-
Notifications
You must be signed in to change notification settings - Fork 47
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Discussion: can we deprecate or simplify securedrop-handle-upgrade
?
#1225
Comments
It's been a while since I looked at that script, I have no attachment to it and would go on my normal spiel about how that complex logic doesn't belong in bash scripts, etc. :), so I'm down to move it to salt. |
I'd be happy to see
With that said, I'd like to think a bit more about this. The above are just initial ideas on how to tackle this problem. But in general I'd love for the provisioning tool to be something that we simply say what exists and things happen in the background without us needing to think too much about how to achieve that. Lastly, I think tackling this eventually feels like a good opportunity to decouple system VM management from SecureDrop "MultiVM Application" logic, although our use of Whonix is a bit mixed in that regard. |
Description
We have a script,
securedrop-handle-upgrade
, that is invoked via Salt insd-upgrade-templates.sls
. Its main purpose is to make sure that base templates for vms (debian, whonix) are correctly up to date for a given VM (for example, migrating a major OS version and switching templates). Its secondary purpose, viaremove
, is to clean up old sd templates after an upgrade.As the script mentions, to update an appvm's template, the vm must be a) powered off, and b) not be appvm template for a disposable VM that is either the default disposable or the system disposable.
The downsides of this approach are:
It might be better to move this out of a script and into the individual vm configuration. Afaict we can use
qvm.vm
to ensure that the VM's state is "powered off" (goal 1), and use "prefs" for the VM to ensure that it has the correct template (goal 2).The original goal of the script was that if a user missed a dom0 update where the template migration took place, they could still successfully upgrade (particularly during template consolidation). But I think we can deprecate this, at least at the individual vm level. Would like a second opinion though (@deeplow @legoktm maybe ?)
How will this impact SecureDrop/SecureDrop Workstation users?
Should be no-op; potentially faster provisioning
How would this affect the SecureDrop Workstation threat model?
Should be no-op
User Stories
(n/a - developer quality of life/ease of maintenance)
The text was updated successfully, but these errors were encountered: