From 4301a89fceba203b03f53bfc5d8bd1be3cc5b070 Mon Sep 17 00:00:00 2001 From: Jenkins Server Date: Fri, 13 Feb 2026 17:51:58 +0100 Subject: [PATCH 01/17] Recommit for updates in build 26 --- doc/_index.html | 187 ++++ doc/css/common.css | 8 + doc/css/full_list.css | 58 ++ doc/css/style.css | 497 +++++++++ doc/file.README.html | 244 +++++ doc/frames.html | 22 + doc/index.html | 244 +++++ doc/js/app.js | 314 ++++++ doc/js/full_list.js | 216 ++++ doc/js/jquery.js | 4 + doc/puppet_class_list.html | 124 +++ doc/puppet_classes/confdroid_nrpe.html | 121 +++ ...e_3A_3Acommands_3A_3Adefinition_rules.html | 248 +++++ ...roid_nrpe_3A_3Afirewall_3A_3Aiptables.html | 142 +++ .../confdroid_nrpe_3A_3Amain_3A_3Aconfig.html | 128 +++ .../confdroid_nrpe_3A_3Amain_3A_3Adirs.html | 182 ++++ .../confdroid_nrpe_3A_3Amain_3A_3Afiles.html | 256 +++++ ...confdroid_nrpe_3A_3Amain_3A_3Ainstall.html | 138 +++ ...confdroid_nrpe_3A_3Amain_3A_3Aservice.html | 168 +++ .../confdroid_nrpe_3A_3Amain_3A_3Auser.html | 172 ++++ .../confdroid_nrpe_3A_3Aparams.html | 958 ++++++++++++++++++ ...nfdroid_nrpe_3A_3Aselinux_3A_3Aconfig.html | 182 ++++ doc/puppet_defined_type_list.html | 54 + ...d_nrpe_3A_3Acommands_3A_3Adefinitions.html | 228 +++++ doc/top-level-namespace.html | 98 ++ 25 files changed, 4993 insertions(+) create mode 100644 doc/_index.html create mode 100644 doc/css/common.css create mode 100644 doc/css/full_list.css create mode 100644 doc/css/style.css create mode 100644 doc/file.README.html create mode 100644 doc/frames.html create mode 100644 doc/index.html create mode 100644 doc/js/app.js create mode 100644 doc/js/full_list.js create mode 100644 doc/js/jquery.js create mode 100644 doc/puppet_class_list.html create mode 100644 doc/puppet_classes/confdroid_nrpe.html create mode 100644 doc/puppet_classes/confdroid_nrpe_3A_3Acommands_3A_3Adefinition_rules.html create mode 100644 doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html create mode 100644 doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Aconfig.html create mode 100644 doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Adirs.html create mode 100644 doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Afiles.html create mode 100644 doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Ainstall.html create mode 100644 doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Aservice.html create mode 100644 doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Auser.html create mode 100644 doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html create mode 100644 doc/puppet_classes/confdroid_nrpe_3A_3Aselinux_3A_3Aconfig.html create mode 100644 doc/puppet_defined_type_list.html create mode 100644 doc/puppet_defined_types/confdroid_nrpe_3A_3Acommands_3A_3Adefinitions.html create mode 100644 doc/top-level-namespace.html diff --git a/doc/_index.html b/doc/_index.html new file mode 100644 index 0000000..f40d9ec --- /dev/null +++ b/doc/_index.html @@ -0,0 +1,187 @@ + + + + + + + Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Documentation by YARD 0.9.36

+
+

Alphabetic Index

+ +

Puppet Class Listing A-Z

+ + + + + + +
+ + + + +
+ + + +

Defined Type Listing A-Z

+ + + + + + +
+ + + + +
+ + + + + + + +

File Listing

+ + +
+ + +
+ +
+ + + +
+ + \ No newline at end of file diff --git a/doc/css/common.css b/doc/css/common.css new file mode 100644 index 0000000..d28b093 --- /dev/null +++ b/doc/css/common.css @@ -0,0 +1,8 @@ +/* Ensure the search bar doesn't overlap with links */ +.fixed_header { + padding-bottom: 25px; +} + +#full_list { + padding-top: 15px; +} diff --git a/doc/css/full_list.css b/doc/css/full_list.css new file mode 100644 index 0000000..fa35982 --- /dev/null +++ b/doc/css/full_list.css @@ -0,0 +1,58 @@ +body { + margin: 0; + font-family: "Lucida Sans", "Lucida Grande", Verdana, Arial, sans-serif; + font-size: 13px; + height: 101%; + overflow-x: hidden; + background: #fafafa; +} + +h1 { padding: 12px 10px; padding-bottom: 0; margin: 0; font-size: 1.4em; } +.clear { clear: both; } +.fixed_header { position: fixed; background: #fff; width: 100%; padding-bottom: 10px; margin-top: 0; top: 0; z-index: 9999; height: 70px; } +#search { position: absolute; right: 5px; top: 9px; padding-left: 24px; } +#content.insearch #search, #content.insearch #noresults { background: url(data:image/gif;base64,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) no-repeat center left; } +#full_list { padding: 0; list-style: none; margin-left: 0; margin-top: 80px; font-size: 1.1em; } +#full_list ul { padding: 0; } +#full_list li { padding: 0; margin: 0; list-style: none; } +#full_list li .item { padding: 5px 5px 5px 12px; } +#noresults { padding: 7px 12px; background: #fff; } +#content.insearch #noresults { margin-left: 7px; } +li.collapsed ul { display: none; } +li a.toggle { cursor: default; position: relative; left: -5px; top: 4px; text-indent: -999px; width: 10px; height: 9px; margin-left: -10px; display: block; float: left; background: url(data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAASCAYAAABb0P4QAAAABHNCSVQICAgIfAhkiAAAAAlwSFlzAAAK8AAACvABQqw0mAAAABx0RVh0U29mdHdhcmUAQWRvYmUgRmlyZXdvcmtzIENTM5jWRgMAAAAVdEVYdENyZWF0aW9uIFRpbWUAMy8xNC8wOeNZPpQAAAE2SURBVDiNrZTBccIwEEXfelIAHUA6CZ24BGaWO+FuzZAK4k6gg5QAdGAq+Bxs2Yqx7BzyL7Llp/VfzZeQhCTc/ezuGzKKnKSzpCxXJM8fwNXda3df5RZETlIt6YUzSQDs93sl8w3wBZxCCE10GM1OcWbWjB2mWgEH4Mfdyxm3PSepBHibgQE2wLe7r4HjEidpnXMYdQPKEMJcsZ4zs2POYQOcaPfwMVOo58zsAdMt18BuoVDPxUJRacELbXv3hUIX2vYmOUvi8C8ydz/ThjXrqKqqLbDIAdsCKBd+Wo7GWa7o9qzOQHVVVXeAbs+yHHCH4aTsaCOQqunmUy1yBUAXkdMIfMlgF5EXLo2OpV/c/Up7jG4hhHcYLgWzAZXUc2b2ixsfvc/RmNNfOXD3Q/oeL9axJE1yT9IOoUu6MGUkAAAAAElFTkSuQmCC) no-repeat bottom left; } +li.collapsed a.toggle { opacity: 0.5; cursor: default; background-position: top left; } +li { color: #888; cursor: pointer; } +li.deprecated { text-decoration: line-through; font-style: italic; } +li.odd { background: #f0f0f0; } +li.even { background: #fafafa; } +.item:hover { background: #ddd; } +li small:before { content: "("; } +li small:after { content: ")"; } +li small.search_info { display: none; } +a, a:visited { text-decoration: none; color: #05a; } +li.clicked > .item { background: #05a; color: #ccc; } +li.clicked > .item a, li.clicked > .item a:visited { color: #eee; } +li.clicked > .item a.toggle { opacity: 0.5; background-position: bottom right; } +li.collapsed.clicked a.toggle { background-position: top right; } +#search input { border: 1px solid #bbb; border-radius: 3px; } +#full_list_nav { margin-left: 10px; font-size: 0.9em; display: block; color: #aaa; } +#full_list_nav a, #nav a:visited { color: #358; } +#full_list_nav a:hover { background: transparent; color: #5af; } +#full_list_nav span:after { content: ' | '; } +#full_list_nav span:last-child:after { content: ''; } + +#content h1 { margin-top: 0; } +li { white-space: nowrap; cursor: normal; } +li small { display: block; font-size: 0.8em; } +li small:before { content: ""; } +li small:after { content: ""; } +li small.search_info { display: none; } +#search { width: 170px; position: static; margin: 3px; margin-left: 10px; font-size: 0.9em; color: #888; padding-left: 0; padding-right: 24px; } +#content.insearch #search { background-position: center right; } +#search input { width: 110px; } + +#full_list.insearch ul { display: block; } +#full_list.insearch .item { display: none; } +#full_list.insearch .found { display: block; padding-left: 11px !important; } +#full_list.insearch li a.toggle { display: none; } +#full_list.insearch li small.search_info { display: block; } diff --git a/doc/css/style.css b/doc/css/style.css new file mode 100644 index 0000000..eb0dbc8 --- /dev/null +++ b/doc/css/style.css @@ -0,0 +1,497 @@ +html { + width: 100%; + height: 100%; +} +body { + font-family: "Lucida Sans", "Lucida Grande", Verdana, Arial, sans-serif; + font-size: 13px; + width: 100%; + margin: 0; + padding: 0; + display: flex; + display: -webkit-flex; + display: -ms-flexbox; +} + +#nav { + position: relative; + width: 100%; + height: 100%; + border: 0; + border-right: 1px dotted #eee; + overflow: auto; +} +.nav_wrap { + margin: 0; + padding: 0; + width: 20%; + height: 100%; + position: relative; + display: flex; + display: -webkit-flex; + display: -ms-flexbox; + flex-shrink: 0; + -webkit-flex-shrink: 0; + -ms-flex: 1 0; +} +#resizer { + position: absolute; + right: -5px; + top: 0; + width: 10px; + height: 100%; + cursor: col-resize; + z-index: 9999; +} +#main { + flex: 5 1; + -webkit-flex: 5 1; + -ms-flex: 5 1; + outline: none; + position: relative; + background: #fff; + padding: 1.2em; + padding-top: 0.2em; + box-sizing: border-box; +} + +@media (max-width: 920px) { + .nav_wrap { width: 100%; top: 0; right: 0; overflow: visible; position: absolute; } + #resizer { display: none; } + #nav { + z-index: 9999; + background: #fff; + display: none; + position: absolute; + top: 40px; + right: 12px; + width: 500px; + max-width: 80%; + height: 80%; + overflow-y: scroll; + border: 1px solid #999; + border-collapse: collapse; + box-shadow: -7px 5px 25px #aaa; + border-radius: 2px; + } +} + +@media (min-width: 920px) { + body { height: 100%; overflow: hidden; } + #main { height: 100%; overflow: auto; } + #search { display: none; } +} + +#main img { max-width: 100%; } +h1 { font-size: 25px; margin: 1em 0 0.5em; padding-top: 4px; border-top: 1px dotted #d5d5d5; } +h1.noborder { border-top: 0px; margin-top: 0; padding-top: 4px; } +h1.title { margin-bottom: 10px; } +h1.alphaindex { margin-top: 0; font-size: 22px; } +h2 { + padding: 0; + padding-bottom: 3px; + border-bottom: 1px #aaa solid; + font-size: 1.4em; + margin: 1.8em 0 0.5em; + position: relative; +} +h2 small { font-weight: normal; font-size: 0.7em; display: inline; position: absolute; right: 0; } +h2 small a { + display: block; + height: 20px; + border: 1px solid #aaa; + border-bottom: 0; + border-top-left-radius: 5px; + background: #f8f8f8; + position: relative; + padding: 2px 7px; +} +.clear { clear: both; } +.inline { display: inline; } +.inline p:first-child { display: inline; } +.docstring, .tags, #filecontents { font-size: 15px; line-height: 1.5145em; } +.docstring p > code, .docstring p > tt, .tags p > code, .tags p > tt { + color: #c7254e; background: #f9f2f4; padding: 2px 4px; font-size: 1em; + border-radius: 4px; +} +.docstring h1, .docstring h2, .docstring h3, .docstring h4 { padding: 0; border: 0; border-bottom: 1px dotted #bbb; } +.docstring h1 { font-size: 1.2em; } +.docstring h2 { font-size: 1.1em; } +.docstring h3, .docstring h4 { font-size: 1em; border-bottom: 0; padding-top: 10px; } +.summary_desc .object_link a, .docstring .object_link a { + font-family: monospace; font-size: 1.05em; + color: #05a; background: #EDF4FA; padding: 2px 4px; font-size: 1em; + border-radius: 4px; +} +.rdoc-term { padding-right: 25px; font-weight: bold; } +.rdoc-list p { margin: 0; padding: 0; margin-bottom: 4px; } +.summary_desc pre.code .object_link a, .docstring pre.code .object_link a { + padding: 0px; background: inherit; color: inherit; border-radius: inherit; +} + +/* style for */ +#filecontents table, .docstring table { border-collapse: collapse; } +#filecontents table th, #filecontents table td, +.docstring table th, .docstring table td { border: 1px solid #ccc; padding: 8px; padding-right: 17px; } +#filecontents table tr:nth-child(odd), +.docstring table tr:nth-child(odd) { background: #eee; } +#filecontents table tr:nth-child(even), +.docstring table tr:nth-child(even) { background: #fff; } +#filecontents table th, .docstring table th { background: #fff; } + +/* style for
a",d=q.getElementsByTagName("*"),e=q.getElementsByTagName("a")[0];if(!d||!d.length||!e)return{};g=c.createElement("select"),h=g.appendChild(c.createElement("option")),i=q.getElementsByTagName("input")[0],b={leadingWhitespace:q.firstChild.nodeType===3,tbody:!q.getElementsByTagName("tbody").length,htmlSerialize:!!q.getElementsByTagName("link").length,style:/top/.test(e.getAttribute("style")),hrefNormalized:e.getAttribute("href")==="/a",opacity:/^0.55/.test(e.style.opacity),cssFloat:!!e.style.cssFloat,checkOn:i.value==="on",optSelected:h.selected,getSetAttribute:q.className!=="t",enctype:!!c.createElement("form").enctype,html5Clone:c.createElement("nav").cloneNode(!0).outerHTML!=="<:nav>",submitBubbles:!0,changeBubbles:!0,focusinBubbles:!1,deleteExpando:!0,noCloneEvent:!0,inlineBlockNeedsLayout:!1,shrinkWrapBlocks:!1,reliableMarginRight:!0},i.checked=!0,b.noCloneChecked=i.cloneNode(!0).checked,g.disabled=!0,b.optDisabled=!h.disabled;try{delete q.test}catch(s){b.deleteExpando=!1}!q.addEventListener&&q.attachEvent&&q.fireEvent&&(q.attachEvent("onclick",function(){b.noCloneEvent=!1}),q.cloneNode(!0).fireEvent("onclick")),i=c.createElement("input"),i.value="t",i.setAttribute("type","radio"),b.radioValue=i.value==="t",i.setAttribute("checked","checked"),q.appendChild(i),k=c.createDocumentFragment(),k.appendChild(q.lastChild),b.checkClone=k.cloneNode(!0).cloneNode(!0).lastChild.checked,b.appendChecked=i.checked,k.removeChild(i),k.appendChild(q),q.innerHTML="",a.getComputedStyle&&(j=c.createElement("div"),j.style.width="0",j.style.marginRight="0",q.style.width="2px",q.appendChild(j),b.reliableMarginRight=(parseInt((a.getComputedStyle(j,null)||{marginRight:0}).marginRight,10)||0)===0);if(q.attachEvent)for(o in{submit:1,change:1,focusin:1})n="on"+o,p=n in q,p||(q.setAttribute(n,"return;"),p=typeof q[n]=="function"),b[o+"Bubbles"]=p;k.removeChild(q),k=g=h=j=q=i=null,f(function(){var a,d,e,g,h,i,j,k,m,n,o,r=c.getElementsByTagName("body")[0];!r||(j=1,k="position:absolute;top:0;left:0;width:1px;height:1px;margin:0;",m="visibility:hidden;border:0;",n="style='"+k+"border:5px solid #000;padding:0;'",o="
"+""+"
",a=c.createElement("div"),a.style.cssText=m+"width:0;height:0;position:static;top:0;margin-top:"+j+"px",r.insertBefore(a,r.firstChild),q=c.createElement("div"),a.appendChild(q),q.innerHTML="
t
",l=q.getElementsByTagName("td"),p=l[0].offsetHeight===0,l[0].style.display="",l[1].style.display="none",b.reliableHiddenOffsets=p&&l[0].offsetHeight===0,q.innerHTML="",q.style.width=q.style.paddingLeft="1px",f.boxModel=b.boxModel=q.offsetWidth===2,typeof q.style.zoom!="undefined"&&(q.style.display="inline",q.style.zoom=1,b.inlineBlockNeedsLayout=q.offsetWidth===2,q.style.display="",q.innerHTML="
",b.shrinkWrapBlocks=q.offsetWidth!==2),q.style.cssText=k+m,q.innerHTML=o,d=q.firstChild,e=d.firstChild,h=d.nextSibling.firstChild.firstChild,i={doesNotAddBorder:e.offsetTop!==5,doesAddBorderForTableAndCells:h.offsetTop===5},e.style.position="fixed",e.style.top="20px",i.fixedPosition=e.offsetTop===20||e.offsetTop===15,e.style.position=e.style.top="",d.style.overflow="hidden",d.style.position="relative",i.subtractsBorderForOverflowNotVisible=e.offsetTop===-5,i.doesNotIncludeMarginInBodyOffset=r.offsetTop!==j,r.removeChild(a),q=a=null,f.extend(b,i))});return b}();var j=/^(?:\{.*\}|\[.*\])$/,k=/([A-Z])/g;f.extend({cache:{},uuid:0,expando:"jQuery"+(f.fn.jquery+Math.random()).replace(/\D/g,""),noData:{embed:!0,object:"clsid:D27CDB6E-AE6D-11cf-96B8-444553540000",applet:!0},hasData:function(a){a=a.nodeType?f.cache[a[f.expando]]:a[f.expando];return!!a&&!m(a)},data:function(a,c,d,e){if(!!f.acceptData(a)){var g,h,i,j=f.expando,k=typeof c=="string",l=a.nodeType,m=l?f.cache:a,n=l?a[j]:a[j]&&j,o=c==="events";if((!n||!m[n]||!o&&!e&&!m[n].data)&&k&&d===b)return;n||(l?a[j]=n=++f.uuid:n=j),m[n]||(m[n]={},l||(m[n].toJSON=f.noop));if(typeof c=="object"||typeof c=="function")e?m[n]=f.extend(m[n],c):m[n].data=f.extend(m[n].data,c);g=h=m[n],e||(h.data||(h.data={}),h=h.data),d!==b&&(h[f.camelCase(c)]=d);if(o&&!h[c])return g.events;k?(i=h[c],i==null&&(i=h[f.camelCase(c)])):i=h;return i}},removeData:function(a,b,c){if(!!f.acceptData(a)){var d,e,g,h=f.expando,i=a.nodeType,j=i?f.cache:a,k=i?a[h]:h;if(!j[k])return;if(b){d=c?j[k]:j[k].data;if(d){f.isArray(b)||(b in d?b=[b]:(b=f.camelCase(b),b in d?b=[b]:b=b.split(" ")));for(e=0,g=b.length;e-1)return!0;return!1},val:function(a){var c,d,e,g=this[0];{if(!!arguments.length){e=f.isFunction(a);return this.each(function(d){var g=f(this),h;if(this.nodeType===1){e?h=a.call(this,d,g.val()):h=a,h==null?h="":typeof h=="number"?h+="":f.isArray(h)&&(h=f.map(h,function(a){return a==null?"":a+""})),c=f.valHooks[this.nodeName.toLowerCase()]||f.valHooks[this.type];if(!c||!("set"in c)||c.set(this,h,"value")===b)this.value=h}})}if(g){c=f.valHooks[g.nodeName.toLowerCase()]||f.valHooks[g.type];if(c&&"get"in c&&(d=c.get(g,"value"))!==b)return d;d=g.value;return typeof d=="string"?d.replace(q,""):d==null?"":d}}}}),f.extend({valHooks:{option:{get:function(a){var b=a.attributes.value;return!b||b.specified?a.value:a.text}},select:{get:function(a){var b,c,d,e,g=a.selectedIndex,h=[],i=a.options,j=a.type==="select-one";if(g<0)return null;c=j?g:0,d=j?g+1:i.length;for(;c=0}),c.length||(a.selectedIndex=-1);return c}}},attrFn:{val:!0,css:!0,html:!0,text:!0,data:!0,width:!0,height:!0,offset:!0},attr:function(a,c,d,e){var g,h,i,j=a.nodeType;if(!!a&&j!==3&&j!==8&&j!==2){if(e&&c in f.attrFn)return f(a)[c](d);if(typeof a.getAttribute=="undefined")return f.prop(a,c,d);i=j!==1||!f.isXMLDoc(a),i&&(c=c.toLowerCase(),h=f.attrHooks[c]||(u.test(c)?x:w));if(d!==b){if(d===null){f.removeAttr(a,c);return}if(h&&"set"in h&&i&&(g=h.set(a,d,c))!==b)return g;a.setAttribute(c,""+d);return d}if(h&&"get"in h&&i&&(g=h.get(a,c))!==null)return g;g=a.getAttribute(c);return g===null?b:g}},removeAttr:function(a,b){var c,d,e,g,h=0;if(b&&a.nodeType===1){d=b.toLowerCase().split(p),g=d.length;for(;h=0}})});var z=/^(?:textarea|input|select)$/i,A=/^([^\.]*)?(?:\.(.+))?$/,B=/\bhover(\.\S+)?\b/,C=/^key/,D=/^(?:mouse|contextmenu)|click/,E=/^(?:focusinfocus|focusoutblur)$/,F=/^(\w*)(?:#([\w\-]+))?(?:\.([\w\-]+))?$/,G=function(a){var b=F.exec(a);b&&(b[1]=(b[1]||"").toLowerCase(),b[3]=b[3]&&new RegExp("(?:^|\\s)"+b[3]+"(?:\\s|$)"));return b},H=function(a,b){var c=a.attributes||{};return(!b[1]||a.nodeName.toLowerCase()===b[1])&&(!b[2]||(c.id||{}).value===b[2])&&(!b[3]||b[3].test((c["class"]||{}).value))},I=function(a){return f.event.special.hover?a:a.replace(B,"mouseenter$1 mouseleave$1")}; +f.event={add:function(a,c,d,e,g){var h,i,j,k,l,m,n,o,p,q,r,s;if(!(a.nodeType===3||a.nodeType===8||!c||!d||!(h=f._data(a)))){d.handler&&(p=d,d=p.handler),d.guid||(d.guid=f.guid++),j=h.events,j||(h.events=j={}),i=h.handle,i||(h.handle=i=function(a){return typeof f!="undefined"&&(!a||f.event.triggered!==a.type)?f.event.dispatch.apply(i.elem,arguments):b},i.elem=a),c=f.trim(I(c)).split(" ");for(k=0;k=0&&(h=h.slice(0,-1),k=!0),h.indexOf(".")>=0&&(i=h.split("."),h=i.shift(),i.sort());if((!e||f.event.customEvent[h])&&!f.event.global[h])return;c=typeof c=="object"?c[f.expando]?c:new f.Event(h,c):new f.Event(h),c.type=h,c.isTrigger=!0,c.exclusive=k,c.namespace=i.join("."),c.namespace_re=c.namespace?new RegExp("(^|\\.)"+i.join("\\.(?:.*\\.)?")+"(\\.|$)"):null,o=h.indexOf(":")<0?"on"+h:"";if(!e){j=f.cache;for(l in j)j[l].events&&j[l].events[h]&&f.event.trigger(c,d,j[l].handle.elem,!0);return}c.result=b,c.target||(c.target=e),d=d!=null?f.makeArray(d):[],d.unshift(c),p=f.event.special[h]||{};if(p.trigger&&p.trigger.apply(e,d)===!1)return;r=[[e,p.bindType||h]];if(!g&&!p.noBubble&&!f.isWindow(e)){s=p.delegateType||h,m=E.test(s+h)?e:e.parentNode,n=null;for(;m;m=m.parentNode)r.push([m,s]),n=m;n&&n===e.ownerDocument&&r.push([n.defaultView||n.parentWindow||a,s])}for(l=0;le&&i.push({elem:this,matches:d.slice(e)});for(j=0;j0?this.on(b,null,a,c):this.trigger(b)},f.attrFn&&(f.attrFn[b]=!0),C.test(b)&&(f.event.fixHooks[b]=f.event.keyHooks),D.test(b)&&(f.event.fixHooks[b]=f.event.mouseHooks)}),function(){function x(a,b,c,e,f,g){for(var h=0,i=e.length;h0){k=j;break}}j=j[a]}e[h]=k}}}function w(a,b,c,e,f,g){for(var h=0,i=e.length;h+~,(\[\\]+)+|[>+~])(\s*,\s*)?((?:.|\r|\n)*)/g,d="sizcache"+(Math.random()+"").replace(".",""),e=0,g=Object.prototype.toString,h=!1,i=!0,j=/\\/g,k=/\r\n/g,l=/\W/;[0,0].sort(function(){i=!1;return 0});var m=function(b,d,e,f){e=e||[],d=d||c;var h=d;if(d.nodeType!==1&&d.nodeType!==9)return[];if(!b||typeof b!="string")return e;var i,j,k,l,n,q,r,t,u=!0,v=m.isXML(d),w=[],x=b;do{a.exec(""),i=a.exec(x);if(i){x=i[3],w.push(i[1]);if(i[2]){l=i[3];break}}}while(i);if(w.length>1&&p.exec(b))if(w.length===2&&o.relative[w[0]])j=y(w[0]+w[1],d,f);else{j=o.relative[w[0]]?[d]:m(w.shift(),d);while(w.length)b=w.shift(),o.relative[b]&&(b+=w.shift()),j=y(b,j,f)}else{!f&&w.length>1&&d.nodeType===9&&!v&&o.match.ID.test(w[0])&&!o.match.ID.test(w[w.length-1])&&(n=m.find(w.shift(),d,v),d=n.expr?m.filter(n.expr,n.set)[0]:n.set[0]);if(d){n=f?{expr:w.pop(),set:s(f)}:m.find(w.pop(),w.length===1&&(w[0]==="~"||w[0]==="+")&&d.parentNode?d.parentNode:d,v),j=n.expr?m.filter(n.expr,n.set):n.set,w.length>0?k=s(j):u=!1;while(w.length)q=w.pop(),r=q,o.relative[q]?r=w.pop():q="",r==null&&(r=d),o.relative[q](k,r,v)}else k=w=[]}k||(k=j),k||m.error(q||b);if(g.call(k)==="[object Array]")if(!u)e.push.apply(e,k);else if(d&&d.nodeType===1)for(t=0;k[t]!=null;t++)k[t]&&(k[t]===!0||k[t].nodeType===1&&m.contains(d,k[t]))&&e.push(j[t]);else for(t=0;k[t]!=null;t++)k[t]&&k[t].nodeType===1&&e.push(j[t]);else s(k,e);l&&(m(l,h,e,f),m.uniqueSort(e));return e};m.uniqueSort=function(a){if(u){h=i,a.sort(u);if(h)for(var b=1;b0},m.find=function(a,b,c){var d,e,f,g,h,i;if(!a)return[];for(e=0,f=o.order.length;e":function(a,b){var c,d=typeof b=="string",e=0,f=a.length;if(d&&!l.test(b)){b=b.toLowerCase();for(;e=0)?c||d.push(h):c&&(b[g]=!1));return!1},ID:function(a){return a[1].replace(j,"")},TAG:function(a,b){return a[1].replace(j,"").toLowerCase()},CHILD:function(a){if(a[1]==="nth"){a[2]||m.error(a[0]),a[2]=a[2].replace(/^\+|\s*/g,"");var b=/(-?)(\d*)(?:n([+\-]?\d*))?/.exec(a[2]==="even"&&"2n"||a[2]==="odd"&&"2n+1"||!/\D/.test(a[2])&&"0n+"+a[2]||a[2]);a[2]=b[1]+(b[2]||1)-0,a[3]=b[3]-0}else a[2]&&m.error(a[0]);a[0]=e++;return a},ATTR:function(a,b,c,d,e,f){var g=a[1]=a[1].replace(j,"");!f&&o.attrMap[g]&&(a[1]=o.attrMap[g]),a[4]=(a[4]||a[5]||"").replace(j,""),a[2]==="~="&&(a[4]=" "+a[4]+" ");return a},PSEUDO:function(b,c,d,e,f){if(b[1]==="not")if((a.exec(b[3])||"").length>1||/^\w/.test(b[3]))b[3]=m(b[3],null,null,c);else{var g=m.filter(b[3],c,d,!0^f);d||e.push.apply(e,g);return!1}else if(o.match.POS.test(b[0])||o.match.CHILD.test(b[0]))return!0;return b},POS:function(a){a.unshift(!0);return a}},filters:{enabled:function(a){return a.disabled===!1&&a.type!=="hidden"},disabled:function(a){return a.disabled===!0},checked:function(a){return a.checked===!0},selected:function(a){a.parentNode&&a.parentNode.selectedIndex;return a.selected===!0},parent:function(a){return!!a.firstChild},empty:function(a){return!a.firstChild},has:function(a,b,c){return!!m(c[3],a).length},header:function(a){return/h\d/i.test(a.nodeName)},text:function(a){var b=a.getAttribute("type"),c=a.type;return a.nodeName.toLowerCase()==="input"&&"text"===c&&(b===c||b===null)},radio:function(a){return a.nodeName.toLowerCase()==="input"&&"radio"===a.type},checkbox:function(a){return a.nodeName.toLowerCase()==="input"&&"checkbox"===a.type},file:function(a){return a.nodeName.toLowerCase()==="input"&&"file"===a.type},password:function(a){return a.nodeName.toLowerCase()==="input"&&"password"===a.type},submit:function(a){var b=a.nodeName.toLowerCase();return(b==="input"||b==="button")&&"submit"===a.type},image:function(a){return a.nodeName.toLowerCase()==="input"&&"image"===a.type},reset:function(a){var b=a.nodeName.toLowerCase();return(b==="input"||b==="button")&&"reset"===a.type},button:function(a){var b=a.nodeName.toLowerCase();return b==="input"&&"button"===a.type||b==="button"},input:function(a){return/input|select|textarea|button/i.test(a.nodeName)},focus:function(a){return a===a.ownerDocument.activeElement}},setFilters:{first:function(a,b){return b===0},last:function(a,b,c,d){return b===d.length-1},even:function(a,b){return b%2===0},odd:function(a,b){return b%2===1},lt:function(a,b,c){return bc[3]-0},nth:function(a,b,c){return c[3]-0===b},eq:function(a,b,c){return c[3]-0===b}},filter:{PSEUDO:function(a,b,c,d){var e=b[1],f=o.filters[e];if(f)return f(a,c,b,d);if(e==="contains")return(a.textContent||a.innerText||n([a])||"").indexOf(b[3])>=0;if(e==="not"){var g=b[3];for(var h=0,i=g.length;h=0}},ID:function(a,b){return a.nodeType===1&&a.getAttribute("id")===b},TAG:function(a,b){return b==="*"&&a.nodeType===1||!!a.nodeName&&a.nodeName.toLowerCase()===b},CLASS:function(a,b){return(" "+(a.className||a.getAttribute("class"))+" ").indexOf(b)>-1},ATTR:function(a,b){var c=b[1],d=m.attr?m.attr(a,c):o.attrHandle[c]?o.attrHandle[c](a):a[c]!=null?a[c]:a.getAttribute(c),e=d+"",f=b[2],g=b[4];return d==null?f==="!=":!f&&m.attr?d!=null:f==="="?e===g:f==="*="?e.indexOf(g)>=0:f==="~="?(" "+e+" ").indexOf(g)>=0:g?f==="!="?e!==g:f==="^="?e.indexOf(g)===0:f==="$="?e.substr(e.length-g.length)===g:f==="|="?e===g||e.substr(0,g.length+1)===g+"-":!1:e&&d!==!1},POS:function(a,b,c,d){var e=b[2],f=o.setFilters[e];if(f)return f(a,c,b,d)}}},p=o.match.POS,q=function(a,b){return"\\"+(b-0+1)};for(var r in o.match)o.match[r]=new RegExp(o.match[r].source+/(?![^\[]*\])(?![^\(]*\))/.source),o.leftMatch[r]=new RegExp(/(^(?:.|\r|\n)*?)/.source+o.match[r].source.replace(/\\(\d+)/g,q));var s=function(a,b){a=Array.prototype.slice.call(a,0);if(b){b.push.apply(b,a);return b}return a};try{Array.prototype.slice.call(c.documentElement.childNodes,0)[0].nodeType}catch(t){s=function(a,b){var c=0,d=b||[];if(g.call(a)==="[object Array]")Array.prototype.push.apply(d,a);else if(typeof a.length=="number")for(var e=a.length;c",e.insertBefore(a,e.firstChild),c.getElementById(d)&&(o.find.ID=function(a,c,d){if(typeof c.getElementById!="undefined"&&!d){var e=c.getElementById(a[1]);return e?e.id===a[1]||typeof e.getAttributeNode!="undefined"&&e.getAttributeNode("id").nodeValue===a[1]?[e]:b:[]}},o.filter.ID=function(a,b){var c=typeof a.getAttributeNode!="undefined"&&a.getAttributeNode("id");return a.nodeType===1&&c&&c.nodeValue===b}),e.removeChild(a),e=a=null}(),function(){var a=c.createElement("div");a.appendChild(c.createComment("")),a.getElementsByTagName("*").length>0&&(o.find.TAG=function(a,b){var c=b.getElementsByTagName(a[1]);if(a[1]==="*"){var d=[];for(var e=0;c[e];e++)c[e].nodeType===1&&d.push(c[e]);c=d}return c}),a.innerHTML="",a.firstChild&&typeof a.firstChild.getAttribute!="undefined"&&a.firstChild.getAttribute("href")!=="#"&&(o.attrHandle.href=function(a){return a.getAttribute("href",2)}),a=null}(),c.querySelectorAll&&function(){var a=m,b=c.createElement("div"),d="__sizzle__";b.innerHTML="

";if(!b.querySelectorAll||b.querySelectorAll(".TEST").length!==0){m=function(b,e,f,g){e=e||c;if(!g&&!m.isXML(e)){var h=/^(\w+$)|^\.([\w\-]+$)|^#([\w\-]+$)/.exec(b);if(h&&(e.nodeType===1||e.nodeType===9)){if(h[1])return s(e.getElementsByTagName(b),f);if(h[2]&&o.find.CLASS&&e.getElementsByClassName)return s(e.getElementsByClassName(h[2]),f)}if(e.nodeType===9){if(b==="body"&&e.body)return s([e.body],f);if(h&&h[3]){var i=e.getElementById(h[3]);if(!i||!i.parentNode)return s([],f);if(i.id===h[3])return s([i],f)}try{return s(e.querySelectorAll(b),f)}catch(j){}}else if(e.nodeType===1&&e.nodeName.toLowerCase()!=="object"){var k=e,l=e.getAttribute("id"),n=l||d,p=e.parentNode,q=/^\s*[+~]/.test(b);l?n=n.replace(/'/g,"\\$&"):e.setAttribute("id",n),q&&p&&(e=e.parentNode);try{if(!q||p)return s(e.querySelectorAll("[id='"+n+"'] "+b),f)}catch(r){}finally{l||k.removeAttribute("id")}}}return a(b,e,f,g)};for(var e in a)m[e]=a[e];b=null}}(),function(){var a=c.documentElement,b=a.matchesSelector||a.mozMatchesSelector||a.webkitMatchesSelector||a.msMatchesSelector;if(b){var d=!b.call(c.createElement("div"),"div"),e=!1;try{b.call(c.documentElement,"[test!='']:sizzle")}catch(f){e=!0}m.matchesSelector=function(a,c){c=c.replace(/\=\s*([^'"\]]*)\s*\]/g,"='$1']");if(!m.isXML(a))try{if(e||!o.match.PSEUDO.test(c)&&!/!=/.test(c)){var f=b.call(a,c);if(f||!d||a.document&&a.document.nodeType!==11)return f}}catch(g){}return m(c,null,null,[a]).length>0}}}(),function(){var a=c.createElement("div");a.innerHTML="
";if(!!a.getElementsByClassName&&a.getElementsByClassName("e").length!==0){a.lastChild.className="e";if(a.getElementsByClassName("e").length===1)return;o.order.splice(1,0,"CLASS"),o.find.CLASS=function(a,b,c){if(typeof b.getElementsByClassName!="undefined"&&!c)return b.getElementsByClassName(a[1])},a=null}}(),c.documentElement.contains?m.contains=function(a,b){return a!==b&&(a.contains?a.contains(b):!0)}:c.documentElement.compareDocumentPosition?m.contains=function(a,b){return!!(a.compareDocumentPosition(b)&16)}:m.contains=function(){return!1},m.isXML=function(a){var b=(a?a.ownerDocument||a:0).documentElement;return b?b.nodeName!=="HTML":!1};var y=function(a,b,c){var d,e=[],f="",g=b.nodeType?[b]:b;while(d=o.match.PSEUDO.exec(a))f+=d[0],a=a.replace(o.match.PSEUDO,"");a=o.relative[a]?a+"*":a;for(var h=0,i=g.length;h0)for(h=g;h=0:f.filter(a,this).length>0:this.filter(a).length>0)},closest:function(a,b){var c=[],d,e,g=this[0];if(f.isArray(a)){var h=1;while(g&&g.ownerDocument&&g!==b){for(d=0;d-1:f.find.matchesSelector(g,a)){c.push(g);break}g=g.parentNode;if(!g||!g.ownerDocument||g===b||g.nodeType===11)break}}c=c.length>1?f.unique(c):c;return this.pushStack(c,"closest",a)},index:function(a){if(!a)return this[0]&&this[0].parentNode?this.prevAll().length:-1;if(typeof a=="string")return f.inArray(this[0],f(a));return f.inArray(a.jquery?a[0]:a,this)},add:function(a,b){var c=typeof a=="string"?f(a,b):f.makeArray(a&&a.nodeType?[a]:a),d=f.merge(this.get(),c);return this.pushStack(S(c[0])||S(d[0])?d:f.unique(d))},andSelf:function(){return this.add(this.prevObject)}}),f.each({parent:function(a){var b=a.parentNode;return b&&b.nodeType!==11?b:null},parents:function(a){return f.dir(a,"parentNode")},parentsUntil:function(a,b,c){return f.dir(a,"parentNode",c)},next:function(a){return f.nth(a,2,"nextSibling")},prev:function(a){return f.nth(a,2,"previousSibling")},nextAll:function(a){return f.dir(a,"nextSibling")},prevAll:function(a){return f.dir(a,"previousSibling")},nextUntil:function(a,b,c){return f.dir(a,"nextSibling",c)},prevUntil:function(a,b,c){return f.dir(a,"previousSibling",c)},siblings:function(a){return f.sibling(a.parentNode.firstChild,a)},children:function(a){return f.sibling(a.firstChild)},contents:function(a){return f.nodeName(a,"iframe")?a.contentDocument||a.contentWindow.document:f.makeArray(a.childNodes)}},function(a,b){f.fn[a]=function(c,d){var e=f.map(this,b,c);L.test(a)||(d=c),d&&typeof d=="string"&&(e=f.filter(d,e)),e=this.length>1&&!R[a]?f.unique(e):e,(this.length>1||N.test(d))&&M.test(a)&&(e=e.reverse());return this.pushStack(e,a,P.call(arguments).join(","))}}),f.extend({filter:function(a,b,c){c&&(a=":not("+a+")");return b.length===1?f.find.matchesSelector(b[0],a)?[b[0]]:[]:f.find.matches(a,b)},dir:function(a,c,d){var e=[],g=a[c];while(g&&g.nodeType!==9&&(d===b||g.nodeType!==1||!f(g).is(d)))g.nodeType===1&&e.push(g),g=g[c];return e},nth:function(a,b,c,d){b=b||1;var e=0;for(;a;a=a[c])if(a.nodeType===1&&++e===b)break;return a},sibling:function(a,b){var c=[];for(;a;a=a.nextSibling)a.nodeType===1&&a!==b&&c.push(a);return c}});var V="abbr|article|aside|audio|canvas|datalist|details|figcaption|figure|footer|header|hgroup|mark|meter|nav|output|progress|section|summary|time|video",W=/ jQuery\d+="(?:\d+|null)"/g,X=/^\s+/,Y=/<(?!area|br|col|embed|hr|img|input|link|meta|param)(([\w:]+)[^>]*)\/>/ig,Z=/<([\w:]+)/,$=/",""],legend:[1,"
","
"],thead:[1,"","
"],tr:[2,"","
"],td:[3,"","
"],col:[2,"","
"],area:[1,"",""],_default:[0,"",""]},bh=U(c);bg.optgroup=bg.option,bg.tbody=bg.tfoot=bg.colgroup=bg.caption=bg.thead,bg.th=bg.td,f.support.htmlSerialize||(bg._default=[1,"div
","
"]),f.fn.extend({text:function(a){if(f.isFunction(a))return this.each(function(b){var c=f(this);c.text(a.call(this,b,c.text()))});if(typeof a!="object"&&a!==b)return this.empty().append((this[0]&&this[0].ownerDocument||c).createTextNode(a));return f.text(this)},wrapAll:function(a){if(f.isFunction(a))return this.each(function(b){f(this).wrapAll(a.call(this,b))});if(this[0]){var b=f(a,this[0].ownerDocument).eq(0).clone(!0);this[0].parentNode&&b.insertBefore(this[0]),b.map(function(){var a=this;while(a.firstChild&&a.firstChild.nodeType===1)a=a.firstChild;return a}).append(this)}return this},wrapInner:function(a){if(f.isFunction(a))return this.each(function(b){f(this).wrapInner(a.call(this,b))});return this.each(function(){var b=f(this),c=b.contents();c.length?c.wrapAll(a):b.append(a)})},wrap:function(a){var b=f.isFunction(a);return this.each(function(c){f(this).wrapAll(b?a.call(this,c):a)})},unwrap:function(){return this.parent().each(function(){f.nodeName(this,"body")||f(this).replaceWith(this.childNodes)}).end()},append:function(){return this.domManip(arguments,!0,function(a){this.nodeType===1&&this.appendChild(a)})},prepend:function(){return this.domManip(arguments,!0,function(a){this.nodeType===1&&this.insertBefore(a,this.firstChild)})},before:function(){if(this[0]&&this[0].parentNode)return this.domManip(arguments,!1,function(a){this.parentNode.insertBefore(a,this)});if(arguments.length){var a=f.clean(arguments);a.push.apply(a,this.toArray());return this.pushStack(a,"before",arguments)}},after:function(){if(this[0]&&this[0].parentNode)return this.domManip(arguments,!1,function(a){this.parentNode.insertBefore(a,this.nextSibling)});if(arguments.length){var a=this.pushStack(this,"after",arguments);a.push.apply(a,f.clean(arguments));return a}},remove:function(a,b){for(var c=0,d;(d=this[c])!=null;c++)if(!a||f.filter(a,[d]).length)!b&&d.nodeType===1&&(f.cleanData(d.getElementsByTagName("*")),f.cleanData([d])),d.parentNode&&d.parentNode.removeChild(d);return this},empty:function() +{for(var a=0,b;(b=this[a])!=null;a++){b.nodeType===1&&f.cleanData(b.getElementsByTagName("*"));while(b.firstChild)b.removeChild(b.firstChild)}return this},clone:function(a,b){a=a==null?!1:a,b=b==null?a:b;return this.map(function(){return f.clone(this,a,b)})},html:function(a){if(a===b)return this[0]&&this[0].nodeType===1?this[0].innerHTML.replace(W,""):null;if(typeof a=="string"&&!ba.test(a)&&(f.support.leadingWhitespace||!X.test(a))&&!bg[(Z.exec(a)||["",""])[1].toLowerCase()]){a=a.replace(Y,"<$1>");try{for(var c=0,d=this.length;c1&&l0?this.clone(!0):this).get();f(e[h])[b](j),d=d.concat(j)}return this.pushStack(d,a,e.selector)}}),f.extend({clone:function(a,b,c){var d,e,g,h=f.support.html5Clone||!bc.test("<"+a.nodeName)?a.cloneNode(!0):bo(a);if((!f.support.noCloneEvent||!f.support.noCloneChecked)&&(a.nodeType===1||a.nodeType===11)&&!f.isXMLDoc(a)){bk(a,h),d=bl(a),e=bl(h);for(g=0;d[g];++g)e[g]&&bk(d[g],e[g])}if(b){bj(a,h);if(c){d=bl(a),e=bl(h);for(g=0;d[g];++g)bj(d[g],e[g])}}d=e=null;return h},clean:function(a,b,d,e){var g;b=b||c,typeof b.createElement=="undefined"&&(b=b.ownerDocument||b[0]&&b[0].ownerDocument||c);var h=[],i;for(var j=0,k;(k=a[j])!=null;j++){typeof k=="number"&&(k+="");if(!k)continue;if(typeof k=="string")if(!_.test(k))k=b.createTextNode(k);else{k=k.replace(Y,"<$1>");var l=(Z.exec(k)||["",""])[1].toLowerCase(),m=bg[l]||bg._default,n=m[0],o=b.createElement("div");b===c?bh.appendChild(o):U(b).appendChild(o),o.innerHTML=m[1]+k+m[2];while(n--)o=o.lastChild;if(!f.support.tbody){var p=$.test(k),q=l==="table"&&!p?o.firstChild&&o.firstChild.childNodes:m[1]===""&&!p?o.childNodes:[];for(i=q.length-1;i>=0;--i)f.nodeName(q[i],"tbody")&&!q[i].childNodes.length&&q[i].parentNode.removeChild(q[i])}!f.support.leadingWhitespace&&X.test(k)&&o.insertBefore(b.createTextNode(X.exec(k)[0]),o.firstChild),k=o.childNodes}var r;if(!f.support.appendChecked)if(k[0]&&typeof (r=k.length)=="number")for(i=0;i=0)return b+"px"}}}),f.support.opacity||(f.cssHooks.opacity={get:function(a,b){return br.test((b&&a.currentStyle?a.currentStyle.filter:a.style.filter)||"")?parseFloat(RegExp.$1)/100+"":b?"1":""},set:function(a,b){var c=a.style,d=a.currentStyle,e=f.isNumeric(b)?"alpha(opacity="+b*100+")":"",g=d&&d.filter||c.filter||"";c.zoom=1;if(b>=1&&f.trim(g.replace(bq,""))===""){c.removeAttribute("filter");if(d&&!d.filter)return}c.filter=bq.test(g)?g.replace(bq,e):g+" "+e}}),f(function(){f.support.reliableMarginRight||(f.cssHooks.marginRight={get:function(a,b){var c;f.swap(a,{display:"inline-block"},function(){b?c=bz(a,"margin-right","marginRight"):c=a.style.marginRight});return c}})}),c.defaultView&&c.defaultView.getComputedStyle&&(bA=function(a,b){var c,d,e;b=b.replace(bs,"-$1").toLowerCase(),(d=a.ownerDocument.defaultView)&&(e=d.getComputedStyle(a,null))&&(c=e.getPropertyValue(b),c===""&&!f.contains(a.ownerDocument.documentElement,a)&&(c=f.style(a,b)));return c}),c.documentElement.currentStyle&&(bB=function(a,b){var c,d,e,f=a.currentStyle&&a.currentStyle[b],g=a.style;f===null&&g&&(e=g[b])&&(f=e),!bt.test(f)&&bu.test(f)&&(c=g.left,d=a.runtimeStyle&&a.runtimeStyle.left,d&&(a.runtimeStyle.left=a.currentStyle.left),g.left=b==="fontSize"?"1em":f||0,f=g.pixelLeft+"px",g.left=c,d&&(a.runtimeStyle.left=d));return f===""?"auto":f}),bz=bA||bB,f.expr&&f.expr.filters&&(f.expr.filters.hidden=function(a){var b=a.offsetWidth,c=a.offsetHeight;return b===0&&c===0||!f.support.reliableHiddenOffsets&&(a.style&&a.style.display||f.css(a,"display"))==="none"},f.expr.filters.visible=function(a){return!f.expr.filters.hidden(a)});var bD=/%20/g,bE=/\[\]$/,bF=/\r?\n/g,bG=/#.*$/,bH=/^(.*?):[ \t]*([^\r\n]*)\r?$/mg,bI=/^(?:color|date|datetime|datetime-local|email|hidden|month|number|password|range|search|tel|text|time|url|week)$/i,bJ=/^(?:about|app|app\-storage|.+\-extension|file|res|widget):$/,bK=/^(?:GET|HEAD)$/,bL=/^\/\//,bM=/\?/,bN=/)<[^<]*)*<\/script>/gi,bO=/^(?:select|textarea)/i,bP=/\s+/,bQ=/([?&])_=[^&]*/,bR=/^([\w\+\.\-]+:)(?:\/\/([^\/?#:]*)(?::(\d+))?)?/,bS=f.fn.load,bT={},bU={},bV,bW,bX=["*/"]+["*"];try{bV=e.href}catch(bY){bV=c.createElement("a"),bV.href="",bV=bV.href}bW=bR.exec(bV.toLowerCase())||[],f.fn.extend({load:function(a,c,d){if(typeof a!="string"&&bS)return bS.apply(this,arguments);if(!this.length)return this;var e=a.indexOf(" ");if(e>=0){var g=a.slice(e,a.length);a=a.slice(0,e)}var h="GET";c&&(f.isFunction(c)?(d=c,c=b):typeof c=="object"&&(c=f.param(c,f.ajaxSettings.traditional),h="POST"));var i=this;f.ajax({url:a,type:h,dataType:"html",data:c,complete:function(a,b,c){c=a.responseText,a.isResolved()&&(a.done(function(a){c=a}),i.html(g?f("
").append(c.replace(bN,"")).find(g):c)),d&&i.each(d,[c,b,a])}});return this},serialize:function(){return f.param(this.serializeArray())},serializeArray:function(){return this.map(function(){return this.elements?f.makeArray(this.elements):this}).filter(function(){return this.name&&!this.disabled&&(this.checked||bO.test(this.nodeName)||bI.test(this.type))}).map(function(a,b){var c=f(this).val();return c==null?null:f.isArray(c)?f.map(c,function(a,c){return{name:b.name,value:a.replace(bF,"\r\n")}}):{name:b.name,value:c.replace(bF,"\r\n")}}).get()}}),f.each("ajaxStart ajaxStop ajaxComplete ajaxError ajaxSuccess ajaxSend".split(" "),function(a,b){f.fn[b]=function(a){return this.on(b,a)}}),f.each(["get","post"],function(a,c){f[c]=function(a,d,e,g){f.isFunction(d)&&(g=g||e,e=d,d=b);return f.ajax({type:c,url:a,data:d,success:e,dataType:g})}}),f.extend({getScript:function(a,c){return f.get(a,b,c,"script")},getJSON:function(a,b,c){return f.get(a,b,c,"json")},ajaxSetup:function(a,b){b?b_(a,f.ajaxSettings):(b=a,a=f.ajaxSettings),b_(a,b);return a},ajaxSettings:{url:bV,isLocal:bJ.test(bW[1]),global:!0,type:"GET",contentType:"application/x-www-form-urlencoded",processData:!0,async:!0,accepts:{xml:"application/xml, text/xml",html:"text/html",text:"text/plain",json:"application/json, text/javascript","*":bX},contents:{xml:/xml/,html:/html/,json:/json/},responseFields:{xml:"responseXML",text:"responseText"},converters:{"* text":a.String,"text html":!0,"text json":f.parseJSON,"text xml":f.parseXML},flatOptions:{context:!0,url:!0}},ajaxPrefilter:bZ(bT),ajaxTransport:bZ(bU),ajax:function(a,c){function w(a,c,l,m){if(s!==2){s=2,q&&clearTimeout(q),p=b,n=m||"",v.readyState=a>0?4:0;var o,r,u,w=c,x=l?cb(d,v,l):b,y,z;if(a>=200&&a<300||a===304){if(d.ifModified){if(y=v.getResponseHeader("Last-Modified"))f.lastModified[k]=y;if(z=v.getResponseHeader("Etag"))f.etag[k]=z}if(a===304)w="notmodified",o=!0;else try{r=cc(d,x),w="success",o=!0}catch(A){w="parsererror",u=A}}else{u=w;if(!w||a)w="error",a<0&&(a=0)}v.status=a,v.statusText=""+(c||w),o?h.resolveWith(e,[r,w,v]):h.rejectWith(e,[v,w,u]),v.statusCode(j),j=b,t&&g.trigger("ajax"+(o?"Success":"Error"),[v,d,o?r:u]),i.fireWith(e,[v,w]),t&&(g.trigger("ajaxComplete",[v,d]),--f.active||f.event.trigger("ajaxStop"))}}typeof a=="object"&&(c=a,a=b),c=c||{};var d=f.ajaxSetup({},c),e=d.context||d,g=e!==d&&(e.nodeType||e instanceof f)?f(e):f.event,h=f.Deferred(),i=f.Callbacks("once memory"),j=d.statusCode||{},k,l={},m={},n,o,p,q,r,s=0,t,u,v={readyState:0,setRequestHeader:function(a,b){if(!s){var c=a.toLowerCase();a=m[c]=m[c]||a,l[a]=b}return this},getAllResponseHeaders:function(){return s===2?n:null},getResponseHeader:function(a){var c;if(s===2){if(!o){o={};while(c=bH.exec(n))o[c[1].toLowerCase()]=c[2]}c=o[a.toLowerCase()]}return c===b?null:c},overrideMimeType:function(a){s||(d.mimeType=a);return this},abort:function(a){a=a||"abort",p&&p.abort(a),w(0,a);return this}};h.promise(v),v.success=v.done,v.error=v.fail,v.complete=i.add,v.statusCode=function(a){if(a){var b;if(s<2)for(b in a)j[b]=[j[b],a[b]];else b=a[v.status],v.then(b,b)}return this},d.url=((a||d.url)+"").replace(bG,"").replace(bL,bW[1]+"//"),d.dataTypes=f.trim(d.dataType||"*").toLowerCase().split(bP),d.crossDomain==null&&(r=bR.exec(d.url.toLowerCase()),d.crossDomain=!(!r||r[1]==bW[1]&&r[2]==bW[2]&&(r[3]||(r[1]==="http:"?80:443))==(bW[3]||(bW[1]==="http:"?80:443)))),d.data&&d.processData&&typeof d.data!="string"&&(d.data=f.param(d.data,d.traditional)),b$(bT,d,c,v);if(s===2)return!1;t=d.global,d.type=d.type.toUpperCase(),d.hasContent=!bK.test(d.type),t&&f.active++===0&&f.event.trigger("ajaxStart");if(!d.hasContent){d.data&&(d.url+=(bM.test(d.url)?"&":"?")+d.data,delete d.data),k=d.url;if(d.cache===!1){var x=f.now(),y=d.url.replace(bQ,"$1_="+x);d.url=y+(y===d.url?(bM.test(d.url)?"&":"?")+"_="+x:"")}}(d.data&&d.hasContent&&d.contentType!==!1||c.contentType)&&v.setRequestHeader("Content-Type",d.contentType),d.ifModified&&(k=k||d.url,f.lastModified[k]&&v.setRequestHeader("If-Modified-Since",f.lastModified[k]),f.etag[k]&&v.setRequestHeader("If-None-Match",f.etag[k])),v.setRequestHeader("Accept",d.dataTypes[0]&&d.accepts[d.dataTypes[0]]?d.accepts[d.dataTypes[0]]+(d.dataTypes[0]!=="*"?", "+bX+"; q=0.01":""):d.accepts["*"]);for(u in d.headers)v.setRequestHeader(u,d.headers[u]);if(d.beforeSend&&(d.beforeSend.call(e,v,d)===!1||s===2)){v.abort();return!1}for(u in{success:1,error:1,complete:1})v[u](d[u]);p=b$(bU,d,c,v);if(!p)w(-1,"No Transport");else{v.readyState=1,t&&g.trigger("ajaxSend",[v,d]),d.async&&d.timeout>0&&(q=setTimeout(function(){v.abort("timeout")},d.timeout));try{s=1,p.send(l,w)}catch(z){if(s<2)w(-1,z);else throw z}}return v},param:function(a,c){var d=[],e=function(a,b){b=f.isFunction(b)?b():b,d[d.length]=encodeURIComponent(a)+"="+encodeURIComponent(b)};c===b&&(c=f.ajaxSettings.traditional);if(f.isArray(a)||a.jquery&&!f.isPlainObject(a))f.each(a,function(){e(this.name,this.value)});else for(var g in a)ca(g,a[g],c,e);return d.join("&").replace(bD,"+")}}),f.extend({active:0,lastModified:{},etag:{}});var cd=f.now(),ce=/(\=)\?(&|$)|\?\?/i;f.ajaxSetup({jsonp:"callback",jsonpCallback:function(){return f.expando+"_"+cd++}}),f.ajaxPrefilter("json jsonp",function(b,c,d){var e=b.contentType==="application/x-www-form-urlencoded"&&typeof b.data=="string";if(b.dataTypes[0]==="jsonp"||b.jsonp!==!1&&(ce.test(b.url)||e&&ce.test(b.data))){var g,h=b.jsonpCallback=f.isFunction(b.jsonpCallback)?b.jsonpCallback():b.jsonpCallback,i=a[h],j=b.url,k=b.data,l="$1"+h+"$2";b.jsonp!==!1&&(j=j.replace(ce,l),b.url===j&&(e&&(k=k.replace(ce,l)),b.data===k&&(j+=(/\?/.test(j)?"&":"?")+b.jsonp+"="+h))),b.url=j,b.data=k,a[h]=function(a){g=[a]},d.always(function(){a[h]=i,g&&f.isFunction(i)&&a[h](g[0])}),b.converters["script json"]=function(){g||f.error(h+" was not called");return g[0]},b.dataTypes[0]="json";return"script"}}),f.ajaxSetup({accepts:{script:"text/javascript, application/javascript, application/ecmascript, application/x-ecmascript"},contents:{script:/javascript|ecmascript/},converters:{"text script":function(a){f.globalEval(a);return a}}}),f.ajaxPrefilter("script",function(a){a.cache===b&&(a.cache=!1),a.crossDomain&&(a.type="GET",a.global=!1)}),f.ajaxTransport("script",function(a){if(a.crossDomain){var d,e=c.head||c.getElementsByTagName("head")[0]||c.documentElement;return{send:function(f,g){d=c.createElement("script"),d.async="async",a.scriptCharset&&(d.charset=a.scriptCharset),d.src=a.url,d.onload=d.onreadystatechange=function(a,c){if(c||!d.readyState||/loaded|complete/.test(d.readyState))d.onload=d.onreadystatechange=null,e&&d.parentNode&&e.removeChild(d),d=b,c||g(200,"success")},e.insertBefore(d,e.firstChild)},abort:function(){d&&d.onload(0,1)}}}});var cf=a.ActiveXObject?function(){for(var a in ch)ch[a](0,1)}:!1,cg=0,ch;f.ajaxSettings.xhr=a.ActiveXObject?function(){return!this.isLocal&&ci()||cj()}:ci,function(a){f.extend(f.support,{ajax:!!a,cors:!!a&&"withCredentials"in a})}(f.ajaxSettings.xhr()),f.support.ajax&&f.ajaxTransport(function(c){if(!c.crossDomain||f.support.cors){var d;return{send:function(e,g){var h=c.xhr(),i,j;c.username?h.open(c.type,c.url,c.async,c.username,c.password):h.open(c.type,c.url,c.async);if(c.xhrFields)for(j in c.xhrFields)h[j]=c.xhrFields[j];c.mimeType&&h.overrideMimeType&&h.overrideMimeType(c.mimeType),!c.crossDomain&&!e["X-Requested-With"]&&(e["X-Requested-With"]="XMLHttpRequest");try{for(j in e)h.setRequestHeader(j,e[j])}catch(k){}h.send(c.hasContent&&c.data||null),d=function(a,e){var j,k,l,m,n;try{if(d&&(e||h.readyState===4)){d=b,i&&(h.onreadystatechange=f.noop,cf&&delete ch[i]);if(e)h.readyState!==4&&h.abort();else{j=h.status,l=h.getAllResponseHeaders(),m={},n=h.responseXML,n&&n.documentElement&&(m.xml=n),m.text=h.responseText;try{k=h.statusText}catch(o){k=""}!j&&c.isLocal&&!c.crossDomain?j=m.text?200:404:j===1223&&(j=204)}}}catch(p){e||g(-1,p)}m&&g(j,k,m,l)},!c.async||h.readyState===4?d():(i=++cg,cf&&(ch||(ch={},f(a).unload(cf)),ch[i]=d),h.onreadystatechange=d)},abort:function(){d&&d(0,1)}}}});var ck={},cl,cm,cn=/^(?:toggle|show|hide)$/,co=/^([+\-]=)?([\d+.\-]+)([a-z%]*)$/i,cp,cq=[["height","marginTop","marginBottom","paddingTop","paddingBottom"],["width","marginLeft","marginRight","paddingLeft","paddingRight"],["opacity"]],cr;f.fn.extend({show:function(a,b,c){var d,e;if(a||a===0)return this.animate(cu("show",3),a,b,c);for(var g=0,h=this.length;g=i.duration+this.startTime){this.now=this.end,this.pos=this.state=1,this.update(),i.animatedProperties[this.prop]=!0;for(b in i.animatedProperties)i.animatedProperties[b]!==!0&&(g=!1);if(g){i.overflow!=null&&!f.support.shrinkWrapBlocks&&f.each(["","X","Y"],function(a,b){h.style["overflow"+b]=i.overflow[a]}),i.hide&&f(h).hide();if(i.hide||i.show)for(b in i.animatedProperties)f.style(h,b,i.orig[b]),f.removeData(h,"fxshow"+b,!0),f.removeData(h,"toggle"+b,!0);d=i.complete,d&&(i.complete=!1,d.call(h))}return!1}i.duration==Infinity?this.now=e:(c=e-this.startTime,this.state=c/i.duration,this.pos=f.easing[i.animatedProperties[this.prop]](this.state,c,0,1,i.duration),this.now=this.start+(this.end-this.start)*this.pos),this.update();return!0}},f.extend(f.fx,{tick:function(){var a,b=f.timers,c=0;for(;c-1,k={},l={},m,n;j?(l=e.position(),m=l.top,n=l.left):(m=parseFloat(h)||0,n=parseFloat(i)||0),f.isFunction(b)&&(b=b.call(a,c,g)),b.top!=null&&(k.top=b.top-g.top+m),b.left!=null&&(k.left=b.left-g.left+n),"using"in b?b.using.call(a,k):e.css(k)}},f.fn.extend({position:function(){if(!this[0])return null;var a=this[0],b=this.offsetParent(),c=this.offset(),d=cx.test(b[0].nodeName)?{top:0,left:0}:b.offset();c.top-=parseFloat(f.css(a,"marginTop"))||0,c.left-=parseFloat(f.css(a,"marginLeft"))||0,d.top+=parseFloat(f.css(b[0],"borderTopWidth"))||0,d.left+=parseFloat(f.css(b[0],"borderLeftWidth"))||0;return{top:c.top-d.top,left:c.left-d.left}},offsetParent:function(){return this.map(function(){var a=this.offsetParent||c.body;while(a&&!cx.test(a.nodeName)&&f.css(a,"position")==="static")a=a.offsetParent;return a})}}),f.each(["Left","Top"],function(a,c){var d="scroll"+c;f.fn[d]=function(c){var e,g;if(c===b){e=this[0];if(!e)return null;g=cy(e);return g?"pageXOffset"in g?g[a?"pageYOffset":"pageXOffset"]:f.support.boxModel&&g.document.documentElement[d]||g.document.body[d]:e[d]}return this.each(function(){g=cy(this),g?g.scrollTo(a?f(g).scrollLeft():c,a?c:f(g).scrollTop()):this[d]=c})}}),f.each(["Height","Width"],function(a,c){var d=c.toLowerCase();f.fn["inner"+c]=function(){var a=this[0];return a?a.style?parseFloat(f.css(a,d,"padding")):this[d]():null},f.fn["outer"+c]=function(a){var b=this[0];return b?b.style?parseFloat(f.css(b,d,a?"margin":"border")):this[d]():null},f.fn[d]=function(a){var e=this[0];if(!e)return a==null?null:this;if(f.isFunction(a))return this.each(function(b){var c=f(this);c[d](a.call(this,b,c[d]()))});if(f.isWindow(e)){var g=e.document.documentElement["client"+c],h=e.document.body;return e.document.compatMode==="CSS1Compat"&&g||h&&h["client"+c]||g}if(e.nodeType===9)return Math.max(e.documentElement["client"+c],e.body["scroll"+c],e.documentElement["scroll"+c],e.body["offset"+c],e.documentElement["offset"+c]);if(a===b){var i=f.css(e,d),j=parseFloat(i);return f.isNumeric(j)?j:i}return this.css(d,typeof a=="string"?a:a+"px")}}),a.jQuery=a.$=f,typeof define=="function"&&define.amd&&define.amd.jQuery&&define("jquery",[],function(){return f})})(window); \ No newline at end of file diff --git a/doc/puppet_class_list.html b/doc/puppet_class_list.html new file mode 100644 index 0000000..7401c21 --- /dev/null +++ b/doc/puppet_class_list.html @@ -0,0 +1,124 @@ + + + + + + + + + + + + + + + + + + Puppet Class List + + + + + + diff --git a/doc/puppet_classes/confdroid_nrpe.html b/doc/puppet_classes/confdroid_nrpe.html new file mode 100644 index 0000000..70fd5c9 --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe.html @@ -0,0 +1,121 @@ + + + + + + + Puppet Class: confdroid_nrpe + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: confdroid_nrpe

+
+ + +
+
Defined in:
+
+ manifests/init.pp +
+
+
+ +

Summary

+ Class initializes the confdroid_nrpe Module. + +

Overview

+
+
+ +

confdroid_nrpe::init.pp Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@confdroid.com)

+ +
+
+ + + +
+ + + +
+
+ + + + +
+
+
+
+6
+7
+8
+
+
# File 'manifests/init.pp', line 6
+
+class confdroid_nrpe {
+  include confdroid_nrpe::params
+}
+
+ + + + + + + + \ No newline at end of file diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Acommands_3A_3Adefinition_rules.html b/doc/puppet_classes/confdroid_nrpe_3A_3Acommands_3A_3Adefinition_rules.html new file mode 100644 index 0000000..1165848 --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Acommands_3A_3Adefinition_rules.html @@ -0,0 +1,248 @@ + + + + + + + Puppet Class: confdroid_nrpe::commands::definition_rules + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: confdroid_nrpe::commands::definition_rules

+
+ +
+
Inherits:
+
confdroid_nrpe::params
+
+ + +
+
Defined in:
+
+ manifests/commands/definition_rules.pp +
+
+
+ +

Summary

+ manage command definitions via define and Puppet rules. + +

Overview

+
+
+ +

confdroid_nrpe::commands::definition_rules.pp Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@ConfDroid.com)

+ +
+
+ + + +
+ +
+

Examples:

+ + +
confdroid_nrpe::commands::definitions { 'check_users':
+  ne_check_cmd      => 'check_users',
+  ne_cmd_argstring  => '-w $ARG1$ -c $ARG2$',
+  ne_cmd_comment    => 'check the amount of user logged in locally',
+}
+ +
+ + + +
+ + + + + +
+
+
+
+12
+13
+14
+15
+16
+17
+18
+19
+20
+21
+22
+23
+24
+25
+26
+27
+28
+29
+30
+31
+32
+33
+34
+35
+36
+37
+38
+39
+40
+41
+42
+43
+44
+45
+46
+47
+48
+49
+50
+51
+52
+53
+54
+55
+56
+57
+58
+59
+60
+61
+62
+63
+64
+65
+66
+67
+68
+69
+
+
# File 'manifests/commands/definition_rules.pp', line 12
+
+class confdroid_nrpe::commands::definition_rules (
+
+) inherits confdroid_nrpe::params {
+  if $ne_manage_cmds == true {
+    require confdroid_nrpe::main::files
+
+    # manage the commands.cfg file
+
+    concat { $ne_cmd_file:
+      ensure   => present,
+      path     => $ne_cmd_file,
+      owner    => $ne_user,
+      group    => $ne_user,
+      mode     => '0640',
+      selrange => s0,
+      selrole  => object_r,
+      seltype  => nrpe_etc_t,
+      seluser  => system_u,
+      notify   => Service[$ne_service],
+    }
+
+    # manage the file header
+
+    concat::fragment { 'nrpe_cmd_header':
+      target  => $ne_cmd_file,
+      content => template($ne_cmd_head_erb),
+      order   => '000',
+    }
+
+    # basic example rules
+
+    confdroid_nrpe::commands::definitions { 'check_users':
+      ne_check_cmd     => 'check_users',
+      ne_cmd_argstring => '-w $ARG1$ -c $ARG2$',
+      ne_cmd_comment   => 'check the amount of user logged in locally',
+    }
+
+    confdroid_nrpe::commands::definitions { 'check_load':
+      ne_check_cmd     => 'check_load',
+      ne_cmd_argstring => '-w $ARG1$ -c $ARG2$',
+    }
+
+    confdroid_nrpe::commands::definitions { 'check_disk':
+      ne_check_cmd     => 'check_disk',
+      ne_cmd_argstring => '-w $ARG1$ -c $ARG2$ -p $ARG3$',
+    }
+
+    confdroid_nrpe::commands::definitions { 'check_procs':
+      ne_check_cmd     => 'check_procs',
+      ne_cmd_argstring => '-w $ARG1$ -c $ARG2$ -s $ARG3$',
+    }
+
+    confdroid_nrpe::commands::definitions { 'check_swap':
+      ne_check_cmd     => 'check_swap',
+      ne_cmd_argstring => '-w $ARG1$ -c $ARG2$',
+    }
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html b/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html new file mode 100644 index 0000000..d3a7446 --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Afirewall_3A_3Aiptables.html @@ -0,0 +1,142 @@ + + + + + + + Puppet Class: confdroid_nrpe::firewall::iptables + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: confdroid_nrpe::firewall::iptables

+
+ +
+
Inherits:
+
confdroid_nrpe::params
+
+ + +
+
Defined in:
+
+ manifests/firewall/iptables.pp +
+
+
+ +

Summary

+ manage firewall settings through puppetlabs-firewall + +

Overview

+
+
+ +
+
+ + + +
+ + + +
+ + + + + +
+
+
+
+7
+8
+9
+10
+11
+12
+13
+14
+15
+16
+17
+18
+
+
# File 'manifests/firewall/iptables.pp', line 7
+
+class confdroid_nrpe::firewall::iptables (
+
+) inherits confdroid_nrpe::params {
+  if $ne_incl_fw == true {
+    firewall { "${ne_fw_order_no}${ne_nrpe_port} port ${ne_nrpe_port}":
+      source => $nagios_source,
+      proto  => 'tcp',
+      dport  => $ne_nrpe_port,
+      jump   => 'accept',
+    }
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Aconfig.html b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Aconfig.html new file mode 100644 index 0000000..cb31dfc --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Aconfig.html @@ -0,0 +1,128 @@ + + + + + + + Puppet Class: confdroid_nrpe::main::config + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: confdroid_nrpe::main::config

+
+ +
+
Inherits:
+
confdroid_nrpe::params
+
+ + +
+
Defined in:
+
+ manifests/main/config.pp +
+
+
+ +

Summary

+ Class manages the module logic for confdroid_nrpe. + +

Overview

+
+
+ +
+
+ + + +
+ + + +
+ + + + + +
+
+
+
+7
+8
+9
+10
+11
+
+
# File 'manifests/main/config.pp', line 7
+
+class confdroid_nrpe::main::config (
+
+) inherits confdroid_nrpe::params {
+  include confdroid_nrpe::main::service
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Adirs.html b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Adirs.html new file mode 100644 index 0000000..2d29ec8 --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Adirs.html @@ -0,0 +1,182 @@ + + + + + + + Puppet Class: confdroid_nrpe::main::dirs + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: confdroid_nrpe::main::dirs

+
+ +
+
Inherits:
+
confdroid_nrpe::params
+
+ + +
+
Defined in:
+
+ manifests/main/dirs.pp +
+
+
+ +

Summary

+ Class manages all directories required for confdroid_nrpe. + +

Overview

+
+
+ +

confdroid_nrpe::main::dirs.pp Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@ConfDroid.com)

+ +
+
+ + + +
+ + + +
+ + + + + +
+
+
+
+6
+7
+8
+9
+10
+11
+12
+13
+14
+15
+16
+17
+18
+19
+20
+21
+22
+23
+24
+25
+26
+27
+28
+29
+30
+31
+32
+33
+34
+35
+36
+
+
# File 'manifests/main/dirs.pp', line 6
+
+class confdroid_nrpe::main::dirs (
+
+) inherits confdroid_nrpe::params {
+  require confdroid_nrpe::main::user
+
+  # manage main conf_d_dir
+
+  file { $ne_main_conf_d_dir:
+    ensure   => directory,
+    path     => $ne_main_conf_d_dir,
+    owner    => 'root',
+    group    => 'root',
+    mode     => '0755',
+    selrange => s0,
+    selrole  => object_r,
+    seltype  => etc_t,
+    seluser  => system_u,
+  }
+
+  file { $ne_run_dir:
+    ensure   => directory,
+    path     => $ne_run_dir,
+    owner    => $ne_user,
+    group    => $ne_user,
+    mode     => '0755',
+    selrange => s0,
+    selrole  => object_r,
+    seltype  => var_run_t,
+    seluser  => system_u,
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Afiles.html b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Afiles.html new file mode 100644 index 0000000..c211ec4 --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Afiles.html @@ -0,0 +1,256 @@ + + + + + + + Puppet Class: confdroid_nrpe::main::files + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: confdroid_nrpe::main::files

+
+ +
+
Inherits:
+
confdroid_nrpe::params
+
+ + +
+
Defined in:
+
+ manifests/main/files.pp +
+
+
+ +

Summary

+ Class manages all configuration files required for confdroid_nrpe. + +

Overview

+
+
+ +

confdroid_nrpe::main::files.pp Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@ConfDroid.com)

+ +
+
+ + + +
+ + + +
+ + + + + +
+
+
+
+6
+7
+8
+9
+10
+11
+12
+13
+14
+15
+16
+17
+18
+19
+20
+21
+22
+23
+24
+25
+26
+27
+28
+29
+30
+31
+32
+33
+34
+35
+36
+37
+38
+39
+40
+41
+42
+43
+44
+45
+46
+47
+48
+49
+50
+51
+52
+53
+54
+55
+56
+57
+58
+59
+60
+61
+62
+63
+64
+65
+66
+67
+68
+69
+70
+71
+72
+73
+
+
# File 'manifests/main/files.pp', line 6
+
+class confdroid_nrpe::main::files (
+
+) inherits confdroid_nrpe::params {
+  require confdroid_nrpe::main::dirs
+
+  # manage /etc/nagios/nrpe.cfg
+
+  file { $ne_main_conf_file:
+    ensure   => file,
+    path     => $ne_main_conf_file,
+    owner    => 'root',
+    group    => 'root',
+    mode     => '0644',
+    selrange => s0,
+    selrole  => object_r,
+    seltype  => nrpe_etc_t,
+    seluser  => system_u,
+    content  => template($ne_main_conf_erb),
+    notify   => Service[$ne_service],
+  }
+
+  # manage /etc/sysconfig/nrpe
+
+  file { $ne_nrpe_conf_file:
+    ensure   => file,
+    path     => $ne_nrpe_conf_file,
+    owner    => 'root',
+    group    => 'root',
+    mode     => '0644',
+    selrange => s0,
+    selrole  => object_r,
+    seltype  => etc_t,
+    seluser  => system_u,
+    content  => template($ne_nrpe_conf_erb),
+    notify   => Service[$ne_service],
+  }
+
+  if $ne_allow_sudo == true {
+
+    file { $ne_sudo_file:
+      ensure   => file,
+      path     => $ne_sudo_file,
+      owner    => 'root',
+      group    => 'root',
+      mode     => '0440',
+      selrange => s0,
+      selrole  => object_r,
+      seltype  => etc_t,
+      seluser  => system_u,
+      content  => template($ne_sudo_rule_erb),
+    }
+
+    # file for sudo  selinux policy
+    file { $ne_nrpe_te_file:
+      ensure   => file,
+      path     => $ne_nrpe_te_file,
+      owner    => 'root',
+      group    => 'root',
+      mode     => '0440',
+      selrange => s0,
+      selrole  => object_r,
+      seltype  => nrpe_etc_t,
+      seluser  => system_u,
+      content  => template($ne_nrpe_te_erb),
+      notify   => Exec['create_nrpe_pp'],
+    }
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Ainstall.html b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Ainstall.html new file mode 100644 index 0000000..99c0ab7 --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Ainstall.html @@ -0,0 +1,138 @@ + + + + + + + Puppet Class: confdroid_nrpe::main::install + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: confdroid_nrpe::main::install

+
+ +
+
Inherits:
+
confdroid_nrpe::params
+
+ + +
+
Defined in:
+
+ manifests/main/install.pp +
+
+
+ +

Summary

+ Class manages installing binaries required for confdroid_nrpe + +

Overview

+
+
+ +

confdroid_nrpe::main::install.pp Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@ConfDroid.com)

+ +
+
+ + + +
+ + + +
+ + + + + +
+
+
+
+6
+7
+8
+9
+10
+11
+12
+13
+14
+
+
# File 'manifests/main/install.pp', line 6
+
+class confdroid_nrpe::main::install (
+
+) inherits confdroid_nrpe::params {
+  require confdroid_resources::main::epel
+
+  package { $reqpackages:
+    ensure => $pkg_ensure,
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Aservice.html b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Aservice.html new file mode 100644 index 0000000..e0fe38a --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Aservice.html @@ -0,0 +1,168 @@ + + + + + + + Puppet Class: confdroid_nrpe::main::service + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: confdroid_nrpe::main::service

+
+ +
+
Inherits:
+
confdroid_nrpe::params
+
+ + +
+
Defined in:
+
+ manifests/main/service.pp +
+
+
+ +

Summary

+ Class manages the service(s) for confdroid_nrpe. + +

Overview

+
+
+ +

confdroid_nrpe::main::service.pp Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@ConfDroid.com)

+ +
+
+ + + +
+ + + +
+ + + + + +
+
+
+
+6
+7
+8
+9
+10
+11
+12
+13
+14
+15
+16
+17
+18
+19
+20
+21
+22
+23
+24
+25
+26
+27
+28
+29
+
+
# File 'manifests/main/service.pp', line 6
+
+class confdroid_nrpe::main::service (
+
+) inherits confdroid_nrpe::params {
+  require confdroid_nrpe::main::files
+
+  if $ne_incl_fw == true {
+    require confdroid_nrpe::firewall::iptables
+  }
+
+  if $ne_manage_cmds == true {
+    require confdroid_nrpe::commands::definition_rules
+  }
+
+  if $ne_include_selinux == true {
+    require confdroid_nrpe::selinux::config
+  }
+
+  service { $ne_service:
+    ensure     => running,
+    hasstatus  => true,
+    hasrestart => true,
+    enable     => true,
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Auser.html b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Auser.html new file mode 100644 index 0000000..d2093b6 --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Auser.html @@ -0,0 +1,172 @@ + + + + + + + Puppet Class: confdroid_nrpe::main::user + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: confdroid_nrpe::main::user

+
+ +
+
Inherits:
+
confdroid_nrpe::params
+
+ + +
+
Defined in:
+
+ manifests/main/user.pp +
+
+
+ +

Summary

+ Class manages service users for confdroid_nrpe. + +

Overview

+
+
+ +

confdroid_nrpe::main::user.pp Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@ConfDroid.com)

+ +
+
+ + + +
+ + + +
+ + + + + +
+
+
+
+6
+7
+8
+9
+10
+11
+12
+13
+14
+15
+16
+17
+18
+19
+20
+21
+22
+23
+24
+25
+26
+27
+28
+29
+30
+31
+
+
# File 'manifests/main/user.pp', line 6
+
+class confdroid_nrpe::main::user (
+
+) inherits confdroid_nrpe::params {
+  require confdroid_nrpe::main::install
+
+  group { $ne_user:
+    ensure    => present,
+    name      => $ne_user,
+    gid       => $ne_user_uid,
+    allowdupe => false,
+  }
+
+  user { $ne_user:
+    ensure     => present,
+    name       => $ne_user,
+    allowdupe  => false,
+    comment    => $ne_user_comment,
+    uid        => $ne_user_uid,
+    gid        => $ne_user,
+    groups     => $ne_user_groups,
+    managehome => true,
+    home       => $ne_user_home,
+    shell      => $ne_user_shell,
+    require    => Group[$ne_user],
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html new file mode 100644 index 0000000..a694a87 --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html @@ -0,0 +1,958 @@ + + + + + + + Puppet Class: confdroid_nrpe::params + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: confdroid_nrpe::params

+ + +

Summary

+ Class holds all parameters for the confdroid_nrpe module and is +inherited by all classes except defines. + +

Overview

+
+
+ +

confdroid_nrpe::params.pp Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@ConfDroid.com) be passed to the NRPE daemon.

+ +
+
+ + + +
+

Parameters:

+
    + +
  • + + pkg_ensure + + + (String) + + + (defaults to: 'present') + + + — +
    +

    which package type to choose, i.e. latest or present.

    +
    + +
  • + +
  • + + ne_log_facility + + + (String) + + + (defaults to: 'daemon') + + + — +
    +

    the log facility to use.

    +
    + +
  • + +
  • + + ne_log_file + + + (String) + + + (defaults to: '') + + + — +
    +

    If a log file is specified in this option, nrpe will write to that file instead of using syslog. i.e. /var/run/nrpe.log

    +
    + +
  • + +
  • + + ne_debug + + + (String) + + + (defaults to: '0') + + + — +
    +

    Whether debugging messages are logged to the syslog facility.

    +
    + +
  • + +
  • + + ne_nrpe_port + + + (String) + + + (defaults to: '5666') + + + — +
    +

    the NRPE port. used in firewall ( optional) and configuration file.

    +
    + +
  • + +
  • + + ne_listen_queue_size + + + (String) + + + (defaults to: '5') + + + — +
    +

    Listen queue size (backlog) for serving incoming connections.

    +
    + +
  • + +
  • + + ne_dont_blame_nrpe + + + (String) + + + (defaults to: '1') + + + — +
    +

    whether or not the NRPE daemon will allow clients to specify arguments to commands that are executed.

    +
    + +
  • + +
  • + + ne_allow_bash_cmd_subst + + + (String) + + + (defaults to: '1') + + + — +
    +

    whether or not the NRPE daemon will allow clients to specify arguments that contain bash command substitutions of the form $(…).

    +
    + +
  • + +
  • + + ne_allow_sudo + + + (Boolean) + + + (defaults to: true) + + + — +
    +

    Whether to allow sudo access. used in nrpe.cfg as well as for creating a sudo role.

    +
    + +
  • + +
  • + + ne_command_prefix + + + (String) + + + (defaults to: '/usr/bin/sudo') + + + — +
    +

    allows you to prefix all commands with a user-defined String.

    +
    + +
  • + +
  • + + ne_incl_fw + + + (Boolean) + + + (defaults to: true) + + + — +
    +

    Whether to include firewall rules

    +
    + +
  • + +
  • + + ne_command_timeout + + + (String) + + + (defaults to: '60') + + + — +
    +

    maximum number of seconds that the NRPE daemon will allow plugins to finish executing before killing them off.

    +
    + +
  • + +
  • + + ne_connection_timeout + + + (String) + + + (defaults to: '300') + + + — +
    +

    maximum number of seconds that the NRPE daemon will wait for a connection to be established before exiting.

    +
    + +
  • + +
  • + + ne_ssl_version + + + (String) + + + (defaults to: 'TLSv2+') + + + — +
    +

    These directives allow you to specify how to use SSL/TLS.

    +
    + +
  • + +
  • + + ne_ssl_use_adh + + + (String) + + + (defaults to: '1') + + + — +
    +

    This is for backward compatibility and is DEPRECATED. Set to 1 to enable ADH or 2 to require ADH. 1 is currently the default but will be changed in a later version.

    +
    + +
  • + +
  • + + ne_ssl_cipher_list + + + (String) + + + (defaults to: 'ALL:!aNULL:!eNULL:!SSLv2:!LOW:!EXP:!RC4:!MD5:@STRENGTH') + + + — +
    +

    ciphers can be used. For backward compatibility, this defaults to ‘ssl_cipher_list=ALL:!MD5:@STRENGTH’ in this version but will be changed in a later version of NRPE.

    +
    + +
  • + +
  • + + ne_ssl_cacert_file + + + (String) + + + (defaults to: '/etc/pki/tls/certs/ca-chain.crt.pem') + + + — +
    +

    path and name of the ssl certificate authority (ca) file / chain. must be full path.

    +
    + +
  • + +
  • + + ne_ssl_client_certs + + + (String) + + + (defaults to: '2') + + + — +
    +

    determines client certificate usage. Values: 0 = Don’t ask for or require client certificates 1 = Ask for client certificates 2 = Require client certificates

    +
    + +
  • + +
  • + + ne_ssl_logging + + + (String) + + + (defaults to: '0x00') + + + — +
    +

    determines which SSL messages are send to syslog. OR values together to specify multiple options. Values: 0x00 (0) = No additional logging (default) 0x01 (1) = Log startup SSL/TLS parameters 0x02 (2) = Log remote IP address 0x04 (4) = Log SSL/TLS version of connections 0x08 (8) = Log which cipher is being used for the connection 0x10 (16) = Log if client has a certificate 0x20 (32) = Log details of client’s certificate if it has one -1 or 0xff or 0x2f = All of the above

    +
    + +
  • + +
  • + + ne_nasty_metachars + + + (Array) + + + (defaults to: ["|`&><'\\[]{};\r\n"]) + + + — +
    +

    list of characters that cannot

    +
    + +
  • + +
  • + + ne_include_file + + + (String) + + + (defaults to: '') + + + — +
    +

    include definitions from an external config file.

    +
    + +
  • + +
  • + + ne_fw_order_no + + + (String) + + + (defaults to: '50') + + + — +
    +

    ordering prefix for he firewall rules. Adjust to your environment if needed.

    +
    + +
  • + +
  • + + ne_ssl_opts + + + (String) + + + (defaults to: '') + + + — +
    +

    Specify additional SSL options.

    +
    + +
  • + +
  • + + ne_user + + + (String) + + + (defaults to: 'nrpe') + + + — +
    +

    the NRPE service user

    +
    + +
  • + +
  • + + ne_user_comment + + + (String) + + + (defaults to: 'NRPE service user') + + + — +
    +

    The comment for the service user /etc/passwd

    +
    + +
  • + +
  • + + ne_user_uid + + + (String) + + + (defaults to: '1005') + + + — +
    +

    the UID for the service user

    +
    + +
  • + +
  • + + ne_user_home + + + (String) + + + (defaults to: '/var/run/nrpe') + + + — +
    +

    the home for the service user

    +
    + +
  • + +
  • + + ne_user_shell + + + (String) + + + (defaults to: '/sbin/nologin') + + + — +
    +

    the shell for the service user.

    +
    + +
  • + +
  • + + ne_user_groups + + + (Optional[String]) + + + (defaults to: undef) + + + — +
    +

    additional groups for the service user.

    +
    + +
  • + +
  • + + ne_server_address + + + (String) + + + (defaults to: '0.0.0.0') + + + — +
    +

    the network interfaces to listen on

    +
    + +
  • + +
  • + + ne_allow_weak_rnd_seed + + + (String) + + + (defaults to: '1') + + + — +
    +

    Whether to allow weak random seeds

    +
    + +
  • + +
  • + + ne_include_selinux + + + (Boolean) + + + (defaults to: true) + + + — +
    +

    Whether to manage selinux

    +
    + +
  • + +
  • + + ne_enable_ssl + + + (Boolean) + + + (defaults to: false) + + + — +
    +

    Whether to enable SSL certificates.

    +
    + +
  • + +
  • + + reqpackages + + + (Array) + + + (defaults to: ['nrpe','nrpe-selinux','selinux-policy-devel']) + + + — +
    +

    which packages to install

    +
    + +
  • + +
  • + + ne_manage_cmds + + + (Boolean) + + + (defaults to: true) + + + — +
    +

    Whether to manage command rules for NRPE checks, to allow dynamic check & command rules.

    +
    + +
  • + +
+ + + +

See Also:

+ + +
+ + + + + +
+
+
+
+78
+79
+80
+81
+82
+83
+84
+85
+86
+87
+88
+89
+90
+91
+92
+93
+94
+95
+96
+97
+98
+99
+100
+101
+102
+103
+104
+105
+106
+107
+108
+109
+110
+111
+112
+113
+114
+115
+116
+117
+118
+119
+120
+121
+122
+123
+124
+125
+126
+127
+128
+129
+130
+131
+132
+133
+134
+135
+136
+137
+138
+139
+140
+141
+142
+143
+144
+145
+146
+147
+148
+149
+150
+151
+152
+153
+154
+155
+156
+157
+158
+159
+160
+161
+162
+163
+164
+165
+
+
# File 'manifests/params.pp', line 78
+
+class confdroid_nrpe::params (
+
+  String $pkg_ensure                 = 'present',
+  Array $reqpackages                 = ['nrpe','nrpe-selinux','selinux-policy-devel'],
+
+  Boolean $ne_manage_cmds            = true,
+
+# NRPE user settings
+  String $ne_user                    = 'nrpe',
+  String $ne_user_comment            = 'NRPE service user',
+  String $ne_user_uid                = '1005',
+  String $ne_user_home               = '/var/run/nrpe',
+  Optional[String] $ne_user_groups   = undef,
+  String $ne_user_shell              = '/sbin/nologin',
+
+# nrpe.cfg
+  String $ne_log_facility            = 'daemon',
+  String $ne_log_file                = '',
+  String $ne_debug                   = '0',
+  String $ne_nrpe_port               = '5666',
+  String $ne_server_address          = '0.0.0.0',
+  String $ne_listen_queue_size       = '5',
+  String $ne_dont_blame_nrpe         = '1',
+  String $ne_allow_bash_cmd_subst    = '1',
+  Boolean $ne_allow_sudo             = true,
+  String $ne_command_prefix          = '/usr/bin/sudo',
+  String $ne_command_timeout         = '60',
+  String $ne_connection_timeout      = '300',
+  String $ne_allow_weak_rnd_seed     = '1',
+  Boolean $ne_enable_ssl             = false,
+  String $ne_ssl_version             = 'TLSv2+',
+  String $ne_ssl_use_adh             = '1',
+  String $ne_ssl_cipher_list         = 'ALL:!aNULL:!eNULL:!SSLv2:!LOW:!EXP:!RC4:!MD5:@STRENGTH',
+  String $ne_ssl_cacert_file         = '/etc/pki/tls/certs/ca-chain.crt.pem',
+  String $ne_ssl_client_certs        = '2',
+  String $ne_ssl_logging             = '0x00',
+  Array $ne_nasty_metachars          = ["|`&><'\\[]{};\r\n"],
+  String $ne_include_file            = '',
+
+# nrpe.conf
+  String $ne_ssl_opts                = '',
+
+# firewall
+  Boolean $ne_incl_fw                = true,
+  String $ne_fw_order_no             = '50',
+
+# selinux
+  Boolean $ne_include_selinux        = true,
+
+) {
+# Default facts
+  $fqdn                     = $facts['networking']['fqdn']
+  $domain                   = $facts['networking']['domain']
+  $os_name                  = $facts['os']['name']
+  $os_release               = $facts['os']['release']['major']
+  $nagios_server            = $::nagios_server
+  $nagios_source            = $::nagios_source
+
+# service
+  $ne_service                 = 'nrpe'
+
+# directories
+  $ne_main_conf_d_dir         = '/etc/nrpe.d'
+  $ne_run_dir                 = '/var/run/nrpe'
+
+# files
+  $ne_main_conf_file          = '/etc/nagios/nrpe.cfg'
+  $ne_main_conf_erb           = 'confdroid_nrpe/nrpe_cfg.erb'
+  $ne_nrpe_pid_file           = "${ne_run_dir}/nrpe.pid"
+  $ne_nrpe_conf_file          = '/etc/sysconfig/nrpe'
+  $ne_nrpe_conf_erb           = 'confdroid_nrpe/nrpe_conf.erb'
+  $ne_cmd_file                = "${ne_main_conf_d_dir}/commands.cfg"
+  $ne_cmd_head_erb            = 'confdroid_nrpe/cmd_head.erb'
+  $ne_cmd_rule_erb            = 'confdroid_nrpe/cmd_rule.erb'
+  $ne_sudo_file               = '/etc/sudoers.d/nagios_sudo'
+  $ne_sudo_rule_erb           = 'confdroid_nrpe/sudo_rule.erb'
+  $ne_nrpe_te_file            = "${ne_main_conf_d_dir}/nrpe.te"
+  $ne_nrpe_te_erb             = 'confdroid_nrpe/nrpe.te.erb'
+  $ne_nrpe_mod_file           = "${ne_main_conf_d_dir}/nrpe.mod"
+  $ne_checkmodule_nrpe_erb    = 'confdroid_nrpe/checkmodule_nrpe.erb'
+  $ne_nrpe_pp_file            = "${ne_main_conf_d_dir}/nrpe.pp"
+  $ne_semodule_erb            =  'confdroid_nrpe/semodule_nrpe.erb'
+  $ne_ssl_cert_file           = "/etc/pki/tls/certs/${fqdn}.crt.pem"
+  $ne_ssl_privatekey_file     = "/etc/pki/tls/private/${fqdn}.key.pem"
+
+# includes must be last
+  include confdroid_nrpe::main::config
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Aselinux_3A_3Aconfig.html b/doc/puppet_classes/confdroid_nrpe_3A_3Aselinux_3A_3Aconfig.html new file mode 100644 index 0000000..095da2b --- /dev/null +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Aselinux_3A_3Aconfig.html @@ -0,0 +1,182 @@ + + + + + + + Puppet Class: confdroid_nrpe::selinux::config + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Puppet Class: confdroid_nrpe::selinux::config

+
+ +
+
Inherits:
+
confdroid_nrpe::params
+
+ + +
+
Defined in:
+
+ manifests/selinux/config.pp +
+
+
+ +

Summary

+ Class manages all aspects of configuring selinux for NRPE. + +

Overview

+
+
+ +

confdroid_nrpe::selinux::config.pp # Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@ConfDroid.com)

+ +
+
+ + + +
+ + + +
+ + + + + +
+
+
+
+5
+6
+7
+8
+9
+10
+11
+12
+13
+14
+15
+16
+17
+18
+19
+20
+21
+22
+23
+24
+25
+26
+27
+28
+29
+30
+31
+32
+33
+34
+35
+
+
# File 'manifests/selinux/config.pp', line 5
+
+class confdroid_nrpe::selinux::config (
+
+) inherits confdroid_nrpe::params {
+  if $ne_include_selinux == true {
+    #  manage allow nagios sudo
+
+    exec { 'nagios_run_sudo':
+      command => 'setsebool -P nagios_run_sudo 1',
+      path    => ['/usr/bin','/usr/sbin'],
+      cwd     => '/tmp',
+      unless  => 'getsebool nagios_run_sudo | awk \'{print$3}\' | grep -ic "on"'
+    }
+
+    # create policy file for sudo selinux policy
+    exec { 'create_nrpe_pp':
+      command     => template($ne_checkmodule_nrpe_erb),
+      user        => 'root',
+      creates     => $ne_nrpe_pp_file,
+      refreshonly => true,
+      notify      => Exec['import_semodule_nrpe'],
+    }
+
+    # import semodule
+    exec { 'import_semodule_nrpe':
+      command     => template($ne_semodule_erb),
+      user        => 'root',
+      unless      => '/sbin/semodule -l | grep nrpe | grep -v nrpe_',
+      refreshonly => true,
+    }
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_defined_type_list.html b/doc/puppet_defined_type_list.html new file mode 100644 index 0000000..669a169 --- /dev/null +++ b/doc/puppet_defined_type_list.html @@ -0,0 +1,54 @@ + + + + + + + + + + + + + + + + + + Defined Type List + + + +
+
+

Defined Type List

+ + + +
+ + +
+ + diff --git a/doc/puppet_defined_types/confdroid_nrpe_3A_3Acommands_3A_3Adefinitions.html b/doc/puppet_defined_types/confdroid_nrpe_3A_3Acommands_3A_3Adefinitions.html new file mode 100644 index 0000000..91fbd6c --- /dev/null +++ b/doc/puppet_defined_types/confdroid_nrpe_3A_3Acommands_3A_3Adefinitions.html @@ -0,0 +1,228 @@ + + + + + + + Defined Type: confdroid_nrpe::commands::definitions + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Defined Type: confdroid_nrpe::commands::definitions

+
+
+
Defined in:
+
+ manifests/commands/definitions.pp +
+
+
+ +

Summary

+ Populate command definitions through external puppet rules, i.e. +from other modules. + +

Overview

+
+
+ +

confdroid_nrpe::commands::definitions.pp Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@ConfDroid.com)

+ +
+
+ + + +
+

Parameters:

+
    + +
  • + + ne_check_cmd + + + (Optional[String]) + + + (defaults to: undef) + + + — +
    +

    Specify the check_command to use.

    +
    + +
  • + +
  • + + ne_cmd_path + + + (String) + + + (defaults to: '/usr/lib64/nagios/plugins/') + + + — +
    +

    The path to the command scripts, usually where the nagios_plugins are located. If you use your own scripts, specify the custom location including the trailing slash

    +
    + +
  • + +
  • + + ne_cmd_argstring + + + (Optional[String]) + + + (defaults to: undef) + + + — +
    +

    Specify the string of valid argument for the command , i.e. -w $ARG1$ -c $ARG2$. See the arguments in the man pages for the checks.

    +
    + +
  • + +
  • + + ne_cmd_comment + + + (String) + + + (defaults to: '') + + + — +
    +

    Specify an optional comment for your command definition

    +
    + +
  • + +
+ + + +
+ + + + + +
+
+
+
+16
+17
+18
+19
+20
+21
+22
+23
+24
+25
+26
+27
+28
+29
+30
+31
+32
+33
+34
+
+
# File 'manifests/commands/definitions.pp', line 16
+
+define confdroid_nrpe::commands::definitions (
+
+  Optional[String] $ne_check_cmd      = undef,
+  String $ne_cmd_path                 = '/usr/lib64/nagios/plugins/',
+  Optional[String] $ne_cmd_argstring  = undef,
+  String $ne_cmd_comment              = '',
+
+) {
+  $ne_cmd_file      = $confdroid_nrpe::params::ne_cmd_file
+  $ne_cmd_rule_erb  = $confdroid_nrpe::params::ne_cmd_rule_erb
+  $ne_manage_cmds   = $confdroid_nrpe::params::ne_manage_cmds
+
+  if $ne_manage_cmds == true {
+    concat::fragment { $name:
+      target  => $ne_cmd_file,
+      content => template($ne_cmd_rule_erb),
+    }
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/top-level-namespace.html b/doc/top-level-namespace.html new file mode 100644 index 0000000..5d6b54b --- /dev/null +++ b/doc/top-level-namespace.html @@ -0,0 +1,98 @@ + + + + + + + Top Level Namespace + + — Documentation by YARD 0.9.36 + + + + + + + + + + + + + + + + + + + +
+ + +

Top Level Namespace + + + +

+
+ + + + + + + + + + + +
+ + + + + + + + + + +
+ + + +
+ + \ No newline at end of file From a35b029b9ccdcf487c31cdae15cde0ff4ed0d259 Mon Sep 17 00:00:00 2001 From: Jenkins Server Date: Fri, 13 Feb 2026 17:55:00 +0100 Subject: [PATCH 02/17] Recommit for updates in build 27 --- doc/file.README.html | 4 ++-- doc/index.html | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/doc/file.README.html b/doc/file.README.html index 70a08c7..81383f7 100644 --- a/doc/file.README.html +++ b/doc/file.README.html @@ -129,7 +129,7 @@
-

Note: The value for the nagios_server variable is derived from a global parameter set in Foreman (nagios_server), because the paremeter is used across multiple modules. You need to set that manually in Foreman under “Global Parameters”. Same for nagios_source, the value for the firewall source, which should point to the source IP or source range for the nagios server querying NRPE.

+

Note: The value for the nagios_server variable is derived from a global parameter set in Foreman (nagios_server), because the parameter is used across multiple modules. You need to set that manually in Foreman under “Global Parameters”. Same for nagios_source, the value for the firewall source, which should point to the source IP or source range for the nagios server querying NRPE.

Repo Documentation

@@ -213,7 +213,7 @@
  • --no-variable_scope-check: not applicable as we are inheriting parameters from params class. the lint check does not distinguish between facts and inherited parameters.

  • -

    --no-top_scope_facts: iptables does not recognise otherwise

    +

    --no-top_scope_facts: iptables does not recognize otherwise

  • Puppet Parser

    diff --git a/doc/index.html b/doc/index.html index 28f6d9f..a67e77d 100644 --- a/doc/index.html +++ b/doc/index.html @@ -129,7 +129,7 @@
  • -

    Note: The value for the nagios_server variable is derived from a global parameter set in Foreman (nagios_server), because the paremeter is used across multiple modules. You need to set that manually in Foreman under “Global Parameters”. Same for nagios_source, the value for the firewall source, which should point to the source IP or source range for the nagios server querying NRPE.

    +

    Note: The value for the nagios_server variable is derived from a global parameter set in Foreman (nagios_server), because the parameter is used across multiple modules. You need to set that manually in Foreman under “Global Parameters”. Same for nagios_source, the value for the firewall source, which should point to the source IP or source range for the nagios server querying NRPE.

    Repo Documentation

    @@ -213,7 +213,7 @@
    • --no-variable_scope-check: not applicable as we are inheriting parameters from params class. the lint check does not distinguish between facts and inherited parameters.

    • -

      --no-top_scope_facts: iptables does not recognise otherwise

      +

      --no-top_scope_facts: iptables does not recognize otherwise

  • Puppet Parser

    From 88fa9f668e42646279eed6a4eaf58e015a25fcc4 Mon Sep 17 00:00:00 2001 From: Jenkins Server Date: Fri, 13 Feb 2026 19:15:51 +0100 Subject: [PATCH 03/17] Recommit for updates in build 28 --- doc/file.README.html | 2 +- doc/index.html | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/doc/file.README.html b/doc/file.README.html index 81383f7..cc4dbaa 100644 --- a/doc/file.README.html +++ b/doc/file.README.html @@ -140,7 +140,7 @@

    All dependencies must be included in the catalogue.

    diff --git a/doc/index.html b/doc/index.html index a67e77d..befaa6d 100644 --- a/doc/index.html +++ b/doc/index.html @@ -140,7 +140,7 @@

    All dependencies must be included in the catalogue.

    From f48c753775d8a93ddda47b03af5e0ff852745930 Mon Sep 17 00:00:00 2001 From: Jenkins Server Date: Wed, 11 Mar 2026 16:37:01 +0100 Subject: [PATCH 04/17] Recommit for updates in build 32 --- doc/file.README.html | 4 ++-- doc/index.html | 4 ++-- ...oid_nrpe_3A_3Acommands_3A_3Adefinition_rules.html | 12 +++++++++++- 3 files changed, 15 insertions(+), 5 deletions(-) diff --git a/doc/file.README.html b/doc/file.README.html index cc4dbaa..4eea7d5 100644 --- a/doc/file.README.html +++ b/doc/file.README.html @@ -121,7 +121,7 @@
  • manage dynamic NRPE check command definitions

  • -

    manage iptables (optional). set ne_incl_fwto true.

    +

    manage iptables (optional). set ne_incl_fwto true

  • manage selinux rule exceptions (optional)

  • @@ -162,7 +162,7 @@

    through Foreman:

  • -

    In order to apply parameters through Foreman, *confdroid_nrpe::params- must be added to the host or host group in question, unless the defaults are fully acceptable across the estate.

    +

    In order to apply parameters through Foreman, confdroid_nrpe::params- must be added to the host or host group in question, unless the defaults are fully acceptable across the estate.

    See more details about class deployment on Confdroid.com.

    diff --git a/doc/index.html b/doc/index.html index befaa6d..37ca5f6 100644 --- a/doc/index.html +++ b/doc/index.html @@ -121,7 +121,7 @@
  • manage dynamic NRPE check command definitions

  • -

    manage iptables (optional). set ne_incl_fwto true.

    +

    manage iptables (optional). set ne_incl_fwto true

  • manage selinux rule exceptions (optional)

  • @@ -162,7 +162,7 @@

    through Foreman:

  • -

    In order to apply parameters through Foreman, *confdroid_nrpe::params- must be added to the host or host group in question, unless the defaults are fully acceptable across the estate.

    +

    In order to apply parameters through Foreman, confdroid_nrpe::params- must be added to the host or host group in question, unless the defaults are fully acceptable across the estate.

    See more details about class deployment on Confdroid.com.

    diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Acommands_3A_3Adefinition_rules.html b/doc/puppet_classes/confdroid_nrpe_3A_3Acommands_3A_3Adefinition_rules.html index 1165848..b7aebd7 100644 --- a/doc/puppet_classes/confdroid_nrpe_3A_3Acommands_3A_3Adefinition_rules.html +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Acommands_3A_3Adefinition_rules.html @@ -170,7 +170,12 @@ 66 67 68 -69 +69 +70 +71 +72 +73 +74
    # File 'manifests/commands/definition_rules.pp', line 12
    @@ -231,6 +236,11 @@ class confdroid_nrpe::commands::definition_rules (
           ne_check_cmd     => 'check_swap',
           ne_cmd_argstring => '-w $ARG1$ -c $ARG2$',
         }
    +
    +    confdroid_nrpe::commands::definitions { 'check_fail2ban':
    +      ne_check_cmd     => 'check_procs',
    +      ne_cmd_argstring => '-c $ARG1$ -C $ARG2$',
    +    }
       }
     }
    From 7d85743f78d587d47456d7ae187461ceb6ce3e7e Mon Sep 17 00:00:00 2001 From: Jenkins Server Date: Wed, 11 Mar 2026 16:50:07 +0100 Subject: [PATCH 05/17] Recommit for updates in build 33 --- ...e_3A_3Acommands_3A_3Adefinition_rules.html | 6 ++- ...d_nrpe_3A_3Acommands_3A_3Adefinitions.html | 42 ++++++++++++++----- 2 files changed, 35 insertions(+), 13 deletions(-) diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Acommands_3A_3Adefinition_rules.html b/doc/puppet_classes/confdroid_nrpe_3A_3Acommands_3A_3Adefinition_rules.html index b7aebd7..74e07ea 100644 --- a/doc/puppet_classes/confdroid_nrpe_3A_3Acommands_3A_3Adefinition_rules.html +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Acommands_3A_3Adefinition_rules.html @@ -175,7 +175,8 @@ 71 72 73 -74 +74 +75
    # File 'manifests/commands/definition_rules.pp', line 12
    @@ -238,8 +239,9 @@ class confdroid_nrpe::commands::definition_rules (
         }
     
         confdroid_nrpe::commands::definitions { 'check_fail2ban':
    +      ne_check_name    => 'check_fail2ban',
           ne_check_cmd     => 'check_procs',
    -      ne_cmd_argstring => '-c $ARG1$ -C $ARG2$',
    +      ne_cmd_argstring => '-c $ARG1$ -a $ARG2$',
         }
       }
     }
    diff --git a/doc/puppet_defined_types/confdroid_nrpe_3A_3Acommands_3A_3Adefinitions.html b/doc/puppet_defined_types/confdroid_nrpe_3A_3Acommands_3A_3Adefinitions.html index 91fbd6c..be820b7 100644 --- a/doc/puppet_defined_types/confdroid_nrpe_3A_3Acommands_3A_3Adefinitions.html +++ b/doc/puppet_defined_types/confdroid_nrpe_3A_3Acommands_3A_3Adefinitions.html @@ -77,7 +77,7 @@ from other modules.
    -

    confdroid_nrpe::commands::definitions.pp Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@ConfDroid.com)

    +

    confdroid_nrpe::commands::definitions.pp Module name: confdroid_nrpe Author: 12ww1160 (12ww1160@ConfDroid.com) different checks.

    @@ -147,15 +147,33 @@ from other modules. ne_cmd_comment - (String) + (Optional[String]) - (defaults to: '') + (defaults to: undef)

    Specify an optional comment for your command definition

    +
    + + + +
  • + + ne_check_name + + + (String) + + + (defaults to: 'check_procs') + + + — +
    +

    Specify an optional name for the check, if you want to use a different name than the check_command. This is useful if you want to use the same check_command with different arguments, e.g. check_procs with different argument strings for

  • @@ -171,11 +189,6 @@ from other modules.
     
     
    -16
    -17
    -18
    -19
    -20
     21
     22
     23
    @@ -189,17 +202,24 @@ from other modules.
     31
     32
     33
    -34
    +34 +35 +36 +37 +38 +39 +40 -
    # File 'manifests/commands/definitions.pp', line 16
    +        
    # File 'manifests/commands/definitions.pp', line 21
     
     define confdroid_nrpe::commands::definitions (
     
    +  String $ne_check_name               = 'check_procs',
       Optional[String] $ne_check_cmd      = undef,
       String $ne_cmd_path                 = '/usr/lib64/nagios/plugins/',
       Optional[String] $ne_cmd_argstring  = undef,
    -  String $ne_cmd_comment              = '',
    +  Optional[String] $ne_cmd_comment    = undef,
     
     ) {
       $ne_cmd_file      = $confdroid_nrpe::params::ne_cmd_file
    
    From 8cfa2fdfe49abcffcc13aa9cb80a152877c8fef1 Mon Sep 17 00:00:00 2001
    From: Jenkins Server 
    Date: Wed, 11 Mar 2026 17:00:13 +0100
    Subject: [PATCH 06/17] Recommit for updates in build 36
    
    ---
     doc/file.README.html                                 |  5 +++++
     doc/index.html                                       |  5 +++++
     ...oid_nrpe_3A_3Acommands_3A_3Adefinition_rules.html | 12 +++++++++++-
     3 files changed, 21 insertions(+), 1 deletion(-)
    
    diff --git a/doc/file.README.html b/doc/file.README.html
    index 4eea7d5..0b2ddd9 100644
    --- a/doc/file.README.html
    +++ b/doc/file.README.html
    @@ -175,11 +175,16 @@
     

    Defining commands is as simple as that:

    confdroid_nrpe::commands::definitions { 'check_users':
    +      ne_check_name     => 'check_users',
           ne_check_cmd      =>  'check_users',
           ne_cmd_argstring  =>  '-w $ARG1$ -c $ARG2$',
         }
     
    +
    +

    Q: ne_check_name is the same as ne_check_cmd, why is that? A: Sometimes the name of the check is different, like this: command[check_fail2ban]=/usr/lib/nagios/plugins/check_procs -c 1:1 -a fail2ban-server

    +
    +

    It is very recommendable to define such commands directly within Puppet modules or profiles, so any node running the particular service controlled by the module will automatically get the required check commands defined as well, while nodes not running the service also do not contain the command check. The same then is true for Nagios checks, so you would have both the NRPE command definition and the Nagios check contained in Puppet modules or profiles to have it in one location.

    SELINUX

    diff --git a/doc/index.html b/doc/index.html index 37ca5f6..efb3c37 100644 --- a/doc/index.html +++ b/doc/index.html @@ -175,11 +175,16 @@

    Defining commands is as simple as that:

    confdroid_nrpe::commands::definitions { 'check_users':
    +      ne_check_name     => 'check_users',
           ne_check_cmd      =>  'check_users',
           ne_cmd_argstring  =>  '-w $ARG1$ -c $ARG2$',
         }
     
    +
    +

    Q: ne_check_name is the same as ne_check_cmd, why is that? A: Sometimes the name of the check is different, like this: command[check_fail2ban]=/usr/lib/nagios/plugins/check_procs -c 1:1 -a fail2ban-server

    +
    +

    It is very recommendable to define such commands directly within Puppet modules or profiles, so any node running the particular service controlled by the module will automatically get the required check commands defined as well, while nodes not running the service also do not contain the command check. The same then is true for Nagios checks, so you would have both the NRPE command definition and the Nagios check contained in Puppet modules or profiles to have it in one location.

    SELINUX

    diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Acommands_3A_3Adefinition_rules.html b/doc/puppet_classes/confdroid_nrpe_3A_3Acommands_3A_3Adefinition_rules.html index 74e07ea..f016a1d 100644 --- a/doc/puppet_classes/confdroid_nrpe_3A_3Acommands_3A_3Adefinition_rules.html +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Acommands_3A_3Adefinition_rules.html @@ -176,7 +176,12 @@ 72 73 74 -75
    +75 +76 +77 +78 +79 +80
    # File 'manifests/commands/definition_rules.pp', line 12
    @@ -213,27 +218,32 @@ class confdroid_nrpe::commands::definition_rules (
         # basic example rules
     
         confdroid_nrpe::commands::definitions { 'check_users':
    +      ne_check_name    => 'check_users',
           ne_check_cmd     => 'check_users',
           ne_cmd_argstring => '-w $ARG1$ -c $ARG2$',
           ne_cmd_comment   => 'check the amount of user logged in locally',
         }
     
         confdroid_nrpe::commands::definitions { 'check_load':
    +      ne_check_name    => 'check_load',
           ne_check_cmd     => 'check_load',
           ne_cmd_argstring => '-w $ARG1$ -c $ARG2$',
         }
     
         confdroid_nrpe::commands::definitions { 'check_disk':
    +      ne_check_name    => 'check_disk',
           ne_check_cmd     => 'check_disk',
           ne_cmd_argstring => '-w $ARG1$ -c $ARG2$ -p $ARG3$',
         }
     
         confdroid_nrpe::commands::definitions { 'check_procs':
    +      ne_check_name    => 'check_procs',
           ne_check_cmd     => 'check_procs',
           ne_cmd_argstring => '-w $ARG1$ -c $ARG2$ -s $ARG3$',
         }
     
         confdroid_nrpe::commands::definitions { 'check_swap':
    +      ne_check_name    => 'check_swap',
           ne_check_cmd     => 'check_swap',
           ne_cmd_argstring => '-w $ARG1$ -c $ARG2$',
         }
    
    From 2e25ceab8df75fde080ab851ed7cda82fa3ed387 Mon Sep 17 00:00:00 2001
    From: Jenkins Server 
    Date: Thu, 12 Mar 2026 13:07:17 +0100
    Subject: [PATCH 07/17] Recommit for updates in build 37
    
    ---
     doc/file.README.html | 2 +-
     doc/index.html       | 2 +-
     2 files changed, 2 insertions(+), 2 deletions(-)
    
    diff --git a/doc/file.README.html b/doc/file.README.html
    index 0b2ddd9..ac497f4 100644
    --- a/doc/file.README.html
    +++ b/doc/file.README.html
    @@ -60,7 +60,7 @@
           

    Readme

    -

    +

    • Readme

    • diff --git a/doc/index.html b/doc/index.html index efb3c37..466bc14 100644 --- a/doc/index.html +++ b/doc/index.html @@ -60,7 +60,7 @@

      Readme

      -

      +

      • Readme

      • From 4f9d2b08a34728eac475a501b2f87e5834b56610 Mon Sep 17 00:00:00 2001 From: Jenkins Server Date: Thu, 12 Mar 2026 13:11:39 +0100 Subject: [PATCH 08/17] Recommit for updates in build 38 --- doc/file.README.html | 2 +- doc/index.html | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/doc/file.README.html b/doc/file.README.html index ac497f4..8a939b6 100644 --- a/doc/file.README.html +++ b/doc/file.README.html @@ -60,7 +60,7 @@

        Readme

        -

        +

        • Readme

        • diff --git a/doc/index.html b/doc/index.html index 466bc14..231eb78 100644 --- a/doc/index.html +++ b/doc/index.html @@ -60,7 +60,7 @@

          Readme

          -

          +

          • Readme

          • From f56c1c9279c8d827cc3d641cf153989cf2f0d55a Mon Sep 17 00:00:00 2001 From: Jenkins Server Date: Sun, 15 Mar 2026 14:51:10 +0100 Subject: [PATCH 09/17] Recommit for updates in build 41 --- doc/file.README.html | 8 +- doc/index.html | 8 +- .../confdroid_nrpe_3A_3Amain_3A_3Afiles.html | 58 +++++++- .../confdroid_nrpe_3A_3Aparams.html | 134 ++++++++++++------ 4 files changed, 160 insertions(+), 48 deletions(-) diff --git a/doc/file.README.html b/doc/file.README.html index 8a939b6..d6ed910 100644 --- a/doc/file.README.html +++ b/doc/file.README.html @@ -78,6 +78,8 @@
          • Managing Check Commands

          • +

            managing TLS serts

            +
          • SELINUX

          • Known Problems

            @@ -101,7 +103,9 @@

            WARNING

            -

            Attention: Never use this puppet module on systems which have been previously configured manually. It is impossible to predict how and what would have been configured, hence previous configurations outside the scope of this module may be overwritten! Automated configurations require a test environment to verify that the module suits the purpose intended by the user, as well as tune the parameters, before deploying into live production

            +
            +

            Attention: Never use this puppet module on systems which have been previously configured manually. It is impossible to predict how and what would have been configured, hence previous configurations outside the scope of this module may be overwritten! Automated configurations require a test environment to verify that the module suits the purpose intended by the user, as well as tune the parameters, before deploying into live production

            +

            Features

            • @@ -187,6 +191,8 @@

              It is very recommendable to define such commands directly within Puppet modules or profiles, so any node running the particular service controlled by the module will automatically get the required check commands defined as well, while nodes not running the service also do not contain the command check. The same then is true for Nagios checks, so you would have both the NRPE command definition and the Nagios check contained in Puppet modules or profiles to have it in one location.

              +

              managing TLS serts

              +

              SELINUX

              All files and directories are configured with correct selinux context. If selinux is disabled, these contexts are ignored.

              diff --git a/doc/index.html b/doc/index.html index 231eb78..61f9ed0 100644 --- a/doc/index.html +++ b/doc/index.html @@ -78,6 +78,8 @@
            • Managing Check Commands

            • +

              managing TLS serts

              +
            • SELINUX

            • Known Problems

              @@ -101,7 +103,9 @@

              WARNING

              -

              Attention: Never use this puppet module on systems which have been previously configured manually. It is impossible to predict how and what would have been configured, hence previous configurations outside the scope of this module may be overwritten! Automated configurations require a test environment to verify that the module suits the purpose intended by the user, as well as tune the parameters, before deploying into live production

              +
              +

              Attention: Never use this puppet module on systems which have been previously configured manually. It is impossible to predict how and what would have been configured, hence previous configurations outside the scope of this module may be overwritten! Automated configurations require a test environment to verify that the module suits the purpose intended by the user, as well as tune the parameters, before deploying into live production

              +

              Features

              • @@ -187,6 +191,8 @@

                It is very recommendable to define such commands directly within Puppet modules or profiles, so any node running the particular service controlled by the module will automatically get the required check commands defined as well, while nodes not running the service also do not contain the command check. The same then is true for Nagios checks, so you would have both the NRPE command definition and the Nagios check contained in Puppet modules or profiles to have it in one location.

                +

                managing TLS serts

                +

                SELINUX

                All files and directories are configured with correct selinux context. If selinux is disabled, these contexts are ignored.

                diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Afiles.html b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Afiles.html index c211ec4..dd9f2bd 100644 --- a/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Afiles.html +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Afiles.html @@ -168,7 +168,35 @@ 70 71 72 -73
    +73 +74 +75 +76 +77 +78 +79 +80 +81 +82 +83 +84 +85 +86 +87 +88 +89 +90 +91 +92 +93 +94 +95 +96 +97 +98 +99 +100 +101
    # File 'manifests/main/files.pp', line 6
    @@ -239,6 +267,34 @@ class confdroid_nrpe::main::files (
           content  => template($ne_nrpe_te_erb),
           notify   => Exec['create_nrpe_pp'],
         }
    +
    +    # file for ssl certificate
    +    if $ne_enable_ssl == true {
    +      file { $ne_ssl_cert_file:
    +        ensure   => file,
    +        path     => $ne_ssl_cert_file,
    +        owner    => 'root',
    +        group    => 'root',
    +        mode     => '0644',
    +        selrange => s0,
    +        selrole  => object_r,
    +        seltype  => cert_t,
    +        seluser  => system_u,
    +        content  => template($ne_ssl_cert_erb),
    +      }
    +      file { $ne_ssl_privatekey_file:
    +        ensure   => file,
    +        path     => $ne_ssl_privatekey_file,
    +        owner    => 'root',
    +        group    => 'root',
    +        mode     => '0600',
    +        selrange => s0,
    +        selrole  => object_r,
    +        seltype  => cert_t,
    +        seluser  => system_u,
    +        content  => template($ne_ssl_privatekey_erb),
    +      }
    +    }
       }
     }
    diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html index a694a87..632eb73 100644 --- a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html @@ -741,6 +741,42 @@ inherited by all classes except defines. —

    Whether to manage command rules for NRPE checks, to allow dynamic check & command rules.

    +
    + + + +
  • + + ne_ssl_cert_pem + + + (Optional[String]) + + + (defaults to: undef) + + + — +
    +

    Optional parameter to specify the content of the nagios server ssl certificate. This is used for the nagios server certificate and has to be provided via Hiera or ENC. Must be specified if SSL is enabled.

    +
    + +
  • + +
  • + + ne_ssl_privatekey_pem + + + (Optional[String]) + + + (defaults to: undef) + + + — +
    +

    Optional parameter to specify the content of the nagios server ssl private key. This is used for the nagios server private key and has to be provided via Hiera or ENC. Must be specified if SSL is enabled.

  • @@ -763,14 +799,6 @@ inherited by all classes except defines.
     
     
    -78
    -79
    -80
    -81
    -82
    -83
    -84
    -85
     86
     87
     88
    @@ -850,59 +878,73 @@ inherited by all classes except defines.
     162
     163
     164
    -165
    +165 +166 +167 +168 +169 +170 +171 +172 +173 +174 +175 +176 +177 -
    # File 'manifests/params.pp', line 78
    +        
    # File 'manifests/params.pp', line 86
     
     class confdroid_nrpe::params (
     
    -  String $pkg_ensure                 = 'present',
    -  Array $reqpackages                 = ['nrpe','nrpe-selinux','selinux-policy-devel'],
    +  String $pkg_ensure                      = 'present',
    +  Array $reqpackages                      = ['nrpe','nrpe-selinux','selinux-policy-devel'],
     
    -  Boolean $ne_manage_cmds            = true,
    +  Boolean $ne_manage_cmds                 = true,
     
     # NRPE user settings
    -  String $ne_user                    = 'nrpe',
    -  String $ne_user_comment            = 'NRPE service user',
    -  String $ne_user_uid                = '1005',
    -  String $ne_user_home               = '/var/run/nrpe',
    -  Optional[String] $ne_user_groups   = undef,
    -  String $ne_user_shell              = '/sbin/nologin',
    +  String $ne_user                         = 'nrpe',
    +  String $ne_user_comment                 = 'NRPE service user',
    +  String $ne_user_uid                     = '1005',
    +  String $ne_user_home                    = '/var/run/nrpe',
    +  Optional[String] $ne_user_groups        = undef,
    +  String $ne_user_shell                   = '/sbin/nologin',
     
     # nrpe.cfg
    -  String $ne_log_facility            = 'daemon',
    -  String $ne_log_file                = '',
    -  String $ne_debug                   = '0',
    -  String $ne_nrpe_port               = '5666',
    -  String $ne_server_address          = '0.0.0.0',
    -  String $ne_listen_queue_size       = '5',
    -  String $ne_dont_blame_nrpe         = '1',
    -  String $ne_allow_bash_cmd_subst    = '1',
    -  Boolean $ne_allow_sudo             = true,
    -  String $ne_command_prefix          = '/usr/bin/sudo',
    -  String $ne_command_timeout         = '60',
    -  String $ne_connection_timeout      = '300',
    -  String $ne_allow_weak_rnd_seed     = '1',
    -  Boolean $ne_enable_ssl             = false,
    -  String $ne_ssl_version             = 'TLSv2+',
    -  String $ne_ssl_use_adh             = '1',
    -  String $ne_ssl_cipher_list         = 'ALL:!aNULL:!eNULL:!SSLv2:!LOW:!EXP:!RC4:!MD5:@STRENGTH',
    -  String $ne_ssl_cacert_file         = '/etc/pki/tls/certs/ca-chain.crt.pem',
    -  String $ne_ssl_client_certs        = '2',
    -  String $ne_ssl_logging             = '0x00',
    -  Array $ne_nasty_metachars          = ["|`&><'\\[]{};\r\n"],
    -  String $ne_include_file            = '',
    +  String $ne_log_facility                 = 'daemon',
    +  String $ne_log_file                     = '',
    +  String $ne_debug                        = '0',
    +  String $ne_nrpe_port                    = '5666',
    +  String $ne_server_address               = '0.0.0.0',
    +  String $ne_listen_queue_size            = '5',
    +  String $ne_dont_blame_nrpe              = '1',
    +  String $ne_allow_bash_cmd_subst         = '1',
    +  Boolean $ne_allow_sudo                  = true,
    +  String $ne_command_prefix               = '/usr/bin/sudo',
    +  String $ne_command_timeout              = '60',
    +  String $ne_connection_timeout           = '300',
    +  String $ne_allow_weak_rnd_seed          = '1',
    +  Boolean $ne_enable_ssl                  = false,
    +  String $ne_ssl_version                  = 'TLSv2+',
    +  String $ne_ssl_use_adh                  = '1',
    +  String $ne_ssl_cipher_list              = 'ALL:!aNULL:!eNULL:!SSLv2:!LOW:!EXP:!RC4:!MD5:@STRENGTH',
    +  String $ne_ssl_cacert_file              = '/etc/pki/tls/certs/ca-chain.crt.pem',
    +  String $ne_ssl_client_certs             = '2',
    +  String $ne_ssl_logging                  = '0x00',
    +  Array $ne_nasty_metachars               = ["|`&><'\\[]{};\r\n"],
    +  String $ne_include_file                 = '',
    +  Optional[String] $ne_ssl_cert_pem       = undef,
    +  Optional[String] $ne_ssl_privatekey_pem = undef,
     
     # nrpe.conf
    -  String $ne_ssl_opts                = '',
    +  String $ne_ssl_opts                     = '',
     
     # firewall
    -  Boolean $ne_incl_fw                = true,
    -  String $ne_fw_order_no             = '50',
    +  Boolean $ne_incl_fw                     = true,
    +  String $ne_fw_order_no                  = '50',
     
     # selinux
    -  Boolean $ne_include_selinux        = true,
    +  Boolean $ne_include_selinux             = true,
     
     ) {
     # Default facts
    @@ -938,7 +980,9 @@ class confdroid_nrpe::params (
       $ne_nrpe_pp_file            = "${ne_main_conf_d_dir}/nrpe.pp"
       $ne_semodule_erb            =  'confdroid_nrpe/semodule_nrpe.erb'
       $ne_ssl_cert_file           = "/etc/pki/tls/certs/${fqdn}.crt.pem"
    +  $ne_ssl_cert_erb            = 'confdroid_nrpe/ssl_cert.erb'
       $ne_ssl_privatekey_file     = "/etc/pki/tls/private/${fqdn}.key.pem"
    +  $ne_ssl_privatekey_erb      = 'confdroid_nrpe/ssl_privatekey.erb'
     
     # includes must be last
       include confdroid_nrpe::main::config
    
    From 0e9740a5abc46a1464158688c15b5d3c83ec39eb Mon Sep 17 00:00:00 2001
    From: Jenkins Server 
    Date: Sun, 15 Mar 2026 15:05:49 +0100
    Subject: [PATCH 10/17] Recommit for updates in build 42
    
    ---
     doc/file.README.html                          |  4 +--
     doc/index.html                                |  4 +--
     .../confdroid_nrpe_3A_3Amain_3A_3Afiles.html  | 26 +++++++++++++-
     .../confdroid_nrpe_3A_3Aparams.html           | 34 ++++++++++++++++---
     4 files changed, 58 insertions(+), 10 deletions(-)
    
    diff --git a/doc/file.README.html b/doc/file.README.html
    index d6ed910..43c5656 100644
    --- a/doc/file.README.html
    +++ b/doc/file.README.html
    @@ -78,7 +78,7 @@
     
  • Managing Check Commands

  • -

    managing TLS serts

    +

    managing TLS certificates

  • SELINUX

  • @@ -191,7 +191,7 @@

    It is very recommendable to define such commands directly within Puppet modules or profiles, so any node running the particular service controlled by the module will automatically get the required check commands defined as well, while nodes not running the service also do not contain the command check. The same then is true for Nagios checks, so you would have both the NRPE command definition and the Nagios check contained in Puppet modules or profiles to have it in one location.

    -

    managing TLS serts

    +

    managing TLS certificates

    SELINUX

    diff --git a/doc/index.html b/doc/index.html index 61f9ed0..1545482 100644 --- a/doc/index.html +++ b/doc/index.html @@ -78,7 +78,7 @@
  • Managing Check Commands

  • -

    managing TLS serts

    +

    managing TLS certificates

  • SELINUX

  • @@ -191,7 +191,7 @@

    It is very recommendable to define such commands directly within Puppet modules or profiles, so any node running the particular service controlled by the module will automatically get the required check commands defined as well, while nodes not running the service also do not contain the command check. The same then is true for Nagios checks, so you would have both the NRPE command definition and the Nagios check contained in Puppet modules or profiles to have it in one location.

    -

    managing TLS serts

    +

    managing TLS certificates

    SELINUX

    diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Afiles.html b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Afiles.html index dd9f2bd..f96d40b 100644 --- a/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Afiles.html +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Afiles.html @@ -196,7 +196,19 @@ 98 99 100 -101
  • +101 +102 +103 +104 +105 +106 +107 +108 +109 +110 +111 +112 +113
    # File 'manifests/main/files.pp', line 6
    @@ -294,6 +306,18 @@ class confdroid_nrpe::main::files (
             seluser  => system_u,
             content  => template($ne_ssl_privatekey_erb),
           }
    +      file { $ne_ssl_ca_cert_file:
    +        ensure   => file,
    +        path     => $ne_ssl_ca_cert_file,
    +        owner    => 'root',
    +        group    => 'root',
    +        mode     => '0644',
    +        selrange => s0,
    +        selrole  => object_r,
    +        seltype  => cert_t,
    +        seluser  => system_u,
    +        content  => template($ne_ssl_ca_cert_erb),
    +      }
         }
       }
     }
    diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html index 632eb73..5d42b30 100644 --- a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html @@ -777,6 +777,24 @@ inherited by all classes except defines. —

    Optional parameter to specify the content of the nagios server ssl private key. This is used for the nagios server private key and has to be provided via Hiera or ENC. Must be specified if SSL is enabled.

    +
    + + + +
  • + + ne_ssl_ca_cert_pem + + + (Optional[String]) + + + (defaults to: undef) + + + — +
    +

    Optional parameter to specify the content of the CA certificate. This is used for the CA certificate and has to be provided via Hiera or ENC. Must be specified if SSL is enabled.

  • @@ -799,9 +817,6 @@ inherited by all classes except defines.
     
     
    -86
    -87
    -88
     89
     90
     91
    @@ -890,10 +905,16 @@ inherited by all classes except defines.
     174
     175
     176
    -177
    +177 +178 +179 +180 +181 +182 +183 -
    # File 'manifests/params.pp', line 86
    +        
    # File 'manifests/params.pp', line 89
     
     class confdroid_nrpe::params (
     
    @@ -935,6 +956,7 @@ class confdroid_nrpe::params (
       String $ne_include_file                 = '',
       Optional[String] $ne_ssl_cert_pem       = undef,
       Optional[String] $ne_ssl_privatekey_pem = undef,
    +  Optional[String] $ne_ssl_ca_cert_pem    = undef,
     
     # nrpe.conf
       String $ne_ssl_opts                     = '',
    @@ -983,6 +1005,8 @@ class confdroid_nrpe::params (
       $ne_ssl_cert_erb            = 'confdroid_nrpe/ssl_cert.erb'
       $ne_ssl_privatekey_file     = "/etc/pki/tls/private/${fqdn}.key.pem"
       $ne_ssl_privatekey_erb      = 'confdroid_nrpe/ssl_privatekey.erb'
    +  $ne_ssl_ca_cert_file        = "/etc/pki/tls/certs/${fqdn}-ca-chain.crt.pem"
    +  $ne_ssl_ca_cert_erb         = 'confdroid_nrpe/ssl_ca_cert.erb'
     
     # includes must be last
       include confdroid_nrpe::main::config
    
    From 34c682d3b4b0160a3a22a606be6713ad5304feaf Mon Sep 17 00:00:00 2001
    From: Jenkins Server 
    Date: Sun, 15 Mar 2026 15:15:13 +0100
    Subject: [PATCH 11/17] Recommit for updates in build 43
    
    ---
     doc/file.README.html                          | 14 +++-
     doc/index.html                                | 14 +++-
     .../confdroid_nrpe_3A_3Amain_3A_3Afiles.html  | 80 +++++++++----------
     .../confdroid_nrpe_3A_3Aparams.html           |  4 +-
     4 files changed, 63 insertions(+), 49 deletions(-)
    
    diff --git a/doc/file.README.html b/doc/file.README.html
    index 43c5656..6b00b41 100644
    --- a/doc/file.README.html
    +++ b/doc/file.README.html
    @@ -193,14 +193,22 @@
     
     

    managing TLS certificates

    +

    When ne_enable_ssl is enabled (default), the certificates for the ca (root if standalone or intermediate), the nagios server and the key for the nagios server have to be provided through the following values:

    +
    • +

      ne_ssl_ca_cert_pem

      +
    • +

      ne_ssl_cert_pem

      +
    • +

      ne_ssl_privatekey_pem

      +
    + +

    via Hiera (if you use it) or ENC.

    +

    SELINUX

    All files and directories are configured with correct selinux context. If selinux is disabled, these contexts are ignored.

    Known Problems

    -
    • -

      SSL/TLS support: Version 3 of NRPE supposedly has support for SSL/ TLs. However, at the time of writing this module, this seems to be buggy, as I was unable to start the NRPE service as soon as the ssl_cert_file line was uncommented in the configuration file, despite having valid certs in the right position on the node. This happened when installing manually, not through this Puppet module. For that reason I included the $ne_enable_ssl boolean parameter, which is set to false by default, hence disabling SSL/TLS options until this has been fixed upstream, or a valid workaround has been found. Setting this option to true will include all SSL / TLS settings.

      -

    Troubleshooting

    • diff --git a/doc/index.html b/doc/index.html index 1545482..e62cf35 100644 --- a/doc/index.html +++ b/doc/index.html @@ -193,14 +193,22 @@

      managing TLS certificates

      +

      When ne_enable_ssl is enabled (default), the certificates for the ca (root if standalone or intermediate), the nagios server and the key for the nagios server have to be provided through the following values:

      +
      • +

        ne_ssl_ca_cert_pem

        +
      • +

        ne_ssl_cert_pem

        +
      • +

        ne_ssl_privatekey_pem

        +
      + +

      via Hiera (if you use it) or ENC.

      +

      SELINUX

      All files and directories are configured with correct selinux context. If selinux is disabled, these contexts are ignored.

      Known Problems

      -
      • -

        SSL/TLS support: Version 3 of NRPE supposedly has support for SSL/ TLs. However, at the time of writing this module, this seems to be buggy, as I was unable to start the NRPE service as soon as the ssl_cert_file line was uncommented in the configuration file, despite having valid certs in the right position on the node. This happened when installing manually, not through this Puppet module. For that reason I included the $ne_enable_ssl boolean parameter, which is set to false by default, hence disabling SSL/TLS options until this has been fixed upstream, or a valid workaround has been found. Setting this option to true will include all SSL / TLS settings.

        -

      Troubleshooting

      • diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Afiles.html b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Afiles.html index f96d40b..b4fd1bb 100644 --- a/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Afiles.html +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Afiles.html @@ -207,8 +207,7 @@ 109 110 111 -112 -113
    +112
    # File 'manifests/main/files.pp', line 6
    @@ -251,7 +250,6 @@ class confdroid_nrpe::main::files (
       }
     
       if $ne_allow_sudo == true {
    -
         file { $ne_sudo_file:
           ensure   => file,
           path     => $ne_sudo_file,
    @@ -279,45 +277,45 @@ class confdroid_nrpe::main::files (
           content  => template($ne_nrpe_te_erb),
           notify   => Exec['create_nrpe_pp'],
         }
    +  }
     
    -    # file for ssl certificate
    -    if $ne_enable_ssl == true {
    -      file { $ne_ssl_cert_file:
    -        ensure   => file,
    -        path     => $ne_ssl_cert_file,
    -        owner    => 'root',
    -        group    => 'root',
    -        mode     => '0644',
    -        selrange => s0,
    -        selrole  => object_r,
    -        seltype  => cert_t,
    -        seluser  => system_u,
    -        content  => template($ne_ssl_cert_erb),
    -      }
    -      file { $ne_ssl_privatekey_file:
    -        ensure   => file,
    -        path     => $ne_ssl_privatekey_file,
    -        owner    => 'root',
    -        group    => 'root',
    -        mode     => '0600',
    -        selrange => s0,
    -        selrole  => object_r,
    -        seltype  => cert_t,
    -        seluser  => system_u,
    -        content  => template($ne_ssl_privatekey_erb),
    -      }
    -      file { $ne_ssl_ca_cert_file:
    -        ensure   => file,
    -        path     => $ne_ssl_ca_cert_file,
    -        owner    => 'root',
    -        group    => 'root',
    -        mode     => '0644',
    -        selrange => s0,
    -        selrole  => object_r,
    -        seltype  => cert_t,
    -        seluser  => system_u,
    -        content  => template($ne_ssl_ca_cert_erb),
    -      }
    +  # file for ssl certificate
    +  if $ne_enable_ssl == true {
    +    file { $ne_ssl_cert_file:
    +      ensure   => file,
    +      path     => $ne_ssl_cert_file,
    +      owner    => 'root',
    +      group    => 'root',
    +      mode     => '0644',
    +      selrange => s0,
    +      selrole  => object_r,
    +      seltype  => cert_t,
    +      seluser  => system_u,
    +      content  => template($ne_ssl_cert_erb),
    +    }
    +    file { $ne_ssl_privatekey_file:
    +      ensure   => file,
    +      path     => $ne_ssl_privatekey_file,
    +      owner    => 'root',
    +      group    => 'root',
    +      mode     => '0600',
    +      selrange => s0,
    +      selrole  => object_r,
    +      seltype  => cert_t,
    +      seluser  => system_u,
    +      content  => template($ne_ssl_privatekey_erb),
    +    }
    +    file { $ne_ssl_ca_cert_file:
    +      ensure   => file,
    +      path     => $ne_ssl_ca_cert_file,
    +      owner    => 'root',
    +      group    => 'root',
    +      mode     => '0644',
    +      selrange => s0,
    +      selrole  => object_r,
    +      seltype  => cert_t,
    +      seluser  => system_u,
    +      content  => template($ne_ssl_ca_cert_erb),
         }
       }
     }
    diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html index 5d42b30..d69bad7 100644 --- a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html @@ -699,7 +699,7 @@ inherited by all classes except defines. (Boolean) - (defaults to: false) + (defaults to: true) — @@ -945,7 +945,7 @@ class confdroid_nrpe::params ( String $ne_command_timeout = '60', String $ne_connection_timeout = '300', String $ne_allow_weak_rnd_seed = '1', - Boolean $ne_enable_ssl = false, + Boolean $ne_enable_ssl = true, String $ne_ssl_version = 'TLSv2+', String $ne_ssl_use_adh = '1', String $ne_ssl_cipher_list = 'ALL:!aNULL:!eNULL:!SSLv2:!LOW:!EXP:!RC4:!MD5:@STRENGTH', From 3b89f52ca31434c8c71913cfab18a7c8bd07e5fa Mon Sep 17 00:00:00 2001 From: Jenkins Server Date: Sun, 15 Mar 2026 15:32:55 +0100 Subject: [PATCH 12/17] Recommit for updates in build 46 --- doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html index d69bad7..cf72525 100644 --- a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html @@ -1001,11 +1001,11 @@ class confdroid_nrpe::params ( $ne_checkmodule_nrpe_erb = 'confdroid_nrpe/checkmodule_nrpe.erb' $ne_nrpe_pp_file = "${ne_main_conf_d_dir}/nrpe.pp" $ne_semodule_erb = 'confdroid_nrpe/semodule_nrpe.erb' - $ne_ssl_cert_file = "/etc/pki/tls/certs/${fqdn}.crt.pem" + $ne_ssl_cert_file = '/etc/pki/tls/certs/nagios.crt.pem' $ne_ssl_cert_erb = 'confdroid_nrpe/ssl_cert.erb' - $ne_ssl_privatekey_file = "/etc/pki/tls/private/${fqdn}.key.pem" + $ne_ssl_privatekey_file = '/etc/pki/tls/private/nagios.key.pem' $ne_ssl_privatekey_erb = 'confdroid_nrpe/ssl_privatekey.erb' - $ne_ssl_ca_cert_file = "/etc/pki/tls/certs/${fqdn}-ca-chain.crt.pem" + $ne_ssl_ca_cert_file = '/etc/pki/tls/certs/ca-chain.crt.pem' $ne_ssl_ca_cert_erb = 'confdroid_nrpe/ssl_ca_cert.erb' # includes must be last From b072b05d4723081c9c2fc64961e0759f8896b8ed Mon Sep 17 00:00:00 2001 From: Jenkins Server Date: Sun, 15 Mar 2026 15:44:22 +0100 Subject: [PATCH 13/17] Recommit for updates in build 47 --- doc/file.README.html | 4 ++-- doc/index.html | 4 ++-- doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html | 4 ++-- 3 files changed, 6 insertions(+), 6 deletions(-) diff --git a/doc/file.README.html b/doc/file.README.html index 6b00b41..38f8df9 100644 --- a/doc/file.README.html +++ b/doc/file.README.html @@ -193,7 +193,7 @@

    managing TLS certificates

    -

    When ne_enable_ssl is enabled (default), the certificates for the ca (root if standalone or intermediate), the nagios server and the key for the nagios server have to be provided through the following values:

    +

    When ne_enable_ssl is enabled, the certificates for the ca (root if standalone or intermediate), the nagios server and the key for the nagios server have to be provided through the following values:

    • ne_ssl_ca_cert_pem

    • @@ -202,7 +202,7 @@

      ne_ssl_privatekey_pem

    -

    via Hiera (if you use it) or ENC.

    +

    via Hiera (if you use it) or ENC. At the ENC need to add confdroid_nrpe::params and set those values.

    SELINUX

    diff --git a/doc/index.html b/doc/index.html index e62cf35..7b7bc90 100644 --- a/doc/index.html +++ b/doc/index.html @@ -193,7 +193,7 @@

    managing TLS certificates

    -

    When ne_enable_ssl is enabled (default), the certificates for the ca (root if standalone or intermediate), the nagios server and the key for the nagios server have to be provided through the following values:

    +

    When ne_enable_ssl is enabled, the certificates for the ca (root if standalone or intermediate), the nagios server and the key for the nagios server have to be provided through the following values:

    • ne_ssl_ca_cert_pem

    • @@ -202,7 +202,7 @@

      ne_ssl_privatekey_pem

    -

    via Hiera (if you use it) or ENC.

    +

    via Hiera (if you use it) or ENC. At the ENC need to add confdroid_nrpe::params and set those values.

    SELINUX

    diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html index cf72525..862050c 100644 --- a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html @@ -699,7 +699,7 @@ inherited by all classes except defines. (Boolean) - (defaults to: true) + (defaults to: false) — @@ -945,7 +945,7 @@ class confdroid_nrpe::params ( String $ne_command_timeout = '60', String $ne_connection_timeout = '300', String $ne_allow_weak_rnd_seed = '1', - Boolean $ne_enable_ssl = true, + Boolean $ne_enable_ssl = false, String $ne_ssl_version = 'TLSv2+', String $ne_ssl_use_adh = '1', String $ne_ssl_cipher_list = 'ALL:!aNULL:!eNULL:!SSLv2:!LOW:!EXP:!RC4:!MD5:@STRENGTH', From 6d7de7757332146793bfcf7978f6ce79214f3c15 Mon Sep 17 00:00:00 2001 From: Jenkins Server Date: Sun, 15 Mar 2026 15:47:02 +0100 Subject: [PATCH 14/17] Recommit for updates in build 48 --- doc/file.README.html | 2 ++ doc/index.html | 2 ++ 2 files changed, 4 insertions(+) diff --git a/doc/file.README.html b/doc/file.README.html index 38f8df9..05882ad 100644 --- a/doc/file.README.html +++ b/doc/file.README.html @@ -204,6 +204,8 @@

    via Hiera (if you use it) or ENC. At the ENC need to add confdroid_nrpe::params and set those values.

    +

    If you don’t need TLS encryption, leave ne_enable_ssl to the default value of false.

    +

    SELINUX

    All files and directories are configured with correct selinux context. If selinux is disabled, these contexts are ignored.

    diff --git a/doc/index.html b/doc/index.html index 7b7bc90..4d969b8 100644 --- a/doc/index.html +++ b/doc/index.html @@ -204,6 +204,8 @@

    via Hiera (if you use it) or ENC. At the ENC need to add confdroid_nrpe::params and set those values.

    +

    If you don’t need TLS encryption, leave ne_enable_ssl to the default value of false.

    +

    SELINUX

    All files and directories are configured with correct selinux context. If selinux is disabled, these contexts are ignored.

    From e69d85103f62c424152b83c81428f5dedd8c3f6e Mon Sep 17 00:00:00 2001 From: Jenkins Server Date: Sun, 15 Mar 2026 16:02:49 +0100 Subject: [PATCH 15/17] Recommit for updates in build 50 --- .../confdroid_nrpe_3A_3Aparams.html | 28 +++---------------- 1 file changed, 4 insertions(+), 24 deletions(-) diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html index 862050c..de4c1dd 100644 --- a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html @@ -403,24 +403,6 @@ inherited by all classes except defines. -
  • - - ne_ssl_cacert_file - - - (String) - - - (defaults to: '/etc/pki/tls/certs/ca-chain.crt.pem') - - - — -
    -

    path and name of the ssl certificate authority (ca) file / chain. must be full path.

    -
    - -
  • -
  • ne_ssl_client_certs @@ -817,6 +799,8 @@ inherited by all classes except defines.
     
     
    +87
    +88
     89
     90
     91
    @@ -908,13 +892,10 @@ inherited by all classes except defines.
     177
     178
     179
    -180
    -181
    -182
    -183
    +180 -
    # File 'manifests/params.pp', line 89
    +        
    # File 'manifests/params.pp', line 87
     
     class confdroid_nrpe::params (
     
    @@ -949,7 +930,6 @@ class confdroid_nrpe::params (
       String $ne_ssl_version                  = 'TLSv2+',
       String $ne_ssl_use_adh                  = '1',
       String $ne_ssl_cipher_list              = 'ALL:!aNULL:!eNULL:!SSLv2:!LOW:!EXP:!RC4:!MD5:@STRENGTH',
    -  String $ne_ssl_cacert_file              = '/etc/pki/tls/certs/ca-chain.crt.pem',
       String $ne_ssl_client_certs             = '2',
       String $ne_ssl_logging                  = '0x00',
       Array $ne_nasty_metachars               = ["|`&><'\\[]{};\r\n"],
    
    From 0de9773a439eb820b1f118c0495cb4428a8a48eb Mon Sep 17 00:00:00 2001
    From: Jenkins Server 
    Date: Sun, 15 Mar 2026 16:30:53 +0100
    Subject: [PATCH 16/17] Recommit for updates in build 51
    
    ---
     .../confdroid_nrpe_3A_3Amain_3A_3Adirs.html   | 30 +++++++++++++-
     .../confdroid_nrpe_3A_3Aparams.html           | 40 +++++--------------
     2 files changed, 40 insertions(+), 30 deletions(-)
    
    diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Adirs.html b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Adirs.html
    index 2d29ec8..79aa6ad 100644
    --- a/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Adirs.html
    +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Amain_3A_3Adirs.html
    @@ -131,7 +131,21 @@
     33
     34
     35
    -36
    +36 +37 +38 +39 +40 +41 +42 +43 +44 +45 +46 +47 +48 +49 +50
    # File 'manifests/main/dirs.pp', line 6
    @@ -166,6 +180,20 @@ class confdroid_nrpe::main::dirs (
         seltype  => var_run_t,
         seluser  => system_u,
       }
    +
    +  if $ne_enable_ssl {
    +    file { $ne_servercert_dir:
    +      ensure   => directory,
    +      path     => $ne_servercert_dir,
    +      owner    => 'root',
    +      group    => 'root',
    +      mode     => '0755',
    +      selrange => s0,
    +      selrole  => object_r,
    +      seltype  => cert_t,
    +      seluser  => system_u,
    +    }
    +  }
     }
    diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html index de4c1dd..a9732cc 100644 --- a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html @@ -367,24 +367,6 @@ inherited by all classes except defines.
  • -
  • - - ne_ssl_use_adh - - - (String) - - - (defaults to: '1') - - - — -
    -

    This is for backward compatibility and is DEPRECATED. Set to 1 to enable ADH or 2 to require ADH. 1 is currently the default but will be changed in a later version.

    -
    - -
  • -
  • ne_ssl_cipher_list @@ -411,7 +393,7 @@ inherited by all classes except defines. (String) - (defaults to: '2') + (defaults to: '0') — @@ -799,6 +781,9 @@ inherited by all classes except defines.
     
     
    +84
    +85
    +86
     87
     88
     89
    @@ -889,13 +874,10 @@ inherited by all classes except defines.
     174
     175
     176
    -177
    -178
    -179
    -180
    +177 -
    # File 'manifests/params.pp', line 87
    +        
    # File 'manifests/params.pp', line 84
     
     class confdroid_nrpe::params (
     
    @@ -928,9 +910,8 @@ class confdroid_nrpe::params (
       String $ne_allow_weak_rnd_seed          = '1',
       Boolean $ne_enable_ssl                  = false,
       String $ne_ssl_version                  = 'TLSv2+',
    -  String $ne_ssl_use_adh                  = '1',
       String $ne_ssl_cipher_list              = 'ALL:!aNULL:!eNULL:!SSLv2:!LOW:!EXP:!RC4:!MD5:@STRENGTH',
    -  String $ne_ssl_client_certs             = '2',
    +  String $ne_ssl_client_certs             = '0',
       String $ne_ssl_logging                  = '0x00',
       Array $ne_nasty_metachars               = ["|`&><'\\[]{};\r\n"],
       String $ne_include_file                 = '',
    @@ -963,6 +944,7 @@ class confdroid_nrpe::params (
     # directories
       $ne_main_conf_d_dir         = '/etc/nrpe.d'
       $ne_run_dir                 = '/var/run/nrpe'
    +  $ne_servercert_dir           = '/etc/pki/tls/servercerts'
     
     # files
       $ne_main_conf_file          = '/etc/nagios/nrpe.cfg'
    @@ -981,11 +963,11 @@ class confdroid_nrpe::params (
       $ne_checkmodule_nrpe_erb    = 'confdroid_nrpe/checkmodule_nrpe.erb'
       $ne_nrpe_pp_file            = "${ne_main_conf_d_dir}/nrpe.pp"
       $ne_semodule_erb            =  'confdroid_nrpe/semodule_nrpe.erb'
    -  $ne_ssl_cert_file           = '/etc/pki/tls/certs/nagios.crt.pem'
    +  $ne_ssl_cert_file           = "${ne_servercert_dir}/nagios-crt.pem"
       $ne_ssl_cert_erb            = 'confdroid_nrpe/ssl_cert.erb'
    -  $ne_ssl_privatekey_file     = '/etc/pki/tls/private/nagios.key.pem'
    +  $ne_ssl_privatekey_file     = "${ne_servercert_dir}/nagios-key.pem"
       $ne_ssl_privatekey_erb      = 'confdroid_nrpe/ssl_privatekey.erb'
    -  $ne_ssl_ca_cert_file        = '/etc/pki/tls/certs/ca-chain.crt.pem'
    +  $ne_ssl_ca_cert_file        = "${ne_servercert_dir}/ca-cert.pem"
       $ne_ssl_ca_cert_erb         = 'confdroid_nrpe/ssl_ca_cert.erb'
     
     # includes must be last
    
    From ae13e6fde5112071cc04501036142f38ae8ed107 Mon Sep 17 00:00:00 2001
    From: Jenkins Server 
    Date: Sun, 15 Mar 2026 16:36:25 +0100
    Subject: [PATCH 17/17] Recommit for updates in build 52
    
    ---
     doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html | 2 +-
     1 file changed, 1 insertion(+), 1 deletion(-)
    
    diff --git a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html
    index a9732cc..7b6ee33 100644
    --- a/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html
    +++ b/doc/puppet_classes/confdroid_nrpe_3A_3Aparams.html
    @@ -963,7 +963,7 @@ class confdroid_nrpe::params (
       $ne_checkmodule_nrpe_erb    = 'confdroid_nrpe/checkmodule_nrpe.erb'
       $ne_nrpe_pp_file            = "${ne_main_conf_d_dir}/nrpe.pp"
       $ne_semodule_erb            =  'confdroid_nrpe/semodule_nrpe.erb'
    -  $ne_ssl_cert_file           = "${ne_servercert_dir}/nagios-crt.pem"
    +  $ne_ssl_cert_file           = "${ne_servercert_dir}/nagios-cert.pem"
       $ne_ssl_cert_erb            = 'confdroid_nrpe/ssl_cert.erb'
       $ne_ssl_privatekey_file     = "${ne_servercert_dir}/nagios-key.pem"
       $ne_ssl_privatekey_erb      = 'confdroid_nrpe/ssl_privatekey.erb'