How routes work
- A service in the room listens on an HTTP port.
- That port is marked as
publishedin the service config. - The route maps a domain to that room and published port.
- When a request arrives, MeshAgent resolves the room and port, applies the port’s security rules, and then proxies the request to the service.
Create a route
Use a MeshAgent-managed domain such as*.meshagent.app:
- Deploy a service that exposes an HTTP endpoint and marks its port as published.
- Create a route:
- The route is ready as soon as it is created.
Mark the port as published
In your service config, the HTTP port must be marked as published:Public and private published ports
published: true makes a port routable from a route.
public controls whether that routed URL is open to the internet or protected by MeshAgent:
public: true: MeshAgent forwards requests without requiring room authentication.public: false: MeshAgent requires the caller to authenticate before the request can reach the app.- If you omit
public, the port is treated as private.
Integrated security for browser apps
For browser-based apps, use cookie validation so MeshAgent behaves like an identity-aware proxy in front of your route. This is the easiest way to publish a private app without making the app itself handle MeshAgent tokens directly.meshagent.request.validation.method: cookie on the port or on a specific endpoint. Endpoint annotations override port annotations.
With that configuration, the request flow looks like this:
- A user visits the routed URL.
- If they do not already have a valid MeshAgent IAP session for that route, MeshAgent redirects the browser to sign in.
- After sign-in, MeshAgent stores a secure, HTTP-only session cookie and retries the request through the route.
- On each request, MeshAgent validates that the session still maps to a participant token for the target room.
- If the user is not allowed in the room, the request is rejected before it reaches your app.
GET requests are redirected into the login flow automatically. Non-GET requests without a valid session are rejected until the browser has signed in.
Headers your app receives
When a request passes through cookie-based IAP, MeshAgent removes the internal__meshagent_iap cookie before forwarding the request to your app and adds trusted identity headers:
| Header | Meaning |
|---|---|
X-MESHAGENT-USER | The participant token name, typically the signed-in user’s email or display identity. |
X-MESHAGENT-API-SCOPE | The participant token API permissions, serialized as JSON. If the token has no API grant, this is {}. |
X-MESHAGENT-USER or X-MESHAGENT-API-SCOPE headers before forwarding the request, so callers cannot spoof them without actually going through MeshAgent IAP.
Queue-backed routes and room-secret validation
Routes are not limited to proxying traffic into an HTTP app. They can also turn incoming HTTP requests into queue messages for agents or workers inside the room. This is useful for webhook ingestion patterns where you want:- a stable public URL
- signature validation at the edge
- no always-on HTTP app inside the room
- an internal queue that workers can process asynchronously
meshagent.request.queue is configured on the matched port or endpoint, MeshAgent enqueues the request body instead of proxying the request to a destination app.
- A request arrives at the route.
- MeshAgent validates the request using the configured validation method.
- MeshAgent reads the validation secret from the room as the configured processor identity.
- If validation succeeds, MeshAgent publishes the request body to the queue.
- MeshAgent returns
202 Accepted.
Required annotations
| Annotation | Purpose |
|---|---|
meshagent.request.queue | Queue name to publish into. |
meshagent.request.processor | In-room identity MeshAgent uses when reading the secret and publishing the work. |
meshagent.request.validation.method | Request validation method. |
meshagent.request.validation.secret | Room secret id used for signature verification. |
Secret-backed validation
The validation secret is not copied into the route itself. Instead, MeshAgent reads it from room secrets at request time and uses it to verify the incoming webhook or signed request before anything is placed on the queue. This keeps the shared secret inside the room security boundary while still letting you publish an external URL. Supported validation methods currently include:githubsalesforcesentryslackshopifystripetwiliozendesk
What to store in the room secret
Store the provider’s original shared secret value in the room secret. Do not store:- the incoming signature header value
- a computed HMAC or digest
- a JSON wrapper object unless the provider explicitly gives you a plain secret inside it
| Method | Secret value to store in the room | Provider docs |
|---|---|---|
github | The webhook secret token you configured for that GitHub webhook. | GitHub: Validating webhook deliveries |
slack | Your Slack app’s signing secret. | Slack: Verifying requests from Slack |
stripe | The webhook endpoint’s signing secret. This is not a Stripe API key. | Stripe: Receive events with an HTTPS server |
shopify | For Shopify app webhooks, your app client secret. | Shopify: Deliver webhooks through HTTPS, Shopify: About client credentials |
twilio | Your Twilio Auth Token used for request validation. | Twilio: Security, Twilio: REST API Auth Token |
zendesk | The webhook signing secret key from the Zendesk webhook configuration. | Zendesk: Verifying webhook authenticity |
sentry | The Sentry service hook secret value for that hook. | Sentry: Register a New Service Hook, Sentry: Retrieve a Service Hook |
salesforce | The signing key or shared secret for the Salesforce webhook product that is sending the request. Common cases are Marketing Cloud ENS callback signature keys and Data Cloud generated signing keys. | Salesforce Marketing Cloud ENS: Notification Signing, Salesforce Data Cloud: Generate a Secret Key for Signature Validation, Salesforce Data Cloud: Payload Signature |
Liveness and startup behavior
liveness is the HTTP path MeshAgent uses to decide when a published port is actually ready to serve traffic.
liveness URL and waits for it to return 2xx. Once the service is live, MeshAgent retries the original request.
This matters during startup, cold starts, and restarts:
- With a liveness URL, MeshAgent can wait for the app to finish booting instead of immediately failing the first request.
- Without a liveness URL, an early request is more likely to fail with a bad gateway while the process is still starting.
- Cheap to evaluate.
- Available without external user auth.
- Wired to real readiness, not just process start.
/healthz or /ready returning 200 only after the app is ready to serve the same traffic the route will send.