X-Git-Url: https://git.immae.eu/?a=blobdiff_plain;f=environments%2Fglobal%2Fcommon.yaml;h=2f2db3532110df096b70402452578d7d0648e91c;hb=3c90c9020fc4e0257fa4c73f14e609e3559b3771;hp=591119498fb088bac7d53fb60b45a429d6415d67;hpb=f4c9ed4c0a32082d8f7b60cee1eb33cb05c85a1c;p=perso%2FImmae%2FProjets%2FPuppet.git diff --git a/environments/global/common.yaml b/environments/global/common.yaml index 5911194..2f2db35 100644 --- a/environments/global/common.yaml +++ b/environments/global/common.yaml @@ -1,6 +1,6 @@ --- lookup_options: - base_installation::mounts: + profile::fstab::mounts: merge: unique classes: merge: deep @@ -8,6 +8,10 @@ lookup_options: merge: unique letsencrypt::hosts: merge: unique + role::backup::backups: + merge: unique + profile::known_hosts::hosts: + merge: unique classes: stdlib: ~ @@ -17,18 +21,21 @@ base_installation::ldap_dn: "cn=%{facts.ec2_metadata.hostname},ou=hosts,dc=immae base_installation::ldap_cn: "%{facts.ec2_metadata.hostname}" base_installation::ldap_server: "ldap.immae.eu" base_installation::ldap_uri: "ldaps://ldap.immae.eu" -# FIXME: get all mounts without needing that hack? -base_installation::mounts: - - "%{facts.ldapvar.self.vars.mounts.0}" - - "%{facts.ldapvar.self.vars.mounts.1}" base_installation::puppet_conf_path: "/etc/puppetlabs/puppet" +base_installation::puppet_notifies_path: "/etc/puppetlabs/notifies" base_installation::puppet_code_path: "/etc/puppetlabs/code" base_installation::puppet_pass_seed: "/etc/puppetlabs/puppet/password_seed" base_installation::puppet_ssl_path: "/etc/puppetlabs/ssl" base_installation::system_locales: ["fr_FR.UTF-8", "en_US.UTF-8"] base_installation::system_timezone: "Europe/Paris" base_installation::system_users: [] # Fetched via ldap -profile::xmr_stak::mining_pool: "" # Fetched via ldap -profile::xmr_stak::wallet: "" # Fetched via ldap +base_installation::notify_xmpp: {} +profile::fstab::mounts: [] +profile::xmr_stak::mining_pool: "" +profile::xmr_stak::wallet: "" +profile::mail::mailhub: "" # Fetched via ldap +role::backup::mailto: "" # Fetched via ldap +role::backup::backups: [] # Fetched via ldap +profile::known_hosts::hosts: [] # Fetched via ldap letsencrypt::email: ~ # Fetched via ldap letsencrypt::try_for_real_hostname: true