Deploy fixes for a security vulnerability
When responding to a security incident, you should review any code changes in private before deploying them, so that you don’t accidentally disclose the vulnerability.
To do this, push branches to the AWS CodeCommit backup of the repository, rather than the normal repository on GitHub.
This repository should be up to date as of the previous release, but will be missing any unreleased commits that are on GitHub master. This is fine as you don’t want to deploy these.
Ensure nobody else deploys the app until you’ve confirmed the vulnerability is fixed.
Review the pull request on AWS CodeCommit.
Create a release tag manually in git. This should follow the standard format
release_X. Tag the branch directly instead of merging it.
Don’t use the release app. Go directly to the
Deploy_AppJenkins job, and check
Ensure the vulnerability is fixed.
Push the branch and tag to GitHub.
Merge the branch into master.
Record the missing deployment in the Release app.
More about Deployment
- Add a deployment dashboard for an application
- Block apps from being deployed
- Deploy an application to GOV.UK
- Deploy Puppet
- Deploy when GitHub is unavailable
- Fall back to the static mirrors
- Get access to Jenkins
- Handle encrypted hieradata
- Monitor your app during deployment
- Restart an application
- Retire an application
- Run a rake task
- Set up a new Rails app
- Set up Heroku review apps for pull requests
- Switch an app off