aboutsummaryrefslogtreecommitdiff
path: root/manifests/subsystem/sysctl
diff options
context:
space:
mode:
Diffstat (limited to 'manifests/subsystem/sysctl')
-rw-r--r--manifests/subsystem/sysctl/appliance.pp2
-rw-r--r--manifests/subsystem/sysctl/disable_ipv6.pp2
-rw-r--r--manifests/subsystem/sysctl/tcp_challenge_ack_limit.pp2
3 files changed, 3 insertions, 3 deletions
diff --git a/manifests/subsystem/sysctl/appliance.pp b/manifests/subsystem/sysctl/appliance.pp
index 23b1e96..2657542 100644
--- a/manifests/subsystem/sysctl/appliance.pp
+++ b/manifests/subsystem/sysctl/appliance.pp
@@ -1,4 +1,4 @@
-class nodo::subsystem::sysctl::appliance($kernel_panic = hiera('nodo::sysctl::appliance', '20')) {
+class nodo::subsystem::sysctl::appliance($kernel_panic = lookup('nodo::sysctl::appliance', undef, undef, '20')) {
file { "/etc/sysctl.d/kernel.panic.conf":
owner => "root",
group => "root",
diff --git a/manifests/subsystem/sysctl/disable_ipv6.pp b/manifests/subsystem/sysctl/disable_ipv6.pp
index 2404d8f..2c384c3 100644
--- a/manifests/subsystem/sysctl/disable_ipv6.pp
+++ b/manifests/subsystem/sysctl/disable_ipv6.pp
@@ -1,7 +1,7 @@
# Do not enable ipv6 by default
# See https://wiki.debian.org/DebianIPv6
class nodo::subsystem::sysctl::disable_ipv6(
- $ensure = hiera('nodo::sysctl::disable_ipv6', 'present'),
+ $ensure = lookup('nodo::sysctl::disable_ipv6', undef, undef, 'present'),
) {
file { "/etc/sysctl.d/disable_ipv6.conf":
owner => "root",
diff --git a/manifests/subsystem/sysctl/tcp_challenge_ack_limit.pp b/manifests/subsystem/sysctl/tcp_challenge_ack_limit.pp
index c1f6650..ca90e27 100644
--- a/manifests/subsystem/sysctl/tcp_challenge_ack_limit.pp
+++ b/manifests/subsystem/sysctl/tcp_challenge_ack_limit.pp
@@ -3,7 +3,7 @@
# http://coolnerd.co/2016/08/researchers-announce-linux-kernel-network-snooping-bug-naked-security/
# https://nakedsecurity.sophos.com/2016/08/12/researchers-announce-linux-kernel-network-snooping-bug/
class nodo::subsystem::sysctl::tcp_challenge_ack_limit(
- $ensure = hiera('nodo::sysctl::tcp_challenge_ack_limit', 'present'),
+ $ensure = lookup('nodo::sysctl::tcp_challenge_ack_limit', undef, undef, 'present'),
) {
file { "/etc/sysctl.d/tcp_challenge_ack_limit.conf":
owner => "root",