I have tried 2.2.2, but couldn't get it to compile successfully. It
looked like there were some code changes that I could make to the
2.2.2 source to get it working, but applying a single fix (for the
solaris related bug) to 2.2.5 seemed like it was the better route to
go. I also tried 2.2.4 and found that it doesn't work either (I get
the same error message).

Thanks!
Soren



On Oct 20, 2:35 pm, Matt <mattmora...@gmail.com> wrote:
> Have you tried with passenger 2.2.2?
>
> 2009/10/20 nothings_absolute <soren.mor...@gmail.com>:
>
>
>
>
>
> > 1st off sorry this is so long... I didn't see any way to attach files
> > when creating the discussion.
>
> > I am trying to get my puppetmaster (0.25.0) working with passenger
> > (2.2.5) on Solaris (It works fine using webrick). At this point I
> > think it "should" work, but get a 400 error (Located below) when
> > running puppetd on the client.
>
> > The server doesn't have anything in the error log indicating a
> > problem, but the access log shows the server returning a 400 error.
> > Any ideas about what the problem could be or how to enable additional
> > logging on the server side (I tried uncommenting << "--debug" in my
> > config.ru, but don't get anything additional).
>
> > I have also included my config.ru, puppet.conf, and ssl.conf below the
> > errors. Note: The install paths are bit odd, but I am trying to do
> > this so that I can share a main "opt" puppet package with all zones
> > and then have a puppetmd package that uses the same install as puppet
> > itself.
>
> > *** client error output ***
> > bash-3.00# /opt/dhw/sbin/puppetd --server
> > dhwsol105prod1z3.dhw.state.id.us --test --debug --environment=prod
> > debug: Failed to load library 'shadow' for feature 'libshadow'
> > debug: Puppet::Type::User::ProviderPw: file pw does not exist
> > debug: Puppet::Type::User::ProviderDirectoryservice: file /usr/bin/
> > dscl does not exist
> > debug: Failed to load library 'ldap' for feature 'ldap'
> > debug: Puppet::Type::User::ProviderLdap: feature ldap is missing
> > debug: /File[/etc/puppet/ssl/crl.pem]: Autorequiring File[/etc/puppet/
> > ssl]
> > debug: /File[/etc/puppet/ssl/certs/
> > dhwsol105prod1.dhw.state.id.us.pem]: Autorequiring File[/etc/puppet/
> > ssl/certs]
> > debug: /File[/etc/puppet/ssl/certs]: Autorequiring File[/etc/puppet/
> > ssl]
> > debug: /File[/etc/puppet/ssl/private]: Autorequiring File[/etc/puppet/
> > ssl]
> > debug: /File[/var/puppet/client_yaml]: Autorequiring File[/var/puppet]
> > debug: /File[/var/puppet/state]: Autorequiring File[/var/puppet]
> > debug: /File[/var/puppet/facts]: Autorequiring File[/var/puppet]
> > debug: /File[/etc/puppet/ssl/private_keys/
> > dhwsol105prod1.dhw.state.id.us.pem]: Autorequiring File[/etc/puppet/
> > ssl/private_keys]
> > debug: /File[/var/puppet/state/state.yaml]: Autorequiring File[/var/
> > puppet/state]
> > debug: /File[/etc/puppet/ssl/public_keys/
> > dhwsol105prod1.dhw.state.id.us.pem]: Autorequiring File[/etc/puppet/
> > ssl/public_keys]
> > debug: /File[/etc/puppet/ssl/certificate_requests]: Autorequiring File
> > [/etc/puppet/ssl]
> > debug: /File[/etc/puppet/ssl]: Autorequiring File[/etc/puppet]
> > debug: /File[/var/puppet/log]: Autorequiring File[/var/puppet]
> > debug: /File[/var/puppet/run]: Autorequiring File[/var/puppet]
> > debug: /File[/var/puppet/state/graphs]: Autorequiring File[/var/puppet/
> > state]
> > debug: /File[/var/puppet/state/classes.txt]: Autorequiring File[/var/
> > puppet/state]
> > debug: /File[/var/puppet/lib]: Autorequiring File[/var/puppet]
> > debug: /File[/etc/puppet/ssl/private_keys]: Autorequiring File[/etc/
> > puppet/ssl]
> > debug: /File[/var/puppet/clientbucket]: Autorequiring File[/var/
> > puppet]
> > debug: /File[/etc/puppet/ssl/certs/ca.pem]: Autorequiring File[/etc/
> > puppet/ssl/certs]
> > debug: /File[/etc/puppet/ssl/public_keys]: Autorequiring File[/etc/
> > puppet/ssl]
> > debug: Finishing transaction 9414216 with 0 changes
> > debug: Using cached certificate for ca
> > debug: Using cached certificate for dhwsol105prod1.dhw.state.id.us
> > debug: Loaded state in 0.03 seconds
> > debug: Using cached certificate for ca
> > debug: Using cached certificate for dhwsol105prod1.dhw.state.id.us
> > debug: Using cached certificate_revocation_list for ca
> > debug: Puppet::Network::Format[json]: false value when expecting true
> > debug: Format s not supported for Puppet::Resource::Catalog; has not
> > implemented method 'from_s'
> > err: Could not retrieve catalog from remote server: Error 400 on
> > SERVER: Bad Request
> > warning: Not using cache on failed catalog
> > err: Could not retrieve catalog; skipping run
>
> > *** Server error output ***
> > 10.10.1.51 - - [20/Oct/2009:13:44:30 -0600] "GET /prod/catalog/
> > dhwsol105prod1.dhw.state.id.us?facts_format=yaml&facts=---%2B%2521ruby
> > %252Fobject%253APuppet%253A%253ANode%253A%253AFacts%2B%250Aexpiration
> > %253A%2B2009-10-20%2B14%253A14%253A29.927609%2B-06%253A00%250Aname%253A
> > %2Bdhwsol105prod1.dhw.state.id.us%250Avalues%253A%2B%250A%2B%2Bkernel
> > %253A%2BSunOS%250A%2B%2Bipaddress_vnet0_3%253A%2B10.10.1.57%250A%2B
> > %2Bnetwork_vnet0_2%253A%2B10.10.1.0%250A%2B%2Bnetmask%253A
> > %2B255.255.255.0%250A%2B%2Bnetmask_lo0%253A%2B255.0.0.0%250A%2B
> > %2Buniqueid%253A%2B84f9e03a%250A%2B%2Bfqdn%253A
> > %2Bdhwsol105prod1.dhw.state.id.us%250A%2B%2Bnetwork_vnet0_3%253A
> > %2B10.10.1.0%250A%2B%2Boperatingsystemrelease%253A%2B
> > %25225.10%2522%250A%2B%2Bclientversion%253A%2B0.25.0%250A%2B
> > %2Bipaddress%253A%2B10.10.1.51%250A%2B%2Bvirtual%253A%2Bphysical%250A
> > %2B%2Bnetmask_lo0_1%253A%2B255.0.0.0%250A%2B%2Bis_virtual%253A%2B
> > %2522false%2522%250A%2B%2Bps%253A%2Bps%2B-ef%250A%2B
> > %2Bipaddress_vnet0%253A%2B10.10.1.51%250A%2B%2Brubysitedir%253A%2B
> > %252Fopt%252Fdhw%252Flib%252Fruby%252Fsite_ruby%252F1.8%250A%2B
> > %2Bnetmask_lo0_2%253A%2B255.0.0.0%250A%2B%2Bhardwaremodel%253A%2Bsun4v
> > %250A%2B%2Bkernelrelease%253A%2B%25225.10%2522%250A%2B
> > %2Bnetwork_vnet0%253A%2B10.10.1.0%250A%2B%2Bnetmask_lo0_3%253A
> > %2B255.0.0.0%250A%2B%2Bdomain%253A%2Bdhw.state.id.us%250A%2B%2Btimezone
> > %253A%2BMDT%250A%2B%2Bid%253A%2Broot%250A%2B%2Bnetwork_lo0%253A
> > %2B127.0.0.0%250A%2B%2Bipaddress_lo0_1%253A%2B127.0.0.1%250A%2B
> > %2Bhardwareisa%253A%2Bsparc%250A%2B%2Bmacaddress_vnet0%253A
> > %2B0%253A14%253A4f%253Afb%253Ad9%253Acc%250A%2B%2Binterfaces%253A
> > %2Blo0%252Clo0_1%252Clo0_2%252Clo0_3%252Cvnet0%252Cvnet0_1%252Cvnet0_2%252C­vnet0_3%250A
> > %2B%2Bipaddress_lo0_2%253A%2B127.0.0.1%250A%2B%2Bpath%253A%2B%252Fusr
> > %252Fsbin%253A%252Fusr%252Fbin%253A%252Fusr%252Fccs%252Fbin%253A
> > %252Fopt%252FSUNWldm%252Fbin%253A%252Fopt%252Fsmuser%252Fwebagent
> > %252Fbin%253A%252Fsbin%250A%2B%2Bnetwork_lo0_1%253A%2B127.0.0.0%250A%2B
> > %2Bnetmask_vnet0_1%253A%2B255.255.255.0%250A%2B%2Bkernelversion%253A
> > %2BGeneric_141414-07%250A%2B%2Bipaddress_lo0%253A%2B127.0.0.1%250A%2B
> > %2Benvironment%253A%2Bprod%250A%2B%2B%253F%2B%2521ruby%252Fsym
> > %2B_timestamp%250A%2B%2B%253A%2BTue%2BOct
> > %2B20%2B13%253A44%253A29%2B-0600%2B2009%250A%250A%2B
> > %2Bnetmask_vnet0_2%253A%2B255.255.255.0%250A%2B%2Bpuppetversion%253A
> > %2B0.25.0%250A%2B%2Buptime%253A%2B8%2Bday%250A%2B%2Bnetwork_lo0_2%253A
> > %2B127.0.0.0%250A%2B%2Bipaddress_lo0_3%253A%2B127.0.0.1%250A%2B
> > %2Bhostname%253A%2Bdhwsol105prod1%250A%2B%2Boperatingsystem%253A
> > %2BSolaris%250A%2B%2Bipaddress_vnet0_1%253A%2B10.10.1.52%250A%2B
> > %2Bfacterversion%253A%2B1.5.7%250A%2B%2Bmacaddress%253A
> > %2B0%253A14%253A4f%253Afb%253Ad9%253Acc%250A%2B%2Bnetmask_vnet0_3%253A
> > %2B255.255.255.0%250A%2B%2Bnetwork_lo0_3%253A%2B127.0.0.0%250A%2B
> > %2Bsshrsakey%253A
> > %2BAAAAB3NzaC1yc2EAAAABIwAAAIEAxKVNsY3Tk78LgNboqdrTr9omRW7%252BTjD7PvyaD37N­DW
> > %252FQiaWHOxIjgQ257gO765AaekFmP%252FlI9IWA8ss2feEVOYhwms0JrOln
> > %252BZzixI6NiUnEkW00DLR75NH5bIMmNsKDsxbwDGQuJkD2jav8WIgfMG
> > %252BO9RYQxNNZOMu5rUDsimc%253D%250A%2B%2Bkernelmajversion%253A
> > %2BGeneric_141414-07%250A%2B%2Bnetwork_vnet0_1%253A%2B10.10.1.0%250A%2B
> > %2Bipaddress_vnet0_2%253A%2B10.10.1.53%250A%2B%2Brubyversion%253A
> > %2B1.8.7%250A%2B%2Bsshdsakey%253A
> > %2BAAAAB3NzaC1kc3MAAACBAK0sGCS6m349DPJ0ENTNBnRlrJuF9wzBqv6v91%252BYUyiTCug5­4DG38LhXsB5a8wzP7vFDHm91w8H6X8lHSjZAkAZj0CXuoy
> > %252BKMypouxa4aPSIq79DHDM%252FEKUk4uoLoD1SfK9CUq%252FRpy1tJiXvp%252BHA
> > %252B5upqd4GzJUlxyQ5XoDw81u5AAAAFQDAzYUpzs%252FGN9T9sXSgdscaw%252B
> > %252BoRQAAAIBIjPBFixi6vEaQmRBXE1wGI7vYQ1vSD%252FY8kjPTiH1JV
> > %252BiX4ba80qBAN4ZfOi0aItt6dil6naY%252BoagfQkETMp58dSd
> > %252BqkwyfDtJfT6LigLJ9cA6trMEHvjDJP5nAykUWcFBiviOtvLioWJgCDzSKqsQs816imAgvE­u3%252Bspub6A6iQAAAIBknje4ZSbAlB
> > %252Bn9evhpdwYFHMq7biResm9m6SZvpOoHzgAu6qZPer91qrGvVERFNi20%252F8SgLr6%252F­Olddfyr
> > %252BfHxu7%252FesYuh
> > %252BuKpVq9T5jhNi3cIwgTkkeAszP1MJnX32moRJ211F6oWlKW6S8tjfD1VGU5In8WzZ2s2xdM­86I5e4w
> > %253D%253D%250A%2B%2Bnetmask_vnet0%253A%2B255.255.255.0%250A HTTP/1.1"
> > 400 38
>
> > *** config.ru file ***
> > # a config.ru, for use with every rack-compatible webserver.
> > # SSL needs to be handled outside this, though.
>
> > # if puppet is not in your RUBYLIB:
> > # $:.unshift('/opt/dhw/lib')
>
> > $0 = "puppetmasterd"
> > require 'puppet'
>
> > # if you want debugging:
> > ARGV << "--debug"
>
> > # Add configuration directory as argument
> > ARGV << "--confdir=/etc/opt/dhw/puppetmd"
>
> > ARGV << "--rack"
> > require 'puppet/application/puppetmasterd'
> > # we're usually running inside a Rack::Builder.new {} block,
> > # therefore we need to call run *here*.
> > run Puppet::Application[:puppetmasterd].run
>
> > *** puppet.conf ***
> > [main]
> >   # Set the environments available to puppet
> >   environments = trng,prod,qual,intg,dev,qualf
>
> >   # Set to sync custom facts to the clients
> >   pluginsync = true
>
> > [puppetmasterd]
> >   # Added for support with Apache and passenger
> >   ssl_client_header = SSL_CLIENT_S_DN
> >   ssl_client_verify_header = SSL_CLIENT_VERIFY
>
> >   # User and group to start puppetmasterd as
> >   user = puppetmd
> >   group = puppetmd
>
> >   # The port to run the puppet master on
> >   masterport = 8140
>
> >   # Where SSL certificates are kept.
> >   # The default value is '$confdir/ssl'.
> >   ssldir = $confdir/ssl
>
> >   # Single global manifest directory
> >   manifest = $confdir/manifests/site.pp
>
> >   # The location of the configuration for the fileserver
> >   fsconfig = $confdir/fileserver.conf
>
> >   # Where Puppet stores dynamic and growing data.
> >   # The default value is '/var/puppet'.
> >   vardir = /var/opt/dhw/puppetmd
>
> ...
>
> read more »- Hide quoted text -
>
> - Show quoted text -
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"Puppet Users" group.
To post to this group, send email to puppet-users@googlegroups.com
To unsubscribe from this group, send email to 
puppet-users+unsubscr...@googlegroups.com
For more options, visit this group at 
http://groups.google.com/group/puppet-users?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to