2020 Updated Nemesis Base Modules

Arch based Porteus community project
beny
Full of knowledge
Full of knowledge
Posts: 903
Joined: 02 Jan 2011, 11:33
Location: italy

2020 Updated Nemesis Base Modules

Post#166 by beny » 12 Oct 2020, 11:54

hi M.Eire i have used your script in nemesis fresh boot and i have started with core and gui extra and xfce4 changed all from base and work...seem, i write in firefox from my new nemesis,core new is 150 mb instead the 125. tell me if i have to do something to check system there are warning on the go when the build run but seem all permission user or root.

beny
Full of knowledge
Full of knowledge
Posts: 903
Joined: 02 Jan 2011, 11:33
Location: italy

2020 Updated Nemesis Base Modules

Post#167 by beny » 12 Oct 2020, 12:14

hi first issue with su or sudo i can't use it

User avatar
ncmprhnsbl
DEV Team
DEV Team
Posts: 2637
Joined: 20 Mar 2012, 03:42
Distribution: 5.0rc1-64bit all-DE+more
Location: australia
Contact:

2020 Updated Nemesis Base Modules

Post#168 by ncmprhnsbl » 12 Oct 2020, 13:15

M. Eerie wrote:
12 Oct 2020, 09:11
same was reported in this topic sometime ago: here
what's the output of:

Code: Select all

ping -q -w 1 -c 1 `ip r | awk '/default/{print$3}'|head -n1`
(that's function: is_online from /usr/share/porteus/porteus-functions called by setup-pman)
Forum Rules : https://forum.porteus.org/viewtopic.php?f=35&t=44

User avatar
M. Eerie
Shogun
Shogun
Posts: 229
Joined: 31 Aug 2017, 21:18
Distribution: APorteus BUDGIE x64

2020 Updated Nemesis Base Modules

Post#169 by M. Eerie » 12 Oct 2020, 13:22

ncmprhnsbl wrote:
12 Oct 2020, 13:15
what's the output of:

Code: Select all

[guest@porteus ~]$ ping -q -w 1 -c 1 `ip r | awk '/default/{print$3}'|head -n1`
PING 192.168.0.1 (192.168.0.1) 56(84) bytes of data.

--- 192.168.0.1 ping statistics ---
1 packets transmitted, 0 received, 100% packet loss, time 0ms
However, in firefox I can reach my router entering that ip

:%)

User avatar
M. Eerie
Shogun
Shogun
Posts: 229
Joined: 31 Aug 2017, 21:18
Distribution: APorteus BUDGIE x64

2020 Updated Nemesis Base Modules

Post#170 by M. Eerie » 12 Oct 2020, 13:35

beny wrote:
12 Oct 2020, 12:14
hi first issue with su or sudo i can't use it
Hi Beny,

Yes, that's the same result I got.

As I've said, the core module does not update properly. Whenever pacman finishes updating packages, post-transaction hooks take place and then some errors appears. I've noticed "20-sysusers.hook" yields errors creating groups/users.

Here is my last attempt pacman.log

Thanks for the feedback :)

User avatar
ncmprhnsbl
DEV Team
DEV Team
Posts: 2637
Joined: 20 Mar 2012, 03:42
Distribution: 5.0rc1-64bit all-DE+more
Location: australia
Contact:

2020 Updated Nemesis Base Modules

Post#171 by ncmprhnsbl » 12 Oct 2020, 13:46

M. Eerie wrote:
12 Oct 2020, 13:22
:%)
hmm, havn't had a problem with that myself...been using wired connection, havn't tested on wifi.. can't see what difference that would make tho..

RE update script: --overwrite: for what reason are you using this?
Forum Rules : https://forum.porteus.org/viewtopic.php?f=35&t=44

User avatar
M. Eerie
Shogun
Shogun
Posts: 229
Joined: 31 Aug 2017, 21:18
Distribution: APorteus BUDGIE x64

2020 Updated Nemesis Base Modules

Post#172 by M. Eerie » 12 Oct 2020, 14:11

ncmprhnsbl, Sorry, forget about setup-pman issue. With base_only parameter, it's working fine. I have to investigate what is causing this. /etc/local.d/firewall.start was...
ncmprhnsbl wrote:
12 Oct 2020, 13:46
RE update script: --overwrite: for what reason are you using this?
It's needed because sometimes, pacman fails syncing aborting the process whenever it detects existing files in some system areas. I'm pretty sure this is causing the problem, but otherwise, modules cannot be updated if conflicting files are present. :(

Thanks.

Edit 1: error: invalid option '--force' (deprecated) :no:
Edit 2: Need to check --sysroot option

beny
Full of knowledge
Full of knowledge
Posts: 903
Joined: 02 Jan 2011, 11:33
Location: italy

2020 Updated Nemesis Base Modules

Post#173 by beny » 12 Oct 2020, 17:42

hi switching on another tty i can use root account also in terminal with the toor password yes seem a permission mix trouble

beny
Full of knowledge
Full of knowledge
Posts: 903
Joined: 02 Jan 2011, 11:33
Location: italy

2020 Updated Nemesis Base Modules

Post#174 by beny » 12 Oct 2020, 20:03

hi after this command i can use sudo as guest but the su option not run yet: chown root:root /usr/bin/sudo && chmod 4755 /usr/bin/sudo
i have two desktop one guest and one root and work twice at same time,

User avatar
M. Eerie
Shogun
Shogun
Posts: 229
Joined: 31 Aug 2017, 21:18
Distribution: APorteus BUDGIE x64

2020 Updated Nemesis Base Modules

Post#175 by M. Eerie » 13 Oct 2020, 19:44

beny wrote:
12 Oct 2020, 17:42
switching on another tty i can use root account also in terminal with the toor password yes seem a permission mix trouble
Yes, I can confirm that.

I don't really know how to solve this. :oops:

I've tried to update with --ignore '*' instead of --overwrite '*', but no luck.

This is the pacman.log

Code: Select all

[2020-10-13T20:42:31+0200] [ALPM] upgraded archlinux-keyring (20200422-1 -> 20200820-1)
[2020-10-13T20:42:31+0200] [ALPM-SCRIPTLET] ==> Appending keys from archlinux.gpg...
[2020-10-13T20:42:33+0200] [ALPM-SCRIPTLET] ==> Locally signing trusted keys in keyring...
[2020-10-13T20:42:33+0200] [ALPM-SCRIPTLET]   -> Locally signing key D8AFDDA07A5B6EDFA7D8CCDAD6D055F927843F1C...
[2020-10-13T20:42:33+0200] [ALPM-SCRIPTLET] ==> ERROR: D8AFDDA07A5B6EDFA7D8CCDAD6D055F927843F1C could not be locally signed.
[2020-10-13T20:42:33+0200] [ALPM-SCRIPTLET]   -> Locally signing key DDB867B92AA789C165EEFA799B729B06A680C281...
[2020-10-13T20:42:33+0200] [ALPM-SCRIPTLET] ==> ERROR: DDB867B92AA789C165EEFA799B729B06A680C281 could not be locally signed.
[2020-10-13T20:42:33+0200] [ALPM-SCRIPTLET]   -> Locally signing key 91FFE0700E80619CEB73235CA88E23E377514E00...
...
While the outdated packages had been upgraded, as you can see here, the log reaveals some commands are skipped because "Current root is not booted"...
And it's pretty clear these tasks involve users/groups management.

So,

Pacman has the --sysroot option supposedly to replace --root. This potentially would allow to simulate a chroot into the "real" filesystem, but I have no clue how to use it.
From arch wiki, it seems you have to recreate some mountpoints to be able to act as a the real root account. :unknown:

Code: Select all

...
[2020-10-13T20:42:37+0200] [ALPM] upgraded zstd (1.4.4-1 -> 1.4.5-1)
[2020-10-13T20:42:37+0200] [ALPM] transaction completed
[2020-10-13T20:42:37+0200] [ALPM] running '20-sysusers.hook'...
[2020-10-13T20:42:37+0200] [ALPM] running '30-openrc-upgrade.hook'...
[2020-10-13T20:42:37+0200] [ALPM-SCRIPTLET]   Skipped: Current root is not booted.
[2020-10-13T20:42:37+0200] [ALPM] running '30-tmpfiles.hook'...
[2020-10-13T20:42:37+0200] [ALPM-SCRIPTLET] /usr/lib/tmpfiles.d/dhcpcd.conf:1: Failed to resolve user 'dhcpcd': No such process
[2020-10-13T20:42:37+0200] [ALPM-SCRIPTLET] /usr/lib/tmpfiles.d/dhcpcd.conf:2: Failed to resolve user 'dhcpcd': No such process
[2020-10-13T20:42:37+0200] [ALPM-SCRIPTLET] /usr/lib/tmpfiles.d/static-nodes-permissions.conf:12: Failed to resolve group 'audio'.
[2020-10-13T20:42:37+0200] [ALPM-SCRIPTLET] /usr/lib/tmpfiles.d/static-nodes-permissions.conf:13: Failed to resolve group 'audio'.
[2020-10-13T20:42:37+0200] [ALPM-SCRIPTLET] /usr/lib/tmpfiles.d/static-nodes-permissions.conf:14: Failed to resolve group 'disk'.
[2020-10-13T20:42:37+0200] [ALPM-SCRIPTLET] /usr/lib/tmpfiles.d/static-nodes-permissions.conf:17: Failed to resolve group 'kvm'.
[2020-10-13T20:42:38+0200] [ALPM] running '30-sysctl.hook'...
[2020-10-13T20:42:38+0200] [ALPM-SCRIPTLET]   Skipped: Current root is not booted.
[2020-10-13T20:42:38+0200] [ALPM] running '30-udev-hwdb.hook'...
[2020-10-13T20:42:38+0200] [ALPM] running '30-udev-reload.hook'...
[2020-10-13T20:42:38+0200] [ALPM-SCRIPTLET]   Skipped: Device manager is not running.
[2020-10-13T20:42:38+0200] [ALPM] running '40-update-ca-trust.hook'...
[2020-10-13T20:42:38+0200] [ALPM] running '50-sysvcompat.hook'...
[2020-10-13T20:42:38+0200] [ALPM-SCRIPTLET] 	==> Found openrc-init
[2020-10-13T20:42:38+0200] [ALPM] running '55-initswitch.hook'...
[2020-10-13T20:42:38+0200] [ALPM-SCRIPTLET] 	==> Activated openrc-init
[2020-10-13T20:42:38+0200] [ALPM] running '80-cronie.hook'...
[2020-10-13T20:42:38+0200] [ALPM-SCRIPTLET]  * WARNING: cronie is already starting
[2020-10-13T20:42:38+0200] [ALPM] running 'dbus-reload.hook'...
[2020-10-13T20:42:38+0200] [ALPM-SCRIPTLET]   Skipped: Current root is not booted.
[2020-10-13T20:42:38+0200] [ALPM] running 'detect-old-perl-modules.hook'...
[2020-10-13T20:42:38+0200] [ALPM-SCRIPTLET] perl: error while loading shared libraries: libcrypt.so.2: cannot open shared object file: No such file or directory
[2020-10-13T20:42:38+0200] [ALPM-SCRIPTLET] WARNING: '/usr/lib/perl5/5.32' contains data from at least 3 packages which will NOT be used by the installed perl interpreter.
[2020-10-13T20:42:38+0200] [ALPM-SCRIPTLET]  -> Run the following command to get a list of affected packages: pacman -Qqo '/usr/lib/perl5/5.32'
[2020-10-13T20:42:38+0200] [ALPM] running 'gio-querymodules.hook'...
[2020-10-13T20:42:38+0200] [ALPM] running 'glib-compile-schemas.hook'...
[2020-10-13T20:42:38+0200] [ALPM] running 'openrc-install.hook'...
[2020-10-13T20:42:39+0200] [ALPM-SCRIPTLET] 	==> Add a service to runlevel:
[2020-10-13T20:42:39+0200] [ALPM-SCRIPTLET] 	rc-update add <service> <runlevel>
[2020-10-13T20:42:39+0200] [ALPM-SCRIPTLET] 	==> Start/stop/restart a service:
[2020-10-13T20:42:39+0200] [ALPM-SCRIPTLET] 	rc-service <service> <start/stop/restart>
[2020-10-13T20:42:39+0200] [ALPM] running 'texinfo-install.hook'...
Thanks so much for your feedback.

