puppet-openstack-integration/manifests/murano.pp
Tobias Urdin 81687e2ead Convert all class usage to relative names
In Puppet 3 there was a need to use absolute
names to prevent issues. Since Puppet 4 everything
is absolute by default which makes this not needed.

We need to change this everywhere so that we can
revert the pin in [1] that now prevents us from
using the latest version of the puppet-lint check
puppet-lint-absolute_classname_check that properly
checks that we dont use absolute names.

[1] https://review.opendev.org/#/c/697742/

Change-Id: I78b74fbeb08be7234189e4d266412fb7fb7a73c0
2019-12-08 14:58:12 +01:00

86 lines
3.1 KiB
Puppet

class openstack_integration::murano {
include openstack_integration::config
include openstack_integration::params
rabbitmq_user { ['murano', 'murano_private']:
admin => true,
password => 'an_even_bigger_secret',
provider => 'rabbitmqctl',
require => Class['rabbitmq'],
}
rabbitmq_vhost { '/murano':
provider => 'rabbitmqctl',
require => Class['rabbitmq'],
}
rabbitmq_user_permissions { ['murano@/', 'murano_private@/murano']:
configure_permission => '.*',
write_permission => '.*',
read_permission => '.*',
provider => 'rabbitmqctl',
require => [ Class['rabbitmq'], Rabbitmq_vhost['/murano'] ],
}
if $::openstack_integration::config::messaging_default_proto == 'amqp' {
qdr_user { 'murano':
password => 'an_even_bigger_secret',
provider => 'sasl',
require => Class['qdr'],
}
}
if $::openstack_integration::config::ssl {
openstack_integration::ssl_key { 'murano':
notify => Service['murano-api'],
require => Package['murano-common'],
}
Exec['update-ca-certificates'] ~> Service['murano-api']
}
class { 'murano::db::mysql':
password => 'a_big_secret',
}
class { 'murano::logging':
debug => true,
}
class { 'murano':
admin_password => 'a_big_secret',
default_transport_url => os_transport_url({
'transport' => $::openstack_integration::config::messaging_default_proto,
'host' => $::openstack_integration::config::host,
'port' => $::openstack_integration::config::messaging_default_port,
'username' => 'murano',
'password' => 'an_even_bigger_secret',
}),
rabbit_os_use_ssl => $::openstack_integration::config::ssl,
rabbit_own_user => 'murano_private',
rabbit_own_password => 'an_even_bigger_secret',
rabbit_own_vhost => '/murano',
rabbit_own_host => $::openstack_integration::config::host,
rabbit_own_port => $::openstack_integration::config::rabbit_port,
rabbit_own_use_ssl => $::openstack_integration::config::ssl,
database_connection => 'mysql+pymysql://murano:a_big_secret@127.0.0.1/murano?charset=utf8',
identity_uri => $::openstack_integration::config::keystone_admin_uri,
www_authenticate_uri => $::openstack_integration::config::keystone_auth_uri,
use_ssl => $::openstack_integration::config::ssl,
service_host => $::openstack_integration::config::ip_for_url,
cert_file => $::openstack_integration::params::cert_path,
key_file => "/etc/murano/ssl/private/${::fqdn}.pem",
}
class { 'murano::api':
host => $::openstack_integration::config::host,
}
class { 'murano::engine': }
class { 'murano::keystone::auth':
password => 'a_big_secret',
public_url => "${::openstack_integration::config::base_url}:8082",
internal_url => "${::openstack_integration::config::base_url}:8082",
admin_url => "${::openstack_integration::config::base_url}:8082",
}
-> murano::application { 'io.murano': }
}