Page 11 of 20

2020 Updated Nemesis Base Modules

Posted: 01 Jun 2020, 08:52
by ncmprhnsbl
M. Eerie wrote:
28 May 2020, 20:12
Does pman works for you? I'm having troubles pinging to the router resulting in:
seems to be ok here..
M. Eerie wrote:
28 May 2020, 20:12
Also, does pkg2xzm manage new *.zst packages?
yeah, no.. because arch's build of file doesn't handle -z(uncompress) option with zstd archives, which is kind of stupid since they've adopted zstd for their packaging(ironically slackware's file has no such problem) .. so, for the moment, a workaround would be to disable the checking section: ie. comment lines 19~

Code: Select all

[ ! -e $pkg ] && { echo "`gettext "File does not exist."`"; exit 1; }
ftype=`file -bz $1`
[[ ! `grep -o "POSIX tar" <<<$ftype` ]] || [[ ! `grep -o "XZ compressed" <<<$ftype` ]] && bad=0

[ "$bad" ] && { echo "`gettext "This does not appear to be an arch package."`"; exit; }
or maybe something like:

Code: Select all

ftype=`file -b $1`
[[ ! `grep -o "XZ compressed" <<<$ftype` ]] && [[ ! `grep -o "Zstandard compressed data" <<<$ftype` ]] && bad=0
not great but unless your using a * in a dir of random pkgs and other archives, shouldn't be a problem..

2020 Updated Nemesis Base Modules

Posted: 16 Sep 2020, 06:20
by ncmprhnsbl
2020-09-16
base modules updated with latest package versions.
notes:
core:
js60 > js68
replaced libutil-linux with util-linux-libs
replaced opensysusers with esysusers
replaced opentmpfiles with etmpfiles
pkg2xzm should work for zst pkgs( just commented the file type check, as per above^)

gui:
xorg-fonts-alias replaced with xorg-fonts-alias-misc

added to xtra:
rav1e, l-smash (new ffmpeg deps)
pulseaudio, alsa-plugins, alsa-topology-conf, alsa-ucm-conf, rtkit, pulseaudio-alsa (was having trouble with audio, basicly threw a bunch of stuff at it)

2020 Updated Nemesis Base Modules

Posted: 25 Sep 2020, 17:25
by raja
After recent update...

following errors noticed during boot.. in rc.log

Code: Select all

 * Setting up tmpfiles.d entries ...
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /var during canonicalization of /var.
Detected unsafe path transition /  /var during canonicalization of /var/lib.
Detected unsafe path transition /  /run during canonicalization of /run.
Detected unsafe path transition /  /run during canonicalization of /run/lock.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /run during canonicalization of /run.
Detected unsafe path transition /  /run during canonicalization of /run.
Detected unsafe path transition /  /run during canonicalization of /run.
Detected unsafe path transition /  /var during canonicalization of /var.
Detected unsafe path transition /  /run during canonicalization of /run.
Detected unsafe path transition /  /run during canonicalization of /run/sudo.
Detected unsafe path transition /  /var during canonicalization of /var.
Detected unsafe path transition /  /var during canonicalization of /var.
Detected unsafe path transition /  /var during canonicalization of /var.
Detected unsafe path transition /  /var during canonicalization of /var.
Detected unsafe path transition /  /tmp during canonicalization of /tmp.
Detected unsafe path transition /  /tmp during canonicalization of /tmp.
Detected unsafe path transition /  /tmp during canonicalization of /tmp.
Detected unsafe path transition /  /tmp during canonicalization of /tmp.
Detected unsafe path transition /  /tmp during canonicalization of /tmp.
 [ !! ]
 * ERROR: opentmpfiles-setup failed to start
boot-network-setup Line 73: Started dhcpcd on all interfaces

ERROR in boot-network-setup on line 74:
Could not start dhcpcd

Code: Select all

Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /var during canonicalization of /var.
Detected unsafe path transition /  /var during canonicalization of /var/lib.
Detected unsafe path transition /  /run during canonicalization of /run.
Detected unsafe path transition /  /run during canonicalization of /run/lock.
Detected unsafe path transition /  /etc during canonicalization of /etc.
Detected unsafe path transition /  /run during canonicalization of /run.
Detected unsafe path transition /  /run during canonicalization of /run.
Detected unsafe path transition /  /run during canonicalization of /run.
Detected unsafe path transition /  /var during canonicalization of /var.
Detected unsafe path transition /  /run during canonicalization of /run.
Detected unsafe path transition /  /run during canonicalization of /run/sudo.
Detected unsafe path transition /  /var during canonicalization of /var.
Detected unsafe path transition /  /var during canonicalization of /var.
Detected unsafe path transition /  /var during canonicalization of /var.
Detected unsafe path transition /  /var during canonicalization of /var.
Detected unsafe path transition /  /tmp during canonicalization of /tmp.
Detected unsafe path transition /  /tmp during canonicalization of /tmp.
Detected unsafe path transition /  /tmp during canonicalization of /tmp.
Detected unsafe path transition /  /tmp during canonicalization of /tmp.
Detected unsafe path transition /  /tmp during canonicalization of /tmp.
 [ !! ]
 * ERROR: opentmpfiles-setup failed to start
 * Starting local ...
 [ ok ]

rc default logging stopped at Fri Sep 25 00:34:17 2020
However, system boots to desltop.

2020 Updated Nemesis Base Modules

Posted: 27 Sep 2020, 04:28
by ncmprhnsbl
raja wrote:
25 Sep 2020, 17:25
following errors noticed during boot.. in rc.log
thanks for reporting :)
i think this might be because of the root (/) filesystem somehow picking up a sticky(t) tag in it's permissions( check: stat / )
havn't tracked down how this happened, but have reuploaded 001, 002s, and 05-devel with permissions fixed(755), and the rc.log on my test run looked ok.. also seemed to fix broken /bin /sbin /lib /lib64 links that i had noticed..

2020 Updated Nemesis Base Modules

Posted: 30 Sep 2020, 10:39
by raja
As you said strict implementation of permissions, was the cause. I continued to get those errors with modified 001 & 002.

I keep porteus folder, as r-w-x for guest, for my convenience. So I added , 'norootcopy' to boot parameter and all those error messages in rc.log vanished.

Thanks.

I went through ' Gentoo' forum, regarding conversion of Systemd* to Openrc init. Purpose is to modify Neko's Aporteus to Openrc. I collected a list of files that may be required from Nemisis OS and try with a boot parameter, init=/usr/bin/openrc-init.

Request: As an expert, thorough with internals of this init, can you please make a xzm module with all needed files.
Not so urgent. An experiment!

* Systemd has problem in unmounting all drives in use and modules in tmpfs in memory cleanly, leaving dirty message, during shutdown.

2020 Updated Nemesis Base Modules

Posted: 04 Oct 2020, 09:01
by Blaze
ncmprhnsbl, with a new Nemesis base - I can't boot it.
MyXorg log https://pastebin.com/e7tBNPgc

2020 Updated Nemesis Base Modules

Posted: 04 Oct 2020, 12:38
by ncmprhnsbl
Blaze wrote:
04 Oct 2020, 09:01
with a new Nemesis base - I can't boot it.
looks like we're missing vulkan-icd-loader : a mesa dep..
you can try:
1. boot to text
2. do: pacman -Sy vulkan-icd-loader
3. and then startx
raja wrote:
30 Sep 2020, 10:39
Request: As an expert, thorough with internals of this init, can you please make a xzm module with all needed files.
Not so urgent. An experiment!
:) expert? me? i'll see what i can do ... i suspect there may differences in the initrd.xz too.. eg. i think aporteus is mounting it's modules in /run/ somewhere...

2020 Updated Nemesis Base Modules

Posted: 04 Oct 2020, 13:08
by Blaze
ncmprhnsbl, well, but setup-pman and pacman does not work for me :D

2020 Updated Nemesis Base Modules

Posted: 08 Oct 2020, 11:10
by Kulle
nemesis WiFi problem !

I've downloaded from mediafire
nemesis-xfce-20.02.04-x86_64.iso
I've tried it.
startup is very fast.

But there is a WIFI problem:
WiFi has been detected and the wireless network connection is active after entering the password.
But then:
When using the browser: Error message "This site can’t be reached https://google.com/ is unreachable"
What can that be??

2020 Updated Nemesis Base Modules

Posted: 11 Oct 2020, 06:40
by ncmprhnsbl
updated base modules 2020-10-11
core:
now js78
added libxcrypt (needed for perl)
pkgs updated
gui:
added vulkan-icd-loader (missing mesa dep)
pkgs updated
xtra:
pkgs updated
devel:
pkgs updated
xfce:
added:
libappindicator-gtk3
libdbusmenu-glib
libdbusmenu-gtk3
libindicator-gtk3
:needed for nm-applet
Kulle wrote:
08 Oct 2020, 11:10
nemesis-xfce-20.02.04-x86_64.iso
can only suggest: install it and update the base modules

2020 Updated Nemesis Base Modules

Posted: 11 Oct 2020, 08:19
by Kulle
Hi ncmprhnsbl,

I have now everything updated (Date: 20201011)
Also kernel (000-kernel-5.4.16.xzm ) und vmlinuz
But the error remained!

By the way:
Exactly the same error also with a new German Porteus (based now on Porteus 5.0rc1), see here #239 :
Porteus linux on the net or on the waves of the web
#239
This is very strange!
With all other Porteus versions that I have tried on my notebook so far, this strange error has never occurred.

2020 Updated Nemesis Base Modules

Posted: 11 Oct 2020, 11:55
by beny
hi kulle you connect to wifi with what: wicd or other one, you are sure that the radio is on,and if you don't use wicd maybe is useful to install iw to set up your wifi device.

2020 Updated Nemesis Base Modules

Posted: 11 Oct 2020, 12:04
by Blaze
Download ISO nemesis-xfce-20.10.11-k5.4.50-x86_64.iso (Arch Linux version of Porteus)
http://www.mediafire.com/file/z7aa9e5fj ... 4.iso/file
Image

2020 Updated Nemesis Base Modules

Posted: 12 Oct 2020, 09:06
by M. Eerie
Hi guys.

@Blaze @beny @ncmprhnsbl and @anyone interested:

I've been using this script to update nemesis base modules, but it's not working 100%.

Until now, this method works pretty well while updating xtra, gui and xfce base modules.

However, core one is another matter. Maybe because it has some key files that need to survive the --overwrite pacman switch. Perhaps --force instead would do the trick, or maybe using pacman -U instead of pacman -S, but I'm stuck and need some help.

Can anyone give a hand?

Thanks so much.

Cheers!

Script follows:

Code: Select all

#!/bin/bash
# Update NEMESIS base modules ( $PORTDIR/base )
# <https://forum.porteus.org> 

HERE="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )"
warn() { echo; echo "$(tput setaf 1) $1 $(tput sgr0)"; echo; }
confirm() { echo; tput setaf 6; read -n1 -rsp "$1"; tput sgr0; echo -e "\n"; [[ $REPLY = [Yy] ]]; }

[ ! $(grep -o 'base' /proc/cmdline) ] && echo "Please init Nemesis with **Always Fresh** boot paramaters" && exit 0;
[ ! $EUID != 0 ] || sudo $(basename $0)

the_end() {
	if [ $? == 0 ]; then
		dir2xzm /tmp/LOCALES /tmp/LOCALES.xzm
		mv /tmp/'*.xzm' $HERE
		cd /tmp; rm -r LOCALES $outMOD >/dev/null 2>&1
		echo -ne "  All Done! \n Your files are here: $HERE"
	else 
		warn " Aborted. Exit code: $?"
	fi
	unset patches HERE outMOD
	eval "exit $?"
}
trap the_end SIGHUP SIGINT SIGTERM

fixPERMS() {
	chmod -f 750 $1/root #$1/etc/sudoers.d/ $1/etc/openvpn/client/ $1/etc/openvpn/server/
	chmod -f 755 $1/etc $1/etc/local.d $1/usr $1/usr/local $1/usr/local/bin
	find $1/usr/share/icons -type d -exec chmod 755 {} + >/dev/null 2>&1
	find $1/usr/share/icons -type f -exec chmod 644 {} + >/dev/null 2>&1
}

prepareSYS() {
fixPERMS ""

[ $(pacman -Qu | wc -l) == 0 ] || {
	setup-pman # WORKAROUND In case setup-pman fails --> "Please ensure you have a connection and try again. Exit code: 1"
	if [ $? == 1 ]; then
		pacman-db-upgrade && pacman -Sy
		haveged; sleep 3; pacman-key --init; pacman-key --populate archlinux artix; pkill haveged; update-ca-trust;
	fi
	pacman -Syyu --overwrite '*'
	touch /tmp/dbDONE ### avoid iterations
	}
	echo "  System updated!"; echo
}

updateBASE() {
	[ -f /tmp/dbDONE ] || prepareSYS
	[ ! -d /tmp/LOCALES ] && mkdir -p /tmp/LOCALES
	PS3=$'\n'$'\e[00;36mPlease, select base module to update or exit (1-5): \e[0m'
	select outMOD in core gui xtra xfce exit
	do
		patches=""
		case $outMOD in
			core) patches="{archlinux,artix}-{keyring,mirrorlist}";;
			 gui) patches="";;  #TODO Could be used to interact with the user adding new deps
			xtra) patches="";;
			xfce) patches="";;
			exit*) the_end;;
		esac
	outMOD="$(basename $(ls -1 $PORTDIR/base | grep -i $outMOD) | cut -d- -f-2)"
	break
	done

cd /tmp
	unsquashfs -f -d $outMOD $PORTDIR/base/$outMOD*
	fixPERMS "$outMOD"

### PATCH CORE MODULE. TRICKY ONE AND NOT 100% WORKING AS post transactions hooks (eudev, openrc...) need to run in real root environment, (mountpoints, etc.)
	if [ $outMOD == "001-core" ]; then
		pacman -Rddr $outMOD {archlinux,artix}-{keyring,mirrorlist}
		rm -r $outMOD/etc/pacman.d/gnupg
		pacman-key --gpgdir $outMOD/etc/pacman.d/gnupg --init
		pacman-key --gpgdir $outMOD/etc/pacman.d/gnupg --populate archlinux artix
	fi

	cp -au --parents /var/lib/pacman/{sync/,local/ALPM_DB_VERSION} $outMOD
	pacman -Qqnr $outMOD | pacman --root $outMOD -Sdd - --overwrite '*'
	# UNDO previous patch / apply new deps
	[ -z "$patches" ] || eval "pacman -Sddr $outMOD $patches"

cd $outMOD
	find usr/share/locale \( -name 'e[ns]_[EU]S' -o -name 'e[ns]' -o -iname 'locale.alias' \) -exec cp -au --parents {} /tmp/LOCALES \;
	rm -r usr/share/{doc,gir-1.0,gtk-doc,info,licenses,locale,man} usr/include usr/lib/{pkgconfig,systemd} tmp boot >/dev/null 2>&1
	rm -r var/lib/pacman/{sync/,local/ALPM_DB_VERSION} >/dev/null 2>&1
	rm etc/ld.so.cache etc/sudo_logsrvd.conf etc/shadow.pacnew etc/sudo.conf

cd /tmp
	mv $outMOD/var/log/pacman.log $HERE/$outMOD-pacman.log >/dev/null 2>&1
	chown -R 0.0 $outMOD; [ -d $outMOD/home ] && chown -R 1000.1000 $outMOD/home >/dev/null 2>&1
	dir2xzm $outMOD "$outMOD"-$(date '+%Y%m%d').xzm
	rm -r $outMOD/
}

while confirm "Shall we update [Yy/*]? "; do updateBASE; done

the_end

2020 Updated Nemesis Base Modules

Posted: 12 Oct 2020, 09:11
by M. Eerie
Blaze wrote:
04 Oct 2020, 13:08
ncmprhnsbl, well, but setup-pman and pacman does not work for me
Hi Blaze.

Same was reported in this topic sometime ago: here

In fact, my script above uses a workaround to solve this issue.

Cheers!