[00:00:18] For this case, you'll need to run `php artisan term:create 2015 10 4` and `php artisan term:create 2016 1 4` after migrating the database. [00:03:40] the migrate command fails [00:03:44] with the same error [00:03:58] about not being able to connect to the db [00:04:37] oh, right. you have to add the postgres addon https://elements.heroku.com/addons/heroku-postgresql [00:04:38] Title: Unknown [00:04:57] the free tier will work [00:06:03] to draw a comparison to how things are going with this, it feels like i'm using windows again [00:06:10] fancy guis and shit to make life easier [00:06:18] but i could have done this way faster from the command line [00:06:30] you can add it via the heroku CLI [00:06:51] too late [00:07:05] oh well [00:07:11] cool [00:07:13] migration worked [00:07:17] creating terms now [00:07:25] kool [00:07:37] then https://github.com/wearehx/voting#heroku-scheduler [00:07:37] Title: wearehx/voting · GitHub [00:08:50] what does the scheduler do? [00:09:07] auto-creates new terms [00:11:45] cool, looks like it's up and running [00:12:41] nothing left for me to do now right? [00:13:02] except maybe read the code... [00:24:08] yep [00:24:12] except when it breaks [00:30:02] *** Joins: coldsauce (d1de07ed@gateway/web/cgi-irc/kiwiirc.com/ip.209.222.7.237) [00:30:35] i should probably write some unit tests for it lol [00:31:42] someone keeps uploading malicious javascript to a wordpress site i run [00:31:47] like i fixed it once [00:31:52] wat: https://medium.com/halting-problem/dropbox-cafeteria-awarded-a-michelin-star-9d492196590a#.thu5k690e [00:31:53] Title: Dropbox Cafeteria Awarded A Michelin Star — Halting Problem — Medium [00:32:16] #wordpressproblems [00:32:54] i don't use it by choice [00:33:00] but yes, wordpress is a shitshow [00:33:12] i'm looking through the access logs now [00:33:18] to see if there's some plugin vuln [00:33:46] easiest solution is usually cloudflare's WAF lol [00:35:04] that's not a bad idea [00:35:16] but then how would i collect wordpress 0days? [00:35:47] with the logs it generates :p [00:36:24] i'm not going to look through logs until my site's been hacked [00:36:40] lol [00:36:58] maybe you could create a honeypot and not rely on your main site getting hacked for 0days [00:37:40] haha [00:37:43] yea [00:37:54] don't really care about this site [00:38:02] running it for someone else [00:38:48] coldsauce: the bubble will pop eventually [00:38:51] lol [00:39:57] honestly the more I've been thinking about it, the more I feel like something is "too good" [00:40:43] how can these companies possibly have these luxurious of things [00:43:16] "/th1s_1s_a_4o4.html" [00:43:26] whoever's attacking my site is sending that [00:43:45] i googled it [00:43:50] and the fourth link is "Am I being hacked by Google?" [00:43:57] i think i found the culprit guys [00:44:58] or is this actually a legit google web crawler... [00:46:07] so many things don't add up here [00:52:44] i don't see anything in the logs (there's just too much stuff), so i'm going to write a poor man's inotify (i don't have permissions to install it on the server) [00:53:02] see if the md5 hash of the file changes every two seconds, email me when it does [00:58:51] lmfao [00:58:53] found it [00:58:59] they put a backdoor in my 404 page [00:59:06] that's how they got in the second time [00:59:09] fuckers [01:00:58] their backdoor isn't showing up in the access logs [01:01:09] i'm wondering if they pulled out those specific entries? [01:24:28] *** Quits: coldsauce (d1de07ed@gateway/web/cgi-irc/kiwiirc.com/ip.209.222.7.237) (Quit: http://www.kiwiirc.com/ - A hand crafted IRC client) [01:29:05] *** Joins: Zin (~jamesaust@203.213.48.134) [01:30:02] *** Quits: emo-bot (~emo-bot@saskia.igm.rit.edu) (Remote host closed the connection) [01:32:53] *** Quits: Zin (~jamesaust@203.213.48.134) (Client Quit) [01:38:22] i just reversed the malware [01:38:42] it was your standard open a site in an iframe and move the mouse to click on a link [01:47:23] So... got any Star Wars themed aliases ;-) [01:48:03] alias force-push='git push --force' # yeah, I know... [02:09:14] huh, i was curious what happened if you forked a private repo and didn't have any free private repos on your plan [02:09:19] turns out it's still private [02:09:53] so if someone has an unlimited private repo plan [02:10:07] what happens if the original person deletes their private repo? [02:10:09] they can just give you read access to various private repos, you can fork it, and have your onw [02:10:25] not completely sure [02:10:45] it'd be hilarious if you could distribute out private repos by doing that [02:10:58] yea, that's what i was thinking [02:10:59] you get a repo and you get a repo and you get a repo [02:28:22] anyone here use pymongo at all? [02:28:34] i'm trying to find the documentation for this syntax: each['redeemed': True] [02:28:54] where each is a pymongo document [02:29:32] not sure if it's different than doing `each['redeemed'] = True` [03:15:04] *** Joins: coldsauce (180e92f9@gateway/web/cgi-irc/kiwiirc.com/ip.24.14.146.249) [03:15:34] *** Quits: coldsauce (180e92f9@gateway/web/cgi-irc/kiwiirc.com/ip.24.14.146.249) (Client Quit) [23:27:36] *** Joins: zuron7 (~zuron7@122.166.95.162) [23:42:56] *** Quits: zuron7 (~zuron7@122.166.95.162) (Ping timeout: 265 seconds)