Making Packstack Compatible with Puppet 4.x
http://docs.puppetlabs.com/puppet/3.7/reference/deprecated_language.html Change-Id: I5695ec4e5d26fe809bcc4b5b99c46904d016cfb4 Signed-off-by: Gael Chamoulaud <gchamoul@redhat.com>
This commit is contained in:
parent
3e0d51396c
commit
1e7c162103
16
Gemfile
16
Gemfile
@ -2,10 +2,18 @@ source ENV["GEM_SOURCE"] || "https://rubygems.org"
|
||||
|
||||
group :development, :test do
|
||||
gem 'puppetlabs_spec_helper', :require => false
|
||||
gem 'puppet-lint', '~> 1.1'
|
||||
gem 'puppet-lint-param-docs', '1.1.0'
|
||||
gem 'puppet-syntax'
|
||||
gem 'rake', '10.1.1'
|
||||
|
||||
gem 'puppet-lint-param-docs'
|
||||
gem 'puppet-lint-absolute_classname-check'
|
||||
gem 'puppet-lint-absolute_template_path'
|
||||
gem 'puppet-lint-trailing_newline-check'
|
||||
|
||||
# Puppet 4.x related lint checks
|
||||
gem 'puppet-lint-unquoted_string-check'
|
||||
gem 'puppet-lint-leading_zero-check'
|
||||
gem 'puppet-lint-variable_contains_upcase'
|
||||
gem 'puppet-lint-numericvariable'
|
||||
|
||||
end
|
||||
|
||||
if puppetversion = ENV['PUPPET_GEM_VERSION']
|
||||
|
@ -20,7 +20,7 @@ define enable_rabbitmq {
|
||||
ensure => 'installed',
|
||||
}
|
||||
|
||||
if $amqp_enable_ssl {
|
||||
if $::amqp_enable_ssl {
|
||||
|
||||
$kombu_ssl_ca_certs = hiera('CONFIG_AMQP_SSL_CACERT_FILE')
|
||||
$kombu_ssl_keyfile = hiera('CONFIG_AMQP_SSL_KEY_FILE')
|
||||
@ -34,10 +34,10 @@ define enable_rabbitmq {
|
||||
notify => Service['rabbitmq-server'],
|
||||
}
|
||||
|
||||
class {"rabbitmq":
|
||||
class { '::rabbitmq':
|
||||
ssl_port => hiera('CONFIG_AMQP_SSL_PORT'),
|
||||
ssl_only => true,
|
||||
ssl => $amqp_enable_ssl,
|
||||
ssl => $::amqp_enable_ssl,
|
||||
ssl_cacert => $kombu_ssl_ca_certs,
|
||||
ssl_cert => $kombu_ssl_certfile,
|
||||
ssl_key => $kombu_ssl_keyfile,
|
||||
@ -48,22 +48,22 @@ define enable_rabbitmq {
|
||||
# FIXME: it's ugly to not to require client certs
|
||||
ssl_fail_if_no_peer_cert => false,
|
||||
config_variables => {
|
||||
'tcp_listen_options' => "[binary,{packet, raw},{reuseaddr, true},{backlog, 128},{nodelay, true},{exit_on_close, false},{keepalive, true}]",
|
||||
'loopback_users' => "[]",
|
||||
}
|
||||
'tcp_listen_options' => '[binary,{packet, raw},{reuseaddr, true},{backlog, 128},{nodelay, true},{exit_on_close, false},{keepalive, true}]',
|
||||
'loopback_users' => '[]',
|
||||
},
|
||||
}
|
||||
} else {
|
||||
class {"rabbitmq":
|
||||
class { '::rabbitmq':
|
||||
port => hiera('CONFIG_AMQP_CLIENTS_PORT'),
|
||||
ssl => $amqp_enable_ssl,
|
||||
ssl => $::amqp_enable_ssl,
|
||||
default_user => hiera('CONFIG_AMQP_AUTH_USER'),
|
||||
default_pass => hiera('CONFIG_AMQP_AUTH_PASSWORD'),
|
||||
package_provider => 'yum',
|
||||
admin_enable => false,
|
||||
config_variables => {
|
||||
'tcp_listen_options' => "[binary,{packet, raw},{reuseaddr, true},{backlog, 128},{nodelay, true},{exit_on_close, false},{keepalive, true}]",
|
||||
'loopback_users' => "[]",
|
||||
}
|
||||
config_variables => {
|
||||
'tcp_listen_options' => '[binary,{packet, raw},{reuseaddr, true},{backlog, 128},{nodelay, true},{exit_on_close, false},{keepalive, true}]',
|
||||
'loopback_users' => '[]',
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
@ -93,12 +93,12 @@ define enable_qpid($enable_ssl = 'n', $enable_auth = 'n') {
|
||||
}
|
||||
}
|
||||
|
||||
class { 'qpid::server':
|
||||
class { '::qpid::server':
|
||||
config_file => $config,
|
||||
auth => $enable_auth ? {
|
||||
'y' => 'yes',
|
||||
default => 'no',
|
||||
},
|
||||
},
|
||||
clustered => false,
|
||||
ssl_port => hiera('CONFIG_AMQP_SSL_PORT'),
|
||||
ssl => hiera('CONFIG_AMQP_ENABLE_SSL'),
|
||||
|
@ -24,32 +24,32 @@ if $config_ceilometer_coordination_backend == 'redis' {
|
||||
$coordination_url = ''
|
||||
}
|
||||
|
||||
class { 'ceilometer::db':
|
||||
class { '::ceilometer::db':
|
||||
database_connection => "mongodb://${config_mongodb_host}:27017/ceilometer",
|
||||
}
|
||||
|
||||
class { 'ceilometer::collector': }
|
||||
class { '::ceilometer::collector': }
|
||||
|
||||
class { 'ceilometer::agent::notification': }
|
||||
class { '::ceilometer::agent::notification': }
|
||||
|
||||
$config_controller_host = hiera('CONFIG_CONTROLLER_HOST')
|
||||
|
||||
class { 'ceilometer::agent::auth':
|
||||
class { '::ceilometer::agent::auth':
|
||||
auth_url => "http://${config_controller_host}:35357/v2.0",
|
||||
auth_password => hiera('CONFIG_CEILOMETER_KS_PW'),
|
||||
}
|
||||
|
||||
class { 'ceilometer::agent::central':
|
||||
class { '::ceilometer::agent::central':
|
||||
coordination_url => $coordination_url,
|
||||
}
|
||||
|
||||
class { 'ceilometer::alarm::notifier':}
|
||||
class { '::ceilometer::alarm::notifier':}
|
||||
|
||||
class { 'ceilometer::alarm::evaluator':
|
||||
class { '::ceilometer::alarm::evaluator':
|
||||
coordination_url => $coordination_url,
|
||||
}
|
||||
|
||||
class { 'ceilometer::api':
|
||||
class { '::ceilometer::api':
|
||||
keystone_host => hiera('CONFIG_CONTROLLER_HOST'),
|
||||
keystone_password => hiera('CONFIG_CEILOMETER_KS_PW'),
|
||||
}
|
||||
|
@ -1,4 +1,4 @@
|
||||
class { 'ceilometer':
|
||||
class { '::ceilometer':
|
||||
metering_secret => hiera('CONFIG_CEILOMETER_SECRET'),
|
||||
qpid_hostname => hiera('CONFIG_AMQP_HOST'),
|
||||
qpid_username => hiera('CONFIG_AMQP_AUTH_USER'),
|
||||
|
@ -1,4 +1,4 @@
|
||||
class { 'ceilometer':
|
||||
class { '::ceilometer':
|
||||
metering_secret => hiera('CONFIG_CEILOMETER_SECRET'),
|
||||
verbose => true,
|
||||
debug => hiera('CONFIG_DEBUG_MODE'),
|
||||
|
@ -6,18 +6,18 @@ package { 'python-keystone':
|
||||
notify => Class['cinder::api'],
|
||||
}
|
||||
|
||||
class { 'cinder::api':
|
||||
class { '::cinder::api':
|
||||
keystone_password => hiera('CONFIG_CINDER_KS_PW'),
|
||||
keystone_tenant => 'services',
|
||||
keystone_user => 'cinder',
|
||||
keystone_auth_host => hiera('CONFIG_CONTROLLER_HOST'),
|
||||
}
|
||||
|
||||
class { 'cinder::scheduler': }
|
||||
class { '::cinder::scheduler': }
|
||||
|
||||
class { 'cinder::volume': }
|
||||
class { '::cinder::volume': }
|
||||
|
||||
class { 'cinder::client': }
|
||||
class { '::cinder::client': }
|
||||
|
||||
$cinder_config_controller_host = hiera('CONFIG_CONTROLLER_HOST')
|
||||
|
||||
@ -29,6 +29,6 @@ Cinder::Type {
|
||||
os_auth_url => "http://${cinder_config_controller_host}:5000/v2.0/",
|
||||
}
|
||||
|
||||
class { 'cinder::backends':
|
||||
class { '::cinder::backends':
|
||||
enabled_backends => hiera_array('CONFIG_CINDER_BACKEND'),
|
||||
}
|
||||
|
@ -1,8 +1,8 @@
|
||||
class { 'cinder::backup': }
|
||||
class { '::cinder::backup': }
|
||||
|
||||
$cinder_backup_conf_ctrl_host = hiera('CONFIG_CONTROLLER_HOST')
|
||||
|
||||
class { 'cinder::backup::swift':
|
||||
class { '::cinder::backup::swift':
|
||||
backup_swift_url => "http://${cinder_config_controller_host}:8080/v1/AUTH_",
|
||||
}
|
||||
|
||||
|
@ -1,2 +1,2 @@
|
||||
|
||||
class { 'cinder::ceilometer': }
|
||||
class { '::cinder::ceilometer': }
|
||||
|
@ -1,7 +1,7 @@
|
||||
$create_cinder_volume = hiera('CONFIG_CINDER_VOLUMES_CREATE')
|
||||
|
||||
if $create_cinder_volume == 'y' {
|
||||
class { 'cinder::setup_test_volume':
|
||||
class { '::cinder::setup_test_volume':
|
||||
size => hiera('CONFIG_CINDER_VOLUMES_SIZE'),
|
||||
loopback_device => '/dev/loop2',
|
||||
volume_path => '/var/lib/cinder',
