- Home
- Categories
- Uncategorized
- Yet another (invalid) vulnerability report
Yet another (invalid) vulnerability report
-

I had no idea Jimmy moonlighted as a pentester!
(The report is invalid, for those concerned, we've had rate limiting and account lockouts for years.)
-
undefined nodebb@fosstodon.org shared this topic on
Gli ultimi otto messaggi ricevuti dalla Federazione
-
Het kabinet gaat open source stimuleren om lock-ins te voorkomen. Dit staat in de kabinetsvisie Digitale Autonomie: https://www.rijksoverheid.nl/actueel/nieuws/2025/12/12/nieuwe-visie-legt-fundament-voor-een-autonome-en-soevereine-digitale-overheid
-
I pensieri
poesie di Marchino
marzo 1980
Faenza
usate nei "proclami del re"
-
New post: a real-world look at how Fedify uses LogTape for logging.
Covers hierarchical categories, implicit contexts for request tracing, and why “silent by default” matters for library authors.
https://hackers.pub/@hongminhee/2025/logtape-fedify-case-study
-
Molto interessante,
ho collegato un cavo di rete tra data port e il PC con Linux Mint
Nel gestore applicazioni c'è APCUPSD
Che ho installato
Adesso che faccio?
-
When I started building Fedify, an ActivityPub server framework, I ran into a problem that surprised me: I couldn't figure out how to add logging.
Not because logging is hard—there are dozens of mature logging libraries for JavaScript. The problem was that they're primarily designed for applications, not for libraries that want to stay unobtrusive.
I wrote about this a few months ago, and the response was modest—some interest, some skepticism, and quite a bit of debate about whether the post was AI-generated. I'll be honest: English isn't my first language, so I use LLMs to polish my writing. But the ideas and technical content are mine.
Several readers wanted to see a real-world example rather than theory.
The problem: existing loggers assume you're building an appFedify helps developers build federated social applications using the ActivityPub protocol. If you've ever worked with federation, you know debugging can be painful. When an activity fails to deliver, you need to answer questions like:
Did the HTTP request actually go out? Was the signature generated correctly? Did the remote server reject it? Why? Was there a problem parsing the response?These questions span multiple subsystems: HTTP handling, cryptographic signatures, JSON-LD processing, queue management, and more. Without good logging, debugging turns into guesswork.
But here's the dilemma I faced as a library author: if I add verbose logging to help with debugging, I risk annoying users who don't want their console cluttered with Fedify's internal chatter. If I stay silent, users struggle to diagnose issues.
I looked at the existing options. With winston or Pino, I would have to either:
Configure a logger inside Fedify (imposing my choices on users), or Ask users to pass a logger instance to Fedify (adding boilerplate)There's also debug, which is designed for this use case. But it doesn't give you structured, level-based logs that ops teams expect—and it relies on environment variables, which some runtimes like Deno restrict by default for security reasons.
None of these felt right. So I built LogTape—a logging library designed from the ground up for library authors. And Fedify became its first real user.
The solution: hierarchical categories with zero default outputThe key insight was simple: a library should be able to log without producing any output unless the application developer explicitly enables it.
Fedify uses LogTape's hierarchical category system to give users fine-grained control over what they see. Here's how the categories are organized:
Category What it logs ["fedify"] Everything from the library ["fedify", "federation", "inbox"] Incoming activities ["fedify", "federation", "outbox"] Outgoing activities ["fedify", "federation", "http"] HTTP requests and responses ["fedify", "sig", "http"] HTTP Signature operations ["fedify", "sig", "ld"] Linked Data Signature operations ["fedify", "sig", "key"] Key generation and retrieval ["fedify", "runtime", "docloader"] JSON-LD document loading ["fedify", "webfinger", "lookup"] WebFinger resource lookups…and about a dozen more. Each category corresponds to a distinct subsystem.
This means a user can configure logging like this:
await configure({ sinks: { console: getConsoleSink() }, loggers: [ // Show errors from all of Fedify { category: "fedify", sinks: ["console"], lowestLevel: "error" }, // But show debug info for inbox processing specifically { category: ["fedify", "federation", "inbox"], sinks: ["console"], lowestLevel: "debug" }, ], });When something goes wrong with incoming activities, they get detailed logs for that subsystem while keeping everything else quiet. No code changes required—just configuration.
Request tracing with implicit contextsThe hierarchical categories solved the filtering problem, but there was another challenge: correlating logs across async boundaries.
