/srv/irclogs.ubuntu.com/2015/01/11/#launchpad.txt

slacknerwgrant: was just trying to fix some build/dependency issues, and do some testing builds, but now i get "You have exceeded today's quota for ubuntu trusty, ubuntu precise." - https://code.launchpad.net/~pipelight/+recipe/wine-compholio-daily12:48
slacknerwgrant: is it possible to reset that quota? we can't really wait 24 hours until we fix that ^^12:48
slacknerwgrant: ah, when one of the other devs pushes it, it still works - so everything fine, we have at least a workaround ;)12:53
tgm4883Shouldn't the members of the team that is marked as "bug supervisor" of a project be able to see bugs against a project that are set as private?22:58
wgranttgm4883: No. Those bugs need to be shared with them through the project's +sharing page, or they must be subscribed to the specific bug.23:09
wgranttgm4883: Tying bug edit permissions to bug view permissions is too inflexible.23:09
tgm4883hmm23:09
tgm4883wgrant: how does the initial set of users get view access to it then?23:09
wgranttgm4883: Which initial set of users?23:09
tgm4883wgrant: like me, how did I get the initial access to view the private bug?23:10
tgm4883for instance https://bugs.launchpad.net/ubuntu/+source/mythtv/+bug/76387223:10
ubot5Error: launchpad bug 763872 not found23:10
wgranttgm4883: Did you file the private bug?23:10
tgm4883nope23:10
wgrant~ubuntu-crashes-universe is subscribed.23:10
wgrantYou must be a member of that team.23:10
tgm4883probably indirectly23:11
stuartmwell that would be amusing, private bugs can only be viewed by those who submitted them, not those in a position to actually fix them23:11
wgrantSure.23:11
wgrantBut Ubuntu's bug supervisor team is huge.23:11
wgrantWe don't want to trust random bug triagers with access to all the private bugs...23:11
tgm4883wgrant: out of curiosity, I don't suppose ~ubuntu-crashes-universe also grants access to errors.ubuntu.com23:12
wgranttgm4883: I don't think so, but that's not a system I have any significant experience with.23:12
wgrantThe team was initially created so ~ubuntu-dev could have access to semi-sanitised apport crashes.23:12
stuartmtgm4883: is there actually any sensitive info in the bug report? Apart from SD credentials I can't think of anything which could be considered that sensitive23:13
tgm4883ok, well at least we know how it works now.23:13
stuartmwell not unless the user was browsing their porn collection when it crashed23:13
tgm4883stuartm: no I don't believe so23:13
tgm4883wgrant is there anything that automatically marks it as private, or is that the user doing it?23:13
wgranttgm4883: Crashes are always private by default, as they contain core dumps.23:13
wgrantApport will then retrace and remove the core dump, then subscribe ~ubuntu-crashes-universe.23:14
tgm4883ah, so as long as the core dump doesn't contain private data, we should be able to safely change it to public?23:14
wgrantIt remains private, as the stacktrace may still contain sensitive information.23:14
wgrantRevealing coredumps publicly is never a good idea, but stack traces can be safe if verified.23:14
wgrantIn this case the expanded variables etc. don't appear to contain passwords or anything, so it's probably safe to make it public.23:15
tgm4883ok (I know almost nothing of what exists in the core dumps)23:15

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!