/srv/irclogs.ubuntu.com/2019/05/30/#ubuntu-release.txt

-queuebot:#ubuntu-release- Unapproved: exim4 (disco-proposed/main) [4.92-4ubuntu1 => 4.92-4ubuntu1.1] (ubuntu-server)01:38
infinityvorlon: Historically, we've never emptied proposed at EOL, we just snapshot it as "this is the way it was".  But ESM does make that a bit goofier, I guess.05:21
infinityvorlon: No strong opinion either way.  We could publish it to -updates, we could binary copy it to ESM (and leave it in proposed)...05:22
infinityvorlon: I'm even more confused about the seccomp that the security team uploaded (long) after ESMiness.05:25
-queuebot:#ubuntu-release- Unapproved: xserver-xorg-video-amdgpu-hwe-18.04 (bionic-proposed/main) [18.1.0-1~18.04.1 => 19.0.1-1~18.04.1] (no packageset)05:47
-queuebot:#ubuntu-release- Unapproved: xserver-xorg-video-nouveau-hwe-18.04 (bionic-proposed/main) [1:1.0.15-3~18.04.1 => 1:1.0.16-1~18.04.1] (no packageset)05:47
-queuebot:#ubuntu-release- Unapproved: xserver-xorg-video-ati-hwe-18.04 (bionic-proposed/main) [1:18.1.0-1~18.04.1 => 1:19.0.1-0ubuntu1~18.04.1] (no packageset)05:47
-queuebot:#ubuntu-release- New binary: linux-signed [amd64] (xenial-proposed/main) [4.4.0-150.176] (core, kernel)09:09
-queuebot:#ubuntu-release- New: accepted linux-signed [amd64] (xenial-proposed) [4.4.0-150.176]09:16
tjaaltonsil2100: is it your sru day? could you review libglvnd for bionic, it's been sitting on the queue for some weeks now09:33
tjaaltonoh hang on, it's in proposed09:34
tjaaltonhuh, the upload never happened.. shame on me09:35
-queuebot:#ubuntu-release- Unapproved: libglvnd (bionic-proposed/main) [1.0.0-2ubuntu2.2 => 1.0.0-2ubuntu2.3] (core)09:37
tjaaltonsil2100: nevermind :)09:37
Laney:D09:39
-queuebot:#ubuntu-release- Unapproved: cups (bionic-proposed/main) [2.2.7-1ubuntu2.5 => 2.2.7-1ubuntu2.6] (core)09:39
sil2100;)09:44
sil2100tjaalton: I can try getting to it today, yes09:44
-queuebot:#ubuntu-release- Unapproved: cups (disco-proposed/main) [2.2.10-4ubuntu1 => 2.2.10-4ubuntu2] (core)09:58
tjaaltonsil2100: i uploaded it *somewhere* earlier, since it had to be forced now10:13
tjaaltonsil2100: and thanks, if you do10:14
-queuebot:#ubuntu-release- Unapproved: libpinyin (bionic-proposed/main) [2.1.91-1 => 2.2.2-1ubuntu0.18.04.1] (input-methods, ubuntu-desktop)10:14
-queuebot:#ubuntu-release- Unapproved: ibus-libpinyin (bionic-proposed/main) [1.9.2-2 => 1.11.0-1ubuntu0.18.04.1] (input-methods, ubuntu-desktop)10:15
-queuebot:#ubuntu-release- Unapproved: rejected livecd-rootfs [source] (disco-proposed) [2.578.6]10:25
-queuebot:#ubuntu-release- Unapproved: libpinyin (cosmic-proposed/main) [2.2.0-1 => 2.2.2-1ubuntu0.18.10.1] (input-methods, ubuntu-desktop)10:30
-queuebot:#ubuntu-release- Unapproved: ibus-libpinyin (cosmic-proposed/main) [1.10.0-1 => 1.11.0-1ubuntu0.18.10.1] (input-methods, ubuntu-desktop)10:31
-queuebot:#ubuntu-release- Unapproved: accepted tracker-miners [source] (disco-proposed) [2.1.6-1ubuntu1~19.04]10:34
-queuebot:#ubuntu-release- Unapproved: accepted gnome-control-center [source] (disco-proposed) [1:3.32.2-0ubuntu1]10:48
sil2100marcustomlinson: hey! Is it intentional that the disco libreoffice SRU has an interim UNRELEASED version in the changelog?10:52
sil2100I mean, it's probably not a blocking issue, but the changelog looks messy because of it10:53
-queuebot:#ubuntu-release- New binary: linux-signed-oem-osp1 [amd64] (bionic-proposed/universe) [5.0.0-1008.9] (no packageset)11:00
-queuebot:#ubuntu-release- New: accepted linux-signed-oem-osp1 [amd64] (bionic-proposed) [5.0.0-1008.9]11:12
apwsil2100, that is a very Debian thing to do, is it a Debian version in there ?11:35
sil2100apw: it looks like it yes11:41
-queuebot:#ubuntu-release- Unapproved: systemd (cosmic-proposed/main) [239-7ubuntu10.13 => 239-7ubuntu10.14] (core)11:45
-queuebot:#ubuntu-release- Unapproved: ktouch (disco-proposed/universe) [4:18.12.3-0ubuntu1 => 4:18.12.3-0ubuntu1.1] (kubuntu)11:46
-queuebot:#ubuntu-release- Unapproved: systemd (bionic-proposed/main) [237-3ubuntu10.21 => 237-3ubuntu10.22] (core)11:48
sil2100apw: I'll accept it in this case11:49
-queuebot:#ubuntu-release- Unapproved: rejected biosdevname [source] (bionic-proposed) [0.4.1-0ubuntu10.1]11:49
-queuebot:#ubuntu-release- Unapproved: accepted libreoffice [source] (disco-proposed) [1:6.2.4-0ubuntu0.19.04.1]11:52
-queuebot:#ubuntu-release- Unapproved: accepted libreoffice-l10n [source] (disco-proposed) [1:6.2.4-0ubuntu0.19.04.1]11:53
jdstrandinfinity (cc vorlon): libseccomp should be out of -proposed today. there was some question on snapd and trusty/esm which is why it is there in the first place, but that got answered yesterday12:41
-queuebot:#ubuntu-release- Unapproved: cups (xenial-proposed/main) [2.1.3-4ubuntu0.8 => 2.1.3-4ubuntu0.9] (core)12:59
-queuebot:#ubuntu-release- Unapproved: zfs-linux (bionic-proposed/main) [0.7.5-1ubuntu16.4 => 0.7.5-1ubuntu16.6] (core)13:01
-queuebot:#ubuntu-release- Unapproved: libio-socket-ssl-perl (bionic-proposed/main) [2.056-1 => 2.060-3~ubuntu18.04.1] (core) (sync)13:17
infinityjdstrand: But why was it there in the first place, that was the question.14:41
-queuebot:#ubuntu-release- Unapproved: rejected osgearth [sync] (trusty-updates) [2.4.0+dfsg-6]14:46
sil2100infinity: I think I heard jdstrand mentioning they put it there for it to get wider testing or something14:52
-queuebot:#ubuntu-release- Unapproved: accepted libglvnd [source] (bionic-proposed) [1.0.0-2ubuntu2.3]14:56
vorlonxnox: tweaked the test case for libwww-perl slightly on the openssl.l.l bug, to ensure we actually test the Breaks14:58
xnoxvorlon:  oooh, ok.14:58
-queuebot:#ubuntu-release- Unapproved: accepted libwww-perl [sync] (bionic-proposed) [6.31-1ubuntu0.1]15:01
-queuebot:#ubuntu-release- Unapproved: accepted libio-socket-ssl-perl [sync] (bionic-proposed) [2.060-3~ubuntu18.04.1]15:13
-queuebot:#ubuntu-release- Unapproved: accepted libpinyin [source] (cosmic-proposed) [2.2.2-1ubuntu0.18.10.1]15:14
vorlonxnox: the patch against libnet-ssleay-perl patches the documentation to include statements that certain features are not available in this version of net-ssleay15:29
vorlonxnox: do we care about the misleading docs? (or is there a fix-up patch I haven't gotten to yet in the review)15:30
xnoxvorlon:  i think some of those docs are not lies, as the missing bits got implemented in 1.88 only which is in eoan15:31
xnoxvorlon:  and i did not yet think about backporting that, or not.15:31
vorlonxnox: ok15:34
vorlonxnox: one of the patches added is to ignore unexpected SIGPIPE being raised during tests; have you considered whether this behavior change will raise unexpected SIGPIPE on real-world use cases and be a regression risk?15:37
xnoxvorlon:  as far as i recall, no. it was merged as test-suite flakiness rather than TLS1.315:38
vorlonxnox: ok; can you consider now whether there's regression risk there?15:43
vorlonand would it be gauche for the perl library itself to ignore SIGPIPE15:43
-queuebot:#ubuntu-release- Unapproved: libpinyin (cosmic-proposed/main) [2.2.0-1 => 2.2.2-1~ubuntu18.10.1] (input-methods, ubuntu-desktop)15:52
-queuebot:#ubuntu-release- Unapproved: libpinyin (bionic-proposed/main) [2.1.91-1 => 2.2.2-1~ubuntu18.04.1] (input-methods, ubuntu-desktop)15:54
-queuebot:#ubuntu-release- Unapproved: rejected libpinyin [source] (bionic-proposed) [2.2.2-1ubuntu0.18.04.1]15:56
-queuebot:#ubuntu-release- Unapproved: accepted libpinyin [source] (cosmic-proposed) [2.2.2-1~ubuntu18.10.1]15:58
-queuebot:#ubuntu-release- Unapproved: accepted libpinyin [source] (bionic-proposed) [2.2.2-1~ubuntu18.04.1]16:00
jdstrandinfinity: I put it there because snapd development encompasses more than just the deb and I a) thought it was going to be supported in sem and b) didn't think that the snapd team would be able to pull in the esm ppa in all the places it would need it (ie, travis, spread tests, what have you)16:08
vorlondebian/patches/Move-SSL_ERROR_WANT_READ-SSL_ER16:08
vorlonoops16:08
vorlonxnox: debian/patches/Move-SSL_ERROR_WANT_READ-SSL_ERROR_WANT_WRITE-retry-.patch also looks like an interesting behavior change to the Net::SSLeay api, read/write change behavior to not retry?16:09
jdstrandinfinity: so if it was going to be supported I thought for this upload going to trusty-security might make it easier for them to transition to using esm in their project. as it turns out, as of right now, they aren't going to have snapd in esm, so I will push libseccomp to trusty/esm and delete from -proposed16:10
jdstrandinfinity: and I told them if the decision changes wrt snapd/trusty/esm, to come to us so we can work together on a plan for them building/testing/delivering snapd debs via esm16:11
jdstrandinfinity: as to why libseccomp is in any of -proposed, yes, sil2100 is right, we wanted wider testing. the non-trusty releases will go to -security16:13
jdstrandI'm working to publish the USN for it today16:14
-queuebot:#ubuntu-release- Unapproved: accepted ibus-libpinyin [source] (cosmic-proposed) [1.11.0-1ubuntu0.18.10.1]16:32
-queuebot:#ubuntu-release- Unapproved: accepted ibus-libpinyin [source] (bionic-proposed) [1.11.0-1ubuntu0.18.04.1]16:34
xnoxvorlon:  yes, which is now inline with what openssl told everyone to do.... also note that it's unusual to see those errors from openssl pre-tls1.3 as well.16:40
xnoxvorlon:  i wish i knew how much stuff uses perl for openssl. especially server side, rather than just client.16:41
xnoxhowever i hope that people normally have their webserver do tls for them16:42
vorlonxnox: then I think this needs to be called out in the bug as regression potential and say that it's a risk of regression whose impact is currently unknown and we're willing to accept that risk16:52
vorlonxnox: I'm unsure if the change in SIGPIPE behavior also has the potential to affect non-perl users of lissl17:22
vorlonxnox: I've written up the regression potential for libnet-ssleay-perl and reading it does not give me warm fuzzies about accepting this package.  I think the API change to read/write/ssl_read_all/ssl_write_all should be reverted and the tests fixed otherwise17:27
-queuebot:#ubuntu-release- Unapproved: cups (cosmic-proposed/main) [2.2.8-5ubuntu1.3 => 2.2.8-5ubuntu1.4] (core)18:23
vorlonubuntu-mate/daily-live: eoan-desktop-amd64.iso oversized by 61582336 bytes19:09
vorlonthat's a fair number of bytes19:09
vorlonWimpress: ^^ was that something you're still planning to slim down, or raise the limit on?19:10
Wimpressvorlon: I did slim it down, considerably.19:12
WimpressBut now I have added the nvidia drivers to the shipl-live seed.19:12
WimpressWhich add ~115MB to the image.19:14
-queuebot:#ubuntu-release- Unapproved: livecd-rootfs (disco-proposed/main) [2.578.4 => 2.578.5] (desktop-core)19:16
vorlonrbasak: why do you say it was wrong to continue overriding the pcs autopkgtests which have always been garbage?19:34
vorlonrbasak: (more precisely, they regressed when /etc/init.d/networking stopped being part of the system)19:36
xnoxvorlon:  shall we do a codesearch of users of read/write?20:50
vorlonthat wouldn't catch 3rd party software20:51
vorlonxnox: wouldn't it be better to revert the api change, and fix whatever the other problem was with the tests?20:52
xnoxvorlon:  the other problem is that TLSv1.3 started to generate a lot more WANT_READ WANT_WRITE errors, and they were never been properly testing with TLSv1.2 as no renegotiation was done.20:53
xnoxand for people to install hooks they need access to a non-eating read/write......20:53
vorlonxnox: so we can't sanely support TLSv1.3 from perl without changing the API?20:54
vorlonOTOH20:54
vorlonwouldn't it be better to not support TLS1.3 from perl than to break existing third-party code?20:54
xnoxvorlon:  i had an upload to cap context at tls1.2 and be done with it20:55
xnoxvorlon:  but that also means nobody gets tls1.320:55
xnoxdefeating a bit the point of this sru.....20:55
xnoxvorlon:  also 3rd party software in perl?!20:55
vorlonxnox: I thought the point of sruing the perl bindings is to make sure updating openssl /didn't break the perl bindings/, not to enable TLSv1.3 support in perl20:56
vorlonI would be happier with capping perl @ 1.2 than breaking the API20:56
xnoxvorlon:  https://paste.ubuntu.com/p/D76nnxWNnY/ is the patch i had around for while whilst the hang drama was ongoing20:59
xnoxit is unexpected behaviour. cause max_proto would be set21:00
xnoxbut that only covers i think the CTX api only21:00
xnoxnot the SSL api21:00
vorlonxnox: if you wanted to do the work, I think we could in principle make read/write return short reads only for TLSv1.3; retain the existing behavior for earlier protocol versions; and cap to TLSv1.2 by default requiring someone to opt in from the perl code21:00
vorlonbut barring that, I would still rather cap to 1.2 now, avoid changing the api, and possibly deal with perl 1.3 support later in a separate SRU21:01
xnoxok21:01
xnoxlet me have a cup of tea21:01
-queuebot:#ubuntu-release- Unapproved: libseccomp (disco-security/main) [2.4.1-0ubuntu0.19.04.3 => 2.4.1-0ubuntu0.19.04.3] (core) (sync)21:19
xnoxvorlon:  wait a minute.21:19
-queuebot:#ubuntu-release- Unapproved: libseccomp (cosmic-security/main) [2.4.1-0ubuntu0.18.10.3 => 2.4.1-0ubuntu0.18.10.3] (core) (sync)21:20
xnoxvorlon:  "SSL_MODE_AUTO_RETRY has been made the default"21:20
-queuebot:#ubuntu-release- Unapproved: libseccomp (bionic-security/main) [2.4.1-0ubuntu0.18.04.2 => 2.4.1-0ubuntu0.18.04.2] (core) (sync)21:21
xnoxhttps://wiki.openssl.org/index.php/TLS1.3#Non-application_data_records21:21
xnoxso ssl_read()/ssl_write() should be auto-consuming things anyway.......21:21
-queuebot:#ubuntu-release- Unapproved: livecd-rootfs (xenial-proposed/main) [2.408.48 => 2.408.49] (desktop-core)21:21
-queuebot:#ubuntu-release- Unapproved: libseccomp (xenial-security/main) [2.4.1-0ubuntu0.16.04.2 => 2.4.1-0ubuntu0.16.04.2] (core) (sync)21:21
vorlonxnox: ah21:21
vorlonxnox: in that case feel free to edit the regression-potential text back21:22
-queuebot:#ubuntu-release- Unapproved: accepted libseccomp [sync] (disco-security) [2.4.1-0ubuntu0.19.04.3]21:22
xnoxvorlon:  but that also has the blocking/non-blocking sockets caveats.21:22
-queuebot:#ubuntu-release- Unapproved: accepted libseccomp [sync] (bionic-security) [2.4.1-0ubuntu0.18.04.2]21:22
-queuebot:#ubuntu-release- Unapproved: accepted libseccomp [sync] (cosmic-security) [2.4.1-0ubuntu0.18.10.3]21:22
xnoxi think i want to double check with upstream on that.21:22
-queuebot:#ubuntu-release- Unapproved: accepted libseccomp [sync] (xenial-security) [2.4.1-0ubuntu0.16.04.2]21:23
xnoxvorlon:  also upstream does cross-test a wide matrix of openssl releases, perl releases, and the perl library.21:23
xnoxthey test like all the combinations possible back to forever, and multiple openssl versions & implementations21:23
vorlonok21:24
-queuebot:#ubuntu-release- Unapproved: accepted livecd-rootfs [source] (xenial-proposed) [2.408.49]22:18
EickmeyerIs there an AA that can process lsp-plugins in the NEW queue?22:21
EickmeyerAlso, we (the Ubuntu Studio team) now have two packages that need sponsoring.  (bug 1829562 and bug 1831154)22:22
ubot5bug 1829562 in Ubuntu Studio "[Needs Packaging] DPF-Plugins for Eoan" [Medium,In progress] https://launchpad.net/bugs/182956222:22
ubot5bug 1831154 in Ubuntu Studio Menu Add "[needs-packaging] ubuntustudio-menu-add" [Medium,In progress] https://launchpad.net/bugs/183115422:22
EickmeyerExpect more new packages for Ubuntu Studio this cycle. We're WAY behind, and still playing catch-up after the two years of stagnation.22:23
rbasakvorlon: the pcs autopkgtest might have been garbage before, and may well still be, but the failures in Disco for 0.10 AIUI was a true positive - it correctly failed due to an installability problem that correctly should have blocked proposed migration before it got any further (to something that may or may not be correct - I haven't looked)23:06
rbasakvorlon: the errors changed.23:07
xnoxbut we can't tell the difference between always failed, and always failed but differently now.23:21
xnoxunless there is uninstallability return codes that are returned back to britney? ie. "can't even install"23:21
rbasakxnox: I was under the impression that the whole point of a versioned badtest was that there would be a manual check before bumping the version forward.23:28
rbasakI suppose another reason is that if it starts magically working then it won't be ignored forever.23:28
rbasakBut if all we're doing is bumping it forward blindly if it is still failing, then what's the point of doing it manually like this?23:29
rbasakAnyway, I need to go.23:30
rbasakI'll check back later.23:30

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!