-
Notifications
You must be signed in to change notification settings - Fork 575
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Discussion: LTS Proposal #17
Comments
I'm a little confused on the details of around versioning active LTS releases
Does this mean the active LTS version can do a release that bumps semver-major?
Not exactly sure how to interpret this, but is this trying to say critical security and bug fixes might introduce breaking changes, but instead of following semver they will be released as backwards compatible (minor) version bumps?
I think it could be good to explicitly state upfront something to the effect of "The purpose of LTS is to limit the breaking changes of Node for 12 months". It's not actually stated anywhere why someone should care about LTS, and the above quoted line only implies this statement (if it's even true, I might be interpreting this line totally wrong). |
No, it means that semver-major bumps can occur in
Yes, that's exactly what it's saying. The LTS will be cut on the last major.minor in
Yes, I plan to add a more "reader-friendly" tl/dr section that expands on this. |
Once a release moves into Maintenance mode, only critical bugs, critical security fixes, and documentation updates will be permitted. We should be clear on the rating system and what types of bugs and security issues are deemed critical. In my mind, any security bug should be patched, so we should be clear on what constitutes being critical. |
@geek do you have a suggestion for wording here? I agree with you but am struggling to come up with suggestions for how to differentiate "critical" here when we also have to decide on the backporting threshold for standard LTS. Basically we have two ill-defined thresholds. |
Sure, maybe we follow a rating system like https://www.owasp.org/index.php/OWASP_Risk_Rating_Methodology and just link to that? |
CVE's include a severity level (ex see https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-5380) maybe we can use that as an objective thresh hold. ie if base score is >X . |
See https://github.com/nodejs/LTS/#proposed-lts for the current proposal and leave feedback here. This is effectively a continuation of #8 but we now have a concrete proposal.
The text was updated successfully, but these errors were encountered: