From patchwork Wed May 31 13:58:34 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Mark Michelson X-Patchwork-Id: 1788375 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=openvswitch.org (client-ip=2605:bc80:3010::136; helo=smtp3.osuosl.org; envelope-from=ovs-dev-bounces@openvswitch.org; receiver=) Authentication-Results: legolas.ozlabs.org; dkim=fail reason="signature verification failed" (1024-bit key; unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=ETWyB5BH; dkim-atps=neutral Received: from smtp3.osuosl.org (smtp3.osuosl.org [IPv6:2605:bc80:3010::136]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4QWW8M283Cz20QB for ; Wed, 31 May 2023 23:58:59 +1000 (AEST) Received: from localhost (localhost [127.0.0.1]) by smtp3.osuosl.org (Postfix) with ESMTP id 55669613DC; Wed, 31 May 2023 13:58:57 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 smtp3.osuosl.org 55669613DC Authentication-Results: smtp3.osuosl.org; dkim=fail reason="signature verification failed" (1024-bit key) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=ETWyB5BH X-Virus-Scanned: amavisd-new at osuosl.org Received: from smtp3.osuosl.org ([127.0.0.1]) by localhost (smtp3.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zTO9e47xWVJA; Wed, 31 May 2023 13:58:56 +0000 (UTC) Received: from lists.linuxfoundation.org (lf-lists.osuosl.org [140.211.9.56]) by smtp3.osuosl.org (Postfix) with ESMTPS id BC93F613B6; Wed, 31 May 2023 13:58:54 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 smtp3.osuosl.org BC93F613B6 Received: from lf-lists.osuosl.org (localhost [127.0.0.1]) by lists.linuxfoundation.org (Postfix) with ESMTP id E0062C0092; Wed, 31 May 2023 13:58:52 +0000 (UTC) X-Original-To: dev@openvswitch.org Delivered-To: ovs-dev@lists.linuxfoundation.org Received: from smtp1.osuosl.org (smtp1.osuosl.org [IPv6:2605:bc80:3010::138]) by lists.linuxfoundation.org (Postfix) with ESMTP id CF6FFC0090 for ; Wed, 31 May 2023 13:58:48 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp1.osuosl.org (Postfix) with ESMTP id ABC8181430 for ; Wed, 31 May 2023 13:58:46 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 smtp1.osuosl.org ABC8181430 Authentication-Results: smtp1.osuosl.org; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=ETWyB5BH X-Virus-Scanned: amavisd-new at osuosl.org Received: from smtp1.osuosl.org ([127.0.0.1]) by localhost (smtp1.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZP-OUWI4uEcn for ; Wed, 31 May 2023 13:58:45 +0000 (UTC) X-Greylist: domain auto-whitelisted by SQLgrey-1.8.0 DKIM-Filter: OpenDKIM Filter v2.11.0 smtp1.osuosl.org 88EBE8143A Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by smtp1.osuosl.org (Postfix) with ESMTPS id 88EBE8143A for ; Wed, 31 May 2023 13:58:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1685541524; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=VzGv7Z7VevbHj0EDzbhyrdPqeq/yWdfhQU0KjTxlyeQ=; b=ETWyB5BHoktV88Nw2ZjyRVitaW8eTjtF3SlCJLwmnzYXvsvoQELPTctFFJXkU5/zHP2sE4 aaehHnXGnLw/YYeNZqaLaqRePzGpqd95ZQy8m8fSs3PvCl/lfFfJ59oy5nmTCTk5Ov/W+c 0t6nM/Od1SqFI5JXX75B4IG3kwcEoNU= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-224-Q60g8VkbNEKQvnK6aPXSEA-1; Wed, 31 May 2023 09:58:43 -0400 X-MC-Unique: Q60g8VkbNEKQvnK6aPXSEA-1 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.rdu2.redhat.com [10.11.54.2]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 2F261185A793 for ; Wed, 31 May 2023 13:58:43 +0000 (UTC) Received: from localhost.localdomain.com (unknown [10.22.48.14]) by smtp.corp.redhat.com (Postfix) with ESMTP id D494340C6EC4 for ; Wed, 31 May 2023 13:58:42 +0000 (UTC) From: Mark Michelson To: dev@openvswitch.org Date: Wed, 31 May 2023 09:58:34 -0400 Message-Id: <20230531135839.2517727-5-mmichels@redhat.com> In-Reply-To: <20230531135839.2517727-1-mmichels@redhat.com> References: <20230531135839.2517727-1-mmichels@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 3.1 on 10.11.54.2 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Subject: [ovs-dev] [PATCH ovn v2 4/9] release-process: State release policy for LTS versions. X-BeenThere: ovs-dev@openvswitch.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: ovs-dev-bounces@openvswitch.org Sender: "dev" The definition of "regular releases" is being kept purposely vague in this commit because a later commit will define what the interval is for these releases. Signed-off-by: Mark Michelson --- Documentation/internals/release-process.rst | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/Documentation/internals/release-process.rst b/Documentation/internals/release-process.rst index fca93d5a8..7a3b02497 100644 --- a/Documentation/internals/release-process.rst +++ b/Documentation/internals/release-process.rst @@ -84,12 +84,13 @@ The OVN project will periodically designate a version as "long-term support" or LTS for short. An LTS version has the distinction of being maintained for longer than a standard version. -LTS versions will receive bug fixes until the point that another LTS is -released. At that point, the old LTS will receive an additional year of +LTS versions will have releases made regularly until the point that another +LTS is released. At that point, the old LTS will receive an additional year of critical and security fixes. Critical fixes are those that are required to ensure basic operation (e.g. memory leak fixes, crash fixes). Security fixes are those that address concerns about exploitable flaws in OVN and that have a -corresponding CVE report. +corresponding CVE report. Whenever such a fix is applied, a new release will +be made for the LTS version. LTS versions are scheduled to be created once every two years. This means that any given LTS will receive bug fix support for two years, followed by