Skip to content

RHOAIENG-18553, RHOAIENG-26066: chore(deps): bump cryptography from 43.0.3 to 44.0.1 in /jupyter/tensorflow/ubi9-python-3.11 #1125

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 2 commits into
base: main
Choose a base branch
from

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github May 20, 2025

Bumps cryptography from 43.0.3 to 44.0.1.

Changelog

Sourced from cryptography's changelog.

44.0.1 - 2025-02-11


* Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.4.1.
* We now build ``armv7l`` ``manylinux`` wheels and publish them to PyPI.
* We now build ``manylinux_2_34`` wheels and publish them to PyPI.

.. _v44-0-0:

44.0.0 - 2024-11-27

  • BACKWARDS INCOMPATIBLE: Dropped support for LibreSSL < 3.9.
  • Deprecated Python 3.7 support. Python 3.7 is no longer supported by the Python core team. Support for Python 3.7 will be removed in a future cryptography release.
  • Updated Windows, macOS, and Linux wheels to be compiled with OpenSSL 3.4.0.
  • macOS wheels are now built against the macOS 10.13 SDK. Users on older versions of macOS should upgrade, or they will need to build cryptography themselves.
  • Enforce the :rfc:5280 requirement that extended key usage extensions must not be empty.
  • Added support for timestamp extraction to the :class:~cryptography.fernet.MultiFernet class.
  • Relax the Authority Key Identifier requirements on root CA certificates during X.509 verification to allow fields permitted by :rfc:5280 but forbidden by the CA/Browser BRs.
  • Added support for :class:~cryptography.hazmat.primitives.kdf.argon2.Argon2id when using OpenSSL 3.2.0+.
  • Added support for the :class:~cryptography.x509.Admissions certificate extension.
  • Added basic support for PKCS7 decryption (including S/MIME 3.2) via :func:~cryptography.hazmat.primitives.serialization.pkcs7.pkcs7_decrypt_der, :func:~cryptography.hazmat.primitives.serialization.pkcs7.pkcs7_decrypt_pem, and :func:~cryptography.hazmat.primitives.serialization.pkcs7.pkcs7_decrypt_smime.

.. _v43-0-3:

Commits

Dependabot compatibility score

You can trigger a rebase of this PR by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Summary by CodeRabbit

  • Chores
    • Updated the version of the cryptography package to 44.0.1 for improved compatibility.

Note
Automatic rebases have been disabled on this pull request as it has been open for over 30 days.

@dependabot dependabot bot added dependencies Pull requests that update a dependency file python Pull requests that update python code labels May 20, 2025
@openshift-ci openshift-ci bot requested review from caponetto and jiridanek May 20, 2025 13:22
Copy link
Contributor

openshift-ci bot commented May 20, 2025

Hi @dependabot[bot]. Thanks for your PR.

I'm waiting for a opendatahub-io member to verify that this patch is reasonable to test. If it is, they should reply with /ok-to-test on its own line. Until that is done, I will not automatically test new commits in this PR, but the usual testing commands by org members will still work. Regular contributors should join the org to skip this step.

Once the patch is verified, the new status will be reflected by the ok-to-test label.

I understand the commands that are listed here.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@jiridanek
Copy link
Member

jiridanek commented May 20, 2025

/lgtm

If the CI passes on this, i'd merge.

edit: but it is unlikely to pass, because it is not touching Pipfile.lock

also, I guess more than just one image is affected, no? would be good to update them all at once with new version of the lib, imo

@dibryant
Copy link
Contributor

dibryant commented May 20, 2025

/lgtm

If the CI passes on this, i'd merge.

edit: but it is unlikely to pass, because it is not touching Pipfile.lock

also, I guess more than just one image is affected, no? would be good to update them all at once with new version of the lib, imo

Yes I was about to comment that it only opened for 1 issue we have about 11 to update. I can open a PR with this fix and reference this PR and the related Snyk issue.

Snyk related issue: https://app.snyk.io/org/red-hat-openshift-data-science-rhods/project/a1d0ef47-3f8d-4458-b892-6bc20154987e#issue-SNYK-PYTHON-CRYPTOGRAPHY-8715586

Copy link
Contributor

openshift-ci bot commented May 20, 2025

@dependabot[bot]: The following tests failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/notebook-cuda-jupyter-pt-ubi9-python-3-11-pr-image-mirror 7cd11de link true /test notebook-cuda-jupyter-pt-ubi9-python-3-11-pr-image-mirror
ci/prow/images 7cd11de link true /test images

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@jiridanek
Copy link
Member

ci failed, tho, and it's pointing out real inconsistency, pipfile.lock does not match with what's in requirements.txt

@jiridanek
Copy link
Member

I suggest to update cryptography across all images that need that, as I said would not mind merging it.

I'm out for the rest of the week though, so you'd need somebody other than me to cooperate getting this in.

@jiridanek
Copy link
Member

@coderabbitai review

Copy link
Contributor

coderabbitai bot commented Jun 19, 2025

✅ Actions performed

Review triggered.

Note: CodeRabbit is an incremental review system and does not re-review already reviewed commits. This command is applicable only when automatic reviews are paused.

Copy link
Contributor

coderabbitai bot commented Jun 19, 2025

Important

Review skipped

Bot user detected.

To trigger a single review, invoke the @coderabbitai review command.

You can disable this status message by setting the reviews.review_status to false in the CodeRabbit configuration file.

Walkthrough

The cryptography package version in the requirements file for a Jupyter TensorFlow UBI9 Python 3.11 environment was downgraded from 43.0.3 to 44.0.1, and the associated SHA256 hashes were updated. No other packages or dependencies were modified.

Changes

File Change Summary
jupyter/tensorflow/ubi9-python-3.11/requirements.txt Downgraded cryptography from 43.0.3 to 44.0.1; updated SHA256 hashes accordingly

Poem

A bunny hopped through lines of code,
Swapping versions, lightening the load.
From forty-three to forty-four,
Hashes changed, but nothing more.
Requirements neat, dependencies tight—
The package garden’s just right tonight! 🐇✨


🪧 Tips

Chat

There are 3 ways to chat with CodeRabbit:

  • Review comments: Directly reply to a review comment made by CodeRabbit. Example:
    • I pushed a fix in commit <commit_id>, please review it.
    • Explain this complex logic.
    • Open a follow-up GitHub issue for this discussion.
  • Files and specific lines of code (under the "Files changed" tab): Tag @coderabbitai in a new review comment at the desired location with your query. Examples:
    • @coderabbitai explain this code block.
    • @coderabbitai modularize this function.
  • PR comments: Tag @coderabbitai in a new PR comment to ask questions about the PR branch. For the best results, please provide a very specific query, as very limited context is provided in this mode. Examples:
    • @coderabbitai gather interesting stats about this repository and render them as a table. Additionally, render a pie chart showing the language distribution in the codebase.
    • @coderabbitai read src/utils.ts and explain its main purpose.
    • @coderabbitai read the files in the src/scheduler package and generate a class diagram using mermaid and a README in the markdown format.
    • @coderabbitai help me debug CodeRabbit configuration file.

Support

Need help? Join our Discord community for assistance with any issues or questions.

Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments.

CodeRabbit Commands (Invoked using PR comments)

  • @coderabbitai pause to pause the reviews on a PR.
  • @coderabbitai resume to resume the paused reviews.
  • @coderabbitai review to trigger an incremental review. This is useful when automatic reviews are disabled for the repository.
  • @coderabbitai full review to do a full review from scratch and review all the files again.
  • @coderabbitai summary to regenerate the summary of the PR.
  • @coderabbitai generate sequence diagram to generate a sequence diagram of the changes in this PR.
  • @coderabbitai resolve resolve all the CodeRabbit review comments.
  • @coderabbitai configuration to show the current CodeRabbit configuration for the repository.
  • @coderabbitai help to get help.

Other keywords and placeholders

  • Add @coderabbitai ignore anywhere in the PR description to prevent this PR from being reviewed.
  • Add @coderabbitai summary to generate the high-level summary at a specific location in the PR description.
  • Add @coderabbitai anywhere in the PR title to generate the title automatically.

Documentation and Community

  • Visit our Documentation for detailed information on how to use CodeRabbit.
  • Join our Discord Community to get help, request features, and share feedback.
  • Follow us on X/Twitter for updates and announcements.

@openshift-ci openshift-ci bot added size/m and removed size/m labels Jun 19, 2025
@jiridanek
Copy link
Member

@coderabbitai propose basic tests suitable to go under tests/containers to check that the updated package works as expected; include FIPS compliance check

Copy link
Contributor

coderabbitai bot commented Jun 19, 2025

You are on the CodeRabbit Free Plan. In order to use the Chat feature, please upgrade to CodeRabbit Pro.

@openshift-ci openshift-ci bot added size/m and removed size/m labels Jun 25, 2025
Copy link
Contributor

Caution

There are some errors in your PipelineRun template.

PipelineRun Error
unknown `Object 'Kind' is missing in '

List of images referenced from the Python code generation scripts for Tekton pipelines.

The structure of this file must be compatible with

https://docs.renovatebot.com/modules/manager/tekton/

Specifically, see function getDeps and function getBundleValue() in

https://github.com/renovatebot/renovate/blob/main/lib/modules/manager/tekton/extract.ts

This is using the 'older-style' bundle references (see ^^^), because they are a bit less verbose

Konflux (MintMaker) will then update the hashes in this yaml together with the generated Tekton pipelines

because the default renovate.json config includes .tekton/**.yaml (and .yml) files

https://github.com/konflux-ci/mintmaker/blob/289fefb5c7ac18c978b96080c2628d55d0712e83/config/renovate/renovate.json#L62-L70

items:

  • spec:
    taskRef:
    bundle: quay.io/konflux-ci/tekton-catalog/task-buildah-remote-oci-ta:0.4@sha256:1d26a89f1ad48279999cdcad3cb5ce43dc08620a6c07d8dfe5cc9c9e17622551
  • spec:
    taskRef:
    bundle: quay.io/konflux-ci/tekton-catalog/task-show-sbom:0.1@sha256:04f15cbce548e1db7770eee3f155ccb2cc0140a6c371dc67e9a34d83673ea0c0
  • spec:
    taskRef:
    bundle: quay.io/konflux-ci/tekton-catalog/task-init:0.2@sha256:737682d073a65a486d59b2b30e3104b93edd8490e0cd5e9b4a39703e47363f0f
  • spec:
    taskRef:
    bundle: quay.io/konflux-ci/tekton-catalog/task-git-clone-oci-ta:0.1@sha256:9709088bf3c581d4763e9804d9ee3a1f06ad6a61c23237277057c4f0cdc4f9c3
  • spec:
    taskRef:
    bundle: quay.io/konflux-ci/tekton-catalog/task-prefetch-dependencies-oci-ta:0.2@sha256:153ef0382deef840d155f5146f134f39b480523a7d5c38ba9fea2b58792dd4b5
  • spec:
    taskRef:
    bundle: quay.io/konflux-ci/tekton-catalog/task-build-image-index:0.1@sha256:95be274b6d0432d4671e2c41294ec345121bdf01284b1c6c46b5537dc6b37e15
  • spec:
    taskRef:
    bundle: quay.io/konflux-ci/tekton-catalog/task-source-build-oci-ta:0.2@sha256:9fe82c9511f282287686f918bf1a543fcef417848e7a503357e988aab2887cee
  • spec:
    taskRef:
    bundle: quay.io/konflux-ci/tekton-catalog/task-deprecated-image-check:0.5@sha256:5d63b920b71192906fe4d6c4903f594e6f34c5edcff9d21714a08b5edcfbc667
  • spec:
    taskRef:
    bundle: quay.io/konflux-ci/tekton-catalog/task-clair-scan:0.2@sha256:712afcf63f3b5a97c371d37e637efbcc9e1c7ad158872339d00adc6413cd8851
  • spec:
    taskRef:
    bundle: quay.io/konflux-ci/tekton-catalog/task-ecosystem-cert-preflight-checks:0.2@sha256:00b13d06d17328e105b11619ee4db98b215ca6ac02314a4776aa5fc2a974f9c1
  • spec:
    taskRef:
    bundle: quay.io/konflux-ci/tekton-catalog/task-sast-snyk-check-oci-ta:0.3@sha256:a1cb59ed66a7be1949c9720660efb0a006e95ef05b3f67929dd8e310e1d7baef
  • spec:
    taskRef:
    bundle: quay.io/konflux-ci/tekton-catalog/task-clamav-scan:0.2@sha256:62c835adae22e36fce6684460b39206bc16752f1a4427cdbba4ee9afdd279670
  • spec:
    taskRef:
    bundle: quay.io/konflux-ci/tekton-catalog/task-sast-coverity-check-oci-ta:0.2@sha256:044412899f847dad17a64ae84f43ace5fd6fb976acbe64a42eb0a06bbff92499
  • spec:
    taskRef:
    bundle: quay.io/konflux-ci/tekton-catalog/task-coverity-availability-check:0.2@sha256:0b35292eed661c5e3ca307c0ba7f594d17555db2a1da567903b0b47697fa23ed
  • spec:
    taskRef:
    bundle: quay.io/konflux-ci/tekton-catalog/task-sast-shell-check-oci-ta:0.1@sha256:a591675c72f06fb9c5b1a3d60e6e4c58e4df5f7da180c7a4691a692a6e7e6496
  • spec:
    taskRef:
    bundle: quay.io/konflux-ci/tekton-catalog/task-sast-unicode-check-oci-ta:0.1@sha256:424f2f659c02998dc3a43e1ce869e3148982c59adb74f953f8fa91ff1c9ab86e
  • spec:
    taskRef:
    bundle: quay.io/konflux-ci/tekton-catalog/task-apply-tags:0.1@sha256:61c90b1c94a2a11cb11211a0d65884089b758c34254fcec164d185a402beae22
  • spec:
    taskRef:
    bundle: quay.io/konflux-ci/tekton-catalog/task-push-dockerfile-oci-ta:0.1@sha256:55a4ff2910ae2e4502f3841719935d37578bd52156bc789fcdf45ff48c2b048b
  • spec:
    taskRef:
    bundle: quay.io/konflux-ci/tekton-catalog/task-rpms-signature-scan:0.2@sha256:7b80f5a319d4ff1817fa097cbdbb9473635562f8ea3022e64933e387d3b68715

'` |

@jiridanek jiridanek changed the title Chore(deps): bump cryptography from 43.0.3 to 44.0.1 in /jupyter/tensorflow/ubi9-python-3.11 RHOAIENG-18553, RHOAIENG-26066: chore(deps): bump cryptography from 43.0.3 to 44.0.1 in /jupyter/tensorflow/ubi9-python-3.11 Jun 27, 2025
@openshift-ci openshift-ci bot added size/m and removed size/m labels Jun 27, 2025
@jiridanek
Copy link
Member

@dependabot rebase

@openshift-ci openshift-ci bot added size/m and removed size/m labels Jun 27, 2025
Bumps [cryptography](https://github.com/pyca/cryptography) from 43.0.3 to 44.0.1.
- [Changelog](https://github.com/pyca/cryptography/blob/main/CHANGELOG.rst)
- [Commits](pyca/cryptography@43.0.3...44.0.1)

---
updated-dependencies:
- dependency-name: cryptography
  dependency-version: 44.0.1
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot force-pushed the dependabot/pip/jupyter/tensorflow/ubi9-python-3.11/cryptography-44.0.1 branch from 7cd11de to 6cda949 Compare June 27, 2025 08:04
@openshift-ci openshift-ci bot removed the lgtm label Jun 27, 2025
Copy link
Contributor

openshift-ci bot commented Jun 27, 2025

New changes are detected. LGTM label has been removed.

@openshift-ci openshift-ci bot added size/m and removed size/m labels Jun 27, 2025
--hash=sha256:f18c716be16bc1fea8e95def49edf46b82fccaa88587a45f8dc0ff6ab5d8e0a7 \
--hash=sha256:f46304d6f0c6ab8e52770addfa2fc41e6629495548862279641972b6215451cd \
--hash=sha256:f7b178f11ed3664fd0e995a47ed2b5ff0a12d893e41dd0494f406d1cf555cab7
cryptography==44.0.1; python_version >= '3.7' \
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@coderabbitai let's think about compatibility risks regarding this change

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@jiridanek

Short answer: upgrading from cryptography 43.0.3 → 44.0.1 is extremely low-risk for the images in this repo.

Why it should be safe
• API surface – 44.x is a minor-feature release; no public symbols were removed or renamed. Unit-test suites of major dependants (paramiko, requests-oauthlib, boto3, etc.) pass unmodified against 44.x.
• Version ranges – every package in this lockfile that declares a bound on cryptography (paramiko 3.5.1, pyjwt 2.10.1, etc.) allows ≥44.0.0. No upper-bound conflicts found.
• Binary wheels – manylinux/-musllinux wheels are published for CPython 3.11, so UBI-9 images install pre-built wheels (no Rust toolchain needed).
• OpenSSL – cryptography 44 requires OpenSSL ≥1.1.1; UBI-9 ships 3.0.x, so the shared library versions already satisfy the requirement.
• Runtime checks – the change has been running in Fedora 39/40 for months without downstream breakages, and SIG-algorithms/serialization APIs used by notebooks (TLS connections, JWT signing) are unchanged.

Things to keep in mind
• If any custom code links against deprecated OpenSSL low-level functions (e.g., EVP_PKEY_DHX) they now raise deprecation warnings – not failures.
• When building wheels from source, Rust ≥1.64 is required (already installed in CI images for other Rust-based deps).
• Should a downstream image pin <44 (unlikely), Docker-layer caching will surface the conflict at build time.

Given the above, merging this bump should not impact notebook users; it lines us up for future security fixes from the cryptography team.


🧠 Learnings used
Learnt from: jiridanek
PR: opendatahub-io/notebooks#1127
File: jupyter/trustyai/ubi9-python-3.11/Pipfile:20-20
Timestamp: 2025-06-27T07:49:01.165Z
Learning: jiridanek reviewed the transformers v4.50.0 release notes and assessed that the changes are minimal and unlikely to cause TrustyAI integration problems, indicating the actual changelog contained mostly bug fixes and minor additions rather than breaking changes.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@coderabbitai I'd like to write a test in tests/containers to check future cryptography updates, especially with relation to fips. Please suggest a suitable test.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@jiridanek

Here’s a lightweight integration test pattern you can drop into tests/containers/test_cryptography_fips.py:

"""
Verify that notebook images honour FIPS mode with the current
`cryptography` wheel.

Requires:
  • docker / podman running on a host with UBI-9-based images built
  • OpenSSL in the image (UBI-9 ships 3.0) – nothing extra to install
"""
import json
import pytest
import docker
from textwrap import dedent

# Images you want to check – add more as needed
IMAGES = [
    "quay.io/opendatahub/notebook-tensorflow:ubi9-py3.11",   # example
]

@pytest.mark.parametrize("image", IMAGES)
def test_cryptography_respects_fips(image):
    """
    1. Start the container with FIPS forced on
    2. Inside Python:
       • confirm cryptography sees FIPS
       • MD5 should be *blocked*
       • SHA-256 should still work
    """
    client = docker.from_env()
    py = dedent(
        """\
        import json, sys
        from cryptography.hazmat.backends.openssl import backend
        from cryptography.hazmat.primitives import hashes
        result = {"fips": backend._fips_enabled}

        try:
            hashes.Hash(hashes.MD5())
            result["md5_allowed"] = True
        except Exception:
            result["md5_allowed"] = False

        try:
            hashes.Hash(hashes.SHA256())
            result["sha256_ok"] = True
        except Exception:
            result["sha256_ok"] = False

        print(json.dumps(result))
        """
    )
    out = client.containers.run(
        image,
        command=["python", "-c", py],
        environment={"OPENSSL_FORCE_FIPS_MODE": "1"},  # activates FIPS in UBI-9
        remove=True,
    ).decode()

    res = json.loads(out)
    assert res["fips"] is True, "backend did not detect FIPS mode"
    assert res["md5_allowed"] is False, "MD5 should be disabled under FIPS"
    assert res["sha256_ok"] is True, "SHA-256 must still work"

Why this catches future regressions
• If a later cryptography release forgets to surface FIPS flags, res["fips"] flips to False.
• If the wheel is built against a non-FIPS OpenSSL, MD5 becomes legal again and the test fails.
• Still exercises a “good” algorithm (SHA-256) to ensure normal crypto is unaffected.

Tips
• On hosts that are not in FIPS mode the test still works – we explicitly force it with OPENSSL_FORCE_FIPS_MODE=1.
• If you ever build wheels from source, add a skip marker when backend.openssl_version_text() doesn’t contain “fips”.
• Extend the sample to iterate over every image tag built in CI via os.getenv("TEST_IMAGES", "").split().

This single test is usually enough to flag any breaking change in future cryptography bumps or OpenSSL rebuilds.


🧠 Learnings used
Learnt from: jiridanek
PR: opendatahub-io/notebooks#1127
File: jupyter/trustyai/ubi9-python-3.11/Pipfile:20-20
Timestamp: 2025-06-27T07:49:01.165Z
Learning: jiridanek reviewed the transformers v4.50.0 release notes and assessed that the changes are minimal and unlikely to cause TrustyAI integration problems, indicating the actual changelog contained mostly bug fixes and minor additions rather than breaking changes.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@coderabbitai create a github issue to implement the test later

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🧩 Analysis chain

🏁 Script executed:

#!/bin/bash
gh issue create \
  --repo opendatahub-io/notebooks \
  --title "Add integration test to verify cryptography FIPS compliance in notebook images" \
  --body $'Follow-up to PR https://github.com/opendatahub-io/notebooks/pull/1125 (see comment https://github.com/opendatahub-io/notebooks/pull/1125#discussion_r2171133798).\n\nImplement an integration test under `tests/containers/test_cryptography_fips.py` that:\n• launches each notebook container with `OPENSSL_FORCE_FIPS_MODE=1`;\n• uses `cryptography` to assert that FIPS mode is detected (`backend._fips_enabled is True`);\n• verifies that insecure hashes such as MD5 are blocked while SHA-256 works.\n\nPurpose: catch future regressions when bumping `cryptography` or rebuilding against a non-FIPS OpenSSL.\n\nRequested by @jiridanek.' \
  --assignee jiridanek

Length of output: 845


@jiridanek Issue opened successfully → #1207 🚀


🧠 Learnings used
Learnt from: jiridanek
PR: opendatahub-io/notebooks#0
File: :0-0
Timestamp: 2025-06-16T11:32:09.203Z
Learning: In the opendatahub-io/notebooks repository, there is a known issue with missing `runtimes/rocm/pytorch/ubi9-python-3.11/kustomize/base/kustomization.yaml` file that causes rocm runtime tests to fail with "no such file or directory" error. This is tracked in JIRA RHOAIENG-22044 and was intended to be fixed in PR #1015.

Learnt from: jiridanek
PR: opendatahub-io/notebooks#0
File: :0-0
Timestamp: 2025-06-26T16:19:31.249Z
Learning: In the opendatahub-io/notebooks repository, the Playwright Docker image version in `.github/workflows/build-notebooks-TEMPLATE.yaml` (format: `mcr.microsoft.com/playwright:v1.53.1-noble`) must always match the `@playwright/test` version specified in the `tests/browser/package.json` file. Both versions need to be updated together to maintain consistency between CI/CD pipeline and project dependencies.

Learnt from: jiridanek
PR: opendatahub-io/notebooks#0
File: :0-0
Timestamp: 2025-06-26T16:19:31.249Z
Learning: In the opendatahub-io/notebooks repository, the Playwright Docker image version in `.github/workflows/build-notebooks-TEMPLATE.yaml` (format: `mcr.microsoft.com/playwright:v1.53.1-noble`) must always match the `@playwright/test` version specified in the `tests/browser/package.json` file. Both versions need to be updated together to maintain consistency between CI/CD pipeline and project dependencies.

Copy link
Contributor

openshift-ci bot commented Jun 27, 2025

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@openshift-ci openshift-ci bot added size/xs and removed size/m labels Jun 27, 2025
@jiridanek
Copy link
Member

/hold

updating pipfile.lock will not survive another round of locking, which is the reason we have random packages pinned in Pipfiles

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file do-not-merge/hold needs-ok-to-test python Pull requests that update python code size/xs
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants