Skip to content

doc: binary blobs: remove TSC approval requirement #88875

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
May 27, 2025

Conversation

dleach02
Copy link
Member

Remove the TSC approval requirements for binary blobs. Clarify in the language that the submitter and reviewers shall ensure that all binary blob requirements are being met before approval and integration into Zephyr.

@dleach02 dleach02 requested review from nashif and carlescufi April 21, 2025 22:27
@dleach02
Copy link
Member Author

per action from the process working group meeting

@dleach02 dleach02 added this to Process Apr 21, 2025
@github-project-automation github-project-automation bot moved this to To do in Process Apr 21, 2025
@github-actions github-actions bot requested a review from kartben April 21, 2025 22:27
@keith-zephyr keith-zephyr moved this from To do to In progress in Process Apr 21, 2025
@dleach02 dleach02 added the Process Tracked by the process WG label Apr 21, 2025
@nordicjm
Copy link
Collaborator

Query: can referrals to TSC still be made if reviewers have concerns about what is being added as a blob or the supporting usage of it? E.g. #80507 (comment) comment as per:

This is downloading a file, changing permissions and executing it and is a binary blob. Binary blobs needs tsc approval @nashif and for what is happening here would like @ceolin to have a look

@henrikbrixandersen
Copy link
Member

Should this be discussed in the TSC?

@carlescufi
Copy link
Member

Query: can referrals to TSC still be made if reviewers have concerns about what is being added as a blob or the supporting usage of it?

I was thinking along similar lines when looking at the PR. @dleach02 could you please add some text that encapsulates that?

@dleach02
Copy link
Member Author

Yes, I can add some text about escalation but it will likely reference our current guidance. This is just a normal PR with the normal rules.

@henrikbrixandersen, yes, I think this ultimately needs to be put in front of TSC before final acceptance/rejection. This is the initial work to flush out via this review process and the Process working group.

@dleach02
Copy link
Member Author

Query: can referrals to TSC still be made if reviewers have concerns about what is being added as a blob or the supporting usage of it? E.g. #80507 (comment) comment as per:

This is downloading a file, changing permissions and executing it and is a binary blob. Binary blobs needs tsc approval @nashif and for what is happening here would like @ceolin to have a look

@nordicjm, completely agree. And for the reference you highlighted, I was made aware of this last night and had a direct conversation with the authors on what can or cannot be done. Thank you for catching and highlighting this.

@dleach02 dleach02 force-pushed the blob_change branch 2 times, most recently from 7899062 to 3857381 Compare April 23, 2025 01:47
@kartben kartben assigned keith-zephyr and unassigned kartben and carlescufi Apr 23, 2025
@keith-zephyr
Copy link
Collaborator

You should also delete the binary blobs issue template as that is now obsolete once this PR is approved.

@dleach02
Copy link
Member Author

You should also delete the binary blobs issue template as that is now obsolete once this PR is approved.

Agreed, but I'm not sure where that actually exists. Is this something we do via a PR?

@henrikbrixandersen
Copy link
Member

Agreed, but I'm not sure where that actually exists. Is this something we do via a PR?

https://github.com/zephyrproject-rtos/zephyr/blob/main/.github/ISSUE_TEMPLATE/008_bin-blobs.md

Remove the TSC approval requirements for binary blobs. Clarify
in the language that the submitter and reviewers shall ensure
that all binary blob requirements are being met before approval
and integration into Zephyr.

Signed-off-by: David Leach <[email protected]>
@dleach02
Copy link
Member Author

@carlescufi we discussed in process wg having the action that detects module.yml change to add a blob cause a flag to be set on the PR. Is this doable?

Copy link
Collaborator

@keith-zephyr keith-zephyr left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good to me. @carlescufi is it possible to improve the tooling to detect blobs on PRs?

@carlescufi
Copy link
Member

Looks good to me. @carlescufi is it possible to improve the tooling to detect blobs on PRs?

On it.

@carlescufi
Copy link
Member

@dleach02 @keith-zephyr to be clear, you want a label added to the PR when one or more new binary blobs are added, or also when existing ones are updated to a new revision or URL?

@keith-zephyr
Copy link
Collaborator

@dleach02 @keith-zephyr to be clear, you want a label added to the PR when one or more new binary blobs are added, or also when existing ones are updated to a new revision or URL?

Probably good to flag the PR for new blobs and changes to existing blobs. We don't want a license change or some other violation of the blob policy to slip by when updating an existing blob.

@carlescufi carlescufi added the DNM This PR should not be merged (Do Not Merge) label May 15, 2025
@carlescufi
Copy link
Member

DNM until the manifest check is ready

@dleach02
Copy link
Member Author

I suspect we need to take this PR to a TSC vote.

Because this change is taking away something that was part of the TSC responsibility if feels like we should give the TSC body a chance to approve this. Thoughts?

@henrikbrixandersen
Copy link
Member

I suspect we need to take this PR to a TSC vote.

Because this change is taking away something that was part of the TSC responsibility if feels like we should give the TSC body a chance to approve this. Thoughts?

I agree.

@keith-zephyr keith-zephyr moved this from In progress to Awaiting TSC approval in Process May 20, 2025
@dleach02 dleach02 added the TSC Topics that need TSC discussion label May 21, 2025
@carlescufi
Copy link
Member

PR for the manifest action update: #90379

@carlescufi carlescufi removed the DNM This PR should not be merged (Do Not Merge) label May 27, 2025
@carlescufi
Copy link
Member

PR for the manifest action update: #90379

Merged, no blockers anymore.

@carlescufi carlescufi removed the TSC Topics that need TSC discussion label May 27, 2025
@kartben kartben merged commit 88c34b0 into zephyrproject-rtos:main May 27, 2025
26 of 29 checks passed
@github-project-automation github-project-automation bot moved this from Todo to Done in TSC Attention Needed May 27, 2025
@keith-zephyr keith-zephyr moved this from Awaiting TSC approval to Done in Process May 27, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Status: Done
Status: Done
Development

Successfully merging this pull request may close these issues.

7 participants