16:00:04 #startmeeting fpc 16:00:04 Meeting started Thu Jul 25 16:00:04 2019 UTC. 16:00:04 This meeting is logged and archived in a public location. 16:00:04 The chair is geppetto. Information about MeetBot at http://wiki.debian.org/MeetBot. 16:00:04 Useful Commands: #action #agreed #halp #info #idea #link #topic. 16:00:04 The meeting name has been set to 'fpc' 16:00:04 #meetingname fpc 16:00:04 #topic Roll Call 16:00:04 The meeting name has been set to 'fpc' 16:00:11 Hey, folks. 16:00:16 hey there 16:00:16 #chair tibbs 16:00:16 Current chairs: geppetto tibbs 16:00:17 hello 16:00:19 * limburgher here 16:00:20 #chair decathorpe 16:00:20 Current chairs: decathorpe geppetto tibbs 16:00:24 #chair limburgher 16:00:24 Current chairs: decathorpe geppetto limburgher tibbs 16:00:28 #chair mhroncok 16:00:28 Current chairs: decathorpe geppetto limburgher mhroncok tibbs 16:00:34 Hey everyone 16:00:52 just as a heads-up, I'll have to leave a bit early today 16:01:05 ok 16:02:05 Hi. Do you need me today or I can be missing? 16:02:13 #chair ignatenkobrain 16:02:13 Current chairs: decathorpe geppetto ignatenkobrain limburgher mhroncok tibbs 16:02:24 You turned up, so volunteered yourself ;) 16:02:42 ignatenkobrain: We do have 6, so if you have to leave we'll still have quorum 16:02:48 At leat for a bit. 16:04:54 #topic Schedule 16:04:57 #link https://lists.fedoraproject.org/archives/list/packaging@lists.fedoraproject.org/message/FYPIOCSSQS7FSI6WB4TQOHAIMVRR2J5A/ 16:05:06 #topic #907 Which %__foo macros for executables are acceptable? 16:05:09 .fpc 907 16:05:10 geppetto: Issue #907: Which %__foo macros for executables are acceptable? - packaging-committee - Pagure.io - https://pagure.io/packaging-committee/issue/907 16:06:13 So, Panu's answer is useful to us. 16:07:17 if I understand this correctly, there's almost never a need to use the double-underscored macros for executables, except if you're doing weird thingsß 16:07:19 ? 16:07:39 Basically, you probably shouldn't be using %__anything unless you're setting it to change some RPM behavior. 16:08:00 Yeh, I'm fine with tibbs cleanup comment 16:08:03 So basically only after %define or %global. 16:08:14 I still need to actually do the random cleanups I mentioned. 16:08:23 * geppetto nods 16:08:33 Same. 16:08:41 sounds good :thumbsup: 16:08:47 Changes to Perl and Python guidelines would go via PR anyway. 16:08:47 👍 16:09:14 But I guess in general we should just not have them used in examples and such. 16:09:36 One question I have is under what circumstances the caller's PATH leaks into an RPM build. 16:09:52 the python case needs a deeper avaluation, as we actually now use ti to redefine python_sitelib etc. based on __python 16:10:18 mhroncok: But that would be a case where you set %__python, right? 16:10:22 tibbs: I know it doesn't in mock/etc. … but I'm not sure if it's been cleaned up in rpmbuild. 16:11:09 gepetto: using plain rpmbuild does all kinds of weird things, I wouldn't be surprised if it took executables from the user-modified PATH 16:11:25 tibbs: yes, but do we want to advice "only use %__python if you set it (already the case) + only use %__python3 if you set it (not the case now)? 16:11:26 typo, sorry 16:12:01 mhroncok: I guess I'd have to know the specific case where it's useful. 16:13:01 And if it is, maybe we could provide something other than a double underscored super internal macro for people to use when they just want to call a python version that might vary between systems. 16:14:04 probably 16:14:24 Anyway, I'm in the guidelines now so I can work on the trivial cleanups and then we can discuss the python things in the ticket. 16:14:34 ack 16:14:47 I'm sure there will always be some valid reason to use these things but we really should try to cut down on some of the cargo culting. 16:15:15 totally agreed 16:15:25 So we can have a general "don't do this" rule and then if a guideline really does intentionally tell someone to "do this" then it can include a line of explanation. 16:16:16 sure, I'm fine with that … where do you want to put it? 16:17:07 I'll think about it and send a PR. 16:17:11 ok 16:17:35 But somewhere under https://docs.fedoraproject.org/en-US/packaging-guidelines/#_macros 16:17:56 And probably reinforced in https://docs.fedoraproject.org/en-US/packaging-guidelines/RPMMacros/ 16:18:24 * geppetto nods … sounds good to me 16:18:37 #topic #909 Suggest that linting/measuring-coverage is not for %check 16:18:41 .fpc 909 16:18:43 geppetto: Issue #909: Suggest that linting code and measuring coverage is not %check's business - packaging-committee - Pagure.io - https://pagure.io/packaging-committee/issue/909 16:20:07 while I agree that Code Coverage and such things should be done upstream, I think if it's easier to let it enabled in the build than to patch things to enable it ... we can probably let it be 16:21:05 I think the issue is dependencies. 16:22:10 right. for example, I don't think it necessary to create new packages for code coverage tools just to enable this stuff in other packages 16:22:32 My proposal was not to say "you SHOULD disable these things" but give a general set of conditions where you MAY disable checks, and then list linting and coverage checks as explicit examples. 16:22:33 we seriously fight this over and over again when updating python 16:23:18 I guess my proposal in https://pagure.io/packaging-committee/issue/909#comment-580051 is on the table. 16:23:20 where the linter fails builds? 16:23:20 I realize that carrying an enormous patch just t get rid of a dependnecy on a coverage tool that is available might be overkill 16:23:28 Ahh, I see 16:23:44 Can you not request upstream make it easier? 16:23:51 you should 16:24:15 that was my idea when I proposed this 16:24:20 * geppetto nods 16:24:34 I'm happy for people to ignore this if it's annoying/hard. 16:24:42 what tibbs proposed is somewhat OK, but I'd still prefer if we explicitly say that %check is not for coverage/linting 16:25:22 Could we say something like: SHOULD be disabled if possible with reasonable effort? 16:25:47 I'm fine with that 16:25:58 I think there are plenty of valid reasons for running those things in %check (as I wrote in the above-linked comment). 16:26:24 I just think there are also good reasons why you might want to do, and so I think it's reasonable to be permissive here. 16:26:45 mhroncok, I like it. 16:26:53 If running those tools is causing some kind of problem (dependency bloat, circular dependencies, long build times, etc) then sure, disable them. 16:27:20 But I don't see the benefit in telling everyone to do extra work to disable them. 16:27:52 Is there some conflict among the python developers which would be resolved by the packaging guidelines suggesting one way or the other? 16:28:03 not a conflict 16:28:24 particularly the motivation is that if there is no guideline, peeople keep adding those things forever 16:28:50 and we need to go and ask packager by packager: could you please get this out? it causing trouble and brings no benefit 16:29:09 while having it as a guideline might eventually (haha) make it an automatic thing 16:29:26 however I can live with tibbs'es proposal for now 16:29:55 My point is that if it causes problems then that should be sufficient reason for someone to disable it, as long as the guidelines allow it to be disabled. 16:30:14 ok 16:30:17 Right now you could read the guidelines as telling people that they should enable every single thing that the package will test. 16:30:21 that makes sense 16:30:38 I've added my +1 to that in the ticket 16:30:50 do we want to vote on your proposal here? 16:31:07 Well you can assume my +1, and ignatenko was +1 in the ticket. 16:32:20 As an aside, is there a reasonable automated way to disable these types of tests for a python package? 16:32:43 There are so many different test suite packages, but even if we could catch the common ones.... 16:33:29 tibbs: unfortunately not, but we are working towards a common way of running the tests: https://github.com/fedora-python/tox-current-env 16:33:52 Voted in ticket. 16:34:02 once we are there, maybe we can dig deeper, but it can still be buried under layers of configs 16:34:27 it's usually a sed oneliner, but on a different file 16:34:33 I guess there is for Ruby. And to be honest, I'd have no problems if a whole language ecosystem decided to disable these things by default. 16:34:48 (some packages invoke linters explicitly: %check: make lint, or %check pylint */*.py 16:35:39 It would be nice to know if packagers are doing that because they believe there is benefit, or if they believe that they must. 16:37:04 maybe a bit of both 16:38:11 Well if we get one more +1 then I think we can help cut down on the latter. 16:39:03 you can have my +1 as well, before I need to run 16:39:06 sorry :) 16:42:14 no problem 16:42:21 Not sure if my +1 was counted either 16:42:39 I didn't see it, sorry. 16:42:47 tibbs: You want to do an #action? 16:43:10 And mine. 16:43:26 Whatever works; I don't usually stand on parliamentary procedure. 16:43:49 I'm more a fan of rough consensus and git revert. 16:44:00 It's fine … I mostly use it so the people in the ticket know what is happening. 16:44:15 #topic Open Floor 16:44:42 Not sure we can do another ticket, so anything to talk about before next week? 16:44:52 I'm working on the Users and Groups thing now. 16:45:03 good timing for Open Floor. I need to leave, sorry :) see you next week, guys 16:45:38 Somehow the wiki conversion lost all of the admon/note and admon/warning things in that document. 16:45:56 I wonder how many of those were lost in other documents. 16:45:59 Oh, that's weird 16:46:13 Do we have it in the history on the old page? 16:46:28 Yeah, it's all there but was not in the initial conversion to git. 16:46:33 :( 16:47:08 That document is... not great but I was hoping to avoid having to mess with it until we overhauled the whole user/group creation thing. 16:47:33 Looks like that is stalled out or is a big mess, sadly. 16:47:51 So anyway, I'll fix the document because some important info was lost. 16:48:26 I have three PRs where I appreciate feedback: https://pagure.io/packaging-committee/pull-request/894 https://pagure.io/packaging-committee/pull-request/903 https://src.fedoraproject.org/rpms/redhat-rpm-config/pull-request/65 16:48:41 I'd 16:50:15 fort he Cython one, maybe a complete rewrite :D 16:50:31 I will try to look at them. Am still so terribly busy. 16:51:54 thanks 16:52:24 the verify source new guidelines wasnt taken very well 16:52:35 how come? 16:52:56 The very old pre-dist-git system used to have a way to check tarballs before uploading them. 16:53:01 my PR tries to make it a bit more usable. no code golf, but no extra long copypasta either 16:53:39 sounds good 16:53:41 Checking before uploading makes sense, but checking as part of the package build process also makes sense. 16:53:51 I agree that ti makes sense 16:54:16 "belt and suspenders" is one phrase that comes to mind. 16:54:20 but I also think that %{gpgverify} --keyring='%{SOURCE2}' --signature='%{SOURCE1}' --data='%{SOURCE0}' - is a bit too verbose 16:54:51 Yes, when I was trying to hack this originally I did a lot of work to make it simpler (like automatically determining the first two options). 16:55:33 But I kind of got lost in the process of making it too magical and never ended up producing something that anyone would want to use. 16:58:50 Fair enough 16:58:52 time to end meeting? 16:58:58 Yeh, I think so 16:59:10 #endmeeting