New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

admin-local-* should include admin-global-* content #2996

Open
rootkovska opened this Issue Aug 8, 2017 · 8 comments

Comments

Projects
None yet
5 participants
@rootkovska
Member

rootkovska commented Aug 8, 2017

admin-local-{ro,rwx} should include admin-global-{ro,rwx} respectively -- if something's allowed to read (write) the global state, it should also be allowed to read (write) the per-VM state.

@rootkovska

This comment has been minimized.

Show comment
Hide comment
@rootkovska

rootkovska Aug 8, 2017

Member

BTW, we should also make sure that our automatics tests cover all the cases: both positive (calls allowed), but even more importantly negative (e.g. W-calls dropped when test VM given R-rights, etc).

/cc @woju

Member

rootkovska commented Aug 8, 2017

BTW, we should also make sure that our automatics tests cover all the cases: both positive (calls allowed), but even more importantly negative (e.g. W-calls dropped when test VM given R-rights, etc).

/cc @woju

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Aug 8, 2017

Member

Are you sure about that inclusion? I think it may be useful to allow admin-global-rwx calls (creating VMs, setting up defaults, managing storage etc), but do not allow to manipulate existing VMs (where the data lives).

Member

marmarek commented Aug 8, 2017

Are you sure about that inclusion? I think it may be useful to allow admin-global-rwx calls (creating VMs, setting up defaults, managing storage etc), but do not allow to manipulate existing VMs (where the data lives).

@rootkovska

This comment has been minimized.

Show comment
Hide comment
@rootkovska

rootkovska Aug 8, 2017

Member

I assume we agree about inclusion of global-ro into local-ro, right?
But you would like to keep global-rwx apart from local-rwx, correct?

Member

rootkovska commented Aug 8, 2017

I assume we agree about inclusion of global-ro into local-ro, right?
But you would like to keep global-rwx apart from local-rwx, correct?

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Aug 8, 2017

Member

Generally yes. But if you put it this way, I think such a difference may be confusing. So, I would not include it either for ro or rwx. This may mean some duplication of rules. But also, user (or rather: admin) can add such include when it suits particular use case.

Member

marmarek commented Aug 8, 2017

Generally yes. But if you put it this way, I think such a difference may be confusing. So, I would not include it either for ro or rwx. This may mean some duplication of rules. But also, user (or rather: admin) can add such include when it suits particular use case.

@woju

This comment has been minimized.

Show comment
Hide comment
@woju

woju Aug 8, 2017

Member

Out of principle I don't think there should be too many includes, since this would be a risk for maintainers. This would be another thing to remember for example if we wanted to write a new API call. I don't think that gains in terms of administration simplicity are worth the ideological complication, for both us and the administrator.

And as Marek said, if administrators choose to make such an include, they're always free to do so.

Member

woju commented Aug 8, 2017

Out of principle I don't think there should be too many includes, since this would be a risk for maintainers. This would be another thing to remember for example if we wanted to write a new API call. I don't think that gains in terms of administration simplicity are worth the ideological complication, for both us and the administrator.

And as Marek said, if administrators choose to make such an include, they're always free to do so.

@rootkovska

This comment has been minimized.

Show comment
Hide comment
@rootkovska

rootkovska Aug 9, 2017

Member

So, you guys say that we include make rwx -> ro inclusions, but not global -> local, correct?

I think I'm generally convinced by the "admin can add the include on her own" argument. Only worry is to make sure to add it in the "right direction". How about adding a commented includes (global -> local) to eliminate this potenotential mistake?

Member

rootkovska commented Aug 9, 2017

So, you guys say that we include make rwx -> ro inclusions, but not global -> local, correct?

I think I'm generally convinced by the "admin can add the include on her own" argument. Only worry is to make sure to add it in the "right direction". How about adding a commented includes (global -> local) to eliminate this potenotential mistake?

@marmarek

This comment has been minimized.

Show comment
Hide comment
@marmarek

marmarek Sep 12, 2017

Member

Wrong issue referenced from commit.

Member

marmarek commented Sep 12, 2017

Wrong issue referenced from commit.

@marmarek marmarek reopened this Sep 12, 2017

@qubesos-bot

This comment has been minimized.

Show comment
Hide comment
@qubesos-bot

qubesos-bot Sep 15, 2017

Automated announcement from builder-github

The package pykickstart-2.32-4.fc25 has been pushed to the r4.0 testing repository for dom0.
To test this update, please install it with the following command:

sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing

Changes included in this update

Automated announcement from builder-github

The package pykickstart-2.32-4.fc25 has been pushed to the r4.0 testing repository for dom0.
To test this update, please install it with the following command:

sudo qubes-dom0-update --enablerepo=qubes-dom0-current-testing

Changes included in this update

marmarek added a commit to marmarek/qubes-installer-qubes-os that referenced this issue Dec 25, 2017

anaconda: abort installation on X startup fail
Do not fallback to text mode, which cannot property install the system
without kickstart file (missing LUKS passphrase prompt).

Fixes QubesOS/qubes-issues#2996

(cherry picked from commit 2d3405d)

fepitre added a commit to fepitre/qubes-installer-qubes-os that referenced this issue Dec 29, 2017

anaconda: abort installation on X startup fail
Do not fallback to text mode, which cannot property install the system
without kickstart file (missing LUKS passphrase prompt).

Fixes QubesOS/qubes-issues#2996

fepitre added a commit to fepitre/qubes-installer-qubes-os that referenced this issue Dec 30, 2017

anaconda: abort installation on X startup fail
Do not fallback to text mode, which cannot property install the system
without kickstart file (missing LUKS passphrase prompt).

Fixes QubesOS/qubes-issues#2996

marmarek added a commit to marmarek/qubes-installer-qubes-os that referenced this issue Jan 15, 2018

anaconda: abort installation on X startup fail
Do not fallback to text mode, which cannot property install the system
without kickstart file (missing LUKS passphrase prompt).

Fixes QubesOS/qubes-issues#2996

(cherry picked from commit 2d3405d)

@qubesos-bot qubesos-bot referenced this issue in QubesOS/updates-status Jul 14, 2018

Closed

installer-qubes-os v3.2-2-qubes-release (r3.2) #582

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment