Re: Release?

2025-03-12 Thread James Browning via devel
On 2025-03-11T21:58:07-0700, Hal Murray wrote: > What needs to happen before we can get a release out? 0. Someone should update the "devel/hacking.adoc" release process checklist, later. 1. It's past time to release; we have landed new features and significant bug fixes, and too many days have

Re: Release

2023-12-28 Thread Matthew Selsky via devel
On Wed, Dec 06, 2023 at 01:56:51AM +, Matthew Selsky via devel wrote: > Sounds good. I'll aim to release ~15-Dec-2023. Hi all, Sorry for the delays. I have a release candidate tarball available: https://ftp.ntpsec.org/pub/releases/ntpsec-1.2.3rc1.tar.gz https://ftp.ntpsec.org/pub/releases/n

Re: Release

2023-12-21 Thread Fred Wright via devel
On Mon, 18 Dec 2023, Fred Wright wrote: On Mon, 18 Dec 2023, Matthew Selsky wrote: On Sun, Dec 17, 2023 at 08:17:23PM -0800, Fred Wright via devel wrote: There are also a bunch of warnings with some compilers, which might be worth looking at. They're often fairly easy to fix, and sometimes

Re: Release

2023-12-18 Thread James Browning via devel
> On 12/17/2023 9:49 PM PST Hal Murray via devel wrote: > > Fred Wright said: :::snip::: > > There are also a bunch of warnings with some compilers, which might be > > worth > > looking at. They're often fairly easy to fix, and sometimes indicate actual > > problems. > > Which compilers?

Re: Release

2023-12-18 Thread Fred Wright via devel
On Sun, 17 Dec 2023, Hal Murray wrote: Fred Wright said: The main issue I've found is that the "struct var" in ntp_control.c, is relying on anonymous unions, which are a relatively new language feature. That is my attempt at getting a sane procedure for adding slots to the table. The old sch

Re: Release

2023-12-18 Thread Matthew Selsky via devel
On Sun, Dec 17, 2023 at 08:17:23PM -0800, Fred Wright via devel wrote: Hi Fred, > The main issue I've found is that the "struct var" in ntp_control.c, is > relying on anonymous unions, which are a relatively new language feature. > They were originally a GNU extension, eventually becoming officia

Re: Release

2023-12-17 Thread Hal Murray via devel
Fred Wright said: > I also stumbled across something (which may not be new) where it appears > that if libaes_siv is installed as a system library, it's preferred over the > bundled version. That probably doesn't change the actual behavior, but may > lead to opportunistic builds. That seems wort

Re: Release

2023-12-17 Thread Hal Murray via devel
Fred Wright said: > The main issue I've found is that the "struct var" in ntp_control.c, is > relying on anonymous unions, which are a relatively new language feature. That is my attempt at getting a sane procedure for adding slots to the table. The old scheme required coordinated edits in sev

Re: Release

2023-12-17 Thread Fred Wright via devel
On Wed, 6 Dec 2023, Matthew Selsky via devel wrote: Sounds good. I'll aim to release ~15-Dec-2023. Fortunately this hasn't happened yet. :-) The main issue I've found is that the "struct var" in ntp_control.c, is relying on anonymous unions, which are a relatively new language feature. Th

RE: Release

2023-12-17 Thread Matt Selsky via devel
I’ll create a release candidate on Monday 12/18 and then a final release shortly thereafter. Thanks, -Matt ___ devel mailing list devel@ntpsec.org https://lists.ntpsec.org/mailman/listinfo/devel

Re: Release

2023-12-05 Thread Hal Murray via devel
> I'll aim to release ~15-Dec-2023 Sounds good. Thanks. > I'm thinking about AES becoming the new default for ntpq, etc. I got a few a day or so ago. I missed that one. I'll get it tonight. -- These are my opinions. I hate spam. ___ devel ma

Re: Release

2023-12-05 Thread Matthew Selsky via devel
On Sat, Dec 02, 2023 at 08:09:00PM -0800, Hal Murray wrote: > > I think you should release what we have as soon as it is convenient. > > There are many more things I would like to include but we aren't making much > progress so it's time to do it. Hi Hal, Sounds good. I'll aim to release ~15-D

Re: Release

2023-12-03 Thread Gary E. Miller via devel
Yo Hal! On Sun, 03 Dec 2023 17:44:45 -0800 Hal Murray via devel wrote: > Gary said: > > DO you have an account on: https://scan.coverity.com/ > > If so, I think I can add you to the project. > > How does their stuff work? How often do they check NTPsec? > Or what should I be asking? Ever

Re: Release

2023-12-03 Thread Hal Murray via devel
Gary said: > DO you have an account on: https://scan.coverity.com/ > If so, I think I can add you to the project. Thanks. I think i worked. How does their stuff work? How often do they check NTPsec? Or what should I be asking? How much mail should I expect? ... There are 3 Coverity quirk

Re: Release

2023-12-03 Thread Gary E. Miller via devel
Yo Hal! On Sun, 03 Dec 2023 15:07:18 -0800 Hal Murray via devel wrote: > > Gary said: > > > Uh, not quite. Check the Coverity stuff. > > > > How do I do that? > > DO you have an account on: https://scan.coverity.com/ On further checking,halmurray...@sonic.net is an admin on the

Re: Release

2023-12-03 Thread Gary E. Miller via devel
Yo Hal! On Sun, 03 Dec 2023 15:07:18 -0800 Hal Murray via devel wrote: > Gary said: > > Uh, not quite. Check the Coverity stuff. > > How do I do that? DO you have an account on: https://scan.coverity.com/ If so, I think I can add you to the project. RGDS GARY -

Re: Release

2023-12-03 Thread Hal Murray via devel
Gary said: > Uh, not quite. Check the Coverity stuff. How do I do that? I'd expect something to send me email but I don't remember anything about Coverity. -- These are my opinions. I hate spam. ___ devel mailing list devel@ntpsec.org https://l

Re: Release

2023-12-03 Thread Gary E. Miller via devel
Yo James! On Sat, 2 Dec 2023 21:12:04 -0800 (PST) James Browning via devel wrote: > 4. The buildbots are not reporting any unplanned regressions; there > are always issues to be addressed. Uh, not quite. Check the Coverity stuff. RGDS GARY -

Re: Release

2023-12-02 Thread James Browning via devel
> On 12/02/2023 8:09 PM PST Hal Murray via devel wrote: > > > I think you should release what we have as soon as it is convenient. > > There are many more things I would like to include but we aren't making much > progress so it's time to do it. Referring to the first four items on the relea

Re: Release, project sleeping, and running down the clock.

2023-08-22 Thread James Browning via devel
> On 08/22/2023 3:29 AM PDT Hal Murray wrote: > > > James Browning said: > > If the project is sleeping, then you may as > >well cut the new release now. > > I think we should do a normal release. That includes scanning the issues and > merge requests. And lots of testing. > > I'm work

Re: Release, project sleeping, and running down the clock.

2023-08-22 Thread Hal Murray via devel
James Browning said: > If the project is sleeping, then you may as >well cut the new release now. I think we should do a normal release. That includes scanning the issues and merge requests. And lots of testing. I'm working on making a couple of new stats files for NTP packets using NTS

Re: Release coming, take 2

2022-12-23 Thread Matt Selsky via devel
Hi all, We had some recent commits to fix issues found by Google's OSS-Fuzz scanner so we've decided to do a release candidate today and then a full release next week after we've had some more time to kick the tires. The release candidate is available at https://ftp.ntpsec.org/pub/releases/ntp

Re: Release coming, take 2

2022-12-18 Thread James Browning via devel
> On 12/15/2022 1:21 PM PST Matthew Selsky via devel wrote: > > > Hi all, > > I plan to cut a release on Thu 12/22/2022. I'm sorry about the delays in > getting this release out the door. > > If there's anything that absolutely must be in this release and can't wait > until the next releas

Re: Release, wildcards, etc

2022-05-10 Thread James Browning via devel
On Apr 20, 2022 07:30, Matt Selsky via devel wrote:Hi Hal, I'd like to get https://gitlab.com/NTPsec/ntpsec/-/merge_requests/1264 merged and then do the release. Is there anything else that we want in the release?Yes, but in the interest of helping get it out on this calendar the rest of my

Re: Release, wildcards, etc

2022-04-29 Thread Hal Murray via devel
[Mail to devel has about a 10 hour delay.] Sorry for not providing more context on my first try. > "nts nowildcards" changes the default from wildcards allowed to not allowed. > server blah, blah "nowildcards" turns off wildcards for this slot > server blah, blah "wildcardsOK" allows wildcards fo

Re: Release, wildcards, etc

2022-04-28 Thread Hal Murray via devel
> Sorry, I'm not following what you mean here. Do you have a patch or merge > request that I can look at? I should be able to explain it. In the config file: "nts nowildcards" changes the default from wildcards allowed to not allowed. server blah, blah "nowildcards" turns off wildcards for t

Re: Release, wildcards, etc

2022-04-28 Thread Matthew Selsky via devel
On Fri, Apr 22, 2022 at 12:13:25AM -0700, Hal Murray via devel wrote: > nts nowildcards at the top level to set the default > nowildcards at the server level > wildcardsOK at the server level to override the default Hi Hal, Sorry, I'm not following what you mean here. Do you have a patch or merg

Re: Release, wildcards, etc

2022-04-22 Thread Hal Murray via devel
Richard Laager said: > 8 cases? I thought it was one setting, which would be 2 cases. > Can you expand upon what you're actually proposing? Ideally as a merge > request, but at least explain the knobs here. nts nowildcards at the top level to set the default nowildcards at the server level wild

Re: Release, wildcards, etc

2022-04-21 Thread Richard Laager via devel
On 4/21/22 03:17, Hal Murray via devel wrote: There are 8 cases. I think I tested them all. If it will make you happy, I'll test again, being careful to check all 8 cases. 8 cases? I thought it was one setting, which would be 2 cases. Can you expand upon what you're actually proposing? Ideal

Re: Release, wildcards, etc

2022-04-21 Thread Hal Murray via devel
[Eric: There are a couple of preceding messages to devel in the mail someplace.] > I'd like to get https://gitlab.com/NTPsec/ntpsec/-/merge_requests/1264 merged > and then do the release. > Is there anything else that we want in the release? I'm sorry that we have gotten off on the wrong foot (

Re: Release, wildcards, etc

2022-04-20 Thread Matt Selsky via devel
Hi Hal, I'd like to get https://gitlab.com/NTPsec/ntpsec/-/merge_requests/1264 merged and then do the release. Is there anything else that we want in the release? Thanks, -Matt ___ devel mailing list devel@ntpsec.org https://lists.ntpsec.org/mailman/

Re: Release gymnastics

2020-09-18 Thread Daniel Franke via devel
The normative content of the RFC is not going to change. There's no reason to hold back any release while waiting for publication. On Fri, Sep 18, 2020 at 11:43 AM Hal Murray via devel wrote: > > > Maybe we should get 1.2 out now/soon so it will be ready when the RFC comes > out rather than short

Re: Release of NTPSec 0.9.3

2016-06-30 Thread Gregory Boyce
On Mon, May 23, 2016 at 4:54 PM Kurt Roeckx wrote: > On Mon, May 23, 2016 at 08:51:06PM +, Mark Atwood wrote: > > There should be a tag in gitlab. If there is not, it is my mistake, and > I > > will fix it this evening. ..m > > There are also no releases on ftp://ftp.ntpsec.org/pub/release

Re: Release of NTPSec 0.9.3

2016-05-23 Thread Kurt Roeckx
On Mon, May 23, 2016 at 08:51:06PM +, Mark Atwood wrote: > There should be a tag in gitlab. If there is not, it is my mistake, and I > will fix it this evening. ..m There are also no releases on ftp://ftp.ntpsec.org/pub/releases/, 0.9.1 is the latest. Kurt ___

Re: Release of NTPSec 0.9.3

2016-05-23 Thread Mark Atwood
There should be a tag in gitlab. If there is not, it is my mistake, and I will fix it this evening. ..m On Mon, May 23, 2016 at 12:37 PM Gregory Boyce wrote: > Folks, > > I was wondering what the status was of the 0.9.3 release. I see two > checkins from Mark on the 18th which seem to indica

Re: Release mode.

2016-01-26 Thread Sanjeev Gupta
On Wed, Jan 27, 2016 at 5:06 AM, Amar Takhar wrote: > This also means we can remove the 'waf' binary from the Git repository and > package it in with the tarball releases in the future > Speaking for ease of use for me, I would prefer not to think about which waf version to use when building fro

Re: Release mode.

2016-01-26 Thread Eric S. Raymond
Amar Takhar : > This also means we can remove the 'waf' binary from the Git repository and > package it in with the tarball releases in the future. I'd be opposed to this. It might compromise build replicability in the future. -- http://www.catb.org/~esr/";>Eric S. Raymond _