-
Notifications
You must be signed in to change notification settings - Fork 693
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
securedrop-ossec-{client, server} not upgrading via cron-apt due to dependencies not being in security channel #5213
Comments
IIRC, OSSEC needs v1 of libevent, so the version mentioned above may not work. For libpcre2, there is always the option to compile it in from a source tarball - this was rejected during initial investigation as it introduces another dependency to track, but it might be worth revisiting that. |
Another option is to mirror the packages on apt.freedom.press, the added burden of tracking of dependency/upgrades remain. The underlying issue is tracked in #3376 |
Another option related to apt.freedom.press hosting of dependencies: we could only host these two dependencies for the duration of the 1.2.2 -> 1.3.0 upgrade, that reduces the maintenance burden of tracking dependency/upgrades for those two packages, since future fresh installs on 1.3.0 will install from upstream's repo after we remove them from FPF's repo when all instances have updated. |
@redshiftzero is there precedent for doing that with other packages? I worry that we'd have to maintain them indefinitely as there could conceivably be unknown instances on an older SD version that don't update for a while. |
Nope, to my knowledge we've never done that before, this was just an idea to reduce maintenance burden on our side since we strictly only need the packages during the upgrade window. Regarding indefinitely hosting these packages, we could do something like host them for the duration of the 1.3.x series, and we announce with the release notes in 1.3.0 that once 1.4.0 is released (we can share the planned release date), the automated server upgrade path from 1.2.x to 1.3.0 will no longer be supported. For the period of time where we have the dependencies on our apt server we will need to monitor for updates, but with the release of 1.4.0, we remove them. It seems like otherwise the options that haven't been mentioned are: upgrade only to a version of OSSEC that doesn't require What do you think @zenmonkeykstop @emkll ? To me hosting the packages for a restricted period of time is probably the best option, but thoughts welcome. |
As per OOB suggestion by @eloquence, 1.4.0 seems a little too soon but going as far as 1.5.0 makes sense, with the proviso that we would have to look out for security-focused releases of the packages in question and update our mirror. Otherwise yup, this is the best option given the situation. Adding them on the |
@redshiftzero @zenmonkeykstop I think this approach makes sense (given the significant complexity of #3376). If we retrieve them through Regarding the updates to packages, since we don't set priority to apt sources, at install time, if a higher version of the package exists on Ubuntu's apt servers, those will be downloaded. If a package is updated in the security channel, that version will be upgraded on all servers.
[1] : https://wiki.ubuntu.com/SecurityTeam/UpdateProcedures#Preparing_an_update |
Packages have been added to the dev repo in freedomofpress/securedrop-apt-test#40 Packages are now live on apt-test:
Added a note to the checklist in #5205 to remind us to port these packages to the prod repo on release day |
I'm doing a cron-apt upgrade against NUCs today, will verify that this is working as expected as part of that. |
OSSEC upgrading OK across tested hardware, yay! One thing re @emkll's comment above. libevent2 is Canonical-maintained, but OSSEC relies on libevent1, which is in universe. So we'd be in the same boat re: tracking updates for both packages. |
This was resolved as part of the SecureDrop 1.3.0 release. Should we open a follow-up task to monitor for updates & remove mirrored dependencies with 1.5.0, and then close this one? |
Follow-up ticket #5312 opened, closing this one. |
Description
Changes introduced in the packaging logic of #5196 require two new dependencies for these packages to support ossec 3.6.0 and new pcre-based matching . This was not caught during review, and can only be reproduced in production scenarios: upgrade testing does a full apt-upgrade and does not use cron-apt (see #4659 (comment))
Steps to Reproduce
security
channelExpected Behavior
securedrop-ossec-client and securedrop-ossec-server packages should be updated
Actual Behavior
The securedrop-ossec-client and securedrop-ossec-server packages are held back
Comments
The text was updated successfully, but these errors were encountered: