Hi Wolfgang,

On  Di 20 Nov 2018 15:27:25 CET, Wolfgang Schweer wrote:

On Mon, Nov 19, 2018 at 12:00:20AM +0100, Petter Reinholdtsen wrote:
I had a look at the patch, and it is not obviously wrong, at least.  I do
not know the code well any more, but did test and read it, and it might
work.  I do not have x2go myself, so I can not test that part, though.

Thanks for the feedback. I've now tested the patched killer script once
again in a virtual machine environment: X2Go server running on a Debian
Edu Buster combined server, X2Go Client on a Debian Edu Buster
workstation with profile 'Standalone'. The complete set of X2Go
component packages is available in testing since March 2018.

The killer script works like expected.

A git format-patch is attatted, generated against killer.git as of
today.

Wolfgang

I am not sure, if the patch is not a functional overkill. My observation was, that the x2goagent processes got killed by killer.

So maybe, we should protect those only. For the session applications, I am currently working on a sessreg based utmp/wtmp patch against X2Go Server.

I'll provide more info later today.

Mike
--

DAS-NETZWERKTEAM
mike gabriel, herweg 7, 24357 fleckeby
mobile: +49 (1520) 1976 148
landline: +49 (4354) 8390 139

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: mike.gabr...@das-netzwerkteam.de, http://das-netzwerkteam.de

Attachment: pgpHNsNontocG.pgp
Description: Digitale PGP-Signatur

Reply via email to