On Thu, 28 Jul 2022 14:51:04 -0300
Chris Mitchell wrote:
> > On Thu 28 Jul 2022 at 10:35:07 (-0400), Greg Wooledge wrote:
> > > Given the order of the processes shown in your session-8, it looks
> > > like it might be an XFCE thing. Maybe start there? I can't help
> > > you with that,
On Thu, Jul 28, 2022 at 02:51:04PM -0300, Chris Mitchell wrote:
> I don't appear to have a .xsession file at all:
>
> (Right after a "sudo updatedb")
> $ locate .xsession
> /home/chris/.xsession-errors
> /home/chris/.xsession-errors.old
> /home/chris/.xsession-startup-dump
It's something
On Thu, 28 Jul 2022 10:08:22 -0500
David Wright wrote:
> On Thu 28 Jul 2022 at 10:35:07 (-0400), Greg Wooledge wrote:
> I did much the same …
>
> > My .xsession file contains only this line concerning ssh-agent:
> >
> > hash ssh-agent 2>/dev/null && eval "$(ssh-agent -s)"
I don't appear to
On Thu 28 Jul 2022 at 10:35:07 (-0400), Greg Wooledge wrote:
> On Thu, Jul 28, 2022 at 10:34:50AM -0300, Chris Mitchell wrote:
> > From the output of systemd-cgls I see that the rogue ssh-agent process
> > is part of the .scope CGroup corresponding to my X login session.
> >
> > # systemctl
On Thu, Jul 28, 2022 at 10:34:50AM -0300, Chris Mitchell wrote:
> From the output of systemd-cgls I see that the rogue ssh-agent process
> is part of the .scope CGroup corresponding to my X login session.
>
> # systemctl status session-8.scope
> ● session-8.scope - Session 8 of User chris
>
Still picking away at this…
The PIDs are, of course, a moving target, as every time I log out and
back in to test a change, ssh-agent instances are getting shut down and
new ones started. As of right now:
* my systemd-managed ssh-agent is PID 3017
* the rogue ssh-agent is PID 7687
$ systemctl
On Wed, 27 Jul 2022 11:04:49 +0200
Michael Biebl wrote:
> Can you post the output of
> systemd-cgls
First, for context:
$ systemd-cgls --user-unit ssh-agent.service
Unit ssh-agent.service
(/user.slice/user-1000.slice/user@1000.service/app.slice> └─3166
/usr/bin/ssh-agent -D -a
Jul. 26, 2022 17:00:46 Greg Wooledge :
> On Tue, Jul 26, 2022 at 03:40:48PM -0300, Chris Mitchell wrote:
>> Here's my service file:
>>
>> $ cat /etc/systemd/user/ssh-agent.service
>
> According to systemd.unit(5) this directory is for "User units created
> by the administrator".
Yup, that's
On Wed, Jul 27, 2022 at 09:08:59AM -0300, Chris Mitchell wrote:
> On Tue, 26 Jul 2022 21:54:18 +0200
> Erwan David wrote:
>
> > ssh-agent is usually started by your session manager. I do not know
> > wether all DE use this, but you can find it in
> >
> >
On Wed, Jul 27, 2022 at 09:08:59AM -0300, Chris Mitchell wrote:
> On Tue, 26 Jul 2022 21:54:18 +0200
> Erwan David wrote:
>
> > ssh-agent is usually started by your session manager. I do not know
> > wether all DE use this, but you can find it in
> >
> >
On Tue, 26 Jul 2022 21:54:18 +0200
Erwan David wrote:
> ssh-agent is usually started by your session manager. I do not know
> wether all DE use this, but you can find it in
>
> /etc/X11/Xsession.d/90x11-common_ssh-agent
True. The snippet in that file is nested in a conditional, though:
if
Can you post the output of
systemd-cgls
OpenPGP_signature
Description: OpenPGP digital signature
On Tue, Jul 26, 2022 at 03:40:48PM -0300, Chris Mitchell wrote:
> Here's my service file:
>
> $ cat /etc/systemd/user/ssh-agent.service
According to systemd.unit(5) this directory is for "User units created
by the administrator".
> Here's what I know so far:
>
> $ env | grep -i ssh
>
Le 26/07/2022 à 20:40, Chris Mitchell a écrit :
Hi all,
I have my own systemd "user" .service unit that I like to use to start
ssh-agent the way I want it started, which works fine… except for the
neverending game of whack-a-mole tracking down and disabling various
legacy workarounds that go
Hi all,
I have my own systemd "user" .service unit that I like to use to start
ssh-agent the way I want it started, which works fine… except for the
neverending game of whack-a-mole tracking down and disabling various
legacy workarounds that go ahead and start ssh-agent unasked (or
emulate it,
15 matches
Mail list logo