Some notes on browsers:
* The ulight browser doesn't seem to play youtube videos
* Youtube videos will work on firefox (installed via the ppm), however, the libraries won't load properly without some tricks.
* Chromium has issues with ssl certificates, which I seem to have fixed but don't exactly know how.
Getting Firefox to Work (installed via the ppm)
Symbolicly link the libraries in the /usr/lib/firefox folder to /usr/lib. This can be done by dragging them in rox from folder to folder and selecting link relative. Then run the command ldconfig. Alternatively we might be able to add the /usr/lib/firefox folder to the environmental variable LD_LIBRARY_PATH prior to running firefox.
Notes on Chromium
I tried various things to get ssl certificates working on chromium (see below). However, chromium started working after I got firefox working which was related to symlinking the files in the /usr/lib/firefox folder from /usr/lib and then running the ldconfig command.
One thing that I did when trying to get firefox to work was to dlownload the
2015 snapshot of
xulrunner. I did this because when firefox was loading it wasn't finding the library libxul.so (which was in the firefox folder but I didn't realize that). The package has the libraries "libssl3.so and libnss3.so", the debian website tells me that both of the libs are part of
libnss3. Here is the description:
Network Security Service libraries
This is a set of libraries designed to support cross-platform development of security-enabled client and server applications. It can support SSLv2 and v4, TLS, PKCS #5, #7, #11, #12, S/MIME, X.509 v3 certificates and other security standards.
https://packages.debian.org/buster/libnss3
In debian these libs are packaged with firefox-esr. In the arch32 repo, we are using firefox-esr but it is just called firefox. However, arch is not packaging these libnss3 libs with firefox.
Returning to chromium there is this note on archwiki:
SSL certificates
Chromium does not have an SSL certificate manager. It relies on the NSS Shared DB ~/.pki.nssdb. In order to add SSL certificates to the database, users will have to use the shell.
https://wiki.archlinux.org/index.php/Ch ... rtificates
perhaps the problem is solved by adding the necessary firefox-esr related libs or equivalently related libs from libnss3 and xulrunner. I think though that the xulrunner project was merged into firefox-esr.
Notes on certificates
If you install the ca-certificates packages from the puppy package manager in arch32pup, you do not get the script update-ca-certificates like you do in debian and ubuntu. See:
https://wiki.archlinux.org/index.php/Us ... _Ubuntu%29
instead for systemwide configurations there are the following instructions:
Currently Arch Linux uses p11-kit from Fedora, which has more features (e.g. explicit distrusts) than the older scripts from Debian. To import a trust anchor using p11-kit, do:
Code: Select all
Run trust anchor --store myCA.crt as root.
The certificate will be written to /etc/ca-certificates/trust-source/myCA.p11-kit and the "legacy" directories automatically updated.
If you get "no configured writable location" or a similar error, import the CA manually:
Copy the certificate to the
Code: Select all
/etc/ca-certificates/trust-source/anchors
directory.
Run
For more information, see the update-ca-trust(8 ) manual page.
https://wiki.archlinux.org/index.php/Us ... _Ubuntu%29
What I tried related to certificates
I tried both the system wide methods mentioned for arch and debian. The ca-certificates package in the arch repos doesn't seem to give you the actual certificates...or at least not in the form that debian does.
To get the debian version of the pacakge you can either download
OscarTalks version or you can download the version from sid at:
https://packages.debian.org/sid/all/ca- ... s/download
Each of these versions has the same certificates but I think the sid version has a newer update-ca-certificates scirpt. I would probably use the sid version, however OscarTalks version is needed for older puppies like presie light.
Anyway prior to installing this package delete the certificates in:
/usr/share/ca-certificates
These should be in the mozilla sub folder. Leave the trust-source sub folder.
Then update the certificates as follows:
Code: Select all
cd /etc/share/certificates
find . -wholename './mozilla/*' | sed 's#^./##' > /etc/ca-certificates.conf
update-ca-certificates
Find me on [url=https://www.minds.com/ns_tidder]minds[/url] and on [url=https://www.pearltrees.com/s243a/puppy-linux/id12399810]pearltrees[/url].