Skip to content

Deprecate packages

Anand Gaurav edited this page Dec 6, 2018 · 40 revisions

Issue

Deprecate obsolete, vulnerable or legacy packages #2867

Problem

  1. There are certain cases when a package author or NuGet repository Admin (nuget.org admin) should be able to let the package consumers know that a certain package (version) should no longer be used i.e. deprecated. As summarized in one of the comments on the issue, following are the most important cases for package deprecation:
  • Vulnerable: When the package version contains a security vulnerability and the author recommends not using the package and instead a newer patched version is recommended.
    • Authors should optionally be able to provide CVE number(s) and other vulnerability metrics.
  • Legacy: When the package is no longer maintained by the author and author may have published another package (ID) instead.
  • Misc.: (other reasons like performance, critical bugs, etc.) When a version of the package is deprecated by the author and the author recommends either not using the package+version or using a newer non-deprecated version.

Today, this is partially possible by un-listing the package but there is no explicit feedback to the package consumers that a certain package version should no longer be used once its already in the project's list of packages (direct of full closure including transitive packages).

  1. In addition to the above, there is no mechanism for the package authors to suggest a new package or a new version to the package consumers where the issue (due to which the package was deprecated) has been fixed.

Evidence

Being able to flag the security vulnerabilities in the packages is the primary reason behind taking up this feature. GitHub already flags the repos that depend on vulnerable packages. Today this is not enabled for NuGet packages as we do not have this feature. Similarly, npm also has the ability to flag vulnerable packages.

Solution

Marking a package as vulnerable (Server)

Package publishers should be able to mark a given package (and version) as deprecated with one of the 3 reasons:

  • Vulnerable
  • Legacy
  • Deprecated

and optionally provide additional information like CVE#(vulnerable packages), recommended package and version.

Detailed publisher experience storyboard can be found here. The same experience should be possible for a nuget.org admin.

Publisher experience

Correction:

  • The title for deprecating packages will be "Deprecate package" and not "Deprecate Package(s)" as shown in all of the screenshots below

NuGet.org

  1. Package authors goes to the Manage package page and expands the Deprecate Package section.

    Note that all the package related management is on one page now.

    image

  2. Is prompted to select a reason:

    By default, hide package checkbox is checked i.e. upon Save, the package will be deprecated as well as hidden.

    image

  3. Reason = Vulnerable. Select versions (multi-select)

    image

    Provides the optional details like CVE#, CWE text and CVSS score

    image

  4. Reason = Legacy. Applies to all versions of the package. Selects alternate package ID (optional) already available on nuget.org

    There would be auto-complete and verification built-in for existing packages. If a non-existent package ID is entered, the save button will be disabled and error message printed.

    image

  5. Reason = Misc./other: When package has some issues where a newer package version must be used.

    image

For now, providing a reason text from author is not enabled for any deprecation. We may choose to enable it in future.

CLI command experience

There is no client command required for the MVP. If we do it later, it should be a separate deprecate command as proposed below:

// The package version should be deprecated because it has security vulnerabilities. By default hides too.
> dotnet nuget deprecate My.Demo.package * --vulnerable --cve CVE-2018-xxxx,CVE-2018-yyyy --cvss 2.3 --cwe xxx-vulnerability 

// The package version should be deprecated because it is legacy and no longer maintained
> dotnet nuget deprecate My.Demo.package --legacy --alternate My.Demo.Maintained.Package

// The package version should be deprecated because it has some issues that are fixed in later versions
> dotnet nuget deprecate My.Demo.package [2.0.0, 3.0.0)  

// Deprecate but do not hide
> dotnet nuget deprecate My.Demo.package 1.0.0,1.1.0 --vulnerable --cve CVE-2018-xxxx –no-hide

// remove deprecation
> dotnet nuget deprecate --undo My.Demo.package 1.0.0,1.1.0

Consumer experience

NuGet.org

The package author message may not be available immediately. We may enable it in future.

  1. Deprecated due to security vulnerability

    image

    Package author should be able to navigate to deprecate settings by clicking on the deprecated link.

    image

  2. Deprecated due to legacy

    image

  3. Deprecated due to misc./other reasons

    image

Visual Studio

  1. Flagged on the package listing

    image

  2. Flagged during/after restore:

    image

Out of scope

  • Ability to show consumers all vulnerable packages by scanning all CVEs - This will be a useful feature. However, out of scope for this feature.
  • Ability to let package authors know if the package might be vulnerable - While we are exploring this option, but is out of scope for this feature.
  • A command to audit all packages in a project/solution and produce vulnerability report - This is in line with npm audit and will be useful but out of scope for this feature.

Contributing

What's Being Worked On?

Check out the proposals in the accepted & proposed folders on the repository, and active PRs for proposals being discussed today.

Common Problems

Clone this wiki locally