Cleanup for file modes
Change-Id: I8b8390949680dff1f862a1747fdac57afdc10d57
This commit is contained in:
parent
358b6ce641
commit
d353740465
@ -75,10 +75,10 @@ class ceilometer::agent::central (
|
||||
|
||||
Package['pacemaker'] -> File['ceilometer-agent-central-ocf']
|
||||
file {'ceilometer-agent-central-ocf':
|
||||
path=>'/usr/lib/ocf/resource.d/mirantis/ceilometer-agent-central',
|
||||
mode => 755,
|
||||
owner => root,
|
||||
group => root,
|
||||
path =>'/usr/lib/ocf/resource.d/mirantis/ceilometer-agent-central',
|
||||
mode => '0755',
|
||||
owner => root,
|
||||
group => root,
|
||||
source => 'puppet:///modules/ceilometer/ocf/ceilometer-agent-central',
|
||||
}
|
||||
|
||||
|
@ -49,10 +49,10 @@ class ceilometer::alarm::evaluator (
|
||||
|
||||
Package['pacemaker'] -> File['ceilometer-alarm-evaluator-ocf']
|
||||
file {'ceilometer-alarm-evaluator-ocf':
|
||||
path=>'/usr/lib/ocf/resource.d/mirantis/ceilometer-alarm-evaluator',
|
||||
mode => 755,
|
||||
owner => root,
|
||||
group => root,
|
||||
path =>'/usr/lib/ocf/resource.d/mirantis/ceilometer-alarm-evaluator',
|
||||
mode => '0755',
|
||||
owner => root,
|
||||
group => root,
|
||||
source => 'puppet:///modules/ceilometer/ocf/ceilometer-alarm-evaluator',
|
||||
}
|
||||
|
||||
|
@ -25,10 +25,10 @@ class cluster::haproxy (
|
||||
Cs_commit[$cib_name] -> Service['haproxy']
|
||||
|
||||
file {'haproxy-ocf':
|
||||
path=>'/usr/lib/ocf/resource.d/mirantis/haproxy',
|
||||
mode => 755,
|
||||
owner => root,
|
||||
group => root,
|
||||
path =>'/usr/lib/ocf/resource.d/mirantis/haproxy',
|
||||
mode => '0755',
|
||||
owner => root,
|
||||
group => root,
|
||||
source => "puppet:///modules/cluster/haproxy",
|
||||
}
|
||||
File<| title == 'ocf-mirantis-path' |> -> File['haproxy-ocf']
|
||||
@ -74,7 +74,7 @@ class cluster::haproxy (
|
||||
replace => "no",
|
||||
ensure => "present",
|
||||
content => "manual",
|
||||
mode => 644
|
||||
mode => '0644'
|
||||
} -> File['haproxy-ocf']
|
||||
}
|
||||
} elsif ($::osfamily == 'RedHat') {
|
||||
|
@ -34,7 +34,7 @@ class motd {
|
||||
concat{$motd:
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => 644
|
||||
mode => '0644'
|
||||
}
|
||||
|
||||
concat::fragment{"motd_header":
|
||||
|
@ -119,7 +119,7 @@ class corosync (
|
||||
replace => "no",
|
||||
ensure => "present",
|
||||
content => "manual",
|
||||
mode => 644,
|
||||
mode => '0644',
|
||||
before => Package[corosync],
|
||||
}
|
||||
}
|
||||
|
@ -72,7 +72,7 @@ class galera (
|
||||
|
||||
file { '/etc/init.d/mysql':
|
||||
ensure => present,
|
||||
mode => 644,
|
||||
mode => '0644',
|
||||
require => Package['MySQL-server'],
|
||||
before => File['mysql-wss-ocf']
|
||||
}
|
||||
@ -107,7 +107,7 @@ class galera (
|
||||
|
||||
file { '/etc/init.d/mysql':
|
||||
ensure => present,
|
||||
mode => 644,
|
||||
mode => '0644',
|
||||
source => 'puppet:///modules/galera/mysql.init' ,
|
||||
require => Package['MySQL-server'],
|
||||
before => File['mysql-wss-ocf']
|
||||
@ -176,10 +176,10 @@ class galera (
|
||||
}
|
||||
|
||||
file {'mysql-wss-ocf':
|
||||
path=>'/usr/lib/ocf/resource.d/mirantis/mysql-wss',
|
||||
mode => 755,
|
||||
owner => root,
|
||||
group => root,
|
||||
path => '/usr/lib/ocf/resource.d/mirantis/mysql-wss',
|
||||
mode => '0755',
|
||||
owner => root,
|
||||
group => root,
|
||||
source => "puppet:///modules/galera/ocf/mysql-wss",
|
||||
}
|
||||
File<| title == 'ocf-mirantis-path' |> -> File['mysql-wss-ocf']
|
||||
|
@ -145,7 +145,7 @@ class keystone(
|
||||
ensure => directory,
|
||||
owner => 'keystone',
|
||||
group => 'keystone',
|
||||
mode => 0755,
|
||||
mode => '0755',
|
||||
notify => Service['keystone'],
|
||||
}
|
||||
if $::operatingsystem == 'Ubuntu' {
|
||||
@ -153,7 +153,7 @@ class keystone(
|
||||
file { '/etc/init/keystone.override':
|
||||
ensure => present,
|
||||
content => "manual",
|
||||
mode => 644,
|
||||
mode => '0644',
|
||||
replace => "no",
|
||||
owner => 'root',
|
||||
group => 'root',
|
||||
|
@ -44,9 +44,9 @@ class nailgun::gateone (
|
||||
|
||||
file { "${venv}/gateone/settings/10server.conf":
|
||||
content => template("nailgun/gateone/10server.conf.erb"),
|
||||
owner => 'root',
|
||||
group => 'root',
|
||||
mode => 0644,
|
||||
owner => 'root',
|
||||
group => 'root',
|
||||
mode => '0644',
|
||||
require => [
|
||||
Nailgun::Venv::Pip['gateone'],
|
||||
],
|
||||
@ -54,16 +54,16 @@ class nailgun::gateone (
|
||||
|
||||
file { "${venv}/gateone/settings/50terminal.conf":
|
||||
content => template("nailgun/gateone/50terminal.conf.erb"),
|
||||
owner => 'root',
|
||||
group => 'root',
|
||||
mode => 0644,
|
||||
owner => 'root',
|
||||
group => 'root',
|
||||
mode => '0644',
|
||||
require => [
|
||||
Nailgun::Venv::Pip['gateone'],
|
||||
],
|
||||
}
|
||||
|
||||
file { "${venv}/gateone/applications/terminal/plugins/ssh/scripts/ssh_connect.py":
|
||||
mode => 755,
|
||||
mode => '0755',
|
||||
require => [
|
||||
Nailgun::Venv::Pip['gateone'],
|
||||
],
|
||||
@ -82,7 +82,7 @@ class nailgun::gateone (
|
||||
require => [
|
||||
Nailgun::Venv::Pip['gateone'],
|
||||
],
|
||||
mode => 0755,
|
||||
mode => '0755',
|
||||
}
|
||||
|
||||
file { [ "${venv}/users/", "${venv}/users/ANONYMOUS/",
|
||||
@ -96,16 +96,16 @@ class nailgun::gateone (
|
||||
|
||||
file { "${venv}/users/ANONYMOUS/.ssh/config":
|
||||
content => template("nailgun/gateone/config.erb"),
|
||||
owner => 'root',
|
||||
group => 'root',
|
||||
mode => 0644,
|
||||
owner => 'root',
|
||||
group => 'root',
|
||||
mode => '0644',
|
||||
}
|
||||
|
||||
file { "${venv}/users/ANONYMOUS/.ssh/.default_ids":
|
||||
content => template("nailgun/gateone/default_ids.erb"),
|
||||
owner => 'root',
|
||||
group => 'root',
|
||||
mode => 0644,
|
||||
owner => 'root',
|
||||
group => 'root',
|
||||
mode => '0644',
|
||||
} ->
|
||||
|
||||
exec { "create_gateone_key":
|
||||
|
@ -25,9 +25,9 @@ class neutron::agents::dhcp (
|
||||
if $::operatingsystem == 'Ubuntu' {
|
||||
file { '/etc/init/neutron-dhcp-agent.override':
|
||||
replace => 'no',
|
||||
ensure => 'present',
|
||||
ensure => 'present',
|
||||
content => 'manual',
|
||||
mode => 644,
|
||||
mode => '0644',
|
||||
} -> Package<| title=="$dhcp_agent_package" |>
|
||||
if $service_provider != 'pacemaker' {
|
||||
Package<| title=="$dhcp_agent_package" |> ->
|
||||
@ -95,10 +95,10 @@ class neutron::agents::dhcp (
|
||||
# OCF script for pacemaker
|
||||
# and his dependences
|
||||
file {'neutron-dhcp-agent-ocf':
|
||||
path=>'/usr/lib/ocf/resource.d/mirantis/neutron-agent-dhcp',
|
||||
mode => 755,
|
||||
owner => root,
|
||||
group => root,
|
||||
path =>'/usr/lib/ocf/resource.d/mirantis/neutron-agent-dhcp',
|
||||
mode => '0755',
|
||||
owner => root,
|
||||
group => root,
|
||||
source => "puppet:///modules/neutron/ocf/neutron-agent-dhcp",
|
||||
}
|
||||
|
||||
|
@ -27,9 +27,9 @@ class neutron::agents::l3 (
|
||||
if $::operatingsystem == 'Ubuntu' {
|
||||
file { '/etc/init/neutron-l3-agent.override':
|
||||
replace => 'no',
|
||||
ensure => 'present',
|
||||
ensure => 'present',
|
||||
content => 'manual',
|
||||
mode => 644,
|
||||
mode => '0644',
|
||||
} -> Package<| title == "$l3_agent_package" |>
|
||||
if $service_provider != 'pacemaker' {
|
||||
Package<| title == "$l3_agent_package" |> ->
|
||||
@ -94,10 +94,10 @@ class neutron::agents::l3 (
|
||||
# OCF script for pacemaker
|
||||
# and his dependences
|
||||
file {'neutron-l3-agent-ocf':
|
||||
path=>'/usr/lib/ocf/resource.d/mirantis/neutron-agent-l3',
|
||||
mode => 755,
|
||||
owner => root,
|
||||
group => root,
|
||||
path =>'/usr/lib/ocf/resource.d/mirantis/neutron-agent-l3',
|
||||
mode => '0755',
|
||||
owner => root,
|
||||
group => root,
|
||||
source => "puppet:///modules/neutron/ocf/neutron-agent-l3",
|
||||
}
|
||||
|
||||
|
@ -67,10 +67,10 @@ class neutron::agents::metadata (
|
||||
# OCF script for pacemaker
|
||||
# and his dependences
|
||||
file {'neutron-metadata-agent-ocf':
|
||||
path=>'/usr/lib/ocf/resource.d/mirantis/neutron-agent-metadata',
|
||||
mode => 755,
|
||||
owner => root,
|
||||
group => root,
|
||||
path =>'/usr/lib/ocf/resource.d/mirantis/neutron-agent-metadata',
|
||||
mode => '0755',
|
||||
owner => root,
|
||||
group => root,
|
||||
source => "puppet:///modules/neutron/ocf/neutron-agent-metadata",
|
||||
}
|
||||
Package['pacemaker'] -> File['neutron-metadata-agent-ocf']
|
||||
|
@ -31,7 +31,7 @@ class neutron::agents::ovs (
|
||||
replace => "no",
|
||||
ensure => "present",
|
||||
content => "manual",
|
||||
mode => 644,
|
||||
mode => '0644',
|
||||
} -> Package<| title=="$ovs_agent_package" |>
|
||||
if $service_provider != 'pacemaker' {
|
||||
Package<| title=="$ovs_agent_package" |> ->
|
||||
@ -69,10 +69,10 @@ class neutron::agents::ovs (
|
||||
# OCF script for pacemaker
|
||||
# and his dependences
|
||||
file {'neutron-ovs-agent-ocf':
|
||||
path=>'/usr/lib/ocf/resource.d/mirantis/neutron-agent-ovs',
|
||||
mode => 755,
|
||||
owner => root,
|
||||
group => root,
|
||||
path =>'/usr/lib/ocf/resource.d/mirantis/neutron-agent-ovs',
|
||||
mode => '0755',
|
||||
owner => root,
|
||||
group => root,
|
||||
source => "puppet:///modules/neutron/ocf/neutron-agent-ovs",
|
||||
}
|
||||
File['neutron-ovs-agent-ocf'] -> Cs_resource[$res_name]
|
||||
|
@ -27,7 +27,7 @@ class neutron (
|
||||
ensure => directory,
|
||||
owner => 'root',
|
||||
group => 'root',
|
||||
mode => 755,
|
||||
mode => '0755',
|
||||
}
|
||||
}
|
||||
|
||||
@ -39,7 +39,7 @@ class neutron (
|
||||
Package['neutron'] ->
|
||||
file {'q-agent-cleanup.py':
|
||||
path => '/usr/bin/q-agent-cleanup.py',
|
||||
mode => 755,
|
||||
mode => '0755',
|
||||
owner => root,
|
||||
group => root,
|
||||
source => "puppet:///modules/neutron/q-agent-cleanup.py",
|
||||
@ -48,7 +48,7 @@ class neutron (
|
||||
Package['neutron'] ->
|
||||
file {'neutron-root':
|
||||
path => '/etc/sudoers.d/neutron-root',
|
||||
mode => 0440,
|
||||
mode => '0440',
|
||||
owner => root,
|
||||
group => root,
|
||||
source => "puppet:///modules/neutron/neutron-root",
|
||||
@ -58,7 +58,7 @@ class neutron (
|
||||
file {'/var/cache/neutron':
|
||||
ensure => directory,
|
||||
path => '/var/cache/neutron',
|
||||
mode => 755,
|
||||
mode => '0755',
|
||||
owner => neutron,
|
||||
group => neutron,
|
||||
}
|
||||
|
@ -31,7 +31,7 @@ class neutron::server (
|
||||
replace => 'no',
|
||||
ensure => 'present',
|
||||
content => 'manual',
|
||||
mode => 644,
|
||||
mode => '0644',
|
||||
} -> Package["$server_package"]
|
||||
if $service_provider != 'pacemaker' {
|
||||
Package["$server_package"] ->
|
||||
|
@ -16,7 +16,7 @@ class nova::compute::file_hack() {
|
||||
File {
|
||||
owner => 'root',
|
||||
group => 'root',
|
||||
mode => '755',
|
||||
mode => '0755',
|
||||
require => Package['nova-compute'],
|
||||
notify => Service['nova-compute'],
|
||||
}
|
||||
|
@ -29,12 +29,12 @@ Cs_property<||>->Cs_shadow<||>
|
||||
Cs_property['no-quorum-policy']->Cs_property['stonith-enabled']->Cs_property['start-failure-is-fatal']
|
||||
|
||||
file {'filter_quantum_ports.py':
|
||||
path=>'/usr/bin/filter_quantum_ports.py',
|
||||
mode => 744,
|
||||
path =>'/usr/bin/filter_quantum_ports.py',
|
||||
mode => '0744',
|
||||
#require =>[Package['corosync'],File['/root/openrc']],
|
||||
#require =>Package['corosync'],
|
||||
owner => root,
|
||||
group => root,
|
||||
owner => root,
|
||||
group => root,
|
||||
source => "puppet:///modules/openstack/filter_quantum_ports.py",
|
||||
}
|
||||
|
||||
|
@ -28,7 +28,7 @@ user {'puppet':
|
||||
file {'/etc/sudoers.d/puppet_postgresql_tests':
|
||||
ensure => file,
|
||||
content => 'vagrant ALL=(ALL) ALL',
|
||||
mode => 0440,
|
||||
mode => '0440',
|
||||
owner => root,
|
||||
group => root,
|
||||
}
|
||||
|
@ -40,16 +40,16 @@ class qpid::server(
|
||||
qpid_safe_package { $qpid::params::additional_packages : }
|
||||
#Disable routing because it creates duplicates. Need upstream fixes
|
||||
# file { '/usr/local/bin/qpid-setup-routes.sh':
|
||||
# ensure => present,
|
||||
# owner => 'root',
|
||||
# group => 'root',
|
||||
# mode => 755,
|
||||
# ensure => present,
|
||||
# owner => 'root',
|
||||
# group => 'root',
|
||||
# mode => '0755',
|
||||
# content => template('qpid/qpid-setup-routes.sh.erb'),
|
||||
# }
|
||||
#
|
||||
# exec { "propagate_qpid_routes":
|
||||
# path => "/usr/bin/:/bin:/usr/sbin",
|
||||
# command => "bash /usr/local/bin/qpid-setup-routes.sh",
|
||||
# path => "/usr/bin/:/bin:/usr/sbin",
|
||||
# command => "bash /usr/local/bin/qpid-setup-routes.sh",
|
||||
# subscribe => File['/usr/local/bin/qpid-setup-routes.sh'],
|
||||
# logoutput => true,
|
||||
# }
|
||||
@ -66,29 +66,29 @@ class qpid::server(
|
||||
|
||||
file {'/var/lib/qpidd/qpidd.sasldb':
|
||||
ensure => present,
|
||||
owner => 'qpidd',
|
||||
group => 'qpidd',
|
||||
mode => 600,
|
||||
owner => 'qpidd',
|
||||
group => 'qpidd',
|
||||
mode => '0600',
|
||||
before => File[$::qpid::params::config_file]
|
||||
}
|
||||
}
|
||||
file { $::qpid::params::config_file:
|
||||
ensure => present,
|
||||
owner => 'root',
|
||||
group => 'root',
|
||||
mode => 644,
|
||||
ensure => present,
|
||||
owner => 'root',
|
||||
group => 'root',
|
||||
mode => '0644',
|
||||
content => template('qpid/qpidd.conf.erb'),
|
||||
require => Package[$::qpid::params::package_name],
|
||||
}
|
||||
|
||||
if $log_to_file != 'UNSET' {
|
||||
file { $log_to_file:
|
||||
ensure => present,
|
||||
owner => 'qpidd',
|
||||
group => 'qpidd',
|
||||
mode => 644,
|
||||
ensure => present,
|
||||
owner => 'qpidd',
|
||||
group => 'qpidd',
|
||||
mode => '0644',
|
||||
require => Package[$::qpid::params::package_name],
|
||||
before => File[$::qpid::params::config_file],
|
||||
before => File[$::qpid::params::config_file],
|
||||
}
|
||||
}
|
||||
service { $::qpid::params::service_name:
|
||||
|
@ -46,7 +46,7 @@ class squid {
|
||||
|
||||
file { "cache_dir":
|
||||
path => "${squid::params::cache_dir}",
|
||||
mode => "755",
|
||||
mode => '0755',
|
||||
owner => "${squid::params::processuser}",
|
||||
group => "${squid::params::configfile_group}",
|
||||
ensure => directory,
|
||||
@ -54,7 +54,7 @@ class squid {
|
||||
|
||||
file { "cache_log_dir":
|
||||
path => "${squid::params::cache_log_dir}",
|
||||
mode => "640",
|
||||
mode => '0640',
|
||||
owner => "${squid::params::processuser}",
|
||||
group => "${squid::params::processuser}",
|
||||
ensure => directory,
|
||||
|
@ -9,6 +9,6 @@ class ssh::client::config {
|
||||
|
||||
# Workaround for http://projects.reductivelabs.com/issues/2014
|
||||
file { $ssh::params::ssh_known_hosts:
|
||||
mode => 644,
|
||||
mode => '0644',
|
||||
}
|
||||
}
|
||||
|
@ -45,8 +45,8 @@ class swift(
|
||||
|
||||
file { '/tmp/keystone-signing-swift':
|
||||
ensure => directory,
|
||||
owner => 'swift',
|
||||
group => 'swift',
|
||||
owner => 'swift',
|
||||
group => 'swift',
|
||||
mode => '0700',
|
||||
}
|
||||
file { '/var/lib/glance':
|
||||
|
@ -57,7 +57,7 @@ define swift::storage::server(
|
||||
owner => $owner,
|
||||
group => $group,
|
||||
notify => Service["swift-${type}", "swift-${type}-replicator"],
|
||||
mode => 640,
|
||||
mode => '0640',
|
||||
}
|
||||
|
||||
$required_middlewares = split(
|
||||
|
Loading…
Reference in New Issue
Block a user