Andrew Bogott has submitted this change and it was merged.

Change subject: openstack - aliging and quoting
......................................................................


openstack - aliging and quoting

number of unquoted arrow warnings:

228 to 7

and other quoting fixes, but not too many

Change-Id: I7e798fd733a7d8f9e25483127a5058048035cb96
---
M manifests/openstack.pp
1 file changed, 230 insertions(+), 229 deletions(-)

Approvals:
  Andrew Bogott: Looks good to me, approved
  jenkins-bot: Verified



diff --git a/manifests/openstack.pp b/manifests/openstack.pp
index 78676be..b578811 100644
--- a/manifests/openstack.pp
+++ b/manifests/openstack.pp
@@ -72,9 +72,10 @@
 }
 
 class openstack::repo($openstack_version="folsom") {
+
     if ($::lsbdistcodename == 'precise') {
         apt::repository { 'ubuntucloud':
-            uri    => 'http://ubuntu-cloud.archive.canonical.com/ubuntu',
+            uri        => 'http://ubuntu-cloud.archive.canonical.com/ubuntu',
             dist       => "precise-updates/${openstack_version}",
             components => 'main',
             keyfile    => 'puppet:///files/misc/ubuntu-cloud.key';
@@ -96,12 +97,12 @@
     }
 
     package { [ "nova-common", "python-keystone" ]:
-        ensure => present,
+        ensure  => present,
         require => Class["openstack::repo"];
     }
 
     package { [ "unzip", "vblade-persist", "python-mysqldb", "bridge-utils", 
"ebtables", "mysql-common" ]:
-        ensure => present,
+        ensure  => present,
         require => Class["openstack::repo"];
     }
 
@@ -109,25 +110,25 @@
 
     # For IPv6 support
     package { [ "python-netaddr", "radvd" ]:
-        ensure => present,
+        ensure  => present,
         require => Class["openstack::repo"];
     }
 
     file {
         "/etc/nova/nova.conf":
             content => 
template("openstack/${$openstack_version}/nova/nova.conf.erb"),
-            owner => nova,
-            group => nogroup,
-            mode => '0440',
+            owner   => 'nova',
+            group   => 'nogroup',
+            mode    => '0440',
             require => Package['nova-common'];
     }
 
     file {
         "/etc/nova/api-paste.ini":
             content => 
template("openstack/${$openstack_version}/nova/api-paste.ini.erb"),
-            owner => nova,
-            group => nogroup,
-            mode => '0440',
+            owner   => 'nova',
+            group   => 'nogroup',
+            mode    => '0440',
             require => Package['nova-common'];
     }
 
@@ -144,7 +145,7 @@
     }
 
     package { [ "rabbitmq-server" ]:
-        ensure => present,
+        ensure  => present,
         require => Class["openstack::repo"];
     }
 }
@@ -157,8 +158,8 @@
     }
 
     service { "manage-volumes":
-        enable => true,
-        ensure => running,
+        enable  => true,
+        ensure  => running,
         require => Generic::Upstart_job["manage-volumes"];
     }
 }
@@ -169,7 +170,7 @@
     }
 
     service { "manage-nfs-volumes":
-        enable => true,
+        enable  => true,
         require => Generic::Upstart_job["manage-nfs-volumes"];
     }
 
@@ -181,18 +182,18 @@
 
     file { '/etc/exports.d':
         ensure => directory,
-        owner => 'root',
-        group => 'nfsmanager',
-        mode => '2775',
+        owner  => 'root',
+        group  => 'nfsmanager',
+        mode   => '2775',
     }
 
     if ($::site == 'eqiad') {
         cron { "Update labs ssh keys":
-                ensure => present,
-                user => root,
+                ensure  => present,
+                user    => 'root',
                 command => '/usr/local/sbin/manage-keys-nfs 
--logfile=/var/log/manage-keys.log >/dev/null 2>&1',
-                hour => '*',
-                minute => '*/5',
+                hour    => '*',
+                minute  => '*/5',
         }
     }
 }
@@ -213,23 +214,23 @@
     ssh_authorized_key {
         "glustermanager":
             ensure  => present,
-            user    => "glustermanager",
-            type    => "ssh-rsa",
-            key => 
"AAAAB3NzaC1yc2EAAAABIwAAAQEAuE328+IMmMOoqFhti58rBBxkJy2u+sgxcKuJ4B5248f73YqfZ3RkEWvBGb3ce3VCptrrXJAMCw55HsMyhT8A7chBGLdjhPjol+3Vh2+mc6EkjW0xscX39gh1Fn1jVqrx+GMIuwid7zxGytaKyQ0vko4FP64wDbm1rfVc1jsLMQ+gdAG/KNGYtwjLMEQk8spydckAtkWg3YumMl7e4NQYpYlkTXgVIQiZGpslu5LxKBmXPPF4t2h17p+rNr9ZAVII4av8vRiyQa2/MaH4QZoGYGbkQXifbhBD438NlgZrvLANYuT78zPj4n1G061s7n9nmvVMH3W7QyXS8MpftLnegw==",
-            require => Generic::Systemuser["glustermanager"];
+            user    => 'glustermanager',
+            type    => 'ssh-rsa',
+            key     => 
'AAAAB3NzaC1yc2EAAAABIwAAAQEAuE328+IMmMOoqFhti58rBBxkJy2u+sgxcKuJ4B5248f73YqfZ3RkEWvBGb3ce3VCptrrXJAMCw55HsMyhT8A7chBGLdjhPjol+3Vh2+mc6EkjW0xscX39gh1Fn1jVqrx+GMIuwid7zxGytaKyQ0vko4FP64wDbm1rfVc1jsLMQ+gdAG/KNGYtwjLMEQk8spydckAtkWg3YumMl7e4NQYpYlkTXgVIQiZGpslu5LxKBmXPPF4t2h17p+rNr9ZAVII4av8vRiyQa2/MaH4QZoGYGbkQXifbhBD438NlgZrvLANYuT78zPj4n1G061s7n9nmvVMH3W7QyXS8MpftLnegw==',
+            require => Generic::Systemuser['glustermanager'];
     }
     file {
         "/var/lib/glustermanager/.ssh/id_rsa":
-            owner => glustermanager,
-            group => glustermanager,
-            mode => '0600',
-            source => "puppet:///private/gluster/glustermanager",
+            owner   => 'glustermanager',
+            group   => 'glustermanager',
+            mode    => '0600',
+            source  => "puppet:///private/gluster/glustermanager",
             require => Ssh_authorized_key["glustermanager"];
         "/var/run/glustermanager":
-            ensure => directory,
-            owner => glustermanager,
-            group => glustermanager,
-            mode => '0700',
+            ensure  => directory,
+            owner   => 'glustermanager',
+            group   => 'glustermanager',
+            mode    => '0700',
             require => Generic::Systemuser["glustermanager"];
     }
 }
@@ -253,121 +254,121 @@
 
     if !defined(Service['mysql']) {
         service { "mysql":
-            enable => true,
+            enable  => true,
             require => Class['mysql::server::package'],
-            ensure => running;
+            ensure  => running;
         }
     }
 
     # TODO: This expects the services to be installed in the same location
     exec {
         'set_root':
-            onlyif => "/usr/bin/mysql -uroot --password=''",
+            onlyif  => "/usr/bin/mysql -uroot --password=''",
             command => "/usr/bin/mysql -uroot --password='' mysql < 
/etc/nova/mysql.sql",
             require => [Class['mysql'], File["/etc/nova/mysql.sql"]],
-            before => Exec['create_nova_db'];
+            before  => Exec['create_nova_db'];
         'create_nova_db_user':
-            unless => "/usr/bin/mysql --defaults-file=/etc/nova/nova-user.cnf 
-e 'exit'",
+            unless  => "/usr/bin/mysql --defaults-file=/etc/nova/nova-user.cnf 
-e 'exit'",
             command => "/usr/bin/mysql -uroot < /etc/nova/nova-user.sql",
             require => [Class['mysql'], File["/etc/nova/nova-user.sql", 
"/etc/nova/nova-user.cnf", "/root/.my.cnf"]];
         'create_nova_db':
-            unless => "/usr/bin/mysql --defaults-file=/root/.my.cnf -uroot 
$nova_db_name -e 'exit'",
+            unless  => "/usr/bin/mysql --defaults-file=/root/.my.cnf -uroot 
$nova_db_name -e 'exit'",
             command => "/usr/bin/mysql --defaults-file=/root/.my.cnf -uroot -e 
\"create database $nova_db_name;\"",
             require => [Class['mysql'], File["/root/.my.cnf"]],
-            before => Exec['create_nova_db_user'];
+            before  => Exec['create_nova_db_user'];
         'create_puppet_db_user':
-            unless => "/usr/bin/mysql 
--defaults-file=/etc/puppet/puppet-user.cnf -e 'exit'",
+            unless  => "/usr/bin/mysql 
--defaults-file=/etc/puppet/puppet-user.cnf -e 'exit'",
             command => "/usr/bin/mysql -uroot < /etc/puppet/puppet-user.sql",
             require => [Class['mysql'], File["/etc/puppet/puppet-user.sql", 
"/etc/puppet/puppet-user.cnf", "/root/.my.cnf"]];
         'create_puppet_db':
-            unless => "/usr/bin/mysql --defaults-file=/root/.my.cnf -uroot 
$puppet_db_name -e 'exit'",
+            unless  => "/usr/bin/mysql --defaults-file=/root/.my.cnf -uroot 
$puppet_db_name -e 'exit'",
             command => "/usr/bin/mysql --defaults-file=/root/.my.cnf -uroot -e 
\"create database $puppet_db_name;\"",
             require => [Class['mysql'], File["/root/.my.cnf"]],
-            before => Exec['create_puppet_db_user'];
+            before  => Exec['create_puppet_db_user'];
         'create_glance_db_user':
-            unless => "/usr/bin/mysql 
--defaults-file=/etc/glance/glance-user.cnf -e 'exit'",
+            unless  => "/usr/bin/mysql 
--defaults-file=/etc/glance/glance-user.cnf -e 'exit'",
             command => "/usr/bin/mysql -uroot < /etc/glance/glance-user.sql",
             require => [Class['mysql'], 
File["/etc/glance/glance-user.sql","/etc/glance/glance-user.cnf","/root/.my.cnf"]];
         'create_glance_db':
-            unless => "/usr/bin/mysql --defaults-file=/root/.my.cnf -uroot 
$glance_db_name -e 'exit'",
+            unless  => "/usr/bin/mysql --defaults-file=/root/.my.cnf -uroot 
$glance_db_name -e 'exit'",
             command => "/usr/bin/mysql --defaults-file=/root/.my.cnf -uroot -e 
\"create database $glance_db_name;\"",
             require => [Class['mysql'], File["/root/.my.cnf"]],
-            before => Exec['create_glance_db_user'];
+            before  => Exec['create_glance_db_user'];
     }
 
     exec {
         'create_keystone_db_user':
-            unless => "/usr/bin/mysql 
--defaults-file=/etc/keystone/keystone-user.cnf -e 'exit'",
+            unless  => "/usr/bin/mysql 
--defaults-file=/etc/keystone/keystone-user.cnf -e 'exit'",
             command => "/usr/bin/mysql -uroot < 
/etc/keystone/keystone-user.sql",
             require => [Class['mysql'], 
File["/etc/keystone/keystone-user.sql", "/etc/keystone/keystone-user.cnf", 
"/root/.my.cnf"]];
         'create_keystone_db':
-            unless => "/usr/bin/mysql --defaults-file=/root/.my.cnf -uroot 
$keystone_db_name -e 'exit'",
+            unless  => "/usr/bin/mysql --defaults-file=/root/.my.cnf -uroot 
$keystone_db_name -e 'exit'",
             command => "/usr/bin/mysql --defaults-file=/root/.my.cnf -uroot -e 
\"create database $keystone_db_name;\"",
             require => [Class['mysql'], File["/root/.my.cnf"]],
-            before => Exec['create_keystone_db_user'];
+            before  => Exec['create_keystone_db_user'];
     }
 
     file {
         "/root/.my.cnf":
             content => template("openstack/common/controller/my.cnf.erb"),
-            owner => root,
-            group => root,
-            mode => '0640';
+            owner   => 'root',
+            group   => 'root',
+            mode    => '0640';
         "/etc/nova/mysql.sql":
             content => template("openstack/common/controller/mysql.sql.erb"),
-            owner => root,
-            group => root,
-            mode => '0640',
+            owner   => 'root',
+            group   => 'root',
+            mode    => '0640',
             require => Package["nova-common"];
         "/etc/nova/nova-user.sql":
             content => 
template("openstack/common/controller/nova-user.sql.erb"),
-            owner => root,
-            group => root,
-            mode => '0640',
+            owner   => 'root',
+            group   => 'root',
+            mode    => '0640',
             require => Package["nova-common"];
         "/etc/nova/nova-user.cnf":
             content => 
template("openstack/common/controller/nova-user.cnf.erb"),
-            owner => root,
-            group => root,
-            mode => '0640',
+            owner   => 'root',
+            group   => 'root',
+            mode    => '0640',
             require => Package["nova-common"];
         "/etc/puppet/puppet-user.sql":
             content => 
template("openstack/common/controller/puppet-user.sql.erb"),
-            owner => root,
-            group => root,
-            mode => '0640',
+            owner   => 'root',
+            group   => 'root',
+            mode    => '0640',
             require => Package["puppetmaster"];
         "/etc/puppet/puppet-user.cnf":
             content => 
template("openstack/common/controller/puppet-user.cnf.erb"),
-            owner => root,
-            group => root,
-            mode => '0640',
+            owner   => 'root',
+            group   => 'root',
+            mode    => '0640',
             require => Package["puppetmaster"];
         "/etc/glance/glance-user.sql":
             content => 
template("openstack/common/controller/glance-user.sql.erb"),
-            owner => root,
-            group => root,
-            mode => '0640',
+            owner   => 'root',
+            group   => 'root',
+            mode    => '0640',
             require => Package["glance"];
         "/etc/glance/glance-user.cnf":
             content => 
template("openstack/common/controller/glance-user.cnf.erb"),
-            owner => root,
-            group => root,
-            mode => '0640',
+            owner   => 'root',
+            group   => 'root',
+            mode    => '0640',
             require => Package["glance"];
     }
     file {
         "/etc/keystone/keystone-user.sql":
             content => 
template("openstack/common/controller/keystone-user.sql.erb"),
-            owner => root,
-            group => root,
-            mode => '0640',
+            owner   => 'root',
+            group   => 'root',
+            mode    => '0640',
             require => Package["keystone"];
         "/etc/keystone/keystone-user.cnf":
             content => 
template("openstack/common/controller/keystone-user.cnf.erb"),
-            owner => root,
-            group => root,
-            mode => '0640',
+            owner   => 'root',
+            group   => 'root',
+            mode    => '0640',
             require => Package["keystone"];
     }
 }
@@ -382,7 +383,7 @@
     if !defined(Class["memcached"]) {
         class { "memcached":
             memcached_ip => "127.0.0.1",
-            pin => true;
+            pin          => true;
         }
     }
 
@@ -400,11 +401,11 @@
     file {
         "/etc/apache2/sites-enabled/${webserver_hostname}":
             require => [ Package[php5] ],
-            mode => '0644',
-            owner => root,
-            group => root,
+            mode    => '0644',
+            owner   => 'root',
+            group   => 'root',
             content => template('apache/sites/wikitech.wikimedia.org.erb'),
-            ensure => present;
+            ensure  => present;
         "/var/www/robots.txt":
             ensure => present,
             mode   => '0644',
@@ -412,79 +413,79 @@
             group  => 'root',
             source => "puppet:///files/openstack/wikitech-robots.txt";
         "/a":
-            mode => '0755',
-            owner => root,
-            group => root,
+            mode   => '0755',
+            owner  => 'root',
+            group  => 'root',
             ensure => directory;
         "/a/backup":
-            mode => '0755',
-            owner => root,
-            group => root,
+            mode   => '0755',
+            owner  => 'root',
+            group  => 'root',
             ensure => directory;
         "/a/backup/public":
-            mode => '0755',
-            owner => root,
-            group => root,
+            mode   => '0755',
+            owner  => 'root',
+            group  => 'root',
             ensure => directory;
         "/usr/local/sbin/db-bak.sh":
-            mode => '0555',
-            owner => root,
-            group => root,
+            mode   => '0555',
+            owner  => 'root',
+            group  => 'root',
             source => "puppet:///files/openstack/db-bak.sh";
         "/usr/local/sbin/mw-files.sh":
-            mode => '0555',
-            owner => root,
-            group => root,
+            mode   => '0555',
+            owner  => 'root',
+            group  => 'root',
             source => "puppet:///files/openstack/mw-files.sh";
         "/usr/local/sbin/mw-xml.sh":
-            mode => '0555',
-            owner => root,
-            group => root,
+            mode   => '0555',
+            owner  => 'root',
+            group  => 'root',
             source => "puppet:///files/openstack/mw-xml.sh";
     }
 
     file { '/etc/apache2/conf.d/ports-wikitech.conf':
-            ensure => present,
+            ensure  => present,
             require => 
File["/etc/apache2/sites-enabled/${webserver_hostname}"],
-            mode => '0644',
-            owner => 'root',
-            group => 'root',
-            source => 
'puppet:///files/openstack/controller/ports-wikitech.conf',
+            mode    => '0644',
+            owner   => 'root',
+            group   => 'root',
+            source  => 
'puppet:///files/openstack/controller/ports-wikitech.conf',
     }
 
     cron {
         "run-jobs":
-            user => mwdeploy,
+            user    => 'mwdeploy',
             command => 'cd /srv/org/wikimedia/controller/wikis/w; /usr/bin/php 
maintenance/runJobs.php > /dev/null 2>&1',
-            ensure => present;
+            ensure  => present;
         "db-bak":
-            user => root,
-            hour => 1,
-            minute => 0,
+            user    => 'root',
+            hour    => 1,
+            minute  => 0,
             command => '/usr/local/sbin/db-bak.sh > /dev/null 2>&1',
             require => File["/a/backup"],
-            ensure => present;
+            ensure  => present;
         "mw-xml":
-            user => root,
-            hour => 1,
-            minute => 30,
+            user    => 'root',
+            hour    => 1,
+            minute  => 30,
             command => '/usr/local/sbin/mw-xml.sh > /dev/null 2>&1',
             require => File["/a/backup"],
-            ensure => present;
+            ensure  => present;
         "mw-files":
-            user => root,
-            hour => 2,
-            minute => 0,
+            user    => 'root',
+            hour    => 2,
+            minute  => 0,
             command => '/usr/local/sbin/mw-files.sh > /dev/null 2>&1',
             require => File["/a/backup"],
-            ensure => present;
+            ensure  => present;
         "backup-cleanup":
-            user => root,
-            hour => 3,
-            minute => 0,
+            user    => 'root',
+            hour    => 3,
+            minute  => 0,
             command => 'find /a/backup -type f -mtime +4 -delete',
             require => File["/a/backup"],
-            ensure => present;
+            ensure  => present;
     }
 
 
@@ -517,14 +518,14 @@
     }
 
     package { "nova-scheduler":
-        ensure => present,
+        ensure  => present,
         require => Class["openstack::repo"];
     }
 
     service { "nova-scheduler":
-        ensure => running,
+        ensure    => running,
         subscribe => File['/etc/nova/nova.conf'],
-        require => Package["nova-scheduler"];
+        require   => Package["nova-scheduler"];
     }
 }
 
@@ -534,14 +535,14 @@
     }
 
     package { "nova-conductor":
-        ensure => present,
+        ensure  => present,
         require => Class["openstack::repo"];
     }
 
     service { "nova-conductor":
-        ensure => running,
+        ensure    => running,
         subscribe => File['/etc/nova/nova.conf'],
-        require => Package["nova-conductor"];
+        require   => Package["nova-conductor"];
     }
 }
 
@@ -647,21 +648,21 @@
     }
 
     exec { 'create_br-int':
-            unless => "/usr/bin/ovs-vsctl br-exists br-int",
+            unless  => "/usr/bin/ovs-vsctl br-exists br-int",
             command => "/usr/bin/ovs-vsctl add-br br-int",
             require => Service['openvswitch-switch'],
     }
 
     exec { 'create_br-ex':
-            unless => "/usr/bin/ovs-vsctl br-exists br-ex",
+            unless  => "/usr/bin/ovs-vsctl br-exists br-ex",
             command => "/usr/bin/ovs-vsctl add-br br-ex",
             require => Service['openvswitch-switch'],
-            before => Exec['add-port'],
+            before  => Exec['add-port'],
     }
 
 
     exec { 'add-port':
-            unless => "/usr/bin/ovs-vsctl list-ports br-ex | /bin/grep 
${external_interface}",
+            unless  => "/usr/bin/ovs-vsctl list-ports br-ex | /bin/grep 
${external_interface}",
             command => "/usr/bin/ovs-vsctl add-port br-ex 
${external_interface}",
             require => Service['openvswitch-switch'],
     }
@@ -715,20 +716,20 @@
     }
 
     package {  [ "nova-network", "dnsmasq" ]:
-        ensure => present,
+        ensure  => present,
         require => Class["openstack::repo"];
     }
 
     service { "nova-network":
-        ensure => running,
+        ensure    => running,
         subscribe => File['/etc/nova/nova.conf'],
-        require => Package["nova-network"];
+        require   => Package["nova-network"];
     }
 
     # dnsmasq is run manually by nova-network, we don't want the service 
running
     service { "dnsmasq":
-        enable => false,
-        ensure => stopped,
+        enable  => false,
+        ensure  => stopped,
         require => Package["dnsmasq"];
     }
 
@@ -752,9 +753,9 @@
 
     file { '/etc/dnsmasq-nova.conf':
         content => 
template("openstack/${$openstack_version}/nova/dnsmasq-nova.conf.erb"),
-        owner => 'root',
-        group => 'root',
-        mode => '0444',
+        owner   => 'root',
+        group   => 'root',
+        mode    => '0444',
     }
 
     sysctl::parameters { 'openstack':
@@ -780,21 +781,21 @@
     }
 
     package {  [ "nova-api" ]:
-        ensure => present,
+        ensure  => present,
         require => Class["openstack::repo"];
     }
 
     service { "nova-api":
-        ensure => running,
+        ensure    => running,
         subscribe => File['/etc/nova/nova.conf'],
-        require => Package["nova-api"];
+        require   => Package["nova-api"];
     }
     file { "/etc/nova/policy.json":
-        source => 
"puppet:///files/openstack/${openstack_version}/nova/policy.json",
-        mode => '0644',
-        owner => root,
-        group => root,
-        notify => Service["nova-api"],
+        source  => 
"puppet:///files/openstack/${openstack_version}/nova/policy.json",
+        mode    => '0644',
+        owner   => 'root',
+        group   => 'root',
+        notify  => Service["nova-api"],
         require => Package["nova-api"];
     }
 }
@@ -805,14 +806,14 @@
     }
 
     package { [ "nova-volume" ]:
-        ensure => absent,
+        ensure  => absent,
         require => Class["openstack::repo"];
     }
 
     #service { "nova-volume":
-    #   ensure => stopped,
+    #   ensure    => stopped,
     #   subscribe => File['/etc/nova/nova.conf'],
-    #   require => Package["nova-volume"];
+    #   require   => Package["nova-volume"];
     #}
 }
 
@@ -824,99 +825,99 @@
     if ( $::realm == "production" ) {
         $certname = "virt-star.${site}.wmnet"
         install_certificate{ "${certname}": }
-        install_additional_key{ "${certname}": key_loc => "/var/lib/nova", 
owner => "nova", group => "libvirtd", require => Package["nova-common"] }
+        install_additional_key{ "${certname}": key_loc => "/var/lib/nova", 
owner => 'nova', group => "libvirtd", require => Package["nova-common"] }
 
         file {
             "/var/lib/nova/clientkey.pem":
-                ensure => link,
-                target => "/var/lib/nova/${certname}.key",
+                ensure  => link,
+                target  => "/var/lib/nova/${certname}.key",
                 require => Install_additional_key["${certname}"];
             "/var/lib/nova/clientcert.pem":
-                ensure => link,
-                target => "/etc/ssl/certs/${certname}.pem",
+                ensure  => link,
+                target  => "/etc/ssl/certs/${certname}.pem",
                 require => Install_certificate["${certname}"];
             "/var/lib/nova/cacert.pem":
-                ensure => link,
-                target => "/etc/ssl/certs/wmf-ca.pem",
+                ensure  => link,
+                target  => "/etc/ssl/certs/wmf-ca.pem",
                 require => Install_certificate["${certname}"];
             "/var/lib/nova/.ssh":
-                ensure => directory,
-                owner => "nova",
-                group => "nova",
-                mode => '0700',
+                ensure  => directory,
+                owner   => 'nova',
+                group   => 'nova',
+                mode    => '0700',
                 require => Package["nova-common"];
             "/var/lib/nova/.ssh/id_rsa":
-                source => "puppet:///private/ssh/nova/nova.key",
-                owner => "nova",
-                group => "nova",
-                mode => '0600',
+                source  => "puppet:///private/ssh/nova/nova.key",
+                owner   => 'nova',
+                group   => 'nova',
+                mode    => '0600',
                 require => File["/var/lib/nova/.ssh"];
             "/var/lib/nova/.ssh/authorized_keys":
-                source => "puppet:///private/ssh/nova/nova.pub",
-                owner => "nova",
-                group => "nova",
-                mode => '0600',
+                source  => "puppet:///private/ssh/nova/nova.pub",
+                owner   => 'nova',
+                group   => 'nova',
+                mode    => '0600',
                 require => File["/var/lib/nova/.ssh"];
             "/etc/libvirt/libvirtd.conf":
-                notify => Service["libvirt-bin"],
-                owner => "root",
-                group => "root",
-                mode => '0444',
+                notify  => Service["libvirt-bin"],
+                owner   => 'root',
+                group   => 'root',
+                mode    => '0444',
                 content => template("openstack/common/nova/libvirtd.conf.erb"),
                 require => Package["nova-common"];
             "/etc/default/libvirt-bin":
-                notify => Service["libvirt-bin"],
-                owner => "root",
-                group => "root",
-                mode => '0444',
+                notify  => Service["libvirt-bin"],
+                owner   => 'root',
+                group   => 'root',
+                mode    => '0444',
                 content => 
template("openstack/common/nova/libvirt-bin.default.erb"),
                 require => Package["nova-common"];
             "/etc/nova/nova-compute.conf":
-                notify => Service["nova-compute"],
-                owner => "root",
-                group => "root",
-                mode => '0444',
+                notify  => Service['nova-compute'],
+                owner   => 'root',
+                group   => 'root',
+                mode    => '0444',
                 content => 
template("openstack/common/nova/nova-compute.conf.erb"),
                 require => Package["nova-common"];
         }
     }
 
     service { "libvirt-bin":
-        ensure => running,
-        enable => true,
+        ensure  => running,
+        enable  => true,
         require => Package["nova-common"];
     }
 
-    package { [ "nova-compute", "nova-compute-kvm" ]:
-        ensure => present,
+    package { [ 'nova-compute', "nova-compute-kvm" ]:
+        ensure  => present,
         require => Class["openstack::repo"];
     }
 
     # nova-compute adds the user with /bin/false, but resize, live migration, 
etc.
     # need the nova use to have a real shell, as it uses ssh.
-    user { "nova":
-        ensure => present,
-        shell => "/bin/bash",
+    user { 'nova':
+        ensure  => present,
+        shell   => "/bin/bash",
         require => Package["nova-common"];
     }
 
-    service { "nova-compute":
-        ensure => running,
+    service { 'nova-compute':
+        ensure    => running,
         subscribe => File['/etc/nova/nova.conf'],
-        require => Package["nova-compute"];
+        require   => Package['nova-compute'];
     }
 
     file {
         "/etc/libvirt/qemu/networks/autostart/default.xml":
-            ensure => absent;
+            ensure  => absent;
         # Live hack to use qcow2 ephemeral base images. Need to upstream
         # a config option for this in havana.
         "/usr/share/pyshared/nova/virt/libvirt/driver.py":
-            source => 
"puppet:///files/openstack/${openstack_version}/nova/virt-libvirt-driver",
-            notify => Service["nova-compute"],
-            owner => "root",
-            group => "root",
-            mode => '0444',
+            source  => 
"puppet:///files/openstack/${openstack_version}/nova/virt-libvirt-driver",
+            notify  => Service['nova-compute'],
+            owner   => 'root',
+            group   => 'root',
+            mode    => '0444',
             require => Package["nova-common"];
     }
 }
@@ -924,7 +925,7 @@
 # Set up neutron on a compute node
 class openstack::neutron-compute($neutronconfig, $data_interface_ip) {
     sysctl::parameters { 'openstack':
-        values => {
+        values   => {
             'net.ipv4.conf.default.rp_filter' => 0,
             'net.ipv4.conf.all.rp_filter'     => 0,
         },
@@ -952,7 +953,7 @@
     }
 
     exec { 'create_br-int':
-        unless => "/usr/bin/ovs-vsctl br-exists br-int",
+        unless  => "/usr/bin/ovs-vsctl br-exists br-int",
         command => "/usr/bin/ovs-vsctl add-br br-int",
         require => Service['openvswitch-switch'],
     }
@@ -981,7 +982,7 @@
     }
 
     package { [ "keystone" ]:
-        ensure => present,
+        ensure  => present,
         require => Class["openstack::repo"];
     }
 
@@ -993,19 +994,19 @@
 
 
     service { "keystone":
-        ensure => running,
+        ensure    => running,
         subscribe => File['/etc/keystone/keystone.conf'],
-        require => Package["keystone"];
+        require   => Package["keystone"];
     }
 
     file {
         "/etc/keystone/keystone.conf":
             content => 
template("openstack/${openstack_version}/keystone/keystone.conf.erb"),
-            owner => keystone,
-            group => keystone,
-            notify => Service["keystone"],
+            owner   => keystone,
+            group   => keystone,
+            notify  => Service["keystone"],
             require => Package["keystone"],
-            mode => '0440';
+            mode    => '0440';
     }
 }
 
@@ -1015,35 +1016,35 @@
     }
 
     package { [ "glance" ]:
-        ensure => present,
+        ensure  => present,
         require => Class["openstack::repo"];
     }
 
     service { "glance-api":
-        ensure => running,
+        ensure  => running,
         require => Package["glance"];
     }
 
     service { "glance-registry":
-        ensure => running,
+        ensure  => running,
         require => Package["glance"];
     }
 
     file {
         "/etc/glance/glance-api.conf":
             content => 
template("openstack/${$openstack_version}/glance/glance-api.conf.erb"),
-            owner => glance,
-            group => nogroup,
-            notify => Service["glance-api"],
+            owner   => 'glance',
+            group   => nogroup,
+            notify  => Service["glance-api"],
             require => Package["glance"],
-            mode => '0440';
+            mode    => '0440';
         "/etc/glance/glance-registry.conf":
             content => 
template("openstack/${$openstack_version}/glance/glance-registry.conf.erb"),
-            owner => glance,
-            group => nogroup,
-            notify => Service["glance-registry"],
+            owner   => 'glance',
+            group   => nogroup,
+            notify  => Service["glance-registry"],
             require => Package["glance"],
-            mode => '0440';
+            mode    => '0440';
     }
     if ($openstack_version == "essex") {
         # Keystone config was (thankfully) moved out of the paste config
@@ -1051,18 +1052,18 @@
         file {
             "/etc/glance/glance-api-paste.ini":
                 content => 
template("openstack/${$openstack_version}/glance/glance-api-paste.ini.erb"),
-                owner => glance,
-                group => glance,
-                notify => Service["glance-api"],
+                owner   => 'glance',
+                group   => 'glance',
+                notify  => Service["glance-api"],
                 require => Package["glance"],
-                mode => '0440';
+                mode    => '0440';
             "/etc/glance/glance-registry-paste.ini":
                 content => 
template("openstack/${$openstack_version}/glance/glance-registry-paste.ini.erb"),
-                owner => glance,
-                group => glance,
-                notify => Service["glance-registry"],
+                owner   => 'glance',
+                group   => 'glance',
+                notify  => Service["glance-registry"],
                 require => Package["glance"],
-                mode => '0440';
+                mode    => '0440';
         }
     }
 }

-- 
To view, visit https://gerrit.wikimedia.org/r/143794
To unsubscribe, visit https://gerrit.wikimedia.org/r/settings

Gerrit-MessageType: merged
Gerrit-Change-Id: I7e798fd733a7d8f9e25483127a5058048035cb96
Gerrit-PatchSet: 2
Gerrit-Project: operations/puppet
Gerrit-Branch: production
Gerrit-Owner: Dzahn <[email protected]>
Gerrit-Reviewer: Andrew Bogott <[email protected]>
Gerrit-Reviewer: coren <[email protected]>
Gerrit-Reviewer: jenkins-bot <>

_______________________________________________
MediaWiki-commits mailing list
[email protected]
https://lists.wikimedia.org/mailman/listinfo/mediawiki-commits

Reply via email to