Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[15.0][FIX] auth_saml: do not force using vulnerable cryptography module #640

Merged
merged 1 commit into from
Sep 18, 2024

Conversation

vincent-hatakeyama
Copy link
Contributor

Without this fix, it is impossible to use an upgraded version of cryptography with this module.

It is still necessary to check for compatibility, so that information is added to the install instructions.

@vincent-hatakeyama vincent-hatakeyama force-pushed the 15.0-auth_saml-fix-cryptography_version branch 2 times, most recently from afb078a to 18445fc Compare April 22, 2024 15:55
@vincent-hatakeyama
Copy link
Contributor Author

/ocabot merge patch

@OCA-git-bot
Copy link
Contributor

Sorry @vincent-hatakeyama you are not allowed to merge.

To do so you must either have push permissions on the repository, or be a declared maintainer of all modified addons.

If you wish to adopt an addon and become it's maintainer, open a pull request to add your GitHub login to the maintainers key of its manifest.

@thomaspaulb
Copy link
Contributor

/ocabot rebase

@OCA-git-bot
Copy link
Contributor

@thomaspaulb The rebase process failed, because command git push --force xcgd tmp-pr-640:15.0-auth_saml-fix-cryptography_version failed with output:

remote: Permission to xcgd/server-auth.git denied to OCA-git-bot.
fatal: unable to access 'https://github.com/xcgd/server-auth/': The requested URL returned error: 403

@thomaspaulb
Copy link
Contributor

@vincent-hatakeyama Could you rebase or allow access

@vincent-hatakeyama vincent-hatakeyama force-pushed the 15.0-auth_saml-fix-cryptography_version branch from 18445fc to abc4682 Compare June 7, 2024 14:23
@vincent-hatakeyama
Copy link
Contributor Author

@vincent-hatakeyama Could you rebase or allow access

I’ve juste rebased.

@thomaspaulb
Copy link
Contributor

@sbidoul I need your input here.. this goes against this. Is test-requirements.txt OK to edit directly or is there some setup.py magic that we should do to override the module dependency for the test, but not for the module itself?

Or, come to think of it, could we override it there, to let the requirements.txt include the limit but to leave the module's manifest free for users of the module to decide?

@sbidoul
Copy link
Member

sbidoul commented Jun 10, 2024

I agree we should not place an upper bound on cryptography in the module. My initial approach was not optimal. This PR is better.

Last time I checked, the pin on pyopenssl 19 on Odoo's requirements.txt was not really necassary?
So another approach could be putting a minimum pyopenssl version in auth_saml2's external dependencies.
I think we have done that somewhere, but I can't find it right now.

Longer term, I would like to try and stop using Odoo's requirements.txt in oca/oca-ci, in favor of a custom set of upper bounds on dependencies that are known not to work with Odoo (things like xlrd<2, etc...).

@vincent-hatakeyama vincent-hatakeyama force-pushed the 15.0-auth_saml-fix-cryptography_version branch from abc4682 to d132bca Compare September 17, 2024 13:27
@vincent-hatakeyama
Copy link
Contributor Author

@vincent-hatakeyama Could you rebase or allow access

I’ve rebased again.

@sbidoul
Copy link
Member

sbidoul commented Sep 18, 2024

Sounds like a good solution.

/ocabot merge patch

@OCA-git-bot
Copy link
Contributor

This PR looks fantastic, let's merge it!
Prepared branch 15.0-ocabot-merge-pr-640-by-sbidoul-bump-patch, awaiting test results.

@OCA-git-bot OCA-git-bot merged commit 844d534 into OCA:15.0 Sep 18, 2024
7 checks passed
@OCA-git-bot
Copy link
Contributor

Congratulations, your PR was merged at 241f1b8. Thanks a lot for contributing to OCA. ❤️

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants