| 11 Sep 2021 |
pie_ | actually, I almost watched all of them I guess. The android 10 and 11 ones I still have queued | 20:07:41 |
pie_ | theyre watchable 1.5x and maybe 2x even (I havent managed the latter with anyone else yet) | 20:08:00 |
pie_ | the training slides on opersys.com also seem to be public | 20:13:08 |
pie_ | the trainings are very expensive but the slides are accessible so thats cool i guess 🤣😂 | 20:13:32 |
pie_ | they seem pretty good though? | 20:13:38 |
pie_ | the problem is of course if you have a random diagram shoved in front of you youre missing all the value add | 20:14:18 |
| 12 Sep 2021 |
kranzes | danielrf: could you update to the latest bromite version and push it to cachix? | 21:53:09 |
danielrf | kranzes: Sure, will work on that today | 22:17:18 |
danielrf | pshirshov: apologies for the delayed response to your questions and PRs/issues. | 22:18:01 |
danielrf | that hardcoded fingerprint is only used if signing.enable=false, and is to avoid an extra use of Nix's import-from-derivation. | 22:18:38 |
danielrf | Some apps need to embed a fingerprint of another app in their code. (e.g. F-Droid privileged extension needs to know the fingerprint from F-Droid) | 22:19:17 |
danielrf | If the user generates their own keys, then fingerprint gets set based on their key. | 22:19:56 |
danielrf | However, if signing.enable=false, then we internally generate a snakeoil key for the F-Droid app to use. This would also automatically get set to fingerprint, but uses IFD. | 22:20:40 |
danielrf | So that line is just to avoid IFD to get that information. The line is not required, since the fallback is still to use IFD to get it. | 22:21:22 |
pshirshov | Should something like that be done for other apps (namely aurora store)? | 22:22:05 |
danielrf | For reference, here's where we generate the warning if fingerprint is being acquired via IFD for signing.enable=false: https://github.com/danielfullmer/robotnix/blob/4469399c4a612cb34cc0c6957ec80e1fa14e2418/modules/apps/prebuilt.nix#L179 | 22:22:43 |
danielrf | Is there a place in the aurora services where we need to patch in a key fingerprint? If so then yes | 22:23:17 |
danielrf | You can avoid adding that fingerprint = mkIf (!config.signing.enable) ... line until the warning prompts you. | 22:25:23 |
danielrf | I have thoughts about ways to eliminate this stuff when we rework the keys generation again... It's not very intuitive as you've discovered | 22:26:15 |
danielrf | pie_: Hi, just FYI, if you're interested in some other issues which would be helpful to work on, there's also this one: https://github.com/danielfullmer/robotnix/issues/24 | 22:44:33 |
danielrf | Huh, I would have thought the next bromite release would be based on chromium v93, since that's whats stable on android now, but they're still on v92. Will still update to today's released version. | 22:47:14 |
| 13 Sep 2021 |
danielrf | kranzes: OK, built and pushed bromite up to github and cachix | 00:51:55 |
kranzes | In reply to @danielrf:matrix.org kranzes: OK, built and pushed bromite up to github and cachix erm its not on github? | 08:24:33 |
pie_ | In reply to @jcie74:matrix.org theyre a bit specialized but im watching the opersys youtube videos, they also seem quite decent id like to make the slight modification that they actually seem very good | 14:46:31 |
| 15 Sep 2021 |
danielrf | Pushed new tag: grapheneos-2021091407. Tested on crosshatch. | 21:28:31 |
| 17 Sep 2021 |
jack | Tested on redfin. | 02:45:47 |
| 18 Sep 2021 |
danielrf | Pushed new tag: lineageos-2021091803. Tested on sunfish. | 22:28:35 |
| 21 Sep 2021 |
| Yuka (she/her) joined the room. | 18:31:56 |
| 24 Sep 2021 |
danielrf | Pushed new tag: grapheneos-202109222 tag. Tested on crosshatch | 03:07:58 |
| 25 Sep 2021 |
jack | In reply to @danielrf:matrix.org Pushed new tag: grapheneos-202109222 tag. Tested on crosshatch Tested on redfin. | 05:44:41 |