|
||||
|
@ -26,15 +26,15 @@ if $netapp_storage_family == 'ontap_cluster' {
|
||||
}
|
||||
elsif $netapp_storage_protocol == 'iscsi' {
|
||||
cinder::backend::netapp { $netapp_backend_name:
|
||||
netapp_login => hiera('CONFIG_CINDER_NETAPP_LOGIN'),
|
||||
netapp_password => hiera('CONFIG_CINDER_NETAPP_PASSWORD'),
|
||||
netapp_server_hostname => hiera('CONFIG_CINDER_NETAPP_HOSTNAME'),
|
||||
netapp_server_port => hiera('CONFIG_CINDER_NETAPP_SERVER_PORT'),
|
||||
netapp_size_multiplier => hiera('CONFIG_CINDER_NETAPP_SIZE_MULTIPLIER'),
|
||||
netapp_storage_family => hiera('CONFIG_CINDER_NETAPP_STORAGE_FAMILY'),
|
||||
netapp_storage_protocol => hiera('CONFIG_CINDER_NETAPP_STORAGE_PROTOCOL'),
|
||||
netapp_transport_type => hiera('CONFIG_CINDER_NETAPP_TRANSPORT_TYPE'),
|
||||
netapp_vserver => hiera('CONFIG_CINDER_NETAPP_VSERVER'),
|
||||
netapp_login => hiera('CONFIG_CINDER_NETAPP_LOGIN'),
|
||||
netapp_password => hiera('CONFIG_CINDER_NETAPP_PASSWORD'),
|
||||
netapp_server_hostname => hiera('CONFIG_CINDER_NETAPP_HOSTNAME'),
|
||||
netapp_server_port => hiera('CONFIG_CINDER_NETAPP_SERVER_PORT'),
|
||||
netapp_size_multiplier => hiera('CONFIG_CINDER_NETAPP_SIZE_MULTIPLIER'),
|
||||
netapp_storage_family => hiera('CONFIG_CINDER_NETAPP_STORAGE_FAMILY'),
|
||||
netapp_storage_protocol => hiera('CONFIG_CINDER_NETAPP_STORAGE_PROTOCOL'),
|
||||
netapp_transport_type => hiera('CONFIG_CINDER_NETAPP_TRANSPORT_TYPE'),
|
||||
netapp_vserver => hiera('CONFIG_CINDER_NETAPP_VSERVER'),
|
||||
}
|
||||
|
||||
package { 'iscsi-initiator-utils': ensure => present }
|
||||
@ -61,16 +61,16 @@ elsif $netapp_storage_family == 'ontap_7mode' {
|
||||
}
|
||||
elsif $netapp_storage_protocol == 'iscsi' {
|
||||
cinder::backend::netapp { $netapp_backend_name:
|
||||
netapp_login => hiera('CONFIG_CINDER_NETAPP_LOGIN'),
|
||||
netapp_password => hiera('CONFIG_CINDER_NETAPP_PASSWORD'),
|
||||
netapp_server_hostname => hiera('CONFIG_CINDER_NETAPP_HOSTNAME'),
|
||||
netapp_server_port => hiera('CONFIG_CINDER_NETAPP_SERVER_PORT'),
|
||||
netapp_size_multiplier => hiera('CONFIG_CINDER_NETAPP_SIZE_MULTIPLIER'),
|
||||
netapp_storage_family => hiera('CONFIG_CINDER_NETAPP_STORAGE_FAMILY'),
|
||||
netapp_storage_protocol => hiera('CONFIG_CINDER_NETAPP_STORAGE_PROTOCOL'),
|
||||
netapp_transport_type => hiera('CONFIG_CINDER_NETAPP_TRANSPORT_TYPE'),
|
||||
netapp_vfiler => hiera('CONFIG_CINDER_NETAPP_VFILER'),
|
||||
netapp_volume_list => hiera('CONFIG_CINDER_NETAPP_VOLUME_LIST'),
|
||||
netapp_login => hiera('CONFIG_CINDER_NETAPP_LOGIN'),
|
||||
netapp_password => hiera('CONFIG_CINDER_NETAPP_PASSWORD'),
|
||||
netapp_server_hostname => hiera('CONFIG_CINDER_NETAPP_HOSTNAME'),
|
||||
netapp_server_port => hiera('CONFIG_CINDER_NETAPP_SERVER_PORT'),
|
||||
netapp_size_multiplier => hiera('CONFIG_CINDER_NETAPP_SIZE_MULTIPLIER'),
|
||||
netapp_storage_family => hiera('CONFIG_CINDER_NETAPP_STORAGE_FAMILY'),
|
||||
netapp_storage_protocol => hiera('CONFIG_CINDER_NETAPP_STORAGE_PROTOCOL'),
|
||||
netapp_transport_type => hiera('CONFIG_CINDER_NETAPP_TRANSPORT_TYPE'),
|
||||
netapp_vfiler => hiera('CONFIG_CINDER_NETAPP_VFILER'),
|
||||
netapp_volume_list => hiera('CONFIG_CINDER_NETAPP_VOLUME_LIST'),
|
||||
}
|
||||
|
||||
package { 'iscsi-initiator-utils': ensure => present }
|
||||
@ -78,17 +78,17 @@ elsif $netapp_storage_family == 'ontap_7mode' {
|
||||
}
|
||||
elsif $netapp_storage_family == 'eseries' {
|
||||
cinder::backend::netapp { $netapp_backend_name:
|
||||
netapp_login => hiera('CONFIG_CINDER_NETAPP_LOGIN'),
|
||||
netapp_password => hiera('CONFIG_CINDER_NETAPP_PASSWORD'),
|
||||
netapp_server_hostname => hiera('CONFIG_CINDER_NETAPP_HOSTNAME'),
|
||||
netapp_server_port => hiera('CONFIG_CINDER_NETAPP_SERVER_PORT'),
|
||||
netapp_storage_family => hiera('CONFIG_CINDER_NETAPP_STORAGE_FAMILY'),
|
||||
netapp_storage_protocol => hiera('CONFIG_CINDER_NETAPP_STORAGE_PROTOCOL'),
|
||||
netapp_transport_type => hiera('CONFIG_CINDER_NETAPP_TRANSPORT_TYPE'),
|
||||
netapp_controller_ips => hiera('CONFIG_CINDER_NETAPP_CONTROLLER_IPS'),
|
||||
netapp_sa_password => hiera('CONFIG_CINDER_NETAPP_SA_PASSWORD'),
|
||||
netapp_storage_pools => hiera('CONFIG_CINDER_NETAPP_STORAGE_POOLS'),
|
||||
netapp_webservice_path => hiera('CONFIG_CINDER_NETAPP_WEBSERVICE_PATH'),
|
||||
netapp_login => hiera('CONFIG_CINDER_NETAPP_LOGIN'),
|
||||
netapp_password => hiera('CONFIG_CINDER_NETAPP_PASSWORD'),
|
||||
netapp_server_hostname => hiera('CONFIG_CINDER_NETAPP_HOSTNAME'),
|
||||
netapp_server_port => hiera('CONFIG_CINDER_NETAPP_SERVER_PORT'),
|
||||
netapp_storage_family => hiera('CONFIG_CINDER_NETAPP_STORAGE_FAMILY'),
|
||||
netapp_storage_protocol => hiera('CONFIG_CINDER_NETAPP_STORAGE_PROTOCOL'),
|
||||
netapp_transport_type => hiera('CONFIG_CINDER_NETAPP_TRANSPORT_TYPE'),
|
||||
netapp_controller_ips => hiera('CONFIG_CINDER_NETAPP_CONTROLLER_IPS'),
|
||||
netapp_sa_password => hiera('CONFIG_CINDER_NETAPP_SA_PASSWORD'),
|
||||
netapp_storage_pools => hiera('CONFIG_CINDER_NETAPP_STORAGE_POOLS'),
|
||||
netapp_webservice_path => hiera('CONFIG_CINDER_NETAPP_WEBSERVICE_PATH'),
|
||||
}
|
||||
|
||||
package { 'iscsi-initiator-utils': ensure => present }
|
||||
|
@ -1,7 +1,7 @@
|
||||
$cinder_qpid_cfg_cinder_db_pw = hiera('CONFIG_CINDER_DB_PW')
|
||||
$cinder_qpid_cfg_mariadb_host = hiera('CONFIG_MARIADB_HOST')
|
||||
|
||||
class {'cinder':
|
||||
class { '::cinder':
|
||||
rpc_backend => 'cinder.openstack.common.rpc.impl_qpid',
|
||||
qpid_hostname => hiera('CONFIG_AMQP_HOST'),
|
||||
qpid_port => hiera('CONFIG_AMQP_CLIENTS_PORT'),
|
||||
|
@ -1,7 +1,7 @@
|
||||
$cinder_rab_cfg_cinder_db_pw = hiera('CONFIG_CINDER_DB_PW')
|
||||
$cinder_rab_cfg_mariadb_host = hiera('CONFIG_MARIADB_HOST')
|
||||
|
||||
class {'cinder':
|
||||
class { '::cinder':
|
||||
rabbit_host => hiera('CONFIG_AMQP_HOST'),
|
||||
rabbit_port => hiera('CONFIG_AMQP_CLIENTS_PORT'),
|
||||
rabbit_use_ssl => hiera('CONFIG_AMQP_ENABLE_SSL'),
|
||||
|
@ -2,7 +2,7 @@ $glance_ks_pw = hiera('CONFIG_GLANCE_DB_PW')
|
||||
$glance_mariadb_host = hiera('CONFIG_MARIADB_HOST')
|
||||
$glance_cfg_ctrl_host = hiera('CONFIG_CONTROLLER_HOST')
|
||||
|
||||
class { 'glance::api':
|
||||
class { '::glance::api':
|
||||
auth_uri => "http://${glance_cfg_ctrl_host}:5000/",
|
||||
identity_uri => "http://${glance_cfg_ctrl_host}:35357",
|
||||
keystone_tenant => 'services',
|
||||
@ -12,10 +12,10 @@ class { 'glance::api':
|
||||
database_connection => "mysql://glance:${glance_ks_pw}@${glance_mariadb_host}/glance",
|
||||
verbose => true,
|
||||
debug => hiera('CONFIG_DEBUG_MODE'),
|
||||
os_region_name => hiera('CONFIG_KEYSTONE_REGION')
|
||||
os_region_name => hiera('CONFIG_KEYSTONE_REGION'),
|
||||
}
|
||||
|
||||
class { 'glance::registry':
|
||||
class { '::glance::registry':
|
||||
auth_uri => "http://${glance_cfg_ctrl_host}:5000/",
|
||||
identity_uri => "http://${glance_cfg_ctrl_host}:35357",
|
||||
keystone_tenant => 'services',
|
||||
|
@ -1,5 +1,5 @@
|
||||
|
||||
class { 'glance::notify::qpid':
|
||||
class { '::glance::notify::qpid':
|
||||
qpid_password => hiera('CONFIG_AMQP_AUTH_PASSWORD'),
|
||||
qpid_username => hiera('CONFIG_AMQP_AUTH_USER'),
|
||||
qpid_hostname => hiera('CONFIG_AMQP_HOST'),
|
||||
|
@ -1,5 +1,5 @@
|
||||
|
||||
class { 'glance::notify::rabbitmq':
|
||||
class { '::glance::notify::rabbitmq':
|
