=== KindTwo is now known as KindOne [05:23] morning [06:17] mvo: hey [06:21] hey mborzecki [06:24] mvo: can you take a look at https://github.com/snapcore/snapd/pull/8686 ? [06:24] PR #8686: o/devicestate: cleanup system actions supported by recover mode [06:24] mborzecki: sure [06:28] mvo: thanks! [06:30] PR snapd#8686 closed: o/devicestate: cleanup system actions supported by recover mode [06:30] yay [07:00] morning [07:01] zyga: hi, could you complete the comment #8123? is the only thing stopping it from landing [07:01] PR #8123: interfaces/network-control: bring /var/lib/dhcp from host (approach b) [07:01] Good morning [07:01] pedronis: certainly, in a moment === pedronis_ is now known as pedronis [07:10] mvo: should we land #8682 and change the pattern after? or do you prefer it changed first? [07:10] PR #8682: tests: port interfaces-password-manager-service to session-tool [07:11] Smak conflict there, lets resolve it [07:14] pedronis: either way is fine [07:14] pedronis: let's land as it will make tests better [07:14] landed [07:15] PR snapd#8682 closed: tests: port interfaces-password-manager-service to session-tool [07:16] anyway there's the other one that needs some tweaks [07:16] still [07:27] mborzecki: hi, I re-reviewed #8689 [07:27] PR #8689: o/devicestate: raise conflict when requesting system action while seeding [07:27] pedronis: thanks, i'm merging master and will address those in the next batch of patches [07:33] mborzecki: zyga: the fedora failure here is interesting: https://github.com/snapcore/snapd/pull/8692 [07:33] I will push a new test-snapd-with-configure{,-core18} to edge, should not affect anyting but if you notice anything strange please let me know and I can revert [07:33] PR #8692: configcore: add nomanagers buildtag for conditional build [07:34] looking [07:34] mborzecki: zyga: the cleanup is confusing snap.rootfs_* for a snap [07:34] a bit unclear why there's one around but never the less [07:44] hmmm [07:44] the snap.rootfs_ pattern is unusual to persist [07:44] something has failed earlier and left it there [07:44] btw. https://github.com/actions/cache/issues/208 is fixed [07:45] mvo: ^^ [07:45] oooo [07:45] good :) [07:45] we should be able to revive the issue with caches [07:45] s/issue/PR/ [07:45] 2020-05-20T06:18:51.4079959Z `-/tmp/snap.rootfs_9l42OX /dev/sda1[/tmp/snap.rootfs_9l42OX] ext4 rw,relatime,seclabel shared [07:45] mborzecki: holly cow [07:45] mborzecki: let me update my PR [07:47] yeah, this is curious [07:49] I can only say this [07:50] at some point snap-confine -> snap-* startup sequence failed [07:50] this is the only possibility of a leftover /tmp/snap.rootfs_ mount point [07:50] I have two simple ideas: we can add an invariant check to detect those and fail early [07:50] probably a good idea in general [07:51] pstolowski: mvo: I think #8692 can be either force merged or it needs another run [07:51] and we can also change the temporary directory name to contain the snap name [07:51] PR #8692: configcore: add nomanagers buildtag for conditional build [07:51] but probably not so useful because we use test-snapd-sh a lot so it may be less revealing than a failure at a specific test [07:52] I'll finish with conflicts and then look at this [07:52] pedronis: I can force merge, let me look at the failures [07:54] PR snapd#8692 closed: configcore: add nomanagers buildtag for conditional build [07:56] mvo: thanks [07:56] for the first time I resolved a mount-ns test conflict manually [07:57] pstolowski: there are some comments in #8697 [07:57] PR #8697: [RFC] packaging: build cmd/snap with nomanagers tag [07:58] pedronis: yes, i've been adressing them (almost done), except for your last comment [08:00] I resurrected 8508 let's see how that goes [08:01] pstolowski: thx [08:03] PR snapd#8631 closed: image,cmd/snap,tests: add support for store-wide cohort keys [08:25] hmmm [08:25] mup: ping [08:25] zyga: Roses are red, violets are blue, and I don't understand what you just said. [08:25] so mup responds [08:25] is github down? [08:26] no... [08:26] weird [08:26] I cannot git-push [08:28] dns works [08:28] wth? [08:28] mborzecki: can you git push anything to gh? [08:29] or maybe even git fetch [08:29] zyga: yup, but had some problems fetching/pushing yesterday afternoon too [08:29] I cannot add comments either [08:30] * zyga reboots [08:32] rebooted [08:32] git push hangs [08:32] ssh hangs on [08:32] debug1: Connecting to github.com [140.82.118.4] port 22. [08:33] what does github.com resolve on your machine mborzecki ? [08:33] zyga: 140.82.114.3 atm [08:33] hmmm [08:33] same result [08:33] sigh [08:33] what a morning [08:35] PR snapd#8702 opened: overlord/configstate: add log-control option [08:42] gah [08:42] any ideas [08:50] it works :) [08:52] zyga: 8578 looks ready - does it need jdstrand first or can I merge? [08:52] checking [08:52] zyga: hrm, I guess it does need him? [08:52] yeah, I think he wanted to see it [09:06] mvo: should we turn all the ubuntu-20.04-* in our tests task.yaml to ubuntu-2* ? [09:11] brb [09:16] pedronis: I think so [09:16] pedronis: not sure if zyga replied to my suggestion yet, I don't see a downside [09:16] (but maybe I'm missing something?) [09:16] mmm, mvo the one on tests to use 2* [09:17] I didn't but I think it's a good idea [09:17] zyga: cool, then we are in agreement [09:17] but perhaps as a separate pass to do everything in one go [09:17] sure [09:22] pedronis: i've updated https://github.com/snapcore/snapd/pull/8689 also with some additional checks for non-uc20 [09:22] PR #8689: o/devicestate: raise conflict when requesting system action while seeding [09:23] pedronis: i suppose it's ok to assume that there's no explicit system mode in non-uc20 [09:26] mborzecki: various methods will say we are in run mode? [09:27] zyga: mvo: yes, as a separate pass, there's a bunch, also there are core20 nested tests that I think really want 20.04 precisely [09:27] pedronis: mmm, indeed, I think a simple guideline is that if a test is precise and targets one thing it can stay that way, if it targets subsequent LTSes we can expand that to include 2* [09:37] pedronis: it's in the contxt of system requests on uc16/18, we don't support that and might as well error out early in such case [09:37] mborzecki: yes, I'm actually looking at that code [09:37] we don't do that anywhere else [09:37] I'm not sure it's a good check [09:38] mborzecki: which reminds me that the code should use m.SystemMode() and not systemMode much more [09:38] pedronis: it will be blocked later on anyway, so it's ok to drop that [09:40] or maybe we should change things to just set systemMode to run [09:40] and make SystemMode a straight accessor [09:41] pedronis: yes, it's a bit confusing, otoh knowing when it's != "" gives us a little more insight as it's set only based on modeenv [09:42] yes, what something has to give, either we refuse to operate on modeenv without mode [09:42] early [09:42] or something [09:42] right is all a bit not well defined [09:45] mborzecki: we never write modeenvs without mode, right? [09:46] pedronis: i don't think we do, but looking at the modeenv code there's no sanity check for Mode != "" [09:47] and tests seem to disagree now that i added such check, heh [09:49] fortunately it's just the test mocks [09:51] mborzecki: yea, I think we want the read in boot to fail if no mode [09:51] an deal with it [09:51] mborzecki: can be a follow up [09:59] mvo: thanks for the new test, I added some comments in #8351, I see the newline issue only in the full diff view [09:59] PR #8351: config: apply vitality-hint immediately when the config changes [10:01] pedronis: aha, thanks! I misread your comment about the gadget service, I will add that too [10:09] #8689 needs 2nd reviews [10:09] PR #8689: o/devicestate: raise conflict when requesting system action while seeding [10:20] mborzecki: #8661 is unblocked now, can you do another pass? (I will look myself but later) [10:20] PR #8661: configcore: add "service.console-conf.disable" config option === ergiusenss is now known as sergiusens [10:45] PR snapd#8703 opened: tests: detect signs of crashed snap-confine [11:05] PR snapd#8123 closed: interfaces/network-control: bring /var/lib/dhcp from host (approach b) [11:20] PR snapcraft#3132 closed: go v1 plugin: warn when using go.mod and go < 1.13 [11:44] PR snapcraft#3133 opened: go v1 plugin: go.mod support for 1.11 and 1.12 [11:49] pedronis: thanks for merging === alan_g is now known as alan_g_ [12:11] cachio: I pushed a fix for PR 8700 but we need to check with zyga if the latest spread is in use [12:11] PR #8700: tests: fix the issue where all the tests were executed on secboot system [12:11] cmatsuoka: thanks, I'll check that now [12:11] cmatsuoka, checking [12:13] cmatsuoka, I see the test is failing with [12:13] panic: cannot seal the encryption key: cannot seal and store encryption key: cannot add EFI secure boot policy profile: cannot compute secure boot policy digests: the current boot was performed with secure boot disabled in firmware [12:13] updating spread [12:13] cachio: yes, it should work after zyga updates spread [12:14] cmatsuoka: that's an example of the errors that we need to think now to imrpove [12:14] *how [12:14] our our defense it's much better than random errors from software [12:15] but we do need to think about how to make a pattern for such errors that is easier to understand [12:15] yes, at least in this one most levels add some info (except the first two that feals redundant) [12:15] the one I saw the other day was worse [12:16] that's true [12:16] at least it's not a backtrace :) [12:16] pedronis: in this case the first three are ours and we can clean them up, I'll check that [12:16] cmatsuoka: ah, interesting [12:25] PR snapd#8704 opened: cmd/snap-preseed: improve mountpoint checks of the preseeded chroot (1/2) [12:27] pedronis: the tpm-sealing-in-secboot PR already gets rid of the second level [12:33] cmatsuoka: done [12:33] zyga: thanks! [12:34] I restarted the tests, let's see what happens... [12:38] zyga: I was playing with the pi4 here, and interestingly it keeps the cpu frequency at the maximum value even idle and with the ondemand governor [12:38] cmatsuoka: on ubuntu or raspbian? [12:38] changing it to conservative made it drop the frequency [12:38] it's the current core20 beta [12:38] I see [12:39] feels like a bug [12:39] how do I check the freq? [12:39] I can check core18 on mine [12:39] zyga: yes, please do, I'll check classic too [12:40] hmm, interesting, switching back to ondemand now keeps the freq low [12:41] not sure if that's the right measurement [12:41] zyga@pi4-1:/sys/devices/system/cpu/cpufreq/policy0$ sudo cat cpuinfo_cur_freq [12:41] 1500000 [12:41] root@ubuntu:/home/cmatsuoka# cat /sys/devices/system/cpu/cpufreq/policy0/cpuinfo_cur_freq [12:41] 600000 [12:42] I'm on "ondemand" [12:42] perhaps a kernel bug? [12:42] try to switch to powersave and go back to ondemand [12:43] cmatsuoka: raspbian on a pi0w has the same behavior [12:43] 1GHz [12:43] humm interesting [12:43] I don't have another pi4 to confirm raspbian semantics there [12:43] I have a large heatsink with two fans so it's not a problem [12:43] but perhaps it does save some power [12:44] I could connect it to my power supply and measure later if you are interested === KindTwo is now known as KindOne [12:45] I'm using a small heatsink with no fans so it tends to heat up a little bit [12:46] zyga: yeah, measuring could be interesting -- at least we'll know how well cpufreq works power-wise [12:46] cmatsuoka: I need to look how to do that, I have a hacked micro cable but not a hacked usb-c cable === techalchemy_ is now known as techalchemy [13:25] stgraber: I think lxc file push needs confuses --mode [13:25] an octal input is doing funny thing [13:28] jdstrand: some low hanging fruit: https://github.com/snapcore/snapd/pull/8578 [13:28] PR #8578: interfaces: add system-packages-doc interface [13:29] zyga: yes, I'm pivoting to PR reviews later today once I finish the store reviews which are almost done [13:29] super, thank you :) [13:29] it's not urgent [13:29] just low-hanging [13:29] * jdstrand nods [13:37] stgraber: s/needs// -- i meant to say that it seems it is confused by what --mode= is supposed to be, giving octal values does funny stuff [13:38] What's the difference between #snappy and #snapcraft? [13:39] zyga: with our without leading 0? [13:39] without [13:39] I think decimal mode is quite unusual so I didn't pass it [13:41] court_jester: snappy is where most snapd developers talk [13:41] court_jester, they kind of overlap ... but the fcus here is snapd development, Ubuntu Core development and such [13:41] court_jester: snapcraft is where the snapcraft developer hang and where loads of people ask questions [13:41] while the snapcraft channel is for developing snapcraft but also of packaging etc [13:41] snapd is the package manager, snapcraft is the package builder [13:42] s/of/for/ [13:42] mvo: should I drop the bitcacher now? [13:42] take 8 of them and make it a bytecacher ;) [13:44] zyga: yes please [13:44] over the parallel port [13:44] mvo: ack [13:45] done [13:45] ta [14:02] gah [14:02] I need to reboot again [14:02] suspend during the standup nuked X input [14:04] re [14:05] cmatsuoka: https://www.raspberrypi.org/forums/viewtopic.php?f=63&t=274595&sid=05bfd24c66e0458db63482ae20121427 [14:05] ^ also a case for that eeprom update we talked about [14:05] very tempted to buy a pi4 for testing this [14:05] ah intersting [14:06] pair pi4 with a SSD [14:06] also case for ubuntu core *installer* that you use to write from sd to other storage [14:07] I only wish pi4 firmware was open source [14:13] short break, bbiab [14:13] * ogra recommends https://www.amazon.co.uk/dp/B078SVRH4B/ref=twister_B07XTSVFS4?_encoding=UTF8&psc=1 for the pi4 [14:13] it flies with writable on the SSD (and system-boot on SD) [14:15] nice! [14:15] ogra: thanks! [14:15] oh, and usb-c too [14:16] I personally would prefer something that I can fuse into one big enclosure, so that it's not a tangled mess of wires [14:16] but I think that's very hard with pi design [14:18] well, you might find cases to print on thingverse [14:20] yeah, that's true [14:21] I wish WD kept making those pi-specific usb drives [14:21] just updated to SSDs now [14:21] I still have the original set and it is amazing, apart from being a hdd [14:21] (and the notion of native USB-HDD is fuN) [14:23] i wish the pi foundation would add an M.2 PCIe socket to the next pi4 interation :) [14:24] that saves all case issues by simply mounting it to the board itself [14:24] yeah [14:25] with pi4 having pci-e anyway, I think it's doable [14:25] and could be something to put on that bottom side :) [14:25] i really love the nanopc-t4 for that ... but still having driver issues (it occasionally dies even with BSP kernel snap) [14:25] (but if it doesnt die ... OMG it is fast !) [14:25] :) [14:27] "tangled mess of wires" is something I'm getting increasingly familiar with [14:27] zyga: 2020-05-20T12:53:27.3457005Z invariant-tool: system is corrupted - in https://github.com/snapcore/snapd/pull/8703/checks?check_run_id=692478727 maybe that is helpful? [14:28] PR #8703: tests: detect signs of crashed snap-confine [14:29] mvo: yes! [14:29] looking [14:29] fantastic [14:29] thank you [14:30] I think it's a red herring here as old snap-confine did not clean some things up [14:30] but it surely works [14:30] and I wonder why it only failed here [14:30] ah, that's the PR introducing it [14:30] :D [14:30] I'll adjust the test [14:30] thanks === benfrancis6 is now known as benfrancis [14:45] cmatsuoka, https://paste.ubuntu.com/p/WQ7ZcDKmD5/ [14:45] I see thie error now [14:45] I'll try to update the fedora image [14:45] this error is strange [14:46] ah, I think you're trying to create the instance with shieldedInstanceConfig empty [14:47] does it make sense? [14:50] cmatsuoka, I am just sending the parameters list empty when secboot is not enabled [14:50] as I do with all the systems [14:50] hmm [14:50] 2020-05-20 14:49:17 Cannot allocate google:amazon-linux-2-64: cannot allocate new Google server for amazon-linux-2-64: invalid value for field 'resource.shieldedInstanceConfig': ''. Shielded VM Config can only be set when using a UEFI-compatible disk [14:50] I think the thing we did did not do the thing we hoped it does [14:50] cmatsuoka: ^ [14:50] does this indicate the spread patch is buggy [14:50] cachio: and only fedora didn't like it? [14:51] zyga, mmm, also amazon-linux [14:51] this is from upstream spread now failing on our tests [14:51] zyga, yes [14:51] it feels like we need to revert something [14:51] semms to be a gce thing [14:51] I'll break for lunch and let you figure it out, I can happily deploy updated spread in minutes [14:51] it seems the setting only works if the image is using UEFI [14:51] which is sensible [14:51] spread patch was not tested properly [14:52] I know the simple fix for spread , but perhaps I can solve it from gce [14:52] zyga, agree, I just validates that in some systems [14:55] re [14:56] cachio, cmatsuoka: please get a patch reviewed and ping me for deployment [14:57] zyga: ack [14:57] zyga, I'll update the images first [15:00] zyga, I think the main problem is how we create the images, but seems to be also a problem in gce, because it doesn't like the configuration parameter even if it goes empty [15:00] so for fedora we send the parameter empty and gce does not like the parameter [15:01] I need to fix that on spread [15:01] zyga, but first I'll update our images to support uefi configurations [15:01] cachio: perhaps fixing spread is faster [15:01] and that is a trivial change [15:01] there's no telling what happens if we move to uefi boot [15:02] maybe something else breaks [15:02] zyga, we are not moving to uefi oot [15:02] cachio: I changed your code a little bit and I'll run a test here [15:02] so what does the image update entail? [15:03] zyga, the change I am doing is telling to gce that the image now is compatible with uefi, but it does not mean we are going to use uefi [15:04] zyga, will just allow us to send uefi parameters [15:04] while the instance is created [15:04] so are there two knobs in GCE: 1) uefi supported 2) really use uefi to boot? [15:04] yes [15:04] weird :) [15:04] ok [15:04] uefi suported you set when you create the image [15:05] boot with uefi you set it when you start the image [15:05] so you can choose [15:05] either if you want to boot with uefi or not [15:05] the same image [15:06] lets make a try with this change, and then make the update in spread [15:11] sounds good [15:13] brb [15:14] mborzecki: I'll update opensuse today [15:14] mborzecki: maybe next week we could chat about suse security's group idea [15:19] zyga, fedora 31 is updated and now boots well [15:19] I'll run the entire suite to validate there is not side efect [15:20] zyga, udpating amazon linux now [15:42] ta [15:44] cachio: wdyt about something like https://pastebin.ubuntu.com/p/vtNg3Nx5Gk/ ? [15:45] mborzecki: probably for tomorrow 8508 is ready but sadly all spread tests worked so we can't test the re-run in a meaningful way [15:45] mborzecki: still ready for review [15:45] cachio: it also addresses some of gustavos comments on your original patch [15:47] Issue core18#153 opened: missing /etc/cloud/cloud.cfg.d/99-snappy-azure.cfg [15:48] * zyga break to rest from standing [15:49] more more more tests coming after [15:52] cmatsuoka, I'll check it [15:52] in the mean time I already updated fedora and amazon linux images [15:52] so those are now working again [15:54] cachio: it's important to fix spread as well, I suppose we're not the only users [15:54] cmatsuoka, we I update the images that all use [15:55] cmatsuoka, but the spread fix is also important [15:55] cmatsuoka, are you creating a PR with that? [15:56] I could, than perhaps you could run some tests on it? [15:56] zyga, cmatsuoka as retrospective I think we need to be able to run some tests to validate the google backend [15:57] cmatsuoka, ok, let me test it [15:57] s/than/then/ [15:59] cmatsuoka, in the PR 8700 just failing the ubuntu-secboot system [15:59] PR #8700: tests: fix the issue where all the tests were executed on secboot system [15:59] cmatsuoka, do you know how to fix it? [15:59] cachio: is it the secure boot disabled bug? in this case I think we're running the old spread there [16:00] cmatsuoka, well, we can run the new spread now [16:01] zyga, is it possible to use the new spread there? [16:01] where? [16:01] in the pr 8700 [16:02] PR #8700: tests: fix the issue where all the tests were executed on secboot system [16:02] cachio: ? [16:02] zyga are we using the old spread there? [16:02] cachio: spread is not specific to a PR [16:02] cachio: I don't understand your question [16:02] cachio: since we don't print spread version anywhere it's hard to guess [16:02] zyga, I misunderstood what claudio said I think [16:03] cachio: but I've updated spread across all the runners during the standup call [16:03] zyga, we are using the last spread right? [16:03] cachio: master [16:03] it's interesting, because 8700 fails with the "current boot was performed with secure boot disabled in firmware" error [16:03] zyga, perfect [16:03] cmatsuoka, yes [16:03] when did it fail, was it after the standup? [16:03] not sure why but I debugged that test and secure boot is enabled [16:04] zyga: I restarted the tests after the standup, yes [16:05] hmmm [16:05] one sec [16:05] drat, my fault [16:05] sorry, updating on nodes other than 1 [16:05] zyga, nice [16:06] thanks [16:06] zyga, I need to see if another image needs to be updated [16:06] cachio: please restart them again [16:07] restarted [16:11] cmatsuoka, I already did it [16:11] but for everything [16:11] I need to see if any systems needs to be updated [16:12] cachio: can you update leap / tw as well please [16:12] maybe you did earlier [16:13] I'll need to update some other images as well [16:15] ok [16:23] Does https://snapcraft.io/build build a new snap for pushes on ANY branch? Or only the default? [16:23] only the default IIRC [16:25] Oh, that's unfortunate [16:25] roadmr, can you confirm? [16:30] mvo: reviewed 8661, it has 2 +1's now [16:32] ti doesn't need my review I think, but maybe Pawel should give it a quick look [16:35] ijohnson: I merged your suggestion too, thanks for this [16:35] kyrofa: it's a web team thing [16:35] rather than store team [16:37] cjwatson, ah, I was wondering if I might end up addressing that question to you [16:37] I stopped working on this a year or two ago - definitely owned by the web team now :) [16:37] (I was involved in getting the thing up and running, but not long-term) [16:38] I don't actually know who that is these days, can you point me in the right direction? [16:38] time is hard our gdoc thinks monday was the 17 [16:38] pedronis, well to be fair time is an illusion since we went into lockdown ;-p [16:38] kyrofa: https://github.com/canonical-web-and-design/snapcraft.io/issues probably [16:38] (I don't have names for you) [16:39] Ah, someone there should probably idle here [16:39] yeah it'ld be a good idea for someone who maintains the build service to idle around here for questions [16:40] or in #snapcraft.. I still haven't worked out how to determine which channel I should be talking in ;-p [16:40] Lukewh, any chance you know everything there is to know about https://snapcraft.io/build? [16:40] pedronis: I think most of those issues are my fault tbh since I'm usually the one to add the new day in the gdoc haha [16:42] ijohnson: it's not a serious problem but I was confused for a bit [16:42] cachio: can you please ping me when all images are up-to-date [16:42] yeah I was quite confused myself when I realized we are not actually in june yet [16:42] zyga, all of them are updated [16:43] cachio: ah, excellent [16:43] cachio: I'll restart a few PRs to see what we get [16:43] I just retriggered the tests on that PR [16:43] thanks! [16:43] kyrofa: please file an issue. I need to verify the flow and I'm EODing so it'll remind me to check tomorrow :) [16:44] I already run a test in all the ysstems to validate it [16:44] Lukewh, will do [16:44] kyrofa: thanks. make sure you say what you'd like to happen and we can see if we can do it [16:47] mvo: https://github.com/snapcore/snapd/pull/8508#pullrequestreview-415527869 [16:47] PR #8508: github: run all spread systems in a single go with cached results [16:51] mvo: https://github.com/snapcore/snapd/pull/8681#discussion_r428163052 [16:51] PR #8681: tests: port interfaces-accounts-service to session-tool [16:52] and I'll send a follow up to update tests to cover 2* [16:54] zyga: thanks, merged [16:54] thanks! [16:55] PR snapd#8681 closed: tests: port interfaces-accounts-service to session-tool [16:55] mvo: if you have a moment today, pushing forward that caching PR would be great [16:55] zyga, now I see this error [16:55] https://paste.ubuntu.com/p/F3Vgw6bp4V/ [16:55] cachio: looking [16:55] this image didn't change [16:55] cachio: heh [16:55] cachio: /dev/sda1 9983268 4923644 5043240 50% / [16:55] but [16:55] /dev/mapper/loop2p3 380872 372800 0 100% /mnt [16:55] this is full [16:56] yes [16:56] it happens after I merged with master [16:56] what do we mount at /mnt? [16:56] did yo usee that in another pr? [16:56] no [16:57] I said "heh" because it seems that today everything breaks a little [16:57] zyga, ok I'll research in that case [16:57] it seems like the reflash magic [16:57] yes [16:57] note that ubuntu-core-16-64 uses an explicit image name [16:57] yes [16:57] maybe the implicit name we get for ubuntu-16.04-64 is different? [16:58] but that image didnt receive any change [16:58] check what we mount and what determines the size [16:58] zyga, yes [16:58] btw [16:58] the exclude patterns look wrong [16:59] we don't use /gopath, do we? we moved to /home/gopath [16:59] so those are probably copying build noise [16:59] anyway, 7PM [16:59] * zyga EODS [16:59] o/ [17:00] zyga, enjoy, lets continue tomorrow [17:00] see you === ijohnson is now known as ijohnson|lunch [17:24] mmh, 8681 needed a tweak before merging [17:31] pedronis: what kind, I can send a patch quickly [17:31] zyga: it was in my comments there [17:31] (back in the office for some stuff) [17:31] looking [17:32] the autoremove will not remove the thin we installed manually [17:32] I see it [17:32] thanks, I'll fix that in a moment [17:32] we need to first remove it and then autoremove the rest [17:32] zyga: thx [17:35] pedronis: https://github.com/snapcore/snapd/pull/8705 [17:35] * zyga back to afk [17:35] thx [17:35] PR #8705: tests: remove gnome-online-accounts we install [17:35] PR snapd#8705 opened: tests: remove gnome-online-accounts we install === ijohnson|lunch is now known as ijohnson [18:42] PR snapcraft#3133 closed: go v1 plugin: go.mod support for 1.11 and 1.12 [18:53] cachio: https://github.com/snapcore/spread/pull/105 is my attempt to solve the issue [18:54] PR spread#105: google: only configure shielded instance when secure boot is enabled [18:54] cachio: it also changes secureboot: to secure-boot: so PR 8700 will have to be changed accordingly [18:54] PR #8700: tests: fix the issue where all the tests were executed on secboot system [18:56] cmatsuoka, yes, but once this pr is merged into spread [18:56] yes [18:56] or when zyga makes this version available to snapd, I don't know how our private deployments work [18:58] cmatsuoka, didn't work [18:58] same issue I see [18:59] cmatsuoka, I need to go to the doctor now, I'll fix it and test it and push [18:59] once I am back [18:59] cachio: oh really? I tested it here with create-partitions-encrypted and it worked (with secureboot changed to secure-boot in spread.yaml) [18:59] ok [19:00] cmatsuoka, I tested to run a test with not secboot [19:00] and it fails with the same error [19:00] https://paste.ubuntu.com/p/c7NQcNQmfB/ [19:01] cmatsuoka, I'll run again when I am back [19:01] in 1 hour [19:01] ok, I'll test with fedora in the meantime [19:01] * cachio afk [19:02] remember all the images support uefi now [19:03] so it will work :) [19:03] cmatsuoka, you can try with the image fedora-31-64-base [19:03] ok! [19:04] cmatsuoka: I can do it now [19:04] * zyga waves from the garden [19:05] cmatsuoka: is spread master updated? [19:42] PR snapcraft#3134 opened: cli: nicer message for status with no releases [20:03] cachio: I got this with fedora-31-64: https://pastebin.ubuntu.com/p/c5t9RdzBqv/ [20:21] cmatsuoka: o/ [20:21] 020-05-20 16:24:43 Project content is packed for delivery (176.12MB). <- ?? [20:21] that's a lot [20:22] zyga: indeed, maybe there's something that shouldn't be there [20:22] * cmatsuoka checks [20:23] do you need me to do anything with spread? [20:23] zyga: I'm waiting for sergio to validate my fixes, it works in my tests but it seems that it failed for him in an unexpected way [20:24] and yes, there was a compressed image in the spread-image directory [20:24] I mean, a compressed core image [20:24] cmatsuoka: maybe a candidate to spread exclude [20:25] I really don't know why it was there [20:25] probably a leftover from a previous