-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implement Django Security Patch Automation Workflow #300
Conversation
Thanks for the pull request, @magajh! Please note that it may take us up to several weeks or months to complete a review and merge your PR. Feel free to add as much of the following information to the ticket as you can:
All technical communication about the code itself will be done via the GitHub pull request interface. As a reminder, our process documentation is here. This is currently a draft pull request. When it is ready for our review and all tests are green, click "Ready for Review", or remove "WIP" from the title, as appropriate. |
To implement a Django security patch automation workflow, you can follow the steps outlined below:
|
0776e6a
to
5b50c05
Compare
5b50c05
to
25c1f86
Compare
Hi @magajh! Just checking in on this to see if you are planning to pursue this PR. Please let us know. Thanks! |
The primary purpose of this PR was to automate the detection of vulnerabilities and ensure timely updates. However, during comprehensive testing of the workflow, we encountered a significant challenge related to the timeliness and reliability of the security vulnerability databases. Specifically, we used two main sources:
The critical issue is that both these databases/APIs do not seem to be updated frequently enough. In practice, this means there could be a substantial delay - potentially months - before new Django security patches are recognized and reported by these APIs. Given this limitation, the automated workflow may not effectively serve its intended purpose of timely vulnerability detection. Relying on this workflow could create a false sense of security, where we might overlook newly released patches that are not yet listed in these databases. While the idea of automating the process of identifying and applying security patches is still valuable, we need to find a more reliable source of information. For now, we will not be moving forward with this PR. |
@magajh Even though your pull request wasn’t merged, please take a moment to answer a two question survey so we can improve your experience in the future. |
1 similar comment
@magajh Even though your pull request wasn’t merged, please take a moment to answer a two question survey so we can improve your experience in the future. |
Description:
This PR introduces an automated workflow that detects vulnerabilities in the Django version used by our latest Open edX release and notifies the Build Test Release Working Group to apply the necessary security patches.
What does this workflow do?
Key Implementation Details:
Request for Feedback:
I would highly appreciate your feedback on: