I agree with Pat. Though adding exclusions doesn’t make any difference in the quality of our code, but a build is a build. It’s either green or red (not green). No excuse.
Andor > On 2022. Feb 10., at 16:51, Patrick Hunt <ph...@apache.org> wrote: > > On Thu, Feb 10, 2022 at 12:22 AM Enrico Olivelli <eolive...@gmail.com> > wrote: > >> Patrick, >> If you prefer I can send a patch for. the exclusion of >> [ERROR] netty-tcnative-2.0.48.Final.jar: CVE-2021-43797, CVE-2019-16869, >> CVE-2015-2156, CVE-2021-37136, CVE-2014-3488, CVE-2021-37137, >> CVE-2019-20445, CVE-2019-20444, CVE-2021-21295, CVE-2021-21409, >> CVE-2021-21290 >> >> That said, this won't affect the goodness of the RC. >> >> Our code is safe and the dependencies we use are safe: >> - to me it looks like those are false positive or at least not related >> to ZooKeeper >> - we are not using Netty TC Native features, it is a dependency we >> inherit, and probably ZooKeeper works well without it >> >> Thank you all of taking time to test the release >> >> > NP. My concern is highlighted by this (your) response. You had to say all > this to explain why the build is failing on a simple security check. > Post-log4shell folks are really sensitive to security issues, as they > should be, as we all should be. Its very important that we take security > seriously. If I download the release, and run the owasp check it fails. I > then have questions in my mind why. All that you explained here, while > perfectly reasonable, it won't be available to me at that point. I think > rather we should ensure that releases are solid/clean before we push them. > This is a simple thing to fix before we go through the entire process of > verifying/releasing a new version. > > Hopefully this explains my concerns. > > Regards, > > Patrick > > >> Enrico >> >> Il giorno gio 10 feb 2022 alle ore 09:13 Szalay-Bekő Máté >> <szalay.beko.m...@gmail.com> ha scritto: >>> >>> Thanks Enrico for working on the release candidate! >>> >>> The RC looks good to me if we are sure that the OWASP problem is a false >>> positive and we can skip this netty-tcnative jar check. However, these >> CVEs >>> are old... Is it possible that we just added this jar by accident with >> the >>> recent netty upgrade? If we don't need it, should we exclude it? >>> >>> I wouldn't vote with +1 until we clarify the state of these CVEs. >>> >>> My RC check: >>> >>> - apache-rat passed >>> - I built the source code (-Pfull-build) on dockerized Ubuntu 18.04.6 >> using >>> OpenJDK 11.0.13 and maven 3.6.0. >>> - all the java unit tests passed eventually. I had 4-8 tests failing in >>> each run, but after 4 runs all tests passed at least once. (I used >>> -Dsurefire-forkcount=1) We should somehow fix these flakies. There are >>> flakies on the CI, but not this many. I executed in docker, maybe this is >>> the reason or the CI is using a different java version? >>> - checkstyle and spotbugs passed >>> - OWASP (CVE check) failed with the mentioned >>> netty-tcnative-2.0.48.Final.jar failures. >>> - I built the fatjar >>> - I executed C client tests. Two of these failed constantly for me: >>> Zookeeper_simpleSystem::testIPV6 and >>> Zookeeper_SASLAuth::testClientSASLOverIPv6. (I think these fail for me >>> because I execute C unit tests on docker, there might be some issues with >>> the IPv6 interface) I see these passed on CI running on the >> branch-3.8.0. ( >>> >> https://github.com/apache/zookeeper/runs/5048875668?check_suite_focus=true >> ) >>> - I also built and executed unit tests for zkpython >>> - I executed quick rolling-upgrade tests (using >>> https://github.com/symat/zk-rolling-upgrade-test): >>> - rolling upgrade from 3.5.9 to 3.8.0 >>> - rolling upgrade from 3.6.3 to 3.8.0 >>> - rolling upgrade from 3.7.0 to 3.8.0 >>> - The web page looks OK >>> >>> Best regards, >>> Máté >>> >>> On Wed, Feb 9, 2022 at 8:04 PM Chris Nauroth <cnaur...@apache.org> >> wrote: >>> >>>> Enrico, thank you for putting together a release candidate. >>>> >>>> I briefly looked at the OWASP check failure. It's flagging multiple old >>>> CVEs against netty-tcnative-2.0.48.Final.jar. I can't imagine how >> these are >>>> still applicable. This is the newest version of the dependency, so we >> don't >>>> have another upgrade path we can try. >>>> >>>> I don't understand it. Unfortunately, I haven't found a solution yet. >>>> >>>> Chris Nauroth >>>> >>>> >>>> On Wed, Feb 9, 2022 at 2:05 AM Szalay-Bekő Máté < >>>> szalay.beko.m...@gmail.com> >>>> wrote: >>>> >>>>> I started to test it. apache-rat passed for me, but owasp first >> failed >>>> due >>>>> to some environment issue: >>>>> >>>>> [ERROR] Failed to execute goal >>>> org.owasp:dependency-check-maven:5.3.0:check >>>>> (default-cli) on project parent: Fatal exception(s) analyzing Apache >>>>> ZooKeeper: One or more exceptions occurred during analysis: >>>>> [ERROR] Unable to download meta file: >>>>> https://nvd.nist.gov/feeds/json/cve/1.1/nvdcve-1.1-2004.meta >>>>> [ERROR] No documents exist >>>>> [ERROR] -> [Help 1] >>>>> >>>>> Now I just re-run and this error disappeared, I assume nvd.nist.gov >> was >>>>> down for a while. >>>>> Now the owasp is failing for me with this error: >>>>> >>>>> [ERROR] Failed to execute goal >>>> org.owasp:dependency-check-maven:5.3.0:check >>>>> (default-cli) on project zookeeper: >>>>> [ERROR] >>>>> [ERROR] One or more dependencies were identified with vulnerabilities >>>> that >>>>> have a CVSS score greater than or equal to '0.0': >>>>> [ERROR] >>>>> [ERROR] netty-tcnative-2.0.48.Final.jar: CVE-2021-43797, >> CVE-2019-16869, >>>>> CVE-2015-2156, CVE-2021-37136, CVE-2014-3488, CVE-2021-37137, >>>>> CVE-2019-20445, CVE-2019-20444, CVE-2021-21295, CVE-2021-21409, >>>>> CVE-2021-21290 >>>>> [ERROR] >>>>> [ERROR] See the dependency-check report for more details. >>>>> >>>>> >>>>> I still continue to test the RC, let me know if it gets cancelled. >>>>> >>>>> >>>>> On Tue, Feb 8, 2022 at 9:52 PM Patrick Hunt <ph...@apache.org> >> wrote: >>>>> >>>>>> On Tue, Feb 8, 2022 at 12:36 PM Enrico Olivelli < >> eolive...@gmail.com> >>>>>> wrote: >>>>>> >>>>>>> Any comments? >>>>>>> >>>>>> >>>>>> owasp is still red - as such I assumed this release candidate is on >>>> hold >>>>>> until that's fixed. Is that not the case? >>>>>> >>>>>> Patrick >>>>>> >>>>>> >>>>>>> >>>>>>> Il Ven 4 Feb 2022, 12:07 Enrico Olivelli <eolive...@apache.org> >> ha >>>>>>> scritto: >>>>>>> >>>>>>>> This is a release candidate for 3.8.0. >>>>>>>> >>>>>>>> It is a major release and it introduces a lot of new features, >> most >>>>>>>> notably: >>>>>>>> - Migration of the logging framework from Apache Log4j1 to >> LogBack >>>>>>>> - Read Key/trust store password from file (and other security >>>> related >>>>>>>> improvements) >>>>>>>> - Restored support for OSGI >>>>>>>> - Reduced the performance impact of Prometheus metrics >>>>>>>> - Official support for JDK17 (all tests are passing) >>>>>>>> - Updates to all the third party dependencies to get rid of >> every >>>>> known >>>>>>>> CVE. >>>>>>>> >>>>>>>> The full release notes is available at: >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>> >>>>>> >>>>> >>>> >> https://issues.apache.org/jira/secure/ReleaseNote.jspa?projectId=12310801&version=12349587 >>>>>>>> >>>>>>>> *** Please download, test and vote by February 7th 2022, 23:59 >>>> UTC+0. >>>>>> *** >>>>>>>> >>>>>>>> Source files: >>>>>>>> >> https://people.apache.org/~eolivelli/zookeeper-3.8.0-candidate-0/ >>>>>>>> >>>>>>>> Maven staging repo: >>>>>>>> >>>>>>> >>>>>> >>>>> >>>> >> https://repository.apache.org/content/repositories/orgapachezookeeper-1072/ >>>>>>>> >>>>>>>> The release candidate tag in git to be voted upon: >> release-3.8.0-0 >>>>>>>> https://github.com/apache/zookeeper/tree/release-3.8.0-0 >>>>>>>> >>>>>>>> ZooKeeper's KEYS file containing PGP keys we use to sign the >>>> release: >>>>>>>> https://www.apache.org/dist/zookeeper/KEYS >>>>>>>> >>>>>>>> The staging version of the website is: >>>>>>>> >>>>>>> >>>>>> >>>>> >>>> >> https://people.apache.org/~eolivelli/zookeeper-3.8.0-candidate-0/website/ >>>>>>>> >>>>>>>> >>>>>>>> Should we release this candidate? >>>>>>>> Enrico Olivelli