require 'puppet/file_serving/configuration'
require 'puppet/file_serving/fileset'
require 'puppet/file_serving/terminus_helper'
require 'puppet/indirector/terminus'
# Look files up using the file server.
class Puppet::Indirector::FileServer < Puppet::Indirector::Terminus
include Puppet::FileServing::TerminusHelper
# Is the client authorized to perform this action?
def authorized?(request)
return false unless [:find, :search].include?(request.method)
mount, _ = configuration.split_path(request)
# If we're not serving this mount, then access is denied.
return false unless mount
# If there are no auth directives or there is an 'allow *' directive, then
# access is allowed.
if mount.empty? || mount.globalallow?
return true
end
Puppet.err _("Denying %{method} request for %{desc} on fileserver mount '%{mount_name}'. Use of auth directives for 'fileserver.conf' mount points is no longer supported. Remove these directives and use the 'auth.conf' file instead for access control.") % { method: request.method, desc: request.description, mount_name: mount.name }
return false
end
# Find our key using the fileserver.
def find(request)
mount, relative_path = configuration.split_path(request)
return nil unless mount
# The mount checks to see if the file exists, and returns nil
# if not.
path = mount.find(relative_path, request)
return nil unless path
path2instance(request, path)
end
# Search for files. This returns an array rather than a single
# file.
def search(request)
mount, relative_path = configuration.split_path(request)
paths = mount.search(relative_path, request) if mount
unless paths
Puppet.info _("Could not find filesystem info for file '%{request}' in environment %{env}") % { request: request.key, env: request.environment }
return nil
end
path2instances(request, *paths)
end
private
# Our fileserver configuration, if needed.
def configuration
Puppet::FileServing::Configuration.configuration
end
end
Anons79 File Manager Version 1.0, Coded By Anons79
Email: [email protected]