[00:00] wallyworld_: Because the team has access, a grant is not created for the member. [00:00] wallyworld_: So they only have access through the team. [00:00] When the team's access is revoked from +sharing, a REmoveGranteeSubscriptionsJob removes the team's subscription. [00:00] But doesn't remove the person's subscription, even though they no longer have access. [00:01] oh, from +sharing. the remove subscription for former members works when using the team page to revoke membership [00:02] so there could be a case to drop the RemoveGranteeSubscriptionsJob and just rely on the RemoveBugSubscriptionsJob [00:03] wallyworld_: I think they should indeed be merged. [00:03] but RemoveBugSubscriptionsJob would need to not require bug_ids. [00:03] probably, it will need to be looked at [00:04] the RemoveGranteeSubscriptionsJob was written first and then several pipes later the RemoveBugSubscriptionsJob came along [00:05] Ah, I see. [00:06] Perhaps we should just use RemoveGranteeSubscriptionsJob and have it for both branches and bugs [00:07] StevenK: that job was written to handle both [00:08] Then why does RemoveBugSubscriptionsJob exist? :-) [00:08] StevenK: the former removes access for an individual subscriber from the specified bug/branches for a specified pillar [00:09] the later removes subscriptions for any artifacts any person can no longer see [00:09] for any pillar [00:09] the former was written early on to work will the +sharing page [00:10] the latter was written to handle team membership revocation and evolved from there [00:10] The rules for both should be the same. [00:10] But one is information_type-wide [00:10] And the other is restricted to a set of bugs. [00:10] Both need to consider teamparticipation. [00:11] one is potentially more efficient because it is more constrained [00:11] so perhaps both are needed, but the remove gants one needs to include team membership [00:11] Why are both needed? [00:11] One has bugtaskflat.information_type = 3 [00:11] The other has bugtaskflat.bug IN (1, 2, 3, 4) [00:11] They should otherwise be identical, AFAICT [00:12] i did say "potentially" - i need to review the code [00:12] Yeah [00:12] the one from the +sharing page is constrained to that pillar so potentially may have less work to do in the db [00:13] bugtaskflat.bug IN (1, 2, 3, 4) will return far less rows that infotype = 3 [00:14] hence the downstream processing may be less [00:14] Er yeah, I mean (bugtaskflat.information_type = 3 and bugtaskflat.product = 1) or (bugtaskflat.bug IN (1, 2, 3, 4)) [00:14] The two types of constraints are required for efficiency. [00:14] still less rows [00:14] But the implementation can otherwise be identical. [00:14] Just one filters by infotype and pillar, the other by a predefined list of bug IDs. [00:15] yes, the implementations can likely be merged now that both have been written [00:15] but the different filtering should remain probably [00:15] Yup [00:38] wallyworld_: btw, bin/celeryd -l DEBUG -Q job --config lp.services.job.celeryconfig [00:38] Handy for testing stuff outside tests. [00:38] Without waiting 50s for the cronjob to start [00:39] cool, i did know that a couple of weeks ago but forgot [01:21] ahahaha http://www.leakedin.com/ [01:25] also leakedin.org :> [02:00] StevenK: what did we decide about have a public A stacked on public B but then making B userdata - A should also become userdata? [02:01] wallyworld_: Hm, I think I've swapped that out. Let me think. [02:01] ok. i have a test which does that and fails [02:02] it used to set private = true and the triggers would update everything [02:02] but setting info type = userdata fails since A remains public [02:05] wallyworld_: Right, so the information_type won't change, but we check if the stacked_on branches information_type is private in places where we were depending on transivitely_private. [02:06] StevenK: sure, we now check for branches "under" the one being changed, but the old transitively private stuff also went "up" the chain [02:07] Yes, we don't do that. [02:07] i think we need to [02:07] Why? [02:07] or else we will have public stacked on user data and will be in the same mess [02:07] as we had before transitively private [02:09] wallyworld_: It's less than practical to do that universally, and the cases where it's useful are less than common. [02:09] it's not impractical if we use triggers [02:09] wallyworld_: If you're changing a stacked-on branch from public to private, you should know you're already in strife. [02:09] Neither wgrant or I want to use triggers. [02:09] wallyworld_: It's still impractical. [02:10] why impractical? [02:10] wallyworld_: It's just that it's so unused nowadays that the impractical cases haven't shown up yet. [02:10] and if we don't fix this, users will shoot themselves in the foot [02:10] wallyworld_: Writing to a few thousand branches because of a write on one branch is silly. [02:10] that's what we do now with the triggers and it works fine [02:10] wallyworld_: Users have shot themselves in the foot in the past due to Launchpad staff misconfiguring branch visibility policies. [02:11] sinzui has since fixed them, and in the new model it's impossible. [02:11] so are you sating allowing a public branch to stack on a private branch is ok? [02:11] because the code as written allows that [02:11] wallyworld_: The normal footgun situation is handled here, as it was before. If you push up a new public branch stacked on a private branch, it will be overridden to private. [02:12] What's not handled is making an existing public stacked-on branch private. [02:12] wgrant: sure, but now the other way arpund [02:12] not [02:12] Now, we should probably warn in that case. [02:12] But it's going to be extremely rare. [02:12] Extremely. [02:12] you can make a stacked on branch private [02:12] the code allows it [02:12] Sure. [02:12] so people will do it [02:12] there's a test which does it [02:13] It's possible to do. [02:13] i think we are leaving a huge hole [02:13] +sharing will say "you have n private branches" [02:13] and don't understand why we are regressing [02:13] The public branch will probably have a warning say "wtf are you crazy" [02:13] But the situation should never occur again. [02:13] Unless someone forgets to set up private branches before they push their code. [02:14] should !+ won't [02:14] it will and can occur via the api i think (need to check) [02:14] I'm not saying that it's impossible to do. [02:14] I'm saying that it is very unlikely to happen. [02:14] the system should not allow people to do this [02:14] Unless someone deliberately does it. [02:14] unlikely != won't [02:14] well they may not realise [02:15] what's to stopme from changing my branch to private not realisng it is stacked on [02:15] Nothing. [02:15] But why would you do that? [02:15] what, change a public branch to private? [02:15] Yes. [02:15] why not? [02:15] Why? [02:16] you may want to do future work in secret [02:17] Anyway. Doing unbounded cascading writes is foolish, and this case is sufficiently harmless and so extraordinarily uncommon that I'm pretty sure it's not worth it. [02:17] it's not unbounded really [02:18] There may be some sense in adding a warning to the stacked branch. [02:18] It is unbounded. [02:18] not in practice [02:18] and it works just fine now [02:18] so we are causing a deliberate regresiion [02:18] Has it ever been used? [02:18] in tests [02:18] i have no way of knowing whether on prod [02:19] It wasn't used during the several week information_type transition on production. [02:19] ingrequent != won't ever [02:20] we should not allow the system to get into a bad state [02:20] launchpad_dogfood=# SELECT COUNT(*) FROM branch WHERE stacked_on = (SELECT id FROM branch WHERE unique_name = '~launchpad-pqm/launchpad/db-devel'); [02:20] and that's what we wil be doing in introducing this regression in functionality [02:20] count [02:20] ------- [02:20] 5018 [02:20] (1 row) [02:20] That's pretty unbounded. [02:20] wallyworld_: What is wrong with the state? [02:20] 5018 < infinity [02:21] public branch stacked on private branch doesn't make sense [02:21] It doesn't make sense, no. [02:21] and yet we will be allowing it [02:21] But why do we need to prevent it? [02:21] because it doesn't make sense [02:21] We should prevent things that are harmful. [02:21] and the whole reason transitively private was done was to stop this [02:21] Not quite [02:21] that's the only reason transitivelt private was done [02:22] transitively_private's main use case is handled by information_type [02:22] That case is the one where a branch is pushed as public, but is stacked on a private branch. [02:22] In that case the user is probably unknowingly making a mistake. [02:23] We need to handle that, because it happens often due to misconfiguration. [02:23] and the other case will also happen [02:23] The case that transitively_private handles now, but we are dropping with information_type, is where a branch and its stacked-on are public, and the stacked-on transitions to private. [02:23] In that case the branch owner is already aware of some information disclosure. [02:23] They're going to want to audit their project's sharing once they've fixed the immediate hole. [02:23] yes, and i totally disagree with that regresiion [02:24] it is insane we are allowing bad data from one direction and stopping it from the other [02:24] Hm? [02:24] We're not doing it to stop bad data. [02:24] We're doing it to stop people from a footgun that they can't know about. [02:25] and yet we will allow it still [02:25] No. [02:25] yes [02:25] change the stacked on to private and boom [02:25] Boom? What boom? [02:25] Nothing breaks. [02:25] Some stuff may be left public. [02:25] But it's not unknown. [02:25] what breaks is that people will want to work with the public branch but cant [02:26] Public->private of a stacked-on happens as a result of an incorrect configuration being discovered. [02:26] Ah! [02:26] because they can't see the stacked on private branch [02:26] Now that's something we can't solve. [02:26] They can't work with it either way. [02:26] If it's public, they can no longer work with it since it's stacked on a private branch. [02:26] If we make it private, they can longer work with it since it's private. [02:26] 2012-06-06 23:26:57 DEBUG2 [PopulateSourcePackagePublishingHistoryPackageUpload] Done. 231995 items in 337 iterations, 807.064977 seconds, average size 688.415397 (287.45639486/s) [02:26] So it's no more unusable this way. [02:26] yes, and so it should be marked private [02:26] wgrant: ^ [02:27] wallyworld_: Why? [02:27] so that people realise it's private. as i said, that why tp was introduced [02:27] wallyworld_: This is not a regression which makes those forgotten branches less usable. And this is not a regression which prevents an audit from working, since the other branches will clearly show up as public too. [02:27] wallyworld_: tp's main usecase is, as I said, to prevent the initial footgun case. [02:28] it is a regression which removes previously agreed useful behaviour [02:28] *Not* to handle this change later. [02:28] It's very expensive and probably not worthwhile behaviour. [02:28] and we will now be allowing the initial footgun again [02:28] wgrant: And racy. [02:28] No [02:28] How? [02:28] by allowing a stacked on branch to be marked private [02:28] We explicitly do handle the initial push case. [02:28] That's not the initial footgun. [02:29] it's a way to create the problem without people knowing [02:29] Making a branch private later is a very explicit operation. [02:29] and one which is easy to mess up [02:29] if you don't realise yor branch is stacked on [02:29] Sure. [02:29] Then let's warn in the UI and move on [02:29] And what is the fallout from it? [02:29] we just simply cannot alllw this [02:30] It is messy, but not a significant security issue. [02:30] ui != api [02:30] So a warning is probably sufficient. [02:30] it's a significant functional issue [02:30] In an extraordinarily rare situation. [02:30] Where someone has already broken shit. [02:30] since it inadvertantly stops peope working wit the public branch [02:30] Huh? [02:30] That's irrelevant. [02:30] not rare enough that tp wasn't needed [02:30] We'd just be advertantly stopping people from working with it. [02:30] wallyworld_: tp solves the footgun case. [02:30] This also solves the footgun case. [02:31] tp does more than that [02:31] tp's implementation happens to also solve the later transition case [02:31] we are deliberately regressing [02:31] This does not. It consciously does not. [02:31] Correct. [02:31] But it's not a substantial regression in any way. [02:31] not "happens", it was a key part of the implementation [02:31] it is a substantioal regrsiion [02:31] we must not allow users to do things whuch break the system [02:32] It does not break the system. [02:32] it breaks the ability for people other than themselves to work wit the stacked branches [02:32] I can make a public branch unusable in other ways. [02:32] eg. by deleting the repository from it. [02:32] so? [02:32] 2 wrongs doesn't make a right [02:33] And all it does is avert a tiny bit of user confusion. [02:33] Since if we follow tp, we just make the branch even less usable. [02:33] it does a lot more than that [02:33] Not more usable. [02:33] why is the branch less usable wit tp? [02:34] wallyworld_: Your complaint is that with information_type the branch is unusable by people who don't have access to the stacked-on branch. [02:34] without tp, the ui lies [02:34] wallyworld_: With tp the branch is just as unusable. [02:34] Sure. [02:34] But the UI can say "uh, your branch is stacked on a private one, but it's public. you're probably wrong" [02:34] but it the private branch could be several layers down [02:35] That's true. [02:35] and model code also needs to treat the branch like it is private [02:35] to exlcude it from search results etc [02:36] Why? [02:36] It doesn't break anything. [02:36] if i change a staced on branch to private, any publiv branche sstaked on it must not show up in search results [02:36] It just makes it a little confusing. [02:36] Why not? [02:36] https://pastebin.canonical.com/67615/ [02:36] because the stacked branch is to be considered private [02:36] that was the required tp functionality [02:36] when that work was speced out [02:37] canonical-payment-service and ztrustee were misconfigurations that sinzui fixed. information_type handles those identically, because it's the initial footgun case. libunity-webapps was a misconfiguration that required a full project audit afterwards. Everything else has less than 5 branches in this state. [02:37] Which proves that no large transition has ever made use of the tp ability that we're regressing on. [02:37] Except *possibly* libunity-webapps. [02:38] sure, but just because it's uncommon, we can't just unilaterally decide to regress [02:38] That paste covers every branch that has made use of tp, except for those where explicity_private was set afterwards. [02:38] wallyworld_: We're regressing on a feature that has never been used. [02:38] Not once. [02:39] what about libunity-webapps [02:39] wallyworld_: What if we don't consider the stacked branch private? [02:39] wallyworld_: What if we consider it misconfigured? [02:39] and it's not so much that it's used, it is designed to prevent inconsistent data [02:39] and confusion [02:39] libunity-webapps I shall not go into here, but it was a complete misconfiguration of a private project. [02:40] In the case of a misconfigured project like that one, you should be fully auditing +sharing anyway. [02:40] even if we consider it misconfisgured, why would we deliverately design out a saftely check to prevent the misvonfiguration in the first place? [02:41] wallyworld_: It's not proven useful even once, it requires unbounded write cascades, and it is non-trivial to implement with information_type. [02:41] it was useful because of the state lp was in befre it was implemented [02:42] The main usecase for tp is extremely useful. [02:42] there were a large number of public branches stacked on private [02:42] This one is not. [02:42] Sure. [02:42] and now we can have the all over again [02:42] No! [02:42] No! [02:42] yes [02:42] Only if a project changes their stacked-on branch without touching the rest. [02:43] why do you say no when we have already agreed it can happen? [02:43] In that case it's not a vulnerability. [02:43] It's a project being stupid. [02:43] but they may no realise their branch is stacked on [02:43] wallyworld_: As we've seen, the vast, vast majority of cases where it can happen is the initial push. [02:43] So we won't have a large number of public branches stacked on private. [02:43] it can happen anytime [02:43] We might have 1% of what we had before [02:43] wallyworld_: Technically it can. [02:44] Practically it won't unless the project owner is a moron. [02:44] and therefore it will [02:44] Is it a problem? [02:44] moron != careless [02:44] yes [02:44] otherwise tp would not have been approved to be resourced [02:44] Huh? [02:44] TP solved a very real problem [02:44] It was totally worth it [02:44] It also solved another problem that wasn't real. [02:44] We have hard data on that now. [02:45] it was rel [02:45] i can't recall the exact figures, but a garbo job was needed to clean up the data [02:45] That is entirely irrelevant to the nature of that data. [02:45] The volume and split are unrelated. [02:46] The data I just obtained from dogfood confirms my assumptions: that the case we're dropping is unused. [02:46] It's a case I was always suspicious about. [02:46] used now != used ever [02:46] and we are taking away a safety net [02:46] to prevent bad data [02:46] deliberately [02:47] OK [02:47] It's not bad data. [02:47] it is [02:47] because it causes confusion [02:47] and stuff to break [02:47] Preventing bad data is not itself a useful goal [02:47] huh? [02:47] The "bad data" has to have some negative effect [02:47] it does [02:47] The goal is to eliminate the negative effect. [02:47] Right [02:47] confusion, no longer being able to use the stacked branch [02:47] So let's stop talking about bad data, and start talking about the negative effects :) [02:48] Confusion: granted, we can fix that with messages on the branch page, as we do already if the stacked-on location is invalid. [02:48] or we could just prevent the bad data and not introduce a deliberate regresiion [02:48] we would need to drill down the entire stack [02:48] No longer being able to use the stacked branch: that's a false statement; you can't use it if it's private either. [02:49] but it's not pretending to be usable [02:49] So that goes back to confusion. [02:49] Which is very similar to the invalid stacked-on issue [02:49] For which we currently warn [02:49] With a warning on Branch:+index [02:49] we never used to warn [02:49] is that new [02:49] We've always warned. [02:50] Invalid meaning not a valid URL, or the URL points to something that doesn't exist or is outside Launchpad [02:50] Not meaning private [02:50] Yet. [02:50] nope, not in the case of public stacked on private afair [02:50] we used to just show the stacked branch as if it were public [02:50] 12:49:24 < wgrant> Which is very similar to the invalid stacked-on issue [02:50] 12:49:27 < wgrant> For which we currently warn [02:51] "is very similar to" [02:51] Not "is" [02:51] so it's new then [02:51] Hm? [02:51] That warning is not new. [02:51] Extending it to warn when the stacked-on is private would be new. [02:51] but we never used to warn people their public branch was stacked on a private one [02:51] No. [02:51] I never said we did. [02:52] I'm saying it's what we should do [02:52] hence my assertion it will be new [02:52] Sure, warning *on privacy violation* is new. [02:52] Warning on bad stacked-on in general is not. [02:52] So it's quite anomalous that we don't warn in the case of a privacy violation. [02:52] even recusive stacked on [02:52] ? [02:53] I'm not sure about that. [02:53] we may warn on bad stacked on, but perhaps not recusrively [02:53] i guess it comes down to in part philosophy - should software prevent a known bad situation [02:54] or should software regress deliberately [02:54] It's a tradeoff. [02:54] given the current implementation works fine, i'm not sure i see why we are doing this [02:54] We can maintain messy code of unbounded computational complexity that will probably never be usefully used. [02:54] wallyworld_: Are you done yelling at wgrant? :-) [02:54] Or we can not. [02:55] it's not messy [02:55] the algorithm is very simple [02:55] With transitively_private it's not messy. [02:55] With information_type it is slightly moreso. [02:55] Because it's not boolean. [02:55] so what i would like to see is an exception raised [02:55] Hahahaha [02:55] if someone attempts to change a stacked on branch to an invalid state [02:56] We can't do that every time. [02:56] why? [02:56] You may recall we discussed this for weeks. [02:56] The information_type of a stacked on branch could change directly. [02:56] stacking can change via an sftp client [02:56] Or it could change by its stacked-on branch changing. [02:56] Precisely. [02:56] sure, but i'm talking about public stacked on not public [02:56] So. [02:56] Listen to this case: [02:57] via sftp we can't detect sure [02:57] I have a stacking chain. A stacked on B stacked on C [02:57] but that's the case now with tp also [02:57] They're all public. [02:57] Now, the owner of B changes it to stack on D, a private branch. [02:57] What happens now? [02:57] We can't block that. [02:58] So A and B have to become private, or we have to let them be inconsistent. [02:58] Blocking is the ideal solution. [02:58] But it's not feasible. [02:58] So we have to either propagate or accept. [02:58] what happens now is A and B become private [02:58] Yes. [02:58] as they should [02:58] That is arguable. [02:59] the argument was had before tp was approved [02:59] And even if we decide that they should, it becomes is it worth it. [02:59] and it came out in favour of tp [02:59] Curtis agreed with my view on several calls, and I'm pretty sure you were there too :) [03:00] i'm not sure it was agreed to intorduce a deleibate regression [03:00] It may have been agreed during TP's design on the absence of useful data. [03:00] But we have useful data now. [03:00] It was. [03:00] It was acknowledged as a regression. [03:00] And I now have data which proves beyond reasonable doubt that nobody will miss it, because nobody has used it. [03:01] it's not that nobody has used it i'm worried about - it's the ability to allow a misconfigured sysem, deliberately [03:01] Sure [03:01] It's less than ideal. [03:01] because nobody uses it is even more a case not to allow it [03:01] But the misconfiguration is not fatal. [03:01] fsdo [03:01] There are lots of other misconfigurations that we permit and can't reasonably forbid. [03:02] And this misconfiguration is expensive to prevent. [03:02] well we can reasonably prevent this one because we already do [03:02] Only in a way that will probably time out if it's ever used. [03:02] nope, it's used now [03:02] On any project of significance. [03:02] It's *NOT* [03:02] The data I gave proves that. [03:02] the triggers are run everytime a branch changes [03:03] Hmmmmmm? [03:03] Yes. [03:03] But we're not talking about the triggers' overall behaviour. [03:03] We're talking about the particular aspect that we're dropping. [03:03] The unbounded cascade from the lower branch. [03:03] i don't want to redo the cascade bit [03:03] just the bit to prevent bad data [03:04] Hm? [03:04] Confused [03:04] The bit we're regressing on is the cascade bit. [03:04] to prevent changing a stacked on branch to userdata [03:04] Ah [03:04] if the stacked branch is public [03:04] Now, we could prevent that at the UI and API level. [03:04] However, we can't prevent that at the bzr level. [03:04] yes, that's all i am wanting [03:04] sure [03:05] OK, that is a more reasonable proposal. [03:05] we don't do anything at the bzr level now for tp [03:05] We do [03:05] wthat's all i've been arguing for here [03:05] When the stacked-on changes via bzr, it will change in the DB. [03:05] And transitively_private will work [03:05] It is no problem there because it's not trying to prevent the transition. [03:05] Just react to it. [03:05] ah right. well we should do the same check in the new world also [03:05] We don't want to react to it. [03:06] wallyworld_: Which is exactly the cascading thing. [03:06] We have three options: [03:06] i'm not talking about cascading any changes as we do now, just now allowing the transiitin [03:06] not [03:06] 1) Do nothing. Let people shoot themselves in the foot if they shuffle branches around in strange ways. [03:07] 2) Cascade privacy changes through the tree. [03:07] 3) Block transitions that violate the rules. [03:07] TP does (2) [03:07] i'm arguing for 3, and have been for 30 minutes [03:07] information_type does (1) [03:07] (3) is impossible, since we can't block bzr changes. [03:08] why can't we block the stacked on change? [03:08] does bzr write straight to the db? [03:08] No, which is exactly the problem. [03:08] It's FS access [03:09] when in that case the triggers won't run [03:09] so how are the stacked on changes propogated? [03:09] The branch scanner. [03:09] After the push has completed. [03:09] so the branch scanner could reject the change [03:09] So we cannot error at the time the client sets stacked-on [03:09] Reject how? [03:10] We could fail the scan. [03:10] But you'll never guess what that does. [03:10] raise an oops? [03:10] It leaves the branch public, but puts a warning on its page :) [03:10] Which is exactly what I proposed. [03:10] wgrant: you can block stacked on changes, just reject the IO operation [03:10] leaves the stacked branch public? [03:10] lifeless: lol [03:11] lifeless: I don't feel like rewriting bzr lp-serve today [03:11] wgrant: why would you need to rewrite it? [03:11] wgrant: it has a lp VFS module already [03:12] wgrant: I'm not saying you should, I'm disputing your assertion that its impractical. [03:12] lifeless: If it's practical to do that (eg. due to restrictions around RPC from the lp-serve process), why wasn't that done from the start instead of doing it at scan time which is clearly inferior? [03:12] wgrant: what restrictions, lp-serve makes RPC calls all the time [03:12] lifeless: It's possible. [03:12] It's probably not practical. [03:12] it's not scan time [03:13] it's when the branch is unlocked [03:13] mwhudson: branchChanged time, sorry [03:13] After the end of the operation. [03:13] (which is admittedly too late to tell the writer to bugger off) [03:13] Precisely. [03:13] wgrant: there was no initial requirement to patrol stacking [03:13] wgrant: you are adding one, which implies change. [03:14] wgrant: so why wasn't it done this way before, because it wasn't done before at all. [03:14] and a change i think we should do [03:14] lifeless: We break branches in LP when the stacked-on is invalid. [03:14] That's not new functionality. [03:14] wallyworld_: Why? [03:14] I'm pretty sure it's completely not worth the extra code. [03:14] wgrant: what do you mean break them ? [03:14] do i really have to explain myself all over again? [03:14] And the data confirms it. [03:15] It's an extraordinarily rare situation. [03:15] And it will become even rarer once people can't break private project setup. [03:15] rare != we shouldn't prevent it [03:15] Nothing goes terribly wrong if we don't prevent it. [03:15] And preventing it requires lots of extra code. [03:16] lots? [03:16] difficult to implement + very rare + largely inconsequential == not worth it [03:16] wgrant: what do you mean break them ? [03:16] lifeless: It stops scanning and throws warnings on the branch page. [03:16] lifeless: Which is pretty unpleasant if it could just reject the push instead. [03:18] it can [03:18] however thats not break-the-branch, its aknowledge-that-its-broken [03:18] we're not altering the branch data are we? [03:18] wgrant: wallyworld_: Can I ask, whats the context - you have a long and interesting discussion, but whats the core issue ? [03:19] lifeless: we now handle the case if a stacked on branch is changed from public -> private [03:19] any stacked branches will become private also [03:19] recursively [03:20] but the new world will see use allow a user to change a stacked on branch to private will no warning and the stacked branches will remain public [03:20] and the stacked branches will become unusable [03:21] The stacked branches will become unusable to unprivileged users, same as they would be if they were made private. The only issue is confusion if the branch says it's public but isn't usable. [03:21] so we are allowing a footgun with no warning [03:21] hmm [03:21] I gathered evidence from the database that this feature hasn't been used. [03:21] so, I would say, that changing other peoples branches to private is a misfeature [03:22] i'm not arguing it hasn't been used, i'm worried about the footgun [03:22] wallyworld_: its fixable by the same user right ? [03:22] ie allowing someone to do something dumb with no warning [03:22] yes [03:22] so the footgun specifically, is it: [03:22] fsvo fixabe [03:23] a) the user changes the privacy setting for the stacked-on branch to private [03:23] or [03:23] b) in a public branch they set a stacked-on which is private [03:23] ? [03:23] a) [03:23] we handle b) [03:23] and it's a regresion because we handle a) now [03:23] with the general case of c) being 'setting a stacked-on which has a different visibility rule' (and applies if per-artifact access is given to a branch but not its stacked-on) [03:24] do we handle c)? how do we handle it ? [03:24] triggers [03:24] transitively private [03:24] I thought that column was deleted ? [03:24] but it's complicated with info type [03:24] (being deleted) [03:25] lifeless: It's about to be deleted. [03:25] yes, and so we need to figure out how to prevent the footgun [03:25] so transitively private propogates outwards [03:25] if you mean up the stack , yes [03:25] a) is a propogates-outward case, c) is a propogates inwards case. [03:25] outward == up the stack, yes. [03:25] yes [03:25] information_type is currently independent, except that if you push a new public branch and it's stacked on a private one, then you're probably doing something stupid and disclosing previously private code, so we make it private. [03:25] but we can't propogate info type [03:25] we should just prevent bad things [03:26] ie veto the info type change [03:26] or stacking change [03:26] ok, so I'm much more worried about c than a. [03:26] With the propagation behaviour we're not disclosing previously private code. [03:26] We're just not automatically unleaking it. [03:26] Um, with*out* the propagation behaviour [03:27] a) very very few users will run into and they can restore functionality by unprivating the branch; or they can file a ticket to get a mass-migration of information type done (assuming they don't own all the branches) [03:28] c) users will run into all the time, because feature branches are fairly common, and contractors are also fairly common [03:28] This is upsetting [03:28] I don't get to argue with lifeless this time :( [03:28] and c) is handled now but soon won't be [03:28] wgrant: see, sometimes you are right ;) [03:28] Hm? [03:28] my view is that we should not allow the users to enter bad data [03:28] Isn't (c) the case we *do* handle? [03:29] if a user changes a branch to stack on a private one, the any public branches stacked on top "break" [03:29] That's case (a) [03:29] with transitively private, they didn't [03:30] a) is changing the privacy, not the stacked on [03:30] or am i wrong [03:30] ah, I think the phrasing is poor. [03:30] let me rephrase. [03:30] General case there are three branch sets to consider. [03:31] stacked-on branche(s) - its transitive following the pointers. [03:31] [03:31] stacking-on-this branch(es) - anything that stacks on this branch, or transitively outwards [03:32] wallyworld_: Ah right, misunderstood you. [03:32] wallyworld_: Right, if the change an intermediate branch it still breaks. [03:32] yes [03:32] changing the pointer in to point to a branch with different visibility rules (e.g. different info type) is equivalent to to changing the visibility rule on a member of the stacked-on branch set. [03:33] in terms of impact on the stacking-in-this branches. [03:33] The difference is whether its web ui (change info type) or bzr (change stacking pointer) [03:33] from the perspective of any member of stacking-on-this, its identical. [03:33] ^ does this make sense ? [03:33] Yes [03:34] yes [03:34] we can detect that we are going to stack onto an incompatible branch [03:34] but we are saying that we will not detect changing a branch which will cause outward brancvhes to become invalid [03:34] and we can detect when changing info type that there is a branch stacked on this that is incompatible (again transitively) [03:34] yes [03:35] so, what user stories do we have around this [03:35] but we the proposal is not to do that anymore [03:35] one story is 'I have a branch that should be different info-type *and* it has stacked-on branches that I do not control' [03:36] or 'has stacked on branches i do not know about' [03:36] right [03:36] hence i may break them inadvertantly [03:36] with no warning [03:39] so what can we do here [03:39] we could stop the user changing the setting (be that stacked-on *or* information-type = we've established identity) [03:40] yes [03:40] so with transitively private, we allowed the change because it was transparently propogated [03:40] but now it won't be [03:40] we could allow the branches that are no longer compatible [for users that don't meet the union of visibility rules] to become inoperable for those users [03:41] we could overlay the new information type into all the affected branches [which is what transitively private did] [03:41] ipractical [03:42] with allowing the branches to become inoperable, i'm arguing we should warn the user first [03:42] here is my suggestion [03:42] via the api, not sure how to handle [03:42] I think you should just do the change requested. [03:42] tell the user the *impact* of the change. [03:43] They can switch it back in a heartbeat if they made a mistake, API *or* web UI. [03:43] or bzr for that matter. [03:43] that works i think, at least then it's an informed decision, not something done that they dont know about, and that was my main issue [03:44] I totally agree that silent breakage at a temporal distance from the act is terrible [03:44] this will avoid that; we can, if you desire, send a warning to bzr too. [03:44] yes, and this is what i was arguing against [03:44] I think though, that anyone doing bzr set-stacked manually, is in a class of their own : I wouldn't bother handling it. [03:45] wallyworld_: this == 'silent breakage at a temporal distance from the act is terrible' ? [03:45] yes [03:45] righto [03:45] wgrant: ^ what do you think of my proposal? [03:46] i have no problem with the new limitations in behaviour [03:46] We can't forbid, but we can warn on the branches at both ends, which is my preference. [03:46] but the 'silent' breakage [03:46] we can forbid it, no? [03:46] sorry, i mean warn [03:46] wallyworld_: so, the silent-breakage via bzr case is excruciatingly rare [03:46] after they have done it [03:46] wallyworld_: bzr makes it super hard to change [03:47] wallyworld_: and lp sets the default behavior (to the branch of the default series) [03:47] no problem there. but we can reasonably handle the other cases [03:47] and i would argue that peope doing it via bzr are more expert anyway [03:47] warning in the web ui is easy; the API can return something with a warning too I expect. [03:47] yes [03:48] The API can't return a warning that people will see. [03:48] But in the web UI we can. [03:48] in the ui, warn as it is done as also after wards [03:48] wgrant: OTOH folk doing API scripting are probably changing every branch they have. [03:48] wgrant: e.g. the warning would be superfluous [03:48] wallyworld_: Well [03:48] wallyworld_: The branch edit page returns to the branch index page on submission. [03:49] wallyworld_: So a bright warning at the top of the branch index page serves both purposes :) [03:49] we can ask for a confirmation [03:49] wallyworld_: nix on that [03:49] in the web ui [03:49] I don't think we should. [03:49] It's trivial to revert [03:49] wallyworld_: confirmations for things that are easily reversible is an antipattern of usability. [03:49] And more expensive to add confirmation [03:49] ok [03:49] Like [03:49] It'll be a matter of clicking the edit icon [03:49] and clicking Public in the picker [03:49] with the api, we could introduce a 'i really want to do this parameter' [03:50] so it raises an exception unless that parameter is set [03:50] that way, it's an informed choice [03:50] since that is a case of breakage from a distance [03:52] ugh [03:52] wallyworld_: Can you peer at http://pastebin.ubuntu.com/1027943/ ? [03:52] expose the attribute as readonly, use an API call to set it rather than direct mutation, and have the return value describe the impact. [03:52] wallyworld_: ^ [03:52] lifeless: that works for me [03:52] so long as the impact is communicated [03:53] wallyworld_: wgrant: making a branch *public* that wasn't before is something that you might justify a confirmation for. [03:53] StevenK: looking [03:53] because unhiding previously hidden data is infeasible [03:53] lifeless: Sure. [03:53] lifeless: But that is precisely the opposite of this case. [03:53] lifeless: That one is a general issue with the information type picker, unrelated to stacking. [03:53] actually, its tightly related :P [03:53] Hmm [03:53] Oh? [03:54] which is that fixing a public->private change involves a private->public change :) [03:54] Uh [03:54] yes [03:54] But that's barely relevant. [03:54] It's a special case that will be fixed by the general fix. [03:54] There's nothing even really special about it :) [03:55] Lots of test fallout of forbidding open/delegated teams to subscribe to private branches. :-( [03:55] Yeah [03:56] We really need to split the two types of teams up better. [03:56] So they're more obviously different types of objects. [03:56] I think ec2 has found most of them [03:56] makeTeam and makeBadgeSeekersGroup [03:56] Hahaha [03:56] Oh, of course it has, the instance has been up for 4:04 [03:57] wgrant: Some of the fixes are trivial [03:57] All of them should be. [03:57] test_branchnamespace breaks in strange ways [03:57] (When I make the 3 teams MODERATED) [03:57] StevenK: i'm not sure what caused that error ottomh [03:57] Hmm [03:58] i'd need to debug it [03:58] StevenK: What's the diff? [03:59] wgrant: https://code.launchpad.net/~stevenk/launchpad/branch-subscribe-aag/+merge/108881 is the MP [03:59] StevenK: So, the branch owner is trying to subscribe a private team that they can't see. [04:00] I'm surprised that ever worked. [04:00] The test is clearly on crack. [04:00] There are a *bunch* of them [04:00] Replace person_logged_in(...) with admin_logged_in() [04:00] Problem solved [04:00] (the write permission is not relevant in that test) [04:01] * wallyworld_ has to do school pickup [04:01] It isn't relevant to check that the person subscribing can see the team? [04:01] StevenK: Look at the test. [04:01] StevenK: It is testing that an anonymous user can't see a private subscriber. [04:01] Not that a private subscriber can or can't be created. [04:02] So the principal behind the creation is irrelevant. [04:03] wgrant: That issue can't affect prod? [04:04] StevenK: Only if someone is subscribing someone that they don't have View on, which I don't think is allowed since it discloses the team name. [04:05] But it's possible that someone with LimitedView can subscribe, I suppose. [04:05] It will oops [04:05] So we can find out [04:05] Right. [04:05] Right, 18 failures, let's see how few I fixed [04:09] Hmmmmm. A test creates a private team and then creates a branch with that owner and it blows up too. [04:10] StevenK: The branch owner is irrelevant. [04:10] StevenK: The current principal is important. [04:11] It just calls into the factory twice, I'm not sure which principal is involed. [04:11] *involved [04:20] wgrant: I've thought a problem -- create a project and have an open team as a reviewer. Create a private branch and propose it. Boom. [04:21] StevenK: Reviewers aren't subscribed unless the branch is private. [04:21] And that will largely go away now we have APGs. [04:22] wgrant: Yes, and you can't subscribe an open team to a private branch ... [04:22] And if the reviewer is an open team ... [04:23] StevenK: Right, that's stupid and should be forbidden :) [04:23] It doesn't make sense. [04:23] Forbidding something that shouldn't be permitted is not a bug :) [04:23] Yes, so I was going to chase that rabbit hole for a bit. [04:24] Trying to figure out where reviewers are in the DB [04:33] Hmmm, can't see it in the UI either currently, that's disappointing [04:33] What do you mean? [04:34] wgrant: So when I propose a branch for LP, a team is set as the reviewer. I'm trying to figure out where that is in the DB. [04:35] StevenK: branch.reviewer [04:36] I discounted that because I thought it was per-branch [04:37] It is per-branch. [04:37] The default reviewer for an MP is the target branch's default reviewer. [04:38] Which is in .reviewer for that branch, right. [04:54] wallyworld: ^ Distracted from my other branch by a different problem. [04:55] People that have set an open team as a reviewer need to be shot. [04:55] StevenK: i think so [04:56] wallyworld: About which? [04:56] the default mp reviewer is the branche's default reviewer [05:50] StevenK: again, its our oversight [05:50] s/again, // [05:50] lifeless: Which is? [05:52] failing to consider the implications of open teams on integrity [05:53] Yup. [05:53] I'm going to bring it up on the call tomorrow. [06:00] StevenK: you're aware of all the other cases we've fixed so far? [06:00] StevenK: we should probably just do an audit [06:00] ppas, project roles, .... [06:03] lifeless: I was involved in both of them closely. [06:05] lifeless: However, these situations are not as cut-n-dried as PPAs and project roles. [06:06] There are arguments both ways, which there wasn't for the two earlier cases. [06:12] wgrant: https://code.launchpad.net/~wallyworld/launchpad/sharing-job-fflag-protection/+merge/109072 [06:50] StevenK: well, there weren't for ppas, because sudo on machines, but the rest there are :) [06:50] StevenK: if you consider tarmac, this case becomes roughly === ppas [06:55] lifeless: branch.reviewer is different, since most projects don't use Tarmac, so there are uses where an open team doesn't mean root for everyone. [06:56] lifeless: For PPAs there's no use that doesn't mean root for everyone. [06:57] wallyworld: That's the third feature flag for the same thing. [06:57] not really [06:57] i reused one [06:57] wallyworld: All the other stuff is guarded by one of the two feature flags that you introduced two days ago. [06:57] for this [06:57] And, critically, we don't want to turn writing on before we confirm that these work on production. [06:58] different semantics [06:58] So turning this on only when we turn writing on is less than ideal. === almaisan-away is now known as al-maisan [06:58] I'd have all the job creation under a flag like disclosure.that_job_stuff.enabled [06:58] Rather than 3 with misleading names. [06:59] misleading? [06:59] to whom? [06:59] for this branch, i just wanted a fast way to disable the jobs [06:59] so we can deploy [07:00] without having to add another flag [07:02] the closest existing flag is perhaps disclosure.legacy_subscription_visibility.enabled but that one is for when we want unsubscribing to revoke access. the jobs are for the opposite direction so different [07:02] lifeless: Tarmac and BMQs are a compelling argument indeed. [07:09] wgrant: so which flag did you want me to use if you disagree with the one i chose. remember i just want something quick to stop the jobs running on prod [07:13] wallyworld: I'd probably just use disclosure.legacy_subscription_visibility.enabled. But I guess we use writable temporarily just to disable it, you're right. [07:13] i can clean up next branch [07:13] i just want to unblock deployment [07:13] which has been blocked for over a day :=( [07:14] wallyworld: I'm on a call right now, but is that all the callsites for both types of jobs? [07:15] wgrant: unless i missed anything but i double checked [07:16] there are 2 places in the service but the methods they are inside are protected [07:16] wallyworld: r=me, thanks. [07:16] thank you === al-maisan is now known as almaisan-away [09:04] wgrant: can you remind me tomorrow to send a summary to l-dev ? [09:06] lifeless: Sure. [09:06] also ahahaha https://lp-oops.canonical.com/oops.py/?oopsid=61493187d8286292a72f12956de8b3cb#longstatements [09:07] branch fti query strikes again [09:07] on +addseries [09:07] * czajkowski peers at wgrant are you doing stuff to lp atm [09:07] lifeless: Ew [09:07] https://github.com/cjdelisle/cjdns/blob/master/rfcs/Whitepaper.md [09:07] elmo: ^ may make you laugh, may make you cry [09:07] https://lp-oops.canonical.com/oops.py/?oopsid=61493187d8286292a72f12956de8b3cb am getting these while doing translations imports === almaisan-away is now known as al-maisan [10:22] hello [10:23] I'd like to QA https://bugs.launchpad.net/launchpad/+bug/1006295 [10:23] <_mup_> Bug #1006295: Archive's 'suppress_subscription_notifications' attribute is called 'commercial' in the database < https://launchpad.net/bugs/1006295 > [10:24] I *think* the right thing to do is to set the attribute on an archive on qastaging and then perhaps check that 'commercial' was set in the database [10:24] can someone confirm? [10:28] jml: I'd just check that you can set it and read it. [10:29] If it reads back correctly, it probably wrote to the database, and probably to the commercial column :) [10:29] ok. [10:29] I guess I'll just use one of my own crappy testing PPAs [10:35] Python sucks. [10:36] Let's rewrite everything in Clojure. [10:36] Good plan. [10:36] You know what else sucks? [10:36] transparent network operation syntax [10:40] Indeed [10:42] Hmm. [10:42] neither suppress_subscription_notifications nor commercial appear in the PPA dict for me (for a PPA I own) [10:43] jml: Are you sure you're using the right API version? [10:43] wgrant: no. [10:43] It's probably only exported in devel, not 1.0 [10:43] Hmm. [10:44] Launchpad.login_with('fooconsumer', 'qastaging', version='devel') [10:45] wgrant: thanks. [10:45] wgrant: hmm. no change. [10:52] jml: Perhaps you need to remove your WADL cache [10:52] In ~/.cache/launchpadlib or ~/.launchpadlib [10:53] wadl. cache. [10:53] * jml parties like it's 1999 [10:53] It's on https://api.qastaging.launchpad.net/devel/~wgrant/+archive/ppa, so the server knows about it... [10:53] Heh [10:56] HHmm. [10:57] getPPAByName doesn't work the way I think it should. [10:58] Or maybe createPPA doesn't. [10:58] jml: Are you calling lp.me.somemethod? [10:58] wgrant: yes. [10:58] That doesn't work [10:58] ffs [10:58] It'll just return the person instead. [10:58] thanks. [10:58] I'd noticed. [10:58] lp.people[lp.me.name].somemethod [10:58] will work [10:59] If you're not dead yet. [11:01] \o/ [11:01] wgrant: sanity check this script for me? [11:01] http://paste.ubuntu.com/1028403/ [11:01] output: http://paste.ubuntu.com/1028404/ [11:07] is there a way I can get an alert when a revno gets deployed? [11:09] jml: I can comment in the bug. [11:09] wgrant: thanks. [11:09] But probably in about 13 hours. [11:12] cool. === matsubara is now known as matsubara-lunch [11:35] wgrant: Did you see anything horrible happen with the GIN index on staging? [11:37] stub: It seems to not be broken. [11:37] Might do the rest of them then === rick_h changed the topic of #launchpad-dev to: http://dev.launchpad.net/ | On call reviewer: - | Firefighting: - | Critical bugs: 3.47*10^2 === matsubara-lunch is now known as matsubara [13:10] hello [13:10] can someone in ~launchpad please claim a number for me in lp:~launchpad/+junk/dbpatches [13:11] looking jml [13:12] rick_h: thank you. [13:12] jml: looks like I need a comment for it? [13:13] rick_h: Rename Archive.commercial to Archive.suppress_subscription_notifications (bug #1006295) [13:13] <_mup_> Bug #1006295: Archive's 'suppress_subscription_notifications' attribute is called 'commercial' in the database < https://launchpad.net/bugs/1006295 > [13:18] jml: ok, think I got that [13:19] rick_h: thanks. [13:22] I got a lot of spew when I ran 'make newsampledata': http://paste.ubuntu.com/1028563/ [13:23] mostly of the form, "NOTICE: there are circular foreign-key constraints among these table(s)" [13:23] is this my fault? [13:28] Also, there appear to be changes to ArchivePermission and SPPH after running 'make newsampledata'. I wasn't expecting those. Should I not be doing this from db-devel? [13:28] sorry jml, no idea there. Have yet to do a db patch myself. stub is the master, you know? === jcsackett changed the topic of #launchpad-dev to: http://dev.launchpad.net/ | On call reviewer: jcsackett | Firefighting: - | Critical bugs: 3.47*10^2 [13:31] oh hai jcsackett [13:32] morning, rick_h. [13:32] morning, -ops [13:32] * jcsackett idly wonders if the 1400 line diff in the MP queue is a harbinger of the day to come. [13:39] * jml sends an email [13:48] jml: You can ignore that I think. That make sampledata stuff is an old hack and has never been pretty. [15:02] sinzui: i need a refresher from last night. which of the many cards was the one wallyworld was looking at you suggested i try for today? my mind is sort of mush, evidently. [15:03] jcsackett, https://bugs.launchpad.net/launchpad/+bug/999596 [15:03] sinzui: ah, dig. yes, i should totally be able to fit that in today. [15:04] huh. looks like william is already doing it though. [15:04] jcsackett, I think the complication is that the vocabs and personset have competing implementation [15:05] jcsackett, that is my mistake. No one is working on it [15:05] sinzui: dig. i'll assign myself then. [15:06] oww, soyuz/doc/archive.txt makes me feel physically ill [15:06] 2762 lines of solid doctest [15:08] cjwatson, I bet half of it is tested in a unit test, but removing the duplicate parts topple the doctest [15:08] Bingo [15:09] And so it requires actual thought to dissect. Grr [15:12] * jml wants to take a swipe at it. [15:13] I'm at -253 on it so far [15:13] Though I strongly suspect there'll still be some left when I'm done [15:14] Could I get my merge proposal review? https://code.launchpad.net/~brian-murray/launchpad/bug-912137/+merge/109045 [15:15] bdmurray: i'm in the middle of running to somewhere that has better internet than my currently failing home spot. i'll check it as soon as i'm moved. [15:16] jcsackett: okay, thanks! === al-maisan is now known as almaisan-away [16:03] stub: https://code.launchpad.net/~jml/launchpad/db-rename-archive-commercial-to-suppress/+merge/109179 [16:06] jml: The horrible hack to allow both the old and new column name has landed? [16:06] stub: indeed it has. [16:06] stub: and appears to work. [16:06] I feel dirty [16:06] stub: it's not deployed yet. [16:08] r=stub, with a comment that the code needs to be deployed before the patch can go live. [16:08] Easiest way to guarantee that is to not land it until after deployment. [16:09] stub: that'll probably happen, since I need lifeless's patch before landing anyway, right? [16:09] jml: No, you only need one of our approvals. [16:11] stub: ah ok. I'll wait until after I hear about the deployment then. [16:11] That would be FDT tomorrow I guess [16:12] NDT, wouldn't it be? [16:14] er, yer [16:14] sorry, I'm not familiar with those acronyms. [16:14] fast downtime, no downtime [16:14] fastdowntime -> db deploy, nodowntime -> code deploy [16:14] oh right. sorry. [16:15] yeah, NDT [16:26] stub: oh, the patch number ends with -0. Is that a problem? [16:26] No problem. Numbers currently have no meaning besides ordering and uniqueness. [16:27] stub: oh, the patch number ends with -0. Is that a problem? [16:27] stub: ah ok. cool. [16:30] bdmurray: are you still around? took me a good bit longer to get setup in new location than i anticipated, but i've looked at your MP and have some comments/questions. [16:33] jcsackett: yes still here [16:34] bdmurray: awesome. so, your modification does change the sort order, but it has the side effect of putting any user that is subscribed via the "Subscribe someone else" button at the bottom of the list. I *think* this is probably why prepend was being used--so in long subscriber lists a user could still see the person they added was in fact added. [16:35] jcsackett: ah, how did you go about determining the side effect? [16:36] bdmurray: i just used the "subscribe someone else" button above the subscribers list. given the change was commented as "add user to start of list" i wondered if that wasn't intentional. [16:37] jcsackett: oh right, running it makes sense. Do you any suggestions are where to go from here? [16:39] bdmurray: i do. i think you can probably update addSubscriber to take an argument named, say "add_new" that tells addSubscriber whether it's adding something being loaded from a list, and should be appended, or is adding a brand new person from the UI, and should be prepended. [16:40] you could default that to 'false' and then just update the call that's bound to the "Subscribe someone else" button to set it to true. [16:40] jcsackett: okay, thanks I'll have a go at it in a bit [16:40] bdmurray: awesome. i'll update your MP with these notes. ping me if you run into any problems--i'm happy to help. :-) === salgado is now known as salgado-lunch [17:21] james_w: I've ec2 landed your branch [17:21] thanks [17:21] I hope it stays landed === matsubara is now known as matsubara-afk [18:17] jcsackett, do you have time to review https://code.launchpad.net/~sinzui/launchpad/unlock-sprite/+merge/109206 [18:17] sinzui: i just opened the MP, actually. :-) [18:17] sorry about the svg [18:21] no worries. [18:23] sinzui: r=me. looks good, thanks. :-) [18:23] fab [18:24] I forget what is username / password for launchpad.dev? [18:32] jcsackett: ^? [18:35] bdmurray: you can use mark@example.com with test [19:09] jcsackett: I've updated my branch [19:11] * jcsackett looks [19:22] bdmurray: r=me. do you have landing rights, or do you need an assist? [19:23] jcsackett: its been a long time, so I could use some handholding landing it. I mean I'd like to see if I still can. [19:29] bdmurray: dig. well, first off, are you set up for ec2 test/land? (https://dev.launchpad.net/EC2Test) [19:44] jcsackett: yes, I should be set what is the proper comamnd to test and land? [19:47] bdmurray: If lp-dev-utils is on your path you just use "ec2 land". [19:51] bdmurray, that would be "ec2 land https://code.launchpad.net/~brian-murray/launchpad/bug-912137/+merge/109045" [19:53] jcsackett, are you available for a pre-imp talk. I am trying to teach Lp that projects can go uncommercial [19:53] I am actually in a coffee shop since wifi died at home. I don't think I could hear you over background noise. [19:54] I am told wifi should be restored in about an hour? [19:54] Well, Internet, not wifi. [19:54] okay [19:58] tests are faster now right? [19:59] bdmurray, yui tests are, the suite itself takes 6 hours and must be run on ec2, the buildbot twice [19:59] bdmurray, expect a day for it to arrive on qastaging [20:00] * sinzui looks at diff [20:01] bdmurray, I suggest an alternate plan since you fixed a js-only issue [20:01] bdmurray, run ./bin/test -vvc --layer=YUI [20:02] if that layer passes, we can submit your branch directly to PQM [20:03] sinzui: I'm not in a hurry and want to make sure my ec2 setup is good so I think I'll let it run [20:03] okay [21:01] sinzui: i am home, and i appear to have full connectivity. do you still want to chat, or have you moved on? [21:01] oh, fab, yes lets talk [21:04] sinzui: i've started a hangout. [21:04] okay === salgado is now known as salgado-afk === jcsackett changed the topic of #launchpad-dev to: http://dev.launchpad.net/ | On call reviewer: - | Firefighting: - | Critical bugs: 3.47*10^2