> The only way I'd be in favor of a release that removes all other committed 
> patches
Couldn't we just have a snapshot branch for each supported major/minor release 
branch that we patch for hotfixes and we bump up whenever we have a GA on a 
parent branch?

Shouldn't be any extra burden other than having three extra branches to 
remember exist; wouldn't need to merge to them or patch to them other than a 
fast-forward on a given GA.

On Tue, Feb 15, 2022, at 10:48 AM, Jeff Jirsa wrote:
> We've done concurrent releases without security before, and you follow much 
> closer than others. I feel most people, if they saw all of the changes 
> reverted and a release of a single fix, would either instantly know it's 
> security (high confidence pointer to exactly which patch) OR assume someone 
> botched the release prep and draw attention to it. So we're trading "someone 
> who's very involved has a high confidence it's security but has to dig 
> through 30 patches to find it" vs "everyone knows exactly what's going on", 
> the former seems better
> 
> The only way I'd be in favor of a release that removes all other committed 
> patches is if the vote happened in private@ . I don't see any prohibition on 
> that in https://www.apache.org/foundation/voting.html#ReleaseVotes , so that 
> seems like an alternate, easy workaround to privacy. 
> 
> 
> 
> On Tue, Feb 15, 2022 at 7:42 AM J. D. Jordan <jeremiah.jor...@gmail.com> 
> wrote:
>> 
>> We already advertise that we are preparing a security release when ever we 
>> release all of our patch versions at the same time. So I don’t think there 
>> is an issue there.
>> I was not involved in any PMC discussions and had no knowledge of the CVE, 
>> but when three branches got release votes at the same moment I knew one of 
>> the final couple patches that was on all three must be an un-announced CVE. 
>> It is especially more obvious when said patches mention JIRA ticket numbers 
>> with no information in the ticket. Nobody is being sneaky here as long as 
>> the vote and code are in the open.
>> 
>>> On Feb 15, 2022, at 9:15 AM, bened...@apache.org wrote:
>>>  
>>> One issue with this approach is that we are advertising that we are 
>>> preparing a security release by preparing such a release candidate.____
>>> __ __
>>> I wonder if we need to find a way to produce binaries without leaving an 
>>> obvious public mark (i.e. private CI, private branch)____
>>> __ __
>>> __ __
>>> *From: *Josh McKenzie <jmcken...@apache.org>
>>> *Date: *Tuesday, 15 February 2022 at 14:09
>>> *To: *dev@cassandra.apache.org <dev@cassandra.apache.org>
>>> *Subject: *[DISCUSS] Hotfix release procedure____
>>> On the release thread for 4.0.2 Jeremiah brought up a point about hotfix 
>>> releases and CI: ____
>>> https://lists.apache.org/thread/7zc22z5vw5b58hdzpx2nypwfzjzo3qbr____
>>> __ __
>>>> If we are making this release for a security incident/data loss/hot fix 
>>>> reason, then I would expect to see the related change set only containing 
>>>> those patches. But the change set in the tag here the latest 4.0-dev 
>>>> commits.____
>>> __ __
>>> I'd like to propose that in the future, regardless of the state of CI, if 
>>> we need to cut a hotfix release we do so from the previous released SHA + 
>>> only the changes required to address the hotfix to minimally impact our end 
>>> users and provide them with as minimally disruptive a fix as possible.____

Reply via email to