Maybe people could opt-in to … is this where we would say “telemetry”? We could collect information about how much the rules actually get used, as well as things like redirect loops, to try to determine if a rule has been tested enough with no problems being found.
What we desperately need as well is an easy way to find any issues already reported with a ruleset. For example, I when I was working on boohoo.com, I found many rulesets in the development branch (but not yet in stable) that were relevant, carefully checked the rules in them, and found many issues [1]. But since I am not familiar with any of those domains, I might have missed something. Or I might have reported issues that were already known. I have no idea. [1] https://lists.eff.org/pipermail/https-everywhere-rules/2014-January/001792.html -- Brian Drake All content created by me: Copyright<http://www.wipo.int/treaties/en/ip/berne/trtdocs_wo001.html>© 2014 Brian Drake. All rights reserved. On Tue, Jan 14, 2014 at 0435 (UTC), Yan Zhu <[email protected]> wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA512 > > > > On 01/13/2014 06:29 PM, Drake, Brian wrote: > > What is the process for moving a ruleset from the development > > branch to the stable branch? > > Thank you thank you thank you for asking that question. I opened a > ticket for this exact problem a few weeks ago: > https://trac.torproject.org/projects/tor/ticket/10310 > > Right now, the answer is "when yan or peter thinks it's important and > probably been tested enough." I'll also merge something from dev to > stable if someone pokes me about it specifically (ex: in the case of > the stackexchange rule, since that was a blocker for Tor launching > their own stackexchange site). > > Anyway, whoever works on that ticket linked above gets my undying love. > > - -Yan > > > - -- > Yan Zhu [email protected] > Technologist Tel +1 415 436 9333 x134 > Electronic Frontier Foundation Fax +1 415 436 9993 > -----BEGIN PGP SIGNATURE----- > > iQEcBAEBCgAGBQJS1L6jAAoJENC7YDZD/dnsyNYIAIuPtWs1eIAwhVsnmzlR6763 > R49lZNrHxKcudoq0fzhdknL1oCgYmMXQxLkNZ3hq/SS6HFdiCkY4h0veB5e02FFI > 1MzyzJ8PNffrSKBAWAP2LYRXMdHfbFbufQg2jRjOiRKKPUJ71wpNOa5GZAVrgJ7/ > +fL6I0hs3pJz+3kLbw9aemV17oNtFEExpFHYwGWhi5yKWS6KJXptAVGCZn5FJRB5 > ppfxlKhcWb5Lbr/xSUVDVVrqLFlqK9ZYORddGjD6zSA60r1UjZDtdHexGUzSEmq5 > rtfB3xVQT8ANTrOi/8CWmFAaswCAy8okVHQXqLMEvPD9FL9bdmX9fiUBtNysigg= > =tQXA > -----END PGP SIGNATURE----- >
