Renamse privatecloud to cloud

Signed-off-by: Emilien Macchi <emilien.macchi@enovance.com>
This commit is contained in:
Emilien Macchi 2014-01-14 13:43:00 -05:00
parent b769a6d74f
commit 4361f449c8
67 changed files with 162 additions and 162 deletions

View File

@ -32,4 +32,4 @@ fixtures:
'stdlib': 'git://github.com/puppetlabs/puppetlabs-stdlib.git'
'xinetd': 'git://github.com/puppetlabs/puppetlabs-xinetd.git'
symlinks:
'privatecloud': '#{source_dir}'
'cloud': '#{source_dir}'

View File

@ -13,13 +13,13 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# == Class: privatecloud::automation
# == Class: cloud::automation
#
# Installs the Automation Server (puppet master)
#
#
class privatecloud::automation{
class cloud::automation{
# Ensure git is installed
class { 'git': }

View File

@ -13,7 +13,7 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# == Class: privatecloud::cache
# == Class: cloud::cache
#
# Install a cache server (used by OpenStack services)
#
@ -24,7 +24,7 @@
# Default to $::ipaddress_eth0
#
class privatecloud::cache (
class cloud::cache (
$listen_ip = $::ipaddress_eth0,
){

View File

@ -13,7 +13,7 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# == Class: privatecloud::compute
# == Class: cloud::compute
#
# Common class for compute nodes
#
@ -56,7 +56,7 @@
# Default value in params
#
class privatecloud::compute(
class cloud::compute(
$nova_db_host = $os_params::nova_db_host,
$nova_db_user = $os_params::nova_db_user,
$nova_db_password = $os_params::nova_db_password,

View File

@ -16,7 +16,7 @@
# Compute controller node
#
class privatecloud::compute::controller(
class cloud::compute::controller(
$ks_keystone_internal_host = $os_params::ks_keystone_internal_host,
$ks_nova_password = $os_params::ks_nova_password,
$neutron_metadata_proxy_shared_secret = $os_params::neutron_metadata_proxy_shared_secret,
@ -27,7 +27,7 @@ class privatecloud::compute::controller(
$ks_metadata_public_port = $os_params::ks_metadata_public_port
){
include 'privatecloud::compute'
include 'cloud::compute'
class { [
'nova::scheduler',

View File

@ -16,7 +16,7 @@
# Hypervisor Compute node
#
class privatecloud::compute::hypervisor(
class cloud::compute::hypervisor(
$api_eth = $os_params::api_eth,
$libvirt_type = $os_params::libvirt_type,
$ks_nova_internal_proto = $os_params::ks_nova_internal_proto,
@ -27,7 +27,7 @@ class privatecloud::compute::hypervisor(
$has_ceph = false
) {
include 'privatecloud::compute'
include 'cloud::compute'
exec { 'insert_module_nbd':
command => '/bin/echo "nbd" > /etc/modules',

View File

@ -13,7 +13,7 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# == Class: privatecloud::dashboard
# == Class: cloud::dashboard
#
# Installs the OpenStack Dashboard (Horizon)
#
@ -42,7 +42,7 @@
# Defaults false
#
class privatecloud::dashboard(
class cloud::dashboard(
$ks_keystone_internal_host = $os_params::ks_keystone_internal_host,
$secret_key = $os_params::secret_key,
$horizon_port = $os_params::horizon_port,

View File

@ -13,11 +13,11 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# == Class: privatecloud::database::nosql
# == Class: cloud::database::nosql
#
# Install a nosql server (MongoDB)
#
class privatecloud::database::nosql(
class cloud::database::nosql(
$bind_ip = undef,
) {

View File

@ -16,7 +16,7 @@
# MySQL Galera Node
#
class privatecloud::database::sql (
class cloud::database::sql (
$api_eth = $os_params::api_eth,
$service_provider = sysv,
$galera_nextserver = $os_params::galera_nextserver,
@ -197,7 +197,7 @@ basedir = /usr
mysql::server::config{'basic_config':
notify_service => false,
notify => Exec['clean-mysql-binlog'],
settings => template('privatecloud/database/mysql.conf.erb')
settings => template('cloud/database/mysql.conf.erb')
}
exec{'clean-mysql-binlog':