beny
Full of knowledge
Full of knowledge
Posts: 903
Joined: 02 Jan 2011, 11:33
Location: italy

2020 Updated Nemesis Base Modules

Post#176 by beny » 13 Oct 2020, 21:43

hi M.Eire the module made by ncmprhnsbl have permission set to 4755 your module have the permission set to 755:
[porteus ~]# stat -c "%a %n" '/usr/bin/su'
4755 /usr/bin/su

[porteus ~]# stat -c "%a %n" '/usr/bin/su'
755 /usr/bin/su
[porteus ~]# stat -c "%a %n" '/sys'
555 /sys





i don't know how to do this....

User avatar
francois
Contributor
Contributor
Posts: 5860
Joined: 28 Dec 2010, 14:25
Distribution: xfce plank porteus nemesis
Location: Le printemps, le printemps, le printemps... ... l'hiver s'essoufle.

2020 Updated Nemesis Base Modules

Post#177 by francois » 14 Oct 2020, 01:18

Thanks ncmprhnsbl for maintaining nemesis. Its great to have these nemesis iso from neko. He makes our lives so easy. With guys like you, we kinda get lazy.
Prendre son temps, profiter de celui qui passe.

User avatar
M. Eerie
Shogun
Shogun
Posts: 229
Joined: 31 Aug 2017, 21:18
Distribution: APorteus BUDGIE x64

2020 Updated Nemesis Base Modules

Post#178 by M. Eerie » 14 Oct 2020, 06:51

beny wrote:
13 Oct 2020, 21:43
ncmprhnsbl have permission set to 4755 your module have the permission set to 755:
Thanks beny, will try to set those permissions and report back.

Cheers!

User avatar
M. Eerie
Shogun
Shogun
Posts: 229
Joined: 31 Aug 2017, 21:18
Distribution: APorteus BUDGIE x64

2020 Updated Nemesis Base Modules

Post#179 by M. Eerie » 15 Oct 2020, 09:14

New attempt, same results.

Log here

This was the fixPERMS routine used:

Code: Select all

fixPERMS() {
	chmod -f 700 $1/var/db/sudo/lectured/ $1/var/lib/NetworkManager/ $1/etc/NetworkManager/system-connections/
	chmod -f 750 $1/root $1/etc/sudoers.d/ $1/etc/openvpn/client/ $1/etc/openvpn/server/ $1/001-core/usr/share/polkit-1/rules.d/ $1/001-core/etc/polkit-1/rules.d/
	chmod -f 755 $1/etc $1/etc/local.d $1/usr $1/usr/local $1/usr/local/bin
	chmod -f 555 $1/{proc,sys}/ $1/srv/ftp >/dev/null 2>&1
	chmod -f 4555 $1/usr/bin/{su,sudo}  >/dev/null 2>&1 ### beny advice
	find $1/usr/share/icons -type d -exec chmod 755 {} + >/dev/null 2>&1
	find $1/usr/share/icons -type f -exec chmod 644 {} + >/dev/null 2>&1
}
and this was the pacman command used:

Code: Select all

pacman -Sddur 001-core --overwrite * --noconfirm --needed -
Some captures of uncommon attributes/owners/groups in /usr/bin in standard ncmprhnsbl core module:

Image

Image

Image

Last attempt shows a twin filesystem in Thunar DEVICES PANEL, so I presume there are 2 root accounts active, as beny said. Don't know where they come from

:unknown:

Post Reply