/srv/irclogs.ubuntu.com/2017/02/16/#ubuntu-desktop.txt

=== alan_g is now known as alan_g|afk
willcookemorning all08:59
davmor2Morning all09:00
seb128hey willcooke davmor2 Laney09:01
seb128how is u.k today?09:01
Laneysup09:02
Laneyi like this anticipation thing09:02
Laneyit's nice!09:02
Laneyblue sky09:02
seb128:-)09:02
seb128we had that yesterday, very nice day, 13°C09:03
seb128rain in the evening and colder/grey today now09:03
Laneydid you get out in it?09:03
seb128no, but tennis tonight, weather should be good to play, looking forward the exercice!09:04
davmor2seb128: ditto on blue sky and sunshine it's like we are in the tropics if it wasn't for the chill in the air09:04
flexiondotorgMorning Laney seb128 davmor2 willcooke09:09
seb128hey flexiondotorg09:09
seb128how are you?09:09
davmor2flexiondotorg: Morning dude09:09
flexiondotorgseb128 All good here, mostly due to Trevinho being awesome yesterday :-)09:10
seb128he fixed your indicator issue?09:10
seb128what was it?09:10
flexiondotorgYes and complicated.09:10
flexiondotorgTrevinho has a silo and some SRUs being lined up.09:11
flexiondotorgSec...09:11
flexiondotorghttps://github.com/3v1n0/snapd/commit/694a27e413de09e0aa4ffb25cf3b3196566d22c709:11
flexiondotorghttps://bileto.ubuntu.com/#/ticket/247709:12
seb128oh, nice09:12
flexiondotorgChroimum is a edge case, is the TL;DR.09:13
flexiondotorgANd I ran into an issue Trevinho had seen a couple of days previous and already prepared a fix for.09:13
flexiondotorgHowever, current snap I'm working on.09:13
flexiondotorgI have clean logs, nothing on stdout.09:14
flexiondotorgAnd audio doesn't work.09:14
flexiondotorgAt this moment, you realise, closed source is deeply inconvenient.09:14
flexiondotorgseb128 I was thinking about our conversation yesterday, exposing ~/.config/autostart to snaps.09:17
seb128yeah09:17
flexiondotorghttps://github.com/ubuntu/snapcraft-desktop-helpers/blob/master/common/desktop-exports#L13409:17
seb128right, something similar would work I guess09:18
flexiondotorgThat link to a file in "real" user home. Could we not use the same tedhnique to link the ~/.config/autostart directory?09:18
seb128easy to try09:18
flexiondotorgJust wanted a second opinion.09:18
flexiondotorgOK, I'll give that a go later.09:18
seb128sounds like a good option to me yes09:19
seb128great09:19
seb128let me know how it goes09:19
flexiondotorgWilco.09:19
Laneythat should probably check XDG_CONFIG_HOME first09:22
Laneywait09:23
Laneywhat is /home/$USER/?09:23
Laneythe real home directory?09:23
JanCAFAIK /home/$USER/ would be the default but not necessarily the real home directory?09:27
=== alan_g|afk is now known as alan_g
seb128Laney, wdym?09:32
Laneyhttps://github.com/ubuntu/snapcraft-desktop-helpers/blob/master/common/desktop-exports#L14009:32
Laneyis that trying to symlink from your real home directory into the snap thing?09:33
seb128Laney, I don't think the snapd interface allows for re-allocatable userdir09:33
seb128same issue with that apparmor profiles09:33
seb128that with*09:33
seb128so it only works in the standard case, which is not universal yes09:33
seb128re-allocatable->relocatable09:34
Laneyif it used $HOME then could you set /etc/apparmor.d/tunables/home and get it working?09:34
seb128no idea09:35
seb128feel free to try and submit a patch for the launcher if it does :-)09:35
Laneyriiiiiiight09:35
seb128but yeah, you probably have a point09:36
seb128worth a bug09:36
seb128but probably not enough of a priority that I'm going to look at it this cycle09:36
seb128but maybe Didier or other would pick it up09:36
seb128Laney, https://bugs.launchpad.net/snappy/+bug/1577472 is sort of an issue with relocated userdir09:37
ubot5Ubuntu bug 1577472 in Snappy "The remapped $HOME directory shows as read-only to applications running in a snap" [Undecided,Confirmed]09:37
seb128or maybe not, comments are bit confusing09:38
Laney:-)09:40
* Laney filed an issue for now, thanks!09:46
happyaronwonders who to ask about NEWing packages?09:53
happyarongot this one... https://launchpad.net/ubuntu/zesty/+queue?queue_state=0&queue_text=zfs-linux09:53
LaneyUsually you would wait for a bit before asking :P09:54
Laneyespecially syncs are processed regularly09:54
happyaronsure, :)09:54
Laneyoh I forgot, happy feature freeze day!09:54
willcookecking, hi!  Hopefully you can see in the scrollback happyaron's comment on the NEW queue ^ that's your ZFS sync10:10
ckingwillcooke, yep, very grateful for this! kudos to happyaron10:10
Laneyhappyaron: well done on making it be synced again10:12
ckingyep, that is a heroic piece of work10:15
ximionLaney: hey :) Is libmo usable already?10:19
ximionlooks pretty good to me, tbh10:19
Laneyximion: It works10:19
LaneyI think it wants a _new_from_bytes thing10:20
ximionyeah, that would be nice for asgen10:20
Laneyexactly10:20
Laneythat should be not too bad to implement10:20
Laney*also* I fuzzed it and it has some crashes10:20
Laneyneeds to check file lengths and stuff10:20
Laneyso I would do those fixes before making a release, but you can work against it now if you want10:21
* ximion always wanted to fuzz AppStream - so farthis is still on my todo list10:21
Laneyafl is pretty easy to use10:21
Laneyoh also it has no testsuite of course /o\10:21
ximionLaney: a release of libmo would be nice10:22
Laneysure, just need to do the crash fixes10:22
Laneycould call that 0.1 then10:22
Laneyah, I saw that the submodule bug in meson was fixed too10:22
ximionwell, asgen is also pretty light on tests... :-/ (but it's also one of those harder-to-test cases)10:22
ximionjup10:22
Laneyso you could have it as a submodule for now if you wanted10:22
Laneyi.e. the outer meson.build should (if it is really fixed) be able to set libdir and so on10:23
Laneyto put libmo in a private directory10:23
ximionMeson is getting so much better lately - they now have fixed all issues I complained about in the past10:23
ximionyes, maybe I'll do that10:23
Laneyotherwise, I want to get to those bugs within a week or so10:24
ximionI also want to submit patches to the Git-to-D tool to make it possible to invoke it as part of the build process and also to switch between dynamically loading libraries and linking to them directly10:25
ximionbasically get my changes upstreamed10:25
Laneys/git/gir?10:25
ximionbut I need to finish my review essay first10:25
ximionyes, GIR10:25
ximionas in Invader-Zim-GIR10:26
LaneyGrrrrrrRRRRrrr10:28
Laneyximion: what are you planning with mo files? :-)10:29
Laneythe languages thing?10:29
ximionyes - the languages thing was the original reason for me wanting libmo10:29
ximionalthough reading out that information from .mo files is trivial even without libmo10:30
ximionbut if we are going to have it anyway for the Ubuntu part, we can just as well use it for more10:30
ximionbtw, the D language situation is also getting better - Red Hat has a guy working on things with D upstream, and kalev recently made the Fedora side work well10:31
ximionsome guy wrote a NixOS backend for asgen10:31
ximionthings look good10:32
ximionexcept for the RAM usage, which is still insane10:32
Laneynice10:34
Laneywhat are redhat using it for?10:34
ximionI think at time it's just a general "we want to have all languages work well" thing, paired with GNOME developers looking for alternative languages to recommend people when developing for GNOME (C and JavaScript both have disadvantages to newcomers, and Vala isn't very healthy)10:36
ximionso, no formal company-wide interest, but some people doing stuff I assume - either way, it already massively improved things10:37
=== ember_ is now known as ember
Laneynod10:44
ximionLaney: I recently played around with the D-based web framework vibe.d, which is - unlike the standard library - really well designed and has very useful features10:50
ximionif I really add a MongoDB or SQL backend to asgen one day, maybe depending on the whole web framework wouldn't be a terrible idea10:50
ximion(e.g. its logging facilities are good, it has a nice streaming interface, sane JSON serialization, async I/O, etc.)10:52
hikikofatal error: error in backend: IO failure on output stream.10:57
hikikohas anyone seen this error before?10:57
hikikoI upgraded to zesty10:57
hikikoand tried to build something10:57
JanCI think D is more common for game programming than for desktop programming...11:01
happyaron:)11:20
happyaronwas at dinner11:20
=== dandrader is now known as dandrader|afk
=== dandrader|afk is now known as dandrader
Sweet5harkseb128: urgh, ricotz was right about the changes for the autopkgtests missing. They are in git (https://git.launchpad.net/~libreoffice/ubuntu/+source/libreoffice/commit/?h=ubuntu-zesty-5.3&id=fa92df6e10606bfb020872121bbf8e7011a4a852), but somehow not in the upload. Must have messed up my jenkins here  ...13:29
* Sweet5hark investigates.13:30
Sweet5harkarrrgh13:35
Sweet5harklets have generated files in git, it will be awesome13:36
Sweet5harklike, when was that actually ever a good idea?13:36
Sweet5harkthe good news is: there is nothing wrong with my CI ...13:37
seb128Sweet5hark, you might want to ask on #ubuntu-release if they can skip the autopkg for that one, explaining that following upload is going to fix things but that we might get the new version in zesty before waiting for another build/infra round13:49
seb128Sweet5hark, you might want to mention what package/issue you are talking about in addition of the text copy ;-)13:52
Sweet5harkseb128: heh, yeah, done. http://people.canonical.com/~bjoern/zesty/5.3.0/libreoffice_5.3.0~rc3-0ubuntu3_source.changes <- has the proper change, SCM diff is here: https://git.launchpad.net/~libreoffice/ubuntu/+source/libreoffice/commit/?h=ubuntu-zesty-5.3&id=f4b5ece6b1783202ed286e1f149ab60c3471f18013:56
seb128Sweet5hark, k, I'm waiting a bit to see if they want to move the current version over before sponsoring the new one14:01
GunnarHjseb128: Hi Seb, what about the langpack update? Should we postpone it again?14:03
seb128shrug14:05
GunnarHjseb128: Sorry to be a nuisance. ;)14:06
Sweet5harkseb128: k, thanks14:06
seb128GunnarHj, next you are going me to re-review xkeyboard-keyconfig aren't you? ;-)14:06
GunnarHjseb128: Well, ... yes14:07
GunnarHjseb128: Saw that wgrant will open zesty translations soon. At least one good news.14:09
seb128GunnarHj, I plan to have another look to that one ... langpack I'm going to try to have a look this afternoon if I see what's the issue, as said I set up the new account/key but somehow it's not working and I don't really know how to debug so need to sit down and learn more about that stack14:09
seb128GunnarHj, right14:09
=== dandrader is now known as dandrader|afk
GunnarHjseb128: I see. Probably only you and I know about that schedule, so it's not a big deal. Please let me know when we are ready to go with the call for testing.14:12
seb128GunnarHj, k, I let you know when I figure things out14:15
GunnarHjseb128: Ack.14:16
andyrockqengho: hey do you know if chromium uses a custom version of mesa?14:17
andyrockthere is a mesa in third_party but it looks old14:17
qenghoandyrock: Er, I didn't think it used mesa at all.14:20
qenghoandyrock: I have never noticed, is a better way of saying that.14:20
andyrocki think it does and we need include the mir patches there14:23
qenghoandyrock: I guess you can tell easiest by running "find pathtolocalmesa -type f -exec touch {} \;" and  if running "ninja" needs to build anything new, then it does.14:23
andyrockor maybe not (maybe they're using it just for chromeos not sure)14:29
=== dandrader|afk is now known as dandrader
attentedesrt: do you remember how to get the ipc_dir and app_id for snaps in your proxy?16:11
desrtyou have to give them to me16:11
desrtit's part of what the security backend is supposed to do16:11
desrtfor snaps i think ipc_dir is xdg_runtime_dir + "snap.snap-name".  take a look at what directory gets added to the apparmor stuff there.16:12
attenteyeah, i was trying to remember the location, but actually i don't know how to get the app_id through apparmor16:13
attentedesrt: i can give you the context/label but i don't know if this corresponds to an app_id correctly16:14
desrti pass you that gvariant with the dbus peer credentials16:14
desrtthe apparmor label is inside of that16:14
desrtah.  talk to snap people about that :)16:14
desrtbut i guess it does, no?16:14
attenteno clue. i remember seeing some labels like usr.bin.firefox so i thought that was just a re-write of the path of the binary...16:15
desrtya.. but snaps follow some sort of scheme, don't they?16:15
desrtlike confined:snap.whatever16:15
attenteactually, the context is the binary location it seems like16:17
desrtwell, it is surely possible to that that into a snap id16:18
tyhickshey16:18
tyhickswe're mixing two different things here16:18
jbichaLaney: for Feature Freeze, are you ok if I upload onboard 1.4 later this week so that we can merge from Debian experimental or should I just upload to zesty now?16:19
tyhicksthe apparmor label can be anything and is defined at the top of the AppArmor profile16:19
tyhickstraditionally, we've used the path to the binary and substituted '/' chars for '.'16:20
tyhickssnap confinement does things differently16:20
tyhicksit uses the following pattern: snap.<snap>.<app>16:20
Laneyjbicha: Ok, if you test it properly16:20
attentetyhicks: that isn't necessarily the same as the app id is it?16:21
tyhicksattente: it is in the case of snap confinement16:22
attentebut we can't rely on this in the case of non-snaps, right?16:23
tyhicksattente: correct16:24
attenteok16:24
tyhicksattente: do you have a need to differentiate between snaps and non-snaps?16:25
attentetyhicks: also is the ipc directory location standardized?16:25
tyhicksattente: hmmm... ipc directory? are you talking about a location in the filesystem that the snap can create named socket?16:26
attentetyhicks: i'm just trying to think of a situation where i might end up passing the apparmor label to desrt's proxy and it doesn't correspond to an appropriate app id16:26
desrttyhicks: there is a feature in snappy that happened a while ago where there is a hole punched in the xdg runtime dir16:26
* tyhicks reads https://bugs.launchpad.net/snap-confine/+bug/162044216:28
ubot5Ubuntu bug 1620442 in Snappy "snap fails because XDG_RUNTIME_DIR is set to /run/user/1000" [High,Fix released]16:28
desrtoh.  you found it before me :)16:28
tyhickslooks like XDG_RUNTIME_DIR is now set specifically for snaps running under confinement16:29
tyhicksbut note comment #9 :/16:29
desrtya16:29
desrtimho they messed things up16:30
desrtBUT16:30
desrtthe /run/user/1000/snap.qt5-systray/ thing being created and shared is absolutely correct16:30
desrtand that's what we set ipc_dir to16:30
tyhicksattente: remind me what piece of code are you're referring to when talking about passing the apparmor label to the proxy16:31
attentetyhicks: it's a small function in desrt's proxy that obtains the dconf paths using libapparmor with the added patches jjohansen sent to the ML16:33
desrttyhicks: basically, i need two things16:34
desrt1) a place to put a file, and 2) a unique identifier16:34
desrtfrom a really practical standpoint, i actually only need 116:34
desrtsince that could act as a unique identifier16:34
attentedesrt: but it seems like all we can really obtain is the apparmor label16:35
attenteand i don't even think that's enough to get you the correct ipc dir16:36
desrtcan't you parse the apparmor file or something?16:36
desrtand is it really the case that the label can be just anything?16:36
desrtdoesn't snappy force it to follow the expected format?16:36
tyhicksall snappy profiles followed the expected format16:37
desrtso that's the answer16:37
tyhicksyes16:37
attentedesrt: does it matter for non-snaps?16:37
desrtwell16:37
desrtas long as non-snaps aren't called with something that looks like a snap id...16:37
tyhicksit is common for things in userspace that deal with apparmor confinement to look for the "snap." prefix and treat those profiles/processes specially16:38
desrtyes.  exactly that.16:38
tyhicksas a distro, we won't ship an apparmor profile that looks like a snap id unless it is for snap confinement16:39
desrtattente: do you have everything you need to know, now?16:39
tyhicksa system admin may make the mistake of creating a local apparmor profile that begins with "snap." but it is highly unlikely16:39
attentesorry if i'm being obtuse guys... but how exactly do i go from apparmor label to /var/snap/${snap_name}/current16:40
desrtyou rather go to /run/user/xxx/snap.${snap_name}16:41
desrtthat's the ipc dir16:41
desrtand the apparmor label is snap.${snap_name}... so it's pretty easy16:41
attenteso the reason i'm not seeing the directory is that it hasn't been created by anything yet?16:41
desrtya... that's arguably a bug16:42
desrti think someone opened a new one fort hat16:42
attentedesrt: and you don't really care if the app id is an app id, as long as it's a unique id?16:43
desrtwhat case are you imagining?16:43
attentewell i was just thinking of throwing the apparmor label in there16:44
desrtattente: if i understand tyhicks correctly, then this is always correct16:45
desrtjust make sure it starts with "snap." and you're good16:45
attenteand we don't care about confinement of non-snaps, right?16:45
desrtcorrect.16:45
tyhickshmm?16:45
attenteok :)16:45
tyhickswe're not going to be mediating dconf/gsettings access by non-snap processes?16:46
tyhicksattente, desrt: ^16:47
attentetyhicks: how does dconf know the difference? by checking if the label starts with "snap."?16:48
tyhicksattente: yes, that's how you would know the difference16:49
jdstrandsnappy is going to be the main consumer, but I would hope that this wouldn't be a snapd only thing. it should be possible to craft your own policy for something outside of a snap that uses this mechanism16:49
tyhicksattente: however, I feel like we still want to mediate non-snap processes that are confined16:49
* jdstrand notes he hasn't been following terribly closely to the conversation16:49
tyhicksI agree16:49
jdstrandI mean, upstreamableness alone makes it that we want to make it not snap-specific, but yeah, there is still a lot of software in the distros and from 3rd parties that people might want to apply policy to16:50
tyhickswhat we may do is add a rule to /etc/apparmor.d/abstractions/dconf to grant blanket access to the confined apps that are already using dconf16:51
tyhicksthe typical flow is to get the apparmor label of the connecting process16:53
tyhicksif it is "unconfined", grant full access16:53
attenteif it starts with "snap.", then the ipc directory is /var/snap/${snap_name}/current16:54
attenteif it doesn't, then the ipc directory is just /run/user/100016:54
tyhicksthat'd work but I don't if that's the best ipc directory for the snap case16:55
attenteand always use the apparmor label as the unique identifier that desrt needs16:55
tyhicksyes16:55
tyhicksand always query apparmor about what to do unless the label is "unconfined"16:55
attentetyhicks: which directory is best? it pretty much has to be something standard and easily derivable from the label16:55
jdstrandtyhicks: well, in the past this is where we introduced -strict. eg, dbus abstraction got rules to connect to all of the system bus, but a new dbus-strict was added that only allowed a few things. that way existing policy doesn't break and people can use the stricter abstraction as the desire16:56
jdstrandsnapd would use -strict and build up what it needs16:56
tyhicksjdstrand: yeah, that'd work16:56
tyhicksjdstrand: do you have a suggestion for where attente should create a file for IPC in the case of snap confinement?16:56
jdstrandI need to read backscroll for full context16:57
tyhicksattente: the proxy is creating this file on behalf of the app?16:57
tyhicksjdstrand: we still need to gather full context because I don't know all of the details regarding who is creating the file and what it is used for16:57
tyhicksjdstrand: don't worry about backscroll16:57
attentetyhicks: i don't know, desrt ^?16:57
desrt...16:59
desrtlike, just use the xdg runtime dir subdirectory16:59
desrtthis is already decided and supported16:59
tyhicksthat seems reasonable to me but I wasn't sure why attente settled back on /var/snap/${snap_name}/current17:00
desrti have no idea either.  it's xdg_runtime_dir + "/snap." + snap_id17:00
desrtthere's only one option17:00
attenteok17:01
desrtso it's all clear now?17:01
attenteyes17:01
tyhickscool17:02
=== dandrader is now known as dandrader|afk
Laneyjbicha: can you push gnome-session please?17:26
jbichaLaney: done17:29
Laneymerci17:29
* Laney breaks all the things17:29
ogra_Laney, dont steal davmor2's job !17:30
* davmor2 break Laney 17:30
davmor2ogra_: that was easy to fix17:30
ogra_hah17:30
* Laney keeps davmor2 in a job17:30
Laneynow someone else gets to put me back together17:31
Laneythen davmor2 gets to verify that they did it right17:31
Laneyand so on17:31
davmor2\o/17:31
ogra_:)17:31
=== dandrader|afk is now known as dandrader
jdstrandtyhicks: fyi, that was what I thought we all agreed to as well17:38
tyhicksjdstrand: are you talking about using a subdir under xdg_runtime_dir?17:39
jdstrandyes17:39
tyhicksgood17:40
Laneynight!18:27
willcookenighty night all18:55

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!