Project

General

Profile

« Previous | Next » 

Revision e8112f5c

Added by Vincent MEMBRÉ about 6 years ago

Fixes #12172: Prevent reporting of inner methods in Rudder

View differences:

techniques/system/common/1.0/cron-setup.st
methods:
pass2.restart_crond::
"restart_cron" usebundle => disable_reporting;
"restart_cron" usebundle => _method_reporting_context("CRON Daemon", "None");
"restart_cron" usebundle => service_restart("${service_name}");
"restart_cron" usebundle => enable_reporting;
# Fake success result, since we don't actually call service_restart unless it's needed
pass2.!(android|windows|aix).!restart_crond::
techniques/system/common/1.0/restart-services.st
methods:
"restart_syslog" usebundle => disable_reporting;
"restart_syslog" usebundle => _method_reporting_context("Restarting log system", "None");
# (sys)log service
(!SuSE.!aix.!solaris).(syslogd_repaired|remove_rudder_syslog_configuration_syslog_repaired)::
"restart_syslog" usebundle => service_restart("syslog");
......
(aix|solaris).(syslog_ng_repaired|rsyslog_repaired|syslogd_repaired|remove_rudder_syslog_configuration_result_repaired)::
"restart_syslog" usebundle => command_execution("${restart_cmd}");
any::
"restart_syslog" usebundle => enable_reporting;
solaris|aix::
# Final report about (sys)log setting enforcement / restart
"any" usebundle => rudder_common_report("Common", "log_repaired", "&TRACKINGKEY&", "Log system for reports", "None", "Logging system has been restarted"),
......
# Ensure at least one syslog is running
# We cannot detect which one is used for Rudder
!windows.!aix.!solaris::
"run_syslog" usebundle => service_ensure_running("syslog"),
ifvarclass => "SuSE|syslogd_conffile_present";
"run_syslogng" usebundle => service_ensure_running("syslog-ng"),
ifvarclass => "!SuSE.syslogng_conffile_present";
"run_rsyslog" usebundle => service_ensure_running("rsyslog"),
ifvarclass => "!SuSE.rsyslogd_conffile_present";
"run_syslog" usebundle => disable_reporting;
"run_syslog" usebundle => _method_reporting_context("Make sure syslog service runs", "None");
"run_syslog" usebundle => service_ensure_running("syslog"),
ifvarclass => "SuSE|syslogd_conffile_present";
"run_syslogng" usebundle => service_ensure_running("syslog-ng"),
ifvarclass => "!SuSE.syslogng_conffile_present";
"run_rsyslog" usebundle => service_ensure_running("rsyslog"),
ifvarclass => "!SuSE.rsyslogd_conffile_present";
"run_syslog" usebundle => enable_reporting;
# We have a problem only if all 3 have an error (otherwise at least one is running)
service_ensure_running_syslog_error.service_ensure_running_syslog_ng_error.service_ensure_running_rsyslog_error::
"any" usebundle => rudder_common_report("Common", "result_error", "&TRACKINGKEY&", "Log system for reports", "None", "Could not start the logging system");
techniques/system/distributePolicy/1.0/apache-acl.st
methods:
rudder_apache_acl_repaired::
"any" usebundle => service_reload("${apache_service}");
"reload_apache" usebundle => disable_reporting;
"reload_apache" usebundle => _method_reporting_context("Configure apache ACL", "None");
"reload_apache" usebundle => service_reload("${apache_service}");
"reload_apache" usebundle => enable_reporting;
rudder_apache_acl_ok.!rudder_apache_acl_repaired.!rudder_apache_acl_error::
"any" usebundle => rudder_common_report("DistributePolicy", "result_success", "&TRACKINGKEY&", "Configure apache ACL", "None", "Apache ACLs are correct");
techniques/system/inventory/1.0/fusionAgent.st
methods:
xen.!xen_dom0::
"any" usebundle => package_present("${xen_tools_package}", "", "", "");
"xen_tools_present" usebundle => disable_reporting;
"xen_tools_present" usebundle => _method_reporting_context("Install xen tools", "None");
"xen_tools_present" usebundle => package_present("${xen_tools_package}", "", "", "");
"xen_tools_present" usebundle => enable_reporting;
pass3.run_inventory::
"any" usebundle => rudder_common_report("Inventory", "log_debug", "&TRACKINGKEY&", "inventory", "None", "Running inventory");
techniques/system/server-roles/1.0/alive-check.st
methods:
root_server::
"any" usebundle => service_restart("rudder-jetty"),
ifvarclass => "site_alivecheck_restart_jetty_${sitename}",
classes => set_persist_classes("site_alivecheck_jetty_restarted_${sitename}", "site_down_once_${sitename}" ,"0");
"restart_jetty" usebundle => disable_reporting;
"restart_jetty" usebundle => _method_reporting_context("Check ${app} status", "None");
"restart_jetty" usebundle => service_restart("rudder-jetty"),
if => "site_alivecheck_restart_jetty_${sitename}",
classes => set_persist_classes("site_alivecheck_jetty_restarted_${sitename}", "site_down_once_${sitename}" ,"0");
"restart_jetty" usebundle => enable_reporting;
pass3.root_server::
techniques/system/server-roles/1.0/password-check.st
methods:
pass2.rudder_ldap_password_integrity_changed::
"restart_slapd" usebundle => disable_reporting;
"restart_slapd" usebundle => _method_reporting_context("Check LDAP in rudder-webabb.properties", "None");
"restart_slapd" usebundle => service_restart("rudder-slapd");
"restart_slapd" usebundle => enable_reporting;
pass3.root_server.rudder_web_password_integrity_ok.!rudder_web_password_integrity_changed.!rudder_web_password_integrity_failed::
"any" usebundle => rudder_common_report("server-roles", "result_success", "&TRACKINGKEY&", "Check LDAP in rudder-webapp.properties", "None", "Web interface configuration files are correct (checked LDAP password)");
......
methods:
pass2.rudder_web_password_integrity_changed::
"restart_jetty" usebundle => service_restart("rudder-jetty");
"restart_jetty_password" usebundle => disable_reporting;
"restart_jetty_password" usebundle => _method_reporting_context("Check rudder-webapp.properties", "None");
"restart_jetty_password" usebundle => service_restart("rudder-jetty");
"restart_jetty_password" usebundle => enable_reporting;
pass3.service_restart_rudder_jetty_repaired::
"any" usebundle => rudder_common_report("server-roles", "log_info", "&TRACKINGKEY&", "Check rudder-webapp.properties", "None", "Jetty has been restarted");
techniques/system/server-roles/1.0/postgres-check.st
methods:
pass2.SuSE.psql_conf_updated::
"restart_postgresql" usebundle => disable_reporting;
"restart_postgresql" usebundle => _method_reporting_context("Check PostgreSQL configuration", "None");
"restart_postgresql" usebundle => service_restart("postgresql");
"restart_postgresql" usebundle => enable_reporting;
# Report about the configuration file editing
pass3.SuSE.psql_conf_ok.!psql_conf_updated.!psql_conf_update_error::
techniques/system/server-roles/1.0/service-check.st
"c_initscript" string => canonify("${initscript}");
methods:
"start_process" usebundle => service_ensure_running_path("${initscript}", "${binary}");
"start_process_${name}" usebundle => disable_reporting;
"start_process_${name}" usebundle => _method_reporting_context("Check ${name} process", "None");
"start_process_${name}" usebundle => service_ensure_running_path("${initscript}", "${binary}");
"start_process_${name}" usebundle => enable_reporting;
"any" usebundle => rudder_common_reports_generic("server-roles", "service_ensure_running_${c_initscript}", "&TRACKINGKEY&", "Check ${name} process", "None", "Check ${name} process running");
......
methods:
"bootstart_service" usebundle => service_ensure_started_at_boot("${initscript}");
"bootstart_service_${name}" usebundle => disable_reporting;
"bootstart_service_${name}" usebundle => _method_reporting_context("Check ${name} boot script", "None");
"bootstart_service_${name}" usebundle => service_ensure_started_at_boot("${initscript}");
"bootstart_service_${name}" usebundle => enable_reporting;
"any" usebundle => rudder_common_reports_generic("server-roles", "service_ensure_started_at_boot_${c_initscript}", "&TRACKINGKEY&", "Check ${name} boot script", "None", "Check ${name} boot starting parameters");
}

Also available in: Unified diff