Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Consider creating an OBS instance for Kata packages #26

Closed
jodh-intel opened this issue Jul 27, 2018 · 3 comments
Closed

Consider creating an OBS instance for Kata packages #26

jodh-intel opened this issue Jul 27, 2018 · 3 comments

Comments

@jodh-intel
Copy link
Contributor

We currently use https://build.opensuse.org/project/show/home:katacontainers:release to build and host package binaries for Kata for various distro versions.

It's a good service but suffers from two awkward issues:

OBS is an OSS project so in theory we could create our own instance:

However, that would require hardware for all architectures and resource to manage it.

@annabellebertooch, @jimmytipit - is this something OSF could investigate for the Kata project?

@cboylan - OOI, does zuul offer any OBS-like functionality?

/cc @sameo, @jcvenegas.

@fungi
Copy link

fungi commented Aug 13, 2018

On the security bullet item, please read https://whydoesaptnotusehttps.com/ if you haven't already. It's an article written by the project leader of the Debian GNU/Linux distribution (the creators and maintainers of dpkg/apt). Fedora's dnf https://docs.fedoraproject.org/en-US/fedora/f28/system-administrators-guide/package-management/DNF/index.html and yum on RHEL/CentOS https://wiki.centos.org/TipsAndTricks/YumAndRPM#head-8d4b2b50bf89405814ef598b1f0954c042d5cd29 are similarly able to handle package signature verification. Signing packages and relying on package management features which verify those signatures offers much stronger protection to end users, and makes HTTPS fairly pointless for serving package repositories anyway. As a long-time information security professional myself, this doesn't seem like a bug.

@jodh-intel
Copy link
Contributor Author

Hi @fungi - thanks for the comment. This is useful information. I understand that package signing is an essential part of the process for installing packages from a remote server. However, what I do not understand is why an initially secure site would choose to downgrade the connection to http (performance maybe?) This issue caused a fair amount of confusion.

Regardless, thankfully, the OBS issue has now been resolved fwics - see kata-containers/documentation#213.

@fungi
Copy link

fungi commented Aug 14, 2018

Since official Debian mirrors didn't bother with HTTPS (in part because they solved the problem through signed indices of package checksums instead, but also as it's particularly tough with any meaningful security to coordinate consistent certificates across a distributed network of hundreds of volunteer-run mirror sites), the apt/apt-get tool hasn't traditionally shipped with built-in HTTPS support. There is an optional apt-transport-https plugin package which has emerged fairly recently, mainly as an option for interacting with repositories served from sites which aren't allowed to use HTTP by their operators, so in theory it could be made to work... but OBS downgrading HTTPS to HTTP for package downloads seems to be for much the same reason as Debian: complexities of relying on volunteer-run mirror networks. See https://lists.opensuse.org/opensuse-buildservice/2016-08/msg00040.html and the discussion leading up to it about using HTTPS to host their signing key URLs.

Anyway, as long as your install documentation includes the fingerprints of the signing keys and instructs users to check those before adding them to the package manager's trust set, you should be fine. The OpenStack project does something similar with its release artifact signing, having release managers and infrastructure sysadmins sign the keys which its release automation uses to sign release artifacts, distributing those through the global keyserver network, and publishing details of them on our release documentation site: https://releases.openstack.org/#cryptographic-signatures

chavafg pushed a commit to chavafg/kata-containers that referenced this issue Apr 23, 2020
chavafg pushed a commit to chavafg/kata-containers that referenced this issue Apr 23, 2020
terminal: Properly set raw terminal only when needed
bergwolf pushed a commit that referenced this issue May 6, 2020
Rework the docs to make them simpler and more consistent. Also added of
contents and corrected a few mistakes.

Fixes #26.

Signed-off-by: James O. D. Hunt <james.o.hunt@intel.com>
bergwolf referenced this issue in bergwolf/kata-containers Jun 24, 2020
To fulfill the kata design requirements, and based on the disscusion on
Virtcontainers API extentions, runtime API early sketch and runtime API
comparison, this commit added the high level design of the kata runtime
library API.

fixes: #26

Signed-off-by: Peng Tao <bergwolf@gmail.com>
@jodh-intel jodh-intel added this to To do in Issue backlog Aug 10, 2020
Issue backlog automation moved this from To do to Done Apr 7, 2021
fengwang666 added a commit to fengwang666/kata-containers that referenced this issue Oct 5, 2022
…nable-build-when-push

dbfork: trigger kata build when push to a branch
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Issue backlog
  
Done
Development

No branches or pull requests

2 participants