Responses to questions are inline. Other points will be addressed in a revision of the proposal.

On 06/ 4/10 09:29 PM, Dave Miner wrote:
On 06/ 2/10 03:02 PM, William Schumann wrote:
This proposal addresses specific deficiencies in customizing SC
manifests, and proposes enhancements to increase usability and security.

...

Section I: Has consideration been given to just overloading the existing manifest management commands and making them capable of auto-detecting the type of manifest being expressed and adjusting their behavior automatically?
AI vs. SC manifest? This was not considered. It would save adding another option, although it is potentially confusing for the user not expecting this convenience.

Section Ib: What would the contents of a default SC manifest be?
The current default.xml has such entries:
   root password: opensolaris, user: jack, password: jack
These are useful for configuring a system with a minimum of user intervention.

Do we in fact actually require one?
No. Enhanced SMF profiles project will result in prompting on first boot if required properties are missing.

AI requires a manifest in order to know what to install, but why wouldn't we expect that services would be able to prompt for configuration if required?
Again, we are aiming at automation. The Automated Installer should offer ease-of-use defaults that can be customized or eliminated by the user.

Section Ic: No argument about separating the manifests, but what's the advantage of using a multi-part MIME encoding vs. other alternatives, such as delivering the SC manifest in the wanbootfs?
It does makes sense to try to include the SC manifest in the wanbootfs, which would work for SPARC, since the bootfs is assembled by the webserver. For an x86 client, there is not an equivalent storage location. It might be better if the methods of delivering the SC manifest were consistent across platforms. Sarah expressed an opinion on this as well - response forthcoming.

Section Ie: I'm puzzled at the contention that no suitable use case was found for multiple manifest files.
The proposal will be changed to discuss XInclude, proposed in lieu of multiple SC manifest files.
The use cases in Section IIa clearly show the utility of composing configuration from multiple files, but seem to only consider relatively complex XML inclusion technology when SMF is already providing a capability which seems to meet many of the requirements without the complexity described here. What are the advantages we derive from this approach?
Some points about multiple SC manifest files vs. XInclude or other derivation techniques: - It's not complex to include a file: <xi:include file.xml> The xi: namespace is already defined in the DTD schema service_bundle.dtd.1
- XInclude provides a table lookups as indicated in the use cases.
- If multiple SC manifest files were input, there are still complications: e.g., Can the user edit the previously submitted files individually (delete, replace)? Are the individually submitted files subsumed into the AI server database (which would protect them), or are they just pathnames to files that are uploaded at install time? How would duplicate properties be handled - is the order of the files an issue? Is an interactive UI necessary? Not to say that it is not possible - only that it presents its own set of complications, despite its ostensible simplicity.
I have added a section to the proposal addressing this, with sample code.

RE: leveraging AI manifest derivation:
I think that the nature of the sysconfig information is different. From the use cases in the proposal, they don't require calculations that derived AI manifests supports - just table lookups and replacements based on service name, IP address, network, IP, MAC, etc. Simple tag replacement would suffice.

RE: IPS security:
Like the proposal for SC manifest security, IPS secures repositories with SSL keys and certificates. I think that they are compatible and that the same keys and certificates could be used if desired.

William
_______________________________________________
caiman-discuss mailing list
[email protected]
http://mail.opensolaris.org/mailman/listinfo/caiman-discuss

Reply via email to