Joe/David, Both of you make fair points on the technical side, but I think the wording and optics probably needs some careful work before we make things official to avoid giving the impression that this is a hoop teams need to jump through very soon or bad things could happen.
On Thu, Nov 7, 2024 at 11:01 AM David Handermann < exceptionfact...@apache.org> wrote: > Team, > > One general thing to note regarding migration: declaring the version 1 > series EOL should not be coupled to migration timelines. > > Users are free to set their own paths for upgrading as needed. The > point of declaring version 1 EOL is to emphasize that migration needs > to be scheduled. We see enough users of NiFi 1 versions from years ago > to know that upgrades take time. > > The important point to emphasize is that the NiFi project cannot > provide support for components that are already unsupported. > > Regards, > David Handermann > > On Thu, Nov 7, 2024 at 9:51 AM David Handermann > <exceptionfact...@apache.org> wrote: > > > > Mike, > > > > Although I understand the desire to provide basic support for > > historical versions of NiFi, attempting to upgrade these foundational > > dependencies in the NiFi 1 series is not a tenable path forward. > > > > The level of effort to modernize the frameworks for both frontend and > > backend in NiFi 2 was very high, covering all aspects of the project. > > The frontend involved a complete rebuild, and the backend required > > changes to most framework components. > > > > With the need to upgrade to Java 17 at minimum, such an approach does > > not seem like it would be helpful, even if it were worth considering > > the massive effort involved. > > > > As Joe has highlighted in previous comments, we outlined these issues > > several years ago as the path for NiFi 2. Given that background, > > providing ongoing support for NiFi 1 is not an option based on the > > foundational library and Java constraints. > > > > Regards, > > David Handermann > > > > > > > > > > On Thu, Nov 7, 2024 at 9:31 AM Joe Witt <joe.w...@gmail.com> wrote: > > > > > > Mike, > > > > > > I do not believe there is a viable path that addresses the JVM base, > Spring > > > base, Jetty base, Front-end Code changes, and the many other realities > of > > > how crusty the 1.x line has become that would not end up effectively > just > > > being what NiFi 2.0 is already. And for sure what you're suggesting > we can > > > estimate rather well given we did all these things already. > > > > > > As far as declaring EOL now, in 3 months, one year.... All of these > > > timelines are fine provided we (the PMC) have specific people > volunteering > > > to do what is proposed. > > > > > > Can you please suggest or specify what you would change relative to the > > > latest proposal? > > > > > > Thanks > > > > > > On Thu, Nov 7, 2024 at 8:16 AM Mike Thomsen <mikerthom...@gmail.com> > wrote: > > > > > > > Joe, > > > > > > > > One way forward to help out users on 1.X would be to explore > creating an > > > > EOL support release of 1.28 that incorporates the 2.0 Spring 6 > changes, > > > > bumps the JDK requirement to 17 and provides a "just good enough" > Java 17 > > > > baseline support. I don't know what the LOE would be on the front > end side > > > > for Angular support, but I think a 1.29 release that only gets point > > > > releases that incorporate CVE fixes and that is supported for a year > would > > > > be a compromise most users could accept. > > > > > > > > I share Russ's concerns and think that we run the risk of a creating > a > > > > major perception problem if we don't provide a longer migration > period for > > > > teams on 1.X. > > > > > > > > On Wed, Nov 6, 2024 at 1:56 PM Joe Witt <joe.w...@gmail.com> wrote: > > > > > > > > > "I'm not sure what "we will not be doing further analysis/triage of > > > > > security > > > > > reports" means, especially the term "we". Seems like if we do that > during > > > > > the release process already then we shouldn't stop. If it refers to > > > > > community members having to do such analysis themselves, I'm not > sure why > > > > > we'd make a point of saying we won't." > > > > > > > > > > It is a proposal. So 'we' is all of us - as proposed. More > specifically > > > > > though the 'we' represented there are those who are on and > participate in > > > > > the security mailing list which is where reports of > vulnerabilities or > > > > > suspected vulnerabilities or just questions that people aren't > sure are > > > > > security related or not come into. When things are reported > against 1.x > > > > > they require analysis to determine if it is actually vulnerable > and to > > > > > craft/consider fixes. > > > > > > > > > > It is essential we are clear about our posture there. We do not > want > > > > users > > > > > expecting/assuming reports against 1.x will be receiving a level of > > > > > scrutiny and follow-through that they will not. My proposal is > that we > > > > > make it clear and don't address such reports on the 1.x line any > longer > > > > and > > > > > are able to cite/refer to the items in the proposal. > > > > > > > > > > We would still of course still do dependency bumps as normal > course but > > > > > that alone with bug fixes are subject to people in the community > doing > > > > that > > > > > work. > > > > > > > > > > > > > > > On Wed, Nov 6, 2024 at 11:35 AM Matt Burgess <mattyb...@apache.org > > > > > > wrote: > > > > > > > > > > > My two cents: > > > > > > > > > > > > 1. The EOL/EOS label is fine with me, as Apache software I'm not > even > > > > > sure > > > > > > what that means in general (sounds like more of a marketing > thing), > > > > but I > > > > > > have seen other projects like Hive vote for EOL of older release > lines. > > > > > For > > > > > > your proposed definition, reasonable periodic bug fixes and > dependency > > > > > > upgrades based on discovered vulnerabilities also sound good. > However > > > > I'm > > > > > > not sure what "we will not be doing further analysis/triage of > security > > > > > > reports" means, especially the term "we". Seems like if we do > that > > > > during > > > > > > the release process already then we shouldn't stop. If it refers > to > > > > > > community members having to do such analysis themselves, I'm not > sure > > > > why > > > > > > we'd make a point of saying we won't. > > > > > > > > > > > > I certainly agree that there should be no new features added in > 1.28.x, > > > > > but > > > > > > in terms of bug fix / vulnerability things, I would like to just > have > > > > > > dot-releases as necessary, so no 1.29 but perhaps a 1.28.2 or .3 > as the > > > > > > need arises. The community is free to vote or abstain from > voting as > > > > they > > > > > > choose. I also don't think there needs to be any cadence, just > someone > > > > > > bringing it up for discussion (and having a good reason to > produce a > > > > > > release). > > > > > > > > > > > > I agree with points 2-6. > > > > > > > > > > > > Regards, > > > > > > Matt > > > > > > > > > > > > On Tue, Nov 5, 2024 at 11:31 AM Joe Witt <joe.w...@gmail.com> > wrote: > > > > > > > > > > > > > To be actionable and concrete here is a proposal: > > > > > > > > > > > > > > 1. Declare the NiFi 1.28.x line as the 'End of Life/End of > Support' > > > > > line. > > > > > > > This means we may still do periodic bug fixes or when > > > > > possible/reasonable > > > > > > > bump vulnerable libs. But we will not be doing further > > > > analysis/triage > > > > > > of > > > > > > > security reports nor adding features. > > > > > > > > > > > > > > 2. Add a DISCLAIMER to the source and key binaries of the > 1.x/1.28 > > > > line > > > > > > > [1]. > > > > > > > > > > > > > > 3. Update the downloads page making the links for nifi source > and the > > > > > > main > > > > > > > nifi assembly of whatever is the latest NiFi 1.28.x release > there but > > > > > > > clearly articulated as the end of support line for which bug > fixes > > > > and > > > > > > some > > > > > > > narrow dependency updates may occur. Advise users of the 1.x > line of > > > > > the > > > > > > > importance of planning to migrate to the 2.x line. > > > > > > > > > > > > > > 4. Conduct a VOTE to codify this. > > > > > > > > > > > > > > 5. Conduct an Apache NiFi 1.28.1 release to pickle up (2) and > the bug > > > > > > fixes > > > > > > > already available. > > > > > > > > > > > > > > 6. As we gather more user input on things which are helpful to > them > > > > we > > > > > > > factor these into migration guidance/tooling as appropriate on > the > > > > 2.x > > > > > > > line. > > > > > > > > > > > > > > Thanks > > > > > > > > > > > > > > [1] https://github.com/apache/nifi/pull/9491 > > > > > > > > > > > > > > On Tue, Nov 5, 2024 at 9:04 AM Joe Witt <joe.w...@gmail.com> > wrote: > > > > > > > > > > > > > > > Team, > > > > > > > > > > > > > > > > I will start a discussion thread on the users list so we can > hear > > > > > more > > > > > > > > inputs from them and from that perspective. > > > > > > > > > > > > > > > > This thread needs to focus on what the > contributors/committers/PMC > > > > in > > > > > > the > > > > > > > > community can/will/should do and the PMC in particular as > we're > > > > > > obligated > > > > > > > > to ensure we're putting out software for which we can stand > behind > > > > > its > > > > > > > > security posture. > > > > > > > > > > > > > > > > We do not need to get worried about customers. They have > vendors > > > > > that > > > > > > > > support them. What we need to worry about and continue to > do an > > > > > > > excellent > > > > > > > > job caring for is the apache nifi user base and we need to > ensure > > > > > they > > > > > > > > don't have the belief that the NiFi 1.x line will be fixed > in the > > > > > > > presence > > > > > > > > of vulnerability reports. I'll ask on the users list how > folks > > > > would > > > > > > > like > > > > > > > > us to communicate about the state of things. > > > > > > > > > > > > > > > > What I think we need to ask here is more in the spirit of > what this > > > > > > > thread > > > > > > > > was started about. When do we as a > contributor/committer/PMC base > > > > > want > > > > > > > to > > > > > > > > make it official in our own sense that we will not be > producing > > > > > > releases > > > > > > > > for the 1.x line? How we best communicate/help the user > base then > > > > > > > follows > > > > > > > > from that. Stated another way those who feel they will be > in a > > > > good > > > > > > > > position to do security reviews, vulnerability scans and > > > > remediation, > > > > > > > > conduct releases for some period of time please share what > you > > > > think > > > > > > > you'll > > > > > > > > be able to do and roughly for how long. > > > > > > > > > > > > > > > > Thanks > > > > > > > > > > > > > > > > On Tue, Nov 5, 2024 at 3:36 AM Pierre Villard < > > > > > > > pierre.villard...@gmail.com> > > > > > > > > wrote: > > > > > > > > > > > > > > > >> Hi all, > > > > > > > >> > > > > > > > >> While I think we could set an EOL date a bit further in the > > > > future, > > > > > it > > > > > > > is > > > > > > > >> important to keep in mind what EOL means. It only means we > won't > > > > be > > > > > > > >> providing security fixes / bug fixes through new releases. > It does > > > > > not > > > > > > > >> mean that NiFi 1.x is gone. If that is a big concern for > some > > > > users > > > > > > when > > > > > > > >> running EOL software then we should remind those users that > > > > they've > > > > > > been > > > > > > > >> doing it for 2+ years already when using NiFi 1.x (taking > Jetty as > > > > > an > > > > > > > >> example here). And Joe is definitely right when saying that > we > > > > have > > > > > a > > > > > > > >> smaller and smaller group of people willing to spend an > extensive > > > > > > amount > > > > > > > >> of > > > > > > > >> time taking care of PR/reviews, of release candidates, > > > > > > > testing/validating > > > > > > > >> RCs, etc, for the 1.x line. > > > > > > > >> > > > > > > > >> I also agree that, even if many users are already using > NiFi 2 in > > > > > > > >> production, many places have strict policies to not adopt a > new > > > > > major > > > > > > > >> release. I don't want to start a debate whether this is > making > > > > sense > > > > > > or > > > > > > > >> not > > > > > > > >> but we know those rules exist in many places :) And the > fact that > > > > we > > > > > > had > > > > > > > >> milestone releases for one year is not going to be enough > of an > > > > > > > argument. > > > > > > > >> > > > > > > > >> Given what we've seen in the past, we usually make a new > release > > > > > > every 3 > > > > > > > >> months or so. It's probably fair to assume a 2.1.0 release > will > > > > > happen > > > > > > > >> early next year. With that in mind, I tend to agree with > Michael > > > > > > > >> suggesting > > > > > > > >> an EOL date at the end of January (3 months from now). We > could > > > > also > > > > > > say > > > > > > > >> that 1.28.1 will happen at this time and will be the last > one in > > > > the > > > > > > > >> community. > > > > > > > >> > > > > > > > >> Vendors have already announced support for NiFi 1.x for > multiple > > > > > > > >> additional > > > > > > > >> years so this approach follows what we see in other > projects where > > > > > > > >> extended > > > > > > > >> support is only provided through paid options with specific > > > > > companies. > > > > > > > >> > > > > > > > >> It is awesome to finally see 2.0 out and this decision will > help > > > > > drive > > > > > > > >> users to that new release, which is much better in so many > ways... > > > > > > > >> > > > > > > > >> Thanks, > > > > > > > >> Pierre > > > > > > > >> > > > > > > > >> > > > > > > > >> Le mar. 5 nov. 2024 à 10:36, Isha Lamboo < > > > > > > > isha.lam...@virtualsciences.nl> > > > > > > > >> a > > > > > > > >> écrit : > > > > > > > >> > > > > > > > >> > Hi all, > > > > > > > >> > > > > > > > > >> > I understand the reasons to declare an EOL quickly, given > the > > > > > > external > > > > > > > >> > dependencies, but like Russell said before the short > notice is > > > > > going > > > > > > > to > > > > > > > >> > cause trouble with our bigger corporate customers. It > would have > > > > > > been > > > > > > > >> nice > > > > > > > >> > to have the EOL date announced about a year ago, even if > it had > > > > > > been a > > > > > > > >> > provisional one. The more you can delay it now, the less > > > > > > credibility I > > > > > > > >> (and > > > > > > > >> > NiFi itself) lose :-\ > > > > > > > >> > > > > > > > > >> > I've been pushing since the first announcement of NiFi > 2.0 for > > > > our > > > > > > > >> > customers to prepare. The smaller NiFi instances are all > > > > prepared. > > > > > > But > > > > > > > >> > there are also big customers with hundreds of flows that > depend > > > > on > > > > > > > >> > variables and XML templates, and as you can imagine this > was > > > > > never a > > > > > > > >> > priority for them without either a NiFi 2.0 GA to move to > or an > > > > > > actual > > > > > > > >> EOL > > > > > > > >> > date to get security officers upping the priority. > > > > > > > >> > > > > > > > > >> > Now we have a GA release finally, but corporate Q4 plans > are set > > > > > in > > > > > > > >> stone > > > > > > > >> > and Q1 2025 plans are already filling up. Telling the > customers' > > > > > > > >> > development teams to upend their plans and tell their > business > > > > > > > >> customers to > > > > > > > >> > forget deliveries because NiFi needs to be fixed ASAP is > > > > probably > > > > > > not > > > > > > > >> going > > > > > > > >> > to fly and instead going to seriously dent NiFi's > reputation and > > > > > > > >> position. > > > > > > > >> > Unless we can automate the flow migration process it's > going to > > > > > be a > > > > > > > >> > year-long migration at least. > > > > > > > >> > > > > > > > > >> > That said, are there any tools or scripts to make the > migration > > > > > > > >> smoother? > > > > > > > >> > Configuring multiple levels of parameter contexts with > > > > inheritance > > > > > > is > > > > > > > a > > > > > > > >> > labor-intensive process if we are to mirror the current > setup > > > > with > > > > > > > >> > variables being inherited from main canvas, team PG, > subject PG > > > > > and > > > > > > > flow > > > > > > > >> > PG, etc. Anything that could go through the process > groups and > > > > > > > configure > > > > > > > >> > this automatically would be greatly appreciated. I will > look > > > > into > > > > > > that > > > > > > > >> > myself too, but anything helps really. > > > > > > > >> > > > > > > > > >> > Regards, > > > > > > > >> > > > > > > > > >> > Isha > > > > > > > >> > > > > > > > > >> > -----Oorspronkelijk bericht----- > > > > > > > >> > Van: Joe Witt <joe.w...@gmail.com> > > > > > > > >> > Verzonden: maandag 4 november 2024 23:44 > > > > > > > >> > Aan: dev@nifi.apache.org > > > > > > > >> > Onderwerp: Re: [DISCUSS] End-of-life timing for NiFi 1 > > > > > > > >> > > > > > > > > >> > The EOL discussion is not here because we have a new > problem. > > > > It > > > > > is > > > > > > > >> here > > > > > > > >> > because we finally have an answer. > > > > > > > >> > > > > > > > > >> > The inability to address reported vulnerabilities or > fundamental > > > > > end > > > > > > > of > > > > > > > >> > life status for key underlying components in the 1.x line > is a > > > > > > problem > > > > > > > >> that > > > > > > > >> > was fully recognized three years ago. > > > > > > > >> > > > > > > > > >> > In that time we created a plan for what NiFi 2.0 would be > and > > > > how > > > > > > we'd > > > > > > > >> > manage both maintaining the 1.x line while building to > the 2.x > > > > GA. > > > > > > In > > > > > > > >> the > > > > > > > >> > past year we've conducted four milestone releases of NiFi > 2.x > > > > and > > > > > > > we've > > > > > > > >> > continued putting out feature, bug fix, and security > improvement > > > > > > > >> releases > > > > > > > >> > of 1.x. > > > > > > > >> > > > > > > > > >> > Feature bearing releases of 1.x are no longer appropriate > as 2.x > > > > > is > > > > > > > here > > > > > > > >> > and GA and that was the plan all along. > > > > > > > >> > > > > > > > > >> > Bug fixes are still reasonable in spirit but you need > people to > > > > > > submit > > > > > > > >> the > > > > > > > >> > JIRAs, fix the JIRAs, peer review the changes, and to > conduct > > > > > > releases > > > > > > > >> and > > > > > > > >> > make votes. That is in increasingly short supply as it > has been > > > > > > quite > > > > > > > >> the > > > > > > > >> > task splitting attention across two major lines and > naturally > > > > > > > developers > > > > > > > >> > and users will gravitate toward the go forward path. > > > > > > > >> > > > > > > > > >> > Vulnerability/Security related considerations are where > things > > > > are > > > > > > > >> > fundamentally problematic. We had a security report > today about > > > > > the > > > > > > > >> super > > > > > > > >> > old/outdated front-end libraries we use in 1.x. That > won't > > > > > change. > > > > > > > We > > > > > > > >> had > > > > > > > >> > a report last week about Spring libraries needing updated > except > > > > > you > > > > > > > >> can't > > > > > > > >> > unless you have Pivotal support so not an option. Those > won't > > > > > > change. > > > > > > > >> We > > > > > > > >> > have had questions around Jetty changes but that is tied > to Java > > > > > 8. > > > > > > > >> We've > > > > > > > >> > had questions about Java 8 being end of life and even > Java 11 > > > > and > > > > > > even > > > > > > > >> now > > > > > > > >> > Java 17 in terms of its codebase permissive licensing > changing. > > > > > The > > > > > > > >> things > > > > > > > >> > we can reasonably address in the 1.x line are getting > smaller > > > > and > > > > > > > >> smaller > > > > > > > >> > and the time required to address any new thing is higher > and > > > > > higher. > > > > > > > >> > > > > > > > > >> > We as a community, regardless of good intentions, cannot > fix the > > > > > > > >> illities > > > > > > > >> > of the 1.x line and thus the 2.x line is here. The 1.x > line > > > > will > > > > > > > >> > absolutely continue to atrophy and it will accelerate. > If we do > > > > > not > > > > > > > >> signal > > > > > > > >> > EOL on 1.x that means we're saying we can keep fixing > problems. > > > > > > While > > > > > > > >> that > > > > > > > >> > is true for bugs, that is not true for vulnerabilities > broadly > > > > and > > > > > > for > > > > > > > >> our > > > > > > > >> > most critical components. > > > > > > > >> > > > > > > > > >> > If you still fix bugs people assume this means you still > > > > > reasonably > > > > > > > fix > > > > > > > >> > vulnerabilities/etc.. And unless we declare EOL on the > 1.x line > > > > > we > > > > > > > will > > > > > > > >> > continue to get non-serviceable reports and mislead the > user > > > > base. > > > > > > > >> > > > > > > > > >> > The answer is to clearly signal that users should > transition to > > > > > the > > > > > > > 2.x > > > > > > > >> > line and focus our help on answering questions people > might have > > > > > on > > > > > > > how > > > > > > > >> to > > > > > > > >> > do that. > > > > > > > >> > > > > > > > > >> > I am supportive of EOL for the 1.x line. I also like the > poetic > > > > > > > nature > > > > > > > >> of > > > > > > > >> > the decade timing. > > > > > > > >> > > > > > > > > >> > On Mon, Nov 4, 2024 at 2:47 PM David Handermann < > > > > > > > >> > exceptionfact...@apache.org> > > > > > > > >> > wrote: > > > > > > > >> > > > > > > > > >> > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > >