--To view this discussion on the web visit https://groups.google.com/d/msg/puppet-users/-/b3WN5RZXVWwJ.
You received this message because you are subscribed to the Google Groups "Puppet Users" group.
To post to this group, send email to puppet...@googlegroups.com.
To unsubscribe from this group, send email to puppet-users...@googlegroups.com.
For more options, visit this group at http://groups.google.com/group/puppet-users?hl=en.
Hi John,
On Thu, Jan 17, 2013 at 6:56 AM, jcbollinger <John.Bo...@stjude.org> wrote:
> What I would expect on both Unix and Windows is that if the target file
> already exists and the resource declaration does not specify a mode, then
> the current mode will not be changed. It is not a managed property.
Good point. I would expect the behavior you describe, but that's not
what I'm seeing.
[...] Did puppet used to behave differently
in earlier versions [than 0.25.4]?
We need a proper permissions type and provider which can handle the ntfs acl style. Mode interpretation is just that - and not the way this should work. I looked at security.rb and just think this is just kludgey. I need to specify multiple users (ad sid lookup?), their perm, and their options. Not sure if it should be a part of file resource or a more generic security thing, since maybe it can apply to more than files...
Hi,
On CentOS, I perform some tests with package resource, for example to define that a package has to be present but no yum server is defined on the agent.
In the dashboard, it is clearly displayed that the manifest failed, but yum output is not displayed.
Is there a way to get the yum output displayed in dashboard ?
Cordialement,
Bernard Granier
01 58 11 32 51
#
" This e-mail and any attached documents may contain confidential or proprietary information. If you are not the intended recipient, you are notified that any dissemination, copying of this e-mail and any attachments thereto or use of their contents by any means whatsoever is strictly prohibited. If you have received this e-mail in error, please advise the sender immediately and delete this e-mail and all attached documents from your computer system."
#
But if you push the directory with recurse => true, what permissions
would files get in that case? Permissions of the file on the master, or
default permission for that scope?
I think you're confusing two unrelated dimensions. Whether the resource is recursive or not, if no mode (uid/gid) is declared for it then Puppet should not modify the mode (uid/gid) of existing files as part of managing that resource. This is standard Puppet behavior, and users should be able to rely on it. There are functional reasons to want it, too.
There is a completely separate question of what Puppet should do when it creates a new file: if the resource declaration does not specify a mode (uid/gid) then Puppet either must choose one by some other means. Its current behavior is to use the properties of the source file, which I actually think is fine, though issue 5240 raises questions about that behavior.
Recursive File resources have long been a problematic area for Puppet. That's not a flaw in Puppet (unless you consider recursive Files themselves to be a misfeature); rather, it's inherent in the problem. The whole point of recursive File resources is to manage a bunch of files without declaring all the properties of each one individually. But then, you're not declaring the properties of each one individually. If you want fine control then you need something that carries all the needed data. The best alternative in most cases is either to manage Files separately or to package them up and manage them via the Package.
John