On Mon, Jan 7, 2019 at 8:39 AM stephen.alan.conno...@gmail.com <
stephen.alan.conno...@gmail.com> wrote:

> On 2019/01/07 14:35:08, Greg Stein <gst...@gmail.com> wrote:
> > On Sun, Jan 6, 2019 at 10:20 PM Alex Harui <aha...@adobe.com.invalid>
> wrote:
> > >...
> >
> > > All commits, even PR's from non-commiters accepted by a committer are
> > > supposed to be reviewed, AIUI.  So if the bot makes a commit to the
> repo,
> > > the PMC is responsible for reviewing it.  In Royale's case, the bot
> should
> > > only be changing pom.xml files and making tags and branches, so a bad
> bot
> > > commit should be easy to spot and detection may even be tool-able.
> > >
> >
> > Git does not have path-based authorization, so there is no way to
> restrict
> > a bot from changing *code*. Give it access to pom.xml, and it has access
> to
> > the entire repository. "But the bot won't do that" ... Well, the bot is
> not
> > auditable by Legal Affairs or Infrastructure, so there is no way to
> > validate it is committing Properly.
>
> The bot doesn't need commit access to gitbox... it needs commit access to
> *a* git repo. The RM then pulls the tag from that repo and pushes it *after
> review* back to gitbox.
>
> And there's your auditability for you ;-)
>

Then make that git repo a local clone, hmm?

If you're talking a public one, then what is the "ask" from Infra for this
repo? Every PMC can self-serve create git repositories as they need them.
So it would seem "do that", then you'd need to ask for some extra authz to
enable the bot for that one repository? And what is the mechanism to
prevent leakage of released code into that repository? Or, say, the bot
adjusting pom.xml to pull in malware from $bad ?

Cheers,
-g

Reply via email to