openSUSE 12.
Start-Up Copyright © 2006–2012 Novell, Inc. and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For Novell trademarks, see the Novell Trademark and Service Mark list http://www.
Contents About This Guide ix 1 Available Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix 2 Feedback ......................................................................... x 3 Documentation Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi 4 About the Making of This Manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2.16 Creating a CD or DVD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 2.17 Manage your collection of digital images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 2.18 Managing your music collection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 2.19 Ending Your Session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
II Managing and Updating Software 77 5 Installing or Removing Software 79 5.1 Definition of Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79 5.2 Using the KDE Interface (Qt) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 5.3 Using the GNOME Interface (GTK+) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 5.
10.7 Changing the User Authentication Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144 11 Changing Language and Country Settings with YaST 145 11.1 Changing the System Language . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 11.2 Changing the Country and Time Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 12 YaST in Text Mode 12.1 Navigation in Modules 153 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
IV The Bash Shell 17 Shell Basics 189 191 17.1 Starting a Shell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 191 17.2 Entering Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 17.3 Working with Files and Directories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195 17.4 Becoming Root . . . . . . . . . . . . . . . . . . . . . .
About This Guide This manual will see you through your initial contact with openSUSE®. Check out the various parts of this manual to learn how to install, use and enjoy your system. Installation and Basics Guides you through the installation process and the basic configuration of your system. Introduces YaST, the central tool for installation and configuration of your system. Learn how to set up or modify key components of your system and how to connect to the internet.
action of key system components and the set-up of various network and file services openSUSE offers. Security Guide (↑Security Guide) Introduces basic concepts of system security, covering both local and network security aspects. Shows how to make use of the product inherent security software like AppArmor (which lets you specify per program which files the program may read, write, and execute) or the auditing system that reliably collects information about any security-relevant events.
Mail For feedback on the documentation of this product, you can also send a mail to doc-team@suse.de. Make sure to include the document title, the product version and the publication date of the documentation. To report errors or suggest enhancements, provide a concise description of the problem and refer to the respective section number and page (or URL).
distribution would not exist without them. Furthermore, we thank Frank Zappa and Pawar. Special thanks, of course, goes to Linus Torvalds.
Part I.
1 Installation Quick Start Use the following procedures to install a new version of openSUSE® 12.2. This document gives a quick overview on how to run through a default installation of openSUSE. 1.1 Welcome to openSUSE For more detailed installation instructions and deployment strategies, see the openSUSE documentation at http://doc.opensuse.org/. 1.2 System Requirements • Pentium* III 500 MHz or higher processor (Pentium 4 2.
2 Select Installation on the boot screen and press [Enter]. This loads the openSUSE installation program and starts the installation in normal mode. 3 Select the language and the keyboard layout to be used during the installation and for the installed system. Read the License Agreement and proceed with Next if you agree. If you do not agree, press Abort to terminate the installation.
4 Select New Installation and proceed with Next. 5 Either use the map or the drop down lists for Region and Time Zone to select the clock and time zone to use in your system. Proceed with Next.
6 Select the desktop system you would like to use. KDE and GNOME, are powerful graphical desktop environments similar to Windows, alternative selections are available when checking Other. Proceed with Next. 7 Define a partition setup for openSUSE in this step. In most cases a reasonable scheme that can be accepted without change is proposed. Accept the proposal with Next and proceed with the installation.
8 Type your first and last name in the User’s Full Name field, your login name in the Username field, and your password in the Password field. For security reasons, your password should be at least eight characters long and should contain uppercase and lowercase letters and numbers. Passwords are case-sensitive. Proceed with Next. By default, the password you enter here is also used for the system administrator, root.
9 Type a password for the system administrator account (called the root user). This step is skipped in case you had activated Use this Password for System Administrator in the previous step. You should never forget the root password. After you enter it here, the password cannot be retrieved. It can only be reset with administrative assistance. Proceed with Next. 10 Use the Installation Settings screen to review your choices as well as some automatically proposed settings. If necessary, change the settings.
11 Click Install to start the installation. 12 The installation usually takes between 15 and 30 minutes, depending on the system performance and the selected software scope. During the installation you may either view the product presentation, the release notes containing last-minute information, or the detailed installation log.
14 If you have chosen the automatic login function, the desktop directly starts. Otherwise you will see the login screen. Select your username, and type your password in the Password field. Press [Enter] to log in.
2 KDE Quick Start openSUSE® offers all tools which Linux* users require for their daily activities. The product is supplied with a user-friendly graphical environment (KDE* Desktop) which communicates with the basic Linux system in order to access files, folders, and programs and manage them. openSUSE offers an integrated suite of applications for a broad range of activities (Office, multimedia, Internet). The LibreOffice suite is also included. This enables you to edit and save files in many formats.
Desktop folder: The content of the ~/Desktop Directory is displayed as standard on the milk glass surface on the top left. Any file placed in this directory also appears in this view.
2.3 Starting programs Start programs in the Main Menu, in the command line with the help of a shell or the Execute a command option. Programs can also be launched from the desktop or the control bar by clicking once on the program icon with the left mouse button. 2.3.1 Using the main menu To open the Main Menu, click on the Main Menu icon in the control bar or press [Alt] + [F2].
If you use a program often and do not want to access it through the menu structure every time, you can add its icon to the Favorites tab. To do so, right-click on any other tab in the program and select Add to Favorites. 2.3.2 Use the “Execute command” dialog box“ KRunner is a helper application which lets you quickly start programs. It also offers a search function to search for applications or storage locations. Press [Alt] + [F2] to open the Execute command dialog box.
plication name or command. To search for an application, start from the Main Menu by entering a command or a part of the application name in the Search box or in the input field in the Execute command dialog box. Every character entered restricts the search. Select the application from the list below the input field which corresponds to your query. 2.
Click on the Cashew icon (toolbox) in the top right of the desktop to fix or release the desktop elements and select Lock mini programs or Unlock mini programs. Alternatively, right-click on an empty space on the desktop and select Lock mini programs or Unlock mini programs. 2.5.2 Changing individual desktop elements In the following sections you will find some examples of how individual desktop elements can be changed. Procedure 2.
4 To remove a mini program from the desktop or the control bar, right-click on the mini program and select Remove.... Procedure 2.3: Configuring mini programs 1 Hold the mouse pointer over a mini program until a translucent frame appears around the mini program which displays a row of icons: If the frame does not appear, your mini programs are probably fixed. Release these first, as described in Section 2.5.1, “Fixing and approving desktop objects” (page 15).
2 Click on the Cashew icon at the end of the new control bar to access the configuration options and adapt the control bar as described in Procedure 2.5, “Configuring control bars” (page 18). 3 To delete a control bar, right-click on an empty space in the control bar for deletion and select Control bar Settings > Remove "control bar”. At least one control bar must remain on the desktop in openSUSE. Procedure 2.
7 If you need additional mini programs in your control bar, you can add them using the Add mini programs button as described in Procedure 2.2, “Adding mini programs on the desktop or on the control bar” (page 16). 8 To remove program icons or mini programs from the control bar, rightclick on the object in question and select the menu entry to remove the icon or mini program. The icons in the system section of the control bar normally belong to applications which are executed in the background.
4 Determine the other options in the configuration dialog box according to your wishes and click on OK to save your changes and close the configuration dialog box. 2.5.3 Modify personal settings Apart from changing individual desktop elements, you can adapt your desktop with KDE to your precise requirements. Options for adapting the entire appearance and behavior of your desktop can be found in the System settings configuration dialog box.
Change the settings as desired. Changes only become effective when you click on Apply. Click on Restore to discard changes in the last view which have not yet been applied. In order to restore all elements in the last view to standard values, click on Default settings. To return to the initial display (with all categories), click in the top left of the dialog box on Overview.
2 Select Desktop effects from the Desktop appearance and behavior category, and select Activate desktop effects upon system start. If your graphics card does not support the 3D function, you are notified accordingly. 3 Optional: Change some options under General settings on the Advanced tab. 4 Select the effects to be activated on the All effects tab. When you click on the information icon, a short explanation on the respective effect is superimposed.
2 If configuration options are available, right-click on the desktop toggle switch and select Desktop toggle switch settings. 3 You can configure the appearance of the desktop toggle switch in the control bar with the options in the General category. 4 Desktop names, key combinations to change between desktops, and the switchover type can be configured in the Virtual Desktops category. 5 Determine the desired options and click on OK. The changes are adopted and the configuration dialog box is closed. 2.
Menu bar: Call the main menu up via the spanner icon. All possible functions are ready there, such as copying, moving or deletion of files, changing view, starting of further tools, changing settings and calling up help. Symbol bar: The symbol bar accelerates the navigation and changing of the display. The relevant functions can also be called up via the main menu. If the mouse pointer is positioned over an icon for a moment, a short description of the icon is displayed.
2.8.2 Management of folders and files in Dolphin To perform actions such as copying, moving, creating or deleting files, you require the relevant rights for the respective folders and files. To copy, move or delete a file or a folder proceed as follows: 1 To select one or several files and folders in Dolphin move the mouse pointer over the file or folder, but do not click on it. A green cross appears on the left upper edge. The object is selected when you click on it.
To delete the content in the address bar click on the right on the black X icon. To change back to the standard view, press [Ctrl] + [L]. 2 To change the view of the currently displayed folder click on one of the relevant icons in the icon bar (fourth, fifth and sixth from the left). Dolphin retains the selected view for each folder. Press [F3] to display the content of the current folder in two separate columns.
Separate the sidebars from Dolphin’s main window by clicking the name of the sidebar and then dragging it to another location on the desktop. If the sidebar has no title it is locked. In such a case, right-click in a free area on the sidebar and then select Unlock sidebars. to integrate the sidebar into Dolphin’s main window again, double-click on the name of the sidebar again. Procedure 2.
Enter the URL in the address field to start browsing. Press [Ctrl] + [T] to open a new, empty tab. To open a link in a new tab, click on the link with your middle mouse button. When you right-click on the tab, a menu with tab options is superimposed. This menu allows you to create new tabs, reload the content of a certain tab or all available tabs and close tabs. You can also change the sequence of the tabs by dragging it to the desired position and leaving it there. 2.9.
gg:yast in Konqueror’s address bar (or the Execute command dialog box) and press [Enter]. You can also define individual Web key combinations in Konqueror and Firefox as described in Section 2.9.3, “Configuring Preferences” (page 29). 2.9.2 Downloading Files from the Web When you download a file with Firefox or Konqueror, a dialog box is opened in which you are requested whether you want to save the file or open it with a certain application.
Click on New to define new key shortcuts. Press OK to close the configuration dialog box of Konqueror and apply the changes. Select Edit > Settings in Firefox to open the Firefox settings. Click on the symbols in the upper display field in order to access the options for the relevant category. For example, change the standard download folder on the General page or change the blocking of pop-up windows on the Content page. Click on Close to accept the changes.
wallet for this application. After the first configuration you can open KWallet at any time to display, search for, delete or create entries. Entering passwords manually is not usually necessary. KDE recognizes when a resource needs to be authenticated and KWallet starts automatically and asks you to enter your KWallet password. However, you can also add additional data if you wish. To configure the KWallet options, press [Alt] + [F2] and enter kwalletmanager.
Before you can send or receive e-mail messages, you must configure an e-mail identity and an e-mail account: 1 Select Settings > Set up a contact. 2 Click on Identities in the left sidebar under E-mail and select the identity KMail has automatically created for you. Change this identity by entering your full name and e-mail address and confirm your changes with OK.
2.12 Instant Messaging with Kopete Kopete is an online messenger application which enables you to chat with others over the Internet. Kopete supports many messenger protocols, such as AOL* Instant Messenger (AIM), Gadu-Gadu, GroupWise® Messenger, ICQ, Jabber*, SMS, and Yahoo!*. To use Instant Messaging (IM), you need to register with an IM services provider and then enter this data Kopete accordingly. To start Kopete, press [Alt] + [F2] and enter kopete.
2.13 Starting LibreOffice The office suite LibreOffice offers a comprehensive set of office tools, which includes a text processor, a spreadsheet application, a slideshow application, a vector graphics program and a database application and more. As LibreOffice is available for a range of operating systems, you can seamlessly use files created with it on different platforms. Press [Alt] + [F2] to start and enter libreoffice.
of Bookmarks in the left sidebar. Right-click on the bookmark entry to access a context menu in which you can change to this bookmark, rename it or remove it. 2 To create a comment for a page, press [F6] and select one of the comments tools from the toolbar now displayed. The comment is added to the list of Reviews and identified with the sign-in name of the user who created it.
[Ctrl] + [F] in Dolphin to activate the desktop search. You can filter the search results by File name, Content or place. 2.16 Creating a CD or DVD If your computer has a CD or DVD burner, you can burn K3b files on CD or DVD. To create a data CD or DVD, proceed as follows: 1 Press [Alt] + [F2] and enter k3b. K3b is opened. 2 In the main menu select File > New Project > New Data Project. 3 Use the tree view in the upper left section of the window to search for the files or folders to be burnt to a disc.
simple retrieval, regardless of folders or albums) and archive them on CD or DVD or export them into a gallery with web images. digiKam also contains a set of useful stacking functions and plug-ins which enable you to convert several images into different formats, rename them or automatically improve the quality of images with the help of functions such as red eye correction, retouching and Hot Pixel removal. Different plug-ins for filters and effects help you to make your digital photos into works of art.
A sidebar with different views is displayed in the main window of Amarok: your local music collection, some addresses for playing back podcasts or streams from the Internet, your playlists and a file browser. In the middle section, the context browser, information on the current title, the Wikipedia page for interpreters and the song text is displayed as standard. You can see the current playlist in the right hand section of the window.
2.19.1 Log off or change user Click on the Main Menu button in your control bar and select Quit > Log Out. This terminates your session but the system remains active. To start a parallel session as a different user, instead select the option Quit > Change User. 2.19.2 Restart or switch off the computer Click on Quit and then select one of the following options: Sleep Only available if the computer supports energy management functions. Puts the computer into sleep mode without logging the user off.
3 GNOME Quick Start openSUSE® provides the tools required by Linux* users for their daily activities. It has a user-friendly graphic environment (the GNOME* Desktop), which communicates with the Linux base system and allows access to files, folders, and programs, as well as their management. openSUSE provides an integrated suite of applications for a wide range of office, multimedia, and Internet activities.
Time, calendar, and schedule planner: The current time is ticking in the middle. When you click on it, a small calendar appears which lists all pending appointments and events on the right hand side. You can call up time and date settings via the relevant buttons or start the calendar application directly (Open calendar). Settings for accessibility: Clicking on the icon with the stylized little man opens different settings for accessibility.
User menu: If you click on your name on the top right corner, a menu appears where you manage your user profile and your computer. If you use the immediate news program Empathy, you can change your availability status directly below your name. You can turn off the status messages with the switch underneath. This is useful if, for example, you want to concentrate on your work. You can save your access data for Google and Twitter under Online Accounts.
3.2.1 Start Programs To start an application, first switch to the activities view (click on Activities or press the [Windows] button). You now have three options: About the Dash (Favorites bar): Either click on the program icon in the bar on the left edge of the screen, the so-called Dash (sometimes also inconsistently called a Dock). If you hover over one of the icons with the mouse pointer, GNOME will tell you the name of the pertaining application.
3.2.2 Manage Window After you start an application, GNOME automatically switches back to the workplace. The name of the program and its icon appear in the panel. You can end the application by clicking on it. The X on the title bar of its window does the same thing. Procedure 3.1: Maximize Window To enlarge a window to the screen size, proceed as follows: 1 Bring the mouse to the title bar of the window (with the program name) and hold and press the left mouse button.
3.2.3 Working with Dash The small Dash in the Activities view not only keeps especially commonly used programs ready, but it can do even more: As soon as you start an application, an icon appears for it in the Dash. A light glow indicates that the application is running and (at least) one window is open. Right-clicking on an icon opens a small menu which offers different actions depending on the associated program. With Add to Favorites, you can place the application icon permanently in Dash.
4 Release the left mouse button. Procedure 3.3: Switch Virtual Desktops You can switch between all existing desktops via [Alt] + [Ctrl] + [Arrow up] and [Alt] + [Ctrl] + [Arrow down]. Alternatively, you can also pull up the activities view: 1 Open the activities view (for example, with the [Windows] key). 2 Bring the mouse to the right edge of the screen. The bar with all existing virtual desktops opens again. 3 Click on the desired virtual desktop on the bar.
Bottom Panel: The desktop includes a panel at the bottom of the screen. All applications currently open on the desktop appear here. You can access these applications by clicking on their name. Right-clicking on the icon in the bottom-right corner takes you to the virtual desktop's Settings. Provided you have created more than one, a single icon appears for every virtual desktop. In fallback mode, every window has three buttons in its title bar.
3.5 Manage Files, Folders and Media Use the Nautilus File Manager to create and view folders and documents, run scripts and create CDs of your data. To open Nautilus, change to the Activities view (with the [Windows] key for example) and click on the icon with the filing cabinet in Dash. In fallback mode, instead you open Places followed by Personal Folder. In any case, a new window appears with the content of your home directory.
View pane Displays folders and files. Use the options in the View menu to increase or decrease the content in the view pane and to display items as a list or as icons. 3.5.1 Handling Media What happens exactly if you insert a CD or a DVD into the drive or connect a device (such as a flash drive or a removable disk) depends on the content of the medium. In the simplest case, GNOME automatically opens Nautilus which, in turn, displays the content of the media.
4 Change the corresponding data in the CD/DVD Creator window or accept the standard settings. Then click on Burn. Now there is no turning back: GNOME will write the files onto the disk. This could take a few minutes, depending on the amount of data being copied and the speed of your burner. To burn data and audio CDs, you can also use the more extensive burning program Banshee Brasero. 3.5.
1 Switch (with a double-click) to the folder for which a bookmark should be created. 2 Click on Bookmark > Add bookmark. The bookmark is added to the list. The folder name is used as the bookmark name. 3 To select an item from the bookmarks list, click on Bookmark then click on the desired bookmark in the list. You can also organize your bookmarks list by clicking on Bookmark > Edit bookmarks and making your selection in the dialog box.
3.6.1 Changing the Desktop Background 1 Then click on Background. 2 If you would like to select a background image from pre-installed images, click on it from the list on the left pane. 3 To add your own image, click on the plus sign on the bottom left pane corner, search for the desired image and let it open.
To start Firefox, switch to the activities view (such as via the [Windows] key) and click on the icon with the globe and the fox in Dash. In fallback mode, you instead open Applications > Internet > Firefox. Firefox awaits with all modern web technologies, such as use of tabs, pop-up blockers and download and image management. Its easy access to different search engines helps you find the information you need. Enter an Internet address (URL) in the address bar to start browsing.
3.7.2 Downloading Files from the Web If you download a file with Firefox, the Firefox download manager starts automatically. It then saves the file in the folder previously set in the Firefox Preferences. By default, it uses the Downloads folder in your home directory. Firefox shows the finished downloads in the Downloads window. Open the downloaded files directly from the Downloads window or from the destination folder. Click on Clean List to clean up the history of downloaded files. 3.7.
To create a new key ring, proceed as follows: 1 Press [Alt] + [F2] and enter seahorse. 2 Select File > New. 3 Select Password Key Ring and continue with More. 4 Enter a name for the key ring and click on Add. A new window appears. 5 Enter your password, confirm the password, and click Continue. You can create as many key rings as you like. For example, you can create one for private use and a second one for business.
To start Evolution, switch to the activities view (for example, via the [Windows] key) and click on the letter icon. In fallback mode, select Applications > Internet > Evolution E-Mail and Calendar. If you are starting Evolution for the first time, you will be asked to answer a series of questions. The queried information is needed to set up your e-mail account and helps you import e-mail messages from your old e-mail client.
Add contacts by clicking on Chat > Add Contacts. Select the account, the Identifier (ID), and the alias information that is relevant to the new content, and confirm with Add. However, you must be online and connected to the selected messaging service to add a contact to your list. To start a chat, double-click on the desired contact and type your message in the lower part of the chat window. Press [Enter] to send the message. The upper part of the window displays the messages you have sent and received. 3.
2 Use the navigation icons at the top of the window to navigate through the document. If the PDF document contains bookmarks, you can access them to the left of the side pane. 3.13 Managing Your Digital Image Collection Shotwell is a management tool for digital image collections. You can assign various category tags to your images. It also offers many practical image editing options. For example, you can remove red eye, crop an image to size as well as adjust brightness and colors.
Shotwell shows thumbnails of the images to the right in the window. As soon as you click one of them, you can rotate it, re-edit it (enhance it) or publish it in an Internet service with the buttons on the lower edge. The side bar to the left offers different views of your photo portfolio. Provided the photos were stamped with a date, you can limit the display to photos from a specific year via Events for example. You import new photos via File > Import from Folder.
To play a song or a movie, simply select it in the library and click the play button. You can also use the buttons in the upper left corner to pause a song or play the next or previous song. Use the loudspeaker button on the right to adjust the volume. Banshee has an integrated CD player. When you insert a music CD, your CD title appears in the left panel. Select the title and click on the Play button to play your full CD.
Lock Screen Switches on the screen saver. You must enter your password to close it. This prevents unauthorized persons from working on or playing around with your computer during your absence. 3.15.2 Restarting or Shutting Down the Computer If openSUSE® can use the power-saving functions of your computer, your PC can switch to sleep mode via the Suspend item. Otherwise, GNOME offers you Power Off.... Power Off... can also be accessed by holding down the [Alt] button while the menu is open.
4 LibreOffice Quick Start The LibreOffice Novell Edition contains improved functionality and additional features not available with the standard version. 4.1 Compatibility LibreOffice can work with documents, spreadsheets, presentations, and databases in many other formats, including Microsoft Office™. They can be seamlessly opened like other files and saved back to the original format. Though some work has already been invested in interoperability, occasionally there are still formatting issues.
