From owner-freebsd-current@freebsd.org Wed Sep 19 16:22:49 2018 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 318C610A0F28 for ; Wed, 19 Sep 2018 16:22:49 +0000 (UTC) (envelope-from gjb@freebsd.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2610:1c1:1:6074::16:84]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "freefall.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id D69F688D14; Wed, 19 Sep 2018 16:22:48 +0000 (UTC) (envelope-from gjb@freebsd.org) Received: from FreeBSD.org (freefall.freebsd.org [IPv6:2610:1c1:1:6074::16:84]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by freefall.freebsd.org (Postfix) with ESMTPS id 9DD151C7FB; Wed, 19 Sep 2018 16:22:48 +0000 (UTC) (envelope-from gjb@freebsd.org) Date: Wed, 19 Sep 2018 16:22:46 +0000 From: Glen Barber To: freebsd-current@freebsd.org Cc: FreeBSD Release Engineering Team Subject: Update to 12.0-RELEASE schedule Message-ID: <20180919162246.GC52847@FreeBSD.org> Reply-To: FreeBSD Release Engineering Team MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="BeiMt4EphvRJ5ehf" Content-Disposition: inline User-Agent: Mutt/1.10.1 (2018-07-13) X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.27 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 19 Sep 2018 16:22:49 -0000 --BeiMt4EphvRJ5ehf Content-Type: text/plain; charset=us-ascii Content-Disposition: inline The 12.0-RELEASE schedule will slip while we wait for some last-minute work-in-progress to be completed before branching stable/12. The most notable work-in-progress is upgrading the in-tree OpenSSL to version 1.1.1, to avoid being stuck with an outdated OpenSSL when 1.0.x reaches end of life on January 1, 2020. There is a bit of non-trivial intrusiveness with this update, notably incompatibility with other in-tree utilities such as OpenSSH, Kerberos, and NTP. At present, the 12.0-RELEASE schedule will slip by at least one week to allow time for this work to be completed so the changes are in the tree prior to the stable/12 branch. The 12.0 schedule has been updated on the website at: https://www.freebsd.org/releases/12.0R/schedule.html Thank you in advance for your patience. Glen On behalf of: re@ --BeiMt4EphvRJ5ehf Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEjRJAPC5sqwhs9k2jAxRYpUeP4pMFAluid9YACgkQAxRYpUeP 4pOsCBAAneHwemD5vKTXpuqqm+Yw8jII0euj46JWf4EXlthyGpknC3Dmpz3xJEdl zyT7utGAm2n4eb5YkePnFD0yKPtj/6xaeTaaOmxKzl6wKqlgUZmzGstIwHc0ynOZ qhAykYBNPMlxtOtotSBpo6pHVXr632kCxM6As9b9GELLLoutd0m/Nr+M2jjRIAvh w8DGSgoe7OIbExuXFb7qhTC7WdpP6Zk9RVzs2AreBsHD/tpIq1JcdQVG2k5Llz+F qG3U/BDlKsvS3RxAuzf82OrvdOdf3+davUi2k6dNrx4wTk7sgnx3tvF5mjYcvIyh tQGH/Vi7rAprpCPylOrdRBSNWVmyxMvZjW3Hqo1daM5yOEsziNRBvajsfYbAmjwV HvWu1ogzstr/GHdpFpk0L04wrvbu9B0diYzy4dfM3hV3Zssvz68ipRhc2g7g1uh2 mHBw/4WENV58nMs7uK/jHAtdo3athjs3TDQXOLAUyHy0KSqnhuG6bkPvLCRDFPsj +ft39mqw3MXc/n5EWftM+FAIndRfJpa90Ku8+TQCcy209DnlwG04VIWE+PWzBCQ0 57ssv/J4AfZuGapm5h4KVn1AmnvXHJzAGe54OVEJ22O4DTLdheL/10vnUKnO2znd bivekU9G9YE5KpYSCQYfByd+0tGRP97zgJ02FCuwFXcjVNS34kc= =tEi/ -----END PGP SIGNATURE----- --BeiMt4EphvRJ5ehf--