/srv/irclogs.ubuntu.com/2022/07/29/#ubuntu-devel.txt

mwhudsonlove commits like this https://github.com/google/autofdo/commit/963a8c1f55ed86db6b909ee603a46742b398013900:36
ubottuCommit 963a8c1 in google/autofdo "Update to the latest internal version."00:36
sarnold"look how open source we are!"00:37
blahdeblahhaha04:20
schopinIs there an archive of old Ubuntu point releases CD images, e.g. 20.04.3 ?09:53
tumbleweedhttps://old-releases.ubuntu.com/releases/20.04.3/09:54
schopintumbleweed: thanks :)10:56
vorlonEickmeyer: I'm not a user of digikam so I'm not the one to judge whether disabling video support is acceptable; but I like RikMills 's answer on the mailing list much better, can we pull in 8.0 alpha?12:57
rbasakvorlon: do you have an opinion on ua-tools growing a dependency on ca-certificates? From a quick glance, it's currently in desktop-minimal and seeded in server somehow, but not in standard or minimal.13:07
vorlonhmm13:07
vorlonca-certificates also pulls in the openssl binary package as a dependency, which is probably more impactful than ca-certificates itself13:08
rbasakI thoguht it was the other way round13:08
rbasakI haven't checked in detail yet though.13:08
rbasakAh no you're right.13:09
rbasakTHere's also a Suggests/Enhances relationship.13:09
vorlonand we've seen behavior differences in the recent past in libssl with or without the openssl package installed due to it shipping /etc/ssl/openssl.cnf, so there's some risk of regression potential there13:09
rbasakRisk of potential. Got it :-P13:10
vorlonyeah sorry, 6am grammar13:10
vorlonalternative suggestion: bundle the specific CA in the ua-tools package13:10
rbasakI was more thinking about the "bloating" of minimal.13:10
vorlonthat too13:10
rbasakBut yeah, that'd be a workaround13:10
rbasakSo what's the decision? OK, or require a workaround?13:17
rbasakvorlon: ^?13:31
vorlonrbasak: I would say they should work around13:31
vorlonbundling pinned CA certificates instead of using ca-certificates is not unprecedented13:32
rbasakorndorffgrant: ^ I don't see lamoura here13:34
RikMillsvorlon: I don't think they have a formally tagged alpha yet or tars. Just some appimages built from master branch as far as I can tell13:53
vorlonRikMills: ah well we have a way to use git commits as upstream tarballs as needed13:54
RikMillsindeed13:54
orndorffgrantrbasak: got it, thanks for the ping and that all makes sense. The depends was because a significant portion of uaclient functionality needs it, but not all of it. E.g. the apt messaging around ESM works without ca-certs, but `ua attach` requires it. So we'll just remove the Depends for this release. In future releases we'll focus on making sure14:07
orndorffgranteverything that can work without ca-certs will, and make sure the functionality that does need it fails gracefully with a helpful error message. Does that sound good?14:07
RikMillsvorlon: Eickmeyer[m] https://github.com/archlinux/svntogit-packages/tree/packages/digikam/trunk14:07
RikMillshuh?14:07
RikMillsoh, maybe just a compile fix and nothing else14:07
Eickmeyer[m]Yeah, that doesn't look like a solution.14:08
Eickmeyer[m]I think just pulling from master and calling it good might be the way forward. 8.0.0~alpha14:09
Eickmeyer[m]Howver, I will preface and say that ffmpeg5 support there is incomplete per the devs and is prone to crashes.14:09
Eickmeyer[m]So, out of the frying pan and into the fire, vorlon .14:09
RikMillswell shall we just disable video support in 7.7 for now, buying time to build v8 in a PPA and recuits some testers?14:11
RikMillssee how hot the fire is ;)14:12
Eickmeyer[m]We can do that. Right now I'm at ERR:SLEEPY, WOKEUP, NOT ENOUGH COFFEE14:13
RikMillsthough as ffmeg 5 has already smooth updated its way to the release pocket, there may be no rush to fix the 7.7 build?14:15
Eickmeyer[m]Well, it's been a rough transition as mwhudson would tell you.14:16
Eickmeyer[m](Ping for no reason, sorry)14:16
RikMillsindeed14:16
vorlonEickmeyer: "prone to crashes" wow ok14:48
vorlonEickmeyer: should I just try to cleanroom reimplement it and compare with what upstream has done?14:49
Eickmeyer[m]vorlon: I don't know. It just seems like upstream doesn't have a lot of faith in their code right now.14:50
Eickmeyer[m]Nor do they seem to have a lot of faith in ffmpeg5.14:51
Eickmeyer[m]vorlon: Maybe "prone to crashes" was a misremembering (it's early), but here's the conversation: https://bugs.kde.org/show_bug.cgi?id=45712114:53
ubottuKDE bug 457121 in digikam "digikam 7.7.0 FTBFS against libavcodec59" [Normal, Unconfirmed]14:53
orndorffgrantoy I skimmed to fast and missed the "bundling pinned CA certificates ... is not unprecedented" message. we'll consider this as well in a future release15:04
luis220413What proxy configuration is used in Ubuntu builds in the dpkg-buildpackage phase?18:47
sarnoldcan you be more specific?18:52
vorlonguess not19:00
luis220413sarnold: Search for "dpkg-buildpackage" in this build log: https://launchpadlibrarian.net/337764430/buildlog_ubuntu-artful-amd64.node-rollup_0.47.4-3_BUILDING.txt.gz19:17
sarnoldluis220413: ah, the launchpad builders have no network access beyond ftpmaster.internal19:18
sarnold(well, I don't know how they do ntp, I could imagine they might have access to an internal ntpd)19:18
luis220413sarnold: Can you bootstrap node-rollup in Bionic (from the version in bionic-proposed in the publishing history) as requested in bug 1790200 for cosmic?19:20
ubottuBug 1790200 in node-rollup (Ubuntu) "Rollup build-depends on itself and needs to be bootstrapped" [Undecided, Confirmed] https://launchpad.net/bugs/179020019:20
sarnoldluis220413: cosmic is dead19:21
sarnoldluis220413: cosmic reached end of life in 2019 https://wiki.ubuntu.com/Releases19:21
luis220413sarnold: I know, but that was done for cosmic. I want that done for Bionic, that is supported until 2028.19:21
sarnoldah19:21
sarnoldluis220413: it's probably best to file a new bug with a clear description of what needs to be done, and why19:22
luis220413sarnold: I want this for node-deepmerge (only in Jammy and Kinetic) to build in Bionic. But I can backport it to Focal in my PPA, copy the rollup output to a Bionic backport and it will build.19:24
luis220413sarnold: I need this to fix CVE-2021-32798 in jupyter-notebook, that is a XSS vulnerability rated critical by the upstream project.19:25
ubottuThe Jupyter notebook is a web-based notebook environment for interactive computing. In affected versions untrusted notebook can execute code on load. Jupyter Notebook uses a deprecated version of Google Caja to sanitize user inputs. A public Caja bypass can be used to trigger an XSS when a victim opens a malicious ipynb document in Jupyter Notebook. The XSS allows an attacker t... <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32798>19:26
luis220413sarnold: I need node-deepmerge to fix CVE-2021-32798 in jupyter-notebook, that is a XSS vulnerability rated critical by the upstream project.19:26
sarnoldluis220413: introducing a new package to an existing release can happen but it's very rare; I don't even know what to suggest as your next step19:28
luis220413sarnold: I already have a fast strategy (explained above) such that I can upload the patched packages today19:29
luis220413sarnold: I requested introduction of these packages in bug 1983018 (except for node-rollup)19:29
ubottuBug 1983018 in node-sanitize-html (Ubuntu) "Backport to Ubuntu 18.04 (and in some cases 20.04)" [Undecided, New] https://launchpad.net/bugs/198301819:29
jbichaluis220413: are you trying to fix that CVE in Ubuntu directly? Could you coordinate with the Security Team?19:30
luis220413jbicha: I discussed with sarnold, that is a member of the Security Team.19:31
jbichaoh never mind19:31
jbichamy more specific question was if Security would want node-rollup built for bionic-security instead of the usual bionic-updates19:32
luis220413luis220413: Security updates only build with the release and security pockets enabled. Therefore, node-rollup would have to be built for bionic-security, but is not needed.19:38
luis220413Because I have a workaround (run rollup on Focal and copy the results to the source package for Bionic)19:38
cjwatsonsarnold: there are various odds and ends in addition to ftpmaster.internal such as ntp, but broadly yes19:39
sarnoldcjwatson: any chance those are public / in code somewhere I can skim? you know me, endlessly curious :)19:40
rbasakxnox: could you look at bug 1969247 for zfs-linux in Focal, please?19:42
ubottuBug 1969247 in zfs-linux (Ubuntu) "fallocate with FALLOC_FL_ZERO_RANGE produces zero-size files on zfs in Jammy" [High, Fix Released] https://launchpad.net/bugs/196924719:42
cjwatsonsarnold: we should _really_ document it publicly - maybe when we get to the next-generation user docs project.  For the time being you could derive it from lp:canonical-is-firewalls19:43
cjwatsonsarnold: the intentional ones are those where `services/lp/buildd/builders` is allowed as a source; there may also be a handful of broader rules that include all of scalingstack or something (but those are probably things like infrastructure addresses)19:44
cjwatsonsarnold: there are also restricted DNS views that play into this a bit, but even I don't have easy access to the contents of those, I'd need to ask IS.  (of course those aren't a security barrier)19:46
sarnoldcjwatson: oh that's interesting, I was guessing they'd use /etc/hosts for the small handful of things they'd be allowed to use :)19:49
sarnoldI guess that's not very cloudy19:49
cjwatsonthat would be pretty hard to maintain19:49
cjwatsonrestricted DNS view is much easier19:50
cjwatson(modulo the fact that only IS can see the view)19:50
cjwatsonalso /etc/hosts is terrible for workloads that involve lots of nested chroots/containers, like builds19:50
sarnoldcjwatson: heh, there's enough abstractions in this that it's hard to tell quite what is allowed :) eg nothing in it quite says "this can do ntp and talk to the archive" to me19:56
sarnoldcjwatson: thanks again for indulging my curiousity :)19:56
cjwatsonsarnold: once you're used to reading it it's very helpful, but if you don't live your life around this sort of thing then I appreciate it might not be obvious just from the configs19:57
sarnoldooh vpn user specifications!20:00

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!