scy, to random
@scy@chaos.social avatar

Anyone running using and under ? The volumes I'm mapping to the host always get chowned to 100999:100999, and that's with USERMAP_UID=1000 and USERMAP_GID=1000 in docker-compose.env.

Playing around with PODMAN_USERNS mainly leads to the container not starting at all (in at least one case because it can't install packages).

Podman_io, to opensource
@Podman_io@fosstodon.org avatar

Did you miss the Podman Community Cabal meeting this week? No worries, the video is now up on YouTube! We talked about data production appliances and backups, encapsulation, and a bit more. #opensource #podman https://youtu.be/aLKET_3loWw

ljrk, to random
@ljrk@todon.eu avatar

So, anyone here with and/or + a bit of deeper container/ and knowledge?

I, again, am thinking about combining Silverblue as my base system with a more complex Nix setup to replace toolbox (which is effectively a separate whole Linux to maintain or throw away regularly, or build a CI for to create new images, etc. -- nah).

Now, Nix works fine, but it needs to store things under /nix because most binaries are prefix dependent and not portable in their location. But what if I download the nix store to $HOME/.nix instead and then launch a light-weight throw-away container/namespace that simply maps $HOME/.nix to /nix but keeps everything else identical?

Would that work? Did someone already build that stuff?

vwbusguy, to linux
@vwbusguy@mastodon.online avatar

Just in case no one has mentioned it lately, is legitimately amazing.

Podman_io, to opensource
@Podman_io@fosstodon.org avatar

Hot off the press! Podman v5.0.2! It includes a handful of network bug fixes. Looking for details? Look here: https://github.com/containers/podman/releases/tag/v5.0.2

Podman_io, to opensource
@Podman_io@fosstodon.org avatar

he Podman Community Cabal Meeting is happening in one hour from now! Agenda with video conference URL: https://hackmd.io/gQCfskDuRLm7iOsWgH2yrg?both
Hope to see you there!

potatomeow, to rust
@potatomeow@fosstodon.org avatar

what is a good based image for build my own container image for a #rustlang project? currently using docker.io/library/rust:slim-bookworm right now. my proj is running on rust nightly though. idk if it's gonna work.

currently waiting for the build to finish...
#docker #podman

fuzzychef, to FreeBSD
@fuzzychef@m6n.io avatar

Doug shares a bit of the history of Jails vs. , and talks about porting to .

Podman_io, to opensource
@Podman_io@fosstodon.org avatar

The next Podman Community Cabal meeting is this Tuesday, April 16, 2024, at 11:00am EDT (UTC-5). At the moment we only have a topic about backup appliances and would love to have another topic or two! Agenda with video link: https://hackmd.io/gQCfskDuRLm7iOsWgH2yrg?both

fatherlinux, to linux
@fatherlinux@noc.social avatar

I envision an image-based workflow, similar to Project Bluefin, as the future of operating systems https://bit.ly/49wy4dG

Podman_io, to opensource
@Podman_io@fosstodon.org avatar

Happy to announce Podman Desktop V1.9! Podman v5.0 and 4.9.4 support, Backups, K8S Pods Terminal, API improvements, and More! Details here: https://podman-desktop.io/blog/podman-desktop-release-1.9

irfan, to Steamdeck

TIL and are both pre-installed on the since the last 3.5 update - never seen that mentioned in the changelog or any news of said update before, so that's cool!

RE: https://sakurajima.social/notes/9rspimbc4h

Podman_io, to opensource
@Podman_io@fosstodon.org avatar

The video is up from yesterday's Podman Community meeting. We had a demo/update on new Podman Desktop features, a demo on LLM and Podman, a demo on artifact support in the podman manifest command, a Podman v5.01 update, and more! https://youtu.be/-8l3vGcT3fo

Podman_io, to opensource
@Podman_io@fosstodon.org avatar

When using brew to install Podman v5.0, if you have seen the "vfkit exit 1" error, @bbaude shows you how to instead install using the package installer. https://blog.podman.io/2024/03/the-dreaded-vfkit-exit-1/

Podman_io, to opensource
@Podman_io@fosstodon.org avatar

The Podman Community Meeting will be going on in just over 21 hours from now at 11:00 am EDT (UTC-5) Tues April 2, 2024. Agenda with video conference link here: https://hackmd.io/fc1zraYdS0-klJ2KJcfC7w?both Hope to see you there!

paigerduty, to random
@paigerduty@hachyderm.io avatar

upgrading #podman to 5.0.1 today!

very glad the team worked on making the VM setup on Mac smoother 🙏

here's to hoping I don't have to think about the podman machine so much going forward

gregorni, to programming
@gregorni@fosstodon.org avatar

What does your development environment look like right now?

(IDE/Text Editor? Terminal Multiplexer? Package Manager? Shell? Programming Language? Containerization? Command Runner? Terminal Emulator?)

mo8it,
@mo8it@fosstodon.org avatar

@gregorni My dev environment:

blainsmith,
@blainsmith@fosstodon.org avatar

@gregorni

Editor: #HelixEditor
Terminal emulator: #GNOME terminal
Terminal multiplexer: #tmux
Shell: #zsh
Linux Desktop: @system76 #Pop_OS !
Langs: #GoLang #RustLang #HareLang
DB: #PostgreSQL #SQLite
Containerization: #Podman
SCM: #git #lazygit

graywolf, to guix
@graywolf@emacs.ch avatar

I have just posted a patch updating #podman (to 5.0.0) and #buildah in #guix. It involves somewhat large changes to the build process, so if there are any Guix users of podman and/or buildah here, it would be cool if you could test that it works fine for you.

https://issues.guix.gnu.org/70112

irfan, to linux

There's a huge backdoor ( -2024-3094) allowing remote SSH access (as far as I can tell at this moment) caused by a util called affecting a ton of systems ( and , well not really) and it's causing quite a huge panic. I honestly don't know much about it just yet, but just sharing some pieces to read about the huge vulnerability.

The person who had maliciously planted this vulnerability into xz-utils, Jia Tan, has made at least 750 contributions to the project over the past 2 years. They even have direct push access to the code repo, allowing them to have pushed commits with forged authors. Being "free" from this vulnerability is not as simple as reverting to a previous version due to just how much and how long they've contributed to the project, and people are rightfully suspicious that this person might have hidden other backdoors in xz.

Unlike most other vulnerabilities, it's a lot harder to pinpoint versions affected by this but the most likely case is most systems out there have xz installed on their system that are impacted - which at this moment, the info being thrown around is any version past 5.3.1, 5.4.6, or 5.6.0 (latest is 5.6.1).

🔗 https://access.redhat.com/security/cve/CVE-2024-3094

🔗 https://www.cisa.gov/news-events/alerts/2024/03/29/reported-supply-chain-compromise-affecting-xz-utils-data-compression-library-cve-2024-3094

🔗 https://www.redhat.com/en/blog/urgent-security-alert-fedora-41-and-rawhide-users

🔗 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068024

irfan,

As far as I can tell, you're only impacted by this vulnerability only if:

  • Your distro sources/packages xz from their release tarballs rather than through the Git source directly.

  • The payload was only included for the or packaging, so unless your distro uses these - you're probably safe.

  • As far as I can tell, it also only affects x86 systems so based systems should be fine.

  • As far as I can tell, your system needs to be running to be impacted by this, so / should mostly if not entirely be fine....? maybe.


In other news, people are currently investigating and evaluating other projects also actively contributed by the compromised developer, Jia Tan, including .

People are also analysing the dev's commit history to deduce their background from their activity lol. They've been found to push commits during office hours Mon-Fri, every other Saturdays, presumably Public Holidays that seem to align with China's PH, and seems to be on GMT +8 locale.

🔗 https://github.com/libarchive/libarchive

🔗 https://twitter.com/hackerfantastic/status/1773864354439417983

governa, to random
@governa@fosstodon.org avatar

#Podman 5.0 Container Management Tool Released :podman:

https://linuxiac.com/podman-5-0-container-management-tool-released/

Podman_io, to opensource
@Podman_io@fosstodon.org avatar

The video from the Podman Community Cabal meeting is now up. It was a short meeting as 2 of the 3 speakers could not make it at the last moment. We talked a bit about reverse dependency tests, rootless population of IPs, and V5.0. https://www.youtube.com/watch?v=XW43y97V6kU&t=194s

governa, to random
@governa@fosstodon.org avatar

#Podman 5.0 Container Management Tool Released :podman:

https://linuxiac.com/podman-5-0-container-management-tool-released/

Podman_io, to opensource
@Podman_io@fosstodon.org avatar

Podman v5.0 Release annoucement is here! Updates and speed-ups for running on macOS and Windows, Apple Hypervisor support, stability fixes, performance improvements, and more! Details: https://blog.podman.io/2024/03/podman-5-0-has-been-released/

linuxiac, to random
@linuxiac@mastodon.social avatar
  • All
  • Subscribed
  • Moderated
  • Favorites
  • megavids
  • thenastyranch
  • rosin
  • GTA5RPClips
  • osvaldo12
  • love
  • Youngstown
  • slotface
  • khanakhh
  • everett
  • kavyap
  • mdbf
  • DreamBathrooms
  • ngwrru68w68
  • provamag3
  • magazineikmin
  • InstantRegret
  • normalnudes
  • tacticalgear
  • cubers
  • ethstaker
  • modclub
  • cisconetworking
  • Durango
  • anitta
  • Leos
  • tester
  • JUstTest
  • All magazines