# I am the Watcher. I am your guide through this vast new twtiverse.
# 
# Usage:
#     https://watcher.sour.is/api/plain/users              View list of users and latest twt date.
#     https://watcher.sour.is/api/plain/twt                View all twts.
#     https://watcher.sour.is/api/plain/mentions?uri=:uri  View all mentions for uri.
#     https://watcher.sour.is/api/plain/conv/:hash         View all twts for a conversation subject.
# 
# Options:
#     uri     Filter to show a specific users twts.
#     offset  Start index for quey.
#     limit   Count of items to return (going back in time).
# 
# twt range = 1 60815
# self = https://watcher.sour.is?uri=https://twtxt.net/user/prologic/twtxt.txt&offset=51080
# next = https://watcher.sour.is?uri=https://twtxt.net/user/prologic/twtxt.txt&offset=51180
# prev = https://watcher.sour.is?uri=https://twtxt.net/user/prologic/twtxt.txt&offset=50980
@shreyan Any significant differences in logic with your program vs. mine? 🤔
@shreyan Any significant differences in logic with your program vs. mine? 🤔
@shreyan Any significant differences in logic with your program vs. mine? 🤔
What if I run my Gitea Actions Runners on some Vultr VM(s) for now? At least until I get some more hardware just for a "build farm" 🤔
What if I run my Gitea Actions Runners on some Vultr VM(s) for now? At least until I get some more hardware just for a "build farm" 🤔
What if I run my Gitea Actions Runners on some Vultr VM(s) for now? At least until I get some more hardware just for a "build farm" 🤔
Hmmm, is bip39 suppose to be reversible? I _thought_ that's what it was for?!


$ echo 59I0nDFYho4Hq4ps | ./bip39 -e | ./bip39 -d
353949306e444659686f344871347073


=> https://goplay.mills.io/snippet/WzAKPDFHmse=
Hmmm, is bip39 suppose to be reversible? I _thought_ that's what it was for?!


$ echo 59I0nDFYho4Hq4ps | ./bip39 -e | ./bip39 -d
353949306e444659686f344871347073


=> https://goplay.mills.io/snippet/WzAKPDFHmse=
Hmmm, is bip39 suppose to be reversible? I _thought_ that's what it was for?!


$ echo 59I0nDFYho4Hq4ps | ./bip39 -e | ./bip39 -d
353949306e444659686f344871347073


=> https://goplay.mills.io/snippet/WzAKPDFHmse=
@stigatle Ahhh! Like a scooter? 😅
@stigatle Ahhh! Like a scooter? 😅
@stigatle Ahhh! Like a scooter? 😅
Good question! 🤔 I'll have a look around 👌
Good question! 🤔 I'll have a look around 👌
Good question! 🤔 I'll have a look around 👌
@stigatle What's a kick bike anyway? 🤔
@stigatle What's a kick bike anyway? 🤔
@stigatle What's a kick bike anyway? 🤔
@eapl.me You're best bet then is BIP39 -- That's what it was created for 👌
@eapl.me You're best bet then is BIP39 -- That's what it was created for 👌
@eapl.me You're best bet then is BIP39 -- That's what it was created for 👌
@marado Uggh sorry about that 😢 I'll add it back. 👌 To be honest I didn't think I'd have this much trouble running the workflow 😆
@marado Uggh sorry about that 😢 I'll add it back. 👌 To be honest I didn't think I'd have this much trouble running the workflow 😆
@marado Uggh sorry about that 😢 I'll add it back. 👌 To be honest I didn't think I'd have this much trouble running the workflow 😆
I am so excited 🤩 I've been woken up early this morning by my lovely wife, to let me know there's a truck outside out house near the cabling pits doing something. Turns out, NBN have been laying the big fibre cables around our area and finally cleaning out the pits for fibre installation! 🥳 Its only a matter of time! 🤞

Finally, my 3 years of complaining and pushing NBN have paid off 😅 #NBN #Fibre
I am so excited 🤩 I've been woken up early this morning by my lovely wife, to let me know there's a truck outside out house near the cabling pits doing something. Turns out, NBN have been laying the big fibre cables around our area and finally cleaning out the pits for fibre installation! 🥳 Its only a matter of time! 🤞

Finally, my 3 years of complaining and pushing NBN have paid off 😅 #NBN #Fibre
I am so excited 🤩 I've been woken up early this morning by my lovely wife, to let me know there's a truck outside out house near the cabling pits doing something. Turns out, NBN have been laying the big fibre cables around our area and finally cleaning out the pits for fibre installation! 🥳 Its only a matter of time! 🤞

Finally, my 3 years of complaining and pushing NBN have paid off 😅 #NBN #Fibre
Also we've set-up an org over at https://git.mills.io/cas if you wanna contribute 👌
Also we've set-up an org over at https://git.mills.io/cas if you wanna contribute 👌
Also we've set-up an org over at https://git.mills.io/cas if you wanna contribute 👌
@jmjl We're already able to do this for example:

https://hello-prologic.cas.run/

Which was just spun up using:


$ docker service create --name hello --network traefik --label traefik.enable=true --label traefik.http.services.hello.loadbalancer.server.port=80 nginxdemos/hello


It gets a bit weird when you do this in a Docker Stack using docker stack deploy though 🤣 e.g: https://prologic-prologic-prologic.cas.run/

Still trying to figure out the best default routing rule for the ingress proxy to make things easy.
@jmjl We're already able to do this for example:

https://hello-prologic.cas.run/

Which was just spun up using:


$ docker service create --name hello --network traefik --label traefik.enable=true --label traefik.http.services.hello.loadbalancer.server.port=80 nginxdemos/hello


It gets a bit weird when you do this in a Docker Stack using docker stack deploy though 🤣 e.g: https://prologic-prologic-prologic.cas.run/

Still trying to figure out the best default routing rule for the ingress proxy to make things easy.
@jmjl We're already able to do this for example:

https://hello-prologic.cas.run/

Which was just spun up using:


$ docker service create --name hello --network traefik --label traefik.enable=true --label traefik.http.services.hello.loadbalancer.server.port=80 nginxdemos/hello


It gets a bit weird when you do this in a Docker Stack using docker stack deploy though 🤣 e.g: https://prologic-prologic-prologic.cas.run/

Still trying to figure out the best default routing rule for the ingress proxy to make things easy.
@eapl.me QR code printed on paper?
@eapl.me QR code printed on paper?
@eapl.me QR code printed on paper?
@jmjl Figured out the bug and fixed it. Pushing a new version shortly 👌
@jmjl Figured out the bug and fixed it. Pushing a new version shortly 👌
@jmjl Figured out the bug and fixed it. Pushing a new version shortly 👌
@abucci Yeah I think there's a bit more work on the Docker-compat component of Podman. I'll try to figure this out and work with the developers of the project. 👌
@abucci Yeah I think there's a bit more work on the Docker-compat component of Podman. I'll try to figure this out and work with the developers of the project. 👌
@abucci Yeah I think there's a bit more work on the Docker-compat component of Podman. I'll try to figure this out and work with the developers of the project. 👌
And to be clear, we're talking about TLS mutual authentication here too
And to be clear, we're talking about TLS mutual authentication here too
And to be clear, we're talking about TLS mutual authentication here too
I really don't think TLS is supported yet.
I really don't think TLS is supported yet.
I really don't think TLS is supported yet.
See:


$ podman ps
Cannot connect to Podman. Please verify your connection to the Linux system using `podman system connection list`, or try `podman machine init` and `podman machine start` to manage a new Linux VM
Error: unable to connect to Podman socket: failed to connect: ssh: handshake failed: knownhosts: /Users/prologic/.ssh/known_hosts:43: address [host=tcp:]: missing port in address
See:


$ podman ps
Cannot connect to Podman. Please verify your connection to the Linux system using `podman system connection list`, or try `podman machine init` and `podman machine start` to manage a new Linux VM
Error: unable to connect to Podman socket: failed to connect: ssh: handshake failed: knownhosts: /Users/prologic/.ssh/known_hosts:43: address [host=tcp:]: missing port in address
See:


$ podman ps
Cannot connect to Podman. Please verify your connection to the Linux system using `podman system connection list`, or try `podman machine init` and `podman machine start` to manage a new Linux VM
Error: unable to connect to Podman socket: failed to connect: ssh: handshake failed: knownhosts: /Users/prologic/.ssh/known_hosts:43: address [host=tcp:]: missing port in address

$ podman system connection add "host=tcp://localhost:2376,ca=$HOME/.docker/certs.d/localhost/ca.pem,key=$HOME/.docker/certs.d/localhost/key.pem,cert=$HOME/.docker/certs.d/localhost/cert.pem"
Error: accepts 2 arg(s), received 1


I think this should be:


$ podman system connection add localhost "host=tcp://localhost:2376,ca=$HOME/.docker/certs.d/localhost/ca.pem,key=$HOME/.docker/certs.d/localhost/key.pem,cert=$HOME/.docker/certs.d/localhost/cert.pem"


But now:


$ podman system connection list
Name        URI                    Identity    Default
localhost   ssh://@[host=tcp:]:22              true


And this doesn't work 😢

$ podman system connection add "host=tcp://localhost:2376,ca=$HOME/.docker/certs.d/localhost/ca.pem,key=$HOME/.docker/certs.d/localhost/key.pem,cert=$HOME/.docker/certs.d/localhost/cert.pem"
Error: accepts 2 arg(s), received 1


I think this should be:


$ podman system connection add localhost "host=tcp://localhost:2376,ca=$HOME/.docker/certs.d/localhost/ca.pem,key=$HOME/.docker/certs.d/localhost/key.pem,cert=$HOME/.docker/certs.d/localhost/cert.pem"


But now:


$ podman system connection list
Name        URI                    Identity    Default
localhost   ssh://@[host=tcp:]:22              true


And this doesn't work 😢

$ podman system connection add "host=tcp://localhost:2376,ca=$HOME/.docker/certs.d/localhost/ca.pem,key=$HOME/.docker/certs.d/localhost/key.pem,cert=$HOME/.docker/certs.d/localhost/cert.pem"
Error: accepts 2 arg(s), received 1


I think this should be:


$ podman system connection add localhost "host=tcp://localhost:2376,ca=$HOME/.docker/certs.d/localhost/ca.pem,key=$HOME/.docker/certs.d/localhost/key.pem,cert=$HOME/.docker/certs.d/localhost/cert.pem"


But now:


$ podman system connection list
Name        URI                    Identity    Default
localhost   ssh://@[host=tcp:]:22              true


And this doesn't work 😢
@abucci Hmm I see! Let me trry that 👌
@abucci Hmm I see! Let me trry that 👌
@abucci Hmm I see! Let me trry that 👌
Not in the same way docker context create does.
Not in the same way docker context create does.
Not in the same way docker context create does.
But it doesn't understand how to use TLS certs.
But it doesn't understand how to use TLS certs.
But it doesn't understand how to use TLS certs.
It does have this flag:


$ podman context create --help
Record destination for the Podman service

Description:
  Add destination to podman configuration.
  "destination" is one of the form:
    [user@]hostname (will default to ssh)
    ssh://[user@]hostname[:port][/path] (will obtain socket path from service, if not given.)
    tcp://hostname:port (not secured)
    unix://path (absolute path required)


Usage:
  podman context create [options] NAME DESTINATION

Options:
      --default-stack-orchestrator string   Ignored.  Just for script compatibility
      --description string                  Ignored.  Just for script compatibility
      --docker string                       Description of the context
      --from string                         Ignored.  Just for script compatibility
      --kubernetes string                   Ignored.  Just for script compatibility
It does have this flag:


$ podman context create --help
Record destination for the Podman service

Description:
  Add destination to podman configuration.
  "destination" is one of the form:
    [user@]hostname (will default to ssh)
    ssh://[user@]hostname[:port][/path] (will obtain socket path from service, if not given.)
    tcp://hostname:port (not secured)
    unix://path (absolute path required)


Usage:
  podman context create [options] NAME DESTINATION

Options:
      --default-stack-orchestrator string   Ignored.  Just for script compatibility
      --description string                  Ignored.  Just for script compatibility
      --docker string                       Description of the context
      --from string                         Ignored.  Just for script compatibility
      --kubernetes string                   Ignored.  Just for script compatibility
It does have this flag:


$ podman context create --help
Record destination for the Podman service

Description:
  Add destination to podman configuration.
  "destination" is one of the form:
    [user@]hostname (will default to ssh)
    ssh://[user@]hostname[:port][/path] (will obtain socket path from service, if not given.)
    tcp://hostname:port (not secured)
    unix://path (absolute path required)


Usage:
  podman context create [options] NAME DESTINATION

Options:
      --default-stack-orchestrator string   Ignored.  Just for script compatibility
      --description string                  Ignored.  Just for script compatibility
      --docker string                       Description of the context
      --from string                         Ignored.  Just for script compatibility
      --kubernetes string                   Ignored.  Just for script compatibility
I've already tried, it doesn't _quite_ work (yet).
I've already tried, it doesn't _quite_ work (yet).
I've already tried, it doesn't _quite_ work (yet).
Not quite.


[22:51:47]  <prologic> bkhl you misunderstand what I'm asking :( I'm asking whether we can add TLS support to Podman the CLI / client? It looks like it doesn't understand how to connect to a typical Docker TCP service over TLS
[22:52:52]  <prologic> e.g: Error: --docker additional options "ca=/Users/prologic/.docker/certs.d/localhost/ca.pem,key=/Users/prologic/.docker/certs.d/localhost/key.pem,cert=/Users/prologic/.docker/certs.d/localhost/cert.pem" not supported
[22:53:03]  <prologic> When running: podman context create localhost --docker "host=tcp://localhost:2376,ca=$HOME/.docker/certs.d/localhost/ca.pem,key=$HOME/.docker/certs.d/localhost/key.pem,cert=$HOME/.docker/certs.d/localhost/cert.pem"
Not quite.


[22:51:47]  <prologic> bkhl you misunderstand what I'm asking :( I'm asking whether we can add TLS support to Podman the CLI / client? It looks like it doesn't understand how to connect to a typical Docker TCP service over TLS
[22:52:52]  <prologic> e.g: Error: --docker additional options "ca=/Users/prologic/.docker/certs.d/localhost/ca.pem,key=/Users/prologic/.docker/certs.d/localhost/key.pem,cert=/Users/prologic/.docker/certs.d/localhost/cert.pem" not supported
[22:53:03]  <prologic> When running: podman context create localhost --docker "host=tcp://localhost:2376,ca=$HOME/.docker/certs.d/localhost/ca.pem,key=$HOME/.docker/certs.d/localhost/key.pem,cert=$HOME/.docker/certs.d/localhost/cert.pem"
Not quite.


[22:51:47]  <prologic> bkhl you misunderstand what I'm asking :( I'm asking whether we can add TLS support to Podman the CLI / client? It looks like it doesn't understand how to connect to a typical Docker TCP service over TLS
[22:52:52]  <prologic> e.g: Error: --docker additional options "ca=/Users/prologic/.docker/certs.d/localhost/ca.pem,key=/Users/prologic/.docker/certs.d/localhost/key.pem,cert=/Users/prologic/.docker/certs.d/localhost/cert.pem" not supported
[22:53:03]  <prologic> When running: podman context create localhost --docker "host=tcp://localhost:2376,ca=$HOME/.docker/certs.d/localhost/ca.pem,key=$HOME/.docker/certs.d/localhost/key.pem,cert=$HOME/.docker/certs.d/localhost/cert.pem"
@abucci I _think_ it only supports SSH is the problem. If it supported TLS we'd be good to go 👌 Might ahve to file a feature request? 🤔
@abucci I _think_ it only supports SSH is the problem. If it supported TLS we'd be good to go 👌 Might ahve to file a feature request? 🤔
@abucci I _think_ it only supports SSH is the problem. If it supported TLS we'd be good to go 👌 Might ahve to file a feature request? 🤔
@jmjl What do you mean? 🤔 Open to alternative ideas 🙏
@jmjl What do you mean? 🤔 Open to alternative ideas 🙏
@jmjl What do you mean? 🤔 Open to alternative ideas 🙏
@jmjl Confirmed:


$ dke -t 6cf690c08e6b /bin/sh
unable to upgrade to tcp, received 500


I'll try to fix this today 👌
@jmjl Confirmed:


$ dke -t 6cf690c08e6b /bin/sh
unable to upgrade to tcp, received 500


I'll try to fix this today 👌
@jmjl Confirmed:


$ dke -t 6cf690c08e6b /bin/sh
unable to upgrade to tcp, received 500


I'll try to fix this today 👌
@xuu Yeah a lot of local data is transferred around 👌
@xuu Yeah a lot of local data is transferred around 👌
@xuu Yeah a lot of local data is transferred around 👌
@jmjl I'll look into this a bit later today. You mean docker exec ... right into an existing container? 🤔
@jmjl I'll look into this a bit later today. You mean docker exec ... right into an existing container? 🤔
@jmjl I'll look into this a bit later today. You mean docker exec ... right into an existing container? 🤔
You then automatically get a route to http://jmlj.cas.run pinting at this service.
You then automatically get a route to http://jmlj.cas.run pinting at this service.
You then automatically get a route to http://jmlj.cas.run pinting at this service.
@jmjl Right now:

docker stack deploy -c jmlj.yml jlmj

Where jmlj.yml is:

l
---
version: "3.8"

services:
  prologic:
    image: r.mills.io/prologic/zs
    networks:
      - traefik
    deploy:
      mode: replicated
      replicas: 1
      labels:
        - "traefik.enable=true"
        - "traefik.http.services.prologic.loadbalancer.server.port=8000"
      resources:
        reservations:
          memory: 16M
        limits:
          memory: 32M
      restart_policy:
        condition: any

networks:
  traefik:
    external: true
@jmjl Right now:

docker stack deploy -c jmlj.yml jlmj

Where jmlj.yml is:

l
---
version: "3.8"

services:
  prologic:
    image: r.mills.io/prologic/zs
    networks:
      - traefik
    deploy:
      mode: replicated
      replicas: 1
      labels:
        - "traefik.enable=true"
        - "traefik.http.services.prologic.loadbalancer.server.port=8000"
      resources:
        reservations:
          memory: 16M
        limits:
          memory: 32M
      restart_policy:
        condition: any

networks:
  traefik:
    external: true
@jmjl Right now:

docker stack deploy -c jmlj.yml jlmj

Where jmlj.yml is:

l
---
version: "3.8"

services:
  prologic:
    image: r.mills.io/prologic/zs
    networks:
      - traefik
    deploy:
      mode: replicated
      replicas: 1
      labels:
        - "traefik.enable=true"
        - "traefik.http.services.prologic.loadbalancer.server.port=8000"
      resources:
        reservations:
          memory: 16M
        limits:
          memory: 32M
      restart_policy:
        condition: any

networks:
  traefik:
    external: true
@abucci I asked the folks over at #pormdn on IRC and this is what they said:


[01:47:58]  <Remco> prologic: The podman executable doesn't understand anything docker, but podman does offer a compatibility api for the docker executable. So it would be the second in your or statement


I don't think Podman is compatible with the Docker API, onl the Docker CLI.
@abucci I asked the folks over at #pormdn on IRC and this is what they said:


[01:47:58]  <Remco> prologic: The podman executable doesn't understand anything docker, but podman does offer a compatibility api for the docker executable. So it would be the second in your or statement


I don't think Podman is compatible with the Docker API, onl the Docker CLI.
@abucci I asked the folks over at #pormdn on IRC and this is what they said:


[01:47:58]  <Remco> prologic: The podman executable doesn't understand anything docker, but podman does offer a compatibility api for the docker executable. So it would be the second in your or statement


I don't think Podman is compatible with the Docker API, onl the Docker CLI.
Hmmm if Podman can talk to a remote Docker API over SSH, this isn't going to work 😢


prologic@JamessMacStudio
Tue Aug 08 01:20:43
~/Projects/docker-proxy
 (main) 0 0
$ podman context list
Name        URI                   Identity    Default
localhost   tcp://localhost:2376              true

prologic@JamessMacStudio
Tue Aug 08 01:20:57
~/Projects/docker-proxy
 (main) 0
$ podman --help | grep id
      --identity string           path to SSH identity file, (CONTAINER_SSHKEY)


I was never able to get the SSH version of the intercepting proxy working. I spent a couple of years on/off trying to get it to work, but there are limitations with the standard library and/or the ssh library or something that prevented the SSH Proxy from fully working See Issue #2 which I've now closed as "won't fix".

I guess Podman needs to learn how to do TLS?
Hmmm if Podman can talk to a remote Docker API over SSH, this isn't going to work 😢


prologic@JamessMacStudio
Tue Aug 08 01:20:43
~/Projects/docker-proxy
 (main) 0 0
$ podman context list
Name        URI                   Identity    Default
localhost   tcp://localhost:2376              true

prologic@JamessMacStudio
Tue Aug 08 01:20:57
~/Projects/docker-proxy
 (main) 0
$ podman --help | grep id
      --identity string           path to SSH identity file, (CONTAINER_SSHKEY)


I was never able to get the SSH version of the intercepting proxy working. I spent a couple of years on/off trying to get it to work, but there are limitations with the standard library and/or the ssh library or something that prevented the SSH Proxy from fully working See Issue #2 which I've now closed as "won't fix".

I guess Podman needs to learn how to do TLS?
Hmmm if Podman can talk to a remote Docker API over SSH, this isn't going to work 😢


prologic@JamessMacStudio
Tue Aug 08 01:20:43
~/Projects/docker-proxy
 (main) 0 0
$ podman context list
Name        URI                   Identity    Default
localhost   tcp://localhost:2376              true

prologic@JamessMacStudio
Tue Aug 08 01:20:57
~/Projects/docker-proxy
 (main) 0
$ podman --help | grep id
      --identity string           path to SSH identity file, (CONTAINER_SSHKEY)


I was never able to get the SSH version of the intercepting proxy working. I spent a couple of years on/off trying to get it to work, but there are limitations with the standard library and/or the ssh library or something that prevented the SSH Proxy from fully working See Issue #2 which I've now closed as "won't fix".

I guess Podman needs to learn how to do TLS?
Hmmm trying this locally:


$ sh setup.sh
Error: --docker additional options "ca=/Users/prologic/.docker/certs.d/localhost/ca.pem,key=/Users/prologic/.docker/certs.d/localhost/key.pem,cert=/Users/prologic/.docker/certs.d/localhost/cert.pem" not supported


Not support for TLS?