-1


1. If you are interested about the opinion of all the other contributors, please start a discussion which is inclusive for all the timezones and wait at least one day.

2. Force push is a very intrusive way, it causes new problems and it doesn't solve the original problem itself. If any real secret is leaked, it's already unsafe to use, independent if you remove it from the history or not.

There are bots which scans new commits and there are archives of the github events (like https://www.gharchive.org/). Removing the commit doesn't solve the problem as the secret is already leaked.

It's not safe to use that secret any more whether you force push or not.

3. The right approach IMHO is revoking and invalidating the secret itself and simply revert the commit.

4. Force-pushing invalidates all of our commit ids which are part of our development history: the pull requests. All the merge links on the reworked PRs no points to invalid commits which are not part of the master.

5. Force push is useless as you should force-push to all the forks which includes the commit (impossible).

6. Force-push would be required not only to the master but to all the existing feature-branch too (which would invalidate existing commits, there, too.) (For example see git log origin/HDDS-2823 --grep=HDDS-4864)

But it also requires to rewrite all the branches one (to rewrite the merge commits only once)

7. Force-push is not safe, it's very easy to make a mistake by any other developers. Push the old branches from local to any other branches or forks where the secrets will remain be exposed.

My proposal is:

 1. Restore the master to the previous state.
 2. Invalidate/revoke the leaked secret ASAP
 3. Revert the problematic commit and recommit it without the problems
 4. (IN the future) do discussions which includes all the time-zones.

Thanks,
Marton



On 3/25/21 3:32 AM, Mukul Kumar Singh wrote:
Hi,


Recently, through one of the jiras(HDDS-4864), aws_secret_access_key was committed into Ozone's source code. Secrets, gpg passphrases, passwords, ssh private files should not be committed into Ozone source code as they leak credentials into the source code.

This issue will be solved via the following steps

a) The above commit will be removed from the Ozone commit history. We will force push to the Ozone master branch with this commit removed.

b) A new commit hook/ CI check will be added to prevent this from hapennening again.

Please hold off on merging any new changes into Ozone until the commit is removed from Apache commit history.

Thanks,

Mukul


---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@ozone.apache.org
For additional commands, e-mail: dev-h...@ozone.apache.org


---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@ozone.apache.org
For additional commands, e-mail: dev-h...@ozone.apache.org

Reply via email to