summaryrefslogtreecommitdiff
path: root/etc
AgeCommit message (Collapse)Author
2024-05-23pacdiffXiao Pan
2024-05-14pacdiffXiao Pan
2024-04-20pacdiffXiao Pan
2024-04-16sshd accept COLORTERM env to fix ls no colorXiao Pan
If client use alacritty, after ssh into this remote server, ls doesn't show color. Can be workarounded by server sshd accept COLORTERM and client sshd send env. More see my comments in alacritty.toml config.
2024-04-01metaXiao Pan
2024-03-31metaXiao Pan
2024-03-16pacdiffXiao Pan
2024-03-16fix: add allow-weak-key-signatures to /etc/pacman.d/gnupg/gpg.conf, to ↵Xiao Pan
workaroud ALARM build key is sha1 and rejected by new gpg With newer version of gpg, pacman will error `Error: Signature is marginal trust` for Arch Linux ARM Build System key. It seems because Arch Linux ARM Build System key is sha1 and rejected by new versions of gpg. Need to reset all keys by: ```sh sudo rm -rf /etc/pacman.d/gnupg sudo pacman-key --init echo 'allow-weak-key-signatures' | sudo tee -a /etc/pacman.d/gnupg/gpg.conf > /dev/null sudo pacman-key --populate ``` Note, need to add `allow-weak-key-signatures` in /etc/pacman.d/gnupg/gpg.conf before `sudo pacman-key --populate`. More See https://archlinuxarm.org/forum/viewtopic.php?f=9&t=16762
2024-03-16metaXiao Pan
2024-03-16add defaultXiao Pan
2024-03-16pacdiffXiao Pan
2024-03-06pacnewXiao Pan
2024-02-26metaXiao Pan
2024-02-26dirty workaround to mkinitcpio when linux-megi upgradeXiao Pan
2024-02-09pacnewXiao Pan
2024-01-21fix: htop new version seems break old way of make htoprc unwritable to keep ↵Xiao Pan
config unchanged In the past, `chmod a-w ~/.config/htop/htoprc` is sufficient to let htop not able to write to htoprc. So configs keeps the same if I press anything in htop. But it seems htop new version 3.3.0 makes it not working. I'm not sure why. I suspect "Write configuration to temporary file first" in changelog is the reason <https://github.com/htop-dev/htop/blob/main/ChangeLog#L19>. Luckily, `chmod a-w ~/.config/htop` still works by making htop config dir not writable.
2024-01-19updateXiao Pan
2024-01-13updateXiao Pan
2024-01-13metaXiao Pan
2024-01-09metaXiao Pan
2024-01-06updateXiao Pan
2023-12-28metaXiao Pan
2023-12-28pacdiffXiao Pan
2023-12-28metaXiao Pan
2023-12-25pp ethernet network interface has different nameXiao Pan
2023-12-19updateXiao Pan
2023-12-19updateXiao Pan
2023-12-16updateXiao Pan
2023-12-07It seems no need encrypt if has osk-sdlXiao Pan
2023-12-06insp upd already append pp sdcv_history to insp sdcv_history, backup no need ↵Xiao Pan
anymore
2023-11-29updateXiao Pan
2023-11-27updateXiao Pan
2023-11-26updateXiao Pan
2023-11-25move to gitlabXiao Pan
2023-11-21updateXiao Pan
2023-11-19updateXiao Pan
2023-11-19danctnix repo changed urlXiao Pan
https://matrix.to/#/!lmoJhRvQcNTuGtHgry:kde.org/$6FmAgi789_7BO-AJzgU7G0t075ozyjuD_EJw0f8-_bE?via=kde.org&via=matrix.org&via=tchncs.de
2023-11-18metaXiao Pan
2023-11-17no need mdns any moreXiao Pan
2023-11-17metaXiao Pan
2023-11-17updateXiao Pan
2023-11-15metaXiao Pan
2023-10-09updateXiao Pan
2023-09-19Add lima to mkinitcpio.conf MODULES array to fix osk-sdl error and cannot loadXiao Pan
Danct12 pushed this commit: <https://github.com/dreemurrs-embedded/Pine64-Arch/commit/909781899bc7b1dff1be429ce3111422ef189129>, changed `CONFIG_DRM_LIMA=y` to `CONFIG_DRM_LIMA=m` in PKGBUILDS/pine64/linux-megi/config, result in "MESA-LOADER: failed to open zink/swrast/kms_swrast ..." error and osk-sdl can't load. Danct12 said in matrix room: "i actually just moved lima and panfrost from built-in to module to save some space. you can still boot from another media and unlock the drive, mount boot and add "panfrost" to mkinitcpio's modules. then regen initramfs, that should work."[1] So I tried to add lima to to mkinitcpio.conf MODULES array and the issue is fixed. [1]:https://matrix.to/#/!lmoJhRvQcNTuGtHgry:kde.org/$esCkS8s6e1LTwvEOUAPGPFdlex1RvkhOTFHP0dflDb0?via=kde.org&via=matrix.org&via=privacytools.io
2023-09-16updateXiao Pan
2023-08-26metaXiao Pan
2023-08-25new subdomainXiao Pan
2023-08-18updateXiao Pan
2023-08-18updateXiao Pan
2023-07-31sshd_config use `AuthenticationMethods publickey` for redundancy, think ↵Xiao Pan
about what if they changed some defaults auth method from no to yes