/srv/irclogs.ubuntu.com/2017/07/18/#ubuntu-devel.txt

=== freeflying__ is now known as freeflying
=== semiosis_ is now known as semiosis
=== coreycb_ is now known as coreycb
=== balkamos_ is now known as balkamos
=== plars_ is now known as plars
=== michagogo_ is now known as michagogo
=== pitti is now known as Guest63419
=== Guest63419 is now known as pitti
=== pitti is now known as Guest55341
=== Guest55341 is now known as pitti
=== maclin1 is now known as maclin
=== dupondje_ is now known as dupondje
pittiLaney: the systemd debs from that PR test fine locally, I can't reproduce the eternal hang; if I start a few tests manually with some changes, could I bother you with killing them again?08:57
pittiLaney: the log included in the tarball was just a random interruption, it didn't show the actual tmpfail; so I would turn off the reboot smoke test at first and see how far that gets08:58
LocutusOfBorgjamespage, I'm doing a sync of glusterfs09:04
Laneypitti: sure09:08
LocutusOfBorgcan you please double check the systemd files?09:08
LaneyI wonder why this isn't reproducible elsewhere though09:08
Laneygiven that it's extremely consistent in scalingstack09:08
pittiLaney: ok, thanks; I started with disabling "upstream" and "boot-smoke" tests, to establish a base line (https://github.com/systemd/systemd/pull/6392)09:11
Laneypitti: you're triggering these manually, right?09:12
Laney:)09:12
pittiLaney: queues have drained, did lgw01 came back and went though them all, or was some more surgery involved? :-)09:12
Laneyit came back09:12
pittiLaney: yes, I won't add them to webhooks for now, just selected manual tests on a packaging branch09:12
Laneythey just had to turn it (nova-compute) off and on again09:12
pittihaha09:12
wgrantIt'll hopefully be redeployed soonish, so it'll be more reliable.09:12
wgrantI'm this evening bringing up staging s390x vbuilders on bos02, which is deployed in a slightly more sensible way that will eventually be rolled out everywhere.09:13
wgranticehouse is getting a bit old.09:13
LaneyI've been hearing rumours about that09:26
=== maclin1 is now known as maclin
LocutusOfBorgcpaelzer, pleeeeease can you merge multipath-tools? I would like, but I failed understanding some changes10:09
pittiLaney: just 6 amd64 tests running in parallel, still cloud woes?10:28
Laneypitti: quota; things backed off10:30
cpaelzerLocutusOfBorg: hehe10:38
cpaelzerLocutusOfBorg: I was waiting on cyphermox, but you know what if time permits I can prepare a merge and hand it to both of you for a review10:38
cpaelzerI'm PTO soon, so I'd not like to upload before leaving for a while10:38
cpaelzerwill see If I can squeeze some of that in this week and let you know LocutusOfBorg, cyphermox10:39
LocutusOfBorgthanks10:39
LocutusOfBorgit should be a matter of grab-merging it, the merge failures should be trivial for a person who have done it previously10:40
LocutusOfBorgbut I don't want to touch it10:40
=== ahasenac` is now known as ahasenack
=== ahasenack is now known as Guest49405
cpaelzerLocutusOfBorg: I have the merge complete, was a bit ugly since some debian changes conflicted with ours but I think I was able to resolve12:56
cpaelzerLocutusOfBorg: will build and test now, once that is done I'll throw at you and cyphermox for review and upload12:57
LocutusOfBorgjust ping and I'll have a look, lovely thanks!13:06
=== JanC is now known as Guest76357
=== JanC_ is now known as JanC
jbichaLocutusOfBorg: btw I had already done liburcu rebuilds except for netsniff-ng13:32
jbichaso liburcu could have migrated now but it has to wait for the autopkgtests to be redone :|13:33
LocutusOfBorgjbicha, sorry, for some reasons they were listed in the bad list13:52
jbichawhat bad list?13:59
=== persia__ is now known as persia
=== zyga-ubu1tu is now known as zyga-ubuntu
LocutusOfBorgI crafted a list of stuff to rebuild, probably in some wrong way14:14
jbichaLocutusOfBorg: https://people.canonical.com/~ubuntu-archive/proposed-migration/artful/update_output.txt and update_output_notest.txt provide a sort of tracker if you can read it14:17
LocutusOfBorgthe notest would have done the trick probably, thanks!14:18
LocutusOfBorgI still prefer rdepends but I fail sometimes because I do it against artful, never found a way to make it look for artful-proposed14:18
jbichaI think the autopkgtests were good by now though14:18
LocutusOfBorgnot by this morning :)14:19
jbichanot any more, but they were good except for netsniff-ng14:20
cpaelzerLocutusOfBorg: cyphermox: I set you both as reviewer on the multipath-tools merge, should be in your inbox from LP14:33
LocutusOfBorgI prefer cyphermox and to wait some bits14:35
LocutusOfBorgto make liburcu migrate14:35
cpaelzerAs I said I'm soon away a bit, so time will pass :-)14:36
LocutusOfBorgcpaelzer, debian/tests/control gone?14:39
cpaelzerfrom the delta maybe, should be all in debian now14:41
cpaelzerI upstreamed all we had to Debian so we can drop delta14:42
cpaelzerit is still there, just checked14:42
LocutusOfBorgI see it has been upstreamed differently but ok14:42
juliankapt 1.4.7 just entered that apt ppa for zesty (https://launchpad.net/~deity/+archive/ubuntu/apt). I rebuild the changes file for zesty, but kept the .dsc and .tar.xz unchanged from the debian stretch update. For the SRU (bug 1702326), we can either pick the update like this, change the distribution info in debian/changelog, or change distro + version to something like 1.4.7+16.10.1.15:01
ubottubug 1702326 in apt (Ubuntu Zesty) "New microrelease 1.4.7 for zesty" [Medium,Triaged] https://launchpad.net/bugs/170232615:01
juliankI can also update the SRU bug then to handle any other stuff that might have been forgotten in the 1.4.{1,2,3,4,5,6} SRUs15:02
juliankNot sure if anyone else has been sharing a branch between a debian stable and an ubuntu stable release yet15:03
juliankOptimally, I'd syncpackage it but (a) Launchpad did not pick it up from stretch-proposed, and (b) no diffs for SRU reviewers :(15:04
juliankSo currently, it's more of a fake sync15:04
cyphermoxcpaelzer: I review multipath-tools; feel free15:27
cyphermoxI'll do another run of testing with everything together (ie. from d-i) once it's in the archive.15:28
cpaelzerthanks cyphermox15:32
cpaelzerI'll address whatever review comes up tmrw morning and if nothing blocking I'll upload15:32
cpaelzere.g. a few of nacc's automated nack's don't count on this, but I want to check them still15:33
cpaelzerthanks for the offer on the extra round of testing15:33
juliankgrr. i want to close *all* segv and friend bugs in apt.15:49
slangasekstgraber, kees, infinity, mdeslaur: TB meeting in 2?15:58
=== Guest49405 is now known as ahasenack
mdeslaurack15:58
slangasek(if stgraber is around to chair, I guess I should have checked with him when I was face-to-face with him 10 minutes ago :P)15:58
stgraberslangasek: http://paste.ubuntu.com/25119707/16:25
stgraberslangasek: downloads the build chroot from LP, turns that into a LXD image and creates a container from it. If the image already exists, just re-uses it (unless -u is passed to force an update). It repacks the build chroot to rename the directory that's in it and add the needed bit of metadata for LXD. Seems to work okay here.16:26
LocutusOfBorgcyphermox, so you take care of multipath upload? thanks16:29
cjwatsonjuliank: Do you know of something left to do in Launchpad for bug 1417717?  https://translations.launchpad.net/ubuntu/artful/+source/apt/+pots/apt-utils looks fine to me now (especially by comparison to vivid).16:34
ubottubug 1417717 in Ubuntu Translations "apt-utils marked for translate, but data unavailable" [High,Confirmed] https://launchpad.net/bugs/141771716:34
slangasekstgraber: excellent, thanks16:37
juliankcjwatson: I don't know, I don't see when the files where last imported16:57
juliankAll I see in the queues are "Needs Review"16:59
juliankThe last time I saw something different (last year?) they failed IIRC16:59
cjwatsonjuliank: OK, that's not a Launchpad problem, that's up to translations admins to garden the import queue if appropriate17:00
juliankI just wonder where the failed ones went17:01
cjwatsonjuliank: And I think the import queue is mostly obj-*/**/*.pot which is probably boring ...17:01
cjwatsonjuliank: Do you know if there have in fact been failures in artful?17:02
juliankNo17:02
juliankIt was back in xenial days17:02
juliankIn any case apt does not use the translations yet AFAIUI, but if they are at least working on the translate side, that's good.17:02
juliankGotta add some langpack hack into apt add some point, so it prefers langpack ones over its own files17:03
cjwatsonjuliank: The way the imports are apparently per-architecture due to these obj-* directories is pretty suboptimal.  Is there a way to avoid that?17:03
juliankWell, there are always ways to make that different, but that's the build directory debhelper picks, and I build the pot files in the build directory17:04
juliankIt would be enough to just try the import on amd64 and ignore the others or something17:04
juliankI think that's the same with most packages really, or does any build arch-specific po(t) files?17:05
cjwatsonMost packages ship them in source tarballs17:05
cjwatsonThough they do often get updated17:06
cjwatson(usually in place though, not in obj-* directories)17:06
cjwatsonAnyway, we can just import them all I imagine17:06
cjwatsonLet me see what I can do17:07
juliankWell, we combine and split the files, as we have one domain to translate really (apt-all), but several target domains (apt-utils apt-doc, etc)17:07
juliankWe only ship the apt-all .pot and .po files in the source package, as we want them to be translated as one, as they can share strings17:08
juliankThere was the idea to just move to one "apt" translation domain and ship them in apt-common or something17:08
juliankThat's about 3 MB of translations17:09
cjwatsonjuliank: I'm a bit confused by the separate .sh.pot and .c.pot templates - are those intentional?17:10
juliankcjwatson: They are the results of running xgettext against sh and the c++ files, and merged into the normal .pot17:10
cjwatsonjuliank: I think it might make things less confusing if you removed those temporary files ...17:11
juliankThere's a lot of weird caching and stuff in the build system going on17:12
cjwatsonjuliank: At least before dh_builddeb runs17:13
juliankcjwatson: I guess it's easier to just rename them .c-pot and .sh-pot or something :)17:13
cjwatsonThat would work too, yes17:13
cjwatsonI'll block them for now17:16
juliankcjwatson: I'm really thinking about just dropping the split translation domains and stuffing it into apt-common or something, that reduces .mo space requirements from 5.7 to 2.7 MiB on a system with both apt and apt-utils installed; and fixes all issues with launchpad imports17:20
juliankThen it just gets po/apt.pot and po/*.po :)17:21
juliankForget the 5.7 quote, it's more like half of it (2.8)17:25
juliankxnox: If net-update is really disabled everywhere now, I'd prefer dropping the code from apt-key. I was just triaging bugs :)17:28
juliankIf we don't really want it anymore, let's just kill it :)17:29
juliankIf anyone here is interested in merging all apt translations into apt-common: The sizes are: just apt: 2374622; with apt-utils: 2930575, combined: 280631117:29
juliankThat is +0.5 MB for a tiny chroot without apt-utils, and -0.1MB for a normal system with both17:30
cjwatsonjuliank: I've done the requisite clickyclicky now17:30
juliankcjwatson: Thanks17:31
juliankI guess the code for making langpacks work is to just call bindtextdomain("/usr/share/locale-langpack") under some condition (as in: an apt translation exists in there). Preferably I'd like to try both, but unfortunately it does not seem gettext allows that17:34
juliankAnd well, do the binding fun in library init functions17:35
juliankor in InitConfig or something17:35
juliankThe alternative would be to have an "apt-langpack" domain that the langpack uses and then just check apt-langpack first and fall back to the normal domain if that fails17:39
juliank(per-msgid fallback)17:39
juliankThe hacky solution is probably to just decide based on which .mo file is larger17:40
rbasakpdeee: I'm working on the SRU exception documentation. Thank you for the docs you had prepared in relation to this. I'm going for documenting a full standing exception based on that documentation, so we don't need to detail every change on every update. My draft (work in progress) is at https://wiki.ubuntu.com/StableReleaseUpdates/Certbot. Can you suggest anything specific that we could use as a18:23
rbasakprocess to make sure that a proposed update (once built and available to users) is good, which we can ensure is done before pushing the update out to users?18:23
rbasakbmw: ^18:23
juliankcjwatson: Re bug 1123272 - I think we could potentially improve apt downloading speed by 50% by switching from MD5+SHA1+SHA256 to MD5+SHA512 (as SHA512 is 50% faster than SHA256, and we drop one hash, though md5 would be nicer to drop)18:45
ubottubug 1123272 in apt (Ubuntu) "high cpu usage on download (not optimised SHA256, SHA512, SHA1)" [Wishlist,Confirmed] https://launchpad.net/bugs/112327218:45
juliankBecause apt validates them all, that seems to be a bottleneck for high-bandwidth, slow-cpu users18:46
juliankthings might look different on 32-bit system, no idea18:47
juliankgrr, people in 1123272 are annoying19:47
juliankin bug 112327219:47
juliank"APT downloads have CPU bottleneck, everything is fine with CURL"19:47
ubottubug 1123272 in apt (Ubuntu) "high cpu usage on download (not optimised SHA256, SHA512, SHA1)" [Wishlist,Confirmed] https://launchpad.net/bugs/112327219:47
julianklol19:47
juliankSeriously, we run 3 hashes on the input, and curl does like nothing.19:47
juliankWill things improve if we run verification and download in parallel?19:47
Unit193juliank: Pretty sure the slowdown I hit might be re-compressing.19:52
Unit193*might be*, I don't know.19:52
juliankUnit193: Well, that only happens with pdiffs or acquire::gzipindexes19:52
juliankand achieves about 200 MB/s or so19:53
juliankor was it 1GB/s?19:53
Unit193On your hardware*19:53
juliankehm, 2 GB/s19:53
juliankYes, but it's a 5 year old midrange laptop CPU19:54
cjwatsonjuliank: Or we could only check the strongest.  There's not much point in checking multiple hashes20:37
juliankcjwatson: Well, yeah, mostly, they are all MD constructions anyway20:54
juliankBut if we add something like SHA3 or BLAKE2b, we probably do want to run all available ones (one per family)20:55
sarnoldyou'll never please security nuts20:55
juliankWe can at least make checking of untrusted hashes optional20:56
sarnoldyeah no point in burning cpu time on md520:56
Unit193sarnold: Teeechnically since md5 and sha1 are broken, if you check both then it's "safe enough" :>20:57
juliankWell, SHA1 is also marked untrusted20:57
juliankBut then it also checks file size via the same mechanism20:57
sarnoldUnit193: yeah I haven't seen any polyglot sha1 and md5s. yet.20:57
juliankSo you need to factor in cost or special case filesize20:57
juliankOptimally, right now, we'd use SHA-512 on 64-bit, and SHA-256 on 32-bit platforms20:58
juliankAs SHA-512 is about 50% faster than 256 on 64-bit, or even more20:59
Unit193sarnold: BTW, seen anything in security team about irssi or gnome-exe-thumbnailer?21:00
sarnoldUnit193: I've seen the gnome-exe-thumbnailer bug, dunno if it's had any progress yet21:00
sarnoldjuliank: yeah; or maybe blake2*mumble* everywhere?21:01
Unit193sarnold: Was just uploaded to Debian, has CVE-2017-11421 now.  I poked md<tab> a few days ago about Irssi, as I'd already done themerge.21:01
ubottugnome-exe-thumbnailer before 0.9.5 is prone to a VBScript Injection when generating thumbnails for MSI files, aka the "Bad Taste" issue. There is a local attack if the victim uses the GNOME Files file manager, and navigates to a directory containing a .msi file with VBScript code in its filename. (http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11421)21:01
julianksarnold: Well, I'd like to couple blake2 with a sha2, to have something very-well-researched in there21:02
juliankAnd BLAKE2b is fast on 64-bit only, on 32-bit you'd want BLAKE2s21:02
ahasenackhi, could someone please accept my nominations for bug #1698758 ?21:02
ubottubug 1698758 in libapache2-mod-auth-pgsql (Debian) "Encrypted password causes segmentation fault" [Unknown,New] https://launchpad.net/bugs/169875821:02
juliankSo ship SHA256+SHA512+B2s+B2b?21:03
sarnoldjuliank: oh there's an idea that never occurred to me21:03
sarnoldfour hashes but check the fastest two on each platform? heh21:03
juliankand then pick (SHA512, B2b) or (SHA256, B2s) depending on whether 64 or 32 bit21:03
Unit193Unfortunate that b2sum only supports one method.21:04
juliankYep21:05
juliankThe coreutils variant was stripped down21:05
juliankThe initial one supports all variants21:05
juliankB2b + SHA512 should run in like 5.3 seconds or so here21:07
juliankfor 1GB21:07
juliankLike 20% slower than SHA256 on its own21:08
Unit193juliank: What, other than b2sum and openssl 1.1, does blake/keccak?21:22
cjwatsonsarnold: polyglot sha1/md5 was demonstrated something like ten years ago21:22
cjwatsonmore, I think21:23
cjwatsonsarnold: it's about six bits harder than sha1 alone21:23
sarnoldcjwatson: sorry, I meant _collided_ sha-1/md5 polyglots..21:23
cjwatsonsarnold: that's the Joux multicollisions result, surely?21:26
sarnoldcjwatson: let me go read! :D21:27
cjwatsonsarnold: I admit I don't know if there've been *specific* collisions demonstrated, only the theory21:27
juliankUnit193: librsync, argon2 algorithm, the noise protocol, amongst others, use blake221:28
juliankSee https://blake2.net/#us21:28
Unit193juliank: Sorry, I was referring to frontend commands.21:28
juliankOh21:28
Unit193Figured you might know offhand.21:28
juliankI don't think there are any other tools21:29
juliankSHA3 is done by nettle-hash in nettle-bin21:30
juliankand well by rhash, but that's incredibly slow IIRC21:31
juliankI guess we'll add a helper to apt shortly21:31
juliankLike /usr/lib/apt/apt-helper hash-file or something21:31
juliankIt's really not a lot of code, and quite useful :)21:32
maprericjwatson, infinity: I'm looking at the devscripts delta, and I wonder whether we really need it.  If 'needs-recomends' doesn't pull the recommends that's an autopkgtest bug, not something that should be done in devscripts.22:02
maprerialso it looks rather odd.22:02
mapreriI'd personally say to just sync it now, and see how it goes with the upcoming perl transition22:02
cjwatsonmapreri: I disagree that it's an autopkgtest bug that it doesn't pull recommends.22:12
cjwatsonmapreri: But you can sync it if you promise to be responsible for cleaning up any resulting breakage in the next Perl transition, I guess (and if the debhelper dependency is no longer needed either)22:13
mapreriwell, if I write 'Restriction: needs-recommends' it means I really want the recommended packages installed, doesn't it?22:13
maprericjwatson: I was about to add those packages in devscripts.git in debian, but then realized that to me they look mostly noise/cruft...22:14
cjwatsonmapreri: I'm not sure it necessarily means that they should be treated as hard dependencies for the purposes of the dependency resolver; I don't remember the details, I just remember it being difficult to reason about22:15
cjwatsonmapreri: Mostly I don't want us to have to disentangle the whole mess again, so perhaps do me a favour and don't go through the whole Perl stack removing all of the workarounds of that form in one go?22:15
mapreriI have no intentions (nor the time!) to go through all of perl :)22:16
mapreriwas just interested in devscripts22:16
maprericjwatson: I'll just sync devscripts, and keep an eye on it after the perl transition starts :)22:17
maprericjwatson: do you know if ubuntu plans to do it at the same time of debian, or when?22:17
xnoxi'm not sure if needs-recommends was ever implemented properly22:39
cjwatsonmapreri: don't know22:40
cjwatsonI assume depends on timing with respect to freezes as usual22:41
bmwrbasak: what kind of testing did you have in mind and what limitations are there on the environment the tests can be run in?23:00
dokomwhudson: is cloud-init now the only thing blocking 3.6 as the default?23:05
dokotumbleweed: debconf ping23:05
mwhudsondoko: yeah, i think so23:05
mwhudsondoko: i mean there's a bunch of failures in universe still but most of those are in the archive too23:06
mwhudsonwhut https://launchpadlibrarian.net/329584191/buildlog_ubuntu-artful-amd64.pylint_1.7.2-0ubuntu1_BUILDING.txt.gz23:06
dokomwhudson: as a work around, would it be possible to use 3.5 explicitly?23:07
mwhudsonpretty sure that built locally23:07
mwhudsonoh well23:07
mwhudsondoko: the patch to cloud-init is known and i think smoser thinks the last upload included it23:07
dokoI mean, that would mean that we have to keep 3.5 as supported, but it would be a way forward23:07
mwhudsonso as a cloud-init upload is needed i'd rather see if we can use the right fix...23:07
mwhudsonafk for 5-10 sorry23:08
rbasakbmw: integration/functional test level, for the entire set of proposed certbot updates for a particular Ubuntu release. I'm interested in catching things that are introduced after your tests for release, so things like packaging issues and differences in dependency versions and so on.23:20
rbasakbmw: I'd like whoever is driving the SRU (hopefully you or someone under your direction) to be able to do this, so any environment available to you really. Both manual and automatic tests are fine with me.23:21
rbasakbmw: the idea is that we will build built binaries for the proposed SRU. This will be opt-in to all users interested in testing.23:21
rbasakbmw: once verified by whatever process we can try to define now, the Ubuntu SRU team will release the packages (exactly the same build) to "automatic updates", rather than opt-in. Anyone with certbot packages installed who grabs "all" updates (apt upgrade, etc) will get them.23:23
mwhudsonoh that build passed locally because it installed the package from pypi :(23:26
bmwrbasak: got it23:31
bmwprobably the best thing to run for that is our integration tests against a version of boulder (Let's Encrypt) running locally23:32
bmwwe have instructions for how to do this here: https://certbot.eff.org/docs/contributing.html#integration-testing-with-the-boulder-ca23:33
bmwbut they'll differ a bit when using it with the built packages23:34
bmwit's also worth noting that our integration tests aren't included in the built packages so the instructions for how to get and run them will be a bit different23:34
bmwI'm happy to write up something describing how to do this23:34
rbasakbmw: sounds good! If we can define these tests, would you be able to arrange to get them performed per proposed SRU? So for the 0.14.2 SRU, that'll be three times: for 16.04, 16.10 and 17.04.23:52
rbasak(16.10 will be EOL soon)23:52
rbasakbmw: if you could do that please, then we can put the test definition in the formal policy document for Ubuntu SRUs, and then use it as part of the release process.23:53
rbasakbmw: this is all that's left to define really. Apart from that, we're ready :)23:53
bmwthat's exciting :)23:54
bmwI'll write up how to do it and run them for the three versions of Ubuntu tomorrow23:54
rbasakThanks!23:55
rbasakbmw: no need to run them yet though. Let's define the process first. For the SRU we'll need them run against the proposed built packages, and we don't have those yet.23:56
bmwoh that's my misunderstanding23:56
bmwI thought those were done and reviewed23:57
rbasakThe code changes are ready and reviewed.23:57
rbasakAnd I've built locally and in a PPA etc.23:57
rbasakBut the build for publication to the Ubuntu archive is done in a separate environment. I can only push source to that, not binaries.23:57
bmwah okay23:58
bmwI'll probably need help in my instructions for how to install packages from there, but I'll write up the rest23:58
rbasakbmw: https://wiki.ubuntu.com/Testing/EnableProposed - this might be a little out of date. The CLI method should still work.23:59

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!