Fixed deprecation warnings "Files found in modules without specifying 'modules' in file path". This will break 0.24.x client compatibility.

This commit is contained in:
Timo Mkinen 2011-01-26 20:06:13 +02:00
parent 33be443516
commit 5475229cfd
28 changed files with 65 additions and 65 deletions

View file

@ -25,7 +25,7 @@ class apache::debian::common {
purge => true, purge => true,
force => true, force => true,
recurse => true, recurse => true,
source => "puppet:///custom/empty", source => "puppet:///modules/custom/empty",
} }
file { "/etc/apache2/envvars": file { "/etc/apache2/envvars":
@ -151,7 +151,7 @@ define apache::debian::site($aliases, $root, $redirect) {
force => true, force => true,
recurse => true, recurse => true,
source => [ "puppet:///files/apache/sites/${site_fqdn}", source => [ "puppet:///files/apache/sites/${site_fqdn}",
"puppet:///custom/empty", ], "puppet:///modules/custom/empty", ],
before => File["${site_conf}"], before => File["${site_conf}"],
notify => Service["apache2"], notify => Service["apache2"],
} }
@ -276,7 +276,7 @@ define apache::debian::sslsite($root, $ssl_cert, $ssl_key, $ssl_chain) {
force => true, force => true,
recurse => true, recurse => true,
source => [ "puppet:///files/apache/sslsites/${site_fqdn}", source => [ "puppet:///files/apache/sslsites/${site_fqdn}",
"puppet:///custom/empty", ], "puppet:///modules/custom/empty", ],
before => File["${site_conf}"], before => File["${site_conf}"],
notify => Service["apache2"], notify => Service["apache2"],
} }

View file

@ -46,7 +46,7 @@ class apache::common {
file { "/usr/local/sbin/www-logrotate.sh": file { "/usr/local/sbin/www-logrotate.sh":
ensure => present, ensure => present,
source => "puppet:///apache/www-logrotate.sh", source => "puppet:///modules/apache/www-logrotate.sh",
mode => 0755, mode => 0755,
owner => root, owner => root,
group => root, group => root,
@ -639,7 +639,7 @@ class apache::webalizer {
purge => true, purge => true,
force => true, force => true,
recurse => true, recurse => true,
source => "puppet:///custom/empty", source => "puppet:///modules/custom/empty",
} }
case $operatingsystem { case $operatingsystem {
@ -659,7 +659,7 @@ class apache::webalizer {
file { "/usr/local/sbin/www-webalizer.sh": file { "/usr/local/sbin/www-webalizer.sh":
ensure => present, ensure => present,
source => "puppet:///apache/www-webalizer.sh", source => "puppet:///modules/apache/www-webalizer.sh",
mode => 0755, mode => 0755,
owner => root, owner => root,
group => root, group => root,

View file

@ -25,7 +25,7 @@ class apache::redhat::server {
purge => true, purge => true,
force => true, force => true,
recurse => true, recurse => true,
source => "puppet:///custom/empty", source => "puppet:///modules/custom/empty",
} }
file { "/etc/httpd/conf/httpd.conf": file { "/etc/httpd/conf/httpd.conf":
@ -111,7 +111,7 @@ define apache::redhat::site($aliases, $root, $redirect) {
force => true, force => true,
recurse => true, recurse => true,
source => [ "puppet:///files/apache/sites/${site_fqdn}", source => [ "puppet:///files/apache/sites/${site_fqdn}",
"puppet:///custom/empty", ], "puppet:///modules/custom/empty", ],
before => File["${site_conf}"], before => File["${site_conf}"],
notify => Service["httpd"], notify => Service["httpd"],
} }
@ -151,7 +151,7 @@ class apache::redhat::sslserver {
purge => true, purge => true,
force => true, force => true,
recurse => true, recurse => true,
source => "puppet:///custom/empty", source => "puppet:///modules/custom/empty",
} }
file { "/etc/httpd/conf/httpsd.conf": file { "/etc/httpd/conf/httpsd.conf":
@ -166,7 +166,7 @@ class apache::redhat::sslserver {
file { "/etc/init.d/httpsd": file { "/etc/init.d/httpsd":
ensure => present, ensure => present,
source => "puppet:///apache/httpsd", source => "puppet:///modules/apache/httpsd",
mode => 0755, mode => 0755,
owner => root, owner => root,
group => root, group => root,
@ -291,7 +291,7 @@ define apache::redhat::sslsite($root, $ssl_cert, $ssl_key, $ssl_chain) {
force => true, force => true,
recurse => true, recurse => true,
source => [ "puppet:///files/apache/sslsites/${site_fqdn}", source => [ "puppet:///files/apache/sslsites/${site_fqdn}",
"puppet:///custom/empty", ], "puppet:///modules/custom/empty", ],
before => File["${site_conf}"], before => File["${site_conf}"],
notify => Service["httpsd"], notify => Service["httpsd"],
} }

View file

@ -67,7 +67,7 @@ class apt::cacher {
file { "/etc/apt-cacher/apt-cacher.conf": file { "/etc/apt-cacher/apt-cacher.conf":
ensure => present, ensure => present,
source => [ "puppet:///files/apt/apt-cacher.conf", source => [ "puppet:///files/apt/apt-cacher.conf",
"puppet:///apt/apt-cacher.conf", ], "puppet:///modules/apt/apt-cacher.conf", ],
mode => 0644, mode => 0644,
owner => root, owner => root,
group => root, group => root,

View file

@ -16,7 +16,7 @@ class autofs {
ensure => present, ensure => present,
source => [ "puppet:///files/autofs/auto.master.${fqdn}", source => [ "puppet:///files/autofs/auto.master.${fqdn}",
"puppet:///files/autofs/auto.master", "puppet:///files/autofs/auto.master",
"puppet:///autofs/auto.master", ], "puppet:///modules/autofs/auto.master", ],
mode => 0644, mode => 0644,
owner => root, owner => root,
group => root, group => root,

View file

@ -32,7 +32,7 @@ class avahi::daemon {
purge => true, purge => true,
force => true, force => true,
recurse => true, recurse => true,
source => "puppet:///custom/empty", source => "puppet:///modules/custom/empty",
mode => 0755, mode => 0755,
owner => root, owner => root,
group => $operatingsystem ? { group => $operatingsystem ? {

View file

@ -21,7 +21,7 @@ define backuppc::manualclient($ensure = "present", $operatingsystem = "default")
source => [ "puppet:///files/backuppc/${name}.pl", source => [ "puppet:///files/backuppc/${name}.pl",
"puppet:///files/backuppc/${operatingsystem}.pl", "puppet:///files/backuppc/${operatingsystem}.pl",
"puppet:///files/backuppc/default.pl", "puppet:///files/backuppc/default.pl",
"puppet:///backuppc/default.pl", ], "puppet:///modules/backuppc/default.pl", ],
mode => 0640, mode => 0640,
owner => root, owner => root,
group => backuppc, group => backuppc,
@ -105,7 +105,7 @@ class backuppc::server {
file { "/etc/BackupPC/hosts.in": file { "/etc/BackupPC/hosts.in":
ensure => present, ensure => present,
source => [ "puppet:///files/backuppc/hosts.in", source => [ "puppet:///files/backuppc/hosts.in",
"puppet:///backuppc/hosts.in", ], "puppet:///modules/backuppc/hosts.in", ],
mode => 0644, mode => 0644,
owner => root, owner => root,
group => backuppc, group => backuppc,
@ -123,7 +123,7 @@ class backuppc::server {
owner => root, owner => root,
group => backuppc, group => backuppc,
seltype => "httpd_sys_script_rw_t", seltype => "httpd_sys_script_rw_t",
source => "puppet:///custom/empty", source => "puppet:///modules/custom/empty",
require => Package["BackupPC"], require => Package["BackupPC"],
notify => Exec["generate-backuppc-hosts"], notify => Exec["generate-backuppc-hosts"],
} }

View file

@ -76,7 +76,7 @@ class clarified::recorder inherits clarified {
purge => true, purge => true,
force => true, force => true,
recurse => true, recurse => true,
source => "puppet:///custom/empty", source => "puppet:///modules/custom/empty",
} }
file { "/usr/local/src/probe-linux-i686.sh": file { "/usr/local/src/probe-linux-i686.sh":

View file

@ -45,7 +45,7 @@ class cups::server inherits cups::client {
ensure => present, ensure => present,
source => [ "puppet:///files/cups/cupsd.conf.${fqdn}", source => [ "puppet:///files/cups/cupsd.conf.${fqdn}",
"puppet:///files/cups/cupsd.conf", "puppet:///files/cups/cupsd.conf",
"puppet:///cups/cupsd.conf", ], "puppet:///modules/cups/cupsd.conf", ],
mode => 0640, mode => 0640,
owner => root, owner => root,
group => lp, group => lp,
@ -132,7 +132,7 @@ define cups::printer($uri, $ensure = present) {
file { "/etc/cups/ppd/${name}.ppd": file { "/etc/cups/ppd/${name}.ppd":
ensure => $ensure, ensure => $ensure,
source => [ "puppet:///files/cups/${name}.ppd", source => [ "puppet:///files/cups/${name}.ppd",
"puppet:///cups/postscript.ppd" ], "puppet:///modules/cups/postscript.ppd" ],
mode => 0644, mode => 0644,
owner => root, owner => root,
group => root, group => root,
@ -185,7 +185,7 @@ class cups::samba {
define driverfile() { define driverfile() {
file { "/usr/share/cups/drivers/${name}": file { "/usr/share/cups/drivers/${name}":
ensure => present, ensure => present,
source => "puppet:///cups/drivers/${name}", source => "puppet:///modules/cups/drivers/${name}",
mode => 0644, mode => 0644,
owner => root, owner => root,
group => root, group => root,
@ -216,7 +216,7 @@ class cups::samba {
file { "/etc/cron.hourly/update-printer-inf.sh": file { "/etc/cron.hourly/update-printer-inf.sh":
ensure => present, ensure => present,
source => "puppet:///cups/update-printer-inf.sh", source => "puppet:///modules/cups/update-printer-inf.sh",
mode => 0755, mode => 0755,
owner => root, owner => root,
group => root, group => root,
@ -235,7 +235,7 @@ class cups::snmp {
file { "/etc/cron.hourly/printer-details.py": file { "/etc/cron.hourly/printer-details.py":
ensure => present, ensure => present,
source => "puppet:///cups/printer-details.py", source => "puppet:///modules/cups/printer-details.py",
mode => 0755, mode => 0755,
owner => root, owner => root,
group => root, group => root,

View file

@ -86,7 +86,7 @@ class dhcp::server::ldap inherits dhcp::server::common {
file { "/usr/local/sbin/dhcpdump.py": file { "/usr/local/sbin/dhcpdump.py":
ensure => present, ensure => present,
source => "puppet:///dhcp/dhcpdump.py", source => "puppet:///modules/dhcp/dhcpdump.py",
mode => 0755, mode => 0755,
owner => root, owner => root,
group => $operatingsystem ? { group => $operatingsystem ? {

View file

@ -8,7 +8,7 @@ class func::minion {
file { "/etc/func/minion.conf": file { "/etc/func/minion.conf":
ensure => present, ensure => present,
source => [ "puppet:///files/func/minion.conf", source => [ "puppet:///files/func/minion.conf",
"puppet:///func/minion.conf", ], "puppet:///modules/func/minion.conf", ],
mode => 0644, mode => 0644,
owner => root, owner => root,
group => root, group => root,
@ -88,7 +88,7 @@ class func::server inherits func::minion {
file { "/etc/certmaster/certmaster.conf": file { "/etc/certmaster/certmaster.conf":
ensure => present, ensure => present,
source => [ "puppet:///files/func/certmaster.conf", source => [ "puppet:///files/func/certmaster.conf",
"puppet:///func/certmaster.conf", ], "puppet:///modules/func/certmaster.conf", ],
mode => 0644, mode => 0644,
owner => root, owner => root,
group => root, group => root,

View file

@ -76,7 +76,7 @@ class git::gitweb inherits git::server {
ensure => present, ensure => present,
source => [ "puppet:///files/git/gitweb_config.perl.${fqdn}", source => [ "puppet:///files/git/gitweb_config.perl.${fqdn}",
"puppet:///files/git/gitweb_config.perl", "puppet:///files/git/gitweb_config.perl",
"puppet:///git/gitweb_config.perl", ], "puppet:///modules/git/gitweb_config.perl", ],
mode => 0644, mode => 0644,
owner => root, owner => root,
group => root, group => root,

