puppet-neutron/manifests/quota.pp
Sergey Kolekonov 5379de00d0 Move Neutron to $::os_service_default - part 2
This change updates the values in main classes that are currently set to
the same values as in default configuration files to $::os_service_default fact

Change-Id: I5279cfd72192534a5ffcfdaf71b257b082a8b42c
Related-bug: #1515273
2015-12-11 17:48:16 +03:00

135 lines
5.1 KiB
Puppet

# == Class: neutron::quota
#
# Setups neutron quota.
#
# === Parameters
#
# [*default_quota*]
# (optional) Default number of resources allowed per tenant,
# minus for unlimited. Defaults to $::os_service_default.
#
# [*quota_network*]
# (optional) Number of networks allowed per tenant, and minus means unlimited.
# Defaults to $::os_service_default.
#
# [*quota_subnet*]
# (optional) Number of subnets allowed per tenant, and minus means unlimited.
# Defaults to $::os_service_default.
#
# [*quota_port*]
# (optional) Number of ports allowed per tenant, and minus means unlimited.
# Defaults to $::os_service_default.
#
# [*quota_router*]
# (optional) Number of routers allowed per tenant, and minus means unlimited.
# Requires L3 extension. Defaults to $::os_service_default.
#
# [*quota_floatingip*]
# (optional) Number of floating IPs allowed per tenant,
# and minus means unlimited. Requires L3 extension. Defaults to $::os_service_default.
#
# [*quota_security_group*]
# (optional) Number of security groups allowed per tenant,
# and minus means unlimited. Requires securitygroup extension.
# Defaults to $::os_service_default.
#
# [*quota_security_group_rule*]
# (optional) Number of security rules allowed per tenant,
# and minus means unlimited. Requires securitygroup extension.
# Defaults to $::os_service_default.
#
# [*quota_driver*]
# (optional) Default driver to use for quota checks.
# Defaults to $::os_service_default.
#
# [*quota_firewall*]
# (optional) Number of firewalls allowed per tenant, -1 for unlimited.
# Defaults to $::os_service_default.
#
# [*quota_firewall_policy*]
# (optional) Number of firewalls policies allowed per tenant, -1 for unlimited.
# Defaults to $::os_service_default.
#
# [*quota_firewall_rule*]
# (optional) Number of firewalls rules allowed per tenant, -1 for unlimited.
# Defaults to '-1'.
#
# [*quota_health_monitor*]
# (optional) Number of health monitors allowed per tenant.
# A negative value means unlimited.
# Defaults to $::os_service_default.
#
# [*quota_items*]
# (optional) Resource name(s) that are supported in quota features.
# Defaults to $::os_service_default.
#
# [*quota_member*]
# (optional) Number of pool members allowed per tenant.
# A negative value means unlimited
# Defaults to $::os_service_default.
#
# [*quota_network_gateway*]
# (optional) Number of network gateways allowed per tenant, -1 for unlimited.
# Defaults to '5'.
#
# [*quota_packet_filter*]
# (optional) Number of packet_filters allowed per tenant, -1 for unlimited.
# Defaults to '100'.
#
# [*quota_pool*]
# (optional) Number of pools allowed per tenant.
# A negative value means unlimited.
# Defaults to $::os_service_default.
#
# [*quota_vip*]
# (optional) Number of vips allowed per tenant.
# A negative value means unlimited.
# Defaults to $::os_service_default.
#
class neutron::quota (
$default_quota = $::os_service_default,
$quota_network = $::os_service_default,
$quota_subnet = $::os_service_default,
$quota_port = $::os_service_default,
# l3 extension
$quota_router = $::os_service_default,
$quota_floatingip = $::os_service_default,
# securitygroup extension
$quota_security_group = $::os_service_default,
$quota_security_group_rule = $::os_service_default,
$quota_driver = $::os_service_default,
$quota_firewall = $::os_service_default,
$quota_firewall_policy = $::os_service_default,
$quota_firewall_rule = -1,
$quota_health_monitor = $::os_service_default,
$quota_items = $::os_service_default,
$quota_member = $::os_service_default,
$quota_network_gateway = 5,
$quota_packet_filter = 100,
$quota_pool = $::os_service_default,
$quota_vip = $::os_service_default
) {
neutron_config {
'quotas/default_quota': value => $default_quota;
'quotas/quota_network': value => $quota_network;
'quotas/quota_subnet': value => $quota_subnet;
'quotas/quota_port': value => $quota_port;
'quotas/quota_router': value => $quota_router;
'quotas/quota_floatingip': value => $quota_floatingip;
'quotas/quota_security_group': value => $quota_security_group;
'quotas/quota_security_group_rule': value => $quota_security_group_rule;
'quotas/quota_driver': value => $quota_driver;
'quotas/quota_firewall': value => $quota_firewall;
'quotas/quota_firewall_policy': value => $quota_firewall_policy;
'quotas/quota_firewall_rule': value => $quota_firewall_rule;
'quotas/quota_health_monitor': value => $quota_health_monitor;
'quotas/quota_items': value => $quota_items;
'quotas/quota_member': value => $quota_member;
'quotas/quota_network_gateway': value => $quota_network_gateway;
'quotas/quota_packet_filter': value => $quota_packet_filter;
'quotas/quota_pool': value => $quota_pool;
'quotas/quota_vip': value => $quota_vip;
}
}