[03:58] PR snapcraft#3918 opened: commands: add init option for git initialization === eoli3n_ is now known as eoli3n [11:20] howdy there! i'm currently looking into how UC, and therefore the snap store are fit for on-prem, and possibly air-gapped operation. couldn't find any good information though. so 1) is it possible to build a custom UC image without network connectivity? 2) if regulations require hosting of my custom snaps, e.g. applications at a specific place, or even on-prem, is that possible? [11:36] PR snapd#12162 closed: boot: apply boot logic also for classic with modes boot snaps [11:36] PR snapd#12166 closed: overlord: start turning restart into a full state manager [11:43] LetoThe2nd, the siging with the canonical key is mandatory and happens on upload ... so your snap need to loop through the canonical store at least once ... for airgap there is a store proxy you can use and run in airgap mode ... you'd then download your snaps from the canonical store and push them to the proxy machine via ssh or usb stick [11:43] LetoThe2nd, https://docs.ubuntu.com/snap-store-proxy/en/ [11:44] *signing (heh, we do not require users to sing πŸ™‚ ) [11:45] you can always use local unsigned snaps for building UC images as long as you use a "dangerous" model assertion [11:45] (indeed these snaps would never update) [12:17] ogra: singing users would be fun! [12:17] * LetoThe2nd commences a moshpit [12:17] πŸ˜„ [12:18] ogra: but what does store proxy mean then? [12:19] well, it is a proxy running on-prem ... with the ability to run it air-gapped [12:20] e.g. a sneakernet-connected proxy? but that would be on-prem of the network that *receives* the snaps, not the one that *generates* them, right? [12:24] right [12:25] understood, thanks! [12:25] "generate" something you can do locally though ... [12:25] hm? [12:25] (all snap uploads to the store are binary, already in squashfs image form) [12:26] only the signing and security checking happens in the store [12:26] (during upload, before being able to publish) [12:26] so i could generate air-gapped, technically, sneakernet out, and then upload+sign? [12:27] well, upload to the global stoe to get the signature ... then download from the global store and push to your air gapped machine [12:27] i see [12:28] but as you mention "everything is binary", how do you provide license compliance? [12:28] i.e. you need to loop once through the store to get a valid gpg signature with the canonical archive key [12:28] by store policy/terms and conditions ... [12:28] https://ubuntu.com/legal/terms-and-policies/snap-store-terms [12:29] (point 6 i think) [12:29] uh huh. such legal, much read. [12:30] (not much different to the apple or google/android stores) [12:30] it boils down "up to you how you handle it, but everything has to be legal in the end" ) [12:30] *down to [12:30] yeah. the more i look, the more it starts to feel like "an app store for iot devices". [12:30] (no insult meant) [12:31] right,that is what it was originally πŸ™‚ [12:31] hehe [12:31] but then it grew support for desktop apps too ... so it is after all more like the apple app store nowadays [12:32] slowly get it. [12:35] Hopefully final question for now then, how do I enable a new board? [12:37] you need a gadget and kernel snap that support it ... then you create a model assertion that describes it and and that (and the snaps) to ubuntu-image [12:38] *and hand that [12:38] ogra: what would the gadget and kernel snaps require? like, is it just a packages u-boot and kernel in the end? [12:38] the gadget carries bootloader, partitioning info and initial config data [12:39] the kernel ... well, is a kernel and initrd that prefareably support your hardware ... [12:39] the model assertion is just a json file you sign [12:39] ogra: so again, without signing, no fun to be had? [12:40] for loacal testing and development you can use unsigned snaps and a model assertion that declares the image as "dangerous" [12:40] * LetoThe2nd cranks up Aerosmiths "Living on the edge" [12:40] the ubuntu-image command comes with a --snap option that takes a path to a local snap as option [12:41] so you'd do something like "ubuntu-image snap --snap /path/tπŸ‘‹gadget.snap --snap /path/tπŸ‘‹kernel.snap model.assertion [12:41] " [12:41] bah !!!! [12:41] silly emoji plugin [12:42] okay, i see. what if my hardware doesn't even support secure boot? or requires magic such as the imx'es HAB? [12:42] (th wavy hand is "to" with a slash indeed) [12:42] you dont have t use secboot at all [12:42] maybe you should plugout the emojis then :-) [12:42] it is optional [12:42] k [12:42] especially on ARM ou need optee support and such [12:43] *you [12:43] well optee is not mandatory for secboot. [12:43] it is i ubuntu core [12:43] *in [12:43] ah thats what you mean. [12:43] sigh ... need a new laptop ... kbd gives up [12:44] on x86 TPM is a hard req for secboot ... on ARM it is optee [12:44] * LetoThe2nd recommends a MBP, no kidding. [12:44] (TPM2 in fact) [12:44] yeah, i was pondering an M2 ... but wanted to wait til there is a graphics driver [12:45] (i want to run ubuntu natively in any case ... and it should work as daily driver ... i think the M1/2 are still not ready for that) [12:45] got a M1 Max here. Awesome machine, just a bit heavy. had a lenovo X1 nano before that, which was like wow. [12:46] i had XPS13s for the last three laptops ... to support the team building them πŸ™‚ [12:47] but the keyboard quality really degraded with each model ... [12:48] the laptop keyboard is ok-ish, but for daily i use a keyboardio atreus by now. [12:50] well, i have a collections of self-built keyboards ... but when using the laptop in a comfy chair in the living room i dont really want an external kbd πŸ™‚ [12:51] depends. i just don't like to work in what people call "comfy chairs" [12:51] so only recently i thought about you once i joined #beagle again, nice to still see you around! [12:51] same ! [12:52] * ogra sadly has to go to a meeting now ... but i'll be back later [12:52] same here. take care! [12:52] you too ! [14:52] PR snapd#12168 opened: i/b/mount-control: add optional `/` to umount rules [14:57] PR snapd#12169 opened: i/b/fwupd: add more permissions [14:57] PR snapd#12170 opened: many: add stub services for prompting [19:48] PR snapd#12171 opened: tests: fix issues related to dbus session and localtime in uc18