Server IP : 192.64.112.168 / Your IP : 18.117.100.130 Web Server : Apache System : Linux nc-ph-2300-85.bluforrest.com 4.18.0-513.9.1.el8_9.x86_64 #1 SMP Sat Dec 2 05:23:44 EST 2023 x86_64 User : expressoneac ( 1128) PHP Version : 8.0.30 Disable Function : exec,passthru,shell_exec,system MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : ON Directory : /lib/python3.6/site-packages/sos/report/plugins/ |
Upload File : |
# Copyright (c) 2024 Rudnei Bertol Jr <rudnei@redhat.com> # This file is part of the sos project: https://github.com/sosreport/sos # # This copyrighted material is made available to anyone wishing to use, # modify, copy, or redistribute it subject to the terms and conditions of # version 2 of the GNU General Public License. # # See the LICENSE file in the source distribution for further information. import glob from sos.report.plugins import Plugin, RedHatPlugin class AAPreceptorPlugin(Plugin, RedHatPlugin): short_desc = 'AAP receptor plugin' plugin_name = 'aap_receptor' profiles = ('sysmgmt', 'ansible') packages = ('receptor', 'receptorctl') services = ('receptor',) def setup(self): self.add_copy_spec([ "/etc/receptor", "/tmp/receptor/*/status", "/var/lib/receptor", ]) if self.get_option("all_logs"): self.add_copy_spec([ "/var/log/receptor" ]) else: self.add_copy_spec([ "/var/log/receptor/*.log" ]) self.add_forbidden_path([ "/etc/receptor/tls", "/etc/receptor/*key.pem" ]) self.add_dir_listing([ "/etc/receptor", "/var/run/receptor", "/var/run/awx-receptor" ]) for s in glob.glob('/var/run/*receptor/*.sock'): self.add_cmd_output(f"receptorctl --socket {s} status", suggest_filename="receptorctl_status") self.add_cmd_output(f"receptorctl --socket {s} status --json", suggest_filename="receptorctl_status.json") self.add_cmd_output(f"receptorctl --socket {s} work list", suggest_filename="receptorctl_work_list.json") break # vim: set et ts=4 sw=4 :