From jengelh@inai.de Tue Dec 17 14:56:02 2013 Received: (at submit) by bugs.x2go.org; 17 Dec 2013 13:56:03 +0000 X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on ymir.das-netzwerkteam.de X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,URIBL_BLOCKED autolearn=ham version=3.3.2 X-Greylist: delayed 520 seconds by postgrey-1.34 at ymir; Tue, 17 Dec 2013 14:56:02 CET Received: from ares08.inai.de (ares08.inai.de [46.4.84.70]) by ymir (Postfix) with ESMTPS id 9677C5DB16 for ; Tue, 17 Dec 2013 14:56:02 +0100 (CET) Received: by ares08.inai.de (Postfix, from userid 25121) id 62E9A10673FF2; Tue, 17 Dec 2013 14:47:20 +0100 (CET) Received: from localhost (localhost [127.0.0.1]) by ares08.inai.de (Postfix) with ESMTP id 5A4671915A9C4; Tue, 17 Dec 2013 14:47:20 +0100 (CET) Date: Tue, 17 Dec 2013 14:47:20 +0100 (CET) From: Jan Engelhardt To: submit@bugs.x2go.org cc: Michael Kromer Subject: paramiko fails to recognize known_hosts Message-ID: User-Agent: Alpine 2.11 (LSU 23 2013-08-11) MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Content-Transfer-Encoding: 8BIT Package: x2gobroker Version: 0.0.2.3 When logging into a x2gobroker-0.0.2.3 with paramiko-1.11.0, it so happens that, for whatever reason, it rejects the remote side's key despite that being in /var/lib/x2gobroker/.ssh/known_hosts. {u'defsndport': False, u'useiconv': False, u'iconvfrom': 'UTF-8', u'height': 768, u'pack': '16m-jpeg', u'export': '', u'quality': 9, u'fullscreen': False, u'layout': '', 'host=terminalsrv2': '172.18.7.216', 'host=terminalsrv1': '172.18.7.205', u'width': 1024, u'speed': 4, u'soundtunnel': False, u'soundsystem': 'pulse', u'print': True, u'type': 'auto', u'sndport': 4713, u'xinerama': True, u'usekbd': True, u'variant': '', u'applications': ['TERMINAL', 'WWWBROWSER', 'MAILCLIENT', 'OFFICE'], u'host': ['terminalsrv1', 'terminalsrv2', 'terminalsrv3'], u'link': 'lan', u'multidisp': False, 'host=terminalsrv3': '172.18.7.214', u'fstunnel': False, u'sound': False, u'rootless': False, u'name': 'Terminalsitzung starten LAN Einstellungen', u'sshproxyport': 22, u'iconvto': 'UTF-8', u'directrdp': False, u'useexports': True, u'command': 'GNOME', u'dpi': 96, u'sshport': 22, u'setdpi': 0, u'startsoundsystem': 'false', u'user': ''} ['terminalsrv1', 'terminalsrv2', 'terminalsrv3'] ['terminalsrv3', 'terminalsrv1', 'terminalsrv2'] {u'hostname': 'terminalsrv2', u'port': 22} starting thread (client mode): 0xe8ded0L Connected (version 2.0, client OpenSSH_5.1) kex algos:['diffie-hellman-group-exchange-sha256', 'diffie-hellman-group-exchange-sha1', 'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 'aes192-cbc', 'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 'aes192-cbc', 'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', 'umac-64@openssh.com', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'umac-64@openssh.com', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] client compress:['none', 'zlib@openssh.com'] server compress:['none', 'zlib@openssh.com'] client lang:[''] ser ver lang:[''] kex follows?False Ciphers agreed: local=aes128-ctr, remote=aes128-ctr using kex diffie-hellman-group1-sha1; server key type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local hmac-sha1, remote hmac-sha1; compression: local none, remote none Switch to new keys ... /usr/lib64/python2.6/site-packages/paramiko/client.py:95: UserWarning: Unknown ssh-rsa host key for terminalsrv2: 4d1d9d46a16da7d8c5a3829c920ff5da (key.get_name(), hostname, hexlify(key.get_fingerprint()))) ['terminalsrv3', 'terminalsrv1'] {u'hostname': 'terminalsrv1', u'port': 22} starting thread (client mode): 0xe95cd0L Connected (version 2.0, client OpenSSH_5.1) kex algos:['diffie-hellman-group-exchange-sha256', 'diffie-hellman-group-exchange-sha1', 'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 'aes192-cbc', 'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 'aes192-cbc', 'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', 'umac-64@openssh.com', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'umac-64@openssh.com', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] client compress:['none', 'zlib@openssh.com'] server compress:['none', 'zlib@openssh.com'] client lang:[''] ser ver lang:[''] kex follows?False Ciphers agreed: local=aes128-ctr, remote=aes128-ctr using kex diffie-hellman-group1-sha1; server key type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local hmac-sha1, remote hmac-sha1; compression: local none, remote none Switch to new keys ... /usr/lib64/python2.6/site-packages/paramiko/client.py:95: UserWarning: Unknown ssh-rsa host key for terminalsrv1: 4d1d9d46a16da7d8c5a3829c920ff5da (key.get_name(), hostname, hexlify(key.get_fingerprint()))) thservice.logEOF in transport thread ['terminalsrv3'] {u'hostname': 'terminalsrv3', u'port': 22} starting thread (client mode): 0xe95290L Connected (version 2.0, client OpenSSH_5.1) kex algos:['diffie-hellman-group-exchange-sha256', 'diffie-hellman-group-exchange-sha1', 'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 'aes192-cbc', 'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 'aes192-cbc', 'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', 'umac-64@openssh.com', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'umac-64@openssh.com', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] client compress:['none', 'zlib@openssh.com'] server compress:['none', 'zlib@openssh.com'] client lang:[''] ser ver lang:[''] kex follows?False Ciphers agreed: local=aes128-ctr, remote=aes128-ctr using kex diffie-hellman-group1-sha1; server key type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local hmac-sha1, remote hmac-sha1; compression: local none, remote none Switch to new keys ... /usr/lib64/python2.6/site-packages/paramiko/client.py:95: UserWarning: Unknown ssh-rsa host key for terminalsrv3: 4d1d9d46a16da7d8c5a3829c920ff5da (key.get_name(), hostname, hexlify(key.get_fingerprint()))) EOF in transport thread EOF in transport thread starting thread (client mode): 0xe8df50L Connected (version 2.0, client OpenSSH_5.1) kex algos:['diffie-hellman-group-exchange-sha256', 'diffie-hellman-group-exchange-sha1', 'diffie-hellman-group14-sha1', 'diffie-hellman-group1-sha1'] server key:['ssh-rsa', 'ssh-dss'] client encrypt:['aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 'aes192-cbc', 'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr'] server encrypt:['aes128-cbc', '3des-cbc', 'blowfish-cbc', 'cast128-cbc', 'arcfour128', 'arcfour256', 'arcfour', 'aes192-cbc', 'aes256-cbc', 'rijndael-cbc@lysator.liu.se', 'aes128-ctr', 'aes192-ctr', 'aes256-ctr'] client mac:['hmac-md5', 'hmac-sha1', 'umac-64@openssh.com', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] server mac:['hmac-md5', 'hmac-sha1', 'umac-64@openssh.com', 'hmac-ripemd160', 'hmac-ripemd160@openssh.com', 'hmac-sha1-96', 'hmac-md5-96'] client compress:['none', 'zlib@openssh.com'] server compress:['none', 'zlib@openssh.com'] client lang:[''] ser ver lang:[''] kex follows?False Ciphers agreed: local=aes128-ctr, remote=aes128-ctr using kex diffie-hellman-group1-sha1; server key type ssh-rsa; cipher: local aes128-ctr, remote aes128-ctr; mac: local hmac-sha1, remote hmac-sha1; compression: local none, remote none Switch to new keys ... Traceback (most recent call last): File "/usr/sbin/x2gobroker", line 145, in tornado.ioloop.IOLoop.instance().start() File "/usr/lib64/python2.6/site-packages/tornado/ioloop.py", line 606, in start self._run_callback(callback) File "/usr/lib64/python2.6/site-packages/tornado/ioloop.py", line 457, in _run_callback callback() File "/usr/lib64/python2.6/site-packages/tornado/stack_context.py", line 330, in wrapped raise_exc_info(exc) File "/usr/lib64/python2.6/site-packages/tornado/stack_context.py", line 301, in wrapped ret = fn(*args, **kwargs) File "/usr/lib64/python2.6/site-packages/tornado/iostream.py", line 340, in wrapper callback(*args) File "/usr/lib64/python2.6/site-packages/tornado/stack_context.py", line 330, in wrapped raise_exc_info(exc) File "/usr/lib64/python2.6/site-packages/tornado/stack_context.py", line 301, in wrapped ret = fn(*args, **kwargs) File "/usr/lib64/python2.6/site-packages/tornado/httpserver.py", line 339, in _on_request_body self.request_callback(self._request) File "/usr/lib64/python2.6/site-packages/tornado/web.py", line 1599, in __call__ handler._execute(transforms, *args, **kwargs) File "/usr/lib64/python2.6/site-packages/tornado/web.py", line 1133, in _execute self._when_complete(self.prepare(), self._execute_method) File "/usr/lib64/python2.6/site-packages/tornado/web.py", line 1140, in _when_complete callback() File "/usr/lib64/python2.6/site-packages/tornado/web.py", line 1161, in _execute_method self._when_complete(method(*self.path_args, **self.path_kwargs), File "/usr/lib64/python2.6/site-packages/x2gobroker/web/plain.py", line 136, in post profiles = broker_backend.list_profiles(username) File "/usr/lib64/python2.6/site-packages/x2gobroker/brokers/base_broker.py", line 870, in list_profiles running_sessions, suspended_sessions = x2gobroker.agent.has_sessions(username, query_mode=agent_query_mode, remote_agent=remote_agent) File "/usr/lib64/python2.6/site-packages/x2gobroker/agent.py", line 229, in has_sessions _session_list = list_sessions(username, query_mode=query_mode, remote_agent=remote_agent) File "/usr/lib64/python2.6/site-packages/x2gobroker/agent.py", line 174, in list_sessions return call_remote_broker_agent(username, mode='listsessions', remote_agent=remote_agent) File "/usr/lib64/python2.6/site-packages/x2gobroker/agent.py", line 139, in call_remote_broker_agent raise x2gobroker.x2gobroker_exceptions.X2GoBrokerAgentException('Query to remote X2Go Broker Agent (user: {user}, hostname: {hostname}, port: {port}) failed'.format(user=remote_username, hostname=remote_hostname, port=remote_port)) x2gobroker.x2gobroker_exceptions.X2GoBrokerAgentException: Query to remote X2Go Broker Agent (user: x2gobroker, hostname: terminalsrv3, port: 22) failed From jengelh@inai.de Tue Dec 17 15:21:02 2013 Received: (at 377) by bugs.x2go.org; 17 Dec 2013 14:21:03 +0000 X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on ymir.das-netzwerkteam.de X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00 autolearn=ham version=3.3.2 X-Greylist: delayed 363 seconds by postgrey-1.34 at ymir; Tue, 17 Dec 2013 15:21:02 CET Received: from ares08.inai.de (ares08.inai.de [46.4.84.70]) by ymir (Postfix) with ESMTPS id 400945DB16 for <377@bugs.x2go.org>; Tue, 17 Dec 2013 15:21:02 +0100 (CET) Received: by ares08.inai.de (Postfix, from userid 25121) id DAA0C10673FF2; Tue, 17 Dec 2013 15:14:59 +0100 (CET) Received: from localhost (localhost [127.0.0.1]) by ares08.inai.de (Postfix) with ESMTP id D692D1915A9C4 for <377@bugs.x2go.org>; Tue, 17 Dec 2013 15:14:59 +0100 (CET) Date: Tue, 17 Dec 2013 15:14:59 +0100 (CET) From: Jan Engelhardt To: 377@bugs.x2go.org Subject: Re: paramiko fails to recognize known_hosts Message-ID: User-Agent: Alpine 2.11 (LSU 23 2013-08-11) MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII strace reveals this: 2844 open("//.ssh/known_hosts", O_RDONLY) = -1 ENOENT (No such file or directory) Looking at the environ of a newly-started x2gobroker: # hexdump -C /proc/20044/environ 00000000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................| * 00000840 00 00 00 00 00 00 00 |.......| 00000847 # So the environment was modified inside python and I have no further clue on what its actual state is, whether the environ array just moved in memory (plausible), or destroyed in-place leaving nothing for paramiko. From jengelh@inai.de Tue Dec 17 15:47:16 2013 Received: (at 377) by bugs.x2go.org; 17 Dec 2013 14:47:16 +0000 X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on ymir.das-netzwerkteam.de X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00 autolearn=ham version=3.3.2 Received: from ares08.inai.de (ares08.inai.de [46.4.84.70]) by ymir (Postfix) with ESMTPS id 7B67F5DB16 for <377@bugs.x2go.org>; Tue, 17 Dec 2013 15:47:16 +0100 (CET) Received: by ares08.inai.de (Postfix, from userid 25121) id 6E7B510673FF2; Tue, 17 Dec 2013 15:47:16 +0100 (CET) Received: from localhost (localhost [127.0.0.1]) by ares08.inai.de (Postfix) with ESMTP id 6C902186716F9 for <377@bugs.x2go.org>; Tue, 17 Dec 2013 15:47:16 +0100 (CET) Date: Tue, 17 Dec 2013 15:47:16 +0100 (CET) From: Jan Engelhardt To: 377@bugs.x2go.org Subject: Re: paramiko fails to recognize known_hosts Message-ID: User-Agent: Alpine 2.11 (LSU 23 2013-08-11) MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII When started from sysvinit, the HOME environment variable is not set (what to, anyway!), and startproc does not set HOME _either_. Therefore, /etc/init.d/x2gobroker-daemon needs a export HOME=/var/lib/x2gobroker or something nicer of equal footing so that /usr/sbin/x2gobroker has something to work with. From jengelh@inai.de Tue Dec 17 19:10:21 2013 Received: (at 377) by bugs.x2go.org; 17 Dec 2013 18:10:23 +0000 X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on ymir.das-netzwerkteam.de X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,URIBL_BLOCKED autolearn=ham version=3.3.2 Received: from ares08.inai.de (ares08.inai.de [46.4.84.70]) by ymir (Postfix) with ESMTPS id B42FF5DB16 for <377@bugs.x2go.org>; Tue, 17 Dec 2013 19:10:21 +0100 (CET) Received: by ares08.inai.de (Postfix, from userid 25121) id BC92D10BFA108; Tue, 17 Dec 2013 19:10:20 +0100 (CET) Received: from localhost (localhost [127.0.0.1]) by ares08.inai.de (Postfix) with ESMTP id B66F11915A9C9 for <377@bugs.x2go.org>; Tue, 17 Dec 2013 19:10:20 +0100 (CET) Date: Tue, 17 Dec 2013 19:10:20 +0100 (CET) From: Jan Engelhardt To: 377@bugs.x2go.org Subject: Re: init scripts Message-ID: User-Agent: Alpine 2.11 (LSU 23 2013-08-11) MIME-Version: 1.0 Content-Type: MULTIPART/MIXED; BOUNDARY="70141524-237709671-1387303820=:4237" This message is in MIME format. The first part should be readable text, while the remaining parts are likely unreadable without MIME-aware tools. --70141524-237709671-1387303820=:4237 Content-Type: TEXT/PLAIN; charset=US-ASCII I seem to remember that start-stop-daemon might have been part of LSB, but then again, maybe not? (In the current openSUSE release with systemd, start-stop-daemon is part of the dpkg package.) So the following are the init scripts currently running here. They lack in quality, are dirt hacks, and only do the one thing they were tested for. There is a lack of quoting all over the place. --70141524-237709671-1387303820=:4237 Content-Type: TEXT/PLAIN; charset=UTF-8; name=x2gobroker-authservice Content-Transfer-Encoding: BASE64 Content-ID: Content-Description: Content-Disposition: attachment; filename=x2gobroker-authservice IyEvYmluL2Jhc2gNCiMNCiMgU3RhcnQgdGhlIFgyR28gU2Vzc2lvbiBCcm9r ZXIgUEFNIEF1dGhlbnRpY2F0aW9uIFNlcnZpY2UNCiMNCiMgQ29weXJpZ2h0 IMKpIDIwMTIgTWlrZSBHYWJyaWVsIDxtaWtlLmdhYnJpZWxAZGFzLW5ldHp3 ZXJrdGVhbS5kZT4NCiMgRGlzdHJpYnV0YWJsZSB1bmRlciB0aGUgdGVybXMg b2YgdGhlIEdOVSBBR1BMIHZlcnNpb24gMi4NCiMNCiMjIyBCRUdJTiBJTklU IElORk8NCiMgUHJvdmlkZXM6ICAgICAgICAgIHgyZ29icm9rZXItYXV0aHNl cnZpY2UNCiMgUmVxdWlyZWQtU3RhcnQ6ICAgICRuZXR3b3JrICRyZW1vdGVf ZnMgJHN5c2xvZyB4MmdvYnJva2VyLWRhZW1vbg0KIyBSZXF1aXJlZC1TdG9w OiAgICAgJG5ldHdvcmsgJHJlbW90ZV9mcyAkc3lzbG9nIHgyZ29icm9rZXIt ZGFlbW9uDQojIERlZmF1bHQtU3RhcnQ6ICAgICAyIDMgNQ0KIyBEZWZhdWx0 LVN0b3A6ICAgICAgMCAxIDYNCiMgU2hvcnQtRGVzY3JpcHRpb246IFgyR28g U2Vzc2lvbiBCcm9rZXIgUEFNIEF1dGhlbnRpY2F0aW9uIFNlcnZpY2UNCiMg RGVzY3JpcHRpb246ICAgICAgIFBBTSBhdXRoZW50aWNhdGlvbiBzZXJ2aWNl IGZvciBYMkdvIFNlc3Npb24gQnJva2VyDQojIyMgRU5EIElOSVQgSU5GTw0K DQouIC9ldGMvcmMuc3RhdHVzDQoNCiMgRmlyc3QgcmVzZXQgc3RhdHVzIG9m IHRoaXMgc2VydmljZQ0KcmNfcmVzZXQNCg0KQVVUSFNFUlZJQ0U9L3Vzci9z YmluL3gyZ29icm9rZXItYXV0aHNlcnZpY2UNCnRlc3QgLWQgL3J1biAmJiBS VU5ESVI9L3J1biB8fCBSVU5ESVI9L3Zhci9ydW4NClBJREZJTEVfQVVUSFNF UlZJQ0U9JFJVTkRJUi94MmdvYnJva2VyL3gyZ29icm9rZXItYXV0aHNlcnZp Y2UucGlkDQpERUJJQU5DT05GSUdfQ09NTU9OPS9ldGMvZGVmYXVsdC9weXRo b24teDJnb2Jyb2tlcg0KREVCSUFOQ09ORklHX0FVVEhTRVJWSUNFPS9ldGMv ZGVmYXVsdC94MmdvYnJva2VyLWF1dGhzZXJ2aWNlDQoNCnRlc3QgLXggIiRB VVRIU0VSVklDRSIgfHwgZXhpdCAwDQoNClNUQVJUX0FVVEhTRVJWSUNFPWZh bHNlDQpYMkdPQlJPS0VSX0RFQlVHPTANClgyR09CUk9LRVJfREFFTU9OX1VT RVI9J3gyZ29icm9rZXInDQpYMkdPQlJPS0VSX0RBRU1PTl9HUk9VUD0neDJn b2Jyb2tlcicNClgyR09CUk9LRVJfQVVUSFNFUlZJQ0VfU09DS0VUPSIkUlVO RElSL3gyZ29icm9rZXIveDJnb2Jyb2tlci1hdXRoc2VydmljZS5zb2NrZXQi DQp0ZXN0IC1mICRERUJJQU5DT05GSUdfQ09NTU9OICYmIC4gJERFQklBTkNP TkZJR19DT01NT04NCnRlc3QgLWYgJERFQklBTkNPTkZJR19BVVRIU0VSVklD RSAmJiAuICRERUJJQU5DT05GSUdfQVVUSFNFUlZJQ0UNCg0KaWYgISBnZXRl bnQgcGFzc3dkICRYMkdPQlJPS0VSX0RBRU1PTl9VU0VSIDE+L2Rldi9udWxs IDI+L2Rldi9udWxsOyB0aGVuDQoJWDJHT0JST0tFUl9EQUVNT05fVVNFUj1u b2JvZHkNCmZpDQppZiAhIGdldGVudCBncm91cCAkWDJHT0JST0tFUl9EQUVN T05fR1JPVVAgMT4vZGV2L251bGwgMj4vZGV2L251bGw7IHRoZW4NCglYMkdP QlJPS0VSX0RBRU1PTl9HUk9VUD1ub2dyb3VwDQpmaQ0KDQojIGNyZWF0ZSBQ SUQgZGlyZWN0b3J5DQpta2RpciAtcCAkUlVORElSL3gyZ29icm9rZXINCmNo b3duICRYMkdPQlJPS0VSX0RBRU1PTl9VU0VSOiRYMkdPQlJPS0VSX0RBRU1P Tl9HUk9VUCAkUlVORElSL3gyZ29icm9rZXINCmNobW9kIDA3NzAgJFJVTkRJ Ui94MmdvYnJva2VyDQoNCmV4cG9ydCBYMkdPQlJPS0VSX0RFQlVHDQpleHBv cnQgWDJHT0JST0tFUl9EQUVNT05fVVNFUg0KZXhwb3J0IFgyR09CUk9LRVJf REFFTU9OX0dST1VQDQpleHBvcnQgWDJHT0JST0tFUl9BVVRIU0VSVklDRV9T T0NLRVQNCg0KY2FzZSAiJDEiIGluDQogICAgc3RhcnQpDQoJZWNobyAtbiAi U3RhcnRpbmcgWDJnbyBTZXNzaW9uIGF1dGhzZXJ2aWNlIHN0YW5kYWxvbmUg ZGFlbW9uIC4uLiAiDQoJZWNobyBzdGFydHByb2MgLXUgJFgyR09CUk9LRVJf REFFTU9OX1VTRVIgLWcgJFgyR09CUk9LRVJfREFFTU9OX0dST1VQIC1wICRQ SURGSUxFX0FVVEhTRVJWSUNFICRBVVRIU0VSVklDRSAtcyAkWDJHT0JST0tF Ul9BVVRIU0VSVklDRV9TT0NLRVQgLW8gJFgyR09CUk9LRVJfREFFTU9OX1VT RVIgLWcgJFgyR09CUk9LRVJfREFFTU9OX0dST1VQIC1wIDA2NjYNCglzdGFy dHByb2MgLXUgJFgyR09CUk9LRVJfREFFTU9OX1VTRVIgLWcgJFgyR09CUk9L RVJfREFFTU9OX0dST1VQIC1wICRQSURGSUxFX0FVVEhTRVJWSUNFICRBVVRI U0VSVklDRSAtcyAkWDJHT0JST0tFUl9BVVRIU0VSVklDRV9TT0NLRVQgLW8g JFgyR09CUk9LRVJfREFFTU9OX1VTRVIgLWcgJFgyR09CUk9LRVJfREFFTU9O X0dST1VQIC1wIDA2NjYNCglwaWRvZnByb2MgeDJnb2Jyb2tlci1hdXRoc2Vy dmljZSA+ICRQSURGSUxFX0FVVEhTRVJWSUNFDQoJcmNfc3RhdHVzIC12DQoJ OzsNCiAgICBzdG9wKQ0KCWVjaG8gLW4gIlN0b3BwaW5nIFgyZ28gU2Vzc2lv biBhdXRoc2VydmljZSBzdGFuZGFsb25lIGRhZW1vbiAuLi4gIg0KCWtpbGxw cm9jIC1URVJNIC1wICRQSURGSUxFX0FVVEhTRVJWSUNFIHgyZ29icm9rZXIt YXV0aHNlcnZpY2UNCglybSAtZiAkWDJHT0JST0tFUl9BVVRIU0VSVklDRV9T T0NLRVQgJFBJREZJTEVfQVVUSFNFUlZJQ0UNCg0KCSMgUmVtZW1iZXIgc3Rh dHVzIGFuZCBiZSB2ZXJib3NlDQoJcmNfc3RhdHVzIC12DQoJOzsNCiAgICBy ZXN0YXJ0KQ0KCSMjIFN0b3AgdGhlIHNlcnZpY2UgYW5kIHJlZ2FyZGxlc3Mg b2Ygd2hldGhlciBpdCB3YXMNCgkjIyBydW5uaW5nIG9yIG5vdCwgc3RhcnQg aXQgYWdhaW4uDQoJJDAgc3RvcA0KCSQwIHN0YXJ0DQoNCgkjIFJlbWVtYmVy IHN0YXR1cyBhbmQgYmUgcXVpZXQNCglyY19zdGF0dXMNCgk7Ow0KICAgIHN0 YXR1cykNCgllY2hvIC1uICJDaGVja2luZyBmb3IgWDJnbyBTZXNzaW9uIGF1 dGhzZXJ2aWNlIC4uLiAiDQoJIyMgQ2hlY2sgc3RhdHVzIHdpdGggY2hlY2tw cm9jKDgpLCBpZiBwcm9jZXNzIGlzIHJ1bm5pbmcNCgkjIyBjaGVja3Byb2Mg d2lsbCByZXR1cm4gd2l0aCBleGl0IHN0YXR1cyAwLg0KDQoJIyBTdGF0dXMg aGFzIGEgc2xpZ2h0bHkgZGlmZmVyZW50IGZvciB0aGUgc3RhdHVzIGNvbW1h bmQ6DQoJIyAwIC0gc2VydmljZSBydW5uaW5nDQoJIyAxIC0gc2VydmljZSBk ZWFkLCBidXQgL3Zhci9ydW4vICBwaWQgIGZpbGUgZXhpc3RzDQoJIyAyIC0g c2VydmljZSBkZWFkLCBidXQgL3Zhci9sb2NrLyBsb2NrIGZpbGUgZXhpc3Rz DQoJIyAzIC0gc2VydmljZSBub3QgcnVubmluZw0KDQoJIyBOT1RFOiBjaGVj a3Byb2MgcmV0dXJucyBMU0IgY29tcGxpYW50IHN0YXR1cyB2YWx1ZXMuDQoJ Y2hlY2twcm9jIC1wICRQSURGSUxFX0FVVEhTRVJWSUNFIHgyZ29icm9rZXIt YXV0aHNlcnZpY2UNCglyY19zdGF0dXMgLXYNCgk7Ow0KICAgICopDQoJZWNo byAiVXNhZ2U6ICQwIHtzdGFydHxzdG9wfHN0YXR1c3xyZXN0YXJ0fSINCgll eGl0IDENCgk7Ow0KZXNhYw0KcmNfZXhpdA0K --70141524-237709671-1387303820=:4237 Content-Type: TEXT/PLAIN; charset=UTF-8; name=x2gobroker-daemon Content-Transfer-Encoding: BASE64 Content-ID: Content-Description: Content-Disposition: attachment; filename=x2gobroker-daemon IyEvYmluL2Jhc2gNCiMNCiMgU3RhcnQgdGhlIFgyR28gU2Vzc2lvbiBCcm9r ZXIgc3RhbmRhbG9uZSBkYWVtb24NCiMNCiMgQ29weXJpZ2h0IMKpIDIwMTIg TWlrZSBHYWJyaWVsIDxtaWtlLmdhYnJpZWxAZGFzLW5ldHp3ZXJrdGVhbS5k ZT4NCiMgRGlzdHJpYnV0YWJsZSB1bmRlciB0aGUgdGVybXMgb2YgdGhlIEdO VSBBR1BMIHZlcnNpb24gMi4NCiMNCiMjIyBCRUdJTiBJTklUIElORk8NCiMg UHJvdmlkZXM6ICAgICAgICAgIHgyZ29icm9rZXItZGFlbW9uDQojIFJlcXVp cmVkLVN0YXJ0OiAgICAkbmV0d29yayAkcmVtb3RlX2ZzICRzeXNsb2cgc3No ZA0KIyBSZXF1aXJlZC1TdG9wOiAgICAgJG5ldHdvcmsgJHJlbW90ZV9mcyAk c3lzbG9nIHNzaGQNCiMgRGVmYXVsdC1TdGFydDogICAgIDMgNQ0KIyBEZWZh dWx0LVN0b3A6ICAgICAgMCAxIDYNCiMgU2hvcnQtRGVzY3JpcHRpb246IFgy R28gU2Vzc2lvbiBCcm9rZXIgc3RhbmRhbG9uZSBkYWVtb24NCiMgRGVzY3Jp cHRpb246ICAgICAgIFgyR28gU2Vzc2lvbiBCcm9rZXIgZGFlbW9uIGNvbWVz IHdpdGggaXRzIG93biBIVFRQIGRhZW1vbg0KIyMjIEVORCBJTklUIElORk8N Cg0KLiAvZXRjL3JjLnN0YXR1cw0KDQojIEZpcnN0IHJlc2V0IHN0YXR1cyBv ZiB0aGlzIHNlcnZpY2UNCnJjX3Jlc2V0DQoNCkRBRU1PTj0vdXNyL3NiaW4v eDJnb2Jyb2tlcg0KdGVzdCAtZCAvcnVuICYmIFJVTkRJUj0vcnVuIHx8IFJV TkRJUj0vdmFyL3J1bg0KUElERklMRV9CUk9LRVI9JFJVTkRJUi94MmdvYnJv a2VyL3gyZ29icm9rZXItZGFlbW9uLnBpZA0KREVCSUFOQ09ORklHX0NPTU1P Tj0vZXRjL2RlZmF1bHQvcHl0aG9uLXgyZ29icm9rZXINCkRFQklBTkNPTkZJ R19EQUVNT049L2V0Yy9kZWZhdWx0L3gyZ29icm9rZXItZGFlbW9uDQoNCnRl c3QgLXggIiREQUVNT04iIHx8IGV4aXQgMA0KDQpTVEFSVF9CUk9LRVI9ZmFs c2UNCkRBRU1PTl9CSU5EX0FERFJFU1M9MC4wLjAuMDo4MDgwDQpYMkdPQlJP S0VSX0RFQlVHPTANClgyR09CUk9LRVJfREFFTU9OX1VTRVI9J3gyZ29icm9r ZXInDQpYMkdPQlJPS0VSX0RBRU1PTl9HUk9VUD0neDJnb2Jyb2tlcicNClgy R09CUk9LRVJfREVGQVVMVF9CQUNLRU5EPSJ6ZXJvY29uZiINClgyR09CUk9L RVJfQ09ORklHPSIvZXRjL3gyZ28veDJnb2Jyb2tlci5jb25mIg0KWDJHT0JS T0tFUl9TRVNTSU9OUFJPRklMRVM9Ii9ldGMveDJnby9icm9rZXIveDJnb2Jy b2tlci1zZXNzaW9ucHJvZmlsZXMuY29uZiINClgyR09CUk9LRVJfQUdFTlRf Q01EPSIvdXNyL2xpYjY0L3gyZ28veDJnb2Jyb2tlci1hZ2VudCINClgyR09C Uk9LRVJfU1NMX0NFUlRGSUxFPQ0KWDJHT0JST0tFUl9TU0xfS0VZRklMRT0N CnRlc3QgLWYgJERFQklBTkNPTkZJR19DT01NT04gJiYgLiAkREVCSUFOQ09O RklHX0NPTU1PTg0KdGVzdCAtZiAkREVCSUFOQ09ORklHX0RBRU1PTiAmJiAu ICRERUJJQU5DT05GSUdfREFFTU9ODQoNCmlmICEgZ2V0ZW50IHBhc3N3ZCAk WDJHT0JST0tFUl9EQUVNT05fVVNFUiAxPi9kZXYvbnVsbCAyPi9kZXYvbnVs bDsgdGhlbg0KCVgyR09CUk9LRVJfREFFTU9OX1VTRVI9bm9ib2R5DQpmaQ0K aWYgISBnZXRlbnQgZ3JvdXAgJFgyR09CUk9LRVJfREFFTU9OX0dST1VQIDE+ L2Rldi9udWxsIDI+L2Rldi9udWxsOyB0aGVuDQoJWDJHT0JST0tFUl9EQUVN T05fR1JPVVA9bm9ncm91cA0KZmkNCg0KIyBjcmVhdGUgUElEIGRpcmVjdG9y eQ0KbWtkaXIgLXAgJFJVTkRJUi94MmdvYnJva2VyDQpjaG93biAkWDJHT0JS T0tFUl9EQUVNT05fVVNFUjokWDJHT0JST0tFUl9EQUVNT05fR1JPVVAgJFJV TkRJUi94MmdvYnJva2VyDQpjaG1vZCAwNzcwICRSVU5ESVIveDJnb2Jyb2tl cg0KDQojIG1lbmQgdXNlciBJRCB2YXJpYWJsZXMgd2hlbiAtLWNodWlkICRY MkdPQlJPS0VSX0RBRU1PTl9VU0VSIGlzIHVzZWQgd2l0aCBzdGFydC1zdG9w LWRhZW1vbg0KZXhwb3J0IExPR05BTUU9JFgyR09CUk9LRVJfREFFTU9OX1VT RVINCmV4cG9ydCBVU0VSPSRYMkdPQlJPS0VSX0RBRU1PTl9VU0VSDQpleHBv cnQgVVNFUk5BTUU9JFgyR09CUk9LRVJfREFFTU9OX1VTRVINCg0KZXhwb3J0 IFgyR09CUk9LRVJfREVCVUcNCmV4cG9ydCBYMkdPQlJPS0VSX0RBRU1PTl9V U0VSDQpleHBvcnQgWDJHT0JST0tFUl9EQUVNT05fR1JPVVANCmV4cG9ydCBY MkdPQlJPS0VSX0NPTkZJRw0KZXhwb3J0IFgyR09CUk9LRVJfREVGQVVMVF9C QUNLRU5EDQpleHBvcnQgWDJHT0JST0tFUl9TRVNTSU9OUFJPRklMRVMNCmV4 cG9ydCBYMkdPQlJPS0VSX0FHRU5UX0NNRA0KZXhwb3J0IFgyR09CUk9LRVJf U1NMX0NFUlRGSUxFDQpleHBvcnQgWDJHT0JST0tFUl9TU0xfS0VZRklMRQ0K DQpzdV9jb21tYW5kPSJzdSAtICR7WDJHT0JST0tFUl9EQUVNT05fVVNFUn0g LW0gLWMgIg0KDQpjYXNlICIkMSIgaW4NCiAgICBzdGFydCkNCgllY2hvIC1u ICJTdGFydGluZyBYMmdvIFNlc3Npb24gYnJva2VyIHN0YW5kYWxvbmUgZGFl bW9uIC4uLiAiDQoJZXhwb3J0IEhPTUU9L3Zhci9saWIveDJnb2Jyb2tlcg0K CXN0YXJ0cHJvYyAtZiAtdSAkWDJHT0JST0tFUl9EQUVNT05fVVNFUiAtZyAk WDJHT0JST0tFUl9EQUVNT05fR1JPVVAgLXAgJFBJREZJTEVfQlJPS0VSICRE QUVNT04gLWIgJERBRU1PTl9CSU5EX0FERFJFU1MgLUMgJFgyR09CUk9LRVJf Q09ORklHIA0KCXBpZG9mIHgyZ29icm9rZXIgPiAkUElERklMRV9CUk9LRVIN CglyY19zdGF0dXMgLXYNCgk7Ow0KICAgIHN0b3ApDQoJZWNobyAtbiAiU3Rv cHBpbmcgWDJnbyBTZXNzaW9uIGJyb2tlciBzdGFuZGFsb25lIGRhZW1vbiAu Li4gIg0KCWtpbGxwcm9jIC1URVJNIC1wICRQSURGSUxFX0JST0tFUiB4Mmdv YnJva2VyDQoJcm0gLWYgJFBJREZJTEVfQlJPS0VSDQoNCgkjIFJlbWVtYmVy IHN0YXR1cyBhbmQgYmUgdmVyYm9zZQ0KCXJjX3N0YXR1cyAtdg0KCTs7DQog ICAgcmVzdGFydCkNCgkjIyBTdG9wIHRoZSBzZXJ2aWNlIGFuZCByZWdhcmRs ZXNzIG9mIHdoZXRoZXIgaXQgd2FzDQoJIyMgcnVubmluZyBvciBub3QsIHN0 YXJ0IGl0IGFnYWluLg0KCSQwIHN0b3ANCgkkMCBzdGFydA0KDQoJIyBSZW1l bWJlciBzdGF0dXMgYW5kIGJlIHF1aWV0DQoJcmNfc3RhdHVzDQoJOzsNCiAg ICBzdGF0dXMpDQoJZWNobyAtbiAiQ2hlY2tpbmcgZm9yIFgyZ28gU2Vzc2lv biBicm9rZXIgLi4uICINCgkjIyBDaGVjayBzdGF0dXMgd2l0aCBjaGVja3By b2MoOCksIGlmIHByb2Nlc3MgaXMgcnVubmluZw0KCSMjIGNoZWNrcHJvYyB3 aWxsIHJldHVybiB3aXRoIGV4aXQgc3RhdHVzIDAuDQoNCgkjIFN0YXR1cyBo YXMgYSBzbGlnaHRseSBkaWZmZXJlbnQgZm9yIHRoZSBzdGF0dXMgY29tbWFu ZDoNCgkjIDAgLSBzZXJ2aWNlIHJ1bm5pbmcNCgkjIDEgLSBzZXJ2aWNlIGRl YWQsIGJ1dCAvdmFyL3J1bi8gIHBpZCAgZmlsZSBleGlzdHMNCgkjIDIgLSBz ZXJ2aWNlIGRlYWQsIGJ1dCAvdmFyL2xvY2svIGxvY2sgZmlsZSBleGlzdHMN CgkjIDMgLSBzZXJ2aWNlIG5vdCBydW5uaW5nDQoNCgkjIE5PVEU6IGNoZWNr cHJvYyByZXR1cm5zIExTQiBjb21wbGlhbnQgc3RhdHVzIHZhbHVlcy4NCglj aGVja3Byb2MgLXAgJFBJREZJTEVfQlJPS0VSIHgyZ29icm9rZXINCglyY19z dGF0dXMgLXYNCgk7Ow0KICAgICopDQoJZWNobyAiVXNhZ2U6ICQwIHtzdGFy dHxzdG9wfHN0YXR1c3xyZXN0YXJ0fSINCglleGl0IDENCgk7Ow0KZXNhYw0K cmNfZXhpdA0K --70141524-237709671-1387303820=:4237-- From mike.gabriel@das-netzwerkteam.de Sat Dec 21 22:09:33 2013 Received: (at 377) by bugs.x2go.org; 21 Dec 2013 21:09:33 +0000 X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on ymir.das-netzwerkteam.de X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,URIBL_BLOCKED autolearn=ham version=3.3.2 Received: from freya.das-netzwerkteam.de (freya.das-netzwerkteam.de [88.198.48.199]) by ymir (Postfix) with ESMTPS id 4DB645DB13 for <377@bugs.x2go.org>; Sat, 21 Dec 2013 22:09:33 +0100 (CET) Received: from grimnir.das-netzwerkteam.de (grimnir.das-netzwerkteam.de [78.46.204.98]) by freya.das-netzwerkteam.de (Postfix) with ESMTPS id DC0FDC8; Sat, 21 Dec 2013 22:09:32 +0100 (CET) Received: from localhost (localhost [127.0.0.1]) by grimnir.das-netzwerkteam.de (Postfix) with ESMTP id B9B0C3C062; Sat, 21 Dec 2013 22:09:32 +0100 (CET) X-Virus-Scanned: Debian amavisd-new at grimnir.das-netzwerkteam.de Received: from grimnir.das-netzwerkteam.de ([127.0.0.1]) by localhost (grimnir.das-netzwerkteam.de [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LBuPQZenXTLH; Sat, 21 Dec 2013 22:09:32 +0100 (CET) Received: from grimnir.das-netzwerkteam.de (localhost [127.0.0.1]) by grimnir.das-netzwerkteam.de (Postfix) with ESMTPSA id 961023C038; Sat, 21 Dec 2013 22:09:32 +0100 (CET) Received: from p4FE5F50D.dip0.t-ipconnect.de (p4FE5F50D.dip0.t-ipconnect.de [79.229.245.13]) by mail.das-netzwerkteam.de (Horde Framework) with HTTP; Sat, 21 Dec 2013 21:09:32 +0000 Date: Sat, 21 Dec 2013 21:09:32 +0000 Message-ID: <20131221210932.Horde.Diy4XlJi0Ykgyi95_Fbr8w1@mail.das-netzwerkteam.de> From: Mike Gabriel To: Jan Engelhardt , 377@bugs.x2go.org Subject: Re: [X2Go-Dev] Bug#377: init scripts References: In-Reply-To: User-Agent: Internet Messaging Program (IMP) H5 (6.1.4) Accept-Language: en,de Organization: DAS-NETZWERKTEAM X-Originating-IP: 79.229.245.13 X-Remote-Browser: Mozilla/5.0 (X11; Linux x86_64; rv:23.0) Gecko/20100101 Firefox/23.0 Iceweasel/23.0 Content-Type: multipart/signed; boundary="=_MCq0pUhvGYC-sL05NQYpGA1"; protocol="application/pgp-signature"; micalg=pgp-sha1 MIME-Version: 1.0 This message is in MIME format and has been PGP signed. --=_MCq0pUhvGYC-sL05NQYpGA1 Content-Type: text/plain; charset=utf-8; format=flowed; DelSp=Yes Content-Disposition: inline Control: close -1 Hi Jan, On Di 17 Dez 2013 19:10:20 CET, Jan Engelhardt wrote: > I seem to remember that start-stop-daemon might have been part of LSB, > but then again, maybe not? (In the current openSUSE release with > systemd, start-stop-daemon is part of the dpkg package.) > > So the following are the init scripts currently running here. They lack > in quality, are dirt hacks, and only do the one thing they were tested > for. There is a lack of quoting all over the place. I have included two init scripts [1, 2] in X2Go Session Broker now that work on RHEL derived distros. The script use the daemon function from /etc/init.d/functions. Because of the limitation of the daemon function not being able to fork a process to background, I had to implement the "--daemonize" command line option in x2gobroker [3] and x2gobroker-authservice [4]. Now, both Python executables can fork themselves to background. Also, I split up x2gobroker-agent from x2gobroker (and also sub packaged x2gobroker-daemon, x2gobroker-wsgi and python-x2gobroker). I recommend doing the same on OpenSuSE. Find my x2gobroker.spec shipped in upstream x2gobroker.git [5]. Thanks, Mike [1] http://code.x2go.org/gitweb?p=x2gobroker.git;a=blob;f=rpm/x2gobroker.init [2] http://code.x2go.org/gitweb?p=x2gobroker.git;a=blob;f=rpm/x2gobroker-authservice.init [3] http://code.x2go.org/gitweb?p=x2gobroker.git;a=blob;f=man/man1/x2gobroker.1#l75 [4] http://code.x2go.org/gitweb?p=x2gobroker.git;a=blob;f=man/man8/x2gobroker-authservice.8#l41 [5] http://code.x2go.org/gitweb?p=x2gobroker.git;a=blob;f=x2gobroker.spec -- DAS-NETZWERKTEAM mike gabriel, herweg 7, 24357 fleckeby fon: +49 (1520) 1976 148 GnuPG Key ID 0x25771B31 mail: mike.gabriel@das-netzwerkteam.de, http://das-netzwerkteam.de freeBusy: https://mail.das-netzwerkteam.de/freebusy/m.gabriel%40das-netzwerkteam.de.xfb --=_MCq0pUhvGYC-sL05NQYpGA1 Content-Type: application/pgp-signature Content-Description: Digitale PGP-Signatur Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.15 (GNU/Linux) iQIcBAABAgAGBQJStgOMAAoJEJr0azAldxsxwwMP/3mpCpuiTFXO3zna9pp7XMvo Q7m0m+cNX9wShZkADRMzt0P32gdPEW85hGrYnKG8ZE6dn/sTdWM4mhooqGRMSj6v I546dz8Erg3+kzy35lR2SExGBtxgMpoY7Q4VksqPX1zbRRRvxgBdV1AWhhoufV7C zD0zleOyxYVay0NVhufj1jj5Kl8khHiODUmIRACcKwGO5/rSCMPMmd1LdSoiUyjY Zw4oF7hrY2UIeT/dSOCmN45YU0FrRILlJeJp24RQV37KW7hVFvqiW5YKKDzbpusB xMSzeF4UXNqTJk4yc6iq0NYxbgqCUkG0FsBBYguMQ+CdQfkd4NIcnFbL+tYJY7qc z4o2bbRnyIo06/4YwTbwWw2LlPwCBQOFEIY1VupM79MlX6zSklOorD4iq8VcOqfy AQM/XdfAXPFeLNbqeA+s5azPBXC0+q2eEVgU63qIecphD59JEg1CXf6KZAPr998d WDNvP7lVLKxj9Lia/Dled5nmmgAdnXJqsQjluytQDDfJJ39zyXXaXF/R87LXCE2e Bkfs1r6DmsSycL85vJYsN+OTI3sYNsLeZcaRaQ15S36jnXFvas8jwf5jp+sUgSYy gqnYk5ohyvExzJC3N9B3FMZHGqWpL7/VzAj8st3oN1V1DpxhSTMG0LzqmQ1++k8u vBYKG7ARbh019Pkf99x1 =QSlm -----END PGP SIGNATURE----- --=_MCq0pUhvGYC-sL05NQYpGA1-- From mike.gabriel@das-netzwerkteam.de Sat Dec 21 22:25:40 2013 Received: (at control) by bugs.x2go.org; 21 Dec 2013 21:25:40 +0000 X-Spam-Checker-Version: SpamAssassin 3.3.2 (2011-06-06) on ymir.das-netzwerkteam.de X-Spam-Level: X-Spam-Status: No, score=-0.1 required=5.0 tests=BAYES_00,MISSING_SUBJECT, URIBL_BLOCKED autolearn=no version=3.3.2 Received: from freya.das-netzwerkteam.de (freya.das-netzwerkteam.de [88.198.48.199]) by ymir (Postfix) with ESMTPS id AA35C5DB13 for ; Sat, 21 Dec 2013 22:25:40 +0100 (CET) Received: from grimnir.das-netzwerkteam.de (grimnir.das-netzwerkteam.de [78.46.204.98]) by freya.das-netzwerkteam.de (Postfix) with ESMTPS id 501ACC8 for ; Sat, 21 Dec 2013 22:25:40 +0100 (CET) Received: from localhost (localhost [127.0.0.1]) by grimnir.das-netzwerkteam.de (Postfix) with ESMTP id 45FDB3C062 for ; Sat, 21 Dec 2013 22:25:40 +0100 (CET) X-Virus-Scanned: Debian amavisd-new at grimnir.das-netzwerkteam.de Received: from grimnir.das-netzwerkteam.de ([127.0.0.1]) by localhost (grimnir.das-netzwerkteam.de [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j0-JbF525jUT for ; Sat, 21 Dec 2013 22:25:40 +0100 (CET) Received: from grimnir.das-netzwerkteam.de (localhost [127.0.0.1]) by grimnir.das-netzwerkteam.de (Postfix) with ESMTPSA id 2A48C3BB0A for ; Sat, 21 Dec 2013 22:25:40 +0100 (CET) Received: from p4FE5F50D.dip0.t-ipconnect.de (p4FE5F50D.dip0.t-ipconnect.de [79.229.245.13]) by mail.das-netzwerkteam.de (Horde Framework) with HTTP; Sat, 21 Dec 2013 21:25:40 +0000 Date: Sat, 21 Dec 2013 21:25:40 +0000 Message-ID: <20131221212540.Horde.4ohU334bGYkOoVJLXyzhaA5@mail.das-netzwerkteam.de> From: Mike Gabriel To: control@bugs.x2go.org User-Agent: Internet Messaging Program (IMP) H5 (6.1.4) Accept-Language: en,de Organization: DAS-NETZWERKTEAM X-Originating-IP: 79.229.245.13 X-Remote-Browser: Mozilla/5.0 (X11; Linux x86_64; rv:23.0) Gecko/20100101 Firefox/23.0 Iceweasel/23.0 Content-Type: multipart/signed; boundary="=_YkZBPFUbsC0l9iFz96jrTg1"; protocol="application/pgp-signature"; micalg=pgp-sha1 MIME-Version: 1.0 This message is in MIME format and has been PGP signed. --=_YkZBPFUbsC0l9iFz96jrTg1 Content-Type: text/plain; charset=UTF-8; format=flowed; DelSp=Yes Content-Disposition: inline retitle #377 Init scripts (for Debian) not properly working on RPM distros fixed #377 0.0.3.0 thanks -- DAS-NETZWERKTEAM mike gabriel, herweg 7, 24357 fleckeby fon: +49 (1520) 1976 148 GnuPG Key ID 0x25771B31 mail: mike.gabriel@das-netzwerkteam.de, http://das-netzwerkteam.de freeBusy: https://mail.das-netzwerkteam.de/freebusy/m.gabriel%40das-netzwerkteam.de.xfb --=_YkZBPFUbsC0l9iFz96jrTg1 Content-Type: application/pgp-signature Content-Description: Digitale PGP-Signatur Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.15 (GNU/Linux) iQIcBAABAgAGBQJStgdUAAoJEJr0azAldxsx/EEQAK6LhXO052ATXrdnxPqdUlv2 xdFkNT5YYPvFwGjyqi8P+qVThvuDG2komT6ATdH4aqoyTQ6sOwCCboy4ZosD7rCt TFRYceeDckbALaVS/GzfGlopsjLvRnwuYCtHvkdtdIq/CcB3nwFtBjMt8jCsLeNz 5StHWrBQu8OJ4eFCOp8ufXZD/IUk7q9yIgj/TaLYJh3j1FG41ZcB4JzqVM1CzCuv qoIt7Lx0LP6Ccndk+E5PKZdkACZAgKHsZLpcm96rd7GbvmcDEuRUiPNf0YlJ39mr iyKTyfi8A0kVs9QtLOkkitxLM9jEOQzOd/e4TZv4BUszSRKywBLL1H0jZpNhdOAa JEPSE0xssniMcaDvCvpiIHnQfK8x2uvUKiBhtoORWNgn8uNbtnzGR+rsJ0qXQabl zwZoQo2VIfA7XGsWZfSZSysWHtbX7RpcQmUjB3oHHKcpU+VmytJ5uxaEnBH5iqub ClWf1fx8ns1BVPSC3qMpw9cGwNYoEOQEGSiCIZWUTT3zpMuQXjFEgkXXZHZ2s0jP 2sqZOYIB0QblQi3bxzkqpLkh9Gx52rnpfJentpxUduJGtay8M8uai2MoFvkLWJMr 48eRTzZKdIMl8NyQDDSD2/Cg2TjkF8ShXu4CBj+bfFkMPKHQZu8Vi4KmHAfeIfOh CukTakqRHA5ZtyLz/zVd =5lX9 -----END PGP SIGNATURE----- --=_YkZBPFUbsC0l9iFz96jrTg1-- From unknown Thu Mar 28 18:13:31 2024 Received: (at fakecontrol) by fakecontrolmessage; To: internal_control@bugs.x2go.org From: Debbugs Internal Request Subject: Internal Control Message-Id: Bug archived. Date: So, 19 Jan 2014 06:24:01 +0000 User-Agent: Fakemail v42.6.9 # A New Hope # A long time ago, in a galaxy far, far away # something happened. # # Magically this resulted in the following # action being taken, but this fake control # message doesn't tell you why it happened # # The action: # Bug archived. thanks # This fakemail brought to you by your local debbugs # administrator