Hi everybody,--Broadcasting here for wider visibility.https://fuchsia-review.googlesource.com/c/fuchsia/+/481013This RFC proposes a plan to prevent devices from OTAing backwards across a version boundary. We are currently in the iterate phase and have incorporated feedback from Storage and Software Delivery. If you have additional feedback, please respond by Thursday 02/11 EOD.LMK if you have any questions!--Zach KirschenbaumPronouns: he/him
You received this message because you are subscribed to the Google Groups "tq-local-storage" group.
To unsubscribe from this group and stop receiving emails from it, send an email to tq-local-stora...@google.com.
To view this discussion on the web visit https://groups.google.com/a/google.com/d/msgid/tq-local-storage/CABcR56Td95xEO9d-ONvZ0%3DY1TQSjsUHSCFoV%2BkKOMRFSeeL7XQ%40mail.gmail.com.
Although it's a good idea to include all relevant stakeholders, it's also important to note that this proposal doesn't change which OTA sequences are supported and which are not. It just makes this support explicit.Without this proposal, attempting to backwards-OTA across an incompatible boundary will cause problems when you attempt to boot the device (e.g. the filesystem format might not be supported by the driver). With this proposal, you'd find out about this before you do the OTA (and the error will be much clearer), which just makes things easier for everyone. :)
On Tue, Feb 16, 2021 at 11:33 AM Zach Kirschenbaum <zkb...@google.com> wrote:
Do we need a stakeholder from security? From the document, it sounds like the primary use case is during the development phase, which could mean we don't need a security stakeholder.
This matches my understanding. Just in case, I'll add on +Allison Pearce, who is the go-to security consultant for SWD.
What about infrastructure? Does this affect how we manage devices in CI?
My initial thoughts are this should not affect how we manage devices in CI. I just added a patchset explaining how this interacts with the OTA e2e tests. Adding on +Erick Tryzelaar (SWD) and +Anthony Fandrianto (Infra) just in case.Let me know if there's anything else we need to move this to the "last call" phase.
Do we need a stakeholder from security? From the document, it sounds like the primary use case is during the development phase, which could mean we don't need a security stakeholder.
What about infrastructure? Does this affect how we manage devices in CI?
--
All posts must follow the Fuchsia Code of Conduct https://fuchsia.dev/fuchsia-src/CODE_OF_CONDUCT or may be removed.
---
To unsubscribe from this group and stop receiving emails from it, send an email to eng-council...@fuchsia.dev.