4.3 Starting LibreOffice To start the LibreOffice suite, press [Alt] + [F2], type libreoffice and press [Enter]. In the Welcome dialog, select the module you want to open. If an LibreOffice application is open, you can start any of the other applications by clicking File > New > Name of Application. 4.3.1 Saving LibreOffice Files 1 To save a new file, select File > Save or Save as from the Menu Bar or use the shortcut [Ctrl] + [Shift] + [S]. 2 Select the directory where you want to save the file.
to get a quick overview of all images included in the document. To open the Navigator, click View > Navigator or with [F5]. The elements listed in the Navigator vary according to the LibreOffice module being used. You can also navigate your files with the following shortcuts: Table 4.
5 Click OK. 4.4 LibreOffice Writer LibreOffice Writer is a full-featured word processor with page and text-formatting capabilities. It also includes some features that are usually found only in expensive desktop publishing applications. Many of the LibreOffice Writer features apply also to other LibreOffice modules. 4.4.
Inserting Headers and Footers If you want to add headers and footers, click Insert and select either Header or Footer. Inserting Special Characters If you want to insert special characters, select Insert > Special Character. Inserting Footnotes If you want to insert footnotes, click Insert and select Footnote. Inserting Columns If you want to insert columns, click Insert and select Section. Then in the Columns tab, specify the number of columns to use for the current section.
in a single file. A master document enables you to quickly apply formatting changes to a large document or to jump to each subdocument for editing. A master document is a Writer document that serves as a container for multiple Writer files. You can maintain chapters or other subdocuments as individual files collected in the master document. Master documents are also useful if multiple people are working on a document.
HTML Source mode, the Formatting and Styles list is not available. The first time you switch to HTML Source mode, you are prompted to save the file as HTML, if you have not already done so. 4.4.5 Tables You can include tabular data in the Writer, Impress and Draw module. Insert basic tables directly into your document either with the following menus items or by using the toolbar: • Insert > Table, • Table > Insert > Table, • or use the Table icon.
4.5.1 Creating a New Document Start LibreOffice and select File > New > Spreadsheet to create a new spreadsheet. Access the individual sheets by clicking the respective tabs at the bottom of the window. Enter data in the cells as desired. To adjust appearance, either use the Formatting toolbar or the Format menu—or define styles. Use the File menu or the relevant buttons in the toolbar to print and save your document. 4.5.
4 Specify a name for your style and use the various tabs to set the desired formatting options. 5 Click OK. Procedure 4.2: Modifying a Style 1 Click Format > Styles and Formatting. 2 In the Styles and Formatting window, click either the Cell Styles or the Page Styles icon. 3 Right-click the name of the style you want to change, then click Modify. 4 Change the desired formatting options. 5 Click OK. 4.
4.6.2 Using Databases with Base LibreOffice includes a database module (Base). Use Base to design a database to store many different kinds of information, from a simple address book or recipe file to a sophisticated document management system. Tables, forms, queries, and reports can be created manually or using convenient wizards. For example, the Table Wizard contains a number of common fields for business and personal use. A wizard guides you through the steps to create a new database.
Procedure 4.4: Setting Up the Database Table 1 In the Table Wizard, click Personal. 2 The Sample tables list changes to show the predefined tables for personal use. If you had clicked Business, the list would contain predefined business tables. In the Sample tables list, click Addresses. The available fields for the predefined address book appear in the Available fields menu. 3 In the Available fields menu, click the fields you want to use in your address book.
LibreOffice allows you to import Scalable Vector Graphics (*.svg) and WordPerfect Graphics (*.wpg). Select File > Open and use the Filter drop-down list to view which file formats can be opened. Procedure 4.5: Creating a Graphic 1 Click [Alt] + [F2] and enter oodraw to open LibreOffice Draw. 2 Use the toolbar at the bottom of the window to create a graphic. 3 Save the graphic. To embed an existing Draw graphic into an LibreOffice document, select Insert > Object > OLE Object.
NOTE Math is not a calculator. The functions it creates are graphical objects. Even if they are imported into Calc, these functions cannot be evaluated. 4.7 For More Information LibreOffice also contains extensive online help. In addition, a large community of users and developers support it. For more details, see the following links: http://www.libreoffice.org/download/3-4-new-features-and-fixes/ A list of all new features available with LibreOffice. http://www.libreoffice.
Part II.
5 Installing or Removing Software Use YaST's software management tool to search for software components you want to add or remove. YaST resolves all dependencies for you. To install packages not shipped with the installation media, add additional software repositories to your setup and let YaST manage them. Keep your system up-to-date by managing software updates with the update applet. Change the software collection of your system with YaST Software Manager.
Product Represents a whole product, for example openSUSE®. Pattern A pattern is an installable group of packages dedicated to a certain purpose. For example, the Laptop pattern contains all packages that are needed in a mobile computing environment. Patterns define package dependencies (such as required or recommended packages) and come with a preselection of packages marked for installation.
5.2.1 Views for Searching Packages or Patterns The YaST software manager can install packages or patterns from all currently enabled repositories. It offers different views and filters to make it easier to find the software you are searching for. The Search view is the default view of the window. To change view, click View and select one of the following entries from the drop-down list. The selected view opens in a new tab. Patterns Lists all patterns available for installation on your system.
Installation Summary If you have already selected packages for installation, update or removal, this view shows the changes that will be applied to your system as soon as you click Accept. To filter for packages with a certain status in this view, activate or deactivate the respective check boxes. Hit [Shift] + [F1] for details on the status flags.
6 Before applying your changes, you can review or modify them by clicking View > Installation Summary. By default, all packages that will change status, are listed. 7 In order to revert the status for a package, right-click the package and select one of the following entries: Keep if the package was scheduled to be deleted or updated, or Do Not Install if it was scheduled for installation.
comparable package can be found, all packages are considered and the “best” update candidate is selected according to the following criteria: 1. Repository priority: Prefer the package from the repository with the highest priority. 2. If more than one package results from this selection, choose the one with the “best” architecture (best choice: matching the architecture of the installed one; otherwise: x86_64 > i686 > i586).
5.2.4 Checking Software Dependencies Most packages are dependent on other packages. If a package, for example, uses a shared library, it is dependent on the package providing this library. On the other hand some packages cannot coexist with each other, causing a conflict (for example, you can only install one mail transfer agent: sendmail or postfix). When installing or removing software, the Software Manager makes sure no dependencies or conflicts remain unsolved to ensure system integrity.
Figure 5.1: Conflict Management of the Software Manager 5.3 Using the GNOME Interface (GTK+) The YaST GTK+ interface is started by default when using the desktops GNOME and XFCE. Start the software manager from the YaST Control Center by clicking Software > Software Management. 5.3.1 Views for Searching Packages or Patterns The easiest way to find a package is to use the search field in the upper right corner of the software manager. Enter a search term and press [Enter].
search package names and summaries. Press the search item to change this filter and search the file lists, for example. The software manager also offers different views and filters for displaying package lists. These are available from the pull-down menu in the upper left corner: Groups The default view lists all packages sorted by groups such as Admin Tools, Graphics, Programming, or Security. RPM Groups Lists all packages sorted by functionality with groups and subgroups.
To mark a package for installation, re-installation, removal, or upgrade, rightclick the package and choose the appropriate action from the menu. TIP: Applying an Action to All Packages Listed To apply an action to all packages listed in the right pane, right-click a package, choose Select All, right-click again and choose an action. 3 To install a pattern, right-click the pattern name and choose Install. 4 It is not possible to remove a pattern per se.
• package vendor. Which of the aspects has the highest importance for choosing the update candidates depends on the respective update option you choose. 1 To view the list of packages that can be updated (packages with higher versions are available), select Upgradable in the bottom left box. 2 To update all packages listed there, click Upgrade All. To install only upgradable packages for which an official patch has been issued, click Upgrade Patches.
In case there exists only one solution to resolve a dependency or a conflict, it is resolved automatically. Multiple solutions always cause a conflict which needs to be resolved manually. If solving a conflict involves a vendor or architecture change, it also needs to be solved manually. When clicking Apply to apply any changes in the Software Manager, you get an overview of all actions triggered by the automatic resolver which you need to confirm. By default, dependencies are automatically checked.
To manage repositories, start YaST and select Software > Software Repositories. The Configured Software Repositories dialog opens. Here, you can also manage subscriptions to so-called Services by changing the View at the right corner of the dialog to All Services. A Service in this context is a Repository Index Service (RIS) that can offer one or more software repositories. Such a Service can be changed dynamically by its administrator or vendor.
After confirming these messages, YaST will download and parse the metadata and add the repository to the list of Configured Repositories.. 6 If needed, adjust the repository Properties as described in Section 5.4.2, “Managing Repository Properties” (page 92) or confirm your changes with OK to close the configuration dialog. Now you can install software from this repository as described in Section 5.2, “Using the KDE Interface (Qt)” (page 80) or in Section 5.3, “Using the GNOME Interface (GTK+)” (page 86).
once for static repositories such as CDs or DVDs, whereas repositories whose content changes often should be refreshed frequently. The easiest way to keep a repository's cache up-to-date is to choose Automatically Refresh. To do a manual refresh click Refresh and select one of the options. Keep Downloaded Packages Packages from remote repositories are downloaded before being installed. By default, they are deleted upon a successful installation.
To manage all imported keys, click GPG Keys... in the Configured Software Repositories dialog. Select an entry with the mouse to show the key properties at the bottom of the window. Add, Edit or Delete keys with a click on the respective buttons. 5.5 Keeping the System Up-to-date openSUSE offers a continuous stream of software security patches for your product. The update applet informs you about the availability of patches and lets you easily install them with just a few clicks. 5.5.
Figure 5.3: KDE Software Updater The YaST Online Update offers advanced features to customize the patch installation. Please refer to Chapter 6, YaST Online Update (page 99) for more information. 5.5.1.2 Configuring the KDE Software Updater By default Software Updater checks for updates every 24 hours, notifies you when patches are available and does not automatically install patches. These settings can be changed with the Software Management settings.
• the GUI was not started as user root • the GUI was not started in a VNC session To start the update viewer even if no applet icon is visible, press [Alt] + [F2] and enter gpk-update-viewer. Open box with a globe The update applet is busy (for example checking for updates or installing software). Red Star with Exclamation Mark Security patches are available. Orange Star with an Up Arrow Important patches are available. Yellow Star with a Down Arrow Trivial patches are available.
Figure 5.4: GNOME Update Applet The YaST Online Update offers advanced features to customize the patch installation. Please refer to Chapter 6, YaST Online Update (page 99) for more information. 5.5.2.2 Configuring the Software Update Applet To configure the update applet, right-click the update icon in the panel and choose Preferences. The configuration dialog lets you modify the following settings: Check for Updates Choose how often a check for updates is performed: Hourly, Daily, Weekly, or Never.
6 YaST Online Update openSUSE offers a continuous stream of software security updates for your product. By default, the update applet is used to keep your system up-to-date. Refer to Section 5.5, “Keeping the System Up-to-date” (page 94) for further information on the update applet. This chapter covers the alternative tool for updating software packages: YaST Online Update.
Figure 6.1: YaST Online Update—Qt Interface The Summary section on the left lists the available patches for openSUSE. The patches are sorted by security relevance: security, recommended, and optional. You can change the view of the Summary section by selecting one of the following options from Show Patch Category: Needed Patches (default view) Non-installed patches that apply to packages installed on your system.
Select an entry in the Summary section to view a short Patch Description at the bottom left corner of the dialog. The upper right section lists the packages included in the selected patch (a patch can consist of several packages). Click an entry in the upper right section to view details about the respective package that is included in the patch. 6.1.2 GNOME Interface (GTK) The Online Update window consists of four main sections. Figure 6.
versions available. You can also choose to Install optional patches—security and recommended patches are already preselected for installation. 6.2 Installing Patches The YaST Online Update dialog allows you to either install all available patches at once or to manually select the patches that you want to apply to your system. You may also revert patches that have been applied to the system.
TIP: Disabling deltarpms By default, updates are downloaded as deltarpms. Since rebuilding rpm packages from deltarpms is a memory and processor consuming task, certain setups or hardware configurations might require you to disable the usage of deltarpms for the sake of performance. To disable the use of deltarpms, edit the file /etc/zypp/zypp.conf and set download.use_deltarpm to false. 6.
7 Installing Packages From the Internet By default, it is only possible to install packages from configured and enabled repositories. Apart from the official repositories that are configured during the installation, numerous other repositories exist. The openSUSE® Build Service hosts several hundred ones and a lot of third party repositories exist, too—see http://en.opensuse .org/Additional_package_repositories.
6 From the results list select the preferred item by clicking its 1-Click Install button. 7 In the Web browser's download dialog, select to open the file with the YaST Meta Package Handler. The 1-click installer opens the Additional Software Repositories dialog. It shows the repositories providing the packages you want to install per 1-Click Install. They are activated per default. To proceed with the installation, keep the repository selection.
2 Search for a software package by entering it's name into the Search Expression field and clicking Search. 3 The search result is listed on the Found Packages tab. Click on a package name to see the repository URL, the package version number and the architecture in the Package Description pane. WARNING: Double Check the Package Information Make sure to double check whether the software is hosted on a repository you trust before you install it.
8 Installing Add-On Products Add-on products are system extensions. You can install a third party add-on product or a special system extension of openSUSE® (for example, a CD with support for additional languages or a CD with binary drivers). To install a new add-on, start YaST and select Software > Add-On Products . You can select various types of product media, like CD, FTP, USB mass storage devices (such as USB flash drives or disks) or a local directory. You can work also directly with ISO files.
9 After having successfully added the repository for the add-on media, the software manager starts and you can install packages. Refer to Chapter 5, Installing or Removing Software (page 79) for details. 8.2 Binary Drivers Some hardware needs binary-only drivers to function properly. If you have such hardware, refer to the release notes for more information about availability of binary drivers for your system. To read the release notes, open YaST and select Miscellaneous > Release Notes.
9 Managing Software with Command Line Tools This chapter describes Zypper and RPM, two command line tools for managing software. For a definition of the terminology used in this context (for example, repository, patch, or update) refer to Section 5.1, “Definition of Terms” (page 79). 9.1 Using Zypper Zypper is a command line package manager for installing, updating and removing packages as well as for managing repositories.
Some options also require an argument. The following command will list all known patterns: zypper search -t pattern You can combine all of the above. For example, the following command will install the mplayer and amarok packages from the factory repository while being verbose: zypper -v install --from factory mplayer amarok The --from option makes sure to keep all repositories enabled (for solving any dependencies) while requesting the package from the specified repository.
by capability and/or architecture and/or version Together with a capability you can specify an architecture (such as i586 or x86_64) and/or a version. The version must be preceded by an operator: < (lesser than), <= (lesser than or equal), = (equal), >= (greater than or equal), > (greater than). zypper install 'firefox.x86_64' zypper install 'firefox>=3.5.3' zypper install 'firefox.x86_64>=3.5.
WARNING: Do not Remove Mandatory System Packages Do not remove packages such as glibc, zypper, kernel, or similar packages. These packages are mandatory for the system and, if removed, may cause the system to become unstable or stop working altogether. 9.1.2.1 Installing Source Packages If you want to install the corresponding source package of a package, use: zypper source-install package_name That command will also install the build dependencies of the specified package.
tion. The latter is achieved with the zypper dist-upgrade command which is discussed in Section 16.1, “Upgrading the System” (page 183). 9.1.3.1 Installing Patches To install all officially released patches applying to your system, just run: zypper patch In this case, all patches available in your repositories are checked for relevance and installed, if necessary. The above command is all you must enter in order to apply them when needed.
zypper patch --bugzilla=number or zypper patch --cve=number For example, to install a security patch with the CVE number CVE-2010-2713, execute: zypper patch --cve=CVE-2010-2713 9.1.3.2 Installing Updates If a repository contains only new packages, but does not provide patches, zypper patch does not show any effect.
the repositories currently enabled. For detailed instructions, refer to Section 16.1.4, “Distribution Upgrade with zypper” (page 185). To restrict the distribution upgrade to packages from a certain repository while considering also the other repositories for satisfying dependencies, use the --from option and specify the repository by either its alias, its number or URI.
zypper repos -d 9.1.4.1 Adding Repositories To add a repository, run zypper addrepo URIalias URI can either be an Internet repository, a network resource, a directory or a CD or DVD (see http://en.opensuse.org/openSUSE:Libzypp_URIs for details). The alias is a shorthand and unique identifier of the repository. You can freely choose it, with the only exception that is has to be unique. Zypper will issue a warning if you specify an alias that is already in use. 9.1.4.
zypper zypper zypper zypper products patterns packages patches To query all repositories for certain packages, use search. It works on package names, or, optionally, on package summaries and descriptions. Using the wildcards * and ? with the search term is allowed. By default, the search is not case-sensitive.
zypper refresh -fdb This forces a complete refresh and rebuild of the database, including a forced download of raw metadata. 9.1.8 Zypper Rollback Feature on btrfs File System If the btrfs file system is used on the root partition and snapper is installed, zypper automatically calls snapper (via script installed by snapper) when committing changes to the file system to create appropriate file system snapshots. These snapshots can be used for reverting any changes made by zypper.
yourself (for example, the most recent GNOME packages). They can be identified by the name extension -devel, such as the packages alsa-devel, gimp-devel, and libkde4-devel. 9.2.1 Verifying Package Authenticity RPM packages have a GPG signature. To verify the signature of an RPM package, use the command rpm --checksig package-1.2.3.rpm to determine whether the package originates from Novell/SUSE or from another trustworthy facility. This is especially recommended for update packages from the Internet. 9.2.
Otherwise, .rpmsave is used. In other words, .rpmorig results from updating from a foreign format to RPM. .rpmsave results from updating from an older RPM to a newer RPM. .rpmnew does not disclose any information as to whether the system administrator has made any changes to the configuration file. A list of these files is available in /var/adm/rpmconfigcheck. Some configuration files (like /etc/httpd/httpd.conf) are not overwritten to allow continued operation.
rpm -qpPl pine-4.44-224.i586.patch.rpm /etc/pine.conf /etc/pine.conf.fixed /usr/bin/pine or, if the patch is already installed, with the following command: rpm -qPl pine /etc/pine.conf /etc/pine.conf.fixed /usr/bin/pine How can a patch RPM be installed in the system? Patch RPMs are used just like normal RPMs. The only difference is that a suitable RPM must already be installed.
The prepdeltarpm, writedeltarpm and applydeltarpm binaries are part of the delta RPM suite (package deltarpm) and help you create and apply delta RPM packages. With the following commands, create a delta RPM called new.delta.rpm. The following command assumes that old.rpm and new.rpm are present: prepdeltarpm -s seq -i info old.rpm > old.cpio prepdeltarpm -f new.rpm > new.cpio xdelta delta -0 old.cpio new.cpio delta writedeltarpm new.rpm delta info new.delta.
--dump File list with complete details (to be used with -l, -c, or -d) --provides List features of the package that another package can request with --requires --requires, -R Capabilities the package requires --scripts Installation scripts (preinstall, postinstall, uninstall) For example, the command rpm -q -i wget displays the information shown in Example 9.2, “rpm -q -i wget” (page 125). Example 9.2: rpm -q -i wget Name : wget Relocations: (not relocatable) Version : 1.11.
Example 9.3: Script to Search for Packages #! /bin/sh for i in $(rpm -q -a -l | grep $1); do echo "\"$i\" is in package:" rpm -q -f $i echo "" done The command rpm -q --changelog rpm displays a detailed list of change information about a specific package (in this case, the rpmpackage), sorted by date. With the help of the installed RPM database, verification checks can be made. Initiate these with -V, or --verify. With this option, rpm shows all files in a package that have been changed since installation.
trolled by the variable MAX_RPMDB_BACKUPS (default: 5) in /etc/sysconfig/backup. The size of a single backup is approximately 1 MB for 1 GB in /usr. 9.2.6 Installing and Compiling Source Packages All source packages carry a .src.rpm extension (source RPM). NOTE: Installed Source Packages Source packages can be copied from the installation medium to the hard disk and unpacked with YaST. They are not, however, marked as installed ([i]) in the package manager.
/usr/src/packages/SOURCES/wget-1.11.4.tar.bz2 /usr/src/packages/SOURCES/wgetrc.patch /usr/src/packages/SPECS/wget.spec rpmbuild -bX /usr/src/packages/SPECS/wget.spec starts the compilation. X is a wild card for various stages of the build process (see the output of --help or the RPM documentation for details). The following is merely a brief explanation: -bp Prepare sources in /usr/src/packages/BUILD: unpack and patch. -bc Do the same as -bp, but with additional compilation.
Subsequently, a minimum environment is established at /var/tmp/build-root. The package is built in this environment. Upon completion, the resulting packages are located in /var/tmp/build-root/usr/src/packages/RPMS. The build script offers a number of additional options. For example, cause the script to prefer your own RPMs, omit the initialization of the build environment or limit the rpm command to one of the above-mentioned stages.
Part III.
10 Managing Users with YaST During installation, you chose a method for user authentication. This method is either local (via /etc/passwd) or, if a network connection is established, via NIS, LDAP, Kerberos or Samba (see Section “Create New User” (Chapter 1, Installation with YaST, ↑Reference) . You can create or modify user accounts and change the authentication method with YaST at any time. Every user is assigned a system-wide user ID (UID).
Depending on the set of users you choose to view and modify with, the dialog (local users, network users, system users), the main window shows several tabs. These allow you to execute the following tasks: Managing User Accounts From the Users tab create, modify, delete or temporarily disable user accounts as described in Section 10.2, “Managing User Accounts” (page 134).
NOTE: Changing User IDs of Existing Users File ownership is bound to the user ID, not to the user name. After a user ID change, the files in the user's home directory are automatically adjusted to reflect this change. However, after an ID change, the user no longer owns the files he created elsewhere in the file system unless the file ownership for those files are manually modified. In the following, learn how to set up default user accounts.
dialog and to save the changes. A newly added user can now log in to the system using the login name and password you created. TIP: Matching User IDs For a new (local) user on a laptop which also needs to integrate into a network environment where this user already has a user ID, it is useful to match the (local) user ID to the ID in the network. This ensures that the file ownership of the files the user creates “offline” is the same as if he had created them directly on the network. Procedure 10.
10.3.2 Enforcing Password Policies On any system with multiple users, it is a good idea to enforce at least basic password security policies. Users should change their passwords regularly and use strong passwords that cannot easily be exploited. For local users, proceed as follows: Procedure 10.3: Configuring Password Settings 1 Open the YaST User and Group Administration dialog and select the Users tab. 2 Select the user for which to change the password options and click Edit.
With YaST, you can create encrypted home directories for new or existing users. To encrypt or modify encrypted home directories of already existing users, you need to know the user's current login password. By default, all existing user data is copied to the new encrypted home directory, but it is not deleted from the unencrypted directory. WARNING: Security Restrictions Encrypting a user's home directory does not provide strong security from other users.
5 Enter the user's current login password to proceed if YaST prompts for it. 6 Click Expert Options > Write Changes Now to save all changes without exiting the administration dialog. Click OK to close the administration dialog and save the changes. Procedure 10.5: Modifying or Disabling Encrypted Home Directories Of course, you can also disable the encryption of a home directory or change the size of the image file at any time. 1 Open the YaST User and Group Administration dialog in the Users view.
openSUSE allows usage of soft and hard quotas. Soft quotas usually define a warning level at which users are informed that they are nearing their limit, whereas hard quotas define the limit at which write requests are denied. Additionally, grace intervals can be defined that allow users or groups to temporarily violate their quotas by certain amounts. Procedure 10.
4 Below Size Limits, restrict the amount of disk space. Enter the number of 1 KB blocks the user or group may have on this partition. Specify a Soft Limit and a Hard Limit value. 5 Additionally, you can restrict the number of inodes the user or group may have on the partition. Below Inodes Limits, enter a Soft Limit and Hard Limit. 6 You can only define grace intervals if the user or group has already exceeded the soft limit specified for size or inodes.
to, or the access permissions of the user's home directory. You can change these default settings to meet your requirements: 1 Open the YaST User and Group Administration dialog and select the Defaults for New Users tab. 2 To change the primary group the new users should automatically belong to, select another group from Default Group. 3 To modify the secondary groups for new users, add or change groups in Secondary Groups. The group names must be separated by commas.
10.6 Managing Groups With YaST you can also easily add, modify or delete groups. Procedure 10.9: Creating and Modifying Groups 1 Open the YaST User and Group Management dialog and click the Groups tab. 2 With Set Filter define the set of groups you want to manage. The dialog shows a list of groups in the system. 3 To create a new group, click Add. 4 To modify an existing group, select the group and click Edit. 5 In the following dialog, enter or change the data.
10.7 Changing the User Authentication Method When your machine is connected to a network, you can change the authentication method you set during installation. The following options are available: NIS Users are administered centrally on a NIS server for all systems in the network. For details, see Chapter 3, Using NIS (↑Security Guide). LDAP Users are administered centrally on an LDAP server for all systems in the network. For details about LDAP, see Chapter 4, LDAP—A Directory Service (↑Security Guide).
11 Changing Language and Country Settings with YaST Working in different countries or having to work in a multilingual environment requires your computer to be set up to support this. openSUSE® can handle different locales in parallel. A locale is a set of parameters that defines the language and country settings reflected in the user interface. The main system language was selected during installation and keyboard and time zone settings were adjusted.
not belonging to your desktop framework are not affected by this change and may still appear in the language that was set in YaST. Temporarily Switching Languages for One Application Only You can also run a single application in another language (that has already been installed with YaST). To do so, start it from the command line by specifying the language code as described in Section 11.1.3, “Switching Languages for Individual Applications” (page 148). 11.1.
Procedure 11.1: Installing Additional Languages When installing additional languages, YaST also allows you to set different locale settings for the user root, see Step 4 (page 147). The option Locale Settings for User root determines how the locale variables (LC_*) in the file /etc/sysconfig/ language are set for root. You can either set them to the same locale as for normal users, keep it unaffected by any language changes or only set the variable RC_LC_CTYPE to the same values as for the normal users.
4a Set Locale Settings for User root to the desired value. For more information, click Help. 4b Decide if you want to Use UTF-8 Encoding for root or not. 5 If your locale was not included in the list of primary languages available, try specifying it with Detailed Locale Setting. However, some of these localizations may be incomplete. 6 Confirm your changes in the dialogs with OK. If you have selected secondary languages, YaST installs the localized software packages for the additional languages.
For example, to start f-spot in German, run LANG=de_DE f-spot. For other languages, use the appropriate language code. Get a list of all language codes available with the locale -av command. KDE Applications Start the application from the command line by using the following command: KDE_LANG=languageapplication For example, to start digiKam in German, run KDE_LANG=de digikam. For other languages, use the appropriate language code. 11.
• If you only run Linux on your machine, set the hardware clock to UTC and have the switch from standard time to daylight saving time performed automatically. You can change the date and time manually or opt for synchronizing your machine against an NTP server, either permanently or just for adjusting your hardware clock. Procedure 11.2: Manually Adjusting Time and Date 1 In the YaST timezone module, click Change to set date and time. 2 Select Manually and enter date and time values.
7 Confirm your changes with Accept.
12 YaST in Text Mode This section is intended for system administrators and experts who do not run an X server on their systems and depend on the text-based installation tool. It provides basic information about starting and operating YaST in text mode. YaST in text mode uses the ncurses library to provide an easy pseudo-graphical user interface. The ncurses library is installed by default. The minimum supported size of the terminal emulator in which to run YaST is 80x25 characters. Figure 12.
12.1 Navigation in Modules The following description of the control elements in the YaST modules assumes that all function keys and [Alt] key combinations work and are not assigned to different global functions. Read Section 12.2, “Restriction of Key Combinations” (page 155) for information about possible exceptions. Navigation among Buttons and Selection Lists Use [Tab] to navigate among the buttons and frames containing selection lists.
Figure 12.2: The Software Installation Module 12.2 Restriction of Key Combinations If your window manager uses global [Alt] combinations, the [Alt] combinations in YaST might not work. Keys like [Alt] or [Shift] can also be occupied by the settings of the terminal. Replacing [Alt] with [Esc] [Alt] shortcuts can be executed with [Esc] instead of [Alt]. For example, [Esc] – [H] replaces [Alt] + [H]. (First press [Esc], then press [H].
View a list of all module names available on your system with yast -l or yast --list. Start the network module, for example, with yast lan. 12.3.
13 Setting Up Hardware Components with YaST YaST allows you to configure hardware items at installation time as well as on an already-installed system. Configure audio hardware, printers or scanner support or learn which hardware components are connected to your computer by using the YaST Hardware Information module. TIP: Graphics card, monitor, mouse and keyboard settings Graphics card, monitor, mouse and keyboard can be configured with either KDE or GNOME tools. 13.
The dialog shows all sound cards that could be detected. Procedure 13.1: Configuring Sound Cards If you have added a new sound card or YaST could not automatically configure an existing sound card, follow the steps below. For configuring a new sound card, you need to know your sound card vendor and model. If in doubt, refer to your sound card documentation for the required information. For a reference list of sound cards supported by ALSA with their corresponding sound modules, see http://www.
1 Start the YaST sound module. 2 To configure a detected, but Not Configured sound card, select the respective entry from the list and click Edit. To configure a new sound card, click Add. Select your sound card vendor and model and click Next. 3 Choose one of the setup options and click Next. 4 If you have chosen Normal Setup, you can now Test your sound configuration and make adjustments to the volume. You should start at about ten percent volume to avoid damage to your hearing or the speakers.
4a Insert the original driver CD-ROM into your CD or DVD drive. 4b Select Other > Install SoundFonts to copy SF2 SoundFonts™ to your hard disk. The SoundFonts are saved in the directory /usr/share/ sfbank/creative/. 5 If you have configured more than one sound card in your system you can adjust the order of your sound cards. To set a sound card as primary device, select the sound card in the Sound Configuration and click Other > Set as the Primary Card.
6 Leave the configuration screen with OK. 13.3.1 Configuring an HP All-In-One Device An HP All-In-One device can be configured with YaST even if it is connected to the parallel port or is made available via the network. If you own a USB HP All-In-One device, start configuring as described in Procedure 13.3, “Configuring a USB or SCSI Scanner” (page 160). If it is detected properly and the Test succeeds, it is ready to use.
4 Leave with OK. The network scanner is now listed in the Scanner Configuration window and is ready to use.
14 Printer Operation openSUSE® supports printing with many types of printers, including remote network printers. Printers can be configured manually or with YaST. For configuration instructions, refer to Section 14.4, “Setting Up a Printer” (page 165). Both graphical and command line utilities are available for starting and managing print jobs. If your printer does not work as expected, refer to Section 14.8, “Troubleshooting” (page 174).
http://www.linuxfoundation.org/collaborate/workgroups/openprinting/database/ databaseintro The OpenPrinting home page with the printer database. The database shows the latest Linux support status. However, a Linux distribution can only integrate the drivers available at production time. Accordingly, a printer currently rated as “perfectly supported” may not have had this status when the latest openSUSE version was released.
WARNING: Changing Cable Connections in a Running System When connecting the printer to the machine, do not forget that only USB devices can be plugged in or unplugged during operation. To avoid damaging your system or printer, shut down the system before changing any connections that are not USB. 14.3 Installing the Software PPD (PostScript printer description) is the computer language that describes the properties of a printer, like resolution, and options, such as the availability of a duplex unit.
• The USB printer is switched off. • The communication between printer and computer is not possible. Check the cable and the plugs to make sure that the printer is properly connected. If this is the case, the problem may not be printer-related, but rather a USB-related problem. Configuring a printer is basically a three-step process: Specify the connection type, choose a driver, and name the printing queue for this setup. For many printer models, several drivers are available.
5c Add a driver as described in Section 14.4.1.1, “Adding Drivers with YaST” (page 167) 6 Specify the Default paper size. 7 In the Set Arbitrary Name field enter a unique name for the printer queue. 8 The printer is now configured with the default settings and ready to use. Click OK to return to the Printer Configurations view. The newly configured printer is now visible in the list of printers. 14.4.1.
Procedure 14.3: Editing a Local Printer 1 Start the YaST printer module with Hardware > Printer. 2 In the Printer Configurations screen, choose a local printer from the list and click Edit. 3 Change the connection type or the driver as described in Procedure 14.1, “Adding a New Local Printer” (page 166). This should only be necessary in case you have problems with the current configuration. 4 Make this printer the default by checking Default Printer.
3 Check Accept Printer Announcements from CUPS Servers. 4 Under General Settings specify which servers to use. You may accept connections from all networks available, from the local network, or from specific hosts. If you choose the latter option, you need to specify the hostnames or IP addresses. 5 Confirm by clicking OK and then Yes when asked to start a local CUPS server. After the server has started YaST will return to the Printer Configurations screen.
5 Regarding CUPS and firewall settings, see http://en.opensuse.org/SDB:CUPS _and_SANE_Firewall_settings. 14.5 Network Printers A network printer can support various protocols, some of them even concurrently. Although most of the supported protocols are standardized, some manufacturers modify the standard. Manufacturers then provide drivers for only a few operating systems. Unfortunately, Linux drivers are rarely provided.
comes with the nmap package) can be used to ascertain the protocol. nmap checks a host for open ports. For example: nmap -p 35,137-139,515,631,9100-10000 printerIP 14.5.1 Configuring CUPS with Command Line Tools CUPS can be configured with command line tools like lpinfo, lpadmin and lpoptions. You need a device URI consisting of a back-end, such as parallel, and parameters.
2 Change the option with lpadmin: lpadmin -p queue -o Resolution=600dpi 3 Check the new setting: lpoptions -p queue -l Resolution/Output Resolution: 150dpi 300dpi *600dpi When a normal user runs lpoptions, the settings are written to ~/.cups/lpoptions. However, root settings are written to /etc/cups/lpoptions. 14.6 Printing from the Command Line To print from the command line, enter lp -d queuename filename, substituting the corresponding names for queuename and filename.
unless you take care that it is protected by special firewall rules and secure settings in the CUPS configuration. 14.7.2 PPD Files in Various Packages The YaST printer configuration sets up the queues for CUPS using the PPD files installed in /usr/share/cups/model. To find the suitable PPD files for the printer model, YaST compares the vendor and model determined during hardware detection with the vendors and models in all PPD files.
14.7.2.4 PPD Files from Printer Manufacturers in the manufacturer-PPDs Package The manufacturer-PPDs package contains PPD files from printer manufacturers that are released under a sufficiently liberal license. PostScript printers should be configured with the suitable PPD file of the printer manufacturer, because this file enables the use of all functions of the PostScript printer.
14.8.2 No Suitable PPD File Available for a PostScript Printer If the manufacturer-PPDs package does not contain a suitable PPD file for a PostScript printer, it should be possible to use the PPD file from the driver CD of the printer manufacturer or download a suitable PPD file from the Web page of the printer manufacturer. The PPD file is provided as a zip archive (.zip) or a self-extracting zip archive (.exe). Unpack the zip archive with unzip. First, review the license terms of the PPD file.
Checking a Remote cupsd A CUPS network server can broadcast its queues by default every 30 seconds on UDP port 631. Accordingly, the following command can be used to test whether there is a broadcasting CUPS network server in the network. Make sure to stop your local CUPS daemon before executing the command. netcat -u -l -p 631 & PID=$! ; sleep 40 ; kill $PID If a broadcasting CUPS network server exists, the output appears as shown in Example 14.2, “Broadcast from the CUPS Network Server” (page 176).
This output indicates that the printer connected to the print server box can be addressed via TCP socket on port 9100. By default, nmap only checks a number of commonly known ports listed in /usr/share/nmap/nmap-services. To check all possible ports, use the command nmap -p from_port-to_port IP-address. This may take some time. For further information, refer to the man page of nmap.
14.8.7 Defective Print Jobs and Data Transfer Errors If you switch the printer off or shut down the computer during the printing process, print jobs remain in the queue. Printing resumes when the computer (or the printer) is switched back on. Defective print jobs must be removed from the queue with cancel.
14.8.9 For More Information Solutions to many specific problems are presented in the SUSE Support Database (http://en.opensuse.org/Portal:Support_database). Locate the relevant articles with a text search for SDB:CUPS.
15 Installing and Configuring Fonts for the Graphical User Interface The installation of additional fonts in openSUSE® is very easy. Simply copy the fonts to any directory located in the X11 font path. To enable the use of the fonts, the installation directory should be a subdirectory of the directories configured in /etc/ fonts/fonts.conf or included into this file with /etc/fonts/suse-font-dirs.conf. The following is an excerpt from /etc/fonts/fonts.conf.
The procedure is the same for bitmap fonts, TrueType and OpenType fonts, and Type 1 (PostScript) fonts. All these font types can be installed into any directory known to fonts-config.
16 Upgrading the System and System Changes You can upgrade an existing system without completely reinstalling it. There are two types of renewing the system or parts of it: updating individual software packages and upgrading the entire system. Updating individual packages is covered in Chapter 5, Installing or Removing Software (page 79) and Chapter 6, YaST Online Update (page 99). Two ways to upgrade the system are discussed in the following sections— see Section 16.1.
16.1.2 Possible Problems If you upgrade a default system from the previous version to this version, YaST works out the necessary changes and performs them. Depending on your customizations, some steps (or the entire upgrade procedure) may fail and you must resort to copying back your backup data. Check the following issues before starting the system update. 16.1.2.1 Checking passwd and group in /etc Before upgrading the system, make sure that /etc/passwd and /etc/group do not contain any syntax errors.
can be done using the YaST System Partitioner by changing the method used in the fstab options settings. 3 Check the previously used repositories, if there are any. Enable all the repositories you still want to use and from where you want to update thirdparty software. Click the Toggle Status for every list item, if appropriate. 4 If you added repositories during the upgrade procedure as recommended above, you now can activate those you are actually interested in.
edit their version string to match the version number of the distribution of the upgraded now running system. For more information, see http://en.opensuse.org/SDB:System_upgrade. 16.1.4.2 The Upgrade Procedure WARNING: Check Your System Backup Before actually starting the upgrade procedure, check that your system backup is up-to-date and restorable. This is especially important because you must enter many of the following steps manually.
fault repositories only (replace repo-alias with the name of the repository you want to disable): zypper mr -d repo-alias Alternatively, you can lower the priority of these repositories. NOTE: Handling of Unresolved Dependencies zypper dup will remove all packages having unresolved dependencies, but it keeps packages of disabled repositories as long as their dependencies are satisfied. zypper dup ensures that all installed packages come from one of the available repositories.
overall operation of the system, YaST issues a warning. Such packages should be updated only in the update mode. For example, many packages contain shared libraries. Updating these programs and applications in the running system may lead to system instability. 16.2 For More Information Problems and special issues of the various versions are published online as they are identified. See the links listed below. Important updates of individual packages can be accessed using the YaST Online Update.
Part IV.
17 Shell Basics When working with Linux these days, you can communicate with the system almost without ever requiring a command line interpreter (the shell). After booting your Linux system, you are usually directed to a graphical user interface that guides you through the login process and the following interactions with the operating system. The graphical user interface in Linux (the X Window System or X11) is initially configured during installation.
word and press [Enter]. The prompt now changes and shows some useful information as in the following example: tux@linux:~> Your login. The hostname of your computer. Path to the current directory. Directly after login, the current directory usually is your home directory, indicated by the ~ symbol (tilde) . When you are logged in at a remote computer the information provided by the prompt always shows you which system you are currently working on.
Also keep this in mind for commands to delete objects. Before entering a command like rm (without any option) for removing a file, you should know if you really want to get rid of the object: it will be deleted irretrievably, without confirmation. 17.2.1 Using Commands without Options In Section 17.5.1, “Permissions for User, Group and Others” (page 200) you already got to know one of the most basic commands: ls, which used to list the contents of a directory.
Name of the object. Usually, you can combine several options by prefixing only the first option with a hyphen and then write the others consecutively without a blank. For example, if you want to see all files in a directory in long listing format, you can combine the two options -l and -a (show all files) for the ls command. Executing ls -la shows also hidden files in the directory, indicated by a dot in front (for example, .hiddenfile).
ward and [<—] to move backwards. Within a node, you can also browse with [Page ↑] and [Page ↓] but only [Space] and [<—] will take you also to the previous or subsequent node. Like for the man pages, press [Q] to end the viewing mode. Note that man pages and info pages do not exist for all commands. Sometimes both are available (usually for key commands), sometimes only a man page or an info page exists, and sometimes neither of them are available. 17.2.
Relative Path Enter a path to the relevant file or directory by using the current directory as a starting point. This implies to give the levels you have to move up or down in the file system tree to reach the target directory of file, starting from the current directory. Paths contain filenames, directories or both, separated by slashes. Absolute paths always start with a slash. Relative paths do not have a slash at the beginning, but can have one or two dots.
17.3.1 Examples for Working with Files and Directories Suppose you want to copy a file located somewhere in your home directory to a subdirectory of /tmp that you need to create first. Procedure 17.1: Creating and Changing Directories From your home directory create a subdirectory in /tmp: 1 Enter mkdir /tmp/test mkdir stands for “make directory”. This command creates a new directory named test in the /tmp directory. In this case, you are using an absolute path to create the test directory.
touch ~/Documents/myfile.txt Usually, the touch command updates the modification and access date for an existing file. If you use touch with a filename which does not exist in your target directory, it creates a new file. 3 Enter ls -l ~/Documents The new file should appear in the list of contents. 4 To copy the newly created file, enter cp ~/Documents/myfile.txt . Do not forget the dot at the end. This command tells Bash to go to your home directory and to copy myfile.
3 Coming to the conclusion that you do not need the file any longer, you can delete it by entering rm tuxfile.txt Bash deletes the file without any confirmation. 4 Move up one level with cd .. and check with ls -l test if the test directory is empty now. 5 If yes, you can remove the test directory by entering rmdir test 17.4 Becoming Root root, also called the superuser, has privileges which authorize him to access all parts of the system and to execute administrative tasks.
17.4.2 Using sudo Alternatively, you can also use sudo (superuser “do”) to execute some tasks which normally are for roots only. With sudo, administrators can grant certain users root privileges for some commands. Depending on the system configuration, users can then run root commands by entering their normal password only. Due to a timestamp function, users are only granted a “ticket” for a restricted period of time after having entered their password. The ticket usually expires after a few minutes.
Example 17.1: Access Permissions For Files and Folders -rw-r-----rw-r--r--rw-rw----rw-r--r--rw-r--r-drwxr-xr-x -rwxr--r-- 1 1 1 1 1 2 1 tux tux tux tux tux tux tux users 0 users 53279 users 0 users 70733 users 47896 users 48 users 624398 2006-06-23 2006-06-21 2006-06-23 2006-06-21 2006-06-21 2006-06-23 2006-06-23 16:08 13:16 16:08 09:35 09:46 16:09 15:43 checklist.txt gnome_quick.xml index.htm kde-start.xml kde_quick.xml local tux.sh As shown in the third column, all objects belong to user tux.
Access Permission File Folder tents of this directory with ls -l, for example. However, if they only have execute permission for the directory, they can nevertheless access certain files in this directory if they know of their existence. Write (w) Users can change the file: They can add or drop data and can even delete the contents of the file.
on the primary group the user belongs to when creating the object. When you create a new file or directory, initial access permissions for this object are set according to a predefined scheme. For further details refer to Section 17.5, “File Access Permissions” (page 200). As the owner of a file or directory (and, of course, as root), you can change the access permissions to this object.
2 To grant the users group and other users write access to kde-start.xml, enter chmod go+w kde-start.xml 3 To remove write access for all users, enter chmod -w kde-start.xml If you do not specify any kind of users, the changes apply to all users— the owner of the file, the owning group and the others. Now even the owner tux does not have write access to the file without first reestablishing write permissions.
17.6 Useful Features of the Shell As you probably noticed in the examples above, entering commands in Bash can include a lot of typing. In the following, get to know some features of the Bash that can make your work a lot easier and save a lot of typing. History By default, Bash “remembers” commands you have entered. This feature is called history. You can browse through commands that have been entered before, select one you want to repeat and then execute it again.
Wild Card Function ? Matches exactly one arbitrary character * Matches any number of characters [set] Matches one of the characters from the group specified inside the square brackets, which is represented here by the string set. 17.6.1 Examples For Using History, Completion and Wildcards The following examples illustrate how to make use of these convenient features of Bash. Procedure 17.6: Using History and Completion If you already did the example Section 17.3.
Procedure 17.7: Using Wildcards Now suppose that your home directory contains a number of files with various file extensions. It also holds several versions of one file which you saved under different filenames myfile1.txt, myfile2.txt etc. You want to search for certain files according to their properties. 1 First, create some test files in your home directory: 1a Use the touch command to create several (empty) files with different file extensions, for example .pdf, .xml and .jpg.
2b To list all “versions” of myfile.txt, enter ls -l myfile?.txt Note that you can only use the ? wild card here because the numbering of the files is single-digit. As soon as you have a file named myfile10.txt you must to use the * wild card to view all versions of myfile.txt (or add another question mark, so your string looks like myfile??.txt). 2c To remove, for example, version 1-3 and version 5 of myfile.txt, enter rm myfile[1-3,5].txt 2d Check the result with ls -l Of all myfile.
extended mode In this mode, also known as colon mode (as you have to enter a colon to switch to this mode), vi can execute also more complex tasks such as searching and replacing text. In the following (very simple) example, you will learn how to open and edit a file with vi, how to save your changes and quit vi. 17.7.1 Example: Editing with vi NOTE: Display of Keys In the following, find several commands that you can enter in vi by just pressing keys. These appear in uppercase as on a keyboard.
If desired, use wild cards to specify filenames. The program is very quick, because it uses a database specifically created for the purpose (rather than searching through the entire file system). This very fact, however, also results in a major drawback: locate is unable to find any files created after the latest update of its database. The database can be generated by root running updatedb. find With find, search for a file in a given directory.
If you want to use a search string which consists of more than one word, enclose the string in double quotation marks, for example: grep "music is great" ~/* 17.9 Viewing Text Files When searching for the contents of a file with grep, the output gives you the line in which the searchstring was found along with the filename. Often this contextual information is still not enough information to decide whether you want to open and edit this file.
Normally, the standard output in the shell is your screen (or an open shell window) and the standard input is the keyboard. With the help of certain symbols you can redirect the input or the output to another object, such as a file or another command. Redirection With > you can forward the output of a command to a file (output redirection), with < you can use a file as input for a command (input redirection).
The pipe is also often used in combination with the grep command in order to search for a certain string in the output of another command. For example, if you want to view a list of files in a directory which are owned by the user tux, enter ls -l | grep tux 17.11 Starting Programs and Handling Processes As you have seen in Section 17.7, “Editing Texts” (page 208), programs can be started from the shell.
In case a program cannot be terminated in the normal way, use the kill command to stop the process (or processes) belonging to that program. To do so, specify the process ID (PID) shown by the output of ps. For example, to shut down the KWrite editor in the example above, enter kill 30187 This sends a TERM signal that instructs the program to shut itself down.
17.12.1 File Commands The following section lists the most important commands for file management. It covers everything from general file administration to the manipulation of file system ACLs. 17.12.1.1 File Administration ls [options] [files] If you run ls without any additional parameters, the program lists the contents of the current directory in short form. -l Detailed list -a Displays hidden files cp [options] source target Copies source to target.
it creates a symbolic link that only points to the directory in which source is located, enabling linking across file systems. -s Creates a symbolic link cd [options] [directory] Changes the current directory. cd without any parameters changes to the user's home directory. mkdir [options] directory Creates a new directory. rmdir [options] directory Deletes the specified directory if it is already empty.
x Execute—executing files or changing to the directory s Setuid bit—the application or program is started as if it were started by the owner of the file As an alternative, a numeric code can be used. The four digits of this code are composed of the sum of the values 4, 2, and 1—the decimal result of a binary mask. The first digit sets the set user ID (SUID) (4), the set group ID (2), and the sticky (1) bits. The second digit defines the permissions of the owner of the file.
-z Packs the resulting archive with gzip -j Compresses the resulting archive with bzip2 -v Lists files processed The archive files created by tar end with .tar. If the tar archive was also compressed using gzip, the ending is .tgz or .tar.gz. If it was compressed using bzip2, the ending is .tar.bz2. locate patterns This command is only available if you have installed the findutils-locate package. The locate command can find in which directory a specified file is located.
less [options] files This command can be used to browse the contents of the specified file. Scroll half a screen page up or down with [PgUp] and [PgDn] or a full screen page down with [Space]. Jump to the beginning or end of a file using [Home] and [End]. Press [Q] to exit the program. grep [options] searchstring files The grep command finds a specific search string in the specified files. If the search string is found, the command displays the line in which searchstring was found along with the filename.
mounted by other users, enter the option user in the appropriate line in the /etc/ fstab file (separated by commas) and save this change. Further information is available in the mount(1) man page. umount [options] mountpoint This command unmounts a mounted drive from the file system. To prevent data loss, run this command before taking a removable data medium from its drive. Normally, only root is allowed to run the commands mount and umount.
-b Output in bytes -k Output in kilobytes -m Output in megabytes date [options] This simple program displays the current system time. If run as root, it can also be used to change the system time. Details about the program are available in the date(1) man page. 17.12.2.2 Processes top [options] top provides a quick overview of the currently running processes. Press [H] to access a page that briefly explains the main options for customizing the program.
-cnumber Determines the total number of packages to send and ends after they have been dispatched (by default, there is no limitation set) -f flood ping: sends as many data packages as possible; a popular means, reserved for root, to test networks -ivalue Specifies the interval between two data packages in seconds (default: one second) host [options] hostname [server] The domain name system resolves domain names to IP addresses. With this tool, send queries to name servers (DNS servers).
17.12.3 For More Information There are many more commands than listed in this chapter. For information about other commands or more detailed information, the O'Reilly publication Linux in a Nutshell is recommended.
18 Bash and Bash Scripts These days many people use computers with a graphical user interface (GUI) like KDE or GNOME. Although they offer lots of features, their use is limited when it comes to the execution of automated tasks. Shells are a good addition to GUIs and this chapter gives you an overview of some aspects of shells, in this case Bash. 18.1 What is “The Shell”? Traditionally, the shell is Bash (Bourne again Shell). When this chapter speaks about “the shell” it means Bash.
File Description ~/.profile Insert user specific configuration for login shells here Table 18.2: Bash Configuration Files for Non-Login Shells /etc/bash.bashrc Do not modify this file, otherwise your modifications can be destroyed during your next update! /etc/bash.bashrc.local Use this file to insert your system-wide modifications for Bash only ~/.bashrc Insert user specific configuration here Additionally, Bash uses some more files: Table 18.3: Special Files for Bash File Description ~/.
Directory Contents Usually also contains the shells, such as Bash. /boot Static files of the boot loader. /dev Files needed to access host-specific devices. /etc Host-specific system configuration files. /home Holds the home directories of all users who have accounts on the system. However, root's home directory is not located in /home but in /root. /lib Essential shared libraries and kernel modules. /media Mount points for removable media.
Directory Contents /windows Only available if you have both Microsoft Windows* and Linux installed on your system. Contains the Windows data. The following list provides more detailed information and gives some examples of which files and subdirectories can be found in the directories: /bin Contains the basic shell commands that may be used both by root and by other users. These commands include ls, mkdir, cp, mv, rm and rmdir. /bin also contains Bash, the default shell in openSUSE.
the hard drive of your system. As soon as your removable medium has been inserted or connected to the system and has been mounted, you can access it from here. /mnt This directory provides a mount point for a temporarily mounted file system. root may mount file systems here. /opt Reserved for the installation of third-party software. Optional software and larger add-on program packages can be found here. /root Home directory for the root user. The personal data of root is located here.
/usr/share/doc Holds various documentation files and the release notes for your system. In the manual subdirectory find an online version of this manual. If more than one language is installed, this directory may contain versions of the manuals for different languages. Under packages find the documentation included in the software packages installed on your system.
Before you can run this script you need some prerequisites: 1. Every script should contain a Shebang line (this is already the case with our example above.) If a script does not have this line, you have to call the interpreter manually. 2. You can save the script wherever you want. However, it is a good idea to save it in a directory where the shell can find it. The search path in a shell is determined by the environment variable PATH. Usually a normal user does not have write access to /usr/bin.
ls >> listing.txt Command < File Reads the file as input for the given command. For example, the read command reads in the content of the file into the variable: read a < foo Command1 | Command2 Redirects the output of the left command as input for the right command. For example, the cat command outputs the content of the /proc/cpuinfo file.
To set a local variable, use a variable name followed by the equal sign, followed by the value: PROJECT="SLED" Do not insert spaces around the equal sign, otherwise you get an error. To set an environment variable, use export: export NAME="tux" To remove a variable, use unset: unset NAME The following table contains some common environment variables which can be used in you shell scripts: Table 18.
To access all the arguments which are passed to your script, you need positional parameters. These are $1 for the first argument, $2 for the second, and so on. You can have up to nine parameters. To get the script name, use $0. The following script foo.sh prints all arguments from 1 to 4: #!/bin/sh echo \"$1\" \"$2\" \"$3\" \"$4\" If you execute this script with the above arguments, you get: "Tux Penguin" "2000" "" "" 18.5.
18.6 Grouping And Combining Commands Shells allow you to concatenate and group commands for conditional execution. Each command returns an exit code which determines the success or failure of its operation. If it is 0 (zero) the command was successful, everything else marks an error which is specific to the command. The following list shows, how commands can be grouped: Command1 ; Command2 executes the commands in sequential order. The exit code is not checked.
18.7.1 The if Control Command The if command is used to check expressions. For example, the following code tests whether the current user is Tux: if test $USER = "tux"; then echo "Hello Tux." else echo "You are not Tux." fi The test expression can be as complex or simple as possible. The following expression checks if the file foo.txt exists: if test -e /tmp/foo.txt ; then echo "Found foo.txt" fi The test expression can also be abbreviated in angled brackets: if [ -e /tmp/foo.txt ] ; then echo "Found foo.
A Help and Troubleshooting A.1 Help and Documentation openSUSE® comes with various sources of information and documentation, many of which are already integrated into your installed system. Documentation in /usr/share/doc This traditional help directory holds various documentation files and release notes for your system. It contains also information of installed packages in the subdirectory packages. Find more detailed information in Section A.1.1, “Documentation Directory” (page 237).
find in /usr/share/docs also depends on the (documentation) packages installed. If you cannot find the subdirectories mentioned here, check if the respective packages are installed on your system and add them with YaST, if needed. A.1.1.1 Novell/SUSE Manuals We provide HTML and PDF versions of our books in different languages. In the manual subdirectory, find HTML versions of most of the Novell/SUSE manuals available for your product.
INSTALL How to install this package on your system. As the package is already installed by the time you get to read this file, you can safely ignore the contents of this file. README, README.* General information on the software. For example, for what purpose and how to use it. TODO Things that are not implemented yet, but probably will be in the future. MANIFEST List of files with a brief summary. NEWS Description of what is new in this version. A.1.
Number Description 5 File formats and conventions (/etc/ fstab) 6 Games 7 Miscellaneous (including macro packages and conventions), for example, man(7), groff(7) 8 System administration commands (usually only for root) 9 Kernel routines (nonstandard) Each man page consists of several parts labeled NAME , SYNOPSIS , DESCRIPTION , SEE ALSO , LICENSING , and AUTHOR . There may be additional sections available depending on the type of command. A.1.
openSUSE Support Database The openSUSE Support Database (SDB) can be found at http://en.opensuse.org/ Portal:Support_database. It features articles written as solutions for technical problems with openSUSE. They cover issues from installation and configuration, to workarounds for bugs and missing features. openSUSE Forums There are several openSUSE forums where you can dive in on discussions about openSUSE, or get support. See http://en.opensuse.org/openSUSE:Forums_list for a list.
Table A.2: Log Files Log File Description ~/.xsession-errors Messages from the desktop applications currently running. /var/log/apparmor/ Log files from AppArmor, see Part “Confining Privileges with AppArmor” (↑Security Guide) for detailed information. /var/log/boot.msg Messages from the kernel reported during the boot process. /var/log/mail.* Messages from the mail system. /var/log/messages Ongoing messages from the kernel and system log daemon (when running).
Log File Description /var/log/zypper.log Log file of zypper. Apart from log files, your machine also supplies you with information about the running system. See Table A.3: System Information With the /proc File System Table A.3: System Information With the /proc File System File Description /proc/cpuinfo Contains processor information, including its type, make, model, and performance. /proc/dma Shows which DMA channels are currently being used.
Table A.4: System Information With the /sys File System File Description /sys/block Contains subdirectories for each block device discovered in the system. Generally, these are mostly disk type devices. /sys/bus Contains subdirectories for each physical bus type. /sys/class Contains subdirectories grouped together as a functional types of devices (like graphics, net, printer, etc.) /sys/device Contains the global device hierarchy.
A.2.2.3 No Bootable DVD Drive Available If your computer does not contain a bootable DVD-ROM drive or if the one you have is not supported by Linux, there are several options you can install your machine without a built-in DVD drive: Using an External Boot Device If it is supported by your BIOS and the installation kernel, boot from external DVD drives or USB storage devices.
2 To change the boot sequence in an AWARD BIOS, look for the BIOS FEATURES SETUP entry. Other manufacturers may have a different name for this, such as ADVANCED CMOS SETUP. When you have found the entry, select it and confirm with [Enter]. 3 In the screen that opens, look for a subentry called BOOT SEQUENCE or BOOT ORDER. The boot sequence looks something like C,A or A,C. In the former case, the machine first searches the hard disk (C) then the floppy drive (A) to find a bootable medium.
A.2.2.5 Fails to Boot Some hardware types, mainly very old or very recent ones, fail to install. In many cases, this may happen because support for this type of hardware is missing in the installation kernel, or due to certain functionality included in this kernel, such as ACPI, that can still cause problems on some hardware.
acpi=strict Be less tolerant of platforms that are not strictly ACPI specification compliant. pci=noacpi Disable PCI IRQ routing of the new ACPI system. pnpacpi=off This option is for serial or parallel problems when your BIOS setup contains wrong interrupts or ports. notsc Disable the time stamp counter. This option can be used to work around timing problems on your systems.
Procedure A.4: Installation in Text Mode 1 Boot for installation. 2 Press [F3] and select Text Mode. 3 Select Installation and proceed with the installation as described in Chapter 1, Installation with YaST (↑Reference). Procedure A.5: VNC Installation 1 Boot for installation. 2 Enter the following text at the boot options prompt: vnc=1 vncpassword=some_password Replace some_password with the password to use for VNC installation. 3 Select Installation then press [Enter] to start the installation .
Although the text boot screen looks minimalistic, it provides nearly the same functionality as the graphical one: Boot Options Unlike the graphical interface, the different boot options cannot be selected using the cursor keys of your keyboard. The boot menu of the text mode boot screen offers some keywords to enter at the boot prompt. These keywords map to the options offered in the graphical version. Enter your choice and hit [Enter] to launch the boot process.
tux@mercury:~> grep "id:" /etc/inittab id:5:initdefault: The returned line indicates that the machine's default runlevel (initdefault) is set to 5 and that it should boot to the graphical desktop. If the runlevel is set to any other number, use the YaST Runlevel Editor module to set it to 5. IMPORTANT Do not edit the runlevel configuration manually. Otherwise SuSEconfig (run by YaST) will overwrite these changes on its next run.
to any action. Find more information about this topic in Section A.2.5, “Network Problems” (page 257). • If the system is configured to use Kerberos, the system's local time may have drifted past the accepted variance with the Kerberos server time (this is typically 300 seconds). If NTP (network time protocol) is not working properly or local NTP servers are not working, Kerberos authentication ceases to function because it depends on common clock synchronization across the network.
1 Check whether the user remembered his password correctly before you start debugging the whole authentication mechanism. If the user may not remember his password correctly, use the YaST User Management module to change the user's password. Pay attention to the [Caps Lock] key and unlock it, if necessary. 2 Log in as root and check /var/log/messages for error messages of the login process and of PAM. 3 Try to log in from a console (using [Ctrl] + [Alt] + [F1]).
• The machine cannot reach the authentication server or directory server that contains that user's information. • There may be problems with the X Window System authenticating this particular user, especially if the user's home has been used with another Linux distribution prior to installing the current one.
A.2.4.3 Login to Encrypted Home Partition Fails It is recommended to use an encrypted home partition for laptops. If you cannot log in to your laptop, the reason is usually simple: your partition could not be unlocked. During the boot time, you have to enter the passphrase to unlock your encrypted partition. If you do not enter it, the boot process continues, leaving the partition locked. To unlock your encrypted partition, proceed as follows: 1 Switch to the text console with [Ctrl] + [Alt] + [F1].
6 Recover your individual application configuration data (including the Evolution e-mail client data) by copying the ~/.gconf-ORIG-RECOVER/apps/ directory back into the new ~/.gconf directory as follows: cp -a .gconf-ORIG-RECOVER/apps .gconf/ If this causes the login problems, attempt to recover only the critical application data and reconfigure the remainder of the applications. A.2.4.5 Login Successful but KDE Desktop Fails There are several reasons why a KDE desktop would not allow users to login.
4 Log out. 5 Log in again. 6 After the desktop has started successfully, copy the user's own configurations back into place: cp -a KDEDIR/share .kde/share Replace KDEDIR with the directory from Step 3 (page 256). IMPORTANT If the user's own adjustments caused the login to fail and continue to do so, repeat the procedure as described above, but do not copy the .kde/ share directory. A.2.5 Network Problems Many problems of your system may be network-related, even though they do not seem to be at first.
managed by a broken name server would not be able to “see” each other and communicate. NTP (Time Service) A malfunctioning or completely broken NTP service could affect Kerberos authentication and X server functionality. NFS (File Service) If any application needs data stored in an NFS mounted directory, it will not be able to start or function properly if this service was down or misconfigured.
whether your system is reachable by running ping IP address or your_hostname from another machine. If you can reach your machine from another machine, it is the server that is not running at all or not configured correctly. If ping fails with unknown host, the name service is not configured correctly or the hostname used was incorrect. For further checks on this matter, refer to Step 4b (page 259). If ping still fails, either your network card is not configured correctly or your network hardware is faulty.
If all the relevant entries on the host are correct, let your system administrator check the DNS server configuration for the correct zone information. For detailed information about DNS, refer to Chapter 15, The Domain Name System (↑Reference). If you have made sure that the DNS configuration of your host and the DNS server are correct, proceed with checking the configuration of your network and network device.
4 Collect any information about the state of NetworkManager in /var/log/ NetworkManager. For more information about NetworkManager, refer to Chapter 25, Using NetworkManager (↑Reference). A.2.6 Data Problems Data problems are when the machine may or may not boot properly but, in either case, it is clear that there is data corruption on the system and that the system needs to be recovered.
2 Create a backup profile holding all details needed for the backup, filename of the archive file, scope, and type of the backup: 2a Select Profile Management > Add. 2b Enter a name for the archive. 2c Enter the path to the location of the backup if you want to keep a local backup. For your backup to be archived on a network server (via NFS), enter the IP address or name of the server and the directory that should hold your archive. 2d Determine the archive type and click Next.
A.2.6.3 Restoring a System Backup Use the YaST System Restoration module to restore the system configuration from a backup. Restore the entire backup or select specific components that were corrupted and need to be reset to their old state. 1 Start YaST > System > System Restoration. 2 Enter the location of the backup file. This could be a local file, a network mounted file, or a file on a removable device, such as a floppy or a DVD. Then click Next.
• Resize partitions using the parted command. Find more information about this tool at the GNU Parted website http://www.gnu.org/software/parted/parted .html. The rescue system can be loaded from various sources and locations. The simplest option is to boot the rescue system from the original installation medium: 1 Insert the installation medium into your DVD drive. 2 Reboot the system. 3 At the boot screen, press [F4] and choose DVD-ROM. Then choose Rescue System from the main menu.
Checking and Manipulating Configuration Files As an example for a configuration that might be fixed using the rescue system, imagine you have a broken configuration file that prevents the system from booting properly. You can fix this using the rescue system. To manipulate a configuration file, proceed as follows: 1 Start the rescue system using one of the methods described above.
mount /dev/sda6 /mnt mount --bind /dev /mnt/dev 2 Now you can “change root” into the new environment: chroot /mnt 3 Then mount /proc and /sys: mount /proc mount /sys 4 Finally, mount the remaining partitions from the installed system: mount -a 5 Now you have access to the installed system. Before rebooting the system, unmount the partitions with umount -a and leave the “change root” environment with exit.
1 Perform the necessary steps to access the installed system as described in Section “Accessing the Installed System” (page 265). 2 Check whether the following files are correctly configured according to the GRUB configuration principles outlined in Chapter 9, The Boot Loader GRUB (↑Reference) and apply fixes if necessary. • /etc/grub.conf • /boot/grub/device.map • /boot/grub/menu.lst • /etc/sysconfig/bootloader 3 Reinstall the boot loader using the following command sequence: grub --batch < /etc/grub.
nized by the operating system. The vendor typically releases a Driver Update Disk with the fixed or updated version of the required driver. In both cases you need to access the installed system in the rescue mode and fix the kernel related problem, otherwise the system may fail to boot correctly: 1 Boot from the openSUSE installation media. 2 If you are recovering after a faulty kernel update, skip this step.
A.3 Legal Notice Copyright© 2006–2012 Novell, Inc. and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”.
arranged to thwart or discourage subsequent modification by readers is not Transparent. An image format is not Transparent if used for any substantial amount of text. A copy that is not "Transparent" is called "Opaque". Examples of suitable formats for Transparent copies include plain ASCII without markup, Texinfo input format, LaTeX input format, SGML or XML using a publicly available DTD, and standard-conforming simple HTML, PostScript or PDF designed for human modification.
I. Preserve the section Entitled "History", Preserve its Title, and add to it an item stating at least the title, year, new authors, and publisher of the Modified Version as given on the Title Page. If there is no section Entitled "History" in the Document, create one stating the title, year, authors, and publisher of the Document as given on its Title Page, then add an item describing the Modified Version as stated in the previous sentence. J.
notices and disclaimers. In case of a disagreement between the translation and the original version of this License or a notice or disclaimer, the original version will prevail. If a section in the Document is Entitled "Acknowledgements", "Dedications", or "History", the requirement (section 4) to Preserve its Title (section 1) will typically require changing the actual title. 9.