From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from gnu.wildebeest.org (gnu.wildebeest.org [45.83.234.184]) by sourceware.org (Postfix) with ESMTPS id 80D3C3857B8D for ; Thu, 23 Jun 2022 07:55:52 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org 80D3C3857B8D Authentication-Results: sourceware.org; dmarc=none (p=none dis=none) header.from=klomp.org Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=klomp.org Received: from r6.wildebeest.org (r6.wildebeest.org [172.31.17.6]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by gnu.wildebeest.org (Postfix) with ESMTPSA id 8424B300B33A; Thu, 23 Jun 2022 09:55:50 +0200 (CEST) Message-ID: Subject: Re: patchwork upgrade week From: Mark Wielaard To: Siddhesh Poyarekar , Mark Wielaard Cc: libc-alpha@sourceware.org, DJ Delorie , Carlos O'Donell Date: Thu, 23 Jun 2022 09:55:49 +0200 In-Reply-To: <551277bc-975d-0b2e-670b-679db68e604b@gotplt.org> References: <551277bc-975d-0b2e-670b-679db68e604b@gotplt.org> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.34.2 MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-5.5 required=5.0 tests=BAYES_00, JMQ_SPF_NEUTRAL, KAM_DMARC_STATUS, SPF_HELO_NONE, SPF_PASS, TXREP, T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: libc-alpha@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Libc-alpha mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 23 Jun 2022 07:55:54 -0000 Hi Siddhesh, On Thu, 2022-06-23 at 07:46 +0530, Siddhesh Poyarekar wrote: > On 23/06/2022 02:57, Mark Wielaard wrote: > > So I was hoping to integrate the buildbot with the patchwork based > > trybot. But it would be good to have some way to authenticate the > > patch as genuine before throwing it at the buildbot-worker. I was > > hoping that could be done by a project admin setting the state of the > > patch to some "please-try" value. But it looks like a (rogue) user can > > set the state on their own patch. So relying on the patchwork patch > > state seems not secure. > > > > Or is there a state (maybe a check state?) that we can make sure can > > only be set by project admins? > > > > If not, how else can we authenticate a patch as "OK to let the > > buildbot do a try build?" > > DJ is working on an email based workflow. Another method (that Frank > proposed on IRC recently) could be for a trybot to track namespace > branches for all committers on sourceware and trigger builds on specific > names, e.g. siddhesh/buildbot/*. That way maintainers can manually > trigger builds by pushing their changes to that specific branch namespace. OK, so that would work like the git try branches, but tells the buildbot to also find the same patch on patchwork to add a check result? Could we then use patchwork/hasher.py to calculate the hash of the commit and look it up in the project patch list so it can be update it with the builder check result? That sounds like a promising idea. Thanks, Mark