puppet 5.0.0-x64-mingw32 → 5.0.1-x64-mingw32
Sign up to get free protection for your applications and to get access to all the features.
Potentially problematic release.
This version of puppet might be problematic. Click here for more details.
- checksums.yaml +7 -0
- data/README.md +1 -1
- data/ext/puppet-test +1 -1
- data/lib/puppet.rb +3 -1
- data/lib/puppet/application/lookup.rb +2 -2
- data/lib/puppet/defaults.rb +1 -1
- data/lib/puppet/face/epp.rb +26 -24
- data/lib/puppet/face/module/search.rb +1 -1
- data/lib/puppet/forge.rb +3 -2
- data/lib/puppet/functions/each.rb +1 -1
- data/lib/puppet/functions/filter.rb +1 -1
- data/lib/puppet/module.rb +28 -1
- data/lib/puppet/module_tool.rb +2 -2
- data/lib/puppet/module_tool/applications/installer.rb +5 -5
- data/lib/puppet/module_tool/applications/uninstaller.rb +1 -1
- data/lib/puppet/module_tool/applications/upgrader.rb +5 -5
- data/lib/puppet/module_tool/shared_behaviors.rb +2 -2
- data/lib/puppet/parser/compiler.rb +4 -0
- data/lib/puppet/parser/functions/assert_type.rb +1 -1
- data/lib/puppet/parser/functions/binary_file.rb +1 -1
- data/lib/puppet/parser/functions/break.rb +1 -1
- data/lib/puppet/parser/functions/defined.rb +1 -1
- data/lib/puppet/parser/functions/dig.rb +1 -1
- data/lib/puppet/parser/functions/each.rb +2 -2
- data/lib/puppet/parser/functions/epp.rb +1 -1
- data/lib/puppet/parser/functions/filter.rb +2 -2
- data/lib/puppet/parser/functions/find_file.rb +1 -1
- data/lib/puppet/parser/functions/inline_epp.rb +1 -1
- data/lib/puppet/parser/functions/lest.rb +1 -1
- data/lib/puppet/parser/functions/map.rb +1 -1
- data/lib/puppet/parser/functions/match.rb +1 -1
- data/lib/puppet/parser/functions/new.rb +1 -1
- data/lib/puppet/parser/functions/next.rb +1 -1
- data/lib/puppet/parser/functions/reduce.rb +1 -1
- data/lib/puppet/parser/functions/return.rb +1 -1
- data/lib/puppet/parser/functions/reverse_each.rb +2 -2
- data/lib/puppet/parser/functions/slice.rb +1 -1
- data/lib/puppet/parser/functions/step.rb +2 -2
- data/lib/puppet/parser/functions/strftime.rb +1 -1
- data/lib/puppet/parser/functions/then.rb +1 -1
- data/lib/puppet/parser/functions/type.rb +1 -1
- data/lib/puppet/parser/functions/with.rb +1 -1
- data/lib/puppet/pops/merge_strategy.rb +1 -1
- data/lib/puppet/pops/time/timestamp.rb +2 -2
- data/lib/puppet/provider/nameservice.rb +4 -2
- data/lib/puppet/reference/configuration.rb +1 -1
- data/lib/puppet/reports/http.rb +4 -2
- data/lib/puppet/resource/capability_finder.rb +1 -1
- data/lib/puppet/util/execution.rb +1 -1
- data/lib/puppet/util/logging.rb +8 -4
- data/lib/puppet/vendor/semantic_puppet/lib/semantic_puppet/gem_version.rb +1 -1
- data/lib/puppet/vendor/semantic_puppet/lib/semantic_puppet/version.rb +1 -1
- data/lib/puppet/version.rb +1 -1
- data/locales/puppet.pot +66 -58
- data/man/man5/puppet.conf.5 +233 -63
- data/man/man8/puppet-agent.8 +31 -9
- data/man/man8/puppet-apply.8 +20 -5
- data/man/man8/puppet-ca.8 +48 -34
- data/man/man8/puppet-catalog.8 +12 -15
- data/man/man8/puppet-cert.8 +23 -6
- data/man/man8/puppet-certificate.8 +52 -36
- data/man/man8/puppet-certificate_request.8 +10 -10
- data/man/man8/puppet-certificate_revocation_list.8 +9 -9
- data/man/man8/puppet-config.8 +5 -5
- data/man/man8/puppet-describe.8 +3 -3
- data/man/man8/puppet-device.8 +13 -5
- data/man/man8/puppet-doc.8 +5 -5
- data/man/man8/puppet-epp.8 +16 -10
- data/man/man8/puppet-facts.8 +9 -9
- data/man/man8/puppet-filebucket.8 +44 -5
- data/man/man8/puppet-generate.8 +84 -0
- data/man/man8/puppet-help.8 +4 -4
- data/man/man8/puppet-key.8 +11 -11
- data/man/man8/puppet-lookup.8 +104 -0
- data/man/man8/puppet-man.8 +5 -5
- data/man/man8/puppet-master.8 +5 -5
- data/man/man8/puppet-module.8 +29 -17
- data/man/man8/puppet-node.8 +9 -9
- data/man/man8/puppet-parser.8 +4 -4
- data/man/man8/puppet-plugin.8 +4 -4
- data/man/man8/puppet-report.8 +9 -9
- data/man/man8/puppet-resource.8 +4 -8
- data/man/man8/puppet-status.8 +9 -9
- data/man/man8/puppet.8 +12 -3
- data/spec/integration/util/execution_spec.rb +8 -0
- data/spec/unit/application/lookup_spec.rb +1 -1
- data/spec/unit/face/epp_face_spec.rb +9 -0
- data/spec/unit/face/module/search_spec.rb +1 -1
- data/spec/unit/functions/lookup_spec.rb +26 -0
- data/spec/unit/indirector/file_bucket_file/file_spec.rb +3 -3
- data/spec/unit/module_spec.rb +64 -0
- data/spec/unit/module_tool_spec.rb +22 -0
- data/spec/unit/parser/scope_spec.rb +1 -1
- data/spec/unit/pops/types/p_timestamp_type_spec.rb +30 -1
- data/spec/unit/puppet_spec.rb +33 -0
- data/spec/unit/util/logging_spec.rb +18 -9
- data/tasks/generate_ast_model.rake +48 -44
- data/tasks/manpages.rake +9 -1
- data/tasks/parallel.rake +12 -7
- metadata +3517 -3538
- data/man/man8/puppet-inspect.8 +0 -36
data/man/man8/puppet-agent.8
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
.\" generated with Ronn/v0.7.3
|
2
|
-
.\"
|
2
|
+
.\" http://github.com/rtomayko/ronn/tree/0.7.3
|
3
3
|
.
|
4
|
-
.TH "PUPPET\-AGENT" "8" "
|
4
|
+
.TH "PUPPET\-AGENT" "8" "June 2017" "Puppet Labs, LLC" "Puppet manual"
|
5
5
|
.
|
6
6
|
.SH "NAME"
|
7
7
|
\fBpuppet\-agent\fR \- The puppet agent daemon
|
@@ -25,19 +25,22 @@ Once the client has a signed certificate, it will retrieve its configuration and
|
|
25
25
|
\'puppet agent\' does its best to find a compromise between interactive use and daemon use\. Run with no arguments and no configuration, it will go into the background, attempt to get a signed certificate, and retrieve and apply its configuration every 30 minutes\.
|
26
26
|
.
|
27
27
|
.P
|
28
|
-
Some flags are meant specifically for interactive use \-\- in particular, \'test\', \'tags\'
|
28
|
+
Some flags are meant specifically for interactive use \-\- in particular, \'test\', \'tags\' and \'fingerprint\' are useful\.
|
29
29
|
.
|
30
30
|
.P
|
31
|
-
\'
|
31
|
+
\'\-\-test\' does a single run in the foreground with verbose logging, then exits\. It will also exit if it can\'t get a valid catalog\. The exit code after running with \'\-\-test\' is 0 if the catalog was successfully applied, and 1 if the run either failed or wasn\'t attempted (due to another run already in progress)\.
|
32
32
|
.
|
33
33
|
.P
|
34
|
-
\'
|
34
|
+
\'\-\-tags\' allows you to specify what portions of a configuration you want to apply\. Puppet elements are tagged with all of the class or definition names that contain them, and you can use the \'tags\' flag to specify one of these names, causing only configuration elements contained within that class or definition to be applied\. This is very useful when you are testing new configurations \-\- for instance, if you are just starting to manage \'ntpd\', you would put all of the new elements into an \'ntpd\' class, and call puppet with \'\-\-tags ntpd\', which would only apply that small portion of the configuration during your testing, rather than applying the whole thing\.
|
35
|
+
.
|
36
|
+
.P
|
37
|
+
\'\-\-fingerprint\' is a one\-time flag\. In this mode \'puppet agent\' will run once and display on the console (and in the log) the current certificate (or certificate request) fingerprint\. Providing the \'\-\-digest\' option allows to use a different digest algorithm to generate the fingerprint\. The main use is to verify that before signing a certificate request on the master, the certificate request the master received is the same as the one the client sent (to prevent against man\-in\-the\-middle attacks when signing certificates)\.
|
35
38
|
.
|
36
39
|
.SH "OPTIONS"
|
37
40
|
Note that any Puppet setting that\'s valid in the configuration file is also a valid long argument\. For example, \'server\' is a valid setting, so you can specify \'\-\-server \fIservername\fR\' as an argument\. Boolean settings translate into \'\-\-setting\' and \'\-\-no\-setting\' pairs\.
|
38
41
|
.
|
39
42
|
.P
|
40
|
-
See the configuration file documentation at https://docs\.puppetlabs\.com/
|
43
|
+
See the configuration file documentation at https://docs\.puppetlabs\.com/puppet/latest/reference/configuration\.html for the full list of acceptable settings\. A commented list of all settings can also be generated by running puppet agent with \'\-\-genconfig\'\.
|
41
44
|
.
|
42
45
|
.TP
|
43
46
|
\-\-certname
|
@@ -57,7 +60,22 @@ Enable full debugging\.
|
|
57
60
|
.
|
58
61
|
.TP
|
59
62
|
\-\-detailed\-exitcodes
|
60
|
-
Provide
|
63
|
+
Provide extra information about the run via exit codes; only works if \'\-\-test\' or \'\-\-onetime\' is also specified\. If enabled, \'puppet agent\' will use the following exit codes:
|
64
|
+
.
|
65
|
+
.IP
|
66
|
+
0: The run succeeded with no changes or failures; the system was already in the desired state\.
|
67
|
+
.
|
68
|
+
.IP
|
69
|
+
1: The run failed, or wasn\'t attempted due to another run already in progress\.
|
70
|
+
.
|
71
|
+
.IP
|
72
|
+
2: The run succeeded, and some resources were changed\.
|
73
|
+
.
|
74
|
+
.IP
|
75
|
+
4: The run succeeded, and some resources failed\.
|
76
|
+
.
|
77
|
+
.IP
|
78
|
+
6: The run succeeded, and included both changes and failures\.
|
61
79
|
.
|
62
80
|
.TP
|
63
81
|
\-\-digest
|
@@ -92,6 +110,10 @@ Display the current certificate or certificate signing request fingerprint and t
|
|
92
110
|
Print this help message
|
93
111
|
.
|
94
112
|
.TP
|
113
|
+
\-\-job\-id
|
114
|
+
Attach the specified job id to the catalog request and the report used for this agent run\. This option only works when \'\-\-onetime\' is used\.
|
115
|
+
.
|
116
|
+
.TP
|
95
117
|
\-\-logdest
|
96
118
|
Where to send log messages\. Choose between \'syslog\' (the POSIX syslog service), \'eventlog\' (the Windows Event Log), \'console\', or the path to a log file\. If debugging or verbosity is enabled, this defaults to \'console\'\. Otherwise, it defaults to \'syslog\' on POSIX systems and \'eventlog\' on Windows\.
|
97
119
|
.
|
@@ -112,7 +134,7 @@ Run the configuration once\. Runs a single (normally daemonized) Puppet run\. Us
|
|
112
134
|
.
|
113
135
|
.TP
|
114
136
|
\-\-test
|
115
|
-
Enable the most common options used for testing\. These are \'onetime\', \'verbose\', \'
|
137
|
+
Enable the most common options used for testing\. These are \'onetime\', \'verbose\', \'no\-daemonize\', \'no\-usecacheonfailure\', \'detailed\-exitcodes\', \'no\-splay\', and \'show_diff\'\.
|
116
138
|
.
|
117
139
|
.TP
|
118
140
|
\-\-verbose
|
@@ -157,4 +179,4 @@ Close file descriptors for log files and reopen them\. Used with logrotate\.
|
|
157
179
|
Luke Kanies
|
158
180
|
.
|
159
181
|
.SH "COPYRIGHT"
|
160
|
-
Copyright (c) 2011 Puppet
|
182
|
+
Copyright (c) 2011 Puppet Inc\., LLC Licensed under the Apache 2\.0 License
|
data/man/man8/puppet-apply.8
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
.\" generated with Ronn/v0.7.3
|
2
|
-
.\"
|
2
|
+
.\" http://github.com/rtomayko/ronn/tree/0.7.3
|
3
3
|
.
|
4
|
-
.TH "PUPPET\-APPLY" "8" "
|
4
|
+
.TH "PUPPET\-APPLY" "8" "June 2017" "Puppet Labs, LLC" "Puppet manual"
|
5
5
|
.
|
6
6
|
.SH "NAME"
|
7
7
|
\fBpuppet\-apply\fR \- Apply Puppet manifests locally
|
@@ -25,13 +25,28 @@ Most users should use \'puppet agent\' and \'puppet master\' for site\-wide mani
|
|
25
25
|
Note that any setting that\'s valid in the configuration file is also a valid long argument\. For example, \'tags\' is a valid setting, so you can specify \'\-\-tags \fIclass\fR,\fItag\fR\' as an argument\.
|
26
26
|
.
|
27
27
|
.P
|
28
|
-
See the configuration file documentation at https://docs\.puppetlabs\.com/
|
28
|
+
See the configuration file documentation at https://docs\.puppetlabs\.com/puppet/latest/reference/configuration\.html for the full list of acceptable parameters\. A commented list of all configuration options can also be generated by running puppet with \'\-\-genconfig\'\.
|
29
29
|
.
|
30
30
|
.IP "\(bu" 4
|
31
31
|
\-\-debug: Enable full debugging\.
|
32
32
|
.
|
33
33
|
.IP "\(bu" 4
|
34
|
-
\-\-detailed\-exitcodes: Provide
|
34
|
+
\-\-detailed\-exitcodes: Provide extra information about the run via exit codes\. If enabled, \'puppet apply\' will use the following exit codes:
|
35
|
+
.
|
36
|
+
.IP
|
37
|
+
0: The run succeeded with no changes or failures; the system was already in the desired state\.
|
38
|
+
.
|
39
|
+
.IP
|
40
|
+
1: The run failed\.
|
41
|
+
.
|
42
|
+
.IP
|
43
|
+
2: The run succeeded, and some resources were changed\.
|
44
|
+
.
|
45
|
+
.IP
|
46
|
+
4: The run succeeded, and some resources failed\.
|
47
|
+
.
|
48
|
+
.IP
|
49
|
+
6: The run succeeded, and included both changes and failures\.
|
35
50
|
.
|
36
51
|
.IP "\(bu" 4
|
37
52
|
\-\-help: Print this help message
|
@@ -79,4 +94,4 @@ $ puppet apply \-\-catalog catalog\.json
|
|
79
94
|
Luke Kanies
|
80
95
|
.
|
81
96
|
.SH "COPYRIGHT"
|
82
|
-
Copyright (c) 2011 Puppet
|
97
|
+
Copyright (c) 2011 Puppet Inc\., LLC Licensed under the Apache 2\.0 License
|
data/man/man8/puppet-ca.8
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
.\" generated with Ronn/v0.7.3
|
2
|
-
.\"
|
2
|
+
.\" http://github.com/rtomayko/ronn/tree/0.7.3
|
3
3
|
.
|
4
|
-
.TH "PUPPET\-CA" "8" "
|
4
|
+
.TH "PUPPET\-CA" "8" "June 2017" "Puppet Labs, LLC" "Puppet manual"
|
5
5
|
.
|
6
6
|
.SH "NAME"
|
7
7
|
\fBpuppet\-ca\fR \- Local Puppet Certificate Authority management\.
|
@@ -19,7 +19,7 @@ You can use this subcommand to sign outstanding certificate requests, list and m
|
|
19
19
|
Note that any setting that\'s valid in the configuration file is also a valid long argument, although it may or may not be relevant to the present action\. For example, \fBserver\fR and \fBrun_mode\fR are valid settings, so you can specify \fB\-\-server <servername>\fR, or \fB\-\-run_mode <runmode>\fR as an argument\.
|
20
20
|
.
|
21
21
|
.P
|
22
|
-
See the configuration file documentation at \fIhttps://docs\.puppetlabs\.com/
|
22
|
+
See the configuration file documentation at \fIhttps://docs\.puppetlabs\.com/puppet/latest/reference/configuration\.html\fR for the full list of acceptable parameters\. A commented list of all configuration options can also be generated by running puppet with \fB\-\-genconfig\fR\.
|
23
23
|
.
|
24
24
|
.TP
|
25
25
|
\-\-render\-as FORMAT
|
@@ -35,9 +35,8 @@ Whether to log debug information\.
|
|
35
35
|
.
|
36
36
|
.SH "ACTIONS"
|
37
37
|
.
|
38
|
-
.
|
39
|
-
\fBdestroy\fR \- Destroy named certificate or pending certificate request
|
40
|
-
\fBSYNOPSIS\fR
|
38
|
+
.IP "\(bu" 4
|
39
|
+
\fBdestroy\fR \- Destroy named certificate or pending certificate request\.: \fBSYNOPSIS\fR
|
41
40
|
.
|
42
41
|
.IP
|
43
42
|
puppet ca destroy
|
@@ -48,9 +47,8 @@ puppet ca destroy
|
|
48
47
|
.IP
|
49
48
|
Destroy named certificate or pending certificate request\.
|
50
49
|
.
|
51
|
-
.
|
52
|
-
\fBfingerprint\fR \- Print the DIGEST (defaults to the signing algorithm) fingerprint of a host\'s certificate
|
53
|
-
\fBSYNOPSIS\fR
|
50
|
+
.IP "\(bu" 4
|
51
|
+
\fBfingerprint\fR \- Print the DIGEST (defaults to the signing algorithm) fingerprint of a host\'s certificate\.: \fBSYNOPSIS\fR
|
54
52
|
.
|
55
53
|
.IP
|
56
54
|
puppet ca fingerprint [\-\-digest ALGORITHM]
|
@@ -64,9 +62,8 @@ Print the DIGEST (defaults to the signing algorithm) fingerprint of a host\'s ce
|
|
64
62
|
.IP
|
65
63
|
\fBOPTIONS\fR \fI\-\-digest ALGORITHM\fR \- The hash algorithm to use when displaying the fingerprint
|
66
64
|
.
|
67
|
-
.
|
68
|
-
\fBgenerate\fR \- Generate a certificate for a named client
|
69
|
-
\fBSYNOPSIS\fR
|
65
|
+
.IP "\(bu" 4
|
66
|
+
\fBgenerate\fR \- Generate a certificate for a named client\.: \fBSYNOPSIS\fR
|
70
67
|
.
|
71
68
|
.IP
|
72
69
|
puppet ca generate [\-\-dns\-alt\-names NAMES]
|
@@ -78,23 +75,42 @@ puppet ca generate [\-\-dns\-alt\-names NAMES]
|
|
78
75
|
Generate a certificate for a named client\.
|
79
76
|
.
|
80
77
|
.IP
|
81
|
-
\fBOPTIONS\fR \fI\-\-dns\-alt\-names NAMES\fR \-
|
78
|
+
\fBOPTIONS\fR \fI\-\-dns\-alt\-names NAMES\fR \- A comma\-separated list of alternate DNS names for Puppet Server\. These are extra hostnames (in addition to its \fBcertname\fR) that the server is allowed to use when serving agents\. Puppet checks this setting when automatically requesting a certificate for Puppet agent or Puppet Server, and when manually generating a certificate with \fBpuppet cert generate\fR\.
|
82
79
|
.
|
83
80
|
.IP
|
84
|
-
|
81
|
+
In order to handle agent requests at a given hostname (like "puppet\.example\.com"), Puppet Server needs a certificate that proves it\'s allowed to use that name; if a server shows a certificate that doesn\'t include its hostname, Puppet agents will refuse to trust it\. If you use a single hostname for Puppet traffic but load\-balance it to multiple Puppet Servers, each of those servers needs to include the official hostname in its list of extra names\.
|
85
82
|
.
|
86
83
|
.IP
|
87
|
-
|
84
|
+
\fBNote:\fR The list of alternate names is locked in when the server\'s certificate is signed\. If you need to change the list later, you can\'t just change this setting; you also need to:
|
88
85
|
.
|
89
|
-
.IP
|
90
|
-
|
86
|
+
.IP "\(bu" 4
|
87
|
+
On the server: Stop Puppet Server\.
|
88
|
+
.
|
89
|
+
.IP "\(bu" 4
|
90
|
+
On the CA server: Revoke and clean the server\'s old certificate\. (\fBpuppet cert clean <NAME>\fR)
|
91
|
+
.
|
92
|
+
.IP "\(bu" 4
|
93
|
+
On the server: Delete the old certificate (and any old certificate signing requests) from the ssldir \fIhttps://docs\.puppetlabs\.com/puppet/latest/reference/dirs_ssldir\.html\fR\.
|
94
|
+
.
|
95
|
+
.IP "\(bu" 4
|
96
|
+
On the server: Run \fBpuppet agent \-t \-\-ca_server <CA HOSTNAME>\fR to request a new certificate
|
97
|
+
.
|
98
|
+
.IP "\(bu" 4
|
99
|
+
On the CA server: Sign the certificate request, explicitly allowing alternate names (\fBpuppet cert sign \-\-allow\-dns\-alt\-names <NAME>\fR)\.
|
100
|
+
.
|
101
|
+
.IP "\(bu" 4
|
102
|
+
On the server: Run \fBpuppet agent \-t \-\-ca_server <CA HOSTNAME>\fR to retrieve the cert\.
|
103
|
+
.
|
104
|
+
.IP "\(bu" 4
|
105
|
+
On the server: Start Puppet Server again\.
|
106
|
+
.
|
107
|
+
.IP "" 0
|
91
108
|
.
|
92
109
|
.IP
|
93
|
-
|
110
|
+
To see all the alternate names your servers are using, log into your CA server and run \fBpuppet cert list \-a\fR, then check the output for \fB(alt names: \.\.\.)\fR\. Most agent nodes should NOT have alternate names; the only certs that should have them are Puppet Server nodes that you want other agents to trust\.
|
94
111
|
.
|
95
|
-
.
|
96
|
-
\fBlist\fR \- List certificates and/or certificate requests
|
97
|
-
\fBSYNOPSIS\fR
|
112
|
+
.IP "\(bu" 4
|
113
|
+
\fBlist\fR \- List certificates and/or certificate requests\.: \fBSYNOPSIS\fR
|
98
114
|
.
|
99
115
|
.IP
|
100
116
|
puppet ca list [\-\-[no\-]all] [\-\-[no\-]pending] [\-\-[no\-]signed] [\-\-digest ALGORITHM] [\-\-subject PATTERN]
|
@@ -123,9 +139,8 @@ This will list the current certificates and certificate signing requests in the
|
|
123
139
|
.IP
|
124
140
|
PATTERN is interpreted as a regular expression, allowing complex filtering of the content\.
|
125
141
|
.
|
126
|
-
.
|
127
|
-
\fBprint\fR \- Print the full\-text version of a host\'s certificate
|
128
|
-
\fBSYNOPSIS\fR
|
142
|
+
.IP "\(bu" 4
|
143
|
+
\fBprint\fR \- Print the full\-text version of a host\'s certificate\.: \fBSYNOPSIS\fR
|
129
144
|
.
|
130
145
|
.IP
|
131
146
|
puppet ca print
|
@@ -136,9 +151,8 @@ puppet ca print
|
|
136
151
|
.IP
|
137
152
|
Print the full\-text version of a host\'s certificate\.
|
138
153
|
.
|
139
|
-
.
|
140
|
-
\fBrevoke\fR \- Add certificate to certificate revocation list
|
141
|
-
\fBSYNOPSIS\fR
|
154
|
+
.IP "\(bu" 4
|
155
|
+
\fBrevoke\fR \- Add certificate to certificate revocation list\.: \fBSYNOPSIS\fR
|
142
156
|
.
|
143
157
|
.IP
|
144
158
|
puppet ca revoke
|
@@ -149,9 +163,8 @@ puppet ca revoke
|
|
149
163
|
.IP
|
150
164
|
Add certificate to certificate revocation list\.
|
151
165
|
.
|
152
|
-
.
|
153
|
-
\fBsign\fR \- Sign an outstanding certificate request
|
154
|
-
\fBSYNOPSIS\fR
|
166
|
+
.IP "\(bu" 4
|
167
|
+
\fBsign\fR \- Sign an outstanding certificate request\.: \fBSYNOPSIS\fR
|
155
168
|
.
|
156
169
|
.IP
|
157
170
|
puppet ca sign [\-\-[no\-]allow\-dns\-alt\-names]
|
@@ -165,9 +178,8 @@ Sign an outstanding certificate request\.
|
|
165
178
|
.IP
|
166
179
|
\fBOPTIONS\fR \fI\-\-[no\-]allow\-dns\-alt\-names\fR \- Whether or not to accept DNS alt names in the certificate request
|
167
180
|
.
|
168
|
-
.
|
169
|
-
\fBverify\fR \- Verify the named certificate against the local CA certificate
|
170
|
-
\fBSYNOPSIS\fR
|
181
|
+
.IP "\(bu" 4
|
182
|
+
\fBverify\fR \- Verify the named certificate against the local CA certificate\.: \fBSYNOPSIS\fR
|
171
183
|
.
|
172
184
|
.IP
|
173
185
|
puppet ca verify
|
@@ -178,5 +190,7 @@ puppet ca verify
|
|
178
190
|
.IP
|
179
191
|
Verify the named certificate against the local CA certificate\.
|
180
192
|
.
|
193
|
+
.IP "" 0
|
194
|
+
.
|
181
195
|
.SH "COPYRIGHT AND LICENSE"
|
182
|
-
Copyright 2011 by Puppet
|
196
|
+
Copyright 2011 by Puppet Inc\. Apache 2 license; see COPYING
|
data/man/man8/puppet-catalog.8
CHANGED
@@ -1,13 +1,13 @@
|
|
1
1
|
.\" generated with Ronn/v0.7.3
|
2
|
-
.\"
|
2
|
+
.\" http://github.com/rtomayko/ronn/tree/0.7.3
|
3
3
|
.
|
4
|
-
.TH "PUPPET\-CATALOG" "8" "
|
4
|
+
.TH "PUPPET\-CATALOG" "8" "June 2017" "Puppet Labs, LLC" "Puppet manual"
|
5
5
|
.
|
6
6
|
.SH "NAME"
|
7
7
|
\fBpuppet\-catalog\fR \- Compile, save, view, and convert catalogs\.
|
8
8
|
.
|
9
9
|
.SH "SYNOPSIS"
|
10
|
-
puppet catalog \fIaction\fR [\-\-terminus
|
10
|
+
puppet catalog \fIaction\fR [\-\-terminus _TERMINUS] [\-\-extra HASH]
|
11
11
|
.
|
12
12
|
.SH "DESCRIPTION"
|
13
13
|
This subcommand deals with catalogs, which are compiled per\-node artifacts generated from a set of Puppet manifests\. By default, it interacts with the compiling subsystem and compiles a catalog using the default manifest and \fBcertname\fR, but you can change the source of the catalog with the \fB\-\-terminus\fR option\. You can also choose to print any catalog in \'dot\' format (for easy graph viewing with OmniGraffle or Graphviz) with \'\-\-render\-as dot\'\.
|
@@ -16,7 +16,7 @@ This subcommand deals with catalogs, which are compiled per\-node artifacts gene
|
|
16
16
|
Note that any setting that\'s valid in the configuration file is also a valid long argument, although it may or may not be relevant to the present action\. For example, \fBserver\fR and \fBrun_mode\fR are valid settings, so you can specify \fB\-\-server <servername>\fR, or \fB\-\-run_mode <runmode>\fR as an argument\.
|
17
17
|
.
|
18
18
|
.P
|
19
|
-
See the configuration file documentation at \fIhttps://docs\.puppetlabs\.com/
|
19
|
+
See the configuration file documentation at \fIhttps://docs\.puppetlabs\.com/puppet/latest/reference/configuration\.html\fR for the full list of acceptable parameters\. A commented list of all configuration options can also be generated by running puppet with \fB\-\-genconfig\fR\.
|
20
20
|
.
|
21
21
|
.TP
|
22
22
|
\-\-render\-as FORMAT
|
@@ -35,7 +35,7 @@ Whether to log debug information\.
|
|
35
35
|
A terminus can take additional arguments to refine the operation, which are passed as an arbitrary hash to the back\-end\. Anything passed as the extra value is just send direct to the back\-end\.
|
36
36
|
.
|
37
37
|
.TP
|
38
|
-
\-\-terminus
|
38
|
+
\-\-terminus _TERMINUS
|
39
39
|
Indirector faces expose indirected subsystems of Puppet\. These subsystems are each able to retrieve and alter a specific type of data (with the familiar actions of \fBfind\fR, \fBsearch\fR, \fBsave\fR, and \fBdestroy\fR) from an arbitrary number of pluggable backends\. In Puppet parlance, these backends are called terminuses\.
|
40
40
|
.
|
41
41
|
.IP
|
@@ -51,7 +51,7 @@ The terminus for an action is often determined by context, but occasionally need
|
|
51
51
|
\fBSYNOPSIS\fR
|
52
52
|
.
|
53
53
|
.IP
|
54
|
-
puppet catalog apply [\-\-terminus
|
54
|
+
puppet catalog apply [\-\-terminus _TERMINUS] [\-\-extra HASH]
|
55
55
|
.
|
56
56
|
.IP
|
57
57
|
\fBDESCRIPTION\fR
|
@@ -70,7 +70,7 @@ Nothing\. When used from the Ruby API, returns a Puppet::Transaction::Report obj
|
|
70
70
|
\fBSYNOPSIS\fR
|
71
71
|
.
|
72
72
|
.IP
|
73
|
-
puppet catalog download [\-\-terminus
|
73
|
+
puppet catalog download [\-\-terminus _TERMINUS] [\-\-extra HASH]
|
74
74
|
.
|
75
75
|
.IP
|
76
76
|
\fBDESCRIPTION\fR
|
@@ -98,7 +98,7 @@ When used from the Ruby API, this action has a side effect of leaving Puppet::Re
|
|
98
98
|
\fBSYNOPSIS\fR
|
99
99
|
.
|
100
100
|
.IP
|
101
|
-
puppet catalog find [\-\-terminus
|
101
|
+
puppet catalog find [\-\-terminus _TERMINUS] [\-\-extra HASH] \fIcertname\fR
|
102
102
|
.
|
103
103
|
.IP
|
104
104
|
\fBDESCRIPTION\fR
|
@@ -117,7 +117,7 @@ A serialized catalog\. When used from the Ruby API, returns a Puppet::Resource::
|
|
117
117
|
\fBSYNOPSIS\fR
|
118
118
|
.
|
119
119
|
.IP
|
120
|
-
puppet catalog info [\-\-terminus
|
120
|
+
puppet catalog info [\-\-terminus _TERMINUS] [\-\-extra HASH]
|
121
121
|
.
|
122
122
|
.IP
|
123
123
|
\fBDESCRIPTION\fR
|
@@ -130,7 +130,7 @@ Prints the default terminus class for this subcommand\. Note that different run
|
|
130
130
|
\fBSYNOPSIS\fR
|
131
131
|
.
|
132
132
|
.IP
|
133
|
-
puppet catalog save [\-\-terminus
|
133
|
+
puppet catalog save [\-\-terminus _TERMINUS] [\-\-extra HASH] \fIkey\fR
|
134
134
|
.
|
135
135
|
.IP
|
136
136
|
\fBDESCRIPTION\fR
|
@@ -143,7 +143,7 @@ API only: create or overwrite an object\. As the Faces framework does not curren
|
|
143
143
|
\fBSYNOPSIS\fR
|
144
144
|
.
|
145
145
|
.IP
|
146
|
-
puppet catalog select [\-\-terminus
|
146
|
+
puppet catalog select [\-\-terminus _TERMINUS] [\-\-extra HASH] \fIhost\fR \fIresource_type\fR
|
147
147
|
.
|
148
148
|
.IP
|
149
149
|
\fBDESCRIPTION\fR
|
@@ -249,9 +249,6 @@ This subcommand is an indirector face, which exposes \fBfind\fR, \fBsearch\fR, \
|
|
249
249
|
\fBrest\fR
|
250
250
|
.
|
251
251
|
.IP "\(bu" 4
|
252
|
-
\fBstatic_compiler\fR
|
253
|
-
.
|
254
|
-
.IP "\(bu" 4
|
255
252
|
\fBstore_configs\fR
|
256
253
|
.
|
257
254
|
.IP "\(bu" 4
|
@@ -260,4 +257,4 @@ This subcommand is an indirector face, which exposes \fBfind\fR, \fBsearch\fR, \
|
|
260
257
|
.IP "" 0
|
261
258
|
.
|
262
259
|
.SH "COPYRIGHT AND LICENSE"
|
263
|
-
Copyright 2011 by Puppet
|
260
|
+
Copyright 2011 by Puppet Inc\. Apache 2 license; see COPYING
|
data/man/man8/puppet-cert.8
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
.\" generated with Ronn/v0.7.3
|
2
|
-
.\"
|
2
|
+
.\" http://github.com/rtomayko/ronn/tree/0.7.3
|
3
3
|
.
|
4
|
-
.TH "PUPPET\-CERT" "8" "
|
4
|
+
.TH "PUPPET\-CERT" "8" "June 2017" "Puppet Labs, LLC" "Puppet manual"
|
5
5
|
.
|
6
6
|
.SH "NAME"
|
7
7
|
\fBpuppet\-cert\fR \- Manage certificates and requests
|
@@ -18,6 +18,9 @@ Because the puppet master service defaults to not signing client certificate req
|
|
18
18
|
.SH "ACTIONS"
|
19
19
|
Every action except \'list\' and \'generate\' requires a hostname to act on, unless the \'\-\-all\' option is set\.
|
20
20
|
.
|
21
|
+
.P
|
22
|
+
The most important actions for day\-to\-day use are \'list\' and \'sign\'\.
|
23
|
+
.
|
21
24
|
.TP
|
22
25
|
clean
|
23
26
|
Revoke a host\'s certificate (if applicable) and remove all files related to that host from puppet cert\'s storage\. This is useful when rebuilding hosts, since new certificate signing requests will only be honored if puppet cert does not have a copy of a signed certificate for that host\. If \'\-\-all\' is specified then all host certificates, both signed and unsigned, will be removed\.
|
@@ -32,7 +35,7 @@ Generate a certificate for a named client\. A certificate/keypair will be genera
|
|
32
35
|
.
|
33
36
|
.TP
|
34
37
|
list
|
35
|
-
List outstanding certificate requests\. If \'\-\-all\' is specified, signed certificates are also listed, prefixed by \'+\', and revoked or invalid certificates are prefixed by \'\-\' (the verification outcome is printed in parenthesis)\.
|
38
|
+
List outstanding certificate requests\. If \'\-\-all\' is specified, signed certificates are also listed, prefixed by \'+\', and revoked or invalid certificates are prefixed by \'\-\' (the verification outcome is printed in parenthesis)\. If \'\-\-human\-readable\' or \'\-H\' is specified, certificates are formatted in a way to improve human scan\-ability\. If \'\-\-machine\-readable\' or \'\-m\' is specified, output is formatted concisely for consumption by a script\.
|
36
39
|
.
|
37
40
|
.TP
|
38
41
|
print
|
@@ -44,7 +47,7 @@ Revoke the certificate of a client\. The certificate can be specified either by
|
|
44
47
|
.
|
45
48
|
.TP
|
46
49
|
sign
|
47
|
-
Sign an outstanding certificate request\.
|
50
|
+
Sign an outstanding certificate request\. If \'\-\-interactive\' or \'\-i\' is supplied the user will be prompted to confirm that they are signing the correct certificate (recommended)\. If \'\-\-assume\-yes\' or \'\-y\' is supplied the interactive prompt will assume the answer of \'yes\'\.
|
48
51
|
.
|
49
52
|
.TP
|
50
53
|
verify
|
@@ -58,13 +61,27 @@ Build an inventory of the issued certificates\. This will destroy the current in
|
|
58
61
|
Note that any setting that\'s valid in the configuration file is also a valid long argument\. For example, \'ssldir\' is a valid setting, so you can specify \'\-\-ssldir \fIdirectory\fR\' as an argument\.
|
59
62
|
.
|
60
63
|
.P
|
61
|
-
See the configuration file documentation at https://docs\.puppetlabs\.com/
|
64
|
+
See the configuration file documentation at https://docs\.puppetlabs\.com/puppet/latest/reference/configuration\.html for the full list of acceptable parameters\. A commented list of all configuration options can also be generated by running puppet cert with \'\-\-genconfig\'\.
|
62
65
|
.
|
63
66
|
.TP
|
64
67
|
\-\-all
|
65
68
|
Operate on all items\. Currently only makes sense with the \'sign\', \'list\', and \'fingerprint\' actions\.
|
66
69
|
.
|
67
70
|
.TP
|
71
|
+
\-\-allow\-dns\-alt\-names
|
72
|
+
Sign a certificate request even if it contains one or more alternate DNS names\. If this option isn\'t specified, \'puppet cert sign\' will ignore any requests that contain alternate names\.
|
73
|
+
.
|
74
|
+
.IP
|
75
|
+
In general, ONLY certs intended for a Puppet master server should include alternate DNS names, since Puppet agent relies on those names for identifying its rightful server\.
|
76
|
+
.
|
77
|
+
.IP
|
78
|
+
You can make Puppet agent request a certificate with alternate names by setting \'dns_alt_names\' in puppet\.conf or specifying \'\-\-dns_alt_names\' on the command line\. The output of \'puppet cert list\' shows any requested alt names for pending certificate requests\.
|
79
|
+
.
|
80
|
+
.TP
|
81
|
+
\-\-allow\-authorization\-extensions
|
82
|
+
Enable the signing of a request with authorization extensions\. Such requests are sensitive because they can be used to write access rules in Puppet Server\. Currently, this is the only means by which such requests can be signed\.
|
83
|
+
.
|
84
|
+
.TP
|
68
85
|
\-\-digest
|
69
86
|
Set the digest for fingerprinting (defaults to the digest used when signing the cert)\. Valid values depends on your openssl and openssl ruby extension version\.
|
70
87
|
.
|
@@ -98,4 +115,4 @@ $ puppet cert sign culain\.madstop\.com
|
|
98
115
|
Luke Kanies
|
99
116
|
.
|
100
117
|
.SH "COPYRIGHT"
|
101
|
-
Copyright (c) 2011 Puppet
|
118
|
+
Copyright (c) 2011 Puppet Inc\., LLC Licensed under the Apache 2\.0 License
|