Re: [MAINTAINER UPDATE] www/honk 0.9.7 -> 0.9.8

2022-09-28 Thread Horia Racoviceanu
The "cleanup" cron job for the user _honk will run in HOME which is /var/honk

If another user runs that cron job, set HOME=/var/honk or `cd /var/honk && honk 
cleanup` or `honk -datadir /var/honk cleanup` and .db permission

On September 28, 2022 4:57:51 PM UTC, "Gonzalo L. Rodriguez"  
wrote:
>On Wed, 21 Sep 2022 at 10:49:27 -0400, Horia Racoviceanu wrote:
>> ping
>> 
>> On 9/16/22, Horia Racoviceanu  wrote:
>> > - Changed the certificate renewal cron job based on the OCSP staple
>> > interval for letsencrypt (for buypass it should be changed to run
>> > every 7th hour) and based on the update steps listed by Stuart
>> > - Replaced VARBASE with LOCALSTATEDIR
>> >
>> > I'd like to keep the acme-client and ocspcheck configuration in the
>> > port README because I know some less OpenBSD savvy people who
>> > installed the Honk package.
>> >
>> > On 7/31/22, Christoph Roland Winter  wrote:
>> >> BTW what you think about a section in the FAQ about httpd, relayd,
>> >> acme-client for all web applications.
>> >>
>> >> Am 31.07.22 um 13:12 schrieb Stuart Henderson:
>> >>> 1. The staple needs to be updated periodically
>> >>>
>> >>> 2. If the certificate is updated the staple needs to be updated too
>> >>>
>> >>> 3. If either the certificate or the staple are changed, relayd needs a
>> >>> reload
>> >>>
>> >>> To be honest I'm not sure if it really belongs in the doc for some
>> >>> random port in www, this applies to anyone using relayd to front-end a
>> >>> web application.
>> >>>
>> >>> --
>> >>>Sent from a phone, apologies for poor formatting.
>> >>>
>> >>>
>> >>> On 31 July 2022 02:16:13 Christoph Roland Winter 
>> >>> wrote:
>> >>>
>>  Beside of this question, the idea of OCSP is
>> 
>>  By turning on OCSP Stapling, you can improve the performance of your
>>  website, provide better privacy protections for your users, and help
>>  Let’s Encrypt efficiently serve as many people as possible.
>> 
>>  https://letsencrypt.org/docs/integration-guide/
>> 
>>  Is it better to update the OCSP file before it expires or update it
>>  only
>>  seldom (in this case the question is, whether it is not better to don't
>>  use OCSP).
>> 
>>  Am 31.07.22 um 00:33 schrieb Horia Racoviceanu:
>> > I've switched the cron job to chaining acme-client && ocspcheck on
>> > June 20.
>> > Both the certificate and the OCSP response were last updated on June
>> > 20.
>> >
>> > # ocspcheck -vNi /etc/ssl/honk.example.com.{ocsp,crt}
>> > ocspcheck: Invalid OCSP reply: this update is too old Mon Jun 20
>> > 05:46:59 2022
>> >
>> > relayd and Firefox do not complain.
>> >
>> > ssllabs.com reports:
>> >
>> > OCSP Must Staple No
>> > OCSP stapling  Yes
>> > OCSP STAPLING ERROR: OCSP response expired on Mon Jun 20 20:46:59 UTC
>> > 2022
>> >
>> > Can the OCSP STAPLING ERROR be ignored?
>> >
>> > On 7/30/22, Christoph Roland Winter  wrote:
>> >> Welcome.
>> >>
>> >> The question is then, why the OCSP staple file expires after hours or
>> >> 7
>> >> days and the certificate will be renewed after 60 days following man
>> >> 1
>> >> acme-client
>> >>
>> >> -F  Force certificate renewal, even if it has more than 30 days
>> >> validity.
>> >>
>> >> It can't be the idea to have so long a expired OCSP file (saw Firefox
>> >> in
>> >> the past complain when a outdated OCSP file exists). So, if you
>> >> replace
>> >> the first && with a ; nothing will change as the last && to reload
>> >> relayd will only happen if the cert or the OCSP file (or both) was
>> >> renewed and if booth are up to date nothing will happen.
>> >>
>> >> Just my 2 cents.
>> >>
>> >> Regards,
>> >>
>> >>
>> >> Christoph
>> >>
>> >> Am 30.07.22 um 19:07 schrieb Horia Racoviceanu:
>> >>> Thanks for testing!
>> >>>
>> >>> As Stuart Henderson mentioned,
>>  You do really want to update OCSP if a cert has been renewed.
>> >>>
>> >>> On 7/29/22, Christoph Roland Winter  wrote:
>>  Hello,
>> 
>>  I have only kept the first message and was some time not subscribed
>>  to
>>  the list - lets see, where the message ends.
>> 
>>  I tried the latest patch from
>>  https://marc.info/?l=openbsd-ports&m=165827470732358&q=p3 and it
>>  worked
>>  fine using
>> 
>>  OpenBSD 7.2-beta (GENERIC.MP) #654: Wed Jul 27 20:10:05 MDT 2022
>>  and the
>>  -current ports tree using amd64.
>> 
>>  Maybe I am wrong but the crontab from the above patch
>> 
>>  +~ ~ * * * acme-client honk.example.com && ocspcheck -No
>>  ${SYSCONFDIR}/ssl/honk.example.com.{ocsp,crt} && rcctl reload
>>  relayd
>> 
>>  needs to be modified. The first && must be replaced 

Re: [MAINTAINER UPDATE] www/honk 0.9.7 -> 0.9.8

2022-09-28 Thread Gonzalo L. Rodriguez
On Wed, 21 Sep 2022 at 10:49:27 -0400, Horia Racoviceanu wrote:
> ping
> 
> On 9/16/22, Horia Racoviceanu  wrote:
> > - Changed the certificate renewal cron job based on the OCSP staple
> > interval for letsencrypt (for buypass it should be changed to run
> > every 7th hour) and based on the update steps listed by Stuart
> > - Replaced VARBASE with LOCALSTATEDIR
> >
> > I'd like to keep the acme-client and ocspcheck configuration in the
> > port README because I know some less OpenBSD savvy people who
> > installed the Honk package.
> >
> > On 7/31/22, Christoph Roland Winter  wrote:
> >> BTW what you think about a section in the FAQ about httpd, relayd,
> >> acme-client for all web applications.
> >>
> >> Am 31.07.22 um 13:12 schrieb Stuart Henderson:
> >>> 1. The staple needs to be updated periodically
> >>>
> >>> 2. If the certificate is updated the staple needs to be updated too
> >>>
> >>> 3. If either the certificate or the staple are changed, relayd needs a
> >>> reload
> >>>
> >>> To be honest I'm not sure if it really belongs in the doc for some
> >>> random port in www, this applies to anyone using relayd to front-end a
> >>> web application.
> >>>
> >>> --
> >>>Sent from a phone, apologies for poor formatting.
> >>>
> >>>
> >>> On 31 July 2022 02:16:13 Christoph Roland Winter 
> >>> wrote:
> >>>
>  Beside of this question, the idea of OCSP is
> 
>  By turning on OCSP Stapling, you can improve the performance of your
>  website, provide better privacy protections for your users, and help
>  Let’s Encrypt efficiently serve as many people as possible.
> 
>  https://letsencrypt.org/docs/integration-guide/
> 
>  Is it better to update the OCSP file before it expires or update it
>  only
>  seldom (in this case the question is, whether it is not better to don't
>  use OCSP).
> 
>  Am 31.07.22 um 00:33 schrieb Horia Racoviceanu:
> > I've switched the cron job to chaining acme-client && ocspcheck on
> > June 20.
> > Both the certificate and the OCSP response were last updated on June
> > 20.
> >
> > # ocspcheck -vNi /etc/ssl/honk.example.com.{ocsp,crt}
> > ocspcheck: Invalid OCSP reply: this update is too old Mon Jun 20
> > 05:46:59 2022
> >
> > relayd and Firefox do not complain.
> >
> > ssllabs.com reports:
> >
> > OCSP Must Staple No
> > OCSP stapling  Yes
> > OCSP STAPLING ERROR: OCSP response expired on Mon Jun 20 20:46:59 UTC
> > 2022
> >
> > Can the OCSP STAPLING ERROR be ignored?
> >
> > On 7/30/22, Christoph Roland Winter  wrote:
> >> Welcome.
> >>
> >> The question is then, why the OCSP staple file expires after hours or
> >> 7
> >> days and the certificate will be renewed after 60 days following man
> >> 1
> >> acme-client
> >>
> >> -F  Force certificate renewal, even if it has more than 30 days
> >> validity.
> >>
> >> It can't be the idea to have so long a expired OCSP file (saw Firefox
> >> in
> >> the past complain when a outdated OCSP file exists). So, if you
> >> replace
> >> the first && with a ; nothing will change as the last && to reload
> >> relayd will only happen if the cert or the OCSP file (or both) was
> >> renewed and if booth are up to date nothing will happen.
> >>
> >> Just my 2 cents.
> >>
> >> Regards,
> >>
> >>
> >> Christoph
> >>
> >> Am 30.07.22 um 19:07 schrieb Horia Racoviceanu:
> >>> Thanks for testing!
> >>>
> >>> As Stuart Henderson mentioned,
>  You do really want to update OCSP if a cert has been renewed.
> >>>
> >>> On 7/29/22, Christoph Roland Winter  wrote:
>  Hello,
> 
>  I have only kept the first message and was some time not subscribed
>  to
>  the list - lets see, where the message ends.
> 
>  I tried the latest patch from
>  https://marc.info/?l=openbsd-ports&m=165827470732358&q=p3 and it
>  worked
>  fine using
> 
>  OpenBSD 7.2-beta (GENERIC.MP) #654: Wed Jul 27 20:10:05 MDT 2022
>  and the
>  -current ports tree using amd64.
> 
>  Maybe I am wrong but the crontab from the above patch
> 
>  +~ ~ * * * acme-client honk.example.com && ocspcheck -No
>  ${SYSCONFDIR}/ssl/honk.example.com.{ocsp,crt} && rcctl reload
>  relayd
> 
>  needs to be modified. The first && must be replaced with ; (or
>  splited
>  in 2 cron jobs). As it is now, the ocsp file gets only renewed all
>  60
>  days, as acme-client renews the certificate only 30 days before it
>  expires (checked with the -v option and as nothing happened before,
>  &&
>  stops at this point). BTW my ocsp file with the above command is
>  valid
>  for 7 days.
> 
> 

Re: [MAINTAINER UPDATE] www/honk 0.9.7 -> 0.9.8

2022-09-23 Thread Christoph Roland Winter
Hy,

> Am 23.09.2022 um 20:24 schrieb Horia Racoviceanu :
> 
> Thank you for the MESSAGE and README change.

But continue your good work.
We should try to get your informations upstream to tedu.

> I confirm that the backup/upgrade must be done *after* updating the package.
> v0.9.8 is required to upgrade the old database.

Yes, I can also confirm that. Everything worked as I did the upgrade from 0.9.7 
to 0.9.8 some weeks ago.
BTW is there a option to stop a already running Honk in case of a DB upgrade. 
Maybe I think to complicated but what is, if there is a running Honk and 
someone tries to launch the new one (just to prevent that the DB get broken - 
we know, that many people do no backups … don’t look at me ;-) ). 

> 
> On 9/23/22, Stuart Henderson  wrote:
>> On 2022/09/23 12:27, Horia Racoviceanu wrote:
>>> Index: pkg/MESSAGE
>>> ===
>>> RCS file: pkg/MESSAGE
>>> diff -N pkg/MESSAGE
>>> --- /dev/null   1 Jan 1970 00:00:00 -
>>> +++ pkg/MESSAGE 23 Sep 2022 16:17:47 -
>>> @@ -0,0 +1,15 @@
>>> +The database has changed since version 0.9.7
>>> +
>>> +Stop the old honk process.
>>> +honk# rcctl stop honk
>>> +
>>> +Backup the database.
>>> +honk# doas -su _honk
>>> +honk$ umask 077; cd ${LOCALSTATEDIR}/honk && honk backup `date
>>> +backup-%F`
>>> +
>>> +Perform the upgrade with the upgrade command.
>>> +honk$ honk upgrade
>>> +honk$ exit
>>> +
>>> +Restart.
>>> +honk# rcctl start honk
>> 
>> This is too long for MESSAGE, we don't want pages of information
>> scrolling after pkg_add. I suggest a single line and add the main
>> bit to pkg-readme as below.
>> 
>> I don't use this software. Can you confirm that the backup/upgrade
>> steps are OK to do *after* updating the package, or do users need to
>> do something *before* updating?
>> 
>> If it's before, then the information will need to go in upgrade
>> docs (via faq/current.html) instead because they won't see this message
>> until after they've updated packages.
>> 
>> 
>> Index: Makefile
>> ===
>> RCS file: /cvs/ports/www/honk/Makefile,v
>> retrieving revision 1.19
>> diff -u -p -r1.19 Makefile
>> --- Makefile 11 Mar 2022 20:09:55 -  1.19
>> +++ Makefile 23 Sep 2022 16:35:04 -
>> @@ -1,6 +1,6 @@
>> COMMENT =federated status conveyance
>> 
>> -DISTNAME =  honk-0.9.7
>> +DISTNAME =  honk-0.9.8
>> CATEGORIES = www
>> 
>> HOMEPAGE =   https://humungus.tedunangst.com/r/honk
>> @@ -13,6 +13,8 @@ PERMIT_PACKAGE =   Yes
>> WANTLIB +=   c pthread sqlite3
>> 
>> MASTER_SITES =   ${HOMEPAGE}/d/
>> +DISTFILES = ${EXTRACT_ONLY} honk-{../v/tip/d/views/}icon.png
>> +EXTRACT_ONLY =  ${DISTNAME}${EXTRACT_SUFX}
>> EXTRACT_SUFX =   .tgz
>> 
>> MODULES =lang/go
>> @@ -21,8 +23,7 @@ LIB_DEPENDS =  databases/sqlite3
>> NO_TEST =Yes
>> ALL_TARGET = humungus.tedunangst.com/r/honk
>> 
>> -SUBST_VARS +=   VARBASE \
>> -SYSCONFDIR
>> +SUBST_VARS +=   SYSCONFDIR
>> 
>> DOCDIR ?=${PREFIX}/share/doc/honk
>> EXAMPLESDIR =${PREFIX}/share/examples/honk
>> @@ -53,5 +54,7 @@ post-install:
>>  ${EXAMPLESDIR}/views/
>>  ${INSTALL_DATA} ${MODGO_WORKSPACE}/src/${ALL_TARGET}/schema.sql \
>>  ${EXAMPLESDIR}/
>> +${INSTALL_DATA} ${DISTDIR}/honk-icon.png 
>> ${EXAMPLESDIR}/views/favicon.ico
>> +${INSTALL_DATA} ${DISTDIR}/honk-icon.png ${EXAMPLESDIR}/views/icon.png
>> 
>> .include 
>> Index: distinfo
>> ===
>> RCS file: /cvs/ports/www/honk/distinfo,v
>> retrieving revision 1.11
>> diff -u -p -r1.11 distinfo
>> --- distinfo 2 Mar 2022 07:31:01 -   1.11
>> +++ distinfo 23 Sep 2022 16:35:04 -
>> @@ -1,2 +1,4 @@
>> -SHA256 (honk-0.9.7.tgz) = t6EM5E98qvlnq6Y6vd21MvPBrWpkmo4qXdgNEUAeF7M=
>> -SIZE (honk-0.9.7.tgz) = 522993
>> +SHA256 (honk-0.9.8.tgz) = BmZgMvN7fFrft+W0+V2j3tezI5kRLl/7Fx5wIVXwCG4=
>> +SHA256 (honk-icon.png) = 92RJuF2onJ/1OYs4E4TYDm9KbzmNKISl+1+MSdhpzUQ=
>> +SIZE (honk-0.9.8.tgz) = 511957
>> +SIZE (honk-icon.png) = 912
>> Index: pkg/MESSAGE
>> ===
>> RCS file: pkg/MESSAGE
>> diff -N pkg/MESSAGE
>> --- /dev/null1 Jan 1970 00:00:00 -
>> +++ pkg/MESSAGE  23 Sep 2022 16:35:04 -
>> @@ -0,0 +1 @@
>> +The database has changed since version 0.9.7. See the pkg-readme.
>> Index: pkg/PLIST
>> ===
>> RCS file: /cvs/ports/www/honk/pkg/PLIST,v
>> retrieving revision 1.9
>> diff -u -p -r1.9 PLIST
>> --- pkg/PLIST11 Mar 2022 20:09:55 -  1.9
>> +++ pkg/PLIST23 Sep 2022 16:35:04 -
>> @@ -1,5 +1,5 @@
>> @newgroup _honk:833
>> -@newuser _honk:833:_honk:daemon:H

Re: [MAINTAINER UPDATE] www/honk 0.9.7 -> 0.9.8

2022-09-23 Thread Horia Racoviceanu
Thank you for the MESSAGE and README change.
I confirm that the backup/upgrade must be done *after* updating the package.
v0.9.8 is required to upgrade the old database.

On 9/23/22, Stuart Henderson  wrote:
> On 2022/09/23 12:27, Horia Racoviceanu wrote:
>> Index: pkg/MESSAGE
>> ===
>> RCS file: pkg/MESSAGE
>> diff -N pkg/MESSAGE
>> --- /dev/null1 Jan 1970 00:00:00 -
>> +++ pkg/MESSAGE  23 Sep 2022 16:17:47 -
>> @@ -0,0 +1,15 @@
>> +The database has changed since version 0.9.7
>> +
>> +Stop the old honk process.
>> +honk# rcctl stop honk
>> +
>> +Backup the database.
>> +honk# doas -su _honk
>> +honk$ umask 077; cd ${LOCALSTATEDIR}/honk && honk backup `date
>> +backup-%F`
>> +
>> +Perform the upgrade with the upgrade command.
>> +honk$ honk upgrade
>> +honk$ exit
>> +
>> +Restart.
>> +honk# rcctl start honk
>
> This is too long for MESSAGE, we don't want pages of information
> scrolling after pkg_add. I suggest a single line and add the main
> bit to pkg-readme as below.
>
> I don't use this software. Can you confirm that the backup/upgrade
> steps are OK to do *after* updating the package, or do users need to
> do something *before* updating?
>
> If it's before, then the information will need to go in upgrade
> docs (via faq/current.html) instead because they won't see this message
> until after they've updated packages.
>
>
> Index: Makefile
> ===
> RCS file: /cvs/ports/www/honk/Makefile,v
> retrieving revision 1.19
> diff -u -p -r1.19 Makefile
> --- Makefile  11 Mar 2022 20:09:55 -  1.19
> +++ Makefile  23 Sep 2022 16:35:04 -
> @@ -1,6 +1,6 @@
>  COMMENT =federated status conveyance
>
> -DISTNAME =   honk-0.9.7
> +DISTNAME =   honk-0.9.8
>  CATEGORIES = www
>
>  HOMEPAGE =   https://humungus.tedunangst.com/r/honk
> @@ -13,6 +13,8 @@ PERMIT_PACKAGE =Yes
>  WANTLIB +=   c pthread sqlite3
>
>  MASTER_SITES =   ${HOMEPAGE}/d/
> +DISTFILES =  ${EXTRACT_ONLY} honk-{../v/tip/d/views/}icon.png
> +EXTRACT_ONLY =   ${DISTNAME}${EXTRACT_SUFX}
>  EXTRACT_SUFX =   .tgz
>
>  MODULES =lang/go
> @@ -21,8 +23,7 @@ LIB_DEPENDS =   databases/sqlite3
>  NO_TEST =Yes
>  ALL_TARGET = humungus.tedunangst.com/r/honk
>
> -SUBST_VARS +=VARBASE \
> - SYSCONFDIR
> +SUBST_VARS +=SYSCONFDIR
>
>  DOCDIR ?=${PREFIX}/share/doc/honk
>  EXAMPLESDIR =${PREFIX}/share/examples/honk
> @@ -53,5 +54,7 @@ post-install:
>   ${EXAMPLESDIR}/views/
>   ${INSTALL_DATA} ${MODGO_WORKSPACE}/src/${ALL_TARGET}/schema.sql \
>   ${EXAMPLESDIR}/
> + ${INSTALL_DATA} ${DISTDIR}/honk-icon.png 
> ${EXAMPLESDIR}/views/favicon.ico
> + ${INSTALL_DATA} ${DISTDIR}/honk-icon.png ${EXAMPLESDIR}/views/icon.png
>
>  .include 
> Index: distinfo
> ===
> RCS file: /cvs/ports/www/honk/distinfo,v
> retrieving revision 1.11
> diff -u -p -r1.11 distinfo
> --- distinfo  2 Mar 2022 07:31:01 -   1.11
> +++ distinfo  23 Sep 2022 16:35:04 -
> @@ -1,2 +1,4 @@
> -SHA256 (honk-0.9.7.tgz) = t6EM5E98qvlnq6Y6vd21MvPBrWpkmo4qXdgNEUAeF7M=
> -SIZE (honk-0.9.7.tgz) = 522993
> +SHA256 (honk-0.9.8.tgz) = BmZgMvN7fFrft+W0+V2j3tezI5kRLl/7Fx5wIVXwCG4=
> +SHA256 (honk-icon.png) = 92RJuF2onJ/1OYs4E4TYDm9KbzmNKISl+1+MSdhpzUQ=
> +SIZE (honk-0.9.8.tgz) = 511957
> +SIZE (honk-icon.png) = 912
> Index: pkg/MESSAGE
> ===
> RCS file: pkg/MESSAGE
> diff -N pkg/MESSAGE
> --- /dev/null 1 Jan 1970 00:00:00 -
> +++ pkg/MESSAGE   23 Sep 2022 16:35:04 -
> @@ -0,0 +1 @@
> +The database has changed since version 0.9.7. See the pkg-readme.
> Index: pkg/PLIST
> ===
> RCS file: /cvs/ports/www/honk/pkg/PLIST,v
> retrieving revision 1.9
> diff -u -p -r1.9 PLIST
> --- pkg/PLIST 11 Mar 2022 20:09:55 -  1.9
> +++ pkg/PLIST 23 Sep 2022 16:35:04 -
> @@ -1,5 +1,5 @@
>  @newgroup _honk:833
> -@newuser _honk:833:_honk:daemon:Honk User:${VARBASE}/honk:/sbin/nologin
> +@newuser _honk:833:_honk:daemon:Honk
> User:${LOCALSTATEDIR}/honk:/sbin/nologin
>  @rcscript ${RCDIR}/honk
>  @bin bin/autobonker
>  @bin bin/gettoken
> @@ -19,11 +19,11 @@
>  @mode 750
>  @owner _honk
>  @group _honk
> -@sample ${VARBASE}/honk/
> -@sample ${VARBASE}/honk/docs/
> -@sample ${VARBASE}/honk/emus/
> -@sample ${VARBASE}/honk/memes/
> -@sample ${VARBASE}/honk/views/
> +@sample ${LOCALSTATEDIR}/honk/
> +@sample ${LOCALSTATEDIR}/honk/docs/
> +@sample ${LOCALSTATEDIR}/honk/emus/
> +@sample ${LOCALSTATEDIR}/honk/memes/
> +@sample ${LOCALSTATEDIR}/honk/views/
>  @mode
>  @owner
>  @group
> @@ -31,75 +31,79 @@ share/doc/hon

Re: [MAINTAINER UPDATE] www/honk 0.9.7 -> 0.9.8

2022-09-23 Thread Stuart Henderson
On 2022/09/23 12:27, Horia Racoviceanu wrote:
> Index: pkg/MESSAGE
> ===
> RCS file: pkg/MESSAGE
> diff -N pkg/MESSAGE
> --- /dev/null 1 Jan 1970 00:00:00 -
> +++ pkg/MESSAGE   23 Sep 2022 16:17:47 -
> @@ -0,0 +1,15 @@
> +The database has changed since version 0.9.7
> +
> +Stop the old honk process.
> +honk# rcctl stop honk
> +
> +Backup the database.
> +honk# doas -su _honk
> +honk$ umask 077; cd ${LOCALSTATEDIR}/honk && honk backup `date +backup-%F`
> +
> +Perform the upgrade with the upgrade command.
> +honk$ honk upgrade
> +honk$ exit
> +
> +Restart.
> +honk# rcctl start honk

This is too long for MESSAGE, we don't want pages of information
scrolling after pkg_add. I suggest a single line and add the main
bit to pkg-readme as below.

I don't use this software. Can you confirm that the backup/upgrade
steps are OK to do *after* updating the package, or do users need to
do something *before* updating?

If it's before, then the information will need to go in upgrade
docs (via faq/current.html) instead because they won't see this message
until after they've updated packages.


Index: Makefile
===
RCS file: /cvs/ports/www/honk/Makefile,v
retrieving revision 1.19
diff -u -p -r1.19 Makefile
--- Makefile11 Mar 2022 20:09:55 -  1.19
+++ Makefile23 Sep 2022 16:35:04 -
@@ -1,6 +1,6 @@
 COMMENT =  federated status conveyance
 
-DISTNAME = honk-0.9.7
+DISTNAME = honk-0.9.8
 CATEGORIES =   www
 
 HOMEPAGE = https://humungus.tedunangst.com/r/honk
@@ -13,6 +13,8 @@ PERMIT_PACKAGE =  Yes
 WANTLIB += c pthread sqlite3
 
 MASTER_SITES = ${HOMEPAGE}/d/
+DISTFILES =${EXTRACT_ONLY} honk-{../v/tip/d/views/}icon.png
+EXTRACT_ONLY = ${DISTNAME}${EXTRACT_SUFX}
 EXTRACT_SUFX = .tgz
 
 MODULES =  lang/go
@@ -21,8 +23,7 @@ LIB_DEPENDS = databases/sqlite3
 NO_TEST =  Yes
 ALL_TARGET =   humungus.tedunangst.com/r/honk
 
-SUBST_VARS +=  VARBASE \
-   SYSCONFDIR
+SUBST_VARS +=  SYSCONFDIR
 
 DOCDIR ?=  ${PREFIX}/share/doc/honk
 EXAMPLESDIR =  ${PREFIX}/share/examples/honk
@@ -53,5 +54,7 @@ post-install:
${EXAMPLESDIR}/views/
${INSTALL_DATA} ${MODGO_WORKSPACE}/src/${ALL_TARGET}/schema.sql \
${EXAMPLESDIR}/
+   ${INSTALL_DATA} ${DISTDIR}/honk-icon.png 
${EXAMPLESDIR}/views/favicon.ico
+   ${INSTALL_DATA} ${DISTDIR}/honk-icon.png ${EXAMPLESDIR}/views/icon.png
 
 .include 
Index: distinfo
===
RCS file: /cvs/ports/www/honk/distinfo,v
retrieving revision 1.11
diff -u -p -r1.11 distinfo
--- distinfo2 Mar 2022 07:31:01 -   1.11
+++ distinfo23 Sep 2022 16:35:04 -
@@ -1,2 +1,4 @@
-SHA256 (honk-0.9.7.tgz) = t6EM5E98qvlnq6Y6vd21MvPBrWpkmo4qXdgNEUAeF7M=
-SIZE (honk-0.9.7.tgz) = 522993
+SHA256 (honk-0.9.8.tgz) = BmZgMvN7fFrft+W0+V2j3tezI5kRLl/7Fx5wIVXwCG4=
+SHA256 (honk-icon.png) = 92RJuF2onJ/1OYs4E4TYDm9KbzmNKISl+1+MSdhpzUQ=
+SIZE (honk-0.9.8.tgz) = 511957
+SIZE (honk-icon.png) = 912
Index: pkg/MESSAGE
===
RCS file: pkg/MESSAGE
diff -N pkg/MESSAGE
--- /dev/null   1 Jan 1970 00:00:00 -
+++ pkg/MESSAGE 23 Sep 2022 16:35:04 -
@@ -0,0 +1 @@
+The database has changed since version 0.9.7. See the pkg-readme.
Index: pkg/PLIST
===
RCS file: /cvs/ports/www/honk/pkg/PLIST,v
retrieving revision 1.9
diff -u -p -r1.9 PLIST
--- pkg/PLIST   11 Mar 2022 20:09:55 -  1.9
+++ pkg/PLIST   23 Sep 2022 16:35:04 -
@@ -1,5 +1,5 @@
 @newgroup _honk:833
-@newuser _honk:833:_honk:daemon:Honk User:${VARBASE}/honk:/sbin/nologin
+@newuser _honk:833:_honk:daemon:Honk User:${LOCALSTATEDIR}/honk:/sbin/nologin
 @rcscript ${RCDIR}/honk
 @bin bin/autobonker
 @bin bin/gettoken
@@ -19,11 +19,11 @@
 @mode 750
 @owner _honk
 @group _honk
-@sample ${VARBASE}/honk/
-@sample ${VARBASE}/honk/docs/
-@sample ${VARBASE}/honk/emus/
-@sample ${VARBASE}/honk/memes/
-@sample ${VARBASE}/honk/views/
+@sample ${LOCALSTATEDIR}/honk/
+@sample ${LOCALSTATEDIR}/honk/docs/
+@sample ${LOCALSTATEDIR}/honk/emus/
+@sample ${LOCALSTATEDIR}/honk/memes/
+@sample ${LOCALSTATEDIR}/honk/views/
 @mode
 @owner
 @group
@@ -31,75 +31,79 @@ share/doc/honk/
 share/doc/honk/LICENSE
 share/doc/honk/README
 share/doc/honk/activitypub.7.html
-@sample ${VARBASE}/honk/docs/activitypub.7.html
+@sample ${LOCALSTATEDIR}/honk/docs/activitypub.7.html
 share/doc/honk/changelog.txt
 share/doc/honk/hfcs.1.html
-@sample ${VARBASE}/honk/docs/hfcs.1.html
+@sample ${LOCALSTATEDIR}/honk/docs/hfcs.1.html
 share/doc/honk/honk.1.html
-@sample ${VARBASE}/honk/docs/honk.1.html
+@sample ${LOCALSTATEDIR}/honk/docs/h

Re: [MAINTAINER UPDATE] www/honk 0.9.7 -> 0.9.8

2022-09-23 Thread Horia Racoviceanu
- Removed non-honk configuration from README

On 9/22/22, Christoph R. Winter  wrote:
> I would appricate it if Honk 0.9.8 makes it in the 7.2 ports -release but I
> think it will not as it is now. As we Honked today, I try to explain how I
> would change the diff.
>
> Basically, I find it good that you care of not experienced users but this
> information is not required that the port works or is useable and it makes
> more work to have informations on various places (that means not, that you
> should remove it, I just would implement it in another way).
>
> I would write it in the following way.
>
> Honk requires relayd(8) (because it is already in the base system) as TLS
> endpoint. That means you need a SSL certificate which you can obtain using
> acme-client(1) and a server section in httpd.conf(8) (maybe including a 302
> redirect from HTTP to HTTPS).
>
> - for experienced users you have nothing more to explain and it keeps
> discussions about how to make this and that away from the mailing list. If
> someone uses software x they have to self find out how (thats why the
> information that relayd is in the base system).
>
> If you are new to running your own web services or to Honk, there is a
> detailed writeup at the maintainer blog ...
>
> - your URL, there you can explain all details (from DNS - to cron) and also
> show how to setup the dev version of Honk to help tedu test things. In your
> blog you could spread the word about the OS, Honk and the fedi.
>
> Beside of that, in the examples directory of Honk you find example
> configuration files.
>
> - just ask tedu to add your acme-client.conf, httpd.conf and relayd.conf
> file which you also could use to decument / explain things.
>
> - then you could add the 4 lines of the relayd.conf file which are related
> to Honk, the init and the upgrade section.
>
> Just a idea and just my 2 cents, the committers decide.
> BTW the diff still works as it should, I setup Honk again on a clean install
> using 7.2 GENERIC.MP#734 amd64 from monday this week.
>
> Regards,
>
>
> Christoph
>
> P. S. sorry if the format is not as it should be, I try to use Mutt.
>
>
Index: Makefile
===
RCS file: /cvs/ports/www/honk/Makefile,v
retrieving revision 1.19
diff -u -p -r1.19 Makefile
--- Makefile11 Mar 2022 20:09:55 -  1.19
+++ Makefile23 Sep 2022 16:17:47 -
@@ -1,6 +1,6 @@
 COMMENT =  federated status conveyance
 
-DISTNAME = honk-0.9.7
+DISTNAME = honk-0.9.8
 CATEGORIES =   www
 
 HOMEPAGE = https://humungus.tedunangst.com/r/honk
@@ -13,6 +13,8 @@ PERMIT_PACKAGE =  Yes
 WANTLIB += c pthread sqlite3
 
