Stefan 'stelb' Le Breton 🇪🇺🇺🇦💚

@stelb
52 Followers
169 Following
422 Posts

:antifa:🇪🇺🇺🇦💚

Sei ein Mensch.

#fckafd #fcknzs

Nerd.
try stuff, break stuff, fix stuff.
mostly DBA, but doing a lot more, Linux, docker, kubernetes, virtualization, storage, network.

githubhttps://github.com/stelb/
LinkedInhttps://www.linkedin.com/in/stefanlebreton
Pixelfedhttps://pixelfed.social/stelb
Mal was mit Steinen und Sand machen..
Die Steine unter der alten Regentonne waren schon ziemlich schief geworden. Frischer Sand runter und mit improvisierter Wasserwaage gerade klopfen.. ausreichend genau für mich, als ahnungslosen 😅 die neue Tonne wackelt auch kein bisschen mehr.

Da wollte ich heute endlich mal an die Zahlungsart #Wero gehen und ZACK, gibt's eins auf die Finger!
Wero wird beworben wie verrückt, aber die Infrastruktur in Form von "Lösungen" fehlt 😲 in unserem Bereich gibt es tatsächlich nur Mollie Payments, die Wero anbieten - das ist alles! PayOne arbeitet noch daran - laut einem Entwickler sollten wir unbedingt Druck machen, sonst geht es da nicht weiter.

Das ist so schade, dass das in den Medien (und Werbe-Plakaten) so falsch dargestellt wird 🤦

Guten Morgen ☕ Zur Frühstückspause wie schon oft in den Kommentaren versprochen, das #MakingOf des 🌈 #Regenbogen Besens 😃
In diesen Schritten wird er gemacht - das geht ja fast schon als ein #ASMR Video durch, oder? 😅 Demnächst gibtsdann Videos von Auffahrt-Fegen statt Mukbang 🍜

Und ich fordere alle Demokraten auf, keine Produkte mehr von diesem Faschisten-Unterstützer mehr zu kaufen!

Wenn den Kollaborateuren die Kohle ausgeht, können sie ihre Millionen und Milliarden auch nicht mehr den Rechtsextremen hinter werfen.

https://mastodon.social/@tonline/116240761237616785

Hackers Expose The Massive Surveillance Stack Hiding Inside Your “Age Verification” Check | Techdirt https://www.techdirt.com/2026/02/25/hackers-expose-the-massive-surveillance-stack-hiding-inside-your-age-verification-check/
Hackers Expose The Massive Surveillance Stack Hiding Inside Your “Age Verification” Check

We’ve been saying this for years now, and we’re going to keep saying it until the message finally sinks in: mandatory age verification creates massive, centralized honeypots of sensitiv…

Techdirt

#Permacomputing is about the future. Old CPUs suck (but can be fun). Permacomputing has little to do with #retrocomputing, except insofar as we can examine our past solutions for synergies and such. And pre-enshittification versions of current software. The rest is nostalgia.

Used gear is the future too. There are so many "adequate" systems made in the last 10 years, alone, that meet most peoples needs.

The only non-enshittified OSes today are *nix OSes; freebsd, netbsd, derivatives, and the various linux.

I run Debian 13, as vanilla as I can get for the least effort involved. But linux/etc today are essentially server-class installs used on the desktop/laptop. OK lots of folk on the fedi lurv to wield complexity for it's own sake and that's fine. And eg. Debian is shockingly, wonderfully reliable and given the underlying complexity, surprisingly easy to install and maintain -- if you have the skills.

But I keep wondering about how much could a linux distro be pared back to cut size and complexity? A brutally stripped distro that runs Libreoffice and not much else; and a fancier one with networking (browser memory hogs).

Is there/are there super low end linux distributions I'm not aware of?

I'm not seeing a lot of traffic about permacomputing that aren't entangled with retrocomputing. I'm hoping that's just a feature of my feeds and follows!

commands for kanidm + bookstack

kanidm create group bookstack_admin

kanidm system oauth2 create-claim-map bookstack bookstack_roles bookstack_admin admin

kanidm system oauth2 update-scope-map bookstack bookstack_users email groups openid profile bookstack_roles

kanidm group add-members bookstack_admin stelb

Environment for bookstack:
OIDC_USER_TO_GROUPS=true
OIDC_GROUPS_CLAIM=bookstack_roles
OIDC_REMOVE_FROM_GROUPS=true

#iam #idm #oauth2 #roles #claim-map #kanidm

I did this for bookstack with kanidm
Given the oauth2 app is 'bookstack':
map claims (roles in bookstack, say admin)
to scopes and groups in IAM, e.g. bookstack_roles and bookstack_admin

add the scope to the oauth2 application

assign users to these groups as needed.

configure app which scope to use for roles

#iam #idm #oauth2 #roles #claim-map #kanidm

Ok, first time I tried to use a custom scope to map oauth2 users to application specific roles.
Followed some sample and I just replaced names.
Working with one role.. adding another. Both roles not working anymore.
Reading more theory about scopes and claims did help to understand (oh well 🙈)
It's actually not that complicated 🤓
Both roles working now. Writing up some docs and adding another 2 roles is planned for tomorrow.
#oauth2 #idm #kanidm

Kaniop is a Kubernetes operator written in Rust for managing Kanidm identity management clusters, providing declarative identity management through GitOps workflows

https://ku.bz/D1JBBy0B3

GitHub - pando85/kaniop: Kubernetes operator for managing Kanidm

Kubernetes operator for managing Kanidm. Contribute to pando85/kaniop development by creating an account on GitHub.

GitHub