You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Right now an admin could locally be checked out at some version X. The servers could have updated to some version Y > X. When the admin runs the playbooks against the servers, it could introduce bugs (security or otherwise) or could break the server my adding conflicting dependencies.
Additionally, two admins could be checked out at different versions OR two admins could be at the same version but have different values for the configs (e.g., OSSEC email addresses).
Proposed Solution
Ansible should check the file /var/lib/securedrop/version and do a SemVer check against the version checked out on the admin's machine. If the checked out version is not greater than or equal to the server's version, the playbook would abort.
The second step is that /var/lib/securedrop/config.yml is a copy of the entire set of config values need to provision the machine. This is checked against the local config to look for conflicting values. This would either
Merge them
Use the latest value
Abort
This would help admin's keep their values in sync. We could write this merge with a custom python script that allows some values to change (e.g., email addresses) but others cannot (e.g., salt).
User Stories
As an admin, I don't want to accidentally brick my server by running the playbooks.
The text was updated successfully, but these errors were encountered:
Feature request
Description
Right now an admin could locally be checked out at some version
X
. The servers could have updated to some versionY > X
. When the admin runs the playbooks against the servers, it could introduce bugs (security or otherwise) or could break the server my adding conflicting dependencies.Additionally, two admins could be checked out at different versions OR two admins could be at the same version but have different values for the configs (e.g., OSSEC email addresses).
Proposed Solution
Ansible should check the file
/var/lib/securedrop/version
and do a SemVer check against the version checked out on the admin's machine. If the checked out version is not greater than or equal to the server's version, the playbook would abort.The second step is that
/var/lib/securedrop/config.yml
is a copy of the entire set of config values need to provision the machine. This is checked against the local config to look for conflicting values. This would eitherThis would help admin's keep their values in sync. We could write this merge with a custom python script that allows some values to change (e.g., email addresses) but others cannot (e.g., salt).
User Stories
As an admin, I don't want to accidentally brick my server by running the playbooks.
The text was updated successfully, but these errors were encountered: