[00:11] Is it possible to have the hashes and an InRelease file at the component level of a repo, as opposed to the .com/dists/ubuntu/Release file? [00:12] Nothing to stop you preparing such a thing, though some assembly would be required. [00:13] https://wiki.debian.org/DebianRepository/Format may be helpful. [00:13] cjwatson, the question is will apt handle it the same? I'm about to write the logic just hoping someone would have some insight before I spent all the time [00:14] Sort of. You'd have to write an explicit path in sources.list, since apt special-cases the dists/$suite/InRelease lookup. [00:14] The obvious question would be why bother ... [00:16] (It's a fair bit of work, and doesn't seem to buy much) [00:18] Yeah, i'm not even sure how to explain the situation without writing a book. Basically we serve custom compiled software that are drop-in replacements (in this case for ubuntu/debian), and we treat each component as an independent object. There's reasons beyond that, but that's the gist of it. [00:18] Thanks cjwatson [00:19] by "custom compiled" I mean the entire public repo, but compiled differently [00:19] johnnyfive: Right, but none of that requires changing the layout. [00:19] johnnyfive: It's certainly possible to have pretty much whatever layout you want, though; it can just end up looking a bit odd in sources.list. [00:20] I see. Ya trying to avoid non-standardness from the clients perspective. [00:20] (you tend to end up writing "./" in place of the component) [00:20] ah [00:20] johnnyfive: You could just have a bunch of separate repositories. [00:21] cjwatson, ya that's an option. [00:21] and might be what we do.. we'll see. thank you again [00:21] johnnyfive: Anyway, InRelease lists the relative paths to the other index files that make up the repository, so you have some flexibiility in how that's laid out if you want to use it. [00:21] *flexibility [00:22] np [06:59] Grump. [06:59] Why has snapd suddenly decided to die. [07:01] ”error: cannot parse /proc/self/mountinfo: incorrect number of tail fields, expected 3 but found 5”. Hrm. This is probably due to me not running an Ubuntu kernel? [07:12] That'd be my guess, yes. [07:16] RAOF: https://github.com/snapcore/snapd/pull/4969 [07:17] RAOF: Might want to dogpile on that if it fixes fstab but not mountinfo (but maybe the same codepath) [07:19] RAOF: Oh, the commit message mentions both, so yeah. [07:21] …bcachefs /dev/nvme0n1:/dev/sda3… [07:21] I suspect things are confused by the “:” in there. [07:21] RAOF: Perhaps. Perhaps not. But that commit just makes it skip over entries it doesn't like instead of exploding. [07:22] Which seems entirely reasonable, given that I can't figure out why snapd needs to parse fstab/mountinfo in the first place. :P [07:23] RAOF: I imagine rolling back to the artful-updates version until the above lands should do the trick. [07:24] Or snag an older bionic binary from the librarian. [07:24] infinity: I think snapd is parsing mountinfo in order to do crazy things in the presence of NFS. [07:24] Yah. [07:24] RAOF: Oh, I'm sure it has its reasons. I'm just not sure I'd agree with them if I dug into it, so I've chosen to remain ignorant. [07:24] :P === est31 is now known as est === fnordahl_ is now known as fnordahl [08:36] infinity: Harumph. I think the change must have been made in the core snap, because installing old snapd versions doesn't change the behaviour at all. [08:41] I'm annoyed by submittodebian using --include rather than --attach for the debdiff, IMO this just makes things harder to apply and the email very long :/ [08:48] Oh I can fix that [08:58] tjaalton: you want to subscribe ubuntu-mir for 1761095 ... [09:05] root 15001 0.0 0.0 15868 3328 pts/0 S+ 09:56 0:00 | | \_ /bin/sh /var/lib/dpkg/info/lxd.postinst configure 3.0.0-0ubuntu1 [09:05] root 15259 0.0 0.0 67860 5748 pts/0 S+ 09:57 0:00 | | \_ /bin/systemctl restart lxd-containers.service [09:05] root 15263 0.0 0.0 61796 3060 pts/0 S+ 09:57 0:00 | | \_ /bin/systemd-tty-ask-password-agent --watch [09:05] this is odd... [09:05] stgraber, is it normal that upgrading lxd takes a long time, and blocks? [09:06] * xnox wonders if it is my own fault of suspending the desktop whilst upgrades are running [09:07] killed systemctl restart, and the upgrade continued..... [09:24] rbalint: rax-nova-agent promoted. it needs seeding somewhere, or a reference in a package [09:46] doko, rbalint - probably into the platform cloud supported seed, at the very least. [09:47] done [09:48] juliank: missing test dep? https://launchpad.net/ubuntu/+source/socat/1.7.3.2-2ubuntu1/+build/14528471 [09:49] doko: apparently :( [09:49] I wish I had working sbuilds [09:50] (no I don't want to use chroots, I want to use lxd containers) [09:51] we are definitely missing an up-to-date description how to run autopkg tests locally [09:52] Oh, autopkgtest are fine, but these are build-time tests [09:54] doko: http://packaging.ubuntu.com/html/auto-pkg-test.html#executing-the-test definitely? [09:54] * juliank runs build in lxc container with net-tools b-d added [09:55] Laney: qemu, not lxd? [09:55] qemu is definitely a good choice [09:55] too many problems with lxd [09:56] some tests need machine-isolation, others just don't work in lxd [09:56] and only armhf uses lxd IIRC [09:57] Right, but sometimes failures are lxd failures rather than armhf failures and for those it's good to be able to run lxd tests locally [09:59] Laney: yes, but still qemu is the only documented way in that page [10:01] The initial complaint was that we were "definitely missing an up-to-date description how to run autopkg tests locally", not that the page we have doesn't precisely specify how tests are run on autopkgtest.u.c. We are not "definitely missing an up-to-date description how to run autopkg tests locally". [10:02] that's true [10:03] But maybe it would be a good idea if it can be done simply --- https://code.launchpad.net/~ubuntu-packaging-guide-team/ubuntu-packaging-guide/trunk is pushable to by all developers if somebody wanted to addd that. [10:03] now i wonder whether we want autopkgtest-virt-multipass ... [10:04] If it were me I'd use the SSH runner for new virt types, and write setup scripts for those [10:04] instead of new autopktest-virt-foo [10:04] I found a nice wikipage or somesuch detailing concisely how to use autopkgtests, but I have lost it. === rbalint_ is now known as rbalint === lag_ is now known as lag === DrKranz is now known as DktrKranz === ivoks_ is now known as ivoks === Elimin8r is now known as Elimin8er === Spads_ is now known as Spads === mapreri_ is now known as mapreri === Beret- is now known as Beret [10:26] doko: oh indeed === masACC is now known as maswan === oSoMoN_ is now known as oSoMoN === niedbalski_ is now known as niedbalski [10:55] doko: ubuntu2 should fix that [10:55] (the tests pass in PPA now) === shadeslayer_ is now known as shadeslayer === stub` is now known as stub === alai` is now known as alai [12:04] jbicha_: what exactly keeps gnome2 in main? openjdk removed it's dependencies === jbicha_ is now known as jbicha === thegodfather is now known as fabbione [12:12] doko: you mean gtk2? [12:18] bdmurray, did you ever see my tasksel patch bug on 1751546 === darkxst_ is now known as darkxst [12:31] jbicha: yes [12:32] reverse-depends -c main src:gtk+2.0 [12:33] nvidia-settings is an alternate dependency so not important (and I tried arguing for its removal…) LP: #1736617 [12:33] Launchpad bug 1736617 in nvidia-settings (Ubuntu) "Port nvidia-settings to gtk3" [Undecided,Fix released] https://launchpad.net/bugs/1736617 [12:33] I think it will be safe to drop the thunderbird dependency on gtk2 with thunderbird 60 (52 still supports non-Flash NPAPI plugins) [12:34] that leaves gparted and a few input methods: those are only used on the live ISO (unless you use one of those languages) [12:36] the new Community theme recently got a dependency on gtk2-engines-pixbuf for gtk2 support, but at least it doesn't directly depend on libgtk2.0-0 [12:37] so I expect Ubuntu 18.04.1 to not include libgtk2.0-0 in the default install (assumes Thunderbird is updated by then) [12:37] (yes, I checked that before promoting) [12:50] jbicha: what about gparted? [12:53] xnox: when working on mongodb 3.6, did you ever get a hang on tests? [12:53] I'm seeing "./dbtest --list" hang. [12:53] um, you want to switch to gnome-disks? gparted doesn't support Wayland so that's actually a technical justification… [12:53] Haven't dug into it deeper yet. [12:53] (obviously, not for 18.04 but maybe for 18.10) [14:24] juliank, can you join #ubuntu-kernel? [14:24] please [14:28] rbasak, hmmm... i do not see my reply in scrollback. I had hanging tests and failures; i did not debug all of them; I did manage to get the stripped down build to pass on bionic with patches. But not a full one. [14:29] rbasak, make sure you do not run out of disk space; and that test binaries are stripped; and that you have networking available; these are the top culprits to check for. [14:34] * juliank wants more people to use the daily apt builds in the PPA https://launchpad.net/~deity/+archive/ubuntu/sid - testing stuff is nice :D (devel only, really; though it also builds current stable...) [14:36] juliank: post to Planets, post to https://ubuntuforums.org/forumdisplay.php?f=427 , post to https://community.ubuntu.com/ [14:37] well, preferably developers, not the average user :) [14:37] developers might be more risk-averse than the ubuntu+1 testers ;) [14:38] I should just have a cron job that copy-packages the PPA package to devel [14:38] for instance, a lot of people on that forum run bionic-proposed even though they know we don't recommend that… [14:38] yeah, but then I get the problems from that reported as my problems [14:39] yeah, I try not to maintain PPAs these days :) === Eleventh_Doctor is now known as Pharaoh_Atem [14:39] anyhow, I use that repo, and I don't perform any checks when doing releases - a release is basically just a random snapshot [14:40] (everything on master passes CI essentially, and that's the requirement for a release too, apart from feature completeness) [14:40] though, if we do break ABI/API soon, things might be different, hmm [14:42] (as in, cache files might change in incompatible ways in snapshots but have same version in them) === dosaboy_ is now known as dosaboy [14:58] xnox: OK, thanks === simonquigley is now known as tsimonq2 === rumble is now known as grumble === sarnold_ is now known as sarnold [20:50] slangasek: pam is still missing that NMU from debian to add support for pam-auth-update --enable, do you want to merge that or can I add that (and just that)? [20:51] tjaalton: feel free to add it. I was somewhat blocked on making further changes to pam waiting for server team to do something with https://code.launchpad.net/~vorlon/ubuntu/+source/pam/+git/pam/+merge/341556 [20:51] nacc: ^^ ? [20:52] oh, and that merge now shows a bunch of conflicts, how did that happen [20:53] ah right, I remember this now [20:54] nacc: a merge being invalidated because I now have conflicts, when the thing I'm proposing for merge is the actual content of the archive, gives me flashbacks to the bzr udd [21:49] slangasek: looking, one moment [21:50] slangasek: debian moved ahead of your base [21:50] slangasek: so it is a merge conflict in Git terms [21:50] slangasek: since the target of your LP merge is a branch and not a tag (which I believe actually isn't supported while technically possible) [21:51] slangasek: 1.1.8-3.7 specifically, is in debian/sid and not an ancestor of your branch [21:51] slangasek: so a rebase and force push should fix that [21:51] nacc: indeed; but process-wise, that really seems like it shouldn't invalidate the mp [21:51] slangasek: it's because of how LP figures out your target [21:51] slangasek: i *believe* it doesn't save the commit hash of when it ran [21:51] but i'm not sure [21:51] cjwatson: --^ perhaps you can say? [21:52] slangasek: we have worked aroudn this on our team by doing the MP review manually [21:52] (ignoring hte LP UX) to merge to an older Debian version than the latest [21:53] nacc: ok, so in principle the fact that LP has moved on should also not make more work for me, it's just a question still of someone on the server team reviewing and merging that? [21:53] slangasek: right, and it will still show up in your grep-merges after that [21:53] since