2019-07-31 ODP WG Meeting notes
Table of Contents
Date/Time
Wednesday, 2019-07-31, 12am ET
Attendees
Name | Organisation |
|---|---|
@Maurizio Pillitu | FINOS |
@Aitana Myohl | FINOS |
@Tom Schady | GreenKey |
@Former user (Deleted) | Morgan Stanley |
@Jamie Jones | GitHub |
Malcolm Chedzoy | JP Morgan Chase |
@Former user (Deleted) | WhiteSource |
@Rob Underwood (Deactivated) | FINOS |
Attendee Webex Screenshot
Outstanding Action Items
Agenda
Time | Item | Who | Notes from the Meeting |
|---|---|---|---|
5 mins | Convene & Roll Call | @Former user (Deleted) |
|
5 mins | Improving visibility to current identified security vulnerabilities in programs, especially those that produce a lot of code (e.g., Plexus, Symphony, Hadouken) | @Maurizio Pillitu and Group |
|
5 mins | WhiteSource update |
| Requirements consolidated into https://finosfoundation.atlassian.net/browse/ODP-92 |
5 mins | Enforce dependabot across all FINOS repos | @Maurizio Pillitu | https://dependabot.com/ - objections? roll-out plan & expectations. Program Liaison can share this across all programs. Due date August 15, after mao hols. Address repos with high security vulnerabilities (ie Plexus). |
5 mins | GitHub Consolidation update | @Maurizio Pillitu @Jamie Jones | Demo/walkthrough
|
5 mins | Minutes taking in GitHub (Wiki) | @Maurizio Pillitu @Tom Schady |
|
5 mins | Ongoing license validation | @Maurizio Pillitu | Updates after chatting with FOSSA |
5 mins | Retrospective on current sprint | Group | Also check resolved issues in the last 2 weeks that are not included in any Sprint |
10 mins | Planning next Sprint | Group |
|
10 mins | Backlog scrubbing | Group | See ongoing license validation item |
5 | AOB & adjourn | Group |
|
Action Items
Follow-ups
confirm that github security checks is a sub-set of dependabot
What is "Dependabot Preview"?
It’s the pre-acquisition version of Dependabot. It’s much more fully-featured than the GitHub-integrated version currently - it can update all your dependencies (not just those with known vulnerabilities), and it supports many more language ecosystems.
What happens if I have both "Dependabot Preview" and "Automated Security Fixes" activated?
You’ll get pull requests from both as usual. In cases where both bots would normally to create the same PR (i.e., dependencies with known vulnerabilities) one bot will create it first and the other will do nothing unless that PR is closed, in which case it will also create it.