Open
Bug 1490796
Opened 6 years ago
Updated 1 year ago
Improvements to lando support for sec bug landings
Categories
(Conduit :: Lando, enhancement, P2)
Conduit
Lando
Tracking
(Not tracked)
NEW
People
(Reporter: Gijs, Unassigned)
References
(Depends on 2 open bugs)
Details
(Keywords: conduit-triaged, meta)
Attachments
(1 obsolete file)
Lando is getting support to land confidential patches (e.g. for sec bugs) very soon now (set to be available next week). Yay! No more manual landing on inbound!
Per talking with smacleod, though, from a "what happens to the thing you put in phab to put it into autoland" perspective, it's much the same as what happens for non-security bugs. I think we can do slightly better.
Based on https://wiki.mozilla.org/Security/Bug_Approval_Process , here are some suggestions:
- refuse to land if the bug has the `sec-high` or `sec-critical` keyword, or if no other sec-severity (sec-want, sec-audit, sec-low, sec-moderate) keyword is present UNLESS the `sec-approval` flag has been set on the mirrored bugzilla attachment.
--> alternatively, ensure that someone from the sec-approvers group has reviewed the commit, effectively giving approval that way. That's probably something you want to discuss with the people in that group - I know dveditz/abillings are, I dunno who else.
- scrub commit messages; As the doc points out, we want to avoid 0-day'ing ourselves, like by including a full description of what we're fixing in the thing we land. I'm wondering if we should have lando automatically (is it hard to have opt-in/opt-out for this on the lando page?) scrub the commit message down to "Bug N, r=foo,bar,baz" (and nothing else). Descriptions are useful when writing and reviewing the patch, and because phab now keeps the patch confidential, it seems useful to encourage people to submit to phab *with* the details, but to land *without*.
- display obvious warnings (that can be acknowledged and bypassed) if it's landing a confidential revision that includes any test changes. Again, see wikipage for why we generally don't land tests at the same time as the original patch.
Effectively, I'm hoping we can use lando to avoid some cases where people accidentally land things that should have had sec-approval first, or land them with stuff that shouldn't be there, like a detailed description of the security issue. These things happen today because most people don't work on sec bugs all the time so they sometimes don't know.
Updated•6 years ago
|
Keywords: conduit-story
Comment 1•6 years ago
|
||
Sometimes a generic check-in comment is better than no comment. Could that be part of the requirement for sec-approval? I mean it currently is informally:
sec-approval+ to check-in after <date closer to release>
sec-approval+ to check-in without tests
sec-approval+ but change the check-in comment
If we're using lando we'd have to withhold the sec-approval until after the required changes were made. This isn't different than the review situation for non-secure bugs, but we should formalize it in our process description.
Not sure what to do about test landings with lando. In a normal bug we'd check in without tests and set an "in-testsuite?" flag. We'd probably want to formally spin off a "land tests for bug <xxx>" security bug and put the tests there. On clarity grounds I'd prefer that to the in-testsuite flag anyway, but it is a bit of extra work.
Comment 2•6 years ago
|
||
Is there a need for a separate bug for tests, or just a separate patch on the same bug, that lands later?
Updated•6 years ago
|
Keywords: conduit-triaged
Updated•6 years ago
|
Assignee: nobody → smacleod
Status: NEW → ASSIGNED
Keywords: conduit-story
Priority: -- → P2
Updated•6 years ago
|
Flags: needinfo?(smacleod)
Comment 3•6 years ago
|
||
Morphing this to be a meta bug tracking specific incremental improvements to the process including moving sec-approval into Phabricator itself. A plan has been formulated and work has started on the implementation. Dependent bugs to follow.
Updated•6 years ago
|
Updated•1 year ago
|
Attachment #9386226 -
Attachment is obsolete: true
You need to log in
before you can comment on or make changes to this bug.
Description
•