From 37ba19f44bb18d5dbd93806320a354f2e1391bd2 Mon Sep 17 00:00:00 2001 From: Jenkins Server Date: Mon, 12 May 2025 16:59:55 +0200 Subject: [PATCH 1/6] recommit for updates in build 1 --- doc/_index.html | 187 ++++ doc/css/common.css | 8 + doc/css/full_list.css | 58 + doc/css/style.css | 497 +++++++++ doc/file.README.html | 218 ++++ doc/frames.html | 22 + doc/index.html | 218 ++++ doc/js/app.js | 314 ++++++ doc/js/full_list.js | 216 ++++ doc/js/jquery.js | 4 + doc/puppet_class_list.html | 124 +++ doc/puppet_classes/cd_nrpe.html | 121 +++ ...e_3A_3Acommands_3A_3Adefinition_rules.html | 248 +++++ .../cd_nrpe_3A_3Afirewall_3A_3Aiptables.html | 142 +++ .../cd_nrpe_3A_3Amain_3A_3Aconfig.html | 128 +++ .../cd_nrpe_3A_3Amain_3A_3Adirs.html | 182 ++++ .../cd_nrpe_3A_3Amain_3A_3Afiles.html | 256 +++++ .../cd_nrpe_3A_3Amain_3A_3Ainstall.html | 138 +++ .../cd_nrpe_3A_3Amain_3A_3Aservice.html | 168 +++ .../cd_nrpe_3A_3Amain_3A_3Auser.html | 172 +++ doc/puppet_classes/cd_nrpe_3A_3Aparams.html | 998 ++++++++++++++++++ .../cd_nrpe_3A_3Aselinux_3A_3Aconfig.html | 182 ++++ doc/puppet_defined_type_list.html | 54 + ...d_nrpe_3A_3Acommands_3A_3Adefinitions.html | 228 ++++ doc/top-level-namespace.html | 98 ++ 25 files changed, 4981 insertions(+) create mode 100644 doc/_index.html create mode 100644 doc/css/common.css create mode 100644 doc/css/full_list.css create mode 100644 doc/css/style.css create mode 100644 doc/file.README.html create mode 100644 doc/frames.html create mode 100644 doc/index.html create mode 100644 doc/js/app.js create mode 100644 doc/js/full_list.js create mode 100644 doc/js/jquery.js create mode 100644 doc/puppet_class_list.html create mode 100644 doc/puppet_classes/cd_nrpe.html create mode 100644 doc/puppet_classes/cd_nrpe_3A_3Acommands_3A_3Adefinition_rules.html create mode 100644 doc/puppet_classes/cd_nrpe_3A_3Afirewall_3A_3Aiptables.html create mode 100644 doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Aconfig.html create mode 100644 doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Adirs.html create mode 100644 doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Afiles.html create mode 100644 doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Ainstall.html create mode 100644 doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Aservice.html create mode 100644 doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Auser.html create mode 100644 doc/puppet_classes/cd_nrpe_3A_3Aparams.html create mode 100644 doc/puppet_classes/cd_nrpe_3A_3Aselinux_3A_3Aconfig.html create mode 100644 doc/puppet_defined_type_list.html create mode 100644 doc/puppet_defined_types/cd_nrpe_3A_3Acommands_3A_3Adefinitions.html create mode 100644 doc/top-level-namespace.html diff --git a/doc/_index.html b/doc/_index.html new file mode 100644 index 0000000..a8a6262 --- /dev/null +++ b/doc/_index.html @@ -0,0 +1,187 @@ + + + + + + + Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Documentation by YARD 0.9.36

+
+

Alphabetic Index

+ +

Puppet Class Listing A-Z

+ + + + + + +
+ + + + +
+ + + +

Defined Type Listing A-Z

+ + + + + + +
+ + + + +
+ + + + + + + +

File Listing

+ + +
+ + +
+ +
+ + + +
+ + \ No newline at end of file diff --git a/doc/css/common.css b/doc/css/common.css new file mode 100644 index 0000000..d28b093 --- /dev/null +++ b/doc/css/common.css @@ -0,0 +1,8 @@ +/* Ensure the search bar doesn't overlap with links */ +.fixed_header { + padding-bottom: 25px; +} + +#full_list { + padding-top: 15px; +} diff --git a/doc/css/full_list.css b/doc/css/full_list.css new file mode 100644 index 0000000..fa35982 --- /dev/null +++ b/doc/css/full_list.css @@ -0,0 +1,58 @@ +body { + margin: 0; + font-family: "Lucida Sans", "Lucida Grande", Verdana, Arial, sans-serif; + font-size: 13px; + height: 101%; + overflow-x: hidden; + background: #fafafa; +} + +h1 { padding: 12px 10px; padding-bottom: 0; margin: 0; font-size: 1.4em; } +.clear { clear: both; } +.fixed_header { position: fixed; background: #fff; width: 100%; padding-bottom: 10px; margin-top: 0; top: 0; z-index: 9999; height: 70px; } +#search { position: absolute; right: 5px; top: 9px; padding-left: 24px; } +#content.insearch #search, #content.insearch #noresults { background: url(data:image/gif;base64,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) no-repeat center left; } +#full_list { padding: 0; list-style: none; margin-left: 0; margin-top: 80px; font-size: 1.1em; } +#full_list ul { padding: 0; } +#full_list li { padding: 0; margin: 0; list-style: none; } +#full_list li .item { padding: 5px 5px 5px 12px; } +#noresults { padding: 7px 12px; background: #fff; } +#content.insearch #noresults { margin-left: 7px; } +li.collapsed ul { display: none; } +li a.toggle { cursor: default; position: relative; left: -5px; top: 4px; text-indent: -999px; width: 10px; height: 9px; margin-left: -10px; display: block; float: left; background: url(data:image/png;base64,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) no-repeat bottom left; } +li.collapsed a.toggle { opacity: 0.5; cursor: default; background-position: top left; } +li { color: #888; cursor: pointer; } +li.deprecated { text-decoration: line-through; font-style: italic; } +li.odd { background: #f0f0f0; } +li.even { background: #fafafa; } +.item:hover { background: #ddd; } +li small:before { content: "("; } +li small:after { content: ")"; } +li small.search_info { display: none; } +a, a:visited { text-decoration: none; color: #05a; } +li.clicked > .item { background: #05a; color: #ccc; } +li.clicked > .item a, li.clicked > .item a:visited { color: #eee; } +li.clicked > .item a.toggle { opacity: 0.5; background-position: bottom right; } +li.collapsed.clicked a.toggle { background-position: top right; } +#search input { border: 1px solid #bbb; border-radius: 3px; } +#full_list_nav { margin-left: 10px; font-size: 0.9em; display: block; color: #aaa; } +#full_list_nav a, #nav a:visited { color: #358; } +#full_list_nav a:hover { background: transparent; color: #5af; } +#full_list_nav span:after { content: ' | '; } +#full_list_nav span:last-child:after { content: ''; } + +#content h1 { margin-top: 0; } +li { white-space: nowrap; cursor: normal; } +li small { display: block; font-size: 0.8em; } +li small:before { content: ""; } +li small:after { content: ""; } +li small.search_info { display: none; } +#search { width: 170px; position: static; margin: 3px; margin-left: 10px; font-size: 0.9em; color: #888; padding-left: 0; padding-right: 24px; } +#content.insearch #search { background-position: center right; } +#search input { width: 110px; } + +#full_list.insearch ul { display: block; } +#full_list.insearch .item { display: none; } +#full_list.insearch .found { display: block; padding-left: 11px !important; } +#full_list.insearch li a.toggle { display: none; } +#full_list.insearch li small.search_info { display: block; } diff --git a/doc/css/style.css b/doc/css/style.css new file mode 100644 index 0000000..eb0dbc8 --- /dev/null +++ b/doc/css/style.css @@ -0,0 +1,497 @@ +html { + width: 100%; + height: 100%; +} +body { + font-family: "Lucida Sans", "Lucida Grande", Verdana, Arial, sans-serif; + font-size: 13px; + width: 100%; + margin: 0; + padding: 0; + display: flex; + display: -webkit-flex; + display: -ms-flexbox; +} + +#nav { + position: relative; + width: 100%; + height: 100%; + border: 0; + border-right: 1px dotted #eee; + overflow: auto; +} +.nav_wrap { + margin: 0; + padding: 0; + width: 20%; + height: 100%; + position: relative; + display: flex; + display: -webkit-flex; + display: -ms-flexbox; + flex-shrink: 0; + -webkit-flex-shrink: 0; + -ms-flex: 1 0; +} +#resizer { + position: absolute; + right: -5px; + top: 0; + width: 10px; + height: 100%; + cursor: col-resize; + z-index: 9999; +} +#main { + flex: 5 1; + -webkit-flex: 5 1; + -ms-flex: 5 1; + outline: none; + position: relative; + background: #fff; + padding: 1.2em; + padding-top: 0.2em; + box-sizing: border-box; +} + +@media (max-width: 920px) { + .nav_wrap { width: 100%; top: 0; right: 0; overflow: visible; position: absolute; } + #resizer { display: none; } + #nav { + z-index: 9999; + background: #fff; + display: none; + position: absolute; + top: 40px; + right: 12px; + width: 500px; + max-width: 80%; + height: 80%; + overflow-y: scroll; + border: 1px solid #999; + border-collapse: collapse; + box-shadow: -7px 5px 25px #aaa; + border-radius: 2px; + } +} + +@media (min-width: 920px) { + body { height: 100%; overflow: hidden; } + #main { height: 100%; overflow: auto; } + #search { display: none; } +} + +#main img { max-width: 100%; } +h1 { font-size: 25px; margin: 1em 0 0.5em; padding-top: 4px; border-top: 1px dotted #d5d5d5; } +h1.noborder { border-top: 0px; margin-top: 0; padding-top: 4px; } +h1.title { margin-bottom: 10px; } +h1.alphaindex { margin-top: 0; font-size: 22px; } +h2 { + padding: 0; + padding-bottom: 3px; + border-bottom: 1px #aaa solid; + font-size: 1.4em; + margin: 1.8em 0 0.5em; + position: relative; +} +h2 small { font-weight: normal; font-size: 0.7em; display: inline; position: absolute; right: 0; } +h2 small a { + display: block; + height: 20px; + border: 1px solid #aaa; + border-bottom: 0; + border-top-left-radius: 5px; + background: #f8f8f8; + position: relative; + padding: 2px 7px; +} +.clear { clear: both; } +.inline { display: inline; } +.inline p:first-child { display: inline; } +.docstring, .tags, #filecontents { font-size: 15px; line-height: 1.5145em; } +.docstring p > code, .docstring p > tt, .tags p > code, .tags p > tt { + color: #c7254e; background: #f9f2f4; padding: 2px 4px; font-size: 1em; + border-radius: 4px; +} +.docstring h1, .docstring h2, .docstring h3, .docstring h4 { padding: 0; border: 0; border-bottom: 1px dotted #bbb; } +.docstring h1 { font-size: 1.2em; } +.docstring h2 { font-size: 1.1em; } +.docstring h3, .docstring h4 { font-size: 1em; border-bottom: 0; padding-top: 10px; } +.summary_desc .object_link a, .docstring .object_link a { + font-family: monospace; font-size: 1.05em; + color: #05a; background: #EDF4FA; padding: 2px 4px; font-size: 1em; + border-radius: 4px; +} +.rdoc-term { padding-right: 25px; font-weight: bold; } +.rdoc-list p { margin: 0; padding: 0; margin-bottom: 4px; } +.summary_desc pre.code .object_link a, .docstring pre.code .object_link a { + padding: 0px; background: inherit; color: inherit; border-radius: inherit; +} + +/* style for */ +#filecontents table, .docstring table { border-collapse: collapse; } +#filecontents table th, #filecontents table td, +.docstring table th, .docstring table td { border: 1px solid #ccc; padding: 8px; padding-right: 17px; } +#filecontents table tr:nth-child(odd), +.docstring table tr:nth-child(odd) { background: #eee; } +#filecontents table tr:nth-child(even), +.docstring table tr:nth-child(even) { background: #fff; } +#filecontents table th, .docstring table th { background: #fff; } + +/* style for
a",d=q.getElementsByTagName("*"),e=q.getElementsByTagName("a")[0];if(!d||!d.length||!e)return{};g=c.createElement("select"),h=g.appendChild(c.createElement("option")),i=q.getElementsByTagName("input")[0],b={leadingWhitespace:q.firstChild.nodeType===3,tbody:!q.getElementsByTagName("tbody").length,htmlSerialize:!!q.getElementsByTagName("link").length,style:/top/.test(e.getAttribute("style")),hrefNormalized:e.getAttribute("href")==="/a",opacity:/^0.55/.test(e.style.opacity),cssFloat:!!e.style.cssFloat,checkOn:i.value==="on",optSelected:h.selected,getSetAttribute:q.className!=="t",enctype:!!c.createElement("form").enctype,html5Clone:c.createElement("nav").cloneNode(!0).outerHTML!=="<:nav>",submitBubbles:!0,changeBubbles:!0,focusinBubbles:!1,deleteExpando:!0,noCloneEvent:!0,inlineBlockNeedsLayout:!1,shrinkWrapBlocks:!1,reliableMarginRight:!0},i.checked=!0,b.noCloneChecked=i.cloneNode(!0).checked,g.disabled=!0,b.optDisabled=!h.disabled;try{delete q.test}catch(s){b.deleteExpando=!1}!q.addEventListener&&q.attachEvent&&q.fireEvent&&(q.attachEvent("onclick",function(){b.noCloneEvent=!1}),q.cloneNode(!0).fireEvent("onclick")),i=c.createElement("input"),i.value="t",i.setAttribute("type","radio"),b.radioValue=i.value==="t",i.setAttribute("checked","checked"),q.appendChild(i),k=c.createDocumentFragment(),k.appendChild(q.lastChild),b.checkClone=k.cloneNode(!0).cloneNode(!0).lastChild.checked,b.appendChecked=i.checked,k.removeChild(i),k.appendChild(q),q.innerHTML="",a.getComputedStyle&&(j=c.createElement("div"),j.style.width="0",j.style.marginRight="0",q.style.width="2px",q.appendChild(j),b.reliableMarginRight=(parseInt((a.getComputedStyle(j,null)||{marginRight:0}).marginRight,10)||0)===0);if(q.attachEvent)for(o in{submit:1,change:1,focusin:1})n="on"+o,p=n in q,p||(q.setAttribute(n,"return;"),p=typeof q[n]=="function"),b[o+"Bubbles"]=p;k.removeChild(q),k=g=h=j=q=i=null,f(function(){var a,d,e,g,h,i,j,k,m,n,o,r=c.getElementsByTagName("body")[0];!r||(j=1,k="position:absolute;top:0;left:0;width:1px;height:1px;margin:0;",m="visibility:hidden;border:0;",n="style='"+k+"border:5px solid #000;padding:0;'",o="
"+""+"
",a=c.createElement("div"),a.style.cssText=m+"width:0;height:0;position:static;top:0;margin-top:"+j+"px",r.insertBefore(a,r.firstChild),q=c.createElement("div"),a.appendChild(q),q.innerHTML="
t
",l=q.getElementsByTagName("td"),p=l[0].offsetHeight===0,l[0].style.display="",l[1].style.display="none",b.reliableHiddenOffsets=p&&l[0].offsetHeight===0,q.innerHTML="",q.style.width=q.style.paddingLeft="1px",f.boxModel=b.boxModel=q.offsetWidth===2,typeof q.style.zoom!="undefined"&&(q.style.display="inline",q.style.zoom=1,b.inlineBlockNeedsLayout=q.offsetWidth===2,q.style.display="",q.innerHTML="
",b.shrinkWrapBlocks=q.offsetWidth!==2),q.style.cssText=k+m,q.innerHTML=o,d=q.firstChild,e=d.firstChild,h=d.nextSibling.firstChild.firstChild,i={doesNotAddBorder:e.offsetTop!==5,doesAddBorderForTableAndCells:h.offsetTop===5},e.style.position="fixed",e.style.top="20px",i.fixedPosition=e.offsetTop===20||e.offsetTop===15,e.style.position=e.style.top="",d.style.overflow="hidden",d.style.position="relative",i.subtractsBorderForOverflowNotVisible=e.offsetTop===-5,i.doesNotIncludeMarginInBodyOffset=r.offsetTop!==j,r.removeChild(a),q=a=null,f.extend(b,i))});return b}();var j=/^(?:\{.*\}|\[.*\])$/,k=/([A-Z])/g;f.extend({cache:{},uuid:0,expando:"jQuery"+(f.fn.jquery+Math.random()).replace(/\D/g,""),noData:{embed:!0,object:"clsid:D27CDB6E-AE6D-11cf-96B8-444553540000",applet:!0},hasData:function(a){a=a.nodeType?f.cache[a[f.expando]]:a[f.expando];return!!a&&!m(a)},data:function(a,c,d,e){if(!!f.acceptData(a)){var g,h,i,j=f.expando,k=typeof c=="string",l=a.nodeType,m=l?f.cache:a,n=l?a[j]:a[j]&&j,o=c==="events";if((!n||!m[n]||!o&&!e&&!m[n].data)&&k&&d===b)return;n||(l?a[j]=n=++f.uuid:n=j),m[n]||(m[n]={},l||(m[n].toJSON=f.noop));if(typeof c=="object"||typeof c=="function")e?m[n]=f.extend(m[n],c):m[n].data=f.extend(m[n].data,c);g=h=m[n],e||(h.data||(h.data={}),h=h.data),d!==b&&(h[f.camelCase(c)]=d);if(o&&!h[c])return g.events;k?(i=h[c],i==null&&(i=h[f.camelCase(c)])):i=h;return i}},removeData:function(a,b,c){if(!!f.acceptData(a)){var d,e,g,h=f.expando,i=a.nodeType,j=i?f.cache:a,k=i?a[h]:h;if(!j[k])return;if(b){d=c?j[k]:j[k].data;if(d){f.isArray(b)||(b in d?b=[b]:(b=f.camelCase(b),b in d?b=[b]:b=b.split(" ")));for(e=0,g=b.length;e-1)return!0;return!1},val:function(a){var c,d,e,g=this[0];{if(!!arguments.length){e=f.isFunction(a);return this.each(function(d){var g=f(this),h;if(this.nodeType===1){e?h=a.call(this,d,g.val()):h=a,h==null?h="":typeof h=="number"?h+="":f.isArray(h)&&(h=f.map(h,function(a){return a==null?"":a+""})),c=f.valHooks[this.nodeName.toLowerCase()]||f.valHooks[this.type];if(!c||!("set"in c)||c.set(this,h,"value")===b)this.value=h}})}if(g){c=f.valHooks[g.nodeName.toLowerCase()]||f.valHooks[g.type];if(c&&"get"in c&&(d=c.get(g,"value"))!==b)return d;d=g.value;return typeof d=="string"?d.replace(q,""):d==null?"":d}}}}),f.extend({valHooks:{option:{get:function(a){var b=a.attributes.value;return!b||b.specified?a.value:a.text}},select:{get:function(a){var b,c,d,e,g=a.selectedIndex,h=[],i=a.options,j=a.type==="select-one";if(g<0)return null;c=j?g:0,d=j?g+1:i.length;for(;c=0}),c.length||(a.selectedIndex=-1);return c}}},attrFn:{val:!0,css:!0,html:!0,text:!0,data:!0,width:!0,height:!0,offset:!0},attr:function(a,c,d,e){var g,h,i,j=a.nodeType;if(!!a&&j!==3&&j!==8&&j!==2){if(e&&c in f.attrFn)return f(a)[c](d);if(typeof a.getAttribute=="undefined")return f.prop(a,c,d);i=j!==1||!f.isXMLDoc(a),i&&(c=c.toLowerCase(),h=f.attrHooks[c]||(u.test(c)?x:w));if(d!==b){if(d===null){f.removeAttr(a,c);return}if(h&&"set"in h&&i&&(g=h.set(a,d,c))!==b)return g;a.setAttribute(c,""+d);return d}if(h&&"get"in h&&i&&(g=h.get(a,c))!==null)return g;g=a.getAttribute(c);return g===null?b:g}},removeAttr:function(a,b){var c,d,e,g,h=0;if(b&&a.nodeType===1){d=b.toLowerCase().split(p),g=d.length;for(;h=0}})});var z=/^(?:textarea|input|select)$/i,A=/^([^\.]*)?(?:\.(.+))?$/,B=/\bhover(\.\S+)?\b/,C=/^key/,D=/^(?:mouse|contextmenu)|click/,E=/^(?:focusinfocus|focusoutblur)$/,F=/^(\w*)(?:#([\w\-]+))?(?:\.([\w\-]+))?$/,G=function(a){var b=F.exec(a);b&&(b[1]=(b[1]||"").toLowerCase(),b[3]=b[3]&&new RegExp("(?:^|\\s)"+b[3]+"(?:\\s|$)"));return b},H=function(a,b){var c=a.attributes||{};return(!b[1]||a.nodeName.toLowerCase()===b[1])&&(!b[2]||(c.id||{}).value===b[2])&&(!b[3]||b[3].test((c["class"]||{}).value))},I=function(a){return f.event.special.hover?a:a.replace(B,"mouseenter$1 mouseleave$1")}; +f.event={add:function(a,c,d,e,g){var h,i,j,k,l,m,n,o,p,q,r,s;if(!(a.nodeType===3||a.nodeType===8||!c||!d||!(h=f._data(a)))){d.handler&&(p=d,d=p.handler),d.guid||(d.guid=f.guid++),j=h.events,j||(h.events=j={}),i=h.handle,i||(h.handle=i=function(a){return typeof f!="undefined"&&(!a||f.event.triggered!==a.type)?f.event.dispatch.apply(i.elem,arguments):b},i.elem=a),c=f.trim(I(c)).split(" ");for(k=0;k=0&&(h=h.slice(0,-1),k=!0),h.indexOf(".")>=0&&(i=h.split("."),h=i.shift(),i.sort());if((!e||f.event.customEvent[h])&&!f.event.global[h])return;c=typeof c=="object"?c[f.expando]?c:new f.Event(h,c):new f.Event(h),c.type=h,c.isTrigger=!0,c.exclusive=k,c.namespace=i.join("."),c.namespace_re=c.namespace?new RegExp("(^|\\.)"+i.join("\\.(?:.*\\.)?")+"(\\.|$)"):null,o=h.indexOf(":")<0?"on"+h:"";if(!e){j=f.cache;for(l in j)j[l].events&&j[l].events[h]&&f.event.trigger(c,d,j[l].handle.elem,!0);return}c.result=b,c.target||(c.target=e),d=d!=null?f.makeArray(d):[],d.unshift(c),p=f.event.special[h]||{};if(p.trigger&&p.trigger.apply(e,d)===!1)return;r=[[e,p.bindType||h]];if(!g&&!p.noBubble&&!f.isWindow(e)){s=p.delegateType||h,m=E.test(s+h)?e:e.parentNode,n=null;for(;m;m=m.parentNode)r.push([m,s]),n=m;n&&n===e.ownerDocument&&r.push([n.defaultView||n.parentWindow||a,s])}for(l=0;le&&i.push({elem:this,matches:d.slice(e)});for(j=0;j0?this.on(b,null,a,c):this.trigger(b)},f.attrFn&&(f.attrFn[b]=!0),C.test(b)&&(f.event.fixHooks[b]=f.event.keyHooks),D.test(b)&&(f.event.fixHooks[b]=f.event.mouseHooks)}),function(){function x(a,b,c,e,f,g){for(var h=0,i=e.length;h0){k=j;break}}j=j[a]}e[h]=k}}}function w(a,b,c,e,f,g){for(var h=0,i=e.length;h+~,(\[\\]+)+|[>+~])(\s*,\s*)?((?:.|\r|\n)*)/g,d="sizcache"+(Math.random()+"").replace(".",""),e=0,g=Object.prototype.toString,h=!1,i=!0,j=/\\/g,k=/\r\n/g,l=/\W/;[0,0].sort(function(){i=!1;return 0});var m=function(b,d,e,f){e=e||[],d=d||c;var h=d;if(d.nodeType!==1&&d.nodeType!==9)return[];if(!b||typeof b!="string")return e;var i,j,k,l,n,q,r,t,u=!0,v=m.isXML(d),w=[],x=b;do{a.exec(""),i=a.exec(x);if(i){x=i[3],w.push(i[1]);if(i[2]){l=i[3];break}}}while(i);if(w.length>1&&p.exec(b))if(w.length===2&&o.relative[w[0]])j=y(w[0]+w[1],d,f);else{j=o.relative[w[0]]?[d]:m(w.shift(),d);while(w.length)b=w.shift(),o.relative[b]&&(b+=w.shift()),j=y(b,j,f)}else{!f&&w.length>1&&d.nodeType===9&&!v&&o.match.ID.test(w[0])&&!o.match.ID.test(w[w.length-1])&&(n=m.find(w.shift(),d,v),d=n.expr?m.filter(n.expr,n.set)[0]:n.set[0]);if(d){n=f?{expr:w.pop(),set:s(f)}:m.find(w.pop(),w.length===1&&(w[0]==="~"||w[0]==="+")&&d.parentNode?d.parentNode:d,v),j=n.expr?m.filter(n.expr,n.set):n.set,w.length>0?k=s(j):u=!1;while(w.length)q=w.pop(),r=q,o.relative[q]?r=w.pop():q="",r==null&&(r=d),o.relative[q](k,r,v)}else k=w=[]}k||(k=j),k||m.error(q||b);if(g.call(k)==="[object Array]")if(!u)e.push.apply(e,k);else if(d&&d.nodeType===1)for(t=0;k[t]!=null;t++)k[t]&&(k[t]===!0||k[t].nodeType===1&&m.contains(d,k[t]))&&e.push(j[t]);else for(t=0;k[t]!=null;t++)k[t]&&k[t].nodeType===1&&e.push(j[t]);else s(k,e);l&&(m(l,h,e,f),m.uniqueSort(e));return e};m.uniqueSort=function(a){if(u){h=i,a.sort(u);if(h)for(var b=1;b0},m.find=function(a,b,c){var d,e,f,g,h,i;if(!a)return[];for(e=0,f=o.order.length;e":function(a,b){var c,d=typeof b=="string",e=0,f=a.length;if(d&&!l.test(b)){b=b.toLowerCase();for(;e=0)?c||d.push(h):c&&(b[g]=!1));return!1},ID:function(a){return a[1].replace(j,"")},TAG:function(a,b){return a[1].replace(j,"").toLowerCase()},CHILD:function(a){if(a[1]==="nth"){a[2]||m.error(a[0]),a[2]=a[2].replace(/^\+|\s*/g,"");var b=/(-?)(\d*)(?:n([+\-]?\d*))?/.exec(a[2]==="even"&&"2n"||a[2]==="odd"&&"2n+1"||!/\D/.test(a[2])&&"0n+"+a[2]||a[2]);a[2]=b[1]+(b[2]||1)-0,a[3]=b[3]-0}else a[2]&&m.error(a[0]);a[0]=e++;return a},ATTR:function(a,b,c,d,e,f){var g=a[1]=a[1].replace(j,"");!f&&o.attrMap[g]&&(a[1]=o.attrMap[g]),a[4]=(a[4]||a[5]||"").replace(j,""),a[2]==="~="&&(a[4]=" "+a[4]+" ");return a},PSEUDO:function(b,c,d,e,f){if(b[1]==="not")if((a.exec(b[3])||"").length>1||/^\w/.test(b[3]))b[3]=m(b[3],null,null,c);else{var g=m.filter(b[3],c,d,!0^f);d||e.push.apply(e,g);return!1}else if(o.match.POS.test(b[0])||o.match.CHILD.test(b[0]))return!0;return b},POS:function(a){a.unshift(!0);return a}},filters:{enabled:function(a){return a.disabled===!1&&a.type!=="hidden"},disabled:function(a){return a.disabled===!0},checked:function(a){return a.checked===!0},selected:function(a){a.parentNode&&a.parentNode.selectedIndex;return a.selected===!0},parent:function(a){return!!a.firstChild},empty:function(a){return!a.firstChild},has:function(a,b,c){return!!m(c[3],a).length},header:function(a){return/h\d/i.test(a.nodeName)},text:function(a){var b=a.getAttribute("type"),c=a.type;return a.nodeName.toLowerCase()==="input"&&"text"===c&&(b===c||b===null)},radio:function(a){return a.nodeName.toLowerCase()==="input"&&"radio"===a.type},checkbox:function(a){return a.nodeName.toLowerCase()==="input"&&"checkbox"===a.type},file:function(a){return a.nodeName.toLowerCase()==="input"&&"file"===a.type},password:function(a){return a.nodeName.toLowerCase()==="input"&&"password"===a.type},submit:function(a){var b=a.nodeName.toLowerCase();return(b==="input"||b==="button")&&"submit"===a.type},image:function(a){return a.nodeName.toLowerCase()==="input"&&"image"===a.type},reset:function(a){var b=a.nodeName.toLowerCase();return(b==="input"||b==="button")&&"reset"===a.type},button:function(a){var b=a.nodeName.toLowerCase();return b==="input"&&"button"===a.type||b==="button"},input:function(a){return/input|select|textarea|button/i.test(a.nodeName)},focus:function(a){return a===a.ownerDocument.activeElement}},setFilters:{first:function(a,b){return b===0},last:function(a,b,c,d){return b===d.length-1},even:function(a,b){return b%2===0},odd:function(a,b){return b%2===1},lt:function(a,b,c){return bc[3]-0},nth:function(a,b,c){return c[3]-0===b},eq:function(a,b,c){return c[3]-0===b}},filter:{PSEUDO:function(a,b,c,d){var e=b[1],f=o.filters[e];if(f)return f(a,c,b,d);if(e==="contains")return(a.textContent||a.innerText||n([a])||"").indexOf(b[3])>=0;if(e==="not"){var g=b[3];for(var h=0,i=g.length;h=0}},ID:function(a,b){return a.nodeType===1&&a.getAttribute("id")===b},TAG:function(a,b){return b==="*"&&a.nodeType===1||!!a.nodeName&&a.nodeName.toLowerCase()===b},CLASS:function(a,b){return(" "+(a.className||a.getAttribute("class"))+" ").indexOf(b)>-1},ATTR:function(a,b){var c=b[1],d=m.attr?m.attr(a,c):o.attrHandle[c]?o.attrHandle[c](a):a[c]!=null?a[c]:a.getAttribute(c),e=d+"",f=b[2],g=b[4];return d==null?f==="!=":!f&&m.attr?d!=null:f==="="?e===g:f==="*="?e.indexOf(g)>=0:f==="~="?(" "+e+" ").indexOf(g)>=0:g?f==="!="?e!==g:f==="^="?e.indexOf(g)===0:f==="$="?e.substr(e.length-g.length)===g:f==="|="?e===g||e.substr(0,g.length+1)===g+"-":!1:e&&d!==!1},POS:function(a,b,c,d){var e=b[2],f=o.setFilters[e];if(f)return f(a,c,b,d)}}},p=o.match.POS,q=function(a,b){return"\\"+(b-0+1)};for(var r in o.match)o.match[r]=new RegExp(o.match[r].source+/(?![^\[]*\])(?![^\(]*\))/.source),o.leftMatch[r]=new RegExp(/(^(?:.|\r|\n)*?)/.source+o.match[r].source.replace(/\\(\d+)/g,q));var s=function(a,b){a=Array.prototype.slice.call(a,0);if(b){b.push.apply(b,a);return b}return a};try{Array.prototype.slice.call(c.documentElement.childNodes,0)[0].nodeType}catch(t){s=function(a,b){var c=0,d=b||[];if(g.call(a)==="[object Array]")Array.prototype.push.apply(d,a);else if(typeof a.length=="number")for(var e=a.length;c",e.insertBefore(a,e.firstChild),c.getElementById(d)&&(o.find.ID=function(a,c,d){if(typeof c.getElementById!="undefined"&&!d){var e=c.getElementById(a[1]);return e?e.id===a[1]||typeof e.getAttributeNode!="undefined"&&e.getAttributeNode("id").nodeValue===a[1]?[e]:b:[]}},o.filter.ID=function(a,b){var c=typeof a.getAttributeNode!="undefined"&&a.getAttributeNode("id");return a.nodeType===1&&c&&c.nodeValue===b}),e.removeChild(a),e=a=null}(),function(){var a=c.createElement("div");a.appendChild(c.createComment("")),a.getElementsByTagName("*").length>0&&(o.find.TAG=function(a,b){var c=b.getElementsByTagName(a[1]);if(a[1]==="*"){var d=[];for(var e=0;c[e];e++)c[e].nodeType===1&&d.push(c[e]);c=d}return c}),a.innerHTML="",a.firstChild&&typeof a.firstChild.getAttribute!="undefined"&&a.firstChild.getAttribute("href")!=="#"&&(o.attrHandle.href=function(a){return a.getAttribute("href",2)}),a=null}(),c.querySelectorAll&&function(){var a=m,b=c.createElement("div"),d="__sizzle__";b.innerHTML="

";if(!b.querySelectorAll||b.querySelectorAll(".TEST").length!==0){m=function(b,e,f,g){e=e||c;if(!g&&!m.isXML(e)){var h=/^(\w+$)|^\.([\w\-]+$)|^#([\w\-]+$)/.exec(b);if(h&&(e.nodeType===1||e.nodeType===9)){if(h[1])return s(e.getElementsByTagName(b),f);if(h[2]&&o.find.CLASS&&e.getElementsByClassName)return s(e.getElementsByClassName(h[2]),f)}if(e.nodeType===9){if(b==="body"&&e.body)return s([e.body],f);if(h&&h[3]){var i=e.getElementById(h[3]);if(!i||!i.parentNode)return s([],f);if(i.id===h[3])return s([i],f)}try{return s(e.querySelectorAll(b),f)}catch(j){}}else if(e.nodeType===1&&e.nodeName.toLowerCase()!=="object"){var k=e,l=e.getAttribute("id"),n=l||d,p=e.parentNode,q=/^\s*[+~]/.test(b);l?n=n.replace(/'/g,"\\$&"):e.setAttribute("id",n),q&&p&&(e=e.parentNode);try{if(!q||p)return s(e.querySelectorAll("[id='"+n+"'] "+b),f)}catch(r){}finally{l||k.removeAttribute("id")}}}return a(b,e,f,g)};for(var e in a)m[e]=a[e];b=null}}(),function(){var a=c.documentElement,b=a.matchesSelector||a.mozMatchesSelector||a.webkitMatchesSelector||a.msMatchesSelector;if(b){var d=!b.call(c.createElement("div"),"div"),e=!1;try{b.call(c.documentElement,"[test!='']:sizzle")}catch(f){e=!0}m.matchesSelector=function(a,c){c=c.replace(/\=\s*([^'"\]]*)\s*\]/g,"='$1']");if(!m.isXML(a))try{if(e||!o.match.PSEUDO.test(c)&&!/!=/.test(c)){var f=b.call(a,c);if(f||!d||a.document&&a.document.nodeType!==11)return f}}catch(g){}return m(c,null,null,[a]).length>0}}}(),function(){var a=c.createElement("div");a.innerHTML="
";if(!!a.getElementsByClassName&&a.getElementsByClassName("e").length!==0){a.lastChild.className="e";if(a.getElementsByClassName("e").length===1)return;o.order.splice(1,0,"CLASS"),o.find.CLASS=function(a,b,c){if(typeof b.getElementsByClassName!="undefined"&&!c)return b.getElementsByClassName(a[1])},a=null}}(),c.documentElement.contains?m.contains=function(a,b){return a!==b&&(a.contains?a.contains(b):!0)}:c.documentElement.compareDocumentPosition?m.contains=function(a,b){return!!(a.compareDocumentPosition(b)&16)}:m.contains=function(){return!1},m.isXML=function(a){var b=(a?a.ownerDocument||a:0).documentElement;return b?b.nodeName!=="HTML":!1};var y=function(a,b,c){var d,e=[],f="",g=b.nodeType?[b]:b;while(d=o.match.PSEUDO.exec(a))f+=d[0],a=a.replace(o.match.PSEUDO,"");a=o.relative[a]?a+"*":a;for(var h=0,i=g.length;h0)for(h=g;h=0:f.filter(a,this).length>0:this.filter(a).length>0)},closest:function(a,b){var c=[],d,e,g=this[0];if(f.isArray(a)){var h=1;while(g&&g.ownerDocument&&g!==b){for(d=0;d-1:f.find.matchesSelector(g,a)){c.push(g);break}g=g.parentNode;if(!g||!g.ownerDocument||g===b||g.nodeType===11)break}}c=c.length>1?f.unique(c):c;return this.pushStack(c,"closest",a)},index:function(a){if(!a)return this[0]&&this[0].parentNode?this.prevAll().length:-1;if(typeof a=="string")return f.inArray(this[0],f(a));return f.inArray(a.jquery?a[0]:a,this)},add:function(a,b){var c=typeof a=="string"?f(a,b):f.makeArray(a&&a.nodeType?[a]:a),d=f.merge(this.get(),c);return this.pushStack(S(c[0])||S(d[0])?d:f.unique(d))},andSelf:function(){return this.add(this.prevObject)}}),f.each({parent:function(a){var b=a.parentNode;return b&&b.nodeType!==11?b:null},parents:function(a){return f.dir(a,"parentNode")},parentsUntil:function(a,b,c){return f.dir(a,"parentNode",c)},next:function(a){return f.nth(a,2,"nextSibling")},prev:function(a){return f.nth(a,2,"previousSibling")},nextAll:function(a){return f.dir(a,"nextSibling")},prevAll:function(a){return f.dir(a,"previousSibling")},nextUntil:function(a,b,c){return f.dir(a,"nextSibling",c)},prevUntil:function(a,b,c){return f.dir(a,"previousSibling",c)},siblings:function(a){return f.sibling(a.parentNode.firstChild,a)},children:function(a){return f.sibling(a.firstChild)},contents:function(a){return f.nodeName(a,"iframe")?a.contentDocument||a.contentWindow.document:f.makeArray(a.childNodes)}},function(a,b){f.fn[a]=function(c,d){var e=f.map(this,b,c);L.test(a)||(d=c),d&&typeof d=="string"&&(e=f.filter(d,e)),e=this.length>1&&!R[a]?f.unique(e):e,(this.length>1||N.test(d))&&M.test(a)&&(e=e.reverse());return this.pushStack(e,a,P.call(arguments).join(","))}}),f.extend({filter:function(a,b,c){c&&(a=":not("+a+")");return b.length===1?f.find.matchesSelector(b[0],a)?[b[0]]:[]:f.find.matches(a,b)},dir:function(a,c,d){var e=[],g=a[c];while(g&&g.nodeType!==9&&(d===b||g.nodeType!==1||!f(g).is(d)))g.nodeType===1&&e.push(g),g=g[c];return e},nth:function(a,b,c,d){b=b||1;var e=0;for(;a;a=a[c])if(a.nodeType===1&&++e===b)break;return a},sibling:function(a,b){var c=[];for(;a;a=a.nextSibling)a.nodeType===1&&a!==b&&c.push(a);return c}});var V="abbr|article|aside|audio|canvas|datalist|details|figcaption|figure|footer|header|hgroup|mark|meter|nav|output|progress|section|summary|time|video",W=/ jQuery\d+="(?:\d+|null)"/g,X=/^\s+/,Y=/<(?!area|br|col|embed|hr|img|input|link|meta|param)(([\w:]+)[^>]*)\/>/ig,Z=/<([\w:]+)/,$=/",""],legend:[1,"
","
"],thead:[1,"","
"],tr:[2,"","
"],td:[3,"","
"],col:[2,"","
"],area:[1,"",""],_default:[0,"",""]},bh=U(c);bg.optgroup=bg.option,bg.tbody=bg.tfoot=bg.colgroup=bg.caption=bg.thead,bg.th=bg.td,f.support.htmlSerialize||(bg._default=[1,"div
","
"]),f.fn.extend({text:function(a){if(f.isFunction(a))return this.each(function(b){var c=f(this);c.text(a.call(this,b,c.text()))});if(typeof a!="object"&&a!==b)return this.empty().append((this[0]&&this[0].ownerDocument||c).createTextNode(a));return f.text(this)},wrapAll:function(a){if(f.isFunction(a))return this.each(function(b){f(this).wrapAll(a.call(this,b))});if(this[0]){var b=f(a,this[0].ownerDocument).eq(0).clone(!0);this[0].parentNode&&b.insertBefore(this[0]),b.map(function(){var a=this;while(a.firstChild&&a.firstChild.nodeType===1)a=a.firstChild;return a}).append(this)}return this},wrapInner:function(a){if(f.isFunction(a))return this.each(function(b){f(this).wrapInner(a.call(this,b))});return this.each(function(){var b=f(this),c=b.contents();c.length?c.wrapAll(a):b.append(a)})},wrap:function(a){var b=f.isFunction(a);return this.each(function(c){f(this).wrapAll(b?a.call(this,c):a)})},unwrap:function(){return this.parent().each(function(){f.nodeName(this,"body")||f(this).replaceWith(this.childNodes)}).end()},append:function(){return this.domManip(arguments,!0,function(a){this.nodeType===1&&this.appendChild(a)})},prepend:function(){return this.domManip(arguments,!0,function(a){this.nodeType===1&&this.insertBefore(a,this.firstChild)})},before:function(){if(this[0]&&this[0].parentNode)return this.domManip(arguments,!1,function(a){this.parentNode.insertBefore(a,this)});if(arguments.length){var a=f.clean(arguments);a.push.apply(a,this.toArray());return this.pushStack(a,"before",arguments)}},after:function(){if(this[0]&&this[0].parentNode)return this.domManip(arguments,!1,function(a){this.parentNode.insertBefore(a,this.nextSibling)});if(arguments.length){var a=this.pushStack(this,"after",arguments);a.push.apply(a,f.clean(arguments));return a}},remove:function(a,b){for(var c=0,d;(d=this[c])!=null;c++)if(!a||f.filter(a,[d]).length)!b&&d.nodeType===1&&(f.cleanData(d.getElementsByTagName("*")),f.cleanData([d])),d.parentNode&&d.parentNode.removeChild(d);return this},empty:function() +{for(var a=0,b;(b=this[a])!=null;a++){b.nodeType===1&&f.cleanData(b.getElementsByTagName("*"));while(b.firstChild)b.removeChild(b.firstChild)}return this},clone:function(a,b){a=a==null?!1:a,b=b==null?a:b;return this.map(function(){return f.clone(this,a,b)})},html:function(a){if(a===b)return this[0]&&this[0].nodeType===1?this[0].innerHTML.replace(W,""):null;if(typeof a=="string"&&!ba.test(a)&&(f.support.leadingWhitespace||!X.test(a))&&!bg[(Z.exec(a)||["",""])[1].toLowerCase()]){a=a.replace(Y,"<$1>");try{for(var c=0,d=this.length;c1&&l0?this.clone(!0):this).get();f(e[h])[b](j),d=d.concat(j)}return this.pushStack(d,a,e.selector)}}),f.extend({clone:function(a,b,c){var d,e,g,h=f.support.html5Clone||!bc.test("<"+a.nodeName)?a.cloneNode(!0):bo(a);if((!f.support.noCloneEvent||!f.support.noCloneChecked)&&(a.nodeType===1||a.nodeType===11)&&!f.isXMLDoc(a)){bk(a,h),d=bl(a),e=bl(h);for(g=0;d[g];++g)e[g]&&bk(d[g],e[g])}if(b){bj(a,h);if(c){d=bl(a),e=bl(h);for(g=0;d[g];++g)bj(d[g],e[g])}}d=e=null;return h},clean:function(a,b,d,e){var g;b=b||c,typeof b.createElement=="undefined"&&(b=b.ownerDocument||b[0]&&b[0].ownerDocument||c);var h=[],i;for(var j=0,k;(k=a[j])!=null;j++){typeof k=="number"&&(k+="");if(!k)continue;if(typeof k=="string")if(!_.test(k))k=b.createTextNode(k);else{k=k.replace(Y,"<$1>");var l=(Z.exec(k)||["",""])[1].toLowerCase(),m=bg[l]||bg._default,n=m[0],o=b.createElement("div");b===c?bh.appendChild(o):U(b).appendChild(o),o.innerHTML=m[1]+k+m[2];while(n--)o=o.lastChild;if(!f.support.tbody){var p=$.test(k),q=l==="table"&&!p?o.firstChild&&o.firstChild.childNodes:m[1]===""&&!p?o.childNodes:[];for(i=q.length-1;i>=0;--i)f.nodeName(q[i],"tbody")&&!q[i].childNodes.length&&q[i].parentNode.removeChild(q[i])}!f.support.leadingWhitespace&&X.test(k)&&o.insertBefore(b.createTextNode(X.exec(k)[0]),o.firstChild),k=o.childNodes}var r;if(!f.support.appendChecked)if(k[0]&&typeof (r=k.length)=="number")for(i=0;i=0)return b+"px"}}}),f.support.opacity||(f.cssHooks.opacity={get:function(a,b){return br.test((b&&a.currentStyle?a.currentStyle.filter:a.style.filter)||"")?parseFloat(RegExp.$1)/100+"":b?"1":""},set:function(a,b){var c=a.style,d=a.currentStyle,e=f.isNumeric(b)?"alpha(opacity="+b*100+")":"",g=d&&d.filter||c.filter||"";c.zoom=1;if(b>=1&&f.trim(g.replace(bq,""))===""){c.removeAttribute("filter");if(d&&!d.filter)return}c.filter=bq.test(g)?g.replace(bq,e):g+" "+e}}),f(function(){f.support.reliableMarginRight||(f.cssHooks.marginRight={get:function(a,b){var c;f.swap(a,{display:"inline-block"},function(){b?c=bz(a,"margin-right","marginRight"):c=a.style.marginRight});return c}})}),c.defaultView&&c.defaultView.getComputedStyle&&(bA=function(a,b){var c,d,e;b=b.replace(bs,"-$1").toLowerCase(),(d=a.ownerDocument.defaultView)&&(e=d.getComputedStyle(a,null))&&(c=e.getPropertyValue(b),c===""&&!f.contains(a.ownerDocument.documentElement,a)&&(c=f.style(a,b)));return c}),c.documentElement.currentStyle&&(bB=function(a,b){var c,d,e,f=a.currentStyle&&a.currentStyle[b],g=a.style;f===null&&g&&(e=g[b])&&(f=e),!bt.test(f)&&bu.test(f)&&(c=g.left,d=a.runtimeStyle&&a.runtimeStyle.left,d&&(a.runtimeStyle.left=a.currentStyle.left),g.left=b==="fontSize"?"1em":f||0,f=g.pixelLeft+"px",g.left=c,d&&(a.runtimeStyle.left=d));return f===""?"auto":f}),bz=bA||bB,f.expr&&f.expr.filters&&(f.expr.filters.hidden=function(a){var b=a.offsetWidth,c=a.offsetHeight;return b===0&&c===0||!f.support.reliableHiddenOffsets&&(a.style&&a.style.display||f.css(a,"display"))==="none"},f.expr.filters.visible=function(a){return!f.expr.filters.hidden(a)});var bD=/%20/g,bE=/\[\]$/,bF=/\r?\n/g,bG=/#.*$/,bH=/^(.*?):[ \t]*([^\r\n]*)\r?$/mg,bI=/^(?:color|date|datetime|datetime-local|email|hidden|month|number|password|range|search|tel|text|time|url|week)$/i,bJ=/^(?:about|app|app\-storage|.+\-extension|file|res|widget):$/,bK=/^(?:GET|HEAD)$/,bL=/^\/\//,bM=/\?/,bN=/)<[^<]*)*<\/script>/gi,bO=/^(?:select|textarea)/i,bP=/\s+/,bQ=/([?&])_=[^&]*/,bR=/^([\w\+\.\-]+:)(?:\/\/([^\/?#:]*)(?::(\d+))?)?/,bS=f.fn.load,bT={},bU={},bV,bW,bX=["*/"]+["*"];try{bV=e.href}catch(bY){bV=c.createElement("a"),bV.href="",bV=bV.href}bW=bR.exec(bV.toLowerCase())||[],f.fn.extend({load:function(a,c,d){if(typeof a!="string"&&bS)return bS.apply(this,arguments);if(!this.length)return this;var e=a.indexOf(" ");if(e>=0){var g=a.slice(e,a.length);a=a.slice(0,e)}var h="GET";c&&(f.isFunction(c)?(d=c,c=b):typeof c=="object"&&(c=f.param(c,f.ajaxSettings.traditional),h="POST"));var i=this;f.ajax({url:a,type:h,dataType:"html",data:c,complete:function(a,b,c){c=a.responseText,a.isResolved()&&(a.done(function(a){c=a}),i.html(g?f("
").append(c.replace(bN,"")).find(g):c)),d&&i.each(d,[c,b,a])}});return this},serialize:function(){return f.param(this.serializeArray())},serializeArray:function(){return this.map(function(){return this.elements?f.makeArray(this.elements):this}).filter(function(){return this.name&&!this.disabled&&(this.checked||bO.test(this.nodeName)||bI.test(this.type))}).map(function(a,b){var c=f(this).val();return c==null?null:f.isArray(c)?f.map(c,function(a,c){return{name:b.name,value:a.replace(bF,"\r\n")}}):{name:b.name,value:c.replace(bF,"\r\n")}}).get()}}),f.each("ajaxStart ajaxStop ajaxComplete ajaxError ajaxSuccess ajaxSend".split(" "),function(a,b){f.fn[b]=function(a){return this.on(b,a)}}),f.each(["get","post"],function(a,c){f[c]=function(a,d,e,g){f.isFunction(d)&&(g=g||e,e=d,d=b);return f.ajax({type:c,url:a,data:d,success:e,dataType:g})}}),f.extend({getScript:function(a,c){return f.get(a,b,c,"script")},getJSON:function(a,b,c){return f.get(a,b,c,"json")},ajaxSetup:function(a,b){b?b_(a,f.ajaxSettings):(b=a,a=f.ajaxSettings),b_(a,b);return a},ajaxSettings:{url:bV,isLocal:bJ.test(bW[1]),global:!0,type:"GET",contentType:"application/x-www-form-urlencoded",processData:!0,async:!0,accepts:{xml:"application/xml, text/xml",html:"text/html",text:"text/plain",json:"application/json, text/javascript","*":bX},contents:{xml:/xml/,html:/html/,json:/json/},responseFields:{xml:"responseXML",text:"responseText"},converters:{"* text":a.String,"text html":!0,"text json":f.parseJSON,"text xml":f.parseXML},flatOptions:{context:!0,url:!0}},ajaxPrefilter:bZ(bT),ajaxTransport:bZ(bU),ajax:function(a,c){function w(a,c,l,m){if(s!==2){s=2,q&&clearTimeout(q),p=b,n=m||"",v.readyState=a>0?4:0;var o,r,u,w=c,x=l?cb(d,v,l):b,y,z;if(a>=200&&a<300||a===304){if(d.ifModified){if(y=v.getResponseHeader("Last-Modified"))f.lastModified[k]=y;if(z=v.getResponseHeader("Etag"))f.etag[k]=z}if(a===304)w="notmodified",o=!0;else try{r=cc(d,x),w="success",o=!0}catch(A){w="parsererror",u=A}}else{u=w;if(!w||a)w="error",a<0&&(a=0)}v.status=a,v.statusText=""+(c||w),o?h.resolveWith(e,[r,w,v]):h.rejectWith(e,[v,w,u]),v.statusCode(j),j=b,t&&g.trigger("ajax"+(o?"Success":"Error"),[v,d,o?r:u]),i.fireWith(e,[v,w]),t&&(g.trigger("ajaxComplete",[v,d]),--f.active||f.event.trigger("ajaxStop"))}}typeof a=="object"&&(c=a,a=b),c=c||{};var d=f.ajaxSetup({},c),e=d.context||d,g=e!==d&&(e.nodeType||e instanceof f)?f(e):f.event,h=f.Deferred(),i=f.Callbacks("once memory"),j=d.statusCode||{},k,l={},m={},n,o,p,q,r,s=0,t,u,v={readyState:0,setRequestHeader:function(a,b){if(!s){var c=a.toLowerCase();a=m[c]=m[c]||a,l[a]=b}return this},getAllResponseHeaders:function(){return s===2?n:null},getResponseHeader:function(a){var c;if(s===2){if(!o){o={};while(c=bH.exec(n))o[c[1].toLowerCase()]=c[2]}c=o[a.toLowerCase()]}return c===b?null:c},overrideMimeType:function(a){s||(d.mimeType=a);return this},abort:function(a){a=a||"abort",p&&p.abort(a),w(0,a);return this}};h.promise(v),v.success=v.done,v.error=v.fail,v.complete=i.add,v.statusCode=function(a){if(a){var b;if(s<2)for(b in a)j[b]=[j[b],a[b]];else b=a[v.status],v.then(b,b)}return this},d.url=((a||d.url)+"").replace(bG,"").replace(bL,bW[1]+"//"),d.dataTypes=f.trim(d.dataType||"*").toLowerCase().split(bP),d.crossDomain==null&&(r=bR.exec(d.url.toLowerCase()),d.crossDomain=!(!r||r[1]==bW[1]&&r[2]==bW[2]&&(r[3]||(r[1]==="http:"?80:443))==(bW[3]||(bW[1]==="http:"?80:443)))),d.data&&d.processData&&typeof d.data!="string"&&(d.data=f.param(d.data,d.traditional)),b$(bT,d,c,v);if(s===2)return!1;t=d.global,d.type=d.type.toUpperCase(),d.hasContent=!bK.test(d.type),t&&f.active++===0&&f.event.trigger("ajaxStart");if(!d.hasContent){d.data&&(d.url+=(bM.test(d.url)?"&":"?")+d.data,delete d.data),k=d.url;if(d.cache===!1){var x=f.now(),y=d.url.replace(bQ,"$1_="+x);d.url=y+(y===d.url?(bM.test(d.url)?"&":"?")+"_="+x:"")}}(d.data&&d.hasContent&&d.contentType!==!1||c.contentType)&&v.setRequestHeader("Content-Type",d.contentType),d.ifModified&&(k=k||d.url,f.lastModified[k]&&v.setRequestHeader("If-Modified-Since",f.lastModified[k]),f.etag[k]&&v.setRequestHeader("If-None-Match",f.etag[k])),v.setRequestHeader("Accept",d.dataTypes[0]&&d.accepts[d.dataTypes[0]]?d.accepts[d.dataTypes[0]]+(d.dataTypes[0]!=="*"?", "+bX+"; q=0.01":""):d.accepts["*"]);for(u in d.headers)v.setRequestHeader(u,d.headers[u]);if(d.beforeSend&&(d.beforeSend.call(e,v,d)===!1||s===2)){v.abort();return!1}for(u in{success:1,error:1,complete:1})v[u](d[u]);p=b$(bU,d,c,v);if(!p)w(-1,"No Transport");else{v.readyState=1,t&&g.trigger("ajaxSend",[v,d]),d.async&&d.timeout>0&&(q=setTimeout(function(){v.abort("timeout")},d.timeout));try{s=1,p.send(l,w)}catch(z){if(s<2)w(-1,z);else throw z}}return v},param:function(a,c){var d=[],e=function(a,b){b=f.isFunction(b)?b():b,d[d.length]=encodeURIComponent(a)+"="+encodeURIComponent(b)};c===b&&(c=f.ajaxSettings.traditional);if(f.isArray(a)||a.jquery&&!f.isPlainObject(a))f.each(a,function(){e(this.name,this.value)});else for(var g in a)ca(g,a[g],c,e);return d.join("&").replace(bD,"+")}}),f.extend({active:0,lastModified:{},etag:{}});var cd=f.now(),ce=/(\=)\?(&|$)|\?\?/i;f.ajaxSetup({jsonp:"callback",jsonpCallback:function(){return f.expando+"_"+cd++}}),f.ajaxPrefilter("json jsonp",function(b,c,d){var e=b.contentType==="application/x-www-form-urlencoded"&&typeof b.data=="string";if(b.dataTypes[0]==="jsonp"||b.jsonp!==!1&&(ce.test(b.url)||e&&ce.test(b.data))){var g,h=b.jsonpCallback=f.isFunction(b.jsonpCallback)?b.jsonpCallback():b.jsonpCallback,i=a[h],j=b.url,k=b.data,l="$1"+h+"$2";b.jsonp!==!1&&(j=j.replace(ce,l),b.url===j&&(e&&(k=k.replace(ce,l)),b.data===k&&(j+=(/\?/.test(j)?"&":"?")+b.jsonp+"="+h))),b.url=j,b.data=k,a[h]=function(a){g=[a]},d.always(function(){a[h]=i,g&&f.isFunction(i)&&a[h](g[0])}),b.converters["script json"]=function(){g||f.error(h+" was not called");return g[0]},b.dataTypes[0]="json";return"script"}}),f.ajaxSetup({accepts:{script:"text/javascript, application/javascript, application/ecmascript, application/x-ecmascript"},contents:{script:/javascript|ecmascript/},converters:{"text script":function(a){f.globalEval(a);return a}}}),f.ajaxPrefilter("script",function(a){a.cache===b&&(a.cache=!1),a.crossDomain&&(a.type="GET",a.global=!1)}),f.ajaxTransport("script",function(a){if(a.crossDomain){var d,e=c.head||c.getElementsByTagName("head")[0]||c.documentElement;return{send:function(f,g){d=c.createElement("script"),d.async="async",a.scriptCharset&&(d.charset=a.scriptCharset),d.src=a.url,d.onload=d.onreadystatechange=function(a,c){if(c||!d.readyState||/loaded|complete/.test(d.readyState))d.onload=d.onreadystatechange=null,e&&d.parentNode&&e.removeChild(d),d=b,c||g(200,"success")},e.insertBefore(d,e.firstChild)},abort:function(){d&&d.onload(0,1)}}}});var cf=a.ActiveXObject?function(){for(var a in ch)ch[a](0,1)}:!1,cg=0,ch;f.ajaxSettings.xhr=a.ActiveXObject?function(){return!this.isLocal&&ci()||cj()}:ci,function(a){f.extend(f.support,{ajax:!!a,cors:!!a&&"withCredentials"in a})}(f.ajaxSettings.xhr()),f.support.ajax&&f.ajaxTransport(function(c){if(!c.crossDomain||f.support.cors){var d;return{send:function(e,g){var h=c.xhr(),i,j;c.username?h.open(c.type,c.url,c.async,c.username,c.password):h.open(c.type,c.url,c.async);if(c.xhrFields)for(j in c.xhrFields)h[j]=c.xhrFields[j];c.mimeType&&h.overrideMimeType&&h.overrideMimeType(c.mimeType),!c.crossDomain&&!e["X-Requested-With"]&&(e["X-Requested-With"]="XMLHttpRequest");try{for(j in e)h.setRequestHeader(j,e[j])}catch(k){}h.send(c.hasContent&&c.data||null),d=function(a,e){var j,k,l,m,n;try{if(d&&(e||h.readyState===4)){d=b,i&&(h.onreadystatechange=f.noop,cf&&delete ch[i]);if(e)h.readyState!==4&&h.abort();else{j=h.status,l=h.getAllResponseHeaders(),m={},n=h.responseXML,n&&n.documentElement&&(m.xml=n),m.text=h.responseText;try{k=h.statusText}catch(o){k=""}!j&&c.isLocal&&!c.crossDomain?j=m.text?200:404:j===1223&&(j=204)}}}catch(p){e||g(-1,p)}m&&g(j,k,m,l)},!c.async||h.readyState===4?d():(i=++cg,cf&&(ch||(ch={},f(a).unload(cf)),ch[i]=d),h.onreadystatechange=d)},abort:function(){d&&d(0,1)}}}});var ck={},cl,cm,cn=/^(?:toggle|show|hide)$/,co=/^([+\-]=)?([\d+.\-]+)([a-z%]*)$/i,cp,cq=[["height","marginTop","marginBottom","paddingTop","paddingBottom"],["width","marginLeft","marginRight","paddingLeft","paddingRight"],["opacity"]],cr;f.fn.extend({show:function(a,b,c){var d,e;if(a||a===0)return this.animate(cu("show",3),a,b,c);for(var g=0,h=this.length;g=i.duration+this.startTime){this.now=this.end,this.pos=this.state=1,this.update(),i.animatedProperties[this.prop]=!0;for(b in i.animatedProperties)i.animatedProperties[b]!==!0&&(g=!1);if(g){i.overflow!=null&&!f.support.shrinkWrapBlocks&&f.each(["","X","Y"],function(a,b){h.style["overflow"+b]=i.overflow[a]}),i.hide&&f(h).hide();if(i.hide||i.show)for(b in i.animatedProperties)f.style(h,b,i.orig[b]),f.removeData(h,"fxshow"+b,!0),f.removeData(h,"toggle"+b,!0);d=i.complete,d&&(i.complete=!1,d.call(h))}return!1}i.duration==Infinity?this.now=e:(c=e-this.startTime,this.state=c/i.duration,this.pos=f.easing[i.animatedProperties[this.prop]](this.state,c,0,1,i.duration),this.now=this.start+(this.end-this.start)*this.pos),this.update();return!0}},f.extend(f.fx,{tick:function(){var a,b=f.timers,c=0;for(;c-1,k={},l={},m,n;j?(l=e.position(),m=l.top,n=l.left):(m=parseFloat(h)||0,n=parseFloat(i)||0),f.isFunction(b)&&(b=b.call(a,c,g)),b.top!=null&&(k.top=b.top-g.top+m),b.left!=null&&(k.left=b.left-g.left+n),"using"in b?b.using.call(a,k):e.css(k)}},f.fn.extend({position:function(){if(!this[0])return null;var a=this[0],b=this.offsetParent(),c=this.offset(),d=cx.test(b[0].nodeName)?{top:0,left:0}:b.offset();c.top-=parseFloat(f.css(a,"marginTop"))||0,c.left-=parseFloat(f.css(a,"marginLeft"))||0,d.top+=parseFloat(f.css(b[0],"borderTopWidth"))||0,d.left+=parseFloat(f.css(b[0],"borderLeftWidth"))||0;return{top:c.top-d.top,left:c.left-d.left}},offsetParent:function(){return this.map(function(){var a=this.offsetParent||c.body;while(a&&!cx.test(a.nodeName)&&f.css(a,"position")==="static")a=a.offsetParent;return a})}}),f.each(["Left","Top"],function(a,c){var d="scroll"+c;f.fn[d]=function(c){var e,g;if(c===b){e=this[0];if(!e)return null;g=cy(e);return g?"pageXOffset"in g?g[a?"pageYOffset":"pageXOffset"]:f.support.boxModel&&g.document.documentElement[d]||g.document.body[d]:e[d]}return this.each(function(){g=cy(this),g?g.scrollTo(a?f(g).scrollLeft():c,a?c:f(g).scrollTop()):this[d]=c})}}),f.each(["Height","Width"],function(a,c){var d=c.toLowerCase();f.fn["inner"+c]=function(){var a=this[0];return a?a.style?parseFloat(f.css(a,d,"padding")):this[d]():null},f.fn["outer"+c]=function(a){var b=this[0];return b?b.style?parseFloat(f.css(b,d,a?"margin":"border")):this[d]():null},f.fn[d]=function(a){var e=this[0];if(!e)return a==null?null:this;if(f.isFunction(a))return this.each(function(b){var c=f(this);c[d](a.call(this,b,c[d]()))});if(f.isWindow(e)){var g=e.document.documentElement["client"+c],h=e.document.body;return e.document.compatMode==="CSS1Compat"&&g||h&&h["client"+c]||g}if(e.nodeType===9)return Math.max(e.documentElement["client"+c],e.body["scroll"+c],e.documentElement["scroll"+c],e.body["offset"+c],e.documentElement["offset"+c]);if(a===b){var i=f.css(e,d),j=parseFloat(i);return f.isNumeric(j)?j:i}return this.css(d,typeof a=="string"?a:a+"px")}}),a.jQuery=a.$=f,typeof define=="function"&&define.amd&&define.amd.jQuery&&define("jquery",[],function(){return f})})(window); \ No newline at end of file diff --git a/doc/puppet_class_list.html b/doc/puppet_class_list.html new file mode 100644 index 0000000..11976a7 --- /dev/null +++ b/doc/puppet_class_list.html @@ -0,0 +1,124 @@ + + + + + + + + + + + + + + + + + + Puppet Class List + + + +
+
+

Puppet Class List

+ + + +
+ + +
+ + diff --git a/doc/puppet_classes/cd_nrpe.html b/doc/puppet_classes/cd_nrpe.html new file mode 100644 index 0000000..8fa1b87 --- /dev/null +++ b/doc/puppet_classes/cd_nrpe.html @@ -0,0 +1,121 @@ + + + + + + + Puppet Class: cd_nrpe + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: cd_nrpe

+
+ + +
+
Defined in:
+
+ manifests/init.pp +
+
+
+ +

Summary

+ Class initializes the cd_nrpe Module. + +

Overview

+
+
+ +

cd_nrpe::init.pp Module name: cd_nrpe Author: Arne Teuke (arne_teuke@confdroid.com)

+ +
+
+ + + +
+ + + +
+
+ + + + +
+
+
+
+6
+7
+8
+
+
# File 'manifests/init.pp', line 6
+
+class cd_nrpe {
+  include cd_nrpe::params
+}
+
+ + + + + + + + \ No newline at end of file diff --git a/doc/puppet_classes/cd_nrpe_3A_3Acommands_3A_3Adefinition_rules.html b/doc/puppet_classes/cd_nrpe_3A_3Acommands_3A_3Adefinition_rules.html new file mode 100644 index 0000000..d3485aa --- /dev/null +++ b/doc/puppet_classes/cd_nrpe_3A_3Acommands_3A_3Adefinition_rules.html @@ -0,0 +1,248 @@ + + + + + + + Puppet Class: cd_nrpe::commands::definition_rules + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: cd_nrpe::commands::definition_rules

+
+ +
+
Inherits:
+
cd_nrpe::params
+
+ + +
+
Defined in:
+
+ manifests/commands/definition_rules.pp +
+
+
+ +

Summary

+ manage command definitions via define and Puppet rules. + +

Overview

+
+
+ +

cd_nrpe::commands::definition_rules.pp Module name: cd_nrpe Author: Arne Teuke (arne_teuke@ConfDroid.com)

+ +
+
+ + + +
+ +
+

Examples:

+ + +
cd_nrpe::commands::definitions { 'check_users':
+  ne_check_cmd      => 'check_users',
+  ne_cmd_argstring  => '-w $ARG1$ -c $ARG2$',
+  ne_cmd_comment    => 'check the amount of user logged in locally',
+}
+ +
+ + + +
+ + + + + +
+
+
+
+12
+13
+14
+15
+16
+17
+18
+19
+20
+21
+22
+23
+24
+25
+26
+27
+28
+29
+30
+31
+32
+33
+34
+35
+36
+37
+38
+39
+40
+41
+42
+43
+44
+45
+46
+47
+48
+49
+50
+51
+52
+53
+54
+55
+56
+57
+58
+59
+60
+61
+62
+63
+64
+65
+66
+67
+68
+69
+
+
# File 'manifests/commands/definition_rules.pp', line 12
+
+class cd_nrpe::commands::definition_rules (
+
+) inherits cd_nrpe::params {
+  if $ne_manage_cmds == true {
+    require cd_nrpe::main::files
+
+    # manage the commands.cfg file
+
+    concat { $ne_cmd_file:
+      ensure   => present,
+      path     => $ne_cmd_file,
+      owner    => $ne_user,
+      group    => $ne_user,
+      mode     => '0640',
+      selrange => s0,
+      selrole  => object_r,
+      seltype  => nrpe_etc_t,
+      seluser  => system_u,
+      notify   => Service[$ne_service],
+    }
+
+    # manage the file header
+
+    concat::fragment { 'nrpe_cmd_header':
+      target  => $ne_cmd_file,
+      content => template($ne_cmd_head_erb),
+      order   => '000',
+    }
+
+    # basic example rules
+
+    cd_nrpe::commands::definitions { 'check_users':
+      ne_check_cmd     => 'check_users',
+      ne_cmd_argstring => '-w $ARG1$ -c $ARG2$',
+      ne_cmd_comment   => 'check the amount of user logged in locally',
+    }
+
+    cd_nrpe::commands::definitions { 'check_load':
+      ne_check_cmd     => 'check_load',
+      ne_cmd_argstring => '-w $ARG1$ -c $ARG2$',
+    }
+
+    cd_nrpe::commands::definitions { 'check_disk':
+      ne_check_cmd     => 'check_disk',
+      ne_cmd_argstring => '-w $ARG1$ -c $ARG2$ -p $ARG3$',
+    }
+
+    cd_nrpe::commands::definitions { 'check_procs':
+      ne_check_cmd     => 'check_procs',
+      ne_cmd_argstring => '-w $ARG1$ -c $ARG2$ -s $ARG3$',
+    }
+
+    cd_nrpe::commands::definitions { 'check_swap':
+      ne_check_cmd     => 'check_swap',
+      ne_cmd_argstring => '-w $ARG1$ -c $ARG2$',
+    }
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/cd_nrpe_3A_3Afirewall_3A_3Aiptables.html b/doc/puppet_classes/cd_nrpe_3A_3Afirewall_3A_3Aiptables.html new file mode 100644 index 0000000..46ea0e2 --- /dev/null +++ b/doc/puppet_classes/cd_nrpe_3A_3Afirewall_3A_3Aiptables.html @@ -0,0 +1,142 @@ + + + + + + + Puppet Class: cd_nrpe::firewall::iptables + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: cd_nrpe::firewall::iptables

+
+ +
+
Inherits:
+
cd_nrpe::params
+
+ + +
+
Defined in:
+
+ manifests/firewall/iptables.pp +
+
+
+ +

Summary

+ manage firewall settings through puppetlabs-firewall + +

Overview

+
+
+ +
+
+ + + +
+ + + +
+ + + + + +
+
+
+
+7
+8
+9
+10
+11
+12
+13
+14
+15
+16
+17
+18
+
+
# File 'manifests/firewall/iptables.pp', line 7
+
+class cd_nrpe::firewall::iptables (
+
+) inherits cd_nrpe::params {
+  if $ne_incl_fw == true {
+    firewall { "${ne_fw_order_no}${ne_nrpe_port} port ${ne_nrpe_port}":
+#      source => $nagios_server,
+      proto => 'tcp',
+      dport => $ne_nrpe_port,
+      jump  => 'accept',
+    }
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Aconfig.html b/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Aconfig.html new file mode 100644 index 0000000..9d29421 --- /dev/null +++ b/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Aconfig.html @@ -0,0 +1,128 @@ + + + + + + + Puppet Class: cd_nrpe::main::config + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: cd_nrpe::main::config

+
+ +
+
Inherits:
+
cd_nrpe::params
+
+ + +
+
Defined in:
+
+ manifests/main/config.pp +
+
+
+ +

Summary

+ Class manages the module logic for cd_nrpe. + +

Overview

+
+
+ +
+
+ + + +
+ + + +
+ + + + + +
+
+
+
+7
+8
+9
+10
+11
+
+
# File 'manifests/main/config.pp', line 7
+
+class cd_nrpe::main::config (
+
+) inherits cd_nrpe::params {
+  include cd_nrpe::main::service
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Adirs.html b/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Adirs.html new file mode 100644 index 0000000..d2410ef --- /dev/null +++ b/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Adirs.html @@ -0,0 +1,182 @@ + + + + + + + Puppet Class: cd_nrpe::main::dirs + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: cd_nrpe::main::dirs

+
+ +
+
Inherits:
+
cd_nrpe::params
+
+ + +
+
Defined in:
+
+ manifests/main/dirs.pp +
+
+
+ +

Summary

+ Class manages all directories required for cd_nrpe. + +

Overview

+
+
+ +

cd_nrpe::main::dirs.pp Module name: cd_nrpe Author: Arne Teuke (arne_teuke@ConfDroid.com)

+ +
+
+ + + +
+ + + +
+ + + + + +
+
+
+
+6
+7
+8
+9
+10
+11
+12
+13
+14
+15
+16
+17
+18
+19
+20
+21
+22
+23
+24
+25
+26
+27
+28
+29
+30
+31
+32
+33
+34
+35
+36
+
+
# File 'manifests/main/dirs.pp', line 6
+
+class cd_nrpe::main::dirs (
+
+) inherits cd_nrpe::params {
+  require cd_nrpe::main::user
+
+  # manage main conf_d_dir
+
+  file { $ne_main_conf_d_dir:
+    ensure   => directory,
+    path     => $ne_main_conf_d_dir,
+    owner    => 'root',
+    group    => 'root',
+    mode     => '0755',
+    selrange => s0,
+    selrole  => object_r,
+    seltype  => etc_t,
+    seluser  => system_u,
+  }
+
+  file { $ne_run_dir:
+    ensure   => directory,
+    path     => $ne_run_dir,
+    owner    => $ne_user,
+    group    => $ne_user,
+    mode     => '0755',
+    selrange => s0,
+    selrole  => object_r,
+    seltype  => var_run_t,
+    seluser  => system_u,
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Afiles.html b/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Afiles.html new file mode 100644 index 0000000..190523f --- /dev/null +++ b/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Afiles.html @@ -0,0 +1,256 @@ + + + + + + + Puppet Class: cd_nrpe::main::files + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: cd_nrpe::main::files

+
+ +
+
Inherits:
+
cd_nrpe::params
+
+ + +
+
Defined in:
+
+ manifests/main/files.pp +
+
+
+ +

Summary

+ Class manages all configuration files required for cd_nrpe. + +

Overview

+
+
+ +

cd_nrpe::main::files.pp Module name: cd_nrpe Author: Arne Teuke (arne_teuke@ConfDroid.com)

+ +
+
+ + + +
+ + + +
+ + + + + +
+
+
+
+6
+7
+8
+9
+10
+11
+12
+13
+14
+15
+16
+17
+18
+19
+20
+21
+22
+23
+24
+25
+26
+27
+28
+29
+30
+31
+32
+33
+34
+35
+36
+37
+38
+39
+40
+41
+42
+43
+44
+45
+46
+47
+48
+49
+50
+51
+52
+53
+54
+55
+56
+57
+58
+59
+60
+61
+62
+63
+64
+65
+66
+67
+68
+69
+70
+71
+72
+73
+
+
# File 'manifests/main/files.pp', line 6
+
+class cd_nrpe::main::files (
+
+) inherits cd_nrpe::params {
+  require cd_nrpe::main::dirs
+
+  # manage /etc/nagios/nrpe.cfg
+
+  file { $ne_main_conf_file:
+    ensure   => file,
+    path     => $ne_main_conf_file,
+    owner    => 'root',
+    group    => 'root',
+    mode     => '0644',
+    selrange => s0,
+    selrole  => object_r,
+    seltype  => nrpe_etc_t,
+    seluser  => system_u,
+    content  => template($ne_main_conf_erb),
+    notify   => Service[$ne_service],
+  }
+
+  # manage /etc/sysconfig/nrpe
+
+  file { $ne_nrpe_conf_file:
+    ensure   => file,
+    path     => $ne_nrpe_conf_file,
+    owner    => 'root',
+    group    => 'root',
+    mode     => '0644',
+    selrange => s0,
+    selrole  => object_r,
+    seltype  => etc_t,
+    seluser  => system_u,
+    content  => template($ne_nrpe_conf_erb),
+    notify   => Service[$ne_service],
+  }
+
+  if $ne_allow_sudo == true {
+
+    file { $ne_sudo_file:
+      ensure   => file,
+      path     => $ne_sudo_file,
+      owner    => 'root',
+      group    => 'root',
+      mode     => '0440',
+      selrange => s0,
+      selrole  => object_r,
+      seltype  => etc_t,
+      seluser  => system_u,
+      content  => template($ne_sudo_rule_erb),
+    }
+
+    # file for sudo  selinux policy
+    file { $ne_nrpe_te_file:
+      ensure   => file,
+      path     => $ne_nrpe_te_file,
+      owner    => 'root',
+      group    => 'root',
+      mode     => '0440',
+      selrange => s0,
+      selrole  => object_r,
+      seltype  => nrpe_etc_t,
+      seluser  => system_u,
+      content  => template($ne_nrpe_te_erb),
+      notify   => Exec['create_nrpe_pp'],
+    }
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Ainstall.html b/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Ainstall.html new file mode 100644 index 0000000..dd10435 --- /dev/null +++ b/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Ainstall.html @@ -0,0 +1,138 @@ + + + + + + + Puppet Class: cd_nrpe::main::install + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: cd_nrpe::main::install

+
+ +
+
Inherits:
+
cd_nrpe::params
+
+ + +
+
Defined in:
+
+ manifests/main/install.pp +
+
+
+ +

Summary

+ Class manages installing binaries required for cd_nrpe + +

Overview

+
+
+ +

cd_nrpe::main::install.pp Module name: cd_nrpe Author: Arne Teuke (arne_teuke@ConfDroid.com)

+ +
+
+ + + +
+ + + +
+ + + + + +
+
+
+
+6
+7
+8
+9
+10
+11
+12
+13
+14
+
+
# File 'manifests/main/install.pp', line 6
+
+class cd_nrpe::main::install (
+
+) inherits cd_nrpe::params {
+  require cd_resources
+
+  package { $reqpackages:
+    ensure => $pkg_ensure,
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Aservice.html b/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Aservice.html new file mode 100644 index 0000000..f9c157a --- /dev/null +++ b/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Aservice.html @@ -0,0 +1,168 @@ + + + + + + + Puppet Class: cd_nrpe::main::service + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: cd_nrpe::main::service

+
+ +
+
Inherits:
+
cd_nrpe::params
+
+ + +
+
Defined in:
+
+ manifests/main/service.pp +
+
+
+ +

Summary

+ Class manages the service(s) for cd_nrpe. + +

Overview

+
+
+ +

cd_nrpe::main::service.pp Module name: cd_nrpe Author: Arne Teuke (arne_teuke@ConfDroid.com)

+ +
+
+ + + +
+ + + +
+ + + + + +
+
+
+
+6
+7
+8
+9
+10
+11
+12
+13
+14
+15
+16
+17
+18
+19
+20
+21
+22
+23
+24
+25
+26
+27
+28
+29
+
+
# File 'manifests/main/service.pp', line 6
+
+class cd_nrpe::main::service (
+
+) inherits cd_nrpe::params {
+  if $ne_incl_fw == true {
+    require cd_nrpe::firewall::iptables
+  }
+
+  require cd_nrpe::main::files
+
+  if $ne_manage_cmds == true {
+    require cd_nrpe::commands::definition_rules
+  }
+
+  if $ne_include_selinux == true {
+    require cd_nrpe::selinux::config
+  }
+
+  service { $ne_service:
+    ensure     => running,
+    hasstatus  => true,
+    hasrestart => true,
+    enable     => true,
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Auser.html b/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Auser.html new file mode 100644 index 0000000..22246d9 --- /dev/null +++ b/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Auser.html @@ -0,0 +1,172 @@ + + + + + + + Puppet Class: cd_nrpe::main::user + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: cd_nrpe::main::user

+
+ +
+
Inherits:
+
cd_nrpe::params
+
+ + +
+
Defined in:
+
+ manifests/main/user.pp +
+
+
+ +

Summary

+ Class manages service users for cd_nrpe. + +

Overview

+
+
+ +

cd_nrpe::main::user.pp Module name: cd_nrpe Author: Arne Teuke (arne_teuke@ConfDroid.com)

+ +
+
+ + + +
+ + + +
+ + + + + +
+
+
+
+6
+7
+8
+9
+10
+11
+12
+13
+14
+15
+16
+17
+18
+19
+20
+21
+22
+23
+24
+25
+26
+27
+28
+29
+30
+31
+
+
# File 'manifests/main/user.pp', line 6
+
+class cd_nrpe::main::user (
+
+) inherits cd_nrpe::params {
+  require cd_nrpe::main::install
+
+  group { $ne_user:
+    ensure    => present,
+    name      => $ne_user,
+    gid       => $ne_user_uid,
+    allowdupe => false,
+  }
+
+  user { $ne_user:
+    ensure     => present,
+    name       => $ne_user,
+    allowdupe  => false,
+    comment    => $ne_user_comment,
+    uid        => $ne_user_uid,
+    gid        => $ne_user,
+    groups     => $ne_user_groups,
+    managehome => true,
+    home       => $ne_user_home,
+    shell      => $ne_user_shell,
+    require    => Group[$ne_user],
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/cd_nrpe_3A_3Aparams.html b/doc/puppet_classes/cd_nrpe_3A_3Aparams.html new file mode 100644 index 0000000..de9c513 --- /dev/null +++ b/doc/puppet_classes/cd_nrpe_3A_3Aparams.html @@ -0,0 +1,998 @@ + + + + + + + Puppet Class: cd_nrpe::params + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: cd_nrpe::params

+ + +

Summary

+ Class holds all parameters for the cd_nrpe module and is +inherited by all classes except defines. + +

Overview

+
+
+ +

cd_nrpe::params.pp Module name: cd_nrpe Author: Arne Teuke (arne_teuke@ConfDroid.com) be passed to the NRPE daemon.

+ +
+
+ + + +
+

Parameters:

+
    + +
  • + + pkg_ensure + + + (String) + + + (defaults to: 'latest') + + + — +
    +

    which package type to choose, i.e. latest or present.

    +
    + +
  • + +
  • + + ne_log_facility + + + (String) + + + (defaults to: 'daemon') + + + — +
    +

    the log facility to use.

    +
    + +
  • + +
  • + + ne_log_file + + + (String) + + + (defaults to: '') + + + — +
    +

    If a log file is specified in this option, nrpe will write to that file instead of using syslog. i.e. /var/run/nrpe.log

    +
    + +
  • + +
  • + + ne_debug + + + (String) + + + (defaults to: '0') + + + — +
    +

    Whether debugging messages are logged to the syslog facility.

    +
    + +
  • + +
  • + + ne_nrpe_port + + + (String) + + + (defaults to: '5666') + + + — +
    +

    the NRPE port. used in firewall ( optional) and configuration file.

    +
    + +
  • + +
  • + + ne_listen_queue_size + + + (String) + + + (defaults to: '5') + + + — +
    +

    Listen queue size (backlog) for serving incoming connections.

    +
    + +
  • + +
  • + + ne_nagios_server + + + (String) + + + (defaults to: $::nagios_server) + + + — +
    +

    ipaddress of the nagios server to be allowed to connect to NRPE service. Default is to look up a global parameter from ENC.

    +
    + +
  • + +
  • + + ne_dont_blame_nrpe + + + (String) + + + (defaults to: '1') + + + — +
    +

    whether or not the NRPE daemon will allow clients to specify arguments to commands that are executed.

    +
    + +
  • + +
  • + + ne_allow_bash_cmd_subst + + + (String) + + + (defaults to: '1') + + + — +
    +

    whether or not the NRPE daemon will allow clients to specify arguments that contain bash command substitutions of the form $(…).

    +
    + +
  • + +
  • + + ne_allow_sudo + + + (Boolean) + + + (defaults to: true) + + + — +
    +

    Whether to allow sudo access. used in nrpe.cfg as well as for creating a sudo role.

    +
    + +
  • + +
  • + + ne_command_prefix + + + (String) + + + (defaults to: '/usr/bin/sudo') + + + — +
    +

    allows you to prefix all commands with a user-defined String.

    +
    + +
  • + +
  • + + ne_incl_fw + + + (Boolean) + + + (defaults to: true) + + + — +
    +

    Whether to include firewall rules

    +
    + +
  • + +
  • + + ne_command_timeout + + + (String) + + + (defaults to: '60') + + + — +
    +

    maximum number of seconds that the NRPE daemon will allow plugins to finish executing before killing them off.

    +
    + +
  • + +
  • + + ne_connection_timeout + + + (String) + + + (defaults to: '300') + + + — +
    +

    maximum number of seconds that the NRPE daemon will wait for a connection to be established before exiting.

    +
    + +
  • + +
  • + + ne_ssl_version + + + (String) + + + (defaults to: 'TLSv2+') + + + — +
    +

    These directives allow you to specify how to use SSL/TLS.

    +
    + +
  • + +
  • + + ne_ssl_use_adh + + + (String) + + + (defaults to: '1') + + + — +
    +

    This is for backward compatibility and is DEPRECATED. Set to 1 to enable ADH or 2 to require ADH. 1 is currently the default but will be changed in a later version.

    +
    + +
  • + +
  • + + ne_ssl_cipher_list + + + (String) + + + (defaults to: 'ALL:!aNULL:!eNULL:!SSLv2:!LOW:!EXP:!RC4:!MD5:@STRENGTH') + + + — +
    +

    ciphers can be used. For backward compatibility, this defaults to ‘ssl_cipher_list=ALL:!MD5:@STRENGTH’ in this version but will be changed in a later version of NRPE.

    +
    + +
  • + +
  • + + ne_ssl_cacert_file + + + (String) + + + (defaults to: '/etc/pki/tls/certs/ca-chain.crt.pem') + + + — +
    +

    path and name of the ssl certificate authority (ca) file / chain. must be full path.

    +
    + +
  • + +
  • + + ne_ssl_cert_file + + + (String) + + + (defaults to: "/etc/pki/tls/certs/${::fqdn}.crt.pem") + + + — +
    +

    path and name of the server ssl certificate. must include full path.

    +
    + +
  • + +
  • + + ne_ssl_privatekey_file + + + (String) + + + (defaults to: "/etc/pki/tls/private/${::fqdn}.key.pem") + + + — +
    +

    path and name of the server ssl private key. Must include full path.

    +
    + +
  • + +
  • + + ne_ssl_client_certs + + + (String) + + + (defaults to: '2') + + + — +
    +

    determines client certificate usage. Values: 0 = Don’t ask for or require client certificates 1 = Ask for client certificates 2 = Require client certificates

    +
    + +
  • + +
  • + + ne_ssl_logging + + + (String) + + + (defaults to: '0x00') + + + — +
    +

    determines which SSL messages are send to syslog. OR values together to specify multiple options. Values: 0x00 (0) = No additional logging (default) 0x01 (1) = Log startup SSL/TLS parameters 0x02 (2) = Log remote IP address 0x04 (4) = Log SSL/TLS version of connections 0x08 (8) = Log which cipher is being used for the connection 0x10 (16) = Log if client has a certificate 0x20 (32) = Log details of client’s certificate if it has one -1 or 0xff or 0x2f = All of the above

    +
    + +
  • + +
  • + + ne_nasty_metachars + + + (Array) + + + (defaults to: ["|`&><'\\[]{};\r\n"]) + + + — +
    +

    list of characters that cannot

    +
    + +
  • + +
  • + + ne_include_file + + + (String) + + + (defaults to: '') + + + — +
    +

    include definitions from an external config file.

    +
    + +
  • + +
  • + + ne_fw_order_no + + + (String) + + + (defaults to: '50') + + + — +
    +

    ordering prefix for he firewall rules. Adjust to your environment if needed.

    +
    + +
  • + +
  • + + ne_ssl_opts + + + (String) + + + (defaults to: '') + + + — +
    +

    Specify additional SSL options.

    +
    + +
  • + +
  • + + ne_user + + + (String) + + + (defaults to: 'nrpe') + + + — +
    +

    the NRPE service user

    +
    + +
  • + +
  • + + ne_user_comment + + + (String) + + + (defaults to: 'NRPE service user') + + + — +
    +

    The comment for the service user /etc/passwd

    +
    + +
  • + +
  • + + ne_user_uid + + + (String) + + + (defaults to: '1005') + + + — +
    +

    the UID for the service user

    +
    + +
  • + +
  • + + ne_user_home + + + (String) + + + (defaults to: '/var/run/nrpe') + + + — +
    +

    the home for the service user

    +
    + +
  • + +
  • + + ne_user_shell + + + (String) + + + (defaults to: '/sbin/nologin') + + + — +
    +

    the shell for the service user.

    +
    + +
  • + +
  • + + ne_user_groups + + + (Optional[String]) + + + (defaults to: undef) + + + — +
    +

    additional groups for the service user.

    +
    + +
  • + +
  • + + ne_server_address + + + (String) + + + (defaults to: '0.0.0.0') + + + — +
    +

    the network interfaces to listen on

    +
    + +
  • + +
  • + + ne_allow_weak_rnd_seed + + + (String) + + + (defaults to: '1') + + + — +
    +

    Whether to allow weak random seeds

    +
    + +
  • + +
  • + + ne_include_selinux + + + (Boolean) + + + (defaults to: true) + + + — +
    +

    Whether to manage selinux

    +
    + +
  • + +
  • + + ne_enable_ssl + + + (Boolean) + + + (defaults to: false) + + + — +
    +

    Whether to enable SSL certificates.

    +
    + +
  • + +
  • + + reqpackages + + + (Array) + + + (defaults to: ['nrpe','nrpe-selinux']) + + + — +
    +

    which packages to install

    +
    + +
  • + +
  • + + ne_manage_cmds + + + (Boolean) + + + (defaults to: true) + + + — +
    +

    Whether to manage command rules for NRPE checks, to allow dynamic check & command rules.

    +
    + +
  • + +
+ + + +

See Also:

+ + +
+ + + + + +
+
+
+
+85
+86
+87
+88
+89
+90
+91
+92
+93
+94
+95
+96
+97
+98
+99
+100
+101
+102
+103
+104
+105
+106
+107
+108
+109
+110
+111
+112
+113
+114
+115
+116
+117
+118
+119
+120
+121
+122
+123
+124
+125
+126
+127
+128
+129
+130
+131
+132
+133
+134
+135
+136
+137
+138
+139
+140
+141
+142
+143
+144
+145
+146
+147
+148
+149
+150
+151
+152
+153
+154
+155
+156
+157
+158
+159
+160
+161
+162
+163
+164
+165
+
+
# File 'manifests/params.pp', line 85
+
+class cd_nrpe::params (
+
+  String $pkg_ensure                 = 'latest',
+  Array $reqpackages                = ['nrpe','nrpe-selinux'],
+
+  Boolean $ne_manage_cmds             = true,
+
+# NRPE user settings
+  String $ne_user                    = 'nrpe',
+  String $ne_user_comment            = 'NRPE service user',
+  String $ne_user_uid                = '1005',
+  String $ne_user_home               = '/var/run/nrpe',
+  Optional[String] $ne_user_groups   = undef,
+  String $ne_user_shell              = '/sbin/nologin',
+
+# nrpe.cfg
+  String $ne_log_facility            = 'daemon',
+  String $ne_log_file                = '',
+  String $ne_debug                   = '0',
+  String $ne_nrpe_port               = '5666',
+  String $ne_server_address          = '0.0.0.0',
+  String $ne_listen_queue_size       = '5',
+  String $ne_nagios_server           = $::nagios_server,
+  String $ne_dont_blame_nrpe         = '1',
+  String $ne_allow_bash_cmd_subst    = '1',
+  Boolean $ne_allow_sudo             = true,
+  String $ne_command_prefix          = '/usr/bin/sudo',
+  String $ne_command_timeout         = '60',
+  String $ne_connection_timeout      = '300',
+  String $ne_allow_weak_rnd_seed     = '1',
+  Boolean $ne_enable_ssl             = false,
+  String $ne_ssl_version             = 'TLSv2+',
+  String $ne_ssl_use_adh             = '1',
+  String $ne_ssl_cipher_list         = 'ALL:!aNULL:!eNULL:!SSLv2:!LOW:!EXP:!RC4:!MD5:@STRENGTH',
+  String $ne_ssl_cacert_file         = '/etc/pki/tls/certs/ca-chain.crt.pem',
+  String $ne_ssl_cert_file           = "/etc/pki/tls/certs/${::fqdn}.crt.pem",
+  String $ne_ssl_privatekey_file     = "/etc/pki/tls/private/${::fqdn}.key.pem",
+  String $ne_ssl_client_certs        = '2',
+  String $ne_ssl_logging             = '0x00',
+  Array $ne_nasty_metachars          = ["|`&><'\\[]{};\r\n"],
+  String $ne_include_file            = '',
+
+# nrpe.conf
+  String $ne_ssl_opts                = '',
+
+# firewall
+  Boolean $ne_incl_fw                = true,
+  String $ne_fw_order_no             = '50',
+
+# selinux
+  Boolean $ne_include_selinux        = true,
+
+) {
+# service
+  $ne_service                 = 'nrpe'
+
+# directories
+  $ne_main_conf_d_dir         = '/etc/nrpe.d'
+  $ne_run_dir                 = '/var/run/nrpe'
+
+# files
+  $ne_main_conf_file          = '/etc/nagios/nrpe.cfg'
+  $ne_main_conf_erb           = 'cd_nrpe/nrpe_cfg.erb'
+  $ne_nrpe_pid_file           = "${ne_run_dir}/nrpe.pid"
+  $ne_nrpe_conf_file          = '/etc/sysconfig/nrpe'
+  $ne_nrpe_conf_erb           = 'cd_nrpe/nrpe_conf.erb'
+  $ne_cmd_file                = "${ne_main_conf_d_dir}/commands.cfg"
+  $ne_cmd_head_erb            = 'cd_nrpe/cmd_head.erb'
+  $ne_cmd_rule_erb            = 'cd_nrpe/cmd_rule.erb'
+  $ne_sudo_file               = '/etc/sudoers.d/nagios_sudo'
+  $ne_sudo_rule_erb           = 'cd_nrpe/sudo_rule.erb'
+  $ne_nrpe_te_file            = "${ne_main_conf_d_dir}/nrpe.te"
+  $ne_nrpe_te_erb             = 'cd_nrpe/nrpe.te.erb'
+  $ne_nrpe_mod_file           = "${ne_main_conf_d_dir}/nrpe.mod"
+  $ne_checkmodule_nrpe_erb    = 'cd_nrpe/checkmodule_nrpe.erb'
+  $ne_nrpe_pp_file            = "${ne_main_conf_d_dir}/nrpe.pp"
+  $ne_semodule_erb            =  'cd_nrpe/semodule_nrpe.erb'
+
+# includes must be last
+  include cd_nrpe::main::config
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/cd_nrpe_3A_3Aselinux_3A_3Aconfig.html b/doc/puppet_classes/cd_nrpe_3A_3Aselinux_3A_3Aconfig.html new file mode 100644 index 0000000..3cb8ad9 --- /dev/null +++ b/doc/puppet_classes/cd_nrpe_3A_3Aselinux_3A_3Aconfig.html @@ -0,0 +1,182 @@ + + + + + + + Puppet Class: cd_nrpe::selinux::config + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: cd_nrpe::selinux::config

+
+ +
+
Inherits:
+
cd_nrpe::params
+
+ + +
+
Defined in:
+
+ manifests/selinux/config.pp +
+
+
+ +

Summary

+ Class manages all aspects of configuring selinux for NRPE. + +

Overview

+
+
+ +

cd_nrpe::selinux::config.pp # Module name: cd_nrpe Author: Arne Teuke (arne_teuke@ConfDroid.com)

+ +
+
+ + + +
+ + + +
+ + + + + +
+
+
+
+5
+6
+7
+8
+9
+10
+11
+12
+13
+14
+15
+16
+17
+18
+19
+20
+21
+22
+23
+24
+25
+26
+27
+28
+29
+30
+31
+32
+33
+34
+35
+
+
# File 'manifests/selinux/config.pp', line 5
+
+class cd_nrpe::selinux::config (
+
+) inherits cd_nrpe::params {
+  if $ne_include_selinux == true {
+    #  manage allow nagios sudo
+
+    exec { 'nagios_run_sudo':
+      command => 'setsebool -P nagios_run_sudo 1',
+      path    => ['/usr/bin','/usr/sbin'],
+      cwd     => '/tmp',
+      unless  => 'getsebool nagios_run_sudo | awk \'{print$3}\' | grep -ic "on"'
+    }
+
+    # create policy file for sudo selinux policy
+    exec { 'create_nrpe_pp':
+      command     => template($ne_checkmodule_nrpe_erb),
+      user        => 'root',
+      creates     => $ne_nrpe_pp_file,
+      refreshonly => true,
+      notify      => Exec['import_semodule_nrpe'],
+    }
+
+    # import semodule
+    exec { 'import_semodule_nrpe':
+      command     => template($ne_semodule_erb),
+      user        => 'root',
+      unless      => '/sbin/semodule -l | grep nrpe | grep -v nrpe_',
+      refreshonly => true,
+    }
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_defined_type_list.html b/doc/puppet_defined_type_list.html new file mode 100644 index 0000000..7ec4f3a --- /dev/null +++ b/doc/puppet_defined_type_list.html @@ -0,0 +1,54 @@ + + + + + + + + + + + + + + + + + + Defined Type List + + + +
+
+

Defined Type List

+ + + +
+ + +
+ + diff --git a/doc/puppet_defined_types/cd_nrpe_3A_3Acommands_3A_3Adefinitions.html b/doc/puppet_defined_types/cd_nrpe_3A_3Acommands_3A_3Adefinitions.html new file mode 100644 index 0000000..b0dff10 --- /dev/null +++ b/doc/puppet_defined_types/cd_nrpe_3A_3Acommands_3A_3Adefinitions.html @@ -0,0 +1,228 @@ + + + + + + + Defined Type: cd_nrpe::commands::definitions + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Defined Type: cd_nrpe::commands::definitions

+
+
+
Defined in:
+
+ manifests/commands/definitions.pp +
+
+
+ +

Summary

+ Populate command definitions through external puppet rules, i.e. +from other modules. + +

Overview

+
+
+ +

cd_nrpe::commands::definitions.pp Module name: cd_nrpe Author: Arne Teuke (arne_teuke@ConfDroid.com)

+ +
+
+ + + +
+

Parameters:

+
    + +
  • + + ne_check_cmd + + + (Optional[String]) + + + (defaults to: undef) + + + — +
    +

    Specify the check_command to use.

    +
    + +
  • + +
  • + + ne_cmd_path + + + (String) + + + (defaults to: '/usr/lib64/nagios/plugins/') + + + — +
    +

    The path to the command scripts, usually where the nagios_plugins are located. If you use your own scripts, specify the custom location including the trailing slash

    +
    + +
  • + +
  • + + ne_cmd_argstring + + + (Optional[String]) + + + (defaults to: undef) + + + — +
    +

    Specify the string of valid argument for the command , i.e. -w $ARG1$ -c $ARG2$. See the arguments in the man pages for the checks.

    +
    + +
  • + +
  • + + ne_cmd_comment + + + (String) + + + (defaults to: '') + + + — +
    +

    Specify an optional comment for your command definition

    +
    + +
  • + +
+ + + +
+ + + + + +
+
+
+
+16
+17
+18
+19
+20
+21
+22
+23
+24
+25
+26
+27
+28
+29
+30
+31
+32
+33
+34
+
+
# File 'manifests/commands/definitions.pp', line 16
+
+define cd_nrpe::commands::definitions (
+
+  Optional[String] $ne_check_cmd      = undef,
+  String $ne_cmd_path                 = '/usr/lib64/nagios/plugins/',
+  Optional[String] $ne_cmd_argstring  = undef,
+  String $ne_cmd_comment              = '',
+
+) {
+  $ne_cmd_file      = $cd_nrpe::params::ne_cmd_file
+  $ne_cmd_rule_erb  = $cd_nrpe::params::ne_cmd_rule_erb
+  $ne_manage_cmds   = $cd_nrpe::params::ne_manage_cmds
+
+  if $ne_manage_cmds == true {
+    concat::fragment { $name:
+      target  => $ne_cmd_file,
+      content => template($ne_cmd_rule_erb),
+    }
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/top-level-namespace.html b/doc/top-level-namespace.html new file mode 100644 index 0000000..5d6b54b --- /dev/null +++ b/doc/top-level-namespace.html @@ -0,0 +1,98 @@ + + + + + + + Top Level Namespace + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Top Level Namespace + + + +

+
+ + + + + + + + + + + +
+ + + + + + + + + + +
+ + + +
+ + \ No newline at end of file From 9e72d0d4721f62a1de0cb67bc7af70b639a6e538 Mon Sep 17 00:00:00 2001 From: Jenkins Server Date: Wed, 21 May 2025 12:27:07 +0200 Subject: [PATCH 2/6] Recommit for updates in build 2 --- doc/file.README.html | 10 +++++----- doc/index.html | 10 +++++----- 2 files changed, 10 insertions(+), 10 deletions(-) diff --git a/doc/file.README.html b/doc/file.README.html index 7cf422b..8995e7e 100644 --- a/doc/file.README.html +++ b/doc/file.README.html @@ -60,7 +60,7 @@

Readme

-

+

[[TOC]]

@@ -115,13 +115,13 @@

All dependencies must be included in the catalogue.

Deployment

diff --git a/doc/index.html b/doc/index.html index 9025687..df1850c 100644 --- a/doc/index.html +++ b/doc/index.html @@ -60,7 +60,7 @@

Readme

-

+

[[TOC]]

@@ -115,13 +115,13 @@

All dependencies must be included in the catalogue.

Deployment

From 4b5403082d2bdde1c108cedabf1379f8272a5ca0 Mon Sep 17 00:00:00 2001 From: Jenkins Server Date: Tue, 10 Feb 2026 17:44:58 +0100 Subject: [PATCH 3/6] Recommit for updates in build 1 --- .vscode/settings.json | 14 - doc/_index.html | 24 +- doc/file.README.html | 10 +- doc/index.html | 10 +- doc/puppet_class_list.html | 44 +- doc/puppet_classes/confdroid_nrpe.html | 121 +++ ...e_3A_3Acommands_3A_3Adefinition_rules.html | 248 +++++ ...roid_nrpe_3A_3Afirewall_3A_3Aiptables.html | 142 +++ .../confdroid_nrpe_3A_3Amain_3A_3Aconfig.html | 128 +++ .../confdroid_nrpe_3A_3Amain_3A_3Adirs.html | 182 ++++ .../confdroid_nrpe_3A_3Amain_3A_3Afiles.html | 256 +++++ ...confdroid_nrpe_3A_3Amain_3A_3Ainstall.html | 138 +++ ...confdroid_nrpe_3A_3Amain_3A_3Aservice.html | 168 +++ .../confdroid_nrpe_3A_3Amain_3A_3Auser.html | 172 ++++ .../confdroid_nrpe_3A_3Aparams.html | 974 ++++++++++++++++++ ...nfdroid_nrpe_3A_3Aselinux_3A_3Aconfig.html | 182 ++++ doc/puppet_defined_type_list.html | 4 +- ...d_nrpe_3A_3Acommands_3A_3Adefinitions.html | 228 ++++ 18 files changed, 2985 insertions(+), 60 deletions(-) delete mode 100644 .vscode/settings.json create mode 100644 doc/puppet_classes/confdroid_nrpe.html create mode 100644 doc/puppet_classes/confdroid_nrpe_3A_3Acommands_3A_3Adefinition_rules.html create mode 100644 doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html create mode 100644 doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Aconfig.html create mode 100644 doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Adirs.html create mode 100644 doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Afiles.html create mode 100644 doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Ainstall.html create mode 100644 doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Aservice.html create mode 100644 doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Auser.html create mode 100644 doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html create mode 100644 doc/puppet_classes/confdroid_nrpe_3A_3Aselinux_3A_3Aconfig.html create mode 100644 doc/puppet_defined_types/confdroid_nrpe_3A_3Acommands_3A_3Adefinitions.html diff --git a/.vscode/settings.json b/.vscode/settings.json deleted file mode 100644 index cfabd8b..0000000 --- a/.vscode/settings.json +++ /dev/null @@ -1,14 +0,0 @@ -{ - "cSpell.words": [ - "argstring", - "checkmodule", - "dont", - "getsebool", - "metachars", - "procs", - "refreshonly", - "semodule", - "setsebool", - "sysconfig" - ] -} \ No newline at end of file diff --git a/doc/_index.html b/doc/_index.html index a8a6262..f40d9ec 100644 --- a/doc/_index.html +++ b/doc/_index.html @@ -69,57 +69,57 @@ -

In order to apply parameters through Foreman, cd_nrpe::params must be added to the host or host group in question, unless the defaults are fully acceptable across the estate.

+

In order to apply parameters through Foreman, confdroid_nrpe::params must be added to the host or host group in question, unless the defaults are fully acceptable across the estate.

See more details about class deployment on Confdroid.com.

@@ -153,7 +153,7 @@

Defining commands is as simple as that:

-
cd_nrpe::commands::definitions { 'check_users':
+
confdroid_nrpe::commands::definitions { 'check_users':
       ne_check_cmd      =>  'check_users',
       ne_cmd_argstring  =>  '-w $ARG1$ -c $ARG2$',
     }
diff --git a/doc/puppet_class_list.html b/doc/puppet_class_list.html
index 11976a7..7401c21 100644
--- a/doc/puppet_class_list.html
+++ b/doc/puppet_class_list.html
@@ -40,79 +40,79 @@
       
    -
  • +
  • -
  • +
  • -
  • +
  • -
  • +
  • -
  • +
  • -
  • +
  • -
  • +
  • -
  • +
  • -
  • +
  • -
  • +
  • -
  • +
  • diff --git a/doc/puppet_classes/confdroid_nrpe.html b/doc/puppet_classes/confdroid_nrpe.html new file mode 100644 index 0000000..70fd5c9 --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe.html @@ -0,0 +1,121 @@ + + + + + + + Puppet Class: confdroid_nrpe + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
    + + +

    Puppet Class: confdroid_nrpe

    +
    + + +
    +
    Defined in:
    +
    + manifests/init.pp +
    +
    +
    + +

    Summary

    + Class initializes the confdroid_nrpe Module. + +

    Overview

    +
    +
    + +

    confdroid_nrpe::init.pp Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@confdroid.com)

    + +
    +
    + + + +
    + + + +
    + + + + + +
    +
    +
    +
    +6
    +7
    +8
    +
    +
    # File 'manifests/init.pp', line 6
    +
    +class confdroid_nrpe {
    +  include confdroid_nrpe::params
    +}
    +
    +
    +
    + + + +
    + + \ No newline at end of file diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Acommands_3A_3Adefinition_rules.html b/doc/puppet_classes/confdroid_nrpe_3A_3Acommands_3A_3Adefinition_rules.html new file mode 100644 index 0000000..1165848 --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Acommands_3A_3Adefinition_rules.html @@ -0,0 +1,248 @@ + + + + + + + Puppet Class: confdroid_nrpe::commands::definition_rules + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
    + + +

    Puppet Class: confdroid_nrpe::commands::definition_rules

    +
    + +
    +
    Inherits:
    +
    confdroid_nrpe::params
    +
    + + +
    +
    Defined in:
    +
    + manifests/commands/definition_rules.pp +
    +
    +
    + +

    Summary

    + manage command definitions via define and Puppet rules. + +

    Overview

    +
    +
    + +

    confdroid_nrpe::commands::definition_rules.pp Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@ConfDroid.com)

    + +
    +
    + + + +
    + +
    +

    Examples:

    + + +
    confdroid_nrpe::commands::definitions { 'check_users':
    +  ne_check_cmd      => 'check_users',
    +  ne_cmd_argstring  => '-w $ARG1$ -c $ARG2$',
    +  ne_cmd_comment    => 'check the amount of user logged in locally',
    +}
    + +
    + + + +
    + + + + + +
    +
    +
    +
    +12
    +13
    +14
    +15
    +16
    +17
    +18
    +19
    +20
    +21
    +22
    +23
    +24
    +25
    +26
    +27
    +28
    +29
    +30
    +31
    +32
    +33
    +34
    +35
    +36
    +37
    +38
    +39
    +40
    +41
    +42
    +43
    +44
    +45
    +46
    +47
    +48
    +49
    +50
    +51
    +52
    +53
    +54
    +55
    +56
    +57
    +58
    +59
    +60
    +61
    +62
    +63
    +64
    +65
    +66
    +67
    +68
    +69
    +
    +
    # File 'manifests/commands/definition_rules.pp', line 12
    +
    +class confdroid_nrpe::commands::definition_rules (
    +
    +) inherits confdroid_nrpe::params {
    +  if $ne_manage_cmds == true {
    +    require confdroid_nrpe::main::files
    +
    +    # manage the commands.cfg file
    +
    +    concat { $ne_cmd_file:
    +      ensure   => present,
    +      path     => $ne_cmd_file,
    +      owner    => $ne_user,
    +      group    => $ne_user,
    +      mode     => '0640',
    +      selrange => s0,
    +      selrole  => object_r,
    +      seltype  => nrpe_etc_t,
    +      seluser  => system_u,
    +      notify   => Service[$ne_service],
    +    }
    +
    +    # manage the file header
    +
    +    concat::fragment { 'nrpe_cmd_header':
    +      target  => $ne_cmd_file,
    +      content => template($ne_cmd_head_erb),
    +      order   => '000',
    +    }
    +
    +    # basic example rules
    +
    +    confdroid_nrpe::commands::definitions { 'check_users':
    +      ne_check_cmd     => 'check_users',
    +      ne_cmd_argstring => '-w $ARG1$ -c $ARG2$',
    +      ne_cmd_comment   => 'check the amount of user logged in locally',
    +    }
    +
    +    confdroid_nrpe::commands::definitions { 'check_load':
    +      ne_check_cmd     => 'check_load',
    +      ne_cmd_argstring => '-w $ARG1$ -c $ARG2$',
    +    }
    +
    +    confdroid_nrpe::commands::definitions { 'check_disk':
    +      ne_check_cmd     => 'check_disk',
    +      ne_cmd_argstring => '-w $ARG1$ -c $ARG2$ -p $ARG3$',
    +    }
    +
    +    confdroid_nrpe::commands::definitions { 'check_procs':
    +      ne_check_cmd     => 'check_procs',
    +      ne_cmd_argstring => '-w $ARG1$ -c $ARG2$ -s $ARG3$',
    +    }
    +
    +    confdroid_nrpe::commands::definitions { 'check_swap':
    +      ne_check_cmd     => 'check_swap',
    +      ne_cmd_argstring => '-w $ARG1$ -c $ARG2$',
    +    }
    +  }
    +}
    +
    +
    +
    + + + +
    + + \ No newline at end of file diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html b/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html new file mode 100644 index 0000000..bcacf11 --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html @@ -0,0 +1,142 @@ + + + + + + + Puppet Class: confdroid_nrpe::firewall::iptables + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
    + + +

    Puppet Class: confdroid_nrpe::firewall::iptables

    +
    + +
    +
    Inherits:
    +
    confdroid_nrpe::params
    +
    + + +
    +
    Defined in:
    +
    + manifests/firewall/iptables.pp +
    +
    +
    + +

    Summary

    + manage firewall settings through puppetlabs-firewall + +

    Overview

    +
    +
    + +
    +
    + + + +
    + + + +
    + + + + + +
    +
    +
    +
    +7
    +8
    +9
    +10
    +11
    +12
    +13
    +14
    +15
    +16
    +17
    +18
    +
    +
    # File 'manifests/firewall/iptables.pp', line 7
    +
    +class confdroid_nrpe::firewall::iptables (
    +
    +) inherits confdroid_nrpe::params {
    +  if $ne_incl_fw == true {
    +    firewall { "${ne_fw_order_no}${ne_nrpe_port} port ${ne_nrpe_port}":
    +#      source => $nagios_server,
    +      proto => 'tcp',
    +      dport => $ne_nrpe_port,
    +      jump  => 'accept',
    +    }
    +  }
    +}
    +
    +
    +
    + + + +
    + + \ No newline at end of file diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Aconfig.html b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Aconfig.html new file mode 100644 index 0000000..cb31dfc --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Aconfig.html @@ -0,0 +1,128 @@ + + + + + + + Puppet Class: confdroid_nrpe::main::config + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
    + + +

    Puppet Class: confdroid_nrpe::main::config

    +
    + +
    +
    Inherits:
    +
    confdroid_nrpe::params
    +
    + + +
    +
    Defined in:
    +
    + manifests/main/config.pp +
    +
    +
    + +

    Summary

    + Class manages the module logic for confdroid_nrpe. + +

    Overview

    +
    +
    + +
    +
    + + + +
    + + + +
    + + + + + +
    +
    +
    +
    +7
    +8
    +9
    +10
    +11
    +
    +
    # File 'manifests/main/config.pp', line 7
    +
    +class confdroid_nrpe::main::config (
    +
    +) inherits confdroid_nrpe::params {
    +  include confdroid_nrpe::main::service
    +}
    +
    +
    +
    + + + +
    + + \ No newline at end of file diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Adirs.html b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Adirs.html new file mode 100644 index 0000000..2d29ec8 --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Adirs.html @@ -0,0 +1,182 @@ + + + + + + + Puppet Class: confdroid_nrpe::main::dirs + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
    + + +

    Puppet Class: confdroid_nrpe::main::dirs

    +
    + +
    +
    Inherits:
    +
    confdroid_nrpe::params
    +
    + + +
    +
    Defined in:
    +
    + manifests/main/dirs.pp +
    +
    +
    + +

    Summary

    + Class manages all directories required for confdroid_nrpe. + +

    Overview

    +
    +
    + +

    confdroid_nrpe::main::dirs.pp Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@ConfDroid.com)

    + +
    +
    + + + +
    + + + +
    + + + + + +
    +
    +
    +
    +6
    +7
    +8
    +9
    +10
    +11
    +12
    +13
    +14
    +15
    +16
    +17
    +18
    +19
    +20
    +21
    +22
    +23
    +24
    +25
    +26
    +27
    +28
    +29
    +30
    +31
    +32
    +33
    +34
    +35
    +36
    +
    +
    # File 'manifests/main/dirs.pp', line 6
    +
    +class confdroid_nrpe::main::dirs (
    +
    +) inherits confdroid_nrpe::params {
    +  require confdroid_nrpe::main::user
    +
    +  # manage main conf_d_dir
    +
    +  file { $ne_main_conf_d_dir:
    +    ensure   => directory,
    +    path     => $ne_main_conf_d_dir,
    +    owner    => 'root',
    +    group    => 'root',
    +    mode     => '0755',
    +    selrange => s0,
    +    selrole  => object_r,
    +    seltype  => etc_t,
    +    seluser  => system_u,
    +  }
    +
    +  file { $ne_run_dir:
    +    ensure   => directory,
    +    path     => $ne_run_dir,
    +    owner    => $ne_user,
    +    group    => $ne_user,
    +    mode     => '0755',
    +    selrange => s0,
    +    selrole  => object_r,
    +    seltype  => var_run_t,
    +    seluser  => system_u,
    +  }
    +}
    +
    +
    +
    + + + +
    + + \ No newline at end of file diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Afiles.html b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Afiles.html new file mode 100644 index 0000000..c211ec4 --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Afiles.html @@ -0,0 +1,256 @@ + + + + + + + Puppet Class: confdroid_nrpe::main::files + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
    + + +

    Puppet Class: confdroid_nrpe::main::files

    +
    + +
    +
    Inherits:
    +
    confdroid_nrpe::params
    +
    + + +
    +
    Defined in:
    +
    + manifests/main/files.pp +
    +
    +
    + +

    Summary

    + Class manages all configuration files required for confdroid_nrpe. + +

    Overview

    +
    +
    + +

    confdroid_nrpe::main::files.pp Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@ConfDroid.com)

    + +
    +
    + + + +
    + + + +
    + + + + + +
    +
    +
    +
    +6
    +7
    +8
    +9
    +10
    +11
    +12
    +13
    +14
    +15
    +16
    +17
    +18
    +19
    +20
    +21
    +22
    +23
    +24
    +25
    +26
    +27
    +28
    +29
    +30
    +31
    +32
    +33
    +34
    +35
    +36
    +37
    +38
    +39
    +40
    +41
    +42
    +43
    +44
    +45
    +46
    +47
    +48
    +49
    +50
    +51
    +52
    +53
    +54
    +55
    +56
    +57
    +58
    +59
    +60
    +61
    +62
    +63
    +64
    +65
    +66
    +67
    +68
    +69
    +70
    +71
    +72
    +73
    +
    +
    # File 'manifests/main/files.pp', line 6
    +
    +class confdroid_nrpe::main::files (
    +
    +) inherits confdroid_nrpe::params {
    +  require confdroid_nrpe::main::dirs
    +
    +  # manage /etc/nagios/nrpe.cfg
    +
    +  file { $ne_main_conf_file:
    +    ensure   => file,
    +    path     => $ne_main_conf_file,
    +    owner    => 'root',
    +    group    => 'root',
    +    mode     => '0644',
    +    selrange => s0,
    +    selrole  => object_r,
    +    seltype  => nrpe_etc_t,
    +    seluser  => system_u,
    +    content  => template($ne_main_conf_erb),
    +    notify   => Service[$ne_service],
    +  }
    +
    +  # manage /etc/sysconfig/nrpe
    +
    +  file { $ne_nrpe_conf_file:
    +    ensure   => file,
    +    path     => $ne_nrpe_conf_file,
    +    owner    => 'root',
    +    group    => 'root',
    +    mode     => '0644',
    +    selrange => s0,
    +    selrole  => object_r,
    +    seltype  => etc_t,
    +    seluser  => system_u,
    +    content  => template($ne_nrpe_conf_erb),
    +    notify   => Service[$ne_service],
    +  }
    +
    +  if $ne_allow_sudo == true {
    +
    +    file { $ne_sudo_file:
    +      ensure   => file,
    +      path     => $ne_sudo_file,
    +      owner    => 'root',
    +      group    => 'root',
    +      mode     => '0440',
    +      selrange => s0,
    +      selrole  => object_r,
    +      seltype  => etc_t,
    +      seluser  => system_u,
    +      content  => template($ne_sudo_rule_erb),
    +    }
    +
    +    # file for sudo  selinux policy
    +    file { $ne_nrpe_te_file:
    +      ensure   => file,
    +      path     => $ne_nrpe_te_file,
    +      owner    => 'root',
    +      group    => 'root',
    +      mode     => '0440',
    +      selrange => s0,
    +      selrole  => object_r,
    +      seltype  => nrpe_etc_t,
    +      seluser  => system_u,
    +      content  => template($ne_nrpe_te_erb),
    +      notify   => Exec['create_nrpe_pp'],
    +    }
    +  }
    +}
    +
    +
    +
    + + + +
    + + \ No newline at end of file diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Ainstall.html b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Ainstall.html new file mode 100644 index 0000000..99c0ab7 --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Ainstall.html @@ -0,0 +1,138 @@ + + + + + + + Puppet Class: confdroid_nrpe::main::install + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
    + + +

    Puppet Class: confdroid_nrpe::main::install

    +
    + +
    +
    Inherits:
    +
    confdroid_nrpe::params
    +
    + + +
    +
    Defined in:
    +
    + manifests/main/install.pp +
    +
    +
    + +

    Summary

    + Class manages installing binaries required for confdroid_nrpe + +

    Overview

    +
    +
    + +

    confdroid_nrpe::main::install.pp Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@ConfDroid.com)

    + +
    +
    + + + +
    + + + +
    + + + + + +
    +
    +
    +
    +6
    +7
    +8
    +9
    +10
    +11
    +12
    +13
    +14
    +
    +
    # File 'manifests/main/install.pp', line 6
    +
    +class confdroid_nrpe::main::install (
    +
    +) inherits confdroid_nrpe::params {
    +  require confdroid_resources::main::epel
    +
    +  package { $reqpackages:
    +    ensure => $pkg_ensure,
    +  }
    +}
    +
    +
    +
    + + + +
    + + \ No newline at end of file diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Aservice.html b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Aservice.html new file mode 100644 index 0000000..e0fe38a --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Aservice.html @@ -0,0 +1,168 @@ + + + + + + + Puppet Class: confdroid_nrpe::main::service + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
    + + +

    Puppet Class: confdroid_nrpe::main::service

    +
    + +
    +
    Inherits:
    +
    confdroid_nrpe::params
    +
    + + +
    +
    Defined in:
    +
    + manifests/main/service.pp +
    +
    +
    + +

    Summary

    + Class manages the service(s) for confdroid_nrpe. + +

    Overview

    +
    +
    + +

    confdroid_nrpe::main::service.pp Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@ConfDroid.com)

    + +
    +
    + + + +
    + + + +
    + + + + + +
    +
    +
    +
    +6
    +7
    +8
    +9
    +10
    +11
    +12
    +13
    +14
    +15
    +16
    +17
    +18
    +19
    +20
    +21
    +22
    +23
    +24
    +25
    +26
    +27
    +28
    +29
    +
    +
    # File 'manifests/main/service.pp', line 6
    +
    +class confdroid_nrpe::main::service (
    +
    +) inherits confdroid_nrpe::params {
    +  require confdroid_nrpe::main::files
    +
    +  if $ne_incl_fw == true {
    +    require confdroid_nrpe::firewall::iptables
    +  }
    +
    +  if $ne_manage_cmds == true {
    +    require confdroid_nrpe::commands::definition_rules
    +  }
    +
    +  if $ne_include_selinux == true {
    +    require confdroid_nrpe::selinux::config
    +  }
    +
    +  service { $ne_service:
    +    ensure     => running,
    +    hasstatus  => true,
    +    hasrestart => true,
    +    enable     => true,
    +  }
    +}
    +
    +
    +
    + + + +
    + + \ No newline at end of file diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Auser.html b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Auser.html new file mode 100644 index 0000000..d2093b6 --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Auser.html @@ -0,0 +1,172 @@ + + + + + + + Puppet Class: confdroid_nrpe::main::user + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
    + + +

    Puppet Class: confdroid_nrpe::main::user

    +
    + +
    +
    Inherits:
    +
    confdroid_nrpe::params
    +
    + + +
    +
    Defined in:
    +
    + manifests/main/user.pp +
    +
    +
    + +

    Summary

    + Class manages service users for confdroid_nrpe. + +

    Overview

    +
    +
    + +

    confdroid_nrpe::main::user.pp Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@ConfDroid.com)

    + +
    +
    + + + +
    + + + +
    + + + + + +
    +
    +
    +
    +6
    +7
    +8
    +9
    +10
    +11
    +12
    +13
    +14
    +15
    +16
    +17
    +18
    +19
    +20
    +21
    +22
    +23
    +24
    +25
    +26
    +27
    +28
    +29
    +30
    +31
    +
    +
    # File 'manifests/main/user.pp', line 6
    +
    +class confdroid_nrpe::main::user (
    +
    +) inherits confdroid_nrpe::params {
    +  require confdroid_nrpe::main::install
    +
    +  group { $ne_user:
    +    ensure    => present,
    +    name      => $ne_user,
    +    gid       => $ne_user_uid,
    +    allowdupe => false,
    +  }
    +
    +  user { $ne_user:
    +    ensure     => present,
    +    name       => $ne_user,
    +    allowdupe  => false,
    +    comment    => $ne_user_comment,
    +    uid        => $ne_user_uid,
    +    gid        => $ne_user,
    +    groups     => $ne_user_groups,
    +    managehome => true,
    +    home       => $ne_user_home,
    +    shell      => $ne_user_shell,
    +    require    => Group[$ne_user],
    +  }
    +}
    +
    +
    +
    + + + +
    + + \ No newline at end of file diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html new file mode 100644 index 0000000..4b82d70 --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html @@ -0,0 +1,974 @@ + + + + + + + Puppet Class: confdroid_nrpe::params + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
    + + +

    Puppet Class: confdroid_nrpe::params

    + + +

    Summary

    + Class holds all parameters for the confdroid_nrpe module and is +inherited by all classes except defines. + +

    Overview

    +
    +
    + +

    confdroid_nrpe::params.pp Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@ConfDroid.com) be passed to the NRPE daemon.

    + +
    +
    + + + +
    +

    Parameters:

    +
      + +
    • + + pkg_ensure + + + (String) + + + (defaults to: 'present') + + + — +
      +

      which package type to choose, i.e. latest or present.

      +
      + +
    • + +
    • + + ne_log_facility + + + (String) + + + (defaults to: 'daemon') + + + — +
      +

      the log facility to use.

      +
      + +
    • + +
    • + + ne_log_file + + + (String) + + + (defaults to: '') + + + — +
      +

      If a log file is specified in this option, nrpe will write to that file instead of using syslog. i.e. /var/run/nrpe.log

      +
      + +
    • + +
    • + + ne_debug + + + (String) + + + (defaults to: '0') + + + — +
      +

      Whether debugging messages are logged to the syslog facility.

      +
      + +
    • + +
    • + + ne_nrpe_port + + + (String) + + + (defaults to: '5666') + + + — +
      +

      the NRPE port. used in firewall ( optional) and configuration file.

      +
      + +
    • + +
    • + + ne_listen_queue_size + + + (String) + + + (defaults to: '5') + + + — +
      +

      Listen queue size (backlog) for serving incoming connections.

      +
      + +
    • + +
    • + + ne_nagios_server + + + (String) + + + (defaults to: 'nagios.example.net') + + + — +
      +

      ipaddress of the nagios server to be allowed to connect to NRPE service. Default is to look up a global parameter from ENC.

      +
      + +
    • + +
    • + + ne_dont_blame_nrpe + + + (String) + + + (defaults to: '1') + + + — +
      +

      whether or not the NRPE daemon will allow clients to specify arguments to commands that are executed.

      +
      + +
    • + +
    • + + ne_allow_bash_cmd_subst + + + (String) + + + (defaults to: '1') + + + — +
      +

      whether or not the NRPE daemon will allow clients to specify arguments that contain bash command substitutions of the form $(…).

      +
      + +
    • + +
    • + + ne_allow_sudo + + + (Boolean) + + + (defaults to: true) + + + — +
      +

      Whether to allow sudo access. used in nrpe.cfg as well as for creating a sudo role.

      +
      + +
    • + +
    • + + ne_command_prefix + + + (String) + + + (defaults to: '/usr/bin/sudo') + + + — +
      +

      allows you to prefix all commands with a user-defined String.

      +
      + +
    • + +
    • + + ne_incl_fw + + + (Boolean) + + + (defaults to: true) + + + — +
      +

      Whether to include firewall rules

      +
      + +
    • + +
    • + + ne_command_timeout + + + (String) + + + (defaults to: '60') + + + — +
      +

      maximum number of seconds that the NRPE daemon will allow plugins to finish executing before killing them off.

      +
      + +
    • + +
    • + + ne_connection_timeout + + + (String) + + + (defaults to: '300') + + + — +
      +

      maximum number of seconds that the NRPE daemon will wait for a connection to be established before exiting.

      +
      + +
    • + +
    • + + ne_ssl_version + + + (String) + + + (defaults to: 'TLSv2+') + + + — +
      +

      These directives allow you to specify how to use SSL/TLS.

      +
      + +
    • + +
    • + + ne_ssl_use_adh + + + (String) + + + (defaults to: '1') + + + — +
      +

      This is for backward compatibility and is DEPRECATED. Set to 1 to enable ADH or 2 to require ADH. 1 is currently the default but will be changed in a later version.

      +
      + +
    • + +
    • + + ne_ssl_cipher_list + + + (String) + + + (defaults to: 'ALL:!aNULL:!eNULL:!SSLv2:!LOW:!EXP:!RC4:!MD5:@STRENGTH') + + + — +
      +

      ciphers can be used. For backward compatibility, this defaults to ‘ssl_cipher_list=ALL:!MD5:@STRENGTH’ in this version but will be changed in a later version of NRPE.

      +
      + +
    • + +
    • + + ne_ssl_cacert_file + + + (String) + + + (defaults to: '/etc/pki/tls/certs/ca-chain.crt.pem') + + + — +
      +

      path and name of the ssl certificate authority (ca) file / chain. must be full path.

      +
      + +
    • + +
    • + + ne_ssl_client_certs + + + (String) + + + (defaults to: '2') + + + — +
      +

      determines client certificate usage. Values: 0 = Don’t ask for or require client certificates 1 = Ask for client certificates 2 = Require client certificates

      +
      + +
    • + +
    • + + ne_ssl_logging + + + (String) + + + (defaults to: '0x00') + + + — +
      +

      determines which SSL messages are send to syslog. OR values together to specify multiple options. Values: 0x00 (0) = No additional logging (default) 0x01 (1) = Log startup SSL/TLS parameters 0x02 (2) = Log remote IP address 0x04 (4) = Log SSL/TLS version of connections 0x08 (8) = Log which cipher is being used for the connection 0x10 (16) = Log if client has a certificate 0x20 (32) = Log details of client’s certificate if it has one -1 or 0xff or 0x2f = All of the above

      +
      + +
    • + +
    • + + ne_nasty_metachars + + + (Array) + + + (defaults to: ["|`&><'\\[]{};\r\n"]) + + + — +
      +

      list of characters that cannot

      +
      + +
    • + +
    • + + ne_include_file + + + (String) + + + (defaults to: '') + + + — +
      +

      include definitions from an external config file.

      +
      + +
    • + +
    • + + ne_fw_order_no + + + (String) + + + (defaults to: '50') + + + — +
      +

      ordering prefix for he firewall rules. Adjust to your environment if needed.

      +
      + +
    • + +
    • + + ne_ssl_opts + + + (String) + + + (defaults to: '') + + + — +
      +

      Specify additional SSL options.

      +
      + +
    • + +
    • + + ne_user + + + (String) + + + (defaults to: 'nrpe') + + + — +
      +

      the NRPE service user

      +
      + +
    • + +
    • + + ne_user_comment + + + (String) + + + (defaults to: 'NRPE service user') + + + — +
      +

      The comment for the service user /etc/passwd

      +
      + +
    • + +
    • + + ne_user_uid + + + (String) + + + (defaults to: '1005') + + + — +
      +

      the UID for the service user

      +
      + +
    • + +
    • + + ne_user_home + + + (String) + + + (defaults to: '/var/run/nrpe') + + + — +
      +

      the home for the service user

      +
      + +
    • + +
    • + + ne_user_shell + + + (String) + + + (defaults to: '/sbin/nologin') + + + — +
      +

      the shell for the service user.

      +
      + +
    • + +
    • + + ne_user_groups + + + (Optional[String]) + + + (defaults to: undef) + + + — +
      +

      additional groups for the service user.

      +
      + +
    • + +
    • + + ne_server_address + + + (String) + + + (defaults to: '0.0.0.0') + + + — +
      +

      the network interfaces to listen on

      +
      + +
    • + +
    • + + ne_allow_weak_rnd_seed + + + (String) + + + (defaults to: '1') + + + — +
      +

      Whether to allow weak random seeds

      +
      + +
    • + +
    • + + ne_include_selinux + + + (Boolean) + + + (defaults to: true) + + + — +
      +

      Whether to manage selinux

      +
      + +
    • + +
    • + + ne_enable_ssl + + + (Boolean) + + + (defaults to: false) + + + — +
      +

      Whether to enable SSL certificates.

      +
      + +
    • + +
    • + + reqpackages + + + (Array) + + + (defaults to: ['nrpe','nrpe-selinux']) + + + — +
      +

      which packages to install

      +
      + +
    • + +
    • + + ne_manage_cmds + + + (Boolean) + + + (defaults to: true) + + + — +
      +

      Whether to manage command rules for NRPE checks, to allow dynamic check & command rules.

      +
      + +
    • + +
    + + + +

    See Also:

    + + +
    + + + + + +
    +
    +
    +
    +81
    +82
    +83
    +84
    +85
    +86
    +87
    +88
    +89
    +90
    +91
    +92
    +93
    +94
    +95
    +96
    +97
    +98
    +99
    +100
    +101
    +102
    +103
    +104
    +105
    +106
    +107
    +108
    +109
    +110
    +111
    +112
    +113
    +114
    +115
    +116
    +117
    +118
    +119
    +120
    +121
    +122
    +123
    +124
    +125
    +126
    +127
    +128
    +129
    +130
    +131
    +132
    +133
    +134
    +135
    +136
    +137
    +138
    +139
    +140
    +141
    +142
    +143
    +144
    +145
    +146
    +147
    +148
    +149
    +150
    +151
    +152
    +153
    +154
    +155
    +156
    +157
    +158
    +159
    +160
    +161
    +162
    +163
    +164
    +165
    +166
    +167
    +
    +
    # File 'manifests/params.pp', line 81
    +
    +class confdroid_nrpe::params (
    +
    +  String $pkg_ensure                 = 'present',
    +  Array $reqpackages                = ['nrpe','nrpe-selinux'],
    +
    +  Boolean $ne_manage_cmds             = true,
    +
    +# NRPE user settings
    +  String $ne_user                    = 'nrpe',
    +  String $ne_user_comment            = 'NRPE service user',
    +  String $ne_user_uid                = '1005',
    +  String $ne_user_home               = '/var/run/nrpe',
    +  Optional[String] $ne_user_groups   = undef,
    +  String $ne_user_shell              = '/sbin/nologin',
    +
    +# nrpe.cfg
    +  String $ne_log_facility            = 'daemon',
    +  String $ne_log_file                = '',
    +  String $ne_debug                   = '0',
    +  String $ne_nrpe_port               = '5666',
    +  String $ne_server_address          = '0.0.0.0',
    +  String $ne_listen_queue_size       = '5',
    +  String $ne_nagios_server           = 'nagios.example.net',
    +  String $ne_dont_blame_nrpe         = '1',
    +  String $ne_allow_bash_cmd_subst    = '1',
    +  Boolean $ne_allow_sudo             = true,
    +  String $ne_command_prefix          = '/usr/bin/sudo',
    +  String $ne_command_timeout         = '60',
    +  String $ne_connection_timeout      = '300',
    +  String $ne_allow_weak_rnd_seed     = '1',
    +  Boolean $ne_enable_ssl             = false,
    +  String $ne_ssl_version             = 'TLSv2+',
    +  String $ne_ssl_use_adh             = '1',
    +  String $ne_ssl_cipher_list         = 'ALL:!aNULL:!eNULL:!SSLv2:!LOW:!EXP:!RC4:!MD5:@STRENGTH',
    +  String $ne_ssl_cacert_file         = '/etc/pki/tls/certs/ca-chain.crt.pem',
    +  String $ne_ssl_client_certs        = '2',
    +  String $ne_ssl_logging             = '0x00',
    +  Array $ne_nasty_metachars          = ["|`&><'\\[]{};\r\n"],
    +  String $ne_include_file            = '',
    +
    +# nrpe.conf
    +  String $ne_ssl_opts                = '',
    +
    +# firewall
    +  Boolean $ne_incl_fw                = true,
    +  String $ne_fw_order_no             = '50',
    +
    +# selinux
    +  Boolean $ne_include_selinux        = true,
    +
    +) {
    +# Default facts
    +  $fqdn                     = $facts['networking']['fqdn']
    +  $domain                   = $facts['networking']['domain']
    +  $os_name                  = $facts['os']['name']
    +  $os_release               = $facts['os']['release']['major']
    +
    +# service
    +  $ne_service                 = 'nrpe'
    +
    +# directories
    +  $ne_main_conf_d_dir         = '/etc/nrpe.d'
    +  $ne_run_dir                 = '/var/run/nrpe'
    +
    +# files
    +  $ne_main_conf_file          = '/etc/nagios/nrpe.cfg'
    +  $ne_main_conf_erb           = 'confdroid_nrpe/nrpe_cfg.erb'
    +  $ne_nrpe_pid_file           = "${ne_run_dir}/nrpe.pid"
    +  $ne_nrpe_conf_file          = '/etc/sysconfig/nrpe'
    +  $ne_nrpe_conf_erb           = 'confdroid_nrpe/nrpe_conf.erb'
    +  $ne_cmd_file                = "${ne_main_conf_d_dir}/commands.cfg"
    +  $ne_cmd_head_erb            = 'confdroid_nrpe/cmd_head.erb'
    +  $ne_cmd_rule_erb            = 'confdroid_nrpe/cmd_rule.erb'
    +  $ne_sudo_file               = '/etc/sudoers.d/nagios_sudo'
    +  $ne_sudo_rule_erb           = 'confdroid_nrpe/sudo_rule.erb'
    +  $ne_nrpe_te_file            = "${ne_main_conf_d_dir}/nrpe.te"
    +  $ne_nrpe_te_erb             = 'confdroid_nrpe/nrpe.te.erb'
    +  $ne_nrpe_mod_file           = "${ne_main_conf_d_dir}/nrpe.mod"
    +  $ne_checkmodule_nrpe_erb    = 'confdroid_nrpe/checkmodule_nrpe.erb'
    +  $ne_nrpe_pp_file            = "${ne_main_conf_d_dir}/nrpe.pp"
    +  $ne_semodule_erb            =  'confdroid_nrpe/semodule_nrpe.erb'
    +  $ne_ssl_cert_file           = "/etc/pki/tls/certs/${fqdn}.crt.pem"
    +  $ne_ssl_privatekey_file     = "/etc/pki/tls/private/${fqdn}.key.pem"
    +
    +# includes must be last
    +  include confdroid_nrpe::main::config
    +}
    +
    +
    +
    + + + +
    + + \ No newline at end of file diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Aselinux_3A_3Aconfig.html b/doc/puppet_classes/confdroid_nrpe_3A_3Aselinux_3A_3Aconfig.html new file mode 100644 index 0000000..095da2b --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Aselinux_3A_3Aconfig.html @@ -0,0 +1,182 @@ + + + + + + + Puppet Class: confdroid_nrpe::selinux::config + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
    + + +

    Puppet Class: confdroid_nrpe::selinux::config

    +
    + +
    +
    Inherits:
    +
    confdroid_nrpe::params
    +
    + + +
    +
    Defined in:
    +
    + manifests/selinux/config.pp +
    +
    +
    + +

    Summary

    + Class manages all aspects of configuring selinux for NRPE. + +

    Overview

    +
    +
    + +

    confdroid_nrpe::selinux::config.pp # Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@ConfDroid.com)

    + +
    +
    + + + +
    + + + +
    + + + + + +
    +
    +
    +
    +5
    +6
    +7
    +8
    +9
    +10
    +11
    +12
    +13
    +14
    +15
    +16
    +17
    +18
    +19
    +20
    +21
    +22
    +23
    +24
    +25
    +26
    +27
    +28
    +29
    +30
    +31
    +32
    +33
    +34
    +35
    +
    +
    # File 'manifests/selinux/config.pp', line 5
    +
    +class confdroid_nrpe::selinux::config (
    +
    +) inherits confdroid_nrpe::params {
    +  if $ne_include_selinux == true {
    +    #  manage allow nagios sudo
    +
    +    exec { 'nagios_run_sudo':
    +      command => 'setsebool -P nagios_run_sudo 1',
    +      path    => ['/usr/bin','/usr/sbin'],
    +      cwd     => '/tmp',
    +      unless  => 'getsebool nagios_run_sudo | awk \'{print$3}\' | grep -ic "on"'
    +    }
    +
    +    # create policy file for sudo selinux policy
    +    exec { 'create_nrpe_pp':
    +      command     => template($ne_checkmodule_nrpe_erb),
    +      user        => 'root',
    +      creates     => $ne_nrpe_pp_file,
    +      refreshonly => true,
    +      notify      => Exec['import_semodule_nrpe'],
    +    }
    +
    +    # import semodule
    +    exec { 'import_semodule_nrpe':
    +      command     => template($ne_semodule_erb),
    +      user        => 'root',
    +      unless      => '/sbin/semodule -l | grep nrpe | grep -v nrpe_',
    +      refreshonly => true,
    +    }
    +  }
    +}
    +
    +
    +
    + + + +
    + + \ No newline at end of file diff --git a/doc/puppet_defined_type_list.html b/doc/puppet_defined_type_list.html index 7ec4f3a..669a169 100644 --- a/doc/puppet_defined_type_list.html +++ b/doc/puppet_defined_type_list.html @@ -40,9 +40,9 @@
      -
    • +
    • diff --git a/doc/puppet_defined_types/confdroid_nrpe_3A_3Acommands_3A_3Adefinitions.html b/doc/puppet_defined_types/confdroid_nrpe_3A_3Acommands_3A_3Adefinitions.html new file mode 100644 index 0000000..91fbd6c --- /dev/null +++ b/doc/puppet_defined_types/confdroid_nrpe_3A_3Acommands_3A_3Adefinitions.html @@ -0,0 +1,228 @@ + + + + + + + Defined Type: confdroid_nrpe::commands::definitions + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
      + + +

      Defined Type: confdroid_nrpe::commands::definitions

      +
      +
      +
      Defined in:
      +
      + manifests/commands/definitions.pp +
      +
      +
      + +

      Summary

      + Populate command definitions through external puppet rules, i.e. +from other modules. + +

      Overview

      +
      +
      + +

      confdroid_nrpe::commands::definitions.pp Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@ConfDroid.com)

      + +
      +
      + + + +
      +

      Parameters:

      +
        + +
      • + + ne_check_cmd + + + (Optional[String]) + + + (defaults to: undef) + + + — +
        +

        Specify the check_command to use.

        +
        + +
      • + +
      • + + ne_cmd_path + + + (String) + + + (defaults to: '/usr/lib64/nagios/plugins/') + + + — +
        +

        The path to the command scripts, usually where the nagios_plugins are located. If you use your own scripts, specify the custom location including the trailing slash

        +
        + +
      • + +
      • + + ne_cmd_argstring + + + (Optional[String]) + + + (defaults to: undef) + + + — +
        +

        Specify the string of valid argument for the command , i.e. -w $ARG1$ -c $ARG2$. See the arguments in the man pages for the checks.

        +
        + +
      • + +
      • + + ne_cmd_comment + + + (String) + + + (defaults to: '') + + + — +
        +

        Specify an optional comment for your command definition

        +
        + +
      • + +
      + + + +
      + + + + + +
      +
      +
      +
      +16
      +17
      +18
      +19
      +20
      +21
      +22
      +23
      +24
      +25
      +26
      +27
      +28
      +29
      +30
      +31
      +32
      +33
      +34
      +
      +
      # File 'manifests/commands/definitions.pp', line 16
      +
      +define confdroid_nrpe::commands::definitions (
      +
      +  Optional[String] $ne_check_cmd      = undef,
      +  String $ne_cmd_path                 = '/usr/lib64/nagios/plugins/',
      +  Optional[String] $ne_cmd_argstring  = undef,
      +  String $ne_cmd_comment              = '',
      +
      +) {
      +  $ne_cmd_file      = $confdroid_nrpe::params::ne_cmd_file
      +  $ne_cmd_rule_erb  = $confdroid_nrpe::params::ne_cmd_rule_erb
      +  $ne_manage_cmds   = $confdroid_nrpe::params::ne_manage_cmds
      +
      +  if $ne_manage_cmds == true {
      +    concat::fragment { $name:
      +      target  => $ne_cmd_file,
      +      content => template($ne_cmd_rule_erb),
      +    }
      +  }
      +}
      +
      +
      +
      + + + +
      + + \ No newline at end of file From 86567cad999a6b17e726a3611093df44f20114e6 Mon Sep 17 00:00:00 2001 From: Jenkins Server Date: Tue, 10 Feb 2026 18:17:13 +0100 Subject: [PATCH 4/6] Recommit for updates in build 2 --- doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html index 4b82d70..74adf9c 100644 --- a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html @@ -735,7 +735,7 @@ inherited by all classes except defines. (Array) - (defaults to: ['nrpe','nrpe-selinux']) + (defaults to: ['nrpe','nrpe-selinux','selinux-policy-devel']) — @@ -875,9 +875,9 @@ inherited by all classes except defines. class confdroid_nrpe::params ( String $pkg_ensure = 'present', - Array $reqpackages = ['nrpe','nrpe-selinux'], + Array $reqpackages = ['nrpe','nrpe-selinux','selinux-policy-devel'], - Boolean $ne_manage_cmds = true, + Boolean $ne_manage_cmds = true, # NRPE user settings String $ne_user = 'nrpe', From 0f155fbb60044bc6fdfd1c6698a685a36a209c86 Mon Sep 17 00:00:00 2001 From: Jenkins Server Date: Tue, 10 Feb 2026 18:21:55 +0100 Subject: [PATCH 5/6] Recommit for updates in build 3 --- .../confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html b/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html index bcacf11..201d571 100644 --- a/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html @@ -120,7 +120,7 @@ class confdroid_nrpe::firewall::iptables ( ) inherits confdroid_nrpe::params { if $ne_incl_fw == true { firewall { "${ne_fw_order_no}${ne_nrpe_port} port ${ne_nrpe_port}": -# source => $nagios_server, + source => $nagios_server, proto => 'tcp', dport => $ne_nrpe_port, jump => 'accept', From 7bfeb3d32f190fa11c619e2c01d87f21e6aaeb4e Mon Sep 17 00:00:00 2001 From: Jenkins Server Date: Tue, 10 Feb 2026 18:25:44 +0100 Subject: [PATCH 6/6] Recommit for updates in build 4 --- .../confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html b/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html index 201d571..796aae0 100644 --- a/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html @@ -120,10 +120,10 @@ class confdroid_nrpe::firewall::iptables ( ) inherits confdroid_nrpe::params { if $ne_incl_fw == true { firewall { "${ne_fw_order_no}${ne_nrpe_port} port ${ne_nrpe_port}": - source => $nagios_server, - proto => 'tcp', - dport => $ne_nrpe_port, - jump => 'accept', + source => $ne_nagios_server, + proto => 'tcp', + dport => $ne_nrpe_port, + jump => 'accept', } } }