-
Notifications
You must be signed in to change notification settings - Fork 20
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
more frequent Dockerfile builds #67
Comments
@glyg thanks for raising this issue. The forum post was equally as appropriate and is it on our radar to follow-up but the team is operating in reduced capacity with several of us attending ELMI this week. Speaking from the IDR experience, we are using rolling deployments with the base packages being systematically upgraded after provisioning the VMs. So running I'll leave @joshmoore to comment as he was more heavily involved in the initial work on these Docker images and there might be some rationale I am overlooking. |
Sure, I was not meaning to sound impatient sorry! |
Yes, I think we are going to try that on our side for the moment anyway, but I wonder about good tests to run when re-deploying so frequently |
At least on the OME side, the latest versions of these Docker images should be tested weekly via the scheduled GitHub Actions CI builds in:
|
Thanks @sbesson If I understand correctly, integration tests as ran in omero-test-infra but with our own docker-compose and set of plugins would be a first step. |
Probably the biggest downside of running apt/yum |
Ah forgot about the image size cost. A quick test certainly shows a 2.5 fold increase
|
Thanks, this indeed is an issue. It is said here that they perform rolling updates monthly or "as needed for emergency fixes". Let's see whether my security conscious sysadmin finds this acceptable :) |
This issue has been mentioned on Image.sc Forum. There might be relevant details there: https://forum.image.sc/t/omero-docker-images-security-upgrades/67815/6 |
While the size increase of course cannot be mitigated completely, it can at least be somewhat limited by performing a clean of all caches in the same Run command:
This should be closer to the actual amount of additional installed packages. // Julian |
Actually, concerning the sizes: Independent of what the decision on Dockerfile diff:
I get the following image sizes (Clean & Update has an additional
So this might be something to think about. // Julian |
If we had an auto-redeploy (i.e. bumping the final |
Looking at the CentOS tags , it seems like the base repo is not updated very frequently. Last tag was pushed 4 monts ago. I assume that security updates to yum packages might happen more frequently. A more general question: Does it make sense to put much more work into the CentOS image? I assume that this Docker will probably switch over to a different distribution in the future (Alma ?), since CentOS changed its distribution model? // Julian |
Actually, // Julian |
Even this is empty: |
I've opened ome/omero-server-docker#67 as a first attempt. |
Hi again, Maybe the image needs to be built with Best, G. |
Odd. I wouldn't expect that |
Is that listing all available security releases instead of just updates? It includes things like qemu. |
So Here, what we get is only one "Low" security with python2-httplib2 docker run -d --name omero openmicroscopy/omero-server:5 \
&& docker exec -u root omero yum updateinfo security installed \
&& docker container stop omero && docker container rm omero outputs
So this is not so bad, is it? I also tried docker scan with Best PS: This (with updates instead of installed): docker run -d --name omero openmicroscopy/omero-server:5 && docker exec -u root omero yum updateinfo security updates && docker container stop omero && docker container rm omero Is empty, so yum update won't fix this security issue |
Hey all, If you look at the packages with securityinfo, they are all epel packages. These are not included in the centos base image, but installed in the omero-server Dockerfile. AFAICS this would only be mitigated by rebuilding OMERO. // Julian |
Ah, interesting. Thanks, @JulianHn. Off-hand I don't see an official epel-enabled base image though there are a few on Docker Hub. One option would be to host our own and detect when a rebuild is needed via a cron job. Thoughts? |
If dont see how this would work. The base Image would not know which packages would br installed by the omero containers. Why not let the cron Job run on the omero images and trigger a rebuild when one of the installed packages has a security info and an actual update ready? E.g. At the moment no rebuild is necessary because the security issue is not patched anyway. |
You're right. We would need to define a base image that has all the packages we need.
👍 |
So ... I was trying to come up with a github action to automate the checks and noticed that even with CentOS images from 2014, no securityinfo popped up for the base repository. It turns out, that CentOS does not tag their repository with metadata, therefore this will not work (cf. https://forums.centos.org/viewtopic.php?t=65588). |
Okay a quick further check: It seems it is not possible to rely on CentOS.
That CVE-2018-25032, has a score of 8.2 so high severity and is not fixed in the base images :( |
🤯 https://snyk.io/test/docker/centos%3A7 certainly shows the same (e.g. https://security.snyk.io/vuln/SNYK-CENTOS7-ZLIB-2434395) That would seem to suggest we need to maintain a base image that is consistently updated, no? |
I guess that is the sad reality. And thanks to Centos noch directly providing security info, the only way to get security updates in centos without finding out which updates are security patches is a full |
This issue has been mentioned on Image.sc Forum. There might be relevant details there: https://forum.image.sc/t/omero-production-server-current-best-practices/71074/4 |
Hi, So I am re-upping @JulianHn question:
So if I am wondering whether I should base those image from I am more a |
It's really a question for the larger community, but I at least could see reviewing a proposal for converting the main Dockerfile from centos to ubuntu. |
ok, I'm giving it a shot and will report here |
I hope it is OK to ask this here, and more appropriate than on the image.sc post
Is there a reason not to
RUN yum update -y
right after the CentOS image was pulled?Best
Guillaume
The text was updated successfully, but these errors were encountered: