17:00:31 #startmeeting fpc 17:00:31 Meeting started Thu Jan 5 17:00:31 2017 UTC. The chair is geppetto. Information about MeetBot at http://wiki.debian.org/MeetBot. 17:00:31 Useful Commands: #action #agreed #halp #info #idea #link #topic. 17:00:31 The meeting name has been set to 'fpc' 17:00:31 #meetingname fpc 17:00:32 #topic Roll Call 17:00:32 The meeting name has been set to 'fpc' 17:00:48 Merry new year 17:00:57 Hey :) 17:01:02 #chair mbooth 17:01:02 Current chairs: geppetto mbooth 17:01:35 * limburgher here 17:01:40 #chair limburgher 17:01:40 Current chairs: geppetto limburgher mbooth 17:01:41 Morning. 17:01:49 #chair tibbs 17:01:49 Current chairs: geppetto limburgher mbooth tibbs 17:06:44 huh 17:06:52 #chair orionp 17:06:52 Current chairs: geppetto limburgher mbooth orionp tibbs 17:07:04 5 ftw 17:07:19 Hello - snow day here, so connecting from home 17:07:34 ok 17:07:39 #topic Schedule 17:07:43 #link https://lists.fedoraproject.org/archives/list/packaging@lists.fedoraproject.org/message/X55Q6HWWQTRX67AYGGIL6O7ZMFRV26P2/ 17:08:16 So, all old tickets this week. Are there any that people want to talk about esp.? 17:08:22 Folks, I'm trying to be around but it's a crazy busy day today for some reason. 17:08:30 There was at least one new one recently, though. 17:09:32 There's 667 17:09:41 it wasn't on the agenda as there is no draft yet 17:09:49 but we can all take a look: 17:10:01 #topic #667 Add recommendations for systemd sandboxing directives to packaging guidelines 17:10:04 hi 17:10:06 sorry for being late 17:10:07 .fpc 667 17:10:10 geppetto: #667 (Add recommendations for systemd sandboxing directives to packaging guidelines) – fpc - https://fedorahosted.org/fpc/ticket/667 17:10:11 #chair Rathann 17:10:11 Current chairs: Rathann geppetto limburgher mbooth orionp tibbs 17:10:26 I don't think what I told mattdm is out of line with how anyone else would feel about this. 17:10:50 Basically, "please don't ask FPC to make up security policy". 17:11:20 yes, I think this is FESCo competence, too 17:11:27 * limburgher nods 17:11:35 Kind of … some of them look like best practice type things 17:11:41 I'm all for saying "must be enabled if supported", personally. 17:12:09 I agree 17:12:09 And if anyone with a security hat in Fedora was advocating for them I'd be happy to consider pass them on that alone. 17:12:15 But all we can say is "MAY", "SHOULD" or "MUST". 17:12:20 sure 17:13:13 I'm supportive of promiting it, but would be good to be supported by FESCo 17:13:46 I think it's down on the level of pointlessness to list everything that it's merely OK for packagers to do. 17:14:01 promoting 17:14:25 Right, but how does "promoting" fit into may/should/must? 17:14:43 should or may, I guess :) 17:14:58 Just saying "sure, you can use those options" (i.e. "may") is what I was saying is down to the level of pointlessness. 17:15:08 We could do that with everything supported by anything. 17:15:16 I dont disagree 17:15:58 But I guess that's pretty much all we can do at this point, really. 17:16:57 I figure that having them in the guidelines and recommending usage is "promoting" 17:17:55 Sure, but the guidelines shouldn't really be a dumping ground for promoting random things. If we're going to say you should or must do something, that's a guideline. Or at least, we've been trying to tighten things up to be that way. 17:18:13 Yeh, but as tibbs said we can't list everything that anyone might want to use. 17:19:03 As I said in the ticket, I think a couple of them should have changed defaults and then have guidelines on when people will want to change them back. 17:19:10 Eg. PrivateTmp 17:19:53 Any more discussion on this, or move on? 17:20:29 ok 17:20:32 #topic #665 SSLCertificateHandling policy update 17:20:36 .fpc 665 17:20:37 geppetto: #665 (SSLCertificateHandling policy update) – fpc - https://fedorahosted.org/fpc/ticket/665 17:22:55 I guess I'm +1 17:25:06 Any other coments? Questions? Votes? 17:25:09 I don't like the duplication 17:25:25 between https://fedoraproject.org/wiki/PackagingDrafts/Pkcs11Support (last two paragraphs) and https://fedoraproject.org/wiki/PackagingDrafts/SSLCertificateHandlingUpdate 17:26:30 Can they be merged? 17:26:44 I'd move the last two paragraphs from the former to the latter and merge 17:27:18 That seems reasonable 17:27:25 That seems reasonable 17:27:29 Whoa 17:27:33 :) 17:27:44 :D 17:29:20 Any other comments? Are we mostly happy with it otherwise? 