Thank you for the suggestion.

+1 for the general predefined (1-week) grace-period policy sounds good to me.

For the exception cases, I believe we can let the PMC members make the final 
decision on merge timing like the PMC members decides the `Blocker` level 
priority of JIRA issues already.

If we have a voted policy, it would be great if we can add the policy to 
AGENTS.md explicitly to apply the policy from the PR steps.

Best,
Dongjoon.

On 2026/04/22 20:47:24 Steve Loughran wrote:
> 7 days is long enough to catch most (all?) malicious attacks.
> 
> Regarding developers, there's a strong case to be made for only doing
> builds and especially tests in isolated containers, even though artifacts
> will leak across shared containers through a shared maven repo. It still
> limits the damage malicious binaries can do.
> 
> On Tue, 21 Apr 2026 at 23:58, Jungtaek Lim <[email protected]>
> wrote:
> 
> > +1
> >
> > We tend to consider that merging to master branch gives some time to bake
> > before releasing. But we (Spark devs) are people who build Spark and
> > run some tests against the master branch almost day to day. For us, there
> > is literally no time for these library upgrades to be baked - we are
> > exposed to any kind of potential CVE from these library upgrades.
> >
> > It's arguable whether we should stay up to date with the recent release
> > version for dependencies, but that'd probably be uneasy to make consensus;
> > there is a clear trade-off. The current proposal sounds to me as a good
> > compromise - IMHO delaying by 2 weeks (14 days) seems reasonable, but
> > strict 1 week (7 days) is better than nothing if anyone is concerned 2
> > weeks is too long.
> >
> > On Tue, Apr 21, 2026 at 9:45 PM Szehon Ho <[email protected]> wrote:
> >
> >> +1 make sense to me as well.  We should of course be fast for security
> >> upgrades, but make sense to avoid such eager upgrades for the rest of
> >> the hundreds of Spark dependencies, due to the increased supply chain
> >> attack risks in the ecosystem.
> >>
> >> Thanks
> >> Szehon
> >>
> >> On Tue, Apr 21, 2026 at 3:32 AM Wenchen Fan <[email protected]> wrote:
> >>
> >>> Thanks for starting this discussion! I did a data analysis a while ago
> >>> but didn't have time to act on it. The analysis shows:
> >>>
> >>> *58* maven dep upgrades in the last 3 months.
> >>> *46%* (27/58) within 7 days of release
> >>> ≤7d      : 27 / 58  (47%)
> >>> 8d–30d   : 12 / 58  (21%)
> >>> >30d     : 19 / 58  (32%)
> >>>
> >>> You can find the raw data in the attached file. This does look a bit
> >>> aggressive. I build Spark locally everyday, and I believe I'm not the only
> >>> one. Having a couple of weeks as the buffer time is a good idea to protect
> >>> developers like me from potential supply chain attacks.
> >>>
> >>> On Tue, Apr 21, 2026 at 6:24 AM Hyukjin Kwon <[email protected]>
> >>> wrote:
> >>>
> >>>> SGTM I think it's good practice to give a couple of weeks before the
> >>>> upgrade
> >>>>
> >>>> On Tue, 21 Apr 2026 at 07:13, Tian Gao via dev <[email protected]>
> >>>> wrote:
> >>>>
> >>>>> Hi, I want to start a discussion about our dependency upgrade policy
> >>>>> for active development.
> >>>>>
> >>>>> Our current dependency upgrade (mostly for Java, but Python should be
> >>>>> included too) is a bit spontaneous. People find that a dependency has a 
> >>>>> new
> >>>>> version available and we just do the upgrade.
> >>>>>
> >>>>> This raises concerns about potential supply chain attacks. We already
> >>>>> established a few sets of rules (including pinning the github action
> >>>>> versions) to avoid the supply chain attack, but manually upgrading the
> >>>>> dependency version too eagerly could also be risky.
> >>>>>
> >>>>> It normally takes time for a bad release to be recognized, so I think
> >>>>> we should set a buffer time before upgrading to the latest version. For
> >>>>> example, we can wait a week or two after the latest release before we 
> >>>>> set
> >>>>> our development dependency to it. This could reduce the possibility of
> >>>>> being impacted by malicious releases, or just give them enough time to 
> >>>>> fix
> >>>>> their own severe bugs.
> >>>>>
> >>>>> The cost for this policy is very low - it barely impacts us if we
> >>>>> can’t use the “latest” version of dependencies.
> >>>>>
> >>>>> Of course, there should be exceptions when dependency upgrades include
> >>>>> security fixes for known vulnerabilities; we should upgrade as fast as
> >>>>> possible.
> >>>>>
> >>>>> Tian
> >>>>>
> >>>>
> >>> ---------------------------------------------------------------------
> >>> To unsubscribe e-mail: [email protected]
> >>
> >>
> 

---------------------------------------------------------------------
To unsubscribe e-mail: [email protected]

Reply via email to