berta...@ptitcanardnoir.org wrote (28 Sep 2013 09:22:16 GMT) :
> This change goes together with two changes in our puppet modules:

> A new one has been created to deploy the gnupg keyring in our autobuilder
> VM on lizard, and has been reviewed already by intrigeri.

I've had a look to the newest changes that I hadn't reviewed yet.

I think commit 433fa5cf ("Move the /mnt/crypt mount operation in
a more appropriate place") in lizard's Puppet manifests, and the
corresponding commit 2b71c6c6 in tails_secrets_jenkins, are a mistake,
and can be dangerous in the future.

Let me explain why.

This dummy mount really belongs to an individual node's manifest.
This declaration is the only way a sysadmin deploying the
tails_secrets_jenkins module can state that they have taken care of
the storage security pre-requisites of that module. This statement
unblocks the deployment of the module.

Moving this dummy mount into tails_secrets_jenkins really means
"pretend my storage security pre-requisites are satisfied, regardless
of where and how I'm deployed", which kinda defeats the purpose of
having any such safe-guard in place.

Please revert both commits. A nicer solution has to be found.
I'm happy to help a bit, but for this I need more information than "If
not it seems to raise a chicken and egg problem" :)

I'm thus re-opening #6266.

> Ticket : #6268 - Adapt the Jenkins artifacts rotation script

ACK, marking as resolved!

Cheers,
-- 
  intrigeri
  | GnuPG key @ https://gaffer.ptitcanardnoir.org/intrigeri/intrigeri.asc
  | OTR fingerprint @ https://gaffer.ptitcanardnoir.org/intrigeri/otr.asc
_______________________________________________
tails-dev mailing list
tails-dev@boum.org
https://mailman.boum.org/listinfo/tails-dev

Reply via email to