Skip to content

Instantly share code, notes, and snippets.

Keybase proof

I hereby claim:

  • I am dhollinger on github.
  • I am dhollinger (https://keybase.io/dhollinger) on keybase.
  • I have a public key ASDfGOE-zte_XMHZnCO9BgkF-dAgJjdcnq_Nm19YrWJ5FQo

To claim this, I am signing this object:

autofs::mount { 'home':
mount => '/home',
mapfile => '/etc/auto.home',
options => '--timeout=120,fstype=ext4'
}
➞ puppet_webhook (ssl_fixes) : irb
irb(main):001:0> require 'openssl'
=> true
irb(main):002:0> cert = "/Users/dhollinger/certs/cert.pem"
=> "/Users/dhollinger/certs/cert.pem"
irb(main):003:0> key = "/Users/dhollinger/certs/key.pem"
=> "/Users/dhollinger/certs/key.pem"
irb(main):004:0> File.read(cert)
=> "-----BEGIN CERTIFICATE-----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\nQXPz44araCbhJgtXrdbGnYwoWE3a
root@ubuntu-xenial:~# r10k version
r10k 2.1.1
root@ubuntu-xenial:~# /opt/puppetlabs/puppet/bin/r10k version
r10k 3.1.0
[Unit]
Description=R10K Webhook Service
After=syslog.target network.target
[Service]
Type=simple
EnvironmentFile=-/etc/sysconfig/webhook
RuntimeDirectory=puppet_webhook
User=root
TimeoutStartSec=90
INFO -> Using Puppetfile '/Users/dhollinger/.puppetlabs/modules/test_2/Puppetfile'
INFO -> Using Puppetfile '/Users/dhollinger/.puppetlabs/modules/webhook_test/Puppetfile'
INFO -> Using Puppetfile '/Users/dhollinger/.puppetlabs/modules/webhooktest/Puppetfile'
INFO -> Deploying environment /Users/dhollinger/.puppetlabs/modules/webhook_test
INFO -> Environment webhook_test is now at 4a32bf94c28e979aaa0495773c5ce4e2b5661649
INFO -> Deploying Puppetfile content /Users/dhollinger/.puppetlabs/modules/webhook_test/modules/stdlib
INFO -> Deploying Puppetfile content /Users/dhollinger/.puppetlabs/modules/webhook_test/modules/concat
INFO -> Deploying Puppetfile content /Users/dhollinger/.puppetlabs/modules/webhook_test/modules/firewall
INFO -> Deploying Puppetfile content /Users/dhollinger/.puppetlabs/modules/webhook_test/modules/network
INFO -> Deploying Puppetfile content /Users/dhollinger/.puppetlabs/modules/webhook_test/modules/rsyslog
@dhollinger
dhollinger / app.yml
Created December 19, 2018 22:32
puppet_webhook output
# Authentication
protected: true
user: puppet
pass: puppet
# Mcollective
client_cfg: "/etc/puppetlabs/mcollective/server.cfg"
client_timeout: "120"
use_mco_ruby: false
use_mcollective: false
[Unit]
Description=R10K Webhook Service
After=syslog.target network.target
[Service]
Type=simple
EnvironmentFile=-/etc/sysconfig/webhook
RuntimeDirectory=puppet_webhook
User=root
PIDFile=/var/run/puppet_webhook.pid
@dhollinger
dhollinger / fooaf.pp
Created October 25, 2018 17:10
More like this
contain foo::package
contain foo::config
contain foo:service
Class['foo::package']
-> Class['foo::config']
~> Class['foo::servce']
# package.pp
if $foo::manage_package {
if $puppetwebhook::manage_package {
Service {
require => Package['puppet_webhook'],
}
}