View File

@ -13,7 +13,7 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# == Class: privatecloud::identity
# == Class: cloud::identity
#
# Install Identity Server (Keystone)
#
@ -316,7 +316,7 @@
# Default value in params
#
class privatecloud::identity (
class cloud::identity (
$identity_roles_addons = $os_params::identity_roles_addons,
$keystone_db_host = $os_params::keystone_db_host,
$keystone_db_user = $os_params::keystone_db_user,

View File

@ -13,7 +13,7 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# == Class: privatecloud::image
# == Class: cloud::image
#
# Install Image Server (Glance)
#
@ -56,7 +56,7 @@
# Default value in params
#
class privatecloud::image(
class cloud::image(
$glance_db_host = $os_params::glance_db_host,
$glance_db_user = $os_params::glance_db_user,
$glance_db_password = $os_params::glance_db_password,

View File

@ -13,12 +13,12 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# Class: privatecloud
# Class: cloud
#
# Installs the private cloud system requirements
#
class privatecloud {
class cloud {
# motd
file

View File

@ -16,7 +16,7 @@
# HAproxy nodes
#
class privatecloud::loadbalancer(
class cloud::loadbalancer(
$ceilometer_api = true,
$cinder_api = true,
$glance_api = true,
@ -162,7 +162,7 @@ monitor fail if horizon_dead
}
if $keystone_api {
privatecloud::loadbalancer::listen_http {
cloud::loadbalancer::listen_http {
'keystone_api_cluster':
ports => $ks_keystone_public_port,
listen_ip => $openstack_vip;
@ -172,7 +172,7 @@ monitor fail if horizon_dead
}
}
if $swift_api {
privatecloud::loadbalancer::listen_http{
cloud::loadbalancer::listen_http{
'swift_api_cluster':
ports => $ks_swift_public_port,
httpchk => 'httpchk /healthcheck',
@ -180,28 +180,28 @@ monitor fail if horizon_dead
}
}
if $nova_api {
privatecloud::loadbalancer::listen_http{
cloud::loadbalancer::listen_http{
'nova_api_cluster':
ports => $ks_nova_public_port,
listen_ip => $openstack_vip;
}
}
if $ec2_api {
privatecloud::loadbalancer::listen_http{
cloud::loadbalancer::listen_http{
'ec2_api_cluster':
ports => $ks_ec2_public_port,
listen_ip => $openstack_vip;
}
}
if $metadata_api {
privatecloud::loadbalancer::listen_http{
cloud::loadbalancer::listen_http{
'metadata_api_cluster':
ports => $ks_metadata_public_port,
listen_ip => $openstack_vip;
}
}
if $spice {
privatecloud::loadbalancer::listen_http{
cloud::loadbalancer::listen_http{
'spice_cluster':
ports => $spice_port,
listen_ip => $openstack_vip,
@ -209,56 +209,56 @@ monitor fail if horizon_dead
}
}
if $glance_api {
privatecloud::loadbalancer::listen_http{
cloud::loadbalancer::listen_http{
'glance_api_cluster':
ports => $ks_glance_public_port,
listen_ip => $openstack_vip;
}
}
if $neutron_api {
privatecloud::loadbalancer::listen_http{
cloud::loadbalancer::listen_http{
'neutron_api_cluster':
ports => $ks_neutron_public_port,
listen_ip => $openstack_vip;
}
}
if $cinder_api {
privatecloud::loadbalancer::listen_http{
cloud::loadbalancer::listen_http{
'cinder_api_cluster':
ports => $ks_cinder_public_port,
listen_ip => $openstack_vip;
}
}
if $ceilometer_api {
privatecloud::loadbalancer::listen_http{
cloud::loadbalancer::listen_http{
'ceilometer_api_cluster':
ports => $ks_ceilometer_public_port,
listen_ip => $openstack_vip;
}
}
if $heat_api {
privatecloud::loadbalancer::listen_http{
cloud::loadbalancer::listen_http{
'heat_api_cluster':
ports => $ks_heat_public_port,
listen_ip => $openstack_vip;
}
}
if $heat_cfn_api {
privatecloud::loadbalancer::listen_http{
cloud::loadbalancer::listen_http{
'heat_api_cfn_cluster':
ports => $ks_heat_cfn_public_port,
listen_ip => $openstack_vip;
}
}
if $heat_cloudwatch_api {
privatecloud::loadbalancer::listen_http{
cloud::loadbalancer::listen_http{
'heat_api_cloudwatch_cluster':
ports => $ks_heat_cloudwatch_public_port,
listen_ip => $openstack_vip;
}
}
if $horizon {
privatecloud::loadbalancer::listen_http{
cloud::loadbalancer::listen_http{
'horizon_cluster':
ports => $horizon_port,
listen_ip => $openstack_vip;

View File

@ -15,9 +15,9 @@
#
# Define::
#
# privatecloud::loadbalancer::listen_http
# cloud::loadbalancer::listen_http
#
define privatecloud::loadbalancer::listen_http(
define cloud::loadbalancer::listen_http(
$ports = 'unset',
$httpchk = 'httpchk',
$listen_ip = '0.0.0.0') {

View File

@ -13,7 +13,7 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# == Class: privatecloud::messaging
# == Class: cloud::messaging
#
# Install Messsaging Server (RabbitMQ)
#
@ -28,7 +28,7 @@
# Default value in params
#
class privatecloud::messaging(
class cloud::messaging(
$rabbit_hosts = $os_params::rabbit_hosts,
$rabbit_names = $os_params::rabbit_names,
$rabbit_password = $os_params::rabbit_password

View File

@ -13,7 +13,7 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# == Class: privatecloud::network
# == Class: cloud::network
#
# Common class for network nodes
#
@ -40,7 +40,7 @@
# Default value in params
#
class privatecloud::network(
class cloud::network(
$verbose = $os_params::verbose,
$debug = $os_params::debug,
$rabbit_hosts = $os_params::rabbit_hosts,

View File

@ -16,13 +16,13 @@
# Network Compute node (Agent)
#
class privatecloud::network::compute(
class cloud::network::compute(
$neutron_endpoint = $os_params::ks_neutron_admin_host,
$neutron_protocol = $os_params::ks_neutron_public_proto,
$neutron_password = $os_params::ks_neutron_password,
) {
include 'privatecloud::network'
include 'cloud::network'
class { 'nova::network::neutron':
neutron_admin_password => $neutron_password,

View File

@ -16,7 +16,7 @@
# Network Controller node (API + Scheduler)
#
class privatecloud::network::controller(
class cloud::network::controller(
$neutron_db_host = $os_params::neutron_db_host,
$neutron_db_user = $os_params::neutron_db_user,
$neutron_db_password = $os_params::neutron_db_password,
@ -29,7 +29,7 @@ class privatecloud::network::controller(
$public_cidr = $os_params::public_cidr
) {
include 'privatecloud::network'
include 'cloud::network'
$encoded_user = uriescape($neutron_db_user)
$encoded_password = uriescape($neutron_db_password)

View File

@ -16,11 +16,11 @@
# Network DHCP node
#
class privatecloud::network::dhcp(
class cloud::network::dhcp(
$debug = $os_params::debug
) {
include 'privatecloud::network'
include 'cloud::network'
class { 'neutron::agents::dhcp':
debug => $debug

View File

@ -16,12 +16,12 @@
# Network L3 node
#
class privatecloud::network::l3(
class cloud::network::l3(
$external_int = $os_params::external_int,
$debug = $os_params::debug,
) {
include 'privatecloud::network'
include 'cloud::network'
class { 'neutron::agents::l3':
debug => $debug,

View File

@ -16,11 +16,11 @@
# Network LBaaS node
#
class privatecloud::network::lbaas(
class cloud::network::lbaas(
$debug = $os_params::debug
) {
include 'privatecloud::network'
include 'cloud::network'
class { 'neutron::agents::lbaas':
debug => $debug,

View File

@ -17,7 +17,7 @@
# Could be managed by spof_node manifest
#
class privatecloud::network::metadata(
class cloud::network::metadata(
$enabled = true,
$debug = $os_params::debug,
$ks_neutron_password = $os_params::ks_neutron_password,
@ -28,7 +28,7 @@ class privatecloud::network::metadata(
$ks_keystone_admin_host = $os_params::ks_keystone_admin_host
) {
include 'privatecloud::network'
include 'cloud::network'
class { 'neutron::agents::metadata':
enabled => $enabled,

View File

@ -16,9 +16,9 @@
# Network VPNaaS node
#
class privatecloud::network::vpn{
class cloud::network::vpn{
include 'privatecloud::network'
include 'cloud::network'
class { 'neutron::agents::vpnaas': }

View File

@ -13,7 +13,7 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# == Class: privatecloud::object
# == Class: cloud::object
#
# Common class for object storage nodes
#
@ -24,7 +24,7 @@
# Default value in params
#
class privatecloud::object(
class cloud::object(
$swift_hash_suffix = $os_params::swift_hash_suffix
) {
@ -34,6 +34,6 @@ class privatecloud::object(
swift_hash_suffix => $swift_hash_suffix,
}
class {'privatecloud::object::tweaking': }
class {'cloud::object::tweaking': }
}

View File

@ -16,7 +16,7 @@
# Swift Proxy node
#
class privatecloud::object::controller(
class cloud::object::controller(
$ks_keystone_admin_host = $os_params::ks_keystone_admin_host,
$ks_keystone_admin_port = $os_params::ks_keystone_admin_port,
$ks_keystone_internal_host = $os_params::ks_keystone_internal_host,
@ -30,7 +30,7 @@ class privatecloud::object::controller(
$api_eth = $os_params::api_eth,
) {
include 'privatecloud::object'
include 'cloud::object'
class { 'swift::proxy':
proxy_local_net_ip => $api_eth,

View File

@ -16,7 +16,7 @@
# Swift ring builder node
#
class privatecloud::object::ringbuilder(
class cloud::object::ringbuilder(
$rsyncd_ipaddress = ipaddress_eth0,
$replicas = $os_params::replicas,
$swift_rsync_max_connections = $os_params::swift_rsync_max_connections,
@ -26,7 +26,7 @@ class privatecloud::object::ringbuilder(
Ring_container_device <<| |>>
Ring_account_device <<| |>>
Class['swift'] -> Class['privatecloud::object::ringbuilder']
Class['swift'] -> Class['cloud::object::ringbuilder']
swift::ringbuilder::create{ ['account', 'container']:
part_power => 9,

View File

@ -27,7 +27,7 @@ define set_io_scheduler(){
}
# swift storage
class privatecloud::object::storage (
class cloud::object::storage (
$storage_eth = $os_params::storage_eth,
$swift_zone = undef,
$object_port = '6000',
@ -36,7 +36,7 @@ class privatecloud::object::storage (
$onloopdevices = false,
) {
include 'privatecloud::object'
include 'cloud::object'
class { 'swift::storage':
storage_local_net_ip => $storage_eth,

View File

@ -16,7 +16,7 @@
# Swift tweaking
#
class privatecloud::object::tweaking {
class cloud::object::tweaking {
file {'/etc/sysctl.d/swift-tuning.conf':
content => "
# disable TIME_WAIT.. wait..

View File

@ -16,7 +16,7 @@
# Orchestration common node
#
class privatecloud::orchestration(
class cloud::orchestration(
$ks_keystone_internal_host = $os_params::ks_keystone_internal_host,
$ks_keystone_internal_port = $os_params::ks_keystone_internal_port,
$ks_keystone_internal_proto = $os_params::ks_keystone_internal_proto,

View File

@ -16,14 +16,14 @@
# Orchestration APIs node
#
class privatecloud::orchestration::api(
class cloud::orchestration::api(
$ks_heat_internal_port = $os_params::ks_heat_internal_port,
$ks_heat_cfn_internal_port = $os_params::ks_heat_cfn_internal_port,
$ks_heat_cloudwatch_internal_port = $os_params::ks_heat_cloudwatch_internal_port,
$api_eth = $os_params::api_eth,
) {
include 'privatecloud::orchestration'
include 'cloud::orchestration'
class { 'heat::api':
bind_host => $api_eth,

View File

@ -17,7 +17,7 @@
# Could be managed by spof node as Active / Passive.
#
class privatecloud::orchestration::engine(
class cloud::orchestration::engine(
$enabled = true,
$ks_heat_public_host = $os_params::ks_heat_public_host,
$ks_heat_public_proto = $os_params::ks_heat_public_proto,
@ -27,7 +27,7 @@ class privatecloud::orchestration::engine(
$auth_encryption_key = $os_params::heat_auth_encryption_key
) {
include 'privatecloud::orchestration'
include 'cloud::orchestration'
class { 'heat::engine':
enabled => $enabled,

View File

@ -13,7 +13,7 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# == Class: privatecloud::spof
# == Class: cloud::spof
#
# Install all SPOF services in active / passive with Pacemaker / Corosync
#
@ -28,7 +28,7 @@
# Default to '239.1.1.2'.
#
class privatecloud::spof(
class cloud::spof(
$cluster_ip = $os_params::cluster_ip,
$multicast_address = '239.1.1.2'
) {
@ -54,7 +54,7 @@ class privatecloud::spof(
Package['corosync'] ->
file { '/usr/lib/ocf/resource.d/heartbeat/ceilometer-agent-central':
source => 'puppet:///modules/privatecloud/heartbeat/ceilometer-agent-central',
source => 'puppet:///modules/cloud/heartbeat/ceilometer-agent-central',
mode => '0755',
owner => 'root',
group => 'root',
@ -78,7 +78,7 @@ class privatecloud::spof(
Package['corosync'] ->
file { '/usr/lib/ocf/resource.d/heartbeat/neutron-metadata-agent':
source => 'puppet:///modules/privatecloud/heartbeat/neutron-metadata-agent',
source => 'puppet:///modules/cloud/heartbeat/neutron-metadata-agent',
mode => '0755',
owner => 'root',
group => 'root',
@ -102,7 +102,7 @@ class privatecloud::spof(
Package['corosync'] ->
file { '/usr/lib/ocf/resource.d/heartbeat/heat-engine':
source => 'puppet:///modules/privatecloud/heartbeat/heat-engine',
source => 'puppet:///modules/cloud/heartbeat/heat-engine',
mode => '0755',
owner => 'root',
group => 'root',
@ -125,15 +125,15 @@ class privatecloud::spof(
}
# Run OpenStack SPOF service and disable them since they will be managed by Corosync.
class { 'privatecloud::network::metadata':
class { 'cloud::network::metadata':
enabled => false,
}
class { 'privatecloud::orchestration::engine':
class { 'cloud::orchestration::engine':
enabled => false,
}
class { 'privatecloud::telemetry::centralagent':
class { 'cloud::telemetry::centralagent':
enabled => false,
}

View File

@ -14,7 +14,7 @@
# under the License.
#
class privatecloud::storage::rbd (
class cloud::storage::rbd (
$fsid = $os_params::ceph_fsid,
$cluster_network = $os_params::ceph_cluster_network,
$public_network = $os_params::ceph_public_network

View File

@ -14,13 +14,13 @@
# under the License.
#
class privatecloud::storage::rbd::monitor (
class cloud::storage::rbd::monitor (
$id = $::uniqueid,
$mon_addr = $::ipaddress_eth0,
$monitor_secret = $os_params::ceph_mon_secret
) {
include 'privatecloud::storage::rbd'
include 'cloud::storage::rbd'
ceph::mon { $id:
monitor_secret => $monitor_secret,

View File

@ -13,13 +13,13 @@
# License for the specific language governing permissions and limitations
# under the License.
#
class privatecloud::storage::rbd::osd (
class cloud::storage::rbd::osd (
$public_address = $::ipaddress_eth0,
$cluster_address = $::ipaddress_eth0,
$devices = ['sdb','sdc'],
) {
include 'privatecloud::storage::rbd'
include 'cloud::storage::rbd'
class { 'ceph::osd' :
public_address => $public_address,

View File

@ -13,7 +13,7 @@
# License for the specific language governing permissions and limitations
# under the License.
#
class privatecloud::storage::rbd::pools(
class cloud::storage::rbd::pools(
$setup_pools = false,
$glance_pool = 'ceph_glance',
$glance_user = 'glance',
@ -70,7 +70,7 @@ osd 'allow class-read object_prefix rbd_children, allow rwx pool=${glance_pool},
# }
@@file { '/etc/ceph/secret.xml':
content => template('privatecloud/storage/ceph/secret-compute.xml.erb'),
content => template('cloud/storage/ceph/secret-compute.xml.erb'),
tag => 'ceph_compute_secret_file',
}

View File

@ -16,7 +16,7 @@
# Used by Controller, Storage, Network and Compute nodes
#
class privatecloud::telemetry(
class cloud::telemetry(
$ceilometer_secret = $os_params::ceilometer_secret,
$rabbit_hosts = $os_params::rabbit_hosts,
$rabbit_password = $os_params::rabbit_password,

View File

@ -17,11 +17,11 @@
# Could be managed by spof node as Active / Passive.
#
class privatecloud::telemetry::centralagent(
class cloud::telemetry::centralagent(
$enabled = true,
){
include 'privatecloud::telemetry'
include 'cloud::telemetry'
class { 'ceilometer::agent::central':
enabled => $enabled,

View File

@ -16,7 +16,7 @@
# Telemetry server nodes
#
class privatecloud::telemetry::server(
class cloud::telemetry::server(
$ks_keystone_internal_host = $os_params::ks_keystone_internal_host,
$ks_keystone_internal_proto = $os_params::ks_keystone_internal_proto,
$ks_ceilometer_internal_port = $os_params::ks_ceilometer_internal_port,
@ -25,7 +25,7 @@ class privatecloud::telemetry::server(
$api_eth = $os_params::api_eth,
){
include 'privatecloud::telemetry'
include 'cloud::telemetry'
# Install MongoDB database
class { 'ceilometer::db':

View File

@ -16,7 +16,7 @@
# Volume Common
#
class privatecloud::volume(
class cloud::volume(
$cinder_db_host = $os_params::cinder_db_host,
$cinder_db_user = $os_params::cinder_db_user,
$cinder_db_password = $os_params::cinder_db_password,

View File

@ -16,7 +16,7 @@
# Volume controller
#
class privatecloud::volume::controller(
class cloud::volume::controller(
$ks_cinder_internal_port = $os_params::ks_cinder_internal_port,
$ks_cinder_password = $os_params::ks_cinder_password,
$ks_keystone_internal_host = $os_params::ks_keystone_internal_host,
@ -26,7 +26,7 @@ class privatecloud::volume::controller(
$backup_ceph_user = 'cinder'
) {
include 'privatecloud::volume'
include 'cloud::volume'
class { 'cinder::scheduler': }

View File

@ -16,14 +16,14 @@
# Volume storage
#
class privatecloud::volume::storage(
class cloud::volume::storage(
$glance_api_version = $os_params::glance_api_version,
$cinder_rbd_pool = 'ceph_cinder',
$cinder_rbd_user = 'cinder',
$cinder_rbd_secret_uuid = $os_params::cinder_rbd_secret_uuid,
) {
include 'privatecloud::volume'
include 'cloud::volume'
class { 'cinder::volume::rbd':
rbd_pool => $cinder_rbd_pool,

View File

@ -13,12 +13,12 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# Unit tests for privatecloud::cache
# Unit tests for cloud::cache
#
require 'spec_helper'
describe 'privatecloud::cache' do
describe 'cloud::cache' do
shared_examples_for 'cache server' do

View File

@ -13,17 +13,17 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# Unit tests for privatecloud::compute::controller class
# Unit tests for cloud::compute::controller class
#
require 'spec_helper'
describe 'privatecloud::compute::controller' do
describe 'cloud::compute::controller' do
shared_examples_for 'openstack compute controller' do
let :pre_condition do
"class { 'privatecloud::compute':
"class { 'cloud::compute':
nova_db_host => '10.0.0.1',
nova_db_user => 'nova',
nova_db_password => 'secrete',

View File

@ -13,17 +13,17 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# Unit tests for privatecloud::compute::hypervisor class
# Unit tests for cloud::compute::hypervisor class
#
require 'spec_helper'
describe 'privatecloud::compute::hypervisor' do
describe 'cloud::compute::hypervisor' do
shared_examples_for 'openstack compute hypervisor' do
let :pre_condition do
"class { 'privatecloud::compute':
"class { 'cloud::compute':
nova_db_host => '10.0.0.1',
nova_db_user => 'nova',
nova_db_password => 'secrete',

View File

@ -13,12 +13,12 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# Unit tests for privatecloud::dashboard class
# Unit tests for cloud::dashboard class
#
require 'spec_helper'
describe 'privatecloud::dashboard' do
describe 'cloud::dashboard' do
shared_examples_for 'openstack dashboard' do

View File

@ -13,12 +13,12 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# Unit tests for privatecloud::database:nosql class
# Unit tests for cloud::database:nosql class
#
require 'spec_helper'
describe 'privatecloud::database::nosql' do
describe 'cloud::database::nosql' do
shared_examples_for 'openstack database nosql' do

View File

@ -13,12 +13,12 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# Unit tests for privatecloud::database::sql class
# Unit tests for cloud::database::sql class
#
require 'spec_helper'
describe 'privatecloud::database::sql' do
describe 'cloud::database::sql' do
shared_examples_for 'openstack database sql' do

View File

@ -13,12 +13,12 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# Unit tests for privatecloud::identity class
# Unit tests for cloud::identity class
#
require 'spec_helper'
describe 'privatecloud::identity' do
describe 'cloud::identity' do
shared_examples_for 'openstack identity' do

View File

@ -13,12 +13,12 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# Unit tests for privatecloud::image class
# Unit tests for cloud::image class
#
require 'spec_helper'
describe 'privatecloud::image' do
describe 'cloud::image' do
shared_examples_for 'openstack image' do

View File

@ -13,12 +13,12 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# Unit tests for privatecloud
# Unit tests for cloud
#
require 'spec_helper'
describe 'privatecloud' do
describe 'cloud' do
shared_examples_for 'private cloud node' do

View File

@ -13,12 +13,12 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# Unit tests for privatecloud::loadbalancer class
# Unit tests for cloud::loadbalancer class
#
require 'spec_helper'
describe 'privatecloud::loadbalancer' do
describe 'cloud::loadbalancer' do
shared_examples_for 'openstack loadbalancer' do

View File

@ -13,12 +13,12 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# Unit tests for privatecloud::messaging class
# Unit tests for cloud::messaging class
#
require 'spec_helper'
describe 'privatecloud::messaging' do
describe 'cloud::messaging' do
shared_examples_for 'openstack messaging' do

View File

@ -13,17 +13,17 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# Unit tests for privatecloud::network::compute class
# Unit tests for cloud::network::compute class
#
require 'spec_helper'
describe 'privatecloud::network::compute' do
describe 'cloud::network::compute' do
shared_examples_for 'openstack network compute' do
let :pre_condition do
"class { 'privatecloud::network':
"class { 'cloud::network':
rabbit_hosts => ['10.0.0.1'],
rabbit_password => 'secrete',
tunnel_eth => '10.0.1.1',

View File

@ -13,17 +13,17 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# Unit tests for privatecloud::network::controller class
# Unit tests for cloud::network::controller class
#
require 'spec_helper'
describe 'privatecloud::network::controller' do
describe 'cloud::network::controller' do
shared_examples_for 'openstack network controller' do
let :pre_condition do
"class { 'privatecloud::network':
"class { 'cloud::network':
rabbit_hosts => ['10.0.0.1'],
rabbit_password => 'secrete',
tunnel_eth => '10.0.1.1',

View File

@ -13,17 +13,17 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# Unit tests for privatecloud::network::dhcp class
# Unit tests for cloud::network::dhcp class
#
require 'spec_helper'
describe 'privatecloud::network::dhcp' do
describe 'cloud::network::dhcp' do
shared_examples_for 'openstack network dhcp' do
let :pre_condition do
"class { 'privatecloud::network':
"class { 'cloud::network':
rabbit_hosts => ['10.0.0.1'],
rabbit_password => 'secrete',
tunnel_eth => '10.0.1.1',

View File

@ -13,17 +13,17 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# Unit tests for privatecloud::network::l3 class
# Unit tests for cloud::network::l3 class
#
require 'spec_helper'
describe 'privatecloud::network::l3' do
describe 'cloud::network::l3' do
shared_examples_for 'openstack network l3' do
let :pre_condition do
"class { 'privatecloud::network':
"class { 'cloud::network':
rabbit_hosts => ['10.0.0.1'],
rabbit_password => 'secrete',
tunnel_eth => '10.0.1.1',

View File

@ -13,17 +13,17 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# Unit tests for privatecloud::network::lbaas class
# Unit tests for cloud::network::lbaas class
#
require 'spec_helper'
describe 'privatecloud::network::lbaas' do
describe 'cloud::network::lbaas' do
shared_examples_for 'openstack network lbaas' do
let :pre_condition do
"class { 'privatecloud::network':
"class { 'cloud::network':
rabbit_hosts => ['10.0.0.1'],
rabbit_password => 'secrete',
tunnel_eth => '10.0.1.1',

View File

@ -13,17 +13,17 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# Unit tests for privatecloud::network::metadata class
# Unit tests for cloud::network::metadata class
#
require 'spec_helper'
describe 'privatecloud::network::metadata' do
describe 'cloud::network::metadata' do
shared_examples_for 'openstack network metadata' do
let :pre_condition do
"class { 'privatecloud::network':
"class { 'cloud::network':
rabbit_hosts => ['10.0.0.1'],
rabbit_password => 'secrete',
tunnel_eth => '10.0.1.1',

View File

@ -13,17 +13,17 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# Unit tests for privatecloud::network::vpnaas class
# Unit tests for cloud::network::vpnaas class
#
require 'spec_helper'
describe 'privatecloud::network::vpn' do
describe 'cloud::network::vpn' do
shared_examples_for 'openstack network vpnaas' do
let :pre_condition do
"class { 'privatecloud::network':
"class { 'cloud::network':
rabbit_hosts => ['10.0.0.1'],
rabbit_password => 'secrete',
tunnel_eth => '10.0.1.1',

View File

@ -13,17 +13,17 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# Unit tests for privatecloud::orchestration::api class
# Unit tests for cloud::orchestration::api class
#
require 'spec_helper'
describe 'privatecloud::orchestration::api' do
describe 'cloud::orchestration::api' do
shared_examples_for 'openstack orchestration api' do
let :pre_condition do
"class { 'privatecloud::orchestration':
"class { 'cloud::orchestration':
rabbit_hosts => ['10.0.0.1'],
rabbit_password => 'secrete',
ks_keystone_internal_host => '10.0.0.1',

View File

@ -13,17 +13,17 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# Unit tests for privatecloud::orchestration::engine class
# Unit tests for cloud::orchestration::engine class
#
require 'spec_helper'
describe 'privatecloud::orchestration::engine' do
describe 'cloud::orchestration::engine' do
shared_examples_for 'openstack orchestration engine' do
let :pre_condition do
"class { 'privatecloud::orchestration':
"class { 'cloud::orchestration':
rabbit_hosts => ['10.0.0.1'],
rabbit_password => 'secrete',
ks_keystone_internal_host => '10.0.0.1',

View File

@ -13,17 +13,17 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# Unit tests for privatecloud::telemetry::server class
# Unit tests for cloud::telemetry::server class
#
require 'spec_helper'
describe 'privatecloud::telemetry::centralagent' do
describe 'cloud::telemetry::centralagent' do
shared_examples_for 'openstack telemetry central agent' do
let :pre_condition do
"class { 'privatecloud::telemetry':
"class { 'cloud::telemetry':
ceilometer_secret => 'secrete',
rabbit_hosts => ['10.0.0.1'],
rabbit_password => 'secrete',

View File

@ -13,17 +13,17 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# Unit tests for privatecloud::telemetry::server class
# Unit tests for cloud::telemetry::server class
#
require 'spec_helper'
describe 'privatecloud::telemetry::server' do
describe 'cloud::telemetry::server' do
shared_examples_for 'openstack telemetry server' do
let :pre_condition do
"class { 'privatecloud::telemetry':
"class { 'cloud::telemetry':
ceilometer_secret => 'secrete',
rabbit_hosts => ['10.0.0.1'],
rabbit_password => 'secrete',

View File

@ -13,17 +13,17 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# Unit tests for privatecloud::volume::controller class
# Unit tests for cloud::volume::controller class
#
require 'spec_helper'
describe 'privatecloud::volume::controller' do
describe 'cloud::volume::controller' do
shared_examples_for 'openstack volume controller' do
let :pre_condition do
"class { 'privatecloud::volume':
"class { 'cloud::volume':
cinder_db_host => '10.0.0.1',
cinder_db_user => 'cinder',
cinder_db_password => 'secrete',

View File

@ -13,17 +13,17 @@
# License for the specific language governing permissions and limitations
# under the License.
#
# Unit tests for privatecloud::volume::storage class
# Unit tests for cloud::volume::storage class
#
require 'spec_helper'
describe 'privatecloud::volume::storage' do
describe 'cloud::volume::storage' do
shared_examples_for 'openstack volume storage' do
let :pre_condition do
"class { 'privatecloud::volume':
"class { 'cloud::volume':
cinder_db_host => '10.0.0.1',
cinder_db_user => 'cinder',
cinder_db_password => 'secrete',

View File

@ -1,5 +1,5 @@
# MANAGED BY PUPPET
# Module:: privatecloud::database::sql
# Module:: cloud::database::sql
#
[mysqld]
max_connections = 1000