Created
December 10, 2012 19:00
-
-
Save joshcooper/4252548 to your computer and use it in GitHub Desktop.
Settings
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
SETTING ':agent_catalog_run_lockfile' | |
lib/puppet/agent/locker.rb:32: @lockfile_path ||= Puppet[:agent_catalog_run_lockfile] | |
lib/puppet/defaults.rb:1052: :agent_catalog_run_lockfile => { | |
SETTING ':agent_disabled_lockfile' | |
lib/puppet/agent/disabler.rb:48: @disable_lockfile ||= Puppet::Util::JsonLockfile.new(Puppet[:agent_disabled_lockfile]) | |
lib/puppet/defaults.rb:1058: :agent_disabled_lockfile => { | |
SETTING ':allow_duplicate_certs' | |
lib/puppet/defaults.rb:670: :allow_duplicate_certs => { | |
lib/puppet/indirector/certificate_request/ca.rb:11: if Puppet[:allow_duplicate_certs] | |
SETTING ':allow_variables_with_dashes' | |
lib/puppet/defaults.rb:1490: :allow_variables_with_dashes => { | |
lib/puppet/parser/lexer.rb:246: Puppet[:allow_variables_with_dashes] | |
lib/puppet/parser/lexer.rb:260: Puppet[:allow_variables_with_dashes] and TOKENS[:VARIABLE].acceptable?(context) | |
lib/puppet/parser/lexer.rb:542: variable_regex = if Puppet[:allow_variables_with_dashes] | |
SETTING ':archive_file_server' | |
lib/puppet/application/inspect.rb:126: dipper = Puppet::FileBucket::Dipper.new(:Server => Puppet[:archive_file_server]) | |
lib/puppet/defaults.rb:1188: :archive_file_server => { | |
SETTING ':archive_files' | |
lib/puppet/application/inspect.rb:125: if Puppet[:archive_files] | |
lib/puppet/application/inspect.rb:164: if Puppet[:archive_files] and ral_resource.type == :file and audited_attributes.include?(:content) | |
lib/puppet/defaults.rb:1183: :archive_files => { | |
SETTING ':async_storeconfigs' | |
lib/puppet/defaults.rb:301: :async_storeconfigs => { | |
lib/puppet/defaults.rb:1463: if not Puppet.settings[:async_storeconfigs] | |
SETTING ':authconfig' | |
lib/puppet/defaults.rb:158: :authconfig => { | |
SETTING ':autoflush' | |
lib/puppet/defaults.rb:50: :autoflush => { | |
lib/puppet/util/log/destinations.rb:64: attr_accessor :autoflush | |
lib/puppet/util/log/destinations.rb:88: @autoflush = Puppet[:autoflush] | |
lib/puppet/util/log.rb:73: dest.autoflush = v if dest.respond_to?(:autoflush=) | |
SETTING ':autosign' | |
lib/puppet/defaults.rb:662: :autosign => { | |
lib/puppet/ssl/certificate_authority.rb:92: auto = Puppet[:autosign] | |
SETTING ':bindaddress' | |
lib/puppet/application/agent.rb:390: server = Puppet::Network::Server.new(Puppet[:bindaddress], Puppet[:puppetport]) | |
lib/puppet/application/master.rb:189: @daemon.server = Puppet::Network::Server.new(Puppet[:bindaddress], Puppet[:masterport]) | |
lib/puppet/defaults.rb:724: :bindaddress => { | |
lib/puppet/test/test_helper.rb:154: Puppet.settings[:bindaddress] = "127.0.0.1" | |
SETTING ':bucketdir' | |
lib/puppet/application/filebucket.rb:173: path = options[:bucket] || Puppet[:bucketdir] | |
lib/puppet/defaults.rb:786: :bucketdir => { | |
lib/puppet/indirector/file_bucket_file/file.rb:114: bucket_path ||= Puppet[:bucketdir] | |
SETTING ':ca' | |
lib/puppet/application/agent.rb:12: :catalog_terminus => :rest, | |
lib/puppet/application/agent.rb:13: :catalog_cache_terminus => :json, | |
lib/puppet/application/agent.rb:465: if Puppet[:catalog_cache_terminus] | |
lib/puppet/application/agent.rb:466: Puppet::Resource::Catalog.indirection.cache_class = Puppet[:catalog_cache_terminus] | |
lib/puppet/application/apply.rb:16: options[:catalog] = arg | |
lib/puppet/application/apply.rb:143: if options[:catalog] | |
lib/puppet/application/apply.rb:151: if options[:catalog] == "-" | |
lib/puppet/application/apply.rb:154: text = ::File.read(options[:catalog]) | |
lib/puppet/application/apply.rb:265: configurer.run(:catalog => catalog, :pluginsync => false) | |
lib/puppet/application/cert.rb:7: attr_accessor :all, :ca, :digest, :signed | |
lib/puppet/application/device.rb:13: :catalog_terminus => :rest, | |
lib/puppet/application/device.rb:14: :catalog_cache_terminus => :json, | |
lib/puppet/application/device.rb:240: if Puppet[:catalog_cache_terminus] | |
lib/puppet/application/device.rb:241: Puppet::Resource::Catalog.indirection.cache_class = Puppet[:catalog_cache_terminus].intern | |
lib/puppet/application/master.rb:237: Puppet.settings.use :ca | |
lib/puppet/configurer.rb:107: unless catalog = (options.delete(:catalog) || retrieve_catalog(fact_options)) | |
lib/puppet/defaults.rb:125: :call_hook => :on_define_and_write, | |
lib/puppet/defaults.rb:144: :call_hook => :on_initialize_and_write, | |
lib/puppet/defaults.rb:228: :catalog_terminus => { | |
lib/puppet/defaults.rb:234: :catalog_cache_terminus => { | |
lib/puppet/defaults.rb:242: :call_hook => :on_initialize_and_write, | |
lib/puppet/defaults.rb:313: Puppet.settings[:catalog_cache_terminus] = :queue | |
lib/puppet/defaults.rb:381: :call_hook => :on_define_and_write, # Call our hook with the default value, so we're always downcased | |
lib/puppet/defaults.rb:578: :ca, | |
lib/puppet/defaults.rb:579: :ca_name => { | |
lib/puppet/defaults.rb:583: :cadir => { | |
lib/puppet/defaults.rb:591: :cacert => { | |
lib/puppet/defaults.rb:599: :cakey => { | |
lib/puppet/defaults.rb:607: :capub => { | |
lib/puppet/defaults.rb:614: :cacrl => { | |
lib/puppet/defaults.rb:623: :caprivatedir => { | |
lib/puppet/defaults.rb:646: :capass => { | |
lib/puppet/defaults.rb:676: :ca_ttl => { | |
lib/puppet/defaults.rb:681: :ca_md => { | |
lib/puppet/defaults.rb:801: :ca => { | |
lib/puppet/defaults.rb:1022: :ca_server => { | |
lib/puppet/defaults.rb:1028: :ca_port => { | |
lib/puppet/defaults.rb:1032: :catalog_format => { | |
lib/puppet/defaults.rb:1232: :call_hook => :on_initialize_and_write, # Call our hook with the default value, so we always get the value added to facter. | |
lib/puppet/defaults.rb:1458: :call_hook => :on_initialize_and_write, | |
lib/puppet/defaults.rb:1465: Puppet.settings[:catalog_cache_terminus] = :store_configs | |
lib/puppet/external/nagios/base.rb:388: :address5, :address6, :can_submit_commands, :retain_status_information, | |
lib/puppet/face/ca.rb:3:Puppet::Face.define(:ca, '0.1.0') do | |
lib/puppet/face/catalog/select.rb:2:Puppet::Face.define(:catalog, '0.0.1') do | |
lib/puppet/face/catalog.rb:3:Puppet::Indirector::Face.define(:catalog, '0.0.1') do | |
lib/puppet/face/catalog.rb:56: Puppet::Face[:catalog, '0.0.1'].download | |
lib/puppet/face/catalog.rb:59: report = Puppet::Face[:catalog, '0.0.1'].apply | |
lib/puppet/face/catalog.rb:64: catalog = Puppet::Face[:catalog, "0.0.1"].find(Puppet[:certname]) or raise "Could not find catalog for #{Puppet[:certname]}" | |
lib/puppet/face/catalog.rb:111: Puppet::Face[:catalog, '0.0.1'].download | |
lib/puppet/face/catalog.rb:119: catalog = Puppet::Face[:catalog, '0.0.1'].find(Puppet[:certname]) | |
lib/puppet/face/catalog.rb:125: Puppet::Face[:catalog, "0.0.1"].save(catalog) | |
lib/puppet/face/certificate.rb:28: unless [:remote, :local, :only].include? options[:ca_location].to_sym | |
lib/puppet/face/certificate.rb:31: Puppet::SSL::Host.ca_location = options[:ca_location].to_sym | |
lib/puppet/face/node/clean.rb:71: Puppet::Face[:ca, :current].revoke(node) | |
lib/puppet/face/node/clean.rb:72: Puppet::Face[:ca, :current].destroy(node) | |
lib/puppet/face/report.rb:40: report = Puppet::Face[:catalog, '0.0.1'].apply | |
lib/puppet/face/secret_agent.rb:45: Puppet::Face[:catalog, '0.0.1'].download | |
lib/puppet/face/secret_agent.rb:47: report = Puppet::Face[:catalog, '0.0.1'].apply | |
lib/puppet/forge/repository.rb:14: attr_reader :uri, :cache | |
lib/puppet/indirector/certificate/ca.rb:8: store_ca_at :cacert | |
lib/puppet/indirector/certificate/rest.rb:7: use_server_setting(:ca_server) | |
lib/puppet/indirector/certificate/rest.rb:8: use_port_setting(:ca_port) | |
lib/puppet/indirector/certificate/rest.rb:9: use_srv_service(:ca) | |
lib/puppet/indirector/certificate_request/rest.rb:7: use_server_setting(:ca_server) | |
lib/puppet/indirector/certificate_request/rest.rb:8: use_port_setting(:ca_port) | |
lib/puppet/indirector/certificate_revocation_list/ca.rb:7: store_at :cacrl | |
lib/puppet/indirector/certificate_revocation_list/rest.rb:7: use_server_setting(:ca_server) | |
lib/puppet/indirector/certificate_revocation_list/rest.rb:8: use_port_setting(:ca_port) | |
lib/puppet/indirector/certificate_status/rest.rb:8: use_server_setting(:ca_server) | |
lib/puppet/indirector/certificate_status/rest.rb:9: use_port_setting(:ca_port) | |
lib/puppet/indirector/indirection.rb:55: attr_reader :cache_class | |
lib/puppet/indirector/key/ca.rb:11: store_ca_at :cakey | |
lib/puppet/indirector/key/file.rb:8: store_ca_at :cakey | |
lib/puppet/indirector/key/file.rb:13: Puppet[:capub] | |
lib/puppet/indirector/queue.rb:17:# Per-indirection queues are assumed, based on the indirection name. If the <tt>:catalog</tt> indirection makes | |
lib/puppet/indirector/ssl_file.rb:21: attr_reader :directory_setting, :file_setting, :ca_setting | |
lib/puppet/network/http/connection.rb:140: class << @connection; attr_accessor :ca_file; end | |
lib/puppet/network/http/connection.rb:187: :ca_chain_file => Puppet[:ssl_client_ca_chain], | |
lib/puppet/network/http/connection.rb:188: :ca_auth_file => Puppet[:ssl_client_ca_auth] | |
lib/puppet/network/http/webrick.rb:113: :ca_chain_file => Puppet[:ssl_server_ca_chain], | |
lib/puppet/network/http/webrick.rb:114: :ca_auth_file => Puppet[:ssl_server_ca_auth]) | |
lib/puppet/network/resolver.rb:18: when :ca then service = '_x-puppet-ca' | |
lib/puppet/parameter/value.rb:6: attr_accessor :block, :call, :method, :required_features | |
lib/puppet/parameter/value_collection.rb:84: # * <tt>:call</tt>: When to call any associated block. The default value | |
lib/puppet/parameter/value_collection.rb:102: value.call = options[:call] || :none | |
lib/puppet/parser/compiler.rb:36: attr_reader :node, :facts, :collections, :catalog, :resources, :relationships, :topscope | |
lib/puppet/parser/resource.rb:25: attr_accessor :virtual, :override, :translated, :catalog, :evaluated | |
lib/puppet/parser/scope.rb:32: def_delegators :compiler, :catalog, :environment | |
lib/puppet/property.rb:57: # * <tt>:call</tt>: When to call any associated block. The default value | |
lib/puppet/property.rb:288: call = self.class.value_option(name, :call) || :none | |
lib/puppet/property.rb:299: # previously specify :call => [;before|:after], which would call | |
lib/puppet/property.rb:304: devfail "Cannot use obsolete :call value '#{call}' for property '#{self.class.name}'" | |
lib/puppet/provider/package/portage.rb:17: result_fields = [:category, :name, :ensure, :version_available, :vendor, :description] | |
lib/puppet/provider/package/portage.rb:63: @resource[:category] ? "#{@resource[:category]}/#{@resource[:name]}" : @resource[:name] | |
lib/puppet/provider/package/portage.rb:76: result_fields = [:category, :name, :ensure, :version_available, :vendor, :description] | |
lib/puppet/provider/package/portage.rb:109: not_found_value = "#{@resource[:category] ? @resource[:category] : "<unspecified category>"}/#{@resource[:name]}" | |
lib/puppet/provider/package/sun.rb:20: "CATEGORY" => :category, | |
lib/puppet/provider/zfs/zfs.rb:67: [:aclinherit, :atime, :canmount, :checksum, | |
lib/puppet/relationship.rb:13: attr_accessor :source, :target, :callback | |
lib/puppet/relationship.rb:26: args[:callback] = callback | |
lib/puppet/relationship.rb:41: [:callback, :event].each do |option| | |
lib/puppet/relationship.rb:62: result[:callback] = callback if callback | |
lib/puppet/resource/catalog.rb:18: indirects :catalog, :terminus_setting => :catalog_terminus | |
lib/puppet/resource/catalog.rb:88: resource.catalog = self if resource.respond_to?(:catalog=) | |
lib/puppet/resource/catalog.rb:303: Default_label = { :callback => :refresh, :event => :ALL_EVENTS } | |
lib/puppet/resource/catalog.rb:319: admissible[x] = whit_class.new(:name => "admissible_#{x.ref}", :catalog => self) | |
lib/puppet/resource/catalog.rb:320: completed[x] = whit_class.new(:name => "completed_#{x.ref}", :catalog => self) | |
lib/puppet/resource/type.rb:312: if caller_name = scope.parent_module_name and ! set.include?(:caller_module_name) | |
lib/puppet/resource.rb:21: attr_accessor :file, :line, :catalog, :exported, :virtual, :validate_parameters, :strict | |
lib/puppet/settings/base_setting.rb:5: attr_accessor :name, :section, :default, :call_on_define, :call_hook | |
lib/puppet/settings/base_setting.rb:23: Puppet.deprecation_warning ":call_on_define has been changed to :call_hook => :on_define_and_write. Please change #{name}." | |
lib/puppet/settings/base_setting.rb:26: Puppet.deprecation_warning ":call_on_define => :false has been changed to :call_hook => :on_write_only. Please change #{name}." | |
lib/puppet/settings/base_setting.rb:33: Puppet.warning "Setting :#{name} :call_hook is nil, defaulting to :on_write_only" | |
lib/puppet/settings/base_setting.rb:98: @call_hook = :on_write_only if args[:hook] and not args[:call_hook] | |
lib/puppet/settings/base_setting.rb:100: raise ArgumentError, "Cannot reference :call_hook for :#{@name} if no :hook is defined" if args[:call_hook] and not args[:hook] | |
lib/puppet/settings.rb:239: private :call_hooks_deferred_to_application_initialization | |
lib/puppet/ssl/certificate_authority.rb:55: return false unless Puppet[:ca] | |
lib/puppet/ssl/certificate_authority.rb:164: Puppet.settings.use :main, :ssl, :ca | |
lib/puppet/ssl/certificate_authority.rb:184: Puppet.settings.write(:capass) { |f| f.print pass } | |
lib/puppet/ssl/certificate_authority.rb:221: FileTest.exist? Puppet[:capass] | |
lib/puppet/ssl/certificate_authority.rb:260: cert_type = :ca | |
lib/puppet/ssl/certificate_authority.rb:360: store.add_file Puppet[:cacert] | |
lib/puppet/ssl/certificate_factory.rb:29: cert.not_after = Time.now + (ttl || Puppet[:ca_ttl]) | |
lib/puppet/ssl/certificate_request.rb:43: common_name = name == Puppet::SSL::CA_NAME ? Puppet.settings[:ca_name] : name | |
lib/puppet/ssl/configuration.rb:11: if (options[:ca_chain_file] and not options[:ca_auth_file]) | |
lib/puppet/ssl/configuration.rb:15: @ca_chain_file = options[:ca_chain_file] | |
lib/puppet/ssl/configuration.rb:16: @ca_auth_file = options[:ca_auth_file] | |
lib/puppet/ssl/host.rb:22: attr_accessor :ca | |
lib/puppet/ssl/host.rb:48: attr_reader :ca_location | |
lib/puppet/ssl/host.rb:57: host_map = {:ca => :file, :disabled_ca => nil, :file => nil, :rest => :rest} | |
lib/puppet/ssl/host.rb:91: :local => [:ca, :file], | |
lib/puppet/ssl/host.rb:95: :only => [:ca], | |
lib/puppet/ssl/key.rb:29: @password_file = Puppet[:capass] | |
lib/puppet/transaction.rb:15: attr_accessor :component, :catalog, :ignoreschedules, :for_network_device | |
lib/puppet/transaction.rb:168: sentinel = Puppet::Type.type(:whit).new(:name => "completed_#{resource.title}", :catalog => resource.catalog) | |
lib/puppet/type/package.rb:273: newparam(:category) do | |
lib/puppet/type/zfs.rb:27: newproperty(:canmount) do | |
lib/puppet/type.rb:794: [:catalog].each do |attribute| | |
lib/puppet/type.rb:1014: attr_accessor :direction, :events, :callback, :subclasses | |
lib/puppet/type.rb:1074: :callback => method | |
lib/puppet/type.rb:1140: newmetaparam(:subscribe, :parent => RelationshipMetaparam, :attributes => {:direction => :in, :events => :ALL_EVENTS, :callback => :refresh}) do | |
lib/puppet/type.rb:1182: newmetaparam(:notify, :parent => RelationshipMetaparam, :attributes => {:direction => :out, :events => :ALL_EVENTS, :callback => :refresh}) do | |
lib/puppet/type.rb:1593: attr_accessor :catalog | |
lib/puppet/type.rb:1636: [:file, :line, :catalog, :exported, :virtual].each do |getter| | |
lib/puppet/util/command_line/puppet_option_parser.rb:56: :callback => pass_only_last_value_on_to(block), | |
lib/puppet/util/command_line/trollop.rb:432: opts[:callback].call(vals[sym]) if opts.has_key?(:callback) | |
lib/puppet/util/instrumentation/instrumentable.rb:47: instrumentation_label = label.respond_to?(:call) ? label.call(self, args) : label | |
lib/puppet/util/instrumentation/instrumentable.rb:48: instrumentation_data = data.respond_to?(:call) ? data.call(self, args) : data | |
lib/puppet/util/rdoc/generators/template/puppet/puppet.rb:771:IF:callseq | |
lib/puppet/util/rdoc/generators/template/puppet/puppet.rb:773:ENDIF:callseq | |
lib/puppet/util/rdoc/generators/template/puppet/puppet.rb:774:IFNOT:callseq | |
lib/puppet/util/rdoc/generators/template/puppet/puppet.rb:776:ENDIF:callseq | |
SETTING ':ca_md' | |
lib/puppet/defaults.rb:681: :ca_md => { | |
SETTING ':ca_name' | |
lib/puppet/defaults.rb:579: :ca_name => { | |
lib/puppet/ssl/certificate_request.rb:43: common_name = name == Puppet::SSL::CA_NAME ? Puppet.settings[:ca_name] : name | |
SETTING ':ca_port' | |
lib/puppet/defaults.rb:1028: :ca_port => { | |
lib/puppet/indirector/certificate/rest.rb:8: use_port_setting(:ca_port) | |
lib/puppet/indirector/certificate_request/rest.rb:8: use_port_setting(:ca_port) | |
lib/puppet/indirector/certificate_revocation_list/rest.rb:8: use_port_setting(:ca_port) | |
lib/puppet/indirector/certificate_status/rest.rb:9: use_port_setting(:ca_port) | |
SETTING ':ca_server' | |
lib/puppet/defaults.rb:1022: :ca_server => { | |
lib/puppet/indirector/certificate/rest.rb:7: use_server_setting(:ca_server) | |
lib/puppet/indirector/certificate_request/rest.rb:7: use_server_setting(:ca_server) | |
lib/puppet/indirector/certificate_revocation_list/rest.rb:7: use_server_setting(:ca_server) | |
lib/puppet/indirector/certificate_status/rest.rb:8: use_server_setting(:ca_server) | |
SETTING ':ca_ttl' | |
lib/puppet/defaults.rb:676: :ca_ttl => { | |
lib/puppet/ssl/certificate_factory.rb:29: cert.not_after = Time.now + (ttl || Puppet[:ca_ttl]) | |
SETTING ':cacert' | |
lib/puppet/defaults.rb:591: :cacert => { | |
lib/puppet/indirector/certificate/ca.rb:8: store_ca_at :cacert | |
lib/puppet/ssl/certificate_authority.rb:360: store.add_file Puppet[:cacert] | |
SETTING ':cacrl' | |
lib/puppet/defaults.rb:614: :cacrl => { | |
lib/puppet/indirector/certificate_revocation_list/ca.rb:7: store_at :cacrl | |
SETTING ':cadir' | |
lib/puppet/defaults.rb:583: :cadir => { | |
SETTING ':cakey' | |
lib/puppet/defaults.rb:599: :cakey => { | |
lib/puppet/indirector/key/ca.rb:11: store_ca_at :cakey | |
lib/puppet/indirector/key/file.rb:8: store_ca_at :cakey | |
SETTING ':capass' | |
lib/puppet/defaults.rb:646: :capass => { | |
lib/puppet/ssl/certificate_authority.rb:184: Puppet.settings.write(:capass) { |f| f.print pass } | |
lib/puppet/ssl/certificate_authority.rb:221: FileTest.exist? Puppet[:capass] | |
lib/puppet/ssl/key.rb:29: @password_file = Puppet[:capass] | |
SETTING ':caprivatedir' | |
lib/puppet/defaults.rb:623: :caprivatedir => { | |
SETTING ':capub' | |
lib/puppet/defaults.rb:607: :capub => { | |
lib/puppet/indirector/key/file.rb:13: Puppet[:capub] | |
SETTING ':catalog_cache_terminus' | |
lib/puppet/application/agent.rb:13: :catalog_cache_terminus => :json, | |
lib/puppet/application/agent.rb:465: if Puppet[:catalog_cache_terminus] | |
lib/puppet/application/agent.rb:466: Puppet::Resource::Catalog.indirection.cache_class = Puppet[:catalog_cache_terminus] | |
lib/puppet/application/device.rb:14: :catalog_cache_terminus => :json, | |
lib/puppet/application/device.rb:240: if Puppet[:catalog_cache_terminus] | |
lib/puppet/application/device.rb:241: Puppet::Resource::Catalog.indirection.cache_class = Puppet[:catalog_cache_terminus].intern | |
lib/puppet/defaults.rb:234: :catalog_cache_terminus => { | |
lib/puppet/defaults.rb:313: Puppet.settings[:catalog_cache_terminus] = :queue | |
lib/puppet/defaults.rb:1465: Puppet.settings[:catalog_cache_terminus] = :store_configs | |
SETTING ':catalog_format' | |
lib/puppet/defaults.rb:1032: :catalog_format => { | |
SETTING ':catalog_terminus' | |
lib/puppet/application/agent.rb:12: :catalog_terminus => :rest, | |
lib/puppet/application/device.rb:13: :catalog_terminus => :rest, | |
lib/puppet/defaults.rb:228: :catalog_terminus => { | |
lib/puppet/resource/catalog.rb:18: indirects :catalog, :terminus_setting => :catalog_terminus | |
SETTING ':cert_inventory' | |
lib/puppet/defaults.rb:693: :cert_inventory => { | |
lib/puppet/ssl/inventory.rb:15: Puppet.settings.write(:cert_inventory, "a") do |f| | |
lib/puppet/ssl/inventory.rb:27: @path = Puppet[:cert_inventory] | |
lib/puppet/ssl/inventory.rb:35: Puppet.settings.write(:cert_inventory) do |f| | |
SETTING ':certdir' | |
lib/puppet/defaults.rb:435: :certdir => { | |
lib/puppet/indirector/certificate/file.rb:7: store_in :certdir | |
SETTING ':certdnsnames' | |
lib/puppet/defaults.rb:383: :certdnsnames => { | |
SETTING ':certificate_expire_warning' | |
lib/puppet/defaults.rb:569: :certificate_expire_warning => { | |
lib/puppet/ssl/certificate.rb:34: interval ||= Puppet[:certificate_expire_warning] | |
SETTING ':certificate_revocation' | |
lib/puppet/defaults.rb:563: :certificate_revocation => { | |
lib/puppet/face/certificate_revocation_list.rb:3:Puppet::Indirector::Face.define(:certificate_revocation_list, '0.0.1') do | |
lib/puppet/ssl/certificate_authority.rb:363: store.flags = OpenSSL::X509::V_FLAG_CRL_CHECK_ALL|OpenSSL::X509::V_FLAG_CRL_CHECK if Puppet.settings[:certificate_revocation] | |
lib/puppet/ssl/certificate_revocation_list.rb:11: indirects :certificate_revocation_list, :terminus_class => :file | |
lib/puppet/ssl/host.rb:262: @ssl_store.flags = OpenSSL::X509::V_FLAG_CRL_CHECK_ALL|OpenSSL::X509::V_FLAG_CRL_CHECK if Puppet.settings[:certificate_revocation] | |
SETTING ':certname' | |
lib/puppet/application/agent.rb:440: Puppet[:certname] = options[:fqdn] | |
lib/puppet/application/device.rb:167: certname = Puppet[:certname] | |
lib/puppet/application/device.rb:183: Puppet.settings.set_value(:certname, device.name, :cli) | |
lib/puppet/application/device.rb:204: Puppet.settings.set_value(:certname, certname, :cli) | |
lib/puppet/application/inspect.rb:115: unless catalog = Puppet::Resource::Catalog.indirection.find(Puppet[:certname]) | |
lib/puppet/application/inspect.rb:116: raise "Could not find catalog for #{Puppet[:certname]}" | |
lib/puppet/defaults.rb:378: :certname => { | |
lib/puppet/defaults.rb:921: if !value.empty? and Puppet[:node_name_value] != Puppet[:certname] | |
lib/puppet/face/catalog.rb:64: catalog = Puppet::Face[:catalog, "0.0.1"].find(Puppet[:certname]) or raise "Could not find catalog for #{Puppet[:certname]}" | |
lib/puppet/face/catalog.rb:119: catalog = Puppet::Face[:catalog, '0.0.1'].find(Puppet[:certname]) | |
lib/puppet/face/catalog.rb:126: Puppet.notice "Saved catalog for #{Puppet[:certname]} to yaml" | |
lib/puppet/face/facts.rb:74: facts = Puppet::Node::Facts.indirection.find(Puppet[:certname]) | |
lib/puppet/face/facts.rb:77: Puppet.notice "Uploaded facts for '#{Puppet[:certname]}'" | |
lib/puppet/node/facts.rb:29: values["clientcert"] = Puppet.settings[:certname] | |
lib/puppet/ssl/certificate_authority.rb:166: @name = Puppet[:certname] | |
lib/puppet/ssl/certificate_authority.rb:263: allow_dns_alt_names = true if hostname == Puppet[:certname].downcase | |
lib/puppet/ssl/host.rb:160: name == Puppet[:certname].downcase | |
lib/puppet/ssl/host.rb:164: name == Puppet[:certname].downcase | |
lib/puppet/ssl/host.rb:216: puppet cert clean #{Puppet[:certname]} | |
lib/puppet/ssl/host.rb:238: @name = (name || Puppet[:certname]).downcase | |
SETTING ':classfile' | |
lib/puppet/application/apply.rb:191: file = Puppet[:classfile] | |
lib/puppet/defaults.rb:954: :classfile => { | |
lib/puppet/resource/catalog.rb:492: ::File.open(Puppet[:classfile], "w") do |f| | |
lib/puppet/resource/catalog.rb:496: Puppet.err "Could not create class file #{Puppet[:classfile]}: #{detail}" | |
SETTING ':client_datadir' | |
lib/puppet/defaults.rb:948: :client_datadir => { | |
lib/puppet/indirector/json.rb:45: base = Puppet.run_mode.master? ? Puppet[:server_datadir] : Puppet[:client_datadir] | |
SETTING ':clientbucketdir' | |
lib/puppet/defaults.rb:1104: :clientbucketdir => { | |
lib/puppet/type/filebucket.rb:63: defaultto { Puppet[:clientbucketdir] } | |
lib/puppet/type/filebucket.rb:80: new(:name => "puppet", :path => Puppet[:clientbucketdir]) | |
SETTING ':clientyamldir' | |
lib/puppet/defaults.rb:942: :clientyamldir => { | |
lib/puppet/indirector/facts/yaml.rb:21: base = Puppet.run_mode.master? ? Puppet[:yamldir] : Puppet[:clientyamldir] | |
lib/puppet/indirector/yaml.rb:57: base = Puppet.run_mode.master? ? Puppet[:yamldir] : Puppet[:clientyamldir] | |
SETTING ':code' | |
lib/puppet/application/apply.rb:8: options[:code] = arg | |
lib/puppet/application/apply.rb:162: if options[:code] or command_line.args.length == 0 | |
lib/puppet/application/apply.rb:163: Puppet[:code] = options[:code] || STDIN.read | |
lib/puppet/defaults.rb:749: :code => { | |
lib/puppet/face/parser.rb:37: Puppet[:code] = STDIN.read | |
lib/puppet/indirector/catalog/compiler.rb:12: attr_accessor :code | |
lib/puppet/node/environment.rb:210: if code = Puppet.settings.uninterpolated_value(:code, name.to_s) and code != "" | |
lib/puppet/parser/ast/hostclass.rb:27: @context[:code] | |
lib/puppet/parser/grammar.ra:618: ast_context(true).merge(:arguments => val[2], :code => val[4], | |
lib/puppet/parser/grammar.ra:637: :code => val[5], :line => val[0][:line])) | |
lib/puppet/parser/grammar.ra:650: ast_context(true).merge(:parent => val[2], :code => val[4], | |
lib/puppet/parser/parser.rb:2153: ast_context(true).merge(:arguments => val[2], :code => val[4], | |
lib/puppet/parser/parser.rb:2181: :code => val[5], :line => val[0][:line])) | |
lib/puppet/parser/parser.rb:2204: ast_context(true).merge(:parent => val[2], :code => val[4], | |
lib/puppet/parser/parser_support.rb:155: return Puppet::Parser::AST::Hostclass.new('', :code => main) | |
lib/puppet/resource/type.rb:30: attr_accessor :file, :line, :doc, :code, :ruby_code, :parent, :resource_type_collection | |
lib/puppet/resource/type.rb:149: [:code, :doc, :line, :file, :parent].each do |param| | |
lib/puppet/settings.rb:968: if param == :code | |
lib/puppet/util/rdoc/generators/template/puppet/puppet.rb:764:IF:codeurl | |
lib/puppet/util/rdoc/generators/template/puppet/puppet.rb:767:ENDIF:codeurl | |
lib/puppet/util/rdoc/generators/template/puppet/puppet.rb:777:IF:codeurl | |
lib/puppet/util/rdoc/generators/template/puppet/puppet.rb:779:ENDIF:codeurl | |
lib/puppet/util/windows/error.rb:8: attr_reader :code | |
SETTING ':color' | |
lib/puppet/defaults.rb:97: :color => { | |
lib/puppet/rb_tree_map.rb:199: attr_accessor :color, :key, :value, :left, :right | |
lib/puppet/rb_tree_map.rb:213: :color => @color, | |
lib/puppet/util/colors.rb:103: case Puppet[:color] | |
lib/puppet/util/log/destinations.rb:110: :emerg => { :name => 'Emergency', :color => :hred, :stream => $stderr }, | |
lib/puppet/util/log/destinations.rb:111: :alert => { :name => 'Alert', :color => :hred, :stream => $stderr }, | |
lib/puppet/util/log/destinations.rb:112: :crit => { :name => 'Critical', :color => :hred, :stream => $stderr }, | |
lib/puppet/util/log/destinations.rb:113: :err => { :name => 'Error', :color => :hred, :stream => $stderr }, | |
lib/puppet/util/log/destinations.rb:114: :warning => { :name => 'Warning', :color => :hred, :stream => $stderr }, | |
lib/puppet/util/log/destinations.rb:116: :notice => { :name => 'Notice', :color => :reset, :stream => $stdout }, | |
lib/puppet/util/log/destinations.rb:117: :info => { :name => 'Info', :color => :green, :stream => $stdout }, | |
lib/puppet/util/log/destinations.rb:118: :debug => { :name => 'Debug', :color => :cyan, :stream => $stdout }, | |
lib/puppet/util/log/destinations.rb:125: level[:stream].puts colorize(level[:color], "#{level[:name]}: #{str}") | |
SETTING ':config' | |
lib/hiera_puppet.rb:57: @hiera ||= Hiera.new(:config => hiera_config) | |
lib/puppet/configurer/downloader.rb:13: ::Timeout.timeout(Puppet[:configtimeout]) do | |
lib/puppet/configurer.rb:42: @compile_time ||= Puppet::Util::Storage.cache(:configuration)[:compile_time] | |
lib/puppet/defaults.rb:90: :configprint => { | |
lib/puppet/defaults.rb:331: :config_version => { | |
lib/puppet/defaults.rb:706: :config_file_name => { | |
lib/puppet/defaults.rb:711: :config => { | |
lib/puppet/defaults.rb:1110: :configtimeout => { | |
lib/puppet/face/config.rb:3:Puppet::Face.define(:config, '0.0.1') do | |
lib/puppet/face/config.rb:43: Puppet.settings[:configprint] = args.join(",") | |
lib/puppet/indirector/facts/facter.rb:35: ::Timeout::timeout(Puppet[:configtimeout]) do | |
lib/puppet/indirector/hiera.rb:32: @hiera ||= Hiera.new(:config => hiera_config) | |
lib/puppet/network/http/connection.rb:144: @connection.read_timeout = Puppet[:configtimeout] | |
lib/puppet/network/http/connection.rb:145: @connection.open_timeout = Puppet[:configtimeout] | |
lib/puppet/provider/package/apt.rb:49: if config = @resource[:configfiles] | |
lib/puppet/provider/package/dpkg.rb:74: if @resource[:configfiles] == :keep | |
lib/puppet/reference/configuration.rb:1:config = Puppet::Util::Reference.newreference(:configuration, :depth => 1, :doc => "A reference for all configuration parameters") do | |
lib/puppet/resource/catalog.rb:139: transaction.add_times :config_retrieval => self.retrieval_duration || 0 | |
lib/puppet/resource/type_collection.rb:139: if environment[:config_version] == "" | |
lib/puppet/resource/type_collection.rb:144: @version = Puppet::Util::Execution.execute([environment[:config_version]]).strip | |
lib/puppet/settings.rb:362: val = value(:configprint) | |
lib/puppet/settings.rb:402: return print_config_options if value(:configprint) != "" | |
lib/puppet/settings.rb:408: (value(:configprint) != "" || value(:genconfig) || value(:genmanifest)) && true | |
lib/puppet/settings.rb:489: return self[:config] | |
lib/puppet/settings.rb:511: return self[:config_file_name] if self[:config_file_name] | |
lib/puppet/settings.rb:518: private :config_file_name | |
lib/puppet/settings.rb:956: #self.reparse unless [:config, :filetimeout].include?(param) | |
lib/puppet/settings.rb:1252: # is to simply attempt to evaluate the value of ":config". This will | |
lib/puppet/settings.rb:1253: # obviously be successful if they've passed an explicit value for :config, | |
lib/puppet/settings.rb:1261: return true if self[:config] | |
lib/puppet/settings.rb:1264: # explicitly specify either :config or :confdir... so we'll fall out to | |
lib/puppet/transaction/report.rb:13: attr_accessor :configuration_version, :host, :environment | |
lib/puppet/transaction.rb:16: attr_accessor :configurator | |
lib/puppet/type/package.rb:264: newparam(:configfiles) do | |
lib/puppet/type/zone.rb:75: # i.e we go linearly from :absent -> :configured -> :installed -> :running | |
lib/puppet/type/zone.rb:77: seqvalue :configured, :up => :configure, :down => :uninstall | |
SETTING ':config_file_name' | |
lib/puppet/defaults.rb:706: :config_file_name => { | |
lib/puppet/settings.rb:511: return self[:config_file_name] if self[:config_file_name] | |
lib/puppet/settings.rb:518: private :config_file_name | |
SETTING ':config_version' | |
lib/puppet/defaults.rb:331: :config_version => { | |
lib/puppet/resource/type_collection.rb:139: if environment[:config_version] == "" | |
lib/puppet/resource/type_collection.rb:144: @version = Puppet::Util::Execution.execute([environment[:config_version]]).strip | |
SETTING ':configprint' | |
lib/puppet/defaults.rb:90: :configprint => { | |
lib/puppet/face/config.rb:43: Puppet.settings[:configprint] = args.join(",") | |
lib/puppet/settings.rb:362: val = value(:configprint) | |
lib/puppet/settings.rb:402: return print_config_options if value(:configprint) != "" | |
lib/puppet/settings.rb:408: (value(:configprint) != "" || value(:genconfig) || value(:genmanifest)) && true | |
SETTING ':configtimeout' | |
lib/puppet/configurer/downloader.rb:13: ::Timeout.timeout(Puppet[:configtimeout]) do | |
lib/puppet/defaults.rb:1110: :configtimeout => { | |
lib/puppet/indirector/facts/facter.rb:35: ::Timeout::timeout(Puppet[:configtimeout]) do | |
lib/puppet/network/http/connection.rb:144: @connection.read_timeout = Puppet[:configtimeout] | |
lib/puppet/network/http/connection.rb:145: @connection.open_timeout = Puppet[:configtimeout] | |
SETTING ':couchdb_url' | |
lib/puppet/defaults.rb:1333: :couchdb_url => { | |
lib/puppet/indirector/couch.rb:6: def self.db; @db ||= CouchRest.database! Puppet[:couchdb_url] end | |
SETTING ':csrdir' | |
lib/puppet/defaults.rb:631: :csrdir => { | |
lib/puppet/indirector/certificate_request/ca.rb:7: store_in :csrdir | |
SETTING ':daemonize' | |
lib/puppet/application/agent.rb:414: @daemon.daemonize if Puppet[:daemonize] | |
lib/puppet/application/master.rb:190: @daemon.daemonize if Puppet[:daemonize] | |
lib/puppet/application/master.rb:214: unless Puppet[:daemonize] or options[:rack] | |
lib/puppet/application/queue.rb:156: daemon.daemonize if Puppet[:daemonize] | |
lib/puppet/daemon.rb:142: close_streams if Puppet[:daemonize] | |
lib/puppet/defaults.rb:190: :daemonize => { | |
lib/puppet/network/server.rb:103: close_streams if Puppet[:daemonize] | |
SETTING ':data_binding_terminus' | |
lib/puppet/data_binding.rb:9: indirects(:data_binding, :terminus_setting => :data_binding_terminus, | |
lib/puppet/defaults.rb:218: :data_binding_terminus => { | |
SETTING ':dbadapter' | |
lib/puppet/defaults.rb:1270: :dbadapter => { | |
lib/puppet/rails/database/schema.rb:28: if ['mysql','mysql2'].include? Puppet[:dbadapter] | |
lib/puppet/rails/database/schema.rb:30: elsif Puppet[:dbadapter] != "oracle_enhanced" | |
lib/puppet/rails/database/schema.rb:58: add_index :puppet_tags, :id, :integer => true if Puppet[:dbadapter] != "oracle_enhanced" | |
lib/puppet/rails.rb:44: adapter = Puppet[:dbadapter] | |
SETTING ':dbconnections' | |
lib/puppet/defaults.rb:1303: :dbconnections => { | |
lib/puppet/rails.rb:56: args[:pool] = Puppet[:dbconnections].to_i unless Puppet[:dbconnections].to_i <= 0 | |
lib/puppet/rails.rb:66: args[:pool] = Puppet[:dbconnections].to_i unless Puppet[:dbconnections].to_i <= 0 | |
SETTING ':dblocation' | |
lib/puppet/defaults.rb:1261: :dblocation => { | |
lib/puppet/rails.rb:50: args[:database] = Puppet[:dblocation] | |
SETTING ':dbmigrate' | |
lib/puppet/defaults.rb:1274: :dbmigrate => { | |
lib/puppet/rails.rb:85: migrate if Puppet[:dbmigrate] | |
SETTING ':dbname' | |
lib/puppet/defaults.rb:1279: :dbname => { | |
lib/puppet/rails.rb:57: args[:database] = Puppet[:dbname] | |
lib/puppet/rails.rb:63: args[:database] = Puppet[:dbname] unless Puppet[:dbname].to_s.empty? | |
SETTING ':dbpassword' | |
lib/puppet/defaults.rb:1298: :dbpassword => { | |
lib/puppet/rails.rb:55: args[:password] = Puppet[:dbpassword] unless Puppet[:dbpassword].to_s.empty? | |
lib/puppet/rails.rb:65: args[:password] = Puppet[:dbpassword] unless Puppet[:dbpassword].to_s.empty? | |
SETTING ':dbport' | |
lib/puppet/defaults.rb:1288: :dbport => { | |
lib/puppet/rails.rb:53: args[:port] = Puppet[:dbport] unless Puppet[:dbport].to_s.empty? | |
SETTING ':dbserver' | |
lib/puppet/defaults.rb:1283: :dbserver => { | |
lib/puppet/rails.rb:52: args[:host] = Puppet[:dbserver] unless Puppet[:dbserver].to_s.empty? | |
SETTING ':dbsocket' | |
lib/puppet/defaults.rb:1308: :dbsocket => { | |
lib/puppet/rails.rb:60: socket = Puppet[:dbsocket] | |
SETTING ':dbuser' | |
lib/puppet/defaults.rb:1293: :dbuser => { | |
lib/puppet/rails.rb:54: args[:username] = Puppet[:dbuser] unless Puppet[:dbuser].to_s.empty? | |
lib/puppet/rails.rb:64: args[:username] = Puppet[:dbuser] unless Puppet[:dbuser].to_s.empty? | |
SETTING ':default_file_terminus' | |
lib/puppet/application/apply.rb:138: :default_file_terminus => :file_server, | |
lib/puppet/defaults.rb:257: :default_file_terminus => { | |
lib/puppet/file_serving/terminus_selector.rb:22: Puppet[:default_file_terminus] | |
lib/puppet/type/file/content.rb:180: elsif Puppet[:default_file_terminus] == :file_server | |
SETTING ':deviceconfig' | |
lib/puppet/application/device.rb:173: Puppet.err "No device found in #{Puppet[:deviceconfig]}" | |
lib/puppet/defaults.rb:898: :deviceconfig => { | |
lib/puppet/util/network_device/config.rb:22: @file = Puppet[:deviceconfig] | |
SETTING ':devicedir' | |
lib/puppet/application/device.rb:181: Puppet.settings.set_value(:confdir, ::File.join(Puppet[:devicedir], device.name), :cli) | |
lib/puppet/application/device.rb:182: Puppet.settings.set_value(:vardir, ::File.join(Puppet[:devicedir], device.name), :cli) | |
lib/puppet/defaults.rb:892: :devicedir => { | |
SETTING ':diff' | |
lib/puppet/defaults.rb:171: :diff_args => { | |
lib/puppet/defaults.rb:176: :diff => { | |
lib/puppet/feature/base.rb:51:Puppet.features.add :diff, :libs => %w{diff/lcs diff/lcs/hunk} | |
lib/puppet/indirector/file_bucket_file/file.rb:24: if request.options[:diff_with] | |
lib/puppet/indirector/file_bucket_file/file.rb:26: file2_path = path_for(request.options[:bucket_path], request.options[:diff_with], 'contents') | |
lib/puppet/indirector/file_bucket_file/file.rb:27: raise "could not find diff_with #{request.options[:diff_with]}" unless ::File.exists?(file2_path) | |
lib/puppet/util/diff.rb:9: return '' unless diff_cmd = Puppet[:diff] and diff_cmd != "" | |
lib/puppet/util/diff.rb:12: if args = Puppet[:diff_args] and args != "" | |
lib/puppet/util/diff.rb:19: module_function :diff | |
SETTING ':diff_args' | |
lib/puppet/defaults.rb:171: :diff_args => { | |
lib/puppet/util/diff.rb:12: if args = Puppet[:diff_args] and args != "" | |
SETTING ':dns_alt_names' | |
lib/puppet/application/cert.rb:211: if Puppet.settings.set_by_cli?(:dns_alt_names) | |
lib/puppet/application/cert.rb:212: options[:dns_alt_names] = Puppet[:dns_alt_names] | |
lib/puppet/defaults.rb:414: :dns_alt_names => { | |
lib/puppet/face/ca.rb:136: description Puppet.settings.setting(:dns_alt_names).desc | |
lib/puppet/face/ca.rb:147: ca.generate(host, :dns_alt_names => options[:dns_alt_names]) | |
lib/puppet/face/certificate.rb:58: description Puppet.settings.setting(:dns_alt_names).desc | |
lib/puppet/face/certificate.rb:67: # In supporting both, we'll use Puppet[:dns_alt_names] if specified on | |
lib/puppet/face/certificate.rb:68: # command line. We'll use options[:dns_alt_names] if specified on | |
lib/puppet/face/certificate.rb:72: global_setting_from_cli = Puppet.settings.set_by_cli?(:dns_alt_names) == true | |
lib/puppet/face/certificate.rb:73: raise ArgumentError, "Can't specify both --dns_alt_names and --dns-alt-names" if options[:dns_alt_names] and global_setting_from_cli | |
lib/puppet/face/certificate.rb:74: options[:dns_alt_names] = Puppet[:dns_alt_names] if global_setting_from_cli | |
lib/puppet/face/certificate.rb:80: host.generate_certificate_request(:dns_alt_names => options[:dns_alt_names]) | |
lib/puppet/ssl/certificate_authority.rb:135: san = options[:dns_alt_names] | |
lib/puppet/ssl/certificate_authority.rb:138: host.generate_certificate_request(:dns_alt_names => san) | |
lib/puppet/ssl/certificate_request.rb:50: if options[:dns_alt_names] then | |
lib/puppet/ssl/certificate_request.rb:51: names = options[:dns_alt_names].split(/\s*,\s*/).map(&:strip) + [name] | |
lib/puppet/ssl/host.rb:174: if Puppet[:dns_alt_names] and Puppet[:dns_alt_names] != '' | |
lib/puppet/ssl/host.rb:175: options[:dns_alt_names] ||= Puppet[:dns_alt_names] | |
lib/puppet/ssl/host.rb:177: options[:dns_alt_names] = "puppet, #{fqdn}, puppet.#{domain}" | |
lib/puppet/ssl/host.rb:301: pson_hash[:dns_alt_names] = thing_to_use.subject_alt_names | |
SETTING ':document_all' | |
lib/puppet/application/doc.rb:181: Puppet.settings[:document_all] = options[:all] || false | |
lib/puppet/defaults.rb:1506: :document_all => { | |
lib/puppet/util/rdoc/parser.rb:277: scan_for_resource(cls, code) if Puppet.settings[:document_all] | |
lib/puppet/util/rdoc/parser.rb:302: scan_for_resource(n, code) if Puppet.settings[:document_all] | |
lib/puppet/util/rdoc.rb:74: if Puppet.settings[:document_all] | |
SETTING ':dynamicfacts' | |
lib/puppet/defaults.rb:1086: :dynamicfacts => { | |
SETTING ':environment' | |
lib/puppet/application/inspect.rb:120: @report.environment = Puppet[:environment] | |
lib/puppet/configurer/fact_handler.rb:15: facts = Puppet::Node::Facts.indirection.find(Puppet[:node_name_value], :environment => @environment) | |
lib/puppet/configurer.rb:17: attr_reader :compile_time, :environment | |
lib/puppet/configurer.rb:60: @environment = Puppet[:environment] | |
lib/puppet/configurer.rb:145: :environment => @environment, :ignore_cache => true) | |
lib/puppet/configurer.rb:200: Puppet::Transaction::Report.indirection.save(report, nil, :environment => @environment) if Puppet[:report] | |
lib/puppet/configurer.rb:231: result = Puppet::Resource::Catalog.indirection.find(Puppet[:node_name_value], fact_options.merge(:ignore_terminus => true, :environment => @environment)) | |
lib/puppet/configurer.rb:243: result = Puppet::Resource::Catalog.indirection.find(Puppet[:node_name_value], fact_options.merge(:ignore_cache => true, :environment => @environment)) | |
lib/puppet/defaults.rb:164: :environment => { | |
lib/puppet/face/catalog.rb:69: report.environment = Puppet[:environment] | |
lib/puppet/face/module/list.rb:62: environment = Puppet::Node::Environment.new(options[:environment]) | |
lib/puppet/face/module/list.rb:71: environment = Puppet::Node::Environment.new(options[:environment]) | |
lib/puppet/face/parser.rb:38: Puppet::Node::Environment.new(Puppet[:environment]).known_resource_types.clear | |
lib/puppet/face/parser.rb:46: Puppet::Node::Environment.new(Puppet[:environment]).known_resource_types.clear | |
lib/puppet/file_bucket/dipper.rb:17: environment = Puppet[:environment] | |
lib/puppet/indirector/catalog/compiler.rb:119: if node = find_node(name, :environment => request.environment) | |
lib/puppet/indirector/node/exec.rb:24: result[:environment] ||= request.environment.name | |
lib/puppet/indirector/node/exec.rb:40: [:parameters, :classes, :environment].each do |param| | |
lib/puppet/indirector/node/ldap.rb:39: info[:environment] ||= request.environment.to_s | |
lib/puppet/indirector/node/ldap.rb:63: info[:environment] ||= request.environment.to_s | |
lib/puppet/indirector/node/ldap.rb:95: result[:environment] = result[:parameters]["environment"] if result[:parameters]["environment"] | |
lib/puppet/indirector/node/ldap.rb:151: node.environment = information[:environment] if information[:environment] | |
lib/puppet/indirector/node/ldap.rb:185: information[:environment] ||= parent_info[:environment] | |
lib/puppet/indirector/request.rb:17: OPTION_ATTRIBUTES = [:ip, :node, :authenticated, :ignore_terminus, :ignore_cache, :instance, :environment] | |
lib/puppet/module.rb:32: attr_reader :name, :environment, :path | |
lib/puppet/module.rb:33: attr_writer :environment | |
lib/puppet/module_tool/applications/installer.rb:21: @environment = Puppet::Node::Environment.new(Puppet.settings[:environment]) | |
lib/puppet/module_tool/applications/uninstaller.rb:13: @environment = Puppet::Node::Environment.new(options[:environment]) | |
lib/puppet/module_tool/applications/upgrader.rb:9: @environment = Puppet::Node::Environment.new(Puppet.settings[:environment]) | |
lib/puppet/module_tool.rb:115: options[:environment] ||= Puppet.settings[:environment] | |
lib/puppet/module_tool.rb:118: Puppet[:environment] = options[:environment] | |
lib/puppet/network/http/api/v1.rb:33: params[:environment] = Puppet::Node::Environment.new(environment) | |
lib/puppet/network/rights.rb:113: attr_accessor :methods, :environment, :authentication | |
lib/puppet/network/rights.rb:158: elsif @environment.size > 0 and not @environment.include?(args[:environment]) | |
lib/puppet/node/environment.rb:33: name ||= Puppet.settings.value(:environment) | |
lib/puppet/node/environment.rb:47: Thread.current[:environment] || root | |
lib/puppet/node/environment.rb:51: Thread.current[:environment] = new(env) | |
lib/puppet/node/environment.rb:60: Thread.current[:environment] = nil | |
lib/puppet/node.rb:78: if env = options[:environment] | |
lib/puppet/node.rb:87: if @facts = Puppet::Node::Facts.indirection.find(name, :environment => environment) | |
lib/puppet/parser/files.rb:20: if mod = Puppet::Module.find(module_name, options[:environment]) | |
lib/puppet/parser/parser_support.rb:19: attr_reader :version, :environment | |
lib/puppet/parser/resource.rb:59: def_delegator :scope, :environment | |
lib/puppet/parser/scope.rb:32: def_delegators :compiler, :catalog, :environment | |
lib/puppet/parser/type_loader.rb:79: modname, files = Puppet::Parser::Files.find_manifests(pat, :cwd => dir, :environment => environment) | |
lib/puppet/parser/type_loader.rb:111: def_delegator :environment, :known_resource_types | |
lib/puppet/provider/cron/crontab.rb:23: text_line :environment, :match => %r{^\s*\w+=} | |
lib/puppet/provider/cron/crontab.rb:62: if record[:environment] and record[:environment] != :absent and record[:environment] != [:absent] | |
lib/puppet/provider/cron/crontab.rb:63: record[:environment].each do |env| | |
lib/puppet/provider/cron/crontab.rb:148: when :environment | |
lib/puppet/provider/cron/crontab.rb:163: record[:environment] = :absent | |
lib/puppet/provider/cron/crontab.rb:167: record[:environment] = envs | |
lib/puppet/provider/exec.rb:34: if envlist = resource[:environment] | |
lib/puppet/rails/database/003_add_environment_to_host.rb:3: add_column :hosts, :environment, :string unless ActiveRecord::Base.connection.columns(:hosts).collect {|c| c.name}.include?("environment") | |
lib/puppet/rails/database/003_add_environment_to_host.rb:7: remove_column :hosts, :environment if ActiveRecord::Base.connection.columns(:hosts).collect {|c| c.name}.include?("environment") | |
lib/puppet/rails/database/schema.rb:63: t.column :environment, :text | |
lib/puppet/resource/catalog.rb:48: attr_accessor :environment | |
lib/puppet/resource/type_collection.rb:4: attr_reader :environment | |
lib/puppet/resource.rb:324: :environment => scope.environment.to_s, | |
lib/puppet/settings.rb:361: env = value(:environment) | |
lib/puppet/settings.rb:564: if @config[:environment] | |
lib/puppet/settings.rb:565: env = self.value(:environment).to_sym | |
lib/puppet/transaction/report.rb:13: attr_accessor :configuration_version, :host, :environment | |
lib/puppet/type/cron.rb:281: newproperty(:environment) do | |
lib/puppet/type/exec.rb:203: newparam(:environment) do | |
lib/puppet/type/file/content.rb:204: request = Puppet::Indirector::Request.new(:file_content, :find, source_or_content.full_path.sub(/^\//,''), nil, :environment => resource.catalog.environment) | |
lib/puppet/type/file/source.rb:104: unless tmp = Puppet::FileServing::Content.indirection.find(metadata.source, :environment => resource.catalog.environment) | |
lib/puppet/type/file/source.rb:157: if data = Puppet::FileServing::Metadata.indirection.find(source, :environment => resource.catalog.environment) | |
lib/puppet/type/file.rb:596: :environment => catalog.environment | |
lib/puppet/util/rdoc.rb:52: parser = Puppet::Parser::Parser.new(Puppet::Node::Environment.new(Puppet[:environment])) | |
SETTING ':evaltrace' | |
lib/puppet/defaults.rb:1347: :evaltrace => { | |
lib/puppet/transaction.rb:103: resource.info "Starting to evaluate the resource" if Puppet[:evaltrace] and @catalog.host_config? | |
lib/puppet/transaction.rb:105: resource.info "Evaluated in %0.2f seconds" % seconds if Puppet[:evaltrace] and @catalog.host_config? | |
SETTING ':external_nodes' | |
lib/puppet/defaults.rb:1363: :external_nodes => { | |
lib/puppet/indirector/node/exec.rb:10: command = Puppet[:external_nodes] | |
SETTING ':factpath' | |
lib/puppet/defaults.rb:1226: :factpath => { | |
lib/puppet/indirector/facts/facter.rb:21: dirs = module_fact_dirs + Puppet[:factpath].split(File::PATH_SEPARATOR) | |
SETTING ':facts_terminus' | |
lib/puppet/application/agent.rb:15: :facts_terminus => :facter, | |
lib/puppet/application/device.rb:16: :facts_terminus => :network_device, | |
lib/puppet/application/master.rb:129: super.merge :facts_terminus => 'yaml' | |
lib/puppet/defaults.rb:239: :facts_terminus => { | |
lib/puppet/node/facts.rb:24: indirects :facts, :terminus_setting => :facts_terminus, :extend => NodeExpirer | |
SETTING ':fileserverconfig' | |
lib/puppet/defaults.rb:859: :fileserverconfig => { | |
lib/puppet/file_serving/configuration.rb:91: config = Puppet[:fileserverconfig] | |
SETTING ':filetimeout' | |
lib/puppet/daemon.rb:165: reparse_interval = Puppet[:filetimeout] | |
lib/puppet/daemon.rb:185: reparse_interval = Puppet[:filetimeout] | |
lib/puppet/defaults.rb:281: :filetimeout => { | |
lib/puppet/node/environment.rb:105: cached_attr(:modulepath, Puppet[:filetimeout]) do | |
lib/puppet/node/environment.rb:114: cached_attr(:modules, Puppet[:filetimeout]) do | |
lib/puppet/settings.rb:956: #self.reparse unless [:config, :filetimeout].include?(param) | |
lib/puppet/util/loadedfile.rb:19: return true if Puppet[:filetimeout] < 0 | |
lib/puppet/util/loadedfile.rb:45: if @stamp.nil? or (Time.now.to_i - @statted >= Puppet[:filetimeout]) | |
SETTING ':freeze_main' | |
lib/puppet/defaults.rb:354: :freeze_main => { | |
lib/puppet/resource/type.rb:171: fail "Cannot have code outside of a class/node/define because 'freeze_main' is enabled" if name == "" and Puppet.settings[:freeze_main] | |
SETTING ':genconfig' | |
lib/puppet/defaults.rb:76: :genconfig => { | |
lib/puppet/settings.rb:403: return generate_config if value(:genconfig) | |
lib/puppet/settings.rb:408: (value(:configprint) != "" || value(:genconfig) || value(:genmanifest)) && true | |
lib/puppet/settings.rb:870: str += obj.to_config + "\n" unless obj.name == :genconfig | |
SETTING ':genmanifest' | |
lib/puppet/defaults.rb:83: :genmanifest => { | |
lib/puppet/settings.rb:404: generate_manifest if value(:genmanifest) | |
lib/puppet/settings.rb:408: (value(:configprint) != "" || value(:genconfig) || value(:genmanifest)) && true | |
lib/puppet.rb:98: if Puppet[:genmanifest] | |
SETTING ':graph' | |
lib/puppet/application/agent.rb:39: :graph => true, | |
lib/puppet/defaults.rb:1150: :graph => { | |
lib/puppet/defaults.rb:1157: :graphdir => { | |
lib/puppet/simple_graph.rb:230: if Puppet[:graph] then | |
lib/puppet/simple_graph.rb:245: Puppet.settings.use(:graphing) | |
lib/puppet/simple_graph.rb:258: filename = File.join(Puppet[:graphdir], "cycles.dot") | |
lib/puppet/simple_graph.rb:465: return unless Puppet[:graph] | |
lib/puppet/simple_graph.rb:467: Puppet.settings.use(:graphing) | |
lib/puppet/simple_graph.rb:469: file = File.join(Puppet[:graphdir], "#{name}.dot") | |
SETTING ':graphdir' | |
lib/puppet/defaults.rb:1157: :graphdir => { | |
lib/puppet/simple_graph.rb:258: filename = File.join(Puppet[:graphdir], "cycles.dot") | |
lib/puppet/simple_graph.rb:469: file = File.join(Puppet[:graphdir], "#{name}.dot") | |
SETTING ':group' | |
lib/puppet/configurer/downloader.rb:64: :group => Process.gid | |
lib/puppet/defaults.rb:39: :group => "service", | |
lib/puppet/defaults.rb:587: :group => "service", | |
lib/puppet/defaults.rb:595: :group => "service", | |
lib/puppet/defaults.rb:603: :group => "service", | |
lib/puppet/defaults.rb:611: :group => "service", | |
lib/puppet/defaults.rb:618: :group => "service", | |
lib/puppet/defaults.rb:627: :group => "service", | |
lib/puppet/defaults.rb:635: :group => "service", | |
lib/puppet/defaults.rb:642: :group => "service", | |
lib/puppet/defaults.rb:650: :group => "service", | |
lib/puppet/defaults.rb:658: :group => "service", | |
lib/puppet/defaults.rb:698: :group => "service", | |
lib/puppet/defaults.rb:735: :group => { | |
lib/puppet/defaults.rb:759: :group => "service", | |
lib/puppet/defaults.rb:768: :group => "service", | |
lib/puppet/defaults.rb:791: :group => "service", | |
lib/puppet/defaults.rb:830: :group => "service", | |
lib/puppet/defaults.rb:837: :group => "service", | |
lib/puppet/defaults.rb:851: :group => "service", | |
lib/puppet/defaults.rb:878: :group => "service", | |
lib/puppet/defaults.rb:1266: :group => "service", | |
lib/puppet/defaults.rb:1318: :group => "service", | |
lib/puppet/file_serving/metadata.rb:15: attr_reader :path, :owner, :group, :mode, :checksum_type, :checksum, :ftype, :destination | |
lib/puppet/file_serving/metadata.rb:17: PARAM_ORDER = [:mode, :ftype, :owner, :group] | |
lib/puppet/file_serving/metadata.rb:33: def_delegator :@stat, :gid, :group | |
lib/puppet/file_serving/metadata.rb:48: :group => 'S-1-0-0', | |
lib/puppet/indirector/catalog/static_compiler.rb:43: [:mode, :owner, :group].each do |param| | |
lib/puppet/provider/exec.rb:56: run_and_capture(command, resource[:user], resource[:group], | |
lib/puppet/provider/file/windows.rb:84: if [:owner, :group, :mode].any?{|p| resource[p]} and !supports_acl?(resource[:path]) | |
lib/puppet/provider/group/aix.rb:9:Puppet::Type.type(:group).provide :aix, :parent => Puppet::Provider::AixObject do | |
lib/puppet/provider/group/directoryservice.rb:3:Puppet::Type.type(:group).provide :directoryservice, :parent => Puppet::Provider::NameService::DirectoryService do | |
lib/puppet/provider/group/groupadd.rb:3:Puppet::Type.type(:group).provide :groupadd, :parent => Puppet::Provider::NameService::ObjectAdd do | |
lib/puppet/provider/group/ldap.rb:3:Puppet::Type.type(:group).provide :ldap, :parent => Puppet::Provider::Ldap do | |
lib/puppet/provider/group/pw.rb:3:Puppet::Type.type(:group).provide :pw, :parent => Puppet::Provider::NameService::PW do | |
lib/puppet/provider/group/windows_adsi.rb:3:Puppet::Type.type(:group).provide :windows_adsi do | |
lib/puppet/provider/ldap.rb:69: @property_hash.delete(:groups) | |
lib/puppet/provider/ldap.rb:70: @ldap_properties.delete(:groups) | |
lib/puppet/provider/macauthorization/macauthorization.rb:275: :group, :k_of_n, :mechanisms, :rule, :session_owner, | |
lib/puppet/provider/mcx/mcxcontent.rb:24: :group => "Groups", | |
lib/puppet/provider/nameservice/directoryservice.rb:574: # :groups, :ensure, :gid] | |
lib/puppet/provider/nameservice/objectadd.rb:18: if @resource.allowdupe? && ((param == :uid) || (param == :gid and self.class.name == :groupadd)) | |
lib/puppet/provider/nameservice.rb:85: if @resource_type.name == :group | |
lib/puppet/provider/nameservice.rb:116: id_generators = {:user => :uid, :group => :gid} | |
lib/puppet/provider/nameservice.rb:137: when :group; database = :group; method = :gid | |
lib/puppet/provider/user/aix.rb:45: #verify :groups, "Groups must be comma-separated" do |value| | |
lib/puppet/provider/user/aix.rb:67: {:aix_attr => :groups, :puppet_prop => :groups}, | |
lib/puppet/provider/user/directoryservice.rb:136: attribute_hash[:groups] = groups_array.uniq.sort.join(',') | |
lib/puppet/provider/user/directoryservice.rb:307: # For the :password and :groups properties, call the setter methods | |
lib/puppet/provider/user/directoryservice.rb:318: when :groups | |
lib/puppet/provider/user/hpux.rb:11: options :groups, :flag => "-G" | |
lib/puppet/provider/user/hpux.rb:18: verify :groups, "Groups must be comma-separated" do |value| | |
lib/puppet/provider/user/ldap.rb:59: unless @property_hash[:groups] | |
lib/puppet/provider/user/ldap.rb:61: return @property_hash[:groups] = :absent | |
lib/puppet/provider/user/ldap.rb:64: return @property_hash[:groups] = result.collect { |r| r[:name] }.sort.join(",") | |
lib/puppet/provider/user/ldap.rb:66: @property_hash[:groups] | |
lib/puppet/provider/user/ldap.rb:113: Puppet::Type.type(:group).provider(:ldap).name2id(group) | |
lib/puppet/provider/user/ldap.rb:119: Puppet::Type.type(:group).provider(:ldap).manager | |
lib/puppet/provider/user/pw.rb:14: options :groups, :flag => "-G" | |
lib/puppet/provider/user/pw.rb:21: verify :groups, "Groups must be comma-separated" do |value| | |
lib/puppet/provider/user/user_role_add.rb:13: options :groups, :flag => "-G" | |
lib/puppet/provider/user/user_role_add.rb:24: verify :groups, "Groups must be comma-separated" do |value| | |
lib/puppet/provider/user/useradd.rb:12: options :groups, :flag => "-G" | |
lib/puppet/provider/user/useradd.rb:20: verify :groups, "Groups must be comma-separated" do |value| | |
lib/puppet/provider/user/windows_adsi.rb:28: [:comment, :home, :groups].each do |prop| | |
lib/puppet/reports/rrdgraph.rb:99: config.define_settings(:reports, :hostdir => {:type => :directory, :default => hostdir, :owner => 'service', :mode => 0755, :group => 'service', :desc => "eh"}) | |
lib/puppet/settings/file_setting.rb:20: raise SettingError, "Internal error: The :group setting for #{identifying_fields} must be 'service', not '#{value}'" | |
lib/puppet/settings/file_setting.rb:27: @settings[:group] | |
lib/puppet/settings/file_setting.rb:94: resource[:group] = self.group if self.group | |
lib/puppet/settings.rb:414: return [:owner, :group, :mode].inject({}) do |meta, p| | |
lib/puppet/settings.rb:796: # [:group] => optional group name/gid for :file and :directory settings | |
lib/puppet/settings.rb:1076: resource[:gid] = self[:group] if self[:group] | |
lib/puppet/settings.rb:1079: if group = setting.group and ! %w{root wheel}.include?(group) and catalog.resource(:group, group).nil? | |
lib/puppet/settings.rb:1080: catalog.add_resource Puppet::Resource.new(:group, group, :parameters => {:ensure => :present}) | |
lib/puppet/settings.rb:1110: raise ArgumentError, "Invalid file option '#{param}'" unless [:owner, :mode, :group].include?(param) | |
lib/puppet/type/exec.rb:169: newparam(:group) do | |
lib/puppet/type/file/group.rb:5: Puppet::Type.type(:file).newproperty(:group) do | |
lib/puppet/type/file/source.rb:116: [:owner, :mode, :group, :checksum].each do |metadata_method| | |
lib/puppet/type/file/source.rb:123: next if [:owner, :group].include?(metadata_method) and !local? | |
lib/puppet/type/file.rb:265: {:user => :owner, :group => :group}.each do |type, property| | |
lib/puppet/type/file.rb:781: next unless [:mode, :owner, :group, :seluser, :selrole, :seltype, :selrange].include?(thing.name) | |
lib/puppet/type/group.rb:6: newtype(:group) do | |
lib/puppet/type/macauthorization.rb:97: newproperty(:group) do | |
lib/puppet/type/mcx.rb:51: newvalues(:user, :group, :computer, :computerlist) | |
lib/puppet/type/mcx.rb:91: autorequire(:group) do | |
lib/puppet/type/mcx.rb:92: setup_autorequire(:group) | |
lib/puppet/type/user.rb:247: newproperty(:groups, :parent => Puppet::Property::List) do | |
lib/puppet/type/user.rb:328: autorequire(:group) do | |
lib/puppet/type/user.rb:342: if resource = catalog.resources.find { |r| r.is_a?(Puppet::Type.type(:group)) and r.should(:gid) == group } | |
lib/puppet/type/user.rb:351: if obj = @parameters[:groups] and groups = obj.should | |
lib/puppet/util/log/destinations.rb:81: FileUtils.chown(Puppet[:user], Puppet[:group], path) unless Puppet::Util::Platform.windows? | |
lib/puppet/util/posix.rb:66: when :group; Etc.send(:endgrent) | |
lib/puppet/util/posix.rb:74: when :gr, :group; return :gid | |
lib/puppet/util/posix.rb:84: when :gr, :group; return :getgrgid | |
lib/puppet/util/posix.rb:94: when :gr, :group; return :getgrnam | |
lib/puppet/util/posix.rb:109: return nil unless name = get_posix_field(:group, :name, group) | |
lib/puppet/util/posix.rb:110: gid = get_posix_field(:group, :gid, name) | |
lib/puppet/util/posix.rb:113: return nil unless gid = get_posix_field(:group, :gid, group) | |
lib/puppet/util/posix.rb:114: name = get_posix_field(:group, :name, gid) | |
lib/puppet/util/posix.rb:118: return search_posix_field(:group, :gid, group) | |
lib/puppet/util/suidmanager.rb:12: to_delegate_to_process = [ :euid=, :euid, :egid=, :egid, :uid=, :uid, :gid=, :gid, :groups ] | |
lib/puppet/util/suidmanager.rb:54: module_function :groups= | |
lib/puppet/util/suidmanager.rb:147: map = {:gid => :group, :uid => :user} | |
lib/puppet/util.rb:82: if group = Puppet[:group] | |
SETTING ':hiera_config' | |
lib/hiera_puppet.rb:74: if Puppet.settings[:hiera_config].is_a?(String) | |
lib/hiera_puppet.rb:75: expanded_config_file = File.expand_path(Puppet.settings[:hiera_config]) | |
lib/puppet/defaults.rb:223: :hiera_config => { | |
lib/puppet/indirector/hiera.rb:18: hiera_config = Puppet.settings[:hiera_config] | |
lib/puppet/test/test_helper.rb:141: :hiera_config => "/dev/null", | |
SETTING ':hostcert' | |
lib/puppet/defaults.rb:489: :hostcert => { | |
lib/puppet/network/authentication.rb:17: certs << Puppet::SSL::Host.localhost.certificate if FileTest.exist?(Puppet[:hostcert]) | |
lib/puppet/network/http/connection.rb:154: if FileTest.exist?(Puppet[:hostcert]) and FileTest.exist?(ssl_configuration.ca_auth_file) | |
lib/puppet/ssl/host.rb:218: rm -f #{Puppet[:hostcert]} | |
SETTING ':hostcrl' | |
lib/puppet/defaults.rb:555: :hostcrl => { | |
lib/puppet/indirector/certificate_revocation_list/file.rb:7: store_at :hostcrl | |
SETTING ':hostcsr' | |
lib/puppet/defaults.rb:482: :hostcsr => { | |
SETTING ':hostprivkey' | |
lib/puppet/defaults.rb:496: :hostprivkey => { | |
SETTING ':hostpubkey' | |
lib/puppet/defaults.rb:503: :hostpubkey => { | |
SETTING ':http_compression' | |
lib/puppet/defaults.rb:1162: :http_compression => { | |
lib/puppet/network/http/compression.rb:49: headers['accept-encoding'] = 'gzip; q=1.0, deflate; q=1.0; identity' if Puppet.settings[:http_compression] | |
SETTING ':http_proxy_host' | |
lib/puppet/defaults.rb:272: :http_proxy_host => { | |
lib/puppet/forge/repository.rb:59: if Puppet.settings[:http_proxy_host] == 'none' | |
lib/puppet/forge/repository.rb:63: return Puppet.settings[:http_proxy_host] | |
lib/puppet/network/http/connection.rb:130: if Puppet[:http_proxy_host] == "none" | |
lib/puppet/network/http/connection.rb:133: args << Puppet[:http_proxy_host] << Puppet[:http_proxy_port] | |
SETTING ':http_proxy_port' | |
lib/puppet/defaults.rb:277: :http_proxy_port => { | |
lib/puppet/forge/repository.rb:73: return Puppet.settings[:http_proxy_port] | |
lib/puppet/network/http/connection.rb:133: args << Puppet[:http_proxy_host] << Puppet[:http_proxy_port] | |
SETTING ':httplog' | |
lib/puppet/defaults.rb:265: :httplog => { | |
lib/puppet/network/http/webrick.rb:64: file = Puppet[:httplog] | |
SETTING ':ignorecache' | |
lib/puppet/defaults.rb:1078: :ignorecache => { | |
SETTING ':ignoreimport' | |
lib/puppet/application/agent.rb:454: Puppet[:ignoreimport] = true | |
lib/puppet/application/device.rb:231: Puppet[:ignoreimport] = true | |
lib/puppet/defaults.rb:151: :ignoreimport => { | |
lib/puppet/node/environment.rb:208: return empty_parse_result if Puppet.settings[:ignoreimport] | |
lib/puppet/parser/type_loader.rb:66: return if Puppet[:ignoreimport] | |
lib/puppet/util/rdoc.rb:13: Puppet[:ignoreimport] = true | |
lib/puppet/util/rdoc.rb:50: Puppet[:ignoreimport] = true | |
SETTING ':ignoreschedules' | |
lib/puppet/application/kick.rb:259: :ignoreschedules => options[:ignoreschedules] | |
lib/puppet/application/kick.rb:299: options[:ignoreschedules] = false | |
lib/puppet/configurer.rb:131: # which accepts :tags and :ignoreschedules. | |
lib/puppet/defaults.rb:990: :ignoreschedules => { | |
lib/puppet/resource/catalog.rb:125: # :ignoreschedules - tell the transaction to ignore schedules | |
lib/puppet/resource/catalog.rb:136: transaction.ignoreschedules = true if options[:ignoreschedules] | |
lib/puppet/run.rb:28: valid_options = [:tags, :ignoreschedules, :pluginsync] | |
lib/puppet/run.rb:42: msg += " ignoring schedules" if options[:ignoreschedules] | |
lib/puppet/transaction/resource_harness.rb:157: return true if Puppet[:ignoreschedules] | |
lib/puppet/transaction.rb:15: attr_accessor :component, :catalog, :ignoreschedules, :for_network_device | |
SETTING ':inventory_port' | |
lib/puppet/defaults.rb:1129: :inventory_port => { | |
lib/puppet/indirector/facts/inventory_service.rb:7: use_port_setting(:inventory_port) | |
lib/puppet/indirector/facts/rest.rb:7: use_port_setting(:inventory_port) | |
SETTING ':inventory_server' | |
lib/puppet/defaults.rb:1125: :inventory_server => { | |
lib/puppet/indirector/facts/inventory_service.rb:6: use_server_setting(:inventory_server) | |
lib/puppet/indirector/facts/rest.rb:6: use_server_setting(:inventory_server) | |
SETTING ':inventory_terminus' | |
lib/puppet/defaults.rb:252: :inventory_terminus => { | |
SETTING ':keylength' | |
lib/puppet/defaults.rb:689: :keylength => { | |
lib/puppet/ssl/key.rb:22: @content = OpenSSL::PKey::RSA.new(Puppet[:keylength].to_i) | |
lib/puppet/test/test_helper.rb:170: Puppet[:keylength] = 512 | |
SETTING ':lastrunfile' | |
lib/puppet/configurer.rb:206: mode = Puppet.settings.setting(:lastrunfile).mode | |
lib/puppet/configurer.rb:207: Puppet::Util.replace_file(Puppet[:lastrunfile], mode) do |fh| | |
lib/puppet/defaults.rb:1138: :lastrunfile => { | |
SETTING ':lastrunreport' | |
lib/puppet/defaults.rb:1144: :lastrunreport => { | |
lib/puppet/indirector/report/yaml.rb:9: Puppet[:lastrunreport] | |
SETTING ':ldapattrs' | |
lib/puppet/defaults.rb:1416: :ldapattrs => { | |
lib/puppet/indirector/node/ldap.rb:119: ldapattrs = Puppet[:ldapattrs] | |
SETTING ':ldapbase' | |
lib/puppet/defaults.rb:1436: :ldapbase => { | |
lib/puppet/external/nagios/base.rb:12: attr_accessor :ldapbase | |
lib/puppet/indirector/ldap.rb:22: Puppet[:ldapbase] | |
lib/puppet/util/ldap/manager.rb:23: [location, Puppet[:ldapbase]].join(",") | |
SETTING ':ldapclassattrs' | |
lib/puppet/defaults.rb:1405: :ldapclassattrs => { | |
lib/puppet/indirector/node/ldap.rb:13: x = Puppet[:ldapclassattrs].split(/\s*,\s*/) | |
SETTING ':ldapparentattr' | |
lib/puppet/defaults.rb:1423: :ldapparentattr => { | |
lib/puppet/indirector/node/ldap.rb:70: if pattr = Puppet[:ldapparentattr] and ! pattr.empty? | |
SETTING ':ldappassword' | |
lib/puppet/defaults.rb:1432: :ldappassword => { | |
lib/puppet/util/ldap/connection.rb:25: if pass = Puppet.settings[:ldappassword] and pass != "" | |
lib/puppet/util/ldap/manager.rb:61: if password = Puppet[:ldappassword] and password != "" | |
SETTING ':ldapport' | |
lib/puppet/defaults.rb:1396: :ldapport => { | |
lib/puppet/util/ldap/connection.rb:30: new(Puppet[:ldapserver], Puppet[:ldapport], options) | |
lib/puppet/util/ldap/manager.rb:64: @connection = Puppet::Util::Ldap::Connection.new(Puppet[:ldapserver], Puppet[:ldapport], options) | |
SETTING ':ldapserver' | |
lib/puppet/defaults.rb:1392: :ldapserver => { | |
lib/puppet/util/ldap/connection.rb:30: new(Puppet[:ldapserver], Puppet[:ldapport], options) | |
lib/puppet/util/ldap/manager.rb:64: @connection = Puppet::Util::Ldap::Connection.new(Puppet[:ldapserver], Puppet[:ldapport], options) | |
SETTING ':ldapssl' | |
lib/puppet/defaults.rb:1378: :ldapssl => { | |
lib/puppet/util/ldap/connection.rb:15: elsif Puppet[:ldapssl] | |
lib/puppet/util/ldap/manager.rb:52: elsif Puppet[:ldapssl] | |
SETTING ':ldapstackedattrs' | |
lib/puppet/defaults.rb:1410: :ldapstackedattrs => { | |
lib/puppet/indirector/node/ldap.rb:80: Puppet[:ldapstackedattrs].split(/\s*,\s*/) | |
SETTING ':ldapstring' | |
lib/puppet/defaults.rb:1401: :ldapstring => { | |
lib/puppet/indirector/node/ldap.rb:135: filter = Puppet[:ldapstring] | |
SETTING ':ldaptls' | |
lib/puppet/defaults.rb:1385: :ldaptls => { | |
lib/puppet/util/ldap/connection.rb:13: ssl = if Puppet[:ldaptls] | |
lib/puppet/util/ldap/manager.rb:50: if Puppet[:ldaptls] | |
SETTING ':ldapuser' | |
lib/puppet/defaults.rb:1427: :ldapuser => { | |
lib/puppet/provider/group/ldap.rb:15: confine :feature => :ldap, :false => (Puppet[:ldapuser] == "") | |
lib/puppet/provider/user/ldap.rb:15: confine :feature => :ldap, :false => (Puppet[:ldapuser] == "") | |
lib/puppet/util/ldap/connection.rb:23: if user = Puppet.settings[:ldapuser] and user != "" | |
lib/puppet/util/ldap/manager.rb:58: if user = Puppet[:ldapuser] and user != "" | |
SETTING ':libdir' | |
lib/puppet/defaults.rb:136: :libdir => { | |
lib/puppet/provider/augeas/augeas.rb:295: if File.exists?("#{Puppet[:libdir]}/augeas/lenses") | |
lib/puppet/provider/augeas/augeas.rb:296: load_path << "#{Puppet[:libdir]}/augeas/lenses" | |
lib/puppet/util/autoload.rb:162: Puppet[:libdir].split(File::PATH_SEPARATOR) | |
SETTING ':listen' | |
lib/puppet/application/agent.rb:421: if Puppet[:listen] | |
lib/puppet/defaults.rb:1013: :listen => { | |
lib/puppet/util/instrumentation/data.rb:12: attr_reader :listener | |
lib/puppet/util/instrumentation/listener.rb:12: attr_reader :pattern, :listener | |
lib/puppet/util/instrumentation.rb:17: instance_load :listener, 'puppet/util/instrumentation/listeners' | |
lib/puppet/util/instrumentation.rb:20: attr_accessor :listeners, :listeners_of | |
lib/puppet/util/instrumentation.rb:100: listener = genclass(name, :hash => instance_hash(:listener), :block => block) | |
lib/puppet/util/instrumentation.rb:133: instance_loader(:listener).loadall | |
SETTING ':localcacert' | |
lib/puppet/defaults.rb:510: :localcacert => { | |
lib/puppet/indirector/certificate/file.rb:8: store_ca_at :localcacert | |
lib/puppet/network/http/connection.rb:186: Puppet[:localcacert], | |
lib/puppet/network/http/webrick.rb:112: Puppet[:localcacert], | |
lib/puppet/ssl/host.rb:258: @ssl_store.add_file(Puppet[:localcacert]) | |
SETTING ':localconfig' | |
lib/puppet/defaults.rb:926: :localconfig => { | |
SETTING ':logdir' | |
lib/puppet/defaults.rb:34: :logdir => { | |
lib/puppet/settings.rb:26: REQUIRED_APP_SETTINGS = [:logdir, :confdir, :vardir] | |
lib/puppet/settings.rb:37: :logdir => run_mode.log_dir, | |
lib/puppet/test/test_helper.rb:137: :logdir => "/dev/null", | |
SETTING ':manage_internal_file_permissions' | |
lib/puppet/defaults.rb:109: :manage_internal_file_permissions => { | |
lib/puppet/settings/file_setting.rb:75: if Puppet[:manage_internal_file_permissions] | |
SETTING ':manifest' | |
lib/puppet/application/apply.rb:168: Puppet[:manifest] = manifest | |
lib/puppet/application/doc.rb:6: attr_accessor :unknown_args, :manifest | |
lib/puppet/application/doc.rb:176: files << ::File.dirname(env[:manifest]) | |
lib/puppet/defaults.rb:739: :manifestdir => { | |
lib/puppet/defaults.rb:744: :manifest => { | |
lib/puppet/face/parser.rb:40: files << Puppet[:manifest] | |
lib/puppet/face/parser.rb:41: Puppet.notice "No manifest specified. Validating the default manifest #{Puppet[:manifest]}" | |
lib/puppet/face/parser.rb:45: Puppet[:manifest] = file | |
lib/puppet/node/environment.rb:213: file = Puppet.settings.value(:manifest, name.to_s) | |
lib/puppet/provider/service/daemontools.rb:128: if resource[:manifest] | |
lib/puppet/provider/service/daemontools.rb:130: command = [ resource[:manifest], resource[:name] ] | |
lib/puppet/provider/service/smf.rb:23: if resource[:manifest] | |
lib/puppet/provider/service/smf.rb:26: Puppet.notice "Importing #{@resource[:manifest]} for #{@resource[:name]}" | |
lib/puppet/provider/service/smf.rb:27: svccfg :import, resource[:manifest] | |
lib/puppet/type/service.rb:207: newparam(:manifest) do | |
lib/puppet/util/rdoc/parser.rb:98: if fullpath =~ /(.*)\/([^\/]+)\/(?:manifests|plugins|lib)\/.+\.(pp|rb)$/ | |
SETTING ':manifestdir' | |
lib/puppet/defaults.rb:739: :manifestdir => { | |
SETTING ':masterhttplog' | |
lib/puppet/defaults.rb:764: :masterhttplog => { | |
lib/puppet/network/http/webrick.rb:62: file = Puppet[:masterhttplog] | |
SETTING ':masterlog' | |
lib/puppet/defaults.rb:755: :masterlog => { | |
SETTING ':masterport' | |
lib/puppet/application/master.rb:189: @daemon.server = Puppet::Network::Server.new(Puppet[:bindaddress], Puppet[:masterport]) | |
lib/puppet/defaults.rb:773: :masterport => { | |
lib/puppet/file_bucket/dipper.rb:16: port = hash[:Port] || Puppet[:masterport] | |
lib/puppet/indirector/request.rb:194: def do_request(srv_service=:puppet, default_server=Puppet.settings[:server], default_port=Puppet.settings[:masterport], &block) | |
lib/puppet/indirector/request.rb:254: @port = Puppet.settings[:masterport].to_i | |
lib/puppet/indirector/rest.rb:41: Puppet.settings[port_setting || :masterport].to_i | |
lib/puppet/type/file/source.rb:187: (uri and uri.port) or Puppet.settings[:masterport] | |
lib/puppet/type/filebucket.rb:53: Defaults to the normal Puppet port, %s." % Puppet[:masterport] | |
lib/puppet/type/filebucket.rb:55: defaultto { Puppet[:masterport] } | |
SETTING ':maximum_uid' | |
lib/puppet/defaults.rb:202: :maximum_uid => { | |
lib/puppet/provider/file/posix.rb:13: return nil if id > Puppet[:maximum_uid].to_i | |
lib/puppet/provider/file/posix.rb:35: return nil if id > Puppet[:maximum_uid].to_i | |
lib/puppet/provider/file/posix.rb:64: if currentvalue > Puppet[:maximum_uid].to_i | |
lib/puppet/provider/file/posix.rb:95: if currentvalue > Puppet[:maximum_uid].to_i | |
lib/puppet/util/posix.rb:23: if id > Puppet[:maximum_uid].to_i | |
lib/puppet/util/posix.rb:48: if id > Puppet[:maximum_uid].to_i | |
SETTING ':mkusers' | |
lib/puppet/defaults.rb:104: :mkusers => { | |
lib/puppet/settings/file_setting.rb:45: @settings[:mkusers] or @settings.service_user_available? | |
lib/puppet/settings.rb:1068: return unless self[:mkusers] | |
SETTING ':module_working_dir' | |
lib/puppet/defaults.rb:367: :module_working_dir => { | |
lib/puppet/forge/cache.rb:47: Pathname(Puppet.settings[:module_working_dir]) + 'cache' | |
lib/puppet/forge.rb:87: # into the `Puppet.settings[:module_working_dir]`. Do not unpack it, just | |
lib/puppet/module_tool/applications/installer.rb:83: # release package in the `Puppet.settings[:module_working_dir]`. | |
lib/puppet/module_tool/skeleton.rb:26: Pathname(Puppet.settings[:module_working_dir]) + 'skeleton' | |
SETTING ':modulepath' | |
lib/puppet/defaults.rb:806: :modulepath => { | |
lib/puppet/face/module/install.rb:14: #{Puppet.settings[:modulepath].split(File::PATH_SEPARATOR).first}. | |
lib/puppet/face/module/list.rb:61: Puppet[:modulepath] = options[:modulepath] if options[:modulepath] | |
lib/puppet/face/module/list.rb:70: Puppet[:modulepath] = options[:modulepath] if options[:modulepath] | |
lib/puppet/indirector/facts/facter.rb:16: module_fact_dirs = Puppet[:modulepath].split(File::PATH_SEPARATOR).collect do |d| | |
lib/puppet/module_tool.rb:114: options[:modulepath] ||= Puppet.settings[:modulepath] | |
lib/puppet/module_tool.rb:116: options[:modulepath] = "#{options[:target_dir]}#{sep}#{options[:modulepath]}" if prepend_target_dir | |
lib/puppet/module_tool.rb:117: Puppet[:modulepath] = options[:modulepath] | |
lib/puppet/module_tool.rb:120: options[:target_dir] = options[:modulepath].split(sep).first | |
lib/puppet/node/environment.rb:105: cached_attr(:modulepath, Puppet[:filetimeout]) do | |
lib/puppet/node/environment.rb:106: dirs = self[:modulepath].split(File::PATH_SEPARATOR) | |
SETTING ':node_name' | |
lib/puppet/application/apply.rb:171: unless Puppet[:node_name_fact].empty? | |
lib/puppet/application/apply.rb:173: unless facts = Puppet::Node::Facts.indirection.find(Puppet[:node_name_value]) | |
lib/puppet/application/apply.rb:174: raise "Could not find facts for #{Puppet[:node_name_value]}" | |
lib/puppet/application/apply.rb:177: Puppet[:node_name_value] = facts.values[Puppet[:node_name_fact]] | |
lib/puppet/application/apply.rb:178: facts.name = Puppet[:node_name_value] | |
lib/puppet/application/apply.rb:182: unless node = Puppet::Node.indirection.find(Puppet[:node_name_value]) | |
lib/puppet/application/apply.rb:183: raise "Could not find node #{Puppet[:node_name_value]}" | |
lib/puppet/configurer/fact_handler.rb:15: facts = Puppet::Node::Facts.indirection.find(Puppet[:node_name_value], :environment => @environment) | |
lib/puppet/configurer/fact_handler.rb:16: unless Puppet[:node_name_fact].empty? | |
lib/puppet/configurer/fact_handler.rb:17: Puppet[:node_name_value] = facts.values[Puppet[:node_name_fact]] | |
lib/puppet/configurer/fact_handler.rb:18: facts.name = Puppet[:node_name_value] | |
lib/puppet/configurer.rb:98: # facts_for_uploading may set Puppet[:node_name_value] as a side effect | |
lib/puppet/configurer.rb:105: options[:report].host = Puppet[:node_name_value] | |
lib/puppet/configurer.rb:139: unless Puppet[:node_name_fact].empty? | |
lib/puppet/configurer.rb:144: if node = Puppet::Node.indirection.find(Puppet[:node_name_value], | |
lib/puppet/configurer.rb:231: result = Puppet::Resource::Catalog.indirection.find(Puppet[:node_name_value], fact_options.merge(:ignore_terminus => true, :environment => @environment)) | |
lib/puppet/configurer.rb:243: result = Puppet::Resource::Catalog.indirection.find(Puppet[:node_name_value], fact_options.merge(:ignore_cache => true, :environment => @environment)) | |
lib/puppet/defaults.rb:777: :node_name => { | |
lib/puppet/defaults.rb:905: :node_name_value => { | |
lib/puppet/defaults.rb:913: :node_name_fact => { | |
lib/puppet/defaults.rb:921: if !value.empty? and Puppet[:node_name_value] != Puppet[:certname] | |
lib/puppet/node.rb:131: if Puppet[:node_name] == 'cert' | |
lib/puppet/transaction/report.rb:77: @host = Puppet[:node_name_value] | |
SETTING ':node_name_fact' | |
lib/puppet/application/apply.rb:171: unless Puppet[:node_name_fact].empty? | |
lib/puppet/application/apply.rb:177: Puppet[:node_name_value] = facts.values[Puppet[:node_name_fact]] | |
lib/puppet/configurer/fact_handler.rb:16: unless Puppet[:node_name_fact].empty? | |
lib/puppet/configurer/fact_handler.rb:17: Puppet[:node_name_value] = facts.values[Puppet[:node_name_fact]] | |
lib/puppet/configurer.rb:139: unless Puppet[:node_name_fact].empty? | |
lib/puppet/defaults.rb:913: :node_name_fact => { | |
SETTING ':node_name_value' | |
lib/puppet/application/apply.rb:173: unless facts = Puppet::Node::Facts.indirection.find(Puppet[:node_name_value]) | |
lib/puppet/application/apply.rb:174: raise "Could not find facts for #{Puppet[:node_name_value]}" | |
lib/puppet/application/apply.rb:177: Puppet[:node_name_value] = facts.values[Puppet[:node_name_fact]] | |
lib/puppet/application/apply.rb:178: facts.name = Puppet[:node_name_value] | |
lib/puppet/application/apply.rb:182: unless node = Puppet::Node.indirection.find(Puppet[:node_name_value]) | |
lib/puppet/application/apply.rb:183: raise "Could not find node #{Puppet[:node_name_value]}" | |
lib/puppet/configurer/fact_handler.rb:15: facts = Puppet::Node::Facts.indirection.find(Puppet[:node_name_value], :environment => @environment) | |
lib/puppet/configurer/fact_handler.rb:17: Puppet[:node_name_value] = facts.values[Puppet[:node_name_fact]] | |
lib/puppet/configurer/fact_handler.rb:18: facts.name = Puppet[:node_name_value] | |
lib/puppet/configurer.rb:98: # facts_for_uploading may set Puppet[:node_name_value] as a side effect | |
lib/puppet/configurer.rb:105: options[:report].host = Puppet[:node_name_value] | |
lib/puppet/configurer.rb:144: if node = Puppet::Node.indirection.find(Puppet[:node_name_value], | |
lib/puppet/configurer.rb:231: result = Puppet::Resource::Catalog.indirection.find(Puppet[:node_name_value], fact_options.merge(:ignore_terminus => true, :environment => @environment)) | |
lib/puppet/configurer.rb:243: result = Puppet::Resource::Catalog.indirection.find(Puppet[:node_name_value], fact_options.merge(:ignore_cache => true, :environment => @environment)) | |
lib/puppet/defaults.rb:905: :node_name_value => { | |
lib/puppet/defaults.rb:921: if !value.empty? and Puppet[:node_name_value] != Puppet[:certname] | |
lib/puppet/transaction/report.rb:77: @host = Puppet[:node_name_value] | |
SETTING ':node_terminus' | |
lib/puppet/application/agent.rb:14: :node_terminus => :rest, | |
lib/puppet/application/device.rb:15: :node_terminus => :rest, | |
lib/puppet/application/kick.rb:314: if Puppet[:node_terminus] == :ldap and (options[:all] or @classes) | |
lib/puppet/defaults.rb:213: :node_terminus => { | |
lib/puppet/node.rb:16: indirects :node, :terminus_setting => :node_terminus, :doc => "Where to find node information. | |
SETTING ':noop' | |
lib/puppet/configurer/downloader.rb:59: :noop => false | |
lib/puppet/defaults.rb:1000: :noop => { | |
lib/puppet/face/module/upgrade.rb:67: elsif return_value[:result] == :noop | |
lib/puppet/module_tool/applications/upgrader.rb:89: results[:result] = :noop | |
lib/puppet/parameter.rb:180: tmp = @noop || self.resource.noop || Puppet[:noop] || false | |
lib/puppet/property.rb:15: attr_writer :noop | |
lib/puppet/property.rb:265: if @resource.respond_to?(:noop?) | |
lib/puppet/property.rb:271: Puppet[:noop] | |
lib/puppet/transaction/event_manager.rb:112: queue_events(resource, [resource.event(:status => "noop", :name => :noop_restart)]) | |
lib/puppet/type/yumrepo.rb:172: unless Puppet[:noop] | |
lib/puppet/type.rb:731: Puppet[:noop] | |
lib/puppet/type.rb:818: newmetaparam(:noop) do | |
lib/puppet/type.rb:1527: attr_writer :noop | |
lib/puppet/util/monkey_patches.rb:281: return if options[:noop] | |
SETTING ':onetime' | |
lib/puppet/application/agent.rb:312: return onetime if Puppet[:onetime] | |
lib/puppet/application/agent.rb:368: Puppet[:onetime] = true | |
lib/puppet/application/agent.rb:397: waitforcert = options[:waitforcert] || (Puppet[:onetime] ? 0 : Puppet[:waitforcert]) | |
lib/puppet/application/agent.rb:406: @agent = Puppet::Agent.new(Puppet::Configurer, (not(Puppet[:onetime]))) | |
lib/puppet/application/agent.rb:422: unless Puppet[:onetime] | |
lib/puppet/application/device.rb:212: waitforcert = options[:waitforcert] || (Puppet[:onetime] ? 0 : Puppet[:waitforcert]) | |
lib/puppet/defaults.rb:114: :onetime => { | |
SETTING ':passfile' | |
lib/puppet/defaults.rb:474: :passfile => { | |
lib/puppet/ssl/key.rb:31: @password_file = Puppet[:passfile] | |
SETTING ':path' | |
lib/puppet/application/inspect.rb:165: path = ral_resource[:path] | |
lib/puppet/configurer/downloader.rb:5: attr_reader :name, :path, :source, :ignore | |
lib/puppet/configurer/downloader.rb:17: files << resource[:path] | |
lib/puppet/configurer/downloader.rb:41: args = default_arguments.merge(:path => path, :source => source) | |
lib/puppet/configurer/downloader.rb:52: :path => path, | |
lib/puppet/defaults.rb:121: :path => { | |
lib/puppet/defaults.rb:808: :type => :path, | |
lib/puppet/defaults.rb:1227: :type => :path, | |
lib/puppet/face/module/list.rb:158: :label_unmet => true, :path => path, :label_invalid => false) | |
lib/puppet/face/module/list.rb:163: :path => path, :label_invalid => true) | |
lib/puppet/face/module/list.rb:250: unless File.dirname(mod.path) == params[:path] | |
lib/puppet/file_serving/base.rb:47: attr_reader :path | |
lib/puppet/file_serving/configuration/parser.rb:98: if mount.respond_to?(:path=) | |
lib/puppet/file_serving/fileset.rb:7: attr_reader :path, :ignore, :links | |
lib/puppet/file_serving/metadata.rb:15: attr_reader :path, :owner, :group, :mode, :checksum_type, :checksum, :ftype, :destination | |
lib/puppet/indirector/catalog/static_compiler.rb:104: children[meta.relative_path] ||= Puppet::Resource.new(:file, File.join(file[:path], meta.relative_path)) | |
lib/puppet/module.rb:32: attr_reader :name, :environment, :path | |
lib/puppet/module_tool/applications/installer.rb:119: download_tarballs(@graph, @graph.last[:path], @forge) | |
lib/puppet/module_tool/applications/uninstaller.rb:55: :path => mod.modulepath, | |
lib/puppet/module_tool/applications/uninstaller.rb:79: :installed_modules => @unfiltered.sort_by { |mod| @environment.modulepath.index(mod[:path]) }, | |
lib/puppet/module_tool/applications/upgrader.rb:74: tarballs = download_tarballs(@graph, @graph.last[:path], @forge) | |
lib/puppet/module_tool/applications/upgrader.rb:86: results[:base_dir] = @graph.first[:path] | |
lib/puppet/module_tool/errors/uninstaller.rb:18: " '#{mod[:name]}' (#{v(mod[:version])}) is installed in #{mod[:path]}" | |
lib/puppet/module_tool/shared_behaviors.rb:132: :path => action == :install ? @options[:target_dir] : (@installed[mod].empty? ? @options[:target_dir] : @installed[mod].first.modulepath), | |
lib/puppet/module_tool/shared_behaviors.rb:156: { (release[:path] ||= default_path) => cache_path}, | |
lib/puppet/module_tool.rb:101: mod[:text] += " [#{mod[:path]}]" unless mod[:path] == dir | |
lib/puppet/node/environment.rb:122: module_references << {:name => name, :path => File.join(path, name)} | |
lib/puppet/node/environment.rb:130: Puppet::Module.new(reference[:name], reference[:path], self) | |
lib/puppet/provider/augeas/augeas.rb:37: "set" => [ :path, :string ], | |
lib/puppet/provider/augeas/augeas.rb:38: "setm" => [ :path, :string, :string ], | |
lib/puppet/provider/augeas/augeas.rb:39: "rm" => [ :path ], | |
lib/puppet/provider/augeas/augeas.rb:40: "clear" => [ :path ], | |
lib/puppet/provider/augeas/augeas.rb:41: "mv" => [ :path, :path ], | |
lib/puppet/provider/augeas/augeas.rb:42: "insert" => [ :string, :string, :path ], | |
lib/puppet/provider/augeas/augeas.rb:43: "get" => [ :path, :comparator, :string ], | |
lib/puppet/provider/augeas/augeas.rb:44: "defvar" => [ :string, :path ], | |
lib/puppet/provider/augeas/augeas.rb:45: "defnode" => [ :string, :path, :string ], | |
lib/puppet/provider/augeas/augeas.rb:46: "match" => [ :path, :glob ], | |
lib/puppet/provider/augeas/augeas.rb:89: if f == :path | |
lib/puppet/provider/exec/posix.rb:29: if resource[:path] | |
lib/puppet/provider/exec/posix.rb:30: Puppet::Util.withenv :PATH => resource[:path].join(File::PATH_SEPARATOR) do | |
lib/puppet/provider/exec/windows.rb:47: if resource[:path] | |
lib/puppet/provider/exec/windows.rb:48: Puppet::Util.withenv :PATH => resource[:path].join(File::PATH_SEPARATOR) do | |
lib/puppet/provider/exec.rb:32: environment[:PATH] = resource[:path].join(File::PATH_SEPARATOR) if resource[:path] | |
lib/puppet/provider/exec.rb:87: self.fail "'#{command}' is not qualified and no path was specified. Please qualify the command or specify a path." if !absolute_path?(exe) and resource[:path].nil? | |
lib/puppet/provider/file/posix.rb:81: File.send(method, should, nil, resource[:path]) | |
lib/puppet/provider/file/posix.rb:112: File.send(method, nil, should, resource[:path]) | |
lib/puppet/provider/file/posix.rb:128: File.chmod(value.to_i(8), resource[:path]) | |
lib/puppet/provider/file/posix.rb:130: error = Puppet::Error.new("failed to set mode #{mode} on #{resource[:path]}: #{detail.message}") | |
lib/puppet/provider/file/windows.rb:39: get_owner(resource[:path]) | |
lib/puppet/provider/file/windows.rb:44: set_owner(should, resource[:path]) | |
lib/puppet/provider/file/windows.rb:52: get_group(resource[:path]) | |
lib/puppet/provider/file/windows.rb:57: set_group(should, resource[:path]) | |
lib/puppet/provider/file/windows.rb:65: mode = get_mode(resource[:path]) | |
lib/puppet/provider/file/windows.rb:74: set_mode(value.to_i(8), resource[:path]) | |
lib/puppet/provider/file/windows.rb:76: error = Puppet::Error.new("failed to set mode #{mode} on #{resource[:path]}: #{detail.message}") | |
lib/puppet/provider/file/windows.rb:84: if [:owner, :group, :mode].any?{|p| resource[p]} and !supports_acl?(resource[:path]) | |
lib/puppet/provider/service/daemontools.rb:79: new(:name => name, :path => path) | |
lib/puppet/provider/service/daemontools.rb:112: File.join(resource[:path], resource[:name]) | |
lib/puppet/provider/service/init.rb:46: instances << new(:name => name, :path => path, :hasstatus => true) | |
lib/puppet/provider/service/init.rb:68: @paths ||= @resource[:path].find_all do |path| | |
lib/puppet/provider/service/launchd.rb:93: new(:name => job, :provider => :launchd, :path => jobs[job], :status => job_status) | |
lib/puppet/provider/zone/solaris.rb:11: fields = [:id, :name, :ensure, :path, :uuid, :brand, :iptype] | |
lib/puppet/provider/zone/solaris.rb:65: def_prop :path, "set zonepath=%s" | |
lib/puppet/provider/zone/solaris.rb:108: [:path, :iptype, :autoboot, :pool, :shares, :ip, :dataset, :inherit] | |
lib/puppet/provider/zone/solaris.rb:113: self.fail "Path is required" unless @resource[:path] | |
lib/puppet/provider/zone/solaris.rb:257: self.fail "Path is required" unless @resource[:path] | |
lib/puppet/provider/zone/solaris.rb:258: zoneetc = File.join(@resource[:path], "root", "etc") | |
lib/puppet/rails/database/schema.rb:36: t.column :path, :string | |
lib/puppet/settings.rb:613: :path => PathSetting, | |
lib/puppet/settings.rb:792: # :path - This is intended to be used for settings whose value can contain multiple directory paths, respresented | |
lib/puppet/ssl/inventory.rb:6: attr_reader :path | |
lib/puppet/type/exec.rb:142: newparam(:path) do | |
lib/puppet/type/file/content.rb:112: notice "\n" + diff(@resource[:path], path) | |
lib/puppet/type/file/content.rb:125: resource.parameter(:checksum).sum_file(resource[:path]) | |
lib/puppet/type/file/ensure.rb:40: File.unlink(@resource[:path]) | |
lib/puppet/type/file/ensure.rb:64: parent = File.dirname(@resource[:path]) | |
lib/puppet/type/file/ensure.rb:67: "Cannot create #{@resource[:path]}; parent directory #{parent} does not exist" | |
lib/puppet/type/file/ensure.rb:71: Dir.mkdir(@resource[:path], symbolic_mode_to_int(mode, 755, true)) | |
lib/puppet/type/file/ensure.rb:74: Dir.mkdir(@resource[:path]) | |
lib/puppet/type/file/ensure.rb:123: basedir = File.dirname(@resource[:path]) | |
lib/puppet/type/file/mode.rb:82: if FileTest.directory?(resource[:path]) and value =~ /^\d+$/ then | |
lib/puppet/type/file/selcontext.rb:30: context = self.get_selinux_current_context(@resource[:path]) | |
lib/puppet/type/file/selcontext.rb:39: unless context = self.get_selinux_default_context(@resource[:path]) | |
lib/puppet/type/file/selcontext.rb:44: self.debug "Found #{property} default '#{property_default}' for #{@resource[:path]}" if not property_default.nil? | |
lib/puppet/type/file/selcontext.rb:52: elsif not selinux_label_support?(@resource[:path]) | |
lib/puppet/type/file/selcontext.rb:61: self.set_selinux_context(@resource[:path], @should, name) | |
lib/puppet/type/file/target.rb:43: raise Puppet::Error, "Could not remove existing file" if FileTest.exists?(@resource[:path]) | |
lib/puppet/type/file/target.rb:45: Dir.chdir(File.dirname(@resource[:path])) do | |
lib/puppet/type/file/target.rb:50: File.symlink(target, @resource[:path]) | |
lib/puppet/type/file/target.rb:53: File.symlink(target, @resource[:path]) | |
lib/puppet/type/file/target.rb:66: elsif ! @resource.replace? and File.exists?(@resource[:path]) | |
lib/puppet/type/file/target.rb:77: return File.readlink(@resource[:path]) | |
lib/puppet/type/file.rb:37: [ [ /^(.*?)\/*\Z/m, [ [ :path ] ] ] ] | |
lib/puppet/type/file.rb:40: newparam(:path) do | |
lib/puppet/type/file.rb:251: path = Pathname.new(self[:path]) | |
lib/puppet/type/file.rb:317: FileTest.writable?(::File.dirname(self[:path])) | |
lib/puppet/type/file.rb:375: # catalog.resource(:file, resource[:path]) | |
lib/puppet/type/file.rb:383: ancestors = Pathname.new(self[:path]).enum_for(:ascend).map(&:to_s) | |
lib/puppet/type/file.rb:384: ancestors.delete(self[:path]) | |
lib/puppet/type/file.rb:426: full_path = ::File.join(self[:path], path) | |
lib/puppet/type/file.rb:437: options = @original_parameters.merge(:path => full_path).reject { |param, value| value.nil? } | |
lib/puppet/type/file.rb:491: result = children.values.sort { |a, b| a[:path] <=> b[:path] } | |
lib/puppet/type/file.rb:501: mypath = self[:path].split(::File::Separator) | |
lib/puppet/type/file.rb:503: select { |r| r.is_a?(self.class) and r[:path] != self[:path] }. | |
lib/puppet/type/file.rb:504: collect { |r| r[:path].split(::File::Separator) }. | |
lib/puppet/type/file.rb:510: path = file[:path].split(::File::Separator) | |
lib/puppet/type/file.rb:541: result = perform_recursion(self[:path]) | |
lib/puppet/type/file.rb:615: FileUtils.rmtree(self[:path]) | |
lib/puppet/type/file.rb:622: ::File.unlink(self[:path]) | |
lib/puppet/type/file.rb:693: ::File.send(method, self[:path]) | |
lib/puppet/type/file.rb:717: path = "#{self[:path]}.puppettmp_#{rand(10000)}" | |
lib/puppet/type/file.rb:718: path = "#{self[:path]}.puppettmp_#{rand(10000)}" while ::File.exists?(path) or ::File.symlink?(path) | |
lib/puppet/type/file.rb:720: path = self[:path] | |
lib/puppet/type/file.rb:733: ::File.rename(path, self[:path]) | |
lib/puppet/type/file.rb:735: fail "Could not rename temporary file #{path} to #{self[:path]}: #{detail}" | |
lib/puppet/type/filebucket.rb:58: newparam(:path) do | |
lib/puppet/type/filebucket.rb:80: new(:name => "puppet", :path => Puppet[:clientbucketdir]) | |
lib/puppet/type/filebucket.rb:97: if self[:path] | |
lib/puppet/type/filebucket.rb:98: args[:Path] = self[:path] | |
lib/puppet/type/k5login.rb:17: newparam(:path) do | |
lib/puppet/type/service.rb:138: newparam(:path) do | |
lib/puppet/type/tidy.rb:17: newparam(:path) do | |
lib/puppet/type/tidy.rb:219: Puppet::Type.type(:file).new :path => path, :backup => self[:backup], :ensure => :absent, :force => true | |
lib/puppet/type/tidy.rb:237: return [] unless stat(self[:path]) | |
lib/puppet/type/tidy.rb:247: files = Puppet::FileServing::Fileset.new(self[:path], parameter).files.collect do |f| | |
lib/puppet/type/tidy.rb:248: f == "." ? self[:path] : ::File.join(self[:path], f) | |
lib/puppet/type/tidy.rb:251: files = [self[:path]] | |
lib/puppet/type/tidy.rb:253: result = files.find_all { |path| tidy?(path) }.collect { |path| mkfile(path) }.each { |file| notice "Tidying #{file.ref}" }.sort { |a,b| b[:path] <=> a[:path] } | |
lib/puppet/type/tidy.rb:261: files_by_name = result.inject({}) { |hash, file| hash[file[:path]] = file; hash } | |
lib/puppet/type/zone.rb:183: newproperty(:path) do | |
lib/puppet/type/zone.rb:304: if @parameters.include? :path | |
lib/puppet/type/zone.rb:305: [@parameters[:path].value, ::File.dirname(@parameters[:path].value)] | |
lib/puppet/util/autoload.rb:193: attr_accessor :object, :path, :objwarn, :wrap | |
lib/puppet/util/backups.rb:12: file ||= self[:path] | |
lib/puppet/util/backups.rb:27: Find.find(self[:path]) { |f| backup_file_with_filebucket(f) if File.file?(f) } | |
lib/puppet/util/feature.rb:2: attr_reader :path | |
lib/puppet/util/filetype.rb:9: attr_accessor :loaded, :path, :synced | |
lib/puppet/util/log.rb:265: @source = descriptors[:path] | |
lib/puppet/util/log_paths.rb:13: [:path, :file, :line].each do |param| | |
lib/puppet/util/logging.rb:140: (is_resource? or is_resource_parameter?) and respond_to?(:path) and return path.to_s | |
lib/puppet/util/plugins.rb:69: attr_reader :path,:name | |
lib/puppet/util/rdoc/generators/puppet_generator.rb:456: attr_reader :path | |
lib/puppet/util/rdoc/generators/puppet_generator.rb:704: attr_reader :path | |
lib/puppet/util/resource_template.rb:21:# return Puppet::Type.type(:file).new :path => "/my/file", | |
lib/puppet/util.rb:271: params[:path] = URI.escape(path) | |
lib/puppet/util.rb:279: module_function :path_to_uri | |
SETTING ':pidfile' | |
lib/puppet/application/queue.rb:9: super.merge( :pidfile => "$rundir/queue.pid" ) | |
lib/puppet/daemon.rb:64: Puppet[:pidfile] | |
lib/puppet/defaults.rb:716: :pidfile => { | |
lib/puppet/network/server.rb:46: Puppet[:pidfile] | |
SETTING ':plugindest' | |
lib/puppet/configurer/plugin_handler.rb:9: Puppet[:plugindest], | |
lib/puppet/defaults.rb:1198: :plugindest => { | |
lib/puppet/face/plugin.rb:42: Puppet[:plugindest], | |
SETTING ':pluginsignore' | |
lib/puppet/configurer/plugin_handler.rb:11: Puppet[:pluginsignore], | |
lib/puppet/defaults.rb:1216: :pluginsignore => { | |
lib/puppet/face/plugin.rb:44: Puppet[:pluginsignore]).evaluate | |
SETTING ':pluginsource' | |
lib/puppet/configurer/plugin_handler.rb:10: Puppet[:pluginsource], | |
lib/puppet/defaults.rb:1204: :pluginsource => { | |
lib/puppet/face/plugin.rb:43: Puppet[:pluginsource], | |
SETTING ':pluginsync' | |
lib/puppet/agent.rb:44: client_args = client_options.merge(:pluginsync => Puppet[:pluginsync]) | |
lib/puppet/application/apply.rb:265: configurer.run(:catalog => catalog, :pluginsync => false) | |
lib/puppet/application/device.rb:198: report = configurer.run(:network_device => true, :pluginsync => Puppet[:pluginsync]) | |
lib/puppet/configurer.rb:91: download_plugins if options[:pluginsync] | |
lib/puppet/defaults.rb:1210: :pluginsync => { | |
lib/puppet/run.rb:28: valid_options = [:tags, :ignoreschedules, :pluginsync] | |
lib/puppet/run.rb:67: options = { :pluginsync => Puppet[:pluginsync] } | |
SETTING ':postrun_command' | |
lib/puppet/configurer.rb:32: execute_from_setting(:postrun_command) | |
lib/puppet/defaults.rb:348: :postrun_command => { | |
SETTING ':preferred_serialization_format' | |
lib/puppet/defaults.rb:1040: Puppet.settings[:preferred_serialization_format] = value | |
lib/puppet/defaults.rb:1044: :preferred_serialization_format => { | |
lib/puppet/network/format_handler.rb:151: preferred_format = Puppet.settings[:preferred_serialization_format].to_sym | |
SETTING ':prerun_command' | |
lib/puppet/configurer.rb:36: execute_from_setting(:prerun_command) | |
lib/puppet/defaults.rb:343: :prerun_command => { | |
SETTING ':privatedir' | |
lib/puppet/defaults.rb:467: :privatedir => { | |
SETTING ':privatekeydir' | |
lib/puppet/defaults.rb:460: :privatekeydir => { | |
lib/puppet/indirector/key/ca.rb:9: store_in :privatekeydir | |
lib/puppet/indirector/key/file.rb:7: store_in :privatekeydir | |
SETTING ':publickeydir' | |
lib/puppet/defaults.rb:448: :publickeydir => { | |
lib/puppet/indirector/key/file.rb:15: File.join(Puppet[:publickeydir], name.to_s + ".pem") | |
lib/puppet/indirector/key/file.rb:37: Puppet.settings.writesub(:publickeydir, public_key_path(request.key)) { |f| f.print request.instance.content.public_key.to_pem } | |
SETTING ':puppetdlog' | |
lib/puppet/defaults.rb:970: :puppetdlog => { | |
lib/puppet/util/log.rb:215: (Puppet.features.eventlog? ? :eventlog : Puppet[:puppetdlog]))) | |
SETTING ':puppetport' | |
lib/puppet/application/agent.rb:390: server = Puppet::Network::Server.new(Puppet[:bindaddress], Puppet[:puppetport]) | |
lib/puppet/application/kick.rb:251: port = Puppet[:puppetport] | |
lib/puppet/application/resource.rb:166: port = Puppet[:puppetport] | |
lib/puppet/defaults.rb:996: :puppetport => { | |
SETTING ':queue_source' | |
lib/puppet/defaults.rb:296: :queue_source => { | |
lib/puppet/util/queue/stomp.rb:9:# Looks to <tt>Puppet[:queue_source]</tt> for the sole argument to the | |
lib/puppet/util/queue/stomp.rb:11:# <tt>Puppet[:queue_source]</tt> must use the Stomp::Client URL-like syntax | |
lib/puppet/util/queue/stomp.rb:18: uri = URI.parse(Puppet[:queue_source]) | |
lib/puppet/util/queue/stomp.rb:20: raise ArgumentError, "Could not create Stomp client instance - queue source #{Puppet[:queue_source]} is invalid: #{detail}" | |
lib/puppet/util/queue/stomp.rb:23: raise ArgumentError, "Could not create Stomp client instance - queue source #{Puppet[:queue_source]} is not a Stomp URL: #{detail}" | |
lib/puppet/util/queue/stomp.rb:29: raise ArgumentError, "Could not create Stomp client instance with queue source #{Puppet[:queue_source]}: got internal Stomp client error #{detail}" | |
SETTING ':queue_type' | |
lib/puppet/defaults.rb:288: :queue_type => { | |
lib/puppet/defaults.rb:292: :queue_type => { | |
lib/puppet/util/queue.rb:84: # Looks to the <tt>:queue_type</tt> configuration entry in the running application for | |
lib/puppet/util/queue.rb:87: Puppet::Util::Queue.queue_type_to_class(Puppet[:queue_type]) | |
SETTING ':queue_type' | |
lib/puppet/defaults.rb:288: :queue_type => { | |
lib/puppet/defaults.rb:292: :queue_type => { | |
lib/puppet/util/queue.rb:84: # Looks to the <tt>:queue_type</tt> configuration entry in the running application for | |
lib/puppet/util/queue.rb:87: Puppet::Util::Queue.queue_type_to_class(Puppet[:queue_type]) | |
SETTING ':rails_loglevel' | |
lib/puppet/defaults.rb:1322: :rails_loglevel => { | |
lib/puppet/rails.rb:19: loglevel = Logger.const_get(Puppet[:rails_loglevel].upcase) | |
lib/puppet/rails.rb:22: Puppet.warning "'#{Puppet[:rails_loglevel]}' is not a valid Rails log level; using debug" | |
lib/puppet/rails.rb:46: args = {:adapter => adapter, :log_level => Puppet[:rails_loglevel]} | |
SETTING ':railslog' | |
lib/puppet/defaults.rb:1313: :railslog => { | |
lib/puppet/rails.rb:17: ActiveRecord::Base.logger = Logger.new(Puppet[:railslog]) | |
SETTING ':report' | |
lib/puppet/application/inspect.rb:84: raise "Inspect requires reporting to be enabled. Set report=true in puppet.conf to enable reporting." unless Puppet[:report] | |
lib/puppet/configurer.rb:105: options[:report].host = Puppet[:node_name_value] | |
lib/puppet/configurer.rb:117: report = options[:report] | |
lib/puppet/configurer.rb:133: options[:report] ||= Puppet::Transaction::Report.new("apply") | |
lib/puppet/configurer.rb:134: report = options[:report] | |
lib/puppet/configurer.rb:200: Puppet::Transaction::Report.indirection.save(report, nil, :environment => @environment) if Puppet[:report] | |
lib/puppet/defaults.rb:840: :reports => { | |
lib/puppet/defaults.rb:846: :reportdir => { | |
lib/puppet/defaults.rb:855: :reporturl => { | |
lib/puppet/defaults.rb:1117: :report_server => { | |
lib/puppet/defaults.rb:1121: :report_port => { | |
lib/puppet/defaults.rb:1133: :report => { | |
lib/puppet/defaults.rb:1248: :reportfrom => { | |
lib/puppet/face/catalog.rb:75: catalog.apply(:report => report) | |
lib/puppet/face/report.rb:3:Puppet::Indirector::Face.define(:report, '0.0.1') do | |
lib/puppet/face/report.rb:21: Puppet::Face[:report, "0.0.1"].save(report) | |
lib/puppet/face/report.rb:41: Puppet::Face[:report, '0.0.1'].submit(report) | |
lib/puppet/face/report.rb:47: Puppet::Face[:report, "0.0.1"].save(report) | |
lib/puppet/face/secret_agent.rb:49: Puppet::Face[:report, '0.0.1'].submit(report) | |
lib/puppet/indirector/report/processor.rb:10: Puppet.settings.use(:main, :reporting, :metrics) | |
lib/puppet/indirector/report/processor.rb:47: x = Puppet[:reports].gsub(/(^\s+)|(\s+$)/, '').split(/\s*,\s*/) | |
lib/puppet/indirector/report/processor.rb:51: return if Puppet[:reports] == "none" | |
lib/puppet/indirector/report/rest.rb:5: use_server_setting(:report_server) | |
lib/puppet/indirector/report/rest.rb:6: use_port_setting(:report_port) | |
lib/puppet/indirector/report/rest.rb:7: use_srv_service(:report) | |
lib/puppet/network/resolver.rb:19: when :report then service = '_x-puppet-report' | |
lib/puppet/reference/report.rb:3:report = Puppet::Util::Reference.newreference :report, :doc => "All available transaction reports" do | |
lib/puppet/reports/http.rb:15: url = URI.parse(Puppet[:reporturl]) | |
lib/puppet/reports/http.rb:22: Puppet.err "Unable to submit report to #{Puppet[:reporturl].to_s} [#{response.code}] #{response.msg}" | |
lib/puppet/reports/rrdgraph.rb:99: config.define_settings(:reports, :hostdir => {:type => :directory, :default => hostdir, :owner => 'service', :mode => 0755, :group => 'service', :desc => "eh"}) | |
lib/puppet/reports/rrdgraph.rb:102: config.use(:reports) | |
lib/puppet/reports/store.rb:18: dir = File.join(Puppet[:reportdir], host) | |
lib/puppet/reports/store.rb:55: dir = File.join(Puppet[:reportdir], host) | |
lib/puppet/reports/tagmail.rb:138: smtp.open_message_stream(Puppet[:reportfrom], *emails) do |p| | |
lib/puppet/reports/tagmail.rb:139: p.puts "From: #{Puppet[:reportfrom]}" | |
lib/puppet/reports/tagmail.rb:158: p.puts "From: #{Puppet[:reportfrom]}" | |
lib/puppet/reports.rb:9: instance_load :report, 'puppet/reports' | |
lib/puppet/reports.rb:19: mod = genmodule(name, :extend => Puppet::Util::Docs, :hash => instance_hash(:report), :block => block) | |
lib/puppet/reports.rb:23: mod.send(:define_method, :report_name) do | |
lib/puppet/reports.rb:33: instance_loader(:report).loadall | |
lib/puppet/reports.rb:34: loaded_instances(:report).sort { |a,b| a.to_s <=> b.to_s }.each do |name| | |
lib/puppet/reports.rb:46: instance_loader(:report).loadall | |
lib/puppet/reports.rb:47: loaded_instances(:report) | |
lib/puppet/resource/catalog.rb:132: transaction = Puppet::Transaction.new(self, options[:report]) | |
lib/puppet/resource/catalog.rb:133: register_report = options[:report].nil? | |
lib/puppet/transaction/report.rb:11: indirects :report, :terminus_class => :processor | |
lib/puppet/transaction/report.rb:15: :puppet_version, :report_format | |
lib/puppet/transaction.rb:19: attr_reader :report | |
lib/puppet/util/log/destinations.rb:180:Puppet::Util::Log.newdesttype :report do | |
lib/puppet/util/log/destinations.rb:181: attr_reader :report | |
SETTING ':report_port' | |
lib/puppet/defaults.rb:1121: :report_port => { | |
lib/puppet/indirector/report/rest.rb:6: use_port_setting(:report_port) | |
SETTING ':report_server' | |
lib/puppet/defaults.rb:1117: :report_server => { | |
lib/puppet/indirector/report/rest.rb:5: use_server_setting(:report_server) | |
SETTING ':reportdir' | |
lib/puppet/defaults.rb:846: :reportdir => { | |
lib/puppet/reports/store.rb:18: dir = File.join(Puppet[:reportdir], host) | |
lib/puppet/reports/store.rb:55: dir = File.join(Puppet[:reportdir], host) | |
SETTING ':reportfrom' | |
lib/puppet/defaults.rb:1248: :reportfrom => { | |
lib/puppet/reports/tagmail.rb:138: smtp.open_message_stream(Puppet[:reportfrom], *emails) do |p| | |
lib/puppet/reports/tagmail.rb:139: p.puts "From: #{Puppet[:reportfrom]}" | |
lib/puppet/reports/tagmail.rb:158: p.puts "From: #{Puppet[:reportfrom]}" | |
SETTING ':reports' | |
lib/puppet/defaults.rb:840: :reports => { | |
lib/puppet/indirector/report/processor.rb:47: x = Puppet[:reports].gsub(/(^\s+)|(\s+$)/, '').split(/\s*,\s*/) | |
lib/puppet/indirector/report/processor.rb:51: return if Puppet[:reports] == "none" | |
lib/puppet/reports/rrdgraph.rb:99: config.define_settings(:reports, :hostdir => {:type => :directory, :default => hostdir, :owner => 'service', :mode => 0755, :group => 'service', :desc => "eh"}) | |
lib/puppet/reports/rrdgraph.rb:102: config.use(:reports) | |
SETTING ':reporturl' | |
lib/puppet/defaults.rb:855: :reporturl => { | |
lib/puppet/reports/http.rb:15: url = URI.parse(Puppet[:reporturl]) | |
lib/puppet/reports/http.rb:22: Puppet.err "Unable to submit report to #{Puppet[:reporturl].to_s} [#{response.code}] #{response.msg}" | |
SETTING ':req_bits' | |
lib/puppet/defaults.rb:685: :req_bits => { | |
lib/puppet/test/test_helper.rb:169: Puppet[:req_bits] = 512 | |
SETTING ':requestdir' | |
lib/puppet/defaults.rb:454: :requestdir => { | |
lib/puppet/indirector/certificate_request/file.rb:7: store_in :requestdir | |
SETTING ':resourcefile' | |
lib/puppet/defaults.rb:963: :resourcefile => { | |
lib/puppet/resource/catalog.rb:501: ::File.open(Puppet[:resourcefile], "w") do |f| | |
lib/puppet/resource/catalog.rb:513: Puppet.err "Could not create resource file #{Puppet[:resourcefile]}: #{detail}" | |
SETTING ':rest_authconfig' | |
lib/puppet/application/agent.rb:383: unless FileTest.exists?(Puppet[:rest_authconfig]) | |
lib/puppet/application/agent.rb:384: Puppet.err "Will not start without authorization file #{Puppet[:rest_authconfig]}" | |
lib/puppet/defaults.rb:794: :rest_authconfig => { | |
lib/puppet/network/authorization.rb:10: @auth_config_file ||= Puppet::Util::LoadedFile.new(Puppet[:rest_authconfig]) | |
lib/puppet/network/authorization.rb:13: @auth_config = Puppet::Network::AuthConfigParser.new_from_file(Puppet[:rest_authconfig]).parse | |
SETTING ':route_file' | |
lib/puppet/application.rb:345: exit_on_fail("configure routes from #{Puppet[:route_file]}") { configure_indirector_routes } | |
lib/puppet/application.rb:375: route_file = Puppet[:route_file] | |
lib/puppet/defaults.rb:209: :route_file => { | |
SETTING ':rrddir' | |
lib/puppet/defaults.rb:873: :rrddir => { | |
lib/puppet/reports/rrdgraph.rb:24: @hostdir ||= File.join(Puppet[:rrddir], self.host) | |
lib/puppet/util/metric.rb:25: Puppet[:rrddir] | |
SETTING ':rrdinterval' | |
lib/puppet/defaults.rb:883: :rrdinterval => { | |
lib/puppet/util/metric.rb:49: @rrd.create( Puppet[:rrdinterval], start, args) | |
lib/puppet/util/metric.rb:51: RRD.create( self.path, '-s', Puppet[:rrdinterval].to_s, '-b', start.to_i.to_s, *args) | |
SETTING ':rundir' | |
lib/puppet/defaults.rb:70: :rundir => { | |
lib/puppet/settings.rb:36: :rundir => run_mode.run_dir, | |
lib/puppet/test/test_helper.rb:140: :rundir => "/dev/null", | |
SETTING ':runinterval' | |
lib/puppet/daemon.rb:153: # wakeup, and the agent run if Puppet[:runinterval] seconds have passed | |
lib/puppet/daemon.rb:161: agent_run_interval = [Puppet[:runinterval], 0].max | |
lib/puppet/daemon.rb:196: new_run_interval = [Puppet[:runinterval], 0].max | |
lib/puppet/defaults.rb:1005: :runinterval => { | |
lib/puppet/indirector/indirection.rb:75: @ttl ||= Puppet[:runinterval] | |
lib/puppet/network/authentication.rb:9: @@logger = Puppet::Util::Log::RateLimitedLogger.new(Puppet[:runinterval]) | |
SETTING ':sendmail' | |
lib/puppet/defaults.rb:1243: :sendmail => { | |
lib/puppet/reports/tagmail.rb:153: elsif Puppet[:sendmail] != "" | |
lib/puppet/reports/tagmail.rb:157: IO.popen(Puppet[:sendmail] + " " + emails.join(" "), "w") do |p| | |
SETTING ':serial' | |
lib/puppet/defaults.rb:654: :serial => { | |
lib/puppet/ssl/certificate_authority.rb:207: serial = 0x1 unless FileTest.exist?(Puppet[:serial]) | |
lib/puppet/ssl/certificate_authority.rb:209: Puppet.settings.readwritelock(:serial) { |f| | |
lib/puppet/ssl/certificate_authority.rb:210: serial ||= File.read(Puppet.settings[:serial]).chomp.hex if FileTest.exist?(Puppet[:serial]) | |
SETTING ':server' | |
lib/puppet/application/agent.rb:437: args[:Server] = Puppet[:server] | |
lib/puppet/application/apply.rb:120: $ puppet apply --modulepath=/root/dev/modules -e "include ntpd::server" | |
lib/puppet/application/device.rb:219: args[:Server] = Puppet[:server] | |
lib/puppet/application/filebucket.rb:176: @client = Puppet::FileBucket::Dipper.new(:Server => Puppet[:server]) | |
lib/puppet/daemon.rb:8: attr_accessor :agent, :server, :argv | |
lib/puppet/defaults.rb:833: :server_datadir => { | |
lib/puppet/defaults.rb:977: :server => { | |
lib/puppet/indirector/json.rb:45: base = Puppet.run_mode.master? ? Puppet[:server_datadir] : Puppet[:client_datadir] | |
lib/puppet/indirector/request.rb:13: attr_accessor :server, :port, :uri, :protocol | |
lib/puppet/indirector/request.rb:194: def do_request(srv_service=:puppet, default_server=Puppet.settings[:server], default_port=Puppet.settings[:masterport], &block) | |
lib/puppet/indirector/rest.rb:14: attr_reader :server_setting, :port_setting | |
lib/puppet/indirector/rest.rb:37: Puppet.settings[server_setting || :server] | |
lib/puppet/network/http/handler.rb:15: attr_reader :server, :handler | |
lib/puppet/network/http/webrick/rest.rb:12: initialize_for_puppet(:server => server, :handler => handler) | |
lib/puppet/resource/catalog.rb:45: attr_accessor :client_version, :server_version | |
lib/puppet/ssl/certificate_authority.rb:268: cert_type = :server | |
lib/puppet/type/file/source.rb:183: (uri and uri.host) or Puppet.settings[:server] | |
lib/puppet/type/filebucket.rb:40: newparam(:server) do | |
lib/puppet/type/filebucket.rb:48: defaultto { Puppet[:server] } | |
lib/puppet/type/filebucket.rb:100: args[:Server] = self[:server] | |
SETTING ':server_datadir' | |
lib/puppet/defaults.rb:833: :server_datadir => { | |
lib/puppet/indirector/json.rb:45: base = Puppet.run_mode.master? ? Puppet[:server_datadir] : Puppet[:client_datadir] | |
SETTING ':show_diff' | |
lib/puppet/defaults.rb:182: :show_diff => { | |
lib/puppet/provider/augeas/augeas.rb:378: if Puppet[:show_diff] | |
lib/puppet/type/file/content.rb:110: if ! result and Puppet[:show_diff] | |
SETTING ':signeddir' | |
lib/puppet/defaults.rb:638: :signeddir => { | |
lib/puppet/indirector/certificate/ca.rb:7: store_in :signeddir | |
SETTING ':smtpserver' | |
lib/puppet/defaults.rb:1253: :smtpserver => { | |
lib/puppet/reports/tagmail.rb:134: if Puppet[:smtpserver] != "none" | |
lib/puppet/reports/tagmail.rb:136: Net::SMTP.start(Puppet[:smtpserver]) do |smtp| | |
SETTING ':splay' | |
lib/puppet/agent.rb:13: attr_reader :client_class, :client, :splayed, :should_fork | |
lib/puppet/agent.rb:70: return unless Puppet[:splay] | |
lib/puppet/agent.rb:73: time = rand(Puppet[:splaylimit] + 1) | |
lib/puppet/defaults.rb:1092: :splaylimit => { | |
lib/puppet/defaults.rb:1098: :splay => { | |
SETTING ':splaylimit' | |
lib/puppet/agent.rb:73: time = rand(Puppet[:splaylimit] + 1) | |
lib/puppet/defaults.rb:1092: :splaylimit => { | |
SETTING ':srv_domain' | |
lib/puppet/defaults.rb:986: :srv_domain => { | |
lib/puppet/indirector/request.rb:201: Puppet::Network::Resolver.each_srv_record(Puppet.settings[:srv_domain], srv_service) do |srv_server, srv_port| | |
SETTING ':ssl_client_ca_auth' | |
lib/puppet/defaults.rb:527: :ssl_client_ca_auth => { | |
lib/puppet/network/http/connection.rb:188: :ca_auth_file => Puppet[:ssl_client_ca_auth] | |
SETTING ':ssl_client_header' | |
lib/puppet/defaults.rb:812: :ssl_client_header => { | |
lib/puppet/network/http/rack/rest.rb:97: # try this with :ssl_client_header, which defaults should work for | |
lib/puppet/network/http/rack/rest.rb:99: if dn = request.env[Puppet[:ssl_client_header]] and dn_matchdata = dn.match(/^.*?CN\s*=\s*(.*)/) | |
SETTING ':ssl_client_verify_header' | |
lib/puppet/defaults.rb:818: :ssl_client_verify_header => { | |
lib/puppet/network/http/rack/rest.rb:101: result[:authenticated] = (request.env[Puppet[:ssl_client_verify_header]] == 'SUCCESS') | |
SETTING ':ssl_server_ca_auth' | |
lib/puppet/defaults.rb:546: :ssl_server_ca_auth => { | |
lib/puppet/network/http/webrick.rb:114: :ca_auth_file => Puppet[:ssl_server_ca_auth]) | |
SETTING ':ssldir' | |
lib/puppet/defaults.rb:441: :ssldir => { | |
SETTING ':statedir' | |
lib/puppet/defaults.rb:62: :statedir => { | |
lib/puppet/util/storage.rb:46: Puppet.settings.use(:main) unless FileTest.directory?(Puppet[:statedir]) | |
SETTING ':statefile' | |
lib/puppet/configurer.rb:44: Puppet.log_exception(detail, "Removing corrupt state file #{Puppet[:statefile]}: #{detail}") | |
lib/puppet/configurer.rb:46: ::File.unlink(Puppet[:statefile]) | |
lib/puppet/configurer.rb:49: raise Puppet::Error.new("Cannot remove #{Puppet[:statefile]}: #{detail}") | |
lib/puppet/defaults.rb:933: :statefile => { | |
lib/puppet/util/storage.rb:47: filename = Puppet[:statefile] | |
lib/puppet/util/storage.rb:84: Puppet.info "Creating state file #{Puppet[:statefile]}" unless FileTest.exist?(Puppet[:statefile]) | |
lib/puppet/util/storage.rb:87: Puppet::Util.replace_file(Puppet[:statefile], 0660) do |fh| | |
SETTING ':storeconfigs' | |
lib/puppet/defaults.rb:309: Puppet.settings[:storeconfigs] = true | |
lib/puppet/defaults.rb:328: Puppet.settings[:storeconfigs] = true if value | |
lib/puppet/defaults.rb:1446: :storeconfigs => { | |
lib/puppet/defaults.rb:1473: :storeconfigs_backend => { | |
lib/puppet/face/node/clean.rb:99: return unless Puppet[:storeconfigs] && Puppet.features.rails? | |
lib/puppet/indirector/store_configs.rb:6: @target = indirection.terminus Puppet[:storeconfigs_backend] | |
lib/puppet/parser/collector.rb:15: if form == :exported and Puppet[:storeconfigs] != true | |
lib/puppet/parser/grammar.ra:180: if (type == :exported and ! Puppet[:storeconfigs]) | |
lib/puppet/parser/grammar.ra:211: if args[:form] == :exported and ! Puppet[:storeconfigs] | |
lib/puppet/parser/grammar.ra:228: if args[:form] == :exported and ! Puppet[:storeconfigs] | |
lib/puppet/parser/parser.rb:1316: if (type == :exported and ! Puppet[:storeconfigs]) | |
lib/puppet/parser/parser.rb:1360: if args[:form] == :exported and ! Puppet[:storeconfigs] | |
lib/puppet/parser/parser.rb:1382: if args[:form] == :exported and ! Puppet[:storeconfigs] | |
SETTING ':storeconfigs_backend' | |
lib/puppet/defaults.rb:1473: :storeconfigs_backend => { | |
lib/puppet/indirector/store_configs.rb:6: @target = indirection.terminus Puppet[:storeconfigs_backend] | |
SETTING ':strict_hostname_checking' | |
lib/puppet/defaults.rb:864: :strict_hostname_checking => { | |
lib/puppet/node.rb:108: return [name] if Puppet.settings[:strict_hostname_checking] | |
SETTING ':summarize' | |
lib/puppet/configurer.rb:198: puts report.summary if Puppet[:summarize] | |
lib/puppet/defaults.rb:1354: :summarize => { | |
SETTING ':syslogfacility' | |
lib/puppet/defaults.rb:56: :syslogfacility => { | |
lib/puppet/util/log/destinations.rb:17: str = Puppet[:syslogfacility] | |
SETTING ':tagmap' | |
lib/puppet/defaults.rb:1239: :tagmap => { | |
lib/puppet/reports/tagmail.rb:111: unless FileTest.exists?(Puppet[:tagmap]) | |
lib/puppet/reports/tagmail.rb:112: Puppet.notice "Cannot send tagmail report; no tagmap file #{Puppet[:tagmap]}" | |
lib/puppet/reports/tagmail.rb:123: taglists = parse(File.read(Puppet[:tagmap])) | |
SETTING ':tags' | |
lib/puppet/application/kick.rb:5: attr_accessor :hosts, :tags, :classes | |
lib/puppet/application/kick.rb:257: :tags => @tags, | |
lib/puppet/configurer.rb:131: # which accepts :tags and :ignoreschedules. | |
lib/puppet/defaults.rb:1341: :tags => { | |
lib/puppet/parameter.rb:266: @tags = @resource.tags if @resource.respond_to? :tags | |
lib/puppet/parser/scope.rb:374: def_delegator :resource, :tags | |
lib/puppet/rails/host.rb:176: accumulate_benchmark("Added resources", :tags) { | |
lib/puppet/rails/resource.rb:94: accumulate_benchmark("Individual resource merger", :tags) { merge_tags(resource) } | |
lib/puppet/resource/catalog.rb:123: # :tags - set the tags that restrict what resources run | |
lib/puppet/resource/catalog.rb:135: transaction.tags = options[:tags] if options[:tags] | |
lib/puppet/resource.rb:60: data = ([:type, :title, :tags] + ATTRIBUTES).inject({}) do |hash, param| | |
lib/puppet/run.rb:28: valid_options = [:tags, :ignoreschedules, :pluginsync] | |
lib/puppet/run.rb:38: msg += "triggered run" % if options[:tags] | |
lib/puppet/run.rb:39: msg += " with tags #{options[:tags].inspect}" | |
lib/puppet/transaction/event.rb:15: attr_writer :tags | |
lib/puppet/transaction.rb:468: self.tags = Puppet[:tags] unless defined?(@tags) | |
lib/puppet/type.rb:447: Puppet::Transaction::Event.new({:resource => self, :file => file, :line => line, :tags => tags}.merge(options)) | |
lib/puppet/util/log.rb:233: if tags = args[:tags] | |
lib/puppet/util/log.rb:267: descriptors[:tags].each { |t| tag(t) } | |
lib/puppet/util/log_paths.rb:11: descriptors[:tags] = tags | |
lib/puppet/util/logging.rb:132: [:file, :line, :tags].inject({}) do |result, attr| | |
SETTING ':templatedir' | |
lib/puppet/defaults.rb:1483: :templatedir => { | |
lib/puppet/parser/files.rb:42: # If we can find the template in :templatedir, we return that. | |
lib/puppet/parser/files.rb:75: dirs = Puppet.settings.value(:templatedir, environment).split(File::PATH_SEPARATOR) | |
SETTING ':thin_storeconfigs' | |
lib/puppet/defaults.rb:319: :thin_storeconfigs => { | |
lib/puppet/rails/host.rb:93: list = list.select { |r| r.exported? } if Puppet.settings[:thin_storeconfigs] | |
lib/puppet/rails/host.rb:110: condition = { :exported => true } if Puppet.settings[:thin_storeconfigs] | |
SETTING ':trace' | |
lib/puppet/defaults.rb:45: :trace => { | |
lib/puppet/util/logging.rb:19: # Log an exception via Puppet.err. Will also log the backtrace if Puppet[:trace] is set. | |
lib/puppet/util/logging.rb:27: err(format_exception(exception, message, Puppet[:trace] || options[:trace])) | |
SETTING ':use_cached_catalog' | |
lib/puppet/configurer.rb:67: unless (Puppet[:use_cached_catalog] and result = retrieve_catalog_from_cache(fact_options)) or result = retrieve_new_catalog(fact_options) | |
lib/puppet/defaults.rb:1071: :use_cached_catalog => { | |
SETTING ':use_srv_records' | |
lib/puppet/defaults.rb:981: :use_srv_records => { | |
lib/puppet/indirector/request.rb:200: if Puppet.settings[:use_srv_records] | |
lib/puppet/indirector/request.rb:213: Puppet.debug "No more servers left, falling back to #{default_server}:#{default_port}" if Puppet.settings[:use_srv_records] | |
lib/puppet/test/test_helper.rb:159: Puppet.settings[:use_srv_records] = false | |
SETTING ':usecacheonfailure' | |
lib/puppet/configurer.rb:68: if ! Puppet[:usecacheonfailure] | |
lib/puppet/defaults.rb:1063: :usecacheonfailure => { | |
SETTING ':user' | |
lib/puppet/application/master.rb:182: Puppet.log_exception(detail, "Could not change user to #{Puppet[:user]}: #{detail}") | |
lib/puppet/defaults.rb:731: :user => { | |
lib/puppet/forge/repository.rb:156: private :user_agent | |
lib/puppet/module_tool/metadata.rb:17: attr_reader :username | |
lib/puppet/module_tool/metadata.rb:34: @username, @name = Puppet::ModuleTool::username_and_modname_from(full_module_name) | |
lib/puppet/provider/cron/crontab.rb:192: @property_hash[:user] = user | |
lib/puppet/provider/cron/crontab.rb:197: @property_hash[:user] || @property_hash[:target] | |
lib/puppet/provider/exec.rb:56: run_and_capture(command, resource[:user], resource[:group], | |
lib/puppet/provider/group/aix.rb:42: {:aix_attr => :users, :puppet_prop => :members, | |
lib/puppet/provider/group/aix.rb:43: :from => :users_from_attr}, | |
lib/puppet/provider/mcx/mcxcontent.rb:23: :user => "Users", | |
lib/puppet/provider/nameservice/directoryservice.rb:11: # e.g. Puppet::Type.type(:user).provide :directoryservice, :ds_path => "Users" | |
lib/puppet/provider/nameservice.rb:116: id_generators = {:user => :uid, :group => :gid} | |
lib/puppet/provider/nameservice.rb:136: when :user; database = :passwd; method = :uid | |
lib/puppet/provider/scheduled_task/win32_taskscheduler.rb:222: [:arguments, :working_dir, :enabled, :trigger, :user].each do |prop| | |
lib/puppet/provider/ssh_authorized_key/parsed.rb:49: raise Puppet::Error, "Cannot write SSH authorized keys without user" unless @resource.should(:user) | |
lib/puppet/provider/ssh_authorized_key/parsed.rb:50: raise Puppet::Error, "User '#{@resource.should(:user)}' does not exist" unless uid = Puppet::Util.uid(@resource.should(:user)) | |
lib/puppet/provider/ssh_authorized_key/parsed.rb:57: Puppet::Util::SUIDManager.asuser(@resource.should(:user)) do | |
lib/puppet/provider/user/aix.rb:19:Puppet::Type.type(:user).provide :aix, :parent => Puppet::Provider::AixObject do | |
lib/puppet/provider/user/directoryservice.rb:5:Puppet::Type.type(:user).provide :directoryservice do | |
lib/puppet/provider/user/hpux.rb:1:Puppet::Type.type(:user).provide :hpuxuseradd, :parent => :useradd do | |
lib/puppet/provider/user/ldap.rb:3:Puppet::Type.type(:user).provide :ldap, :parent => Puppet::Provider::Ldap do | |
lib/puppet/provider/user/ldap.rb:20: :password => :userPassword, | |
lib/puppet/provider/user/pw.rb:4:Puppet::Type.type(:user).provide :pw, :parent => Puppet::Provider::NameService::PW do | |
lib/puppet/provider/user/user_role_add.rb:4:Puppet::Type.type(:user).provide :user_role_add, :parent => :useradd, :source => :useradd do | |
lib/puppet/provider/user/user_role_add.rb:33: Puppet::Type.type(:user).validproperties.each do |property| | |
lib/puppet/provider/user/useradd.rb:3:Puppet::Type.type(:user).provide :useradd, :parent => Puppet::Provider::NameService::ObjectAdd do | |
lib/puppet/provider/user/useradd.rb:62: Puppet::Type.type(:user).validproperties.each do |property| | |
lib/puppet/provider/user/windows_adsi.rb:3:Puppet::Type.type(:user).provide :windows_adsi do | |
lib/puppet/rails.rb:54: args[:username] = Puppet[:dbuser] unless Puppet[:dbuser].to_s.empty? | |
lib/puppet/rails.rb:64: args[:username] = Puppet[:dbuser] unless Puppet[:dbuser].to_s.empty? | |
lib/puppet/settings/file_setting.rb:41: @settings[:user] | |
lib/puppet/settings.rb:437: @preferred_run_mode_name || :user | |
lib/puppet/settings.rb:448: raise ValidationError, "Invalid run mode '#{mode}'" unless [:master, :agent, :user].include?(mode) | |
lib/puppet/settings.rb:497: return File.join(Puppet::Util::RunMode[:user].conf_dir, config_file_name) | |
lib/puppet/settings.rb:499: private :user_config_file | |
lib/puppet/settings.rb:713: return @service_user_available = false unless user_name = self[:user] | |
lib/puppet/settings.rb:715: user = Puppet::Type.type(:user).new :name => self[:user], :audit => :ensure | |
lib/puppet/settings.rb:1074: if user = setting.owner and user != "root" and catalog.resource(:user, user).nil? | |
lib/puppet/settings.rb:1075: resource = Puppet::Resource.new(:user, user, :parameters => {:ensure => :present}) | |
lib/puppet/type/cron.rb:348: newproperty(:user) do | |
lib/puppet/type/cron.rb:362: autorequire(:user) do | |
lib/puppet/type/cron.rb:363: self[:user] | |
lib/puppet/type/cron.rb:373: if val = @resource.should(:user) | |
lib/puppet/type/exec.rb:155: newparam(:user) do | |
lib/puppet/type/exec.rb:478: autorequire(:user) do | |
lib/puppet/type/exec.rb:480: if user = self[:user] and user !~ /^\d+$/ | |
lib/puppet/type/file.rb:265: {:user => :owner, :group => :group}.each do |type, property| | |
lib/puppet/type/macauthorization.rb:86: newvalue(:user) | |
lib/puppet/type/mcx.rb:51: newvalues(:user, :group, :computer, :computerlist) | |
lib/puppet/type/mcx.rb:87: autorequire(:user) do | |
lib/puppet/type/mcx.rb:88: setup_autorequire(:user) | |
lib/puppet/type/scheduled_task.rb:57: newproperty(:user) do | |
lib/puppet/type/ssh_authorized_key.rb:37: newproperty(:user) do | |
lib/puppet/type/ssh_authorized_key.rb:53: return nil unless user = resource[:user] | |
lib/puppet/type/ssh_authorized_key.rb:97: autorequire(:user) do | |
lib/puppet/type/ssh_authorized_key.rb:98: should(:user) if should(:user) | |
lib/puppet/type/ssh_authorized_key.rb:106: return if @parameters.include?(:user) | |
lib/puppet/type/user.rb:8: newtype(:user) do | |
lib/puppet/type/user.rb:53: newvalue(:present, :event => :user_created) do | |
lib/puppet/type/user.rb:57: newvalue(:absent, :event => :user_removed) do | |
lib/puppet/type/user.rb:399: autorequire(:user) do | |
lib/puppet/util/fileparsing.rb:10:# record_line :user, :fields => %w{name password uid gid gecos home shell}, | |
lib/puppet/util/fileparsing.rb:19:# lines.each do |type, hash| # type will always be :user, since we only have one | |
lib/puppet/util/ldap/connection.rb:7: attr_accessor :host, :port, :user, :password, :reset, :ssl | |
lib/puppet/util/ldap/connection.rb:24: options[:user] = user | |
lib/puppet/util/ldap/manager.rb:59: options[:user] = user | |
lib/puppet/util/log/destinations.rb:81: FileUtils.chown(Puppet[:user], Puppet[:group], path) unless Puppet::Util::Platform.windows? | |
lib/puppet/util/network_device/transport/base.rb:6: attr_accessor :user, :password, :host, :port | |
lib/puppet/util/posix.rb:75: when :pw, :user, :passwd; return :uid | |
lib/puppet/util/posix.rb:85: when :pw, :user, :passwd; return :getpwuid | |
lib/puppet/util/posix.rb:95: when :pw, :user, :passwd; return :getpwnam | |
lib/puppet/util/run_mode.rb:30: name == :user | |
lib/puppet/util/suidmanager.rb:147: map = {:gid => :group, :uid => :user} | |
lib/puppet/util.rb:95: if user = Puppet[:user] | |
lib/puppet.rb:117: do_initialize_settings_for_run_mode(:user) | |
SETTING ':waitforcert' | |
lib/puppet/application/agent.rb:27: :waitforcert => nil, | |
lib/puppet/application/agent.rb:85: options[:waitforcert] = arg.to_i | |
lib/puppet/application/agent.rb:397: waitforcert = options[:waitforcert] || (Puppet[:onetime] ? 0 : Puppet[:waitforcert]) | |
lib/puppet/application/device.rb:28: :waitforcert => nil, | |
lib/puppet/application/device.rb:59: options[:waitforcert] = arg.to_i | |
lib/puppet/application/device.rb:212: waitforcert = options[:waitforcert] || (Puppet[:onetime] ? 0 : Puppet[:waitforcert]) | |
lib/puppet/defaults.rb:1172: :waitforcert => { | |
SETTING ':yamldir' | |
lib/puppet/defaults.rb:826: :yamldir => { | |
lib/puppet/indirector/facts/yaml.rb:21: base = Puppet.run_mode.master? ? Puppet[:yamldir] : Puppet[:clientyamldir] | |
lib/puppet/indirector/yaml.rb:57: base = Puppet.run_mode.master? ? Puppet[:yamldir] : Puppet[:clientyamldir] | |
SETTING ':zlib' | |
lib/puppet/defaults.rb:338: :zlib => { | |
lib/puppet/feature/zlib.rb:5:Puppet.features.add(:zlib, :libs => %{zlib}) | |
lib/puppet/network/formats.rb:36: Puppet.features.zlib? && Puppet[:zlib] |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment