=== King_InuYasha is now known as Son_Goku === marcusto_ is now known as marcustomlinson === zigo is now known as Guest24756 === Guest24756 is now known as zigo [09:55] I'm seeing (Python) socket.getaddrinfo calls which are unsuccessful (i.e. "socket.gaierror: [Errno -2] Name or service not known") take 25 seconds during boot (in cloud-init), where successful ones are near-instantaneous. I'm not really sure how to proceed in working out what's going on; does anyone have any ideas? [09:55] (More details of my investigation in https://bugs.launchpad.net/ubuntu/+source/cloud-init/+bug/1629797) [09:55] Launchpad bug 1629797 in cloud-init (Ubuntu) "cloud-init seems to take most of yakkety slow boot time" [Undecided,New] [10:33] Odd_Bloke: any network interfaces configured at that point? [10:34] Odd_Bloke: I wonder if the host is dropping DNS requests where on other hosts a "address unreachable" is returned immediately. [10:35] In which case perhaps the default or configured nameservers are wrong. [10:40] rbasak: So my assumption is that networking setup is somewhat sensible, because a successful query immediately after a failed one behaves as expected. [10:40] rbasak: How can I check what's configured? Is /etc/resolv.conf canonical? [10:42] Odd_Bloke: it's only roughly canonical. It might point to 127.0.0.1 or something, stuff may not use it (Python is likely to use it though) and processes have to explicitly reload after it changes (unless that has changed in the last few years). [10:43] Odd_Bloke: could you perhaps arrange for a tcpdump to be running in the background from an early boot command? Not sure how that could hook in before an interface is up though. [10:48] OK, so it looks like 127.0.0.53 is not in resolv.conf when this resolution is happening: http://paste.ubuntu.com/23269725/ [10:48] (127.0.0.53 being systemd-resolved) [10:52] And a `systemd-analyze plot` does show systemd-resolved coming up after cloud-init completes; let's see if I can change that. [11:02] Is that the real root cause though? [11:03] If it is 169.254.169.254 timing out, then why is that there? [11:03] @pilot in === udevbot_ changed the topic of #ubuntu-devel to: Yakkety Yak (16.10) Final Beta! | Archive: feature freeze | Devel of Ubuntu (not support or app devel) | build failures: http://qa.ubuntuwire.com/ftbfs/ | #ubuntu for support and discussion of precise-xenial | #ubuntu-app-devel for app development on Ubuntu http://wiki.ubuntu.com/UbuntuDevelopment | reverse-depends/seeded-in-ubuntu broken? http://ubuntuqa.tblwd.org/ | Patch Pilots: Laney [11:03] * Laney quivers at the queue [11:06] rbasak: 169.254.169.254 is the metadata service in EC2 and GCE; that's returned by the DHCP server on GCE where I'm testing. [11:07] @pilot out === udevbot_ changed the topic of #ubuntu-devel to: Yakkety Yak (16.10) Final Beta! | Archive: feature freeze | Devel of Ubuntu (not support or app devel) | build failures: http://qa.ubuntuwire.com/ftbfs/ | #ubuntu for support and discussion of precise-xenial | #ubuntu-app-devel for app development on Ubuntu http://wiki.ubuntu.com/UbuntuDevelopment | reverse-depends/seeded-in-ubuntu broken? http://ubuntuqa.tblwd.org/ | Patch Pilots: [11:07] will do that in a minute... [11:07] argh I missed a pilot /o\ [11:07] Checking what I see in resolv.conf on xenial (where this problem is not exhibited). [11:08] Laney: you still around? can you still sponsor something? [11:08] Odd_Bloke: OK, but either GCE should be responding to *all* DNS queries to that address promptly, or cloud-init and/or cloud images should not be configuring the system to send *all* DNS queries there, or cloud-init should arrange not to send generic DNS queries that will timeout there and also make sure the system also does not do so. [11:08] tsimonq2: 03/10 12:07:18 will do that in a minute... [11:08] Laney: oh that's what you meant, ok sorry [11:09] Odd_Bloke: relying on systemd-resolved sounds like a crutch to me. [11:09] rbasak: So my hypothesis is that maybe on xenial DNS is configured system-wide to fail fast but on yakkety the assumption is that systemd-resolved will always be there, and systemd-resolved is configured to fail fast. [11:09] Odd_Bloke: sure, I agree that sounds likely. I'm just saying that it doesn't sound like the root cause. [11:11] So I see just 169.254.169.254 in resolv.conf on xenial, where we don't have this issue. [11:17] I'm not able to easily check that changing the ordering fixes the issue, because having cloud-init After systemd-resolved causes a dependency cycle. [11:19] I would treat systemd-resolved as a red herring, and focus on finding out what DNS queries are timing out, why they are timing out, why the system is configured to make the queries even though they will time out, and how to get them to not time out despite or regardless of systemd-resolved. [11:21] Yeah, 127.0.0.53 is after 169.254.169.254 in /etc/resolv.conf, so I think I'm actually seeing fast failures from the same DNS server that seems to be giving slow ones during boot. === hikiko is now known as hikiko|ln [11:32] ok [11:32] tsimonq2: go go go [11:32] @pilot in === udevbot_ changed the topic of #ubuntu-devel to: Yakkety Yak (16.10) Final Beta! | Archive: feature freeze | Devel of Ubuntu (not support or app devel) | build failures: http://qa.ubuntuwire.com/ftbfs/ | #ubuntu for support and discussion of precise-xenial | #ubuntu-app-devel for app development on Ubuntu http://wiki.ubuntu.com/UbuntuDevelopment | reverse-depends/seeded-in-ubuntu broken? http://ubuntuqa.tblwd.org/ | Patch Pilots: Laney [11:39] Laney: https://bugs.launchpad.net/ubuntu/+source/hardinfo/+bug/1629601 [11:39] Launchpad bug 1629601 in hardinfo (Ubuntu) "FTBFS due to build flags introduced in vivid" [High,In progress] [11:39] that [11:39] the only FTBFS left in the lubuntu packageset [11:39] I have to go, be back in a few hours o/ [11:44] rbasak: http://paste.ubuntu.com/23269859/ is the diff of nsswitch.conf between xenial and yakkety; it introduces "resolve" for hosts, which is provided by libnss-resolve: "nss module to resolve names via systemd-resolved". Removing "resolve" fixes the boot time issue. \o/ [11:47] Hmm, there's a new systemd package with changes to do with nss-resolve; let's see if that fixes this. [11:53] tsimonq2: that looks weird, but maybe? [11:53] xnox: you had your fingerprints on that one ^, want to sponsor? [11:54] Laney: Martin Pitt was gonna sponsor, but it seems he didn't get the time [11:55] including him, there's a total of three acks [11:55] it's just that nobody uploaded [11:55] :) [11:57] if somebody could just upload already... ;) [11:57] just avoiding having to review it if someone else has :P [11:57] if I have to I'll look [11:57] well it has been reviewed [11:58] not my changelog entry though :P [12:00] ok I really have to go [12:00] o/ [12:09] pitti: https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1629797 is severely affecting boot time of all cloud instances; would you be able to take a look (at least to confirm that my root-causing is correct)? [12:09] Launchpad bug 1629797 in systemd (Ubuntu) "resolve service in nsswitch.conf adds 25 seconds to failed lookups before systemd-resolved is up" [Undecided,New] === hikiko|ln is now known as hikiko [12:33] Odd_Bloke: I still have the same opinion. That's not the root cause. The root cause is the *reason* the DNS requests are timing out, not that switching to systemd-resolved exposes it. [12:34] Ah [12:35] You might be saying that DNS requests aren't actually going out, because systemd-resolved is unavailable? [12:35] jbicha: are you handling https://bugs.launchpad.net/ubuntu/+source/software-center/+bug/899878 ? [12:35] Launchpad bug 899878 in software-center (Ubuntu Trusty) "Software center have hardcoded colors and shows white font on white bg" [Low,In progress] [12:35] In that case, yes, I guess that cloud-init needs to interact with nsswitch/systemd-resolved somehow to arrange for its queries to work. [12:36] Laney: yes [12:37] jbicha: ok, thanks, will unsubscribe sponsors then [12:37] ok [12:37] done [12:47] rbasak: I think they're going out, but after the resolve service has spent a while waiting for resolved to appear (or something like that). [12:54] Odd_Bloke: ironic given that one of the benefits of systemd-resolved is to consolidate timeouts! [13:10] ^_^ === _salem is now known as salem_ [13:27] hi everyone, since the last member with upload rights left us a bit impromptu, ubuntu studio has been struggling with this FFe/UIFe https://bugs.launchpad.net/ubuntustudio/+bug/1624690 [13:27] Launchpad bug 1624690 in ubuntustudio-lightdm-theme (Ubuntu) "[UIFe/FFe] Please upload ubuntustudio-default-settings" [Undecided,New] [13:28] now we finaly have all the pieces required, and i am wondering if anyone here could help us get this through before RC.. [13:31] cjwatson: pitti: I am at a loss to understand how the open-iscsi test that is failing ever worked... [13:32] as best I can tell, it tries to install a deb that never gets built [13:33] Pass, I think that postdates my fiddling with it [13:34] wondering if you could throw the current xenial bits against an autopkgtest clone? (as opposed to -proposed) [13:42] cjwatson: ISTR that in the past when we've needed a new kernel module in builders we've had to ask for it (because we can't modprobe). Am I remembering correctly? [13:43] Odd_Bloke: Correct, that's quite a complicated thing to do. What's the requirement. [13:43] ? [13:43] cjwatson: overlayfs. [13:43] We do it in lp:~canonical-sysadmins/canonical-is-charms/launchpad-buildd-image-modifier [13:44] I think. [13:44] Do you remember what the last one was? [13:45] Oh no, I remember, we do it in lp:launchpad-buildd. [13:45] Hackily. [13:46] Feel free to propose a merge against that (debian/launchpad-buildd.init) and we can discuss it. [13:46] cjwatson: Will do; thanks! [13:49] hello there [13:53] I'm on concern of https://bugs.launchpad.net/ubuntu/+source/openbox/+bug/1336521 - how to solve problem for users of Trusty and Xenial? I understand, next release could receive a fix soon, but many users use LTS releases, and that bug is important usability bug. [13:53] Launchpad bug 1336521 in pcmanfm (Ubuntu) "Application Startup Notify fully ignored" [Undecided,Confirmed] [14:01] stokachu: I've been asked to help you out with some upcoming Juju-related uploads. What do you need, exactly? [14:03] rbasak: nothing at this moment [14:03] waiting to hear back from juju qa [14:04] stokachu: ah, OK. I'll wait for a ping from you then - thanks. [14:04] thanks, you should also have a email i cc'd you on [14:05] Received, thanks. That was helpful in giving me the background but it wasn't clear to me if that implied that I was supposed to do something or not. Thank you for clarifying :) [14:05] :) np [14:16] doko_, hey. Can you tell me if this is in good enough state to be reviewed... https://bugs.launchpad.net/ubuntu-terminal-app/+bug/1625074 If not, I will chase people to get whatever is needed done [14:16] Launchpad bug 1625074 in ubuntu-terminal-app (Ubuntu) "[MIR] ubuntu-terminal-app" [High,Incomplete] [15:05] rbasak: referring to recent juju email, is it better to wait for yakkety (or newer) to contain the proper logic for handling 32bit packages in xenial? or since its a packaging issue we can upload yakkety as is and handle the logic in xenial seperately? [15:14] stokachu: that's probably a question for the SRU team member who'll be accepting this into Xenial. AIUI, the usual "must be in the development release first" requirement is solely to prevent future user-visible regressions on release upgrades. I'm not sure I follow whether that rationale would be impacted in this case. [15:14] @pilot out === udevbot_ changed the topic of #ubuntu-devel to: Yakkety Yak (16.10) Final Beta! | Archive: feature freeze | Devel of Ubuntu (not support or app devel) | build failures: http://qa.ubuntuwire.com/ftbfs/ | #ubuntu for support and discussion of precise-xenial | #ubuntu-app-devel for app development on Ubuntu http://wiki.ubuntu.com/UbuntuDevelopment | reverse-depends/seeded-in-ubuntu broken? http://ubuntuqa.tblwd.org/ | Patch Pilots: [15:19] rbasak: yea im not sure either, but if it was me I would want it in yakkety before pulling it into xenial [15:20] slangasek: question for you when you're available [15:20] stokachu: hullo [15:21] slangasek: o/, so background: juju is dropping 32bit support in yakkety which they want to also drop in xenial [15:21] stokachu: I don't care about having the juju 32-bit-package-removal package glue in yakkety, provided this gets done before yakkety release [15:21] do i ask that they put that xenial logic in yakkety berore uploading? [15:21] and provided you think the SRU process gives you adequate testing [15:22] slangasek: for me I would feel better that they glue was in there before I do another upload to yakkety [15:22] i'd like to have all the unknowns worked out without having to do multiple yakkety uploads [15:22] stokachu: well, for yakkety you can just drop the 32-bit builds completely [15:23] and it's appropriate to then have them added to the 'obsolete packages' list in update-manager so that do-release-upgrade will remove them for you on upgrade to yakkety, just in case [15:24] ok [15:26] so they've completed the dropping of 32bit packages, ill make sure it gets added to obsolte packages in update-manager [15:26] then work with them to handle the logic in xenial === mfisch` is now known as mfisch === mfisch is now known as Guest7223 === Guest7223 is now known as mfisch [16:35] rbasak: i had an idea this morning for how to integrate MRs into the git workflow -- if you're around, I'd like to bounce them off of you [16:59] jgrimm: fyi, now that python-oslo.privsep's MIR has been approved (LP: #1616764), cinder, nova, nova-lxd should all migrate and drop off the ftbfs list [16:59] Launchpad bug 1616764 in python-oslo.privsep (Ubuntu) "[MIR] python-oslo.privsep" [High,Fix committed] https://launchpad.net/bugs/1616764 [16:59] nacc, cool cool [16:59] coreycb: i assume you saw that python-taskflow grew a (new?) dep on python-pydotplus which is in universe? [16:59] coreycb: so it's stuck in -proposed [17:00] nacc, I'll take a look, thanks :) [17:00] coreycb: thanks! [17:01] nacc, I was going to take a pass through our stuck in proposed today anyway, so off I go to do that [17:01] coreycb: 2x thanks then :) [17:01] :) [18:34] xnox, have any tips for getting an s390 machine to test out autopkgtest changes? [19:06] coreycb: cpaelzer may be able to help, when he's back online, too [19:06] jgrimm: --^ [19:22] nacc, thanks that would be great === 7ITAAO17J is now known as pfsmorigo [20:07] coreycb: let me look if it's documented anywhere [20:10] nacc, thanks, and if not, I can follow up tomorrow [20:12] powersj: --^ or maybe you know? [20:22] On today's (and previous) daily images I'm running into an infinite loop with glxinfo such that no desktop shows on login. Which package should I report this against so it has a fighting chance of being fixed by release? [20:38] ngaio: final freeze is in two days, so unless you have a patch already, i wouldn't get hopes too high of it being fixed [20:39] ngaio: but probably should be filed against whatever package provides glxinfo, or your drivers. [20:42] coreycb, if you are a coredev go to https://bileto.ubuntu.com/ create a ppa, upload, and it will be built & tested on s390x. [20:42] coreycb, or open a bugreport with debdiffs/things to look into [20:42] xnox: hmm, that seems like the wrong acl, nah? should be open to all ubuntu-dev, not just core-dev :) [20:43] dobey, running an Nvidia Quadro 1000M here (2011 era), and given it's from the live CD it must be using the free drivers [20:43] dobey, so you suggest I file it against nouveau? [20:47] slangasek, enoclue. I think any can create the ppa, but a core-dev is needed to dput in any _source.changes. [20:47] ngaio: sounds reasonable, yes [20:47] slangasek, if building from "source packages" rather than branches. [20:47] but maybe that has been changed. [20:47] dobey, thank you [20:48] xnox: doesn't need to be a coredev, but it's currently only coredevs and trainguards that can upload directly to silo PPAs [20:48] ack. [20:49] coreycb, i'm happy to sponsor things into a silo =) [20:49] and you need to be in some other group to create requests on bileto [20:50] dobey: xnox: core dev can do anything [20:52] xnox: ahh right, hmm I wonder if all of ubuntu-dev should be allowed there or not... probably so but we might have to check for assumptions [20:53] slangasek, not until launchpad ppa copies with new binaries end up in new queue..... [20:53] xnox: right, that [20:53] robru: right; was just clarifying that it's not only core devs that can do what was requested. [20:53] slangasek: also not until we get some kind of ACLs to that tickets aren't world-writable [20:53] xnox: otoh new binaries == packaging diff; the acl for upload to ppa doesn't have to match the acl for publishing [20:53] robru: I don't see a clear reason why we should trust ubuntu-core-dev with write access to tickets, but not ubuntu-dev? [20:54] slangasek: because ubuntu-dev is an order of magnitude larger than ubuntu-core-dev? (isn't it?) [20:54] robru: but why does that matter? [20:55] robru: it is, but the only trust boundary here is about which /particular/ packages they're trusted to upload to the Ubuntu archive [20:55] dobey: because anybody who can access bileto can edit all tickets? the more people that is the more we have to trust all of them [20:56] robru: well you're already trusting them by running the software they uploaded to the archive, i guess? :) [20:56] slangasek: so you're saying you're fine with all of ~ubuntu-dev having write access to all tickets? I've been worried about the security of this for awhile... [20:56] robru: I'm saying I'm equally ok with ubuntu-dev and ubuntu-core-dev having access; I may be missing the nuances of why the write access is a problem, but if it's a problem for ubuntu-dev I think it's a problem also for ubuntu-core-dev :) [20:57] because the average ubuntu-core-dev is no more in touch with bileto process than the average ubuntu-dev [20:57] robru: i mean, they can just straight skip ci train and upload to the archive without any problem [20:57] slangasek: I guess I'm just not very familiar with what ubuntu-dev is but just in general the more people who have write access to bileto the more worried about it's insecurity I become. [20:58] it's too bad each silo ppa can't reasonably be owned by a different team [20:58] dobey: yes that's a feature I've had on my mind for a while. [20:58] coreycb: why does nova-lxd not have autopkgtests? [20:59] robru: can you not make tickets themselves only be writable by the creator of the ticket and any additional people in the irc nicks field? [20:59] robru: maybe make that field be launchpad usernames instead of irc nicks? [21:00] dobey: no, because irc nicks can be trivially spoofed. I need to add a field in the db for team ownership of the ticket. [21:01] robru: sure, but i mean if they were validated as usernames against lp, and only those people could modify the ticket (and thus add more usernames), that seems like it would be a "decent enough" ACL implementation [21:02] xnox: robru has reminded me that if you can put to bileto, you can make changes to the *upstream* source and push it to the archive without bileto saying boo; so yeah, the more restrictive acl seems necessary [21:02] robru: you could even steal the little ajax widget to search for people on launchpad :) [21:03] dobey: I'd rather not change the semantics of the irc nicks field because that field is currently only used to ping people in the #ubuntu-ci-eng channel and changing those from irc nicks to lp names would break irc pings for a lot of people [21:03] robru: oh ok. well another field then, and auto-fill irc nicks from the LP info :) [21:04] robru: LP has an IRC field? [21:04] jbicha: yes, in your account you can list your IRC nicks on various networks, but it's just a string field and anybody can put anything there. bileto checks for freenode nicks of ticket creators and records that in the ticket, it's purely for notification purposes, as it is trivially spoofed [21:05] jbicha: https://launchpad.net/~jbicha yours is listed for irc.ubuntu.com [21:05] right [21:07] robru: i guess you'll have to port queuebot to telegram, and send message to people there. irc is old and busted [21:07] dobey: sigh, yes. [21:09] caribou: can you give me some context for the dependency of clamav on llvm-3.6 (as opposed to 3.8 (which i think is what llvm-dev is currently pointing to) or 3.9)? [21:16] caribou: i'm asking because llvm-toolchain-3.6 ftbfs in y (testcase failures), and the only reason its in main is clamav === imcleod is now known as imcleod-afk [22:11] dobey,robru: Now that landing PPAs are ephemeral, I think you could probably reasonably use Archive.newComponentUploader or something to grant upload access to the landers of each individual ticket. [22:11] (Though only if you knew the landers' Launchpad usernames.) [22:12] cjwatson: would that work for teams? [22:12] Sure [22:13] You'd probably still want the option to have more than one person-or-team though [22:13] cjwatson: so newComponentUploader grants upload rights to a person or team on just one archive without adding that team as a member of the ppa-owning team? [22:15] cjwatson: i wasn't aware it was possible to have upload rights to a ppa without being a member of the owning team [22:18] robru: Right, it's an obscure API-only feature but it works fine. [22:18] cjwatson: thanks, I'll note that down so i don't forget [22:19] The component will have to be 'main', of course. (Or equivalently you can use newPocketUploader with pocket='Release'.) [22:19] Since it's obscure and API-only it hasn't been polished much, hence the slightly weird options :) [22:20] I never suggested it for non-ephemeral landing PPAs because it doesn't show up in the web UI so added uploaders would be liable to be forgotten about. [22:26] wow :) [22:27] Ah [22:28] ooh new Kubuntu dev :D [22:50] xnox: Have you had a chance to retest bug 1620525? [22:50] bug 1620525 in linux (Ubuntu Yakkety) "sbuild with overlayfs fails in yakkety" [Critical,Triaged] https://launchpad.net/bugs/1620525 [22:52] i switched to unionfs =) [22:52] let's see. [22:54] bdmurray, i think it works now on xenial. [22:54] will retest with a yakkety kernel on yakkety too. [22:54] xnox: thanks [22:58] Oh, some people woke up so may be I can get some answer. :) I'm on concern of https://bugs.launchpad.net/ubuntu/+source/openbox/+bug/1336521 - how to solve problem for users of Trusty and Xenial? I understand, next release could receive a fix soon, but many users use LTS releases, and that bug is important usability bug. [22:58] Launchpad bug 1336521 in pcmanfm (Ubuntu) "Application Startup Notify fully ignored" [Undecided,Confirmed] [23:00] Maintainer in Debian promiced to push update into sid and stable soon but as for Ubuntu I have no idea whom to ask about LTS updates. [23:01] Is there a related debian bug report? [23:02] LStranger: best would be to take a fix from the debian developer, prepare a debdiff for the ubuntu packages, build them locally, make sure it works, then post the debdiff to the bug and ask a sponsor to build it for everyone [23:02] Yes, https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=838326 is it. [23:02] Debian bug 838326 in openbox "Openbox does not support startup notifications." [Important,Open] [23:04] bdmurray, yakkety is bad [23:04] wait i might be wrong [23:06] In fact, I rebuilt the package for Trusty and use it, so I'm positive it works, and it should so for Xenial, not checked it yet but relevant place in Openbox haven't changed. I'll check it, sure, tomorrow I think. [23:07] LStranger: you might have a look at the following wiki page https://wiki.ubuntu.com/StableReleaseUpdates#Procedure. Specifically, a test case would be helpful. [23:08] bdmurray: oh, thank you, will do. [23:17] bdmurray, all is good on yakkety too. [23:39] slangasek, I agree nova-lxd needs autopkgtests. we're planning to put some focus on improving autopkgtests next for all openstack core packages next cycle. [23:40] coreycb: ok, great :) [23:40] xnox, awesome thanks I'll try that out tomorrow