/srv/irclogs.ubuntu.com/2023/07/18/#ubuntu-meeting.txt

=== JanC is now known as Guest1579
=== JanC_ is now known as JanC
=== JanC_ is now known as JanC
slyono/14:30
joalifo/14:30
didrockso/14:30
eslermo/14:30
mateus-moraiso/14:30
cpaelzerhi14:30
cpaelzer#startmeeting Weekly Main Inclusion Requests status14:31
meetingologyMeeting started at 14:31:05 UTC.  The chair is cpaelzer.  Information about MeetBot at https://wiki.ubuntu.com/meetingology14:31
meetingologyAvailable commands: action, commands, idea, info, link, nick14:31
cpaelzerPing for MIR meeting - didrocks joalif slyon sarnold cpaelzer jamespage ( eslerm dviererbe )14:31
cpaelzerplenty of people said hi already before the meeting got started14:31
cpaelzerso let me get going with the agenda14:31
cpaelzer#topic current component mismatches14:31
cpaelzerMission: Identify required actions and spread the load among the teams14:31
cpaelzer#link https://people.canonical.com/~ubuntu-archive/component-mismatches-proposed.svg14:31
cpaelzer#link https://people.canonical.com/~ubuntu-archive/component-mismatches.svg14:31
sarnoldgood morning14:31
cpaelzerrust -> fonts14:31
cpaelzerwe know rust is temporarily demoted14:32
cpaelzernot suer why the fonts would show up now14:32
cpaelzerbut given how things were int he past probably a false positive14:32
slyoncpaelzer: font's are only from the -doc packages, can be ignored14:32
cpaelzerack14:32
slyonthey will stay in universe14:32
cpaelzerthen for actual fonts14:32
sarnoldprobably a previous mix of main vs universe binaries has been turned into "omg all these universe packages should be in main"14:32
cpaelzerfonts-liberation -> fonts-liberation-sans-narrow14:32
cpaelzerthe former is a desktop package14:33
cpaelzerAFAIK those get a relative easy pass14:33
cpaelzerif they are really just fonts14:33
cpaelzerand there is no active code14:33
cpaelzerbut we'd still want to see a bug that states that it is intentional and wanted14:33
cpaelzerbecause no matter how simple, the package will need an owner14:33
didrocksthat was exactly my point14:34
cpaelzerdidrocks: can you carry that to the desktop folks?14:34
didrockssure, will do14:34
cpaelzerI feel like parrot14:34
cpaelzerthe MIRs for the perl explosion will come14:34
cpaelzersoon (tm)14:34
cpaelzerjaraco seems almost ready right?14:35
cpaelzerok joalif reviewed the last element recently14:36
cpaelzertodo is back on openstack14:36
slyonthere are some open TODOs from joalif14:36
cpaelzerjamespage: ^^ FYI14:36
cpaelzeryep14:36
cpaelzerso far that is all I see in mismatches14:36
cpaelzerno further things that we need to act on in there right now14:36
cpaelzer#topic New MIRs14:37
cpaelzerMission: ensure to assign all incoming reviews for fast processing14:37
cpaelzer#link https://bugs.launchpad.net/ubuntu/?field.searchtext=&orderby=-date_last_updated&field.status%3Alist=NEW&field.status%3Alist=CONFIRMED&assignee_option=none&field.assignee=&field.subscriber=ubuntu-mir14:37
cpaelzerempty14:37
cpaelzerwow14:37
sarnoldbroken?14:37
slyonxD14:37
joaliflol14:37
* sarnold pokes launchpad with a stick14:37
didrockszen attitude :p14:37
dviererbeo/14:37
didrocksdon’t be as negative as sarnold :p14:37
cpaelzer#topic Incomplete bugs / questions14:37
cpaelzerMission: Identify required actions and spread the load among the teams14:37
cpaelzer#link https://bugs.launchpad.net/ubuntu/?field.searchtext=&orderby=-date_last_updated&field.status%3Alist=INCOMPLETE_WITH_RESPONSE&field.status%3Alist=INCOMPLETE_WITHOUT_RESPONSE&field.subscriber=ubuntu-mir14:37
cpaelzer5 incompletes with recent updates14:38
cpaelzerdhcpd I fixed the state as it has a few open todos left14:38
cpaelzerdidrocks: did the same for aom14:38
cpaelzerlibhttp-cookiejar-perl seems to be worked on by foundations14:39
didrockspython-rlpycairo and all reverse dependencies only used by hplip should be demoted it seems…14:39
slyonbug #2026608 I don't think this necessarily needs a security-review (considering lua has been in main for a while and covered by our security team), but maybe sarnold still wants to do a spot check and see if a full review would be useful (assign ubuntu-security, if you feel like)14:39
-ubottu:#ubuntu-meeting- Bug 2026608 in lua5.4 (Ubuntu) "[MIR] lua5.4" [Undecided, Incomplete] https://launchpad.net/bugs/202660814:39
slyondidrocks: right. I brought that up with the desktop team, looks like we can demote hplip + dependencies later this cycle14:39
cpaelzerok, good on hplip+dependencies then14:40
cpaelzerslyon: I agree on 202660814:40
sarnoldslyon: ack, thanks14:40
cpaelzersarnold: what do you think?14:40
sarnoldI'm inclined to agree that it just needs a very quick once-over14:41
cpaelzeron the quality side I agree to slyons list14:41
cpaelzerwe need to give it some love14:41
cpaelzerto make it better than it is14:41
cpaelzerLena will ping back on the case once ready14:41
cpaelzernothing for us to act now14:41
cpaelzerok, next topic then14:42
cpaelzer#topic Process/Documentation improvements14:42
cpaelzerMission: Review pending process/documentation pull-requests or issues14:42
cpaelzer#link https://github.com/canonical/ubuntu-mir/pulls14:42
cpaelzer#link https://github.com/canonical/ubuntu-mir/issues14:42
cpaelzer31 and 17 wait14:42
cpaelzerblocked by other things14:42
cpaelzerbut 33 and 32 I'd land if there are no objections14:42
cpaelzerthanks dviererbe btw for the quick reviews14:43
cpaelzerthoughts/complaints on https://github.com/canonical/ubuntu-mir/pull/32 or https://github.com/canonical/ubuntu-mir/pull/33 ?14:43
-ubottu:#ubuntu-meeting- Pull 32 in canonical/ubuntu-mir "Clarify endpoint rules" [Open]14:43
-ubottu:#ubuntu-meeting- Pull 33 in canonical/ubuntu-mir "Guide how to check nobody/suid rules" [Open]14:43
* slyon approved on GH14:44
didrocksthe find calls needs to be on the built binary, no? Otherwise dh_fixperms will fix them if nothing special in debian/rules?14:44
didrocks(so unsure about those checks, I generally only rely on grepping)14:44
cpaelzeryeah, there might be more like postinst14:45
cpaelzerthat is why my added line says "at least"14:45
cpaelzerI felt that people might check even less than the find and grep14:45
cpaelzerso wanted to provide a hint14:45
cpaelzerif you find suid set then one can have a look at fixperms and others14:45
didrocksright, my point is that find on the source package will not give you what you expect :)14:46
cpaelzerlike the built binaries14:46
didrocksyeah14:46
cpaelzerTBH I expected to check both src and extracted debs or so14:46
didrocksand another question on the other on the other PR: why checking dbus in particular? (it’s all local)14:46
sarnoldcomments added to both14:46
didrockswe can say the same then on any unix socket?14:46
cpaelzerthe case I looked at had dbus and that is just as much an "open port" of some sort14:46
cpaelzersince I didn't want to extend the list infinitely I added "dbus or similar"14:47
cpaelzerIHO, but I'm happy to discuss, any kind of listning turn into potential attack vectors right?14:47
cpaelzer+M14:47
didrockshum, I kind of disagree for things that are listening "locally", in that sense, clients connecting to the system bus are even more harmful and don’t enter this list14:48
didrockslet’s iterate over the PRs14:48
cpaelzerok then14:48
cpaelzerpstpone for the meeting14:48
cpaelzerthrow the comments onto the PRs14:48
cpaelzersome of you already did14:48
dviererbe> I felt that people might check even less than the find and grep14:48
dviererbeJust a thought: Would that be a good idea to create a tool like check-mir that makes it easier for people to check for sid/gid if so many do it worng or don't do it at all?14:48
cpaelzerI'll rework them and we can talk again here next time14:48
cpaelzerdviererbe: I found that often people then run the tool, do not know what/why it does, and then do fail to think e.g. about the new similar thing14:49
sarnolddviererbe: heh, yeah, I immediately wondered why we don't have an easy tool to find all the setuid/setgid files/directories in the packages14:49
cpaelzeryou can write and maintain one :-)14:49
cpaelzerall the PR tries is to help with suggestions14:49
sarnoldthat's my fear14:50
cpaelzerI'm ok for now14:50
cpaelzerhave enough on those to work on them14:50
cpaelzergoing on in the agenda14:50
cpaelzer#topic MIR related Security Review Queue14:50
cpaelzerMission: Check on progress, do deadlines seem doable?14:50
cpaelzerSome clients can only work with one, some with the other escaping - the URLs point to the same place.14:50
cpaelzer#link https://bugs.launchpad.net/~ubuntu-security/+bugs?field.searchtext=%5BMIR%5D&assignee_option=choose&field.assignee=ubuntu-security&field.bug_reporter=&field.bug_commenter=&field.subscriber=ubuntu-mir14:50
cpaelzer#link https://bugs.launchpad.net/~ubuntu-security/+bugs?field.searchtext=[MIR]&assignee_option=choose&field.assignee=ubuntu-security&field.bug_reporter=&field.bug_commenter=&field.subscriber=ubuntu-mir14:50
cpaelzerInternal link14:50
cpaelzer- ensure your teams items are prioritized among each other as you'd expect14:50
cpaelzer- ensure community requests do not get stomped by teams calling for favors too much14:50
cpaelzer#link https://warthogs.atlassian.net/jira/software/c/projects/SEC/boards/59414:50
eslermI believe we are set. Big item is cargo being assigned to a reviewer14:51
cpaelzeryeah14:52
slyonthat's great to hear!14:52
cpaelzerdotnet is also bug14:52
cpaelzerbig14:52
cpaelzerthat does not have a face on it yet right?14:52
sarnoldcorrect14:52
cpaelzernvme-stast just entered the queue as I completed review this morning14:53
sarnoldi'm worried that the "transition away from the dead package" story isn't quite complete yet14:53
cpaelzeralso looking for a reviewer14:53
cpaelzersarnold: well, we can wait for more details on this - but it would not block the security reivew would it?14:53
sarnoldcpaelzer: no, but it is also probably more important than the security review14:53
cpaelzerit is required TODO #1 to clarify that further14:54
sarnoldand I understand the discussion is underway14:54
cpaelzerUnless that is completed and approved as being sufficient it won't be promoted14:55
sarnoldsounds good to me14:55
cpaelzerbut to not lose too much time I think foundations would appreciate to enter the assigned security review queue14:55
cpaelzerI think we are ok on that, give it a thought if it could be assigned14:55
cpaelzergoing on14:55
cpaelzer#topic Any other business?14:55
cpaelzernothing here14:55
didrocksnothing either14:55
sarnoldnothing from me14:55
joalifjust fyi, i wont be joining the next 4 mtgs14:56
seb128o/ :-)14:56
joalifbank holidays + pto14:56
sarnoldjoalif: nice :)14:56
sarnoldheya seb12814:56
seb128quick one, the fonts-liberation-sans-narrow mentioned earlier14:56
cpaelzerimpressive joalif :-)14:56
seb128it seems to be a rename from fonts-liberation14:56
sarnoldoh yes, iirc next week is a midcycle sprint, are we intending to have this meeting next week?14:56
seb128basically Debian did14:56
seb128fonts-liberation2 -> fonts-liberation14:57
seb128and14:57
cpaelzeron time off, there will be a sprint this (not much impact) and next (more impact) week that keeps people busy14:57
seb128fonts-liberation -> fonts-liberation-sans-narrow14:57
cpaelzerI'd appreciate, due to the sprint, someone taking over for me next week14:57
seb128because that's the only font remaining provided by the old srcname14:57
seb128do we still need a MIR?14:57
didrocks(same, I will be in the sprint, so if someone else is free to take over…)14:57
slyoncpaelzer: I can probably run the meeting next week.14:57
cpaelzerseb128: file a bug and explain, so there is an audit trail. Does not need to be a full MIR template14:58
seb128cpaelzer, ack, thanks14:58
cpaelzerthanks slyon14:58
cpaelzerok then, seems we are done for today14:58
sarnoldthanks cpaelzer, all14:58
joalifthanks cpaelzer, all :)14:58
dviererbethanks, all14:58
slyonthanks cpaelzer, all!14:58
cpaelzerjoalif:  we will keep the best cases open for when you are back then :-P14:58
cpaelzer#endmeeting14:58
meetingologyMeeting ended at 14:58:51 UTC.  Minutes at https://ubottu.com/meetingology/logs/ubuntu-meeting/2023/ubuntu-meeting.2023-07-18-14.31.moin.txt14:58
eslermthanks all o/14:58
joalifLOL14:58
joalifthanks cpaelzer ;)14:59
didrocksjoalif: all the perl stuff! :p14:59
didrocksthanks!14:59
seb128thanks!15:03
seb128and as a follow up FYI, https://bugs.launchpad.net/ubuntu/+source/fonts-liberation-sans-narrow/+bug/202807015:08
-ubottu:#ubuntu-meeting- Launchpad bug 2028070 in fonts-liberation-sans-narrow (Ubuntu) "[MIR] fonts-liberation-sans-narrow" [Undecided, New]15:08
=== JanC_ is now known as JanC

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!