Security: Eindeutigere pexp-Pattern für Service-Isolation #80
Labels
No labels
apache
api
api-contract
api-gateway
authentication
automation
breaking-change
comments
component/deployment
component/documentation
component/service-management
configuration
contact-form
coordination/cross-repo
coordination/needed
core
deployment
development
development-ready
digital-sovereignty
distribution
effort
large
effort
medium
effort
small
enhancement
frontend
furt-service
furt/gateway
furt/installation
gateway
gateway-integration
generator
gitea-testing
health-check
help-wanted
hugo
hugo-integration
infrastructure
installation
logging
low-tech
mail
meta
meta/duplicate
meta/planning
meta/wontfix
monitoring
observability
openapi
organization
packaging
performance
planning
platform/linux
priority
high
priority
low
priority
medium
production
question
sagjan
security
service
service-analytics
service-development
service-formular2mail
service-newsletter
service-request
service-sagjan
session
blocker
session
handover
session
next
shortcode
specs
ssl
status
blocked
status
done
status
in-progress
status
review
status
to-go
systemd
testing
tooling
type
admin
type
bug
type
config
type
deployment
type
docs
type
enhancement
type
feature
type
handover
type
infrastructure
type
installation
type
maintenance
type
migration
type/refactor
type
research
type
security
type/testing
v0.1.0
No milestone
No project
No assignees
2 participants
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: DAW/furt#80
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Problem
Das aktuelle
pexpPattern ist potentiell nicht eindeutig genug:Collision-Szenarien:
src/main.luaverwendenBeispiel-Kollision:
Alle würden mit dem aktuellen Pattern matchen!
Lösungsansätze
Option 1: Working Directory-spezifisch
Option 2: Absolute Pfad-Kontext
Option 3: Port-basierte Detection
Option 4: PID-File basiert
Option 5: Command-Line-Argument einzigartig machen
Empfohlene Lösung: Hybrid-Ansatz
1. Unique Command-Line Flag
2. Spezifischeres pexp
3. Fallback PID-File
Sicherheits-Aspekte
Warum wichtig:
Test-Szenarien:
Implementierung
Phase 1: Command-Line-ID
--furt-service-idPhase 2: PID-File-Fallback
Phase 3: Testing
Akzeptanzkriterien
Technische Notes
Current Pattern:
/usr/local/bin/lua src/main.lua.*Risk Level: Medium (collision possible)
Impact: Service management reliability
Priority: Medium (post-Issue DAW/furt#77 cleanup)
SCOPE-ÄNDERUNG - Teil der Deployment-Modernisierung
pexp-Pattern Security gehört zu DAW/furt#87 (Wiki + Deployment-System):
Integration in DAW/furt#87: Service-Security-Komponente
wird in Zukunft über PID File gelöst DAW/furt#100