17:01:06 #startmeeting FESCO (2023-12-14) 17:01:06 Meeting started Thu Dec 14 17:01:06 2023 UTC. 17:01:06 This meeting is logged and archived in a public location. 17:01:06 The chair is Son_Goku. Information about MeetBot at https://fedoraproject.org/wiki/Zodbot#Meeting_Functions. 17:01:06 Useful Commands: #action #agreed #halp #info #idea #link #topic. 17:01:06 The meeting name has been set to 'fesco_(2023-12-14)' 17:01:08 michel-slm: An error has occurred and has been logged. Please contact this bot's administrator for more information. 17:01:13 wow zodbot 17:01:15 #meetingname fesco 17:01:15 The meeting name has been set to 'fesco' 17:01:15 .hi 17:01:16 jonathanspw: Something blew up, please try again 17:01:19 jonathanspw: An error has occurred and has been logged. Please contact this bot's administrator for more information. 17:01:21 .hi 17:01:22 sgallagh: Something blew up, please try again 17:01:26 sgallagh: An error has occurred and has been logged. Please contact this bot's administrator for more information. 17:01:27 #chair nirik, decathorpe, zbyszek, sgallagh, mhroncok, dcantrell, mhayden, Conan_Kudo, Pharaoh_Atem, Son_Goku, King_InuYasha, Sir_Gallantmon, Eighth_Doctor, tstellar 17:01:27 Current chairs: Conan_Kudo Eighth_Doctor King_InuYasha Pharaoh_Atem Sir_Gallantmon Son_Goku dcantrell decathorpe mhayden mhroncok nirik sgallagh tstellar zbyszek 17:01:36 everyone stop blowing stuff up 17:01:40 so the meeting functions work but hello is dead 17:01:46 dcantrell: you try then :D 17:01:47 .hello2 17:01:48 mhayden: Something blew up, please try again 17:01:51 .hello ngompa 17:01:51 mhayden: An error has occurred and has been logged. Please contact this bot's administrator for more information. 17:01:54 Son_Goku: Something blew up, please try again 17:01:55 .hello2 17:01:57 Son_Goku: An error has occurred and has been logged. Please contact this bot's administrator for more information. 17:01:59 well oof 17:02:01 dcantrell: Something blew up, please try again 17:02:04 dcantrell: An error has occurred and has been logged. Please contact this bot's administrator for more information. 17:02:08 crap, I did it 17:02:14 .lol 17:02:18 dcantrell stop blowing stuff up 17:02:22 we're getting the ACME treatment here like we're all coyotes 17:02:33 yup 17:02:58 Meep meep 17:03:04 so uhh 17:03:16 nirik: any idea what's going on (assuming you're around)? 17:03:45 anyway, I guess we'll just go on with our lives 17:03:54 #topic init process 17:04:08 it's just the plugin bug... I can reload it. 17:04:14 .hello tstellar 17:04:15 tstellar: Something blew up, please try again 17:04:17 tstellar: An error has occurred and has been logged. Please contact this bot's administrator for more information. 17:06:32 Ah well. Everything is broken. Time for vacation. 17:06:45 .hello ngompa 17:06:46 Son_Goku: ngompa 'Neal Gompa' 17:06:49 woot 17:06:52 .hi 17:06:53 jonathanspw: jonathanspw 'Jonathan Wright' 17:06:58 .hello2 17:06:59 dcantrell: dcantrell 'David Cantrell' 17:07:02 it's just that lookup... nothing else. ;) 17:07:11 .hello tstellar 17:07:12 tstellar: tstellar 'Tom Stellard' 17:07:25 .hello salimma 17:07:26 michel-slm: salimma 'Michel Lind' 17:07:28 .hello2 17:07:32 mhayden: mhayden 'Major Hayden' 17:07:34 .hi 17:07:35 sgallagh: sgallagh 'Stephen Gallagher' 17:08:50 I think that's everyone so far, do we have enough for quorum? 17:08:52 nirik++ 17:08:52 mhayden: Karma for kevin changed to 9 (for the release cycle f39): https://badges.fedoraproject.org/tags/cookie/any 17:08:59 nirik++ 17:09:00 Son_Goku: Karma for kevin changed to 10 (for the release cycle f39): https://badges.fedoraproject.org/tags/cookie/any 17:09:21 I guess I'm here... 17:09:35 šŸŖ‘ 17:10:01 is 5 enough for quorum (if I don't count sort-of-here nirik)? 17:10:24 Yes, five is quorum 17:10:35 then let's go into our first topic 17:10:40 #topic #3101 Change: Remove OpenSSL Compat 17:10:53 .fesco 3101 17:10:54 Son_Goku: Issue #3101: Change: Remove OpenSSL Compat - fesco - Pagure.io - https://pagure.io/fesco/issue/3101 17:11:38 looks like we could approve this and hope python3.6 will be moved (or use contengency if it's not?) 17:12:24 maybe we can just have them chop off the -devel package initially and then retire it once all consumers failing mass build are ported/retired? 17:12:49 Is non-FESCo feedback wanted/welcome? 17:12:53 absolutely 17:12:59 that's why these are open meetings 17:13:12 Maybe a dumb question, but if RH is going to keep maintaining it for EL8 anyway why remove it from Fedora when we can still get said patches and such? 17:13:22 Sure, we donā€™t mind ignoring non-FESCo people either ;-) 17:13:28 sgallagh: touche :D 17:13:51 Is droping python 3.6 an option? 17:13:56 not yet 17:14:03 .hi 17:14:05 decathorpe: decathorpe 'Fabio Valentini' 17:14:05 sorry for being late 17:14:13 python folks want to keep it for tests/etc since it's staying in rhel 17:14:16 Itā€™s undesirable, but not impossible. 17:14:49 jonathanspw: this is a reasonable question 17:14:50 have we asked the python folks how hard it would be to port py3.6 to openssl3? 17:14:53 I don't think it's reasonable to remove it until python3.6 has a plan. The bug is filed, sure, but I think voting on the removal should be done after python has done their work 17:15:59 The comment on the discussion makes it seem like porting to OpenSSL 3 will be difficult: https://discussion.fedoraproject.org/t/f40-change-proposal-removing-openssl-1-1-package-system-wide/92899/3 17:17:06 in that case, another option is to find someone who is willing to maintain the package in the interim until py3.6 is retired at rhel 8 eol 17:17:20 @jonathanspw: Someone has to do the work. If the maintainer is looking to retire it from Fedora, that carries the implication that they lack the cycles to continue maintaining it 17:17:42 Yeah it seems like either the python team would need to maintain it or maybe even bundle it. 17:17:50 backporting patches from RHEL 8 should be possible? openssl 1.1 continues to be maintained there IIUC 17:17:53 yes 17:18:11 Iā€™m a hard ā€œnoā€ on bundling OpenSSL anywhere, thankyouverymuch. 17:18:15 Simplest solution might be an email to devel to see who's willing to step up. 17:18:15 same 17:18:20 just making openssl 1.1 track rhel sounds better than bundling, yeah 17:18:23 (to maintain backports) 17:18:32 please don't bundle crypto libraries šŸ˜Ø 17:18:46 (Or write your own) 17:18:51 ehhhhhh 17:19:03 that one is more nuanced 17:19:10 ha 17:19:28 anyway, I think jonathanspw's query and suggestion is reasonable 17:19:32 we could just punt here and see how the porting looks later? 17:19:39 that's also an option 17:20:03 we can explicitly punt until mid january I guess? 17:20:04 Or approve conditionally 17:20:18 sgallagh: any proposal for that? 17:21:05 Proposal: Approved, contingent upon python3.6 being ported to OpenSSL 3. 17:21:18 But maybe punting to Jan and seeing where we are then makes sense 17:21:20 +1 here to that. (I'm also fine to wait) 17:21:29 +1 from me 17:21:43 I think it should be something like: "Approved, but OpenSSL compat will be orphaned not removed" 17:21:48 -1, I'd rather look at things in January and see where it stands. either openssl maintainer steps up or python3.6 has stuff in motion 17:22:13 hmm, let's see how I can blend this 17:22:27 Sounds like we wonā€™t be able to reach a decision today with the limited attendees. So letā€™s punt 17:22:32 yeah 17:22:44 I'm also fine just waiting, but I think the search for an OpenSSL compat maintainer should start now. 17:23:00 It seems unlikely to me that python will get ported, but you never know. 17:23:01 Iā€™ll check the couch cushions. 17:23:03 I was going to email the current RHEL-8 maintainers 17:23:12 of openssl11 17:23:32 Really, the people who want python3.6 to stay in Fedora should take responsibility for this. 17:23:45 Proposal: Punt until the first January FESCo meeting to review this again. FESCo would like to see if there is anyone who'd like to step up to help maintain the openssl1.1 package if it's still needed. 17:23:59 +1 17:24:02 +1 17:24:05 +1 17:24:21 +1 17:24:33 +1, but I hope it can be retired. ;) 17:24:40 decathorpe, your vote? 17:24:53 and of course, +1 for my proposal 17:25:31 +1 17:26:43 #agreed FESCo will punt reviewing this until the first January meeting. FESCo would like to see if there is anyone who'd like to step up to help maintain the openssl1.1 package if it's still needed. (+7, 0, -0) 17:27:04 next up... 17:27:12 #topic #3119 Numerous package git repos fail git-fsck, causing issues for mirroring, and need to be fixed 17:27:16 .fesco 3119 17:27:18 Son_Goku: Issue #3119: Numerous package git repos fail git-fsck, causing issues for mirroring, and need to be fixed - fesco - Pagure.io - https://pagure.io/fesco/issue/3119 17:28:19 I did more research on this and I am uncomfortable with the idea of archiving git history rather than fixing the bad author and committer strings in the reflogs. Through the magic of git-filter-repo this should be 100% possible. I've done it in the past with git filter-branch 17:29:00 I think probibly saving off the current repos and filtering is probibly best... because we want to have somewhere that has hashes that were used for builds in koji. 17:29:13 yes 17:29:22 I don't think it was ever a question we wouldn't do that? 17:30:04 maybe I misunderstood, but the previous discussion and comments were talking about tarring up .git and starting over rewriting all history, so getting new commit IDs 17:30:09 at least that's how i read it 17:30:17 yeah we don't need to do that 17:30:26 well, there were proposals to save the old repo into the new one in another branch. I am not sure if that keeps everything.. and would be confusing. 17:30:31 the original releng ticket was just rewriting the history and storing the original refs elsewhere 17:30:33 Not starting over, but rewriting history on the affected branches. 17:30:39 Which is all of them, really 17:31:15 such a fuss over a single < (I think it is) 17:31:34 And a space! 17:31:49 sgallagh: git terminology is dense, when you say rewriting history do you mean preserving IDs and fixing data or generating new IDs along with correct data? 17:32:06 in order to change the repo you change the commit hashes. 17:32:16 You literally cannot preserve IDs and fix data 17:32:26 The IDs are derived from that data 17:32:38 there is no such thing as metadata in git's model 17:32:43 it's all primary data 17:33:09 ok, so some years ago I corrected both an email address and a committers name and the ID remained the same. what did I do then? 17:33:10 There might be some fields that wouldnā€™t alter the ID, but this isnā€™t one of them 17:33:31 dcantrell: LSD? Because that definitely didnā€™t happen ;-) 17:33:45 unless you got reeeeally lucky and got a collision 17:33:49 Will Florian's suggestion to move them to a different branch in the same repo work, or will git fsck still fail in that case? https://pagure.io/fesco/issue/3119#comment-887427 17:33:52 no collision 17:34:00 this was a stack of filter-branch stuff 17:34:07 just fixing it in the latest commit is not enough right? any wrong commit in the history would fail fsck 17:34:11 yes 17:34:21 any referenced blob will cause it to fail 17:34:24 maybe it generated a new ID and new to step to the new one for the corrected data, I have no idea 17:34:54 There are some tricks to change the reference of a commit ID to point to a different commit 17:34:56 tstellar: the key is whether `git push --mirror` includes those blobs 17:35:06 But the original broken commit would have to remain in the history. 17:35:32 if `git push --mirror` doesn't include the broken commits, then it's fine 17:35:38 Which would then not fix the issue before us. 17:36:23 * nirik is fine punting this to the new year too, but might be just me. ;) 17:36:38 yeah, we can push this off and then have more people look at it 17:36:50 Itā€™s not urgent since I sidestepped the problem for CentOS Stream 10 17:37:02 ok, let's discuss in Jan 17:37:24 Proposal: Punt until the first January FESCo meeting to review this again. 17:37:31 +1 17:37:34 +1 17:37:45 +1 17:37:49 +1 17:37:53 +1 17:38:04 +1 17:38:15 decathorpe: vote? 17:39:05 apologies if this has been asked but... is there a way to ensure repos that are not currently affected won't develop this problem? 17:39:25 e.g. make pagure run git-fsck and reject push, but with an allowlist for the known-broken repos 17:40:03 it's possible to do that server side, similarly to how we have a hook to block pushes when non-uploaded sources are included 17:40:25 oh wait, that hook is client side, but it _could_ be server side 17:40:43 is it worth making it an action item, while we punt the cleanup strategy until January? 17:41:14 we cannot deploy it until after these repos are fixed though 17:41:26 otherwise pushes will start failing 17:41:34 Son_Goku: I suggested allowlisting the known broken repos :) 17:41:44 okay fair :) 17:42:03 basically a mitigation to stop the bleed, and we can remove the allowlist once the repos are cleaned up 17:42:09 I would think it would be possible to do a hook, but not sure how much work it would be 17:42:47 we'll need to enforce this at some point anyway right? 17:43:24 Proposal: Punt until the first January FESCo meeting to review this again. FESCo would like some kind of server-side hook in pagure to prevent further damage regardless. 17:43:45 I'm not sure we would. 17:44:00 no? 17:44:07 I guess for rhel11... 17:44:35 well and I would also like remote pull requests to not be broken 17:44:55 that feature depends on people being able to push repos to arbitrary git servers 17:45:41 are there other forges that don't allow fsck.skipList (like gitlab)? 17:45:57 all of them 17:46:32 the only reason pagure doesn't have the fsck thing is that we use libgit2 instead of git for most repository processing and handling 17:47:20 ok. I would think it would make sense to have a skipList setting, but whatever 17:47:31 I agree, but it doesn't exist 17:47:42 needless to say when pagure gets fsck stuff wired up, we're going to have that exposed 17:48:28 anyway, I need to go soon, so can we vote on this? 17:48:31 (afk for a bit...) 17:48:35 well, it 100% exists in git-fsck... just no one allows you to use it on mirroring I guess? 17:49:06 no one allows configuring it as far as I can tell at all 17:49:18 not github/ghe, not gitlab, etc. 17:49:54 same for the gogs family as far as I can tell 17:49:59 oops, sorry, got distracted 17:50:06 +1 to punt if you still need my vote 17:50:30 anyway, we can go with the original punt-only proposal 17:50:38 I really need to go so I'll just proc that 17:50:58 #agreed Punt until the first January FESCo meeting to review this again. (+7, 0, -0) 17:51:20 so now we're done with that... 17:51:21 #topic Next week's chair 17:51:49 I think we agreed last week to skip the next two and Iā€™d run the first of the new year. 17:51:54 oh right 17:52:15 #action sgallagh will run the first FESCo meeting of the new year 17:52:28 #info FESCo meetings are canceled for the remainder of the year 17:52:39 #topic Open Floor 17:52:46 anything anyone wants to say now? 17:52:53 or I can end it all... 17:52:55 Is everything on track with the elections? 17:53:14 seems to be 17:53:29 amoloney seems to have gotten things in order now 17:53:41 I hope everyone on FESCo has voted? 17:53:58 I voted :) 17:54:24 I saw Ubuntu enabled frame pointers for profiling -- this makes me feel a bit better about our decision šŸ‘ 17:54:41 I'm... peeved that Fedora didn't get any credit there. 17:54:51 eh, i'm just glad to get confirmation 17:54:57 that was a tough decision making process 17:55:04 Ubuntu claiming credit for Fedoraā€™s moves is kind of their entire history. 17:55:08 well, they gave us credit for the x86_64-v3 evaluation 17:55:29 but not for oomd :) 17:55:31 * mhayden claims credit for sgallagh's moves all the time 17:55:43 sgallagh: yeah, it still bites though 17:55:50 * sgallagh is still bitter that Ubuntu claimed credit for SSSD fifteen years ago. 17:56:03 wait seriously? 17:56:05 ffs 17:56:18 they claimed credit for sssd?! 17:56:28 Yep 17:56:32 ugh 17:56:32 well i hope that all of you have awesome holidays and get some time to relax with people you care about over the next couple of weeks! ā™„ļø 17:56:41 same to everyone else 17:56:46 See you all next year! 17:56:46 and now time to end it all :) 17:56:49 And to you! 17:56:54 2024 is a leap year! 17:57:00 Happy Holidays and watch that step! 17:57:02 #endmeeting