|
11 | 11 | Peadm::SingleTargetSpec $primary_host,
|
12 | 12 | Peadm::SingleTargetSpec $postgresql_server_host,
|
13 | 13 | ){
|
14 |
| - $compiler_target = peadm::get_targets($compiler_host, 1) |
15 |
| - $primary_target = peadm::get_targets($primary_host, 1) |
16 |
| - $postgresql_server_target = peadm::get_targets($postgresql_server_host, 1) |
| 14 | + $compiler_target = peadm::get_targets($compiler_host, 1) |
| 15 | + $primary_target = peadm::get_targets($primary_host, 1) |
| 16 | + $postgresql_server_target = peadm::get_targets($postgresql_server_host, 1) |
17 | 17 |
|
18 | 18 | # Stop puppet.service
|
19 | 19 | run_command('systemctl stop puppet.service', $postgresql_server_target)
|
|
26 | 26 | apply($postgresql_server_target) {
|
27 | 27 | file_line { 'pe-puppetdb-pe-puppetdb-map':
|
28 | 28 | path => '/opt/puppetlabs/server/data/postgresql/11/data/pg_ident.conf',
|
29 |
| - line => "pe-puppetdb-pe-puppetdb-map ${compiler_target.peadm::target_name()} pe-puppetdb", |
| 29 | + line => "pe-puppetdb-pe-puppetdb-map ${compiler_target.peadm::certname()} pe-puppetdb", |
30 | 30 | }
|
31 | 31 | file_line { 'pe-puppetdb-pe-puppetdb-migrator-map':
|
32 | 32 | path => '/opt/puppetlabs/server/data/postgresql/11/data/pg_ident.conf',
|
33 |
| - line => "pe-puppetdb-pe-puppetdb-migrator-map ${compiler_target.peadm::target_name()} pe-puppetdb-migrator", |
| 33 | + line => "pe-puppetdb-pe-puppetdb-migrator-map ${compiler_target.peadm::certname()} pe-puppetdb-migrator", |
34 | 34 | }
|
35 | 35 | }
|
36 | 36 |
|
|
45 | 45 |
|
46 | 46 | # we first assume that there is no agent installed on the node. If there is, nothing will happen.
|
47 | 47 | run_task('peadm::agent_install', $compiler_target,
|
48 |
| - server => $primary_target.peadm::target_name(), |
| 48 | + server => $primary_target.peadm::certname(), |
49 | 49 | install_flags => $dns_alt_names_flag + [
|
50 | 50 | "extension_requests:${peadm::oid('pp_auth_role')}=pe_compiler",
|
51 | 51 | "extension_requests:${peadm::oid('peadm_availability_group')}=${avail_group_letter}",
|
52 |
| - "main:certname=${compiler_target.peadm::target_name()}", |
| 52 | + "main:certname=${compiler_target.peadm::certname()}", |
53 | 53 | ],
|
54 | 54 | )
|
55 | 55 |
|
|
60 | 60 | run_task('peadm::submit_csr', $compiler_target, {'_catch_errors' => true})
|
61 | 61 |
|
62 | 62 | # On primary, if necessary, sign the certificate request
|
63 |
| - run_task('peadm::sign_csr', $primary_target, { 'certnames' => [$compiler_target.peadm::target_name()] } ) |
| 63 | + run_task('peadm::sign_csr', $primary_target, { 'certnames' => [$compiler_target.peadm::certname()] } ) |
64 | 64 |
|
65 | 65 | # On <compiler-host>, run the puppet agent
|
66 | 66 | run_task('peadm::puppet_runonce', $compiler_target)
|
67 | 67 |
|
68 | 68 | # If there was already a signed cert, force the certificate extensions we want
|
69 | 69 | # TODO: update peadm::util::add_cert_extensions to take care of dns alt names
|
70 | 70 | run_plan('peadm::util::add_cert_extensions', $compiler_target,
|
71 |
| - primary_host => $primary_target.peadm::target_name(), |
| 71 | + primary_host => $primary_target.peadm::certname(), |
72 | 72 | extensions => {
|
73 | 73 | peadm::oid('pp_auth_role') => 'pe_compiler',
|
74 | 74 | peadm::oid('peadm_availability_group') => $avail_group_letter,
|
|
81 | 81 | # On <postgresql-server-host> start puppet.service
|
82 | 82 | run_command('systemctl start puppet.service', $postgresql_server_target)
|
83 | 83 |
|
84 |
| - return("Adding or replacing compiler ${$compiler_target.peadm::target_name()} succeeded.") |
| 84 | + return("Adding or replacing compiler ${$compiler_target.peadm::certname()} succeeded.") |
85 | 85 |
|
86 | 86 | }
|
0 commit comments