From nobody Wed Jul 17 03:02:49 2024 X-Original-To: freebsd-hackers@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4WP12j1vWFz5Qpw4 for ; Wed, 17 Jul 2024 03:02:53 +0000 (UTC) (envelope-from linimon@portsmon.org) Received: from MTA-06-4.privateemail.com (mta-06-4.privateemail.com [198.54.122.146]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4WP12h1ncDz4pS8 for ; Wed, 17 Jul 2024 03:02:52 +0000 (UTC) (envelope-from linimon@portsmon.org) Authentication-Results: mx1.freebsd.org; dkim=none; dmarc=none; spf=pass (mx1.freebsd.org: domain of linimon@portsmon.org designates 198.54.122.146 as permitted sender) smtp.mailfrom=linimon@portsmon.org Received: from mta-06.privateemail.com (localhost [127.0.0.1]) by mta-06.privateemail.com (Postfix) with ESMTP id D26D31800051 for ; Tue, 16 Jul 2024 23:02:49 -0400 (EDT) Received: from APP-19 (unknown [10.50.14.243]) by mta-06.privateemail.com (Postfix) with ESMTPA for ; Tue, 16 Jul 2024 23:02:49 -0400 (EDT) Date: Tue, 16 Jul 2024 22:02:49 -0500 (CDT) From: Mark Linimon To: FreeBSD Hackers Message-ID: <1339320103.251016.1721185369763@privateemail.com> In-Reply-To: <1156689809.250425.1721184799123@privateemail.com> References: <1156689809.250425.1721184799123@privateemail.com> Subject: requesting volunteers to help with Bugzilla List-Id: Technical discussions relating to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-hackers List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-hackers@FreeBSD.org MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Priority: 3 Importance: Normal X-Mailer: Open-Xchange Mailer v7.10.6-Rev67 X-Originating-Client: open-xchange-appsuite X-Virus-Scanned: ClamAV using ClamSMTP X-Spamd-Bar: --- X-Spamd-Result: default: False [-3.40 / 15.00]; NEURAL_HAM_LONG(-1.00)[-1.000]; NEURAL_HAM_MEDIUM(-1.00)[-1.000]; NEURAL_HAM_SHORT(-1.00)[-1.000]; R_SPF_ALLOW(-0.20)[+ip4:198.54.122.128/27]; MIME_GOOD(-0.10)[text/plain]; RWL_MAILSPIKE_GOOD(-0.10)[198.54.122.146:from]; RCVD_VIA_SMTP_AUTH(0.00)[]; MIME_TRACE(0.00)[0:+]; RCVD_TLS_LAST(0.00)[]; FREEFALL_USER(0.00)[linimon]; ASN(0.00)[asn:22612, ipnet:198.54.122.0/24, country:US]; RCPT_COUNT_ONE(0.00)[1]; FROM_HAS_DN(0.00)[]; R_DKIM_NA(0.00)[]; RCVD_COUNT_TWO(0.00)[2]; HAS_X_PRIO_THREE(0.00)[3]; FROM_EQ_ENVFROM(0.00)[]; ARC_NA(0.00)[]; TO_MATCH_ENVRCPT_ALL(0.00)[]; TO_DN_ALL(0.00)[]; PREVIOUSLY_DELIVERED(0.00)[freebsd-hackers@freebsd.org]; MLMMJ_DEST(0.00)[freebsd-hackers@freebsd.org]; DMARC_NA(0.00)[portsmon.org]; RCVD_IN_DNSWL_NONE(0.00)[198.54.122.146:from] X-Rspamd-Queue-Id: 4WP12h1ncDz4pS8 (attempting a resend) FreeBSD maintains its own patches to upstream Bugzilla. Some are done in the port, but others are done in a git repo. I have been trying to update my forked copy of the git repo with all the changes that have been made on production over the last N years. Now it's time for me to upstream those changes. I need to work with someone to look over the changes (mostly in Perl, with which I am not fluent) and someone at least familiar with git, to walk me through this process. It is too important for me to mess this up. Of course, help with Bugzilla in general would be greatly appreciated. There are more bugs filed against our instance of Bugzilla itself that I will ever be able to handle. The overall wiki page is: https://wiki.freebsd.org/Bugzilla but I can point interested people into the gory details on the subpages. Yes, this would involve a non-zero time committment. TIA. mcl