Removing WARNING: line has more than 140 characters in puppet-tripleo profiles
Some lint checks are returning: WARNING: line has more than 140 characters in puppet-tripleo profiles This patch will remove those warnings by adding \'s Change-Id: I19b56c93db82948fb0498a4c9851b522c81946f8
This commit is contained in:
parent
b2c8033766
commit
ea752f3527
@ -870,7 +870,12 @@ class tripleo::haproxy (
|
||||
options => {
|
||||
'balance' => 'first',
|
||||
'option' => ['tcp-check',],
|
||||
'tcp-check' => union($redis_tcp_check_options, ['send PING\r\n','expect string +PONG','send info\ replication\r\n','expect string role:master','send QUIT\r\n','expect string +OK']),
|
||||
'tcp-check' => union($redis_tcp_check_options, ['send PING\r\n',
|
||||
'expect string +PONG',
|
||||
'send info\ replication\r\n',
|
||||
'expect string role:master',
|
||||
'send QUIT\r\n',
|
||||
'expect string +OK']),
|
||||
},
|
||||
collect_exported => false,
|
||||
}
|
||||
|
@ -88,7 +88,8 @@ define tripleo::haproxy::endpoint (
|
||||
# service exposed to the public network
|
||||
|
||||
if $public_certificate {
|
||||
$public_bind_opts = list_to_hash(suffix(any2array($public_virtual_ip), ":${public_ssl_port}"), union($haproxy_listen_bind_param, ['ssl', 'crt', $public_certificate]))
|
||||
$public_bind_opts = list_to_hash(suffix(any2array($public_virtual_ip), ":${public_ssl_port}"),
|
||||
union($haproxy_listen_bind_param, ['ssl', 'crt', $public_certificate]))
|
||||
} else {
|
||||
$public_bind_opts = list_to_hash(suffix(any2array($public_virtual_ip), ":${service_port}"), $haproxy_listen_bind_param)
|
||||
}
|
||||
@ -98,7 +99,8 @@ define tripleo::haproxy::endpoint (
|
||||
}
|
||||
|
||||
if $internal_certificate {
|
||||
$internal_bind_opts = list_to_hash(suffix(any2array($internal_ip), ":${service_port}"), union($haproxy_listen_bind_param, ['ssl', 'crt', $public_certificate]))
|
||||
$internal_bind_opts = list_to_hash(suffix(any2array($internal_ip), ":${service_port}"),
|
||||
union($haproxy_listen_bind_param, ['ssl', 'crt', $public_certificate]))
|
||||
} else {
|
||||
$internal_bind_opts = list_to_hash(suffix(any2array($internal_ip), ":${service_port}"), $haproxy_listen_bind_param)
|
||||
}
|
||||
|
@ -30,7 +30,8 @@ class tripleo::profile::base::ceilometer::expirer (
|
||||
|
||||
if $step >= 4 {
|
||||
include ::ceilometer::expirer
|
||||
Cron <| title == 'ceilometer-expirer' |> { command => "sleep $((\$(od -A n -t d -N 3 /dev/urandom) % 86400)) && ${::ceilometer::params::expirer_command}" }
|
||||
Cron <| title == 'ceilometer-expirer' |>
|
||||
{ command => "sleep $((\$(od -A n -t d -N 3 /dev/urandom) % 86400)) && ${::ceilometer::params::expirer_command}" }
|
||||
}
|
||||
|
||||
}
|
||||
|
@ -108,7 +108,13 @@ class tripleo::profile::base::cinder::volume (
|
||||
$cinder_rbd_backend_name = undef
|
||||
}
|
||||
|
||||
$cinder_enabled_backends = delete_undef_values([$cinder_iscsi_backend_name, $cinder_rbd_backend_name, $cinder_eqlx_backend_name, $cinder_dellsc_backend_name, $cinder_netapp_backend_name, $cinder_nfs_backend_name, $cinder_user_enabled_backends])
|
||||
$cinder_enabled_backends = delete_undef_values([$cinder_iscsi_backend_name,
|
||||
$cinder_rbd_backend_name,
|
||||
$cinder_eqlx_backend_name,
|
||||
$cinder_dellsc_backend_name,
|
||||
$cinder_netapp_backend_name,
|
||||
$cinder_nfs_backend_name,
|
||||
$cinder_user_enabled_backends])
|
||||
class { '::cinder::backends' :
|
||||
enabled_backends => $cinder_enabled_backends,
|
||||
}
|
||||
|
@ -43,7 +43,16 @@ class tripleo::profile::base::snmp (
|
||||
}
|
||||
class { '::snmp':
|
||||
agentaddress => ['udp:161','udp6:[::1]:161'],
|
||||
snmpd_config => [ join(['createUser ', $snmpd_user, ' MD5 "', $snmpd_password, '"']), join(['rouser ', $snmpd_user]), 'proc cron', 'includeAllDisks 10%', 'master agentx', 'trapsink localhost public', 'iquerySecName internalUser', 'rouser internalUser', 'defaultMonitors yes', 'linkUpDownNotifications yes' ],
|
||||
snmpd_config => [ join(['createUser ', $snmpd_user, ' MD5 "', $snmpd_password, '"']),
|
||||
join(['rouser ', $snmpd_user]),
|
||||
'proc cron',
|
||||
'includeAllDisks 10%',
|
||||
'master agentx',
|
||||
'trapsink localhost public',
|
||||
'iquerySecName internalUser',
|
||||
'rouser internalUser',
|
||||
'defaultMonitors yes',
|
||||
'linkUpDownNotifications yes' ],
|
||||
}
|
||||
}
|
||||
}
|
||||
|
@ -150,8 +150,12 @@ MYSQL_HOST=localhost\n",
|
||||
# with proper credentials. This step happens on every node because this sql
|
||||
# statement does not automatically replicate across nodes.
|
||||
$mysql_root_password = hiera('mysql::server::root_password')
|
||||
$galera_set_pwd = "/bin/touch /root/.my.cnf && \
|
||||
/bin/echo \"UPDATE mysql.user SET Password = PASSWORD('${mysql_root_password}') WHERE user = 'root'; \
|
||||
flush privileges;\" | \
|
||||
/bin/mysql --defaults-extra-file=/root/.my.cnf -u root"
|
||||
exec { 'galera-set-root-password':
|
||||
command => "/bin/touch /root/.my.cnf && /bin/echo \"UPDATE mysql.user SET Password = PASSWORD('${mysql_root_password}') WHERE user = 'root'; flush privileges;\" | /bin/mysql --defaults-extra-file=/root/.my.cnf -u root",
|
||||
command => $galera_set_pwd,
|
||||
}
|
||||
file { '/root/.my.cnf' :
|
||||
ensure => file,
|
||||
|
Loading…
Reference in New Issue
Block a user