I agree with Marton. +1 for Marton's proposal. - Vivek Subramanian
On Wed, Mar 24, 2021 at 11:32 PM Elek, Marton <e...@apache.org> wrote: > > > > -1 > > > 1. If you are interested about the opinion of all the other > contributors, please start a discussion which is inclusive for all the > timezones and wait at least one day. > > 2. Force push is a very intrusive way, it causes new problems and it > doesn't solve the original problem itself. If any real secret is leaked, > it's already unsafe to use, independent if you remove it from the > history or not. > > There are bots which scans new commits and there are archives of the > github events (like https://www.gharchive.org/). Removing the commit > doesn't solve the problem as the secret is already leaked. > > It's not safe to use that secret any more whether you force push or not. > > 3. The right approach IMHO is revoking and invalidating the secret > itself and simply revert the commit. > > 4. Force-pushing invalidates all of our commit ids which are part of > our development history: the pull requests. All the merge links on the > reworked PRs no points to invalid commits which are not part of the master. > > 5. Force push is useless as you should force-push to all the forks > which includes the commit (impossible). > > 6. Force-push would be required not only to the master but to all the > existing feature-branch too (which would invalidate existing commits, > there, too.) (For example see git log origin/HDDS-2823 --grep=HDDS-4864) > > But it also requires to rewrite all the branches one (to rewrite the > merge commits only once) > > 7. Force-push is not safe, it's very easy to make a mistake by any > other developers. Push the old branches from local to any other branches > or forks where the secrets will remain be exposed. > > My proposal is: > > 1. Restore the master to the previous state. > 2. Invalidate/revoke the leaked secret ASAP > 3. Revert the problematic commit and recommit it without the problems > 4. (IN the future) do discussions which includes all the time-zones. > > Thanks, > Marton > > > > On 3/25/21 3:32 AM, Mukul Kumar Singh wrote: > > Hi, > > > > > > Recently, through one of the jiras(HDDS-4864), aws_secret_access_key was > > committed into Ozone's source code. Secrets, gpg passphrases, passwords, > > ssh private files should not be committed into Ozone source code as they > > leak credentials into the source code. > > > > This issue will be solved via the following steps > > > > a) The above commit will be removed from the Ozone commit history. We > > will force push to the Ozone master branch with this commit removed. > > > > b) A new commit hook/ CI check will be added to prevent this from > > hapennening again. > > > > Please hold off on merging any new changes into Ozone until the commit > > is removed from Apache commit history. > > > > Thanks, > > > > Mukul > > > > > > --------------------------------------------------------------------- > > To unsubscribe, e-mail: dev-unsubscr...@ozone.apache.org > > For additional commands, e-mail: dev-h...@ozone.apache.org > > > > --------------------------------------------------------------------- > To unsubscribe, e-mail: dev-unsubscr...@ozone.apache.org > For additional commands, e-mail: dev-h...@ozone.apache.org > > -- Regards, Vivek Subramanian