrypted at rest (AES-256-GCM + PBKDF2).
- Multi-Network Support: Mainnet/Sepolia operations with active-network switching and RPC fallback.
- Treasury Operations: deposits, withdrawals, spending limits/periods, and institutional financial stats.
- Reservation Engine: metadata-driven auto-approval/denial hooks for reservation requests.
- Event Monitoring: contract event listener status and resilient event processing.
- Intent Authorization: signed intent intake with JWT scope checks, SAML/WebAuthn validation, and EIP-712 verification.
- WebAuthn Ceremony: authorize/status/complete flow for intent execution.
- Institution Provisioning: provider/consumer token application, Marketplace JWKS validation, and registration flows.
+------------------+ +------------------------+ +--------------------+
| Marketplace dApp | <-->| Auth Service | <-->| Smart Contracts |
| (User Frontend) | | - SAML2 SSO | | - Diamond proxy |
| | | - JWT generation | | - Credit ledger |
| | | - Booking validation | | - Reservations |
+------------------+ +------------------------+ +--------------------+
^ | ^
| | |
End Users v |
+------------------------+ |
| Wallet & Treasury |---------------+
| - Wallet management |
| - Treasury operations |
| - Contract queries |
| - Auto-approval engine |
+------------------------+
|
v
+------------------------+
| Intents |
| - Intent intake |
| - WebAuthn ceremony |
| - Status and execution |
+------------------------+
|
v
+------------------------+
| Institution Config |
| - Provider token apply |
| - Consumer token apply |
| - Registration flows |
+------------------------+
|
v
+------------------------+
| Lab Gateway |
| (Provider Access) |
+------------------------+
GET /.well-known/openid-configurationGET /auth/jwksPOST /auth/saml-authPOST /auth/saml-auth2POST /auth/checkin-institutionalPOST /webauthn/registerPOST /webauthn/revokePOST /onboarding/webauthn/optionsPOST /onboarding/webauthn/complete
These endpoints are only active in provider+consumer mode.
POST /wallet/createPOST /wallet/importPOST /wallet/revealGET /wallet/{address}/balanceGET /wallet/{address}/transactionsGET /wallet/listen-eventsGET /wallet/networksPOST /wallet/switch-networkPOST /billing/admin/executeGET /billing/admin/statusGET /billing/admin/balanceGET /billing/admin/transactionsGET /billing/admin/contract-infoGET /billing/admin/treasury-infoGET /billing/admin/top-spendersGET|POST /billing/admin/notifications
POST /intentsGET /intents/{requestId}POST /intents/authorizeGET /intents/authorize/status/{sessionId}GET /intents/authorize/ceremony/{sessionId}POST /intents/authorize/completeGET /institution-config/statusPOST /institution-config/save-and-registerPOST /institution-config/retry-registrationPOST /institution-config/apply-provider-tokenPOST /institution-config/apply-consumer-token
/institution-config/save-and-register, /institution-config/retry-registration, and /institution-config/apply-provider-token are provider-only flows.
/institution-config/apply-consumer-token is the consumer-only registration flow.
- Build:
./mvnw clean package -DskipTests- Run with consumer mode defaults or set them explicitly:
FEATURES_PROVIDERS_ENABLED=false \
FEATURES_PROVIDERS_REGISTRATION_ENABLED=false \
java -jar target/blockchain-services-1.0-SNAPSHOT.war-
Open
http://localhost:8080/wallet-dashboard, create or import the institutional wallet, and apply a consumer provisioning token. -
Verify:
http://localhost:8080/healthhttp://localhost:8080/wallet-dashboard
- Build:
./mvnw clean package -DskipTests- Run:
java -jar target/blockchain-services-1.0-SNAPSHOT.war- Verify:
http://localhost:8080/healthhttp://localhost:8080/wallet-dashboard
- Copy template env:
cp .env.example .env-
Provide JWT keys in
./config/keys(or adjustPRIVATE_KEY_PATH/PUBLIC_KEY_PATH). -
Start:
docker compose up -d- Open
http://localhost:8080/wallet-dashboardto create/import the institutional wallet.
For consumer-only standalone deployments, keep:
FEATURES_PROVIDERS_ENABLED=false
FEATURES_PROVIDERS_REGISTRATION_ENABLED=false
ADMIN_DASHBOARD_LOCAL_ONLY=true
ADMIN_DASHBOARD_ALLOW_PRIVATE=false
ADMIN_ALLOWED_CIDRS=
SECURITY_ALLOW_PRIVATE_NETWORKS=falseFor full Lab Gateway deployments, enable the full provider surface:
FEATURES_PROVIDERS_ENABLED=true
FEATURES_PROVIDERS_REGISTRATION_ENABLED=trueIf you want wallet-dashboard and the wallet/billing administrative routes to be reachable from private network ranges instead of localhost only, use:
ADMIN_DASHBOARD_LOCAL_ONLY=true
ADMIN_DASHBOARD_ALLOW_PRIVATE=true
SECURITY_ALLOW_PRIVATE_NETWORKS=true
ADMIN_ALLOWED_CIDRS=10.20.0.0/16,192.168.50.0/24
ADMIN_ACCESS_TOKEN_REQUIRED=true
ADMIN_ACCESS_TOKEN=your_strong_tokenLeave ADMIN_ALLOWED_CIDRS empty if you want to allow any private range. Set it if you want access limited to specific private subnets only.
If you disable ADMIN_DASHBOARD_LOCAL_ONLY, keep ADMIN_ACCESS_TOKEN_REQUIRED=true and send the token via header or cookie, not query string.
Repository structure:
.env.example # Environment template (tracked in git)
.env # Local config (gitignored)
data/
βββ wallet-config.properties # Auto-generated wallet address + encrypted password (gitignored)
keys/ # RSA keys (gitignored)
βββ private_key.pem # JWT signing key
βββ public_key.pem # JWT verification key
src/main/resources/
βββ application.properties # Compiled into WAR
Docker container structure:
/app/
βββ blockchain-services.war # Application
βββ config/
β βββ keys/ # Mounted from ./keys
β βββ private_key.pem
β βββ public_key.pem
βββ data/ # Persistent volume
β βββ wallets.json # Encrypted wallets
βββ logs/ # Mounted from ./logs
π‘ Configuration priority: Environment variables >
.env(local file) > application.properties. For the institutional wallet specifically: env vars / secrets manager >wallet-config.properties(auto-generatedinstitutional.wallet.address+ encrypted password) > persisted wallet metadata.
- Never commit secrets or private keys.
- Keep wallet/billing routes behind trusted network/proxy boundaries.
- If private-network access is enabled, enforce
ADMIN_ACCESS_TOKEN. - Keep SAML trust mode on whitelist for production.
- In
consumer-onlymode, JWT signing keys are not required for readiness because provider auth endpoints are disabled.
- Enable with
NOTIFICATIONS_MAIL_ENABLED=trueand choose driverNOTIFICATIONS_MAIL_DRIVER=smtp|graph|noop(default: noop). - Common settings:
NOTIFICATIONS_MAIL_FROM,NOTIFICATIONS_MAIL_DEFAULT_TO(comma-separated), andNOTIFICATIONS_MAIL_TIMEZONE(IANA zone, e.g.,Europe/Madrid). - SMTP driver: configure
NOTIFICATIONS_MAIL_SMTP_HOST,PORT,USERNAME,PASSWORD, plusNOTIFICATIONS_MAIL_SMTP_STARTTLSwhen required. - Microsoft Graph driver:
NOTIFICATIONS_MAIL_GRAPH_TENANT_ID,CLIENT_ID,CLIENT_SECRET,GRAPH_FROM(UPN/mailbox with Mail.Send app permission). - ICS invite attached when start/end are available; subject
Reserva aprobada: <lab>and body includes lab, window, renter, payer, and tx hash. - Runtime config (localhost):
GET/POST /billing/admin/notificationsto view/update settings; persisted at./data/notifications-config.json.
Actuator endpoints for monitoring and Kubernetes probes (restrict /actuator/** at the proxy if exposed publicly):
GET /actuator/health/liveness(liveness probe)GET /actuator/health/readiness(readiness probe)GET /actuator/prometheus(Prometheus scrape)GET /actuator/metrics(metrics index)GET /actuator/info(service metadata)
Use /actuator/health/readiness for Docker and orchestrator health checks. Keep /health for detailed, app-specific status pages:
Health endpoint available at /health:
{
"status": "UP",
"operating_mode": "consumer-only",
"timestamp": "2025-11-09T12:00:00Z",
"service": "blockchain-services",
"version": "1.0.0",
"marketplace_key_cached": true,
"institution_registered": true,
"jwt_validation": "ready",
"endpoints": {
"saml-auth": "disabled (providers flag off)",
"saml-auth2": "disabled (providers flag off)",
"checkin-institutional": "disabled (providers flag off)",
"jwks": "disabled (providers flag off)",
"wallet-create": "available (localhost)",
"wallet-balance": "available (localhost)",
"billing": "available (localhost)",
"health": "available"
}
}- Fork the project
- Create feature branch (
git checkout -b feature/AmazingFeature) - Commit changes (
git commit -m 'Add AmazingFeature') - Push to branch (
git push origin feature/AmazingFeature) - Open Pull Request
See LICENSE file for details.
