Thursday, 2023-11-16

opendevreviewTony Breeds proposed openstack/requirements master: Manually generated constraints  https://review.opendev.org/c/openstack/requirements/+/90043501:02
opendevreviewTony Breeds proposed openstack/requirements master: [DNM] Tools and data used for previous commit  https://review.opendev.org/c/openstack/requirements/+/90043601:02
opendevreviewTakashi Kajinami proposed openstack/requirements master: Allow locally requiring a package for specific python versions  https://review.opendev.org/c/openstack/requirements/+/90111908:25
SumitGupta153I had this question => Is there a way to conditionally include a statement like this in requirements.txt, where a package's certain level is installed if python version is 3.x.y ? For example, install zuul-sphinx>=0.2.0 only when python version is greater than 3.8.0 and got an answer for this on other channel, that while it is viable to do so by changing requirements.txt as (ex. cryptography>=41.0.3;python>=3.9), it 09:24
SumitGupta153is not recommended.09:24
SumitGupta153frickler, what should be the place for it? I have seen this in ansible projects on opensource projects such as ansible collection.09:26
fricklerSumitGupta153: what would be the reason for the zuul-sphinx constraint?09:31
SumitGupta153That was just an example, my real targets are these packages: cryptography, certifi, requests09:58
SumitGupta153https://security.snyk.io/package/pip/cryptography => There are vulnerabilities listed (and latest version is non-vulnerable)10:06
SumitGupta153The reason for needing this change is, that we (at IBM) do security vulnerability scan of the products for all libs that are used in our products. Whenever a non-vulnerable version of the impacted lib is out, guidelines are to update to that version.10:11
frickleryou could do that without enforcing this upstream, though? I'm really not sure whether this is a good idea, but maybe other people like fungi, tonyb or prometheanfire have other opinions10:13
SumitGupta1531. I think we can't. (We can just put it in IBM specific documentation to upgrade those libs to those levels). But, I think, since these are python libs, this change will positively impact everyone in community since they'll be on a more secure libraries levels).10:26
opendevreviewOpenStack Proposal Bot proposed openstack/requirements master: update constraint for python-neutronclient to new release 11.1.0  https://review.opendev.org/c/openstack/requirements/+/90112610:51
opendevreviewOpenStack Proposal Bot proposed openstack/requirements master: update constraint for python-cyborgclient to new release 2.3.0  https://review.opendev.org/c/openstack/requirements/+/90112710:54
opendevreviewOpenStack Proposal Bot proposed openstack/requirements stable/2023.1: update constraint for oslo.messaging to new release 14.2.3  https://review.opendev.org/c/openstack/requirements/+/90112810:58
opendevreviewOpenStack Proposal Bot proposed openstack/requirements stable/yoga: update constraint for oslo.messaging to new release 12.13.3  https://review.opendev.org/c/openstack/requirements/+/90112910:59
opendevreviewOpenStack Proposal Bot proposed openstack/requirements master: update constraint for etcd3gw to new release 2.2.0  https://review.opendev.org/c/openstack/requirements/+/90113011:02
opendevreviewOpenStack Proposal Bot proposed openstack/requirements master: update constraint for tooz to new release 4.3.0  https://review.opendev.org/c/openstack/requirements/+/90113111:06
fungiSumitGupta153: that is what curated distributions are for. openstack is not a curated distribution of software, openstack is a software project. we explicitly do not track vulnerabilities in our dependencies, as we already have our hands full with the software we maintain13:08
fungiSumitGupta153: distributions like starlingx, sovereign cloud stack, ubuntu openstack, rdo and so on track and patch vulnerabilities in openstack's dependencies. if you're not using a curated distribution of software, then you have become the curator of your own distribution and doing that work falls on you13:10
fungiwhen we set specific minimum versions of dependencies, it's pretty much always because the software won't run and therefore can't be tested with older versions13:13
fungibasically, we try to track the oldest versions of dependencies that openstack *can* run with, and it's up to downstream consumers (usually distribution package maintainers) to either use newer versions of dependencies or backport fixes to dependencies in order to address any bugs in them13:16
tonybSumitGupta153: With respect to the fundamental question which I interpret as "Can I list different minimums based on python version eg: library>=1.2.3;python_version==3.9\nlibrary>=2.0.0;python_version>=3.9" I don't think there is a technical reason for us to *NOT* support that.  I don't think we do at the moment and with some concrete examples of when/why we'd need it I think we'd take chnages to support that in the tooling13:39
tonybSumitGupta153: WRT the specific question around cryptography I believe you al ready have the answer from fungi13:41
fricklerfungi: thx for adding some better context and wording around my vague ideas. though now I'm wondering whether scs is a distro or osism and whether maybe kolla should already handle some of this13:42
fungifrickler: i'm probably a little fuzzy on the dividing line between scs and osism (i guess the former is a set of specifications/standards and the latter is a conforming distribution?)13:43
fricklerfungi: also, is the "we do not track vulnerabilities in our dependencies" documented somewhere?13:43
fricklerand yes, it isn't completely clear to me, either13:43
fungifrickler: there's lots of things openstack doesn't do, we can really only reliably document the things we can do, not everything we can't. but the vmt does document in a couple of places that it doesn't do that13:44
fungihttps://security.openstack.org/vmt-process.html#report-taxonomy describes "A vulnerability, but not in OpenStack supported code, e.g., in a dependency" as a class c2 report, the vmt doesn't produce security advisories for that but members of the community are welcome to add a security note about something to the security guide if it seems warranted13:45
fungihttps://security.openstack.org/repos-overseen.html#requirements item #2 states "The VMT will not track or issue advisories for external software components. Only source code provided by official OpenStack project teams is eligible for oversight by the VMT. For example, base operating system components included in a server/container image or libraries vendored into compiled binary13:46
fungiartifacts are not within the VMT’s scope."13:46
fricklerfungi: thx, that amply covers my question13:48
fungiif the kolla team wants to take on tracking and notifying users about vulnerabilities in non-openstack software it's shipping, then that sounds cool, but be absolutely sure it's something the team has bandwidth for before making promises to users and then potentially putting them in a bad spot when it turns out you can't do that reliably13:48
fungithe party line from the kolla team used to basically be something like "we provide pre-built images for evaluation purposes, but users are strongly encouraged to build their own carefully audited images if they plan to use them in production"13:50
fricklerfungi: just noticed on the second link of yours there's a link to "extended maintainance" as https://security.openstack.org/phases which 404s13:50
frickleractually three of those links13:51
fungithanks, i think that was supposed to go to releases.openstack.org13:51
fungii wonder how sphinx didn't bomb on that13:51
fungihttps://opendev.org/openstack/ossa/raw/branch/master/doc/source/repos-overseen.rst13:53
fungilooks like an error on my part. i'll fix the rst13:53
fungifrickler: https://review.opendev.org/c/openstack/ossa/+/901137 Update stable branch terminology for unmaintained14:11
fungithat should also fix the broken links14:11
fungithanks for spotting it!14:11
fungii suppose i could make it depends-on https://review.opendev.org/897505 that updates the project team guide similarly14:13
fungibut eventual consistency is okay for that document i think, since it's just guidance to the project teams on what deliverable repositories qualify for vmt oversight14:18
frickler+114:23
opendevreviewMerged openstack/requirements master: update constraint for python-cyborgclient to new release 2.3.0  https://review.opendev.org/c/openstack/requirements/+/90112721:03
opendevreviewMerged openstack/requirements stable/yoga: update constraint for oslo.messaging to new release 12.13.3  https://review.opendev.org/c/openstack/requirements/+/90112921:03
opendevreviewMerged openstack/requirements master: update constraint for etcd3gw to new release 2.2.0  https://review.opendev.org/c/openstack/requirements/+/90113021:03
opendevreviewMerged openstack/requirements master: update constraint for tooz to new release 4.3.0  https://review.opendev.org/c/openstack/requirements/+/90113121:03

Generated by irclog2html.py 2.17.3 by Marius Gedminas - find it at https://mg.pov.lt/irclog2html/!