Hide Forgot
Description of problem: Hi, I wonder if we can look at a possible RFE to improve the way satellite repositories validate puppet modules that are uploaded and or synchronised from a 3rd party puppet repository. Some modules when provided externally, have been packaged with incorrect permissions (700). This means that some puppet runs will fail, as content cannot be accessed. These permissions persist and we end up in a situation where particular modules in /etc/puppet/environments/*/modules/ have the wrong permissions. It would be really helpful, so when we either sync a puppet repo, or upload a puppet module manually, that each module is sanity checked for a few basic tasks such as... 1) File permissions 2) puppet parser validate I believe by spotting these issues as we ingest, will avoid any workarounds such as systemd file permission monitoring scripts later on. Many thanks Matt