Daniel and Toby,

I do DevOps-y things for a living and would be more than willing to help 
with ansible stuff or potentially anything else.  Feel free to contact me 
directly.

- Chad

On Thursday, February 2, 2017 at 1:47:00 PM UTC-6, Daniel Compton wrote:
>
> Hi folks
>
> In 2016, thanks to the generous sponsors on our Bountysource program and 
> open source contributors, Clojars was able to:
>
> * Move our hosting from Linode to servers sponsored by Rackspace
> * Define the server on Rackspace with Ansible so it is easy to rebuild
> * Validate deploys are correct and complete
> * Store JARs in Rackspace Cloudfiles for greater reliability
> * Serve JARs from a Fastly CDN (sponsored). This takes the Clojars servers 
> completely out of the critical path of serving files, and should result in 
> Clojars being very highly available
> * Switch from Yeller to Sentry for exception tracking
> * Make many smaller improvements as well
>
> As we look towards 2017, there are a number of issues on the Clojars issue 
> tracker, but most of them are of low priority. We're interested in feedback 
> from you the community as to where you see problems or room for 
> improvements to Clojars.
>
> There is one major issue which I think has the potential to greatly 
> improve security in the Clojure community: JAR signing. Previously Clojars 
> required JAR signing to promote releases into a special repository. This 
> only served to confuse most people, not many people promoted their 
> artifacts, and there were minimal security benefits from signing the JARs, 
> as people didn't have a web of trust to validate that the GPG signatures 
> actually chained to people that they trusted.
>
> Clojars is in a very privileged position in your infrastructure, as many 
> of you use it to directly download JARs to run on your production machines 
> and developer infrastructure. It would be great if there was an option for 
> security conscious organisations to be able to validate that all of the 
> JARs they are using came from developers that they trusted. It would also 
> be a goal that even if Clojars was compromised, clients would reject 
> malicious code that didn't come from their expected sources.
>
> I feel that this would be useful for the Clojure (and wider JVM) 
> ecosystem. However doing this will require a fair amount of time and 
> effort, and it's only worth doing if people are interested and want a 
> higher security option available to them. If you are interested, I 
> encourage you to contribute to 
> https://github.com/clojars/clojars-web/issues/562,  
> https://github.com/clojars/clojars-web/issues/560, or this thread to 
> share your perspective, requirements, and threat models that you think we 
> should be working with.
>
> We're also interested in hearing what else you think is valuable for 
> Clojars to focus on in 2017. Please reply on this thread with your thoughts.
>
> Thanks, Toby and Daniel.
> -- 
>
> Daniel
>

-- 
You received this message because you are subscribed to the Google
Groups "Clojure" group.
To post to this group, send email to clojure@googlegroups.com
Note that posts from new members are moderated - please be patient with your 
first post.
To unsubscribe from this group, send email to
clojure+unsubscr...@googlegroups.com
For more options, visit this group at
http://groups.google.com/group/clojure?hl=en
--- 
You received this message because you are subscribed to the Google Groups 
"Clojure" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to clojure+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to