Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering 2020
DOI: 10.1145/3377811.3380384
|View full text |Cite
|
Sign up to set email alerts
|

Practical fault detection in puppet programs

Abstract: Puppet is a popular computer system configuration management tool. By providing abstractions that model system resources it allows administrators to set up computer systems in a reliable, predictable, and documented fashion. Its use suffers from two potential pitfalls. First, if ordering constraints are not correctly specified whenever a Puppet resource depends on another, the nondeterministic application of resources can lead to race conditions and consequent failures. Second, if a service is not tied to its … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 28 publications
0
11
0
Order By: Relevance
“…Schwarz et al [24] picked smells from the catalog proposed by Sharma et al [26] and convert them into detection rules for Foodcritic, a static code analysis tool designed for Chef. Sotiropoulos et al [27] propose a tool for detecting faults regarding ordering violations and notifiers in Puppet scripts. Lepillet et al [10] propose Häyä, a tool that uses dataflow graph analysis to detect intra-update sniping vulnerabilities in CloudFormation templates.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Schwarz et al [24] picked smells from the catalog proposed by Sharma et al [26] and convert them into detection rules for Foodcritic, a static code analysis tool designed for Chef. Sotiropoulos et al [27] propose a tool for detecting faults regarding ordering violations and notifiers in Puppet scripts. Lepillet et al [10] propose Häyä, a tool that uses dataflow graph analysis to detect intra-update sniping vulnerabilities in CloudFormation templates.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, some analysis tools for IaC use intermediate representations [6,25,27] to describe file-system manipulations done by IaC scripts. Shambaugh et al [25] translated IaC scripts to the intermediate representation by mapping types of resources to their filesystem operations.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…A number of IaC-related works have published their evaluation datasets [3], [4], [8]- [10]. However, these datasets only contain a relatively low number of projects, and consist of mostly analysis results.…”
Section: Related Datasetsmentioning
confidence: 99%