Issue #3176 has been updated by John Warburton.

This functionality would be great. For now, I have to use a set of execs. 

I already use Solaris RBAC functionality in puppet to allow the puppet user to 
run web servers etc and listen on ports < 1024

    user {'puppet':
        keys       => 'defaultpriv=basic,net_privaddr',
    }

The use case above is to set cap_net_raw on /usr/sbin/tcpdump, ensure 
pam_cap.so is included in /etc/pam.d and add an entry for user's to inherit 
this capability in /etc/security/capability.conf:

    cap_net_raw  userX


See [Chris Friedhoff's POSIX Capabilities 
Page](http://www.friedhoff.org/posixfilecaps.html#Examples%20-%20Types%20of%20usage%20of%20POSIX%20Capabilities%20-%20Different%20privilege%20levels%20for%20different%20user%20rolls%20-%20Intro)
 for an excellent writeup
----------------------------------------
Feature #3176: Extend the File type to manage filesystem capabilities
https://projects.puppetlabs.com/issues/3176

Author: Andrew Pollock
Status: Accepted
Priority: Normal
Assignee: 
Category: file
Target version: 
Affected Puppet version: 0.25.4
Keywords: 
Branch: 


It's starting to sound like Linux's capabilities are going to be the next Big 
Thing. Puppet should be able to enforce various capabilities on files.

I imagine something like

file "/usr/sbin/tcpdump": {
  capabilities => [ "CAP_NET_RAW" ],
}

which would do the equivalent of running 
  setcap cap_net_raw=ep /usr/sbin/tcpdump

I don't see evidence of Ruby bindings for libcap2 at this time. See 
capabilities(7) for more information.


-- 
You have received this notification because you have either subscribed to it, 
or are involved in it.
To change your notification preferences, please click here: 
http://projects.puppetlabs.com/my/account

-- 
You received this message because you are subscribed to the Google Groups 
"Puppet Bugs" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/puppet-bugs?hl=en.

Reply via email to