I hereby claim:
- I am mootpt on github.
- I am nullpt (https://keybase.io/nullpt) on keybase.
- I have a public key ASBf8Fzf-WPLTwD7JJlUKRawhznWuxcxGaJ5Dgh1_7Oepwo
To claim this, I am signing this object:
| # WARNING. DO NOT USE tls_private_key resource like I have done in this example | |
| # Doing so will result in the private key being stored in state. You do not want that | |
| # Instead use an existing key pair and use the file interpolation function to source | |
| # the private key from disk for use in the rsadecrypt interpolation function | |
| resource "tls_private_key" "key" { | |
| algorithm = "RSA" | |
| } | |
| resource "aws_key_pair" "key_pair" { |
I hereby claim:
To claim this, I am signing this object:
| #!/bin/bash | |
| backupdate=$(date +%Y%m%d%H%M) | |
| certname=`puppet config print certname` | |
| echo -e "\e[1;32mBacking up old certificates:\e[0m" | |
| sleep 2 | |
| tar -zcvf backup-puppet-enterprise-ssl.${backupdate}.tar.gz /etc/puppetlabs/puppet/ssl/ /etc/puppetlabs/puppetdb/ssl/ /opt/puppet/share/puppet-dashboard/certs | |
| echo -e "\e[1;32mRegenerating Master and CA certificates:\e[0m" | |
| sleep 2 | |
| puppet resource service pe-puppet ensure=stopped | |
| puppet resource service pe-mcollective ensure=stopped |
| #!/bin/bash | |
| backupdate=$(date +%Y%m%d%H%M) | |
| certname=`puppet config print certname` | |
| echo "Backing up old certificates:\n" | |
| sleep 2 | |
| tar -zcvf backup-puppet-enterprise-ssl.${backupdate}.tar.gz /etc/puppetlabs/puppet/ssl/ /etc/puppetlabs/puppetdb/ssl/ /opt/puppet/share/puppet-dashboard/certs | |
| echo "Regenerating Master and CA certificates:\n" | |
| sleep 2 | |
| puppet resource service pe-puppet ensure=stopped | |
| puppet resource service pe-mcollective ensure=stopped |
| Facter.add(:environment) do | |
| setcode do | |
| if defined? Puppet and Puppet.application_name == :agent | |
| Puppet[:environment] | |
| else | |
| Facter::Util::Resolution.exec('puppet agent --configprint environment') | |
| end | |
| end | |
| end |