![]() For example: foo_cert = Puppet::SSL::('')Īt startup, each indirection is configured with a terminus. These methods are available via the indirection class method on the indirected classes. save(instance) - write the instance to the store, using the instance’s name as the key (mapped to PUT).destroy(key) - remove the key and value (mapped to DELETE).head(key) - return true if the key exists (mapped to HEAD).search(key) - get a list of matching values (mapped to GET with a plural endpoint).find(key) - get a single value (mapped to GET or POST with a singular endpoint).The termini can be local (e.g., on-disk files) or remote (e.g., using a REST interface to talk to a puppet master).Īn indirector has five methods, which are mapped into HTTP verbs for the REST interface: Puppet’s indirector support pluggable backends (termini) for a variety of key-value stores (indirections).Įach indirection type corresponds to a particular Ruby class (the “Indirected Class” below) and values are instances of that class.Įach instance’s key is available from its name method. This page is autogenerated any changes will get overwritten About Indirection Regenerating all certificates in a Puppet deployment.CSR attributes and certificate extensions.External SSL termination with Puppet Server.Using an external CA with Puppet Server.Configuring external certificate authority.Extensions for assigning classes to nodes.Puppet::Transaction::Report object format.User and group tips and examples for Windows.All resource types (single-page reference).Writing functions (legacy Ruby API - avoid).Special features in implementation methods.SSL problems with load-balanced PuppetDB servers (“Server Certificate.Applying metrics to improve performance.Using an external certificate authority.Configuring a Server with Passenger and Apache.Documenting modules with Puppet Strings.Installing and managing modules from the command line.Settings that differ under Puppet Server.Complete list of settings (configuration reference).logback.xml: Logging level and location.nf: Configuring Product-level Interactions (optional). ![]() nf: Authorization by HTTP header (deprecated).ca.conf: CA service access control (deprecated).nf: Mount points for component services.custom_trusted_oid_mapping.yaml: Short names for cert extension OIDs.csr_attributes.yaml: Certificate extensions.Minor upgrades: From Puppet 4 and within Puppet 5.x.File location changes since Puppet 3.8.x.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |