Re: [VOTE] Apache ZooKeeper release 3.8.0 candidate 0

2022-02-25 Thread Enrico Olivelli
Mike,
I sent out the VOTE for rc1,
I staged the artifacts on dist.apache.org

Enrico

Il giorno gio 24 feb 2022 alle ore 08:58 Enrico Olivelli
 ha scritto:
>
> Mike,
>
> Il giorno gio 10 feb 2022 alle ore 19:51 Mike Drob 
> ha scritto:
> >
> >
> >
> > On 2022/02/04 11:07:34 Enrico Olivelli wrote:
> > >
> > > Source files:
> > > https://people.apache.org/~eolivelli/zookeeper-3.8.0-candidate-0/
> > >
> >
> > >
> > > The staging version of the website is:
> > > https://people.apache.org/~eolivelli/zookeeper-3.8.0-candidate-0/website/
> > >
> >
> > Is there a reason that these are staged on your personal space on 
> > people.apache instead of the svn dev space at 
> > https://dist.apache.org/repos/dist/dev/zookeeper/
>
> I guess it is only a "tradition" of the project.
> There is no reason.
>
> we can change
>
> for reference
> https://cwiki.apache.org/confluence/display/ZOOKEEPER/HowToRelease+using+maven+release+plugin
>
> other thoughts ?
>
> Enrico
>
>
>
> >
> > I see that there are older RCs still hanging about there.
> >
> > Mike


Re: [VOTE] Apache ZooKeeper release 3.8.0 candidate 0

2022-02-23 Thread Enrico Olivelli
Mike,

Il giorno gio 10 feb 2022 alle ore 19:51 Mike Drob 
ha scritto:
>
>
>
> On 2022/02/04 11:07:34 Enrico Olivelli wrote:
> >
> > Source files:
> > https://people.apache.org/~eolivelli/zookeeper-3.8.0-candidate-0/
> >
>
> >
> > The staging version of the website is:
> > https://people.apache.org/~eolivelli/zookeeper-3.8.0-candidate-0/website/
> >
>
> Is there a reason that these are staged on your personal space on 
> people.apache instead of the svn dev space at 
> https://dist.apache.org/repos/dist/dev/zookeeper/

I guess it is only a "tradition" of the project.
There is no reason.

we can change

for reference
https://cwiki.apache.org/confluence/display/ZOOKEEPER/HowToRelease+using+maven+release+plugin

other thoughts ?

Enrico



>
> I see that there are older RCs still hanging about there.
>
> Mike


Re: [VOTE] Apache ZooKeeper release 3.8.0 candidate 0

2022-02-23 Thread Enrico Olivelli
FYI
today OWASP started to fail again while I was preparing a new RC :-(

please anyone help with a review of
https://github.com/apache/zookeeper/pull/1824


Enrico

Il giorno gio 10 feb 2022 alle ore 19:51 Mike Drob 
ha scritto:
>
>
>
> On 2022/02/04 11:07:34 Enrico Olivelli wrote:
> >
> > Source files:
> > https://people.apache.org/~eolivelli/zookeeper-3.8.0-candidate-0/
> >
>
> >
> > The staging version of the website is:
> > https://people.apache.org/~eolivelli/zookeeper-3.8.0-candidate-0/website/
> >
>
> Is there a reason that these are staged on your personal space on 
> people.apache instead of the svn dev space at 
> https://dist.apache.org/repos/dist/dev/zookeeper/
>
> I see that there are older RCs still hanging about there.
>
> Mike


Re: [VOTE] Apache ZooKeeper release 3.8.0 candidate 0

2022-02-10 Thread Mike Drob



On 2022/02/04 11:07:34 Enrico Olivelli wrote:
> 
> Source files:
> https://people.apache.org/~eolivelli/zookeeper-3.8.0-candidate-0/
> 

> 
> The staging version of the website is:
> https://people.apache.org/~eolivelli/zookeeper-3.8.0-candidate-0/website/
> 

Is there a reason that these are staged on your personal space on people.apache 
instead of the svn dev space at 
https://dist.apache.org/repos/dist/dev/zookeeper/

I see that there are older RCs still hanging about there.

Mike


Re: [VOTE] Apache ZooKeeper release 3.8.0 candidate 0

2022-02-10 Thread Enrico Olivelli
-1 (binding)

Let me add the exclusion and prepare a new RC.

I am cancelling this VOTE

Thanks to everyone
Enrico

Il Gio 10 Feb 2022, 17:47 Andor Molnar  ha scritto:

> I agree with Pat. Though adding exclusions doesn’t make any difference in
> the quality of our code, but a build is a build. It’s either green or red
> (not green). No excuse.
>
> Andor
>
>
>
> > On 2022. Feb 10., at 16:51, Patrick Hunt  wrote:
> >
> > On Thu, Feb 10, 2022 at 12:22 AM Enrico Olivelli 
> > wrote:
> >
> >> Patrick,
> >> If you prefer I can send a patch for. the exclusion of
> >> [ERROR] netty-tcnative-2.0.48.Final.jar: CVE-2021-43797, CVE-2019-16869,
> >> CVE-2015-2156, CVE-2021-37136, CVE-2014-3488, CVE-2021-37137,
> >> CVE-2019-20445, CVE-2019-20444, CVE-2021-21295, CVE-2021-21409,
> >> CVE-2021-21290
> >>
> >> That said, this won't affect the goodness of the RC.
> >>
> >> Our code is safe and the dependencies we use are safe:
> >> - to me it looks like those are false positive or at least not related
> >> to ZooKeeper
> >> - we are not using Netty TC Native features, it is a dependency we
> >> inherit, and probably ZooKeeper works well without it
> >>
> >> Thank you all of taking time to test the release
> >>
> >>
> > NP. My concern is highlighted by this (your) response. You had to say all
> > this to explain why the build is failing on a simple security check.
> > Post-log4shell folks are really sensitive to security issues, as they
> > should be, as we all should be. Its very important that we take security
> > seriously. If I download the release, and run the owasp check it fails. I
> > then have questions in my mind why. All that you explained here, while
> > perfectly reasonable, it won't be available to me at that point. I think
> > rather we should ensure that releases are solid/clean before we push
> them.
> > This is a simple thing to fix before we go through the entire process of
> > verifying/releasing a new version.
> >
> > Hopefully this explains my concerns.
> >
> > Regards,
> >
> > Patrick
> >
> >
> >> Enrico
> >>
> >> Il giorno gio 10 feb 2022 alle ore 09:13 Szalay-Bekő Máté
> >>  ha scritto:
> >>>
> >>> Thanks Enrico for working on the release candidate!
> >>>
> >>> The RC looks good to me if we are sure that the OWASP problem is a
> false
> >>> positive and we can skip this netty-tcnative jar check. However, these
> >> CVEs
> >>> are old... Is it possible that we just added this jar by accident with
> >> the
> >>> recent netty upgrade? If we don't need it, should we exclude it?
> >>>
> >>> I wouldn't vote with +1 until we clarify the state of these CVEs.
> >>>
> >>> My RC check:
> >>>
> >>> - apache-rat passed
> >>> - I built the source code (-Pfull-build) on dockerized Ubuntu 18.04.6
> >> using
> >>> OpenJDK 11.0.13 and maven 3.6.0.
> >>> - all the java unit tests passed eventually. I had 4-8 tests failing in
> >>> each run, but after 4 runs all tests passed at least once. (I used
> >>> -Dsurefire-forkcount=1) We should somehow fix these flakies. There are
> >>> flakies on the CI, but not this many. I executed in docker, maybe this
> is
> >>> the reason or the CI is using a different java version?
> >>> - checkstyle and spotbugs passed
> >>> - OWASP (CVE check) failed with the mentioned
> >>> netty-tcnative-2.0.48.Final.jar failures.
> >>> - I built the fatjar
> >>> - I executed C client tests. Two of these failed constantly for me:
> >>> Zookeeper_simpleSystem::testIPV6 and
> >>> Zookeeper_SASLAuth::testClientSASLOverIPv6. (I think these fail for me
> >>> because I execute C unit tests on docker, there might be some issues
> with
> >>> the IPv6 interface) I see these passed on CI running on the
> >> branch-3.8.0. (
> >>>
> >>
> https://github.com/apache/zookeeper/runs/5048875668?check_suite_focus=true
> >> )
> >>> - I also built and executed unit tests for zkpython
> >>> - I executed quick rolling-upgrade tests (using
> >>> https://github.com/symat/zk-rolling-upgrade-test):
> >>>  - rolling upgrade from 3.5.9 to 3.8.0
> >>>  - rolling upgrade from 3.6.3 to 3.8.0
> >>>  - rolling upgrade from 3.7.0 to 3.8.0
> >>> - The web page looks OK
> >>>
> >>> Best regards,
> >>> Máté
> >>>
> >>> On Wed, Feb 9, 2022 at 8:04 PM Chris Nauroth 
> >> wrote:
> >>>
>  Enrico, thank you for putting together a release candidate.
> 
>  I briefly looked at the OWASP check failure. It's flagging multiple
> old
>  CVEs against netty-tcnative-2.0.48.Final.jar. I can't imagine how
> >> these are
>  still applicable. This is the newest version of the dependency, so we
> >> don't
>  have another upgrade path we can try.
> 
>  I don't understand it. Unfortunately, I haven't found a solution yet.
> 
>  Chris Nauroth
> 
> 
>  On Wed, Feb 9, 2022 at 2:05 AM Szalay-Bekő Máté <
>  szalay.beko.m...@gmail.com>
>  wrote:
> 
> > I started to test it. apache-rat passed for me, but owasp first
> >> failed
>  due
> > to some environment issue:
> >
> > 

Re: [VOTE] Apache ZooKeeper release 3.8.0 candidate 0

2022-02-10 Thread Andor Molnar
I agree with Pat. Though adding exclusions doesn’t make any difference in the 
quality of our code, but a build is a build. It’s either green or red (not 
green). No excuse.

Andor



> On 2022. Feb 10., at 16:51, Patrick Hunt  wrote:
> 
> On Thu, Feb 10, 2022 at 12:22 AM Enrico Olivelli 
> wrote:
> 
>> Patrick,
>> If you prefer I can send a patch for. the exclusion of
>> [ERROR] netty-tcnative-2.0.48.Final.jar: CVE-2021-43797, CVE-2019-16869,
>> CVE-2015-2156, CVE-2021-37136, CVE-2014-3488, CVE-2021-37137,
>> CVE-2019-20445, CVE-2019-20444, CVE-2021-21295, CVE-2021-21409,
>> CVE-2021-21290
>> 
>> That said, this won't affect the goodness of the RC.
>> 
>> Our code is safe and the dependencies we use are safe:
>> - to me it looks like those are false positive or at least not related
>> to ZooKeeper
>> - we are not using Netty TC Native features, it is a dependency we
>> inherit, and probably ZooKeeper works well without it
>> 
>> Thank you all of taking time to test the release
>> 
>> 
> NP. My concern is highlighted by this (your) response. You had to say all
> this to explain why the build is failing on a simple security check.
> Post-log4shell folks are really sensitive to security issues, as they
> should be, as we all should be. Its very important that we take security
> seriously. If I download the release, and run the owasp check it fails. I
> then have questions in my mind why. All that you explained here, while
> perfectly reasonable, it won't be available to me at that point. I think
> rather we should ensure that releases are solid/clean before we push them.
> This is a simple thing to fix before we go through the entire process of
> verifying/releasing a new version.
> 
> Hopefully this explains my concerns.
> 
> Regards,
> 
> Patrick
> 
> 
>> Enrico
>> 
>> Il giorno gio 10 feb 2022 alle ore 09:13 Szalay-Bekő Máté
>>  ha scritto:
>>> 
>>> Thanks Enrico for working on the release candidate!
>>> 
>>> The RC looks good to me if we are sure that the OWASP problem is a false
>>> positive and we can skip this netty-tcnative jar check. However, these
>> CVEs
>>> are old... Is it possible that we just added this jar by accident with
>> the
>>> recent netty upgrade? If we don't need it, should we exclude it?
>>> 
>>> I wouldn't vote with +1 until we clarify the state of these CVEs.
>>> 
>>> My RC check:
>>> 
>>> - apache-rat passed
>>> - I built the source code (-Pfull-build) on dockerized Ubuntu 18.04.6
>> using
>>> OpenJDK 11.0.13 and maven 3.6.0.
>>> - all the java unit tests passed eventually. I had 4-8 tests failing in
>>> each run, but after 4 runs all tests passed at least once. (I used
>>> -Dsurefire-forkcount=1) We should somehow fix these flakies. There are
>>> flakies on the CI, but not this many. I executed in docker, maybe this is
>>> the reason or the CI is using a different java version?
>>> - checkstyle and spotbugs passed
>>> - OWASP (CVE check) failed with the mentioned
>>> netty-tcnative-2.0.48.Final.jar failures.
>>> - I built the fatjar
>>> - I executed C client tests. Two of these failed constantly for me:
>>> Zookeeper_simpleSystem::testIPV6 and
>>> Zookeeper_SASLAuth::testClientSASLOverIPv6. (I think these fail for me
>>> because I execute C unit tests on docker, there might be some issues with
>>> the IPv6 interface) I see these passed on CI running on the
>> branch-3.8.0. (
>>> 
>> https://github.com/apache/zookeeper/runs/5048875668?check_suite_focus=true
>> )
>>> - I also built and executed unit tests for zkpython
>>> - I executed quick rolling-upgrade tests (using
>>> https://github.com/symat/zk-rolling-upgrade-test):
>>>  - rolling upgrade from 3.5.9 to 3.8.0
>>>  - rolling upgrade from 3.6.3 to 3.8.0
>>>  - rolling upgrade from 3.7.0 to 3.8.0
>>> - The web page looks OK
>>> 
>>> Best regards,
>>> Máté
>>> 
>>> On Wed, Feb 9, 2022 at 8:04 PM Chris Nauroth 
>> wrote:
>>> 
 Enrico, thank you for putting together a release candidate.
 
 I briefly looked at the OWASP check failure. It's flagging multiple old
 CVEs against netty-tcnative-2.0.48.Final.jar. I can't imagine how
>> these are
 still applicable. This is the newest version of the dependency, so we
>> don't
 have another upgrade path we can try.
 
 I don't understand it. Unfortunately, I haven't found a solution yet.
 
 Chris Nauroth
 
 
 On Wed, Feb 9, 2022 at 2:05 AM Szalay-Bekő Máté <
 szalay.beko.m...@gmail.com>
 wrote:
 
> I started to test it. apache-rat passed for me, but owasp first
>> failed
 due
> to some environment issue:
> 
> [ERROR] Failed to execute goal
 org.owasp:dependency-check-maven:5.3.0:check
> (default-cli) on project parent: Fatal exception(s) analyzing Apache
> ZooKeeper: One or more exceptions occurred during analysis:
> [ERROR] Unable to download meta file:
> https://nvd.nist.gov/feeds/json/cve/1.1/nvdcve-1.1-2004.meta
> [ERROR] No documents exist
> [ERROR] -> [Help 1]
> 
> 

Re: [VOTE] Apache ZooKeeper release 3.8.0 candidate 0

2022-02-10 Thread Patrick Hunt
On Thu, Feb 10, 2022 at 12:22 AM Enrico Olivelli 
wrote:

> Patrick,
> If you prefer I can send a patch for. the exclusion of
> [ERROR] netty-tcnative-2.0.48.Final.jar: CVE-2021-43797, CVE-2019-16869,
> CVE-2015-2156, CVE-2021-37136, CVE-2014-3488, CVE-2021-37137,
> CVE-2019-20445, CVE-2019-20444, CVE-2021-21295, CVE-2021-21409,
> CVE-2021-21290
>
> That said, this won't affect the goodness of the RC.
>
> Our code is safe and the dependencies we use are safe:
> - to me it looks like those are false positive or at least not related
> to ZooKeeper
> - we are not using Netty TC Native features, it is a dependency we
> inherit, and probably ZooKeeper works well without it
>
> Thank you all of taking time to test the release
>
>
NP. My concern is highlighted by this (your) response. You had to say all
this to explain why the build is failing on a simple security check.
Post-log4shell folks are really sensitive to security issues, as they
should be, as we all should be. Its very important that we take security
seriously. If I download the release, and run the owasp check it fails. I
then have questions in my mind why. All that you explained here, while
perfectly reasonable, it won't be available to me at that point. I think
rather we should ensure that releases are solid/clean before we push them.
This is a simple thing to fix before we go through the entire process of
verifying/releasing a new version.

Hopefully this explains my concerns.

Regards,

Patrick


> Enrico
>
> Il giorno gio 10 feb 2022 alle ore 09:13 Szalay-Bekő Máté
>  ha scritto:
> >
> > Thanks Enrico for working on the release candidate!
> >
> > The RC looks good to me if we are sure that the OWASP problem is a false
> > positive and we can skip this netty-tcnative jar check. However, these
> CVEs
> > are old... Is it possible that we just added this jar by accident with
> the
> > recent netty upgrade? If we don't need it, should we exclude it?
> >
> > I wouldn't vote with +1 until we clarify the state of these CVEs.
> >
> > My RC check:
> >
> > - apache-rat passed
> > - I built the source code (-Pfull-build) on dockerized Ubuntu 18.04.6
> using
> > OpenJDK 11.0.13 and maven 3.6.0.
> > - all the java unit tests passed eventually. I had 4-8 tests failing in
> > each run, but after 4 runs all tests passed at least once. (I used
> > -Dsurefire-forkcount=1) We should somehow fix these flakies. There are
> > flakies on the CI, but not this many. I executed in docker, maybe this is
> > the reason or the CI is using a different java version?
> > - checkstyle and spotbugs passed
> > - OWASP (CVE check) failed with the mentioned
> > netty-tcnative-2.0.48.Final.jar failures.
> > - I built the fatjar
> > - I executed C client tests. Two of these failed constantly for me:
> > Zookeeper_simpleSystem::testIPV6 and
> > Zookeeper_SASLAuth::testClientSASLOverIPv6. (I think these fail for me
> > because I execute C unit tests on docker, there might be some issues with
> > the IPv6 interface) I see these passed on CI running on the
> branch-3.8.0. (
> >
> https://github.com/apache/zookeeper/runs/5048875668?check_suite_focus=true
> )
> > - I also built and executed unit tests for zkpython
> > - I executed quick rolling-upgrade tests (using
> > https://github.com/symat/zk-rolling-upgrade-test):
> >   - rolling upgrade from 3.5.9 to 3.8.0
> >   - rolling upgrade from 3.6.3 to 3.8.0
> >   - rolling upgrade from 3.7.0 to 3.8.0
> > - The web page looks OK
> >
> > Best regards,
> > Máté
> >
> > On Wed, Feb 9, 2022 at 8:04 PM Chris Nauroth 
> wrote:
> >
> > > Enrico, thank you for putting together a release candidate.
> > >
> > > I briefly looked at the OWASP check failure. It's flagging multiple old
> > > CVEs against netty-tcnative-2.0.48.Final.jar. I can't imagine how
> these are
> > > still applicable. This is the newest version of the dependency, so we
> don't
> > > have another upgrade path we can try.
> > >
> > > I don't understand it. Unfortunately, I haven't found a solution yet.
> > >
> > > Chris Nauroth
> > >
> > >
> > > On Wed, Feb 9, 2022 at 2:05 AM Szalay-Bekő Máté <
> > > szalay.beko.m...@gmail.com>
> > > wrote:
> > >
> > > > I started to test it. apache-rat passed for me, but owasp first
> failed
> > > due
> > > > to some environment issue:
> > > >
> > > > [ERROR] Failed to execute goal
> > > org.owasp:dependency-check-maven:5.3.0:check
> > > > (default-cli) on project parent: Fatal exception(s) analyzing Apache
> > > > ZooKeeper: One or more exceptions occurred during analysis:
> > > > [ERROR] Unable to download meta file:
> > > > https://nvd.nist.gov/feeds/json/cve/1.1/nvdcve-1.1-2004.meta
> > > > [ERROR] No documents exist
> > > > [ERROR] -> [Help 1]
> > > >
> > > > Now I just re-run and this error disappeared, I assume nvd.nist.gov
> was
> > > > down for a while.
> > > > Now the owasp is failing for me with this error:
> > > >
> > > > [ERROR] Failed to execute goal
> > > org.owasp:dependency-check-maven:5.3.0:check
> > > > (default-cli) on project 

Re: [VOTE] Apache ZooKeeper release 3.8.0 candidate 0

2022-02-10 Thread Enrico Olivelli
Patrick,
If you prefer I can send a patch for. the exclusion of
[ERROR] netty-tcnative-2.0.48.Final.jar: CVE-2021-43797, CVE-2019-16869,
CVE-2015-2156, CVE-2021-37136, CVE-2014-3488, CVE-2021-37137,
CVE-2019-20445, CVE-2019-20444, CVE-2021-21295, CVE-2021-21409,
CVE-2021-21290

That said, this won't affect the goodness of the RC.

Our code is safe and the dependencies we use are safe:
- to me it looks like those are false positive or at least not related
to ZooKeeper
- we are not using Netty TC Native features, it is a dependency we
inherit, and probably ZooKeeper works well without it

Thank you all of taking time to test the release

Enrico

Il giorno gio 10 feb 2022 alle ore 09:13 Szalay-Bekő Máté
 ha scritto:
>
> Thanks Enrico for working on the release candidate!
>
> The RC looks good to me if we are sure that the OWASP problem is a false
> positive and we can skip this netty-tcnative jar check. However, these CVEs
> are old... Is it possible that we just added this jar by accident with the
> recent netty upgrade? If we don't need it, should we exclude it?
>
> I wouldn't vote with +1 until we clarify the state of these CVEs.
>
> My RC check:
>
> - apache-rat passed
> - I built the source code (-Pfull-build) on dockerized Ubuntu 18.04.6 using
> OpenJDK 11.0.13 and maven 3.6.0.
> - all the java unit tests passed eventually. I had 4-8 tests failing in
> each run, but after 4 runs all tests passed at least once. (I used
> -Dsurefire-forkcount=1) We should somehow fix these flakies. There are
> flakies on the CI, but not this many. I executed in docker, maybe this is
> the reason or the CI is using a different java version?
> - checkstyle and spotbugs passed
> - OWASP (CVE check) failed with the mentioned
> netty-tcnative-2.0.48.Final.jar failures.
> - I built the fatjar
> - I executed C client tests. Two of these failed constantly for me:
> Zookeeper_simpleSystem::testIPV6 and
> Zookeeper_SASLAuth::testClientSASLOverIPv6. (I think these fail for me
> because I execute C unit tests on docker, there might be some issues with
> the IPv6 interface) I see these passed on CI running on the branch-3.8.0. (
> https://github.com/apache/zookeeper/runs/5048875668?check_suite_focus=true)
> - I also built and executed unit tests for zkpython
> - I executed quick rolling-upgrade tests (using
> https://github.com/symat/zk-rolling-upgrade-test):
>   - rolling upgrade from 3.5.9 to 3.8.0
>   - rolling upgrade from 3.6.3 to 3.8.0
>   - rolling upgrade from 3.7.0 to 3.8.0
> - The web page looks OK
>
> Best regards,
> Máté
>
> On Wed, Feb 9, 2022 at 8:04 PM Chris Nauroth  wrote:
>
> > Enrico, thank you for putting together a release candidate.
> >
> > I briefly looked at the OWASP check failure. It's flagging multiple old
> > CVEs against netty-tcnative-2.0.48.Final.jar. I can't imagine how these are
> > still applicable. This is the newest version of the dependency, so we don't
> > have another upgrade path we can try.
> >
> > I don't understand it. Unfortunately, I haven't found a solution yet.
> >
> > Chris Nauroth
> >
> >
> > On Wed, Feb 9, 2022 at 2:05 AM Szalay-Bekő Máté <
> > szalay.beko.m...@gmail.com>
> > wrote:
> >
> > > I started to test it. apache-rat passed for me, but owasp first failed
> > due
> > > to some environment issue:
> > >
> > > [ERROR] Failed to execute goal
> > org.owasp:dependency-check-maven:5.3.0:check
> > > (default-cli) on project parent: Fatal exception(s) analyzing Apache
> > > ZooKeeper: One or more exceptions occurred during analysis:
> > > [ERROR] Unable to download meta file:
> > > https://nvd.nist.gov/feeds/json/cve/1.1/nvdcve-1.1-2004.meta
> > > [ERROR] No documents exist
> > > [ERROR] -> [Help 1]
> > >
> > > Now I just re-run and this error disappeared, I assume nvd.nist.gov was
> > > down for a while.
> > > Now the owasp is failing for me with this error:
> > >
> > > [ERROR] Failed to execute goal
> > org.owasp:dependency-check-maven:5.3.0:check
> > > (default-cli) on project zookeeper:
> > > [ERROR]
> > > [ERROR] One or more dependencies were identified with vulnerabilities
> > that
> > > have a CVSS score greater than or equal to '0.0':
> > > [ERROR]
> > > [ERROR] netty-tcnative-2.0.48.Final.jar: CVE-2021-43797, CVE-2019-16869,
> > > CVE-2015-2156, CVE-2021-37136, CVE-2014-3488, CVE-2021-37137,
> > > CVE-2019-20445, CVE-2019-20444, CVE-2021-21295, CVE-2021-21409,
> > > CVE-2021-21290
> > > [ERROR]
> > > [ERROR] See the dependency-check report for more details.
> > >
> > >
> > > I still continue to test the RC, let me know if it gets cancelled.
> > >
> > >
> > > On Tue, Feb 8, 2022 at 9:52 PM Patrick Hunt  wrote:
> > >
> > > > On Tue, Feb 8, 2022 at 12:36 PM Enrico Olivelli 
> > > > wrote:
> > > >
> > > > > Any comments?
> > > > >
> > > >
> > > > owasp is still red - as such I assumed this release candidate is on
> > hold
> > > > until that's fixed. Is that not the case?
> > > >
> > > > Patrick
> > > >
> > > >
> > > > >
> > > > > Il Ven 4 Feb 2022, 12:07 Enrico Olivelli  ha
> > > > 

Re: [VOTE] Apache ZooKeeper release 3.8.0 candidate 0

2022-02-10 Thread Szalay-Bekő Máté
Thanks Enrico for working on the release candidate!

The RC looks good to me if we are sure that the OWASP problem is a false
positive and we can skip this netty-tcnative jar check. However, these CVEs
are old... Is it possible that we just added this jar by accident with the
recent netty upgrade? If we don't need it, should we exclude it?

I wouldn't vote with +1 until we clarify the state of these CVEs.

My RC check:

- apache-rat passed
- I built the source code (-Pfull-build) on dockerized Ubuntu 18.04.6 using
OpenJDK 11.0.13 and maven 3.6.0.
- all the java unit tests passed eventually. I had 4-8 tests failing in
each run, but after 4 runs all tests passed at least once. (I used
-Dsurefire-forkcount=1) We should somehow fix these flakies. There are
flakies on the CI, but not this many. I executed in docker, maybe this is
the reason or the CI is using a different java version?
- checkstyle and spotbugs passed
- OWASP (CVE check) failed with the mentioned
netty-tcnative-2.0.48.Final.jar failures.
- I built the fatjar
- I executed C client tests. Two of these failed constantly for me:
Zookeeper_simpleSystem::testIPV6 and
Zookeeper_SASLAuth::testClientSASLOverIPv6. (I think these fail for me
because I execute C unit tests on docker, there might be some issues with
the IPv6 interface) I see these passed on CI running on the branch-3.8.0. (
https://github.com/apache/zookeeper/runs/5048875668?check_suite_focus=true)
- I also built and executed unit tests for zkpython
- I executed quick rolling-upgrade tests (using
https://github.com/symat/zk-rolling-upgrade-test):
  - rolling upgrade from 3.5.9 to 3.8.0
  - rolling upgrade from 3.6.3 to 3.8.0
  - rolling upgrade from 3.7.0 to 3.8.0
- The web page looks OK

Best regards,
Máté

On Wed, Feb 9, 2022 at 8:04 PM Chris Nauroth  wrote:

> Enrico, thank you for putting together a release candidate.
>
> I briefly looked at the OWASP check failure. It's flagging multiple old
> CVEs against netty-tcnative-2.0.48.Final.jar. I can't imagine how these are
> still applicable. This is the newest version of the dependency, so we don't
> have another upgrade path we can try.
>
> I don't understand it. Unfortunately, I haven't found a solution yet.
>
> Chris Nauroth
>
>
> On Wed, Feb 9, 2022 at 2:05 AM Szalay-Bekő Máté <
> szalay.beko.m...@gmail.com>
> wrote:
>
> > I started to test it. apache-rat passed for me, but owasp first failed
> due
> > to some environment issue:
> >
> > [ERROR] Failed to execute goal
> org.owasp:dependency-check-maven:5.3.0:check
> > (default-cli) on project parent: Fatal exception(s) analyzing Apache
> > ZooKeeper: One or more exceptions occurred during analysis:
> > [ERROR] Unable to download meta file:
> > https://nvd.nist.gov/feeds/json/cve/1.1/nvdcve-1.1-2004.meta
> > [ERROR] No documents exist
> > [ERROR] -> [Help 1]
> >
> > Now I just re-run and this error disappeared, I assume nvd.nist.gov was
> > down for a while.
> > Now the owasp is failing for me with this error:
> >
> > [ERROR] Failed to execute goal
> org.owasp:dependency-check-maven:5.3.0:check
> > (default-cli) on project zookeeper:
> > [ERROR]
> > [ERROR] One or more dependencies were identified with vulnerabilities
> that
> > have a CVSS score greater than or equal to '0.0':
> > [ERROR]
> > [ERROR] netty-tcnative-2.0.48.Final.jar: CVE-2021-43797, CVE-2019-16869,
> > CVE-2015-2156, CVE-2021-37136, CVE-2014-3488, CVE-2021-37137,
> > CVE-2019-20445, CVE-2019-20444, CVE-2021-21295, CVE-2021-21409,
> > CVE-2021-21290
> > [ERROR]
> > [ERROR] See the dependency-check report for more details.
> >
> >
> > I still continue to test the RC, let me know if it gets cancelled.
> >
> >
> > On Tue, Feb 8, 2022 at 9:52 PM Patrick Hunt  wrote:
> >
> > > On Tue, Feb 8, 2022 at 12:36 PM Enrico Olivelli 
> > > wrote:
> > >
> > > > Any comments?
> > > >
> > >
> > > owasp is still red - as such I assumed this release candidate is on
> hold
> > > until that's fixed. Is that not the case?
> > >
> > > Patrick
> > >
> > >
> > > >
> > > > Il Ven 4 Feb 2022, 12:07 Enrico Olivelli  ha
> > > > scritto:
> > > >
> > > > > This is a release candidate for 3.8.0.
> > > > >
> > > > > It is a major release and it introduces a lot of new features, most
> > > > > notably:
> > > > > - Migration of the logging framework from Apache Log4j1 to LogBack
> > > > > - Read Key/trust store password from file (and other security
> related
> > > > > improvements)
> > > > > - Restored support for OSGI
> > > > > - Reduced the performance impact of Prometheus metrics
> > > > > - Official support for JDK17 (all tests are passing)
> > > > > - Updates to all the third party dependencies to get rid of every
> > known
> > > > > CVE.
> > > > >
> > > > > The full release notes is available at:
> > > > >
> > > > >
> > > > >
> > > >
> > >
> >
> https://issues.apache.org/jira/secure/ReleaseNote.jspa?projectId=12310801=12349587
> > > > >
> > > > > *** Please download, test and vote by February 7th 2022, 23:59
> UTC+0.
> > > ***
> > > > >
> > > > > 

Re: [VOTE] Apache ZooKeeper release 3.8.0 candidate 0

2022-02-09 Thread Chris Nauroth
Enrico, thank you for putting together a release candidate.

I briefly looked at the OWASP check failure. It's flagging multiple old
CVEs against netty-tcnative-2.0.48.Final.jar. I can't imagine how these are
still applicable. This is the newest version of the dependency, so we don't
have another upgrade path we can try.

I don't understand it. Unfortunately, I haven't found a solution yet.

Chris Nauroth


On Wed, Feb 9, 2022 at 2:05 AM Szalay-Bekő Máté 
wrote:

> I started to test it. apache-rat passed for me, but owasp first failed due
> to some environment issue:
>
> [ERROR] Failed to execute goal org.owasp:dependency-check-maven:5.3.0:check
> (default-cli) on project parent: Fatal exception(s) analyzing Apache
> ZooKeeper: One or more exceptions occurred during analysis:
> [ERROR] Unable to download meta file:
> https://nvd.nist.gov/feeds/json/cve/1.1/nvdcve-1.1-2004.meta
> [ERROR] No documents exist
> [ERROR] -> [Help 1]
>
> Now I just re-run and this error disappeared, I assume nvd.nist.gov was
> down for a while.
> Now the owasp is failing for me with this error:
>
> [ERROR] Failed to execute goal org.owasp:dependency-check-maven:5.3.0:check
> (default-cli) on project zookeeper:
> [ERROR]
> [ERROR] One or more dependencies were identified with vulnerabilities that
> have a CVSS score greater than or equal to '0.0':
> [ERROR]
> [ERROR] netty-tcnative-2.0.48.Final.jar: CVE-2021-43797, CVE-2019-16869,
> CVE-2015-2156, CVE-2021-37136, CVE-2014-3488, CVE-2021-37137,
> CVE-2019-20445, CVE-2019-20444, CVE-2021-21295, CVE-2021-21409,
> CVE-2021-21290
> [ERROR]
> [ERROR] See the dependency-check report for more details.
>
>
> I still continue to test the RC, let me know if it gets cancelled.
>
>
> On Tue, Feb 8, 2022 at 9:52 PM Patrick Hunt  wrote:
>
> > On Tue, Feb 8, 2022 at 12:36 PM Enrico Olivelli 
> > wrote:
> >
> > > Any comments?
> > >
> >
> > owasp is still red - as such I assumed this release candidate is on hold
> > until that's fixed. Is that not the case?
> >
> > Patrick
> >
> >
> > >
> > > Il Ven 4 Feb 2022, 12:07 Enrico Olivelli  ha
> > > scritto:
> > >
> > > > This is a release candidate for 3.8.0.
> > > >
> > > > It is a major release and it introduces a lot of new features, most
> > > > notably:
> > > > - Migration of the logging framework from Apache Log4j1 to LogBack
> > > > - Read Key/trust store password from file (and other security related
> > > > improvements)
> > > > - Restored support for OSGI
> > > > - Reduced the performance impact of Prometheus metrics
> > > > - Official support for JDK17 (all tests are passing)
> > > > - Updates to all the third party dependencies to get rid of every
> known
> > > > CVE.
> > > >
> > > > The full release notes is available at:
> > > >
> > > >
> > > >
> > >
> >
> https://issues.apache.org/jira/secure/ReleaseNote.jspa?projectId=12310801=12349587
> > > >
> > > > *** Please download, test and vote by February 7th 2022, 23:59 UTC+0.
> > ***
> > > >
> > > > Source files:
> > > > https://people.apache.org/~eolivelli/zookeeper-3.8.0-candidate-0/
> > > >
> > > > Maven staging repo:
> > > >
> > >
> >
> https://repository.apache.org/content/repositories/orgapachezookeeper-1072/
> > > >
> > > > The release candidate tag in git to be voted upon: release-3.8.0-0
> > > > https://github.com/apache/zookeeper/tree/release-3.8.0-0
> > > >
> > > > ZooKeeper's KEYS file containing PGP keys we use to sign the release:
> > > > https://www.apache.org/dist/zookeeper/KEYS
> > > >
> > > > The staging version of the website is:
> > > >
> > >
> >
> https://people.apache.org/~eolivelli/zookeeper-3.8.0-candidate-0/website/
> > > >
> > > >
> > > > Should we release this candidate?
> > > > Enrico Olivelli
> > > >
> > >
> >
>


Re: [VOTE] Apache ZooKeeper release 3.8.0 candidate 0

2022-02-09 Thread Szalay-Bekő Máté
I started to test it. apache-rat passed for me, but owasp first failed due
to some environment issue:

[ERROR] Failed to execute goal org.owasp:dependency-check-maven:5.3.0:check
(default-cli) on project parent: Fatal exception(s) analyzing Apache
ZooKeeper: One or more exceptions occurred during analysis:
[ERROR] Unable to download meta file:
https://nvd.nist.gov/feeds/json/cve/1.1/nvdcve-1.1-2004.meta
[ERROR] No documents exist
[ERROR] -> [Help 1]

Now I just re-run and this error disappeared, I assume nvd.nist.gov was
down for a while.
Now the owasp is failing for me with this error:

[ERROR] Failed to execute goal org.owasp:dependency-check-maven:5.3.0:check
(default-cli) on project zookeeper:
[ERROR]
[ERROR] One or more dependencies were identified with vulnerabilities that
have a CVSS score greater than or equal to '0.0':
[ERROR]
[ERROR] netty-tcnative-2.0.48.Final.jar: CVE-2021-43797, CVE-2019-16869,
CVE-2015-2156, CVE-2021-37136, CVE-2014-3488, CVE-2021-37137,
CVE-2019-20445, CVE-2019-20444, CVE-2021-21295, CVE-2021-21409,
CVE-2021-21290
[ERROR]
[ERROR] See the dependency-check report for more details.


I still continue to test the RC, let me know if it gets cancelled.


On Tue, Feb 8, 2022 at 9:52 PM Patrick Hunt  wrote:

> On Tue, Feb 8, 2022 at 12:36 PM Enrico Olivelli 
> wrote:
>
> > Any comments?
> >
>
> owasp is still red - as such I assumed this release candidate is on hold
> until that's fixed. Is that not the case?
>
> Patrick
>
>
> >
> > Il Ven 4 Feb 2022, 12:07 Enrico Olivelli  ha
> > scritto:
> >
> > > This is a release candidate for 3.8.0.
> > >
> > > It is a major release and it introduces a lot of new features, most
> > > notably:
> > > - Migration of the logging framework from Apache Log4j1 to LogBack
> > > - Read Key/trust store password from file (and other security related
> > > improvements)
> > > - Restored support for OSGI
> > > - Reduced the performance impact of Prometheus metrics
> > > - Official support for JDK17 (all tests are passing)
> > > - Updates to all the third party dependencies to get rid of every known
> > > CVE.
> > >
> > > The full release notes is available at:
> > >
> > >
> > >
> >
> https://issues.apache.org/jira/secure/ReleaseNote.jspa?projectId=12310801=12349587
> > >
> > > *** Please download, test and vote by February 7th 2022, 23:59 UTC+0.
> ***
> > >
> > > Source files:
> > > https://people.apache.org/~eolivelli/zookeeper-3.8.0-candidate-0/
> > >
> > > Maven staging repo:
> > >
> >
> https://repository.apache.org/content/repositories/orgapachezookeeper-1072/
> > >
> > > The release candidate tag in git to be voted upon: release-3.8.0-0
> > > https://github.com/apache/zookeeper/tree/release-3.8.0-0
> > >
> > > ZooKeeper's KEYS file containing PGP keys we use to sign the release:
> > > https://www.apache.org/dist/zookeeper/KEYS
> > >
> > > The staging version of the website is:
> > >
> >
> https://people.apache.org/~eolivelli/zookeeper-3.8.0-candidate-0/website/
> > >
> > >
> > > Should we release this candidate?
> > > Enrico Olivelli
> > >
> >
>


Re: [VOTE] Apache ZooKeeper release 3.8.0 candidate 0

2022-02-08 Thread Patrick Hunt
On Tue, Feb 8, 2022 at 12:36 PM Enrico Olivelli  wrote:

> Any comments?
>

owasp is still red - as such I assumed this release candidate is on hold
until that's fixed. Is that not the case?

Patrick


>
> Il Ven 4 Feb 2022, 12:07 Enrico Olivelli  ha
> scritto:
>
> > This is a release candidate for 3.8.0.
> >
> > It is a major release and it introduces a lot of new features, most
> > notably:
> > - Migration of the logging framework from Apache Log4j1 to LogBack
> > - Read Key/trust store password from file (and other security related
> > improvements)
> > - Restored support for OSGI
> > - Reduced the performance impact of Prometheus metrics
> > - Official support for JDK17 (all tests are passing)
> > - Updates to all the third party dependencies to get rid of every known
> > CVE.
> >
> > The full release notes is available at:
> >
> >
> >
> https://issues.apache.org/jira/secure/ReleaseNote.jspa?projectId=12310801=12349587
> >
> > *** Please download, test and vote by February 7th 2022, 23:59 UTC+0. ***
> >
> > Source files:
> > https://people.apache.org/~eolivelli/zookeeper-3.8.0-candidate-0/
> >
> > Maven staging repo:
> >
> https://repository.apache.org/content/repositories/orgapachezookeeper-1072/
> >
> > The release candidate tag in git to be voted upon: release-3.8.0-0
> > https://github.com/apache/zookeeper/tree/release-3.8.0-0
> >
> > ZooKeeper's KEYS file containing PGP keys we use to sign the release:
> > https://www.apache.org/dist/zookeeper/KEYS
> >
> > The staging version of the website is:
> >
> https://people.apache.org/~eolivelli/zookeeper-3.8.0-candidate-0/website/
> >
> >
> > Should we release this candidate?
> > Enrico Olivelli
> >
>


Re: [VOTE] Apache ZooKeeper release 3.8.0 candidate 0

2022-02-08 Thread Enrico Olivelli
Any comments?

Il Ven 4 Feb 2022, 12:07 Enrico Olivelli  ha scritto:

> This is a release candidate for 3.8.0.
>
> It is a major release and it introduces a lot of new features, most
> notably:
> - Migration of the logging framework from Apache Log4j1 to LogBack
> - Read Key/trust store password from file (and other security related
> improvements)
> - Restored support for OSGI
> - Reduced the performance impact of Prometheus metrics
> - Official support for JDK17 (all tests are passing)
> - Updates to all the third party dependencies to get rid of every known
> CVE.
>
> The full release notes is available at:
>
>
> https://issues.apache.org/jira/secure/ReleaseNote.jspa?projectId=12310801=12349587
>
> *** Please download, test and vote by February 7th 2022, 23:59 UTC+0. ***
>
> Source files:
> https://people.apache.org/~eolivelli/zookeeper-3.8.0-candidate-0/
>
> Maven staging repo:
> https://repository.apache.org/content/repositories/orgapachezookeeper-1072/
>
> The release candidate tag in git to be voted upon: release-3.8.0-0
> https://github.com/apache/zookeeper/tree/release-3.8.0-0
>
> ZooKeeper's KEYS file containing PGP keys we use to sign the release:
> https://www.apache.org/dist/zookeeper/KEYS
>
> The staging version of the website is:
> https://people.apache.org/~eolivelli/zookeeper-3.8.0-candidate-0/website/
>
>
> Should we release this candidate?
> Enrico Olivelli
>


[VOTE] Apache ZooKeeper release 3.8.0 candidate 0

2022-02-04 Thread Enrico Olivelli
This is a release candidate for 3.8.0.

It is a major release and it introduces a lot of new features, most notably:
- Migration of the logging framework from Apache Log4j1 to LogBack
- Read Key/trust store password from file (and other security related
improvements)
- Restored support for OSGI
- Reduced the performance impact of Prometheus metrics
- Official support for JDK17 (all tests are passing)
- Updates to all the third party dependencies to get rid of every known CVE.

The full release notes is available at:

https://issues.apache.org/jira/secure/ReleaseNote.jspa?projectId=12310801=12349587

*** Please download, test and vote by February 7th 2022, 23:59 UTC+0. ***

Source files:
https://people.apache.org/~eolivelli/zookeeper-3.8.0-candidate-0/

Maven staging repo:
https://repository.apache.org/content/repositories/orgapachezookeeper-1072/

The release candidate tag in git to be voted upon: release-3.8.0-0
https://github.com/apache/zookeeper/tree/release-3.8.0-0

ZooKeeper's KEYS file containing PGP keys we use to sign the release:
https://www.apache.org/dist/zookeeper/KEYS

The staging version of the website is:
https://people.apache.org/~eolivelli/zookeeper-3.8.0-candidate-0/website/


Should we release this candidate?
Enrico Olivelli