-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 11/04/12 18:37, Samuli Seppänen wrote:
> Hi all,
>> My personal feeling based is that we should probably focus the
>> ACK system to high-risk patches, e.g.
>> 
>> - patches touching critical parts of the code (rationale: better
>> safe than sorry) - patches from new contributors (rationale: fix
>> stylistic issues and errors, ensure usefulness, educate)
> I might add that James wanted to mandate a review on all patches -
> or at least those that have capability to create security issues.
> That said, we could probably use a  "experimental/testing" tree to
> host patches/patchsets that make sense, but have not yet been
> properly reviewed. This would have a couple of nice benefits
> compared to working with stable master + external trees/patches:
> 
> - We could (easily) run build/connectivity tests against this 
> "experimental" tree using our build farm - We could build snapshot
> binary packages based on this tree, and publish them using
> apt/yum/website
> 
> This would allow patches to be reviewed by developers_and_
> (easily) tested by users at the same time.  The stable tree would
> still be the basis for official releases, and would pull stuff from
> "experimental" as it matures.

Just a little nitpick.  I wouldn't pull patches from the
"experimental" branch directly "just like that".  Let this branch be
completely experimental in all ways - like a fork which will never be
anything else than a fork.  So, patches which are taken from the ML
into the experimental branch, will need to be reviewed before hitting
the master branch.

But maybe it makes sense to discuss what kind of changes and to which
parts of the code will strictly require an ACK and what can more
easily be applied to the master branch just doing a more "sanity
review".

F.ex. man-page/documentation updates don't necessarily need to go
through any kind of security related review.  The same probably
applies to core autotools files itself(?).  But when touching C code
or some of the scripts we ship, then much more caution is needed.

But fixing typo's in a log messages isn't necessarily security related
at all (unless changing the formatting of the message; that might
introduce security issues).  However, changing the log verbosity level
in the encryption code might have some security impacts.  My point is
that we can't necessarily state that errlevel.h changes should be
relaxed "by default".  We need somewhat of an overall generic, but
still precise descriptions of what can be relaxed and what should not
be relaxed at all - not just a list based upon file names and/or
functions.

The current model, which tries to enforce a more strict ACK policy on
all patches avoids this need of clarification.  But it slows down
patch inclusions.


kind regards,

David Sommerseth
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iEYEARECAAYFAk+GjBUACgkQDC186MBRfrqOGwCgpncEZTZ95R1RH9EXc4vhcIie
4asAn1VT845tPvVWaNpxA0i7gpmbPYyd
=Q7/m
-----END PGP SIGNATURE-----

Reply via email to