Skip to content

Architecture

Roselite is built on a foundation of decentralized infrastructure and censorship-resistant design. This section explains how the system works and why it's different from traditional hosting.

High-Level Overview

Roselite consists of three main components working together:

graph TB
    subgraph "Your Computer"
        CLI[Roselite CLI]
        Files[Static Files]
    end

    subgraph "Veilid DHT Network"
        DHT[(Distributed Hash Table)]
        Node1[Veilid Node]
        Node2[Veilid Node]
        Node3[Veilid Node]
        NodeN[... More Nodes]
    end

    subgraph "Gateway Infrastructure"
        GW1[Gateway Server 1]
        GW2[Gateway Server 2]
        GW3[Gateway Server N]
    end

    subgraph "End Users"
        Browser[Web Browsers]
        Mobile[Mobile Apps]
    end

    Files --> CLI
    CLI -->|Bundle & Publish| DHT
    DHT --> Node1
    DHT --> Node2
    DHT --> Node3
    DHT --> NodeN

    Node1 --> GW1
    Node2 --> GW2
    Node3 --> GW3
    NodeN --> GW1

    GW1 --> Browser
    GW2 --> Browser
    GW3 --> Mobile

    style DHT fill:#ff5722
    style CLI fill:#2196f3
    style GW1 fill:#4caf50
    style GW2 fill:#4caf50
    style GW3 fill:#4caf50

Core Components

1. Roselite CLI

The command-line tool for content creators: - Bundles static sites into .veilidpkg format - Publishes packages to the Veilid DHT - Manages content lifecycle and updates

2. Veilid DHT Network

The decentralized storage layer: - Stores content across hundreds of nodes globally - Replicates data for redundancy and availability - Encrypts content with cryptographic security - Distributes load across the network

3. Gateway Servers

HTTP bridges for web access: - Retrieves content from the DHT on demand - Serves via standard HTTP/HTTPS protocols - Caches content for performance - Routes subdomain requests to correct content

Design Principles

Decentralization First

No Single Point of Failure: Unlike traditional hosting where your site lives on one server, Roselite distributes content across hundreds of nodes. If some nodes go offline, your content remains accessible.

Gateway Independence: Multiple gateway servers can serve the same content. If one gateway is blocked or goes down, others continue working.

Censorship Resistance

Network-Level Resistance: Content stored in the DHT cannot be easily removed or censored since there's no central authority.

Access-Level Resistance: Multiple gateways in different jurisdictions mean blocking one access point doesn't prevent access through others.

Technical Resistance: Direct DHT access means content can be retrieved even without gateway servers.

Developer Experience

Simple Workflow: The familiar static site workflow remains unchanged - just add Roselite deployment.

Zero Configuration: Works out of the box with any static site generator or plain HTML.

Instant Deployment: No server provisioning, DNS configuration, or certificate management.

What makes it different

Traditional Hosting

graph LR
    Dev[Developer] --> Server[Single Server]
    Server --> CDN[CDN (Optional)]
    CDN --> Users[Users]

    Server -.->|SPOF| X[❌ Server Down = Site Down]
    CDN -.->|Censorship| Y[❌ Can be blocked/removed]

    style X fill:#ff5722
    style Y fill:#ff5722

Roselite Hosting

graph LR
    Dev[Developer] --> DHT[Veilid DHT]
    DHT --> GW1[Gateway 1]
    DHT --> GW2[Gateway 2]
    DHT --> GWN[Gateway N]

    GW1 --> Users[Users]
    GW2 --> Users
    GWN --> Users

    GW1 -.->|Resilient| OK1[✅ Other gateways continue]
    DHT -.->|Distributed| OK2[✅ No single point of failure]

    style OK1 fill:#4caf50
    style OK2 fill:#4caf50
    style DHT fill:#ff5722

Deep Dive Sections

Ready to learn more? Explore each component in detail:

  • System Overview


    Complete system architecture and data flow

    Overview

  • DHT Integration


    How Roselite integrates with Veilid DHT

    DHT Integration

  • Gateway System


    Gateway architecture and HTTP bridging

    Gateway System

  • Security Model


    Cryptographic security and threat analysis

    Security Model

Key Benefits

Censorship Resistance

Content distributed across the Veilid network cannot be easily censored or removed by any single authority.

High Availability

Multiple redundant access points ensure your content remains available even during outages or blocking attempts.

Zero Ongoing Costs

No monthly hosting fees, bandwidth charges, or server maintenance costs.

Global Performance

Gateway caching and DHT distribution provide fast access from anywhere in the world.

Developer Friendly

Works with existing static site generators and deployment workflows.

Use Cases

Perfect for:

  • Documentation sites that need permanent availability
  • Personal portfolios without hosting costs
  • Open source projects requiring censorship resistance
  • Emergency information that must survive infrastructure failures
  • Educational content in restricted environments

Consider alternatives for:

  • Dynamic applications requiring server-side processing
  • E-commerce sites needing payment processing
  • Sites requiring frequent updates (though possible, static regeneration is more efficient)
  • Very large media files (DHT is optimized for reasonably-sized content)

Next Steps