# I am the Watcher. I am your guide through this vast new twtiverse.
# 
# Usage:
#     https://watcher.sour.is/api/plain/users              View list of users and latest twt date.
#     https://watcher.sour.is/api/plain/twt                View all twts.
#     https://watcher.sour.is/api/plain/mentions?uri=:uri  View all mentions for uri.
#     https://watcher.sour.is/api/plain/conv/:hash         View all twts for a conversation subject.
# 
# Options:
#     uri     Filter to show a specific users twts.
#     offset  Start index for quey.
#     limit   Count of items to return (going back in time).
# 
# twt range = 1 196323
# self = https://watcher.sour.is?offset=149025
# next = https://watcher.sour.is?offset=149125
# prev = https://watcher.sour.is?offset=148925
@prologic I can't exec to a running contaier, which seems odd.
[47°09′27″S, 126°43′18″W] 3763 days without news from Herve
https://www.youtube.com/watch?v=i04sSQjd-qo neovim golang
[47°09′21″S, 126°43′12″W] Storm recedes -- back to normal work
@prologic How can I host a webapp using the dogfood system?
@prologic I don't understand what you're saying. podman works with TLS. It does not have the "--docker" siwtch so you have to remove that and use the exact replacement commands that were in that github comment.
Hmmm if Podman can talk to a remote Docker API over SSH, this isn't going to work 😢


prologic@JamessMacStudio
Tue Aug 08 01:20:43
~/Projects/docker-proxy
 (main) 0 0
$ podman context list
Name        URI                   Identity    Default
localhost   tcp://localhost:2376              true

prologic@JamessMacStudio
Tue Aug 08 01:20:57
~/Projects/docker-proxy
 (main) 0
$ podman --help | grep id
      --identity string           path to SSH identity file, (CONTAINER_SSHKEY)


I was never able to get the SSH version of the intercepting proxy working. I spent a couple of years on/off trying to get it to work, but there are limitations with the standard library and/or the ssh library or something that prevented the SSH Proxy from fully working See Issue #2 which I've now closed as "won't fix".

I guess Podman needs to learn how to do TLS?
Hmmm if Podman can talk to a remote Docker API over SSH, this isn't going to work 😢


prologic@JamessMacStudio
Tue Aug 08 01:20:43
~/Projects/docker-proxy
 (main) 0 0
$ podman context list
Name        URI                   Identity    Default
localhost   tcp://localhost:2376              true

prologic@JamessMacStudio
Tue Aug 08 01:20:57
~/Projects/docker-proxy
 (main) 0
$ podman --help | grep id
      --identity string           path to SSH identity file, (CONTAINER_SSHKEY)


I was never able to get the SSH version of the intercepting proxy working. I spent a couple of years on/off trying to get it to work, but there are limitations with the standard library and/or the ssh library or something that prevented the SSH Proxy from fully working See Issue #2 which I've now closed as "won't fix".

I guess Podman needs to learn how to do TLS?
Hmmm if Podman can talk to a remote Docker API over SSH, this isn't going to work 😢


prologic@JamessMacStudio
Tue Aug 08 01:20:43
~/Projects/docker-proxy
 (main) 0 0
$ podman context list
Name        URI                   Identity    Default
localhost   tcp://localhost:2376              true

prologic@JamessMacStudio
Tue Aug 08 01:20:57
~/Projects/docker-proxy
 (main) 0
$ podman --help | grep id
      --identity string           path to SSH identity file, (CONTAINER_SSHKEY)


I was never able to get the SSH version of the intercepting proxy working. I spent a couple of years on/off trying to get it to work, but there are limitations with the standard library and/or the ssh library or something that prevented the SSH Proxy from fully working See Issue #2 which I've now closed as "won't fix".

I guess Podman needs to learn how to do TLS?
Hmmm trying this locally:


$ sh setup.sh
Error: --docker additional options "ca=/Users/prologic/.docker/certs.d/localhost/ca.pem,key=/Users/prologic/.docker/certs.d/localhost/key.pem,cert=/Users/prologic/.docker/certs.d/localhost/cert.pem" not supported


Not support for TLS?
Hmmm trying this locally:


$ sh setup.sh
Error: --docker additional options "ca=/Users/prologic/.docker/certs.d/localhost/ca.pem,key=/Users/prologic/.docker/certs.d/localhost/key.pem,cert=/Users/prologic/.docker/certs.d/localhost/cert.pem" not supported


Not support for TLS?
Hmmm trying this locally:


$ sh setup.sh
Error: --docker additional options "ca=/Users/prologic/.docker/certs.d/localhost/ca.pem,key=/Users/prologic/.docker/certs.d/localhost/key.pem,cert=/Users/prologic/.docker/certs.d/localhost/cert.pem" not supported


Not support for TLS?
@abucci Yeah okay, you make some excellent points 👌 😅
@abucci Yeah okay, you make some excellent points 👌 😅
@abucci Yeah okay, you make some excellent points 👌 😅
@abucci Be interesting to see if true 🤞
@abucci Be interesting to see if true 🤞
@abucci Be interesting to see if true 🤞
@prologic My understanding is that podman can talk to the Docker Engine API. It's just that the commands sometimes have different names in the podmanverse. I think--never used those features.
@prologic I don't get your objection. dockerd is 96M and has to run all the time. You can't use docker without it running, so you have to count both. docker + dockerd is 131M, which is over 3x the size of podman. Plus you have this daemon running all the time, which eats system resources podman doesn't use, *and* docker fucks with your network configuration right on install, which podman doesn't do unless you tell it to.

That's way fat as far as I'm concerned.

As far as corporate goes, podman is free and open source software, the end. docker is a company with a pricing model. It was founded as a startup, which suggests to me that, like almost all startups, they are seeking an exit and if they ever face troubles in generating that exit they'll throw out all niceties and abuse their users (see Reddit, the drama with spyware in Audacity, 10,000 other examples). Sure you can use it free for many purposes, and the container bits are open source, but that doesn't change that it's always been a corporate entity, that they can change their policies at any time, that they can spy on you if they want, etc etc etc.

That's way too corporate as far as I'm concerned.

I mean, all of this might not matter to you, and that's fine! Nothing wrong with that. But you can't have an alternate reality--these things I said are just facts. You can find them on Wikipedia or docker.com for that matter.
Also, just as an aside, your assertion that Docker is too "fat" and too "corporate" is untrue IMO. I've been using Docker for a _very_ long time (since ~0.7 or so) and if you take a closer look:


root@proxy:~# ls -lah /usr/bin/docker /usr/bin/dockerd
-rwxr-xr-x 1 root root 35M Jul 21 20:35 /usr/bin/docker
-rwxr-xr-x 1 root root 96M Jul 21 20:35 /usr/bin/dockerd
root@proxy:~#


Compared with Podman:


$ ls -lah /opt/homebrew/Cellar/podman/4.6.0/bin/podman-remote
-r-xr-xr-x 1 prologic admin 39M Jul 21 06:13 /opt/homebrew/Cellar/podman/4.6.0/bin/podman-remote


As you can see the Docker docker client (CLI) and the Podman tool is roughly the same "weight".

The difference is that Docker is a Server<->Client with a daemon architecture, whereas Podman runs containers directly, which is why only Linux is supported. Podman is a bit like my box project.~
Also, just as an aside, your assertion that Docker is too "fat" and too "corporate" is untrue IMO. I've been using Docker for a _very_ long time (since ~0.7 or so) and if you take a closer look:


root@proxy:~# ls -lah /usr/bin/docker /usr/bin/dockerd
-rwxr-xr-x 1 root root 35M Jul 21 20:35 /usr/bin/docker
-rwxr-xr-x 1 root root 96M Jul 21 20:35 /usr/bin/dockerd
root@proxy:~#


Compared with Podman:


$ ls -lah /opt/homebrew/Cellar/podman/4.6.0/bin/podman-remote
-r-xr-xr-x 1 prologic admin 39M Jul 21 06:13 /opt/homebrew/Cellar/podman/4.6.0/bin/podman-remote


As you can see the Docker docker client (CLI) and the Podman tool is roughly the same "weight".

The difference is that Docker is a Server<->Client with a daemon architecture, whereas Podman runs containers directly, which is why only Linux is supported. Podman is a bit like my box project.~
Also, just as an aside, your assertion that Docker is too "fat" and too "corporate" is untrue IMO. I've been using Docker for a _very_ long time (since ~0.7 or so) and if you take a closer look:


root@proxy:~# ls -lah /usr/bin/docker /usr/bin/dockerd
-rwxr-xr-x 1 root root 35M Jul 21 20:35 /usr/bin/docker
-rwxr-xr-x 1 root root 96M Jul 21 20:35 /usr/bin/dockerd
root@proxy:~#


Compared with Podman:


$ ls -lah /opt/homebrew/Cellar/podman/4.6.0/bin/podman-remote
-r-xr-xr-x 1 prologic admin 39M Jul 21 06:13 /opt/homebrew/Cellar/podman/4.6.0/bin/podman-remote


As you can see the Docker docker client (CLI) and the Podman tool is roughly the same "weight".

The difference is that Docker is a Server<->Client with a daemon architecture, whereas Podman runs containers directly, which is why only Linux is supported. Podman is a bit like my box project.~
@abucci The only problem with supporting this is the API. I'd hate to have to write a whole new filtering/mutating proxy ust to support Podman 😅 I _hope_ Podman _can_ talk to a Remote Docker API -- Because that's all that needs to happen 🤞 -- As you're no doubt aware TLS certs are used to authenticate to the proxy as well.
@abucci The only problem with supporting this is the API. I'd hate to have to write a whole new filtering/mutating proxy ust to support Podman 😅 I _hope_ Podman _can_ talk to a Remote Docker API -- Because that's all that needs to happen 🤞 -- As you're no doubt aware TLS certs are used to authenticate to the proxy as well.
@abucci The only problem with supporting this is the API. I'd hate to have to write a whole new filtering/mutating proxy ust to support Podman 😅 I _hope_ Podman _can_ talk to a Remote Docker API -- Because that's all that needs to happen 🤞 -- As you're no doubt aware TLS certs are used to authenticate to the proxy as well.
@prologic I had a feeling my container was not running remotely. It was too crisp.

podman is definitely capable of it. I've never used those features though so I'd have to play around with it awhile to understand how it works and then maybe I'd have a better idea of whether it's possible to get it to work with cas.run.

There's a podman-specific way of allowing remote container execution that wouldn't be too hard to support alongside docker if you wanted to go that route. Personally I don't use docker--too fat, too corporate. podman is lightweight and does virtually everything I'd want to use docker to do.
Build a 6502 computer | Ben Eater Sometimes I wish I had better eyesight to do projects like this 🤣 Really cool though just watching Ben's videos on constructing a computer mostly from scratch using the 6502 microcontroller 👌
Build a 6502 computer | Ben Eater Sometimes I wish I had better eyesight to do projects like this 🤣 Really cool though just watching Ben's videos on constructing a computer mostly from scratch using the 6502 microcontroller 👌
Build a 6502 computer | Ben Eater Sometimes I wish I had better eyesight to do projects like this 🤣 Really cool though just watching Ben's videos on constructing a computer mostly from scratch using the 6502 microcontroller 👌
I don't see anything from you 🤔 Nor in the service logs 🤔
I don't see anything from you 🤔 Nor in the service logs 🤔
I don't see anything from you 🤔 Nor in the service logs 🤔
@abucci Hmmm

> I ran some containers using podman and I think they are running remotely but I don’t know the right juju to verify. It looks right though!

Let me check...
@abucci Hmmm

> I ran some containers using podman and I think they are running remotely but I don’t know the right juju to verify. It looks right though!

Let me check...
@abucci Hmmm

> I ran some containers using podman and I think they are running remotely but I don’t know the right juju to verify. It looks right though!

Let me check...
@abucci Hmmm I've actually (funnily enough) been researching Podman ... As far as I can tell, it is not compatible at all with the Docker API. It is _only_ compatible with the Docker CLI. That means you can alias docker=podman, but cannot use podman as a "client" to a remote Docker API engine 😢
@abucci Hmmm I've actually (funnily enough) been researching Podman ... As far as I can tell, it is not compatible at all with the Docker API. It is _only_ compatible with the Docker CLI. That means you can alias docker=podman, but cannot use podman as a "client" to a remote Docker API engine 😢
@abucci Hmmm I've actually (funnily enough) been researching Podman ... As far as I can tell, it is not compatible at all with the Docker API. It is _only_ compatible with the Docker CLI. That means you can alias docker=podman, but cannot use podman as a "client" to a remote Docker API engine 😢
@prologic @jmjl
It looks like there's a podman issue for adding the context subcommand that docker has. Currently podman does not have this subcommand, although this comment has a translation to podman commands that are similar-ish.

I manually edited the shell script that cas.run add returns, changing all the docker commands to podman commands. Specifically, I put alias docker=podman at the top so the check for docker would pass, and then I replaced the last two lines of the script with these:


podman system connection add cas  "host=tcp://cas.run..."
podman system connection default cas


(that ... after cas.run is a bunch of connection-specific stuff)

I ran the script and it exited with no output. It does seem to have created a connection named "cas".

I can run containers using podman and I *think* they are running remotely but I don't know the right juju to verify. It looks right though!

This means you could probably make minor modifications to the generated shell script to support podman. Maybe when the check for docker fails, check for podman, and then later in the script use the podman equivalents to the docker context commands.
@prologic @jmjl
It looks like there's a podman issue for adding the context subcommand that docker has. Currently podman does not have this subcommand, although this comment has a translation to podman commands that are similar-ish.

I manually edited the shell script that cas.run add returns, changing all the docker commands to podman commands. Specifically, I put alias docker=podman at the top so the check for docker would pass, and then I replaced the last two lines of the script with these:


podman system connection add cas  "host=tcp://cas.run..."
podman system connection default cas


(that ... after cas.run is a bunch of connection-specific stuff)

I ran the script and it exited with no output. It did create a connection named "cas", and made that the default. I'm not super steeped in how podman works but I believe that's what you need to do to get podman to run containers remotely.

I ran some containers using podman and I *think* they are running remotely but I don't know the right juju to verify. It looks right though!

This means you could probably make minor modifications to the generated shell script to support podman. Maybe when the check for docker fails, check for podman, and then later in the script use the podman equivalents to the docker context commands.
@prologic @jmjl
It looks like there's a podman issue for adding the context subcommand that docker has. Currently podman does not have this subcommand, although this comment has a translation to podman commands that are similar-ish.

It looks like that's all you need to do to support podman right now! Details follow.

I manually edited the shell script that cas.run add returns, changing all the docker commands to podman commands. Specifically, I put alias docker=podman at the top so the check for docker would pass, and then I replaced the last two lines of the script with these:


podman system connection add cas  "host=tcp://cas.run..."
podman system connection default cas


(that ... after cas.run is a bunch of connection-specific stuff)

I ran the script and it exited with no output. It did create a connection named "cas", and made that the default. I'm not super steeped in how podman works but I believe that's what you need to do to get podman to run containers remotely.

I ran some containers using podman and I *think* they are running remotely but I don't know the right juju to verify. It looks right though!

This means you could probably make minor modifications to the generated shell script to support podman. Maybe when the check for docker fails, check for podman, and then later in the script use the podman equivalents to the docker context commands.
@prologic @jmjl
It looks like there's a podman issue for adding the context subcommand that docker has. Currently podman does not have this subcommand, although this comment has a translation to podman commands that are similar-ish.

It looks like that's all you need to do to support podman right now! Though I'm not 100% sure the containers I tried really are running remotely. Details below.

I manually edited the shell script that cas.run add returns, changing all the docker commands to podman commands. Specifically, I put alias docker=podman at the top so the check for docker would pass, and then I replaced the last two lines of the script with these:


podman system connection add cas  "host=tcp://cas.run..."
podman system connection default cas


(that ... after cas.run is a bunch of connection-specific stuff)

I ran the script and it exited with no output. It did create a connection named "cas", and made that the default. I'm not super steeped in how podman works but I believe that's what you need to do to get podman to run containers remotely.

I ran some containers using podman and I *think* they are running remotely but I don't know the right juju to verify. It looks right though!

This means you could probably make minor modifications to the generated shell script to support podman. Maybe when the check for docker fails, check for podman, and then later in the script use the podman equivalents to the docker context commands.
I also (btw) just put up a quick hacky website for it just now (_dogfodding the service itself of course_):

https://cas.run/
I also (btw) just put up a quick hacky website for it just now (_dogfodding the service itself of course_):

https://cas.run/
I also (btw) just put up a quick hacky website for it just now (_dogfodding the service itself of course_):

https://cas.run/
@abucci Yes @jmjl is right. This service uses the Docker API as one of its core components and thus relies on the Docker client, namely the docker CLI. You don't obviously need to have anything else but the CLI to use it as the containers are running remote form you. The install of the CLi is pretty quick 'n easy on most (_if not all?_) systems._
@abucci Yes @jmjl is right. This service uses the Docker API as one of its core components and thus relies on the Docker client, namely the docker CLI. You don't obviously need to have anything else but the CLI to use it as the containers are running remote form you. The install of the CLi is pretty quick 'n easy on most (_if not all?_) systems._
@abucci Yes @jmjl is right. This service uses the Docker API as one of its core components and thus relies on the Docker client, namely the docker CLI. You don't obviously need to have anything else but the CLI to use it as the containers are running remote form you. The install of the CLi is pretty quick 'n easy on most (_if not all?_) systems._
@abucci That all makes sense 👌
@abucci That all makes sense 👌
@abucci That all makes sense 👌
@abucci You need to install the docker command, as the script you are running calls docker a few times.
@prologic hmm, now I get this:


$ ssh -p 2222 -i PRIVATE_GITHUB_KEY GITHUB_USERNAME@cas.run add | sh
sh: 135: docker: not found


The quickstart says:

## Quick Start

  ssh -p 2222 cas.run add | sh


so that's why I tried this command (I had to modify it with my key and username like before)

Edit: 🤦‍♂ and that's becasue I don't have docker on this machine. Sorry about that, false alarm.
@prologic hmm, now I get this:


$ ssh -p 2222 -i PRIVATE_GITHUB_KEY GITHUB_USERNAME@cas.run add | sh
sh: 135: docker: not found


The quickstart says:

## Quick Start

  ssh -p 2222 cas.run add | sh


so that's why I tried this command (I had to modify it with my key and username like before)
@prologic hmm, now I get this:


$ ssh -p 2222 -i PRIVATE_GITHUB_KEY GITHUB_USERNAME@cas.run add | sh
sh: 135: docker: not found


The quickstart says:

## Quick Start

  ssh -p 2222 cas.run add | sh


so that's why I tried this command (I had to modify it with my key and username like before)

Edit: 🤦‍♂ and that's becasue I don't have docker on this machine. Sorry about that.
@prologic aha, thank you, that got me unjammed.

Turns out I thought I had an SSH key set up in github, but github didn't agree with me. So, I re-added the key.

I also had to modify the command slightly to:


ssh -p 2222 -i PRIVATE_GITHUB_KEY GITHUB_USERNAME@cas.run help


since I generate app-specific keypairs and need to specify that for ssh and I haven't configured it to magically choose the key so I have to specify it in the command line.

Anyhow, that did it. Thanks!
@prologic Yup! :) Was really nice. I was my kids age when I was on that train last time, so nice to bring back some memories, they had a really nice time.
@stigatle That is pretty cool 👌 Good 'ol fashioned steam engines? 🤔
@stigatle That is pretty cool 👌 Good 'ol fashioned steam engines? 🤔
@stigatle That is pretty cool 👌 Good 'ol fashioned steam engines? 🤔
We had a wonderful day yesterday :) We went on this train for a ride (30 minutes each way).


****
Odio los lunes. ⌘ Read more****
We might have a mousey in the housey
We might have a mousey in the housey
We might have a mousey in the housey\r
We might have a mousey in the housey
We might have a mousey in the housey
Anyways, I’ve been putting off walking in to the forest again (and going to the cheaper hypermarché at the same time). Should probably get around to that before the hookening
Anyways, I’ve been putting off walking in to the forest again (and going to the cheaper hypermarché at the same time). Should probably get around to that before the hookening
Anyways, I’ve been putting off walking in to the forest again (and going to the cheaper hypermarché at the same time). Should probably get around to that before the hookening
Anyways, I?ve been putting off walking in to the forest again (and going to the cheaper hypermarche at the same time). Should probably get around to that before the hookening\r
Anyways, I’ve been putting off walking in to the forest again (and going to the cheaper hypermarché at the same time). Should probably get around to that before the hookening
Also, regular reminder - fuck capitalism and may the wealth horders get what they deserve
Also, regular reminder - fuck capitalism and may the wealth horders get what they deserve\r
Also, regular reminder - fuck capitalism and may the wealth horders get what they deserve
Also, regular reminder - fuck capitalism and may the wealth horders get what they deserve
Also, regular reminder - fuck capitalism and may the wealth horders get what they deserve
Another part of this crisis is that I like the idea of what I was doing with gemini, but the main issue here is that hosting from my house when my internet is terminated every month for 10-15 days is a problem. Not just for my sanity, but also for reliability
Another part of this crisis is that I like the idea of what I was doing with gemini, but the main issue here is that hosting from my house when my internet is terminated every month for 10-15 days is a problem. Not just for my sanity, but also for reliability
Another part of this crisis is that I like the idea of what I was doing with gemini, but the main issue here is that hosting from my house when my internet is terminated every month for 10-15 days is a problem. Not just for my sanity, but also for reliability
Another part of this crisis is that I like the idea of what I was doing with gemini, but the main issue here is that hosting from my house when my internet is terminated every month for 10-15 days is a problem. Not just for my sanity, but also for reliability
Another part of this crisis is that I like the idea of what I was doing with gemini, but the main issue here is that hosting from my house when my internet is terminated every month for 10-15 days is a problem. Not just for my sanity, but also for reliability\r
I’m having a life crisis, I’m not happy with any of my internet presence (again). I don’t know what I want or how I want it to be. I let a lot of my domains expire (lol poor) but I still have my special core ones and I want them to all be loved equally
I’m having a life crisis, I’m not happy with any of my internet presence (again). I don’t know what I want or how I want it to be. I let a lot of my domains expire (lol poor) but I still have my special core ones and I want them to all be loved equally
I’m having a life crisis, I’m not happy with any of my internet presence (again). I don’t know what I want or how I want it to be. I let a lot of my domains expire (lol poor) but I still have my special core ones and I want them to all be loved equally
I’m having a life crisis, I’m not happy with any of my internet presence (again). I don’t know what I want or how I want it to be. I let a lot of my domains expire (lol poor) but I still have my special core ones and I want them to all be loved equally
I?m having a life crisis, I?m not happy with any of my internet presence (again). I don?t know what I want or how I want it to be. I let a lot of my domains expire (lol poor) but I still have my special core ones and I want them to all be loved equally\r
On my blog: Developer Diary, Purple Heart https://john.colagioia.net/blog/2023/08/07/purple-heart.html #programming #project #devjournal
[47°09′53″S, 126°43′34″W] Automatic systems disengaged due to heavy rain
user/bmallred/data/2023-08-07-05-51-04.fit: 5.45 miles, 00:09:21 average pace, 00:51:01 duration

#running
user/bmallred/data/2023-08-07-05-51-04.fit: 5.45 miles, 00:09:21 average pace, 00:51:01 duration

#running
user/bmallred/data/2023-08-07-05-51-04.fit: 5.45 miles, 00:09:21 average pace, 00:51:01 duration

#running
Pinellas County - Base: 5.45 miles, 00:09:21 average pace, 00:51:01 duration
pretty good run but it was very hard to get outside. the feels like was about 98F due to the humidity. feeling kind of low about missing my run yesterday but i will get over it.
#running
@abucci Ahh, do you have your Github account with SSH keys? Does https://github.com/${GITHUB_USER}.keys return keys for you? That's what its using to do auth right now.
@abucci Ahh, do you have your Github account with SSH keys? Does https://github.com/${GITHUB_USER}.keys return keys for you? That's what its using to do auth right now.
@abucci Ahh, do you have your Github account with SSH keys? Does https://github.com/${GITHUB_USER}.keys return keys for you? That's what its using to do auth right now.
@xuu @movq The Mills DC here does about ~2TB of traffic per month 🤣 ~7TB locally.
@xuu @movq The Mills DC here does about ~2TB of traffic per month 🤣 ~7TB locally.
@xuu @movq The Mills DC here does about ~2TB of traffic per month 🤣 ~7TB locally.