Infrastructure
  1. Infrastructure
  2. INFRA-5044

Create role account for access to openejb-tck repo

    Details

    • Type: Task Task
    • Status: Closed
    • Priority: Major Major
    • Resolution: Fixed
    • Fix Version/s: Initial Clearing
    • Component/s: Subversion
    • Labels:
      None

      Description

      openejbtck role account requested to facilitate TCK testing, identical to the geronimotck role account also used for automated tck testing.

        Activity

        Hide
        David Blevins added a comment -
        Can put the info in this file on people:
        -rwx------ 1 dblevins dblevins 0 Jul 12 21:00 /home/dblevins/INFRA-5044
        Show
        David Blevins added a comment - Can put the info in this file on people: -rwx------ 1 dblevins dblevins 0 Jul 12 21:00 /home/dblevins/ INFRA-5044
        Hide
        Mark Thomas added a comment -
        Are we adequately protecting the TCK if we copy it to hardware controlled by Amazon? What do the EC2 Ts&Cs say about Amazon having access to any data?

        This strikes me as going a step further than having copies of the TCK on machines that the committers retain physical control of - even if those machines are employer provided/owned.
        Show
        Mark Thomas added a comment - Are we adequately protecting the TCK if we copy it to hardware controlled by Amazon? What do the EC2 Ts&Cs say about Amazon having access to any data? This strikes me as going a step further than having copies of the TCK on machines that the committers retain physical control of - even if those machines are employer provided/owned.
        Hide
        David Blevins added a comment -
        It is protected
        Show
        David Blevins added a comment - It is protected
        Hide
        Mark Thomas added a comment -
        Reference(s) please.
        Show
        Mark Thomas added a comment - Reference(s) please.
        Hide
        David Blevins added a comment -
        Not the best place to squash legal fears, but here are the AWS terms: http://aws.amazon.com/agreement

        If there's a specific concern with those terms, we should probably bring it up on legal, board or jcp.
        Show
        David Blevins added a comment - Not the best place to squash legal fears, but here are the AWS terms: http://aws.amazon.com/agreement If there's a specific concern with those terms, we should probably bring it up on legal, board or jcp.
        Hide
        Tony Stevenson added a comment -
        So, are we doing this or not?
        Show
        Tony Stevenson added a comment - So, are we doing this or not?
        Hide
        David Blevins added a comment -
        Yes, we need this regardless of where the tck runs. Geronimo has had a role account for testing for years and we probably should have requested one long ago.
        Show
        David Blevins added a comment - Yes, we need this regardless of where the tck runs. Geronimo has had a role account for testing for years and we probably should have requested one long ago.
        Hide
        Mark Thomas added a comment -
        The Ts&Cs say "we will implement reasonable and appropriate measures designed to help you secure Your Content against accidental or unlawful loss, access or disclosure".

        "...reasonable and appropriate..." is not a phrase that fills me with confidence. It leaves far too much wiggle room.

        However, AWS is also PCI certified. While I have a fairly low opinion of the PCI certification process in general, if the platform is considered secure enough to process credit card payments then my own view is that it will provide sufficient security to meet our confidentiality obligations under the contract we signed with Sun.
        Show
        Mark Thomas added a comment - The Ts&Cs say "we will implement reasonable and appropriate measures designed to help you secure Your Content against accidental or unlawful loss, access or disclosure". "...reasonable and appropriate..." is not a phrase that fills me with confidence. It leaves far too much wiggle room. However, AWS is also PCI certified. While I have a fairly low opinion of the PCI certification process in general, if the platform is considered secure enough to process credit card payments then my own view is that it will provide sufficient security to meet our confidentiality obligations under the contract we signed with Sun.
        Hide
        #asfinfra Bot added a comment -
        <danielsh> Let's disentangle this. Accesses from amazon hw are happening; if we don't shut them down entirely, let's create the role account in svn and close this ticket. The legal concerns can be handled on legal-*@, please.
        Show
        #asfinfra Bot added a comment - <danielsh> Let's disentangle this. Accesses from amazon hw are happening; if we don't shut them down entirely, let's create the role account in svn and close this ticket. The legal concerns can be handled on legal-*@, please.
        Hide
        Tony Stevenson added a comment -
        Transitioning to waiting for Infra
        Show
        Tony Stevenson added a comment - Transitioning to waiting for Infra
        Hide
        #asfinfra Bot added a comment -
        <danielsh> username:password have been added to ~dblevins/.pw on people. Please remove the file, set the account's tree access in the svn authorization file, and close this ticket. Thanks.
        Show
        #asfinfra Bot added a comment - <danielsh> username:password have been added to ~dblevins/.pw on people. Please remove the file, set the account's tree access in the svn authorization file, and close this ticket. Thanks.
        Hide
        David Blevins added a comment -
        Thanks!
        Show
        David Blevins added a comment - Thanks!

          People

          • Assignee:
            Unassigned
            Reporter:
            David Blevins
          • Votes:
            0 Vote for this issue
            Watchers:
            3 Start watching this issue

            Dates

            • Created:
              Updated:
              Resolved:

              Development