The whole promise of #containers and #snap is that applications just work in the sandbox. And then that:
/snap/obsidian/28/app/obsidian: /snap/core20/current/lib/x86_64-linux-gnu/libc.so.6: version `GLIBC_2.33' not found (required by /lib/x86_64-linux-gnu/libcups.so.2)
Can anyone explain to me why the @eff decided to make the default install method of #Certbot on #Linux a #Snap? Among all the other options of distributing a package, why choose the most closed one? Where a single company (Canonical) controls the only available server, and the software of which is even closed source.
@ehrba My answer not as a #GIS professional but enthusiast and long time #Linux user: Any distro you feel comfortable with. If you're expecting the latest releases, try some rolling release. Otherwise, my usual suggestion, #Ubuntu, has been misbehaving a little with #snap (#chrome sometimes not being able to launch or access user's files because of a technical issue), so probably not that. I'm a #Debian user, so my personal suggestion is Debian stable or testing.
I think that #systemd should do package management. I hate when I have to install some software, but it only has a .deb package. I think that a unified packaging format for Linux would be good.
#Flatpak takes a lot of space and doesn't work well with CLI software. #Snap relies on a closed backend and is not very fast.
@linux Sharing a 'small' inconvenience I had to fix with #opensuse#slowroll (I suspect #tumbleweed is the same) - I couldn't launch snaps (spotify, bitwarden) after update - error was: cannot determine seccomp compiler version in generateSystemKey fork/exec /usr/lib/snapd/snap-seccomp: no such file or directory
The fix (I first tried re-installing, didn't work) was to:
a. locate snap-seccomp - was in /usr/libexec/snapd
b. symlink: ln -s /usr/libexec/snapd /usr/lib/snapd
@pastermil@linux the attack surface for something that isn't officially maintained by the developers, and that doesn't have more vetting (e.g. distribution packages) opens up room for malicious actors.
e.g. #arch / #aur recommends verifying scripts manually before installing, and malicious scripts have been found and removed.
There are actors like #jiatan out there. An unofficial #flatpak needs manual verification before install - that's why I just go with #snap if the flatpak isn't official