Репозиторий Sisyphus
Последнее обновление: 1 октября 2023 | Пакетов: 18631 | Посещений: 37786090
en ru br
Репозитории ALT

Группа :: Разработка/Ruby
Пакет: gem-smart-proxy

 Главная   Изменения   Спек   Патчи   Sources   Загрузить   Gear   Bugs and FR  Repocop 

Патч: config.patch
Скачать


diff --git a/config/settings.d/bmc.yml b/config/settings.d/bmc.yml
new file mode 100755
index 0000000..18a17e6
--- /dev/null
+++ b/config/settings.d/bmc.yml
@@ -0,0 +1,19 @@
+---
+# Can be true, false, or http/https to enable just one of the protocols
+:enabled: false
+
+# Available providers:
+# - freeipmi / ipmitool - requires the appropriate package installed, and the rubyipmi gem
+# - shell - for local reboot control (requires sudo access to /sbin/shutdown for the proxy user)
+# - ssh - limited remote control (status, reboot, turn off)
+#:bmc_default_provider: freeipmi
+
+# default user and ssh key for ssh provider
+#:bmc_ssh_user: root
+#:bmc_ssh_key: /usr/share/foreman/.ssh/id_rsa
+
+# individual commands for actions
+#:bmc_ssh_powerstatus: "true"
+#:bmc_ssh_powercycle: "shutdown -r +1"
+#:bmc_ssh_poweroff: "shutdown +1"
+#:bmc_ssh_poweron: "false"
diff --git a/config/settings.d/dhcp.yml b/config/settings.d/dhcp.yml
new file mode 100755
index 0000000..2dce1c8
--- /dev/null
+++ b/config/settings.d/dhcp.yml
@@ -0,0 +1,17 @@
+---
+# Can be true, false, or http/https to enable just one of the protocols
+:enabled: false
+
+# valid providers:
+#   - dhcp_isc (ISC dhcp server)
+#   - dhcp_native_ms (Microsoft native implementation)
+#   - dhcp_libvirt
+#:use_provider: dhcp_isc
+#:server: 127.0.0.1
+# subnets restricts the subnets queried to a subset, to reduce the query time.
+#:subnets: [192.168.205.0/255.255.255.128, 192.168.205.128/255.255.255.128]
+
+# Perform ICMP and TCP ping when searching free IPs from the pool. This makes
+# sure that active IP address is not suggested as free, however in locked down
+# network environments this can cause no free IPs. Enabled by default
+#:ping_free_ip: true
diff --git a/config/settings.d/dns.yml b/config/settings.d/dns.yml
new file mode 100755
index 0000000..e102b76
--- /dev/null
+++ b/config/settings.d/dns.yml
@@ -0,0 +1,13 @@
+---
+# Can be true, false, or http/https to enable just one of the protocols
+:enabled: false
+
+# Valid providers:
+#   dns_nsupdate
+#   dns_nsupdate_gss (for GSS-TSIG support)
+#   dns_libvirt
+#   dns_dnscmd
+#:use_provider: dns_nsupdate
+# use this setting if you want to override default TTL setting (86400)
+#:dns_ttl: 86400
+
diff --git a/config/settings.d/facts.yml b/config/settings.d/facts.yml
new file mode 100755
index 0000000..08e49ed
--- /dev/null
+++ b/config/settings.d/facts.yml
@@ -0,0 +1,3 @@
+---
+# Can be true, false, or http/https to enable just one of the protocols
+:enabled: false
diff --git a/config/settings.d/httpboot.yml b/config/settings.d/httpboot.yml
new file mode 100755
index 0000000..6f1549e
--- /dev/null
+++ b/config/settings.d/httpboot.yml
@@ -0,0 +1,10 @@
+---
+# Enable publishing of a given directory under /EFI and /httpboot paths.
+# Directory listing is not possible, symlinks are followed but not outside
+# of the root directory specified in this file.
+
+# Enables the module, make sure to enable TFTP module as well to allow
+# configuration files deployment.
+:enabled: false
+
+#:root_dir: /var/lib/tftpboot
diff --git a/config/settings.d/logs.yml b/config/settings.d/logs.yml
new file mode 100755
index 0000000..140a3bb
--- /dev/null
+++ b/config/settings.d/logs.yml
@@ -0,0 +1,5 @@
+---
+# Can be true, false, or http/https to enable just one of the protocols
+:enabled: http
+
+# Log buffer configuration is in core file (settings.yml)
diff --git a/config/settings.d/puppet.yml b/config/settings.d/puppet.yml
new file mode 100755
index 0000000..afcbb51
--- /dev/null
+++ b/config/settings.d/puppet.yml
@@ -0,0 +1,12 @@
+---
+# Can be true, false, or http/https to enable just one of the protocols
+:enabled: http
+
+# valid providers:
+#   puppet_proxy_mcollective (uses mco puppet)
+#   puppet_proxy_ssh         (run puppet over ssh)
+#   puppet_proxy_salt        (uses salt puppet.run)
