Hi Gunnar, [please forward this e-mail to the ctte if it bounces again]. On 14-08-2019 21:07, Paul Gevers wrote: > Disclaimer, I haven't discussed this with the team, so what I write here > is my personal perception and opinion. This was discussed in our IRC meeting of 28-08-2019. [1] > On 11-08-2019 05:26, Gunnar Wolf wrote: >> In short - This bug started off quite aggressively between two >> developers, and I don't think it's easy to deescalate. But I think >> that there is a good way to solve the situation - _if_ the Release >> Team is willing to accept one more power / responsability. During our IRC meeting we came to the conclusion that we consider ourselves the right party for case-by-case judgment of FTBFS bugs. However, we noted that we will not write a detailed policy now, and, for the purpose of the original bug submitted to the ctte we don't consider FTBFS on single CPU machines RC by default. The level important seems very suitable as a minimum bug level for FTBFS bugs. Also note that a bug doesn't need to be RC bugs to be worth fixing. Paul [1] http://meetbot.debian.net/debian-release/2019/debian-release.2019-08-28-19.05.html
Attachment:
signature.asc
Description: OpenPGP digital signature