16:00:15 #startmeeting F25-blocker-review 16:00:15 Meeting started Mon Aug 15 16:00:15 2016 UTC. The chair is adamw. Information about MeetBot at http://wiki.debian.org/MeetBot. 16:00:15 Useful Commands: #action #agreed #halp #info #idea #link #topic. 16:00:15 The meeting name has been set to 'f25-blocker-review' 16:00:15 #meetingname F25-blocker-review 16:00:15 #topic Roll Call 16:00:15 The meeting name has been set to 'f25-blocker-review' 16:00:26 ahoy hoy, who's here for some blocker review fun? 16:00:46 * kparal is here 16:01:36 * kparal pokes pschindl 16:01:45 * pschindl is here 16:01:51 kparal: thanks :) 16:02:10 you're welcome, I enjoy poking people 16:02:36 brunowolff: dgilmore: nirik: danofsatx: pwhalen: rdieter_work: satellit: sgallagh: tflink: BLOCKER REVIEW PING 16:02:42 * coremodule is here. 16:02:54 * pwhalen is here 16:04:45 alrighty, that's five of us at least 16:05:02 #chair coremodule pwhalen 16:05:02 Current chairs: adamw coremodule pwhalen 16:05:12 #topic Introduction 16:05:12 Why are we here? 16:05:12 #info Our purpose in this meeting is to review proposed blocker and nice-to-have bugs and decide whether to accept them, and to monitor the progress of fixing existing accepted blocker and nice-to-have bugs. 16:05:12 #info We'll be following the process outlined at: 16:05:15 #link https://fedoraproject.org/wiki/QA:SOP_Blocker_Bug_Meeting 16:05:16 #info The bugs up for review today are available at: 16:05:18 #link http://qa.fedoraproject.org/blockerbugs/current 16:05:20 #info The criteria for release blocking bugs can be found at: 16:05:22 #link https://fedoraproject.org/wiki/Fedora_25_Alpha_Release_Criteria 16:05:24 #link https://fedoraproject.org/wiki/Fedora_25_Beta_Release_Criteria 16:05:26 #link https://fedoraproject.org/wiki/Fedora_25_Final_Release_Criteria 16:05:28 Alpha bug counts: 16:05:30 #info 1 Proposed Blockers 16:05:32 #info 4 Accepted Blockers 16:05:34 #info 3 Proposed Freeze Exceptions 16:05:36 #info 3 Accepted Freeze Exceptions 16:05:47 we also have 2 Proposed (Beta) and 1 Proposed (Final) 16:05:52 #info we also have 2 Proposed (Beta) and 1 Proposed (Final) 16:06:49 .hello jkurik 16:06:50 jkurik: jkurik 'Jan Kurik' 16:06:59 ahoy jkurik 16:07:05 ahoj 16:07:34 Glad to act as secretary if needed. 16:08:28 #info coremodule to secretarialize 16:08:43 coremodule: thanks - did you get my note from last week about making sure bugs block the right trackers as well as changing the whiteboard? 16:09:00 No, I didn't, was it an email? 16:09:05 bug comment 16:09:21 in a few cases we e.g. accepted a bug as a blocker for a different milestone or made a bug an FE which wasn't nominated as one 16:09:36 you have to make sure the bug is blocking the right tracker, as well as adding the right whiteboard field, in those cases 16:10:12 Ah, I did see something now that you mention it. Alright, I understand. The tracker being the drop-down box with the release version number in it, right? 16:11:01 no, 'tracker bug' 16:11:09 as in, AlphaBlocker, BetaBlocker, AlphaFreezeException etc 16:11:14 in the Blocks: field 16:11:36 if we accepted a bug as an Alpha freeze exception, as well as having AcceptedFreezeException in the whiteboard, make sure it Blocks: AlphaFreezeException 16:11:56 Gotcha, I can do that. Sorry about that last week. 16:12:09 npnp 16:12:45 alrighty, let's get rolling 16:12:55 #info starting with the Alpha proposed blocker 16:12:58 #topic (1366403) [abrt] sssd-common: ipa_dyndns_update_send(): sssd_be killed by SIGSEGV 16:12:58 #link https://bugzilla.redhat.com/show_bug.cgi?id=1366403 16:12:59 #info Proposed Blocker, sssd, NEW 16:14:11 so this is basically a breakage in one of the possible ways you can enrol a system as a freeipa client' 16:14:50 doing it post-install works OK. doing it during install with a kickstart seems to work OK, but then sssd_be crashes on first boot of the installed system and seems to break domain user auth. 16:15:14 i haven't checked yet whether it works on a second boot, since this is an openQA test (makes it a bit trickier to try out different variations) 16:15:35 Seems like a straightforward blocker to me 16:16:14 * jsmith just got pulled into another meeting -- will return as quickly as he can 16:17:29 the criterion, for the record, is "It must be possible to join the system to a FreeIPA or Active Directory domain at install time and post-install, and the system must respect the identity, authentication and access control configuration provided by the domain. " 16:17:49 jsmith: the 'does it work on second boot?' question is one i only just thought of, but i'd quite like to have the answer to that... 16:18:04 if it happens every boot, yeah, i'd be +1. if it's a one-off i might be OK with a commonbugs note 16:18:04 right 16:18:32 according to the maintainer it is already fixed in upstream 16:18:44 So in this case, it join the domain, but then causes other things to crash? 16:18:49 i can recreate this manually (sigh...i hate doing that) after the meeting and see 16:19:07 coremodule: well, sorta. the thing that crashes is a part of the whole domain client stuff 16:19:11 so it's not some random, unrelated thing 16:19:47 the domain join during install works fine, on boot a process which is a key part of the way remote auth works crashes, so although the system is demonstrably joined to the domain, auth doesn't work right. 16:20:19 jkurik: yeah, he says it's 'only a band-aid' but i'm fine with a band-aid at this point 16:20:32 Gotcha. In that case I'd be +1 since the failure causes issues with the join. 16:21:48 I would be +1 to block on this (and hope it is fixed before go/no-go :-) ) 16:22:06 +1 from me too 16:22:13 ok, how about this - we can accept it provisionally for now, and i'll try and test it locally after the meeting to check i can reproduce it and see if it persists across boots 16:22:33 adamw, wfm, +1 16:22:54 proposed #agreed 1366403 - AcceptedBlocker (Alpha) - this appears to violate "It must be possible to join the system to a FreeIPA or Active Directory domain at install time and post-install, and the system must respect the identity, authentication and access control configuration provided by the domain." adamw will test this in a bit more detail after the meeting to see if it's only a transient failure 16:23:10 ack 16:23:19 ack 16:23:20 ack 16:23:25 #agreed 1366403 - AcceptedBlocker (Alpha) - this appears to violate "It must be possible to join the system to a FreeIPA or Active Directory domain at install time and post-install, and the system must respect the identity, authentication and access control configuration provided by the domain." adamw will test this in a bit more detail after the meeting to see if it's only a transient failure 16:23:28 ack 16:23:45 #info moving onto proposed Beta blockers 16:23:53 #topic (1366793) Nothing obsoletes retired dnf-langpacks packages, breaks upgrade from Fedora 23 to 25+ 16:23:53 #link https://bugzilla.redhat.com/show_bug.cgi?id=1366793 16:23:53 #info Proposed Blocker, dnf, ASSIGNED 16:23:56 brb, call of nature 16:24:29 :) 16:25:07 +1, breaks upgrade criterion 16:25:22 +1 16:25:26 +1 16:25:38 I'm not sure we want to rely on allowerasing 16:26:03 is that something we want to advise people to use even for unmodified default installs? 16:26:07 +1 16:26:17 kparal: I agree with you -- that seems.... dangerous? 16:26:35 kparal: I wouldn't suggest advising people to use that in general 16:27:10 without any third-party repos in the system, ideally there should be no need for allowerasing, the way I see it 16:27:48 well, it's true that some packages get retired and nothing obsoletes them 16:28:32 so unless there's some solution to that, there might be a need for allowerasing from time to time 16:29:19 yeah, that's my main concern, sometimes it's actually a bit difficult to obsolete things properly 16:29:26 kparal: why do you think we should not rely on it (allowerasing) ? 16:29:27 hmm, I'm no longer so sure of the +1 16:29:53 i actually now am kinda curious to look at the packaging policies again and see exactly what they say about retirement... 16:29:58 jkurik: it can potentially remove important parts of the system and some users will not be able to spot it beforehand 16:30:05 * jkurik has no experience with allowerasing, so he needs a bit of education 16:30:10 kparal: one question is, what does the graphical upgrade process do here? 16:30:42 adamw: they have a similar mechanism to allowerasing. but uses different libraries. we would need to test both tools 16:30:46 kparal: thanks 16:31:11 s/they/it 16:31:35 kparal: k, thanks 16:31:42 the guidelines are pretty useless here 16:31:52 i'm actually inclined to file a ticket with fpc and request some clarification here...thoughts? 16:32:19 I guess this depends whether dnf-langpacks is something that makes sense to merge into some other existing package, or whether it stopped to exist without any replacement 16:33:04 it would be nice if dnf or something else obsoleted it, but I'm no longer sure this is a +1 blocker, if the allowerasing option (and gnome-software) allows to perform the upgrade anyway 16:33:07 there is a replacement mechanism, but not a really obvious candidate for a replacement package 16:33:51 i can make the openqa tests detect this kind of error and try a --allowerasing run and softfail if that works... 16:35:18 adamw: I'm fine with an FPC ticket -- clarification is always good :-) 16:35:22 yeah, but I'm no longer sure we want to block on obsolete issues (as long as they work with allowerasing), because there seems to be no official way in fedora how to obsolete packages without a replacement 16:35:45 a clarification could help, sure 16:35:51 that's kinda why i want to go to FPC 16:36:00 what is the question going to be? 16:36:06 ask them to draft procedures for this, including considering the question of whether all retired packages must be obsoleted somehow... 16:36:25 or at least in the default install/critpath set 16:36:46 but I'm not sure it's wise to make a difference here 16:37:34 * kparal is +1 to ask FPC for clarification 16:37:48 this is a proposed beta blocker, as a reminder, so we do have time 16:38:00 so punt for the moment 16:38:37 kparal: imo we should make a difference here as retirement of some packages without replacement can make a problem, on the other side retirement of other packages breaks nothing 16:38:58 jkurik: well, there's always a potential problem for anyone who has the package installed 16:39:14 it's just that some packages are more *likely* to be installed than others, but that's not a great justification 16:39:26 we don't have to decide it, though :) 16:39:33 hmm..probably a topic for FPC to consider 16:40:26 proposed #agreed 1366793 - punt (delay decision) - we are not sure whether 'workarounding' this with allowerasing (or equivalent) is acceptable, and can't really decide in the absence of any packaging policy covering what to do with retired packages if Obsoletes + Provides is not appropriate. will refer to FPC for consideration 16:41:01 ack 16:41:08 ack 16:42:23 ack 16:42:35 ack 16:42:44 ack 16:42:57 #agreed 1366793 - punt (delay decision) - we are not sure whether 'workarounding' this with allowerasing (or equivalent) is acceptable, and can't really decide in the absence of any packaging policy covering what to do with retired packages if Obsoletes + Provides is not appropriate. will refer to FPC for consideration 16:43:06 #topic (1362165) doesn't connect to wifi after resume 16:43:06 #link https://bugzilla.redhat.com/show_bug.cgi?id=1362165 16:43:06 #info Proposed Blocker, NetworkManager, ON_QA 16:43:33 ah, we delayed this one so people could consider criteria changes 16:43:40 i don't see any criteria change proposals, so probably nothing much to discuss 16:44:54 Yeah, I don't see a reason to discuss 16:46:19 #info this is in 'punt' status expecting some criteria revision proposals, but we haven't had any yet, so nothing much to discuss 16:46:26 moving on to final blockers... 16:46:38 #info moving to final blocker 16:46:39 #topic (1363914) [abrt] qupzilla: base::debug::BreakDebugger(): qupzilla killed by SIGABRT 16:46:39 #link https://bugzilla.redhat.com/show_bug.cgi?id=1363914 16:46:39 #info Proposed Blocker, selinux-policy, MODIFIED 16:47:15 +1, definitely a final blocker so long as the browser is on the KDE image 16:47:17 * lupinix filed this one 16:47:36 yes +1 blocker, but also FE pretty much whenever 16:47:41 the vote for the default browser in KDE haven't been concluded yet, IIRC 16:47:57 until then, what is the default browser? isn't it firefox? 16:48:07 yes, no final results. but qtwebengine is also used by other components 16:48:23 such as? 16:48:24 firefox is default right now 16:48:39 yeah, so this isn' 16:48:42 t an alpha blocker. 16:48:57 but there's a final criterion that all apps included should basically work. 16:49:05 yes, it is only final 16:49:14 yeah, I'm just interested to know which apps are broken by this 16:49:21 is qupzilla installed by default? 16:49:24 yes 16:49:28 ok 16:49:30 is Konqueror no longer the browser for kde? 16:49:46 hadn't been for a while, it was replaced by firefox as the default web browser several cycles back 16:49:58 if qupzilla is on the Live image, then +1 Final 16:50:03 +1 16:50:06 ah, good choice 16:50:30 +1 16:50:37 +1 16:50:51 is chromium on any image by default? because the selinux bug also breaks chromium 16:51:19 not so far as i know. 16:52:06 proposed #agreed 1363914 - AcceptedBlocker (Final) - violates "All applications that can be launched using the standard graphical mechanism of a release-blocking desktop after a default installation of that desktop must start successfully and withstand a basic functionality test." 16:52:19 ack 16:52:49 ack 16:52:51 ack 16:53:05 ack 16:53:35 #agreed 1363914 - AcceptedBlocker (Final) - violates "All applications that can be launched using the standard graphical mechanism of a release-blocking desktop after a default installation of that desktop must start successfully and withstand a basic functionality test." 16:54:15 alright, let's go back and review alpha accepted blocker 16:54:23 #info moving to Alpha accepted blockers 16:54:30 #undo 16:54:30 Removing item from minutes: INFO by adamw at 16:54:23 : moving to Alpha accepted blockers 16:54:35 actually - proposed freeze exceptions first 16:54:41 #info moving to Alpha proposed freeze exceptions 16:54:47 #topic (1365686) kernel BUG at mm/rmap.c:1288! 16:54:47 #link https://bugzilla.redhat.com/show_bug.cgi?id=1365686 16:54:47 #info Proposed Freeze Exceptions, kernel, ON_QA 16:55:25 i'm +1 for this, if the kernel team wants it. seems fine. 16:55:39 we need karma on this and other blocker/FE bugs, though...i'll send out an email about that later 16:55:57 +1 FE 16:56:45 +1 FE 16:56:51 +1 FE 16:57:39 +1 FE 16:57:41 +1 FE 16:57:42 proposed #agreed 1365686 - AcceptedFreezeException (Alpha) - seems significant enough to ensure it's fixed on the live images, kernel team requested. 16:58:10 ack 16:58:16 ack 16:59:27 ack 16:59:33 #agreed 1365686 - AcceptedFreezeException (Alpha) - seems significant enough to ensure it's fixed on the live images, kernel team requested. 16:59:42 #topic (1366554) template fixes for alternative arches 16:59:42 #link https://bugzilla.redhat.com/show_bug.cgi?id=1366554 16:59:42 #info Proposed Freeze Exceptions, lorax, MODIFIED 17:00:05 +1 FE, it's required to get a successful compose on ppc64le 17:00:10 yeah, per github...+1 17:00:58 +1 17:01:39 proposed #agreed 1366554 - AcceptedFreezeException (Alpha) - this is needed to fix compose of secondary arch (ppc64le), by convention we accept these as FEs so the freeze doesn't prevent work on secondary arches 17:01:56 ack 17:02:01 ack 17:02:01 ack 17:02:27 #agreed 1366554 - AcceptedFreezeException (Alpha) - this is needed to fix compose of secondary arch (ppc64le), by convention we accept these as FEs so the freeze doesn't prevent work on secondary arches 17:02:37 #topic (1364781) QtWebEngine 5.7.0 breaks when built against glibc 2.24 (2.23.90) which defines MADV_FREE 17:02:37 #link https://bugzilla.redhat.com/show_bug.cgi?id=1364781 17:02:37 #info Proposed Freeze Exceptions, qt5-qtwebengine, MODIFIED 17:02:51 * lupinix also filed this one 17:03:14 is this different from the final blocker? 17:03:18 yes 17:03:31 so would we need to fix both that and this in order to have qupzilla actually work? 17:03:47 there was an issue with qtwebengine and glibc 2.24, but the glibc one is fixed 17:04:05 fix is waiting to be pushed to updates-testing 17:04:12 is there a potential downside to accepting it? 17:04:33 i don't know any 17:04:46 +1 FE 17:05:55 i guess i'm +1 FE for both this and the other one 17:06:41 lupinix: what is waiting to be pushed to updates-testing ? qt5-qtwebengine fix or the glibc fix ? 17:07:03 qt5-qtwebengine fix to work with glibc 2.24 17:07:13 glibc itself was not ouched 17:07:15 *touched 17:07:20 +1 FE 17:07:46 +1 FE 17:08:10 proposed #agreed 1364781 - AcceptedFreezeException (Alpha) - bug affects a prominent app on the KDE live image, so cannot be fully fixed with an update, fix does not touch glibc so possible negative impact should be restricted 17:08:35 ack 17:08:59 ack 17:09:08 ack 17:09:12 #agreed 1364781 - AcceptedFreezeException (Alpha) - bug affects a prominent app on the KDE live image, so cannot be fully fixed with an update, fix does not touch glibc so possible negative impact should be restricted 17:09:23 thanks :) 17:09:27 next FE for beta should be for alpha per comment 3 17:09:30 does anyone mind if we go back to the other bug and vote FE on that one? 17:09:40 no 17:09:49 * jsmith has no problem with that 17:09:54 no problem 17:09:55 #topic (1363914) [abrt] qupzilla: base::debug::BreakDebugger(): qupzilla killed by SIGABRT 17:09:55 #link https://bugzilla.redhat.com/show_bug.cgi?id=1363914 17:09:55 #info Proposed Blocker, selinux-policy, MODIFIED 17:10:00 #info re-visiting this bug to consider Alpha FE 17:10:04 +1 Alpha FE for me 17:10:08 +1 FE 17:10:11 +1 FE from me 17:10:12 +1 FE 17:10:13 +1 FE 17:10:23 proposed #agreed 1363914 - AcceptedFreezeException (Alpha) - bug affects a prominent app on the KDE live image, so cannot be fully fixed with an update, fix does not touch glibc so possible negative impact should be restricted 17:10:28 ackchoo 17:10:38 coremodule: so this is one where you'll have to add AlphaFreezeException to the Blocks: field as well as adding the whiteboard string 17:10:52 ack 17:11:16 ack 17:11:21 #agreed 1363914 - AcceptedFreezeException (Alpha) - bug affects a prominent app on the KDE live image, so cannot be fully fixed with an update, fix does not touch glibc so possible negative impact should be restricted 17:11:55 #topic (1366023) digikam has broken dependencies 17:11:55 #link https://bugzilla.redhat.com/show_bug.cgi?id=1366023 17:11:55 #info Proposed Freeze Exceptions, digikam, MODIFIED 17:12:08 #info this was accidentally proposed as a Beta FE but was meant to be proposed for Alpha, will fix 17:13:05 seems constrained to this one thing so I'm +1 FE 17:13:06 hum, wouldn't this actually prevent the KDE live composing at all? 17:13:18 adamw, Alright, I understand. 17:14:11 adamw: I thought it would, though I haven't verified the package list getting installed... maybe the affected bits aren't getting installed (as expected) 17:14:11 but there are live composes happening 17:14:22 yeah 17:14:44 I suspect that means that Recommends: soft deps (still) aren't getting pulled in by default 17:15:11 fedora-live-kde.ks:-digikam # digikam has duplicate functionality with gwenview (~28 megs) 17:15:14 (separate issue I'll try to look closer at later) 17:15:30 rdieter_work: that would be my understanding. from other discussion, those deps are dropped in the compose process. 17:15:33 but check with dgilmore. 17:15:57 ok, though last I'd heard that was supposed to get fixed for f25 (definitely did not work in f24) 17:16:04 so digikam is explicitly excluded from the KDE live 17:16:21 ok, confirmed ^^, digikam is not included on spin and is the only affected component 17:16:27 sorry, my bad 17:16:45 i could still go for an FE just to fix up the deps in stable, i guess 17:16:46 (I thought kipi-plugins, generated from same src.rpm used this dependency too) 17:17:38 adamw: I am fine with FE as well, just to have "clean table" 17:18:12 i'm still +1 17:19:27 proposed #agreed 1366023 - AcceptedFreezeException (Alpha) - we confirmed this does not actually affect the KDE live image, but we're still OK granting a freeze exception to fix the broken dependencies in the 'stable' repository 17:19:39 ack 17:20:35 ACK 17:22:39 #agreed 1366023 - AcceptedFreezeException (Alpha) - we confirmed this does not actually affect the KDE live image, but we're still OK granting a freeze exception to fix the broken dependencies in the 'stable' repository 17:22:58 alrighty, so now we really can move on to accepted blocker review 17:23:06 #moving to the Alpha accepted blockers 17:23:12 #topic (1365661) Cloud images fail to compose from 20160809.n.0 17:23:12 #link https://bugzilla.redhat.com/show_bug.cgi?id=1365661 17:23:12 #info Accepted Blocker, distribution, NEW 17:23:47 so we just don't have much info on this one 17:23:55 i know releng has been looking at it, but apparently not updating the bug 17:24:10 hmm i'm getting an error from fedfind today about metadata 17:24:25 pastebin? 17:24:29 oh 17:24:56 I don't think it's a fedfind problem I think it's a pungi issue (?) 17:25:01 huh, it shouldn't be trying to do 20160815.n.0, dunno why it is. 17:25:03 Might be temporary 17:25:09 i'll look at it later. 17:25:41 Yeah was just looking to see if any cloud images were being made 17:25:52 anyhow, basically we haven't had a successful f25 or rawhide compose for several days 17:26:13 dgilmore: nirik: any word on the status of f25/rawhide composes? 17:26:35 there's ones running now we have hopes for. 17:27:23 okay. did we ever find out what was stopping the cloud images specifically from building? or does that still need fixing once the overall compose is working again? 17:28:07 its a kernel/dracut issue maybe 17:28:15 not that I know of 17:28:15 no idea what teh probelem is 17:28:19 the logs have no infor 17:28:25 last I looked it was that it timed out. 17:28:39 last I looked there was a traceback 17:29:00 but i have only been looking at rawhide 17:29:53 okay...well, i guess first we try to get any f25 compose, then we go from there 17:30:23 #info the whole Rawhide and F25 compose process has been failing for the last few days, so we have little concrete info here; first we will try to get an F25 compose completed at all, then move on from there 17:30:46 #topic (1352680) efibootmgr calls in anaconda crashing since efivar-0.24-1.fc25 landed 17:30:47 #link https://bugzilla.redhat.com/show_bug.cgi?id=1352680 17:30:47 #info Accepted Blocker, efibootmgr, NEW 17:31:49 so pjones did new efivar and efibootmgr builds last friday which do fix this bug, but there were some other issues and packages not rebuilt that still need cleaning up 17:31:58 i cleaned up rawhide but left f25 for pjones to do, at least until tomorrow 17:32:09 he's around today so i expect he'll be tidying things up and submitting an update 17:34:39 #info pjones is in the middle of working on this, update should be coming soon 17:35:15 #topic (1324623) glibc: split libcrypt into separate package and package libcrypt-nss with NSS-based implementation 17:35:16 #link https://bugzilla.redhat.com/show_bug.cgi?id=1324623 17:35:16 #info Accepted Blocker, glibc, ASSIGNED 17:35:23 so i'm kinda out of the loop on this one... 17:35:32 dgilmore / nirik are you guys more closely following it? 17:35:34 it breaks arm images 17:35:46 because yum tries to install both packages 17:35:54 because we build them with appliance tools... 17:35:55 and they conflict 17:36:09 which uses livecd-tools and thus yum... yeah 17:36:20 it does not use livecd-tools 17:36:48 it has a requires on it? 17:36:52 livecd-tolols and appliance-tools are seperate 17:37:02 but they have a shared library they use 17:37:06 nope 17:37:16 so what is the bug waiting on? i saw some discussion of something being referred to fesco 17:37:17 sorry my network is not great 17:37:21 % rpm -q appliance-tools --requires | grep livecd 17:37:21 livecd-tools >= 020 17:37:33 glibc refuse to revert the change 17:37:49 so, pbrobinson had some thoughts on the devel list: https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org/message/EO4LOQLSSNL3NYIKDKXDCJNZ5EUSMH7E/ 17:37:58 but I have no idea how feasable that all is before alpha 17:37:58 they ran to fesco to somoehow have it forced in 17:38:08 nirik: its not viable for f25 17:38:20 its a massive amount of work 17:38:29 something we plan to work on in f26 17:38:35 its already on our list for it 17:38:55 * adamw looks up fesco meeting times 17:39:01 friday. :) 17:39:07 friday 17:39:38 we maybe can work around it by pulling in libcrypt-nss 17:39:41 but a 'don't use weak deps' is kind of closing the barn door long after the animals have all wandered off 17:40:08 so fesco considered it in the light of 'oh dear what do we do about weak deps' but didn't really get the urgency of figuring out what to do about *this* bug *right now*? 17:40:44 right 17:40:46 (i'm guessing just from the minutes here) 17:41:31 * dgilmore has not read the minutes yet 17:42:30 adamw: to me its not really clear how they thought it would all work 17:42:30 If we can't move from appliance-tools, then the options left are workaround it somehow, or change glibc.... which they don't want to do 17:43:35 only wayy to move off of appliance-tools is to get quite a bit of koji work done, as well as some pungi work 17:44:09 why exactly does yum/dnf try to pull in both packages? 17:46:15 they both provide the same things that glibc needs. 17:46:28 libcrypt.so.1 and such 17:46:44 Can we add something to the kickstart files to exclude one of the packages or possibly exclude it in the repo definition? 17:46:54 but there's a recommends: libcrypt-nss 17:47:21 so dnf pulls that. yum fails and tries to install both 17:47:33 that still seems like bizarre behaviour on yum's part 17:47:40 wouldn't it usually just pick one? 17:47:57 this isn't the only place we have multiple packages providing the same thing, after all, and i'm sure yum doesn't always choke on it. 17:48:15 adamw: In yum, "Recommends:" is just short-cutted to be treated as "Requires:" 17:48:23 So it ends up thinking it Requires: both packages. 17:48:29 nothe logs provide no detail as to why its trying to get both 17:48:35 And those two packages conflict 17:48:50 sgallagh: unless there's also an explicit Requires: libcrypt somewhere, it could still just be happy with just libcrypt-nss ... 17:49:07 adamw: Yeah, there's definitely a backtracking bug somewhere 17:49:18 But it's probably not worth the engineering time to figure it out in yum 17:49:31 i dunno, do we have a better option? 17:50:32 not sure 17:50:39 I was planning to look at it more this week 17:50:49 When you define a repo you used to be ableto exclude packages so they couldn't be pulled in. This used to be done to get the correct kernel packages and correct alternatives for some other packages. 17:51:10 brunowolff: ?? 17:52:07 we lost the ability a long time ago to add excludes on the repo lines 17:52:09 We used to do that for live images a while back. The repo ks command had an exclude option. 17:52:24 when we switched everything to being in koji 17:52:29 * kparal needs to go. see you 17:52:49 Oh, I didn't know it didn't work anymore. I thought we just didn't need it. 17:53:07 nope, it stopped being an option 17:53:16 you know, the error you posted is slightly odd 17:53:24 the versions of libcrypt and libcrypt-nss are different 17:53:41 it's almost as if libcrypt is being pulled in because it provides a different soname and some other package hasn't been rebuilt 17:53:58 adamw: possible 17:54:09 * adamw goes looking for an f25 compose log 17:54:19 but that would be weird as they come from the same rpm 17:54:23 well srpm 17:54:37 https://kojipkgs.fedoraproject.org//work/tasks/6208/15226208/root.log is the one I was looking at. 17:54:40 minimal is working 17:54:50 so something in every other image is pulling the extra one in 17:55:24 hmm, yeah, https://kojipkgs.fedoraproject.org//work/tasks/9953/15199953/root.log shows the same conflict with equal versions 17:56:23 adamw: it needs more investigation 17:57:03 yeah... 17:57:08 i guess we don't need to do it live 17:57:41 #info we are still investigating this and deciding on the best fix. there are open questions about yum's behaviour and what dependency is triggering this. various folks are looking into it 17:57:54 #topic (1353054) FreeIPA server deployment fails due to pki-core dangling symlinks (one from non-installed 'scannotation' package, one formerly in resteasy-jaxrs-api but now lost) 17:57:54 #link https://bugzilla.redhat.com/show_bug.cgi?id=1353054 17:57:54 #info Accepted Blocker, pki-core, ON_QA 17:59:10 this one is fixed, and we can push it stable now, so nothing much to say 17:59:18 #info this is fixed and fix has been tested by adamw, will be pushed stable soon 17:59:21 #topic Open floor 17:59:33 that's all we had on the lists - any other f25-related topics for discussion, or missed bugs? 18:00:14 Nothing here! 18:00:27 * cmurf has nothing 18:00:45 nada 18:01:11 * adamw sets fuse 18:01:31 * jkurik has nothing 18:01:56 alrighty, thanks for coming, folks 18:02:07 #endmeeting