View file

@ -17,7 +17,7 @@ class iscsi::server {
ensure => present, ensure => present,
source => [ "puppet:///files/iscsi/targets.conf.${fqdn}", source => [ "puppet:///files/iscsi/targets.conf.${fqdn}",
"puppet:///files/iscsi/targets.conf", "puppet:///files/iscsi/targets.conf",
"puppet:///iscsi/targets.conf", ], "puppet:///modules/iscsi/targets.conf", ],
mode => 0600, mode => 0600,
owner => root, owner => root,
group => root, group => root,

View file

@ -228,7 +228,7 @@ class ldap::server {
ensure => present, ensure => present,
source => [ "puppet:///files/ldap/DB_CONFIG.${fqdn}", source => [ "puppet:///files/ldap/DB_CONFIG.${fqdn}",
"puppet:///files/ldap/DB_CONFIG", "puppet:///files/ldap/DB_CONFIG",
"puppet:///ldap/DB_CONFIG", ], "puppet:///modules/ldap/DB_CONFIG", ],
mode => 0644, mode => 0644,
owner => root, owner => root,
group => root, group => root,
@ -265,7 +265,7 @@ define ldap::server::schema() {
file { "/etc/openldap/schema/${name}.schema": file { "/etc/openldap/schema/${name}.schema":
ensure => present, ensure => present,
source => [ "puppet:///files/ldap/${name}.schema", source => [ "puppet:///files/ldap/${name}.schema",
"puppet:///ldap/${name}.schema", ], "puppet:///modules/ldap/${name}.schema", ],
mode => 0644, mode => 0644,
owner => root, owner => root,
group => root, group => root,

View file

@ -116,7 +116,7 @@ define munin::plugin($config = "") {
OpenBSD: { OpenBSD: {
file { "/usr/local/libexec/munin/plugins/${name}": file { "/usr/local/libexec/munin/plugins/${name}":
ensure => present, ensure => present,
source => "puppet:///munin/plugins/${name}", source => "puppet:///modules/munin/plugins/${name}",
owner => root, owner => root,
group => wheel, group => wheel,
mode => 0755, mode => 0755,
@ -126,7 +126,7 @@ define munin::plugin($config = "") {
default: { default: {
file { "/usr/share/munin/plugins/${name}": file { "/usr/share/munin/plugins/${name}":
ensure => present, ensure => present,
source => "puppet:///munin/plugins/${name}", source => "puppet:///modules/munin/plugins/${name}",
owner => root, owner => root,
group => root, group => root,
mode => 0755, mode => 0755,
@ -140,7 +140,7 @@ define munin::plugin($config = "") {
ensure => present, ensure => present,
source => [ "puppet:///files/munin/plugin-conf/${config}.${fqdn}", source => [ "puppet:///files/munin/plugin-conf/${config}.${fqdn}",
"puppet:///files/munin/plugin-conf/${config}", "puppet:///files/munin/plugin-conf/${config}",
"puppet:///munin/plugin-conf/${config}", ], "puppet:///modules/munin/plugin-conf/${config}", ],
owner => root, owner => root,
group => $operatingsystem ? { group => $operatingsystem ? {
OpenBSD => wheel, OpenBSD => wheel,
@ -237,14 +237,14 @@ class munin::server {
owner => root, owner => root,
group => root, group => root,
mode => 0644, mode => 0644,
source => "puppet:///custom/empty", source => "puppet:///modules/custom/empty",
require => Package["munin"], require => Package["munin"],
} }
file { "/etc/munin/munin.conf.in": file { "/etc/munin/munin.conf.in":
ensure => present, ensure => present,
source => [ "puppet:///files/munin/munin.conf.in", source => [ "puppet:///files/munin/munin.conf.in",
"puppet:///munin/munin.conf.in", ], "puppet:///modules/munin/munin.conf.in", ],
owner => root, owner => root,
group => root, group => root,
mode => 0644, mode => 0644,

