Member of the Security-Team. My user-sbassett board should be fairly up-to-date, though we also track some other work within Asana these days.
User Details
- User Since
- Sep 12 2018, 3:52 PM (322 w, 6 d)
- Roles
- Administrator
- Availability
- Available
- IRC Nick
- sbassett
- LDAP User
- SBassett
- MediaWiki User
- SBassett (WMF) [ Global Accounts ]
Yesterday
@Jdlrobson-WMF - Yes, I think you should be good now with the above explanation. We can enable security access for your -WMF account now. Thanks.
Mon, Nov 18
Sat, Nov 16
These look fine. We could probably add a few more highly-used ones. Not sure about Cargo though, as that isn't run in Wikimedia production. I guess if we wanted to have one "mostly third party" extension, that could be a possible choice.
Fri, Nov 15
Thu, Nov 14
Hey @mmartorana - once https://gitlab.wikimedia.org/repos/security/universal-security-dashboard/-/merge_requests/5 is merged, all of the django app structure should be in place to begin working on usd_api/models.py, etc.
Wed, Nov 13
@egardner - End of Q2 2024? - as in, by the end of December 2024? I don't believe there is any way we can accommodate that date.
Tue, Nov 12
Assuming this is likely stalled until we hire a new PM?
A lot of power and flexibility is offered for user-developed tools via ext:Gadgets and toolforge/wmcs. In most cases, those environments should likely be preferred unless they are completely unacceptable for some reason (which would be a high bar IMO). The WMF does currently have an internal working group devoted to code ownership/maintenance (in the context of Wikimedia-deployed code) but it's a very difficult problem to address and solve. We want to enable volunteers as much as possible, but are also limited by how much security and legal risk is acceptable for the WMF to absorb, since they are the primary entity that must absorb said risks.
Fri, Nov 8
Yes, this should probably be fine. The default django admin/auth does support token-based auth for django rest framework, so that should be all we need for now.
Thu, Nov 7
Wed, Nov 6
Personally, I'm not sure I see an enormous issue with sso.wikimedia.org. The other proposed options seem a bit too vague to me for what SUL3 is actually trying to accomplish.
Mon, Nov 4
Thu, Oct 31
Wed, Oct 30
Tue, Oct 29
If it's just the analytics replicas that were (potentially) remaining, I'd classify those as low-risk.
Mon, Oct 28
It doesn't look like there are any immediate asks from the Security-Team for this? If there are, please let us know.