[00:17] stokachu: in the conjure-up snap, why don't you stage the conjure-up part's usr/lib/python3.5? Isn't that where site-packages get installed to? And also since it's after python3.6, wouldn't it be 3.6? [00:17] stokachu: nm on the first, i see it's usr/lib not lib/python [01:27] nice work on lxd integration! === dkh is now known as notdaniel === brianw_-_-_ is now known as brianw === lfrlucas_ is now known as lfrlucas === Raboo_ is now known as Raboo === PaulePan1er is now known as PaulePanter [06:12] Good morning === ikonia_ is now known as ikonia [08:15] hi huys how can i kill tcp 0 0 127.0.0.1:6379 0.0.0.0:* LISTEN 5140/redis-server 1 ? [08:16] kill -9 pid doesnt work it restarts again with a new pid. /etc/init.d/redis-serer doesnt exists [08:19] systemctl stop redis(-server) ? [08:31] guys, which approach better and more secure: i setup access via ssh using keys, but anyway i need pass to execute some root command [08:33] rh10: Not sure I understand your question fully, but sounds like you might want to configure sudo to allow you to run that specific command without having to enter a password. [08:35] andol, yep. is most properly way to do it in ubuntu using NOPASSWD option in sudoers? [08:38] rh10: Yepp, NOPASSWD would be it, and (again) preferably having that sudouers entry be restricted to running a particular command. [08:39] andol, got it, thanks [08:41] another question. is ubuntu docs (official, community, wiki available as packages for install in disconnected networks? [09:01] guys anyone know a tool for check if your ubuntu server are secured ? === dasjoe_ is now known as dasjoe [09:06] funabash1: How you define secured? Out of the box an Ubuntu server is reasonably secure. Then there are plenty of ways you can create users, install services, etc and make it less secure. [09:06] funabash1: On the other hand, if you want it to be secure in a boolean sense there is always the option to both pull the network chord as well as the power chord. [09:09] funabash1: Anyway, what tools can help you with is that they can warn you about (obvious) insecurities, but the lack of such discoveries doesn't translate into the server being "secure" per se. [09:10] andol: like a vulnerability scanner [09:10] patched version of programs etc [09:11] lynis maybe is a good tool === Into_the_Pit is now known as Frickelpit === sobukus_ is now known as sobukus === israfel- is now known as israfel [10:53] Hi all [10:53] Currently now server using 99% of my memory, In linux how can i find the exact amount of memory you would need? [11:14] ok now be honest who of you is Mark Shuttleworth? :-) [11:15] thought this is a nice system montitor, maybe ubuntu likes to add to their packages: https://github.com/aksakalli/gtop [11:28] adac gtop looks pretty [11:29] htop is always an option too [11:29] and it's in the repositories [11:37] wretchedspirit, yeap using that one :) [11:37] mean htop already. very handy [11:38] hell yeah [12:08] adac: it is based on 'node.js'!!!!!! :-( [12:15] yeah :/ [12:17] when I push to git, I'd like my remote server to pull automatically, so that my website is updated. What's the best way to make this automatic? Maybe instead of just pushing I can run another command that pushes and pulls remotely. But how can I make such script? [12:26] stanfordtools: You mean something like: https://www.digitalocean.com/community/tutorials/how-to-set-up-automatic-deployment-with-git-with-a-vps [12:37] no [12:37] well, kinda [12:37] I don't want a bare repo [12:38] I don't think that that matters. The point of the tutorial is the post-receive scripts. [12:53] lordievader, I don't need those. I found a way to git pull via ssh [12:53] so, i think that's all i need [12:54] I guess I misunderstand what you want then. === JanC_ is now known as JanC === mundus2018 is now known as mundus === genii_ is now known as genii === hehehe is now known as hehehe_away === hehehe_away is now known as hehehe [20:04] dpb1: rbasak: i think i've fixed all the segfaults on x on a, still working through the python dependency chain to make sure the integration tests pass [20:04] rbasak: you mentioned writing a test for the changelog case I hit yesterday (that is, dpkg-parsechangelog skipping some entries). How do I do that in pytest? [20:06] nacc: drop a changelog file that exhibits the problem, and a test function that asserts it? [20:07] I don't really know how else to answer the question, sorry. [20:07] rbasak: we would just be testing dpkg-parsechangelog? [20:07] rbasak: so i'm not sure what the test shows us other than you can't rely on the behavior on certain distros [20:08] nacc: I'm suggesting a test that verifies that the behaviour is the one that we expect, that's all. [20:08] So the test will instantly fail if using a wrong dpkg-parsechangelog. [20:08] rbasak: right, but I'm trying to understand who uses that test? [20:08] and I don't expect someone runnning from git on xenial to run the unit tests before using the tooling [20:08] since that seems like the 'use case' -- to konw that you can't do that :) [20:13] rbasak: i suppose we could have git ubuntu do self-tests on startup and fail to run unless you're on a 'good' OS [20:13] the snap would somehow avoid that, i thinkn [20:14] at the same time, the fix is probalby to fix dpkg-parsechangelog on xenial :) [20:28] nacc: that's a good point. I had assumed the test would fail if we do it wrong, but as you point out there's a build time vs. runtime distinction. [20:28] rbasak: yeah, it's messy :) [20:28] implies, to me, that dpkg-dev needs the unit test [20:28] nacc: perhaps we should run our test suites (or a subset that is possible) after building a snap, from the snap? [20:28] rbasak: yeah, i was going to try that next (via our jenkins job) [20:29] i think i'll need to switch to a shell [20:29] but also means i'll need to snap pytest :) [20:29] so not a priority itself yet [20:29] pytest-3, rather [20:29] This feels like a common problem for all snappers to me. [20:29] As-installed testing for snaps. [20:29] A bit like dep8. [20:29] just asked that i #sanppy [20:29] *snappy [20:30] * nacc needs to clean under the n key