-
Notifications
You must be signed in to change notification settings - Fork 687
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Periodically enforce state on running servers with ansible pull-like logic #3136
Comments
Thanks for filing @msheiny - this definitely seems like a promising approach.
For the interested observer, "spookyinstall" refers to the security vulnerability in #2472. I certainly agree that we want to carefully vet everything (Ansible or otherwise) that will run on the servers, but in terms of whether it's better to use our own roles of community maintained ones, there are some good points in #2360 in favor of using solid community maintained roles. |
Whoopss , apologies for any confusion here. To clarify, when i said We arent currently using an community maintained modules in our codebase (at least in the install logic , we have some custom code in CI). It's possible for a community role to embed a module... but thats a whole different can of worms. |
Note to self here .. remove |
Should we add an absent flag here? Maybe, but I think that would be a better addition in #3136
This is very much worthy of consideration after the Focal migration, and in the context of larger discussions about the future of the server OS and provisioning story (e.g., #5517). |
Feature request
Description
We use a TON of ansible to enforce state at run-time but do not have any smart logic to maintain system state over the life of the system. Right okay.. we do have a few examples where we have pushed changes out via debian post-install hooks but this is really frail. Until we have something like #2966 or a magical FPF Leprechaun that travels to each instance to tuck it in each night -- we need a better solution for the time being. So WHAT do We DO!??
🎉 INTRODUCING 🎉
ANSIBLE playbooks in a debian package
✨Straight from the factory of RedHat comes the latest in system state management! Follow me into my lab! ....... Come on!!
The Gist
The package would look like this from a high-level (we've have a separate package for the app and monitor server):
securedrop-app-code
for similar strategy. Install those into a virtualenv. Include ansible logic we usually run on ansible-admin THATdoesnt rely on secrets on the adjacent server
ANDdoesnt require a reboot
.Caveats to be careful of ?
User Stories
As a securedrop maintainer, I want to have more control over long running SD system state for stability + security.
As an ansible playbook, I want to be run daily and not just at install time.
The text was updated successfully, but these errors were encountered: