Issue #10365 has been reported by Josh Cooper.

----------------------------------------
Bug #10365: Puppet sets executable bit when it shouldn't
https://projects.puppetlabs.com/issues/10365

Author: Josh Cooper
Status: Accepted
Priority: Normal
Assignee: 
Category: file
Target version: 
Affected Puppet version: 0.23.0
Keywords: 
Branch: 


If an executable directory exists, and puppet forcibly overwrites it with a 
file that is not supposed to be executable, puppet will make the file 
executable. This has been broken as far back as 0.23.0, through 2.7.6. 
Fortunately, puppet makes the file not executable the next time it runs.

<pre>
#!/bin/sh

rm -rf /tmp/overwriteme

mkdir /tmp/overwriteme
chmod 777 /tmp/overwriteme

puppet apply <<-EOF
file { "/tmp/overwriteme":
  ensure => file,
  mode => 0666,
  backup => false,
  force => true
}
EOF
stat -l /tmp/overwriteme

puppet apply <<-EOF
file { "/tmp/overwriteme":
  ensure => file,
  mode => 0666,
  backup => false,
  force => true
}
EOF
stat -l /tmp/overwriteme
</pre>


-- 
You have received this notification because you have either subscribed to it, 
or are involved in it.
To change your notification preferences, please click here: 
http://projects.puppetlabs.com/my/account

-- 
You received this message because you are subscribed to the Google Groups 
"Puppet Bugs" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/puppet-bugs?hl=en.

Reply via email to