17:29:37 s/happy/not unhappy/ :) 17:29:58 I still barely understand why it's called "SSLCertificateHandling" and why it doesn't tell me how to handle SSL certificates in my packages which need them. 17:30:44 That instead is in the "initial service setup" guideline. (Which I just implemented for a package and ran into issues, but that's another discussion entirely.) 17:32:08 ¯\_(ツ)_/¯ 17:32:27 But otherwise, I guess it's fine but I'm still not sure how it actually relates to packaging. 17:32:31 We could add a link back somehow? 17:33:06 because SSL certs can be stored in the HSMs and accessed using the PKCS#11 provider libraries 17:33:08 We could certainly say "if you're trying to figure out XXX then -> this is the guideline you're looking for." 17:33:23 * geppetto nods 17:33:40 OK, but if I'm packaging something, I have no idea what this guideline tells me to do. 17:33:43 and I believe (some) GPG keys can also be stored 17:34:22 tibbs: it's a guideline for packaging pkcs11 modules 17:34:25 Basically all I see is three SHOULDs (one of which is actually capitalized). 17:34:30 and the name should reflect that 17:34:37 https://fedoraproject.org/wiki/PackagingDrafts/Pkcs11Support <- 17:34:42 I'm looking at SSLCertificateHandlingUpdate 17:35:13 ah, that one shouldn't be in the guidelines IMHO 17:35:25 it's just a regular HOWTO 17:35:39 hm wait 17:35:54 I guess I misunderstood a bit 17:36:00 Programs SHOULD support PKCS#11 URIs and SHOULD NOT use a separate configuration option to load keys and certs, and SHOULD use the tokens which are present in the p11-kit config. 17:36:32 https://fedoraproject.org/wiki/PackagingDrafts/SSLCertificateHandlingUpdate is a guideline how applications which do support loading keys/certs via pkcs11 should be configured 17:36:51 i.e. they should use system-wide config 17:37:10 So just the one sentence is the actual guideline and the rest is just... not guidelines? 17:37:31 there's another one 17:37:48 in the paragraph above 17:37:49 For non-interactive applications which get information on the command line or configuration file, there should not be a separate configuration option to load keys and certificates stored in smart cards, the same option accepting files, should additionally accept PKCS#11 URIs. 17:38:09 Right, that was the second SHOULD I listed above. 17:38:20 ah 17:38:25 you abbreviated it 17:38:27 cool 17:38:39 +1 from me ;) 17:38:39 Not capitalized in the draft. Also will need to fix grammar there. 17:39:19 * Rathann is an avid follower of the KISS principle 17:39:23 +1 if grammar is fixed. 17:39:33 The current https://fedoraproject.org/wiki/Packaging:SSLCertificateHandling is just not what we should be trying to do for guidelines, I'll say that. 17:40:23 Most of that should live elsewhere. The guidelines should just have the two or three SHOULDs I listed above, maybe a link to exposition if that's really needed, and be done with it. 17:40:29 yup 17:40:38 verbosity is a killer here 17:41:06 I'm not entirely sure if the "*Update" document is intended to replace the entire SSLCertificateHandling page or just a portion of it. 17:42:47 Because if the former then that's great. 17:43:12 Anyway, with grammar fixed and SHOULDs capitalized, I'm +1 to https://fedoraproject.org/wiki/PackagingDrafts/SSLCertificateHandlingUpdate 17:43:49 Though due to the confusing name I'll add a link to the initial service setup document. 17:44:17 As for https://fedoraproject.org/wiki/PackagingDrafts/Pkcs11Support.... let's see. 17:45:02 I don't understand why it recommends both pkg-config and just using the direct path. 17:45:42 One recommendation is completely sufficient, and if hardcoding the path is good then why not just do that? 17:46:42 And, then, why wouldn't the three relevant sentences from SSLCertificateHandlingUpdate just go into Pkcs11Support ? 17:47:49 And the SSLCertificateHandling page can hang around saying "if you want to generate self-signed certificates for a service when it starts, see -> here. If you want to know how to handle certificates via PKCS#11, see -> here." 17:48:13 +1 17:48:28 Especially since the third SHOULD of SSLCertificateHandlingUpdate is exactly the same as https://fedoraproject.org/wiki/PackagingDrafts/Pkcs11Support#How_applications_take_advantage_of_registered_provider_modules 17:48:57 And the first is the same as the next section. 17:51:41 Is there some point to the duplication that I'm missing? 17:52:14 I think it's just the different audiences, and they thought one page each was better? 