wink
wink

Holy cow, how convoluted can you make a "report a bug" procedure, Github?

No, we don't have bugs, everything must be a user error, so please post in the feedback forum, or choose from one of these 7 categories and none of them say "Our fucking website has a bug".

Apparently you have to google it, not find it in their footer.  https://support.github.com/contact/bug-report

wink

Question: "How can I add a custom resolution under wayland? My old xrands script doesn't work anymore."
Answer: "Wayland is a protocol and you should look how your DE handles that. (also implied: you are an idiot for asking)."

If you ever answered something like this to someone whose distro switched to wayland without them changing anything else: Fuck you and please just don't talk to people ever again.

In other news, yes I also have this problem, but with a Virtual screen on a VM and all I'm finding are condescending non-answers. If the answer is actually to change a kernel mode setting... lol

winksnipe ⭑⭒⭒⭒⭒ :antiverified:

My husband and I have been laughing this for ten minutes straight 😂

wink

I was trying out a new language/framework combo and so I wrote a thing[tm] and it's been fine until I came to Auth. OAuth to be exact. Why does Auth have to be so shitty? Yes, I've done this a dozen times and I usually have no problems implementing something for the dozenth time in a new language. But Auth annoys me and keeps me from putting the thing live.

wink

I know I should properly blog this, but meh.

On one server for a project I wanted to try podman, you know rootless containers, not Docker, etc.

It looked ok at first although it was a bit tedious to set up.

But either I am holding it wrong or it's just vastly inferior. Every time I reboot the whole setup just dies and I have to do `podman-compose down && podman-compose up -d` unlike with `docker-compose`. How often do you reboot? Not that big of a problem.

But also DNS doesn't work properly, so I can't use the DB container's hostname, I have to manually edit the IP into the config every time I redo this setup. Not great. There's an open issue on github somewhere, don't have the link handy, so it's not "clearly my fault".

The worst thing is though that it suddenly stops working from time to time, without a reboot, and I have to do a `loginctl enable-linger <int>` before I can do anything, although it tells me to do `podman system migrate` or something, which never works.

Yeah, I guess I should RTFM some more, but this is clearly either broken or at least kinda hard to use with at least some documentation bugs or huge caveats.

winkOld Man Vandehey

Got an open source project you don't want to maintain anymore? Just add "WP" to the name, and wait for WordPress to do a hostile takeover! Ha! Good luck fixing those bugs, Matt!

winkSarah Jamie Lewis

I really try to like Firefox, but the last 5 minutes really captures the kind of papercut that happens often:

- I open a new tab and firefox informs me it has updated itself and needs to restart and won't allow any further operations until it does so.
- Fine, I close and restart.
- I reopen Firefox to find a brand new sponsored weather widget on my otherwise blank new tab page - from a source I would never otherwise visit.

Thanks for breaking my flow and the privacy breach, I guess.

winkmidzer
wink shared a note by midzer Aug 21, 2024

I am looking for a new job opportunity as developer and/or linux administrator:

* location flexible
* 10+ years professional experience
* languages: DE, EN

FOSS references in my GH profile.

CV on request via mail.

Boosts welcome :)

#FediHire

winkelle
wink shared a note by elle Sep 2, 2024

writer: "she quickly dragged a brush through her curly, thick hair"

me: she absolutely did not

winkJames Bennett
wink shared a note by James Bennett Sep 3, 2024

OK, so. If someone knows where you have an account, knows your username and password for that account, knows you use a vulnerable YubiKey as your second factor for that account, can physically obtain your YubiKey from you, and has a lab full of expensive electronic analysis equipment to use to observe its behavior across multiple authentication attempts, they can, apparently, extract enough information to clone your YubiKey.

There are some people for whom this is a serious threat requiring them to rush out and immeditaely replace keys. If you are turning to random posters on the internet for analysis of this vulnerability, you are very likely not one of those people.