Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Ensure the permissions of a new redis-sentinel.conf #15

Merged
merged 1 commit into from
Jan 6, 2015

Conversation

cdent
Copy link
Contributor

@cdent cdent commented Jan 5, 2015

Without these changes a from-scratch redis-sentinel.conf can be
created that is not writable by the redis user, as such the sentinel
server will exit immediately after starting.

This change ensures the permissions of the *.puppet file and then
preserves those permissions upon copy. Unfortunately the copied-to
file is hard to test in the spec files, so verification in test is
no longer available. It works properly in manual testing.

Without these changes a from-scratch redis-sentinel.conf can be
created that is not writable by the redis user, as such the sentinel
server will exit immediately after starting.

This change ensures the permissions of the *.puppet file and then
preserves those permissions upon copy. Unfortunately the copied-to
file is hard to test in the spec files, so verification in test is
no longer available. It works properly in manual testing.
@cdent
Copy link
Contributor Author

cdent commented Jan 5, 2015

Sorry I didn't realize this in the original pull request @arioch. I guess all my testing was on existing installations. The bug will rarely show up since the distros install a default file in the first place, but in case it has been removed, this is useful to have (it bit me during packstack testing).

@arioch
Copy link
Contributor

arioch commented Jan 6, 2015

Not to worry. 👍

arioch added a commit that referenced this pull request Jan 6, 2015
Ensure the permissions of a new redis-sentinel.conf
@arioch arioch merged commit 6b8d748 into voxpupuli:master Jan 6, 2015
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants