Stefan Monnier ha scritto:
>> One the one hand people expect OpenVPN to be rock-solid in both 
>> stability and security.  In order to maintain this standard of quality, 
>> there needs to be a rigorous process of patch vetting.  On the other 
>> hand, as an open source project, OpenVPN needs to be transparent and 
>> open to contributions from the community.
>>     
>
> That misses the main issue: you can reject most patches on some
> stability ground, but then as a contributor I'd like to know how to
> improve my patch to make it acceptable.
>   
> E.g. my "fqdn route with fqdn's that map to multiple IPs" patch (which
> I consider to be a bug-fix rather than a feature addition) has been
> somewhat discussed but only w.r.t the functionality, not the actual
> code, so I have no idea what I need to do in order to have it
> be accepted.  This is frustrating.
>
> This said, as a maintainer of a Free Software package, I am quite aware
> that giving responding to all contributions (let alone giving good
> feedback) can be challenging.
>
>
>         Stefan
>   
Very good points. The first challenge is reviewing patches. I guess many
problems can be spotted with a quick look on the patch. These problems
should communicated so that they can be fixed. And if the patch is
included, then we should communicate that, too. Otherwise the committer
might think his/her patch was rejected.

Now, if we want to maintain stability, we need some way to test the
patches. Automated tests could be used in many cases but building the
test cases takes time. In addition I don't think automated tests catch
nearly all problems, so manual testing is required. I'm not a specialist
in VCS systems but I guess a distributed VCS could help in this. What
are your thoughts on the testing procedures/tools? Fedora's Beaker suite
was mentioned earlier and it sounds interesting.

-- 
Samuli Seppänen
Community Manager
OpenVPN Technologies, Inc




Reply via email to