diff --git a/parts/linux/cloud-init/artifacts/cse_config.sh b/parts/linux/cloud-init/artifacts/cse_config.sh index a4ccca74d3c..8bd9df61bca 100755 --- a/parts/linux/cloud-init/artifacts/cse_config.sh +++ b/parts/linux/cloud-init/artifacts/cse_config.sh @@ -52,7 +52,7 @@ configureSwapFile() { # https://learn.microsoft.com/en-us/troubleshoot/azure/virtual-machines/troubleshoot-device-names-problems#identify-disk-luns swap_size_kb=$(expr ${SWAP_FILE_SIZE_MB} \* 1000) swap_location="" - + # Attempt to use the resource disk if [ -L /dev/disk/azure/resource-part1 ]; then resource_disk_path=$(findmnt -nr -o target -S $(readlink -f /dev/disk/azure/resource-part1)) @@ -154,7 +154,7 @@ configureCustomCaCertificate() { chmod 755 /opt/certs for i in $(seq 0 $((${CUSTOM_CA_TRUST_COUNT} - 1))); do # declare dynamically and use "!" to avoid bad substition errors - declare varname=CUSTOM_CA_CERT_${i} + declare varname=CUSTOM_CA_CERT_${i} echo "${!varname}" | base64 -d > /opt/certs/00000000000000cert${i}.crt done # blocks until svc is considered active, which will happen when ExecStart command terminates with code 0 @@ -190,7 +190,7 @@ configureAzureJson() { fi SERVICE_PRINCIPAL_CLIENT_SECRET=${SERVICE_PRINCIPAL_CLIENT_SECRET//\\/\\\\} SERVICE_PRINCIPAL_CLIENT_SECRET=${SERVICE_PRINCIPAL_CLIENT_SECRET//\"/\\\"} - + cat << EOF > "${AZURE_JSON_PATH}" { "cloud": "${TARGET_CLOUD}", @@ -331,7 +331,7 @@ ensureContainerd() { if [ "${TELEPORT_ENABLED}" = "true" ]; then ensureTeleportd fi - mkdir -p "/etc/systemd/system/containerd.service.d" + mkdir -p "/etc/systemd/system/containerd.service.d" tee "/etc/systemd/system/containerd.service.d/exec_start.conf" > /dev/null < /dev/null < /dev/null < /dev/null <