Review for Source Package: rpds-py

[Summary]
I mostly agree with James' verdict from comment #4. But would like to ask for
some packaging improvements and for security review. See my full rational below.

MIR team ACK under the constraint to resolve the below listed
required TODOs and as much as possible having a look at the
recommended TODOs.

This does need a security review, so I'll assign ubuntu-security

List of specific binary packages to be promoted to main: python3-rpds-py
Specific binary packages built, but NOT to be promoted to main: n/a

Notes:
#0 - rpds-py will replace pyrsistent, which is going to be demoted from "main"
#1 - I'm requesting security review, due to parsing untrusted (user) source code
     in vendor/proc-macro2 and for tracking the vendored crates

Required TODOs:
#2 - The package should make use of "XS-Vendored-Sources-Rust", either via
     dh-cargo or manually, see:
     https://wiki.ubuntu.com/RustCodeInMain#Rust_vendored_sources_tracking
     => compare to "mdevctl" or "gnome-snapshot"

Recommended TODOs:
#3 - The package should get a team bug subscriber before being promoted
#4 - Consider if dropping non-linux stuff from vendor/libc is feasible 
(probably not..)
#5 - Diverging from Debian, using a -0ubuntuX version is not ideal, but there's
     not a lot we can do about it other than slowly tring to get the rust-*-dev
     packages into main, one by one.

[Rationale, Duplication and Ownership]
- There is no other package in main providing the same functionality. (it will 
replace pyrsistent)
- A team is committed to own long term maintenance of this package. 
(~ubuntu-openstack)
- The rationale given in the report seems valid and useful for Ubuntu

[Dependencies]
OK:
- no other Dependencies to MIR due to this
  - SRCPKG checked with `check-mir`
  - all dependencies can be found in `seeded-in-ubuntu` (already in main)
  - none of the (potentially auto-generated) dependencies (Depends
    and Recommends) that are present after build are not in main
- no -dev/-debug/-doc packages that need exclusion
- No dependencies in main that are only superficially tested requiring
  more tests now.

Problems: None

[Embedded sources and static linking]
OK:
- does not have unexpected Built-Using entries
- not a go package, no extra constraints to consider in that regard
- Rust package that has all dependencies vendored. It does neither
  have *Built-Using (after build). Nor does the build log indicate
  built-in sources that are missed to be reported as Built-Using.
- Includes vendored code, the package has documented how to refresh this
  code at debian/README.source

Problems:
- Rust static linking
- embedded/vendored source present
- rust package using dh_cargo (dh ... --buildsystem cargo) – It uses pybuild
  => You should make use of "XS-Vendored-Sources-Rust", either via dh-cargo
     or manually, see:
     https://wiki.ubuntu.com/RustCodeInMain#Rust_vendored_sources_tracking

[Security]
OK:
- history of CVEs does not look concerning
- does not run a daemon as root
- does not use webkit1,2
- does not use lib*v8 directly
- does not process arbitrary web content
- does not use centralized online accounts
- does not integrate arbitrary javascript into the desktop
- does not deal with system authentication (eg, pam), etc)
- does not deal with security attestation (secure boot, tpm, signatures)
- does not deal with cryptography (en-/decryption, certificates,
  signing, ...)
- this makes appropriate (for its exposure) use of established risk
  mitigation features (dropping permissions, using temporary environments,
  restricted users/groups, seccomp, systemd isolation features,
  apparmor, ...)

Problems:
- vendored proc-macro2 does parse data formats (code) from an untrusted source.
- some socket handling in vendor/libc/src/windows (and other OS specific 
implementations)

[Common blockers]
OK:
- does not FTBFS currently
- does have a test suite that runs at build time
  - test suite fails will fail the build upon error.
- does have a non-trivial test suite that runs as autopkgtest
- This does not need special HW for build or test
- no new python2 dependency
- Python package, but using dh_python

Problems: None

[Packaging red flags]
OK:
- symbols tracking not applicable for this kind of code.
- debian/watch is present and looks ok (if needed, e.g. non-native)
- Upstream update history is good
- the current release is packaged
- promoting this does not seem to cause issues for MOTUs that so far
  maintained the package
- no massive Lintian warnings
- debian/rules is rather clean
- It is not on the lto-disabled list

Problems:
- Consider upstreaming some of the delta (not possible for crates vendoring),
  but maybe the enablement of autopkgtests
- Debian/Ubuntu update history is sporadic

[Upstream red flags]
OK:
- no Errors/warnings during the build
- no incautious use of malloc/sprintf (as far as we can check it)
- no use of sudo, gksu, pkexec, or LD_LIBRARY_PATH (usage is OK inside
  tests)
- no use of user nobody
- no use of setuid / setgid (outside of vendor/libc)
- no important open bugs (crashers, etc) in Debian or Ubuntu
- no dependency on webkit, qtwebkit or libseed
- not part of the UI for extra checks
- no translation present, but none needed for this case (user visible)?

Problems:
- Debian FTBFS (does not affect the Ubuntu build), 
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078392

** Bug watch added: Debian Bug tracker #1078392
   https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1078392

** Changed in: rpds-py (Ubuntu)
     Assignee: Lukas Märdian (slyon) => Ubuntu Security Team (ubuntu-security)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2072621

Title:
  [MIR] rpds-py

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/rpds-py/+bug/2072621/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to