/srv/irclogs.ubuntu.com/2018/04/09/#ubuntu-server.txt

cpaelzergood morning05:10
lordievaderGood morning06:06
=== ejat_ is now known as ejat
CheckmateHello is possible to resize root path /10:15
RoyKCheckmate: yes10:24
RoyKCheckmate: it might be easy, it might be hard, depending on your setup ;)10:24
CheckmateRoyk teach me the way please10:25
RoyKCheckmate: please detail your setup - what you want (bigger or smaller filesystem? what sort of filesystem? partitions or lvm? etc)10:26
CheckmateRoyk pastebin.com/raw/UczkUVuY10:28
Checkmatei have 2Tb on /home/ i want to add 60gb to /dev/root10:28
CheckmateRoyk is Linux rev 1.0 ext4 filesystem10:30
CheckmateI try this resize2fs /dev/sda3 60G10:39
CheckmateThe containing partition (or device) is only 5119744 (4k) blocks.10:39
waveformCheckmate, you need to expand the partition containing the file-system before you can expand the file-system. However, assuming /dev/sda4 comes immediately after /dev/sda3 (which is presumably /dev/root) you first need to *move* /dev/sda4. This is the pain of using partitions instead of LVM10:40
waveformunfortunately that's non-trivial - assuming you've got physical access to the box, you're probably best off booting from some live disk (e.g. an Ubuntu installer) and using gparted to do all this for you10:41
Checkmatewaveform you mean i need to swap i'm on vps i dont know how to expand /dev/sda410:45
RoyKbetter reinstall on lvm, add as much as *needed* to each partition. Also, is the 2TB on /home on another disk?10:47
waveformah, vps - so no physical access and the disks are probably just files anyway10:47
CheckmateRoyk is only on /home but i don't know how i can resize on vps10:48
waveformin that case just expand /dev/sda3 through whatever interface your vps provides for configuring storage on the instance (assuming it provides such an option), reboot and retry your resize2fs command (you can leave off the size - if omitted, resize2fs just expands the file-system to the size of the container/partition)10:48
RoyKCheckmate: the provider can probably help10:48
Checkmatewaveform i can expand /dev/sda3 to /dev/sda4 ?10:49
waveformCheckmate, no: you just need to expand /dev/sda3. Because you're on a VPS, /dev/sda3 is probably just a big file on some server pretending it's a partition on your VPS' disk. Your provider will (hopefully) have some interface you can use to request/give more space to /dev/sda310:51
Checkmateplease i dont know what command using to expand10:51
waveformwe can't tell you that: it won't be something on the server itself; it'll be something in your vps' control panel (i.e. on the website you used to set up the vps)10:52
waveformhence, it'll also be specific to the vps provider10:52
Checkmateok looks i need to contact ovh support10:53
Checkmatewaveform if i'm on  the rescue mode11:28
Checkmatei can adjust size safely?11:28
waveformexpanding a file-system can generally be done online (sometimes, depending on file-system, even when it's mounted) but you need to have expanded the container of the file-system first11:33
waveformI think I'm right in saying ext4 is one FS which permits online expansion; in other words, if you've expanded your /dev/sda3 (through your vps) you should be able to resize2fs it with or without booting to rescue mode11:34
Checkmatecan you please give me the commands to expanded /dev/sda311:37
TJ-waveform: correct, I use that regularly with LVs that grow. "resize2fs /dev/sdXY"11:38
waveformCheckmate, if you've resized the /dev/sda3 "partition" (in quotes because this is on a vps so it's probably not *really* a partition), just "resize /dev/sda3" and it'll expand to the size of the new container11:39
waveformTJ-, yeah - I was sure I'd done that on my LVs at some point but it's one of those things I haven't needed for a year or so and I have to re-check each time :)11:39
Checkmatewaveform give me the command i want to try if i can resize or not11:41
TJ-Checkmate: I just gave it11:41
TJ-Checkmate: "resize2fs /dev/sdXY"11:42
Checkmateyou mean resize2fs /dev/sda3 200G11:42
Checkmatewhy when i check df -h i see the same size nothing changed!!11:43
waveformas mentioned: you *don't* need to specify the size. Just "resize2fs /dev/sda3" and it'll expand to the size of the container (*if* the container has been expanded)11:43
Checkmatewhen i do this command giving me result  The containing partition (or device) is only 5119744 (4k) blocks.11:43
waveformsimple - it means you haven't expanded the container11:44
Checkmatewaveform can i expanded it my self or only by the provider?11:45
waveformdepends on the provider - some (most? in my experience) provide some means to do this through their interface/website - but for a few it is "contact support"11:45
Checkmatewaveform possible by rescue11:46
Checkmatedo you have the command i should give it a try then if doesn't work i will contact the support11:47
waveformCheckmate, as you're on a vps this is *not* something you're going to be doing from within the Ubuntu command line - this'll be something on your provider's site11:47
Checkmatewaveform its not by the command line?11:52
waveformno11:52
waveformnot typically on a vps11:52
=== devil is now known as Guest20311
=== nacc_ is now known as nacc
=== Guest20311 is now known as devil__
JediMasterhey guys, we're preparing for Bionic/18.04, getting a bunch of test servers up and running, and I'm sure that I saw PHP 7.1 support, as well as 7.2, for Bionic, yet I can't find any 7.1 packages now, does anyone know if PHP 7.1 has been ditched from Bionic?16:29
JediMasterhttps://launchpad.net/ubuntu/bionic/+source/php7.1 says "There is no current release of this source package in The Bionic Beaver."16:29
JediMasteryet the source package exists16:29
naccJediMaster: yes, we are on 7.2 only16:30
naccJediMaster: php7.1 exist in Artful16:30
JediMasternacc: thought so16:30
naccJediMaster: it does not exist in bionic16:30
JediMasterThe problem is that PHP 7.2 no longer has the 'php-mcrypt' module as it lost support something like 7 years ago, and there are a lot of major PHP based applications that rely on it16:30
naccJediMaster: right, there's a pecl repository16:31
naccJediMaster: or move the php applicaiton to openssl like it should have 5 years ago16:31
naccmost upstreams have at least started that16:31
JediMasterAh, I didn't know that, so you could in theory install mcrypt through pecl then16:31
naccJediMaster: yes, i believe so16:32
JediMasternacc, unfortunately we host Magento sites, and Magento only started work on 7.2 support at the start of the year, so there's no chance it'll be ready for 18.04's release, or likely until the end of the year16:32
naccJediMaster: right, i've heard this issue for magento16:33
JediMasterIt'd be great to move people over to the latest LTS release, but I think that composer requirements on the latest (even beta) Magento support 7.1 at best16:33
naccwhich... isnot in ubuntu :)16:33
naccyeah, they seemed to be a bit behind the curve on this one16:34
JediMasterYeah, I know it's not an ubuntu issue =)16:34
dpb1JediMaster: good thing 16.04 has many years left.16:34
dpb1:)16:34
JediMasterdpb1, yeah but, not as shiny new as 18.04!16:34
JediMasterbleeding edge all the way16:34
dpb1there there 16.04, he didn't mean it.16:35
dpb1JediMaster: I'm with you16:35
dpb1:)16:35
JediMasterThat's why I drive beta cars (aka Electric)16:35
naccJediMaster: you also could run 18.04, and 16.04 in a vm or container16:35
JediMasternacc, it's already virtualised, that'd be a bit horrid nesting it ;-)16:36
dpb1lxd16:36
naccJediMaster: :)16:36
JediMasterdpb1, I've not come across lxd, just reading up on it16:37
dpb1JediMaster: for pure application workloads (like php) it's fantastic16:39
sdezielJediMaster: you could have 16.04 containers with PHP-FPM (7.0) serving the dynamic stuff and have the shiny new web frontend of your choice that comes with 18.0416:43
sdezielyou could probably also have your DB backend running on 18.0416:44
JediMasterit's easy enough on our multi-server setups where we have a load balancer (nginx serving static content directly and load balancing php), multiple PHP-FPM servers (no web server) and a database server, as we'd just make the PHP-FPM servers 16.04 and the rest 18.0416:46
JediMasterbut on a standalone machine it sounds like quite a lot of hassle having a container just to run PHP-FPM16:47
naccJediMaster: only because you are trying to use a version of an extension not supported16:47
naccthat's the hassle-source, focus on that :)16:48
naccif you are going to use old software, setup a reproducible deployment enviornment for it16:48
JediMasteralso the application (which we can't realistically re-write) doesn't officially support 7.2, but does 7.116:48
naccJediMaster: yeah16:48
naccJediMaster: that's why i'm saying it doesn't makes sense to move the underlying OS for htat application16:49
naccJediMaster: i believe magento also supports 7.0, and just run magento in the container16:49
naccwhich can run in any VM/host16:49
JediMasterYeah, it's another 3 years support on 16.04 now isn't it?16:49
naccJediMaster: yep16:49
naccJediMaster: hopefully by then magneto gets its act together :)16:49
naccJediMaster: note that debian is putting the smae pressure on them, as their next release will also be 7.2 only, iirc16:50
JediMasterYeah, I think that's the same conclusion we've come up with16:50
JediMasterGood to know, I suspect we can move people to 18.04 in maybe 6 months, but meh16:50
naccJediMaster: it's not ideal, but it's also waht upstream PHP has decided16:50
naccJediMaster: there's always a chance we'll get enough outcry that we'd package mcrypt ourselves, but I've been trying to avoid it16:51
naccas I don't think we can really support it (so it'd be in universe) and it's not great for that package to not get security updates16:51
JediMasterindeed16:51
JediMasternacc, thanks for the help, always nice to talk to the Canonical peeps16:57
naccJediMaster: np :)16:57
tewarddpb1: were you hunting me for something?17:24
tewardI've been insanely busy the past few weeks, if so17:24
naccteward: nginx merge, most likely17:25
naccwhich we just landed (in bionic-proposed)17:25
tewardnacc: right, i saw that.17:25
tewardthanks by the way :)17:25
naccteward: np17:25
teward(FYI: I'm autosubbed to app the nginx bugs, no need to specifically subscribe me to the merge requests, FFes, etc.17:25
tewardI saw you added me to a specific one, but i'm subbed to them all automatically)17:26
tewardnacc: any major evils in the merge process?17:26
tewardout of curiosity :017:27
teward:) *17:27
naccteward: just some dropped noise17:28
naccteward: nothing otherwise noticed17:29
tewardcool.  glad to hear that :)17:37
shubjeroAnyone here using Ubuntu cloud images? I'm using OpenStack to deploy a large VM with Ubuntu 16.04 EFI/GPT cloud image but the root disk doesnt get deployed any bigger than 2TB despite the partition scheme being GPT. Any thoughts?17:55
sarnoldwhat's the backing store?17:56
shubjeroThe underlying virtual block device 'lsblk' is showing up as 5.3T17:56
shubjeroqcow217:56
shubjeroimage: disk17:57
shubjerofile format: qcow217:57
shubjerovirtual size: 5.3T (5798205849600 bytes)17:57
shubjeroI have the ability to add a second partition that consumes the rest of the free space on the block device but that's not how I want this to work.17:57
tomreyni know that xen has a bug in some versions restricting it to this size, but i guess you'll be using kvm?18:05
tomreynshubjero: ^18:05
shubjeroYeah, KVM18:09
=== hosified_ is now known as hosified
dpb1teward: we got enough context and proxying from rbasak, nacc and others to confirm that it's what you would have wanted.18:11
dpb1teward: thanks for confirming. :)18:12
tewarddpb1: yep.  I had asked the SErver Team to help out :)18:15
tewarddpb1: given the fact that the weeks up to yesterday were chaotic prepping for basially a "tear it all down and rebuild" for the corporate network here at work18:16
tewardinstead of switch level routing for VLANs, the firewall now does the routing, so the ACLs we had in place now actually work!  :D18:16
tewardsince that's all done i can relax a bit now heh18:16
dpb1teward: sounds fun actually. :)18:17
tewarddpb1: well, doing the overhaul was.  Cleaning up the fires afterwards, not as much.18:42
tewardbut yeah, nacc and the rest of the Server team did a very good job with the merge, so +1 to them for helping me out :)18:42
dpb1teward: haha, yes.  the fun ends when you have to support it18:42
tewardwell, considering the *state* of the network before we did this18:43
tewardit was already at an unsupportable cluster**** of a network so we fixed that to make it *less* of one :P18:43
tewardstill got a complete nuke-and-redo on the radar but :p18:43
tewardthat's a longer term plan :P18:43
tewarddpb1: I will say this though:18:44
tewardmerges are easier than having to introduce *new* binary packages for a MIR :p18:44
* teward shivers when he remembers the MIR of nginx back in the 14.04/14.10 era18:44
sarnoldteward: they're not all that bad :)18:45
apb1963Is there a reason why /bin/false is not in /etc/shells?18:45
tewardapb1963: `/bin/false` isn't a shell?18:45
dpb1man18:45
tewardprobably, anyways.18:45
dpb1that would be an awesome shell18:45
dpb1I think actually in the old days it was used in /etc/passwd18:45
tewardapb1963: `/bin/false` can be *used* as a shell assignment to prohibit logins but it's not a shell in and of itself18:46
dpb1maybe still?18:46
tewarddpb1: still is for some system users.18:46
sarnoldapb1963: heh, tough choice .. ask the service to knock someone out *before* executing false? or trust false hasn't been boogered up?18:46
tewardor at least a few in a custom installation system.18:46
dpb1yes18:46
* teward still uses it to deny certain system accounts from logging in :P18:46
dpb1you are right18:46
dpb1apb1963: anyway, what's your question behind that one18:46
tewardsarnold: with the help from infinity and the rest of the teams, the nginx MIR was pretty painless.  Can't say that for every MIR or package introduction though.18:47
apb1963well, I only ask because https://help.ubuntu.com/lts/serverguide/ftp-server.html recommends adding it... although they call it "nologin".. but same idea18:47
apb1963so, I think that's got to be a bad idea.18:47
sarnoldteward: yeah, nginx was around the middle-point I think. pcp took a *lot* more time and effort from a lot more people .. thunderbolt-tools (which I did last week) was really just a few hours of reading and done.18:47
tewardapb1963: well, /usr/sbin/nologin is *not* /bin/false, but...18:48
tewardI think the answer is "Use your judgement"18:48
apb1963that's not really an answer... was hoping for something more definitive.18:48
tewardsarnold: well most of the evils of the NGINX MIR were the third-party utilities/plugins18:48
tewardapb1963: i'm balancing multiple things patience is a virtue18:49
apb1963ok18:49
tewardI think i'm going to ask you a more pointed question though18:49
tewardwhy the heck do you need to set up an FTP server18:49
sarnoldhehe18:49
tewardand what does SFTP *not* provide that needs you to resort to an FTP server?18:49
tewardFTP is evil and is 99% a plaintext protocol that deserves to be incinerated18:49
sarnoldif only sftp had an easier anonymous mode..18:50
apb1963SFTP?  I thought ftps was the be-all and end-all of ftp security.18:50
teward*twitches*18:50
