Skip to content

Conversation

@figo
Copy link
Contributor

@figo figo commented Oct 19, 2019

Found issue with containerd 1.3.0:containerd/containerd#3761
we can look for version upgrade when issue solved.

containerd v1.2.10 has fixed CVE-2019-16884 and don't have issue above.

Signed-off-by: Hui Luo [email protected]

cc @dims @jiatongw @codenrhoden @frapposelli

Found issue with containerd 1.3.0:containerd/containerd#3761
we can look for version upgrade when issue solved.

containerd v1.2.10 has fixed CVE-2019-16884 and don't have issue above.

Signed-off-by: Hui Luo <[email protected]>
@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Oct 19, 2019
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: figo

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Details Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added approved Indicates a PR has been approved by an approver from all required OWNERS files. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files. labels Oct 19, 2019
@dims
Copy link
Member

dims commented Oct 19, 2019

/hold

@figo it breaks other things ... see note in #77 why we wanted to bump up to 1.3.0

@k8s-ci-robot k8s-ci-robot added the do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. label Oct 19, 2019
@dims
Copy link
Member

dims commented Oct 19, 2019

@dims
Copy link
Member

dims commented Oct 19, 2019

Also, 1.3.0 has the runc patch for CVE-2019-16884 containerd/containerd@95dbbdc

I really don't want to regress other things because Artifactory is broken.

@figo
Copy link
Contributor Author

figo commented Oct 19, 2019

Also, 1.3.0 has the runc patch for CVE-2019-16884 containerd/containerd@95dbbdc

I really don't want to regress other things because Artifactory is broken.

@dims i appreciate the finding, just went through both Docker Registry spec and OAuth spec, what's not clear to me is: whether JFrog agree on Containerd's interpretation of specifications (scope field is optional at OAuth spec), need to wait for their triage of the issue.

Put that aside, i am fully support of fixes brought in by Containerd 1.3.0,
at the same time, we can not break Jfrog/Artifactory users without proper alternative,
one possible approach is to create a release branch for Containerd 1.2.10.

@dims
Copy link
Member

dims commented Oct 19, 2019

@figo the problems enumerated in #77 is way more severe than breaking a very very limited number of users. Liveness/Readiness failing sporadically is not an easy/fun thing to diagnose.

If folks REALLY want to use jfrog with private auth, they can build the images themselves. I would not advise breaking everyone else at the cost of very few folks.

@dims
Copy link
Member

dims commented Oct 21, 2019

cc @andreikom

@codenrhoden
Copy link
Contributor

no movement on this one for a couple of weeks now... @figo, okay to close?

@dennisme
Copy link

This one looks good to me, although it's a tad old. Can we update it to https://github.com/containerd/containerd/releases/tag/v1.3.1?

Thoughts @figo @codenrhoden

@dims
Copy link
Member

dims commented Nov 22, 2019

update, i talked to @estesp (containerd) and artifactory folks (jfrog) while at kubecon, fix for https://www.jfrog.com/jira/browse/RTFACT-20170 is in progress and very imminent. code will not be changed in containerd to tolerate just artifactory (we need to stick to spec!).

@dennisme
Copy link

update, i talked to @estesp (containerd) and artifactory folks (jfrog) while at kubecon, fix for https://www.jfrog.com/jira/browse/RTFACT-20170 is in progress and very imminent. code will not be changed in containerd to tolerate just artifactory (we need to stick to spec!).

We've been experiencing a potentially related issue with pulling from private registries (non jfrog), wondering if this could be related.

@figo
Copy link
Contributor Author

figo commented Nov 25, 2019

update, i talked to @estesp (containerd) and artifactory folks (jfrog) while at kubecon, fix for https://www.jfrog.com/jira/browse/RTFACT-20170 is in progress and very imminent. code will not be changed in containerd to tolerate just artifactory (we need to stick to spec!).

We've been experiencing a potentially related issue with pulling from private registries (non jfrog), wondering if this could be related.

Hi @dennisme could you write up a new issue for the problem you may facing,

base on @dims said above, we are expecting to see an artifactory (jfrog) change soon, i am tended to close this issue.

Thanks

@codenrhoden
Copy link
Contributor

@figo you okay with closing this now?

@figo
Copy link
Contributor Author

figo commented Jan 9, 2020

/close

@k8s-ci-robot
Copy link
Contributor

@figo: Closed this PR.

Details

In response to this:

/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@estesp
Copy link

estesp commented Jan 13, 2020

@dims and others; just FYI: containerd/containerd#3556 (comment) (summary: JFrog Artifactory fix releases is now available for this issue)

@dims
Copy link
Member

dims commented Jan 13, 2020

Excellent news. thanks @estesp

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. do-not-merge/hold Indicates that a PR should not merge because someone has issued a /hold command. size/XS Denotes a PR that changes 0-9 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants