/srv/irclogs.ubuntu.com/2015/07/07/#ubuntu-meeting-2.txt

=== markthomas|away is now known as markthomas
=== markthomas is now known as markthomas|away
* slangasek waves15:59
mdeslaurhi!16:00
pitti\o16:00
=== markthomas|away is now known as markthomas
slangasek#startmeeting16:01
meetingologyMeeting started Tue Jul  7 16:01:19 2015 UTC.  The chair is slangasek. Information about MeetBot at http://wiki.ubuntu.com/meetingology.16:01
meetingologyAvailable commands: action commands idea info link nick16:01
slangasek[TOPIC] Apologies16:01
slangasekno apologies sent on the list16:01
slangasekkees, infinity appear to be absent16:01
slangasekbut we nevertheless have a quorum, so carrying on :)16:02
slangasek[TOPIC] Action review16:02
slangasekACTION: slangasek to forward complaint to Canonical legal16:02
slangasekcarried over, again16:02
slangasekagain, if anyone felt strongly about stealing this from me I wouldn't stand in their way, otherwise I'll keep it on my todo16:02
pittiFTR, stgraber is on holidays?16:03
stgraberno I'm not :)16:03
mdeslaurhe just wishes :)16:04
stgraber:)16:04
slangaseknope, we're all still working, no matter how much our brains are overheating in this weather ;)16:04
slangasek[TOPIC] Mailing list archive16:05
slangasekthere was a mail from apw this morning, which I just saw in the queue and approved through16:05
slangasekI'm guessing most people haven't read it yet16:05
pittiah, I already wondered16:05
slangasekSubject: Ubuntu Fan Updates for Trusty and Vivid16:05
pittiI quickly read through it, but I'm not entirely sure about the impact yet16:05
mdeslaurI skimmed it, but I'd have to look at the patch to form an opinion16:06
slangasekfor those who don't know, Ubuntu Fan is a clever stateless network multiplexer16:06
slangasekit's a useful feature to have on cloud instances running containers16:06
slangasekapw had approached me and asked me if it was SRUable16:06
pittiit sounds similar to IPv4LL and NAT, and all the other crazy things people do to avoid IPv6 :)16:06
slangasekand I expressed concern that this doesn't really fit our existing SRU policy, so should be discussed at a higher level16:07
pittibut AFAIUI this is mostly a new feature, ignoring some undocumented preview that was already in the trusty kernel16:07
slangasekvivid kernel16:07
pittii. e. the regression potential is that someone made use of that in trusty, and it's going to change/break?16:07
pittiah16:07
pittiso for trusty this is entirely new16:07
slangasekyes, the risk of regression potential is fairly low because it's a new feature16:07
stgrabermy main concern is the changes to iproute2 and other core bits to support the feature16:08
mdeslauris this upstream yet? what are the odds that it gets changed in an incompatible way while going upstream?16:08
slangasekhowever, the SRU policy has always been rather clear that new features don't belong in SRUs - with the exception of hardware enablement16:08
pittiyeah, that's my main gripe with it -- there's no indication of whether this has ever been reviewed by kernel developers, or proposed for inclusion16:08
slangasekwe've moved the line a few times wrt hardware enablement, to accomodate cloud substrate requirements16:08
stgraberso last I heard, it's not upstream and we're not actively pushing for it to be upstreamed in its current shape, it also uses kernel identifiers for the tunnel type which may potentially be used by another in-kernel tunneling technology at some point, causing a clash16:09
slangasekbut I don't think I can justify this under the current SRU policy, so I think there's a higher-level policy discussion to be had rather than just making exceptions16:09
pitti(wrt. security/quality review, and general sanity)16:09
pittiso while from a regresssion potential POV this seems manageable (assuming that iproute2 only gets new features, and no changed behaviour)16:10
stgraberso basically from my point of view: 1) ubuntu-fan package itself is fine and safe 2) changes to iproute2 may be risky 3) in-kernel non-upstream tunnel technology when needing unique IDs for netlink is a risk too16:10
pittiit feels like exposing millions of LTS users with a brand new and largely unreviewed kernel feature that will be exposed to the network is a bit premature16:10
slangasekso, I'd appreciate it if we could separate our SRU team hats from our TB hats here, difficult as that is :)16:11
pittisure; this is all TB anyway, as it's clearly outside of SRU policy16:11
slangasekwhen I asked apw to refer it to the TB, it wasn't because I wanted the TB to analyze the risks of this specific SRU16:12
slangasekbut to discuss whether the SRU policy should, or should not, allow for updates such as this16:12
stgraberah, simple answer then, it shouldn't16:12
pittipersonally I would never like to give out a blanket permit for things like this16:12
slangasekpitti: well, I have the opposite response: that we shouldn't give /exceptions/ for things like this :)16:13
pittieven with this concrete case I have some serious concerns, I don't see how to allow even more general cases16:13
stgraberbackporting of a new major feature into a LTS release is very clearly out of scope for the normal SRU process and as it's not something I want to see abused, I don't believe it makes sense to have the SRU policy allow this16:13
pittislangasek: that'ss a good point from the POV that general written-down policy is better than arbitrary exceptions that are handed to whoever shouts the loudest16:14
slangasekif it's justifiable in the specific case (which it may not be), I think that we should address that in the SRU policy.  The SRU policy currently says we don't allow new features in, this is a new feature: is the policy wrong, or is the SRU proposal one we should reject16:14
slangasekso I'd say that taking the pulse here suggests that we don't want this SRU16:16
pittihm, so we could imagine how the fan proposal would have to look like in order for us to consider it acceptable16:16
stgraberdo we really need to update the SRU policy to say that the TB can overule? to me it seems like its stating the obvious...16:16
pittiand then generalize that?16:16
slangasekshall we follow up on the mailing list?16:16
slangasekstgraber: uh?  I'm in no way talking about codifying "the TB can overrule"16:16
mdeslaurThere is a lot of potential for abuse in letting new features in. Is having the power to rule on new features something the SRU team in interested in?16:17
slangasekspeaking only for myself as an SRU team member: no16:18
pittiwith my former SRU hat on: I wouldn't be16:18
slangasekbecause having the power to rule on it means we'll be constantly asked to rule on it16:18
stgraberso my point of view, is keep the SRU policy as is, no new features and have the SRU team reject anything that's a new feature. None of that prevents escalation through the TB for a specific exception as seems to be the case here.16:18
pittiprocessing SRUs is enough work without having to argue about new features all the time16:19
pittiI'd actually be okay with new features in LTSes under reasonable circumstances; we do it all the time already, after all16:19
pitti(new landscape or maas versions, etc.)16:19
slangasekstgraber: I would not be happy with the TB ever signing off on a specific exception to the new feature rule without being able to articulate a general principle16:19
pittibut they should have a reasonably low potential for introducing new bugs and security holes, which this particular proposal totally fails at16:20
pittiright -- e. g. for the HW enablement we have a generic justification in the policy16:20
pittiso if/once we agree to this particular proposal, we could then generalize it and see on which grounds we accept it16:21
slangasekfwiw my risk analysis of this particular SRU differs from yours - it's already in the vivid kernel, the vivid kernel will land in trusty as part of the hwe process, new kernels have a huge attack surface anyway for security holes and we have a kernel update cadence to deal with that16:22
stgraberyeah, the kernel side isn't a big concern of mine because we don't force those on our existing users16:23
slangasekI also think the SRU process is adequate for dealing with the risks of regression, and doesn't need direct TB involvement16:23
stgraberiproute2 however is a bit more problematic16:23
slangasekanyway, so far I'm hearing a pretty firm "no" - so I think the next steps are to take that back to the mailing list?16:24
pittiwell, we wouldn't push/force it into trusty unless we were planning to actually use that feature, no?16:24
pittii. e. in some cloud workload via iproute2?16:24
stgraberwell, the feature can be used by anyone, cloud or not, it just shows up as a bridge that you can use with docker, lxc, lxd, ...16:25
pittiright, the normal kernel backporting process kind of gets us that through the backdoor, but it would be inert without userspace changes16:25
pittiso it's much less adding the new kernel feature, but rather making use of that by our default tools16:25
stgraberright, you need the ubuntu-fan package and tools to talk to iproute2 to talk to the new kernel netlink interface16:25
slangasekbut it's also not as if this is going to be activated on existing systems automatically; someone has to invoke it to make use of it16:26
pittiin general I don't want to respond to these kinds of requests with a plain "no" (as there's usually a good use case behind it), but more with a "how"16:26
pittislangasek: it's not? that's not at all clear to me16:26
stgraberyeah, as I said, I'm not too concerned about the kernel side of it. What I'm concerned with is modifying iproute216:27
stgraberbecause if iproute2 breaks somehow, that means no network on the affected machine and that's kinda bad16:27
mdeslaurpart of the issue here is this seems to be an ubuntu-specific feature16:27
pittislangasek: it's very easy to accidentally or deliberately enable it on upgrades16:27
slangasekpitti: it certainly is not, it's a completely new bridge type16:27
mdeslaurit's not as if it's a backport of something present in a new version16:27
slangasekmdeslaur: it's a backport of something present in a new version of the package in Ubuntu.  I'm not sure from a policy perspective (as opposed to a risk analysis perspective) that we should distinguish between Ubuntu-specific vs. not16:29
pittiright, "ubuntu specific" doesn't belong into SRU policy, that should be general development policy16:29
pitti(FWIW, I really don't like having this in vivid either)16:29
mdeslaurslangasek: policy no, but it certainly has an impact on the risk. Even more so if there actually are plans to get it upstream and that turns into a compatibility nightmare for users.16:30
pittiso assuming it *was* a properly reviewed feature in vivid's kernel, I wouldn't have a problem with letting this migrate to trusty as well via the normal backport process16:31
pittithe "change userspace to make use of it" is what I'd like to understand more, as right now it sounds awfully dangerous16:31
pittiso the "how to make this palatable" would include an upstream review, plus a more detailled description of the current and planned userspace changes to iproute and other tools, and a regression potential analysis16:32
pittiall of which is really unrelated to SRUing this to trusty, but should retroactively be done for vivid too16:33
slangasekall of that still doesn't pass the SRU policy as it stands, and only supports making an exception?16:34
slangasekI'm against making an exception16:35
pittias for the SRU policy, I think we can make an amendment for backporting features from stable releases to LTSes which have a negligible regression potential16:35
pittiit shoudl still be ack'ed individually IMHO, but it would be a guideline what the TB would look at16:35
pitti(TBH I have a bigger problem with the feature itself than with backporting it)16:36
slangasekok; so you think that at least potentially this is something that we would want codified in the SRU policy as allowable16:38
pittiyes, I do16:38
mdeslaurpitti: acked by who, the SRU team or the tech board?16:38
pittipitti | hm, so we could imagine how the fan proposal would have to look like in order for us to consider it acceptable16:38
pittipitti | and then generalize that?16:38
slangasekI agree, though I'm not yet sure what shape it should take16:38
pittimdeslaur: my feeling is "TB" at least initially16:39
mdeslaurok16:39
slangasekbut I think we're racking up exceptions at this point (maas, juju, proposal for fan) and we should consider whether the current SRU rules are still meeting their purpose16:39
pittithis shouldn't be a "toss over the fence" kind of thing, but similar to preliminary MREs16:39
pittislangasek: right, that's a good point; now that we do have a lot of MREs we have some experience when we allowed them16:40
slangaseknot just MREs :)16:40
pittiand most of the time the "interview" looked fairly similar: automatic/manual test plans and QA procedures, how to ensure that upgrades don't break, regression potential analysis16:40
slangasek[ACTION] slangasek to document maas, juju, docker exceptions on https://wiki.ubuntu.com/StableReleaseUpdates#Special_Cases16:41
meetingologyACTION: slangasek to document maas, juju, docker exceptions on https://wiki.ubuntu.com/StableReleaseUpdates#Special_Cases16:41
pittislangasek: juju is on https://wiki.ubuntu.com/StableReleaseUpdates/MicroReleaseExceptions16:41
slangasekpitti: yes, but it's not actually an MRE so I'm going to move it :)16:42
pittimaas was proposed, but never got signed off because the interview wasn't finished16:42
pittislangasek: ack16:42
pittislangasek: I'm happy to look at our existing MacroReleaseExceptions and come up with a proposal for a policy amendment for next time16:42
slangasekso - next steps?  should we evolve this on the mailing list?16:43
pittias I usually responded to the bulk of MRE requests on the ML anyway16:43
pittiI think there's two steps:16:43
pitti1) amend the policy for new features in LTS (as that's clearly a direction we've gone in in the past years)16:43
pitti2) respond to that concrete case with our gripes and request for more information about them16:44
slangasekpitti: do you want to drive #1?16:44
pittislangasek: yes16:44
mdeslaurpitti: that sounds reasonable16:44
slangasek[ACTION] pitti to propose amendment to general SRU policy for new features in LTS16:44
meetingologyACTION: pitti to propose amendment to general SRU policy for new features in LTS16:44
slangasek[ACTION] all to respond to the Ubuntu Fan SRU proposal on list16:45
meetingologyACTION: all to respond to the Ubuntu Fan SRU proposal on list16:45
slangasek[TOPIC] community bugs16:46
slangasekhttps://bugs.launchpad.net/ubuntu-community/+bugs?field.assignee=techboard16:46
slangasekempty16:46
slangasek[TOPIC] Select a chair for the next meeting16:46
slangasekI believe that's stgraber, with infinity as backup, yes?16:46
stgraberyep16:47
slangasek[INFO] Next meeting 2015-07-21, 17:00 London time.  Chair: stgraber (next: infinity)16:47
slangasekanything else that I've missed?16:48
pittinice to have a "real" meeting for a change :)16:49
mdeslaurhehe, yes :)16:49
pittinothing else from me16:49
slangasek:)16:49
slangasek#endmeeting16:49
meetingologyMeeting ended Tue Jul  7 16:49:58 2015 UTC.16:49
meetingologyMinutes:        http://ubottu.com/meetingology/logs/ubuntu-meeting-2/2015/ubuntu-meeting-2.2015-07-07-16.01.moin.txt16:49
slangasekthanks, all!16:50
mdeslaurthanks slangasek, thanks all16:50
pittithanks everyone16:50
stgraberthanks16:50
pittiet bonne nuit !16:50
stgraber:)16:51
=== markthomas is now known as markthomas|away
=== markthomas|away is now known as markthomas

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!