Yes it is last -w now. Basically it should now be fixed, user can create the spy file even if his username is longer than 8 characters. There should be no issue like before
The package has been updated, but the GitLab doesn’t reflect the changes in new package made to the hook script, exactly what I wrote, not sure where the confusion is.
The Polkit solution has not been applied, just the proper flag to last was added (hence no need for Polkit in this case). It fixed the issue, in theory. User creates the spy file as the user even if username is longer than 8 characters, and can delete it without issue now the proper flag was added to last command in hook script.
//EDIT ahhhh I see something weird, a Polkit rule actually has been added on Codeberg, but there is no need for that, as the proper flag was added to the last command. The Polkit file is not in the latest package anyway, not sure why it was added on Codeberg.
Guys, Sorry for the confusion. I have cooied the changes made by Patric in gitlab ( codeberg and gitlab work One as mirrors of other and viceversa ). Today as i Say modify the code with Patrick suggestions and release the 0.6.8 because in my local all work fine but when release It via pkgbuild no. For delete the pacnew-check.file Always ask a admin right. Then as a casuality see i forgot to add the -w flags at the last command and so release a new ver of the 0.6.7 code.
I m on smartphone so Sorry for the not use all code tag…
Yes, I found that out the hard way… that’s why the default fallback to uid 1000 was in there. It’s still probably not ideal, but it most likely will work for most users, as the vdhcoapp helper is a desktop-centric app, and most desktop user systems are run as single-user machines with a single account for graphical desktop login, thus uid 1000 by default.
In the case of the OS tooling in general, maybe it’s not safe to assume that the user’s default UID is 1000, as it could be a shared machine in a university computing lab, a pair-programming station, or some other multi-user system. Like I said, it was a hack
to replace 1000 : pacman used by a “wheel” user, get the first in group (generally one by pc)
awk -F':|,' '/^wheel/{print $4}' /etc/group
?
EDIT : when i view source
Description = Installing JSON configuration file for current user ...
Strange as description for a package. this hook install only in pacman user but other ? At all users to re-install this package ?
an .install file is missing in PKGBUILD to document the manual install for other users or , at you to install for all users ? (in hook, loop in grep -E ‘:1[0-9]{3}:.*home’ /etc/passwd)
If there are no pacnew files it should not do anything when you try and run it.If there are when updating it should pop up and let you know.You can then decide what to do as it is a pretty simple program.
Indeed my .mo file was not placed in the proper folder in my PR. Recompiling all the languages from the current .po files should fix it though. Or make a PR with both FR and FI .mo files in the proper places. I sent a PR with the previous file. But better to just let Ste74 recompile all the .mo files from the current language .po files.
@Ste74 can you please recompile the language files for French and Finish so it fixes the Finish language and update the French one?
I’m here from the Manjaro forums announcement, stable updates section. Within there philm has linked to here, and another page.
I’ve read as much as I can, and perhaps I’ve missed it, but I still have not found any documentation that tells me as a user what to do with .pacnew and .pacsave files if I run this tool, or pacdiff.
Cool that you have made a GUI over the pacdiff CLI tool, but there either needs to be information telling the user how to respond to each issue that comes up with this, or with pacdiff. Otherwise the tool should be doing it for you.
When you have a .pacnew file, it means one of the configuration files in the system has been modified, and the last update brought new modification of the original config file, so it creates a .pacnew file instead of overwriting the existing config file during update (because if the file is modified, it means the user made some changes to it so probably best to not overwrite it, right?).
It is up to you to know what to do with the config file and the .pacnew file, open them side by side and see the difference, and act after thinking about it.
Some files are NOT TO BE TOUCHED, like the /etc/passwd or the /etc/shadow files. There might be a .pacnew file one day but if you overwrite these files with their .pacnew, you basically break your system (but as a good user, you surely always have a Manjaro USB live system on hands, and surely make system snapshots with TimeShift in order to have the option to roll back the system when you crash the system by mistake, right?). So think about what you are doing when dealing with .pacnew files, what is this file for, a music player? probably you can just overwrite with the .pacnew. Is it for a critical system component? then double check you will not break the system, maybe ask on the forum.
I noticed current version is broken, I believe because of this commit. I don’t understand the purpose of it, and it seems it was not tested, as you can not continue to next .pacnew when you have multiple, it indefinitely loops on the same .pacnew when you click “Do nothing”.
I made a revert commit, and I added a popup to warn people about specific critical system files (for now I added two files /etc/passwd and /etc/shadow):
Comments and changes/improvement to it appreciated.