Bug 1297741 - [RFE] Satellite 6 to validate permissions on puppet modules when ingesting into a repository.
[RFE] Satellite 6 to validate permissions on puppet modules when ingesting in...
Status: CLOSED DUPLICATE of bug 1178001
Product: Red Hat Satellite 6
Classification: Red Hat
Component: Content Management (Show other bugs)
All Linux
low Severity low (vote)
: Unspecified
: --
Assigned To: Katello Bug Bin
Katello QA List
Depends On:
  Show dependency treegraph
Reported: 2016-01-12 06:04 EST by Matthew York
Modified: 2016-02-04 10:01 EST (History)
1 user (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2016-02-04 10:01:23 EST
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Matthew York 2016-01-12 06:04:23 EST
Description of problem:
Hi, I wonder if we can look at a possible RFE to improve the way satellite repositories validate puppet modules that are uploaded and or synchronised from a 3rd party puppet repository.

Some modules when provided externally, have been packaged with incorrect permissions (700). This means that some puppet runs will fail, as content cannot be accessed.

These permissions persist and we end up in a situation where particular modules in 
/etc/puppet/environments/*/modules/ have the wrong permissions.

It would be really helpful, so when we either sync a puppet repo, or upload a puppet module manually, that each module is sanity checked for a few basic tasks such as...

1) File permissions
2) puppet parser validate

I believe by spotting these issues as we ingest, will avoid any workarounds such as  systemd file permission monitoring scripts later on. 

Many thanks


Note You need to log in before you can comment on or make changes to this bug.