Issue #21839 has been updated by Charlie Sharpsteen. Category set to indirector Status changed from Investigating to In Topic Branch Pending Review Affected Puppet version changed from 3.2.3 to 3.0.0 Keywords changed from couch facts_terminus to facts_terminus couch Branch set to https://github.com/puppetlabs/puppet/pull/1828
Ok. What is happening here is that the facts received from the agent contain a `:_timestamp` entry. In the case of the CouchDB terminus, the symbol is stringified to `_timestamp` when serializing to JSON. The facts are then retrieved from JSON during compilation and the timestamp is updated, again using the symbol key `:_timestamp`. When facts are added to the top scope, every key is strigified. Since `:_timestamp` and `_timestamp` both exist as facts, one-to-one mapping is broken and static single assignment is violated. This error doesn't show up often because most other fact termini serialize to YAML or some other format that preserves the Ruby symbol. So, when the compiler retrieves the facts the key `:_timestamp` is simply updated rather than created (and thus duplicated). I've submitted a pull request to fixes this issue by changing all instances of the symbol key `:_timestamp` to a string key `_timestamp`. This prevents duplication from string duplication. Additionally, you may want to consider migrating to a well tested Fact terminus such as PuppetDB as our docs specifically call out the couch terminus as being somewhat esoteric and unstable. This is reflected by a lack of test coverage that would catch problems such as this. ---------------------------------------- Bug #21839: 2.7.22 to 3.2.3 puppet master upgrade: Cannot reassign variable _timestamp on node https://projects.puppetlabs.com/issues/21839#change-96148 * Author: jayendren maduray * Status: In Topic Branch Pending Review * Priority: High * Assignee: Charlie Sharpsteen * Category: indirector * Target version: * Affected Puppet version: 3.0.0 * Keywords: facts_terminus couch * Branch: https://github.com/puppetlabs/puppet/pull/1828 ---------------------------------------- <ins>Summary:</ins> <p>staging an upgrade from puppetmaster 2.7.22 to 3.2.3, the following is displayed during a puppet agent run:</p> Error: Could not retrieve catalog from remote server: Error 400 on SERVER: Cannot reassign variable _timestamp on node <ins>Steps to Reproduce:</ins> <p>upgrade puppetmaster-passenger using apt source -> http://apt.puppetlabs.com/puppetlabs-release-precise.deb restart passenger/apache and run</p> puppet agent -t --trace --debug <ins>Expected Results:</ins> <p>puppetrun completes with no error</p> <ins>Actual Results:</ins> Error: Could not retrieve catalog from remote server: Error 400 on SERVER: Cannot reassign variable _timestamp on node <ins>Regression:</ins> <p>Unknown</p> <ins>Notes:</ins> <p>I have looked at apache/system logs, and grep'd my puppet etcdir for the _timestamp variable mentioned in the error, none exist.</p> <p>Closest match to the variable is in rubylibdir:</p> [email protected] /usr/lib/ruby> grep -rw '_timestamp' * vendor_ruby/puppet/node/facts.rb: timestamp = data['values']['_timestamp'] vendor_ruby/puppet/node/facts.rb: self.values[:_timestamp] = time vendor_ruby/puppet/node/facts.rb: self.values[:_timestamp] <p> puppetmaster02.stage OS:</p> Ubuntu 12.04.2 LTS <p>Puppet Packages:</p> ii facter 1.7.2-1puppetlabs1 Ruby module for collecting simple facts about a host operating system ii hiera 1.2.1-1puppetlabs1 A simple pluggable Hierarchical Database. ii puppet 3.2.3-1puppetlabs1 Centralized configuration management - agent startup and compatibility scripts ii puppet-common 3.2.3-1puppetlabs1 Centralized configuration management ii puppetdb 1.3.2-1puppetlabs1 PuppetDB Centralized Storage. ii puppetdb-terminus 1.3.2-1puppetlabs1 Connect Puppet to PuppetDB by setting up a terminus for PuppetDB. ii puppetlabs-release 1.0-7 "Package to install Puppet Labs gpg key and apt repo" rc puppetmaster 2.7.22-1puppetlabs1 Centralized configuration management - master startup and compatibility scripts ii puppetmaster-common 3.2.3-1puppetlabs1 Puppet master common scripts ii puppetmaster-passenger 3.2.3-1puppetlabs1 Centralised configuration management - master setup to run under mod passenger ii ruby-rgen 0.6.5-1puppetlabs1 A framework supporting Model Driven Software Development (MDSD) <p>ruby version:</p> ruby 1.8.7 (2011-06-30 patchlevel 352) [x86_64-linux] <p>gem version:</p> 1.8.15 <ins>puppet agent t --trace --verbose --debug</ins> Debug: Failed to load library 'selinux' for feature 'selinux' Debug: Using settings: adding file resource 'client_datadir': 'File[/var/lib/puppet/client_data]{:backup=>false, :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :mode=>"750", :path=>"/var/lib/puppet/client_data"}' Debug: Puppet::Type::User::ProviderDirectoryservice: file /usr/bin/dsimport does not exist Debug: Failed to load library 'ldap' for feature 'ldap' Debug: Puppet::Type::User::ProviderLdap: feature ldap is missing Debug: Puppet::Type::User::ProviderUser_role_add: file roledel does not exist Debug: Puppet::Type::User::ProviderPw: file pw does not exist Debug: /User[puppet]: Provider useradd does not support features libuser; not managing attribute forcelocal Debug: Puppet::Type::Group::ProviderDirectoryservice: file /usr/bin/dscl does not exist Debug: Failed to load library 'ldap' for feature 'ldap' Debug: Puppet::Type::Group::ProviderLdap: feature ldap is missing Debug: Puppet::Type::Group::ProviderPw: file pw does not exist Debug: /Group[puppet]: Provider groupadd does not support features libuser; not managing attribute forcelocal Debug: Using settings: adding file resource 'logdir': 'File[/var/log/puppet]{:backup=>false, :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :owner=>"puppet", :links=>:follow, :mode=>"750", :path=>"/var/log/puppet"}' Debug: Using settings: adding file resource 'hostpubkey': 'File[/var/lib/puppet/ssl/public_keys/puppetmaster01.stage.pem]{:backup=>false, :ensure=>:file, :loglevel=>:debug, :owner=>"puppet", :links=>:follow, :mode=>"644", :path=>"/var/lib/puppet/ssl/public_keys/puppetmaster01.stage.pem"}' Debug: Using settings: adding file resource 'lastrunreport': 'File[/var/lib/puppet/state/last_run_report.yaml]{:backup=>false, :ensure=>:file, :loglevel=>:debug, :links=>:follow, :mode=>"640", :path=>"/var/lib/puppet/state/last_run_report.yaml"}' Debug: Using settings: adding file resource 'publickeydir': 'File[/var/lib/puppet/ssl/public_keys]{:backup=>false, :ensure=>:directory, :loglevel=>:debug, :owner=>"puppet", :links=>:follow, :path=>"/var/lib/puppet/ssl/public_keys"}' Debug: Using settings: adding file resource 'privatedir': 'File[/var/lib/puppet/ssl/private]{:backup=>false, :ensure=>:directory, :loglevel=>:debug, :owner=>"puppet", :links=>:follow, :mode=>"750", :path=>"/var/lib/puppet/ssl/private"}' Debug: Using settings: adding file resource 'statefile': 'File[/var/lib/puppet/state/state.yaml]{:backup=>false, :ensure=>:file, :loglevel=>:debug, :links=>:follow, :mode=>"660", :path=>"/var/lib/puppet/state/state.yaml"}' Debug: Using settings: adding file resource 'hostcert': 'File[/var/lib/puppet/ssl/certs/puppetmaster01.stage.pem]{:backup=>false, :ensure=>:file, :loglevel=>:debug, :owner=>"puppet", :links=>:follow, :mode=>"644", :path=>"/var/lib/puppet/ssl/certs/puppetmaster01.stage.pem"}' Debug: Using settings: adding file resource 'classfile': 'File[/var/lib/puppet/state/classes.txt]{:backup=>false, :ensure=>:file, :loglevel=>:debug, :owner=>"root", :links=>:follow, :mode=>"640", :path=>"/var/lib/puppet/state/classes.txt"}' Debug: Using settings: adding file resource 'libdir': 'File[/var/lib/puppet/lib]{:backup=>false, :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :path=>"/var/lib/puppet/lib"}' Debug: Using settings: adding file resource 'localcacert': 'File[/var/lib/puppet/ssl/certs/ca.pem]{:backup=>false, :ensure=>:file, :loglevel=>:debug, :owner=>"puppet", :links=>:follow, :mode=>"644", :path=>"/var/lib/puppet/ssl/certs/ca.pem"}' Debug: Using settings: adding file resource 'confdir': 'File[/etc/puppet]{:backup=>false, :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :path=>"/etc/puppet"}' Debug: Using settings: adding file resource 'hostcrl': 'File[/var/lib/puppet/ssl/crl.pem]{:backup=>false, :ensure=>:file, :loglevel=>:debug, :owner=>"puppet", :links=>:follow, :mode=>"644", :path=>"/var/lib/puppet/ssl/crl.pem"}' Debug: Using settings: adding file resource 'certdir': 'File[/var/lib/puppet/ssl/certs]{:backup=>false, :ensure=>:directory, :loglevel=>:debug, :owner=>"puppet", :links=>:follow, :path=>"/var/lib/puppet/ssl/certs"}' Debug: Using settings: adding file resource 'requestdir': 'File[/var/lib/puppet/ssl/certificate_requests]{:backup=>false, :ensure=>:directory, :loglevel=>:debug, :owner=>"puppet", :links=>:follow, :path=>"/var/lib/puppet/ssl/certificate_requests"}' Debug: Using settings: adding file resource 'clientyamldir': 'File[/var/lib/puppet/client_yaml]{:backup=>false, :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :mode=>"750", :path=>"/var/lib/puppet/client_yaml"}' Debug: Using settings: adding file resource 'hostprivkey': 'File[/var/lib/puppet/ssl/private_keys/puppetmaster01.stage.pem]{:backup=>false, :ensure=>:file, :loglevel=>:debug, :owner=>"puppet", :links=>:follow, :mode=>"600", :path=>"/var/lib/puppet/ssl/private_keys/puppetmaster01.stage.pem"}' Debug: Using settings: adding file resource 'resourcefile': 'File[/var/lib/puppet/state/resources.txt]{:backup=>false, :ensure=>:file, :loglevel=>:debug, :owner=>"root", :links=>:follow, :mode=>"640", :path=>"/var/lib/puppet/state/resources.txt"}' Debug: Using settings: adding file resource 'clientbucketdir': 'File[/var/lib/puppet/clientbucket]{:backup=>false, :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :mode=>"750", :path=>"/var/lib/puppet/clientbucket"}' Debug: Using settings: adding file resource 'vardir': 'File[/var/lib/puppet]{:backup=>false, :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :path=>"/var/lib/puppet"}' Debug: Using settings: adding file resource 'rundir': 'File[/var/run/puppet]{:backup=>false, :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :mode=>"1777", :path=>"/var/run/puppet"}' Debug: Using settings: adding file resource 'statedir': 'File[/var/lib/puppet/state]{:backup=>false, :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :mode=>"1755", :path=>"/var/lib/puppet/state"}' Debug: Using settings: adding file resource 'lastrunfile': 'File[/var/lib/puppet/state/last_run_summary.yaml]{:backup=>false, :ensure=>:file, :loglevel=>:debug, :links=>:follow, :mode=>"644", :path=>"/var/lib/puppet/state/last_run_summary.yaml"}' Debug: Using settings: adding file resource 'ssldir': 'File[/var/lib/puppet/ssl]{:backup=>false, :ensure=>:directory, :loglevel=>:debug, :owner=>"puppet", :links=>:follow, :mode=>"771", :path=>"/var/lib/puppet/ssl"}' Debug: Using settings: adding file resource 'graphdir': 'File[/var/lib/puppet/state/graphs]{:backup=>false, :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :path=>"/var/lib/puppet/state/graphs"}' Debug: Using settings: adding file resource 'privatekeydir': 'File[/var/lib/puppet/ssl/private_keys]{:backup=>false, :ensure=>:directory, :loglevel=>:debug, :owner=>"puppet", :links=>:follow, :mode=>"750", :path=>"/var/lib/puppet/ssl/private_keys"}' Debug: /File[/var/lib/puppet/ssl/certs/ca.pem]: Autorequiring File[/var/lib/puppet/ssl/certs] Debug: /File[/var/lib/puppet/client_yaml]: Autorequiring File[/var/lib/puppet] Debug: /File[/var/lib/puppet/ssl]: Autorequiring File[/var/lib/puppet] Debug: /File[/var/lib/puppet/state/last_run_summary.yaml]: Autorequiring File[/var/lib/puppet/state] Debug: /File[/var/lib/puppet/ssl/certificate_requests]: Autorequiring File[/var/lib/puppet/ssl] Debug: /File[/var/lib/puppet/ssl/private]: Autorequiring File[/var/lib/puppet/ssl] Debug: /File[/var/lib/puppet/ssl/private_keys]: Autorequiring File[/var/lib/puppet/ssl] Debug: /File[/var/lib/puppet/state/resources.txt]: Autorequiring File[/var/lib/puppet/state] Debug: /File[/var/lib/puppet/lib]: Autorequiring File[/var/lib/puppet] Debug: /File[/var/lib/puppet/ssl/public_keys/puppetmaster01.stage.pem]: Autorequiring File[/var/lib/puppet/ssl/public_keys] Debug: /File[/var/lib/puppet/state/last_run_report.yaml]: Autorequiring File[/var/lib/puppet/state] Debug: /File[/var/lib/puppet/state/graphs]: Autorequiring File[/var/lib/puppet/state] Debug: /File[/var/lib/puppet/clientbucket]: Autorequiring File[/var/lib/puppet] Debug: /File[/var/lib/puppet/ssl/public_keys]: Autorequiring File[/var/lib/puppet/ssl] Debug: /File[/var/lib/puppet/state/classes.txt]: Autorequiring File[/var/lib/puppet/state] Debug: /File[/var/lib/puppet/client_data]: Autorequiring File[/var/lib/puppet] Debug: /File[/var/lib/puppet/state]: Autorequiring File[/var/lib/puppet] Debug: /File[/var/lib/puppet/ssl/private_keys/puppetmaster01.stage.pem]: Autorequiring File[/var/lib/puppet/ssl/private_keys] Debug: /File[/var/lib/puppet/state/state.yaml]: Autorequiring File[/var/lib/puppet/state] Debug: /File[/var/lib/puppet/ssl/certs/puppetmaster01.stage.pem]: Autorequiring File[/var/lib/puppet/ssl/certs] Debug: /File[/var/lib/puppet/ssl/crl.pem]: Autorequiring File[/var/lib/puppet/ssl] Debug: /File[/var/lib/puppet/ssl/certs]: Autorequiring File[/var/lib/puppet/ssl] Debug: Finishing transaction 70205016070380 Debug: Using settings: adding file resource 'logdir': 'File[/var/log/puppet]{:backup=>false, :group=>"puppet", :ensure=>:directory, :loglevel=>:debug, :owner=>"puppet", :links=>:follow, :mode=>"750", :path=>"/var/log/puppet"}' Debug: Using settings: adding file resource 'hostpubkey': 'File[/var/lib/puppet/ssl/public_keys/puppetmaster01.stage.pem]{:backup=>false, :ensure=>:file, :loglevel=>:debug, :owner=>"puppet", :links=>:follow, :mode=>"644", :path=>"/var/lib/puppet/ssl/public_keys/puppetmaster01.stage.pem"}' Debug: Using settings: adding file resource 'publickeydir': 'File[/var/lib/puppet/ssl/public_keys]{:backup=>false, :ensure=>:directory, :loglevel=>:debug, :owner=>"puppet", :links=>:follow, :path=>"/var/lib/puppet/ssl/public_keys"}' Debug: Using settings: adding file resource 'privatedir': 'File[/var/lib/puppet/ssl/private]{:backup=>false, :ensure=>:directory, :loglevel=>:debug, :owner=>"puppet", :links=>:follow, :mode=>"750", :path=>"/var/lib/puppet/ssl/private"}' Debug: Using settings: adding file resource 'hostcert': 'File[/var/lib/puppet/ssl/certs/puppetmaster01.stage.pem]{:backup=>false, :ensure=>:file, :loglevel=>:debug, :owner=>"puppet", :links=>:follow, :mode=>"644", :path=>"/var/lib/puppet/ssl/certs/puppetmaster01.stage.pem"}' Debug: Using settings: adding file resource 'libdir': 'File[/var/lib/puppet/lib]{:backup=>false, :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :path=>"/var/lib/puppet/lib"}' Debug: Using settings: adding file resource 'localcacert': 'File[/var/lib/puppet/ssl/certs/ca.pem]{:backup=>false, :ensure=>:file, :loglevel=>:debug, :owner=>"puppet", :links=>:follow, :mode=>"644", :path=>"/var/lib/puppet/ssl/certs/ca.pem"}' Debug: Using settings: adding file resource 'confdir': 'File[/etc/puppet]{:backup=>false, :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :path=>"/etc/puppet"}' Debug: Using settings: adding file resource 'hostcrl': 'File[/var/lib/puppet/ssl/crl.pem]{:backup=>false, :ensure=>:file, :loglevel=>:debug, :owner=>"puppet", :links=>:follow, :mode=>"644", :path=>"/var/lib/puppet/ssl/crl.pem"}' Debug: Using settings: adding file resource 'certdir': 'File[/var/lib/puppet/ssl/certs]{:backup=>false, :ensure=>:directory, :loglevel=>:debug, :owner=>"puppet", :links=>:follow, :path=>"/var/lib/puppet/ssl/certs"}' Debug: Using settings: adding file resource 'requestdir': 'File[/var/lib/puppet/ssl/certificate_requests]{:backup=>false, :ensure=>:directory, :loglevel=>:debug, :owner=>"puppet", :links=>:follow, :path=>"/var/lib/puppet/ssl/certificate_requests"}' Debug: Using settings: adding file resource 'hostprivkey': 'File[/var/lib/puppet/ssl/private_keys/puppetmaster01.stage.pem]{:backup=>false, :ensure=>:file, :loglevel=>:debug, :owner=>"puppet", :links=>:follow, :mode=>"600", :path=>"/var/lib/puppet/ssl/private_keys/puppetmaster01.stage.pem"}' Debug: Using settings: adding file resource 'vardir': 'File[/var/lib/puppet]{:backup=>false, :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :path=>"/var/lib/puppet"}' Debug: Using settings: adding file resource 'rundir': 'File[/var/run/puppet]{:backup=>false, :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :mode=>"1777", :path=>"/var/run/puppet"}' Debug: Using settings: adding file resource 'statedir': 'File[/var/lib/puppet/state]{:backup=>false, :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :mode=>"1755", :path=>"/var/lib/puppet/state"}' Debug: Using settings: adding file resource 'ssldir': 'File[/var/lib/puppet/ssl]{:backup=>false, :ensure=>:directory, :loglevel=>:debug, :owner=>"puppet", :links=>:follow, :mode=>"771", :path=>"/var/lib/puppet/ssl"}' Debug: Using settings: adding file resource 'privatekeydir': 'File[/var/lib/puppet/ssl/private_keys]{:backup=>false, :ensure=>:directory, :loglevel=>:debug, :owner=>"puppet", :links=>:follow, :mode=>"750", :path=>"/var/lib/puppet/ssl/private_keys"}' Debug: /File[/var/lib/puppet/lib]: Autorequiring File[/var/lib/puppet] Debug: /File[/var/lib/puppet/ssl]: Autorequiring File[/var/lib/puppet] Debug: /File[/var/lib/puppet/ssl/certs/ca.pem]: Autorequiring File[/var/lib/puppet/ssl/certs] Debug: /File[/var/lib/puppet/ssl/private_keys/puppetmaster01.stage.pem]: Autorequiring File[/var/lib/puppet/ssl/private_keys] Debug: /File[/var/lib/puppet/ssl/certs/puppetmaster01.stage.pem]: Autorequiring File[/var/lib/puppet/ssl/certs] Debug: /File[/var/lib/puppet/state]: Autorequiring File[/var/lib/puppet] Debug: /File[/var/lib/puppet/ssl/public_keys/puppetmaster01.stage.pem]: Autorequiring File[/var/lib/puppet/ssl/public_keys] Debug: /File[/var/lib/puppet/ssl/certificate_requests]: Autorequiring File[/var/lib/puppet/ssl] Debug: /File[/var/lib/puppet/ssl/private_keys]: Autorequiring File[/var/lib/puppet/ssl] Debug: /File[/var/lib/puppet/ssl/certs]: Autorequiring File[/var/lib/puppet/ssl] Debug: /File[/var/lib/puppet/ssl/private]: Autorequiring File[/var/lib/puppet/ssl] Debug: /File[/var/lib/puppet/ssl/crl.pem]: Autorequiring File[/var/lib/puppet/ssl] Debug: /File[/var/lib/puppet/ssl/public_keys]: Autorequiring File[/var/lib/puppet/ssl] Debug: Finishing transaction 70205015137740 Debug: Using cached certificate for ca Debug: Using cached certificate for puppetmaster01.stage Debug: Using settings: adding file resource 'client_datadir': 'File[/var/lib/puppet/client_data]{:backup=>false, :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :mode=>"750", :path=>"/var/lib/puppet/client_data"}' Debug: Using settings: adding file resource 'lastrunreport': 'File[/var/lib/puppet/state/last_run_report.yaml]{:backup=>false, :ensure=>:file, :loglevel=>:debug, :links=>:follow, :mode=>"640", :path=>"/var/lib/puppet/state/last_run_report.yaml"}' Debug: Using settings: adding file resource 'statefile': 'File[/var/lib/puppet/state/state.yaml]{:backup=>false, :ensure=>:file, :loglevel=>:debug, :links=>:follow, :mode=>"660", :path=>"/var/lib/puppet/state/state.yaml"}' Debug: Using settings: adding file resource 'classfile': 'File[/var/lib/puppet/state/classes.txt]{:backup=>false, :ensure=>:file, :loglevel=>:debug, :owner=>"root", :links=>:follow, :mode=>"640", :path=>"/var/lib/puppet/state/classes.txt"}' Debug: Using settings: adding file resource 'clientyamldir': 'File[/var/lib/puppet/client_yaml]{:backup=>false, :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :mode=>"750", :path=>"/var/lib/puppet/client_yaml"}' Debug: Using settings: adding file resource 'resourcefile': 'File[/var/lib/puppet/state/resources.txt]{:backup=>false, :ensure=>:file, :loglevel=>:debug, :owner=>"root", :links=>:follow, :mode=>"640", :path=>"/var/lib/puppet/state/resources.txt"}' Debug: Using settings: adding file resource 'clientbucketdir': 'File[/var/lib/puppet/clientbucket]{:backup=>false, :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :mode=>"750", :path=>"/var/lib/puppet/clientbucket"}' Debug: Using settings: adding file resource 'lastrunfile': 'File[/var/lib/puppet/state/last_run_summary.yaml]{:backup=>false, :ensure=>:file, :loglevel=>:debug, :links=>:follow, :mode=>"644", :path=>"/var/lib/puppet/state/last_run_summary.yaml"}' Debug: Using settings: adding file resource 'graphdir': 'File[/var/lib/puppet/state/graphs]{:backup=>false, :ensure=>:directory, :loglevel=>:debug, :links=>:follow, :path=>"/var/lib/puppet/state/graphs"}' Debug: Finishing transaction 70205014750180 Debug: Loaded state in 0.01 seconds Debug: node supports formats: b64_zlib_yaml pson raw yaml; using pson Debug: Using cached certificate for ca Debug: Using cached certificate for puppetmaster01.stage Debug: Using cached certificate_revocation_list for ca Info: Retrieving plugin Debug: file_metadata supports formats: b64_zlib_yaml pson raw yaml; using pson Debug: Finishing transaction 70205016223600 Debug: catalog supports formats: b64_zlib_yaml dot pson raw yaml; using pson Error: Could not retrieve catalog from remote server: Error 400 on SERVER: Cannot reassign variable _timestamp on node puppetmaster01.stage /usr/lib/ruby/vendor_ruby/puppet/indirector/rest.rb:185:in `is_http_200?' /usr/lib/ruby/vendor_ruby/puppet/indirector/rest.rb:100:in `find' /usr/lib/ruby/vendor_ruby/puppet/indirector/indirection.rb:197:in `find' /usr/lib/ruby/vendor_ruby/puppet/configurer.rb:243:in `retrieve_new_catalog' /usr/lib/ruby/vendor_ruby/puppet/util.rb:351:in `thinmark' /usr/lib/ruby/1.8/benchmark.rb:308:in `realtime' /usr/lib/ruby/vendor_ruby/puppet/util.rb:350:in `thinmark' /usr/lib/ruby/vendor_ruby/puppet/configurer.rb:242:in `retrieve_new_catalog' /usr/lib/ruby/vendor_ruby/puppet/configurer.rb:67:in `retrieve_catalog' /usr/lib/ruby/vendor_ruby/puppet/configurer.rb:107:in `prepare_and_retrieve_catalog' /usr/lib/ruby/vendor_ruby/puppet/configurer.rb:159:in `run' /usr/lib/ruby/vendor_ruby/puppet/agent.rb:45:in `run' /usr/lib/ruby/vendor_ruby/puppet/agent/locker.rb:20:in `lock' /usr/lib/ruby/vendor_ruby/puppet/agent.rb:45:in `run' /usr/lib/ruby/1.8/sync.rb:230:in `synchronize' /usr/lib/ruby/vendor_ruby/puppet/agent.rb:45:in `run' /usr/lib/ruby/vendor_ruby/puppet/agent.rb:119:in `with_client' /usr/lib/ruby/vendor_ruby/puppet/agent.rb:42:in `run' /usr/lib/ruby/vendor_ruby/puppet/agent.rb:84:in `run_in_fork' /usr/lib/ruby/vendor_ruby/puppet/agent.rb:41:in `run' /usr/lib/ruby/vendor_ruby/puppet/application.rb:179:in `call' /usr/lib/ruby/vendor_ruby/puppet/application.rb:179:in `controlled_run' /usr/lib/ruby/vendor_ruby/puppet/agent.rb:39:in `run' /usr/lib/ruby/vendor_ruby/puppet/application/agent.rb:353:in `onetime' /usr/lib/ruby/vendor_ruby/puppet/application/agent.rb:327:in `run_command' /usr/lib/ruby/vendor_ruby/puppet/application.rb:364:in `run' /usr/lib/ruby/vendor_ruby/puppet/application.rb:456:in `plugin_hook' /usr/lib/ruby/vendor_ruby/puppet/application.rb:364:in `run' /usr/lib/ruby/vendor_ruby/puppet/util.rb:504:in `exit_on_fail' /usr/lib/ruby/vendor_ruby/puppet/application.rb:364:in `run' /usr/lib/ruby/vendor_ruby/puppet/util/command_line.rb:132:in `run' /usr/lib/ruby/vendor_ruby/puppet/util/command_line.rb:86:in `execute' /usr/bin/puppet:4 Warning: Not using cache on failed catalog Error: Could not retrieve catalog; skipping run Debug: Executing '/etc/puppet/environments/production/etckeeper-commit-post' Debug: report supports formats: b64_zlib_yaml pson raw yaml; using pson -- You have received this notification because you have either subscribed to it, or are involved in it. To change your notification preferences, please click here: http://projects.puppetlabs.com/my/account -- You received this message because you are subscribed to the Google Groups "Puppet Bugs" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To post to this group, send email to [email protected]. Visit this group at http://groups.google.com/group/puppet-bugs. For more options, visit https://groups.google.com/groups/opt_out.
