Differences between revisions 1 and 2
Revision 1 as of 2021-04-25 19:13:30
Size: 26
Comment: add to calendar
Revision 2 as of 2021-05-08 16:41:46
Size: 2161
Comment: add call notes
Deletions are marked like this. Additions are marked like this.
Line 2: Line 2:

 * Btrfs incompatibility with Debian installer:
  * https://discuss.freedombox.org/t/failed-failed-to-mount-snapshots-bullseye/1449/7?u=jvalleroy
  * stevenc will look into it.
  * may use systemd dot-mount file instead of fstab
   * option to continue booting if .snapshot failed to mount
   * https://www.freedesktop.org/software/systemd/man/systemd.mount.html
  * set a root passwd or the emergency mode console will not be available https://ask.fedoraproject.org/t/howto-cannot-open-access-to-console-the-root-account-is-locked-in-emergency-mode-dracut-emergency-shell/2010/2
  * Debian installer creates a "@rootfs" subvol, id 256. In !FreedomBox image, the default root volume (ID=5) is used
   * Debian installer btrfs / -> @rootfs -> .snapshots
    * @rootfs is mounted at /
   * Regular freedombox / -> .snapshots
    * default root volume is mounted at /
  * .snapshots subvolume mountable with subvol=@rootfs/.snapshots
  * Created issue: https://salsa.debian.org/freedombox-team/freedombox/-/issues/2085 Assigned to stevenc
 * Update on Kotlin (sunil)
 * Update on Jitsi Videobridge (sunil)
  * https://wiki.debian.org/Java/RequestedPackages/Jitsi
 * Android app released to both F-Droid and Play Store
  * Featured on F-Droid's "Latest" tab
  * Working on supporting SVG images so that freedombox package can get rid of PNG images
 * Partition issue: see https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988146
 * Wireguard
  * Can install (manually) on buster without !NetworkManager
  * User Interface: we are trying to make it easier to set up a Wireguard VPN
  * Used straight ethernet cable to connect RPi with laptop; used static IP assignment for both wg0 and ethernet iface. May need to run setup script every time !FreedomBox reboots
  * Wireguard connections shall not leak unless wg0 is brought down. For added security, use iptable rules (for example, dst=10.1.0.0/16 iface=wg0 ACCEPT; dst=10.1.0.0/16 REJECT). There are lots of publicly available tutorials for doing this
  * !NetworkManager should not bring down wg0 interface without the user's permission
   * to investigate

Hack call: 14:00 UTC