[00:01] I don't know of any. [00:01] Which build? [00:05] https://launchpad.net/~mercurial-ppa/+archive/staging-stable-snapshots/+build/2092164 [00:05] I guess it's probably a new directory rename race. [00:05] I'll get a LOSA to poke around on Monday. [00:06] yeah, they should all be gone by now [00:06] * jelmer has a look [00:07] wgrant: oh, right.. you're finally allowed to ping losa's on Monday :-) [00:09] jelmer: More importantly, I can see logs. [00:17] wgrant: ah, yeah [00:20] maxb: I'm inclined to close bug 682430 as Won't Fix [00:20] <_mup_> Bug #682430: Sourceforge http: (no SSL) imports now fail [00:21] jelmer: Seems reasonable. The workaround of https is entirely adequate [00:23] if any fix was to be attempted, it seems like it would be best to fix the svn client libs to allow limiting the use of a single persistent connection, than add various retry logic in places [00:24] Or better, tell sf to stop being silly with their http connections :-) [00:25] maxb: Yeah, the latter seems the most reasonable. [00:26] Perhaps they have put this into place to kill long expensive interactions with their SVN server, but that seems silly given this will a) make people retry more often an b) use SSL, which is more expensive CPU-wise. [00:30] hmm, odd, one of my daily builds just failed with a chroot error [00:39] maxb: perhaps they're just closing idle connections earlier? [00:40] maxb: other than what you mentioned in that bug report did you see any particular symptons? [01:25] no, nothing else [02:36] === Top 10 Time Out Counts by Page ID === [02:36] Hard / Soft Page ID [02:36] 54 / 4108 Archive:+index [02:36] 35 / 139 BugTask:+index [02:36] 22 / 245 POFile:+translate [02:36] 16 / 0 Person:EntryResource:retractTeamMembership [02:36] 14 / 175 Distribution:+bugs [02:36] 8 / 0 BinaryPackageBuild:+retry [02:36] 7 / 100 ProjectGroupSet:CollectionResource:#project_groups [02:36] 7 / 13 DistroSeriesLanguage:+index [02:36] 5 / 39 Archive:+packages [02:36] 5 / 16 Distribution:+archivemirrors === Ursinha-afk is now known as Ursinha [19:18] Hi, any particular reason I can't see the SSO blueprint specs? [19:18] https://wiki.canonical.com/LaunchpadLoginService -> Not allowed to view this page [19:19] https://launchpad.canonical.com/Launchpad-SSO/infrastructurespecs#login -> Not allowed to view this page [19:19] wiki.canonical.com is staff only. [19:19] I was trying to get to grips to how things were working [19:19] I don't know if those specs /need/ to be private [19:19] Have been exporting my local dev instance over SSH to some testers.. One couldn't log on [19:19] #canonical-isd has some of those developers. [19:19] Turned out to be a cookie problem though.. he was using a text based browser, W3M [19:20] With a a patch to stop it rejecting some LP cookies, it worked for me when I tried. LP has a related bug: Bug#385702 [19:20] <_mup_> Bug #385702: statistics dont work in replay mode [19:20] Urm.. no [19:21] Bug #59510 (The other was the Debian Bug # for the same issue) [19:21] <_mup_> Bug #59510: Can't log in with w3m due to bad cookies [19:22] also bug 523229 [19:22] <_mup_> Bug #523229: The Continue button isn't selectable in w3m for sso login [19:26] I'm amazed just how nice the LP code is [19:26] why thanks :) [19:26] Or rather, how detached from the nasties of writing HTML it is.. and how awesome storm seems [19:27] I might even try doing some coding ;) - Any mileage in a drop-down expand for viewing patch attachments to bugs inline with the comments? [19:28] that would be lovely [19:29] assuming something sensible xss wise [19:31] xss? [19:31] cross site scripting attacks [19:32] ok, will have to get someone to review it if / when I've done it ;) [19:32] I suggest discussing the broad approach here or on the launchpad-dev mailing list - we [19:37] we've got some very clueful guys who can help [19:52] thanks [19:59] hi! where can I find the code that manages the ppa.launchpad.net port 22 listener? [20:00] its called 'poppy' in the code base [20:00] whats up? [20:02] no, it's not [20:02] that's the ftp one [20:02] he means the ssh based one [20:02] elmo: I thought they had common code [20:02] I hope not [20:02] the ftp one is zope based [20:02] the ssh one is twisted [20:02] oh yeah [20:02] we should fix that [20:03] anyhow, find the tests for one, you'll find the tests for the other [20:05] kees: whats up? [20:13] kees: lib/lp/poppy/twistedsftp.py ? [20:43] They do share some stuff. [20:46] Thanks elmo. [20:49] 'morning wgrant [20:49] Morning jelmer. [20:50] wgrant: welcome [20:50] \o/ finished with email [20:50] and a formal welcome to wgrant [20:50] :) [20:50] embraced fully at last [20:51] Heh, thanks lifeless, thumper. [20:51] Ah, right.. forgot it's already Monday over there. :-) [20:51] wgrant: Welcome! [20:51] hi jelmer [20:51] 'morning Tim [20:55] jelmer: Were you able to work out which package supposedly has broken shlibs? [20:55] jelmer: synapse is the only one I can see, and it depends on (>= 0.2.14)... [20:56] wgrant: no, I didn't look into that issue further [21:01] bug fixed for bugjam \o/ [21:02] well, was fixed months ago [21:02] but closed is closed [21:34] No ~launchpad admins around at the moment, I suppose? [21:36] wgrant: not until spm starts [21:42] lifeless, jelmer, cool, thanks. I was curious after reading https://bugs.launchpad.net/soyuz/+bug/689199 [21:42] <_mup_> Bug #689199: SSHFP DNS record for ppa.launchpad.net [21:42] er, wrong one. this one: https://bugs.launchpad.net/soyuz/+bug/689213 [21:43] kees: are you sure? [21:43] so is the poppy code the same as the ppa downloader? [21:43] jelmer: sure of what? [21:44] kees: That last URL, it gives me a 401 [21:44] it's a private bug, that somehow didn't get lp security subscribed. [21:45] there, subbed now. [21:45] /lib/lp/services/sshserver looks more like the core? [21:45] kees: poppy is the codename for the code behind upload.ubuntu.com and it's PPA equivalent [21:45] kees: whether it's ftp (original) or ssh (newer) [21:46] ah righto, now I remember [21:47] kees: ppa downloader? [21:47] lifeless: I can't type. uploader. [21:47] kees: thanks [21:47] hah [21:52] thumper: wanna chat? [21:52] wallyworld: yeah man [21:52] wallyworld: mumble? [21:52] thumper: yep [21:57] lifeless: I think Jacob's point was that the fact that ssh server offered port forwarding was widening the attack surface. [22:26] I must have misunderstood things then === Daviey_ is now known as Daviey