Since you managed to use systemd-nspawn, I guess you managed to mount your
system. Assuming it is mounted on /mnt/sysroot you can simply use chroot instead
of systemd-nspawn, as follows:
Sorry Iām late here but to answer some of the questions, systemd-nspawn i like chroot but in my opinion, simpler. You essentially mount your system with it and from inside that container you can do everything you need including updating the system, and retrieving logs.
I should have left a couple commands to help ease the situation, but I was in a hurry.
So an example command would have been something like this :
systemd-nspawn -Dbn /path/to-the/luks-xxxx-xx
this would have D pointed to your luks container so you can enter password and decrypt it
b booted the container
n gave you networking access.
then once inside the container, you could have done anything you needed.
I wonāt say itās wasnāt a spelling error , but itās just extra confusing that the options arenāt listed under dnf distro-sync --help or on the dnf documentation page. Iām also still very much a novice with Linux, so Iām also not sure what Iām even looking at more than half the time; the options are probably just listed somewhere else maybe.
I had to look up what the luks stuff was. I eventually found two luks files under /dev/mapper/ on the Live USB. It seemed to line up since there are two encrypted drives in the machine, but there was an error regarding a missing bn directory:
Iāve been decrypting the drives through the Gnome file explorer, so Iām not sure they need to be decrypted. I can run systemd-nspawn -bn and systemd-nspawn -n without issue.
Even with that, when I try to run sudo dnf distro-sync --refresh --releasever=43, it seems that either the network still isnāt getting passed through or I donāt have permissions.
systemd-nspawn -n then sudo dnf distro-sync --refresh --releasever=43: