You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: SECURITY.md
+11-18
Original file line number
Diff line number
Diff line change
@@ -2,47 +2,42 @@
2
2
3
3
The community has adopted this security disclosure and response policy to ensure we responsibly handle critical issues.
4
4
5
-
6
5
## Supported Versions
7
6
8
7
For a list of support versions that this project will potentially create security fixes for, please refer to the Releases page on this project's GitHub and/or project related documentation on release cadence and support.
9
8
10
-
11
9
## Reporting a Vulnerability - Private Disclosure Process
12
10
13
11
Security is of the highest importance and all security vulnerabilities or suspected security vulnerabilities should be reported to this project privately, to minimize attacks against current users before they are fixed. Vulnerabilities will be investigated and patched on the next patch (or minor) release as soon as possible. This information could be kept entirely internal to the project.
14
12
15
13
If you know of a publicly disclosed security vulnerability for this project, please **IMMEDIATELY** contact the maintainers of this project privately. The use of encrypted email is encouraged.
16
14
15
+
**IMPORTANT**: Do not file public issues on GitHub for security vulnerabilities
17
16
18
-
**IMPORTANT: Do not file public issues on GitHub for security vulnerabilities**
17
+
To report a vulnerability or a security-related issue, please contact the maintainers with enough details through one of the following channels:
19
18
20
-
To report a vulnerability or a security-related issue, please contact the maintainers with enough details through one of the following channels:
21
19
* Directly via their individual email addresses
22
20
* Open a [GitHub Security Advisory](https://docs.github.com/en/code-security/security-advisories/guidance-on-reporting-and-writing/privately-reporting-a-security-vulnerability). This allows for anyone to report security vulnerabilities directly and privately to the maintainers via GitHub. Note that this option may not be present for every repository.
23
21
24
-
The report will be fielded by the maintainers who have committer and release permissions. Feedback will be sent within 3 business days, including a detailed plan to investigate the issue and any potential workarounds to perform in the meantime.
22
+
The report will be fielded by the maintainers who have committer and release permissions. Feedback will be sent within 3 business days, including a detailed plan to investigate the issue and any potential workarounds to perform in the meantime.
25
23
26
24
Do not report non-security-impacting bugs through this channel. Use GitHub issues for all non-security-impacting bugs.
27
25
28
-
29
26
## Proposed Report Content
30
27
31
28
Provide a descriptive title and in the description of the report include the following information:
32
29
33
-
* Basic identity information, such as your name and your affiliation or company.
34
-
* Detailed steps to reproduce the vulnerability (POC scripts, screenshots, and logs are all helpful to us).
35
-
* Description of the effects of the vulnerability on this project and the related hardware and software configurations, so that the maintainers can reproduce it.
36
-
* How the vulnerability affects this project's usage and an estimation of the attack surface, if there is one.
37
-
* List other projects or dependencies that were used in conjunction with this project to produce the vulnerability.
38
-
30
+
* Basic identity information, such as your name and your affiliation or company.
31
+
* Detailed steps to reproduce the vulnerability (POC scripts, screenshots, and logs are all helpful to us).
32
+
* Description of the effects of the vulnerability on this project and the related hardware and software configurations, so that the maintainers can reproduce it.
33
+
* How the vulnerability affects this project's usage and an estimation of the attack surface, if there is one.
34
+
* List other projects or dependencies that were used in conjunction with this project to produce the vulnerability.
39
35
40
36
## When to report a vulnerability
41
37
42
-
* When you think this project has a potential security vulnerability.
43
-
* When you suspect a potential vulnerability but you are unsure that it impacts this project.
44
-
* When you know of or suspect a potential vulnerability on another project that is used by this project.
45
-
38
+
* When you think this project has a potential security vulnerability.
39
+
* When you suspect a potential vulnerability but you are unsure that it impacts this project.
40
+
* When you know of or suspect a potential vulnerability on another project that is used by this project.
46
41
47
42
## Patch, Release, and Disclosure
48
43
@@ -56,14 +51,12 @@ The maintainers will respond to vulnerability reports as follows:
56
51
6. The maintainers will work on fixing the vulnerability and perform internal testing before preparing to roll out the fix.
57
52
7. Once the fix is confirmed, the maintainers will patch the vulnerability in the next patch or minor release, and backport a patch release into all earlier supported releases.
58
53
59
-
60
54
## Public Disclosure Process
61
55
62
56
The maintainers publish the public advisory to this project's community via GitHub. In most cases, additional communication via Slack, Twitter, mailing lists, blog, and other channels will assist in educating the project's users and rolling out the patched release to affected users.
63
57
64
58
The maintainers will also publish any mitigating steps users can take until the fix can be applied to their instances. This project's distributors will handle creating and publishing their own security advisories.
65
59
66
-
67
60
## Confidentiality, integrity and availability
68
61
69
62
We consider vulnerabilities leading to the compromise of data confidentiality, elevation of privilege, or integrity to be our highest priority concerns. Availability, in particular in areas relating to DoS and resource exhaustion, is also a serious security concern. The maintainer team takes all vulnerabilities, potential vulnerabilities, and suspected vulnerabilities seriously and will investigate them in an urgent and expeditious manner.
Copy file name to clipboardexpand all lines: bitnami/airflow/README.md
+157-3
Original file line number
Diff line number
Diff line change
@@ -743,9 +743,163 @@ NOTE: Due to an error in our release process, Redis®' chart versions higher
743
743
744
744
This major updates the PostgreSQL subchart to its newest major, 12.0.0. [Here](https://github.com/bitnami/charts/tree/master/bitnami/postgresql#to-1200) you can find more information about the changes introduced in that version.
745
745
746
-
### To any previous version
746
+
### To 13.0.0
747
747
748
-
Refer to the [chart documentation for more information about how to upgrade from previous releases](https://docs.bitnami.com/kubernetes/infrastructure/apache-airflow/administration/upgrade/).
748
+
This major update the Redis® subchart to its newest major, 17.0.0, which updates Redis® from its version 6.2 to the latest 7.0.
749
+
750
+
### To 12.0.0
751
+
752
+
This major release renames several values in this chart and adds missing features, in order to be inline with the rest of assets in the Bitnami charts repository. Additionally updates the PostgreSQL & Redis subcharts to their newest major 11.x.x and 16.x.x, respectively, which contain similar changes.
753
+
754
+
- *auth.forcePassword* parameter is deprecated. The new version uses Helm's lookup functionalities and forcing passwords isn't required anymore.
755
+
- *config* and *configurationConfigMap* have been renamed to *configuration* and *existingConfigmap*, respectively.
756
+
- *dags.configMap* and *web.configMap* have been renamed to *dags.existingConfigmap* and *web.existingConfigmap*, respectively.
757
+
- *web.containerPort* and *worker.port* have been regrouped under the *web.containerPorts* and *worker.containerPorts* maps, respectively.
758
+
- *web.podDisruptionBudget*, *scheduler.podDisruptionBudget* and *worker.podDisruptionBudget* maps have been renamed to *web.pdb*, *scheduler.pdb* and *worker.pdb*, respectively.
759
+
- *worker.autoscaling.replicas.min*, *worker.autoscaling.replicas.max*, *worker.autoscaling.targets.cpu* and *worker.autoscaling.targets.memory* have been renamed to *worker.autoscaling.minReplicas*, *worker.autoscaling.maxReplicas*, *worker.autoscaling.targetCPU* and *.Values.worker.autoscaling.targetMemory*, respectively.
760
+
- *service.port* and *service.httpsPort* have been regrouped under the *service.ports* map.
761
+
- *ingress* map is completely redefined.
762
+
- *metrics.service.port* has been regrouped under the *metrics.service.ports* map.
763
+
- Support for Network Policies is dropped and it'll be properly added in the future.
764
+
- The secret keys *airflow-fernetKey* and *airflow-secretKey* were renamed to *airflow-fernet-key* and *airflow-secret-key*, respectively.
765
+
766
+
#### How to upgrade to version 12.0.0
767
+
768
+
To upgrade to *12.0.0* from *11.x*, it should be done reusing the PVC(s) used to hold the data on your previous release. To do so, follow the instructions below (the following example assumes that the release name is *airflow* and the release namespace *default*):
769
+
770
+
> NOTE: Please, create a backup of your database before running any of those actions.
771
+
772
+
1. Obtain the credentials and the names of the PVCs used to hold the data on your current release:
1. Delete the existing Airflow worker & PostgreSQL pods and the new statefulset will create a new one:
810
+
811
+
```console
812
+
kubectl delete pod airflow-postgresql-0
813
+
kubectl delete pod airflow-worker-0
814
+
```
815
+
816
+
### To 11.0.0
817
+
818
+
This major update the Redis® subchart to its newest major, 15.0.0. [Here](https://github.com/bitnami/charts/tree/main/bitnami/redis#to-1500) you can find more info about the specific changes.
819
+
820
+
### To 10.0.0
821
+
822
+
This major updates the Redis® subchart to it newest major, 14.0.0, which contains breaking changes. For more information on this subchart's major and the steps needed to migrate your data from your previous release, please refer to [Redis® upgrade notes.](https://github.com/bitnami/charts/tree/main/bitnami/redis#to-1400).
823
+
824
+
### To 7.0.0
825
+
826
+
[On November 13, 2020, Helm v2 support was formally finished](https://github.com/helm/charts#status-of-the-project), this major version is the result of the required changes applied to the Helm Chart to be able to incorporate the different features added in Helm v3 and to be consistent with the Helm project itself regarding the Helm v2 EOL. The following changes were introduced in this version:
827
+
828
+
- Previous versions of this Helm Chart use `apiVersion: v1` (installable by both Helm 2 and 3), this Helm Chart was updated to `apiVersion: v2` (installable by Helm 3 only). [Here](https://helm.sh/docs/topics/charts/#the-apiversion-field) you can find more information about the `apiVersion` field.
829
+
- Move dependency information from the *requirements.yaml* to the *Chart.yaml*
830
+
- After running *helm dependency update*, a *Chart.lock* file is generated containing the same structure used in the previous *requirements.lock*
831
+
- The different fields present in the *Chart.yaml* file has been ordered alphabetically in a homogeneous way for all the Bitnami Helm Chart.
832
+
- Several parameters were renamed or disappeared in favor of new ones on this major version:
833
+
- The image objects have been moved to its corresponding component object, e.g: *workerImage* now is located at *worker.image*.
834
+
- The prefix *airflow* has been removed. Therefore, parameters prefixed with *airflow* are now at root level, e.g. *airflow.loadExamples* now is *loadExamples* or *airflow.worker.resources* now is *worker.resources*.
835
+
- Parameters related to the *git* features has completely been refactored:
836
+
- They have been regrouped under the *git* map.
837
+
- *airflow.cloneDagsFromGit* no longer exists, instead you must use *git.dags* and *git.dags.repositories* has been introduced that will add support for multiple repositories.
838
+
- *airflow.clonePluginsFromGit* no longer exists, instead you must use *git.plugins*. *airflow.clonePluginsFromGit.repository*, *airflow.clonePluginsFromGit.branch* and *airflow.clonePluginsFromGit.path* have been removed in favour of *git.dags.repositories*.
839
+
- Liveness and readiness probe have been separated by components *airflow.livenessProbe.** and *airflow.readinessProbe* have been removed in favour of *web.livenessProbe*, *worker.livenessProbe*, *web.readinessProbe* and *worker.readinessProbe*.
840
+
- *airflow.baseUrl* has been moved to *web.baseUrl*.
841
+
- Security context has been migrated to the bitnami standard way so that *securityContext* has been divided into *podSecurityContext* that will define the **fsGroup** for all the containers in the pod and *containerSecurityContext* that will define the user id that will run the main containers.
842
+
- *./files/dags/*.py* will not be include in the deployment any more.
843
+
- Additionally updates the PostgreSQL & Redis subcharts to their newest major 10.x.x and 11.x.x, respectively, which contain similar changes.
844
+
845
+
#### Considerations when upgrading to this version
846
+
847
+
- If you want to upgrade to this version using Helm v2, this scenario is not supported as this version does not support Helm v2 anymore.
848
+
- If you installed the previous version with Helm v2 and wants to upgrade to this version with Helm v3, please refer to the [official Helm documentation](https://helm.sh/docs/topics/v2_v3_migration/#migration-use-cases) about migrating from Helm v2 to v3.
To upgrade to *7.0.0* from *6.x*, it should be done reusing the PVC(s) used to hold the data on your previous release. To do so, follow the instructions below (the following example assumes that the release name is *airflow* and the release namespace *default*):
859
+
860
+
> NOTE: Please, create a backup of your database before running any of those actions.
861
+
862
+
1. Obtain the credentials and the names of the PVCs used to hold the data on your current release:
> NOTE: Please remember to migrate all the values to its new path following the above notes, e.g: `airflow.loadExamples` -> `loadExamples` or `airflow.baseUrl=http://127.0.0.1:8080` -> `web.baseUrl=http://127.0.0.1:8080`.
0 commit comments