Posts
4826
Following
321
Followers
488
Linux kernel hacker and maintainer etc.

OpenPGP: 3AB05486C7752FE1

Jarkko Sakkinen

my favorite tool for working with #polyend #tracker: #discodsp bliss 2. it is almost like instrument editor for polyend tracker because it comes also with standalone version.
i.e. it allows to do in minutes:

key-mapped multisample along the lines of https://www.youtube.com/watch?v=bn4vPrTU9js
e.g. octave interval multisample and use multiple sample slots and instrument number to pick the octave.

if polyend published PTI specification fully then tools such as bliss could easily implement direct export for it. it would be win-win for the ecosystem and the company...
without open specs for file format it is a bit fake to use terms such as "tracker scene" in the advertisements. actually it is not a bit fake, it is fake literally.
0
0
1

Jarkko Sakkinen

Edited 1 year ago

Tried to login to bugzilla but had some account issue so waiting for that before moving forward.

With 022 umask:

$ sudo sudo bootctl --make-machine-id-directory=yes install
Copied "/usr/lib/systemd/boot/efi/systemd-bootx64.efi" to "/boot/efi/EFI/systemd/systemd-bootx64.efi".
Copied "/usr/lib/systemd/boot/efi/systemd-bootx64.efi" to "/boot/efi/EFI/BOOT/BOOTX64.EFI".
⚠ Mount point '/boot/efi' which backs the random seed file is world accessible, which is a security hole! ⚠
⚠ Random seed file '/boot/efi/loader/random-seed' is world accessible, which is a security hole! ⚠
Random seed file /boot/efi/loader/random-seed successfully refreshed (32 bytes).
Created EFI boot entry "Linux Boot Manager".

With 077 umask:

Copied "/usr/lib/systemd/boot/efi/systemd-bootx64.efi" to "/boot/efi/EFI/systemd/systemd-bootx64.efi".
Copied "/usr/lib/systemd/boot/efi/systemd-bootx64.efi" to "/boot/efi/EFI/BOOT/BOOTX64.EFI".
Random seed file /boot/efi/loader/random-seed successfully refreshed (32 bytes).
Created EFI boot entry "Linux Boot Manager".
1
0
0

Jarkko Sakkinen

#OpenSUSE should probably have umask when mounting /boot/efi:

UUID=1A65-1563    /boot/efi               vfat   utf8,umask=077                0  2

The default 022 umask is incompatible with bootctl.

#systemd

1
2
1
@clementd glad that it works for you :-)
0
0
1
@clementd actually if #speedcrunch had 1:1 terminal clone that would totally work for me. I like it and it is well thought, great desktop calculator.

I tried e.g. #numbat but it does stuff that I don't care. For instance if I proactively do not like calculator to understand any higher level concepts than number systems. For that sort of stuff I rather pick python or similar or wrap bc with a bash script that deals with that. Also fancy features that pile up are also compatibility issue with different calculator tool versions...

So most of the stuff that these promote is a con for my personal taste :-) But yeah speedcrunch is in desktop use super-nice.
1
0
1

Jarkko Sakkinen

I'm a big fan of #linux #kernel #gpu documentation :-) Would make total sense for trusted keys. Especially in crypto seeing code and documentation simultaneously would be an asset.

https://lore.kernel.org/linux-integrity/D05LXJUT7T5Z.39FGAGHVQ6HZH@kernel.org/
0
0
2
@clementd e.g. using English language like syntax to "improve readability" i guess. hurts my eyes tbh looks really convoluted.

not very efficient syntax to write or e.g. embed to a shell script. it looks like from surface that there's probably a shared crate or something that "everyone' uses :-) i stick to bc for now...
1
0
1

Jarkko Sakkinen

tried bc rust alternatives: they seem to improve life by re-inventing the idea with COBOL inspired syntax. #cobol #rustlang

1
0
1
I stopped using KDE after 3.5 and returned when switching to Tumbleweed. Otherwise, it is all good but this "account type" option simply should not exist at all :-)
0
0
0
... and it is also by practical means undocumented security feature.
1
0
0

Jarkko Sakkinen

Edited 1 year ago
I don't get administrator account type in #KDE or who would ever use that for anything. It would be nice if this option could be disabled from settings entirely.

Better stick to sudo, polkit etc.
1
0
0
@monsieuricon right, so it does, thanks!
0
0
0
@liw ok fair enough :-)
0
0
0
@liw https://github.com/Byron/gitoxide i'd presume that you might be aware of it already but just in case
0
0
1
@liw would be interesting to know how gitoxide performs the same task :-)
2
0
0

Jarkko Sakkinen

Edited 1 year ago
@monsieuricon BTW, I must have been doing something wrong at the time but I recall sending my public key for wot and https://www.kernel.org/doc/wot/ does not have it. still i've used signed tags as long as I can remember to past.

I recall that I have required amount of blessings for my key (need to sanity check). I guess I need to re-submit the public key, right?
1
0
0

Jarkko Sakkinen

Edited 1 year ago
@krzk This is true :-) [earlier response that i deleted was for a different person and different discussion]
0
0
0
@duxsco hey i'll check this out thanks! could be useful
0
0
0

@monsieuricon so is there some difference compared to:

gpg --output "$USER-public.pgp" --armor --export $USER
gpg --output "$USER-private.pgp" --armor --export-secret-key $USER
gpg --export-ownertrust > "$USER-ownertrust.pgp"

Not trying to argue against just trying to understand what I’m reading :-)

1
0
0
Show older