I'm looking forward to RC3. On Fri, Mar 25, 2022 at 11:06 AM Shane Dell <shaned...@apache.org> wrote:
> Okay so here is what I was able to find last night: > > - Adding the dependencyOverrides for commons-lang fixes the CVE issue and > causes no issue > to build > - Updating "logback-classic" from 1.2.3 to 1.2.11 fixes the CVE issues and > causes no issue to > build > - Updating to daffodil 3.3.0 causes no issue in build > - Updating com.microsoft.java.debug.core from 0.31.1 to 0.35.0 causes no > issues > - Updating fs2-io from 3.0.4 to 3.0.6 causes no issues > - However updating to the latest version being 3.2.5 causes the build to > break hence why it is > only being updated to 3.0.6 > - Updating decline-effect from 2.1.0 to 2.2.0 caused no issue > - Updating log4cats-slf4j from 2.1.0 to 2.1.1 caused no issue > - However updating to the latest version, being 2.2.0, causes the build > to fail hence why it will > only be updated to 2.1.1 > > If this all sounds reasonable I can push a PR for this. Once merged I will > close this vote, make > rc3 and send out a vote for that. > > > On 2022/03/25 11:27:23 Steve Lawrence wrote: > > I think the log4cats findings are false positives. The links that > > dependencyCheck provides for the log4cats findings are here: > > > > > > > https://ossindex.sonatype.org/component/pkg:maven/org.typelevel/log4cats-core_2.12@2.1.0 > > > > > > > https://ossindex.sonatype.org/component/pkg:maven/org.typelevel/log4cats-slf4j_2.12@2.1.0 > > > > Neither of those pages list any CVE's. And the details for each of those > > findings lists these two CVE's which have nothing to do with log4cats: > > > > https://nvd.nist.gov/vuln/detail/CVE-2021-32816 > > > > https://nvd.nist.gov/vuln/detail/CVE-2022-22931 > > > > The first one is something about ProtonMail Web Client, and the second > > one about for Apache James. > > > > So I think the log4cats findings can be ignored, and should be > > considered a bug in the CVE checker. > > > > > > On 3/24/22 9:27 PM, Shane Dell wrote: > > > Ah okay that makes we will still want dependabot for the > node/typescript extension side. But > > > what do you think is best for log4cats stuff since the latest version > still has CVEs? The > > > overriding fixed the commons-lang3 issue. But the log4cats-slf4j is a > direct dependency that > > > adds log4cats-core and both of those at latest still have CVEs. > > > > > > I will make sure to test debugger still builds and run fine with these > updates as well before > > > pushing them up to GitHub. > > > > > > On 2022/03/25 01:21:37 Steve Lawrence wrote: > > >> I'd probably update deps first so we don't get a flood of new > dependency > > >> PRs to approve. > > >> > > >> Also, now that I think about it, dependabot doesn't do sbt > dependencies. > > >> We need scala-steward for that. Daffodil uses enables dependabot for > > >> github-actions and container updates, and scala steward for sbt > updated. > > >> > > >> On 3/24/22 9:18 PM, Shane Dell wrote: > > >>> So with the PR I will need to make to get this fixes going, would > you want me to just add dependabot? I believe that is an issue but can't > remember for sure but I can get it hooked up for both scala/sbt and for > node/ts/extension. > > >>> > > >>> On 2022/03/25 01:13:07 Steve Lawrence wrote: > > >>>> I believe the sbt way to override transitive dependencies is with > the > > >>>> dependencyOverrides setting: > > >>>> > > >>>> > https://www.scala-sbt.org/1.x/docs/Library-Management.html#Overriding+a+version > > >>>> > > >>>> While we're at it, we may want to also update all dependencies so > > >>>> everything is at the latest. Eventually we'll want dependabot to > help us > > >>>> with that and automate it, but the sbt-updates plugin can be used to > > >>>> manually check for updates: > > >>>> > > >>>> https://github.com/rtimush/sbt-updates > > >>>> > > >>>> On 3/24/22 9:02 PM, Shane Dell wrote: > > >>>>> So its an issue > com.microsoft.java:com.microsoft.java.debug.core:0.31.1 but updating to > com.microsoft.java:com.microsoft.java.debug.core:0.35.0, which is the > latest, it still uses a commons-lang3:3.6. So what do I do for these items > since updating to the latest version don't fix them? > > >>>>> > > >>>>> > > >>>>> On 2022/03/25 00:37:40 Steve Lawrence wrote: > > >>>>>> The sbt dependency graph plugin might help to show where > transitive > > >>>>>> dependencies are coming from: > > >>>>>> > > >>>>>> https://github.com/sbt/sbt-dependency-graph > > >>>>>> > > >>>>>> > > >>>>>> On 3/24/22 8:34 PM, Shane Dell wrote: > > >>>>>>> I would say it is correct as in the list of jars for log4j-api I > am seeing 2.17.2 which is the version that fixed that CVE issue right? If > so we are good on that from. I was able to fix the logback errors by > updating logback-classic from 1.2.3 to 1.2.11. Still trying to figure out > log4cat-slf4j as well as core because the latest version seems to be 2.2.0 > but that still has a CVE. I am also working on where commons-lang3-3.6 > comes from as it most be a dependency of a dependency. > > >>>>>>> > > >>>>>>> > > >>>>>>> On 2022/03/24 16:17:14 Steve Lawrence wrote: > > >>>>>>>> Interesting. This might be a difference between 3.3.0 and 4.0.0 > of the > > >>>>>>>> plugin? I get your list with 4.0.0, and a different list with > 3.3.0. > > >>>>>>>> > > >>>>>>>> Note that vscode does include log4j-api-2.17.0.jar. The log4j > CVE's were > > >>>>>>>> fixed in 2.17.2, so it's a bit concerning that this is only > 2.17.0. But > > >>>>>>>> maybe the vulnerability is only in log4j-core, which vscode > does not > > >>>>>>>> include? > > >>>>>>>> > > >>>>>>>> So maybe this 4.0.0 list is correct, assuming log4j-api doesn't > have the > > >>>>>>>> vulnerability? > > >>>>>>>> > > >>>>>>>> On 3/24/22 11:11 AM, Shane Dell wrote: > > >>>>>>>>> I get the vulnerabilities for: > > >>>>>>>>> > > >>>>>>>>> - commons-lang3-3.6.jar > > >>>>>>>>> - log4cats-core_2.12-2.2.0.jar > > >>>>>>>>> - log4cats-slf4j_2.12-2.2.0.jar > > >>>>>>>>> - logback-classic-1.2.3.jar > > >>>>>>>>> - logback-core-1.2.3.jar > > >>>>>>>>> > > >>>>>>>>> I don't get anything about log4j-api. And the only onces with > a HIGH Severity value are the two log4cats items. So is yours picking up > cached dependencies or ones from other projects not just the vscode repo? > > >>>>>>>>> > > >>>>>>>>> > > >>>>>>>>> On 2022/03/24 15:05:27 Shane Dell wrote: > > >>>>>>>>>> So I think the log4j errors you are seeing are coming from a > library dependency the Scala debugger user, this being `log4cats-slf4j` > which only goes to 2.2.0 put still has two high CVE's, Adam maybe you know > if we can switch this something else to avoid the vulnerabilities? > > >>>>>>>>>> > > >>>>>>>>>> On 2022/03/24 14:02:37 Steve Lawrence wrote: > > >>>>>>>>>>> I just used this for the dependency check, that has all the > instructions > > >>>>>>>>>>> that are needed: > > >>>>>>>>>>> > > >>>>>>>>>>> https://github.com/albuch/sbt-dependency-check > > >>>>>>>>>>> > > >>>>>>>>>>> They say to put that in project/plugins.sbt, but I recommend > putting it > > >>>>>>>>>>> in ~/.sbt/1.0/plugins/plugins.sbt, then it's available for > any project > > >>>>>>>>>>> you might use (e.g. both daffodil and vscode). > > >>>>>>>>>>> > > >>>>>>>>>>> Then just run "sbt dependencyCheckAggregate", and the > resulting report > > >>>>>>>>>>> is put in target/scala-2.12/dependency-check-report.html. > > >>>>>>>>>>> > > >>>>>>>>>>> I'm not sure I would recommend adding CVE checking to CI > because > > >>>>>>>>>>> downloading the CVE database takes a long time, especially > the first > > >>>>>>>>>>> time. I might recommend instead just enabling dependabot, > that's been > > >>>>>>>>>>> good about keeping Daffodil dependencies up to date. > > >>>>>>>>>>> > > >>>>>>>>>>> > > >>>>>>>>>>> On 3/24/22 9:45 AM, Shane Dell wrote: > > >>>>>>>>>>>> Fixing the CVEs and bumping up to Daffodil 3.3.0 make sense > to me. Steve how would I setup the dependency check you are doing so I make > sure I use versions that fix it? Figure it would be good to add that into > build.sbt/source so it can be ran in CI at some stage as well. > > >>>>>>>>>>>> > > >>>>>>>>>>>> On 2022/03/24 13:42:36 Mike Beckerle wrote: > > >>>>>>>>>>>>> Since we have to fix the CVE issues, we should also update > to Daffodil 3.3.0 > > >>>>>>>>>>>>> > > >>>>>>>>>>>>> > > >>>>>>>>>>>>> On Thu, Mar 24, 2022 at 9:04 AM Steve Lawrence < > slawre...@apache.org> wrote: > > >>>>>>>>>>>>> > > >>>>>>>>>>>>>> I think I've sort of found the issue with the different > .class files. If > > >>>>>>>>>>>>>> I disassemble the class files that don't match, they all > have diffs that > > >>>>>>>>>>>>>> look like this: > > >>>>>>>>>>>>>> > > >>>>>>>>>>>>>> - 21: ldc #155 // String > Uninitialized > > >>>>>>>>>>>>>> field: /home/user/daffodil-vscode/path/to/file.scala: 394 > > >>>>>>>>>>>>>> + 21: ldc #155 // String > Uninitialized > > >>>>>>>>>>>>>> field: /root/daffodil-vscode/path/to/file.scala: 394 > > >>>>>>>>>>>>>> > > >>>>>>>>>>>>>> Note that the uninitialized field path changes depending > on the system > > >>>>>>>>>>>>>> that built it. So absolute paths are compiled into the > bytecode somehow. > > >>>>>>>>>>>>>> The surrounding byte code suggests that this is about a > > >>>>>>>>>>>>>> scala.UninitializedError exception, my guess is that path > shows up in > > >>>>>>>>>>>>>> that exception message. > > >>>>>>>>>>>>>> > > >>>>>>>>>>>>>> I'm not sure why we don't see this issue with Daffodil. > Maybe Daffodil > > >>>>>>>>>>>>>> does something different so we can't have any > UninitializedFieldErrors? > > >>>>>>>>>>>>>> I don't think this needs to be fixed for this released, > but I would > > >>>>>>>>>>>>>> prefer it is fixed for next release. I can change that to > a [MINOR] > > >>>>>>>>>>>>>> finding. > > >>>>>>>>>>>>>> > > >>>>>>>>>>>>>> My vote stills stays a -1 for the CVE issues, though. > > >>>>>>>>>>>>>> > > >>>>>>>>>>>>>> > > >>>>>>>>>>>>>> On 3/24/22 8:44 AM, Steve Lawrence wrote: > > >>>>>>>>>>>>>>> -1 (binding) > > >>>>>>>>>>>>>>> > > >>>>>>>>>>>>>>> Main issues is inclusion of packages with open CVE's, I > think that > > >>>>>>>>>>>>>>> should be fixed for this release. > > >>>>>>>>>>>>>>> > > >>>>>>>>>>>>>>> I'm also concerned about differences I found between the > released > > >>>>>>>>>>>>>>> daffodil-debugger jar and the same jar I built from > source. Class > > >>>>>>>>>>>>>>> files inside that jar differ, and it's not clear why. > > >>>>>>>>>>>>>>> > > >>>>>>>>>>>>>>> I checked: > > >>>>>>>>>>>>>>> > > >>>>>>>>>>>>>>> [OK] hashes and signatures of source and helper binares > are correct > > >>>>>>>>>>>>>>> [OK] signature of git tag is correct > > >>>>>>>>>>>>>>> [OK] source release matches git tag > > >>>>>>>>>>>>>>> [OK] source compiles using yarn build > > >>>>>>>>>>>>>>> [NOT OK] compiled source matches convenience binary > > >>>>>>>>>>>>>>> The > org.apache.daffodil.daffodil-debugger-1.0.0.jar packaged in > > >>>>>>>>>>>>>>> daffodil-debugger-3.2.1-1.0.0.zip is different > when I build the > > >>>>>>>>>>>>>>> .vsix file from source. Numerous .class files > inside that jar have > > >>>>>>>>>>>>>>> different hashes. This is unexpected. We don't > have this issue with > > >>>>>>>>>>>>>>> Daffodil, so I'm concerned something with the > vscode build system is > > >>>>>>>>>>>>>>> broke. > > >>>>>>>>>>>>>>> [OK] src and binaries include correct LICENSE/NOTICE > > >>>>>>>>>>>>>>> [OK] RAT check passes > > >>>>>>>>>>>>>>> [OK] no unexpected binaries in source > > >>>>>>>>>>>>>>> [OK] vsix installs without error > > >>>>>>>>>>>>>>> [NOT OK] No open CVE's found using sbt-dependency-check > plugin > > >>>>>>>>>>>>>>> Scan found three packages with open CVES: > > >>>>>>>>>>>>>>> - log4j-api-2.17.0.jar > > >>>>>>>>>>>>>>> - logback-classic-1.2.3.jar > > >>>>>>>>>>>>>>> - logback-core-1.2.3.jar > > >>>>>>>>>>>>>>> We depend on Daffodil 3.2.1 which should pull in > log4j 2.17.2 which > > >>>>>>>>>>>>>>> addresses the CVE's. Seems like something is > overriding that? Also > > >>>>>>>>>>>>>>> not sure where the logback dependency is pulled > in from, but maybe > > >>>>>>>>>>>>>>> related. > > >>>>>>>>>>>>>>> > > >>>>>>>>>>>>>>> > > >>>>>>>>>>>>>>> [MINOR] The "publisher" for the vsix file is "asf". That > should > > >>>>>>>>>>>>>>> probably be "Apache Software Foundation" or > just "Apache", or maybe > > >>>>>>>>>>>>>>> it should be "Apache Daffodil". We can have > this discussion later, > > >>>>>>>>>>>>>>> but this should be fixed for the next release. > > >>>>>>>>>>>>>>> [MINOR] The README shows up in VS Code, but is focused > on how to build > > >>>>>>>>>>>>>>> the extension. This makes sense for the main > github README, but I > > >>>>>>>>>>>>>>> wonder if the README displayed in VS Code wants > to be different, and > > >>>>>>>>>>>>>>> focus more on features/usability. We already > have a differnt LICENSE > > >>>>>>>>>>>>>>> file, we should do the same for the README? > > >>>>>>>>>>>>>>> [MINOR] The LICENSE file has incorrect indentation > making it difficult > > >>>>>>>>>>>>>>> to see where one sub component ends and another > begins. Would be > > >>>>>>>>>>>>>>> helfup to fix this for the next release. The > file bundled in the > > >>>>>>>>>>>>>>> .vsix binary looks good. > > >>>>>>>>>>>>>>> > > >>>>>>>>>>>>>>> > > >>>>>>>>>>>>>>> > > >>>>>>>>>>>>>>> > > >>>>>>>>>>>>>>> On 3/17/22 3:06 PM, Shane Dell wrote: > > >>>>>>>>>>>>>>>> Hello all, > > >>>>>>>>>>>>>>>> Ignore the last vote as I did not change my email to > the proper one > > >>>>>>>>>>>>>>>> registered for apache. > > >>>>>>>>>>>>>>>> > > >>>>>>>>>>>>>>>> I'd like to call a vote to release Apache Daffodil VS > Code 1.0.0-rc2. > > >>>>>>>>>>>>>>>> > > >>>>>>>>>>>>>>>> All distribution packages, including signatures, > digests, etc. can be > > >>>>>>>>>>>>>>>> found at: > > >>>>>>>>>>>>>>>> > > >>>>>>>>>>>>>> > https://dist.apache.org/repos/dist/dev/daffodil/daffodil-vscode/1.0.0-rc2/ > > >>>>>>>>>>>>>>>> > > >>>>>>>>>>>>>>>> > > >>>>>>>>>>>>>>>> This release has been signed with PGP key > > >>>>>>>>>>>>>>>> 86DDE7B41291E380237934F007570D3ADC76D51B, corresponding > > >>>>>>>>>>>>>>>> to shaned...@apache.org, which is included in the KEYS > file here: > > >>>>>>>>>>>>>>>> https://downloads.apache.org/daffodil/KEYS > > >>>>>>>>>>>>>>>> > > >>>>>>>>>>>>>>>> The release candidate has been tagged in git with > 1.0.0-rc2. > > >>>>>>>>>>>>>>>> > > >>>>>>>>>>>>>>>> For reference, here is a list of all closed GitHub > issues tagged with > > >>>>>>>>>>>>>>>> 1.0.0: > > >>>>>>>>>>>>>>>> > > >>>>>>>>>>>>>> > https://github.com/apache/daffodil-vscode/issues?q=is%3Aissue+is%3Aclosed+is%3A1.0.0 > > >>>>>>>>>>>>>>>> > > >>>>>>>>>>>>>>>> > > >>>>>>>>>>>>>>>> Please review and vote. The vote will be open for at > least 72 hours > > >>>>>>>>>>>>>>>> (Sunday, 17 March 2022, 12 Noon EST). > > >>>>>>>>>>>>>>>> > > >>>>>>>>>>>>>>>> [ ] +1 approve > > >>>>>>>>>>>>>>>> [ ] +0 no opinion > > >>>>>>>>>>>>>>>> [ ] -1 disapprove (and reason why) > > >>>>>>>>>>>>>>>> > > >>>>>>>>>>>>>>>> Thank you, > > >>>>>>>>>>>>>>>> > > >>>>>>>>>>>>>>>> - Shane Dell > > >>>>>>>>>>>>>>>> > > >>>>>>>>>>>>>>> > > >>>>>>>>>>>>>> > > >>>>>>>>>>>>>> > > >>>>>>>>>>>>> > > >>>>>>>>>>> > > >>>>>>>>>>> > > >>>>>>>>>> > > >>>>>>>> > > >>>>>>>> > > >>>>>> > > >>>>>> > > >>>> > > >>>> > > >> > > >> > > > > >