upub/README.md

168 lines
7.9 KiB
Markdown
Raw Normal View History

# μpub
> ## [micro social network, federated](https://join.upub.social)
>
> - [about](#about)
> - [features](#features)
> - [security](#security)
> - [caching](#caching)
> - [deploy](#deploy)
> - [install](#install)
> - [run](#run)
> - [configure](#configure)
> - [development](#development)
> - [contacts](#contacts)
> - [contributing](#contributing)
![upub logo: greep mu letter with blue and pink-reddish gradient](https://dev.upub.social/web/assets/icon.png)
# about
μpub aims to be a private, lightweight, modular and **secure** [ActivityPub](https://www.w3.org/TR/activitypub/) server
μpub is modeled around timelines but tries to be unopinionated in its implementation, allowing representing multiple different fediverse "modalities" together
all client interactions happen with ActivityPub's client-server methods (basically POST your activities to your outbox), with [appropriate extensions](https://ns.alemi.dev/as): **μpub doesn't want to invent another API**!
2024-03-27 04:03:08 +01:00
> [!NOTE]
> a test instance is available at [dev.upub.social](https://dev.upub.social)
## features
μpub boasts both known features and new experimental ideas:
* quote posts, groups,
* media proxy: minimal local storage impact
* AP explorer: navigate underlying AP documents
* on-demand thread fetching: get missing remote replies on-demand
* granular activity privacy: control who gets to see each of your likes and shares
* actor liked feeds: browse all publicly likes content from users, as "curated timelines"
## security
most activitypub implementations don't really validate fetches: knowing an activity/object id will allow anyone to resolve it on most fedi software. this is of course unacceptable: "security through obscurity" just doesn't work
μpub correctly and rigorously implements and enforces access control on each object based on its addressing
> [!WARNING]
> most instances will have "authorized fetch" which kind of makes the issue less bad, but anyone can host an actor, have any server download their pubkey and then start fetching
μpub may be considered to have "authorized fetch" permanently on, except it depends on each post:
* all posts marked public (meaning, addressed to `https://www.w3.org/ns/activitystreams#Public`), will be fetchable without any authorization
* all posts not public will require explicit addressing and authentication: for example if post A is addressed to example.net/actor
* anonymous fetchers will receive 404 on GET /posts/A
* local users must authenticate and will be given said post only if it's addressed to them
* remote servers will be given access to all posts from any of their users once they have authenticated themselves (with http signing)
> [!IMPORTANT]
> note that followers get expanded: addressing to example.net/actor/followers will address to anyone following actor that the server knows of, **at that time**
## caching
μpub **doesn't download remote media** to both minimize local resources requirement and avoid storing media that remotes want gone. to prevent leaking local user ip addresses, all media links are cloaked and proxied.
while this just works for small instances, larger servers should set up aggressive caching on `/proxy/...` path: more info [in coming sections](#media-proxy-cache)
# deploy
μpub is built with the needs of small deployments in mind: getting a dev instance up is as easy as running one command, and setting up for production just requires some config tweaking
## install
> [!CAUTION]
> official releases are being automated, available very soon
latest μpub build can be downloaded from [moonlit.technology releases page](todo add link!!)
```sh
$ curl -s https://moonlit.technology/alemi/upub/releases/.... > upub; chmod +x upub
```
> [!IMPORTANT]
> automated builds by GitHub are planned and will follow
### from source
building μpub from source is also possible without too much effort. it will also allow to customize the resulting binary to your specific use case
if you just want to build the backend (or some of its components), a simple `$ cargo build` will do
---
to also build upub-web, some extra tooling must be installed:
* rust `wasm32-unknown-unknown` target (`$ rustup target add wasm32-unknown-unknown`)
* wasm-bindgen (`$ cargo install wasm-bindgen-cli`)
* trunk (`$ cargo install trunk`)
from inside `web` project directory, run `trunk build --release`. once it finishes, a `dist` directory should appear inside `web` project. it is now possible to build μpub with the `web` feature flag enabled, which will include upub-web frontend
```sh
cd web
trunk build --release
cd ..
cargo build --release --features=web
```
## run
μpub includes its maintenance tooling and different operation modes, all documented in its extensive command line interface.
> [!TIP]
> make sure to use `--help` if you're lost! subcommands have different help screens
all modes share `-c`, `--db` and `--domain` options, which will set respectively config path, database connection string and instance domain url
neither is necessary: by default a sqlite database `upub.db` will be created in current directory, default config will be used and domain will be a localhost http url
there is no default config path: point explicitly with `-c` flag
bring up a complete instance with `monolith` mode: `$ upub monolith`
to view μpub full default config, use `$ upub config`
most maintenance tasks can be done with `$ upub cli`
---
a proper deployment will require:
* a migrated database (run `$ upub migrate --db <your-db-connection-string>` once)
* core activitypub routes (feature flag `routes`, cli `$ upub serve`)
* a job worker (feature flag `worker`, cli `$ upub work`)
running `$ upub` monolith will do all of these
## configure
### media proxy cache
caching proxied media is quite important for performance, as it keeps proxying load away from μpub itself
for example, caching `nginx` could be achieved this way:
```nginx
proxy_cache_path /tmp/upub/cache levels=1:2 keys_zone=upub_cache:100m max_size=50g inactive=168h use_temp_path=off;
server {
location /proxy/ {
# use our configured cache
slice 1m;
proxy_set_header Range $slice_range;
chunked_transfer_encoding on;
proxy_ignore_client_abort on;
proxy_buffering on;
proxy_cache upub_cache;
proxy_cache_key $host$uri$is_args$args$slice_range;
proxy_cache_valid 200 206 301 304 168h;
proxy_cache_lock on;
proxy_pass http://127.0.0.1/;
}
}
```
# development
development is still active, so expect more stuff to come! since most fediverse software uses Mastodon's API, μpub plans to implement it as an optional feature, becoming eventually compatible with most existing frontends and mobile applications, but focus right now is on producing something specific to μpub needs
## contacts
* new features or releases are announced [directly on the fediverse](https://dev.upub.social/actors/upub)
* direct questions about deployment or development, or general chatter around this project, [happens on matrix](https://matrix.to/#/#upub:moonlit.technology)
* development mainly happens on [moonlit.technology](https://moonlit.technology/alemi/upub), but a [github mirror](https://github.com/alemidev/upub) is also available. if you prefer a forge-less development you can browse the repo on [my cgit](https://git.alemi.dev/upub.git), and send me patches on any contact listed on [my site](https://alemi.dev/about/contacts)
2024-04-16 18:49:54 +02:00
## contributing
μpub can always use more dev time!
if you want to contribute you will need to be somewhat familiar with [rust](https://www.rust-lang.org/): even the frontend is built with it!
reading a bit of the [ActivityPub](https://www.w3.org/TR/activitypub/) specification can be useful but not really required
hanging out in the relevant matrix room will probably be useful, as you can ask questions while familiarizing with the codebase
2024-04-16 18:49:54 +02:00
once you feel ready to tackle some development, head over to [the issues tab](https://moonlit.technology/alemi/upub/issues) and look around for something that needs to be done!