17:52:54 I think tibbs is referring to the last two paragraphs at the bottom of https://fedoraproject.org/wiki/PackagingDrafts/Pkcs11Support 17:53:10 The last three, actually. 17:53:26 tibbs: the first one talks about HSMs and the second about keys/certificates stored on them 17:53:41 Sure, OK, but in the end it says the same thing. 17:53:55 Use p11-kit instead of specifing a provider explicitly. 17:54:08 Talks about PKCS#11 URI and saying to use those. 17:54:09 ah in that case the third from the end talks about modules to support the HSMs 17:54:42 but as you say it can be summarized in one sentence 17:54:55 The fact that it says "RFC7512 defines a 'PKCS#11 URI' as a standard way to identify tokens and objects." identically twice is just kind of weird. 17:57:08 I want to say I'll take a pass over both pages and try to make something which makes sense. 17:57:44 You want to say that? 17:57:49 I just don't want to make promises right now as it's going to be a busy time for me for the next three weeks. 17:58:04 I can say that I'll maybe try to find half an hour to do it. 17:59:18 * geppetto nods 18:01:19 #action tibbs Try to tidy up what we have, might be a couple of weeks though. 18:01:25 #topic #635 FC Automatic Provides for Python RPM Packages 18:01:30 .fpc 635 18:01:31 geppetto: #635 (FC Automatic Provides for Python RPM Packages: Accompanying change of Python packaging guidelines) – fpc - https://fedorahosted.org/fpc/ticket/635 18:01:46 So it looks like the person who opened it moved it from needinfo to meeting, which is nice. 18:02:59 I guess they answered the question though 18:04:45 The proposal in comment 16 looks reasonable to me. 18:04:51 I think this is the diff: https://fedoraproject.org/w/index.php?title=User%3ATorsava%2FPackagingDrafts%2FPython&diff=477448&oldid=466988 18:06:13 But if that's what they're presenting currently, the draft hasn't been updated to use it as far as I can tell. 18:07:45 Yeh, I'm happy with the small number of macros 18:08:05 And having problems on the build side seems like something that we could live with 18:08:23 I also like the 3-macro version better 18:08:26 It can get awfully verbose with multiple dependencies, though. 18:08:42 Unless they do %{py2_dist A B C} or something like that. 18:09:46 Eh, I'm fine with it either way … but I guess it'd be nice to support N args. 18:09:52 yeah that'd be shorter 18:10:05 but I personally like to have one dependency per line 18:10:17 makes it more readable and makes future diffs smaller 18:10:31 I don't know if they have. I group dependencies as they make sense, as a big block of dependencies is far from readable. 18:10:33 So are we good to say please update the draft to reflect comment 16 and we'll probably approve it? 18:10:46 geppetto: yes 18:10:49 Ok 18:11:10 I think so. 18:11:18 #action Proposal in comment 16 seems fine, please update draft so we can approve it. 18:11:25 I am there, yes, but it would be nice to be specific about what argument(s) the %py*dist* macros take. 18:12:12 #info It would be nice to be specific abut what arguments the py*dist macros can take (Eg. multiple names). 18:13:12 #topic Open Floor 18:13:21 tibbs: I assume nothing has happened with 661? 18:13:26 I am still well behind on everything. 18:13:31 * geppetto nods … no problem 18:13:57 I'm trying to get a pending redhat-rpm-config update out before I go trying to change anything else. 18:14:24 Since I unkindly obsoleted orionp's update and then somehow mine got invalidated. 18:14:28 Back to testing for another week. 18:17:40 * geppetto nods 18:17:57 Did orionp's change get lost or rolled into your new one? 18:18:43 No, but the update got superceded. 18:19:35 And then another package got attached to my update, and then a newer version of that one got submitted in its own separate update and got enough karma to go to stable. So my update couldn't be pushed because it contained a package older than what's currently in the distro. 18:19:46 So that package was then removed from my update, which sent it back to testing. 18:20:07 ok 18:20:32 I feel like it should just be pushed to stable now, as it's been tested a bunch 18:20:34 Bodhi doesn't warn when any of that happens, so you have to check closely before you mess someone else's update. 18:20:44 * geppetto nods 18:21:01 It's kind of optimised for one update one package/packager 18:22:43 Anything else? 18:24:42 Ok, thanks for coming everyone. See you next week. 18:24:58 #endmeeting