On 7/3/2014 11:18 AM, Christina Fu wrote:
 Actually, I did not know that this discussion was restricted to a
 replicated ("clone") environment.  My view was more for a general
 organizational environment where there are multiple sub-ca's for
 different departments (which are not necessarily clones, but some could
 be) and there are two types of profiles:
 1. centralized profiles (shared by all)
 2. local profiles (customized by each department)
 I think this view (let's adopt your term and call it proposal #4) is
 more flexible in serving both non-clones and clones and yet retains the
 simplicity. 
Thanks for clarifying. Yes, the main purpose of this enhancement is to 
simplify replicating the profiles within a cluster (e.g. IPA). Proposal 
#4 is probably meant to be an inter-cluster profile management. Within a 
cluster itself, the replicas should be indistinguishable.
For example:
* dept1 (cluster1: server1, server2): profile1, profile2
* dept2 (cluster2: server3, server4): profile1, profile3
* shared: profile1, profile4
I think proposal #4 can be done as a separate enhancement after we 
address the intra-cluster management (proposal #1-3).
 You are right, Endi, about how "local profiles" don't
necessarily have
 to be on the disk.  It's just a personal preference that I feel most
 comfortable editing files directly than using ui's.  I have never used
 the java console to edit profiles.  I don't know if there are others who
 feel the same way.  Maybe a market research on administrators is needed
 here. 
Here's the CLI that Fraser proposed:
http://pki.fedoraproject.org/wiki/LDAP_Profile_Storage#Edit_profile
So instead of executing the following commands on each replica (and 
risking inconsistent changes):
   $ vi /var/lib/pki/pki-tomcat/ca/profiles/ca/caUserCert.cfg
   $ systemctl restart pki-tomcatd(a)pki-tomcat.service
you can call this just once (it will use the same vi editor) from any 
machine:
   $ pki <connection/auth params> profile-edit caUserCert
and it should automatically propagate the changes to all replica. Same 
thing with the UI, you'll only need to do the changes once.
> The problem with local profiles in files is that they are not
> replicated, so in case the machine is hosed, all local settings is
> gone, including the profiles. Unless the admin created a backup for
> each machine, it will be difficult to restore the machine quickly. The
> replicated LDAP profiles will take care of this problem automatically.
> In other proposals the system profiles in files are read-only and not
> customizable, so there's no local profiles that need to be backed up.
>
 If they don't do backups, losing profiles would not be their only issue
 there. 
I think, ideally, if we lose a replica, other replicas should be able to 
replace it immediately. We still need a backup for the shared 
data/configuration, but we shouldn't need to backup individual replica. 
A replica should be something that you can add/remove relatively 
quickly. So, as a long term goal we should gradually migrate local 
configuration files into LDAP, starting with the profiles.
 But anyway, like I said above, I think putting "local"
profiles
 in the lda is fine.  It's just the user experience of administration
 that has to change.  I have no opinion on this other than stating my
 personal preference of editing files directly ;-) 
Is the above CLI a good substitute?
-- 
Endi S. Dewata