mcollective
Version information
This version is compatible with:
- Puppet Enterprise 2018.1.x, 2017.3.x, 2017.2.x, 2016.4.x
- Puppet >= 4.10.0 < 6.0.0
- , , , , , ,
This module has been deprecated by its author since Oct 4th 2024.
The reason given was: Module owner requested to replace the module
The author has suggested choria-choria as its replacement.
Start using this module
Documentation
MCollective module for Puppet
Table of Contents
- Overview
- Module Description - What the module does and why it is useful
- Setup - The basics of getting started with mcollective
- Usage - Configuration options and additional functionality
- Reference - An under-the-hood peek at what the module is doing and how
- Limitations - OS compatibility, etc.
- Development - Guide for contributing to the module
Overview
The mcollective module installs, configures, and manages the mcollective agents, and clients of an MCollective cluster.
Module Description
The mcollective module handles installing and configuring mcollective across a range of operating systems and distributions. Where possible we follow the standards laid down by the MCollective Standard Deployment guide.
MCollective Terminology
A quick aside, mcollective's terminology differs a little from what you might be used to in puppet. There are 3 main components, the client (the mco commands you run to control your servers), the server (a daemon that runs on all of your managed nodes and executes the commands), and the middleware (a message broker the servers and agent connect to).
If it helps to map these to puppet concepts you loosely have:
- Middleware -> Puppet Master
- MCollective Server -> Puppet Agent
- MCollective Client -> no direct equivalent
Setup
What the mcollective module affects
On a server
- mcollective package
- mcollective server configuration file
- mcollective service
On a client
- mcollective-client package
- mcollective client configuration file
- optionally user configuration files (~/.mcollective and ~/.mcollective.d)
Beginning with mcollective
Your main entrypoint to the mcollective module is the mcollective class, so assuming you have your middleware configured on a node this is all you need to add a server to mcollective.
class { '::mcollective':
middleware_hosts => [ 'broker1.example.com' ],
}
Usage
Your primary interaction with the mcollective module will be though the main
mcollective class, with secondary configuration managed by the defined types
mcollective::user
, mcollective::plugin
, mcollective::actionpolicy
, and
mcollective::actionpolicy::rule
.
I just want to run it, what's the minimum I need?
node 'broker1.example.com' {
include activemq
}
node 'server1.example.com' {
class { '::mcollective':
middleware_hosts => [ 'broker1.example.com' ],
}
}
node 'control1.example.com' {
class { '::mcollective':
client => true,
middleware_hosts => [ 'broker1.example.com' ],
}
}
This default install will be using no TLS, a set of well-known usernames and passwords, and the psk securityprovider. This is against the recommendataion of the standard deploy guide but does save you from having to deal with ssl certificates to begin with.
I'd like to secure the transport channel and authenticate users, how do I do that?
Gather some credentials for the server and users. You'll need the ca certificate, and a keypair for the server to use, and a keypair for each user to allow.
See the standard deploy guide for more information about how to generate these.
node 'broker1.example.com' {
# Please see
# https://github.com/voxpupuli/puppet-mcollective/blob/master/examples/ssl_example/mco_profile/manifests/middleware/activemq.pp
# for this as setting up activemq with a truststore can be quite complex.
}
node 'server1.example.com' {
class { '::mcollective':
middleware_hosts => [ 'broker1.example.com' ],
middleware_ssl => true,
middleware_ssl_cert => "/var/lib/puppet/ssl/certs/${::clientcert}.pem",
middleware_ssl_key => "/var/lib/puppet/ssl/private_keys/${::clientcert}.pem",
middleware_ssl_ca => "/var/lib/puppet/ssl/certs/ca.pem",
securityprovider => 'ssl',
ssl_client_certs => 'puppet:///modules/site_mcollective/client_certs',
ssl_ca_cert => 'puppet:///modules/site_mcollective/certs/ca.pem',
ssl_server_public => 'puppet:///modules/site_mcollective/certs/server.pem',
ssl_server_private => 'puppet:///modules/site_mcollective/private_keys/server.pem',
}
mcollective::actionpolicy { 'nrpe':
default => 'deny',
}
mcollective::actionpolicy::rule { 'vagrant user can use nrpe agent':
agent => 'nrpe',
callerid => 'cert=vagrant',
}
}
node 'control.example.com' {
class { '::mcollective':
client => true,
middleware_hosts => [ 'broker1.example.com' ],
middleware_ssl => true,
middleware_ssl_cert => "/var/lib/puppet/ssl/certs/${::clientcert}.pem",
middleware_ssl_key => "/var/lib/puppet/ssl/private_keys/${::clientcert}.pem",
middleware_ssl_ca => "/var/lib/puppet/ssl/certs/ca.pem",
securityprovider => 'ssl',
ssl_client_certs => 'puppet:///modules/site_mcollective/client_certs',
ssl_ca_cert => 'puppet:///modules/site_mcollective/certs/ca.pem',
ssl_server_public => 'puppet:///modules/site_mcollective/certs/server.pem',
ssl_server_private => 'puppet:///modules/site_mcollective/private_keys/server.pem',
}
mcollective::user { 'vagrant':
certificate => 'puppet:///modules/site_mcollective/client_certs/vagrant.pem',
private_key => 'puppet:///modules/site_mcollective/private_keys/vagrant.pem',
}
}
I'd like to secure the transport channel and authenticate users with just their private key, how do I do that?
The Mcollective standard deployment guide uses the 'ssl' securityprovider to handle authentication. If you're interested in performing the authentication without creating SSL certificates for each user, one alternative is to use the 'sshkey' securityprovider. As far as the transport channel encryption goes, it's no different than the above example's use of 'middleware_ssl*' parameters.
Sshkey adds additional flexibility with regards to deployment as it currently supports both a static and a dynamic key management philosophy. You can seperate sshkey from your normal system authentication's backend (known_hosts / authorized_keys) and permit it to send and record its key data for you. If you do this, you should strongly consider using an authorization plugin with mcollective. Alternatively, you can use puppet to enforce the available set of key data to use with requests and responses. Because this could reuse an existing user's ssh private key, it could work along-side your existing user management module.
The use of sshkey is optional. For further information, you can review a sample deployment in the /examples folder, review the sshkey module documentation, and review the sshkeyauth rubygem documentation (helpful for debugging errors).
Reference
The ::mcollective::
class
The mcollective
class is the main entry point to the module. From here you
can configure the behaviour of your mcollective install of server, client, and
middleware.
Parameters
The following parameters are available to the mcollective class:
server
Boolean: defaults to true. Whether to install the mcollective server on this node.
client
Boolean: defaults to false. Whether to install the mcollective client application on this node.
rabbitmq_vhost
String: defaults to '/mcollective'. The vhost to connect to/manage when using rabbitmq middleware.
manage_packages
Boolean: defaults to true. Whether to install mcollective and mcollective- client packages when installing the server and client components.
version
String: defaults to 'present'. What version of packages to ensure
when
mcollective::manage_packages
is true.
client_package
String: defaults to 'mcollective-client'. The name of the package to install for the client part. In the case that there is only one package package handling both, client and server, give the same name for 'client_package' and 'server_package'.
server_package
String: defaults to 'mcollective'. The name of the package to install for the server. In the case that there is only one package package handling both, client and server, give the same name for 'client_package' and 'server_package'.
ruby_stomp_ensure
String: defaults to 'installed'. What version of the ruby-stomp package to
ensure
when mcollective::manage_packages
is true. Only relevant on the
Debian OS family.
main_collective
String: defaults to 'mcollective'. The name of the main collective for this client/server.
collectives
String: defaults to 'mcollective'. Comma seperated list of collectives this server should join.
connector
String: defaults to 'activemq'. Name of the connector plugin to use.
Currently supported are activemq
, rabbitmq
, and redis
securityprovider
String: defaults to 'psk'. Name of the security provider plugin to use. 'ssl' is recommended but requires some additional setup.
psk
String: defaults to 'changemeplease'. Used by the 'psk' security provider as the pre-shared key to secure the collective with.
factsource
String: defaults to 'yaml'. Name of the factsource plugin to use on the server.
fact_cron_splay
Boolean: defaults to false. Spread the cron tasks so that not all the nodes runs the facter cronjob at the exact same time.
yaml_fact_path
String: defaults to '/etc/mcollective/facts.yaml'. Name of the file the 'yaml' factsource plugin should load facts from.
ruby_interpreter
String: defaults to '/usr/bin/env ruby' for non PE installations, and to
'/opt/puppet/bin/ruby' for PE installations. With factsource
'yaml', a ruby
script is installed as cron job, which needs to find the ruby interpreter.
This parameter allows overriding the default interpreter.
classesfile
String: defaults to '/var/lib/puppet/state/classes.txt'. Name of the file the server will load the configuration management class for filtering.
rpcauthprovider
String: defaults to 'action_policy'. Name of the RPC Auth Provider to use on the server.
rpcauditprovider
String: defaults to 'logfile'. Name of the RPC Audit Provider to use on the server.
rpcauditlogfile
String: defaults to '/var/log/mcollective-audit.log'. Name of the audit logfile.
registration
String: defaults to undef. Name of the registration plugin to use on the server.
core_libdir
String: default is based on platform. Path to the core plugins that are installed by the mcollective-common package.
site_libdir
String: default is based on platform. Path to the site-specific plugins that
the mcollective::plugin
type will install with its source
parameter.
This path will be managed and purged by puppet, so don't point it at core_libdir or any other non-dedicated path.
middleware_hosts
Array of strings: defaults to []. Where the middleware servers this client/server should talk to are.
middleware_user
String: defaults to 'mcollective'. Username to use when connecting to the middleware.
middleware_password
String: defaults to 'marionette'. Password to use when connecting to the middleware.
middleware_multiple_ports
Boolean: defaults to false. Wheter to use different ports for each host
defined in middleware_hosts
list.
middleware_port
String: defaults to '61613' (for activemq
). Port number to use when
connecting to the middleware over an unencrypted connection.
middleware_ssl_port
String: defaults to '61614'. Port number to use when connecting to the middleware over a ssl connection.
middleware_ports
Array of strings: defaults to ['61613'] (for activemq
). List of port numbers to use
when connecting to the middleware over an unencrypted connection. Port defined in the
array position i
will be assigned to the host defined in the same position
in middleware_hosts
key.
middleware_ssl_ports
Array of strings: defaults to ['61614']. List of ports numbers to use when connecting to the
middleware over a ssl connection. Port defined in the array position i
will be assigned
to the host defined in the same position in middleware_hosts
key.
middleware_ssl
Boolean: defaults to false. Whether to talk to the middleware over a ssl
protected channel. Highly recommended. Requires mcollective::ssl_ca_cert
,
mcollective::ssl_server_public
, mcollective::ssl_server_private
parameters
for the server/client install.
middleware_admin_user
String: defaults to 'admin'. Username for the middleware admin user.
middleware_admin_password
String: defaults to 'secret'. Password to for the middleware admin user.
server_config_file
String: default is '$confdir/server.cfg'. Path to the server configuration file.
server_logfile
String: defaults to '/var/log/mcollective.log'. Logfile the mcollective server should log to.
server_loglevel
String: defaults to 'info'. Level the mcollective server should log at.
server_daemonize
Boolean: defaults to true. Should the mcollective server daemonize when started.
client_config_file
String: defaults to '$confdir/client.cfg'. Path to the client configuration file.
client_logger_type
String: defaults to 'console'. What type of logger the client should use.
client_loglevel
String: defaults to 'warn'. Level the mcollective client should log at.
ssl_ca_cert
String: defaults to undef. A file source that points to the ca certificate used to manage the ssl keys of the mcollective install.
ssl_server_public
String: defaults to undef. A file source that points to the public key or certificate of the server keypair.
ssl_server_private
String: defaults to undef. A file source that points to the private key of the server keypair.
ssl_client_certs
String: defaults to 'puppet:///modules/mcollective/empty'. A file source that contains a directory of user certificates which are used by the ssl security provider in authenticating user requests.
sshkey_server_learn_public_keys
Boolean: defaults to false. Allow writing sshkey public keys to
sshkey_server_publickey_dir
.
sshkey_server_overwrite_stored_keys
Boolean: defaults to false. Overwrite learned keys.
sshkey_server_publickey_dir
String: defaults to ${confdir}/sshkey_pubdir
. Directory to store
received keys
sshkey_server_private_key
String: defaults to '/etc/ssh/ssh_host_rsa_key'. The private key used to sign replies with.
sshkey_server_authorized_keys
String: defaults to undefined. The authorized_key file to use. Undefined is interpreted by sshkey to mean the caller's authorized key file.
sshkey_server_send_key
String: defaults to undefined. Specifies the public key sent back with the response for validation. You probably want '/etc/ssh/ssh_host_rsa_key.pub'.
mcollective::user
defined type
mcollective::user
installs a client configuration and any needed client
certificates in a users home directory.
Parameters
username
String: defaults to $name. The username of the user to install for.
group
String: defaults to $name. The group of the user to install for.
homedir
String: defaults to "/home/${name}". The home directory of the user to install for.
certificate
String: defaults to undef. A file source for the certificate of the user.
Used by the 'ssl' securityprovider to set the identity of the user. This is
mutually exclusive with certificate_content
.
certificate_content
String: defaults to undef. The file content for the certificate of the user.
Used by the 'ssl' securityprovider to set the identity of the user. This is
mutually exclusive with certificate
.
private_key
String: defaults to undef. A file source for the private key of the user.
Used by the 'ssl' & 'sshkey' securityprovider to sign messages as from this user.
When not supplied to sshkey, this is interpreted to use the user's ssh-agent.
This is mutually exclusive with private_key_content
.
private_key_content
String: defaults to undef. The file content for the private key of the user.
Used by the 'ssl' & 'sshkey' securityprovider to sign messages as from this user.
This is mutually exclusive with private_key
.
sshkey_learn_public_keys
Boolean: defaults to false. Allow writing sshkey public keys to
sshkey_client_publickey_dir
.
sshkey_overwrite_stored_keys
Boolean: defaults to false. Overwrite learned keys.
sshkey_publickey_dir
String: defaults to ${homedir}/.mcollective.d/public_keys
. Directory to store
received keys.
sshkey_enable_private_key
Boolean: defaults to false. Enable manual specification of the private key to sign requests with. False is interpreted by sshkey to use the user's ssh-agent.
sshkey_known_hosts
String: defaults to '${homedir}/${callerid}/.ssh/known_hosts'. The known_hosts
file to use. This is mutually exclusive with sshkey_publickey_dir
and is disabled
by sshkey_learn_public_keys
.
sshkey_enable_send_key
Boolean: defaults to false. Enable sending the user public key inside the request.
mcollective::plugin
defined type
mcollective::plugin
installs a plugin from a source uri or a package. When
installing from a source uri the plugin will be copied to
mcollective::site_libdir
mcollective::plugin { 'puppet':
package => true,
}
When installing a plugin from source you need to create the correct directory structure for it to work.
For example if you wish to sync an agent for apt which ships with apt.ddl
and apt.rb
you need to create the following structure:
site_mcollective/files/plugins/apt/
└── mcollective
└── agent
├── apt.ddl
└── apt.rb
Now you can then point the source
attribute of the defined type to the
apt folder in your plugins directory.
mcollective::plugin { 'apt':
source => 'puppet:///modules/site_mcollective/plugins/apt',
}
For more examples have a look at the directory structure in files/plugins
of this module.
Parameters
name
String: the resource title. The base name of the plugin to install.
source
String: will default to "puppet:///modules/mcollective/plugins/${name}". The
source uri that will be copied to mcollective::site_libdir
package
Boolean: defaults to false. Whether to install the plugin from a file copy or a package install.
type
String: defaults to 'agent'. The type of the plugin package to install.
has_client
Boolean: defaults to true. When installing from a package, whether to attempt
to install mcollective-${name}-client
on the client node.
mcollective::actionpolicy
defined type
mcollective::actionpolicy
configures an agent for use with actionpolicy in
conjunction with mcollective::actionpolicy::rule
.
Parameters
name
String: the resource title. The name of the agent to set up an actionpolicy for.
default
String: defaults to 'deny'. The default actionpolicy to apply to the agent.
mcollective::actionpolicy::rule
defined type
mcollective::actionpolicy::rule
represents a single actionpolicy policy
entry. See the actionpolicy plugin Policy File Format
for specific restrictions on the values of these fields.
Parameters
name
String: the resource title. A descriptive name for the rule you are adding.
agent
String: required, no default. The name of the agent you are adding a rule for.
action
String: defaults to 'allow'. What to do when the other conditions of this line are matched.
callerid
String: defaults to '*'. What callerids should match this rule.
actions
String: defaults to '*'. What actions should match this rule.
fact_filter
String: defaults to ''. What facts should match this rule. This can be either
'', a space-separated list of fact=value
pairs (which match if every listed
fact matches), or any valid compound filter string.
This matches the "facts" field of the policy file lines.
classes
String: defaults to '*'. What classes should match this rule.
mcollective::common::setting
defined type
mcollective::common::setting
declares a setting that is common between
server and client.
Parameters
setting
String: defaults to the resource title. The name of the setting to set.
value
String: no default. The value to set.
order
String: default '10'. The order in which to merge this setting.
mcollective::server::setting
defined type
mcollective::server::setting
declares a setting that is exclusive to a server.
Parameters
setting
String: defaults to the resource title. The name of the setting to set.
value
String: no default. The value to set.
order
String: default '30'. The order in which to merge this setting.
mcollective::client::setting
defined type
mcollective::client::setting
declares a setting that is common to clients
and users.
Parameters
setting
String: defaults to the resource title. The name of the setting to set.
value
String: no default. The value to set.
order
String: default '30'. The order in which to merge this setting.
mcollective::user::setting
defined type
mcollective::user::setting
declares a setting that is specific to a user.
Parameters
username
String: required, no default. Which user to set this value for.
setting
String: required, no default. The name of the setting to set.
value
String: no default. The value to set.
order
String: default '70'. The order in which to merge this setting.
mcollective::server::config::factsource::yaml
private class
mcollective::server::config::factsource::yaml
is the class that implements
cron-based fact generation and configures MCollective to use it. It is a private
class and so may not be declared directly, but rather is invoked when the
mcollective
class is declared with the factsource
parameter set to yaml
(the default). Although mcollective::server::config::factsource::yaml
is private
it does have one parameter which can be tuned using data bindings (e.g. Hiera).
Parameters
path
String: default $::path. What PATH environment variable to use when refresh-mcollective-metadata is invoked by cron.
Configuration merging
The configuration of the server and client are built up from the various calls
to mcollective::common::setting
, mcollective::server::setting
,
mcollective::client::setting
, and mcollective::user::setting
.
Settings for the server will be a merge of mcollective::common::setting
and
mcollective::server::setting
, highest order of the setting wins.
Settings for the client will be a merge of mcollective::common::setting
,
and mcollective::client::setting
, highest order of the setting wins.
Settings for a specific user will be a merge of
mcollective::common::setting
, mcollective::client::setting
and
mcollective::user::setting
for that specific user, highest order of setting
wins.
Overriding existing options
You can override an existing server setting from outside of the module by simply specifying that setting again with a higher order than the default of that type, for example to make a server's loglevel be debug (without simply setting mcollective::server_loglevel) you could write:
mcollective::server::setting { 'override loglevel':
setting => 'loglevel',
value => 'debug',
order => '50',
}
Troubleshooting
Why do I have no client.cfg?
I said to install the client, so why when I run mco ping
am I seeing this:
$ mco ping
Failed to generate application list: RuntimeError: Cannot find config file '/etc/mcollective/client.cfg'
You've enabled the ssl security provider, which implies each user will have
their own ssl credentials to use in the collective. In order to avoid
incomplete configuration of clients in this mode we delete the system-wide
/etc/mcollective/client.cfg and only generate user configuration files with
the mcollective::user
definition.
Limitations
This module has been built on and tested against Puppet 3.0 and higher.
The module has been tested on:
- CentOS 6
- Ubuntu 12.04
Testing on other platforms has been light and cannot be guaranteed.
Development
Puppet Community modules on are open projects, and community contributions are essential for keeping them great. We can’t access the huge number of platforms and myriad of hardware, software, and deployment configurations that Puppet is intended to serve.
We want to keep it as easy as possible to contribute changes so that our modules work in your environment. There are a few guidelines that we need contributors to follow so that we can have a chance of keeping on top of things.
You can read the complete module contribution guide on the Puppet Labs wiki.
Changelog
All notable changes to this project will be documented in this file. Each new release typically also includes the latest modulesync defaults. These should not affect the functionality of the module.
v3.1.2 (2018-10-14)
Merged pull requests:
- allow puppetlabs/stdlib 5.x #376 (bastelfreak)
v3.1.1 (2018-07-09)
Fixed bugs:
Closed issues:
- Exec[create-mcollective-metadata] in mcollective::server::config::factsource::yaml never runs for mcollective>=2.5.0 #214
Merged pull requests:
- Remove docker nodesets #368 (bastelfreak)
- drop EOL OSs; fix puppet version range #366 (bastelfreak)
v3.1.0 (2017-11-27)
Implemented enhancements:
- Parameterize the client config #355 (BartWillems)
- Make client middleware cert configurable #348 (benningm)
Fixed bugs:
Merged pull requests:
- reorder param docs to the Reference section #357 (bastelfreak)
- modulesync 1.5.0 #356 (bastelfreak)
v3.0.1 (2017-11-15)
Fixed bugs:
v3.0.0 (2017-11-11)
Breaking changes:
- replace validate_string with datatype #343 (bastelfreak)
Implemented enhancements:
Merged pull requests:
- Release 3.0.0 #352 (bastelfreak)
- Use puppet facts instead of facter -p #346 (raphink)
v2.5.0 (2017-02-11)
This is the last release with Puppet3 support!
- Modulesync
2016-12-25 Release 2.4.0
- Modulesync with latest Vox Pupuli defaults
- Avoid compilation failure with strict_variables=true
- Make the rpcaudit.logfile configurable
- Add documentation for fact_cron_splay parameter
2016-09-08 Release 2.3.0
- Modulesync with latest Vox Pupuli defaults
- Create mco client config if also using sshkeyauth
- Add missing ssl_server_private
- User ssl files should thave an ensure parameter
- Fix puppet>=4 path handling
- Fix _securityprovider call in user.pp
- Fix broken links in the README.md
2016-05-21 Release 2.2.0
Improvements:
- fix a few typos
- modulesync with latest voxpupuli defaults (0.6.2)
- enable splay for cron (#276)
- configure correct ssl (#281)
- add OpenBSD support (#220)
- update hiera lookup support (#220)
- Remove unneeded puppetlabs-concat dependency (#289)
- Add possibility to not purge the libdir directory (#291)
- Add service management configuration option (#292)
- Enable SSL Ciphers configuration (#290)
Bugfixes:
- Set correct libdir depending on mco version (#260)
- set correct runtime dependency for mcollective class and mcollectibe::plugin (#285)
- always set factsource and plugin.yaml settings with mcollective::server::setting
2015-12-11 Release 2.1.3
Summary:
This release comes with no big changes since 2.1.1. The biggest news is that we ensure that the SSL directory for mcollective certs exists according to the new AIO puppet-agent package, and some tests are refactor according to Puppet > 4.
Bugfixes:
- Manage ssl directory for mcollective certs (9c845b23a6a3e734835725ba79d87bd3153babbd)
Styles:
- Moves
if...else
onto separate lines (a252f64c4cdb1d233b977b491fa107a6f6bb9b4d) - Fixes bracket to same line as else (8d148502f3be8dd5f7f30fc17b6eb0c95935b2fd)
Improvements
- Datacat version bump from 0.5.x (ed3d6acd0b02d8d87d9bbc72c1243143c1cdf572)
2015-03-31 Release 2.1.1
Summary:
This release comes with no big changes since 2.0.0. The biggest news is that we've moved to the "puppet" namespace on the forge, and the Voxpupuli space on GitHub.
Bugfixes:
- fix propagation of middleware_ssl_fallback for rabbitmq
- Use string for host_iteration titles in future parser (MODULES-773
- Fix our Rakefile release task
2014-09-03 Release 2.0.0
Summary:
This is a fairly large rewrite of many parts of the mcollective module to remove the management of activemq and rabbitmq (middleware) since this task should be delegated to activemq/rabbitmq modules. See the examples/ directory for example profiles to replicate previous configuration.
Backwards-incompatible Features:
- Removed the management of activemq and rabbitmq
- Removed the following parameters:
- mcollective::middleware
- mcollective::activemq_template
- mcollective::activemq_memoryUsage
- mcollective::activemq_storeUsage
- mcollective::activemq_tempUsage
- mcollective::activemq_console
- mcollective::activemq_config
- mcollective::activemq_confdir
- mcollective::rabbitmq_confdir
- mcollective::rabbitmq_vhost
- mcollective::delete_guest_user
Features:
- Make the confdir configurable
- Added callerid param for mcollective::user
- Replace facts.yaml pattern with cron job
- Allow mcollective::collectives to be an array
- Added the following parameters to class mcollective:
- client_package
- confdir
- rabbitmq_vhost
- service_name
- server_package
- ruby_stomp_package
- ssl_client_certs_dir
Bugfixes:
- Honor yaml_fact_path parameter in all the relevant places
- Use string for host_iteration titles in future parser, as integers are not allowed as titles
2014-07-15 Release 1.1.6
Summary:
This release updates metadata.json so the module can be uninstalled and upgraded via the puppet module command, as well as fixes a documentation typo.
2014-06-06 Release 1.1.5
Summary:
This is a bugfix release to get around dependency issues in PMT 3.6.
Fixes:
- Remove deprecated Modulefile as it was causing duplicate dependencies with PMT.
2014-06-04 Release 1.1.4
Summary:
This is a feature release that adds a number of new parameters.
Features:
- Add support for $activemq_memoryUsage, $activemq_storeUsage and $activemq_tempUsage
- Add $ruby_stomp_ensure for manage ruby-stomp package
- Add support for $excluded_facts
- Add support for $$middleware_ssl_fallback
2013-11-13 Release 1.1.3
Summary:
STOP IT PUPPET STOP. We've now fixed the problem for REAL, it was a missing source and author field in the Modulefile.
2013-11-12 Release 1.1.2
Summary:
Metadata.json is persistent and made it into the tarball.
2013-10-21 Release 1.1.1
Summary:
This is a bugfix release, primarily to remove metadata.json, as it seems to cause errors for some users. Also exclude last_run from the facts, and grant rabbitmq's admin user configure permissions.
Fixes:
- Remove metadata.json
- Grant the rabbitmq admin user configure permissions.
- Add last_run to the list of dynamic facts that are filtered out.
2013-10-11 Release 1.1.0
Summary:
This release adds delete_guest_user
for RabbitMQ so that you don't have an
admin guest user left enabled. It also adds middleware_admin_user
and
middleware_admin_password
so that you can control the user that's created in
the middleware appropriately. The README has been updated with further
information.
Features:
- Add $delete_guest_user functionality.
- Add middleware_admin_user and middleware_admin_password parameters.
- Don't supply a client.cfg when securityprovider is 'ssl'
Fixes:
- Use hash to build anonymous hash (in order to not require future parser)
2013-10-03 Release 1.0.1
Summary:
Bugfixes.
Fixes:
- Stop puppet internals leaking into facts.yaml.
- Style fixes.
- Add plugin example to README.
- Update .travis.yml to test appropriately.
2013-09-27 Release 1.0.0
Summary: The initial stable release of the mcollective module.
* This Changelog was automatically generated by github_changelog_generator
Dependencies
- richardc/datacat (>= 0.6.2 < 1.0.0)
- puppetlabs/stdlib (>= 4.13.1 < 6.0.0)
Apache License Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 1. Definitions. "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. "Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License. "Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity. For the purposes of this definition, "control" means (i) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity. "You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License. "Source" form shall mean the preferred form for making modifications, including but not limited to software source code, documentation source, and configuration files. "Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types. "Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below). "Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship. For the purposes of this License, Derivative Works shall not include works that remain separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof. "Contribution" shall mean any work of authorship, including the original version of the Work and any modifications or additions to that Work or Derivative Works thereof, that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner. For the purposes of this definition, "submitted" means any form of electronic, verbal, or written communication sent to the Licensor or its representatives, including but not limited to communication on electronic mailing lists, source code control systems, and issue tracking systems that are managed by, or on behalf of, the Licensor for the purpose of discussing and improving the Work, but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contribution." "Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work. 2. Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such Derivative Works in Source or Object form. 3. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer the Work, where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s) with the Work to which such Contribution(s) was submitted. If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed. 4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions: (a) You must give any other recipients of the Work or Derivative Works a copy of this License; and (b) You must cause any modified files to carry prominent notices stating that You changed the files; and (c) You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark, and attribution notices from the Source form of the Work, excluding those notices that do not pertain to any part of the Derivative Works; and (d) If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that You distribute must include a readable copy of the attribution notices contained within such NOTICE file, excluding those notices that do not pertain to any part of the Derivative Works, in at least one of the following places: within a NOTICE text file distributed as part of the Derivative Works; within the Source form or documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License. You may add Your own attribution notices within Derivative Works that You distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be construed as modifying the License. You may add Your own copyright statement to Your modifications and may provide additional or different license terms and conditions for use, reproduction, or distribution of Your modifications, or for any such Derivative Works as a whole, provided Your use, reproduction, and distribution of the Work otherwise complies with the conditions stated in this License. 5. Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally submitted for inclusion in the Work by You to the Licensor shall be under the terms and conditions of this License, without any additional terms or conditions. Notwithstanding the above, nothing herein shall supersede or modify the terms of any separate license agreement you may have executed with Licensor regarding such Contributions. 6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file. 7. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work (and each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License. 8. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall any Contributor be liable to You for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising as a result of this License or out of the use or inability to use the Work (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if such Contributor has been advised of the possibility of such damages. 9. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may choose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations and/or rights consistent with this License. However, in accepting such obligations, You may act only on Your own behalf and on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify, defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of your accepting any such warranty or additional liability. END OF TERMS AND CONDITIONS APPENDIX: How to apply the Apache License to your work. To apply the Apache License to your work, attach the following boilerplate notice, with the fields enclosed by brackets "[]" replaced with your own identifying information. (Don't include the brackets!) The text should be enclosed in the appropriate comment syntax for the file format. We also recommend that a file or class name and description of purpose be included on the same "printed page" as the copyright notice for easier identification within third-party archives. Copyright 2013 Puppet Labs Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.