-
Notifications
You must be signed in to change notification settings - Fork 42
Configuration
Cory Francis Myers edited this page Jun 4, 2024
·
4 revisions
SecureDrop Workstation applications are configured in production via QubesDB's /vm-config
hierarchy. For convenience in development, the QubesDB value at /vm-config/FOO
can also be provided as the environment variable FOO
.
Currently:
- Rust programs (e.g.,
securedrop-proxy
) built with thequbesdb
feature MUST read from QubesDB. Without this feature, they MUST fall back to environment variables. - Python programs (e.g.,
securedrop-client
) MUST try to loadqubesdb
at runtime (from thepython3-qubesdb
Debian package from the Qubes repository; unavailable from PyPI). If it's not available, they MUST fall back to environment variables. -
template-from-qubesdb
always reads from QubesDB and never falls back to environment variables.