[Piuparts-devel] RFC: preview/restrict-master-access
Andreas Beckmann
anbe at debian.org
Sat Mar 9 18:21:51 UTC 2013
Andreas Beckmann (9):
p-m: rename to piuparts-master-backend.py
p-m: add new wrapper script piuparts-master
p-s/p-m: pass section via stdin instead of command line
p-s/p-m: move chdir and stderr logging to master wrapper
p-s: stop using master-directory
p-s: stop using (master's) log-file
p.conf: use simple master-command
p-m.deb: restrict slave's ssh key to only allow running
piuparts-master
p-s: support empty master command
it needs more testing (including setting up an instance from the .deb
packages)
but I'd really like to see this in 0.50
- we have a lot of renaming in 0.50, so just one more
- we are getting to a point where others could actually run piuparts in
master-slave setup from packages
- for virtualizing piatti I'd consider restricting ssh access (to not be
able to run arbitrary commands) as a crucial requirement
concerning security:
sudoers (as sample and in the documentation) contains:
#piuparts admins
%piuparts ALL=(piupartss) ALL
%piuparts ALL=(piupartsm) ALL
which implies piupartsm is allowed to sudo something as piupartss that
is allowed to sudo anything without password as root ...
and piupartsm may be accessed via ssh from piuparts slaves with
passwordless keys
and running piuparts slaves may be potentially unsecure
(and maybe on non d.o hosts)
i.e. I don't like piupartsm having a path to sudo as root
in general I'd like to allow external slaves to feed piatti's master
with logs - either for weird tests it does not have the power for or for
different architectures (even if we don't know yet how to handle this)
Andreas
More information about the Piuparts-devel
mailing list