profile
viewpoint
Ryan Lahfa RaitoBezarius Freelancer @gigster-eng (Gigster) France Mad Scientist of @mangaki && Secret weapon of @dissemin

leanprover-community/mathlib 344

Lean mathematical components library

dissemin/dissemin 159

Spot your own paywalled papers. Liberate them in one click.

mangaki/mangaki 113

Site de recommandation de mangas et d'anime

RaitoBezarius/AutobahnReact 13

Make realtime a breeze with React.

GovanifY/KH2FM_Toolkit 11

A tool used for modding the game Kingdom Hearts: 2 Final Mix - mirror from https://code.govanify.com

leanprover-community/leanprover-community.github.io 11

Hosts the website for mathlib and other Lean community infrastructure.

krofna/Warrior-of-Dreamworld 6

Warrior of Dreamworld is 2D Massivly Multiplayer Online Role Playing Game with Real-time combat

push eventRaitoBezarius/ens-courses

Raito Bezarius

commit sha edc5df48f5b6ae73a87082eb6f9b641a067d5a26

meta: update folders

view details

push time in 3 hours

push eventRaitoBezarius/ens-courses

Raito Bezarius

commit sha e56f75f873b5dba327f48ce1fd181782f52968be

notes: move them into their respective folder

view details

Raito Bezarius

commit sha f6302f89fa70bbf07a6bc11febf18bd7bafaea54

meta: update README

view details

push time in 4 hours

MemberEvent
MemberEvent
MemberEvent

push eventRaitoBezarius/ens-courses

Raito Bezarius

commit sha f0df9317b4371e0a61ad8091d9b0ec0ce8c2c864

notes: add Samuel notes on Algo

view details

push time in 4 hours

create barnchRaitoBezarius/ens-courses

branch : master

created branch time in 4 hours

created repositoryRaitoBezarius/ens-courses

Notes de cours à l'ENS en tout genre

created time in 4 hours

issue commentweechat/weechat

Native OTR support

I don't believe it's niche. It's 2020 and I'm very still interested into native OTR.

Mikaela

comment created time in 2 days

push eventRaitoBezarius/nixexprs

Raito Bezarius

commit sha 6135861802818d5105374a3a2a9c9fa1ed84e721

nur: add infcloud

view details

push time in 5 days

startedCelti/imapnotify-rs

started time in 5 days

startednix-community/impermanence

started time in 11 days

pull request commentmangaki/mangaki

nix: convert to a flake based structure

This is true, in practice, it'll do a "trust on first-use" (because the store will cache the tarball with some sort of TTL). We just have to pin the sha256 to enforce reproducibility. And I'm getting 1vi8bb024mfl266nax7zpnppnzp0976kacqxnvfdgsmny0sj1ka3 according to nix-prefetch-url

While this is true re: security risks, given that the URL is a tarball for the master branch of a git repository, this will probably not solve reproducibility issues.

Right. It is possible to lock the tarball "properly": https://nixos.wiki/wiki/Flakes ("Using flakes project from legacy Nix"). FWIW, this is only a library shim to support the Flakes mechanism, so I was not really that concerned, but this is a correct point.

eadwu

comment created time in 11 days

pull request commentmangaki/mangaki

nix: convert to a flake based structure

I don't know much about using Nix, and so I can't comment on the rest of the PR, but it looks like this is downloading code directly from https://github.com/edolstra/flake-compat/archive/master.tar.gz without any sort of verification on what is downloaded.

This doesn't seem in line with the reproducibility goals of the project, in addition of technically being a security risk.

This is true, in practice, it'll do a "trust on first-use" (because the store will cache the tarball with some sort of TTL). We just have to pin the sha256 to enforce reproducibility. And I'm getting 1vi8bb024mfl266nax7zpnppnzp0976kacqxnvfdgsmny0sj1ka3 according to nix-prefetch-url

eadwu

comment created time in 11 days

Pull request review commentmangaki/mangaki

nix: convert to a flake based structure

 in      # User activation script for directory initialization.     # systemd oneshot for initial migration.+    systemd.services.mangaki = {+      after = [ "postgresql.service" ];+      requires = [ "postgresql.service" ];+      wantedBy = [ "multi-user.target" ];++      description = "Mangaki service";+      path = [ pkgs.mangaki.env ];+      environment.MANGAKI_SETTINGS_PATH = toString configFile;+      environment.DJANGO_SETTINGS_MODULE = "mangaki.settings";++      serviceConfig = {+        User = "mangaki";+        Group = "mangaki";++        StateDirectory = "mangaki";+        StateDirectoryMode = "0750";+        WorkingDirectory = "/var/lib/mangaki";+      };++      # TODO: django-admin runserver bugs out looking like it fails to parse bash+      script = ''+        django-admin migrate+        python ${pkgs.mangaki.src}/mangaki/manage.py runserver

I'll take a look to it

eadwu

comment created time in 12 days

PullRequestReviewEvent

pull request commentmangaki/mangaki

nix: convert to a flake based structure

First, thanks a lot for opening a PR here!! I really appreciate it.

Not really sure what poetryShell is for?. The VM is also missing it's attribute vm and file ./mangaki-vm.nix. Same with wheeledShell and sourceShell, I can't tell where they come from.

That was mostly testing stuff, it's not really relevant.

I'll review it ASAP. I'm exciting to have it!

eadwu

comment created time in 12 days

startedemersion/libliftoff

started time in 12 days

startedmujx/hakatime

started time in 13 days

startedeadwu/nixos-configuration

started time in 14 days

startedngi-nix/mangaki

started time in 14 days

startedkanishka-linux/reminiscence

started time in 15 days

PR closed NixOS/nixops-aws

RDS: Add DBSubnet resource, VPC security groups

This commit enables EC2 RDS resource to use:

  • DBSubnets
  • VPC security groups

As a result, it adds a DBSubnet resource which consists of at least 2 VPC subnets containing at least each AZ of your region.

It enables support of RDS in a VPC.

This makes it possible to use RDS in a VPC setup, i.e. in EC2-VPC.

Will fix #6.

+338 -12

18 comments

9 changed files

RaitoBezarius

pr closed time in 15 days

pull request commentNixOS/nixops-aws

RDS: Add DBSubnet resource, VPC security groups

Closing because of #113

RaitoBezarius

comment created time in 15 days

PullRequestReviewEvent

Pull request review commentNixOS/nixops-aws

RDS: Support VPC

 def _to_boto_kwargs(self, attrs):             "rds_dbinstance_instance_class": "instance_class",             "rds_dbinstance_multi_az": "multi_az",             "rds_dbinstance_security_groups": "security_groups",+            "vpc_security_groups": "vpc_security_groups",         }-        return {attr_to_kwarg[attr]: attrs[attr] for attr in attrs.keys()}+        result = {attr_to_kwarg[attr]: attrs[attr] for attr in attrs.keys()}++        # If the user has specified VPC security groups, and+        # have left security groups as the default list of "default",+        # they probably don't use the default security group --+        # and it is incompatible with VPC security groups anyway.+        if (+            "vpc_security_groups" in result+            and "security_groups" in result+            and len(result["vpc_security_groups"]) > 0+            and list(result["security_groups"]) == ["default"]

At the right, you're instantiating a list, so a full-fledged mutable object in Python, which is in fact, mutable.

>>> def f(L):
...    return list(L) == ["default"]
... 
>>> dis.dis(f)
  2           0 LOAD_GLOBAL              0 (list)
              2 LOAD_FAST                0 (L)
              4 CALL_FUNCTION            1
              6 LOAD_CONST               1 ('default')
              8 BUILD_LIST               1
             10 COMPARE_OP               2 (==)
             12 RETURN_VALUE

Here's the "bytecode" using the dis module.

Now, with the tuple version:

>>> def g(L):
...     return tuple(L) == ("default",)
... 
>>> dis.dis(g)
  2           0 LOAD_GLOBAL              0 (tuple)
              2 LOAD_FAST                0 (L)
              4 CALL_FUNCTION            1
              6 LOAD_CONST               1 (('default',))
              8 COMPARE_OP               2 (==)
             10 RETURN_VALUE

So there is an actual difference, you're saving a list construction (because tuples are immutable and have nice properties Python can use to optimize things around).

But, micro-performance is not the only reason to use it, for more niceties, please refer to https://stackoverflow.com/questions/68630/are-tuples-more-efficient-than-lists-in-python/22140115#22140115

Also, IMHO, when I review stuff, I keep track of "singleton list" because they often mean to me that you're writing an imperative mutable algorithm or something like this (which is clearly not the case here AFAIK)

grahamc

comment created time in 16 days

Pull request review commentNixOS/nixops-aws

RDS: Support VPC

 def __init__(self, name: str, config: nixops.resources.ResourceEval):         super(EC2RDSDbInstanceDefinition, self).__init__(name, config)         # rds specific params -        self.rds_dbinstance_id = self.config.id-        self.rds_dbinstance_allocated_storage = self.config.allocatedStorage-        self.rds_dbinstance_instance_class = self.config.instanceClass-        self.rds_dbinstance_master_username = self.config.masterUsername-        self.rds_dbinstance_master_password = self.config.masterPassword-        self.rds_dbinstance_port = self.config.port-        self.rds_dbinstance_engine = self.config.engine-        self.rds_dbinstance_db_name = self.config.dbName-        self.rds_dbinstance_multi_az = self.config.multiAZ-        self.rds_dbinstance_security_groups = []-        for sg_name in self.config.securityGroups:-            self.rds_dbinstance_security_groups.append(sg_name)+        self.rds_dbinstance_id: str = self.config.id+        self.rds_dbinstance_allocated_storage: int = self.config.allocatedStorage+        self.rds_dbinstance_instance_class: str = self.config.instanceClass+        self.rds_dbinstance_master_username: str = self.config.masterUsername+        self.rds_dbinstance_master_password: str = self.config.masterPassword+        self.rds_dbinstance_port: int = self.config.port+        self.rds_dbinstance_engine: str = self.config.engine+        self.rds_dbinstance_db_name: str = self.config.dbName+        self.rds_dbinstance_multi_az: bool = self.config.multiAZ+        self.subnet_group: Optional[str] = self.config.subnetGroup++        if self.subnet_group is not None:+            if self.config.vpcSecurityGroups is None:+                raise Exception(+                    f"rdsDbInstances.{name}.vpcSecurityGroups is required when subnetGroup is specified"+                )+            elif list(self.config.securityGroups) != ["default"]:

I'd rather test tuple equality here

grahamc

comment created time in 16 days

Pull request review commentNixOS/nixops-aws

RDS: Support VPC

 def _to_boto_kwargs(self, attrs):             "rds_dbinstance_instance_class": "instance_class",             "rds_dbinstance_multi_az": "multi_az",             "rds_dbinstance_security_groups": "security_groups",+            "vpc_security_groups": "vpc_security_groups",         }-        return {attr_to_kwarg[attr]: attrs[attr] for attr in attrs.keys()}+        result = {attr_to_kwarg[attr]: attrs[attr] for attr in attrs.keys()}++        # If the user has specified VPC security groups, and+        # have left security groups as the default list of "default",+        # they probably don't use the default security group --+        # and it is incompatible with VPC security groups anyway.+        if (+            "vpc_security_groups" in result+            and "security_groups" in result+            and len(result["vpc_security_groups"]) > 0+            and list(result["security_groups"]) == ["default"]

Testing tuple equality in this case seems sounder than list equality IMHO

grahamc

comment created time in 16 days

PullRequestReviewEvent
PullRequestReviewEvent

starteddeluan/navidrome

started time in 16 days

startedDocMarty84/koozic

started time in 16 days

push eventRaitoBezarius/nixexprs

Raito Bezarius

commit sha e296ef1a450cf69e46fc88f0f4236380cda1908e

beauties: bump to latest rev

view details

push time in 17 days

push eventRaitoBezarius/beauties

Raito Bezarius

commit sha dbdbb809a71f7682c05b9cc5f93b2efc3b557c09

misc: remove rword

view details

Ryan Lahfa

commit sha 0e676f7310ec57eca56191fe42ca625a239101e7

Merge pull request #2 from RaitoBezarius/misc misc: remove rword

view details

push time in 17 days

PR merged RaitoBezarius/beauties

misc: remove rword
+1 -5

0 comment

2 changed files

RaitoBezarius

pr closed time in 17 days

PR opened RaitoBezarius/beauties

misc: remove rword
+1 -5

0 comment

2 changed files

pr created time in 17 days

push eventRaitoBezarius/beauties

Raito Bezarius

commit sha dbdbb809a71f7682c05b9cc5f93b2efc3b557c09

misc: remove rword

view details

push time in 17 days

push eventRaitoBezarius/nixexprs

Raito Bezarius

commit sha 83ccb4bc43a21ddf834c182afb56fdb5291ce2ca

beauties: bump the package to my local fork

view details

push time in 17 days

push eventRaitoBezarius/beauties

Raito Bezarius

commit sha 1480996fb16bb3f3023ba567f78d383b224bec2e

misc: add fish, my gpg key, edit index, use interpolation for scripts

view details

Ryan Lahfa

commit sha fbfa29e9df856a2bc755babd8540d56a4253c5ac

Merge pull request #1 from RaitoBezarius/misc misc: add fish, my gpg key, edit index, use interpolation for scripts

view details

push time in 17 days

pull request commentdsx/beauties

misc: add fish, my gpg key, edit index, use interpolation for scripts

Please, ignore fail…

RaitoBezarius

comment created time in 17 days

create barnchRaitoBezarius/beauties

branch : misc

created branch time in 17 days

fork RaitoBezarius/beauties

Essential personal Internet services

fork in 17 days

push eventRaitoBezarius/nixexprs

Raito Bezarius

commit sha 85a6e67e7e50d51188b5b183f0ba6b4c06720f83

beauties: add config in head

view details

push time in 17 days

push eventRaitoBezarius/nixexprs

Raito Bezarius

commit sha dcdbeff6073194e7278a7e33c5a5775a3fc181ff

nur: try to fix the syntax error

view details

push time in 17 days

push eventRaitoBezarius/nixexprs

Raito Bezarius

commit sha c80829b519483a1c23f73502cf0931c3a3d790de

nur: use cfg.enable for beauties

view details

push time in 17 days

push eventRaitoBezarius/nixexprs

Raito Bezarius

commit sha b84b1f4106c509257ee590ba2b3ec2b0bc6e2841

nur: add beauties service

view details

push time in 17 days

push eventRaitoBezarius/nixexprs

Raito Bezarius

commit sha a98ee3bc751b31e68413e55ed6342fc9c3193cb0

nur: init with beauties

view details

push time in 17 days

create barnchRaitoBezarius/nixexprs

branch : master

created branch time in 17 days

created repositoryRaitoBezarius/nixexprs

All my Nix expressions

created time in 17 days

PR opened NixOS/nixpkgs

beauties: init at 0.0.14
Motivation for this change

This open the way for a beauties NixOS service, which would enable a little nice web application for minimalist personal services.

This is my first contribution, I'm not sure how to compute the vendorSha256, but will do ASAP if possible and will update what I tried.

Things done

<!-- Please check what applies. Note that these are not hard requirements but merely serve as information for reviewers. -->

  • [ ] Tested using sandboxing (nix.useSandbox on NixOS, or option sandbox in nix.conf on non-NixOS linux)
  • Built on platform(s)
    • [ ] NixOS
    • [ ] macOS
    • [x] other Linux distributions
  • [ ] Tested via one or more NixOS test(s) if existing and applicable for the change (look inside nixos/tests)
  • [ ] Tested compilation of all pkgs that depend on this change using nix-shell -p nixpkgs-review --run "nixpkgs-review wip"
  • [x] Tested execution of all binary files (usually in ./result/bin/)
  • [ ] Determined the impact on package closure size (by running nix path-info -S before and after)
  • [ ] Ensured that relevant documentation is up to date
  • [ ] Fits CONTRIBUTING.md.
+34 -0

0 comment

2 changed files

pr created time in 17 days

push eventRaitoBezarius/nixpkgs

Raito Bezarius

commit sha 1c0a25d010a4b5ae481d9c077de0ec6be59c6d29

beauties: init at 0.0.14

view details

push time in 17 days

fork RaitoBezarius/nixpkgs

Nix Packages collection

fork in 17 days

startedmightybyte/zeus

started time in 19 days

startedredbrick/nix-configs

started time in 21 days

create barnchRaitoBezarius/nixops-proxmox

branch : master

created branch time in 24 days

created repositoryRaitoBezarius/nixops-proxmox

NixOps plugin for Proxmox

created time in 24 days

startedstoraged-project/blivet

started time in 25 days

issue openedstoraged-project/blivet

Unable to import blivet with "minimal dependencies"

I am trying to package the latest version of blivet for NixOS in order to use it with https://github.com/NixOS/nixpart ; but I'm running in a lot of issues and I'm not really accustomed to the whole project.

As far as I understand it, this project requires:

  • libblockdev
  • pykickstart
  • pyparted
  • pyudev
  • libselinux
  • pygobject3
  • six

What I don't understand is especially, how versions are locked for these dependencies. But, even if I try to bump everything to their latest version, I'm running in the following issue:

ValueError: Namespace BlockDev not available related to GObject, so I can only guess it is due to libblockdev, but unsure why. I can only infer that GObject has some automatic discovery somewhere, it would be interesting to know how/why.

