[ 
https://issues.apache.org/jira/browse/OOZIE-3676?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17640760#comment-17640760
 ] 

Hadoop QA commented on OOZIE-3676:
----------------------------------


Testing JIRA OOZIE-3676

Cleaning local git workspace

----------------------------

{color:green}+1 PATCH_APPLIES{color}
{color:green}+1 CLEAN{color}
{color:green}+1 RAW_PATCH_ANALYSIS{color}
.    {color:green}+1{color} the patch does not introduce any @author tags
.    {color:green}+1{color} the patch does not introduce any tabs
.    {color:green}+1{color} the patch does not introduce any trailing spaces
.    {color:green}+1{color} the patch does not introduce any star imports
.    {color:green}+1{color} the patch does not introduce any line longer than 
132
.    {color:green}+1{color} the patch adds/modifies 1 testcase(s)
{color:green}+1 RAT{color}
.    {color:green}+1{color} the patch does not seem to introduce new RAT 
warnings
{color:green}+1 JAVADOC{color}
.    {color:green}+1{color} Javadoc generation succeeded with the patch
.    {color:green}+1{color} the patch does not seem to introduce new Javadoc 
warning(s)
{color:green}+1 COMPILE{color}
.    {color:green}+1{color} HEAD compiles
.    {color:green}+1{color} patch compiles
.    {color:green}+1{color} the patch does not seem to introduce new javac 
warnings
{color:red}-1{color} There are [5] new bugs found below threshold in total that 
must be fixed.
.    {color:green}+1{color} There are no new bugs found in [examples].
.    {color:green}+1{color} There are no new bugs found in 
[fluent-job/fluent-job-api].
.    {color:green}+1{color} There are no new bugs found in [sharelib/hive].
.    {color:green}+1{color} There are no new bugs found in [sharelib/hive2].
.    {color:green}+1{color} There are no new bugs found in [sharelib/git].
.    {color:green}+1{color} There are no new bugs found in [sharelib/distcp].
.    {color:green}+1{color} There are no new bugs found in [sharelib/hcatalog].
.    {color:green}+1{color} There are no new bugs found in [sharelib/sqoop].
.    {color:green}+1{color} There are no new bugs found in [sharelib/spark].
.    {color:red}-1{color} There are [1] new bugs found below threshold in 
[sharelib/oozie] that must be fixed.
.    You can find the SpotBugs diff here (look for the red and orange ones): 
sharelib/oozie/findbugs-new.html
.    The most important SpotBugs errors are:
.    At ShellMain.java:[line 93]: This usage of 
java/lang/ProcessBuilder.<init>(Ljava/util/List;)V can be vulnerable to 
Command Injection
.    At ShellMain.java:[line 91]: At ShellMain.java:[line 90]
.    At ShellMain.java:[line 92]
.    {color:green}+1{color} There are no new bugs found in [sharelib/pig].
.    {color:green}+1{color} There are no new bugs found in [sharelib/streaming].
.    {color:green}+1{color} There are no new bugs found in [server].
.    {color:green}+1{color} There are no new bugs found in [docs].
.    {color:green}+1{color} There are no new bugs found in [webapp].
.    {color:red}-1{color} There are [4] new bugs found below threshold in 
[core] that must be fixed.
.    You can find the SpotBugs diff here (look for the red and orange ones): 
core/findbugs-new.html
.    The most important SpotBugs errors are:
.    At BulkJPAExecutor.java:[line 206]: This use of 
javax/persistence/EntityManager.createQuery(Ljava/lang/String;)Ljavax/persistence/Query;
 can be vulnerable to SQL/JPQL injection
.    At BulkJPAExecutor.java:[line 176]: At BulkJPAExecutor.java:[line 175]
.    At BulkJPAExecutor.java:[line 205]: At BulkJPAExecutor.java:[line 199]
.    This use of 
javax/persistence/EntityManager.createQuery(Ljava/lang/String;)Ljavax/persistence/Query;
 can be vulnerable to SQL/JPQL injection: At BulkJPAExecutor.java:[line 206]
.    At BulkJPAExecutor.java:[line 111]: At BulkJPAExecutor.java:[line 127]
.    {color:green}+1{color} There are no new bugs found in [tools].
.    {color:green}+1{color} There are no new bugs found in [client].
{color:green}+1 BACKWARDS_COMPATIBILITY{color}
.    {color:green}+1{color} the patch does not change any JPA 
Entity/Colum/Basic/Lob/Transient annotations
.    {color:green}+1{color} the patch does not modify JPA files
{color:green}+1 TESTS{color}
.    Tests run: 3227
.    {color:orange}Tests failed at first run:{color}
TestCLIParser#testCommandParserShowHelpWithOptions
TestLocalOozieClientCoord#testJobsOperations
.    For the complete list of flaky tests, see TEST-SUMMARY-FULL files.
{color:green}+1 DISTRO{color}
.    {color:green}+1{color} distro tarball builds with the patch 
{color:green}+1 MODERNIZER{color}

----------------------------
{color:red}*-1 Overall result, please check the reported -1(s)*{color}


The full output of the test-patch run is available at

. https://ci-hadoop.apache.org/job/PreCommit-OOZIE-Build/147/



> Remove all non FIPS compliant encoding algorithms from Oozie or make them 
> configurable
> --------------------------------------------------------------------------------------
>
>                 Key: OOZIE-3676
>                 URL: https://issues.apache.org/jira/browse/OOZIE-3676
>             Project: Oozie
>          Issue Type: Task
>          Components: core
>    Affects Versions: 5.2.1
>            Reporter: Janos Makai
>            Assignee: Janos Makai
>            Priority: Major
>         Attachments: OOZIE-3676-001.patch
>
>
> The goal of this Jira is to replace non-FIPS compliant encoding algorithm(s) 
> to FIPS compliant algorithm(s) in Oozie.
> At this moment only `org.apache.oozie.action.hadoop.LauncherHelper#getTag` 
> has non-FIPS compliant algorithm, namely MD-5.
> In scope of this ticket, this algorithm will be changed to FIPS compliant 
> SHA-384.
> ({_}read more about the FIPS compliant algorithms below{_})
> ----
> h2. Using FIPS-Compliant Crypto Libraries
> This should not need much code change. Ensure that when you are performing 
> crypto operations (e.g. generating keys, encrypting/decrypting data, 
> computing hashes, storing/verifying passwords), you are using either OpenSSL 
> or the standard Java crypto API to do so.
> When running in a FIPS environment, the OpenSSL library and Java crypto 
> provider will be replaced with their CryptoComply equivalents. This 
> replacement should be API-compatible.
> h2. Using FIPS-Approved Algorithms
> Only certain algorithms and key sizes are allowed by FIPS. 
> Common allowed algorithms are shown below for convenience:
> Symmetric Algorithms
>  * AES
>  * 3DES
> Public Key Algorithms
>  * RSA
>  * ElGamal
> Key Agreement Algorithms
>  * DH
>  * MQV
>  * ECDH
>  * ECCDH
>  * ECMQV
> SSL/TLS
>  * TLS 1.0, 1.1, 1.2
> Hash Functions
>  * SHA-1 _(avoid this as it is soon to be deprecated)_
>  * SHA-224, SHA-256 {_}(avoid these as they are soon to be deprecated){_}, 
> SHA-384, SHA-512
>  * SHA3-224, SHA3-256, SHA3-384, SHA3-512
>  * SHAKE128, SHAKE256
> Message Authentication
>  * AES CCM, CMAC, GMAC
>  * HMAC with SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
>  * 3DES CMAC
> Password Derivation Functions
>  * PBKDF2 with SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
> Random Number Generators
>  * HASH DRBG
>  * HMAC DRBG
>  * CTR DRBG
> Signature Algorithms
>  * DSA using SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
>  * ECDSA using SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
>  * RSA using SHA-1, SHA-224, SHA-256, SHA-384, SHA-512
> Keep in mind that the following common algorithms are *disallowed* and will 
> likely cause a crash if invoked in FIPS mode:
>  * MD5: use SHA-384 instead
>  * RC4 (also called arcfour): use AES-256 instead
>  * SSL: use TLS instead



--
This message was sent by Atlassian Jira
(v8.20.10#820010)

Reply via email to