-
Notifications
You must be signed in to change notification settings - Fork 37
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
RHOAISTRAT-214: Issue #362: feat(nbcs): build containers to be fips-ready #406
RHOAISTRAT-214: Issue #362: feat(nbcs): build containers to be fips-ready #406
Conversation
/retest Looks like a flake, let's retrigger without thinking. |
First check, see that the expected fips-related symbols are in the binary
check that the binary is dynamically linked with libc
|
There are no suspicious messages in the logs. |
For further improvements, we maybe should have /healthz endpoint that has some diagnostics, or just dump these into the log at startup
|
And the notebook is spawned just fine, so, let's consider this tested. I used fips-enabled https://console-openshift-console.apps.ods-qe-psi-06 I had to change oauth-proxy image digest to 4f8d66597feeb32bb18699326029f9a71a5aca4a57679d636b876377c2e95695. |
34e06b6
to
f45a06e
Compare
/hold |
This takes inspiration from: * The Notebooks 2.0 Dockerfile, which comes from a default recent Kubebuilder template, at https://github.com/kubeflow/notebooks/blob/notebooks-v2/workspaces/controller/Dockerfile * The Red Hat build Dockerfile (that's the Cachito part) in an internal repository. This change brings multiple improvements: 1. Dockerfiles are brought closer together, especially to the Red Hat build; previously, sourcing things in a stand-alone RUN command had no effect 2. The openssl fips-compatible library is linked into the manager binaries, to proactively address fips concerns
f45a06e
to
0400fc3
Compare
@jiridanek: once the present PR merges, I will cherry-pick it on top of v1.9-branch in a new PR and assign it to you. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
@jiridanek , please dont use cherrypick anymore for this repo, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm in general
Two questions:
- Why TARGETARCH doesn't have a default value similarly as TARGETOS?
- Should we have the TARGETARCH defined in our Makefile?
/unhold |
/lgtm |
/approve |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: jiridanek The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
0d38196
into
opendatahub-io:main
We are already having these flags enabled in downstream build as part of the devops initiative to build with fips. It makes lots of sense to me to enable these flags in odh Dockerfile as well, for consistency.
This is not intended to fully resolve https://issues.redhat.com/browse/RHOAISTRAT-214, but it's just a sensible first step done as a code improvement initiative, by following public advice in https://developers.redhat.com/articles/2022/05/31/your-go-application-fips-compliant.
Description
This PR was created by diffing the downstream and upstream dockerfile and then i made changes to upstream dockerfile to reflect the enhancements done downstream.
As a next step, cpaas Dockerfiles will need to be updated in turn with the new things here.
How Has This Been Tested?
GHA
running controller on fips-enabled cluster with no problems
Merge criteria: