rouster 0.57 → 0.61

Sign up to get free protection for your applications and to get access to all the features.
@@ -30,7 +30,17 @@ class TestDeltasGetPackages < Test::Unit::TestCase
30
30
 
31
31
  res.each_key do |k|
32
32
  assert_not_nil(res[k])
33
- assert_match(/^\d+/, res[k]) # start with a number
33
+
34
+ if res[k].is_a?(Array)
35
+ res[k].each do |l|
36
+ assert(l.has_key?(:arch))
37
+ assert(l.has_key?(:version))
38
+ end
39
+ else
40
+ assert(res[k].has_key?(:arch))
41
+ assert(res[k].has_key?(:version))
42
+ end
43
+
34
44
  end
35
45
 
36
46
  end
@@ -55,11 +65,12 @@ class TestDeltasGetPackages < Test::Unit::TestCase
55
65
  res = @app.get_packages(true, false)
56
66
  end
57
67
 
58
- res.each_key do |k|
59
- assert_not_nil(res[k])
60
-
61
- #assert_match(/\d*\..*/, res[k]) # testing the regular expression used in deltas.rb itself
62
- assert_match(/\?/, res[k])
68
+ # RHEL processing doesn't do anything different in deep/not-deep calls
69
+ if ! (@app.os_type.eql?(:redhat) or @app.os_type.eql?(:ubuntu))
70
+ res.each_key do |k|
71
+ assert_not_nil(res[k])
72
+ assert_match(/\?/, res[k][:arch])
73
+ end
63
74
  end
64
75
 
65
76
  end
@@ -87,6 +98,39 @@ class TestDeltasGetPackages < Test::Unit::TestCase
87
98
 
88
99
  end
89
100
 
101
+ def test_arch_determination
102
+ after, install = nil, nil
103
+
104
+ if @app.os_type.eql?(:redhat)
105
+ packages = [ 'glibc.x86_64', 'glibc.i686' ]
106
+ install = @app.run(sprintf('yum install -y %s', packages.join(' '))) # TODO these are already in the base, but just to be safe
107
+ after = @app.get_packages(false, false)
108
+
109
+ assert(after.has_key?('glibc'))
110
+ assert(after['glibc'].is_a?(Array))
111
+ assert_equal(after['glibc'].length, 2)
112
+ assert_not_equal(after['glibc'][0][:arch], after['glibc'][1][:arch])
113
+ elsif @app.os_type.eql?(:ubuntu)
114
+ packages = @app.get_packages(false, false)
115
+
116
+ assert(packages.has_key?('xml-core'))
117
+ assert(packages.has_key?('whiptail'))
118
+ assert(packages['xml-core'].has_key?(:version))
119
+ assert(packages['whiptail'].has_key?(:version))
120
+
121
+ assert_equal(packages['xml-core'][:arch], 'all')
122
+ assert_equal(packages['whiptail'][:arch], 'amd64')
123
+
124
+ else
125
+ # TODO should throw a flag here..
126
+ assert_nothing_raised do
127
+ @app.get_packages(false, true)
128
+ @app.get_packages(false, false)
129
+ end
130
+ end
131
+
132
+ end
133
+
90
134
  def teardown
91
135
  @app = nil
92
136
  end
@@ -75,10 +75,10 @@ class TestCaching < Test::Unit::TestCase
75
75
 
76
76
  def test_ssh_caching
77
77
 
78
- skip('see comments in rouster.rb line ~84')
79
-
80
78
  timeout = 100
81
79
  app = Rouster.new(:name => 'app', :sshtunnel => true, :cache_timeout => timeout)
80
+ app.destroy() # should be a no-op if running under rake, doing this to be safe
81
+
82
82
  app.up()
83
83
 
84
84
  assert_equal(app.cache_timeout, timeout)
@@ -136,7 +136,7 @@ class TestNew < Test::Unit::TestCase
136
136
  assert_equal('local', @app.name)
137
137
  assert_equal(true, @app.is_passthrough?())
138
138
  assert_equal(false, @app.uses_sudo?())
139
- assert_equal(true, @app.is_available_via_ssh?())
139
+ assert_equal(false, @app.is_available_via_ssh?())
140
140
 
141
141
  end
142
142
 
@@ -145,7 +145,7 @@ class TestNew < Test::Unit::TestCase
145
145
  skip('not running test_good_remote_passthrough, autogenerated a fake ssh key') if File.file?(@@user_sshkey) and File.read(@@user_sshkey).eql?("")
146
146
 
147
147
  host = '127.0.0.1'
148
- `ssh -i #{@@user_sshkey} #{host}`
148
+ `ssh -i #{@@user_sshkey} -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null #{host} exit` # if this succeeds, we want to exit immediately so we don't get hung
149
149
  skip("found an ssh key, but it doesn't appear to be valid for this host") unless $?.success?
150
150
 
151
151
  assert_nothing_raised do
@@ -157,6 +157,7 @@ class TestNew < Test::Unit::TestCase
157
157
  :host => host,
158
158
  :user => ENV['USER'],
159
159
  :key => @@user_sshkey,
160
+ :paranoid => false,
160
161
  },
161
162
  :verbosity => 4,
162
163
  )
@@ -169,6 +170,37 @@ class TestNew < Test::Unit::TestCase
169
170
 
170
171
  end
171
172
 
173
+ def test_paranoia_remote_passthrough
174
+
175
+ skip('not running test_good_remote_passthrough, autogenerated a fake ssh key') if File.file?(@@user_sshkey) and File.read(@@user_sshkey).eql?("")
176
+
177
+ host = '127.0.0.1'
178
+ `ssh -i #{@@user_sshkey} -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null #{host} exit` # if this succeeds, we want to exit immediately so we don't get hung
179
+ skip("found an ssh key, but it doesn't appear to be valid for this host") unless $?.success?
180
+
181
+ assert_nothing_raised do
182
+ @app = Rouster.new(
183
+ :name => 'remote',
184
+ :sudo => false,
185
+ :passthrough => {
186
+ :type => :remote,
187
+ :host => host,
188
+ :user => ENV['USER'],
189
+ :key => @@user_sshkey,
190
+ :paranoid => :very,
191
+ },
192
+ :verbosity => 4,
193
+ )
194
+ end
195
+
196
+ assert_equal('remote', @app.name)
197
+ assert_equal(true, @app.is_passthrough?())
198
+ assert_equal(false, @app.uses_sudo?())
199
+ assert_equal(true, @app.is_available_via_ssh?())
200
+
201
+ end
202
+
203
+
172
204
  def test_invalid_passthrough
173
205
 
174
206
  # invalid type
@@ -223,7 +255,6 @@ class TestNew < Test::Unit::TestCase
223
255
  end
224
256
 
225
257
  # host that DNE
226
- # TODO should we be catching this ourselves?
227
258
  assert_raise SocketError do
228
259
  @app = Rouster.new(
229
260
  :name => 'fizzy',
@@ -232,13 +263,18 @@ class TestNew < Test::Unit::TestCase
232
263
  :key => @@user_sshkey,
233
264
  :user => 'foo',
234
265
  :host => 'this.host.does.not.exist',
266
+
267
+ # don't retry.. too much
268
+ :ssh_sleep_ceiling => 1,
269
+ :ssh_sleep_time => 1,
235
270
  },
271
+
272
+ :sshtunnel => true,
236
273
  :verbosity => 4,
237
274
  )
238
275
  end
239
276
 
240
277
  # IP that doesn't resolve
241
- # TODO should we be catching this ourselves?
242
278
  assert_raise SocketError do
243
279
  @app = Rouster.new(
244
280
  :name => 'fizzy',
@@ -247,7 +283,12 @@ class TestNew < Test::Unit::TestCase
247
283
  :key => @@user_sshkey,
248
284
  :user => 'foo',
249
285
  :host => '255.256.257.258',
286
+
287
+ :ssh_sleep_ceiling => 1,
288
+ :ssh_sleep_time => 1,
250
289
  },
290
+
291
+ :sshtunnel => true,
251
292
  :verbosity => 4,
252
293
  )
253
294
  end
@@ -30,7 +30,7 @@ class TestPassthroughs < Test::Unit::TestCase
30
30
  end
31
31
 
32
32
  assert(@local.is_passthrough?(), 'worker is a passthrough')
33
- assert(@local.is_available_via_ssh?(), 'worker is available via SSH')
33
+ assert_equal(false, @local.is_available_via_ssh?(), 'worker is available via SSH')
34
34
 
35
35
  # put a file in /tmp/fizz and read it back
36
36
  tmpfile = sprintf('/tmp/fizzy.%s.%s', Time.now.to_i, $$)
@@ -57,7 +57,7 @@ class TestPassthroughs < Test::Unit::TestCase
57
57
  skip('not running test_good_remote_passthrough, autogenerated a fake ssh key') if File.file?(@@user_sshkey) and File.read(@@user_sshkey).eql?("")
58
58
 
59
59
  host = '127.0.0.1'
60
- `ssh -i #{@@user_sshkey} #{host}`
60
+ `ssh -i #{@@user_sshkey} -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null #{host} exit`
61
61
  skip("found an ssh key, but it doesn't appear to be valid for this host") unless $?.success?
62
62
 
63
63
  assert_nothing_raised do
@@ -88,7 +88,7 @@ class TestPuppetApply < Test::Unit::TestCase
88
88
 
89
89
  app_expected_files = {
90
90
  '/etc/hosts' => {
91
- :contains => [ 'localhost', 'app' ],
91
+ :contains => [ 'localhost', '127.0.0.1' ],
92
92
  :ensure => 'present',
93
93
  :group => 'root',
94
94
  :owner => 'root',
@@ -47,6 +47,71 @@ class TestNew < Test::Unit::TestCase
47
47
 
48
48
  end
49
49
 
50
+
51
+ def test_default_overrides_aws_passthrough
52
+
53
+ key = sprintf('%s/.ssh/id_rsa', ENV['HOME'])
54
+ skip(sprintf('no suitable private key found at [%s]', key)) unless File.file?(key)
55
+
56
+ @app = Rouster.new(
57
+ :name => 'aws',
58
+ :passthrough => {
59
+ :type => :aws,
60
+ :ami => 'ami-1234',
61
+ :keypair => 'you@aws',
62
+ :key => key,
63
+ :key_id => 'key',
64
+ :secret_key => 'secret_access_key',
65
+
66
+ # aws specific overrides
67
+ :region => 'us-east-2',
68
+ :user => 'cloud-user',
69
+
70
+ # generic passthrough overrides
71
+ :ssh_sleep_ceiling => 1,
72
+ :ssh_sleep_time => 1,
73
+ },
74
+
75
+ :unittest => true,
76
+ )
77
+
78
+ passthrough = @app.passthrough
79
+
80
+ assert_equal('us-east-2', passthrough[:region])
81
+ assert_equal('cloud-user', passthrough[:user])
82
+ assert_equal(1, passthrough[:ssh_sleep_ceiling])
83
+ assert_equal(1, passthrough[:ssh_sleep_time])
84
+
85
+ assert_not_nil(passthrough[:ami])
86
+ assert_not_nil(passthrough[:key_id])
87
+ assert_not_nil(passthrough[:min_count])
88
+ assert_not_nil(passthrough[:max_count])
89
+ assert_not_nil(passthrough[:size])
90
+ assert_not_nil(passthrough[:ssh_port])
91
+
92
+ end
93
+
94
+ def test_default_overrides_passthrough
95
+
96
+ @app = Rouster.new(
97
+ :name => 'local',
98
+ :passthrough => {
99
+ :type => :local,
100
+ :paranoid => :secure,
101
+ :ssh_sleep_ceiling => 100,
102
+ },
103
+
104
+ :unittest => true,
105
+ )
106
+
107
+ passthrough = @app.passthrough
108
+
109
+ assert_equal(:secure, passthrough[:paranoid])
110
+ assert_equal(100, passthrough[:ssh_sleep_ceiling])
111
+ assert_not_equal(100, passthrough[:ssh_sleep_time])
112
+ end
113
+
114
+
50
115
  def teardown
51
116
  # noop
52
117
  end
@@ -0,0 +1,285 @@
1
+ PID Status Label
2
+ - 0 com.apple.cfpreferences-xpcservice
3
+ - 0 com.apple.qtkitserver
4
+ - 0 com.apple.cmio.registerassistantservice
5
+ - 0 com.apple.DataDetectors.DataDetectorsActionService
6
+ - 0 com.apple.security.XPCKeychainSandboxCheck
7
+ - 0 com.apple.security.XPCTimeStampingService
8
+ 1 - 0x7fd7e963fa00.anonymous.launchd
9
+ 475 - 0x7fd7e963f700.anonymous.launchd
10
+ 1867 - 0x7fd7e963f400.anonymous.lsboxd
11
+ - 0 com.apple.AppSandboxSMLoginItemEnabler
12
+ - 0 com.apple.XType.FontHelper
13
+ - 0 com.apple.hiservices-xpcservice
14
+ 1 - 0x7fd7eb115060.anonymous.launchd
15
+ 68 - 0x7fd7eb102ea0.anonymous.mds
16
+ 1 - 0x7fd7e94135b0.anonymous.launchd
17
+ 1793 - 0x7fd7e94132b0.anonymous.launchd
18
+ 1796 - 0x7fd7e9412fb0.anonymous.distnoted
19
+ - 0 com.apple.security.pboxd
20
+ - 0 com.apple.audio.SandboxHelper
21
+ - 0 com.apple.appkit.xpc.sandboxedServiceRunner
22
+ - 0 com.apple.audio.InfoHelper
23
+ - 0 com.apple.automator.xpc.workflowServiceRunner
24
+ - 0 com.apple.audio.ComponentHelper
25
+ 1 - 0x7fd7eb115680.anonymous.launchd
26
+ 475 - 0x7fd7eb115380.anonymous.launchd
27
+ 1385 - 0x7fd7eb114bb0.anonymous.storeagent
28
+ 1 - 0x7fd7eb007700.anonymous.launchd
29
+ 475 - 0x7fd7eb007400.anonymous.launchd
30
+ 1374 - 0x7fd7eb007100.anonymous.Dash
31
+ - 0 com.apple.HasTRB
32
+ 1 - 0x7fd7eb110a20.anonymous.launchd
33
+ 475 - 0x7fd7eb110720.anonymous.launchd
34
+ 1341 - 0x7fd7eb105ce0.anonymous.mdmclient
35
+ 1 - 0x7fd7e94107b0.anonymous.launchd
36
+ 475 - 0x7fd7e94104b0.anonymous.launchd
37
+ 1343 - 0x7fd7e940bd10.anonymous.imagent
38
+ 1 - 0x7fd7e940c9a0.anonymous.launchd
39
+ 475 - 0x7fd7e940c6a0.anonymous.launchd
40
+ 529 - 0x7fd7e940c300.anonymous.Activity Monito
41
+ 1 - 0x7fd7eb1031a0.anonymous.launchd
42
+ 1031 - 0x7fd7eb110410.anonymous.filecoordinatio
43
+ 1 - 0x7fd7eb10d7e0.anonymous.launchd
44
+ 1014 - 0x7fd7eb10d4e0.anonymous.netbiosd
45
+ - 0 com.apple.coremedia.videodecoder
46
+ - 0 com.apple.imagekit.xpc.sendapplescriptservice
47
+ - 0 com.apple.SceneKit.C3DColladaResourcesCoordinator
48
+ - 0 com.apple.PDFKit.PDFFileRefsValidator
49
+ 1 - 0x7fd7eb107e00.anonymous.launchd
50
+ 475 - 0x7fd7eb102880.anonymous.launchd
51
+ 522 - 0x7fd7eb102570.anonymous.TextWrangler
52
+ 1 - 0x7fd7e9639e30.anonymous.launchd
53
+ 544 - 0x7fd7e963a130.anonymous.com.apple.dock.
54
+ 1 - 0x7fd7e9634cc0.anonymous.launchd
55
+ 475 - 0x7fd7e96349c0.anonymous.launchd
56
+ 534 - 0x7fd7e96346c0.anonymous.Finder
57
+ 1 - 0x7fd7e9407eb0.anonymous.launchd
58
+ 475 - 0x7fd7e9407bb0.anonymous.launchd
59
+ 532 - 0x7fd7e94078b0.anonymous.talagent
60
+ - 0 com.apple.dock.ecti
61
+ 544 - com.apple.dock.extra
62
+ 1 - 0x7fd7e9630d80.anonymous.launchd
63
+ 475 - 0x7fd7e9630a80.anonymous.launchd
64
+ 531 - 0x7fd7e9630780.anonymous.Dock
65
+ 1 - 0x7fd7eb001800.anonymous.launchd
66
+ 475 - 0x7fd7eb001500.anonymous.launchd
67
+ 480 - 0x7fd7eb006e00.anonymous.distnoted
68
+ 1 - 0x7fd7e961afc0.anonymous.launchd
69
+ 71 - 0x7fd7e9618920.anonymous.loginwindow
70
+ 1 - 0x7fd7e94025d0.anonymous.launchd
71
+ 69 - 0x7fd7e9402220.anonymous.mdmclient
72
+ 10613 - 0x7fd7e9410ab0.anonymous.sudo
73
+ 10614 - 0x7fd7e94081b0.anonymous.launchctl
74
+ 517 - 0x7fd7eb11c590.anonymous.Terminal
75
+ 540 - 0x7fd7eb11c290.anonymous.login
76
+ 541 - 0x7fd7eb11bf90.anonymous.bash
77
+ 3309 - 0x7fd7eb11bc90.anonymous.screen
78
+ 3310 - 0x7fd7eb1195f0.anonymous.screen
79
+ 3486 - 0x7fd7eb106f00.anonymous.login
80
+ 3499 - 0x7fd7eb110d20.anonymous.bash
81
+ - 0 com.apple.locum.0F2CBFAC-B361-4962-81A1-B8576190F39F
82
+ - 0 com.apple.xpchelper.59000000-0000-0000-0000-000000000000
83
+ 1793 - com.apple.launchd.peruser.89
84
+ - 0 com.apple.launchd.peruser.92
85
+ - 0 com.apple.launchd.peruser.4294967294
86
+ - 0 com.apple.launchd.peruser.222
87
+ - 0 com.apple.xpchelper.DE000000-0000-0000-0000-000000000000
88
+ 544 - 0x7fd7e9639b30.anonymous.com.apple.dock.
89
+ 510 - 0x7fd7e94075a0.anonymous.eapolclient
90
+ - 0 com.apple.xpchelper.6EE3F24B-0000-0000-0000-000000000000
91
+ 475 - com.apple.launchd.peruser.1274209134
92
+ - 0 com.apple.launchd.peruser.212
93
+ - 0 com.apple.SecurityAgent.00000000-0000-0000-0000-0000000186A4
94
+ - 0 com.apple.authorizationhost.00000000-0000-0000-0000-0000000186A4
95
+ 346 - 0x7fd7eb106c00.anonymous.ruby
96
+ 299 - 0x7fd7eb108100.anonymous.iCoreService
97
+ 1 - 0x7fd7eb107b00.anonymous.launchd
98
+ 303 - 0x7fd7eb107500.anonymous.iCorePluginMgr
99
+ - 0 com.apple.launchd.peruser.0
100
+ - 0 com.apple.xpchelper.00000000-0000-0000-0000-000000000000
101
+ - 0 com.openssh.sshd
102
+ - 0 com.apple.screensharing
103
+ - 0 com.apple.msrpc.wkssvc
104
+ - 0 com.apple.msrpc.srvsvc
105
+ - 0 com.apple.msrpc.netlogon
106
+ - 0 com.apple.msrpc.mdssvc
107
+ - 0 com.apple.msrpc.lsarpc
108
+ - 0 org.x.privileged_startx
109
+ - 0 org.postfix.master
110
+ 52 - org.ntp.ntpd
111
+ 53 - org.cups.cupsd
112
+ - 0 com.vix.cron
113
+ - 0 com.apple.xserve.serial-ports
114
+ - 0 com.apple.xprotectupdater-init
115
+ - 252 com.apple.xprotectupdater
116
+ - 0 com.apple.xpchelper
117
+ 375 - com.apple.WindowServer
118
+ - 0 com.apple.webdavfs_load_kext
119
+ - 0 com.apple.warmd
120
+ - 0 com.apple.vsdbutil
121
+ - 0 com.apple.var-db-shadow-backup
122
+ - 0 com.apple.var-db-dslocal-backup
123
+ - 0 com.apple.UserNotificationCenter
124
+ 11 - com.apple.UserEventAgent-System
125
+ 57 - com.apple.usbmuxd
126
+ - 0 com.apple.unmountassistant.sysagent
127
+ - 0 com.apple.uninstalld
128
+ - 0 com.apple.ucupdate.plist
129
+ - 0 com.apple.TrustEvaluationAgent.system
130
+ - 0 com.apple.taskgated
131
+ - 0 com.apple.taskgated-helper
132
+ 59 - com.apple.SystemStarter
133
+ - 0 com.apple.systempreferences.writeconfig
134
+ - 0 com.apple.systempreferences.install
135
+ - 0 com.apple.systemkeychain
136
+ 17 - com.apple.syslogd
137
+ - 0 com.apple.suhelperd
138
+ - 0 com.apple.storereceiptinstaller
139
+ - 0 com.apple.storeagent
140
+ - 0 com.apple.store_helper
141
+ - 0 com.apple.statd.notify
142
+ 61 - com.apple.stackshot
143
+ - 0 com.apple.spindump_symbolicator
144
+ - 0 com.apple.spindump
145
+ - 0 com.apple.smbfs_load_kext
146
+ - 0 com.apple.smb.preferences
147
+ - 0 com.apple.shutdown_monitor
148
+ - 0 com.apple.ServerPerfLog.aslmanager
149
+ 22 - com.apple.securityd
150
+ - 0 com.apple.SecurityAgent
151
+ - 0 com.apple.security.syspolicy
152
+ - 0 com.apple.scsid
153
+ - 0 com.apple.SCHelper
154
+ - 0 com.apple.sandboxd
155
+ - 0 com.apple.rpmuxd
156
+ - 0 com.apple.rpcbind
157
+ - 0 com.apple.RFBEventHelper
158
+ 64 - com.apple.revisiond
159
+ - 0 com.apple.ReportCrash.Root
160
+ - 0 com.apple.RemoteDesktop.PrivilegeProxy
161
+ - 0 com.apple.racoon
162
+ - 0 com.apple.printtool.daemon
163
+ - 0 com.apple.preferences.timezone.auto
164
+ - 0 com.apple.preferences.timezone.admintool
165
+ 18 - com.apple.powerd
166
+ - 0 com.apple.platform.ptmd
167
+ - 0 com.apple.pfctl
168
+ - 0 com.apple.periodic-weekly
169
+ - 0 com.apple.periodic-monthly
170
+ - 0 com.apple.periodic-daily
171
+ - 0 com.apple.PCIELaneConfigTool
172
+ - 0 com.apple.pcastagentconfigd
173
+ 14 - com.apple.opendirectoryd
174
+ 402 - com.apple.ocspd
175
+ 12 - com.apple.notifyd
176
+ - 0 com.apple.nis.ypbind
177
+ - 0 com.apple.nfsd
178
+ - 0 com.apple.newsyslog
179
+ - 0 com.apple.nlcd
180
+ 1014 - com.apple.netbiosd
181
+ - 0 com.apple.netauth.sys.gui
182
+ - 0 com.apple.netauth.sys.auth
183
+ - 0 com.apple.metadata.mds.spindump
184
+ - 0 com.apple.metadata.mds.scan
185
+ 68 - com.apple.metadata.mds
186
+ - 0 com.apple.mDNSResponderHelper
187
+ 13 - com.apple.mDNSResponder
188
+ 69 - com.apple.mdmclient.daemon
189
+ - 0 com.apple.ManagedClient
190
+ 71 - com.apple.loginwindow
191
+ 446 - com.apple.logind
192
+ - 0 com.apple.locum
193
+ - 0 com.apple.lockd
194
+ - 0 com.apple.locationd
195
+ - 0 com.apple.locate
196
+ - 0 com.apple.kuncd
197
+ 10 - com.apple.kextd
198
+ 73 - com.apple.KernelEventAgent
199
+ - 0 com.apple.Kerberos.kpasswdd
200
+ 74 - com.apple.Kerberos.kdc
201
+ - 0 com.apple.Kerberos.kcm
202
+ - 0 com.apple.Kerberos.kadmind
203
+ - 0 com.apple.Kerberos.digest-service
204
+ - 0 com.apple.kcproxy
205
+ - 0 com.apple.installd
206
+ - 0 com.apple.IFCStart
207
+ 76 - com.apple.hidd
208
+ - 0 com.apple.hdiejectd
209
+ - 0 com.apple.gssd
210
+ 20 - com.apple.fseventsd
211
+ - 0 com.apple.FontWorker
212
+ - 0 com.apple.fontmover
213
+ - 0 com.apple.fontd
214
+ - 0 com.apple.findmymacmessenger
215
+ - 0 com.apple.findmymacd
216
+ 1031 - com.apple.FileCoordination
217
+ 453 - com.apple.familycontrols
218
+ - 0 com.apple.efilogin-helper
219
+ - 0 com.apple.eapolcfg_auth
220
+ 78 - com.apple.dynamic_pager
221
+ - 0 com.apple.dvdplayback.setregion
222
+ - 0 com.apple.DumpPanic
223
+ - 0 com.apple.DumpGPURestart
224
+ - 0 com.apple.dspluginhelperd
225
+ - 0 com.apple.dpd
226
+ 19 - com.apple.distnoted.xpc.daemon
227
+ - 0 com.apple.diskmanagementd
228
+ 15 - com.apple.diskarbitrationd
229
+ - 0 com.apple.DiagnosticReportCleanUp
230
+ 436 - com.apple.cvmsServ
231
+ - 0 com.apple.corestorage.corestoragehelperd
232
+ - 0 com.apple.corestorage.corestoraged
233
+ 27 - com.apple.coreservicesd
234
+ - 0 com.apple.coreservices.appleid.passwordcheck
235
+ - 0 com.apple.CoreRAID
236
+ - 0 com.apple.configureLocalKDC
237
+ 16 - com.apple.configd
238
+ 2814 - com.apple.cmio.VDCAssistant
239
+ - 0 com.apple.cmio.IIDCVideoAssistant
240
+ - 0 com.apple.cmio.AVCAssistant
241
+ - 0 com.apple.bsd.launchdadd
242
+ - 0 com.apple.bsd.dirhelper
243
+ - 0 com.apple.bnepd
244
+ 23 - com.apple.blued
245
+ - 0 com.apple.backupd
246
+ - 0 com.apple.awacsd
247
+ - 0 com.apple.avbdeviced
248
+ - 0 com.apple.automountd
249
+ 83 - com.apple.autofsd
250
+ - 0 com.apple.authorizationhost
251
+ - 0 com.apple.auditd
252
+ 450 - com.apple.audio.coreaudiod
253
+ - 0 com.apple.aslmanager
254
+ - 0 com.apple.applepushserviced
255
+ - 0 com.apple.appleprofilepolicyd
256
+ - 0 com.apple.AOSNotification-FMM
257
+ - 0 com.apple.alf
258
+ - 0 com.apple.airport.updateprefs
259
+ - 0 com.apple.airportd
260
+ - 0 com.apple.AirPort.wps
261
+ - 0 com.apple.afpfs_checkafp
262
+ - 0 com.apple.afpfs_afpLoad
263
+ 1048 - com.apple.ActivityMonitor
264
+ 86 - com.trusteer.rooks.rooksd
265
+ - 0 com.trendmicro.mpm.icore.agent
266
+ 463 - com.snowsoftware.Metering
267
+ - 0 com.snowsoftware.Inventory
268
+ - 0 com.SFDC.CE.WirelessFix
269
+ - 0 com.SFDC.CE.JavaAppletMonitor
270
+ - 0 com.oracle.java.Helper-Tool
271
+ - 0 com.nomachine.server
272
+ - 0 com.microsoft.office.licensing.helper
273
+ - 1 com.leapmotion.leapd
274
+ - 0 com.jamfsoftware.task.Every 30 Minutes
275
+ 94 - com.jamfsoftware.jamf.daemon
276
+ 95 - com.GSI.Servlet
277
+ - 0 com.google.keystone.daemon
278
+ 96 - com.crashplan.engine
279
+ 97 - com.cisco.anyconnect.vpnagentd
280
+ 98 - com.checkpoint.launchd.ppcd
281
+ 99 - com.bjango.istatmenusdaemon
282
+ - 0 com.apple.RemotePairTool
283
+ - 0 com.adobe.fpsaud
284
+ 100 - com.bigfix.BESAgent
285
+ - 0 com.apple.launchctl.System