Heya, folks!

Here is your list of weekly goodness from the team! Still nothing really major as everything for 4.4 is being finalized.

Changes this week include but are never limited to:

  • KDE Gear updated to 23.04.2
  • Update Nemo to latest release
  • Update microdns to latest release
  • Changed default file permissions of /root and $HOME to 0700
  • Patch SDDM to properly source /etc/profile when using ZSH or Fish in a Wayland session
  • Introduced EasyEffects for PipeWire audio effects goodness
  • Miscellaneous package updates

And now, a word from the team: We want YOU! 🫵 We are still looking for assistance in testing Firefox VA-API hardware acceleration! If you would like to aid in testing, please see this issue on our development tracker. Thank you!

That’s a wrap for this week, folks! See you, same place next week!

    just updated and rebooted, thanks for the sync news. yt-dlp, nemo components, viv snapshot, etc all upgraded.

    A very smooth update for me, too. I noticed a lot of upgrades starting with "K."

      EbonJaeger Changed default file permissions of /root and $HOME to 0700

      what does this mean ? what was it before? did it have the wrong permissions before?

        Lucien_Lachance
        It is the default permissions those directories are created with. What it is set to depends on how old your account is but likely 0755

        /root folder change is forced on existing installs. /home/username change is not.

        New users created on existing up to date installs will have the more restrictive permissions but new installs won't unless done with Solus 4.4 and later versions since the older ISOs do not contain those changes.

        What do I need to know

        Your home folder is owned by your own user and group, so for example harvey:harvey

        Octal permissions use numbers to represent permissions. The leading zero in a 4 digit octal is for a special bit which we are not and did not set prior. For simplicity from here on out we will ignore it as unless the value is changing it does not need to be explicitly stated when using chmod

        If the number is 755 that reads owner|group|others
        7 = Read, Write, Execute | 5 = Read, Execute | 5 = Read, Execute

        You can play around with a permissions calculator if you would like to see more possibilities: https://chmod-calculator.com

        First digit is fine of course the owner has full permissions. Second digit is okay but more restrictive is better, in order for someone to be a member of your usergroup you would have to manually add them to it.

        Last digit is troublesome. It is 5 which means any other user account on the system has read & execute permissions to your home directory. Unless of course those files have more restrictive permissions. ~/.ssh/ is more restrictive by default for example.

        You can see your permissions in octal using this command: stat -c "%a %n" /home/username
        (obviously replace username with your actual username).

        If it is not 700 and you would like the more restrictive permissions which I would advise, then run chmod 700 /home/username and you are done.

        If you have no other users on your system there obviously is no issue but I would still advise changing permissions, who knows what the future holds and you might forget.

        EDIT:
        Note if you have samba shares in your home directory this will break it. So default permissions may change again or users will have to learn to change permissions should they want to setup up those shares 🤷‍♂️

        EDIT2:
        We are going 751 (1 is execute) as the default for home dirs to allow samba shares to still work. As always users can set whatever they want if they prefer more restrictive permissions and like I, do not want samba shares inside home.

          Harvey I remember back in the day when I had a shell internet account and got all
          the permissions messed up..
          Had to pay again to get the account reinilized..lol
          ah memories.

          Harvey Note if you have samba shares in your home directory this will break it.

          Will this affect nfs shares that are mounted in /mnt and linked to my home directory with symlinks?

          Just curious, mostly, not terrified. I do know how to use chmod. Should I plan on needing it after I install the new Solus from a new .ISO, or will my having been the one to create the symlinks make that unnecessary?

            WetGeek Will this affect nfs shares that are mounted in /mnt and linked to my home directory with symlinks?

            Depends which permissions you go with for home, if you are the only user accessing it and what permissions you have on the nfs mounts themselves.

            Lets assume your username is wetgeek your home folder is set to 751 User wetgeek owns it so they have full permissions for them nothing has changed. User derek navigates to /home/wetgeek/ they can enter but they will see nothing. However they noticed the permissions and remember the folders path. they can navigate just fine to /home/wetgeek/nfsshare/ and everything is normal.

            This is due to standard Linux folder permissions being 755 and files being644 The 1 allowed them in your home dir and the standard permissions let them do more. You can of course lock down your own sensitive files further while still having 751 set on the home dir but it is more to consider.

            Same scenario but /home/wetgeek is 700 user wetgeek notices nothing different. derek can not enter the folder the end. They could still access it via /mnt/* tho.

            WetGeek Should I plan on needing it after I install the new Solus from a new .ISO, or will my having been the one to create the symlinks make that unnecessary?

            The file / folders owner has full permission so no further steps are required assuming you are happy with the new default.

            The Dev Tracker takes a different account? Well anyway, on the matter of Firefox VAAPI:

            GPU: R9 270X
            DE: Budgie
            System: up to date - stable

            After changes, About:support shows Compositing:Webrender, however all three line under WEBRENDER_COMPOSITOR are blocklisted.

            There is no VAAPI section.

            After starting Firefox, this shows in the console:

            ATTENTION: default value of option mesa_glthread overridden by environment.
            libva info: VA-API version 1.18.0
            libva info: User environment variable requested driver 'radeonsi'
            libva info: Trying to open /usr/lib64/dri/radeonsi_drv_video.so
            libva info: Found init function __vaDriverInit_1_18
            ATTENTION: default value of option mesa_glthread overridden by environment.
            libva info: va_openDriver() returns 0!<

            When going to the page of the Costa Rica video, which was served in VP9/opus, this seemed interesting:

            Utility 5450: MediaSupervisor #1]: D/PlatformDecoderModule Agnostic decoder supports requested type 'audio/opus'
            [RDD 5448: MediaPDecoder #1]: D/PlatformDecoderModule FFVPX: Initialising VA-API FFmpeg decoder
            [RDD 5448: MediaPDecoder #1]: D/PlatformDecoderModule FFVPX: Format vp9 is not accelerated
            [RDD 5448: MediaPDecoder #1]: D/PlatformDecoderModule FFVPX: Initialising FFmpeg decoder
            [RDD 5448: MediaPDecoder #1]: D/PlatformDecoderModule FFVPX: codec vp9 : Google VP9
            [Child 5353: MediaPDecoder #3]: D/PlatformDecoderModule Sandbox RDD decoder supports requested type video/vp9
            [Child 5353: RemVidChild]: D/PlatformDecoderModule RemoteMediaDataDecoder[7f4729e8c350] ::RemoteMediaDataDecoder: 7f4729e8c350 is created
            [RDD 5448: MediaSupervisor #1]: D/PlatformDecoderModule FFmpeg decoder supports requested type 'video/vp9'!<

            According to wikipedia VP9 decode wasn't added by AMD until Raven Ridge APU/RDNA discreet, so sure enough it was software decoding. But it looks from the above that at least part of the process worked.

            Mod edit: Fixed link 🙂

            Not having to install the flatpak version of easyeffects anymore sounds awesome. Thank you!

            • [deleted]

            Introduced EasyEffects for PipeWire audio effects goodness

            That's nice. I was just going to look up how the situation is under Solus, as EasyEffects (formerly PulseEffects) has the legacy maintenance branch for Pulseaudio and the newer one for Pipewire.

            Solus 4.4 Harmony! Yay!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

            Pipewire is activated per default or we have to do something. Because EasyEffects fails to run :

            $ easyeffects 
            
            (easyeffects:480915): easyeffects-ERROR **: 10:04:13.794: 	pipe_manager.cpp:1463	context connection failed
            Trappe pour point d'arrêt et de trace (core dumped)
              • [deleted]

              olivir Pipewire is not enabled by default.