Recovering my OwnCloud admin user password
What I'm actually using of it is the WebDAV frontend to up/download stuff from Android (the native ownCloud App seems to have problems with really big files, such as several hundred MB) and the "instant upload" feature for the android camera, to automatically upload photos for easy reusing on the PC.
Today I wanted to configure some stuff and found out that I had totally forgotten the admin password, simply because I never needed it after the initial setup.
Modern applications no longer just store the passwords in the database, so it's not as simple as it could be. Additional problems arise from the fact that I have basically zero database knowledge.
Fortunately, I still knew that I'm using a mariadb on the server...
So that's what I did to restore admin access:
- cat config/config.php, note values of "dbuser" and "dbpassword"
- mysql -u <dbuser> -p;
- paste <dbpassword>
- show databases;
- note that there is a database called "owncloud", which is probably the one I need...
- use owncloud;
- select * from oc_users;
- Oh! My admin user is called "root", not "admin" as I would have guessed... Important information. So I try to use the password reset from the web form for user "root", however, it does not work...
- select * from oc_preferences;
- Oh! "root" has no email address configured, no wonder the password reset does not work.
- After some searching, I found the way to the solution in the ownCloud forum:
- INSERT INTO `oc_preferences` ( `userid` , `appid` , `configkey` , `configvalue` ) VALUES ( 'root','settings','email','root@localhost' );
GSoC and the past fortnight
Its been almost a fortnight I guess without a blog post, so continuing with the series, I have a couple of updates.
From tomorrow, Google Summer of Code Student Evaluations will start tomorrow on wards, so all the best to all the students who have worked hard over the summer and helped open source organizations grow. An extra applause for the mentors who have really worked hard over the summers and have contributed their personal time to get these students involved. Specifically, from an openSUSE point of view, I hope everyone passes these evaluations.
Apart from these things, I have also hit a couple of realizations over the past fortnight,
- I have gone worse in programming, something that I intend to improve upon in the next six months
- I waste a lot of time, I really need to optimize time so that I can work much more efficiently.
And then as news, humblefool one of India’s top programmers died of a car crash. There is an excellent eulogy written by Animesh on quora, I urge you to read it and take inspiration from it.
The dreaded 'system error' with Kerberos and sssd
In the log (
/var/log/messages) I was seeing messages like these:login: FAILED LOGIN SESSION FROM tty3 FOR smithfarm, System error pam_sss(login:auth): received for user smithfarm: 4 (System error) pam_sss(xdm:auth): received for user smithfarm: 4 (System error) sshd[6004]: error: PAM: System error for smithfarm from ws.farm.cz
This was mysterious. Since I knew it was Kerberos-related, I raised the debug level in the Kerberos section of the sssd configuration file
/etc/sssd/sssd.conf:[domain/default] debug_level = 0x07F0 enumerate = false id_provider = ldap ...
After restarting sssd and trying to login again, the sssd log file (
/var/log/sssd/sssd_default.log on my system) had something interesting to say:(Tue Jun 17 10:56:22 2014) [sssd[be[default]]] [cc_residual_is_used] (0x0200): Cache file [/tmp/krb5cc_17006_M5 1GxZ] does not exist, it will be recreated (Tue Jun 17 10:56:22 2014) [sssd[be[default]]] [check_old_ccache] (0x0400): Saved ccache FILE:/tmp/krb5cc_17006 _M51GxZ doesn't exist. (Tue Jun 17 10:56:22 2014) [sssd[be[default]]] [krb5_auth_send] (0x0200): Ignoring ccache attribute [FILE:/tmp/ krb5cc_17006_M51GxZ], because it doesn't exist.
17006 is the uid I always get when I login via LDAP/Kerberos. So I tried the following command:
# rm -rf /tmp/krb5cc_17006*
Then after restarting sssd I was able to log in.
KiCad product daily packages for openSUSE
KiCad is an EDA software suite for the creation of professional schematics and printed circuit boards.
There are two branches: stable version and product. Stable version can be used for everyday work, but currently it’s frozen for changes, only critical bug fixes. Product version is a development branch. It has many interesting and useful innovations, but can be not very stable sometimes.
Stable version of KiCad is available from main OSS repository. KiCad product daily packages, named kicad-unstable, are available from electronics repository. See openSUSE wiki for information how to add new repository. Or just use 1-click install!
Happy engineering!
GNOME.Asia Summit 2014
GNOME.Asia Summit 2014
The seventh GNOME.Asia Summit host come back to Beijing. after Seoul, Hong Kong, Bangalore, Taipei, Ho-Chi-Minh City and Beijing.
I want thank all people coming GNOME.Asia Summit 2014.
We have awesome video team this year.
You could take a short view for 2 days activities. They will have new video for whole summit, I guess. :p
We play event video every end of the day. ^__^
Day 1
Day 2
Thanks again to all STAFF.
Thanks again to all Speakers.
There are too many words I want to say and thanks.
<(_ _)>
Thanks Documentation Team awesome training session in GNOME.Asia Summit
You could read the blog for some detail about training session.
Ekaterina Gerasimova:
David King:
Thanks FUDCon APAC held together with GNOME.Asia Summit, thanks Emily Chen and Alick Zhao lead both of GNOME and Fedora team.
Thanks our Busy Bees ZSUN and TongHui did awesome job for us. <(_ _)>
It's my pleasure to host conference with Gerard
Thanks our keynote speakers
"For GNOME"
"For Fedora"
"For open source !! ""
We have Sport Event this year.
I really happy and lucky have chance to organize and join GNOME.Asia Summit
I think I will keep "Happy Hacking" and do more with GNOME.
Thanks speakers come to GNOME.Asia Summit and blog for summit.
- Ahmad Haris
- Aleksander Morgado
- Allan Day
- Andre Klapper
- Anish Patil
- Daiki Ueno
- David King
- Ekaterina Gerasimova
- ericsun
- Franklin Weng
- Ms. Kai-ju Tsai
- Sammy Fung
- Ting-Wei Lan
- Oliver Propst
I want to Thanks all our sponsor and GNOME Foundation.
Without their their support, we could not have this amazing GNOME.Asia Summit.
Electronics OBS project
We are happy to announce reviving of electronics OBS project. It contains software for developing electronic circuits and firmware for microcontrollers: EDA, programmers, flashers, simulation tools and other.
Some software will be moved from science project to electronics, at least:
- dinotrace
- gEDA
- gerbv
- gnucap
- gtkwave
- iverilog
- KiCad
- ngspice
- PCB
- Qucs
So this packages can be deleted from science repository in future.
Hello openSUSE world!
This blog was created by openSUSE Science Project to publish some news for openSUSE community. This project provides software for engineering and natural science.
More info:
And done…. new images available
Hi,
It took a bit but I am happy to report that all openSUSE 13.1 images in Amazon EC2, Google Compute Engine and Microsoft Azure public cloud environments have been refreshed. After the latest round of the GNU-TLS and OpenSSL fixes the security was, as usual, extremely efficient in providing fixed packages and these have been available in all cloud images via zypper up since last Friday. As of today the base images available in the public cloud frameworks contain the fixes by default.
In Amazon the new images are as follows:
- ap-northeast-1: ami-79296078
- ap-southeast-1: ami-84a7fbd6
- ap-southeast-2: ami-41cbae7b
- eu-west-1: ami-b56aa4c2
- sa-east-1: ami-bffb54a2
- us-east-1: ami-5e708d36
- us-west-1: ami-16f2f553
- us-west-2: ami-b7097487
In Google compute engine the image name is: opensuse-13-1-v20140609
The old image (opensuse131-v20140417) has been deprecated. To access the image you will need to add –image=opensuse-cloud/global/images/opensuse-13-1-v20140609 as the openSUSE images are not yet fully integrated into the GCE framework. Still working on that part with Google. This image also has upgrades to the google-cloud-sdk package and enable the bq (big-query) command. The gcloud command is still a bit rough around the edges, but the gcutil command should work as expected. Eventually gcutil is going to be deprecated by Google thus there is work to be done to fix the integration issues with the gcloud command. If anyone has time to work on that please send submit request to the google-cloud-sdk package in the Cloud:Tools project in OBS. Unfortunately Google still hasn’t posted the source anywhere for open collaboration
. They’ll get there eventually. I will try and push any changes upstream.
In Azure just search for openSUSE in the Gallery, it’s more of a point an click thing 
And that’s a wrap. Not certain we will be able to improve on the speed of such fire drill updates, but we’ll try to keep refreshing images as quickly as time allows when critical vulnerabilities in the core libraries get exposed.
Have a lot of fun….
SUSE Manager 2.1
Back in March, Christian Stankowic analysed Spacewalk 2.1 and its new user interface look and feel. He asked himself how SUSE Manager would look like:
I really appreciate this update! The new interface looks more clean and well-designed than the elderly look. I’m really interested to see what the implementation in SUSE Manager will look like and whether Red Hat Satellite will also get a new design.
Well, now you can see it yourself, as SUSE Manager 2.1 is out!
New features include, among others:
A slick setup wizard to guide administrators through the basic steps needed to configure a fully operational SUSE Manager: Proxy, Novell Mirror Credentials, SUSE Products.
- Action chaining that lets administrators bundle and execute related management actions in one step
- Unattended bare-metal provisioning that allows customers to power on and off and reboot bare-metal systems via the IPMI (Intelligent Platform Management Interface) protocol.
- OpenScap (the open source implementation of SCAP – Security Content Automation Protocol), a standardized approach to maintaining enterprise system security.
CVE Auditing. This feature goes beyond telling you pending patches but instead assisting you to assign the right content to your systems: what vulnerabilities affect you where you haven’t yet assigned the right channels. For example, you may have an affected system in production. CVE Auditing may tell you that you can fix the security issue by assigning the stage channel to a system.
- Locks packages on the server which are then enforced on the client side (eg. if you login via ssh to the client).
And of course, most of the work is already merged upstream.
SaX3 Localized
Recently, Saurabh Sood suggested me to blog more often, and this an attempt yet again to write more often. Off course, what I may write may or may not be appealing to others, but then its my area 
Anyway, the past few weeks, I have written a bit of code, a bit actually means a teeny weeny bit, but hey, the good news is SaX3 is completely localized / internationalized now and this will be shown in the next openSUSE release.
Offcourse, if you are a translator, you can help me out by translating the files at https://github.com/openSUSE/sax3/tree/master/src/translation and by sending an email with translated files, I will include it in the upcoming repos, I will also try to get it to the openSUSE translation repository, so that lives become easier for all of us.
Other than that, we have a new contributor at openSUSE and who is already writing great articles for the news team, thanks a lot Nenad 
There are plenty of things down the line and I hope I will update the same in the coming weeks, till then cya people..























