You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 263 Next »


Release 4 target date is November 30th 2020.  

  1. Self Certified Milestones Achievement Due Date Oct 31st 2020 ( Milestone 4) 

2. Maturity Review Milestone Achievement  Due date Oct 31st 2020


Please add targeted and achieved R4 milestones at:

BP Incubation Stage Reporting R4 (To be updated)

Define area of focus

(to be updated)



  1. Virtual meeting to start to have a session to discuss all of the agenda items.
  2. Different patches from different blueprints need to be up-streamed.
  3. Need a consistent framework
  4. New blueprints have been committed for R4.
  5. Want to increase standards on Release 4.
  6. Validation Project test layers and test cases
  7. Self Certification in R4?

Release 4 Requirements

  1. High Level Overall Requirements
  2. CI, Blueprint Validation Lab Sub-Committee Requirements
    1. Present Pod Topology document.
    2. Peering w/LF Jenkins - (Note: peering is an optional requirement)
    3. Push logs through Nexus. (Note: This is mandatory for Incubation self-certified and Maturity)
    4. Usage of topics for release

      1. Releases >= 1.0 (e.g. 1.xyz, 2.xyz etc) are reserved for BP that have been approved as Core by the TSC (considered ‘GA’ quality).

      2. Releases <1.0 (e.g. 0.xyz etc) are reserved for projects that have not reached the Akraino Core level (i.e. anything that is in Incubation (‘alpha’ quality) and Mature (‘beta’ quality).

    5. Enforcement of Static Code Analysis through SonarCloud (SaaS), WIP LF Release Engineering & Security Subcommittee. (Note: This is an optional requirement for Incubation self certified and mandatory for Maturity)

  3. Security Sub-Committee Requirements, please fill in Release 4 Blueprint Scanning Status.  Instructions can be found at:  Steps To Implement Security Scan Requirements
  4. Blueprint Validation Framework Feature Project Requirements See TSC meeting.
  5. Projects going for Maturity Review please refer to Maturity Criteria defined by Process subcommittee BP Graduation Review Processes and Criteria (Note this is not required for self certification, only required for maturity review)
  6. Documentation Sub-Committee Requirements

    User Documents:

    The following documentation with the following sections called out should be on the wiki with links to rest of the sections as applicable. We prefer that the entire doc is on the wiki but we do not require it.

    Architecture  - Blue print Overview and overall architecture

    Release Notes – Summary and What is released

    Installation Doc – Introduction and deployment architecture

    Test Document – Introduction and Overall Test Architecture

    Developer Documents:

    We are also recommending that Blueprints include via ReadtheDocs, with each Blue Print given their own repo, but we do not require it

  7. API Sub-Committee Requirements  (Note: See this link for requirements: Blueprint Projects R4 API Reporting Requirements)
  8. Community Sub-Committee Requirements  (Note: no mandatory requirements for Incubation self-certified or Maturity)
  9. Process Sub-Committee Requirements (Note: See the Process Sub Committee page defining the TSC approved Maturity review process and requirements for those requesting inclusion in R3 at Mature level BP Graduation Review Processes and Criteria)
  10. Upstream Sub-Committee Requirements (Note: no mandatory requirements for Incubation self-certified or Maturity). Here is the R4 release Upstream BP review status, Release Upstream Compliance. Also please refer to the page for the R4 requirement as well.


Blue Prints Participating in Release 4

Internal Target date to meet Rel 4 Criteria is Nov 30th ( please add your target/achieved date at the BP Incubation Stage Reporting R2 (To Be Updated))

(To be updated)

No.Project NameTSC Subgroup Release StatusIs this your first release Going for Maturity Review? 

CD Logs URL to be used for review

(Column filled in by PTLs)

Link to executive one pager

(editable doc format)

(Column filled in by PTLs)

API Info Reporting Review

(Column filled in by API Subcommittee)

(note for PTLs – go here for steps to fill in project API info form)

BluVal

Certification

Security

Certification

Provide link to Vuls, Lynis, and Kube-Hunter logs below.

Pass/Fail Criteria:  Steps To Implement Security Scan Requirements

Exception requests should be filed at:

https://wiki.akraino.org/display/AK/Akraino+CVE+Vulnerability+Exception+Request

Upstream Review (Column filled by Upstream Subcommittee and PTLs)


(note PTL can go to Release Upstream Compliance to find details)

Date ready for TSC review

(Column filled in by PTLs)

 TSC Review Date

(Column filled in by TSC)

1scheduled at 

TSC 2020-12-01 (Tues) 7 am Pacific

NY

https://nexus.akraino.org/content/sites/logs/parserlabs/r4/jobs/cvb/

Form uploaded

Scheduled for API subcommittee review

Waiting for re-uploaded API info form with PaaS API info

Reviewed by API subcommittee, PaaS APIs are subset of TARS APIs

Accepted

https://nexus.akraino.org/content/sites/logs/parserlabs/r4/jobs/cvb/

 

Vuls:  Accepted with exceptions shown at:

Release 4 Vuls Exception Request

 

Lynis: 

  1. Performing test ID AUTH-9229 (Check password hashing methods)

You are using SHA512 hashing which is good, however, it appears the number of rounds for password hashing is still set to default at 5000.  This value must be set higher, 65536.  Below is additional information on this topic:

The rounds=N option helps to improve key strengthening. The number of rounds has a larger impact on security than the selection of a hash function. For example, rounds=65536 means that an attacker has to compute 65536 hashes for each password he tests against the hash in your /etc/shadow. Therefore the attacker will be delayed by a factor of 65536. This also means that your computer must compute 65536 hashes every time you log in, but even on slow computers that takes less than 1 second. If you do not use the rounds option, then glibc will default to 5000 rounds for SHA-512. Additionally, the default value for the rounds option can be found in sha512-crypt.c.

Open /etc/pam.d/passwd with a text editor and add the rounds option at the end of of the uncommented line. After applying this change the line should look like this:

password       required       pam_unix.so sha512 shadow nullok rounds=65536

 After you change the number of rounds you will need to expire the existing passwords to encrypt using the new values.

  2.  Test: Check if one or more compilers can be found on the system

Reason: Our core components of BP are needing more than one compiler and fixing them can break our dependencies.

Since this BP is requesting a maturity review all compilers must be removed prior to using the system in production.  Are there components that require compilers in the completed production release code?

Exceptions approved shown at:

Release 4 Vuls Exception

Kube-Hunter:  Exception granted:  K8s not used by this BP.

Yes12/01
2scheduled at 

TSC 2020-12-01 (Tues) 7 am Pacific

NY

https://nexus.akraino.org/content/sites/logs/parserlabs/r4/jobs/iec-type4/

Form uploaded

Scheduled for API subcommittee review

Waiting for re-uploaded API info form with PaaS API info 

Reviewed by API subcommittee, PaaS APIs are subset of TARS APIs

Accepted

https://nexus.akraino.org/content/sites/logs/parserlabs/r4/jobs/iec-type4/

 

Vuls:  Accepted with exceptions shown at:

Release 4 Vuls Exception Request

 

Lynis: 

  1.  Performing test ID AUTH-9229 (Check password hashing methods)

You are using SHA512 hashing which is good, however, it appears the number of rounds for password hashing is still set to default at 5000.  This value must be set higher, 65536.  Below is additional information on this topic:

The rounds=N option helps to improve key strengthening. The number of rounds has a larger impact on security than the selection of a hash function. For example, rounds=65536 means that an attacker has to compute 65536 hashes for each password he tests against the hash in your /etc/shadow. Therefore the attacker will be delayed by a factor of 65536. This also means that your computer must compute 65536 hashes every time you log in, but even on slow computers that takes less than 1 second. If you do not use the rounds option, then glibc will default to 5000 rounds for SHA-512. Additionally, the default value for the rounds option can be found in sha512-crypt.c.

Open /etc/pam.d/passwd with a text editor and add the rounds option at the end of of the uncommented line. After applying this change the line should look like this:

password       required       pam_unix.so sha512 shadow nullok rounds=65536

 After you change the number of rounds you will need to expire the existing passwords to encrypt using the new values.

  2.  Test: Check if one or more compilers can be found on the system

Reason: Our core components of BP are needing more than one compiler and fixing them can break our dependencies.

Since this BP is requesting a maturity review all compilers must be removed prior to using the system in production.  Are there components that require compilers in the completed production release code?

Exceptions approved shown at:

Release 4 Vuls Exception

Kube-Hunter:  Exception granted:  K8s not used by this BP.

Yes12/01
3Scheduled at Release 4 Review 2020-12-01 (Tues) 7 am PacificNMature

https://nexus.akraino.org/content/sites/logs/att/job/Install_REC_on_OpenEdge1/

https://logs.akraino.org/production/vex-yul-akraino-jenkins-prod-1/rec-aarch64_baremetal-install-rec-weekly-master/

Form uploaded

Reviewed by API subcommittee

Accepted

https://nexus.akraino.org/content/sites/logs/att/job/Bluval_Logs/results-11-27-2020.tar

https://nexus.akraino.org/content/sites/logs/att/job/Bluval_Logs/results-11-27-2020.tar

 

VulsAccepted with exceptions shown at:

Release 4 Vuls Exception Request

 

Lynis:   -ISSUES that MUST be fixed for Maturity or a more specific exception reason needs to be provided:

  1. Performing test ID AUTH-9229 (Check password hashing methods)
  2. Test: Checking SHA_CRYPT_MIN_ROUNDS option in /etc/login.defs
  3. Performing test ID USB-2000 (Check USB authorizations)
  4. Performing test ID USB-3000 (Check for presence of USBGuard)
  5. Test: Checking ClientAliveInterval in /tmp/lynis.ZotHQ7RQAj
  6. Test: Checking MaxAuthTries in /tmp/lynis.ZotHQ7RQAj
  7. Test: Checking MaxSessions in /tmp/lynis.ZotHQ7RQAj
  8. Test: Checking Port in /tmp/lynis.ZotHQ7RQAj
  9. Test: Checking TCPKeepAlive in /tmp/lynis.ZotHQ7RQAj
  10. Performing test ID SSH-7440 (Check OpenSSH option: AllowUsers and AllowGroups)
  11. sysctl key kernel.kptr_restrict has a different value than expected in scan profile. Expected=2, Real=0
  12. sysctl key kernel.sysrq has a different value than expected in scan profile. Expected=0, Real=16
  13. sysctl key kernel.yama.ptrace_scope has a different value than expected in scan profile. Expected=1 2 3, Real=0
  14. sysctl key net.ipv4.conf.all.forwarding has a different value than expected in scan profile. Expected=0, Real=1
  15. sysctl key net.ipv6.conf.all.accept_redirects has a different value than expected in scan profile. Expected=0, Real=1
  16. sysctl key net.ipv6.conf.default.accept_redirects has a different value than expected in scan profile. Expected=0, Real=1
  17. Performing test ID HRDN-7220 (Check if one or more compilers are installed)

Kube-Hunter: Does not appear to have run correctly - question sent to BP owner

Yes12/01
4Scheduled at 

Release 4 Review 2020-12-16 (Wed) 7 am Pacific

NN

ICN Master Baremetal Deployment Verifier

ICN Master Virtual Deployment Verifier

ICN SDEWAN Master End2End Testing

Form uploaded

Reviewed by API subcommittee

Accepted

https://nexus.akraino.org/content/sites/logs/intel/bluval_results/icn/master/20201210-010310/.

https://nexus.akraino.org/content/sites/logs/intel/bluval_results/icn/master/20201210-010310/

ICN R4 Test Document#BluValTesting

Vuls:  Accepted with exceptions shown at:

Release 4 Vuls Exception


Lynis:  Accepted with exceptions shown at:

Release 4 Lynis Exceptions


k8s/conformance:

Kube-Hunter:  Accepted

  • The logs show the run with the aquasec/kube-hunter:edge image to fix the CAP_NET_RAW inside a pod issue


Yes12/1012/16
5scheduled at 

TSC 2020-12-16 (Tues) 7 am Pacific

NN

https://nexus.akraino.org/content/sites/logs/huawei/blueprints/iotgateway/job/eliot-iotgateway-deploy-k8s-virtual-daily-master/684/

ELIOT R4 IOT-Gateway Datasheet

Form uploaded

Reviewed by API subcommittee  

Accepted

https://nexus.akraino.org/content/sites/logs/huawei/blueprints/iotgateway/job/eliot-iotgateway-bluval-virtual-daily-master/37/results/os/lynis/lynis.log

vuls exceptions Akraino CVE Vulnerability Exception Request

Akraino BluVal Exception Request

 

Vuls:  Accepted with exceptions shown at:

Release 4 Vuls Exception

Lynis: Accepted with exceptions shown at:

Release 4 Lynis Exceptions

Kube-Hunter:  Accepted with exceptions shown at:

Release 4 Kube-Hunter Exceptions

Yes12/08
6scheduled at 

TSC 2020-12-16 (Tues) 7 am Pacific

NNhttps://nexus.akraino.org/content/sites/logs/huawei/blueprints/uCPE/job/eliot-uCPE-deploy-k8s-centos-virtual-daily-master/545/ELIOT R4 - SD-WAN / WAN Edge / uCPE Data Sheet

Form uploaded

Reviewed by API subcommittee  

Accepted

https://nexus.akraino.org/content/sites/logs/huawei/blueprints/uCPE/job/eliot-uCPE-deploy-k8s-centos-virtual-daily-master/549/results/os/lynis/lynis.log

vuls exceptions Akraino CVE Vulnerability Exception Request

Akraino BluVal Exception Request

 

Vuls:  Accepted with exceptions shown at:

Release 4 Vuls Exception

Lynis: Accepted with exceptions shown at:

Release 4 Lynis Exceptions

Kube-Hunter:  Accepted with exceptions shown at:

Release 4 Kube-Hunter Exceptions

Yes12/08
7

Scheduled at

Release 4 Review 2020-12-09 (Wed) 7:30am


NNot Applicable

https://nexus.akraino.org/content/sites/logs/juniper/job/NC-Tungsten_Fabric/40/

https://nexus.akraino.org/content/sites/logs/juniper/validation-results/



NetworkCloud-TF blueprint Datasheet.docx

Form uploaded

Scheduled for API subcommittee review  

Accepted

Y

 

Vuls: Accepted with exceptions shown at:

Release 4 Vuls Exception


 

Lynis:  ISSUES that MUST be fixed or a more specific exception reason needs to be provided:

  1. Performing test ID AUTH-9328 (Default umask values)
  2. Test: Check if one or more compilers can be found on the system

Following compilers found:

  • Found known binary: as (compiler) - /usr/bin/as
  • Found known binary: cc (compiler) - /usr/bin/cc
  • Found known binary: gcc (compiler) - /usr/bin/gcc

 

Kube-Hunter:  In review

Sukhdev Kapur has requested that the Release 3 exceptions be provided for Release 4

Yes12/0912/09
8Scheduled at 

TSC 2020-12-17 (Thurs) 7 am Pacific

NN

AWS footprint:
https://logs.akraino.org/production/vex-yul-akraino-jenkins-prod-1/kni-blueprint-pae-verify-deploy-aws/81/

GCP footprint:

https://logs.akraino.org/production/vex-yul-akraino-jenkins-prod-1/kni-blueprint-pae-verify-deploy-gcp/51/


Form uploaded

Reviewed by API subcommittee

Accepted

https://nexus.akraino.org/content/sites/logs/redhat-kni/bluval_results_pae/

 

Vuls:  Accepted with exception.  The KNI Provider Access Edge blueprint uses OpenShift as its k8s distribution, which is deployed on Red Hat CoreOS, an immutable OS that is not supported by Vuls.

https://nexus.akraino.org/content/sites/logs/redhat-kni/bluval_results_pae/os/vuls/log.html.gz


Lynis:

 

https://nexus.akraino.org/content/sites/logs/redhat-kni/bluval_results_pae/os/lynis/

Accepted with exceptions shown at:

Release 4 Lynis Exceptions


Kube-Hunter: 

https://nexus.akraino.org/content/sites/logs/redhat-kni/bluval_results_pae/k8s/kube-hunter/Kube-Hunter.Kube-Hunter/

Accepted with exceptions shown at:

Release 4 Kube-Hunter Exceptions

Yes12/0912/09
9


Slides for KNI blueprints review:

Akraino_KNI_Release4_Review.pdf

Scheduled at 

TSC 2020-12-17 (Thurs) 7 am Pacific

YN

Mgmt Hub logs:

https://logs.akraino.org/production/vex-yul-akraino-jenkins-prod-1/kni-blueprint-management-hub-verify-deploy-gcp/9/

IE logs:

https://logs.akraino.org/production/vex-yul-akraino-jenkins-prod-1/kni-blueprint-ie-verify-deploy-gcp/2/


Form uploaded

Reviewed by API subcommittee

Accepted

https://nexus.akraino.org/content/sites/logs/redhat-kni/bluval_results_ie/

 

Vuls:  Accepted with exception.  The KNI Industrial Edge blueprint uses OpenShift as its k8s distribution, which is deployed on Red Hat CoreOS, an immutable OS that is not supported by Vuls.

https://nexus.akraino.org/content/sites/logs/redhat-kni/bluval_results_ie/os/vuls/log.html.gz


Lynis:

https://nexus.akraino.org/content/sites/logs/redhat-kni/bluval_results_ie/os/lynis/

Accepted with exceptions shown at:

Release 4 Lynis Exceptions



Kube-Hunter: 

https://nexus.akraino.org/content/sites/logs/redhat-kni/bluval_results_ie/k8s/kube-hunter/Kube-Hunter.Kube-Hunter/

Accepted with exceptions shown at:

Release 4 Kube-Hunter Exceptions

Yes

10

Micro-MEC


YNhttps://nexus.akraino.org/content/sites/logs/micromecAkraino R3 MicroMEC blueprint datasheet.docx

Form uploaded

API committee review scheduled for

N/A





11

Scheduled at TSC 2020-11-24 (Tues) 7 am Pacific

NY

https://nexus.akraino.org/content/sites/logs/baidu/job/aiedge-otestack-master-deploy/

https://nexus.akraino.org/content/sites/logs/baidu/job/aiedge-otestack-master-validation/

Hechun replied by e-mail 12Jan, API info form is in progress

API committee review tentatively scheduled for

N/A


Yes (Please also update the upstream version besides the repo name)06/02
12
YN




Yes (Please update the upstream versions besides the repo name)

13

5G MEC/Slice System to Support Cloud Gaming, HD Video and Live Broadcasting Blueprint

Feng Yang


YN

https://nexus.akraino.org/content/sites/logs/tencent/job/5g-mec-cloud-gaming-CD/15/

https://logs.akraino.org/production/vex-yul-akraino-jenkins-prod-1/5g-mec-cloud-gaming-master-verify/

5G MEC Rel 3 Datasheet

Form uploaded  

Accepted

N/A

Lynis: Accepted with exceptions shown at:

Release 4 Lynis Exceptions


Kube-Hunter: 

Accepted with exceptions shown at:

Release 4 Kube-Hunter Exceptions

Please update the release note with upstream information (R4 - Release Notes)06/03
14

Scheduled at

TSC 2021-1-28 (Thurs) 7 am Pacific

NNhttps://nexus.akraino.org/content/sites/logs/ampere/job/akraino_arm_anbox_test/6/

PTL replied by e-mail  that they have no APIs offered or consumed. API subcommittee replied they still need to fill out the API info reporting form with BP name and Comments field explaining current and future API status, and upload the form



