From 37ba19f44bb18d5dbd93806320a354f2e1391bd2 Mon Sep 17 00:00:00 2001 From: Jenkins Server Date: Mon, 12 May 2025 16:59:55 +0200 Subject: [PATCH 01/16] recommit for updates in build 1 --- doc/_index.html | 187 ++++ doc/css/common.css | 8 + doc/css/full_list.css | 58 + doc/css/style.css | 497 +++++++++ doc/file.README.html | 218 ++++ doc/frames.html | 22 + doc/index.html | 218 ++++ doc/js/app.js | 314 ++++++ doc/js/full_list.js | 216 ++++ doc/js/jquery.js | 4 + doc/puppet_class_list.html | 124 +++ doc/puppet_classes/cd_nrpe.html | 121 +++ ...e_3A_3Acommands_3A_3Adefinition_rules.html | 248 +++++ .../cd_nrpe_3A_3Afirewall_3A_3Aiptables.html | 142 +++ .../cd_nrpe_3A_3Amain_3A_3Aconfig.html | 128 +++ .../cd_nrpe_3A_3Amain_3A_3Adirs.html | 182 ++++ .../cd_nrpe_3A_3Amain_3A_3Afiles.html | 256 +++++ .../cd_nrpe_3A_3Amain_3A_3Ainstall.html | 138 +++ .../cd_nrpe_3A_3Amain_3A_3Aservice.html | 168 +++ .../cd_nrpe_3A_3Amain_3A_3Auser.html | 172 +++ doc/puppet_classes/cd_nrpe_3A_3Aparams.html | 998 ++++++++++++++++++ .../cd_nrpe_3A_3Aselinux_3A_3Aconfig.html | 182 ++++ doc/puppet_defined_type_list.html | 54 + ...d_nrpe_3A_3Acommands_3A_3Adefinitions.html | 228 ++++ doc/top-level-namespace.html | 98 ++ 25 files changed, 4981 insertions(+) create mode 100644 doc/_index.html create mode 100644 doc/css/common.css create mode 100644 doc/css/full_list.css create mode 100644 doc/css/style.css create mode 100644 doc/file.README.html create mode 100644 doc/frames.html create mode 100644 doc/index.html create mode 100644 doc/js/app.js create mode 100644 doc/js/full_list.js create mode 100644 doc/js/jquery.js create mode 100644 doc/puppet_class_list.html create mode 100644 doc/puppet_classes/cd_nrpe.html create mode 100644 doc/puppet_classes/cd_nrpe_3A_3Acommands_3A_3Adefinition_rules.html create mode 100644 doc/puppet_classes/cd_nrpe_3A_3Afirewall_3A_3Aiptables.html create mode 100644 doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Aconfig.html create mode 100644 doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Adirs.html create mode 100644 doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Afiles.html create mode 100644 doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Ainstall.html create mode 100644 doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Aservice.html create mode 100644 doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Auser.html create mode 100644 doc/puppet_classes/cd_nrpe_3A_3Aparams.html create mode 100644 doc/puppet_classes/cd_nrpe_3A_3Aselinux_3A_3Aconfig.html create mode 100644 doc/puppet_defined_type_list.html create mode 100644 doc/puppet_defined_types/cd_nrpe_3A_3Acommands_3A_3Adefinitions.html create mode 100644 doc/top-level-namespace.html diff --git a/doc/_index.html b/doc/_index.html new file mode 100644 index 0000000..a8a6262 --- /dev/null +++ b/doc/_index.html @@ -0,0 +1,187 @@ + + + + + + + Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Documentation by YARD 0.9.36

+
+

Alphabetic Index

+ +

Puppet Class Listing A-Z

+ + + + + + +
+ + + + +
+ + + +

Defined Type Listing A-Z

+ + + + + + +
+ + + + +
+ + + + + + + +

File Listing

+ + +
+ + +
+ +
+ + + +
+ + \ No newline at end of file diff --git a/doc/css/common.css b/doc/css/common.css new file mode 100644 index 0000000..d28b093 --- /dev/null +++ b/doc/css/common.css @@ -0,0 +1,8 @@ +/* Ensure the search bar doesn't overlap with links */ +.fixed_header { + padding-bottom: 25px; +} + +#full_list { + padding-top: 15px; +} diff --git a/doc/css/full_list.css b/doc/css/full_list.css new file mode 100644 index 0000000..fa35982 --- /dev/null +++ b/doc/css/full_list.css @@ -0,0 +1,58 @@ +body { + margin: 0; + font-family: "Lucida Sans", "Lucida Grande", Verdana, Arial, sans-serif; + font-size: 13px; + height: 101%; + overflow-x: hidden; + background: #fafafa; +} + +h1 { padding: 12px 10px; padding-bottom: 0; margin: 0; font-size: 1.4em; } +.clear { clear: both; } +.fixed_header { position: fixed; background: #fff; width: 100%; padding-bottom: 10px; margin-top: 0; top: 0; z-index: 9999; height: 70px; } +#search { position: absolute; right: 5px; top: 9px; padding-left: 24px; } +#content.insearch #search, #content.insearch #noresults { background: url(data:image/gif;base64,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) no-repeat center left; } +#full_list { padding: 0; list-style: none; margin-left: 0; margin-top: 80px; font-size: 1.1em; } +#full_list ul { padding: 0; } +#full_list li { padding: 0; margin: 0; list-style: none; } +#full_list li .item { padding: 5px 5px 5px 12px; } +#noresults { padding: 7px 12px; background: #fff; } +#content.insearch #noresults { margin-left: 7px; } +li.collapsed ul { display: none; } +li a.toggle { cursor: default; position: relative; left: -5px; top: 4px; text-indent: -999px; width: 10px; height: 9px; margin-left: -10px; display: block; float: left; background: url(data:image/png;base64,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) no-repeat bottom left; } +li.collapsed a.toggle { opacity: 0.5; cursor: default; background-position: top left; } +li { color: #888; cursor: pointer; } +li.deprecated { text-decoration: line-through; font-style: italic; } +li.odd { background: #f0f0f0; } +li.even { background: #fafafa; } +.item:hover { background: #ddd; } +li small:before { content: "("; } +li small:after { content: ")"; } +li small.search_info { display: none; } +a, a:visited { text-decoration: none; color: #05a; } +li.clicked > .item { background: #05a; color: #ccc; } +li.clicked > .item a, li.clicked > .item a:visited { color: #eee; } +li.clicked > .item a.toggle { opacity: 0.5; background-position: bottom right; } +li.collapsed.clicked a.toggle { background-position: top right; } +#search input { border: 1px solid #bbb; border-radius: 3px; } +#full_list_nav { margin-left: 10px; font-size: 0.9em; display: block; color: #aaa; } +#full_list_nav a, #nav a:visited { color: #358; } +#full_list_nav a:hover { background: transparent; color: #5af; } +#full_list_nav span:after { content: ' | '; } +#full_list_nav span:last-child:after { content: ''; } + +#content h1 { margin-top: 0; } +li { white-space: nowrap; cursor: normal; } +li small { display: block; font-size: 0.8em; } +li small:before { content: ""; } +li small:after { content: ""; } +li small.search_info { display: none; } +#search { width: 170px; position: static; margin: 3px; margin-left: 10px; font-size: 0.9em; color: #888; padding-left: 0; padding-right: 24px; } +#content.insearch #search { background-position: center right; } +#search input { width: 110px; } + +#full_list.insearch ul { display: block; } +#full_list.insearch .item { display: none; } +#full_list.insearch .found { display: block; padding-left: 11px !important; } +#full_list.insearch li a.toggle { display: none; } +#full_list.insearch li small.search_info { display: block; } diff --git a/doc/css/style.css b/doc/css/style.css new file mode 100644 index 0000000..eb0dbc8 --- /dev/null +++ b/doc/css/style.css @@ -0,0 +1,497 @@ +html { + width: 100%; + height: 100%; +} +body { + font-family: "Lucida Sans", "Lucida Grande", Verdana, Arial, sans-serif; + font-size: 13px; + width: 100%; + margin: 0; + padding: 0; + display: flex; + display: -webkit-flex; + display: -ms-flexbox; +} + +#nav { + position: relative; + width: 100%; + height: 100%; + border: 0; + border-right: 1px dotted #eee; + overflow: auto; +} +.nav_wrap { + margin: 0; + padding: 0; + width: 20%; + height: 100%; + position: relative; + display: flex; + display: -webkit-flex; + display: -ms-flexbox; + flex-shrink: 0; + -webkit-flex-shrink: 0; + -ms-flex: 1 0; +} +#resizer { + position: absolute; + right: -5px; + top: 0; + width: 10px; + height: 100%; + cursor: col-resize; + z-index: 9999; +} +#main { + flex: 5 1; + -webkit-flex: 5 1; + -ms-flex: 5 1; + outline: none; + position: relative; + background: #fff; + padding: 1.2em; + padding-top: 0.2em; + box-sizing: border-box; +} + +@media (max-width: 920px) { + .nav_wrap { width: 100%; top: 0; right: 0; overflow: visible; position: absolute; } + #resizer { display: none; } + #nav { + z-index: 9999; + background: #fff; + display: none; + position: absolute; + top: 40px; + right: 12px; + width: 500px; + max-width: 80%; + height: 80%; + overflow-y: scroll; + border: 1px solid #999; + border-collapse: collapse; + box-shadow: -7px 5px 25px #aaa; + border-radius: 2px; + } +} + +@media (min-width: 920px) { + body { height: 100%; overflow: hidden; } + #main { height: 100%; overflow: auto; } + #search { display: none; } +} + +#main img { max-width: 100%; } +h1 { font-size: 25px; margin: 1em 0 0.5em; padding-top: 4px; border-top: 1px dotted #d5d5d5; } +h1.noborder { border-top: 0px; margin-top: 0; padding-top: 4px; } +h1.title { margin-bottom: 10px; } +h1.alphaindex { margin-top: 0; font-size: 22px; } +h2 { + padding: 0; + padding-bottom: 3px; + border-bottom: 1px #aaa solid; + font-size: 1.4em; + margin: 1.8em 0 0.5em; + position: relative; +} +h2 small { font-weight: normal; font-size: 0.7em; display: inline; position: absolute; right: 0; } +h2 small a { + display: block; + height: 20px; + border: 1px solid #aaa; + border-bottom: 0; + border-top-left-radius: 5px; + background: #f8f8f8; + position: relative; + padding: 2px 7px; +} +.clear { clear: both; } +.inline { display: inline; } +.inline p:first-child { display: inline; } +.docstring, .tags, #filecontents { font-size: 15px; line-height: 1.5145em; } +.docstring p > code, .docstring p > tt, .tags p > code, .tags p > tt { + color: #c7254e; background: #f9f2f4; padding: 2px 4px; font-size: 1em; + border-radius: 4px; +} +.docstring h1, .docstring h2, .docstring h3, .docstring h4 { padding: 0; border: 0; border-bottom: 1px dotted #bbb; } +.docstring h1 { font-size: 1.2em; } +.docstring h2 { font-size: 1.1em; } +.docstring h3, .docstring h4 { font-size: 1em; border-bottom: 0; padding-top: 10px; } +.summary_desc .object_link a, .docstring .object_link a { + font-family: monospace; font-size: 1.05em; + color: #05a; background: #EDF4FA; padding: 2px 4px; font-size: 1em; + border-radius: 4px; +} +.rdoc-term { padding-right: 25px; font-weight: bold; } +.rdoc-list p { margin: 0; padding: 0; margin-bottom: 4px; } +.summary_desc pre.code .object_link a, .docstring pre.code .object_link a { + padding: 0px; background: inherit; color: inherit; border-radius: inherit; +} + +/* style for */ +#filecontents table, .docstring table { border-collapse: collapse; } +#filecontents table th, #filecontents table td, +.docstring table th, .docstring table td { border: 1px solid #ccc; padding: 8px; padding-right: 17px; } +#filecontents table tr:nth-child(odd), +.docstring table tr:nth-child(odd) { background: #eee; } +#filecontents table tr:nth-child(even), +.docstring table tr:nth-child(even) { background: #fff; } +#filecontents table th, .docstring table th { background: #fff; } + +/* style for
a",d=q.getElementsByTagName("*"),e=q.getElementsByTagName("a")[0];if(!d||!d.length||!e)return{};g=c.createElement("select"),h=g.appendChild(c.createElement("option")),i=q.getElementsByTagName("input")[0],b={leadingWhitespace:q.firstChild.nodeType===3,tbody:!q.getElementsByTagName("tbody").length,htmlSerialize:!!q.getElementsByTagName("link").length,style:/top/.test(e.getAttribute("style")),hrefNormalized:e.getAttribute("href")==="/a",opacity:/^0.55/.test(e.style.opacity),cssFloat:!!e.style.cssFloat,checkOn:i.value==="on",optSelected:h.selected,getSetAttribute:q.className!=="t",enctype:!!c.createElement("form").enctype,html5Clone:c.createElement("nav").cloneNode(!0).outerHTML!=="<:nav>",submitBubbles:!0,changeBubbles:!0,focusinBubbles:!1,deleteExpando:!0,noCloneEvent:!0,inlineBlockNeedsLayout:!1,shrinkWrapBlocks:!1,reliableMarginRight:!0},i.checked=!0,b.noCloneChecked=i.cloneNode(!0).checked,g.disabled=!0,b.optDisabled=!h.disabled;try{delete q.test}catch(s){b.deleteExpando=!1}!q.addEventListener&&q.attachEvent&&q.fireEvent&&(q.attachEvent("onclick",function(){b.noCloneEvent=!1}),q.cloneNode(!0).fireEvent("onclick")),i=c.createElement("input"),i.value="t",i.setAttribute("type","radio"),b.radioValue=i.value==="t",i.setAttribute("checked","checked"),q.appendChild(i),k=c.createDocumentFragment(),k.appendChild(q.lastChild),b.checkClone=k.cloneNode(!0).cloneNode(!0).lastChild.checked,b.appendChecked=i.checked,k.removeChild(i),k.appendChild(q),q.innerHTML="",a.getComputedStyle&&(j=c.createElement("div"),j.style.width="0",j.style.marginRight="0",q.style.width="2px",q.appendChild(j),b.reliableMarginRight=(parseInt((a.getComputedStyle(j,null)||{marginRight:0}).marginRight,10)||0)===0);if(q.attachEvent)for(o in{submit:1,change:1,focusin:1})n="on"+o,p=n in q,p||(q.setAttribute(n,"return;"),p=typeof q[n]=="function"),b[o+"Bubbles"]=p;k.removeChild(q),k=g=h=j=q=i=null,f(function(){var a,d,e,g,h,i,j,k,m,n,o,r=c.getElementsByTagName("body")[0];!r||(j=1,k="position:absolute;top:0;left:0;width:1px;height:1px;margin:0;",m="visibility:hidden;border:0;",n="style='"+k+"border:5px solid #000;padding:0;'",o="
"+""+"
",a=c.createElement("div"),a.style.cssText=m+"width:0;height:0;position:static;top:0;margin-top:"+j+"px",r.insertBefore(a,r.firstChild),q=c.createElement("div"),a.appendChild(q),q.innerHTML="
t
",l=q.getElementsByTagName("td"),p=l[0].offsetHeight===0,l[0].style.display="",l[1].style.display="none",b.reliableHiddenOffsets=p&&l[0].offsetHeight===0,q.innerHTML="",q.style.width=q.style.paddingLeft="1px",f.boxModel=b.boxModel=q.offsetWidth===2,typeof q.style.zoom!="undefined"&&(q.style.display="inline",q.style.zoom=1,b.inlineBlockNeedsLayout=q.offsetWidth===2,q.style.display="",q.innerHTML="
",b.shrinkWrapBlocks=q.offsetWidth!==2),q.style.cssText=k+m,q.innerHTML=o,d=q.firstChild,e=d.firstChild,h=d.nextSibling.firstChild.firstChild,i={doesNotAddBorder:e.offsetTop!==5,doesAddBorderForTableAndCells:h.offsetTop===5},e.style.position="fixed",e.style.top="20px",i.fixedPosition=e.offsetTop===20||e.offsetTop===15,e.style.position=e.style.top="",d.style.overflow="hidden",d.style.position="relative",i.subtractsBorderForOverflowNotVisible=e.offsetTop===-5,i.doesNotIncludeMarginInBodyOffset=r.offsetTop!==j,r.removeChild(a),q=a=null,f.extend(b,i))});return b}();var j=/^(?:\{.*\}|\[.*\])$/,k=/([A-Z])/g;f.extend({cache:{},uuid:0,expando:"jQuery"+(f.fn.jquery+Math.random()).replace(/\D/g,""),noData:{embed:!0,object:"clsid:D27CDB6E-AE6D-11cf-96B8-444553540000",applet:!0},hasData:function(a){a=a.nodeType?f.cache[a[f.expando]]:a[f.expando];return!!a&&!m(a)},data:function(a,c,d,e){if(!!f.acceptData(a)){var g,h,i,j=f.expando,k=typeof c=="string",l=a.nodeType,m=l?f.cache:a,n=l?a[j]:a[j]&&j,o=c==="events";if((!n||!m[n]||!o&&!e&&!m[n].data)&&k&&d===b)return;n||(l?a[j]=n=++f.uuid:n=j),m[n]||(m[n]={},l||(m[n].toJSON=f.noop));if(typeof c=="object"||typeof c=="function")e?m[n]=f.extend(m[n],c):m[n].data=f.extend(m[n].data,c);g=h=m[n],e||(h.data||(h.data={}),h=h.data),d!==b&&(h[f.camelCase(c)]=d);if(o&&!h[c])return g.events;k?(i=h[c],i==null&&(i=h[f.camelCase(c)])):i=h;return i}},removeData:function(a,b,c){if(!!f.acceptData(a)){var d,e,g,h=f.expando,i=a.nodeType,j=i?f.cache:a,k=i?a[h]:h;if(!j[k])return;if(b){d=c?j[k]:j[k].data;if(d){f.isArray(b)||(b in d?b=[b]:(b=f.camelCase(b),b in d?b=[b]:b=b.split(" ")));for(e=0,g=b.length;e-1)return!0;return!1},val:function(a){var c,d,e,g=this[0];{if(!!arguments.length){e=f.isFunction(a);return this.each(function(d){var g=f(this),h;if(this.nodeType===1){e?h=a.call(this,d,g.val()):h=a,h==null?h="":typeof h=="number"?h+="":f.isArray(h)&&(h=f.map(h,function(a){return a==null?"":a+""})),c=f.valHooks[this.nodeName.toLowerCase()]||f.valHooks[this.type];if(!c||!("set"in c)||c.set(this,h,"value")===b)this.value=h}})}if(g){c=f.valHooks[g.nodeName.toLowerCase()]||f.valHooks[g.type];if(c&&"get"in c&&(d=c.get(g,"value"))!==b)return d;d=g.value;return typeof d=="string"?d.replace(q,""):d==null?"":d}}}}),f.extend({valHooks:{option:{get:function(a){var b=a.attributes.value;return!b||b.specified?a.value:a.text}},select:{get:function(a){var b,c,d,e,g=a.selectedIndex,h=[],i=a.options,j=a.type==="select-one";if(g<0)return null;c=j?g:0,d=j?g+1:i.length;for(;c=0}),c.length||(a.selectedIndex=-1);return c}}},attrFn:{val:!0,css:!0,html:!0,text:!0,data:!0,width:!0,height:!0,offset:!0},attr:function(a,c,d,e){var g,h,i,j=a.nodeType;if(!!a&&j!==3&&j!==8&&j!==2){if(e&&c in f.attrFn)return f(a)[c](d);if(typeof a.getAttribute=="undefined")return f.prop(a,c,d);i=j!==1||!f.isXMLDoc(a),i&&(c=c.toLowerCase(),h=f.attrHooks[c]||(u.test(c)?x:w));if(d!==b){if(d===null){f.removeAttr(a,c);return}if(h&&"set"in h&&i&&(g=h.set(a,d,c))!==b)return g;a.setAttribute(c,""+d);return d}if(h&&"get"in h&&i&&(g=h.get(a,c))!==null)return g;g=a.getAttribute(c);return g===null?b:g}},removeAttr:function(a,b){var c,d,e,g,h=0;if(b&&a.nodeType===1){d=b.toLowerCase().split(p),g=d.length;for(;h=0}})});var z=/^(?:textarea|input|select)$/i,A=/^([^\.]*)?(?:\.(.+))?$/,B=/\bhover(\.\S+)?\b/,C=/^key/,D=/^(?:mouse|contextmenu)|click/,E=/^(?:focusinfocus|focusoutblur)$/,F=/^(\w*)(?:#([\w\-]+))?(?:\.([\w\-]+))?$/,G=function(a){var b=F.exec(a);b&&(b[1]=(b[1]||"").toLowerCase(),b[3]=b[3]&&new RegExp("(?:^|\\s)"+b[3]+"(?:\\s|$)"));return b},H=function(a,b){var c=a.attributes||{};return(!b[1]||a.nodeName.toLowerCase()===b[1])&&(!b[2]||(c.id||{}).value===b[2])&&(!b[3]||b[3].test((c["class"]||{}).value))},I=function(a){return f.event.special.hover?a:a.replace(B,"mouseenter$1 mouseleave$1")}; +f.event={add:function(a,c,d,e,g){var h,i,j,k,l,m,n,o,p,q,r,s;if(!(a.nodeType===3||a.nodeType===8||!c||!d||!(h=f._data(a)))){d.handler&&(p=d,d=p.handler),d.guid||(d.guid=f.guid++),j=h.events,j||(h.events=j={}),i=h.handle,i||(h.handle=i=function(a){return typeof f!="undefined"&&(!a||f.event.triggered!==a.type)?f.event.dispatch.apply(i.elem,arguments):b},i.elem=a),c=f.trim(I(c)).split(" ");for(k=0;k=0&&(h=h.slice(0,-1),k=!0),h.indexOf(".")>=0&&(i=h.split("."),h=i.shift(),i.sort());if((!e||f.event.customEvent[h])&&!f.event.global[h])return;c=typeof c=="object"?c[f.expando]?c:new f.Event(h,c):new f.Event(h),c.type=h,c.isTrigger=!0,c.exclusive=k,c.namespace=i.join("."),c.namespace_re=c.namespace?new RegExp("(^|\\.)"+i.join("\\.(?:.*\\.)?")+"(\\.|$)"):null,o=h.indexOf(":")<0?"on"+h:"";if(!e){j=f.cache;for(l in j)j[l].events&&j[l].events[h]&&f.event.trigger(c,d,j[l].handle.elem,!0);return}c.result=b,c.target||(c.target=e),d=d!=null?f.makeArray(d):[],d.unshift(c),p=f.event.special[h]||{};if(p.trigger&&p.trigger.apply(e,d)===!1)return;r=[[e,p.bindType||h]];if(!g&&!p.noBubble&&!f.isWindow(e)){s=p.delegateType||h,m=E.test(s+h)?e:e.parentNode,n=null;for(;m;m=m.parentNode)r.push([m,s]),n=m;n&&n===e.ownerDocument&&r.push([n.defaultView||n.parentWindow||a,s])}for(l=0;le&&i.push({elem:this,matches:d.slice(e)});for(j=0;j0?this.on(b,null,a,c):this.trigger(b)},f.attrFn&&(f.attrFn[b]=!0),C.test(b)&&(f.event.fixHooks[b]=f.event.keyHooks),D.test(b)&&(f.event.fixHooks[b]=f.event.mouseHooks)}),function(){function x(a,b,c,e,f,g){for(var h=0,i=e.length;h0){k=j;break}}j=j[a]}e[h]=k}}}function w(a,b,c,e,f,g){for(var h=0,i=e.length;h+~,(\[\\]+)+|[>+~])(\s*,\s*)?((?:.|\r|\n)*)/g,d="sizcache"+(Math.random()+"").replace(".",""),e=0,g=Object.prototype.toString,h=!1,i=!0,j=/\\/g,k=/\r\n/g,l=/\W/;[0,0].sort(function(){i=!1;return 0});var m=function(b,d,e,f){e=e||[],d=d||c;var h=d;if(d.nodeType!==1&&d.nodeType!==9)return[];if(!b||typeof b!="string")return e;var i,j,k,l,n,q,r,t,u=!0,v=m.isXML(d),w=[],x=b;do{a.exec(""),i=a.exec(x);if(i){x=i[3],w.push(i[1]);if(i[2]){l=i[3];break}}}while(i);if(w.length>1&&p.exec(b))if(w.length===2&&o.relative[w[0]])j=y(w[0]+w[1],d,f);else{j=o.relative[w[0]]?[d]:m(w.shift(),d);while(w.length)b=w.shift(),o.relative[b]&&(b+=w.shift()),j=y(b,j,f)}else{!f&&w.length>1&&d.nodeType===9&&!v&&o.match.ID.test(w[0])&&!o.match.ID.test(w[w.length-1])&&(n=m.find(w.shift(),d,v),d=n.expr?m.filter(n.expr,n.set)[0]:n.set[0]);if(d){n=f?{expr:w.pop(),set:s(f)}:m.find(w.pop(),w.length===1&&(w[0]==="~"||w[0]==="+")&&d.parentNode?d.parentNode:d,v),j=n.expr?m.filter(n.expr,n.set):n.set,w.length>0?k=s(j):u=!1;while(w.length)q=w.pop(),r=q,o.relative[q]?r=w.pop():q="",r==null&&(r=d),o.relative[q](k,r,v)}else k=w=[]}k||(k=j),k||m.error(q||b);if(g.call(k)==="[object Array]")if(!u)e.push.apply(e,k);else if(d&&d.nodeType===1)for(t=0;k[t]!=null;t++)k[t]&&(k[t]===!0||k[t].nodeType===1&&m.contains(d,k[t]))&&e.push(j[t]);else for(t=0;k[t]!=null;t++)k[t]&&k[t].nodeType===1&&e.push(j[t]);else s(k,e);l&&(m(l,h,e,f),m.uniqueSort(e));return e};m.uniqueSort=function(a){if(u){h=i,a.sort(u);if(h)for(var b=1;b0},m.find=function(a,b,c){var d,e,f,g,h,i;if(!a)return[];for(e=0,f=o.order.length;e":function(a,b){var c,d=typeof b=="string",e=0,f=a.length;if(d&&!l.test(b)){b=b.toLowerCase();for(;e=0)?c||d.push(h):c&&(b[g]=!1));return!1},ID:function(a){return a[1].replace(j,"")},TAG:function(a,b){return a[1].replace(j,"").toLowerCase()},CHILD:function(a){if(a[1]==="nth"){a[2]||m.error(a[0]),a[2]=a[2].replace(/^\+|\s*/g,"");var b=/(-?)(\d*)(?:n([+\-]?\d*))?/.exec(a[2]==="even"&&"2n"||a[2]==="odd"&&"2n+1"||!/\D/.test(a[2])&&"0n+"+a[2]||a[2]);a[2]=b[1]+(b[2]||1)-0,a[3]=b[3]-0}else a[2]&&m.error(a[0]);a[0]=e++;return a},ATTR:function(a,b,c,d,e,f){var g=a[1]=a[1].replace(j,"");!f&&o.attrMap[g]&&(a[1]=o.attrMap[g]),a[4]=(a[4]||a[5]||"").replace(j,""),a[2]==="~="&&(a[4]=" "+a[4]+" ");return a},PSEUDO:function(b,c,d,e,f){if(b[1]==="not")if((a.exec(b[3])||"").length>1||/^\w/.test(b[3]))b[3]=m(b[3],null,null,c);else{var g=m.filter(b[3],c,d,!0^f);d||e.push.apply(e,g);return!1}else if(o.match.POS.test(b[0])||o.match.CHILD.test(b[0]))return!0;return b},POS:function(a){a.unshift(!0);return a}},filters:{enabled:function(a){return a.disabled===!1&&a.type!=="hidden"},disabled:function(a){return a.disabled===!0},checked:function(a){return a.checked===!0},selected:function(a){a.parentNode&&a.parentNode.selectedIndex;return a.selected===!0},parent:function(a){return!!a.firstChild},empty:function(a){return!a.firstChild},has:function(a,b,c){return!!m(c[3],a).length},header:function(a){return/h\d/i.test(a.nodeName)},text:function(a){var b=a.getAttribute("type"),c=a.type;return a.nodeName.toLowerCase()==="input"&&"text"===c&&(b===c||b===null)},radio:function(a){return a.nodeName.toLowerCase()==="input"&&"radio"===a.type},checkbox:function(a){return a.nodeName.toLowerCase()==="input"&&"checkbox"===a.type},file:function(a){return a.nodeName.toLowerCase()==="input"&&"file"===a.type},password:function(a){return a.nodeName.toLowerCase()==="input"&&"password"===a.type},submit:function(a){var b=a.nodeName.toLowerCase();return(b==="input"||b==="button")&&"submit"===a.type},image:function(a){return a.nodeName.toLowerCase()==="input"&&"image"===a.type},reset:function(a){var b=a.nodeName.toLowerCase();return(b==="input"||b==="button")&&"reset"===a.type},button:function(a){var b=a.nodeName.toLowerCase();return b==="input"&&"button"===a.type||b==="button"},input:function(a){return/input|select|textarea|button/i.test(a.nodeName)},focus:function(a){return a===a.ownerDocument.activeElement}},setFilters:{first:function(a,b){return b===0},last:function(a,b,c,d){return b===d.length-1},even:function(a,b){return b%2===0},odd:function(a,b){return b%2===1},lt:function(a,b,c){return bc[3]-0},nth:function(a,b,c){return c[3]-0===b},eq:function(a,b,c){return c[3]-0===b}},filter:{PSEUDO:function(a,b,c,d){var e=b[1],f=o.filters[e];if(f)return f(a,c,b,d);if(e==="contains")return(a.textContent||a.innerText||n([a])||"").indexOf(b[3])>=0;if(e==="not"){var g=b[3];for(var h=0,i=g.length;h=0}},ID:function(a,b){return a.nodeType===1&&a.getAttribute("id")===b},TAG:function(a,b){return b==="*"&&a.nodeType===1||!!a.nodeName&&a.nodeName.toLowerCase()===b},CLASS:function(a,b){return(" "+(a.className||a.getAttribute("class"))+" ").indexOf(b)>-1},ATTR:function(a,b){var c=b[1],d=m.attr?m.attr(a,c):o.attrHandle[c]?o.attrHandle[c](a):a[c]!=null?a[c]:a.getAttribute(c),e=d+"",f=b[2],g=b[4];return d==null?f==="!=":!f&&m.attr?d!=null:f==="="?e===g:f==="*="?e.indexOf(g)>=0:f==="~="?(" "+e+" ").indexOf(g)>=0:g?f==="!="?e!==g:f==="^="?e.indexOf(g)===0:f==="$="?e.substr(e.length-g.length)===g:f==="|="?e===g||e.substr(0,g.length+1)===g+"-":!1:e&&d!==!1},POS:function(a,b,c,d){var e=b[2],f=o.setFilters[e];if(f)return f(a,c,b,d)}}},p=o.match.POS,q=function(a,b){return"\\"+(b-0+1)};for(var r in o.match)o.match[r]=new RegExp(o.match[r].source+/(?![^\[]*\])(?![^\(]*\))/.source),o.leftMatch[r]=new RegExp(/(^(?:.|\r|\n)*?)/.source+o.match[r].source.replace(/\\(\d+)/g,q));var s=function(a,b){a=Array.prototype.slice.call(a,0);if(b){b.push.apply(b,a);return b}return a};try{Array.prototype.slice.call(c.documentElement.childNodes,0)[0].nodeType}catch(t){s=function(a,b){var c=0,d=b||[];if(g.call(a)==="[object Array]")Array.prototype.push.apply(d,a);else if(typeof a.length=="number")for(var e=a.length;c",e.insertBefore(a,e.firstChild),c.getElementById(d)&&(o.find.ID=function(a,c,d){if(typeof c.getElementById!="undefined"&&!d){var e=c.getElementById(a[1]);return e?e.id===a[1]||typeof e.getAttributeNode!="undefined"&&e.getAttributeNode("id").nodeValue===a[1]?[e]:b:[]}},o.filter.ID=function(a,b){var c=typeof a.getAttributeNode!="undefined"&&a.getAttributeNode("id");return a.nodeType===1&&c&&c.nodeValue===b}),e.removeChild(a),e=a=null}(),function(){var a=c.createElement("div");a.appendChild(c.createComment("")),a.getElementsByTagName("*").length>0&&(o.find.TAG=function(a,b){var c=b.getElementsByTagName(a[1]);if(a[1]==="*"){var d=[];for(var e=0;c[e];e++)c[e].nodeType===1&&d.push(c[e]);c=d}return c}),a.innerHTML="",a.firstChild&&typeof a.firstChild.getAttribute!="undefined"&&a.firstChild.getAttribute("href")!=="#"&&(o.attrHandle.href=function(a){return a.getAttribute("href",2)}),a=null}(),c.querySelectorAll&&function(){var a=m,b=c.createElement("div"),d="__sizzle__";b.innerHTML="

";if(!b.querySelectorAll||b.querySelectorAll(".TEST").length!==0){m=function(b,e,f,g){e=e||c;if(!g&&!m.isXML(e)){var h=/^(\w+$)|^\.([\w\-]+$)|^#([\w\-]+$)/.exec(b);if(h&&(e.nodeType===1||e.nodeType===9)){if(h[1])return s(e.getElementsByTagName(b),f);if(h[2]&&o.find.CLASS&&e.getElementsByClassName)return s(e.getElementsByClassName(h[2]),f)}if(e.nodeType===9){if(b==="body"&&e.body)return s([e.body],f);if(h&&h[3]){var i=e.getElementById(h[3]);if(!i||!i.parentNode)return s([],f);if(i.id===h[3])return s([i],f)}try{return s(e.querySelectorAll(b),f)}catch(j){}}else if(e.nodeType===1&&e.nodeName.toLowerCase()!=="object"){var k=e,l=e.getAttribute("id"),n=l||d,p=e.parentNode,q=/^\s*[+~]/.test(b);l?n=n.replace(/'/g,"\\$&"):e.setAttribute("id",n),q&&p&&(e=e.parentNode);try{if(!q||p)return s(e.querySelectorAll("[id='"+n+"'] "+b),f)}catch(r){}finally{l||k.removeAttribute("id")}}}return a(b,e,f,g)};for(var e in a)m[e]=a[e];b=null}}(),function(){var a=c.documentElement,b=a.matchesSelector||a.mozMatchesSelector||a.webkitMatchesSelector||a.msMatchesSelector;if(b){var d=!b.call(c.createElement("div"),"div"),e=!1;try{b.call(c.documentElement,"[test!='']:sizzle")}catch(f){e=!0}m.matchesSelector=function(a,c){c=c.replace(/\=\s*([^'"\]]*)\s*\]/g,"='$1']");if(!m.isXML(a))try{if(e||!o.match.PSEUDO.test(c)&&!/!=/.test(c)){var f=b.call(a,c);if(f||!d||a.document&&a.document.nodeType!==11)return f}}catch(g){}return m(c,null,null,[a]).length>0}}}(),function(){var a=c.createElement("div");a.innerHTML="
";if(!!a.getElementsByClassName&&a.getElementsByClassName("e").length!==0){a.lastChild.className="e";if(a.getElementsByClassName("e").length===1)return;o.order.splice(1,0,"CLASS"),o.find.CLASS=function(a,b,c){if(typeof b.getElementsByClassName!="undefined"&&!c)return b.getElementsByClassName(a[1])},a=null}}(),c.documentElement.contains?m.contains=function(a,b){return a!==b&&(a.contains?a.contains(b):!0)}:c.documentElement.compareDocumentPosition?m.contains=function(a,b){return!!(a.compareDocumentPosition(b)&16)}:m.contains=function(){return!1},m.isXML=function(a){var b=(a?a.ownerDocument||a:0).documentElement;return b?b.nodeName!=="HTML":!1};var y=function(a,b,c){var d,e=[],f="",g=b.nodeType?[b]:b;while(d=o.match.PSEUDO.exec(a))f+=d[0],a=a.replace(o.match.PSEUDO,"");a=o.relative[a]?a+"*":a;for(var h=0,i=g.length;h0)for(h=g;h=0:f.filter(a,this).length>0:this.filter(a).length>0)},closest:function(a,b){var c=[],d,e,g=this[0];if(f.isArray(a)){var h=1;while(g&&g.ownerDocument&&g!==b){for(d=0;d-1:f.find.matchesSelector(g,a)){c.push(g);break}g=g.parentNode;if(!g||!g.ownerDocument||g===b||g.nodeType===11)break}}c=c.length>1?f.unique(c):c;return this.pushStack(c,"closest",a)},index:function(a){if(!a)return this[0]&&this[0].parentNode?this.prevAll().length:-1;if(typeof a=="string")return f.inArray(this[0],f(a));return f.inArray(a.jquery?a[0]:a,this)},add:function(a,b){var c=typeof a=="string"?f(a,b):f.makeArray(a&&a.nodeType?[a]:a),d=f.merge(this.get(),c);return this.pushStack(S(c[0])||S(d[0])?d:f.unique(d))},andSelf:function(){return this.add(this.prevObject)}}),f.each({parent:function(a){var b=a.parentNode;return b&&b.nodeType!==11?b:null},parents:function(a){return f.dir(a,"parentNode")},parentsUntil:function(a,b,c){return f.dir(a,"parentNode",c)},next:function(a){return f.nth(a,2,"nextSibling")},prev:function(a){return f.nth(a,2,"previousSibling")},nextAll:function(a){return f.dir(a,"nextSibling")},prevAll:function(a){return f.dir(a,"previousSibling")},nextUntil:function(a,b,c){return f.dir(a,"nextSibling",c)},prevUntil:function(a,b,c){return f.dir(a,"previousSibling",c)},siblings:function(a){return f.sibling(a.parentNode.firstChild,a)},children:function(a){return f.sibling(a.firstChild)},contents:function(a){return f.nodeName(a,"iframe")?a.contentDocument||a.contentWindow.document:f.makeArray(a.childNodes)}},function(a,b){f.fn[a]=function(c,d){var e=f.map(this,b,c);L.test(a)||(d=c),d&&typeof d=="string"&&(e=f.filter(d,e)),e=this.length>1&&!R[a]?f.unique(e):e,(this.length>1||N.test(d))&&M.test(a)&&(e=e.reverse());return this.pushStack(e,a,P.call(arguments).join(","))}}),f.extend({filter:function(a,b,c){c&&(a=":not("+a+")");return b.length===1?f.find.matchesSelector(b[0],a)?[b[0]]:[]:f.find.matches(a,b)},dir:function(a,c,d){var e=[],g=a[c];while(g&&g.nodeType!==9&&(d===b||g.nodeType!==1||!f(g).is(d)))g.nodeType===1&&e.push(g),g=g[c];return e},nth:function(a,b,c,d){b=b||1;var e=0;for(;a;a=a[c])if(a.nodeType===1&&++e===b)break;return a},sibling:function(a,b){var c=[];for(;a;a=a.nextSibling)a.nodeType===1&&a!==b&&c.push(a);return c}});var V="abbr|article|aside|audio|canvas|datalist|details|figcaption|figure|footer|header|hgroup|mark|meter|nav|output|progress|section|summary|time|video",W=/ jQuery\d+="(?:\d+|null)"/g,X=/^\s+/,Y=/<(?!area|br|col|embed|hr|img|input|link|meta|param)(([\w:]+)[^>]*)\/>/ig,Z=/<([\w:]+)/,$=/",""],legend:[1,"
","
"],thead:[1,"","
"],tr:[2,"","
"],td:[3,"","
"],col:[2,"","
"],area:[1,"",""],_default:[0,"",""]},bh=U(c);bg.optgroup=bg.option,bg.tbody=bg.tfoot=bg.colgroup=bg.caption=bg.thead,bg.th=bg.td,f.support.htmlSerialize||(bg._default=[1,"div
","
"]),f.fn.extend({text:function(a){if(f.isFunction(a))return this.each(function(b){var c=f(this);c.text(a.call(this,b,c.text()))});if(typeof a!="object"&&a!==b)return this.empty().append((this[0]&&this[0].ownerDocument||c).createTextNode(a));return f.text(this)},wrapAll:function(a){if(f.isFunction(a))return this.each(function(b){f(this).wrapAll(a.call(this,b))});if(this[0]){var b=f(a,this[0].ownerDocument).eq(0).clone(!0);this[0].parentNode&&b.insertBefore(this[0]),b.map(function(){var a=this;while(a.firstChild&&a.firstChild.nodeType===1)a=a.firstChild;return a}).append(this)}return this},wrapInner:function(a){if(f.isFunction(a))return this.each(function(b){f(this).wrapInner(a.call(this,b))});return this.each(function(){var b=f(this),c=b.contents();c.length?c.wrapAll(a):b.append(a)})},wrap:function(a){var b=f.isFunction(a);return this.each(function(c){f(this).wrapAll(b?a.call(this,c):a)})},unwrap:function(){return this.parent().each(function(){f.nodeName(this,"body")||f(this).replaceWith(this.childNodes)}).end()},append:function(){return this.domManip(arguments,!0,function(a){this.nodeType===1&&this.appendChild(a)})},prepend:function(){return this.domManip(arguments,!0,function(a){this.nodeType===1&&this.insertBefore(a,this.firstChild)})},before:function(){if(this[0]&&this[0].parentNode)return this.domManip(arguments,!1,function(a){this.parentNode.insertBefore(a,this)});if(arguments.length){var a=f.clean(arguments);a.push.apply(a,this.toArray());return this.pushStack(a,"before",arguments)}},after:function(){if(this[0]&&this[0].parentNode)return this.domManip(arguments,!1,function(a){this.parentNode.insertBefore(a,this.nextSibling)});if(arguments.length){var a=this.pushStack(this,"after",arguments);a.push.apply(a,f.clean(arguments));return a}},remove:function(a,b){for(var c=0,d;(d=this[c])!=null;c++)if(!a||f.filter(a,[d]).length)!b&&d.nodeType===1&&(f.cleanData(d.getElementsByTagName("*")),f.cleanData([d])),d.parentNode&&d.parentNode.removeChild(d);return this},empty:function() +{for(var a=0,b;(b=this[a])!=null;a++){b.nodeType===1&&f.cleanData(b.getElementsByTagName("*"));while(b.firstChild)b.removeChild(b.firstChild)}return this},clone:function(a,b){a=a==null?!1:a,b=b==null?a:b;return this.map(function(){return f.clone(this,a,b)})},html:function(a){if(a===b)return this[0]&&this[0].nodeType===1?this[0].innerHTML.replace(W,""):null;if(typeof a=="string"&&!ba.test(a)&&(f.support.leadingWhitespace||!X.test(a))&&!bg[(Z.exec(a)||["",""])[1].toLowerCase()]){a=a.replace(Y,"<$1>");try{for(var c=0,d=this.length;c1&&l0?this.clone(!0):this).get();f(e[h])[b](j),d=d.concat(j)}return this.pushStack(d,a,e.selector)}}),f.extend({clone:function(a,b,c){var d,e,g,h=f.support.html5Clone||!bc.test("<"+a.nodeName)?a.cloneNode(!0):bo(a);if((!f.support.noCloneEvent||!f.support.noCloneChecked)&&(a.nodeType===1||a.nodeType===11)&&!f.isXMLDoc(a)){bk(a,h),d=bl(a),e=bl(h);for(g=0;d[g];++g)e[g]&&bk(d[g],e[g])}if(b){bj(a,h);if(c){d=bl(a),e=bl(h);for(g=0;d[g];++g)bj(d[g],e[g])}}d=e=null;return h},clean:function(a,b,d,e){var g;b=b||c,typeof b.createElement=="undefined"&&(b=b.ownerDocument||b[0]&&b[0].ownerDocument||c);var h=[],i;for(var j=0,k;(k=a[j])!=null;j++){typeof k=="number"&&(k+="");if(!k)continue;if(typeof k=="string")if(!_.test(k))k=b.createTextNode(k);else{k=k.replace(Y,"<$1>");var l=(Z.exec(k)||["",""])[1].toLowerCase(),m=bg[l]||bg._default,n=m[0],o=b.createElement("div");b===c?bh.appendChild(o):U(b).appendChild(o),o.innerHTML=m[1]+k+m[2];while(n--)o=o.lastChild;if(!f.support.tbody){var p=$.test(k),q=l==="table"&&!p?o.firstChild&&o.firstChild.childNodes:m[1]===""&&!p?o.childNodes:[];for(i=q.length-1;i>=0;--i)f.nodeName(q[i],"tbody")&&!q[i].childNodes.length&&q[i].parentNode.removeChild(q[i])}!f.support.leadingWhitespace&&X.test(k)&&o.insertBefore(b.createTextNode(X.exec(k)[0]),o.firstChild),k=o.childNodes}var r;if(!f.support.appendChecked)if(k[0]&&typeof (r=k.length)=="number")for(i=0;i=0)return b+"px"}}}),f.support.opacity||(f.cssHooks.opacity={get:function(a,b){return br.test((b&&a.currentStyle?a.currentStyle.filter:a.style.filter)||"")?parseFloat(RegExp.$1)/100+"":b?"1":""},set:function(a,b){var c=a.style,d=a.currentStyle,e=f.isNumeric(b)?"alpha(opacity="+b*100+")":"",g=d&&d.filter||c.filter||"";c.zoom=1;if(b>=1&&f.trim(g.replace(bq,""))===""){c.removeAttribute("filter");if(d&&!d.filter)return}c.filter=bq.test(g)?g.replace(bq,e):g+" "+e}}),f(function(){f.support.reliableMarginRight||(f.cssHooks.marginRight={get:function(a,b){var c;f.swap(a,{display:"inline-block"},function(){b?c=bz(a,"margin-right","marginRight"):c=a.style.marginRight});return c}})}),c.defaultView&&c.defaultView.getComputedStyle&&(bA=function(a,b){var c,d,e;b=b.replace(bs,"-$1").toLowerCase(),(d=a.ownerDocument.defaultView)&&(e=d.getComputedStyle(a,null))&&(c=e.getPropertyValue(b),c===""&&!f.contains(a.ownerDocument.documentElement,a)&&(c=f.style(a,b)));return c}),c.documentElement.currentStyle&&(bB=function(a,b){var c,d,e,f=a.currentStyle&&a.currentStyle[b],g=a.style;f===null&&g&&(e=g[b])&&(f=e),!bt.test(f)&&bu.test(f)&&(c=g.left,d=a.runtimeStyle&&a.runtimeStyle.left,d&&(a.runtimeStyle.left=a.currentStyle.left),g.left=b==="fontSize"?"1em":f||0,f=g.pixelLeft+"px",g.left=c,d&&(a.runtimeStyle.left=d));return f===""?"auto":f}),bz=bA||bB,f.expr&&f.expr.filters&&(f.expr.filters.hidden=function(a){var b=a.offsetWidth,c=a.offsetHeight;return b===0&&c===0||!f.support.reliableHiddenOffsets&&(a.style&&a.style.display||f.css(a,"display"))==="none"},f.expr.filters.visible=function(a){return!f.expr.filters.hidden(a)});var bD=/%20/g,bE=/\[\]$/,bF=/\r?\n/g,bG=/#.*$/,bH=/^(.*?):[ \t]*([^\r\n]*)\r?$/mg,bI=/^(?:color|date|datetime|datetime-local|email|hidden|month|number|password|range|search|tel|text|time|url|week)$/i,bJ=/^(?:about|app|app\-storage|.+\-extension|file|res|widget):$/,bK=/^(?:GET|HEAD)$/,bL=/^\/\//,bM=/\?/,bN=/)<[^<]*)*<\/script>/gi,bO=/^(?:select|textarea)/i,bP=/\s+/,bQ=/([?&])_=[^&]*/,bR=/^([\w\+\.\-]+:)(?:\/\/([^\/?#:]*)(?::(\d+))?)?/,bS=f.fn.load,bT={},bU={},bV,bW,bX=["*/"]+["*"];try{bV=e.href}catch(bY){bV=c.createElement("a"),bV.href="",bV=bV.href}bW=bR.exec(bV.toLowerCase())||[],f.fn.extend({load:function(a,c,d){if(typeof a!="string"&&bS)return bS.apply(this,arguments);if(!this.length)return this;var e=a.indexOf(" ");if(e>=0){var g=a.slice(e,a.length);a=a.slice(0,e)}var h="GET";c&&(f.isFunction(c)?(d=c,c=b):typeof c=="object"&&(c=f.param(c,f.ajaxSettings.traditional),h="POST"));var i=this;f.ajax({url:a,type:h,dataType:"html",data:c,complete:function(a,b,c){c=a.responseText,a.isResolved()&&(a.done(function(a){c=a}),i.html(g?f("
").append(c.replace(bN,"")).find(g):c)),d&&i.each(d,[c,b,a])}});return this},serialize:function(){return f.param(this.serializeArray())},serializeArray:function(){return this.map(function(){return this.elements?f.makeArray(this.elements):this}).filter(function(){return this.name&&!this.disabled&&(this.checked||bO.test(this.nodeName)||bI.test(this.type))}).map(function(a,b){var c=f(this).val();return c==null?null:f.isArray(c)?f.map(c,function(a,c){return{name:b.name,value:a.replace(bF,"\r\n")}}):{name:b.name,value:c.replace(bF,"\r\n")}}).get()}}),f.each("ajaxStart ajaxStop ajaxComplete ajaxError ajaxSuccess ajaxSend".split(" "),function(a,b){f.fn[b]=function(a){return this.on(b,a)}}),f.each(["get","post"],function(a,c){f[c]=function(a,d,e,g){f.isFunction(d)&&(g=g||e,e=d,d=b);return f.ajax({type:c,url:a,data:d,success:e,dataType:g})}}),f.extend({getScript:function(a,c){return f.get(a,b,c,"script")},getJSON:function(a,b,c){return f.get(a,b,c,"json")},ajaxSetup:function(a,b){b?b_(a,f.ajaxSettings):(b=a,a=f.ajaxSettings),b_(a,b);return a},ajaxSettings:{url:bV,isLocal:bJ.test(bW[1]),global:!0,type:"GET",contentType:"application/x-www-form-urlencoded",processData:!0,async:!0,accepts:{xml:"application/xml, text/xml",html:"text/html",text:"text/plain",json:"application/json, text/javascript","*":bX},contents:{xml:/xml/,html:/html/,json:/json/},responseFields:{xml:"responseXML",text:"responseText"},converters:{"* text":a.String,"text html":!0,"text json":f.parseJSON,"text xml":f.parseXML},flatOptions:{context:!0,url:!0}},ajaxPrefilter:bZ(bT),ajaxTransport:bZ(bU),ajax:function(a,c){function w(a,c,l,m){if(s!==2){s=2,q&&clearTimeout(q),p=b,n=m||"",v.readyState=a>0?4:0;var o,r,u,w=c,x=l?cb(d,v,l):b,y,z;if(a>=200&&a<300||a===304){if(d.ifModified){if(y=v.getResponseHeader("Last-Modified"))f.lastModified[k]=y;if(z=v.getResponseHeader("Etag"))f.etag[k]=z}if(a===304)w="notmodified",o=!0;else try{r=cc(d,x),w="success",o=!0}catch(A){w="parsererror",u=A}}else{u=w;if(!w||a)w="error",a<0&&(a=0)}v.status=a,v.statusText=""+(c||w),o?h.resolveWith(e,[r,w,v]):h.rejectWith(e,[v,w,u]),v.statusCode(j),j=b,t&&g.trigger("ajax"+(o?"Success":"Error"),[v,d,o?r:u]),i.fireWith(e,[v,w]),t&&(g.trigger("ajaxComplete",[v,d]),--f.active||f.event.trigger("ajaxStop"))}}typeof a=="object"&&(c=a,a=b),c=c||{};var d=f.ajaxSetup({},c),e=d.context||d,g=e!==d&&(e.nodeType||e instanceof f)?f(e):f.event,h=f.Deferred(),i=f.Callbacks("once memory"),j=d.statusCode||{},k,l={},m={},n,o,p,q,r,s=0,t,u,v={readyState:0,setRequestHeader:function(a,b){if(!s){var c=a.toLowerCase();a=m[c]=m[c]||a,l[a]=b}return this},getAllResponseHeaders:function(){return s===2?n:null},getResponseHeader:function(a){var c;if(s===2){if(!o){o={};while(c=bH.exec(n))o[c[1].toLowerCase()]=c[2]}c=o[a.toLowerCase()]}return c===b?null:c},overrideMimeType:function(a){s||(d.mimeType=a);return this},abort:function(a){a=a||"abort",p&&p.abort(a),w(0,a);return this}};h.promise(v),v.success=v.done,v.error=v.fail,v.complete=i.add,v.statusCode=function(a){if(a){var b;if(s<2)for(b in a)j[b]=[j[b],a[b]];else b=a[v.status],v.then(b,b)}return this},d.url=((a||d.url)+"").replace(bG,"").replace(bL,bW[1]+"//"),d.dataTypes=f.trim(d.dataType||"*").toLowerCase().split(bP),d.crossDomain==null&&(r=bR.exec(d.url.toLowerCase()),d.crossDomain=!(!r||r[1]==bW[1]&&r[2]==bW[2]&&(r[3]||(r[1]==="http:"?80:443))==(bW[3]||(bW[1]==="http:"?80:443)))),d.data&&d.processData&&typeof d.data!="string"&&(d.data=f.param(d.data,d.traditional)),b$(bT,d,c,v);if(s===2)return!1;t=d.global,d.type=d.type.toUpperCase(),d.hasContent=!bK.test(d.type),t&&f.active++===0&&f.event.trigger("ajaxStart");if(!d.hasContent){d.data&&(d.url+=(bM.test(d.url)?"&":"?")+d.data,delete d.data),k=d.url;if(d.cache===!1){var x=f.now(),y=d.url.replace(bQ,"$1_="+x);d.url=y+(y===d.url?(bM.test(d.url)?"&":"?")+"_="+x:"")}}(d.data&&d.hasContent&&d.contentType!==!1||c.contentType)&&v.setRequestHeader("Content-Type",d.contentType),d.ifModified&&(k=k||d.url,f.lastModified[k]&&v.setRequestHeader("If-Modified-Since",f.lastModified[k]),f.etag[k]&&v.setRequestHeader("If-None-Match",f.etag[k])),v.setRequestHeader("Accept",d.dataTypes[0]&&d.accepts[d.dataTypes[0]]?d.accepts[d.dataTypes[0]]+(d.dataTypes[0]!=="*"?", "+bX+"; q=0.01":""):d.accepts["*"]);for(u in d.headers)v.setRequestHeader(u,d.headers[u]);if(d.beforeSend&&(d.beforeSend.call(e,v,d)===!1||s===2)){v.abort();return!1}for(u in{success:1,error:1,complete:1})v[u](d[u]);p=b$(bU,d,c,v);if(!p)w(-1,"No Transport");else{v.readyState=1,t&&g.trigger("ajaxSend",[v,d]),d.async&&d.timeout>0&&(q=setTimeout(function(){v.abort("timeout")},d.timeout));try{s=1,p.send(l,w)}catch(z){if(s<2)w(-1,z);else throw z}}return v},param:function(a,c){var d=[],e=function(a,b){b=f.isFunction(b)?b():b,d[d.length]=encodeURIComponent(a)+"="+encodeURIComponent(b)};c===b&&(c=f.ajaxSettings.traditional);if(f.isArray(a)||a.jquery&&!f.isPlainObject(a))f.each(a,function(){e(this.name,this.value)});else for(var g in a)ca(g,a[g],c,e);return d.join("&").replace(bD,"+")}}),f.extend({active:0,lastModified:{},etag:{}});var cd=f.now(),ce=/(\=)\?(&|$)|\?\?/i;f.ajaxSetup({jsonp:"callback",jsonpCallback:function(){return f.expando+"_"+cd++}}),f.ajaxPrefilter("json jsonp",function(b,c,d){var e=b.contentType==="application/x-www-form-urlencoded"&&typeof b.data=="string";if(b.dataTypes[0]==="jsonp"||b.jsonp!==!1&&(ce.test(b.url)||e&&ce.test(b.data))){var g,h=b.jsonpCallback=f.isFunction(b.jsonpCallback)?b.jsonpCallback():b.jsonpCallback,i=a[h],j=b.url,k=b.data,l="$1"+h+"$2";b.jsonp!==!1&&(j=j.replace(ce,l),b.url===j&&(e&&(k=k.replace(ce,l)),b.data===k&&(j+=(/\?/.test(j)?"&":"?")+b.jsonp+"="+h))),b.url=j,b.data=k,a[h]=function(a){g=[a]},d.always(function(){a[h]=i,g&&f.isFunction(i)&&a[h](g[0])}),b.converters["script json"]=function(){g||f.error(h+" was not called");return g[0]},b.dataTypes[0]="json";return"script"}}),f.ajaxSetup({accepts:{script:"text/javascript, application/javascript, application/ecmascript, application/x-ecmascript"},contents:{script:/javascript|ecmascript/},converters:{"text script":function(a){f.globalEval(a);return a}}}),f.ajaxPrefilter("script",function(a){a.cache===b&&(a.cache=!1),a.crossDomain&&(a.type="GET",a.global=!1)}),f.ajaxTransport("script",function(a){if(a.crossDomain){var d,e=c.head||c.getElementsByTagName("head")[0]||c.documentElement;return{send:function(f,g){d=c.createElement("script"),d.async="async",a.scriptCharset&&(d.charset=a.scriptCharset),d.src=a.url,d.onload=d.onreadystatechange=function(a,c){if(c||!d.readyState||/loaded|complete/.test(d.readyState))d.onload=d.onreadystatechange=null,e&&d.parentNode&&e.removeChild(d),d=b,c||g(200,"success")},e.insertBefore(d,e.firstChild)},abort:function(){d&&d.onload(0,1)}}}});var cf=a.ActiveXObject?function(){for(var a in ch)ch[a](0,1)}:!1,cg=0,ch;f.ajaxSettings.xhr=a.ActiveXObject?function(){return!this.isLocal&&ci()||cj()}:ci,function(a){f.extend(f.support,{ajax:!!a,cors:!!a&&"withCredentials"in a})}(f.ajaxSettings.xhr()),f.support.ajax&&f.ajaxTransport(function(c){if(!c.crossDomain||f.support.cors){var d;return{send:function(e,g){var h=c.xhr(),i,j;c.username?h.open(c.type,c.url,c.async,c.username,c.password):h.open(c.type,c.url,c.async);if(c.xhrFields)for(j in c.xhrFields)h[j]=c.xhrFields[j];c.mimeType&&h.overrideMimeType&&h.overrideMimeType(c.mimeType),!c.crossDomain&&!e["X-Requested-With"]&&(e["X-Requested-With"]="XMLHttpRequest");try{for(j in e)h.setRequestHeader(j,e[j])}catch(k){}h.send(c.hasContent&&c.data||null),d=function(a,e){var j,k,l,m,n;try{if(d&&(e||h.readyState===4)){d=b,i&&(h.onreadystatechange=f.noop,cf&&delete ch[i]);if(e)h.readyState!==4&&h.abort();else{j=h.status,l=h.getAllResponseHeaders(),m={},n=h.responseXML,n&&n.documentElement&&(m.xml=n),m.text=h.responseText;try{k=h.statusText}catch(o){k=""}!j&&c.isLocal&&!c.crossDomain?j=m.text?200:404:j===1223&&(j=204)}}}catch(p){e||g(-1,p)}m&&g(j,k,m,l)},!c.async||h.readyState===4?d():(i=++cg,cf&&(ch||(ch={},f(a).unload(cf)),ch[i]=d),h.onreadystatechange=d)},abort:function(){d&&d(0,1)}}}});var ck={},cl,cm,cn=/^(?:toggle|show|hide)$/,co=/^([+\-]=)?([\d+.\-]+)([a-z%]*)$/i,cp,cq=[["height","marginTop","marginBottom","paddingTop","paddingBottom"],["width","marginLeft","marginRight","paddingLeft","paddingRight"],["opacity"]],cr;f.fn.extend({show:function(a,b,c){var d,e;if(a||a===0)return this.animate(cu("show",3),a,b,c);for(var g=0,h=this.length;g=i.duration+this.startTime){this.now=this.end,this.pos=this.state=1,this.update(),i.animatedProperties[this.prop]=!0;for(b in i.animatedProperties)i.animatedProperties[b]!==!0&&(g=!1);if(g){i.overflow!=null&&!f.support.shrinkWrapBlocks&&f.each(["","X","Y"],function(a,b){h.style["overflow"+b]=i.overflow[a]}),i.hide&&f(h).hide();if(i.hide||i.show)for(b in i.animatedProperties)f.style(h,b,i.orig[b]),f.removeData(h,"fxshow"+b,!0),f.removeData(h,"toggle"+b,!0);d=i.complete,d&&(i.complete=!1,d.call(h))}return!1}i.duration==Infinity?this.now=e:(c=e-this.startTime,this.state=c/i.duration,this.pos=f.easing[i.animatedProperties[this.prop]](this.state,c,0,1,i.duration),this.now=this.start+(this.end-this.start)*this.pos),this.update();return!0}},f.extend(f.fx,{tick:function(){var a,b=f.timers,c=0;for(;c-1,k={},l={},m,n;j?(l=e.position(),m=l.top,n=l.left):(m=parseFloat(h)||0,n=parseFloat(i)||0),f.isFunction(b)&&(b=b.call(a,c,g)),b.top!=null&&(k.top=b.top-g.top+m),b.left!=null&&(k.left=b.left-g.left+n),"using"in b?b.using.call(a,k):e.css(k)}},f.fn.extend({position:function(){if(!this[0])return null;var a=this[0],b=this.offsetParent(),c=this.offset(),d=cx.test(b[0].nodeName)?{top:0,left:0}:b.offset();c.top-=parseFloat(f.css(a,"marginTop"))||0,c.left-=parseFloat(f.css(a,"marginLeft"))||0,d.top+=parseFloat(f.css(b[0],"borderTopWidth"))||0,d.left+=parseFloat(f.css(b[0],"borderLeftWidth"))||0;return{top:c.top-d.top,left:c.left-d.left}},offsetParent:function(){return this.map(function(){var a=this.offsetParent||c.body;while(a&&!cx.test(a.nodeName)&&f.css(a,"position")==="static")a=a.offsetParent;return a})}}),f.each(["Left","Top"],function(a,c){var d="scroll"+c;f.fn[d]=function(c){var e,g;if(c===b){e=this[0];if(!e)return null;g=cy(e);return g?"pageXOffset"in g?g[a?"pageYOffset":"pageXOffset"]:f.support.boxModel&&g.document.documentElement[d]||g.document.body[d]:e[d]}return this.each(function(){g=cy(this),g?g.scrollTo(a?f(g).scrollLeft():c,a?c:f(g).scrollTop()):this[d]=c})}}),f.each(["Height","Width"],function(a,c){var d=c.toLowerCase();f.fn["inner"+c]=function(){var a=this[0];return a?a.style?parseFloat(f.css(a,d,"padding")):this[d]():null},f.fn["outer"+c]=function(a){var b=this[0];return b?b.style?parseFloat(f.css(b,d,a?"margin":"border")):this[d]():null},f.fn[d]=function(a){var e=this[0];if(!e)return a==null?null:this;if(f.isFunction(a))return this.each(function(b){var c=f(this);c[d](a.call(this,b,c[d]()))});if(f.isWindow(e)){var g=e.document.documentElement["client"+c],h=e.document.body;return e.document.compatMode==="CSS1Compat"&&g||h&&h["client"+c]||g}if(e.nodeType===9)return Math.max(e.documentElement["client"+c],e.body["scroll"+c],e.documentElement["scroll"+c],e.body["offset"+c],e.documentElement["offset"+c]);if(a===b){var i=f.css(e,d),j=parseFloat(i);return f.isNumeric(j)?j:i}return this.css(d,typeof a=="string"?a:a+"px")}}),a.jQuery=a.$=f,typeof define=="function"&&define.amd&&define.amd.jQuery&&define("jquery",[],function(){return f})})(window); \ No newline at end of file diff --git a/doc/puppet_class_list.html b/doc/puppet_class_list.html new file mode 100644 index 0000000..11976a7 --- /dev/null +++ b/doc/puppet_class_list.html @@ -0,0 +1,124 @@ + + + + + + + + + + + + + + + + + + Puppet Class List + + + +
+
+

Puppet Class List

+ + + +
+ + +
+ + diff --git a/doc/puppet_classes/cd_nrpe.html b/doc/puppet_classes/cd_nrpe.html new file mode 100644 index 0000000..8fa1b87 --- /dev/null +++ b/doc/puppet_classes/cd_nrpe.html @@ -0,0 +1,121 @@ + + + + + + + Puppet Class: cd_nrpe + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: cd_nrpe

+
+ + +
+
Defined in:
+
+ manifests/init.pp +
+
+
+ +

Summary

+ Class initializes the cd_nrpe Module. + +

Overview

+
+
+ +

cd_nrpe::init.pp Module name: cd_nrpe Author: Arne Teuke (arne_teuke@confdroid.com)

+ +
+
+ + + +
+ + + +
+
+ + + + +
+
+
+
+6
+7
+8
+
+
# File 'manifests/init.pp', line 6
+
+class cd_nrpe {
+  include cd_nrpe::params
+}
+
+ + + + + + + + \ No newline at end of file diff --git a/doc/puppet_classes/cd_nrpe_3A_3Acommands_3A_3Adefinition_rules.html b/doc/puppet_classes/cd_nrpe_3A_3Acommands_3A_3Adefinition_rules.html new file mode 100644 index 0000000..d3485aa --- /dev/null +++ b/doc/puppet_classes/cd_nrpe_3A_3Acommands_3A_3Adefinition_rules.html @@ -0,0 +1,248 @@ + + + + + + + Puppet Class: cd_nrpe::commands::definition_rules + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: cd_nrpe::commands::definition_rules

+
+ +
+
Inherits:
+
cd_nrpe::params
+
+ + +
+
Defined in:
+
+ manifests/commands/definition_rules.pp +
+
+
+ +

Summary

+ manage command definitions via define and Puppet rules. + +

Overview

+
+
+ +

cd_nrpe::commands::definition_rules.pp Module name: cd_nrpe Author: Arne Teuke (arne_teuke@ConfDroid.com)

+ +
+
+ + + +
+ +
+

Examples:

+ + +
cd_nrpe::commands::definitions { 'check_users':
+  ne_check_cmd      => 'check_users',
+  ne_cmd_argstring  => '-w $ARG1$ -c $ARG2$',
+  ne_cmd_comment    => 'check the amount of user logged in locally',
+}
+ +
+ + + +
+ + + + + +
+
+
+
+12
+13
+14
+15
+16
+17
+18
+19
+20
+21
+22
+23
+24
+25
+26
+27
+28
+29
+30
+31
+32
+33
+34
+35
+36
+37
+38
+39
+40
+41
+42
+43
+44
+45
+46
+47
+48
+49
+50
+51
+52
+53
+54
+55
+56
+57
+58
+59
+60
+61
+62
+63
+64
+65
+66
+67
+68
+69
+
+
# File 'manifests/commands/definition_rules.pp', line 12
+
+class cd_nrpe::commands::definition_rules (
+
+) inherits cd_nrpe::params {
+  if $ne_manage_cmds == true {
+    require cd_nrpe::main::files
+
+    # manage the commands.cfg file
+
+    concat { $ne_cmd_file:
+      ensure   => present,
+      path     => $ne_cmd_file,
+      owner    => $ne_user,
+      group    => $ne_user,
+      mode     => '0640',
+      selrange => s0,
+      selrole  => object_r,
+      seltype  => nrpe_etc_t,
+      seluser  => system_u,
+      notify   => Service[$ne_service],
+    }
+
+    # manage the file header
+
+    concat::fragment { 'nrpe_cmd_header':
+      target  => $ne_cmd_file,
+      content => template($ne_cmd_head_erb),
+      order   => '000',
+    }
+
+    # basic example rules
+
+    cd_nrpe::commands::definitions { 'check_users':
+      ne_check_cmd     => 'check_users',
+      ne_cmd_argstring => '-w $ARG1$ -c $ARG2$',
+      ne_cmd_comment   => 'check the amount of user logged in locally',
+    }
+
+    cd_nrpe::commands::definitions { 'check_load':
+      ne_check_cmd     => 'check_load',
+      ne_cmd_argstring => '-w $ARG1$ -c $ARG2$',
+    }
+
+    cd_nrpe::commands::definitions { 'check_disk':
+      ne_check_cmd     => 'check_disk',
+      ne_cmd_argstring => '-w $ARG1$ -c $ARG2$ -p $ARG3$',
+    }
+
+    cd_nrpe::commands::definitions { 'check_procs':
+      ne_check_cmd     => 'check_procs',
+      ne_cmd_argstring => '-w $ARG1$ -c $ARG2$ -s $ARG3$',
+    }
+
+    cd_nrpe::commands::definitions { 'check_swap':
+      ne_check_cmd     => 'check_swap',
+      ne_cmd_argstring => '-w $ARG1$ -c $ARG2$',
+    }
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/cd_nrpe_3A_3Afirewall_3A_3Aiptables.html b/doc/puppet_classes/cd_nrpe_3A_3Afirewall_3A_3Aiptables.html new file mode 100644 index 0000000..46ea0e2 --- /dev/null +++ b/doc/puppet_classes/cd_nrpe_3A_3Afirewall_3A_3Aiptables.html @@ -0,0 +1,142 @@ + + + + + + + Puppet Class: cd_nrpe::firewall::iptables + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: cd_nrpe::firewall::iptables

+
+ +
+
Inherits:
+
cd_nrpe::params
+
+ + +
+
Defined in:
+
+ manifests/firewall/iptables.pp +
+
+
+ +

Summary

+ manage firewall settings through puppetlabs-firewall + +

Overview

+
+
+ +
+
+ + + +
+ + + +
+ + + + + +
+
+
+
+7
+8
+9
+10
+11
+12
+13
+14
+15
+16
+17
+18
+
+
# File 'manifests/firewall/iptables.pp', line 7
+
+class cd_nrpe::firewall::iptables (
+
+) inherits cd_nrpe::params {
+  if $ne_incl_fw == true {
+    firewall { "${ne_fw_order_no}${ne_nrpe_port} port ${ne_nrpe_port}":
+#      source => $nagios_server,
+      proto => 'tcp',
+      dport => $ne_nrpe_port,
+      jump  => 'accept',
+    }
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Aconfig.html b/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Aconfig.html new file mode 100644 index 0000000..9d29421 --- /dev/null +++ b/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Aconfig.html @@ -0,0 +1,128 @@ + + + + + + + Puppet Class: cd_nrpe::main::config + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: cd_nrpe::main::config

+
+ +
+
Inherits:
+
cd_nrpe::params
+
+ + +
+
Defined in:
+
+ manifests/main/config.pp +
+
+
+ +

Summary

+ Class manages the module logic for cd_nrpe. + +

Overview

+
+
+ +
+
+ + + +
+ + + +
+ + + + + +
+
+
+
+7
+8
+9
+10
+11
+
+
# File 'manifests/main/config.pp', line 7
+
+class cd_nrpe::main::config (
+
+) inherits cd_nrpe::params {
+  include cd_nrpe::main::service
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Adirs.html b/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Adirs.html new file mode 100644 index 0000000..d2410ef --- /dev/null +++ b/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Adirs.html @@ -0,0 +1,182 @@ + + + + + + + Puppet Class: cd_nrpe::main::dirs + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: cd_nrpe::main::dirs

+
+ +
+
Inherits:
+
cd_nrpe::params
+
+ + +
+
Defined in:
+
+ manifests/main/dirs.pp +
+
+
+ +

Summary

+ Class manages all directories required for cd_nrpe. + +

Overview

+
+
+ +

cd_nrpe::main::dirs.pp Module name: cd_nrpe Author: Arne Teuke (arne_teuke@ConfDroid.com)

+ +
+
+ + + +
+ + + +
+ + + + + +
+
+
+
+6
+7
+8
+9
+10
+11
+12
+13
+14
+15
+16
+17
+18
+19
+20
+21
+22
+23
+24
+25
+26
+27
+28
+29
+30
+31
+32
+33
+34
+35
+36
+
+
# File 'manifests/main/dirs.pp', line 6
+
+class cd_nrpe::main::dirs (
+
+) inherits cd_nrpe::params {
+  require cd_nrpe::main::user
+
+  # manage main conf_d_dir
+
+  file { $ne_main_conf_d_dir:
+    ensure   => directory,
+    path     => $ne_main_conf_d_dir,
+    owner    => 'root',
+    group    => 'root',
+    mode     => '0755',
+    selrange => s0,
+    selrole  => object_r,
+    seltype  => etc_t,
+    seluser  => system_u,
+  }
+
+  file { $ne_run_dir:
+    ensure   => directory,
+    path     => $ne_run_dir,
+    owner    => $ne_user,
+    group    => $ne_user,
+    mode     => '0755',
+    selrange => s0,
+    selrole  => object_r,
+    seltype  => var_run_t,
+    seluser  => system_u,
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Afiles.html b/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Afiles.html new file mode 100644 index 0000000..190523f --- /dev/null +++ b/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Afiles.html @@ -0,0 +1,256 @@ + + + + + + + Puppet Class: cd_nrpe::main::files + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: cd_nrpe::main::files

+
+ +
+
Inherits:
+
cd_nrpe::params
+
+ + +
+
Defined in:
+
+ manifests/main/files.pp +
+
+
+ +

Summary

+ Class manages all configuration files required for cd_nrpe. + +

Overview

+
+
+ +

cd_nrpe::main::files.pp Module name: cd_nrpe Author: Arne Teuke (arne_teuke@ConfDroid.com)

+ +
+
+ + + +
+ + + +
+ + + + + +
+
+
+
+6
+7
+8
+9
+10
+11
+12
+13
+14
+15
+16
+17
+18
+19
+20
+21
+22
+23
+24
+25
+26
+27
+28
+29
+30
+31
+32
+33
+34
+35
+36
+37
+38
+39
+40
+41
+42
+43
+44
+45
+46
+47
+48
+49
+50
+51
+52
+53
+54
+55
+56
+57
+58
+59
+60
+61
+62
+63
+64
+65
+66
+67
+68
+69
+70
+71
+72
+73
+
+
# File 'manifests/main/files.pp', line 6
+
+class cd_nrpe::main::files (
+
+) inherits cd_nrpe::params {
+  require cd_nrpe::main::dirs
+
+  # manage /etc/nagios/nrpe.cfg
+
+  file { $ne_main_conf_file:
+    ensure   => file,
+    path     => $ne_main_conf_file,
+    owner    => 'root',
+    group    => 'root',
+    mode     => '0644',
+    selrange => s0,
+    selrole  => object_r,
+    seltype  => nrpe_etc_t,
+    seluser  => system_u,
+    content  => template($ne_main_conf_erb),
+    notify   => Service[$ne_service],
+  }
+
+  # manage /etc/sysconfig/nrpe
+
+  file { $ne_nrpe_conf_file:
+    ensure   => file,
+    path     => $ne_nrpe_conf_file,
+    owner    => 'root',
+    group    => 'root',
+    mode     => '0644',
+    selrange => s0,
+    selrole  => object_r,
+    seltype  => etc_t,
+    seluser  => system_u,
+    content  => template($ne_nrpe_conf_erb),
+    notify   => Service[$ne_service],
+  }
+
+  if $ne_allow_sudo == true {
+
+    file { $ne_sudo_file:
+      ensure   => file,
+      path     => $ne_sudo_file,
+      owner    => 'root',
+      group    => 'root',
+      mode     => '0440',
+      selrange => s0,
+      selrole  => object_r,
+      seltype  => etc_t,
+      seluser  => system_u,
+      content  => template($ne_sudo_rule_erb),
+    }
+
+    # file for sudo  selinux policy
+    file { $ne_nrpe_te_file:
+      ensure   => file,
+      path     => $ne_nrpe_te_file,
+      owner    => 'root',
+      group    => 'root',
+      mode     => '0440',
+      selrange => s0,
+      selrole  => object_r,
+      seltype  => nrpe_etc_t,
+      seluser  => system_u,
+      content  => template($ne_nrpe_te_erb),
+      notify   => Exec['create_nrpe_pp'],
+    }
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Ainstall.html b/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Ainstall.html new file mode 100644 index 0000000..dd10435 --- /dev/null +++ b/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Ainstall.html @@ -0,0 +1,138 @@ + + + + + + + Puppet Class: cd_nrpe::main::install + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: cd_nrpe::main::install

+
+ +
+
Inherits:
+
cd_nrpe::params
+
+ + +
+
Defined in:
+
+ manifests/main/install.pp +
+
+
+ +

Summary

+ Class manages installing binaries required for cd_nrpe + +

Overview

+
+
+ +

cd_nrpe::main::install.pp Module name: cd_nrpe Author: Arne Teuke (arne_teuke@ConfDroid.com)

+ +
+
+ + + +
+ + + +
+ + + + + +
+
+
+
+6
+7
+8
+9
+10
+11
+12
+13
+14
+
+
# File 'manifests/main/install.pp', line 6
+
+class cd_nrpe::main::install (
+
+) inherits cd_nrpe::params {
+  require cd_resources
+
+  package { $reqpackages:
+    ensure => $pkg_ensure,
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Aservice.html b/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Aservice.html new file mode 100644 index 0000000..f9c157a --- /dev/null +++ b/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Aservice.html @@ -0,0 +1,168 @@ + + + + + + + Puppet Class: cd_nrpe::main::service + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: cd_nrpe::main::service

+
+ +
+
Inherits:
+
cd_nrpe::params
+
+ + +
+
Defined in:
+
+ manifests/main/service.pp +
+
+
+ +

Summary

+ Class manages the service(s) for cd_nrpe. + +

Overview

+
+
+ +

cd_nrpe::main::service.pp Module name: cd_nrpe Author: Arne Teuke (arne_teuke@ConfDroid.com)

+ +
+
+ + + +
+ + + +
+ + + + + +
+
+
+
+6
+7
+8
+9
+10
+11
+12
+13
+14
+15
+16
+17
+18
+19
+20
+21
+22
+23
+24
+25
+26
+27
+28
+29
+
+
# File 'manifests/main/service.pp', line 6
+
+class cd_nrpe::main::service (
+
+) inherits cd_nrpe::params {
+  if $ne_incl_fw == true {
+    require cd_nrpe::firewall::iptables
+  }
+
+  require cd_nrpe::main::files
+
+  if $ne_manage_cmds == true {
+    require cd_nrpe::commands::definition_rules
+  }
+
+  if $ne_include_selinux == true {
+    require cd_nrpe::selinux::config
+  }
+
+  service { $ne_service:
+    ensure     => running,
+    hasstatus  => true,
+    hasrestart => true,
+    enable     => true,
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Auser.html b/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Auser.html new file mode 100644 index 0000000..22246d9 --- /dev/null +++ b/doc/puppet_classes/cd_nrpe_3A_3Amain_3A_3Auser.html @@ -0,0 +1,172 @@ + + + + + + + Puppet Class: cd_nrpe::main::user + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: cd_nrpe::main::user

+
+ +
+
Inherits:
+
cd_nrpe::params
+
+ + +
+
Defined in:
+
+ manifests/main/user.pp +
+
+
+ +

Summary

+ Class manages service users for cd_nrpe. + +

Overview

+
+
+ +

cd_nrpe::main::user.pp Module name: cd_nrpe Author: Arne Teuke (arne_teuke@ConfDroid.com)

+ +
+
+ + + +
+ + + +
+ + + + + +
+
+
+
+6
+7
+8
+9
+10
+11
+12
+13
+14
+15
+16
+17
+18
+19
+20
+21
+22
+23
+24
+25
+26
+27
+28
+29
+30
+31
+
+
# File 'manifests/main/user.pp', line 6
+
+class cd_nrpe::main::user (
+
+) inherits cd_nrpe::params {
+  require cd_nrpe::main::install
+
+  group { $ne_user:
+    ensure    => present,
+    name      => $ne_user,
+    gid       => $ne_user_uid,
+    allowdupe => false,
+  }
+
+  user { $ne_user:
+    ensure     => present,
+    name       => $ne_user,
+    allowdupe  => false,
+    comment    => $ne_user_comment,
+    uid        => $ne_user_uid,
+    gid        => $ne_user,
+    groups     => $ne_user_groups,
+    managehome => true,
+    home       => $ne_user_home,
+    shell      => $ne_user_shell,
+    require    => Group[$ne_user],
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/cd_nrpe_3A_3Aparams.html b/doc/puppet_classes/cd_nrpe_3A_3Aparams.html new file mode 100644 index 0000000..de9c513 --- /dev/null +++ b/doc/puppet_classes/cd_nrpe_3A_3Aparams.html @@ -0,0 +1,998 @@ + + + + + + + Puppet Class: cd_nrpe::params + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: cd_nrpe::params

+ + +

Summary

+ Class holds all parameters for the cd_nrpe module and is +inherited by all classes except defines. + +

Overview

+
+
+ +

cd_nrpe::params.pp Module name: cd_nrpe Author: Arne Teuke (arne_teuke@ConfDroid.com) be passed to the NRPE daemon.

+ +
+
+ + + +
+

Parameters:

+
    + +
  • + + pkg_ensure + + + (String) + + + (defaults to: 'latest') + + + — +
    +

    which package type to choose, i.e. latest or present.

    +
    + +
  • + +
  • + + ne_log_facility + + + (String) + + + (defaults to: 'daemon') + + + — +
    +

    the log facility to use.

    +
    + +
  • + +
  • + + ne_log_file + + + (String) + + + (defaults to: '') + + + — +
    +

    If a log file is specified in this option, nrpe will write to that file instead of using syslog. i.e. /var/run/nrpe.log

    +
    + +
  • + +
  • + + ne_debug + + + (String) + + + (defaults to: '0') + + + — +
    +

    Whether debugging messages are logged to the syslog facility.

    +
    + +
  • + +
  • + + ne_nrpe_port + + + (String) + + + (defaults to: '5666') + + + — +
    +

    the NRPE port. used in firewall ( optional) and configuration file.

    +
    + +
  • + +
  • + + ne_listen_queue_size + + + (String) + + + (defaults to: '5') + + + — +
    +

    Listen queue size (backlog) for serving incoming connections.

    +
    + +
  • + +
  • + + ne_nagios_server + + + (String) + + + (defaults to: $::nagios_server) + + + — +
    +

    ipaddress of the nagios server to be allowed to connect to NRPE service. Default is to look up a global parameter from ENC.

    +
    + +
  • + +
  • + + ne_dont_blame_nrpe + + + (String) + + + (defaults to: '1') + + + — +
    +

    whether or not the NRPE daemon will allow clients to specify arguments to commands that are executed.

    +
    + +
  • + +
  • + + ne_allow_bash_cmd_subst + + + (String) + + + (defaults to: '1') + + + — +
    +

    whether or not the NRPE daemon will allow clients to specify arguments that contain bash command substitutions of the form $(…).

    +
    + +
  • + +
  • + + ne_allow_sudo + + + (Boolean) + + + (defaults to: true) + + + — +
    +

    Whether to allow sudo access. used in nrpe.cfg as well as for creating a sudo role.

    +
    + +
  • + +
  • + + ne_command_prefix + + + (String) + + + (defaults to: '/usr/bin/sudo') + + + — +
    +

    allows you to prefix all commands with a user-defined String.

    +
    + +
  • + +
  • + + ne_incl_fw + + + (Boolean) + + + (defaults to: true) + + + — +
    +

    Whether to include firewall rules

    +
    + +
  • + +
  • + + ne_command_timeout + + + (String) + + + (defaults to: '60') + + + — +
    +

    maximum number of seconds that the NRPE daemon will allow plugins to finish executing before killing them off.

    +
    + +
  • + +
  • + + ne_connection_timeout + + + (String) + + + (defaults to: '300') + + + — +
    +

    maximum number of seconds that the NRPE daemon will wait for a connection to be established before exiting.

    +
    + +
  • + +
  • + + ne_ssl_version + + + (String) + + + (defaults to: 'TLSv2+') + + + — +
    +

    These directives allow you to specify how to use SSL/TLS.

    +
    + +
  • + +
  • + + ne_ssl_use_adh + + + (String) + + + (defaults to: '1') + + + — +
    +

    This is for backward compatibility and is DEPRECATED. Set to 1 to enable ADH or 2 to require ADH. 1 is currently the default but will be changed in a later version.

    +
    + +
  • + +
  • + + ne_ssl_cipher_list + + + (String) + + + (defaults to: 'ALL:!aNULL:!eNULL:!SSLv2:!LOW:!EXP:!RC4:!MD5:@STRENGTH') + + + — +
    +

    ciphers can be used. For backward compatibility, this defaults to ‘ssl_cipher_list=ALL:!MD5:@STRENGTH’ in this version but will be changed in a later version of NRPE.

    +
    + +
  • + +
  • + + ne_ssl_cacert_file + + + (String) + + + (defaults to: '/etc/pki/tls/certs/ca-chain.crt.pem') + + + — +
    +

    path and name of the ssl certificate authority (ca) file / chain. must be full path.

    +
    + +
  • + +
  • + + ne_ssl_cert_file + + + (String) + + + (defaults to: "/etc/pki/tls/certs/${::fqdn}.crt.pem") + + + — +
    +

    path and name of the server ssl certificate. must include full path.

    +
    + +
  • + +
  • + + ne_ssl_privatekey_file + + + (String) + + + (defaults to: "/etc/pki/tls/private/${::fqdn}.key.pem") + + + — +
    +

    path and name of the server ssl private key. Must include full path.

    +
    + +
  • + +
  • + + ne_ssl_client_certs + + + (String) + + + (defaults to: '2') + + + — +
    +

    determines client certificate usage. Values: 0 = Don’t ask for or require client certificates 1 = Ask for client certificates 2 = Require client certificates

    +
    + +
  • + +
  • + + ne_ssl_logging + + + (String) + + + (defaults to: '0x00') + + + — +
    +

    determines which SSL messages are send to syslog. OR values together to specify multiple options. Values: 0x00 (0) = No additional logging (default) 0x01 (1) = Log startup SSL/TLS parameters 0x02 (2) = Log remote IP address 0x04 (4) = Log SSL/TLS version of connections 0x08 (8) = Log which cipher is being used for the connection 0x10 (16) = Log if client has a certificate 0x20 (32) = Log details of client’s certificate if it has one -1 or 0xff or 0x2f = All of the above

    +
    + +
  • + +
  • + + ne_nasty_metachars + + + (Array) + + + (defaults to: ["|`&><'\\[]{};\r\n"]) + + + — +
    +

    list of characters that cannot

    +
    + +
  • + +
  • + + ne_include_file + + + (String) + + + (defaults to: '') + + + — +
    +

    include definitions from an external config file.

    +
    + +
  • + +
  • + + ne_fw_order_no + + + (String) + + + (defaults to: '50') + + + — +
    +

    ordering prefix for he firewall rules. Adjust to your environment if needed.

    +
    + +
  • + +
  • + + ne_ssl_opts + + + (String) + + + (defaults to: '') + + + — +
    +

    Specify additional SSL options.

    +
    + +
  • + +
  • + + ne_user + + + (String) + + + (defaults to: 'nrpe') + + + — +
    +

    the NRPE service user

    +
    + +
  • + +
  • + + ne_user_comment + + + (String) + + + (defaults to: 'NRPE service user') + + + — +
    +

    The comment for the service user /etc/passwd

    +
    + +
  • + +
  • + + ne_user_uid + + + (String) + + + (defaults to: '1005') + + + — +
    +

    the UID for the service user

    +
    + +
  • + +
  • + + ne_user_home + + + (String) + + + (defaults to: '/var/run/nrpe') + + + — +
    +

    the home for the service user

    +
    + +
  • + +
  • + + ne_user_shell + + + (String) + + + (defaults to: '/sbin/nologin') + + + — +
    +

    the shell for the service user.

    +
    + +
  • + +
  • + + ne_user_groups + + + (Optional[String]) + + + (defaults to: undef) + + + — +
    +

    additional groups for the service user.

    +
    + +
  • + +
  • + + ne_server_address + + + (String) + + + (defaults to: '0.0.0.0') + + + — +
    +

    the network interfaces to listen on

    +
    + +
  • + +
  • + + ne_allow_weak_rnd_seed + + + (String) + + + (defaults to: '1') + + + — +
    +

    Whether to allow weak random seeds

    +
    + +
  • + +
  • + + ne_include_selinux + + + (Boolean) + + + (defaults to: true) + + + — +
    +

    Whether to manage selinux

    +
    + +
  • + +
  • + + ne_enable_ssl + + + (Boolean) + + + (defaults to: false) + + + — +
    +

    Whether to enable SSL certificates.

    +
    + +
  • + +
  • + + reqpackages + + + (Array) + + + (defaults to: ['nrpe','nrpe-selinux']) + + + — +
    +

    which packages to install

    +
    + +
  • + +
  • + + ne_manage_cmds + + + (Boolean) + + + (defaults to: true) + + + — +
    +

    Whether to manage command rules for NRPE checks, to allow dynamic check & command rules.

    +
    + +
  • + +
+ + + +

See Also:

+ + +
+ + + + + +
+
+
+
+85
+86
+87
+88
+89
+90
+91
+92
+93
+94
+95
+96
+97
+98
+99
+100
+101
+102
+103
+104
+105
+106
+107
+108
+109
+110
+111
+112
+113
+114
+115
+116
+117
+118
+119
+120
+121
+122
+123
+124
+125
+126
+127
+128
+129
+130
+131
+132
+133
+134
+135
+136
+137
+138
+139
+140
+141
+142
+143
+144
+145
+146
+147
+148
+149
+150
+151
+152
+153
+154
+155
+156
+157
+158
+159
+160
+161
+162
+163
+164
+165
+
+
# File 'manifests/params.pp', line 85
+
+class cd_nrpe::params (
+
+  String $pkg_ensure                 = 'latest',
+  Array $reqpackages                = ['nrpe','nrpe-selinux'],
+
+  Boolean $ne_manage_cmds             = true,
+
+# NRPE user settings
+  String $ne_user                    = 'nrpe',
+  String $ne_user_comment            = 'NRPE service user',
+  String $ne_user_uid                = '1005',
+  String $ne_user_home               = '/var/run/nrpe',
+  Optional[String] $ne_user_groups   = undef,
+  String $ne_user_shell              = '/sbin/nologin',
+
+# nrpe.cfg
+  String $ne_log_facility            = 'daemon',
+  String $ne_log_file                = '',
+  String $ne_debug                   = '0',
+  String $ne_nrpe_port               = '5666',
+  String $ne_server_address          = '0.0.0.0',
+  String $ne_listen_queue_size       = '5',
+  String $ne_nagios_server           = $::nagios_server,
+  String $ne_dont_blame_nrpe         = '1',
+  String $ne_allow_bash_cmd_subst    = '1',
+  Boolean $ne_allow_sudo             = true,
+  String $ne_command_prefix          = '/usr/bin/sudo',
+  String $ne_command_timeout         = '60',
+  String $ne_connection_timeout      = '300',
+  String $ne_allow_weak_rnd_seed     = '1',
+  Boolean $ne_enable_ssl             = false,
+  String $ne_ssl_version             = 'TLSv2+',
+  String $ne_ssl_use_adh             = '1',
+  String $ne_ssl_cipher_list         = 'ALL:!aNULL:!eNULL:!SSLv2:!LOW:!EXP:!RC4:!MD5:@STRENGTH',
+  String $ne_ssl_cacert_file         = '/etc/pki/tls/certs/ca-chain.crt.pem',
+  String $ne_ssl_cert_file           = "/etc/pki/tls/certs/${::fqdn}.crt.pem",
+  String $ne_ssl_privatekey_file     = "/etc/pki/tls/private/${::fqdn}.key.pem",
+  String $ne_ssl_client_certs        = '2',
+  String $ne_ssl_logging             = '0x00',
+  Array $ne_nasty_metachars          = ["|`&><'\\[]{};\r\n"],
+  String $ne_include_file            = '',
+
+# nrpe.conf
+  String $ne_ssl_opts                = '',
+
+# firewall
+  Boolean $ne_incl_fw                = true,
+  String $ne_fw_order_no             = '50',
+
+# selinux
+  Boolean $ne_include_selinux        = true,
+
+) {
+# service
+  $ne_service                 = 'nrpe'
+
+# directories
+  $ne_main_conf_d_dir         = '/etc/nrpe.d'
+  $ne_run_dir                 = '/var/run/nrpe'
+
+# files
+  $ne_main_conf_file          = '/etc/nagios/nrpe.cfg'
+  $ne_main_conf_erb           = 'cd_nrpe/nrpe_cfg.erb'
+  $ne_nrpe_pid_file           = "${ne_run_dir}/nrpe.pid"
+  $ne_nrpe_conf_file          = '/etc/sysconfig/nrpe'
+  $ne_nrpe_conf_erb           = 'cd_nrpe/nrpe_conf.erb'
+  $ne_cmd_file                = "${ne_main_conf_d_dir}/commands.cfg"
+  $ne_cmd_head_erb            = 'cd_nrpe/cmd_head.erb'
+  $ne_cmd_rule_erb            = 'cd_nrpe/cmd_rule.erb'
+  $ne_sudo_file               = '/etc/sudoers.d/nagios_sudo'
+  $ne_sudo_rule_erb           = 'cd_nrpe/sudo_rule.erb'
+  $ne_nrpe_te_file            = "${ne_main_conf_d_dir}/nrpe.te"
+  $ne_nrpe_te_erb             = 'cd_nrpe/nrpe.te.erb'
+  $ne_nrpe_mod_file           = "${ne_main_conf_d_dir}/nrpe.mod"
+  $ne_checkmodule_nrpe_erb    = 'cd_nrpe/checkmodule_nrpe.erb'
+  $ne_nrpe_pp_file            = "${ne_main_conf_d_dir}/nrpe.pp"
+  $ne_semodule_erb            =  'cd_nrpe/semodule_nrpe.erb'
+
+# includes must be last
+  include cd_nrpe::main::config
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/cd_nrpe_3A_3Aselinux_3A_3Aconfig.html b/doc/puppet_classes/cd_nrpe_3A_3Aselinux_3A_3Aconfig.html new file mode 100644 index 0000000..3cb8ad9 --- /dev/null +++ b/doc/puppet_classes/cd_nrpe_3A_3Aselinux_3A_3Aconfig.html @@ -0,0 +1,182 @@ + + + + + + + Puppet Class: cd_nrpe::selinux::config + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: cd_nrpe::selinux::config

+
+ +
+
Inherits:
+
cd_nrpe::params
+
+ + +
+
Defined in:
+
+ manifests/selinux/config.pp +
+
+
+ +

Summary

+ Class manages all aspects of configuring selinux for NRPE. + +

Overview

+
+
+ +

cd_nrpe::selinux::config.pp # Module name: cd_nrpe Author: Arne Teuke (arne_teuke@ConfDroid.com)

+ +
+
+ + + +
+ + + +
+ + + + + +
+
+
+
+5
+6
+7
+8
+9
+10
+11
+12
+13
+14
+15
+16
+17
+18
+19
+20
+21
+22
+23
+24
+25
+26
+27
+28
+29
+30
+31
+32
+33
+34
+35
+
+
# File 'manifests/selinux/config.pp', line 5
+
+class cd_nrpe::selinux::config (
+
+) inherits cd_nrpe::params {
+  if $ne_include_selinux == true {
+    #  manage allow nagios sudo
+
+    exec { 'nagios_run_sudo':
+      command => 'setsebool -P nagios_run_sudo 1',
+      path    => ['/usr/bin','/usr/sbin'],
+      cwd     => '/tmp',
+      unless  => 'getsebool nagios_run_sudo | awk \'{print$3}\' | grep -ic "on"'
+    }
+
+    # create policy file for sudo selinux policy
+    exec { 'create_nrpe_pp':
+      command     => template($ne_checkmodule_nrpe_erb),
+      user        => 'root',
+      creates     => $ne_nrpe_pp_file,
+      refreshonly => true,
+      notify      => Exec['import_semodule_nrpe'],
+    }
+
+    # import semodule
+    exec { 'import_semodule_nrpe':
+      command     => template($ne_semodule_erb),
+      user        => 'root',
+      unless      => '/sbin/semodule -l | grep nrpe | grep -v nrpe_',
+      refreshonly => true,
+    }
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_defined_type_list.html b/doc/puppet_defined_type_list.html new file mode 100644 index 0000000..7ec4f3a --- /dev/null +++ b/doc/puppet_defined_type_list.html @@ -0,0 +1,54 @@ + + + + + + + + + + + + + + + + + + Defined Type List + + + +
+
+

Defined Type List

+ + + +
+ + +
+ + diff --git a/doc/puppet_defined_types/cd_nrpe_3A_3Acommands_3A_3Adefinitions.html b/doc/puppet_defined_types/cd_nrpe_3A_3Acommands_3A_3Adefinitions.html new file mode 100644 index 0000000..b0dff10 --- /dev/null +++ b/doc/puppet_defined_types/cd_nrpe_3A_3Acommands_3A_3Adefinitions.html @@ -0,0 +1,228 @@ + + + + + + + Defined Type: cd_nrpe::commands::definitions + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Defined Type: cd_nrpe::commands::definitions

+
+
+
Defined in:
+
+ manifests/commands/definitions.pp +
+
+
+ +

Summary

+ Populate command definitions through external puppet rules, i.e. +from other modules. + +

Overview

+
+
+ +

cd_nrpe::commands::definitions.pp Module name: cd_nrpe Author: Arne Teuke (arne_teuke@ConfDroid.com)

+ +
+
+ + + +
+

Parameters:

+
    + +
  • + + ne_check_cmd + + + (Optional[String]) + + + (defaults to: undef) + + + — +
    +

    Specify the check_command to use.

    +
    + +
  • + +
  • + + ne_cmd_path + + + (String) + + + (defaults to: '/usr/lib64/nagios/plugins/') + + + — +
    +

    The path to the command scripts, usually where the nagios_plugins are located. If you use your own scripts, specify the custom location including the trailing slash

    +
    + +
  • + +
  • + + ne_cmd_argstring + + + (Optional[String]) + + + (defaults to: undef) + + + — +
    +

    Specify the string of valid argument for the command , i.e. -w $ARG1$ -c $ARG2$. See the arguments in the man pages for the checks.

    +
    + +
  • + +
  • + + ne_cmd_comment + + + (String) + + + (defaults to: '') + + + — +
    +

    Specify an optional comment for your command definition

    +
    + +
  • + +
+ + + +
+ + + + + +
+
+
+
+16
+17
+18
+19
+20
+21
+22
+23
+24
+25
+26
+27
+28
+29
+30
+31
+32
+33
+34
+
+
# File 'manifests/commands/definitions.pp', line 16
+
+define cd_nrpe::commands::definitions (
+
+  Optional[String] $ne_check_cmd      = undef,
+  String $ne_cmd_path                 = '/usr/lib64/nagios/plugins/',
+  Optional[String] $ne_cmd_argstring  = undef,
+  String $ne_cmd_comment              = '',
+
+) {
+  $ne_cmd_file      = $cd_nrpe::params::ne_cmd_file
+  $ne_cmd_rule_erb  = $cd_nrpe::params::ne_cmd_rule_erb
+  $ne_manage_cmds   = $cd_nrpe::params::ne_manage_cmds
+
+  if $ne_manage_cmds == true {
+    concat::fragment { $name:
+      target  => $ne_cmd_file,
+      content => template($ne_cmd_rule_erb),
+    }
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/top-level-namespace.html b/doc/top-level-namespace.html new file mode 100644 index 0000000..5d6b54b --- /dev/null +++ b/doc/top-level-namespace.html @@ -0,0 +1,98 @@ + + + + + + + Top Level Namespace + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Top Level Namespace + + + +

+
+ + + + + + + + + + + +
+ + + + + + + + + + +
+ + + +
+ + \ No newline at end of file From 9e72d0d4721f62a1de0cb67bc7af70b639a6e538 Mon Sep 17 00:00:00 2001 From: Jenkins Server Date: Wed, 21 May 2025 12:27:07 +0200 Subject: [PATCH 02/16] Recommit for updates in build 2 --- doc/file.README.html | 10 +++++----- doc/index.html | 10 +++++----- 2 files changed, 10 insertions(+), 10 deletions(-) diff --git a/doc/file.README.html b/doc/file.README.html index 7cf422b..8995e7e 100644 --- a/doc/file.README.html +++ b/doc/file.README.html @@ -60,7 +60,7 @@

Readme

-

+

[[TOC]]

@@ -115,13 +115,13 @@

All dependencies must be included in the catalogue.

Deployment

diff --git a/doc/index.html b/doc/index.html index 9025687..df1850c 100644 --- a/doc/index.html +++ b/doc/index.html @@ -60,7 +60,7 @@

Readme

-

+

[[TOC]]

@@ -115,13 +115,13 @@

All dependencies must be included in the catalogue.

Deployment

From 4b5403082d2bdde1c108cedabf1379f8272a5ca0 Mon Sep 17 00:00:00 2001 From: Jenkins Server Date: Tue, 10 Feb 2026 17:44:58 +0100 Subject: [PATCH 03/16] Recommit for updates in build 1 --- .vscode/settings.json | 14 - doc/_index.html | 24 +- doc/file.README.html | 10 +- doc/index.html | 10 +- doc/puppet_class_list.html | 44 +- doc/puppet_classes/confdroid_nrpe.html | 121 +++ ...e_3A_3Acommands_3A_3Adefinition_rules.html | 248 +++++ ...roid_nrpe_3A_3Afirewall_3A_3Aiptables.html | 142 +++ .../confdroid_nrpe_3A_3Amain_3A_3Aconfig.html | 128 +++ .../confdroid_nrpe_3A_3Amain_3A_3Adirs.html | 182 ++++ .../confdroid_nrpe_3A_3Amain_3A_3Afiles.html | 256 +++++ ...confdroid_nrpe_3A_3Amain_3A_3Ainstall.html | 138 +++ ...confdroid_nrpe_3A_3Amain_3A_3Aservice.html | 168 +++ .../confdroid_nrpe_3A_3Amain_3A_3Auser.html | 172 ++++ .../confdroid_nrpe_3A_3Aparams.html | 974 ++++++++++++++++++ ...nfdroid_nrpe_3A_3Aselinux_3A_3Aconfig.html | 182 ++++ doc/puppet_defined_type_list.html | 4 +- ...d_nrpe_3A_3Acommands_3A_3Adefinitions.html | 228 ++++ 18 files changed, 2985 insertions(+), 60 deletions(-) delete mode 100644 .vscode/settings.json create mode 100644 doc/puppet_classes/confdroid_nrpe.html create mode 100644 doc/puppet_classes/confdroid_nrpe_3A_3Acommands_3A_3Adefinition_rules.html create mode 100644 doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html create mode 100644 doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Aconfig.html create mode 100644 doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Adirs.html create mode 100644 doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Afiles.html create mode 100644 doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Ainstall.html create mode 100644 doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Aservice.html create mode 100644 doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Auser.html create mode 100644 doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html create mode 100644 doc/puppet_classes/confdroid_nrpe_3A_3Aselinux_3A_3Aconfig.html create mode 100644 doc/puppet_defined_types/confdroid_nrpe_3A_3Acommands_3A_3Adefinitions.html diff --git a/.vscode/settings.json b/.vscode/settings.json deleted file mode 100644 index cfabd8b..0000000 --- a/.vscode/settings.json +++ /dev/null @@ -1,14 +0,0 @@ -{ - "cSpell.words": [ - "argstring", - "checkmodule", - "dont", - "getsebool", - "metachars", - "procs", - "refreshonly", - "semodule", - "setsebool", - "sysconfig" - ] -} \ No newline at end of file diff --git a/doc/_index.html b/doc/_index.html index a8a6262..f40d9ec 100644 --- a/doc/_index.html +++ b/doc/_index.html @@ -69,57 +69,57 @@ -

In order to apply parameters through Foreman, cd_nrpe::params must be added to the host or host group in question, unless the defaults are fully acceptable across the estate.

+

In order to apply parameters through Foreman, confdroid_nrpe::params must be added to the host or host group in question, unless the defaults are fully acceptable across the estate.

See more details about class deployment on Confdroid.com.

@@ -153,7 +153,7 @@

Defining commands is as simple as that:

-
cd_nrpe::commands::definitions { 'check_users':
+
confdroid_nrpe::commands::definitions { 'check_users':
       ne_check_cmd      =>  'check_users',
       ne_cmd_argstring  =>  '-w $ARG1$ -c $ARG2$',
     }
diff --git a/doc/puppet_class_list.html b/doc/puppet_class_list.html
index 11976a7..7401c21 100644
--- a/doc/puppet_class_list.html
+++ b/doc/puppet_class_list.html
@@ -40,79 +40,79 @@
       
    -
  • +
  • -
  • +
  • -
  • +
  • -
  • +
  • -
  • +
  • -
  • +
  • -
  • +
  • -
  • +
  • -
  • +
  • -
  • +
  • -
  • +
  • diff --git a/doc/puppet_classes/confdroid_nrpe.html b/doc/puppet_classes/confdroid_nrpe.html new file mode 100644 index 0000000..70fd5c9 --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe.html @@ -0,0 +1,121 @@ + + + + + + + Puppet Class: confdroid_nrpe + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
    + + +

    Puppet Class: confdroid_nrpe

    +
    + + +
    +
    Defined in:
    +
    + manifests/init.pp +
    +
    +
    + +

    Summary

    + Class initializes the confdroid_nrpe Module. + +

    Overview

    +
    +
    + +

    confdroid_nrpe::init.pp Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@confdroid.com)

    + +
    +
    + + + +
    + + + +
    + + + + + +
    +
    +
    +
    +6
    +7
    +8
    +
    +
    # File 'manifests/init.pp', line 6
    +
    +class confdroid_nrpe {
    +  include confdroid_nrpe::params
    +}
    +
    +
    +
    + + + +
    + + \ No newline at end of file diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Acommands_3A_3Adefinition_rules.html b/doc/puppet_classes/confdroid_nrpe_3A_3Acommands_3A_3Adefinition_rules.html new file mode 100644 index 0000000..1165848 --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Acommands_3A_3Adefinition_rules.html @@ -0,0 +1,248 @@ + + + + + + + Puppet Class: confdroid_nrpe::commands::definition_rules + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
    + + +

    Puppet Class: confdroid_nrpe::commands::definition_rules

    +
    + +
    +
    Inherits:
    +
    confdroid_nrpe::params
    +
    + + +
    +
    Defined in:
    +
    + manifests/commands/definition_rules.pp +
    +
    +
    + +

    Summary

    + manage command definitions via define and Puppet rules. + +

    Overview

    +
    +
    + +

    confdroid_nrpe::commands::definition_rules.pp Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@ConfDroid.com)

    + +
    +
    + + + +
    + +
    +

    Examples:

    + + +
    confdroid_nrpe::commands::definitions { 'check_users':
    +  ne_check_cmd      => 'check_users',
    +  ne_cmd_argstring  => '-w $ARG1$ -c $ARG2$',
    +  ne_cmd_comment    => 'check the amount of user logged in locally',
    +}
    + +
    + + + +
    + + + + + +
    +
    +
    +
    +12
    +13
    +14
    +15
    +16
    +17
    +18
    +19
    +20
    +21
    +22
    +23
    +24
    +25
    +26
    +27
    +28
    +29
    +30
    +31
    +32
    +33
    +34
    +35
    +36
    +37
    +38
    +39
    +40
    +41
    +42
    +43
    +44
    +45
    +46
    +47
    +48
    +49
    +50
    +51
    +52
    +53
    +54
    +55
    +56
    +57
    +58
    +59
    +60
    +61
    +62
    +63
    +64
    +65
    +66
    +67
    +68
    +69
    +
    +
    # File 'manifests/commands/definition_rules.pp', line 12
    +
    +class confdroid_nrpe::commands::definition_rules (
    +
    +) inherits confdroid_nrpe::params {
    +  if $ne_manage_cmds == true {
    +    require confdroid_nrpe::main::files
    +
    +    # manage the commands.cfg file
    +
    +    concat { $ne_cmd_file:
    +      ensure   => present,
    +      path     => $ne_cmd_file,
    +      owner    => $ne_user,
    +      group    => $ne_user,
    +      mode     => '0640',
    +      selrange => s0,
    +      selrole  => object_r,
    +      seltype  => nrpe_etc_t,
    +      seluser  => system_u,
    +      notify   => Service[$ne_service],
    +    }
    +
    +    # manage the file header
    +
    +    concat::fragment { 'nrpe_cmd_header':
    +      target  => $ne_cmd_file,
    +      content => template($ne_cmd_head_erb),
    +      order   => '000',
    +    }
    +
    +    # basic example rules
    +
    +    confdroid_nrpe::commands::definitions { 'check_users':
    +      ne_check_cmd     => 'check_users',
    +      ne_cmd_argstring => '-w $ARG1$ -c $ARG2$',
    +      ne_cmd_comment   => 'check the amount of user logged in locally',
    +    }
    +
    +    confdroid_nrpe::commands::definitions { 'check_load':
    +      ne_check_cmd     => 'check_load',
    +      ne_cmd_argstring => '-w $ARG1$ -c $ARG2$',
    +    }
    +
    +    confdroid_nrpe::commands::definitions { 'check_disk':
    +      ne_check_cmd     => 'check_disk',
    +      ne_cmd_argstring => '-w $ARG1$ -c $ARG2$ -p $ARG3$',
    +    }
    +
    +    confdroid_nrpe::commands::definitions { 'check_procs':
    +      ne_check_cmd     => 'check_procs',
    +      ne_cmd_argstring => '-w $ARG1$ -c $ARG2$ -s $ARG3$',
    +    }
    +
    +    confdroid_nrpe::commands::definitions { 'check_swap':
    +      ne_check_cmd     => 'check_swap',
    +      ne_cmd_argstring => '-w $ARG1$ -c $ARG2$',
    +    }
    +  }
    +}
    +
    +
    +
    + + + +
    + + \ No newline at end of file diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html b/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html new file mode 100644 index 0000000..bcacf11 --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html @@ -0,0 +1,142 @@ + + + + + + + Puppet Class: confdroid_nrpe::firewall::iptables + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
    + + +

    Puppet Class: confdroid_nrpe::firewall::iptables

    +
    + +
    +
    Inherits:
    +
    confdroid_nrpe::params
    +
    + + +
    +
    Defined in:
    +
    + manifests/firewall/iptables.pp +
    +
    +
    + +

    Summary

    + manage firewall settings through puppetlabs-firewall + +

    Overview

    +
    +
    + +
    +
    + + + +
    + + + +
    + + + + + +
    +
    +
    +
    +7
    +8
    +9
    +10
    +11
    +12
    +13
    +14
    +15
    +16
    +17
    +18
    +
    +
    # File 'manifests/firewall/iptables.pp', line 7
    +
    +class confdroid_nrpe::firewall::iptables (
    +
    +) inherits confdroid_nrpe::params {
    +  if $ne_incl_fw == true {
    +    firewall { "${ne_fw_order_no}${ne_nrpe_port} port ${ne_nrpe_port}":
    +#      source => $nagios_server,
    +      proto => 'tcp',
    +      dport => $ne_nrpe_port,
    +      jump  => 'accept',
    +    }
    +  }
    +}
    +
    +
    +
    + + + +
    + + \ No newline at end of file diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Aconfig.html b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Aconfig.html new file mode 100644 index 0000000..cb31dfc --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Aconfig.html @@ -0,0 +1,128 @@ + + + + + + + Puppet Class: confdroid_nrpe::main::config + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
    + + +

    Puppet Class: confdroid_nrpe::main::config

    +
    + +
    +
    Inherits:
    +
    confdroid_nrpe::params
    +
    + + +
    +
    Defined in:
    +
    + manifests/main/config.pp +
    +
    +
    + +

    Summary

    + Class manages the module logic for confdroid_nrpe. + +

    Overview

    +
    +
    + +
    +
    + + + +
    + + + +
    + + + + + +
    +
    +
    +
    +7
    +8
    +9
    +10
    +11
    +
    +
    # File 'manifests/main/config.pp', line 7
    +
    +class confdroid_nrpe::main::config (
    +
    +) inherits confdroid_nrpe::params {
    +  include confdroid_nrpe::main::service
    +}
    +
    +
    +
    + + + +
    + + \ No newline at end of file diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Adirs.html b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Adirs.html new file mode 100644 index 0000000..2d29ec8 --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Adirs.html @@ -0,0 +1,182 @@ + + + + + + + Puppet Class: confdroid_nrpe::main::dirs + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
    + + +

    Puppet Class: confdroid_nrpe::main::dirs

    +
    + +
    +
    Inherits:
    +
    confdroid_nrpe::params
    +
    + + +
    +
    Defined in:
    +
    + manifests/main/dirs.pp +
    +
    +
    + +

    Summary

    + Class manages all directories required for confdroid_nrpe. + +

    Overview

    +
    +
    + +

    confdroid_nrpe::main::dirs.pp Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@ConfDroid.com)

    + +
    +
    + + + +
    + + + +
    + + + + + +
    +
    +
    +
    +6
    +7
    +8
    +9
    +10
    +11
    +12
    +13
    +14
    +15
    +16
    +17
    +18
    +19
    +20
    +21
    +22
    +23
    +24
    +25
    +26
    +27
    +28
    +29
    +30
    +31
    +32
    +33
    +34
    +35
    +36
    +
    +
    # File 'manifests/main/dirs.pp', line 6
    +
    +class confdroid_nrpe::main::dirs (
    +
    +) inherits confdroid_nrpe::params {
    +  require confdroid_nrpe::main::user
    +
    +  # manage main conf_d_dir
    +
    +  file { $ne_main_conf_d_dir:
    +    ensure   => directory,
    +    path     => $ne_main_conf_d_dir,
    +    owner    => 'root',
    +    group    => 'root',
    +    mode     => '0755',
    +    selrange => s0,
    +    selrole  => object_r,
    +    seltype  => etc_t,
    +    seluser  => system_u,
    +  }
    +
    +  file { $ne_run_dir:
    +    ensure   => directory,
    +    path     => $ne_run_dir,
    +    owner    => $ne_user,
    +    group    => $ne_user,
    +    mode     => '0755',
    +    selrange => s0,
    +    selrole  => object_r,
    +    seltype  => var_run_t,
    +    seluser  => system_u,
    +  }
    +}
    +
    +
    +
    + + + +
    + + \ No newline at end of file diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Afiles.html b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Afiles.html new file mode 100644 index 0000000..c211ec4 --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Afiles.html @@ -0,0 +1,256 @@ + + + + + + + Puppet Class: confdroid_nrpe::main::files + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
    + + +

    Puppet Class: confdroid_nrpe::main::files

    +
    + +
    +
    Inherits:
    +
    confdroid_nrpe::params
    +
    + + +
    +
    Defined in:
    +
    + manifests/main/files.pp +
    +
    +
    + +

    Summary

    + Class manages all configuration files required for confdroid_nrpe. + +

    Overview

    +
    +
    + +

    confdroid_nrpe::main::files.pp Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@ConfDroid.com)

    + +
    +
    + + + +
    + + + +
    + + + + + +
    +
    +
    +
    +6
    +7
    +8
    +9
    +10
    +11
    +12
    +13
    +14
    +15
    +16
    +17
    +18
    +19
    +20
    +21
    +22
    +23
    +24
    +25
    +26
    +27
    +28
    +29
    +30
    +31
    +32
    +33
    +34
    +35
    +36
    +37
    +38
    +39
    +40
    +41
    +42
    +43
    +44
    +45
    +46
    +47
    +48
    +49
    +50
    +51
    +52
    +53
    +54
    +55
    +56
    +57
    +58
    +59
    +60
    +61
    +62
    +63
    +64
    +65
    +66
    +67
    +68
    +69
    +70
    +71
    +72
    +73
    +
    +
    # File 'manifests/main/files.pp', line 6
    +
    +class confdroid_nrpe::main::files (
    +
    +) inherits confdroid_nrpe::params {
    +  require confdroid_nrpe::main::dirs
    +
    +  # manage /etc/nagios/nrpe.cfg
    +
    +  file { $ne_main_conf_file:
    +    ensure   => file,
    +    path     => $ne_main_conf_file,
    +    owner    => 'root',
    +    group    => 'root',
    +    mode     => '0644',
    +    selrange => s0,
    +    selrole  => object_r,
    +    seltype  => nrpe_etc_t,
    +    seluser  => system_u,
    +    content  => template($ne_main_conf_erb),
    +    notify   => Service[$ne_service],
    +  }
    +
    +  # manage /etc/sysconfig/nrpe
    +
    +  file { $ne_nrpe_conf_file:
    +    ensure   => file,
    +    path     => $ne_nrpe_conf_file,
    +    owner    => 'root',
    +    group    => 'root',
    +    mode     => '0644',
    +    selrange => s0,
    +    selrole  => object_r,
    +    seltype  => etc_t,
    +    seluser  => system_u,
    +    content  => template($ne_nrpe_conf_erb),
    +    notify   => Service[$ne_service],
    +  }
    +
    +  if $ne_allow_sudo == true {
    +
    +    file { $ne_sudo_file:
    +      ensure   => file,
    +      path     => $ne_sudo_file,
    +      owner    => 'root',
    +      group    => 'root',
    +      mode     => '0440',
    +      selrange => s0,
    +      selrole  => object_r,
    +      seltype  => etc_t,
    +      seluser  => system_u,
    +      content  => template($ne_sudo_rule_erb),
    +    }
    +
    +    # file for sudo  selinux policy
    +    file { $ne_nrpe_te_file:
    +      ensure   => file,
    +      path     => $ne_nrpe_te_file,
    +      owner    => 'root',
    +      group    => 'root',
    +      mode     => '0440',
    +      selrange => s0,
    +      selrole  => object_r,
    +      seltype  => nrpe_etc_t,
    +      seluser  => system_u,
    +      content  => template($ne_nrpe_te_erb),
    +      notify   => Exec['create_nrpe_pp'],
    +    }
    +  }
    +}
    +
    +
    +
    + + + +
    + + \ No newline at end of file diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Ainstall.html b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Ainstall.html new file mode 100644 index 0000000..99c0ab7 --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Ainstall.html @@ -0,0 +1,138 @@ + + + + + + + Puppet Class: confdroid_nrpe::main::install + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
    + + +

    Puppet Class: confdroid_nrpe::main::install

    +
    + +
    +
    Inherits:
    +
    confdroid_nrpe::params
    +
    + + +
    +
    Defined in:
    +
    + manifests/main/install.pp +
    +
    +
    + +

    Summary

    + Class manages installing binaries required for confdroid_nrpe + +

    Overview

    +
    +
    + +

    confdroid_nrpe::main::install.pp Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@ConfDroid.com)

    + +
    +
    + + + +
    + + + +
    + + + + + +
    +
    +
    +
    +6
    +7
    +8
    +9
    +10
    +11
    +12
    +13
    +14
    +
    +
    # File 'manifests/main/install.pp', line 6
    +
    +class confdroid_nrpe::main::install (
    +
    +) inherits confdroid_nrpe::params {
    +  require confdroid_resources::main::epel
    +
    +  package { $reqpackages:
    +    ensure => $pkg_ensure,
    +  }
    +}
    +
    +
    +
    + + + +
    + + \ No newline at end of file diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Aservice.html b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Aservice.html new file mode 100644 index 0000000..e0fe38a --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Aservice.html @@ -0,0 +1,168 @@ + + + + + + + Puppet Class: confdroid_nrpe::main::service + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
    + + +

    Puppet Class: confdroid_nrpe::main::service

    +
    + +
    +
    Inherits:
    +
    confdroid_nrpe::params
    +
    + + +
    +
    Defined in:
    +
    + manifests/main/service.pp +
    +
    +
    + +

    Summary

    + Class manages the service(s) for confdroid_nrpe. + +

    Overview

    +
    +
    + +

    confdroid_nrpe::main::service.pp Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@ConfDroid.com)

    + +
    +
    + + + +
    + + + +
    + + + + + +
    +
    +
    +
    +6
    +7
    +8
    +9
    +10
    +11
    +12
    +13
    +14
    +15
    +16
    +17
    +18
    +19
    +20
    +21
    +22
    +23
    +24
    +25
    +26
    +27
    +28
    +29
    +
    +
    # File 'manifests/main/service.pp', line 6
    +
    +class confdroid_nrpe::main::service (
    +
    +) inherits confdroid_nrpe::params {
    +  require confdroid_nrpe::main::files
    +
    +  if $ne_incl_fw == true {
    +    require confdroid_nrpe::firewall::iptables
    +  }
    +
    +  if $ne_manage_cmds == true {
    +    require confdroid_nrpe::commands::definition_rules
    +  }
    +
    +  if $ne_include_selinux == true {
    +    require confdroid_nrpe::selinux::config
    +  }
    +
    +  service { $ne_service:
    +    ensure     => running,
    +    hasstatus  => true,
    +    hasrestart => true,
    +    enable     => true,
    +  }
    +}
    +
    +
    +
    + + + +
    + + \ No newline at end of file diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Auser.html b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Auser.html new file mode 100644 index 0000000..d2093b6 --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Auser.html @@ -0,0 +1,172 @@ + + + + + + + Puppet Class: confdroid_nrpe::main::user + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
    + + +

    Puppet Class: confdroid_nrpe::main::user

    +
    + +
    +
    Inherits:
    +
    confdroid_nrpe::params
    +
    + + +
    +
    Defined in:
    +
    + manifests/main/user.pp +
    +
    +
    + +

    Summary

    + Class manages service users for confdroid_nrpe. + +

    Overview

    +
    +
    + +

    confdroid_nrpe::main::user.pp Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@ConfDroid.com)

    + +
    +
    + + + +
    + + + +
    + + + + + +
    +
    +
    +
    +6
    +7
    +8
    +9
    +10
    +11
    +12
    +13
    +14
    +15
    +16
    +17
    +18
    +19
    +20
    +21
    +22
    +23
    +24
    +25
    +26
    +27
    +28
    +29
    +30
    +31
    +
    +
    # File 'manifests/main/user.pp', line 6
    +
    +class confdroid_nrpe::main::user (
    +
    +) inherits confdroid_nrpe::params {
    +  require confdroid_nrpe::main::install
    +
    +  group { $ne_user:
    +    ensure    => present,
    +    name      => $ne_user,
    +    gid       => $ne_user_uid,
    +    allowdupe => false,
    +  }
    +
    +  user { $ne_user:
    +    ensure     => present,
    +    name       => $ne_user,
    +    allowdupe  => false,
    +    comment    => $ne_user_comment,
    +    uid        => $ne_user_uid,
    +    gid        => $ne_user,
    +    groups     => $ne_user_groups,
    +    managehome => true,
    +    home       => $ne_user_home,
    +    shell      => $ne_user_shell,
    +    require    => Group[$ne_user],
    +  }
    +}
    +
    +
    +
    + + + +
    + + \ No newline at end of file diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html new file mode 100644 index 0000000..4b82d70 --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html @@ -0,0 +1,974 @@ + + + + + + + Puppet Class: confdroid_nrpe::params + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
    + + +

    Puppet Class: confdroid_nrpe::params

    + + +

    Summary

    + Class holds all parameters for the confdroid_nrpe module and is +inherited by all classes except defines. + +

    Overview

    +
    +
    + +

    confdroid_nrpe::params.pp Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@ConfDroid.com) be passed to the NRPE daemon.

    + +
    +
    + + + +
    +

    Parameters:

    +
      + +
    • + + pkg_ensure + + + (String) + + + (defaults to: 'present') + + + — +
      +

      which package type to choose, i.e. latest or present.

      +
      + +
    • + +
    • + + ne_log_facility + + + (String) + + + (defaults to: 'daemon') + + + — +
      +

      the log facility to use.

      +
      + +
    • + +
    • + + ne_log_file + + + (String) + + + (defaults to: '') + + + — +
      +

      If a log file is specified in this option, nrpe will write to that file instead of using syslog. i.e. /var/run/nrpe.log

      +
      + +
    • + +
    • + + ne_debug + + + (String) + + + (defaults to: '0') + + + — +
      +

      Whether debugging messages are logged to the syslog facility.

      +
      + +
    • + +
    • + + ne_nrpe_port + + + (String) + + + (defaults to: '5666') + + + — +
      +

      the NRPE port. used in firewall ( optional) and configuration file.

      +
      + +
    • + +
    • + + ne_listen_queue_size + + + (String) + + + (defaults to: '5') + + + — +
      +

      Listen queue size (backlog) for serving incoming connections.

      +
      + +
    • + +
    • + + ne_nagios_server + + + (String) + + + (defaults to: 'nagios.example.net') + + + — +
      +

      ipaddress of the nagios server to be allowed to connect to NRPE service. Default is to look up a global parameter from ENC.

      +
      + +
    • + +
    • + + ne_dont_blame_nrpe + + + (String) + + + (defaults to: '1') + + + — +
      +

      whether or not the NRPE daemon will allow clients to specify arguments to commands that are executed.

      +
      + +
    • + +
    • + + ne_allow_bash_cmd_subst + + + (String) + + + (defaults to: '1') + + + — +
      +

      whether or not the NRPE daemon will allow clients to specify arguments that contain bash command substitutions of the form $(…).

      +
      + +
    • + +
    • + + ne_allow_sudo + + + (Boolean) + + + (defaults to: true) + + + — +
      +

      Whether to allow sudo access. used in nrpe.cfg as well as for creating a sudo role.

      +
      + +
    • + +
    • + + ne_command_prefix + + + (String) + + + (defaults to: '/usr/bin/sudo') + + + — +
      +

      allows you to prefix all commands with a user-defined String.

      +
      + +
    • + +
    • + + ne_incl_fw + + + (Boolean) + + + (defaults to: true) + + + — +
      +

      Whether to include firewall rules

      +
      + +
    • + +
    • + + ne_command_timeout + + + (String) + + + (defaults to: '60') + + + — +
      +

      maximum number of seconds that the NRPE daemon will allow plugins to finish executing before killing them off.

      +
      + +
    • + +
    • + + ne_connection_timeout + + + (String) + + + (defaults to: '300') + + + — +
      +

      maximum number of seconds that the NRPE daemon will wait for a connection to be established before exiting.

      +
      + +
    • + +
    • + + ne_ssl_version + + + (String) + + + (defaults to: 'TLSv2+') + + + — +
      +

      These directives allow you to specify how to use SSL/TLS.

      +
      + +
    • + +
    • + + ne_ssl_use_adh + + + (String) + + + (defaults to: '1') + + + — +
      +

      This is for backward compatibility and is DEPRECATED. Set to 1 to enable ADH or 2 to require ADH. 1 is currently the default but will be changed in a later version.

      +
      + +
    • + +
    • + + ne_ssl_cipher_list + + + (String) + + + (defaults to: 'ALL:!aNULL:!eNULL:!SSLv2:!LOW:!EXP:!RC4:!MD5:@STRENGTH') + + + — +
      +

      ciphers can be used. For backward compatibility, this defaults to ‘ssl_cipher_list=ALL:!MD5:@STRENGTH’ in this version but will be changed in a later version of NRPE.

      +
      + +
    • + +
    • + + ne_ssl_cacert_file + + + (String) + + + (defaults to: '/etc/pki/tls/certs/ca-chain.crt.pem') + + + — +
      +

      path and name of the ssl certificate authority (ca) file / chain. must be full path.

      +
      + +
    • + +
    • + + ne_ssl_client_certs + + + (String) + + + (defaults to: '2') + + + — +
      +

      determines client certificate usage. Values: 0 = Don’t ask for or require client certificates 1 = Ask for client certificates 2 = Require client certificates

      +
      + +
    • + +
    • + + ne_ssl_logging + + + (String) + + + (defaults to: '0x00') + + + — +
      +

      determines which SSL messages are send to syslog. OR values together to specify multiple options. Values: 0x00 (0) = No additional logging (default) 0x01 (1) = Log startup SSL/TLS parameters 0x02 (2) = Log remote IP address 0x04 (4) = Log SSL/TLS version of connections 0x08 (8) = Log which cipher is being used for the connection 0x10 (16) = Log if client has a certificate 0x20 (32) = Log details of client’s certificate if it has one -1 or 0xff or 0x2f = All of the above

      +
      + +
    • + +
    • + + ne_nasty_metachars + + + (Array) + + + (defaults to: ["|`&><'\\[]{};\r\n"]) + + + — +
      +

      list of characters that cannot

      +
      + +
    • + +
    • + + ne_include_file + + + (String) + + + (defaults to: '') + + + — +
      +

      include definitions from an external config file.

      +
      + +
    • + +
    • + + ne_fw_order_no + + + (String) + + + (defaults to: '50') + + + — +
      +

      ordering prefix for he firewall rules. Adjust to your environment if needed.

      +
      + +
    • + +
    • + + ne_ssl_opts + + + (String) + + + (defaults to: '') + + + — +
      +

      Specify additional SSL options.

      +
      + +
    • + +
    • + + ne_user + + + (String) + + + (defaults to: 'nrpe') + + + — +
      +

      the NRPE service user

      +
      + +
    • + +
    • + + ne_user_comment + + + (String) + + + (defaults to: 'NRPE service user') + + + — +
      +

      The comment for the service user /etc/passwd

      +
      + +
    • + +
    • + + ne_user_uid + + + (String) + + + (defaults to: '1005') + + + — +
      +

      the UID for the service user

      +
      + +
    • + +
    • + + ne_user_home + + + (String) + + + (defaults to: '/var/run/nrpe') + + + — +
      +

      the home for the service user

      +
      + +
    • + +
    • + + ne_user_shell + + + (String) + + + (defaults to: '/sbin/nologin') + + + — +
      +

      the shell for the service user.

      +
      + +
    • + +
    • + + ne_user_groups + + + (Optional[String]) + + + (defaults to: undef) + + + — +
      +

      additional groups for the service user.

      +
      + +
    • + +
    • + + ne_server_address + + + (String) + + + (defaults to: '0.0.0.0') + + + — +
      +

      the network interfaces to listen on

      +
      + +
    • + +
    • + + ne_allow_weak_rnd_seed + + + (String) + + + (defaults to: '1') + + + — +
      +

      Whether to allow weak random seeds

      +
      + +
    • + +
    • + + ne_include_selinux + + + (Boolean) + + + (defaults to: true) + + + — +
      +

      Whether to manage selinux

      +
      + +
    • + +
    • + + ne_enable_ssl + + + (Boolean) + + + (defaults to: false) + + + — +
      +

      Whether to enable SSL certificates.

      +
      + +
    • + +
    • + + reqpackages + + + (Array) + + + (defaults to: ['nrpe','nrpe-selinux']) + + + — +
      +

      which packages to install

      +
      + +
    • + +
    • + + ne_manage_cmds + + + (Boolean) + + + (defaults to: true) + + + — +
      +

      Whether to manage command rules for NRPE checks, to allow dynamic check & command rules.

      +
      + +
    • + +
    + + + +

    See Also:

    + + +
    + + + + + +
    +
    +
    +
    +81
    +82
    +83
    +84
    +85
    +86
    +87
    +88
    +89
    +90
    +91
    +92
    +93
    +94
    +95
    +96
    +97
    +98
    +99
    +100
    +101
    +102
    +103
    +104
    +105
    +106
    +107
    +108
    +109
    +110
    +111
    +112
    +113
    +114
    +115
    +116
    +117
    +118
    +119
    +120
    +121
    +122
    +123
    +124
    +125
    +126
    +127
    +128
    +129
    +130
    +131
    +132
    +133
    +134
    +135
    +136
    +137
    +138
    +139
    +140
    +141
    +142
    +143
    +144
    +145
    +146
    +147
    +148
    +149
    +150
    +151
    +152
    +153
    +154
    +155
    +156
    +157
    +158
    +159
    +160
    +161
    +162
    +163
    +164
    +165
    +166
    +167
    +
    +
    # File 'manifests/params.pp', line 81
    +
    +class confdroid_nrpe::params (
    +
    +  String $pkg_ensure                 = 'present',
    +  Array $reqpackages                = ['nrpe','nrpe-selinux'],
    +
    +  Boolean $ne_manage_cmds             = true,
    +
    +# NRPE user settings
    +  String $ne_user                    = 'nrpe',
    +  String $ne_user_comment            = 'NRPE service user',
    +  String $ne_user_uid                = '1005',
    +  String $ne_user_home               = '/var/run/nrpe',
    +  Optional[String] $ne_user_groups   = undef,
    +  String $ne_user_shell              = '/sbin/nologin',
    +
    +# nrpe.cfg
    +  String $ne_log_facility            = 'daemon',
    +  String $ne_log_file                = '',
    +  String $ne_debug                   = '0',
    +  String $ne_nrpe_port               = '5666',
    +  String $ne_server_address          = '0.0.0.0',
    +  String $ne_listen_queue_size       = '5',
    +  String $ne_nagios_server           = 'nagios.example.net',
    +  String $ne_dont_blame_nrpe         = '1',
    +  String $ne_allow_bash_cmd_subst    = '1',
    +  Boolean $ne_allow_sudo             = true,
    +  String $ne_command_prefix          = '/usr/bin/sudo',
    +  String $ne_command_timeout         = '60',
    +  String $ne_connection_timeout      = '300',
    +  String $ne_allow_weak_rnd_seed     = '1',
    +  Boolean $ne_enable_ssl             = false,
    +  String $ne_ssl_version             = 'TLSv2+',
    +  String $ne_ssl_use_adh             = '1',
    +  String $ne_ssl_cipher_list         = 'ALL:!aNULL:!eNULL:!SSLv2:!LOW:!EXP:!RC4:!MD5:@STRENGTH',
    +  String $ne_ssl_cacert_file         = '/etc/pki/tls/certs/ca-chain.crt.pem',
    +  String $ne_ssl_client_certs        = '2',
    +  String $ne_ssl_logging             = '0x00',
    +  Array $ne_nasty_metachars          = ["|`&><'\\[]{};\r\n"],
    +  String $ne_include_file            = '',
    +
    +# nrpe.conf
    +  String $ne_ssl_opts                = '',
    +
    +# firewall
    +  Boolean $ne_incl_fw                = true,
    +  String $ne_fw_order_no             = '50',
    +
    +# selinux
    +  Boolean $ne_include_selinux        = true,
    +
    +) {
    +# Default facts
    +  $fqdn                     = $facts['networking']['fqdn']
    +  $domain                   = $facts['networking']['domain']
    +  $os_name                  = $facts['os']['name']
    +  $os_release               = $facts['os']['release']['major']
    +
    +# service
    +  $ne_service                 = 'nrpe'
    +
    +# directories
    +  $ne_main_conf_d_dir         = '/etc/nrpe.d'
    +  $ne_run_dir                 = '/var/run/nrpe'
    +
    +# files
    +  $ne_main_conf_file          = '/etc/nagios/nrpe.cfg'
    +  $ne_main_conf_erb           = 'confdroid_nrpe/nrpe_cfg.erb'
    +  $ne_nrpe_pid_file           = "${ne_run_dir}/nrpe.pid"
    +  $ne_nrpe_conf_file          = '/etc/sysconfig/nrpe'
    +  $ne_nrpe_conf_erb           = 'confdroid_nrpe/nrpe_conf.erb'
    +  $ne_cmd_file                = "${ne_main_conf_d_dir}/commands.cfg"
    +  $ne_cmd_head_erb            = 'confdroid_nrpe/cmd_head.erb'
    +  $ne_cmd_rule_erb            = 'confdroid_nrpe/cmd_rule.erb'
    +  $ne_sudo_file               = '/etc/sudoers.d/nagios_sudo'
    +  $ne_sudo_rule_erb           = 'confdroid_nrpe/sudo_rule.erb'
    +  $ne_nrpe_te_file            = "${ne_main_conf_d_dir}/nrpe.te"
    +  $ne_nrpe_te_erb             = 'confdroid_nrpe/nrpe.te.erb'
    +  $ne_nrpe_mod_file           = "${ne_main_conf_d_dir}/nrpe.mod"
    +  $ne_checkmodule_nrpe_erb    = 'confdroid_nrpe/checkmodule_nrpe.erb'
    +  $ne_nrpe_pp_file            = "${ne_main_conf_d_dir}/nrpe.pp"
    +  $ne_semodule_erb            =  'confdroid_nrpe/semodule_nrpe.erb'
    +  $ne_ssl_cert_file           = "/etc/pki/tls/certs/${fqdn}.crt.pem"
    +  $ne_ssl_privatekey_file     = "/etc/pki/tls/private/${fqdn}.key.pem"
    +
    +# includes must be last
    +  include confdroid_nrpe::main::config
    +}
    +
    +
    +
    + + + +
    + + \ No newline at end of file diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Aselinux_3A_3Aconfig.html b/doc/puppet_classes/confdroid_nrpe_3A_3Aselinux_3A_3Aconfig.html new file mode 100644 index 0000000..095da2b --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Aselinux_3A_3Aconfig.html @@ -0,0 +1,182 @@ + + + + + + + Puppet Class: confdroid_nrpe::selinux::config + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
    + + +

    Puppet Class: confdroid_nrpe::selinux::config

    +
    + +
    +
    Inherits:
    +
    confdroid_nrpe::params
    +
    + + +
    +
    Defined in:
    +
    + manifests/selinux/config.pp +
    +
    +
    + +

    Summary

    + Class manages all aspects of configuring selinux for NRPE. + +

    Overview

    +
    +
    + +

    confdroid_nrpe::selinux::config.pp # Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@ConfDroid.com)

    + +
    +
    + + + +
    + + + +
    + + + + + +
    +
    +
    +
    +5
    +6
    +7
    +8
    +9
    +10
    +11
    +12
    +13
    +14
    +15
    +16
    +17
    +18
    +19
    +20
    +21
    +22
    +23
    +24
    +25
    +26
    +27
    +28
    +29
    +30
    +31
    +32
    +33
    +34
    +35
    +
    +
    # File 'manifests/selinux/config.pp', line 5
    +
    +class confdroid_nrpe::selinux::config (
    +
    +) inherits confdroid_nrpe::params {
    +  if $ne_include_selinux == true {
    +    #  manage allow nagios sudo
    +
    +    exec { 'nagios_run_sudo':
    +      command => 'setsebool -P nagios_run_sudo 1',
    +      path    => ['/usr/bin','/usr/sbin'],
    +      cwd     => '/tmp',
    +      unless  => 'getsebool nagios_run_sudo | awk \'{print$3}\' | grep -ic "on"'
    +    }
    +
    +    # create policy file for sudo selinux policy
    +    exec { 'create_nrpe_pp':
    +      command     => template($ne_checkmodule_nrpe_erb),
    +      user        => 'root',
    +      creates     => $ne_nrpe_pp_file,
    +      refreshonly => true,
    +      notify      => Exec['import_semodule_nrpe'],
    +    }
    +
    +    # import semodule
    +    exec { 'import_semodule_nrpe':
    +      command     => template($ne_semodule_erb),
    +      user        => 'root',
    +      unless      => '/sbin/semodule -l | grep nrpe | grep -v nrpe_',
    +      refreshonly => true,
    +    }
    +  }
    +}
    +
    +
    +
    + + + +
    + + \ No newline at end of file diff --git a/doc/puppet_defined_type_list.html b/doc/puppet_defined_type_list.html index 7ec4f3a..669a169 100644 --- a/doc/puppet_defined_type_list.html +++ b/doc/puppet_defined_type_list.html @@ -40,9 +40,9 @@
      -
    • +
    • diff --git a/doc/puppet_defined_types/confdroid_nrpe_3A_3Acommands_3A_3Adefinitions.html b/doc/puppet_defined_types/confdroid_nrpe_3A_3Acommands_3A_3Adefinitions.html new file mode 100644 index 0000000..91fbd6c --- /dev/null +++ b/doc/puppet_defined_types/confdroid_nrpe_3A_3Acommands_3A_3Adefinitions.html @@ -0,0 +1,228 @@ + + + + + + + Defined Type: confdroid_nrpe::commands::definitions + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
      + + +

      Defined Type: confdroid_nrpe::commands::definitions

      +
      +
      +
      Defined in:
      +
      + manifests/commands/definitions.pp +
      +
      +
      + +

      Summary

      + Populate command definitions through external puppet rules, i.e. +from other modules. + +

      Overview

      +
      +
      + +

      confdroid_nrpe::commands::definitions.pp Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@ConfDroid.com)

      + +
      +
      + + + +
      +

      Parameters:

      +
        + +
      • + + ne_check_cmd + + + (Optional[String]) + + + (defaults to: undef) + + + — +
        +

        Specify the check_command to use.

        +
        + +
      • + +
      • + + ne_cmd_path + + + (String) + + + (defaults to: '/usr/lib64/nagios/plugins/') + + + — +
        +

        The path to the command scripts, usually where the nagios_plugins are located. If you use your own scripts, specify the custom location including the trailing slash

        +
        + +
      • + +
      • + + ne_cmd_argstring + + + (Optional[String]) + + + (defaults to: undef) + + + — +
        +

        Specify the string of valid argument for the command , i.e. -w $ARG1$ -c $ARG2$. See the arguments in the man pages for the checks.

        +
        + +
      • + +
      • + + ne_cmd_comment + + + (String) + + + (defaults to: '') + + + — +
        +

        Specify an optional comment for your command definition

        +
        + +
      • + +
      + + + +
      + + + + + +
      +
      +
      +
      +16
      +17
      +18
      +19
      +20
      +21
      +22
      +23
      +24
      +25
      +26
      +27
      +28
      +29
      +30
      +31
      +32
      +33
      +34
      +
      +
      # File 'manifests/commands/definitions.pp', line 16
      +
      +define confdroid_nrpe::commands::definitions (
      +
      +  Optional[String] $ne_check_cmd      = undef,
      +  String $ne_cmd_path                 = '/usr/lib64/nagios/plugins/',
      +  Optional[String] $ne_cmd_argstring  = undef,
      +  String $ne_cmd_comment              = '',
      +
      +) {
      +  $ne_cmd_file      = $confdroid_nrpe::params::ne_cmd_file
      +  $ne_cmd_rule_erb  = $confdroid_nrpe::params::ne_cmd_rule_erb
      +  $ne_manage_cmds   = $confdroid_nrpe::params::ne_manage_cmds
      +
      +  if $ne_manage_cmds == true {
      +    concat::fragment { $name:
      +      target  => $ne_cmd_file,
      +      content => template($ne_cmd_rule_erb),
      +    }
      +  }
      +}
      +
      +
      +
      + + + +
      + + \ No newline at end of file From 86567cad999a6b17e726a3611093df44f20114e6 Mon Sep 17 00:00:00 2001 From: Jenkins Server Date: Tue, 10 Feb 2026 18:17:13 +0100 Subject: [PATCH 04/16] Recommit for updates in build 2 --- doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html index 4b82d70..74adf9c 100644 --- a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html @@ -735,7 +735,7 @@ inherited by all classes except defines. (Array) - (defaults to: ['nrpe','nrpe-selinux']) + (defaults to: ['nrpe','nrpe-selinux','selinux-policy-devel']) — @@ -875,9 +875,9 @@ inherited by all classes except defines. class confdroid_nrpe::params ( String $pkg_ensure = 'present', - Array $reqpackages = ['nrpe','nrpe-selinux'], + Array $reqpackages = ['nrpe','nrpe-selinux','selinux-policy-devel'], - Boolean $ne_manage_cmds = true, + Boolean $ne_manage_cmds = true, # NRPE user settings String $ne_user = 'nrpe', From 0f155fbb60044bc6fdfd1c6698a685a36a209c86 Mon Sep 17 00:00:00 2001 From: Jenkins Server Date: Tue, 10 Feb 2026 18:21:55 +0100 Subject: [PATCH 05/16] Recommit for updates in build 3 --- .../confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html b/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html index bcacf11..201d571 100644 --- a/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html @@ -120,7 +120,7 @@ class confdroid_nrpe::firewall::iptables ( ) inherits confdroid_nrpe::params { if $ne_incl_fw == true { firewall { "${ne_fw_order_no}${ne_nrpe_port} port ${ne_nrpe_port}": -# source => $nagios_server, + source => $nagios_server, proto => 'tcp', dport => $ne_nrpe_port, jump => 'accept', From 7bfeb3d32f190fa11c619e2c01d87f21e6aaeb4e Mon Sep 17 00:00:00 2001 From: Jenkins Server Date: Tue, 10 Feb 2026 18:25:44 +0100 Subject: [PATCH 06/16] Recommit for updates in build 4 --- .../confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html b/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html index 201d571..796aae0 100644 --- a/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html @@ -120,10 +120,10 @@ class confdroid_nrpe::firewall::iptables ( ) inherits confdroid_nrpe::params { if $ne_incl_fw == true { firewall { "${ne_fw_order_no}${ne_nrpe_port} port ${ne_nrpe_port}": - source => $nagios_server, - proto => 'tcp', - dport => $ne_nrpe_port, - jump => 'accept', + source => $ne_nagios_server, + proto => 'tcp', + dport => $ne_nrpe_port, + jump => 'accept', } } }
From f72c7cab8688ddfc4721e960ce4ee54702f50b05 Mon Sep 17 00:00:00 2001 From: Jenkins Server Date: Wed, 11 Feb 2026 14:48:19 +0100 Subject: [PATCH 07/16] Recommit for updates in build 5 --- doc/file.README.html | 43 ++++++++++++++++++++++++++++++++++--------- doc/index.html | 43 ++++++++++++++++++++++++++++++++++--------- 2 files changed, 68 insertions(+), 18 deletions(-) diff --git a/doc/file.README.html b/doc/file.README.html index 20d8d4c..b57197c 100644 --- a/doc/file.README.html +++ b/doc/file.README.html @@ -60,9 +60,38 @@

Readme

-

- -

[[TOC]]

+

+

Synopsis

@@ -115,13 +144,9 @@

All dependencies must be included in the catalogue.

Deployment

diff --git a/doc/index.html b/doc/index.html index 93f160a..e42f12e 100644 --- a/doc/index.html +++ b/doc/index.html @@ -60,9 +60,38 @@

Readme

-

- -

[[TOC]]

+

+

Synopsis

@@ -115,13 +144,9 @@

All dependencies must be included in the catalogue.

Deployment

From 0113009a67e137551bd54e61a85136b49732b5ac Mon Sep 17 00:00:00 2001 From: Jenkins Server Date: Wed, 11 Feb 2026 14:50:52 +0100 Subject: [PATCH 08/16] Recommit for updates in build 6 --- doc/file.README.html | 6 +++--- doc/index.html | 6 +++--- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/doc/file.README.html b/doc/file.README.html index b57197c..982ec1d 100644 --- a/doc/file.README.html +++ b/doc/file.README.html @@ -204,9 +204,9 @@

Support

  • -

    OS: CentOS 7

    +

    OS: Rocky 9

  • -

    Puppet 5

    +

    Puppet 8

Tests

@@ -227,7 +227,7 @@

Contact Us

-

contact Us

+

contact Us Feedback Portal

Disclaimer

diff --git a/doc/index.html b/doc/index.html index e42f12e..8e85993 100644 --- a/doc/index.html +++ b/doc/index.html @@ -204,9 +204,9 @@

Support

  • -

    OS: CentOS 7

    +

    OS: Rocky 9

  • -

    Puppet 5

    +

    Puppet 8

Tests

@@ -227,7 +227,7 @@

Contact Us

-

contact Us

+

contact Us Feedback Portal

Disclaimer

From 96ec9af14062e09f9bdecb143e52fa62efc07dc3 Mon Sep 17 00:00:00 2001 From: Jenkins Server Date: Wed, 11 Feb 2026 14:52:47 +0100 Subject: [PATCH 09/16] Recommit for updates in build 7 --- doc/file.README.html | 7 +++++-- doc/index.html | 7 +++++-- 2 files changed, 10 insertions(+), 4 deletions(-) diff --git a/doc/file.README.html b/doc/file.README.html index 982ec1d..ba93278 100644 --- a/doc/file.README.html +++ b/doc/file.README.html @@ -226,8 +226,11 @@

Contact Us

- -

contact Us Feedback Portal

+

Disclaimer

diff --git a/doc/index.html b/doc/index.html index 8e85993..8b8b676 100644 --- a/doc/index.html +++ b/doc/index.html @@ -226,8 +226,11 @@

Contact Us

- -

contact Us Feedback Portal

+

Disclaimer

From b9a9c8bfcc2e9cf66da342fa382dbeb27c8275da Mon Sep 17 00:00:00 2001 From: Jenkins Server Date: Fri, 13 Feb 2026 16:10:41 +0100 Subject: [PATCH 10/16] Recommit for updates in build 8 --- ...roid_nrpe_3A_3Afirewall_3A_3Aiptables.html | 2 +- .../confdroid_nrpe_3A_3Aparams.html | 30 ++++--------------- 2 files changed, 7 insertions(+), 25 deletions(-) diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html b/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html index 796aae0..70acd57 100644 --- a/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html @@ -120,7 +120,7 @@ class confdroid_nrpe::firewall::iptables ( ) inherits confdroid_nrpe::params { if $ne_incl_fw == true { firewall { "${ne_fw_order_no}${ne_nrpe_port} port ${ne_nrpe_port}": - source => $ne_nagios_server, + source => $nagios_server, proto => 'tcp', dport => $ne_nrpe_port, jump => 'accept', diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html index 74adf9c..3c2190c 100644 --- a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html @@ -223,24 +223,6 @@ inherited by all classes except defines. -
  • - - ne_nagios_server - - - (String) - - - (defaults to: 'nagios.example.net') - - - — -
    -

    ipaddress of the nagios server to be allowed to connect to NRPE service. Default is to look up a global parameter from ENC.

    -
    - -
  • -
  • ne_dont_blame_nrpe @@ -781,6 +763,9 @@ inherited by all classes except defines.
     
     
    +78
    +79
    +80
     81
     82
     83
    @@ -864,13 +849,10 @@ inherited by all classes except defines.
     161
     162
     163
    -164
    -165
    -166
    -167
    +164
  • -
    # File 'manifests/params.pp', line 81
    +        
    # File 'manifests/params.pp', line 78
     
     class confdroid_nrpe::params (
     
    @@ -894,7 +876,6 @@ class confdroid_nrpe::params (
       String $ne_nrpe_port               = '5666',
       String $ne_server_address          = '0.0.0.0',
       String $ne_listen_queue_size       = '5',
    -  String $ne_nagios_server           = 'nagios.example.net',
       String $ne_dont_blame_nrpe         = '1',
       String $ne_allow_bash_cmd_subst    = '1',
       Boolean $ne_allow_sudo             = true,
    @@ -928,6 +909,7 @@ class confdroid_nrpe::params (
       $domain                   = $facts['networking']['domain']
       $os_name                  = $facts['os']['name']
       $os_release               = $facts['os']['release']['major']
    +  $nagios_server            = $facts['nagios_server']
     
     # service
       $ne_service                 = 'nrpe'
    
    From bc9daabf6ca620d404a538aac941a3ac51907a23 Mon Sep 17 00:00:00 2001
    From: Jenkins Server 
    Date: Fri, 13 Feb 2026 16:33:47 +0100
    Subject: [PATCH 11/16] Recommit for updates in build 9
    
    ---
     ...roid_nrpe_3A_3Afirewall_3A_3Aiptables.html |  2 +-
     .../confdroid_nrpe_3A_3Aparams.html           | 30 +++++++++++++++----
     2 files changed, 26 insertions(+), 6 deletions(-)
    
    diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html b/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html
    index 70acd57..de71645 100644
    --- a/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html
    +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html
    @@ -120,7 +120,7 @@ class confdroid_nrpe::firewall::iptables (
     ) inherits confdroid_nrpe::params {
       if $ne_incl_fw == true {
         firewall { "${ne_fw_order_no}${ne_nrpe_port} port ${ne_nrpe_port}":
    -      source => $nagios_server,
    +      source => $ne_nagios_source,
           proto  => 'tcp',
           dport  => $ne_nrpe_port,
           jump   => 'accept',
    diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html
    index 3c2190c..9e58056 100644
    --- a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html
    +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html
    @@ -741,6 +741,24 @@ inherited by all classes except defines.
             —
             

    Whether to manage command rules for NRPE checks, to allow dynamic check & command rules.

    +
    + + + +
  • + + ne_nagios_source + + + (String) + + + (defaults to: '0.0.0.0/0') + + + — +
    +

    the source address for the firewall rule. Adjust to your environment if needed. Default is ‘0.0.0.0/0’ to allow all sources, but it is recommended to specify the nagios server IP or subnet.

  • @@ -763,9 +781,6 @@ inherited by all classes except defines.
     
     
    -78
    -79
    -80
     81
     82
     83
    @@ -849,10 +864,14 @@ inherited by all classes except defines.
     161
     162
     163
    -164
    +164 +165 +166 +167 +168
    -
    # File 'manifests/params.pp', line 78
    +        
    # File 'manifests/params.pp', line 81
     
     class confdroid_nrpe::params (
     
    @@ -899,6 +918,7 @@ class confdroid_nrpe::params (
     # firewall
       Boolean $ne_incl_fw                = true,
       String $ne_fw_order_no             = '50',
    +  String $ne_nagios_source           = '0.0.0.0/0',
     
     # selinux
       Boolean $ne_include_selinux        = true,
    
    From 6d8a03f95bbc5a3438edd01e5aca4693f754296f Mon Sep 17 00:00:00 2001
    From: Jenkins Server 
    Date: Fri, 13 Feb 2026 16:39:48 +0100
    Subject: [PATCH 12/16] Recommit for updates in build 10
    
    ---
     doc/file.README.html | 18 +++++++-----------
     doc/index.html       | 18 +++++++-----------
     2 files changed, 14 insertions(+), 22 deletions(-)
    
    diff --git a/doc/file.README.html b/doc/file.README.html
    index ba93278..96a3e6c 100644
    --- a/doc/file.README.html
    +++ b/doc/file.README.html
    @@ -104,14 +104,9 @@
     

    Attention: Never use this puppet module on systems which have been previously configured manually. It is impossible to predict how and what would have been configured, hence previous configurations outside the scope of this module may be overwritten! Automated configurations require a test environment to verify that the module suits the purpose intended by the user, as well as tune the parameters, before deploying into live production

    Features

    - -

    INSTALLATION

    • install nrpe binaries

      -
    - -

    CONFIGURATION

    -
    • +
    • manage NRPE service user properties

    • manage directory structure (file system permissions, selinux context) through parameters

      @@ -126,16 +121,17 @@
    • manage dynamic NRPE check command definitions

    • -

      manage iptables (optional)

      +

      manage iptables (optional). set ne_incl_fwto true. Specify a custom value to ne_nagios_source for the nagior server IP or range.

    • manage selinux rule exceptions (optional)

      -
    - -

    SERVICE

    -
    • +
    • manage NRPE service

    +
    +

    Note: The value for the nagios_server variable is derived from a global paraneter set in Foreman (nagios_server), because the paremeter is used across multiple modules. You need to set that manually in Foreman under “Global Parameters”.

    +
    +

    Repo Documentation

    See the full Puppet documentation including parameters in docs/index.html

    diff --git a/doc/index.html b/doc/index.html index 8b8b676..893ce8e 100644 --- a/doc/index.html +++ b/doc/index.html @@ -104,14 +104,9 @@

    Attention: Never use this puppet module on systems which have been previously configured manually. It is impossible to predict how and what would have been configured, hence previous configurations outside the scope of this module may be overwritten! Automated configurations require a test environment to verify that the module suits the purpose intended by the user, as well as tune the parameters, before deploying into live production

    Features

    - -

    INSTALLATION

    • install nrpe binaries

      -
    - -

    CONFIGURATION

    -
    • +
    • manage NRPE service user properties

    • manage directory structure (file system permissions, selinux context) through parameters

      @@ -126,16 +121,17 @@
    • manage dynamic NRPE check command definitions

    • -

      manage iptables (optional)

      +

      manage iptables (optional). set ne_incl_fwto true. Specify a custom value to ne_nagios_source for the nagior server IP or range.

    • manage selinux rule exceptions (optional)

      -
    - -

    SERVICE

    -
    • +
    • manage NRPE service

    +
    +

    Note: The value for the nagios_server variable is derived from a global paraneter set in Foreman (nagios_server), because the paremeter is used across multiple modules. You need to set that manually in Foreman under “Global Parameters”.

    +
    +

    Repo Documentation

    See the full Puppet documentation including parameters in docs/index.html

    From acda44046f25317f9ff40fbe584e1639d37eca17 Mon Sep 17 00:00:00 2001 From: Jenkins Server Date: Fri, 13 Feb 2026 16:46:41 +0100 Subject: [PATCH 13/16] Recommit for updates in build 11 --- doc/file.README.html | 4 +-- doc/index.html | 4 +-- ...roid_nrpe_3A_3Afirewall_3A_3Aiptables.html | 2 +- .../confdroid_nrpe_3A_3Aparams.html | 30 ++++--------------- 4 files changed, 11 insertions(+), 29 deletions(-) diff --git a/doc/file.README.html b/doc/file.README.html index 96a3e6c..c9fa6bd 100644 --- a/doc/file.README.html +++ b/doc/file.README.html @@ -121,7 +121,7 @@
  • manage dynamic NRPE check command definitions

  • -

    manage iptables (optional). set ne_incl_fwto true. Specify a custom value to ne_nagios_source for the nagior server IP or range.

    +

    manage iptables (optional). set ne_incl_fwto true.

  • manage selinux rule exceptions (optional)

  • @@ -129,7 +129,7 @@
  • -

    Note: The value for the nagios_server variable is derived from a global paraneter set in Foreman (nagios_server), because the paremeter is used across multiple modules. You need to set that manually in Foreman under “Global Parameters”.

    +

    Note: The value for the nagios_server variable is derived from a global paraneter set in Foreman (nagios_server), because the paremeter is used across multiple modules. You need to set that manually in Foreman under “Global Parameters”. Same for nagios_source, the value for the firewall source.

    Repo Documentation

    diff --git a/doc/index.html b/doc/index.html index 893ce8e..12e5f19 100644 --- a/doc/index.html +++ b/doc/index.html @@ -121,7 +121,7 @@
  • manage dynamic NRPE check command definitions

  • -

    manage iptables (optional). set ne_incl_fwto true. Specify a custom value to ne_nagios_source for the nagior server IP or range.

    +

    manage iptables (optional). set ne_incl_fwto true.

  • manage selinux rule exceptions (optional)

  • @@ -129,7 +129,7 @@
  • -

    Note: The value for the nagios_server variable is derived from a global paraneter set in Foreman (nagios_server), because the paremeter is used across multiple modules. You need to set that manually in Foreman under “Global Parameters”.

    +

    Note: The value for the nagios_server variable is derived from a global paraneter set in Foreman (nagios_server), because the paremeter is used across multiple modules. You need to set that manually in Foreman under “Global Parameters”. Same for nagios_source, the value for the firewall source.

    Repo Documentation

    diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html b/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html index de71645..d3a7446 100644 --- a/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html @@ -120,7 +120,7 @@ class confdroid_nrpe::firewall::iptables ( ) inherits confdroid_nrpe::params { if $ne_incl_fw == true { firewall { "${ne_fw_order_no}${ne_nrpe_port} port ${ne_nrpe_port}": - source => $ne_nagios_source, + source => $nagios_source, proto => 'tcp', dport => $ne_nrpe_port, jump => 'accept', diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html index 9e58056..5a86f5f 100644 --- a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html @@ -741,24 +741,6 @@ inherited by all classes except defines. —

    Whether to manage command rules for NRPE checks, to allow dynamic check & command rules.

    -
    - - - -
  • - - ne_nagios_source - - - (String) - - - (defaults to: '0.0.0.0/0') - - - — -
    -

    the source address for the firewall rule. Adjust to your environment if needed. Default is ‘0.0.0.0/0’ to allow all sources, but it is recommended to specify the nagios server IP or subnet.

  • @@ -781,6 +763,9 @@ inherited by all classes except defines.
     
     
    +78
    +79
    +80
     81
     82
     83
    @@ -865,13 +850,10 @@ inherited by all classes except defines.
     162
     163
     164
    -165
    -166
    -167
    -168
    +165
    -
    # File 'manifests/params.pp', line 81
    +        
    # File 'manifests/params.pp', line 78
     
     class confdroid_nrpe::params (
     
    @@ -918,7 +900,6 @@ class confdroid_nrpe::params (
     # firewall
       Boolean $ne_incl_fw                = true,
       String $ne_fw_order_no             = '50',
    -  String $ne_nagios_source           = '0.0.0.0/0',
     
     # selinux
       Boolean $ne_include_selinux        = true,
    @@ -930,6 +911,7 @@ class confdroid_nrpe::params (
       $os_name                  = $facts['os']['name']
       $os_release               = $facts['os']['release']['major']
       $nagios_server            = $facts['nagios_server']
    +  $nagios_source            = $facts['nagios_source']
     
     # service
       $ne_service                 = 'nrpe'
    
    From 75f8e53b873cfaf1ca77d37d5ee6ffa6a79a6f3b Mon Sep 17 00:00:00 2001
    From: Jenkins Server 
    Date: Fri, 13 Feb 2026 16:56:30 +0100
    Subject: [PATCH 14/16] Recommit for updates in build 12
    
    ---
     doc/_index.html                               |  5 ----
     doc/puppet_class_list.html                    | 23 +++++++------------
     .../confdroid_nrpe_3A_3Aparams.html           |  2 --
     3 files changed, 8 insertions(+), 22 deletions(-)
    
    diff --git a/doc/_index.html b/doc/_index.html
    index f40d9ec..983d658 100644
    --- a/doc/_index.html
    +++ b/doc/_index.html
    @@ -78,11 +78,6 @@
           
                 
         
    -            
  • - confdroid_nrpe::firewall::iptables - -
  • -
  • confdroid_nrpe::main::config diff --git a/doc/puppet_class_list.html b/doc/puppet_class_list.html index 7401c21..d4b374c 100644 --- a/doc/puppet_class_list.html +++ b/doc/puppet_class_list.html @@ -54,63 +54,56 @@
  • -
  • - -
  • - - -
  • +
  • -
  • +
  • -
  • +
  • -
  • +
  • -
  • +
  • -
  • +
  • -
  • +
  • -
  • +
  • diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html index 5a86f5f..8773299 100644 --- a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html @@ -81,8 +81,6 @@ confdroid_nrpe::selinux::config
    - confdroid_nrpe::firewall::iptables
    - confdroid_nrpe::commands::definition_rules
    From d30eae067575d3f848f94a6e675cf30f1e3cae38 Mon Sep 17 00:00:00 2001 From: Jenkins Server Date: Fri, 13 Feb 2026 17:01:16 +0100 Subject: [PATCH 15/16] Recommit for updates in build 13 --- doc/_index.html | 5 ++++ doc/puppet_class_list.html | 23 ++++++++++++------- ...roid_nrpe_3A_3Afirewall_3A_3Aiptables.html | 6 ++++- .../confdroid_nrpe_3A_3Aparams.html | 2 ++ 4 files changed, 27 insertions(+), 9 deletions(-) diff --git a/doc/_index.html b/doc/_index.html index 983d658..f40d9ec 100644 --- a/doc/_index.html +++ b/doc/_index.html @@ -78,6 +78,11 @@
  • +
  • + confdroid_nrpe::firewall::iptables + +
  • +
  • confdroid_nrpe::main::config diff --git a/doc/puppet_class_list.html b/doc/puppet_class_list.html index d4b374c..7401c21 100644 --- a/doc/puppet_class_list.html +++ b/doc/puppet_class_list.html @@ -54,56 +54,63 @@
  • -
  • +
  • + +
  • + + +
  • -
  • +
  • -
  • +
  • -
  • +
  • -
  • +
  • -
  • +
  • -
  • +
  • -
  • +
  • diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html b/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html index d3a7446..e5a6f0f 100644 --- a/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html @@ -110,7 +110,9 @@ 15 16 17 -18
  • +18 +19 +20
    # File 'manifests/firewall/iptables.pp', line 7
    @@ -119,6 +121,8 @@ class confdroid_nrpe::firewall::iptables (
     
     ) inherits confdroid_nrpe::params {
       if $ne_incl_fw == true {
    +    notify { "nagios_source is set to ${nagios_source}": }
    +
         firewall { "${ne_fw_order_no}${ne_nrpe_port} port ${ne_nrpe_port}":
           source => $nagios_source,
           proto  => 'tcp',
    diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html
    index 8773299..5a86f5f 100644
    --- a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html
    +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html
    @@ -81,6 +81,8 @@
           
           confdroid_nrpe::selinux::config
    + confdroid_nrpe::firewall::iptables
    + confdroid_nrpe::commands::definition_rules
    From 9124648f472a2b7f767b5c5bfeb32346d1ec7c41 Mon Sep 17 00:00:00 2001 From: Jenkins Server Date: Fri, 13 Feb 2026 17:03:45 +0100 Subject: [PATCH 16/16] Recommit for updates in build 14 --- .../confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html b/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html index e5a6f0f..a73b381 100644 --- a/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html @@ -112,7 +112,8 @@ 17 18 19 -20
    +20 +21
    # File 'manifests/firewall/iptables.pp', line 7
    @@ -122,6 +123,7 @@ class confdroid_nrpe::firewall::iptables (
     ) inherits confdroid_nrpe::params {
       if $ne_incl_fw == true {
         notify { "nagios_source is set to ${nagios_source}": }
    +    notify { "nagios_server is set to ${nagios_server}": }
     
         firewall { "${ne_fw_order_no}${ne_nrpe_port} port ${ne_nrpe_port}":
           source => $nagios_source,