20:01:20 #startmeeting 20:01:20 Meeting started Fri Apr 12 20:01:20 2019 UTC. The chair is waldi. Information about MeetBot at http://wiki.debian.org/MeetBot. 20:01:20 Useful Commands: #action #agreed #help #info #idea #link #topic. 20:01:31 hi everybody 20:01:32 welcome everyone 20:01:45 please speak up 20:01:58 Hi :-) 20:02:32 moo 20:03:13 loops like i'm not alone 20:03:22 #topic Check action items from last meeting 20:03:57 I think all the secure boot stuff is done for now. 20:04:20 the signing service is still unstable? 20:04:52 It has a db connection leak which makes it unhappy. And probably not nice error handling (no reports when something fails). 20:05:27 #info secure boot stuff is done, signing service still unstable 20:05:40 There is also a problem with backports (request to sign comes in while the template package is still in the policy queue) 20:06:55 what does it currently take to clear this up? will it work for security uploads or fail the same way? 20:07:09 ansgar: does that mean pu-new will have the same issue? 20:07:59 waldi: It should work for security (there uploads go already to the buildd queue while they are in the policy queue; that's what I though of when writing it). 20:08:06 jcristau: Hmm, possible. 20:08:46 It works once the upload is accepted for -backports. For p-u-new that is less good. 20:09:05 (As there it usally takes longer for packages to get accepted) 20:10:37 Any other action items? 20:10:57 something about removed packages 20:11:17 err, out-of-date packages 20:11:31 Ah, that can come when talking about kfreebsd, hurd. I didn't do much, but look a bit yesterday or so. 20:11:47 okay 20:12:14 #topic Generating new key for Buster 20:12:19 ansgar: please 20:12:34 We are behind with generating new keys. They should be included in the next point release. 20:12:41 So current plan: 20:13:10 primary key + signing subkey (which will get on the YK); primary key can also be used for signing should subkey need to be revoked. 20:13:47 We had 3/5 shares for key recovery the last time. I suggest to do the same this time and give each ftp-master one share. 20:14:02 ay 20:14:15 ok 20:14:27 who is doing the keys? 20:14:32 (An encrypted version of the primary key will also stay on ftp-master; it's at least needed when signing the new key) 20:15:00 We can also (finally) use the current key on sec-master. 20:15:25 (Well, ftp-master or sec-master. The host where it was generated on and for) 20:15:51 I can do them again; there is still the script in dak/scripts/debian for generating them. 20:16:27 Will also sign them with the old key (same as last time) 20:16:40 and some of us masters? 20:17:07 That too. People who want to sign the key can look on ftp-master, sec-master and/or call me. 20:17:18 gut 20:17:25 Ah, ftp-master will also be designated revokers again. 20:17:32 sounds good. 20:17:46 .oO(so we can do most damage when we suddenly want to resign :) ) 20:18:17 Well, that problem already exists when one has access to the key... 20:18:39 sure 20:18:56 Users also won't get the revocation automatically, but that's a different problem. 20:19:45 #action ansgar to generate new keys 20:20:18 thats for waldi chair. 20:20:27 #chair ansgar 20:20:27 Current chairs: ansgar waldi 20:20:44 and no, action can be done by everyone 20:21:07 hrm 20:21:14 next? 20:21:17 okay 20:21:33 #topic kfreebsd, hurd 20:22:01 So, some time ago we sent a mail about the state of kfreebsd & hurd. 20:22:05 action burn 'em :) 20:22:43 I'm not sure if we got useful discussion from it? 20:22:44 hurd is in a bad state for as long as im master, if not longer. 20:23:03 sad 20:23:04 i think we should just decide and be done and stop talking 20:23:18 it wont get magically better anytime soon 20:23:27 I noticed that they have much more out-of-date binaries (15% for kbsd, 10% for hurd; vs 0.5% for release arch) 20:23:32 and kfreebsd doesnt seem to have any real support behind it either 20:23:41 That is sometimes a bit annoying when dealing with cruft. 20:24:03 so time for us to get loved again, and declare em out 20:24:28 anyone really wanting to keep them? 20:24:34 (from us, i mean) 20:24:35 (Arch:all also has lots of cruft, 6.9%, but that might be due to kbsd, hurd cruft; not sure) 20:25:06 if it is in the way than away with it 20:25:35 the ports people will cry again, but well 20:25:39 so noone in favor. 20:25:43 nope 20:25:56 Ports has at least one advantage for them: they could use autosigning. 20:26:06 anyone else who wants to do the job, or should i? 20:26:14 #agreed freebsd and hurd will move off of ftp-master 20:26:44 the job == one mail we remove in 2 weeks. then in 2 weeks do the dance with c-s to get rid of them in unstable and experimental, then s-a rm 20:27:16 one q: do we archive before removal? ie. import on archive.d.o? 20:27:23 only has old stable releases as of now. 20:27:47 one could argue "nope", and historical foo can be found on snapshot, archive.d.o is for released stuff 20:27:49 We didn't do that for other architectures. And if it is on ports, it is still accessible anyway. 20:28:14 if they import it soon enough... 20:28:22 worst case there is snapshot still. 20:28:41 ok. so, noone else it seems? then its me? 20:28:56 it doesn't hurt to archive it, does it? 20:29:09 its a precedent and it takes space. 20:29:35 space is cheap 20:29:36 and until now we only ever had released stuff there 20:29:44 not really. 20:29:47 ok, so no archive 20:30:16 right, someone action this and then off to next. 20:30:23 #action Ganneff to send mail and remove kfreebsd and hurd 20:30:40 #topic any news for OpenSSL 20:31:08 whats the freebsd porter list? 20:31:30 debian-bsd@ 20:31:35 thanks 20:32:04 no news for openssl from me. honestly, i just ignored that recently. postpone? (and get to it soonish?) 20:32:29 I think I sent a mail to ftpmaster@. Only Ganneff replied so far. 20:33:14 We also have a bug against ftp.d.o now (for Postgresql, which itself is fine, but has GPL rdeps) 20:33:50 As a bad person I think we have the same problem much more large-scale too: libgcc1 is not GPL-2-compatible, but lost of GPL-2-only stuff links it... 20:34:52 so the easiest way would be to declare all of them as system library ... 20:35:19 Fedora got no problems so far ... 20:37:09 The subject of my mail was "OpenSSL, Git and the GPL"; but we can discuss in more detail by mail. It probably doesn't work that well in a short meeting. 20:38:50 okay, let's discuss that further by mail 20:39:49 Just for the log: the postgres bug is https://bugs.debian.org/924937 20:39:54 #agreed we'll discuss that further by mail 20:40:05 #info the postgres bug is https://bugs.debian.org/924937 20:40:45 anything else on this? 20:41:46 okay. let's skip to the last point of the evening 20:41:51 #topic Any other business 20:42:24 The next meeting should be at `date -d@1557518400` (2019-05-10 20:00 UTC) 20:42:28 jftr, wheez is gone from mirrors, jessie backports gone too, jessie lts stays, rest gone. 20:42:54 jessie lts being the lts architectures, lts otherwise happening on security. 20:43:19 and by now all the bugs from that removal stuff have been fixxored too, with empty -update suites and installer being back too. 20:44:39 Is there anything to do for buster (besides keys)? 20:44:49 #info The next meeting should be at `date -d@1557518400` (2019-05-10 20:00 UTC) 20:44:49 not until release time, i think 20:45:02 empty updates suites and buster backports (empty) do exist 20:45:12 well, no buildd stuff setup yet for that. 20:45:21 empty security as well? 20:45:28 Wow.. I was reading through d/copyright for libgcc1 and all the implications made by the exceptions are making my head spin. 20:45:43 waldi: existed since 2017 20:45:48 okay 20:46:06 waldi: security also has the buildd queue setup. It should be all ready for buster. 20:46:21 well. we might want to do the buildd stuff on ftpmaster, but meh :) 20:46:40 dak admin really needs to get better in adding suites (do the buildd crap automagically, have an option to make it a policy suite using one, etc) 20:46:54 and removing should also be way easier with less manual action needed 20:46:57 its orrible. 20:47:26 Ganneff: There is a command to setup a buildd crap. 20:47:39 `dak admin suite add-build-queue` 20:47:43 why do i need to run an extra command and stuff? 20:47:51 (and policy queue?) 20:48:02 anyway. meeting over? 20:48:03 policy queues have no such thing. 20:48:30 Nothing more from me at least. 20:48:35 Also, I'm hungry ;-) 20:48:53 if there is nothing more... thank you for attending 20:49:00 #endmeeting