▲ | sho_hn 4 days ago | ||||||||||||||||||||||||||||||||||||||||
It doesn't necessarily take much hackability away. You might find it makes it easier. You can overlay changes to the read-only rootfs using the sysext mechanism. You can load and unload these extensions. This makes experiments or juggling debug stuff a lot easier than mucking about in /usr used to be. A lot of KDE Linux is about making updates and even hackability safe in terms of making things trivial to roll back or remove. A goal is to always be able to unwedge without requiring a reinstall. If you know you can overlay whatever over your /usr and always easily return to a known-good state, hackability arguably increases by lowering the risk. | |||||||||||||||||||||||||||||||||||||||||
▲ | RossBencina 4 days ago | parent | next [-] | ||||||||||||||||||||||||||||||||||||||||
This overlay feature sounds attractive. It bothers me that there is no easy traceability or undoability when I perform random system-level Ubuntu configuration file edits to make things work on my system. Maybe I'm doing it wrong. Sure I could do the professional sysadmin thing and keep a log book of every configuration change, or maybe switch to NixOS and script all my configuration changes, but something with lower effort would be welcome. Ideally you want the equivalent of "git commit -m<explanation>", "git diff" and "git log" for every change you make to system configuration. | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
▲ | seba_dos1 3 days ago | parent | prev [-] | ||||||||||||||||||||||||||||||||||||||||
> It doesn't necessarily take much hackability away. It doesn't, though - as evidenced by my Steam Deck - it adds enough friction to make me not bother most of the time. |