Cleanup for file modes

Change-Id: I8b8390949680dff1f862a1747fdac57afdc10d57
This commit is contained in:
Andrey Korolyov 2013-12-19 02:49:59 +04:00
parent 358b6ce641
commit d353740465
22 changed files with 93 additions and 93 deletions

View File

@ -75,10 +75,10 @@ class ceilometer::agent::central (
Package['pacemaker'] -> File['ceilometer-agent-central-ocf']
file {'ceilometer-agent-central-ocf':
path=>'/usr/lib/ocf/resource.d/mirantis/ceilometer-agent-central',
mode => 755,
owner => root,
group => root,
path =>'/usr/lib/ocf/resource.d/mirantis/ceilometer-agent-central',
mode => '0755',
owner => root,
group => root,
source => 'puppet:///modules/ceilometer/ocf/ceilometer-agent-central',
}

View File

@ -49,10 +49,10 @@ class ceilometer::alarm::evaluator (
Package['pacemaker'] -> File['ceilometer-alarm-evaluator-ocf']
file {'ceilometer-alarm-evaluator-ocf':
path=>'/usr/lib/ocf/resource.d/mirantis/ceilometer-alarm-evaluator',
mode => 755,
owner => root,
group => root,
path =>'/usr/lib/ocf/resource.d/mirantis/ceilometer-alarm-evaluator',
mode => '0755',
owner => root,
group => root,
source => 'puppet:///modules/ceilometer/ocf/ceilometer-alarm-evaluator',
}

View File

@ -25,10 +25,10 @@ class cluster::haproxy (
Cs_commit[$cib_name] -> Service['haproxy']
file {'haproxy-ocf':
path=>'/usr/lib/ocf/resource.d/mirantis/haproxy',
mode => 755,
owner => root,
group => root,
path =>'/usr/lib/ocf/resource.d/mirantis/haproxy',
mode => '0755',
owner => root,
group => root,
source => "puppet:///modules/cluster/haproxy",
}
File<| title == 'ocf-mirantis-path' |> -> File['haproxy-ocf']
@ -74,7 +74,7 @@ class cluster::haproxy (
replace => "no",
ensure => "present",
content => "manual",
mode => 644
mode => '0644'
} -> File['haproxy-ocf']
}
} elsif ($::osfamily == 'RedHat') {

View File

@ -34,7 +34,7 @@ class motd {
concat{$motd:
owner => root,
group => root,
mode => 644
mode => '0644'
}
concat::fragment{"motd_header":

View File

@ -119,7 +119,7 @@ class corosync (
replace => "no",
ensure => "present",
content => "manual",
mode => 644,
mode => '0644',
before => Package[corosync],
}
}

View File

@ -72,7 +72,7 @@ class galera (
file { '/etc/init.d/mysql':
ensure => present,
mode => 644,
mode => '0644',
require => Package['MySQL-server'],
before => File['mysql-wss-ocf']
}
@ -107,7 +107,7 @@ class galera (
file { '/etc/init.d/mysql':
ensure => present,
mode => 644,
mode => '0644',
source => 'puppet:///modules/galera/mysql.init' ,
require => Package['MySQL-server'],
before => File['mysql-wss-ocf']
@ -176,10 +176,10 @@ class galera (
}
file {'mysql-wss-ocf':
path=>'/usr/lib/ocf/resource.d/mirantis/mysql-wss',
mode => 755,
owner => root,
group => root,
path => '/usr/lib/ocf/resource.d/mirantis/mysql-wss',
mode => '0755',
owner => root,
group => root,
source => "puppet:///modules/galera/ocf/mysql-wss",
}
File<| title == 'ocf-mirantis-path' |> -> File['mysql-wss-ocf']

View File

@ -145,7 +145,7 @@ class keystone(
ensure => directory,
owner => 'keystone',
group => 'keystone',
mode => 0755,
mode => '0755',
notify => Service['keystone'],
}
if $::operatingsystem == 'Ubuntu' {
@ -153,7 +153,7 @@ class keystone(
file { '/etc/init/keystone.override':
ensure => present,
content => "manual",
mode => 644,
mode => '0644',
replace => "no",
owner => 'root',
group => 'root',

View File

@ -44,9 +44,9 @@ class nailgun::gateone (
file { "${venv}/gateone/settings/10server.conf":
content => template("nailgun/gateone/10server.conf.erb"),
owner => 'root',
group => 'root',
mode => 0644,
owner => 'root',
group => 'root',
mode => '0644',
require => [
Nailgun::Venv::Pip['gateone'],
],
@ -54,16 +54,16 @@ class nailgun::gateone (
file { "${venv}/gateone/settings/50terminal.conf":
content => template("nailgun/gateone/50terminal.conf.erb"),
owner => 'root',
group => 'root',
mode => 0644,
owner => 'root',
group => 'root',
mode => '0644',
require => [
Nailgun::Venv::Pip['gateone'],
],
}
file { "${venv}/gateone/applications/terminal/plugins/ssh/scripts/ssh_connect.py":
mode => 755,
mode => '0755',
require => [
Nailgun::Venv::Pip['gateone'],
],
@ -82,7 +82,7 @@ class nailgun::gateone (
require => [
Nailgun::Venv::Pip['gateone'],
],
mode => 0755,
mode => '0755',
}
file { [ "${venv}/users/", "${venv}/users/ANONYMOUS/",
@ -96,16 +96,16 @@ class nailgun::gateone (
file { "${venv}/users/ANONYMOUS/.ssh/config":
content => template("nailgun/gateone/config.erb"),
owner => 'root',
group => 'root',
mode => 0644,
owner => 'root',
group => 'root',
mode => '0644',
}
file { "${venv}/users/ANONYMOUS/.ssh/.default_ids":
content => template("nailgun/gateone/default_ids.erb"),
owner => 'root',
group => 'root',
mode => 0644,
owner => 'root',
group => 'root',
mode => '0644',
} ->
exec { "create_gateone_key":

View File

@ -25,9 +25,9 @@ class neutron::agents::dhcp (
if $::operatingsystem == 'Ubuntu' {
file { '/etc/init/neutron-dhcp-agent.override':
replace => 'no',
ensure => 'present',
ensure => 'present',
content => 'manual',
mode => 644,
mode => '0644',
} -> Package<| title=="$dhcp_agent_package" |>
if $service_provider != 'pacemaker' {
Package<| title=="$dhcp_agent_package" |> ->
@ -95,10 +95,10 @@ class neutron::agents::dhcp (
# OCF script for pacemaker
# and his dependences
file {'neutron-dhcp-agent-ocf':
path=>'/usr/lib/ocf/resource.d/mirantis/neutron-agent-dhcp',
mode => 755,
owner => root,
group => root,
path =>'/usr/lib/ocf/resource.d/mirantis/neutron-agent-dhcp',
mode => '0755',
owner => root,
group => root,
source => "puppet:///modules/neutron/ocf/neutron-agent-dhcp",
}

View File

@ -27,9 +27,9 @@ class neutron::agents::l3 (
if $::operatingsystem == 'Ubuntu' {
file { '/etc/init/neutron-l3-agent.override':
replace => 'no',
ensure => 'present',
ensure => 'present',
content => 'manual',
mode => 644,
mode => '0644',
} -> Package<| title == "$l3_agent_package" |>
if $service_provider != 'pacemaker' {
Package<| title == "$l3_agent_package" |> ->
@ -94,10 +94,10 @@ class neutron::agents::l3 (
# OCF script for pacemaker
# and his dependences
file {'neutron-l3-agent-ocf':
path=>'/usr/lib/ocf/resource.d/mirantis/neutron-agent-l3',
mode => 755,
owner => root,
group => root,
path =>'/usr/lib/ocf/resource.d/mirantis/neutron-agent-l3',
mode => '0755',
owner => root,
group => root,
source => "puppet:///modules/neutron/ocf/neutron-agent-l3",
}

View File

@ -67,10 +67,10 @@ class neutron::agents::metadata (
# OCF script for pacemaker
# and his dependences
file {'neutron-metadata-agent-ocf':
path=>'/usr/lib/ocf/resource.d/mirantis/neutron-agent-metadata',
mode => 755,
owner => root,
group => root,
path =>'/usr/lib/ocf/resource.d/mirantis/neutron-agent-metadata',
mode => '0755',
owner => root,
group => root,
source => "puppet:///modules/neutron/ocf/neutron-agent-metadata",
}
Package['pacemaker'] -> File['neutron-metadata-agent-ocf']

View File

@ -31,7 +31,7 @@ class neutron::agents::ovs (
replace => "no",
ensure => "present",
content => "manual",
mode => 644,
mode => '0644',
} -> Package<| title=="$ovs_agent_package" |>
if $service_provider != 'pacemaker' {
Package<| title=="$ovs_agent_package" |> ->
@ -69,10 +69,10 @@ class neutron::agents::ovs (
# OCF script for pacemaker
# and his dependences
file {'neutron-ovs-agent-ocf':
path=>'/usr/lib/ocf/resource.d/mirantis/neutron-agent-ovs',
mode => 755,
owner => root,
group => root,
path =>'/usr/lib/ocf/resource.d/mirantis/neutron-agent-ovs',
mode => '0755',
owner => root,
group => root,
source => "puppet:///modules/neutron/ocf/neutron-agent-ovs",
}
File['neutron-ovs-agent-ocf'] -> Cs_resource[$res_name]

View File

@ -27,7 +27,7 @@ class neutron (
ensure => directory,
owner => 'root',
group => 'root',
mode => 755,
mode => '0755',
}
}
@ -39,7 +39,7 @@ class neutron (
Package['neutron'] ->
file {'q-agent-cleanup.py':
path => '/usr/bin/q-agent-cleanup.py',
mode => 755,
mode => '0755',
owner => root,
group => root,
source => "puppet:///modules/neutron/q-agent-cleanup.py",
@ -48,7 +48,7 @@ class neutron (
Package['neutron'] ->
file {'neutron-root':
path => '/etc/sudoers.d/neutron-root',
mode => 0440,
mode => '0440',
owner => root,
group => root,
source => "puppet:///modules/neutron/neutron-root",
@ -58,7 +58,7 @@ class neutron (
file {'/var/cache/neutron':
ensure => directory,
path => '/var/cache/neutron',
mode => 755,
mode => '0755',
owner => neutron,
group => neutron,
}

View File

@ -31,7 +31,7 @@ class neutron::server (
replace => 'no',
ensure => 'present',
content => 'manual',
mode => 644,
mode => '0644',
} -> Package["$server_package"]
if $service_provider != 'pacemaker' {
Package["$server_package"] ->

View File

@ -16,7 +16,7 @@ class nova::compute::file_hack() {
File {
owner => 'root',
group => 'root',
mode => '755',
mode => '0755',
require => Package['nova-compute'],
notify => Service['nova-compute'],
}

View File

@ -29,12 +29,12 @@ Cs_property<||>->Cs_shadow<||>
Cs_property['no-quorum-policy']->Cs_property['stonith-enabled']->Cs_property['start-failure-is-fatal']
file {'filter_quantum_ports.py':
path=>'/usr/bin/filter_quantum_ports.py',
mode => 744,
path =>'/usr/bin/filter_quantum_ports.py',
mode => '0744',
#require =>[Package['corosync'],File['/root/openrc']],
#require =>Package['corosync'],
owner => root,
group => root,
owner => root,
group => root,
source => "puppet:///modules/openstack/filter_quantum_ports.py",
}

View File

@ -28,7 +28,7 @@ user {'puppet':
file {'/etc/sudoers.d/puppet_postgresql_tests':
ensure => file,
content => 'vagrant ALL=(ALL) ALL',
mode => 0440,
mode => '0440',
owner => root,
group => root,
}

View File

@ -40,16 +40,16 @@ class qpid::server(
qpid_safe_package { $qpid::params::additional_packages : }
#Disable routing because it creates duplicates. Need upstream fixes
# file { '/usr/local/bin/qpid-setup-routes.sh':
# ensure => present,
# owner => 'root',
# group => 'root',
# mode => 755,
# ensure => present,
# owner => 'root',
# group => 'root',
# mode => '0755',
# content => template('qpid/qpid-setup-routes.sh.erb'),
# }
#
# exec { "propagate_qpid_routes":
# path => "/usr/bin/:/bin:/usr/sbin",
# command => "bash /usr/local/bin/qpid-setup-routes.sh",
# path => "/usr/bin/:/bin:/usr/sbin",
# command => "bash /usr/local/bin/qpid-setup-routes.sh",
# subscribe => File['/usr/local/bin/qpid-setup-routes.sh'],
# logoutput => true,
# }
@ -66,29 +66,29 @@ class qpid::server(
file {'/var/lib/qpidd/qpidd.sasldb':
ensure => present,
owner => 'qpidd',
group => 'qpidd',
mode => 600,
owner => 'qpidd',
group => 'qpidd',
mode => '0600',
before => File[$::qpid::params::config_file]
}
}
file { $::qpid::params::config_file:
ensure => present,
owner => 'root',
group => 'root',
mode => 644,
ensure => present,
owner => 'root',
group => 'root',
mode => '0644',
content => template('qpid/qpidd.conf.erb'),
require => Package[$::qpid::params::package_name],
}
if $log_to_file != 'UNSET' {
file { $log_to_file:
ensure => present,
owner => 'qpidd',
group => 'qpidd',
mode => 644,
ensure => present,
owner => 'qpidd',
group => 'qpidd',
mode => '0644',
require => Package[$::qpid::params::package_name],
before => File[$::qpid::params::config_file],
before => File[$::qpid::params::config_file],
}
}
service { $::qpid::params::service_name:

View File

@ -46,7 +46,7 @@ class squid {
file { "cache_dir":
path => "${squid::params::cache_dir}",
mode => "755",
mode => '0755',
owner => "${squid::params::processuser}",
group => "${squid::params::configfile_group}",
ensure => directory,
@ -54,7 +54,7 @@ class squid {
file { "cache_log_dir":
path => "${squid::params::cache_log_dir}",
mode => "640",
mode => '0640',
owner => "${squid::params::processuser}",
group => "${squid::params::processuser}",
ensure => directory,

View File

@ -9,6 +9,6 @@ class ssh::client::config {
# Workaround for http://projects.reductivelabs.com/issues/2014
file { $ssh::params::ssh_known_hosts:
mode => 644,
mode => '0644',
}
}

View File

@ -45,8 +45,8 @@ class swift(
file { '/tmp/keystone-signing-swift':
ensure => directory,
owner => 'swift',
group => 'swift',
owner => 'swift',
group => 'swift',
mode => '0700',
}
file { '/var/lib/glance':

View File

@ -57,7 +57,7 @@ define swift::storage::server(
owner => $owner,
group => $group,
notify => Service["swift-${type}", "swift-${type}-replicator"],
mode => 640,
mode => '0640',
}
$required_middlewares = split(