[Pulp-list] Criteria search consumers

2016-04-25 Thread Roth, Sandro
Hi guys

I'm testing out the consumer and wondering about group bindings and memberships.

I have registered some consumers and now would like to add them to a group 
based on their notes.
One of them has the following notes

Notes:
  Os: 7
  Vm: true

I'm able to search based on "top level" fields like id but how do I search for 
these notes?

Things I've tried

pulp-admin consumer search --str-eq vm=true
pulp-admin consumer search --int-eq os=7
pulp-admin consumer search --match notes,vm=true


Any help would be appreciated :)

How are you handling group membership and bindings?
Is there a way to automatically join a group on registration and based on the 
group get bindings?


Thanks
Sandro

This email message and any attachments are confidential and may be privileged. 
If you are not the intended recipient, please notify us immediately and destroy 
the original transmittal. You are hereby notified that any review, copying or 
distribution of it is strictly prohibited. Thank you for your cooperation. 
Header information contained in E-mails to and from the company are monitored 
for operational reasons in accordance with the Swiss data protection act.


___
Pulp-list mailing list
Pulp-list@redhat.com
https://www.redhat.com/mailman/listinfo/pulp-list


Re: [Pulp-list] Pulp 2.8.3 Beta 1 released - Security & Bug fixes

2016-04-25 Thread Sean Myers
On 04/25/2016 04:39 AM, Sean Myers wrote:
> The following Security issues were addressed in this release:
> 
> CVE-2016-3111 (Low Impact):
> pulp.spec generates its RSA keys for message signing insecurely
> https://pulp.plan.io/issues/1837
> 
> CVE-2016-3112 (Moderate Impact):
> Pulp consumer private keys are world-readable
> https://pulp.plan.io/issues/1834
> 
> CVE-2016-3107 (Moderate Impact):
> Node certificate containing private key stored in world-readable file
> https://pulp.plan.io/issues/1833
> 
> CVE-2016-3108 (Moderate Impact):
> Insecure temporary file used when generating certificate for Pulp Nodes
> https://pulp.plan.io/issues/1830
> 
> CVE-2016-3106 (Low Impact):
> Insecure creation of temporary directory when generating new CA key
> https://pulp.plan.io/issues/1827
> 
> Details on addressing these vulnerabilities will be released in a
> followup email later today, and included in subsequent release
> announcements for 2.8.3 (apologies for not being able to include
> them in this post).

CVE-2013-7450 (https://bugzilla.redhat.com/show_bug.cgi?id=1003326)
-

Additionally, CVE-2013-7450 was announced during this release cycle, even 
though it was fixed in Pulp 2.3.0. Users who have upgraded from Pulp < 2.3.0 
may still be vulnerable, action may be required (see below).

Upgrade instructions


Some of the CVEs require user interaction to remedy. Begin by upgrading to  
Pulp 2.8.3:

$ sudo systemctl stop httpd pulp_workers pulp_resource_manager pulp_celerybeat 
goferd
$ sudo yum upgrade
$ sudo systemctl start httpd pulp_workers pulp_resource_manager pulp_celerybeat 
goferd

CVE-2016-3112 (Part I)
--

The client certificate for consumers 
(/etc/pki/pulp/consumer/consumer-cert.pem) was installed world-readable. This 
issue has been fixed for new certificates issued to consumers, but upgrading 
to 2.8.3 does not modify the permissions of old certificates. It is  
recommended that users regenerate the certificates by unregistering and 
re-registering all consumers. However, the consumers cannot be re-registered 
until CVE-2013-7450, CVE-2016-3095, CVE-2016-3106, and CVE-2016-3111 have 
been addressed below. Thus, start by unregistering each of your consumers (we 
will return to this CVE later to re-register them):

$ sudo pulp-consumer unregister

CVE-2013-7450, CVE-2016-3095, and CVE-2016-3106
---

There are two reasons that you may wish to regenerate Pulp's internal 
certificate authority key and certificate. First, if your Pulp installation 
started off as a version lower than 2.3.0 and you are still using the default 
CA certificate and key that was distributed with those versions of Pulp, then 
you are still vulnerable to CVE-2013-7450 and it is crucial that you generate 
a new unique CA. 

Additionally, CVE-2016-3095 and CVE-2016-3106 made it possible for local 
attackers to read the CA key during generation (which happens during the 
initial installation of Pulp or any time an admin ran 
pulp-gen-ca-certificate). If you are concerned that a local user may have 
read that CA key during the brief window that it was visible it is  
recommended that you regenerate the key and cert.

To regenerate the certificate, you should remove the old one and then you may 
use the provided utility:

# First remove the old files so that the new files get the correct SELinux 
context.

$ sudo rm /etc/pki/pulp/ca.*
$ sudo pulp-gen-ca-certificate

If you choose not to perform the CA regeneration, you may wish to apply the 
correct SELinux type to your existing CA files as versions of Pulp < 2.8.3 
generated this file with an incorrect SELinux type. You don't need to do this 
if you removed the old file and regenerated it with pulp-gen-ca-certificate. 
You can run restorecon recursively on the /etc/pki/pulp folder to fix the 
SELinux label on your existing CA certificate:

# You only need to do this if you didn't regenerate the CA above.
$ sudo restorecon -R /etc/pki/pulp

CVE-2016-3107 and CVE-2016-3108
---

For Nodes users, the /etc/pki/pulp/nodes/node.crt file was installed 
world-readable. Users are recommended to remove this file and regenerate it 
by running pulp-gen-nodes-certificate:

# It is important to remove the file so that the new file has the correct 
permissions.
$ sudo rm /etc/pki/pulp/nodes/node.crt
$ sudo pulp-gen-nodes-certificate

CVE-2016-3111
-

Both the RSA key pair for the Pulp server and RSA key pair for each Pulp 
consumer was generated during installation in an insecure directory. This 
vulnerability allowed a local attacker to read the private key portion of the 
key pair. These keys are used for message authentication between the Pulp 
server and the Pulp consumers. If you are concerned that a local attacker was 
able to read these keys, you can regenerate them. We do not ship a script to 
perform this, but the process is straight-forward. For the Pulp

[Pulp-list] Pulp 2.8.3 Beta 1 released - Security & Bug fixes

2016-04-25 Thread Sean Myers
Pulp, along with the Puppet (pulp_puppet) and RPM (pulp_rpm) plugins,
have been updated to 2.8.3. This release also includes betas for OSTree
plugin (pulp_ostree) version 1.1.1 and the Docker plugin (pulp_docker)
version 2.0.1.

The following Security issues were addressed in this release:

CVE-2016-3111 (Low Impact):
pulp.spec generates its RSA keys for message signing insecurely
https://pulp.plan.io/issues/1837

CVE-2016-3112 (Moderate Impact):
Pulp consumer private keys are world-readable
https://pulp.plan.io/issues/1834

CVE-2016-3107 (Moderate Impact):
Node certificate containing private key stored in world-readable file
https://pulp.plan.io/issues/1833

CVE-2016-3108 (Moderate Impact):
Insecure temporary file used when generating certificate for Pulp Nodes
https://pulp.plan.io/issues/1830

CVE-2016-3106 (Low Impact):
Insecure creation of temporary directory when generating new CA key
https://pulp.plan.io/issues/1827

Details on addressing these vulnerabilities will be released in a
followup email later today, and included in subsequent release
announcements for 2.8.3 (apologies for not being able to include
them in this post).

Bugs fixed in this release:

  OSTree Support
1106relative_path should be checked for url collision
  Pulp
1837CVE-2016-3111: pulp.spec generates its RSA keys for message 
signing insecurely
1834CVE-2016-3112: Pulp consumer private keys are world-readable
1833CVE-2016-3107: Node certificate containing private key stored 
in world-readable file
1830CVE-2016-3108: Insecure temporary file used when generating 
certificate for Pulp Nodes
1827CVE-2016-3106: Insecure creation of temporary directory when 
generating new CA key
1824iso repo publish fails for file in subdirectories
1809python 2.6 incompatibility during set_importer
1802Pulp 2.8 client no longer supports sha1 RPM checksum type
1801Pulp celery_beat and resource_manager are running, but logs say 
they are not running
1794A Pulp unit test is failing to find a certificate to be valid
1791After upgrading from 2.7.1 to pulp 2.8.0 getting 403 error's on 
all my Pulp repo's.
1784regression: "pulp-admin rpm repo search" with filters does not 
work as expected
1771requests or urllib3 can't read a file which causes Nectar to 
fail mysteriously
1764SELinux denial on Celery attempting to read resolv.conf
1601Migrate /var/lib/pulp/content to new 2.8 storage paths.
1576content type mongo id searches not working
  Puppet Support
1780PLP: Update failed (The dotted field 
'thomasmckay-rsync-0.4.1-thomasmckay'
  Python Support
1855Upload broken
  RPM Support
1856publishing kickstart repo fails on EL6
1843Pulp publishes invalid PULP_DISTRIBUTION.xml metadata
1835export fails when units are not downloaded
1828pulp doesn't sync reference title correctly from errata
1813Handle duplicate key error in comps.xml upload
1812Comps.xml upload succeeds but units are not associated to the 
repo.
1808exporting a sufficiently large repo with 'on_demand' policy 
results in BSON error
1792recursive and depsolving unit copy results in 
PulpExecutionException
1782None in generated XML for 
unit with no 'reboot_suggested'
1778Switching a repository to immediate from on_demand doesn't 
download its packages
1768Unable to sync RHEL 5 repositories with a distribution

View the full issue list in redmine here:
http://bit.ly/1Tsld0E



signature.asc
Description: OpenPGP digital signature
___
Pulp-list mailing list
Pulp-list@redhat.com
https://www.redhat.com/mailman/listinfo/pulp-list