 MASTER_SITES = ${HOMEPAGE}/d/
+DISTFILES =${EXTRACT_ONLY} honk-{../v/tip/d/views/}icon.png
+EXTRACT_ONLY = ${DISTNAME}${EXTRACT_SUFX}
 EXTRACT_SUFX = .tgz
 
 MODULES =  lang/go
@@ -21,8 +23,7 @@ LIB_DEPENDS = databases/sqlite3
 NO_TEST =  Yes
 ALL_TARGET =   humungus.tedunangst.com/r/honk
 
-SUBST_VARS +=  VARBASE \
-   SYSCONFDIR
+SUBST_VARS +=  SYSCONFDIR
 
 DOCDIR ?=  ${PREFIX}/share/doc/honk
 EXAMPLESDIR =  ${PREFIX}/share/examples/honk
@@ -53,5 +54,7 @@ post-install:
${EXAMPLESDIR}/views/
${INSTALL_DATA} ${MODGO_WORKSPACE}/src/${ALL_TARGET}/schema.sql \
${EXAMPLESDIR}/
+   ${INSTALL_DATA} ${DISTDIR}/honk-icon.png 
${EXAMPLESDIR}/views/favicon.ico
+   ${INSTALL_DATA} ${DISTDIR}/honk-icon.png ${EXAMPLESDIR}/views/icon.png
 
 .include 
Index: distinfo
===
RCS file: /cvs/ports/www/honk/distinfo,v
retrieving revision 1.11
diff -u -p -r1.11 distinfo
--- distinfo2 Mar 2022 07:31:01 -   1.11
+++ distinfo23 Sep 2022 16:17:47 -
@@ -1,2 +1,4 @@
-SHA256 (honk-0.9.7.tgz) = t6EM5E98qvlnq6Y6vd21MvPBrWpkmo4qXdgNEUAeF7M=
-SIZE (honk-0.9.7.tgz) = 522993
+SHA256 (honk-0.9.8.tgz) = BmZgMvN7fFrft+W0+V2j3tezI5kRLl/7Fx5wIVXwCG4=
+SHA256 (honk-icon.png) = 92RJuF2onJ/1OYs4E4TYDm9KbzmNKISl+1+MSdhpzUQ=
+SIZE (honk-0.9.8.tgz) = 511957
+SIZE (honk-icon.png) = 912
Index: pkg/MESSAGE
===
RCS file: pkg/MESSAGE
diff -N pkg/MESSAGE
--- /dev/null   1 Jan 1970 00:00:00 -
+++ pkg/MESSAGE 23 Sep 2022 16:17:47 -
@@ -0,0 +1,15 @@
+The database has changed since version 0.9.7
+
+Stop the old honk process.
+honk# rcctl stop honk
+
+Backup the database.
+honk# doas -su _honk
+honk$ umask 077; cd ${LOCALSTATEDIR}/honk && honk backup `date +backup-%F`
+
+Perform the upgrade with the upgrade command.
+honk$ honk upgrade
+honk$ exit
+
+Restart.
+honk# rcctl start honk
Index: pkg/PLIST
===
RCS file: /cvs/ports/www/honk/pkg/PLIST,v
retrieving revision 1.9
diff -u -p -r1.

Re: [MAINTAINER UPDATE] www/honk 0.9.7 -> 0.9.8

2022-09-22 Thread Christoph R. Winter
I would appricate it if Honk 0.9.8 makes it in the 7.2 ports -release but I 
think it will not as it is now. As we Honked today, I try to explain how I 
would change the diff.

Basically, I find it good that you care of not experienced users but this 
information is not required that the port works or is useable and it makes more 
work to have informations on various places (that means not, that you should 
remove it, I just would implement it in another way).

I would write it in the following way.

Honk requires relayd(8) (because it is already in the base system) as TLS 
endpoint. That means you need a SSL certificate which you can obtain using 
acme-client(1) and a server section in httpd.conf(8) (maybe including a 302 
redirect from HTTP to HTTPS). 

- for experienced users you have nothing more to explain and it keeps 
discussions about how to make this and that away from the mailing list. If 
someone uses software x they have to self find out how (thats why the 
information that relayd is in the base system).  

If you are new to running your own web services or to Honk, there is a detailed 
writeup at the maintainer blog ... 

- your URL, there you can explain all details (from DNS - to cron) and also 
show how to setup the dev version of Honk to help tedu test things. In your 
blog you could spread the word about the OS, Honk and the fedi. 

Beside of that, in the examples directory of Honk you find example 
configuration files. 

- just ask tedu to add your acme-client.conf, httpd.conf and relayd.conf file 
which you also could use to decument / explain things.

- then you could add the 4 lines of the relayd.conf file which are related to 
Honk, the init and the upgrade section.

Just a idea and just my 2 cents, the committers decide. 
BTW the diff still works as it should, I setup Honk again on a clean install 
using 7.2 GENERIC.MP#734 amd64 from monday this week.

Regards,


Christoph
 
P. S. sorry if the format is not as it should be, I try to use Mutt.
  



Re: [MAINTAINER UPDATE] www/honk 0.9.7 -> 0.9.8

2022-09-21 Thread Horia Racoviceanu
ping

On 9/16/22, Horia Racoviceanu  wrote:
> - Changed the certificate renewal cron job based on the OCSP staple
> interval for letsencrypt (for buypass it should be changed to run
> every 7th hour) and based on the update steps listed by Stuart
> - Replaced VARBASE with LOCALSTATEDIR
>
> I'd like to keep the acme-client and ocspcheck configuration in the
> port README because I know some less OpenBSD savvy people who
> installed the Honk package.
>
> On 7/31/22, Christoph Roland Winter  wrote:
>> BTW what you think about a section in the FAQ about httpd, relayd,
>> acme-client for all web applications.
>>
>> Am 31.07.22 um 13:12 schrieb Stuart Henderson:
>>> 1. The staple needs to be updated periodically
>>>
>>> 2. If the certificate is updated the staple needs to be updated too
>>>
>>> 3. If either the certificate or the staple are changed, relayd needs a
>>> reload
>>>
>>> To be honest I'm not sure if it really belongs in the doc for some
>>> random port in www, this applies to anyone using relayd to front-end a
>>> web application.
>>>
>>> --
>>>Sent from a phone, apologies for poor formatting.
>>>
>>>
>>> On 31 July 2022 02:16:13 Christoph Roland Winter 
>>> wrote:
>>>
 Beside of this question, the idea of OCSP is

 By turning on OCSP Stapling, you can improve the performance of your
 website, provide better privacy protections for your users, and help
 Let’s Encrypt efficiently serve as many people as possible.

 https://letsencrypt.org/docs/integration-guide/

 Is it better to update the OCSP file before it expires or update it
 only
 seldom (in this case the question is, whether it is not better to don't
 use OCSP).

 Am 31.07.22 um 00:33 schrieb Horia Racoviceanu:
> I've switched the cron job to chaining acme-client && ocspcheck on
> June 20.
> Both the certificate and the OCSP response were last updated on June
> 20.
>
> # ocspcheck -vNi /etc/ssl/honk.example.com.{ocsp,crt}
> ocspcheck: Invalid OCSP reply: this update is too old Mon Jun 20
> 05:46:59 2022
>
> relayd and Firefox do not complain.
>
> ssllabs.com reports:
>
> OCSP Must Staple No
> OCSP stapling  Yes
> OCSP STAPLING ERROR: OCSP response expired on Mon Jun 20 20:46:59 UTC
> 2022
>
> Can the OCSP STAPLING ERROR be ignored?
>
> On 7/30/22, Christoph Roland Winter  wrote:
>> Welcome.
>>
>> The question is then, why the OCSP staple file expires after hours or
>> 7
>> days and the certificate will be renewed after 60 days following man
>> 1
>> acme-client
>>
>> -F  Force certificate renewal, even if it has more than 30 days
>> validity.
>>
>> It can't be the idea to have so long a expired OCSP file (saw Firefox
>> in
>> the past complain when a outdated OCSP file exists). So, if you
>> replace
>> the first && with a ; nothing will change as the last && to reload
>> relayd will only happen if the cert or the OCSP file (or both) was
>> renewed and if booth are up to date nothing will happen.
>>
>> Just my 2 cents.
>>
>> Regards,
>>
>>
>> Christoph
>>
>> Am 30.07.22 um 19:07 schrieb Horia Racoviceanu:
>>> Thanks for testing!
>>>
>>> As Stuart Henderson mentioned,
 You do really want to update OCSP if a cert has been renewed.
>>>
>>> On 7/29/22, Christoph Roland Winter  wrote:
 Hello,

 I have only kept the first message and was some time not subscribed
 to
 the list - lets see, where the message ends.

 I tried the latest patch from
 https://marc.info/?l=openbsd-ports&m=165827470732358&q=p3 and it
 worked
 fine using

 OpenBSD 7.2-beta (GENERIC.MP) #654: Wed Jul 27 20:10:05 MDT 2022
 and the
 -current ports tree using amd64.

 Maybe I am wrong but the crontab from the above patch

 +~ ~ * * * acme-client honk.example.com && ocspcheck -No
 ${SYSCONFDIR}/ssl/honk.example.com.{ocsp,crt} && rcctl reload
 relayd

 needs to be modified. The first && must be replaced with ; (or
 splited
 in 2 cron jobs). As it is now, the ocsp file gets only renewed all
 60
 days, as acme-client renews the certificate only 30 days before it
 expires (checked with the -v option and as nothing happened before,
 &&
 stops at this point). BTW my ocsp file with the above command is
 valid
 for 7 days.

 ocspcheck -vNo /etc/ssl/the.floof.rocks.{ocsp,crt}
 Using http to host r3.o.lencr.org, port 80, path /
 OCSP response validated from r3.o.lencr.org
  This Update: Thu Jul 28 15:00:00 2022
  Next Update: Thu Aug  4 14:59:58 2022

 The only thing I did was using th

Re: [MAINTAINER UPDATE] www/honk 0.9.7 -> 0.9.8

2022-07-31 Thread Christoph Roland Winter
BTW what you think about a section in the FAQ about httpd, relayd, 
acme-client for all web applications.


Am 31.07.22 um 13:12 schrieb Stuart Henderson:

1. The staple needs to be updated periodically

2. If the certificate is updated the staple needs to be updated too

3. If either the certificate or the staple are changed, relayd needs a 
reload


To be honest I'm not sure if it really belongs in the doc for some 
random port in www, this applies to anyone using relayd to front-end a 
web application.


--
   Sent from a phone, apologies for poor formatting.


On 31 July 2022 02:16:13 Christoph Roland Winter  wrote:


Beside of this question, the idea of OCSP is

By turning on OCSP Stapling, you can improve the performance of your
website, provide better privacy protections for your users, and help
Let’s Encrypt efficiently serve as many people as possible.

https://letsencrypt.org/docs/integration-guide/

Is it better to update the OCSP file before it expires or update it only
seldom (in this case the question is, whether it is not better to don't
use OCSP).

Am 31.07.22 um 00:33 schrieb Horia Racoviceanu:
I've switched the cron job to chaining acme-client && ocspcheck on 
June 20.

Both the certificate and the OCSP response were last updated on June 20.

# ocspcheck -vNi /etc/ssl/honk.example.com.{ocsp,crt}
ocspcheck: Invalid OCSP reply: this update is too old Mon Jun 20 
05:46:59 2022


relayd and Firefox do not complain.

ssllabs.com reports:

OCSP Must Staple No
OCSP stapling  Yes
OCSP STAPLING ERROR: OCSP response expired on Mon Jun 20 20:46:59 UTC 
2022


Can the OCSP STAPLING ERROR be ignored?

On 7/30/22, Christoph Roland Winter  wrote:

Welcome.

The question is then, why the OCSP staple file expires after hours or 7
days and the certificate will be renewed after 60 days following man 1
acme-client

-F      Force certificate renewal, even if it has more than 30 days
        validity.

It can't be the idea to have so long a expired OCSP file (saw Firefox in
the past complain when a outdated OCSP file exists). So, if you replace
the first && with a ; nothing will change as the last && to reload
relayd will only happen if the cert or the OCSP file (or both) was
renewed and if booth are up to date nothing will happen.

Just my 2 cents.

Regards,


Christoph

Am 30.07.22 um 19:07 schrieb Horia Racoviceanu:

Thanks for testing!

As Stuart Henderson mentioned,

You do really want to update OCSP if a cert has been renewed.


On 7/29/22, Christoph Roland Winter  wrote:

Hello,

I have only kept the first message and was some time not subscribed to
the list - lets see, where the message ends.

I tried the latest patch from
https://marc.info/?l=openbsd-ports&m=165827470732358&q=p3 and it 
worked

fine using

OpenBSD 7.2-beta (GENERIC.MP) #654: Wed Jul 27 20:10:05 MDT 2022 
and the

-current ports tree using amd64.

Maybe I am wrong but the crontab from the above patch

+~ ~ * * * acme-client honk.example.com && ocspcheck -No
${SYSCONFDIR}/ssl/honk.example.com.{ocsp,crt} && rcctl reload relayd

needs to be modified. The first && must be replaced with ; (or splited
in 2 cron jobs). As it is now, the ocsp file gets only renewed all 60
days, as acme-client renews the certificate only 30 days before it
expires (checked with the -v option and as nothing happened before, &&
stops at this point). BTW my ocsp file with the above command is valid
for 7 days.

ocspcheck -vNo /etc/ssl/the.floof.rocks.{ocsp,crt}
Using http to host r3.o.lencr.org, port 80, path /
OCSP response validated from r3.o.lencr.org
         This Update: Thu Jul 28 15:00:00 2022
         Next Update: Thu Aug  4 14:59:58 2022

The only thing I did was using the /etc/examples/acme-client.conf 
file,

added my email and added the domain blocks.

Regards,


Christoph


Am 01.06.22 um 23:37 schrieb Horia Racoviceanu:

Upgrade to v0.9.8
- Add MESSAGE
- Update README

changelog

=== 0.9.8 Tentative Tentacle

+ Switch database to WAL mode.

- go version 1.16 required.

+ Specify banner: image in profile.

+ Update activity compatibility with mastodon.

- Signed fetch.

+ Better unicode hashtags.

+ Some more configuration options.

+ Some UI improvements to web interface.

+ Add atme class to mentions

+ Improvements to the mastodon importer.

+ More hydration capable pages.

+ Support for local.js.

+ Better error messages for timeouts.

+ Some improved html and markdown.










Re: [MAINTAINER UPDATE] www/honk 0.9.7 -> 0.9.8

2022-07-31 Thread Stuart Henderson

1. The staple needs to be updated periodically

2. If the certificate is updated the staple needs to be updated too

3. If either the certificate or the staple are changed, relayd needs a reload

To be honest I'm not sure if it really belongs in the doc for some random 
port in www, this applies to anyone using relayd to front-end a web 
application.


--
 Sent from a phone, apologies for poor formatting.

On 31 July 2022 02:16:13 Christoph Roland Winter  wrote:


Beside of this question, the idea of OCSP is

By turning on OCSP Stapling, you can improve the performance of your
website, provide better privacy protections for your users, and help
Let’s Encrypt efficiently serve as many people as possible.

https://letsencrypt.org/docs/integration-guide/

Is it better to update the OCSP file before it expires or update it only
seldom (in this case the question is, whether it is not better to don't
use OCSP).

Am 31.07.22 um 00:33 schrieb Horia Racoviceanu:

I've switched the cron job to chaining acme-client && ocspcheck on June 20.
Both the certificate and the OCSP response were last updated on June 20.

# ocspcheck -vNi /etc/ssl/honk.example.com.{ocsp,crt}
ocspcheck: Invalid OCSP reply: this update is too old Mon Jun 20 05:46:59 2022

relayd and Firefox do not complain.

ssllabs.com reports:

OCSP Must Staple No
OCSP stapling  Yes
OCSP STAPLING ERROR: OCSP response expired on Mon Jun 20 20:46:59 UTC 2022

Can the OCSP STAPLING ERROR be ignored?

On 7/30/22, Christoph Roland Winter  wrote:

Welcome.

The question is then, why the OCSP staple file expires after hours or 7
days and the certificate will be renewed after 60 days following man 1
acme-client

-F  Force certificate renewal, even if it has more than 30 days
   validity.

It can't be the idea to have so long a expired OCSP file (saw Firefox in
the past complain when a outdated OCSP file exists). So, if you replace
the first && with a ; nothing will change as the last && to reload
relayd will only happen if the cert or the OCSP file (or both) was
renewed and if booth are up to date nothing will happen.

Just my 2 cents.

Regards,


Christoph

Am 30.07.22 um 19:07 schrieb Horia Racoviceanu:

Thanks for testing!

As Stuart Henderson mentioned,

You do really want to update OCSP if a cert has been renewed.


On 7/29/22, Christoph Roland Winter  wrote:

Hello,

I have only kept the first message and was some time not subscribed to
the list - lets see, where the message ends.

I tried the latest patch from
https://marc.info/?l=openbsd-ports&m=165827470732358&q=p3 and it worked
fine using

OpenBSD 7.2-beta (GENERIC.MP) #654: Wed Jul 27 20:10:05 MDT 2022 and the
-current ports tree using amd64.

Maybe I am wrong but the crontab from the above patch

+~ ~ * * * acme-client honk.example.com && ocspcheck -No
${SYSCONFDIR}/ssl/honk.example.com.{ocsp,crt} && rcctl reload relayd

needs to be modified. The first && must be replaced with ; (or splited
in 2 cron jobs). As it is now, the ocsp file gets only renewed all 60
days, as acme-client renews the certificate only 30 days before it
expires (checked with the -v option and as nothing happened before, &&
stops at this point). BTW my ocsp file with the above command is valid
for 7 days.

ocspcheck -vNo /etc/ssl/the.floof.rocks.{ocsp,crt}
Using http to host r3.o.lencr.org, port 80, path /
OCSP response validated from r3.o.lencr.org
This Update: Thu Jul 28 15:00:00 2022
Next Update: Thu Aug  4 14:59:58 2022

The only thing I did was using the /etc/examples/acme-client.conf file,
added my email and added the domain blocks.

Regards,


Christoph


Am 01.06.22 um 23:37 schrieb Horia Racoviceanu:

Upgrade to v0.9.8
- Add MESSAGE
- Update README

changelog

=== 0.9.8 Tentative Tentacle

+ Switch database to WAL mode.

- go version 1.16 required.

+ Specify banner: image in profile.

+ Update activity compatibility with mastodon.

- Signed fetch.

+ Better unicode hashtags.

+ Some more configuration options.

+ Some UI improvements to web interface.

+ Add atme class to mentions

+ Improvements to the mastodon importer.

+ More hydration capable pages.

+ Support for local.js.

+ Better error messages for timeouts.

+ Some improved html and markdown.




Re: [MAINTAINER UPDATE] www/honk 0.9.7 -> 0.9.8

2022-07-30 Thread Christoph Roland Winter

Beside of this question, the idea of OCSP is

By turning on OCSP Stapling, you can improve the performance of your 
website, provide better privacy protections for your users, and help 
Let’s Encrypt efficiently serve as many people as possible.


https://letsencrypt.org/docs/integration-guide/

Is it better to update the OCSP file before it expires or update it only 
seldom (in this case the question is, whether it is not better to don't 
use OCSP).


Am 31.07.22 um 00:33 schrieb Horia Racoviceanu:

I've switched the cron job to chaining acme-client && ocspcheck on June 20.
Both the certificate and the OCSP response were last updated on June 20.

# ocspcheck -vNi /etc/ssl/honk.example.com.{ocsp,crt}
ocspcheck: Invalid OCSP reply: this update is too old Mon Jun 20 05:46:59 2022

relayd and Firefox do not complain.

ssllabs.com reports:

OCSP Must Staple No
OCSP stapling  Yes
OCSP STAPLING ERROR: OCSP response expired on Mon Jun 20 20:46:59 UTC 2022

Can the OCSP STAPLING ERROR be ignored?

On 7/30/22, Christoph Roland Winter  wrote:

Welcome.

The question is then, why the OCSP staple file expires after hours or 7
days and the certificate will be renewed after 60 days following man 1
acme-client

   -F  Force certificate renewal, even if it has more than 30 days
   validity.

It can't be the idea to have so long a expired OCSP file (saw Firefox in
the past complain when a outdated OCSP file exists). So, if you replace
the first && with a ; nothing will change as the last && to reload
relayd will only happen if the cert or the OCSP file (or both) was
renewed and if booth are up to date nothing will happen.

Just my 2 cents.

Regards,


Christoph

Am 30.07.22 um 19:07 schrieb Horia Racoviceanu:

Thanks for testing!

As Stuart Henderson mentioned,

You do really want to update OCSP if a cert has been renewed.


On 7/29/22, Christoph Roland Winter  wrote:

Hello,

I have only kept the first message and was some time not subscribed to
the list - lets see, where the message ends.

I tried the latest patch from
https://marc.info/?l=openbsd-ports&m=165827470732358&q=p3 and it worked
fine using

OpenBSD 7.2-beta (GENERIC.MP) #654: Wed Jul 27 20:10:05 MDT 2022 and the
-current ports tree using amd64.

Maybe I am wrong but the crontab from the above patch

+~ ~ * * * acme-client honk.example.com && ocspcheck -No
${SYSCONFDIR}/ssl/honk.example.com.{ocsp,crt} && rcctl reload relayd

needs to be modified. The first && must be replaced with ; (or splited
in 2 cron jobs). As it is now, the ocsp file gets only renewed all 60
days, as acme-client renews the certificate only 30 days before it
expires (checked with the -v option and as nothing happened before, &&
stops at this point). BTW my ocsp file with the above command is valid
for 7 days.

ocspcheck -vNo /etc/ssl/the.floof.rocks.{ocsp,crt}
Using http to host r3.o.lencr.org, port 80, path /
OCSP response validated from r3.o.lencr.org
  This Update: Thu Jul 28 15:00:00 2022
  Next Update: Thu Aug  4 14:59:58 2022

The only thing I did was using the /etc/examples/acme-client.conf file,
added my email and added the domain blocks.

Regards,


Christoph


Am 01.06.22 um 23:37 schrieb Horia Racoviceanu:

Upgrade to v0.9.8
- Add MESSAGE
- Update README

changelog

=== 0.9.8 Tentative Tentacle

+ Switch database to WAL mode.

- go version 1.16 required.

+ Specify banner: image in profile.

+ Update activity compatibility with mastodon.

- Signed fetch.

+ Better unicode hashtags.

+ Some more configuration options.

+ Some UI improvements to web interface.

+ Add atme class to mentions

+ Improvements to the mastodon importer.

+ More hydration capable pages.

+ Support for local.js.

+ Better error messages for timeouts.

+ Some improved html and markdown.








Re: [MAINTAINER UPDATE] www/honk 0.9.7 -> 0.9.8

2022-07-30 Thread Christoph Roland Winter

Welcome.

The question is then, why the OCSP staple file expires after hours or 7 
days and the certificate will be renewed after 60 days following man 1 
acme-client


 -F  Force certificate renewal, even if it has more than 30 days
 validity.

It can't be the idea to have so long a expired OCSP file (saw Firefox in 
the past complain when a outdated OCSP file exists). So, if you replace 
the first && with a ; nothing will change as the last && to reload 
relayd will only happen if the cert or the OCSP file (or both) was 
renewed and if booth are up to date nothing will happen.


Just my 2 cents.

Regards,


Christoph

Am 30.07.22 um 19:07 schrieb Horia Racoviceanu:

Thanks for testing!

As Stuart Henderson mentioned,

You do really want to update OCSP if a cert has been renewed.


On 7/29/22, Christoph Roland Winter  wrote:

Hello,

I have only kept the first message and was some time not subscribed to
the list - lets see, where the message ends.

I tried the latest patch from
https://marc.info/?l=openbsd-ports&m=165827470732358&q=p3 and it worked
fine using

OpenBSD 7.2-beta (GENERIC.MP) #654: Wed Jul 27 20:10:05 MDT 2022 and the
-current ports tree using amd64.

Maybe I am wrong but the crontab from the above patch

+~ ~ * * * acme-client honk.example.com && ocspcheck -No
${SYSCONFDIR}/ssl/honk.example.com.{ocsp,crt} && rcctl reload relayd

needs to be modified. The first && must be replaced with ; (or splited
in 2 cron jobs). As it is now, the ocsp file gets only renewed all 60
days, as acme-client renews the certificate only 30 days before it
expires (checked with the -v option and as nothing happened before, &&
stops at this point). BTW my ocsp file with the above command is valid
for 7 days.

ocspcheck -vNo /etc/ssl/the.floof.rocks.{ocsp,crt}
Using http to host r3.o.lencr.org, port 80, path /
OCSP response validated from r3.o.lencr.org
 This Update: Thu Jul 28 15:00:00 2022
 Next Update: Thu Aug  4 14:59:58 2022

The only thing I did was using the /etc/examples/acme-client.conf file,
added my email and added the domain blocks.

Regards,


Christoph


Am 01.06.22 um 23:37 schrieb Horia Racoviceanu:

Upgrade to v0.9.8
- Add MESSAGE
- Update README

changelog

=== 0.9.8 Tentative Tentacle

+ Switch database to WAL mode.

- go version 1.16 required.

+ Specify banner: image in profile.

+ Update activity compatibility with mastodon.

- Signed fetch.

+ Better unicode hashtags.

+ Some more configuration options.

+ Some UI improvements to web interface.

+ Add atme class to mentions

+ Improvements to the mastodon importer.

+ More hydration capable pages.

+ Support for local.js.

+ Better error messages for timeouts.

+ Some improved html and markdown.






Re: [MAINTAINER UPDATE] www/honk 0.9.7 -> 0.9.8

2022-07-29 Thread Christoph Roland Winter

Hello,

I have only kept the first message and was some time not subscribed to 
the list - lets see, where the message ends.


I tried the latest patch from 
https://marc.info/?l=openbsd-ports&m=165827470732358&q=p3 and it worked 
fine using


OpenBSD 7.2-beta (GENERIC.MP) #654: Wed Jul 27 20:10:05 MDT 2022 and the 
-current ports tree using amd64.


Maybe I am wrong but the crontab from the above patch

+~ ~ * * * acme-client honk.example.com && ocspcheck -No 
${SYSCONFDIR}/ssl/honk.example.com.{ocsp,crt} && rcctl reload relayd


needs to be modified. The first && must be replaced with ; (or splited 
in 2 cron jobs). As it is now, the ocsp file gets only renewed all 60 
days, as acme-client renews the certificate only 30 days before it 
expires (checked with the -v option and as nothing happened before, && 
stops at this point). BTW my ocsp file with the above command is valid 
for 7 days.


ocspcheck -vNo /etc/ssl/the.floof.rocks.{ocsp,crt}
Using http to host r3.o.lencr.org, port 80, path /
OCSP response validated from r3.o.lencr.org
   This Update: Thu Jul 28 15:00:00 2022
   Next Update: Thu Aug  4 14:59:58 2022

The only thing I did was using the /etc/examples/acme-client.conf file, 
added my email and added the domain blocks.


Regards,


Christoph


Am 01.06.22 um 23:37 schrieb Horia Racoviceanu:

Upgrade to v0.9.8
- Add MESSAGE
- Update README

changelog

=== 0.9.8 Tentative Tentacle

+ Switch database to WAL mode.

- go version 1.16 required.

+ Specify banner: image in profile.

+ Update activity compatibility with mastodon.

- Signed fetch.

+ Better unicode hashtags.

+ Some more configuration options.

+ Some UI improvements to web interface.

+ Add atme class to mentions

+ Improvements to the mastodon importer.

+ More hydration capable pages.

+ Support for local.js.

+ Better error messages for timeouts.

+ Some improved html and markdown.




Re: [MAINTAINER UPDATE] www/honk 0.9.7 -> 0.9.8

2022-06-26 Thread Stuart Henderson
binaries in cvs are not a great idea

On 2022/06/26 12:26, Horia Racoviceanu wrote:
> Changed the acme-client cron job to run daily, and chained ocspcheck
> and relayd reload.
> 
> ~ ~ * * * acme-client honk.example.com && ocspcheck -No
> ${SYSCONFDIR}/ssl/honk.example.com.{ocsp,crt} && rcctl reload relayd
> 
> Added "favicon.ico" and "icon.png" in the port $FILESDIR to be
> installed into $EXAMPLESDIR and @sample into /var/honk
> 
> I haven't used DISTFILES because the icons are located on a private
> honk instance, not in the distribution repo. I sent a request upstream
> to include "favicon.ico" and "icon.png" in the honk repo so they'll
> install by default.
> 
> Thank you both! Sorry for the long delay, I've been testing the new cron job.
> 
> On 6/20/22, Stuart Henderson  wrote:
> > On 2022/06/19 13:28, Horia Racoviceanu wrote:
> >> From my tests, The OCSP response is valid for a few hours e.g.
> >>
> >> Using http to host ocsp.buypass.com, port 80, path /
> >> OCSP response validated from ocsp.buypass.com
> >>This Update: Sun Jun 19 09:55:11 2022
> >>Next Update: Sun Jun 19 17:55:11 2022
> >>
> >> This is why I don't use "&&" to restart relayd when there's a new OCSP
> >> response without a certificate renewal or vice versa.
> >>
> >> relayd could restart only when there's a new OCSP response but I
> >> haven't tested it e.g.
> >>
> >> ~ * * * * acme-client honk.example.com; ocspcheck -No \
> >> ${SYSCONFDIR}/ssl/honk.example.com.{ocsp,crt} && rcctl restart relayd
> >>
> >> Or I could separate acme-client and ocspcheck cron jobs and use "&&"
> >> on both but I'm afraid there may be a few minutes of stale OCSP
> >> response e.g.
> >>
> >> ~ * * * * acme-client honk.example.com && rcctl restart relayd
> >> ~ * * * * ocspcheck -No ${SYSCONFDIR}/ssl/honk.example.com.{ocsp,crt}
> >> && rcctl restart relayd
> >>
> >> What do you think?
> >
> > acme-client doesn't need to run every hour. Once a day is plenty.
> > You do really want to update OCSP if a cert has been renewed.
> >
> > Isn't "reload" enough? A full restart of relayd is rather disruptive
> > especially if it's running multiple services.
> >
> > Looking at the existing pkg-readme:
> >
> > : Icon and favicon
> > : 
> > :
> > : honk# mkdir ${VARBASE}/www/htdocs/honk
> > : honk# ftp -o ${VARBASE}/www/htdocs/honk/icon.png \
> > :   https://honk.tedunangst.com/icon.png
> > : honk# ftp -o ${VARBASE}/www/htdocs/honk/favicon.ico \
> > :   https://honk.tedunangst.com/favicon.ico
> >
> > Why not include these in the package? Easiest way is probably to install
> > in /usr/local/share/examples/honk and @sample into /var/www.
> >
> >




Re: [MAINTAINER UPDATE] www/honk 0.9.7 -> 0.9.8

2022-06-19 Thread Stuart Henderson
On 2022/06/19 13:28, Horia Racoviceanu wrote:
> From my tests, The OCSP response is valid for a few hours e.g.
> 
> Using http to host ocsp.buypass.com, port 80, path /
> OCSP response validated from ocsp.buypass.com
>This Update: Sun Jun 19 09:55:11 2022
>Next Update: Sun Jun 19 17:55:11 2022
> 
> This is why I don't use "&&" to restart relayd when there's a new OCSP
> response without a certificate renewal or vice versa.
> 
> relayd could restart only when there's a new OCSP response but I
> haven't tested it e.g.
> 
> ~ * * * * acme-client honk.example.com; ocspcheck -No \
> ${SYSCONFDIR}/ssl/honk.example.com.{ocsp,crt} && rcctl restart relayd
> 
> Or I could separate acme-client and ocspcheck cron jobs and use "&&"
> on both but I'm afraid there may be a few minutes of stale OCSP
> response e.g.
> 
> ~ * * * * acme-client honk.example.com && rcctl restart relayd
> ~ * * * * ocspcheck -No ${SYSCONFDIR}/ssl/honk.example.com.{ocsp,crt}
> && rcctl restart relayd
> 
> What do you think?

acme-client doesn't need to run every hour. Once a day is plenty.
You do really want to update OCSP if a cert has been renewed.

Isn't "reload" enough? A full restart of relayd is rather disruptive
especially if it's running multiple services.

Looking at the existing pkg-readme:

: Icon and favicon
: 
: 
: honk# mkdir ${VARBASE}/www/htdocs/honk
: honk# ftp -o ${VARBASE}/www/htdocs/honk/icon.png \
:   https://honk.tedunangst.com/icon.png
: honk# ftp -o ${VARBASE}/www/htdocs/honk/favicon.ico \
:   https://honk.tedunangst.com/favicon.ico

Why not include these in the package? Easiest way is probably to install
in /usr/local/share/examples/honk and @sample into /var/www.