In Puppet 3.x, allow directives are limited to hostnames, if you wish
to allow an ip address, the allow_ip directive should be used. This
was in response to CVE-2012-3408
(http://puppetlabs.com/security/cve/cve-2012-3408/).

On Tue, Oct 2, 2012 at 8:10 AM, Arnaud Gomes-do-Vale
<arnaud.go...@ircam.fr> wrote:
> Hi,
>
> I am evaluating Puppet 3.0 on my test puppetmaster. I have what looks
> like a regression from Puppet 2.7.19:
>
> Info: Retrieving plugin
> Info: Loading facts in /var/lib/puppet/lib/facter/ircamnetwork.rb
> Info: Loading facts in /var/lib/puppet/lib/facter/root_home.rb
> Info: Loading facts in /var/lib/puppet/lib/facter/passenger_root.rb
> Info: Loading facts in /var/lib/puppet/lib/facter/raid_md.rb
> Info: Loading facts in /var/lib/puppet/lib/facter/mysql.rb
> Info: Loading facts in /var/lib/puppet/lib/facter/ircamserver.rb
> Info: Loading facts in /var/lib/puppet/lib/facter/facter_dot_d.rb
> Info: Loading facts in /var/lib/puppet/lib/facter/puppet_vardir.rb
> Info: Caching catalog for cobbler-staging.ircam.fr
> Info: Applying configuration version '1349189813'
> Error: 
> /Stage[main]/Collectd::Node/Collectd::Collectd_service[network]/File[/etc/collectd.d/network.conf]:
>  Could not evaluate: Error 400 on SERVER: Not authorized to call find on 
> /file_metadata/private/modules/collectd/network.conf Could not retrieve file 
> metadata for puppet:///private/modules/collectd/network.conf: Error 400 on 
> SERVER: Not authorized to call find on 
> /file_metadata/private/modules/collectd/network.conf
> /Stage[main]/Collectd/Service[collectd]: Dependency 
> File[/etc/collectd.d/network.conf] has failures: true
> Warning: /Stage[main]/Collectd/Service[collectd]: Skipping because of failed 
> dependencies
> Finished catalog run in 5.41 seconds
>
> I am aware of bug #16667 but I fail to see if it is relevant; I never
> saw the deprecation notice when running Puppet 2.7.
>
> To give a little more detail, here is the definition of
> collectd_service:
>
>   define collectd_service () {
>     file { "/etc/collectd.d/${name}.conf":
>       source => [
>                  "puppet:///private/modules/collectd/${name}.conf",
>                  "puppet:///modules/collectd/services/${name}.conf",
>                  ],
>       owner => 'root',
>       group => 'root',
>       mode => '0444',
>       require => Package['collectd'],
>       notify => Service['collectd'],
>     }
>   }
>
> So IIUC, the client should first try the private mount on the
> fileserver, and fall back to the module in case of failure, right? And
> here is the contents of fileserver.conf, which defines the private
> mount:
>
> [files]
>  path /etc/puppet/files
>  allow 129.102.0.0/16
>  allow 2001:660:3004::/49
>
> [private]
>  path /etc/puppet/files-private/%H
>  allow 129.102.0.0/16
>  allow 2001:660:3004::/49
>
> Here are the debug logs on both sides if needed:
>
> http://files.glou.org/puppet/puppetmaster-fileserver-failure.log
> http://files.glou.org/puppet/puppet-agent-fileserver-failure.log
>
> --
> A
>
> --
> You received this message because you are subscribed to the Google Groups 
> "Puppet Users" group.
> To post to this group, send email to puppet-users@googlegroups.com.
> To unsubscribe from this group, send email to 
> puppet-users+unsubscr...@googlegroups.com.
> For more options, visit this group at 
> http://groups.google.com/group/puppet-users?hl=en.
>



-- 
Matthaus Owens
Release Manager, Puppet Labs

-- 
You received this message because you are subscribed to the Google Groups 
"Puppet Users" group.
To post to this group, send email to puppet-users@googlegroups.com.
To unsubscribe from this group, send email to 
puppet-users+unsubscr...@googlegroups.com.
For more options, visit this group at 
http://groups.google.com/group/puppet-users?hl=en.

Reply via email to