After the PR CI build fails it should be straightforward to see if the
dependency was part of the PR or not.


On Thu, Nov 2, 2017 at 11:50 PM, Pramod Immaneni <pra...@datatorrent.com>
wrote:

> Check is fine as long as we can identify whether the CVE was introduced by
> a PR. It might still be useful to fix a CVE even if there is no release,
> downstream projects might be able to use it.
>
> On Thu, Nov 2, 2017 at 4:42 PM, Thomas Weise <t...@apache.org> wrote:
>
> > Check as part of PR build is needed to ensure no new issues are
> introduced.
> > I don't think it is necessary to have another build to notice
> pre-existing
> > issues since releases won't occur without prior PRs.
> >
> > Whitelisting suggestion is for pre-existing problems and not for those
> > introduced by a PR.
> >
> >
> > On Thu, Nov 2, 2017 at 11:35 PM, Pramod Immaneni <pra...@datatorrent.com
> >
> > wrote:
> >
> > > If the PR introduces a CVE by all means lets fail it initally and later
> > > look at whitelisting it if needed. Why fail all PRs that haven't caused
> > the
> > > problem. What happens when there are no PRs in a given period, wouldn't
> > it
> > > be better to know above crtiical CVEs (that this proposal is trying to
> > > address) sooner than wait till some random PR is raised. What if there
> > are
> > > no PRs for a month. I think it makes sense to have a separate build
> that
> > > will catch these errors.
> > >
> > > On Thu, Nov 2, 2017 at 3:17 PM, Ananth G <ananthg.a...@gmail.com>
> wrote:
> > >
> > > > Only the first PR should be broken if cve with a higher score than
> > agreed
> > > > is introduced .Once you whitelist subsequent builds will not fail?
> > >
> > >
> > > > - The dependency check plugin is enabled to fail/break the build if a
> > > > violation is detected
> > > > - A PR introducing a risk will either “acknowledge” the cve by
> creating
> > > > the whitelist entry as part of the process or will break the build
> > > > - The reviewer/s would notice either the changes to the whitelist
> file
> > or
> > > > the build break
> > > > - The review process would agree upon the approach and ensure JIRA
> > ticket
> > > > creation or question why an alternative cannot be used
> > > > - whitelist would be maintained in a suppressions file example given
> > here
> > > > https://jeremylong.github.io/DependencyCheck/general/
> suppression.html
> > > > - subsequent PR update should no longer break the build
> > > > - there is a list of JIRA items for cve which needs to be addressed
> in
> > > the
> > > > subsequent releases as well as a set of artefacts in the project
> > modules
> > > > that summarise the community’s awareness of the issue.
> > > >
> > > >
> > > > Regards
> > > > Ananth
> > > >
> > > > > On 3 Nov 2017, at 8:38 am, Pramod Immaneni <pra...@datatorrent.com
> >
> > > > wrote:
> > > > >
> > > > > The question is which build? We can definitely make it a mandatory
> > > > release
> > > > > step and also have nightly builds that are meant for just these,
> > > > detection
> > > > > of CVEs and even possible infra changes that might break tests.
> Those
> > > > will
> > > > > work even if there are no PRs.
> > > > >
> > > > >> On Thu, Nov 2, 2017 at 1:21 PM, Ananth G <ananthg.a...@gmail.com>
> > > > wrote:
> > > > >>
> > > > >> My vote would be to break the build. This can then force a
> > > > “whitelisting”
> > > > >> configuration in the maven plugin to be created as part of the
> > review
> > > > >> process ( along with a new JIRA ticket ).
> > > > >>
> > > > >> The concern would then be to ensure that the community works
> > towards a
> > > > >> resolution of the JIRA. Not breaking the build for me is tech debt
> > > > slipping
> > > > >> without anyones notice.  Fixing the JIRA is a hygiene process
> which
> > I
> > > > >> believe cannot take a back burner as compared contributor welfare
> > and
> > > > would
> > > > >> need commitments from the contributor ( and/or others).
> > > > >>
> > > > >> On a related note, looking at apache spark, there seems to be CVE
> > > > listings
> > > > >> which the spark community has taken care of as the releases
> > > progressed.
> > > > >> http://www.cvedetails.com/vulnerability-list/vendor_id-
> > > > >> 45/product_id-38954/Apache-Spark.html <http://www.cvedetails.com/
> > > > >> vulnerability-list/vendor_id-45/product_id-38954/Apache-
> Spark.html>
> > .
> > > > >>
> > > > >> Regards,
> > > > >> Ananth
> > > > >>
> > > > >>
> > > > >>> On 3 Nov 2017, at 4:48 am, Sanjay Pujare <san...@datatorrent.com
> >
> > > > wrote:
> > > > >>>
> > > > >>> I like this suggestion. Blocking the PR is too drastic. I also
> > second
> > > > >>> Pramod's point (made elsewhere) that we should try to encourage
> > > > >>> contribution instead of discouraging it by resorting to drastic
> > > > measures.
> > > > >>> If you institute drastic measures to achieve a desired effect
> (e.g.
> > > > >> getting
> > > > >>> contributors to look into CVEs and build infrastructure issues)
> it
> > > can
> > > > >> have
> > > > >>> the opposite effect of contributors losing interest.
> > > > >>>
> > > > >>> Sanjay
> > > > >>>
> > > > >>>
> > > > >>>
> > > > >>>> On Wed, Nov 1, 2017 at 1:25 PM, Thomas Weise <t...@apache.org>
> > > wrote:
> > > > >>>>
> > > > >>>> Considering typical behavior, unless the CI build fails, very
> few
> > > will
> > > > >> be
> > > > >>>> interested fixing the issues.
> > > > >>>>
> > > > >>>> Perhaps if after a CI failure the issue can be identified as
> > > > >> pre-existing,
> > > > >>>> we can whitelist and create a JIRA that must be addressed prior
> to
> > > the
> > > > >> next
> > > > >>>> release?
> > > > >>>>
> > > > >>>>
> > > > >>>> On Wed, Nov 1, 2017 at 7:51 PM, Pramod Immaneni <
> > > > pra...@datatorrent.com
> > > > >>>
> > > > >>>> wrote:
> > > > >>>>
> > > > >>>>> I would like to hear what others think.. at this point I am -1
> on
> > > > >> merging
> > > > >>>>> the change as is that would fail all PR builds when a matching
> > CVE
> > > is
> > > > >>>>> discovered regardless of whether the PR was the cause of the
> CVE
> > or
> > > > >> not.
> > > > >>>>>
> > > > >>>>>> On Wed, Nov 1, 2017 at 12:07 PM, Vlad Rozov <
> vro...@apache.org>
> > > > wrote:
> > > > >>>>>>
> > > > >>>>>>> On 11/1/17 11:39, Pramod Immaneni wrote:
> > > > >>>>>>>
> > > > >>>>>>> On Wed, Nov 1, 2017 at 11:36 AM, Vlad Rozov <
> vro...@apache.org
> > >
> > > > >>>> wrote:
> > > > >>>>>>>
> > > > >>>>>>> There is no independent build and the check is still
> necessary
> > to
> > > > >>>>> prevent
> > > > >>>>>>>> new dependencies with CVE being introduced.
> > > > >>>>>>>>
> > > > >>>>>>>> There isn't one today but one could be added. What kind of
> > > effort
> > > > is
> > > > >>>>>>> needed.
> > > > >>>>>>>
> > > > >>>>>> After it is added, we can discuss whether it will make sense
> to
> > > move
> > > > >>>> the
> > > > >>>>>> check to the newly created build. Even if one is added, the
> > check
> > > > >> needs
> > > > >>>>> to
> > > > >>>>>> be present in the CI builds that verify PR, so it is in the
> > right
> > > > >> place
> > > > >>>>>> already, IMO.
> > > > >>>>>>
> > > > >>>>>>>
> > > > >>>>>>>
> > > > >>>>>>> Look at Malhar 3.8.0 thread. There are libraries from
> Category
> > X
> > > > >>>>>>>> introduced as a dependency, so now instead of dealing with
> the
> > > > issue
> > > > >>>>> when
> > > > >>>>>>>> such dependencies were introduced, somebody else needs to
> deal
> > > > with
> > > > >>>>>>>> removing/fixing those dependencies.
> > > > >>>>>>>>
> > > > >>>>>>>> Those were directly introduced in PRs. I am not against
> adding
> > > > >>>>> additional
> > > > >>>>>>> checks that verify the PR better.
> > > > >>>>>>>
> > > > >>>>>> Right and it would be much better to catch the problem at the
> > time
> > > > it
> > > > >>>> was
> > > > >>>>>> introduced, but Category X list (as well as known CVE) is not
> > > > static.
> > > > >>>>>>
> > > > >>>>>>
> > > > >>>>>>>
> > > > >>>>>>> Thank you,
> > > > >>>>>>>>
> > > > >>>>>>>> Vlad
> > > > >>>>>>>>
> > > > >>>>>>>>
> > > > >>>>>>>> On 11/1/17 11:21, Pramod Immaneni wrote:
> > > > >>>>>>>>
> > > > >>>>>>>> My original concern still remains. I think what you have is
> > > > valuable
> > > > >>>>> but
> > > > >>>>>>>>> would prefer that it be activated in an independent build
> > that
> > > > >>>>> notifies
> > > > >>>>>>>>> the
> > > > >>>>>>>>> interested parties.
> > > > >>>>>>>>>
> > > > >>>>>>>>> On Wed, Nov 1, 2017 at 11:13 AM, Vlad Rozov <
> > vro...@apache.org
> > > >
> > > > >>>>> wrote:
> > > > >>>>>>>>>
> > > > >>>>>>>>> Any other concerns regarding merging the PR? By looking at
> > the
> > > > >>>> active
> > > > >>>>>>>>> PRs
> > > > >>>>>>>>>
> > > > >>>>>>>>>> on the apex core the entire conversation looks to be at
> the
> > > moot
> > > > >>>>> point.
> > > > >>>>>>>>>>
> > > > >>>>>>>>>> Thank you,
> > > > >>>>>>>>>>
> > > > >>>>>>>>>> Vlad
> > > > >>>>>>>>>>
> > > > >>>>>>>>>>
> > > > >>>>>>>>>> On 10/30/17 18:50, Vlad Rozov wrote:
> > > > >>>>>>>>>>
> > > > >>>>>>>>>> On 10/30/17 17:30, Pramod Immaneni wrote:
> > > > >>>>>>>>>>
> > > > >>>>>>>>>>> On Sat, Oct 28, 2017 at 7:47 AM, Vlad Rozov <
> > > vro...@apache.org
> > > > >
> > > > >>>>>>>>>>> wrote:
> > > > >>>>>>>>>>>
> > > > >>>>>>>>>>>> Don't we use unit test to make sure that PR does not
> break
> > > an
> > > > >>>>>>>>>>>> existing
> > > > >>>>>>>>>>>>
> > > > >>>>>>>>>>>> functionality? For that we use CI environment that we do
> > not
> > > > >>>>> control
> > > > >>>>>>>>>>>>> and do
> > > > >>>>>>>>>>>>> not introduce any changes to, but for example Apache
> > > > >>>>> infrastructure
> > > > >>>>>>>>>>>>> team
> > > > >>>>>>>>>>>>> may decide to upgrade Jenkins and that may impact Apex
> > > > builds.
> > > > >>>> The
> > > > >>>>>>>>>>>>> same
> > > > >>>>>>>>>>>>> applies to CVE. It is there to prevent dependencies
> with
> > > > severe
> > > > >>>>>>>>>>>>> vulnerabilities.
> > > > >>>>>>>>>>>>>
> > > > >>>>>>>>>>>>> Infrastructure changes are quite different, IMO, from
> > this
> > > > >>>>> proposal.
> > > > >>>>>>>>>>>>>
> > > > >>>>>>>>>>>>> While
> > > > >>>>>>>>>>>> they are not in our control, in majority of the cases,
> the
> > > > >>>> changes
> > > > >>>>>>>>>>>> maintain
> > > > >>>>>>>>>>>> compatibility so everything on top will continue to run
> > the
> > > > >> same.
> > > > >>>>> In
> > > > >>>>>>>>>>>> this
> > > > >>>>>>>>>>>> case a CVE will always fail all PRs, the code changes
> have
> > > > >>>> nothing
> > > > >>>>> to
> > > > >>>>>>>>>>>> do
> > > > >>>>>>>>>>>> with introducing the CVE. I did make the exception that
> > if a
> > > > PR
> > > > >>>> is
> > > > >>>>>>>>>>>> bringing
> > > > >>>>>>>>>>>> in the CVE yes do fail it.
> > > > >>>>>>>>>>>>
> > > > >>>>>>>>>>>> There were just two recent changes, one on Travis CI
> side
> > > and
> > > > >>>>> another
> > > > >>>>>>>>>>>>
> > > > >>>>>>>>>>> on
> > > > >>>>>>>>>>> Jenkins side that caused builds for all PRs to fail and
> > none
> > > of
> > > > >>>> them
> > > > >>>>>>>>>>> was
> > > > >>>>>>>>>>> caused by code changes in any of open PRs, so I don't see
> > how
> > > > it
> > > > >>>> is
> > > > >>>>>>>>>>> different.
> > > > >>>>>>>>>>>
> > > > >>>>>>>>>>> A code change may or may not have relation to CVE
> > introduced.
> > > > For
> > > > >>>>>>>>>>> newly
> > > > >>>>>>>>>>> introduced dependencies, there may be known CVEs. In any
> > > case I
> > > > >>>>> don't
> > > > >>>>>>>>>>> think
> > > > >>>>>>>>>>> it is important to differentiate how CVE is introduced,
> it
> > is
> > > > >>>>>>>>>>> important
> > > > >>>>>>>>>>> to
> > > > >>>>>>>>>>> eliminate dependencies with known CVEs.
> > > > >>>>>>>>>>>
> > > > >>>>>>>>>>>
> > > > >>>>>>>>>>> There is no "stick" in a failed build or keeping PR open
> > > until
> > > > >>>>>>>>>>>> dependency
> > > > >>>>>>>>>>>>
> > > > >>>>>>>>>>>> issue is resolved or unit test failure is fixed. Unless
> an
> > > > >>>> employer
> > > > >>>>>>>>>>>>> punishes its employee for not delivering PR based on
> that
> > > > >> vendor
> > > > >>>>>>>>>>>>> priority,
> > > > >>>>>>>>>>>>> there is no "stick". As we already discussed, the
> > community
> > > > >> does
> > > > >>>>> not
> > > > >>>>>>>>>>>>> have a
> > > > >>>>>>>>>>>>> deadline for a PR merge or for a release to go out. In
> a
> > > case
> > > > >>>>> there
> > > > >>>>>>>>>>>>> is a
> > > > >>>>>>>>>>>>> problematic dependency (with CVE or category X license)
> > you
> > > > as
> > > > >> a
> > > > >>>>> PMC
> > > > >>>>>>>>>>>>> suppose to -1 a release (at least I will). Will you
> > > consider
> > > > -1
> > > > >>>>> as a
> > > > >>>>>>>>>>>>> "stick"? For me, it is not about punishing an
> individual
> > > > >>>>>>>>>>>>> contributor,
> > > > >>>>>>>>>>>>> it is
> > > > >>>>>>>>>>>>> a priority and focus shift for the entire community,
> not
> > a
> > > > >>>> "stick"
> > > > >>>>>>>>>>>>> for
> > > > >>>>>>>>>>>>> an
> > > > >>>>>>>>>>>>> individual contributor.
> > > > >>>>>>>>>>>>>
> > > > >>>>>>>>>>>>> The stick I am referring to is failing all PRs hoping
> > that
> > > > will
> > > > >>>>> make
> > > > >>>>>>>>>>>>>
> > > > >>>>>>>>>>>>> people
> > > > >>>>>>>>>>>> address CVEs. It's got nothing to do with an employer,
> > > people
> > > > >>>>>>>>>>>> contributing
> > > > >>>>>>>>>>>> to open source can't expect they can control what the
> > > outcome
> > > > >>>> will
> > > > >>>>> be
> > > > >>>>>>>>>>>> or
> > > > >>>>>>>>>>>> what form it will take. You may be confusing this with
> > some
> > > > >> other
> > > > >>>>>>>>>>>> issue.
> > > > >>>>>>>>>>>> In
> > > > >>>>>>>>>>>> some of the arguments, you are assuming this scenario is
> > > > similar
> > > > >>>> to
> > > > >>>>>>>>>>>> build
> > > > >>>>>>>>>>>> failures from failing unit tests and I am arguing that
> > > > premise.
> > > > >> I
> > > > >>>>>>>>>>>> don't
> > > > >>>>>>>>>>>> think we should bring regular development to a halt
> > > whenever a
> > > > >>>>>>>>>>>> matching
> > > > >>>>>>>>>>>> CVE
> > > > >>>>>>>>>>>> is discovered, unless there is some other secondary
> reason
> > > > like
> > > > >>>>>>>>>>>> merging a
> > > > >>>>>>>>>>>> PR will make it difficult for a CVE fix to be made. Have
> > you
> > > > >>>> given
> > > > >>>>> a
> > > > >>>>>>>>>>>> thought to what I said about having a separate build
> that
> > > will
> > > > >>>>> notify
> > > > >>>>>>>>>>>> about
> > > > >>>>>>>>>>>> CVEs.
> > > > >>>>>>>>>>>>
> > > > >>>>>>>>>>>> As I mentioned, there is no stick, no deadlines and no
> > > issues
> > > > >>>>> keeping
> > > > >>>>>>>>>>>>
> > > > >>>>>>>>>>> PRs
> > > > >>>>>>>>>>> open until builds can be verified on CI environment.
> > Fixing a
> > > > >>>> failed
> > > > >>>>>>>>>>> build
> > > > >>>>>>>>>>> is a priority for the *community* not a stick for an
> > > individual
> > > > >>>>>>>>>>> contributor.
> > > > >>>>>>>>>>>
> > > > >>>>>>>>>>> I don't see why keeping PRs open (for whatever reason)
> > brings
> > > > >>>>> regular
> > > > >>>>>>>>>>> development to a halt. Nobody is going to put github repo
> > > > >> offline.
> > > > >>>>>>>>>>> Contributors may continue to open new PR, collaborate on
> > > > existing
> > > > >>>>> PRs
> > > > >>>>>>>>>>> and
> > > > >>>>>>>>>>> add more changes (and need to be patient for those
> changes
> > to
> > > > be
> > > > >>>>>>>>>>> reviewed
> > > > >>>>>>>>>>> and accepted). The regular development will continue with
> > the
> > > > >> only
> > > > >>>>>>>>>>> exception that the next commit to be merged must address
> > the
> > > > >> build
> > > > >>>>>>>>>>> issue
> > > > >>>>>>>>>>> (whether it is a failed unit test or newly found CVE).
> > > > >>>>>>>>>>>
> > > > >>>>>>>>>>> I don't see much value in a separate build and do not
> plan
> > to
> > > > put
> > > > >>>>>>>>>>> effort
> > > > >>>>>>>>>>> in that direction. Additionally, will not a separate
> build
> > > that
> > > > >>>> only
> > > > >>>>>>>>>>> checks
> > > > >>>>>>>>>>> for CVE will trigger your initial concern of disclosing
> CVE
> > > in
> > > > >>>>> public?
> > > > >>>>>>>>>>>
> > > > >>>>>>>>>>> Thank you,
> > > > >>>>>>>>>>>
> > > > >>>>>>>>>>>> Vlad
> > > > >>>>>>>>>>>>
> > > > >>>>>>>>>>>>>
> > > > >>>>>>>>>>>>> On 10/27/17 14:28, Pramod Immaneni wrote:
> > > > >>>>>>>>>>>>>
> > > > >>>>>>>>>>>>> On Fri, Oct 27, 2017 at 11:51 AM, Vlad Rozov <
> > > > >> vro...@apache.org
> > > > >>>>>
> > > > >>>>>>>>>>>>> wrote:
> > > > >>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>> On 10/26/17 11:46, Pramod Immaneni wrote:
> > > > >>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>> On Thu, Oct 26, 2017 at 10:39 AM, Vlad Rozov <
> > > > >>>> vro...@apache.org>
> > > > >>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>> wrote:
> > > > >>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>> I guess you are mostly concerned regarding new CVE in
> > an
> > > > >>>>> existing
> > > > >>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>> dependency. Once such CVE is added to a database,
> will
> > > it
> > > > be
> > > > >>>>>>>>>>>>>>>> better
> > > > >>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>> to
> > > > >>>>>>>>>>>>>>>>> know
> > > > >>>>>>>>>>>>>>>>> about it or postpone discovery till we cut release
> > > > >>>> candidate?
> > > > >>>>> In
> > > > >>>>>>>>>>>>>>>>> case
> > > > >>>>>>>>>>>>>>>>> it
> > > > >>>>>>>>>>>>>>>>> is
> > > > >>>>>>>>>>>>>>>>> reported only during release cycle, there is much
> > less
> > > > time
> > > > >>>>> for
> > > > >>>>>>>>>>>>>>>>> the
> > > > >>>>>>>>>>>>>>>>> community to take an action and it still needs to
> be
> > > > taken
> > > > >>>>> (as a
> > > > >>>>>>>>>>>>>>>>> PMC
> > > > >>>>>>>>>>>>>>>>> member
> > > > >>>>>>>>>>>>>>>>> you are responsible for preventing release with
> > severe
> > > > >>>>> security
> > > > >>>>>>>>>>>>>>>>> issue
> > > > >>>>>>>>>>>>>>>>> going
> > > > >>>>>>>>>>>>>>>>> out). If it is reported once the information
> becomes
> > > > >>>>> available,
> > > > >>>>>>>>>>>>>>>>> there
> > > > >>>>>>>>>>>>>>>>> is
> > > > >>>>>>>>>>>>>>>>> more time to research and either upgrade the
> > dependency
> > > > >> with
> > > > >>>>>>>>>>>>>>>>> newly
> > > > >>>>>>>>>>>>>>>>> found
> > > > >>>>>>>>>>>>>>>>> CVE, agree that it does not impact the project.
> > > > >>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>> This would be the more commonly occurring scenario.
> > We
> > > > can
> > > > >>>>>>>>>>>>>>>>> always
> > > > >>>>>>>>>>>>>>>>> know
> > > > >>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>> about the CVEs because of your changes. We don't
> need
> > > to
> > > > >>>> fail
> > > > >>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>> builds to
> > > > >>>>>>>>>>>>>>>> do
> > > > >>>>>>>>>>>>>>>> that. I am not asking you to remove the reporting.
> > There
> > > > is
> > > > >>>> no
> > > > >>>>>>>>>>>>>>>> set
> > > > >>>>>>>>>>>>>>>> time
> > > > >>>>>>>>>>>>>>>> for
> > > > >>>>>>>>>>>>>>>> a release so having less time during release for
> > > > addressing
> > > > >>>>>>>>>>>>>>>> relevant
> > > > >>>>>>>>>>>>>>>> CVEs
> > > > >>>>>>>>>>>>>>>> does not come up. There is also nothing preventing
> > > anyone
> > > > >>>> from
> > > > >>>>>>>>>>>>>>>> looking
> > > > >>>>>>>>>>>>>>>> at
> > > > >>>>>>>>>>>>>>>> these reports and taking action earlier.
> > > > >>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>> I don't see why it will be more commonly occurring
> > > > scenario,
> > > > >>>>> but
> > > > >>>>>>>>>>>>>>>> I
> > > > >>>>>>>>>>>>>>>> think
> > > > >>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>> it is equally important to prevent new dependency
> with
> > > > >> severe
> > > > >>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>> vulnerabilities being introduced into the project and
> > > check
> > > > >>>>>>>>>>>>>>> existing
> > > > >>>>>>>>>>>>>>> dependencies for newly discovered severe
> > vulnerabilities.
> > > > >>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>> How will we know about CVE if it is removed from CI
> > > build?
> > > > >> Why
> > > > >>>>>>>>>>>>>>> require
> > > > >>>>>>>>>>>>>>> manual verification when it can be done during CI
> build
> > > and
> > > > >>>> does
> > > > >>>>>>>>>>>>>>> not
> > > > >>>>>>>>>>>>>>> affect
> > > > >>>>>>>>>>>>>>> builds done by individual contributors?
> > > > >>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>> While there is no set time for a release, there is no
> > set
> > > > >> time
> > > > >>>>>>>>>>>>>>> for a
> > > > >>>>>>>>>>>>>>> PR
> > > > >>>>>>>>>>>>>>> merge as well.
> > > > >>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>> Yes, nothing prevents anyone from looking at the
> > > dependency
> > > > >>>>>>>>>>>>>>> vulnerabilities, but there is a better chance that
> > > "anyone"
> > > > >>>> does
> > > > >>>>>>>>>>>>>>> not
> > > > >>>>>>>>>>>>>>> mean
> > > > >>>>>>>>>>>>>>> nobody if CI build fails.
> > > > >>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>> I still do not understand why you value an individual
> > > > >>>>> contributor
> > > > >>>>>>>>>>>>>>> and
> > > > >>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>> PR
> > > > >>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>> over the community and the project itself. Once
> there
> > > is a
> > > > >>>>> severe
> > > > >>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>> security
> > > > >>>>>>>>>>>>>>>>> vulnerability, it affects everyone who cares about
> > the
> > > > >>>>> project,
> > > > >>>>>>>>>>>>>>>>> including
> > > > >>>>>>>>>>>>>>>>> all contributors. I don't see a problem with a PR
> > being
> > > > in
> > > > >> a
> > > > >>>>>>>>>>>>>>>>> pending
> > > > >>>>>>>>>>>>>>>>> (not
> > > > >>>>>>>>>>>>>>>>> merged) open state till a build issue is resolved.
> > > > >>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>> That is a mischaracterization that you have stated
> > > before
> > > > >> as
> > > > >>>>>>>>>>>>>>>>> well. A
> > > > >>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>> project cannot grow without contributions and
> without
> > > > >>>> policies
> > > > >>>>>>>>>>>>>>>>> that
> > > > >>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>> create
> > > > >>>>>>>>>>>>>>>> a supportive enviroment where that can happen, I
> don't
> > > see
> > > > >>>> the
> > > > >>>>>>>>>>>>>>>> need
> > > > >>>>>>>>>>>>>>>> to
> > > > >>>>>>>>>>>>>>>> put
> > > > >>>>>>>>>>>>>>>> unnecessary obstacles for legitimate contributions
> > that
> > > > are
> > > > >>>> not
> > > > >>>>>>>>>>>>>>>> the
> > > > >>>>>>>>>>>>>>>> cause
> > > > >>>>>>>>>>>>>>>> of a problem. Everytime there is a matching CVE the
> > PRs
> > > > are
> > > > >>>>> going
> > > > >>>>>>>>>>>>>>>> to
> > > > >>>>>>>>>>>>>>>> get
> > > > >>>>>>>>>>>>>>>> blocked till that CVE is addressed and I am not
> > > confident
> > > > we
> > > > >>>>> have
> > > > >>>>>>>>>>>>>>>> the
> > > > >>>>>>>>>>>>>>>> bandwidth in the community to address this
> > expediently.
> > > It
> > > > >> is
> > > > >>>>>>>>>>>>>>>> also
> > > > >>>>>>>>>>>>>>>> inaccurate to equate this to PR not being merged
> till
> > > > build
> > > > >>>>>>>>>>>>>>>> issues
> > > > >>>>>>>>>>>>>>>> are
> > > > >>>>>>>>>>>>>>>> resolved as it derives from an assumption that CVE
> is
> > > same
> > > > >>>> as a
> > > > >>>>>>>>>>>>>>>> build
> > > > >>>>>>>>>>>>>>>> failure.
> > > > >>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>> While project can't grow without individual
> > > contributions,
> > > > >>>>>>>>>>>>>>>> project
> > > > >>>>>>>>>>>>>>>> is a
> > > > >>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>> result of a large number of contributions from a
> > number
> > > of
> > > > >>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>> contributors.
> > > > >>>>>>>>>>>>>>> Some of those contributors are not active anymore and
> > > will
> > > > >> not
> > > > >>>>>>>>>>>>>>> provide
> > > > >>>>>>>>>>>>>>> any
> > > > >>>>>>>>>>>>>>> fixes should a vulnerability be found in their
> > > > contribution.
> > > > >>>> It
> > > > >>>>>>>>>>>>>>> becomes a
> > > > >>>>>>>>>>>>>>> shared responsibility of all currently active
> community
> > > > >>>> members
> > > > >>>>>>>>>>>>>>> and
> > > > >>>>>>>>>>>>>>> those
> > > > >>>>>>>>>>>>>>> who submit PR are part of the community and share
> that
> > > > >>>>>>>>>>>>>>> responsibility,
> > > > >>>>>>>>>>>>>>> are
> > > > >>>>>>>>>>>>>>> not they? If a contributor considers him/herself as
> > part
> > > > of a
> > > > >>>>>>>>>>>>>>> community,
> > > > >>>>>>>>>>>>>>> why he or she can't wait for the build issue to be
> > > resolved
> > > > >> or
> > > > >>>>>>>>>>>>>>> better
> > > > >>>>>>>>>>>>>>> take
> > > > >>>>>>>>>>>>>>> an action on resolving the issue? The only possible
> > > > >>>> explanation
> > > > >>>>>>>>>>>>>>> that I
> > > > >>>>>>>>>>>>>>> see
> > > > >>>>>>>>>>>>>>> is the one that I already mentioned on this thread.
> > > > >>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>> If you see this as unnecessary obstacles for
> legitimate
> > > > >>>>>>>>>>>>>>> contributions,
> > > > >>>>>>>>>>>>>>> why
> > > > >>>>>>>>>>>>>>> to enforce code style, it is also unnecessary
> obstacle.
> > > > Unit
> > > > >>>>> test?
> > > > >>>>>>>>>>>>>>> Should
> > > > >>>>>>>>>>>>>>> it be considered to be optional for a PR to pass unit
> > > tests
> > > > >> as
> > > > >>>>>>>>>>>>>>> well?
> > > > >>>>>>>>>>>>>>> What
> > > > >>>>>>>>>>>>>>> if an environment change on CI side causes build to
> > fail
> > > > >>>> similar
> > > > >>>>>>>>>>>>>>> to
> > > > >>>>>>>>>>>>>>> what
> > > > >>>>>>>>>>>>>>> happened recently? Should we disable CI builds too
> and
> > > rely
> > > > >>>> on a
> > > > >>>>>>>>>>>>>>> committer
> > > > >>>>>>>>>>>>>>> or a release manager to run unit tests?  If CI build
> > > fails
> > > > >> for
> > > > >>>>>>>>>>>>>>> whatever
> > > > >>>>>>>>>>>>>>> reason, how can you be sure that if it fails for
> > another
> > > PR
> > > > >> as
> > > > >>>>>>>>>>>>>>> well,
> > > > >>>>>>>>>>>>>>> that
> > > > >>>>>>>>>>>>>>> they both fail for the same reason and there is no
> any
> > > > other
> > > > >>>>>>>>>>>>>>> reasons
> > > > >>>>>>>>>>>>>>> that
> > > > >>>>>>>>>>>>>>> will cause a problem with a PR?
> > > > >>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>> I don't know how failing PRs because of CVE, which we
> > > don't
> > > > >>>>>>>>>>>>>>> introduce,
> > > > >>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>> don't control, no idea of and possibly unrelated
> would
> > > fall
> > > > >> in
> > > > >>>>> the
> > > > >>>>>>>>>>>>>> same
> > > > >>>>>>>>>>>>>> bucket as unit tests. I am at a loss of words for
> that.
> > > > There
> > > > >>>> is
> > > > >>>>> no
> > > > >>>>>>>>>>>>>> reason
> > > > >>>>>>>>>>>>>> to block legitimate development for this. This can be
> > > > handled
> > > > >>>>>>>>>>>>>> separtely
> > > > >>>>>>>>>>>>>> and
> > > > >>>>>>>>>>>>>> in parallel. Maybe there is a way we can setup an
> > > > independent
> > > > >>>> job
> > > > >>>>>>>>>>>>>> on
> > > > >>>>>>>>>>>>>> a
> > > > >>>>>>>>>>>>>> build server that runs nightly, fails if there are new
> > > CVEs
> > > > >>>>>>>>>>>>>> discovered
> > > > >>>>>>>>>>>>>> and
> > > > >>>>>>>>>>>>>> sends an email out to the security or dev group. You
> > could
> > > > >> even
> > > > >>>>>>>>>>>>>> reduce
> > > > >>>>>>>>>>>>>> the
> > > > >>>>>>>>>>>>>> CVE threshold for this. I don't believe in a stick
> > > approach
> > > > >>>>> (carrot
> > > > >>>>>>>>>>>>>> and
> > > > >>>>>>>>>>>>>> stick metaphor) and believe in proportional measures.
> > > > >>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>> Thank you,
> > > > >>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>> Vlad
> > > > >>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>> On 10/26/17 09:42, Pramod Immaneni wrote:
> > > > >>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>> On Thu, Oct 26, 2017 at 12:08 AM, Vlad Rozov <
> > > > >>>>> vro...@apache.org
> > > > >>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>> wrote:
> > > > >>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>> There is a way to add an exception, but it needs to
> > be
> > > > >>>>> discussed
> > > > >>>>>>>>>>>>>>>>> on
> > > > >>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>> a
> > > > >>>>>>>>>>>>>>>>>> case
> > > > >>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>> by case basis. Note that CVEs are not published
> > until
> > > a
> > > > >> fix
> > > > >>>>> is
> > > > >>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>> available.
> > > > >>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>> For severity 8 CVEs I expect patches to become
> > > > available
> > > > >>>> for
> > > > >>>>>>>>>>>>>>>>>>> the
> > > > >>>>>>>>>>>>>>>>>>> reported
> > > > >>>>>>>>>>>>>>>>>>> version unless it is an obsolete version in which
> > > case,
> > > > >>>> the
> > > > >>>>>>>>>>>>>>>>>>> upgrade
> > > > >>>>>>>>>>>>>>>>>>> to
> > > > >>>>>>>>>>>>>>>>>>> a
> > > > >>>>>>>>>>>>>>>>>>> supported version is already overdue.
> > > > >>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>> I think we should retain the ability to make that
> > > > choice
> > > > >>>> of
> > > > >>>>>>>>>>>>>>>>>>> what
> > > > >>>>>>>>>>>>>>>>>>> and
> > > > >>>>>>>>>>>>>>>>>>> when
> > > > >>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>> to upgrade rather than hard enforce it. Like I
> > > > mentioned
> > > > >>>> the
> > > > >>>>>>>>>>>>>>>>>>> CVE
> > > > >>>>>>>>>>>>>>>>>>> may
> > > > >>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>> not
> > > > >>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>> apply to us (it has happened before), even though
> it
> > > may
> > > > >> be
> > > > >>>>>>>>>>>>>>>>>> beneficial
> > > > >>>>>>>>>>>>>>>>>> upgrade generally when its not applicable, there
> may
> > > not
> > > > >> be
> > > > >>>>> the
> > > > >>>>>>>>>>>>>>>>>> bandwidth
> > > > >>>>>>>>>>>>>>>>>> in community to do the necessary changes to
> upgrade
> > > to a
> > > > >>>>> newer
> > > > >>>>>>>>>>>>>>>>>> version
> > > > >>>>>>>>>>>>>>>>>> especially if those dependencies don't follow
> semver
> > > > (has
> > > > >>>>>>>>>>>>>>>>>> happened
> > > > >>>>>>>>>>>>>>>>>> before
> > > > >>>>>>>>>>>>>>>>>> as well, remember effort with ning). My caution
> > comes
> > > > from
> > > > >>>>>>>>>>>>>>>>>> experiencing
> > > > >>>>>>>>>>>>>>>>>> this situation before.
> > > > >>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>> I don't see how reporting helps. If a build
> > succeeds,
> > > I
> > > > >>>> don't
> > > > >>>>>>>>>>>>>>>>>> expect
> > > > >>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>> anyone to look into the report, it is only when CI
> > > build
> > > > >>>>> fails,
> > > > >>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>> committers
> > > > >>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>> and reviewers look into the details.
> > > > >>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>> We can add a mandatory step during release that
> we
> > > need
> > > > >> to
> > > > >>>>>>>>>>>>>>>>>>> assess
> > > > >>>>>>>>>>>>>>>>>>> CVEs
> > > > >>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>> matching this criteria before proceeding with the
> > > > >> release.
> > > > >>>>>>>>>>>>>>>>>>> This
> > > > >>>>>>>>>>>>>>>>>>> could
> > > > >>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>> end
> > > > >>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>> up requiring upgrade of some dependencies and in
> > other
> > > > >>>> cases
> > > > >>>>> it
> > > > >>>>>>>>>>>>>>>>>> may
> > > > >>>>>>>>>>>>>>>>>> not
> > > > >>>>>>>>>>>>>>>>>> be
> > > > >>>>>>>>>>>>>>>>>> needed. This assessment can also happen more often
> > in
> > > > >> adhoc
> > > > >>>>>>>>>>>>>>>>>> fashion
> > > > >>>>>>>>>>>>>>>>>> offline
> > > > >>>>>>>>>>>>>>>>>> before release based upon interest from
> community. I
> > > am
> > > > >>>> also
> > > > >>>>>>>>>>>>>>>>>> open
> > > > >>>>>>>>>>>>>>>>>> to
> > > > >>>>>>>>>>>>>>>>>> making
> > > > >>>>>>>>>>>>>>>>>> it mandatory with every PR, in future, like you
> are
> > > > >>>>> suggesting,
> > > > >>>>>>>>>>>>>>>>>> if
> > > > >>>>>>>>>>>>>>>>>> we
> > > > >>>>>>>>>>>>>>>>>> see
> > > > >>>>>>>>>>>>>>>>>> sufficient uptake in community on these issues.
> From
> > > > >>>>> experience
> > > > >>>>>>>>>>>>>>>>>> this
> > > > >>>>>>>>>>>>>>>>>> is
> > > > >>>>>>>>>>>>>>>>>> not
> > > > >>>>>>>>>>>>>>>>>> there currently and hence I don't want to do this
> > now.
> > > > >>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>> IMO, it does not matter how CVE is introduced. It
> > may
> > > > be a
> > > > >>>>> new
> > > > >>>>>>>>>>>>>>>>>> dependency
> > > > >>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>> with an existing CVE or it can be a new CVE for an
> > > > >> existing
> > > > >>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>> dependency.
> > > > >>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>> In
> > > > >>>>>>>>>>>>>>>>>>> both cases, dependency with the CVE needs to be
> > > fixed.
> > > > >>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>> In one case the PR is not directly responsible
> for
> > > the
> > > > >>>> issue
> > > > >>>>>>>>>>>>>>>>>>> and
> > > > >>>>>>>>>>>>>>>>>>> hence
> > > > >>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>> we
> > > > >>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>> should avoid penalizing them or block them.
> > > > >>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>> Thank you,
> > > > >>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>> Vlad
> > > > >>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>> On 10/25/17 11:58, Pramod Immaneni wrote:
> > > > >>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>> Thanks that sounds mostly fine except what
> happens
> > if
> > > > >>>> there
> > > > >>>>>>>>>>>>>>>>>>> is a
> > > > >>>>>>>>>>>>>>>>>>> cve
> > > > >>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>> matching that severity in a dependency but it
> > doesnt
> > > > >>>> affect
> > > > >>>>> us
> > > > >>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>> because
> > > > >>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>> let's say we don't exercise that part of
> > > functionality
> > > > >>>>> *and*
> > > > >>>>>>>>>>>>>>>>>>>> there
> > > > >>>>>>>>>>>>>>>>>>>> isn't a
> > > > >>>>>>>>>>>>>>>>>>>> fix available or there is a fix but the upgrade
> > > > requires
> > > > >>>>>>>>>>>>>>>>>>>> significant
> > > > >>>>>>>>>>>>>>>>>>>> effort
> > > > >>>>>>>>>>>>>>>>>>>> (for example if we need to move to a new major
> > > version
> > > > >> of
> > > > >>>>> the
> > > > >>>>>>>>>>>>>>>>>>>> dependency
> > > > >>>>>>>>>>>>>>>>>>>> or
> > > > >>>>>>>>>>>>>>>>>>>> something like that). Is there a way to add an
> > > > exception
> > > > >>>>> like
> > > > >>>>>>>>>>>>>>>>>>>> we
> > > > >>>>>>>>>>>>>>>>>>>> did
> > > > >>>>>>>>>>>>>>>>>>>> for
> > > > >>>>>>>>>>>>>>>>>>>> checkstyle in the interim. How about reporting
> > > instead
> > > > >> of
> > > > >>>>>>>>>>>>>>>>>>>> failing
> > > > >>>>>>>>>>>>>>>>>>>> the
> > > > >>>>>>>>>>>>>>>>>>>> builds. One of the steps in release process
> could
> > be
> > > > to
> > > > >>>>>>>>>>>>>>>>>>>> investigate
> > > > >>>>>>>>>>>>>>>>>>>> these
> > > > >>>>>>>>>>>>>>>>>>>> reports before proceeding with the release. If a
> > PR
> > > > >>>>>>>>>>>>>>>>>>>> introduces
> > > > >>>>>>>>>>>>>>>>>>>> new
> > > > >>>>>>>>>>>>>>>>>>>> cves
> > > > >>>>>>>>>>>>>>>>>>>> by
> > > > >>>>>>>>>>>>>>>>>>>> virtue of adding a new dependency or changing an
> > > > >> existing
> > > > >>>>>>>>>>>>>>>>>>>> version,
> > > > >>>>>>>>>>>>>>>>>>>> that
> > > > >>>>>>>>>>>>>>>>>>>> would be of interest and can be subject to
> > failure.
> > > Is
> > > > >>>>> there
> > > > >>>>>>>>>>>>>>>>>>>> a
> > > > >>>>>>>>>>>>>>>>>>>> way
> > > > >>>>>>>>>>>>>>>>>>>> to
> > > > >>>>>>>>>>>>>>>>>>>> distinguish that?
> > > > >>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>> On Wed, Oct 25, 2017 at 8:52 AM Vlad Rozov <
> > > > >>>>>>>>>>>>>>>>>>>> vro...@apache.org>
> > > > >>>>>>>>>>>>>>>>>>>> wrote:
> > > > >>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>> A CVE (should there be a vulnerability in
> existing
> > > or
> > > > a
> > > > >>>>> newly
> > > > >>>>>>>>>>>>>>>>>>>> introduced
> > > > >>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>> dependency) will not be exposed during the CI
> > build,
> > > > but
> > > > >>>>> the
> > > > >>>>>>>>>>>>>>>>>>>> build
> > > > >>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>> will
> > > > >>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>> fail if the CVE has severity 8 or above. To get
> > the
> > > > >>>>> details,
> > > > >>>>>>>>>>>>>>>>>>>>> it
> > > > >>>>>>>>>>>>>>>>>>>>> will
> > > > >>>>>>>>>>>>>>>>>>>>> be
> > > > >>>>>>>>>>>>>>>>>>>>> necessary to run dependency check manually.
> > > > >>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>> Thank you,
> > > > >>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>> Vlad
> > > > >>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>> On 10/24/17 16:27, Pramod Immaneni wrote:
> > > > >>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>> There was a lot of discussion on this but looks
> > > like
> > > > >>>> there
> > > > >>>>>>>>>>>>>>>>>>>>> was
> > > > >>>>>>>>>>>>>>>>>>>>> no
> > > > >>>>>>>>>>>>>>>>>>>>> final
> > > > >>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>> agreement. Can you summarize what your PR does?
> > Are
> > > > we
> > > > >>>>>>>>>>>>>>>>>>>>> disclosing
> > > > >>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>> the
> > > > >>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>> actual vulnerabilities as part of the
> automated
> > > > build
> > > > >>>> for
> > > > >>>>>>>>>>>>>>>>>>>>>> every
> > > > >>>>>>>>>>>>>>>>>>>>>> PR?
> > > > >>>>>>>>>>>>>>>>>>>>>> That
> > > > >>>>>>>>>>>>>>>>>>>>>> would be a no-no for me. If it is something
> that
> > > > >>>> requires
> > > > >>>>>>>>>>>>>>>>>>>>>> manual
> > > > >>>>>>>>>>>>>>>>>>>>>> steps,
> > > > >>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>> for
> > > > >>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>> example as part of a release build, that would
> > be
> > > > >> fine.
> > > > >>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>> On Mon, Oct 23, 2017 at 1:16 PM, Vlad Rozov <
> > > > >>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>> vro...@apache.org>
> > > > >>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>> wrote:
> > > > >>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>> Please see https://github.com/apache/
> > > > >>>> apex-core/pull/585
> > > > >>>>>>>>>>>>>>>>>>>>>> and
> > > > >>>>>>>>>>>>>>>>>>>>>> APEXCORE-790.
> > > > >>>>>>>>>>>>>>>>>>>>>> Thank you,
> > > > >>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>> Vlad
> > > > >>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>> On 9/14/17 09:35, Vlad Rozov wrote:
> > > > >>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>> Do you expect anything else from the community
> > to
> > > > >>>>> recognize
> > > > >>>>>>>>>>>>>>>>>>>>>>> a
> > > > >>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>> contribution other than committing it to the
> > code
> > > > >>>> line?
> > > > >>>>>>>>>>>>>>>>>>>>>>> Once
> > > > >>>>>>>>>>>>>>>>>>>>>>> there
> > > > >>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>> is
> > > > >>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>> a
> > > > >>>>>>>>>>>>>>>>>>>>>>>> steady flow of quality contributions, the
> > > > >>>> community/PMC
> > > > >>>>>>>>>>>>>>>>>>>>>>>> will
> > > > >>>>>>>>>>>>>>>>>>>>>>>> recognize
> > > > >>>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>> a
> > > > >>>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>> contributor by making that contributor a
> > > > committer.
> > > > >>>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>> Thank you,
> > > > >>>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>> Vlad
> > > > >>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>> On 9/12/17 13:05, Sanjay Pujare wrote:
> > > > >>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>> For a vendor too, quality ought to be as
> > > important
> > > > >> as
> > > > >>>>>>>>>>>>>>>>>>>>>>>> security
> > > > >>>>>>>>>>>>>>>>>>>>>>>> so
> > > > >>>>>>>>>>>>>>>>>>>>>>>> I
> > > > >>>>>>>>>>>>>>>>>>>>>>>> don't
> > > > >>>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>> think we disagree on the cost benefit
> > analysis.
> > > > But
> > > > >> I
> > > > >>>>> get
> > > > >>>>>>>>>>>>>>>>>>>>>>>> your
> > > > >>>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>> drift.
> > > > >>>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>> By "creative incentive" I didn't imply any
> > > > material
> > > > >>>>>>>>>>>>>>>>>>>>>>> incentive
> > > > >>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>> (although a
> > > > >>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>> gift card would be nice :-)) but more along
> the
> > > > lines
> > > > >>>> of
> > > > >>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>> what a
> > > > >>>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>> community
> > > > >>>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>> can do to recognize such contribution.
> > > > >>>>>>>>>>>>>>>>>>>>>>> Sanjay
> > > > >>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>> On Tue, Sep 12, 2017 at 8:10 AM, Vlad Rozov <
> > > > >>>>>>>>>>>>>>>>>>>>>>> vro...@apache.org>
> > > > >>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>> wrote:
> > > > >>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>> I guess we have a different view on the
> > benefit
> > > > and
> > > > >>>>> cost
> > > > >>>>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>>> definition.
> > > > >>>>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>> For
> > > > >>>>>>>>>>>>>>>>>>>>>>> me the benefit of fixing CI build, flaky unit
> > > test,
> > > > >>>>> severe
> > > > >>>>>>>>>>>>>>>>>>>>>>> security
> > > > >>>>>>>>>>>>>>>>>>>>>>> issue
> > > > >>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>> is huge for the community and is possibly
> small
> > > > >>>> (except
> > > > >>>>>>>>>>>>>>>>>>>>>>> for
> > > > >>>>>>>>>>>>>>>>>>>>>>> a
> > > > >>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>> security
> > > > >>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>> issues) for a vendor.
> > > > >>>>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>>>> By "creative" I hope you don't mean that
> > other
> > > > >>>>>>>>>>>>>>>>>>>>>>>>>> community
> > > > >>>>>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>>> members,
> > > > >>>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>> users
> > > > >>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>> and customers send a contributor a gift cards
> > to
> > > > >>>>>>>>>>>>>>>>>>>>>>> compensate
> > > > >>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>> for
> > > > >>>>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>>> the
> > > > >>>>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>>> cost
> > > > >>>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>> :). For me PR that is blocked on a failed CI
> > > build
> > > > >> is
> > > > >>>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>> sufficiently
> > > > >>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>> incentive for a contributor to look into why
> > it
> > > > >> fails
> > > > >>>>> and
> > > > >>>>>>>>>>>>>>>>>>>>>>>> fixing
> > > > >>>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>> it.
> > > > >>>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>> Thank you,
> > > > >>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>> Vlad
> > > > >>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>>> On 9/11/17 23:58, Sanjay Pujare wrote:
> > > > >>>>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>>>> I don't want to speak for others and I
> don't
> > > > want
> > > > >>>> to
> > > > >>>>>>>>>>>>>>>>>>>>>>>>>> generalize.
> > > > >>>>>>>>>>>>>>>>>>>>>>>>>> But
> > > > >>>>>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>>>> an
> > > > >>>>>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>>>> obvious answer could be "cost-benefit
> > > analysis".
> > > > >>>>>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>>>> In any case we should come up with a
> > creative
> > > > way
> > > > >>>> to
> > > > >>>>>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>>> "incentivize"
> > > > >>>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>> members
> > > > >>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>> to do these tasks.
> > > > >>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>>>>>>>>>>>>>>>>>>>>>>
> > > > >>>>>>
> > > > >>>>>
> > > > >>>>
> > > > >>
> > > > >>
> > > >
> > >
> >
>

Reply via email to