Page MenuHomeDevCentral

D2628.id6641.diff
No OneTemporary

D2628.id6641.diff

diff --git a/roles/core/motd/files/eglide b/roles/core/motd/files/eglide
--- a/roles/core/motd/files/eglide
+++ b/roles/core/motd/files/eglide
@@ -5,8 +5,8 @@
| __|/ _` | | |/ _` |/ _ \ traav Kanchangesja and a couple of minors
| |__| (_| | | | (_| | __/ from the Eglide adolescent pod.'
\____/\__, |_|_|\__,_|\___| -- Iain Banks, the Algebraist
- __/ |
- |___/
+ __/ |
+ |___/
Public shell server, with IRC & web facilities.
diff --git a/roles/devserver/userland-home/files/dereckson/bin/port-patches-generator b/roles/devserver/userland-home/files/dereckson/bin/port-patches-generator
--- a/roles/devserver/userland-home/files/dereckson/bin/port-patches-generator
+++ b/roles/devserver/userland-home/files/dereckson/bin/port-patches-generator
@@ -51,7 +51,7 @@
###
### FreeBSD ports
-###
+###
## Gets FreeBSD port's patch filename
##
@@ -63,7 +63,7 @@
###
### Git
-###
+###
## Creates a patch from a modified file in a Git repository
proc create_patch_from_git_file {file patchfile {useStagingArea 0}} {
@@ -127,7 +127,7 @@
set wrksrc [exec pwd]
if {$argc == 0} {
- # Autodetect the directory
+ # Autodetect the directory
#
# We're probably in /usr/ports/quux/foo/work/foo-a.b
# Patches directory is so ../../files
@@ -157,7 +157,7 @@
###
### Step 2 - Generate patches
-###
+###
### Currently, we use git status
###
diff --git a/roles/devserver/userland-software/files/rustup-init.sh b/roles/devserver/userland-software/files/rustup-init.sh
--- a/roles/devserver/userland-software/files/rustup-init.sh
+++ b/roles/devserver/userland-software/files/rustup-init.sh
@@ -573,7 +573,7 @@
}
# Return cipher suite string specified by user, otherwise return strong TLS 1.2-1.3 cipher suites
-# if support by local tools is detected. Detection currently supports these curl backends:
+# if support by local tools is detected. Detection currently supports these curl backends:
# GnuTLS and OpenSSL (possibly also LibreSSL and BoringSSL). Return value can be empty.
get_ciphersuites_for_curl() {
if [ -n "${RUSTUP_TLS_CIPHERSUITES-}" ]; then
@@ -618,7 +618,7 @@
}
# Return cipher suite string specified by user, otherwise return strong TLS 1.2-1.3 cipher suites
-# if support by local tools is detected. Detection currently supports these wget backends:
+# if support by local tools is detected. Detection currently supports these wget backends:
# GnuTLS and OpenSSL (possibly also LibreSSL and BoringSSL). Return value can be empty.
get_ciphersuites_for_wget() {
if [ -n "${RUSTUP_TLS_CIPHERSUITES-}" ]; then
@@ -643,10 +643,10 @@
RETVAL="$_cs"
}
-# Return strong TLS 1.2-1.3 cipher suites in OpenSSL or GnuTLS syntax. TLS 1.2
-# excludes non-ECDHE and non-AEAD cipher suites. DHE is excluded due to bad
+# Return strong TLS 1.2-1.3 cipher suites in OpenSSL or GnuTLS syntax. TLS 1.2
+# excludes non-ECDHE and non-AEAD cipher suites. DHE is excluded due to bad
# DH params often found on servers (see RFC 7919). Sequence matches or is
-# similar to Firefox 68 ESR with weak cipher suites disabled via about:config.
+# similar to Firefox 68 ESR with weak cipher suites disabled via about:config.
# $1 must be openssl or gnutls.
get_strong_ciphersuites_for() {
if [ "$1" = "openssl" ]; then
@@ -656,7 +656,7 @@
# GnuTLS isn't forgiving of unknown values, so this may require a GnuTLS version that supports TLS 1.3 even if wget doesn't.
# Begin with SECURE128 (and higher) then remove/add to build cipher suites. Produces same 9 cipher suites as OpenSSL but in slightly different order.
echo "SECURE128:-VERS-SSL3.0:-VERS-TLS1.0:-VERS-TLS1.1:-VERS-DTLS-ALL:-CIPHER-ALL:-MAC-ALL:-KX-ALL:+AEAD:+ECDHE-ECDSA:+ECDHE-RSA:+AES-128-GCM:+CHACHA20-POLY1305:+AES-256-GCM"
- fi
+ fi
}
main "$@" || exit 1
diff --git a/roles/devserver/userland-software/files/url.yml b/roles/devserver/userland-software/files/url.yml
--- a/roles/devserver/userland-software/files/url.yml
+++ b/roles/devserver/userland-software/files/url.yml
@@ -2,6 +2,6 @@
/var/home-wwwroot:
userdir: {}
-
+
/var/wwwroot:
wwwroot: {}
diff --git a/roles/saltmaster/cloud/files/providers/dwellers b/roles/saltmaster/cloud/files/providers/dwellers
--- a/roles/saltmaster/cloud/files/providers/dwellers
+++ b/roles/saltmaster/cloud/files/providers/dwellers
@@ -1,3 +1,3 @@
dwellers-lxc:
target: dwellers.nasqueron.org
- driver: lxc
+ driver: lxc
diff --git a/roles/shellserver/user-session/files/csh.logout b/roles/shellserver/user-session/files/csh.logout
--- a/roles/shellserver/user-session/files/csh.logout
+++ b/roles/shellserver/user-session/files/csh.logout
@@ -16,6 +16,6 @@
# -------------------------------------------------------------
# Cleans up whom-diff files
-# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
+# - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
whom-diff --clean
diff --git a/roles/shellserver/vhosts/files/vhosts.eglide b/roles/shellserver/vhosts/files/vhosts.eglide
--- a/roles/shellserver/vhosts/files/vhosts.eglide
+++ b/roles/shellserver/vhosts/files/vhosts.eglide
@@ -2,7 +2,7 @@
Eglide's IP addresses and PTR records (ie "vhosts") list
===============================================================================
-IcannNet - IPv4
+IcannNet - IPv4
---------------
212.47.244.42 eglide.org
diff --git a/roles/webserver-legacy/jenkins-cd/ssh.sls b/roles/webserver-legacy/jenkins-cd/ssh.sls
--- a/roles/webserver-legacy/jenkins-cd/ssh.sls
+++ b/roles/webserver-legacy/jenkins-cd/ssh.sls
@@ -13,7 +13,7 @@
file.directory:
- user: deploy
- group: deploy
- - dir_mode: 700
+ - dir_mode: 700
/var/run/deploy/.ssh/authorized_keys:
file.managed:

File Metadata

Mime Type
text/plain
Expires
Sat, Nov 16, 17:24 (21 h, 3 m)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
2247750
Default Alt Text
D2628.id6641.diff (5 KB)

Event Timeline