because of the restrictions imposed. Your initial
suggestion of reducing the ability to move files around, which IMO
is fundamental to a build system, is just causing all these
moments of pain dealing with hudson at eclipse to resurface.
At a time where the foundation is thinking of providing a
common build infrastructure in the context of the LTS
initiative, it seems that this decisions / recommendations are
being at odds with the overall goal of making it easy to build
at Eclipse (and fuel the discussions of continuing building
things being corporate firewalls: the infrastructure is hard to
work with and can't be trusted (this is the conclusion someone
would get looking at this thread)).
At this point I don't have a particular solution to offer for
the given problem and instead I'm proposing to start list of the
"freedoms" committers need to have to be able to successfully
leverage the infrastructure put in place. So here it is:
- Need to request creation of a build job.
you
trust me to write code and commit it but not to create a job
- Difficulties to follow the typical workflows of deploying
from Hudson (be it a file system, or a maven repo)
Btw, the
cron approach may ends up partially copying repos. Also it does
not anyone to control the complete end to end build from Hudson.
- Inability to get a stack dump from a slave when the test
are the build is stuck
HTH
PaScaL
On 2011-09-14, at 11:27 AM, Denis Roy wrote:
I never said anyone should do any of
that. I never said you shouldn't trust the
output of Hudson either.
I only suggested what is in the subject line of
this email: allowing Hudson to write to your
downloads is a Bad Idea. And I explained why.
We simply got here for argument's sake.
Denis
On 09/14/2011 11:15 AM, Chris Recoskie wrote:
So... suddenly our builds will take days for
someone to build it, grab it, test it, and
promote it, and even then it's highly unlikely
that they'd catch anything that a somewhat
competent attacker would throw at us. There's
no way anyone is going to take on this
overhead.
===========================
Chris Recoskie
Team Lead, IBM CDT and RDT
IBM Toronto
<unnamed.gif>Denis Roy ---09/14/2011
10:09:39 AM---On 09/14/2011 10:02 AM, Ed
Merks wrote: > I agree with Doug.
On 09/14/2011 10:02 AM, Ed Merks
wrote:
I agree with Doug.
At no point have I seen anyone answer this
question:
What can be done
manually to determine if what's
produced by Hudson is compromised or
not?
Off the top of my head:
1. run a build on a remote system and compare
the pre-signed binaries.
2. run a past build and compare today's
binaries with those in the past.
3. run a build and examine the execution
trace.
4. run a build, run the executable and examine
network output for unknown activity.
I also have to question
whether this change during the SR1
shutdown phase is appropriate timing...
Go download the latest Linux
Kernel from Kernel.org and
tell me if there is ever a more appropriate
time than 'now' to discuss security.
Denis
Regards,
Ed
On 14/09/2011 6:55 AM, Schaefer, Doug
wrote:
I'll come back to
something Dave Carver mentioned
yesterday. If we don't trust Hudson,
then we shouldn't be using it, or at
least should be wrapping it up in
tighter security, like a VPN for
example. If someone is going to do
something malicious and they're
smart, you're likely not going to be
able to discover it. You have to cut
it at the source.
And is this not an issue other
Hudson/Jenkins users have run into?
What are they doing for security. Or
do they trust Hudson as much as they
do ssh.
Doug.
_______________________________________________
_______________________________________________
cross-project-issues-dev mailing list
cross-project-issues-dev@xxxxxxxxxxx
https://dev.eclipse.org/mailman/listinfo/cross-project-issues-dev
_______________________________________________
cross-project-issues-dev mailing list
cross-project-issues-dev@xxxxxxxxxxx
https://dev.eclipse.org/mailman/listinfo/cross-project-issues-dev