PR Titles

2020-03-02 Thread Jacob Barrett
Please use meaningful PR titles. When browsing the PRs or reading the notifications, one shouldn’t have to decode your cryptic title. Consider the title as the first line of you commit message. -Jake

Re: PR Titles

2020-03-02 Thread Owen Nichols
+1 It’s easy to fix too! On Mon, Mar 2, 2020 at 8:34 AM Jacob Barrett wrote: > Please use meaningful PR titles. When browsing the PRs or reading the > notifications, one shouldn’t have to decode your cryptic title. Consider > the title as the first line of you commit message. > > -Jake > >

Re: PR Titles

2020-03-02 Thread Blake Bender
Don't we have a published checklist or guideline or something for this already? Including stuff like 'always prefix the PR title with a JIRA ticket #,' etc? On Mon, Mar 2, 2020 at 8:47 AM Owen Nichols wrote: > +1 > > It’s easy to fix too! > > On Mon, Mar 2, 2020 at 8:34 AM Jacob Barrett wrote:

Re: PR Titles

2020-03-02 Thread Alexander Murmann
> > Don't we have a published checklist or guideline or something for this > already? Including stuff like 'always prefix the PR title with a JIRA > ticket #,' etc? Yes, we do. However, it only request the addition of the JIRA ticket #. It does not call out having a descriptive title. I like th

Re: PR Titles

2020-03-02 Thread Mark Hanson
If I may add one caveat. If a pull request is in a ready to review state … . If it is prefaced with Do Not Review: then . Thanks, Mark > On Mar 2, 2020, at 9:30 AM, Alexander Murmann wrote: > >> >> Don't we have a published checklist or guideline or something for this >> already? Including s

Re: PR Titles

2020-03-02 Thread Jacob Barrett
> On Mar 2, 2020, at 10:10 AM, Mark Hanson wrote: > > If I may add one caveat. If a pull request is in a ready to review state … > . If it is prefaced with Do Not Review: then apply>. -1 Use the “Draft” state of the PR and use good titles from the beginning. Using “DO NO REVIEW” in the tit

Re: PR Titles

2020-03-02 Thread Udo Kohlmeyer
I thought PR titles are generated from the git comment. So, I'm expecting it to have the following format: "GEODE-XXX: " Glancing at the current PR list, I do see that there is at least 1 PR that does not follow that guideline. We also don't want to be overly prescriptive, so maybe if

Re: Let's Deprecate the SECURITY_UDP_DHALGO Configuration Property

2020-03-02 Thread Dan Smith
Should we deprecate cluster ssl as well? Cluster ssl without udp encryption means that not all P2P traffic will be encrypted. If we don't want to support P2P encryption, it seems like we should deprecate both? -Dan On Fri, Feb 28, 2020 at 1:40 PM Udo Kohlmeyer wrote: > Yes, the proposal was dep

Re: Let's Deprecate the SECURITY_UDP_DHALGO Configuration Property

2020-03-02 Thread Udo Kohlmeyer
I think that if TCP connections are secured and UDP connections are not, then we've regressed in our security. Is there a way that we could use DTLS? --Udo On 3/2/20 10:21 AM, Dan Smith wrote: Should we deprecate cluster ssl as well? Cluster ssl without udp encryption means that not all P2P t

Re: PR Titles

2020-03-02 Thread Ernest Burghardt
I agree with Jake and do appreciate everyone using the "DRAFT" feature, one downfall of that is this is not visible unless on Github; i.e. if you see an email for a PR you won't know its in "DRAFT" mode until you go look at it... a related part of this, to me, seems to be that the PR checklist is

Re: Let's Deprecate the SECURITY_UDP_DHALGO Configuration Property

2020-03-02 Thread Anthony Baker
I don’t think regressed is the right word. There was an effort to harden our udp p2p traffic using encryption based on a DH key exchange. I’m not clear on how much that approach actually improved the security of data in motion. And I don’t believe it saw much if any use in practice. Anthony

Re: PR Titles

2020-03-02 Thread Mark Hanson
The reason I prefer the rules not apply in draft is quite simple, people sometimes use the PR pipeline to test stuff. Its easy enough to just put in GEODE- but sometimes it just “Test” because there is no GEODE associated. Either way I don’t care enough to debate. I will abide by what the devs

Re: WAN replication issue in cloud native environments

2020-03-02 Thread Bruce Schuchardt
I'm coming to this conversation late and probably am missing a lot of context. Is the point of this to be to direct senders to some common gateway that all of the gateway receivers are configured to advertise? I've been working on a PR to support redirection of connections for client/server an

Re: Let's Deprecate the SECURITY_UDP_DHALGO Configuration Property

2020-03-02 Thread Udo Kohlmeyer
I'm back tracking on my suggestion... Got stuck on the "removal" part. +1 -> for deprecation for said feature in 1.12 -1 -> for removal until alternative/equivalent replacement has been added (or major version release -- which ever comes first) @Dan, are you thinking that secured intra-cluste

Re: Let's Deprecate the SECURITY_UDP_DHALGO Configuration Property

2020-03-02 Thread Alexander Murmann
I am not sure I am following the argument for removal in a minor version. Let's expand the argument and make sure we are all basing this on the same assumptions: Java has removed insecure encryption algorithms in patch releases. This was presumably done because it's really fixing a vulnerability,

Re: [DISCUSS] RFC: Shipping Geode patch releases

2020-03-02 Thread Aaron Lindsey
+1 to the proposal as it’s written. I’m not sure about setting regular intervals for patch releases vs sticking with our current “on-demand” process. I don’t think this has to be spelled out in this proposal. I’d be fine with sticking to “on-demand” patch releases as we’ve been doing for now an

Re: [DISCUSS] RFC: Shipping Geode patch releases

2020-03-02 Thread John Blum
By sticking to the "on-demand" patch release process, then there is no difference to the current release process, and this proposal adds nothing of value. On Tue, Mar 3, 2020 at 12:44 AM Aaron Lindsey wrote: > +1 to the proposal as it’s written. > > I’m not sure about setting regular intervals f

Re: Let's Deprecate the SECURITY_UDP_DHALGO Configuration Property

2020-03-02 Thread Aaron Lindsey
+1 to deprecating this feature in 1.12 As to whether we should remove this feature in a minor release, I think that, as Alexander pointed out, it hinges on the question of whether we perceive there to be some security issue in the feature’s implementation. This statement from the proposal shoul

Re: [DISCUSS] RFC: Shipping Geode patch releases

2020-03-02 Thread Dan Smith
+1 to the proposal as written. The proposal does talk about support branches, but doesn't describe when they are created. Is the idea that we create a support/1.X branch as soon as we release geode 1.X, and then create release branches off of that as needed? -Dan

Re: [DISCUSS] RFC: Shipping Geode patch releases

2020-03-02 Thread Owen Nichols
My interpretation is that we would cut support/1.13 from develop on the next scheduled cut date (May 4), and make 1.13.0 and all following 1.13.x patch releases directly from this branch. Otherwise it becomes a two-step process if all patches have to be cherry-picked from develop -> support/x.y