Fixed deprecation warnings "Files found in modules without specifying 'modules' in file path". This will break 0.24.x client compatibility.
This commit is contained in:
parent
33be443516
commit
5475229cfd
28 changed files with 65 additions and 65 deletions
|
@ -25,7 +25,7 @@ class apache::debian::common {
|
||||||
purge => true,
|
purge => true,
|
||||||
force => true,
|
force => true,
|
||||||
recurse => true,
|
recurse => true,
|
||||||
source => "puppet:///custom/empty",
|
source => "puppet:///modules/custom/empty",
|
||||||
}
|
}
|
||||||
|
|
||||||
file { "/etc/apache2/envvars":
|
file { "/etc/apache2/envvars":
|
||||||
|
@ -151,7 +151,7 @@ define apache::debian::site($aliases, $root, $redirect) {
|
||||||
force => true,
|
force => true,
|
||||||
recurse => true,
|
recurse => true,
|
||||||
source => [ "puppet:///files/apache/sites/${site_fqdn}",
|
source => [ "puppet:///files/apache/sites/${site_fqdn}",
|
||||||
"puppet:///custom/empty", ],
|
"puppet:///modules/custom/empty", ],
|
||||||
before => File["${site_conf}"],
|
before => File["${site_conf}"],
|
||||||
notify => Service["apache2"],
|
notify => Service["apache2"],
|
||||||
}
|
}
|
||||||
|
@ -276,7 +276,7 @@ define apache::debian::sslsite($root, $ssl_cert, $ssl_key, $ssl_chain) {
|
||||||
force => true,
|
force => true,
|
||||||
recurse => true,
|
recurse => true,
|
||||||
source => [ "puppet:///files/apache/sslsites/${site_fqdn}",
|
source => [ "puppet:///files/apache/sslsites/${site_fqdn}",
|
||||||
"puppet:///custom/empty", ],
|
"puppet:///modules/custom/empty", ],
|
||||||
before => File["${site_conf}"],
|
before => File["${site_conf}"],
|
||||||
notify => Service["apache2"],
|
notify => Service["apache2"],
|
||||||
}
|
}
|
||||||
|
|
|
@ -46,7 +46,7 @@ class apache::common {
|
||||||
|
|
||||||
file { "/usr/local/sbin/www-logrotate.sh":
|
file { "/usr/local/sbin/www-logrotate.sh":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => "puppet:///apache/www-logrotate.sh",
|
source => "puppet:///modules/apache/www-logrotate.sh",
|
||||||
mode => 0755,
|
mode => 0755,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
@ -639,7 +639,7 @@ class apache::webalizer {
|
||||||
purge => true,
|
purge => true,
|
||||||
force => true,
|
force => true,
|
||||||
recurse => true,
|
recurse => true,
|
||||||
source => "puppet:///custom/empty",
|
source => "puppet:///modules/custom/empty",
|
||||||
}
|
}
|
||||||
|
|
||||||
case $operatingsystem {
|
case $operatingsystem {
|
||||||
|
@ -659,7 +659,7 @@ class apache::webalizer {
|
||||||
|
|
||||||
file { "/usr/local/sbin/www-webalizer.sh":
|
file { "/usr/local/sbin/www-webalizer.sh":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => "puppet:///apache/www-webalizer.sh",
|
source => "puppet:///modules/apache/www-webalizer.sh",
|
||||||
mode => 0755,
|
mode => 0755,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
|
|
@ -25,7 +25,7 @@ class apache::redhat::server {
|
||||||
purge => true,
|
purge => true,
|
||||||
force => true,
|
force => true,
|
||||||
recurse => true,
|
recurse => true,
|
||||||
source => "puppet:///custom/empty",
|
source => "puppet:///modules/custom/empty",
|
||||||
}
|
}
|
||||||
|
|
||||||
file { "/etc/httpd/conf/httpd.conf":
|
file { "/etc/httpd/conf/httpd.conf":
|
||||||
|
@ -111,7 +111,7 @@ define apache::redhat::site($aliases, $root, $redirect) {
|
||||||
force => true,
|
force => true,
|
||||||
recurse => true,
|
recurse => true,
|
||||||
source => [ "puppet:///files/apache/sites/${site_fqdn}",
|
source => [ "puppet:///files/apache/sites/${site_fqdn}",
|
||||||
"puppet:///custom/empty", ],
|
"puppet:///modules/custom/empty", ],
|
||||||
before => File["${site_conf}"],
|
before => File["${site_conf}"],
|
||||||
notify => Service["httpd"],
|
notify => Service["httpd"],
|
||||||
}
|
}
|
||||||
|
@ -151,7 +151,7 @@ class apache::redhat::sslserver {
|
||||||
purge => true,
|
purge => true,
|
||||||
force => true,
|
force => true,
|
||||||
recurse => true,
|
recurse => true,
|
||||||
source => "puppet:///custom/empty",
|
source => "puppet:///modules/custom/empty",
|
||||||
}
|
}
|
||||||
|
|
||||||
file { "/etc/httpd/conf/httpsd.conf":
|
file { "/etc/httpd/conf/httpsd.conf":
|
||||||
|
@ -166,7 +166,7 @@ class apache::redhat::sslserver {
|
||||||
|
|
||||||
file { "/etc/init.d/httpsd":
|
file { "/etc/init.d/httpsd":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => "puppet:///apache/httpsd",
|
source => "puppet:///modules/apache/httpsd",
|
||||||
mode => 0755,
|
mode => 0755,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
@ -291,7 +291,7 @@ define apache::redhat::sslsite($root, $ssl_cert, $ssl_key, $ssl_chain) {
|
||||||
force => true,
|
force => true,
|
||||||
recurse => true,
|
recurse => true,
|
||||||
source => [ "puppet:///files/apache/sslsites/${site_fqdn}",
|
source => [ "puppet:///files/apache/sslsites/${site_fqdn}",
|
||||||
"puppet:///custom/empty", ],
|
"puppet:///modules/custom/empty", ],
|
||||||
before => File["${site_conf}"],
|
before => File["${site_conf}"],
|
||||||
notify => Service["httpsd"],
|
notify => Service["httpsd"],
|
||||||
}
|
}
|
||||||
|
|
|
@ -67,7 +67,7 @@ class apt::cacher {
|
||||||
file { "/etc/apt-cacher/apt-cacher.conf":
|
file { "/etc/apt-cacher/apt-cacher.conf":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => [ "puppet:///files/apt/apt-cacher.conf",
|
source => [ "puppet:///files/apt/apt-cacher.conf",
|
||||||
"puppet:///apt/apt-cacher.conf", ],
|
"puppet:///modules/apt/apt-cacher.conf", ],
|
||||||
mode => 0644,
|
mode => 0644,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
|
|
@ -16,7 +16,7 @@ class autofs {
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => [ "puppet:///files/autofs/auto.master.${fqdn}",
|
source => [ "puppet:///files/autofs/auto.master.${fqdn}",
|
||||||
"puppet:///files/autofs/auto.master",
|
"puppet:///files/autofs/auto.master",
|
||||||
"puppet:///autofs/auto.master", ],
|
"puppet:///modules/autofs/auto.master", ],
|
||||||
mode => 0644,
|
mode => 0644,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
|
|
@ -32,7 +32,7 @@ class avahi::daemon {
|
||||||
purge => true,
|
purge => true,
|
||||||
force => true,
|
force => true,
|
||||||
recurse => true,
|
recurse => true,
|
||||||
source => "puppet:///custom/empty",
|
source => "puppet:///modules/custom/empty",
|
||||||
mode => 0755,
|
mode => 0755,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => $operatingsystem ? {
|
group => $operatingsystem ? {
|
||||||
|
|
|
@ -21,7 +21,7 @@ define backuppc::manualclient($ensure = "present", $operatingsystem = "default")
|
||||||
source => [ "puppet:///files/backuppc/${name}.pl",
|
source => [ "puppet:///files/backuppc/${name}.pl",
|
||||||
"puppet:///files/backuppc/${operatingsystem}.pl",
|
"puppet:///files/backuppc/${operatingsystem}.pl",
|
||||||
"puppet:///files/backuppc/default.pl",
|
"puppet:///files/backuppc/default.pl",
|
||||||
"puppet:///backuppc/default.pl", ],
|
"puppet:///modules/backuppc/default.pl", ],
|
||||||
mode => 0640,
|
mode => 0640,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => backuppc,
|
group => backuppc,
|
||||||
|
@ -105,7 +105,7 @@ class backuppc::server {
|
||||||
file { "/etc/BackupPC/hosts.in":
|
file { "/etc/BackupPC/hosts.in":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => [ "puppet:///files/backuppc/hosts.in",
|
source => [ "puppet:///files/backuppc/hosts.in",
|
||||||
"puppet:///backuppc/hosts.in", ],
|
"puppet:///modules/backuppc/hosts.in", ],
|
||||||
mode => 0644,
|
mode => 0644,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => backuppc,
|
group => backuppc,
|
||||||
|
@ -123,7 +123,7 @@ class backuppc::server {
|
||||||
owner => root,
|
owner => root,
|
||||||
group => backuppc,
|
group => backuppc,
|
||||||
seltype => "httpd_sys_script_rw_t",
|
seltype => "httpd_sys_script_rw_t",
|
||||||
source => "puppet:///custom/empty",
|
source => "puppet:///modules/custom/empty",
|
||||||
require => Package["BackupPC"],
|
require => Package["BackupPC"],
|
||||||
notify => Exec["generate-backuppc-hosts"],
|
notify => Exec["generate-backuppc-hosts"],
|
||||||
}
|
}
|
||||||
|
|
|
@ -76,7 +76,7 @@ class clarified::recorder inherits clarified {
|
||||||
purge => true,
|
purge => true,
|
||||||
force => true,
|
force => true,
|
||||||
recurse => true,
|
recurse => true,
|
||||||
source => "puppet:///custom/empty",
|
source => "puppet:///modules/custom/empty",
|
||||||
}
|
}
|
||||||
|
|
||||||
file { "/usr/local/src/probe-linux-i686.sh":
|
file { "/usr/local/src/probe-linux-i686.sh":
|
||||||
|
|
|
@ -45,7 +45,7 @@ class cups::server inherits cups::client {
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => [ "puppet:///files/cups/cupsd.conf.${fqdn}",
|
source => [ "puppet:///files/cups/cupsd.conf.${fqdn}",
|
||||||
"puppet:///files/cups/cupsd.conf",
|
"puppet:///files/cups/cupsd.conf",
|
||||||
"puppet:///cups/cupsd.conf", ],
|
"puppet:///modules/cups/cupsd.conf", ],
|
||||||
mode => 0640,
|
mode => 0640,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => lp,
|
group => lp,
|
||||||
|
@ -132,7 +132,7 @@ define cups::printer($uri, $ensure = present) {
|
||||||
file { "/etc/cups/ppd/${name}.ppd":
|
file { "/etc/cups/ppd/${name}.ppd":
|
||||||
ensure => $ensure,
|
ensure => $ensure,
|
||||||
source => [ "puppet:///files/cups/${name}.ppd",
|
source => [ "puppet:///files/cups/${name}.ppd",
|
||||||
"puppet:///cups/postscript.ppd" ],
|
"puppet:///modules/cups/postscript.ppd" ],
|
||||||
mode => 0644,
|
mode => 0644,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
@ -185,7 +185,7 @@ class cups::samba {
|
||||||
define driverfile() {
|
define driverfile() {
|
||||||
file { "/usr/share/cups/drivers/${name}":
|
file { "/usr/share/cups/drivers/${name}":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => "puppet:///cups/drivers/${name}",
|
source => "puppet:///modules/cups/drivers/${name}",
|
||||||
mode => 0644,
|
mode => 0644,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
@ -216,7 +216,7 @@ class cups::samba {
|
||||||
|
|
||||||
file { "/etc/cron.hourly/update-printer-inf.sh":
|
file { "/etc/cron.hourly/update-printer-inf.sh":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => "puppet:///cups/update-printer-inf.sh",
|
source => "puppet:///modules/cups/update-printer-inf.sh",
|
||||||
mode => 0755,
|
mode => 0755,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
@ -235,7 +235,7 @@ class cups::snmp {
|
||||||
|
|
||||||
file { "/etc/cron.hourly/printer-details.py":
|
file { "/etc/cron.hourly/printer-details.py":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => "puppet:///cups/printer-details.py",
|
source => "puppet:///modules/cups/printer-details.py",
|
||||||
mode => 0755,
|
mode => 0755,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
|
|
@ -86,7 +86,7 @@ class dhcp::server::ldap inherits dhcp::server::common {
|
||||||
|
|
||||||
file { "/usr/local/sbin/dhcpdump.py":
|
file { "/usr/local/sbin/dhcpdump.py":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => "puppet:///dhcp/dhcpdump.py",
|
source => "puppet:///modules/dhcp/dhcpdump.py",
|
||||||
mode => 0755,
|
mode => 0755,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => $operatingsystem ? {
|
group => $operatingsystem ? {
|
||||||
|
|
|
@ -8,7 +8,7 @@ class func::minion {
|
||||||
file { "/etc/func/minion.conf":
|
file { "/etc/func/minion.conf":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => [ "puppet:///files/func/minion.conf",
|
source => [ "puppet:///files/func/minion.conf",
|
||||||
"puppet:///func/minion.conf", ],
|
"puppet:///modules/func/minion.conf", ],
|
||||||
mode => 0644,
|
mode => 0644,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
@ -88,7 +88,7 @@ class func::server inherits func::minion {
|
||||||
file { "/etc/certmaster/certmaster.conf":
|
file { "/etc/certmaster/certmaster.conf":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => [ "puppet:///files/func/certmaster.conf",
|
source => [ "puppet:///files/func/certmaster.conf",
|
||||||
"puppet:///func/certmaster.conf", ],
|
"puppet:///modules/func/certmaster.conf", ],
|
||||||
mode => 0644,
|
mode => 0644,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
|
|
@ -76,7 +76,7 @@ class git::gitweb inherits git::server {
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => [ "puppet:///files/git/gitweb_config.perl.${fqdn}",
|
source => [ "puppet:///files/git/gitweb_config.perl.${fqdn}",
|
||||||
"puppet:///files/git/gitweb_config.perl",
|
"puppet:///files/git/gitweb_config.perl",
|
||||||
"puppet:///git/gitweb_config.perl", ],
|
"puppet:///modules/git/gitweb_config.perl", ],
|
||||||
mode => 0644,
|
mode => 0644,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
|
|
@ -17,7 +17,7 @@ class iscsi::server {
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => [ "puppet:///files/iscsi/targets.conf.${fqdn}",
|
source => [ "puppet:///files/iscsi/targets.conf.${fqdn}",
|
||||||
"puppet:///files/iscsi/targets.conf",
|
"puppet:///files/iscsi/targets.conf",
|
||||||
"puppet:///iscsi/targets.conf", ],
|
"puppet:///modules/iscsi/targets.conf", ],
|
||||||
mode => 0600,
|
mode => 0600,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
|
|
@ -228,7 +228,7 @@ class ldap::server {
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => [ "puppet:///files/ldap/DB_CONFIG.${fqdn}",
|
source => [ "puppet:///files/ldap/DB_CONFIG.${fqdn}",
|
||||||
"puppet:///files/ldap/DB_CONFIG",
|
"puppet:///files/ldap/DB_CONFIG",
|
||||||
"puppet:///ldap/DB_CONFIG", ],
|
"puppet:///modules/ldap/DB_CONFIG", ],
|
||||||
mode => 0644,
|
mode => 0644,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
@ -265,7 +265,7 @@ define ldap::server::schema() {
|
||||||
file { "/etc/openldap/schema/${name}.schema":
|
file { "/etc/openldap/schema/${name}.schema":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => [ "puppet:///files/ldap/${name}.schema",
|
source => [ "puppet:///files/ldap/${name}.schema",
|
||||||
"puppet:///ldap/${name}.schema", ],
|
"puppet:///modules/ldap/${name}.schema", ],
|
||||||
mode => 0644,
|
mode => 0644,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
|
|
@ -116,7 +116,7 @@ define munin::plugin($config = "") {
|
||||||
OpenBSD: {
|
OpenBSD: {
|
||||||
file { "/usr/local/libexec/munin/plugins/${name}":
|
file { "/usr/local/libexec/munin/plugins/${name}":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => "puppet:///munin/plugins/${name}",
|
source => "puppet:///modules/munin/plugins/${name}",
|
||||||
owner => root,
|
owner => root,
|
||||||
group => wheel,
|
group => wheel,
|
||||||
mode => 0755,
|
mode => 0755,
|
||||||
|
@ -126,7 +126,7 @@ define munin::plugin($config = "") {
|
||||||
default: {
|
default: {
|
||||||
file { "/usr/share/munin/plugins/${name}":
|
file { "/usr/share/munin/plugins/${name}":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => "puppet:///munin/plugins/${name}",
|
source => "puppet:///modules/munin/plugins/${name}",
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
mode => 0755,
|
mode => 0755,
|
||||||
|
@ -140,7 +140,7 @@ define munin::plugin($config = "") {
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => [ "puppet:///files/munin/plugin-conf/${config}.${fqdn}",
|
source => [ "puppet:///files/munin/plugin-conf/${config}.${fqdn}",
|
||||||
"puppet:///files/munin/plugin-conf/${config}",
|
"puppet:///files/munin/plugin-conf/${config}",
|
||||||
"puppet:///munin/plugin-conf/${config}", ],
|
"puppet:///modules/munin/plugin-conf/${config}", ],
|
||||||
owner => root,
|
owner => root,
|
||||||
group => $operatingsystem ? {
|
group => $operatingsystem ? {
|
||||||
OpenBSD => wheel,
|
OpenBSD => wheel,
|
||||||
|
@ -237,14 +237,14 @@ class munin::server {
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
mode => 0644,
|
mode => 0644,
|
||||||
source => "puppet:///custom/empty",
|
source => "puppet:///modules/custom/empty",
|
||||||
require => Package["munin"],
|
require => Package["munin"],
|
||||||
}
|
}
|
||||||
|
|
||||||
file { "/etc/munin/munin.conf.in":
|
file { "/etc/munin/munin.conf.in":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => [ "puppet:///files/munin/munin.conf.in",
|
source => [ "puppet:///files/munin/munin.conf.in",
|
||||||
"puppet:///munin/munin.conf.in", ],
|
"puppet:///modules/munin/munin.conf.in", ],
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
mode => 0644,
|
mode => 0644,
|
||||||
|
|
|
@ -72,7 +72,7 @@ class mysql::server {
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => [ "puppet:///files/mysql/my.cnf.${hostname}",
|
source => [ "puppet:///files/mysql/my.cnf.${hostname}",
|
||||||
"puppet:///files/mysql/my.cnf",
|
"puppet:///files/mysql/my.cnf",
|
||||||
"puppet:///mysql/my.cnf", ],
|
"puppet:///modules/mysql/my.cnf", ],
|
||||||
mode => 0644,
|
mode => 0644,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
@ -82,7 +82,7 @@ class mysql::server {
|
||||||
|
|
||||||
file { "/etc/logrotate.d/mysql":
|
file { "/etc/logrotate.d/mysql":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => "puppet:///mysql/mysql.logrotate",
|
source => "puppet:///modules/mysql/mysql.logrotate",
|
||||||
mode => 0644,
|
mode => 0644,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
@ -159,7 +159,7 @@ class mysql::server::report {
|
||||||
|
|
||||||
file { "/etc/cron.daily/mysql-report":
|
file { "/etc/cron.daily/mysql-report":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => "puppet:///mysql/mysql-report.cron",
|
source => "puppet:///modules/mysql/mysql-report.cron",
|
||||||
mode => 0755,
|
mode => 0755,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
|
|
@ -63,7 +63,7 @@ class mythtv::backend {
|
||||||
|
|
||||||
file { "/etc/sysconfig/mythbackend":
|
file { "/etc/sysconfig/mythbackend":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => "puppet:///mythtv/mythbackend",
|
source => "puppet:///modules/mythtv/mythbackend",
|
||||||
mode => 0644,
|
mode => 0644,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
@ -86,7 +86,7 @@ class mythtv::backend {
|
||||||
|
|
||||||
file { "/etc/cron.daily/mythorphans":
|
file { "/etc/cron.daily/mythorphans":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => "puppet:///mythtv/mythorphans",
|
source => "puppet:///modules/mythtv/mythorphans",
|
||||||
mode => 0755,
|
mode => 0755,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
@ -107,7 +107,7 @@ class mythtv::cron inherits mythtv::backend {
|
||||||
|
|
||||||
file { "/etc/cron.daily/mythfilldatabase":
|
file { "/etc/cron.daily/mythfilldatabase":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => "puppet:///mythtv/mythfilldatabase",
|
source => "puppet:///modules/mythtv/mythfilldatabase",
|
||||||
mode => 0755,
|
mode => 0755,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
@ -115,7 +115,7 @@ class mythtv::cron inherits mythtv::backend {
|
||||||
|
|
||||||
file { "/etc/cron.daily/mythoptimize":
|
file { "/etc/cron.daily/mythoptimize":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => "puppet:///mythtv/mythoptimize",
|
source => "puppet:///modules/mythtv/mythoptimize",
|
||||||
mode => 0755,
|
mode => 0755,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
|
|
@ -40,7 +40,7 @@ class network::helper::debian {
|
||||||
mode => 0644,
|
mode => 0644,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
source => "puppet:///network/interfaces.in",
|
source => "puppet:///modules/network/interfaces.in",
|
||||||
}
|
}
|
||||||
|
|
||||||
file { "/etc/network/interfaces.d":
|
file { "/etc/network/interfaces.d":
|
||||||
|
@ -51,7 +51,7 @@ class network::helper::debian {
|
||||||
purge => true,
|
purge => true,
|
||||||
force => true,
|
force => true,
|
||||||
recurse => true,
|
recurse => true,
|
||||||
source => "puppet:///custom/empty",
|
source => "puppet:///modules/custom/empty",
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -26,7 +26,7 @@ class nfs::server inherits nfs::client {
|
||||||
file { "/etc/exports":
|
file { "/etc/exports":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => [ "puppet:///files/nfs/exports.${fqdn}",
|
source => [ "puppet:///files/nfs/exports.${fqdn}",
|
||||||
"puppet:///nfs/exports", ],
|
"puppet:///modules/nfs/exports", ],
|
||||||
mode => 0644,
|
mode => 0644,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
@ -36,7 +36,7 @@ class nfs::server inherits nfs::client {
|
||||||
|
|
||||||
file { "/etc/sysconfig/nfs":
|
file { "/etc/sysconfig/nfs":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => "puppet:///nfs/nfs.sysconfig",
|
source => "puppet:///modules/nfs/nfs.sysconfig",
|
||||||
mode => 0644,
|
mode => 0644,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
|
|
@ -20,14 +20,14 @@ class pulseaudio::server inherits pulseaudio::common {
|
||||||
|
|
||||||
file { "/etc/init.d/pulseaudio":
|
file { "/etc/init.d/pulseaudio":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => "puppet:///pulseaudio/pulseaudio.init",
|
source => "puppet:///modules/pulseaudio/pulseaudio.init",
|
||||||
mode => 0755,
|
mode => 0755,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
}
|
}
|
||||||
file { "/etc/sysconfig/pulseaudio":
|
file { "/etc/sysconfig/pulseaudio":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => "puppet:///pulseaudio/pulseaudio.sysconfig.${operatingsystem}",
|
source => "puppet:///modules/pulseaudio/pulseaudio.sysconfig.${operatingsystem}",
|
||||||
mode => 0644,
|
mode => 0644,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
|
|
@ -66,7 +66,7 @@ class puppet::client {
|
||||||
}
|
}
|
||||||
file { "/etc/default/puppet":
|
file { "/etc/default/puppet":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => "puppet:///puppet/puppet.enabled.default",
|
source => "puppet:///modules/puppet/puppet.enabled.default",
|
||||||
mode => 0644,
|
mode => 0644,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
@ -85,7 +85,7 @@ class puppet::client {
|
||||||
|
|
||||||
file { "/usr/local/sbin/puppet-check":
|
file { "/usr/local/sbin/puppet-check":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => "puppet:///puppet/puppet-check",
|
source => "puppet:///modules/puppet/puppet-check",
|
||||||
mode => 0755,
|
mode => 0755,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => $operatingsystem ? {
|
group => $operatingsystem ? {
|
||||||
|
@ -121,7 +121,7 @@ class puppet::manual inherits puppet::client {
|
||||||
case $operatingsystem {
|
case $operatingsystem {
|
||||||
debian,ubuntu: {
|
debian,ubuntu: {
|
||||||
File["/etc/default/puppet"] {
|
File["/etc/default/puppet"] {
|
||||||
source => "puppet:///puppet/puppet.disabled.default",
|
source => "puppet:///modules/puppet/puppet.disabled.default",
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -300,7 +300,7 @@ class puppet::server inherits puppet::client {
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => [ "puppet:///files/puppet/tagmail.conf.${fqdn}",
|
source => [ "puppet:///files/puppet/tagmail.conf.${fqdn}",
|
||||||
"puppet:///files/puppet/tagmail.conf",
|
"puppet:///files/puppet/tagmail.conf",
|
||||||
"puppet:///puppet/tagmail.conf", ],
|
"puppet:///modules/puppet/tagmail.conf", ],
|
||||||
mode => 0644,
|
mode => 0644,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
@ -311,7 +311,7 @@ class puppet::server inherits puppet::client {
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => [ "puppet:///files/puppet/fileserver.conf.${fqdn}",
|
source => [ "puppet:///files/puppet/fileserver.conf.${fqdn}",
|
||||||
"puppet:///files/puppet/fileserver.conf",
|
"puppet:///files/puppet/fileserver.conf",
|
||||||
"puppet:///puppet/fileserver.conf", ],
|
"puppet:///modules/puppet/fileserver.conf", ],
|
||||||
mode => 0644,
|
mode => 0644,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
|
|
@ -64,7 +64,7 @@ class samba::server {
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => [ "puppet:///files/samba/lmhosts.${fqdn}",
|
source => [ "puppet:///files/samba/lmhosts.${fqdn}",
|
||||||
"puppet:///files/samba/lmhosts",
|
"puppet:///files/samba/lmhosts",
|
||||||
"puppet:///samba/lmhosts", ],
|
"puppet:///modules/samba/lmhosts", ],
|
||||||
mode => 0644,
|
mode => 0644,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => $operatingsystem ? {
|
group => $operatingsystem ? {
|
||||||
|
@ -85,7 +85,7 @@ class samba::bdc {
|
||||||
|
|
||||||
file { "/etc/cron.hourly/sync-netlogon.sh":
|
file { "/etc/cron.hourly/sync-netlogon.sh":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => "puppet:///samba/sync-netlogon.sh",
|
source => "puppet:///modules/samba/sync-netlogon.sh",
|
||||||
mode => 0755,
|
mode => 0755,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
|
|
@ -52,7 +52,7 @@ define saslauthd::service() {
|
||||||
source => [ "puppet:///files/saslauthd/${name}.${fqdn}.conf",
|
source => [ "puppet:///files/saslauthd/${name}.${fqdn}.conf",
|
||||||
"puppet:///files/saslauthd/${name}.conf",
|
"puppet:///files/saslauthd/${name}.conf",
|
||||||
"puppet:///files/saslauthd/service.conf",
|
"puppet:///files/saslauthd/service.conf",
|
||||||
"puppet:///saslauthd/service.conf", ],
|
"puppet:///modules/saslauthd/service.conf", ],
|
||||||
mode => 0644,
|
mode => 0644,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
|
|
@ -113,7 +113,7 @@ class ssh::disable {
|
||||||
mode => 0644,
|
mode => 0644,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
source => "puppet:///ssh/ssh.disabled.conf",
|
source => "puppet:///modules/ssh/ssh.disabled.conf",
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -14,7 +14,7 @@ class sudo {
|
||||||
purge => true,
|
purge => true,
|
||||||
force => true,
|
force => true,
|
||||||
recurse => true,
|
recurse => true,
|
||||||
source => "puppet:///custom/empty",
|
source => "puppet:///modules/custom/empty",
|
||||||
require => Package["sudo"],
|
require => Package["sudo"],
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -23,7 +23,7 @@ class sudo {
|
||||||
mode => 0440,
|
mode => 0440,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
source => "puppet:///sudo/sudoers",
|
source => "puppet:///modules/sudo/sudoers",
|
||||||
require => File["/etc/sudoers.d"],
|
require => File["/etc/sudoers.d"],
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -25,7 +25,7 @@ class vmware::server {
|
||||||
}
|
}
|
||||||
file { "/usr/lib/vmware/lib/libc.so.6/libc.so.6":
|
file { "/usr/lib/vmware/lib/libc.so.6/libc.so.6":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => "puppet:///vmware/libc.so.6",
|
source => "puppet:///modules/vmware/libc.so.6",
|
||||||
mode => 0755,
|
mode => 0755,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
@ -34,7 +34,7 @@ class vmware::server {
|
||||||
}
|
}
|
||||||
file { "/usr/local/src/vmware-hostd.patch":
|
file { "/usr/local/src/vmware-hostd.patch":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => "puppet:///vmware/vmware-hostd.patch",
|
source => "puppet:///modules/vmware/vmware-hostd.patch",
|
||||||
mode => 0644,
|
mode => 0644,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
@ -107,7 +107,7 @@ class vmware::server::scripts {
|
||||||
define vmware::server::scripts::file {
|
define vmware::server::scripts::file {
|
||||||
file { "/usr/local/sbin/${name}":
|
file { "/usr/local/sbin/${name}":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => "puppet:///vmware/scripts/${name}",
|
source => "puppet:///modules/vmware/scripts/${name}",
|
||||||
mode => 0755,
|
mode => 0755,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
@ -116,7 +116,7 @@ class vmware::server::scripts {
|
||||||
|
|
||||||
file { "/usr/local/lib/vmware.sh":
|
file { "/usr/local/lib/vmware.sh":
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => "puppet:///vmware/scripts/vmware.sh",
|
source => "puppet:///modules/vmware/scripts/vmware.sh",
|
||||||
mode => 0644,
|
mode => 0644,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
|
|
@ -217,7 +217,7 @@ class wiki::collab::base {
|
||||||
mode => 0660,
|
mode => 0660,
|
||||||
owner => collab,
|
owner => collab,
|
||||||
group => collab,
|
group => collab,
|
||||||
source => "puppet:///wiki/htaccess",
|
source => "puppet:///modules/wiki/htaccess",
|
||||||
replace => false,
|
replace => false,
|
||||||
require => File["/srv/wikis/collab/htdocs"],
|
require => File["/srv/wikis/collab/htdocs"],
|
||||||
}
|
}
|
||||||
|
|
|
@ -11,7 +11,7 @@ class yum::updatesd {
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => [ "puppet:///files/yum/yum-updatesd.conf.${fqdn}",
|
source => [ "puppet:///files/yum/yum-updatesd.conf.${fqdn}",
|
||||||
"puppet:///files/yum/yum-updatesd.conf",
|
"puppet:///files/yum/yum-updatesd.conf",
|
||||||
"puppet:///yum/yum-updatesd.conf", ],
|
"puppet:///modules/yum/yum-updatesd.conf", ],
|
||||||
mode => 0644,
|
mode => 0644,
|
||||||
owner => root,
|
owner => root,
|
||||||
group => root,
|
group => root,
|
||||||
|
|
Loading…
Add table
Reference in a new issue