Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Revise Source Control recommendations #6

Open
blairdrummond opened this issue Feb 19, 2022 · 2 comments
Open

Revise Source Control recommendations #6

blairdrummond opened this issue Feb 19, 2022 · 2 comments
Assignees

Comments

@blairdrummond
Copy link
Contributor

Revise the following guidance

### Source code
Access to a source code system was identified during discussions
of the AAW environment.
A source code system available to both unclassified and Protected B
workloads introduces some complications from a security posture,
and in particular how to prevent data exfiltration from the environment.
Therefore, there are three proposals on how to implement a source
code system in AAW:
> **Recommendation NET-ES-03**: For source code,
>
> 1. Continue to use external source code systems for unclassified workloads.
> This is permitted via TBS policy:
>
> > 6.1: Departments are to enable open access to the Internet for GC
> > electronic networks and devices, including GC and external Web 2.0
> > tools and services, to authorized individuals, as per Section 6.1.3
> > of the Policy on Acceptable Network and Device Use (PANDU).
> >
> > https://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=32588#cha5
>
> and launch an internal-only GitLab instance accessible
> only to Protected B workloads.
>
> 2. Launch a GitLab instance in the AAW environment which is
> available to all workloads. Workloads running at the
> Protected B level are granted only HEAD / GET requests
> to the GitLab instance (to prevent data exfiltration).
> POST requests to specificly authorized endpoints,
> such as for authorization, will be allowed.
>
> 3. Two seperate GitLab instances be launched in the AAW
> environment, 1 for unclassified and 1 for Protected B.
> This is the least recommended solution due to the
> maintenance overhead.
>
> **DAaaS should identify the best solution based on the
> needs of its users, and therefore this proposal
> does not specify a specific solution.**

Add the new reocmmendations for an architecture around per-namespace Gitea, highlighting the simplicity for multi-tenancy and authentication, and enablement of MLOps.

Consider studying a mechanism for providing a read-only mirror of the unclassified gitea for use in protected-b notebooks, perhaps using this:

https://docs.gitea.io/en-us/repo-mirror/#pulling-from-a-remote-repository

@cboin1996
Copy link

This ticket remains in progress, as it will be updated throughout the completion of issue StatCan/aaw#875.

@Souheil-Yazji
Copy link

@chuckbelisle since CMain gitlab connectivity can be used for pro-b purposes, we can close/archive this issue.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants