Hi,

Thanks for the description David.  Sounds very familiar - projects I've
been involved with at Apache work very similarly.  I'd say they work
completely naturally - this is how people behave - they earn or don't earn
trust through their actions.

Otis
--
Performance Monitoring * Log Analytics * Search Analytics
Solr & Elasticsearch Support * http://sematext.com/


On Mon, Dec 16, 2013 at 2:52 PM, David Lang <[email protected]> wrote:

> On Mon, 16 Dec 2013, Brian Knox wrote:
>
>  Any contribution protocol that goes beyond acceptance by a very tight
>> knit team of core maintainers is going to have available exploits I'm sure.
>>  I was putting the document out there more as a nice way to spur some
>> conversation than as a suggestion for rsyslog's process.
>>
>> How to scale an open source project on a social level I think is a more
>> interesting (read: difficult) problem than scaling the actual software
>> itself!
>>
>
> I strongly suggest that people take a very close look at what the Linux
> kernel does for this. There are a lot of studies on this, but it bilds down
> to a chain of personal trust
>
> Linus accepts pull requests from lots of people. Requests from people with
> good track records get pulled with no review. Requests from other people
> get more review, or he tells the person to submit the patch to the
> maintainer of that area (who is supposed to do the review and merge it into
> that maintaier's tree before sending it upstream). Some areas of the kernel
> have multiple tiers of maintainers.
>
> In each case, the person sending things upstream is responsible for
> everything they send, so they need to either trust the people who are
> sending them patches, or they review the patches to their satisfaction
> before sending them upstream.
>
> If someone isn't doing a good enough job of reviewing patches before
> sending things upstream, the upstream maintainer starts loosing trust and
> slows down accepting patches from that person as they all end up needing
> more review.
>
>
> And by the way, a problem patch isn't nessasarily one that causes a
> security problem, it can just introduce bugs that make things less reliable
> (usually in cases that the patch author was not working on when creating
> patches)
>
> David Lang
> _______________________________________________
> rsyslog mailing list
> http://lists.adiscon.net/mailman/listinfo/rsyslog
> http://www.rsyslog.com/professional-services/
> What's up with rsyslog? Follow https://twitter.com/rgerhards
> NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad
> of sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you
> DON'T LIKE THAT.
>
_______________________________________________
rsyslog mailing list
http://lists.adiscon.net/mailman/listinfo/rsyslog
http://www.rsyslog.com/professional-services/
What's up with rsyslog? Follow https://twitter.com/rgerhards
NOTE WELL: This is a PUBLIC mailing list, posts are ARCHIVED by a myriad of 
sites beyond our control. PLEASE UNSUBSCRIBE and DO NOT POST if you DON'T LIKE 
THAT.

Reply via email to