Dzahn has uploaded a new change for review.

  https://gerrit.wikimedia.org/r/54608


Change subject: puppet-lint: fix "unquoted file mode" and "unquoted resource 
title" warnings
......................................................................

puppet-lint: fix "unquoted file mode" and "unquoted resource title" warnings

Change-Id: I859cf5d2b091e1eae5f48fa772ea2975cf07bdc6
---
M manifests/misc/icinga.pp
1 file changed, 250 insertions(+), 250 deletions(-)


  git pull ssh://gerrit.wikimedia.org:29418/operations/puppet 
refs/changes/08/54608/1

diff --git a/manifests/misc/icinga.pp b/manifests/misc/icinga.pp
index 0bd43f1..24763f9 100644
--- a/manifests/misc/icinga.pp
+++ b/manifests/misc/icinga.pp
@@ -1,7 +1,7 @@
 # misc/icinga.pp
 
 class icinga::user {
-       systemuser { icinga: name => "icinga", home => "/home/icinga", groups 
=> [ "icinga", "dialout", "nagios" ] }
+       systemuser { 'icinga': name => "icinga", home => "/home/icinga", groups 
=> [ "icinga", "dialout", "nagios" ] }
 }
 
 class icinga::monitor {
@@ -76,16 +76,16 @@
        file {
                "/usr/share/icinga/htdocs/images/logos/ubuntu.png":
                        source => "puppet:///files/icinga/ubuntu.png",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner  => 'root',
+                       group  => 'root',
+                       mode   => '0644';
 
                # install the icinga Apache site
                "/etc/apache2/sites-available/icinga.wikimedia.org":
                        ensure => present,
-                       owner => root,
-                       group => root,
-                       mode => 0444,
+                       owner  => 'root',
+                       group  => 'root',
+                       mode   => '0444',
                        content => 
template("apache/sites/icinga.wikimedia.org.erb");
        }
 
@@ -97,7 +97,7 @@
                        ensure => absent;
        }
 
-       apache_site { icinga: name => "icinga.wikimedia.org" }
+       apache_site { 'icinga': name => "icinga.wikimedia.org" }
        install_certificate{ "star.wikimedia.org": }
 
 }
@@ -108,9 +108,9 @@
 
        file {"/usr/lib/nagios/plugins/check_to_check_nagios_paging":
                source => "puppet:///files/nagios/check_to_check_nagios_paging",
-               owner => root,
-               group => root,
-               mode => 0755;
+               owner  => 'root',
+               group  => 'root',
+               mode   => '0755';
        }
        monitor_service { "check_to_check_nagios_paging":
                description => "check_to_check_nagios_paging",
@@ -136,78 +136,78 @@
 
        file { "/etc/icinga/cgi.cfg":
                        source => "puppet:///files/icinga/cgi.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner  => 'root',
+                       group  => 'root',
+                       mode   => '0644';
 
                "/etc/icinga/icinga.cfg":
                        source => "puppet:///files/icinga/icinga.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner  => 'root',
+                       group  => 'root',
+                       mode   => '0644';
 
                "/etc/icinga/nsca_payments.cfg":
                        source => "puppet:///private/nagios/nsca_payments.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner  => 'root',
+                       group  => 'root',
+                       mode   => '0644';
 
                "/etc/icinga/htpasswd.users":
                        source => "puppet:///private/nagios/htpasswd.users",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner  => 'root',
+                       group  => 'root',
+                       mode   => '0644';
 
                # TEMP: analytics eqiad cluster manual entries.
                # These will be removed from this manually managed file
                # once analytics puppetization goes to production.
                "/etc/icinga/analytics.cfg":
                        content => template("icinga/analytics.cfg.erb"),
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner   => 'root',
+                       group   => 'root',
+                       mode    => '0644';
 
                "/etc/icinga/checkcommands.cfg":
                        content => template("icinga/checkcommands.cfg.erb"),
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner   => 'root',
+                       group   => 'root',
+                       mode    => '0644';
 
                "/etc/icinga/contactgroups.cfg":
                        source => "puppet:///files/nagios/contactgroups.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner  => 'root',
+                       group  => 'root',
+                       mode   => '0644';
 
                "/etc/icinga/contacts.cfg":
                        source => "puppet:///private/nagios/contacts.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner  => 'root',
+                       group  => 'root',
+                       mode   => '0644';
 
                "/etc/icinga/misccommands.cfg":
                        source => "puppet:///files/icinga/misccommands.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner  => 'root',
+                       group  => 'root',
+                       mode   => '0644';
 
                "/etc/icinga/resource.cfg":
                        source => "puppet:///files/icinga/resource.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner  => 'root',
+                       group  => 'root',
+                       mode   => '0644';
 
                "/etc/icinga/timeperiods.cfg":
                        source => "puppet:///files/nagios/timeperiods.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner  => 'root',
+                       group  => 'root',
+                       mode   => '0644';
 
                "/etc/init.d/icinga":
                        source => "puppet:///files/icinga/icinga-init",
-                       owner => root,
-                       group => root,
-                       mode => 0755;
+                       owner  => 'root',
+                       group  => 'root',
+                       mode   => '0755';
        }
 }
 
@@ -217,41 +217,41 @@
 
        file {
                "/etc/icinga/conf.d":
-                       owner => root,
-                       group => root,
-                       mode => 0755,
+                       owner  => 'root',
+                       group  => 'root',
+                       mode   => '0755',
                        ensure => directory;
 
                "/etc/nagios":
                        ensure => directory,
-                       owner => root,
-                       group => root,
-                       mode => 0755;
+                       owner  => 'root',
+                       group  => 'root',
+                       mode   => '0755';
 
                "/var/cache/icinga":
                        ensure => directory,
-                       owner => icinga,
-                       group => www-data,
-                       mode => 0775;
+                       owner  => 'icinga',
+                       group  => 'www-data',
+                       mode   => '0775';
 
                "/var/lib/nagios/rw":
                        ensure => directory,
-                       owner => icinga,
-                       group => nagios,
-                       mode => 0777;
+                       owner  => 'icinga',
+                       group  => 'nagios',
+                       mode   => '0777';
 
                "/var/lib/icinga":
                        ensure => directory,
-                       owner => icinga,
-                       group => www-data,
-                       mode => 0755;
+                       owner  => 'icinga',
+                       group  => 'www-data',
+                       mode   => '0755';
 
                # Script to purge resources for non-existent hosts
                 "/usr/local/sbin/purge-nagios-resources.py":
                        source => 
"puppet:///files/nagios/purge-nagios-resources.py",
-                       owner => root,
-                       group => root,
-                       mode => 0755;
+                       owner  => 'root',
+                       group  => 'root',
+                       mode   => '0755';
        }
 
        # fix permissions on all individual service files
@@ -279,298 +279,298 @@
 
        file {
                "/usr/lib/nagios":
-                       owner => root,
-                       group => root,
-                       mode => 0755,
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0755',
                        ensure => directory;
 
                "/usr/lib/nagios/plugins":
-                       owner => root,
-                       group => root,
-                       mode => 0755,
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0755',
                        ensure => directory;
 
                "/usr/lib/nagios/plugins/eventhandlers":
-                       owner => root,
-                       group => root,
-                       mode => 0755,
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0755',
                        ensure => directory;
 
                "/usr/lib/nagios/plugins/eventhandlers/submit_check_result":
                        source => "puppet:///files/icinga/submit_check_result",
-                       owner => root,
-                       group => root,
-                       mode => 0755;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0755';
 
                "/var/lib/nagios/rm":
                        owner => icinga,
                        group => nagios,
-                       mode => 0775,
+                       mode => '0775',
                        ensure => directory;
 
                "/etc/nagios-plugins":
-                       owner => root,
-                       group => root,
-                       mode => 0755,
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0755',
                        ensure => directory;
 
                "/etc/nagios-plugins/config":
-                       owner => root,
-                       group => root,
-                       mode => 0755,
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0755',
                        ensure => directory;
 
                "/etc/nagios-plugins/config/apt.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/apt.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/breeze.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/breeze.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/dhcp.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/dhcp.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/disk-smb.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/disk-smb.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/disk.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/disk.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/dns.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/dns.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/dummy.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/dummy.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/flexlm.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/flexlm.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/ftp.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/ftp.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/hppjd.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/hppjd.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/http.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/http.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/ifstatus.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/ifstatus.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/ldap.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/ldap.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/load.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/load.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/mail.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/mail.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/mrtg.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/mrtg.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/mysql.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/mysql.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/netware.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/netware.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/news.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/news.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/nt.cfg":
                        source => "puppet:///files/icinga/plugin-config/nt.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/ntp.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/ntp.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/pgsql.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/pgsql.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/ping.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/ping.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/procs.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/procs.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/radius.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/radius.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/real.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/real.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/rpc-nfs.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/rpc-nfs.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/snmp.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/snmp.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/ssh.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/ssh.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/tcp_udp.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/tcp_udp.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/telnet.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/telnet.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/users.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/users.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
 
                "/etc/nagios-plugins/config/vsz.cfg":
                        source => 
"puppet:///files/icinga/plugin-config/vsz.cfg",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
        }
 
        # WMF custom service checks
        file {
                "/usr/lib/nagios/plugins/check_mysql-replication.pl":
                        source => 
"puppet:///files/icinga/check_mysql-replication.pl",
-                       owner => root,
-                       group => root,
-                       mode => 0755;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0755';
                "/usr/lib/nagios/plugins/check_cert":
-                       owner => root,
-                       group => root,
-                       mode => 0755,
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0755',
                        source => "puppet:///files/icinga/check_cert";
                "/usr/lib/nagios/plugins/check_all_memcached.php":
                        source => 
"puppet:///files/icinga/check_all_memcached.php",
-                       owner => root,
-                       group => root,
-                       mode => 0755;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0755';
                "/usr/lib/nagios/plugins/check_bad_apaches":
                        source => "puppet:///files/icinga/check_bad_apaches",
-                       owner => root,
-                       group => root,
-                       mode => 0755;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0755';
                "/usr/lib/nagios/plugins/check_longqueries":
                        source => "puppet:///files/icinga/check_longqueries",
-                       owner => root,
-                       group => root,
-                       mode => 0755;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0755';
                "/usr/lib/nagios/plugins/check_MySQL.php":
                        source => "puppet:///files/icinga/check_MySQL.php",
-                       owner => root,
-                       group => root,
-                       mode => 0755;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0755';
                "/usr/lib/nagios/plugins/check_solr":
                        source => "puppet:///files/icinga/check_solr",
-                       owner => root,
-                       group => root,
-                       mode => 0755;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0755';
                "/usr/lib/nagios/plugins/check-ssl-cert":
                        source => "puppet:///files/icinga/check-ssl-cert",
-                       owner => root,
-                       group => root,
-                       mode => 0755;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0755';
                "/usr/lib/nagios/plugins/check_stomp.pl":
                        source => "puppet:///files/icinga/check_stomp.pl",
-                       owner => root,
-                       group => root,
-                       mode => 0755;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0755';
                "/usr/lib/nagios/plugins/check_nrpe":
                        source => "puppet:///files/icinga/check_nrpe",
-                       owner => root,
-                       group => root,
-                       mode => 0755;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0755';
        }
 
        # some default configuration files conflict and should be removed
@@ -637,9 +637,9 @@
 
        file {"/usr/lib/nagios/plugins/check_job_queue":
                source => "puppet:///files/nagios/check_job_queue",
-               owner => root,
-               group => root,
-               mode => 0755;
+               owner => 'root',
+               group => 'root',
+               mode => '0755';
        }
 
        monitor_service { "check_job_queue":
@@ -661,27 +661,27 @@
                "/etc/icinga/puppet_hosts.cfg":
                        content => generate('/usr/local/bin/naggen', 
'--stdout', '--type', 'host'),
                        backup => false,
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
                "/etc/icinga/puppet_services.cfg":
                        content => generate('/usr/local/bin/naggen', 
'--stdout', '--type', 'service'),
                        backup => false,
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
                "/etc/icinga/puppet_hostextinfo.cfg":
                        content => generate('/usr/local/bin/naggen', 
'--stdout', '--type', 'hostextinfo'),
                        backup => false,
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
        }
 
        # Fix permissions
 
        file { $icinga::monitor::configuration::variables::puppet_files:
-               mode => 0644,
+               mode => '0644',
                ensure => present;
        }
 
@@ -719,8 +719,8 @@
 
        file { "/etc/nsca.cfg":
                source => "puppet:///private/icinga/nsca.cfg",
-               owner => root,
-               mode => 0400;
+               owner => 'root',
+               mode => '0400';
        }
 
        service { "nsca":
@@ -762,43 +762,43 @@
 
        file { "/etc/snmp/snmptrapd.conf":
                        source => "puppet:///files/snmp/snmptrapd.conf.icinga",
-                       owner => root,
-                       group => root,
-                       mode => 0600;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0600';
               "/etc/snmp/snmptt.conf":
                        source => "puppet:///files/snmp/snmptt.conf.icinga",
-                       owner => root,
-                       group => root,
-                       mode => 0644;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0644';
               "/etc/init.d/snmptt":
                        source => "puppet:///files/snmp/snmptt.init",
-                       owner => root,
-                       group => root,
-                       mode => 0755;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0755';
                "/etc/init.d/snmptrapd":
                        source => "puppet:///files/snmp/snmptrapd.init",
-                       owner => root,
-                       group => root,
-                       mode => 0755;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0755';
                "/etc/init.d/snmpd":
                        source => "puppet:///files/snmp/snmpd.init",
-                       owner => root,
-                       group => root,
-                       mode => 0755;
+                       owner => 'root',
+                       group => 'root',
+                       mode => '0755';
        }
 
        # snmp tarp stuff
-       systemuser { snmptt: name => "snmptt", home => "/var/spool/snmptt", 
groups => [ "snmptt", "nagios" ] }
+       systemuser { 'snmptt': name => 'snmptt', home => '/var/spool/snmptt', 
groups => [ 'snmptt', 'nagios' ] }
 
-       package { "snmpd":
+       package { 'snmpd':
                ensure => latest;
        }
 
-       package { "snmptt":
+       package { 'snmptt':
                ensure => latest;
        }
 
-       service { snmptt:
+       service { 'snmptt':
                ensure => running,
                hasstatus => false,
                hasrestart => true,
@@ -807,14 +807,14 @@
                               File["/etc/snmp/snmptrapd.conf"]];
        }
 
-       service { snmptrapd:
+       service { 'snmptrapd':
                ensure => running,
                hasstatus => false,
                subscribe => [ File["/etc/init.d/snmptrapd"],
                               File["/etc/snmp/snmptrapd.conf"]];
        }
 
-       service { snmpd:
+       service { 'snmpd':
                ensure => running,
                hasstatus => false,
                subscribe => File["/etc/init.d/snmpd"];
@@ -846,7 +846,7 @@
        }
        file { "/var/lib/ganglia/xmlcache":
                ensure => directory,
-               mode => 0755,
+               mode => '0755',
                owner => icinga;
        }
 }

-- 
To view, visit https://gerrit.wikimedia.org/r/54608
To unsubscribe, visit https://gerrit.wikimedia.org/r/settings

Gerrit-MessageType: newchange
Gerrit-Change-Id: I859cf5d2b091e1eae5f48fa772ea2975cf07bdc6
Gerrit-PatchSet: 1
Gerrit-Project: operations/puppet
Gerrit-Branch: production
Gerrit-Owner: Dzahn <[email protected]>

_______________________________________________
MediaWiki-commits mailing list
[email protected]
https://lists.wikimedia.org/mailman/listinfo/mediawiki-commits

Reply via email to