From nobody Sat Jan 13 03:05:11 2024 X-Original-To: ports@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4TBjvN6vBZz571c5 for ; Sat, 13 Jan 2024 03:05:20 +0000 (UTC) (envelope-from junchoon@dec.sakura.ne.jp) Received: from www121.sakura.ne.jp (www121.sakura.ne.jp [153.125.133.21]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4TBjvL1tCYz48Sv for ; Sat, 13 Jan 2024 03:05:17 +0000 (UTC) (envelope-from junchoon@dec.sakura.ne.jp) Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of junchoon@dec.sakura.ne.jp designates 153.125.133.21 as permitted sender) smtp.mailfrom=junchoon@dec.sakura.ne.jp Received: from kalamity.joker.local (123-1-91-49.area1b.commufa.jp [123.1.91.49]) (authenticated bits=0) by www121.sakura.ne.jp (8.17.1/8.17.1/[SAKURA-WEB]/20201212) with ESMTPA id 40D35Cll002961 for ; Sat, 13 Jan 2024 12:05:12 +0900 (JST) (envelope-from junchoon@dec.sakura.ne.jp) Date: Sat, 13 Jan 2024 12:05:11 +0900 From: Tomoaki AOKI To: ports@freebsd.org Subject: Re: Latest and quarterly best practices Message-Id: <20240113120511.642ad8901f3b1169a6a4173d@dec.sakura.ne.jp> In-Reply-To: References: <84dca503-78ff-8fed-73d6-153f38478c71@quinteiro.org> Organization: Junchoon corps X-Mailer: Sylpheed 3.7.0 (GTK+ 2.24.33; amd64-portbld-freebsd14.0) List-Id: Porting software to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-ports List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-ports@freebsd.org X-BeenThere: freebsd-ports@freebsd.org Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spamd-Bar: -- X-Spamd-Result: default: False [-2.70 / 15.00]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_SHORT(-1.00)[-1.000]; MV_CASE(0.50)[]; R_SPF_ALLOW(-0.20)[+ip4:153.125.133.16/28]; ONCE_RECEIVED(0.10)[]; MIME_GOOD(-0.10)[text/plain]; RCVD_VIA_SMTP_AUTH(0.00)[]; RCPT_COUNT_ONE(0.00)[1]; HAS_ORG_HEADER(0.00)[]; RCVD_COUNT_ONE(0.00)[1]; MIME_TRACE(0.00)[0:+]; ASN(0.00)[asn:7684, ipnet:153.125.128.0/18, country:JP]; R_DKIM_NA(0.00)[]; ARC_NA(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; TO_DN_NONE(0.00)[]; FROM_EQ_ENVFROM(0.00)[]; MID_RHS_MATCH_FROM(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[ports@freebsd.org]; DMARC_NA(0.00)[sakura.ne.jp]; RCVD_TLS_LAST(0.00)[]; MLMMJ_DEST(0.00)[ports@freebsd.org]; FROM_HAS_DN(0.00)[] X-Rspamd-Queue-Id: 4TBjvL1tCYz48Sv On Sat, 13 Jan 2024 02:52:18 +0100 Jan Beich wrote: > Jose Quinteiro writes: > > > Maybe there are some ports that should not exist in the quarterly > > branch? Looks like some of these are under such heavy development that > > they really don't have a stable version. > > Hyprland release cadence is similar to Chromium and Firefox. Not using/checking hyprland, but at least updates for Chromium and Firefox almost always contain security fixes. So they should be MFH'ed to quarterly ASAP, although it's quite often and heavily-loaded. Stricly speaking, quarterly should only get "security updates", but for too large projects like Chromium and Firefox, backporting security fixes only should not be realistic and whole bunch of updates are introduced. This is just a my guess. -- Tomoaki AOKI