On 1/7/19, 1:21 PM, "Allen Wittenauer" <a...@effectivemachines.com.INVALID> wrote:
> On Jan 7, 2019, at 11:50 AM, Alex Harui <aha...@adobe.com.INVALID> wrote: > > I don't understand. Who am I "making" do what work? And why do at least 3 others want something similar? And what would you propose Royale should do instead? Always have me cut releases? If their computers are broken, they could always spin up a free micro instance on AWS. Cut the release. Then spin it down. But it really makes me wonder how they are developing and testing their changes locally if building is such a burden ... Building the source code generally works for people. The RM's are having trouble pushing the built and packaged artifacts to Nexus. Fundamentally, I am trying to make it easier for our future RM's to cut a release. Adding more manual steps by spinning up AWS instances or manually pushing artifacts doesn't seem to make it easier. I thought it would be ok to ask Infra if we could let a bot make some minor changes to pom.xml files that are audited before the release is even voted on. Some helpful folks have given us things to watch out for in those changes. I would rather invest time in provisioning a shared machine than to try to get people to help debug intermittent network issues. Folks who are interested in helping us debug those network issues are welcome to engage the Royale community and the RMs who had the problems. To try to summarize where I think we are, the main concern is that someone will put together a Jenkins task to inject changes to Royale's pom.xml files and time it with the running of our release job and hope that our reviewers miss those changes. I agree there is risk there, but is the risk there significant? If you could run anything on Jenkins would you really attack Royale or run something else and attack a much more lucrative target? Greg pointed out the connection between an ICLA and a commit. That made me wonder: could we get a RoyalePMC committer account? The password and keys would be shared on the private@ list. I could then provision this shared computer on the Azure Windows VM I have as part of the free MSDN subscription from Microsoft. Builds@ would be better since it isn't subject to whether I continue to get this benefit from Microsoft, but if folks are too concerned that attackers can run jobs on builds@, what would it take to convince folks that nobody can run a job on my Azure VM and more than they could remote in to my laptop and do the same while I'm sleeping? We do not run PR tests on that VM. And any commits from this VM would come from a PMC member so there is an ICLA on behind it, although you may not know which PMC member ran the job. Thanks, -Alex