In my dynamic ec2 inventory I have data similar to:
{
"_meta": {
"hostvars": {
"10.0.33.123": {
"ec2_tag_Name": "MyFirstHost",
}
"10.0.33.124": {
"ec2_tag_Name": "MySecondHost",
use_inline_resources if defined?(use_inline_resources) | |
def whyrun_supported? | |
true | |
end | |
action :create do | |
template new_resource.name do | |
group new_resource.group | |
mode new_resource.mode |
In my dynamic ec2 inventory I have data similar to:
{
"_meta": {
"hostvars": {
"10.0.33.123": {
"ec2_tag_Name": "MyFirstHost",
}
"10.0.33.124": {
"ec2_tag_Name": "MySecondHost",
; $Id$ | |
name = complex widget | |
description = Example content type with a complex widget. | |
package = examples | |
core = 7.x | |
files[] = complex_widget.install | |
files[] = complex_widget.module |
<?php | |
/** | |
* Implements hook_install(). | |
*/ | |
function complex_widget_install() { | |
// Create the content type using node_content as the base. | |
$t = get_t(); | |
$node_type = array( | |
'type' => 'my_node_type', | |
'name' => $t('Complex widget example'), |
<?php | |
/** | |
* Return a structured array defining the fields created by this content type. | |
* | |
* This is packaged in a function so it can be used in both | |
* node_example_install() and node_example_uninstall(). | |
*/ | |
function _complex_widget_installed_fields() { | |
return array( | |
'complex_widget_variable' => array( |
<?php | |
/** | |
* Return a structured array defining the instances for this content type. | |
* | |
* This is provided as a function so that it can be used in both hook_install() | |
* and hook_uninstall(). | |
*/ | |
function _complex_widget_installed_instances() { | |
$types = array(t('number'), t('string')); | |
return array( |
# Add puppetlabs to /etc/apt/sources.list.d | |
echo -e "deb http://apt.puppetlabs.com/ubuntu lucid main\ndeb-src http://apt.puppetlabs.com/ubuntu lucid main" >> /etc/apt/sources.list.d/puppet.list | |
# Download the public key | |
apt-key adv --keyserver keyserver.ubuntu.com --recv 4BD6EC30 | |
#Update apt | |
apt-get update | |
#Install puppet |
[root@li220-252:~] puppetd -t --server puppet.cyberswat.com | |
info: Creating a new SSL key for li220-252.members.linode.com | |
warning: peer certificate won't be verified in this SSL session | |
info: Caching certificate for ca | |
warning: peer certificate won't be verified in this SSL session | |
warning: peer certificate won't be verified in this SSL session | |
info: Creating a new SSL certificate request for li220-252.members.linode.com | |
info: Certificate Request fingerprint (md5): 52:32:81:19:B1:E4:89:83:13:CC:70:ED:C1:80:7A:5B | |
warning: peer certificate won't be verified in this SSL session | |
warning: peer certificate won't be verified in this SSL session |
proot@li220-252:~] puppetd -t --server puppet.cyberswat.com | |
warning: peer certificate won't be verified in this SSL session | |
info: Caching certificate for li220-252.members.linode.com | |
pcilib: Cannot open /proc/bus/pci | |
lspci: Cannot find any working access method. | |
info: Caching certificate_revocation_list for ca | |
info: Caching catalog for li220-252.members.linode.com | |
info: Applying configuration version '1330405985' | |
info: Creating state file /var/lib/puppet/state/state.yaml | |
notice: Finished catalog run in 0.05 seconds |
# Log into the puppet client and execute facter | |
[root@li220-252 ~] facter | grep fqdn | |
fqdn => li220-252.members.linode.com |