puppet 6.21.0 → 6.24.0
Sign up to get free protection for your applications and to get access to all the features.
Potentially problematic release.
This version of puppet might be problematic. Click here for more details.
- checksums.yaml +4 -4
- data/CONTRIBUTING.md +5 -5
- data/Gemfile +1 -1
- data/Gemfile.lock +29 -23
- data/README.md +4 -4
- data/ext/osx/puppet.plist +2 -0
- data/ext/project_data.yaml +3 -2
- data/lib/puppet.rb +3 -3
- data/lib/puppet/application/agent.rb +12 -5
- data/lib/puppet/application/apply.rb +2 -1
- data/lib/puppet/application/device.rb +2 -1
- data/lib/puppet/application/filebucket.rb +1 -0
- data/lib/puppet/application/resource.rb +17 -3
- data/lib/puppet/application/script.rb +2 -1
- data/lib/puppet/application/ssl.rb +12 -0
- data/lib/puppet/configurer/downloader.rb +2 -1
- data/lib/puppet/defaults.rb +27 -5
- data/lib/puppet/environments.rb +26 -1
- data/lib/puppet/face/facts.rb +128 -30
- data/lib/puppet/face/help/action.erb +1 -0
- data/lib/puppet/face/help/face.erb +1 -0
- data/lib/puppet/face/node/clean.rb +11 -0
- data/lib/puppet/file_serving/fileset.rb +14 -2
- data/lib/puppet/file_system/file_impl.rb +1 -1
- data/lib/puppet/file_system/memory_file.rb +8 -1
- data/lib/puppet/file_system/windows.rb +4 -2
- data/lib/puppet/forge.rb +3 -3
- data/lib/puppet/functions/all.rb +1 -1
- data/lib/puppet/functions/camelcase.rb +1 -1
- data/lib/puppet/functions/capitalize.rb +2 -2
- data/lib/puppet/functions/downcase.rb +2 -2
- data/lib/puppet/functions/empty.rb +8 -0
- data/lib/puppet/functions/get.rb +5 -5
- data/lib/puppet/functions/group_by.rb +13 -5
- data/lib/puppet/functions/lest.rb +1 -1
- data/lib/puppet/functions/new.rb +100 -100
- data/lib/puppet/functions/partition.rb +12 -4
- data/lib/puppet/functions/require.rb +5 -5
- data/lib/puppet/functions/sort.rb +3 -3
- data/lib/puppet/functions/strftime.rb +1 -0
- data/lib/puppet/functions/tree_each.rb +7 -9
- data/lib/puppet/functions/type.rb +4 -4
- data/lib/puppet/functions/unwrap.rb +17 -2
- data/lib/puppet/functions/upcase.rb +2 -2
- data/lib/puppet/http/resolver/server_list.rb +15 -4
- data/lib/puppet/http/service/compiler.rb +69 -0
- data/lib/puppet/http/service/file_server.rb +2 -1
- data/lib/puppet/indirector/catalog/compiler.rb +1 -0
- data/lib/puppet/indirector/facts/facter.rb +24 -3
- data/lib/puppet/indirector/file_metadata/rest.rb +1 -0
- data/lib/puppet/indirector/resource/ral.rb +6 -1
- data/lib/puppet/interface/documentation.rb +1 -0
- data/lib/puppet/module_tool/applications/installer.rb +4 -0
- data/lib/puppet/module_tool/errors/shared.rb +17 -0
- data/lib/puppet/network/formats.rb +67 -0
- data/lib/puppet/network/http/factory.rb +4 -0
- data/lib/puppet/parser/functions/fqdn_rand.rb +14 -6
- data/lib/puppet/pops/types/p_sem_ver_type.rb +8 -2
- data/lib/puppet/pops/types/p_sensitive_type.rb +10 -0
- data/lib/puppet/pops/types/type_mismatch_describer.rb +1 -1
- data/lib/puppet/provider/exec/posix.rb +16 -4
- data/lib/puppet/provider/package/dnfmodule.rb +1 -1
- data/lib/puppet/provider/package/nim.rb +11 -6
- data/lib/puppet/provider/package/pip.rb +15 -3
- data/lib/puppet/provider/parsedfile.rb +3 -0
- data/lib/puppet/provider/service/systemd.rb +14 -4
- data/lib/puppet/provider/service/windows.rb +38 -0
- data/lib/puppet/provider/user/directoryservice.rb +25 -12
- data/lib/puppet/provider/user/useradd.rb +9 -2
- data/lib/puppet/reference/configuration.rb +1 -1
- data/lib/puppet/settings.rb +30 -7
- data/lib/puppet/settings/environment_conf.rb +1 -0
- data/lib/puppet/transaction/additional_resource_generator.rb +1 -1
- data/lib/puppet/type/exec.rb +16 -3
- data/lib/puppet/type/file.rb +19 -1
- data/lib/puppet/type/file/mode.rb +6 -0
- data/lib/puppet/type/file/selcontext.rb +1 -1
- data/lib/puppet/type/service.rb +18 -38
- data/lib/puppet/type/tidy.rb +22 -3
- data/lib/puppet/type/user.rb +38 -20
- data/lib/puppet/util/fact_dif.rb +36 -17
- data/lib/puppet/util/monkey_patches.rb +7 -0
- data/lib/puppet/util/selinux.rb +30 -4
- data/lib/puppet/util/symbolic_file_mode.rb +29 -17
- data/lib/puppet/util/windows/adsi.rb +46 -0
- data/lib/puppet/util/windows/api_types.rb +1 -1
- data/lib/puppet/util/windows/principal.rb +9 -2
- data/lib/puppet/util/windows/sid.rb +6 -2
- data/lib/puppet/version.rb +1 -1
- data/locales/puppet.pot +360 -280
- data/man/man5/puppet.conf.5 +279 -251
- data/man/man8/puppet-agent.8 +1 -1
- data/man/man8/puppet-apply.8 +1 -1
- data/man/man8/puppet-catalog.8 +9 -9
- data/man/man8/puppet-config.8 +1 -1
- data/man/man8/puppet-describe.8 +1 -1
- data/man/man8/puppet-device.8 +1 -1
- data/man/man8/puppet-doc.8 +1 -1
- data/man/man8/puppet-epp.8 +1 -1
- data/man/man8/puppet-facts.8 +65 -7
- data/man/man8/puppet-filebucket.8 +1 -1
- data/man/man8/puppet-generate.8 +1 -1
- data/man/man8/puppet-help.8 +1 -1
- data/man/man8/puppet-key.8 +7 -7
- data/man/man8/puppet-lookup.8 +1 -1
- data/man/man8/puppet-man.8 +1 -1
- data/man/man8/puppet-module.8 +1 -1
- data/man/man8/puppet-node.8 +5 -5
- data/man/man8/puppet-parser.8 +1 -1
- data/man/man8/puppet-plugin.8 +1 -1
- data/man/man8/puppet-report.8 +5 -5
- data/man/man8/puppet-resource.8 +1 -1
- data/man/man8/puppet-script.8 +1 -1
- data/man/man8/puppet-ssl.8 +5 -1
- data/man/man8/puppet-status.8 +4 -4
- data/man/man8/puppet.8 +2 -2
- data/spec/fixtures/ssl/127.0.0.1-key.pem +107 -57
- data/spec/fixtures/ssl/127.0.0.1.pem +52 -31
- data/spec/fixtures/ssl/bad-basic-constraints.pem +57 -35
- data/spec/fixtures/ssl/bad-int-basic-constraints.pem +57 -35
- data/spec/fixtures/ssl/ca.pem +57 -35
- data/spec/fixtures/ssl/crl.pem +28 -18
- data/spec/fixtures/ssl/ec-key.pem +11 -11
- data/spec/fixtures/ssl/ec.pem +33 -24
- data/spec/fixtures/ssl/encrypted-ec-key.pem +12 -12
- data/spec/fixtures/ssl/encrypted-key.pem +108 -58
- data/spec/fixtures/ssl/intermediate-agent-crl.pem +28 -19
- data/spec/fixtures/ssl/intermediate-agent.pem +57 -36
- data/spec/fixtures/ssl/intermediate-crl.pem +31 -21
- data/spec/fixtures/ssl/intermediate.pem +57 -36
- data/spec/fixtures/ssl/oid-key.pem +117 -0
- data/spec/fixtures/ssl/oid.pem +69 -0
- data/spec/fixtures/ssl/pluto-key.pem +107 -57
- data/spec/fixtures/ssl/pluto.pem +52 -30
- data/spec/fixtures/ssl/request-key.pem +107 -57
- data/spec/fixtures/ssl/request.pem +47 -26
- data/spec/fixtures/ssl/revoked-key.pem +107 -57
- data/spec/fixtures/ssl/revoked.pem +52 -30
- data/spec/fixtures/ssl/signed-key.pem +107 -57
- data/spec/fixtures/ssl/signed.pem +52 -30
- data/spec/fixtures/ssl/tampered-cert.pem +52 -30
- data/spec/fixtures/ssl/tampered-csr.pem +47 -26
- data/spec/fixtures/ssl/trusted_oid_mapping.yaml +5 -0
- data/spec/fixtures/ssl/unknown-127.0.0.1-key.pem +107 -57
- data/spec/fixtures/ssl/unknown-127.0.0.1.pem +50 -29
- data/spec/fixtures/ssl/unknown-ca-key.pem +107 -57
- data/spec/fixtures/ssl/unknown-ca.pem +55 -33
- data/spec/fixtures/unit/provider/service/systemd/list_unit_files_services_vendor_preset +9 -0
- data/spec/integration/application/filebucket_spec.rb +11 -0
- data/spec/integration/application/module_spec.rb +21 -0
- data/spec/integration/application/plugin_spec.rb +1 -1
- data/spec/integration/application/resource_spec.rb +64 -0
- data/spec/integration/application/ssl_spec.rb +20 -0
- data/spec/integration/environments/settings_interpolation_spec.rb +0 -4
- data/spec/integration/http/client_spec.rb +12 -0
- data/spec/integration/indirector/direct_file_server_spec.rb +1 -3
- data/spec/integration/indirector/facts/facter_spec.rb +90 -36
- data/spec/integration/type/exec_spec.rb +70 -45
- data/spec/integration/util/windows/adsi_spec.rb +18 -0
- data/spec/integration/util/windows/principal_spec.rb +21 -0
- data/spec/integration/util/windows/registry_spec.rb +6 -0
- data/spec/lib/puppet/test_ca.rb +7 -2
- data/spec/lib/puppet_spec/settings.rb +1 -0
- data/spec/spec_helper.rb +11 -1
- data/spec/unit/application/agent_spec.rb +7 -2
- data/spec/unit/application/facts_spec.rb +482 -3
- data/spec/unit/application/ssl_spec.rb +23 -0
- data/spec/unit/configurer/downloader_spec.rb +6 -0
- data/spec/unit/configurer_spec.rb +23 -0
- data/spec/unit/defaults_spec.rb +16 -0
- data/spec/unit/environments_spec.rb +199 -88
- data/spec/unit/face/facts_spec.rb +4 -0
- data/spec/unit/file_serving/fileset_spec.rb +60 -0
- data/spec/unit/file_system_spec.rb +15 -0
- data/spec/unit/functions/assert_type_spec.rb +1 -1
- data/spec/unit/functions/empty_spec.rb +10 -0
- data/spec/unit/functions/unwrap_spec.rb +8 -0
- data/spec/unit/functions4_spec.rb +2 -2
- data/spec/unit/gettext/config_spec.rb +12 -0
- data/spec/unit/http/service/compiler_spec.rb +123 -0
- data/spec/unit/indirector/catalog/compiler_spec.rb +14 -10
- data/spec/unit/indirector/facts/facter_spec.rb +95 -0
- data/spec/unit/indirector/resource/ral_spec.rb +40 -75
- data/spec/unit/module_tool/applications/installer_spec.rb +12 -0
- data/spec/unit/network/formats_spec.rb +41 -0
- data/spec/unit/network/http/factory_spec.rb +19 -0
- data/spec/unit/parser/functions/fqdn_rand_spec.rb +15 -1
- data/spec/unit/parser/templatewrapper_spec.rb +12 -2
- data/spec/unit/pops/types/p_sem_ver_type_spec.rb +18 -0
- data/spec/unit/pops/types/p_sensitive_type_spec.rb +18 -0
- data/spec/unit/provider/package/dnfmodule_spec.rb +10 -1
- data/spec/unit/provider/package/nim_spec.rb +42 -0
- data/spec/unit/provider/package/pip_spec.rb +37 -0
- data/spec/unit/provider/parsedfile_spec.rb +10 -0
- data/spec/unit/provider/service/init_spec.rb +1 -0
- data/spec/unit/provider/service/openwrt_spec.rb +3 -1
- data/spec/unit/provider/service/systemd_spec.rb +53 -8
- data/spec/unit/provider/service/windows_spec.rb +202 -0
- data/spec/unit/provider/user/directoryservice_spec.rb +67 -35
- data/spec/unit/provider/user/useradd_spec.rb +21 -6
- data/spec/unit/resource/catalog_spec.rb +1 -1
- data/spec/unit/settings_spec.rb +97 -56
- data/spec/unit/ssl/state_machine_spec.rb +19 -5
- data/spec/unit/transaction/additional_resource_generator_spec.rb +0 -2
- data/spec/unit/transaction_spec.rb +18 -20
- data/spec/unit/type/exec_spec.rb +76 -29
- data/spec/unit/type/file/selinux_spec.rb +3 -3
- data/spec/unit/type/file/source_spec.rb +4 -4
- data/spec/unit/type/service_spec.rb +59 -188
- data/spec/unit/type/tidy_spec.rb +24 -7
- data/spec/unit/type/user_spec.rb +45 -0
- data/spec/unit/util/selinux_spec.rb +87 -16
- data/spec/unit/util/windows/sid_spec.rb +41 -0
- data/tasks/generate_cert_fixtures.rake +12 -3
- metadata +16 -7
- data/spec/lib/matchers/include.rb +0 -27
- data/spec/lib/matchers/include_spec.rb +0 -32
data/man/man5/puppet.conf.5
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
.\" generated with Ronn/v0.7.3
|
2
2
|
.\" http://github.com/rtomayko/ronn/tree/0.7.3
|
3
3
|
.
|
4
|
-
.TH "PUPPETCONF" "5" "
|
4
|
+
.TH "PUPPETCONF" "5" "July 2021" "Puppet, Inc." "Puppet manual"
|
5
5
|
\fBThis page is autogenerated; any changes will get overwritten\fR
|
6
6
|
.
|
7
7
|
.SH "Configuration settings"
|
@@ -42,7 +42,7 @@ See the configuration guide \fIhttps://puppet\.com/docs/puppet/latest/config_abo
|
|
42
42
|
A lock file to indicate that a puppet agent catalog run is currently in progress\. The file contains the pid of the process that holds the lock on the catalog run\.
|
43
43
|
.
|
44
44
|
.IP "\(bu" 4
|
45
|
-
\fIDefault\fR: $statedir/agent_catalog_run\.lock
|
45
|
+
\fIDefault\fR: \fB$statedir/agent_catalog_run\.lock\fR
|
46
46
|
.
|
47
47
|
.IP "" 0
|
48
48
|
.
|
@@ -50,7 +50,7 @@ A lock file to indicate that a puppet agent catalog run is currently in progress
|
|
50
50
|
A lock file to indicate that puppet agent runs have been administratively disabled\. File contains a JSON object with state information\.
|
51
51
|
.
|
52
52
|
.IP "\(bu" 4
|
53
|
-
\fIDefault\fR: $statedir/agent_disabled\.lock
|
53
|
+
\fIDefault\fR: \fB$statedir/agent_disabled\.lock\fR
|
54
54
|
.
|
55
55
|
.IP "" 0
|
56
56
|
.
|
@@ -58,7 +58,7 @@ A lock file to indicate that puppet agent runs have been administratively disabl
|
|
58
58
|
Whether to allow a new certificate request to overwrite an existing certificate request\. If true, then the old certificate must be cleaned using \fBpuppetserver ca clean\fR, and the new request signed using \fBpuppetserver ca sign\fR\.
|
59
59
|
.
|
60
60
|
.IP "\(bu" 4
|
61
|
-
\fIDefault\fR:
|
61
|
+
\fIDefault\fR: \fBfalse\fR
|
62
62
|
.
|
63
63
|
.IP "" 0
|
64
64
|
.
|
@@ -69,7 +69,7 @@ Affects how we cache attempts to load Puppet resource types and features\. If tr
|
|
69
69
|
If this setting is set to false, then types and features will only be checked once, and if they are not available, the negative result is cached and returned for all subsequent attempts to load the type or feature\. This behavior is almost always appropriate for the server, and can result in a significant performance improvement for types and features that are checked frequently\.
|
70
70
|
.
|
71
71
|
.IP "\(bu" 4
|
72
|
-
\fIDefault\fR:
|
72
|
+
\fIDefault\fR: \fBtrue\fR
|
73
73
|
.
|
74
74
|
.IP "" 0
|
75
75
|
.
|
@@ -77,7 +77,7 @@ If this setting is set to false, then types and features will only be checked on
|
|
77
77
|
Whether log files should always flush to disk\.
|
78
78
|
.
|
79
79
|
.IP "\(bu" 4
|
80
|
-
\fIDefault\fR:
|
80
|
+
\fIDefault\fR: \fBtrue\fR
|
81
81
|
.
|
82
82
|
.IP "" 0
|
83
83
|
.
|
@@ -100,7 +100,7 @@ If a certificate request is not autosigned, it will persist for review\. An admi
|
|
100
100
|
For info on autosign configuration files, see the guide to Puppet\'s config files \fIhttps://puppet\.com/docs/puppet/latest/config_file_autosign\.html\fR\.
|
101
101
|
.
|
102
102
|
.IP "\(bu" 4
|
103
|
-
\fIDefault\fR: $confdir/autosign\.conf
|
103
|
+
\fIDefault\fR: \fB$confdir/autosign\.conf\fR
|
104
104
|
.
|
105
105
|
.IP "" 0
|
106
106
|
.
|
@@ -111,37 +111,39 @@ The search path for \fBglobal\fR modules\. Should be specified as a list of dire
|
|
111
111
|
These are the modules that will be used by \fIall\fR environments\. Note that the \fBmodules\fR directory of the active environment will have priority over any global directories\. For more info, see \fIhttps://puppet\.com/docs/puppet/latest/environments_about\.html\fR
|
112
112
|
.
|
113
113
|
.IP "\(bu" 4
|
114
|
-
\fIDefault\fR: $codedir/modules:/opt/puppetlabs/puppet/modules
|
114
|
+
\fIDefault\fR: \fB$codedir/modules:/opt/puppetlabs/puppet/modules\fR
|
115
115
|
.
|
116
116
|
.IP "" 0
|
117
117
|
.
|
118
118
|
.SS "binder_config"
|
119
119
|
The binder configuration file\. Puppet reads this file on each request to configure the bindings system\. If set to nil (the default), a $confdir/binder_config\.yaml is optionally loaded\. If it does not exists, a default configuration is used\. If the setting :binding_config is specified, it must reference a valid and existing yaml file\.
|
120
120
|
.
|
121
|
-
.
|
122
|
-
\fIDefault\fR:
|
123
|
-
|
121
|
+
.IP "\(bu" 4
|
122
|
+
\fIDefault\fR: ``
|
123
|
+
.
|
124
|
+
.IP "" 0
|
124
125
|
.
|
125
126
|
.SS "bucketdir"
|
126
127
|
Where FileBucket files are stored\.
|
127
128
|
.
|
128
129
|
.IP "\(bu" 4
|
129
|
-
\fIDefault\fR: $vardir/bucket
|
130
|
+
\fIDefault\fR: \fB$vardir/bucket\fR
|
130
131
|
.
|
131
132
|
.IP "" 0
|
132
133
|
.
|
133
134
|
.SS "ca_fingerprint"
|
134
135
|
The expected fingerprint of the CA certificate\. If specified, the agent will compare the CA certificate fingerprint that it downloads against this value and reject the CA certificate if the values do not match\. This only applies during the first download of the CA certificate\.
|
135
136
|
.
|
136
|
-
.
|
137
|
-
\fIDefault\fR:
|
138
|
-
|
137
|
+
.IP "\(bu" 4
|
138
|
+
\fIDefault\fR: ``
|
139
|
+
.
|
140
|
+
.IP "" 0
|
139
141
|
.
|
140
142
|
.SS "ca_name"
|
141
143
|
The name to use the Certificate Authority certificate\.
|
142
144
|
.
|
143
145
|
.IP "\(bu" 4
|
144
|
-
\fIDefault\fR:
|
146
|
+
\fIDefault\fR: \fBPuppet CA: $certname\fR
|
145
147
|
.
|
146
148
|
.IP "" 0
|
147
149
|
.
|
@@ -149,7 +151,7 @@ The name to use the Certificate Authority certificate\.
|
|
149
151
|
The port to use for the certificate authority\.
|
150
152
|
.
|
151
153
|
.IP "\(bu" 4
|
152
|
-
\fIDefault\fR: $serverport
|
154
|
+
\fIDefault\fR: \fB$serverport\fR
|
153
155
|
.
|
154
156
|
.IP "" 0
|
155
157
|
.
|
@@ -157,7 +159,7 @@ The port to use for the certificate authority\.
|
|
157
159
|
The server to use for certificate authority requests\. It\'s a separate server because it cannot and does not need to horizontally scale\.
|
158
160
|
.
|
159
161
|
.IP "\(bu" 4
|
160
|
-
\fIDefault\fR: $server
|
162
|
+
\fIDefault\fR: \fB$server\fR
|
161
163
|
.
|
162
164
|
.IP "" 0
|
163
165
|
.
|
@@ -165,7 +167,7 @@ The server to use for certificate authority requests\. It\'s a separate server b
|
|
165
167
|
The default TTL for new certificates\. This setting can be a time interval in seconds (30 or 30s), minutes (30m), hours (6h), days (2d), or years (5y)\.
|
166
168
|
.
|
167
169
|
.IP "\(bu" 4
|
168
|
-
\fIDefault\fR:
|
170
|
+
\fIDefault\fR: \fB5y\fR
|
169
171
|
.
|
170
172
|
.IP "" 0
|
171
173
|
.
|
@@ -173,7 +175,7 @@ The default TTL for new certificates\. This setting can be a time interval in se
|
|
173
175
|
The CA certificate\.
|
174
176
|
.
|
175
177
|
.IP "\(bu" 4
|
176
|
-
\fIDefault\fR: $cadir/ca_crt\.pem
|
178
|
+
\fIDefault\fR: \fB$cadir/ca_crt\.pem\fR
|
177
179
|
.
|
178
180
|
.IP "" 0
|
179
181
|
.
|
@@ -181,7 +183,7 @@ The CA certificate\.
|
|
181
183
|
The certificate revocation list (CRL) for the CA\.
|
182
184
|
.
|
183
185
|
.IP "\(bu" 4
|
184
|
-
\fIDefault\fR: $cadir/ca_crl\.pem
|
186
|
+
\fIDefault\fR: \fB$cadir/ca_crl\.pem\fR
|
185
187
|
.
|
186
188
|
.IP "" 0
|
187
189
|
.
|
@@ -189,7 +191,7 @@ The certificate revocation list (CRL) for the CA\.
|
|
189
191
|
The root directory for the certificate authority\.
|
190
192
|
.
|
191
193
|
.IP "\(bu" 4
|
192
|
-
\fIDefault\fR:
|
194
|
+
\fIDefault\fR: \fB/var/lib/jenkins/\.puppetlabs/etc/puppet/ssl/ca\fR
|
193
195
|
.
|
194
196
|
.IP "" 0
|
195
197
|
.
|
@@ -197,7 +199,7 @@ The root directory for the certificate authority\.
|
|
197
199
|
The CA private key\.
|
198
200
|
.
|
199
201
|
.IP "\(bu" 4
|
200
|
-
\fIDefault\fR: $cadir/ca_key\.pem
|
202
|
+
\fIDefault\fR: \fB$cadir/ca_key\.pem\fR
|
201
203
|
.
|
202
204
|
.IP "" 0
|
203
205
|
.
|
@@ -205,22 +207,23 @@ The CA private key\.
|
|
205
207
|
The CA public key\.
|
206
208
|
.
|
207
209
|
.IP "\(bu" 4
|
208
|
-
\fIDefault\fR: $cadir/ca_pub\.pem
|
210
|
+
\fIDefault\fR: \fB$cadir/ca_pub\.pem\fR
|
209
211
|
.
|
210
212
|
.IP "" 0
|
211
213
|
.
|
212
214
|
.SS "catalog_cache_terminus"
|
213
215
|
How to store cached catalogs\. Valid values are \'json\', \'msgpack\' and \'yaml\'\. The agent application defaults to \'json\'\.
|
214
216
|
.
|
215
|
-
.
|
216
|
-
\fIDefault\fR:
|
217
|
-
|
217
|
+
.IP "\(bu" 4
|
218
|
+
\fIDefault\fR: ``
|
219
|
+
.
|
220
|
+
.IP "" 0
|
218
221
|
.
|
219
222
|
.SS "catalog_terminus"
|
220
223
|
Where to get node catalogs\. This is useful to change if, for instance, you\'d like to pre\-compile catalogs and store them in memcached or some other easily\-accessed store\.
|
221
224
|
.
|
222
225
|
.IP "\(bu" 4
|
223
|
-
\fIDefault\fR:
|
226
|
+
\fIDefault\fR: \fBcompiler\fR
|
224
227
|
.
|
225
228
|
.IP "" 0
|
226
229
|
.
|
@@ -228,7 +231,7 @@ Where to get node catalogs\. This is useful to change if, for instance, you\'d l
|
|
228
231
|
The inventory file\. This is a text file to which the CA writes a complete listing of all certificates\.
|
229
232
|
.
|
230
233
|
.IP "\(bu" 4
|
231
|
-
\fIDefault\fR: $cadir/inventory\.txt
|
234
|
+
\fIDefault\fR: \fB$cadir/inventory\.txt\fR
|
232
235
|
.
|
233
236
|
.IP "" 0
|
234
237
|
.
|
@@ -236,7 +239,7 @@ The inventory file\. This is a text file to which the CA writes a complete listi
|
|
236
239
|
The certificate directory\.
|
237
240
|
.
|
238
241
|
.IP "\(bu" 4
|
239
|
-
\fIDefault\fR: $ssldir/certs
|
242
|
+
\fIDefault\fR: \fB$ssldir/certs\fR
|
240
243
|
.
|
241
244
|
.IP "" 0
|
242
245
|
.
|
@@ -256,7 +259,7 @@ When certificate_revocation is set to \'leaf\', Puppet verifies certs against th
|
|
256
259
|
When certificate_revocation is set to \'false\', Puppet disables all certificate revocation checking and does not attempt to download the CRL\.
|
257
260
|
.
|
258
261
|
.IP "\(bu" 4
|
259
|
-
\fIDefault\fR:
|
262
|
+
\fIDefault\fR: \fBchain\fR
|
260
263
|
.
|
261
264
|
.IP "" 0
|
262
265
|
.
|
@@ -284,7 +287,15 @@ The special value \fBca\fR is reserved, and can\'t be used as the certname for a
|
|
284
287
|
Defaults to the node\'s fully qualified domain name\.
|
285
288
|
.
|
286
289
|
.IP "\(bu" 4
|
287
|
-
\fIDefault\fR:
|
290
|
+
\fIDefault\fR: \fBthe Host\'s fully qualified domain name, as determined by Facter\fR
|
291
|
+
.
|
292
|
+
.IP "" 0
|
293
|
+
.
|
294
|
+
.SS "ciphers"
|
295
|
+
The list of ciphersuites for TLS connections initiated by puppet\. The default value is chosen to support TLS 1\.0 and up, but can be made more restrictive if needed\. The ciphersuites must be specified in OpenSSL format, not IANA\.
|
296
|
+
.
|
297
|
+
.IP "\(bu" 4
|
298
|
+
\fIDefault\fR: \fBECDHE\-ECDSA\-AES128\-GCM\-SHA256:ECDHE\-RSA\-AES128\-GCM\-SHA256:ECDHE\-ECDSA\-AES256\-GCM\-SHA384:ECDHE\-RSA\-AES256\-GCM\-SHA384:ECDHE\-ECDSA\-CHACHA20\-POLY1305:ECDHE\-RSA\-CHACHA20\-POLY1305:DHE\-RSA\-AES128\-GCM\-SHA256:DHE\-RSA\-AES256\-GCM\-SHA384:DHE\-RSA\-CHACHA20\-POLY1305:ECDHE\-ECDSA\-AES128\-SHA256:ECDHE\-RSA\-AES128\-SHA256:ECDHE\-ECDSA\-AES128\-SHA:ECDHE\-RSA\-AES128\-SHA:ECDHE\-ECDSA\-AES256\-SHA384:ECDHE\-RSA\-AES256\-SHA384:ECDHE\-ECDSA\-AES256\-SHA:ECDHE\-RSA\-AES256\-SHA:DHE\-RSA\-AES128\-SHA256:DHE\-RSA\-AES256\-SHA256:AES128\-GCM\-SHA256:AES256\-GCM\-SHA384:AES128\-SHA256:AES256\-SHA256\fR
|
288
299
|
.
|
289
300
|
.IP "" 0
|
290
301
|
.
|
@@ -292,7 +303,7 @@ Defaults to the node\'s fully qualified domain name\.
|
|
292
303
|
The file in which puppet agent stores a list of the classes associated with the retrieved configuration\. Can be loaded in the separate \fBpuppet\fR executable using the \fB\-\-loadclasses\fR option\.
|
293
304
|
.
|
294
305
|
.IP "\(bu" 4
|
295
|
-
\fIDefault\fR: $statedir/classes\.txt
|
306
|
+
\fIDefault\fR: \fB$statedir/classes\.txt\fR
|
296
307
|
.
|
297
308
|
.IP "" 0
|
298
309
|
.
|
@@ -300,7 +311,7 @@ The file in which puppet agent stores a list of the classes associated with the
|
|
300
311
|
The directory in which serialized data is stored on the client\.
|
301
312
|
.
|
302
313
|
.IP "\(bu" 4
|
303
|
-
\fIDefault\fR: $vardir/client_data
|
314
|
+
\fIDefault\fR: \fB$vardir/client_data\fR
|
304
315
|
.
|
305
316
|
.IP "" 0
|
306
317
|
.
|
@@ -308,7 +319,7 @@ The directory in which serialized data is stored on the client\.
|
|
308
319
|
Where FileBucket files are stored locally\.
|
309
320
|
.
|
310
321
|
.IP "\(bu" 4
|
311
|
-
\fIDefault\fR: $vardir/clientbucket
|
322
|
+
\fIDefault\fR: \fB$vardir/clientbucket\fR
|
312
323
|
.
|
313
324
|
.IP "" 0
|
314
325
|
.
|
@@ -316,7 +327,7 @@ Where FileBucket files are stored locally\.
|
|
316
327
|
The directory in which client\-side YAML data is stored\.
|
317
328
|
.
|
318
329
|
.IP "\(bu" 4
|
319
|
-
\fIDefault\fR: $vardir/client_yaml
|
330
|
+
\fIDefault\fR: \fB$vardir/client_yaml\fR
|
320
331
|
.
|
321
332
|
.IP "" 0
|
322
333
|
.
|
@@ -327,7 +338,7 @@ Code to parse directly\. This is essentially only used by \fBpuppet\fR, and shou
|
|
327
338
|
The main Puppet code directory\. The default for this setting is calculated based on the user\. If the process is running as root or the user that Puppet is supposed to run as, it defaults to a system directory, but if it\'s running as any other user, it defaults to being in the user\'s home directory\.
|
328
339
|
.
|
329
340
|
.IP "\(bu" 4
|
330
|
-
\fIDefault\fR:
|
341
|
+
\fIDefault\fR: \fBUnix/Linux: /etc/puppetlabs/code \-\- Windows: C:\eProgramData\ePuppetLabs\ecode \-\- Non\-root user: ~/\.puppetlabs/etc/code\fR
|
331
342
|
.
|
332
343
|
.IP "" 0
|
333
344
|
.
|
@@ -335,7 +346,7 @@ The main Puppet code directory\. The default for this setting is calculated base
|
|
335
346
|
Whether to use colors when logging to the console\. Valid values are \fBansi\fR (equivalent to \fBtrue\fR), \fBhtml\fR, and \fBfalse\fR, which produces no color\.
|
336
347
|
.
|
337
348
|
.IP "\(bu" 4
|
338
|
-
\fIDefault\fR:
|
349
|
+
\fIDefault\fR: \fBansi\fR
|
339
350
|
.
|
340
351
|
.IP "" 0
|
341
352
|
.
|
@@ -343,7 +354,7 @@ Whether to use colors when logging to the console\. Valid values are \fBansi\fR
|
|
343
354
|
The main Puppet configuration directory\. The default for this setting is calculated based on the user\. If the process is running as root or the user that Puppet is supposed to run as, it defaults to a system directory, but if it\'s running as any other user, it defaults to being in the user\'s home directory\.
|
344
355
|
.
|
345
356
|
.IP "\(bu" 4
|
346
|
-
\fIDefault\fR:
|
357
|
+
\fIDefault\fR: \fBUnix/Linux: /etc/puppetlabs/puppet \-\- Windows: C:\eProgramData\ePuppetLabs\epuppet\eetc \-\- Non\-root user: ~/\.puppetlabs/etc/puppet\fR
|
347
358
|
.
|
348
359
|
.IP "" 0
|
349
360
|
.
|
@@ -351,7 +362,7 @@ The main Puppet configuration directory\. The default for this setting is calcul
|
|
351
362
|
The configuration file for the current puppet application\.
|
352
363
|
.
|
353
364
|
.IP "\(bu" 4
|
354
|
-
\fIDefault\fR: $confdir/${config_file_name}
|
365
|
+
\fIDefault\fR: \fB$confdir/${config_file_name}\fR
|
355
366
|
.
|
356
367
|
.IP "" 0
|
357
368
|
.
|
@@ -359,7 +370,7 @@ The configuration file for the current puppet application\.
|
|
359
370
|
The name of the puppet config file\.
|
360
371
|
.
|
361
372
|
.IP "\(bu" 4
|
362
|
-
\fIDefault\fR:
|
373
|
+
\fIDefault\fR: \fBpuppet\.conf\fR
|
363
374
|
.
|
364
375
|
.IP "" 0
|
365
376
|
.
|
@@ -381,9 +392,10 @@ In general, the duration should be greater than the \fBruninterval\fR\. Setting
|
|
381
392
|
.P
|
382
393
|
If the agent downloads a new CRL, the agent will use it for subsequent network requests\. If the refresh request fails or if the CRL is unchanged on the server, then the agent run will continue using the local CRL it already has\.This setting can be a time interval in seconds (30 or 30s), minutes (30m), hours (6h), days (2d), or years (5y)\.
|
383
394
|
.
|
384
|
-
.
|
385
|
-
\fIDefault\fR:
|
386
|
-
|
395
|
+
.IP "\(bu" 4
|
396
|
+
\fIDefault\fR: ``
|
397
|
+
.
|
398
|
+
.IP "" 0
|
387
399
|
.
|
388
400
|
.SS "csr_attributes"
|
389
401
|
An optional file containing custom attributes to add to certificate signing requests (CSRs)\. You should ensure that this file does not exist on your CA puppet master; if it does, unwanted certificate extensions may leak into certificates created with the \fBpuppetserver ca generate\fR command\.
|
@@ -398,7 +410,7 @@ Custom attributes can be used by the CA when deciding whether to sign the certif
|
|
398
410
|
Extension requests will be permanently embedded in the final certificate\. Extension OIDs must be in the "ppRegCertExt" (\fB1\.3\.6\.1\.4\.1\.34380\.1\.1\fR), "ppPrivCertExt" (\fB1\.3\.6\.1\.4\.1\.34380\.1\.2\fR), or "ppAuthCertExt" (\fB1\.3\.6\.1\.4\.1\.34380\.1\.3\fR) OID arcs\. The ppRegCertExt arc is reserved for four of the most common pieces of data to embed: \fBpp_uuid\fR (\fB\.1\fR), \fBpp_instance_id\fR (\fB\.2\fR), \fBpp_image_name\fR (\fB\.3\fR), and \fBpp_preshared_key\fR (\fB\.4\fR) \-\-\- in the YAML file, these can be referred to by their short descriptive names instead of their full OID\. The ppPrivCertExt arc is unregulated, and can be used for site\-specific extensions\. The ppAuthCert arc is reserved for two pieces of data to embed: \fBpp_authorization\fR (\fB\.1\fR) and \fBpp_auth_role\fR (\fB\.13\fR)\. As with ppRegCertExt, in the YAML file, these can be referred to by their short descriptive name instead of their full OID\.
|
399
411
|
.
|
400
412
|
.IP "\(bu" 4
|
401
|
-
\fIDefault\fR: $confdir/csr_attributes\.yaml
|
413
|
+
\fIDefault\fR: \fB$confdir/csr_attributes\.yaml\fR
|
402
414
|
.
|
403
415
|
.IP "" 0
|
404
416
|
.
|
@@ -406,7 +418,7 @@ Extension requests will be permanently embedded in the final certificate\. Exten
|
|
406
418
|
Where the CA stores certificate requests\.
|
407
419
|
.
|
408
420
|
.IP "\(bu" 4
|
409
|
-
\fIDefault\fR: $cadir/requests
|
421
|
+
\fIDefault\fR: \fB$cadir/requests\fR
|
410
422
|
.
|
411
423
|
.IP "" 0
|
412
424
|
.
|
@@ -414,7 +426,7 @@ Where the CA stores certificate requests\.
|
|
414
426
|
Whether to send the process into the background\. This defaults to true on POSIX systems, and to false on Windows (where Puppet currently cannot daemonize)\.
|
415
427
|
.
|
416
428
|
.IP "\(bu" 4
|
417
|
-
\fIDefault\fR:
|
429
|
+
\fIDefault\fR: \fBtrue\fR
|
418
430
|
.
|
419
431
|
.IP "" 0
|
420
432
|
.
|
@@ -422,7 +434,7 @@ Whether to send the process into the background\. This defaults to true on POSIX
|
|
422
434
|
This setting has been deprecated\. Use of any value other than \'hiera\' should instead be configured in a version 5 hiera\.yaml\. Until this setting is removed, it controls which data binding terminus to use for global automatic data binding (across all environments)\. By default this value is \'hiera\'\. A value of \'none\' turns off the global binding\.
|
423
435
|
.
|
424
436
|
.IP "\(bu" 4
|
425
|
-
\fIDefault\fR:
|
437
|
+
\fIDefault\fR: \fBhiera\fR
|
426
438
|
.
|
427
439
|
.IP "" 0
|
428
440
|
.
|
@@ -430,7 +442,7 @@ This setting has been deprecated\. Use of any value other than \'hiera\' should
|
|
430
442
|
The default source for files if no server is given in a uri, e\.g\. puppet:///file\. The default of \fBrest\fR causes the file to be retrieved using the \fBserver\fR setting\. When running \fBapply\fR the default is \fBfile_server\fR, causing requests to be filled locally\.
|
431
443
|
.
|
432
444
|
.IP "\(bu" 4
|
433
|
-
\fIDefault\fR:
|
445
|
+
\fIDefault\fR: \fBrest\fR
|
434
446
|
.
|
435
447
|
.IP "" 0
|
436
448
|
.
|
@@ -444,7 +456,7 @@ This setting\'s value can be an absolute or relative path\. An absolute path wil
|
|
444
456
|
In either case, the path can point to a single file or to a directory of manifests to be evaluated in alphabetical order\.
|
445
457
|
.
|
446
458
|
.IP "\(bu" 4
|
447
|
-
\fIDefault\fR: \./manifests
|
459
|
+
\fIDefault\fR: \fB\./manifests\fR
|
448
460
|
.
|
449
461
|
.IP "" 0
|
450
462
|
.
|
@@ -452,7 +464,7 @@ In either case, the path can point to a single file or to a directory of manifes
|
|
452
464
|
Boolean; whether to generate the default schedule resources\. Setting this to false is useful for keeping external report processors clean of skipped schedule resources\.
|
453
465
|
.
|
454
466
|
.IP "\(bu" 4
|
455
|
-
\fIDefault\fR:
|
467
|
+
\fIDefault\fR: \fBtrue\fR
|
456
468
|
.
|
457
469
|
.IP "" 0
|
458
470
|
.
|
@@ -460,7 +472,7 @@ Boolean; whether to generate the default schedule resources\. Setting this to fa
|
|
460
472
|
The root directory of devices\' $confdir\.
|
461
473
|
.
|
462
474
|
.IP "\(bu" 4
|
463
|
-
\fIDefault\fR: $confdir/devices
|
475
|
+
\fIDefault\fR: \fB$confdir/devices\fR
|
464
476
|
.
|
465
477
|
.IP "" 0
|
466
478
|
.
|
@@ -468,7 +480,7 @@ The root directory of devices\' $confdir\.
|
|
468
480
|
Path to the device config file for puppet device\.
|
469
481
|
.
|
470
482
|
.IP "\(bu" 4
|
471
|
-
\fIDefault\fR: $confdir/device\.conf
|
483
|
+
\fIDefault\fR: \fB$confdir/device\.conf\fR
|
472
484
|
.
|
473
485
|
.IP "" 0
|
474
486
|
.
|
@@ -476,7 +488,7 @@ Path to the device config file for puppet device\.
|
|
476
488
|
The root directory of devices\' $vardir\.
|
477
489
|
.
|
478
490
|
.IP "\(bu" 4
|
479
|
-
\fIDefault\fR: $vardir/devices
|
491
|
+
\fIDefault\fR: \fB$vardir/devices\fR
|
480
492
|
.
|
481
493
|
.IP "" 0
|
482
494
|
.
|
@@ -484,7 +496,7 @@ The root directory of devices\' $vardir\.
|
|
484
496
|
Which diff command to use when printing differences between files\. This setting has no default value on Windows, as standard \fBdiff\fR is not available, but Puppet can use many third\-party diff tools\.
|
485
497
|
.
|
486
498
|
.IP "\(bu" 4
|
487
|
-
\fIDefault\fR:
|
499
|
+
\fIDefault\fR: \fBdiff\fR
|
488
500
|
.
|
489
501
|
.IP "" 0
|
490
502
|
.
|
@@ -492,7 +504,7 @@ Which diff command to use when printing differences between files\. This setting
|
|
492
504
|
Which arguments to pass to the diff command when printing differences between files\. The command to use can be chosen with the \fBdiff\fR setting\.
|
493
505
|
.
|
494
506
|
.IP "\(bu" 4
|
495
|
-
\fIDefault\fR: \-u
|
507
|
+
\fIDefault\fR: \fB\-u\fR
|
496
508
|
.
|
497
509
|
.IP "" 0
|
498
510
|
.
|
@@ -500,7 +512,7 @@ Which arguments to pass to the diff command when printing differences between fi
|
|
500
512
|
Which digest algorithm to use for file resources and the filebucket\. Valid values are md5, sha256, sha384, sha512, sha224\. Default is md5\.
|
501
513
|
.
|
502
514
|
.IP "\(bu" 4
|
503
|
-
\fIDefault\fR:
|
515
|
+
\fIDefault\fR: \fBmd5\fR
|
504
516
|
.
|
505
517
|
.IP "" 0
|
506
518
|
.
|
@@ -508,7 +520,7 @@ Which digest algorithm to use for file resources and the filebucket\. Valid valu
|
|
508
520
|
If true, turns off all translations of Puppet and module log messages, which affects error, warning, and info log messages, as well as any translations in the report and CLI\.
|
509
521
|
.
|
510
522
|
.IP "\(bu" 4
|
511
|
-
\fIDefault\fR:
|
523
|
+
\fIDefault\fR: \fBfalse\fR
|
512
524
|
.
|
513
525
|
.IP "" 0
|
514
526
|
.
|
@@ -519,7 +531,7 @@ Whether to disallow an environment\-specific main manifest\. When set to \fBtrue
|
|
519
531
|
This setting requires \fBdefault_manifest\fR to be set to an absolute path\.
|
520
532
|
.
|
521
533
|
.IP "\(bu" 4
|
522
|
-
\fIDefault\fR:
|
534
|
+
\fIDefault\fR: \fBfalse\fR
|
523
535
|
.
|
524
536
|
.IP "" 0
|
525
537
|
.
|
@@ -542,7 +554,7 @@ Valid values for this setting are:
|
|
542
554
|
\fBundefined_resources\fR \-\-\- disables warnings about non existing resources\.
|
543
555
|
.
|
544
556
|
.IP "\(bu" 4
|
545
|
-
\fIDefault\fR: []
|
557
|
+
\fIDefault\fR: \fB[]\fR
|
546
558
|
.
|
547
559
|
.IP "" 0
|
548
560
|
.
|
@@ -553,7 +565,7 @@ A comma\-separated list of alternate DNS names for Puppet Server\. These are ext
|
|
553
565
|
In order to handle agent requests at a given hostname (like "puppet\.example\.com"), Puppet Server needs a certificate that proves it\'s allowed to use that name; if a server shows a certificate that doesn\'t include its hostname, Puppet agents will refuse to trust it\. If you use a single hostname for Puppet traffic but load\-balance it to multiple Puppet Servers, each of those servers needs to include the official hostname in its list of extra names\.
|
554
566
|
.
|
555
567
|
.P
|
556
|
-
\fBNote:\fR The list of alternate names is locked in when the server\'s certificate is signed\. If you need to change the list later, you can\'t just change this setting; you also need to regenerate the certificate\. For more information on that process, see the
|
568
|
+
\fBNote:\fR The list of alternate names is locked in when the server\'s certificate is signed\. If you need to change the list later, you can\'t just change this setting; you also need to regenerate the certificate\. For more information on that process, see the cert regen docs \fIhttps://puppet\.com/docs/puppet/latest/ssl_regenerate_certificates\.html\fR\.
|
557
569
|
.
|
558
570
|
.P
|
559
571
|
To see all the alternate names your servers are using, log into your CA server and run \fBpuppetserver ca list \-\-all\fR, then check the output for \fB(alt names: \.\.\.)\fR\. Most agent nodes should NOT have alternate names; the only certs that should have them are Puppet Server nodes that you want other agents to trust\.
|
@@ -562,7 +574,7 @@ To see all the alternate names your servers are using, log into your CA server a
|
|
562
574
|
Whether to document all resources when using \fBpuppet doc\fR to generate manifest documentation\.
|
563
575
|
.
|
564
576
|
.IP "\(bu" 4
|
565
|
-
\fIDefault\fR:
|
577
|
+
\fIDefault\fR: \fBfalse\fR
|
566
578
|
.
|
567
579
|
.IP "" 0
|
568
580
|
.
|
@@ -579,16 +591,17 @@ When defined in the \fB[user]\fR section, the environment refers to the path tha
|
|
579
591
|
Given that the context and effects vary depending on the config section \fIhttps://puppet\.com/docs/puppet/latest/config_file_main\.html#config\-sections\fR in which the \fBenvironment\fR setting is defined, do not set it globally\.
|
580
592
|
.
|
581
593
|
.IP "\(bu" 4
|
582
|
-
\fIDefault\fR:
|
594
|
+
\fIDefault\fR: \fBproduction\fR
|
583
595
|
.
|
584
596
|
.IP "" 0
|
585
597
|
.
|
586
598
|
.SS "environment_data_provider"
|
587
599
|
The name of a registered environment data provider used when obtaining environment specific data\. The three built in and registered providers are \'none\' (no data), \'function\' (data obtained by calling the function \'environment::data()\') and \'hiera\' (data obtained using a data provider configured using a hiera\.yaml file in root of the environment)\. Other environment data providers may be registered in modules on the module path\. For such custom data providers see the respective module documentation\. This setting is deprecated\.
|
588
600
|
.
|
589
|
-
.
|
590
|
-
\fIDefault\fR:
|
591
|
-
|
601
|
+
.IP "\(bu" 4
|
602
|
+
\fIDefault\fR: ``
|
603
|
+
.
|
604
|
+
.IP "" 0
|
592
605
|
.
|
593
606
|
.SS "environment_timeout"
|
594
607
|
How long the Puppet server should cache data it loads from an environment\.
|
@@ -611,7 +624,7 @@ Setting this to a number that will keep your most actively used environments cac
|
|
611
624
|
Once you set \fBenvironment_timeout\fR to a non\-zero value, you need to tell Puppet server to read new code from disk using the \fBenvironment\-cache\fR API endpoint after you deploy new code\. See the docs for the Puppet Server administrative API \fIhttps://puppet\.com/docs/puppetserver/latest/admin\-api/v1/environment\-cache\.html\fR\.
|
612
625
|
.
|
613
626
|
.IP "\(bu" 4
|
614
|
-
\fIDefault\fR:
|
627
|
+
\fIDefault\fR: \fB0\fR
|
615
628
|
.
|
616
629
|
.IP "" 0
|
617
630
|
.
|
@@ -619,7 +632,7 @@ Once you set \fBenvironment_timeout\fR to a non\-zero value, you need to tell Pu
|
|
619
632
|
How Puppet interprets the \fBenvironment_timeout\fR setting when \fBenvironment_timeout\fR is neither \fB0\fR nor \fBunlimited\fR\. If set to \fBfrom_created\fR, then the environment will be evicted \fBenvironment_timeout\fR seconds from when it was created\. If set to \fBfrom_last_used\fR then the environment will be evicted \fBenvironment_timeout\fR seconds from when it was last used\.
|
620
633
|
.
|
621
634
|
.IP "\(bu" 4
|
622
|
-
\fIDefault\fR:
|
635
|
+
\fIDefault\fR: \fBfrom_created\fR
|
623
636
|
.
|
624
637
|
.IP "" 0
|
625
638
|
.
|
@@ -630,7 +643,7 @@ A search path for directory environments, as a list of directories separated by
|
|
630
643
|
This setting must have a value set to enable \fBdirectory environments\.\fR The recommended value is \fB$codedir/environments\fR\. For more details, see \fIhttps://puppet\.com/docs/puppet/latest/environments_about\.html\fR
|
631
644
|
.
|
632
645
|
.IP "\(bu" 4
|
633
|
-
\fIDefault\fR: $codedir/environments
|
646
|
+
\fIDefault\fR: \fB$codedir/environments\fR
|
634
647
|
.
|
635
648
|
.IP "" 0
|
636
649
|
.
|
@@ -638,7 +651,7 @@ This setting must have a value set to enable \fBdirectory environments\.\fR The
|
|
638
651
|
Whether each resource should log when it is being evaluated\. This allows you to interactively see exactly what is being done\.
|
639
652
|
.
|
640
653
|
.IP "\(bu" 4
|
641
|
-
\fIDefault\fR:
|
654
|
+
\fIDefault\fR: \fBfalse\fR
|
642
655
|
.
|
643
656
|
.IP "" 0
|
644
657
|
.
|
@@ -680,7 +693,7 @@ Generally, an ENC script makes requests to an external data source\.
|
|
680
693
|
For more info, see the ENC documentation \fIhttps://puppet\.com/docs/puppet/latest/nodes_external\.html\fR\.
|
681
694
|
.
|
682
695
|
.IP "\(bu" 4
|
683
|
-
\fIDefault\fR:
|
696
|
+
\fIDefault\fR: \fBnone\fR
|
684
697
|
.
|
685
698
|
.IP "" 0
|
686
699
|
.
|
@@ -688,7 +701,7 @@ For more info, see the ENC documentation \fIhttps://puppet\.com/docs/puppet/late
|
|
688
701
|
Whether to enable a pre\-Facter 4\.0 release of Facter (distributed as the "facter\-ng" gem)\. This is not necessary if Facter 3\.x or later is installed\. This setting is still experimental\.
|
689
702
|
.
|
690
703
|
.IP "\(bu" 4
|
691
|
-
\fIDefault\fR:
|
704
|
+
\fIDefault\fR: \fBfalse\fR
|
692
705
|
.
|
693
706
|
.IP "" 0
|
694
707
|
.
|
@@ -696,7 +709,7 @@ Whether to enable a pre\-Facter 4\.0 release of Facter (distributed as the "fact
|
|
696
709
|
Where Puppet should look for facts\. Multiple directories should be separated by the system path separator character\. (The POSIX path separator is \':\', and the Windows path separator is \';\'\.)
|
697
710
|
.
|
698
711
|
.IP "\(bu" 4
|
699
|
-
\fIDefault\fR: $vardir/lib/facter:$vardir/facts
|
712
|
+
\fIDefault\fR: \fB$vardir/lib/facter:$vardir/facts\fR
|
700
713
|
.
|
701
714
|
.IP "" 0
|
702
715
|
.
|
@@ -704,7 +717,7 @@ Where Puppet should look for facts\. Multiple directories should be separated by
|
|
704
717
|
The node facts terminus\.
|
705
718
|
.
|
706
719
|
.IP "\(bu" 4
|
707
|
-
\fIDefault\fR:
|
720
|
+
\fIDefault\fR: \fBfacter\fR
|
708
721
|
.
|
709
722
|
.IP "" 0
|
710
723
|
.
|
@@ -712,7 +725,7 @@ The node facts terminus\.
|
|
712
725
|
Where the fileserver configuration is stored\.
|
713
726
|
.
|
714
727
|
.IP "\(bu" 4
|
715
|
-
\fIDefault\fR: $confdir/fileserver\.conf
|
728
|
+
\fIDefault\fR: \fB$confdir/fileserver\.conf\fR
|
716
729
|
.
|
717
730
|
.IP "" 0
|
718
731
|
.
|
@@ -720,22 +733,23 @@ Where the fileserver configuration is stored\.
|
|
720
733
|
The minimum time to wait between checking for updates in configuration files\. This timeout determines how quickly Puppet checks whether a file (such as manifests or puppet\.conf) has changed on disk\. The default will change in a future release to be \'unlimited\', requiring a reload of the Puppet service to pick up changes to its internal configuration\. Currently we do not accept a value of \'unlimited\'\. To reparse files within an environment in Puppet Server please use the environment_cache endpoint
|
721
734
|
.
|
722
735
|
.IP "\(bu" 4
|
723
|
-
\fIDefault\fR:
|
736
|
+
\fIDefault\fR: \fB15s\fR
|
724
737
|
.
|
725
738
|
.IP "" 0
|
726
739
|
.
|
727
740
|
.SS "forge_authorization"
|
728
741
|
The authorization key to connect to the Puppet Forge\. Leave blank for unauthorized or license based connections
|
729
742
|
.
|
730
|
-
.
|
731
|
-
\fIDefault\fR:
|
732
|
-
|
743
|
+
.IP "\(bu" 4
|
744
|
+
\fIDefault\fR: ``
|
745
|
+
.
|
746
|
+
.IP "" 0
|
733
747
|
.
|
734
748
|
.SS "freeze_main"
|
735
749
|
Freezes the \'main\' class, disallowing any code to be added to it\. This essentially means that you can\'t have any code outside of a node, class, or definition other than in the site manifest\.
|
736
750
|
.
|
737
751
|
.IP "\(bu" 4
|
738
|
-
\fIDefault\fR:
|
752
|
+
\fIDefault\fR: \fBfalse\fR
|
739
753
|
.
|
740
754
|
.IP "" 0
|
741
755
|
.
|
@@ -743,7 +757,7 @@ Freezes the \'main\' class, disallowing any code to be added to it\. This essent
|
|
743
757
|
Causes validation of loaded legacy Ruby functions (3x API) to raise errors about illegal constructs that could cause harm or that simply does not work\. This flag is on by default\. This flag is made available so that the validation can be turned off in case the method of validation is faulty \- if encountered, please file a bug report\.
|
744
758
|
.
|
745
759
|
.IP "\(bu" 4
|
746
|
-
\fIDefault\fR:
|
760
|
+
\fIDefault\fR: \fBtrue\fR
|
747
761
|
.
|
748
762
|
.IP "" 0
|
749
763
|
.
|
@@ -751,7 +765,7 @@ Causes validation of loaded legacy Ruby functions (3x API) to raise errors about
|
|
751
765
|
Whether or not to enable all features currently being developed for future major releases of Puppet\. Should be used with caution, as in development features are experimental and can have unexpected effects\.
|
752
766
|
.
|
753
767
|
.IP "\(bu" 4
|
754
|
-
\fIDefault\fR:
|
768
|
+
\fIDefault\fR: \fBfalse\fR
|
755
769
|
.
|
756
770
|
.IP "" 0
|
757
771
|
.
|
@@ -759,7 +773,7 @@ Whether or not to enable all features currently being developed for future major
|
|
759
773
|
When true, causes Puppet applications to print an example config file to stdout and exit\. The example will include descriptions of each setting, and the current (or default) value of each setting, incorporating any settings overridden on the CLI (with the exception of \fBgenconfig\fR itself)\. This setting only makes sense when specified on the command line as \fB\-\-genconfig\fR\.
|
760
774
|
.
|
761
775
|
.IP "\(bu" 4
|
762
|
-
\fIDefault\fR:
|
776
|
+
\fIDefault\fR: \fBfalse\fR
|
763
777
|
.
|
764
778
|
.IP "" 0
|
765
779
|
.
|
@@ -767,7 +781,7 @@ When true, causes Puppet applications to print an example config file to stdout
|
|
767
781
|
Whether to just print a manifest to stdout and exit\. Only makes sense when specified on the command line as \fB\-\-genmanifest\fR\. Takes into account arguments specified on the CLI\.
|
768
782
|
.
|
769
783
|
.IP "\(bu" 4
|
770
|
-
\fIDefault\fR:
|
784
|
+
\fIDefault\fR: \fBfalse\fR
|
771
785
|
.
|
772
786
|
.IP "" 0
|
773
787
|
.
|
@@ -784,7 +798,7 @@ The \fBgraphdir\fR setting determines where Puppet will save graphs\. Note that
|
|
784
798
|
See your graphing software\'s documentation for details on opening \.dot files\. If you\'re using GraphViz\'s \fBdot\fR command, you can do a quick PNG render with \fBdot \-Tpng <DOT FILE> \-o <OUTPUT FILE>\fR\.
|
785
799
|
.
|
786
800
|
.IP "\(bu" 4
|
787
|
-
\fIDefault\fR:
|
801
|
+
\fIDefault\fR: \fBfalse\fR
|
788
802
|
.
|
789
803
|
.IP "" 0
|
790
804
|
.
|
@@ -792,7 +806,7 @@ See your graphing software\'s documentation for details on opening \.dot files\.
|
|
792
806
|
Where to save \.dot\-format graphs (when the \fBgraph\fR setting is enabled)\.
|
793
807
|
.
|
794
808
|
.IP "\(bu" 4
|
795
|
-
\fIDefault\fR: $statedir/graphs
|
809
|
+
\fIDefault\fR: \fB$statedir/graphs\fR
|
796
810
|
.
|
797
811
|
.IP "" 0
|
798
812
|
.
|
@@ -800,7 +814,7 @@ Where to save \.dot\-format graphs (when the \fBgraph\fR setting is enabled)\.
|
|
800
814
|
The group Puppet Server will run as\. Used to ensure the agent side processes (agent, apply, etc) create files and directories readable by Puppet Server when necessary\.
|
801
815
|
.
|
802
816
|
.IP "\(bu" 4
|
803
|
-
\fIDefault\fR:
|
817
|
+
\fIDefault\fR: \fBpuppet\fR
|
804
818
|
.
|
805
819
|
.IP "" 0
|
806
820
|
.
|
@@ -808,7 +822,7 @@ The group Puppet Server will run as\. Used to ensure the agent side processes (a
|
|
808
822
|
The hiera configuration file\. Puppet only reads this file on startup, so you must restart the puppet server every time you edit it\.
|
809
823
|
.
|
810
824
|
.IP "\(bu" 4
|
811
|
-
\fIDefault\fR: $confdir/hiera\.yaml\. However, for backwards compatibility, if a file exists at $codedir/hiera\.yaml, Puppet uses that instead
|
825
|
+
\fIDefault\fR: \fB$confdir/hiera\.yaml\. However, for backwards compatibility, if a file exists at $codedir/hiera\.yaml, Puppet uses that instead\.\fR
|
812
826
|
.
|
813
827
|
.IP "" 0
|
814
828
|
.
|
@@ -816,7 +830,7 @@ The hiera configuration file\. Puppet only reads this file on startup, so you mu
|
|
816
830
|
Where individual hosts store and look for their certificates\.
|
817
831
|
.
|
818
832
|
.IP "\(bu" 4
|
819
|
-
\fIDefault\fR: $certdir/$certname\.pem
|
833
|
+
\fIDefault\fR: \fB$certdir/$certname\.pem\fR
|
820
834
|
.
|
821
835
|
.IP "" 0
|
822
836
|
.
|
@@ -824,7 +838,7 @@ Where individual hosts store and look for their certificates\.
|
|
824
838
|
Where the host\'s certificate revocation list can be found\. This is distinct from the certificate authority\'s CRL\.
|
825
839
|
.
|
826
840
|
.IP "\(bu" 4
|
827
|
-
\fIDefault\fR: $ssldir/crl\.pem
|
841
|
+
\fIDefault\fR: \fB$ssldir/crl\.pem\fR
|
828
842
|
.
|
829
843
|
.IP "" 0
|
830
844
|
.
|
@@ -832,7 +846,7 @@ Where the host\'s certificate revocation list can be found\. This is distinct fr
|
|
832
846
|
This setting is deprecated\.
|
833
847
|
.
|
834
848
|
.IP "\(bu" 4
|
835
|
-
\fIDefault\fR: $ssldir/csr_$certname\.pem
|
849
|
+
\fIDefault\fR: \fB$ssldir/csr_$certname\.pem\fR
|
836
850
|
.
|
837
851
|
.IP "" 0
|
838
852
|
.
|
@@ -840,7 +854,7 @@ This setting is deprecated\.
|
|
840
854
|
Where individual hosts store and look for their private key\.
|
841
855
|
.
|
842
856
|
.IP "\(bu" 4
|
843
|
-
\fIDefault\fR: $privatekeydir/$certname\.pem
|
857
|
+
\fIDefault\fR: \fB$privatekeydir/$certname\.pem\fR
|
844
858
|
.
|
845
859
|
.IP "" 0
|
846
860
|
.
|
@@ -848,7 +862,7 @@ Where individual hosts store and look for their private key\.
|
|
848
862
|
Where individual hosts store and look for their public key\.
|
849
863
|
.
|
850
864
|
.IP "\(bu" 4
|
851
|
-
\fIDefault\fR: $publickeydir/$certname\.pem
|
865
|
+
\fIDefault\fR: \fB$publickeydir/$certname\.pem\fR
|
852
866
|
.
|
853
867
|
.IP "" 0
|
854
868
|
.
|
@@ -856,7 +870,7 @@ Where individual hosts store and look for their public key\.
|
|
856
870
|
The maximum amount of time to wait when establishing an HTTP connection\. The default value is 2 minutes\. This setting can be a time interval in seconds (30 or 30s), minutes (30m), hours (6h), days (2d), or years (5y)\.
|
857
871
|
.
|
858
872
|
.IP "\(bu" 4
|
859
|
-
\fIDefault\fR:
|
873
|
+
\fIDefault\fR: \fB2m\fR
|
860
874
|
.
|
861
875
|
.IP "" 0
|
862
876
|
.
|
@@ -864,7 +878,7 @@ The maximum amount of time to wait when establishing an HTTP connection\. The de
|
|
864
878
|
Whether to write HTTP request and responses to stderr\. This should never be used in a production environment\.
|
865
879
|
.
|
866
880
|
.IP "\(bu" 4
|
867
|
-
\fIDefault\fR:
|
881
|
+
\fIDefault\fR: \fBfalse\fR
|
868
882
|
.
|
869
883
|
.IP "" 0
|
870
884
|
.
|
@@ -872,7 +886,7 @@ Whether to write HTTP request and responses to stderr\. This should never be use
|
|
872
886
|
The list of extra headers that will be sent with http requests to the master\. The header definition consists of a name and a value separated by a colon\.
|
873
887
|
.
|
874
888
|
.IP "\(bu" 4
|
875
|
-
\fIDefault\fR: []
|
889
|
+
\fIDefault\fR: \fB[]\fR
|
876
890
|
.
|
877
891
|
.IP "" 0
|
878
892
|
.
|
@@ -880,7 +894,7 @@ The list of extra headers that will be sent with http requests to the master\. T
|
|
880
894
|
The maximum amount of time a persistent HTTP connection can remain idle in the connection pool, before it is closed\. This timeout should be shorter than the keepalive timeout used on the HTTP server, e\.g\. Apache KeepAliveTimeout directive\. This setting can be a time interval in seconds (30 or 30s), minutes (30m), hours (6h), days (2d), or years (5y)\.
|
881
895
|
.
|
882
896
|
.IP "\(bu" 4
|
883
|
-
\fIDefault\fR:
|
897
|
+
\fIDefault\fR: \fB4s\fR
|
884
898
|
.
|
885
899
|
.IP "" 0
|
886
900
|
.
|
@@ -888,7 +902,7 @@ The maximum amount of time a persistent HTTP connection can remain idle in the c
|
|
888
902
|
The HTTP proxy host to use for outgoing connections\. The proxy will be bypassed if the server\'s hostname matches the NO_PROXY environment variable or \fBno_proxy\fR setting\. Note: You may need to use a FQDN for the server hostname when using a proxy\. Environment variable http_proxy or HTTP_PROXY will override this value\.
|
889
903
|
.
|
890
904
|
.IP "\(bu" 4
|
891
|
-
\fIDefault\fR:
|
905
|
+
\fIDefault\fR: \fBnone\fR
|
892
906
|
.
|
893
907
|
.IP "" 0
|
894
908
|
.
|
@@ -899,7 +913,7 @@ The password for the user of an authenticated HTTP proxy\. Requires the \fBhttp_
|
|
899
913
|
Note that passwords must be valid when used as part of a URL\. If a password contains any characters with special meanings in URLs (as specified by RFC 3986 section 2\.2), they must be URL\-encoded\. (For example, \fB#\fR would become \fB%23\fR\.)
|
900
914
|
.
|
901
915
|
.IP "\(bu" 4
|
902
|
-
\fIDefault\fR:
|
916
|
+
\fIDefault\fR: \fBnone\fR
|
903
917
|
.
|
904
918
|
.IP "" 0
|
905
919
|
.
|
@@ -907,7 +921,7 @@ Note that passwords must be valid when used as part of a URL\. If a password con
|
|
907
921
|
The HTTP proxy port to use for outgoing connections
|
908
922
|
.
|
909
923
|
.IP "\(bu" 4
|
910
|
-
\fIDefault\fR:
|
924
|
+
\fIDefault\fR: \fB3128\fR
|
911
925
|
.
|
912
926
|
.IP "" 0
|
913
927
|
.
|
@@ -915,7 +929,7 @@ The HTTP proxy port to use for outgoing connections
|
|
915
929
|
The user name for an authenticated HTTP proxy\. Requires the \fBhttp_proxy_host\fR setting\.
|
916
930
|
.
|
917
931
|
.IP "\(bu" 4
|
918
|
-
\fIDefault\fR:
|
932
|
+
\fIDefault\fR: \fBnone\fR
|
919
933
|
.
|
920
934
|
.IP "" 0
|
921
935
|
.
|
@@ -923,7 +937,7 @@ The user name for an authenticated HTTP proxy\. Requires the \fBhttp_proxy_host\
|
|
923
937
|
The time to wait for data to be read from an HTTP connection\. If nothing is read after the elapsed interval then the connection will be closed\. The default value is 10 minutes\. This setting can be a time interval in seconds (30 or 30s), minutes (30m), hours (6h), days (2d), or years (5y)\.
|
924
938
|
.
|
925
939
|
.IP "\(bu" 4
|
926
|
-
\fIDefault\fR:
|
940
|
+
\fIDefault\fR: \fB10m\fR
|
927
941
|
.
|
928
942
|
.IP "" 0
|
929
943
|
.
|
@@ -931,7 +945,7 @@ The time to wait for data to be read from an HTTP connection\. If nothing is rea
|
|
931
945
|
The HTTP User\-Agent string to send when making network requests\.
|
932
946
|
.
|
933
947
|
.IP "\(bu" 4
|
934
|
-
\fIDefault\fR:
|
948
|
+
\fIDefault\fR: \fBPuppet/6\.24\.0 Ruby/2\.5\.1\-p57 (x86_64\-linux)\fR
|
935
949
|
.
|
936
950
|
.IP "" 0
|
937
951
|
.
|
@@ -939,7 +953,7 @@ The HTTP User\-Agent string to send when making network requests\.
|
|
939
953
|
Whether the puppet run should ignore errors during pluginsync\. If the setting is false and there are errors during pluginsync, then the agent will abort the run and submit a report containing information about the failed run\.
|
940
954
|
.
|
941
955
|
.IP "\(bu" 4
|
942
|
-
\fIDefault\fR:
|
956
|
+
\fIDefault\fR: \fBtrue\fR
|
943
957
|
.
|
944
958
|
.IP "" 0
|
945
959
|
.
|
@@ -947,7 +961,7 @@ Whether the puppet run should ignore errors during pluginsync\. If the setting i
|
|
947
961
|
Skip searching for classes and definitions that were missing during a prior compilation\. The list of missing objects is maintained per\-environment and persists until the environment is cleared or the master is restarted\.
|
948
962
|
.
|
949
963
|
.IP "\(bu" 4
|
950
|
-
\fIDefault\fR:
|
964
|
+
\fIDefault\fR: \fBfalse\fR
|
951
965
|
.
|
952
966
|
.IP "" 0
|
953
967
|
.
|
@@ -955,7 +969,7 @@ Skip searching for classes and definitions that were missing during a prior comp
|
|
955
969
|
Boolean; whether puppet agent should ignore schedules\. This is useful for initial puppet agent runs\.
|
956
970
|
.
|
957
971
|
.IP "\(bu" 4
|
958
|
-
\fIDefault\fR:
|
972
|
+
\fIDefault\fR: \fBfalse\fR
|
959
973
|
.
|
960
974
|
.IP "" 0
|
961
975
|
.
|
@@ -963,7 +977,7 @@ Boolean; whether puppet agent should ignore schedules\. This is useful for initi
|
|
963
977
|
The type of private key\. Valid values are \fBrsa\fR and \fBec\fR\. Default is \fBrsa\fR\.
|
964
978
|
.
|
965
979
|
.IP "\(bu" 4
|
966
|
-
\fIDefault\fR:
|
980
|
+
\fIDefault\fR: \fBrsa\fR
|
967
981
|
.
|
968
982
|
.IP "" 0
|
969
983
|
.
|
@@ -971,7 +985,7 @@ The type of private key\. Valid values are \fBrsa\fR and \fBec\fR\. Default is \
|
|
971
985
|
The bit length of keys\.
|
972
986
|
.
|
973
987
|
.IP "\(bu" 4
|
974
|
-
\fIDefault\fR:
|
988
|
+
\fIDefault\fR: \fB4096\fR
|
975
989
|
.
|
976
990
|
.IP "" 0
|
977
991
|
.
|
@@ -979,7 +993,7 @@ The bit length of keys\.
|
|
979
993
|
Where puppet agent stores the last run report summary in yaml format\.
|
980
994
|
.
|
981
995
|
.IP "\(bu" 4
|
982
|
-
\fIDefault\fR: $statedir/last_run_summary\.yaml
|
996
|
+
\fIDefault\fR: \fB$statedir/last_run_summary\.yaml\fR
|
983
997
|
.
|
984
998
|
.IP "" 0
|
985
999
|
.
|
@@ -987,7 +1001,7 @@ Where puppet agent stores the last run report summary in yaml format\.
|
|
987
1001
|
Where Puppet Agent stores the last run report, by default, in yaml format\. The format of the report can be changed by setting the \fBcache\fR key of the \fBreport\fR terminus in the routes\.yaml \fIhttps://puppet\.com/docs/puppet/latest/config_file_routes\.html\fR file\. To avoid mismatches between content and file extension, this setting needs to be manually updated to reflect the terminus changes\.
|
988
1002
|
.
|
989
1003
|
.IP "\(bu" 4
|
990
|
-
\fIDefault\fR: $statedir/last_run_report\.yaml
|
1004
|
+
\fIDefault\fR: \fB$statedir/last_run_report\.yaml\fR
|
991
1005
|
.
|
992
1006
|
.IP "" 0
|
993
1007
|
.
|
@@ -995,7 +1009,7 @@ Where Puppet Agent stores the last run report, by default, in yaml format\. The
|
|
995
1009
|
The LDAP attributes to include when querying LDAP for nodes\. All returned attributes are set as variables in the top\-level scope\. Multiple values should be comma\-separated\. The value \'all\' returns all attributes\.
|
996
1010
|
.
|
997
1011
|
.IP "\(bu" 4
|
998
|
-
\fIDefault\fR:
|
1012
|
+
\fIDefault\fR: \fBall\fR
|
999
1013
|
.
|
1000
1014
|
.IP "" 0
|
1001
1015
|
.
|
@@ -1006,7 +1020,7 @@ The search base for LDAP searches\. It\'s impossible to provide a meaningful def
|
|
1006
1020
|
The LDAP attributes to use to define Puppet classes\. Values should be comma\-separated\.
|
1007
1021
|
.
|
1008
1022
|
.IP "\(bu" 4
|
1009
|
-
\fIDefault\fR:
|
1023
|
+
\fIDefault\fR: \fBpuppetclass\fR
|
1010
1024
|
.
|
1011
1025
|
.IP "" 0
|
1012
1026
|
.
|
@@ -1014,7 +1028,7 @@ The LDAP attributes to use to define Puppet classes\. Values should be comma\-se
|
|
1014
1028
|
The attribute to use to define the parent node\.
|
1015
1029
|
.
|
1016
1030
|
.IP "\(bu" 4
|
1017
|
-
\fIDefault\fR:
|
1031
|
+
\fIDefault\fR: \fBparentnode\fR
|
1018
1032
|
.
|
1019
1033
|
.IP "" 0
|
1020
1034
|
.
|
@@ -1025,7 +1039,7 @@ The password to use to connect to LDAP\.
|
|
1025
1039
|
The LDAP port\.
|
1026
1040
|
.
|
1027
1041
|
.IP "\(bu" 4
|
1028
|
-
\fIDefault\fR:
|
1042
|
+
\fIDefault\fR: \fB389\fR
|
1029
1043
|
.
|
1030
1044
|
.IP "" 0
|
1031
1045
|
.
|
@@ -1033,7 +1047,7 @@ The LDAP port\.
|
|
1033
1047
|
The LDAP server\.
|
1034
1048
|
.
|
1035
1049
|
.IP "\(bu" 4
|
1036
|
-
\fIDefault\fR:
|
1050
|
+
\fIDefault\fR: \fBldap\fR
|
1037
1051
|
.
|
1038
1052
|
.IP "" 0
|
1039
1053
|
.
|
@@ -1041,7 +1055,7 @@ The LDAP server\.
|
|
1041
1055
|
Whether SSL should be used when searching for nodes\. Defaults to false because SSL usually requires certificates to be set up on the client side\.
|
1042
1056
|
.
|
1043
1057
|
.IP "\(bu" 4
|
1044
|
-
\fIDefault\fR:
|
1058
|
+
\fIDefault\fR: \fBfalse\fR
|
1045
1059
|
.
|
1046
1060
|
.IP "" 0
|
1047
1061
|
.
|
@@ -1049,7 +1063,7 @@ Whether SSL should be used when searching for nodes\. Defaults to false because
|
|
1049
1063
|
The LDAP attributes that should be stacked to arrays by adding the values in all hierarchy elements of the tree\. Values should be comma\-separated\.
|
1050
1064
|
.
|
1051
1065
|
.IP "\(bu" 4
|
1052
|
-
\fIDefault\fR:
|
1066
|
+
\fIDefault\fR: \fBpuppetvar\fR
|
1053
1067
|
.
|
1054
1068
|
.IP "" 0
|
1055
1069
|
.
|
@@ -1057,7 +1071,7 @@ The LDAP attributes that should be stacked to arrays by adding the values in all
|
|
1057
1071
|
The search string used to find an LDAP node\.
|
1058
1072
|
.
|
1059
1073
|
.IP "\(bu" 4
|
1060
|
-
\fIDefault\fR: (&(objectclass=puppetClient)(cn=%s))
|
1074
|
+
\fIDefault\fR: \fB(&(objectclass=puppetClient)(cn=%s))\fR
|
1061
1075
|
.
|
1062
1076
|
.IP "" 0
|
1063
1077
|
.
|
@@ -1065,7 +1079,7 @@ The search string used to find an LDAP node\.
|
|
1065
1079
|
Whether TLS should be used when searching for nodes\. Defaults to false because TLS usually requires certificates to be set up on the client side\.
|
1066
1080
|
.
|
1067
1081
|
.IP "\(bu" 4
|
1068
|
-
\fIDefault\fR:
|
1082
|
+
\fIDefault\fR: \fBfalse\fR
|
1069
1083
|
.
|
1070
1084
|
.IP "" 0
|
1071
1085
|
.
|
@@ -1076,7 +1090,7 @@ The user to use to connect to LDAP\. Must be specified as a full DN\.
|
|
1076
1090
|
An extra search path for Puppet\. This is only useful for those files that Puppet will load on demand, and is only guaranteed to work for those cases\. In fact, the autoload mechanism is responsible for making sure this directory is in Ruby\'s search path
|
1077
1091
|
.
|
1078
1092
|
.IP "\(bu" 4
|
1079
|
-
\fIDefault\fR: $vardir/lib
|
1093
|
+
\fIDefault\fR: \fB$vardir/lib\fR
|
1080
1094
|
.
|
1081
1095
|
.IP "" 0
|
1082
1096
|
.
|
@@ -1084,7 +1098,7 @@ An extra search path for Puppet\. This is only useful for those files that Puppe
|
|
1084
1098
|
Where each client stores the CA certificate\.
|
1085
1099
|
.
|
1086
1100
|
.IP "\(bu" 4
|
1087
|
-
\fIDefault\fR: $certdir/ca\.pem
|
1101
|
+
\fIDefault\fR: \fB$certdir/ca\.pem\fR
|
1088
1102
|
.
|
1089
1103
|
.IP "" 0
|
1090
1104
|
.
|
@@ -1092,7 +1106,7 @@ Where each client stores the CA certificate\.
|
|
1092
1106
|
Where Puppet should store translation files that it pulls down from the central server\.
|
1093
1107
|
.
|
1094
1108
|
.IP "\(bu" 4
|
1095
|
-
\fIDefault\fR: $vardir/locales
|
1109
|
+
\fIDefault\fR: \fB$vardir/locales\fR
|
1096
1110
|
.
|
1097
1111
|
.IP "" 0
|
1098
1112
|
.
|
@@ -1100,7 +1114,7 @@ Where Puppet should store translation files that it pulls down from the central
|
|
1100
1114
|
From where to retrieve translation files\. The standard Puppet \fBfile\fR type is used for retrieval, so anything that is a valid file source can be used here\.
|
1101
1115
|
.
|
1102
1116
|
.IP "\(bu" 4
|
1103
|
-
\fIDefault\fR:
|
1117
|
+
\fIDefault\fR: \fBpuppet:///locales\fR
|
1104
1118
|
.
|
1105
1119
|
.IP "" 0
|
1106
1120
|
.
|
@@ -1132,22 +1146,23 @@ emerg
|
|
1132
1146
|
crit
|
1133
1147
|
.
|
1134
1148
|
.IP "\(bu" 4
|
1135
|
-
\fIDefault\fR:
|
1149
|
+
\fIDefault\fR: \fBnotice\fR
|
1136
1150
|
.
|
1137
1151
|
.IP "" 0
|
1138
1152
|
.
|
1139
1153
|
.SS "logdest"
|
1140
1154
|
Where to send log messages\. Choose between \'syslog\' (the POSIX syslog service), \'eventlog\' (the Windows Event Log), \'console\', or the path to a log file\. Multiple destinations can be set using a comma separated list (eg: \fB/path/file1,console,/path/file2\fR)
|
1141
1155
|
.
|
1142
|
-
.
|
1143
|
-
\fIDefault\fR:
|
1144
|
-
|
1156
|
+
.IP "\(bu" 4
|
1157
|
+
\fIDefault\fR: ``
|
1158
|
+
.
|
1159
|
+
.IP "" 0
|
1145
1160
|
.
|
1146
1161
|
.SS "logdir"
|
1147
1162
|
The directory in which to store log files
|
1148
1163
|
.
|
1149
1164
|
.IP "\(bu" 4
|
1150
|
-
\fIDefault\fR:
|
1165
|
+
\fIDefault\fR: \fBUnix/Linux: /var/log/puppetlabs/puppet \-\- Windows: C:\eProgramData\ePuppetLabs\epuppet\evar\elog \-\- Non\-root user: ~/\.puppetlabs/var/log\fR
|
1151
1166
|
.
|
1152
1167
|
.IP "" 0
|
1153
1168
|
.
|
@@ -1155,7 +1170,7 @@ The directory in which to store log files
|
|
1155
1170
|
Whether Puppet should manage the owner, group, and mode of files it uses internally\. \fBNote\fR: For Windows agents, the default is \fBfalse\fR for versions 4\.10\.13 and greater, versions 5\.5\.6 and greater, and versions 6\.0 and greater\.
|
1156
1171
|
.
|
1157
1172
|
.IP "\(bu" 4
|
1158
|
-
\fIDefault\fR:
|
1173
|
+
\fIDefault\fR: \fBtrue\fR
|
1159
1174
|
.
|
1160
1175
|
.IP "" 0
|
1161
1176
|
.
|
@@ -1165,15 +1180,16 @@ The entry\-point manifest for puppet master\. This can be one file or a director
|
|
1165
1180
|
.P
|
1166
1181
|
Setting a global value for \fBmanifest\fR in puppet\.conf is not allowed (but it can be overridden from the commandline)\. Please use directory environments instead\. If you need to use something other than the environment\'s \fBmanifests\fR directory as the main manifest, you can set \fBmanifest\fR in environment\.conf\. For more info, see \fIhttps://puppet\.com/docs/puppet/latest/environments_about\.html\fR
|
1167
1182
|
.
|
1168
|
-
.
|
1169
|
-
\fIDefault\fR:
|
1170
|
-
|
1183
|
+
.IP "\(bu" 4
|
1184
|
+
\fIDefault\fR: ``
|
1185
|
+
.
|
1186
|
+
.IP "" 0
|
1171
1187
|
.
|
1172
1188
|
.SS "masterport"
|
1173
1189
|
The default port puppet subcommands use to communicate with Puppet Server\. (eg \fBpuppet facts upload\fR, \fBpuppet agent\fR)\. May be overridden by more specific settings (see \fBca_port\fR, \fBreport_port\fR)\.
|
1174
1190
|
.
|
1175
1191
|
.IP "\(bu" 4
|
1176
|
-
\fIDefault\fR:
|
1192
|
+
\fIDefault\fR: \fB8140\fR
|
1177
1193
|
.
|
1178
1194
|
.IP "" 0
|
1179
1195
|
.
|
@@ -1181,7 +1197,7 @@ The default port puppet subcommands use to communicate with Puppet Server\. (eg
|
|
1181
1197
|
Sets the max number of logged/displayed parser validation deprecation warnings in case multiple deprecation warnings have been detected\. A value of 0 blocks the logging of deprecation warnings\. The count is per manifest\.
|
1182
1198
|
.
|
1183
1199
|
.IP "\(bu" 4
|
1184
|
-
\fIDefault\fR:
|
1200
|
+
\fIDefault\fR: \fB10\fR
|
1185
1201
|
.
|
1186
1202
|
.IP "" 0
|
1187
1203
|
.
|
@@ -1189,7 +1205,7 @@ Sets the max number of logged/displayed parser validation deprecation warnings i
|
|
1189
1205
|
Sets the max number of logged/displayed parser validation errors in case multiple errors have been detected\. A value of 0 is the same as a value of 1; a minimum of one error is always raised\. The count is per manifest\.
|
1190
1206
|
.
|
1191
1207
|
.IP "\(bu" 4
|
1192
|
-
\fIDefault\fR:
|
1208
|
+
\fIDefault\fR: \fB10\fR
|
1193
1209
|
.
|
1194
1210
|
.IP "" 0
|
1195
1211
|
.
|
@@ -1197,7 +1213,7 @@ Sets the max number of logged/displayed parser validation errors in case multipl
|
|
1197
1213
|
Sets the max number of logged/displayed parser validation warnings in case multiple warnings have been detected\. A value of 0 blocks logging of warnings\. The count is per manifest\.
|
1198
1214
|
.
|
1199
1215
|
.IP "\(bu" 4
|
1200
|
-
\fIDefault\fR:
|
1216
|
+
\fIDefault\fR: \fB10\fR
|
1201
1217
|
.
|
1202
1218
|
.IP "" 0
|
1203
1219
|
.
|
@@ -1205,7 +1221,7 @@ Sets the max number of logged/displayed parser validation warnings in case multi
|
|
1205
1221
|
The maximum allowed UID\. Some platforms use negative UIDs but then ship with tools that do not know how to handle signed ints, so the UIDs show up as huge numbers that can then not be fed back into the system\. This is a hackish way to fail in a slightly more useful way when that happens\.
|
1206
1222
|
.
|
1207
1223
|
.IP "\(bu" 4
|
1208
|
-
\fIDefault\fR:
|
1224
|
+
\fIDefault\fR: \fB4294967290\fR
|
1209
1225
|
.
|
1210
1226
|
.IP "" 0
|
1211
1227
|
.
|
@@ -1213,7 +1229,7 @@ The maximum allowed UID\. Some platforms use negative UIDs but then ship with to
|
|
1213
1229
|
The maximum amount of time the Puppet agent should wait for its certificate request to be signed\. A value of \fBunlimited\fR will cause puppet agent to ask for a signed certificate indefinitely\. This setting can be a time interval in seconds (30 or 30s), minutes (30m), hours (6h), days (2d), or years (5y)\.
|
1214
1230
|
.
|
1215
1231
|
.IP "\(bu" 4
|
1216
|
-
\fIDefault\fR:
|
1232
|
+
\fIDefault\fR: \fBunlimited\fR
|
1217
1233
|
.
|
1218
1234
|
.IP "" 0
|
1219
1235
|
.
|
@@ -1221,7 +1237,7 @@ The maximum amount of time the Puppet agent should wait for its certificate requ
|
|
1221
1237
|
The maximum amount of time the puppet agent should wait for an already running puppet agent to finish before starting a new one\. This is set by default to 1 minute\. A value of \fBunlimited\fR will cause puppet agent to wait indefinitely\. This setting can be a time interval in seconds (30 or 30s), minutes (30m), hours (6h), days (2d), or years (5y)\.
|
1222
1238
|
.
|
1223
1239
|
.IP "\(bu" 4
|
1224
|
-
\fIDefault\fR:
|
1240
|
+
\fIDefault\fR: \fB1m\fR
|
1225
1241
|
.
|
1226
1242
|
.IP "" 0
|
1227
1243
|
.
|
@@ -1235,7 +1251,7 @@ When a class has a failed dependency, every resource in the class generates a no
|
|
1235
1251
|
If true, all messages caused by a class dependency failure are merged into one message associated with the class\.
|
1236
1252
|
.
|
1237
1253
|
.IP "\(bu" 4
|
1238
|
-
\fIDefault\fR:
|
1254
|
+
\fIDefault\fR: \fBfalse\fR
|
1239
1255
|
.
|
1240
1256
|
.IP "" 0
|
1241
1257
|
.
|
@@ -1243,22 +1259,23 @@ If true, all messages caused by a class dependency failure are merged into one m
|
|
1243
1259
|
Whether to create the necessary user and group that puppet agent will run as\.
|
1244
1260
|
.
|
1245
1261
|
.IP "\(bu" 4
|
1246
|
-
\fIDefault\fR:
|
1262
|
+
\fIDefault\fR: \fBfalse\fR
|
1247
1263
|
.
|
1248
1264
|
.IP "" 0
|
1249
1265
|
.
|
1250
1266
|
.SS "module_groups"
|
1251
1267
|
Extra module groups to request from the Puppet Forge\. This is an internal setting, and users should never change it\.
|
1252
1268
|
.
|
1253
|
-
.
|
1254
|
-
\fIDefault\fR:
|
1255
|
-
|
1269
|
+
.IP "\(bu" 4
|
1270
|
+
\fIDefault\fR: ``
|
1271
|
+
.
|
1272
|
+
.IP "" 0
|
1256
1273
|
.
|
1257
1274
|
.SS "module_repository"
|
1258
1275
|
The module repository
|
1259
1276
|
.
|
1260
1277
|
.IP "\(bu" 4
|
1261
|
-
\fIDefault\fR:
|
1278
|
+
\fIDefault\fR: \fBhttps://forgeapi\.puppet\.com\fR
|
1262
1279
|
.
|
1263
1280
|
.IP "" 0
|
1264
1281
|
.
|
@@ -1266,7 +1283,7 @@ The module repository
|
|
1266
1283
|
The directory into which module tool data is stored
|
1267
1284
|
.
|
1268
1285
|
.IP "\(bu" 4
|
1269
|
-
\fIDefault\fR: $vardir/puppet\-module
|
1286
|
+
\fIDefault\fR: \fB$vardir/puppet\-module\fR
|
1270
1287
|
.
|
1271
1288
|
.IP "" 0
|
1272
1289
|
.
|
@@ -1279,15 +1296,16 @@ Setting a global value for \fBmodulepath\fR in puppet\.conf is not allowed (but
|
|
1279
1296
|
.SS "name"
|
1280
1297
|
The name of the application, if we are running as one\. The default is essentially $0 without the path or \fB\.rb\fR\.
|
1281
1298
|
.
|
1282
|
-
.
|
1283
|
-
\fIDefault\fR:
|
1284
|
-
|
1299
|
+
.IP "\(bu" 4
|
1300
|
+
\fIDefault\fR: ``
|
1301
|
+
.
|
1302
|
+
.IP "" 0
|
1285
1303
|
.
|
1286
1304
|
.SS "named_curve"
|
1287
1305
|
The short name for the EC curve used to generate the EC private key\. Valid values must be one of the curves in \fBOpenSSL::PKey::EC\.builtin_curves\fR\. Default is \fBprime256v1\fR\.
|
1288
1306
|
.
|
1289
1307
|
.IP "\(bu" 4
|
1290
|
-
\fIDefault\fR:
|
1308
|
+
\fIDefault\fR: \fBprime256v1\fR
|
1291
1309
|
.
|
1292
1310
|
.IP "" 0
|
1293
1311
|
.
|
@@ -1295,16 +1313,17 @@ The short name for the EC curve used to generate the EC private key\. Valid valu
|
|
1295
1313
|
List of host or domain names that should not go through \fBhttp_proxy_host\fR\. Environment variable no_proxy or NO_PROXY will override this value\. Names can be specified as an FQDN \fBhost\.example\.com\fR, wildcard \fB*\.example\.com\fR, dotted domain \fB\.example\.com\fR, or suffix \fBexample\.com\fR\.
|
1296
1314
|
.
|
1297
1315
|
.IP "\(bu" 4
|
1298
|
-
\fIDefault\fR:
|
1316
|
+
\fIDefault\fR: \fBlocalhost, 127\.0\.0\.1\fR
|
1299
1317
|
.
|
1300
1318
|
.IP "" 0
|
1301
1319
|
.
|
1302
1320
|
.SS "node_cache_terminus"
|
1303
1321
|
How to store cached nodes\. Valid values are (none), \'json\', \'msgpack\', or \'yaml\'\.
|
1304
1322
|
.
|
1305
|
-
.
|
1306
|
-
\fIDefault\fR:
|
1307
|
-
|
1323
|
+
.IP "\(bu" 4
|
1324
|
+
\fIDefault\fR: ``
|
1325
|
+
.
|
1326
|
+
.IP "" 0
|
1308
1327
|
.
|
1309
1328
|
.SS "node_name"
|
1310
1329
|
How the puppet master determines the client\'s identity and sets the \'hostname\', \'fqdn\' and \'domain\' facts for use in the manifest, in particular for determining which \'node\' statement applies to the client\. Possible values are \'cert\' (use the subject\'s CN in the client\'s certificate) and \'facter\' (use the hostname that the client reported in its facts)\.
|
@@ -1313,7 +1332,7 @@ How the puppet master determines the client\'s identity and sets the \'hostname\
|
|
1313
1332
|
This setting is deprecated, please use explicit fact matching for classification\.
|
1314
1333
|
.
|
1315
1334
|
.IP "\(bu" 4
|
1316
|
-
\fIDefault\fR:
|
1335
|
+
\fIDefault\fR: \fBcert\fR
|
1317
1336
|
.
|
1318
1337
|
.IP "" 0
|
1319
1338
|
.
|
@@ -1324,7 +1343,7 @@ The fact name used to determine the node name used for all requests the agent ma
|
|
1324
1343
|
The explicit value used for the node name for all requests the agent makes to the master\. WARNING: This setting is mutually exclusive with node_name_fact\. Changing this setting also requires changes to the default auth\.conf configuration on the Puppet Master\. Please see http://links\.puppet\.com/node_name_value for more information\.
|
1325
1344
|
.
|
1326
1345
|
.IP "\(bu" 4
|
1327
|
-
\fIDefault\fR: $certname
|
1346
|
+
\fIDefault\fR: \fB$certname\fR
|
1328
1347
|
.
|
1329
1348
|
.IP "" 0
|
1330
1349
|
.
|
@@ -1358,7 +1377,7 @@ The three main node data plugins are:
|
|
1358
1377
|
\fBclassifier\fR (formerly \fBconsole\fR) \-\-\- Specific to Puppet Enterprise\. Uses the PE console for node data\."
|
1359
1378
|
.
|
1360
1379
|
.IP "\(bu" 4
|
1361
|
-
\fIDefault\fR:
|
1380
|
+
\fIDefault\fR: \fBplain\fR
|
1362
1381
|
.
|
1363
1382
|
.IP "" 0
|
1364
1383
|
.
|
@@ -1372,7 +1391,7 @@ When running in noop mode, Puppet will check whether each resource is in sync, l
|
|
1372
1391
|
\fBImportant note:\fR The \fBnoop\fR metaparameter \fIhttps://puppet\.com/docs/puppet/latest/metaparameter\.html#noop\fR allows you to apply individual resources in noop mode, and will override the global value of the \fBnoop\fR setting\. This means a resource with \fBnoop => false\fR \fIwill\fR be changed if necessary, even when running puppet agent with \fBnoop = true\fR or \fB\-\-noop\fR\. (Conversely, a resource with \fBnoop => true\fR will only be simulated, even when noop mode is globally disabled\.)
|
1373
1392
|
.
|
1374
1393
|
.IP "\(bu" 4
|
1375
|
-
\fIDefault\fR:
|
1394
|
+
\fIDefault\fR: \fBfalse\fR
|
1376
1395
|
.
|
1377
1396
|
.IP "" 0
|
1378
1397
|
.
|
@@ -1380,7 +1399,7 @@ When running in noop mode, Puppet will check whether each resource is in sync, l
|
|
1380
1399
|
Perform one configuration run and exit, rather than spawning a long\-running daemon\. This is useful for interactively running puppet agent, or running puppet agent from cron\.
|
1381
1400
|
.
|
1382
1401
|
.IP "\(bu" 4
|
1383
|
-
\fIDefault\fR:
|
1402
|
+
\fIDefault\fR: \fBfalse\fR
|
1384
1403
|
.
|
1385
1404
|
.IP "" 0
|
1386
1405
|
.
|
@@ -1388,7 +1407,7 @@ Perform one configuration run and exit, rather than spawning a long\-running dae
|
|
1388
1407
|
Where puppet agent stores the password for its private key\. Generally unused\.
|
1389
1408
|
.
|
1390
1409
|
.IP "\(bu" 4
|
1391
|
-
\fIDefault\fR: $privatedir/password
|
1410
|
+
\fIDefault\fR: \fB$privatedir/password\fR
|
1392
1411
|
.
|
1393
1412
|
.IP "" 0
|
1394
1413
|
.
|
@@ -1399,7 +1418,7 @@ The shell search path\. Defaults to whatever is inherited from the parent proces
|
|
1399
1418
|
This setting can only be set in the \fB[main]\fR section of puppet\.conf; it cannot be set in \fB[server]\fR, \fB[agent]\fR, or an environment config section\.
|
1400
1419
|
.
|
1401
1420
|
.IP "\(bu" 4
|
1402
|
-
\fIDefault\fR:
|
1421
|
+
\fIDefault\fR: \fBnone\fR
|
1403
1422
|
.
|
1404
1423
|
.IP "" 0
|
1405
1424
|
.
|
@@ -1407,7 +1426,7 @@ This setting can only be set in the \fB[main]\fR section of puppet\.conf; it can
|
|
1407
1426
|
The file containing the PID of a running process\. This file is intended to be used by service management frameworks and monitoring systems to determine if a puppet process is still in the process table\.
|
1408
1427
|
.
|
1409
1428
|
.IP "\(bu" 4
|
1410
|
-
\fIDefault\fR: $rundir/${run_mode}\.pid
|
1429
|
+
\fIDefault\fR: \fB$rundir/${run_mode}\.pid\fR
|
1411
1430
|
.
|
1412
1431
|
.IP "" 0
|
1413
1432
|
.
|
@@ -1415,7 +1434,7 @@ The file containing the PID of a running process\. This file is intended to be u
|
|
1415
1434
|
Where Puppet should store plugins that it pulls down from the central server\.
|
1416
1435
|
.
|
1417
1436
|
.IP "\(bu" 4
|
1418
|
-
\fIDefault\fR: $libdir
|
1437
|
+
\fIDefault\fR: \fB$libdir\fR
|
1419
1438
|
.
|
1420
1439
|
.IP "" 0
|
1421
1440
|
.
|
@@ -1423,7 +1442,7 @@ Where Puppet should store plugins that it pulls down from the central server\.
|
|
1423
1442
|
Where Puppet should store external facts that are being handled by pluginsync
|
1424
1443
|
.
|
1425
1444
|
.IP "\(bu" 4
|
1426
|
-
\fIDefault\fR: $vardir/facts\.d
|
1445
|
+
\fIDefault\fR: \fB$vardir/facts\.d\fR
|
1427
1446
|
.
|
1428
1447
|
.IP "" 0
|
1429
1448
|
.
|
@@ -1431,7 +1450,7 @@ Where Puppet should store external facts that are being handled by pluginsync
|
|
1431
1450
|
Where to retrieve external facts for pluginsync
|
1432
1451
|
.
|
1433
1452
|
.IP "\(bu" 4
|
1434
|
-
\fIDefault\fR:
|
1453
|
+
\fIDefault\fR: \fBpuppet:///pluginfacts\fR
|
1435
1454
|
.
|
1436
1455
|
.IP "" 0
|
1437
1456
|
.
|
@@ -1439,7 +1458,7 @@ Where to retrieve external facts for pluginsync
|
|
1439
1458
|
What files to ignore when pulling down plugins\.
|
1440
1459
|
.
|
1441
1460
|
.IP "\(bu" 4
|
1442
|
-
\fIDefault\fR: \.svn CVS \.git \.hg
|
1461
|
+
\fIDefault\fR: \fB\.svn CVS \.git \.hg\fR
|
1443
1462
|
.
|
1444
1463
|
.IP "" 0
|
1445
1464
|
.
|
@@ -1447,7 +1466,7 @@ What files to ignore when pulling down plugins\.
|
|
1447
1466
|
From where to retrieve plugins\. The standard Puppet \fBfile\fR type is used for retrieval, so anything that is a valid file source can be used here\.
|
1448
1467
|
.
|
1449
1468
|
.IP "\(bu" 4
|
1450
|
-
\fIDefault\fR:
|
1469
|
+
\fIDefault\fR: \fBpuppet:///plugins\fR
|
1451
1470
|
.
|
1452
1471
|
.IP "" 0
|
1453
1472
|
.
|
@@ -1455,7 +1474,7 @@ From where to retrieve plugins\. The standard Puppet \fBfile\fR type is used for
|
|
1455
1474
|
Whether plugins should be synced with the central server\. This setting is deprecated\.
|
1456
1475
|
.
|
1457
1476
|
.IP "\(bu" 4
|
1458
|
-
\fIDefault\fR:
|
1477
|
+
\fIDefault\fR: \fBtrue\fR
|
1459
1478
|
.
|
1460
1479
|
.IP "" 0
|
1461
1480
|
.
|
@@ -1466,7 +1485,7 @@ A command to run after every agent run\. If this command returns a non\-zero ret
|
|
1466
1485
|
The preferred means of serializing ruby instances for passing over the wire\. This won\'t guarantee that all instances will be serialized using this method, since not all classes can be guaranteed to support this format, but it will be used for all classes that support it\.
|
1467
1486
|
.
|
1468
1487
|
.IP "\(bu" 4
|
1469
|
-
\fIDefault\fR:
|
1488
|
+
\fIDefault\fR: \fBjson\fR
|
1470
1489
|
.
|
1471
1490
|
.IP "" 0
|
1472
1491
|
.
|
@@ -1477,22 +1496,23 @@ A command to run before every agent run\. If this command returns a non\-zero re
|
|
1477
1496
|
The directory where catalog previews per node are generated\.
|
1478
1497
|
.
|
1479
1498
|
.IP "\(bu" 4
|
1480
|
-
\fIDefault\fR: $vardir/preview
|
1499
|
+
\fIDefault\fR: \fB$vardir/preview\fR
|
1481
1500
|
.
|
1482
1501
|
.IP "" 0
|
1483
1502
|
.
|
1484
1503
|
.SS "priority"
|
1485
1504
|
The scheduling priority of the process\. Valid values are \'high\', \'normal\', \'low\', or \'idle\', which are mapped to platform\-specific values\. The priority can also be specified as an integer value and will be passed as is, e\.g\. \-5\. Puppet must be running as a privileged user in order to increase scheduling priority\.
|
1486
1505
|
.
|
1487
|
-
.
|
1488
|
-
\fIDefault\fR:
|
1489
|
-
|
1506
|
+
.IP "\(bu" 4
|
1507
|
+
\fIDefault\fR: ``
|
1508
|
+
.
|
1509
|
+
.IP "" 0
|
1490
1510
|
.
|
1491
1511
|
.SS "privatedir"
|
1492
1512
|
Where the client stores private certificate information\.
|
1493
1513
|
.
|
1494
1514
|
.IP "\(bu" 4
|
1495
|
-
\fIDefault\fR: $ssldir/private
|
1515
|
+
\fIDefault\fR: \fB$ssldir/private\fR
|
1496
1516
|
.
|
1497
1517
|
.IP "" 0
|
1498
1518
|
.
|
@@ -1500,7 +1520,7 @@ Where the client stores private certificate information\.
|
|
1500
1520
|
The private key directory\.
|
1501
1521
|
.
|
1502
1522
|
.IP "\(bu" 4
|
1503
|
-
\fIDefault\fR: $ssldir/private_keys
|
1523
|
+
\fIDefault\fR: \fB$ssldir/private_keys\fR
|
1504
1524
|
.
|
1505
1525
|
.IP "" 0
|
1506
1526
|
.
|
@@ -1508,7 +1528,7 @@ The private key directory\.
|
|
1508
1528
|
Whether to enable experimental performance profiling
|
1509
1529
|
.
|
1510
1530
|
.IP "\(bu" 4
|
1511
|
-
\fIDefault\fR:
|
1531
|
+
\fIDefault\fR: \fBfalse\fR
|
1512
1532
|
.
|
1513
1533
|
.IP "" 0
|
1514
1534
|
.
|
@@ -1516,7 +1536,7 @@ Whether to enable experimental performance profiling
|
|
1516
1536
|
The public key directory\.
|
1517
1537
|
.
|
1518
1538
|
.IP "\(bu" 4
|
1519
|
-
\fIDefault\fR: $ssldir/public_keys
|
1539
|
+
\fIDefault\fR: \fB$ssldir/public_keys\fR
|
1520
1540
|
.
|
1521
1541
|
.IP "" 0
|
1522
1542
|
.
|
@@ -1524,7 +1544,7 @@ The public key directory\.
|
|
1524
1544
|
Whether to print the Puppet stack trace on some errors\. This is a noop if \fBtrace\fR is also set\.
|
1525
1545
|
.
|
1526
1546
|
.IP "\(bu" 4
|
1527
|
-
\fIDefault\fR:
|
1547
|
+
\fIDefault\fR: \fBfalse\fR
|
1528
1548
|
.
|
1529
1549
|
.IP "" 0
|
1530
1550
|
.
|
@@ -1538,7 +1558,7 @@ Despite the name, both puppet agent and puppet master will use this file as the
|
|
1538
1558
|
For control over logging destinations, see the \fB\-\-logdest\fR command line option in the manual pages for puppet master, puppet agent, and puppet apply\. You can see man pages by running \fBpuppet <SUBCOMMAND> \-\-help\fR, or read them online at https://puppet\.com/docs/puppet/latest/man/\.
|
1539
1559
|
.
|
1540
1560
|
.IP "\(bu" 4
|
1541
|
-
\fIDefault\fR: $logdir/puppetd\.log
|
1561
|
+
\fIDefault\fR: \fB$logdir/puppetd\.log\fR
|
1542
1562
|
.
|
1543
1563
|
.IP "" 0
|
1544
1564
|
.
|
@@ -1546,7 +1566,7 @@ For control over logging destinations, see the \fB\-\-logdest\fR command line op
|
|
1546
1566
|
Whether to send reports after every transaction\.
|
1547
1567
|
.
|
1548
1568
|
.IP "\(bu" 4
|
1549
|
-
\fIDefault\fR:
|
1569
|
+
\fIDefault\fR: \fBtrue\fR
|
1550
1570
|
.
|
1551
1571
|
.IP "" 0
|
1552
1572
|
.
|
@@ -1554,7 +1574,7 @@ Whether to send reports after every transaction\.
|
|
1554
1574
|
Whether the \'http\' report processor should include the system certificate store when submitting reports to HTTPS URLs\. If false, then the \'http\' processor will only trust HTTPS report servers whose certificates are issued by the puppet CA or one of its intermediate CAs\. If true, the processor will additionally trust CA certificates in the system\'s certificate store\.
|
1555
1575
|
.
|
1556
1576
|
.IP "\(bu" 4
|
1557
|
-
\fIDefault\fR:
|
1577
|
+
\fIDefault\fR: \fBfalse\fR
|
1558
1578
|
.
|
1559
1579
|
.IP "" 0
|
1560
1580
|
.
|
@@ -1562,7 +1582,7 @@ Whether the \'http\' report processor should include the system certificate stor
|
|
1562
1582
|
The port to communicate with the report_server\.
|
1563
1583
|
.
|
1564
1584
|
.IP "\(bu" 4
|
1565
|
-
\fIDefault\fR: $serverport
|
1585
|
+
\fIDefault\fR: \fB$serverport\fR
|
1566
1586
|
.
|
1567
1587
|
.IP "" 0
|
1568
1588
|
.
|
@@ -1570,7 +1590,7 @@ The port to communicate with the report_server\.
|
|
1570
1590
|
The server to send transaction reports to\.
|
1571
1591
|
.
|
1572
1592
|
.IP "\(bu" 4
|
1573
|
-
\fIDefault\fR: $server
|
1593
|
+
\fIDefault\fR: \fB$server\fR
|
1574
1594
|
.
|
1575
1595
|
.IP "" 0
|
1576
1596
|
.
|
@@ -1578,7 +1598,7 @@ The server to send transaction reports to\.
|
|
1578
1598
|
The directory in which to store reports\. Each node gets a separate subdirectory in this directory\. This setting is only used when the \fBstore\fR report processor is enabled (see the \fBreports\fR setting)\.
|
1579
1599
|
.
|
1580
1600
|
.IP "\(bu" 4
|
1581
|
-
\fIDefault\fR: $vardir/reports
|
1601
|
+
\fIDefault\fR: \fB$vardir/reports\fR
|
1582
1602
|
.
|
1583
1603
|
.IP "" 0
|
1584
1604
|
.
|
@@ -1591,8 +1611,11 @@ This setting is relevant to puppet master and puppet apply\. The puppet master w
|
|
1591
1611
|
.P
|
1592
1612
|
See the report reference for information on the built\-in report handlers; custom report handlers can also be loaded from modules\. (Report handlers are loaded from the lib directory, at \fBpuppet/reports/NAME\.rb\fR\.)
|
1593
1613
|
.
|
1614
|
+
.P
|
1615
|
+
To turn off reports entirely, set this to \fBnone\fR
|
1616
|
+
.
|
1594
1617
|
.IP "\(bu" 4
|
1595
|
-
\fIDefault\fR:
|
1618
|
+
\fIDefault\fR: \fBstore\fR
|
1596
1619
|
.
|
1597
1620
|
.IP "" 0
|
1598
1621
|
.
|
@@ -1600,7 +1623,7 @@ See the report reference for information on the built\-in report handlers; custo
|
|
1600
1623
|
The URL that reports should be forwarded to\. This setting is only used when the \fBhttp\fR report processor is enabled (see the \fBreports\fR setting)\.
|
1601
1624
|
.
|
1602
1625
|
.IP "\(bu" 4
|
1603
|
-
\fIDefault\fR:
|
1626
|
+
\fIDefault\fR: \fBhttp://localhost:3000/reports/upload\fR
|
1604
1627
|
.
|
1605
1628
|
.IP "" 0
|
1606
1629
|
.
|
@@ -1608,7 +1631,7 @@ The URL that reports should be forwarded to\. This setting is only used when the
|
|
1608
1631
|
Where host certificate requests are stored\.
|
1609
1632
|
.
|
1610
1633
|
.IP "\(bu" 4
|
1611
|
-
\fIDefault\fR: $ssldir/certificate_requests
|
1634
|
+
\fIDefault\fR: \fB$ssldir/certificate_requests\fR
|
1612
1635
|
.
|
1613
1636
|
.IP "" 0
|
1614
1637
|
.
|
@@ -1616,7 +1639,7 @@ Where host certificate requests are stored\.
|
|
1616
1639
|
The file in which puppet agent stores a list of the resources associated with the retrieved configuration\.
|
1617
1640
|
.
|
1618
1641
|
.IP "\(bu" 4
|
1619
|
-
\fIDefault\fR: $statedir/resources\.txt
|
1642
|
+
\fIDefault\fR: \fB$statedir/resources\.txt\fR
|
1620
1643
|
.
|
1621
1644
|
.IP "" 0
|
1622
1645
|
.
|
@@ -1624,7 +1647,7 @@ The file in which puppet agent stores a list of the resources associated with th
|
|
1624
1647
|
The configuration file that defines the rights to the different rest indirections\. This can be used as a fine\-grained authorization system for \fBpuppet master\fR\. The \fBpuppet master\fR command is deprecated and Puppet Server uses its own auth\.conf that must be placed within its configuration directory\.
|
1625
1648
|
.
|
1626
1649
|
.IP "\(bu" 4
|
1627
|
-
\fIDefault\fR: $confdir/auth\.conf
|
1650
|
+
\fIDefault\fR: \fB$confdir/auth\.conf\fR
|
1628
1651
|
.
|
1629
1652
|
.IP "" 0
|
1630
1653
|
.
|
@@ -1632,7 +1655,7 @@ The configuration file that defines the rights to the different rest indirection
|
|
1632
1655
|
Whether to send updated facts after every transaction\. By default puppet only submits facts at the beginning of the transaction before applying a catalog\. Since puppet can modify the state of the system, the value of the facts may change after puppet finishes\. Therefore, any facts stored in puppetdb may not be consistent until the agent next runs, typically in 30 minutes\. If this feature is enabled, puppet will resubmit facts after applying its catalog, ensuring facts for the node stored in puppetdb are current\. However, this will double the fact submission load on puppetdb, so it is disabled by default\.
|
1633
1656
|
.
|
1634
1657
|
.IP "\(bu" 4
|
1635
|
-
\fIDefault\fR:
|
1658
|
+
\fIDefault\fR: \fBfalse\fR
|
1636
1659
|
.
|
1637
1660
|
.IP "" 0
|
1638
1661
|
.
|
@@ -1640,7 +1663,7 @@ Whether to send updated facts after every transaction\. By default puppet only s
|
|
1640
1663
|
Enables having extended data in the catalog by storing them as a hash with the special key \fB__ptype\fR\. When enabled, resource containing values of the data types \fBBinary\fR, \fBRegexp\fR, \fBSemVer\fR, \fBSemVerRange\fR, \fBTimespan\fR and \fBTimestamp\fR, as well as instances of types derived from \fBObject\fR retain their data type\.
|
1641
1664
|
.
|
1642
1665
|
.IP "\(bu" 4
|
1643
|
-
\fIDefault\fR:
|
1666
|
+
\fIDefault\fR: \fBtrue\fR
|
1644
1667
|
.
|
1645
1668
|
.IP "" 0
|
1646
1669
|
.
|
@@ -1648,7 +1671,7 @@ Enables having extended data in the catalog by storing them as a hash with the s
|
|
1648
1671
|
The YAML file containing indirector route configuration\.
|
1649
1672
|
.
|
1650
1673
|
.IP "\(bu" 4
|
1651
|
-
\fIDefault\fR: $confdir/routes\.yaml
|
1674
|
+
\fIDefault\fR: \fB$confdir/routes\.yaml\fR
|
1652
1675
|
.
|
1653
1676
|
.IP "" 0
|
1654
1677
|
.
|
@@ -1656,7 +1679,7 @@ The YAML file containing indirector route configuration\.
|
|
1656
1679
|
Where Puppet PID files are kept\.
|
1657
1680
|
.
|
1658
1681
|
.IP "\(bu" 4
|
1659
|
-
\fIDefault\fR:
|
1682
|
+
\fIDefault\fR: \fBUnix/Linux: /var/run/puppetlabs \-\- Windows: C:\eProgramData\ePuppetLabs\epuppet\evar\erun \-\- Non\-root user: ~/\.puppetlabs/var/run\fR
|
1660
1683
|
.
|
1661
1684
|
.IP "" 0
|
1662
1685
|
.
|
@@ -1664,7 +1687,7 @@ Where Puppet PID files are kept\.
|
|
1664
1687
|
How often puppet agent applies the catalog\. Note that a runinterval of 0 means "run continuously" rather than "never run\." This setting can be a time interval in seconds (30 or 30s), minutes (30m), hours (6h), days (2d), or years (5y)\.
|
1665
1688
|
.
|
1666
1689
|
.IP "\(bu" 4
|
1667
|
-
\fIDefault\fR:
|
1690
|
+
\fIDefault\fR: \fB30m\fR
|
1668
1691
|
.
|
1669
1692
|
.IP "" 0
|
1670
1693
|
.
|
@@ -1672,7 +1695,7 @@ How often puppet agent applies the catalog\. Note that a runinterval of 0 means
|
|
1672
1695
|
The maximum amount of time an agent run is allowed to take\. A Puppet agent run that exceeds this timeout will be aborted\. A value of 0 disables the timeout\. Defaults to 1 hour\. This setting can be a time interval in seconds (30 or 30s), minutes (30m), hours (6h), days (2d), or years (5y)\.
|
1673
1696
|
.
|
1674
1697
|
.IP "\(bu" 4
|
1675
|
-
\fIDefault\fR:
|
1698
|
+
\fIDefault\fR: \fB1h\fR
|
1676
1699
|
.
|
1677
1700
|
.IP "" 0
|
1678
1701
|
.
|
@@ -1680,7 +1703,7 @@ The maximum amount of time an agent run is allowed to take\. A Puppet agent run
|
|
1680
1703
|
Where the serial number for certificates is stored\.
|
1681
1704
|
.
|
1682
1705
|
.IP "\(bu" 4
|
1683
|
-
\fIDefault\fR: $cadir/serial
|
1706
|
+
\fIDefault\fR: \fB$cadir/serial\fR
|
1684
1707
|
.
|
1685
1708
|
.IP "" 0
|
1686
1709
|
.
|
@@ -1688,7 +1711,7 @@ Where the serial number for certificates is stored\.
|
|
1688
1711
|
The puppet master server to which the puppet agent should connect\.
|
1689
1712
|
.
|
1690
1713
|
.IP "\(bu" 4
|
1691
|
-
\fIDefault\fR:
|
1714
|
+
\fIDefault\fR: \fBpuppet\fR
|
1692
1715
|
.
|
1693
1716
|
.IP "" 0
|
1694
1717
|
.
|
@@ -1696,7 +1719,7 @@ The puppet master server to which the puppet agent should connect\.
|
|
1696
1719
|
The directory in which serialized data is stored, usually in a subdirectory\.
|
1697
1720
|
.
|
1698
1721
|
.IP "\(bu" 4
|
1699
|
-
\fIDefault\fR: $vardir/server_data
|
1722
|
+
\fIDefault\fR: \fB$vardir/server_data\fR
|
1700
1723
|
.
|
1701
1724
|
.IP "" 0
|
1702
1725
|
.
|
@@ -1704,7 +1727,7 @@ The directory in which serialized data is stored, usually in a subdirectory\.
|
|
1704
1727
|
The list of puppet master servers to which the puppet agent should connect, in the order that they will be tried\.
|
1705
1728
|
.
|
1706
1729
|
.IP "\(bu" 4
|
1707
|
-
\fIDefault\fR: []
|
1730
|
+
\fIDefault\fR: \fB[]\fR
|
1708
1731
|
.
|
1709
1732
|
.IP "" 0
|
1710
1733
|
.
|
@@ -1712,7 +1735,7 @@ The list of puppet master servers to which the puppet agent should connect, in t
|
|
1712
1735
|
The default port puppet subcommands use to communicate with Puppet Server\. (eg \fBpuppet facts upload\fR, \fBpuppet agent\fR)\. May be overridden by more specific settings (see \fBca_port\fR, \fBreport_port\fR)\.
|
1713
1736
|
.
|
1714
1737
|
.IP "\(bu" 4
|
1715
|
-
\fIDefault\fR:
|
1738
|
+
\fIDefault\fR: \fB8140\fR
|
1716
1739
|
.
|
1717
1740
|
.IP "" 0
|
1718
1741
|
.
|
@@ -1720,7 +1743,7 @@ The default port puppet subcommands use to communicate with Puppet Server\. (eg
|
|
1720
1743
|
Whether to log and report a contextual diff when files are being replaced\. This causes partial file contents to pass through Puppet\'s normal logging and reporting system, so this setting should be used with caution if you are sending Puppet\'s reports to an insecure destination\. This feature currently requires the \fBdiff/lcs\fR Ruby library\.
|
1721
1744
|
.
|
1722
1745
|
.IP "\(bu" 4
|
1723
|
-
\fIDefault\fR:
|
1746
|
+
\fIDefault\fR: \fBfalse\fR
|
1724
1747
|
.
|
1725
1748
|
.IP "" 0
|
1726
1749
|
.
|
@@ -1728,7 +1751,7 @@ Whether to log and report a contextual diff when files are being replaced\. This
|
|
1728
1751
|
Where the CA stores signed certificates\.
|
1729
1752
|
.
|
1730
1753
|
.IP "\(bu" 4
|
1731
|
-
\fIDefault\fR: $cadir/signed
|
1754
|
+
\fIDefault\fR: \fB$cadir/signed\fR
|
1732
1755
|
.
|
1733
1756
|
.IP "" 0
|
1734
1757
|
.
|
@@ -1738,9 +1761,10 @@ Tags to use to filter resources\. If this is set, then only resources not tagged
|
|
1738
1761
|
.SS "sourceaddress"
|
1739
1762
|
The address the agent should use to initiate requests\.
|
1740
1763
|
.
|
1741
|
-
.
|
1742
|
-
\fIDefault\fR:
|
1743
|
-
|
1764
|
+
.IP "\(bu" 4
|
1765
|
+
\fIDefault\fR: ``
|
1766
|
+
.
|
1767
|
+
.IP "" 0
|
1744
1768
|
.
|
1745
1769
|
.SS "splay"
|
1746
1770
|
Whether to sleep for a random amount of time, ranging from immediately up to its \fB$splaylimit\fR, before performing its first agent run after a service restart\. After this period, the agent runs periodically on its \fB$runinterval\fR\.
|
@@ -1755,7 +1779,7 @@ With \fBsplay\fR enabled, it waits any amount of time up to its \fB$splaylimit\f
|
|
1755
1779
|
If you restart an agent\'s puppet service with \fBsplay\fR enabled, it recalculates its splay period and delays its first agent run after restarting for this new period\. If you simultaneously restart a group of puppet agents with \fBsplay\fR enabled, their checkins to your puppet masters can be distributed more evenly\.
|
1756
1780
|
.
|
1757
1781
|
.IP "\(bu" 4
|
1758
|
-
\fIDefault\fR:
|
1782
|
+
\fIDefault\fR: \fBfalse\fR
|
1759
1783
|
.
|
1760
1784
|
.IP "" 0
|
1761
1785
|
.
|
@@ -1763,7 +1787,7 @@ If you restart an agent\'s puppet service with \fBsplay\fR enabled, it recalcula
|
|
1763
1787
|
The maximum time to delay before an agent\'s first run when \fBsplay\fR is enabled\. Defaults to the agent\'s \fB$runinterval\fR\. The \fBsplay\fR interval is random and recalculated each time the agent is started or restarted\. This setting can be a time interval in seconds (30 or 30s), minutes (30m), hours (6h), days (2d), or years (5y)\.
|
1764
1788
|
.
|
1765
1789
|
.IP "\(bu" 4
|
1766
|
-
\fIDefault\fR: $runinterval
|
1790
|
+
\fIDefault\fR: \fB$runinterval\fR
|
1767
1791
|
.
|
1768
1792
|
.IP "" 0
|
1769
1793
|
.
|
@@ -1771,16 +1795,17 @@ The maximum time to delay before an agent\'s first run when \fBsplay\fR is enabl
|
|
1771
1795
|
The domain which will be queried to find the SRV records of servers to use\.
|
1772
1796
|
.
|
1773
1797
|
.IP "\(bu" 4
|
1774
|
-
\fIDefault\fR:
|
1798
|
+
\fIDefault\fR: \fBci\-jenkins\-setup\-platform\.svc\.cluster\.local\fR
|
1775
1799
|
.
|
1776
1800
|
.IP "" 0
|
1777
1801
|
.
|
1778
1802
|
.SS "ssl_client_ca_auth"
|
1779
1803
|
Certificate authorities who issue server certificates\. SSL servers will not be considered authentic unless they possess a certificate issued by an authority listed in this file\. If this setting has no value then the Puppet master\'s CA certificate (localcacert) will be used\.
|
1780
1804
|
.
|
1781
|
-
.
|
1782
|
-
\fIDefault\fR:
|
1783
|
-
|
1805
|
+
.IP "\(bu" 4
|
1806
|
+
\fIDefault\fR: ``
|
1807
|
+
.
|
1808
|
+
.IP "" 0
|
1784
1809
|
.
|
1785
1810
|
.SS "ssl_client_header"
|
1786
1811
|
The header containing an authenticated client\'s SSL DN\. This header must be set by the proxy to the authenticated client\'s SSL DN (e\.g\., \fB/CN=puppet\.puppetlabs\.com\fR)\. Puppet will parse out the Common Name (CN) from the Distinguished Name (DN) and use the value of the CN field for authorization\.
|
@@ -1789,7 +1814,7 @@ The header containing an authenticated client\'s SSL DN\. This header must be se
|
|
1789
1814
|
Note that the name of the HTTP header gets munged by the web server common gateway interface: an \fBHTTP_\fR prefix is added, dashes are converted to underscores, and all letters are uppercased\. Thus, to use the \fBX\-Client\-DN\fR header, this setting should be \fBHTTP_X_CLIENT_DN\fR\.
|
1790
1815
|
.
|
1791
1816
|
.IP "\(bu" 4
|
1792
|
-
\fIDefault\fR:
|
1817
|
+
\fIDefault\fR: \fBHTTP_X_CLIENT_DN\fR
|
1793
1818
|
.
|
1794
1819
|
.IP "" 0
|
1795
1820
|
.
|
@@ -1800,7 +1825,7 @@ The header containing the status message of the client verification\. This heade
|
|
1800
1825
|
Note that the name of the HTTP header gets munged by the web server common gateway interface: an \fBHTTP_\fR prefix is added, dashes are converted to underscores, and all letters are uppercased\. Thus, to use the \fBX\-Client\-Verify\fR header, this setting should be \fBHTTP_X_CLIENT_VERIFY\fR\.
|
1801
1826
|
.
|
1802
1827
|
.IP "\(bu" 4
|
1803
|
-
\fIDefault\fR:
|
1828
|
+
\fIDefault\fR: \fBHTTP_X_CLIENT_VERIFY\fR
|
1804
1829
|
.
|
1805
1830
|
.IP "" 0
|
1806
1831
|
.
|
@@ -1808,29 +1833,31 @@ Note that the name of the HTTP header gets munged by the web server common gatew
|
|
1808
1833
|
A lock file to indicate that the ssl bootstrap process is currently in progress\.
|
1809
1834
|
.
|
1810
1835
|
.IP "\(bu" 4
|
1811
|
-
\fIDefault\fR: $ssldir/ssl\.lock
|
1836
|
+
\fIDefault\fR: \fB$ssldir/ssl\.lock\fR
|
1812
1837
|
.
|
1813
1838
|
.IP "" 0
|
1814
1839
|
.
|
1815
1840
|
.SS "ssl_server_ca_auth"
|
1816
1841
|
The setting is deprecated and has no effect\. Ensure all root and intermediate certificate authorities used to issue client certificates are contained in the server\'s \fBcacert\fR file on the server\.
|
1817
1842
|
.
|
1818
|
-
.
|
1819
|
-
\fIDefault\fR:
|
1820
|
-
|
1843
|
+
.IP "\(bu" 4
|
1844
|
+
\fIDefault\fR: ``
|
1845
|
+
.
|
1846
|
+
.IP "" 0
|
1821
1847
|
.
|
1822
1848
|
.SS "ssl_trust_store"
|
1823
1849
|
A file containing CA certificates in PEM format that puppet should trust when making HTTPS requests\. This \fBonly\fR applies to https requests to non\-puppet infrastructure, such as retrieving file metadata and content from https file sources, puppet module tool and the \'http\' report processor\. This setting is ignored when making requests to puppet:// URLs such as catalog and report requests\.
|
1824
1850
|
.
|
1825
|
-
.
|
1826
|
-
\fIDefault\fR:
|
1827
|
-
|
1851
|
+
.IP "\(bu" 4
|
1852
|
+
\fIDefault\fR: ``
|
1853
|
+
.
|
1854
|
+
.IP "" 0
|
1828
1855
|
.
|
1829
1856
|
.SS "ssldir"
|
1830
1857
|
Where SSL certificates are kept\.
|
1831
1858
|
.
|
1832
1859
|
.IP "\(bu" 4
|
1833
|
-
\fIDefault\fR: $confdir/ssl
|
1860
|
+
\fIDefault\fR: \fB$confdir/ssl\fR
|
1834
1861
|
.
|
1835
1862
|
.IP "" 0
|
1836
1863
|
.
|
@@ -1838,7 +1865,7 @@ Where SSL certificates are kept\.
|
|
1838
1865
|
The directory where Puppet state is stored\. Generally, this directory can be removed without causing harm (although it might result in spurious service restarts)\.
|
1839
1866
|
.
|
1840
1867
|
.IP "\(bu" 4
|
1841
|
-
\fIDefault\fR: $vardir/state
|
1868
|
+
\fIDefault\fR: \fB$vardir/state\fR
|
1842
1869
|
.
|
1843
1870
|
.IP "" 0
|
1844
1871
|
.
|
@@ -1846,7 +1873,7 @@ The directory where Puppet state is stored\. Generally, this directory can be re
|
|
1846
1873
|
Where puppet agent and puppet master store state associated with the running configuration\. In the case of puppet master, this file reflects the state discovered through interacting with clients\.
|
1847
1874
|
.
|
1848
1875
|
.IP "\(bu" 4
|
1849
|
-
\fIDefault\fR: $statedir/state\.yaml
|
1876
|
+
\fIDefault\fR: \fB$statedir/state\.yaml\fR
|
1850
1877
|
.
|
1851
1878
|
.IP "" 0
|
1852
1879
|
.
|
@@ -1857,7 +1884,7 @@ How long the Puppet agent should cache when a resource was last checked or synce
|
|
1857
1884
|
This setting affects the usage of \fBschedule\fR resources, as the information about when a resource was last checked (and therefore when it needs to be checked again) is stored in the \fBstatefile\fR\. The \fBstatettl\fR needs to be large enough to ensure that a resource will not trigger multiple times during a schedule due to its entry expiring from the cache\.
|
1858
1885
|
.
|
1859
1886
|
.IP "\(bu" 4
|
1860
|
-
\fIDefault\fR:
|
1887
|
+
\fIDefault\fR: \fB32d\fR
|
1861
1888
|
.
|
1862
1889
|
.IP "" 0
|
1863
1890
|
.
|
@@ -1865,7 +1892,7 @@ This setting affects the usage of \fBschedule\fR resources, as the information a
|
|
1865
1892
|
Whether to compile a static catalog \fIhttps://puppet\.com/docs/puppet/latest/static_catalogs\.html#enabling\-or\-disabling\-static\-catalogs\fR, which occurs only on a Puppet Server master when the \fBcode\-id\-command\fR and \fBcode\-content\-command\fR settings are configured in its \fBpuppetserver\.conf\fR file\.
|
1866
1893
|
.
|
1867
1894
|
.IP "\(bu" 4
|
1868
|
-
\fIDefault\fR:
|
1895
|
+
\fIDefault\fR: \fBtrue\fR
|
1869
1896
|
.
|
1870
1897
|
.IP "" 0
|
1871
1898
|
.
|
@@ -1879,7 +1906,7 @@ By default this uses the \'puppetdb\' backend\.
|
|
1879
1906
|
You can adjust the backend using the storeconfigs_backend setting\.
|
1880
1907
|
.
|
1881
1908
|
.IP "\(bu" 4
|
1882
|
-
\fIDefault\fR:
|
1909
|
+
\fIDefault\fR: \fBfalse\fR
|
1883
1910
|
.
|
1884
1911
|
.IP "" 0
|
1885
1912
|
.
|
@@ -1887,7 +1914,7 @@ You can adjust the backend using the storeconfigs_backend setting\.
|
|
1887
1914
|
Configure the backend terminus used for StoreConfigs\. By default, this uses the PuppetDB store, which must be installed and configured before turning on StoreConfigs\.
|
1888
1915
|
.
|
1889
1916
|
.IP "\(bu" 4
|
1890
|
-
\fIDefault\fR:
|
1917
|
+
\fIDefault\fR: \fBpuppetdb\fR
|
1891
1918
|
.
|
1892
1919
|
.IP "" 0
|
1893
1920
|
.
|
@@ -1912,7 +1939,7 @@ The strictness level is for both language semantics and runtime evaluation valid
|
|
1912
1939
|
No new validations will be added to a micro (x\.y\.z) release, but may be added in minor releases (x\.y\.0)\. In major releases it expected that most (if not all) strictness validation become standard behavior\.
|
1913
1940
|
.
|
1914
1941
|
.IP "\(bu" 4
|
1915
|
-
\fIDefault\fR:
|
1942
|
+
\fIDefault\fR: \fBwarning\fR
|
1916
1943
|
.
|
1917
1944
|
.IP "" 0
|
1918
1945
|
.
|
@@ -1920,7 +1947,7 @@ No new validations will be added to a micro (x\.y\.z) release, but may be added
|
|
1920
1947
|
Whether the agent specified environment should be considered authoritative, causing the run to fail if the retrieved catalog does not match it\.
|
1921
1948
|
.
|
1922
1949
|
.IP "\(bu" 4
|
1923
|
-
\fIDefault\fR:
|
1950
|
+
\fIDefault\fR: \fBfalse\fR
|
1924
1951
|
.
|
1925
1952
|
.IP "" 0
|
1926
1953
|
.
|
@@ -1931,7 +1958,7 @@ Whether to only search for the complete hostname as it is in the certificate whe
|
|
1931
1958
|
This setting is deprecated and will be removed in a future release\.
|
1932
1959
|
.
|
1933
1960
|
.IP "\(bu" 4
|
1934
|
-
\fIDefault\fR:
|
1961
|
+
\fIDefault\fR: \fBtrue\fR
|
1935
1962
|
.
|
1936
1963
|
.IP "" 0
|
1937
1964
|
.
|
@@ -1939,7 +1966,7 @@ This setting is deprecated and will be removed in a future release\.
|
|
1939
1966
|
Causes an evaluation error when referencing unknown variables\. (This does not affect referencing variables that are explicitly set to undef)\.
|
1940
1967
|
.
|
1941
1968
|
.IP "\(bu" 4
|
1942
|
-
\fIDefault\fR:
|
1969
|
+
\fIDefault\fR: \fBfalse\fR
|
1943
1970
|
.
|
1944
1971
|
.IP "" 0
|
1945
1972
|
.
|
@@ -1947,7 +1974,7 @@ Causes an evaluation error when referencing unknown variables\. (This does not a
|
|
1947
1974
|
Whether to print a transaction summary\.
|
1948
1975
|
.
|
1949
1976
|
.IP "\(bu" 4
|
1950
|
-
\fIDefault\fR:
|
1977
|
+
\fIDefault\fR: \fBfalse\fR
|
1951
1978
|
.
|
1952
1979
|
.IP "" 0
|
1953
1980
|
.
|
@@ -1955,7 +1982,7 @@ Whether to print a transaction summary\.
|
|
1955
1982
|
Checksum types supported by this agent for use in file resources of a static catalog\. Values must be comma\-separated\. Valid types are md5, md5lite, sha256, sha256lite, sha384, sha512, sha224, sha1, sha1lite, mtime, ctime\. Default is md5, sha256, sha384, sha512, sha224\.
|
1956
1983
|
.
|
1957
1984
|
.IP "\(bu" 4
|
1958
|
-
\fIDefault\fR: ["md5", "sha256", "sha384", "sha512", "sha224"]
|
1985
|
+
\fIDefault\fR: \fB["md5", "sha256", "sha384", "sha512", "sha224"]\fR
|
1959
1986
|
.
|
1960
1987
|
.IP "" 0
|
1961
1988
|
.
|
@@ -1963,7 +1990,7 @@ Checksum types supported by this agent for use in file resources of a static cat
|
|
1963
1990
|
What syslog facility to use when logging to syslog\. Syslog has a fixed list of valid facilities, and you must choose one of those; you cannot just make one up\.
|
1964
1991
|
.
|
1965
1992
|
.IP "\(bu" 4
|
1966
|
-
\fIDefault\fR:
|
1993
|
+
\fIDefault\fR: \fBdaemon\fR
|
1967
1994
|
.
|
1968
1995
|
.IP "" 0
|
1969
1996
|
.
|
@@ -1974,7 +2001,7 @@ Tags to use to find resources\. If this is set, then only resources tagged with
|
|
1974
2001
|
Turns on experimental support for tasks and plans in the puppet language\. This is for internal API use only\. Do not change this setting\.
|
1975
2002
|
.
|
1976
2003
|
.IP "\(bu" 4
|
1977
|
-
\fIDefault\fR:
|
2004
|
+
\fIDefault\fR: \fBfalse\fR
|
1978
2005
|
.
|
1979
2006
|
.IP "" 0
|
1980
2007
|
.
|
@@ -1982,7 +2009,7 @@ Turns on experimental support for tasks and plans in the puppet language\. This
|
|
1982
2009
|
Whether to print stack traces on some errors\. Will print internal Ruby stack trace interleaved with Puppet function frames\.
|
1983
2010
|
.
|
1984
2011
|
.IP "\(bu" 4
|
1985
|
-
\fIDefault\fR:
|
2012
|
+
\fIDefault\fR: \fBfalse\fR
|
1986
2013
|
.
|
1987
2014
|
.IP "" 0
|
1988
2015
|
.
|
@@ -1990,7 +2017,7 @@ Whether to print stack traces on some errors\. Will print internal Ruby stack tr
|
|
1990
2017
|
Transactional storage file for persisting data between transactions for the purposes of infering information (such as corrective_change) on new data received\.
|
1991
2018
|
.
|
1992
2019
|
.IP "\(bu" 4
|
1993
|
-
\fIDefault\fR: $statedir/transactionstore\.yaml
|
2020
|
+
\fIDefault\fR: \fB$statedir/transactionstore\.yaml\fR
|
1994
2021
|
.
|
1995
2022
|
.IP "" 0
|
1996
2023
|
.
|
@@ -2011,15 +2038,16 @@ For unknown or invalid nodes, exit with a non\-zero exit code\.
|
|
2011
2038
|
.P
|
2012
2039
|
If the setting points to an executable command, then the external trusted facts will be stored in the \'external\' key of the trusted facts hash\. Otherwise for each executable file in the directory, the external trusted facts will be stored in the \fB<basename>\fR key of the \fBtrusted[\'external\']\fR hash\. For example, if the files foo\.rb and bar\.sh are in the directory, then \fBtrusted[\'external\']\fR will be the hash \fB{ \'foo\' => <foo\.rb output>, \'bar\' => <bar\.sh output> }\fR\.
|
2013
2040
|
.
|
2014
|
-
.
|
2015
|
-
\fIDefault\fR:
|
2016
|
-
|
2041
|
+
.IP "\(bu" 4
|
2042
|
+
\fIDefault\fR: ``
|
2043
|
+
.
|
2044
|
+
.IP "" 0
|
2017
2045
|
.
|
2018
2046
|
.SS "trusted_oid_mapping_file"
|
2019
2047
|
File that provides mapping between custom SSL oids and user\-friendly names
|
2020
2048
|
.
|
2021
2049
|
.IP "\(bu" 4
|
2022
|
-
\fIDefault\fR: $confdir/custom_trusted_oid_mapping\.yaml
|
2050
|
+
\fIDefault\fR: \fB$confdir/custom_trusted_oid_mapping\.yaml\fR
|
2023
2051
|
.
|
2024
2052
|
.IP "" 0
|
2025
2053
|
.
|
@@ -2027,7 +2055,7 @@ File that provides mapping between custom SSL oids and user\-friendly names
|
|
2027
2055
|
Whether to only use the cached catalog rather than compiling a new catalog on every run\. Puppet can be run with this enabled by default and then selectively disabled when a recompile is desired\. Because a Puppet agent using cached catalogs does not contact the master for a new catalog, it also does not upload facts at the beginning of the Puppet run\.
|
2028
2056
|
.
|
2029
2057
|
.IP "\(bu" 4
|
2030
|
-
\fIDefault\fR:
|
2058
|
+
\fIDefault\fR: \fBfalse\fR
|
2031
2059
|
.
|
2032
2060
|
.IP "" 0
|
2033
2061
|
.
|
@@ -2035,7 +2063,7 @@ Whether to only use the cached catalog rather than compiling a new catalog on ev
|
|
2035
2063
|
Whether the server will search for SRV records in DNS for the current domain\.
|
2036
2064
|
.
|
2037
2065
|
.IP "\(bu" 4
|
2038
|
-
\fIDefault\fR:
|
2066
|
+
\fIDefault\fR: \fBfalse\fR
|
2039
2067
|
.
|
2040
2068
|
.IP "" 0
|
2041
2069
|
.
|
@@ -2043,7 +2071,7 @@ Whether the server will search for SRV records in DNS for the current domain\.
|
|
2043
2071
|
Whether to use the cached configuration when the remote configuration will not compile\. This option is useful for testing new configurations, where you want to fix the broken configuration rather than reverting to a known\-good one\.
|
2044
2072
|
.
|
2045
2073
|
.IP "\(bu" 4
|
2046
|
-
\fIDefault\fR:
|
2074
|
+
\fIDefault\fR: \fBtrue\fR
|
2047
2075
|
.
|
2048
2076
|
.IP "" 0
|
2049
2077
|
.
|
@@ -2051,7 +2079,7 @@ Whether to use the cached configuration when the remote configuration will not c
|
|
2051
2079
|
The user Puppet Server will run as\. Used to ensure the agent side processes (agent, apply, etc) create files and directories readable by Puppet Server when necessary\.
|
2052
2080
|
.
|
2053
2081
|
.IP "\(bu" 4
|
2054
|
-
\fIDefault\fR:
|
2082
|
+
\fIDefault\fR: \fBpuppet\fR
|
2055
2083
|
.
|
2056
2084
|
.IP "" 0
|
2057
2085
|
.
|
@@ -2059,7 +2087,7 @@ The user Puppet Server will run as\. Used to ensure the agent side processes (ag
|
|
2059
2087
|
Where Puppet stores dynamic and growing data\. The default for this setting is calculated specially, like \fBconfdir\fR_\.
|
2060
2088
|
.
|
2061
2089
|
.IP "\(bu" 4
|
2062
|
-
\fIDefault\fR:
|
2090
|
+
\fIDefault\fR: \fBUnix/Linux: /opt/puppetlabs/puppet/cache \-\- Windows: C:\eProgramData\ePuppetLabs\epuppet\ecache \-\- Non\-root user: ~/\.puppetlabs/opt/puppet/cache\fR
|
2063
2091
|
.
|
2064
2092
|
.IP "" 0
|
2065
2093
|
.
|
@@ -2067,7 +2095,7 @@ Where Puppet stores dynamic and growing data\. The default for this setting is c
|
|
2067
2095
|
The directory containing \fBvendored\fR modules\. These modules will be used by \fIall\fR environments like those in the \fBbasemodulepath\fR\. The only difference is that modules in the \fBbasemodulepath\fR are pluginsynced, while vendored modules are not
|
2068
2096
|
.
|
2069
2097
|
.IP "\(bu" 4
|
2070
|
-
\fIDefault\fR: /opt/puppetlabs/puppet/vendor_modules
|
2098
|
+
\fIDefault\fR: \fB/opt/puppetlabs/puppet/vendor_modules\fR
|
2071
2099
|
.
|
2072
2100
|
.IP "" 0
|
2073
2101
|
.
|
@@ -2075,7 +2103,7 @@ The directory containing \fBvendored\fR modules\. These modules will be used by
|
|
2075
2103
|
Whether or not to look for versioned environment directories, symlinked from \fB$environmentpath/<environment>\fR\. This is an experimental feature and should be used with caution\.
|
2076
2104
|
.
|
2077
2105
|
.IP "\(bu" 4
|
2078
|
-
\fIDefault\fR:
|
2106
|
+
\fIDefault\fR: \fBfalse\fR
|
2079
2107
|
.
|
2080
2108
|
.IP "" 0
|
2081
2109
|
.
|
@@ -2089,7 +2117,7 @@ When starting for the first time, puppet agent will submit a certificate signing
|
|
2089
2117
|
Puppet agent cannot apply configurations until its approved certificate is available\. Since the certificate may or may not be available immediately, puppet agent will repeatedly try to fetch it at this interval\. You can turn off waiting for certificates by specifying a time of 0, or a maximum amount of time to wait in the \fBmaxwaitforcert\fR setting, in which case puppet agent will exit if it cannot get a cert\. This setting can be a time interval in seconds (30 or 30s), minutes (30m), hours (6h), days (2d), or years (5y)\.
|
2090
2118
|
.
|
2091
2119
|
.IP "\(bu" 4
|
2092
|
-
\fIDefault\fR:
|
2120
|
+
\fIDefault\fR: \fB2m\fR
|
2093
2121
|
.
|
2094
2122
|
.IP "" 0
|
2095
2123
|
.
|
@@ -2100,7 +2128,7 @@ How frequently puppet agent should try running when there is an already ongoing
|
|
2100
2128
|
This argument is by default disabled (value set to 0)\. In this case puppet agent will immediately exit if it cannot run at that moment\. When a value other than 0 is set, this can also be used in combination with the \fBmaxwaitforlock\fR argument\. This setting can be a time interval in seconds (30 or 30s), minutes (30m), hours (6h), days (2d), or years (5y)\.
|
2101
2129
|
.
|
2102
2130
|
.IP "\(bu" 4
|
2103
|
-
\fIDefault\fR:
|
2131
|
+
\fIDefault\fR: \fB0\fR
|
2104
2132
|
.
|
2105
2133
|
.IP "" 0
|
2106
2134
|
.
|
@@ -2108,7 +2136,7 @@ This argument is by default disabled (value set to 0)\. In this case puppet agen
|
|
2108
2136
|
The directory in which YAML data is stored, usually in a subdirectory\.
|
2109
2137
|
.
|
2110
2138
|
.IP "\(bu" 4
|
2111
|
-
\fIDefault\fR: $vardir/yaml
|
2139
|
+
\fIDefault\fR: \fB$vardir/yaml\fR
|
2112
2140
|
.
|
2113
2141
|
.IP "" 0
|
2114
2142
|
|