Yes01/28
15Scheduled at 

TSC 2020-12-10 (Thurs) 7 am Pacific

NN

https://nexus.akraino.org/content/sites/logs/bytedance/job/run-install-bluefield-fs/

https://nexus.akraino.org/content/sites/logs/bytedance/job/run-install-ovs-dpdk/

Form uploaded

Scheduled for API subcommittee review

Accepted



Yes06/04
16scheduled at 

TSC 2020-12-10(Thurs) 7 am Pacific

NN

https://nexus.akraino.org/content/sites/logs/huawei/blueprints/ealt-edge/job/ealt-edge-deploy-virtual-daily-master/397

Form uploaded

Reviewed by API subcommittee

Accepted

https://nexus.akraino.org/content/sites/logs/huawei/blueprints/ealt-edge/job/ealt-edge-bluval-daily-master/251/results/

Vuls Exception Akraino CVE Vulnerability Exception Request

Akraino BluVal Exception Request

updated results link - 09-dec

Yes12/10
17

Scheduled at TSC 2021-1-14 (Thurs) 7 am Pacific

PCEI Time Slot 7:30-8:00 am Pacific

Y
https://nexus.akraino.org/content/sites/logs/cmti/job/pcei-daily/PCEI R4 Datasheet

Form uploaded 4Jan

Scheduled for API subcommittee review  

For R4, third-party location API provided as an example in PCEI architecture diagrams. For R5 they expect PCEI APIs to be exported

Accepted

https://nexus.akraino.org/content/sites/logs/pcei/job/v1/

New BluVal logs 2021-01-08:

https://nexus.akraino.org/content/sites/logs/pcei/job/v2/results/

 

Updated BluVal logs with fixed sysctl key net.ipv4.conf.default.accept_source_route

https://nexus.akraino.org/content/sites/logs/pcei/job/v3/

 

Updated BluVal logs with fixed Kube-Hunter Vulnerability KHV050, KHV002, KHV005

https://nexus.akraino.org/content/sites/logs/pcei/job/v4/


 

Vuls:

Vuls:  Accepted with exceptions shown at:

Release 4 Vuls Exception Request

vuls.log included in the new logs (V2)

Lynis:  Accepted with exceptions shown at:

Release 4 Lynis Exceptions

Kube-Hunter:

Accepted with exceptions shown at:

Release 4 Kube-Hunter Exceptions


Yes01/14/21
18Scheduled at 

TSC 2020-12-08 (Tues) 7 am Pacific

YNhttps://nexus.akraino.org/content/sites/logs/webank/job/Federated ML application at edge R4 Datasheet

Form uploaded

Reviewed by API subcommittee

Accepted

N/AYes12/08
19Scheduled at Release 4 Review 2020-11-17 (Tue) 7 am PacificYNhttps://nexus.akraino.org/content/sites/logs/futurewei/kubeedgees/

Form uploaded

Reviewed by API subcommittee

Accepted

Yes

https://nexus.akraino.org/content/sites/logs/futurewei/kubeedgees/58/results/

Akraino BluVal Exception Request

 

Vuls:  Accepted with exceptions shown at:

Release 4 Vuls Exception Request

 

Lynis:  Accepted

Kube-Hunter: Exception granted:  KubeEdge node is not on same subnet as the cloud node.  Communication occurs through the websocket endpoint, so kube-hunter can't be used.

Yes11/17
20
Y


Prem replied by e-mail 17Jan, API info form is in progress

API committee review tentatively scheduled for






21Scheduled at Release 4 Review 2020-12-09 YNhttps://nexus.akraino.org/content/sites/logs/ai_solutions/job/Eden-flir/

Form uploaded

Reviewed by API subcommittee  , waiting for revised API info form to be uploaded

2nd revision of form uploaded   by V S

Final review by API subcommittee set for

Accepted



Yes12/09



03/02~03/2020 Akraino TSC F2F & 2020 Planning meeting








  • No labels