Date   

Re: Using a deployment based on a Buildpack, it is possible to define multiple cores for that app?

Daniel Mikusa
 

No. See this email for an explanation.

https://lists.cloudfoundry.org/archives/list/cf-dev(a)lists.cloudfoundry.org/message/B76YGMZ5DQS2WGJZLAI45LBV6ZRKVVRI/

Dan

On Sat, Dec 10, 2016 at 11:46 AM, Juan Antonio Breña Moral <
bren(a)juanantonio.info> wrote:

Hi,

I would like to know if using CF with Buildpacks, it is possible to define
the number of cores to be used by the app.
With Docker, it is possible to define the number of cores with the
following option:

``` bash
docker run ubuntu /bin/echo 'Hello world --cpuset-cpus="0-3"
````

Juan Antonio


Re: CVE-2016-8218: Unauthenticated JWT signing algorithm in routing

Shannon Coen
 

Clarification:

The routing-api job is not deployed with cf-release. It is deployed with
the routing-release [1], which provides support for TCP routing to apps on
Diego. If you have not deployed the routing-release specifically, then
chances are you do not have the routing-api job deployed and no action is
required.

To confirm, look at your BOSH deployments.

$ bosh deployments

For those who have deployed the routing-release, we recommend upgrading now
to version 0.142.0 which contains a fix for the vulnerability:
https://github.com/cloudfoundry-incubator/routing-release/releases/tag/0.142.0

[1] https://github.com/cloudfoundry-incubator/routing-release

Best,

Shannon Coen
Product Manager, Cloud Foundry
Pivotal, Inc.

On Fri, Dec 9, 2016 at 11:00 PM, Molly Crowther <mcrowther(a)cloudfoundry.org>
wrote:

A new cf-release has been cut to mitigate the following issue. This notice
can also be found at https://www.cloudfoundry.org/cve-2016-8218/. An RSS
feed of Cloud Foundry vulnerabilities is available at
https://www.cloudfoundry.org/category/security/feed/.


CVE-2016-8218: Unauthenticated JWT signing algorithm in routing
Severity

Critical
Vendor

Cloud Foundry Foundation
Versions Affected

-

cf-release versions prior to 237, if:
-

any versions of routing release have been uploaded, AND
-

the routing API is enabled through a manifest property on cf-release
-

cf-release versions 237 and later, prior to v249

Description

Incomplete validation logic in JSON Web Token (JWT) libraries can allow
unprivileged attackers to impersonate other users to the routing API.
Mitigation

OSS users of affected versions are strongly encouraged to:

-

Upgrade to Cloud Foundry v249 [1] or later

Credit

The issue was responsibly reported by a Pivotal team member.
References

-

[1] https://github.com/cloudfoundry/cf-release/releases

History2016-12-09: Initial vulnerability report published


Using a deployment based on a Buildpack, it is possible to define multiple cores for that app?

Juan Antonio Breña Moral <bren at juanantonio.info...>
 

Hi,

I would like to know if using CF with Buildpacks, it is possible to define the number of cores to be used by the app.
With Docker, it is possible to define the number of cores with the following option:

``` bash
docker run ubuntu /bin/echo 'Hello world --cpuset-cpus="0-3"
````

Juan Antonio


CVE-2016-8218: Unauthenticated JWT signing algorithm in routing

Molly Crowther
 

A new cf-release has been cut to mitigate the following issue. This notice
can also be found at https://www.cloudfoundry.org/cve-2016-8218/. An RSS
feed of Cloud Foundry vulnerabilities is available at
https://www.cloudfoundry.org/category/security/feed/.


CVE-2016-8218: Unauthenticated JWT signing algorithm in routing
Severity

Critical
Vendor

Cloud Foundry Foundation
Versions Affected

-

cf-release versions prior to 237, if:
-

any versions of routing release have been uploaded, AND
-

the routing API is enabled through a manifest property on cf-release
-

cf-release versions 237 and later, prior to v249

Description

Incomplete validation logic in JSON Web Token (JWT) libraries can allow
unprivileged attackers to impersonate other users to the routing API.
Mitigation

OSS users of affected versions are strongly encouraged to:

-

Upgrade to Cloud Foundry v249 [1] or later

Credit

The issue was responsibly reported by a Pivotal team member.
References

-

[1] https://github.com/cloudfoundry/cf-release/releases

History2016-12-09: Initial vulnerability report published


Proposal: Private Docker repository support

Will Pragnell <wpragnell@...>
 

Hi all,

We've recently come up with a proposal for adding support for private
Docker repositories to Cloud Foundry [1]. The runtime product team spent
some time considering various solutions to the problem (details of which
are linked to from within the doc) and we feel that the proposed solution
is the best next step, given the relative ease of implementation and the
simplicity of the UX.

We'd love to hear any feedback from the community. Please leave input and
feedback in the comments on the document.

We're hoping to begin work on this with at least some of the teams involved
before the end of the year. We intend to start at the Garden / GrootFS
level, as the changes needed there should be essentially the same
regardless of any changes we might make to the whole feature.

Thanks,
Will - GrootFS project lead

[1] https://goo.gl/xw2Z6V


Custom health checks

John Feminella <jxf@...>
 

hi all,
Is there a custom health checks proposal that is being worked on or has already
been accepted? If not, what is the state of the CF roadmap with respect to
custom health checks?
best,~ jf--John Feminella
Advisory Platform Architect
✉ ·jxf(a)pivotal.io
t · @jxxf


Re: USN-3151-2: Linux kernel (Xenial HWE) vulnerability

Molly Crowther
 

Hi Marco,

Thanks for the feedback - I do usually include the Ubuntu link in the
postings but overlooked it this time (and just added it on the site). I
agree it's annoying to have to copy-paste out the link. :)

https://www.ubuntu.com/usn/usn-3151-2/

Thanks,
Molly

On Thu, Dec 8, 2016 at 11:35 PM, Voelz, Marco <marco.voelz(a)sap.com> wrote:

Dear Molly,



thanks for pushing these security notifications to the cloudfoundry site
and this mailing list!



One small suggestion: Could you please include a link to the original
source of the vulnerability posting, in this case to the Ubuntu USN?
Otherwise, everybody just has to copy out the USN-id, open the Ubuntu USN
page, paste it to find the original notice.



Thanks and warm regards

Marco



*From: *Molly Crowther <mcrowther(a)cloudfoundry.org>
*Reply-To: *"Discussions about Cloud Foundry projects and the system
overall." <cf-dev(a)lists.cloudfoundry.org>
*Date: *Thursday, 8 December 2016 at 00:26
*To: *"Discussions about Cloud Foundry projects and the system overall." <
cf-dev(a)lists.cloudfoundry.org>
*Subject: *[cf-dev] USN-3151-2: Linux kernel (Xenial HWE) vulnerability



The following notice has been posted to cloudfoundry.org/security:

https://www.cloudfoundry.org/usn-3151-2/



It details the information for the new versions of the BOSH stemcell that
mitigate a high-severity kernel CVE.


Users are strongly encouraged to upgrade BOSH stemcells in all deployments
to one of the following versions:

· Upgrade all earlier versions to 3151.5

· Upgrade 3233.x versions to 3233.6 or later

· Upgrade 3263.x versions to 3263.12 or later

· Upgrade 3312.x versions to to 3312.7 or later

Thanks,

Molly Crowther

Cloud Foundry Foundation Security Team


Re: Memory/Disk usage information -MB vs MiB

Nicholas Calugar
 

Hi Ponraj,

Apologies for the delay, I promise you I have been considering this query,
just having trouble finding the correct response.

I think I actually do need more of an example of how this is failing you,
it’s not clear why presenting [1] Org Memory Usage in MB is inherently
wrong when [2] App Memory is also MB. For example:

cf curl "/v2/apps?q=space_guid:d2357fe4-a9f2-4c76-99d9-321b7668fde4" | grep
memory
"memory": 256,
"memory": 1000,

cf curl /v2/organizations/$(cf org system --guid)/memory_usage

{
"memory_usage_in_mb": 1256
}


Do you think you could provide a more end-to-end example of when this goes
wrong?

Thanks,

Nick


[1]
http://apidocs.cloudfoundry.org/234/organizations/retrieving_organization_memory_usage.html
[2] http://apidocs.cloudfoundry.org/234/apps/creating_an_app.html

--
Nicholas Calugar

On December 7, 2016 at 11:16:53 AM, Ponraj E (ponraj.e(a)gmail.com) wrote:

Hi Nicholas,

Anything that you expect from us? Are we missing something here?

---
Ponraj


Re: USN-3151-2: Linux kernel (Xenial HWE) vulnerability

Graham Bleach
 

On 9 December 2016 at 08:13, Guillaume Berche <bercheg(a)gmail.com> wrote:

thanks for pushing these security notifications to the cloudfoundry
site and this mailing list!
+1

Also, is there an RSS feed that enables programmatic access to newly
disclosed vulnerabilities on the security page ?
+1

We're currently doing this by running an app [1] in our CF that scrapes the
Pivotal security page once an hour & creates events in Datadog
corresponding to new CVEs. Datadog then raises a ticket in our support
system. It's perhaps a bit over-engineered, but we wanted to have the
events in Datadog so we could put the alerts in a dashboard etc. if we
wanted.

We only used the Pivotal security page because the Cloud Foundry one didn't
exist then. Ideally there would be a stable machine-readable list of all
CVEs relevant to the open source product. If it is RSS/atom we might be
able to do what we want without writing code, using something like
https://ifttt.com/

Cheers,
Graham

[1] https://github.com/alphagov/paas-cve-notifier


Re: USN-3151-2: Linux kernel (Xenial HWE) vulnerability

Guillaume Berche
 

thanks for pushing these security notifications to the cloudfoundry site
and this mailing list!
+1

Also, is there an RSS feed that enables programmatic access to newly
disclosed vulnerabilities on the security page ?

Looking at wordpress rss feed plugin syntax [1], I was able to get the RSS
feed for all cloudfoundry.org articles [2], but I did not yet find the
right syntax to filter by the "Security Advisory" category/tag [3][4][5]
that still return an empty page. While client-side filtering would be fine
granted the category "Security Advisory" remains stable, it may make sense
to ease such RSS subscription by the Cf community, and display the RSS feed
button on the cloudfoundry.org/security page.

[1] https://codex.wordpress.org/WordPress_Feeds
[2] https://www.cloudfoundry.org/feed/
[3] https://www.cloudfoundry.org/tag/Security%20Advisory/feed/
[4] https://www.cloudfoundry.org/use/security/feed
[5] https://www.cloudfoundry.org/feed/?tag=Security%20Advisory




Guillaume.

On Fri, Dec 9, 2016 at 8:35 AM, Voelz, Marco <marco.voelz(a)sap.com> wrote:

Dear Molly,



thanks for pushing these security notifications to the cloudfoundry site
and this mailing list!



One small suggestion: Could you please include a link to the original
source of the vulnerability posting, in this case to the Ubuntu USN?
Otherwise, everybody just has to copy out the USN-id, open the Ubuntu USN
page, paste it to find the original notice.



Thanks and warm regards

Marco



*From: *Molly Crowther <mcrowther(a)cloudfoundry.org>
*Reply-To: *"Discussions about Cloud Foundry projects and the system
overall." <cf-dev(a)lists.cloudfoundry.org>
*Date: *Thursday, 8 December 2016 at 00:26
*To: *"Discussions about Cloud Foundry projects and the system overall." <
cf-dev(a)lists.cloudfoundry.org>
*Subject: *[cf-dev] USN-3151-2: Linux kernel (Xenial HWE) vulnerability



The following notice has been posted to cloudfoundry.org/security:

https://www.cloudfoundry.org/usn-3151-2/



It details the information for the new versions of the BOSH stemcell that
mitigate a high-severity kernel CVE.


Users are strongly encouraged to upgrade BOSH stemcells in all deployments
to one of the following versions:

· Upgrade all earlier versions to 3151.5

· Upgrade 3233.x versions to 3233.6 or later

· Upgrade 3263.x versions to 3263.12 or later

· Upgrade 3312.x versions to to 3312.7 or later

Thanks,

Molly Crowther

Cloud Foundry Foundation Security Team


Re: USN-3151-2: Linux kernel (Xenial HWE) vulnerability

Marco Voelz
 

Dear Molly,

thanks for pushing these security notifications to the cloudfoundry site and this mailing list!

One small suggestion: Could you please include a link to the original source of the vulnerability posting, in this case to the Ubuntu USN? Otherwise, everybody just has to copy out the USN-id, open the Ubuntu USN page, paste it to find the original notice.

Thanks and warm regards
Marco

From: Molly Crowther <mcrowther(a)cloudfoundry.org>
Reply-To: "Discussions about Cloud Foundry projects and the system overall." <cf-dev(a)lists.cloudfoundry.org>
Date: Thursday, 8 December 2016 at 00:26
To: "Discussions about Cloud Foundry projects and the system overall." <cf-dev(a)lists.cloudfoundry.org>
Subject: [cf-dev] USN-3151-2: Linux kernel (Xenial HWE) vulnerability

The following notice has been posted to cloudfoundry.org/security<http://cloudfoundry.org/security>:
https://www.cloudfoundry.org/usn-3151-2/

It details the information for the new versions of the BOSH stemcell that mitigate a high-severity kernel CVE.

Users are strongly encouraged to upgrade BOSH stemcells in all deployments to one of the following versions:
· Upgrade all earlier versions to 3151.5
· Upgrade 3233.x versions to 3233.6 or later
· Upgrade 3263.x versions to 3263.12 or later
· Upgrade 3312.x versions to to 3312.7 or later
Thanks,
Molly Crowther
Cloud Foundry Foundation Security Team


Re: UAA local run stuck at "cargoRunLocal"

Serg Hospodarets
 

Hi Filip, Hi Alex,

I have the same problem.
I have macOS Sierra.
I just cloned the https://github.com/cloudfoundry/uaa.git .

"./gradlew run" just stuck on "Building 97% > :cargoRunLocal",
"./gradlew run --info" and "./gradlew clean assemble run --info" both provide an output that "Tomcat 8.x started on port [8080]" , but:
"curl -H "Accept: application/json" localhost:8080/uaa/login"
always returns:
FAILURE

Alex, how did you manage that to work for you?


Re: Does diego support window server 2016?

Amin J
 

Hi Xiangyi,

The community version of CF supports Windows cells with Server 2012 right
now. Currently we don't have an official support for Windows Server 2016.
The same goes with windows docker images. There may be a plan to start
officially supporting Windows Server 2016 in the near future.

Thanks!
Amin & David

On Thu, Dec 8, 2016 at 1:38 AM Meng, Xiangyi <Xiangyi.Meng(a)dell.com> wrote:

Hi,



I know Diego 1.0 has been released and we want to try it out in our dev
environment. Just have a couple of questions. Could anyone help to answer?



1. Does community version CF support Diego windows cell? If it is
true, what is the minimal version?

2. Does Diego support windows server 2016?

3. Does Diego support windows docker image?



If possible, please guide us with documentation or webpage link. We really
appreciate the help.



Thanks,

Maggie


Does diego support window server 2016?

Meng, Xiangyi <Xiangyi.Meng@...>
 

Hi,

I know Diego 1.0 has been released and we want to try it out in our dev environment. Just have a couple of questions. Could anyone help to answer?


1. Does community version CF support Diego windows cell? If it is true, what is the minimal version?

2. Does Diego support windows server 2016?

3. Does Diego support windows docker image?

If possible, please guide us with documentation or webpage link. We really appreciate the help.

Thanks,
Maggie


USN-3151-2: Linux kernel (Xenial HWE) vulnerability

Molly Crowther
 

The following notice has been posted to cloudfoundry.org/security:
https://www.cloudfoundry.org/usn-3151-2/

It details the information for the new versions of the BOSH stemcell that
mitigate a high-severity kernel CVE.

Users are strongly encouraged to upgrade BOSH stemcells in all deployments
to one of the following versions:

- Upgrade all earlier versions to 3151.5
- Upgrade 3233.x versions to 3233.6 or later
- Upgrade 3263.x versions to 3263.12 or later
- Upgrade 3312.x versions to to 3312.7 or later

Thanks,
Molly Crowther
Cloud Foundry Foundation Security Team


CF CAB call next week Wednesday December 14th @ 8a PST --- last one for 2016

Michael Maximilien
 

Hi, all,
 
Quick reminder of the final CAB call of 2016 is next Wednesday, December 14th @ 8a PST.
 
In addition to open QAs with CF PMs, we are also looking for suggestions of two or three cloudfoundry-community projects or new proposals to highlight and perhaps have a short presentation on. Please reply directly to me with your suggestions and nominations (nominating yourself is perfectly fine).
 
Finally, join the slack.cloudfoundry.org and join the #CAB channel for previous and future discussions.
 
Talk to you all next week. We'll send one more reminder on this list.
 
Best,
 
Chip, James, and Max

dr.max
ibm cloud labs
sillicon valley, ca

Sent from my iPhone


Re: CF-Extensions kickoff meeting on Thursday @ 11a PDT @ Pivotal SF in Pictor

Michael Maximilien
 

Final reminder, see info below.
 
Remember to join https://appear.in/cf-extensions or come to 4th floor Pictor if at Pivotal or phone info below if we get a lot of participants.
 
Look forward to chatting and your feedback. Best,

------
dr.max
ibm cloud labs
silicon valley, ca
maximilien.org
 
 

----- Original message -----
From: Michael Maximilien/Almaden/IBM
To: cf-dev@...
Cc:
Subject: CF-Extensions kickoff meeting on Thursday @ 11a PDT @ Pivotal SF in Pictor
Date: Mon, Dec 5, 2016 11:43 AM
 
Hi, all,
 
You are cordially invited to the new CF-Extensions kickoff meeting.
 
This will be held on Thursday @ 11a PDT @ Pivotal SF in conference room Pictor.
 
I plan to use https://appear.in/cf-extensions for remote participants. However, if we have too many or have issues then we will use phone:
 
IBM AT&T Conference Call
USA 888-426-6840; 215-861-6239 | Participant code: 1985291
All other countries can find dial-in numbers here: http://goo.gl/RnNfc1
------
 
In this meeting I plan to discuss ideas and 2017 plans for CF-Extensions as well as discuss feedback I have already received on some ideas and of course would love to hear your own feedback and ideas on how to make CF-extensions great.
 
Hope you can join it. If you want me to send you an invite then please reply directly to this email so I can add you to the list.
 
Best,

------
dr.max
ibm cloud labs
silicon valley, ca
maximilien.org
 


Re: Runtime PMC - Infrastructure Project Lead Call for Nominations

Dieu Cao <dcao@...>
 

Hello all,

Pivotal is nominating Evan Farrar for the Infrastructure Project Lead in
the Runtime PMC.


Evan Farrar has been working as an engineer on the Infrastructure team and
would like to transition to Product Management. Evan most recently
re-joined Pivotal in 2014 and has worked as both an engineer and a product
manager for the Cloud Foundry incubator projects "Notifications" and
"Container Networking." In addition to those projects Evan has had patches
merged to Garden, Cloud Controller and Diego. Evan's previous experience
includes a decade as an engineer in web, iOS and embedded applications for
startups large and small.


Any other nominations should be sent to me/in reply by end of day December
12th, 2016.

If you have any questions about the role/process, please let me know.
These are described in the CFF governance documents. [1]

-Dieu Cao

Runtime PMC Lead

[1] https://www.cloudfoundry.org/wp-content/uploads/2015/09/CFF_
Development_Operations_Policy.pdf

On Tue, Dec 6, 2016 at 1:07 AM, Dieu Cao <dcao(a)pivotal.io> wrote:

Hello all,

Adrian Zankich, the Project Lead for the Infrastructure team within the
Runtime PMC, will be transitioning back to an engineering role in the new
year along with a move to San Francisco. We wish him well in his future
endeavors and thank him for his time serving as the Infrastructure Project
Lead for the past few months.

The Infrastructure team, primarily located in Santa Monica, California,
now has an opening for its project lead. The team currently maintains
etcd and consul bosh releases as well as working on BBL(bosh boot loader).
Project leads must be nominated by a Cloud Foundry Foundation member.

Please send nominations to me/in reply to this posting by end of day
December 12th, 2016.

If you have any questions about the role/process, please let me know.
These are described in the CFF governance documents. [1]

-Dieu Cao

Runtime PMC Lead

[1] https://www.cloudfoundry.org/wp-content/uploads/2015/09/CFF_
Development_Operations_Policy.pdf


Runtime PMC - Infrastructure Project Lead Call for Nominations

Dieu Cao <dcao@...>
 

Hello all,

Adrian Zankich, the Project Lead for the Infrastructure team within the
Runtime PMC, will be transitioning back to an engineering role in the new
year along with a move to San Francisco. We wish him well in his future
endeavors and thank him for his time serving as the Infrastructure Project
Lead for the past few months.

The Infrastructure team, primarily located in Santa Monica, California, now
has an opening for its project lead. The team currently maintains etcd and
consul bosh releases as well as working on BBL(bosh boot loader). Project leads
must be nominated by a Cloud Foundry Foundation member.

Please send nominations to me/in reply to this posting by end of day
December 12th, 2016.

If you have any questions about the role/process, please let me know.
These are described in the CFF governance documents. [1]

-Dieu Cao

Runtime PMC Lead

[1] https://www.cloudfoundry.org/wp-content/uploads/2015/09/
CFF_Development_Operations_Policy.pdf


Re: [ CF-243 / Blobstore ] Troubleshooting errors in internal_error.log

Fabien Guichard
 

Hello,

to begin with, i would like to thank you for your answer.

In the meantime, we solved this issue, which was a concern with some security-group syntax validation against diego cells.

Here's what we saw cc-bridge logs files :

{"timestamp":"1480919305.373668909","source":"nsync-bulker","message":"nsync-bulker.sync-lrps.create-missing-desired-lrps.failed-creating-desired-lrp","log_level":2,"da
ta":{"error":"Invalid field: egress_rules, Invalid field: log","process-guid":"dfaff32d-78b1-4493-b34f-ee10137c121f-7b633557-cbe5-438e-99d0-d05579156709","session":"106
682.5"}}

The faulty syntax of staging & running security groups was :

[
{
"description": "",
"log": true,
"destination": "0.0.0.0/0",
"ports": "1-65535",
"protocol": "tcp"
}
]

Our setup was :

CF : 243
Diego-runC : 0.8.0
Diego : 0.1485.0

Even if this upper-syntax is described on https://apidocs.cloudfoundry.org/243/security_groups/creating_a_security_group.html (CC API 2.62 / cf-243), it dosen't seem to work when writing staging & running security groups that way.

So we did only rewrite of security groups json files with "proper" synta,

Regards,
Fabien.