||||
rabbit_host => hiera('CONFIG_AMQP_HOST'),
|
||||
rabbit_port => hiera('CONFIG_AMQP_CLIENTS_PORT'),
|
||||
rabbit_use_ssl => hiera('CONFIG_AMQP_ENABLE_SSL'),
|
||||
|
@ -1,5 +1,5 @@
|
||||
|
||||
# TO-DO: Make this configurable
|
||||
class { 'glance::backend::file':
|
||||
class { '::glance::backend::file':
|
||||
filesystem_store_datadir => '/var/lib/glance/images/',
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
$gla_bd_ct_h = hiera('CONFIG_CONTROLLER_HOST')
|
||||
|
||||
class { 'glance::backend::swift':
|
||||
class { '::glance::backend::swift':
|
||||
swift_store_user => 'services:glance',
|
||||
swift_store_key => hiera('CONFIG_GLANCE_KS_PW'),
|
||||
swift_store_auth_address => "http://${gla_bd_ct_h}:35357/v2.0/",
|
||||
|
@ -1,9 +1,9 @@
|
||||
|
||||
class { 'heat::api': }
|
||||
class { '::heat::api': }
|
||||
|
||||
$heat_cfg_ctrl_host = hiera('CONFIG_CONTROLLER_HOST')
|
||||
|
||||
class { 'heat::engine':
|
||||
class { '::heat::engine':
|
||||
heat_metadata_server_url => "http://${heat_cfg_ctrl_host}:8000",
|
||||
heat_waitcondition_server_url => "http://${heat_cfg_ctrl_host}:8000/v1/waitcondition",
|
||||
heat_watch_server_url => "http://${heat_cfg_ctrl_host}:8003",
|
||||
@ -17,7 +17,7 @@ keystone_user_role { 'admin@admin':
|
||||
require => Class['heat::engine'],
|
||||
}
|
||||
|
||||
class { 'heat::keystone::domain':
|
||||
class { '::heat::keystone::domain':
|
||||
auth_url => "http://${heat_cfg_ctrl_host}:35357/v2.0",
|
||||
keystone_admin => 'admin',
|
||||
keystone_password => hiera('CONFIG_KEYSTONE_ADMIN_PW'),
|
||||
|
@ -1,9 +1,9 @@
|
||||
|
||||
class { 'heat::api_cfn': }
|
||||
class { '::heat::api_cfn': }
|
||||
|
||||
$heat_cfn_cfg_ctrl_host = hiera('CONFIG_CONTROLLER_HOST')
|
||||
|
||||
class { 'heat::keystone::auth_cfn':
|
||||
class { '::heat::keystone::auth_cfn':
|
||||
admin_address => $heat_cfn_cfg_ctrl_host,
|
||||
public_address => $heat_cfn_cfg_ctrl_host,
|
||||
internal_address => $heat_cfn_cfg_ctrl_host,
|
||||
|
@ -1,3 +1,3 @@
|
||||
|
||||
class { 'heat::api_cloudwatch': }
|
||||
class { '::heat::api_cloudwatch': }
|
||||
|
||||
|
@ -2,7 +2,7 @@ $heat_qpid_cfg_ctrl_host = hiera('CONFIG_CONTROLLER_HOST')
|
||||
$heat_qpid_cfg_heat_db_pw = hiera('CONFIG_HEAT_DB_PW')
|
||||
$heat_qpid_cfg_mariadb_host = hiera('CONFIG_MARIADB_HOST')
|
||||
|
||||
class { 'heat':
|
||||
class { '::heat':
|
||||
keystone_host => $heat_cfn_cfg_ctrl_host,
|
||||
keystone_password => hiera('CONFIG_HEAT_KS_PW'),
|
||||
auth_uri => "http://${heat_qpid_cfg_ctrl_host}:35357/v2.0",
|
||||
|
@ -2,7 +2,7 @@ $heat_rabbitmq_cfg_ctrl_host = hiera('CONFIG_CONTROLLER_HOST')
|
||||
$heat_rabbitmq_cfg_heat_db_pw = hiera('CONFIG_HEAT_DB_PW')
|
||||
$heat_rabbitmq_cfg_mariadb_host = hiera('CONFIG_MARIADB_HOST')
|
||||
|
||||
class { 'heat':
|
||||
class { '::heat':
|
||||
keystone_host => $heat_rabbitmq_cfg_ctrl_host,
|
||||
keystone_password => hiera('CONFIG_HEAT_KS_PW'),
|
||||
auth_uri => "http://${heat_rabbitmq_cfg_ctrl_host}:35357/v2.0",
|
||||
|
@ -1,4 +1,4 @@
|
||||
include packstack::apache_common
|
||||
include ::packstack::apache_common
|
||||
|
||||
$keystone_host = hiera('CONFIG_CONTROLLER_HOST')
|
||||
|
||||
@ -14,23 +14,23 @@ $is_django_debug = hiera('CONFIG_DEBUG_MODE') ? {
|
||||
false => 'False',
|
||||
}
|
||||
|
||||
class {'horizon':
|
||||
class {'::horizon':
|
||||
secret_key => hiera('CONFIG_HORIZON_SECRET_KEY'),
|
||||
keystone_url => "http://${keystone_host}:5000/v2.0",
|
||||
keystone_default_role => '_member_',
|
||||
server_aliases => [hiera('CONFIG_CONTROLLER_HOST'), "$::fqdn", 'localhost'],
|
||||
allowed_hosts => '*',
|
||||
hypervisor_options => {'can_set_mount_point' => false, },
|
||||
compress_offline => false,
|
||||
django_debug => $is_django_debug,
|
||||
file_upload_temp_dir => '/var/tmp',
|
||||
listen_ssl => hiera('CONFIG_HORIZON_SSL'),
|
||||
horizon_cert => '/etc/pki/tls/certs/ssl_ps_server.crt',
|
||||
horizon_key => '/etc/pki/tls/private/ssl_ps_server.key',
|
||||
horizon_ca => '/etc/pki/tls/certs/ssl_ps_chain.crt',
|
||||
neutron_options => {
|
||||
'enable_lb' => hiera('CONFIG_HORIZON_NEUTRON_LB'),
|
||||
'enable_firewall' => hiera('CONFIG_HORIZON_NEUTRON_FW'),
|
||||
server_aliases => [hiera('CONFIG_CONTROLLER_HOST'), $::fqdn, 'localhost'],
|
||||
allowed_hosts => '*',
|
||||
hypervisor_options => {'can_set_mount_point' => false, },
|
||||
compress_offline => false,
|
||||
django_debug => $is_django_debug,
|
||||
file_upload_temp_dir => '/var/tmp',
|
||||
listen_ssl => hiera('CONFIG_HORIZON_SSL'),
|
||||
horizon_cert => '/etc/pki/tls/certs/ssl_ps_server.crt',
|
||||
horizon_key => '/etc/pki/tls/private/ssl_ps_server.key',
|
||||
horizon_ca => '/etc/pki/tls/certs/ssl_ps_chain.crt',
|
||||
neutron_options => {
|
||||
'enable_lb' => hiera('CONFIG_HORIZON_NEUTRON_LB'),
|
||||
'enable_firewall' => hiera('CONFIG_HORIZON_NEUTRON_FW'),
|
||||
},
|
||||
}
|
||||
|
||||
@ -38,7 +38,7 @@ $is_horizon_ssl = hiera('CONFIG_HORIZON_SSL')
|
||||
|
||||
if $is_horizon_ssl == true {
|
||||
file {'/etc/pki/tls/certs/ps_generate_ssl_certs.ssh':
|
||||
ensure => present,
|
||||
ensure => file,
|
||||
content => template('packstack/ssl/generate_ssl_certs.sh.erb'),
|
||||
mode => '0755',
|
||||
}
|
||||
@ -68,7 +68,7 @@ if $is_horizon_ssl == true {
|
||||
}
|
||||
}
|
||||
|
||||
class { 'memcached': }
|
||||
class { '::memcached': }
|
||||
|
||||
$firewall_port = hiera('CONFIG_HORIZON_PORT')
|
||||
|
||||
|
@ -2,11 +2,11 @@ ironic_config {
|
||||
'glance/glance_host': value => hiera('CONFIG_STORAGE_HOST');
|
||||
}
|
||||
|
||||
class { 'ironic::api':
|
||||
class { '::ironic::api':
|
||||
auth_host => hiera('CONFIG_CONTROLLER_HOST'),
|
||||
admin_password => hiera('CONFIG_IRONIC_KS_PW'),
|
||||
}
|
||||
|
||||
class { 'ironic::client': }
|
||||
class { '::ironic::client': }
|
||||
|
||||
class { 'ironic::conductor': }
|
||||
class { '::ironic::conductor': }
|
||||
|
@ -1,7 +1,7 @@
|
||||
$ironic_qpid_cfg_ironic_db_pw = hiera('CONFIG_IRONIC_DB_PW')
|
||||
$ironic_qpid_cfg_mariadb_host = hiera('CONFIG_MARIADB_HOST')
|
||||
|
||||
class { 'ironic':
|
||||
class { '::ironic':
|
||||
rpc_backend => 'ironic.openstack.common.rpc.impl_qpid',
|
||||
qpid_hostname => hiera('CONFIG_AMQP_HOST'),
|
||||
qpid_port => hiera('CONFIG_AMQP_CLIENTS_PORT'),
|
||||
|
@ -1,7 +1,7 @@
|
||||
$ironic_rabbitmq_cfg_ironic_db_pw = hiera('CONFIG_IRONIC_DB_PW')
|
||||
$ironic_rabbitmq_cfg_mariadb_host = hiera('CONFIG_MARIADB_HOST')
|
||||
|
||||
class { 'ironic':
|
||||
class { '::ironic':
|
||||
rpc_backend => 'ironic.openstack.common.rpc.impl_kombu',
|
||||
rabbit_host => hiera('CONFIG_AMQP_HOST'),
|
||||
rabbit_port => hiera('CONFIG_AMQP_CLIENTS_PORT'),
|
||||
|
@ -8,7 +8,7 @@ $keystone_api_version_str = hiera('CONFIG_KEYSTONE_API_VERSION')
|
||||
$keystone_url = "http://${keystone_endpoint_cfg_ctrl_host}:5000/${keystone_api_version_str}"
|
||||
$keystone_admin_url = "http://${keystone_endpoint_cfg_ctrl_host}:35357/${keystone_api_version_str}"
|
||||
|
||||
class { 'keystone':
|
||||
class { '::keystone':
|
||||
admin_token => hiera('CONFIG_KEYSTONE_ADMIN_TOKEN'),
|
||||
database_connection => "mysql://keystone_admin:${keystone_cfg_ks_db_pw}@${keystone_cfg_mariadb_host}/keystone",
|
||||
token_provider => "keystone.token.providers.${keystone_token_provider_str}.Provider",
|
||||
@ -19,14 +19,14 @@ class { 'keystone':
|
||||
}
|
||||
|
||||
if $keystone_service_name == 'httpd' {
|
||||
include packstack::apache_common
|
||||
include ::packstack::apache_common
|
||||
|
||||
class { 'keystone::wsgi::apache':
|
||||
class { '::keystone::wsgi::apache':
|
||||
ssl => $keystone_use_ssl,
|
||||
}
|
||||
}
|
||||
|
||||
class { 'keystone::roles::admin':
|
||||
class { '::keystone::roles::admin':
|
||||
email => 'root@localhost',
|
||||
password => hiera('CONFIG_KEYSTONE_ADMIN_PW'),
|
||||
admin_tenant => 'admin',
|
||||
@ -44,7 +44,7 @@ keystone::resource::service_identity { 'keystone':
|
||||
}
|
||||
|
||||
# default assignment driver is SQL
|
||||
$assignment_driver = "keystone.assignment.backends.sql.Assignment"
|
||||
$assignment_driver = 'keystone.assignment.backends.sql.Assignment'
|
||||
|
||||
if hiera('CONFIG_KEYSTONE_IDENTITY_BACKEND') == 'ldap' {
|
||||
|
||||
@ -56,49 +56,49 @@ if hiera('CONFIG_KEYSTONE_IDENTITY_BACKEND') == 'ldap' {
|
||||
|
||||
# should be supported and enabled in the next release of puppet-keystone
|
||||
# user_enabled_invert => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_ENABLED_INVERT'),
|
||||
class {"keystone::ldap":
|
||||
url => hiera_undef('CONFIG_KEYSTONE_LDAP_URL', undef),
|
||||
user => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_DN', undef),
|
||||
password => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_PASSWORD', undef),
|
||||
suffix => hiera_undef('CONFIG_KEYSTONE_LDAP_SUFFIX', undef),
|
||||
query_scope => hiera_undef('CONFIG_KEYSTONE_LDAP_QUERY_SCOPE', undef),
|
||||
page_size => hiera_undef('CONFIG_KEYSTONE_LDAP_PAGE_SIZE', undef),
|
||||
user_tree_dn => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_SUBTREE', undef),
|
||||
user_filter => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_FILTER', undef),
|
||||
user_objectclass => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_OBJECTCLASS', undef),
|
||||
user_id_attribute => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_ID_ATTRIBUTE', undef),
|
||||
user_name_attribute => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_NAME_ATTRIBUTE', undef),
|
||||
user_mail_attribute => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_MAIL_ATTRIBUTE', undef),
|
||||
user_enabled_attribute => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_ENABLED_ATTRIBUTE', undef),
|
||||
user_enabled_mask => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_ENABLED_MASK', undef),
|
||||
user_enabled_default => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_ENABLED_DEFAULT', undef),
|
||||
user_attribute_ignore => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_ATTRIBUTE_IGNORE', undef),
|
||||
user_default_project_id_attribute => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_DEFAULT_PROJECT_ID_ATTRIBUTE', undef),
|
||||
user_allow_create => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_ALLOW_CREATE', undef),
|
||||
user_allow_update => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_ALLOW_UPDATE', undef),
|
||||
user_allow_delete => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_ALLOW_DELETE', undef),
|
||||
user_pass_attribute => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_PASS_ATTRIBUTE', undef),
|
||||
user_enabled_emulation => $user_enabled_emulation,
|
||||
user_enabled_emulation_dn => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_ENABLED_EMULATION_DN', undef),
|
||||
user_additional_attribute_mapping => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_ADDITIONAL_ATTRIBUTE_MAPPING', undef),
|
||||
group_tree_dn => hiera_undef('CONFIG_KEYSTONE_LDAP_GROUP_SUBTREE', undef),
|
||||
group_filter => hiera_undef('CONFIG_KEYSTONE_LDAP_GROUP_FILTER', undef),
|
||||
group_objectclass => hiera_undef('CONFIG_KEYSTONE_LDAP_GROUP_OBJECTCLASS', undef),
|
||||
group_id_attribute => hiera_undef('CONFIG_KEYSTONE_LDAP_GROUP_ID_ATTRIBUTE', undef),
|
||||
group_name_attribute => hiera_undef('CONFIG_KEYSTONE_LDAP_GROUP_NAME_ATTRIBUTE', undef),
|
||||
group_member_attribute => hiera_undef('CONFIG_KEYSTONE_LDAP_GROUP_MEMBER_ATTRIBUTE', undef),
|
||||
group_desc_attribute => hiera_undef('CONFIG_KEYSTONE_LDAP_GROUP_DESC_ATTRIBUTE', undef),
|
||||
group_attribute_ignore => hiera_undef('CONFIG_KEYSTONE_LDAP_GROUP_ATTRIBUTE_IGNORE', undef),
|
||||
group_allow_create => hiera_undef('CONFIG_KEYSTONE_LDAP_GROUP_ALLOW_CREATE', undef),
|
||||
group_allow_update => hiera_undef('CONFIG_KEYSTONE_LDAP_GROUP_ALLOW_UPDATE', undef),
|
||||
group_allow_delete => hiera_undef('CONFIG_KEYSTONE_LDAP_GROUP_ALLOW_DELETE', undef),
|
||||
group_additional_attribute_mapping => hiera_undef('CONFIG_KEYSTONE_LDAP_GROUP_ADDITIONAL_ATTRIBUTE_MAPPING', undef),
|
||||
use_tls => hiera_undef('CONFIG_KEYSTONE_LDAP_USE_TLS', undef),
|
||||
tls_cacertdir => hiera_undef('CONFIG_KEYSTONE_LDAP_TLS_CACERTDIR', undef),
|
||||
tls_cacertfile => hiera_undef('CONFIG_KEYSTONE_LDAP_TLS_CACERTFILE', undef),
|
||||
tls_req_cert => hiera_undef('CONFIG_KEYSTONE_LDAP_TLS_REQ_CERT', undef),
|
||||
identity_driver => "keystone.identity.backends.ldap.Identity",
|
||||
assignment_driver => $assignment_driver,
|
||||
class { '::keystone::ldap':
|
||||
url => hiera_undef('CONFIG_KEYSTONE_LDAP_URL', undef),
|
||||
user => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_DN', undef),
|
||||
password => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_PASSWORD', undef),
|
||||
suffix => hiera_undef('CONFIG_KEYSTONE_LDAP_SUFFIX', undef),
|
||||
query_scope => hiera_undef('CONFIG_KEYSTONE_LDAP_QUERY_SCOPE', undef),
|
||||
page_size => hiera_undef('CONFIG_KEYSTONE_LDAP_PAGE_SIZE', undef),
|
||||
user_tree_dn => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_SUBTREE', undef),
|
||||
user_filter => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_FILTER', undef),
|
||||
user_objectclass => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_OBJECTCLASS', undef),
|
||||
user_id_attribute => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_ID_ATTRIBUTE', undef),
|
||||
user_name_attribute => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_NAME_ATTRIBUTE', undef),
|
||||
user_mail_attribute => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_MAIL_ATTRIBUTE', undef),
|
||||
user_enabled_attribute => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_ENABLED_ATTRIBUTE', undef),
|
||||
user_enabled_mask => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_ENABLED_MASK', undef),
|
||||
user_enabled_default => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_ENABLED_DEFAULT', undef),
|
||||
user_attribute_ignore => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_ATTRIBUTE_IGNORE', undef),
|
||||
user_default_project_id_attribute => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_DEFAULT_PROJECT_ID_ATTRIBUTE', undef),
|
||||
user_allow_create => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_ALLOW_CREATE', undef),
|
||||
user_allow_update => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_ALLOW_UPDATE', undef),
|
||||
user_allow_delete => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_ALLOW_DELETE', undef),
|
||||
user_pass_attribute => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_PASS_ATTRIBUTE', undef),
|
||||
user_enabled_emulation => $user_enabled_emulation,
|
||||
user_enabled_emulation_dn => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_ENABLED_EMULATION_DN', undef),
|
||||
user_additional_attribute_mapping => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_ADDITIONAL_ATTRIBUTE_MAPPING', undef),
|
||||
group_tree_dn => hiera_undef('CONFIG_KEYSTONE_LDAP_GROUP_SUBTREE', undef),
|
||||
group_filter => hiera_undef('CONFIG_KEYSTONE_LDAP_GROUP_FILTER', undef),
|
||||
group_objectclass => hiera_undef('CONFIG_KEYSTONE_LDAP_GROUP_OBJECTCLASS', undef),
|
||||
group_id_attribute => hiera_undef('CONFIG_KEYSTONE_LDAP_GROUP_ID_ATTRIBUTE', undef),
|
||||
group_name_attribute => hiera_undef('CONFIG_KEYSTONE_LDAP_GROUP_NAME_ATTRIBUTE', undef),
|
||||
group_member_attribute => hiera_undef('CONFIG_KEYSTONE_LDAP_GROUP_MEMBER_ATTRIBUTE', undef),
|
||||
group_desc_attribute => hiera_undef('CONFIG_KEYSTONE_LDAP_GROUP_DESC_ATTRIBUTE', undef),
|
||||
group_attribute_ignore => hiera_undef('CONFIG_KEYSTONE_LDAP_GROUP_ATTRIBUTE_IGNORE', undef),
|
||||
group_allow_create => hiera_undef('CONFIG_KEYSTONE_LDAP_GROUP_ALLOW_CREATE', undef),
|
||||
group_allow_update => hiera_undef('CONFIG_KEYSTONE_LDAP_GROUP_ALLOW_UPDATE', undef),
|
||||
group_allow_delete => hiera_undef('CONFIG_KEYSTONE_LDAP_GROUP_ALLOW_DELETE', undef),
|
||||
group_additional_attribute_mapping => hiera_undef('CONFIG_KEYSTONE_LDAP_GROUP_ADDITIONAL_ATTRIBUTE_MAPPING', undef),
|
||||
use_tls => hiera_undef('CONFIG_KEYSTONE_LDAP_USE_TLS', undef),
|
||||
tls_cacertdir => hiera_undef('CONFIG_KEYSTONE_LDAP_TLS_CACERTDIR', undef),
|
||||
tls_cacertfile => hiera_undef('CONFIG_KEYSTONE_LDAP_TLS_CACERTFILE', undef),
|
||||
tls_req_cert => hiera_undef('CONFIG_KEYSTONE_LDAP_TLS_REQ_CERT', undef),
|
||||
identity_driver => 'keystone.identity.backends.ldap.Identity',
|
||||
assignment_driver => $assignment_driver,
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -1,5 +1,5 @@
|
||||
|
||||
class { 'ceilometer::keystone::auth':
|
||||
class { '::ceilometer::keystone::auth':
|
||||
region => hiera('CONFIG_KEYSTONE_REGION'),
|
||||
password => hiera('CONFIG_CEILOMETER_KS_PW'),
|
||||
public_address => hiera('CONFIG_CONTROLLER_HOST'),
|
||||
|
@ -1,5 +1,5 @@
|
||||
|
||||
class { 'cinder::keystone::auth':
|
||||
class { '::cinder::keystone::auth':
|
||||
region => hiera('CONFIG_KEYSTONE_REGION'),
|
||||
password => hiera('CONFIG_CINDER_KS_PW'),
|
||||
public_address => hiera('CONFIG_STORAGE_HOST'),
|
||||
|
@ -1,5 +1,5 @@
|
||||
|
||||
class { 'glance::keystone::auth':
|
||||
class { '::glance::keystone::auth':
|
||||
region => hiera('CONFIG_KEYSTONE_REGION'),
|
||||
password => hiera('CONFIG_GLANCE_KS_PW'),
|
||||
public_address => hiera('CONFIG_STORAGE_HOST'),
|
||||
|
@ -1,5 +1,5 @@
|
||||
# heat::keystone::auth
|
||||
class { 'heat::keystone::auth':
|
||||
class { '::heat::keystone::auth':
|
||||
region => hiera('CONFIG_KEYSTONE_REGION'),
|
||||
password => hiera('CONFIG_HEAT_KS_PW'),
|
||||
public_address => hiera('CONFIG_CONTROLLER_HOST'),
|
||||
@ -12,7 +12,7 @@ $is_heat_cfn_install = hiera('CONFIG_HEAT_CFN_INSTALL')
|
||||
|
||||
if $is_heat_cfn_install == 'y' {
|
||||
# heat::keystone::cfn
|
||||
class { "heat::keystone::auth_cfn":
|
||||
class { '::heat::keystone::auth_cfn':
|
||||
password => hiera('CONFIG_HEAT_KS_PW'),
|
||||
public_address => hiera('CONFIG_CONTROLLER_HOST'),
|
||||
admin_address => hiera('CONFIG_CONTROLLER_HOST'),
|
||||
|
@ -1,5 +1,5 @@
|
||||
|
||||
class {'ironic::keystone::auth':
|
||||
class { '::ironic::keystone::auth':
|
||||
region => hiera('CONFIG_KEYSTONE_REGION'),
|
||||
password => hiera('CONFIG_IRONIC_KS_PW'),
|
||||
public_address => hiera('CONFIG_CONTROLLER_HOST'),
|
||||
|
@ -1,5 +1,5 @@
|
||||
|
||||
class { 'manila::keystone::auth':
|
||||
class { '::manila::keystone::auth':
|
||||
password => hiera('CONFIG_MANILA_KS_PW'),
|
||||
public_address => hiera('CONFIG_CONTROLLER_HOST'),
|
||||
admin_address => hiera('CONFIG_CONTROLLER_HOST'),
|
||||
|
@ -1,5 +1,5 @@
|
||||
|
||||
class { 'neutron::keystone::auth':
|
||||
class { '::neutron::keystone::auth':
|
||||
region => hiera('CONFIG_KEYSTONE_REGION'),
|
||||
password => hiera('CONFIG_NEUTRON_KS_PW'),
|
||||
public_address => hiera('CONFIG_CONTROLLER_HOST'),
|
||||
|
@ -1,5 +1,5 @@
|
||||
|
||||
class { 'nova::keystone::auth':
|
||||
class { '::nova::keystone::auth':
|
||||
region => hiera('CONFIG_KEYSTONE_REGION'),
|
||||
password => hiera('CONFIG_NOVA_KS_PW'),
|
||||
public_address => hiera('CONFIG_CONTROLLER_HOST'),
|
||||
|
@ -1,4 +1,4 @@
|
||||
class { 'sahara::keystone::auth':
|
||||
class { '::sahara::keystone::auth':
|
||||
password => hiera('CONFIG_SAHARA_KS_PW'),
|
||||
public_address => hiera('CONFIG_SAHARA_HOST'),
|
||||
admin_address => hiera('CONFIG_SAHARA_HOST'),
|
||||
|
@ -1,4 +1,4 @@
|
||||
class { 'swift::keystone::auth':
|
||||
class { '::swift::keystone::auth':
|
||||
public_address => hiera('CONFIG_CONTROLLER_HOST'),
|
||||
region => hiera('CONFIG_KEYSTONE_REGION'),
|
||||
password => hiera('CONFIG_SWIFT_KS_PW'),
|
||||
|
@ -1,5 +1,5 @@
|
||||
|
||||
class { 'trove::keystone::auth':
|
||||
class { '::trove::keystone::auth':
|
||||
region => hiera('CONFIG_KEYSTONE_REGION'),
|
||||
password => hiera('CONFIG_TROVE_KS_PW'),
|
||||
public_address => hiera('CONFIG_CONTROLLER_HOST'),
|
||||
|
@ -6,24 +6,24 @@ package { 'python-keystone':
|
||||
notify => Class['manila::api'],
|
||||
}
|
||||
|
||||
class { 'manila::api':
|
||||
class { '::manila::api':
|
||||
keystone_password => hiera('CONFIG_MANILA_KS_PW'),
|
||||
keystone_tenant => 'services',
|
||||
keystone_user => 'manila',
|
||||
keystone_auth_host => hiera('CONFIG_CONTROLLER_HOST'),
|
||||
}
|
||||
|
||||
class { 'manila::network::neutron':
|
||||
class { '::manila::network::neutron':
|
||||
neutron_admin_password => hiera('CONFIG_NEUTRON_KS_PW'),
|
||||
neutron_admin_tenant_name => 'services',
|
||||
}
|
||||
|
||||
class { 'manila::scheduler':
|
||||
class { '::manila::scheduler':
|
||||
}
|
||||
|
||||
class { 'manila::share':
|
||||
class { '::manila::share':
|
||||
}
|
||||
|
||||
class { 'manila::backends':
|
||||
class { '::manila::backends':
|
||||
enabled_share_backends => hiera('CONFIG_MANILA_BACKEND'),
|
||||
}
|
||||
|
@ -12,12 +12,12 @@ manila::service_instance{ 'generic':
|
||||
service_instance_password => hiera('CONFIG_MANILA_SERVICE_INSTANCE_PASSWORD'),
|
||||
}
|
||||
|
||||
class { 'manila::compute::nova':
|
||||
class { '::manila::compute::nova':
|
||||
nova_admin_password => hiera('CONFIG_NOVA_KS_PW'),
|
||||
nova_admin_tenant_name => 'services',
|
||||
}
|
||||
|
||||
class { 'manila::volume::cinder':
|
||||
class { '::manila::volume::cinder':
|
||||
cinder_admin_password => hiera('CONFIG_CINDER_KS_PW'),
|
||||
cinder_admin_tenant_name => 'services',
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
$db_pw = hiera('CONFIG_MANILA_DB_PW')
|
||||
$mariadb_host = hiera('CONFIG_MARIADB_HOST')
|
||||
|
||||
class {'manila':
|
||||
class { '::manila':
|
||||
rpc_backend => 'manila.openstack.common.rpc.impl_qpid',
|
||||
qpid_hostname => hiera('CONFIG_AMQP_HOST'),
|
||||
qpid_port => hiera('CONFIG_AMQP_CLIENTS_PORT'),
|
||||
|
@ -2,7 +2,7 @@
|
||||
$db_pw = hiera('CONFIG_MANILA_DB_PW')
|
||||
$mariadb_host = hiera('CONFIG_MARIADB_HOST')
|
||||
|
||||
class { 'manila':
|
||||
class { '::manila':
|
||||
rabbit_host => hiera('CONFIG_AMQP_HOST'),
|
||||
rabbit_port => hiera('CONFIG_AMQP_CLIENTS_PORT'),
|
||||
rabbit_use_ssl => hiera('CONFIG_AMQP_ENABLE_SSL'),
|
||||
|
@ -1,4 +1,4 @@
|
||||
class { 'cinder::db::mysql':
|
||||
class { '::cinder::db::mysql':
|
||||
password => hiera('CONFIG_CINDER_DB_PW'),
|
||||
host => '%%',
|
||||
allowed_hosts => '%%',
|
||||
|
@ -1,4 +1,4 @@
|
||||
class { 'glance::db::mysql':
|
||||
class { '::glance::db::mysql':
|
||||
password => hiera('CONFIG_GLANCE_DB_PW'),
|
||||
host => '%%',
|
||||
allowed_hosts => '%%',
|
||||
|
@ -1,4 +1,4 @@
|
||||
class { 'heat::db::mysql':
|
||||
class { '::heat::db::mysql':
|
||||
password => hiera('CONFIG_HEAT_DB_PW'),
|
||||
host => '%%',
|
||||
allowed_hosts => '%%',
|
||||
|
@ -4,7 +4,7 @@ package { 'mariadb-server':
|
||||
ensure => absent,
|
||||
}
|
||||
|
||||
class { 'mysql::server':
|
||||
class { '::mysql::server':
|
||||
package_name => 'mariadb-galera-server',
|
||||
restart => true,
|
||||
root_password => hiera('CONFIG_MARIADB_PW'),
|
||||
@ -14,8 +14,8 @@ class { 'mysql::server':
|
||||
default_storage_engine => 'InnoDB',
|
||||
max_connections => '1024',
|
||||
open_files_limit => '-1',
|
||||
}
|
||||
}
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
# deleting database users for security
|
||||
|
@ -1,4 +1,4 @@
|
||||
class { 'ironic::db::mysql':
|
||||
class { '::ironic::db::mysql':
|
||||
password => hiera('CONFIG_IRONIC_DB_PW'),
|
||||
host => '%%',
|
||||
allowed_hosts => '%%',
|
||||
|
@ -1,4 +1,4 @@
|
||||
class { 'keystone::db::mysql':
|
||||
class { '::keystone::db::mysql':
|
||||
user => 'keystone_admin',
|
||||
password => hiera('CONFIG_KEYSTONE_DB_PW'),
|
||||
allowed_hosts => '%%',
|
||||
|
@ -1,4 +1,4 @@
|
||||
class { 'manila::db::mysql':
|
||||
class { '::manila::db::mysql':
|
||||
password => hiera('CONFIG_MANILA_DB_PW'),
|
||||
allowed_hosts => '%%',
|
||||
charset => 'utf8',
|
||||
|
@ -1,4 +1,4 @@
|
||||
class { 'neutron::db::mysql':
|
||||
class { '::neutron::db::mysql':
|
||||
password => hiera('CONFIG_NEUTRON_DB_PW'),
|
||||
host => '%%',
|
||||
allowed_hosts => '%%',
|
||||
|
@ -1,2 +1,2 @@
|
||||
|
||||
class { 'remote::db': }
|
||||
class { '::remote::db': }
|
||||
|
@ -1,4 +1,4 @@
|
||||
class { 'nova::db::mysql':
|
||||
class { '::nova::db::mysql':
|
||||
password => hiera('CONFIG_NOVA_DB_PW'),
|
||||
host => '%%',
|
||||
allowed_hosts => '%%',
|
||||
|
@ -1,4 +1,4 @@
|
||||
class { 'sahara::db::mysql':
|
||||
class { '::sahara::db::mysql':
|
||||
password => hiera('CONFIG_SAHARA_DB_PW'),
|
||||
host => '%%',
|
||||
allowed_hosts => '%%',
|
||||
|
@ -1,4 +1,4 @@
|
||||
class { 'trove::db::mysql':
|
||||
class { '::trove::db::mysql':
|
||||
password => hiera('CONFIG_TROVE_DB_PW'),
|
||||
host => '%%',
|
||||
allowed_hosts => '%%',
|
||||
|
@ -1,29 +1,29 @@
|
||||
|
||||
remote_database {'trove':
|
||||
ensure => 'present',
|
||||
charset => 'utf8',
|
||||
db_host => hiera('CONFIG_MARIADB_HOST'),
|
||||
db_user => hiera('CONFIG_MARIADB_USER'),
|
||||
db_password => hiera('CONFIG_MARIADB_PW'),
|
||||
provider => 'mysql',
|
||||
remote_database { 'trove':
|
||||
ensure => 'present',
|
||||
charset => 'utf8',
|
||||
db_host => hiera('CONFIG_MARIADB_HOST'),
|
||||
db_user => hiera('CONFIG_MARIADB_USER'),
|
||||
db_password => hiera('CONFIG_MARIADB_PW'),
|
||||
provider => 'mysql',
|
||||
}
|
||||
|
||||
$trove_cfg_trove_db_pw = hiera('CONFIG_TROVE_DB_PW')
|
||||
|
||||
remote_database_user { 'trove@%%':
|
||||
password_hash => mysql_password($trove_cfg_trove_db_pw),
|
||||
db_host => hiera('CONFIG_MARIADB_HOST'),
|
||||
db_user => hiera('CONFIG_MARIADB_USER'),
|
||||
db_password => hiera('CONFIG_MARIADB_PW'),
|
||||
provider => 'mysql',
|
||||
require => Remote_database['trove'],
|
||||
password_hash => mysql_password($trove_cfg_trove_db_pw),
|
||||
db_host => hiera('CONFIG_MARIADB_HOST'),
|
||||
db_user => hiera('CONFIG_MARIADB_USER'),
|
||||
db_password => hiera('CONFIG_MARIADB_PW'),
|
||||
provider => 'mysql',
|
||||
require => Remote_database['trove'],
|
||||
}
|
||||
|
||||
remote_database_grant { 'trove@%%/trove':
|
||||
privileges => "all",
|
||||
db_host => hiera('CONFIG_MARIADB_HOST'),
|
||||
db_user => hiera('CONFIG_MARIADB_USER'),
|
||||
db_password => hiera('CONFIG_MARIADB_PW'),
|
||||
provider => 'mysql',
|
||||
require => Remote_database_user['trove@%%'],
|
||||
privileges => 'all',
|
||||
db_host => hiera('CONFIG_MARIADB_HOST'),
|
||||
db_user => hiera('CONFIG_MARIADB_USER'),
|
||||
db_password => hiera('CONFIG_MARIADB_PW'),
|
||||
provider => 'mysql',
|
||||
require => Remote_database_user['trove@%%'],
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
$mongodb_host = hiera('CONFIG_MONGODB_HOST')
|
||||
|
||||
class { 'mongodb::server':
|
||||
class { '::mongodb::server':
|
||||
smallfiles => true,
|
||||
bind_ip => [$mongodb_host],
|
||||
}
|
||||
|
@ -4,7 +4,7 @@ package{ 'nrpe':
|
||||
}
|
||||
|
||||
file{ '/etc/nagios/nrpe.cfg':
|
||||
ensure => 'present',
|
||||
ensure => file,
|
||||
mode => '0644',
|
||||
owner => 'nagios',
|
||||
group => 'nagios',
|
||||
@ -35,7 +35,7 @@ class nagios_configs () {
|
||||
}
|
||||
}
|
||||
|
||||
class{'nagios_configs':
|
||||
class{ '::nagios_configs':
|
||||
notify => Service['nrpe'],
|
||||
}
|
||||
|
||||
|
@ -1,4 +1,4 @@
|
||||
include packstack::apache_common
|
||||
include ::packstack::apache_common
|
||||
|
||||
package { ['nagios', 'nagios-plugins-nrpe']:
|
||||
ensure => present,
|
||||
@ -10,12 +10,12 @@ exec { 'nagios-plugins-ping':
|
||||
path => '/usr/bin',
|
||||
command => 'yum install -y -d 0 -e 0 monitoring-plugins-ping',
|
||||
onlyif => 'yum install -y -d 0 -e 0 nagios-plugins-ping &> /dev/null && exit 1 || exit 0',
|
||||
before => Class['nagios_configs']
|
||||
before => Class['nagios_configs'],
|
||||
}
|
||||
|
||||
class nagios_configs(){
|
||||
file { ['/etc/nagios/nagios_command.cfg', '/etc/nagios/nagios_host.cfg']:
|
||||
ensure => 'present',
|
||||
ensure => file,
|
||||
mode => '0644',
|
||||
owner => 'nagios',
|
||||
group => 'nagios',
|
||||
@ -24,7 +24,7 @@ class nagios_configs(){
|
||||
# Remove the entry for localhost, it contains services we're not
|
||||
# monitoring
|
||||
file { ['/etc/nagios/objects/localhost.cfg']:
|
||||
ensure => 'present',
|
||||
ensure => file,
|
||||
content => '',
|
||||
}
|
||||
|
||||
@ -57,10 +57,10 @@ class nagios_configs(){
|
||||
$nagios_cfg_ctrl_host = hiera('CONFIG_CONTROLLER_HOST')
|
||||
|
||||
file { '/etc/nagios/keystonerc_admin':
|
||||
ensure => 'present',
|
||||
owner => 'nagios',
|
||||
mode => '0600',
|
||||
content => "export OS_USERNAME=admin
|
||||
ensure => file,
|
||||
owner => 'nagios',
|
||||
mode => '0600',
|
||||
content => "export OS_USERNAME=admin
|
||||
export OS_TENANT_NAME=admin
|
||||
export OS_PASSWORD=${nagios_cfg_ks_adm_pw}
|
||||
export OS_AUTH_URL=http://${nagios_cfg_ctrl_host}:35357/v2.0/ ",
|
||||
@ -69,17 +69,17 @@ export OS_AUTH_URL=http://${nagios_cfg_ctrl_host}:35357/v2.0/ ",
|
||||
%(CONFIG_NAGIOS_MANIFEST_CONFIG)s
|
||||
}
|
||||
|
||||
class { 'nagios_configs':
|
||||
notify => [Service['nagios'], Service['httpd']],
|
||||
class { '::nagios_configs':
|
||||
notify => [ Service['nagios'], Service['httpd']],
|
||||
}
|
||||
|
||||
include concat::setup
|
||||
include ::concat::setup
|
||||
|
||||
class { 'apache':
|
||||
class { '::apache':
|
||||
purge_configs => false,
|
||||
}
|
||||
|
||||
class { 'apache::mod::php': }
|
||||
class { '::apache::mod::php': }
|
||||
|
||||
service { ['nagios']:
|
||||
ensure => running,
|
||||
@ -88,9 +88,9 @@ service { ['nagios']:
|
||||
}
|
||||
|
||||
firewall { '001 nagios incoming':
|
||||
proto => 'tcp',
|
||||
dport => ['80'],
|
||||
action => 'accept',
|
||||
proto => 'tcp',
|
||||
dport => ['80'],
|
||||
action => 'accept',
|
||||
}
|
||||
|
||||
# ensure that we won't stop listening on 443 if horizon has ssl enabled
|
||||
|
@ -1,4 +1,4 @@
|
||||
class { 'neutron::server':
|
||||
class { '::neutron::server':
|
||||
database_connection => $neutron_sql_connection,
|
||||
auth_password => $neutron_user_password,
|
||||
auth_host => hiera('CONFIG_CONTROLLER_HOST'),
|
||||
|
@ -1,2 +1,2 @@
|
||||
|
||||
class { 'packstack::neutron::bridge': }
|
||||
class { '::packstack::neutron::bridge': }
|
||||
|
@ -1,4 +1,4 @@
|
||||
class { 'neutron::agents::dhcp':
|
||||
class { '::neutron::agents::dhcp':
|
||||
interface_driver => hiera('CONFIG_NEUTRON_DHCP_INTERFACE_DRIVER'),
|
||||
debug => hiera('CONFIG_DEBUG_MODE'),
|
||||
}
|
||||
|
@ -1,4 +1,4 @@
|
||||
class { 'neutron::agents::dhcp':
|
||||
class { '::neutron::agents::dhcp':
|
||||
interface_driver => hiera('CONFIG_NEUTRON_DHCP_INTERFACE_DRIVER'),
|
||||
debug => hiera('CONFIG_DEBUG_MODE'),
|
||||
dnsmasq_config_file => '/etc/neutron/dnsmasq-neutron.conf',
|
||||
|
@ -1,4 +1,4 @@
|
||||
class { 'neutron::services::fwaas':
|
||||
class { '::neutron::services::fwaas':
|
||||
enabled => true,
|
||||
}
|
||||
|
||||
|
@ -1,4 +1,4 @@
|
||||
class { 'neutron::agents::l3':
|
||||
class { '::neutron::agents::l3':
|
||||
interface_driver => hiera('CONFIG_NEUTRON_L3_INTERFACE_DRIVER'),
|
||||
external_network_bridge => hiera('CONFIG_NEUTRON_L3_EXT_BRIDGE'),
|
||||
debug => hiera('CONFIG_DEBUG_MODE'),
|
||||
|
@ -1,3 +1,3 @@
|
||||
class {'neutron::agents::linuxbridge':
|
||||
class { '::neutron::agents::linuxbridge':
|
||||
physical_interface_mappings => hiera('CONFIG_NEUTRON_LB_INTERFACE_MAPPINGS'),
|
||||
}
|
||||
|
@ -1,4 +1,4 @@
|
||||
class { 'neutron::agents::lbaas':
|
||||
class { '::neutron::agents::lbaas':
|
||||
interface_driver => hiera('CONFIG_NEUTRON_LBAAS_INTERFACE_DRIVER'),
|
||||
device_driver => 'neutron.services.loadbalancer.drivers.haproxy.namespace_driver.HaproxyNSDriver',
|
||||
user_group => 'haproxy',
|
||||
|
@ -1,6 +1,6 @@
|
||||
$neutron_metadata_cfg_ctrl_host = hiera('CONFIG_CONTROLLER_HOST')
|
||||
|
||||
class { 'neutron::agents::metadata':
|
||||
class { '::neutron::agents::metadata':
|
||||
auth_password => hiera('CONFIG_NEUTRON_KS_PW'),
|
||||
auth_url => "http://${neutron_metadata_cfg_ctrl_host}:35357/v2.0",
|
||||
auth_region => hiera('CONFIG_KEYSTONE_REGION'),
|
||||
|
@ -1,4 +1,4 @@
|
||||
class { 'neutron::agents::metering':
|
||||
class { '::neutron::agents::metering':
|
||||
interface_driver => hiera('CONFIG_NEUTRON_METERING_IFCE_DRIVER'),
|
||||
debug => hiera('CONFIG_DEBUG_MODE'),
|
||||
}
|
||||
|
@ -5,7 +5,7 @@ if hiera('CONFIG_NEUTRON_ML2_VXLAN_GROUP') == '' {
|
||||
$vxlan_group_value = hiera('CONFIG_NEUTRON_ML2_VXLAN_GROUP')
|
||||
}
|
||||
|
||||
class { 'neutron::plugins::ml2':
|
||||
class { '::neutron::plugins::ml2':
|
||||
type_drivers => hiera_array('CONFIG_NEUTRON_ML2_TYPE_DRIVERS'),
|
||||
tenant_network_types => hiera_array('CONFIG_NEUTRON_ML2_TENANT_NETWORK_TYPES'),
|
||||
mechanism_drivers => hiera_array('CONFIG_NEUTRON_ML2_MECHANISM_DRIVERS'),
|
||||
|
@ -1,7 +1,7 @@
|
||||
$neutron_notif_cfg_ctrl_host = hiera('CONFIG_CONTROLLER_HOST')
|
||||
|
||||
# Configure nova notifications system
|
||||
class { 'neutron::server::notifications':
|
||||
class { '::neutron::server::notifications':
|
||||
nova_admin_username => 'nova',
|
||||
nova_admin_password => hiera('CONFIG_NOVA_KS_PW'),
|
||||
nova_admin_tenant_name => 'services',
|
||||
|
@ -7,7 +7,7 @@ if $ovs_agent_vxlan_cfg_neut_ovs_tun_if != '' {
|
||||
$localip = $cfg_neutron_ovs_host
|
||||
}
|
||||
|
||||
class { 'neutron::agents::ml2::ovs':
|
||||
class { '::neutron::agents::ml2::ovs':
|
||||
bridge_uplinks => hiera_array('CONFIG_NEUTRON_OVS_BRIDGE_IFACES'),
|
||||
bridge_mappings => hiera_array('CONFIG_NEUTRON_OVS_BRIDGE_MAPPINGS'),
|
||||
enable_tunneling => hiera('CONFIG_NEUTRON_OVS_TUNNELING'),
|
||||
|
@ -1,5 +1,5 @@
|
||||
|
||||
class { 'neutron':
|
||||
class { '::neutron':
|
||||
rpc_backend => 'neutron.openstack.common.rpc.impl_qpid',
|
||||
qpid_hostname => hiera('CONFIG_AMQP_HOST'),
|
||||
qpid_username => hiera('CONFIG_AMQP_AUTH_USER'),
|
||||
|
@ -1,5 +1,5 @@
|
||||
|
||||
class { 'neutron':
|
||||
class { '::neutron':
|
||||
rabbit_host => hiera('CONFIG_AMQP_HOST'),
|
||||
rabbit_port => hiera('CONFIG_AMQP_CLIENTS_PORT'),
|
||||
rabbit_use_ssl => hiera('CONFIG_AMQP_ENABLE_SSL'),
|
||||
|
@ -1,6 +1,6 @@
|
||||
|
||||
require 'keystone::python'
|
||||
class { 'nova::api':
|
||||
class { '::nova::api':
|
||||
enabled => true,
|
||||
auth_host => hiera('CONFIG_CONTROLLER_HOST'),
|
||||
admin_password => hiera('CONFIG_NOVA_KS_PW'),
|
||||
|
@ -1,9 +1,9 @@
|
||||
$nova_ceil_cfg_ctrl_host = hiera('CONFIG_CONTROLLER_HOST')
|
||||
|
||||
class { 'ceilometer::agent::auth':
|
||||
class { '::ceilometer::agent::auth':
|
||||
auth_url => "http://${nova_ceil_cfg_ctrl_host}:35357/v2.0",
|
||||
auth_password => hiera('CONFIG_CEILOMETER_KS_PW'),
|
||||
}
|
||||
|
||||
class { 'ceilometer::agent::compute': }
|
||||
class { '::ceilometer::agent::compute': }
|
||||
|
||||
|
@ -1,5 +1,5 @@
|
||||
|
||||
class { 'ceilometer':
|
||||
class { '::ceilometer':
|
||||
metering_secret => hiera('CONFIG_CEILOMETER_SECRET'),
|
||||
qpid_hostname => hiera('CONFIG_AMQP_HOST'),
|
||||
qpid_username => hiera('CONFIG_AMQP_AUTH_USER'),
|
||||
|
@ -1,5 +1,5 @@
|
||||
|
||||
class { 'ceilometer':
|
||||
class { '::ceilometer':
|
||||
metering_secret => hiera('CONFIG_CEILOMETER_SECRET'),
|
||||
rabbit_host => hiera('CONFIG_AMQP_HOST'),
|
||||
rabbit_port => hiera('CONFIG_AMQP_CLIENTS_PORT'),
|
||||
|
@ -1,4 +1,4 @@
|
||||
|
||||
class { 'nova::cert':
|
||||
class { '::nova::cert':
|
||||
enabled => true,
|
||||
}
|
||||
|
@ -9,7 +9,7 @@ $public_key = {
|
||||
|
||||
$nova_common_qpid_cfg_storage_host = hiera('CONFIG_STORAGE_HOST')
|
||||
|
||||
class { 'nova':
|
||||
class { '::nova':
|
||||
glance_api_servers => "${nova_common_qpid_cfg_storage_host}:9292",
|
||||
qpid_hostname => hiera('CONFIG_AMQP_HOST'),
|
||||
qpid_username => hiera('CONFIG_AMQP_AUTH_USER'),
|
||||
|
@ -9,7 +9,7 @@ $public_key = {
|
||||
|
||||
$nova_common_rabbitmq_cfg_storage_host = hiera('CONFIG_STORAGE_HOST')
|
||||
|
||||
class { 'nova':
|
||||
class { '::nova':
|
||||
glance_api_servers => "${nova_common_rabbitmq_cfg_storage_host}:9292",
|
||||
rabbit_host => hiera('CONFIG_AMQP_HOST'),
|
||||
rabbit_port => hiera('CONFIG_AMQP_CLIENTS_PORT'),
|
||||
|
@ -1,6 +1,6 @@
|
||||
|
||||
package{ 'python-cinderclient':
|
||||
before => Class['nova']
|
||||
before => Class['nova'],
|
||||
}
|
||||
|
||||
# Install the private key to be used for live migration. This needs to be
|
||||
@ -46,7 +46,7 @@ if ($::fqdn == '' or $::fqdn =~ /localhost/) {
|
||||
$vncproxy_server = $::fqdn
|
||||
}
|
||||
|
||||
class { 'nova::compute':
|
||||
class { '::nova::compute':
|
||||
enabled => true,
|
||||
vncproxy_host => hiera('CONFIG_CONTROLLER_HOST'),
|
||||
vncproxy_protocol => $vncproxy_protocol,
|
||||
|
@ -1,6 +1,6 @@
|
||||
$ironic_config_controller_host = hiera('CONFIG_CONTROLLER_HOST')
|
||||
|
||||
class {'nova::compute::ironic':
|
||||
class { '::nova::compute::ironic':
|
||||
admin_user => 'ironic',
|
||||
admin_passwd => hiera('CONFIG_IRONIC_KS_PW'),
|
||||
admin_url => "http://${ironic_config_controller_host}:35357/v2.0",
|
||||
|
@ -3,7 +3,7 @@ Firewall <| |> -> Class['nova::compute::libvirt']
|
||||
# Ensure Firewall changes happen before libvirt service start
|
||||
# preventing a clash with rules being set by libvirt
|
||||
|
||||
if $::is_virtual == 'true' {
|
||||
if $::is_virtual == true {
|
||||
$libvirt_virt_type = 'qemu'
|
||||
$libvirt_cpu_mode = 'none'
|
||||
} else {
|
||||
@ -18,7 +18,7 @@ exec { 'qemu-kvm':
|
||||
before => Class['nova::compute::libvirt'],
|
||||
}
|
||||
|
||||
class { 'nova::compute::libvirt':
|
||||
class { '::nova::compute::libvirt':
|
||||
libvirt_virt_type => $libvirt_virt_type,
|
||||
libvirt_cpu_mode => $libvirt_cpu_mode,
|
||||
vncserver_listen => '0.0.0.0',
|
||||
|
@ -1,4 +1,4 @@
|
||||
class { 'nova::compute::vmware':
|
||||
class { '::nova::compute::vmware':
|
||||
host_ip => hiera('CONFIG_VCENTER_HOST'),
|
||||
host_username => hiera('CONFIG_VCENTER_USER'),
|
||||
host_password => hiera('CONFIG_VCENTER_PASSWORD'),
|
||||
|
@ -1,4 +1,4 @@
|
||||
|
||||
class { 'nova::conductor':
|
||||
class { '::nova::conductor':
|
||||
enabled => true,
|
||||
}
|
||||
|
@ -1 +1 @@
|
||||
package { 'glusterfs-fuse': ensure => present }
|
||||
package { 'glusterfs-fuse': ensure => present }
|
||||
|
@ -17,7 +17,7 @@ $manager = hiera('CONFIG_NOVA_NETWORK_MANAGER')
|
||||
|
||||
$nova_net_manager_list = [
|
||||
'nova.network.manager.VlanManager',
|
||||
'nova.network.manager.FlatDHCPManager'
|
||||
'nova.network.manager.FlatDHCPManager',
|
||||
]
|
||||
|
||||
$overrides = {}
|
||||
@ -35,7 +35,7 @@ if $manager == 'nova.network.manager.VlanManager' {
|
||||
$net_num = 1
|
||||
}
|
||||
|
||||
class { 'nova::network':
|
||||
class { '::nova::network':
|
||||
enabled => true,
|
||||
network_manager => $manager,
|
||||
num_networks => $net_num ,
|
||||
|
@ -1,7 +1,7 @@
|
||||
|
||||
$nova_neutron_cfg_ctrl_host = hiera('CONFIG_CONTROLLER_HOST')
|
||||
|
||||
class { 'nova::network::neutron':
|
||||
class { '::nova::network::neutron':
|
||||
neutron_admin_password => hiera('CONFIG_NEUTRON_KS_PW'),
|
||||
neutron_auth_strategy => 'keystone',
|
||||
neutron_url => "http://${nova_neutron_cfg_ctrl_host}:9696",
|
||||
@ -10,6 +10,6 @@ class { 'nova::network::neutron':
|
||||
neutron_region_name => hiera('CONFIG_KEYSTONE_REGION'),
|
||||
}
|
||||
|
||||
class { 'nova::compute::neutron':
|
||||
class { '::nova::compute::neutron':
|
||||
libvirt_vif_driver => hiera('CONFIG_NOVA_LIBVIRT_VIF_DRIVER'),
|
||||
}
|
||||
|
@ -1 +1 @@
|
||||
package { 'nfs-utils': ensure => present }
|
||||
package { 'nfs-utils': ensure => present }
|
||||
|
@ -8,6 +8,6 @@ nova_config{
|
||||
value => hiera('CONFIG_NOVA_SCHED_RAM_ALLOC_RATIO');
|
||||
}
|
||||
|
||||
class { 'nova::scheduler':
|
||||
class { '::nova::scheduler':
|
||||
enabled => true,
|
||||
}
|
||||
|
@ -18,13 +18,13 @@ if $vncproxy_protocol == undef {
|
||||
}
|
||||
}
|
||||
|
||||
class { 'nova::vncproxy':
|
||||
class { '::nova::vncproxy':
|
||||
enabled => true,
|
||||
host => hiera('CONFIG_CONTROLLER_HOST'),
|
||||
vncproxy_protocol => $vncproxy_protocol,
|
||||
}
|
||||
|
||||
class { 'nova::consoleauth':
|
||||
class { '::nova::consoleauth':
|
||||
enabled => true,
|
||||
}
|
||||
|
||||
|
@ -26,14 +26,14 @@ export PS1='[\\u@\\h \\W(keystone_admin)]\\$ '
|
||||
"
|
||||
|
||||
file { "${::home_dir}/keystonerc_admin":
|
||||
ensure => 'present',
|
||||
ensure => file,
|
||||
mode => '0600',
|
||||
content => $rcadmin_content,
|
||||
}
|
||||
|
||||
if hiera('CONFIG_PROVISION_DEMO') == 'y' {
|
||||
file { "${::home_dir}/keystonerc_demo":
|
||||
ensure => 'present',
|
||||
ensure => file,
|
||||
mode => '0600',
|
||||
content => "export OS_USERNAME=demo
|
||||
export OS_TENANT_NAME=demo
|
||||
@ -47,7 +47,7 @@ export PS1='[\\u@\\h \\W(keystone_demo)]\\$ '
|
||||
if hiera('NO_ROOT_USER_ALLINONE') == true {
|
||||
$ost_cl_home_dir = hiera('HOME_DIR')
|
||||
file { "${ost_cl_home_dir}/keystonerc_admin":
|
||||
ensure => present,
|
||||
ensure => file,
|
||||
owner => hiera('NO_ROOT_USER'),
|
||||
group => hiera('NO_ROOT_GROUP'),
|
||||
mode => '0600',
|
||||
|
@ -1,4 +1,4 @@
|
||||
exec { 'update-selinux-policy':
|
||||
path => "/usr/bin/",
|
||||
command => "yum update -y selinux-policy-targeted"
|
||||
path => '/usr/bin/',
|
||||
command => 'yum update -y selinux-policy-targeted',
|
||||
}
|
||||
|
@ -1,4 +1,4 @@
|
||||
include firewall
|
||||
include ::firewall
|
||||
|
||||
if $::ipaddress == hiera('CONFIG_CONTROLLER_HOST') {
|
||||
include ::apache
|
||||
|
@ -163,7 +163,7 @@ if $provision_tempest_user != '' {
|
||||
if $configure_tempest {
|
||||
$tempest_requires = concat([Keystone_user[$username]], $neutron_deps)
|
||||
|
||||
class { 'tempest':
|
||||
class { '::tempest':
|
||||
tempest_repo_uri => $tempest_repo_uri,
|
||||
tempest_clone_path => $tempest_clone_path,
|
||||
tempest_clone_owner => $tempest_clone_owner,
|
||||
@ -220,7 +220,7 @@ if $provision_tempest_user != '' {
|
||||
}
|
||||
} else {
|
||||
## Standalone Tempest installation
|
||||
class { 'tempest':
|
||||
class { '::tempest':
|
||||
tempest_repo_uri => hiera('CONFIG_PROVISION_TEMPEST_REPO_URI'),
|
||||
tempest_clone_path => '/var/lib/tempest',
|
||||
tempest_clone_owner => 'root',
|
||||
|
@ -1,7 +1,7 @@
|
||||
$redis_port = hiera('CONFIG_REDIS_PORT')
|
||||
$redis_master_host = hiera('CONFIG_REDIS_MASTER_HOST')
|
||||
|
||||
class { 'redis':
|
||||
class { '::redis':
|
||||
bind => $redis_master_host,
|
||||
port => $redis_port,
|
||||
appendonly => true,
|
||||
|
@ -4,8 +4,8 @@ $redis_master_name = hiera('CONFIG_REDIS_MASTER_NAME')
|
||||
$redis_sentinel_quorum = hiera('CONFIG_REDIS_SENTINEL_QUORUM')
|
||||
$redis_sentinel_port = hiera('CONFIG_REDIS_SENTINEL_PORT')
|
||||
|
||||
class { 'redis::sentinel':
|
||||
master_name => "${redis_master_name}",
|
||||
class { '::redis::sentinel':
|
||||
master_name => $redis_master_name,
|
||||
redis_host => $redis_master_host,
|
||||
redis_port => $redis_master_port,
|
||||
quorum => $redis_sentinel_quorum,
|
||||
|
@ -2,7 +2,7 @@ $redis_host = hiera('CONFIG_REDIS_HOST')
|
||||
$redis_port = hiera('CONFIG_REDIS_PORT')
|
||||
$redis_master_host = hiera('CONFIG_REDIS_MASTER_HOST')
|
||||
|
||||
class { 'redis':
|
||||
class { '::redis':
|
||||
bind => '0.0.0.0',
|
||||
port => $redis_port,
|
||||
appendonly => true,
|
||||
|
@ -4,7 +4,7 @@ $sahara_cfg_sahara_mariadb_host = hiera('CONFIG_MARIADB_HOST')
|
||||
$sahara_cfg_config_neutron_install = hiera('CONFIG_NEUTRON_INSTALL')
|
||||
|
||||
$sahara_cfg_controller_host = hiera('CONFIG_CONTROLLER_HOST')
|
||||
class { 'sahara':
|
||||
class { '::sahara':
|
||||
database_connection =>
|
||||
"mysql://sahara:${sahara_cfg_sahara_db_pw}@${sahara_cfg_sahara_mariadb_host}/sahara",
|
||||
verbose => true,
|
||||
|
@ -1,4 +1,4 @@
|
||||
class { 'sahara::notify::qpid':
|
||||
class { '::sahara::notify::qpid':
|
||||
qpid_hostname => hiera('CONFIG_AMQP_HOST'),
|
||||
qpid_port => hiera('CONFIG_AMQP_CLIENTS_PORT'),
|
||||
qpid_protocol => hiera('CONFIG_AMQP_PROTOCOL'),
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user