debian would be ahead of our base in ubuntu [21:53] but it's technically possible to review as-is, and I'll try and do that now [21:55] slangasek: this is a gap because we aren't actually doing a Git merge in our process [21:55] ah :) [21:56] we are taking your proposed source and tagging it, then the importer integrates it as 'rich history' [21:56] but there's no way to 'review' a branch in a nice way other than MPs currently [21:56] well, there is, but it's mailing lists or manually [21:58] slangasek: oh wait, this was already uploaded? [22:00] slangasek: so, because it was already imported (and we've already reimported pam), we won't see any upload tag i create now [22:00] I *can* create one, so that on a future reimport, if it occurs, it will get integrated (I see the trees match, so it will) [22:01] juliank: https://sourceforge.net/p/squashfs/code/ci/e38956b92f738518c29734399629e7cdb33072d3/ [22:06] slangasek: in any case, that means that MP doesn't really mean much (it's effectively done) [22:15] nacc: ok, so the mp should be rejected? [22:15] slangasek: i can either push an upload tag so it's at least preserved in the future (but not integrated until someone does a reimport, if they do) or i can reject it [22:16] nacc: it was a fair amount of work to create that branch, I'd rather the rich history not be lost [22:16] slangasek: ack, one moment [22:16] slangasek: i'm well aware this is a bottleneck [22:17] slangasek: we plan on fixing this long-term a la dgit by writing the hash into the source upload [22:17] slangasek: and then teaching our importer to look for that field, and querying LP for the corresponding Git commit [22:18] * slangasek nods [22:19] i'm not 100% on what the 'right' state is [22:19] i'll mark it as merged, even though it's not actually :) [22:19] but it's available in the importer repo now (git fetch pkg should bring down an upload tag) [22:42] nacc: that doesn't sound like an accurate description of what's going on; it's more that the point of a merge is, well, to be merged, so there isn't much point in saying that there wasn't a merge conflict when the target was what it was originally [22:42] put another way, there's *never* a merge conflict against the merge base, by definition [22:43] cjwatson: you're right === mwhudson_ is now known as mwhudson [22:43] (I haven't looked at this MP specifically, just general comments) [22:43] cjwatson: but the issue we ran into is you can't specify a merge to a tag [22:43] or an arbitrary ref, really [22:44] nacc: sure, because you couldn't land such a thing [22:44] cjwatson: right :) [22:44] well, not without knowing how we do land them :) [22:44] cjwatson: we really don't want users to do branch manipulation because it's so easy to get wrong [22:44] merges to tags are nonsensical by definition [22:44] but we need to reivew things that will end up resulting in branch manipulation, if that makes sense [22:45] the only reason it even came up was that you were trying to use it as a diff generation mechanism [22:45] because we're not really doing Git merges in the first place :) [22:45] which you might be better off doing by way of constructing cgit URLs on git.launchpad.net [22:45] yeah [22:45] nacc: so how would I land the feature to pam-auth-update from -3.7? just upload or should it go via a merge proposal? [22:45] tjaalton: that's completely up to you :) [22:46] tjaalton: there is no requirement for anyone to use the Git repositories [22:46] tjaalton: however, you can provide rich history there, which can helpful :) [22:47] nacc: ah ok. well there's not that much history, other than on the bug.. [22:47] tjaalton: right [22:47] well, if the result of the next pam upload is that the rich history I created by preparing that mp is thrown away, there will be some table-flipping here [22:47] so the easy answer then, is use the upload tag as a starting point [22:47] tjaalton: --^ [22:47] alright [22:47] and do a change on top [22:48] sure [22:48] propose iit as an MP to ubuntu/devel, and i'll tag it [22:48] tjaalton: just don't dput until i tag it :) [22:49] slangasek: then your rich history will be integrated at that point :) [22:49] that would be lovely [22:49] ok, I'll look into it tomorrow [22:49] nacc: now, how can this be self-serve instead of blocking on a team of reviewers who are a small subset of uploaders [22:50] slangasek: that's coming up next (once main is imported) [22:50] ok [22:50] slangasek: we want people who can upload to a source package to be able to mark the MPs as approved [22:50] actually, scratch that, we do want that, but that doesn't answer your question [22:51] we have two approaches, and it's mostly about time/getting it right [22:51] short-term: uploaders of a srcpkg can mark an MP as approved, the importer can look for approved MPs when it processes a new upload and integrate them [22:51] (basically, as if they were upload tagged, without using upload tags) [22:51] long-term: writing the hash into the source pkg before dput [22:53] slangasek: in both cases, the uploader rights would determine the importer getting 'here is where rich history is' data [22:53] * slangasek nods [23:02] do you know how to stream webrtc from /dev/video0 ? [23:02] stanford_AI: please stop crossposting [23:02] stanford_AI: also this is 100% the wrong channel. [23:02] why's that? [23:03] stanford_AI: this channel is for development of Ubuntu (see /topic) [23:03] where do i go for app devel? [23:03] !alis | stanford_AI [23:03] stanford_AI: Alis is an IRC service to help you find channels. For help on using it, see "/msg Alis help list" or ask in #freenode. Example usage: "/msg Alis list http" [23:04] * stanford_AI msg Alis help list [23:08] Topic also mentions a channel. [23:13] Anyone familiar with how a Secure Boot via shimx64.efi is expected to handle the /EFI/ubuntu/grub.cfg ? Got a user where with S.B. enable it seems that might be be accessed causing grub to drop to the grub> shell. With S.B. off it works as expected. [23:14] s/might be be/might NOT be/ [23:17] TJ-: using grubx64 insteda of the shim [23:17] TJ-: are you sure that /EFI/ubuntu/grub.cfg is the issue, and not whatever /EFI/ubuntu/grub.cfg chains to? [23:18] roaksoax: right, the FW is cut-down/lock-down, so the boot menu has 2 options (shimx64.efi and grubx64.efi) but in S.B. mode only the shimx64.efi entry is available [23:18] TJ-: the difference between booting with secureboot on, and booting with secureboot off, is whether grub is allowed to load additional filesystem modules from disk [23:19] slangasek: yes, it contains the "search.fs_uuid " which matches the root-fs, but in S.B. mode the boot drops to "grub>" shell, without S.B. it boots fine [23:19] slangasek: right, I'm wondering if this FW is 'customised' and is blocking any non-signed files, not just modules [23:19] not possible [23:19] what is the root fs? [23:20] slangasek: FS type? ext4 [23:20] interesting [23:21] lsblk: https://paste.ubuntu.com/p/gQwbjvjdRb/ /EFI/ubuntu/grub.cfg: https://paste.ubuntu.com/p/chwS3YqHzY/ ls /boot/efi/ https://paste.ubuntu.com/p/K9SDxGy76N/ efibootmgr: https://paste.ubuntu.com/p/dC93rQyxFp/ [23:24] TJ-: how about the contents of /boot/grub/grub.cfg? [23:25] slangasek: I'll get them, I'm persuading the user to create a bug report now so we can capture the info [23:25] fwiw, this looks like https://bugs.launchpad.net/maas/+bug/1711203 [23:25] Launchpad bug 1711203 in shim (Ubuntu) "Deployments fail when Secure Boot enabled" [High,In progress] [23:27] roaksoax: thanks, no that's not it, we never get that far. the grub menu is never reached :) === pde_was_stolen is now known as pdeee [23:28] TJ-: ok. bug reports against the shim-signed package in spanish are fine :P [23:29] slangasek: :) the only report close but has no follow up or decent details is Bug #1110080 [23:29] bug 1110080 in grub2 (Ubuntu) "[grub2] need to use grub command to boot kernel in UEFI Security boot" [Undecided,New] https://launchpad.net/bugs/1110080 [23:30] "But after this grub2 run, the system enter into grub shell, it seems it doesn't load grub.cfg file." [23:40] User's bug report with attached files Bug #1761336 [23:40] bug 1761336 in grub2 (Ubuntu) "Drops to grub> prompt in Secure Boot Mode" [Low,Confirmed] https://launchpad.net/bugs/1761336