tech-net archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: Experiments with npf on -current
On Tue, 22 Nov 2011 22:55:09 -0600 (CST)
"Jeremy C. Reed" <reed%reedmedia.net@localhost> wrote:
> We should strive for a higher standard. We should encourage and maybe
> better require that we provide unit tests and/or behaviour tests with
> commits too. (Was there ever a public core announcement about when code
> is added or bug fixed, that the developer should consider adding ATF
> tests or regression tests for it?) (I'd like to extend this to include
> security audit tests as applicable, documentation requirements, and peer
> review requirements too.)
>
> We should suggest and even force that code known to be broken to be
> reverted. (Well I think this is already true, but not happening?) (It
> will be easier when we have a better revision control so many can work
> easier on branches.)
While I agree with most of what you said on a technical level,
unfortunately one must also come to the evidence that NetBSD
maintainers are volunteers with limited time and resources :(
So between the ideal and the practice, it's normal if a gap exists...
That said, I find that the NetBSD code base in general is of a high
quality, and the review process which I often see happening on mailing
lists, while sometimes tedious, tends to help a lot.
As for ipfilter vs npf, npf is known to be in development by most of
us, I think; and ipfilter (or sometimes pf) are still being used on
production systems by many where reliability is important and existing
firewall scripts are maintained and relied-upon (I currently use
netbsd-5 and ipfilter myself). This doesn't mean that an alternative
cannot be in development, incomplete or unstable (especially on an OS
also known to be good for research, such as NetBSD)...
--
Matt
Home |
Main Index |
Thread Index |
Old Index