mirror of
https://github.com/valitydev/salt.git
synced 2024-11-08 17:33:54 +00:00
6ceeea6b62
New methods test if the standard 'run' file in the services folder has the executable bit set. When the 'run' file is not executable, runit will not launch the service on boot. This mimicks the enabled/diabled behavior of other service providers. The file permissions are set to 700 and 600 for enabled and disabled states. Because of the ad-hoc nature that runit service files can sometimes posess, the run files may have passwords or other sensitive information. Therefore, the permissions are hard coded to only be readable by the file owner, who is also the user who runs the process. This brings the runit module more inline with other service providers so when it is used in a state (with provider: runit) more options can be used, like enabled: True |
||
---|---|---|
.. | ||
integration | ||
perf | ||
pkg/rpm | ||
unit | ||
utils | ||
__init__.py | ||
buildpackage.py | ||
committer_parser.py | ||
consist.py | ||
eventlisten.py | ||
eventlisten.sh | ||
jenkins.py | ||
minionswarm.py | ||
modparser.py | ||
packdump.py | ||
runtests.py | ||
salt-tcpdump.py | ||
saltsh.py | ||
wheeltest.py |