Re: tools for building cloud images in the buildsystem

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Nov 12, 2012 at 12:08:35PM -0500, Seth Vidal wrote:
> >That would be fine, as long as we can be very sure about the access control
> >and chain of identity assurance.
> I don't know how/if we do that _now_.
> I mean - we know who setup the koji builders and where koji lives
> but 'chain of identity assurance'..... That sounds awfully specific
> and legalistic.
> Maybe you can describe what that phrase means to you so I can
> understand that a bit better.

Sure. :)

First, I'll happily assume that people who have a admin access to the
builders are black box of trust -- there's plenty of internal accountability
and logging and whatever.

What I mean is: when I build a package for Fedora, I go through the Koji
build system. I can't just kludge up a binary RPM and have it get sent out
into the mirror. And, anyone can go into Koji and see the packages I've
built -- and see how they were built, if they want. And although the GPG
package signing process is also a black box to some degree, Bodhi gives
pretty good transparency into the path an update takes.

This isn't just good for distribution security, but it's also good for
repeatability, and it's convenient for me as a packager. I want all of that
for the cloud images. Any (technically-minded) end user should be able to
work back from the image checksum to the actual build logs.


> 'known clean'? What kind of clean do you want? If we use a new
> instance to build a new image is that clean enough? I'm certain I
> could do all of it in a single ansible playbook: spin up a new
> instance in euca, attach a set of disks, run ami-creator, retrieve
> the results. It's not very difficult at all, actually.

Yes that kind of clean. 

> >For the purposes of Rawhide nightlies (pushed to alt.fedoraproject.org?),
> >I'm perfectly fine with trusting me to do the right thing. :) For the
> >alpha, beta, and final builds, as well as possible mid-release image
> >updates, I'd like access to go through some control system, whatever that
> >might be.
> Let me know what you think the control system requires to be
> considered "safe".

I think:

* all input to the build command should be recorded 
  - save exact command-line arguments
  - either collect the kickstart file provided or require it to be pulled
    from a Fedora hosted git repo (and record what was pulled)

* checksums of the output should be generated and recorded

* no opportunity for the person doing the build to write anything into the
  build process while it's in progress, and no opportunity to alter the
  above records.

does that seem sound? Also build logs should be stored, but that's more for
information, debugging, and convenience than anything else.

If the person doing the build normally has admin access on Fedora build
systems, they shouldn't on this one. Trust but verify and all that.

-- 
Matthew Miller  ☁☁☁  Fedora Cloud Architect  ☁☁☁  <mattdm@xxxxxxxxxxxxxxxxx>
_______________________________________________
infrastructure mailing list
infrastructure@xxxxxxxxxxxxxxxxxxxxxxx
https://admin.fedoraproject.org/mailman/listinfo/infrastructure



[Index of Archives]     [Fedora Development]     [Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [KDE Users]

  Powered by Linux