This guide covers production integration patterns for pkarr. For basic usage, see the quickstart. For feature flag selection, see features.
Choose features based on your deployment environment and requirements.
What is your target platform?
|
+-- Server/Native Application
| |
| +-- Need persistent cache? --> Add `lmdb-cache`
| +-- Need HTTPS endpoints? --> Add `endpoints`
| +-- Need HTTP client integration? --> Add `reqwest-builder`
| +-- Otherwise --> Use default (`full-client`)
|
+-- Browser/WASM
| |
| +-- `relays` only (DHT unavailable in browsers)
|
+-- Key management
| |
| +-- Just key generation? --> `keys` only
| +-- Signing packets offline? --> `signed_packet`
|
+-- Relay-only deployment
|
+-- `relays` (no DHT, smaller binary)
| Use Case | Cargo.toml |
|---|---|
| Full server | pkarr = "5" |
| Server + persistence | pkarr = { version = "5", features = ["lmdb-cache"] } |
| Browser/WASM | pkarr = { version = "5", default-features = false, features = ["relays"] } |
| Key utilities only | pkarr = { version = "5", default-features = false, features = ["keys"] } |
| Everything | pkarr = { version = "5", features = ["full"] } |
Use Client::builder() to customize the client for your environment.
use pkarr::Client;
// Default: both DHT and relays enabled
let client = Client::builder().build()?;
// DHT only (no relay fallback)
let client = Client::builder()
.no_relays()
.build()?;
// Relays only (required for WASM, optional for firewall-restricted environments)
let client = Client::builder()
.no_dht()
.build()?;
// Custom relays
let client = Client::builder()
.relays(&["https://pkarr.pubky.app", "https://my-relay.example.com"])?
.build()?;
// Custom DHT bootstrap nodes
let client = Client::builder()
.bootstrap(&["router.bittorrent.com:6881"])
.build()?;
// Extend defaults with additional nodes
let client = Client::builder()
.extra_bootstrap(&["my-bootstrap.example.com:6881"])
.extra_relays(&["https://my-relay.example.com"])?
.build()?;
use pkarr::Client;
use std::sync::Arc;
// Adjust in-memory cache size (default: 1000 entries)
let client = Client::builder()
.cache_size(5000)
.build()?;
// Disable caching
let client = Client::builder()
.cache_size(0)
.build()?;
// Custom cache implementation
let custom_cache: Arc<dyn pkarr::Cache> = /* ... */;
let client = Client::builder()
.cache(custom_cache)
.build()?;
TTL bounds control when cached packets are considered expired.
use pkarr::Client;
let client = Client::builder()
// Minimum time before a packet is considered expired
.minimum_ttl(60) // At least 60 seconds
// Maximum time before forcing a refresh
.maximum_ttl(86400) // At most 24 hours
.build()?;
use pkarr::Client;
use std::time::Duration;
let client = Client::builder()
.request_timeout(Duration::from_secs(5))
.build()?;
When using the endpoints feature for service discovery:
use pkarr::Client;
let client = Client::builder()
.max_recursion_depth(7) // Limit CNAME/alias chain depth
.build()?;
Pkarr provides both async and blocking APIs.
use pkarr::{Client, PublicKey};
#[tokio::main]
async fn main() -> Result<(), Box<dyn std::error::Error>> {
let client = Client::builder().build()?;
let public_key: PublicKey = "pk:...".try_into()?;
let packet = client.resolve(&public_key).await;
Ok(())
}
For synchronous contexts, use as_blocking():
use pkarr::{Client, PublicKey};
fn main() -> Result<(), Box<dyn std::error::Error>> {
let client = Client::builder().build()?.as_blocking();
let public_key: PublicKey = "pk:...".try_into()?;
let packet = client.resolve(&public_key);
Ok(())
}
Pkarr uses async_compat internally. If no Tokio runtime is detected, it automatically wraps futures for compatibility. This means pkarr works with async-std, smol, or any other executor.
[dependencies]
pkarr = { version = "5", default-features = false, features = ["relays"] }
wasm32-unknown-unknown target is supported.DHT records are ephemeral. Nodes drop records after a few hours. For persistent availability, implement periodic republishing.
use pkarr::{Client, SignedPacket, Keypair};
use std::time::Duration;
async fn republish_loop(
client: Client,
keypair: Keypair,
build_packet: impl Fn() -> SignedPacket,
) {
let interval = Duration::from_secs(3600); // Republish hourly
loop {
let packet = build_packet();
match client.publish(&packet, None).await {
Ok(()) => println!("Republished successfully"),
Err(e) => eprintln!("Republish failed: {e}"),
}
tokio::time::sleep(interval).await;
}
}
When multiple processes might update the same key, use CAS (compare-and-swap) to prevent lost updates:
use pkarr::{Client, SignedPacket, Keypair};
use ntimestamp::Timestamp;
async fn safe_republish(
client: &Client,
keypair: &Keypair,
) -> Result<(), Box<dyn std::error::Error>> {
// Get the most recent version
let (current_packet, cas): (SignedPacket, Option<Timestamp>) =
match client.resolve_most_recent(&keypair.public_key()).await {
Some(existing) => {
// Rebuild packet with same or updated records
let new_packet = SignedPacket::builder()
// Copy existing records you want to keep
.txt("key".try_into()?, "updated_value".try_into()?, 300)
.sign(keypair)?;
(new_packet, Some(existing.timestamp()))
}
None => {
let new_packet = SignedPacket::builder()
.txt("key".try_into()?, "value".try_into()?, 300)
.sign(keypair)?;
(new_packet, None)
}
};
// Publish with CAS - fails if someone else published in between
client.publish(¤t_packet, cas).await?;
Ok(())
}
use pkarr::Client;
let client = Client::builder().build()?;
// Access the underlying mainline DHT node
if let Some(dht) = client.dht() {
// Check if bootstrapped
let bootstrapped = dht.bootstrapped();
// Get routing table info
let info = dht.info();
// Export bootstrap nodes for other clients
let bootstrap_nodes = dht.to_bootstrap();
}
use pkarr::{Client, PublicKey};
let client = Client::builder().build()?;
if let Some(cache) = client.cache() {
let len = cache.len();
let capacity = cache.capacity();
}