Skip to main content

a silhouette of a person's head and shoulders, used as a default avatar

Recovering my OwnCloud admin user password

Because of its endless awesomeness, I'm running an ownCloud instance on my server at home.
What I'm actually using of it is the WebDAV frontend to up/download stuff from Android (the native ownCloud App seems to have problems with really big files, such as several hundred MB) and the "instant upload" feature for the android camera, to automatically upload photos for easy reusing on the PC.

Today I wanted to configure some stuff and found out that I had totally forgotten the admin password, simply because I never needed it after the initial setup.

Modern applications no longer just store the passwords in the database, so it's not as simple as it could be. Additional problems arise from the fact that I have basically zero database knowledge.
Fortunately, I still knew that I'm using a mariadb on the server...

So that's what I did to restore admin access:

  • cat config/config.php, note values of "dbuser" and "dbpassword"
  • mysql -u <dbuser> -p;
    • paste <dbpassword>
  • show databases;
    • note that there is a database called "owncloud", which is probably the one I need...
  • use owncloud;
  • select * from oc_users;
    • Oh! My admin user is called "root", not "admin" as I would have guessed... Important information. So I try to use the password reset from the web form for user "root", however, it does not work...
  • select * from oc_preferences;
    • Oh! "root" has no email address configured, no wonder the password reset does not work.
    • After some searching, I found the way to the solution in the ownCloud forum:
  • INSERT INTO `oc_preferences` ( `userid` , `appid` , `configkey` , `configvalue` ) VALUES ( 'root','settings','email','root@localhost' );
And voilà: the password reset link is working, root get's an email which contains the link to set a new password. Life is good again :-)

a silhouette of a person's head and shoulders, used as a default avatar

GSoC and the past fortnight

Its been almost a fortnight I guess without a blog post, so continuing with the series, I have a couple of updates.

From tomorrow, Google Summer of Code Student Evaluations will start tomorrow on wards, so all the best to all the students who have worked hard over the summer and helped open source organizations grow. An extra applause for the mentors who have really worked hard over the summers and have contributed their personal time to get these students involved. Specifically, from an openSUSE point of view, I hope everyone passes these evaluations.

Apart from these things, I have also hit a couple of realizations over the past fortnight,

  • I have gone worse in programming, something that I intend to improve upon in the next six months
  • I waste a lot of time, I really need to optimize time so that I can work much more efficiently.

And then as news, humblefool one of India’s top programmers died of a car crash. There is an excellent eulogy written by Animesh on quora, I urge you to read it and take inspiration from it.

 

 

a silhouette of a person's head and shoulders, used as a default avatar

The dreaded 'system error' with Kerberos and sssd

After some LDAP-related experimentation I was unable to log in to my workstation, which uses sssd to implement a setup where the users are identified by LDAP and authenticated by Kerberos.

In the log (/var/log/messages) I was seeing messages like these:

login: FAILED LOGIN SESSION FROM tty3 FOR smithfarm, System error
pam_sss(login:auth): received for user smithfarm: 4 (System error)
pam_sss(xdm:auth): received for user smithfarm: 4 (System error)
sshd[6004]: error: PAM: System error for smithfarm from ws.farm.cz

This was mysterious. Since I knew it was Kerberos-related, I raised the debug level in the Kerberos section of the sssd configuration file /etc/sssd/sssd.conf:

[domain/default]
debug_level = 0x07F0
enumerate = false
id_provider = ldap
...

After restarting sssd and trying to login again, the sssd log file (/var/log/sssd/sssd_default.log on my system) had something interesting to say:

(Tue Jun 17 10:56:22 2014) [sssd[be[default]]] [cc_residual_is_used] (0x0200): Cache file [/tmp/krb5cc_17006_M5
1GxZ] does not exist, it will be recreated
(Tue Jun 17 10:56:22 2014) [sssd[be[default]]] [check_old_ccache] (0x0400): Saved ccache FILE:/tmp/krb5cc_17006
_M51GxZ doesn't exist.
(Tue Jun 17 10:56:22 2014) [sssd[be[default]]] [krb5_auth_send] (0x0200): Ignoring ccache attribute [FILE:/tmp/
krb5cc_17006_M51GxZ], because it doesn't exist.

17006 is the uid I always get when I login via LDAP/Kerberos. So I tried the following command:

# rm -rf /tmp/krb5cc_17006*

Then after restarting sssd I was able to log in.

a silhouette of a person's head and shoulders, used as a default avatar

KiCad product daily packages for openSUSE

KiCad is an EDA software suite for the creation of professional schematics and printed circuit boards.

There are two branches: stable version and product. Stable version can be used for everyday work, but currently it’s frozen for changes, only critical bug fixes. Product version is a development branch. It has many interesting and useful innovations, but can be not very stable sometimes.

Stable version of KiCad is available from main OSS repository. KiCad product daily packages, named kicad-unstable, are available from electronics repository. See openSUSE wiki for information how to add new repository. Or just use 1-click install!

Happy engineering!

the avatar of Chun-Hung sakana Huang

GNOME.Asia Summit 2014

GNOME.Asia Summit 2014




The seventh GNOME.Asia Summit host come back to Beijing.  after Seoul, Hong Kong, Bangalore, Taipei, Ho-Chi-Minh City and Beijing.
I want thank all people coming  GNOME.Asia Summit 2014.

We have awesome video team this year.

You could take a short view for 2 days activities.  They will have new video for whole summit, I guess. :p
We play event video every end of the day. ^__^

Day 1


Day 2



Thanks again to all STAFF.


Thanks again to all Speakers.



There are too many words I want to say and thanks.
<(_ _)>

Thanks Documentation Team awesome training session in GNOME.Asia Summit






You could read the blog for some detail about training session.

Ekaterina Gerasimova:


David King:

Andre Klapper:


Thanks FUDCon APAC held together with GNOME.Asia Summit, thanks Emily Chen and Alick Zhao lead both of GNOME and Fedora team.



Thanks our Busy Bees ZSUN and TongHui did awesome job for us.  <(_ _)>



It's my pleasure to host conference with Gerard



Thanks our keynote speakers

Tobias Mueller 



 Jiri Eischmann, Jaroslav Reznik


Lennart Poettering


Richard Matthew Stallman


We have FUDPub social night held during GNOME.Aisa Summit and FUDCon APAC.  ^_^

"For GNOME"
"For Fedora"
"For open source !! ""




We have Sport Event this year.



I really happy and lucky  have chance to organize and join GNOME.Asia Summit




I think I will keep "Happy Hacking" and do more with GNOME.


Thanks speakers come to GNOME.Asia Summit and blog for summit.





I want to Thanks all our sponsor and GNOME Foundation.
Without their their support, we could not have this amazing GNOME.Asia Summit.



a silhouette of a person's head and shoulders, used as a default avatar

Electronics OBS project

We are happy to announce reviving of electronics OBS project. It contains software for developing electronic circuits and firmware for microcontrollers: EDA, programmers, flashers, simulation tools and other.

Some software will be moved from science project to electronics, at least:

  • dinotrace
  • gEDA
  • gerbv
  • gnucap
  • gtkwave
  • iverilog
  • KiCad
  • ngspice
  • PCB
  • Qucs

So this packages can be deleted from science repository in future.

a silhouette of a person's head and shoulders, used as a default avatar

a silhouette of a person's head and shoulders, used as a default avatar

And done…. new images available

Hi,

It took a bit but I am happy to report that all openSUSE 13.1 images in Amazon EC2, Google Compute Engine and Microsoft Azure public cloud environments have been refreshed. After the latest round of the GNU-TLS and OpenSSL fixes the security was, as usual, extremely efficient in providing fixed packages and these have been available in all cloud images via zypper up since last Friday. As of today the base images available in the public cloud frameworks contain the fixes by default.

In Amazon the new images are as follows:

  • ap-northeast-1: ami-79296078
  • ap-southeast-1: ami-84a7fbd6
  • ap-southeast-2: ami-41cbae7b
  • eu-west-1: ami-b56aa4c2
  • sa-east-1: ami-bffb54a2
  • us-east-1: ami-5e708d36
  • us-west-1: ami-16f2f553
  • us-west-2: ami-b7097487

In Google compute engine the image name is: opensuse-13-1-v20140609

The old image (opensuse131-v20140417) has been deprecated. To access the image you will need to add –image=opensuse-cloud/global/images/opensuse-13-1-v20140609 as the openSUSE images are not yet fully integrated into the GCE framework. Still working on that part with Google. This image also has upgrades to the google-cloud-sdk package and enable the bq (big-query) command. The gcloud command is still a bit rough around the edges, but the gcutil command should work as expected. Eventually gcutil is going to be deprecated by Google thus there is work to be done to fix the integration issues with the gcloud command. If anyone has time to work on that please send submit request to the google-cloud-sdk package in the Cloud:Tools project in OBS. Unfortunately Google still hasn’t posted the source anywhere for open collaboration 🙁 . They’ll get there eventually. I will try and push any changes upstream.

In Azure just search for openSUSE in the Gallery, it’s more of a point an click thing 😉

And that’s a wrap. Not certain we will be able to improve on the speed of such fire drill updates, but we’ll try to keep refreshing images as quickly as time allows when critical vulnerabilities in the core libraries get exposed.

Have a lot of fun….

the avatar of Duncan Mac-Vicar

SUSE Manager 2.1

Back in March, Christian Stankowic analysed Spacewalk 2.1 and its new user interface look and feel. He asked himself how SUSE Manager would look like:

I really appreciate this update! The new interface looks more clean and well-designed than the elderly look. I’m really interested to see what the implementation in SUSE Manager will look like and whether Red Hat Satellite will also get a new design.

Well, now you can see it yourself, as SUSE Manager 2.1 is out!

SUSE Manager Systems Systems Details Overview
screenshot-from-2014-06-10-234145.png

New features include, among others:

  • A slick setup wizard to guide administrators through the basic steps needed to configure a fully operational SUSE Manager: Proxy, Novell Mirror Credentials, SUSE Products.

suse-manager-admin-setup-wizard-mirror-credentials.png
  • Action chaining that lets administrators bundle and execute related management actions in one step
  • Unattended bare-metal provisioning that allows customers to power on and off and reboot bare-metal systems via the IPMI (Intelligent Platform Management Interface) protocol.
  • OpenScap (the open source implementation of SCAP – Security Content Automation Protocol), a standardized approach to maintaining enterprise system security.
  • CVE Auditing. This feature goes beyond telling you pending patches but instead assisting you to assign the right content to your systems: what vulnerabilities affect you where you haven’t yet assigned the right channels. For example, you may have an affected system in production. CVE Auditing may tell you that you can fix the security issue by assigning the stage channel to a system.

cve-audit.png
  • Locks packages on the server which are then enforced on the client side (eg. if you login via ssh to the client).

And of course, most of the work is already merged upstream.

a silhouette of a person's head and shoulders, used as a default avatar

SaX3 Localized

Recently, Saurabh Sood suggested me to blog more often, and this an attempt yet again to write more often. Off course, what I may write may or may not be appealing to others, but then its my area 🙂

Anyway, the past few weeks, I have written a bit of code, a bit actually means a teeny weeny bit, but hey, the good news is SaX3 is completely localized / internationalized now and this will be shown in the next openSUSE release.

Offcourse, if you are a translator, you can help me out by translating the files at https://github.com/openSUSE/sax3/tree/master/src/translation and by sending an email with translated files, I will include it in the upcoming repos, I will also try to get it to the openSUSE translation repository, so that lives become easier for all of us.

Other than that, we have a new contributor at openSUSE and who is already writing great articles for the news team, thanks a lot Nenad 🙂
There are plenty of things down the line and I hope I will update the same in the coming weeks,  till then cya people..