From d6d256a293da043076351c62146228ed5bd4dfbc Mon Sep 17 00:00:00 2001 From: Silvio Rhatto Date: Thu, 7 May 2020 20:58:21 -0300 Subject: Hiera 5 migration --- manifests/subsystem/sysctl/appliance.pp | 2 +- manifests/subsystem/sysctl/disable_ipv6.pp | 2 +- manifests/subsystem/sysctl/tcp_challenge_ack_limit.pp | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) (limited to 'manifests/subsystem/sysctl') diff --git a/manifests/subsystem/sysctl/appliance.pp b/manifests/subsystem/sysctl/appliance.pp index 23b1e96..2657542 100644 --- a/manifests/subsystem/sysctl/appliance.pp +++ b/manifests/subsystem/sysctl/appliance.pp @@ -1,4 +1,4 @@ -class nodo::subsystem::sysctl::appliance($kernel_panic = hiera('nodo::sysctl::appliance', '20')) { +class nodo::subsystem::sysctl::appliance($kernel_panic = lookup('nodo::sysctl::appliance', undef, undef, '20')) { file { "/etc/sysctl.d/kernel.panic.conf": owner => "root", group => "root", diff --git a/manifests/subsystem/sysctl/disable_ipv6.pp b/manifests/subsystem/sysctl/disable_ipv6.pp index 2404d8f..2c384c3 100644 --- a/manifests/subsystem/sysctl/disable_ipv6.pp +++ b/manifests/subsystem/sysctl/disable_ipv6.pp @@ -1,7 +1,7 @@ # Do not enable ipv6 by default # See https://wiki.debian.org/DebianIPv6 class nodo::subsystem::sysctl::disable_ipv6( - $ensure = hiera('nodo::sysctl::disable_ipv6', 'present'), + $ensure = lookup('nodo::sysctl::disable_ipv6', undef, undef, 'present'), ) { file { "/etc/sysctl.d/disable_ipv6.conf": owner => "root", diff --git a/manifests/subsystem/sysctl/tcp_challenge_ack_limit.pp b/manifests/subsystem/sysctl/tcp_challenge_ack_limit.pp index c1f6650..ca90e27 100644 --- a/manifests/subsystem/sysctl/tcp_challenge_ack_limit.pp +++ b/manifests/subsystem/sysctl/tcp_challenge_ack_limit.pp @@ -3,7 +3,7 @@ # http://coolnerd.co/2016/08/researchers-announce-linux-kernel-network-snooping-bug-naked-security/ # https://nakedsecurity.sophos.com/2016/08/12/researchers-announce-linux-kernel-network-snooping-bug/ class nodo::subsystem::sysctl::tcp_challenge_ack_limit( - $ensure = hiera('nodo::sysctl::tcp_challenge_ack_limit', 'present'), + $ensure = lookup('nodo::sysctl::tcp_challenge_ack_limit', undef, undef, 'present'), ) { file { "/etc/sysctl.d/tcp_challenge_ack_limit.conf": owner => "root", -- cgit v1.2.3