Hi folks In 2016, thanks to the generous sponsors on our Bountysource program and open source contributors, Clojars was able to:
* Move our hosting from Linode to servers sponsored by Rackspace * Define the server on Rackspace with Ansible so it is easy to rebuild * Validate deploys are correct and complete * Store JARs in Rackspace Cloudfiles for greater reliability * Serve JARs from a Fastly CDN (sponsored). This takes the Clojars servers completely out of the critical path of serving files, and should result in Clojars being very highly available * Switch from Yeller to Sentry for exception tracking * Make many smaller improvements as well As we look towards 2017, there are a number of issues on the Clojars issue tracker, but most of them are of low priority. We're interested in feedback from you the community as to where you see problems or room for improvements to Clojars. There is one major issue which I think has the potential to greatly improve security in the Clojure community: JAR signing. Previously Clojars required JAR signing to promote releases into a special repository. This only served to confuse most people, not many people promoted their artifacts, and there were minimal security benefits from signing the JARs, as people didn't have a web of trust to validate that the GPG signatures actually chained to people that they trusted. Clojars is in a very privileged position in your infrastructure, as many of you use it to directly download JARs to run on your production machines and developer infrastructure. It would be great if there was an option for security conscious organisations to be able to validate that all of the JARs they are using came from developers that they trusted. It would also be a goal that even if Clojars was compromised, clients would reject malicious code that didn't come from their expected sources. I feel that this would be useful for the Clojure (and wider JVM) ecosystem. However doing this will require a fair amount of time and effort, and it's only worth doing if people are interested and want a higher security option available to them. If you are interested, I encourage you to contribute to https://github.com/clojars/clojars-web/issues/562, https://github.com/clojars/clojars-web/issues/560, or this thread to share your perspective, requirements, and threat models that you think we should be working with. We're also interested in hearing what else you think is valuable for Clojars to focus on in 2017. Please reply on this thread with your thoughts. Thanks, Toby and Daniel. -- Daniel -- You received this message because you are subscribed to the Google Groups "Clojure" group. To post to this group, send email to clojure@googlegroups.com Note that posts from new members are moderated - please be patient with your first post. To unsubscribe from this group, send email to clojure+unsubscr...@googlegroups.com For more options, visit this group at http://groups.google.com/group/clojure?hl=en --- You received this message because you are subscribed to the Google Groups "Clojure" group. To unsubscribe from this group and stop receiving emails from it, send an email to clojure+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.