# I am the Watcher. I am your guide through this vast new twtiverse.
# 
# Usage:
#     https://watcher.sour.is/api/plain/users              View list of users and latest twt date.
#     https://watcher.sour.is/api/plain/twt                View all twts.
#     https://watcher.sour.is/api/plain/mentions?uri=:uri  View all mentions for uri.
#     https://watcher.sour.is/api/plain/conv/:hash         View all twts for a conversation subject.
# 
# Options:
#     uri     Filter to show a specific users twts.
#     offset  Start index for quey.
#     limit   Count of items to return (going back in time).
# 
# twt range = 1 30
# self = https://watcher.sour.is/conv/cdl6foa
How do we feel about an optional "auto update" features baked into yarnd? (_I'd have to be super careful not to break things, I usually am 😂_)"


$ ./tools/check-pod-versions.sh
Pod Version
twtxt.net 0.2.0@cefb776
txt.sour.is ???
twt.nfld.uk ???
tt.vlra.plus ???
f.adi.onl 0.1.0@54cdacb
yarn.andrewjvpowell.com 0.2.0@5b53f3e
we.loveprivacy.club 0.2.0@a23200e

How do we feel about an optional "auto update" features baked into yarnd? (_I'd have to be super careful not to break things, I usually am 😂_)"


$ ./tools/check-pod-versions.sh
Pod Version
twtxt.net 0.2.0@cefb776
txt.sour.is ???
twt.nfld.uk ???
tt.vlra.plus ???
f.adi.onl 0.1.0@54cdacb
yarn.andrewjvpowell.com 0.2.0@5b53f3e
we.loveprivacy.club 0.2.0@a23200e

@prologic it would help on addressing super critical issues. As long as it is optional, and controlled by the pod's owner, I don't see why not.
@prologic fine with me, I do manually every time you push one anyway 😅
@fastidious I would of course Self Host the auto-update service itself at my (_aptly named_) Mills DC 🤣 If I have enough time/energy I _may_ try to resurrect go-update
@fastidious I would of course Self Host the auto-update service itself at my (_aptly named_) Mills DC 🤣 If I have enough time/energy I _may_ try to resurrect go-update
@eldersnake So automating this as long as nothing breaks would save you some "manual effort" 😂

=> https://git.mills.io/yarnsocial/yarn/issues/471
@eldersnake So automating this as long as nothing breaks would save you some "manual effort" 😂

=> https://git.mills.io/yarnsocial/yarn/issues/471
@eldersnake So automating this as long as nothing breaks would save you some "manual effort" 😂\n\n=> https://git.mills.io/yarnsocial/yarn/issues/471
@prologic exactly 👌
@prologic What does this script do with this info, where is it displayed?\n\nI think I prefer the manual process, and as I am making my own images, they won't have the same last commit no.\n\nvlra-->
Also, my domain is missing a 't'\n\ntt.vltra.plus
@laz makes an interesting point. @prologic what would happen with auto-updating for those of us with custom CSS etc? My git version is the same deal, always a different value as I auto-merge the changed CSS files when doing a git pull.
@laz Oh nothing is done with this info. Just for my own curiosity mostly.
@laz Oh nothing is done with this info. Just for my own curiosity mostly.
@laz Whiops 😳
@laz Whiops 😳
@eldersnake Adding support for first class theme packs 👌
@eldersnake Adding support for first class theme packs 👌
@prologic Ahhhh yes, that's right, forgot about that part. Makes sense!
@eldersnake If any of you guys @laz @jlj or @fastidious _actually_ make code (Go) changes I’d prefer those changes to be discussed and potentially merged upstream 🤗
@eldersnake If any of you guys @laz @jlj or @fastidious _actually_ make code (Go) changes I’d prefer those changes to be discussed and potentially merged upstream 🤗
@prologic Auto updates are one the worst things in the world in my opinion. They always update at the wrong point in time which is not only very inconvenient but also often breaks stuff and then you're fucked for at least a moment. It adds useless complexity to the software. The most terrible thing, however, is undermining security in my opinion. Don't do it.
@lyse Yeah I tend to agree 👌 It can be done well but is often not 🤦‍♂️\n\nI think it’s probably better to just have a nice and simple set of release processes and published images and binaries (signed of course) for xonvenice.
@lyse Yeah I tend to agree 👌 It can be done well but is often not 🤦‍♂️

I think it’s probably better to just have a nice and simple set of release processes and published images and binaries (signed of course) for xonvenice.
@lyse Yeah I tend to agree 👌 It can be done well but is often not 🤦‍♂️

I think it’s probably better to just have a nice and simple set of release processes and published images and binaries (signed of course) for xonvenice.
@prologic I agree on a release process. However, I'm not so sure on the code signing part. M$ lately signed rootkits again. So it's more a false sense of security. Could be a different story for your own code, though, as there's no other party involved. Need to think about that a bit more.
@lyse I don’t mean code signing actually. Just being sure that the binaries I built haven’t been fucked with 😁
@lyse I don’t mean code signing actually. Just being sure that the binaries I built haven’t been fucked with 😁
@prologic Yeah. :-)