1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
|
#!/usr/local/bin/ruby -w
# the available clients
require 'puppet'
require 'puppet/sslcertificates'
require 'puppet/type'
require 'facter'
require 'openssl'
require 'puppet/transaction'
require 'puppet/transportable'
require 'puppet/metric'
require 'puppet/daemon'
$noclientnetworking = false
begin
require 'webrick'
require 'cgi'
require 'xmlrpc/client'
require 'xmlrpc/server'
rescue LoadError => detail
$noclientnetworking = detail
end
module Puppet
class NetworkClientError < RuntimeError; end
class ClientError < RuntimeError; end
#---------------------------------------------------------------
if $noclientnetworking
Puppet.err "Could not load client network libs: %s" % $noclientnetworking
else
class NetworkClient < XMLRPC::Client
#include Puppet::Daemon
@@methods = {
"puppetmaster" => [ :getconfig ],
"puppetca" => [ :getcert ]
}
@@methods.each { |namespace, methods|
methods.each { |method|
self.send(:define_method,method) { |*args|
Puppet.info "peer cert is %s" % @http.peer_cert
#Puppet.info "cert is %s" % @http.cert
begin
call("%s.%s" % [namespace, method.to_s],*args)
rescue XMLRPC::FaultException => detail
Puppet.err "XML Could not call %s.%s: %s" %
[namespace, method, detail.faultString]
raise NetworkClientError.new,
"XMLRPC Error: %s" % detail.faultString
rescue => detail
Puppet.err "Could not call %s.%s: %s" %
[namespace, method, detail.inspect]
raise NetworkClientError.new(detail.to_s)
end
}
}
}
[:key, :cert, :ca_file].each { |method|
setmethod = method.to_s + "="
#self.send(:define_method, method) {
# @http.send(method)
#}
self.send(:define_method, setmethod) { |*args|
Puppet.debug "Setting %s" % method
@http.send(setmethod, *args)
}
}
def initialize(hash)
hash[:Path] ||= "/RPC2"
hash[:Server] ||= "localhost"
hash[:Port] ||= Puppet[:masterport]
super(
hash[:Server],
hash[:Path],
hash[:Port],
nil, # proxy_host
nil, # proxy_port
nil, # user
nil, # password
true # use_ssl
)
if hash[:Certificate]
Puppet.info "adding cert to @http"
@http.cert = hash[:Certificate]
end
if hash[:Key]
@http.key = hash[:Key]
end
if hash[:CAFile]
@http.ca_file = hash[:CAFile]
store = OpenSSL::X509::Store.new
cacert = OpenSSL::X509::Certificate.new(
File.read(hash[:CAFile])
)
store.add_cert(cacert)
store.purpose = OpenSSL::X509::PURPOSE_SSL_CLIENT
@http.cert_store = store
@http.verify_mode = OpenSSL::SSL::VERIFY_NONE
end
# from here, i need to add the key, cert, and ca cert
# and reorgize how i start the client
end
end
end
class Client
include Puppet
include Puppet::Daemon
attr_accessor :local, :secureinit
def Client.facts
facts = {}
Facter.each { |name,fact|
facts[name] = fact.downcase
}
facts
end
def initialize(hash)
# to whom do we connect?
@server = nil
@nil = nil
@secureinit = hash[:NoSecureInit] || true
if hash.include?(:FQDN)
@fqdn = hash[:FQDN]
else
self.fqdn
end
if hash.include?(:Cache)
@cache = hash[:Cache]
else
@cache = true
end
if hash.include?(:Server)
case hash[:Server]
when String:
if $noclientnetworking
raise NetworkClientError.new("Networking not available: %s" %
$nonetworking)
end
args = {}
[:Port, :Server].each { |arg|
if hash.include?(:Port)
args[arg] = hash[arg]
end
}
if self.readcert
args[:Certificate] = @cert
args[:Key] = @key
args[:CAFile] = @cacertfile
end
@driver = Puppet::NetworkClient.new(args)
@local = false
when Puppet::Master:
@driver = hash[:Server]
@local = true
else
raise ClientError.new("Server must be a hostname or a " +
"Puppet::Master object")
end
else
raise ClientError.new("Must pass :Server to client")
end
end
def getconfig
#client.loadproperty('files/sslclient.properties')
Puppet.debug("getting config")
facts = Client.facts
unless facts.length > 0
raise Puppet::ClientError.new(
"Could not retrieve any facts"
)
end
objects = nil
if @local
objects = @driver.getconfig(facts)
if objects == ""
raise Puppet::Error, "Could not retrieve configuration"
end
else
textfacts = CGI.escape(Marshal::dump(facts))
# error handling for this is done in the network client
textobjects = @driver.getconfig(textfacts)
unless textobjects == ""
begin
textobjects = CGI.unescape(textobjects)
rescue => detail
raise Puppet::Error, "Could not CGI.unescape configuration"
end
end
if @cache
if textobjects == ""
if FileTest.exists?(Puppet[:localconfig])
textobjects = File.read(Puppet[:localconfig])
else
raise Puppet::Error.new(
"Cannot connect to server and there is no cached configuration"
)
end
else
# we store the config so that if we can't connect next time, we
# can just run against the most recently acquired copy
confdir = File.dirname(Puppet[:localconfig])
unless FileTest.exists?(confdir)
Puppet.recmkdir(confdir, 0770)
end
File.open(Puppet[:localconfig], "w", 0660) { |f|
f.print textobjects
}
end
elsif textobjects == ""
raise Puppet::Error, "Could not retrieve configuration"
end
begin
objects = Marshal::load(textobjects)
rescue => detail
raise Puppet::Error.new("Could not understand configuration")
end
end
if objects.is_a?(Puppet::TransBucket)
@objects = objects
else
Puppet.warning objects.inspect
raise NetworkClientError.new(objects.class)
end
end
# this method is how the client receives the tree of Transportable
# objects
# for now, just descend into the tree and perform and necessary
# manipulations
def config
unless defined? @objects
raise Puppet::Error, "Cannot config; objects not defined"
end
Puppet.debug("Calling config")
# XXX this is kind of a problem; if the user changes the state file
# after this, then we have to reload the file and everything...
begin
Puppet::Storage.init
Puppet::Storage.load
rescue => detail
Puppet.err "Corrupt state file %s" % Puppet[:checksumfile]
begin
File.unlink(Puppet[:checksumfile])
retry
rescue => detail
raise Puppet::Error.new("Cannot remove %s: %s" %
[Puppet[statefile], detail])
end
end
container = @objects.to_type
#if @local
# container = @objects.to_type
#else
# container = Marshal::load(@objects).to_type
#end
# this is a gross hack... but i don't see a good way around it
# set all of the variables to empty
Puppet::Transaction.init
# for now we just evaluate the top-level container, but eventually
# there will be schedules and such associated with each object,
# and probably with the container itself
transaction = container.evaluate
#transaction = Puppet::Transaction.new(objects)
transaction.toplevel = true
transaction.evaluate
Puppet::Metric.gather
Puppet::Metric.tally
if Puppet[:rrdgraph] == true
Metric.store
Metric.graph
end
Puppet::Storage.store
return transaction
#self.shutdown
end
def initcerts
unless self.readcert
unless self.requestcert
return nil
end
end
unless @driver
return true
end
Puppet.info "setting cert and key and such"
@driver.cert = @cert
@driver.key = @key
@driver.ca_file = @cacertfile
end
end
#---------------------------------------------------------------
end
# $Id$
|