[00:31] <kc2bez> @teward001 https://phab.lubuntu.me/D21
[00:31] -lugito:#lubuntu-devel- [Needs Review] Package calamares for new upstream release.: https://phab.lubuntu.me/D21
[00:49] <wxl> only two changes? https://phab.lubuntu.me/D21
[00:49] -lugito:#lubuntu-devel- [Accepted] Package calamares for new upstream release.: https://phab.lubuntu.me/D21
 Yes?
[00:51] <wxl> i'm confused
 I guess I am too.
 hmm
 i wonder...
 hmmmmmmmm
 i should ask rbasak to put cala into git-ubuntu
 would let me have all sorts of fun with gbp
[00:55] <teward> @tsimonq2 is the repository configured to track Cala tarballs, or do you pull that automatically with CI?
[00:55] <teward> 'cause failing all else I'm tempted to get this into git-ubuntu
[06:07] -lugito:#lubuntu-devel- [rLIBFMQTPACKAGINGfaec7ee9c2f8: sync with eoan archive] rikmills (Rik Mills) committed: https://phab.lubuntu.me/rLIBFMQTPACKAGINGfaec7ee9c2f8
[15:30] <apt-ghetto> TJ-: Do you have an idea, why I end in a grub rescue shell, when I enter the wrong passphrase?
[15:30] <TJ-> apt-ghetto: Yes
[15:33] <apt-ghetto> Is it possible to drop into the grub rescue shell after the third failed attempt?
[15:34] <TJ-> apt-ghetto: if you've encrypted GRUB's /boot then once you fail the cryptomount command it can't do anything but end up in the rescue shell
[15:35] <apt-ghetto> So it is part of Grub? And can't be configured otherwise?
[15:36] <TJ-> apt-ghetto: You sound to be confused as to how full disk encryption works
[15:39] <apt-ghetto> I am confused, that there is only one trial to enter the passphrase
[15:39] <TJ-> "it depends"
[15:39] <TJ-> there are 2 wys FDE is usually done, neither of which is truly FDE :)
[15:40] <TJ-> one is "almost" and the other is "excluding GRUB linux kernel and initrd.img"
[15:40] <apt-ghetto> I have FDE with an unencrypted /boot and there it is possible to fail
[15:40] <apt-ghetto> without ending in the grub rescue shell
[15:41] <TJ-> apt-ghetto: maybe the intro to my wiki article on FDE will help https://help.ubuntu.com/community/Full_Disk_Encryption_Howto_2019
[15:42] <apt-ghetto> Thanks, I will read it in the next few days
[15:42] <TJ-> apt-ghetto: when only the root file-system is LUKS encrypted, and therefore /boot/ is a separate, unencrypted, file-system, the LUKS unlock is done by cryptsetup tooling in initrd.img, which of course is running as shell scripts
[15:43] <apt-ghetto> That's clear, but I am/was expecting the same behaviour also in Grub
[15:44] <TJ-> apt-ghetto: but when /boot/ is also encrypted then GRUB's cryptdisk module and various gcry_* cipher/hash modules are built-in to GRUB's core image so that as soon as core image is executed it tries to unlock the LUKS volume. if it cannot then it drops to the GRUB rescue shell, which is the only thing available in core image
[15:44] <TJ-> apt-ghetto: there is no scripting available in core image by default
[15:44] <TJ-> apt-ghetto: so, if you mis-type the passphrase you have to manually issue the command to try again e.g. "cryptomount (hd0,gpt2)
[15:45] <TJ->  hmmm, where did those parenthesis come from? "cryptomount hd0,gpt2"
[15:52] <apt-ghetto> And after that I have to enter "insmod normal" and "normal" to boot the system?
[16:02] <TJ-> Yes
[16:02] <apt-ghetto> TJ-: Thank you, you helped me a lot
[16:05] <apt-ghetto> Now I have only one other problem: That the passphrase during installation is not the same, when entering it at boot, due to different keyboard layouts
[16:08] <TJ-> That is always an issue for non US locales. I generally recommend using only the ASCII set for one pass-phrase then add another pass-phrase with your natural locale language as well
[16:08] <TJ-> then for GRUB you can use the ASCII version but if you prefer, the local language for other times. I prefer using key files though which avoids that entirely
[16:09] <apt-ghetto> You have your keyfile on a USB stick?
[16:10] <TJ-> I have some systems using a key-file on USB, and others using a Yubikey
[17:30] -lugito:#lubuntu-devel- [rMANUAL55859cd9686e: Fix openbox wiki link] lynorian (Lyn Perrine) committed: https://phab.lubuntu.me/rMANUAL55859cd9686e
[18:41] <wxl> @tsimonq2: are you going to test this? https://github.com/lxqt/lxqt-globalkeys/pull/123#issuecomment-509898253
[18:46] -lugito:#lubuntu-devel- [rMANUAL4c444571fe26: Add pressing tab key twice] lynorian (Lyn Perrine) committed: https://phab.lubuntu.me/rMANUAL4c444571fe26
 Qt 5.12.4 is in!