On Tue, Mar 05, 2013 at 11:11:51AM -0800, Alex Huang wrote:
> So in this definition, MAJOR and above must be fixed before a release is cut?

Personally, I've used the "no blockers and <5 critical with work
arounds" as the criteria, using the definitions I offered.

> 
> --Alex
> 
> > -----Original Message-----
> > From: Chip Childers [mailto:chip.child...@sungard.com]
> > Sent: Tuesday, March 5, 2013 11:03 AM
> > To: cloudstack-dev@incubator.apache.org
> > Subject: Re: [QA][DISCUSS] Should we document formal release criteria?
> > 
> > On Tue, Mar 05, 2013 at 01:39:50PM -0500, David Nalley wrote:
> > > On Tue, Mar 5, 2013 at 1:32 PM, Chip Childers <chip.child...@sungard.com>
> > wrote:
> > > > Hi all,
> > > >
> > > > Some IRC discussion triggered this thought:
> > > >
> > > > Should we document our formal release criteria?  By that, I mean -
> > > > should we document the criteria that we use to claim that we are in
> > > > a position to cut an actual Release Candidate for voting?
> > > >
> > >
> > > YES!!!
> > >
> > >
> > > > I realized that I've had my own view sitting in my head, but
> > > > obviously that means that nobody else knows it!
> > > >
> > > > Thoughts about what our criteria should be?
> > > >
> > > > Here's what's in my head:
> > > >
> > > > No Blocker Bugs outstanding
> > > > No Critical Bugs outstanding (unless there is a work-around, and
> > > > only <
> > > > 5 like that)
> > >
> > > So define for me what is a blocker and critical.
> > > I have my own internal definition, but if we have a standard that says
> > > 'no blocker and critical bugs' then we are just doing blind queries
> > > against Jira and maybe even changing the value on a bug so we can be
> > > releasable.
> > 
> > 
> > Here's how I've defined them in other environments.  This may not work for
> > us, but it's a starting point:
> > 
> > Blocker - Bugs which result in data corruption or inaccuracies in the data
> > produced or manipulated by the product under test. Discrepancies
> > compromising the functionality of the product under test. No workaround is
> > available. Any security vulnerability.
> > 
> > Critical - Commonly used elements of the product under test cause errors
> > which result in the product under test to stop functioning as designed.
> > Users are very likely to encounter the error. A workaround may be available.
> > 
> > And just to be complete:
> > 
> > Major - Errors that does not affect critical functions. Internal errors 
> > that will
> > not be seen by the user. A work around may be available.
> > 
> > Minor - Cosmetic errors (including grammar and spelling).
> > 
> > Trivial - Silly things that really don't matter all that much
> 
> 

Reply via email to