Free Alpine Linux Shell Accounts

1679111217

Comments

  • Not_OlesNot_Oles Hosting ProviderContent Writer

    Reminder about upcoming maintenance!

    @Not_Oles said:
    Upcoming maintenance:

    • Downtime for maintenance December 27 and 28. This is from @Cloudie.

    Thanks! :)

    Thanked by (1)AuroraZero

    I hope everyone gets the servers they want!

  • @Not_Oles said:
    Reminder about upcoming maintenance!

    @Not_Oles said:
    Upcoming maintenance:

    • Downtime for maintenance December 27 and 28. This is from @Cloudie.

    Thanks! :)

    You know Imma lose millions with this downtime. I can't believe you would do this to me. Imma be ruined and it is all my fault. :)

    Thanked by (1)yoursunny
  • Not_OlesNot_Oles Hosting ProviderContent Writer

    @AuroraZero said:

    @Not_Oles said:
    Reminder about upcoming maintenance!

    @Not_Oles said:
    Upcoming maintenance:

    • Downtime for maintenance December 27 and 28. This is from @Cloudie.

    Thanks! :)

    You know Imma lose millions with this downtime. I can't believe you would do this to me. Imma be ruined and it is all my fault. :)

    Some Amazonian creatures can update their databases with Zero downtime. Metallic antiquities are equally shiny but in different ways, n'est ce pas? 🍫

    Thanked by (1)AuroraZero

    I hope everyone gets the servers they want!

  • @Not_Oles said:

    @AuroraZero said:

    @Not_Oles said:
    Reminder about upcoming maintenance!

    @Not_Oles said:
    Upcoming maintenance:

    • Downtime for maintenance December 27 and 28. This is from @Cloudie.

    Thanks! :)

    You know Imma lose millions with this downtime. I can't believe you would do this to me. Imma be ruined and it is all my fault. :)

    Some Amazonian creatures can update their databases with Zero downtime. Metallic antiquities are equally shiny but in different ways, n'est ce pas? 🍫

    Oui!

    Thanked by (1)Not_Oles
  • Not_OlesNot_Oles Hosting ProviderContent Writer

    @AuroraZero said:

    @Not_Oles said:

    @AuroraZero said:

    @Not_Oles said:
    Reminder about upcoming maintenance!

    @Not_Oles said:
    Upcoming maintenance:

    • Downtime for maintenance December 27 and 28. This is from @Cloudie.

    Thanks! :)

    You know Imma lose millions with this downtime. I can't believe you would do this to me. Imma be ruined and it is all my fault. :)

    Some Amazonian creatures can update their databases with Zero downtime. Metallic antiquities are equally shiny but in different ways, n'est ce pas? 🍫

    Oui!

    @AuroraZero

    Having read a few of your posts in other threads, I genuinely and deeply admire your facility with language! And your sense of humor!

    Your sense of humor reminds me of some of my very favorite people, the Porkers. 🐷 Oink! 🐷

    May I please ask, are you, by any chance, a Porker? 🐷

    Thanked by (1)AuroraZero

    I hope everyone gets the servers they want!

  • @Not_Oles said:

    @AuroraZero said:

    @Not_Oles said:

    @AuroraZero said:

    @Not_Oles said:
    Reminder about upcoming maintenance!

    @Not_Oles said:
    Upcoming maintenance:

    • Downtime for maintenance December 27 and 28. This is from @Cloudie.

    Thanks! :)

    You know Imma lose millions with this downtime. I can't believe you would do this to me. Imma be ruined and it is all my fault. :)

    Some Amazonian creatures can update their databases with Zero downtime. Metallic antiquities are equally shiny but in different ways, n'est ce pas? 🍫

    Oui!

    @AuroraZero

    Having read a few of your posts in other threads, I genuinely and deeply admire your facility with language! And your sense of humor!

    Your sense of humor reminds me of some of my very favorite people, the Porkers. 🐷 Oink! 🐷

    May I please ask, are you, by any chance, a Porker? 🐷

    Nah but it has been awhile since I have heard of them. I am just a Yeti mucking about and being myself that is all.

    Thanked by (1)Not_Oles
  • Not_OlesNot_Oles Hosting ProviderContent Writer

    Install of LXC


    fmt:~# date Wed Dec 21 00:47:37 UTC 2022 fmt:~# # Install lxc fmt:~# apk info lxc # I should have done the update/upgrade before asking for info, but lxc wasn't updated, so no problem this time. lxc-5.0.1-r1 description: Userspace interface for the Linux kernel containment features lxc-5.0.1-r1 webpage: https://linuxcontainers.org/lxc/ lxc-5.0.1-r1 installed size: 23 MiB fmt:~# apk update fetch http://mirror.fcix.net/alpine/edge/main/x86_64/APKINDEX.tar.gz fetch http://mirror.fcix.net/alpine/edge/community/x86_64/APKINDEX.tar.gz fetch http://mirror.fcix.net/alpine/edge/testing/x86_64/APKINDEX.tar.gz v3.17.0-1944-g134785e067 [http://mirror.fcix.net/alpine/edge/main] v3.17.0-1980-gb3e596266a [http://mirror.fcix.net/alpine/edge/community] v3.17.0-1973-gbe048fe492 [http://mirror.fcix.net/alpine/edge/testing] OK: 24023 distinct packages available fmt:~# apk upgrade OK: 168 MiB in 107 packages fmt:~# apk add lxc (1/2) Installing lxc (5.0.1-r1) (2/2) Installing lxc-openrc (5.0.1-r1) Executing busybox-1.35.0-r29.trigger OK: 192 MiB in 109 packages fmt:~# ls -l /usr/bin/lxc* -rwxr-xr-x 1 root root 949608 Sep 27 02:39 /usr/bin/lxc-attach -rwxr-xr-x 1 root root 941256 Sep 27 02:39 /usr/bin/lxc-autostart -rwxr-xr-x 1 root root 941352 Sep 27 02:39 /usr/bin/lxc-cgroup -rwxr-xr-x 1 root root 8370 Sep 27 02:39 /usr/bin/lxc-checkconfig -rwxr-xr-x 1 root root 941352 Sep 27 02:39 /usr/bin/lxc-checkpoint -rwxr-xr-x 1 root root 936576 Sep 27 02:39 /usr/bin/lxc-config -rwxr-xr-x 1 root root 941352 Sep 27 02:39 /usr/bin/lxc-console -rwxr-xr-x 1 root root 949440 Sep 27 02:39 /usr/bin/lxc-copy -rwxr-xr-x 1 root root 949448 Sep 27 02:39 /usr/bin/lxc-create -rwxr-xr-x 1 root root 941352 Sep 27 02:39 /usr/bin/lxc-destroy -rwxr-xr-x 1 root root 941352 Sep 27 02:39 /usr/bin/lxc-device -rwxr-xr-x 1 root root 945448 Sep 27 02:39 /usr/bin/lxc-execute -rwxr-xr-x 1 root root 941352 Sep 27 02:39 /usr/bin/lxc-freeze -rwxr-xr-x 1 root root 941216 Sep 27 02:39 /usr/bin/lxc-info -rwxr-xr-x 1 root root 953536 Sep 27 02:39 /usr/bin/lxc-ls -rwxr-xr-x 1 root root 945352 Sep 27 02:39 /usr/bin/lxc-monitor -rwxr-xr-x 1 root root 941352 Sep 27 02:39 /usr/bin/lxc-snapshot -rwxr-xr-x 1 root root 949536 Sep 27 02:39 /usr/bin/lxc-start -rwxr-xr-x 1 root root 941344 Sep 27 02:39 /usr/bin/lxc-stop -rwxr-xr-x 1 root root 949408 Sep 27 02:39 /usr/bin/lxc-top -rwxr-xr-x 1 root root 941352 Sep 27 02:39 /usr/bin/lxc-unfreeze -rwxr-xr-x 1 root root 945352 Sep 27 02:39 /usr/bin/lxc-unshare -rwxr-xr-x 1 root root 4455 Sep 27 02:39 /usr/bin/lxc-update-config -rwxr-xr-x 1 root root 944616 Sep 27 02:39 /usr/bin/lxc-usernsexec -rwxr-xr-x 1 root root 941344 Sep 27 02:39 /usr/bin/lxc-wait fmt:~# exit Connection to fmt.metalvps.com closed.

    @yoursunny and @everyone Probably /etc/network/interfaces needs to be changed. Right now:

    fmt:~# cat /etc/network/interfaces
    auto lo
    iface lo inet loopback
    
    auto eth1
    iface eth1 inet static
            address 23.134.88.226
            netmask 255.255.255.240
            gateway 23.134.88.225
    
    iface eth1 inet6 static
            address 2602:fba1:999::2
            netmask 48
            gateway 2602:fba1:999::1
    fmt:~# 
    

    What additional changes might be required, if any?

    Friendly greetings!

    Tom

    I hope everyone gets the servers they want!

  • @Not_Oles said:
    Install of LXC
    What additional changes might be required, if any?

    • cgroups user delegation
    • subuid and subgid files
    • network bridge and lxc-usernet file
    Thanked by (1)Not_Oles

    ServerFactory aff best VPS; HostBrr aff best storage.

  • Not_OlesNot_Oles Hosting ProviderContent Writer

    @yoursunny said:

    @Not_Oles said:
    Install of LXC
    What additional changes might be required, if any?

    • cgroups user delegation
    • subuid and subgid files
    • network bridge and lxc-usernet file

    Thank you! I am happy to Google around for these and see what I can learn. If you want to provide hints, things might go a little faster, but whatever happens is fine.

    Also, only if you have both time and interest, may I please bump a previous set of questions that I asked?

    Best wishes from Sonora! 🏜️

    I hope everyone gets the servers they want!

  • Not_OlesNot_Oles Hosting ProviderContent Writer

    Docker

    fmt:~# apk add docker
    (1/14) Installing runc (1.1.4-r4)
    (2/14) Installing containerd (1.6.12-r0)
    (3/14) Installing containerd-openrc (1.6.12-r0)
    (4/14) Installing libmnl (1.0.5-r0)
    (5/14) Installing libnftnl (1.2.4-r0)
    (6/14) Installing iptables (1.8.8-r2)
    (7/14) Installing iptables-openrc (1.8.8-r2)
    (8/14) Installing ip6tables (1.8.8-r2)
    (9/14) Installing ip6tables-openrc (1.8.8-r2)
    (10/14) Installing tini-static (0.19.0-r1)
    (11/14) Installing docker-engine (20.10.21-r2)
    (12/14) Installing docker-openrc (20.10.21-r2)
    (13/14) Installing docker-cli (20.10.21-r2)
    (14/14) Installing docker (20.10.21-r2)
    Executing docker-20.10.21-r2.pre-install
    Executing busybox-1.35.0-r29.trigger
    OK: 419 MiB in 123 packages
    fmt:~# 
    

    Have fun! :)

    I hope everyone gets the servers they want!

  • Not_OlesNot_Oles Hosting ProviderContent Writer

    GCC

    fmt:~# date
    Wed Dec 21 02:15:31 UTC 2022
    fmt:~# apk add build-base musl-dev
    (1/17) Installing binutils (2.39-r2)
    (2/17) Installing libmagic (5.43-r0)
    (3/17) Installing file (5.43-r0)
    (4/17) Installing libgomp (12.2.1_git20220924-r5)
    (5/17) Installing libatomic (12.2.1_git20220924-r5)
    (6/17) Installing isl25 (0.25-r0)
    (7/17) Installing mpfr4 (4.1.1-r0)
    (8/17) Installing mpc1 (1.3.1-r0)
    (9/17) Installing gcc (12.2.1_git20220924-r5)
    (10/17) Installing libstdc++-dev (12.2.1_git20220924-r5)
    (11/17) Installing musl-dev (1.2.3-r4)
    (12/17) Installing libc-dev (0.7.2-r3)
    (13/17) Installing g++ (12.2.1_git20220924-r5)
    (14/17) Installing make (4.4-r1)
    (15/17) Installing fortify-headers (1.1-r1)
    (16/17) Installing patch (2.7.6-r8)
    (17/17) Installing build-base (0.5-r3)
    Executing busybox-1.35.0-r29.trigger
    OK: 651 MiB in 140 packages
    fmt:~# 
    

    Have fun! :)

    I hope everyone gets the servers they want!

  • Not_OlesNot_Oles Hosting ProviderContent Writer
    edited December 2022

    Go

    fmt:~# apk add go
    (1/1) Installing go (1.19.4-r0)
    Executing busybox-1.35.0-r29.trigger
    OK: 1058 MiB in 141 packages
    fmt:~# 
    

    Vim

    fmt:~# apk add vim
    (1/2) Installing xxd (9.0.0999-r0)
    (2/2) Installing vim (9.0.0999-r0)
    Executing busybox-1.35.0-r29.trigger
    OK: 1088 MiB in 143 packages
    fmt:~# 
    

    Yaaay! :)

    I hope everyone gets the servers they want!

  • @Not_Oles said:
    Docker

    User must be in the docker group in order to use Docker.
    Otherwise, all we get is:

    fmt:~$ docker ps
    Cannot connect to the Docker daemon at unix:///var/run/docke
    r.sock. Is the docker daemon running?
    

    However, adding someone to the docker group is equivalent to granting them root privilege.


    For BGP daemon, either LXC or KVM can work.

    Thanked by (1)Not_Oles

    ServerFactory aff best VPS; HostBrr aff best storage.

  • Not_OlesNot_Oles Hosting ProviderContent Writer

    Python3 + Vim upgrade

    fmt:~# date
    Wed Dec 21 02:54:49 UTC 2022
    fmt:~# # Python3 Install
    fmt:~# apk update
    fetch http://mirror.fcix.net/alpine/edge/main/x86_64/APKINDEX.tar.gz
    fetch http://mirror.fcix.net/alpine/edge/community/x86_64/APKINDEX.tar.gz
    fetch http://mirror.fcix.net/alpine/edge/testing/x86_64/APKINDEX.tar.gz
    v3.17.0-1994-gf200a554b6 [http://mirror.fcix.net/alpine/edge/main]
    v3.17.0-1997-g7c7451d69a [http://mirror.fcix.net/alpine/edge/community]
    v3.17.0-1991-gc5acdb6c8d [http://mirror.fcix.net/alpine/edge/testing]
    OK: 24026 distinct packages available
    fmt:~# apk upgrade
    (1/2) Upgrading xxd (9.0.0999-r0 -> 9.0.1085-r0)
    (2/2) Upgrading vim (9.0.0999-r0 -> 9.0.1085-r0)
    Executing busybox-1.35.0-r29.trigger
    OK: 1089 MiB in 143 packages
    fmt:~# apk add python3
    (1/4) Installing gdbm (1.23-r0)
    (2/4) Installing mpdecimal (2.5.1-r1)
    (3/4) Installing readline (8.2.0-r0)
    (4/4) Installing python3 (3.11.1-r1)
    Executing busybox-1.35.0-r29.trigger
    OK: 1152 MiB in 147 packages
    fmt:~# 
    

    Thanks to @yoursunny for his comment above concerning the Docker install.

    Additional questions and comments on any of today's installs are respectfully requested! Thank you!

    I hope everyone gets the servers they want!

  • @Not_Oles said:

    @terrorgen said:

    @Not_Oles said:

    @terrorgen said:
    The issue in the second link is closed and someone mentioned that they are able to run sh <(curl -L https://nixos.org/nix/install to install nix on their alpine box. However, I am sure you need sudo and the person who installed it would own /nix so it may not work for metalvps if more than one user wants to use it.

    Installing nix using the apk method would end up with an older version of it and I am unsure if it can be upgraded to the latest version.

    The 3rd link hosts a dockerfile to create a docker container of alpine+nix.

    The forth link may be dated since it says it is not possible to run nix in alpine. However, it is dated 2021 and there are at least two instances where nix has successfully worked in Alpine Linux.

    What's your recommendation about what we should do at this time to enable Nix for everyone?

    sudo apk add nix 😝

    Hi @terrorgen!

    Please let us know how well nix works for you.

    According to https://nixos.org/download.html the current version is 2.12.0.

    Here's a link to the Alpine Package Details.

    Everyone please note that I added the community and the testing repositories to /etc/alpine/repositories, which now looks like:

    fmt:~# cat /etc/apk/repositories
    http://mirror.fcix.net/alpine/edge/main
    http://mirror.fcix.net/alpine/edge/community
    http://mirror.fcix.net/alpine/edge/testing
    
    fmt:~# 
    

    Upon logging in again after installing Nix I saw this message:

    Nix: creating /root/.nix-profile
    fmt:~# nix --version
    nix (Nix) 2.11.0
    fmt:~# 
    

    Here is a transcript of the install:

    fmt:~# apk update
    fetch http://mirror.fcix.net/alpine/edge/main/x86_64/APKINDEX.tar.gz
    fetch http://mirror.fcix.net/alpine/edge/community/x86_64/APKINDEX.tar.gz
    fetch http://mirror.fcix.net/alpine/edge/testing/x86_64/APKINDEX.tar.gz
    v3.17.0-1944-g134785e067 [http://mirror.fcix.net/alpine/edge/main]
    v3.17.0-1970-g085f00dedd [http://mirror.fcix.net/alpine/edge/community]
    v3.17.0-1970-g085f00dedd [http://mirror.fcix.net/alpine/edge/testing]
    OK: 24027 distinct packages available
    fmt:~# apk upgrade
    (1/4) Upgrading ca-certificates-bundle (20221203-r0 -> 20221203-r1)
    (2/4) Upgrading ca-certificates (20221203-r0 -> 20221203-r1)
    (3/4) Upgrading ncurses-terminfo-base (6.3_p20221210-r0 -> 6.3_p20221217-r0)
    (4/4) Upgrading ncurses-libs (6.3_p20221210-r0 -> 6.3_p20221217-r0)
    Executing busybox-1.35.0-r29.trigger
    Executing ca-certificates-20221203-r1.trigger
    OK: 150 MiB in 91 packages
    fmt:~# apk add nix
    (1/16) Installing libacl (2.3.1-r1)
    (2/16) Installing libbz2 (1.0.8-r4)
    (3/16) Installing libexpat (2.5.0-r0)
    (4/16) Installing lz4-libs (1.9.4-r1)
    (5/16) Installing libarchive (3.6.2-r1)
    (6/16) Installing boost1.80-context (1.80.0-r4)
    (7/16) Installing libcpuid (0.6.2-r0)
    (8/16) Installing editline (1.17.1-r1)
    (9/16) Installing libgcc (12.2.1_git20220924-r5)
    (10/16) Installing libstdc++ (12.2.1_git20220924-r5)
    (11/16) Installing gc (8.2.2-r0)
    (12/16) Installing libseccomp (2.5.4-r1)
    (13/16) Installing libsodium (1.0.18-r2)
    (14/16) Installing sqlite-libs (3.40.0-r0)
    (15/16) Installing nix (2.11.0-r1)
    Executing nix-2.11.0-r1.pre-install
    (16/16) Installing nix-openrc (2.11.0-r1)
    Executing busybox-1.35.0-r29.trigger
    OK: 168 MiB in 107 packages
    fmt:~# which nix
    /usr/bin/nix
    fmt:~# ls -l /usr/bin/nix
    -rwxr-xr-x    1 root     root       3292400 Oct  9 14:45 /usr/bin/nix
    fmt:~# ls -l / | grep nix
    drwxr-xr-x    4 root     root          4096 Dec 20 22:40 nix
    fmt:~# 
    

    Thank you! looks like I need to be added to the nix group to do anything meaningful :)

    The all seeing eye sees everything...

  • Not_OlesNot_Oles Hosting ProviderContent Writer

    @yoursunny said: User must be in the docker group in order to use Docker.

    Otherwise, all we get is:

    fmt:~$ docker ps
    Cannot connect to the Docker daemon at unix:///var/run/docker.sock. Is the docker daemon running?

    However, adding someone to the docker group is equivalent to granting them root privilege.

    Not trying to argue with you, cuz I admit to being clueless™ about Docker. However, there seems to be: https://docs.docker.com/engine/security/rootless/

    If anybody is interested in running Docker, we can talk about this topic some more.


    @yoursunny said:

    @Not_Oles said:
    Install of LXC
    What additional changes might be required, if any?

    • cgroups user delegation
    • subuid and subgid files
    • network bridge and lxc-usernet file

    Now that I had a moment to think about it, I believe I recall seeing some of this in the LXC install instructions. I will take another look tomorrow.

    Thanks again! Friendly greetings! :)

    I hope everyone gets the servers they want!

  • Not_OlesNot_Oles Hosting ProviderContent Writer

    @terrorgen said: Thank you! looks like I need to be added to the nix group to do anything meaningful

    Hi @terrorgen! You are more than welcome! Can you please give me a specific example of something you want to do that doesn't work? I am confused because the nix binary seems executable by everyone:

    fmt:~# which nix
    /usr/bin/nix
    fmt:~# ls -l $(which nix)
    -rwxr-xr-x    1 root     root       3292400 Oct  9 14:45 /usr/bin/nix
    fmt:~# 
    

    Thanks for any comments and insights! Best wishes! :)

    I hope everyone gets the servers they want!

  • Not_OlesNot_Oles Hosting ProviderContent Writer

    Hi!

    Thanks for the bump! You are right that I missed your comment! So sorry!

    Please try something like:

    ssh [email protected] -p 42365

    Please let us know if you can get in.

    Your password is in a file in your home directory. Please feel free to change it.

    Please feel free to continue posting here in the thread if you have any questions or concerns. We are delighted to have you with us! Welcome to MetalVPS!

    Kindest regards,

    Tom

    Thanked by (1)strongjake1

    I hope everyone gets the servers they want!

  • @yoursunny said: However, adding someone to the docker group is equivalent to granting them root privilege.

    Podman is similar to Docker.
    Without root privilege,maybe we can run container with the Rootless Podman instead of Docker.
    https://github.com/containers/podman/blob/main/docs/tutorials/rootless_tutorial.md

    Thanked by (1)Not_Oles
  • @subenhon said:

    @yoursunny said: However, adding someone to the docker group is equivalent to granting them root privilege.

    Podman is similar to Docker.
    Without root privilege,maybe we can run container with the Rootless Podman instead of Docker.
    https://github.com/containers/podman/blob/main/docs/tutorials/rootless_tutorial.md

    What advantages does podman over docker?
    Even docker offers rootless containers I believe

    @Not_Oles it would be worth a try for rootless docker.

    Thanked by (2)AuroraZero Not_Oles
  • Would love to try the rootles Docker @Not_Oles 😅

    Thanked by (2)AuroraZero Not_Oles
  • @localhost said: What advantages does podman over docker?

    Even docker offers rootless containers I believe

    Rootless Docker can run by one none root user,rootless Podman run by more than one none root user.
    For each user that will be allowed to create containers using Podman.

    Thanked by (2)AuroraZero Not_Oles
  • @Not_Oles said:

    @terrorgen said: Thank you! looks like I need to be added to the nix group to do anything meaningful

    Hi @terrorgen! You are more than welcome! Can you please give me a specific example of something you want to do that doesn't work? I am confused because the nix binary seems executable by everyone:

    fmt:~# which nix
    /usr/bin/nix
    fmt:~# ls -l $(which nix)
    -rwxr-xr-x    1 root     root       3292400 Oct  9 14:45 /usr/bin/nix
    fmt:~# 
    

    Thanks for any comments and insights! Best wishes! :)

    From https://nixos.org/manual/nix/stable/installation/multi-user.html#multi-user-mode, cherry picking information relevant to the discussion here:

    To allow a Nix store to be shared safely among multiple users, it is important that users are not able to run builders that modify the Nix store or database in arbitrary ways, or that interfere with builds started by other users. If they could do so, they could install a Trojan horse in some package and compromise the accounts of other users.

    To prevent this, when a unprivileged user runs a Nix command, actions that operate on the Nix store (such as builds) are forwarded to a Nix daemon running under the owner of the Nix store/database that performs the operation.

    To limit which users can perform Nix operations, you can use the permissions on the directory /nix/var/nix/daemon-socket.

    In alpine, /nix/var/nix/daemon-socket is owned by root:nix, so whoever wanting to run nix would need to be in the nix group.

    Thanked by (1)AuroraZero

    The all seeing eye sees everything...

  • Not_OlesNot_Oles Hosting ProviderContent Writer

    This morning's updates

    fmt:~# apk update
    fetch http://mirror.fcix.net/alpine/edge/main/x86_64/APKINDEX.tar.gz
    fetch http://mirror.fcix.net/alpine/edge/community/x86_64/APKINDEX.tar.gz
    fetch http://mirror.fcix.net/alpine/edge/testing/x86_64/APKINDEX.tar.gz
    v3.17.0-2036-g4061f44197 [http://mirror.fcix.net/alpine/edge/main]
    v3.17.0-2021-g4194554afa [http://mirror.fcix.net/alpine/edge/community]
    v3.17.0-2012-gfe6e7cfb71 [http://mirror.fcix.net/alpine/edge/testing]
    OK: 24067 distinct packages available
    fmt:~# apk upgrade
    (1/3) Upgrading libcurl (7.86.0-r1 -> 7.87.0-r0)
    (2/3) Upgrading curl (7.86.0-r1 -> 7.87.0-r0)
    (3/3) Upgrading boost1.80-context (1.80.0-r4 -> 1.80.0-r5)
    Executing busybox-1.35.0-r29.trigger
    OK: 1152 MiB in 147 packages
    fmt:~# 
    

    :)

    Thanked by (1)AuroraZero

    I hope everyone gets the servers they want!

  • I don't want an account, but I did want to thank @Not_Oles for always being so friendly. Makes me smile seeing how nice you are to everyone here.

    Thanked by (2)AuroraZero yoursunny
  • Not_OlesNot_Oles Hosting ProviderContent Writer

    @fluttershy said: I did want to thank @Not_Oles for always being so friendly. Makes me smile seeing how nice you are to everyone here.

    Hi @fluttershy! Thanks for your kind words! Hope you do not mind, but I couldn't resist adding them to my OP. If you ever decide you want an account, you're more than welcome! Cheers! Tom

    Thanked by (1)fluttershy

    I hope everyone gets the servers they want!

  • Not_OlesNot_Oles Hosting ProviderContent Writer
    edited December 2022

    @terrorgen said:

    @Not_Oles said:

    @terrorgen said: Thank you! looks like I need to be added to the nix group to do anything meaningful

    Hi @terrorgen! You are more than welcome! Can you please give me a specific example of something you want to do that doesn't work? I am confused because the nix binary seems executable by everyone:

    fmt:~# which nix
    /usr/bin/nix
    fmt:~# ls -l $(which nix)
    -rwxr-xr-x    1 root     root       3292400 Oct  9 14:45 /usr/bin/nix
    fmt:~# 
    

    Thanks for any comments and insights! Best wishes! :)

    From https://nixos.org/manual/nix/stable/installation/multi-user.html#multi-user-mode, cherry picking information relevant to the discussion here:

    To allow a Nix store to be shared safely among multiple users, it is important that users are not able to run builders that modify the Nix store or database in arbitrary ways, or that interfere with builds started by other users. If they could do so, they could install a Trojan horse in some package and compromise the accounts of other users.

    To prevent this, when a unprivileged user runs a Nix command, actions that operate on the Nix store (such as builds) are forwarded to a Nix daemon running under the owner of the Nix store/database that performs the operation.

    To limit which users can perform Nix operations, you can use the permissions on the directory /nix/var/nix/daemon-socket.

    In alpine, /nix/var/nix/daemon-socket is owned by root:nix, so whoever wanting to run nix would need to be in the nix group.

    Hi @terrorgen!

    Thanks for your helpful post! What do you and other guys here think of what I did below?

    fmt:~# which usermod
    fmt:~# 
      [Some googling. . . .]
    fmt:~# addgroup
    BusyBox v1.35.0 (2022-11-19 10:13:10 UTC) multi-call binary.
    
    Usage: addgroup [-g GID] [-S] [USER] GROUP
    
    Add a group or add a user to a group
    
            -g GID  Group id
            -S      Create a system group
    fmt:~# ls -l /nix/var/nix/daemon-socket 
    total 0  # Not running now? Does root need to start it? Maybe it starts when someone calls `nix`?
    fmt:~# grep nix /etc/group
    nix:x:102:
    nixbld:x:103:nixbld0,nixbld1,nixbld2,nixbld3
    fmt:~# addgroup terrorgen nix
    fmt:~# grep nix /etc/group
    nix:x:102:terrorgen
    nixbld:x:103:nixbld0,nixbld1,nixbld2,nixbld3
    fmt:~# 
    

    What else needs to be done?

    Best wishes and kindest regards, <3

    Tom

    I hope everyone gets the servers they want!

  • @Not_Oles said: What else needs to be done?

    rc-update add nix-daemon
    rc-service nix-daemon start

    The all seeing eye sees everything...

  • Not_OlesNot_Oles Hosting ProviderContent Writer

    Good morning everyone! Today's updates, including Nix update. Also, I enabled and started nix-daemon per @terrorgen's request. Have a great day! 🌅

    fmt:~# date 
    Thu Dec 22 17:23:36 UTC 2022
    fmt:~# apk update
    fetch http://mirror.fcix.net/alpine/edge/main/x86_64/APKINDEX.tar.gz
    fetch http://mirror.fcix.net/alpine/edge/community/x86_64/APKINDEX.tar.gz
    fetch http://mirror.fcix.net/alpine/edge/testing/x86_64/APKINDEX.tar.gz
    v3.17.0-2106-gf7951d9201 [http://mirror.fcix.net/alpine/edge/main]
    v3.17.0-2103-gd7dea0a02d [http://mirror.fcix.net/alpine/edge/community]
    v3.17.0-2102-gf7dfda6238 [http://mirror.fcix.net/alpine/edge/testing]
    OK: 24085 distinct packages available
    fmt:~# apk upgrade
    (1/20) Upgrading libgcc (12.2.1_git20220924-r5 -> 12.2.1_git20220924-r6)
    (2/20) Upgrading libstdc++ (12.2.1_git20220924-r5 -> 12.2.1_git20220924-r6)
    (3/20) Upgrading libgomp (12.2.1_git20220924-r5 -> 12.2.1_git20220924-r6)
    (4/20) Upgrading libatomic (12.2.1_git20220924-r5 -> 12.2.1_git20220924-r6)
    (5/20) Upgrading mpfr4 (4.1.1-r0 -> 4.1.1-r1)
    (6/20) Upgrading gcc (12.2.1_git20220924-r5 -> 12.2.1_git20220924-r6)
    (7/20) Upgrading libstdc++-dev (12.2.1_git20220924-r5 -> 12.2.1_git20220924-r6)
    (8/20) Upgrading g++ (12.2.1_git20220924-r5 -> 12.2.1_git20220924-r6)
    (9/20) Upgrading libcurl (7.87.0-r0 -> 7.87.0-r1)
    (10/20) Upgrading curl (7.87.0-r0 -> 7.87.0-r1)
    (11/20) Upgrading containerd (1.6.12-r0 -> 1.6.14-r0)
    (12/20) Upgrading containerd-openrc (1.6.12-r0 -> 1.6.14-r0)
    (13/20) Upgrading docker-engine (20.10.21-r2 -> 20.10.22-r0)
    (14/20) Upgrading docker-openrc (20.10.21-r2 -> 20.10.22-r0)
    (15/20) Upgrading docker-cli (20.10.21-r2 -> 20.10.22-r0)
    (16/20) Upgrading docker (20.10.21-r2 -> 20.10.22-r0)
    (17/20) Installing boost1.81-context (1.81.0-r0)
    (18/20) Upgrading nix (2.11.0-r1 -> 2.11.0-r2)  
    (19/20) Upgrading nix-openrc (2.11.0-r1 -> 2.11.0-r2)
    (20/20) Purging boost1.80-context (1.80.0-r5)
    Executing busybox-1.35.0-r29.trigger 
    OK: 1152 MiB in 147 packages
    fmt:~# 
    

    @terrorgen said: rc-update add nix-daemon
    rc-service nix-daemon start

    fmt:~# rc-update add nix-daemon
     * service nix-daemon added to runlevel default
    fmt:~# rc-service nix-daemon start
     * Caching service dependencies ...                                          [ ok ]
     * Starting nix-daemon ...                                                   [ ok ]
    fmt:~# ps | grep nix | grep -v grep
    59122 root      0:00 /usr/sbin/nix-daemon
    fmt:~# 
    

    @terrorgen When you have time, please let us know if Nix now works okay for you. Thank you very much! :)

    I hope everyone gets the servers they want!

Sign In or Register to comment.