+#   puppet_proxy_customrun   (calls a custom command with args)
+#:use_provider: puppet_proxy_customrun
+
+:puppet_version: 6.17.0
diff --git a/config/settings.d/puppet_proxy_puppet_api.yml b/config/settings.d/puppet_proxy_puppet_api.yml
new file mode 100755
index 0000000..acc20d5
--- /dev/null
+++ b/config/settings.d/puppet_proxy_puppet_api.yml
@@ -0,0 +1,11 @@
+---
+# URL of the puppet master itself for API requests.
+#:puppet_url: https://sample.server.test:8140
+#
+# SSL certificates used to access the puppet API
+#:puppet_ssl_ca: /etc/puppet/ssl/certs/ca.pem
+#:puppet_ssl_cert: /etc/puppet/ssl/certs/sample.server.test.pem
+#:puppet_ssl_key: /etc/puppet/ssl/private_keys/sample.server.test.pem
+#
+# Smart Proxy api timeout when Puppet's environment classes api is used and classes cache is disabled
+#:api_timeout: 30
diff --git a/config/settings.d/puppetca.yml b/config/settings.d/puppetca.yml
new file mode 100755
index 0000000..0962004
--- /dev/null
+++ b/config/settings.d/puppetca.yml
@@ -0,0 +1,12 @@
+---
+# PuppetCA management
+# Can be true, false, or http/https to enable just one of the protocols
+:enabled: https
+
+# valid providers:
+#   - puppetca_hostname_whitelisting (verify CSRs based on a hostname whitelist)
+#   - puppetca_token_whitelisting (verify CSRs based on a token whitelist)
+:use_provider: puppetca_hostname_whitelisting
+
+# Puppet version used
+:puppet_version: 6.17.0
diff --git a/config/settings.d/realm.yml b/config/settings.d/realm.yml
new file mode 100755
index 0000000..05ff412
--- /dev/null
+++ b/config/settings.d/realm.yml
@@ -0,0 +1,7 @@
+---
+# Can be true, false, or http/https to enable just one of the protocols
+:enabled: false
+
+# Available providers:
+#   realm_freeipa
+:use_provider: realm_freeipa
diff --git a/config/settings.d/templates.yml b/config/settings.d/templates.yml
new file mode 100755
index 0000000..aeab55a
--- /dev/null
+++ b/config/settings.d/templates.yml
@@ -0,0 +1,22 @@
+---
+# Enable this if the Proxy should handle template requests on behalf of Foreman
+# Can be true, false, or http/https to enable just one of the protocols
+:enabled: false
+
+# This plugin also requires that :foreman_url: be set in the main settings.yml
+# This lets the plugin know how to obtain the templates from foreman.
+
+# This allows the proxy to define how hosts that are being provisioned where to
+# obtain the templates from. Most installers don't support https, so it's recommended
+# to enable an http port listener in the main config file too, and use it in
+# the url below
+#
+# :template_url is the URL the host should use to contact the proxy for a template.
+# The default protocol is http on port 80 unless otherwise specified in the url.
+# Examples:
+# https://1.2.3.4:8443            # default proxy https port
+# http://1.2.3.4:8000             # default proxy http port
+# https://smart-proxy.example.com # assumes port 443
+# http://smart-proxy.example.com  # assumes port 80
+# smart-proxy.example.com:8080    # assumes http
+#:template_url: http://smart-proxy.example.com:8000
diff --git a/config/settings.d/tftp.yml b/config/settings.d/tftp.yml
new file mode 100755
index 0000000..1c74d2d
--- /dev/null
+++ b/config/settings.d/tftp.yml
@@ -0,0 +1,19 @@
+---
+# Can be true, false, or http/https to enable just one of the protocols
+:enabled: false
+
+:tftproot: /var/lib/tftpboot
+# Defines the TFTP Servername to use, overrides the name in the subnet declaration
+:tftp_servername: sample.server.test
+
+# Defines the default read timeout in seconds needed to download tftp artifacts
+# like initrd and vmlinuz. Default value 60 seconds
+#:tftp_read_timeout: 60
+
+# Defines the default connection timeout in seconds needed to download tftp artifacts
+# like initrd and vmlinuz. Default value 10 seconds
+#:tftp_connect_timeout: 10
+
+# Defines the default dns timeout in seconds needed to download tftp artifacts
+# like initrd and vmlinuz. Default value 10 seconds
+#:tftp_dns_timeout: 10
 
дизайн и разработка: Vladimir Lettiev aka crux © 2004-2005, Andrew Avramenko aka liks © 2007-2008
текущий майнтейнер: Michael Shigorin