/srv/irclogs.ubuntu.com/2018/11/05/#ubuntu-devel.txt

infinityQuerying Debian BTS for reports on libprelude (source)...06:05
infinityUnable to connect to Debian BTS (error: "TypeError("fixer() missing 1 required positional argument: 'check_hostname'",)"); continue [y|N|?]?06:05
infinitydoko, mwhudson: ^-- Does reportbug need a merge/fix for newer python bits?06:05
=== cpaelzer__ is now known as cpaelzer
dokoinfinity: where do you see that?06:31
mwhudsoninfinity: well isn't that great07:25
dokocoreycb: please could you have a look at the murano sync/merge and look at the autopkg test failures?08:34
dokocoreycb: same for ironic, libcloud08:37
dokojamespage: ^^^08:37
handsome_fengHi, Does anyone know how to unpack and repack the initrd? cpio -idv < ../initrd.img only got a AuthenticAMD.bin; and 'dd if=initrd bs=xxxx | lz4 | cpio -tdv | head' didn't work too.10:08
TJ-handsome_feng: "unmkinitramfs"10:15
seb128handsome_feng, unsure if that's still current/valid, but https://wiki.ubuntu.com/CustomizeLiveInitrd10:15
TJ-handsome_feng: you're dealing with an image that has an early-prefix for microcode on it10:15
handsome_fengTJ-, seb128 : Thanks! unmkinitramfs works and BTW the wiki page is out of date :)10:19
seb128handsome_feng, would be nice to update it if you have some free cycle for that :)10:20
TJ-seb128: I've been waiting to do some Wiki editing but it seems to take an age to get approved to the wiki editors team10:21
TJ-by the time it gets approved I'll have forgotten what it was I intended to edit :)10:21
seb128that seems suboptimal :/10:21
seb128unsure who can approve wiki editor nowadays10:22
TJ-oh yeah - malware at the target of some links10:22
seb128?10:22
TJ-domains expire/rot, get taken over by operators hosting malware payloads10:23
seb128popey, ^ you might know who is approving wiki-editor membership?10:23
seb128TJ-, right, I think I lack some context, why are you talking about that now?10:23
TJ-seb128: that's reminding me what I wanted to edit to fix; a user reported it in #ubuntu a couple weeks ago10:24
seb128TJ-, I was just saying that I'm unsure who is reviewing the member-ship requests to approve them, so who to ping to help you getting edit rights10:24
seb128let's see if popey can help10:24
popeyseb128: i can do that10:26
seb128popey, hey, ah nice :)10:26
popeydone10:26
seb128thx!10:26
seb128TJ-, ^10:26
* TJ- does a happy dance :)10:27
handsome_fengseb128: Sure, I will do it when I have time. :)10:27
=== cpaelzer__ is now known as cpaelzer
=== cpaelzer__ is now known as cpaelzer
rbasakvorlon: the git-ubuntu importer service won't restart because it is running on Xenial and using the ubuntu-keyring package, and the archive now has a signature for which it doesn't have a public key. I guess there are currently no plans to SRU updates to this package?12:35
rbasakI'm not sure how to handle this general case.12:36
rbasakISTR there was some reason git-ubuntu needed every key used in Debian and Ubuntu ever.12:36
rbasakBut I don't want to have to release upgrade the git-ubuntu importer service host every time there's a key rotation.12:37
coreycbdoko: jamespage: i'll take a look at those.12:55
coreycbvorlon: thanks and no problem on the delay. there is charm support going on for octavia that ramped up recently and shined light on octavia-dashboard.12:57
rbasak"ISTR there was some reason git-ubuntu needed every key used in Debian and Ubuntu ever." -> Now I think about it, it might just be for all supported releases.13:07
rbasakahasenack, cpaelzer: may I have your opinion please on my proposed approach in bug 1801725? This is for an upcoming fix to git-ubuntu, without which the importer service is down.13:36
ubottubug 1801725 in usd-importer "Importer service fails to start due to missing public key" [Critical,Triaged] https://launchpad.net/bugs/180172513:36
ahasenackrbasak: wasn't something similar done already in e1b4cd8c9c488a0403f6efecd2cdf3748aa85963 for when bionic was released?13:43
ahasenackit links to https://bugs.launchpad.net/bugs/175265613:43
ubottuLaunchpad bug 1752656 in ubuntu-keyring (Ubuntu) "Please SRU archive keyrings to older releases" [Undecided,New]13:43
rbasakahasenack: aha. Perfect. Thanks!13:43
rbasakI guess I'm bumping those up then.13:43
ahasenack+113:44
xnoxrbasak, ahasenack - please do not duplicate work w.r.t. 2018 key update only. irrespective of the acient bug asking for effectivly `sru everything all the time`13:54
xnoxrbasak, also your guess is wrong =)13:55
xnoxhowever, i was not planning to go further than bionic. because debootstrap in xenial is not good enough to bootstrap disco.13:55
xnoxcommented on https://bugs.launchpad.net/usd-importer/+bug/180172513:56
ubottuLaunchpad bug 1801725 in usd-importer "Importer service fails to start due to missing public key" [Critical,Triaged]13:56
xnoxrbasak, ahasenack - also it should be normal for only one signature out of the two valid.... that's why we have dual signing.13:56
ahasenackxnox: gpgv doesn't like it, exits status 213:58
rbasakxnox: "Thus imho this is a bug in the importer if it requires all keys." -> it's a problem with gpgv then.13:58
rbasak(or a feature request in gpgv at least)13:58
xnoxrbasak, ahasenack - do you have the full cmdline you execute? and/or where is this code at?13:59
xnoxi believe we managed to fix this right; using gpgv; for e.g. ubuntu-release-upgrader13:59
rbasakxnox: https://git.launchpad.net/usd-importer/tree/gitubuntu/apt_repo.py#n8514:00
xnoxrbasak, ahasenack - gpgv should be able to return signed output, which should be trustworthy, irrespective of errorcodes. Cause full untrusted stuff should return nothing in stdout. Or something along those lines.14:01
xnoxthanks, let me check that out.14:01
rbasakxnox: and yeah, it's a wheel reinvention. Unfortuantely I couldn't find any library code that did this.14:01
xnoxthere is no library for gpg stuff, it sucks.14:01
xnoxand the C embeded netgpg library i found in netbsd is very bad - leaky and not memory safe, thus one is stuck forking to gpg(v)14:02
xnoxrbasak, love the comments there14:03
rbasakThanks14:05
rbasakxnox: so the gpgv manpage (in Xenial at least) says: "The program returns 0 if everything is fine, 1 if at least one signature  was  bad,  and  other error codes for fatal errors."14:06
xnoxyeah14:06
rbasakxnox: that makes me reluctant to treat non-zero as anything but "everything unverified".14:06
ahasenackrbasak: do you have gpgv complaining about trustedkeys.kbx too? https://pastebin.ubuntu.com/p/3RPK3F3MxT/14:19
ahasenackI got that on bionic14:19
ahasenackI do have the key 3B4FE6ACC0B21F32, just not 871920D1991BC93C14:20
ahasenackgpg (not gpgv) confirms that, and validates the signature made by 3B4FE6ACC0B21F3214:20
rbasakahasenack: no - I'm using --keyring= which I think overrides the default of looking in your ~/.gnupg14:22
ahasenackanyway passing it the right file via --keyring still returns 2, even though it then verifies one signature correctly14:22
ahasenackso "no public key" is treated more seriously than "invalid signature" perhaps14:23
xnoxdunno, it seems to me that gpgv is completely broken. as it outputs cleartext, irrespective of signature validity. E.g. i clearsigned something with my own key; validating against archive-keyring; fails to validate any input, yet still spits out output.14:24
xnoxnot having any more luck with gpg --decrypt14:24
cjwatsonno library> gpgme exists14:25
cjwatson(not *necessarily* recommending it, but in some contexts it can be helpful)14:25
rbasakcjwatson: I meant a library to verify the apt repository14:25
cjwatsonI was replying to14:26
cjwatson14:01 <xnox> there is no library for gpg stuff, it sucks.14:26
rbasakAh14:26
xnoxwell, i do know about gpgme, but yeah i wouldn't call it a `useful` library =) cause it also does fork to gpg. So far i found forking gpg/gpgv by yourself easier.14:27
xnoxand the netpgp was done in the context of no-forking allowed (for pid1)14:27
xnoxgranted, thankfully, never released that code.14:27
xnoxthe go openpgp library is quite good, for these things.14:27
xnoxbut it is in golang.14:28
xnoxhm apt-key verify is just as broken.14:36
FauxIt so is.14:38
infinitydoko, mwhudson: I got that error from reportbug when running 'submittodebian' on disco.14:41
xnoxjuliank, how does apt deal with multi-signed apt archives? because e.g. apt-key verify isn't doing what i need/want. Or apt code parses the status-fd stuff?15:06
xnoxjuliank, i wonder if i can (re)use /usr/lib/apt/methods/gpgv somehow15:10
TJ-xnox: how much trouble do you want to go to? Because I've just tested a method locally of splitting the 2 signatures off, then reconstructing with 1 at a time, so gpgv can return 0 if 1 matches (so you'd just loop over each signature).15:28
xnoxTJ-, well, i like the logic that is performed by /usr/lib/apt/methods/gpgv already and it matches what apt itself does.15:29
juliankxnox: yes, it does parsing, and maybe15:29
juliankI think the logic is in the library15:29
xnoxTJ-, i wish that to be exposed, in some user-friendly format, perhaps injected to be used as the backend for $ apt-key verify15:29
xnoxjuliank, yeap, found it. It parses the logger/status-fd and correctly counts things as we need/want.15:30
xnoxTJ-, ideally i would not want to do signature splitting. As parsing openpgp packets is error prone =/15:30
xnoxTJ-, also imho gpgv in these cases should be returning error code 1, not 2.15:31
xnoxTJ-, i think i will file a gpg/gpgv bug; and also will file an apt bug, cause imho standard ubuntu system should have a gpgv like util out of the box for easy apt-key verification of stuff.15:31
xnoxTJ-, if you pastebin your signature splitting code that should be doable too.15:32
xnoxdoable/nice15:32
xnoxor update all the ubuntu-keyring everywhere....15:33
juliankxnox: you could try to use apt-helper Download-File gpgv:$path too15:33
juliankSans upper case15:33
juliankAnd with a destination filename15:33
xnoxjuliank, oooooh15:33
juliankI'm not sure what happens, but it's worth trying15:33
xnoxjuliank, i didn't find apt-helper yet =) i think this might be what i need.15:34
juliank/usr/lib/apt15:34
TJ-xnox: yes, I agree about returning 1 not 215:34
xnoxjuliank, cause by-hand Acquire-URI commands into the stdin of gpgv method were doing the right thing for me.15:34
xnoxjuliank, TJ- lunch first, then bugs.15:34
TJ-xnox: I've 1 last bit to fix-up, figuring out the CRC algorithm used on the signature block :) ... I used gpgsplit to break out the signatures15:35
TJ-xnox: I give up - no easy way with limited tooling to recreate the PGP signature CRC (and gpgv cannot be told --ignore-crc-error as gpg can)17:09
xnox=(17:10
xnoxTJ-, parsing status-fd, and/or using the apt's gpgv method imho is the way to go.17:10
xnoxthis shall be the master bug to track this: https://bugs.launchpad.net/ubuntu/+source/ubuntu-release-upgrader/+bug/180176217:10
ubottuLaunchpad bug 1801762 in ubuntu-release-upgrader (Ubuntu) "Dual-signed things should be easy to verify with one key" [Undecided,New]17:10
TJ-I fed the crc32 poly and init values into jacksum to recreate, but jacksum is quite heavy (being Java)17:10
juliankxnox: did you try the helper, does it work? /me curious17:47
xnoxjuliank, tried. did not do what i wanted =/ it either `downloads` files without any verification, or fails.17:48
xnoxjuliank, maybe i'm not using the right syntax.17:48
xnoxjuliank, timed-out trying to work out what it is doing. was going to strace it next.17:48
xnoxmaybe i needed to something like gpgv+file:// ?!17:49
juliankxnox: FWIW, one of src/dest is the keys, the other the data to check (in case of clearsigned, both are the same)17:54
juliankI think the destination is the key file17:56
julianks/key/sig17:56
* juliank disappears again, enough screen time for now :(17:59
TJ-xnox: I've got a script that works - wraps gpgv. Any good to you? http://iam.tj/projects/ubuntu/gpgv-aptkeys18:20
TJ-xnox: grr, sent you the symlink version. Use this: http://iam.tj/projects/ubuntu/gpgv-multisig18:21
rbasak!dmb-ping19:01
ubottucyphermox, jbicha, micahg, rbasak, sil2100, slashd, tsimonq2: DMB ping.19:01
slashdo/19:18
slashdsorry we changed hours here19:18
tsimonq2Hi19:42
infinitycoreycb: That ironic update also claims to require python-scciclient>=0.8.0 ... we only have 0.6.119:50
infinitycoreycb: Similar problem in cosmic, mind you, where it wanted 0.7.2 ..19:51
infinitycoreycb: Might want to fix both those issues.19:53
coreycbinfinity: ok will take a look, thanks for catching that19:54
infinitycoreycb: The cosmic reqs might be a lie (but worth investigating if you need to fix something there or update scciclient or whatever), but the disco one looks legit.  The do_async flag didn't exist before 8.019:55
coreycbinfinity: can you reject that? I'd like to run dep8 tests and do this via bileto.19:57
infinitycoreycb: Done.19:59
coreycbinfinity: thanks19:59

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!