View file

@ -72,7 +72,7 @@ class mysql::server {
ensure => present, ensure => present,
source => [ "puppet:///files/mysql/my.cnf.${hostname}", source => [ "puppet:///files/mysql/my.cnf.${hostname}",
"puppet:///files/mysql/my.cnf", "puppet:///files/mysql/my.cnf",
"puppet:///mysql/my.cnf", ], "puppet:///modules/mysql/my.cnf", ],
mode => 0644, mode => 0644,
owner => root, owner => root,
group => root, group => root,
@ -82,7 +82,7 @@ class mysql::server {
file { "/etc/logrotate.d/mysql": file { "/etc/logrotate.d/mysql":
ensure => present, ensure => present,
source => "puppet:///mysql/mysql.logrotate", source => "puppet:///modules/mysql/mysql.logrotate",
mode => 0644, mode => 0644,
owner => root, owner => root,
group => root, group => root,
@ -159,7 +159,7 @@ class mysql::server::report {
file { "/etc/cron.daily/mysql-report": file { "/etc/cron.daily/mysql-report":
ensure => present, ensure => present,
source => "puppet:///mysql/mysql-report.cron", source => "puppet:///modules/mysql/mysql-report.cron",
mode => 0755, mode => 0755,
owner => root, owner => root,
group => root, group => root,

View file

@ -63,7 +63,7 @@ class mythtv::backend {
file { "/etc/sysconfig/mythbackend": file { "/etc/sysconfig/mythbackend":
ensure => present, ensure => present,
source => "puppet:///mythtv/mythbackend", source => "puppet:///modules/mythtv/mythbackend",
mode => 0644, mode => 0644,
owner => root, owner => root,
group => root, group => root,
@ -86,7 +86,7 @@ class mythtv::backend {
file { "/etc/cron.daily/mythorphans": file { "/etc/cron.daily/mythorphans":
ensure => present, ensure => present,
source => "puppet:///mythtv/mythorphans", source => "puppet:///modules/mythtv/mythorphans",
mode => 0755, mode => 0755,
owner => root, owner => root,
group => root, group => root,
@ -107,7 +107,7 @@ class mythtv::cron inherits mythtv::backend {
file { "/etc/cron.daily/mythfilldatabase": file { "/etc/cron.daily/mythfilldatabase":
ensure => present, ensure => present,
source => "puppet:///mythtv/mythfilldatabase", source => "puppet:///modules/mythtv/mythfilldatabase",
mode => 0755, mode => 0755,
owner => root, owner => root,
group => root, group => root,
@ -115,7 +115,7 @@ class mythtv::cron inherits mythtv::backend {
file { "/etc/cron.daily/mythoptimize": file { "/etc/cron.daily/mythoptimize":
ensure => present, ensure => present,
source => "puppet:///mythtv/mythoptimize", source => "puppet:///modules/mythtv/mythoptimize",
mode => 0755, mode => 0755,
owner => root, owner => root,
group => root, group => root,

View file

@ -40,7 +40,7 @@ class network::helper::debian {
mode => 0644, mode => 0644,
owner => root, owner => root,
group => root, group => root,
source => "puppet:///network/interfaces.in", source => "puppet:///modules/network/interfaces.in",
} }
file { "/etc/network/interfaces.d": file { "/etc/network/interfaces.d":
@ -51,7 +51,7 @@ class network::helper::debian {
purge => true, purge => true,
force => true, force => true,
recurse => true, recurse => true,
source => "puppet:///custom/empty", source => "puppet:///modules/custom/empty",
} }
} }

View file

@ -26,7 +26,7 @@ class nfs::server inherits nfs::client {
file { "/etc/exports": file { "/etc/exports":
ensure => present, ensure => present,
source => [ "puppet:///files/nfs/exports.${fqdn}", source => [ "puppet:///files/nfs/exports.${fqdn}",
"puppet:///nfs/exports", ], "puppet:///modules/nfs/exports", ],
mode => 0644, mode => 0644,
owner => root, owner => root,
group => root, group => root,
@ -36,7 +36,7 @@ class nfs::server inherits nfs::client {
file { "/etc/sysconfig/nfs": file { "/etc/sysconfig/nfs":
ensure => present, ensure => present,
source => "puppet:///nfs/nfs.sysconfig", source => "puppet:///modules/nfs/nfs.sysconfig",
mode => 0644, mode => 0644,
owner => root, owner => root,
group => root, group => root,

View file

@ -20,14 +20,14 @@ class pulseaudio::server inherits pulseaudio::common {
file { "/etc/init.d/pulseaudio": file { "/etc/init.d/pulseaudio":
ensure => present, ensure => present,
source => "puppet:///pulseaudio/pulseaudio.init", source => "puppet:///modules/pulseaudio/pulseaudio.init",
mode => 0755, mode => 0755,
owner => root, owner => root,
group => root, group => root,
} }
file { "/etc/sysconfig/pulseaudio": file { "/etc/sysconfig/pulseaudio":
ensure => present, ensure => present,
source => "puppet:///pulseaudio/pulseaudio.sysconfig.${operatingsystem}", source => "puppet:///modules/pulseaudio/pulseaudio.sysconfig.${operatingsystem}",
mode => 0644, mode => 0644,
owner => root, owner => root,
group => root, group => root,

View file

@ -66,7 +66,7 @@ class puppet::client {
} }
file { "/etc/default/puppet": file { "/etc/default/puppet":
ensure => present, ensure => present,
source => "puppet:///puppet/puppet.enabled.default", source => "puppet:///modules/puppet/puppet.enabled.default",
mode => 0644, mode => 0644,
owner => root, owner => root,
group => root, group => root,
@ -85,7 +85,7 @@ class puppet::client {
file { "/usr/local/sbin/puppet-check": file { "/usr/local/sbin/puppet-check":
ensure => present, ensure => present,
source => "puppet:///puppet/puppet-check", source => "puppet:///modules/puppet/puppet-check",
mode => 0755, mode => 0755,
owner => root, owner => root,
group => $operatingsystem ? { group => $operatingsystem ? {
@ -121,7 +121,7 @@ class puppet::manual inherits puppet::client {
case $operatingsystem { case $operatingsystem {
debian,ubuntu: { debian,ubuntu: {
File["/etc/default/puppet"] { File["/etc/default/puppet"] {
source => "puppet:///puppet/puppet.disabled.default", source => "puppet:///modules/puppet/puppet.disabled.default",
} }
} }
} }
@ -300,7 +300,7 @@ class puppet::server inherits puppet::client {
ensure => present, ensure => present,
source => [ "puppet:///files/puppet/tagmail.conf.${fqdn}", source => [ "puppet:///files/puppet/tagmail.conf.${fqdn}",
"puppet:///files/puppet/tagmail.conf", "puppet:///files/puppet/tagmail.conf",
"puppet:///puppet/tagmail.conf", ], "puppet:///modules/puppet/tagmail.conf", ],
mode => 0644, mode => 0644,
owner => root, owner => root,
group => root, group => root,
@ -311,7 +311,7 @@ class puppet::server inherits puppet::client {
ensure => present, ensure => present,
source => [ "puppet:///files/puppet/fileserver.conf.${fqdn}", source => [ "puppet:///files/puppet/fileserver.conf.${fqdn}",
"puppet:///files/puppet/fileserver.conf", "puppet:///files/puppet/fileserver.conf",
"puppet:///puppet/fileserver.conf", ], "puppet:///modules/puppet/fileserver.conf", ],
mode => 0644, mode => 0644,
owner => root, owner => root,
group => root, group => root,

View file

@ -64,7 +64,7 @@ class samba::server {
ensure => present, ensure => present,
source => [ "puppet:///files/samba/lmhosts.${fqdn}", source => [ "puppet:///files/samba/lmhosts.${fqdn}",
"puppet:///files/samba/lmhosts", "puppet:///files/samba/lmhosts",
"puppet:///samba/lmhosts", ], "puppet:///modules/samba/lmhosts", ],
mode => 0644, mode => 0644,
owner => root, owner => root,
group => $operatingsystem ? { group => $operatingsystem ? {
@ -85,7 +85,7 @@ class samba::bdc {
file { "/etc/cron.hourly/sync-netlogon.sh": file { "/etc/cron.hourly/sync-netlogon.sh":
ensure => present, ensure => present,
source => "puppet:///samba/sync-netlogon.sh", source => "puppet:///modules/samba/sync-netlogon.sh",
mode => 0755, mode => 0755,
owner => root, owner => root,
group => root, group => root,

View file

@ -52,7 +52,7 @@ define saslauthd::service() {
source => [ "puppet:///files/saslauthd/${name}.${fqdn}.conf", source => [ "puppet:///files/saslauthd/${name}.${fqdn}.conf",
"puppet:///files/saslauthd/${name}.conf", "puppet:///files/saslauthd/${name}.conf",
"puppet:///files/saslauthd/service.conf", "puppet:///files/saslauthd/service.conf",
"puppet:///saslauthd/service.conf", ], "puppet:///modules/saslauthd/service.conf", ],
mode => 0644, mode => 0644,
owner => root, owner => root,
group => root, group => root,

View file

@ -113,7 +113,7 @@ class ssh::disable {
mode => 0644, mode => 0644,
owner => root, owner => root,
group => root, group => root,
source => "puppet:///ssh/ssh.disabled.conf", source => "puppet:///modules/ssh/ssh.disabled.conf",
} }
} }
} }

View file

@ -14,7 +14,7 @@ class sudo {
purge => true, purge => true,
force => true, force => true,
recurse => true, recurse => true,
source => "puppet:///custom/empty", source => "puppet:///modules/custom/empty",
require => Package["sudo"], require => Package["sudo"],
} }
@ -23,7 +23,7 @@ class sudo {
mode => 0440, mode => 0440,
owner => root, owner => root,
group => root, group => root,
source => "puppet:///sudo/sudoers", source => "puppet:///modules/sudo/sudoers",
require => File["/etc/sudoers.d"], require => File["/etc/sudoers.d"],
} }

View file

@ -25,7 +25,7 @@ class vmware::server {
} }
file { "/usr/lib/vmware/lib/libc.so.6/libc.so.6": file { "/usr/lib/vmware/lib/libc.so.6/libc.so.6":
ensure => present, ensure => present,
source => "puppet:///vmware/libc.so.6", source => "puppet:///modules/vmware/libc.so.6",
mode => 0755, mode => 0755,
owner => root, owner => root,
group => root, group => root,
@ -34,7 +34,7 @@ class vmware::server {
} }
file { "/usr/local/src/vmware-hostd.patch": file { "/usr/local/src/vmware-hostd.patch":
ensure => present, ensure => present,
source => "puppet:///vmware/vmware-hostd.patch", source => "puppet:///modules/vmware/vmware-hostd.patch",
mode => 0644, mode => 0644,
owner => root, owner => root,
group => root, group => root,
@ -107,7 +107,7 @@ class vmware::server::scripts {
define vmware::server::scripts::file { define vmware::server::scripts::file {
file { "/usr/local/sbin/${name}": file { "/usr/local/sbin/${name}":
ensure => present, ensure => present,
source => "puppet:///vmware/scripts/${name}", source => "puppet:///modules/vmware/scripts/${name}",
mode => 0755, mode => 0755,
owner => root, owner => root,
group => root, group => root,
@ -116,7 +116,7 @@ class vmware::server::scripts {
file { "/usr/local/lib/vmware.sh": file { "/usr/local/lib/vmware.sh":
ensure => present, ensure => present,
source => "puppet:///vmware/scripts/vmware.sh", source => "puppet:///modules/vmware/scripts/vmware.sh",
mode => 0644, mode => 0644,
owner => root, owner => root,
group => root, group => root,

View file

@ -217,7 +217,7 @@ class wiki::collab::base {
mode => 0660, mode => 0660,
owner => collab, owner => collab,
group => collab, group => collab,
source => "puppet:///wiki/htaccess", source => "puppet:///modules/wiki/htaccess",
replace => false, replace => false,
require => File["/srv/wikis/collab/htdocs"], require => File["/srv/wikis/collab/htdocs"],
} }

View file

@ -11,7 +11,7 @@ class yum::updatesd {
ensure => present, ensure => present,
source => [ "puppet:///files/yum/yum-updatesd.conf.${fqdn}", source => [ "puppet:///files/yum/yum-updatesd.conf.${fqdn}",
"puppet:///files/yum/yum-updatesd.conf", "puppet:///files/yum/yum-updatesd.conf",
"puppet:///yum/yum-updatesd.conf", ], "puppet:///modules/yum/yum-updatesd.conf", ],
mode => 0644, mode => 0644,
owner => root, owner => root,
group => root, group => root,