Hello,

Ok, so Gelp_64 could be very useful to me for reasons
above and beyond the administrative vision of the devs.

For example, is there a way (scripts or xml wise) to
expand /var/db/pkg to include codes I install via
/usr/local/   or via some subset of rpm or dpkg installed codes
as discussed in a recent thread?


I'm working on setting up ansible to install (clone?) new gentoo
systems, where pretty much the identical system to one
that exists would be an excellent starting point. Is there a way to 
parse /var/db/pkg, or use a "directed graph" as blueness
has suggested to populate Ansible with the necessary details
to build a clone (gentoo) system?


And then there are security audits, such as a fully characterized
list of files and the dir hierarchy of a system. Sure some of these exist
in current security tools, but the complete mapping, via
/var/db/pkg does seem like an excellent idea, and if nothing else
an excellent checking (redundant) mechanism for security audits
or to determine if something is misses via SeLinux configurations. 

Also, as I grab codes and install them ( particularly without using
an ebuild to perform the installation) how do I track all of those created
files, with a mechanism independent of the mechanism inherent
to the code. Trust is great but the best rule is to 'trust but verify'. ymmv.


Then there is the new repo.conf and epatch_user files that should be
tracked. I'm quite sure there are still many other ways outside files find
there way onto our systems (not even addressing the web side of things)
besides   what I have partially  listed in this post.

If folks have similar concerns, what mechanisms do you currently employ
for any of these aforementioned needs?



James



Reply via email to