| |
@@ -24,18 +24,18 @@
|
| |
(if applicable). Also reference a bug in
|
| |
xref:index.adoc#communicating_with_epel[Bugzilla] against the
|
| |
package.
|
| |
- . Discussion takes place on epel-devel for a minimum period of 1 week
|
| |
- (need some way to short-circuit this for critical security updates -
|
| |
- i.e. remote root).
|
| |
+ . In the case of a critical CVE the maintainer *MAY* build the package
|
| |
+ and submit it to bodhi for testing. 'Auto-request stable?' *MUST NOT* be checked.
|
| |
+ . Discussion takes place on epel-devel for a minimum period of 1 week.
|
| |
. Item is added to agenda for discussion at weekly EPEL meeting.
|
| |
. If a majority of those present at the EPEL meeting concur, the
|
| |
- incompatible upgrade can be built.
|
| |
+ incompatible upgrade can be built, if it has not been already.
|
| |
. At the same time that the update is submitted to bodhi for testing,
|
| |
the maintainer is responsible for sending e-mail to epel-announce
|
| |
announcing the incompatible upgrade and specific actions that users must
|
| |
take in order to continue using the software.
|
| |
. Package MUST remain in testing for at least 1 week, regardless of
|
| |
- received karma. In bodhi, 'Auto-request stable?' MUST NOT be checked.
|
| |
+ received karma. In bodhi, 'Auto-request stable?' *MUST NOT* be checked.
|
| |
. When pushing the package to stable, the maintainer *MUST* send another
|
| |
e-mail to epel-announce.
|
| |
|
| |
@@ -49,7 +49,6 @@
|
| |
[[discussion_points]]
|
| |
== Discussion points
|
| |
|
| |
- . How to short-circuit process for critical security updates
|
| |
. Approval process - majority of those present seems to be lax, but
|
| |
being there's no body such as FESCo in "charge" of EPEL (yes, I realize
|
| |
that FESCo has oversight, but oversight != make day-to-day decisions
|
| |
In the case of critical and/or high severity CVE's, we may want the incompatible upgrades in testing sooner than a week.