Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

add biased language check to gh actions #3282

Closed
wants to merge 4 commits into from

Conversation

Lng88
Copy link

@Lng88 Lng88 commented Apr 30, 2021

Description:

Adding a github actions workflow to check for biased language in the project. The biased language we are checking include these 4 words: blacklist, whitelist, master, slave. This is to help bring awareness to the number of biased language in the repository with the goal of eventually reducing these terms used in the project. This is an organization wide effort at Splunk to help bring change and make an impact by removing institutionalized bias from the products we help create that are widely used by many individuals.

Testing:
This workflow was tested in my forked repository

Documentation:
Biased Language action repo

@Lng88 Lng88 requested a review from a team April 30, 2021 00:05
@linux-foundation-easycla
Copy link

linux-foundation-easycla bot commented Apr 30, 2021

CLA Signed

The committers are authorized under a signed CLA.

@bogdandrutu
Copy link
Member

Please sign the CLA :)

@jpkrohling
Copy link
Member

That's a nice GitHub Action :-)

@anuraaga anuraaga changed the title add biased language to gh actions add biased language check to gh actions Apr 30, 2021
@Lng88
Copy link
Author

Lng88 commented May 4, 2021

Hi, is there anything additional that needs to be done to get this merged? :)

.github/workflows/biased-lang.yml Outdated Show resolved Hide resolved
@Lng88 Lng88 requested a review from anuraaga May 6, 2021 17:21
- uses: actions/checkout@v2
- id: pink-panther
uses: splunk/pink-panther@main
continue-on-error: true
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Won't this cause the workflow to be considered successful even if there is biased language? Don't we want it to fail?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That seems fine as an interim step, particularly if it checks the entire repository and not just changed files. Would give us notice and time to start addressing the issues. Hard to know how it works, though, since the code the action actually uses doesn't appear to be in the action repo.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Some repo's can contain a slew of biased terms which can take quite a while to replace, so we didn't want this job to fail the workflow. Instead, we've added an error annotation as shown in the attached photo to notify users there are biased terms in the repo, but allow the workflow to continue.

As for the code itself, this is hosted in our internal Gitlab instance where we test, build, and publish for use in both GitLab CI and GitHub Actions. The image is essentially a Python script utilizing RipGrep to search through the repo for a list of biased terms Splunk defines, and outputs a summary in JSON format which is visible in the job.

Screen Shot 2021-05-10 at 11 10 23 AM

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The image is essentially a Python script utilizing RipGrep to search through the repo for a list of biased terms Splunk defines

Yet another reason it would be nice for the code executed by the action to be publicly available. I'm not sure it's up to Splunk to define what is considered appropriate language for this project. I don't think this is a debate that needs to happen now, but I would like to be able to view the list of terms and have an opportunity to provide input on them.

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Completely understandable. Let me circle back with the team and see what we're able to share publicly. As for the biased terms we are searching for currently, the list is short (only 4 terms) which you can also view in the JSON output during the job, shown here

Copy link
Member

@Aneurysm9 Aneurysm9 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Where is the code that generates the ghcr.io/splunk/biased_lang container?

Does this action really require the repository's GitHub token? It looks like it only uses it to authenticate to ghcr.io to pull the container image. Shouldn't the image be public?

@Lng88
Copy link
Author

Lng88 commented May 10, 2021

Where is the code that generates the ghcr.io/splunk/biased_lang container?

Does this action really require the repository's GitHub token? It looks like it only uses it to authenticate to ghcr.io to pull the container image. Shouldn't the image be public?

The main repository lives in Splunk's internal GitLab instance, which will build and publish the docker image to ghcr.io.

I just updated to remove the github token, thanks for pointing it out as it currently doesn't need it

@Aneurysm9
Copy link
Member

The main repository lives in Splunk's internal GitLab instance, which will build and publish the docker image to ghcr.io.

I just updated to remove the github token, thanks for pointing it out as it currently doesn't need it

Thanks, removing the token greatly reduces my concerns, though it would still be nice for the code the action runs to be publicly visible. To the extent that this would only have read-only access to a public repo I no longer feel the need to object to merging this PR.

@Lng88
Copy link
Author

Lng88 commented May 13, 2021

What are the next steps to get this PR merged?
As I'm not authorized to merge this, can someone kindly help out please? Thanks

Copy link
Member

@tigrannajaryan tigrannajaryan left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is the implementation of ghcr.io/splunk/biased_lang closed source?

@Lng88
Copy link
Author

Lng88 commented May 18, 2021

Is the implementation of ghcr.io/splunk/biased_lang closed source?

Hi @tigrannajaryan, at the moment yes

@tigrannajaryan
Copy link
Member

Is the implementation of ghcr.io/splunk/biased_lang closed source?

Hi @tigrannajaryan, at the moment yes

@Lng88 unfortunately we cannot accept that as a tool for this repo. All dependencies and tools we use need to be open-source and have a license that we are allowed to use.

@Lng88
Copy link
Author

Lng88 commented May 20, 2021

Is the implementation of ghcr.io/splunk/biased_lang closed source?

Hi @tigrannajaryan, at the moment yes

@Lng88 unfortunately we cannot accept that as a tool for this repo. All dependencies and tools we use need to be open-source and have a license that we are allowed to use.

Thanks for your response @tigrannajaryan. We discussed internally with the team yesterday and will start the process for open sourcing. Will keep this MR posted with updates, unless you'd like it closed and re-opened when oss is ready.

@tigrannajaryan
Copy link
Member

Thanks for your response @tigrannajaryan. We discussed internally with the team yesterday and will start the process for open sourcing. Will keep this MR posted with updates, unless you'd like it closed and re-opened when oss is ready.

@Lng88 Sounds good. Please close for now and feel free to re-open and submit a new PR when it is ready for review.

@Lng88 Lng88 closed this May 21, 2021
alexperez52 referenced this pull request in open-o11y/opentelemetry-collector-contrib Aug 18, 2021
This PR ports the client authenticator interfaces from PR #3128  in a piece meal fashion. The interfaces are currently not used by any client configurations and are published for reviewing only. 

Plan is to modify ToClient and ToDialOptions apis once all the clients are prepared per #3287 (core and contrib side as well).

Link to tracking Issue:
#3287 #3282

Testing:
Unit tests, [manual test described (for only oidc)](open-telemetry/opentelemetry-collector#3128 (comment))
alexperez52 referenced this pull request in open-o11y/opentelemetry-collector-contrib Aug 18, 2021
…ming Auth changes. (#3339)

Updated OpenCensus for upcoming client auth extension changes

Link to tracking Issue:
#3287 #3282
alexperez52 referenced this pull request in open-o11y/opentelemetry-collector-contrib Aug 18, 2021
… extensions configuration map (#3340)

This PR is a port of the configfrpc's ToDialOptions() and confighttp ToClient() from PR #3128  in a piece meal fashion. 

The following are the changes
- Refactored configgrpc.PerRPCAuth as extension implementing configauth.GrpcClientAuthenticator
- Plugged in extensions configuration to all the grpc based clients in the core (OTLP, OpenCensus, Jaeger, JaegerReceiver)
- Plugged in extensions configuration to all the HTTP based clients in the core (Zipkin, OTLPHTTP)

Link to tracking Issue:
 #3282 #3276

Testing:
Unit tests, [manual test described (for only oidc)](#3128 (comment))
@hughesjj
Copy link
Contributor

hughesjj commented Oct 9, 2022

So, it appears that as of June 24th 2021 they've since changed the Licensing to be Apache 2.0
https://github.com/splunk/biased-lang-linter/blob/main/LICENSE

Could we resurrect this merge request? (I'll likely follow up on the otel slack during the workweek with relevant people from this convo but wanted to ask this publicly)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

7 participants