At this time, mkinitcpio.conf was updated and a pacnew was created. The only difference was the use of “()” verses “""” for array lists. The only place encrypt appears is in an example HOOKS which is commented.
You should be able to confirm the creation of a pacnew file by looking at /var/log/pacman.log. I found it there. I also run pacman and pipe it to tee and save it in a timestamped file. I look for the following specifically:
less --pattern='(Generating|warning:|error:|New|Optional|[0-9]+/[0-9]+)'
The grub.pacnew in the last update is a good example. On my side, I rejected all the confilcts as I am not using the quiet splash + I have a grub theme + I am using custom kernel parameters.
So merging these files depends on your custom settings and may vary from one user to antoher.
After every update just run: DIFFPROG=meld pacdiff
It will take you through every pacnew and you can view, skip, remove. Read man page. meld is a super nice gui diff tool. You can compare files side-by-side.
The pacnew files cannot be merged without being reviewed first. Some will get you in big trouble.
Thank you very much! My system is working now again too. I also didn’t have a /etc/mkinitcpio.conf.pacnew. I had a grub.cfg.pacnew but this didn’t contain any critical changes (mainly some new spaces).
My system is asking for the encryption password twice now. Do you have this behavior too?
I run a couple of laptops with Manjaro-Xfce on AMD hardware. Yesterday’s upgrade worked fine, but I was wondering as to why the upgrade pulled certain KDE components. I haven’t noticed that before, but then I don’t watch it all the time, hence I might missed it.
Fixed it. Had to install the last stable version from the Arch Linux Archive.
I think the problem in my case is the older vpn Server I try to connect to.
First uninstall openvpn via pacman. After this install it from the Archive in an older version:
:: OpenVPN now uses a netlink interface for network configuration. The systemd
units start the process with a dedicated unprivileged user 'openvpn', with
extra capabilities(7). The configuration should no longer drop privileges,
so remove 'user' and 'group' directives.
Scripts that require elevated privileges may need a workaround.