Skip to content

How to clean docker up when used on btrfs

My docker uses to forget a lot of files when I just remove the images with rmi.


systemctl stop docker.service
systemctl stop docker.socket
rm -rf /var/lib/docker/
btrfs subvolume list /var/lib/docker|awk '/ID/ {print "/"$9}'|xargs btrfs sub delete

Create thumbnail images of a set of pictures

Load 4 pictures in a row from the input directory and create a thumbnail image:


#!/usr/bin/env python3

import glob
import subprocess

inputs = glob.glob('input/*.JPG')

cpt = 0
while len(inputs) > 0:
to_process = inputs[:4] + ['logo:', 'logo:', 'logo:']
inputs = inputs[4:]
cpt += 1
subprocess.call(["montage"] + to_process[:4] + ["-geometry", "800x600+2+2", "final/final_%02d.jpg" % cpt])

pbuilder on Debian kFreeBSD Wheezy

There is a little trick if you want to use pbuilder on kFreeBSD. Add these links in /etc/pbuilderrc:

MIRRORSITE=http://cdn.debian.net/debian
USEPROC=yes
USEDEVFS=yes
USEDEVPTS=yes
BINDMOUNTS=”/home/goneri”

getting burp to use puppet CA

I’m a big fan of BURP to maintain my backup. This article explains how to reuse the PuppetMaster CA for authentification. I use Debian burp package on Wheezy.

First, you need to generate the dhfile.pem on both the server and the agent:


openssl dhparam -outform PEM -out /etc/burp/dhfile.pem 1024

The server

The configuration is in /etc/burp/burp-server.conf:


mode = server
(...)
# ca_conf = /etc/burp/CA.cnf
# ca_name = burpCA
# ca_server_name = burpserver
# ca_burp_ca = /usr/sbin/burp_ca
(...)
ssl_cert_ca = /var/lib/puppet/ssl/certs/ca.pem
ssl_cert = /var/lib/puppet/ssl/ca/signed/newpuppet.lebouder.net.pem
ssl_key = /var/lib/puppet/ssl/private_keys/newpuppet.lebouder.net.pem
ssl_key_password = password
ssl_dhfile = /etc/burp/dhfile.pem
(...)

The agent

The configuration file is /etc/burp/burp.conf:

mode = client
port = 4971
server = newpuppet.lebouder.net
ssl_cert_ca = /var/lib/puppet/ssl/certs/ca.pem
ssl_cert = /var/lib/puppet/ssl/certs/newclient.lebouder.net.pem
ssl_key = /var/lib/puppet/ssl/private_keys/newclient.lebouder.net.pem
ssl_peer_cn = newpuppet.lebouder.net
(...)

newpuppet.lebouder.net is the Puppet server.

refresh all my git clone

This is commands I use to refresh all my git clones. For example, when I know I will be offline during the coming hours:


locate --regex '\.git$'|parallel 'cd {} && cd .. && echo $PWD && git fetch --all'

The use of GNU parallel is helpful to reduce the sync duration.

Duide Antidote8 sur Debian Sid

J’ai acheté le correcteur orthographique Antidote 8 que j’ai installé hier. L’outil est vraiment impressionnant et agréable à utiliser.

L’installation sur Debian Sid n’est pas supportée, cependant son utilisation est possible. Je dois encore voir si je peux l’intégrer avec Firefox (Iceweasel) et Thunderbird (Icedove).

Installation

 
# apt-get install libx11-6 libxslt1.1 libvorbis0a libxrender1 libgstreamer-plugins-base0.10-0 libpulse0 libpulse0 libpulse-mainloop-glib0 libfreetype6libpulse-mainloop-glib0 libfontconfig1 libxext6 libicu48

# wget http://ftp.fr.debian.org/debian/pool/main/o/openssl/libssl0.9.8_0.9.8o-4squeeze14_amd64.deb
# dpkg -i libssl0.9.8_0.9.8o-4squeeze14_amd64.deb

# wget http://ftp.fr.debian.org/debian/pool/main/i/icu/libicu44_4.4.1-8_amd64.deb

# dpkg -i libicu44_4.4.1-8_amd64.deb

Pour éviter un problème avec les kernel >= 3 il faut faire une petite manip présentée ici : http://www.debian-fr.org/certains-logiciels-dysfonctionnent-en-changeant-de-noyau-t42688.html
# wget https://mail.gnome.org/archives/evolution-list/2003-December/txtBEWSVk2eft.txt -O /tmp/uname.c
$ (echo #define _GNU_SOURCE; cat /tmp/uname.c) > /tmp/uname.c
$ gcc -shared -fPIC -ldl uname.c -o /opt/Druide/Antidote8/Programmes64/fake-uname.so

Il ne reste plus qu’a ajouter les deux lignes suivantes au début du script /opt/Druide/Antidote8/Programmes64/Antidote8.
export LD_PRELOAD=/opt/Druide/Antidote8/Programmes64/fake-uname.so
export RELEASE=$(uname -r | sed 's/^\(...\)/\1.0-antidote-fix/g')

Finally, a 4096 GnuPG key


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I finally generated a 4096 key ( 0x049ED9B94765572E ) which is signed
by my old key 0x37D9412C. I will revoke this old key in the coming months.

The old 1024bit key:
pub 1024D/37D9412C 2004-08-18
Key fingerprint = D3BC 65BB 48B1 1DA8 BC8A 5C88 B0A4 C5A4 37D9 412C
uid Gonéri Le Bouder
uid Gonéri Le Bouder
uid Gonéri Le Bouder
uid Gonéri Le Bouder
uid [jpeg image of size 7650]
uid Gonéri Le Bouder (Professional address)
uid [jpeg image of size 4672]
sub 1024g/E47802B2 2004-08-18
sub 2048R/F89D348A 2013-06-01

The new key:
pub 4096R/4765572E 2013-06-18 [expires: 2023-07-15]
Key fingerprint = 1FF3 68E8 0199 1373 1705 B8AF 049E D9B9 4765 572E
uid Gonéri Le Bouder
uid Gonéri Le Bouder
uid Gonéri Le Bouder
uid [jpeg image of size 7650]
uid Gonéri Le Bouder
sub 4096R/E496738B 2013-06-18

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.15 (GNU/Linux)

iEYEARECAAYFAlJlJjsACgkQsKTFpDfZQSxwzwCeLDuJoMOwJ4H2fbQionyejDck
GX8Anjp0V+rZHJ5fLlLv3yXWbsBt9K5m
=RHzK
-----END PGP SIGNATURE-----