diff options
| author | varac <varacanero@zeromail.org> | 2016-04-28 13:48:06 +0200 | 
|---|---|---|
| committer | varac <varacanero@zeromail.org> | 2016-05-17 11:40:26 +0200 | 
| commit | 112e8e98bca4a11a068cc771e41d4b819da4ef52 (patch) | |
| tree | ae8136d9d1300b634593aa2522c6d35f579b9daa | |
| parent | a5809e45e1f8d34c88713b3c7782a4e78bb50c51 (diff) | |
[lint] make future parser happy
| -rw-r--r-- | puppet/modules/site_nagios/manifests/server.pp | 2 | ||||
| -rw-r--r-- | puppet/modules/site_openvpn/manifests/server_config.pp | 8 | 
2 files changed, 5 insertions, 5 deletions
| diff --git a/puppet/modules/site_nagios/manifests/server.pp b/puppet/modules/site_nagios/manifests/server.pp index aa9b956e..6537124d 100644 --- a/puppet/modules/site_nagios/manifests/server.pp +++ b/puppet/modules/site_nagios/manifests/server.pp @@ -59,7 +59,7 @@ class site_nagios::server inherits nagios::base {    include site_webapp::common_vhost    include apache::module::headers -  File ['nagios_htpasswd'] { +  File['nagios_htpasswd'] {      source  => undef,      content => "nagiosadmin:${nagiosadmin_pw}",      mode    => '0640', diff --git a/puppet/modules/site_openvpn/manifests/server_config.pp b/puppet/modules/site_openvpn/manifests/server_config.pp index 6decc665..15e6fb38 100644 --- a/puppet/modules/site_openvpn/manifests/server_config.pp +++ b/puppet/modules/site_openvpn/manifests/server_config.pp @@ -30,7 +30,7 @@  # auth SHA1  #  #   dkg: For HMAC digest to authenticate packets, we just want SHA256. OpenVPN lists -#   a number of “digest” with names like “RSA-SHA256”, but this are legacy and +#   a number of "digest" with names like "RSA-SHA256", but this are legacy and  #   should be avoided.  #  #   elijah: i am not so sure that the digest algo matters for 'auth' option, because @@ -40,14 +40,14 @@  # cipher AES-128-CBC  #  #   dkg: For the choice of cipher, we need to select an algorithm and a -#   cipher mode. OpenVPN defaults to Blowfish, which is a fine algorithm — but +#   cipher mode. OpenVPN defaults to Blowfish, which is a fine algorithm - but  #   our control channel is already relying on AES not being broken; if the  #   control channel is cracked, then the key material for the tunnel is exposed,  #   and the choice of algorithm is moot. So it makes more sense to me to rely on  #   the same cipher here: AES128. As for the cipher mode, OFB seems cleaner to  #   me, but CBC is more well-tested, and the OpenVPN man page (at least as of -#   version 2.2.1) says “CBC is recommended and CFB and OFB should be considered -#   advanced modes.” +#   version 2.2.1) says "CBC is recommended and CFB and OFB should be considered +#   advanced modes."  #  #   note: the default is BF-CBC (blowfish)  # | 
