Just blame Linus directly smh
Just blame Linus directly smh


Yeah I tried just now and it diesn’t seem to be working (anymore?) could’ve sworn that worked.
You can still kexec the installiers directly, I followed the netboot.xyz scripts and got the links they use. Here’s Debian as an example:
From the scripts: https://deb.debian.org/debian/dists/stable/main/installer-amd64/current/images/netboot/ looking at the boot config debian-installer/amd64/grub/grub.cfg
submenu '... KDE Plasma desktop boot menu ...' {
set gfxpayload=keep
menuentry '... Install' {
set background_color=black
linux /debian-installer/amd64/linux desktop=kde vga=788 --- quiet
initrd /debian-installer/amd64/initrd.gz
so we need to download those two files and take the netboot.xyz cmdline arguments then
$ kexec --command-line="desktop=kde vga=788 mirror/suite=stable initrd=initrd.magic console=ttyS0,115200n8" --initrd=initrd.gz -l linux´
$ systemctl kexec
and it boots.
also here’s an example for the nixos netboot commands, more on that in the nixos manual:
$ kexec --load bzImage \
--initrd=initrd.gz \
--command-line "init=/nix/store/n37nmcvbrblk9ahfzj9nxy01axs7zsf6-nixos-system-nixos-kexec-25.11pre-git/init nohibernate loglevel=4 lsm=landlock,yama,bpf"
$ systemctl kexec
Edit:
No console access
If that means that you can only connect to SSH and have no VGA/video then this will be limited, you could setup an automated install but that requires a lot more knowledge than what your guide requires.


Kexec can be used to load a new kernel and “reboot” quickly, it can also be used to load a new kernel, an initrd and never touch the disk. Such a system lives completely in ram and allows you to modify the disk in any way you want without breaking you running Linux (which is in ram)
Any distro that has a network boot installer that can be passed to kexec can be installed this way, any that don’t can still kexec any Linux distro and then install any other distro by passing the disk to a VM and installing linux through that.
You can also kexec the netboot.xyz image and get any distro supported there.


Can’t you just kexec and be on your way?


i will simply want to scan projects that i personally use to be aware of its current state and future changes, before i blindly update apps i host.
If you’re just doing this for yourself then you still need to know the programming languages involved, what kind of vulnerabilities exist, how to validate them and quite a bit of how the projects operate.
The AI will output a lot of false positives and you will need to actually know if any of the “vulnerabilities” are valid or just hallucinations. Do you really want that extra workload?


No worries, I installed it for you.


Google protecting Google from FOSS.
They’re right too, after using Immich I don’t want to go back.
Have you tried our lord and savior NixOS?
You can customize any package down to source patches but everything you leave at default just gets downloaded. I even had custom kernel patches that worked across kernel updates without modification and all it costs is:


Me myself and I.
Also a third party for some family connections.


I run wireguard and Android with chrome cause firefox doesn’t support pwa. Did you add it to your home screen?
Edit: Also I run release V2


It just works™?
Silverbullet supports working offline as a pwa, just click install on the website and you get a shortcut to the web app that you can use online and offline, open it when your online again to sync your changes to the other devices.


Can recommend, works offline and online with PWA support and stores everything in Markdown files for easy migration if you want to change your frontend.


Did you follow the guide?
https://docs.searxng.org/admin/installation-docker.html#installation-container


It is expected, the users inside the container are “real” users. They just get offset inside the container and some mapping is applied:
Root inside the container is mapped outside to the user running the container, everything that has the owner “root” inside the container can be read from outside the container as your user.
Everything that is saved as non-root inside the container gets mapped to the first subuid in /etc/subuids for your user + the uid inside the container.
You can change this mapping such that, for example, user 1000 inside the container gets mapped to your user outside the container.
An example:
You have a postgres database inside a container with a volume for the database files. The postgres process inside the container doesn’t run as root but instead runs as uid 100 as such it also saves its files with that user.
If you look at the volume outside the container you will get a permission denied error because it is owned by user 100100 (subuids starts at 100000 and usid inside container is 100).
To fix: Either run your inner processes as root, this can often be done using environment variables and has almost no security impact or add --userns keep-id:uid=100,gid=100 to the cmdline to make uid 100 inside the container map to your user instead of root (this creates a new image automatically and takes a while on the first run)


I though that was the point of surveys?
I’m sorry to say but problem solving and computer skills are left at the door.


Maybe
I don’t like Source-available software, especially when they’ve changed from a more open license to this.
To add to this, “Open WebUI” needs to be included, as is and without modifications in all derivations. The term is also trade marked and as such, cannot be distributed without the trade mark owners approval…
https://trademarks.ipo.gov.uk/ipo-tmcase/page/Results/2/WO0000001844530
Why don’t you just use USB-C to USB-C?