Re: ✘NTPSec next release

2025-04-10 Thread Matt Selsky via devel
On Thu, Apr 10, 2025 at 12:26:15PM -0700, Gary E. Miller via announce wrote: > No comments? Everyone is good with a weekend release of NTPSec as is? Hi Gary, Sounds good to me. I'll do the release over the weekend unless I hear otherwise. Cheer

Re: Release: waf vs install directories

2025-04-05 Thread James Browning via devel
On Wednesday, March 26, 2025 11:09:51 AM Pacific Daylight Time Hal Murray wrote: > If somebody is still using Python 2, do they have to manually fix the link > from waf to point to the old waf? Or is there some magic that takes care > of that? THERE IS NO MAGIC HERE, nor any fancy Python tricks.

Release: waf vs install directories

2025-04-05 Thread Hal Murray via devel
What's the story on new waf install directories vs old waf directories? Do we need to change the code and/or fix the documentation? Is there anything else we need to sort out before a release? -- These are my opinions. I hate spam. ___

Re: Release

2025-04-05 Thread Hal Murray via devel
specific? > I suggest at least a week, maybe two week, quiet period for testing. We've been talking about a release for a long time. I've been assuming people have been testing. -- These are my opinions. I hate spam. ___ devel

Re: Release: waf vs install directories

2025-04-05 Thread James Browning via devel
anything else we need to sort out before a release? Only if you want to wait for the egg-info to wheel info change. I would not wait on that change or sock reflcock. Release it already. Gary? Matt? Anyone lurking in the rafters? ___ devel mail

Re: Release: waf vs install directories

2025-04-05 Thread Hal Murray via devel
If somebody is still using Python 2, do they have to manually fix the link from waf to point to the old waf? Or is there some magic that takes care of that? -- These are my opinions. I hate spam. ___ devel mailing list devel@ntpsec.org https://l

Re: Release

2025-04-03 Thread Gary E. Miller via devel
Yo Hal! On Wed, 02 Apr 2025 23:15:36 -0700 Hal Murray wrote: > Gary said: > >> We've been talking about a release for a long time. I've been > >> assuming people have been testing. > > I do not assume that. Likely they will test after release. >

Re: Release

2025-04-02 Thread Hal Murray via devel
Gary said: >> We've been talking about a release for a long time. I've been >> assuming people have been testing. > I do not assume that. Likely they will test after release. By "people", I was thinking of those who read @devel. I assume your "the

Re: Release

2025-03-30 Thread Gary E. Miller via devel
s not important... > > Some I am not happy about. > > Anything specific? Not tonight, maybe Tuesday. I saw some things fly by that I wanted to check. > > I suggest at least a week, maybe two week, quiet period for > > testing. > > We've been talking about a rel

Re: Release

2025-03-30 Thread Gary E. Miller via devel
Yo Hal! On Sun, 30 Mar 2025 15:16:36 -0700 Hal Murray via devel wrote: > I think we are ready. A lot of changes in the last few days. Some I am not happy about. I suggest at least a week, maybe two week, quiet period for testing. RGDS GARY

Release

2025-03-30 Thread Hal Murray via devel
I think we are ready. -- These are my opinions. I hate spam. ___ devel mailing list devel@ntpsec.org https://lists.ntpsec.org/mailman/listinfo/devel

buildprep, release

2025-03-29 Thread Hal Murray via devel
also propose that we only support the current version of any distro. So if you want to install on an old system, you can use buildprep as a guide, but you will have to do some work to sort out the details. I just added a last-tested line to each mainline path. The idea is to test what we

Re: Release: waf vs install directories

2025-03-26 Thread James Browning via devel
On Wednesday, March 26, 2025 12:25:34 PM Pacific Daylight Time Hal Murray wrote: > > Python 2.7 works with either version of waf. > > Thanks. > > Why are we keeping the old version? Paranoia, I figured that if I removed it there would be a high chance something would go wrong and I would be re

Re: Release: waf vs install directories

2025-03-26 Thread Hal Murray via devel
> Python 2.7 works with either version of waf. Thanks. Why are we keeping the old version? -- These are my opinions. I hate spam. ___ devel mailing list devel@ntpsec.org https://lists.ntpsec.org/mailman/listinfo/devel

Re: Release: waf vs install directories

2025-03-25 Thread James Browning via devel
On Monday, March 24, 2025 8:25:10 PM Pacific Daylight Time you wrote: > > The code has changed, behavior is not noticeably different than it was > > before. > Didn't it change from dist-packages to site-packages on Debian and friends? Yes, it does due to upstream waf and/or Python changes. Accord

Re: Release: waf vs install directories

2025-03-25 Thread Hal Murray via devel
> The code has changed, behavior is not noticeably different than it was before. Didn't it change from dist-packages to site-packages on Debian and friends? -- These are my opinions. I hate spam. ___ devel mailing list devel@ntpsec.org https://lis

Re: Release?

2025-03-12 Thread James Browning via devel
On 2025-03-11T21:58:07-0700, Hal Murray wrote: > What needs to happen before we can get a release out? 0. Someone should update the "devel/hacking.adoc" release process checklist, later. 1. It's past time to release; we have landed new features and significant bug fixes, and

Release?

2025-03-11 Thread Hal Murray via devel
What needs to happen before we can get a release out? -- These are my opinions. I hate spam. ___ devel mailing list devel@ntpsec.org https://lists.ntpsec.org/mailman/listinfo/devel

Release

2025-02-18 Thread Hal Murray via devel
I think we are getting close. I'm shifting my efforts to testing. Does anybody know of things that need fixing or merging or ??? before a release? -- These are my opinions. I hate spam. ___ devel mailing list devel@ntpsec.org

Wish list for release

2025-02-03 Thread Hal Murray via devel
It would be really nice if we had a working example of a cross compile, and something like a HOWTO-cross to document it, including the packages that need to be installed. It would be nice if option-tester could also do an install, bin-test, and uninstall. Best in a scratch directory. -- T

Re: Checking issues (for a release)

2025-01-27 Thread James Browning via devel
On Monday, January 27, 2025 3:10:55 AM Pacific Standard Time Hal Murray via devel wrote: > What's the story on new waf vs old python? > https://gitlab.com/NTPsec/ntpsec/-/issues/830 Python versions before 2.6 break because they seem to lack an 'as' keyword. Python 2.6 fails on my system becaus

Checking issues (for a release)

2025-01-27 Thread Hal Murray via devel
What's the story on new waf vs old python? https://gitlab.com/NTPsec/ntpsec/-/issues/830 --enable-pylib none needs work https://gitlab.com/NTPsec/ntpsec/-/issues/819 Should that be --disable-python? -- These are my opinions. I hate spam. __

Re: Time for a release?

2024-12-05 Thread James Browning via devel
> On 12/02/2024 11:07 AM PST Hal Murray via devel wrote: > > Things have been quiet recently. Is it time for a release? It probably is time for a release, and quiet is one word for it. > Is there anything we should imiplement or fix before a release? > Has anybody scanne

Time for a release?

2024-12-04 Thread Hal Murray via devel
Things have been quiet recently. Is it time for a release? Is there anything we should imiplement or fix before a release? Has anybody scanned the bug/issue list recently? -- These are my opinions. I hate spam. ___ devel mailing list devel

Re: Release

2023-12-28 Thread Matthew Selsky via devel
On Wed, Dec 06, 2023 at 01:56:51AM +, Matthew Selsky via devel wrote: > Sounds good. I'll aim to release ~15-Dec-2023. Hi all, Sorry for the delays. I have a release candidate tarball available: https://ftp.ntpsec.org/pub/releases/ntpsec-1.2.3rc1.tar.gz https://ftp.ntpsec.org/pub/

Re: Release

2023-12-21 Thread Fred Wright via devel
On Mon, 18 Dec 2023, Fred Wright wrote: On Mon, 18 Dec 2023, Matthew Selsky wrote: On Sun, Dec 17, 2023 at 08:17:23PM -0800, Fred Wright via devel wrote: There are also a bunch of warnings with some compilers, which might be worth looking at. They're often fairly easy to fix, and sometimes

Re: Release

2023-12-18 Thread James Browning via devel
> On 12/17/2023 9:49 PM PST Hal Murray via devel wrote: > > Fred Wright said: :::snip::: > > There are also a bunch of warnings with some compilers, which might be > > worth > > looking at. They're often fairly easy to fix, and sometimes indicate actual > > problems. > > Which compilers?

Re: Release

2023-12-18 Thread Fred Wright via devel
On Sun, 17 Dec 2023, Hal Murray wrote: Fred Wright said: The main issue I've found is that the "struct var" in ntp_control.c, is relying on anonymous unions, which are a relatively new language feature. That is my attempt at getting a sane procedure for adding slots to the table. The old sch

Re: Release

2023-12-18 Thread Matthew Selsky via devel
On Sun, Dec 17, 2023 at 08:17:23PM -0800, Fred Wright via devel wrote: Hi Fred, > The main issue I've found is that the "struct var" in ntp_control.c, is > relying on anonymous unions, which are a relatively new language feature. > They were originally a GNU extension, eventually becoming officia

Re: Release

2023-12-17 Thread Hal Murray via devel
c builds. That seems worth fixing. I don't think we should hold up the release unless somebody fixes it in the next day or two. -- These are my opinions. I hate spam. ___ devel mailing list devel@ntpsec.org https://lists.ntpsec.org/mailman/listinfo/devel

Re: Release

2023-12-17 Thread Hal Murray via devel
Fred Wright said: > The main issue I've found is that the "struct var" in ntp_control.c, is > relying on anonymous unions, which are a relatively new language feature. That is my attempt at getting a sane procedure for adding slots to the table. The old scheme required coordinated edits in sev

Re: Release

2023-12-17 Thread Fred Wright via devel
On Wed, 6 Dec 2023, Matthew Selsky via devel wrote: Sounds good. I'll aim to release ~15-Dec-2023. Fortunately this hasn't happened yet. :-) The main issue I've found is that the "struct var" in ntp_control.c, is relying on anonymous unions, which are a relati

RE: Release

2023-12-17 Thread Matt Selsky via devel
I’ll create a release candidate on Monday 12/18 and then a final release shortly thereafter. Thanks, -Matt ___ devel mailing list devel@ntpsec.org https://lists.ntpsec.org/mailman/listinfo/devel

Re: Release

2023-12-05 Thread Hal Murray via devel
> I'll aim to release ~15-Dec-2023 Sounds good. Thanks. > I'm thinking about AES becoming the new default for ntpq, etc. I got a few a day or so ago. I missed that one. I'll get it tonight. -- These are my opinions. I hate spam.

Re: Release

2023-12-05 Thread Matthew Selsky via devel
On Sat, Dec 02, 2023 at 08:09:00PM -0800, Hal Murray wrote: > > I think you should release what we have as soon as it is convenient. > > There are many more things I would like to include but we aren't making much > progress so it's time to do it. Hi Hal, Sounds good

Re: Release

2023-12-03 Thread Gary E. Miller via devel
Yo Hal! On Sun, 03 Dec 2023 17:44:45 -0800 Hal Murray via devel wrote: > Gary said: > > DO you have an account on: https://scan.coverity.com/ > > If so, I think I can add you to the project. > > How does their stuff work? How often do they check NTPsec? > Or what should I be asking? Ever

Re: Release

2023-12-03 Thread Hal Murray via devel
Gary said: > DO you have an account on: https://scan.coverity.com/ > If so, I think I can add you to the project. Thanks. I think i worked. How does their stuff work? How often do they check NTPsec? Or what should I be asking? How much mail should I expect? ... There are 3 Coverity quirk

Re: Release

2023-12-03 Thread Gary E. Miller via devel
Yo Hal! On Sun, 03 Dec 2023 15:07:18 -0800 Hal Murray via devel wrote: > > Gary said: > > > Uh, not quite. Check the Coverity stuff. > > > > How do I do that? > > DO you have an account on: https://scan.coverity.com/ On further checking,halmurray...@sonic.net is an admin on the

Re: Release

2023-12-03 Thread Gary E. Miller via devel
Yo Hal! On Sun, 03 Dec 2023 15:07:18 -0800 Hal Murray via devel wrote: > Gary said: > > Uh, not quite. Check the Coverity stuff. > > How do I do that? DO you have an account on: https://scan.coverity.com/ If so, I think I can add you to the project. RGDS GARY -

Re: Release

2023-12-03 Thread Hal Murray via devel
Gary said: > Uh, not quite. Check the Coverity stuff. How do I do that? I'd expect something to send me email but I don't remember anything about Coverity. -- These are my opinions. I hate spam. ___ devel mailing list devel@ntpsec.org https://l

Re: Release

2023-12-03 Thread Gary E. Miller via devel
Yo James! On Sat, 2 Dec 2023 21:12:04 -0800 (PST) James Browning via devel wrote: > 4. The buildbots are not reporting any unplanned regressions; there > are always issues to be addressed. Uh, not quite. Check the Coverity stuff. RGDS GARY -

Re: Release

2023-12-02 Thread James Browning via devel
> On 12/02/2023 8:09 PM PST Hal Murray via devel wrote: > > > I think you should release what we have as soon as it is convenient. > > There are many more things I would like to include but we aren't making much > progress so it's time to do it. Referring

Release

2023-12-02 Thread Hal Murray via devel
I think you should release what we have as soon as it is convenient. There are many more things I would like to include but we aren't making much progress so it's time to do it. -- These are my opinions. I hate spam. ___ devel ma

Re: Time for a release?

2023-11-05 Thread James Browning via devel
anywhere in the release process documentation. Yes, PIVOT.h probably should be updated. I had a scheme for when to update the pivot time; It does not matter what it was. ___ devel mailing list devel@ntpsec.org https://lists.ntpsec.org/mailman/listinfo/devel

Re: Time for a release?

2023-10-31 Thread James Browning via devel
> On 10/31/2023 2:28 AM PDT Hal Murray via devel wrote: > > > Here are the open issues the caught my eye: > > https://gitlab.com/NTPsec/ntpsec/-/issues/806 > > I think we should fix that. Or at least try. It sounds like a bug in > ntp_control. I just tried rv xxx for some xxx that was a reas

Re: Time for a release?

2023-10-31 Thread Hal Murray via devel
Is updating PIVOT.h on your checklist and/or should I update it now while I/we think of it? -- These are my opinions. I hate spam. ___ devel mailing list devel@ntpsec.org https://lists.ntpsec.org/mailman/listinfo/devel

Re: Time for a release?

2023-10-31 Thread Hal Murray via devel
> What sort of testing did you have in mind? Nothing in particular. We haven't had a release in a while so I hope everybody will run git head and keep an eye out for glitches, make sure their favorite toys work as expected, double check log files, etc... > Any specific doc cleanu

Re: Time for a release?

2023-10-30 Thread Matthew Selsky via devel
) Here are the open issues the caught my eye: https://gitlab.com/NTPsec/ntpsec/-/issues/806 https://gitlab.com/NTPsec/ntpsec/-/issues/802 (is this resolved with our latest FIPS changes, and do we have an environment to test it?) Do you think these or any others should delay the release

Re: Time for a release?

2023-10-30 Thread James Browning via devel
> On 10/29/2023 10:50 PM PDT Hal Murray via devel wrote: > > The last time this was suggested, I encouraged waiting until we fixed mssntp. > Well, I think we have it fixed but we haven't found anybody to test it. > > So I think it's time to get ready for a re

Time for a release?

2023-10-29 Thread Hal Murray via devel
The last time this was suggested, I encouraged waiting until we fixed mssntp. Well, I think we have it fixed but we haven't found anybody to test it. So I think it's time to get ready for a release. Time for lots of testing. And documentation checking/cleanup. Does anybod

Re: Release, project sleeping, and running down the clock.

2023-08-22 Thread James Browning via devel
> On 08/22/2023 3:29 AM PDT Hal Murray wrote: > > > James Browning said: > > If the project is sleeping, then you may as > >well cut the new release now. > > I think we should do a normal release. That includes scanning the issues and > merge request

Re: Release, project sleeping, and running down the clock.

2023-08-22 Thread Hal Murray via devel
James Browning said: > If the project is sleeping, then you may as >well cut the new release now. I think we should do a normal release. That includes scanning the issues and merge requests. And lots of testing. I'm working on making a couple of new stats files for NTP packet

Release, project sleeping, and running down the clock.

2023-08-21 Thread James Browning via devel
If the project is sleeping, then you may aswell cut the new release now. Otherwise I wouldappreciate it if people commented on my mergerequests 1331, 1333, and 1335. My other mergerequests 1335, 1330, and 1324 can wait a while.It is coming up on 8 months since 1.2.2 wasreleased

Re: Release coming, take 2

2022-12-23 Thread Matt Selsky via devel
Hi all, We had some recent commits to fix issues found by Google's OSS-Fuzz scanner so we've decided to do a release candidate today and then a full release next week after we've had some more time to kick the tires. The release candidate is available at https://ftp.ntpsec.o

Re: Release coming, take 2

2022-12-18 Thread James Browning via devel
> On 12/15/2022 1:21 PM PST Matthew Selsky via devel wrote: > > > Hi all, > > I plan to cut a release on Thu 12/22/2022. I'm sorry about the delays in > getting this release out the door. > > If there's anything that absolutely must be in this rel

Release coming, take 2

2022-12-15 Thread Matthew Selsky via devel
Hi all, I plan to cut a release on Thu 12/22/2022. I'm sorry about the delays in getting this release out the door. If there's anything that absolutely must be in this release and can't wait until the next release, please let me know. Otherwise, I plan to tidy up the NEWS fil

Fork this was Re: Fixing the dang CI pipelines, release

2022-12-01 Thread James Browning via devel
e offending feature in the two builders. I will add > another merge request to allow the failure of the on-push macOS runners. > > Also, the last merge into the tree was in mid-August; Enough time has passed > that a release can be made. > Given the general lack of commits to f

Fixing the dang CI pipelines, release

2022-11-27 Thread James Browning via devel
macOS runners. Also, the last merge into the tree was in mid-August; Enough time has passed that a release can be made.___ devel mailing list devel@ntpsec.org https://lists.ntpsec.org/mailman/listinfo/devel

Re: Release, wildcards, etc

2022-05-10 Thread James Browning via devel
On Apr 20, 2022 07:30, Matt Selsky via devel wrote:Hi Hal, I'd like to get https://gitlab.com/NTPsec/ntpsec/-/merge_requests/1264 merged and then do the release. Is there anything else that we want in the release?Yes, but in the interest of helping get it out on this calendar the rest

Re: Getting ready for a release, wildcards

2022-05-02 Thread Richard Laager via devel
I looked at 1268. I split it into a bunch of pieces and merged a bunch of it. That shrinks the diff, making it easier to follow. Further comments are on the MR. On 5/2/22 09:35, countkase--- via devel wrote: On Thursday, April 21, 2022, 09:20:06 AM PDT, Matt Selsky wrote: Hi James, I'm no

Re: Getting ready for a release, wildcards

2022-05-02 Thread countkase--- via devel
On Thursday, April 21, 2022, 09:20:06 AM PDT, Matt Selsky wrote: > Hi James, > > I'm not sure if you're being serious or not with the "nah" :) > > The potential mac truncation seems serious. I'm not sure about the other 2 > issues. > > Let me know what you think. 1254 temporarily resolved th

Re: Release, wildcards, etc

2022-04-29 Thread Hal Murray via devel
[Mail to devel has about a 10 hour delay.] Sorry for not providing more context on my first try. > "nts nowildcards" changes the default from wildcards allowed to not allowed. > server blah, blah "nowildcards" turns off wildcards for this slot > server blah, blah "wildcardsOK" allows wildcards fo

Re: Release, wildcards, etc

2022-04-28 Thread Hal Murray via devel
> Sorry, I'm not following what you mean here. Do you have a patch or merge > request that I can look at? I should be able to explain it. In the config file: "nts nowildcards" changes the default from wildcards allowed to not allowed. server blah, blah "nowildcards" turns off wildcards for t

Re: Release, wildcards, etc

2022-04-28 Thread Matthew Selsky via devel
On Fri, Apr 22, 2022 at 12:13:25AM -0700, Hal Murray via devel wrote: > nts nowildcards at the top level to set the default > nowildcards at the server level > wildcardsOK at the server level to override the default Hi Hal, Sorry, I'm not following what you mean here. Do you have a patch or merg

Re: Getting ready for a release, wildcards

2022-04-25 Thread Hal Murray via devel
Thanks again for your helpful comments. On the cert documentation ... What is our target audience? Admins who already know about certificates or newbies who are getting a certificate for the first time? (This was my first.) Is there a certificates-for-newbies document we can reference? If not

Re: Getting ready for a release, wildcards

2022-04-22 Thread Richard Laager via devel
On 4/22/22 02:08, Hal Murray wrote: +1 to NOT making this a knob. Would you please say more. It would be invisible unless you go looking for it. Are you against unnecessary knobs in general? Yes. If I had pushed this code a month or 3 ago when we weren't discussing a release or wild

Re: Release, wildcards, etc

2022-04-22 Thread Hal Murray via devel
Richard Laager said: > 8 cases? I thought it was one setting, which would be 2 cases. > Can you expand upon what you're actually proposing? Ideally as a merge > request, but at least explain the knobs here. nts nowildcards at the top level to set the default nowildcards at the server level wild

Re: Getting ready for a release, wildcards

2022-04-22 Thread Hal Murray via devel
> +1 to NOT making this a knob. Would you please say more. It would be invisible unless you go looking for it. Are you against unnecessary knobs in general? If I had pushed this code a month or 3 ago when we weren't discussing a release or wildcards, would you have spoken up agains

Re: Release, wildcards, etc

2022-04-21 Thread Richard Laager via devel
On 4/21/22 03:17, Hal Murray via devel wrote: There are 8 cases. I think I tested them all. If it will make you happy, I'll test again, being careful to check all 8 cases. 8 cases? I thought it was one setting, which would be 2 cases. Can you expand upon what you're actually proposing? Ideal

Re: Getting ready for a release, wildcards

2022-04-21 Thread countkase--- via devel
On Thursday, April 21, 2022, 09:20:06 AM PDT, Matt Selsky wrote: > Hi James, > > I'm not sure if you're being serious or not with the "nah" :) > > The potential mac truncation seems serious. I'm not sure about the other 2 > issues. > > Let me know what you think. Serious on all three and hey s

Re: Getting ready for a release, wildcards

2022-04-21 Thread Matt Selsky via devel
Hi James, I'm not sure if you're being serious or not with the "nah" :) The potential mac truncation seems serious. I'm not sure about the other 2 issues. Let me know what you think. Thanks, -Matt ___ devel mailing list devel@ntpsec.org https://lists

Re: Getting ready for a release, wildcards

2022-04-21 Thread Richard Laager via devel
ess someone asks for this to be a knob. Thanks, -Matt From: Hal Murray Sent: Wednesday, April 20, 2022 2:12 PM To: Matt Selsky Cc: devel@ntpsec.org ; Hal Murray Subject: Re: Getting ready for a release, wildcards [The mail system is in sloth mode again.] matthew

Re: Release, wildcards, etc

2022-04-21 Thread Hal Murray via devel
[Eric: There are a couple of preceding messages to devel in the mail someplace.] > I'd like to get https://gitlab.com/NTPsec/ntpsec/-/merge_requests/1264 merged > and then do the release. > Is there anything else that we want in the release? I'm sorry that we have gotten of

Re: Getting ready for a release, wildcards

2022-04-21 Thread Hal Murray via devel
Richard Laager said: > Sure, that's all true. But, I'm not sure why you felt the need to mention > this. That is how everything works. In general, it's not even guaranteed > that a TLS-speaking daemon knows its own (external) hostname. It obviously > can't know what is in the client's trust stor

Re: Getting ready for a release, wildcards

2022-04-21 Thread James Browning via devel
any other release blockers?  If not, I'll update the NEWS for the user-facing/high impact changes and cut a release candidate.Inconsistent output formatting for 'ntpq sysstats'? Bytes output of test data in 'waf check -v'? Potent

Re: Getting ready for a release, wildcards

2022-04-21 Thread Hal Murray via devel
> I would rather not add knobs unless someone asks for this to be a knob. Nobody outside is ever going to ask for this knob. It's a grubby detail. Only geeks know that the concept exists. I want this knob so I/we can experiment. -- These are my opinions. I hate spam. ___

Re: Getting ready for a release, wildcards

2022-04-21 Thread Richard Laager via devel
On 4/19/22 17:01, Hal Murray via devel wrote: One is to update the nts cert documentation to say that it doesn't do any checking on the certificate. - Present the certificate in _file_ as our certificate. + Present the certificate (chain) in _file_ as our certificate. + + + Note that there

Re: Getting ready for a release, wildcards

2022-04-21 Thread Matt Selsky via devel
From: Hal Murray Sent: Wednesday, April 20, 2022 2:12 PM To: Matt Selsky Cc: devel@ntpsec.org ; Hal Murray Subject: Re: Getting ready for a release, wildcards [The mail system is in sloth mode again.] matthew.sel...@twosigma.com said: > I don't think we should have a knob for dis

Re: Getting ready for a release, wildcards

2022-04-20 Thread Hal Murray via devel
[The mail system is in sloth mode again.] matthew.sel...@twosigma.com said: > I don't think we should have a knob for disabling wildcards. This is not the > sort of knob that operators expect (what other software provides such a > knob?) and we're just adding another code path to test. I'll be in

Re: Getting ready for a release, wildcards

2022-04-20 Thread Matt Selsky via devel
Hi Hal, I don't think we should have a knob for disabling wildcards. This is not the sort of knob that operators expect (what other software provides such a knob?) and we're just adding another code path to test. Are there any other release blockers? If not, I'll update the NEW

Re: Release, wildcards, etc

2022-04-20 Thread Matt Selsky via devel
Hi Hal, I'd like to get https://gitlab.com/NTPsec/ntpsec/-/merge_requests/1264 merged and then do the release. Is there anything else that we want in the release? Thanks, -Matt ___ devel mailing list devel@ntpsec.org https://lists.ntpsec.org/ma

Getting ready for a release, wildcards

2022-04-20 Thread Hal Murray via devel
I just pushed 2 tweaks. One is to update the nts cert documentation to say that it doesn't do any checking on the certificate. The other is a hack patch to aes_siv.c to supress deprecated warnings from OpenSSL 3. Is anybody (else) using OpenSSL 3? It's trivial on FreeBSD. Just install open

Release, wildcards, etc

2022-04-20 Thread Hal Murray via devel
> Sigh. I should get up to speed onmn crypto and certificates. I doubt I can > do it fast enough to be useful on this one, though. Service Names in TLS https://datatracker.ietf.org/doc/draft-ietf-uta-rfc6125bis/ It's 24 pages with the usual amount of boiler plate so only half of that is ser

New release & OpenSSL 3

2022-04-12 Thread Gary E. Miller via devel
Yo All! openssl 3.0.0 is becoming an issue. See: https://gitlab.com/NTPsec/ntpsec/-/issues/734 We have been stolling towards a release, what do we need to get one out with openssl 3.0? RGDS GARY --- Gary E. Miller Rellim

Re: Time for a release??

2022-02-15 Thread James Browning via devel
On Feb 15, 2022 1:05 PM, Hal Murray via devel wrote:> How about a release at the end of February to give people time to wrap things up? The group that started this would like it by the 24th.No, but there's always the next one. I do have lists though. I am not in a position to push

Re: Time for a release??

2022-02-15 Thread Hal Murray via devel
> How about a release at the end of February to give people time to wrap things > up? The group that started this would like it by the 24th. A RC (Release Candidate) would be a placeholder. Have we ever done one? -- These are my opinions. I hat

Re: Time for a release??

2022-02-14 Thread James Browning via devel
On Feb 13, 2022 10:42 PM, Hal Murray via devel wrote:> How about a release at the end of February to give people time to wrap things up? Sounds good to me. Who has what that needs wraping up?I have some stuff I think needs to be in:- simplified release machinery !1253 #603- mode 6 cli

Re: Time for a release??

2022-02-13 Thread Hal Murray via devel
> How about a release at the end of February to give people time to wrap things > up? Sounds good to me. Who has what that needs wraping up? Richard is working on the Trimble driver. I need to take another look at the NMEA driver. - >> It's been almost a ye

RE: Time for a release??

2022-02-13 Thread Matt Selsky via devel
Hi Hal, How about a release at the end of February to give people time to wrap things up? Thanks, -Matt From: devel mailto:devel-boun...@ntpsec.org>> on behalf of: Hal Murray via devel mailto:devel@ntpsec.org>> Date: Monday, Feb 14, 2022, 01:24 To: Mark Atwood mailto:mark.atw..

Time for a release??

2022-02-13 Thread Hal Murray via devel
It's been almost a year since 1.2.1 Debian is testing with OpenSSL 3.0 That's not supported in 1.2.1 but has been in git head for a while -- These are my opinions. I hate spam. ___ devel mailing list devel@ntpsec.org https://lists.ntpsec.org/ma

Release needs to update PIVOT.h

2022-02-05 Thread Hal Murray via devel
Where is your checklist for a release? I've added PIVOT.h at the top level. It's only content is a #define for RELEASE_DATE. That's the magic constant that's needed for sanity checking and pivoting on date conversions because using the build date would break repeatable b

release probably today

2021-06-01 Thread James Browning via devel
My vote is to release, and I suspect other developers will mostly pass. It would probably be nice if some developers could wander back. huh, I have more commits recently than everyone else combined. 56 James Browning 15 Richard Laager 12 Matt Selsky 8 Hal Murray 3 Mark

Re: Release gymnastics

2020-09-18 Thread Daniel Franke via devel
The normative content of the RFC is not going to change. There's no reason to hold back any release while waiting for publication. On Fri, Sep 18, 2020 at 11:43 AM Hal Murray via devel wrote: > > > Maybe we should get 1.2 out now/soon so it will be ready when the RFC comes >

Release gymnastics

2020-09-18 Thread Hal Murray via devel
Maybe we should get 1.2 out now/soon so it will be ready when the RFC comes out rather than shortly after. -- These are my opinions. I hate spam. ___ devel mailing list devel@ntpsec.org http://lists.ntpsec.org/mailman/listinfo/devel

Re: NEWS for release

2020-09-04 Thread Eric S. Raymond via devel
Hal Murray : > > > Looking at the changelog, the only one that jumps out at me is James's new > > UI > > options for ntpq. > > Should we have a policy of mentioning all UI changes? I think so. I've been trying to do that whenever I write NEWS entries. > How about config file changes? Well,

Re: NEWS for release

2020-09-04 Thread Hal Murray via devel
> Looking at the changelog, the only one that jumps out at me is James's new UI > options for ntpq. Should we have a policy of mentioning all UI changes? I don't want a lot of clutter, a quick mention should be enough to get people to check the documentation. How about config file changes?

Re: NEWS for release

2020-09-04 Thread James Browning via devel
On Fri, Sep 4, 2020 at 1:31 PM Hal Murray via devel wrote: > > > Are any of the recent changes interesting enough to mention in NEWS? Probably not so I'm just gonna empty the bucket. j/k * duplicate server error message * documentation updates/fixes * shebang updates * ntpkeygen can use secrets *

Re: NEWS for release

2020-09-04 Thread Eric S. Raymond via devel
wouldn't want to try doing anything deeper this close to a release. None of it's user-visible. After we ship I''ll get off my butt about the recvbuff cleanup. -- http://www.catb.org/~esr/";>Eric S. Raymond ___

NEWS for release

2020-09-04 Thread Hal Murray via devel
Are any of the recent changes interesting enough to mention in NEWS? -- These are my opinions. I hate spam. ___ devel mailing list devel@ntpsec.org http://lists.ntpsec.org/mailman/listinfo/devel

Re: Pre-release cleanup

2020-09-03 Thread Eric S. Raymond via devel
Matthew Selsky : > I also previously setup Codacy in order to see what other SAST systems could > do. See https://app.codacy.com/gl/NTPsec/ntpsec/dashboard > > Let me know what you think. If either are useful, I'll integrate them more > tightly in our workflows. I'm already a fan of LGTM - it

  1   2   3   4   >