Revision e8112f5c
Added by Vincent MEMBRÉ about 6 years ago
techniques/system/common/1.0/cron-setup.st | ||
---|---|---|
methods:
|
||
|
||
pass2.restart_crond::
|
||
"restart_cron" usebundle => disable_reporting;
|
||
"restart_cron" usebundle => _method_reporting_context("CRON Daemon", "None");
|
||
"restart_cron" usebundle => service_restart("${service_name}");
|
||
"restart_cron" usebundle => enable_reporting;
|
||
|
||
# Fake success result, since we don't actually call service_restart unless it's needed
|
||
pass2.!(android|windows|aix).!restart_crond::
|
techniques/system/common/1.0/restart-services.st | ||
---|---|---|
|
||
methods:
|
||
|
||
"restart_syslog" usebundle => disable_reporting;
|
||
"restart_syslog" usebundle => _method_reporting_context("Restarting log system", "None");
|
||
# (sys)log service
|
||
|
||
(!SuSE.!aix.!solaris).(syslogd_repaired|remove_rudder_syslog_configuration_syslog_repaired)::
|
||
"restart_syslog" usebundle => service_restart("syslog");
|
||
|
||
... | ... | |
|
||
(aix|solaris).(syslog_ng_repaired|rsyslog_repaired|syslogd_repaired|remove_rudder_syslog_configuration_result_repaired)::
|
||
"restart_syslog" usebundle => command_execution("${restart_cmd}");
|
||
|
||
|
||
any::
|
||
"restart_syslog" usebundle => enable_reporting;
|
||
solaris|aix::
|
||
# Final report about (sys)log setting enforcement / restart
|
||
"any" usebundle => rudder_common_report("Common", "log_repaired", "&TRACKINGKEY&", "Log system for reports", "None", "Logging system has been restarted"),
|
||
... | ... | |
# Ensure at least one syslog is running
|
||
# We cannot detect which one is used for Rudder
|
||
!windows.!aix.!solaris::
|
||
"run_syslog" usebundle => service_ensure_running("syslog"),
|
||
ifvarclass => "SuSE|syslogd_conffile_present";
|
||
"run_syslogng" usebundle => service_ensure_running("syslog-ng"),
|
||
ifvarclass => "!SuSE.syslogng_conffile_present";
|
||
"run_rsyslog" usebundle => service_ensure_running("rsyslog"),
|
||
ifvarclass => "!SuSE.rsyslogd_conffile_present";
|
||
"run_syslog" usebundle => disable_reporting;
|
||
"run_syslog" usebundle => _method_reporting_context("Make sure syslog service runs", "None");
|
||
"run_syslog" usebundle => service_ensure_running("syslog"),
|
||
ifvarclass => "SuSE|syslogd_conffile_present";
|
||
"run_syslogng" usebundle => service_ensure_running("syslog-ng"),
|
||
ifvarclass => "!SuSE.syslogng_conffile_present";
|
||
"run_rsyslog" usebundle => service_ensure_running("rsyslog"),
|
||
ifvarclass => "!SuSE.rsyslogd_conffile_present";
|
||
"run_syslog" usebundle => enable_reporting;
|
||
# We have a problem only if all 3 have an error (otherwise at least one is running)
|
||
service_ensure_running_syslog_error.service_ensure_running_syslog_ng_error.service_ensure_running_rsyslog_error::
|
||
"any" usebundle => rudder_common_report("Common", "result_error", "&TRACKINGKEY&", "Log system for reports", "None", "Could not start the logging system");
|
techniques/system/distributePolicy/1.0/apache-acl.st | ||
---|---|---|
|
||
methods:
|
||
rudder_apache_acl_repaired::
|
||
"any" usebundle => service_reload("${apache_service}");
|
||
"reload_apache" usebundle => disable_reporting;
|
||
"reload_apache" usebundle => _method_reporting_context("Configure apache ACL", "None");
|
||
"reload_apache" usebundle => service_reload("${apache_service}");
|
||
"reload_apache" usebundle => enable_reporting;
|
||
|
||
rudder_apache_acl_ok.!rudder_apache_acl_repaired.!rudder_apache_acl_error::
|
||
"any" usebundle => rudder_common_report("DistributePolicy", "result_success", "&TRACKINGKEY&", "Configure apache ACL", "None", "Apache ACLs are correct");
|
techniques/system/inventory/1.0/fusionAgent.st | ||
---|---|---|
methods:
|
||
|
||
xen.!xen_dom0::
|
||
"any" usebundle => package_present("${xen_tools_package}", "", "", "");
|
||
"xen_tools_present" usebundle => disable_reporting;
|
||
"xen_tools_present" usebundle => _method_reporting_context("Install xen tools", "None");
|
||
"xen_tools_present" usebundle => package_present("${xen_tools_package}", "", "", "");
|
||
"xen_tools_present" usebundle => enable_reporting;
|
||
|
||
pass3.run_inventory::
|
||
"any" usebundle => rudder_common_report("Inventory", "log_debug", "&TRACKINGKEY&", "inventory", "None", "Running inventory");
|
techniques/system/server-roles/1.0/alive-check.st | ||
---|---|---|
methods:
|
||
|
||
root_server::
|
||
|
||
"any" usebundle => service_restart("rudder-jetty"),
|
||
ifvarclass => "site_alivecheck_restart_jetty_${sitename}",
|
||
classes => set_persist_classes("site_alivecheck_jetty_restarted_${sitename}", "site_down_once_${sitename}" ,"0");
|
||
"restart_jetty" usebundle => disable_reporting;
|
||
"restart_jetty" usebundle => _method_reporting_context("Check ${app} status", "None");
|
||
"restart_jetty" usebundle => service_restart("rudder-jetty"),
|
||
if => "site_alivecheck_restart_jetty_${sitename}",
|
||
classes => set_persist_classes("site_alivecheck_jetty_restarted_${sitename}", "site_down_once_${sitename}" ,"0");
|
||
"restart_jetty" usebundle => enable_reporting;
|
||
|
||
pass3.root_server::
|
||
|
techniques/system/server-roles/1.0/password-check.st | ||
---|---|---|
methods:
|
||
|
||
pass2.rudder_ldap_password_integrity_changed::
|
||
|
||
"restart_slapd" usebundle => disable_reporting;
|
||
"restart_slapd" usebundle => _method_reporting_context("Check LDAP in rudder-webabb.properties", "None");
|
||
"restart_slapd" usebundle => service_restart("rudder-slapd");
|
||
|
||
"restart_slapd" usebundle => enable_reporting;
|
||
pass3.root_server.rudder_web_password_integrity_ok.!rudder_web_password_integrity_changed.!rudder_web_password_integrity_failed::
|
||
"any" usebundle => rudder_common_report("server-roles", "result_success", "&TRACKINGKEY&", "Check LDAP in rudder-webapp.properties", "None", "Web interface configuration files are correct (checked LDAP password)");
|
||
|
||
... | ... | |
methods:
|
||
|
||
pass2.rudder_web_password_integrity_changed::
|
||
|
||
"restart_jetty" usebundle => service_restart("rudder-jetty");
|
||
"restart_jetty_password" usebundle => disable_reporting;
|
||
"restart_jetty_password" usebundle => _method_reporting_context("Check rudder-webapp.properties", "None");
|
||
"restart_jetty_password" usebundle => service_restart("rudder-jetty");
|
||
"restart_jetty_password" usebundle => enable_reporting;
|
||
|
||
pass3.service_restart_rudder_jetty_repaired::
|
||
"any" usebundle => rudder_common_report("server-roles", "log_info", "&TRACKINGKEY&", "Check rudder-webapp.properties", "None", "Jetty has been restarted");
|
techniques/system/server-roles/1.0/postgres-check.st | ||
---|---|---|
methods:
|
||
|
||
pass2.SuSE.psql_conf_updated::
|
||
"restart_postgresql" usebundle => disable_reporting;
|
||
"restart_postgresql" usebundle => _method_reporting_context("Check PostgreSQL configuration", "None");
|
||
"restart_postgresql" usebundle => service_restart("postgresql");
|
||
"restart_postgresql" usebundle => enable_reporting;
|
||
|
||
# Report about the configuration file editing
|
||
pass3.SuSE.psql_conf_ok.!psql_conf_updated.!psql_conf_update_error::
|
techniques/system/server-roles/1.0/service-check.st | ||
---|---|---|
"c_initscript" string => canonify("${initscript}");
|
||
|
||
methods:
|
||
|
||
"start_process" usebundle => service_ensure_running_path("${initscript}", "${binary}");
|
||
"start_process_${name}" usebundle => disable_reporting;
|
||
"start_process_${name}" usebundle => _method_reporting_context("Check ${name} process", "None");
|
||
"start_process_${name}" usebundle => service_ensure_running_path("${initscript}", "${binary}");
|
||
"start_process_${name}" usebundle => enable_reporting;
|
||
|
||
"any" usebundle => rudder_common_reports_generic("server-roles", "service_ensure_running_${c_initscript}", "&TRACKINGKEY&", "Check ${name} process", "None", "Check ${name} process running");
|
||
|
||
... | ... | |
|
||
methods:
|
||
|
||
"bootstart_service" usebundle => service_ensure_started_at_boot("${initscript}");
|
||
"bootstart_service_${name}" usebundle => disable_reporting;
|
||
"bootstart_service_${name}" usebundle => _method_reporting_context("Check ${name} boot script", "None");
|
||
"bootstart_service_${name}" usebundle => service_ensure_started_at_boot("${initscript}");
|
||
"bootstart_service_${name}" usebundle => enable_reporting;
|
||
"any" usebundle => rudder_common_reports_generic("server-roles", "service_ensure_started_at_boot_${c_initscript}", "&TRACKINGKEY&", "Check ${name} boot script", "None", "Check ${name} boot starting parameters");
|
||
|
||
}
|
Also available in: Unified diff
Fixes #12172: Prevent reporting of inner methods in Rudder