diff --git a/abusehelper/manifests/init.pp b/abusehelper/manifests/init.pp index aaaa585..8a6a04f 100644 --- a/abusehelper/manifests/init.pp +++ b/abusehelper/manifests/init.pp @@ -42,7 +42,7 @@ class abusehelper { file { "/usr/local/src/abusehelper.tar.gz": ensure => present, - mode => 0644, + mode => "0644", owner => "root", group => $operatingsystem ? { "openbsd" => "wheel", @@ -60,7 +60,7 @@ class abusehelper { } file { "/usr/local/src/idiokit.tar.gz": ensure => present, - mode => 0644, + mode => "0644", owner => "root", group => $operatingsystem ? { "openbsd" => "wheel", @@ -86,7 +86,7 @@ class abusehelper { if $abusehelper_datadir { file { $abusehelper_datadir: ensure => directory, - mode => 0750, + mode => "0750", owner => "root", group => "abusehel", require => User["abusehel"], @@ -100,7 +100,7 @@ class abusehelper { } else { file { "/var/lib/ah2": ensure => directory, - mode => 0750, + mode => "0750", owner => "root", group => "abusehel", require => User["abusehel"], diff --git a/alpine/manifests/init.pp b/alpine/manifests/init.pp index a4fe51c..5177083 100644 --- a/alpine/manifests/init.pp +++ b/alpine/manifests/init.pp @@ -21,9 +21,9 @@ class alpine { file { "/etc/pine.conf.fixed": ensure => present, content => template("alpine/pine.conf.fixed.erb"), - mode => 0644, - owner => root, - group => root, + mode => "0644", + owner => "root", + group => "root", require => Package["alpine"], } diff --git a/amanda/manifests/init.pp b/amanda/manifests/init.pp index fb21914..8e4875e 100644 --- a/amanda/manifests/init.pp +++ b/amanda/manifests/init.pp @@ -2,16 +2,16 @@ class amanda::common { file { "/var/lib/amanda/.ssh": ensure => directory, - mode => 0700, - owner => amandabackup, - group => disk, + mode => "0700", + owner => "amandabackup", + group => "disk", } file { "/var/lib/amanda/.ssh/authorized_keys": ensure => present, - mode => 0600, - owner => amandabackup, - group => disk, + mode => "0600", + owner => "amandabackup", + group => "disk", require => File["/var/lib/amanda/.ssh"], } @@ -45,9 +45,9 @@ class amanda::client inherits amanda::common { file { "/etc/amanda/amanda-client.conf": ensure => present, - mode => 0644, - owner => amandabackup, - group => disk, + mode => "0644", + owner => "amandabackup", + group => "disk", content => template("amanda/amanda-client.conf.erb"), require => Package["amanda-enterprise-backup-client"], } diff --git a/apache/manifests/debian.pp b/apache/manifests/debian.pp index 2a57560..8fcccc4 100644 --- a/apache/manifests/debian.pp +++ b/apache/manifests/debian.pp @@ -14,7 +14,7 @@ class apache::debian::common { "/etc/apache2/conf.d", "/etc/apache2/sites-enabled", ]: ensure => directory, - mode => 0644, + mode => "0644", owner => root, group => root, require => Package["httpd"], @@ -31,7 +31,7 @@ class apache::debian::common { file { "/etc/apache2/envvars": ensure => present, content => template("apache/apache2.envvars.erb"), - mode => 0644, + mode => "0644", owner => root, group => root, before => File["/etc/apache2/apache2.conf"], @@ -42,7 +42,7 @@ class apache::debian::common { file { "/etc/apache2/httpd.conf": ensure => present, content => template("apache/apache2.httpd.conf.erb"), - mode => 0644, + mode => "0644", owner => root, group => root, before => File["/etc/apache2/apache2.conf"], @@ -53,7 +53,7 @@ class apache::debian::common { file { "/etc/apache2/ports.conf": ensure => present, content => "# HTTP server disabled\n", - mode => 0644, + mode => "0644", owner => root, group => root, before => File["/etc/apache2/apache2.conf"], @@ -64,7 +64,7 @@ class apache::debian::common { file { "/etc/apache2/apache2.conf": ensure => present, content => template("apache/apache2.conf.erb"), - mode => 0644, + mode => "0644", owner => root, group => root, notify => Service["apache2"], @@ -109,7 +109,7 @@ define apache::debian::site($aliases, $root, $redirect) { } else { file { "/srv/www/http/${site_fqdn}": ensure => directory, - mode => 0755, + mode => "0755", owner => root, group => root, before => File[$site_conf], @@ -118,7 +118,7 @@ define apache::debian::site($aliases, $root, $redirect) { file { "/srv/www/log/http/${site_fqdn}": ensure => directory, - mode => 0755, + mode => "0755", owner => root, group => root, before => File[$site_conf], @@ -128,7 +128,7 @@ define apache::debian::site($aliases, $root, $redirect) { file { $site_conf: ensure => present, - mode => 0644, + mode => "0644", owner => root, group => root, notify => Service["apache2"], @@ -144,7 +144,7 @@ define apache::debian::site($aliases, $root, $redirect) { } file { $site_confdir: ensure => directory, - mode => 0644, + mode => "0644", owner => root, group => root, purge => true, @@ -168,7 +168,7 @@ class apache::debian::sslserver inherits apache::debian::common { "/srv/www/log/https", "/srv/www/log/https/${homename}", ]: ensure => directory, - mode => 0644, + mode => "0644", owner => root, group => root, require => Package["httpd"], @@ -196,7 +196,7 @@ define apache::debian::sslsite($ipaddr, $root, $ssl_cert, $ssl_key, $ssl_chain) } else { file { "/srv/www/https/${site_fqdn}": ensure => directory, - mode => 0755, + mode => "0755", owner => root, group => root, before => Service["apache2"], @@ -205,7 +205,7 @@ define apache::debian::sslsite($ipaddr, $root, $ssl_cert, $ssl_key, $ssl_chain) file { "/srv/www/log/https/${site_fqdn}": ensure => directory, - mode => 0755, + mode => "0755", owner => root, group => root, before => Service["apache2"], @@ -221,7 +221,7 @@ define apache::debian::sslsite($ipaddr, $root, $ssl_cert, $ssl_key, $ssl_chain) file { "/etc/ssl/certs/${site_fqdn}.crt": ensure => present, source => $real_ssl_cert, - mode => 0644, + mode => "0644", owner => root, group => root, notify => Service["apache2"], @@ -236,7 +236,7 @@ define apache::debian::sslsite($ipaddr, $root, $ssl_cert, $ssl_key, $ssl_chain) file { "/etc/ssl/private/${site_fqdn}.key": ensure => present, source => $real_ssl_key, - mode => 0600, + mode => "0600", owner => root, group => root, notify => Service["apache2"], @@ -246,7 +246,7 @@ define apache::debian::sslsite($ipaddr, $root, $ssl_cert, $ssl_key, $ssl_chain) file { "/etc/ssl/certs/${site_fqdn}.chain.crt": ensure => present, source => $ssl_chain, - mode => 0644, + mode => "0644", owner => root, group => root, notify => Service["apache2"], @@ -259,7 +259,7 @@ define apache::debian::sslsite($ipaddr, $root, $ssl_cert, $ssl_key, $ssl_chain) file { $site_conf: ensure => present, content => template("apache/site.https.conf.erb"), - mode => 0644, + mode => "0644", owner => root, group => root, notify => Service["apache2"], @@ -269,7 +269,7 @@ define apache::debian::sslsite($ipaddr, $root, $ssl_cert, $ssl_key, $ssl_chain) file { $site_confdir: ensure => directory, - mode => 0644, + mode => "0644", owner => root, group => root, purge => true, @@ -288,7 +288,7 @@ define apache::debian::configfile($source, $content, $http, $https) { file { "/etc/apache2/conf.d/${name}": ensure => present, - mode => 0644, + mode => "0644", owner => root, group => root, notify => Service["apache2"], @@ -334,7 +334,7 @@ define apache::debian::a2enmod($source="", $content="") { if $source or $content { file { "/etc/apache2/mods-available/${name}.conf": - mode => 0644, + mode => "0644", owner => root, group => root, notify => Service["apache2"], diff --git a/apache/manifests/init.pp b/apache/manifests/init.pp index e127da4..234f1dc 100644 --- a/apache/manifests/init.pp +++ b/apache/manifests/init.pp @@ -23,7 +23,7 @@ class apache::common { if $apache_datadir { file { $apache_datadir: ensure => directory, - mode => 0755, + mode => "0755", owner => "root", group => "root", seltype => "httpd_sys_content_t", @@ -37,7 +37,7 @@ class apache::common { } else { file { "/srv/www": ensure => directory, - mode => 0755, + mode => "0755", owner => root, group => root, } @@ -45,7 +45,7 @@ class apache::common { file { "/srv/www/log": ensure => directory, - mode => 0755, + mode => "0755", owner => root, group => root, require => File["/srv/www"], @@ -72,7 +72,7 @@ class apache::common { file { "/usr/local/sbin/www-logrotate.sh": ensure => present, source => "puppet:///modules/apache/www-logrotate.sh", - mode => 0755, + mode => "0755", owner => root, group => root, seluser => "system_u", @@ -697,7 +697,7 @@ class apache::webalizer { "/srv/www/webalizer/html/https", "/srv/www/webalizer/html", ]: ensure => directory, - mode => 0755, + mode => "0755", owner => $operatingsystem ? { debian => root, ubuntu => root, @@ -711,7 +711,7 @@ class apache::webalizer { "/etc/webalizer/http", "/etc/webalizer/https", ]: ensure => directory, - mode => 0644, + mode => "0644", owner => root, group => root, } @@ -741,7 +741,7 @@ class apache::webalizer { file { "/usr/local/sbin/www-webalizer.sh": ensure => present, source => "puppet:///modules/apache/www-webalizer.sh", - mode => 0755, + mode => "0755", owner => root, group => root, require => Package["webalizer"], @@ -770,7 +770,7 @@ define apache::webalizer::site($site_proto, $site_fqdn) { @file { "/etc/webalizer/${name}.conf": ensure => present, - mode => 0644, + mode => "0644", owner => root, group => root, content => template("apache/webalizer.conf.erb"), @@ -781,7 +781,7 @@ define apache::webalizer::site($site_proto, $site_fqdn) { @file { [ "/srv/www/webalizer/history/${name}", "/srv/www/webalizer/html/${name}", ]: ensure => directory, - mode => 0755, + mode => "0755", owner => $operatingsystem ? { debian => root, ubuntu => root, diff --git a/apache/manifests/redhat.pp b/apache/manifests/redhat.pp index 5621ee3..1b72443 100644 --- a/apache/manifests/redhat.pp +++ b/apache/manifests/redhat.pp @@ -7,7 +7,7 @@ class apache::redhat::server { "/srv/www/log/http", "/srv/www/log/http/${homename}", ]: ensure => directory, - mode => 0644, + mode => "0644", owner => root, group => root, require => Package["httpd"], @@ -24,7 +24,7 @@ class apache::redhat::server { file { "/etc/httpd/conf/httpd.conf": ensure => present, content => template("apache/httpd.conf.erb"), - mode => 0644, + mode => "0644", owner => root, group => root, require => Package["httpd"], @@ -62,7 +62,7 @@ define apache::redhat::site($aliases, $root, $redirect) { } else { file { "/srv/www/http/${site_fqdn}": ensure => directory, - mode => 0755, + mode => "0755", owner => root, group => root, before => File[$site_conf], @@ -71,7 +71,7 @@ define apache::redhat::site($aliases, $root, $redirect) { file { "/srv/www/log/http/${site_fqdn}": ensure => directory, - mode => 0755, + mode => "0755", owner => root, group => root, before => File[$site_conf], @@ -81,7 +81,7 @@ define apache::redhat::site($aliases, $root, $redirect) { file { $site_conf: ensure => present, - mode => 0644, + mode => "0644", owner => root, group => root, notify => Service["httpd"], @@ -97,7 +97,7 @@ define apache::redhat::site($aliases, $root, $redirect) { } file { $site_confdir: ensure => directory, - mode => 0644, + mode => "0644", owner => root, group => root, purge => true, @@ -126,7 +126,7 @@ class apache::redhat::sslserver { "/srv/www/log/https", "/srv/www/log/https/${homename}", ]: ensure => directory, - mode => 0644, + mode => "0644", owner => root, group => root, require => Package["httpd"], @@ -142,7 +142,7 @@ class apache::redhat::sslserver { file { "/etc/httpd/conf/httpsd.conf": ensure => present, - mode => 0644, + mode => "0644", owner => root, group => root, content => template("apache/httpsd.conf.erb"), @@ -153,7 +153,7 @@ class apache::redhat::sslserver { file { "/etc/init.d/httpsd": ensure => present, source => "puppet:///modules/apache/httpsd", - mode => 0755, + mode => "0755", owner => root, group => root, } @@ -197,7 +197,7 @@ define apache::redhat::sslsite($ipaddr, $root, $ssl_cert, $ssl_key, $ssl_chain) } else { file { "/srv/www/https/${site_fqdn}": ensure => directory, - mode => 0755, + mode => "0755", owner => root, group => root, before => Service["httpsd"], @@ -206,7 +206,7 @@ define apache::redhat::sslsite($ipaddr, $root, $ssl_cert, $ssl_key, $ssl_chain) file { "/srv/www/log/https/${site_fqdn}": ensure => directory, - mode => 0755, + mode => "0755", owner => root, group => root, before => Service["httpsd"], @@ -222,7 +222,7 @@ define apache::redhat::sslsite($ipaddr, $root, $ssl_cert, $ssl_key, $ssl_chain) file { "/etc/pki/tls/certs/${site_fqdn}.crt": ensure => present, source => $real_ssl_cert, - mode => 0644, + mode => "0644", owner => root, group => root, notify => Service["httpsd"], @@ -237,7 +237,7 @@ define apache::redhat::sslsite($ipaddr, $root, $ssl_cert, $ssl_key, $ssl_chain) file { "/etc/pki/tls/private/${site_fqdn}.key": ensure => present, source => $real_ssl_key, - mode => 0600, + mode => "0600", owner => root, group => root, notify => Service["httpsd"], @@ -247,7 +247,7 @@ define apache::redhat::sslsite($ipaddr, $root, $ssl_cert, $ssl_key, $ssl_chain) file { "/etc/pki/tls/certs/${site_fqdn}.chain.crt": ensure => present, source => $ssl_chain, - mode => 0644, + mode => "0644", owner => root, group => root, notify => Service["httpsd"], @@ -260,7 +260,7 @@ define apache::redhat::sslsite($ipaddr, $root, $ssl_cert, $ssl_key, $ssl_chain) file { $site_conf: ensure => present, content => template("apache/site.https.conf.erb"), - mode => 0644, + mode => "0644", owner => root, group => root, notify => Service["httpsd"], @@ -270,7 +270,7 @@ define apache::redhat::sslsite($ipaddr, $root, $ssl_cert, $ssl_key, $ssl_chain) file { $site_confdir: ensure => directory, - mode => 0644, + mode => "0644", owner => root, group => root, purge => true, @@ -293,7 +293,7 @@ define apache::redhat::configfile($source, $content, $http, $https) { true => present, default => absent, }, - mode => 0644, + mode => "0644", owner => root, group => root, notify => Service["httpd"], @@ -326,7 +326,7 @@ define apache::redhat::configfile($source, $content, $http, $https) { true => present, default => absent, }, - mode => 0644, + mode => "0644", owner => root, group => root, notify => Service["httpsd"], diff --git a/apcupsd/manifests/init.pp b/apcupsd/manifests/init.pp index 8e94798..b32c56b 100644 --- a/apcupsd/manifests/init.pp +++ b/apcupsd/manifests/init.pp @@ -15,7 +15,7 @@ class apcupsd { file { "/etc/apcupsd/apcupsd.conf": ensure => present, - mode => 0644, + mode => "0644", owner => "root", group => "root", require => Package["apcupsd"], diff --git a/apt/manifests/init.pp b/apt/manifests/init.pp index 4db2eee..644d8ba 100644 --- a/apt/manifests/init.pp +++ b/apt/manifests/init.pp @@ -2,7 +2,7 @@ class apt { file { "/var/cache/apt/local-archives": ensure => directory, - mode => 0755, + mode => "0755", owner => root, group => root, } @@ -97,7 +97,7 @@ class apt::sources { file { "/etc/apt/sources.list": ensure => present, - mode => 0644, + mode => "0644", owner => root, group => root, content => template("apt/sources.list.erb"), @@ -125,7 +125,7 @@ class apt::cacher { ensure => present, source => [ "puppet:///files/apt/apt-cacher.conf", "puppet:///modules/apt/apt-cacher.conf", ], - mode => 0644, + mode => "0644", owner => root, group => root, notify => Service["apt-cacher"], @@ -178,7 +178,7 @@ class apt::mirror { default => "/etc/apt/miror.list", }, content => template("apt/mirror.list.erb"), - mode => 0644, + mode => "0644", owner => root, group => root, require => Package["apt-mirror"], @@ -217,7 +217,7 @@ define apt::package($ensure, $source) { default => absent, }, source => $source, - mode => 0644, + mode => "0644", owner => root, group => root, require => File["/var/cache/apt/local-archives"], @@ -305,7 +305,7 @@ define apt::repo($ensure, $source, $dist="", $components="main", file { "/etc/apt/sources.list.d/${name}.list": ensure => $ensure, - mode => 0644, + mode => "0644", owner => root, group => root, content => $content, @@ -338,7 +338,7 @@ define apt::repo($ensure, $source, $dist="", $components="main", $origin = regsubst($source, "^([^:]+://)([^/]+)/.*$", "\\2") file { "/etc/apt/preferences.d/${name}.pref": ensure => $ensure, - mode => 0644, + mode => "0644", owner => root, group => root, content => $label ? { diff --git a/arduino/manifests/init.pp b/arduino/manifests/init.pp index e8c41c3..dad2a33 100644 --- a/arduino/manifests/init.pp +++ b/arduino/manifests/init.pp @@ -34,7 +34,7 @@ class arduino { file { "/usr/local/src/arduino.tgz": ensure => present, source => "puppet:///files/packages/${arduino_package}", - mode => 0644, + mode => "0644", owner => "root", group => "root", } diff --git a/autofs/manifests/init.pp b/autofs/manifests/init.pp index 07a2d11..0af45c0 100644 --- a/autofs/manifests/init.pp +++ b/autofs/manifests/init.pp @@ -17,9 +17,9 @@ class autofs { source => [ "puppet:///files/autofs/auto.master.${fqdn}", "puppet:///files/autofs/auto.master", "puppet:///modules/autofs/auto.master", ], - mode => 0644, - owner => root, - group => root, + mode => "0644", + owner => "root", + group => "root", require => Package["autofs"], notify => Service["autofs"], } diff --git a/avahi/manifests/init.pp b/avahi/manifests/init.pp index 4bcf48b..1951dbe 100644 --- a/avahi/manifests/init.pp +++ b/avahi/manifests/init.pp @@ -33,7 +33,7 @@ class avahi::daemon { force => true, recurse => true, source => "puppet:///modules/custom/empty", - mode => 0755, + mode => "0755", owner => root, group => $operatingsystem ? { openbsd => wheel, @@ -94,7 +94,7 @@ define avahi::service($port = "AUTO", $description = "%h", $ensure = "present", file { "/etc/avahi/services/${filename}": ensure => $ensure, content => template("avahi/service.erb"), - mode => 0644, + mode => "0644", owner => root, group => $operatingsystem ? { openbsd => wheel, diff --git a/backuppc/manifests/init.pp b/backuppc/manifests/init.pp index 66822a6..e92d756 100644 --- a/backuppc/manifests/init.pp +++ b/backuppc/manifests/init.pp @@ -22,7 +22,7 @@ define backuppc::manualclient($ensure = "present", $operatingsystem = "default") "puppet:///files/backuppc/${operatingsystem}.pl", "puppet:///files/backuppc/default.pl", "puppet:///modules/backuppc/default.pl", ], - mode => 0640, + mode => "0640", owner => root, group => backuppc, tag => "backuppc", @@ -65,7 +65,7 @@ class backuppc::server { if $backuppc_datadir { file { $backuppc_datadir: ensure => directory, - mode => 0750, + mode => "0750", owner => "backuppc", group => "root", require => Package["BackupPC"], @@ -88,7 +88,7 @@ class backuppc::server { file { "/usr/share/BackupPC/sbin/.htaccess": ensure => present, - mode => 0644, + mode => "0644", owner => "root", group => "root", source => [ "puppet:///files/backuppc/htaccess", @@ -98,7 +98,7 @@ class backuppc::server { file { "/usr/share/BackupPC/sbin/BackupPC_Admin": ensure => present, - mode => 4750, + mode => "4750", owner => "backuppc", group => $apache::sslserver::group, require => Package["BackupPC"], @@ -114,7 +114,7 @@ class backuppc::server { file { "/etc/BackupPC/apache.users": ensure => present, - mode => 0640, + mode => "0640", owner => "root", group => $apache::sslserver::group, seltype => $operatingsystem ? { @@ -130,7 +130,7 @@ class backuppc::server { file { "/etc/BackupPC/config.pl": ensure => present, source => "puppet:///files/backuppc/config.pl", - mode => 0440, + mode => "0440", owner => "backuppc", group => "backuppc", seltype => $operatingsystem ? { @@ -148,7 +148,7 @@ class backuppc::server { ensure => present, source => [ "puppet:///files/backuppc/hosts.in", "puppet:///modules/backuppc/hosts.in", ], - mode => 0644, + mode => "0644", owner => "root", group => "backuppc", seltype => $operatingsystem ? { @@ -167,7 +167,7 @@ class backuppc::server { purge => true, force => true, recurse => true, - mode => 0640, + mode => "0640", owner => "root", group => "backuppc", seltype => $operatingsystem ? { @@ -208,14 +208,14 @@ class backuppc::server { file { "/var/lib/BackupPC/.ssh": ensure => directory, - mode => 0750, + mode => "0750", owner => "root", group => "backuppc", } file { "/var/lib/BackupPC/.ssh/id_rsa": ensure => present, source => "/etc/ssh/ssh_host_rsa_key", - mode => 0640, + mode => "0640", owner => "root", group => "backuppc", require => File["/var/lib/BackupPC/.ssh"], @@ -224,7 +224,7 @@ class backuppc::server { file { "/var/lib/BackupPC/.ssh/id_rsa.pub": ensure => present, source => "/etc/ssh/ssh_host_rsa_key.pub", - mode => 0640, + mode => "0640", owner => "root", group => "backuppc", require => File["/var/lib/BackupPC/.ssh"], diff --git a/clarified/manifests/init.pp b/clarified/manifests/init.pp index da32e3c..edaf916 100644 --- a/clarified/manifests/init.pp +++ b/clarified/manifests/init.pp @@ -14,7 +14,7 @@ class clarified::analyzer { file { "/usr/local/src/clarified-analyzer-linux-i686.sh": ensure => present, - mode => 0755, + mode => "0755", owner => root, group => root, source => "puppet:///files/packages/${clarified_analyzer_package}", @@ -51,7 +51,7 @@ class clarified::recorder { if $recorder_datadir { file { $recorder_datadir: ensure => directory, - mode => 0700, + mode => "0700", owner => root, group => root, } @@ -64,7 +64,7 @@ class clarified::recorder { } else { file { "/var/lib/recorder": ensure => directory, - mode => 0700, + mode => "0700", owner => root, group => root, } @@ -74,7 +74,7 @@ class clarified::recorder { "/etc/clarified/probe.d", "/etc/clarified/remote.d", ]: ensure => directory, - mode => 0644, + mode => "0644", owner => root, group => root, before => Exec["/usr/local/src/clarified-recorder-linux-i686.sh"], @@ -89,7 +89,7 @@ class clarified::recorder { file { "/usr/local/src/clarified-recorder-linux-i686.sh": ensure => present, - mode => 0755, + mode => "0755", owner => root, group => root, source => "puppet:///files/packages/${clarified_recorder_package}", @@ -118,7 +118,7 @@ class clarified::recorder { file { "/etc/init.d/clarified-probe": ensure => present, - mode => 0755, + mode => "0755", owner => root, group => root, source => "/usr/local/probe/probe-init.sh", @@ -186,7 +186,7 @@ define clarified::probe($interface="", $snaplen="65535", $keeptime="100GB", true => present, false => absent, }, - mode => 0755, + mode => "0755", owner => root, group => root, content => template("clarified/probe.erb"), @@ -199,7 +199,7 @@ define clarified::probe($interface="", $snaplen="65535", $keeptime="100GB", true => present, false => absent, }, - mode => 0755, + mode => "0755", owner => root, group => root, content => template("clarified/remote.erb"), @@ -209,7 +209,7 @@ define clarified::probe($interface="", $snaplen="65535", $keeptime="100GB", file { "/var/lib/recorder/${name}": ensure => directory, - mode => 0700, + mode => "0700", owner => root, group => root, require => File["/var/lib/recorder"], diff --git a/cups/manifests/init.pp b/cups/manifests/init.pp index 52ab339..07efd87 100644 --- a/cups/manifests/init.pp +++ b/cups/manifests/init.pp @@ -10,7 +10,7 @@ class cups::client { file { "/etc/cups/client.conf": ensure => present, content => template("cups/client.conf.erb"), - mode => 0644, + mode => "0644", owner => root, group => $operatingsystem ? { openbsd => wheel, @@ -49,7 +49,7 @@ class cups::server inherits cups::client { source => [ "puppet:///files/cups/cupsd.conf.${fqdn}", "puppet:///files/cups/cupsd.conf", "puppet:///modules/cups/cupsd.conf", ], - mode => 0640, + mode => "0640", owner => root, group => lp, require => Package["cups"], @@ -64,7 +64,7 @@ class cups::server inherits cups::client { file { "/etc/cups/ppd": ensure => directory, - mode => 0755, + mode => "0755", owner => root, group => lp, require => Package["cups"], @@ -136,7 +136,7 @@ define cups::printer($uri, $ensure = present) { ensure => $ensure, source => [ "puppet:///files/cups/${name}.ppd", "puppet:///modules/cups/postscript.ppd" ], - mode => 0644, + mode => "0644", owner => root, group => root, require => $ensure ? { @@ -178,7 +178,7 @@ class cups::samba { "/usr/share/cups/drivers", "/usr/share/cups/drivers/x64", ]: ensure => directory, - mode => 0755, + mode => "0755", owner => root, group => root, require => [ Package["samba"], @@ -189,7 +189,7 @@ class cups::samba { file { "/usr/share/cups/drivers/${name}": ensure => present, source => "puppet:///modules/cups/drivers/${name}", - mode => 0644, + mode => "0644", owner => root, group => root, require => [ File["/usr/share/cups/drivers"], @@ -220,7 +220,7 @@ class cups::samba { file { "/etc/cron.hourly/update-printer-inf.sh": ensure => present, source => "puppet:///modules/cups/update-printer-inf.sh", - mode => 0755, + mode => "0755", owner => root, group => root, } @@ -239,7 +239,7 @@ class cups::snmp { file { "/etc/cron.hourly/printer-details.py": ensure => present, source => "puppet:///modules/cups/printer-details.py", - mode => 0755, + mode => "0755", owner => root, group => root, require => Package["net-snmp-utils"], diff --git a/custom/manifests/init.pp b/custom/manifests/init.pp index 1c93848..3124de1 100644 --- a/custom/manifests/init.pp +++ b/custom/manifests/init.pp @@ -3,7 +3,7 @@ class custom { file { "/srv": ensure => directory, - mode => 0755, + mode => "0755", owner => root, group => $operatingsystem ? { OpenBSD => wheel, diff --git a/daap/manifests/init.pp b/daap/manifests/init.pp index 8146d14..d9b1df6 100644 --- a/daap/manifests/init.pp +++ b/daap/manifests/init.pp @@ -19,7 +19,7 @@ class daap::server { file { "/etc/mt-daapd.conf": ensure => present, source => "puppet:///files/daap/mt-daapd.conf", - mode => 0640, + mode => "0640", owner => root, group => mt-daapd, require => Package["mt-daapd"], diff --git a/dhcp/manifests/init.pp b/dhcp/manifests/init.pp index 403c975..2ab66c5 100644 --- a/dhcp/manifests/init.pp +++ b/dhcp/manifests/init.pp @@ -37,7 +37,7 @@ class dhcp::server::common { if $operatingsystem == "OpenBSD" and $operatingsystemrelease !~ /4\.[1-8]/ { file { "/etc/rc.d/isc_dhcpd": ensure => present, - mode => 0555, + mode => "0555", owner => "root", group => "bin", source => "puppet:///modules/dhcp/isc_dhcpd.rc", @@ -82,7 +82,7 @@ class dhcp::server inherits dhcp::server::common { ensure => present, source => [ "puppet:///files/dhcp/dhcpd.conf.${fqdn}", "puppet:///files/dhcp/dhcpd.conf", ], - mode => 0644, + mode => "0644", owner => root, group => $operatingsystem ? { openbsd => wheel, @@ -101,7 +101,7 @@ class dhcp::server::ldap inherits dhcp::server::common { file { "/usr/local/sbin/dhcpdump.py": ensure => present, source => "puppet:///modules/dhcp/dhcpdump.py", - mode => 0755, + mode => "0755", owner => root, group => $operatingsystem ? { OpenBSD => wheel, @@ -113,7 +113,7 @@ class dhcp::server::ldap inherits dhcp::server::common { ensure => present, source => [ "puppet:///files/dhcp/dhcpd.conf.in.${hostname}", "puppet:///files/dhcp/dhcpd.conf.in", ], - mode => 0644, + mode => "0644", owner => root, group => $operatingsystem ? { OpenBSD => wheel, diff --git a/dns/manifests/init.pp b/dns/manifests/init.pp index 8e81573..fc24b5f 100644 --- a/dns/manifests/init.pp +++ b/dns/manifests/init.pp @@ -64,7 +64,7 @@ class dns::server { file { "${chroot}${rndckey}": ensure => present, - mode => 0640, + mode => "0640", owner => "root", group => $group, require => $operatingsystem ? { @@ -113,7 +113,7 @@ class dns::server { file { "named.conf": ensure => present, path => "${chroot}${config}", - mode => 0640, + mode => "0640", owner => "root", group => $group, require => $operatingsystem ? { @@ -125,7 +125,7 @@ class dns::server { file { "/usr/local/sbin/generate-named-conf.sh": ensure => present, content => template("dns/generate-named-conf.sh.erb"), - mode => 0755, + mode => "0755", owner => "root", group => $operatingsystem ? { "openbsd" => "wheel", @@ -147,7 +147,7 @@ class dns::server { source => [ "puppet:///files/dns/named.conf.options.${fqdn}", "puppet:///files/dns/named.conf.options", "puppet:///modules/dns/named.conf.options", ], - mode => 0640, + mode => "0640", owner => "root", group => $group, require => $operatingsystem ? { @@ -162,7 +162,7 @@ class dns::server { source => [ "puppet:///files/dns/named.conf.local.${fqdn}", "puppet:///files/dns/named.conf.local", "puppet:///modules/dns/named.conf.local", ], - mode => 0640, + mode => "0640", owner => "root", group => $group, require => $operatingsystem ? { @@ -234,7 +234,7 @@ define dns::zone($role = "master", $master = "", $slaves = [], $source = "AUTO") file { "${dns::server::chroot}${dns::server::confdir}/zone.${zonefile}": ensure => present, content => template("dns/zone.$role.erb"), - mode => 0640, + mode => "0640", owner => "root", group => $dns::server::group, require => $operatingsystem ? { @@ -249,7 +249,7 @@ define dns::zone($role = "master", $master = "", $slaves = [], $source = "AUTO") file { "${dns::server::chroot}${zonedir}/db.${zonefile}": ensure => present, source => $source, - mode => 0640, + mode => "0640", owner => "root", group => $dns::server::group, require => $operatingsystem ? { @@ -262,7 +262,7 @@ define dns::zone($role = "master", $master = "", $slaves = [], $source = "AUTO") file { "${dns::server::chroot}${zonedir}/db.${zonefile}": ensure => present, content => template("dns/db.erb"), - mode => 0640, + mode => "0640", owner => "root", group => $dns::server::group, require => $operatingsystem ? { @@ -275,7 +275,7 @@ define dns::zone($role = "master", $master = "", $slaves = [], $source = "AUTO") ensure => present, source => [ "puppet:///files/dns/db.${zonefile}-dynamic.${homename}", "puppet:///modules/dns/empty", ], - mode => 0640, + mode => "0640", owner => "root", group => $dns::server::group, require => $operatingsystem ? { @@ -288,7 +288,7 @@ define dns::zone($role = "master", $master = "", $slaves = [], $source = "AUTO") ensure => present, source => [ "puppet:///files/dns/db.${zonefile}-static.${homename}", "puppet:///modules/dns/empty", ], - mode => 0640, + mode => "0640", owner => "root", group => $dns::server::group, require => $operatingsystem ? { @@ -328,7 +328,7 @@ class dns::nsupdate { file { "/usr/local/sbin/nsupdate.sh": ensure => present, content => template("dns/nsupdate.sh.erb"), - mode => 0700, + mode => "0700", owner => root, group => $operatingsystem ? { openbsd => wheel, diff --git a/dovecot/manifests/init.pp b/dovecot/manifests/init.pp index 3cb4b38..ddfe4b1 100644 --- a/dovecot/manifests/init.pp +++ b/dovecot/manifests/init.pp @@ -46,9 +46,9 @@ class dovecot::server inherits dovecot::common { file { "$dovecot_ssl_dir/private/dovecot.csr": ensure => present, source => $dovecot_ssl_csr, - mode => 0640, - owner => root, - group => root, + mode => "0640", + owner => "root", + group => "root", notify => Service["dovecot"], } } @@ -57,9 +57,9 @@ class dovecot::server inherits dovecot::common { file { "$dovecot_ssl_dir/certs/dovecot.ca.crt": ensure => present, source => $dovecot_ssl_ca, - mode => 0644, - owner => root, - group => root, + mode => "0644", + owner => "root", + group => "root", notify => Service["dovecot"], } } @@ -68,9 +68,9 @@ class dovecot::server inherits dovecot::common { file { "$dovecot_ssl_dir/certs/dovecot.crt": ensure => present, source => $dovecot_ssl_cert, - mode => 0644, - owner => root, - group => root, + mode => "0644", + owner => "root", + group => "root", notify => Service["dovecot"], } } else { @@ -81,9 +81,9 @@ class dovecot::server inherits dovecot::common { file { "$dovecot_ssl_dir/private/dovecot.key": ensure => present, source => $dovecot_ssl_key, - mode => 0600, - owner => root, - group => root, + mode => "0600", + owner => "root", + group => "root", notify => Service["dovecot"], } } else { @@ -93,9 +93,9 @@ class dovecot::server inherits dovecot::common { file { "/etc/dovecot.conf": ensure => present, content => template("dovecot/dovecot.conf.erb"), - mode => 0644, - owner => root, - group => root, + mode => "0644", + owner => "root", + group => "root", notify => Service["dovecot"], } diff --git a/ejabberd/manifests/init.pp b/ejabberd/manifests/init.pp index 4900ad5..b5a5112 100644 --- a/ejabberd/manifests/init.pp +++ b/ejabberd/manifests/init.pp @@ -55,26 +55,26 @@ class ejabberd { file { "${cert_prefix}/private/ejabberd.key": ensure => present, source => $ejabberd_ssl_key, - mode => 0600, - owner => root, - group => root, + mode => "0600", + owner => "root", + group => "root", notify => Exec["generate-ejabberd-pem"], } file { "${cert_prefix}/certs/ejabberd.crt": ensure => present, source => $ejabberd_ssl_cert, - mode => 0644, - owner => root, - group => root, + mode => "0644", + owner => "root", + group => "root", notify => Exec["generate-ejabberd-pem"], } if $ejabberd_ssl_chain { file { "${cert_prefix}/certs/ejabberd.chain.crt": ensure => present, source => $ejabberd_ssl_chain, - mode => 0644, - owner => root, - group => root, + mode => "0644", + owner => "root", + group => "root", notify => Exec["generate-ejabberd-pem"], } $cert_files = "private/ejabberd.key certs/ejabberd.crt certs/ejabberd.chain.crt" @@ -94,7 +94,7 @@ class ejabberd { file { "/etc/ejabberd/ejabberd.pem": ensure => present, - mode => 0640, + mode => "0640", owner => "root", group => "ejabberd", require => Package["ejabberd"], @@ -102,7 +102,7 @@ class ejabberd { file { "/etc/ejabberd/ejabberd.cfg": ensure => present, - mode => 0640, + mode => "0640", owner => "root", group => "ejabberd", content => template("ejabberd/ejabberd.cfg.erb"), @@ -121,14 +121,14 @@ class ejabberd { if $ejabberd_webhosts { file { "/var/www/jabber": ensure => directory, - mode => 0755, + mode => "0755", owner => "root", group => "root", } file { "/var/www/jabber/.htaccess": ensure => present, - mode => 0644, + mode => "0644", owner => "root", group => "root", source => "puppet:///modules/ejabberd/htaccess", @@ -181,7 +181,7 @@ class ejabberd::collab inherits ejabberd { } file { "/usr/local/src/${ejabberd_package}": ensure => present, - mode => 0644, + mode => "0644", owner => "root", group => "root", source => "puppet:///files/packages/${ejabberd_package}", @@ -215,17 +215,17 @@ class ejabberd::backup { file { $ejabberd_backup_datadir: ensure => directory, - mode => 0700, - owner => root, - group => root, + mode => "0700", + owner => "root", + group => "root", } file { "/usr/local/sbin/ejabberd-backup": ensure => present, content => template("ejabberd/ejabberd-backup.erb"), - mode => 0755, - owner => root, - group => root, + mode => "0755", + owner => "root", + group => "root", } cron { "ejabberd-backup": diff --git a/firewall/manifests/init.pp b/firewall/manifests/init.pp index 773f39b..4b4f5f3 100644 --- a/firewall/manifests/init.pp +++ b/firewall/manifests/init.pp @@ -91,9 +91,9 @@ class firewall::common::iptables { default => "/etc/sysconfig/iptables", }, ensure => present, - mode => 0600, - owner => root, - group => root, + mode => "0600", + owner => "root", + group => "root", require => Package["iptables"], notify => Service["iptables"], } @@ -103,9 +103,9 @@ class firewall::common::iptables { $ip6states = versioncmp($kernelversion, "2.6.20") file { "/etc/sysconfig/ip6tables": ensure => present, - mode => 0600, - owner => root, - group => root, + mode => "0600", + owner => "root", + group => "root", require => Package["iptables"], notify => Service["ip6tables"], } @@ -177,9 +177,9 @@ class firewall::common::pf { file { "/etc/pf.conf": ensure => present, - mode => 0600, - owner => root, - group => wheel, + mode => "0600", + owner => "root", + group => "wheel", notify => Exec["pfctl -f /etc/pf.conf"], } diff --git a/func/manifests/init.pp b/func/manifests/init.pp index 28f64f2..c809e5c 100644 --- a/func/manifests/init.pp +++ b/func/manifests/init.pp @@ -9,9 +9,9 @@ class func::minion { ensure => present, source => [ "puppet:///files/func/minion.conf", "puppet:///modules/func/minion.conf", ], - mode => 0644, - owner => root, - group => root, + mode => "0644", + owner => "root", + group => "root", require => Package["func"], notify => Service["funcd"], } @@ -19,27 +19,27 @@ class func::minion { file { "/etc/pki/certmaster/${hostname}.pem": ensure => present, source => "${puppet_ssldir}/private_keys/${fqdn}.pem", - mode => 0600, - owner => root, - group => root, + mode => "0600", + owner => "root", + group => "root", require => Package["func"], notify => Service["funcd"], } file { "/etc/pki/certmaster/${hostname}.cert": ensure => present, source => "${puppet_ssldir}/certs/${fqdn}.pem", - mode => 0644, - owner => root, - group => root, + mode => "0644", + owner => "root", + group => "root", require => Package["func"], notify => Service["funcd"], } file { "/etc/pki/certmaster/ca.cert": ensure => present, source => "${puppet_ssldir}/certs/ca.pem", - mode => 0644, - owner => root, - group => root, + mode => "0644", + owner => "root", + group => "root", require => Package["func"], notify => Service["funcd"], } @@ -56,9 +56,9 @@ class func::server inherits func::minion { file { "/etc/pki/certmaster/ca": ensure => directory, - mode => 0750, - owner => root, - group => sysadm, + mode => "0750", + owner => "root", + group => "sysadm", } exec { "umask 077; openssl rsa -in ${puppet_ssldir}/ca/ca_key.pem -out /etc/pki/certmaster/ca/certmaster.key -passin file:${puppet_ssldir}/ca/private/ca.pass": path => "/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin", @@ -68,17 +68,17 @@ class func::server inherits func::minion { file { "/etc/pki/certmaster/ca/certmaster.crt": ensure => present, source => "${puppet_ssldir}/ca/ca_crt.pem", - mode => 0644, - owner => root, - group => root, + mode => "0644", + owner => "root", + group => "root", require => File["/etc/pki/certmaster/ca"], } file { "/var/lib/certmaster/certmaster": ensure => directory, - mode => 0755, - owner => root, - group => root, + mode => "0755", + owner => "root", + group => "root", } file { "/var/lib/certmaster/certmaster/certs": ensure => link, @@ -89,9 +89,9 @@ class func::server inherits func::minion { ensure => present, source => [ "puppet:///files/func/certmaster.conf", "puppet:///modules/func/certmaster.conf", ], - mode => 0644, - owner => root, - group => root, + mode => "0644", + owner => "root", + group => "root", require => Package["func"], } diff --git a/git/manifests/init.pp b/git/manifests/init.pp index 6679770..13b6910 100644 --- a/git/manifests/init.pp +++ b/git/manifests/init.pp @@ -28,9 +28,9 @@ class git::server { if $git_datadir { file { $git_datadir: ensure => directory, - mode => 0755, - owner => root, - group => root, + mode => "0755", + owner => "root", + group => "root", } file { "/srv/git": ensure => link, @@ -40,9 +40,9 @@ class git::server { } else { file { "/srv/git": ensure => directory, - mode => 0755, - owner => root, - group => root, + mode => "0755", + owner => "root", + group => "root", seltype => "httpd_sys_content_t", } } @@ -108,9 +108,9 @@ class git::gitweb inherits git::server { source => [ "puppet:///files/git/gitweb_config.perl.${fqdn}", "puppet:///files/git/gitweb_config.perl", "puppet:///modules/git/gitweb_config.perl", ], - mode => 0644, - owner => root, - group => root, + mode => "0644", + owner => "root", + group => "root", require => Package["gitweb"], } diff --git a/hastymail/manifests/init.pp b/hastymail/manifests/init.pp index fb76ea8..2ae8b10 100644 --- a/hastymail/manifests/init.pp +++ b/hastymail/manifests/init.pp @@ -12,7 +12,7 @@ class hastymail { file { "/usr/local/src/hastymail.tar.gz": ensure => present, source => "puppet:///files/packages/$hastymail_package", - mode => 0644, + mode => "0644", owner => "root", group => "root", links => follow, @@ -26,7 +26,7 @@ class hastymail { file { "/etc/hastymail2": ensure => directory, - mode => 0750, + mode => "0750", owner => "root", group => $apache::sslserver::group, } @@ -34,7 +34,7 @@ class hastymail { ensure => present, source => [ "puppet:///private/hastymail2.conf", "puppet:///files/mail/hastymail2.conf", ], - mode => 0640, + mode => "0640", owner => "root", group => $apache::sslserver::group, require => File["/etc/hastymail2"], @@ -48,7 +48,7 @@ class hastymail { } file { "/etc/hastymail2/hastymail2.rc": ensure => present, - mode => 0640, + mode => "0640", owner => "root", group => $apache::sslserver::group, } diff --git a/ifstated/manifests/init.pp b/ifstated/manifests/init.pp index 7a9416a..14dcc5f 100644 --- a/ifstated/manifests/init.pp +++ b/ifstated/manifests/init.pp @@ -8,9 +8,9 @@ class ifstated { source => [ "puppet:///private/ifstated.conf", "puppet:///files/firewall/ifstated.conf.${fqdn}", "puppet:///files/firewall/ifstated.conf", ], - mode => 0644, - owner => root, - group => wheel, + mode => "0644", + owner => "root", + group => "wheel", notify => Service["ifstated"], } diff --git a/irc/manifests/init.pp b/irc/manifests/init.pp index 531be14..a72e920 100644 --- a/irc/manifests/init.pp +++ b/irc/manifests/init.pp @@ -8,9 +8,9 @@ class irc::server { file { "/var/lib/ratbox": ensure => directory, - owner => irc, - group => irc, - mode => 0700, + owner => "irc", + group => "irc", + mode => "0700", require => Package["ircd-ratbox"], } @@ -27,9 +27,9 @@ class irc::services inherits irc::server { file { "/var/lib/ratbox-services": ensure => directory, - owner => irc, - group => irc, - mode => 0700, + owner => "irc", + group => "irc", + mode => "0700", require => Package["ircd-ratbox", "ratbox-services-sqlite"], } @@ -46,17 +46,17 @@ define irc::network($desc, $servername, $serverdesc, file { "/var/lib/ratbox/${name}": ensure => directory, - owner => irc, - group => irc, - mode => 0700, + owner => "irc", + group => "irc", + mode => "0700", require => File["/var/lib/ratbox"], } file { "/var/lib/ratbox/${name}/ircd.conf": ensure => present, - mode => 0600, - owner => irc, - group => irc, + mode => "0600", + owner => "irc", + group => "irc", content => $services ? { true => template("irc/ircd-ratbox.conf.erb", "irc/ircd-ratbox-services.conf.erb"), false => template("irc/ircd-ratbox.conf.erb"), @@ -68,14 +68,14 @@ define irc::network($desc, $servername, $serverdesc, ssl::certificate { "/var/lib/ratbox/${name}/ircd.pem": cn => $servername, - mode => 0600, + mode => "0600", owner => "irc", group => "irc", require => File["/var/lib/ratbox/${name}"], } ssl::dhparam { "/var/lib/ratbox/${name}/dh.pem": - mode => 0600, + mode => "0600", owner => "irc", group => "irc", require => File["/var/lib/ratbox/${name}"], @@ -83,7 +83,7 @@ define irc::network($desc, $servername, $serverdesc, file { "/etc/init.d/ircd-${name}": ensure => present, - mode => 0755, + mode => "0755", owner => root, group => root, content => template("irc/ircd-ratbox.init.erb"), @@ -125,9 +125,9 @@ define irc::network($desc, $servername, $serverdesc, "/var/lib/ratbox-services/${name}/var/run", "/var/lib/ratbox-services/${name}/var/run/ratbox-services", ]: ensure => directory, - owner => irc, - group => irc, - mode => 0600, + owner => "irc", + group => "irc", + mode => "0600", before => Service["ratbox-services-${name}"], require => File["/var/lib/ratbox-services"], } @@ -139,9 +139,9 @@ define irc::network($desc, $servername, $serverdesc, file { "/var/lib/ratbox-services/${name}/etc/ratbox-services/ratbox-services.conf": ensure => present, - mode => 0600, - owner => irc, - group => irc, + mode => "0600", + owner => "irc", + group => "irc", content => template("irc/ratbox-services.conf.erb"), before => Service["ratbox-services-${name}"], notify => Service["ratbox-services-${name}"], @@ -150,9 +150,9 @@ define irc::network($desc, $servername, $serverdesc, file { "/var/lib/ratbox-services/${name}/etc/ratbox-services/ratbox-services.db": ensure => present, - mode => 0600, - owner => irc, - group => irc, + mode => "0600", + owner => "irc", + group => "irc", source => "/etc/ratbox-services/ratbox-services.db", replace => false, before => Service["ratbox-services-${name}"], @@ -161,9 +161,9 @@ define irc::network($desc, $servername, $serverdesc, file { "/etc/init.d/ratbox-services-${name}": ensure => present, - mode => 0755, - owner => root, - group => root, + mode => "0755", + owner => "root", + group => "root", content => template("irc/ratbox-services.init.erb"), before => Service["ratbox-services-${name}"], notify => Exec["enable-ratbox-services-${name}"], diff --git a/iscsi/manifests/init.pp b/iscsi/manifests/init.pp index 819651b..8e78887 100644 --- a/iscsi/manifests/init.pp +++ b/iscsi/manifests/init.pp @@ -18,7 +18,7 @@ class iscsi::server { source => [ "puppet:///files/iscsi/targets.conf.