Cloudillo Documentation
Collaborating Infrastructure Owned by its Users
Collaborating Infrastructure Owned by its Users
Cloudillo is a versatile Distributed, Self-Hosted, Open-Source Application Platform designed to empower your creativity, facilitate seamless collaboration, and enable easy sharing.
Cloudillo can be:
Cloudillo takes a unique approach by storing all your data locally while making it globally accessible through its unparalleled API. This ensures you have full control over your data while enjoying the benefits of a worldwide reach.
Cloudillo introduces a groundbreaking method for Global Authentication, Authorization, and Verification. Share your data securely without requiring users to register on your instance, mirroring the convenience of Cloud-based platforms.
Thanks to this fresh perspective, Cloudillo-based applications can establish connections that might seem impossible on other platforms. This newfound flexibility opens doors to innovative and seamless collaborations between applications.
Ready to experience collaboration on a whole new level? Explore Cloudillo and witness the difference.
When you are ready to join the Cloudillo Network, you’ll need to make two decisions:
You identity is like your unique username on the network. Cloudillo uses the Domain Name System — the backbone of the internet — to create profile identities. This approach eliminates the need for a central provider, although it might seem overwhelming for newcomers. To simplify the process, you have two options:
This is where your data will be stored.
Option 1: If you have your own server or a home NAS (Network Attached Storage), you can use that as your storage provider. You can even invite your family and friends to use it.
Option 2: Don’t want to manage your own storage? No problem. You can opt for a Cloudillo Storage Provider. They handle all the technical stuff for you.
Cloudillo is all about giving you control and keeping your data secure. Separating your identity from your storage provider makes it easy to switch storage options whenever you need to.
Many people and organizations already have domain names. You can use yours as your identity and even create sub-identities for different purposes. This helps organizations give their members identities tied to their domain.
If you control your identity, switching storage providers is simple. Whether you move to self-hosting or another provider, your identity remains intact, making the transition seamless.
Technically, yes. However, for security reasons, it’s better to choose different providers. Using separate providers avoids potential conflicts of interest if you ever need to switch storage providers.
Your identity provider is crucial. Ensure you trust them, as they could theoretically take control of your identity. If this concerns you, registering your own domain name can offer maximum security.
Keep in mind, on Cloudillo you own not only your data, but also your network, followers, and likes. No one can take these away from you, unless they gain control of your identity.
You have several options for installing Cloudillo. The simplest and most versatile is using Docker Another thing you should decide is whether you want to run Cloudillo in standalone mode or in proxy mode. The latter is useful if you want to run Cloudillo behind a reverse proxy.
Here is a simple one-liner:
docker run -d --name cloudillo \
-v /var/vol/cloudillo:/data \
-p 443:443 -p 80:80 \
-e LOCAL_IPS=1.2.3.4 \
-e BASE_ID_TAG=agatha.example.com \
-e BASE_APP_DOMAIN=agatha.example.com \
-e BASE_PASSWORD=SomeSecret \
-e ACME_EMAIL=user@example.com \
-e ACME_TERMS_AGREED=true \
cloudillo/cloudillo:latest
You basically need a local directory on your server and mount it to /data inside the container and publish port 443 (HTTPS) and 80 (HTTP). You can read about the configuration environment variables below.
Cloudillo in standalone mode uses TLS certificates managed by Let’s Encrypt. If you want to use different certificates then you have to use Proxy Mode.
For Let’s Encrypt certificate issuance to work you have to ensure that $BASE_APP_DOMAIN and cl-o.$BASE_ID_TAG both have DNS A records pointing to one of $LOCAL_IPS before first starting the container.
Here is a docker-compose for the same:
version: "3"
services:
cloudillo:
image: cloudillo/cloudillo:latest
container_name: cloudillo
volumes:
- /var/vol/cloudillo:/data
ports:
- 443:443
- 80:80
environment:
- LOCAL_IPS: 1.2.3.4
- BASE_ID_TAG: agatha.example.com
- BASE_APP_DOMAIN: agatha.example.com
- BASE_PASSWORD: SomeSecret
- ACME_EMAIL: user@example.com
- ACME_TERMS_AGREED: true
You should change the default password as soon as possible!
Variable | Value | Default |
---|---|---|
MODE | “standalone” or “proxy” | “standalone” |
LOCAL_IPS | Comma separated list of IP addresses this node serves | * |
BASE_ID_TAG | ID tag for the admin user to create | * |
BASE_APP_DOMAIN | App domain for the admin user to create | * |
BASE_PASSWORD | Password for the admin user to create | * |
ACME_EMAIL | Email address for ACME registration | - |
ACME_TERMS_AGREED | Whether to agree to ACME terms | - |
DATA_DIR | Path to the data directory | /data |
PRIVATE_DATA_DIR | Path to the private data directory | $DATA/priv |
PUBLIC_DATA_DIR | Path to the public data directory | $DATA/pub |
In case you are not familiar with the Cloudillo Identity System we provide some information about the notions used above:
The ID tag is the unique identifier of a Cloudillo profile. It can be any domain name associated with a user.
The App Domain is the domain address used by the user to access their Cloudillo shell. Currently the App Domain is also unique for every user, but it might change in the future. It is preferably the same as the ID tag of the user, but it can be different when the domain is used by an other site.
For a domain to work as a Cloudillo Identity it must serve a Cloudillo API endpoint accessable at the cl-o subdomain. In the above example you have to create the following DNS records:
Name | Type | Value | Purpose |
---|---|---|---|
agatha.example.com | A | 1.2.3.4 | App domain (APP_DOMAIN) |
cl-o.agatha.example.com | A | 1.2.3.4 | API domain (cl-o.ID_TAG) |
An other one-liner:
docker run -d --name cloudillo \
-v /var/vol/cloudillo:/data \
-p 1443:1443 \
-e MODE=proxy \
-e LOCAL_IPS=1.2.3.4 \
-e BASE_ID_TAG=agatha.example.com \
-e BASE_APP_DOMAIN=agatha.example.com \
-e BASE_PASSWORD=SomeSecret
In proxy mode you have to provide your own solution for TLS certificates. In proxy mode Cloudillo serves its API port on 1443 but using HTTP and it doesn’t serve the HTTP port by default. You should provide your own redirections. However, you can turn it on with the LISTEN_HTTP=1080 environment variable.
We provide an example nginx configuration:
server {
listen 80;
server_name agatha.example.com cl-o.agatha.example.com;
location /.well-known/ {
root /var/www/certbot;
autoindex off;
}
location / {
return 301 https://$host$request_uri;
}
}
server {
listen 443 ssl;
server_name agatha.example.com cl-o.agatha.example.com;
ssl_certificate /etc/letsencrypt/live/agatha.example.com/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/agatha.example.com/privkey.pem;
location /.well-known/cloudillo/id-tag {
add_header 'Access-Control-Allow-Origin' '*';
return 200 '{"idTag":"agatha.example.com"}\n';
}
location /api {
rewrite /api/(.*) /api/$1 break;
proxy_pass http://localhost:1443/;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto https;
proxy_set_header X-Forwarded-Host $host;
client_max_body_size 100M;
}
location /ws {
proxy_pass http://localhost:1443;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto https;
proxy_set_header X-Forwarded-Host $host;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "Upgrade";
}
location / {
# You can serve the cloudillo shell locally, or proxy it.
root /home/agatha/cloudillo/shell;
try_files $uri /index.html;
autoindex off;
expires 0;
}
}
You can visit Cloudillo’s GitHub page for instructions:
Once you’ve set up your Cloudillo Identity and Storage, it’s time to get creative and start sharing content.
To access your Cloudillo Space, use your own URL, which usually matches your Identity. First, authenticate yourself using the method you set up during installation or registration.
Remember, always access Cloudillo using your own URL, and never give your credentials on any other site!
Inside your Cloudillo Space you’ll run various applications from other spaces. Cloudillo will always let you know when this happens and shows the trust level of the application.
When you enter your Cloudillo Space, you’ll see the Cloudillo Shell. This is the main application and it typically displays a header on the top of the window, unless you are running a full-screen application.
Cloudillo doesn’t have a central database, so you’ll need to know the identities of other users, organizations, or groups to connect with them. Once you’ve joined some groups, you can connect with others through those groups.
You can start by following the cloudillo.net identity, which is the official identity of the Cloudillo Community. From there you can find and join other groups.
Cloudillo is an open-source collaboration platform that allows users to store their own data wherever they choose. Users can:
This ensures privacy-conscious users maintain full control while enabling seamless onboarding for less technical users. The design also ensures full user autonomy, preventing vendor lock-in by allowing seamless migration between storage providers or self-hosting at any time.
Cloudillo decouples identity from storage through a Domain Name System (DNS)-based identity system. Each user and community has a stable, trusted identifier independent of storage location.
Users can create identities using their own domain name, allowing them to maintain full control and leverage their trusted brand within the platform.
Cloudillo Identity Providers (CIP) help users create and manage identities without manual DNS setup. Any domain owner can implement a CIP, with the first provider being cloudillo.net.
Each Cloudillo Identity has a publicly accessible profile containing:
The Identity Public Key verifies user authenticity within the Cloudillo network.
Cloudillo supports event-driven communication between nodes. Actions are event-driven interactions that users perform, such as:
When an action occurs, Cloudillo generates a cryptographically signed Action Token, distributing it to involved parties. This mechanism prevents spam and unauthorized actions.
When a user wants to access a resource stored on another node (e.g., editing a document hosted by another user), the following process occurs:
This process ensures secure, decentralized access control without requiring direct trust between storage providers. This process is designed to be seamless, requiring no additional user interaction—offering the ease of centralized cloud platforms while maintaining full decentralization.
Cloudillo utilizes cryptographic tokens for authentication and authorization:
Cloudillo supports multiple resource types:
This design ensures Cloudillo remains flexible and adaptable to evolving user and developer needs.
Cloudillo Profiles are located using a DNS-based identity system.
Each Cloudillo Identity is associated with a specific API endpoint, which
can be accessed via the “cl-o” subdomain of the identity.
For example, the API domain of the cloudillo.net identity is available at
https://cl-o.cloudillo.net/
.
You can retrieve a Cloudillo profile by making an API request to the
/api/me
endpoint of the identity’s API domain:
curl https://cl-o.cloudillo.net/api/me
Example response:
{
"idTag": "cloudillo.net",
"name": "Cloudillo",
"type": "community",
"profilePic": "QoEYeG8TJZ2HTGhVlrtTDBpvBGOp6gfGhq4QmD6Z46w",
"keys": [
{
"keyId": "20250205",
"publicKey": "MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAENSq6EZZ+xCypWNkm+0+MHIZfLX7I01wTT+SOw7DoOUOuDAWKMkhBVG+SUb9AzCxEOlmkefuEW5zmXNwmH2MphEQW/r18RDjd+Nt5nbemBsoQzsm2Wg/mUyWBsKYs1oe5"
}
]
}
The profilePic field contains an identifier that allows retrieval of the profile’s profile picture using the Cloudillo Storage API. A request to retrieve the profile picture may look like this:
curl https://cl-o.nikita.cloudillo.net/api/store/NMzE4gNI29aEkiV6Q7I1UNWh4x2gFZ7753Pl74veYtU
A profile supports multiple cryptographic keys, enabling periodic key rotation for enhanced security. Older keys can be deprecated while maintaining account integrity.
Future enhancements will introduce key usage declarations, allowing users to assign specific permissions to different keys. This will enable finer security control and multi-purpose authentication, such as signing different actions
An Action Token represents a user action within Cloudillo. It can contain a post, comment, like, or other interaction. Each Action Token is:
Field | Type | Required | Description |
---|---|---|---|
iss | identity | * | The identity of the creator of the Action Token. |
aud | identity | The audience of the Action Token. | |
sub | identity | The subject of the Action Token. | |
iat | timestamp | * | The time when the Action Token was issued. |
exp | timestamp | The time when the Action Token will expire. | |
k | string | * | The ID of the key the identity used to sign the Token. |
t | string | * | The type of the Action Token. |
c | string / object | The content of the Action Token (specific to the token type). | |
p | string | The ID of the parent token (if any). | |
a | string[] | The IDs of the attachments (if any). |
Attachment and token IDs are derived using SHA256 hashes of their content, ensuring immutable references to external objects.
This is used by a profile owner to acknowledge a token posted to them.
The acknowledge token must contain a subject (sub) field which points to the actionId of the acknowledged action token.
The database key for an acknowledge token is [iss, t, sub]
User @owner.cloudillo.net acknowledges an action posted to it’s feed:
Field | Value |
---|---|
iss | owner.cloudillo.net |
iat | 2024-04-13T00:01:10.000Z |
k | 20240101 |
t | ACK |
sub | GvcUNhIJSqwAxmbn-oxUKFnXMp-663Qes-KcFNLC5aw |
This token represents a comment created by a user.
The comment token must contain a content (c) field which contains the text of the comment in markdown format. The token must also contain a parent (p) field which points to the parent object the comment is referring to.
For other constraints see the Action Tokens.
The database key for a comment token is [iss, t, id]
User @someotheruser.cloudillo.net writes a comment on a post:
Field | Value |
---|---|
iss | someotheruser.cloudillo.net |
aud | somegroup.cloudillo.net |
iat | 2024-04-13T00:01:00.000Z |
k | 20240301 |
t | CMNT |
c | “I love U too!” |
p | NAado5PS4j5+abYtRpBELU0e5OQ+zGf/tuuWvUwQ6PA= |
This token represents a connection intent created by a user.
The connect token can contain a content (c) field in markdown format. The token must contain an audience (aud) field which points to the identity the user is connecting with. For other constraints see the Action Tokens.
The database key for a connect token is [iss, t, aud]
User @alice.cloudillo.net wants to connect with @bob.cloudillo.net:
Field | Value |
---|---|
iss | alice.cloudillo.net |
aud | bob.cloudillo.net |
iat | 2024-04-13T00:01:10.000Z |
k | 20240101 |
t | CONN |
c | Hi! Remember me? We met last week on the bus. |
This token represents a conversation.
The conversation token must contain a content (c) field. For other constraints see the Action Tokens.
Field | Value |
---|---|
iss | someuser.cloudillo.net |
aud | somegroup.cloudillo.net |
iat | 2024-04-13T00:00:00.000Z |
k | 20240109 |
t | CONV |
c | “Let’s talk about this!” |
This token represents the sharing of a file with another user.
The fileshare token must contain a subject (sub) field which contains the fileId of the shared file.
The database key for an acknowledge token is [iss, t, sub]
User @alice.cloudillo.net shares a file with @bob.cloudillo.net:
Field | Value |
---|---|
iss | alice.cloudillo.net |
aud | bob.cloudillo.net |
iat | 2024-04-13T00:01:10.000Z |
k | 20240101 |
t | FSHR |
sub | 7NtuTab_K4FwYmARMNuk4 |
This token represents a follow intent created by a user.
The token must contain an audience (aud) field which points to the identity the user is following. For other constraints see the Action Tokens.
The database key for a follow token is [iss, t, aud]
User @alice.cloudillo.net follows @bob.cloudillo.net:
Field | Value |
---|---|
iss | alice.cloudillo.net |
aud | bob.cloudillo.net |
iat | 2024-04-13T00:01:10.000Z |
k | 20240101 |
t | FLLW |
This token represents a post created by a user.
The post token must contain a content (c) field. For other constraints see the Action Tokens.
There can be multiple subtypes of this token, which can represent the content of the post in different ways.
A simple text only post. The content must be in markdown format.
A post with an image. The content must be in markdown format, the attachment (a) field must contain exactly one item which must be an image.
A post with a video. The content must be in markdown format, the attachment (a) field must contain exactly one item which must be a video.
The database key for a post token is [iss, "POST", id]
User @someuser.cloudillo.net writes a post on the wall of @somegroup.cloudillo.net, attaching an image:
Field | Value |
---|---|
iss | someuser.cloudillo.net |
aud | somegroup.cloudillo.net |
iat | 2024-04-13T00:00:00.000Z |
k | 20240109 |
t | POST:IMG |
c | “Love U All <3” |
a | [“ohst:51mp8Oe5gekbAualO6jydbOriq0OfuZ5zpBY-I30U00,CFN6hm21Z73m12CK2igjFy8bVDhSV8oFZS4xOrzHE98,rk9n8iz–t0ov4sJAnBzEktmyZVsLmcKkPEVhkK4688,nfpr7eTtApLNTRS5qDokBsodo4UQ_zj7kzNWwvj7oEs”] |
This token represents a reaction created by a user.
The react token must not contain a content (c) field. The token must contain a parent (p) field which points to the parent object the reaction is referring to. For other constraints see the Action Tokens.
The database key for a react token is [iss, t, p]
User @someotheruser.cloudillo.net likes a post:
Field | Value |
---|---|
iss | someotheruser.cloudillo.net |
aud | somegroup.cloudillo.net |
iat | 2024-04-13T00:01:10.000Z |
k | 20240301 |
t | REACT:LIKE |
p | NAado5PS4j5+abYtRpBELU0e5OQ+zGf/tuuWvUwQ6PA= |
This token represents the statistics of reactions on an object (post, comment, etc.)
The issuer (iss) of the token must be the audience (aud) of the parent token (p). A statistics token must not contain an audience (aud) field. The token must contain a parent (p) field which points to the parent object the statistics are referring to. The statistics token must contain a content (c) field which is a JSON object in the following format:
Field | Value | Description |
---|---|---|
c | number | The number of comments (optional) |
r | number | The number of reactions (optional) |
For other constraints see the Action Tokens.
The database key for a reaction token is [iss, t, p]
User @someotheruser.cloudillo.net also likes the post:
Field | Value |
---|---|
iss | somegroup.cloudillo.net |
iat | 2024-04-13T00:01:10.000Z |
k | 20240301 |
t | STAT |
p | NAado5PS4j5+abYtRpBELU0e5OQ+zGf/tuuWvUwQ6PA= |
c | { “c”: 1, “r”: 2 } |
Access tokens are used to authenticate and authorize requests to the API. They are usually bound to a resource, which can reside on any node within the Cloudillo network.
When a user wants to access a resource, they follow this process:
sequenceDiagram box Alice frontend participant Alice shell participant Alice app end participant Alice node Alice shell ->>+Alice node: Initiate access token request Note right of Alice node: Create access token Alice node ->>+Alice shell: Access token granted deactivate Alice node Alice shell ->>+Alice app: Open resource with this token deactivate Alice shell Alice app ->+Alice node: Use access token loop Edit resource Alice app --> Alice node: Edit resource end deactivate Alice app
sequenceDiagram box Alice frontend participant Alice shell participant Alice app end participant Alice node participant Bob node Alice shell ->>+Alice node: Initiate access token request Note right of Alice node: Create signed request Alice node ->>+Bob node: Request access token Note right of Bob node: Verify signed request Note right of Bob node: Create access token deactivate Alice node Bob node ->>+Alice node: Grant access token deactivate Bob node Alice node ->>+Alice shell: Access token granted deactivate Alice node Alice shell ->>+Alice app: Open resource with this token deactivate Alice shell Alice app ->+Bob node: Use access token loop Edit resource Alice app --> Bob node: Edit resource end deactivate Alice app deactivate Bob node