2020-03-26 14:45:56 +00:00
# Federation Development
## Setup
If you don't have a local clone of the Lemmy repo yet, just run the following command:
```bash
2020-07-03 18:17:21 +00:00
git clone https://github.com/LemmyNet/lemmy
2020-03-26 14:45:56 +00:00
```
2020-04-21 11:24:08 +00:00
## Running locally
2020-03-26 14:45:56 +00:00
You need to have the following packages installed, the Docker service needs to be running.
- docker
- docker-compose
- cargo
- yarn
Then run the following
```bash
2020-07-03 18:17:21 +00:00
cd docker/federation
./run-federation-test.bash -yarn
2020-03-26 14:45:56 +00:00
```
2020-07-03 18:17:21 +00:00
The federation test sets up 3 instances:
Instance / Username | Location
--- | ---
lemmy_alpha | [127.0.0.1:8540 ](http://127.0.0.1:8540 )
lemmy_beta | [127.0.0.1:8550 ](http://127.0.0.1:8550 )
lemmy_gamma | [127.0.0.1:8560 ](http://127.0.0.1:8560 )
You can log into each using the instance name, and `lemmy` as the password, IE (`lemmy_alpha`, `lemmy` ).
Firefox containers are a good way to test them interacting.
## Integration tests
To run a suite of suite of federation integration tests:
```bash
cd docker/federation-test
./run-tests.sh
```
2020-03-26 14:45:56 +00:00
2020-04-21 11:24:08 +00:00
## Running on a server
2020-07-03 18:17:21 +00:00
Note that federation is currently in alpha. **Only use it for testing** , not on any production server, and be aware that turning on federation may break your instance.
2020-04-21 11:24:08 +00:00
Follow the normal installation instructions, either with [Ansible ](administration_install_ansible.md ) or
[manually ](administration_install_docker.md ). Then replace the line `image: dessalines/lemmy:v0.x.x` in
`/lemmy/docker-compose.yml` with `image: dessalines/lemmy:federation` . Also add the following in
`/lemmy/lemmy.hjson` :
```
federation: {
enabled: true
2020-07-03 18:17:21 +00:00
tls_enabled: true,
allowed_instances: example.com,
2020-04-21 11:24:08 +00:00
}
```
2020-07-03 18:17:21 +00:00
Afterwards, and whenever you want to update to the latest version, run these commands on the server:
2020-04-21 11:24:08 +00:00
```
cd /lemmy/
sudo docker-compose pull
sudo docker-compose up -d
```
2020-08-06 19:44:47 +00:00
## Security Model
- HTTP signature verify: This ensures that activity really comes from the activity that it claims
- check_is_apub_valid : Makes sure its in our allowed instances list
- Lower level checks: To make sure that the user that creates/updates/removes a post is actually on the same instance as that post
For the last point, note that we are *not* checking whether the actor that sends the create activity for a post is
actually identical to the post's creator, or that the user that removes a post is a mod/admin. These things are checked
by the API code, and its the responsibility of each instance to check user permissions. This does not leave any attack
vector, as a normal instance user cant do actions that violate the API rules. The only one who could do that is the
admin (and the software deployed by the admin). But the admin can do anything on the instance, including send activities
from other user accounts. So we wouldnt actually gain any security by checking mod permissions or similar.