tewardapb1963: SFTP is SSH tunneled, versus FTP with SSL.  SFTP has some other mechanisms in it too.  But you didn't answer my question ;)18:50
tewardwhich was "Why do you need an *FTP* server"18:51
apb1963Because wordpress in all its wisdom and glory, requires it.18:51
tewardfun fact: tftpd + configuration + localhost only bind == sane18:51
apb1963at least... to install plugins18:51
tewardlet me check what I do on my WP instances... *grabs his SSH keys*18:52
sarnoldsftp is actually a well-specified protocol; directory listings can be machine parsed reliably. ftps relies upon a human to read the ls output and make sense of it. machine parsing that output is a best-effort kind of thing18:53
sarnoldI don't know if ftps actually handles early termination well or if it requires proper tls termination..18:53
apb1963honestly, it doesn't matter to me which protocol... as long as wp finds it acceptable, I'm happy.  The problem is that what I read about SFTP seemed more complex than ftps.18:54
apb1963and I like simplicity18:54
tewardapb1963: using it for WP is a no-go18:55
apb1963Considering I'm going to set it up once and forget it, I'd rather not have to read War & Peace to figure it out.18:55
apb1963teward, "it" being?18:55
tewardSFTP18:55
tewardFTPS is also evil and TBH Wordpress can access it locally without SSL18:55
tewardmy FTP for my WP systems only listens on localhost on a nonstandard port, and is pretty darn basic otherwise18:55
apb1963well it wants an ftp login to proceed with installation of a plugin18:55
apb1963so i'm just trying to make it happy18:56
sarnoldew18:57
tewardwell18:57
tewardmy `ftp` user has `/bin/false` for the FTP Daemon user18:57
tewardbut I don't add dedicated FTP users18:57
dpb1teward: and /etc/shells?18:58
dpb1on that same server18:58
tewarddpb1: getting there hang on18:58
tewardbut keep in mind that *that* user's setting is irrelevant18:58
apb1963I was thinking that the right way to go would be to change /bin/false to something in /etc/shells already18:58
dpb1whatever user WP users, is what I'm asking, I think.18:58
tewardbecause to edit a wordpress dir, FTP and the user logged into it *still* needs permissions18:58
tewarddpb1: my WP uses my own user login locally18:58
dpb1ah18:59
tewardso it *can't* have anything but a legitimat eshell18:59
tewarddpb1: this being said, my website roots all have custom ACLs to permit my user read/write outside of the www-data user and group18:59
tewardbut again, paranoid insane maniacal security guy here :)18:59
tewardso ACLs are fun18:59
dpb1apb1963: If you want a "non-interactive" user to use FTP, I'd go the other way18:59
teward^ this18:59
apb1963dpb1, what's the other way?19:00
dpb1basically, follow the wiki guide19:00
dpb1add /bin/false to /etc/shells19:00
tewarddpb1: he'll still have to mess with permissions for the wordpress docroot19:00
dpb1but keep your FTP listening on localhost only19:00
tewardeven with a noninteractive user19:00
apb1963dpb1, And allow all the uid's with /bin/false as a shell, shell access?19:01
dpb1apb1963: I don't think it would change anything for things other than ftp19:01
dpb1try it19:01
dpb1if you ssh into a server and the shell is /bin/false and that is added to /etc/shells19:01
dpb1what happens?19:01
apb1963It changes everything for any uid with /bin/false as a shell... presumably there's a reason why they're disallowed login.19:01
teward*tests something that dpb1 is talking about in a container*19:02
dpb1irdk what the side effects are, other than vsftp caring19:02
apb1963dpb1, See, I'm not a security expert... and when people tell me to do what seems to be the equivalent of chmod 777... yeah, that works.. but is it wise?19:02
apb1963Right, I don't know the side effects either.  And that's why I'm here... to get those answers.19:03
tewardapb1963: adding /bin/false to /etc/shells won't let them login19:04
tewardbecause it autokills the connection instantly19:04
apb1963you tried it?19:04
dpb1but that is just ssh19:05
* sarnold sees a 777 and falls over19:05
dpb1I don't know what other side effects there are19:05
apb1963Right... none of us appear to know19:05
apb1963The fact that it autokills (sure, it executes /bin/false and done), doesn't mean a gaping security hole might have been opened up.  We just don't know.19:06
tewardhttps://paste.ubuntu.com/p/c3df2fxRFV/ shows the example19:06
tewardapb1963: yes I did, in an LXD container running 16.04 inside it19:06
tewardapb1963: well if the FTP server is listening only on localhost I don't think there's that much of an issue19:07
tewardbut I also can specify /bin/false *as* a shell ***without*** editing /etc/shells19:07
sarnolda decade ago I read a nice thing about .. openbsd? openwall? and their /bin/false and what they did to make it bulletproof..19:07
apb1963There you go.  The fact that such an article even exists is proof of what I'm saying... it could be a security issue.  We just, don't know.19:08
tewardapb1963: I could make the argument that there is *still* holes inside any implementation of any controlsystem to restrict users19:08
tewardkeep that in mind that 'security' is never truly bulletproof19:09
apb1963And, unless someone sees a reason I shouldn't give ftp a real shell... or, perhaps even a new wpftp user.19:09
tewardanything you do is an accepted risk19:09
dpb1apb1963: https://serverfault.com/questions/328395/nologin-in-etc-shells-is-dangerous-why - in the absence of any one else chiming up, here's what I'd do.  copy /bin/false to /bin/false-ftp, and set the user you have designated for unattended access for WP to that.  then add that to /etc/shells19:09
teward^ that19:09
tewardbut consider that you don't *need* to put anything in /etc/shells to use it as a shell19:10
tewardso for your FTP 'system' user you can manually force it to be anything not in /etc/shells19:10
sarnoldwell now I'm confused as hell http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.bin/false/false.c?rev=1.1&content-type=text/x-cvsweb-markup19:11
apb1963dpb1, yeah, that's along the lines of what I was thinking... but the /bin/false-ftp is a great idea.19:11
tewardbut consider if the FTP server only listens locally, you still need to *breach* the server to get to the FTP server to exploit.19:11
apb1963teward, you lost me on the manual forcing.19:11
apb1963teward, or more precisely.... the part about "not" in /etc/shells.19:12
tewardapb1963: `usermod --shell /bin/false USERNAME` <-- forces the  shell to be /bin/false or anything else I want it to be, regardless of what valid login shells are in `/etc/shells`19:12
tewardagain, writing up an example but LXD is slow19:12
apb1963Yes19:12
apb1963oh and thank you for that... I was searching for that command earlier19:12
dpb1sarnold: haha19:14
sarnolddpb1: cute right? :)19:15
tewardoooh i discovered an evil19:20
tewarddpb1: for local allowed users, `/bin/false` and `/usr/sbin/nologin` both prevent FTP logins over FTP proto19:20
tewards/allowed users/users/19:20
dpb1what ftp are you using19:20
tewardbog standard `ftp` on the command line19:20
tewardand Filezilla19:20
tewardwith vsftpd server in a container19:20
dpb1server, I mean19:20
dpb1ah ok19:20
tewardwhich coincidentally is what the server guide is saying to use :p19:21
tewardonly worked when I put a shell to the user, and that user is a bog-standard no-privs user19:21
sarnoldfor good reason, least bad option :)19:21
dpb1teward: so, you tried /bin/false in /etc/shells ?19:21
tewarddpb1: i'm testing everything standby :P19:21
dpb1teward: also make sure you restart vsftpd19:21
tewarddpb1: already did.  twice ;)19:22
dpb1heh19:22
dpb1teward: I mean, ya, you are just trying out the instructions and they are not working.  -> fail19:22
tewardoh interesting.19:22
tewarddpb1: OK so...19:24
teward /usr/sbin/nologin did not work, until it was in /etc/shells19:24
tewardbut this is with a local user purpose-created to be a 'service' user19:24
tewardfails for /bin/false without it being in /etc/shells19:25
tewardworked when added to /etc/shells19:25
tewardnot sure how my other system works though maybe because i'm logging into an interactive user.19:25
dpb1ah19:25
dpb1ok19:25
tewardin either case, whatever shell you give the user has to be in /etc/shells either way19:25
dpb1sounds fine then19:25
tewardso whether it's /usr/sbin/nologin or /bin/false19:26
tewardit still needs to be added to /etc/shells19:26
dpb1good19:26
tewardeven if the user that you login to is a purpose-built user custom added to the system for a specific purpose19:27
teward(just don't give the user perms anywhere beyond its purpose heh)19:27
apb1963I lnked /bin/false to /bin/false-vsftp and added /bin/false-vsftp to /etc/shells19:52
apb1963Unfortunately, I can't yet test it since vsftpd fails to come up.19:53
dpb1boo19:53
apb1963Apr 09 12:43:08 yellow systemd[1]: vsftpd.service: Main process exited, code=exited, status=2/INVALI19:53
apb1963"That's all we know"19:54
tewardapb1963: run vsftpd directly as root and see what actual error it gives?19:55
tewardsystemd doesn't do a good job at showing errors for everything :P19:55
apb1963500 OOPS: missing value in config file for: /etc/letsencrypt/live/template.greetonix.com/fullchain.pem19:56
tewardapb1963: my suggestion: don't set up FTPS, just set up FTP, set it to listen 'locally', and pass 127.0.0.1 and user creds to Wordpress19:56
tewardsince it doesn't initiate a connection from oyur computer to the server for FTP, it just does a local instance19:57
tewardyou don't need encrypted FTP for Wordpress to connect locally if it's not leaving the system for communication.19:57
apb1963I suppose that's reasonable19:58
tewardand by locally I mean add listen_address=127.0.0.1 to the vsftpd.conf config19:59
tewardand then only use FTP from wordpress -> vsftpd20:00
apb1963actually... after a bit more thought.. isn't wordpress connecting my site to the plugin site?20:00
tewardFTPS is more needed if you're working with a remote filesystem, though, but local -> local is usually a "Why bother the estra step"20:00
tewardapb1963: where does Wordpress actually sit?20:00
tewardassume that it's on 1.2.3.420:00
apb1963ok20:01
tewardif I tell it to connect to localhost, the wordpress *via php on the server 1.2.3.4* is connecting to 127.0.0.1 - which is itself20:01
apb1963no.. you're missing the point.  The plugin is elsewhere.  Call it 5.6.7.8  How does the file get from 5.6.7.8 to 1.2.3.4 ?20:02
apb1963Is it over https?  Or ftp(s)?  Or maybe even something else.20:03
tewardapb1963: how're you installing the plugin?20:03
apb1963through wp20:03
tewardPlugins > Add New, and then from that catalog?20:03
apb1963yes20:03
tewardit downloads the file locally and then FTPs it into its own work directory20:03
apb1963although I'll be using the wp-cli20:03
tewardit doesn't create an FTP connection from your system -> remote location20:03
tewardit just pulls the file down to a temp dir, uploads the plugin via FTP to its own server, and then does the install once it's uploaded/unzipped20:04
RoyKwhy would people use FTP in 2018?20:04
lynorianI don't know20:04
apb1963ok.  so over https then.  If that's true, then I guess it's ok to eliminate ftps in favor of ftp20:05
apb1963RoyK, ask the wordpress developers20:05
apb1963teward, thank you for the insight20:05
tewardyep.20:05
* apb1963 goes back to configuring20:06
sarnold"because wordpress" is a pretty summary :) hehe21:07
naccdpb1: rbasak: fyi, up to ~4400 packages imported, which means we're in the last 500 or so, iirc22:18
naccdefinitely some more failures, but we'll see the result once it's all done22:18

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!