+1

On Fri, Feb 25, 2022, 17:00 Josh Fell <[email protected]>
wrote:

> +1
>
> On Tue, Feb 22, 2022 at 11:52 AM Jarek Potiuk <[email protected]> wrote:
>
>> Pushing code - true. But opening a PR requires either a UI access or
>> generated token (which has expiry and requires MFA). So you should not be
>> able to open multiple PRs with stolen SSH key. Which limits potential
>> damage you can do.
>>
>> With UI/token access you could actually make all our machines busy mining
>> Bitcoin in no time.  With SSH key you would be limited to how many opened
>> PRs the user already has.
>>
>> But regardless,  actually i think promoting MFA this way is just worthy
>> anyway even if it is not strictly necessary - as pure security education,
>> so +1 on that one Elad.
>>
>>
>> J
>>
>> wt., 22 lut 2022, 16:27 użytkownik Ash Berlin-Taylor <[email protected]>
>> napisał:
>>
>>> MFA doesn't do much to protect against malicious code pushes via stolen
>>> SSH keys so I don't think this is a necessary pre-condition, but we could
>>> do it anyway (or ensure MFA is on by inviting them to another GH org)
>>>
>>> -a
>>>
>>> On 22 February 2022 08:53:00 GMT, Elad Kalif <[email protected]> wrote:
>>>>
>>>> +1
>>>>
>>>> I would like to suggest we make a requirement that the trusted user has 2F
>>>> authentication
>>>> <https://docs.github.com/en/authentication/securing-your-account-with-two-factor-authentication-2fa/configuring-two-factor-authentication>
>>>> set to reduce the risk of hacking the account.
>>>> I think by joining the triage group ASF verifies it so there are some
>>>> benefits to it. If we decide against the triage group then I guess the
>>>> sponsor should verify it(?)
>>>>
>>>> On Tue, Feb 22, 2022 at 12:11 AM Vikram Koka
>>>> <[email protected]> wrote:
>>>>
>>>>> +1
>>>>>
>>>>> I really like the road to committership perspective on this as well!
>>>>> I also like the suggestion of a periodic (ideally automated) clean up
>>>>> of this list for inactive users and committers as well.
>>>>>
>>>>>
>>>>>
>>>>> On Fri, Feb 18, 2022 at 7:54 AM Jarek Potiuk <[email protected]> wrote:
>>>>>
>>>>>> +1. That will be a huge one and actually adds an interesting "path to
>>>>>> committership" intermediate step. Being a committer (for code) is
>>>>>> mostly the trust in the person that they can approve other's code.
>>>>>> This will be "trust that they can run their code on our
>>>>>> infrastructure".
>>>>>>
>>>>>> The nice thing about it is all trackable as well - which is enough
>>>>>> reason for no-one doing anything bad. And those permissions cannot
>>>>>> really impact much more than mostly impacting results of other CI
>>>>>> builds and potentially ab-using the power of our self-hosted machines
>>>>>> (which is not worthy to abuse just this one single repo - it would
>>>>>> only make sense if you find a mass way of abusing it).
>>>>>>
>>>>>> And if we trust people also because they are in a work relationship -
>>>>>> this is quite a good "trust" reason,
>>>>>>
>>>>>> One thing that I would add - it could be  great to add a periodic
>>>>>> (automated ? ) cleanup of the list for inactive users (maybe even
>>>>>> inactive committers in this case)? This will  - in the long run - make
>>>>>> the list more "accurate" and easier to maintain. Also There is this
>>>>>> (unlikely) even when GitHub user changes the username, there is
>>>>>> currently no good protection from someone actually "taking over" the
>>>>>> github name, so keeping the list to only "recently active" might help
>>>>>> with that a lot.
>>>>>>
>>>>>>
>>>>>> J.
>>>>>>
>>>>>> On Fri, Feb 18, 2022 at 4:07 PM Ash Berlin-Taylor <[email protected]>
>>>>>> wrote:
>>>>>> >
>>>>>> > Hi all,
>>>>>> >
>>>>>> > I'd like to propose we start allowing more users to use the
>>>>>> self-hosted runners -- they are much much quicker to run test workflows.
>>>>>> And by making promising people's tests run quicker hopefully we can
>>>>>> encourage them to make more PRs and continue on the path towards 
>>>>>> becoming a
>>>>>> committer.
>>>>>> >
>>>>>> > Currently only committers and PMC members test builds are run using
>>>>>> the self-hosted runners, everyone else has to use the GitHub public
>>>>>> runners. The "stuck in queue" issue doesn't plague us much anymore (I
>>>>>> think?), but the main issue is still that the GitHub runners only have 
>>>>>> 8GB
>>>>>> vs the 64GB of the self-hosted (half of which is used as RAM FS) and as a
>>>>>> result they are much, much slower.
>>>>>> >
>>>>>> > So I propose that we "allow users we trust" to run on the
>>>>>> self-hosted runners. This is purposefully a lighter weight process than
>>>>>> adding those users to the Triage group (which we need to have a
>>>>>> "vote"/mailing list for and then ask ASF Infra team to make the changes 
>>>>>> to)
>>>>>> and is essentially a way to make the contributing process nicer for those
>>>>>> that have shown interest and promise.
>>>>>> >
>>>>>> > I am thinking that this would often be used for "this person is
>>>>>> making a number of good quality PRs, and is on the road to being a
>>>>>> committer".
>>>>>> >
>>>>>> > In terms of project process, all I'm envisaging is that this
>>>>>> requires a PR to add someone's GitHub username to
>>>>>> https://github.com/apache/airflow/blob/366c66b8f6eddc0d22028ef494c62bb757bd8b8b/.github/workflows/ci.yml#L80-L123
>>>>>> and then the "normal" review process to get the change merged.
>>>>>> >
>>>>>> > By adding a user to that list the committer/PMC member is saying "I
>>>>>> am sponsoring this user and trust them to not be malicious".
>>>>>> >
>>>>>> > There will be a bit more work to finish this off, namely we'll need
>>>>>> to get https://github.com/apache/airflow-ci-infra/pull/20 finished
>>>>>> and working.
>>>>>> >
>>>>>> > We should probably be aware that if we do this it will likely be
>>>>>> "people we (committers) work with" in the first instance. Are we okay 
>>>>>> with
>>>>>> that, even if they haven't yet contributed (much/at all) to Airflow?
>>>>>> >
>>>>>> > Are there any other criteria that people thing we should apply
>>>>>> before adding users to this list?
>>>>>> >
>>>>>> > Thoughts?
>>>>>>
>>>>>
>>>
>>>

Reply via email to