2024-11-01 02:46:47 how do you check what the release version is of the installed kernel on Alpine? 2024-11-01 03:44:29 orchardstreet22: 'apk info linux-edge' or 'linux-lts', depending on what you're using 2024-11-01 03:45:02 You can also check the _running_ kernel with 'uname -r' 2024-11-01 06:47:42 Hello, is there any way I can make udhcpc start faster during boot? Right now it spends couple seconds with the message "udhcpc: broadcasting discover" 4 times until it starts. I read on the wiki that you can add async run level which I did and moved chronyd to it which made my boot faster, but when I did the same with networking it still starts as if it was in boot, any way I 2024-11-01 06:47:44 can make udhcpc start faster? 2024-11-01 07:06:51 OK moving it to async run level solves it but it still prints the output and I need to press enter to get to login prompt after wich it continues to print to my tty. Is there a way to supress the output and get swtraight to login prompt? 2024-11-01 10:42:21 I'm getting this error on firefox 'Cannot play media. No decoders for requested formats: application/vnd.apple.mpegURL' , any idea if I could fix installing some package? 2024-11-01 12:11:28 is unrar in repo? only find it in the bash-complertion package 2024-11-01 12:11:50 It is not, since it's not free to redistribute 2024-11-01 12:12:03 bsdtar can handle rar files though 2024-11-01 12:14:32 thanks! 2024-11-01 12:26:18 ikke: unrar is redistributable 2024-11-01 12:26:24 it's just non-free 2024-11-01 12:27:03 bsdtar can handle a subset of rar files 2024-11-01 12:27:11 a lot of them don't work in practice 2024-11-01 12:36:36 is there a way to get gpg-agent to forget previous successful pinentry, without killing it? 2024-11-01 12:42:02 nvrmnd, found it 2024-11-01 15:03:16 damn, epr from repo is nice epub reader, so cozy 2024-11-01 15:04:40 cozy? 2024-11-01 18:12:18 hi, i have current months' irc log (html version) available here, https://m.insteps.net/irclogs/alpine/ , will move to better named domain soon, suggestion to improve welcomed 2024-11-01 20:04:52 vkrishn: looks really cool 2024-11-01 20:12:34 WhyNotHuge: I'm so confused, uname -r returns linux-lts-6.6.58-r0, I thought I was supposed to be on r1 on Alpine 3.20.03 as of now 2024-11-01 20:12:47 i mean WhyNotHugo 2024-11-01 20:14:54 there is not enough space 😂 2024-11-01 20:19:15 :) 2024-11-01 21:40:28 I'm having issues with fusermount3 when running a flatpak. It seems to be to do with the desktop portal 2024-11-01 21:41:05 I'm getting `fusermount3: failed to access mountpoint /tmp/xdg_runtime_dirs/1001/doc: Permission denied 2024-11-01 21:41:40 I can't seem to chmod this `doc` directory, I assume it's been made and is managed by the portal 2024-11-01 21:41:47 any ideas on how to debug this? 2024-11-01 22:58:20 orchardstreet22: did you reboot after installing the update? 2024-11-02 01:37:08 hey, is anyone using QEMU with a Windows host? I can't get a standard network (QEMU bridge to tuntap guest device) to work and wonder if I'm missing something 2024-11-02 02:02:42 Did you install the virtio drivers in the windows VM? 2024-11-02 02:03:50 http://www.linux-kvm.org/page/Virtio <- these to be more specific. 2024-11-02 04:35:31 durrendal: thanks, I did. 2024-11-02 04:36:06 Turns out it was a nftables issue, the default NAT setup needs these extra rules -> https://forums.gentoo.org/viewtopic-p-8752687.html?sid=993eeba614dd1db9d8dce9c0eb625bf6#8752687 2024-11-02 04:36:28 Needs more setup, but Alpine really is a great desktop distro 2024-11-02 12:58:58 Hey, I am currrently trying to understand the supply chain risks in Alpine Linux to understand the threat model and the use cases it is and is not appropiate for. Currently it seems builds are made with registry.alpinelinux.org/alpine/infra/docker/alpine-gitlab-ci:latest 2024-11-02 13:00:28 lrvick: That's just for CI purposes 2024-11-02 13:00:47 But doesn't the CI sign the builds? 2024-11-02 13:02:06 and the keys are just made with abuild-keygen on each CI node, so they are extractable keys and not stored in a TPM or TEE unless I missed something? 2024-11-02 13:04:57 Our builders are separate from our CI infra 2024-11-02 13:05:04 CI is just for testing merge requests before merging them 2024-11-02 13:05:35 Ah, that is helpful. Is there any transparency on the builders and how they are managed then? 2024-11-02 13:06:24 E.g what build images they use, how they are hash locked, etc? 2024-11-02 13:07:00 We do not use docker for the builders 2024-11-02 13:08:31 They are lxc containers 2024-11-02 13:08:39 https://pkgs.alpinelinux.org/package/edge/main/x86_64/aports-build 2024-11-02 13:12:38 If I am asking questions that are well documented somewhere please by all means RTFM me, but to clarify... 2024-11-02 13:13:07 So the build machines run aports-build, which in turn build and sign all packages, including new copies of aports-build. 2024-11-02 13:14:18 presumably these machines are themselves running alpine, which then run alpine lxc-containers, which then run aports-build? 2024-11-02 13:14:38 is this setup maintained by hand, or via automation of some kind? 2024-11-02 13:16:26 lrvick: maintained by hand 2024-11-02 13:19:09 Okay. Is it then accurate to say build-machine maintainers ssh to the build machines, and thus have plaintext access to the global package signing keys from their personal workstations? 2024-11-02 13:26:26 I guess to ask bluntly, are there are any mitigations in place today (or even planned) to prevent the compromise of a personal ssh key of an alpine build-machine maintainer being able tamper with any alpine package without detection? 2024-11-02 13:36:22 lrvick: At the moment, there are not a lot of controls in place, except that the people having access is very limited (2 or 3, depending on the arch). 2024-11-02 13:36:34 We do have plans to redesign the builder architecture 2024-11-02 13:40:01 This conversation is fascinating. Does there exist any monitoring or out of band logging and alerting that would catch such tampering? 2024-11-02 13:40:49 I am working on exporting syslog, but not in place everywhere yet 2024-11-02 13:41:00 Is MFA enforced on the SSH keys that access the build systems? (Such as the use of ed25519-sk with yubikey presence?) 2024-11-02 13:41:27 So this is stemming from an article that came out comparing the distro I founded for supply chain integrity (stagex) to other distros. Given that we are OCI-native, comparisons to Alpine being the most popular distro in corporate containerized environments are unavoidable, but I do want to make sure they are accurate and fair to alpine. 2024-11-02 13:41:43 hello, is there any recomendded way to have per user services in alpine ? 2024-11-02 13:42:11 Stagex is also musl based, so we borrow a lot of patterns from alpine. 2024-11-02 13:42:33 aktina: not at the moment, openrc is working on implementing it 2024-11-02 13:43:19 durrendal: no 2024-11-02 13:43:28 But we are 100% bit for bit reproducible, and we mitigate single points of failure in our supply chain by ensuring all packages are reproduced by 2-3 people independently, and each signed by 2-3 maintainers as proof of this, so there is no SPOF in any single computer or person. 2024-11-02 13:44:07 but it is unlikely stagex will ever be as popular or widely deployed as alpine, so if there is a way to get similar protections into alpine that would be a major win for the internet at large which heavily depends on it. 2024-11-02 13:44:08 lrvick: How does that scale? 2024-11-02 13:44:22 ikke heavy automation 2024-11-02 13:44:32 We receive 60 merge requests per day 2024-11-02 13:44:50 We build for 8 architectures 2024-11-02 13:45:09 The latter is the most challenging for verifying reproducability 2024-11-02 13:45:45 well if builds were reproducible, then every PR could build by 2-3 build machines in paralell, which could be immutable machines with non-extractable TPM based keys with remote attestation. 2024-11-02 13:46:04 granted that woudld be more expensive, but I don't see it being a slowdown if running in paralell 2024-11-02 13:46:14 We are limited in the HW that we have 2024-11-02 13:46:26 Which is all donated to the project right ikke? 2024-11-02 13:46:29 Yes 2024-11-02 13:46:55 If companies knew how vulnerable they were based on the setup they just described, I bet getting hardware donated would not be that big of a problem 2024-11-02 13:48:14 Currently stagex already has quite a bit of donated hardware from 4 orgs because we made it clear supply chain integrity is a hard requirement for merging packages, but in total fairness we only have about 300 packages and one architecture. We also only do the expensive reproduction step at release time, not PR merge time 2024-11-02 13:48:16 lrvick: what if the machine with the tpm keys broke? Do you loose your signing keys? 2024-11-02 13:48:53 TPM backed keys* 2024-11-02 13:49:45 Well you have a couple of options for that. If it is truly an immutable remotely attestable machine, then you could generate keys on first boot, load them into the TPM and PCR lock them, then export the keys via a shamirs-secret-sharing split, each share encrypted to a different maintainer 2024-11-02 13:50:08 so when you bring online a new build machine, a quorum of maintainers must submit their shares to the machine to reconstitute the key 2024-11-02 13:50:11 but no single party controls it 2024-11-02 13:50:38 this is how an OS I desgined, quorumos works, and keyfork, an open source project by my org, Distrust. 2024-11-02 13:51:33 if the OS of the build machine is reproducible, then any maintainer could locally build the same machine image, and verify the hash of the PCR that the TPM is certifying, matches the hash you get locally 2024-11-02 13:51:49 thus all maintainers can prove the machine is running the image they expect and that it has no means to exfiltrate the key 2024-11-02 13:52:08 thus you have a system that can only be controlled by a voting quorum, vs a single person. 2024-11-02 13:53:03 Though in stagex we opted not to do this, and instead have a 1/1 pairing of build machine and signing key, and just require a minimum number of build machines (controlled by different people) reproduce and sign the packages 2024-11-02 13:53:19 I think that that scales better 2024-11-02 13:53:20 but we only get away with that because we are 100% reproducible and full source bootstrapped 2024-11-02 13:53:30 lrvick: how do you bootstrap gcc? 2024-11-02 13:53:42 and rust 2024-11-02 13:53:45 from 256 bytes of x86 assembly 2024-11-02 13:53:51 all the way up 2024-11-02 13:53:58 Probably takes a lot of time 2024-11-02 13:54:14 about 2 days to bootstrap everything from source 2024-11-02 13:54:24 but once 2-3 people have reproduced the bootstrap packages 2024-11-02 13:54:29 we do not have to touch them or revisit them often 2024-11-02 13:54:47 We bootstrap each release (every 6 months) 2024-11-02 13:55:28 lrvick: how many arches are you building for 2024-11-02 13:55:30 ? 2024-11-02 13:55:30 I didn't realize alpine had full source bootstrapping? 2024-11-02 13:55:36 not full source 2024-11-02 13:56:12 right now only x86_64, though once we get our new ReprOS build automation system underway, we plan to add arm64 and riscv next. 2024-11-02 13:56:28 but because of paralell builds, we don't expect this to slow us down 2024-11-02 13:56:32 The problem is I don't see that approach scaling if you have to redo that for a lot of arches 2024-11-02 13:57:06 the bootstap path for various arches already exists thanks to the Gnu Mes, Stage0, and live-bootstap projects 2024-11-02 13:57:15 we just containerize their bootstrapping work for each arch 2024-11-02 13:58:11 stage0-1 can stay x86 even, but stage2 is where we pivot to x86 -> x86_64 cross compiler to bootstrap the rest of the distro 2024-11-02 13:58:25 but we can pivot to making that a multiarch image at that point with a cross compiler for each arch 2024-11-02 13:58:30 should be no problem. just more wall time 2024-11-02 13:59:16 Also, nothing stopping alpine from using our stage0-2 images, they are distro agnostic. Our ReprOS and AirgapOS images are also distro agnostic. 2024-11-02 13:59:30 you could bootstrap alpine with stagex if you wanted 2024-11-02 14:00:27 or copy our approach. We copy plenty of stuff from alpine so no shame there :) 2024-11-02 14:02:01 but imo, without reproducible builds bootstrapping does not really solve any trust problems 2024-11-02 14:02:26 and it seems with your number of packages and arches, getting to 100% reproducibility as a retrofit woudl be a massive effort 2024-11-02 14:02:33 yes, it would 2024-11-02 14:03:51 We could start with main just to make it tracktable 2024-11-02 14:04:00 I would then circle back and suggest that the biggest value thing you could do is sign commits, sign reviews, and do quorum administration of the build machines and build keys so no single human can tamper with them, and make those remote attestion proofs public. 2024-11-02 14:04:17 that is something that could be done as a standalone project in a vacuum 2024-11-02 14:04:21 in much shorter time 2024-11-02 14:04:33 then can start the long tail of reproducibiltiy 2024-11-02 14:04:51 and then others can use the same image as the builders to reproduce alpine. more the better 2024-11-02 14:05:55 One thing we certainly want to do is separate the signing keys from the builders 2024-11-02 14:06:27 what is the threat model there? 2024-11-02 14:07:55 Not all HW has TPM 2024-11-02 14:08:59 There is absolutely no path to removing single human points of trust without either remote attestation, or reproducibility. You have to pick one, ideally both 2024-11-02 14:09:05 but that order is probably the most within reach 2024-11-02 14:09:27 -most- hardware has TPM2 in it thesedays 2024-11-02 14:09:45 as Windows requires it now, which was a fun forcing function 2024-11-02 14:10:39 But even if the hardware does not have a TPM, but has a USB port, you could get away with using a Nitrokey etc and people physically provisioning the machine in person into a tamper evidient storage 2024-11-02 14:11:20 but having deployed servers in bank vaults with multi-party physical controls a few times... I promise a TPM is a much cheaper option and much easier to prove the integrity of at a distance. 2024-11-02 14:12:26 most server motherboards have TPMs, though most baremetal server providers like hetzner disable them by default 2024-11-02 14:12:37 but you can order a crash cart, get bios access, and turn it back on in many cases 2024-11-02 14:13:01 We use donated HW. And not all archictectures provide TPM 2024-11-02 14:14:17 You could emulate or cross compile in those cases, or simply start by providing the high integrity path for the architectures most widely used in high risk environments: x86_64/arm64 2024-11-02 14:17:12 The number one thing I would put on a risk register for you guys would be the fact that someone could threaten a single person on your team to tamper with a rust binary, and tamper with the firmware and binaries that gate access to billions of dollars. Now, you could say it is insane that alpine is used for use cases like this, and it is, but it is also sadly a reality. There is 2024-11-02 14:17:14 a -massive- target on alpine, and a lot of major supply chain attacks recently, some of them involving coercion. 2024-11-02 14:17:20 do it to protect yourselves personally, if for no other reason. 2024-11-02 14:18:56 I for one would be happy to help unblock this if I can. If keyfork or repros or bootproof can be useful to you guys, great. Or happy to discuss design decisions and see what you come up with independently. 2024-11-02 14:20:23 Feel free to add some comments to https://gitlab.alpinelinux.org/alpine/tsc/-/issues/82 2024-11-02 14:21:55 https://docs.distrust.co/qkm/ may be useful. This is how we do ceremonies (with 100% reproducible OS images verified by the whole team) to generate critical signing/encryption keys ensuring no single person an ever acess them, but also ensuring we have offline ways to backup and recover. 2024-11-02 14:22:43 then we can collaborate to load these keys onto airgap laptops we purchase and provision with witnesses locally, or remote enclaves we all verify remotely 2024-11-02 14:23:16 but then we have reasonably proof no single human can tamper with or extract the keys, or tamper with the software that controls the keys 2024-11-02 14:23:50 these tactics should be very general purpose and apply to a broad set of use cases. Feel free to rip them off, use them as-is, or use them for reference for your own designs 2024-11-02 14:24:05 but would like to see more distros applying these sorts of tactics if possible 2024-11-02 14:25:31 will take a look at that issue. Indeed I have comments I ant to make already :) 2024-11-02 14:27:33 Note that as a project, we don't have any capital. Any purchose must by covered by individual members, which limits our options 2024-11-02 14:30:07 But I'm certainly interested in improving our posture 2024-11-02 14:38:16 As a reference our tactic for getting most of our capital was pointing to companies that build mission critical software, that their supply chain has single points of failure in single computers or humans, and that if they pay us, we could dramatically reduce that risk. That resulted in stagex being funded from 3 orgs from day one, including paying for reproduction machines 2024-11-02 14:38:18 hosted/donated by several different individuals/orgs. 2024-11-02 14:38:20 is there a rough sketch diagram flow how signing is done ? 2024-11-02 14:38:34 When no one wants to trust each other by design, then we all have to bring our own hardware and pay for it 2024-11-02 14:38:37 or have our employers do it 2024-11-02 14:39:11 asking me? 2024-11-02 14:39:39 it could be added to issues/82 2024-11-02 14:41:51 We only get away with our tactics because we are reproducible, which dramatically simplifies things. One person makes a release PR with every package they generated on their own hardware, and the digests they got for every package in the tree. A second maintiner builds/bootstraps from 0 and gets the same set of digests for every container, and adds a second set of signatures. 2024-11-02 14:42:26 we try to have 3+ though 2 is always a hard minimum 2024-11-02 14:42:40 so we never had a single human trusted at any point from the first release 2024-11-02 14:43:17 but for alpine a retrofit tactic is required, so in that instance something like keyfork is probably a major accelerator. 2024-11-02 14:43:54 keyfork can generate a key, split it into m-of-n shares, and encrypt each share to a different yubikey or nitrokey, which can be distributed to each administrator. 2024-11-02 14:44:29 then any time you generate a new signing key or something on an immutable machine, you can have the generation routine encrypt a copy to that split key before it loads it into a TPM 2024-11-02 14:44:34 so you have a disaster recovery story 2024-11-02 14:44:57 then any M members of the admin team could come together to restore the same key to a new TPM as needed to bring online a new build machine 2024-11-02 14:45:21 while having strong evidence no single admin has ever had plaintext access to the keys 2024-11-02 14:45:48 for this scheme to work, you don't need the whole distro to be reproducible 2024-11-02 14:45:51 I assume this must run on the builder? 2024-11-02 14:45:59 To have access to the TPM chip 2024-11-02 14:46:00 but you -do- need the OS image that runs the builder to be reproducible 2024-11-02 14:46:08 yes ideally 2024-11-02 14:46:37 And the yubikeys? 2024-11-02 14:46:41 or nitrokeys 2024-11-02 14:46:56 each member of the admin team would provision those in advance 2024-11-02 14:47:03 and contribute their public keys to the ceremony machine 2024-11-02 14:47:16 ceremony machine boots up, generates quorum key, and encrypts shares to each admin public key it was born with 2024-11-02 14:47:41 so each admin only controls one share via the nitrokey they set up themselves 2024-11-02 14:48:35 total hardware cost for the ceremony could be a $150 laptop purchased at a retail store with witnesses, or running a TPM capable cloud machine remote for a few minutes. + cost of nitrokeys/yubikeys 2024-11-02 14:48:40 can be very very cheap 2024-11-02 14:49:32 doing it on the TPM capable cloud machine would require you implement a tpm2 remote attestation, and have a reproducible OS image on that machine, but stagex has you covered there if you wanted. 2024-11-02 14:50:03 though bootproof, the remote attestation story, is still early. Though we do ship tpm2 tools so yu cuold get away with a shell script calling those + keyfork if you wanted 2024-11-02 14:50:36 QuorumOS would make this much easier but that is not open source yet (soon, putting pressure where needed ;) 2024-11-02 14:51:43 lrvick: say I have a baremetal machine, no cloud provider. How do you attest that it's running a specific image? 2024-11-02 14:52:19 That is tricky, but solvable 2024-11-02 14:52:27 you need to confirm the root of trust with other people somehow 2024-11-02 14:52:33 the TPM2 endorsement key 2024-11-02 14:52:36 Because that's 99% the case for us 2024-11-02 14:52:52 maybe multiple people visit that machine in person or confirm the endorsement key of that TPM out of band and pgp sign it 2024-11-02 14:53:01 but you will need a one time trust bootstrapping with multiple people for baremetal 2024-11-02 14:53:06 That's also challenging 2024-11-02 14:53:15 Physically visiting the HW 2024-11-02 14:53:56 with a machine in a datacenter none of you have access to, you could each visit an admin panel for the machine remotely and confirm the EK yourselves 2024-11-02 14:54:10 or you all independently verify the EK with the hardware seller or provisioner 2024-11-02 14:54:18 but you need some method to confirm that EK 2024-11-02 14:54:42 with cloud providers, they all have endorsement key APIs now, so it is actually much easier with cloud 2024-11-02 14:54:46 But you do see the challenge 2024-11-02 14:54:50 It's not trivial 2024-11-02 14:54:50 since they own all the hardware and know what hardware they own 2024-11-02 14:55:30 its trivial with cloud, but with baremetal hosted physically by people this is really suboptimal without reproducible builds 2024-11-02 14:56:14 without reproducible builds you are forced to trust a single system somewhere. It is easiest to form trust if no admin has physical access to that system, and it is hosted by a neutral third party 2024-11-02 14:56:17 say hetzner, etc 2024-11-02 14:56:21 Yes, our build HW is not provided by cloud providers. We used to have ARM servers hosted ad a baremetal provider, but that arrangement has ended and now we are hosting it soemwhere at a sponsored location 2024-11-02 14:56:50 can you get a neutral third party, say a datacenter tech, to confirm the EK out of band to multiple people? 2024-11-02 14:56:51 For x86_64, it's easy to get resources from could providers, for aarch64 doable, but other arches are nearly impossible 2024-11-02 14:57:23 No cloud provider provides s390x, ppc64le, loongarch64, riscv64 2024-11-02 14:57:46 but zooming out to your actual problem 2024-11-02 14:57:52 if you sacrificed a bit of performance for security 2024-11-02 14:57:58 you could do builds of those in qemu 2024-11-02 14:58:23 We prefer native hw as much as possible 2024-11-02 14:58:41 not just for performance 2024-11-02 14:59:58 threat modeling is a series of tradeoffs. What security win does running on native hardware give you that outweighs removing single human points of failure? 2024-11-02 15:02:43 even if there is a compelling argument there, which I am doubtful of, that forces you to have no remote attestation solution those architectures, 99.999% of your risk comes from real world high risk deploymentts of alpine in public and private infrastructure, which use overwhelmingly x86_64, and sometimes aarch64. 2024-11-02 15:03:14 so again even if you only had high accountability deployments for just those two, that is a very very worthwhile effort 2024-11-02 15:04:33 then you can decide if you want to deal with the rest via reproducibile builds over time, or emulation 2024-11-02 15:08:32 I haven't found anything, but just to be sure: does alpine take monetary donations? 2024-11-02 15:09:47 witcher: We do not have an entity that can take donations. Individual members may take donations 2024-11-02 15:10:13 ikke: is there by any chance a list of who takes donations? 2024-11-02 15:10:15 I would note that TPM2 is not the only hardware mechanizim available to you for remote attestation. PPC64 and others have tamper evidient secure boot hardware available that can be used to unlock keys in a nitrokey or similar 2024-11-02 15:10:50 or some hardware can let you burn a hash of a key into a fuse array, and that hardware will refuse to use anything not signed by that key, etc 2024-11-02 15:10:55 i roughly know who works on alpine but i'm sure there are people i'm unaware of 2024-11-02 15:11:10 then you can have any remote attestation logic you want in your boot rom using coreboot or similar 2024-11-02 15:11:35 anyway, if there is any arch you struggle with after x86_64 an aarch64 and really need baremetal, I can possibly help 2024-11-02 15:12:49 afk for a while 2024-11-02 15:14:14 qemu build performance is garbage and saying you sacrifice "a bit of it" is being disconnected from reality 2024-11-02 15:15:20 it has tons of other drawbacks too such as not being able to reliably run tests for things 2024-11-02 15:16:30 i actually maintain a distro that does build one architecture in qemu (riscv64) and it really sucks to deal with it and i'm looking forward to when I can put it on baremetal 2024-11-02 15:18:20 ikke: is there currently a way for people to volunteer to help maintain the various bits of infrastructure that Alpine uses? I assume that's probably something the TSC would promote someone for and then vote on, but I'm not aware of the process outside of what is done for promoting maintainers to developer access. Does something like this exist already? 2024-11-02 15:25:25 clandmeter is lead of the infra team] 2024-11-02 15:25:46 We don't have a pre-defined workflow for that 2024-11-02 15:26:27 Ah gotcha. So it's more of an as needed by appointment directly from clandmeter then. That makes sense. 2024-11-02 15:26:51 We could use help, but it also takes time 2024-11-02 15:31:33 q66: even if the performance is half, it would still be worth it to wait a few extra hours for a build, than to blindly trust a build has not been tampered with. 2024-11-02 15:32:39 I would be very interested in helping if I can, and if that offer is of interest/use to the team. Happy to discuss further! 2024-11-02 15:32:50 durrendal: feel free to discuss in #alpine-infra 2024-11-02 15:36:11 lrvick: so as i said, disconnected from reality 2024-11-02 15:36:35 not only it is far less than that while burning the full power of a beefy x86 box, it also has the other drawbacks 2024-11-02 15:37:10 sure love waiting 2 days for kernels to build when they update basically weekly 2024-11-02 15:39:59 not only is emulation not worth it and introduces random bugs into the result while preventing tests from being run as at least a basic correctness check, they are also environmentally irresponsible, on top of being annoying to wait for 2024-11-02 15:40:21 no amount of security clownery will outweigh that 2024-11-02 15:45:38 I updated this morning (latest-stable) and the `netmount` service now causes a kernel panic. Specifically it seems to be the CIFS module: https://tpaste.us/oxaR (see 13.232497 ). Changing to linux-virt or linux-lts in edge or v3.19 did not help, but linux-lts@v3.18 works for now, although I would prefer a more recent kernel. 2024-11-02 15:50:07 q66: Well, to be clear, I would only be suggesting doing what it takes for release builds, and only on architectures where it counts the most initially. 2024-11-02 15:50:30 but also, there are many different forms of hardware remote attestion, other than TPMs 2024-11-02 15:50:44 emulation would be a last resort 2024-11-02 15:51:16 I think focusing on reproducable builds would make individual servers less important 2024-11-02 15:51:16 I am just saying if I -must- choose abysmal build performance, and having to sale up to compensate, or having builds I can trust 2024-11-02 15:51:20 the latter is more important 2024-11-02 15:51:54 I am currently running full source bootstraps of rust on 2 systems to make sure it reproduces as 1.82. Yes, its hard 2024-11-02 15:52:03 but for high risk applications there is no alternative 2024-11-02 15:52:09 and it takes 2 days every time 2024-11-02 15:52:38 when you are doing reproducible builds, take anything you are doing and triple it. Security is expensive. 2024-11-02 15:52:47 I agree that is reality. 2024-11-02 15:53:35 well enjoy 2024-11-02 15:53:40 if alpine was reproducible, then you don't have to trust any one server. They could each have their own keys, and all is well. This is what we do on stagex 2024-11-02 15:53:53 however without reproducibility you don't have many options other than remote attestation 2024-11-02 15:53:59 both options are expensive, you have to pick a poison 2024-11-02 15:54:22 doing nothing is going to create more problems that slow builds though, I am sure of that. 2024-11-02 15:55:02 fwiw decoupling signing from the builder is useless from security perspective because regardless you gotta trust the output of the builder, if it's tampered with you won't be able to tell and you will just get tampered-with packages that were signed without leaking the private key 2024-11-02 15:55:13 which has no security benefit whatsoever, it's worse if anything 2024-11-02 15:55:29 We are musl based and 100% reproducible, so I don't imagine alpine is that far off if CI blocked all new updates that were not reproducible as a fourcing function 2024-11-02 15:55:43 because at least if you know your builder is compromised and therefore the key is too, you can revoke the key and invalidate everything 2024-11-02 15:56:18 q66: on this we totally agree. I think you might as well keep the key on the build node. 2024-11-02 15:56:32 whatever is trusted enough to compile might as well be trusted to sign 2024-11-02 15:56:49 yes i thought about whether I should do this in my case and came to the conclusion that there is no way to separate the key and gain anything from it 2024-11-02 15:56:57 though a non-extractable key and an immutible build system that can't be changed after deployment should be the first two steps imo 2024-11-02 15:57:08 those alone give you a massive reduction in attack surface 2024-11-02 15:57:31 q66: what you gain from it is that it's harder to compromise the key when you lack some sort of hardware enclave 2024-11-02 15:57:31 if you can't put a key in a TPM, put it on a nitrokey and plug it into a usb drive 2024-11-02 15:57:35 non extractable keys are cheap 2024-11-02 15:57:47 usb port* 2024-11-02 15:58:23 the goal should not be preventing key extraction though. That by itself is not that useful 2024-11-02 15:58:31 the goal should be preventing the key from signing something malicious 2024-11-02 15:59:06 If the key is extracted, nothing prevents actors from signing malicious things 2024-11-02 15:59:39 it is of non zero value, however if anyone can ask the key to sign anything blindly 2024-11-02 15:59:44 then you are not in that much different of a situation 2024-11-02 15:59:48 You are 2024-11-02 15:59:51 lot of effort for very very little reduction in attack surface 2024-11-02 16:00:18 You can ditch the server, remove the compromised packages, and continue 2024-11-02 16:00:30 If you need to revoke the key, everyone is impacted 2024-11-02 16:00:37 but the damage is already done. The world is already compromised. 2024-11-02 16:00:42 bigger problems thatn key revocation at that point 2024-11-02 16:02:29 let me put it in a concrete situation so we stay grounded. Companies like coinbase build everything with Alpine. Billions and billions of dollars are trusted to binaries built with alpine from just that one company. There are hundreds more examples. 2024-11-02 16:02:48 if a single malicious binary is singed by an alpine build server even once 2024-11-02 16:03:16 it could cause an exfiltration of insane amounts of value to some pretty bad actors to fund war machines. 2024-11-02 16:03:52 With key extraction, they could do it without us even having a clue 2024-11-02 16:04:08 without key extraction, they could still do it without you having a clue. 2024-11-02 16:04:12 Remote signing includes auditing 2024-11-02 16:04:40 let me be clear, I agree solving for non-extractable keys is then right first step 2024-11-02 16:04:48 I just think that is like a 5% solution 2024-11-02 16:04:52 i'll always approve of coinbase getting screwed over so you just gave me a good argument to keep things as they are :P 2024-11-02 16:06:07 q66: I hate most of these companies, and I don't care if they get ripped of. I do care that the people ripping them off are using them to fund dictators. 2024-11-02 16:06:30 lots of money being stolen by dangerous people is bad for everyone, even if we dont' like the people being stolen from 2024-11-02 16:09:58 I once audited a crypto firm that had a billion dollars in doge sitting on a server the whole team had access to. Honor system. Now we can say, doge is stupid, I agree. But you can trade it for real money, which means it is dangerous and worth protecting (or deleting). 2024-11-02 16:11:01 Anyway point is, IMO, maintaining software the world depends on is a big responsibility. You can't just think about your own use cases. 2024-11-02 16:12:28 Now if you want to say boldly "we are just a hobby distro, we don't have the funding to take security seriously" you should do that if it is true. But if it is not true, then there is some real responsibility to seek out funding if required, and do it right. 2024-11-02 16:13:51 idk about alpine but i literally don't care about the needs and wants of some stupid scam corporate 2024-11-02 16:14:02 i won't take their money, i want to have 0 to do with them 2024-11-02 16:14:36 all i care about is my community 2024-11-02 16:14:38 But you do realize public infrastructure, governments, hospitals... all anchor their security to alpine 2024-11-02 16:15:21 now again, I think that was irresponsible of all those decision makers to not verify a distro like alpine has no human or system single points of failure before electing it into those positions 2024-11-02 16:15:26 but they did, and here we are 2024-11-02 16:16:03 I think the choice is convince all those parties to stop using Alpine, loudly, or close the risks. 2024-11-02 16:16:11 I am very happy to help support either path. 2024-11-02 16:57:45 Irvick: I do agree that security should be taken seriously. Yet, if you know what happens within cloud providers infra... 2024-11-02 16:59:29 Alpine as it is right now is the last thing to worry about. 2024-11-02 17:05:47 Most of my client are running immutable appliance-like production infrastructure already. 2024-11-02 17:06:02 trusted and reproducible binaries are the next layer down 2024-11-02 17:09:19 That's great if you have your own infra. If you don't then it's like building a house from roof to bottom. 2024-11-02 17:13:38 Hello, are packages in repositories statically link to musl ? or dynamically ? I'm wondering in what condition can the LD_PRELOAD be used for switching allocator. Also if LD_PRELOAD would work with gcompat dependent software 2024-11-02 17:14:13 SyntheticBird[m]: In Alpine Linux, packages are built dynamically 2024-11-02 17:14:25 at least, c(++) based ones 2024-11-02 17:17:01 I see thanks. 2024-11-02 17:43:23 lrvick: "We are musl based and 100% reproducible", which distro is it ? 2024-11-02 17:56:57 https://codeberg.org/stagex/stagex 2024-11-02 17:58:03 Blog post written about us recently: https://quorum.tkhq.xyz/posts/reproducible-builds-made-easy-introducing-stagex/ 2024-11-02 17:58:19 Though per the discussion above I think the comments about alpine are probably not quite accurate and need adjustment 2024-11-02 18:00:44 SyntheticBird i think LD_PRELOAD will work anyways, no matter if it's dynamic or static 2024-11-02 18:02:45 comparsion could include void 2024-11-02 18:03:50 it could include 1000 other distros, but I think the goal was just to cover the ones typically on the short list for container/build/release use cases which is the topic at hand here. 2024-11-02 18:04:06 stagex in particular has no package manager, and no ambition of being a desktop linux distribution 2024-11-02 18:04:23 its goal is just to make reasonably secure reproducible builds easy. 2024-11-02 18:04:53 to not take us too far off topic though, probably best to direct most stagex questions to #stagex :) 2024-11-02 18:05:11 (sorry alpine devs, he asked!) 2024-11-02 18:05:41 no worry 2024-11-02 18:05:54 ok, nice to read 2024-11-02 18:11:00 btw our musl patch to mrustc covered in that post should cover alpine as well, if you want to fully build rust from source 2024-11-02 18:11:34 Though, I warn you, it takes about a day on 32 threadripper cores 2024-11-02 18:11:59 though mrustc 1.72 is very close which should cut this down to a few hours 2024-11-02 18:12:28 oh, not trying to discredit the/your work, just trying to get more info on reproducible builds 2024-11-02 18:13:09 Didn't think you were. Was just trying to avoid hijacking the channel to shill my own solution ^_^ 2024-11-02 18:16:20 its linux channel and "reproducible builds" is common to al too 2024-11-02 21:40:40 As there been any attempt or information about supporting enabling SELinux on Alpine ? I see their is a fairly updated version of libselinux and its utils in edge repository. I've also compiled my kernel with SELinux enabled. I know there is probably not a compatible policy for it but i'm wondering whats the state of things 2024-11-02 21:42:55 SyntheticBird[m]: afaik you need also to recompile userspace software to make it selinux-aware 2024-11-02 21:43:16 It takes a lot of work to get SELinux right 2024-11-02 21:46:36 seems like selinux is not something you can just enable or disable 2024-11-02 21:47:21 OOOOH right I forgot about userspace part 2024-11-02 21:47:34 I thought it was just a systemd thing 2024-11-02 21:47:46 selinux has nothing to do with selinux 2024-11-02 21:47:54 ? 2024-11-02 21:47:54 systemd has* 2024-11-02 21:47:58 ah 2024-11-02 21:48:21 I just remember that Arch linux required SELinux recompilation of base 2024-11-02 21:48:34 and it was all systemd packages recompiled with selinux flag 2024-11-02 22:08:37 I don't see what software would need selinux aware recompilation 2024-11-02 22:08:42 tbh 2024-11-02 22:08:50 ig that cost nothing to try 2024-11-02 22:10:45 selinux requires a lot of work 2024-11-02 22:11:04 it's not for nothing that the most common advise people give when running into selinux issues is to disable it 2024-11-02 22:11:40 Without proper care, applications stop working because they are denied access to things they need 2024-11-02 22:12:27 i worked on gentoo hardened back in the day, but i'm not sure what's changed since then. libselinux should be enough but gentoo afaik still asks people to use hardened. but yeah, the audience is limited. 2024-11-02 22:13:04 the main upside is limiting stuff that runs as root. 2024-11-02 22:14:18 even amongst sysadmins the # of people who really understand selinux well is, in my view, small 2024-11-02 22:53:16 ikke: yes I'm aware of the challenge and I really want to learn it. 2024-11-02 22:53:55 invoked: on some chat platform I meet a Fedora engineer and its bio was: *SELinux wiped my soul.* I think this is an accurate representation. 2024-11-02 22:55:37 it takes some work 2024-11-03 03:16:17 it really sucks that I had to register in order to access this channel. from my logs I can see it wasn't like this up to the 31st of the last month. what happened? spam? 2024-11-03 03:18:05 Alpine... "Enter ssh key or URL for foo changed by root" - does this want to populate authorized_keys for the user? 2024-11-03 03:20:44 So far the installer is pretty straightforward. Other than that one brief puzzlement it's pretty droolproof so far. 2024-11-03 03:21:49 Nice, that was amazingly quick, and it did indeed install my ssh public key from the URL I gave it. 2024-11-03 07:41:49 if i buy a 512G disk i cant fit 512G onto it, but if i created a +2G partition with fdisk, i can fit 2G onto it after formating it? 2024-11-03 08:58:51 Most likely not 2024-11-03 09:25:07 hmm there is some problem with st in repo, when pasting or navigating history, it seem to force longer than the screen lines to overlap upon itself so it stays on one like ... 2024-11-03 09:25:22 *line 2024-11-03 10:43:13 Hummm, there's no “history” in st 2024-11-03 12:39:47 quinq oh, its ash!? even just holding down a key till it it reaches the end of the screen, it starts overwriting the same line, instead of starting a new line... 2024-11-03 12:41:22 is a too large hd more durable since, iiuc, it can stop using bad sectors and still have plenty of space? 2024-11-03 12:41:44 I'm not sure what history you're talking about, if it's about command history, then yes that's $SHELL 2024-11-03 12:42:01 yeah same problem in xterm/ash 2024-11-03 12:42:14 hum 2024-11-03 12:42:49 damn, then i guess it will never be fixed ;/ 2024-11-03 12:43:28 if i open a termianl with ash and type untill i read EOL it starts overwriting the line instead of wrapping to a new line 2024-11-03 12:43:51 I think that things can be fixed most of the time :) 2024-11-03 12:44:04 busybox ash 2024-11-03 12:44:05 It just has to be annoying enough to motivate you ^^ 2024-11-03 12:44:16 Yeah, I can reproduce the issue 2024-11-03 12:44:38 i reported some bugs to busybox, and looked over the bugs there, lots of old old bugs 2024-11-03 12:45:06 its a new bug tho 2024-11-03 12:45:22 been using ash many years now with no/little problem 2024-11-03 12:47:05 Is that the first time in those many years you wrote a long command line? ^^ 2024-11-03 12:47:26 hehe, no, thats what im saying, its a new bug 2024-11-03 13:04:58 ohhh ok 2024-11-03 13:17:39 oksh/mksh seems nice, basic, mksh seem to have some more features, you just delete /bin/sh and make a new symlink? 2024-11-03 13:18:26 I'm using loksh 2024-11-03 13:18:31 But no, don't do that 2024-11-03 13:18:43 /bin/sh is the portable shell, called by scripts 2024-11-03 13:18:49 quinq whats loksh like? 2024-11-03 13:19:20 i also use /bin/sh as the default shell 2024-11-03 13:19:45 If you want to use an alternative shell, just set it in /etc/passwd 2024-11-03 13:20:24 (check its valid path in /etk/shells) 2024-11-03 13:20:29 s/etk/etc/ 2024-11-03 13:26:40 loksh seem very similar to oksh 2024-11-03 13:26:54 slightly smaller 2024-11-03 13:35:52 Sure, they're both ports of OpenBSD ksh, but Alpine provides loksh, worksforme 2024-11-03 14:07:28 alpine also has oksh 2024-11-03 14:12:19 theres also mrsh, which together with mrsh-libs is slightly smaller still.. 2024-11-03 14:40:24 mksh doesnt support 'sleep 1h', mrsh kills background processes when it itself is killed, i think i prefer oksh/loksh yeah 2024-11-03 14:51:14 sleep $((60*60)) 2024-11-03 14:51:36 hehe, yeah 2024-11-03 14:53:38 probably posix... i guess its not a big deal anyway.. 2024-11-03 14:54:48 oh mksh also kills background jobs when exiting.. 2024-11-03 15:54:02 frag: the busybox ash bug is not a bug in a alpine patch and not budybox itself. I have already created a MR to fix this: https://gitlab.alpinelinux.org/alpine/aports/-/merge_requests/74526 2024-11-03 15:54:31 *is a bug in an alpine patch and not busybox itself 2024-11-03 15:55:48 sertonix oh, great! 2024-11-03 15:56:17 frag: Also if you encounter issues in alpine linux prefer creating issues on the alpine linux bugtracker. Especially with busybox issues. 2024-11-03 15:58:28 why is that sertonix? is it this url? https://gitlab.alpinelinux.org/groups/alpine/-/issues 2024-11-03 15:59:21 is alpine dinit doable atm? 2024-11-03 15:59:56 iirc, someone is driving dinit on alpine 2024-11-03 16:00:02 @scorpion2185:matrix.org Yes but you probably want to write your own service files. 2024-11-03 16:00:26 no service in the repo? 2024-11-03 16:00:26 *need to 2024-11-03 16:00:59 does alpine some "bootstrap" option or do you need to remove openrc and add dinit? 2024-11-03 16:01:09 *does alpine have 2024-11-03 16:02:37 Why are those busybox patches not upstreamed instead? 2024-11-03 16:02:55 This would avoid this kind of issue 2024-11-03 16:03:18 s/avoid/limit/ 2024-11-03 16:04:40 kinda like how oksh/loksh stays doesnt wrap the commandline... 2024-11-03 16:04:49 frag: Alpine has some uncommon things which means developers sometimes have a hard time to reproduce an issue in a different environment. For busybox the reason is that reported issues aren't check that often. 2024-11-03 16:04:52 s/stays// 2024-11-03 16:05:30 sertonix indeed, thats nice 2024-11-03 16:09:50 quinq: I fixed an issue with tab completion and send the patch upstream. To fix the issue more quickly for everyone using alpine I added the patch to alpine. Otherwise the issue would stay until the next busybox release (which isn't often) 2024-11-03 16:10:18 But it hasn't been merged, has it? 2024-11-03 16:10:38 This isn't about waiting for release, but rather for having review 2024-11-03 16:10:58 Once the patch has been reviewed and deemed fine by authors, then you can apply it locally 2024-11-03 16:11:51 By that logic, alpine would be very broken constantly 2024-11-03 16:12:18 Yeah, like it is 2024-11-03 16:13:22 But less so 2024-11-03 16:13:31 Do you have metrics? 2024-11-03 16:13:38 Or just an opinion 2024-11-03 16:13:57 You can count amount of patches in aports 2024-11-03 16:14:47 That's not a good metrics 2024-11-03 16:15:05 As having patches isn't exclusive to either “logic” 2024-11-03 16:15:19 Maybe you misunderstood 2024-11-03 16:15:26 It's not about having to wait for upstream release 2024-11-03 16:15:42 It's about having patches validated from upstream 2024-11-03 16:15:49 As in discussion, review, test 2024-11-03 16:17:18 Is sending patches upstream not that? 2024-11-03 16:17:29 No, that's just sending 2024-11-03 16:17:51 I find it unfair that quite an amount of fixes in busybox comes from Alpine 2024-11-03 16:18:00 which is usually found, tested, fixed here 2024-11-03 16:18:12 and that's not considered "good enough" 2024-11-03 16:18:16 Yeah, busybox is… What it is ^^ 2024-11-03 16:22:47 @scorpion2185:matrix.org: There were service files packaged but no one maintained them so they were dropped again. When you want to try dinit I recomment keeping openrc installed so you can switch back to it. 2024-11-03 16:22:47 It is also possible to install alpine linux without installing openrc before but you probably can't use the setup-alpine scripts in that case. You can install alpine linux similar to the arch installation guide and then manually install all packages and files. I don't think I can provide a full guide for this but I can tell you that it is possible. 2024-11-03 16:28:52 how do you install manually like arch? there is no alpine-chroot and no basestrap equivalent afaik 2024-11-03 16:29:28 quinq: Downstream patches can exist for various reasons. Some are upstream dead, upstream slow, upstream using old dependencies TM, upstream doesn't care about alpine, new build toolchain breaks build, urgent/annoying issue and so on. As mentioned above it is worse to always wait for upstream. 2024-11-03 16:30:06 In which of those categories does busybox fall in? 2024-11-03 16:33:01 Upstream is slow probably 2024-11-03 16:34:25 Who decided this? 2024-11-03 16:34:36 That this patch couldn't wait 2024-11-03 16:34:44 Just curious 2024-11-03 16:35:34 busybox maintainers 2024-11-03 16:35:37 package 2024-11-03 16:35:43 which in this case is probably ncopa 2024-11-03 16:36:02 quinq: I proposed it and ncopa merged it. 2024-11-03 16:38:30 ok, thanks :) 2024-11-03 16:39:39 I suppose that for edge it's more something along “break things, fix fast” 2024-11-03 16:39:59 Then in time it makes it into a release 2024-11-03 16:40:07 And edge people test 2024-11-03 16:40:19 yes, that's literally what edge is for 2024-11-03 16:40:58 We try not to break it, but at the same time, things breaking from time to time should be expected 2024-11-03 16:41:27 Yeah 2024-11-03 17:18:39 quinq ^R for searching history and if you type in something that has no match, every char you type in produces a new line? is that another bug? in loksh 2024-11-03 17:19:28 frag, I wouldn't call that as a bug per se as there's no specification and your shell doesn't crash 2024-11-03 17:19:43 Maybe an annoyance at best ^^ 2024-11-03 17:21:38 hehe, its weird 2024-11-03 17:23:04 @scorpion2185:matrix.org: I put together some notes about installing alpine through a chroot. I probably forgot some things but it should get you started at least. 2024-11-03 17:23:04 https://paste.sr.ht/~sertonix/8bc2ba573118f4f63b62d71968e9b9a48ef34768 2024-11-03 17:24:23 frag, something else, that I would call a bag, is that with some filenames, it behaves differently in tab-completion 2024-11-03 17:25:50 Prepare for the spamming tide! 2024-11-03 17:26:48 quinq hmm, okok, i like the nowrap commanline but will probably revert back to ash when its ok again, nice with shared history too.. 2024-11-03 17:27:36 i see oksh ^r behaves the same 2024-11-03 17:27:58 It's the same shell 2024-11-03 17:28:03 Just built slightly differently 2024-11-03 17:40:35 indeed 2024-11-03 18:38:27 its nice that ^Y ++ works in ksh 2024-11-03 20:00:05 ash fixed in repo, thanks! 2024-11-03 20:06:04 Bonjour. 2024-11-03 20:08:10 if somebody registered via gitlab instead of diectly in https://gitlab.alpinelinux.org does that avoid the cloudfare and 2fa? 2024-11-03 20:08:18 can somebody move my account? 2024-11-03 20:11:52 Move it where ? 2024-11-03 20:12:52 when I log in i use gitlab account instead i'd like to sing in directly 2024-11-03 20:13:04 i manged to log in so i can delete may account 2024-11-03 20:13:43 What is your account? 2024-11-03 20:13:58 i just commented here https://gitlab.alpinelinux.org/alpine/aports/-/issues/14941#note_452285 2024-11-03 20:14:19 https://gitlab.alpinelinux.org/realroot 2024-11-03 20:14:35 could you move it? 2024-11-03 20:15:36 Can you DM me the e-mail address associated with the account? 2024-11-03 20:15:57 yes 2024-11-03 21:33:20 is anyone running neovide on x11? i'm trying to get it working, but so far it seems to get on input handling, though that may be wrong since it is just a guess. 2024-11-03 21:35:46 get *stuck on input handling 2024-11-03 21:49:48 might be neovide doen't work right with my window manager, bspwm. nvim is plenty good enough from terminal, so i guess this is a non-issue for me really. 2024-11-04 06:09:13 ikke: btw there are some cloud-ish things (some gratis, some paid) for some of the arches you mention as not having cloud https://wiki.debian.org/Hardware/Wanted#Other 2024-11-04 06:51:18 Scaleway even sells alpine based risc-v servers :) i see 2024-11-04 07:06:00 yeah alpine already uses scaleway runners for ci ig 2024-11-04 07:23:21 nice. I'm gonna look into risc-v next year, probably get me some boards 2024-11-04 08:29:29 hey :) Was wondering if there is a straightforward way to bake-in a command line to the standard linux-lts kernel that I installed from apk. 2024-11-04 08:34:04 I'm working on bootstrapping and installing large numbers of Alpine installs from systems that may not necessarily be the ones booting them. The post-install hooks for the grub-efi package are currently ruining my day (likely not an Alpine-specific problem), which is something I suspected might happen, so I was thinking the easiest way to have a kernel that boots the first time would just be to 2024-11-04 08:34:10 have a stubby kernel (like the linux-lts one in APK with EFISTUB) named bootx64.efi or whatever in my ESP with a hardcoded command-line 2024-11-04 08:36:38 My bootstrapper I'm building is written entirely in declarative gmake (fast and easier to debug than a shell script, cause no side-effects) ;) 2024-11-04 08:40:40 makefile is just a fancy shell script... 2024-11-04 08:41:46 yes, but each step in your target gets its own shell ;) 2024-11-04 08:41:53 very fancy indeed 2024-11-04 08:42:36 https://github.com/targetdisk/alpstrap 2024-11-04 08:42:46 I mean, you can do that in regular shell too 2024-11-04 08:42:57 it's just dumb to do it that way :P 2024-11-04 08:43:32 I need to be able to have something that boots on another system from my bootstrapper, and GRUB is pissing me off 2024-11-04 08:44:15 also some people absconded with gummiboot after already taking our udev... 2024-11-04 08:44:24 https://wiki.archlinux.org/title/EFI_boot_stub#Using_a_startup.nsh_script 2024-11-04 08:44:33 oh yeah 2024-11-04 08:44:39 forgot about thems 2024-11-04 08:45:23 dwfreed: this is exactly the sort of thing I'm looking for!! 2024-11-04 08:45:27 thank you 2024-11-04 08:46:11 always check the arch wiki 2024-11-04 08:46:40 I am using some of their tools in addition to the alpine tools in my script as well ;) 2024-11-04 08:47:07 their chroot helper and their fstab generator are coming in clutch for my little project 2024-11-04 08:48:53 I've read a little bit of the UEFI specification documents but totally forgot about these little scripts! 2024-11-04 08:51:58 yeah other than GRUB being itself the rest of writing my thingy has been pretty fun so far. May write a tool or some M4 shrek that makes the partitioning setup a little less rigid so friends of mine can use my stuff more better ;) 2024-11-04 08:54:09 dwfreed: probably going to credit you in a future commit message for reminding me that those EFI startup scripts were a thing 2024-11-04 10:04:33 quinq and others, why dont you use busybox ash? does anyone else use it? 2024-11-04 10:14:20 what web browsers are stable in repo now? qutebrowser/firefox/chromium? 2024-11-04 10:15:48 and ofc links-graphic <3 2024-11-04 10:16:22 frag, not comfy enough for me :) 2024-11-04 10:17:02 what makes a shell comfy? 2024-11-04 10:17:05 quinq what do you lack? 2024-11-04 10:17:14 frag, to be honest, not sure :D 2024-11-04 10:17:19 haha 2024-11-04 10:17:39 I have a set of tab-complete things in kshrc 2024-11-04 10:17:55 But that's not a very big thing 2024-11-04 10:19:51 ash works well without config imo (although i do have some conf in .profile) 2024-11-04 10:21:38 frag: have a look at librewolf. Hopefully in 3.21 stable 2024-11-04 10:22:17 oh i didnt mean as in stable release, i just meant stable to use/workable 2024-11-04 10:22:36 but will test it out! 2024-11-04 10:22:58 I'm a fish enjoyer 2024-11-04 10:29:46 zcrayfish: yea I did, what should `uname -r` be returning right now on latest stable alpine? Mine says 6.6.58-0-lts, I thought it would be 6.6.58-1-lts? 2024-11-04 10:31:13 also `apk info linux-lts` returns `linux-lts-6.6.58-r0`, I thought it should be `linux-lts-6.6.58-r1` 2024-11-04 10:39:59 orchardstreet22: it should be 6.6.59-r0 as of two days ago (commit e3be418f) 2024-11-04 11:56:26 mebious: `cat /etc/os-release` returns `VERSION_ID=3.20.3`. I upgraded system muiltiple times since then with `doas apk update && doas apk upgrade`. Do you know why I might be on an incorrect kernel version? 2024-11-04 11:58:58 wait, upgrading just now turned it to 6.6.59-r0. I think I might be fine 2024-11-04 11:59:12 this was a convo about an issue I had a week ago, ignore this I guess 2024-11-04 11:59:48 that's fine, good to see that it was resolved :) 2024-11-04 12:00:25 i thought for sure I updated yesterday though, maybe I didn't 2024-11-04 12:52:16 i pushed 6.6.59 today 2024-11-04 12:55:06 ncopa, I found the page that shows when apport commits are made, is there a page that shows when pushes are made? 2024-11-04 12:55:11 thx 2024-11-04 12:58:34 not natanael but you can find them here: https://gitlab.alpinelinux.org/alpine/aports/-/merge_requests 2024-11-04 17:40:33 I am trying to build v4l2loopback, which says it needs the "kernel headers" to build (https://github.com/umlaeute/v4l2loopback#DEPENDENCIES). I have the package `linux-headers` installed, but the build still fails. Is there something else I need to build a kernel module? 2024-11-04 17:40:47 I am getting this error at build time: `make[1]: *** /lib/modules/6.6.58-0-lts/build: No such file or directory. Stop.` 2024-11-04 17:41:16 (which is correct: /lib/modules/6.6.58-0-lts/ does exist, but there is no `build/` inside) 2024-11-04 17:44:18 And while I'm here, I don't understand the purpose of the Alpine package "v4l2loopback-src". Is it made just to download the sources? Isn't that unusual? 2024-11-04 18:27:48 is there a package that provides libpkcs11-helper.so.1? I have openssl installed but still seems some items are missing 2024-11-04 18:28:19 Apparently not: https://pkgs.alpinelinux.org/contents?file=libpkcs11-helper.so*&path=&name=&branch=edge&repo=&arch= 2024-11-04 18:28:31 for ops that depend on pkcs11 I get these: "pkcs11h_certificate_create: symbol not found" but I can't seem to find where this is provided 2024-11-04 18:28:36 ikke: yea, I tried that too :( 2024-11-04 18:28:53 I'll keep digging around 2024-11-04 18:28:55 thanks! 2024-11-04 19:05:27 ended up building and installing the library manually. Seems to have resolved the issues 2024-11-04 21:01:12 "doas: a tty is required" 2024-11-04 21:01:12 Hi! Running ansible from a Gentoo to configure an alpine with privilege escalation using doas fails for me: 2024-11-04 21:01:12 Search for this string I found only old ansible bug reports on github.com so far. Any ideas how I can fix this? 2024-11-04 21:04:47 How are you planning to authenticate? 2024-11-04 21:09:46 ikke: with ansible-playbook -K , so with "become" and "become_method" doas plus password 2024-11-04 21:10:44 doas expects a tty to ask for a password, but apparently ansible does not provide one. I'm not too familiar with Ansible, so not sure how it's supposed to work 2024-11-04 21:11:58 sudo should work 2024-11-04 21:12:12 (without a tty, but i can't remember what the defaults are) 2024-11-04 21:12:26 any issues with sudo on alpine that I should be aware of? 2024-11-04 21:12:41 invoked: was about to ask for sudo the moment I received your message ;) 2024-11-04 21:13:22 doas is simpler and thought to be more secure, is all 2024-11-04 21:13:32 OK 2024-11-04 21:13:36 sudo definitely supports more use cases. 2024-11-04 21:14:24 probably - I've got no problem with sudo at all, using it on every other distro :) 2024-11-04 21:15:20 We moved it to community so that we do not have to support it for 2 years 2024-11-04 21:15:35 But it means it's only supported on the latest stable release 2024-11-04 21:16:45 hm 2024-11-04 21:17:02 but aynways, if doas does not work for me I've not really a choice 2024-11-04 21:17:15 thanks for the input! 2024-11-04 21:17:24 good luck :) 2024-11-04 21:19:58 invoked: thanks, works now ;) 2024-11-04 22:38:40 Has anyone started working on porting alpine linux to the new x elite laptops? 2024-11-04 22:41:24 Does it not work already? 2024-11-04 22:46:45 wizzard: pmos did a lot in that direction 2024-11-04 22:47:08 #aarch64-laptops are also other x elite enjoyer 2024-11-04 22:47:48 Would have thought the gpu would be the only possible holdup there, but I've only given it a glance really. 2024-11-04 22:50:24 At least these (https://github.com/anonymix007/x1e-alarm) packages are missing, as well as the device tree stuff. 2024-11-04 22:50:24 I wish I had more time to get my hands dirty and do the port. 2024-11-04 22:50:24 @fossdd thanks for the tip. I will reach out to the pmos people 2024-11-04 22:50:24 I was not able to boot the alpine installer on a x elite chip. 2024-11-04 22:55:59 Qualcomm says it should work out of the box 2024-11-04 22:56:16 qualcomm also says they have a license for making consumer ARM chips 2024-11-04 22:58:02 Heh fair enough 2024-11-04 23:00:22 I do like their official image bit in their linux compat boast. We have a debian image here... that works on the reference SoCs... and some of the firmware is still binary blobs. 2024-11-04 23:00:26 How very TI of them. 2024-11-04 23:10:53 qualcomm is like a cartoon villain 2024-11-05 07:40:22 Maybe this is the correct one. 2024-11-05 07:40:22 I'm having trouble installing Alpine Linux if anyone is willing to help 2024-11-05 07:40:58 * Maybe this is the correct one. 2024-11-05 07:40:58 . 2024-11-05 07:40:58 I'm having trouble installing Alpine Linux if anyone is willing to help 2024-11-05 07:43:01 what are you having trouble with? 2024-11-05 07:43:12 Wifi 2024-11-05 07:43:20 can you be more specific? 2024-11-05 07:43:40 My device came with an rtl8811cu (or so it is called for my knowledge) and it isn't recognized as a wifi device (it's a USB chip) 2024-11-05 07:44:19 It's recognized for what I know as... (full message at ) 2024-11-05 07:48:03 I'm not capable of using Ethernet for multiple reasons at this time, and require wifi. If I can't do anything I'll simply have to remain with Arch Linux instead since I'm out of options 2024-11-05 07:50:33 @mebious 2024-11-05 07:50:33 . 2024-11-05 07:50:33 * I'm not capable of using Ethernet for multiple reasons at this time, and require wifi. If I can't do anything I'll simply have to remain with Arch Linux instead since I'm out of options 2024-11-05 07:51:30 You'll need to allow me time to reboot into the installer if you do provide other information on this, I have other things I simply must be doing at this time. Thanks either way though 2024-11-05 08:09:19 > You'll need to allow me time to reboot into the installer if you do provide other information on this, I have other things I simply must be doing at this time. Thanks either way though 2024-11-05 08:09:19 If you need internet to download the drivers for wifi, you can connect your Android or iPhone and share Internet over USB. 2024-11-05 08:09:46 Are you sure that's functional by default? 2024-11-05 08:09:54 A lot of the time it's not 2024-11-05 08:14:59 Has always worked for me. 2024-11-05 08:15:15 Alright, I'll be sure to try that. Thanks 2024-11-05 08:17:01 DaeDae[m]: rtl8811cu isn't officially supported in the linux kernel and arch linux uses out-of-kernel modules for it from what i'm seeing 2024-11-05 08:17:11 https://github.com/fastoe/RTL8811CU 2024-11-05 08:17:11 If setup-alpine does not work, due to no internet you could copy this over via a second USB stick to manually install the drivers: 2024-11-05 08:17:56 That's for Ubuntu 2024-11-05 08:17:56 As well as it is or at least was supported first at 5.12 and had gone up as far as 6.11. I'm unaware of its status afterwords though 2024-11-05 08:18:07 . 2024-11-05 08:18:07 * That's for Ubuntu 2024-11-05 08:18:07 As well as it is or at least was supported first at 5.12 and had gone up as far as 6.11. I'm unaware of its status afterwords though 2024-11-05 08:18:31 AUR packages rtw88-dkms-git uses https://github.com/lwfinger/rtw88 and rtl8821cu-git points to https://github.com/morrownr/8821cu for its sources 2024-11-05 08:18:31 Even Ubuntu, fedora, Garuda, etc have support for it. 2024-11-05 08:19:24 You don't get aur packages my default when installing arch Linux. It's fully reliant on kernel what you can and can't do it you don't have wifi (and the pre-existing system files and such) 2024-11-05 08:19:31 s/my/by/ 2024-11-05 08:19:47 * You don't get aur packages by default when installing arch Linux. It's fully reliant on kernel what you can and can't do if you don't have wifi (aside from the pre-existing system files and such) 2024-11-05 08:23:34 Ubuntu uses 6.8 I believe, which is definitely newer than both 6.6 and 6.1 (6.11) so support definitely wasn't dropped from what I can tell. Otherwise, it's probably something to do with the configuration used for the installer 2024-11-05 08:23:48 * Ubuntu 24.04 uses 6.8 2024-11-05 08:24:28 could you confirm that the model is rtl8811cu? i'm not seeing any available drivers for it in the linux kernel 2024-11-05 08:25:05 I'm not sure if that's the model or not at this point. All I know is that's what the packaging says as well as windows 2024-11-05 08:25:52 Realtek 8811CU Wireless LAN 802.11ac USB NIC 2024-11-05 08:26:35 And it did actually receive updates in the last few months through windows, originally the driver was from 2018 but was updated sometime back in October I believe twice. 2024-11-05 08:29:25 Maybe it's actually 8821cu not 8811cu? 2024-11-05 08:30:54 8821cu is equivalent to 8811cu based on this commit message i found: https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/drivers/net?id=41a7acb7dde8395f52a707bbba7712a898dfafb0 2024-11-05 08:31:23 and 8821cu is officially supported so i'd imagine probing 8821cu should work 2024-11-05 08:31:39 Yes, I did that, and no luck 2024-11-05 08:32:13 were there any relevant messages in your dmesg logs? 2024-11-05 08:32:42 Not that I know of aside from DRM relating to my GPU (AMD Radeon RX550) 2024-11-05 08:38:25 But that's firmware things 2024-11-05 08:41:05 to backtrack a bit, what error message were you getting for the device and what program did it come from? 2024-11-05 08:43:06 No error message, simply isn't recognized as a wifi device. Only a USB device (lsusb only) 2024-11-05 08:44:15 what program is failing to recognise it as a wifi device? 2024-11-05 08:44:38 Entire system. Ip link, setup-alpine, everything 2024-11-05 08:51:41 So either firmware, kernel module or both are missing 2024-11-05 08:53:23 I got it to work over USB with my phone for wifi, but the configuration part is extremely weird and it won't/can't install tzdata and doesn't specify any actual errors either 2024-11-05 08:53:30 it seems that most people who's had similar issues with the rtl8811cu resolved it by installing an out-of-tree module via dkms 2024-11-05 08:57:26 I'm not sure what's up. It's extremely weird and finnicky. I wish people would leave support instead of removing itz even if not updated. I understand not a lot of people use it, but that's better than a 10 year old device absolutely nobody uses. Keep the support until it's extremely outdated or nobody uses it at all 2024-11-05 08:57:38 in a diskless setup, if i download a new tarball, go to the /apk/ dir and run `apk fetch -R extra-packages-i-want` would it probably work without apk cache? or is there an easier way to add/upgrade the /apk/? also i see there are two options for raspberry aarch64 on the download page now, probably a mistake 2024-11-05 08:58:04 have to use the correct repo ofc... 2024-11-05 09:00:01 DaeDae[m]: realtek usb wifi drivers seem to be a pain to troubleshoot in general from the posts i've read about it 2024-11-05 09:01:34 That makes sense, it is a Chinese company after all 2024-11-05 09:03:21 frag: `apk fetch -R` in the /apk/ directory would dump all the packages in that directory, which i assume isn't what you want 2024-11-05 09:03:54 DaeDae[m]: Sorry sorry, they're a Taiwanese company. 2024-11-05 09:04:20 mebious that is what i want to have them available at bootup and/or if no internet, not sure if all the packages will be compatible then tho or slight version differences etc.. 2024-11-05 09:06:16 what i was referring to is that `apk fetch` will download the packages to your current working directory (/apk/ in this case) unless you specify a location with the `-o` flag 2024-11-05 09:07:07 yes, so they are available for install on diskless 2024-11-05 09:08:27 i assume it would work with `--no-cache` 2024-11-05 09:12:20 Correction 2024-11-05 09:12:21 . 2024-11-05 09:12:21 Official support for rtl8811cu (probably via another driver of the same type but not model) was introduced in 6.2 and should still be there. This most likely specifically comes down to a kernel configuration problem 2024-11-05 09:17:46 DaeDae[m]: do you have a source for that? i couldn't find anything that specifies official support for rtl8811cu 2024-11-05 09:18:34 aside from rtl8821cu being an equivalent model to rtl8811cu, which does have an in-tree kernel module 2024-11-05 09:18:56 DaeDae[m]: if you still have the arch setup, you could check what modules are loaded 2024-11-05 09:19:11 That's what I meant by "another driver of the same type but not model" 2024-11-05 09:21:43 The driver is added to kernel 6.2 and newer.... (full message at ) 2024-11-05 09:22:10 As well as, like I stated before, arch Linux, Ubuntu, fedora, Garuda, etc, do not have such an issue and it works perfect without issue 2024-11-05 09:23:10 I could probably just install, and change the kernel from it's default LTS release to a different one 2024-11-05 09:23:19 That's why I suggested looking at what modules are e loaded 2024-11-05 09:32:42 DaeDae: since this is an IRC-first channel (unlike the pmOS ones) you should try to refrain from using non-IRC features like replies and multiline messages 2024-11-05 09:36:58 Ah, right. Sorry 2024-11-05 09:37:56 DaeDae[m]: i was confused as to what you were referring to as replies are rendered on irc as media download links 2024-11-05 09:38:51 fortunately the links do show the plain text output of the message 2024-11-05 09:39:32 I'm unsure when I used a "reply" function though. That requires me to swipe on or hold and select options to be able to "reply" in my application. 2024-11-05 09:40:27 there sohuld be a clear indicator if you're using replies or not in your matrix client. as far as i know, most matrix clients have that 2024-11-05 09:40:30 should* 2024-11-05 09:41:13 I didn't use the reply function for my knowledge, only what I assume is considered a "multiline" message. Maybe it was the url I added? 2024-11-05 09:41:27 i'm not sure but that's besides the point 2024-11-05 09:41:33 Right 2024-11-05 09:41:46 with the 6.2 release you're referring to, rtl8821ce-dkms is an out-of-tree module as it uses dkms to build it 2024-11-05 09:42:39 rtl8821cu is supposed to exist in the kernel by default is the issue, and from what I found, is also the proper module/driver for rtl8811cu as well because of its chipset 2024-11-05 09:43:34 i also just noticed that the link you referenced is for rtl8821ce, not rtl8821cu 2024-11-05 09:44:22 Huh, that's odd. The title specifically states "8811CU" not "8811CE" 2024-11-05 09:44:34 Oh well, can't be helped 2024-11-05 09:44:56 it could be that the rtl8821ce-dkms package in ubuntu inclueds 8821cu drivers 2024-11-05 09:46:24 This is especially confusing because nearly all modern distros have proper support for it out of the box. 2024-11-05 09:46:39 There's a large list of them, and it's all because of the kernel. 2024-11-05 09:48:27 what release and architecture are you using? 2024-11-05 09:49:20 DaeDae: you never used a reply here, I just mentioned it as an example of a Matrix feature IRC doesn't support. You mostly used multiline messages 2024-11-05 09:49:47 Yeah, it's bad habit. Terribly sorry for that 2024-11-05 09:50:12 Arch: x86_64 release: latest available (unsure how to check that) 2024-11-05 09:53:09 alright i think i found the issue. rtl8821cu support corresponds to the CONFIG_RTW88_8821CU kernel compile option and that isn't present in alpine's repos 2024-11-05 09:54:02 you can check here for linux-lts: https://gitlab.alpinelinux.org/alpine/aports/-/blob/master/main/linux-lts/lts.x86_64.config 2024-11-05 09:54:11 and here for linux-edge: https://gitlab.alpinelinux.org/alpine/aports/-/blob/master/community/linux-edge/config-edge.x86_64 2024-11-05 09:54:37 It says LTS (6.6.59 when installed, 6.6.49 from installer image) 2024-11-05 09:58:02 your kernel version matches the current LTS version so that's fine 2024-11-05 09:58:37 Well I mean there is rtw88_8821c and rtw88_8821ce but that's it 2024-11-05 10:00:54 i assume they aren't compatible or equivalent to the rtl8821cu/rtl8811cu 2024-11-05 10:01:29 The only thing I can say that's possible is they simply excluded/removed it. 2024-11-05 10:02:26 that is the case. you'll need to ask the developers about that if you're interested 2024-11-05 10:05:43 Yeah, the only firmware available is strictly 81xx and 84xx. 2024-11-05 11:35:45 in /etc/ files ending with - are backups? can be deleted? eg "group-" 2024-11-05 11:40:14 they are backups but is there a particular reason that you want to delete them? 2024-11-05 12:24:01 no, just like to keep it clean :] `lbu ls` lists them 2024-11-05 19:06:23 does alpine Linux run on ampere altra systems? I’m thinking about buying one to use as my main virtualization server. 2024-11-05 19:30:37 it runs mainline i was told but no idea 2024-11-05 19:30:46 any suggestion to how use unl0kr? 2024-11-05 19:34:01 i think this was meant to go to the postmarketos room? 2024-11-05 19:50:37 no in pmos you can easiyl use it i mean on alpine 2024-11-05 19:54:14 ahh, i didn't connect the "it uses mainline" with the ampere system, so the combination with unl0kr made me think pmOS 2024-11-05 20:33:47 cow123: our arm-based builders run on ampere altra, and they do run mainline 2024-11-05 20:38:43 Linking an executable with gcc -static-libasan doesn't work because it complains about a missing libsanitizer.spec file, which I couldn't find anywhere 2024-11-05 20:39:00 Is it expected that Alpine's GCC is built like that? 2024-11-05 23:29:03 ok thanks ikke, that is good to know 2024-11-06 06:48:53 can someone point me to a deatiled and clear documentation on how to manually install alpine on multiple usb sticks with zfs file system 2024-11-06 06:50:55 That assumes documentation exists for such a specific usecase 2024-11-06 06:51:37 there might be a wiki page for zfs install but I doubt there will be anything about USB sticks 2024-11-06 06:52:58 okay guys thanks. I will try to do it myself then, if i could manage of course. 2024-11-06 09:16:14 hmm.. it seems that my problem with bridge setup on /etc/network/interfaces is that I've missed the package 'bridge', it's just an 'if-host-down.d' script of 141 lines... is it worth to have an additional pacakge for it? 2024-11-06 12:27:05 texlive-full is still the killer... every time I setup new system (notebook), it's the one thing taking ages 2024-11-06 12:29:55 donoban: what does your interfaces file look like? 2024-11-06 12:41:23 Regarding the "missing" light utility, did someone actually find a good replacement? I'm setting up a new notebook and I still have the light binary on old ones before it was removed and I am looking for something simple that can replace it 2024-11-06 12:54:29 hi ppl 2024-11-06 12:54:46 need help with mariadb setting up a galera cluster 2024-11-06 12:55:19 it seems the binary command "galera_new_cluster" is missing from ditribution 2024-11-06 12:55:30 and I cant' bootstrap the first cluster 2024-11-06 12:55:43 how can I find this binary ? 2024-11-06 12:56:16 it's mentioned in the docs but is not into "galera" package 2024-11-06 12:56:37 the "galera" package contains just the galera library 2024-11-06 12:56:54 telmich: did you try brightnessctl? 2024-11-06 12:58:00 I am on alpine 3.20 (mariadb Ver 15.1 Distrib 10.11.10-MariaDB, for Linux (x86_64) using readline 5.1) 2024-11-06 13:00:05 telmich: tectonic works for me 2024-11-06 13:09:14 anyone knows how to start a mariadb galera cluster on Alpine linux 3.20? 2024-11-06 13:20:36 sir, there is no documentaion on help tab of qt-creator. I really need it. do i need to install additional package? if the package doesn't built with documention i request to the maintainer to add qt-creator built-in documentation 2024-11-06 13:38:39 ikke: brightnessctl seems to not detect the screen on a lenovo x1 carbon gen12 2024-11-06 13:38:46 mebious: thanks, will give that a try 2024-11-06 13:39:48 mebious: Are you sure that is related to setting display brightness? 2024-11-06 13:40:38 it isn't. i just realised that i misread that message as being related to your previous message about texlive-full 2024-11-06 13:40:53 Ha... the brightness might need to around in /sys on that machine just yet 2024-11-06 13:41:37 to properly answer your question, as ikke suggested brightnessctl is fairly lightweight and works well 2024-11-06 13:41:54 nico, brightnessctl requires user to be in certain groups https://github.com/Hummer12007/brightnessctl 2024-11-06 13:43:19 that is true. brightnessctl-udev provides the ruleset in `/usr/lib/udev/rules.d/90-brightnessctl.rules` so it'll just need to be copied over to `/etc/udev/rules.d` 2024-11-06 13:43:54 that is if you use eudev 2024-11-06 13:44:34 why would you need to copy it 2024-11-06 13:44:37 udev reads from both locations 2024-11-06 13:45:06 does it? i wasn't aware of that 2024-11-06 13:45:33 all the systemd-adjacent tooling works like that 2024-11-06 13:45:38 i've had issues with it not being recognised when using brightnessctl without privilege escalation 2024-11-06 13:45:45 read from /etc/foo.d first, if it does not exist read from /usr/lib/foo.d 2024-11-06 13:48:10 @cyclisme24:matrix.org: true that - but also as root it only shows the brightness of an led, not of the screen 2024-11-06 13:48:37 strange...I thought I got a fully supported screen, opted out of the oled intentionally 2024-11-06 13:49:37 hmm, no camera and no audio either..fun project 2024-11-06 13:55:54 Hmm, pm-suspend crashes the system 2024-11-06 13:56:26 irgs, and null pointers from the sound system, that can be related 2024-11-06 14:02:11 It has been a while: https://bugzilla.kernel.org/show_bug.cgi?id=219474 2024-11-06 14:04:07 "i915 0000:00:02.0: Your graphics device 7d55 is not properly supported by i915 in this kernel version" - nice 2024-11-06 14:05:59 Let's see what linux-edge says, very happy with have 2 kernels in alpine by default 2024-11-06 14:06:32 anyone knows how to start a mariadb galera cluster on Alpine linux 3.20? 2024-11-06 14:09:25 Uhh, 6.11 has backlight AND sound 2024-11-06 14:09:26 amazing 2024-11-06 14:10:51 No camera though 2024-11-06 14:14:40 But brightnessctl works like charm 2024-11-06 14:14:53 It's now the 4th tool I use in my xbindkeys config 2024-11-06 14:15:42 It's so funny.. I would have thought that setting backlight is something no one wants to bother with / develop around, but I used in order: cbacklight, xbacklight, light and now brightnessctl 2024-11-06 14:17:16 damn! 6.11 also has working suspend WHILE sound is playing! 2024-11-06 14:44:46 wyk72: I've never used galera 2024-11-06 16:10:34 ikke: it's basically the same example on https://wiki.alpinelinux.org/wiki/Bridge#Configuration_file 2024-11-06 16:11:06 my problem is that I migrated some months ago to a new laptop and didn't notice that I should add 'bridge' package for it working 2024-11-06 16:12:11 I inspected the package and it's just a single file on /etc/network/if-post-down.d 2024-11-06 19:23:04 why does st depends on font-liberation in repo? 2024-11-06 19:30:05 as far as i remember they hard-code their font 2024-11-06 19:32:40 oh right 2024-11-06 19:54:01 I guess this is common in most/all repos. In alpinelinux, st depends on font-liberation, which is +4MB 2024-11-06 19:54:14 ups, wrong windo 2024-11-06 22:11:21 Hey there! I wanted to let you know that I have a channel where I share some amazing Verified sauce and soft cashout methods. I also provide a Full WalkThrough to make things easier for you.... (full message at ) 2024-11-06 22:17:20 I have an alpine 3.20 box (x86_63, hp z2 g4) that cannot boot since linux-lts-6.6.57, I would like to revert to 6.6.56 or earlier to see if it is a change in the kernel (git showed no material changes to config of linux-lts). do previous linux-lts packages exist anywhere.. ? 2024-11-06 22:21:19 sadly we do not keep older versions of packages 2024-11-06 22:22:27 Takes up a lot of storage space 2024-11-06 22:23:00 ikke: since you wear ops, consider adding +z, so that at least you can see the unregistered users speaking 2024-11-06 22:23:42 (But but but then I still see the spam :P) 2024-11-06 22:23:47 heh 2024-11-06 22:24:58 Is it documented somewhere? 2024-11-06 22:25:09 oftc user modes only shows -z for operators 2024-11-06 22:25:23 https://oftc.net/ChannelModes/ 2024-11-06 22:27:03 thanks 2024-11-06 22:49:37 smcavoy: the iso images still have the old package releases https://dl-cdn.alpinelinux.org/alpine/v3.20/releases/x86_64/ 2024-11-06 22:50:21 so you could get 6.6.49 from 3.20.3 2024-11-06 22:53:16 You could also pull the apkbuild from aports and manually set the kernel version to what you want and build it. Little bit more involved 2024-11-06 22:55:43 and a kernel with the full config takes a while to build 2024-11-06 23:13:16 Yeah really depends on what you have on hand to build with. My suggestion assumes you have a second machine unfortunately