choria-mcorpc-support 2.24.3 → 2.25.2
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/mcollective/agent/aaa_signer.ddl +41 -0
- data/lib/mcollective/agent/aaa_signer.json +46 -0
- data/lib/mcollective/agent/choria_provision.ddl +297 -0
- data/lib/mcollective/agent/choria_provision.json +323 -0
- data/lib/mcollective/agent/choria_registry.ddl +65 -0
- data/lib/mcollective/agent/choria_registry.json +74 -0
- data/lib/mcollective/agent/choria_util.ddl +24 -4
- data/lib/mcollective/agent/choria_util.json +24 -24
- data/lib/mcollective/agent/rpcutil.ddl +242 -183
- data/lib/mcollective/agent/rpcutil.json +53 -56
- data/lib/mcollective/agent/scout.ddl +4 -4
- data/lib/mcollective/agent/scout.json +1 -1
- data/lib/mcollective/discovery/delegate.rb +6 -2
- data/lib/mcollective/util/tasks_support.rb +12 -3
- metadata +14 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 2e44c83c6fb1dada2924b3ea6690f719cee605ad28b2522493732e3dfaababd8
|
4
|
+
data.tar.gz: 1beebfd97274d3065303abd3d29312bf7c018a8f8e9451dbddec0a2d438d969c
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 18863672cd7fbc44a5f07e1b7580d034972da6b318e7bfdd967adaee5671f2700fc8248e9031d65facb8c339f755138c0010d1a2e3da33171692f9fa5e4a63a2
|
7
|
+
data.tar.gz: 29ca2987783e86d7b65d55189b0bc6fffdb433b96eb4bbf28a8a2d5fe427b491dc2abb87374884966bbf4d3379cc15374ad33312181280cf6c29b38389c141b1
|
@@ -0,0 +1,41 @@
|
|
1
|
+
metadata :name => "aaa_signer",
|
2
|
+
:description => "Request Signer for Choria AAA Service",
|
3
|
+
:author => "R.I.Pienaar <rip@devco.net>",
|
4
|
+
:license => "Apache-2.0",
|
5
|
+
:version => "0.24.0",
|
6
|
+
:url => "https://github.com/choria-io/aaasvc",
|
7
|
+
:provider => "golang",
|
8
|
+
:service => true,
|
9
|
+
:timeout => 10
|
10
|
+
|
11
|
+
|
12
|
+
action "sign", :description => "Signs a RPC Request on behalf of a user" do
|
13
|
+
display :always
|
14
|
+
|
15
|
+
input :request,
|
16
|
+
:prompt => "RPC Request",
|
17
|
+
:description => "The request to sign",
|
18
|
+
:type => :string,
|
19
|
+
:validation => :shellsafe,
|
20
|
+
:maxlength => 100240,
|
21
|
+
:optional => false
|
22
|
+
|
23
|
+
|
24
|
+
input :token,
|
25
|
+
:prompt => "JWT Token",
|
26
|
+
:description => "The JWT token authenticating the user",
|
27
|
+
:type => :string,
|
28
|
+
:validation => '.',
|
29
|
+
:maxlength => 10024,
|
30
|
+
:optional => false
|
31
|
+
|
32
|
+
|
33
|
+
|
34
|
+
|
35
|
+
output :secure_request,
|
36
|
+
:description => "The signed Secure Request",
|
37
|
+
:type => "string",
|
38
|
+
:display_as => "Secure Request"
|
39
|
+
|
40
|
+
end
|
41
|
+
|
@@ -0,0 +1,46 @@
|
|
1
|
+
{
|
2
|
+
"$schema": "https://choria.io/schemas/mcorpc/ddl/v1/agent.json",
|
3
|
+
"metadata": {
|
4
|
+
"license": "Apache-2.0",
|
5
|
+
"author": "R.I.Pienaar \u003crip@devco.net\u003e",
|
6
|
+
"timeout": 10,
|
7
|
+
"name": "aaa_signer",
|
8
|
+
"version": "0.24.0",
|
9
|
+
"url": "https://github.com/choria-io/aaasvc",
|
10
|
+
"description": "Request Signer for Choria AAA Service",
|
11
|
+
"provider": "golang",
|
12
|
+
"service": true
|
13
|
+
},
|
14
|
+
"actions": [
|
15
|
+
{
|
16
|
+
"action": "sign",
|
17
|
+
"input": {
|
18
|
+
"request": {
|
19
|
+
"prompt": "RPC Request",
|
20
|
+
"description": "The request to sign",
|
21
|
+
"type": "string",
|
22
|
+
"optional": false,
|
23
|
+
"validation": "shellsafe",
|
24
|
+
"maxlength": 100240
|
25
|
+
},
|
26
|
+
"token": {
|
27
|
+
"prompt": "JWT Token",
|
28
|
+
"description": "The JWT token authenticating the user",
|
29
|
+
"type": "string",
|
30
|
+
"optional": false,
|
31
|
+
"validation": ".",
|
32
|
+
"maxlength": 10024
|
33
|
+
}
|
34
|
+
},
|
35
|
+
"output": {
|
36
|
+
"secure_request": {
|
37
|
+
"description": "The signed Secure Request",
|
38
|
+
"display_as": "Secure Request",
|
39
|
+
"type": "string"
|
40
|
+
}
|
41
|
+
},
|
42
|
+
"display": "always",
|
43
|
+
"description": "Signs a RPC Request on behalf of a user"
|
44
|
+
}
|
45
|
+
]
|
46
|
+
}
|
@@ -0,0 +1,297 @@
|
|
1
|
+
metadata :name => "choria_provision",
|
2
|
+
:description => "Choria Provisioner",
|
3
|
+
:author => "R.I.Pienaar <rip@devco.net>",
|
4
|
+
:license => "Apache-2.0",
|
5
|
+
:version => "0.24.0",
|
6
|
+
:url => "https://choria.io",
|
7
|
+
:timeout => 20
|
8
|
+
|
9
|
+
|
10
|
+
action "configure", :description => "Configure the Choria Server" do
|
11
|
+
display :failed
|
12
|
+
|
13
|
+
input :action_policies,
|
14
|
+
:prompt => "Action Policy Documents",
|
15
|
+
:description => "Map of Action Policy documents indexed by file name",
|
16
|
+
:type => :hash,
|
17
|
+
:optional => true
|
18
|
+
|
19
|
+
|
20
|
+
input :ca,
|
21
|
+
:prompt => "CA Bundle",
|
22
|
+
:description => "PEM text block for the CA",
|
23
|
+
:type => :string,
|
24
|
+
:validation => '^-----BEGIN CERTIFICATE-----',
|
25
|
+
:maxlength => 20480,
|
26
|
+
:optional => true
|
27
|
+
|
28
|
+
|
29
|
+
input :certificate,
|
30
|
+
:prompt => "Certificate",
|
31
|
+
:description => "PEM text block for the certificate",
|
32
|
+
:type => :string,
|
33
|
+
:validation => '^-----BEGIN CERTIFICATE-----',
|
34
|
+
:maxlength => 10240,
|
35
|
+
:optional => true
|
36
|
+
|
37
|
+
|
38
|
+
input :config,
|
39
|
+
:prompt => "Configuration",
|
40
|
+
:description => "The configuration to apply to this node",
|
41
|
+
:type => :string,
|
42
|
+
:validation => '^{.+}$',
|
43
|
+
:maxlength => 2048,
|
44
|
+
:optional => false
|
45
|
+
|
46
|
+
|
47
|
+
input :ecdh_public,
|
48
|
+
:prompt => "ECDH Public Key",
|
49
|
+
:description => "Required when sending a private key",
|
50
|
+
:type => :string,
|
51
|
+
:validation => '.',
|
52
|
+
:maxlength => 64,
|
53
|
+
:optional => true
|
54
|
+
|
55
|
+
|
56
|
+
input :key,
|
57
|
+
:prompt => "PEM text block for the private key",
|
58
|
+
:description => "",
|
59
|
+
:type => :string,
|
60
|
+
:validation => '-----BEGIN RSA PRIVATE KEY-----',
|
61
|
+
:maxlength => 10240,
|
62
|
+
:optional => true
|
63
|
+
|
64
|
+
|
65
|
+
input :opa_policies,
|
66
|
+
:prompt => "Open Policy Agent Policy Documents",
|
67
|
+
:description => "Map of Open Policy Agent Policy documents indexed by file name",
|
68
|
+
:type => :hash,
|
69
|
+
:optional => true
|
70
|
+
|
71
|
+
|
72
|
+
input :ssldir,
|
73
|
+
:prompt => "SSL Dir",
|
74
|
+
:description => "Directory for storing the certificate in",
|
75
|
+
:type => :string,
|
76
|
+
:validation => '.',
|
77
|
+
:maxlength => 500,
|
78
|
+
:optional => true
|
79
|
+
|
80
|
+
|
81
|
+
input :token,
|
82
|
+
:prompt => "Token",
|
83
|
+
:description => "Authentication token to pass to the server",
|
84
|
+
:type => :string,
|
85
|
+
:validation => '.',
|
86
|
+
:maxlength => 128,
|
87
|
+
:optional => true
|
88
|
+
|
89
|
+
|
90
|
+
|
91
|
+
|
92
|
+
output :message,
|
93
|
+
:description => "Status message from the Provisioner",
|
94
|
+
:type => "string",
|
95
|
+
:display_as => "Message"
|
96
|
+
|
97
|
+
end
|
98
|
+
|
99
|
+
action "gencsr", :description => "Request a CSR from the Choria Server" do
|
100
|
+
display :always
|
101
|
+
|
102
|
+
input :C,
|
103
|
+
:prompt => "Country",
|
104
|
+
:description => "Country Code",
|
105
|
+
:type => :string,
|
106
|
+
:validation => '^[A-Z]{2}$',
|
107
|
+
:maxlength => 2,
|
108
|
+
:optional => true
|
109
|
+
|
110
|
+
|
111
|
+
input :L,
|
112
|
+
:prompt => "Locality",
|
113
|
+
:description => "Locality or municipality (such as city or town name)",
|
114
|
+
:type => :string,
|
115
|
+
:validation => '^[\w\s-]+$',
|
116
|
+
:maxlength => 50,
|
117
|
+
:optional => true
|
118
|
+
|
119
|
+
|
120
|
+
input :O,
|
121
|
+
:prompt => "Organization",
|
122
|
+
:description => "Organization",
|
123
|
+
:type => :string,
|
124
|
+
:validation => '^[\w\s-]+$',
|
125
|
+
:maxlength => 50,
|
126
|
+
:optional => true
|
127
|
+
|
128
|
+
|
129
|
+
input :OU,
|
130
|
+
:prompt => "Organizational Unit",
|
131
|
+
:description => "Organizational Unit",
|
132
|
+
:type => :string,
|
133
|
+
:validation => '^[\w\s-]+$',
|
134
|
+
:maxlength => 50,
|
135
|
+
:optional => true
|
136
|
+
|
137
|
+
|
138
|
+
input :ST,
|
139
|
+
:prompt => "State",
|
140
|
+
:description => "State",
|
141
|
+
:type => :string,
|
142
|
+
:validation => '^[\w\s-]+$',
|
143
|
+
:maxlength => 50,
|
144
|
+
:optional => true
|
145
|
+
|
146
|
+
|
147
|
+
input :cn,
|
148
|
+
:prompt => "Common Name",
|
149
|
+
:description => "The certificate Common Name to place in the CSR",
|
150
|
+
:type => :string,
|
151
|
+
:validation => '^(([a-zA-Z0-9]|[a-zA-Z0-9][a-zA-Z0-9-]*[a-zA-Z0-9]).)*([A-Za-z0-9]|[A-Za-z0-9][A-Za-z0-9-]*[A-Za-z0-9])$',
|
152
|
+
:maxlength => 80,
|
153
|
+
:optional => true
|
154
|
+
|
155
|
+
|
156
|
+
input :token,
|
157
|
+
:prompt => "Token",
|
158
|
+
:description => "Authentication token to pass to the server",
|
159
|
+
:type => :string,
|
160
|
+
:validation => '.',
|
161
|
+
:maxlength => 128,
|
162
|
+
:optional => true
|
163
|
+
|
164
|
+
|
165
|
+
|
166
|
+
|
167
|
+
output :csr,
|
168
|
+
:description => "PEM text block for the CSR",
|
169
|
+
:type => "string",
|
170
|
+
:display_as => "CSR"
|
171
|
+
|
172
|
+
output :public_key,
|
173
|
+
:description => "PEM text block of the public key that made the CSR",
|
174
|
+
:type => "string",
|
175
|
+
:display_as => "Public Key"
|
176
|
+
|
177
|
+
output :ssldir,
|
178
|
+
:description => "SSL directory as determined by the server",
|
179
|
+
:type => "string",
|
180
|
+
:display_as => "SSL Dir"
|
181
|
+
|
182
|
+
end
|
183
|
+
|
184
|
+
action "release_update", :description => "Performs an in-place binary update and restarts Choria" do
|
185
|
+
display :always
|
186
|
+
|
187
|
+
input :repository,
|
188
|
+
:prompt => "Repository URL",
|
189
|
+
:description => "HTTP(S) server hosting the update repository",
|
190
|
+
:type => :string,
|
191
|
+
:validation => '^http(s*)://',
|
192
|
+
:maxlength => 512,
|
193
|
+
:optional => false
|
194
|
+
|
195
|
+
|
196
|
+
input :token,
|
197
|
+
:prompt => "Token",
|
198
|
+
:description => "Authentication token to pass to the server",
|
199
|
+
:type => :string,
|
200
|
+
:validation => '.',
|
201
|
+
:maxlength => 128,
|
202
|
+
:optional => true
|
203
|
+
|
204
|
+
|
205
|
+
input :version,
|
206
|
+
:prompt => "Version to update to",
|
207
|
+
:description => "Package version to update to",
|
208
|
+
:type => :string,
|
209
|
+
:validation => '.+',
|
210
|
+
:maxlength => 32,
|
211
|
+
:optional => false
|
212
|
+
|
213
|
+
|
214
|
+
|
215
|
+
|
216
|
+
output :message,
|
217
|
+
:description => "Status message from the Provisioner",
|
218
|
+
:type => "string",
|
219
|
+
:display_as => "Message"
|
220
|
+
|
221
|
+
end
|
222
|
+
|
223
|
+
action "jwt", :description => "Re-enable provision mode in a running Choria Server" do
|
224
|
+
display :always
|
225
|
+
|
226
|
+
input :token,
|
227
|
+
:prompt => "Token",
|
228
|
+
:description => "Authentication token to pass to the server",
|
229
|
+
:type => :string,
|
230
|
+
:validation => '.',
|
231
|
+
:maxlength => 128,
|
232
|
+
:optional => true
|
233
|
+
|
234
|
+
|
235
|
+
|
236
|
+
|
237
|
+
output :ecdh_public,
|
238
|
+
:description => "The ECDH public key for calculating shared secrets",
|
239
|
+
:type => "string",
|
240
|
+
:display_as => "ECDH Public Key"
|
241
|
+
|
242
|
+
output :jwt,
|
243
|
+
:description => "The contents of the JWT token",
|
244
|
+
:type => "string",
|
245
|
+
:display_as => "JWT Token"
|
246
|
+
|
247
|
+
end
|
248
|
+
|
249
|
+
action "reprovision", :description => "Reenable provision mode in a running Choria Server" do
|
250
|
+
display :always
|
251
|
+
|
252
|
+
input :token,
|
253
|
+
:prompt => "Token",
|
254
|
+
:description => "Authentication token to pass to the server",
|
255
|
+
:type => :string,
|
256
|
+
:validation => '.',
|
257
|
+
:maxlength => 128,
|
258
|
+
:optional => true
|
259
|
+
|
260
|
+
|
261
|
+
|
262
|
+
|
263
|
+
output :message,
|
264
|
+
:description => "Status message from the Provisioner",
|
265
|
+
:type => "string",
|
266
|
+
:display_as => "Message"
|
267
|
+
|
268
|
+
end
|
269
|
+
|
270
|
+
action "restart", :description => "Restart the Choria Server" do
|
271
|
+
display :failed
|
272
|
+
|
273
|
+
input :splay,
|
274
|
+
:prompt => "Splay time",
|
275
|
+
:description => "The configuration to apply to this node",
|
276
|
+
:type => :number,
|
277
|
+
:optional => true
|
278
|
+
|
279
|
+
|
280
|
+
input :token,
|
281
|
+
:prompt => "Token",
|
282
|
+
:description => "Authentication token to pass to the server",
|
283
|
+
:type => :string,
|
284
|
+
:validation => '.',
|
285
|
+
:maxlength => 128,
|
286
|
+
:optional => true
|
287
|
+
|
288
|
+
|
289
|
+
|
290
|
+
|
291
|
+
output :message,
|
292
|
+
:description => "Status message from the Provisioner",
|
293
|
+
:type => "string",
|
294
|
+
:display_as => "Message"
|
295
|
+
|
296
|
+
end
|
297
|
+
|