Bug 1297741 - [RFE] Satellite 6 to validate permissions on puppet modules when ingesting into a repository.
Summary: [RFE] Satellite 6 to validate permissions on puppet modules when ingesting in...
Keywords:
Status: CLOSED DUPLICATE of bug 1178001
Alias: None
Product: Red Hat Satellite
Classification: Red Hat
Component: Content Management
Version: Unspecified
Hardware: All
OS: Linux
low
low vote
Target Milestone: Unspecified
Assignee: Katello Bug Bin
QA Contact: Katello QA List
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-01-12 11:04 UTC by Matthew York
Modified: 2016-02-04 15:01 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-02-04 15:01:23 UTC
Target Upstream Version:


Attachments (Terms of Use)

Description Matthew York 2016-01-12 11:04:23 UTC
Description of problem:
Hi, I wonder if we can look at a possible RFE to improve the way satellite repositories validate puppet modules that are uploaded and or synchronised from a 3rd party puppet repository.

Some modules when provided externally, have been packaged with incorrect permissions (700). This means that some puppet runs will fail, as content cannot be accessed.

These permissions persist and we end up in a situation where particular modules in 
/etc/puppet/environments/*/modules/ have the wrong permissions.

It would be really helpful, so when we either sync a puppet repo, or upload a puppet module manually, that each module is sanity checked for a few basic tasks such as...

1) File permissions
2) puppet parser validate

I believe by spotting these issues as we ingest, will avoid any workarounds such as  systemd file permission monitoring scripts later on. 

Many thanks

Matt


Note You need to log in before you can comment on or make changes to this bug.