Replace absolute class names

Since Puppet 4 all class names are handled as absolute class names
and we don't neet to explicitly use $::{name}.

Change-Id: Icf925c479a9fc05fe71d8315306cb390fd7a57d9
This commit is contained in:
Takashi Kajinami 2021-05-04 01:07:02 +09:00
parent e68e0e8232
commit 381feb7e09
93 changed files with 341 additions and 341 deletions

View File

@ -21,7 +21,7 @@ define packstack::amqp::enable_rabbitmq {
notify => Service['rabbitmq-server'],
}
class { '::rabbitmq':
class { 'rabbitmq':
port => undef,
ssl_port => 0 + hiera('CONFIG_AMQP_CLIENTS_PORT'),
ssl_only => true,
@ -42,7 +42,7 @@ define packstack::amqp::enable_rabbitmq {
tcp_backlog => 128,
}
} else {
class { '::rabbitmq':
class { 'rabbitmq':
port => 0 + hiera('CONFIG_AMQP_CLIENTS_PORT'),
ssl => false,
default_user => hiera('CONFIG_AMQP_AUTH_USER'),

View File

@ -12,31 +12,31 @@ class packstack::aodh ()
$coordination_url = ''
}
class { '::aodh::keystone::authtoken':
class { 'aodh::keystone::authtoken':
password => hiera('CONFIG_AODH_KS_PW'),
auth_url => hiera('CONFIG_KEYSTONE_ADMIN_URL'),
}
class { '::aodh::api':
class { 'aodh::api':
enabled => true,
service_name => 'httpd',
sync_db => true,
}
class { '::aodh::wsgi::apache':
class { 'aodh::wsgi::apache':
workers => hiera('CONFIG_SERVICE_WORKERS'),
ssl => false
}
class { '::aodh::service_credentials':
class { 'aodh::service_credentials':
password => hiera('CONFIG_AODH_KS_PW'),
auth_url => hiera('CONFIG_KEYSTONE_PUBLIC_URL_VERSIONLESS'),
region_name => hiera('CONFIG_KEYSTONE_REGION'),
}
class { '::aodh::evaluator':
class { 'aodh::evaluator':
coordination_url => $coordination_url,
}
class { '::aodh::notifier': }
class { '::aodh::listener': }
class { '::aodh::client': }
class { 'aodh::notifier': }
class { 'aodh::listener': }
class { 'aodh::client': }
}

View File

@ -23,11 +23,11 @@ class packstack::aodh::rabbitmq ()
File[$files_to_set_owner] ~> Service<| tag == 'aodh-service' |>
}
class { '::aodh::logging':
class { 'aodh::logging':
debug => hiera('CONFIG_DEBUG_MODE'),
}
class { '::aodh':
class { 'aodh':
rabbit_use_ssl => hiera('CONFIG_AMQP_SSL_ENABLED'),
default_transport_url => "rabbit://${rabbit_userid}:${rabbit_password}@${rabbit_host}:${rabbit_port}/",
kombu_ssl_ca_certs => $kombu_ssl_ca_certs,

View File

@ -2,7 +2,7 @@ class packstack::apache ()
{
# Use python3 for mod_wsg in fedora
if ($::operatingsystem == 'Fedora') or ($::osfamily == 'RedHat' and Integer.new($::operatingsystemmajrelease) > 7) {
class { '::apache':
class { 'apache':
mod_packages => merge($::apache::params::mod_packages, {
'wsgi' => 'python3-mod_wsgi',
}),
@ -11,7 +11,7 @@ class packstack::apache ()
})
}
}else{
class {'::apache':
class { 'apache':
}
}

View File

@ -26,7 +26,7 @@ class packstack::ceilometer ()
$coordination_url = ''
}
include ::ceilometer
include ceilometer
exec {'ceilometer-db-upgrade':
command => 'ceilometer-upgrade',
@ -38,18 +38,18 @@ class packstack::ceilometer ()
Keystone::Resource::Service_identity<||> -> Exec['ceilometer-db-upgrade']
~> Service['ceilometer-agent-notification']
class { '::ceilometer::agent::notification':
class { 'ceilometer::agent::notification':
manage_event_pipeline => true,
event_pipeline_publishers => ['gnocchi://', 'panko://'],
}
class { '::ceilometer::agent::service_credentials':
class { 'ceilometer::agent::service_credentials':
auth_url => hiera('CONFIG_KEYSTONE_PUBLIC_URL_VERSIONLESS'),
password => hiera('CONFIG_CEILOMETER_KS_PW'),
region_name => hiera('CONFIG_KEYSTONE_REGION'),
}
class { '::ceilometer::agent::polling':
class { 'ceilometer::agent::polling':
manage_polling => true,
coordination_url => $coordination_url,
}

View File

@ -19,11 +19,11 @@ class packstack::ceilometer::rabbitmq ()
File[$files_to_set_owner] ~> Service<| tag == 'ceilometer-service' |>
}
class { '::ceilometer::logging':
class { 'ceilometer::logging':
debug => hiera('CONFIG_DEBUG_MODE'),
}
class { '::ceilometer':
class { 'ceilometer':
telemetry_secret => hiera('CONFIG_CEILOMETER_SECRET'),
rabbit_use_ssl => hiera('CONFIG_AMQP_SSL_ENABLED'),
default_transport_url => "rabbit://${rabbit_userid}:${rabbit_password}@${rabbit_host}:${rabbit_port}/",

View File

@ -24,23 +24,23 @@ class packstack::cinder ()
# TO-DO(mmagr): Add IPv6 support when hostnames are used
}
class { '::cinder::keystone::authtoken':
class { 'cinder::keystone::authtoken':
www_authenticate_uri => hiera('CONFIG_KEYSTONE_PUBLIC_URL_VERSIONLESS'),
auth_url => hiera('CONFIG_KEYSTONE_ADMIN_URL'),
password => hiera('CONFIG_CINDER_KS_PW'),
}
class { '::cinder::api':
class { 'cinder::api':
bind_host => $bind_host,
service_workers => hiera('CONFIG_SERVICE_WORKERS'),
default_volume_type => $default_volume_type,
}
class { '::cinder::scheduler': }
class { 'cinder::scheduler': }
class { '::cinder::volume': }
class { 'cinder::volume': }
class { '::cinder::client': }
class { 'cinder::client': }
$cinder_keystone_admin_username = hiera('CONFIG_KEYSTONE_ADMIN_USERNAME')
$cinder_keystone_admin_password = hiera('CONFIG_KEYSTONE_ADMIN_PW')
@ -55,13 +55,13 @@ class packstack::cinder ()
os_auth_url => hiera('CONFIG_KEYSTONE_PUBLIC_URL'),
}
class { '::cinder::backends':
class { 'cinder::backends':
enabled_backends => hiera_array('CONFIG_CINDER_BACKEND'),
}
$db_purge = hiera('CONFIG_CINDER_DB_PURGE_ENABLE')
if $db_purge {
class { '::cinder::cron::db_purge':
class { 'cinder::cron::db_purge':
hour => '*/24',
destination => '/dev/null',
age => 1

View File

@ -7,7 +7,7 @@ class packstack::cinder::backend::lvm ()
# Find an available loop device
$loop_dev = chomp(generate('/usr/sbin/losetup', '-f'))
class { '::cinder::setup_test_volume':
class { 'cinder::setup_test_volume':
size => hiera('CONFIG_CINDER_VOLUMES_SIZE'),
loopback_device => $loop_dev,
volume_path => '/var/lib/cinder',

View File

@ -1,10 +1,10 @@
class packstack::cinder::backup ()
{
class { '::cinder::backup': }
class { 'cinder::backup': }
$cinder_backup_conf_ctrl_host = hiera('CONFIG_KEYSTONE_HOST_URL')
class { '::cinder::backup::swift':
class { 'cinder::backup::swift':
backup_swift_url => "http://${cinder_backup_conf_ctrl_host}:8080/v1/AUTH_",
}

View File

@ -22,11 +22,11 @@ class packstack::cinder::rabbitmq ()
}
}
class { '::cinder::logging':
class { 'cinder::logging':
debug => hiera('CONFIG_DEBUG_MODE'),
}
class { '::cinder':
class { 'cinder':
rabbit_use_ssl => hiera('CONFIG_AMQP_SSL_ENABLED'),
default_transport_url => "rabbit://${rabbit_userid}:${rabbit_password}@${rabbit_host}:${rabbit_port}/",
database_connection => "mysql+pymysql://cinder:${cinder_rab_cfg_cinder_db_pw}@${cinder_rab_cfg_mariadb_host}/cinder",

View File

@ -18,17 +18,17 @@ class packstack::glance ()
default => 'file',
}
class { '::glance::api::authtoken':
class { 'glance::api::authtoken':
www_authenticate_uri => hiera('CONFIG_KEYSTONE_PUBLIC_URL'),
auth_url => hiera('CONFIG_KEYSTONE_ADMIN_URL'),
password => hiera('CONFIG_GLANCE_KS_PW'),
}
class { '::glance::api::logging':
class { 'glance::api::logging':
debug => hiera('CONFIG_DEBUG_MODE'),
}
class { '::glance::api':
class { 'glance::api':
bind_host => $bind_host,
pipeline => 'keystone',
database_connection => "mysql+pymysql://glance:${glance_ks_pw}@${glance_mariadb_host}/glance",

View File

@ -1,7 +1,7 @@
class packstack::glance::backend::file ()
{
# TO-DO: Make this configurable
class { '::glance::backend::file':
class { 'glance::backend::file':
filesystem_store_datadir => '/var/lib/glance/images/',
}
}

View File

@ -7,7 +7,7 @@ class packstack::glance::backend::swift ()
default => '3',
}
class { '::glance::backend::swift':
class { 'glance::backend::swift':
swift_store_user => 'services:glance',
swift_store_key => hiera('CONFIG_GLANCE_KS_PW'),
swift_store_auth_address => hiera('CONFIG_KEYSTONE_PUBLIC_URL'),

View File

@ -18,7 +18,7 @@ class packstack::glance::ceilometer ()
notify => Service['glance-api'],
}
}
class { '::glance::notify::rabbitmq':
class { 'glance::notify::rabbitmq':
rabbit_notification_exchange => 'glance',
rabbit_notification_topic => 'notifications',
rabbit_use_ssl => hiera('CONFIG_AMQP_SSL_ENABLED'),

View File

@ -5,40 +5,40 @@ class packstack::gnocchi ()
$gnocchi_cfg_db_pw = hiera('CONFIG_GNOCCHI_DB_PW')
$gnocchi_cfg_mariadb_host = hiera('CONFIG_MARIADB_HOST_URL')
class { '::gnocchi::wsgi::apache':
class { 'gnocchi::wsgi::apache':
workers => hiera('CONFIG_SERVICE_WORKERS'),
ssl => false
}
class { '::gnocchi':
class { 'gnocchi':
}
class { '::gnocchi::keystone::authtoken':
class { 'gnocchi::keystone::authtoken':
www_authenticate_uri => hiera('CONFIG_KEYSTONE_PUBLIC_URL'),
auth_url => hiera('CONFIG_KEYSTONE_ADMIN_URL'),
auth_version => hiera('CONFIG_KEYSTONE_API_VERSION'),
password => hiera('CONFIG_GNOCCHI_KS_PW')
}
class { '::gnocchi::db':
class { 'gnocchi::db':
database_connection => "mysql+pymysql://gnocchi:${gnocchi_cfg_db_pw}@${gnocchi_cfg_mariadb_host}/gnocchi?charset=utf8",
}
class { '::gnocchi::api':
class { 'gnocchi::api':
service_name => 'httpd',
sync_db => true,
}
class { '::gnocchi::storage': }
class { '::gnocchi::storage::file': }
class { 'gnocchi::storage': }
class { 'gnocchi::storage::file': }
class {'::gnocchi::metricd': }
class { 'gnocchi::metricd': }
class {'::gnocchi::statsd':
class { 'gnocchi::statsd':
resource_id => '5e3fcbe2-7aab-475d-b42c-a440aa42e5ad',
archive_policy_name => 'high',
flush_delay => '10',
}
include ::gnocchi::client
include gnocchi::client
}

View File

@ -2,21 +2,21 @@ class packstack::heat ()
{
create_resources(packstack::firewall, hiera('FIREWALL_HEAT_RULES', {}))
class { '::heat::api':
class { 'heat::api':
workers => hiera('CONFIG_SERVICE_WORKERS'),
}
$keystone_admin = hiera('CONFIG_KEYSTONE_ADMIN_USERNAME')
$heat_cfg_ctrl_host = hiera('CONFIG_KEYSTONE_HOST_URL')
class { '::heat::engine':
class { 'heat::engine':
heat_metadata_server_url => "http://${heat_cfg_ctrl_host}:8000",
heat_waitcondition_server_url => "http://${heat_cfg_ctrl_host}:8000/v1/waitcondition",
auth_encryption_key => hiera('CONFIG_HEAT_AUTH_ENC_KEY'),
num_engine_workers => hiera('CONFIG_SERVICE_WORKERS'),
}
class { '::heat::keystone::domain':
class { 'heat::keystone::domain':
domain_name => hiera('CONFIG_HEAT_DOMAIN'),
domain_admin => hiera('CONFIG_HEAT_DOMAIN_ADMIN'),
domain_password => hiera('CONFIG_HEAT_DOMAIN_PASSWORD'),

View File

@ -2,13 +2,13 @@ class packstack::heat::cfn ()
{
create_resources(packstack::firewall, hiera('FIREWALL_HEAT_CFN_RULES', {}))
class { '::heat::api_cfn':
class { 'heat::api_cfn':
workers => hiera('CONFIG_SERVICE_WORKERS'),
}
$heat_cfn_cfg_ctrl_host = hiera('CONFIG_KEYSTONE_HOST_URL')
class { '::heat::keystone::auth_cfn':
class { 'heat::keystone::auth_cfn':
admin_url => "http://${heat_cfn_cfg_ctrl_host}:8000/v1",
public_url => "http://${heat_cfn_cfg_ctrl_host}:8000/v1",
internal_url => "http://${heat_cfn_cfg_ctrl_host}:8000/v1",

View File

@ -28,17 +28,17 @@ class packstack::heat::rabbitmq ()
$heat_notification_driver = $::os_service_default
}
class { '::heat::keystone::authtoken':
class { 'heat::keystone::authtoken':
password => hiera('CONFIG_HEAT_KS_PW'),
www_authenticate_uri => hiera('CONFIG_KEYSTONE_PUBLIC_URL'),
auth_url => hiera('CONFIG_KEYSTONE_ADMIN_URL'),
}
class { '::heat::logging':
class { 'heat::logging':
debug => hiera('CONFIG_DEBUG_MODE'),
}
class { '::heat':
class { 'heat':
keystone_ec2_uri => hiera('CONFIG_KEYSTONE_PUBLIC_URL'),
rabbit_use_ssl => hiera('CONFIG_AMQP_SSL_ENABLED'),
default_transport_url => "rabbit://${rabbit_userid}:${rabbit_password}@${rabbit_host}:${rabbit_port}/",

View File

@ -16,7 +16,7 @@ class packstack::horizon ()
'n' => false,
}
class {'::horizon':
class { 'horizon':
secret_key => hiera('CONFIG_HORIZON_SECRET_KEY'),
keystone_url => hiera('CONFIG_KEYSTONE_PUBLIC_URL'),
keystone_default_role => '_member_',
@ -60,7 +60,7 @@ class packstack::horizon ()
ensure_packages(['openstack-heat-ui'], {'ensure' => 'present'})
}
include '::packstack::memcached'
include packstack::memcached
$firewall_port = hiera('CONFIG_HORIZON_PORT')

View File

@ -6,14 +6,14 @@ class packstack::ironic ()
'glance/glance_host': value => hiera('CONFIG_STORAGE_HOST_URL');
}
class { '::ironic::api::authtoken':
class { 'ironic::api::authtoken':
www_authenticate_uri => hiera('CONFIG_KEYSTONE_PUBLIC_URL'),
password => hiera('CONFIG_IRONIC_KS_PW'),
}
class { '::ironic::api': }
class { 'ironic::api': }
class { '::ironic::client': }
class { 'ironic::client': }
class { '::ironic::conductor': }
class { 'ironic::conductor': }
}

View File

@ -22,11 +22,11 @@ class packstack::ironic::rabbitmq ()
File[$files_to_set_owner] ~> Service<| tag == 'ironic-service' |>
}
class { '::ironic::logging':
class { 'ironic::logging':
debug => true,
}
class { '::ironic':
class { 'ironic':
rabbit_use_ssl => hiera('CONFIG_AMQP_SSL_ENABLED'),
default_transport_url => "rabbit://${rabbit_userid}:${rabbit_password}@${rabbit_host}:${rabbit_port}/",
database_connection => "mysql+pymysql://ironic:${ironic_rabbitmq_cfg_ironic_db_pw}@${ironic_rabbitmq_cfg_mariadb_host}/ironic",

View File

@ -9,10 +9,10 @@ class packstack::keystone ()
$keystone_url = regsubst(regsubst(hiera('CONFIG_KEYSTONE_PUBLIC_URL'),'/v2.0',''),'/v3','')
$keystone_admin_url = hiera('CONFIG_KEYSTONE_ADMIN_URL')
class { '::keystone::client': }
class { 'keystone::client': }
if hiera('CONFIG_KEYSTONE_FERNET_TOKEN_ROTATE_ENABLE',false) {
class { '::keystone::cron::fernet_rotate':
class { 'keystone::cron::fernet_rotate':
require => Service['crond'],
}
service { 'crond':
@ -21,11 +21,11 @@ class packstack::keystone ()
}
}
class { '::keystone::logging':
class { 'keystone::logging':
debug => hiera('CONFIG_DEBUG_MODE'),
}
class { '::keystone':
class { 'keystone':
database_connection => "mysql+pymysql://keystone_admin:${keystone_cfg_ks_db_pw}@${keystone_cfg_mariadb_host}/keystone",
token_provider => $keystone_token_provider_str,
enable_fernet_setup => true,
@ -34,7 +34,7 @@ class packstack::keystone ()
default_domain => 'Default',
}
class { '::keystone::wsgi::apache':
class { 'keystone::wsgi::apache':
workers => hiera('CONFIG_SERVICE_WORKERS'),
ssl => $keystone_use_ssl
}
@ -46,7 +46,7 @@ class packstack::keystone ()
ensure => present,
}
class { '::keystone::bootstrap':
class { 'keystone::bootstrap':
password => hiera('CONFIG_KEYSTONE_ADMIN_PW'),
username => $username,
email => hiera('CONFIG_KEYSTONE_ADMIN_EMAIL'),
@ -69,7 +69,7 @@ class packstack::keystone ()
$user_enabled_emulation = false
}
class { '::keystone::ldap':
class { 'keystone::ldap':
url => hiera_undef('CONFIG_KEYSTONE_LDAP_URL', undef),
user => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_DN', undef),
password => hiera_undef('CONFIG_KEYSTONE_LDAP_USER_PASSWORD', undef),

View File

@ -2,7 +2,7 @@ class packstack::keystone::aodh ()
{
$keystone_host_url = hiera('CONFIG_KEYSTONE_HOST_URL')
class { '::aodh::keystone::auth':
class { 'aodh::keystone::auth':
region => hiera('CONFIG_KEYSTONE_REGION'),
password => hiera('CONFIG_AODH_KS_PW'),
public_url => "http://${keystone_host_url}:8042",

View File

@ -5,7 +5,7 @@ class packstack::keystone::ceilometer ()
$ceilometer_api_host = hiera('CONFIG_KEYSTONE_HOST_URL')
$ceilometer_url = "${ceilometer_protocol}://${ceilometer_api_host}:${ceilometer_port}"
class { '::ceilometer::keystone::auth':
class { 'ceilometer::keystone::auth':
region => hiera('CONFIG_KEYSTONE_REGION'),
password => hiera('CONFIG_CEILOMETER_KS_PW'),
public_url => $ceilometer_url,

View File

@ -5,7 +5,7 @@ class packstack::keystone::cinder ()
$cinder_port = '8776'
$cinder_url = "${cinder_protocol}://${cinder_host}:${cinder_port}"
class { '::cinder::keystone::auth':
class { 'cinder::keystone::auth':
region => hiera('CONFIG_KEYSTONE_REGION'),
password => hiera('CONFIG_CINDER_KS_PW'),
public_url_v2 => "${cinder_url}/v2/%(tenant_id)s",

View File

@ -5,7 +5,7 @@ class packstack::keystone::glance ()
$glance_api_host = hiera('CONFIG_STORAGE_HOST_URL')
$glance_url = "${glance_protocol}://${glance_api_host}:${glance_port}"
class { '::glance::keystone::auth':
class { 'glance::keystone::auth':
region => hiera('CONFIG_KEYSTONE_REGION'),
password => hiera('CONFIG_GLANCE_KS_PW'),
public_url => $glance_url,

View File

@ -2,7 +2,7 @@ class packstack::keystone::gnocchi ()
{
$gnocchi_keystone_host_url = hiera('CONFIG_KEYSTONE_HOST_URL')
class { '::gnocchi::keystone::auth':
class { 'gnocchi::keystone::auth':
region => hiera('CONFIG_KEYSTONE_REGION'),
password => hiera('CONFIG_GNOCCHI_KS_PW'),
public_url => "http://${gnocchi_keystone_host_url}:8041",

View File

@ -6,7 +6,7 @@ class packstack::keystone::heat ()
$heat_url = "${heat_protocol}://${heat_api_host}:${heat_port}/v1/%(tenant_id)s"
# heat::keystone::auth
class { '::heat::keystone::auth':
class { 'heat::keystone::auth':
region => hiera('CONFIG_KEYSTONE_REGION'),
password => hiera('CONFIG_HEAT_KS_PW'),
public_url => $heat_url,

View File

@ -5,7 +5,7 @@ class packstack::keystone::ironic ()
$ironic_port = '6385'
$ironic_url = "${ironic_protocol}://${ironic_host}:${ironic_port}"
class { '::ironic::keystone::auth':
class { 'ironic::keystone::auth':
region => hiera('CONFIG_KEYSTONE_REGION'),
password => hiera('CONFIG_IRONIC_KS_PW'),
public_url => $ironic_url,

View File

@ -5,7 +5,7 @@ class packstack::keystone::magnum ()
$magnum_port = '9511'
$magnum_url = "${magnum_protocol}://${magnum_host}:${magnum_port}/v1"
class { '::magnum::keystone::auth':
class { 'magnum::keystone::auth':
region => hiera('CONFIG_KEYSTONE_REGION'),
password => hiera('CONFIG_MAGNUM_KS_PW'),
public_url => $magnum_url,
@ -13,7 +13,7 @@ class packstack::keystone::magnum ()
internal_url => $magnum_url
}
class { '::magnum::keystone::domain':
class { 'magnum::keystone::domain':
domain_password => hiera('CONFIG_MAGNUM_KS_PW'),
}
}

View File

@ -6,7 +6,7 @@ class packstack::keystone::manila ()
$manila_url = "${manila_protocol}://${manila_host}:${manila_port}/v1/%(tenant_id)s"
$manila_url_v2 = "${manila_protocol}://${manila_host}:${manila_port}/v2/%(tenant_id)s"
class { '::manila::keystone::auth':
class { 'manila::keystone::auth':
password => hiera('CONFIG_MANILA_KS_PW'),
public_url => $manila_url,
admin_url => $manila_url,

View File

@ -5,7 +5,7 @@ class packstack::keystone::neutron ()
$neutron_port = '9696'
$neutron_url = "${neutron_protocol}://${neutron_host}:${neutron_port}"
class { '::neutron::keystone::auth':
class { 'neutron::keystone::auth':
region => hiera('CONFIG_KEYSTONE_REGION'),
password => hiera('CONFIG_NEUTRON_KS_PW'),
public_url => $neutron_url,

View File

@ -6,7 +6,7 @@ class packstack::keystone::nova ()
$nova_url = "${nova_protocol}://${nova_host}:${nova_port}/v2.1/%(tenant_id)s"
class { '::nova::keystone::auth':
class { 'nova::keystone::auth':
region => hiera('CONFIG_KEYSTONE_REGION'),
password => hiera('CONFIG_NOVA_KS_PW'),
public_url => $nova_url,

View File

@ -2,7 +2,7 @@ class packstack::keystone::panko ()
{
$keystone_host_url = hiera('CONFIG_KEYSTONE_HOST_URL')
class { '::panko::keystone::auth':
class { 'panko::keystone::auth':
region => hiera('CONFIG_KEYSTONE_REGION'),
password => hiera('CONFIG_PANKO_KS_PW'),
public_url => "http://${keystone_host_url}:8977",

View File

@ -5,7 +5,7 @@ class packstack::keystone::placement ()
$placement_port = '8778'
$placement_url = "${placement_protocol}://${placement_host}:${placement_port}/placement"
class { '::placement::keystone::authtoken':
class { 'placement::keystone::authtoken':
password => hiera('CONFIG_NOVA_KS_PW'),
user_domain_name => 'Default',
project_domain_name => 'Default',
@ -13,7 +13,7 @@ class packstack::keystone::placement ()
www_authenticate_uri => hiera('CONFIG_KEYSTONE_PUBLIC_URL_VERSIONLESS'),
}
class { '::placement::keystone::auth':
class { 'placement::keystone::auth':
public_url => $placement_url,
internal_url => $placement_url,
admin_url => $placement_url,

View File

@ -5,7 +5,7 @@ class packstack::keystone::sahara ()
$sahara_port = '8386'
$sahara_url = "${sahara_protocol}://${sahara_host}:${sahara_port}"
class { '::sahara::keystone::auth':
class { 'sahara::keystone::auth':
password => hiera('CONFIG_SAHARA_KS_PW'),
public_url => $sahara_url,
admin_url => $sahara_url,

View File

@ -5,7 +5,7 @@ class packstack::keystone::swift ()
$swift_port = '8080'
$swift_url = "${swift_protocol}://${swift_host}:${swift_port}/v1/AUTH_%(tenant_id)s"
class { '::swift::keystone::auth':
class { 'swift::keystone::auth':
region => hiera('CONFIG_KEYSTONE_REGION'),
password => hiera('CONFIG_SWIFT_KS_PW'),
operator_roles => ['admin', 'SwiftOperator', 'ResellerAdmin'],

View File

@ -5,7 +5,7 @@ class packstack::keystone::trove ()
$trove_port = '8779'
$trove_url = "${trove_protocol}://${trove_host}:${trove_port}/v1.0/%(tenant_id)s"
class { '::trove::keystone::auth':
class { 'trove::keystone::auth':
region => hiera('CONFIG_KEYSTONE_REGION'),
password => hiera('CONFIG_TROVE_KS_PW'),
public_url => $trove_url,

View File

@ -4,7 +4,7 @@ class packstack::magnum ()
$magnum_cfg_magnum_db_pw = hiera('CONFIG_MAGNUM_DB_PW')
$magnum_cfg_magnum_mariadb_host = hiera('CONFIG_MARIADB_HOST_URL')
class { '::magnum::db':
class { 'magnum::db':
database_connection => "mysql+pymysql://magnum:${magnum_cfg_magnum_db_pw}@${magnum_cfg_magnum_mariadb_host}/magnum",
}
@ -12,7 +12,7 @@ class packstack::magnum ()
$magnum_host = hiera('CONFIG_KEYSTONE_HOST_URL')
$magnum_port = '9511'
$magnum_url = "${magnum_protocol}://${magnum_host}:${magnum_port}/v1"
class { '::magnum::keystone::authtoken':
class { 'magnum::keystone::authtoken':
www_authenticate_uri => "${magnum_protocol}://${magnum_host}:5000/v3",
auth_url => "${magnum_protocol}://${magnum_host}:5000",
auth_version => 'v3',
@ -23,7 +23,7 @@ class packstack::magnum ()
project_name => 'services'
}
class { '::magnum::keystone::keystone_auth':
class { 'magnum::keystone::keystone_auth':
username => 'magnum',
password => hiera('CONFIG_MAGNUM_KS_PW'),
auth_url => "${magnum_protocol}://${magnum_host}:5000",
@ -32,22 +32,22 @@ class packstack::magnum ()
project_domain_name => 'Default',
}
class { '::magnum::api':
class { 'magnum::api':
enabled => true,
host => '0.0.0.0'
}
class { '::magnum::conductor':
class { 'magnum::conductor':
}
class { '::magnum::client':
class { 'magnum::client':
}
class { '::magnum::clients':
class { 'magnum::clients':
region_name => hiera('CONFIG_KEYSTONE_REGION')
}
class { '::magnum::certificates':
class { 'magnum::certificates':
cert_manager_type => 'local'
}
}

View File

@ -19,7 +19,7 @@ class packstack::magnum::rabbitmq ()
File[$files_to_set_owner] ~> Service<| tag == 'magnum-service' |>
}
class { '::magnum':
class { 'magnum':
rabbit_use_ssl => hiera('CONFIG_AMQP_SSL_ENABLED'),
default_transport_url => "rabbit://${rabbit_userid}:${rabbit_password}@${rabbit_host}:${rabbit_port}/",
kombu_ssl_ca_certs => $kombu_ssl_ca_certs,

View File

@ -12,22 +12,22 @@ class packstack::manila ()
# TO-DO(mmagr): Add IPv6 support when hostnames are used
}
class { '::manila::keystone::authtoken':
class { 'manila::keystone::authtoken':
password => hiera('CONFIG_MANILA_KS_PW'),
www_authenticate_uri => hiera('CONFIG_KEYSTONE_PUBLIC_URL'),
}
class { '::manila::api':
class { 'manila::api':
bind_host => $bind_host,
}
class { '::manila::scheduler':
class { 'manila::scheduler':
}
class { '::manila::share':
class { 'manila::share':
}
class { '::manila::backends':
class { 'manila::backends':
enabled_share_backends => hiera('CONFIG_MANILA_BACKEND'),
}
}

View File

@ -30,13 +30,13 @@ class packstack::manila::backend::generic ()
service_instance_flavor_id => 66,
}
class { '::manila::compute::nova':
class { 'manila::compute::nova':
auth_type => 'password',
auth_url => hiera('CONFIG_KEYSTONE_PUBLIC_URL_VERSIONLESS'),
password => hiera('CONFIG_NOVA_KS_PW'),
}
class { '::manila::volume::cinder':
class { 'manila::volume::cinder':
auth_type => 'password',
auth_url => hiera('CONFIG_KEYSTONE_PUBLIC_URL_VERSIONLESS'),
password => hiera('CONFIG_CINDER_KS_PW'),

View File

@ -3,7 +3,7 @@ define packstack::manila::network ($backend_name = $name) {
$manila_network_type = hiera('CONFIG_MANILA_NETWORK_TYPE')
if ($manila_network_type == 'neutron'){
class { '::manila::network::neutron':
class { 'manila::network::neutron':
auth_type => 'password',
auth_url => hiera('CONFIG_KEYSTONE_PUBLIC_URL_VERSIONLESS'),
password => hiera('CONFIG_NEUTRON_KS_PW'),

View File

@ -23,11 +23,11 @@ class packstack::manila::rabbitmq ()
$db_pw = hiera('CONFIG_MANILA_DB_PW')
$mariadb_host = hiera('CONFIG_MARIADB_HOST_URL')
class { '::manila::logging':
class { 'manila::logging':
debug => hiera('CONFIG_DEBUG_MODE'),
}
class { '::manila':
class { 'manila':
rabbit_use_ssl => hiera('CONFIG_AMQP_SSL_ENABLED'),
default_transport_url => "rabbit://${rabbit_userid}:${rabbit_password}@${rabbit_host}:${rabbit_port}/",
sql_connection => "mysql+pymysql://manila:${db_pw}@${mariadb_host}/manila",

View File

@ -23,7 +23,7 @@ class packstack::mariadb ()
$mysql_root_password = hiera('CONFIG_MARIADB_PW')
class { '::mysql::server':
class { 'mysql::server':
package_name => $mariadb_package_name,
restart => true,
root_password => $mysql_root_password,
@ -64,6 +64,6 @@ class packstack::mariadb ()
}
}
} else {
class { '::remote::db': }
class { 'remote::db': }
}
}

View File

@ -1,6 +1,6 @@
class packstack::mariadb::services ()
{
class { '::keystone::db::mysql':
class { 'keystone::db::mysql':
user => 'keystone_admin',
password => hiera('CONFIG_KEYSTONE_DB_PW'),
allowed_hosts => '%',
@ -8,7 +8,7 @@ class packstack::mariadb::services ()
}
if hiera('CONFIG_CINDER_INSTALL') == 'y' {
class { '::cinder::db::mysql':
class { 'cinder::db::mysql':
password => hiera('CONFIG_CINDER_DB_PW'),
host => '%',
allowed_hosts => '%',
@ -17,7 +17,7 @@ class packstack::mariadb::services ()
}
if hiera('CONFIG_GLANCE_INSTALL') == 'y' {
class { '::glance::db::mysql':
class { 'glance::db::mysql':
password => hiera('CONFIG_GLANCE_DB_PW'),
host => '%',
allowed_hosts => '%',
@ -26,7 +26,7 @@ class packstack::mariadb::services ()
}
if hiera('CONFIG_CEILOMETER_INSTALL') == 'y' {
class { '::gnocchi::db::mysql':
class { 'gnocchi::db::mysql':
password => hiera('CONFIG_GNOCCHI_DB_PW'),
host => '%',
allowed_hosts => '%',
@ -35,7 +35,7 @@ class packstack::mariadb::services ()
if hiera('CONFIG_AODH_INSTALL') == 'y' and
hiera('CONFIG_CEILOMETER_INSTALL') == 'y' {
class { '::aodh::db::mysql':
class { 'aodh::db::mysql':
password => hiera('CONFIG_AODH_DB_PW'),
host => '%',
allowed_hosts => '%',
@ -43,7 +43,7 @@ class packstack::mariadb::services ()
}
if hiera('CONFIG_HEAT_INSTALL') == 'y' {
class { '::heat::db::mysql':
class { 'heat::db::mysql':
password => hiera('CONFIG_HEAT_DB_PW'),
host => '%',
allowed_hosts => '%',
@ -52,7 +52,7 @@ class packstack::mariadb::services ()
}
if hiera('CONFIG_MAGNUM_INSTALL') == 'y' {
class { '::magnum::db::mysql':
class { 'magnum::db::mysql':
password => hiera('CONFIG_MAGNUM_DB_PW'),
host => '%',
allowed_hosts => '%',
@ -61,7 +61,7 @@ class packstack::mariadb::services ()
}
if hiera('CONFIG_IRONIC_INSTALL') == 'y' {
class { '::ironic::db::mysql':
class { 'ironic::db::mysql':
password => hiera('CONFIG_IRONIC_DB_PW'),
host => '%',
allowed_hosts => '%',
@ -70,7 +70,7 @@ class packstack::mariadb::services ()
}
if hiera('CONFIG_MANILA_INSTALL') == 'y' {
class { '::manila::db::mysql':
class { 'manila::db::mysql':
password => hiera('CONFIG_MANILA_DB_PW'),
allowed_hosts => '%',
charset => 'utf8',
@ -78,7 +78,7 @@ class packstack::mariadb::services ()
}
if hiera('CONFIG_NEUTRON_INSTALL') == 'y' {
class { '::neutron::db::mysql':
class { 'neutron::db::mysql':
password => hiera('CONFIG_NEUTRON_DB_PW'),
host => '%',
allowed_hosts => '%',
@ -88,19 +88,19 @@ class packstack::mariadb::services ()
}
if hiera('CONFIG_NOVA_INSTALL') == 'y' {
class { '::nova::db::mysql':
class { 'nova::db::mysql':
password => hiera('CONFIG_NOVA_DB_PW'),
host => '%',
allowed_hosts => '%',
charset => 'utf8',
}
class { '::nova::db::mysql_api':
class { 'nova::db::mysql_api':
password => hiera('CONFIG_NOVA_DB_PW'),
host => '%',
allowed_hosts => '%',
charset => 'utf8',
}
class { '::placement::db::mysql':
class { 'placement::db::mysql':
password => hiera('CONFIG_NOVA_DB_PW'),
host => '%',
allowed_hosts => '%',
@ -110,7 +110,7 @@ class packstack::mariadb::services ()
if hiera('CONFIG_PANKO_INSTALL') == 'y' and
hiera('CONFIG_CEILOMETER_INSTALL') == 'y' {
class { '::panko::db::mysql':
class { 'panko::db::mysql':
password => hiera('CONFIG_PANKO_DB_PW'),
host => '%',
allowed_hosts => '%',
@ -118,7 +118,7 @@ class packstack::mariadb::services ()
}
if hiera('CONFIG_SAHARA_INSTALL') == 'y' {
class { '::sahara::db::mysql':
class { 'sahara::db::mysql':
password => hiera('CONFIG_SAHARA_DB_PW'),
host => '%',
allowed_hosts => '%',
@ -127,7 +127,7 @@ class packstack::mariadb::services ()
}
if hiera('CONFIG_TROVE_INSTALL') == 'y' {
class { '::trove::db::mysql':
class { 'trove::db::mysql':
password => hiera('CONFIG_TROVE_DB_PW'),
host => '%',
allowed_hosts => '%',

View File

@ -6,7 +6,7 @@ class packstack::memcached ()
# TO-DO(mmagr): Add IPv6 support when hostnames are used
}
class { '::memcached':
class { 'memcached':
listen_ip => $memcached_bind_host,
max_memory => '10%',
}

View File

@ -10,7 +10,7 @@ class packstack::neutron::api ()
$neutron_user_password = hiera('CONFIG_NEUTRON_KS_PW')
$neutron_vpnaas_enabled = str2bool(hiera('CONFIG_NEUTRON_VPNAAS'))
class { '::neutron::keystone::authtoken':
class { 'neutron::keystone::authtoken':
username => 'neutron',
password => $neutron_user_password,
www_authenticate_uri => hiera('CONFIG_KEYSTONE_PUBLIC_URL_VERSIONLESS'),
@ -22,7 +22,7 @@ class packstack::neutron::api ()
database_connection => $neutron_sql_connection,
}
class { '::neutron::server':
class { 'neutron::server':
sync_db => true,
enabled => true,
api_workers => hiera('CONFIG_SERVICE_WORKERS'),
@ -37,7 +37,7 @@ class packstack::neutron::api ()
}
if $neutron_vpnaas_enabled {
class { '::neutron::services::vpnaas': }
class { 'neutron::services::vpnaas': }
}
Class['::neutron::server'] -> File['/etc/neutron/api-paste.ini']

View File

@ -3,7 +3,7 @@ class packstack::neutron::dhcp ()
create_resources(packstack::firewall, hiera('FIREWALL_NEUTRON_DHCPIN_RULES', {}))
create_resources(packstack::firewall, hiera('FIREWALL_NEUTRON_DHCPOUT_RULES', {}))
class { '::neutron::agents::dhcp':
class { 'neutron::agents::dhcp':
interface_driver => hiera('CONFIG_NEUTRON_DHCP_INTERFACE_DRIVER'),
debug => hiera('CONFIG_DEBUG_MODE'),
}

View File

@ -5,7 +5,7 @@ class packstack::neutron::l3 ()
default => true
}
class { '::neutron::agents::l3':
class { 'neutron::agents::l3':
interface_driver => hiera('CONFIG_NEUTRON_L3_INTERFACE_DRIVER'),
manage_service => $start_l3_agent,
enabled => $start_l3_agent,

View File

@ -16,14 +16,14 @@ class packstack::neutron::lb_agent ()
}
if ( 'vxlan' in hiera_array('CONFIG_NEUTRON_ML2_TYPE_DRIVERS') ){
class { '::neutron::agents::ml2::linuxbridge':
class { 'neutron::agents::ml2::linuxbridge':
physical_interface_mappings => force_interface($neutron_lb_interface_mappings, $use_subnets),
tunnel_types => ['vxlan'],
local_ip => $bind_host,
}
}
else {
class { '::neutron::agents::ml2::linuxbridge':
class { 'neutron::agents::ml2::linuxbridge':
physical_interface_mappings => force_interface($neutron_lb_interface_mappings, $use_subnets),
}
}

View File

@ -1,6 +1,6 @@
class packstack::neutron::metadata ()
{
class { '::neutron::agents::metadata':
class { 'neutron::agents::metadata':
shared_secret => hiera('CONFIG_NEUTRON_METADATA_PW'),
metadata_host => force_ip(hiera('CONFIG_KEYSTONE_HOST_URL')),
debug => hiera('CONFIG_DEBUG_MODE'),

View File

@ -1,6 +1,6 @@
class packstack::neutron::metering ()
{
class { '::neutron::agents::metering':
class { 'neutron::agents::metering':
interface_driver => hiera('CONFIG_NEUTRON_METERING_IFCE_DRIVER'),
debug => hiera('CONFIG_DEBUG_MODE'),
}

View File

@ -6,7 +6,7 @@ class packstack::neutron::ml2 ()
$vxlan_group_value = hiera('CONFIG_NEUTRON_ML2_VXLAN_GROUP')
}
class { '::neutron::plugins::ml2':
class { 'neutron::plugins::ml2':
type_drivers => hiera_array('CONFIG_NEUTRON_ML2_TYPE_DRIVERS'),
tenant_network_types => hiera_array('CONFIG_NEUTRON_ML2_TENANT_NETWORK_TYPES'),
mechanism_drivers => hiera_array('CONFIG_NEUTRON_ML2_MECHANISM_DRIVERS'),
@ -21,7 +21,7 @@ class packstack::neutron::ml2 ()
}
if hiera('CONFIG_NEUTRON_L2_AGENT') == 'ovn' {
class {'::neutron::plugins::ml2::ovn':
class { 'neutron::plugins::ml2::ovn':
ovn_nb_connection => "tcp:${hiera('CONFIG_CONTROLLER_HOST')}:6641",
ovn_sb_connection => "tcp:${hiera('CONFIG_CONTROLLER_HOST')}:6642",
ovn_metadata_enabled => true,

View File

@ -3,7 +3,7 @@ class packstack::neutron::notifications ()
$neutron_notif_cfg_ctrl_host = hiera('CONFIG_KEYSTONE_HOST_URL')
# Configure nova notifications system
class { '::neutron::server::notifications':
class { 'neutron::server::notifications':
username => 'nova',
password => hiera('CONFIG_NOVA_KS_PW'),
project_name => 'services',

View File

@ -45,7 +45,7 @@ class packstack::neutron::ovn_agent ()
$ovn_southd = "tcp:${hiera('CONFIG_CONTROLLER_HOST')}:6642"
class { '::ovn::controller':
class { 'ovn::controller':
ovn_remote => $ovn_southd,
ovn_bridge_mappings => $bridge_mappings,
bridge_interface_mappings => $bridge_uplinks,

View File

@ -2,7 +2,7 @@ class packstack::neutron::ovn_metadata ()
{
$ovn_southd = "tcp:${hiera('CONFIG_CONTROLLER_HOST')}:6642"
class { '::neutron::agents::ovn_metadata':
class { 'neutron::agents::ovn_metadata':
ovn_sb_connection => $ovn_southd,
shared_secret => hiera('CONFIG_NEUTRON_METADATA_PW'),
metadata_host => force_ip(hiera('CONFIG_KEYSTONE_HOST_URL')),

View File

@ -1,4 +1,4 @@
class packstack::neutron::ovn_northd ()
{
include ::ovn::northd
include ovn::northd
}

View File

@ -43,7 +43,7 @@ class packstack::neutron::ovs_agent ()
$bridge_mappings = []
}
class { '::neutron::agents::ml2::ovs':
class { 'neutron::agents::ml2::ovs':
bridge_uplinks => $bridge_uplinks,
bridge_mappings => $bridge_mappings,
tunnel_types => hiera_array('CONFIG_NEUTRON_OVS_TUNNEL_TYPES'),

View File

@ -25,11 +25,11 @@ class packstack::neutron::rabbitmq ()
File[$files_to_set_owner] ~> Service<| tag == 'neutron-service' |>
}
class { '::neutron::logging':
class { 'neutron::logging':
debug => hiera('CONFIG_DEBUG_MODE'),
}
class { '::neutron':
class { 'neutron':
bind_host => $bind_host,
rabbit_use_ssl => hiera('CONFIG_AMQP_SSL_ENABLED'),
default_transport_url => "rabbit://${rabbit_userid}:${rabbit_password}@${rabbit_host}:${rabbit_port}/",

View File

@ -1,6 +1,6 @@
class packstack::neutron::vpnaas ()
{
class { '::neutron::agents::vpnaas':
class { 'neutron::agents::vpnaas':
vpn_device_driver => 'neutron_vpnaas.services.vpn.device_drivers.libreswan_ipsec.LibreSwanDriver',
}
}

View File

@ -56,11 +56,11 @@ class packstack::nova ()
$key = undef
}
class { '::nova::logging':
class { 'nova::logging':
debug => hiera('CONFIG_DEBUG_MODE'),
}
class { '::nova':
class { 'nova':
default_transport_url => "rabbit://${rabbit_userid}:${rabbit_password}@${rabbit_host}:${rabbit_port}/",
rabbit_use_ssl => hiera('CONFIG_AMQP_SSL_ENABLED'),
nova_public_key => $public_key,

View File

@ -11,7 +11,7 @@ class packstack::nova::api ()
$www_authenticate_uri = hiera('CONFIG_KEYSTONE_PUBLIC_URL_VERSIONLESS')
$admin_password = hiera('CONFIG_NOVA_KS_PW')
class {'::nova::keystone::authtoken':
class { 'nova::keystone::authtoken':
password => $admin_password,
www_authenticate_uri => $www_authenticate_uri,
auth_url => hiera('CONFIG_KEYSTONE_ADMIN_URL'),
@ -23,11 +23,11 @@ class packstack::nova::api ()
$pci_alias = hiera('CONFIG_NOVA_PCI_ALIAS')
}
class { '::nova::pci':
class { 'nova::pci':
aliases => $pci_alias,
}
class { '::nova::api':
class { 'nova::api':
api_bind_address => $bind_host,
enabled => true,
sync_db => false,
@ -38,31 +38,31 @@ class packstack::nova::api ()
service_name => 'httpd',
}
class { '::nova::metadata':
class { 'nova::metadata':
neutron_metadata_proxy_shared_secret => hiera('CONFIG_NEUTRON_METADATA_PW_UNQUOTED', undef),
}
class { '::nova::wsgi::apache_api':
class { 'nova::wsgi::apache_api':
bind_host => $bind_host,
ssl => false,
workers => hiera('CONFIG_SERVICE_WORKERS'),
}
class { '::nova::wsgi::apache_metadata':
class { 'nova::wsgi::apache_metadata':
bind_host => $bind_host,
ssl => false,
workers => hiera('CONFIG_SERVICE_WORKERS'),
}
class { '::nova::db::sync':
class { 'nova::db::sync':
db_sync_timeout => 600,
}
class { '::nova::db::sync_api':
class { 'nova::db::sync_api':
db_sync_timeout => 600,
}
class { '::nova::placement':
class { 'nova::placement':
auth_url => $www_authenticate_uri,
password => $admin_password,
region_name => hiera('CONFIG_KEYSTONE_REGION'),
@ -70,13 +70,13 @@ class packstack::nova::api ()
$db_purge = hiera('CONFIG_NOVA_DB_PURGE_ENABLE')
if $db_purge {
class { '::nova::cron::archive_deleted_rows':
class { 'nova::cron::archive_deleted_rows':
hour => '*/12',
destination => '/dev/null',
}
}
include ::nova::cell_v2::simple_setup
include nova::cell_v2::simple_setup
$manage_flavors = str2bool(hiera('CONFIG_NOVA_MANAGE_FLAVORS'))
if $manage_flavors {

View File

@ -1,6 +1,6 @@
class packstack::nova::ceilometer ()
{
class { '::ceilometer::agent::auth':
class { 'ceilometer::agent::auth':
auth_url => hiera('CONFIG_KEYSTONE_PUBLIC_URL_VERSIONLESS'),
auth_password => hiera('CONFIG_CEILOMETER_KS_PW'),
auth_region => hiera('CONFIG_KEYSTONE_REGION'),
@ -8,7 +8,7 @@ class packstack::nova::ceilometer ()
ensure_packages(['openstack-ceilometer-ipmi'], {'ensure' => 'present'})
class { '::ceilometer::agent::polling': }
class { 'ceilometer::agent::polling': }
Package['openstack-ceilometer-ipmi'] -> Service['ceilometer-polling']
}

View File

@ -19,11 +19,11 @@ class packstack::nova::ceilometer::rabbitmq ()
File[$ceilometer_files_to_set_owner] ~> Service<| tag == 'ceilometer-service' |>
}
class { '::ceilometer::logging':
class { 'ceilometer::logging':
debug => hiera('CONFIG_DEBUG_MODE'),
}
class { '::ceilometer':
class { 'ceilometer':
telemetry_secret => hiera('CONFIG_CEILOMETER_SECRET'),
rabbit_use_ssl => hiera('CONFIG_AMQP_SSL_ENABLED'),
default_transport_url => "rabbit://${rabbit_userid}:${rabbit_password}@${rabbit_host}:${rabbit_port}/",

View File

@ -73,11 +73,11 @@ class packstack::nova::compute ()
$instance_usage_audit_period = 'month'
}
class { '::nova::compute::pci':
class { 'nova::compute::pci':
passthrough => hiera('CONFIG_NOVA_PCI_PASSTHROUGH_WHITELIST')
}
class { '::nova::compute':
class { 'nova::compute':
enabled => true,
vncproxy_host => hiera('CONFIG_KEYSTONE_HOST_URL'),
vncproxy_protocol => hiera('CONFIG_VNCPROXY_PROTOCOL'),
@ -88,7 +88,7 @@ class packstack::nova::compute ()
force_config_drive => false,
}
class { '::nova::placement':
class { 'nova::placement':
auth_url => hiera('CONFIG_KEYSTONE_PUBLIC_URL'),
password => hiera('CONFIG_NOVA_KS_PW'),
region_name => hiera('CONFIG_KEYSTONE_REGION'),

View File

@ -3,7 +3,7 @@ class packstack::nova::compute::ironic ()
$ironic_config_controller_host = hiera('CONFIG_KEYSTONE_HOST_URL')
$ironic_config_keystone_admin = hiera('CONFIG_KEYSTONE_ADMIN_URL')
class { '::nova::ironic::common':
class { 'nova::ironic::common':
username => 'ironic',
password => hiera('CONFIG_IRONIC_KS_PW'),
auth_url => $ironic_config_keystone_admin,
@ -11,5 +11,5 @@ class packstack::nova::compute::ironic ()
api_endpoint => "http://${ironic_config_controller_host}:6385/v1",
}
include ::nova::compute::ironic
include nova::compute::ironic
}

View File

@ -36,14 +36,14 @@ class packstack::nova::compute::libvirt ()
$client_extraparams = {}
}
class { '::nova::migration::libvirt':
class { 'nova::migration::libvirt':
transport => $migrate_transport,
client_user => 'nova_migration',
client_extraparams => $client_extraparams,
require => Class['::nova::compute::libvirt']
}
class { '::nova::compute::libvirt':
class { 'nova::compute::libvirt':
libvirt_virt_type => $libvirt_virt_type,
vncserver_listen => $libvirt_vnc_bind_host,
migration_support => true,

View File

@ -4,7 +4,7 @@ class packstack::nova::compute::vmware ()
$my_ip = choose_my_ip(hiera('HOST_LIST'))
$nova_vcenter_cluster_name = $cluster_list[$my_ip]
class { '::nova::compute::vmware':
class { 'nova::compute::vmware':
host_ip => hiera('CONFIG_VCENTER_HOST'),
host_username => hiera('CONFIG_VCENTER_USER'),
host_password => hiera('CONFIG_VCENTER_PASSWORD'),

View File

@ -1,6 +1,6 @@
class packstack::nova::conductor ()
{
class { '::nova::conductor':
class { 'nova::conductor':
enabled => true,
workers => hiera('CONFIG_SERVICE_WORKERS'),
}

View File

@ -3,7 +3,7 @@ class packstack::nova::neutron ()
$nova_neutron_cfg_ctrl_host = hiera('CONFIG_KEYSTONE_HOST_URL')
$neutron_auth_url = hiera('CONFIG_KEYSTONE_ADMIN_URL')
class { '::nova::network::neutron':
class { 'nova::network::neutron':
default_floating_pool => 'public',
password => hiera('CONFIG_NEUTRON_KS_PW'),
auth_type => 'v3password',

View File

@ -1,8 +1,8 @@
class packstack::nova::sched ()
{
include '::nova::scheduler::filter'
include nova::scheduler::filter
class { '::nova::scheduler':
class { 'nova::scheduler':
enabled => true,
}

View File

@ -1,6 +1,6 @@
class packstack::nova::sched::ironic ()
{
class { '::nova::scheduler':
class { 'nova::scheduler':
enabled => true,
}
}

View File

@ -6,7 +6,7 @@ class packstack::nova::vncproxy ()
# TO-DO(mmagr): Add IPv6 support when hostnames are used
}
class { '::nova::vncproxy':
class { 'nova::vncproxy':
enabled => true,
host => $vnc_bind_host,
}

View File

@ -5,15 +5,15 @@ class packstack::panko ()
$panko_cfg_db_pw = hiera('CONFIG_PANKO_DB_PW')
$panko_cfg_mariadb_host = hiera('CONFIG_MARIADB_HOST_URL')
class { '::panko::wsgi::apache':
class { 'panko::wsgi::apache':
workers => hiera('CONFIG_SERVICE_WORKERS'),
threads => hiera('CONFIG_SERVICE_WORKERS'),
ssl => false
}
include ::panko
include panko
class { '::panko::db':
class { 'panko::db':
database_connection => "mysql+pymysql://panko:${panko_cfg_db_pw}@${panko_cfg_mariadb_host}/panko?charset=utf8",
}
@ -22,18 +22,18 @@ class packstack::panko ()
default => '0.0.0.0',
}
class { '::panko::keystone::authtoken':
class { 'panko::keystone::authtoken':
www_authenticate_uri => hiera('CONFIG_KEYSTONE_PUBLIC_URL'),
auth_url => hiera('CONFIG_KEYSTONE_ADMIN_URL'),
auth_version => hiera('CONFIG_KEYSTONE_API_VERSION'),
password => hiera('CONFIG_PANKO_KS_PW')
}
class { '::panko::api':
class { 'panko::api':
host => $bind_host,
service_name => 'httpd'
}
include ::panko::db::sync
include panko::db::sync
}

View File

@ -8,20 +8,20 @@ class packstack::placement ()
# TO-DO(mmagr): Add IPv6 support when hostnames are used
}
include ::packstack::keystone::placement
include ::placement
include packstack::keystone::placement
include placement
class { '::placement::logging':
class { 'placement::logging':
debug => hiera('CONFIG_DEBUG_MODE'),
}
class { '::placement::db':
class { 'placement::db':
database_connection => "mysql+pymysql://placement:${placement_db_pw}@${placement_mariadb_host}/placement",
}
include ::placement::db::sync
include placement::db::sync
class { '::placement::wsgi::apache':
class { 'placement::wsgi::apache':
bind_host => $bind_host,
api_port => '8778',
ssl => false,

View File

@ -14,7 +14,7 @@ class packstack::provision::bridge ()
$floating_range_br = hiera('CONFIG_PROVISION_TEMPEST_FLOATRANGE')
}
class { '::neutron::keystone::authtoken':
class { 'neutron::keystone::authtoken':
username => 'neutron',
password => $neutron_user_password,
www_authenticate_uri => hiera('CONFIG_KEYSTONE_PUBLIC_URL_VERSIONLESS'),

View File

@ -103,7 +103,7 @@ class packstack::provision::tempest ()
$neutron_api_extensions = undef
}
class { '::tempest':
class { 'tempest':
admin_domain_name => $admin_domain_name,
admin_password => $admin_password,
admin_tenant_name => $admin_tenant_name,

View File

@ -5,7 +5,7 @@ class packstack::redis ()
$redis_port = Integer(hiera('CONFIG_REDIS_PORT'))
$redis_host = hiera('CONFIG_REDIS_HOST')
class { '::redis':
class { 'redis':
bind => $redis_host,
port => $redis_port,
appendonly => true,

View File

@ -2,9 +2,9 @@ class packstack::sahara ()
{
create_resources(packstack::firewall, hiera('FIREWALL_SAHARA_CFN_RULES', {}))
class { '::sahara::service::api':
class { 'sahara::service::api':
api_workers => hiera('CONFIG_SERVICE_WORKERS')
}
class { '::sahara::service::engine': }
class { 'sahara::service::engine': }
}

View File

@ -1,6 +1,6 @@
class packstack::sahara::ceilometer ()
{
class { '::sahara::notify':
class { 'sahara::notify':
notification_driver => 'messagingv2',
}
}

View File

@ -22,7 +22,7 @@ class packstack::sahara::rabbitmq ()
File[$files_to_set_owner] ~> Service<| tag == 'sahara-service' |>
}
class { '::sahara::keystone::authtoken':
class { 'sahara::keystone::authtoken':
username => 'sahara',
password => hiera('CONFIG_SAHARA_KS_PW'),
project_name => 'services',
@ -30,11 +30,11 @@ class packstack::sahara::rabbitmq ()
auth_url => hiera('CONFIG_KEYSTONE_ADMIN_URL'),
}
class { '::sahara::logging':
class { 'sahara::logging':
debug => hiera('CONFIG_DEBUG_MODE'),
}
class { '::sahara':
class { 'sahara':
database_connection =>
"mysql+pymysql://sahara:${sahara_cfg_sahara_db_pw}@${sahara_cfg_sahara_mariadb_host}/sahara",
host => hiera('CONFIG_SAHARA_HOST'),

View File

@ -2,7 +2,7 @@ class packstack::swift ()
{
# Class['swift'] -> Service <| |>
class { '::swift':
class { 'swift':
# not sure how I want to deal with this shared secret
swift_hash_path_suffix => hiera('CONFIG_SWIFT_HASH'),
package_ensure => latest,

View File

@ -5,7 +5,7 @@ class packstack::swift::ceilometer ()
$rabbit_userid = hiera('CONFIG_AMQP_AUTH_USER')
$rabbit_password = hiera('CONFIG_AMQP_AUTH_PASSWORD')
class { '::swift::proxy::ceilometer':
class { 'swift::proxy::ceilometer':
default_transport_url => "rabbit://${rabbit_userid}:${rabbit_password}@${rabbit_host}:${rabbit_port}/",
topic => 'notifications',
control_exchange => 'swift',

View File

@ -9,7 +9,7 @@ class packstack::swift::proxy ()
# TO-DO(mmagr): Add IPv6 support when hostnames are used
}
include '::packstack::memcached'
include packstack::memcached
if hiera('CONFIG_CEILOMETER_INSTALL') == 'y' and
hiera('CONFIG_ENABLE_CEILOMETER_MIDDLEWARE') == 'y' {
@ -51,7 +51,7 @@ class packstack::swift::proxy ()
]
}
class { '::swift::proxy':
class { 'swift::proxy':
# swift seems to require ipv6 address without brackets
proxy_local_net_ip => hiera('CONFIG_STORAGE_HOST'),
pipeline => $swift_pipeline,
@ -73,14 +73,14 @@ class packstack::swift::proxy ()
'::swift::proxy::container_quotas',
]: }
class { '::swift::proxy::bulk':
class { 'swift::proxy::bulk':
max_containers_per_extraction => 10000,
max_failed_extractions => 1000,
max_deletes_per_request => 10000,
yield_frequency => 60,
}
class { '::swift::proxy::ratelimit':
class { 'swift::proxy::ratelimit':
clock_accuracy => 1000,
max_sleep_time_seconds => 60,
log_sleep_time_seconds => 0,
@ -88,11 +88,11 @@ class packstack::swift::proxy ()
account_ratelimit => 0,
}
class { '::swift::proxy::keystone':
class { 'swift::proxy::keystone':
operator_roles => ['admin', 'SwiftOperator', '_member_'],
}
class { '::swift::proxy::authtoken':
class { 'swift::proxy::authtoken':
username => 'swift',
project_name => 'services',
password => hiera('CONFIG_SWIFT_KS_PW'),
@ -101,5 +101,5 @@ class packstack::swift::proxy ()
auth_url => hiera('CONFIG_KEYSTONE_ADMIN_URL'),
}
class { '::swift::objectexpirer': }
class { 'swift::objectexpirer': }
}

View File

@ -1,6 +1,6 @@
class packstack::swift::ringbuilder ()
{
class { '::swift::ringbuilder':
class { 'swift::ringbuilder':
part_power => '18',
replicas => hiera('CONFIG_SWIFT_STORAGE_REPLICAS'),
min_part_hours => 1,
@ -8,7 +8,7 @@ class packstack::swift::ringbuilder ()
}
# sets up an rsync db that can be used to sync the ring DB
class { '::swift::ringserver':
class { 'swift::ringserver':
local_net_ip => hiera('CONFIG_STORAGE_HOST_URL'),
}

View File

@ -3,7 +3,7 @@ class packstack::swift::storage ()
create_resources(packstack::firewall, hiera('FIREWALL_SWIFT_STORAGE_RULES', {}))
# install all swift storage servers together
class { '::swift::storage::all':
class { 'swift::storage::all':
# looks like ipv6 address without brackets is required here
storage_local_net_ip => hiera('CONFIG_STORAGE_HOST'),
allow_versions => true,

View File

@ -8,16 +8,16 @@ class packstack::trove ()
# TO-DO(mmagr): Add IPv6 support when hostnames are used
}
class { '::trove::keystone::authtoken':
class { 'trove::keystone::authtoken':
password => hiera('CONFIG_TROVE_KS_PW'),
auth_url => hiera('CONFIG_KEYSTONE_PUBLIC_URL_VERSIONLESS'),
}
class { '::trove::logging':
class { 'trove::logging':
debug => hiera('CONFIG_DEBUG_MODE'),
}
class { '::trove::api':
class { 'trove::api':
bind_host => $bind_host,
enabled => true,
cert_file => false,
@ -26,13 +26,13 @@ class packstack::trove ()
workers => hiera('CONFIG_SERVICE_WORKERS'),
}
class { '::trove::conductor':
class { 'trove::conductor':
auth_url => hiera('CONFIG_KEYSTONE_PUBLIC_URL_VERSIONLESS'),
debug => hiera('CONFIG_DEBUG_MODE'),
workers => hiera('CONFIG_SERVICE_WORKERS'),
}
class { '::trove::taskmanager':
class { 'trove::taskmanager':
auth_url => hiera('CONFIG_KEYSTONE_PUBLIC_URL_VERSIONLESS'),
debug => hiera('CONFIG_DEBUG_MODE'),
}

View File

@ -24,7 +24,7 @@ class packstack::trove::rabbitmq ()
}
class { '::trove':
class { 'trove':
rabbit_use_ssl => hiera('CONFIG_AMQP_SSL_ENABLED'),
default_transport_url => "rabbit://${rabbit_userid}:${rabbit_password}@${rabbit_host}:${rabbit_port}/",
database_connection => "mysql+pymysql://trove:${trove_rabmq_cfg_trove_db_pw}@${trove_rabmq_cfg_mariadb_host}/trove",

View File

@ -3,57 +3,57 @@ stage { "init": before => Stage["main"] }
Exec { timeout => hiera('DEFAULT_EXEC_TIMEOUT') }
Package { allow_virtual => true }
class {'::packstack::prereqs':
class { 'packstack::prereqs':
stage => init,
}
include ::firewall
include firewall
create_resources(sshkey, hiera('SSH_KEYS', {}))
if hiera('CONFIG_NTP_SERVERS', '') != '' {
include '::packstack::chrony'
include 'packstack::chrony'
}
if hiera('CONFIG_CEILOMETER_INSTALL') == 'y' {
include '::packstack::nova::ceilometer::rabbitmq'
include '::packstack::nova::ceilometer'
include 'packstack::nova::ceilometer::rabbitmq'
include 'packstack::nova::ceilometer'
}
include '::packstack::nova'
include '::packstack::nova::common'
include '::packstack::nova::compute'
include 'packstack::nova'
include 'packstack::nova::common'
include 'packstack::nova::compute'
if hiera('CONFIG_VMWARE_BACKEND') == 'y' {
include '::packstack::nova::compute::vmware'
include 'packstack::nova::compute::vmware'
} elsif hiera('CONFIG_IRONIC_INSTALL') == 'y' {
include '::packstack::nova::compute::ironic'
include 'packstack::nova::compute::ironic'
} else {
include '::packstack::nova::compute::libvirt'
include 'packstack::nova::compute::libvirt'
}
if hiera('CONFIG_CINDER_INSTALL') == 'y' and
hiera('CONFIG_VMWARE_BACKEND') != 'y' {
if 'nfs' in hiera_array('CONFIG_CINDER_BACKEND') {
include '::packstack::nova::nfs'
include 'packstack::nova::nfs'
}
}
if hiera('CONFIG_NEUTRON_INSTALL') == 'y' {
include '::packstack::nova::neutron'
include '::packstack::neutron::rabbitmq'
include 'packstack::nova::neutron'
include 'packstack::neutron::rabbitmq'
case hiera('CONFIG_NEUTRON_L2_AGENT') {
'openvswitch': { include '::packstack::neutron::ovs_agent' }
'linuxbridge': { include '::packstack::neutron::lb_agent' }
'ovn': { include '::packstack::neutron::ovn_agent'
include '::packstack::neutron::ovn_metadata'
'openvswitch': { include 'packstack::neutron::ovs_agent' }
'linuxbridge': { include 'packstack::neutron::lb_agent' }
'ovn': { include 'packstack::neutron::ovn_agent'
include 'packstack::neutron::ovn_metadata'
}
default: { include '::packstack::neutron::ovs_agent' }
default: { include 'packstack::neutron::ovs_agent' }
}
include '::packstack::neutron::bridge'
include 'packstack::neutron::bridge'
if 'sriovnicswitch' in hiera_array('CONFIG_NEUTRON_ML2_MECHANISM_DRIVERS') and
hiera ('CONFIG_NEUTRON_L2_AGENT') == 'openvswitch' {
include '::packstack::neutron::sriov'
include 'packstack::neutron::sriov'
}
}

View File

@ -3,18 +3,18 @@ stage { "init": before => Stage["main"] }
Exec { timeout => hiera('DEFAULT_EXEC_TIMEOUT') }
Package { allow_virtual => true }
class {'::packstack::prereqs':
class { 'packstack::prereqs':
stage => init,
}
include ::firewall
include firewall
if hiera('CONFIG_NTP_SERVERS', '') != '' {
include '::packstack::chrony'
include 'packstack::chrony'
}
include '::packstack::amqp'
include '::packstack::mariadb'
include 'packstack::amqp'
include 'packstack::mariadb'
if hiera('CONFIG_MARIADB_INSTALL') == 'y' {
include 'packstack::mariadb::services'
@ -22,183 +22,183 @@ if hiera('CONFIG_MARIADB_INSTALL') == 'y' {
include 'packstack::mariadb::services_remote'
}
include '::packstack::apache'
include '::packstack::keystone'
include 'packstack::apache'
include 'packstack::keystone'
if hiera('CONFIG_GLANCE_INSTALL') == 'y' {
include '::packstack::keystone::glance'
include '::packstack::glance'
include 'packstack::keystone::glance'
include 'packstack::glance'
if hiera('CONFIG_CEILOMETER_INSTALL') == 'y' {
include '::packstack::glance::ceilometer'
include 'packstack::glance::ceilometer'
}
if hiera('CONFIG_GLANCE_BACKEND') == 'swift' {
include '::packstack::glance::backend::swift'
include 'packstack::glance::backend::swift'
} else {
include '::packstack::glance::backend::file'
include 'packstack::glance::backend::file'
}
}
if hiera('CONFIG_CINDER_INSTALL') == 'y' {
include '::packstack::keystone::cinder'
include '::packstack::cinder::rabbitmq'
include '::packstack::cinder'
include 'packstack::keystone::cinder'
include 'packstack::cinder::rabbitmq'
include 'packstack::cinder'
if hiera('CONFIG_SWIFT_INSTALL') == 'y' {
include '::packstack::cinder::backup'
include 'packstack::cinder::backup'
}
$cinder_backends = hiera_array('CONFIG_CINDER_BACKEND')
case $cinder_backends[0] {
'lvm': { include '::packstack::cinder::backend::lvm' }
'nfs': { include '::packstack::cinder::backend::nfs' }
'vmdk': { include '::packstack::cinder::backend::vmdk' }
'netapp': { include '::packstack::cinder::backend::netapp' }
'solidfire': { include '::packstack::cinder::backend::solidfire' }
default: { include '::packstack::cinder::backend::lvm' }
'lvm': { include 'packstack::cinder::backend::lvm' }
'nfs': { include 'packstack::cinder::backend::nfs' }
'vmdk': { include 'packstack::cinder::backend::vmdk' }
'netapp': { include 'packstack::cinder::backend::netapp' }
'solidfire': { include 'packstack::cinder::backend::solidfire' }
default: { include 'packstack::cinder::backend::lvm' }
}
}
if hiera('CONFIG_IRONIC_INSTALL') == 'y' {
include '::packstack::keystone::ironic'
include '::packstack::ironic'
include '::packstack::ironic::rabbitmq'
include 'packstack::keystone::ironic'
include 'packstack::ironic'
include 'packstack::ironic::rabbitmq'
}
if hiera('CONFIG_NOVA_INSTALL') == 'y' {
include '::packstack::keystone::nova'
include '::packstack::nova'
include '::packstack::nova::common'
include '::packstack::nova::api'
include '::packstack::nova::conductor'
include 'packstack::keystone::nova'
include 'packstack::nova'
include 'packstack::nova::common'
include 'packstack::nova::api'
include 'packstack::nova::conductor'
if hiera('CONFIG_IRONIC_INSTALL') == 'y' {
include '::packstack::nova::sched::ironic'
include 'packstack::nova::sched::ironic'
} else {
include '::packstack::nova::sched'
include 'packstack::nova::sched'
}
include '::packstack::nova::vncproxy'
include 'packstack::nova::vncproxy'
if hiera('CONFIG_NEUTRON_INSTALL') == 'y' {
include '::packstack::nova::neutron'
include 'packstack::nova::neutron'
}
include '::packstack::placement'
include 'packstack::placement'
}
if hiera('CONFIG_NEUTRON_INSTALL') == 'y' {
include '::packstack::keystone::neutron'
include '::packstack::neutron::rabbitmq'
include '::packstack::neutron::api'
include 'packstack::keystone::neutron'
include 'packstack::neutron::rabbitmq'
include 'packstack::neutron::api'
if hiera('CONFIG_NOVA_INSTALL') == 'y' {
include '::packstack::neutron::notifications'
include 'packstack::neutron::notifications'
}
include '::packstack::neutron::ml2'
include 'packstack::neutron::ml2'
if hiera('CONFIG_NEUTRON_L2_AGENT') == 'ovn' {
include '::packstack::neutron::ovn_northd'
include 'packstack::neutron::ovn_northd'
}
}
if hiera('CONFIG_MANILA_INSTALL') == 'y' {
include '::packstack::keystone::manila'
include '::packstack::manila'
include '::packstack::manila::rabbitmq'
include 'packstack::keystone::manila'
include 'packstack::manila'
include 'packstack::manila::rabbitmq'
if 'generic' in hiera_array('CONFIG_MANILA_BACKEND') {
include '::packstack::manila::backend::generic'
include 'packstack::manila::backend::generic'
}
if 'netapp' in hiera_array('CONFIG_MANILA_BACKEND') {
include '::packstack::manila::backend::netapp'
include 'packstack::manila::backend::netapp'
}
if 'glusternative' in hiera_array('CONFIG_MANILA_BACKEND') {
include '::packstack::manila::backend::glusternative'
include 'packstack::manila::backend::glusternative'
}
if 'glusternfs' in hiera_array('CONFIG_MANILA_BACKEND') {
include '::packstack::manila::backend::glusternfs'
include 'packstack::manila::backend::glusternfs'
}
}
include '::packstack::openstackclient'
include 'packstack::openstackclient'
if hiera('CONFIG_HORIZON_INSTALL') == 'y' {
include '::packstack::horizon'
include 'packstack::horizon'
}
if hiera('CONFIG_SWIFT_INSTALL') == 'y' {
include '::packstack::keystone::swift'
include '::packstack::swift'
include '::packstack::swift::ringbuilder'
include '::packstack::swift::proxy'
include '::packstack::swift::storage'
include 'packstack::keystone::swift'
include 'packstack::swift'
include 'packstack::swift::ringbuilder'
include 'packstack::swift::proxy'
include 'packstack::swift::storage'
if hiera('CONFIG_CEILOMETER_INSTALL') == 'y' and
hiera('CONFIG_ENABLE_CEILOMETER_MIDDLEWARE') == 'y' {
include '::packstack::swift::ceilometer'
include 'packstack::swift::ceilometer'
}
}
if hiera('CONFIG_HEAT_INSTALL') == 'y' {
include '::packstack::keystone::heat'
include '::packstack::heat::rabbitmq'
include '::packstack::heat'
include 'packstack::keystone::heat'
include 'packstack::heat::rabbitmq'
include 'packstack::heat'
if hiera('CONFIG_HEAT_CFN_INSTALL') == 'y' {
include '::packstack::heat::cfn'
include 'packstack::heat::cfn'
}
}
if hiera('CONFIG_MAGNUM_INSTALL') == 'y' {
include '::packstack::keystone::magnum'
include '::packstack::magnum'
include '::packstack::magnum::rabbitmq'
include 'packstack::keystone::magnum'
include 'packstack::magnum'
include 'packstack::magnum::rabbitmq'
}
if hiera('CONFIG_PROVISION_DEMO') == 'y' or hiera('CONFIG_PROVISION_TEMPEST') == 'y' {
include '::packstack::provision'
include 'packstack::provision'
if hiera('CONFIG_GLANCE_INSTALL') == 'y' {
include '::packstack::provision::glance'
include 'packstack::provision::glance'
}
}
if hiera('CONFIG_PROVISION_TEMPEST') == 'y' {
include '::packstack::provision::tempest'
include 'packstack::provision::tempest'
}
if hiera('CONFIG_PROVISION_TEMPEST') == 'y' {
include '::packstack::provision::tempest'
include 'packstack::provision::tempest'
}
if hiera('CONFIG_CEILOMETER_INSTALL') == 'y' and hiera('CONFIG_PANKO_INSTALL') == 'y' {
include '::packstack::keystone::panko'
include '::packstack::panko'
include 'packstack::keystone::panko'
include 'packstack::panko'
}
if hiera('CONFIG_CEILOMETER_INSTALL') == 'y' {
# setup gnocchi
include '::packstack::keystone::gnocchi'
include '::packstack::gnocchi'
include 'packstack::keystone::gnocchi'
include 'packstack::gnocchi'
# setup ceilometer
include '::packstack::keystone::ceilometer'
include '::packstack::ceilometer::rabbitmq'
include '::packstack::ceilometer'
include 'packstack::keystone::ceilometer'
include 'packstack::ceilometer::rabbitmq'
include 'packstack::ceilometer'
if hiera('CONFIG_NOVA_INSTALL') == 'n' {
include '::packstack::ceilometer::nova_disabled'
include 'packstack::ceilometer::nova_disabled'
}
include '::packstack::redis'
include 'packstack::redis'
}
if hiera('CONFIG_CEILOMETER_INSTALL') == 'y' and hiera('CONFIG_AODH_INSTALL') == 'y' {
include '::packstack::keystone::aodh'
include '::packstack::aodh::rabbitmq'
include '::packstack::aodh'
include 'packstack::keystone::aodh'
include 'packstack::aodh::rabbitmq'
include 'packstack::aodh'
}
if hiera('CONFIG_TROVE_INSTALL') == 'y' {
include '::packstack::keystone::trove'
include '::packstack::trove::rabbitmq'
include '::packstack::trove'
include 'packstack::keystone::trove'
include 'packstack::trove::rabbitmq'
include 'packstack::trove'
}
if hiera('CONFIG_SAHARA_INSTALL') == 'y' {
include '::packstack::keystone::sahara'
include '::packstack::sahara::rabbitmq'
include '::packstack::sahara'
include 'packstack::keystone::sahara'
include 'packstack::sahara::rabbitmq'
include 'packstack::sahara'
if hiera('CONFIG_CEILOMETER_INSTALL') == 'y' {
include '::packstack::sahara::ceilometer'
include 'packstack::sahara::ceilometer'
}
}

View File

@ -3,11 +3,11 @@ stage { "init": before => Stage["main"] }
Exec { timeout => hiera('DEFAULT_EXEC_TIMEOUT') }
Package { allow_virtual => true }
class {'::packstack::prereqs':
class { 'packstack::prereqs':
stage => init,
}
include ::nova::cell_v2::discover_hosts
include nova::cell_v2::discover_hosts
notify {'Discovering compute nodes': } ~> Class['nova::cell_v2::discover_hosts']

View File

@ -3,44 +3,44 @@ stage { "init": before => Stage["main"] }
Exec { timeout => hiera('DEFAULT_EXEC_TIMEOUT') }
Package { allow_virtual => true }
class {'::packstack::prereqs':
class { 'packstack::prereqs':
stage => init,
}
include ::firewall
include firewall
if hiera('CONFIG_NTP_SERVERS', '') != '' {
include '::packstack::chrony'
include 'packstack::chrony'
}
if hiera('CONFIG_NEUTRON_INSTALL') == 'y' {
include '::packstack::neutron::rabbitmq'
include 'packstack::neutron::rabbitmq'
if hiera('CONFIG_NEUTRON_VPNAAS') == 'y' {
include '::packstack::neutron::vpnaas'
include 'packstack::neutron::vpnaas'
}
if hiera('CONFIG_NEUTRON_L2_AGENT') != 'ovn' {
include '::packstack::neutron::l3'
include 'packstack::neutron::l3'
}
if hiera('CONFIG_NEUTRON_OVS_BRIDGE_CREATE') == 'y' {
include '::packstack::neutron::ovs_bridge'
include 'packstack::neutron::ovs_bridge'
}
case hiera('CONFIG_NEUTRON_L2_AGENT') {
'openvswitch': { include '::packstack::neutron::ovs_agent' }
'linuxbridge': { include '::packstack::neutron::lb_agent' }
'ovn': { include '::packstack::neutron::ovn_agent' }
default: { include '::packstack::neutron::ovs_agent' }
'openvswitch': { include 'packstack::neutron::ovs_agent' }
'linuxbridge': { include 'packstack::neutron::lb_agent' }
'ovn': { include 'packstack::neutron::ovn_agent' }
default: { include 'packstack::neutron::ovs_agent' }
}
include '::packstack::neutron::bridge'
include 'packstack::neutron::bridge'
if hiera('CONFIG_NEUTRON_L2_AGENT') != 'ovn' {
include '::packstack::neutron::dhcp'
include '::packstack::neutron::metadata'
include 'packstack::neutron::dhcp'
include 'packstack::neutron::metadata'
}
if hiera('CONFIG_NEUTRON_METERING_AGENT_INSTALL') == 'y' {
include '::packstack::neutron::metering'
include 'packstack::neutron::metering'
}
if hiera('CONFIG_PROVISION_DEMO') == 'y' or hiera('CONFIG_PROVISION_TEMPEST') == 'y' {
include '::packstack::provision::bridge'
include 'packstack::provision::bridge'
}
}