/srv/irclogs.ubuntu.com/2011/07/16/#ubuntu-motu.txt

=== jrib is now known as Guest71999
=== paul__ is now known as Elbrus
=== Bodsda_ is now known as Bodsda
=== bambee_ is now known as bambee
hakermaniaHello there, when trying to compile my application to the testing ubuntu 11.10 oneiric I face this bug: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=624950 ... which is from Mon, 2 May 2011, 2 months old... So, in the end it says 'the patch has been integrated to SVN trunk.', which means that it should be the fix in the newest version, right? I hope I post in the right channel10:53
ubottuDebian bug 624950 in libcv-dev "libcv-dev: error: 'ptrdiff_t' does not name a type" [Serious,Fixed]10:53
hakermaniaYes :) thanks ubottu (bot, right :P ?) It is fixed, but is it released?10:54
jtayloryes fixed in debian10:59
jtaylorbut that version does not seem to be in ubuntu yet10:59
jtayloron the other hand it was fixed in oneiric 2 hours ago too11:00
jtaylorbug 79152711:00
ubottuLaunchpad bug 791527 in OpenCV Manager "libcv-dev: error: 'ptrdiff_t' does not name a type" [Undecided,New] https://launchpad.net/bugs/79152711:00
jtaylorweird that it wasn't merged instead11:01
hakermaniajtaylor: Should I update my system? (apt-get update)11:01
jtaylorhakermania: yes but it might not been published yet11:02
jtaylore.g. armel is still building11:02
jtaylorif it doesn't update wait a few hours11:02
hakermaniajtaylor: Thanks a lot! I was furious to realize that the app wan't compiling :)11:03
jtaylorlots won't compile in oneiric, the compiler is much stricter + has a bunch of flags that breaks buggy compilation11:04
hakermaniajtaylor: Yes, the compiler is stricter, i realized that. But I was strict with my program too, in 11.04 I didn't even get a warning from it, now, till the point it compiled before showing the bug error I already had 2 warnings xD11:06
hakermaniajtaylor: When it is published it will be shown on the update manager?11:11
jtayloryes11:11
jtayloryou can also download it now from launchpad11:11
jtaylorhttps://launchpad.net/ubuntu/+source/opencv11:12
siretarthighvoltage: yes, I should probably have rather merged the upload. still, from the changelog it doesn't look like that the debian package builds properly against libav 0.713:02
siretarthighvoltage: never mind13:02
siretartjtaylor: ^^13:03
=== yofel_ is now known as yofel
=== ttx` is now known as ttx
zookoDear people of #ubuntu-motu: we're talking about the release schedule for Tahoe-LAFS v1.9.0.21:20
zookohttp://tahoe-lafs.org/pipermail/tahoe-dev/2011-July/006529.html21:20
zookoThe question is: how many days before Oneiric Feature Freeze is our effective deadline for Tahoe-LAFS v1.9.0?21:22
zookoI think, based on my experience with getting previous releases of Tahoe-LAFS into previous releases of Ubuntu, that it will take at least three days to get Tahoe-LAFS upgraded and uploaded for Oneiric.21:22
zookoIf that's right, then we can set ourselves a deadline of releasing Tahoe-LAFS v1.9.0 for August 7.21:22
lifelesszooko: if you're working backwards, I suggest giving yourself a bit more leeway21:25
lifelessOneiric is only a short term support release anyhow21:25
zookolifeless: well we're crunched between giving more leeway between Tahoe-LAFS 1.9.0 release and Oneiric Feature Freeze and giving ourselves more leeway between finishing and testing certain new patches and Tahoe-LAFS v1.9.0 release. :-)21:26
zookoSo, you think it could take more than 3 days for someone to upload a new Tahoe-LAFS release?21:26
lifelessare there any changes that would affect the packaging?21:27
lifelesse.g.21:27
lifelessnew setuid binaries21:27
* zooko thinks21:27
lifelessnew packages we should split out21:27
* zooko looks at the tahoe-lafs trac21:27
lifelessnew dependencies that might not be already packaged?21:27
lifelessversion bumps on dependencies that are packaged but might not have been refreshed ?21:28
lifelesscause if its really straight forward, then its arguably only about 10 minutes21:28
zookoWe're considering a version bump on Twisted, but I'm sure Oneiric will already have the new version...21:32
zookoLet's see... http://tahoe-lafs.org/trac/tahoe-lafs/ticket/127421:32
zookoWe may require Twisted >= 10.1.21:32
zookoHm, then there is this new functionality -- a "drop-box-like" behavior for Tahoe-LAFS:  http://tahoe-lafs.org/trac/tahoe-lafs/ticket/142921:37
zookoI guess the Twisted requirement already satisfies that, so it wouldn't require packaging changes.21:37
lifelessyou'll be adding a daemon I presume ?21:40
zookoAsking davidsarah on #tahoe-lafs to double-check, but I believe the current tahoe-lafs daemon will do this added job of inotify-responding, so: no.21:43
jtaylorjust make sure it actually works this time21:44
jtaylorare there any plans on fixing tahoe in natty?21:44
zookoHm, what's the status of those bugs...21:54
* zooko looks21:54
jtaylorno change21:54
jtayloroptions I see, patch out the unnecessary version dependency or ask for a SRU exception update of pycryptopp21:55
zookoHm, I can't find the tickets, other than https://bugs.launchpad.net/ubuntu/+source/tahoe-lafs/+bug/76993521:58
ubottuUbuntu bug 769935 in tahoe-lafs (Ubuntu) "missing python-mock dep?" [Undecided,New]21:58
* davidsarah looks21:58
zookoIs this the URL to find all tickets associated with the Ubuntu package "tahoe-lafs"?21:58
zookohttps://bugs.launchpad.net/ubuntu/+source/tahoe-lafs21:58
lifelesszooko: yes21:59
jtayloryes but the pycryptopp was fixed in oneiric, so you have to include fix released bugs in your search21:59
davidsarahso, I thought that rebuilding tahoe would automatically get the new pycryptopp (on Natty). is that not the case?22:00
jtaylorno, natty still has the old pycrytopp and updating it would require acknowledge of the release team22:00
davidsarahok22:00
davidsarahso we should have a tahoe ticket for this22:01
davidsarahdoes installing 'python-mock' cause any regression for packages that use the other, colliding 'mock'?22:02
jtaylorthere are more than one mock?22:02
davidsarahyes22:02
* davidsarah tries to find the ticket about that22:03
davidsarahhttps://bugzilla.redhat.com/show_bug.cgi?id=60172522:03
ubottubugzilla.redhat.com bug 601725 in mock "mock has a namespace collision with python-mock" [High,Assigned]22:03
jtayloryou mean python-mocker?22:03
davidsarahmaybe that was only on redhat?22:03
* davidsarah rereads that bug -- have forgotten the details22:04
zookoYes, that's only Fedora/RH.22:06
davidsarahok22:07
davidsarahso, this is purely an Ubuntu packaging issue for which an updated package is available in this branch: https://code.launchpad.net/~jtaylor/ubuntu/oneiric/tahoe-lafs/tahoe-lafs-fix , and so it doesn't need a fix in upstream Tahoe, right?22:09
jtayloryes, but the question is how to fix it22:11
jtaylorpatching out the version dedency is the simplest solution22:11
jtaylorbut that would cause problems for people using a non-packaged old pycryptopp version22:11
jtaylorbut I assume that should be very unlikely22:11
zookoHm.22:11
* davidsarah is confused22:12
zookojtaylor: there is one place in the python source to change that dep.22:12
davidsarahwhat do you mean by "patching out the version dependency"?22:12
* zooko fetches URL22:12
* davidsarah is lost in a maze of twisty little packaging bugs, all alike22:13
jtaylordavidsarah: http://bazaar.launchpad.net/~jtaylor/ubuntu/oneiric/tahoe-lafs/tahoe-lafs-fix/view/head:/debian/patches/lower_pycryptopp_dep.patch22:13
davidsarahthanks22:13
davidsarahhuh. that patch can't be a correct fix22:14
davidsarahsince it only loosens the version requirement (i.e. allows pycryptopp 0.5.14..!20, but also still allows pycryptopp >= 0.5.20)22:15
zookohttp://tahoe-lafs.org/trac/tahoe-lafs/browser/trunk/src/allmydata/_auto_deps.py?annotate=blame&rev=4976#L6422:15
zookoThe place in the Tahoe-LAFS source where the pycryptopp dependency is specified in Pythonic terms.22:16
jtaylordavidsarah: I was under the impression that the only reason it needs 5.20 is the security fix?22:17
jtaylorwhich does not affect natty as it uses the up to date system libcrypto++ instead of the vurnable embedded one22:17
zookojtaylor: yes, that's correct.22:26
zookoSo as far as I can think, your patches are correct.22:26
zookoIt would be better to upgrade the pycryptopp in Natty.22:27
zookoOnly for the reason, as you mentioned, that relaxing the constraint in the Python code means someone who is relying on that python code (the Python code as provided by Ubuntu) but not using Ubuntu's package of pycryptopp, might use an older and insecure version of libcryptopp.22:28
zookoBut, that's really not something we should try to fix.22:28
zookoThey would have to go to a lot of effort to build an older, insecure libcryptopp into a .deb...22:28
davidsarahjtaylor: there's no guarantee that Tahoe is using the system libcrypto++22:38
davidsarahthat is, we can't change this upstream because Tahoe in general is not necessarily using a system libcrypto++22:38
davidsarah(and even the version packaged with Natty possibly is not; it depends on the PYTHONPATH)22:39
jtayloryes but how likely is it that someone is still using a old non package pycrypto in natty?22:40
davidsarahs/pycrypto/pycryptopp/ (pycrypto is something completely different!)22:41
davidsarahit's entirely possible. anyone who installed pycryptopp using easy_install might have that situation22:42
davidsarah(either easy_install of pycryptopp directly, or another python package that depends on it)22:43
davidsarahs/it depends on the PYTHONPATH/it depends on the PYTHONPATH, .pth files, anything installed into a site directory, and the phase of the moon)22:44
jtaylorwell bet we request an stable update, if that gets rejected the patch is the only option (maybe with an additional warning)22:45
jtaylors/bet/best/22:45
jtaylordoes anyone use python-beaker? an rdep of pycryptopp22:45
zookoI don't know if anyone does.22:46
davidsarahI don't understand -- we can repackage Tahoe but not pycryptopp? Why?22:49
davidsarahthe problem is that Ubuntu's pycryptopp fixed a security bug but didn't declare that it was an upstream version that had fixed the bug, so there was no reliable way to detect the fix22:50
davidsarahthat's a pycryptopp packaging problem, not a Tahoe one22:50
zookoYeah, pycryptopp uses its version number to comprise both pycryptopp and its embedded Crypto++.22:52
jtaylorwell in stable release updates should be minimal to not introduce regressions22:52
zookoThat's why Tahoe-LAFS says that it requires a newer pycryptopp -- solely because this newer pycryptopp came with a newer embedded Crypto++.22:52
jtaylorupdating to a 12 versions newer upstream can cause all kinds of problems22:52
zookoWhich is irrelevant if you aren't using the embedded version of Crypto++ that came with pycryptopp source.22:52
zookoAh, well upgrading pycryptopp is pretty safe.22:53
zookoI haven't made any major changes to it in forever.22:53
jtaylortahoe on the other hand is broken in the first place so it can't get much worth, and the proposed fix is also small22:53
zookoAll those version number changes are mostly for build-time packaging tweaks.22:53
zookoWell, I think you're right in *this* case, but for future reference there is something worse than broken: working and insecure. :-)22:53
zookoI.e., worse than not doing anything useful and erroring and quitting, is running and exposing your data to thieves or exposing your computer to being taken over. :-)22:54
zookoSo here are all of the changes in pycryptopp:22:55
davidsarah"well in stable release updates should be minimal to not introduce regressions" -- don't agree, where this involves using code that does not correspond to any upstream version22:57
davidsaraheach upstream version has been tested as a whole. OS packagers *often* end-up introducing bugs by trying to cherry-pick changes22:58
davidsarahif this didn't happen so frequently, I might agree with the principle of making minimal changes22:58
zookohttp://tahoe-lafs.org/trac/pycryptopp/browser/trunk/NEWS.rst22:59
* zooko looks at the revision control log from pycryptopp-0.5.14.23:00
zookohttp://tahoe-lafs.org/trac/pycryptopp/log/trunk/?action=stop_on_copy&mode=follow_copy&rev=772&stop_rev=&limit=12823:00
zookoSo there are a lot of changes, but they are all either (a) build tweaks (often for different systems such as Mac OS X), (b) added unit tests, (c) packaging tweaks to generate version numbers differently or the like,23:02
zooko(d) applying bugfixes to the internal copy of Crypto++.23:02
zookoI'm not saying that these changes mightn't cause problems.23:02
zookoBut, they are sort of limited in the kinds of problems that they would cause.23:02
zooko*Most* of the problems that could be caused by these changes would be limited to the build phase.23:03
zookoAs opposed to anything a user who downloaded the new package would see.23:03
zookoYep, I finished looking at all the patches, and that's about the sum of it.23:04
zookoThe only patch that doesn't fall into one of those four categories is this one:23:04
zookohttp://tahoe-lafs.org/trac/pycryptopp/changeset/759/trunk/23:05
zookoWhich comments-in a feature that nobody currently uses.23:05
jtaylorit adds a feature?23:06
zookoSo in sum, jtaylor, I wouldn't worry about too much disruption from upgrading pycryptopp.23:06
zookoYeah, it makes another Python module importable.23:06
jtaylork I'll do some brief testing tomorow and request ack on an update23:06
jtaylordo you still plan on syncing debian and ubuntu packages?23:06
zookoBefore that patch you can import pycryptopp.publickey.rsa and pycryptopp.cipher.aes and so forth.23:06
zookoAfter that patch you in addition can import pycryptopp.publickey.ecdsa, but currently nobody does so.23:07
zookojtaylor: I don't intend to spend time on syncing debian and ubuntu myself in the near future -- I'm working on Tahoe-LAFS v1.9 and related things.23:07
jtayloradding features is usually not problematic, removing them on the other hand is23:07
jtaylork then I'll also fix the missing mock problem in oneric23:07
* davidsarah checks that calling init_ecdsa can't cause a problem23:08
zookoI'll be willing to look into any bug report that arise from upgrading pycryptopp or anything else.23:08
zookoWell, it does have unit tests, ds...23:08
* davidsarah reads http://tahoe-lafs.org/trac/pycryptopp/browser/trunk/pycryptopp/publickey/ecdsamodule.cpp#L50523:09
davidsarahyep, that's pretty much the same as http://tahoe-lafs.org/trac/pycryptopp/browser/trunk/pycryptopp/publickey/rsamodule.cpp#L36523:11
davidsarahso a very low-risk addition23:11
stlsaintanyone care to assist with this lintian error:  newer-standards-version 3.9.2 (current is 3.8.4)23:37
stlsaintthe debain/source/control file shows version 3.9.223:37
jtaylorignore that, the lintian in ubuntu is just to old23:37
stlsaintha wow23:37
jtaylorlucid or?23:38
stlsaintjtaylor: yep lucid23:38
jtaylorif you use the oneiric lintian the error will disappear23:38
stlsaintjtaylor: does the same apply to these two: native-package-with-dash-version & debian-watch-file-in-native-package23:38
jtaylorno23:39
jtayloris it a native package?23:39
jtaylornative packages should not have -X in their version string23:40
jtaylora native package is a package where debian is upstream, stuff like dpkg and apt23:41
stlsaintjtaylor: oh sorry was reading on those errors, no the package is not native23:42

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!