[01:29] Really trying to wrap my head around this whole net plan deal. My google-fu isnt working well tonight and id like some help if you all can! https://pastebin.com/XhZrq3VG Im trying to take my two nic cards, and bond them together in a balance-rr mode to reduce the bottle neck of just one card [01:36] Folks, never mind. Went static instead of DHCP and the issue resolved itself. used https://serverfault.com/questions/882758/nic-teaming-on-ubuntu-17-10-via-netplan to answer my own question [06:07] Good morning [08:16] exit [08:16] (sorry) [08:48] coreycb: horizon finally uploaded with py3 support [08:48] that was fiddly [12:12] rbasak: hi, around? I got asked to add a copyright statement to my salsa mr: https://salsa.debian.org/debian/krb5/merge_requests/2 [12:18] ahasenack: o/ [12:18] rbasak: how do I add that? Who owns the copyright? [12:19] ahasenack: that's fine. I'll send you a link to our internal documentation. We license contributions to software under the same licence of the work itself. [12:19] ahasenack: I think it should be sufficient to say that this is Canonical's internal documented policy and therefore your work is licensed under the existing license. [12:28] jamespage: great! i got aodh py3 uploaded on friday and will be focused entirely on py3 this week. === chuck_ is now known as zul [13:38] rbasak: the previous apache2 sru is done, would you be willing to push the upload tag for https://code.launchpad.net/~ahasenack/ubuntu/+source/apache2/+git/apache2/+merge/348632 so that I can dput it? [13:38] or would you rather wait for christian to get back? [13:38] you can also start a new review from scratch if you prefer [13:53] ahasenack: you have upload rights so I trust your judgement :) [13:53] ahasenack: what's the git commit hash I'm upload tagging please? The git clone line to grab that would be helpful. [13:53] still, it's how our team works [13:54] Is it already peer reviewed by Christian? [13:54] rbasak: yes, he gave a +1 [13:54] the hash is what's pushed: 8b6ec8cea379f63aa0e907cec8f70dc4d86e7e83 [13:55] Then I think all the requirements are met and I'm happy to essentially blindly push whatever hash you want upload tagged :) [13:55] ok, thanks [13:58] ahasenack: upload tag pushed [13:58] rbasak: thanks [14:14] is there a maximum file name length in Ubuntu? [14:17] DammitJim: such limits are defined by filesystem used. [14:18] so, I have logical volumes and formatted to ext4 [14:20] and a google prompt nearby? [14:21] yeah [14:21] I just want to make sure I'm not assuming something [14:21] All I saw was that there is a limit for fat32 of 255 characters [14:25] I thought FAT was limited to 8.3 [14:25] but I'm confused if there is a limit for the file name vs the full path name [14:25] there are limits to both. In fact, I even think linux kernel has some hard limits, lemme unearth that... [14:28] DammitJim: yah, PATH_MAX and NAME_MAX, defined in limits.h, and if you have kernel headers installed, see eg. /usr/src/linux-headers-4.15.0-24/include/uapi/linux/limits.h [14:55] rbasak: hi, one more upload tag push if you will: https://code.launchpad.net/~ahasenack/ubuntu/+source/exim4/+git/exim4/+merge/348895 [14:55] I can dput [14:56] rbasak: just a sec, let me drop that ~ppa1 [14:57] rbasak: now it's good, 524946598222abae1016435ffded0961343e92f8 is HEAD in that MP and good for upload tag push [15:24] ahasenack: pushed [15:27] rbasak: thanks === freyes__ is now known as freyes [18:47] I have a server with http service running on it. I've port forwarded my firewall appliance so that I have access from the web. I would like to block access from the private network... server ip is 10.0.1.10 ... so the network is 10.0.1.0/24 ... can this be done with UFW without breaking my port forwarding? [19:35] subvhome: iirc "ufw block from 10.0.1.0/24 to any proto tcp port 80" [19:36] s/block/deny/ [19:45] jdstrand: thanks [19:45] RoyK: thanks for the rule :) === RoyK^ is now known as RoyK_Heime