• Bits from the Stable Release Managers

    From Adam D. Barratt@21:1/5 to All on Sun Aug 4 22:40:01 2019
    Hi,

    Introduction
    ============

    The Stable Release Managers, with the support of the rest of the
    Release Team, are responsible for updates to the stable release (and
    oldstable while that suite is also being supported by the Security
    Team), via point releases and the stable-updates mechanism [STABLE-
    PDATES].

    You can see the current status of proposed updates to stable via our
    BTS pseudo-package [BTS] and our tracking website. [QUEUE-VIEWER]

    First 'buster' point release
    ============================

    The first point release for Debian 10 has been scheduled for 7th
    September 2019. That is slightly later after buster's initial release
    than we would normally aim for, but an earlier date has proved
    difficult with DebConf and holidays.

    A point release for 'stretch', Debian 9.10, will also take place on the
    same day.

    Following the release of 10.1, we will continue to aim for stable point releases on an approximately two-month basis, and oldstable every three
    to four months.

    As always, the first update to a new release is very busy, so we ask
    for your patience if you are still awaiting a reply to an upload
    request. It may be that an update to your package is deferred to a
    later point release purely from a workload perspective; more serious or
    more urgent fixes will be prioritised.

    Workflow
    ========

    Uploads to a supported stable release should target their suite name in
    the changelog, i.e. 'buster' or 'stretch'. You should normally use
    reportbug and the release.debian.org pseudo-package to send a *source*
    debdiff, rationale and associated bug numbers to the Stable Release
    Managers, and await a request to upload or further information.

    If you are confident that the upload will be accepted without changes,
    please feel free to upload at the same time as filing the
    release.debian.org bug. However if you are new to the process, we would recommend getting approval before uploading so you get a chance to see
    if your expectations align with ours.

    Either way, there must be an accompanying bug for tracking, and your
    upload must comply with the acceptance criteria below.

    Update criteria
    ===============

    Here's a reminder of our usual criteria for accepting fixes. These are
    designed to help the process be as smooth and frustration-free as
    possible for both you and us.

       * The bug you want to fix in stable must be fixed in unstable      already (and not waiting in NEW or the delayed queue)
       * The bug should be of severity "important" or higher
       * Bug meta-data - particularly affected versions - must be
         up to date
       * Fixes must be minimal and relevant and include a sufficiently      detailed changelog entry
       * A source debdiff of the proposed change must be included
         in your request (not just the raw patches or "a debdiff
         can be found at $URL")
       * The proposed package must have a correct version number
         (e.g. ...+deb10u1 for buster or +deb9u1 for stretch) and you      should be able to explain what testing it has had
       * The update must be built in an (old)stable environment or chroot    * Fixes for security issues should be co-ordinated with the      Security Team, unless they have explicitly stated that they      will not issue an DSA for the bug (e.g. via a "no-dsa" marker      in the Security Tracker) [SECURITY-TRACKER]

    Please don't post a message on the debian-release mailing list and
    expect it not to get lost - there must be a bug report against release.debian.org.

    We make extensive use of usertags to sort and manage requests, so
    unless you particularly enjoy crafting bug meta-data, reportbug is
    generally the best way of generating your request. Incorrectly tagged
    reports may take longer to be noticed and processed.

    Thanks,

    Adam,
    for the SRMs

    [BTS] https://bugs.debian.org/release.debian.org
    [QUEUE-VIEWER] https://release.debian.org/proposed-updates/stable.html [SECURITY-TRACKER] https://security-tracker.debian.org/
    [STABLE-UPDATES] https://lists.debian.org/debian-devel-announce/2011/03 /msg00010.html
    -----BEGIN PGP SIGNATURE-----

    iQJNBAABCAA3FiEEcgNjDiyOcnJRaE/rxc5dwsVCzVkFAl1HQXEZHGFkYW1AYWRh bS1iYXJyYXR0Lm9yZy51awAKCRDFzl3CxULNWVW0EACKMrZ6KFvpxAwP6IhP4xQq ENqJZZQ+IeIpQpZR7oSocwyYXddKcCJOdbff5bmUTfM0IUvLRAFEV7ubFptWjbCe YYQXaLm21j9bM4bqFt0bfAo5hqaEtekU61mxbOodVcM1Ltysm3SW0c475auMiYlQ fS2R5KPEW6QrWrSkj3ltq5OY7npTD28n7BegcLgFy0TPr4CN4+2yDI8MLXmOaaH6 OxvW4jTJh4fLLavQ5tH/NaQMJV9ekVtZUiTrwZounzOETE8DhHMWi1DDnIpS9R7V a1QO/G5AJ+sVn98r3uNzhEXTjgsgASa/ig/XO67R2N5M5igJREoLyPEip7xU9NIH a27DQSXMCsATklTWPgWFczDzC0ANlrIZ/lX5NqdoeN/AyFoSSfCVz0OloU2VQ8kG owY5cWHRWzhf1lN0oxJcb7d8zShl5LpgmVriCNMPDJWqFGjDNA/hX9xeCUjgMnUM pOqCnHAaDI9rLmMj2KVMqqrxzX2bqfkqBg3CV87pAjL9/ELG0xY+6yV3q1FnEJQu S8mo3Xm4CIy80BqXt+Cr9MSGYFLOL1MXMf5FpjG/U0Zbbky5IovFHaHn9KPmfkM+ 0VxhQ/M4ULpyZflyuOO3687pFrD8IsA22PUJ5VOia9jw/TyICyR3S3FwvnjbPETe f2yDP33SqFXO+tLM611Bsg==
    =iod0
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)