#social 2018-09-02

2018-09-02 UTC
#
aaronpk
hm I must be doing something wrong, neither is working
#
aaronpk
oh it did, it just took a long time
#
aaronpk
I think it requires the full object to be sent tho
KevinMarks_ joined the channel
#
aaronpk
yeah it does
#
saranix
that's in ap spec
KevinMarks joined the channel
#
aaronpk
can't get pinned toots to work :(
#
aaronpk
a profile update isn't triggering it either
#
saranix
<heluecht[m]> Do you know some outboxes besides Pleroma, Mastodon and Hubzilla? -- anyone know of any others?
#
saranix
not even just outboxes
#
saranix
any impl I'm looking for
#
saranix
that I can possibly test with
#
saranix
also, anyone else get federation working with mastodon/hubzilla? were there any tricks? My pleroma worked right out the box but the other 2 are still not working even after massive accomodations
#
dansup
working on federation right now :)
#
heluecht[m]
dansup: What is the reason you are using fields like "inReplyToAtomUri"?
#
dansup
legacy ostatus support
#
dansup
still working on removing OStatus
#
heluecht[m]
But it does contain the same value as "inReplyTo". Or is there some usecase where this isn't the case?
xmpp-social and raucao joined the channel
#
heluecht[m]
What about changing nicknames on existing accounts? Is this supported or mustn't "preferredUsername" never change?
timbl joined the channel
#
vasilakisfil
heluecht[m] looking the spec, it says that `This specification registers the "webfinger" well-known URI in the "Well-Known URIs" registry as defined by RFC 5785`. Doesn't this mean that we won't have an unknown url path but instead it will be like http://domain.tld/.well-known/webfinger ?
#
vasilakisfil
or is this just a convention ? (having the webfinger under well-known url)
#
vasilakisfil
to me it feels like webfinger is something like Mark's json home (https://www.ietf.org/archive/id/draft-nottingham-json-home-06.txt) for APIs. A starting point for a domain. I might be wrong though but that's what I feel is useful for.
#
heluecht[m]
The path http://domain.tld/.well-known/webfinger is fixed. In the past you also had to parse http://domain.tld/.well-known/host-meta to find the webfinger url. But at some point the webfinger path was fixed.
#
heluecht[m]
This "host-meta" would be fine to find out the path for the shared inbox.
#
vasilakisfil
ah didn't know about https://tools.ietf.org/html/rfc6415 (host-meta)
#
heluecht[m]
I don't know the RFCs very much. I mostly learn by reading existing code and analyzing existing protocol content.
#
heluecht[m]
I like to learn by reverse engineering.
#
vasilakisfil
rfcs are very explanatory with enrmous details if you know the domain, but not good at all to intoduce in something
#
heluecht[m]
And I do have massive problems in understand formal stuff - especially when it isn't written in German.
#
vasilakisfil
I see
#
vasilakisfil
I am looking to build a social Voip protocol using web standards and webrtc
#
vasilakisfil
webrtc allows you to do cross-domain calls (from foo.com to bar.com) so I think there is a nice opportunity to get rid off the big players that use our data to make money.
#
heluecht[m]
Nextcloud is doing something like this as well.
#
heluecht[m]
And Nextcloud is planning to support AP as well.
#
JasonRobinson[m]
They actually already use AP between Nextcloud servers
#
JasonRobinson[m]
Just not in a way that is compatible with the other implementations
#
vasilakisfil
ah let me check it
#
vasilakisfil
I think they use AP for the chat part, not the voip part
#
vasilakisfil
I think the chat part is much more complex, and you get many options on how to design your solution. I am interested only on the voip/calls part.
#
vasilakisfil
also it doesn't seem to have optimized it for cross-domain functionality, in the philosophie of indieweb basically (everyone has her own domain that he/she trusts)
#
vasilakisfil
yeah I can't find anything regarding how cross-domain calls should take place
#
vasilakisfil
because ideally I should be able to build my own app that can work with my friend's nextcloud talk app. But in order to achieve this, the underlying protocols must be based in web standards (and if not should be definitely documented somewhere).
#
heluecht[m]
I think that Nextcloud is committed to open stuff - that's why they forked from Owncloud. So we should see how this evolves.
#
heluecht[m]
I'm currently analyzing AP data (I'm scanning all outboxes in my reach). I have q question: Is there any need as a receiver of a post to store "to", "cc" or "bcc"?
#
JasonRobinson[m]
At least for non-public you'll need to store them to see if local users can access the content.
#
JasonRobinson[m]
Can't think of anything else really
KevinMarks_ and KevinMarks joined the channel
#
saranix
there any need as a receiver of a post to store "to", "cc" or "bcc"? ->> for activitypub (activity+json) requests no, if you've already used it for delivery you can discard because no other servers will come looking for it at your server, however, for web interface with non-publicposts, you will want to check against for authorization while formulating the web page
#
saranix
only that 1 use case that I can think of
#
aaronpk
seems like mastodon could do a better job of deciding where to send delete account activities
KevinMarks joined the channel