test [20:37] PR core20#60 closed: Copy-in launchpad's build-archive [20:39] Issue core20#57 closed: "man" command should not suggest running unminimize [20:39] PR core20#59 closed: static: provide friendly message when "man" is used [21:02] cmatsuoka, hey [21:03] cmatsuoka, #8700 is in green now [21:03] PR #8700: tests: fix the issue where all the tests were executed on secboot system [21:03] cmatsuoka, zyga left some comments there about the changes that you did to the test, could you please answer those? [21:04] cachio: ack, also I'm wondering why PR 105 failed for you, I succesfully opened a shell in fedora-31-64 [21:04] PR #105: Track capability types [21:10] cachio: answered the comments in the PR [21:12] cachio: is there a non-uefi image I can use to test spread? [21:13] cachio: I see you used fedora-32-64 in your test and I tested fedora-31-64, are those different to the point it could affect this test? [21:16] cmatsuoka, you need to test fedora-31-64-base and fedora-31-64 [21:16] cmatsuoka, the first does not support uefi [21:16] the second it does [21:17] cmatsuoka, in my case it failed with the images that don't support uefi [21:17] ah ok, let me try the -base variant... [21:17] the image you used it was updated by me :) [21:18] Hmm, I think I tested -base already, I'll test both again to be sure [21:21] cachio: is opensuse updated as well? [21:21] cachio: I ran into some issues but perhaps that was from an earlier run [21:21] cachio: so this is -base: https://pastebin.ubuntu.com/p/4MrXX4nscd/ [21:22] cachio: and this is the non-base: https://pastebin.ubuntu.com/p/PnXFBpmrZk/ [21:26] zyga, opensuse is updated [21:26] 15.1 and tumbleweed [21:26] ta, I'll get back to stuff tomorrow! [21:27] cmatsuoka, nice, in that case I got an error [21:28] zyga, ig #8700 ok for you? [21:28] PR #8700: tests: fix the issue where all the tests were executed on secboot system [21:29] cmatsuoka, and for you? [21:29] +1 [21:30] cachio: 8700 works with the current spread, for PR-105 we'll need one more change (secureboot: to secure-boot:) [21:31] but I'm still very intrigued with sergio's error with PR-105 [21:31] cachio: could you check if the binary was built from the correct branch and try the test that failed again? [21:32] cmatsuoka, ok, once spread works using secure-boot we update snapd accordingly [21:32] does it make sense? [21:32] cmatsuoka, checking the error [21:33] cachio: yes, we must keep things consistent [21:33] cmatsuoka, it is merged now [21:34] so tomorrow we update snapd and zyga deployes the new spread [21:34] do you need master or something else? [21:34] zyga, we have on master the fix [21:34] ah, excellent [21:35] I will deploy that in the morning [21:35] nice [21:35] I'll create the change on snapd to address that, so tomorrow you can approve it once the deploy is done [21:37] cmatsuoka, is it ok to merge 8700 now? [21:38] cachio: if it's passing the tests it should be fine [21:39] cachio: I just noticed here that neither fedora-31-64 nor fedora-31-64-base have /sys/firmware/efi [21:39] cachio: is that expected? [21:39] cmatsuoka, yes [21:40] cmatsuoka, what I did it to configure gce to allow uefi [21:40] ah, it's allowed but not necessarily used? [21:40] cmatsuoka, yes [21:40] ah cool, ok [21:41] I need to specify that when I start the instance [21:41] and why did it failed for you? [21:41] and we are sending the configuration empry [21:41] because the image was not set to use uefi [21:41] so when we sent the configuration empty, then gce rejects the parameters [21:42] so in PR-105 we're not sending it empty anymore [21:42] even when the arrey is empty [21:42] we don't send it if secure-boot is disabled [21:42] cmatsuoka, exact [21:42] so PR-105 should have worked for you [21:42] perhaps I did something wrong [21:43] I'll try again in 1 minutes [21:44] PR snapd#8700 closed: tests: fix the issue where all the tests were executed on secboot system [21:44] ah ok, no hurry, I'm just intrigued [21:58] cmatsuoka, it works [21:58] ah nice, thanks :) [21:58] I think I made a mistake to build [21:59] just verified [21:59] zyga, dont use master yet, it is still no merged [21:59] the change on spread