- Issue created by @poker10
- First commit to issue fork.
- πΊπΈUnited States chrisfromredfin Portland, Maine
Things that make this hard:
(1) the security coverage IS itself a project-level flag on Drupal.org - whether or not that project is opted in. The fact that you are getting an uncovered 3x is more about the governance rules of what gets actual reviews (green releases only)
(2) whether or not. you get the "green" or "yellow" can actually depend on your composer config - whether you allow beta releases, for example.
I'm not sure if we can just educate users around this or if there's something more drastic that might need to happen. I'm not really convinced it's a true security issue, it feels like a UX issue.
- πͺπΈSpain fjgarlin
Agree, which version of the module you get will be based on the composer.json configuration. Right now the opt-in is a project-wide setting, so I'm not sure we can do something about this. Perhaps Package Manager can detect the composer.json configuration that would allow for non-stable packages and throw a warning in the page?
- πΈπ°Slovakia poker10
From the security point of view, there is a policy, that anything non-stable is not covered. If project browser know what is going to be installed (which I suppose it should know), then I think this can be solved.
Other than that, I think that because of the fact that Drupal CMS includes also alpha versions, the composer.json
"minimum-stability": "alpha"
is hardcoded, so no, sites may not be aware what will happen, which is not good. For sites using project browser outside of Drupal CMS, it could be/is different.Or am I missing something?
- πΈπ°Slovakia poker10
From the Slack discussion:
The projects on d.o. have this text: "Stable releases for this project are covered..."
The projects in PB have this text: "Module is covered..."So one possible way how to at least lower the impact here is to change the text to match the Drupal Security Team policy.
- πΊπΈUnited States greggles Denver, Colorado, USA
IMO this is a critical bug, so adjusting priority.
- π¬π§United Kingdom catch
Opened π Alpha stability flag in composer.json allows project_browser to download any alpha stabiility module Active based on @poker10's points in #6.
- πΊπΈUnited States drumm NY, US
None of this should be hard-coded into the client. While there are no changes to the security advisory policy coming up, change is inevitable long-term.
https://packages.drupal.org/files/packages/8/p2/drupal/token.json has the data and text for each version:
"security-coverage":{"status":"covered","message":"Covered by Drupal\u0027s security advisory policy"}
- π¬π§United Kingdom catch
Agreed with #10 that the policy could change so it would be better to hardcode it. However I also think doing a quick fix to match the current policy might be worth doing anyway, because the final fix seems non-trivial to me.
- πΈπ°Slovakia poker10
@catch By the quick fix you mean checking additional data from the resource @drumm linked (which will likely add some additional requests, because project browser currently seems to be using https://www.drupal.org/jsonapi/index/project_modules β and that does not contain the extra info) and in case there is at least one stable and covered release, mark the module as covered? Or something else?
I agree that the fix as proposed in the issue summary would be harder, and probably the other issue ( π Missing information about the version of the project going to be installed Active ) is more important that the complete fix here.
- π¬π§United Kingdom catch
@poker10 no I mean the wording change you suggested in #7.
But #13 sounds like a good step 2.
- πΊπΈUnited States drumm NY, US
π Missing information about the version of the project going to be installed Active should make this straightforward to implement, as it should open a line of communication from package manager to project browser.
Project browser has had a few issues with hardcoding things that should only ever come from Drupal.org APIs, I donβt want to see the good progress on that backtrack.
- π¬π§United Kingdom catch
@drumm I agree with that but changing the string doesn't feel like backtracking, maybe a sidestep though.
- πΈπ°Slovakia poker10
I think a separate issue for changing the string until these two issues are fixed is worth opening, so I created one: π Update the security coverage icon title to match the Security Team policy Active .