<feed xmlns='http://www.w3.org/2005/Atom'>
<title>puppet.git, branch ticket/master/7841</title>
<subtitle>Puppet repo</subtitle>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/ricky/public_git/puppet.git/'/>
<entry>
<title>SELinux module headers are always little endian.</title>
<updated>2011-08-31T15:22:14+00:00</updated>
<author>
<name>Ricky Zhou</name>
<email>ricky@fedoraproject.org</email>
</author>
<published>2011-06-08T21:42:07+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/ricky/public_git/puppet.git/commit/?id=b51961446995a8c3b62f710e61630a658798fd8c'/>
<id>b51961446995a8c3b62f710e61630a658798fd8c</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge pull request #61 from jblaine/patch-1</title>
<updated>2011-08-25T20:24:53+00:00</updated>
<author>
<name>Daniel Pittman</name>
<email>daniel@rimspace.net</email>
</author>
<published>2011-08-25T20:24:53+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/ricky/public_git/puppet.git/commit/?id=98db04eb290ad7767cbc6da43c0ab94971f0d8ef'/>
<id>98db04eb290ad7767cbc6da43c0ab94971f0d8ef</id>
<content type='text'>
Removed spurious "exec" from a debug string</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Removed spurious "exec" from a debug string</pre>
</div>
</content>
</entry>
<entry>
<title>Removed spurious "exec" from a debug string</title>
<updated>2011-08-26T00:19:44+00:00</updated>
<author>
<name>Jeff Blaine</name>
<email>jblaine@kickflop.net</email>
</author>
<published>2011-08-26T00:19:44+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/ricky/public_git/puppet.git/commit/?id=01df23754cf12305bad460d67eca2a41493e791e'/>
<id>01df23754cf12305bad460d67eca2a41493e791e</id>
<content type='text'>
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge branch '2.7.x'</title>
<updated>2011-08-24T22:42:03+00:00</updated>
<author>
<name>Nick Lewis</name>
<email>nick@puppetlabs.com</email>
</author>
<published>2011-08-24T22:42:03+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/ricky/public_git/puppet.git/commit/?id=da4a2def42639817c4522fc0162bd691956998da'/>
<id>da4a2def42639817c4522fc0162bd691956998da</id>
<content type='text'>
Conflicts:
	lib/puppet/feature/base.rb
	lib/puppet/file_serving/configuration.rb
	spec/unit/indirector/ssl_file_spec.rb
	spec/unit/parser/functions/extlookup_spec.rb
	spec/unit/resource/catalog_spec.rb
	test/language/ast/variable.rb
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Conflicts:
	lib/puppet/feature/base.rb
	lib/puppet/file_serving/configuration.rb
	spec/unit/indirector/ssl_file_spec.rb
	spec/unit/parser/functions/extlookup_spec.rb
	spec/unit/resource/catalog_spec.rb
	test/language/ast/variable.rb
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge pull request #53 from joshcooper/ticket/2.7.x/8662-root-on-windows</title>
<updated>2011-08-23T00:06:44+00:00</updated>
<author>
<name>Nick Lewis</name>
<email>nick@puppetlabs.com</email>
</author>
<published>2011-08-23T00:06:44+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/ricky/public_git/puppet.git/commit/?id=630ec36089e2224fba99b76d76eaf904af13e4d6'/>
<id>630ec36089e2224fba99b76d76eaf904af13e4d6</id>
<content type='text'>
Ticket/2.7.x/8662 root on windows</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Ticket/2.7.x/8662 root on windows</pre>
</div>
</content>
</entry>
<entry>
<title>(#8662) Don't manage internal file permissions on Windows</title>
<updated>2011-08-22T22:07:41+00:00</updated>
<author>
<name>Josh Cooper</name>
<email>josh@puppetlabs.com</email>
</author>
<published>2011-08-22T16:26:33+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/ricky/public_git/puppet.git/commit/?id=0f207a8ea61205ba6b47e8da429ab3887b3cda4d'/>
<id>0f207a8ea61205ba6b47e8da429ab3887b3cda4d</id>
<content type='text'>
When running as root, puppet will by default manage internal file
permissions for file-related settings. However, ruby does not support
chown/chgrp functionality on Windows, so puppet will fail to run
(puppet apply generates an exception while trying to set the owner,
etc).

This commit disables internal file permissions handling on Windows
until we add support for chown (at least) as part of the larger file
type effort on Windows.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
When running as root, puppet will by default manage internal file
permissions for file-related settings. However, ruby does not support
chown/chgrp functionality on Windows, so puppet will fail to run
(puppet apply generates an exception while trying to set the owner,
etc).

This commit disables internal file permissions handling on Windows
until we add support for chown (at least) as part of the larger file
type effort on Windows.
</pre>
</div>
</content>
</entry>
<entry>
<title>(#8662) Skip user and group resources when applying settings on Windows</title>
<updated>2011-08-22T22:07:16+00:00</updated>
<author>
<name>Josh Cooper</name>
<email>josh@puppetlabs.com</email>
</author>
<published>2011-08-18T17:35:50+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/ricky/public_git/puppet.git/commit/?id=47058abc0c5647d59b0dd21181e67dbfdd908292'/>
<id>47058abc0c5647d59b0dd21181e67dbfdd908292</id>
<content type='text'>
When running as root, puppet will generate a catalog from its settings
to create the various directories, e.g. var, ssl. If mkusers is true
and a setting implements owner and/or group methods, then puppet will
automatically add user and group resources to the catalog (provided
the user name is not root and the group names are not root or
wheel). This functionality will not be supported on Windows, and so
this step is skipped.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
When running as root, puppet will generate a catalog from its settings
to create the various directories, e.g. var, ssl. If mkusers is true
and a setting implements owner and/or group methods, then puppet will
automatically add user and group resources to the catalog (provided
the user name is not root and the group names are not root or
wheel). This functionality will not be supported on Windows, and so
this step is skipped.
</pre>
</div>
</content>
</entry>
<entry>
<title>(#8662) Fix Puppet.features.root? on Windows</title>
<updated>2011-08-22T22:06:11+00:00</updated>
<author>
<name>Josh Cooper</name>
<email>josh@puppetlabs.com</email>
</author>
<published>2011-08-18T17:34:18+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/ricky/public_git/puppet.git/commit/?id=2ac87905708ddbc44d212e10e34d72cad09e3271'/>
<id>2ac87905708ddbc44d212e10e34d72cad09e3271</id>
<content type='text'>
This commit changes Puppet::Util::SUIDManager.root? (and
Puppet.features.root?) to only return true if the user is running with
elevated privileges (granted via UAC). If this check fails because
elevated privileges are not supported, e.g. pre-Vista, then we fall
back to checking if the user is a member of the builtin Administrators
group.

This means if you are logged in as Administrator on 2008,
Puppet.features.root? will return false, unless you are explicitly
running puppet as an administrator, e.g.

 runas /user:Administrator "puppet apply manifest.pp"

This commit also adds tests to ensure SUIDManager.asuser is a no-op on
Windows, since Windows does not (easily) support switching user
contexts without providing a password.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
This commit changes Puppet::Util::SUIDManager.root? (and
Puppet.features.root?) to only return true if the user is running with
elevated privileges (granted via UAC). If this check fails because
elevated privileges are not supported, e.g. pre-Vista, then we fall
back to checking if the user is a member of the builtin Administrators
group.

This means if you are logged in as Administrator on 2008,
Puppet.features.root? will return false, unless you are explicitly
running puppet as an administrator, e.g.

 runas /user:Administrator "puppet apply manifest.pp"

This commit also adds tests to ensure SUIDManager.asuser is a no-op on
Windows, since Windows does not (easily) support switching user
contexts without providing a password.
</pre>
</div>
</content>
</entry>
<entry>
<title>Merge pull request #52 from joshcooper/maint/2.7.x/ssl-file-spec-test-failure</title>
<updated>2011-08-22T21:53:22+00:00</updated>
<author>
<name>Nick Lewis</name>
<email>nick@puppetlabs.com</email>
</author>
<published>2011-08-22T21:53:22+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/ricky/public_git/puppet.git/commit/?id=4684db12b1ca27df4d612fb1a54b7be43f54a6a8'/>
<id>4684db12b1ca27df4d612fb1a54b7be43f54a6a8</id>
<content type='text'>
Maint/2.7.x/ssl file spec test failure</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
Maint/2.7.x/ssl file spec test failure</pre>
</div>
</content>
</entry>
<entry>
<title>(#8662) Break circular feature dependency</title>
<updated>2011-08-22T21:35:31+00:00</updated>
<author>
<name>Josh Cooper</name>
<email>josh@puppetlabs.com</email>
</author>
<published>2011-08-18T17:30:29+00:00</published>
<link rel='alternate' type='text/html' href='https://fedorapeople.org/cgit/ricky/public_git/puppet.git/commit/?id=ccdd043ab309ca382dc949612d7efe3562adf5c5'/>
<id>ccdd043ab309ca382dc949612d7efe3562adf5c5</id>
<content type='text'>
The root feature was being evaluated prior to the microsoft_windows
feature being defined. On Windows, this had the side-effect of calling
Process.uid prior to the win32 sys/admin gem being loaded. And the
default ruby implementation of Process.uid always returns 0, which
caused Puppet.features.root? to always return true.

This commit reorders the syslog, posix, microsoft_windows, and root
features due to dependencies among them. This ensures the
microsoft_windows feature is defined prior to evaluating the root
feature.

As a result of this commit, the SUIDManager now calls the win32
sys/admin version of the Process.uid method, which returns the RID
component of the user's SID. As this is not 0, Puppet.features.root?
will now always return false on Windows. A future commit will fix
this, so that Puppet.feature.root? only returns true when running as
the Windows-equivalent of root.
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The root feature was being evaluated prior to the microsoft_windows
feature being defined. On Windows, this had the side-effect of calling
Process.uid prior to the win32 sys/admin gem being loaded. And the
default ruby implementation of Process.uid always returns 0, which
caused Puppet.features.root? to always return true.

This commit reorders the syslog, posix, microsoft_windows, and root
features due to dependencies among them. This ensures the
microsoft_windows feature is defined prior to evaluating the root
feature.

As a result of this commit, the SUIDManager now calls the win32
sys/admin version of the Process.uid method, which returns the RID
component of the user's SID. As this is not 0, Puppet.features.root?
will now always return false on Windows. A future commit will fix
this, so that Puppet.feature.root? only returns true when running as
the Windows-equivalent of root.
</pre>
</div>
</content>
</entry>
</feed>
