From 4f86d2c46abcc236fd3e8edcfcaed98d595da54d Mon Sep 17 00:00:00 2001 From: Alex Dadgar Date: Wed, 30 May 2018 13:42:56 -0700 Subject: [PATCH] indentation --- command/agent/config-test-fixtures/basic.hcl | 167 +++++++++---------- 1 file changed, 83 insertions(+), 84 deletions(-) diff --git a/command/agent/config-test-fixtures/basic.hcl b/command/agent/config-test-fixtures/basic.hcl index d6ee51e13c9d..0b881c26d2e8 100644 --- a/command/agent/config-test-fixtures/basic.hcl +++ b/command/agent/config-test-fixtures/basic.hcl @@ -30,12 +30,11 @@ client { foo = "bar" baz = "zip" } - server_join { - retry_join = [ "1.1.1.1", "2.2.2.2" ] - retry_max = 3 - retry_interval = "15s" - } - + server_join { + retry_join = [ "1.1.1.1", "2.2.2.2" ] + retry_max = 3 + retry_interval = "15s" + } options { foo = "bar" baz = "zip" @@ -56,17 +55,17 @@ client { } client_min_port = 1000 client_max_port = 2000 - max_kill_timeout = "10s" - stats { - data_points = 35 - collection_interval = "5s" - } - gc_interval = "6s" - gc_parallel_destroys = 6 - gc_disk_usage_threshold = 82 - gc_inode_usage_threshold = 91 - gc_max_allocs = 50 - no_host_uuid = false + max_kill_timeout = "10s" + stats { + data_points = 35 + collection_interval = "5s" + } + gc_interval = "6s" + gc_parallel_destroys = 6 + gc_disk_usage_threshold = 82 + gc_inode_usage_threshold = 91 + gc_max_allocs = 50 + no_host_uuid = false } server { enabled = true @@ -93,28 +92,28 @@ server { redundancy_zone = "foo" upgrade_version = "0.8.0" encrypt = "abc" - server_join { - retry_join = [ "1.1.1.1", "2.2.2.2" ] - retry_max = 3 - retry_interval = "15s" - } + server_join { + retry_join = [ "1.1.1.1", "2.2.2.2" ] + retry_max = 3 + retry_interval = "15s" + } } acl { - enabled = true - token_ttl = "60s" - policy_ttl = "60s" - replication_token = "foobar" + enabled = true + token_ttl = "60s" + policy_ttl = "60s" + replication_token = "foobar" } telemetry { statsite_address = "127.0.0.1:1234" statsd_address = "127.0.0.1:2345" prometheus_metrics = true disable_hostname = true - collection_interval = "3s" - publish_allocation_metrics = true - publish_node_metrics = true - disable_tagged_metrics = true - backwards_compatible_metrics = true + collection_interval = "3s" + publish_allocation_metrics = true + publish_node_metrics = true + disable_tagged_metrics = true + backwards_compatible_metrics = true } leave_on_interrupt = true leave_on_terminate = true @@ -126,65 +125,65 @@ http_api_response_headers { Access-Control-Allow-Origin = "*" } consul { - server_service_name = "nomad" - server_http_check_name = "nomad-server-http-health-check" - server_serf_check_name = "nomad-server-serf-health-check" - server_rpc_check_name = "nomad-server-rpc-health-check" - client_service_name = "nomad-client" - client_http_check_name = "nomad-client-http-health-check" - address = "127.0.0.1:9500" - token = "token1" - auth = "username:pass" - ssl = true - verify_ssl = true - ca_file = "/path/to/ca/file" - cert_file = "/path/to/cert/file" - key_file = "/path/to/key/file" - server_auto_join = true - client_auto_join = true - auto_advertise = true - checks_use_advertise = true + server_service_name = "nomad" + server_http_check_name = "nomad-server-http-health-check" + server_serf_check_name = "nomad-server-serf-health-check" + server_rpc_check_name = "nomad-server-rpc-health-check" + client_service_name = "nomad-client" + client_http_check_name = "nomad-client-http-health-check" + address = "127.0.0.1:9500" + token = "token1" + auth = "username:pass" + ssl = true + verify_ssl = true + ca_file = "/path/to/ca/file" + cert_file = "/path/to/cert/file" + key_file = "/path/to/key/file" + server_auto_join = true + client_auto_join = true + auto_advertise = true + checks_use_advertise = true } vault { - address = "127.0.0.1:9500" - allow_unauthenticated = true - task_token_ttl = "1s" - enabled = false - token = "12345" - ca_file = "/path/to/ca/file" - ca_path = "/path/to/ca" - cert_file = "/path/to/cert/file" - key_file = "/path/to/key/file" - tls_server_name = "foobar" - tls_skip_verify = true - create_from_role = "test_role" + address = "127.0.0.1:9500" + allow_unauthenticated = true + task_token_ttl = "1s" + enabled = false + token = "12345" + ca_file = "/path/to/ca/file" + ca_path = "/path/to/ca" + cert_file = "/path/to/cert/file" + key_file = "/path/to/key/file" + tls_server_name = "foobar" + tls_skip_verify = true + create_from_role = "test_role" } tls { - http = true - rpc = true - verify_server_hostname = true - ca_file = "foo" - cert_file = "bar" - key_file = "pipe" - rpc_upgrade_mode = true - verify_https_client = true + http = true + rpc = true + verify_server_hostname = true + ca_file = "foo" + cert_file = "bar" + key_file = "pipe" + rpc_upgrade_mode = true + verify_https_client = true } sentinel { - import "foo" { - path = "foo" - args = ["a", "b", "c"] - } - import "bar" { - path = "bar" - args = ["x", "y", "z"] - } + import "foo" { + path = "foo" + args = ["a", "b", "c"] + } + import "bar" { + path = "bar" + args = ["x", "y", "z"] + } } autopilot { - cleanup_dead_servers = true - disable_upgrade_migration = true - last_contact_threshold = "12705s" - max_trailing_logs = 17849 - enable_redundancy_zones = true - server_stabilization_time = "23057s" - enable_custom_upgrades = true + cleanup_dead_servers = true + disable_upgrade_migration = true + last_contact_threshold = "12705s" + max_trailing_logs = 17849 + enable_redundancy_zones = true + server_stabilization_time = "23057s" + enable_custom_upgrades = true }