-
Notifications
You must be signed in to change notification settings - Fork 166
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
doc: major update to acess.md #2011
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
* Competence: it is difficult to objectively gauge technical competence without | ||
demonstration. You can demonstrate competence by contributing to resources in | ||
this repository where you see need or attempting to assist Build WG members | ||
where you are able. Competence may also be demonstrated through contributions |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm very, very sympathetic to the risks of incautious access, but I worry that this veers close to a catch-22. Despite that sense that we have an intimidating mountain of work available, I'm struggling to find helpful things that can be done without access, and without doing helpful things, its hard to demonstrate competence. @richardlau and I both demonstrated competence the long way: nodejs collaboration.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There are a few things that can be contributed without access, for example I have four pull requests merged into this repository that happened before I was given access ("contributing to resources in this repository where you see need"). Since collaborators can view (but not change) job configuration in Jenkins it's even possible to suggest fixes to jobs ("attempting to assist Build WG members where you are able").
I wouldn't necessarily say it's easy -- you need some idea of what is where.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Agree, this is a very difficult corner but this PR is intended to clarify current thinking and open discussion for amending that thinking where we can. So if you have suggestions for how to change things then speak up!
This PR reflects how it is, so I'm good with landing it. I'm not sure if here or #1990 or somewhere else is a better place to discuss this, but I'll do it here for now. For bystanders, I don't have a handy link other than the last WG meeting, but the TSC is asking the board to ask the member companies to contribute people to the build WG. I am concerned that it will be difficult for anyone who has time donated to the project to get enough access to actually do anything with the current policy. At the same time, I don't want to suggest a policy of "instant access for any IBM employees", that would be unreasonable. I hope that is obvious, but I want to acknowlege that that would be totally inappropriate, and I am not trying to suggest such a thing. But, for example, if any active WG member (@joaocgreis or @rvagg as an example) introduced someone I'd never heard of before, provided evidence they fit the "trust through employer criteria", and personally committed to mentor the individual into the WG, review their work, help them understand how the systems work, etc., I would give them a plus 1 for basic access I'm willing to be told that I'm too generous with my transitive trust, and should be more cautious, but that's how I feel at the moment.
|
Somewhere else it was suggested I could say something about how IBM manages sensitive access, in case it gives any useful context. I don't speak with authority on our policy, but what it looks like to me as a user is:
So the basic principle seems to be chain of trust between humans, backed up by record keeping so its always known who has access and who authorized it, and automated systems to add and remove access, and particularly to remove access after a year if its not re-requested. |
Coming out of #2005 and a discussion amongst infra via email, I thought it would be good to put down more of the reasoning behind the levels of access so it's clear to us what that is and hopefully clear to all how we deal with granting additional access (and that there is reasoning and a path for individuals who invest their time and skills here).
Some big changes but my hope is that this is you can be told to read if you want to become a member and it will all be clear how we work organisationally.
The bottom line is that we need to expand our people resources here and some of that expansion involves elevated access. But the path to elevated access is really tricky because we're dealing with security, stability, legal concerns and even concerns that are difficult to quantify like keeping our infra donors happy and not stepping on toes.