diff --git a/.gitignore b/.gitignore index c023fa3..4be519e 100644 --- a/.gitignore +++ b/.gitignore @@ -1,17 +1,16 @@ .bundle/ .idea/ .project .travis/secrets.tar .vagrant/ .yardoc/ *.iml *.swn *.swo *.swp Gemfile.lock coverage/ -doc/ pkg/ spec/fixtures/ vendor/ log/ diff --git a/circle.yml b/circle.yml index 0b37638..97b5da7 100644 --- a/circle.yml +++ b/circle.yml @@ -1,52 +1,51 @@ --- branches: ignore: - gh-pages # list of branches to ignore dependencies: bundler: without: [development] cache_directories: - "~/.rvm/gems" override: - bundle install --without development: timeout: 240 environment: PUPPET_GEM_VERSION: '~> 4.0' STRICT_VARIABLES: yes post: - rvm cleanup all deployment: master: branch: master commands: - git config --global user.email "info@locp.co.uk" - git config --global user.name "CircleCI" - - bundle exec rake strings:gh_pages:update - ./scripts/circle.bash deploy machine: environment: BEAKER_GEM_VERSION: '<= 2.33.0' PUPPET_GEM_VERSION: '~> 4.0' STRICT_VARIABLES: yes ruby: version: 2.3.1 services: - docker notify: webhooks: - url: "https://webhooks.gitter.im/e/da8c065419a91983f0cf" test: override: - bundle exec rake metadata_lint: parallel: true - bundle exec rake rubocop: parallel: true - bundle exec rake lint: parallel: true - bundle exec rake validate: parallel: true - bundle exec rake spec SPEC_OPTS="--format RspecJunitFormatter -o $CIRCLE_TEST_REPORTS/rspec/puppet.xml": parallel: true - ./scripts/circle.bash acceptance_tests: parallel: true diff --git a/doc/_index.html b/doc/_index.html new file mode 100644 index 0000000..96a166e --- /dev/null +++ b/doc/_index.html @@ -0,0 +1,208 @@ + + + + + + + Documentation by YARD 0.9.5 + + + + + + + + + + + + + + + + + + + +
+ + + + +

Documentation by YARD 0.9.5

+
+

Alphabetic Index

+ +

Puppet Class Listing A-Z

+ + + + + + +
+ + + + +
+ + +

Defined Type Listing A-Z

+ + + + + + +
+ + + + +
+ + + + + +

File Listing

+ + +
+ + +
+ +
+ + + +
+ + \ No newline at end of file diff --git a/doc/css/common.css b/doc/css/common.css new file mode 100644 index 0000000..cf25c45 --- /dev/null +++ b/doc/css/common.css @@ -0,0 +1 @@ +/* Override this file with custom rules */ \ No newline at end of file diff --git a/doc/css/full_list.css b/doc/css/full_list.css new file mode 100644 index 0000000..fa35982 --- /dev/null +++ b/doc/css/full_list.css @@ -0,0 +1,58 @@ +body { + margin: 0; + font-family: "Lucida Sans", "Lucida Grande", Verdana, Arial, sans-serif; + font-size: 13px; + height: 101%; + overflow-x: hidden; + background: #fafafa; +} + +h1 { padding: 12px 10px; padding-bottom: 0; margin: 0; font-size: 1.4em; } +.clear { clear: both; } +.fixed_header { position: fixed; background: #fff; width: 100%; padding-bottom: 10px; margin-top: 0; top: 0; z-index: 9999; height: 70px; } +#search { position: absolute; right: 5px; top: 9px; padding-left: 24px; } +#content.insearch #search, #content.insearch #noresults { background: url(data:image/gif;base64,R0lGODlhEAAQAPYAAP///wAAAPr6+pKSkoiIiO7u7sjIyNjY2J6engAAAI6OjsbGxjIyMlJSUuzs7KamppSUlPLy8oKCghwcHLKysqSkpJqamvT09Pj4+KioqM7OzkRERAwMDGBgYN7e3ujo6Ly8vCoqKjY2NkZGRtTU1MTExDw8PE5OTj4+PkhISNDQ0MrKylpaWrS0tOrq6nBwcKysrLi4uLq6ul5eXlxcXGJiYoaGhuDg4H5+fvz8/KKiohgYGCwsLFZWVgQEBFBQUMzMzDg4OFhYWBoaGvDw8NbW1pycnOLi4ubm5kBAQKqqqiQkJCAgIK6urnJyckpKSjQ0NGpqatLS0sDAwCYmJnx8fEJCQlRUVAoKCggICLCwsOTk5ExMTPb29ra2tmZmZmhoaNzc3KCgoBISEiIiIgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACH/C05FVFNDQVBFMi4wAwEAAAAh/hpDcmVhdGVkIHdpdGggYWpheGxvYWQuaW5mbwAh+QQJCAAAACwAAAAAEAAQAAAHaIAAgoMgIiYlg4kACxIaACEJCSiKggYMCRselwkpghGJBJEcFgsjJyoAGBmfggcNEx0flBiKDhQFlIoCCA+5lAORFb4AJIihCRbDxQAFChAXw9HSqb60iREZ1omqrIPdJCTe0SWI09GBACH5BAkIAAAALAAAAAAQABAAAAdrgACCgwc0NTeDiYozCQkvOTo9GTmDKy8aFy+NOBA7CTswgywJDTIuEjYFIY0JNYMtKTEFiRU8Pjwygy4ws4owPyCKwsMAJSTEgiQlgsbIAMrO0dKDGMTViREZ14kYGRGK38nHguHEJcvTyIEAIfkECQgAAAAsAAAAABAAEAAAB2iAAIKDAggPg4iJAAMJCRUAJRIqiRGCBI0WQEEJJkWDERkYAAUKEBc4Po1GiKKJHkJDNEeKig4URLS0ICImJZAkuQAhjSi/wQyNKcGDCyMnk8u5rYrTgqDVghgZlYjcACTA1sslvtHRgQAh+QQJCAAAACwAAAAAEAAQAAAHZ4AAgoOEhYaCJSWHgxGDJCQARAtOUoQRGRiFD0kJUYWZhUhKT1OLhR8wBaaFBzQ1NwAlkIszCQkvsbOHL7Y4q4IuEjaqq0ZQD5+GEEsJTDCMmIUhtgk1lo6QFUwJVDKLiYJNUd6/hoEAIfkECQgAAAAsAAAAABAAEAAAB2iAAIKDhIWGgiUlh4MRgyQkjIURGRiGGBmNhJWHm4uen4ICCA+IkIsDCQkVACWmhwSpFqAABQoQF6ALTkWFnYMrVlhWvIKTlSAiJiVVPqlGhJkhqShHV1lCW4cMqSkAR1ofiwsjJyqGgQAh+QQJCAAAACwAAAAAEAAQAAAHZ4AAgoOEhYaCJSWHgxGDJCSMhREZGIYYGY2ElYebi56fhyWQniSKAKKfpaCLFlAPhl0gXYNGEwkhGYREUywag1wJwSkHNDU3D0kJYIMZQwk8MjPBLx9eXwuETVEyAC/BOKsuEjYFhoEAIfkECQgAAAAsAAAAABAAEAAAB2eAAIKDhIWGgiUlh4MRgyQkjIURGRiGGBmNhJWHm4ueICImip6CIQkJKJ4kigynKaqKCyMnKqSEK05StgAGQRxPYZaENqccFgIID4KXmQBhXFkzDgOnFYLNgltaSAAEpxa7BQoQF4aBACH5BAkIAAAALAAAAAAQABAAAAdogACCg4SFggJiPUqCJSWGgkZjCUwZACQkgxGEXAmdT4UYGZqCGWQ+IjKGGIUwPzGPhAc0NTewhDOdL7Ykji+dOLuOLhI2BbaFETICx4MlQitdqoUsCQ2vhKGjglNfU0SWmILaj43M5oEAOwAAAAAAAAAAAA==) no-repeat center left; } +#full_list { padding: 0; list-style: none; margin-left: 0; margin-top: 80px; font-size: 1.1em; } +#full_list ul { padding: 0; } +#full_list li { padding: 0; margin: 0; list-style: none; } +#full_list li .item { padding: 5px 5px 5px 12px; } +#noresults { padding: 7px 12px; background: #fff; } +#content.insearch #noresults { margin-left: 7px; } +li.collapsed ul { display: none; } +li a.toggle { cursor: default; position: relative; left: -5px; top: 4px; text-indent: -999px; width: 10px; height: 9px; margin-left: -10px; display: block; float: left; background: url(data:image/png;base64,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) no-repeat bottom left; } +li.collapsed a.toggle { opacity: 0.5; cursor: default; background-position: top left; } +li { color: #888; cursor: pointer; } +li.deprecated { text-decoration: line-through; font-style: italic; } +li.odd { background: #f0f0f0; } +li.even { background: #fafafa; } +.item:hover { background: #ddd; } +li small:before { content: "("; } +li small:after { content: ")"; } +li small.search_info { display: none; } +a, a:visited { text-decoration: none; color: #05a; } +li.clicked > .item { background: #05a; color: #ccc; } +li.clicked > .item a, li.clicked > .item a:visited { color: #eee; } +li.clicked > .item a.toggle { opacity: 0.5; background-position: bottom right; } +li.collapsed.clicked a.toggle { background-position: top right; } +#search input { border: 1px solid #bbb; border-radius: 3px; } +#full_list_nav { margin-left: 10px; font-size: 0.9em; display: block; color: #aaa; } +#full_list_nav a, #nav a:visited { color: #358; } +#full_list_nav a:hover { background: transparent; color: #5af; } +#full_list_nav span:after { content: ' | '; } +#full_list_nav span:last-child:after { content: ''; } + +#content h1 { margin-top: 0; } +li { white-space: nowrap; cursor: normal; } +li small { display: block; font-size: 0.8em; } +li small:before { content: ""; } +li small:after { content: ""; } +li small.search_info { display: none; } +#search { width: 170px; position: static; margin: 3px; margin-left: 10px; font-size: 0.9em; color: #888; padding-left: 0; padding-right: 24px; } +#content.insearch #search { background-position: center right; } +#search input { width: 110px; } + +#full_list.insearch ul { display: block; } +#full_list.insearch .item { display: none; } +#full_list.insearch .found { display: block; padding-left: 11px !important; } +#full_list.insearch li a.toggle { display: none; } +#full_list.insearch li small.search_info { display: block; } diff --git a/doc/css/style.css b/doc/css/style.css new file mode 100644 index 0000000..55ec699 --- /dev/null +++ b/doc/css/style.css @@ -0,0 +1,481 @@ +html { + width: 100%; + height: 100%; +} +body { + font-family: "Lucida Sans", "Lucida Grande", Verdana, Arial, sans-serif; + font-size: 13px; + width: 100%; + margin: 0; + padding: 0; + display: flex; + display: -webkit-flex; + display: -ms-flexbox; +} + +#nav { + position: relative; + width: 100%; + height: 100%; + border: 0; + border-right: 1px dotted #eee; + overflow: auto; +} +.nav_wrap { + margin: 0; + padding: 0; + width: 20%; + height: 100%; + position: relative; + display: flex; + display: -webkit-flex; + display: -ms-flexbox; + flex-shrink: 0; + -webkit-flex-shrink: 0; + -ms-flex: 1 0; +} +#resizer { + position: absolute; + right: -5px; + top: 0; + width: 10px; + height: 100%; + cursor: col-resize; + z-index: 9999; +} +#main { + flex: 5 1; + -webkit-flex: 5 1; + -ms-flex: 5 1; + outline: none; + position: relative; + background: #fff; + padding: 1.2em; + padding-top: 0.2em; +} + +@media (max-width: 920px) { + .nav_wrap { display: none; } +} + +@media (min-width: 920px) { + body { height: 100%; overflow: hidden; } + #main { height: 100%; overflow: auto; } + #search { display: none; } + #search_frame { display: none; } +} + +#main img { max-width: 100%; } +h1 { font-size: 25px; margin: 1em 0 0.5em; padding-top: 4px; border-top: 1px dotted #d5d5d5; } +h1.noborder { border-top: 0px; margin-top: 0; padding-top: 4px; } +h1.title { margin-bottom: 10px; } +h1.alphaindex { margin-top: 0; font-size: 22px; } +h2 { + padding: 0; + padding-bottom: 3px; + border-bottom: 1px #aaa solid; + font-size: 1.4em; + margin: 1.8em 0 0.5em; + position: relative; +} +h2 small { font-weight: normal; font-size: 0.7em; display: inline; position: absolute; right: 0; } +h2 small a { + display: block; + height: 20px; + border: 1px solid #aaa; + border-bottom: 0; + border-top-left-radius: 5px; + background: #f8f8f8; + position: relative; + padding: 2px 7px; +} +.clear { clear: both; } +.inline { display: inline; } +.inline p:first-child { display: inline; } +.docstring, .tags, #filecontents { font-size: 15px; line-height: 1.5145em; } +.docstring p > code, .docstring p > tt, .tags p > code, .tags p > tt { + color: #c7254e; background: #f9f2f4; padding: 2px 4px; font-size: 1em; + border-radius: 4px; +} +.docstring h1, .docstring h2, .docstring h3, .docstring h4 { padding: 0; border: 0; border-bottom: 1px dotted #bbb; } +.docstring h1 { font-size: 1.2em; } +.docstring h2 { font-size: 1.1em; } +.docstring h3, .docstring h4 { font-size: 1em; border-bottom: 0; padding-top: 10px; } +.summary_desc .object_link a, .docstring .object_link a { + font-family: monospace; font-size: 1.05em; + color: #05a; background: #EDF4FA; padding: 2px 4px; font-size: 1em; + border-radius: 4px; +} +.rdoc-term { padding-right: 25px; font-weight: bold; } +.rdoc-list p { margin: 0; padding: 0; margin-bottom: 4px; } + +/* style for */ +#filecontents table, .docstring table { border-collapse: collapse; } +#filecontents table th, #filecontents table td, +.docstring table th, .docstring table td { border: 1px solid #ccc; padding: 8px; padding-right: 17px; } +#filecontents table tr:nth-child(odd), +.docstring table tr:nth-child(odd) { background: #eee; } +#filecontents table tr:nth-child(even), +.docstring table tr:nth-child(even) { background: #fff; } +#filecontents table th, .docstring table th { background: #fff; } + +/* style for
a",d=q.getElementsByTagName("*"),e=q.getElementsByTagName("a")[0];if(!d||!d.length||!e)return{};g=c.createElement("select"),h=g.appendChild(c.createElement("option")),i=q.getElementsByTagName("input")[0],b={leadingWhitespace:q.firstChild.nodeType===3,tbody:!q.getElementsByTagName("tbody").length,htmlSerialize:!!q.getElementsByTagName("link").length,style:/top/.test(e.getAttribute("style")),hrefNormalized:e.getAttribute("href")==="/a",opacity:/^0.55/.test(e.style.opacity),cssFloat:!!e.style.cssFloat,checkOn:i.value==="on",optSelected:h.selected,getSetAttribute:q.className!=="t",enctype:!!c.createElement("form").enctype,html5Clone:c.createElement("nav").cloneNode(!0).outerHTML!=="<:nav>",submitBubbles:!0,changeBubbles:!0,focusinBubbles:!1,deleteExpando:!0,noCloneEvent:!0,inlineBlockNeedsLayout:!1,shrinkWrapBlocks:!1,reliableMarginRight:!0},i.checked=!0,b.noCloneChecked=i.cloneNode(!0).checked,g.disabled=!0,b.optDisabled=!h.disabled;try{delete q.test}catch(s){b.deleteExpando=!1}!q.addEventListener&&q.attachEvent&&q.fireEvent&&(q.attachEvent("onclick",function(){b.noCloneEvent=!1}),q.cloneNode(!0).fireEvent("onclick")),i=c.createElement("input"),i.value="t",i.setAttribute("type","radio"),b.radioValue=i.value==="t",i.setAttribute("checked","checked"),q.appendChild(i),k=c.createDocumentFragment(),k.appendChild(q.lastChild),b.checkClone=k.cloneNode(!0).cloneNode(!0).lastChild.checked,b.appendChecked=i.checked,k.removeChild(i),k.appendChild(q),q.innerHTML="",a.getComputedStyle&&(j=c.createElement("div"),j.style.width="0",j.style.marginRight="0",q.style.width="2px",q.appendChild(j),b.reliableMarginRight=(parseInt((a.getComputedStyle(j,null)||{marginRight:0}).marginRight,10)||0)===0);if(q.attachEvent)for(o in{submit:1,change:1,focusin:1})n="on"+o,p=n in q,p||(q.setAttribute(n,"return;"),p=typeof q[n]=="function"),b[o+"Bubbles"]=p;k.removeChild(q),k=g=h=j=q=i=null,f(function(){var a,d,e,g,h,i,j,k,m,n,o,r=c.getElementsByTagName("body")[0];!r||(j=1,k="position:absolute;top:0;left:0;width:1px;height:1px;margin:0;",m="visibility:hidden;border:0;",n="style='"+k+"border:5px solid #000;padding:0;'",o="
"+""+"
",a=c.createElement("div"),a.style.cssText=m+"width:0;height:0;position:static;top:0;margin-top:"+j+"px",r.insertBefore(a,r.firstChild),q=c.createElement("div"),a.appendChild(q),q.innerHTML="
t
",l=q.getElementsByTagName("td"),p=l[0].offsetHeight===0,l[0].style.display="",l[1].style.display="none",b.reliableHiddenOffsets=p&&l[0].offsetHeight===0,q.innerHTML="",q.style.width=q.style.paddingLeft="1px",f.boxModel=b.boxModel=q.offsetWidth===2,typeof q.style.zoom!="undefined"&&(q.style.display="inline",q.style.zoom=1,b.inlineBlockNeedsLayout=q.offsetWidth===2,q.style.display="",q.innerHTML="
",b.shrinkWrapBlocks=q.offsetWidth!==2),q.style.cssText=k+m,q.innerHTML=o,d=q.firstChild,e=d.firstChild,h=d.nextSibling.firstChild.firstChild,i={doesNotAddBorder:e.offsetTop!==5,doesAddBorderForTableAndCells:h.offsetTop===5},e.style.position="fixed",e.style.top="20px",i.fixedPosition=e.offsetTop===20||e.offsetTop===15,e.style.position=e.style.top="",d.style.overflow="hidden",d.style.position="relative",i.subtractsBorderForOverflowNotVisible=e.offsetTop===-5,i.doesNotIncludeMarginInBodyOffset=r.offsetTop!==j,r.removeChild(a),q=a=null,f.extend(b,i))});return b}();var j=/^(?:\{.*\}|\[.*\])$/,k=/([A-Z])/g;f.extend({cache:{},uuid:0,expando:"jQuery"+(f.fn.jquery+Math.random()).replace(/\D/g,""),noData:{embed:!0,object:"clsid:D27CDB6E-AE6D-11cf-96B8-444553540000",applet:!0},hasData:function(a){a=a.nodeType?f.cache[a[f.expando]]:a[f.expando];return!!a&&!m(a)},data:function(a,c,d,e){if(!!f.acceptData(a)){var g,h,i,j=f.expando,k=typeof c=="string",l=a.nodeType,m=l?f.cache:a,n=l?a[j]:a[j]&&j,o=c==="events";if((!n||!m[n]||!o&&!e&&!m[n].data)&&k&&d===b)return;n||(l?a[j]=n=++f.uuid:n=j),m[n]||(m[n]={},l||(m[n].toJSON=f.noop));if(typeof c=="object"||typeof c=="function")e?m[n]=f.extend(m[n],c):m[n].data=f.extend(m[n].data,c);g=h=m[n],e||(h.data||(h.data={}),h=h.data),d!==b&&(h[f.camelCase(c)]=d);if(o&&!h[c])return g.events;k?(i=h[c],i==null&&(i=h[f.camelCase(c)])):i=h;return i}},removeData:function(a,b,c){if(!!f.acceptData(a)){var d,e,g,h=f.expando,i=a.nodeType,j=i?f.cache:a,k=i?a[h]:h;if(!j[k])return;if(b){d=c?j[k]:j[k].data;if(d){f.isArray(b)||(b in d?b=[b]:(b=f.camelCase(b),b in d?b=[b]:b=b.split(" ")));for(e=0,g=b.length;e-1)return!0;return!1},val:function(a){var c,d,e,g=this[0];{if(!!arguments.length){e=f.isFunction(a);return this.each(function(d){var g=f(this),h;if(this.nodeType===1){e?h=a.call(this,d,g.val()):h=a,h==null?h="":typeof h=="number"?h+="":f.isArray(h)&&(h=f.map(h,function(a){return a==null?"":a+""})),c=f.valHooks[this.nodeName.toLowerCase()]||f.valHooks[this.type];if(!c||!("set"in c)||c.set(this,h,"value")===b)this.value=h}})}if(g){c=f.valHooks[g.nodeName.toLowerCase()]||f.valHooks[g.type];if(c&&"get"in c&&(d=c.get(g,"value"))!==b)return d;d=g.value;return typeof d=="string"?d.replace(q,""):d==null?"":d}}}}),f.extend({valHooks:{option:{get:function(a){var b=a.attributes.value;return!b||b.specified?a.value:a.text}},select:{get:function(a){var b,c,d,e,g=a.selectedIndex,h=[],i=a.options,j=a.type==="select-one";if(g<0)return null;c=j?g:0,d=j?g+1:i.length;for(;c=0}),c.length||(a.selectedIndex=-1);return c}}},attrFn:{val:!0,css:!0,html:!0,text:!0,data:!0,width:!0,height:!0,offset:!0},attr:function(a,c,d,e){var g,h,i,j=a.nodeType;if(!!a&&j!==3&&j!==8&&j!==2){if(e&&c in f.attrFn)return f(a)[c](d);if(typeof a.getAttribute=="undefined")return f.prop(a,c,d);i=j!==1||!f.isXMLDoc(a),i&&(c=c.toLowerCase(),h=f.attrHooks[c]||(u.test(c)?x:w));if(d!==b){if(d===null){f.removeAttr(a,c);return}if(h&&"set"in h&&i&&(g=h.set(a,d,c))!==b)return g;a.setAttribute(c,""+d);return d}if(h&&"get"in h&&i&&(g=h.get(a,c))!==null)return g;g=a.getAttribute(c);return g===null?b:g}},removeAttr:function(a,b){var c,d,e,g,h=0;if(b&&a.nodeType===1){d=b.toLowerCase().split(p),g=d.length;for(;h=0}})});var z=/^(?:textarea|input|select)$/i,A=/^([^\.]*)?(?:\.(.+))?$/,B=/\bhover(\.\S+)?\b/,C=/^key/,D=/^(?:mouse|contextmenu)|click/,E=/^(?:focusinfocus|focusoutblur)$/,F=/^(\w*)(?:#([\w\-]+))?(?:\.([\w\-]+))?$/,G=function(a){var b=F.exec(a);b&&(b[1]=(b[1]||"").toLowerCase(),b[3]=b[3]&&new RegExp("(?:^|\\s)"+b[3]+"(?:\\s|$)"));return b},H=function(a,b){var c=a.attributes||{};return(!b[1]||a.nodeName.toLowerCase()===b[1])&&(!b[2]||(c.id||{}).value===b[2])&&(!b[3]||b[3].test((c["class"]||{}).value))},I=function(a){return f.event.special.hover?a:a.replace(B,"mouseenter$1 mouseleave$1")}; +f.event={add:function(a,c,d,e,g){var h,i,j,k,l,m,n,o,p,q,r,s;if(!(a.nodeType===3||a.nodeType===8||!c||!d||!(h=f._data(a)))){d.handler&&(p=d,d=p.handler),d.guid||(d.guid=f.guid++),j=h.events,j||(h.events=j={}),i=h.handle,i||(h.handle=i=function(a){return typeof f!="undefined"&&(!a||f.event.triggered!==a.type)?f.event.dispatch.apply(i.elem,arguments):b},i.elem=a),c=f.trim(I(c)).split(" ");for(k=0;k=0&&(h=h.slice(0,-1),k=!0),h.indexOf(".")>=0&&(i=h.split("."),h=i.shift(),i.sort());if((!e||f.event.customEvent[h])&&!f.event.global[h])return;c=typeof c=="object"?c[f.expando]?c:new f.Event(h,c):new f.Event(h),c.type=h,c.isTrigger=!0,c.exclusive=k,c.namespace=i.join("."),c.namespace_re=c.namespace?new RegExp("(^|\\.)"+i.join("\\.(?:.*\\.)?")+"(\\.|$)"):null,o=h.indexOf(":")<0?"on"+h:"";if(!e){j=f.cache;for(l in j)j[l].events&&j[l].events[h]&&f.event.trigger(c,d,j[l].handle.elem,!0);return}c.result=b,c.target||(c.target=e),d=d!=null?f.makeArray(d):[],d.unshift(c),p=f.event.special[h]||{};if(p.trigger&&p.trigger.apply(e,d)===!1)return;r=[[e,p.bindType||h]];if(!g&&!p.noBubble&&!f.isWindow(e)){s=p.delegateType||h,m=E.test(s+h)?e:e.parentNode,n=null;for(;m;m=m.parentNode)r.push([m,s]),n=m;n&&n===e.ownerDocument&&r.push([n.defaultView||n.parentWindow||a,s])}for(l=0;le&&i.push({elem:this,matches:d.slice(e)});for(j=0;j0?this.on(b,null,a,c):this.trigger(b)},f.attrFn&&(f.attrFn[b]=!0),C.test(b)&&(f.event.fixHooks[b]=f.event.keyHooks),D.test(b)&&(f.event.fixHooks[b]=f.event.mouseHooks)}),function(){function x(a,b,c,e,f,g){for(var h=0,i=e.length;h0){k=j;break}}j=j[a]}e[h]=k}}}function w(a,b,c,e,f,g){for(var h=0,i=e.length;h+~,(\[\\]+)+|[>+~])(\s*,\s*)?((?:.|\r|\n)*)/g,d="sizcache"+(Math.random()+"").replace(".",""),e=0,g=Object.prototype.toString,h=!1,i=!0,j=/\\/g,k=/\r\n/g,l=/\W/;[0,0].sort(function(){i=!1;return 0});var m=function(b,d,e,f){e=e||[],d=d||c;var h=d;if(d.nodeType!==1&&d.nodeType!==9)return[];if(!b||typeof b!="string")return e;var i,j,k,l,n,q,r,t,u=!0,v=m.isXML(d),w=[],x=b;do{a.exec(""),i=a.exec(x);if(i){x=i[3],w.push(i[1]);if(i[2]){l=i[3];break}}}while(i);if(w.length>1&&p.exec(b))if(w.length===2&&o.relative[w[0]])j=y(w[0]+w[1],d,f);else{j=o.relative[w[0]]?[d]:m(w.shift(),d);while(w.length)b=w.shift(),o.relative[b]&&(b+=w.shift()),j=y(b,j,f)}else{!f&&w.length>1&&d.nodeType===9&&!v&&o.match.ID.test(w[0])&&!o.match.ID.test(w[w.length-1])&&(n=m.find(w.shift(),d,v),d=n.expr?m.filter(n.expr,n.set)[0]:n.set[0]);if(d){n=f?{expr:w.pop(),set:s(f)}:m.find(w.pop(),w.length===1&&(w[0]==="~"||w[0]==="+")&&d.parentNode?d.parentNode:d,v),j=n.expr?m.filter(n.expr,n.set):n.set,w.length>0?k=s(j):u=!1;while(w.length)q=w.pop(),r=q,o.relative[q]?r=w.pop():q="",r==null&&(r=d),o.relative[q](k,r,v)}else k=w=[]}k||(k=j),k||m.error(q||b);if(g.call(k)==="[object Array]")if(!u)e.push.apply(e,k);else if(d&&d.nodeType===1)for(t=0;k[t]!=null;t++)k[t]&&(k[t]===!0||k[t].nodeType===1&&m.contains(d,k[t]))&&e.push(j[t]);else for(t=0;k[t]!=null;t++)k[t]&&k[t].nodeType===1&&e.push(j[t]);else s(k,e);l&&(m(l,h,e,f),m.uniqueSort(e));return e};m.uniqueSort=function(a){if(u){h=i,a.sort(u);if(h)for(var b=1;b0},m.find=function(a,b,c){var d,e,f,g,h,i;if(!a)return[];for(e=0,f=o.order.length;e":function(a,b){var c,d=typeof b=="string",e=0,f=a.length;if(d&&!l.test(b)){b=b.toLowerCase();for(;e=0)?c||d.push(h):c&&(b[g]=!1));return!1},ID:function(a){return a[1].replace(j,"")},TAG:function(a,b){return a[1].replace(j,"").toLowerCase()},CHILD:function(a){if(a[1]==="nth"){a[2]||m.error(a[0]),a[2]=a[2].replace(/^\+|\s*/g,"");var b=/(-?)(\d*)(?:n([+\-]?\d*))?/.exec(a[2]==="even"&&"2n"||a[2]==="odd"&&"2n+1"||!/\D/.test(a[2])&&"0n+"+a[2]||a[2]);a[2]=b[1]+(b[2]||1)-0,a[3]=b[3]-0}else a[2]&&m.error(a[0]);a[0]=e++;return a},ATTR:function(a,b,c,d,e,f){var g=a[1]=a[1].replace(j,"");!f&&o.attrMap[g]&&(a[1]=o.attrMap[g]),a[4]=(a[4]||a[5]||"").replace(j,""),a[2]==="~="&&(a[4]=" "+a[4]+" ");return a},PSEUDO:function(b,c,d,e,f){if(b[1]==="not")if((a.exec(b[3])||"").length>1||/^\w/.test(b[3]))b[3]=m(b[3],null,null,c);else{var g=m.filter(b[3],c,d,!0^f);d||e.push.apply(e,g);return!1}else if(o.match.POS.test(b[0])||o.match.CHILD.test(b[0]))return!0;return b},POS:function(a){a.unshift(!0);return a}},filters:{enabled:function(a){return a.disabled===!1&&a.type!=="hidden"},disabled:function(a){return a.disabled===!0},checked:function(a){return a.checked===!0},selected:function(a){a.parentNode&&a.parentNode.selectedIndex;return a.selected===!0},parent:function(a){return!!a.firstChild},empty:function(a){return!a.firstChild},has:function(a,b,c){return!!m(c[3],a).length},header:function(a){return/h\d/i.test(a.nodeName)},text:function(a){var b=a.getAttribute("type"),c=a.type;return a.nodeName.toLowerCase()==="input"&&"text"===c&&(b===c||b===null)},radio:function(a){return a.nodeName.toLowerCase()==="input"&&"radio"===a.type},checkbox:function(a){return a.nodeName.toLowerCase()==="input"&&"checkbox"===a.type},file:function(a){return a.nodeName.toLowerCase()==="input"&&"file"===a.type},password:function(a){return a.nodeName.toLowerCase()==="input"&&"password"===a.type},submit:function(a){var b=a.nodeName.toLowerCase();return(b==="input"||b==="button")&&"submit"===a.type},image:function(a){return a.nodeName.toLowerCase()==="input"&&"image"===a.type},reset:function(a){var b=a.nodeName.toLowerCase();return(b==="input"||b==="button")&&"reset"===a.type},button:function(a){var b=a.nodeName.toLowerCase();return b==="input"&&"button"===a.type||b==="button"},input:function(a){return/input|select|textarea|button/i.test(a.nodeName)},focus:function(a){return a===a.ownerDocument.activeElement}},setFilters:{first:function(a,b){return b===0},last:function(a,b,c,d){return b===d.length-1},even:function(a,b){return b%2===0},odd:function(a,b){return b%2===1},lt:function(a,b,c){return bc[3]-0},nth:function(a,b,c){return c[3]-0===b},eq:function(a,b,c){return c[3]-0===b}},filter:{PSEUDO:function(a,b,c,d){var e=b[1],f=o.filters[e];if(f)return f(a,c,b,d);if(e==="contains")return(a.textContent||a.innerText||n([a])||"").indexOf(b[3])>=0;if(e==="not"){var g=b[3];for(var h=0,i=g.length;h=0}},ID:function(a,b){return a.nodeType===1&&a.getAttribute("id")===b},TAG:function(a,b){return b==="*"&&a.nodeType===1||!!a.nodeName&&a.nodeName.toLowerCase()===b},CLASS:function(a,b){return(" "+(a.className||a.getAttribute("class"))+" ").indexOf(b)>-1},ATTR:function(a,b){var c=b[1],d=m.attr?m.attr(a,c):o.attrHandle[c]?o.attrHandle[c](a):a[c]!=null?a[c]:a.getAttribute(c),e=d+"",f=b[2],g=b[4];return d==null?f==="!=":!f&&m.attr?d!=null:f==="="?e===g:f==="*="?e.indexOf(g)>=0:f==="~="?(" "+e+" ").indexOf(g)>=0:g?f==="!="?e!==g:f==="^="?e.indexOf(g)===0:f==="$="?e.substr(e.length-g.length)===g:f==="|="?e===g||e.substr(0,g.length+1)===g+"-":!1:e&&d!==!1},POS:function(a,b,c,d){var e=b[2],f=o.setFilters[e];if(f)return f(a,c,b,d)}}},p=o.match.POS,q=function(a,b){return"\\"+(b-0+1)};for(var r in o.match)o.match[r]=new RegExp(o.match[r].source+/(?![^\[]*\])(?![^\(]*\))/.source),o.leftMatch[r]=new RegExp(/(^(?:.|\r|\n)*?)/.source+o.match[r].source.replace(/\\(\d+)/g,q));var s=function(a,b){a=Array.prototype.slice.call(a,0);if(b){b.push.apply(b,a);return b}return a};try{Array.prototype.slice.call(c.documentElement.childNodes,0)[0].nodeType}catch(t){s=function(a,b){var c=0,d=b||[];if(g.call(a)==="[object Array]")Array.prototype.push.apply(d,a);else if(typeof a.length=="number")for(var e=a.length;c",e.insertBefore(a,e.firstChild),c.getElementById(d)&&(o.find.ID=function(a,c,d){if(typeof c.getElementById!="undefined"&&!d){var e=c.getElementById(a[1]);return e?e.id===a[1]||typeof e.getAttributeNode!="undefined"&&e.getAttributeNode("id").nodeValue===a[1]?[e]:b:[]}},o.filter.ID=function(a,b){var c=typeof a.getAttributeNode!="undefined"&&a.getAttributeNode("id");return a.nodeType===1&&c&&c.nodeValue===b}),e.removeChild(a),e=a=null}(),function(){var a=c.createElement("div");a.appendChild(c.createComment("")),a.getElementsByTagName("*").length>0&&(o.find.TAG=function(a,b){var c=b.getElementsByTagName(a[1]);if(a[1]==="*"){var d=[];for(var e=0;c[e];e++)c[e].nodeType===1&&d.push(c[e]);c=d}return c}),a.innerHTML="",a.firstChild&&typeof a.firstChild.getAttribute!="undefined"&&a.firstChild.getAttribute("href")!=="#"&&(o.attrHandle.href=function(a){return a.getAttribute("href",2)}),a=null}(),c.querySelectorAll&&function(){var a=m,b=c.createElement("div"),d="__sizzle__";b.innerHTML="

";if(!b.querySelectorAll||b.querySelectorAll(".TEST").length!==0){m=function(b,e,f,g){e=e||c;if(!g&&!m.isXML(e)){var h=/^(\w+$)|^\.([\w\-]+$)|^#([\w\-]+$)/.exec(b);if(h&&(e.nodeType===1||e.nodeType===9)){if(h[1])return s(e.getElementsByTagName(b),f);if(h[2]&&o.find.CLASS&&e.getElementsByClassName)return s(e.getElementsByClassName(h[2]),f)}if(e.nodeType===9){if(b==="body"&&e.body)return s([e.body],f);if(h&&h[3]){var i=e.getElementById(h[3]);if(!i||!i.parentNode)return s([],f);if(i.id===h[3])return s([i],f)}try{return s(e.querySelectorAll(b),f)}catch(j){}}else if(e.nodeType===1&&e.nodeName.toLowerCase()!=="object"){var k=e,l=e.getAttribute("id"),n=l||d,p=e.parentNode,q=/^\s*[+~]/.test(b);l?n=n.replace(/'/g,"\\$&"):e.setAttribute("id",n),q&&p&&(e=e.parentNode);try{if(!q||p)return s(e.querySelectorAll("[id='"+n+"'] "+b),f)}catch(r){}finally{l||k.removeAttribute("id")}}}return a(b,e,f,g)};for(var e in a)m[e]=a[e];b=null}}(),function(){var a=c.documentElement,b=a.matchesSelector||a.mozMatchesSelector||a.webkitMatchesSelector||a.msMatchesSelector;if(b){var d=!b.call(c.createElement("div"),"div"),e=!1;try{b.call(c.documentElement,"[test!='']:sizzle")}catch(f){e=!0}m.matchesSelector=function(a,c){c=c.replace(/\=\s*([^'"\]]*)\s*\]/g,"='$1']");if(!m.isXML(a))try{if(e||!o.match.PSEUDO.test(c)&&!/!=/.test(c)){var f=b.call(a,c);if(f||!d||a.document&&a.document.nodeType!==11)return f}}catch(g){}return m(c,null,null,[a]).length>0}}}(),function(){var a=c.createElement("div");a.innerHTML="
";if(!!a.getElementsByClassName&&a.getElementsByClassName("e").length!==0){a.lastChild.className="e";if(a.getElementsByClassName("e").length===1)return;o.order.splice(1,0,"CLASS"),o.find.CLASS=function(a,b,c){if(typeof b.getElementsByClassName!="undefined"&&!c)return b.getElementsByClassName(a[1])},a=null}}(),c.documentElement.contains?m.contains=function(a,b){return a!==b&&(a.contains?a.contains(b):!0)}:c.documentElement.compareDocumentPosition?m.contains=function(a,b){return!!(a.compareDocumentPosition(b)&16)}:m.contains=function(){return!1},m.isXML=function(a){var b=(a?a.ownerDocument||a:0).documentElement;return b?b.nodeName!=="HTML":!1};var y=function(a,b,c){var d,e=[],f="",g=b.nodeType?[b]:b;while(d=o.match.PSEUDO.exec(a))f+=d[0],a=a.replace(o.match.PSEUDO,"");a=o.relative[a]?a+"*":a;for(var h=0,i=g.length;h0)for(h=g;h=0:f.filter(a,this).length>0:this.filter(a).length>0)},closest:function(a,b){var c=[],d,e,g=this[0];if(f.isArray(a)){var h=1;while(g&&g.ownerDocument&&g!==b){for(d=0;d-1:f.find.matchesSelector(g,a)){c.push(g);break}g=g.parentNode;if(!g||!g.ownerDocument||g===b||g.nodeType===11)break}}c=c.length>1?f.unique(c):c;return this.pushStack(c,"closest",a)},index:function(a){if(!a)return this[0]&&this[0].parentNode?this.prevAll().length:-1;if(typeof a=="string")return f.inArray(this[0],f(a));return f.inArray(a.jquery?a[0]:a,this)},add:function(a,b){var c=typeof a=="string"?f(a,b):f.makeArray(a&&a.nodeType?[a]:a),d=f.merge(this.get(),c);return this.pushStack(S(c[0])||S(d[0])?d:f.unique(d))},andSelf:function(){return this.add(this.prevObject)}}),f.each({parent:function(a){var b=a.parentNode;return b&&b.nodeType!==11?b:null},parents:function(a){return f.dir(a,"parentNode")},parentsUntil:function(a,b,c){return f.dir(a,"parentNode",c)},next:function(a){return f.nth(a,2,"nextSibling")},prev:function(a){return f.nth(a,2,"previousSibling")},nextAll:function(a){return f.dir(a,"nextSibling")},prevAll:function(a){return f.dir(a,"previousSibling")},nextUntil:function(a,b,c){return f.dir(a,"nextSibling",c)},prevUntil:function(a,b,c){return f.dir(a,"previousSibling",c)},siblings:function(a){return f.sibling(a.parentNode.firstChild,a)},children:function(a){return f.sibling(a.firstChild)},contents:function(a){return f.nodeName(a,"iframe")?a.contentDocument||a.contentWindow.document:f.makeArray(a.childNodes)}},function(a,b){f.fn[a]=function(c,d){var e=f.map(this,b,c);L.test(a)||(d=c),d&&typeof d=="string"&&(e=f.filter(d,e)),e=this.length>1&&!R[a]?f.unique(e):e,(this.length>1||N.test(d))&&M.test(a)&&(e=e.reverse());return this.pushStack(e,a,P.call(arguments).join(","))}}),f.extend({filter:function(a,b,c){c&&(a=":not("+a+")");return b.length===1?f.find.matchesSelector(b[0],a)?[b[0]]:[]:f.find.matches(a,b)},dir:function(a,c,d){var e=[],g=a[c];while(g&&g.nodeType!==9&&(d===b||g.nodeType!==1||!f(g).is(d)))g.nodeType===1&&e.push(g),g=g[c];return e},nth:function(a,b,c,d){b=b||1;var e=0;for(;a;a=a[c])if(a.nodeType===1&&++e===b)break;return a},sibling:function(a,b){var c=[];for(;a;a=a.nextSibling)a.nodeType===1&&a!==b&&c.push(a);return c}});var V="abbr|article|aside|audio|canvas|datalist|details|figcaption|figure|footer|header|hgroup|mark|meter|nav|output|progress|section|summary|time|video",W=/ jQuery\d+="(?:\d+|null)"/g,X=/^\s+/,Y=/<(?!area|br|col|embed|hr|img|input|link|meta|param)(([\w:]+)[^>]*)\/>/ig,Z=/<([\w:]+)/,$=/",""],legend:[1,"
","
"],thead:[1,"","
"],tr:[2,"","
"],td:[3,"","
"],col:[2,"","
"],area:[1,"",""],_default:[0,"",""]},bh=U(c);bg.optgroup=bg.option,bg.tbody=bg.tfoot=bg.colgroup=bg.caption=bg.thead,bg.th=bg.td,f.support.htmlSerialize||(bg._default=[1,"div
","
"]),f.fn.extend({text:function(a){if(f.isFunction(a))return this.each(function(b){var c=f(this);c.text(a.call(this,b,c.text()))});if(typeof a!="object"&&a!==b)return this.empty().append((this[0]&&this[0].ownerDocument||c).createTextNode(a));return f.text(this)},wrapAll:function(a){if(f.isFunction(a))return this.each(function(b){f(this).wrapAll(a.call(this,b))});if(this[0]){var b=f(a,this[0].ownerDocument).eq(0).clone(!0);this[0].parentNode&&b.insertBefore(this[0]),b.map(function(){var a=this;while(a.firstChild&&a.firstChild.nodeType===1)a=a.firstChild;return a}).append(this)}return this},wrapInner:function(a){if(f.isFunction(a))return this.each(function(b){f(this).wrapInner(a.call(this,b))});return this.each(function(){var b=f(this),c=b.contents();c.length?c.wrapAll(a):b.append(a)})},wrap:function(a){var b=f.isFunction(a);return this.each(function(c){f(this).wrapAll(b?a.call(this,c):a)})},unwrap:function(){return this.parent().each(function(){f.nodeName(this,"body")||f(this).replaceWith(this.childNodes)}).end()},append:function(){return this.domManip(arguments,!0,function(a){this.nodeType===1&&this.appendChild(a)})},prepend:function(){return this.domManip(arguments,!0,function(a){this.nodeType===1&&this.insertBefore(a,this.firstChild)})},before:function(){if(this[0]&&this[0].parentNode)return this.domManip(arguments,!1,function(a){this.parentNode.insertBefore(a,this)});if(arguments.length){var a=f.clean(arguments);a.push.apply(a,this.toArray());return this.pushStack(a,"before",arguments)}},after:function(){if(this[0]&&this[0].parentNode)return this.domManip(arguments,!1,function(a){this.parentNode.insertBefore(a,this.nextSibling)});if(arguments.length){var a=this.pushStack(this,"after",arguments);a.push.apply(a,f.clean(arguments));return a}},remove:function(a,b){for(var c=0,d;(d=this[c])!=null;c++)if(!a||f.filter(a,[d]).length)!b&&d.nodeType===1&&(f.cleanData(d.getElementsByTagName("*")),f.cleanData([d])),d.parentNode&&d.parentNode.removeChild(d);return this},empty:function() +{for(var a=0,b;(b=this[a])!=null;a++){b.nodeType===1&&f.cleanData(b.getElementsByTagName("*"));while(b.firstChild)b.removeChild(b.firstChild)}return this},clone:function(a,b){a=a==null?!1:a,b=b==null?a:b;return this.map(function(){return f.clone(this,a,b)})},html:function(a){if(a===b)return this[0]&&this[0].nodeType===1?this[0].innerHTML.replace(W,""):null;if(typeof a=="string"&&!ba.test(a)&&(f.support.leadingWhitespace||!X.test(a))&&!bg[(Z.exec(a)||["",""])[1].toLowerCase()]){a=a.replace(Y,"<$1>");try{for(var c=0,d=this.length;c1&&l0?this.clone(!0):this).get();f(e[h])[b](j),d=d.concat(j)}return this.pushStack(d,a,e.selector)}}),f.extend({clone:function(a,b,c){var d,e,g,h=f.support.html5Clone||!bc.test("<"+a.nodeName)?a.cloneNode(!0):bo(a);if((!f.support.noCloneEvent||!f.support.noCloneChecked)&&(a.nodeType===1||a.nodeType===11)&&!f.isXMLDoc(a)){bk(a,h),d=bl(a),e=bl(h);for(g=0;d[g];++g)e[g]&&bk(d[g],e[g])}if(b){bj(a,h);if(c){d=bl(a),e=bl(h);for(g=0;d[g];++g)bj(d[g],e[g])}}d=e=null;return h},clean:function(a,b,d,e){var g;b=b||c,typeof b.createElement=="undefined"&&(b=b.ownerDocument||b[0]&&b[0].ownerDocument||c);var h=[],i;for(var j=0,k;(k=a[j])!=null;j++){typeof k=="number"&&(k+="");if(!k)continue;if(typeof k=="string")if(!_.test(k))k=b.createTextNode(k);else{k=k.replace(Y,"<$1>");var l=(Z.exec(k)||["",""])[1].toLowerCase(),m=bg[l]||bg._default,n=m[0],o=b.createElement("div");b===c?bh.appendChild(o):U(b).appendChild(o),o.innerHTML=m[1]+k+m[2];while(n--)o=o.lastChild;if(!f.support.tbody){var p=$.test(k),q=l==="table"&&!p?o.firstChild&&o.firstChild.childNodes:m[1]===""&&!p?o.childNodes:[];for(i=q.length-1;i>=0;--i)f.nodeName(q[i],"tbody")&&!q[i].childNodes.length&&q[i].parentNode.removeChild(q[i])}!f.support.leadingWhitespace&&X.test(k)&&o.insertBefore(b.createTextNode(X.exec(k)[0]),o.firstChild),k=o.childNodes}var r;if(!f.support.appendChecked)if(k[0]&&typeof (r=k.length)=="number")for(i=0;i=0)return b+"px"}}}),f.support.opacity||(f.cssHooks.opacity={get:function(a,b){return br.test((b&&a.currentStyle?a.currentStyle.filter:a.style.filter)||"")?parseFloat(RegExp.$1)/100+"":b?"1":""},set:function(a,b){var c=a.style,d=a.currentStyle,e=f.isNumeric(b)?"alpha(opacity="+b*100+")":"",g=d&&d.filter||c.filter||"";c.zoom=1;if(b>=1&&f.trim(g.replace(bq,""))===""){c.removeAttribute("filter");if(d&&!d.filter)return}c.filter=bq.test(g)?g.replace(bq,e):g+" "+e}}),f(function(){f.support.reliableMarginRight||(f.cssHooks.marginRight={get:function(a,b){var c;f.swap(a,{display:"inline-block"},function(){b?c=bz(a,"margin-right","marginRight"):c=a.style.marginRight});return c}})}),c.defaultView&&c.defaultView.getComputedStyle&&(bA=function(a,b){var c,d,e;b=b.replace(bs,"-$1").toLowerCase(),(d=a.ownerDocument.defaultView)&&(e=d.getComputedStyle(a,null))&&(c=e.getPropertyValue(b),c===""&&!f.contains(a.ownerDocument.documentElement,a)&&(c=f.style(a,b)));return c}),c.documentElement.currentStyle&&(bB=function(a,b){var c,d,e,f=a.currentStyle&&a.currentStyle[b],g=a.style;f===null&&g&&(e=g[b])&&(f=e),!bt.test(f)&&bu.test(f)&&(c=g.left,d=a.runtimeStyle&&a.runtimeStyle.left,d&&(a.runtimeStyle.left=a.currentStyle.left),g.left=b==="fontSize"?"1em":f||0,f=g.pixelLeft+"px",g.left=c,d&&(a.runtimeStyle.left=d));return f===""?"auto":f}),bz=bA||bB,f.expr&&f.expr.filters&&(f.expr.filters.hidden=function(a){var b=a.offsetWidth,c=a.offsetHeight;return b===0&&c===0||!f.support.reliableHiddenOffsets&&(a.style&&a.style.display||f.css(a,"display"))==="none"},f.expr.filters.visible=function(a){return!f.expr.filters.hidden(a)});var bD=/%20/g,bE=/\[\]$/,bF=/\r?\n/g,bG=/#.*$/,bH=/^(.*?):[ \t]*([^\r\n]*)\r?$/mg,bI=/^(?:color|date|datetime|datetime-local|email|hidden|month|number|password|range|search|tel|text|time|url|week)$/i,bJ=/^(?:about|app|app\-storage|.+\-extension|file|res|widget):$/,bK=/^(?:GET|HEAD)$/,bL=/^\/\//,bM=/\?/,bN=/)<[^<]*)*<\/script>/gi,bO=/^(?:select|textarea)/i,bP=/\s+/,bQ=/([?&])_=[^&]*/,bR=/^([\w\+\.\-]+:)(?:\/\/([^\/?#:]*)(?::(\d+))?)?/,bS=f.fn.load,bT={},bU={},bV,bW,bX=["*/"]+["*"];try{bV=e.href}catch(bY){bV=c.createElement("a"),bV.href="",bV=bV.href}bW=bR.exec(bV.toLowerCase())||[],f.fn.extend({load:function(a,c,d){if(typeof a!="string"&&bS)return bS.apply(this,arguments);if(!this.length)return this;var e=a.indexOf(" ");if(e>=0){var g=a.slice(e,a.length);a=a.slice(0,e)}var h="GET";c&&(f.isFunction(c)?(d=c,c=b):typeof c=="object"&&(c=f.param(c,f.ajaxSettings.traditional),h="POST"));var i=this;f.ajax({url:a,type:h,dataType:"html",data:c,complete:function(a,b,c){c=a.responseText,a.isResolved()&&(a.done(function(a){c=a}),i.html(g?f("
").append(c.replace(bN,"")).find(g):c)),d&&i.each(d,[c,b,a])}});return this},serialize:function(){return f.param(this.serializeArray())},serializeArray:function(){return this.map(function(){return this.elements?f.makeArray(this.elements):this}).filter(function(){return this.name&&!this.disabled&&(this.checked||bO.test(this.nodeName)||bI.test(this.type))}).map(function(a,b){var c=f(this).val();return c==null?null:f.isArray(c)?f.map(c,function(a,c){return{name:b.name,value:a.replace(bF,"\r\n")}}):{name:b.name,value:c.replace(bF,"\r\n")}}).get()}}),f.each("ajaxStart ajaxStop ajaxComplete ajaxError ajaxSuccess ajaxSend".split(" "),function(a,b){f.fn[b]=function(a){return this.on(b,a)}}),f.each(["get","post"],function(a,c){f[c]=function(a,d,e,g){f.isFunction(d)&&(g=g||e,e=d,d=b);return f.ajax({type:c,url:a,data:d,success:e,dataType:g})}}),f.extend({getScript:function(a,c){return f.get(a,b,c,"script")},getJSON:function(a,b,c){return f.get(a,b,c,"json")},ajaxSetup:function(a,b){b?b_(a,f.ajaxSettings):(b=a,a=f.ajaxSettings),b_(a,b);return a},ajaxSettings:{url:bV,isLocal:bJ.test(bW[1]),global:!0,type:"GET",contentType:"application/x-www-form-urlencoded",processData:!0,async:!0,accepts:{xml:"application/xml, text/xml",html:"text/html",text:"text/plain",json:"application/json, text/javascript","*":bX},contents:{xml:/xml/,html:/html/,json:/json/},responseFields:{xml:"responseXML",text:"responseText"},converters:{"* text":a.String,"text html":!0,"text json":f.parseJSON,"text xml":f.parseXML},flatOptions:{context:!0,url:!0}},ajaxPrefilter:bZ(bT),ajaxTransport:bZ(bU),ajax:function(a,c){function w(a,c,l,m){if(s!==2){s=2,q&&clearTimeout(q),p=b,n=m||"",v.readyState=a>0?4:0;var o,r,u,w=c,x=l?cb(d,v,l):b,y,z;if(a>=200&&a<300||a===304){if(d.ifModified){if(y=v.getResponseHeader("Last-Modified"))f.lastModified[k]=y;if(z=v.getResponseHeader("Etag"))f.etag[k]=z}if(a===304)w="notmodified",o=!0;else try{r=cc(d,x),w="success",o=!0}catch(A){w="parsererror",u=A}}else{u=w;if(!w||a)w="error",a<0&&(a=0)}v.status=a,v.statusText=""+(c||w),o?h.resolveWith(e,[r,w,v]):h.rejectWith(e,[v,w,u]),v.statusCode(j),j=b,t&&g.trigger("ajax"+(o?"Success":"Error"),[v,d,o?r:u]),i.fireWith(e,[v,w]),t&&(g.trigger("ajaxComplete",[v,d]),--f.active||f.event.trigger("ajaxStop"))}}typeof a=="object"&&(c=a,a=b),c=c||{};var d=f.ajaxSetup({},c),e=d.context||d,g=e!==d&&(e.nodeType||e instanceof f)?f(e):f.event,h=f.Deferred(),i=f.Callbacks("once memory"),j=d.statusCode||{},k,l={},m={},n,o,p,q,r,s=0,t,u,v={readyState:0,setRequestHeader:function(a,b){if(!s){var c=a.toLowerCase();a=m[c]=m[c]||a,l[a]=b}return this},getAllResponseHeaders:function(){return s===2?n:null},getResponseHeader:function(a){var c;if(s===2){if(!o){o={};while(c=bH.exec(n))o[c[1].toLowerCase()]=c[2]}c=o[a.toLowerCase()]}return c===b?null:c},overrideMimeType:function(a){s||(d.mimeType=a);return this},abort:function(a){a=a||"abort",p&&p.abort(a),w(0,a);return this}};h.promise(v),v.success=v.done,v.error=v.fail,v.complete=i.add,v.statusCode=function(a){if(a){var b;if(s<2)for(b in a)j[b]=[j[b],a[b]];else b=a[v.status],v.then(b,b)}return this},d.url=((a||d.url)+"").replace(bG,"").replace(bL,bW[1]+"//"),d.dataTypes=f.trim(d.dataType||"*").toLowerCase().split(bP),d.crossDomain==null&&(r=bR.exec(d.url.toLowerCase()),d.crossDomain=!(!r||r[1]==bW[1]&&r[2]==bW[2]&&(r[3]||(r[1]==="http:"?80:443))==(bW[3]||(bW[1]==="http:"?80:443)))),d.data&&d.processData&&typeof d.data!="string"&&(d.data=f.param(d.data,d.traditional)),b$(bT,d,c,v);if(s===2)return!1;t=d.global,d.type=d.type.toUpperCase(),d.hasContent=!bK.test(d.type),t&&f.active++===0&&f.event.trigger("ajaxStart");if(!d.hasContent){d.data&&(d.url+=(bM.test(d.url)?"&":"?")+d.data,delete d.data),k=d.url;if(d.cache===!1){var x=f.now(),y=d.url.replace(bQ,"$1_="+x);d.url=y+(y===d.url?(bM.test(d.url)?"&":"?")+"_="+x:"")}}(d.data&&d.hasContent&&d.contentType!==!1||c.contentType)&&v.setRequestHeader("Content-Type",d.contentType),d.ifModified&&(k=k||d.url,f.lastModified[k]&&v.setRequestHeader("If-Modified-Since",f.lastModified[k]),f.etag[k]&&v.setRequestHeader("If-None-Match",f.etag[k])),v.setRequestHeader("Accept",d.dataTypes[0]&&d.accepts[d.dataTypes[0]]?d.accepts[d.dataTypes[0]]+(d.dataTypes[0]!=="*"?", "+bX+"; q=0.01":""):d.accepts["*"]);for(u in d.headers)v.setRequestHeader(u,d.headers[u]);if(d.beforeSend&&(d.beforeSend.call(e,v,d)===!1||s===2)){v.abort();return!1}for(u in{success:1,error:1,complete:1})v[u](d[u]);p=b$(bU,d,c,v);if(!p)w(-1,"No Transport");else{v.readyState=1,t&&g.trigger("ajaxSend",[v,d]),d.async&&d.timeout>0&&(q=setTimeout(function(){v.abort("timeout")},d.timeout));try{s=1,p.send(l,w)}catch(z){if(s<2)w(-1,z);else throw z}}return v},param:function(a,c){var d=[],e=function(a,b){b=f.isFunction(b)?b():b,d[d.length]=encodeURIComponent(a)+"="+encodeURIComponent(b)};c===b&&(c=f.ajaxSettings.traditional);if(f.isArray(a)||a.jquery&&!f.isPlainObject(a))f.each(a,function(){e(this.name,this.value)});else for(var g in a)ca(g,a[g],c,e);return d.join("&").replace(bD,"+")}}),f.extend({active:0,lastModified:{},etag:{}});var cd=f.now(),ce=/(\=)\?(&|$)|\?\?/i;f.ajaxSetup({jsonp:"callback",jsonpCallback:function(){return f.expando+"_"+cd++}}),f.ajaxPrefilter("json jsonp",function(b,c,d){var e=b.contentType==="application/x-www-form-urlencoded"&&typeof b.data=="string";if(b.dataTypes[0]==="jsonp"||b.jsonp!==!1&&(ce.test(b.url)||e&&ce.test(b.data))){var g,h=b.jsonpCallback=f.isFunction(b.jsonpCallback)?b.jsonpCallback():b.jsonpCallback,i=a[h],j=b.url,k=b.data,l="$1"+h+"$2";b.jsonp!==!1&&(j=j.replace(ce,l),b.url===j&&(e&&(k=k.replace(ce,l)),b.data===k&&(j+=(/\?/.test(j)?"&":"?")+b.jsonp+"="+h))),b.url=j,b.data=k,a[h]=function(a){g=[a]},d.always(function(){a[h]=i,g&&f.isFunction(i)&&a[h](g[0])}),b.converters["script json"]=function(){g||f.error(h+" was not called");return g[0]},b.dataTypes[0]="json";return"script"}}),f.ajaxSetup({accepts:{script:"text/javascript, application/javascript, application/ecmascript, application/x-ecmascript"},contents:{script:/javascript|ecmascript/},converters:{"text script":function(a){f.globalEval(a);return a}}}),f.ajaxPrefilter("script",function(a){a.cache===b&&(a.cache=!1),a.crossDomain&&(a.type="GET",a.global=!1)}),f.ajaxTransport("script",function(a){if(a.crossDomain){var d,e=c.head||c.getElementsByTagName("head")[0]||c.documentElement;return{send:function(f,g){d=c.createElement("script"),d.async="async",a.scriptCharset&&(d.charset=a.scriptCharset),d.src=a.url,d.onload=d.onreadystatechange=function(a,c){if(c||!d.readyState||/loaded|complete/.test(d.readyState))d.onload=d.onreadystatechange=null,e&&d.parentNode&&e.removeChild(d),d=b,c||g(200,"success")},e.insertBefore(d,e.firstChild)},abort:function(){d&&d.onload(0,1)}}}});var cf=a.ActiveXObject?function(){for(var a in ch)ch[a](0,1)}:!1,cg=0,ch;f.ajaxSettings.xhr=a.ActiveXObject?function(){return!this.isLocal&&ci()||cj()}:ci,function(a){f.extend(f.support,{ajax:!!a,cors:!!a&&"withCredentials"in a})}(f.ajaxSettings.xhr()),f.support.ajax&&f.ajaxTransport(function(c){if(!c.crossDomain||f.support.cors){var d;return{send:function(e,g){var h=c.xhr(),i,j;c.username?h.open(c.type,c.url,c.async,c.username,c.password):h.open(c.type,c.url,c.async);if(c.xhrFields)for(j in c.xhrFields)h[j]=c.xhrFields[j];c.mimeType&&h.overrideMimeType&&h.overrideMimeType(c.mimeType),!c.crossDomain&&!e["X-Requested-With"]&&(e["X-Requested-With"]="XMLHttpRequest");try{for(j in e)h.setRequestHeader(j,e[j])}catch(k){}h.send(c.hasContent&&c.data||null),d=function(a,e){var j,k,l,m,n;try{if(d&&(e||h.readyState===4)){d=b,i&&(h.onreadystatechange=f.noop,cf&&delete ch[i]);if(e)h.readyState!==4&&h.abort();else{j=h.status,l=h.getAllResponseHeaders(),m={},n=h.responseXML,n&&n.documentElement&&(m.xml=n),m.text=h.responseText;try{k=h.statusText}catch(o){k=""}!j&&c.isLocal&&!c.crossDomain?j=m.text?200:404:j===1223&&(j=204)}}}catch(p){e||g(-1,p)}m&&g(j,k,m,l)},!c.async||h.readyState===4?d():(i=++cg,cf&&(ch||(ch={},f(a).unload(cf)),ch[i]=d),h.onreadystatechange=d)},abort:function(){d&&d(0,1)}}}});var ck={},cl,cm,cn=/^(?:toggle|show|hide)$/,co=/^([+\-]=)?([\d+.\-]+)([a-z%]*)$/i,cp,cq=[["height","marginTop","marginBottom","paddingTop","paddingBottom"],["width","marginLeft","marginRight","paddingLeft","paddingRight"],["opacity"]],cr;f.fn.extend({show:function(a,b,c){var d,e;if(a||a===0)return this.animate(cu("show",3),a,b,c);for(var g=0,h=this.length;g=i.duration+this.startTime){this.now=this.end,this.pos=this.state=1,this.update(),i.animatedProperties[this.prop]=!0;for(b in i.animatedProperties)i.animatedProperties[b]!==!0&&(g=!1);if(g){i.overflow!=null&&!f.support.shrinkWrapBlocks&&f.each(["","X","Y"],function(a,b){h.style["overflow"+b]=i.overflow[a]}),i.hide&&f(h).hide();if(i.hide||i.show)for(b in i.animatedProperties)f.style(h,b,i.orig[b]),f.removeData(h,"fxshow"+b,!0),f.removeData(h,"toggle"+b,!0);d=i.complete,d&&(i.complete=!1,d.call(h))}return!1}i.duration==Infinity?this.now=e:(c=e-this.startTime,this.state=c/i.duration,this.pos=f.easing[i.animatedProperties[this.prop]](this.state,c,0,1,i.duration),this.now=this.start+(this.end-this.start)*this.pos),this.update();return!0}},f.extend(f.fx,{tick:function(){var a,b=f.timers,c=0;for(;c-1,k={},l={},m,n;j?(l=e.position(),m=l.top,n=l.left):(m=parseFloat(h)||0,n=parseFloat(i)||0),f.isFunction(b)&&(b=b.call(a,c,g)),b.top!=null&&(k.top=b.top-g.top+m),b.left!=null&&(k.left=b.left-g.left+n),"using"in b?b.using.call(a,k):e.css(k)}},f.fn.extend({position:function(){if(!this[0])return null;var a=this[0],b=this.offsetParent(),c=this.offset(),d=cx.test(b[0].nodeName)?{top:0,left:0}:b.offset();c.top-=parseFloat(f.css(a,"marginTop"))||0,c.left-=parseFloat(f.css(a,"marginLeft"))||0,d.top+=parseFloat(f.css(b[0],"borderTopWidth"))||0,d.left+=parseFloat(f.css(b[0],"borderLeftWidth"))||0;return{top:c.top-d.top,left:c.left-d.left}},offsetParent:function(){return this.map(function(){var a=this.offsetParent||c.body;while(a&&!cx.test(a.nodeName)&&f.css(a,"position")==="static")a=a.offsetParent;return a})}}),f.each(["Left","Top"],function(a,c){var d="scroll"+c;f.fn[d]=function(c){var e,g;if(c===b){e=this[0];if(!e)return null;g=cy(e);return g?"pageXOffset"in g?g[a?"pageYOffset":"pageXOffset"]:f.support.boxModel&&g.document.documentElement[d]||g.document.body[d]:e[d]}return this.each(function(){g=cy(this),g?g.scrollTo(a?f(g).scrollLeft():c,a?c:f(g).scrollTop()):this[d]=c})}}),f.each(["Height","Width"],function(a,c){var d=c.toLowerCase();f.fn["inner"+c]=function(){var a=this[0];return a?a.style?parseFloat(f.css(a,d,"padding")):this[d]():null},f.fn["outer"+c]=function(a){var b=this[0];return b?b.style?parseFloat(f.css(b,d,a?"margin":"border")):this[d]():null},f.fn[d]=function(a){var e=this[0];if(!e)return a==null?null:this;if(f.isFunction(a))return this.each(function(b){var c=f(this);c[d](a.call(this,b,c[d]()))});if(f.isWindow(e)){var g=e.document.documentElement["client"+c],h=e.document.body;return e.document.compatMode==="CSS1Compat"&&g||h&&h["client"+c]||g}if(e.nodeType===9)return Math.max(e.documentElement["client"+c],e.body["scroll"+c],e.documentElement["scroll"+c],e.body["offset"+c],e.documentElement["offset"+c]);if(a===b){var i=f.css(e,d),j=parseFloat(i);return f.isNumeric(j)?j:i}return this.css(d,typeof a=="string"?a:a+"px")}}),a.jQuery=a.$=f,typeof define=="function"&&define.amd&&define.amd.jQuery&&define("jquery",[],function(){return f})})(window); \ No newline at end of file diff --git a/doc/method_list.html b/doc/method_list.html new file mode 100644 index 0000000..65a7860 --- /dev/null +++ b/doc/method_list.html @@ -0,0 +1,83 @@ + + + + + + + + + + + + + + + + + + Ruby Method List + + + +
+
+

Ruby Method List

+ + + +
+ + +
+ + diff --git a/doc/puppet_class_list.html b/doc/puppet_class_list.html new file mode 100644 index 0000000..c26d5c9 --- /dev/null +++ b/doc/puppet_class_list.html @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + Puppet Class List + + + +
+
+

Puppet Class List

+ + + +
+ + +
+ + diff --git a/doc/puppet_classes/cassandra.html b/doc/puppet_classes/cassandra.html new file mode 100644 index 0000000..efd46f0 --- /dev/null +++ b/doc/puppet_classes/cassandra.html @@ -0,0 +1,1229 @@ + + + + + + + Puppet Class: cassandra + + — Documentation by YARD 0.9.5 + + + + + + + + + + + + + + + + + + + +
+ + + + +

Puppet Class: cassandra

+
+ +
+
Inherits:
+
cassandra::params
+
+ + +
+
Defined in:
+
+ manifests/init.pp +
+
+
+

Overview

+
+
+ +

A class for installing the Cassandra package and manipulate settings in the +configuration file.

+ +
+
+
+

Parameters:

+
    + +
  • + + cassandra_2356_sleep_seconds + + + (boolean) + + + (defaults to: 5) + + + — +
    +

    This will provide a workaround for CASSANDRA-2356 +by sleeping for the specifed number of seconds after an event involving the +Cassandra package. This option is silently ignored on the Red Hat family of +operating systems as this bug only affects Debian systems.

    +
    + +
  • + +
  • + + cassandra_9822 + + + (boolean) + + + (defaults to: false) + + + — +
    +

    If set to true, this will apply a patch to the init file for the Cassandra +service as a workaround for CASSANDRA-9822. +This this bug only affects Debian systems.

    +
    + +
  • + +
  • + + cassandra_yaml_tmpl + + + (string) + + + (defaults to: 'cassandra/cassandra.yaml.erb') + + + — +
    +

    The path to the Puppet template for the Cassandra configuration file. This +allows the user to supply their own customized template.`

    +
    + +
  • + +
  • + + commitlog_directory + + + (string) + + + (defaults to: undef) + + + — +
    +

    The path to the commitlog directory. If set, the directory will be managed +as a Puppet resource. Do not specify a value here and in the +settings hash as they are mutually exclusive.

    +
    + +
  • + +
  • + + commitlog_directory_mode + + + (string) + + + (defaults to: '0750') + + + — +
    +

    The mode for the commitlog_directory is ignored unless +commitlog_directory is specified.

    +
    + +
  • + +
  • + + config_file_mode + + + (string) + + + (defaults to: '0644') + + + — +
    +

    The permissions mode of the cassandra configuration file.

    +
    + +
  • + +
  • + + config_path + + + (string) + + + (defaults to: $::cassandra::params::config_path) + + + — +
    +

    The path to the cassandra configuration file.

    +
    + +
  • + +
  • + + data_file_directories + + + (array) + + + (defaults to: undef) + + + — +
    +

    The path(s) to the date directory or directories. If set, the directories +will be managed as a Puppet resource. Do not specify a value here and in +the settings hash as they are mutually exclusive.

    +
    + +
  • + +
  • + + data_file_directories_mode + + + (string) + + + (defaults to: '0750') + + + — +
    +

    The mode for the data_file_directories is ignored unless +data_file_directories is specified.

    +
    + +
  • + +
  • + + dc + + + (string) + + + (defaults to: 'DC1') + + + — +
    +

    Sets the value for dc in +config_path/snitch_properties_file docs.datastax.com/en/cassandra/2.1/cassandra/architecture/architectureSnitchesAbout_c.html +for more details.

    +
    + +
  • + +
  • + + dc_suffix + + + (string) + + + (defaults to: undef) + + + — +
    +

    Sets the value for dc_suffix in +config_path/snitch_properties_file see docs.datastax.com/en/cassandra/2.1/cassandra/architecture/architectureSnitchesAbout_c.html +for more details. If the value is undef then no change will be +made to the snitch properties file for this setting.

    +
    + +
  • + +
  • + + fail_on_non_supported_os + + + (boolean) + + + (defaults to: true) + + + — +
    +

    A flag that dictates if the module should fail if it is not RedHat or +Debian. If you set this option to false then you must also at least set the +config_path attribute as well.

    +
    + +
  • + +
  • + + hints_directory + + + (string) + + + (defaults to: undef) + + + — +
    +

    The path to the hints directory. If set, the directory will be managed as a +Puppet resource. Do not specify a value here and in the +settings hash as they are mutually exclusive. Do not set this +option in Cassandra versions before 3.0.0.

    +
    + +
  • + +
  • + + hints_directory_mode + + + (string) + + + (defaults to: '0750') + + + — +
    +

    The mode for the hints_directory is ignored unless +hints_directory is specified.

    +
    + +
  • + +
  • + + package_ensure + + + (present|latest|string) + + + (defaults to: 'present') + + + — +
    +

    The status of the package specified in package_name. Can +be present, latest or a specific version number.

    +
    + +
  • + +
  • + + package_name + + + (string) + + + (defaults to: $::cassandra::params::cassandra_pkg) + + + — +
    +

    The name of the Cassandra package which must be available from a +repository.

    +
    + +
  • + +
  • + + prefer_local + + + (boolean) + + + (defaults to: undef) + + + — +
    +

    Sets the value for prefer_local in +config_path/snitch_properties_file see docs.datastax.com/en/cassandra/2.1/cassandra/architecture/architectureSnitchesAbout_c.html +for more details. Valid values are true, false or undef. If the +value is undef then change will be made to the snitch properties +file for this setting.

    +
    + +
  • + +
  • + + rack + + + (string) + + + (defaults to: 'RAC1') + + + — +
    +

    Sets the value for rack in +config_path/snitch_properties_file see docs.datastax.com/en/cassandra/2.1/cassandra/architecture/architectureSnitchesAbout_c.html +for more details.

    +
    + +
  • + +
  • + + rackdc_tmpl + + + (string) + + + (defaults to: 'cassandra/cassandra-rackdc.properties.erb') + + + — +
    +

    The template for creating the snitch properties file.

    +
    + +
  • + +
  • + + saved_caches_directory + + + (string) + + + (defaults to: undef) + + + — +
    +

    The path to the saved caches directory. If set, the directory will be +managed as a Puppet resource. Do not specify a value here and in the +settings hash as they are mutually exclusive.

    +
    + +
  • + +
  • + + saved_caches_directory_mode + + + (string) + + + (defaults to: '0750') + + + — +
    +

    The mode for the saved_caches_directory is ignored unless +saved_caches_directory is specified.

    +
    + +
  • + +
  • + + service_enable + + + (boolean) + + + (defaults to: true) + + + — +
    +

    enable the Cassandra service to start at boot time.

    +
    + +
  • + +
  • + + service_ensure + + + (string) + + + (defaults to: undef) + + + — +
    +

    Ensure the Cassandra service is running. Valid values are running or +stopped.

    +
    + +
  • + +
  • + + service_name + + + (string) + + + (defaults to: 'cassandra') + + + — +
    +

    The name of the service that runs the Cassandra software.

    +
    + +
  • + +
  • + + service_provider + + + (string) + + + (defaults to: undef) + + + — +
    +

    The name of the provider that runs the service. If left as undef +then the OS family specific default will be used, otherwise the specified +value will be used instead.

    +
    + +
  • + +
  • + + service_refresh + + + (boolean) + + + (defaults to: true) + + + — +
    +

    If set to true, changes to the Cassandra config file or the data +directories will ensure that Cassandra service is refreshed after the +changes. Setting this flag to false will disable this behaviour, therefore +allowing the changes to be made but allow the user to control when the +service is restarted.

    +
    + +
  • + +
  • + + settings + + + (hash) + + + (defaults to: {}) + + + — +
    +

    A hash that is passed to to_yaml which dumps the results to +the Cassandra configuring file. The minimum required settings for Cassandra +2.X are as follows:

    + +
    {
    +    'authenticator'               => 'PasswordAuthenticator',
    +    'cluster_name'                => 'MyCassandraCluster',
    +    'commitlog_directory'         => '/var/lib/cassandra/commitlog',
    +    'commitlog_sync'              => 'periodic',
    +    'commitlog_sync_period_in_ms' => 10000,
    +    'data_file_directories'       => ['/var/lib/cassandra/data'],
    +    'endpoint_snitch'             => 'GossipingPropertyFileSnitch',
    +    'listen_address'              => $::ipaddress,
    +    'partitioner'                 => 'org.apache.cassandra.dht.Murmur3Partitioner',
    +    'saved_caches_directory'      => '/var/lib/cassandra/saved_caches',
    +    'seed_provider'               => [
    +      {
    +        'class_name' => 'org.apache.cassandra.locator.SimpleSeedProvider',
    +        'parameters' => [
    +          {
    +            'seeds' => $::ipaddress,
    +          },
    +        ],
    +      },
    +    ],
    +    'start_native_transport'      => true,
    +  }
    + +

    For Cassandra 3.X you will also need to specify the +hints_directory attribute.

    +
    + +
  • + +
  • + + snitch_properties_file + + + (string) + + + (defaults to: 'cassandra-rackdc.properties') + + + — +
    +

    The name of the snitch properties file. The full path name would be +config_path/snitch_properties_file.

    +
    + +
  • + +
  • + + systemctl + + + (string) + + + (defaults to: $::cassandra::params::systemctl) + + + — +
    +

    The full path to the systemctl command. Only needed when the package is +installed. Will silently continue if the executable does not exist.

    +
    + +
  • + +
+ + +
+
+ + + + +
+
+
+
+124
+125
+126
+127
+128
+129
+130
+131
+132
+133
+134
+135
+136
+137
+138
+139
+140
+141
+142
+143
+144
+145
+146
+147
+148
+149
+150
+151
+152
+153
+154
+155
+156
+157
+158
+159
+160
+161
+162
+163
+164
+165
+166
+167
+168
+169
+170
+171
+172
+173
+174
+175
+176
+177
+178
+179
+180
+181
+182
+183
+184
+185
+186
+187
+188
+189
+190
+191
+192
+193
+194
+195
+196
+197
+198
+199
+200
+201
+202
+203
+204
+205
+206
+207
+208
+209
+210
+211
+212
+213
+214
+215
+216
+217
+218
+219
+220
+221
+222
+223
+224
+225
+226
+227
+228
+229
+230
+231
+232
+233
+234
+235
+236
+237
+238
+239
+240
+241
+242
+243
+244
+245
+246
+247
+248
+249
+250
+251
+252
+253
+254
+255
+256
+257
+258
+259
+260
+261
+262
+263
+264
+265
+266
+267
+268
+269
+270
+271
+272
+273
+274
+275
+276
+277
+278
+279
+280
+281
+282
+283
+284
+285
+286
+287
+288
+289
+290
+291
+292
+293
+294
+295
+296
+297
+298
+299
+300
+301
+302
+303
+304
+305
+306
+307
+308
+309
+310
+311
+312
+313
+314
+315
+316
+317
+318
+319
+320
+321
+322
+323
+324
+325
+326
+327
+328
+329
+330
+331
+332
+333
+334
+335
+336
+337
+338
+339
+340
+341
+342
+343
+344
+345
+346
+347
+348
+349
+350
+351
+352
+353
+354
+355
+356
+357
+358
+359
+360
+361
+362
+363
+364
+365
+366
+367
+368
+369
+370
+371
+372
+373
+374
+375
+376
+377
+
+
# File 'manifests/init.pp', line 124
+
+class cassandra (
+  $cassandra_2356_sleep_seconds = 5,
+  $cassandra_9822               = false,
+  $cassandra_yaml_tmpl          = 'cassandra/cassandra.yaml.erb',
+  $commitlog_directory          = undef,
+  $commitlog_directory_mode     = '0750',
+  $config_file_mode             = '0644',
+  $config_path                  = $::cassandra::params::config_path,
+  $data_file_directories        = undef,
+  $data_file_directories_mode   = '0750',
+  $dc                           = 'DC1',
+  $dc_suffix                    = undef,
+  $fail_on_non_supported_os     = true,
+  $hints_directory              = undef,
+  $hints_directory_mode         = '0750',
+  $package_ensure               = 'present',
+  $package_name                 = $::cassandra::params::cassandra_pkg,
+  $prefer_local                 = undef,
+  $rack                         = 'RAC1',
+  $rackdc_tmpl                  = 'cassandra/cassandra-rackdc.properties.erb',
+  $saved_caches_directory       = undef,
+  $saved_caches_directory_mode  = '0750',
+  $service_enable               = true,
+  $service_ensure               = undef,
+  $service_name                 = 'cassandra',
+  $service_provider             = undef,
+  $service_refresh              = true,
+  $settings                     = {},
+  $snitch_properties_file       = 'cassandra-rackdc.properties',
+  $systemctl                    = $::cassandra::params::systemctl,
+  ) inherits cassandra::params {
+  if $service_provider != undef {
+    Service {
+      provider => $service_provider,
+    }
+  }
+
+  $config_file = "${config_path}/cassandra.yaml"
+  $dc_rack_properties_file = "${config_path}/${snitch_properties_file}"
+
+  case $::osfamily {
+    'RedHat': {
+      $config_file_require = Package['cassandra']
+      $config_file_before  = []
+      $config_path_require = Package['cassandra']
+      $dc_rack_properties_file_require = Package['cassandra']
+      $dc_rack_properties_file_before  = []
+      $data_dir_require = Package['cassandra']
+      $data_dir_before = []
+
+      if $::operatingsystemmajrelease == 7 and $::cassandra::service_provider == 'init' {
+        exec { "/sbin/chkconfig --add ${service_name}":
+          unless  => "/sbin/chkconfig --list ${service_name}",
+          require => Package['cassandra'],
+          before  => Service['cassandra'],
+        }
+      }
+    }
+    'Debian': {
+      $config_file_require = [ User['cassandra'], File[$config_path] ]
+      $config_file_before  = Package['cassandra']
+      $config_path_require = []
+      $dc_rack_properties_file_require = [ User['cassandra'], File[$config_path] ]
+      $dc_rack_properties_file_before  = Package['cassandra']
+      $data_dir_require = File[$config_file]
+      $data_dir_before = Package['cassandra']
+
+      if $cassandra_9822 {
+        file { '/etc/init.d/cassandra':
+          source => 'puppet:///modules/cassandra/CASSANDRA-9822/cassandra',
+          mode   => '0555',
+          before => Package['cassandra'],
+        }
+      }
+      # Sleep after package install and before service resource to prevent
+      # possible duplicate processes arising from CASSANDRA-2356.
+      exec { 'CASSANDRA-2356 sleep':
+        command     => "/bin/sleep ${cassandra_2356_sleep_seconds}",
+        refreshonly => true,
+        user        => 'root',
+        subscribe   => Package['cassandra'],
+        before      => Service['cassandra'],
+      }
+
+      group { 'cassandra':
+        ensure => present,
+      }
+
+      $user = 'cassandra'
+
+      user { $user:
+        ensure     => present,
+        comment    => 'Cassandra database,,,',
+        gid        => 'cassandra',
+        home       => '/var/lib/cassandra',
+        shell      => '/bin/false',
+        managehome => true,
+        require    => Group['cassandra'],
+      }
+      # End of CASSANDRA-2356 specific resources.
+    }
+    default: {
+      $config_file_before  = []
+      $config_file_require = [ User['cassandra'], File[$config_path] ]
+      $config_path_require = []
+      $dc_rack_properties_file_require = Package['cassandra']
+      $dc_rack_properties_file_before  = []
+
+      if $fail_on_non_supported_os {
+        fail("OS family ${::osfamily} not supported")
+      } else {
+        warning("OS family ${::osfamily} not supported")
+      }
+    }
+  }
+
+  package { 'cassandra':
+    ensure => $package_ensure,
+    name   => $package_name,
+    notify => Exec['cassandra_reload_systemctl'],
+  }
+
+  exec { 'cassandra_reload_systemctl':
+    command     => "${systemctl} daemon-reload",
+    onlyif      => "test -x ${systemctl}",
+    path        => ['/usr/bin', '/bin'],
+    refreshonly => true,
+  }
+
+  file { $config_path:
+    ensure  => directory,
+    group   => 'cassandra',
+    owner   => 'cassandra',
+    mode    => '0755',
+    require => $config_path_require,
+  }
+
+  if $commitlog_directory {
+    file { $commitlog_directory:
+      ensure  => directory,
+      owner   => 'cassandra',
+      group   => 'cassandra',
+      mode    => $commitlog_directory_mode,
+      require => $data_dir_require,
+      before  => $data_dir_before,
+    }
+
+    $commitlog_directory_settings = merge($settings,
+      { 'commitlog_directory' => $commitlog_directory, })
+  } else {
+    $commitlog_directory_settings = $settings
+  }
+
+  if is_array($data_file_directories) {
+    file { $data_file_directories:
+      ensure  => directory,
+      owner   => 'cassandra',
+      group   => 'cassandra',
+      mode    => $data_file_directories_mode,
+      require => $data_dir_require,
+      before  => $data_dir_before,
+    }
+
+    $data_file_directories_settings = merge($settings, {
+      'data_file_directories' => $data_file_directories,
+    })
+  } else {
+    $data_file_directories_settings = $settings
+  }
+
+  if $hints_directory {
+    file { $hints_directory:
+      ensure  => directory,
+      owner   => 'cassandra',
+      group   => 'cassandra',
+      mode    => $hints_directory_mode,
+      require => $data_dir_require,
+      before  => $data_dir_before,
+    }
+
+    $hints_directory_settings = merge($settings,
+      { 'hints_directory' => $hints_directory, })
+  } else {
+    $hints_directory_settings = $settings
+  }
+
+  if $saved_caches_directory {
+    file { $saved_caches_directory:
+      ensure  => directory,
+      owner   => 'cassandra',
+      group   => 'cassandra',
+      mode    => $saved_caches_directory_mode,
+      require => $data_dir_require,
+      before  => $data_dir_before,
+    }
+
+    $saved_caches_directory_settings = merge($settings,
+      { 'saved_caches_directory' => $saved_caches_directory, })
+  } else {
+    $saved_caches_directory_settings = $settings
+  }
+
+  $merged_settings = merge($settings,
+    $commitlog_directory_settings,
+    $data_file_directories_settings,
+    $hints_directory_settings,
+    $saved_caches_directory_settings)
+
+  file { $config_file:
+    ensure  => present,
+    owner   => 'cassandra',
+    group   => 'cassandra',
+    content => template($cassandra_yaml_tmpl),
+    mode    => $config_file_mode,
+    require => $config_file_require,
+    before  => $config_file_before,
+  }
+
+  file { $dc_rack_properties_file:
+    ensure  => file,
+    content => template($rackdc_tmpl),
+    owner   => 'cassandra',
+    group   => 'cassandra',
+    mode    => '0644',
+    require => $dc_rack_properties_file_require,
+    before  => $dc_rack_properties_file_before,
+  }
+
+  if $package_ensure != 'absent' and $package_ensure != 'purged' {
+    if $service_refresh {
+      service { 'cassandra':
+        ensure    => $service_ensure,
+        name      => $service_name,
+        enable    => $service_enable,
+        subscribe => [
+          File[$config_file],
+          File[$dc_rack_properties_file],
+          Package['cassandra'],
+        ],
+      }
+    } else {
+      service { 'cassandra':
+        ensure  => $service_ensure,
+        name    => $service_name,
+        enable  => $service_enable,
+        require => [
+          File[$config_file],
+          File[$dc_rack_properties_file],
+          Package['cassandra'],
+        ],
+      }
+    }
+  }
+}
+
+ + + + + + + + \ No newline at end of file diff --git a/doc/puppet_classes/cassandra_3A_3Adatastax_agent.html b/doc/puppet_classes/cassandra_3A_3Adatastax_agent.html new file mode 100644 index 0000000..6755762 --- /dev/null +++ b/doc/puppet_classes/cassandra_3A_3Adatastax_agent.html @@ -0,0 +1,489 @@ + + + + + + + Puppet Class: cassandra::datastax_agent + + — Documentation by YARD 0.9.5 + + + + + + + + + + + + + + + + + + + +
+ + + + +

Puppet Class: cassandra::datastax_agent

+
+ +
+
Inherits:
+
cassandra::params
+
+ + +
+
Defined in:
+
+ manifests/datastax_agent.pp +
+
+
+

Overview

+
+
+ +

A class for installing the DataStax Agent and to point it at an OpsCenter +instance.

+ +
+
+
+ +
+

Examples:

+ + +

+

Set agent_alias to foobar, stomp_interface to localhost and ensure that +async_pool_size is absent from the file.

+

+ +
class { 'cassandra::datastax_agent':
+  settings => {
+    'agent_alias'     => {
+      'setting' => 'agent_alias',
+      'value'   => 'foobar',
+    },
+    'stomp_interface' => {
+      'setting' => 'stomp_interface',
+      'value'   => 'localhost',
+    },
+    'async_pool_size' => {
+      'ensure' => absent,
+    },
+  },
+}
+ +
+

Parameters:

+
    + +
  • + + address_config_file + + + (Any) + + + (defaults to: '/var/lib/datastax-agent/conf/address.yaml') + + + — +
    +

    The full path to the address config file.

    +
    + +
  • + +
  • + + defaults_file + + + (Any) + + + (defaults to: '/etc/default/datastax-agent') + + + — +
    +

    The full path name to the file where java_home is set.

    +
    + +
  • + +
  • + + java_home + + + (Any) + + + (defaults to: undef) + + + — +
    +

    If the value of this variable is left as undef, no action is +taken. Otherwise the value is set as JAVA_HOME in +defaults_file.

    +
    + +
  • + +
  • + + package_ensure + + + (Any) + + + (defaults to: 'present') + + + — +
    +

    Is passed to the package reference. Valid values are +present or a version number.

    +
    + +
  • + +
  • + + package_name + + + (Any) + + + (defaults to: 'datastax-agent') + + + — +
    +

    Is passed to the package reference.

    +
    + +
  • + +
  • + + service_ensure + + + (Any) + + + (defaults to: 'running') + + + — +
    +

    Is passed to the service reference.

    +
    + +
  • + +
  • + + service_enable + + + (Any) + + + (defaults to: true) + + + — +
    +

    Is passed to the service reference.

    +
    + +
  • + +
  • + + service_name + + + (Any) + + + (defaults to: 'datastax-agent') + + + — +
    +

    Is passed to the service reference.

    +
    + +
  • + +
  • + + service_provider + + + (Any) + + + (defaults to: undef) + + + — +
    +

    The name of the provider that runs the service. If left as undef +then the OS family specific default will be used, otherwise the specified +value will be used instead.

    +
    + +
  • + +
  • + + settings + + + (Any) + + + (defaults to: {}) + + + — +
    +

    A hash that is passed to create_ini_settings +with the following additional defaults:

    + +
    {
    +  path              => $address_config_file,
    +  key_val_separator => ': ',
    +  require           => Package[$package_name],
    +  notify            => Service['datastax-agent'],
    +}
    +
    +
    + +
  • + +
+ + +
+ + + + + +
+
+
+
+48
+49
+50
+51
+52
+53
+54
+55
+56
+57
+58
+59
+60
+61
+62
+63
+64
+65
+66
+67
+68
+69
+70
+71
+72
+73
+74
+75
+76
+77
+78
+79
+80
+81
+82
+83
+84
+85
+86
+87
+88
+89
+90
+91
+92
+93
+94
+95
+96
+97
+98
+99
+100
+101
+102
+103
+104
+105
+106
+107
+108
+109
+110
+111
+112
+113
+114
+115
+116
+117
+118
+119
+120
+
+
# File 'manifests/datastax_agent.pp', line 48
+
+class cassandra::datastax_agent (
+  $address_config_file  = '/var/lib/datastax-agent/conf/address.yaml',
+  $defaults_file        = '/etc/default/datastax-agent',
+  $java_home            = undef,
+  $package_ensure       = 'present',
+  $package_name         = 'datastax-agent',
+  $service_ensure       = 'running',
+  $service_enable       = true,
+  $service_name         = 'datastax-agent',
+  $service_provider     = undef,
+  $settings             = {},
+  ) inherits cassandra::params {
+  if $service_provider != undef {
+    System {
+      provider => $service_provider,
+    }
+  }
+
+  package { $package_name:
+    ensure  => $package_ensure,
+    require => Class['cassandra'],
+    notify  => Exec['datastax_agent_reload_systemctl'],
+  }
+
+  exec { 'datastax_agent_reload_systemctl':
+    command     => "${::cassandra::params::systemctl} daemon-reload",
+    onlyif      => "test -x ${::cassandra::params::systemctl}",
+    path        => ['/usr/bin', '/bin'],
+    refreshonly => true,
+    notify      => Service['datastax-agent'],
+  }
+
+  file { $address_config_file:
+    owner   => 'cassandra',
+    group   => 'cassandra',
+    mode    => '0644',
+    require => Package[$package_name],
+  }
+
+  if $java_home != undef {
+    ini_setting { 'java_home':
+      ensure            => present,
+      path              => $defaults_file,
+      section           => '',
+      key_val_separator => '=',
+      setting           => 'JAVA_HOME',
+      value             => $java_home,
+      notify            => Service['datastax-agent'],
+    }
+  }
+
+  service { 'datastax-agent':
+    ensure => $service_ensure,
+    enable => $service_enable,
+    name   => $service_name,
+  }
+
+  if $settings {
+    $defaults = {
+      path              => $address_config_file,
+      key_val_separator => ': ',
+      require           => Package[$package_name],
+      notify            => Service['datastax-agent'],
+    }
+
+    $full_settings = {
+      '' => $settings,
+    }
+
+    validate_hash($full_settings)
+    create_ini_settings($full_settings, $defaults)
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/cassandra_3A_3Adatastax_repo.html b/doc/puppet_classes/cassandra_3A_3Adatastax_repo.html new file mode 100644 index 0000000..923bfec --- /dev/null +++ b/doc/puppet_classes/cassandra_3A_3Adatastax_repo.html @@ -0,0 +1,341 @@ + + + + + + + Puppet Class: cassandra::datastax_repo + + — Documentation by YARD 0.9.5 + + + + + + + + + + + + + + + + + + + +
+ + + + +

Puppet Class: cassandra::datastax_repo

+
+ + +
+
Defined in:
+
+ manifests/datastax_repo.pp +
+
+
+

Overview

+
+
+ +

An optional class that will allow a suitable repository to be configured +from which packages for DataStax Community can be downloaded. Changing the +defaults will allow any Debian Apt or Red Hat Yum repository to be +configured.

+ +
+
+
+

Parameters:

+
    + +
  • + + descr + + + (string) + + + (defaults to: 'DataStax Repo for Apache Cassandra') + + + — +
    +

    On the Red Hat family, this is passed as the descr attribute +to a yumrepo resource. On the Debian family, it is passed as +the comment attribute to an apt::source resource.

    +
    + +
  • + +
  • + + key_id + + + (string) + + + (defaults to: '7E41C00F85BFC1706C4FFFB3350200F2B999A372') + + + — +
    +

    On the Debian family, this is passed as the id attribute to an +apt::key resource. On the Red Hat family, it is ignored.

    +
    + +
  • + +
  • + + key_url + + + (string) + + + (defaults to: 'http://debian.datastax.com/debian/repo_key') + + + — +
    +

    On the Debian family, this is passed as the source attribute +to an apt::key resource. On the Red Hat family, it is ignored.

    +
    + +
  • + +
  • + + pkg_url + + + (string) + + + (defaults to: undef) + + + — +
    +

    If left as the default, this will set the baseurl to 'rpm.datastax.com/community' +on a yumrepo resource on the Red Hat family. On the Debian +family, leaving this as the default will set the location +attribute on an apt::source to 'debian.datastax.com/community'.

    +
    + +
  • + +
  • + + release + + + (string) + + + (defaults to: 'stable') + + + — +
    +

    On the Debian family, this is passed as the release attribute +to an apt::source resource. On the Red Hat family, it is +ignored.

    +
    + +
  • + +
+ + +
+ + + + + +
+
+
+
+22
+23
+24
+25
+26
+27
+28
+29
+30
+31
+32
+33
+34
+35
+36
+37
+38
+39
+40
+41
+42
+43
+44
+45
+46
+47
+48
+49
+50
+51
+52
+53
+54
+55
+56
+57
+58
+59
+60
+61
+62
+63
+64
+65
+66
+67
+68
+69
+70
+71
+72
+73
+74
+75
+76
+77
+78
+79
+80
+81
+82
+
+
# File 'manifests/datastax_repo.pp', line 22
+
+class cassandra::datastax_repo (
+  $descr   = 'DataStax Repo for Apache Cassandra',
+  $key_id  = '7E41C00F85BFC1706C4FFFB3350200F2B999A372',
+  $key_url = 'http://debian.datastax.com/debian/repo_key',
+  $pkg_url = undef,
+  $release = 'stable',
+  ) {
+  case $::osfamily {
+    'RedHat': {
+      if $pkg_url != undef {
+        $baseurl = $pkg_url
+      } else {
+        $baseurl = 'http://rpm.datastax.com/community'
+      }
+
+      yumrepo { 'datastax':
+        ensure   => present,
+        descr    => $descr,
+        baseurl  => $baseurl,
+        enabled  => 1,
+        gpgcheck => 0,
+      }
+    }
+    'Debian': {
+      include apt
+      include apt::update
+
+      apt::key {'datastaxkey':
+        id     => $key_id,
+        source => $key_url,
+        before => Apt::Source['datastax'],
+      }
+
+      if $pkg_url != undef {
+        $location = $pkg_url
+      } else {
+        $location = 'http://debian.datastax.com/community'
+      }
+
+      apt::source {'datastax':
+        location => $location,
+        comment  => $descr,
+        release  => $release,
+        include  => {
+          'src' => false,
+        },
+        notify   => Exec['update-cassandra-repos'],
+      }
+
+      # Required to wrap apt_update
+      exec {'update-cassandra-repos':
+        refreshonly => true,
+        command     => '/bin/true',
+        require     => Exec['apt_update'],
+      }
+    }
+    default: {
+      warning("OS family ${::osfamily} not supported")
+    }
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/cassandra_3A_3Afirewall_ports.html b/doc/puppet_classes/cassandra_3A_3Afirewall_ports.html new file mode 100644 index 0000000..03fda26 --- /dev/null +++ b/doc/puppet_classes/cassandra_3A_3Afirewall_ports.html @@ -0,0 +1,390 @@ + + + + + + + Puppet Class: cassandra::firewall_ports + + — Documentation by YARD 0.9.5 + + + + + + + + + + + + + + + + + + + +
+ + + + +

Puppet Class: cassandra::firewall_ports

+
+ + +
+
Defined in:
+
+ manifests/firewall_ports.pp +
+
+
+

Overview

+
+
+ +

An optional class to configure incoming network ports on the host that are +relevant to the Cassandra installation. If firewalls are being managed +already, simply do not include this module in your manifest.

+ +

IMPORTANT: The full list of which ports should be configured is assessed at +evaluation time of the configuration. Therefore if one is to use this +class, it must be the final cassandra class included in the manifest.

+ +
+
+
+

Parameters:

+
    + +
  • + + client_ports + + + (array) + + + (defaults to: [9042, 9160]) + + + — +
    +

    Only has any effect if the cassandra class is defined on the +node. Allow these TCP ports to be opened for traffic coming from the client +subnets.

    +
    + +
  • + +
  • + + client_subnets + + + (array) + + + (defaults to: ['0.0.0.0/0']) + + + — +
    +

    Only has any effect if the cassandra class is defined on the +node. An array of the list of subnets that are to allowed connection to +cassandra::native_transport_port and cassandra::rpc_port.

    +
    + +
  • + +
  • + + inter_node_ports + + + (array) + + + (defaults to: [7000, 7001, 7199]) + + + — +
    +

    Only has any effect if the cassandra class is defined on the +node. Allow these TCP ports to be opened for traffic between the Cassandra +nodes.

    +
    + +
  • + +
  • + + inter_node_subnets + + + (array) + + + (defaults to: ['0.0.0.0/0']) + + + — +
    +

    Only has any effect if the cassandra class is defined on the +node. An array of the list of subnets that are to allowed connection to +cassandra::storage_port, +cassandra::ssl_storage_port and port 7199 for cassandra JMX +monitoring.

    +
    + +
  • + +
  • + + public_ports + + + (array) + + + (defaults to: [8888]) + + + — +
    +

    Allow these TCP ports to be opened for traffic coming from public subnets +the port specified in $ssh_port will be appended to this list.

    +
    + +
  • + +
  • + + public_subnets + + + (array) + + + (defaults to: ['0.0.0.0/0']) + + + — +
    +

    An array of the list of subnets that are to allowed connection to +cassandra::firewall_ports::ssh_port.

    +
    + +
  • + +
  • + + ssh_port + + + (integer) + + + (defaults to: 22) + + + — +
    +

    Which port does SSH operate on.

    +
    + +
  • + +
  • + + opscenter_ports + + + (array) + + + (defaults to: [9042, 9160, 61620, 61621]) + + + — +
    +

    Only has any effect if the cassandra::datastax_agent is +defined. Allow these TCP ports to be opened for traffic coming to or from +OpsCenter appended to this list.

    +
    + +
  • + +
  • + + opscenter_subnets + + + (array) + + + (defaults to: ['0.0.0.0/0']) + + + — +
    +

    A list of subnets that are to be allowed connection to port 61621 for nodes +built with cassandra::datastax_agent.

    +
    + +
  • + +
+ + +
+ + + + + +
+
+
+
+31
+32
+33
+34
+35
+36
+37
+38
+39
+40
+41
+42
+43
+44
+45
+46
+47
+48
+49
+50
+51
+52
+53
+54
+55
+56
+57
+58
+59
+60
+61
+62
+63
+64
+65
+66
+67
+68
+69
+70
+71
+72
+73
+74
+75
+76
+
+
# File 'manifests/firewall_ports.pp', line 31
+
+class cassandra::firewall_ports (
+  $client_ports                = [9042, 9160],
+  $client_subnets              = ['0.0.0.0/0'],
+  $inter_node_ports            = [7000, 7001, 7199],
+  $inter_node_subnets          = ['0.0.0.0/0'],
+  $public_ports                = [8888],
+  $public_subnets              = ['0.0.0.0/0'],
+  $ssh_port                    = 22,
+  $opscenter_ports             = [9042, 9160, 61620, 61621],
+  $opscenter_subnets           = ['0.0.0.0/0'],
+  ) {
+  # Public connections on any node.
+  $public_subnets_array = prefix($public_subnets, '200_Public_')
+
+  cassandra::private::firewall_ports::rule { $public_subnets_array:
+    ports => concat($public_ports, [$ssh_port]),
+  }
+
+  # If this is a Cassandra node.
+  if defined ( Class['::cassandra'] ) {
+    # Inter-node connections for Cassandra
+    $inter_node_subnets_array = prefix($inter_node_subnets,
+      '210_InterNode_')
+
+    cassandra::private::firewall_ports::rule { $inter_node_subnets_array:
+      ports => $inter_node_ports,
+    }
+
+    # Client connections for Cassandra
+    $client_subnets_array = prefix($client_subnets, '220_Client_')
+
+    cassandra::private::firewall_ports::rule {$client_subnets_array:
+      ports => $client_ports,
+    }
+  }
+
+  # Connections for DataStax Agent
+  if defined ( Class['::cassandra::datastax_agent'] ) or defined ( Class['::cassandra::opscenter'] ) {
+    $opscenter_subnets_opc_agent = prefix($opscenter_subnets,
+      '230_OpsCenter_')
+
+    cassandra::private::firewall_ports::rule { $opscenter_subnets_opc_agent:
+      ports => $opscenter_ports,
+    }
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/cassandra_3A_3Ajava.html b/doc/puppet_classes/cassandra_3A_3Ajava.html new file mode 100644 index 0000000..f28d444 --- /dev/null +++ b/doc/puppet_classes/cassandra_3A_3Ajava.html @@ -0,0 +1,354 @@ + + + + + + + Puppet Class: cassandra::java + + — Documentation by YARD 0.9.5 + + + + + + + + + + + + + + + + + + + +
+ + + + +

Puppet Class: cassandra::java

+
+ +
+
Inherits:
+
cassandra::params
+
+ + +
+
Defined in:
+
+ manifests/java.pp +
+
+
+

Overview

+
+
+ +

A class to install Java and JNA packages.

+ +
+
+
+

Parameters:

+
    + +
  • + + aptkey + + + (hash) + + + (defaults to: undef) + + + — +
    +

    If supplied, this should be a hash of apt::key resources that +will be passed to the create_resources function. This is ignored on +non-Debian systems.

    +
    + +
  • + +
  • + + aptsource + + + (hash) + + + (defaults to: undef) + + + — +
    +

    If supplied, this should be a hash of apt::source resources +that will be passed to the create_resources function. This is ignored on +non-Red Hat`

    +
    + +
  • + +
  • + + jna_ensure + + + (string) + + + (defaults to: present) + + + — +
    +

    Is passed to the package reference for the JNA package. Valid values are +present or a version number.

    +
    + +
  • + +
  • + + jna_package_name + + + (string) + + + (defaults to: $::cassandra::params::jna_package_name) + + + — +
    +

    The name of the JNA package.

    +
    + +
  • + +
  • + + package_ensure + + + (string) + + + (defaults to: present) + + + — +
    +

    Is passed to the package reference for the JRE/JDK package. Valid values +are present or a version number.

    +
    + +
  • + +
  • + + package_name + + + (string) + + + (defaults to: $::cassandra::params::java_package) + + + — +
    +

    The name of the Java package to be installed.

    +
    + +
  • + +
  • + + yumrepo + + + (hash) + + + (defaults to: undef) + + + — +
    +

    If supplied, this should be a hash of yumrepo resources that will +be passed to the create_resources function. This is ignored on non-Red Hat +systems.

    +
    + +
  • + +
+ + +
+ + + + + +
+
+
+
+17
+18
+19
+20
+21
+22
+23
+24
+25
+26
+27
+28
+29
+30
+31
+32
+33
+34
+35
+36
+37
+38
+39
+40
+41
+42
+43
+44
+45
+46
+47
+48
+49
+50
+51
+52
+53
+54
+55
+56
+57
+58
+59
+60
+61
+62
+63
+64
+65
+66
+
+
# File 'manifests/java.pp', line 17
+
+class cassandra::java (
+  $aptkey           = undef,
+  $aptsource        = undef,
+  $jna_ensure       = present,
+  $jna_package_name = $::cassandra::params::jna_package_name,
+  $package_ensure   = present,
+  $package_name     = $::cassandra::params::java_package,
+  $yumrepo          = undef,
+  ) inherits cassandra::params {
+  if $::osfamily == 'RedHat' and $yumrepo != undef {
+    $yumrepo_defaults = {
+      'before' => Package[$package_name],
+    }
+
+    create_resources(yumrepo, $yumrepo, $yumrepo_defaults)
+  }
+
+  if $::osfamily == 'Debian' {
+    if $aptkey != undef {
+      $aptkey_defaults = {
+        'before' => Package[$package_name],
+      }
+
+      create_resources(apt::key, $aptkey, $aptkey_defaults)
+    }
+
+    if $aptsource != undef {
+      exec { 'cassandra::java::apt_update':
+        refreshonly => true,
+        command     => '/bin/true',
+        require     => Exec['apt_update'],
+        before      => Package[$package_name],
+      }
+
+      $aptsource_defaults = {
+        'notify' => Exec['cassandra::java::apt_update'],
+      }
+
+      create_resources(apt::source, $aptsource, $aptsource_defaults)
+    }
+  }
+
+  package { $package_name:
+    ensure => $package_ensure,
+  }
+
+  package { $jna_package_name:
+    ensure => $jna_ensure,
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/cassandra_3A_3Aoptutils.html b/doc/puppet_classes/cassandra_3A_3Aoptutils.html new file mode 100644 index 0000000..de18f2a --- /dev/null +++ b/doc/puppet_classes/cassandra_3A_3Aoptutils.html @@ -0,0 +1,175 @@ + + + + + + + Puppet Class: cassandra::optutils + + — Documentation by YARD 0.9.5 + + + + + + + + + + + + + + + + + + + +
+ + + + +

Puppet Class: cassandra::optutils

+
+ +
+
Inherits:
+
cassandra::params
+
+ + +
+
Defined in:
+
+ manifests/optutils.pp +
+
+
+

Overview

+
+
+ +

A class to install the optional Cassandra tools package.

+ +
+
+
+

Parameters:

+
    + +
  • + + package_ensure + + + (string) + + + (defaults to: 'present') + + + — +
    +

    Can be present, latest or a specific version +number.

    +
    + +
  • + +
  • + + package_name + + + (string) + + + (defaults to: $::cassandra::params::optutils_package_name) + + + — +
    +

    The name of the optional utilities package to be installed.

    +
    + +
  • + +
+ + +
+ + + + + +
+
+
+
+6
+7
+8
+9
+10
+11
+12
+13
+14
+
+
# File 'manifests/optutils.pp', line 6
+
+class cassandra::optutils (
+  $package_ensure = 'present',
+  $package_name   = $::cassandra::params::optutils_package_name,
+  ) inherits cassandra::params {
+  package { $package_name:
+    ensure  => $package_ensure,
+    require => Class['cassandra'],
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/cassandra_3A_3Aparams.html b/doc/puppet_classes/cassandra_3A_3Aparams.html new file mode 100644 index 0000000..e58c506 --- /dev/null +++ b/doc/puppet_classes/cassandra_3A_3Aparams.html @@ -0,0 +1,200 @@ + + + + + + + Puppet Class: cassandra::params + + — Documentation by YARD 0.9.5 + + + + + + + + + + + + + + + + + + + +
+ + + + +

Puppet Class: cassandra::params

+
+ + +
+
Inherited by:
+
+ + cassandra
+ + cassandra::java
+ + cassandra::schema
+ + cassandra::optutils
+ + cassandra::datastax_agent
+ +
+
+ +
+
Defined in:
+
+ manifests/params.pp +
+
+
+

Overview

+
+
+ +

This class is meant to be called from cassandra. It sets variables +according to platform

+ +

Variables

+
  • +

    $::cassandra::params::cassandra_pkg defaults to +'cassandra' on Debian and 'cassandra22' on Red Hat.

    +
  • +

    $::cassandra::params::config_path defaults to +'/etc/cassandra' on Debian and +'/etc/cassandra/default.conf' on Red Hat.

    +
  • +

    $::cassandra::params::java_package defaults to +'openjdk-7-jre-headless' on Debian and +'java-1.8.0-openjdk-headless' on Red Hat.

    +
  • +

    $::cassandra::params::jna_package_name defaults to +'libjna-java' on Debian and 'jna' on Red Hat.

    +
  • +

    $::cassandra::params::optutils_package_name defaults to +'cassandra-tools' on Debian and 'cassandra22-tools' on Red +Hat.

    +
  • +

    $::cassandra::params::systemctl defaults to +'/bin/systemctl' on Debian and '/usr/bin/systemctl' on Red +Hat.

    +
+ +
+
+
+ + +
+ + + + + +
+
+
+
+18
+19
+20
+21
+22
+23
+24
+25
+26
+27
+28
+29
+30
+31
+32
+33
+34
+35
+36
+37
+38
+39
+40
+
+
# File 'manifests/params.pp', line 18
+
+class cassandra::params {
+  case $::osfamily {
+    'Debian': {
+      $cassandra_pkg = 'cassandra'
+      $config_path = '/etc/cassandra'
+      $java_package = 'openjdk-7-jre-headless'
+      $jna_package_name = 'libjna-java'
+      $optutils_package_name = 'cassandra-tools'
+      $systemctl = '/bin/systemctl'
+    }
+    'RedHat': {
+      $cassandra_pkg = 'cassandra22'
+      $config_path = '/etc/cassandra/default.conf'
+      $java_package = 'java-1.8.0-openjdk-headless'
+      $jna_package_name = 'jna'
+      $optutils_package_name = 'cassandra22-tools'
+      $systemctl = '/usr/bin/systemctl'
+    }
+    default: {
+      $config_path_parents = []
+    }
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_classes/cassandra_3A_3Aschema.html b/doc/puppet_classes/cassandra_3A_3Aschema.html new file mode 100644 index 0000000..867cde8 --- /dev/null +++ b/doc/puppet_classes/cassandra_3A_3Aschema.html @@ -0,0 +1,572 @@ + + + + + + + Puppet Class: cassandra::schema + + — Documentation by YARD 0.9.5 + + + + + + + + + + + + + + + + + + + +
+ + + + +

Puppet Class: cassandra::schema

+
+ +
+
Inherits:
+
cassandra::params
+
+ + +
+
Defined in:
+
+ manifests/schema.pp +
+
+
+

Overview

+
+
+ +

A class to maintain the database schema. Please note that cqlsh expects +Python 2.7 to be installed. This may be a problem of older distributions +(CentOS 6 for example).

+ +
+
+
+

Parameters:

+
    + +
  • + + connection_tries + + + (integer) + + + (defaults to: 6) + + + — +
    +

    How many times do try to connect to Cassandra. See also +connection_try_sleep.

    +
    + +
  • + +
  • + + connection_try_sleep + + + (integer) + + + (defaults to: 30) + + + — +
    +

    How much time to allow between the number of tries specified in +connection_tries.

    +
    + +
  • + +
  • + + cql_types + + + (hash) + + + (defaults to: {}) + + + — +
    +

    Creates new cassandra::schema::cql_type resources.

    +
    + +
  • + +
  • + + cqlsh_additional_options + + + (string) + + + (defaults to: '') + + + — +
    +

    Any additional options to be passed to the cqlsh command.

    +
    + +
  • + +
  • + + cqlsh_client_config + + + (string) + + + (defaults to: undef) + + + — +
    +

    Set this to a file name (e.g. '/root/.puppetcqlshrc') that will +then be used to contain the the credentials for connecting to Cassandra. +This is a more secure option than having the credentials appearing on the +command line. This option is only available in Cassandra >= 2.1.

    +
    + +
  • + +
  • + + cqlsh_client_tmpl + + + (string) + + + (defaults to: 'cassandra/cqlshrc.erb') + + + — +
    +

    The location of the template for configuring the credentials for the cqlsh +client. This is ignored unless cqlsh_client_config is set.

    +
    + +
  • + +
  • + + cqlsh_command + + + (string) + + + (defaults to: '/usr/bin/cqlsh') + + + — +
    +

    The full path to the cqlsh command.

    +
    + +
  • + +
  • + + cqlsh_host + + + (string) + + + (defaults to: 'localhost') + + + — +
    +

    The host for the cqlsh command to connect to. See also +cqlsh_port.

    +
    + +
  • + +
  • + + cqlsh_password + + + (string) + + + (defaults to: undef) + + + — +
    +

    If credentials are require for connecting, specify the password here. See +also cqlsh_user, cqlsh_client_config.

    +
    + +
  • + +
  • + + cqlsh_port + + + (integer) + + + (defaults to: 9042) + + + — +
    +

    The host for the cqlsh command to connect to. See also +cqlsh_host.

    +
    + +
  • + +
  • + + cqlsh_user + + + (string) + + + (defaults to: 'cassandra') + + + — +
    +

    If credentials are required for connecting, specify the password here. See +also cqlsh_password, cqlsh_client_config

    +
    + +
  • + +
  • + + indexes + + + (hash) + + + (defaults to: {}) + + + — +
    +

    Creates new cassandra::schema::index resources.

    +
    + +
  • + +
  • + + keyspaces + + + (hash) + + + (defaults to: {}) + + + — +
    +

    Creates new cassandra::schema::keyspace resources.

    +
    + +
  • + +
  • + + tables + + + (hash) + + + (defaults to: {}) + + + — +
    +

    Creates new cassandra::schema::table resources.

    +
    + +
  • + +
  • + + users + + + (hash) + + + (defaults to: {}) + + + — +
    +

    Creates new cassandra::schema::user resources.

    +
    + +
  • + +
+ + +
+ + + + + +
+
+
+
+33
+34
+35
+36
+37
+38
+39
+40
+41
+42
+43
+44
+45
+46
+47
+48
+49
+50
+51
+52
+53
+54
+55
+56
+57
+58
+59
+60
+61
+62
+63
+64
+65
+66
+67
+68
+69
+70
+71
+72
+73
+74
+75
+76
+77
+78
+79
+80
+81
+82
+83
+84
+85
+86
+87
+88
+89
+90
+91
+92
+93
+94
+95
+96
+97
+98
+99
+100
+101
+102
+103
+104
+105
+106
+107
+108
+109
+110
+111
+112
+113
+114
+115
+116
+117
+
+
# File 'manifests/schema.pp', line 33
+
+class cassandra::schema (
+  $connection_tries         = 6,
+  $connection_try_sleep     = 30,
+  $cql_types                = {},
+  $cqlsh_additional_options = '',
+  $cqlsh_client_config      = undef,
+  $cqlsh_client_tmpl        = 'cassandra/cqlshrc.erb',
+  $cqlsh_command            = '/usr/bin/cqlsh',
+  $cqlsh_host               = 'localhost',
+  $cqlsh_password           = undef,
+  $cqlsh_port               = 9042,
+  $cqlsh_user               = 'cassandra',
+  $indexes                  = {},
+  $keyspaces                = {},
+  $tables                   = {},
+  $users                    = {},
+  ) inherits cassandra::params {
+  require '::cassandra'
+
+  if $cqlsh_client_config != undef {
+    file { $cqlsh_client_config :
+      ensure  => file,
+      group   => $::gid,
+      mode    => '0600',
+      owner   => $::id,
+      content => template( $cqlsh_client_tmpl ),
+      before  => Exec['::cassandra::schema connection test'],
+    }
+
+    $cmdline_login = "--cqlshrc=${cqlsh_client_config}"
+  } else {
+    if $cqlsh_password != undef {
+      warning('You may want to consider using the cqlsh_client_config attribute')
+      $cmdline_login = "-u ${cqlsh_user} -p ${cqlsh_password}"
+    } else {
+      $cmdline_login = ''
+    }
+  }
+
+  $cqlsh_opts = "${cqlsh_command} ${cmdline_login} ${cqlsh_additional_options}"
+  $cqlsh_conn = "${cqlsh_host} ${cqlsh_port}"
+
+  # See if we can make a connection to Cassandra.  Try $connection_tries
+  # number of times with $connection_try_sleep in seconds between each try.
+  $connection_test = "${cqlsh_opts} -e 'DESC KEYSPACES' ${cqlsh_conn}"
+  exec { '::cassandra::schema connection test':
+    command   => $connection_test,
+    returns   => 0,
+    tries     => $connection_tries,
+    try_sleep => $connection_try_sleep,
+    unless    => $connection_test,
+  }
+
+  # manage keyspaces if present
+  if $keyspaces {
+    create_resources('cassandra::schema::keyspace', $keyspaces)
+  }
+
+  # manage cql_types if present
+  if $keyspaces {
+    create_resources('cassandra::schema::cql_type', $cql_types)
+  }
+
+  # manage tables if present
+  if $tables {
+    create_resources('cassandra::schema::table', $tables)
+  }
+
+  # manage indexes if present
+  if $indexes {
+    create_resources('cassandra::schema::index', $indexes)
+  }
+
+  # manage users if present
+  if $users {
+    create_resources('cassandra::schema::user', $users)
+  }
+
+  # Resource Ordering
+  Cassandra::Schema::Keyspace <| |> -> Cassandra::Schema::Cql_type <| |>
+  Cassandra::Schema::Keyspace <| |> -> Cassandra::Schema::Table <| |>
+  Cassandra::Schema::Cql_type <| |> -> Cassandra::Schema::Table <| |>
+  Cassandra::Schema::Table <| |> -> Cassandra::Schema::Index <| |>
+  Cassandra::Schema::Index <| |> -> Cassandra::Schema::User <| |>
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_defined_type_list.html b/doc/puppet_defined_type_list.html new file mode 100644 index 0000000..737d682 --- /dev/null +++ b/doc/puppet_defined_type_list.html @@ -0,0 +1,107 @@ + + + + + + + + + + + + + + + + + + Defined Type List + + + +
+
+

Defined Type List

+ + + +
+ + +
+ + diff --git a/doc/puppet_defined_types/cassandra_3A_3Afile.html b/doc/puppet_defined_types/cassandra_3A_3Afile.html new file mode 100644 index 0000000..9819416 --- /dev/null +++ b/doc/puppet_defined_types/cassandra_3A_3Afile.html @@ -0,0 +1,301 @@ + + + + + + + Defined Type: cassandra::file + + — Documentation by YARD 0.9.5 + + + + + + + + + + + + + + + + + + + +
+ + + + +

Defined Type: cassandra::file

+
+
+
Defined in:
+
+ manifests/file.pp +
+
+
+

Overview

+
+
+ +

A defined type for altering files relative to the configuration directory.

+ +
+
+
+ +
+

Examples:

+ + +
if $::memorysize_mb < 24576.0 {
+  $max_heap_size_in_mb = floor($::memorysize_mb / 2)
+} elsif $::memorysize_mb < 8192.0 {
+  $max_heap_size_in_mb = floor($::memorysize_mb / 4)
+} else {
+  $max_heap_size_in_mb = 8192
+}
+
+$heap_new_size = $::processorcount * 100
+
+cassandra::file { "Set Java/Cassandra max heap size to ${max_heap_size_in_mb}.":
+  file       => 'cassandra-env.sh',
+  file_lines => {
+    'MAX_HEAP_SIZE' => {
+      line  => "MAX_HEAP_SIZE='${max_heap_size_in_mb}M'",
+      match => '^#?MAX_HEAP_SIZE=.*',
+    },
+  }
+}
+
+cassandra::file { "Set Java/Cassandra heap new size to ${heap_new_size}.":
+  file       => 'cassandra-env.sh',
+  file_lines => {
+    'HEAP_NEWSIZE'  => {
+      line  => "HEAP_NEWSIZE='${heap_new_size}M'",
+      match => '^#?HEAP_NEWSIZE=.*',
+    }
+  }
+}
+$tmpdir = '/var/lib/cassandra/tmp'
+
+file { $tmpdir:
+  ensure => directory,
+  owner  => 'cassandra',
+  group  => 'cassandra',
+}
+
+cassandra::file { 'Set java.io.tmpdir':
+  file       => 'jvm.options',
+  file_lines => {
+    'java.io.tmpdir' => {
+      line => "-Djava.io.tmpdir=${tmpdir}",
+    },
+  },
+  require    => File[$tmpdir],
+}
+ +
+

Parameters:

+
    + +
  • + + file + + + (string) + + + (defaults to: $title) + + + — +
    +

    The name of the file relative to the config_path.

    +
    + +
  • + +
  • + + config_path + + + (string) + + + (defaults to: $::cassandra::config_path) + + + — +
    +

    The path to the configuration directory.

    +
    + +
  • + +
  • + + file_lines + + + (string) + + + (defaults to: undef) + + + — +
    +

    If set, then the create_resources +will be used to create an array of file_line +resources.

    +
    + +
  • + +
  • + + service_refresh + + + (boolean) + + + (defaults to: true) + + + — +
    +

    Is the Cassandra service is to be notified if the environment file is +changed.

    +
    + +
  • + +
+ + +
+ + + + + +
+
+
+
+57
+58
+59
+60
+61
+62
+63
+64
+65
+66
+67
+68
+69
+70
+71
+72
+73
+74
+75
+76
+77
+78
+79
+80
+81
+82
+83
+84
+85
+
+
# File 'manifests/file.pp', line 57
+
+define cassandra::file(
+  $file             = $title,
+  $config_path      = $::cassandra::config_path,
+  $file_lines       = undef,
+  $service_refresh  = true,
+  ) {
+  include cassandra
+  include cassandra::params
+  include stdlib
+
+  $path = "${config_path}/${file}"
+
+  if $file_lines != undef {
+    if $service_refresh {
+      $default_file_line = {
+        path    => $path,
+        require => Package['cassandra'],
+        notify  => Service['cassandra'],
+      }
+    } else {
+      $default_file_line = {
+        path    => $path,
+        require => Package['cassandra'],
+      }
+    }
+
+    create_resources(file_line, $file_lines, $default_file_line)
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_defined_types/cassandra_3A_3Aprivate_3A_3Adeprecation_warning.html b/doc/puppet_defined_types/cassandra_3A_3Aprivate_3A_3Adeprecation_warning.html new file mode 100644 index 0000000..d08dacc --- /dev/null +++ b/doc/puppet_defined_types/cassandra_3A_3Aprivate_3A_3Adeprecation_warning.html @@ -0,0 +1,152 @@ + + + + + + + Defined Type: cassandra::private::deprecation_warning + + — Documentation by YARD 0.9.5 + + + + + + + + + + + + + + + + + + + +
+ + + + +

Defined Type: cassandra::private::deprecation_warning

+
+
+
Defined in:
+
+ manifests/private/deprecation_warning.pp +
+
+
+

Overview

+
+
+ +

A defined type to handle deprecation messages to the user. This is not +intended to be used by a user but is documented here for completeness.

+ +
+
+
+

Parameters:

+
    + +
  • + + item_number + + + (integer) + + + + — +
    +

    A unique reference for the message.

    +
    + +
  • + +
+ + +
+ + + + + +
+
+
+
+5
+6
+7
+8
+9
+10
+11
+12
+13
+14
+15
+
+
# File 'manifests/private/deprecation_warning.pp', line 5
+
+define cassandra::private::deprecation_warning($item_number,) {
+  $item_name = $title
+  $warning_message_1 = sprintf('%s has been deprecated and will be removed',
+    $item_name)
+  $warning_message_2 = 'in a future release.'
+  $warning_message = "${warning_message_1} ${warning_message_2}"
+  warning($warning_message)
+  $dep_url = sprintf('https://github.com/locp/cassandra/wiki/DEP-%03d',
+    $item_number)
+  warning(sprintf('See %s for details.', $dep_url))
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_defined_types/cassandra_3A_3Aprivate_3A_3Afirewall_ports_3A_3Arule.html b/doc/puppet_defined_types/cassandra_3A_3Aprivate_3A_3Afirewall_ports_3A_3Arule.html new file mode 100644 index 0000000..e377604 --- /dev/null +++ b/doc/puppet_defined_types/cassandra_3A_3Aprivate_3A_3Afirewall_ports_3A_3Arule.html @@ -0,0 +1,166 @@ + + + + + + + Defined Type: cassandra::private::firewall_ports::rule + + — Documentation by YARD 0.9.5 + + + + + + + + + + + + + + + + + + + +
+ + + + +

Defined Type: cassandra::private::firewall_ports::rule

+
+
+
Defined in:
+
+ manifests/private/firewall_ports/rule.pp +
+
+
+

Overview

+
+
+ +

A defined type to be used as a macro for setting host based firewall rules. +This is not intended to be used by a user (who should use the API provided +by cassandra::firewall_ports instead) but is documented here for +completeness.

+ +
+
+
+

Parameters:

+
    + +
  • + + ports + + + (integer) + + + + — +
    +

    The number(s) of the port(s) to be opened.

    +
    + +
  • + +
+ + +
+ + + + + +
+
+
+
+6
+7
+8
+9
+10
+11
+12
+13
+14
+15
+16
+17
+18
+19
+20
+21
+22
+
+
# File 'manifests/private/firewall_ports/rule.pp', line 6
+
+define cassandra::private::firewall_ports::rule(
+    $ports,
+  ) {
+  $array_var1 = split($title, '_')
+  $rule_number = $array_var1[0]
+  $rule_description = $array_var1[1]
+  $source = $array_var1[2]
+
+  if size($ports) > 0 {
+    firewall { "${rule_number} - Cassandra (${rule_description}) - ${source}":
+      action => 'accept',
+      dport  => $ports,
+      proto  => 'tcp',
+      source => $source,
+    }
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_defined_types/cassandra_3A_3Aschema_3A_3Acql_type.html b/doc/puppet_defined_types/cassandra_3A_3Aschema_3A_3Acql_type.html new file mode 100644 index 0000000..619e7a6 --- /dev/null +++ b/doc/puppet_defined_types/cassandra_3A_3Aschema_3A_3Acql_type.html @@ -0,0 +1,257 @@ + + + + + + + Defined Type: cassandra::schema::cql_type + + — Documentation by YARD 0.9.5 + + + + + + + + + + + + + + + + + + + +
+ + + + +

Defined Type: cassandra::schema::cql_type

+
+
+
Defined in:
+
+ manifests/schema/cql_type.pp +
+
+
+

Overview

+
+
+ +

Create or drop user defined data types within the schema.

+ +
+
+
+ +
+

Examples:

+ + +
cassandra::schema::cql_type { 'fullname':
+  keyspace => 'mykeyspace',
+  fields   => {
+    'fname' => 'text',
+    'lname' => 'text',
+  },
+}
+ +
+

Parameters:

+
    + +
  • + + keyspace + + + (string) + + + + — +
    +

    The name of the keyspace that the data type is to be associated with.

    +
    + +
  • + +
  • + + ensure + + + (present|absent) + + + (defaults to: present) + + + — +
    +

    ensure the data type is created, or is dropped.

    +
    + +
  • + +
  • + + fields + + + (hash) + + + (defaults to: {}) + + + — +
    +

    A hash of the fields that will be components for the data type.

    +
    + +
  • + +
  • + + cql_type_name + + + (string) + + + (defaults to: $title) + + + — +
    +

    The name of the CQL type to be created.

    +
    + +
  • + +
+ + +
+ + + + + +
+
+
+
+14
+15
+16
+17
+18
+19
+20
+21
+22
+23
+24
+25
+26
+27
+28
+29
+30
+31
+32
+33
+34
+35
+36
+37
+38
+39
+40
+41
+42
+43
+
+
# File 'manifests/schema/cql_type.pp', line 14
+
+define cassandra::schema::cql_type (
+  $keyspace,
+  $ensure = present,
+  $fields = {},
+  $cql_type_name = $title,
+  ){
+  include 'cassandra::schema'
+  $read_script = "DESC TYPE ${keyspace}.${cql_type_name}"
+  $read_command = "${::cassandra::schema::cqlsh_opts} -e \"${read_script}\" ${::cassandra::schema::cqlsh_conn}"
+
+  if $ensure == present {
+    $create_script1 = "CREATE TYPE IF NOT EXISTS ${keyspace}.${cql_type_name}"
+    $create_script2 = join(join_keys_to_values($fields, ' '), ', ')
+    $create_script = "${create_script1} (${create_script2})"
+    $create_command = "${::cassandra::schema::cqlsh_opts} -e \"${create_script}\" ${::cassandra::schema::cqlsh_conn}"
+    exec { $create_command:
+      unless  => $read_command,
+      require => Exec['::cassandra::schema connection test'],
+    }
+  } elsif $ensure == absent {
+    $delete_script = "DROP type ${keyspace}.${cql_type_name}"
+    $delete_command = "${::cassandra::schema::cqlsh_opts} -e \"${delete_script}\" ${::cassandra::schema::cqlsh_conn}"
+    exec { $delete_command:
+      onlyif  => $read_command,
+      require => Exec['::cassandra::schema connection test'],
+    }
+  } else {
+    fail("Unknown action (${ensure}) for ensure attribute.")
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_defined_types/cassandra_3A_3Aschema_3A_3Aindex.html b/doc/puppet_defined_types/cassandra_3A_3Aschema_3A_3Aindex.html new file mode 100644 index 0000000..742b25e --- /dev/null +++ b/doc/puppet_defined_types/cassandra_3A_3Aschema_3A_3Aindex.html @@ -0,0 +1,346 @@ + + + + + + + Defined Type: cassandra::schema::index + + — Documentation by YARD 0.9.5 + + + + + + + + + + + + + + + + + + + +
+ + + + +

Defined Type: cassandra::schema::index

+
+
+
Defined in:
+
+ manifests/schema/index.pp +
+
+
+

Overview

+
+
+ +

Create or drop indexes within the schema.

+ +
+
+
+

Parameters:

+
    + +
  • + + ensure + + + (present|absent) + + + (defaults to: present) + + + — +
    +

    Create or dro[ the index.

    +
    + +
  • + +
  • + + class_name + + + (string) + + + (defaults to: undef) + + + — +
    +

    The name of the class to be associated with an index when creating a custom +index.

    +
    + +
  • + +
  • + + index + + + (string) + + + (defaults to: $title) + + + — +
    +

    The name of the index. Defaults to the name of the resource.

    +
    + +
  • + +
  • + + keys + + + (string) + + + (defaults to: undef) + + + — +
    +

    The columns that the index is being created on.

    +
    + +
  • + +
  • + + keyspace + + + (string) + + + + — +
    +

    The name the keyspace that the index is to be associated with.

    +
    + +
  • + +
  • + + options + + + (string) + + + (defaults to: undef) + + + — +
    +

    Any options to be added to the index.

    +
    + +
  • + +
  • + + table + + + (string) + + + + — +
    +

    The name of the table that the index is to be associated with.

    +
    + +
  • + +
+ + +
+ + + + + +
+
+
+
+12
+13
+14
+15
+16
+17
+18
+19
+20
+21
+22
+23
+24
+25
+26
+27
+28
+29
+30
+31
+32
+33
+34
+35
+36
+37
+38
+39
+40
+41
+42
+43
+44
+45
+46
+47
+48
+49
+50
+51
+52
+53
+54
+55
+56
+57
+58
+59
+60
+61
+62
+63
+64
+65
+66
+
+
# File 'manifests/schema/index.pp', line 12
+
+define cassandra::schema::index(
+  $keyspace,
+  $table,
+  $ensure     = present,
+  $class_name = undef,
+  $index      = $title,
+  $keys       = undef,
+  $options    = undef,
+  ) {
+  include 'cassandra::schema'
+
+  # Fully qualified index name.
+  $fqin = "${keyspace}.${index}"
+  # Fully qualified table name.
+  $fqtn = "${keyspace}.${table}"
+
+  $read_script = "DESC INDEX ${fqin}"
+  $read_command = "${::cassandra::schema::cqlsh_opts} -e \"${read_script}\" ${::cassandra::schema::cqlsh_conn}"
+
+  if $ensure == present {
+    if $class_name != undef {
+      $create_part1 = "CREATE CUSTOM INDEX IF NOT EXISTS ${index} ON ${keyspace}.${table}"
+    } else {
+      $create_part1 = "CREATE INDEX IF NOT EXISTS ${index} ON ${keyspace}.${table}"
+    }
+
+    if $class_name != undef {
+      $create_part2 = "${create_part1} (${keys}) USING '${class_name}'"
+    } else {
+      $create_part2 = "${create_part1} (${keys})"
+    }
+
+    if $options != undef {
+      $create_script = "${create_part2} WITH OPTIONS = ${options}"
+    } else {
+      $create_script = $create_part2
+    }
+
+    $create_command = "${::cassandra::schema::cqlsh_opts} -e \"${create_script}\" ${::cassandra::schema::cqlsh_conn}"
+
+    exec { $create_command:
+      unless  => $read_command,
+      require => Exec['::cassandra::schema connection test'],
+    }
+  } elsif $ensure == absent {
+    $delete_script = "DROP INDEX ${fqin}"
+    $delete_command = "${::cassandra::schema::cqlsh_opts} -e \"${delete_script}\" ${::cassandra::schema::cqlsh_conn}"
+    exec { $delete_command:
+      onlyif  => $read_command,
+      require => Exec['::cassandra::schema connection test'],
+    }
+  } else {
+    fail("Unknown action (${ensure}) for ensure attribute.")
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_defined_types/cassandra_3A_3Aschema_3A_3Akeyspace.html b/doc/puppet_defined_types/cassandra_3A_3Aschema_3A_3Akeyspace.html new file mode 100644 index 0000000..06e6f87 --- /dev/null +++ b/doc/puppet_defined_types/cassandra_3A_3Aschema_3A_3Akeyspace.html @@ -0,0 +1,314 @@ + + + + + + + Defined Type: cassandra::schema::keyspace + + — Documentation by YARD 0.9.5 + + + + + + + + + + + + + + + + + + + +
+ + + + +

Defined Type: cassandra::schema::keyspace

+
+
+
Defined in:
+
+ manifests/schema/keyspace.pp +
+
+
+

Overview

+
+
+ +

Create or drop keyspaces within the schema.

+ +
+
+
+ +
+

Examples:

+ + +
$network_topology_strategy = {
+  keyspace_class => 'NetworkTopologyStrategy',
+    dc1            => 3,
+    dc2            => 2
+}
+ + +
cassandra::schema::keyspace { 'mykeyspace':
+  replication_map => {
+    keyspace_class     => 'SimpleStrategy',
+    replication_factor => 1,
+  },
+  durable_writes  => false,
+}
+ +
+

Parameters:

+
    + +
  • + + ensure + + + (present|absent) + + + (defaults to: present) + + + — +
    +

    Create or drop the keyspace.

    +
    + +
  • + +
  • + + durable_writes + + + (boolean) + + + (defaults to: true) + + + — +
    +

    When set to false, data written to the keyspace bypasses the commit log. Be +careful using this option because you risk losing data. Set this attribute +to false on a keyspace using the SimpleStrategy.

    +
    + +
  • + +
  • + + keyspace_name + + + (string) + + + (defaults to: $title) + + + — +
    +

    The name of the keyspace to be created.

    +
    + +
  • + +
  • + + replication_map + + + (hash) + + + (defaults to: {}) + + + — +
    +

    Needed if the keyspace is to be present. Optional if it is to be absent.

    +
    + +
  • + +
+ + +
+ + + + + +
+
+
+
+24
+25
+26
+27
+28
+29
+30
+31
+32
+33
+34
+35
+36
+37
+38
+39
+40
+41
+42
+43
+44
+45
+46
+47
+48
+49
+50
+51
+52
+53
+54
+55
+56
+57
+58
+59
+60
+61
+62
+63
+64
+65
+66
+67
+68
+69
+70
+71
+72
+73
+74
+75
+76
+
+
# File 'manifests/schema/keyspace.pp', line 24
+
+define cassandra::schema::keyspace(
+  $ensure          = present,
+  $durable_writes  = true,
+  $keyspace_name   = $title,
+  $replication_map = {},
+  ) {
+  include 'cassandra::schema'
+
+  $read_script = "DESC KEYSPACE ${keyspace_name}"
+  $read_command = "${::cassandra::schema::cqlsh_opts} -e \"${read_script}\" ${::cassandra::schema::cqlsh_conn}"
+
+  if $ensure == present {
+    $keyspace_class = $replication_map[keyspace_class]
+
+    case $keyspace_class {
+      'SimpleStrategy': {
+        $replication_factor = $replication_map[replication_factor]
+        $map_str = "{ 'class' : 'SimpleStrategy', 'replication_factor' : ${replication_factor} }"
+      }
+      'NetworkTopologyStrategy': {
+        $map_str1 = "{ 'class' : 'NetworkTopologyStrategy'"
+        $new_map = prefix(delete($replication_map, 'keyspace_class'), "'")
+        $map_str2 = join(join_keys_to_values($new_map, "': "), ', ')
+        $map_str = "${map_str1}, ${map_str2} }"
+      }
+      default: {
+        $msg_part1 = "Invalid or no class (${keyspace_class}) specified for"
+        $msg_part2 = "keyspace ${keyspace_name}."
+        fail("${msg_part1} ${msg_part2}")
+      }
+    }
+
+    $create_script1 = "CREATE KEYSPACE IF NOT EXISTS ${keyspace_name}"
+    $create_script2 = "WITH REPLICATION = ${map_str}"
+    $create_script3 = "AND DURABLE_WRITES = ${durable_writes}"
+    $create_script = "${create_script1} ${create_script2} ${create_script3}"
+    $create_command = "${::cassandra::schema::cqlsh_opts} -e \"${create_script}\" ${::cassandra::schema::cqlsh_conn}"
+
+    exec { $create_command:
+      unless  => $read_command,
+      require => Exec['::cassandra::schema connection test'],
+    }
+  } elsif $ensure == absent {
+    $delete_script = "DROP KEYSPACE ${keyspace_name}"
+    $delete_command = "${::cassandra::schema::cqlsh_opts} -e \"${delete_script}\" ${::cassandra::schema::cqlsh_conn}"
+    exec { $delete_command:
+      onlyif  => $read_command,
+      require => Exec['::cassandra::schema connection test'],
+    }
+  } else {
+    fail("Unknown action (${ensure}) for ensure attribute.")
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_defined_types/cassandra_3A_3Aschema_3A_3Atable.html b/doc/puppet_defined_types/cassandra_3A_3Aschema_3A_3Atable.html new file mode 100644 index 0000000..831dfe1 --- /dev/null +++ b/doc/puppet_defined_types/cassandra_3A_3Aschema_3A_3Atable.html @@ -0,0 +1,296 @@ + + + + + + + Defined Type: cassandra::schema::table + + — Documentation by YARD 0.9.5 + + + + + + + + + + + + + + + + + + + +
+ + + + +

Defined Type: cassandra::schema::table

+
+
+
Defined in:
+
+ manifests/schema/table.pp +
+
+
+

Overview

+
+
+ +

Create or drop tables within the schema.

+ +
+
+
+ +
+

Examples:

+ + +
cassandra::schema::table { 'users':
+  keyspace => 'mykeyspace',
+  columns  => {
+    'userid'      => 'int',
+    'fname'       => 'text',
+    'lname'       => 'text',
+    'PRIMARY KEY' => '(userid)',
+  },
+}
+ +
+

Parameters:

+
    + +
  • + + keyspace + + + (string) + + + + — +
    +

    The name of the keyspace.

    +
    + +
  • + +
  • + + columns + + + (hash) + + + (defaults to: {}) + + + — +
    +

    A hash of the columns to be placed in the table. Optional if the table is +to be absent.

    +
    + +
  • + +
  • + + ensure + + + (present|absent) + + + (defaults to: present) + + + — +
    +

    Ensure a keyspace is created or dropped.

    +
    + +
  • + +
  • + + options + + + (array) + + + (defaults to: []) + + + — +
    +

    Options to be added to the table creation.

    +
    + +
  • + +
  • + + table + + + (string) + + + (defaults to: $title) + + + — +
    +

    The name of the table. Defaults to the name of the resource.

    +
    + +
  • + +
+ + +
+ + + + + +
+
+
+
+19
+20
+21
+22
+23
+24
+25
+26
+27
+28
+29
+30
+31
+32
+33
+34
+35
+36
+37
+38
+39
+40
+41
+42
+43
+44
+45
+46
+47
+48
+49
+50
+51
+52
+53
+54
+55
+56
+57
+
+
# File 'manifests/schema/table.pp', line 19
+
+define cassandra::schema::table (
+  $keyspace,
+  $ensure  = present,
+  $columns = {},
+  $options = [],
+  $table   = $title,
+  ){
+  include 'cassandra::schema'
+  $read_script = "DESC TABLE ${keyspace}.${table}"
+  $read_command = "${::cassandra::schema::cqlsh_opts} -e \"${read_script}\" ${::cassandra::schema::cqlsh_conn}"
+
+  if $ensure == present {
+    $create_script1 = "CREATE TABLE IF NOT EXISTS ${keyspace}.${table}"
+    $cols_def = join(join_keys_to_values($columns, ' '), ', ')
+    $cols_def_rm_collection_type = delete($cols_def, 'COLLECTION-TYPE ')
+
+    if count($options) > 0 {
+      $options_def = join($options, ' AND ')
+      $create_script = "${create_script1} (${cols_def_rm_collection_type}) WITH ${options_def}"
+    } else {
+      $create_script = "${create_script1} (${cols_def_rm_collection_type})"
+    }
+
+    $create_command = "${::cassandra::schema::cqlsh_opts} -e \"${create_script}\" ${::cassandra::schema::cqlsh_conn}"
+    exec { $create_command:
+      unless  => $read_command,
+      require => Exec['::cassandra::schema connection test'],
+    }
+  } elsif $ensure == absent {
+    $delete_script = "DROP TABLE IF EXISTS ${keyspace}.${table}"
+    $delete_command = "${::cassandra::schema::cqlsh_opts} -e \"${delete_script}\" ${::cassandra::schema::cqlsh_conn}"
+    exec { $delete_command:
+      onlyif  => $read_command,
+      require => Exec['::cassandra::schema connection test'],
+    }
+  } else {
+    fail("Unknown action (${ensure}) for ensure attribute.")
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/puppet_defined_types/cassandra_3A_3Aschema_3A_3Auser.html b/doc/puppet_defined_types/cassandra_3A_3Aschema_3A_3Auser.html new file mode 100644 index 0000000..53e1940 --- /dev/null +++ b/doc/puppet_defined_types/cassandra_3A_3Aschema_3A_3Auser.html @@ -0,0 +1,293 @@ + + + + + + + Defined Type: cassandra::schema::user + + — Documentation by YARD 0.9.5 + + + + + + + + + + + + + + + + + + + +
+ + + + +

Defined Type: cassandra::schema::user

+
+
+
Defined in:
+
+ manifests/schema/user.pp +
+
+
+

Overview

+
+
+ +

Create or drop users. To use this class, a suitable +authenticator (e.g. PasswordAuthenticator) must be set in the +Cassandra class.

+ +
+
+
+ +
+

Examples:

+ + +
cassandra::schema::user { 'akers':
+  password  => 'Niner2',
+  superuser => true,
+}
+
+cassandra::schema::user { 'lucan':
+  ensure => absent,
+}
+ +
+

Parameters:

+
    + +
  • + + ensure + + + (present | absent) + + + (defaults to: present) + + + — +
    +

    Valid values can be present to ensure a user is created, +or absent to remove the user if it exists.

    +
    + +
  • + +
  • + + password + + + (string) + + + (defaults to: undef) + + + — +
    +

    A password for the user.

    +
    + +
  • + +
  • + + superuser + + + (boolean) + + + (defaults to: false) + + + — +
    +

    If the user is to be a super-user on the system.

    +
    + +
  • + +
  • + + user_name + + + (string) + + + (defaults to: $title) + + + — +
    +

    The name of the user.

    +
    + +
  • + +
+ + +
+ + + + + +
+
+
+
+18
+19
+20
+21
+22
+23
+24
+25
+26
+27
+28
+29
+30
+31
+32
+33
+34
+35
+36
+37
+38
+39
+40
+41
+42
+43
+44
+45
+46
+47
+48
+49
+50
+51
+52
+53
+54
+55
+56
+57
+58
+59
+60
+61
+62
+
+
# File 'manifests/schema/user.pp', line 18
+
+define cassandra::schema::user (
+  $ensure    = present,
+  $password  = undef,
+  $superuser = false,
+  $user_name = $title,
+  ){
+  include 'cassandra::schema'
+  $read_script = 'LIST USERS'
+  $read_command = "${::cassandra::schema::cqlsh_opts} -e \"${read_script}\" ${::cassandra::schema::cqlsh_conn} | grep '\s*${user_name} |'"
+
+  if $ensure == present {
+    $create_script1 = "CREATE USER IF NOT EXISTS ${user_name}"
+
+    if $password != undef {
+      $create_script2 = "${create_script1} WITH PASSWORD '${password}'"
+    } else {
+      $create_script2 = $create_script1
+    }
+
+    if $superuser {
+      $create_script = "${create_script2} SUPERUSER"
+    } else {
+      $create_script = "${create_script2} NOSUPERUSER"
+    }
+
+    $create_command = "${::cassandra::schema::cqlsh_opts} -e \"${create_script}\" ${::cassandra::schema::cqlsh_conn}"
+
+    exec { "Create user (${user_name})":
+      command => $create_command,
+      unless  => $read_command,
+      require => Exec['::cassandra::schema connection test'],
+    }
+  } elsif $ensure == absent {
+    $delete_script = "DROP USER ${user_name}"
+    $delete_command = "${::cassandra::schema::cqlsh_opts} -e \"${delete_script}\" ${::cassandra::schema::cqlsh_conn}"
+
+    exec { "Delete user (${user_name})":
+      command => $delete_command,
+      onlyif  => $read_command,
+      require => Exec['::cassandra::schema connection test'],
+    }
+  } else {
+    fail("Unknown action (${ensure}) for ensure attribute.")
+  }
+}
+
+
+
+ + + +
+ + \ No newline at end of file diff --git a/doc/top-level-namespace.html b/doc/top-level-namespace.html new file mode 100644 index 0000000..8a73669 --- /dev/null +++ b/doc/top-level-namespace.html @@ -0,0 +1,578 @@ + + + + + + + Top Level Namespace + + — Documentation by YARD 0.9.5 + + + + + + + + + + + + + + + + + + + +
+ + + + +

Top Level Namespace + + + +

+
+ + + + + + + + + + + +
+ + + + + + + + + +

+ Instance Method Summary + collapse +

+ + + + + + +
+

Instance Method Details

+ + +
+

+ + #cassandramajorversioninteger + + + + + +

+
+ +

Extract the major version from the cassandrarelease fact.

+ + +
+
+
+ +

Returns:

+
    + +
  • + + + (integer) + + + + — +
    +

    The major version of the Cassandra instance.

    +
    + +
  • + +
+ +

See Also:

+ +

Caveats:

+
    + +
  • + + + + + +
    +

    Requires that the cassandrarelease has been successfully retrieved.

    +
    + +
  • + +
+ +
+ + + + +
+
+
+
+21
+22
+23
+24
+25
+26
+
+
# File 'lib/facter/cassandra.rb', line 21
+
+Facter.add('cassandramajorversion') do
+  setcode do
+    release = Facter.value(:cassandrarelease)
+    release.split('.')[0].to_i if release
+  end
+end
+
+
+ +
+

+ + #cassandraminorversioninteger + + + + + +

+
+ +

Extract the minor version from the cassandrarelease fact.

+ + +
+
+
+ +

Returns:

+
    + +
  • + + + (integer) + + + + — +
    +

    The minor version of the Cassandra instance.

    +
    + +
  • + +
+ +

See Also:

+ +

Caveats:

+
    + +
  • + + + + + +
    +

    Requires that the cassandrarelease has been successfully retrieved.

    +
    + +
  • + +
+ +
+ + + + +
+
+
+
+33
+34
+35
+36
+37
+38
+
+
# File 'lib/facter/cassandra.rb', line 33
+
+Facter.add('cassandraminorversion') do
+  setcode do
+    release = Facter.value(:cassandrarelease)
+    release.split('.')[1].to_i if release
+  end
+end
+
+
+ +
+

+ + #cassandrapatchversioninteger + + + + + +

+
+ +

Extract the patch version from the cassandrarelease fact.

+ + +
+
+
+ +

Returns:

+
    + +
  • + + + (integer) + + + + — +
    +

    The patch version of the Cassandra instance.

    +
    + +
  • + +
+ +

See Also:

+ +

Caveats:

+
    + +
  • + + + + + +
    +

    Requires that the cassandrarelease has been successfully retrieved.

    +
    + +
  • + +
+ +
+ + + + +
+
+
+
+45
+46
+47
+48
+49
+50
+
+
# File 'lib/facter/cassandra.rb', line 45
+
+Facter.add('cassandrapatchversion') do
+  setcode do
+    release = Facter.value(:cassandrarelease)
+    release.split('.')[2].to_i if release
+  end
+end
+
+
+ +
+

+ + #cassandrareleasestring + + + + + +

+
+ +

Extract the release string from the running Cassandra instance.

+ +

undefined.

+ + +
+
+
+ +

Returns:

+
    + +
  • + + + (string) + + + + — +
    +

    The version string (e.g. 3.0.1).

    +
    + +
  • + +
+

Caveats:

+
    + +
  • + + + + + +
    +

    The Cassandra service needs to be running, otherwise the fact will be

    +
    + +
  • + +
+

Resolution:

+
    + +
  • + + + + + +
    +

    Runs the command “nodetool version”.

    +
    + +
  • + +
+ +
+ + + + +
+
+
+
+9
+10
+11
+12
+13
+14
+
+
# File 'lib/facter/cassandra.rb', line 9
+
+Facter.add('cassandrarelease') do
+  setcode do
+    version = Facter::Util::Resolution.exec('nodetool version')
+    version.match(/\d+\.\d+\.\d+/).to_s if version && version != ''
+  end
+end
+
+
+ +
+ +
+ + + +
+ + \ No newline at end of file