Skip to content

Instantly share code, notes, and snippets.

@joshcooper
Created December 10, 2012 19:00
Show Gist options
  • Save joshcooper/4252548 to your computer and use it in GitHub Desktop.
Save joshcooper/4252548 to your computer and use it in GitHub Desktop.
Settings
SETTING ':agent_catalog_run_lockfile'
lib/puppet/agent/locker.rb:32: @lockfile_path ||= Puppet[:agent_catalog_run_lockfile]
lib/puppet/defaults.rb:1052: :agent_catalog_run_lockfile => {
SETTING ':agent_disabled_lockfile'
lib/puppet/agent/disabler.rb:48: @disable_lockfile ||= Puppet::Util::JsonLockfile.new(Puppet[:agent_disabled_lockfile])
lib/puppet/defaults.rb:1058: :agent_disabled_lockfile => {
SETTING ':allow_duplicate_certs'
lib/puppet/defaults.rb:670: :allow_duplicate_certs => {
lib/puppet/indirector/certificate_request/ca.rb:11: if Puppet[:allow_duplicate_certs]
SETTING ':allow_variables_with_dashes'
lib/puppet/defaults.rb:1490: :allow_variables_with_dashes => {
lib/puppet/parser/lexer.rb:246: Puppet[:allow_variables_with_dashes]
lib/puppet/parser/lexer.rb:260: Puppet[:allow_variables_with_dashes] and TOKENS[:VARIABLE].acceptable?(context)
lib/puppet/parser/lexer.rb:542: variable_regex = if Puppet[:allow_variables_with_dashes]
SETTING ':archive_file_server'
lib/puppet/application/inspect.rb:126: dipper = Puppet::FileBucket::Dipper.new(:Server => Puppet[:archive_file_server])
lib/puppet/defaults.rb:1188: :archive_file_server => {
SETTING ':archive_files'
lib/puppet/application/inspect.rb:125: if Puppet[:archive_files]
lib/puppet/application/inspect.rb:164: if Puppet[:archive_files] and ral_resource.type == :file and audited_attributes.include?(:content)
lib/puppet/defaults.rb:1183: :archive_files => {
SETTING ':async_storeconfigs'
lib/puppet/defaults.rb:301: :async_storeconfigs => {
lib/puppet/defaults.rb:1463: if not Puppet.settings[:async_storeconfigs]
SETTING ':authconfig'
lib/puppet/defaults.rb:158: :authconfig => {
SETTING ':autoflush'
lib/puppet/defaults.rb:50: :autoflush => {
lib/puppet/util/log/destinations.rb:64: attr_accessor :autoflush
lib/puppet/util/log/destinations.rb:88: @autoflush = Puppet[:autoflush]
lib/puppet/util/log.rb:73: dest.autoflush = v if dest.respond_to?(:autoflush=)
SETTING ':autosign'
lib/puppet/defaults.rb:662: :autosign => {
lib/puppet/ssl/certificate_authority.rb:92: auto = Puppet[:autosign]
SETTING ':bindaddress'
lib/puppet/application/agent.rb:390: server = Puppet::Network::Server.new(Puppet[:bindaddress], Puppet[:puppetport])
lib/puppet/application/master.rb:189: @daemon.server = Puppet::Network::Server.new(Puppet[:bindaddress], Puppet[:masterport])
lib/puppet/defaults.rb:724: :bindaddress => {
lib/puppet/test/test_helper.rb:154: Puppet.settings[:bindaddress] = "127.0.0.1"
SETTING ':bucketdir'
lib/puppet/application/filebucket.rb:173: path = options[:bucket] || Puppet[:bucketdir]
lib/puppet/defaults.rb:786: :bucketdir => {
lib/puppet/indirector/file_bucket_file/file.rb:114: bucket_path ||= Puppet[:bucketdir]
SETTING ':ca'
lib/puppet/application/agent.rb:12: :catalog_terminus => :rest,
lib/puppet/application/agent.rb:13: :catalog_cache_terminus => :json,
lib/puppet/application/agent.rb:465: if Puppet[:catalog_cache_terminus]
lib/puppet/application/agent.rb:466: Puppet::Resource::Catalog.indirection.cache_class = Puppet[:catalog_cache_terminus]
lib/puppet/application/apply.rb:16: options[:catalog] = arg
lib/puppet/application/apply.rb:143: if options[:catalog]
lib/puppet/application/apply.rb:151: if options[:catalog] == "-"
lib/puppet/application/apply.rb:154: text = ::File.read(options[:catalog])
lib/puppet/application/apply.rb:265: configurer.run(:catalog => catalog, :pluginsync => false)
lib/puppet/application/cert.rb:7: attr_accessor :all, :ca, :digest, :signed
lib/puppet/application/device.rb:13: :catalog_terminus => :rest,
lib/puppet/application/device.rb:14: :catalog_cache_terminus => :json,
lib/puppet/application/device.rb:240: if Puppet[:catalog_cache_terminus]
lib/puppet/application/device.rb:241: Puppet::Resource::Catalog.indirection.cache_class = Puppet[:catalog_cache_terminus].intern
lib/puppet/application/master.rb:237: Puppet.settings.use :ca
lib/puppet/configurer.rb:107: unless catalog = (options.delete(:catalog) || retrieve_catalog(fact_options))
lib/puppet/defaults.rb:125: :call_hook => :on_define_and_write,
lib/puppet/defaults.rb:144: :call_hook => :on_initialize_and_write,
lib/puppet/defaults.rb:228: :catalog_terminus => {
lib/puppet/defaults.rb:234: :catalog_cache_terminus => {
lib/puppet/defaults.rb:242: :call_hook => :on_initialize_and_write,
lib/puppet/defaults.rb:313: Puppet.settings[:catalog_cache_terminus] = :queue
lib/puppet/defaults.rb:381: :call_hook => :on_define_and_write, # Call our hook with the default value, so we're always downcased
lib/puppet/defaults.rb:578: :ca,
lib/puppet/defaults.rb:579: :ca_name => {
lib/puppet/defaults.rb:583: :cadir => {
lib/puppet/defaults.rb:591: :cacert => {
lib/puppet/defaults.rb:599: :cakey => {
lib/puppet/defaults.rb:607: :capub => {
lib/puppet/defaults.rb:614: :cacrl => {
lib/puppet/defaults.rb:623: :caprivatedir => {
lib/puppet/defaults.rb:646: :capass => {
lib/puppet/defaults.rb:676: :ca_ttl => {
lib/puppet/defaults.rb:681: :ca_md => {
lib/puppet/defaults.rb:801: :ca => {
lib/puppet/defaults.rb:1022: :ca_server => {
lib/puppet/defaults.rb:1028: :ca_port => {
lib/puppet/defaults.rb:1032: :catalog_format => {
lib/puppet/defaults.rb:1232: :call_hook => :on_initialize_and_write, # Call our hook with the default value, so we always get the value added to facter.
lib/puppet/defaults.rb:1458: :call_hook => :on_initialize_and_write,
lib/puppet/defaults.rb:1465: Puppet.settings[:catalog_cache_terminus] = :store_configs
lib/puppet/external/nagios/base.rb:388: :address5, :address6, :can_submit_commands, :retain_status_information,
lib/puppet/face/ca.rb:3:Puppet::Face.define(:ca, '0.1.0') do
lib/puppet/face/catalog/select.rb:2:Puppet::Face.define(:catalog, '0.0.1') do
lib/puppet/face/catalog.rb:3:Puppet::Indirector::Face.define(:catalog, '0.0.1') do
lib/puppet/face/catalog.rb:56: Puppet::Face[:catalog, '0.0.1'].download
lib/puppet/face/catalog.rb:59: report = Puppet::Face[:catalog, '0.0.1'].apply
lib/puppet/face/catalog.rb:64: catalog = Puppet::Face[:catalog, "0.0.1"].find(Puppet[:certname]) or raise "Could not find catalog for #{Puppet[:certname]}"
lib/puppet/face/catalog.rb:111: Puppet::Face[:catalog, '0.0.1'].download
lib/puppet/face/catalog.rb:119: catalog = Puppet::Face[:catalog, '0.0.1'].find(Puppet[:certname])
lib/puppet/face/catalog.rb:125: Puppet::Face[:catalog, "0.0.1"].save(catalog)
lib/puppet/face/certificate.rb:28: unless [:remote, :local, :only].include? options[:ca_location].to_sym
lib/puppet/face/certificate.rb:31: Puppet::SSL::Host.ca_location = options[:ca_location].to_sym
lib/puppet/face/node/clean.rb:71: Puppet::Face[:ca, :current].revoke(node)
lib/puppet/face/node/clean.rb:72: Puppet::Face[:ca, :current].destroy(node)
lib/puppet/face/report.rb:40: report = Puppet::Face[:catalog, '0.0.1'].apply
lib/puppet/face/secret_agent.rb:45: Puppet::Face[:catalog, '0.0.1'].download
lib/puppet/face/secret_agent.rb:47: report = Puppet::Face[:catalog, '0.0.1'].apply
lib/puppet/forge/repository.rb:14: attr_reader :uri, :cache
lib/puppet/indirector/certificate/ca.rb:8: store_ca_at :cacert
lib/puppet/indirector/certificate/rest.rb:7: use_server_setting(:ca_server)
lib/puppet/indirector/certificate/rest.rb:8: use_port_setting(:ca_port)
lib/puppet/indirector/certificate/rest.rb:9: use_srv_service(:ca)
lib/puppet/indirector/certificate_request/rest.rb:7: use_server_setting(:ca_server)
lib/puppet/indirector/certificate_request/rest.rb:8: use_port_setting(:ca_port)
lib/puppet/indirector/certificate_revocation_list/ca.rb:7: store_at :cacrl
lib/puppet/indirector/certificate_revocation_list/rest.rb:7: use_server_setting(:ca_server)
lib/puppet/indirector/certificate_revocation_list/rest.rb:8: use_port_setting(:ca_port)
lib/puppet/indirector/certificate_status/rest.rb:8: use_server_setting(:ca_server)
lib/puppet/indirector/certificate_status/rest.rb:9: use_port_setting(:ca_port)
lib/puppet/indirector/indirection.rb:55: attr_reader :cache_class
lib/puppet/indirector/key/ca.rb:11: store_ca_at :cakey
lib/puppet/indirector/key/file.rb:8: store_ca_at :cakey
lib/puppet/indirector/key/file.rb:13: Puppet[:capub]
lib/puppet/indirector/queue.rb:17:# Per-indirection queues are assumed, based on the indirection name. If the <tt>:catalog</tt> indirection makes
lib/puppet/indirector/ssl_file.rb:21: attr_reader :directory_setting, :file_setting, :ca_setting
lib/puppet/network/http/connection.rb:140: class << @connection; attr_accessor :ca_file; end
lib/puppet/network/http/connection.rb:187: :ca_chain_file => Puppet[:ssl_client_ca_chain],
lib/puppet/network/http/connection.rb:188: :ca_auth_file => Puppet[:ssl_client_ca_auth]
lib/puppet/network/http/webrick.rb:113: :ca_chain_file => Puppet[:ssl_server_ca_chain],
lib/puppet/network/http/webrick.rb:114: :ca_auth_file => Puppet[:ssl_server_ca_auth])
lib/puppet/network/resolver.rb:18: when :ca then service = '_x-puppet-ca'
lib/puppet/parameter/value.rb:6: attr_accessor :block, :call, :method, :required_features
lib/puppet/parameter/value_collection.rb:84: # * <tt>:call</tt>: When to call any associated block. The default value
lib/puppet/parameter/value_collection.rb:102: value.call = options[:call] || :none
lib/puppet/parser/compiler.rb:36: attr_reader :node, :facts, :collections, :catalog, :resources, :relationships, :topscope
lib/puppet/parser/resource.rb:25: attr_accessor :virtual, :override, :translated, :catalog, :evaluated
lib/puppet/parser/scope.rb:32: def_delegators :compiler, :catalog, :environment
lib/puppet/property.rb:57: # * <tt>:call</tt>: When to call any associated block. The default value
lib/puppet/property.rb:288: call = self.class.value_option(name, :call) || :none
lib/puppet/property.rb:299: # previously specify :call => [;before|:after], which would call
lib/puppet/property.rb:304: devfail "Cannot use obsolete :call value '#{call}' for property '#{self.class.name}'"
lib/puppet/provider/package/portage.rb:17: result_fields = [:category, :name, :ensure, :version_available, :vendor, :description]
lib/puppet/provider/package/portage.rb:63: @resource[:category] ? "#{@resource[:category]}/#{@resource[:name]}" : @resource[:name]
lib/puppet/provider/package/portage.rb:76: result_fields = [:category, :name, :ensure, :version_available, :vendor, :description]
lib/puppet/provider/package/portage.rb:109: not_found_value = "#{@resource[:category] ? @resource[:category] : "<unspecified category>"}/#{@resource[:name]}"
lib/puppet/provider/package/sun.rb:20: "CATEGORY" => :category,
lib/puppet/provider/zfs/zfs.rb:67: [:aclinherit, :atime, :canmount, :checksum,
lib/puppet/relationship.rb:13: attr_accessor :source, :target, :callback
lib/puppet/relationship.rb:26: args[:callback] = callback
lib/puppet/relationship.rb:41: [:callback, :event].each do |option|
lib/puppet/relationship.rb:62: result[:callback] = callback if callback
lib/puppet/resource/catalog.rb:18: indirects :catalog, :terminus_setting => :catalog_terminus
lib/puppet/resource/catalog.rb:88: resource.catalog = self if resource.respond_to?(:catalog=)
lib/puppet/resource/catalog.rb:303: Default_label = { :callback => :refresh, :event => :ALL_EVENTS }
lib/puppet/resource/catalog.rb:319: admissible[x] = whit_class.new(:name => "admissible_#{x.ref}", :catalog => self)
lib/puppet/resource/catalog.rb:320: completed[x] = whit_class.new(:name => "completed_#{x.ref}", :catalog => self)
lib/puppet/resource/type.rb:312: if caller_name = scope.parent_module_name and ! set.include?(:caller_module_name)
lib/puppet/resource.rb:21: attr_accessor :file, :line, :catalog, :exported, :virtual, :validate_parameters, :strict
lib/puppet/settings/base_setting.rb:5: attr_accessor :name, :section, :default, :call_on_define, :call_hook
lib/puppet/settings/base_setting.rb:23: Puppet.deprecation_warning ":call_on_define has been changed to :call_hook => :on_define_and_write. Please change #{name}."
lib/puppet/settings/base_setting.rb:26: Puppet.deprecation_warning ":call_on_define => :false has been changed to :call_hook => :on_write_only. Please change #{name}."
lib/puppet/settings/base_setting.rb:33: Puppet.warning "Setting :#{name} :call_hook is nil, defaulting to :on_write_only"
lib/puppet/settings/base_setting.rb:98: @call_hook = :on_write_only if args[:hook] and not args[:call_hook]
lib/puppet/settings/base_setting.rb:100: raise ArgumentError, "Cannot reference :call_hook for :#{@name} if no :hook is defined" if args[:call_hook] and not args[:hook]
lib/puppet/settings.rb:239: private :call_hooks_deferred_to_application_initialization
lib/puppet/ssl/certificate_authority.rb:55: return false unless Puppet[:ca]
lib/puppet/ssl/certificate_authority.rb:164: Puppet.settings.use :main, :ssl, :ca
lib/puppet/ssl/certificate_authority.rb:184: Puppet.settings.write(:capass) { |f| f.print pass }
lib/puppet/ssl/certificate_authority.rb:221: FileTest.exist? Puppet[:capass]
lib/puppet/ssl/certificate_authority.rb:260: cert_type = :ca
lib/puppet/ssl/certificate_authority.rb:360: store.add_file Puppet[:cacert]
lib/puppet/ssl/certificate_factory.rb:29: cert.not_after = Time.now + (ttl || Puppet[:ca_ttl])
lib/puppet/ssl/certificate_request.rb:43: common_name = name == Puppet::SSL::CA_NAME ? Puppet.settings[:ca_name] : name
lib/puppet/ssl/configuration.rb:11: if (options[:ca_chain_file] and not options[:ca_auth_file])
lib/puppet/ssl/configuration.rb:15: @ca_chain_file = options[:ca_chain_file]
lib/puppet/ssl/configuration.rb:16: @ca_auth_file = options[:ca_auth_file]
lib/puppet/ssl/host.rb:22: attr_accessor :ca
lib/puppet/ssl/host.rb:48: attr_reader :ca_location
lib/puppet/ssl/host.rb:57: host_map = {:ca => :file, :disabled_ca => nil, :file => nil, :rest => :rest}
lib/puppet/ssl/host.rb:91: :local => [:ca, :file],
lib/puppet/ssl/host.rb:95: :only => [:ca],
lib/puppet/ssl/key.rb:29: @password_file = Puppet[:capass]
lib/puppet/transaction.rb:15: attr_accessor :component, :catalog, :ignoreschedules, :for_network_device
lib/puppet/transaction.rb:168: sentinel = Puppet::Type.type(:whit).new(:name => "completed_#{resource.title}", :catalog => resource.catalog)
lib/puppet/type/package.rb:273: newparam(:category) do
lib/puppet/type/zfs.rb:27: newproperty(:canmount) do
lib/puppet/type.rb:794: [:catalog].each do |attribute|
lib/puppet/type.rb:1014: attr_accessor :direction, :events, :callback, :subclasses
lib/puppet/type.rb:1074: :callback => method
lib/puppet/type.rb:1140: newmetaparam(:subscribe, :parent => RelationshipMetaparam, :attributes => {:direction => :in, :events => :ALL_EVENTS, :callback => :refresh}) do
lib/puppet/type.rb:1182: newmetaparam(:notify, :parent => RelationshipMetaparam, :attributes => {:direction => :out, :events => :ALL_EVENTS, :callback => :refresh}) do
lib/puppet/type.rb:1593: attr_accessor :catalog
lib/puppet/type.rb:1636: [:file, :line, :catalog, :exported, :virtual].each do |getter|
lib/puppet/util/command_line/puppet_option_parser.rb:56: :callback => pass_only_last_value_on_to(block),
lib/puppet/util/command_line/trollop.rb:432: opts[:callback].call(vals[sym]) if opts.has_key?(:callback)
lib/puppet/util/instrumentation/instrumentable.rb:47: instrumentation_label = label.respond_to?(:call) ? label.call(self, args) : label
lib/puppet/util/instrumentation/instrumentable.rb:48: instrumentation_data = data.respond_to?(:call) ? data.call(self, args) : data
lib/puppet/util/rdoc/generators/template/puppet/puppet.rb:771:IF:callseq
lib/puppet/util/rdoc/generators/template/puppet/puppet.rb:773:ENDIF:callseq
lib/puppet/util/rdoc/generators/template/puppet/puppet.rb:774:IFNOT:callseq
lib/puppet/util/rdoc/generators/template/puppet/puppet.rb:776:ENDIF:callseq
SETTING ':ca_md'
lib/puppet/defaults.rb:681: :ca_md => {
SETTING ':ca_name'
lib/puppet/defaults.rb:579: :ca_name => {
lib/puppet/ssl/certificate_request.rb:43: common_name = name == Puppet::SSL::CA_NAME ? Puppet.settings[:ca_name] : name
SETTING ':ca_port'
lib/puppet/defaults.rb:1028: :ca_port => {
lib/puppet/indirector/certificate/rest.rb:8: use_port_setting(:ca_port)
lib/puppet/indirector/certificate_request/rest.rb:8: use_port_setting(:ca_port)
lib/puppet/indirector/certificate_revocation_list/rest.rb:8: use_port_setting(:ca_port)
lib/puppet/indirector/certificate_status/rest.rb:9: use_port_setting(:ca_port)
SETTING ':ca_server'
lib/puppet/defaults.rb:1022: :ca_server => {
lib/puppet/indirector/certificate/rest.rb:7: use_server_setting(:ca_server)
lib/puppet/indirector/certificate_request/rest.rb:7: use_server_setting(:ca_server)
lib/puppet/indirector/certificate_revocation_list/rest.rb:7: use_server_setting(:ca_server)
lib/puppet/indirector/certificate_status/rest.rb:8: use_server_setting(:ca_server)
SETTING ':ca_ttl'
lib/puppet/defaults.rb:676: :ca_ttl => {
lib/puppet/ssl/certificate_factory.rb:29: cert.not_after = Time.now + (ttl || Puppet[:ca_ttl])
SETTING ':cacert'
lib/puppet/defaults.rb:591: :cacert => {
lib/puppet/indirector/certificate/ca.rb:8: store_ca_at :cacert
lib/puppet/ssl/certificate_authority.rb:360: store.add_file Puppet[:cacert]
SETTING ':cacrl'
lib/puppet/defaults.rb:614: :cacrl => {
lib/puppet/indirector/certificate_revocation_list/ca.rb:7: store_at :cacrl
SETTING ':cadir'
lib/puppet/defaults.rb:583: :cadir => {
SETTING ':cakey'
lib/puppet/defaults.rb:599: :cakey => {
lib/puppet/indirector/key/ca.rb:11: store_ca_at :cakey
lib/puppet/indirector/key/file.rb:8: store_ca_at :cakey
SETTING ':capass'
lib/puppet/defaults.rb:646: :capass => {
lib/puppet/ssl/certificate_authority.rb:184: Puppet.settings.write(:capass) { |f| f.print pass }
lib/puppet/ssl/certificate_authority.rb:221: FileTest.exist? Puppet[:capass]
lib/puppet/ssl/key.rb:29: @password_file = Puppet[:capass]
SETTING ':caprivatedir'
lib/puppet/defaults.rb:623: :caprivatedir => {
SETTING ':capub'
lib/puppet/defaults.rb:607: :capub => {
lib/puppet/indirector/key/file.rb:13: Puppet[:capub]
SETTING ':catalog_cache_terminus'
lib/puppet/application/agent.rb:13: :catalog_cache_terminus => :json,
lib/puppet/application/agent.rb:465: if Puppet[:catalog_cache_terminus]
lib/puppet/application/agent.rb:466: Puppet::Resource::Catalog.indirection.cache_class = Puppet[:catalog_cache_terminus]
lib/puppet/application/device.rb:14: :catalog_cache_terminus => :json,
lib/puppet/application/device.rb:240: if Puppet[:catalog_cache_terminus]
lib/puppet/application/device.rb:241: Puppet::Resource::Catalog.indirection.cache_class = Puppet[:catalog_cache_terminus].intern
lib/puppet/defaults.rb:234: :catalog_cache_terminus => {
lib/puppet/defaults.rb:313: Puppet.settings[:catalog_cache_terminus] = :queue
lib/puppet/defaults.rb:1465: Puppet.settings[:catalog_cache_terminus] = :store_configs
SETTING ':catalog_format'
lib/puppet/defaults.rb:1032: :catalog_format => {
SETTING ':catalog_terminus'
lib/puppet/application/agent.rb:12: :catalog_terminus => :rest,
lib/puppet/application/device.rb:13: :catalog_terminus => :rest,
lib/puppet/defaults.rb:228: :catalog_terminus => {
lib/puppet/resource/catalog.rb:18: indirects :catalog, :terminus_setting => :catalog_terminus
SETTING ':cert_inventory'
lib/puppet/defaults.rb:693: :cert_inventory => {
lib/puppet/ssl/inventory.rb:15: Puppet.settings.write(:cert_inventory, "a") do |f|
lib/puppet/ssl/inventory.rb:27: @path = Puppet[:cert_inventory]
lib/puppet/ssl/inventory.rb:35: Puppet.settings.write(:cert_inventory) do |f|
SETTING ':certdir'
lib/puppet/defaults.rb:435: :certdir => {
lib/puppet/indirector/certificate/file.rb:7: store_in :certdir
SETTING ':certdnsnames'
lib/puppet/defaults.rb:383: :certdnsnames => {
SETTING ':certificate_expire_warning'
lib/puppet/defaults.rb:569: :certificate_expire_warning => {
lib/puppet/ssl/certificate.rb:34: interval ||= Puppet[:certificate_expire_warning]
SETTING ':certificate_revocation'
lib/puppet/defaults.rb:563: :certificate_revocation => {
lib/puppet/face/certificate_revocation_list.rb:3:Puppet::Indirector::Face.define(:certificate_revocation_list, '0.0.1') do
lib/puppet/ssl/certificate_authority.rb:363: store.flags = OpenSSL::X509::V_FLAG_CRL_CHECK_ALL|OpenSSL::X509::V_FLAG_CRL_CHECK if Puppet.settings[:certificate_revocation]
lib/puppet/ssl/certificate_revocation_list.rb:11: indirects :certificate_revocation_list, :terminus_class => :file
lib/puppet/ssl/host.rb:262: @ssl_store.flags = OpenSSL::X509::V_FLAG_CRL_CHECK_ALL|OpenSSL::X509::V_FLAG_CRL_CHECK if Puppet.settings[:certificate_revocation]
SETTING ':certname'
lib/puppet/application/agent.rb:440: Puppet[:certname] = options[:fqdn]
lib/puppet/application/device.rb:167: certname = Puppet[:certname]
lib/puppet/application/device.rb:183: Puppet.settings.set_value(:certname, device.name, :cli)
lib/puppet/application/device.rb:204: Puppet.settings.set_value(:certname, certname, :cli)
lib/puppet/application/inspect.rb:115: unless catalog = Puppet::Resource::Catalog.indirection.find(Puppet[:certname])
lib/puppet/application/inspect.rb:116: raise "Could not find catalog for #{Puppet[:certname]}"
lib/puppet/defaults.rb:378: :certname => {
lib/puppet/defaults.rb:921: if !value.empty? and Puppet[:node_name_value] != Puppet[:certname]
lib/puppet/face/catalog.rb:64: catalog = Puppet::Face[:catalog, "0.0.1"].find(Puppet[:certname]) or raise "Could not find catalog for #{Puppet[:certname]}"
lib/puppet/face/catalog.rb:119: catalog = Puppet::Face[:catalog, '0.0.1'].find(Puppet[:certname])
lib/puppet/face/catalog.rb:126: Puppet.notice "Saved catalog for #{Puppet[:certname]} to yaml"
lib/puppet/face/facts.rb:74: facts = Puppet::Node::Facts.indirection.find(Puppet[:certname])
lib/puppet/face/facts.rb:77: Puppet.notice "Uploaded facts for '#{Puppet[:certname]}'"
lib/puppet/node/facts.rb:29: values["clientcert"] = Puppet.settings[:certname]
lib/puppet/ssl/certificate_authority.rb:166: @name = Puppet[:certname]
lib/puppet/ssl/certificate_authority.rb:263: allow_dns_alt_names = true if hostname == Puppet[:certname].downcase
lib/puppet/ssl/host.rb:160: name == Puppet[:certname].downcase
lib/puppet/ssl/host.rb:164: name == Puppet[:certname].downcase
lib/puppet/ssl/host.rb:216: puppet cert clean #{Puppet[:certname]}
lib/puppet/ssl/host.rb:238: @name = (name || Puppet[:certname]).downcase
SETTING ':classfile'
lib/puppet/application/apply.rb:191: file = Puppet[:classfile]
lib/puppet/defaults.rb:954: :classfile => {
lib/puppet/resource/catalog.rb:492: ::File.open(Puppet[:classfile], "w") do |f|
lib/puppet/resource/catalog.rb:496: Puppet.err "Could not create class file #{Puppet[:classfile]}: #{detail}"
SETTING ':client_datadir'
lib/puppet/defaults.rb:948: :client_datadir => {
lib/puppet/indirector/json.rb:45: base = Puppet.run_mode.master? ? Puppet[:server_datadir] : Puppet[:client_datadir]
SETTING ':clientbucketdir'
lib/puppet/defaults.rb:1104: :clientbucketdir => {
lib/puppet/type/filebucket.rb:63: defaultto { Puppet[:clientbucketdir] }
lib/puppet/type/filebucket.rb:80: new(:name => "puppet", :path => Puppet[:clientbucketdir])
SETTING ':clientyamldir'
lib/puppet/defaults.rb:942: :clientyamldir => {
lib/puppet/indirector/facts/yaml.rb:21: base = Puppet.run_mode.master? ? Puppet[:yamldir] : Puppet[:clientyamldir]
lib/puppet/indirector/yaml.rb:57: base = Puppet.run_mode.master? ? Puppet[:yamldir] : Puppet[:clientyamldir]
SETTING ':code'
lib/puppet/application/apply.rb:8: options[:code] = arg
lib/puppet/application/apply.rb:162: if options[:code] or command_line.args.length == 0
lib/puppet/application/apply.rb:163: Puppet[:code] = options[:code] || STDIN.read
lib/puppet/defaults.rb:749: :code => {
lib/puppet/face/parser.rb:37: Puppet[:code] = STDIN.read
lib/puppet/indirector/catalog/compiler.rb:12: attr_accessor :code
lib/puppet/node/environment.rb:210: if code = Puppet.settings.uninterpolated_value(:code, name.to_s) and code != ""
lib/puppet/parser/ast/hostclass.rb:27: @context[:code]
lib/puppet/parser/grammar.ra:618: ast_context(true).merge(:arguments => val[2], :code => val[4],
lib/puppet/parser/grammar.ra:637: :code => val[5], :line => val[0][:line]))
lib/puppet/parser/grammar.ra:650: ast_context(true).merge(:parent => val[2], :code => val[4],
lib/puppet/parser/parser.rb:2153: ast_context(true).merge(:arguments => val[2], :code => val[4],
lib/puppet/parser/parser.rb:2181: :code => val[5], :line => val[0][:line]))
lib/puppet/parser/parser.rb:2204: ast_context(true).merge(:parent => val[2], :code => val[4],
lib/puppet/parser/parser_support.rb:155: return Puppet::Parser::AST::Hostclass.new('', :code => main)
lib/puppet/resource/type.rb:30: attr_accessor :file, :line, :doc, :code, :ruby_code, :parent, :resource_type_collection
lib/puppet/resource/type.rb:149: [:code, :doc, :line, :file, :parent].each do |param|
lib/puppet/settings.rb:968: if param == :code
lib/puppet/util/rdoc/generators/template/puppet/puppet.rb:764:IF:codeurl
lib/puppet/util/rdoc/generators/template/puppet/puppet.rb:767:ENDIF:codeurl
lib/puppet/util/rdoc/generators/template/puppet/puppet.rb:777:IF:codeurl
lib/puppet/util/rdoc/generators/template/puppet/puppet.rb:779:ENDIF:codeurl
lib/puppet/util/windows/error.rb:8: attr_reader :code
SETTING ':color'
lib/puppet/defaults.rb:97: :color => {
lib/puppet/rb_tree_map.rb:199: attr_accessor :color, :key, :value, :left, :right
lib/puppet/rb_tree_map.rb:213: :color => @color,
lib/puppet/util/colors.rb:103: case Puppet[:color]
lib/puppet/util/log/destinations.rb:110: :emerg => { :name => 'Emergency', :color => :hred, :stream => $stderr },
lib/puppet/util/log/destinations.rb:111: :alert => { :name => 'Alert', :color => :hred, :stream => $stderr },
lib/puppet/util/log/destinations.rb:112: :crit => { :name => 'Critical', :color => :hred, :stream => $stderr },
lib/puppet/util/log/destinations.rb:113: :err => { :name => 'Error', :color => :hred, :stream => $stderr },
lib/puppet/util/log/destinations.rb:114: :warning => { :name => 'Warning', :color => :hred, :stream => $stderr },
lib/puppet/util/log/destinations.rb:116: :notice => { :name => 'Notice', :color => :reset, :stream => $stdout },
lib/puppet/util/log/destinations.rb:117: :info => { :name => 'Info', :color => :green, :stream => $stdout },
lib/puppet/util/log/destinations.rb:118: :debug => { :name => 'Debug', :color => :cyan, :stream => $stdout },
lib/puppet/util/log/destinations.rb:125: level[:stream].puts colorize(level[:color], "#{level[:name]}: #{str}")
SETTING ':config'
lib/hiera_puppet.rb:57: @hiera ||= Hiera.new(:config => hiera_config)
lib/puppet/configurer/downloader.rb:13: ::Timeout.timeout(Puppet[:configtimeout]) do
lib/puppet/configurer.rb:42: @compile_time ||= Puppet::Util::Storage.cache(:configuration)[:compile_time]
lib/puppet/defaults.rb:90: :configprint => {
lib/puppet/defaults.rb:331: :config_version => {
lib/puppet/defaults.rb:706: :config_file_name => {
lib/puppet/defaults.rb:711: :config => {
lib/puppet/defaults.rb:1110: :configtimeout => {
lib/puppet/face/config.rb:3:Puppet::Face.define(:config, '0.0.1') do
lib/puppet/face/config.rb:43: Puppet.settings[:configprint] = args.join(",")
lib/puppet/indirector/facts/facter.rb:35: ::Timeout::timeout(Puppet[:configtimeout]) do
lib/puppet/indirector/hiera.rb:32: @hiera ||= Hiera.new(:config => hiera_config)
lib/puppet/network/http/connection.rb:144: @connection.read_timeout = Puppet[:configtimeout]
lib/puppet/network/http/connection.rb:145: @connection.open_timeout = Puppet[:configtimeout]
lib/puppet/provider/package/apt.rb:49: if config = @resource[:configfiles]
lib/puppet/provider/package/dpkg.rb:74: if @resource[:configfiles] == :keep
lib/puppet/reference/configuration.rb:1:config = Puppet::Util::Reference.newreference(:configuration, :depth => 1, :doc => "A reference for all configuration parameters") do
lib/puppet/resource/catalog.rb:139: transaction.add_times :config_retrieval => self.retrieval_duration || 0
lib/puppet/resource/type_collection.rb:139: if environment[:config_version] == ""
lib/puppet/resource/type_collection.rb:144: @version = Puppet::Util::Execution.execute([environment[:config_version]]).strip
lib/puppet/settings.rb:362: val = value(:configprint)
lib/puppet/settings.rb:402: return print_config_options if value(:configprint) != ""
lib/puppet/settings.rb:408: (value(:configprint) != "" || value(:genconfig) || value(:genmanifest)) && true
lib/puppet/settings.rb:489: return self[:config]
lib/puppet/settings.rb:511: return self[:config_file_name] if self[:config_file_name]
lib/puppet/settings.rb:518: private :config_file_name
lib/puppet/settings.rb:956: #self.reparse unless [:config, :filetimeout].include?(param)
lib/puppet/settings.rb:1252: # is to simply attempt to evaluate the value of ":config". This will
lib/puppet/settings.rb:1253: # obviously be successful if they've passed an explicit value for :config,
lib/puppet/settings.rb:1261: return true if self[:config]
lib/puppet/settings.rb:1264: # explicitly specify either :config or :confdir... so we'll fall out to
lib/puppet/transaction/report.rb:13: attr_accessor :configuration_version, :host, :environment
lib/puppet/transaction.rb:16: attr_accessor :configurator
lib/puppet/type/package.rb:264: newparam(:configfiles) do
lib/puppet/type/zone.rb:75: # i.e we go linearly from :absent -> :configured -> :installed -> :running
lib/puppet/type/zone.rb:77: seqvalue :configured, :up => :configure, :down => :uninstall
SETTING ':config_file_name'
lib/puppet/defaults.rb:706: :config_file_name => {
lib/puppet/settings.rb:511: return self[:config_file_name] if self[:config_file_name]
lib/puppet/settings.rb:518: private :config_file_name
SETTING ':config_version'
lib/puppet/defaults.rb:331: :config_version => {
lib/puppet/resource/type_collection.rb:139: if environment[:config_version] == ""
lib/puppet/resource/type_collection.rb:144: @version = Puppet::Util::Execution.execute([environment[:config_version]]).strip
SETTING ':configprint'
lib/puppet/defaults.rb:90: :configprint => {
lib/puppet/face/config.rb:43: Puppet.settings[:configprint] = args.join(",")
lib/puppet/settings.rb:362: val = value(:configprint)
lib/puppet/settings.rb:402: return print_config_options if value(:configprint) != ""
lib/puppet/settings.rb:408: (value(:configprint) != "" || value(:genconfig) || value(:genmanifest)) && true
SETTING ':configtimeout'
lib/puppet/configurer/downloader.rb:13: ::Timeout.timeout(Puppet[:configtimeout]) do
lib/puppet/defaults.rb:1110: :configtimeout => {
lib/puppet/indirector/facts/facter.rb:35: ::Timeout::timeout(Puppet[:configtimeout]) do
lib/puppet/network/http/connection.rb:144: @connection.read_timeout = Puppet[:configtimeout]
lib/puppet/network/http/connection.rb:145: @connection.open_timeout = Puppet[:configtimeout]
SETTING ':couchdb_url'
lib/puppet/defaults.rb:1333: :couchdb_url => {
lib/puppet/indirector/couch.rb:6: def self.db; @db ||= CouchRest.database! Puppet[:couchdb_url] end
SETTING ':csrdir'
lib/puppet/defaults.rb:631: :csrdir => {
lib/puppet/indirector/certificate_request/ca.rb:7: store_in :csrdir
SETTING ':daemonize'
lib/puppet/application/agent.rb:414: @daemon.daemonize if Puppet[:daemonize]
lib/puppet/application/master.rb:190: @daemon.daemonize if Puppet[:daemonize]
lib/puppet/application/master.rb:214: unless Puppet[:daemonize] or options[:rack]
lib/puppet/application/queue.rb:156: daemon.daemonize if Puppet[:daemonize]
lib/puppet/daemon.rb:142: close_streams if Puppet[:daemonize]
lib/puppet/defaults.rb:190: :daemonize => {
lib/puppet/network/server.rb:103: close_streams if Puppet[:daemonize]
SETTING ':data_binding_terminus'
lib/puppet/data_binding.rb:9: indirects(:data_binding, :terminus_setting => :data_binding_terminus,
lib/puppet/defaults.rb:218: :data_binding_terminus => {
SETTING ':dbadapter'
lib/puppet/defaults.rb:1270: :dbadapter => {
lib/puppet/rails/database/schema.rb:28: if ['mysql','mysql2'].include? Puppet[:dbadapter]
lib/puppet/rails/database/schema.rb:30: elsif Puppet[:dbadapter] != "oracle_enhanced"
lib/puppet/rails/database/schema.rb:58: add_index :puppet_tags, :id, :integer => true if Puppet[:dbadapter] != "oracle_enhanced"
lib/puppet/rails.rb:44: adapter = Puppet[:dbadapter]
SETTING ':dbconnections'
lib/puppet/defaults.rb:1303: :dbconnections => {
lib/puppet/rails.rb:56: args[:pool] = Puppet[:dbconnections].to_i unless Puppet[:dbconnections].to_i <= 0
lib/puppet/rails.rb:66: args[:pool] = Puppet[:dbconnections].to_i unless Puppet[:dbconnections].to_i <= 0
SETTING ':dblocation'
lib/puppet/defaults.rb:1261: :dblocation => {
lib/puppet/rails.rb:50: args[:database] = Puppet[:dblocation]
SETTING ':dbmigrate'
lib/puppet/defaults.rb:1274: :dbmigrate => {
lib/puppet/rails.rb:85: migrate if Puppet[:dbmigrate]
SETTING ':dbname'
lib/puppet/defaults.rb:1279: :dbname => {
lib/puppet/rails.rb:57: args[:database] = Puppet[:dbname]
lib/puppet/rails.rb:63: args[:database] = Puppet[:dbname] unless Puppet[:dbname].to_s.empty?
SETTING ':dbpassword'
lib/puppet/defaults.rb:1298: :dbpassword => {
lib/puppet/rails.rb:55: args[:password] = Puppet[:dbpassword] unless Puppet[:dbpassword].to_s.empty?
lib/puppet/rails.rb:65: args[:password] = Puppet[:dbpassword] unless Puppet[:dbpassword].to_s.empty?
SETTING ':dbport'
lib/puppet/defaults.rb:1288: :dbport => {
lib/puppet/rails.rb:53: args[:port] = Puppet[:dbport] unless Puppet[:dbport].to_s.empty?
SETTING ':dbserver'
lib/puppet/defaults.rb:1283: :dbserver => {
lib/puppet/rails.rb:52: args[:host] = Puppet[:dbserver] unless Puppet[:dbserver].to_s.empty?
SETTING ':dbsocket'
lib/puppet/defaults.rb:1308: :dbsocket => {
lib/puppet/rails.rb:60: socket = Puppet[:dbsocket]
SETTING ':dbuser'
lib/puppet/defaults.rb:1293: :dbuser => {
lib/puppet/rails.rb:54: args[:username] = Puppet[:dbuser] unless Puppet[:dbuser].to_s.empty?
lib/puppet/rails.rb:64: args[:username] = Puppet[:dbuser] unless Puppet[:dbuser].to_s.empty?
SETTING ':default_file_terminus'
lib/puppet/application/apply.rb:138: :default_file_terminus => :file_server,
lib/puppet/defaults.rb:257: :default_file_terminus => {
lib/puppet/file_serving/terminus_selector.rb:22: Puppet[:default_file_terminus]
lib/puppet/type/file/content.rb:180: elsif Puppet[:default_file_terminus] == :file_server
SETTING ':deviceconfig'
lib/puppet/application/device.rb:173: Puppet.err "No device found in #{Puppet[:deviceconfig]}"
lib/puppet/defaults.rb:898: :deviceconfig => {
lib/puppet/util/network_device/config.rb:22: @file = Puppet[:deviceconfig]
SETTING ':devicedir'
lib/puppet/application/device.rb:181: Puppet.settings.set_value(:confdir, ::File.join(Puppet[:devicedir], device.name), :cli)
lib/puppet/application/device.rb:182: Puppet.settings.set_value(:vardir, ::File.join(Puppet[:devicedir], device.name), :cli)
lib/puppet/defaults.rb:892: :devicedir => {
SETTING ':diff'
lib/puppet/defaults.rb:171: :diff_args => {
lib/puppet/defaults.rb:176: :diff => {
lib/puppet/feature/base.rb:51:Puppet.features.add :diff, :libs => %w{diff/lcs diff/lcs/hunk}
lib/puppet/indirector/file_bucket_file/file.rb:24: if request.options[:diff_with]
lib/puppet/indirector/file_bucket_file/file.rb:26: file2_path = path_for(request.options[:bucket_path], request.options[:diff_with], 'contents')
lib/puppet/indirector/file_bucket_file/file.rb:27: raise "could not find diff_with #{request.options[:diff_with]}" unless ::File.exists?(file2_path)
lib/puppet/util/diff.rb:9: return '' unless diff_cmd = Puppet[:diff] and diff_cmd != ""
lib/puppet/util/diff.rb:12: if args = Puppet[:diff_args] and args != ""
lib/puppet/util/diff.rb:19: module_function :diff
SETTING ':diff_args'
lib/puppet/defaults.rb:171: :diff_args => {
lib/puppet/util/diff.rb:12: if args = Puppet[:diff_args] and args != ""
SETTING ':dns_alt_names'
lib/puppet/application/cert.rb:211: if Puppet.settings.set_by_cli?(:dns_alt_names)
lib/puppet/application/cert.rb:212: options[:dns_alt_names] = Puppet[:dns_alt_names]
lib/puppet/defaults.rb:414: :dns_alt_names => {
lib/puppet/face/ca.rb:136: description Puppet.settings.setting(:dns_alt_names).desc
lib/puppet/face/ca.rb:147: ca.generate(host, :dns_alt_names => options[:dns_alt_names])
lib/puppet/face/certificate.rb:58: description Puppet.settings.setting(:dns_alt_names).desc
lib/puppet/face/certificate.rb:67: # In supporting both, we'll use Puppet[:dns_alt_names] if specified on
lib/puppet/face/certificate.rb:68: # command line. We'll use options[:dns_alt_names] if specified on
lib/puppet/face/certificate.rb:72: global_setting_from_cli = Puppet.settings.set_by_cli?(:dns_alt_names) == true
lib/puppet/face/certificate.rb:73: raise ArgumentError, "Can't specify both --dns_alt_names and --dns-alt-names" if options[:dns_alt_names] and global_setting_from_cli
lib/puppet/face/certificate.rb:74: options[:dns_alt_names] = Puppet[:dns_alt_names] if global_setting_from_cli
lib/puppet/face/certificate.rb:80: host.generate_certificate_request(:dns_alt_names => options[:dns_alt_names])
lib/puppet/ssl/certificate_authority.rb:135: san = options[:dns_alt_names]
lib/puppet/ssl/certificate_authority.rb:138: host.generate_certificate_request(:dns_alt_names => san)
lib/puppet/ssl/certificate_request.rb:50: if options[:dns_alt_names] then
lib/puppet/ssl/certificate_request.rb:51: names = options[:dns_alt_names].split(/\s*,\s*/).map(&:strip) + [name]
lib/puppet/ssl/host.rb:174: if Puppet[:dns_alt_names] and Puppet[:dns_alt_names] != ''
lib/puppet/ssl/host.rb:175: options[:dns_alt_names] ||= Puppet[:dns_alt_names]
lib/puppet/ssl/host.rb:177: options[:dns_alt_names] = "puppet, #{fqdn}, puppet.#{domain}"
lib/puppet/ssl/host.rb:301: pson_hash[:dns_alt_names] = thing_to_use.subject_alt_names
SETTING ':document_all'
lib/puppet/application/doc.rb:181: Puppet.settings[:document_all] = options[:all] || false
lib/puppet/defaults.rb:1506: :document_all => {
lib/puppet/util/rdoc/parser.rb:277: scan_for_resource(cls, code) if Puppet.settings[:document_all]
lib/puppet/util/rdoc/parser.rb:302: scan_for_resource(n, code) if Puppet.settings[:document_all]
lib/puppet/util/rdoc.rb:74: if Puppet.settings[:document_all]
SETTING ':dynamicfacts'
lib/puppet/defaults.rb:1086: :dynamicfacts => {
SETTING ':environment'
lib/puppet/application/inspect.rb:120: @report.environment = Puppet[:environment]
lib/puppet/configurer/fact_handler.rb:15: facts = Puppet::Node::Facts.indirection.find(Puppet[:node_name_value], :environment => @environment)
lib/puppet/configurer.rb:17: attr_reader :compile_time, :environment
lib/puppet/configurer.rb:60: @environment = Puppet[:environment]
lib/puppet/configurer.rb:145: :environment => @environment, :ignore_cache => true)
lib/puppet/configurer.rb:200: Puppet::Transaction::Report.indirection.save(report, nil, :environment => @environment) if Puppet[:report]
lib/puppet/configurer.rb:231: result = Puppet::Resource::Catalog.indirection.find(Puppet[:node_name_value], fact_options.merge(:ignore_terminus => true, :environment => @environment))
lib/puppet/configurer.rb:243: result = Puppet::Resource::Catalog.indirection.find(Puppet[:node_name_value], fact_options.merge(:ignore_cache => true, :environment => @environment))
lib/puppet/defaults.rb:164: :environment => {
lib/puppet/face/catalog.rb:69: report.environment = Puppet[:environment]
lib/puppet/face/module/list.rb:62: environment = Puppet::Node::Environment.new(options[:environment])
lib/puppet/face/module/list.rb:71: environment = Puppet::Node::Environment.new(options[:environment])
lib/puppet/face/parser.rb:38: Puppet::Node::Environment.new(Puppet[:environment]).known_resource_types.clear
lib/puppet/face/parser.rb:46: Puppet::Node::Environment.new(Puppet[:environment]).known_resource_types.clear
lib/puppet/file_bucket/dipper.rb:17: environment = Puppet[:environment]
lib/puppet/indirector/catalog/compiler.rb:119: if node = find_node(name, :environment => request.environment)
lib/puppet/indirector/node/exec.rb:24: result[:environment] ||= request.environment.name
lib/puppet/indirector/node/exec.rb:40: [:parameters, :classes, :environment].each do |param|
lib/puppet/indirector/node/ldap.rb:39: info[:environment] ||= request.environment.to_s
lib/puppet/indirector/node/ldap.rb:63: info[:environment] ||= request.environment.to_s
lib/puppet/indirector/node/ldap.rb:95: result[:environment] = result[:parameters]["environment"] if result[:parameters]["environment"]
lib/puppet/indirector/node/ldap.rb:151: node.environment = information[:environment] if information[:environment]
lib/puppet/indirector/node/ldap.rb:185: information[:environment] ||= parent_info[:environment]
lib/puppet/indirector/request.rb:17: OPTION_ATTRIBUTES = [:ip, :node, :authenticated, :ignore_terminus, :ignore_cache, :instance, :environment]
lib/puppet/module.rb:32: attr_reader :name, :environment, :path
lib/puppet/module.rb:33: attr_writer :environment
lib/puppet/module_tool/applications/installer.rb:21: @environment = Puppet::Node::Environment.new(Puppet.settings[:environment])
lib/puppet/module_tool/applications/uninstaller.rb:13: @environment = Puppet::Node::Environment.new(options[:environment])
lib/puppet/module_tool/applications/upgrader.rb:9: @environment = Puppet::Node::Environment.new(Puppet.settings[:environment])
lib/puppet/module_tool.rb:115: options[:environment] ||= Puppet.settings[:environment]
lib/puppet/module_tool.rb:118: Puppet[:environment] = options[:environment]
lib/puppet/network/http/api/v1.rb:33: params[:environment] = Puppet::Node::Environment.new(environment)
lib/puppet/network/rights.rb:113: attr_accessor :methods, :environment, :authentication
lib/puppet/network/rights.rb:158: elsif @environment.size > 0 and not @environment.include?(args[:environment])
lib/puppet/node/environment.rb:33: name ||= Puppet.settings.value(:environment)
lib/puppet/node/environment.rb:47: Thread.current[:environment] || root
lib/puppet/node/environment.rb:51: Thread.current[:environment] = new(env)
lib/puppet/node/environment.rb:60: Thread.current[:environment] = nil
lib/puppet/node.rb:78: if env = options[:environment]
lib/puppet/node.rb:87: if @facts = Puppet::Node::Facts.indirection.find(name, :environment => environment)
lib/puppet/parser/files.rb:20: if mod = Puppet::Module.find(module_name, options[:environment])
lib/puppet/parser/parser_support.rb:19: attr_reader :version, :environment
lib/puppet/parser/resource.rb:59: def_delegator :scope, :environment
lib/puppet/parser/scope.rb:32: def_delegators :compiler, :catalog, :environment
lib/puppet/parser/type_loader.rb:79: modname, files = Puppet::Parser::Files.find_manifests(pat, :cwd => dir, :environment => environment)
lib/puppet/parser/type_loader.rb:111: def_delegator :environment, :known_resource_types
lib/puppet/provider/cron/crontab.rb:23: text_line :environment, :match => %r{^\s*\w+=}
lib/puppet/provider/cron/crontab.rb:62: if record[:environment] and record[:environment] != :absent and record[:environment] != [:absent]
lib/puppet/provider/cron/crontab.rb:63: record[:environment].each do |env|
lib/puppet/provider/cron/crontab.rb:148: when :environment
lib/puppet/provider/cron/crontab.rb:163: record[:environment] = :absent
lib/puppet/provider/cron/crontab.rb:167: record[:environment] = envs
lib/puppet/provider/exec.rb:34: if envlist = resource[:environment]
lib/puppet/rails/database/003_add_environment_to_host.rb:3: add_column :hosts, :environment, :string unless ActiveRecord::Base.connection.columns(:hosts).collect {|c| c.name}.include?("environment")
lib/puppet/rails/database/003_add_environment_to_host.rb:7: remove_column :hosts, :environment if ActiveRecord::Base.connection.columns(:hosts).collect {|c| c.name}.include?("environment")
lib/puppet/rails/database/schema.rb:63: t.column :environment, :text
lib/puppet/resource/catalog.rb:48: attr_accessor :environment
lib/puppet/resource/type_collection.rb:4: attr_reader :environment
lib/puppet/resource.rb:324: :environment => scope.environment.to_s,
lib/puppet/settings.rb:361: env = value(:environment)
lib/puppet/settings.rb:564: if @config[:environment]
lib/puppet/settings.rb:565: env = self.value(:environment).to_sym
lib/puppet/transaction/report.rb:13: attr_accessor :configuration_version, :host, :environment
lib/puppet/type/cron.rb:281: newproperty(:environment) do
lib/puppet/type/exec.rb:203: newparam(:environment) do
lib/puppet/type/file/content.rb:204: request = Puppet::Indirector::Request.new(:file_content, :find, source_or_content.full_path.sub(/^\//,''), nil, :environment => resource.catalog.environment)
lib/puppet/type/file/source.rb:104: unless tmp = Puppet::FileServing::Content.indirection.find(metadata.source, :environment => resource.catalog.environment)
lib/puppet/type/file/source.rb:157: if data = Puppet::FileServing::Metadata.indirection.find(source, :environment => resource.catalog.environment)
lib/puppet/type/file.rb:596: :environment => catalog.environment
lib/puppet/util/rdoc.rb:52: parser = Puppet::Parser::Parser.new(Puppet::Node::Environment.new(Puppet[:environment]))
SETTING ':evaltrace'
lib/puppet/defaults.rb:1347: :evaltrace => {
lib/puppet/transaction.rb:103: resource.info "Starting to evaluate the resource" if Puppet[:evaltrace] and @catalog.host_config?
lib/puppet/transaction.rb:105: resource.info "Evaluated in %0.2f seconds" % seconds if Puppet[:evaltrace] and @catalog.host_config?
SETTING ':external_nodes'
lib/puppet/defaults.rb:1363: :external_nodes => {
lib/puppet/indirector/node/exec.rb:10: command = Puppet[:external_nodes]
SETTING ':factpath'
lib/puppet/defaults.rb:1226: :factpath => {
lib/puppet/indirector/facts/facter.rb:21: dirs = module_fact_dirs + Puppet[:factpath].split(File::PATH_SEPARATOR)
SETTING ':facts_terminus'
lib/puppet/application/agent.rb:15: :facts_terminus => :facter,
lib/puppet/application/device.rb:16: :facts_terminus => :network_device,
lib/puppet/application/master.rb:129: super.merge :facts_terminus => 'yaml'
lib/puppet/defaults.rb:239: :facts_terminus => {
lib/puppet/node/facts.rb:24: indirects :facts, :terminus_setting => :facts_terminus, :extend => NodeExpirer
SETTING ':fileserverconfig'
lib/puppet/defaults.rb:859: :fileserverconfig => {
lib/puppet/file_serving/configuration.rb:91: config = Puppet[:fileserverconfig]
SETTING ':filetimeout'
lib/puppet/daemon.rb:165: reparse_interval = Puppet[:filetimeout]
lib/puppet/daemon.rb:185: reparse_interval = Puppet[:filetimeout]
lib/puppet/defaults.rb:281: :filetimeout => {
lib/puppet/node/environment.rb:105: cached_attr(:modulepath, Puppet[:filetimeout]) do
lib/puppet/node/environment.rb:114: cached_attr(:modules, Puppet[:filetimeout]) do
lib/puppet/settings.rb:956: #self.reparse unless [:config, :filetimeout].include?(param)
lib/puppet/util/loadedfile.rb:19: return true if Puppet[:filetimeout] < 0
lib/puppet/util/loadedfile.rb:45: if @stamp.nil? or (Time.now.to_i - @statted >= Puppet[:filetimeout])
SETTING ':freeze_main'
lib/puppet/defaults.rb:354: :freeze_main => {
lib/puppet/resource/type.rb:171: fail "Cannot have code outside of a class/node/define because 'freeze_main' is enabled" if name == "" and Puppet.settings[:freeze_main]
SETTING ':genconfig'
lib/puppet/defaults.rb:76: :genconfig => {
lib/puppet/settings.rb:403: return generate_config if value(:genconfig)
lib/puppet/settings.rb:408: (value(:configprint) != "" || value(:genconfig) || value(:genmanifest)) && true
lib/puppet/settings.rb:870: str += obj.to_config + "\n" unless obj.name == :genconfig
SETTING ':genmanifest'
lib/puppet/defaults.rb:83: :genmanifest => {
lib/puppet/settings.rb:404: generate_manifest if value(:genmanifest)
lib/puppet/settings.rb:408: (value(:configprint) != "" || value(:genconfig) || value(:genmanifest)) && true
lib/puppet.rb:98: if Puppet[:genmanifest]
SETTING ':graph'
lib/puppet/application/agent.rb:39: :graph => true,
lib/puppet/defaults.rb:1150: :graph => {
lib/puppet/defaults.rb:1157: :graphdir => {
lib/puppet/simple_graph.rb:230: if Puppet[:graph] then
lib/puppet/simple_graph.rb:245: Puppet.settings.use(:graphing)
lib/puppet/simple_graph.rb:258: filename = File.join(Puppet[:graphdir], "cycles.dot")
lib/puppet/simple_graph.rb:465: return unless Puppet[:graph]
lib/puppet/simple_graph.rb:467: Puppet.settings.use(:graphing)
lib/puppet/simple_graph.rb:469: file = File.join(Puppet[:graphdir], "#{name}.dot")
SETTING ':graphdir'
lib/puppet/defaults.rb:1157: :graphdir => {
lib/puppet/simple_graph.rb:258: filename = File.join(Puppet[:graphdir], "cycles.dot")
lib/puppet/simple_graph.rb:469: file = File.join(Puppet[:graphdir], "#{name}.dot")
SETTING ':group'
lib/puppet/configurer/downloader.rb:64: :group => Process.gid
lib/puppet/defaults.rb:39: :group => "service",
lib/puppet/defaults.rb:587: :group => "service",
lib/puppet/defaults.rb:595: :group => "service",
lib/puppet/defaults.rb:603: :group => "service",
lib/puppet/defaults.rb:611: :group => "service",
lib/puppet/defaults.rb:618: :group => "service",
lib/puppet/defaults.rb:627: :group => "service",
lib/puppet/defaults.rb:635: :group => "service",
lib/puppet/defaults.rb:642: :group => "service",
lib/puppet/defaults.rb:650: :group => "service",
lib/puppet/defaults.rb:658: :group => "service",
lib/puppet/defaults.rb:698: :group => "service",
lib/puppet/defaults.rb:735: :group => {
lib/puppet/defaults.rb:759: :group => "service",
lib/puppet/defaults.rb:768: :group => "service",
lib/puppet/defaults.rb:791: :group => "service",
lib/puppet/defaults.rb:830: :group => "service",
lib/puppet/defaults.rb:837: :group => "service",
lib/puppet/defaults.rb:851: :group => "service",
lib/puppet/defaults.rb:878: :group => "service",
lib/puppet/defaults.rb:1266: :group => "service",
lib/puppet/defaults.rb:1318: :group => "service",
lib/puppet/file_serving/metadata.rb:15: attr_reader :path, :owner, :group, :mode, :checksum_type, :checksum, :ftype, :destination
lib/puppet/file_serving/metadata.rb:17: PARAM_ORDER = [:mode, :ftype, :owner, :group]
lib/puppet/file_serving/metadata.rb:33: def_delegator :@stat, :gid, :group
lib/puppet/file_serving/metadata.rb:48: :group => 'S-1-0-0',
lib/puppet/indirector/catalog/static_compiler.rb:43: [:mode, :owner, :group].each do |param|
lib/puppet/provider/exec.rb:56: run_and_capture(command, resource[:user], resource[:group],
lib/puppet/provider/file/windows.rb:84: if [:owner, :group, :mode].any?{|p| resource[p]} and !supports_acl?(resource[:path])
lib/puppet/provider/group/aix.rb:9:Puppet::Type.type(:group).provide :aix, :parent => Puppet::Provider::AixObject do
lib/puppet/provider/group/directoryservice.rb:3:Puppet::Type.type(:group).provide :directoryservice, :parent => Puppet::Provider::NameService::DirectoryService do
lib/puppet/provider/group/groupadd.rb:3:Puppet::Type.type(:group).provide :groupadd, :parent => Puppet::Provider::NameService::ObjectAdd do
lib/puppet/provider/group/ldap.rb:3:Puppet::Type.type(:group).provide :ldap, :parent => Puppet::Provider::Ldap do
lib/puppet/provider/group/pw.rb:3:Puppet::Type.type(:group).provide :pw, :parent => Puppet::Provider::NameService::PW do
lib/puppet/provider/group/windows_adsi.rb:3:Puppet::Type.type(:group).provide :windows_adsi do
lib/puppet/provider/ldap.rb:69: @property_hash.delete(:groups)
lib/puppet/provider/ldap.rb:70: @ldap_properties.delete(:groups)
lib/puppet/provider/macauthorization/macauthorization.rb:275: :group, :k_of_n, :mechanisms, :rule, :session_owner,
lib/puppet/provider/mcx/mcxcontent.rb:24: :group => "Groups",
lib/puppet/provider/nameservice/directoryservice.rb:574: # :groups, :ensure, :gid]
lib/puppet/provider/nameservice/objectadd.rb:18: if @resource.allowdupe? && ((param == :uid) || (param == :gid and self.class.name == :groupadd))
lib/puppet/provider/nameservice.rb:85: if @resource_type.name == :group
lib/puppet/provider/nameservice.rb:116: id_generators = {:user => :uid, :group => :gid}
lib/puppet/provider/nameservice.rb:137: when :group; database = :group; method = :gid
lib/puppet/provider/user/aix.rb:45: #verify :groups, "Groups must be comma-separated" do |value|
lib/puppet/provider/user/aix.rb:67: {:aix_attr => :groups, :puppet_prop => :groups},
lib/puppet/provider/user/directoryservice.rb:136: attribute_hash[:groups] = groups_array.uniq.sort.join(',')
lib/puppet/provider/user/directoryservice.rb:307: # For the :password and :groups properties, call the setter methods
lib/puppet/provider/user/directoryservice.rb:318: when :groups
lib/puppet/provider/user/hpux.rb:11: options :groups, :flag => "-G"
lib/puppet/provider/user/hpux.rb:18: verify :groups, "Groups must be comma-separated" do |value|
lib/puppet/provider/user/ldap.rb:59: unless @property_hash[:groups]
lib/puppet/provider/user/ldap.rb:61: return @property_hash[:groups] = :absent
lib/puppet/provider/user/ldap.rb:64: return @property_hash[:groups] = result.collect { |r| r[:name] }.sort.join(",")
lib/puppet/provider/user/ldap.rb:66: @property_hash[:groups]
lib/puppet/provider/user/ldap.rb:113: Puppet::Type.type(:group).provider(:ldap).name2id(group)
lib/puppet/provider/user/ldap.rb:119: Puppet::Type.type(:group).provider(:ldap).manager
lib/puppet/provider/user/pw.rb:14: options :groups, :flag => "-G"
lib/puppet/provider/user/pw.rb:21: verify :groups, "Groups must be comma-separated" do |value|
lib/puppet/provider/user/user_role_add.rb:13: options :groups, :flag => "-G"
lib/puppet/provider/user/user_role_add.rb:24: verify :groups, "Groups must be comma-separated" do |value|
lib/puppet/provider/user/useradd.rb:12: options :groups, :flag => "-G"
lib/puppet/provider/user/useradd.rb:20: verify :groups, "Groups must be comma-separated" do |value|
lib/puppet/provider/user/windows_adsi.rb:28: [:comment, :home, :groups].each do |prop|
lib/puppet/reports/rrdgraph.rb:99: config.define_settings(:reports, :hostdir => {:type => :directory, :default => hostdir, :owner => 'service', :mode => 0755, :group => 'service', :desc => "eh"})
lib/puppet/settings/file_setting.rb:20: raise SettingError, "Internal error: The :group setting for #{identifying_fields} must be 'service', not '#{value}'"
lib/puppet/settings/file_setting.rb:27: @settings[:group]
lib/puppet/settings/file_setting.rb:94: resource[:group] = self.group if self.group
lib/puppet/settings.rb:414: return [:owner, :group, :mode].inject({}) do |meta, p|
lib/puppet/settings.rb:796: # [:group] => optional group name/gid for :file and :directory settings
lib/puppet/settings.rb:1076: resource[:gid] = self[:group] if self[:group]
lib/puppet/settings.rb:1079: if group = setting.group and ! %w{root wheel}.include?(group) and catalog.resource(:group, group).nil?
lib/puppet/settings.rb:1080: catalog.add_resource Puppet::Resource.new(:group, group, :parameters => {:ensure => :present})
lib/puppet/settings.rb:1110: raise ArgumentError, "Invalid file option '#{param}'" unless [:owner, :mode, :group].include?(param)
lib/puppet/type/exec.rb:169: newparam(:group) do
lib/puppet/type/file/group.rb:5: Puppet::Type.type(:file).newproperty(:group) do
lib/puppet/type/file/source.rb:116: [:owner, :mode, :group, :checksum].each do |metadata_method|
lib/puppet/type/file/source.rb:123: next if [:owner, :group].include?(metadata_method) and !local?
lib/puppet/type/file.rb:265: {:user => :owner, :group => :group}.each do |type, property|
lib/puppet/type/file.rb:781: next unless [:mode, :owner, :group, :seluser, :selrole, :seltype, :selrange].include?(thing.name)
lib/puppet/type/group.rb:6: newtype(:group) do
lib/puppet/type/macauthorization.rb:97: newproperty(:group) do
lib/puppet/type/mcx.rb:51: newvalues(:user, :group, :computer, :computerlist)
lib/puppet/type/mcx.rb:91: autorequire(:group) do
lib/puppet/type/mcx.rb:92: setup_autorequire(:group)
lib/puppet/type/user.rb:247: newproperty(:groups, :parent => Puppet::Property::List) do
lib/puppet/type/user.rb:328: autorequire(:group) do
lib/puppet/type/user.rb:342: if resource = catalog.resources.find { |r| r.is_a?(Puppet::Type.type(:group)) and r.should(:gid) == group }
lib/puppet/type/user.rb:351: if obj = @parameters[:groups] and groups = obj.should
lib/puppet/util/log/destinations.rb:81: FileUtils.chown(Puppet[:user], Puppet[:group], path) unless Puppet::Util::Platform.windows?
lib/puppet/util/posix.rb:66: when :group; Etc.send(:endgrent)
lib/puppet/util/posix.rb:74: when :gr, :group; return :gid
lib/puppet/util/posix.rb:84: when :gr, :group; return :getgrgid
lib/puppet/util/posix.rb:94: when :gr, :group; return :getgrnam
lib/puppet/util/posix.rb:109: return nil unless name = get_posix_field(:group, :name, group)
lib/puppet/util/posix.rb:110: gid = get_posix_field(:group, :gid, name)
lib/puppet/util/posix.rb:113: return nil unless gid = get_posix_field(:group, :gid, group)
lib/puppet/util/posix.rb:114: name = get_posix_field(:group, :name, gid)
lib/puppet/util/posix.rb:118: return search_posix_field(:group, :gid, group)
lib/puppet/util/suidmanager.rb:12: to_delegate_to_process = [ :euid=, :euid, :egid=, :egid, :uid=, :uid, :gid=, :gid, :groups ]
lib/puppet/util/suidmanager.rb:54: module_function :groups=
lib/puppet/util/suidmanager.rb:147: map = {:gid => :group, :uid => :user}
lib/puppet/util.rb:82: if group = Puppet[:group]
SETTING ':hiera_config'
lib/hiera_puppet.rb:74: if Puppet.settings[:hiera_config].is_a?(String)
lib/hiera_puppet.rb:75: expanded_config_file = File.expand_path(Puppet.settings[:hiera_config])
lib/puppet/defaults.rb:223: :hiera_config => {
lib/puppet/indirector/hiera.rb:18: hiera_config = Puppet.settings[:hiera_config]
lib/puppet/test/test_helper.rb:141: :hiera_config => "/dev/null",
SETTING ':hostcert'
lib/puppet/defaults.rb:489: :hostcert => {
lib/puppet/network/authentication.rb:17: certs << Puppet::SSL::Host.localhost.certificate if FileTest.exist?(Puppet[:hostcert])
lib/puppet/network/http/connection.rb:154: if FileTest.exist?(Puppet[:hostcert]) and FileTest.exist?(ssl_configuration.ca_auth_file)
lib/puppet/ssl/host.rb:218: rm -f #{Puppet[:hostcert]}
SETTING ':hostcrl'
lib/puppet/defaults.rb:555: :hostcrl => {
lib/puppet/indirector/certificate_revocation_list/file.rb:7: store_at :hostcrl
SETTING ':hostcsr'
lib/puppet/defaults.rb:482: :hostcsr => {
SETTING ':hostprivkey'
lib/puppet/defaults.rb:496: :hostprivkey => {
SETTING ':hostpubkey'
lib/puppet/defaults.rb:503: :hostpubkey => {
SETTING ':http_compression'
lib/puppet/defaults.rb:1162: :http_compression => {
lib/puppet/network/http/compression.rb:49: headers['accept-encoding'] = 'gzip; q=1.0, deflate; q=1.0; identity' if Puppet.settings[:http_compression]
SETTING ':http_proxy_host'
lib/puppet/defaults.rb:272: :http_proxy_host => {
lib/puppet/forge/repository.rb:59: if Puppet.settings[:http_proxy_host] == 'none'
lib/puppet/forge/repository.rb:63: return Puppet.settings[:http_proxy_host]
lib/puppet/network/http/connection.rb:130: if Puppet[:http_proxy_host] == "none"
lib/puppet/network/http/connection.rb:133: args << Puppet[:http_proxy_host] << Puppet[:http_proxy_port]
SETTING ':http_proxy_port'
lib/puppet/defaults.rb:277: :http_proxy_port => {
lib/puppet/forge/repository.rb:73: return Puppet.settings[:http_proxy_port]
lib/puppet/network/http/connection.rb:133: args << Puppet[:http_proxy_host] << Puppet[:http_proxy_port]
SETTING ':httplog'
lib/puppet/defaults.rb:265: :httplog => {
lib/puppet/network/http/webrick.rb:64: file = Puppet[:httplog]
SETTING ':ignorecache'
lib/puppet/defaults.rb:1078: :ignorecache => {
SETTING ':ignoreimport'
lib/puppet/application/agent.rb:454: Puppet[:ignoreimport] = true
lib/puppet/application/device.rb:231: Puppet[:ignoreimport] = true
lib/puppet/defaults.rb:151: :ignoreimport => {
lib/puppet/node/environment.rb:208: return empty_parse_result if Puppet.settings[:ignoreimport]
lib/puppet/parser/type_loader.rb:66: return if Puppet[:ignoreimport]
lib/puppet/util/rdoc.rb:13: Puppet[:ignoreimport] = true
lib/puppet/util/rdoc.rb:50: Puppet[:ignoreimport] = true
SETTING ':ignoreschedules'
lib/puppet/application/kick.rb:259: :ignoreschedules => options[:ignoreschedules]
lib/puppet/application/kick.rb:299: options[:ignoreschedules] = false
lib/puppet/configurer.rb:131: # which accepts :tags and :ignoreschedules.
lib/puppet/defaults.rb:990: :ignoreschedules => {
lib/puppet/resource/catalog.rb:125: # :ignoreschedules - tell the transaction to ignore schedules
lib/puppet/resource/catalog.rb:136: transaction.ignoreschedules = true if options[:ignoreschedules]
lib/puppet/run.rb:28: valid_options = [:tags, :ignoreschedules, :pluginsync]
lib/puppet/run.rb:42: msg += " ignoring schedules" if options[:ignoreschedules]
lib/puppet/transaction/resource_harness.rb:157: return true if Puppet[:ignoreschedules]
lib/puppet/transaction.rb:15: attr_accessor :component, :catalog, :ignoreschedules, :for_network_device
SETTING ':inventory_port'
lib/puppet/defaults.rb:1129: :inventory_port => {
lib/puppet/indirector/facts/inventory_service.rb:7: use_port_setting(:inventory_port)
lib/puppet/indirector/facts/rest.rb:7: use_port_setting(:inventory_port)
SETTING ':inventory_server'
lib/puppet/defaults.rb:1125: :inventory_server => {
lib/puppet/indirector/facts/inventory_service.rb:6: use_server_setting(:inventory_server)
lib/puppet/indirector/facts/rest.rb:6: use_server_setting(:inventory_server)
SETTING ':inventory_terminus'
lib/puppet/defaults.rb:252: :inventory_terminus => {
SETTING ':keylength'
lib/puppet/defaults.rb:689: :keylength => {
lib/puppet/ssl/key.rb:22: @content = OpenSSL::PKey::RSA.new(Puppet[:keylength].to_i)
lib/puppet/test/test_helper.rb:170: Puppet[:keylength] = 512
SETTING ':lastrunfile'
lib/puppet/configurer.rb:206: mode = Puppet.settings.setting(:lastrunfile).mode
lib/puppet/configurer.rb:207: Puppet::Util.replace_file(Puppet[:lastrunfile], mode) do |fh|
lib/puppet/defaults.rb:1138: :lastrunfile => {
SETTING ':lastrunreport'
lib/puppet/defaults.rb:1144: :lastrunreport => {
lib/puppet/indirector/report/yaml.rb:9: Puppet[:lastrunreport]
SETTING ':ldapattrs'
lib/puppet/defaults.rb:1416: :ldapattrs => {
lib/puppet/indirector/node/ldap.rb:119: ldapattrs = Puppet[:ldapattrs]
SETTING ':ldapbase'
lib/puppet/defaults.rb:1436: :ldapbase => {
lib/puppet/external/nagios/base.rb:12: attr_accessor :ldapbase
lib/puppet/indirector/ldap.rb:22: Puppet[:ldapbase]
lib/puppet/util/ldap/manager.rb:23: [location, Puppet[:ldapbase]].join(",")
SETTING ':ldapclassattrs'
lib/puppet/defaults.rb:1405: :ldapclassattrs => {
lib/puppet/indirector/node/ldap.rb:13: x = Puppet[:ldapclassattrs].split(/\s*,\s*/)
SETTING ':ldapparentattr'
lib/puppet/defaults.rb:1423: :ldapparentattr => {
lib/puppet/indirector/node/ldap.rb:70: if pattr = Puppet[:ldapparentattr] and ! pattr.empty?
SETTING ':ldappassword'
lib/puppet/defaults.rb:1432: :ldappassword => {
lib/puppet/util/ldap/connection.rb:25: if pass = Puppet.settings[:ldappassword] and pass != ""
lib/puppet/util/ldap/manager.rb:61: if password = Puppet[:ldappassword] and password != ""
SETTING ':ldapport'
lib/puppet/defaults.rb:1396: :ldapport => {
lib/puppet/util/ldap/connection.rb:30: new(Puppet[:ldapserver], Puppet[:ldapport], options)
lib/puppet/util/ldap/manager.rb:64: @connection = Puppet::Util::Ldap::Connection.new(Puppet[:ldapserver], Puppet[:ldapport], options)
SETTING ':ldapserver'
lib/puppet/defaults.rb:1392: :ldapserver => {
lib/puppet/util/ldap/connection.rb:30: new(Puppet[:ldapserver], Puppet[:ldapport], options)
lib/puppet/util/ldap/manager.rb:64: @connection = Puppet::Util::Ldap::Connection.new(Puppet[:ldapserver], Puppet[:ldapport], options)
SETTING ':ldapssl'
lib/puppet/defaults.rb:1378: :ldapssl => {
lib/puppet/util/ldap/connection.rb:15: elsif Puppet[:ldapssl]
lib/puppet/util/ldap/manager.rb:52: elsif Puppet[:ldapssl]
SETTING ':ldapstackedattrs'
lib/puppet/defaults.rb:1410: :ldapstackedattrs => {
lib/puppet/indirector/node/ldap.rb:80: Puppet[:ldapstackedattrs].split(/\s*,\s*/)
SETTING ':ldapstring'
lib/puppet/defaults.rb:1401: :ldapstring => {
lib/puppet/indirector/node/ldap.rb:135: filter = Puppet[:ldapstring]
SETTING ':ldaptls'
lib/puppet/defaults.rb:1385: :ldaptls => {
lib/puppet/util/ldap/connection.rb:13: ssl = if Puppet[:ldaptls]
lib/puppet/util/ldap/manager.rb:50: if Puppet[:ldaptls]
SETTING ':ldapuser'
lib/puppet/defaults.rb:1427: :ldapuser => {
lib/puppet/provider/group/ldap.rb:15: confine :feature => :ldap, :false => (Puppet[:ldapuser] == "")
lib/puppet/provider/user/ldap.rb:15: confine :feature => :ldap, :false => (Puppet[:ldapuser] == "")
lib/puppet/util/ldap/connection.rb:23: if user = Puppet.settings[:ldapuser] and user != ""
lib/puppet/util/ldap/manager.rb:58: if user = Puppet[:ldapuser] and user != ""
SETTING ':libdir'
lib/puppet/defaults.rb:136: :libdir => {
lib/puppet/provider/augeas/augeas.rb:295: if File.exists?("#{Puppet[:libdir]}/augeas/lenses")
lib/puppet/provider/augeas/augeas.rb:296: load_path << "#{Puppet[:libdir]}/augeas/lenses"
lib/puppet/util/autoload.rb:162: Puppet[:libdir].split(File::PATH_SEPARATOR)
SETTING ':listen'
lib/puppet/application/agent.rb:421: if Puppet[:listen]
lib/puppet/defaults.rb:1013: :listen => {
lib/puppet/util/instrumentation/data.rb:12: attr_reader :listener
lib/puppet/util/instrumentation/listener.rb:12: attr_reader :pattern, :listener
lib/puppet/util/instrumentation.rb:17: instance_load :listener, 'puppet/util/instrumentation/listeners'
lib/puppet/util/instrumentation.rb:20: attr_accessor :listeners, :listeners_of
lib/puppet/util/instrumentation.rb:100: listener = genclass(name, :hash => instance_hash(:listener), :block => block)
lib/puppet/util/instrumentation.rb:133: instance_loader(:listener).loadall
SETTING ':localcacert'
lib/puppet/defaults.rb:510: :localcacert => {
lib/puppet/indirector/certificate/file.rb:8: store_ca_at :localcacert
lib/puppet/network/http/connection.rb:186: Puppet[:localcacert],
lib/puppet/network/http/webrick.rb:112: Puppet[:localcacert],
lib/puppet/ssl/host.rb:258: @ssl_store.add_file(Puppet[:localcacert])
SETTING ':localconfig'
lib/puppet/defaults.rb:926: :localconfig => {
SETTING ':logdir'
lib/puppet/defaults.rb:34: :logdir => {
lib/puppet/settings.rb:26: REQUIRED_APP_SETTINGS = [:logdir, :confdir, :vardir]
lib/puppet/settings.rb:37: :logdir => run_mode.log_dir,
lib/puppet/test/test_helper.rb:137: :logdir => "/dev/null",
SETTING ':manage_internal_file_permissions'
lib/puppet/defaults.rb:109: :manage_internal_file_permissions => {
lib/puppet/settings/file_setting.rb:75: if Puppet[:manage_internal_file_permissions]
SETTING ':manifest'
lib/puppet/application/apply.rb:168: Puppet[:manifest] = manifest
lib/puppet/application/doc.rb:6: attr_accessor :unknown_args, :manifest
lib/puppet/application/doc.rb:176: files << ::File.dirname(env[:manifest])
lib/puppet/defaults.rb:739: :manifestdir => {
lib/puppet/defaults.rb:744: :manifest => {
lib/puppet/face/parser.rb:40: files << Puppet[:manifest]
lib/puppet/face/parser.rb:41: Puppet.notice "No manifest specified. Validating the default manifest #{Puppet[:manifest]}"
lib/puppet/face/parser.rb:45: Puppet[:manifest] = file
lib/puppet/node/environment.rb:213: file = Puppet.settings.value(:manifest, name.to_s)
lib/puppet/provider/service/daemontools.rb:128: if resource[:manifest]
lib/puppet/provider/service/daemontools.rb:130: command = [ resource[:manifest], resource[:name] ]
lib/puppet/provider/service/smf.rb:23: if resource[:manifest]
lib/puppet/provider/service/smf.rb:26: Puppet.notice "Importing #{@resource[:manifest]} for #{@resource[:name]}"
lib/puppet/provider/service/smf.rb:27: svccfg :import, resource[:manifest]
lib/puppet/type/service.rb:207: newparam(:manifest) do
lib/puppet/util/rdoc/parser.rb:98: if fullpath =~ /(.*)\/([^\/]+)\/(?:manifests|plugins|lib)\/.+\.(pp|rb)$/
SETTING ':manifestdir'
lib/puppet/defaults.rb:739: :manifestdir => {
SETTING ':masterhttplog'
lib/puppet/defaults.rb:764: :masterhttplog => {
lib/puppet/network/http/webrick.rb:62: file = Puppet[:masterhttplog]
SETTING ':masterlog'
lib/puppet/defaults.rb:755: :masterlog => {
SETTING ':masterport'
lib/puppet/application/master.rb:189: @daemon.server = Puppet::Network::Server.new(Puppet[:bindaddress], Puppet[:masterport])
lib/puppet/defaults.rb:773: :masterport => {
lib/puppet/file_bucket/dipper.rb:16: port = hash[:Port] || Puppet[:masterport]
lib/puppet/indirector/request.rb:194: def do_request(srv_service=:puppet, default_server=Puppet.settings[:server], default_port=Puppet.settings[:masterport], &block)
lib/puppet/indirector/request.rb:254: @port = Puppet.settings[:masterport].to_i
lib/puppet/indirector/rest.rb:41: Puppet.settings[port_setting || :masterport].to_i
lib/puppet/type/file/source.rb:187: (uri and uri.port) or Puppet.settings[:masterport]
lib/puppet/type/filebucket.rb:53: Defaults to the normal Puppet port, %s." % Puppet[:masterport]
lib/puppet/type/filebucket.rb:55: defaultto { Puppet[:masterport] }
SETTING ':maximum_uid'
lib/puppet/defaults.rb:202: :maximum_uid => {
lib/puppet/provider/file/posix.rb:13: return nil if id > Puppet[:maximum_uid].to_i
lib/puppet/provider/file/posix.rb:35: return nil if id > Puppet[:maximum_uid].to_i
lib/puppet/provider/file/posix.rb:64: if currentvalue > Puppet[:maximum_uid].to_i
lib/puppet/provider/file/posix.rb:95: if currentvalue > Puppet[:maximum_uid].to_i
lib/puppet/util/posix.rb:23: if id > Puppet[:maximum_uid].to_i
lib/puppet/util/posix.rb:48: if id > Puppet[:maximum_uid].to_i
SETTING ':mkusers'
lib/puppet/defaults.rb:104: :mkusers => {
lib/puppet/settings/file_setting.rb:45: @settings[:mkusers] or @settings.service_user_available?
lib/puppet/settings.rb:1068: return unless self[:mkusers]
SETTING ':module_working_dir'
lib/puppet/defaults.rb:367: :module_working_dir => {
lib/puppet/forge/cache.rb:47: Pathname(Puppet.settings[:module_working_dir]) + 'cache'
lib/puppet/forge.rb:87: # into the `Puppet.settings[:module_working_dir]`. Do not unpack it, just
lib/puppet/module_tool/applications/installer.rb:83: # release package in the `Puppet.settings[:module_working_dir]`.
lib/puppet/module_tool/skeleton.rb:26: Pathname(Puppet.settings[:module_working_dir]) + 'skeleton'
SETTING ':modulepath'
lib/puppet/defaults.rb:806: :modulepath => {
lib/puppet/face/module/install.rb:14: #{Puppet.settings[:modulepath].split(File::PATH_SEPARATOR).first}.
lib/puppet/face/module/list.rb:61: Puppet[:modulepath] = options[:modulepath] if options[:modulepath]
lib/puppet/face/module/list.rb:70: Puppet[:modulepath] = options[:modulepath] if options[:modulepath]
lib/puppet/indirector/facts/facter.rb:16: module_fact_dirs = Puppet[:modulepath].split(File::PATH_SEPARATOR).collect do |d|
lib/puppet/module_tool.rb:114: options[:modulepath] ||= Puppet.settings[:modulepath]
lib/puppet/module_tool.rb:116: options[:modulepath] = "#{options[:target_dir]}#{sep}#{options[:modulepath]}" if prepend_target_dir
lib/puppet/module_tool.rb:117: Puppet[:modulepath] = options[:modulepath]
lib/puppet/module_tool.rb:120: options[:target_dir] = options[:modulepath].split(sep).first
lib/puppet/node/environment.rb:105: cached_attr(:modulepath, Puppet[:filetimeout]) do
lib/puppet/node/environment.rb:106: dirs = self[:modulepath].split(File::PATH_SEPARATOR)
SETTING ':node_name'
lib/puppet/application/apply.rb:171: unless Puppet[:node_name_fact].empty?
lib/puppet/application/apply.rb:173: unless facts = Puppet::Node::Facts.indirection.find(Puppet[:node_name_value])
lib/puppet/application/apply.rb:174: raise "Could not find facts for #{Puppet[:node_name_value]}"
lib/puppet/application/apply.rb:177: Puppet[:node_name_value] = facts.values[Puppet[:node_name_fact]]
lib/puppet/application/apply.rb:178: facts.name = Puppet[:node_name_value]
lib/puppet/application/apply.rb:182: unless node = Puppet::Node.indirection.find(Puppet[:node_name_value])
lib/puppet/application/apply.rb:183: raise "Could not find node #{Puppet[:node_name_value]}"
lib/puppet/configurer/fact_handler.rb:15: facts = Puppet::Node::Facts.indirection.find(Puppet[:node_name_value], :environment => @environment)
lib/puppet/configurer/fact_handler.rb:16: unless Puppet[:node_name_fact].empty?
lib/puppet/configurer/fact_handler.rb:17: Puppet[:node_name_value] = facts.values[Puppet[:node_name_fact]]
lib/puppet/configurer/fact_handler.rb:18: facts.name = Puppet[:node_name_value]
lib/puppet/configurer.rb:98: # facts_for_uploading may set Puppet[:node_name_value] as a side effect
lib/puppet/configurer.rb:105: options[:report].host = Puppet[:node_name_value]
lib/puppet/configurer.rb:139: unless Puppet[:node_name_fact].empty?
lib/puppet/configurer.rb:144: if node = Puppet::Node.indirection.find(Puppet[:node_name_value],
lib/puppet/configurer.rb:231: result = Puppet::Resource::Catalog.indirection.find(Puppet[:node_name_value], fact_options.merge(:ignore_terminus => true, :environment => @environment))
lib/puppet/configurer.rb:243: result = Puppet::Resource::Catalog.indirection.find(Puppet[:node_name_value], fact_options.merge(:ignore_cache => true, :environment => @environment))
lib/puppet/defaults.rb:777: :node_name => {
lib/puppet/defaults.rb:905: :node_name_value => {
lib/puppet/defaults.rb:913: :node_name_fact => {
lib/puppet/defaults.rb:921: if !value.empty? and Puppet[:node_name_value] != Puppet[:certname]
lib/puppet/node.rb:131: if Puppet[:node_name] == 'cert'
lib/puppet/transaction/report.rb:77: @host = Puppet[:node_name_value]
SETTING ':node_name_fact'
lib/puppet/application/apply.rb:171: unless Puppet[:node_name_fact].empty?
lib/puppet/application/apply.rb:177: Puppet[:node_name_value] = facts.values[Puppet[:node_name_fact]]
lib/puppet/configurer/fact_handler.rb:16: unless Puppet[:node_name_fact].empty?
lib/puppet/configurer/fact_handler.rb:17: Puppet[:node_name_value] = facts.values[Puppet[:node_name_fact]]
lib/puppet/configurer.rb:139: unless Puppet[:node_name_fact].empty?
lib/puppet/defaults.rb:913: :node_name_fact => {
SETTING ':node_name_value'
lib/puppet/application/apply.rb:173: unless facts = Puppet::Node::Facts.indirection.find(Puppet[:node_name_value])
lib/puppet/application/apply.rb:174: raise "Could not find facts for #{Puppet[:node_name_value]}"
lib/puppet/application/apply.rb:177: Puppet[:node_name_value] = facts.values[Puppet[:node_name_fact]]
lib/puppet/application/apply.rb:178: facts.name = Puppet[:node_name_value]
lib/puppet/application/apply.rb:182: unless node = Puppet::Node.indirection.find(Puppet[:node_name_value])
lib/puppet/application/apply.rb:183: raise "Could not find node #{Puppet[:node_name_value]}"
lib/puppet/configurer/fact_handler.rb:15: facts = Puppet::Node::Facts.indirection.find(Puppet[:node_name_value], :environment => @environment)
lib/puppet/configurer/fact_handler.rb:17: Puppet[:node_name_value] = facts.values[Puppet[:node_name_fact]]
lib/puppet/configurer/fact_handler.rb:18: facts.name = Puppet[:node_name_value]
lib/puppet/configurer.rb:98: # facts_for_uploading may set Puppet[:node_name_value] as a side effect
lib/puppet/configurer.rb:105: options[:report].host = Puppet[:node_name_value]
lib/puppet/configurer.rb:144: if node = Puppet::Node.indirection.find(Puppet[:node_name_value],
lib/puppet/configurer.rb:231: result = Puppet::Resource::Catalog.indirection.find(Puppet[:node_name_value], fact_options.merge(:ignore_terminus => true, :environment => @environment))
lib/puppet/configurer.rb:243: result = Puppet::Resource::Catalog.indirection.find(Puppet[:node_name_value], fact_options.merge(:ignore_cache => true, :environment => @environment))
lib/puppet/defaults.rb:905: :node_name_value => {
lib/puppet/defaults.rb:921: if !value.empty? and Puppet[:node_name_value] != Puppet[:certname]
lib/puppet/transaction/report.rb:77: @host = Puppet[:node_name_value]
SETTING ':node_terminus'
lib/puppet/application/agent.rb:14: :node_terminus => :rest,
lib/puppet/application/device.rb:15: :node_terminus => :rest,
lib/puppet/application/kick.rb:314: if Puppet[:node_terminus] == :ldap and (options[:all] or @classes)
lib/puppet/defaults.rb:213: :node_terminus => {
lib/puppet/node.rb:16: indirects :node, :terminus_setting => :node_terminus, :doc => "Where to find node information.
SETTING ':noop'
lib/puppet/configurer/downloader.rb:59: :noop => false
lib/puppet/defaults.rb:1000: :noop => {
lib/puppet/face/module/upgrade.rb:67: elsif return_value[:result] == :noop
lib/puppet/module_tool/applications/upgrader.rb:89: results[:result] = :noop
lib/puppet/parameter.rb:180: tmp = @noop || self.resource.noop || Puppet[:noop] || false
lib/puppet/property.rb:15: attr_writer :noop
lib/puppet/property.rb:265: if @resource.respond_to?(:noop?)
lib/puppet/property.rb:271: Puppet[:noop]
lib/puppet/transaction/event_manager.rb:112: queue_events(resource, [resource.event(:status => "noop", :name => :noop_restart)])
lib/puppet/type/yumrepo.rb:172: unless Puppet[:noop]
lib/puppet/type.rb:731: Puppet[:noop]
lib/puppet/type.rb:818: newmetaparam(:noop) do
lib/puppet/type.rb:1527: attr_writer :noop
lib/puppet/util/monkey_patches.rb:281: return if options[:noop]
SETTING ':onetime'
lib/puppet/application/agent.rb:312: return onetime if Puppet[:onetime]
lib/puppet/application/agent.rb:368: Puppet[:onetime] = true
lib/puppet/application/agent.rb:397: waitforcert = options[:waitforcert] || (Puppet[:onetime] ? 0 : Puppet[:waitforcert])
lib/puppet/application/agent.rb:406: @agent = Puppet::Agent.new(Puppet::Configurer, (not(Puppet[:onetime])))
lib/puppet/application/agent.rb:422: unless Puppet[:onetime]
lib/puppet/application/device.rb:212: waitforcert = options[:waitforcert] || (Puppet[:onetime] ? 0 : Puppet[:waitforcert])
lib/puppet/defaults.rb:114: :onetime => {
SETTING ':passfile'
lib/puppet/defaults.rb:474: :passfile => {
lib/puppet/ssl/key.rb:31: @password_file = Puppet[:passfile]
SETTING ':path'
lib/puppet/application/inspect.rb:165: path = ral_resource[:path]
lib/puppet/configurer/downloader.rb:5: attr_reader :name, :path, :source, :ignore
lib/puppet/configurer/downloader.rb:17: files << resource[:path]
lib/puppet/configurer/downloader.rb:41: args = default_arguments.merge(:path => path, :source => source)
lib/puppet/configurer/downloader.rb:52: :path => path,
lib/puppet/defaults.rb:121: :path => {
lib/puppet/defaults.rb:808: :type => :path,
lib/puppet/defaults.rb:1227: :type => :path,
lib/puppet/face/module/list.rb:158: :label_unmet => true, :path => path, :label_invalid => false)
lib/puppet/face/module/list.rb:163: :path => path, :label_invalid => true)
lib/puppet/face/module/list.rb:250: unless File.dirname(mod.path) == params[:path]
lib/puppet/file_serving/base.rb:47: attr_reader :path
lib/puppet/file_serving/configuration/parser.rb:98: if mount.respond_to?(:path=)
lib/puppet/file_serving/fileset.rb:7: attr_reader :path, :ignore, :links
lib/puppet/file_serving/metadata.rb:15: attr_reader :path, :owner, :group, :mode, :checksum_type, :checksum, :ftype, :destination
lib/puppet/indirector/catalog/static_compiler.rb:104: children[meta.relative_path] ||= Puppet::Resource.new(:file, File.join(file[:path], meta.relative_path))
lib/puppet/module.rb:32: attr_reader :name, :environment, :path
lib/puppet/module_tool/applications/installer.rb:119: download_tarballs(@graph, @graph.last[:path], @forge)
lib/puppet/module_tool/applications/uninstaller.rb:55: :path => mod.modulepath,
lib/puppet/module_tool/applications/uninstaller.rb:79: :installed_modules => @unfiltered.sort_by { |mod| @environment.modulepath.index(mod[:path]) },
lib/puppet/module_tool/applications/upgrader.rb:74: tarballs = download_tarballs(@graph, @graph.last[:path], @forge)
lib/puppet/module_tool/applications/upgrader.rb:86: results[:base_dir] = @graph.first[:path]
lib/puppet/module_tool/errors/uninstaller.rb:18: " '#{mod[:name]}' (#{v(mod[:version])}) is installed in #{mod[:path]}"
lib/puppet/module_tool/shared_behaviors.rb:132: :path => action == :install ? @options[:target_dir] : (@installed[mod].empty? ? @options[:target_dir] : @installed[mod].first.modulepath),
lib/puppet/module_tool/shared_behaviors.rb:156: { (release[:path] ||= default_path) => cache_path},
lib/puppet/module_tool.rb:101: mod[:text] += " [#{mod[:path]}]" unless mod[:path] == dir
lib/puppet/node/environment.rb:122: module_references << {:name => name, :path => File.join(path, name)}
lib/puppet/node/environment.rb:130: Puppet::Module.new(reference[:name], reference[:path], self)
lib/puppet/provider/augeas/augeas.rb:37: "set" => [ :path, :string ],
lib/puppet/provider/augeas/augeas.rb:38: "setm" => [ :path, :string, :string ],
lib/puppet/provider/augeas/augeas.rb:39: "rm" => [ :path ],
lib/puppet/provider/augeas/augeas.rb:40: "clear" => [ :path ],
lib/puppet/provider/augeas/augeas.rb:41: "mv" => [ :path, :path ],
lib/puppet/provider/augeas/augeas.rb:42: "insert" => [ :string, :string, :path ],
lib/puppet/provider/augeas/augeas.rb:43: "get" => [ :path, :comparator, :string ],
lib/puppet/provider/augeas/augeas.rb:44: "defvar" => [ :string, :path ],
lib/puppet/provider/augeas/augeas.rb:45: "defnode" => [ :string, :path, :string ],
lib/puppet/provider/augeas/augeas.rb:46: "match" => [ :path, :glob ],
lib/puppet/provider/augeas/augeas.rb:89: if f == :path
lib/puppet/provider/exec/posix.rb:29: if resource[:path]
lib/puppet/provider/exec/posix.rb:30: Puppet::Util.withenv :PATH => resource[:path].join(File::PATH_SEPARATOR) do
lib/puppet/provider/exec/windows.rb:47: if resource[:path]
lib/puppet/provider/exec/windows.rb:48: Puppet::Util.withenv :PATH => resource[:path].join(File::PATH_SEPARATOR) do
lib/puppet/provider/exec.rb:32: environment[:PATH] = resource[:path].join(File::PATH_SEPARATOR) if resource[:path]
lib/puppet/provider/exec.rb:87: self.fail "'#{command}' is not qualified and no path was specified. Please qualify the command or specify a path." if !absolute_path?(exe) and resource[:path].nil?
lib/puppet/provider/file/posix.rb:81: File.send(method, should, nil, resource[:path])
lib/puppet/provider/file/posix.rb:112: File.send(method, nil, should, resource[:path])
lib/puppet/provider/file/posix.rb:128: File.chmod(value.to_i(8), resource[:path])
lib/puppet/provider/file/posix.rb:130: error = Puppet::Error.new("failed to set mode #{mode} on #{resource[:path]}: #{detail.message}")
lib/puppet/provider/file/windows.rb:39: get_owner(resource[:path])
lib/puppet/provider/file/windows.rb:44: set_owner(should, resource[:path])
lib/puppet/provider/file/windows.rb:52: get_group(resource[:path])
lib/puppet/provider/file/windows.rb:57: set_group(should, resource[:path])
lib/puppet/provider/file/windows.rb:65: mode = get_mode(resource[:path])
lib/puppet/provider/file/windows.rb:74: set_mode(value.to_i(8), resource[:path])
lib/puppet/provider/file/windows.rb:76: error = Puppet::Error.new("failed to set mode #{mode} on #{resource[:path]}: #{detail.message}")
lib/puppet/provider/file/windows.rb:84: if [:owner, :group, :mode].any?{|p| resource[p]} and !supports_acl?(resource[:path])
lib/puppet/provider/service/daemontools.rb:79: new(:name => name, :path => path)
lib/puppet/provider/service/daemontools.rb:112: File.join(resource[:path], resource[:name])
lib/puppet/provider/service/init.rb:46: instances << new(:name => name, :path => path, :hasstatus => true)
lib/puppet/provider/service/init.rb:68: @paths ||= @resource[:path].find_all do |path|
lib/puppet/provider/service/launchd.rb:93: new(:name => job, :provider => :launchd, :path => jobs[job], :status => job_status)
lib/puppet/provider/zone/solaris.rb:11: fields = [:id, :name, :ensure, :path, :uuid, :brand, :iptype]
lib/puppet/provider/zone/solaris.rb:65: def_prop :path, "set zonepath=%s"
lib/puppet/provider/zone/solaris.rb:108: [:path, :iptype, :autoboot, :pool, :shares, :ip, :dataset, :inherit]
lib/puppet/provider/zone/solaris.rb:113: self.fail "Path is required" unless @resource[:path]
lib/puppet/provider/zone/solaris.rb:257: self.fail "Path is required" unless @resource[:path]
lib/puppet/provider/zone/solaris.rb:258: zoneetc = File.join(@resource[:path], "root", "etc")
lib/puppet/rails/database/schema.rb:36: t.column :path, :string
lib/puppet/settings.rb:613: :path => PathSetting,
lib/puppet/settings.rb:792: # :path - This is intended to be used for settings whose value can contain multiple directory paths, respresented
lib/puppet/ssl/inventory.rb:6: attr_reader :path
lib/puppet/type/exec.rb:142: newparam(:path) do
lib/puppet/type/file/content.rb:112: notice "\n" + diff(@resource[:path], path)
lib/puppet/type/file/content.rb:125: resource.parameter(:checksum).sum_file(resource[:path])
lib/puppet/type/file/ensure.rb:40: File.unlink(@resource[:path])
lib/puppet/type/file/ensure.rb:64: parent = File.dirname(@resource[:path])
lib/puppet/type/file/ensure.rb:67: "Cannot create #{@resource[:path]}; parent directory #{parent} does not exist"
lib/puppet/type/file/ensure.rb:71: Dir.mkdir(@resource[:path], symbolic_mode_to_int(mode, 755, true))
lib/puppet/type/file/ensure.rb:74: Dir.mkdir(@resource[:path])
lib/puppet/type/file/ensure.rb:123: basedir = File.dirname(@resource[:path])
lib/puppet/type/file/mode.rb:82: if FileTest.directory?(resource[:path]) and value =~ /^\d+$/ then
lib/puppet/type/file/selcontext.rb:30: context = self.get_selinux_current_context(@resource[:path])
lib/puppet/type/file/selcontext.rb:39: unless context = self.get_selinux_default_context(@resource[:path])
lib/puppet/type/file/selcontext.rb:44: self.debug "Found #{property} default '#{property_default}' for #{@resource[:path]}" if not property_default.nil?
lib/puppet/type/file/selcontext.rb:52: elsif not selinux_label_support?(@resource[:path])
lib/puppet/type/file/selcontext.rb:61: self.set_selinux_context(@resource[:path], @should, name)
lib/puppet/type/file/target.rb:43: raise Puppet::Error, "Could not remove existing file" if FileTest.exists?(@resource[:path])
lib/puppet/type/file/target.rb:45: Dir.chdir(File.dirname(@resource[:path])) do
lib/puppet/type/file/target.rb:50: File.symlink(target, @resource[:path])
lib/puppet/type/file/target.rb:53: File.symlink(target, @resource[:path])
lib/puppet/type/file/target.rb:66: elsif ! @resource.replace? and File.exists?(@resource[:path])
lib/puppet/type/file/target.rb:77: return File.readlink(@resource[:path])
lib/puppet/type/file.rb:37: [ [ /^(.*?)\/*\Z/m, [ [ :path ] ] ] ]
lib/puppet/type/file.rb:40: newparam(:path) do
lib/puppet/type/file.rb:251: path = Pathname.new(self[:path])
lib/puppet/type/file.rb:317: FileTest.writable?(::File.dirname(self[:path]))
lib/puppet/type/file.rb:375: # catalog.resource(:file, resource[:path])
lib/puppet/type/file.rb:383: ancestors = Pathname.new(self[:path]).enum_for(:ascend).map(&:to_s)
lib/puppet/type/file.rb:384: ancestors.delete(self[:path])
lib/puppet/type/file.rb:426: full_path = ::File.join(self[:path], path)
lib/puppet/type/file.rb:437: options = @original_parameters.merge(:path => full_path).reject { |param, value| value.nil? }
lib/puppet/type/file.rb:491: result = children.values.sort { |a, b| a[:path] <=> b[:path] }
lib/puppet/type/file.rb:501: mypath = self[:path].split(::File::Separator)
lib/puppet/type/file.rb:503: select { |r| r.is_a?(self.class) and r[:path] != self[:path] }.
lib/puppet/type/file.rb:504: collect { |r| r[:path].split(::File::Separator) }.
lib/puppet/type/file.rb:510: path = file[:path].split(::File::Separator)
lib/puppet/type/file.rb:541: result = perform_recursion(self[:path])
lib/puppet/type/file.rb:615: FileUtils.rmtree(self[:path])
lib/puppet/type/file.rb:622: ::File.unlink(self[:path])
lib/puppet/type/file.rb:693: ::File.send(method, self[:path])
lib/puppet/type/file.rb:717: path = "#{self[:path]}.puppettmp_#{rand(10000)}"
lib/puppet/type/file.rb:718: path = "#{self[:path]}.puppettmp_#{rand(10000)}" while ::File.exists?(path) or ::File.symlink?(path)
lib/puppet/type/file.rb:720: path = self[:path]
lib/puppet/type/file.rb:733: ::File.rename(path, self[:path])
lib/puppet/type/file.rb:735: fail "Could not rename temporary file #{path} to #{self[:path]}: #{detail}"
lib/puppet/type/filebucket.rb:58: newparam(:path) do
lib/puppet/type/filebucket.rb:80: new(:name => "puppet", :path => Puppet[:clientbucketdir])
lib/puppet/type/filebucket.rb:97: if self[:path]
lib/puppet/type/filebucket.rb:98: args[:Path] = self[:path]
lib/puppet/type/k5login.rb:17: newparam(:path) do
lib/puppet/type/service.rb:138: newparam(:path) do
lib/puppet/type/tidy.rb:17: newparam(:path) do
lib/puppet/type/tidy.rb:219: Puppet::Type.type(:file).new :path => path, :backup => self[:backup], :ensure => :absent, :force => true
lib/puppet/type/tidy.rb:237: return [] unless stat(self[:path])
lib/puppet/type/tidy.rb:247: files = Puppet::FileServing::Fileset.new(self[:path], parameter).files.collect do |f|
lib/puppet/type/tidy.rb:248: f == "." ? self[:path] : ::File.join(self[:path], f)
lib/puppet/type/tidy.rb:251: files = [self[:path]]
lib/puppet/type/tidy.rb:253: result = files.find_all { |path| tidy?(path) }.collect { |path| mkfile(path) }.each { |file| notice "Tidying #{file.ref}" }.sort { |a,b| b[:path] <=> a[:path] }
lib/puppet/type/tidy.rb:261: files_by_name = result.inject({}) { |hash, file| hash[file[:path]] = file; hash }
lib/puppet/type/zone.rb:183: newproperty(:path) do
lib/puppet/type/zone.rb:304: if @parameters.include? :path
lib/puppet/type/zone.rb:305: [@parameters[:path].value, ::File.dirname(@parameters[:path].value)]
lib/puppet/util/autoload.rb:193: attr_accessor :object, :path, :objwarn, :wrap
lib/puppet/util/backups.rb:12: file ||= self[:path]
lib/puppet/util/backups.rb:27: Find.find(self[:path]) { |f| backup_file_with_filebucket(f) if File.file?(f) }
lib/puppet/util/feature.rb:2: attr_reader :path
lib/puppet/util/filetype.rb:9: attr_accessor :loaded, :path, :synced
lib/puppet/util/log.rb:265: @source = descriptors[:path]
lib/puppet/util/log_paths.rb:13: [:path, :file, :line].each do |param|
lib/puppet/util/logging.rb:140: (is_resource? or is_resource_parameter?) and respond_to?(:path) and return path.to_s
lib/puppet/util/plugins.rb:69: attr_reader :path,:name
lib/puppet/util/rdoc/generators/puppet_generator.rb:456: attr_reader :path
lib/puppet/util/rdoc/generators/puppet_generator.rb:704: attr_reader :path
lib/puppet/util/resource_template.rb:21:# return Puppet::Type.type(:file).new :path => "/my/file",
lib/puppet/util.rb:271: params[:path] = URI.escape(path)
lib/puppet/util.rb:279: module_function :path_to_uri
SETTING ':pidfile'
lib/puppet/application/queue.rb:9: super.merge( :pidfile => "$rundir/queue.pid" )
lib/puppet/daemon.rb:64: Puppet[:pidfile]
lib/puppet/defaults.rb:716: :pidfile => {
lib/puppet/network/server.rb:46: Puppet[:pidfile]
SETTING ':plugindest'
lib/puppet/configurer/plugin_handler.rb:9: Puppet[:plugindest],
lib/puppet/defaults.rb:1198: :plugindest => {
lib/puppet/face/plugin.rb:42: Puppet[:plugindest],
SETTING ':pluginsignore'
lib/puppet/configurer/plugin_handler.rb:11: Puppet[:pluginsignore],
lib/puppet/defaults.rb:1216: :pluginsignore => {
lib/puppet/face/plugin.rb:44: Puppet[:pluginsignore]).evaluate
SETTING ':pluginsource'
lib/puppet/configurer/plugin_handler.rb:10: Puppet[:pluginsource],
lib/puppet/defaults.rb:1204: :pluginsource => {
lib/puppet/face/plugin.rb:43: Puppet[:pluginsource],
SETTING ':pluginsync'
lib/puppet/agent.rb:44: client_args = client_options.merge(:pluginsync => Puppet[:pluginsync])
lib/puppet/application/apply.rb:265: configurer.run(:catalog => catalog, :pluginsync => false)
lib/puppet/application/device.rb:198: report = configurer.run(:network_device => true, :pluginsync => Puppet[:pluginsync])
lib/puppet/configurer.rb:91: download_plugins if options[:pluginsync]
lib/puppet/defaults.rb:1210: :pluginsync => {
lib/puppet/run.rb:28: valid_options = [:tags, :ignoreschedules, :pluginsync]
lib/puppet/run.rb:67: options = { :pluginsync => Puppet[:pluginsync] }
SETTING ':postrun_command'
lib/puppet/configurer.rb:32: execute_from_setting(:postrun_command)
lib/puppet/defaults.rb:348: :postrun_command => {
SETTING ':preferred_serialization_format'
lib/puppet/defaults.rb:1040: Puppet.settings[:preferred_serialization_format] = value
lib/puppet/defaults.rb:1044: :preferred_serialization_format => {
lib/puppet/network/format_handler.rb:151: preferred_format = Puppet.settings[:preferred_serialization_format].to_sym
SETTING ':prerun_command'
lib/puppet/configurer.rb:36: execute_from_setting(:prerun_command)
lib/puppet/defaults.rb:343: :prerun_command => {
SETTING ':privatedir'
lib/puppet/defaults.rb:467: :privatedir => {
SETTING ':privatekeydir'
lib/puppet/defaults.rb:460: :privatekeydir => {
lib/puppet/indirector/key/ca.rb:9: store_in :privatekeydir
lib/puppet/indirector/key/file.rb:7: store_in :privatekeydir
SETTING ':publickeydir'
lib/puppet/defaults.rb:448: :publickeydir => {
lib/puppet/indirector/key/file.rb:15: File.join(Puppet[:publickeydir], name.to_s + ".pem")
lib/puppet/indirector/key/file.rb:37: Puppet.settings.writesub(:publickeydir, public_key_path(request.key)) { |f| f.print request.instance.content.public_key.to_pem }
SETTING ':puppetdlog'
lib/puppet/defaults.rb:970: :puppetdlog => {
lib/puppet/util/log.rb:215: (Puppet.features.eventlog? ? :eventlog : Puppet[:puppetdlog])))
SETTING ':puppetport'
lib/puppet/application/agent.rb:390: server = Puppet::Network::Server.new(Puppet[:bindaddress], Puppet[:puppetport])
lib/puppet/application/kick.rb:251: port = Puppet[:puppetport]
lib/puppet/application/resource.rb:166: port = Puppet[:puppetport]
lib/puppet/defaults.rb:996: :puppetport => {
SETTING ':queue_source'
lib/puppet/defaults.rb:296: :queue_source => {
lib/puppet/util/queue/stomp.rb:9:# Looks to <tt>Puppet[:queue_source]</tt> for the sole argument to the
lib/puppet/util/queue/stomp.rb:11:# <tt>Puppet[:queue_source]</tt> must use the Stomp::Client URL-like syntax
lib/puppet/util/queue/stomp.rb:18: uri = URI.parse(Puppet[:queue_source])
lib/puppet/util/queue/stomp.rb:20: raise ArgumentError, "Could not create Stomp client instance - queue source #{Puppet[:queue_source]} is invalid: #{detail}"
lib/puppet/util/queue/stomp.rb:23: raise ArgumentError, "Could not create Stomp client instance - queue source #{Puppet[:queue_source]} is not a Stomp URL: #{detail}"
lib/puppet/util/queue/stomp.rb:29: raise ArgumentError, "Could not create Stomp client instance with queue source #{Puppet[:queue_source]}: got internal Stomp client error #{detail}"
SETTING ':queue_type'
lib/puppet/defaults.rb:288: :queue_type => {
lib/puppet/defaults.rb:292: :queue_type => {
lib/puppet/util/queue.rb:84: # Looks to the <tt>:queue_type</tt> configuration entry in the running application for
lib/puppet/util/queue.rb:87: Puppet::Util::Queue.queue_type_to_class(Puppet[:queue_type])
SETTING ':queue_type'
lib/puppet/defaults.rb:288: :queue_type => {
lib/puppet/defaults.rb:292: :queue_type => {
lib/puppet/util/queue.rb:84: # Looks to the <tt>:queue_type</tt> configuration entry in the running application for
lib/puppet/util/queue.rb:87: Puppet::Util::Queue.queue_type_to_class(Puppet[:queue_type])
SETTING ':rails_loglevel'
lib/puppet/defaults.rb:1322: :rails_loglevel => {
lib/puppet/rails.rb:19: loglevel = Logger.const_get(Puppet[:rails_loglevel].upcase)
lib/puppet/rails.rb:22: Puppet.warning "'#{Puppet[:rails_loglevel]}' is not a valid Rails log level; using debug"
lib/puppet/rails.rb:46: args = {:adapter => adapter, :log_level => Puppet[:rails_loglevel]}
SETTING ':railslog'
lib/puppet/defaults.rb:1313: :railslog => {
lib/puppet/rails.rb:17: ActiveRecord::Base.logger = Logger.new(Puppet[:railslog])
SETTING ':report'
lib/puppet/application/inspect.rb:84: raise "Inspect requires reporting to be enabled. Set report=true in puppet.conf to enable reporting." unless Puppet[:report]
lib/puppet/configurer.rb:105: options[:report].host = Puppet[:node_name_value]
lib/puppet/configurer.rb:117: report = options[:report]
lib/puppet/configurer.rb:133: options[:report] ||= Puppet::Transaction::Report.new("apply")
lib/puppet/configurer.rb:134: report = options[:report]
lib/puppet/configurer.rb:200: Puppet::Transaction::Report.indirection.save(report, nil, :environment => @environment) if Puppet[:report]
lib/puppet/defaults.rb:840: :reports => {
lib/puppet/defaults.rb:846: :reportdir => {
lib/puppet/defaults.rb:855: :reporturl => {
lib/puppet/defaults.rb:1117: :report_server => {
lib/puppet/defaults.rb:1121: :report_port => {
lib/puppet/defaults.rb:1133: :report => {
lib/puppet/defaults.rb:1248: :reportfrom => {
lib/puppet/face/catalog.rb:75: catalog.apply(:report => report)
lib/puppet/face/report.rb:3:Puppet::Indirector::Face.define(:report, '0.0.1') do
lib/puppet/face/report.rb:21: Puppet::Face[:report, "0.0.1"].save(report)
lib/puppet/face/report.rb:41: Puppet::Face[:report, '0.0.1'].submit(report)
lib/puppet/face/report.rb:47: Puppet::Face[:report, "0.0.1"].save(report)
lib/puppet/face/secret_agent.rb:49: Puppet::Face[:report, '0.0.1'].submit(report)
lib/puppet/indirector/report/processor.rb:10: Puppet.settings.use(:main, :reporting, :metrics)
lib/puppet/indirector/report/processor.rb:47: x = Puppet[:reports].gsub(/(^\s+)|(\s+$)/, '').split(/\s*,\s*/)
lib/puppet/indirector/report/processor.rb:51: return if Puppet[:reports] == "none"
lib/puppet/indirector/report/rest.rb:5: use_server_setting(:report_server)
lib/puppet/indirector/report/rest.rb:6: use_port_setting(:report_port)
lib/puppet/indirector/report/rest.rb:7: use_srv_service(:report)
lib/puppet/network/resolver.rb:19: when :report then service = '_x-puppet-report'
lib/puppet/reference/report.rb:3:report = Puppet::Util::Reference.newreference :report, :doc => "All available transaction reports" do
lib/puppet/reports/http.rb:15: url = URI.parse(Puppet[:reporturl])
lib/puppet/reports/http.rb:22: Puppet.err "Unable to submit report to #{Puppet[:reporturl].to_s} [#{response.code}] #{response.msg}"
lib/puppet/reports/rrdgraph.rb:99: config.define_settings(:reports, :hostdir => {:type => :directory, :default => hostdir, :owner => 'service', :mode => 0755, :group => 'service', :desc => "eh"})
lib/puppet/reports/rrdgraph.rb:102: config.use(:reports)
lib/puppet/reports/store.rb:18: dir = File.join(Puppet[:reportdir], host)
lib/puppet/reports/store.rb:55: dir = File.join(Puppet[:reportdir], host)
lib/puppet/reports/tagmail.rb:138: smtp.open_message_stream(Puppet[:reportfrom], *emails) do |p|
lib/puppet/reports/tagmail.rb:139: p.puts "From: #{Puppet[:reportfrom]}"
lib/puppet/reports/tagmail.rb:158: p.puts "From: #{Puppet[:reportfrom]}"
lib/puppet/reports.rb:9: instance_load :report, 'puppet/reports'
lib/puppet/reports.rb:19: mod = genmodule(name, :extend => Puppet::Util::Docs, :hash => instance_hash(:report), :block => block)
lib/puppet/reports.rb:23: mod.send(:define_method, :report_name) do
lib/puppet/reports.rb:33: instance_loader(:report).loadall
lib/puppet/reports.rb:34: loaded_instances(:report).sort { |a,b| a.to_s <=> b.to_s }.each do |name|
lib/puppet/reports.rb:46: instance_loader(:report).loadall
lib/puppet/reports.rb:47: loaded_instances(:report)
lib/puppet/resource/catalog.rb:132: transaction = Puppet::Transaction.new(self, options[:report])
lib/puppet/resource/catalog.rb:133: register_report = options[:report].nil?
lib/puppet/transaction/report.rb:11: indirects :report, :terminus_class => :processor
lib/puppet/transaction/report.rb:15: :puppet_version, :report_format
lib/puppet/transaction.rb:19: attr_reader :report
lib/puppet/util/log/destinations.rb:180:Puppet::Util::Log.newdesttype :report do
lib/puppet/util/log/destinations.rb:181: attr_reader :report
SETTING ':report_port'
lib/puppet/defaults.rb:1121: :report_port => {
lib/puppet/indirector/report/rest.rb:6: use_port_setting(:report_port)
SETTING ':report_server'
lib/puppet/defaults.rb:1117: :report_server => {
lib/puppet/indirector/report/rest.rb:5: use_server_setting(:report_server)
SETTING ':reportdir'
lib/puppet/defaults.rb:846: :reportdir => {
lib/puppet/reports/store.rb:18: dir = File.join(Puppet[:reportdir], host)
lib/puppet/reports/store.rb:55: dir = File.join(Puppet[:reportdir], host)
SETTING ':reportfrom'
lib/puppet/defaults.rb:1248: :reportfrom => {
lib/puppet/reports/tagmail.rb:138: smtp.open_message_stream(Puppet[:reportfrom], *emails) do |p|
lib/puppet/reports/tagmail.rb:139: p.puts "From: #{Puppet[:reportfrom]}"
lib/puppet/reports/tagmail.rb:158: p.puts "From: #{Puppet[:reportfrom]}"
SETTING ':reports'
lib/puppet/defaults.rb:840: :reports => {
lib/puppet/indirector/report/processor.rb:47: x = Puppet[:reports].gsub(/(^\s+)|(\s+$)/, '').split(/\s*,\s*/)
lib/puppet/indirector/report/processor.rb:51: return if Puppet[:reports] == "none"
lib/puppet/reports/rrdgraph.rb:99: config.define_settings(:reports, :hostdir => {:type => :directory, :default => hostdir, :owner => 'service', :mode => 0755, :group => 'service', :desc => "eh"})
lib/puppet/reports/rrdgraph.rb:102: config.use(:reports)
SETTING ':reporturl'
lib/puppet/defaults.rb:855: :reporturl => {
lib/puppet/reports/http.rb:15: url = URI.parse(Puppet[:reporturl])
lib/puppet/reports/http.rb:22: Puppet.err "Unable to submit report to #{Puppet[:reporturl].to_s} [#{response.code}] #{response.msg}"
SETTING ':req_bits'
lib/puppet/defaults.rb:685: :req_bits => {
lib/puppet/test/test_helper.rb:169: Puppet[:req_bits] = 512
SETTING ':requestdir'
lib/puppet/defaults.rb:454: :requestdir => {
lib/puppet/indirector/certificate_request/file.rb:7: store_in :requestdir
SETTING ':resourcefile'
lib/puppet/defaults.rb:963: :resourcefile => {
lib/puppet/resource/catalog.rb:501: ::File.open(Puppet[:resourcefile], "w") do |f|
lib/puppet/resource/catalog.rb:513: Puppet.err "Could not create resource file #{Puppet[:resourcefile]}: #{detail}"
SETTING ':rest_authconfig'
lib/puppet/application/agent.rb:383: unless FileTest.exists?(Puppet[:rest_authconfig])
lib/puppet/application/agent.rb:384: Puppet.err "Will not start without authorization file #{Puppet[:rest_authconfig]}"
lib/puppet/defaults.rb:794: :rest_authconfig => {
lib/puppet/network/authorization.rb:10: @auth_config_file ||= Puppet::Util::LoadedFile.new(Puppet[:rest_authconfig])
lib/puppet/network/authorization.rb:13: @auth_config = Puppet::Network::AuthConfigParser.new_from_file(Puppet[:rest_authconfig]).parse
SETTING ':route_file'
lib/puppet/application.rb:345: exit_on_fail("configure routes from #{Puppet[:route_file]}") { configure_indirector_routes }
lib/puppet/application.rb:375: route_file = Puppet[:route_file]
lib/puppet/defaults.rb:209: :route_file => {
SETTING ':rrddir'
lib/puppet/defaults.rb:873: :rrddir => {
lib/puppet/reports/rrdgraph.rb:24: @hostdir ||= File.join(Puppet[:rrddir], self.host)
lib/puppet/util/metric.rb:25: Puppet[:rrddir]
SETTING ':rrdinterval'
lib/puppet/defaults.rb:883: :rrdinterval => {
lib/puppet/util/metric.rb:49: @rrd.create( Puppet[:rrdinterval], start, args)
lib/puppet/util/metric.rb:51: RRD.create( self.path, '-s', Puppet[:rrdinterval].to_s, '-b', start.to_i.to_s, *args)
SETTING ':rundir'
lib/puppet/defaults.rb:70: :rundir => {
lib/puppet/settings.rb:36: :rundir => run_mode.run_dir,
lib/puppet/test/test_helper.rb:140: :rundir => "/dev/null",
SETTING ':runinterval'
lib/puppet/daemon.rb:153: # wakeup, and the agent run if Puppet[:runinterval] seconds have passed
lib/puppet/daemon.rb:161: agent_run_interval = [Puppet[:runinterval], 0].max
lib/puppet/daemon.rb:196: new_run_interval = [Puppet[:runinterval], 0].max
lib/puppet/defaults.rb:1005: :runinterval => {
lib/puppet/indirector/indirection.rb:75: @ttl ||= Puppet[:runinterval]
lib/puppet/network/authentication.rb:9: @@logger = Puppet::Util::Log::RateLimitedLogger.new(Puppet[:runinterval])
SETTING ':sendmail'
lib/puppet/defaults.rb:1243: :sendmail => {
lib/puppet/reports/tagmail.rb:153: elsif Puppet[:sendmail] != ""
lib/puppet/reports/tagmail.rb:157: IO.popen(Puppet[:sendmail] + " " + emails.join(" "), "w") do |p|
SETTING ':serial'
lib/puppet/defaults.rb:654: :serial => {
lib/puppet/ssl/certificate_authority.rb:207: serial = 0x1 unless FileTest.exist?(Puppet[:serial])
lib/puppet/ssl/certificate_authority.rb:209: Puppet.settings.readwritelock(:serial) { |f|
lib/puppet/ssl/certificate_authority.rb:210: serial ||= File.read(Puppet.settings[:serial]).chomp.hex if FileTest.exist?(Puppet[:serial])
SETTING ':server'
lib/puppet/application/agent.rb:437: args[:Server] = Puppet[:server]
lib/puppet/application/apply.rb:120: $ puppet apply --modulepath=/root/dev/modules -e "include ntpd::server"
lib/puppet/application/device.rb:219: args[:Server] = Puppet[:server]
lib/puppet/application/filebucket.rb:176: @client = Puppet::FileBucket::Dipper.new(:Server => Puppet[:server])
lib/puppet/daemon.rb:8: attr_accessor :agent, :server, :argv
lib/puppet/defaults.rb:833: :server_datadir => {
lib/puppet/defaults.rb:977: :server => {
lib/puppet/indirector/json.rb:45: base = Puppet.run_mode.master? ? Puppet[:server_datadir] : Puppet[:client_datadir]
lib/puppet/indirector/request.rb:13: attr_accessor :server, :port, :uri, :protocol
lib/puppet/indirector/request.rb:194: def do_request(srv_service=:puppet, default_server=Puppet.settings[:server], default_port=Puppet.settings[:masterport], &block)
lib/puppet/indirector/rest.rb:14: attr_reader :server_setting, :port_setting
lib/puppet/indirector/rest.rb:37: Puppet.settings[server_setting || :server]
lib/puppet/network/http/handler.rb:15: attr_reader :server, :handler
lib/puppet/network/http/webrick/rest.rb:12: initialize_for_puppet(:server => server, :handler => handler)
lib/puppet/resource/catalog.rb:45: attr_accessor :client_version, :server_version
lib/puppet/ssl/certificate_authority.rb:268: cert_type = :server
lib/puppet/type/file/source.rb:183: (uri and uri.host) or Puppet.settings[:server]
lib/puppet/type/filebucket.rb:40: newparam(:server) do
lib/puppet/type/filebucket.rb:48: defaultto { Puppet[:server] }
lib/puppet/type/filebucket.rb:100: args[:Server] = self[:server]
SETTING ':server_datadir'
lib/puppet/defaults.rb:833: :server_datadir => {
lib/puppet/indirector/json.rb:45: base = Puppet.run_mode.master? ? Puppet[:server_datadir] : Puppet[:client_datadir]
SETTING ':show_diff'
lib/puppet/defaults.rb:182: :show_diff => {
lib/puppet/provider/augeas/augeas.rb:378: if Puppet[:show_diff]
lib/puppet/type/file/content.rb:110: if ! result and Puppet[:show_diff]
SETTING ':signeddir'
lib/puppet/defaults.rb:638: :signeddir => {
lib/puppet/indirector/certificate/ca.rb:7: store_in :signeddir
SETTING ':smtpserver'
lib/puppet/defaults.rb:1253: :smtpserver => {
lib/puppet/reports/tagmail.rb:134: if Puppet[:smtpserver] != "none"
lib/puppet/reports/tagmail.rb:136: Net::SMTP.start(Puppet[:smtpserver]) do |smtp|
SETTING ':splay'
lib/puppet/agent.rb:13: attr_reader :client_class, :client, :splayed, :should_fork
lib/puppet/agent.rb:70: return unless Puppet[:splay]
lib/puppet/agent.rb:73: time = rand(Puppet[:splaylimit] + 1)
lib/puppet/defaults.rb:1092: :splaylimit => {
lib/puppet/defaults.rb:1098: :splay => {
SETTING ':splaylimit'
lib/puppet/agent.rb:73: time = rand(Puppet[:splaylimit] + 1)
lib/puppet/defaults.rb:1092: :splaylimit => {
SETTING ':srv_domain'
lib/puppet/defaults.rb:986: :srv_domain => {
lib/puppet/indirector/request.rb:201: Puppet::Network::Resolver.each_srv_record(Puppet.settings[:srv_domain], srv_service) do |srv_server, srv_port|
SETTING ':ssl_client_ca_auth'
lib/puppet/defaults.rb:527: :ssl_client_ca_auth => {
lib/puppet/network/http/connection.rb:188: :ca_auth_file => Puppet[:ssl_client_ca_auth]
SETTING ':ssl_client_header'
lib/puppet/defaults.rb:812: :ssl_client_header => {
lib/puppet/network/http/rack/rest.rb:97: # try this with :ssl_client_header, which defaults should work for
lib/puppet/network/http/rack/rest.rb:99: if dn = request.env[Puppet[:ssl_client_header]] and dn_matchdata = dn.match(/^.*?CN\s*=\s*(.*)/)
SETTING ':ssl_client_verify_header'
lib/puppet/defaults.rb:818: :ssl_client_verify_header => {
lib/puppet/network/http/rack/rest.rb:101: result[:authenticated] = (request.env[Puppet[:ssl_client_verify_header]] == 'SUCCESS')
SETTING ':ssl_server_ca_auth'
lib/puppet/defaults.rb:546: :ssl_server_ca_auth => {
lib/puppet/network/http/webrick.rb:114: :ca_auth_file => Puppet[:ssl_server_ca_auth])
SETTING ':ssldir'
lib/puppet/defaults.rb:441: :ssldir => {
SETTING ':statedir'
lib/puppet/defaults.rb:62: :statedir => {
lib/puppet/util/storage.rb:46: Puppet.settings.use(:main) unless FileTest.directory?(Puppet[:statedir])
SETTING ':statefile'
lib/puppet/configurer.rb:44: Puppet.log_exception(detail, "Removing corrupt state file #{Puppet[:statefile]}: #{detail}")
lib/puppet/configurer.rb:46: ::File.unlink(Puppet[:statefile])
lib/puppet/configurer.rb:49: raise Puppet::Error.new("Cannot remove #{Puppet[:statefile]}: #{detail}")
lib/puppet/defaults.rb:933: :statefile => {
lib/puppet/util/storage.rb:47: filename = Puppet[:statefile]
lib/puppet/util/storage.rb:84: Puppet.info "Creating state file #{Puppet[:statefile]}" unless FileTest.exist?(Puppet[:statefile])
lib/puppet/util/storage.rb:87: Puppet::Util.replace_file(Puppet[:statefile], 0660) do |fh|
SETTING ':storeconfigs'
lib/puppet/defaults.rb:309: Puppet.settings[:storeconfigs] = true
lib/puppet/defaults.rb:328: Puppet.settings[:storeconfigs] = true if value
lib/puppet/defaults.rb:1446: :storeconfigs => {
lib/puppet/defaults.rb:1473: :storeconfigs_backend => {
lib/puppet/face/node/clean.rb:99: return unless Puppet[:storeconfigs] && Puppet.features.rails?
lib/puppet/indirector/store_configs.rb:6: @target = indirection.terminus Puppet[:storeconfigs_backend]
lib/puppet/parser/collector.rb:15: if form == :exported and Puppet[:storeconfigs] != true
lib/puppet/parser/grammar.ra:180: if (type == :exported and ! Puppet[:storeconfigs])
lib/puppet/parser/grammar.ra:211: if args[:form] == :exported and ! Puppet[:storeconfigs]
lib/puppet/parser/grammar.ra:228: if args[:form] == :exported and ! Puppet[:storeconfigs]
lib/puppet/parser/parser.rb:1316: if (type == :exported and ! Puppet[:storeconfigs])
lib/puppet/parser/parser.rb:1360: if args[:form] == :exported and ! Puppet[:storeconfigs]
lib/puppet/parser/parser.rb:1382: if args[:form] == :exported and ! Puppet[:storeconfigs]
SETTING ':storeconfigs_backend'
lib/puppet/defaults.rb:1473: :storeconfigs_backend => {
lib/puppet/indirector/store_configs.rb:6: @target = indirection.terminus Puppet[:storeconfigs_backend]
SETTING ':strict_hostname_checking'
lib/puppet/defaults.rb:864: :strict_hostname_checking => {
lib/puppet/node.rb:108: return [name] if Puppet.settings[:strict_hostname_checking]
SETTING ':summarize'
lib/puppet/configurer.rb:198: puts report.summary if Puppet[:summarize]
lib/puppet/defaults.rb:1354: :summarize => {
SETTING ':syslogfacility'
lib/puppet/defaults.rb:56: :syslogfacility => {
lib/puppet/util/log/destinations.rb:17: str = Puppet[:syslogfacility]
SETTING ':tagmap'
lib/puppet/defaults.rb:1239: :tagmap => {
lib/puppet/reports/tagmail.rb:111: unless FileTest.exists?(Puppet[:tagmap])
lib/puppet/reports/tagmail.rb:112: Puppet.notice "Cannot send tagmail report; no tagmap file #{Puppet[:tagmap]}"
lib/puppet/reports/tagmail.rb:123: taglists = parse(File.read(Puppet[:tagmap]))
SETTING ':tags'
lib/puppet/application/kick.rb:5: attr_accessor :hosts, :tags, :classes
lib/puppet/application/kick.rb:257: :tags => @tags,
lib/puppet/configurer.rb:131: # which accepts :tags and :ignoreschedules.
lib/puppet/defaults.rb:1341: :tags => {
lib/puppet/parameter.rb:266: @tags = @resource.tags if @resource.respond_to? :tags
lib/puppet/parser/scope.rb:374: def_delegator :resource, :tags
lib/puppet/rails/host.rb:176: accumulate_benchmark("Added resources", :tags) {
lib/puppet/rails/resource.rb:94: accumulate_benchmark("Individual resource merger", :tags) { merge_tags(resource) }
lib/puppet/resource/catalog.rb:123: # :tags - set the tags that restrict what resources run
lib/puppet/resource/catalog.rb:135: transaction.tags = options[:tags] if options[:tags]
lib/puppet/resource.rb:60: data = ([:type, :title, :tags] + ATTRIBUTES).inject({}) do |hash, param|
lib/puppet/run.rb:28: valid_options = [:tags, :ignoreschedules, :pluginsync]
lib/puppet/run.rb:38: msg += "triggered run" % if options[:tags]
lib/puppet/run.rb:39: msg += " with tags #{options[:tags].inspect}"
lib/puppet/transaction/event.rb:15: attr_writer :tags
lib/puppet/transaction.rb:468: self.tags = Puppet[:tags] unless defined?(@tags)
lib/puppet/type.rb:447: Puppet::Transaction::Event.new({:resource => self, :file => file, :line => line, :tags => tags}.merge(options))
lib/puppet/util/log.rb:233: if tags = args[:tags]
lib/puppet/util/log.rb:267: descriptors[:tags].each { |t| tag(t) }
lib/puppet/util/log_paths.rb:11: descriptors[:tags] = tags
lib/puppet/util/logging.rb:132: [:file, :line, :tags].inject({}) do |result, attr|
SETTING ':templatedir'
lib/puppet/defaults.rb:1483: :templatedir => {
lib/puppet/parser/files.rb:42: # If we can find the template in :templatedir, we return that.
lib/puppet/parser/files.rb:75: dirs = Puppet.settings.value(:templatedir, environment).split(File::PATH_SEPARATOR)
SETTING ':thin_storeconfigs'
lib/puppet/defaults.rb:319: :thin_storeconfigs => {
lib/puppet/rails/host.rb:93: list = list.select { |r| r.exported? } if Puppet.settings[:thin_storeconfigs]
lib/puppet/rails/host.rb:110: condition = { :exported => true } if Puppet.settings[:thin_storeconfigs]
SETTING ':trace'
lib/puppet/defaults.rb:45: :trace => {
lib/puppet/util/logging.rb:19: # Log an exception via Puppet.err. Will also log the backtrace if Puppet[:trace] is set.
lib/puppet/util/logging.rb:27: err(format_exception(exception, message, Puppet[:trace] || options[:trace]))
SETTING ':use_cached_catalog'
lib/puppet/configurer.rb:67: unless (Puppet[:use_cached_catalog] and result = retrieve_catalog_from_cache(fact_options)) or result = retrieve_new_catalog(fact_options)
lib/puppet/defaults.rb:1071: :use_cached_catalog => {
SETTING ':use_srv_records'
lib/puppet/defaults.rb:981: :use_srv_records => {
lib/puppet/indirector/request.rb:200: if Puppet.settings[:use_srv_records]
lib/puppet/indirector/request.rb:213: Puppet.debug "No more servers left, falling back to #{default_server}:#{default_port}" if Puppet.settings[:use_srv_records]
lib/puppet/test/test_helper.rb:159: Puppet.settings[:use_srv_records] = false
SETTING ':usecacheonfailure'
lib/puppet/configurer.rb:68: if ! Puppet[:usecacheonfailure]
lib/puppet/defaults.rb:1063: :usecacheonfailure => {
SETTING ':user'
lib/puppet/application/master.rb:182: Puppet.log_exception(detail, "Could not change user to #{Puppet[:user]}: #{detail}")
lib/puppet/defaults.rb:731: :user => {
lib/puppet/forge/repository.rb:156: private :user_agent
lib/puppet/module_tool/metadata.rb:17: attr_reader :username
lib/puppet/module_tool/metadata.rb:34: @username, @name = Puppet::ModuleTool::username_and_modname_from(full_module_name)
lib/puppet/provider/cron/crontab.rb:192: @property_hash[:user] = user
lib/puppet/provider/cron/crontab.rb:197: @property_hash[:user] || @property_hash[:target]
lib/puppet/provider/exec.rb:56: run_and_capture(command, resource[:user], resource[:group],
lib/puppet/provider/group/aix.rb:42: {:aix_attr => :users, :puppet_prop => :members,
lib/puppet/provider/group/aix.rb:43: :from => :users_from_attr},
lib/puppet/provider/mcx/mcxcontent.rb:23: :user => "Users",
lib/puppet/provider/nameservice/directoryservice.rb:11: # e.g. Puppet::Type.type(:user).provide :directoryservice, :ds_path => "Users"
lib/puppet/provider/nameservice.rb:116: id_generators = {:user => :uid, :group => :gid}
lib/puppet/provider/nameservice.rb:136: when :user; database = :passwd; method = :uid
lib/puppet/provider/scheduled_task/win32_taskscheduler.rb:222: [:arguments, :working_dir, :enabled, :trigger, :user].each do |prop|
lib/puppet/provider/ssh_authorized_key/parsed.rb:49: raise Puppet::Error, "Cannot write SSH authorized keys without user" unless @resource.should(:user)
lib/puppet/provider/ssh_authorized_key/parsed.rb:50: raise Puppet::Error, "User '#{@resource.should(:user)}' does not exist" unless uid = Puppet::Util.uid(@resource.should(:user))
lib/puppet/provider/ssh_authorized_key/parsed.rb:57: Puppet::Util::SUIDManager.asuser(@resource.should(:user)) do
lib/puppet/provider/user/aix.rb:19:Puppet::Type.type(:user).provide :aix, :parent => Puppet::Provider::AixObject do
lib/puppet/provider/user/directoryservice.rb:5:Puppet::Type.type(:user).provide :directoryservice do
lib/puppet/provider/user/hpux.rb:1:Puppet::Type.type(:user).provide :hpuxuseradd, :parent => :useradd do
lib/puppet/provider/user/ldap.rb:3:Puppet::Type.type(:user).provide :ldap, :parent => Puppet::Provider::Ldap do
lib/puppet/provider/user/ldap.rb:20: :password => :userPassword,
lib/puppet/provider/user/pw.rb:4:Puppet::Type.type(:user).provide :pw, :parent => Puppet::Provider::NameService::PW do
lib/puppet/provider/user/user_role_add.rb:4:Puppet::Type.type(:user).provide :user_role_add, :parent => :useradd, :source => :useradd do
lib/puppet/provider/user/user_role_add.rb:33: Puppet::Type.type(:user).validproperties.each do |property|
lib/puppet/provider/user/useradd.rb:3:Puppet::Type.type(:user).provide :useradd, :parent => Puppet::Provider::NameService::ObjectAdd do
lib/puppet/provider/user/useradd.rb:62: Puppet::Type.type(:user).validproperties.each do |property|
lib/puppet/provider/user/windows_adsi.rb:3:Puppet::Type.type(:user).provide :windows_adsi do
lib/puppet/rails.rb:54: args[:username] = Puppet[:dbuser] unless Puppet[:dbuser].to_s.empty?
lib/puppet/rails.rb:64: args[:username] = Puppet[:dbuser] unless Puppet[:dbuser].to_s.empty?
lib/puppet/settings/file_setting.rb:41: @settings[:user]
lib/puppet/settings.rb:437: @preferred_run_mode_name || :user
lib/puppet/settings.rb:448: raise ValidationError, "Invalid run mode '#{mode}'" unless [:master, :agent, :user].include?(mode)
lib/puppet/settings.rb:497: return File.join(Puppet::Util::RunMode[:user].conf_dir, config_file_name)
lib/puppet/settings.rb:499: private :user_config_file
lib/puppet/settings.rb:713: return @service_user_available = false unless user_name = self[:user]
lib/puppet/settings.rb:715: user = Puppet::Type.type(:user).new :name => self[:user], :audit => :ensure
lib/puppet/settings.rb:1074: if user = setting.owner and user != "root" and catalog.resource(:user, user).nil?
lib/puppet/settings.rb:1075: resource = Puppet::Resource.new(:user, user, :parameters => {:ensure => :present})
lib/puppet/type/cron.rb:348: newproperty(:user) do
lib/puppet/type/cron.rb:362: autorequire(:user) do
lib/puppet/type/cron.rb:363: self[:user]
lib/puppet/type/cron.rb:373: if val = @resource.should(:user)
lib/puppet/type/exec.rb:155: newparam(:user) do
lib/puppet/type/exec.rb:478: autorequire(:user) do
lib/puppet/type/exec.rb:480: if user = self[:user] and user !~ /^\d+$/
lib/puppet/type/file.rb:265: {:user => :owner, :group => :group}.each do |type, property|
lib/puppet/type/macauthorization.rb:86: newvalue(:user)
lib/puppet/type/mcx.rb:51: newvalues(:user, :group, :computer, :computerlist)
lib/puppet/type/mcx.rb:87: autorequire(:user) do
lib/puppet/type/mcx.rb:88: setup_autorequire(:user)
lib/puppet/type/scheduled_task.rb:57: newproperty(:user) do
lib/puppet/type/ssh_authorized_key.rb:37: newproperty(:user) do
lib/puppet/type/ssh_authorized_key.rb:53: return nil unless user = resource[:user]
lib/puppet/type/ssh_authorized_key.rb:97: autorequire(:user) do
lib/puppet/type/ssh_authorized_key.rb:98: should(:user) if should(:user)
lib/puppet/type/ssh_authorized_key.rb:106: return if @parameters.include?(:user)
lib/puppet/type/user.rb:8: newtype(:user) do
lib/puppet/type/user.rb:53: newvalue(:present, :event => :user_created) do
lib/puppet/type/user.rb:57: newvalue(:absent, :event => :user_removed) do
lib/puppet/type/user.rb:399: autorequire(:user) do
lib/puppet/util/fileparsing.rb:10:# record_line :user, :fields => %w{name password uid gid gecos home shell},
lib/puppet/util/fileparsing.rb:19:# lines.each do |type, hash| # type will always be :user, since we only have one
lib/puppet/util/ldap/connection.rb:7: attr_accessor :host, :port, :user, :password, :reset, :ssl
lib/puppet/util/ldap/connection.rb:24: options[:user] = user
lib/puppet/util/ldap/manager.rb:59: options[:user] = user
lib/puppet/util/log/destinations.rb:81: FileUtils.chown(Puppet[:user], Puppet[:group], path) unless Puppet::Util::Platform.windows?
lib/puppet/util/network_device/transport/base.rb:6: attr_accessor :user, :password, :host, :port
lib/puppet/util/posix.rb:75: when :pw, :user, :passwd; return :uid
lib/puppet/util/posix.rb:85: when :pw, :user, :passwd; return :getpwuid
lib/puppet/util/posix.rb:95: when :pw, :user, :passwd; return :getpwnam
lib/puppet/util/run_mode.rb:30: name == :user
lib/puppet/util/suidmanager.rb:147: map = {:gid => :group, :uid => :user}
lib/puppet/util.rb:95: if user = Puppet[:user]
lib/puppet.rb:117: do_initialize_settings_for_run_mode(:user)
SETTING ':waitforcert'
lib/puppet/application/agent.rb:27: :waitforcert => nil,
lib/puppet/application/agent.rb:85: options[:waitforcert] = arg.to_i
lib/puppet/application/agent.rb:397: waitforcert = options[:waitforcert] || (Puppet[:onetime] ? 0 : Puppet[:waitforcert])
lib/puppet/application/device.rb:28: :waitforcert => nil,
lib/puppet/application/device.rb:59: options[:waitforcert] = arg.to_i
lib/puppet/application/device.rb:212: waitforcert = options[:waitforcert] || (Puppet[:onetime] ? 0 : Puppet[:waitforcert])
lib/puppet/defaults.rb:1172: :waitforcert => {
SETTING ':yamldir'
lib/puppet/defaults.rb:826: :yamldir => {
lib/puppet/indirector/facts/yaml.rb:21: base = Puppet.run_mode.master? ? Puppet[:yamldir] : Puppet[:clientyamldir]
lib/puppet/indirector/yaml.rb:57: base = Puppet.run_mode.master? ? Puppet[:yamldir] : Puppet[:clientyamldir]
SETTING ':zlib'
lib/puppet/defaults.rb:338: :zlib => {
lib/puppet/feature/zlib.rb:5:Puppet.features.add(:zlib, :libs => %{zlib})
lib/puppet/network/formats.rb:36: Puppet.features.zlib? && Puppet[:zlib]
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment