Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Upgrade dependencies 2023-11-27 #5723

Closed
38 of 39 tasks
github-actions bot opened this issue Nov 27, 2023 · 6 comments
Closed
38 of 39 tasks

Upgrade dependencies 2023-11-27 #5723

github-actions bot opened this issue Nov 27, 2023 · 6 comments
Assignees
Labels
+ [priority] High debt [type] A defect incurring continued engineering cost enh [type] New feature or request infra [subject] Project infrastructure like CI/CD, build and deployment scripts no demo [process] Not to be demonstrated at the end of the sprint operator [process] To be addressed by whoever is operator orange [process] Done by the Azul team

Comments

@github-actions
Copy link

github-actions bot commented Nov 27, 2023

  • Update PyCharm image
    • Bump base image tag (only same Debian release), if possible
    • Bump upstream version, if possible
    • Bump internal version
    • Build and test new image locally with Azul's make format
    • Remove unused dependencies with high or critical CVEs
    • Push commit to GitHub (directly to master branch, no PR needed)
    • GH Action workflow succeeded
    • Image is available on DockerHub
  • Update Elasticsearch image
    • Add a README.md
    • Bump base image tag (only minor and patch versions), if possible
    • Bump internal version
    • Build and test new image locally with Azul's make test
    • Remove unused dependencies with high or critical CVEs
    • Push commit to GitHub (directly to main branch, no PR needed)
    • GH Action workflow succeeded
    • Image is available on DockerHub
  • Create Azul PR, connected to this issue, with …
  • Delete obsolete image tags from DockerHub (but consider that prod may not use the latest image) …
  • Created tickets for any deferred updates to …
  • Post vulnerability report for anvilprod on this issue
    • To be done after PR is deployed to anvilprod
@github-actions github-actions bot added debt [type] A defect incurring continued engineering cost enh [type] New feature or request infra [subject] Project infrastructure like CI/CD, build and deployment scripts operator [process] To be addressed by whoever is operator labels Nov 27, 2023
@dsotirho-ucsc dsotirho-ucsc added the orange [process] Done by the Azul team label Nov 27, 2023
@dsotirho-ucsc dsotirho-ucsc self-assigned this Nov 27, 2023
@dsotirho-ucsc dsotirho-ucsc added - [priority] Medium + [priority] High and removed - [priority] Medium labels Nov 27, 2023
dsotirho-ucsc added a commit to DataBiosphere/azul-docker-pycharm that referenced this issue Nov 29, 2023
dsotirho-ucsc added a commit to DataBiosphere/azul-docker-elasticsearch that referenced this issue Nov 29, 2023
dsotirho-ucsc added a commit that referenced this issue Nov 29, 2023
@hannes-ucsc hannes-ucsc added the no demo [process] Not to be demonstrated at the end of the sprint label Dec 5, 2023
@dsotirho-ucsc
Copy link
Contributor

dsotirho-ucsc commented Dec 7, 2023

Anvilprod Vulnerability report for 2023-12-06 added as a new tab to the Anvilprod Inspector Findings spreadsheet.

(.venv) daniel@Crispin ~/repo/azul3 $ python scripts/inspector-findings.py
2023-12-06 16:56:18,600    INFO MainThread __main__: Fetching all findings from AWS Inspector
2023-12-06 16:56:18,614    INFO MainThread botocore.credentials: Found credentials in shared credentials file: ~/.aws/credentials
2023-12-06 16:56:22,480    INFO MainThread __main__: Fetched 672 findings from AWS Inspector with any severity
2023-12-06 16:56:22,481    INFO MainThread __main__: Found 195 unique vulnerabilities with severity matching ['CRITICAL', 'HIGH']
2023-12-06 16:56:22,482    INFO MainThread __main__: Writing file: inspector-findings_2023-12-06.csv
2023-12-06 16:56:22,483    INFO MainThread __main__: Done.

@dsotirho-ucsc
Copy link
Contributor

dsotirho-ucsc commented Dec 11, 2023

anvilprod vulnerability report for 2023-12-11 added as a new tab to the Anvilprod Inspector Findings spreadsheet.
The previous 2023-12-06 included inactive findings and has been removed from the spreadsheet.

$ python scripts/inspector-findings.py --severity CRITICAL HIGH
2023-12-11 15:31:51,889    INFO MainThread __main__: Fetching findings from AWS Inspector
2023-12-11 15:31:51,900    INFO MainThread botocore.credentials: Found credentials in shared credentials file: ~/.aws/credentials
2023-12-11 15:31:53,781    INFO MainThread __main__: Fetched 209 findings from AWS Inspector with severity ['CRITICAL', 'HIGH']
2023-12-11 15:31:53,782    INFO MainThread __main__: Found 170 unique vulnerabilities
2023-12-11 15:31:53,782    INFO MainThread __main__: Writing file: inspector-findings_2023-12-11.csv
2023-12-11 15:31:53,783    INFO MainThread __main__: Done.

@hannes-ucsc
Copy link
Member

image

@hannes-ucsc
Copy link
Member

Above is a screenshot of the most recent report with findings removed for images we don't use inside the boundary.

It's OK to post image vulnerability findings for Docker images. Which images we use is publicly available information (source code). Their vulnerabilities are also publicly listed on Dockerhub.

@hannes-ucsc
Copy link
Member

hannes-ucsc commented Dec 14, 2023

The next report should sort the rows by severity and number of affected images. Triaging to see what this would entail.

@hannes-ucsc
Copy link
Member

Lastly, it is a bit silly to just ignore checklist items that one doesn't have permissions for. Obviously, something needs to be done. The assignee of the ticket is responsible for that.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
+ [priority] High debt [type] A defect incurring continued engineering cost enh [type] New feature or request infra [subject] Project infrastructure like CI/CD, build and deployment scripts no demo [process] Not to be demonstrated at the end of the sprint operator [process] To be addressed by whoever is operator orange [process] Done by the Azul team
Projects
None yet
Development

No branches or pull requests

2 participants