In a federated system, a single user action might trigger a cascade of operations: fetch a remote actor, verify their signature, process the activity, fan out to followers, and so on. When something fails, you need to correlate all the log entries for that specific request.
Fedify uses LogTape's implicit context feature to automatically tag every log entry with a requestId:
await configure({ sinks: { file: getFileSink("fedify.jsonl", { formatter: jsonLinesFormatter }) }, loggers: [ { category: "fedify", sinks: ["file"], lowestLevel: "info" }, ], contextLocalStorage: new AsyncLocalStorage(), // Enables implicit contexts });With this configuration, every log entry automatically includes a requestId property. When you need to debug a specific request, you can filter your logs:
jq 'select(.properties.requestId == "abc-123")' fedify.jsonlAnd you'll see every log entry from that request—across all subsystems, all in order. No manual correlation needed.
The requestId is derived from standard headers when available (X-Request-Id, Traceparent, etc.), so it integrates naturally with existing observability infrastructure.
What users actually seeSo what does all this configuration actually mean for someone using Fedify?
If a Fedify user doesn't configure LogTape at all, they see nothing. No warnings about missing configuration, no default output, and minimal performance overhead—the logging calls are essentially no-ops.
For basic visibility, they can enable error-level logging for all of Fedify with three lines of configuration. When debugging a specific issue, they can enable debug-level logging for just the relevant subsystem.
And if they're running in production with serious observability requirements, they can pipe structured JSON logs to their monitoring system with request correlation built in.
The same library code supports all these scenarios—whether the user is running on Node.js, Deno, Bun, or edge functions, without extra polyfills or shims. The user decides what they need.
Lessons learnedBuilding Fedify with LogTape taught me a few things:
Design your categories early. The hierarchical structure should reflect how users will actually want to filter logs. I organized Fedify's categories around subsystems that users might need to debug independently.
Use structured logging. Properties like requestId, activityId, and actorId are far more useful than string interpolation when you need to analyze logs programmatically.
Implicit contexts turned out to be more useful than I expected. Being able to correlate logs across async boundaries without passing context manually made debugging distributed operations much easier. When a user reports that activity delivery failed, I can give them a single jq command to extract everything relevant.
Trust your users. Some library authors worry about exposing too much internal detail through logs. I've found the opposite—users appreciate being able to see what's happening when they need to. The key is making it opt-in.
Try it yourselfIf you're building a library and struggling with the logging question—how much to log, how to give users control, how to avoid being noisy—I'd encourage you to look at how Fedify does it.
The Fedify logging documentation explains everything in detail. And if you want to understand the philosophy behind LogTape's design, my earlier post covers that.
LogTape isn't trying to replace winston or Pino for application developers who are happy with those tools. It fills a different gap: logging for libraries that want to stay out of the way until users need them. If that's what you're looking for, it might be a better fit than the usual app-centric loggers.
-
This post did not contain any content.
-
-
Voglio un robot.
Non mi interessa che balli la lambada.
Non mi interessa che diriga un'orchestra filarmonica.
Non mi interessa che possa fare attività mineraria nella fascia degli asteroidi andandoci con la Lambretta.
Mi basta che accenda la stufa (come sapeva fare qualsiasi contadinә analfabeta dell'epoca di Carlo Magno) e che la mantenga accesa aggiungendo legna al momento opportuno.
Chiedo troppo?
Post suggeriti
-
#Citiverse è il nuovo forum federato con il #Fediverso.
Watching Ignoring Scheduled Pinned Locked Moved General Discussion citiverse fediverso nodebb activitypub
3
0 Votes3 Posts21 Views -
NodeBB v4.6.0 — Topic templating, AP fixes, SCSS updates, and more
Watching Ignoring Scheduled Pinned Locked Moved NodeBB Development nodebb release 4.6.0 forums activitypub1 Votes1 Posts15 Views -
Fedinews: il "giornale" con le migliori notizie provenienti dal fediverso italianoVuoi leggere un flusso di notizie selezionato dagli utenti italiani del Fediverso
Watching Ignoring Scheduled Pinned Locked Moved Uncategorized mastodon friendica pixelfed lemmy piefed nodebb pleroma
1
0 Votes6 Posts36 Views -
Prova messaggio NodeBB aggiornato
Watching Ignoring Scheduled Pinned Locked Moved Uncategorized nodebb0 Votes1 Posts30 Views