Rudis Muiznieks 71e6d70521 | ||
---|---|---|
data | ||
static | ||
test | ||
.gitignore | ||
Dockerfile | ||
LICENSE | ||
README.md | ||
docker-compose.yaml | ||
schema.sql | ||
server.pl |
README.md
Dotplan
A modern, decentralized re-imagining of the Unix plan file.
- User-provided content tied to an email address.
- Text only.
- No re-tweets, shares,
@s
, likes, or boosting of any kind. - Authenticity optionally verified by clients using minisign.
- Accessed via public APIs.
- Open source.
- Self-hostable, discovery via domain SRV records.
Client Implementations and Tools
- dotplan-cli is a script for interacting with dotplan providers from the linux shell
API
Any Dotplan implementation should expose at least the following endpoint and behavior:
GET /plan/{email}
- retrieve a planAccept: text/plain
request header - return raw plan contentAccept: application/json
request header - return json plan details:plan
- raw plan contenttimestamp
- when this plan was createdsignature
- optional signature if this plan was signed
Last-Modified
response header should indicate when the plan was createdX-Dotplan-Pubkey: {base64 signify pubkey}
request header - perform signature verification- append
X-Dotplan-Verified: true
response header if verification succeeded 403
if verification failed or is not supported by the server- client-side signature verification using the json response should be favored since the server may not be trusted
- append
404
if no plan found301
redirect if domain SRV record indicates plan is on a different dotplan provider- this is optional for servers to act as relays, client-side SRV lookups should be favored since the server may not be trusted
Authentication
The reference dotplan implementation also exposes these endpoints for account management and authentication. Other implementations may differ and offer other authentication mechanisms (OAuth2 for example, or supporting the creation and invalidation of multiple authentication tokens).
POST /users/{email}
- request new account- request json data:
password
- the password for the new account
- an email with a validation link will be sent
- request json data:
PUT /users/{email}
- validate new account- request json data:
token
- the validation token from the email
- request json data:
GET /token
- retrieve auth token- http basic auth
?expires={minutes}
sets an explicit expiration, default is 5 minutes from creation- response json data:
token
- the authentication token
DELETE /token
- invalidate current auth token- http basic auth
GET /users/{email}/pwchange
- get password change token- an email with a password change token will be sent
- token expires 600 seconds from creation
PUT /users/{email}/pwchange
- update password- request json data:
password
- the new passwordtoken
- the password change token from the email
- request json data:
Updating a Plan
The reference dotplan implementation exposes this endpoint to update a plan using a given authentication token. Other implementations may differ and offer other mechanisms to update a plan (by email or text message for example, or integration with other services).
PUT /plan/{email}
- update a plan- request json data:
plan
- optional new plan contentsignature
- optional ascii encoded PGP signatureauth
- the authentication token
- omitting
plan
from the payload will delete the existing plan
- request json data:
Experimental
If experimental features are enabled in this reference implementation, GET /js/{email}
with an optional callback
parameter will return a JSONP script that calls your function (handle_dotplan
by default), passing the plan in json format. You can also optionally specify a pubkey
parameter (if verification fails it will return an {"error":"..."}
object).
Discovery via Domain SRV
To facilitate service discovery by Dotplan clients and relays, add a SRV record to your email domain with the name _dotplan._tcp
. For example, to use dotplan.online
as the service provider for email addresses at example.com
, the record would look like this:
_dotplan._tcp.example.com. 86400 IN SRV 0 1 443 dotplan.online.
Docker Quick Run
git clone https://code.sitosis.com/rudism/dotplan-online.git
cd dotplan-online
cp data/msmtprc.example data/msmtprc
Edit the Dockerfile
if you want to run as a user other than PID 1000, edit the ENVIRONMENT
section of the docker-compose.yaml
and make any other customizations for your setup, and edit the example provided data/msmtprc
with your real SMTP server details (only used to send email verifications for new signups and password reset links).
cat schema.sql | sqlite3 data/users.db
docker-compose build
docker-compose up -d
You should now be able to make requests at http://localhost:4227
, which is where you should point your reverse proxy for SSL configuration, etc.