17:00:34 #startmeeting FESCO (2023-02-28) 17:00:34 Meeting started Tue Feb 28 17:00:34 2023 UTC. 17:00:34 This meeting is logged and archived in a public location. 17:00:34 The chair is sgallagh. Information about MeetBot at https://fedoraproject.org/wiki/Zodbot#Meeting_Functions. 17:00:34 Useful Commands: #action #agreed #halp #info #idea #link #topic. 17:00:34 The meeting name has been set to 'fesco_(2023-02-28)' 17:00:34 #meetingname fesco 17:00:34 The meeting name has been set to 'fesco' 17:00:34 #chair nirik, decathorpe, zbyszek, sgallagh, mhroncok, dcantrell, music, mhayden, Conan_Kudo, Pharaoh_Atem, Son_Goku, King_InuYasha, Sir_Gallantmon, Eighth_Doctor 17:00:34 Current chairs: Conan_Kudo Eighth_Doctor King_InuYasha Pharaoh_Atem Sir_Gallantmon Son_Goku dcantrell decathorpe mhayden mhroncok music nirik sgallagh zbyszek 17:00:34 #topic init process 17:00:37 .hello2 17:00:39 zbyszek: zbyszek 'Zbigniew Jędrzejewski-Szmek' 17:00:45 .hello2 17:00:48 mhayden: mhayden 'Major Hayden' 17:00:53 .hi 17:00:53 .hi 17:00:56 decathorpe: decathorpe 'Fabio Valentini' 17:00:59 morning 17:01:00 sgallagh: sgallagh 'Stephen Gallagher' 17:02:01 .hi 17:02:03 salimma: salimma 'Michel Alexandre Salim' 17:02:45 .hello2 17:02:46 dcantrell: dcantrell 'David Cantrell' 17:02:47 .hello2 17:02:49 bcotton: bcotton 'Ben Cotton' 17:03:44 OK, we have quorum. Let's get started 17:04:09 #topic #2960 FESCo blocker bug: Popular third-party RPMs fail to install/update/remove in F38 due to security policies verification 17:04:09 .fesco 2960 17:04:10 sgallagh: Issue #2960: FESCo blocker bug: Popular third-party RPMs fail to install/update/remove in F38 due to security policies verification - fesco - Pagure.io - https://pagure.io/fesco/issue/2960 17:04:31 * decathorpe ducks 17:04:50 My reading of this ticket thus far is that we agree that the current situation is blocking for Beta, but we don't agree on what would constitute a valid solution to unblock it. 17:05:38 In my opinion,l at least the packages and repositories that are shipped with Fedora Workstation OOTB need to work ... 17:06:05 (that would probably be the google-chrome repo and RPM, I assume that RPMFusion is not affected) 17:06:05 Define OOTB? Because there's a checkbox in gnome-firstboot to enable some of them 17:06:12 Did we say beta? 17:06:27 .hello churchyard 17:06:28 mhroncok: churchyard 'Miro Hrončok' 17:06:34 sorry for being late 17:06:36 ah, we did 17:06:54 ideally the ones we either enable by default or promote should work, right? 17:07:08 I really really don't think we should remove things people installed. 17:07:10 Michel Alexandre Salim 🎩: *Ideally* everything should work everywhere, all the time 17:07:52 this is definitely a "people will blame us, even if it's not our fault" situation 17:08:16 So, would anyone be willing to reconsider the Beta blocker? If we made it Final instead that would be more incentive for fixing and make the problem more obvious to everyone? 17:08:18 .hello ngompa 17:08:19 Eighth_Doctor: ngompa 'Neal Gompa' 17:08:51 nirik: A large enough subset of Fedora developers use Chrome that I think shipping Beta without fixing this would result in much lower testing 17:09:04 nirik: I think postponing is not good. It just moves the can down the road a bit, but makes our Beta semi-useless for a large fraction of people. 17:09:17 and a significant number of Fedora contributors actually need Chrome working 17:09:20 there is a new proposal in the ticket 17:09:21 well, there's workarounds... and Beta testers would be much more likely to do that than end users. 17:09:28 Back when we had Alpha's, I'd say that this is OK for Alpha. 17:09:32 by Workstation WG 17:10:00 * nirik goes to read. grumbles about people updating things right before meetings. 17:10:24 * salimma wonders if the MS repos are affected too, won't be surprised if they are 17:11:05 * zbyszek really likes the WorkstationWG's proposal (https://pagure.io/fesco/issue/2960#comment-843816) 17:11:25 well, that sounds ok to me, but... I am not sure how feasable it is. 17:11:26 Some details would need to be clarified though. 17:11:49 zbyszek: i like it too, but i wonder how much work it would be to go backwards 17:11:53 I.e. I think I'd be fine with adding back SHA1 to the default policy. 17:11:57 unless crypto-policies has come up with a per application way to override things we would have to drop the SHA1/DSA stuff globally. 17:12:05 How hard would it be to get RPM/DNF to make a loud noise about the signature in a way that spurs action? Something like "WARNING! The software "foo" does not have a valid signature. It may have been compromised by a third-party. Please contact the maintainer of the repository." 17:12:44 it also DSA I think? 17:12:50 Should be possible. At least the new RPM GPG implementation should provide better error messages than the old one 17:13:16 the old one didn't honor system wide crypto at all. ;) 17:13:31 there's that, and the old one also just said "FAILED" ... 17:13:45 but either way, this probably won't help anyone who doesn't use the dnf CLI 17:14:11 Failed to import public key "https://dl.google.com/linux/linux_signing_key.pub" to rpmdb. 17:14:25 Does GNOME-Software not have the ability to report errors back to the user? 17:14:25 That's what is says right now. I'd say that is not terribly useful. 17:14:59 zbyszek: that's a different component AFAIK 17:15:04 I feel like this is a chicken-egg problem. Nobody fixes the chrome RPM if it continues to work, but we are afraid to break it. 17:15:09 I'm not sure we should drive off into the implementation details. How about we just say it's a beta blocker and ask rpm/gnome-software/dnf/crypto-policy folks to work together to come up with a solution? 17:15:16 mhroncok: +1 17:15:46 nirik: Well, we have already been asked whether "roll back the SHA1/DSA change" is on the table. 17:15:56 if we break it, there needs to be a well-documented escape hatch ... (i.e. in release notes, common bugs, release announcement blog posts, ... etc) 17:16:40 And we've been asked whether it's okay to just automatically uninstall packages with bad signatures. 17:16:53 These are definitely questions that we need to answer. 17:17:06 well... I think it could be, but we don't know if it's needed yet do we? has anyone asked crypto-policy folks? are they even aware of this? 17:17:12 So… in the ticket I wrote that I support uninstalling packages, but after reading the comments, I'm -1 on that now. 17:17:26 I don't think automatic uninstall is acceptable. Given the options, reverting seems to be the best option because this will knowingly break behavior for existing users 17:17:43 I am -1 to automatic uninstall. I'm fine with 'I can't do anything until you remove this package or work around this issue' 17:17:48 worth considering is RH is moving to Fedora for CSB, which we probably don't want to break third party RPMs on 17:18:09 not sure what CSB is 17:18:18 the IT-supported install of the OS 17:18:22 previously was RHEL 17:18:23 It's the OS they preinstall on the company laptops and support 17:18:27 CSB==corporate standard build 17:18:42 thanks for clarifying 17:19:08 (I don't think it's much relevant for us here.) 17:19:26 mhroncok: It's relevant insofar as it represents a large constituency that will be affected 17:19:28 no, it's just a known user that will be relying on third party RPMs 17:20:01 similar to WSB, we also preinstall Chrome at Meta 17:20:05 I'd like to have the crypto policy folks weigh in... see if they can come up with a way to just exempt rpm... 17:20:07 sorry, CSB 17:20:42 I mean whoever creates CSB is probably capable of making their own adjustments 17:21:03 it's more the users who don't have a customized Fedora we should worry about 17:21:17 *customized build of Fedora Linux 17:21:39 is it though? I don't really consider CSB *that* customized beyond adding third party RPMs and some config files. that's a full giant build of an OS 17:21:53 I think it's in the same category as any random user wanting to install RPMs we don't provide 17:22:07 Proposal: If third-party repo support is enabled, RPM needs to accept SHA-1 hashes for Fedora 38, ideally with a deprecation warning. FESCo strongly advises against allowing SHA-1 hashes elsewhere, but will accept that for F38 if it's the only achievable, timely solution. 17:22:46 .hello music 17:22:47 music[m]: music 'Benjamin Beasley' 17:22:52 Am I understanding things correctly that there's two things that break without SHA-1 signatures - RPM package signatures and repo signatures? 17:22:55 I can be +1 to that I think. 17:22:57 Sorry I had to be a bit late again. 17:23:04 sgallagh: a question: just setting update-crypto-policies DEFAULT:SHA1 is *not* enough to get the google chrome repo signature to be imported. 17:23:10 Fabio Valentini: yes. 17:23:11 we don't check repo signatures in Fedora yet right 17:23:21 for Fedora repos anyway 17:23:23 Stephen Gallagher: this part "If third-party repo support is enabled" -- what is the consequence of that if? 17:23:28 zbyszek: I'm aware, but I am not specifying a solution, just a guideline for unblocking 17:23:30 zbyszek: because it's DSA I think? 17:23:41 Yes, it is DSA. 17:23:56 (which is also blocked in the current policy) 17:23:56 Do you know how to add DSA to the crypt policy? 17:24:11 OK, amend my proposal to say SHA-1/DSA wherever it says SHA-1 17:24:16 there's no seperate way currently you have to do LEGACY 17:24:28 mhroncok: Sorry, can you rephrase? 17:24:28 they could add a module for DSA like they did SHA1 tho I think 17:24:41 just saying, there would also be the possibility of making RPM (tempirarily) not honor crypto policy ... 17:24:47 So should we amend sgallagh's proposal to also include DSA? 17:24:51 Stephen Gallagher: what does it mean "If third-party repo support is enabled"? 17:24:54 I mostly mean if they tick the "allow third-party software" box in gnome-initial-setup 17:24:58 is it a checkbox somewhere? 17:25:08 And whatever the equivalent is for other DEs 17:25:14 I am not sure thats possible. I know it wasn't back when gnutls wanted to except something... 17:25:15 becasue third party repo support is always enabled 17:25:17 Just allowing SHA1 doesn't even solve the most visible issue with google-chrome-stable. 17:25:28 In GNOME, it is. 17:25:30 (problem: that doesn't work everywhere, and it doesn't consider upgrades) 17:25:31 how do we handle that for upgrades? 17:25:58 we don't have any state for tracking that? 17:25:59 If there isn't a common mechanism for that, I'll amend my proposal then: 17:25:59 in other words: if users add the chrome repo manually, it's OK that it doesn't work? 17:26:06 yeah, I don't think modifying crypto policy based on which repos are enabled is a good idea ... 17:26:31 does the polocy auotmatically changes based on what repositories are enabled? 17:26:35 *policy 17:26:52 Proposal: RPM must accept SHA-1 hashes and DSA keys for Fedora 38, ideally with a deprecation warning. FESCo strongly advises against allowing these algorithms elsewhere, but will accept that for F38 if it's the only achievable, timely solution. 17:27:12 thanks 17:27:14 +1 17:27:16 sgallagh: +1 17:27:18 that sounds good to me. +1 17:27:35 sgallagh: can we say the deprecation warning will note SHA-1/DSA support will be removed in F39? 17:27:39 mhroncok: I wasn't trying to be prescriptive with that statement. Just that it MUST work if they are enabled. Not specifying that it didn't have to in the ELSE case. 17:27:45 I mean disabled 17:27:49 dcantrell: Yes 17:28:08 sgallagh: in that case with the added text, I'm +1 17:28:18 Proposal: RPM must accept SHA-1 hashes and DSA keys for Fedora 38, ideally with a deprecation warning that it will be disabled in F39. FESCo strongly advises against allowing these algorithms elsewhere, but will accept that for F38 if it's the only achievable, timely solution. 17:28:19 +1 here 17:28:24 Stephen Gallagher: I udnesratnd now what you meant, but it IMHO made the statement more complex than it needed to be 17:28:30 what happens if google fixes it before f38 release? ;) 17:28:35 still +1 17:28:44 still +1 17:28:47 nirik: let's plan for that once hell freezes over 17:28:47 Stephen Gallagher: +1 17:28:49 still +1 17:28:49 nirik: We throw a *&*^ing party 17:28:59 nirik: we cancel F38 and start over. 17:29:03 +1 for the latest proposal 17:29:12 do we have approval that the existing behavior is a Beta blocker? 17:29:33 good question 17:29:47 In think we do, but Stephen Gallagher's proposal does not say beta 17:29:50 This presumes that it's a Beta blocker and provides the criteria for unblocking 17:29:56 I'll rephrase (again) 17:30:01 that's implicit in what's being voted on now, imo, but i know adam would feel better if we were very clear on that 17:30:06 Yeah. 17:30:19 I still think it would be ok to make it final, but I'm the minority there it seems... so beta it is? 17:30:37 people are going to do upgrades when the beta goes out 17:30:37 Proposal: FESCo agrees to block Beta on this proposal. In order to unblock, RPM must accept SHA-1 hashes and DSA keys for Fedora 38, ideally with a deprecation warning that it will be disabled in F39. FESCo strongly advises against allowing these algorithms elsewhere, but will accept that for F38 if it's the only achievable, timely solution. 17:30:38 we generally encourage it 17:30:59 still +1 17:31:02 sure. 17:31:05 Stephen Gallagher: +1 17:31:05 +1 17:31:05 s/on/for/, s/proposal/issue/ 17:31:09 +1 17:31:18 FWIW, I upgraded to F38 yesterday and it seemed very smooth. 17:31:19 +1 again 17:31:23 +1 still 17:31:26 +1 17:32:37 mhayden: Vote? 17:33:23 #agreed FESCo agrees to block Beta for this issue. In order to unblock, RPM must accept SHA-1 hashes and DSA keys for Fedora 38, ideally with a deprecation warning that it will be disabled in F39. FESCo strongly advises against allowing these algorithms elsewhere, but will accept that for F38 if it's the only achievable, timely solution. (+8, 0, -0) 17:33:27 +1 from me 17:33:46 #topic #2951 Proposal: policy for resubmitting rejected proposals 17:33:46 .fesco 2951 17:33:47 sgallagh: Issue #2951: Proposal: policy for resubmitting rejected proposals - fesco - Pagure.io - https://pagure.io/fesco/issue/2951 17:34:44 Would more people support this if it was amended to say: 17:35:04 So, my personal take on this is that we probably don't need a formal policy here. FESCo can decide whether to accept a late Change or not on a case-by-case basis. 17:35:08 "Proposals that are formally rejected" 17:35:39 ie, rejected in a meeting and meeting minutes sent out. 17:36:04 Stephen Gallagher: this isn't about lateness, it's about "rejected and then re-voted" 17:36:37 * bcotton has no objection to "formally rejected" 17:36:43 We could just revise the process to say it must reach +5 or -5 for a decision to be official. 17:37:07 Otherwise the vote proceeds to the ticket/next meeting. 17:37:11 that would cause a lot of problems though, because we rarely get that many votes 17:37:31 this is more about transparency than outcome, imo 17:38:03 nirik: I like "formally rejected + announced" better. the problem with just "rejected" is that we often reject proposal as-is, but approve right after with a slight modification or additional conditions. 17:38:47 sending these things back through the entire process instead would be a massive waste of time 17:38:56 yeah, we don't want this to apply to those as it would really slow the process down and add a bunch of red tape 17:39:07 and keep in mind our process timelines are too tight as it is 17:39:28 Transparency is nice, but I feel like it's over-engineering a solution to a rare problem. 17:39:28 fwiw, "formally rejected" captures the intent of my draft 17:39:32 it == this proposal 17:39:41 i did not mean for it to include "not approved until you fix x,y,z" type scenarios 17:40:03 bcotton: I still think that it comes down to people who didn't like the result of a particular vote convincing themselves that if the make the process more onerous the next vote will be better. I think this is mistaken, the results will be the same, just more slowly and with additional annoyance. 17:40:20 considering this entire thing is my fault, I'd rather try to figure out how to eliminate the pressure problem we have for spring cycles 17:40:32 because that's what drove that mess in the first place 17:40:45 we could weaken it a bit more by making 'must' into 'should'... 17:40:50 sgallagh: I don't think it's necessarily rare. Or maybe it is, but when it does happen we don't have to panic late in the cycle to approve something that did not get approved initially. This change would give a clear explanation as to how to restart the process, which would mean "next Fedora" 17:41:04 Eighth_Doctor: actually, I think we have an answer to that question 17:41:08 if we make it should, then it's not worth adding, imo 17:41:09 yeah, it does seem like a solution to a rare problem 17:41:36 i agree with zbyszek that this was driven by people upset with the results, but i also think the process was bad in this case 17:41:44 Essentially, we (FESCo, submitters, commenters) should make an extra effort for complicated proposals. 17:42:08 I.e. if we feel that something is contentious, we should deal with it with high priority. 17:42:24 like i said when #action'ed to write this, sometimes it's better for long-term community health to take on the pain of this 17:42:24 dcantrell: "next Fedora" only if the change has been submitted sufficiently late. earlier submissions can go through more cycles before time runs out 17:42:38 We have this effect above some level of complexity, as the process drags on, we often slip for a week or two without any discussion or progress. 17:43:01 decathorpe: that's true, but even then there's still a deadline at which point we can reject things as formally rejected 17:43:16 Could we just make the timeline a little longer? Have an "early submission deadline" where rejections do not necessarily mean pushing to the next release. And a Final deadline that doesn't get the "tweak and resubmit" treatment? 17:43:21 But that's something to handle via human effort, not with a change of rules. 17:43:35 but if we can't get agreement on this proposal, i'm okay with rejecting it and moving on with life 17:44:04 Actually, I withdraw that suggestion 17:44:10 I'm seeing too many holes in it already. 17:44:17 Stephen Gallagher: good, because i was trying to express how sad it would make me :-) 17:44:32 could we just push out everything by two weeks? 17:45:06 I believe that we need some kind of rules for this to maintain trust 17:46:01 if we reject this with "it makes things slower" but don't have an alternative, we might think that everything is good, but in fact (part of) the community might no longer trust us 17:46:05 do we have enough support for adding the "formally" for it to pass? if not, I think we should just drop it and try not have it happen more if we can help it. 17:46:22 I honestly feel that the inciting situation was a supremely rare occurrence and doesn't necessitate complicating the process. 17:46:23 nirik: you have my axe (not sure if that's enough) 17:46:57 and as always, we can come up with improvements later if we figure out the rules are too strict 17:46:59 But maybe we can add a simple rule: any FESCo member can add the tag "contentious" to the ticket. That tag requires a +7 majority rather than a +5 to pass. 17:47:22 sgallagh: the filibuster? 17:47:30 Stephen Gallagher: I think that's a very bad idea :D 17:47:31 i'm not sure it actually complicates the process. i think in most caes, people would already follow the process 17:47:32 Dammit 17:47:32 oh lord a filibuster 17:47:43 Withdrawn 17:47:47 and complicating the voting process probably creates more problems than it solves 17:48:09 Proposal: Acknowledge that the situation was handled poorly and try to just Do Better next time. 17:48:09 it's already too complex. ;) 17:48:20 sgallagh++ for setting a new world record for number of proposals made and withdrawn in a single #topic 17:48:20 bcotton: Karma for sgallagh changed to 1 (for the current release cycle): https://badges.fedoraproject.org/tags/cookie/any 17:48:28 hahaha 17:48:48 Stephen Gallagher: -1 17:48:53 instead of adding rules, perhaps providing guidance for future change authors might be better 17:49:09 and it's contentious, so you now need +7 17:49:11 oh god 17:49:16 * sgallagh headdesks 17:49:20 * Eighth_Doctor wants to nope out of this 17:49:29 mhroncok++ 17:49:29 bcotton: Karma for churchyard changed to 1 (for the current release cycle): https://badges.fedoraproject.org/tags/cookie/any 17:50:14 Conan Kudo: providing guidance for future change authors is good, but does not solve the trust thing 17:50:30 I still think having some documentation for how to handle this would be good. Just dropping it doesn't feel right, given that there's obviously serious bad feelings about how we handled this last time 17:51:19 We're coming up on 20 minutes on this topic and I don't feel like we're getting close to a solution. Shall we defer and take it to the list until next week? 17:51:26 I don’t have strong feelings on this. I don’t oppose the proposal with the “formally.” I see the case for doing something, because I think many of the people who became concerned about the process would be comforted by a good-faith effort to prevent a repeat. 17:51:45 I'd prefer not to discuss this next week. 17:51:54 As Neal said, "nope out". 17:52:41 So, can we vote on the proposal plus nirik's clarification? Or defer until better days? :) 17:53:01 OK, can we at least define "formally rejected"? 17:53:05 We could try a vote? 17:53:23 "rejected in a meeting and announced on the list"? 17:53:32 in the ticket as well 17:53:35 I can work with that definition 17:53:50 Including Miro's addendum 17:53:55 we can only reject in ticket with -9 17:54:11 "rejected in a meeting, minutes posted to the list and fesco ticket closed' 17:54:13 mhroncok: Uhhh, I don't agree with that. 17:54:15 Can somebody paste the full text? I'm getting lost in all the amendments. 17:54:18 hi from the peanut gallery.. could someone state what the proposal plus addendums is before the vote happens? 17:54:22 I would like to see a proposal that gets -9 and tahn is approved without serious modification :D 17:54:42 oh god 17:54:46 chaos monkey you are 17:54:48 I think the idea was "decision posted in the ticket", not "in-ticket voting resulted in rejection" 17:54:59 Actually, I see what you're getting at. -9 means we can skip the meeting vote. 17:55:03 I can work with that. 17:55:11 yeah because it's totally rejected anyway 17:55:18 I think we've had one case of that before 17:55:29 Since we're editing 17:55:32 More than one, but at least one in the last year or so 17:55:46 Let's not specify the mechanism in the policy here and instead point to the existing vote policy 17:56:01 thanks 17:56:48 Well, the critical point is that it's a publicly announced decision 17:56:51 yeah, agreed. Lets just say 'formally rejected' there and then add what that means to the vote policy? 17:56:52 Let's leave it at athat? 17:56:58 "Proposals formally rejected according to the FESCo voting policy must…" 17:57:15 I suppose it makes sense to clarify the vote policy on that front anyway 17:57:15 formally rejected and announced... ? 17:57:36 redundant, imo, but i'd live with it 17:57:59 all of the decisions get announced anyway 17:57:59 just "according to voting policy" covers too much 17:58:12 I'm still +1 with the nirik amendment 17:58:15 -1 17:58:20 can we do a try-vote and only spend 20-minutes formalizing this if there is a chance of approval? 17:58:24 The entire thing would then be: "Proposals that are formally rejected and announced may be submitted by reconsideration, but they must go through whatever process was originally required before FESCo begins voting." 17:58:28 Ben Cotton (he/him): Sure, but until they're announced, they're Schrodinger's Decision 17:58:42 and, arguably, that opens up the possibility of rules lawyering in cases where the decision was agreed but didn't get announced yet. we want to avoid rules lawyering 17:58:45 +1 17:58:58 So this means +3–4 weeks before the vote can be repeated. Sorry, I think that's madness. 17:59:18 patch "by reconsideration"->"For reconsideration"? 17:59:24 zbyszek: why so many? 17:59:28 * decathorpe tired 18:00:16 nirik: Can we append: "provided that the submission deadline has not passed"? 18:00:17 Because that's how much it usually takes for a ticket to go through ReadyForWranger–>announced on fedora-devel->fesco ticket open->vote. 18:00:52 well, that would be part of 'whatever process' no? 18:00:57 ok 18:01:06 but yeah, I am starting to think we should just drop this entirely... there's too many corner cases. 18:01:27 nirik: i agree it would be part of "whatever process" 18:01:27 zbyszek: it takes 1 week at devel + 1 week at fesco 18:01:29 zbyszek: no, it's a week from the time it lands on my desk until the time i submit it to FESCo 18:01:31 could go 1 week at devel + fasttrack 18:01:55 If there's an ongoing discussion on fedora-devel, we normally would wait with the vote until the discussion dies down again. 18:02:02 it takes two weeks, not one 18:02:17 So "same process" means that we would wait the same, i.e. we could vote e.g. 8 weeks later. 18:02:20 and when Ben Cotton (he/him) is unavailable and the person who wants to get a new vote knows they are running out of time, they can annoucne the proposal on devel themselves 18:03:38 mildly sarcastic proposal: Rejected Changes may not be resubmitted for the same Fedora release. 18:04:02 *formally rejected 18:04:11 Counterproposal: FESCo acknowledges that there wasn't enough awareness and time for discussion before the repeated vote on issue #TBD. In the future, for contentious issues, we'll make an effort to notify fedora-devel and interested participants and leave time for comments. 18:04:12 I'm sorry, this endless discussion turned my brain into 🍲, I need to step away and get some food. See you next week 18:04:34 zbyszek: +1 18:04:36 I don't think the 3-4 week is real 18:04:44 see for example https://pagure.io/fesco/issue/2923 18:05:09 on 2022-12-28, it was rpoposed for revote. That would ahve been annoucend on devel instead 18:05:40 i have exhausted my supply of interest in defending this proposal and i'm late for a session with a mentee, so i'll abide by whatever y'all decide 18:05:47 after 7 days, it could go to fesco, that's 2023-01-04 18:06:06 it would have been approved 6 days later on the next meeting 18:06:22 point of information? Should this go to be discussed on the list as people are tired and leaving? 18:06:28 mhroncok: but that's *not* "whatever process was originally required before FESCo begins voting" 18:06:54 and what process was originally required then? 18:07:04 formally required that is 18:07:36 if we say "let's wait 2 more weeks for the discussion to calm down" I don't consider that as "originally required" in this ocntext 18:08:09 but if this is the issue, I am happy to propose an alternative 18:08:13 however.... let's stop? 18:08:25 people are turning to vegetables here 18:09:26 Proposal: Move on 18:09:28 Yeah, lets just table it back and revisit later or close it. 18:09:34 Ack. 18:09:38 Move on +100 18:10:04 #2951 Proposal: policy for resubmitting rejected proposals 18:10:04 .fesco 2951 18:10:05 sgallagh: Issue #2951: Proposal: policy for resubmitting rejected proposals - fesco - Pagure.io - https://pagure.io/fesco/issue/2951 18:10:16 not this again :D 18:10:23 no, it's starting over! 18:10:25 Oops, bad copy-paste 18:10:28 You're not allowed until F39! 18:10:47 #topic #2956 Does FESCo want to implement the policy for retiring packages 18:10:47 with security bugs? 18:10:47 .fesco 2956 18:10:48 sgallagh: Issue #2956: Does FESCo want to implement the policy for retiring packages with security bugs? - fesco - Pagure.io - https://pagure.io/fesco/issue/2956 18:10:57 resubmit the resubmit 18:11:23 Proposal: No 18:11:23 I still think this is valuable, but I don't think releng has any cycles to do it. 18:11:31 it's not about releng 18:11:39 I can slay packages in my sleep 18:11:42 I’m out for today. Good luck with Zombie Son of Frankenproposal. 18:11:43 Reasoning: the security bug process is so onerous that it's basically impossible to stay on top of them 18:12:08 Is it really? 18:12:33 Yes 18:12:37 In the case of Node.js, every upstream security release dumps 12-30 bugs in BZ on me. 18:12:51 sgallagh: yeah, it's not so bad, I think. I handled two for systemd last year and the process was just like any update. 18:12:54 well, nodejs ... 18:12:55 and I get a bunch of rando security BZes for me on ffmpeg 18:12:57 I think there's several things here. 18:13:06 ones that don't apply either 18:13:14 The security bugs filed by RH are great... but sometimes... wildly wrong. 18:13:24 random CVE bugzillas for packages that are not affected are not uncommon 18:13:24 nirik: Those are the ones I'm talking about. 18:13:30 like for example: 18:13:35 mhroncok: Exactly 18:13:54 https://bugzilla.redhat.com/show_bug.cgi?id=2173769 18:14:01 I recently had to close almost 20 that were actually caused by the c-ares package, for example. 18:14:29 Well that's a problem with RH scripts, but not with Fedora security policy ... 18:14:39 so, I think we need to work with them and fix that part before we can start bugging maintainers to fix things. 18:15:01 Except the policy requires maintainers to stay on top of dozens of reports with frequent false reports. 18:15:31 So I go back to my proposal: We don't try to implement this policy at this time. 18:15:49 well, I'd love if maintainers closed bogus bugzillas in timely manner 18:16:14 we are talkign about bugzillas thta are open for months, if not years 18:16:14 I got bug reports for electron on ffmpeg 18:16:14 we don't even have electron in Fedora yet 18:16:21 mhroncok: Last week, RH Security opened over 50 bugs against Node.js, nearly all of them ALREADY in the released package. 18:16:39 Ok, jumping back in for a second to note that it is also common to have CVE bugs for which no patch is available, let alone a released one. Also that sometimes the patch is lumped in with an incompatible update from upstream and can’t be easily backported. So sometimes the maintainer’s options are limited. 18:16:56 I just gave up and closed them all as INSUFFICIENT_DATA in a fit of pique 18:17:02 Stephen Gallagher: good 18:17:08 Stephen Gallagher: as you should 18:17:17 Or the ones I love... 0 information. No upstream report or patch... 18:17:18 So that would be an example of the maintainer handling the bugs. 18:17:19 There are already (in my opinion, too many) mechanisms for delaying package retirements in similar cases (like FTI or FTBFS bugs) 18:17:33 yeah I have one for m2crypto that's like that :( 18:17:41 I can't do anything because there's nothing given to me 18:17:58 zbyszek: Right, but I'm a person who is PAID to work on this stuff and even I find it overwhelming. 18:18:04 Nothing stops a package maintainer to set the bug to MODIFIED and ignore it forever 18:18:08 I pity the volunteer maintainers out there 18:18:24 * Eighth_Doctor drowns in them 18:18:25 do we know who we might be able to engage with there? 18:18:54 I mean, I love that they file those bugs when they are valid, but... it's gotten pretty invalid lately 18:19:12 I agree this needs to get better if we want to implement the policy 18:19:17 I think Ben had talking to ProdSec about their bug reporting problems on his todo-list ... not sure if that happened yet 18:19:25 OK, we don't have to solve that part of the problem today. 18:19:29 * nirik wonders if they plan to move and file those in jira 18:19:36 So, should we discuss this with RHEL folks and then return to the issue? 18:19:43 ugh 18:19:43 What we need to decide is: is it worth implementing this policy today? 18:19:43 one problem at at time 18:20:10 is it worth implementing this policy even if the CVE reports are mostly correct? 18:20:19 I don't think we want to bug maintainers more on invalid bugs... so no, I don't think this should be enabled until that part is fixed. 18:20:40 Today: no. But once the bugs are mostly valid: yes. 18:20:44 mhroncok: I'd vote 0 on that. I'm -1 on the policy as things stand today. 18:20:50 Perhaps? but we could revisit that when/if ? 18:21:27 we could 18:21:28 -1 to implementing the policy per current conditions. 18:21:47 -1 now, 0 if the bugzillas are accurate 18:22:19 Proposal: In the current environment, FESCo feels that the CVE bug process is insufficient to support implementing this policy. This can be revisited in the future if conditions improve. 18:22:29 meh. +1 18:22:35 sgallagh: +1 18:22:39 Stephen Gallagher: +1 18:22:49 +1 18:23:01 +1 18:23:40 #agreed In the current environment, FESCo feels that the CVE bug process is insufficient to support implementing this policy. This can be revisited in the future if conditions improve. (+6, 0, -0) 18:23:45 On to the last topic. 18:24:05 #topic #2958 F38 incomplete changes: 100% complete deadline 18:24:05 .fesco 2958 18:24:06 sgallagh: Issue #2958: F38 incomplete changes: 100% complete deadline - fesco - Pagure.io - https://pagure.io/fesco/issue/2958 18:24:32 Ben Cotton (he/him): You have the floor 18:25:12 He had to leave I think 18:25:13 I don't think Ben Cotton (he/him) is still here 18:25:19 we drove him away 18:26:04 do we go one by one? 18:26:16 Let's. 18:26:19 OK 18:26:31 not much left I think? 18:26:38 #topic: Feature Incomplete: LLVM 16 18:27:13 As I noted in the ticket, this is expected and will be resolved between Beta and GA 18:27:17 So yeah, lets just let it do that. 18:27:20 This one is waiting for a final release by upstream. IIUC, nothing to see, move along. 18:27:40 I'll wait 60s for anyone to disagree, then move on 18:28:13 ack 18:28:20 #topic Feature Incomplete: Unified Kernel Support (Phase 1) 18:28:44 I still have no idea if this is done 18:28:58 I don't have any insight here. 18:28:58 This is an optional thing, so I am fine with them working on it after beta 18:29:26 I think not much changed from two weeks ago. The kernel parts are done, the grub2 parts are not done. 18:29:33 https://bugzilla.redhat.com/show_bug.cgi?id=2159490#c2 has the status as of a few weeks ago 18:30:03 * nirik nods. 18:30:08 OK, so we continue doing nothing as we don't really care when this lands? can we still call it f38 change if it doesn't land in time for GA? 18:30:20 +1 to that from me. 18:30:28 If it doesn't land in time for GA, we won't mention it in the release materials 18:30:33 Yeah. The kernels are usable without grub2 support. 18:30:47 ack 18:31:30 #topic Feature Incomplete: RPM Macros for Build Flags 18:31:37 merge the PR 18:31:43 merge the PR 18:31:59 This is only incomplete because the maintainers were waiting for FESCo to approve a rename. 18:31:59 +1 18:32:00 We don't need to do that, and I said as much on the MR 18:32:08 So this is basically ready. 18:32:20 does this need to pass through freeze? 18:32:48 no 18:32:49 It's a build-time change 18:33:16 it is a fedora 38 change, but it only really makes sense for rawhide at this point 18:33:53 but having it in the redhat-rpm-config package for f38 as well is not harmful and might be useful for some 18:34:11 Yeah, so let's just give it the all-clear? 18:34:31 all clear, but no reason for bypassing the freeze imho 18:34:45 Agreed 18:35:17 Eighth_Doctor: you still around? Can you press the merge button on #244? 18:35:57 * nirik can do it too if you like 18:36:28 anything else? 18:36:28 #topic Open Floor 18:36:33 oh wait, sorry 18:36:38 #topic Next Week's Chair 18:37:02 nirik: somebody should do it, and also cherry-pick for f38. 18:37:22 I did, do we need builds also? 18:37:29 Yes 18:37:45 So, who wants to Chair next week? 18:38:14 no chairing for me until summer, sorry 18:38:31 (and I need to leave now) 18:39:19 I might not make it to the meeting next week, so I can't do it 18:39:26 ugh, DST is coming. 18:39:32 zbyszek: sure 18:39:36 Wait, is that this weekend? 18:39:40 sadface 18:39:46 no. next 18:39:53 yup ugh 18:40:11 this will collide with team sync meetings 18:40:19 :( 18:40:23 OK, since it seems nobody is racing to do it, I can. 18:40:47 Thanks, zbyszek 18:41:12 #action zbyszek to chair 2023-03-07 meeting 18:41:13 #topic Open Floor 18:41:16 Any topics for Open Floor? No? Good :) 18:41:40 I had something, but it can wait. 18:41:59 zbyszek: Go ahead, I was being flippant 18:42:10 No, it's a longer thing. 18:42:25 well apparently whoever merged #244 gets to build it for f38 now too 18:42:27 OK, in that case, open a discussion on a ticket or devel@ 18:43:24 nirik: in #244, was the inclusion of the other two commits from rawhide intentional? 18:43:46 Conan Kudo: doing so now. 18:44:15 oh, shoot, were those not supposed to be in there? they seemed harmless.... 18:44:34 They probably are ok… 18:45:26 OK, are we done here, then? 18:45:35 sgallagh: sorry for derailing the quick wrap up. 18:45:54 No worries 18:45:55 #endmeeting