Skip to content

Commit 568a14e

Browse files
committed
(GH-cat-9) syntax:hiera:yaml fixes
1 parent 032b7ff commit 568a14e

File tree

11 files changed

+81
-99
lines changed

11 files changed

+81
-99
lines changed

manifests/repo/apt_postgresql_org.pp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,6 @@
2727
},
2828
}
2929

30-
Apt::Source['apt.postgresql.org']->Package<|tag == 'puppetlabs-postgresql'|>
30+
Apt::Source['apt.postgresql.org'] -> Package<|tag == 'puppetlabs-postgresql'|>
3131
Class['Apt::Update'] -> Package<|tag == 'puppetlabs-postgresql'|>
3232
}

manifests/server/config.pp

Lines changed: 37 additions & 46 deletions
Original file line numberDiff line numberDiff line change
@@ -52,49 +52,43 @@
5252

5353
postgresql::server::pg_hba_rule {
5454
'local access as postgres user':
55-
type => 'local',
56-
user => $user,
57-
auth_method => 'ident',
58-
auth_option => $local_auth_option,
59-
order => 1,
60-
;
55+
type => 'local',
56+
user => $user,
57+
auth_method => 'ident',
58+
auth_option => $local_auth_option,
59+
order => 1;
6160

6261
'local access to database with same name':
63-
type => 'local',
64-
auth_method => 'ident',
65-
auth_option => $local_auth_option,
66-
order => 2,
67-
;
62+
type => 'local',
63+
auth_method => 'ident',
64+
auth_option => $local_auth_option,
65+
order => 2;
6866

6967
'allow localhost TCP access to postgresql user':
70-
type => 'host',
71-
user => $user,
72-
address => '127.0.0.1/32',
73-
auth_method => 'md5',
74-
order => 3,
75-
;
68+
type => 'host',
69+
user => $user,
70+
address => '127.0.0.1/32',
71+
auth_method => 'md5',
72+
order => 3;
7673

7774
'deny access to postgresql user':
78-
type => 'host',
79-
user => $user,
80-
address => $ip_mask_deny_postgres_user,
81-
auth_method => 'reject',
82-
order => 4,
83-
;
75+
type => 'host',
76+
user => $user,
77+
address => $ip_mask_deny_postgres_user,
78+
auth_method => 'reject',
79+
order => 4;
8480

8581
'allow access to all users':
86-
type => 'host',
87-
address => $ip_mask_allow_all_users,
88-
auth_method => 'md5',
89-
order => 100,
90-
;
82+
type => 'host',
83+
address => $ip_mask_allow_all_users,
84+
auth_method => 'md5',
85+
order => 100;
9186

9287
'allow access to ipv6 localhost':
93-
type => 'host',
94-
address => '::1/128',
95-
auth_method => 'md5',
96-
order => 101,
97-
;
88+
type => 'host',
89+
address => '::1/128',
90+
auth_method => 'md5',
91+
order => 101;
9892
}
9993
}
10094

@@ -233,17 +227,15 @@
233227

234228
file {
235229
default:
236-
ensure => file,
237-
owner => root,
238-
group => root,
239-
notify => [Exec['restart-systemd'], Class['postgresql::server::service']],
240-
before => Class['postgresql::server::reload'],
241-
;
230+
ensure => file,
231+
owner => root,
232+
group => root,
233+
notify => [Exec['restart-systemd'], Class['postgresql::server::service']],
234+
before => Class['postgresql::server::reload'];
242235

243236
'systemd-conf-dir':
244-
ensure => directory,
245-
path => "/etc/systemd/system/${service_name}.service.d",
246-
;
237+
ensure => directory,
238+
path => "/etc/systemd/system/${service_name}.service.d";
247239

248240
# Template uses:
249241
# - $facts['os']['name']
@@ -253,10 +245,9 @@
253245
# - $datadir
254246
# - $extra_systemd_config
255247
'systemd-override':
256-
path => "/etc/systemd/system/${service_name}.service.d/${service_name}.conf",
257-
content => template('postgresql/systemd-override.erb'),
258-
require => File['systemd-conf-dir'],
259-
;
248+
path => "/etc/systemd/system/${service_name}.service.d/${service_name}.conf",
249+
content => template('postgresql/systemd-override.erb'),
250+
require => File['systemd-conf-dir'];
260251
}
261252

262253
if $service_enable != 'mask' {

manifests/server/database.pp

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@
120120
}
121121

122122
if defined(Postgresql::Server::Role[$owner]) {
123-
Postgresql::Server::Role[$owner]->Postgresql_psql["ALTER DATABASE \"${dbname}\" OWNER TO \"${owner}\""]
123+
Postgresql::Server::Role[$owner] -> Postgresql_psql["ALTER DATABASE \"${dbname}\" OWNER TO \"${owner}\""]
124124
}
125125
}
126126

@@ -132,7 +132,7 @@
132132

133133
if defined(Postgresql::Server::Tablespace[$tablespace]) {
134134
# The tablespace must be there, before we create the database.
135-
Postgresql::Server::Tablespace[$tablespace]->Postgresql_psql["CREATE DATABASE \"${dbname}\""]
135+
Postgresql::Server::Tablespace[$tablespace] -> Postgresql_psql["CREATE DATABASE \"${dbname}\""]
136136
}
137137
}
138138
}

manifests/server/db.pp

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@
5151
} -> Postgresql_conn_validator<| db_name == $dbname |>
5252
}
5353

54-
if($tablespace != undef and defined(Postgresql::Server::Tablespace[$tablespace])) {
55-
Postgresql::Server::Tablespace[$tablespace]->Postgresql::Server::Database[$name]
54+
if ($tablespace != undef and defined(Postgresql::Server::Tablespace[$tablespace])) {
55+
Postgresql::Server::Tablespace[$tablespace] -> Postgresql::Server::Database[$name]
5656
}
5757
}

manifests/server/default_privileges.pp

Lines changed: 16 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -25,19 +25,16 @@
2525
/(?i:^TYPES$)/,
2626
/(?i:^SCHEMAS$)/
2727
] $object_type,
28-
String $schema = 'public',
29-
String $psql_db = $postgresql::server::default_database,
30-
String $psql_user = $postgresql::server::user,
31-
Integer $port = $postgresql::server::port,
32-
Hash $connect_settings = $postgresql::server::default_connect_settings,
33-
Enum['present',
34-
'absent'
35-
] $ensure = 'present',
36-
String $group = $postgresql::server::group,
37-
String $psql_path = $postgresql::server::psql_path,
38-
Optional[String] $target_role = undef,
28+
String $schema = 'public',
29+
String $psql_db = $postgresql::server::default_database,
30+
String $psql_user = $postgresql::server::user,
31+
Integer $port = $postgresql::server::port,
32+
Hash $connect_settings = $postgresql::server::default_connect_settings,
33+
Enum['present', 'absent'] $ensure = 'present',
34+
String $group = $postgresql::server::group,
35+
String $psql_path = $postgresql::server::psql_path,
36+
Optional[String] $target_role = undef,
3937
) {
40-
4138
# If possible use the version of the remote database, otherwise
4239
# fallback to our local DB version
4340
if $connect_settings != undef and has_key( $connect_settings, 'DBVERSION') {
@@ -113,9 +110,9 @@
113110
'SEQUENCES': {
114111
case $_privilege {
115112
/^(ALL)$/: { $_check_privilege = 'rwU' }
116-
/^SELECT$/: { $_check_privilege = 'r'}
117-
/^UPDATE$/: { $_check_privilege = 'w'}
118-
/^USAGE$/: { $_check_privilege = 'U'}
113+
/^SELECT$/: { $_check_privilege = 'r' }
114+
/^UPDATE$/: { $_check_privilege = 'w' }
115+
/^USAGE$/: { $_check_privilege = 'U' }
119116
default: { fail('Illegal value for $privilege parameter') }
120117
}
121118
$_check_type = 'S'
@@ -136,7 +133,7 @@
136133
}
137134
'TYPES': {
138135
case $_privilege {
139-
/^(ALL|USAGE)$/: { $_check_privilege = 'U'}
136+
/^(ALL|USAGE)$/: { $_check_privilege = 'U' }
140137
default: { fail('Illegal value for $privilege parameter') }
141138
}
142139
$_check_type = 'T'
@@ -178,14 +175,14 @@
178175
psql_group => $group,
179176
psql_path => $psql_path,
180177
unless => $unless_cmd,
181-
environment => 'PGOPTIONS=--client-min-messages=error'
178+
environment => 'PGOPTIONS=--client-min-messages=error',
182179
}
183180

184181
if($role != undef and defined(Postgresql::Server::Role[$role])) {
185-
Postgresql::Server::Role[$role]->Postgresql_psql["default_privileges:${name}"]
182+
Postgresql::Server::Role[$role] -> Postgresql_psql["default_privileges:${name}"]
186183
}
187184

188185
if($db != undef and defined(Postgresql::Server::Database[$db])) {
189-
Postgresql::Server::Database[$db]->Postgresql_psql["default_privileges:${name}"]
186+
Postgresql::Server::Database[$db] -> Postgresql_psql["default_privileges:${name}"]
190187
}
191188
}

manifests/server/grant.pp

Lines changed: 14 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616
define postgresql::server::grant (
1717
String $role,
1818
String $db,
19-
String $privilege = '',
19+
String $privilege = '',
2020
Pattern[#/(?i:^COLUMN$)/,
2121
/(?i:^ALL SEQUENCES IN SCHEMA$)/,
2222
/(?i:^ALL TABLES IN SCHEMA$)/,
@@ -31,23 +31,17 @@
3131
/(?i:^SCHEMA$)/,
3232
/(?i:^SEQUENCE$)/
3333
#/(?i:^VIEW$)/
34-
] $object_type = 'database',
35-
Optional[Variant[
36-
Array[String,2,2],
37-
String[1]]
38-
] $object_name = undef,
39-
Array[String[1],0]
40-
$object_arguments = [],
41-
String $psql_db = $postgresql::server::default_database,
42-
String $psql_user = $postgresql::server::user,
43-
Integer $port = $postgresql::server::port,
44-
Boolean $onlyif_exists = false,
45-
Hash $connect_settings = $postgresql::server::default_connect_settings,
46-
Enum['present',
47-
'absent'
48-
] $ensure = 'present',
49-
String $group = $postgresql::server::group,
50-
String $psql_path = $postgresql::server::psql_path,
34+
] $object_type = 'database',
35+
Optional[Variant[Array[String,2,2],String[1]]] $object_name = undef,
36+
Array[String[1],0] $object_arguments = [],
37+
String $psql_db = $postgresql::server::default_database,
38+
String $psql_user = $postgresql::server::user,
39+
Integer $port = $postgresql::server::port,
40+
Boolean $onlyif_exists = false,
41+
Hash $connect_settings = $postgresql::server::default_connect_settings,
42+
Enum['present', 'absent'] $ensure = 'present',
43+
String $group = $postgresql::server::group,
44+
String $psql_path = $postgresql::server::psql_path,
5145
) {
5246
case $ensure {
5347
default: {
@@ -476,10 +470,10 @@
476470
}
477471

478472
if($role != undef and defined(Postgresql::Server::Role[$role])) {
479-
Postgresql::Server::Role[$role]->Postgresql_psql["grant:${name}"]
473+
Postgresql::Server::Role[$role] -> Postgresql_psql["grant:${name}"]
480474
}
481475

482476
if($db != undef and defined(Postgresql::Server::Database[$db])) {
483-
Postgresql::Server::Database[$db]->Postgresql_psql["grant:${name}"]
477+
Postgresql::Server::Database[$db] -> Postgresql_psql["grant:${name}"]
484478
}
485479
}

manifests/server/grant_role.pp

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -40,12 +40,12 @@
4040
}
4141

4242
if ! $connect_settings or empty($connect_settings) {
43-
Class['postgresql::server']->Postgresql_psql["grant_role:${name}"]
43+
Class['postgresql::server'] -> Postgresql_psql["grant_role:${name}"]
4444
}
4545
if defined(Postgresql::Server::Role[$role]) {
46-
Postgresql::Server::Role[$role]->Postgresql_psql["grant_role:${name}"]
46+
Postgresql::Server::Role[$role] -> Postgresql_psql["grant_role:${name}"]
4747
}
4848
if defined(Postgresql::Server::Role[$group]) {
49-
Postgresql::Server::Role[$group]->Postgresql_psql["grant_role:${name}"]
49+
Postgresql::Server::Role[$group] -> Postgresql_psql["grant_role:${name}"]
5050
}
5151
}

manifests/server/late_initdb.pp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,6 @@
3434
WHERE datname = 'template1'",
3535
unless => "SELECT datname FROM pg_database WHERE
3636
datname = 'template1' AND encoding = pg_char_to_encoding('${encoding}')",
37-
before => Anchor['postgresql::server::service::end']
37+
before => Anchor['postgresql::server::service::end'],
3838
}
3939
}

manifests/server/reassign_owned_by.pp

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -55,13 +55,13 @@
5555
}
5656

5757
if($old_role != undef and defined(Postgresql::Server::Role[$old_role])) {
58-
Postgresql::Server::Role[$old_role]->Postgresql_psql["reassign_owned_by:${db}:${sql_command}"]
58+
Postgresql::Server::Role[$old_role] -> Postgresql_psql["reassign_owned_by:${db}:${sql_command}"]
5959
}
6060
if($new_role != undef and defined(Postgresql::Server::Role[$new_role])) {
61-
Postgresql::Server::Role[$new_role]->Postgresql_psql["reassign_owned_by:${db}:${sql_command}"]
61+
Postgresql::Server::Role[$new_role] -> Postgresql_psql["reassign_owned_by:${db}:${sql_command}"]
6262
}
6363

6464
if($db != undef and defined(Postgresql::Server::Database[$db])) {
65-
Postgresql::Server::Database[$db]->Postgresql_psql["reassign_owned_by:${db}:${sql_command}"]
65+
Postgresql::Server::Database[$db] -> Postgresql_psql["reassign_owned_by:${db}:${sql_command}"]
6666
}
6767
}

manifests/server/schema.pp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@
5757
}
5858

5959
if defined(Postgresql::Server::Role[$owner]) {
60-
Postgresql::Server::Role[$owner]->Postgresql_psql["${db}: ALTER SCHEMA \"${schema}\" OWNER TO \"${owner}\""]
60+
Postgresql::Server::Role[$owner] -> Postgresql_psql["${db}: ALTER SCHEMA \"${schema}\" OWNER TO \"${owner}\""]
6161
}
6262
}
6363
}

0 commit comments

Comments
 (0)