Hi,

in private Steve and I discussed some release issues, and we both
agreed that (a) our output is public and (b) it should happen in
public, so here it is dragged into the public.

Steve wrote:
> Broad categories of release-critical bugs that exist today:
> 
> - packages that FTBFS
> - security bugs
> - data loss bugs
> - packages that violate the DFSG as understood by the project today
> - bugs related to removal of obsolete libs
> - trivially broken maintainer scripts
> - packages that are badly put together to the point that the whole package,
>   or a major component of it, is unusable

Steve Langasek wrote:
> On Wed, Aug 30, 2006 at 07:44:27AM +0200, Martin Schulze wrote:
> > These bugs are at least to be investigated and maybe resolved in a
> > rather pragmatic way:
> 
> > > - packages that FTBFS
> 
> >   . on which architecture?
> 
> As long as it's a release architecture, does this matter?  Doesn't the
> security team still typically wait for a security update to be built on all
> archs before releasing it?

I'm not sure if it makes sense to reply to each of your paragraph,
since you're the one to decide anyway, not me.

However, I believe that such questions need to be raised and
investigated in time, and maybe some packages need to be dropped from
the release or from particular architectures.

With regards to security support, all packages that the security team
needs to support must to be compileable by the buildds for all
architectures they were released for.

When there is no cups for amd64 in the release, it does not matter
whether it FTBFS on amd64 or not, for example.

If a package FTBFS on one architecture, it (or rather an oder version)
must not be released with this architecture, though.  Being unable to
fix security bugs in such packages is one reason, potential license
violation by not shipping the proper source package would be another
reason not to do so.

While I would love to have the exact set of packages on all
architectures, I need to accept the fact that on some architectures
some packages just don't work or cause an FTBFS we are unable to fix
in time for the release.

> >   . how widely is it used?
> 
> Again, does this matter for questions of RCness?  (If you mean "is it ok to
> remove the package instead of fixing it", this is already a judgement call
> the release team makes.)

I believe that it does matter.  You're explanation in brackets imply
that you're already working as I suggested.

Fixing the problems should have a higher priority than removing a
package.  However, when either nobody cares about a fix or it is not
possible to fix the problem in time, a removal may be warranted.

> >   . how likely will we have to recompile it?
> 
> Do you have a formula for easily determining the probability of a security
> hole being discovered in any arbitrary package over a given period of time?
> If so, please share it!  Follow-up question, what is the threshold below
> which it's sufficiently unlikely for a security hole to be found that the
> security team volunteers to accept responsibility for the FTBFS bug as well
> in the event a security bug *is* found?

No, I don't have.  I could add a question about the possibility to run
remotely provided data by this package?  Whether the program runs
under the user id of the normal user or is privileged in any way.
It's very difficult to measure, I admit.

> > > - data loss bugs
> 
> >   . data loss always or only in some esoteric situations?
> 
> Do you think it should be ok for packages to lose users' data only /some/ of
> the time?  I don't, FWIW...

Well, we've already had packages that can potentially use data when
you use three quite uncommen switches, two undocumented commandline
switches, one broken config line and the system has three processors
with a permanent load of 53.

This is a bit exagerated, but I hope you'll get an idea of what I was
trying to express.  When the data los *can* happen in only certain
quite uncommon circumstances and the rest of the system and of the
package works fine, I'm not too sure we should delay the release to
get this problem fixed before.  Especially since the problem exists
for n months already without the hell being frozen.

Such problems usually warrant an inclusion in a point release, so can
be fixed after the release as well.

> >   . could we accept that this package has a bug and keep it buggy in etch?
> 
> What's the point of including it in a stable release if we know it'll eat
> user data?  Honestly, shouldn't we have more pride in our stable releases
> than that?

Please read above.  If it only happens or can happen in some very rare
situations, what's the point of delaying the release?  This could
still be fixed in a point release.

It's better not to release etch with such bugs, however, are they all
really worth being able to delay a release?

> > > - bugs related to removal of obsolete libs
> 
> >   . how widely is it used?
> >   . can the package be removed without hurting the overall system?
> >   . can the package be removed on the particular architecture?
> 
> Would you care to look at bug #370429 and render your own opinion on the
> impact of trying to remove it in advance of transitioning its
> reverse-depends?

Well, as a second step (after declaring it obsolet) it should be tried
to fix the dependencies and upload packages that don't depend on this
but the new version.

In this case this seems to be

  libsoup2.0-0               libsoup2.0-dev libsoup2.2-dev
  zapping
  ofx
  lynx
  libxmlsec1-gnutls          libxmlsec1-dev
  libggzcore7
  libggz2                    libggz-dev
  ggz-kde-games
  ggz-kde-client

                             libgnutls-dev
                             libgnutls-dev

Bug reports need to be written and maintainers be contacted.  I
remember that Smurf announced that he'd like to remove that library,
not sure about the other steps, though.

To mitigate the problem, at least ofx, lynx, ggz-kde-games and
probably ggz-kde-client could be temporarily removed from etch and
migrate back when the dependencies don't require TLS 11 anymore.  The
libraries would have to be investigated further.  (I'll do it if it
helps you.)

> > > - trivially broken maintainer scripts
> 
> >   since this is easy to solve, can the package be removed from etch
> >   and migrate back into it when it's fixed without hurting the system?
> 
> Generally.  But the question wasn't about how to resolve bugs of each of
> these classes, the question was whether it was a good idea to stop
> considering these bugs release-critical for the package.  Of course many of
> these packages can be removed from testing; that still takes release team
> time to accomplish.

Sure.  Sorry for misunderstanding you.

> > > and obsolete libs are priorities for the security team, and relaxing our
> > > stance on these issues would be bad for the overall security 
> > > supportability
> > > of etch?  Do you think that any of the others should be ok to ship in a
> > > release?
> 
> > We may reach a date at which the release manages may have to sit down
> > and think about what to do with the remaining list of RC bugs.  One
> > way would be to reclassify and document them in the release notes and
> > to remove several packages from etch in order to get it in a
> > releasable state.
> 
> Removing RC-buggy packages from testing is an ongoing task.  I'm afraid that
> the nearly-constant bug count in testing factors this work in.

Ok.  (merely quoted to get it copied in public).

> Documenting bugs of this severity is IMHO a poor substitute for resolving
> them, either by actually fixing the bug or by removing the package.  That
> might be the decision for new RC bugs that show up in the last stages of the
> freeze, but I don't really think that helps us get to the point that we're
> /ready/ to freeze.

It's always better if these problems would be corrected.  However,
when this is not possible in time for whatever reason, it may be worth
to consider another means of dealing with them.

Speaking of being ready for a freeze, I would consider this date
generally reached already.  Most of the packages are in a considerably
fine state.  There are still problems, though, but there will always
be problems anyway.  When the installer is working fine on all release
architectures and the kernel and udebs have been migrated into testing
as well, we already have a *pretty* *good* system.

> > > As for ignoring RC bugs for etch, I don't expect that to be true for many
> > > bugs.  A larger number of bugs on the RC bug list simply don't meet the
> > > criteria for RC bugs and should be downgraded -- that's not anything that
> > > requires the release team's imprimatur to fix up, either, but I still find
> > > myself fixing up quite a few bug states every day, too.
> 
> > Hmm, maybe it's not clear to the average developer that they are
> > permitted to upgrade/downgrade arbitrary bugs as well, especially if
> > they're not assigned to a package they maintain.
> 
> I think the BTS documentation does say you shouldn't fiddle with bugs
> (closing them, etc) on packages you don't maintain.  But then, it doesn't
> exempt the release team either. ;)

Evil release guys. :P

Regards,

        Joey

-- 
Have you ever noticed that "General Public Licence" contains the word "Pub"?


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to