[08:39] good morning [09:41] Project devel build (347): STILL FAILING in 3 hr 30 min: https://hudson.wedontsleep.org/job/devel/347/ === almaisan-away is now known as al-maisan === Ursinha-afk is now known as Ursinha === al-maisan is now known as almaisan-away === almaisan-away is now known as al-maisan === bac` is now known as bac [14:30] Project db-devel build (261): STILL FAILING in 3 hr 34 min: https://hudson.wedontsleep.org/job/db-devel/261/ [14:50] jelmer: ping? [14:52] jelmer: unping === matsubara is now known as matsubara-lunch [14:54] gary_poster: hi :-) [14:55] hi jelmer :-) sorry, I'm chr and didn't know the answer to a soyuz question, but someone else stepped in === jam1 is now known as jam === matsubara-lunch is now known as matsubara === salgado is now known as salgado-lunch === beuno is now known as beuno-lunch === Ursinha is now known as Ursinha-lunch [16:31] jml. sorry for missing our standard meeting time. My computer needed a stern whack. === salgado-lunch is now known as salgado === al-maisan is now known as almaisan-away === beuno-lunch is now known as beuno === Ursinha-lunch is now known as Ursinha === benji is now known as benji-lunch === yofel_ is now known as yofel === gary_poster is now known as gary-lunch === benji-lunch is now known as benji [18:17] good morning launchpad [18:20] Good morning lifeless, Happy New Year! :) [18:30] hi jkakar ! [18:35] === Top 10 Time Out Counts by Page ID === [18:35] Hard / Soft Page ID [18:35] 29 / 3980 Archive:+index [18:35] 29 / 170 BugTask:+index [18:35] 22 / 239 Distribution:+bugs [18:35] 12 / 151 POFile:+translate [18:35] 10 / 17 DistroSeriesLanguage:+index [18:35] 8 / 95 ProjectGroupSet:CollectionResource:#project_groups [18:35] 7 / 235 Distribution:+bugtarget-portlet-bugfilters-stats [18:35] 6 / 4 ProjectGroup:+milestones [18:35] 5 / 5 Archive:+copy-packages [18:35] 5 / 2 Product:+filebug-show-similar === gary-lunch is now known as gary_poster [19:39] sinzui: did you have a good break? [19:50] lifeless I suppose so. I have not completed updating gedit-developer-plugins to libpeas and gobject-introspected, but my version is running on my natty alpha one desktop [19:51] Once I upgraded to the alpha, making my primary tools work became an imperative. I think this means they will ship with quickly by default by the beta release [19:52] flacoste: hi [19:52] flacoste: are we talking today ? [19:52] hi lifeless! [19:52] we are [19:52] kk [20:07] lifeless: https://lpstats.canonical.com/graphs/PPR/20100104/20110104/ [20:20] https://lpstats.canonical.com/graphs/PPR/20101228/20110104/ [20:25] http://newrelic.com/ [20:26] http://omniti.com/video/noit-oscon-demo ? === salgado is now known as salgado-afk === matsubara is now known as matsubara-afk [21:52] lifeless: http://launchpad.leankitkanban.com/Boards/Show/12720553 [21:58] sinzui: I'm off all week [21:58] jml: doh [21:58] jml: I was hoping for a chat [21:59] gary_poster: Hi. [21:59] flacoste: https://bugs.launchpad.net/launchpad-project/+bugs?field.tag=feature-flags [22:02] lifeless: maybe we can work something out [22:02] wgrant: hi. (if you are responding to my ping, someone was asking for soyuz help and I was flailing for help since I didn't see bigjools around. someone else replied at the time. thank you) [22:03] gary_poster: I was actually around a few minutes after that, but decided that 2am wasn't a good time to be working. [22:03] wgrant: lol, I agree [22:04] gary_poster: I'm actually wondering if there's any reason I shouldn't copy bzr-pqm and bzr-tarmacland in the PPA to natty. [22:04] Because your new launchpad-dependencies is uninstallable. [22:04] wgrant: argh! should have thought of that. no, there is no reason not to copy them (with binaries) [22:05] * wgrant does so. [22:05] Thanks. [22:05] thank you wgrant [22:05] Hmm, although they each have separate lucid and maverick uploads. [22:05] Should I use the recipe, or just copy the maverick ones? [22:06] I'm pretty sure copying will work, but Ursinha or matsubara-afk can you offer any insight? [22:07] It should work. And if it doesn't, the new version will be newer, so it will be easily fixable. [22:07] * wgrant does it. [22:07] +1 [22:09] not really, I think copying should be enough.. [22:35] jml: well ping me your morning or something [22:47] wgrant: ok, so Archive:+index [22:48] its tagged for stub; suggest grabbing him this arvo [22:48] I think he looked and said (roughly) 'fugly queries' [22:48] Yeah, that's about what I recall. [22:48] I will grab him. [22:49] it may be worth changing it from prejoin to using DRS and doing a couple of simple serial queries. [22:50] sinzui: Hi. [22:50] hello [22:51] sinzui: I just saw bug #696954. [22:51] <_mup_> Bug #696954: Allow persons in project roles to access private bugs < https://launchpad.net/bugs/696954 > [22:51] Surely embargoed security bugs should not be seen by everyone? [22:52] I am not certain of that. But I have said before that we are working on privacy issues, not security issues [22:52] wgrant: I do not have a strong opinion about who should see security bugs. [22:52] sinzui: Well, at least for Ubuntu the bug supervisor *must not*. [22:53] At this time, I think security bugs are only seen by subscribers. There is plenty of opportunity to shoot yourself in the foot by unsubscribing. [22:53] Sure. [22:53] But that's how it has to be. [22:54] Unless you add an implicit security contact subscription. [22:54] Which might be OK once we have anti-subscriptions. [22:54] we had anti subscriptions [22:54] they were removed [22:54] Did we? [22:54] I believe there are 50 private Lp bugs that we cannot see [22:55] I don't recall there ever being anti-subscriptions. [22:55] wgrant: I am fine with not showing security bugs to drivers and bug supervisors. I think owners need to see them because the role is rarely delegated [22:56] Bug contacts could initially unsubscribe, but that's because there were no implicit subscriptions. [22:56] sinzui: For Ubuntu that is probably still a really bad idea. [22:56] well [22:56] there are some nuances here [22:56] firstly, shared namespaces. [22:56] We should not trust the owner? maybe we should not report a bug in their project then. I expect owners to fix their work [22:56] secondly, CVE legal requirements [22:56] sinzui: Embargoes. [22:56] As lifeless says. [22:57] The security team is to have access to those. [22:57] Not ~ubuntu-drivers. [22:57] What about making it configurable? ie. you could have a matrix, roles vs. bug type [22:57] Launchpad seems to hate configurability. [22:57] But that would indeed be optimal. [22:57] cody-somerville: bite your fingers [22:58] but that'll hurt :-( [22:58] Ubuntu should fix itself or raise their issues as top priority in stakeholders meetings. making a driver team the owner is just wrong. If they are note really owners, them make the real ownes the owner [22:58] sinzui: It's arguable that even the project's owners should not know. [22:59] Although I guess they can change the security contact anyway. [22:59] It would be nice to still have separation. [22:59] If permission stuff could be changed on the fly instead of hard coded they would probably be more open to trying to get things as intended. right now people are finding all kinds of creative ways to get launchpad to do what they want (or as close to it). [22:59] so [23:00] we have a requirement from mark to minimise variation between projects in LP [23:00] That is going to limit adoption. Because Ubuntu is not other projects. [23:00] so that once someone learns *lp* they can predict its behaviour for ubuntu, zope, launchpad itself etc etc etc [23:00] wgrant, I disagree. There has to be a buck stops here type position that has access to everything. You don't want to get into a scenario where no one can access something anymore because no one with the required role exists anymore. [23:01] sinzui: I suggest that 'security team' as a role with implicit subscription is all thats needed, no ? [23:01] wgrant: the project owner can *choose* to have full access simply by they control who in in the security role. Private bugs will only have 1 bug target. So when the owner sees a count of bugs higher than listed, he will cease control [23:01] this doesn't help the shared namespace problem [23:01] but we were perhaps on crack doing that right from the beginning [23:01] sinzui: But changing the security contact is a very explicit action. I don't think that giving them implicit access to the security bugs is a fantastic idea. [23:02] lifeless, I think the intention there might have been more like not letting them decide the layout of the 'portlets' (or w/e you call them) on the project page and not intentionally cripling the usefulness of Launchpad by always having to have the lowest common denominator when it comes to functionality. [23:02] +1 [23:02] cody-somerville: no, thats not it [23:02] I think a user is a security role gets to see all security bugs. The subscription is only needed for email. That is not required though because th security team could have a structural subscription [23:03] sinzui: True. One could have a security-only structural subscription. [23:03] cody-somerville: this has been discussed a lot previously; its about behaviour not presentation [23:03] So all we really need is for structural subscriptions to work for private bugs, detach viewing rights from subscriptions, and allow structural subscriptions based on the security flag. [23:04] cody-somerville: our *job* is to make the lcd very powerful and find ways to solve the tensions present [23:04] cody-somerville: But I think most of us agree that the project page is designed to be useless for people who need to use it [23:04] we have to be pragmatic here. [23:05] The same permission policy for all projects just isn't going to work. [23:05] cody-somerville: it has for 6 years and we have plenty of adoption. [23:05] * cody-somerville laughs. [23:05] FSVO plenty. [23:05] And FSVO adoption. [23:05] Look, reframing the problem is one route forward. [23:05] I'm not ruling it out - thats for jml, as proxy-mark, to do. [23:06] What I am doing is telling you *how* its been communicated to me previously. [23:06] I understand that. [23:06] I will say that just because its hard to do doesn't mean its impossible or unvaluable. [23:07] We are being asked to make it clear who does have access, and to make it simple to grant someone access to all of a project. We do not need to concern ourselves with a lot of details to be successful. We can continue to limit who can see the security issues knowing that an owner can always choose to know, and that it will be common knowledge how to choose. [23:08] indeed [23:08] so - for instance - showing a 'has access' portlet in addition to the subscribers [23:08] I *do* think that the security contact should act as an implicit subscription not a template subscription [23:09] +1 [23:09] btw, is there another web application that does this really well that could be a role model? [23:09] not that I've seen [23:09] The only template subscription should be the reporter. [23:10] That's easy to do once access is separate. [23:10] wgrant: it won't be separate [23:10] wgrant: subscription will still imply access; it will be additive [23:10] Right. [23:14] flacoste: we have a lot of sev 0 rt tickets [23:16] flacoste: https://dev.launchpad.net/LEP/ReleaseFeaturesWhenTheyAreDone#preview updated === spm` is now known as spm [23:32] poolie: http://en.opensuse.org/openSUSE:OSC [23:33] poolie: http://en.opensuse.org/openSUSE:Build_Service_Collaboration === rockstar is now known as rockstar` === rockstar` is now known as rockstar