Do you have any idea regarding all those points?

Thanks in advance :)

created time in 25 days

pull request commentcanonical/cloud-init

Add support to NixOS for /etc/hosts

Hi @OddBloke, thanks for the prompt answer ! I appreciate it.

Hi @RaitoBezarius, thanks for the submission! It's not clear to me that this is a complete solution to your problem. cc_update_etc_hosts uses cloud.distro.osfamily to determine the template name:

https://github.com/canonical/cloud-init/blob/a802a1243f3bcd72617b6969e5134752666960ca/cloudinit/config/cc_update_etc_hosts.py#L70-L71

Agreed, I was not sure whether it'd relevant.

but cloud-init doesn't have a NixOS distro class, so cloud.distro.osfamily will never be "nixos" and so this template will never end up being used. It looks to me like the NixOS packaging does add such a distro class: https://github.com/NixOS/nixpkgs/blob/master/pkgs/tools/virtualization/cloud-init/add-nixos-support.patch#L47-L55. Perhaps extending that patch to include this template would be a better path forward? I think that's a good idea.

(Note that even if we were to land this here, you wouldn't benefit from it in NixOS without further work: cloud-init 0.7.9 was released at the end of 2016, and that's the version that NixOS is pinned at.)

We can always bump cloud-init on NixOS side, it's not a real problem, I believe. :-)

I just pushed a WIP update of the NixOS package to 20.3 here and could add this patch to that even without another release. However, the existing Nix patch no longer applies cleanly and I haven't fixed that up yet. @bcdarwin I'm interested into that, so I'll keep it, maybe I can rework it. :)

RaitoBezarius

comment created time in 25 days

PR opened canonical/cloud-init

Add support to NixOS for /etc/hosts

I'm trying to use cloud-init on NixOS and I'm failing to configure the /etc/hosts because no template are available. Here's a simple fix.

+25 -0

0 comment

1 changed file

pr created time in 25 days

push eventRaitoBezarius/cloud-init

Ryan Lahfa

commit sha 733d42828cb736839b25896236ae92a563478bb3

Add support to NixOS for /etc/hosts

view details

push time in 25 days

fork RaitoBezarius/cloud-init

Official upstream for the cloud-init: cloud instance initialization

https://cloud-init.io/

fork in 25 days

fork RaitoBezarius/netboot.xyz-custom

Create your own custom github menu for netboot.xyz

https://netboot.xyz

fork in a month

startedRblSb/SyncTube

started time in a month

startedsubspacecloud/subspace

started time in a month

startedalexk99/the_router

started time in a month

push eventRaitoBezarius/mandos

Raito Bezarius

commit sha 78515bb3f6aa8b9314e1211dc8660e5a5b4b048b

mandos: fix bytes manipulation with endswith

view details

push time in a month

push eventRaitoBezarius/mandos

Raito Bezarius

commit sha a9eba6c3498c09e6ac45125efeb56a9e612a1e3e

makefile: have less assumptions

view details

push time in a month

startedMic92/nixos-shell

started time in a month

push eventRaitoBezarius/nix-scripts

Raito Bezarius

commit sha a45500d09e882184029af03f2dd20bfc8dc83936

autoinstall: make it better

view details

push time in a month

push eventRaitoBezarius/nix-scripts

Raito Bezarius

commit sha 65cf316aa63fe27e0ad184d735862fbb83edcf3b

autoinstall: btrfs encrypted installation with remote unlock

view details

push time in a month

create barnchRaitoBezarius/nix-scripts

branch : master

created branch time in a month

created repositoryRaitoBezarius/nix-scripts

Scripts around Nix/NixOS/NixOps

created time in a month

create barnchRaitoBezarius/mandos

branch : master

created branch time in a month

created repositoryRaitoBezarius/mandos

Mirror of the https://www.recompile.se/mandos Bazaar repository.

created time in a month

issue commentobsproject/obs-studio

OBS does not record transient windows like menus or contextual menus (with XComposite)

@kkartaltepe Rather than closing abruptly the issue, wouldn't be better to mark it as "help needed as per your edit?

mclegrand

comment created time in a month

startedAncurio/mkxp

started time in 2 months

push eventpronostkr/loki

Raito Bezarius

commit sha 3bac933d0960e89591b5b3f57677a3d3933ba0cb

docker: replace also - by _

view details

push time in 2 months

PR opened grafana/loki

Docker logging driver: Add a keymod for the extra attributes from the Docker logging driver

What this PR does / why we need it: Docker labelling best practices are to use labels with reverse DNS notation, but as Prometheus has a completely different view on this, it makes it very incompatible to collect custom labels which abide by Docker labelling practices, using the Docker logging driver. Currently, the code has some special treatment for the Docker's labels, it should be possible to generalize this.

An easy way is to do a keymod when getting the extra attributes from Docker and replacing every . by _

Which issue(s) this PR fixes: Fixes #2455

Special notes for your reviewer:

Checklist

  • [ ] Documentation added
  • [ ] Tests updated
+3 -1

0 comment

1 changed file

pr created time in 2 months

push eventpronostkr/loki

Raito Bezarius

commit sha eaf0429de49ec5d8ff1ed01888c232417c9bba73

docker: fix the code

view details

push time in 2 months

push eventpronostkr/loki

Raito Bezarius

commit sha 5098ce1941f9fe4f2fb5a8ad96d231a4a180ad44

docker: add a keymod to replace . by _, making them "prometheus"-friendly

view details

push time in 2 months

issue commentgrafana/loki

Complex labels option for docker configuration

Is there any reason to not generalize the fix presented here?

wapmorgan

comment created time in 2 months

issue openedgrafana/loki

No way to use Docker recommended naming in labels

Describe the bug Docker actually recommends labels to have a com.xxx.yyy.zzz naming which clashes with the label regex being in use in Loki/Prometheus, which makes it in turn impossible to get those labels in Loki.

To Reproduce Steps to reproduce the behavior:

  1. Started Loki (any)
  2. Use Docker logging driver
  3. Use the log opt: labels: "com.xxx.yyy.zzz" in daemon.json

Expected behavior There should be a way to prepare for those, as they're… technically the Docker recommendation. I'd expect that relabelling can be done before validation of the labels name, which, according to the current code, is not the case.

Environment:

  • Infrastructure: laptop
  • Deployment tool: Dokku (which labels with com.dokku.app-name for example).

created time in 2 months

fork RaitoBezarius/dokku-sentry

Deploy your own instance of Sentry onto Dokku!

fork in 2 months

startedhopsoft/stimulus_reflex

started time in 2 months

startedvyos/python-vyos-mgmt

started time in 2 months

startedPibou421/dynamic_recommandation

started time in 2 months

startedlawl/NoiseTorch

started time in 2 months

fork RaitoBezarius/worms-discord-analyzer

A discord worms that join every servers it finds and collect the data, then perform some analyses to the data.

fork in 2 months

push eventRaitoBezarius/quizzes

Raito Bezarius

commit sha b97f06649198d4b18e61ef9436365feef1ca52b5

nix: nixify this

view details

push time in 3 months

fork RaitoBezarius/quizzes

Plate-forme de quizzes à choix multiples (QCM) avec interface d'analyse des résultats.

fork in 3 months

push eventmangaki/mangaki

Jill-Jênn Vie

commit sha f3ce577fc0a1652b0f3f0c2a2b92523342206195

Fix test client name for AniDB (#689)

view details

push time in 3 months

PR merged mangaki/mangaki

Update test_anidb.py
+1 -1

1 comment

1 changed file

jilljenn

pr closed time in 3 months

push eventmangaki/mangaki

Basile Clement

commit sha aa504da0abb70f40098611edd6e595c08fd6266a

Fix Vagrant setup (#690) This mostly changes the Ansible configuration to be compatible with Vagrant: - Use Debian Buster - Enable pipelining in ansible.cfg (see https://docs.ansible.com/ansible/latest/user_guide/become.html#risks-of-becoming-an-unprivileged-user ) - Use python3 for starting ansible on the host (default interpreter_python in ansible.cfg) - Some cleanup based on Ansible warnings (mostly stop using loops for `apt`)

view details

push time in 3 months

PR merged mangaki/mangaki

Fix Vagrant setup

This mostly changes the Ansible configuration to be compatible with Vagrant:

  • Use Debian Buster
  • Enable pipelining in ansible.cfg (see https://docs.ansible.com/ansible/latest/user_guide/become.html#risks-of-becoming-an-unprivileged-user )
  • Use python3 for starting ansible on the host (default interpreter_python in ansible.cfg)
  • Some cleanup based on Ansible warnings (mostly stop using loops for apt)
+26 -22

2 comments

5 changed files

Elarnon

pr closed time in 3 months

more