-
Notifications
You must be signed in to change notification settings - Fork 210
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fortinet FortiGate - Official Support for Capirca #222
base: master
Are you sure you want to change the base?
Conversation
Thanks for your pull request. It looks like this may be your first contribution to a Google open source project (if not, look below for help). Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please visit https://cla.developers.google.com/ to sign. Once you've signed (or fixed any issues), please reply here with What to do if you already signed the CLAIndividual signers
Corporate signers
ℹ️ Googlers: Go here for more info. |
Thanks for your pull request. It looks like this may be your first contribution to a Google open source project (if not, look below for help). Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please visit https://cla.developers.google.com/ to sign. Once you've signed (or fixed any issues), please reply here with What to do if you already signed the CLAIndividual signers
Corporate signers
ℹ️ Googlers: Go here for more info. |
Thanks for your pull request. It looks like this may be your first contribution to a Google open source project (if not, look below for help). Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please visit https://cla.developers.google.com/ to sign. Once you've signed (or fixed any issues), please reply here with What to do if you already signed the CLAIndividual signers
Corporate signers
ℹ️ Googlers: Go here for more info. |
Thanks for your pull request. It looks like this may be your first contribution to a Google open source project (if not, look below for help). Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please visit https://cla.developers.google.com/ to sign. Once you've signed (or fixed any issues), please reply here with What to do if you already signed the CLAIndividual signers
Corporate signers
ℹ️ Googlers: Go here for more info. |
CLA is coming. Please standby. |
Thanks for your pull request. It looks like this may be your first contribution to a Google open source project (if not, look below for help). Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please visit https://cla.developers.google.com/ to sign. Once you've signed (or fixed any issues), please reply here with What to do if you already signed the CLAIndividual signers
Corporate signers
ℹ️ Googlers: Go here for more info. |
Thanks for your pull request. It looks like this may be your first contribution to a Google open source project (if not, look below for help). Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please visit https://cla.developers.google.com/ to sign. Once you've signed (or fixed any issues), please reply here with What to do if you already signed the CLAIndividual signers
Corporate signers
ℹ️ Googlers: Go here for more info. |
@googlebot I signed it! |
Thanks for your pull request. It looks like this may be your first contribution to a Google open source project (if not, look below for help). Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please visit https://cla.developers.google.com/ to sign. Once you've signed (or fixed any issues), please reply here with What to do if you already signed the CLAIndividual signers
Corporate signers
ℹ️ Googlers: Go here for more info. |
…ce_address CA generator currently drops any rules missing a source_address which is undesired, especially in the context of default denies automagically added by MirACL. Verified that generation is accurate on local MirACL instance - https://paste.googleplex.com/5190971101806592 PiperOrigin-RevId: 347033734
This allows users to pass in an integer that can be used to limit the max number of attributes in a VPC firewall policy. If a VPC firewall policy exceeds the max, an error will be thrown. The library will now count the number of rules generated and log the number generated. PiperOrigin-RevId: 347102880
PiperOrigin-RevId: 347106320
Hi, it appears there are still some issues with your CLA. We can't assign anyone internally to look at this until the CLA bot shows green. Also, please take a look at the generator patterns documentation we just uploaded. These standards will be enforced for all future generators to ensure consistent code quality. https://github.com/google/capirca/blob/master/doc/generator_patterns.md Please ACK that you have seen this and let us know when you think you have met these guidelines. Once you give us the go ahead on this and the CLA is assigned we can start reviewing. |
@googlebot I signed it! |
Thanks for your pull request. It looks like this may be your first contribution to a Google open source project (if not, look below for help). Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please visit https://cla.developers.google.com/ to sign. Once you've signed (or fixed any issues), please reply here with What to do if you already signed the CLAIndividual signers
Corporate signers
ℹ️ Googlers: Go here for more info. |
@rdsharma Acknowledged. We'll get back to you soon. |
Thanks for your pull request. It looks like this may be your first contribution to a Google open source project (if not, look below for help). Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please visit https://cla.developers.google.com/ to sign. Once you've signed (or fixed any issues), please reply here with What to do if you already signed the CLAIndividual signers
Corporate signers
ℹ️ Googlers: Go here for more info. |
Thanks for your pull request. It looks like this may be your first contribution to a Google open source project (if not, look below for help). Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please visit https://cla.developers.google.com/ to sign. Once you've signed (or fixed any issues), please reply here with What to do if you already signed the CLAIndividual signers
Corporate signers
ℹ️ Googlers: Go here for more info. |
Thanks for your pull request. It looks like this may be your first contribution to a Google open source project (if not, look below for help). Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please visit https://cla.developers.google.com/ to sign. Once you've signed (or fixed any issues), please reply here with What to do if you already signed the CLAIndividual signers
Corporate signers
ℹ️ Googlers: Go here for more info. |
@googlebot I signed it! |
Thanks for your pull request. It looks like this may be your first contribution to a Google open source project (if not, look below for help). Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please visit https://cla.developers.google.com/ to sign. Once you've signed (or fixed any issues), please reply here with What to do if you already signed the CLAIndividual signers
Corporate signers
ℹ️ Googlers: Go here for more info. |
1 similar comment
Thanks for your pull request. It looks like this may be your first contribution to a Google open source project (if not, look below for help). Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please visit https://cla.developers.google.com/ to sign. Once you've signed (or fixed any issues), please reply here with What to do if you already signed the CLAIndividual signers
Corporate signers
ℹ️ Googlers: Go here for more info. |
Hello, The CLAs bot is not passing because the company CLA was signed but individual CLAs still need to be signed for all users that committed code. Please have GitHub users lweighall and ftntcorecse sign individual CLAs as well and the bot should pass. Thanks! |
@rdsharma - thanks for clearing this up. Unfortunately, that makes very little sense. Why have a corporate signature and then have individuals sign it? The rules talk to having a google group administered by the signer that has the contributors in it - that has been accomplished. We have also ensured the commit email address is that of the signer as also instructed by the rules. Why would everyone that works on the product under the corporate umbrella need to sign a document? That is what the corporate signature is for is it not? |
I'm not super familiar with the CLA bot myself, but my guess is that part of the problem is that ftntcorecse is not registered to a @fortinet.com email address. (How would the bot know this is a legitimate Fortinet user?) If we still are having issues I can talk to the team who is responsible for the CLA bot and try and figure out more of what's going on. |
ftntcorecse is also in the Google Group. The instructions talk to that being how they know it's someone doing something that is authorized by the signer. The Google Group has been created and those people that are contributing are in the Group and have "admin" access to that group as well.......The whole idea is that we can have Open Source accounts work on Open Source code and use their accounts so they don't then need to make special accounts for this specific solution....it sort of kills the idea of it being Open Source while also not allowing the Corporate umbrella to play how it's supposed to. Otherwise everyone would just need to sign the CLA - which again, makes little sense from the Corporate perspective since many corporations are going to make this go through a legal process for each individual. Having the blanket corporate agreement and then consuming them in a group should tell the bot that these people are part of that one signature. I know these aren't your rules - so forgive me if this sounds very aggressive....it's not the intent. We've tried just about everything with the commits and the Google Group based on what the instructions asked at this point so we're sort of like....? |
Which Google Group are you referring to? To clarify my comment from before, I'm pretty sure the reason the corporate CLA isn't being applied by the bot is because your GitHub user (ftntcorecse) is registered to a @brainslayer.com email address and not a @fortinet.com email address. My understanding is that the bot will only apply the corporate CLA for Fortinet to users registered to @fortinet.com email addresses. Individual CLAs are needed for users that aren't registered to a corporate email address from a company that has signed a CLA. |
Hi, We have reviewed our internal documentation and it does seem the email address with @brainslayer.com is not included with the CLA's authorized contributor group. If you attach a @fortinet.com account to your @brainslayer.com account perhaps it will recognized the association. Also signing the individual CLA: https://cla.developers.google.com/about/google-individual. This should give your account the proper credentials as well to proceed. We are sorry this is confusing and hope we can get this process soon. I have been assigned to review the change. My schedule is busy over the next few weeks and will likely not be able to review this change until March. If we can get this CLA problem fixed soon then perhaps I can get the review prioritized sooner. |
We would be interested in playing with this support, were it to get merged. |
Would love to see this merged as well. |
@ftntcorecse I would like to see this merged as well so can you/someone from Fortinet team squash all changes to one commit which author is @fortinet.com email address so it will pass CLA? |
