-
Notifications
You must be signed in to change notification settings - Fork 46
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Consider preferring Salt customizations to custom template RPM #765
Comments
Just bumping this and adding some context on our use of the custom template:
It does seem like https://github.com/fepitre/qubes-builderv2 is in a pretty polished state, so maybe creating a |
Some intuitions, subject to my usual straw-person-for-the-sake-of-argument disclaimer:
Unless we can come up with a clear advantage to maintaining and installing a custom template, I would much prefer that |
@rocodes, here are my takeaways on this topic from discussion with
|
I haven't looked at the threat model to see if that last point is there, but it could be a valid candidate for a "transfer" mitigation if we did wanna use the debian base template, basically documenting the requirement for a fresh system with no template customizations, and leaving it to users to do the right thing. Being able to detect chnages in the template (beyond system updates) would be ideal tho. |
Per team meeting, we are going forward with the approach of cloning the existing Debian template that Qubes provides, rather than continuing to ship our own VM, for our 4.2 compat release. |
Basic steps for this during the install would probably look like:
Alternatively we could create a single base template, similar to the one we have now except at install time, and then clone small/large from it. Might be conceptually similar. |
Fixed via #970 |
We've long maintained a custom RPM leveraging the
qubes-builder
logic to install the base image for SDW: https://github.com/freedomofpress/qubes-template-securedrop-workstation. In the process of managing the Debian Bullseye migration (#733), we've updated the template builder logic as per usual: freedomofpress/qubes-template-securedrop-workstation#24 This is a fine plan, and we should stay on target to meet the EOL deadlines.When it comes time to move to Debian 12, however, we should consider whether it's worthwhile to maintain custom RPMs for the TemplateVM images. Given that we already
qvm-clone
the base template into "small" and "large" variants, we could do the same via Salt targeting thequbes-template-debian-12
base image. Why not just use the existing debian-12 image already installed? Let's discuss that before the next migration.The text was updated successfully, but these errors were encountered: