You could split the review in 2 emails

1. Vote as ASF on the release of the source tgz artifact and release
2. Ask for a review on the publishing of a binary artifact based on the source 
tgz from email vote #1 (this is not a ASF Vote, just a request for review a 
binary) this email of course would be after email #1 is vote closed    .

- Carlos Santana
IBM STSM
@csantanapr

> On Nov 20, 2018, at 11:03 PM, Julian Hyde <jh...@apache.org> wrote:
> 
> +1 to what Bertrand wrote. Solves the problem very neatly. Thank you, 
> Bertrand.
> 
> It goes a long way towards answering my original question, because “What 
> should voters check for when reviewing binary artifacts?” is now a matter for 
> each PMC, not a matter for the Foundation.
> 
> +1 to Roman’s suggestion to make it part of policy.
> 
> If we follow Bertrand’s semantics then the semantics of a vote are a little 
> more complex than before. The voter is voting on the release (consisting only 
> of source artifacts), an act of the Foundation, and the binary artifacts, an 
> act of the PMC. It would be extremely helpful if there were a template for 
> the text of the vote email that release managers you use, if they so chose. 
> Roman, could you include such a template the the revised release policy?
> 
> Julian
> 
> 
>> On Nov 20, 2018, at 7:05 PM, Roman Shaposhnik <ro...@shaposhnik.org> wrote:
>> 
>> On Fri, Nov 16, 2018 at 6:59 AM Jim Jagielski <j...@jagunet.com 
>> <mailto:j...@jagunet.com>> wrote:
>>> 
>>> 
>>> 
>>>> On Nov 15, 2018, at 2:41 AM, Bertrand Delacretaz 
>>>> <bdelacre...@codeconsult.ch> wrote:
>>>> 
>>>> 
>>>> I see this as a two-level thing:
>>>> 
>>>> a) The source release is an Act of the Foundation, it is what the
>>>> foundation produces
>>>> 
>>>> b) For the binaries, the PMC states that it thinks they are good and
>>>> declares that the published digests and signatures are the correct
>>>> ones. The Foundation does not state anything about them - use at your
>>>> own risk but in practice that risk is very low if the PMC members
>>>> collectively recommend using them.
>>>> 
>>>> That's not very different from what other open source projects do - we
>>>> need a) for our legal shield but b) is exactly like random open source
>>>> projects operate.
>>>> 
>>>> You have to trust an open source project when you use their binaries,
>>>> and you can use digests and signatures to verify that those binaries
>>>> are the same that everyone else uses - I don't think anyone provides
>>>> more guarantees than that, except when you pay for someone to state
>>>> that those binaries are good.
>>>> 
>>>> If people agree with this view we might need to explain this better,
>>>> "unofficial" does not mean much, this two-level view might be more
>>>> useful.
>>> 
>>> Agree 100%. Thx for very clearly and accurately describing all this.
>> 
>> +1 to this as well.
>> 
>> In fact, I love it so much that I'd like to have it published as part of our
>> official guide:
>>  http://www.apache.org/legal/release-policy.html#compiled-packages 
>> <http://www.apache.org/legal/release-policy.html#compiled-packages>
>> 
>> Any objections?
>> 
>> Thanks,
>> Roman.
>> 
>> ---------------------------------------------------------------------
>> To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org 
>> <mailto:general-unsubscr...@incubator.apache.org>
>> For additional commands, e-mail: general-h...@incubator.apache.org 
>> <mailto:general-h...@incubator.apache.org>

---------------------------------------------------------------------
To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
For additional commands, e-mail: general-h...@incubator.apache.org

Reply via email to