@jpkolsen wow
"again" seems to imply that wasn't even the first roast of the broadcast lol
Levitating
@levitating@mastodon.sdf.org
0
Followers
0
Following
Joined January 04, 2026
site:
Posts
Open post
In reply to
Levitating
@levitating@mastodon.sdf.org
mastodon.sdf.org
Levitating
@levitating@mastodon.sdf.org
mastodon.sdf.org
@levitating@mastodon.sdf.org
·
Apr 11, 2026
0
2
0
0
Open post
In reply to
Levitating
@levitating@mastodon.sdf.org
mastodon.sdf.org
Levitating
@levitating@mastodon.sdf.org
mastodon.sdf.org
@levitating@mastodon.sdf.org
·
Apr 10, 2026
@bisonrimant you've built an army!
1
0
0
0
Open post
In reply to
Levitating
@levitating@mastodon.sdf.org
mastodon.sdf.org
Levitating
@levitating@mastodon.sdf.org
mastodon.sdf.org
@levitating@mastodon.sdf.org
·
Apr 07, 2026
1
0
0
0
Open post
In reply to
Levitating
@levitating@mastodon.sdf.org
mastodon.sdf.org
Levitating
@levitating@mastodon.sdf.org
mastodon.sdf.org
@levitating@mastodon.sdf.org
·
Apr 07, 2026
@pid_eins I can't seem to be able to combine --private-users=managed with --bind-user. I get "Failed to clone /home/rein: Operation not permitted", and some overlayfs errors from the kernel.
Furthermore I can't seem to get /run/user/1000 to bind with idmap, which is why I was hoping to identity map the users in the first place.
Furthermore I can't seem to get /run/user/1000 to bind with idmap, which is why I was hoping to identity map the users in the first place.
0
2
0
0
Open post
In reply to
Levitating
@levitating@mastodon.sdf.org
mastodon.sdf.org
Levitating
@levitating@mastodon.sdf.org
mastodon.sdf.org
@levitating@mastodon.sdf.org
·
Apr 06, 2026
@pid_eins I have been experimenting with this to see if I can recreate fedora's toolbx using nspawn.
One hurdle I came across is that mstack containers are limited to managed or no user namespacing.
Is this a hard limitation, or something that may be lifted in a future release?
https://github.com/systemd/systemd/blob/fb4bfe651b7dda85b0545d340eac21c7988fe383/src/nspawn/nspawn.c#L6612-L6613
One hurdle I came across is that mstack containers are limited to managed or no user namespacing.
Is this a hard limitation, or something that may be lifted in a future release?
https://github.com/systemd/systemd/blob/fb4bfe651b7dda85b0545d340eac21c7988fe383/src/nspawn/nspawn.c#L6612-L6613
0
2
0
0
Open post
In reply to
Levitating
@levitating@mastodon.sdf.org
mastodon.sdf.org
Levitating
@levitating@mastodon.sdf.org
mastodon.sdf.org
@levitating@mastodon.sdf.org
·
Apr 02, 2026
@dpk When you set up an authentication source in Forgejo, there's a "tips" section that lists documentation for various OAuth2 sources.
That lists currently says "Gitea" with a link to the Forgejo OAuth2 docs. And although those docs do include information on configuring Codeberg as a provider, it might not be obvious to people.
That lists currently says "Gitea" with a link to the Forgejo OAuth2 docs. And although those docs do include information on configuring Codeberg as a provider, it might not be obvious to people.
0
0
0
0
Open post
In reply to
Levitating
@levitating@mastodon.sdf.org
mastodon.sdf.org
Levitating
@levitating@mastodon.sdf.org
mastodon.sdf.org
@levitating@mastodon.sdf.org
·
Apr 02, 2026
@pid_eins This has been a great update. Love the support for varlink APIs and systemd-nspawn.
I am curious who will integrate the bootctl varlink API into their installer first. My guess would be GnomeOS, they've been doing a great job utilizing new systemd APIs.
I am curious who will integrate the bootctl varlink API into their installer first. My guess would be GnomeOS, they've been doing a great job utilizing new systemd APIs.
0
0
0
0