Skip to content

Commit 5ad30ee

Browse files
authored
Create newsletter_01-25.md
1 parent 5f553e0 commit 5ad30ee

File tree

1 file changed

+41
-0
lines changed

1 file changed

+41
-0
lines changed

content/blog/newsletter_01-25.md

Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
title: Inside Infra January 2025
2+
date: '2025-01-21'
3+
permalink: newsletter0125 layout: post
4+
5+
Welcome to **Inside Infra** for January, 2025
6+
7+
The January **roundtable** took place Wednesday, January 8, 2025. The main topic was a deep dive into **asf.yaml**, the Swiss Army Knife of ASF build utilities.
8+
9+
The next version of .asf.yaml addresses a number of headaches with the first version, such as cumbersome design and the difficulty in testing changes to your .asf.yaml before going live with it. It centralizes data brokering, pre-validates schemes to ensure inter-feature cooperation, and puts in place a number of other improvements.
10+
11+
The summary of the presentation and discussion are <a href="https://cwiki.apache.org/confluence/display/INFRA/Infra+Roundtable+2025-01-08+1700+UTC" target="_blank">here</a>, along with several useful links.
12+
13+
The new version of .asf.yaml should be live by the start of February, 2025.
14+
15+
The next roundtable will be **Wednesday, February 5, 2025, 1700 UTC**. The main topic will be creation, review and management of **custom GitHub Actions** that projects can use in their compile and build processes, and the self-serve way to add custom GitHub Actions to the GHA Allowlist.
16+
17+
See <a href="https://infra.apache.org/roundtable.html" target="_blank">this page</a> for details about how to join a roundtable, and what happens at it.
18+
19+
20+
## Global CSP brownout
21+
22+
Staring March 1, 2025, the ASF will be enforcing a **Content Security Policy** (CSP) for all project websites.
23+
24+
- External trackers from 3rd party providers are NO LONGER allowed
25+
- External resources from providers with which we do not have a Data Processing Agreement (DPA) are NO LONGER allowed
26+
27+
This policy will bring project websites into alignment with The ASF's security and privacy parameters.
28+
29+
The full policy, with links to important resources, is <a href="https://infra.apache.org/csp" target="_blank">here</a>.
30+
31+
32+
## Reminder: Removing Blue Ocean
33+
34+
At the end of February, 2025, ASF Infra will remove all <a href="https://plugins.jenkins.io/blueocean/">Blue Ocean</a> and related plugins from our Jenkins ci-* controllers.
35+
36+
Cloudbees have removed the Blue Ocean plugin from their <a href="https://docs.cloudbees.com/docs/cloudbees-ci-kb/latest/troubleshooting-guides/admin-monitor-blueocean-removal" target="_blank">Cloudbees Assurance Program</a> (CAP), which our Jenkins Controllers use to maintain plugin integrity and compatibility. The Jenkins Open Source program also removed the plugin(s) from their own instances. The plugin is only receiving security updates from here on, and Cloudbees recommend that users switch to the <a href="https://docs.cloudbees.com/plugins/ci/cloudbees-pipeline-explorer" target="_blank">Pipeline Explorer</a> plugin. Infra has already installed Pipeline Explorer on all ASF controllers.
37+
38+
If you have questions about Blue Ocean replacements, email `[email protected]` or post your question on the #asfinfra channel in the the-ASF workspace on Slack.
39+
40+
41+
More next month!

0 commit comments

Comments
 (0)