Skip to content

Instantly share code, notes, and snippets.

@lucywyman
Created September 4, 2018 23:06
Show Gist options
  • Save lucywyman/8c4047cff5ecb2304beca18ce18655a8 to your computer and use it in GitHub Desktop.
Save lucywyman/8c4047cff5ecb2304beca18ce18655a8 to your computer and use it in GitHub Desktop.
{
"target": {
"private-key-content": "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQDULQdQbyTyqqyL73RaKPketgqtkiIVupUSI2hQ08CEXOEmWCUZXQfyE3FWXPKQqu+CskxTufSmMVEnQxXVt925H76Q7Dta6VSxUTLrDf0U+LpCpqaM8uWhVf+n6j4W0nJHCSkZkZ9s7oW4ITrRjaaCa+UfiCP7p1JCY2BKeAI7qD69pn1hrLZh10mlRqHYBNfQRvUcqQm61OLzKA3ZyQoHpAlL0DdlHLUm0WELqfgKdAIq2iQ+cSgix40gK6WED31CY6Rh03TgdKQqJlffW2XaHGVDSHRmCEovRxuTZqN4s33aF5OidkFfPahdWEGgEVhL3PU30VIC2Rw7u6d1wko5kF56nwCucXzfj0J4QjqHVkXLV+TpjMSFfqxm9KXXAZ9VIAt9CFvkGAIe+RY4S8HGViRRa7vDIyEEkT49VhkriRc4MyVGkiOloTJWai6luwYq+CaxZhH6PkOd8++8biSf2pPnuuSdvWYzg47cejqt9re8SGNAUCi550BzAKN2n+iJpb7X4TLoinrgeAfVB+tcVV1+0Hq90HCg9NGAKbZpXOrG7uFb3I+gSkJD3NS86hgUfdSWDucPsP61wNCDK4DYj6HTbgASroHiHY8PoRF9KvnLHLOVIQ1thvEDYcorvGCy+h2grgRenWMlS57qKDyBqOv2lQoxQ== jonathan.newman@puppet.com",
"user": "centos",
"hostname": "192.168.0.12",
"task": {
"name": "bootstrap::linux",
"metadata": {
"description": "Bootstrap a node with puppet-agent for Linux",
"parameters": {
"master": {
"type": "String",
"description": "The master from which the puppet-agent should be bootstrapped"
},
"certname": {
"type": "Optional[String]",
"description": "The certname with which the node should be bootstrapped"
},
"dns_alt_names": {
"type": "Optional[String]",
"description": "The DNS alt names with which the agent certificate should be generated"
},
"cacert_content": {
"type": "Optional[String]",
"description": "The expected CA certificate content for the master"
},
"custom_attribute": {
"type": "Optional[Pattern[w+=w+]]",
"description": "This setting is added to puppet.conf and included in the custom_attributes section of csr_attributes.yaml"
},
"extension_request": {
"type": "Optional[Pattern[w+=w+]]",
"description": "This setting is added to puppet.conf and included in the extension_requests section of csr_attributes.yaml"
}
}
},
"file": {
"filename": "linux.sh",
"file_content": "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"
}
}
},
"task": {
"task": "bootstrap::linux",
"files": [
{
"uri": {
"path": "puppetv3file_contenttasksbootstraplinux.sh",
"params": {
"environment": "production"
}
},
"sha256": "f2a93a24955c6357195b0748540d00a7e8297ce04d3a7fdfd30487362cd61d1f",
"filename": "linux.sh",
"size_bytes": 1429
}
],
"metadata": {
"parameters": {
"master": {
"type": "String",
"description": "The master from which the puppet-agent should be bootstrapped"
},
"certname": {
"type": "Optional[String]",
"description": "The certname with which the node should be bootstrapped"
},
"dns_alt_names": {
"type": "Optional[String]",
"description": "The DNS alt names with which the agent certificate should be generated"
},
"cacert_content": {
"type": "Optional[String]",
"description": "The expected CA certificate content for the master"
},
"custom_attribute": {
"type": "Optional[Pattern[w+=w+]]",
"description": "This setting is added to puppet.conf and included in the custom_attributes section of csr_attributes.yaml"
},
"extension_request": {
"type": "Optional[Pattern[w+=w+]]",
"description": "This setting is added to puppet.conf and included in the extension_requests section of csr_attributes.yaml"
}
},
"description": "Bootstrap a node with puppet-agent for Linux",
"input_method": "environment"
}
},
"parameters": {
"master": "johnson.platform9.puppet.net"
}
}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment