diff options
Diffstat (limited to 'manifests/subsystem/sysctl')
-rw-r--r-- | manifests/subsystem/sysctl/appliance.pp | 2 | ||||
-rw-r--r-- | manifests/subsystem/sysctl/disable_ipv6.pp | 2 | ||||
-rw-r--r-- | manifests/subsystem/sysctl/tcp_challenge_ack_limit.pp | 2 |
3 files changed, 3 insertions, 3 deletions
diff --git a/manifests/subsystem/sysctl/appliance.pp b/manifests/subsystem/sysctl/appliance.pp index 23b1e96..2657542 100644 --- a/manifests/subsystem/sysctl/appliance.pp +++ b/manifests/subsystem/sysctl/appliance.pp @@ -1,4 +1,4 @@ -class nodo::subsystem::sysctl::appliance($kernel_panic = hiera('nodo::sysctl::appliance', '20')) { +class nodo::subsystem::sysctl::appliance($kernel_panic = lookup('nodo::sysctl::appliance', undef, undef, '20')) { file { "/etc/sysctl.d/kernel.panic.conf": owner => "root", group => "root", diff --git a/manifests/subsystem/sysctl/disable_ipv6.pp b/manifests/subsystem/sysctl/disable_ipv6.pp index 2404d8f..2c384c3 100644 --- a/manifests/subsystem/sysctl/disable_ipv6.pp +++ b/manifests/subsystem/sysctl/disable_ipv6.pp @@ -1,7 +1,7 @@ # Do not enable ipv6 by default # See https://wiki.debian.org/DebianIPv6 class nodo::subsystem::sysctl::disable_ipv6( - $ensure = hiera('nodo::sysctl::disable_ipv6', 'present'), + $ensure = lookup('nodo::sysctl::disable_ipv6', undef, undef, 'present'), ) { file { "/etc/sysctl.d/disable_ipv6.conf": owner => "root", diff --git a/manifests/subsystem/sysctl/tcp_challenge_ack_limit.pp b/manifests/subsystem/sysctl/tcp_challenge_ack_limit.pp index c1f6650..ca90e27 100644 --- a/manifests/subsystem/sysctl/tcp_challenge_ack_limit.pp +++ b/manifests/subsystem/sysctl/tcp_challenge_ack_limit.pp @@ -3,7 +3,7 @@ # http://coolnerd.co/2016/08/researchers-announce-linux-kernel-network-snooping-bug-naked-security/ # https://nakedsecurity.sophos.com/2016/08/12/researchers-announce-linux-kernel-network-snooping-bug/ class nodo::subsystem::sysctl::tcp_challenge_ack_limit( - $ensure = hiera('nodo::sysctl::tcp_challenge_ack_limit', 'present'), + $ensure = lookup('nodo::sysctl::tcp_challenge_ack_limit', undef, undef, 'present'), ) { file { "/etc/sysctl.d/tcp_challenge_ack_limit.conf": owner => "root", |