@nero85 and @rdsharma - this account is registered to [email protected] - it can get no more @fortinet.com than that. It has been the entire time. The brainslayer.com address already has multiple @fortinet.com addresses attached to it. There's something that the bot cannot check or is not checking effectively. I cannot sign an INDIVIDUAL CLA as this is not done by an individual. Nor is it company policy to have an individual sign CLAs (particularly for free software environments which still has me quite confused as it is). We have completed every and all checks that your instructions stated for the Google Group creation, the attachment of all accounts under the umbrella of that group, and then attached account after account to other accounts that might be near or on an account that could be near an account. Can one of you please let me know a simple fix to this outside of just breaking the entire process, by having an individual sign a CLA - which is not an answer since this is a Corporate CLA that gets signed. As you can see people do want this merged, and we are attempting to support and extend this really cool process you've created. However, the gateway to get this merged has become impassable it seems. Is there another set of instructions that we need to follow outside of the ones we've already followed? Is there a way that the owner of the binaryslayer.com address - who has a fortinet.com address as well - do something that will alleviate these issues? |
what is the status on this PR ? it would be very useful to have Fortinet support in Capirca |
I would be interested in this functionallity as well. It would be a shame to not implement this code just by a failing check. |
Any news about this merge request ? We are interesting by those functionality ! |
Reminder: Almost two years spent on the CLA process for an apparently finished patch because y'all stuck in corp nightmares, or rather because there's a bot that has more decision making power than people who can read... seems there's three options:
Personally: As far as it goes for contribs to capirca it can't go any bigger than a whole new vendor support being submitted, especially by the vendor. |
2023 checkin? Any way to get @ftntcorecse, @rdsharma, and someone with cla bot clue together to get this solved? Would love to not still be waiting here in 2024... |
I did a little poking at the commits in this patch, and it looks like the last commit was signed with your f*******t@b************.**m address: https://github.com/google/capirca/commit/97fb022435a86a582ba9669fd62f9e614445bd72.patch Upon reading the CLA troubleshooting doc here, I see the following: One of the most common problems is that the git author email in the commit is not an email address associated with a CLA. The solution is to change the git author email to be an address covered by the CLA. That email should also be added to their GitHub account; it doesn't need to be the primary email, but it should be on the account. For contributors covered by a corporate CLA, this should typically be their work email address, or whatever was added to the corporate CLA's authorized contributor group. So unless f*******t@b************.**m is actually listed on the CLA, cla-bot won't process it. Assuming only @fortinet.com email addresses are actually on the CLA, you need to rewrite your commits to only @fortinet.com email addresses:
Alternatively, @rdsharma seems to have an easy button here: Particularly for projects on GitHub, there are times when we're not able to automatically verify CLAs (see Troubleshooting CLAs). At the end of the day, we always rely on the project owners to verify the CLA status, whether that means simply looking for the commit status set by SignCLA, or by manually checking the CLA themselves. It's okay to accept a contribution that you are certain is covered by a CLA, even if the automatic verification failed for some reason. |
I also see as part of this commit https://github.com/google/capirca/commit/6214e680b8d9523bbd78fc200179b8716e9c4a65.patch that g****b@f*******.**m has a commit here. Is it part of the signed CLA as well? |
@ggiesen that's correct, this should be fixable by just amend'ing the commits to have the correct author info. I believe I pointed out this somewhat in my first comment years ago, but appreciate you explaining it more clearly. We don't feel comfortable fixing these tags for them as it's author/copyright info, and we can't force push to someone else's branch anyways. @ftntcorecse if you are still interested in getting this merged, please fix the commit author info and rebase. Once the CLA bot passes we can assign someone on our side for the actual review, but we aren't allowed to do that until we have the CLA bot passing. |
@rdsharma To be fair to @ftntcorecse, after going through the commits, the only ones of any substance are from L**e W******l <l*******l@f*******.**m>. Assuming he has signed the CLA (which I believe you can verify manually), the only remaining commits are basically manipulating one period to try to get CLA bot to behave. The changes are not even copyrightable. If ever there was a time to use some sound judgment to override an automatic process, this would be it. Otherwise we can wait another 2+ years... |
For reference, here's the commit log:
|
@ggiesen yes, to fix this we'd need to only see commits from Fortinet email addresses, so that the corporate CLA applies. There is also another email address at the top of your commit log. But none of this changes the fact that I don't have (actual/GitHub, ignoring legal/copyright) permissions to push to their branch. If this was something I could do for them I'd have done it a long time ago. :( It'll have to get fixed on their side, but should only take a couple minutes. We'd also need to know that there is still someone at Fortinet who will handle the review/any changes needed once we can get it kicked off. |
I think my point was lost here. According to the Google CLA docs, you can manually bypass the CLA process by setting the Or am I missing something else? |
I really hope these issues can be resolved. Supporting Fortinet would be a huge benefit. |
The Fortinet team is pleased to provide this contribution to Google Capirca. We welcome your guidance and suggestions to this contribution and are committed to the processes at hand.
We have only included a single sample .POL file, per the observed standards, but have more to provide for additional testing if required.
Thank you.