Skip to content

soaringDistributions/site_distLLC

Repository files navigation

Soaring Distributions LLC

https://bit.ly/distllc ( https://soaringdistributions.github.io/site_distLLC/ )

Markings

Please mark physical copies of Linux. Do NOT run NVIDIA hardware with Linux and then redistribute that copy.

Authentic Software

Official publicly accessible locations of Soaring Distributions LLC are 

normally HTTPS or similarly provable sites controlled by Soaring Distributions LLC.

https://u298813-sub*.your-storagebox.de https://u298813-sub7.your-storagebox.de (hosted by Hetzner)

https://github.com/soaringDistributions https://soaringDistributions.github.io/site_distLLC (hosted by GitHub)

Unless officially and provably directed to do so by authorized personnel of Soaring Distributions LLC (ie. manager of Soaring Distributions LLC, mirage335), or unless the products are provably identical, Soaring Distributions LLC cannot reasonably guarantee similar expectations for products obtained from other locations.

Products - End User

Username u298813-sub7 Password wnEtWtT9UDyJiCGw

 
 

 

 

 

Installing some of these products correctly may require 'Run as Administrator', 'sudo', or similar.

Products - Developer

Username   u298813-sub7
Password   wnEtWtT9UDyJiCGw
 
 

 

https://u298813-sub7.your-storagebox.de/mirage335KernelBuild/linux-lts-amd64
-debian.tar.gz

https://u298813-sub7.your-storagebox.de/mirage335KernelBuild/linux-mainline-
amd64-debian.tar.gz

https://u298813-sub7.your-storagebox.de/ubcp/

https://u298813-sub7.your-storagebox.de/ubcp/package_ubiquitous_bash-msw-rot
ten.7z

https://u298813-sub7.your-storagebox.de/ubcp/package_ubcp-core.7z

https://github.com/soaringDistributions/ubDistBuild/raw/main/_lib/custom/pac
kage_kde.tar.xz

Other

Username u298813-sub10 Password OJgZTe0yNilixhRy

Public files not officially at a 'release' directory may be automatically generated, mostly for diagnostics. Usually, not expected useful for developer or end user. Completeness and notability may not be expected.

Usage

Files may be downloaded from command-line.

 rm package_image.tar.xz* ; wget --user u298813-sub7 --password wnEtWtT9UDyJiCGw 'https://u298813-sub7.your-storagebox.de/ubDistBuild/package_image.tar.xz'
 rm package_image.tar.xz* ; axel -n 12 -H "Authorization: Basic "$(echo -n "u298813-sub7:wnEtWtT9UDyJiCGw" | openssl base64) 'https://u298813-sub7.your-storagebox.de/ubDistBuild/package_image.tar.xz'
 rm package_image.tar.xz* ; export http_proxy='http://IP.ADDR:PORT' ; export all_proxy=$http_proxy ; export https_proxy=$http_proxy ; export ftp_proxy=$http_proxy ; export HTTP_PROXY=$http_proxy ; export HTTPS_PROXY=$http_proxy ; export FTP_PROXY=$http_proxy ; aria2c -x10 -s10 --http-user="u298813-sub7" --http-passwd="wnEtWtT9UDyJiCGw" 'https://u298813-sub7.your-storagebox.de/ubDistBuild/package_image.tar.xz'

Please use 'wget' . Beware 'axel', 'aria2c', etc, are STRONGLY DISCOURAGED for shell scripts - may not be available, may overwhelm servers with parallel downloads, and may severely degrade network latency backoff algorithms.

ubDistBuild

May be written to disk. For servers, beware, cloud-init data source may not be configured, SSH may not be installed/enabled by default, SSH password login may be disabled, SSH public keys may not be installed/enabled, cloud utils (ie. hc-utils) may not be installed, qemu agent may not be installed, and 'rootGrab' may be an undesired default. Usually, some effort nevertheless has been made to prevent cloud integration issues with 'ubDistBuild' pre-built images.

apt-get update -y
apt-get install -y sudo gparted xinit
apt-get install -y x11vnc tigervnc-viewer
apt-get install -y tigervnc-*
apt-get install -y xz-utils
echo 'xterm -geometry +1+1 -n login -display :0' > ~/.xinitrc

mkdir -p /mnt/temp
mount /dev/sda1 /mnt/temp

mkdir ./cloud.cfg.d
cp /mnt/temp/etc/cloud/cloud.cfg.d/*hetzner* ./cloud.cfg.d/
cp /mnt/temp/root/.ssh/authorized_keys ./


umount /mnt/temp

wget -qO- --user u298813-sub7 --password wnEtWtT9UDyJiCGw 'https://bit.ly/ubDistBuildImg' | xz -d | tar -xv --occurrence ./vm.img -O | dd of=/dev/sda bs=1M status=progress


printf "fix\n" | parted ---pretend-input-tty /dev/sda print
parted -s -a opt /dev/sda "print free" "resizepart 5 100%" "print free"
mount /dev/sda5 /mnt/temp
df -h /mnt/temp
btrfs filesystem resize max /mnt/temp
df -h /mnt/temp

mkdir -p /mnt/temp/etc/cloud/cloud.cfg.d
cp ./cloud.cfg.d/* /mnt/temp/etc/cloud/cloud.cfg.d/
cp ./authorized_keys  /mnt/temp/root/.ssh/authorized_keys
chmod ugoa-x /mnt/temp/root/_rootGrab.sh

umount /mnt/temp

startx
# ...
vncf <ip.addr>
# ...
sudo -n gparted

Scripts from ubDistBuild repository are able to customize and convert such images.

_gitBest clone --recursive --depth 1 git@github.com:soaringDistributions/ubDistBuild.git
cd _local
wget --user u298813-sub7 --password wnEtWtT9UDyJiCGw 'https://u298813-sub7.your-storagebox.de/ubDistBuild/package_image.tar.xz'
tar xf package_image.tar.xz
cd ..

# Edit 'ops.sh' from 'ops.example.sh'.
./ubiquitous_bash.sh _create

./_nouveau_enable
./_convert

Instructions (Similar Near Equivalent), Ingredients

Soaring Distributions LLC products may include other products of Soaring Distributions LLC, or other information from others (eg. 'ubiquitous_bash' by manager mirage335. Mostly, but not necessarily entirely, as briefly described here.

ubDistBuild

Instructions

Similar near equivalent usually installable within a dist/OS . Beware swap may be enabled by default (especially if <3GB RAM detected), and reboot may be necessary to enable all features as expected. Virtual Terminal (ie. 'chvt 2' or 'Ctrl+Alt+F2' if usable) or SSH session may be required, as the display manager (eg. sddm) may be stopped as necessary.

apt-get install -y sudo
apt-get install -y build-essential
apt-get install -y linux-headers-$(uname -r)

wget https://bit.ly/getNvSh
chmod u+x getNvSh
./getNvSh _install

wget https://bit.ly/rotInsSh
chmod u+x rotInsSh
./rotInsSh _custom_kernel
./rotInsSh _install_and_run

# optional
./rotInsSh _custom_core_drop



#_mustBeRoot
#cd /root

wget https://bit.ly/rootGrabSh
mv rootGrabSh _rootGrab.sh
chmod u+x _rootGrab.sh
./_rootGrab.sh _hook
echo > /regenerate_rootGrab
./_rootGrab.sh __grab_hook



echo > /regenerate
reboot
Cloud-Init scripts may exist to automatically effect similar near
equivalent results on top of cloud providers (eg. Hetzner, Vultr,
DigitalOcean, etc) dist/OS, custom, etc. Some may be specialized (eg. to
quickly create a 'croc' relay). Beware some cloud providers (eg.
Azure) may significantly price bandwidth/usage.

Ingredients

Image created with dd, parted, chroot, debootstrap, qemu, etc .

 
 
Software installed by scripts.

 
 

Plain Text

An essentially plain text copy of this document is normally available as 

'README.sh.out.txt' , generated by 'scriptedIllustrator'.

Assistive technologies may be able to more usefully parse this.

Free/Libre and Open Source Software (FLOSS)

Most if not all software from Soaring Distributions LLC is Free/Libre and 

Open Source Software.

Please see included software licenses.

Distributing individual files or pieces of files without other relevant information (ie. without corresponding source code) may not be possible.

Some software may be created by Soaring Distributions LLC manager, mirage335, for and on behalf of Soaring Distributions LLC.

Sponsoring

Soaring Distributions LLC may not have much to give, but those who ease moving virtual machine disk images and such, or reduce to need to do so, are very greatly appreciated, and very relevant to the purpose of Soaring Distributions LLC as well as to users of its products. Soaring Distributions LLC normally regards such as charitable contributions that are expected to reduce its own risks from fewer than desired affordable (ie. $$$/GB transferred and $$$/GB stored) file transfer resources. Soaring Distributions LLC is also concerned about end-users having sufficiently usable file transfer resources for their own use and modification of products. Soaring Distributions LLC recoginzes it is part of a technology ecosystem, which must remain healthy.

*) Croc ( https://github.com/schollz ) is especially appreciated for the ability to immediately transfer such things as shell scripts, installers, or maybe even occasional compressed VirtualMachine images.

Script Consumers

Some scripts may download products of Soaring Distributions LLC for 

internal use, developers, end users, etc. If public services of Soaring Distributions LLC change, adding such new upstream information may be necessary. Some of these may be known to and/or used by Soaring Distributions LLC internally.

*) ubiquitous_bash - ubiquitous_bash/_lib/kit/install/cloud/cloud-init/zRotten/zMinimal *) https://github.com/soaringDistributions/ubDistFetch *) https://github.com/soaringDistributions/ubDistBuild

Safety

Pre-built disk images are a last resort, mostly for diagnostics with 

physical access and for embedded. If your cloud provider has 'cloud-init' or similar, prefer that, instead of pre-built desktop/VM disk images.

Passwords, SSH identity, OpenSSL self-signed certificates, etc, may not be different for copies of pre-built images, in spite of some efforts by Soaring Distributions LLC to remove such. Change if this may be an issue (ie. if network login may be possible through SSH, CUPS, SAMBA, etc). Scripts (ie. 'rotten_install.sh' by manager 'mirage335') may be able to set these randomly.

Passwords may be set randomly, to disable login except by autologin or cloud provider. Locking a desktop session (eg. with "Ctrl+Alt+L") may not be easily reversible.

Copy-On-Write nesting performance issues and log tree corruption issues with btrfs root filesystem, while expected not substantially consequential (ie. still on par with ext4), may be possible. At some risk, ' btrfs rescue zero-log /dev/sdX ' or similar may force continued booting of a btrfs filesystem with log tree corruption.

NVIDIA

Users of NVIDIA hardware may require an internet connection or similar 

convenience to download software, may have to run software theirselves, and by running that software, may create resulting software that is not distributable. Whether any recent announcements of supposed offical open-source NVIDIA kernel drivers may result in distributable relevant software may not be yet known.

A syscall exception may be what allows distribution of NVIDIA proprietary binary Linux modules at all. Or, so long as NVIDIA can dubiously claim their proprietary binary driver for Linux may not be a derived work of a GPLv2 licensed Linux kernel, NVIDIA may argue that an 'attempt otherwise to' 'sublicense' the Linux kernel has not occurred, and thus NVIDIA may claim their rights did not yet 'automatically terminate'. Supplementing that, NVIDIA may claim the structure of their proprietary binary driver for Linux makes only the compiled combination of Linux kernel, 'glue layer', and proprietary binary blob a derived work of Linux and not distributable.

A United States court might usefully settle this continuing derived work GPLv2 copyright issue, which apparently has not been raised as of 2022.

Apparent absence of distribution of LiveCD/LiveUSB images with NVIDIA drivers precompiled is strong evidence of a consensus demonstrating obviousness the compiled combination of Linux kernel, 'glue layer', and proprietary binary blob, is definitely a derived work of Linux and is definitely NOT distributable.

Meanwhile, Soaring Distributions LLC attempts to at least follow best usual (eg. commercial) practices, or better.

Soaring Distributions LLC is at least reluctant if not unwilling to itself distribute software which includes what may be found derived works that create binary Linux kernel modules. Soaring Distributions LLC does NOT expect to ever have itself distributed a compiled combination of Linux kernel, 'glue layer', proprietary binary blob, etc.

COMPLAINTS should NOT be directed to Soaring Distributions LLC. Neither Soaring Distributions LLC nor manager mirage335, caused or intended to cause, any 'attempt otherwise to' 'sublicense' the Linux kernel. Instead, send such complaints to responsible parties who may have made the 'attempt otherwise to' 'sublicense' the Linux kernel in violation of the GPLv2 copyright license, or may have knowingly caused others to do so (eg. at least NVIDIA, complicit distributors including Debian, Ubuntu, OEMs, etc).

To the extent legally possible, Soaring Distributions LLC should be reasonably expected to publish, and specifically make relevant third-parties aware of, any such notices.

Soaring Distributions LLC may not yet on its own have sufficient information, understanding, knowledge of precedent, or representation, to prove, but does not discount, that responsible parties (eg. at least NVIDIA, complicit distributors including Debian, Ubuntu, OEMs, etc) committed or knowingly caused coercive, flagrant, willful, commercially gainful to the extent of many years and multiple billions of dollars, violation of the GPLv2 copyright license of the Linux kernel. Soaring Distributions LLC however, far downstream of those originating distributors, itself benefiting from and using the protections of GPL/AGPL copyright license, having no expected interest in weakening those protections, is at most a victim, not in any way a knowing cause of GPLv2 copyright violation.

If Soaring Distributions LLC distributes software which users may run to receive and run software from third-party distributors, which may create not distributable software, and if this is perceived as some issue, any 'cease-and-desist' should then in that case be sent directly to relevant third-party distributors (ie. NVIDIA, Debian, Ubuntu, OEMs, etc), NOT to Soaring Distributions LLC itself.

Reference

https://en.wikipedia.org/wiki/Series_of_tubes

https://xkcd.com/949/ 'I like how we've had the internet for decades, yet "sending files" is something early adopters are still figuring out how to do.' Still very much an issue in 2022. Is there really a good reason for that?

https://xkcd.com/license.html 'Creative Commons Attribution-NonCommercial 2.5 License.'

dutchcoders/transfer.sh#181 Apparently the limit was reduced from unlimited, to 10GB, to 1GB, to <<1GB, specifically to prevent "sending files" . Does the absence of such basic internet functionality for developers really benefit anyone?

schollz/croc#437 'Croc freezes/stalls during large file transfer'

schollz/croc#453

http://ipw2100.sourceforge.net/firmware_faq.php

https://en.wikipedia.org/wiki/Open_source_license_litigation https://slashdot.org/story/06/05/14/2059242/kororaa-accused-of-violating-gpl 'When someone takes that same compiled glue plus binary module and distributes them, they're distributing a derived work of Linux, without complying with the terms of the GPL, and therefore without permission to distribute under copyright law. '

https://www.gnu.org/licenses/old-licenses/gpl-2.0.html https://www.quora.com/Are-lifetime-contracts-legal 'lifetime contracts' 'unconscionable'

https://en.wikipedia.org/wiki/Free_and_open-source_graphics_device_driver#AT I_and_AMD https://en.wikipedia.org/wiki/GNU_General_Public_License#Linking_and_derived _works https://tldp.org/HOWTO/Module-HOWTO/copyright.html https://arstechnica.com/information-technology/2006/12/8428/

https://gitweb.gentoo.org/repo/gentoo.git/tree/x11-drivers/nvidia-drivers/nv idia-drivers-510.60.02.ebuild http://gpo.zugaina.org/AJAX/Ebuild/53561524/View 'SRC_URI' 'https://us.download.nvidia.com/XFree86/Linux-x86_64/${PV}/NVIDIA-Linux- x86_64-${PV}.run' ie. https://us.download.nvidia.com/XFree86/Linux-x86_64/510.60.02/NVIDIA-Linux-x 86_64-510.60.02.run

https://wiki.gentoo.org/wiki/NVIDIA/nvidia-drivers 'wrapper functions that will compile against the Linux kernel'

https://opensource.stackexchange.com/questions/1477/do-i-have-to-disclose-th e-source-code-of-a-linux-driver-i-have-not-developed 'But, if the driver doesn't directly link to the kernel, that may not apply. I remember in the past some graphics drivers (I think NVidia, but aren't sure) had two parts. One GPL-part included in the kernel and offering an interface for the second part, that was proprietary. I don't know how legally stable this construct is, but it may work.'

https://www.kernel.org/doc/html/latest/process/license-rules.html 'GPL-2.0, with an explicit syscall exception'

https://www.nvidia.com/en-us/drivers/geforce-license/ 'Linux/FreeBSD Exception. Notwithstanding the foregoing terms of Section 2.1.1, SOFTWARE designed exclusively for use on the Linux or FreeBSD operating systems, or other operating systems derived from the source code to these operating systems, may be copied and redistributed, provided that the binary files thereof are not modified in any way (except for unzipping of compressed files).'

https://packages.debian.org/es/bullseye/firmware-ipw2x00 https://packages.debian.org/es/bullseye/arm/firmware-ivtv

https://unix.stackexchange.com/questions/61461/how-to-extract-specific-files -from-tar-gz https://superuser.com/questions/655739/extract-single-file-from-huge-tgz-fil e https://serverfault.com/questions/870594/resize-partition-to-maximum-using-p arted-in-non-interactive-mode https://www.thegeekdiary.com/how-to-resize-expand-a-btrfs-volume-filesystem/

https://stackoverflow.com/questions/57496500/how-to-script-automatic-task-wi th-parted-update-gpt-table

Copyright

This file is part of site_distLLC

site_distLLC is free software: you can redistribute it and/or modify it under the terms of the GNU Affero General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.

site_distLLC is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more details.

You should have received a copy of the GNU Affero General Public License along with site_distLLC If not, see <http://www.gnu.org/licenses/>.

About

Site of Soaring Distributions LLC .

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages