/srv/irclogs.ubuntu.com/2018/04/04/#ubuntu-devel.txt

johnnyfiveIs it possible to have the hashes and an InRelease file at the component level of a repo, as opposed to the .com/dists/ubuntu/Release file?00:11
cjwatsonNothing to stop you preparing such a thing, though some assembly would be required.00:12
cjwatsonhttps://wiki.debian.org/DebianRepository/Format may be helpful.00:13
johnnyfivecjwatson, the question is will apt handle it the same? I'm about to write the logic just hoping someone would have some insight before I spent all the time00:13
cjwatsonSort of.  You'd have to write an explicit path in sources.list, since apt special-cases the dists/$suite/InRelease lookup.00:14
cjwatsonThe obvious question would be why bother ...00:14
cjwatson(It's a fair bit of work, and doesn't seem to buy much)00:16
johnnyfiveYeah, i'm not even sure how to explain the situation without writing a book. Basically we serve custom compiled software that are drop-in replacements (in this case for ubuntu/debian), and we treat each component as an independent object. There's reasons beyond that, but that's the gist of it.00:18
johnnyfiveThanks cjwatson00:18
johnnyfiveby "custom compiled" I mean the entire public repo, but compiled differently00:19
cjwatsonjohnnyfive: Right, but none of that requires changing the layout.00:19
cjwatsonjohnnyfive: It's certainly possible to have pretty much whatever layout you want, though; it can just end up looking a bit odd in sources.list.00:19
johnnyfiveI see. Ya trying to avoid non-standardness from the clients perspective.00:20
cjwatson(you tend to end up writing "./" in place of the component)00:20
johnnyfiveah00:20
cjwatsonjohnnyfive: You could just have a bunch of separate repositories.00:20
johnnyfivecjwatson, ya that's an option.00:21
johnnyfiveand might be what we do.. we'll see. thank you again00:21
cjwatsonjohnnyfive: Anyway, InRelease lists the relative paths to the other index files that make up the repository, so you have some flexibiility in how that's laid out if you want to use it.00:21
cjwatson*flexibility00:21
cjwatsonnp00:22
RAOFGrump.06:59
RAOFWhy has snapd suddenly decided to die.06:59
RAOF”error: cannot parse /proc/self/mountinfo: incorrect number of tail fields, expected 3 but found 5”. Hrm. This is probably due to me not running an Ubuntu kernel?07:01
FauxThat'd be my guess, yes.07:12
infinityRAOF: https://github.com/snapcore/snapd/pull/496907:16
infinityRAOF: Might want to dogpile on that if it fixes fstab but not mountinfo (but maybe the same codepath)07:17
infinityRAOF: Oh, the commit message mentions both, so yeah.07:19
RAOF…bcachefs /dev/nvme0n1:/dev/sda3…07:21
RAOFI suspect things are confused by the “:” in there.07:21
infinityRAOF: Perhaps.  Perhaps not.  But that commit just makes it skip over entries it doesn't like instead of exploding.07:21
infinityWhich seems entirely reasonable, given that I can't figure out why snapd needs to parse fstab/mountinfo in the first place. :P07:22
infinityRAOF: I imagine rolling back to the artful-updates version until the above lands should do the trick.07:23
infinityOr snag an older bionic binary from the librarian.07:24
RAOFinfinity: I think snapd is parsing mountinfo in order to do crazy things in the presence of NFS.07:24
RAOFYah.07:24
infinityRAOF: Oh, I'm sure it has its reasons.  I'm just not sure I'd agree with them if I dug into it, so I've chosen to remain ignorant.07:24
RAOF:P07:24
=== est31 is now known as est
=== fnordahl_ is now known as fnordahl
RAOFinfinity: Harumph. I think the change must have been made in the core snap, because installing old snapd versions doesn't change the behaviour at all.08:36
juliankI'm annoyed by submittodebian using --include rather than --attach for the debdiff, IMO this just makes things harder to apply and the email very long :/08:41
juliankOh I can fix that08:48
dokotjaalton: you want to subscribe ubuntu-mir for 1761095 ...08:58
xnoxroot     15001  0.0  0.0  15868  3328 pts/0    S+   09:56   0:00  |   |               \_ /bin/sh /var/lib/dpkg/info/lxd.postinst configure 3.0.0-0ubuntu109:05
xnoxroot     15259  0.0  0.0  67860  5748 pts/0    S+   09:57   0:00  |   |                   \_ /bin/systemctl restart lxd-containers.service09:05
xnoxroot     15263  0.0  0.0  61796  3060 pts/0    S+   09:57   0:00  |   |                       \_ /bin/systemd-tty-ask-password-agent --watch09:05
xnoxthis is odd...09:05
xnoxstgraber, is it normal that upgrading lxd takes a long time, and blocks?09:05
* xnox wonders if it is my own fault of suspending the desktop whilst upgrades are running09:06
xnoxkilled systemctl restart, and the upgrade continued.....09:07
dokorbalint: rax-nova-agent promoted. it needs seeding somewhere, or a reference in a package09:24
xnoxdoko, rbalint - probably into the platform cloud supported seed, at the very least.09:46
xnoxdone09:47
dokojuliank: missing test dep? https://launchpad.net/ubuntu/+source/socat/1.7.3.2-2ubuntu1/+build/1452847109:48
juliankdoko: apparently :(09:49
juliankI wish I had working sbuilds09:49
juliank(no I don't want to use chroots, I want to use lxd containers)09:50
dokowe are definitely missing an up-to-date description how to run autopkg tests locally09:51
juliankOh, autopkgtest are fine, but these are build-time tests09:52
Laneydoko: http://packaging.ubuntu.com/html/auto-pkg-test.html#executing-the-test definitely?09:54
* juliank runs build in lxc container with net-tools b-d added09:54
dokoLaney: qemu, not lxd?09:55
juliankqemu is definitely a good choice09:55
julianktoo many problems with lxd09:55
julianksome tests need machine-isolation, others just don't work in lxd09:56
juliankand only armhf uses lxd IIRC09:56
LaneyRight, but sometimes failures are lxd failures rather than armhf failures and for those it's good to be able to run lxd tests locally09:57
juliankLaney: yes, but still qemu is the only documented way in that page09:59
LaneyThe initial complaint was that we were "definitely missing an up-to-date description how to run autopkg tests locally", not that the page we have doesn't precisely specify how tests are run on autopkgtest.u.c. We are not "definitely missing an up-to-date description how to run autopkg tests locally".10:01
juliankthat's true10:02
LaneyBut maybe it would be a good idea if it can be done simply --- https://code.launchpad.net/~ubuntu-packaging-guide-team/ubuntu-packaging-guide/trunk is pushable to by all developers if somebody wanted to addd that.10:03
julianknow i wonder whether we want autopkgtest-virt-multipass ...10:03
LaneyIf it were me I'd use the SSH runner for new virt types, and write setup scripts for those10:04
Laneyinstead of new autopktest-virt-foo10:04
Unit193I found a nice wikipage or somesuch detailing concisely how to use autopkgtests, but I have lost it.10:04
=== rbalint_ is now known as rbalint
=== lag_ is now known as lag
=== DrKranz is now known as DktrKranz
=== ivoks_ is now known as ivoks
=== Elimin8r is now known as Elimin8er
=== Spads_ is now known as Spads
=== mapreri_ is now known as mapreri
=== Beret- is now known as Beret
tjaaltondoko: oh indeed10:26
=== masACC is now known as maswan
=== oSoMoN_ is now known as oSoMoN
=== niedbalski_ is now known as niedbalski
juliankdoko: ubuntu2 should fix that10:55
juliank(the tests pass in PPA now)10:55
=== shadeslayer_ is now known as shadeslayer
=== stub` is now known as stub
=== alai` is now known as alai
dokojbicha_: what exactly keeps gnome2 in main? openjdk removed it's dependencies12:04
=== jbicha_ is now known as jbicha
=== thegodfather is now known as fabbione
jbichadoko: you mean gtk2?12:12
darkxst_bdmurray, did you ever see my tasksel patch bug on 175154612:18
=== darkxst_ is now known as darkxst
dokojbicha: yes12:31
jbichareverse-depends -c main src:gtk+2.012:32
jbichanvidia-settings is an alternate dependency so not important (and I tried arguing for its removal…) LP: #173661712:33
ubottuLaunchpad bug 1736617 in nvidia-settings (Ubuntu) "Port nvidia-settings to gtk3" [Undecided,Fix released] https://launchpad.net/bugs/173661712:33
jbichaI think it will be safe to drop the thunderbird dependency on gtk2 with thunderbird 60 (52 still supports non-Flash NPAPI plugins)12:33
jbichathat leaves gparted and a few input methods: those are only used on the live ISO (unless you use one of those languages)12:34
jbichathe new Community theme recently got a dependency on gtk2-engines-pixbuf for gtk2 support, but at least it doesn't directly depend on libgtk2.0-012:36
jbichaso I expect Ubuntu 18.04.1 to not include libgtk2.0-0 in the default install (assumes Thunderbird is updated by then)12:37
didrocks(yes, I checked that before promoting)12:37
dokojbicha: what about gparted?12:50
rbasakxnox: when working on mongodb 3.6, did you ever get a hang on tests?12:53
rbasakI'm seeing "./dbtest --list" hang.12:53
jbichaum, you want to switch to gnome-disks? gparted doesn't support Wayland so that's actually a technical justification…12:53
rbasakHaven't dug into it deeper yet.12:53
jbicha(obviously, not for 18.04 but maybe for 18.10)12:53
xnoxjuliank, can you join #ubuntu-kernel?14:24
xnoxplease14:24
xnoxrbasak, hmmm...  i do not see my reply in scrollback. I had hanging tests and failures; i did not debug all of them; I did manage to get the stripped down build to pass on bionic with patches. But not a full one.14:28
xnoxrbasak, make sure you do not run out of disk space; and that test binaries are stripped; and that you have networking available; these are the top culprits to check for.14:29
* juliank wants more people to use the daily apt builds in the PPA https://launchpad.net/~deity/+archive/ubuntu/sid - testing stuff is nice :D (devel only, really; though it also builds current stable...)14:34
jbichajuliank: post to Planets, post to https://ubuntuforums.org/forumdisplay.php?f=427 , post to https://community.ubuntu.com/14:36
juliankwell, preferably developers, not the average user :)14:37
jbichadevelopers might be more risk-averse than the ubuntu+1 testers ;)14:37
juliankI should just have a cron job that copy-packages the PPA package to devel14:38
jbichafor instance, a lot of people on that forum run bionic-proposed even though they know we don't recommend that…14:38
juliankyeah, but then I get the problems from that reported as my problems14:38
jbichayeah, I try not to maintain PPAs these days :)14:39
=== Eleventh_Doctor is now known as Pharaoh_Atem
juliankanyhow, I use that repo, and I don't perform any checks when doing releases - a release is basically just a random snapshot14:39
juliank(everything on master passes CI essentially, and that's the requirement for a release too, apart from feature completeness)14:40
juliankthough, if we do break ABI/API soon, things might be different, hmm14:40
juliank(as in, cache files might change in incompatible ways in snapshots but have same version in them)14:42
=== dosaboy_ is now known as dosaboy
rbasakxnox: OK, thanks14:58
=== simonquigley is now known as tsimonq2
=== rumble is now known as grumble
=== sarnold_ is now known as sarnold
tjaaltonslangasek: pam is still missing that NMU from debian to add support for pam-auth-update --enable, do you want to merge that or can I add that (and just that)?20:50
slangasektjaalton: feel free to add it.  I was somewhat blocked on making further changes to pam waiting for server team to do something with https://code.launchpad.net/~vorlon/ubuntu/+source/pam/+git/pam/+merge/34155620:51
slangaseknacc: ^^ ?20:51
slangasekoh, and that merge now shows a bunch of conflicts, how did that happen20:52
tjaaltonah right, I remember this now20:53
slangaseknacc: a merge being invalidated because I now have conflicts, when the thing I'm proposing for merge is the actual content of the archive, gives me flashbacks to the bzr udd20:54
naccslangasek: looking, one moment21:49
naccslangasek: debian moved ahead of your base21:50
naccslangasek: so it is a merge conflict in Git terms21:50
naccslangasek: since the target of your LP merge is a branch and not a tag (which I believe actually isn't supported while technically possible)21:50
naccslangasek: 1.1.8-3.7 specifically, is in debian/sid and not an ancestor of your branch21:51
naccslangasek: so a rebase and force push should fix that21:51
slangaseknacc: indeed; but process-wise, that really seems like it shouldn't invalidate the mp21:51
naccslangasek: it's because of how LP figures out your target21:51
naccslangasek: i *believe* it doesn't save the commit hash of when it ran21:51
naccbut i'm not sure21:51
nacccjwatson: --^ perhaps you can say?21:51
naccslangasek: we have worked aroudn this on our team by doing the MP review manually21:52
nacc(ignoring hte LP UX) to merge to an older Debian version than the latest21:52
slangaseknacc: ok, so in principle the fact that LP has moved on should also not make more work for me, it's just a question still of someone on the server team reviewing and merging that?21:53
naccslangasek: right, and it will still show up in your grep-merges after that21:53
naccsince debian would be ahead of our base in ubuntu21:53
naccbut it's technically possible to review as-is, and I'll try and do that now21:53
naccslangasek: this is a gap because we aren't actually doing a Git merge in our process21:55
slangasekah :)21:55
naccwe are taking your proposed source and tagging it, then the importer integrates it as 'rich history'21:56
naccbut there's no way to 'review' a branch in a nice way other than MPs currently21:56
naccwell, there is, but it's mailing lists or manually21:56
naccslangasek: oh wait, this was already uploaded?21:58
naccslangasek: so, because it was already imported (and we've already reimported pam), we won't see any upload tag i create now22:00
naccI *can* create one, so that on a future reimport, if it occurs, it will get integrated (I see the trees match, so it will)22:00
Unit193juliank: https://sourceforge.net/p/squashfs/code/ci/e38956b92f738518c29734399629e7cdb33072d3/22:01
naccslangasek: in any case, that means that MP doesn't really mean much (it's effectively done)22:06
slangaseknacc: ok, so the mp should be rejected?22:15
naccslangasek: i can either push an upload tag so it's at least preserved in the future (but not integrated until someone does a reimport, if they do) or i can reject it22:15
slangaseknacc: it was a fair amount of work to create that branch, I'd rather the rich history not be lost22:16
naccslangasek: ack, one moment22:16
naccslangasek: i'm well aware this is a bottleneck22:16
naccslangasek: we plan on fixing this long-term a la dgit by writing the hash into the source upload22:17
naccslangasek: and then teaching our importer to look for that field, and querying LP for the corresponding Git commit22:17
* slangasek nods22:18
nacci'm not 100% on what the 'right' state is22:19
nacci'll mark it as merged, even though it's not actually :)22:19
naccbut it's available in the importer repo now (git fetch pkg should bring down an upload tag)22:19
cjwatsonnacc: that doesn't sound like an accurate description of what's going on; it's more that the point of a merge is, well, to be merged, so there isn't much point in saying that there wasn't a merge conflict when the target was what it was originally22:42
cjwatsonput another way, there's *never* a merge conflict against the merge base, by definition22:42
nacccjwatson: you're right22:43
=== mwhudson_ is now known as mwhudson
cjwatson(I haven't looked at this MP specifically, just general comments)22:43
nacccjwatson: but the issue we ran into is you can't specify a merge to a tag22:43
naccor an arbitrary ref, really22:43
cjwatsonnacc: sure, because you couldn't land such a thing22:44
nacccjwatson: right :)22:44
naccwell, not without knowing how we do land them :)22:44
nacccjwatson: we really don't want users to do branch manipulation because it's so easy to get wrong22:44
cjwatsonmerges to tags are nonsensical by definition22:44
naccbut we need to reivew things that will end up resulting in branch manipulation, if that makes sense22:44
cjwatsonthe only reason it even came up was that you were trying to use it as a diff generation mechanism22:45
naccbecause we're not really doing Git merges in the first place :)22:45
cjwatsonwhich you might be better off doing by way of constructing cgit URLs on git.launchpad.net22:45
naccyeah22:45
tjaaltonnacc: so how would I land the feature to pam-auth-update from -3.7? just upload or should it go via a merge proposal?22:45
nacctjaalton: that's completely up to you :)22:45
nacctjaalton: there is no requirement for anyone to use the Git repositories22:46
nacctjaalton: however, you can provide rich history there, which can helpful :)22:46
tjaaltonnacc: ah ok. well there's not that much history, other than on the bug..22:47
nacctjaalton: right22:47
slangasekwell, if the result of the next pam upload is that the rich history I created by preparing that mp is thrown away, there will be some table-flipping here22:47
naccso the easy answer then, is use the upload tag as a starting point22:47
nacctjaalton: --^22:47
tjaaltonalright22:47
naccand do a change on top22:47
tjaaltonsure22:48
naccpropose iit as an MP to ubuntu/devel, and i'll tag it22:48
nacctjaalton: just don't dput until i tag it :)22:48
naccslangasek: then your rich history will be integrated at that point :)22:49
slangasekthat would be lovely22:49
tjaaltonok, I'll look into it tomorrow22:49
slangaseknacc: now, how can this be self-serve instead of blocking on a team of reviewers who are a small subset of uploaders22:49
naccslangasek: that's coming up next (once main is imported)22:50
slangasekok22:50
naccslangasek: we want people who can upload to a source package to be able to mark the MPs as approved22:50
naccactually, scratch that, we do want that, but that doesn't answer your question22:50
naccwe have two approaches, and it's mostly about time/getting it right22:51
naccshort-term: uploaders of a srcpkg can mark an MP as approved, the importer can look for approved MPs when it processes a new upload and integrate them22:51
nacc(basically, as if they were upload tagged, without using upload tags)22:51
nacclong-term: writing the hash into the source pkg before dput22:51
naccslangasek: in both cases, the uploader rights would determine the importer getting 'here is where rich history is' data22:53
* slangasek nods22:53
stanford_AIdo you know how to stream webrtc from /dev/video0 ?23:02
naccstanford_AI: please stop crossposting23:02
naccstanford_AI: also this is 100% the wrong channel.23:02
stanford_AIwhy's that?23:02
naccstanford_AI: this channel is for development of Ubuntu (see /topic)23:03
stanford_AIwhere do i go for app devel?23:03
nacc!alis | stanford_AI23:03
ubottustanford_AI: Alis is an IRC service to help you find channels. For help on using it, see "/msg Alis help list" or ask in #freenode. Example usage: "/msg Alis list http"23:03
* stanford_AI msg Alis help list23:04
Unit193Topic also mentions a channel.23:08
TJ-Anyone familiar with how a Secure Boot via shimx64.efi is expected to handle the /EFI/ubuntu/grub.cfg ? Got a user where with S.B. enable it seems that might be be accessed causing grub to drop to the grub> shell. With S.B. off it works as expected.23:13
TJ-s/might be be/might NOT be/23:14
roaksoaxTJ-: using grubx64 insteda of the shim23:17
slangasekTJ-: are you sure that /EFI/ubuntu/grub.cfg is the issue, and not whatever /EFI/ubuntu/grub.cfg chains to?23:17
TJ-roaksoax: right, the FW is cut-down/lock-down, so the boot menu has 2 options (shimx64.efi and grubx64.efi) but in S.B. mode only the shimx64.efi entry is available23:18
slangasekTJ-: the difference between booting with secureboot on, and booting with secureboot off, is whether grub is allowed to load additional filesystem modules from disk23:18
TJ-slangasek: yes, it contains the "search.fs_uuid " which matches the root-fs, but in S.B. mode the boot drops to "grub>" shell, without S.B. it boots fine23:19
TJ-slangasek: right, I'm wondering if this FW is 'customised' and is blocking any non-signed files, not just modules23:19
slangaseknot possible23:19
slangasekwhat is the root fs?23:19
TJ-slangasek: FS type? ext423:20
slangasekinteresting23:20
TJ-lsblk: https://paste.ubuntu.com/p/gQwbjvjdRb/   /EFI/ubuntu/grub.cfg:  https://paste.ubuntu.com/p/chwS3YqHzY/  ls /boot/efi/  https://paste.ubuntu.com/p/K9SDxGy76N/  efibootmgr:  https://paste.ubuntu.com/p/dC93rQyxFp/23:21
slangasekTJ-: how about the contents of /boot/grub/grub.cfg?23:24
TJ-slangasek: I'll get them, I'm persuading the user to create a bug report now so we can capture the info23:25
roaksoaxfwiw, this looks like https://bugs.launchpad.net/maas/+bug/171120323:25
ubottuLaunchpad bug 1711203 in shim (Ubuntu) "Deployments fail when Secure Boot enabled" [High,In progress]23:25
TJ-roaksoax: thanks, no that's not it, we never get that far. the grub menu is never reached :)23:27
=== pde_was_stolen is now known as pdeee
slangasekTJ-: ok. bug reports against the shim-signed package in spanish are fine :P23:28
TJ-slangasek: :) the only report close but has no follow up or decent details is  Bug #111008023:29
ubottubug 1110080 in grub2 (Ubuntu) "[grub2] need to use grub command to boot kernel in UEFI Security boot" [Undecided,New] https://launchpad.net/bugs/111008023:29
TJ-"But after this grub2 run, the system enter into grub shell, it seems it doesn't load grub.cfg file."23:30
TJ-User's bug report with attached files Bug #176133623:40
ubottubug 1761336 in grub2 (Ubuntu) "Drops to grub> prompt in Secure Boot Mode" [Low,Confirmed] https://launchpad.net/bugs/176133623:40

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!