Skip to main content

a silhouette of a person's head and shoulders, used as a default avatar

Recovering my OwnCloud admin user password

Because of its endless awesomeness, I'm running an ownCloud instance on my server at home.
What I'm actually using of it is the WebDAV frontend to up/download stuff from Android (the native ownCloud App seems to have problems with really big files, such as several hundred MB) and the "instant upload" feature for the android camera, to automatically upload photos for easy reusing on the PC.

Today I wanted to configure some stuff and found out that I had totally forgotten the admin password, simply because I never needed it after the initial setup.

Modern applications no longer just store the passwords in the database, so it's not as simple as it could be. Additional problems arise from the fact that I have basically zero database knowledge.
Fortunately, I still knew that I'm using a mariadb on the server...

So that's what I did to restore admin access:

  • cat config/config.php, note values of "dbuser" and "dbpassword"
  • mysql -u <dbuser> -p;
    • paste <dbpassword>
  • show databases;
    • note that there is a database called "owncloud", which is probably the one I need...
  • use owncloud;
  • select * from oc_users;
    • Oh! My admin user is called "root", not "admin" as I would have guessed... Important information. So I try to use the password reset from the web form for user "root", however, it does not work...
  • select * from oc_preferences;
    • Oh! "root" has no email address configured, no wonder the password reset does not work.
    • After some searching, I found the way to the solution in the ownCloud forum:
  • INSERT INTO `oc_preferences` ( `userid` , `appid` , `configkey` , `configvalue` ) VALUES ( 'root','settings','email','root@localhost' );
And voilà: the password reset link is working, root get's an email which contains the link to set a new password. Life is good again :-)

a silhouette of a person's head and shoulders, used as a default avatar

GSoC and the past fortnight

Its been almost a fortnight I guess without a blog post, so continuing with the series, I have a couple of updates.

From tomorrow, Google Summer of Code Student Evaluations will start tomorrow on wards, so all the best to all the students who have worked hard over the summer and helped open source organizations grow. An extra applause for the mentors who have really worked hard over the summers and have contributed their personal time to get these students involved. Specifically, from an openSUSE point of view, I hope everyone passes these evaluations.

Apart from these things, I have also hit a couple of realizations over the past fortnight,

  • I have gone worse in programming, something that I intend to improve upon in the next six months
  • I waste a lot of time, I really need to optimize time so that I can work much more efficiently.

And then as news, humblefool one of India’s top programmers died of a car crash. There is an excellent eulogy written by Animesh on quora, I urge you to read it and take inspiration from it.

 

 

a silhouette of a person's head and shoulders, used as a default avatar

The dreaded 'system error' with Kerberos and sssd

After some LDAP-related experimentation I was unable to log in to my workstation, which uses sssd to implement a setup where the users are identified by LDAP and authenticated by Kerberos.

In the log (/var/log/messages) I was seeing messages like these:

login: FAILED LOGIN SESSION FROM tty3 FOR smithfarm, System error
pam_sss(login:auth): received for user smithfarm: 4 (System error)
pam_sss(xdm:auth): received for user smithfarm: 4 (System error)
sshd[6004]: error: PAM: System error for smithfarm from ws.farm.cz

This was mysterious. Since I knew it was Kerberos-related, I raised the debug level in the Kerberos section of the sssd configuration file /etc/sssd/sssd.conf:

[domain/default]
debug_level = 0x07F0
enumerate = false
id_provider = ldap
...

After restarting sssd and trying to login again, the sssd log file (/var/log/sssd/sssd_default.log on my system) had something interesting to say:

(Tue Jun 17 10:56:22 2014) [sssd[be[default]]] [cc_residual_is_used] (0x0200): Cache file [/tmp/krb5cc_17006_M5
1GxZ] does not exist, it will be recreated
(Tue Jun 17 10:56:22 2014) [sssd[be[default]]] [check_old_ccache] (0x0400): Saved ccache FILE:/tmp/krb5cc_17006
_M51GxZ doesn't exist.
(Tue Jun 17 10:56:22 2014) [sssd[be[default]]] [krb5_auth_send] (0x0200): Ignoring ccache attribute [FILE:/tmp/
krb5cc_17006_M51GxZ], because it doesn't exist.

17006 is the uid I always get when I login via LDAP/Kerberos. So I tried the following command:

# rm -rf /tmp/krb5cc_17006*

Then after restarting sssd I was able to log in.

a silhouette of a person's head and shoulders, used as a default avatar

KiCad product daily packages for openSUSE

KiCad is an EDA software suite for the creation of professional schematics and printed circuit boards.

There are two branches: stable version and product. Stable version can be used for everyday work, but currently it’s frozen for changes, only critical bug fixes. Product version is a development branch. It has many interesting and useful innovations, but can be not very stable sometimes.

Stable version of KiCad is available from main OSS repository. KiCad product daily packages, named kicad-unstable, are available from electronics repository. See openSUSE wiki for information how to add new repository. Or just use 1-click install!

Happy engineering!

the avatar of Chun-Hung sakana Huang

GNOME.Asia Summit 2014

GNOME.Asia Summit 2014




The seventh GNOME.Asia Summit host come back to Beijing.  after Seoul, Hong Kong, Bangalore, Taipei, Ho-Chi-Minh City and Beijing.
I want thank all people coming  GNOME.Asia Summit 2014.

We have awesome video team this year.

You could take a short view for 2 days activities.  They will have new video for whole summit, I guess. :p
We play event video every end of the day. ^__^

Day 1


Day 2



Thanks again to all STAFF.


Thanks again to all Speakers.



There are too many words I want to say and thanks.
<(_ _)>

Thanks Documentation Team awesome training session in GNOME.Asia Summit






You could read the blog for some detail about training session.

Ekaterina Gerasimova:


David King:

Andre Klapper:


Thanks FUDCon APAC held together with GNOME.Asia Summit, thanks Emily Chen and Alick Zhao lead both of GNOME and Fedora team.



Thanks our Busy Bees ZSUN and TongHui did awesome job for us.  <(_ _)>



It's my pleasure to host conference with Gerard



Thanks our keynote speakers

Tobias Mueller 



 Jiri Eischmann, Jaroslav Reznik


Lennart Poettering


Richard Matthew Stallman


We have FUDPub social night held during GNOME.Aisa Summit and FUDCon APAC.  ^_^

"For GNOME"
"For Fedora"
"For open source !! ""




We have Sport Event this year.



I really happy and lucky  have chance to organize and join GNOME.Asia Summit




I think I will keep "Happy Hacking" and do more with GNOME.


Thanks speakers come to GNOME.Asia Summit and blog for summit.





I want to Thanks all our sponsor and GNOME Foundation.
Without their their support, we could not have this amazing GNOME.Asia Summit.



a silhouette of a person's head and shoulders, used as a default avatar

Adwaita 3.14

Now that the controversial 3.12 tab design has been validated by Apple, we're ready to tackle new challenges with the widgetry™.

Adwaita has grown into a fairly complex theme. We make sure unfocused windows are less eye-grabbing (flat). We provide a less light-polluting variant for visually-heavy content apps (Adwaita:dark). And last but not least we provide a specific widget style for overlay controls (OSD). All this complexity has made Adwaita quite a challenge to maintain and evolve. Since we were to relocate Adwaita directly into gtk+, we had to bite the bullet and perform quite a surgery on it.

There's a number of improvements we aimed to achieve. Limiting the number of distinct colors and making most colors derived makes it easier to adjust the overall feel of the theme and I'm sure 3rd party themers will enjoy this too. Not relying on image assets for majority of the drawing makes the workflow much more flexible as well. Many of the small graphical elements now make use of the icon theme assets so these remain recolorable based on the context, similar to how text is treated.

We still rely on some image assets, but even that is much more manageable with SASS.

Benjamin has been working hard to move the theme closer to the familiar CSS box model, further minimizing the reliance on odd property hacks and engines (Adwaita no longer makes use of any engine drawing).

Anything gtk related never happens without the giant help from Matthias, Cosimo and Benjamin, but I have to give extra credits to Lapo Calamandrei, without whom these dark caverns would be impossible for me to enter. Another major piece that I'm grateful for living right inside the toolkit, ready to be brought up any time, is the awesome inspector. Really happy to see it mature and evolve.

a silhouette of a person's head and shoulders, used as a default avatar

Electronics OBS project

We are happy to announce reviving of electronics OBS project. It contains software for developing electronic circuits and firmware for microcontrollers: EDA, programmers, flashers, simulation tools and other.

Some software will be moved from science project to electronics, at least:

  • dinotrace
  • gEDA
  • gerbv
  • gnucap
  • gtkwave
  • iverilog
  • KiCad
  • ngspice
  • PCB
  • Qucs

So this packages can be deleted from science repository in future.

a silhouette of a person's head and shoulders, used as a default avatar
the avatar of Marcus Moeller

openSUSE 13.2 Artwork Proposal

Dear Geekos,

at the openSUSE Conference 14, Kenneth Wimer presented some new ideas and guidelines about branding. This includes a color set, as well as some new design elements.

You can watch his talk here.

I have taken the chance to prepare a light wallpaper proposal, based on this color set

openSUSE_13_2_proposal

It is of course a proposal, and you are invited to hack on it, improve it, or create something new. The SVG source is available here.

a silhouette of a person's head and shoulders, used as a default avatar

And done…. new images available

Hi,

It took a bit but I am happy to report that all openSUSE 13.1 images in Amazon EC2, Google Compute Engine and Microsoft Azure public cloud environments have been refreshed. After the latest round of the GNU-TLS and OpenSSL fixes the security was, as usual, extremely efficient in providing fixed packages and these have been available in all cloud images via zypper up since last Friday. As of today the base images available in the public cloud frameworks contain the fixes by default.

In Amazon the new images are as follows:

  • ap-northeast-1: ami-79296078
  • ap-southeast-1: ami-84a7fbd6
  • ap-southeast-2: ami-41cbae7b
  • eu-west-1: ami-b56aa4c2
  • sa-east-1: ami-bffb54a2
  • us-east-1: ami-5e708d36
  • us-west-1: ami-16f2f553
  • us-west-2: ami-b7097487

In Google compute engine the image name is: opensuse-13-1-v20140609

The old image (opensuse131-v20140417) has been deprecated. To access the image you will need to add –image=opensuse-cloud/global/images/opensuse-13-1-v20140609 as the openSUSE images are not yet fully integrated into the GCE framework. Still working on that part with Google. This image also has upgrades to the google-cloud-sdk package and enable the bq (big-query) command. The gcloud command is still a bit rough around the edges, but the gcutil command should work as expected. Eventually gcutil is going to be deprecated by Google thus there is work to be done to fix the integration issues with the gcloud command. If anyone has time to work on that please send submit request to the google-cloud-sdk package in the Cloud:Tools project in OBS. Unfortunately Google still hasn’t posted the source anywhere for open collaboration 🙁 . They’ll get there eventually. I will try and push any changes upstream.

In Azure just search for openSUSE in the Gallery, it’s more of a point an click thing 😉

And that’s a wrap. Not certain we will be able to improve on the speed of such fire drill updates, but we’ll try to keep refreshing images as quickly as time allows when critical vulnerabilities in the core libraries get exposed.

Have a lot of fun….