${fqdn}", "puppet:///files/iscsi/targets.conf", "puppet:///modules/iscsi/targets.conf", ], - mode => 0600, + mode => "0600", owner => root, group => root, require => Package["scsi-target-utils"], @@ -26,7 +26,7 @@ class iscsi::server { file { "/etc/tgt/target.d": ensure => directory, - mode => 0700, + mode => "0700", owner => root, group => root, require => Package["scsi-target-utils"], @@ -78,7 +78,7 @@ define iscsi::target($tid, $initiator = "ALL", $ensure = "present") { file { "/etc/tgt/target.d/${tid}.conf": ensure => present, content => template("iscsi/tid.conf.erb"), - mode => 0600, + mode => "0600", owner => root, group => root, require => File["/etc/tgt/target.d"], diff --git a/kerberos/manifests/init.pp b/kerberos/manifests/init.pp index 91fe76f..8ccfdd1 100644 --- a/kerberos/manifests/init.pp +++ b/kerberos/manifests/init.pp @@ -33,11 +33,11 @@ class kerberos::client { }, ensure => present, content => template("kerberos/krb5.conf.erb"), - mode => 0644, - owner => root, + mode => "0644", + owner => "root", group => $operatingsystem ? { - openbsd => wheel, - default => root, + openbsd => "wheel", + default => "root", }, } @@ -105,7 +105,7 @@ class kerberos::server inherits kerberos::client { if $kerberos_datadir { file { $kerberos_datadir: ensure => directory, - mode => 0600, + mode => "0600", owner => "root", group => "root", } @@ -119,7 +119,7 @@ class kerberos::server inherits kerberos::client { } else { file { "/srv/kerberos": ensure => directory, - mode => 0600, + mode => "0600", owner => "root", group => "root", } @@ -128,7 +128,7 @@ class kerberos::server inherits kerberos::client { file { "/var/kerberos/krb5kdc/kdc.conf": ensure => present, content => template("kerberos/kdc.conf.erb"), - mode => 0600, + mode => "0600", owner => "root", group => "root", require => [ Package["krb5-server"], diff --git a/ldap/manifests/init.pp b/ldap/manifests/init.pp index 74d03a5..96fd654 100644 --- a/ldap/manifests/init.pp +++ b/ldap/manifests/init.pp @@ -184,7 +184,7 @@ class ldap::auth inherits ldap::client { file { "/etc/login.conf": ensure => present, content => template("ldap/login.conf.erb"), - mode => 0644, + mode => "0644", owner => root, group => wheel, require => [ File["/etc/openldap/ldap.conf"], @@ -231,7 +231,7 @@ class ldap::client { "ubuntu" => "/etc/ldap/ldap.conf", default => "/etc/openldap/ldap.conf", }, - mode => 0644, + mode => "0644", owner => root, group => $operatingsystem ? { "darwin" => wheel, @@ -353,7 +353,7 @@ class ldap::server { file { "${ssl::certs}/slapd.crt": ensure => present, source => $ldap_server_cert, - mode => 0644, + mode => "0644", owner => "root", group => $operatingsystem ? { "openbsd" => "wheel", @@ -365,7 +365,7 @@ class ldap::server { file { "${ssl::private}/slapd.key": ensure => present, source => $ldap_server_key, - mode => 0640, + mode => "0640", owner => "root", group => $group, require => Package["openldap-server"], @@ -376,7 +376,7 @@ class ldap::server { ensure => present, path => "${config}/slapd.conf", content => template("ldap/slapd.conf.erb"), - mode => 0640, + mode => "0640", owner => "root", group => $group, notify => Service["slapd"], @@ -385,7 +385,7 @@ class ldap::server { file { "${config}/slapd.conf.d": ensure => directory, source => "puppet:///modules/custom/empty", - mode => 0750, + mode => "0750", owner => "root", group => $group, purge => true, @@ -398,7 +398,7 @@ class ldap::server { file { "/etc/sysconfig/ldap": ensure => present, source => "puppet:///modules/ldap/ldap.sysconfig", - mode => 0644, + mode => "0644", owner => "root", group => "root", notify => Service["slapd"], @@ -420,7 +420,7 @@ class ldap::server { if $ldap_datadir { file { $ldap_datadir: ensure => directory, - mode => 0700, + mode => "0700", owner => $user, group => $group, require => Package["openldap-server"], @@ -433,7 +433,7 @@ class ldap::server { } else { file { "/srv/ldap": ensure => directory, - mode => 0700, + mode => "0700", owner => $user, group => $group, require => Package["openldap-server"], @@ -443,7 +443,7 @@ class ldap::server { file { "${config}/schema": ensure => directory, source => "puppet:///modules/custom/empty", - mode => 0755, + mode => "0755", owner => "root", group => $operatingsystem ? { "openbsd" => "wheel", @@ -456,7 +456,7 @@ class ldap::server { } file { "${config}/slapd.conf.d/schema.conf": ensure => present, - mode => 0640, + mode => "0640", owner => "root", group => $group, require => Exec["generate-slapd-schema-config"], @@ -473,7 +473,7 @@ class ldap::server { file { "${config}/slapd.conf.d/database.conf": ensure => present, - mode => 0640, + mode => "0640", owner => "root", group => $group, require => Exec["generate-slapd-database-config"], @@ -509,7 +509,7 @@ define ldap::server::database($aclsource = "") { file { "${ldap::server::config}/slapd.conf.d/db.${name}.conf": ensure => present, content => template("ldap/slapd-database.conf.erb"), - mode => 0640, + mode => "0640", owner => "root", group => $ldap::server::group, notify => Exec["generate-slapd-database-config"], @@ -525,7 +525,7 @@ define ldap::server::database($aclsource = "") { "" => template("ldap/slapd-acl.conf.erb"), default => undef, }, - mode => 0640, + mode => "0640", owner => "root", group => $ldap::server::group, notify => Service["slapd"], @@ -536,7 +536,7 @@ define ldap::server::database($aclsource = "") { source => [ "puppet:///files/ldap/slapd-index.conf.${name}", "puppet:///files/ldap/slapd-index.conf", "puppet:///modules/ldap/slapd-index.conf", ], - mode => 0640, + mode => "0640", owner => "root", group => $ldap::server::group, notify => Service["slapd"], @@ -544,7 +544,7 @@ define ldap::server::database($aclsource = "") { file { "/srv/ldap/${name}": ensure => directory, - mode => 0700, + mode => "0700", owner => $ldap::server::user, group => $ldap::server::group, require => File["/srv/ldap"], @@ -555,7 +555,7 @@ define ldap::server::database($aclsource = "") { source => [ "puppet:///files/ldap/DB_CONFIG.${name}", "puppet:///files/ldap/DB_CONFIG", "puppet:///modules/ldap/DB_CONFIG", ], - mode => 0644, + mode => "0644", owner => "root", group => $operatingsystem ? { "openbsd" => "wheel", @@ -591,7 +591,7 @@ define ldap::server::schema($idx = 50) { path => "${ldap::server::config}/schema/${idx}-${name}.schema", source => [ "puppet:///files/ldap/${name}.schema", "puppet:///modules/ldap/${name}.schema", ], - mode => 0644, + mode => "0644", owner => "root", group => $operatingsystem ? { "openbsd" => "wheel", diff --git a/libvirt/manifests/init.pp b/libvirt/manifests/init.pp index 681a653..88abc0e 100644 --- a/libvirt/manifests/init.pp +++ b/libvirt/manifests/init.pp @@ -41,7 +41,7 @@ class libvirt::kvm inherits libvirt::client { file { "/etc/libvirt/libvirtd.conf": ensure => present, - mode => 0644, + mode => "0644", owner => "root", group => "root", content => template("libvirt/libvirtd.conf.erb"), diff --git a/minecraft/manifests/init.pp b/minecraft/manifests/init.pp index d118c5c..757a1e6 100644 --- a/minecraft/manifests/init.pp +++ b/minecraft/manifests/init.pp @@ -6,7 +6,7 @@ class minecraft { file { "/usr/local/lib/minecraft.jar": ensure => present, source => "puppet:///files/packages/minecraft.jar", - mode => 0644, + mode => "0644", owner => "root", group => "root", } @@ -14,7 +14,7 @@ class minecraft { file { "/usr/local/bin/minecraft": ensure => present, source => "puppet:///modules/minecraft/minecraft", - mode => 0755, + mode => "0755", owner => "root", group => "root", require => File["/usr/local/lib/minecraft.jar"], diff --git a/munin/manifests/init.pp b/munin/manifests/init.pp index 84c90b7..9de5885 100644 --- a/munin/manifests/init.pp +++ b/munin/manifests/init.pp @@ -34,12 +34,12 @@ class munin::node { file { "/etc/munin/munin-node.conf": ensure => present, content => template("munin/munin-node.conf.erb"), - owner => root, + owner => "root", group => $operatingsystem ? { - OpenBSD => wheel, - default => root, + OpenBSD => "wheel", + default => "root", }, - mode => 0644, + mode => "0644", require => Package["munin-node"], notify => Exec["munin-node-configure"], } @@ -89,7 +89,7 @@ define munin::snmpnode($snmp_community="public", $snmp_version="2") { OpenBSD => wheel, default => root, }, - mode => 0600, + mode => "0600", notify => Service["munin-node"], } @@ -125,9 +125,9 @@ define munin::plugin($config = "") { file { "/usr/local/libexec/munin/plugins/${name}": ensure => present, source => "puppet:///modules/munin/plugins/${name}", - owner => root, - group => wheel, - mode => 0755, + owner => "root", + group => "wheel", + mode => "0755", require => Package["munin-node"], } } @@ -135,9 +135,9 @@ define munin::plugin($config = "") { file { "/usr/share/munin/plugins/${name}": ensure => present, source => "puppet:///modules/munin/plugins/${name}", - owner => root, - group => root, - mode => 0755, + owner => "root", + group => "root", + mode => "0755", require => Package["munin-node"], } } @@ -149,12 +149,12 @@ define munin::plugin($config = "") { source => [ "puppet:///files/munin/plugin-conf/${config}.${fqdn}", "puppet:///files/munin/plugin-conf/${config}", "puppet:///modules/munin/plugin-conf/${config}", ], - owner => root, + owner => "root", group => $operatingsystem ? { OpenBSD => wheel, default => root, }, - mode => 0644, + mode => "0644", notify => Service["munin-node"], require => $operatingsystem ? { OpenBSD => File["/usr/local/libexec/munin/plugins/${name}"], @@ -206,9 +206,9 @@ class munin::server { if $munin_datadir { file { $munin_datadir: ensure => directory, - mode => 0755, - owner => munin, - group => munin, + mode => "0755", + owner => "munin", + group => "munin", seltype => "munin_var_lib_t", require => Package["munin"], } @@ -230,9 +230,9 @@ class munin::server { if $munin_htmldir { file { $munin_htmldir: ensure => directory, - mode => 0755, - owner => munin, - group => munin, + mode => "0755", + owner => "munin", + group => "munin", seltype => "httpd_munin_content_t", require => Package["munin"], } @@ -261,9 +261,9 @@ class munin::server { purge => true, force => true, recurse => true, - owner => root, - group => root, - mode => 0644, + owner => "root", + group => "root", + mode => "0644", source => "puppet:///modules/custom/empty", require => Package["munin"], } @@ -272,9 +272,9 @@ class munin::server { ensure => present, source => [ "puppet:///files/munin/munin.conf.in", "puppet:///modules/munin/munin.conf.in", ], - owner => root, - group => root, - mode => 0644, + owner => "root", + group => "root", + mode => "0644", require => Package["munin"], notify => Exec["generate-munin-conf"], } diff --git a/mutt/manifests/init.pp b/mutt/manifests/init.pp index 316db88..6e9cf26 100644 --- a/mutt/manifests/init.pp +++ b/mutt/manifests/init.pp @@ -29,11 +29,11 @@ class mutt { ensure => present, name => "${muttconfdir}/Muttrc.local", content => template("mutt/Muttrc.local.erb"), - mode => 0644, - owner => root, + mode => "0644", + owner => "root", group => $operatingsystem ? { - openbsd => wheel, - default => root, + openbsd => "wheel", + default => "root", }, require => Exec["add-local-mutt-config"], } diff --git a/mysql/manifests/init.pp b/mysql/manifests/init.pp index 3e43424..b51b373 100644 --- a/mysql/manifests/init.pp +++ b/mysql/manifests/init.pp @@ -26,9 +26,9 @@ class mysql::server { if $mysql_datadir { file { $mysql_datadir: ensure => directory, - mode => 0755, - owner => mysql, - group => mysql, + mode => "0755", + owner => "mysql", + group => "mysql", seltype => "mysqld_db_t", require => Package["mysql-server"], } @@ -41,9 +41,9 @@ class mysql::server { } else { file { "/srv/mysql": ensure => directory, - mode => 0755, - owner => mysql, - group => mysql, + mode => "0755", + owner => "mysql", + group => "mysql", seltype => "mysqld_db_t", require => Package["mysql-server"], } @@ -78,9 +78,9 @@ class mysql::server { source => [ "puppet:///files/mysql/my.cnf.${hostname}", "puppet:///files/mysql/my.cnf", "puppet:///modules/mysql/my.cnf", ], - mode => 0644, - owner => root, - group => root, + mode => "0644", + owner => "root", + group => "root", require => Package["mysql-server"], notify => Service["mysqld"], } @@ -88,17 +88,17 @@ class mysql::server { file { "/etc/logrotate.d/mysql": ensure => present, source => "puppet:///modules/mysql/mysql.logrotate", - mode => 0644, - owner => root, - group => root, + mode => "0644", + owner => "root", + group => "root", require => Package["mysql-server"], } file { "/var/lib/mysql": ensure => directory, - mode => 0700, - owner => mysql, - group => mysql, + mode => "0700", + owner => "mysql", + group => "mysql", require => Package["mysql-server"], } @@ -128,17 +128,17 @@ class mysql::server::backup { file { $mysql_backup_datadir: ensure => directory, - mode => 0700, - owner => root, - group => root, + mode => "0700", + owner => "root", + group => "root", } file { "/etc/cron.daily/mysql-backup": ensure => present, content => template("mysql/mysql-backup.cron.erb"), - mode => 0755, - owner => root, - group => root, + mode => "0755", + owner => "root", + group => "root", require => [ File[$mysql_backup_datadir], Package["mysql"], ], } @@ -156,18 +156,18 @@ class mysql::server::report { file { "/var/log/mysql-report": ensure => directory, - mode => 0644, - owner => root, - group => root, + mode => "0644", + owner => "root", + group => "root", require => Package["mysql-server"], } file { "/etc/cron.daily/mysql-report": ensure => present, source => "puppet:///modules/mysql/mysql-report.cron", - mode => 0755, - owner => root, - group => root, + mode => "0755", + owner => "root", + group => "root", require => File["/var/log/mysql-report"], } diff --git a/mythtv/manifests/init.pp b/mythtv/manifests/init.pp index 3d8079f..e3b5d01 100644 --- a/mythtv/manifests/init.pp +++ b/mythtv/manifests/init.pp @@ -44,7 +44,7 @@ class mythtv::backend { file { "/etc/mythtv/mysql.txt": ensure => present, content => template("mythtv/mysql.txt.erb"), - mode => 0640, + mode => "0640", owner => root, group => mythtv, notify => Service["mythbackend"], @@ -54,7 +54,7 @@ class mythtv::backend { file { "/etc/mythtv/config.xml": ensure => present, content => template("mythtv/config.xml.erb"), - mode => 0640, + mode => "0640", owner => root, group => mythtv, notify => Service["mythbackend"], @@ -64,7 +64,7 @@ class mythtv::backend { file { "/etc/sysconfig/mythbackend": ensure => present, source => "puppet:///modules/mythtv/mythbackend", - mode => 0644, + mode => "0644", owner => root, group => root, notify => Service["mythbackend"], @@ -88,7 +88,7 @@ class mythtv::backend { file { "/etc/cron.daily/mythorphans": ensure => present, source => "puppet:///modules/mythtv/mythorphans", - mode => 0755, + mode => "0755", owner => root, group => root, } @@ -109,7 +109,7 @@ class mythtv::cron inherits mythtv::backend { file { "/etc/cron.daily/mythfilldatabase": ensure => present, source => "puppet:///modules/mythtv/mythfilldatabase", - mode => 0755, + mode => "0755", owner => root, group => root, } @@ -117,7 +117,7 @@ class mythtv::cron inherits mythtv::backend { file { "/etc/cron.daily/mythoptimize": ensure => present, source => "puppet:///modules/mythtv/mythoptimize", - mode => 0755, + mode => "0755", owner => root, group => root, } @@ -159,7 +159,7 @@ class mythtv::mythweb { file { "/usr/share/mythweb/data": ensure => directory, - mode => 0770, + mode => "0770", owner => root, group => $apache::sslserver::group, seltype => "httpd_sys_rw_content_t", diff --git a/network/manifests/init.pp b/network/manifests/init.pp index d96d7f6..61fcaf8 100644 --- a/network/manifests/init.pp +++ b/network/manifests/init.pp @@ -37,7 +37,7 @@ class network::helper::debian { file { "/etc/network/interfaces.in": ensure => present, - mode => 0644, + mode => "0644", owner => root, group => root, source => "puppet:///modules/network/interfaces.in", @@ -45,7 +45,7 @@ class network::helper::debian { file { "/etc/network/interfaces.d": ensure => directory, - mode => 0644, + mode => "0644", owner => root, group => root, purge => true, @@ -66,7 +66,7 @@ class network::hostname { file { "/etc/hostname": ensure => present, content => "${homename}\n", - mode => 0644, + mode => "0644", owner => "root", group => "root", } @@ -81,7 +81,7 @@ class network::hostname { file { "/etc/myname": ensure => present, content => "${homename}\n", - mode => 0644, + mode => "0644", owner => "root", group => "wheel", } @@ -159,7 +159,7 @@ define network::interface($ipaddr = "none", $eaddr = "none", $netmask = "none", file { "/etc/hostname.${name}": ensure => present, content => template("network/hostname.if.erb"), - mode => 0600, + mode => "0600", owner => root, group => wheel, notify => Exec["restart-network"], @@ -175,7 +175,7 @@ define network::interface($ipaddr = "none", $eaddr = "none", $netmask = "none", file { "/etc/sysconfig/network-scripts/ifcfg-${name}": ensure => present, content => template("network/ifcfg-if.erb"), - mode => 0644, + mode => "0644", owner => root, group => root, notify => Exec["restart-interface-${name}"], @@ -193,7 +193,7 @@ define network::interface($ipaddr = "none", $eaddr = "none", $netmask = "none", file { "/etc/network/interfaces.d/${name}-addr.conf": ensure => present, content => template("network/interfaces-if.erb"), - mode => 0644, + mode => "0644", owner => root, group => root, notify => Exec["restart-network"], @@ -202,7 +202,7 @@ define network::interface($ipaddr = "none", $eaddr = "none", $netmask = "none", if $eaddr_real { file { "/etc/udev/rules.d/99-persistent-net-${name}.rules": ensure => present, - mode => 0644, + mode => "0644", owner => root, group => root, content => "SUBSYSTEM==\"net\", ACTION==\"add\", ATTR{address}==\"${eaddr_real}\", KERNEL==\"eth*\", NAME=\"${name}\"\n", @@ -258,7 +258,7 @@ define network::route($gateway = "", $device, $ipv6gateway = "") { file { "/etc/mygate": ensure => present, content => template("network/mygate.erb"), - mode => 0644, + mode => "0644", owner => root, group => wheel, notify => Exec["restart-network"], @@ -270,7 +270,7 @@ define network::route($gateway = "", $device, $ipv6gateway = "") { file { "/etc/network/interfaces.d/${device}-gate.conf": ensure => present, content => template("network/interfaces-gateway.erb"), - mode => 0644, + mode => "0644", owner => root, group => root, notify => Exec["restart-network"], @@ -292,7 +292,7 @@ define network::route($gateway = "", $device, $ipv6gateway = "") { file { "/etc/sysconfig/network-scripts/route-${device}": ensure => present, content => template("network/route-if.erb"), - mode => 0644, + mode => "0644", owner => "root", group => "root", notify => Exec["restart-network"], @@ -346,7 +346,7 @@ define network::carp($password, $ipaddr, $netmask, $options = []) { file { "/etc/ucarp/vip-${name}.conf": ensure => present, content => template("network/vip.conf.erb"), - mode => 0600, + mode => "0600", owner => root, group => root, require => Package["ucarp"], @@ -401,7 +401,7 @@ define network::pppoe($username, $password, $device, $authtype = "pap") { file { "/etc/hostname.${name}": ensure => present, content => template("network/hostname.pppoe.erb"), - mode => 0600, + mode => "0600", owner => root, group => wheel, notify => Exec["restart-network"], @@ -442,7 +442,7 @@ define network::trunk($devices, $mode = 0, $ipaddr = "none", $netmask = "none") file { "/etc/modprobe.d/${name}.conf": ensure => present, content => "alias ${name} bonding\noptions ${name} miimon=100 mode=${mode}\n", - mode => 0644, + mode => "0644", owner => root, group => root, } @@ -536,7 +536,7 @@ class network::manager::disable { ubuntu: { file { "/etc/init/network-manager.conf": ensure => present, - mode => 0644, + mode => "0644", owner => root, group => root, source => "puppet:///modules/network/network-manager.disabled.conf", diff --git a/networker/manifests/init.pp b/networker/manifests/init.pp index 4d2997e..7d5f323 100644 --- a/networker/manifests/init.pp +++ b/networker/manifests/init.pp @@ -6,7 +6,7 @@ class networker::client { file { [ "/nsr", "/nsr/res" ]: ensure => directory, - mode => 0755, + mode => "0755", owner => root, group => root, require => Package["lgtoclnt"], @@ -15,7 +15,7 @@ class networker::client { file { "/nsr/res/servers": ensure => present, content => template("networker/servers.erb"), - mode => 0644, + mode => "0644", owner => root, group => root, require => File["/nsr/res"], diff --git a/nfs/manifests/init.pp b/nfs/manifests/init.pp index 75b8381..b33fd25 100644 --- a/nfs/manifests/init.pp +++ b/nfs/manifests/init.pp @@ -30,7 +30,7 @@ class nfs::server inherits nfs::client { ensure => present, source => [ "puppet:///files/nfs/exports.${fqdn}", "puppet:///modules/nfs/exports", ], - mode => 0644, + mode => "0644", owner => root, group => root, require => Package["nfs-utils"], @@ -40,7 +40,7 @@ class nfs::server inherits nfs::client { file { "/etc/sysconfig/nfs": ensure => present, source => "puppet:///modules/nfs/nfs.sysconfig", - mode => 0644, + mode => "0644", owner => root, group => root, notify => Service["nfs"], diff --git a/nginx/manifests/init.pp b/nginx/manifests/init.pp index 0addb42..eac0587 100644 --- a/nginx/manifests/init.pp +++ b/nginx/manifests/init.pp @@ -25,7 +25,7 @@ class nginx { file { "/etc/nginx/nginx.conf": ensure => present, - mode => 0644, + mode => "0644", owner => "root", group => $operatingsystem ? { "openbsd" => "wheel", @@ -38,7 +38,7 @@ class nginx { file { "/etc/nginx/conf.d": ensure => directory, - mode => 0644, + mode => "0644", owner => "root", group => $operatingsystem ? { "openbsd" => "wheel", @@ -81,7 +81,7 @@ define nginx::configfile($source="", $content="") { file { "/etc/nginx/conf.d/${name}": ensure => present, - mode => 0644, + mode => "0644", owner => "root", group => $operatingsystem ? { "openbsd" => "wheel", diff --git a/ntpd/manifests/init.pp b/ntpd/manifests/init.pp index 950a1f5..74ac2f0 100644 --- a/ntpd/manifests/init.pp +++ b/ntpd/manifests/init.pp @@ -56,7 +56,7 @@ class ntpd::chrony { file { "/etc/chrony.conf": ensure => present, - mode => 0644, + mode => "0644", owner => "root", group => "root", content => template("ntpd/chrony.conf.erb"), @@ -82,7 +82,7 @@ class ntpd::isc-ntpd { file { "/etc/ntp.conf": ensure => present, - mode => 0644, + mode => "0644", owner => root, group => root, content => template("ntpd/ntp.conf.erb"), @@ -109,7 +109,7 @@ class ntpd::openntpd { file { "/etc/ntpd.conf": ensure => present, - mode => 0644, + mode => "0644", owner => root, group => wheel, content => template("ntpd/openntpd.conf.erb"), diff --git a/openvpn/manifests/init.pp b/openvpn/manifests/init.pp index d99a795..c5ce341 100644 --- a/openvpn/manifests/init.pp +++ b/openvpn/manifests/init.pp @@ -31,7 +31,7 @@ class openvpn::client { file { "/etc/openvpn/openvpn.conf": ensure => present, content => template("openvpn/openvpn.conf.erb"), - mode => 0640, + mode => "0640", owner => "root", group => "root", notify => Service["openvpn"], @@ -40,7 +40,7 @@ class openvpn::client { file { "/etc/openvpn/ta.key": ensure => present, source => "puppet:///files/openvpn/ta.key", - mode => 0640, + mode => "0640", owner => "root", group => "root", require => Package["openvpn"], @@ -48,7 +48,7 @@ class openvpn::client { file { "/etc/openvpn/ca.crt": ensure => present, source => "puppet:///files/openvpn/ca.crt", - mode => 0640, + mode => "0640", owner => "root", group => "root", require => Package["openvpn"], diff --git a/pam/manifests/init.pp b/pam/manifests/init.pp index 69e6578..02f839b 100644 --- a/pam/manifests/init.pp +++ b/pam/manifests/init.pp @@ -35,7 +35,7 @@ class pam::mkhomedir { "ubuntu": { file { "/usr/share/pam-configs/pam_mkhomedir": source => "puppet:///modules/pam/pam_mkhomedir", - mode => 0644, + mode => "0644", owner => "root", group => "root", require => Package["libpam-runtime"], diff --git a/procmail/manifests/init.pp b/procmail/manifests/init.pp index 11f203d..d5228bf 100644 --- a/procmail/manifests/init.pp +++ b/procmail/manifests/init.pp @@ -12,7 +12,7 @@ class procmail { purge => true, force => true, recurse => true, - mode => 0755, + mode => "0755", owner => "root", group => "root", source => "puppet:///modules/custom/empty", @@ -22,7 +22,7 @@ class procmail { file { "/etc/procmailrc": ensure => present, - mode => 0644, + mode => "0644", owner => "root", group => "root", require => Package["procmail"], @@ -59,7 +59,7 @@ define procmail::rc($source = "AUTO") { "AUTO" => "puppet:///files/procmail/${name}", default => $source, }, - mode => 0644, + mode => "0644", owner => root, group => root, notify => Exec["generate-procmailrc"], diff --git a/psacct/manifests/init.pp b/psacct/manifests/init.pp index c57fbb8..ac6a042 100644 --- a/psacct/manifests/init.pp +++ b/psacct/manifests/init.pp @@ -50,9 +50,9 @@ class psacct::openbsd { file { "/var/account/acct": ensure => present, - mode => 0644, - owner => root, - group => wheel, + mode => "0644", + owner => "root", + group => "wheel", notify => Exec["accton"], } diff --git a/pulseaudio/manifests/init.pp b/pulseaudio/manifests/init.pp index c68bd7b..4a63035 100644 --- a/pulseaudio/manifests/init.pp +++ b/pulseaudio/manifests/init.pp @@ -21,14 +21,14 @@ class pulseaudio::server inherits pulseaudio::common { file { "/etc/init.d/pulseaudio": ensure => present, source => "puppet:///modules/pulseaudio/pulseaudio.init", - mode => 0755, + mode => "0755", owner => root, group => root, } file { "/etc/sysconfig/pulseaudio": ensure => present, source => "puppet:///modules/pulseaudio/pulseaudio.sysconfig.${operatingsystem}", - mode => 0644, + mode => "0644", owner => root, group => root, before => File["/etc/init.d/pulseaudio"], @@ -39,7 +39,7 @@ class pulseaudio::server inherits pulseaudio::common { ensure => present, source => [ "puppet:///files/pulseaudio/system.pa.${fqdn}", "puppet:///files/pulseaudio/system.pa", ], - mode => 0644, + mode => "0644", owner => root, group => root, require => Package["pulseaudio"], diff --git a/puppet/manifests/init.pp b/puppet/manifests/init.pp index 20a1d9e..0b057a5 100644 --- a/puppet/manifests/init.pp +++ b/puppet/manifests/init.pp @@ -36,7 +36,7 @@ class puppet::client { file { "/etc/rc.d/puppetd": ensure => present, source => "puppet:///modules/puppet/puppetd.rc", - mode => 0755, + mode => "0755", owner => "root", group => "wheel", before => Service["puppet"], @@ -48,8 +48,8 @@ class puppet::client { file { "/etc/puppet/puppet.conf": ensure => present, content => template("puppet/puppet.conf.erb"), - mode => 0640, - owner => root, + mode => "0640", + owner => "root", group => $operatingsystem ? { openbsd => "_puppet", default => "puppet", @@ -82,9 +82,9 @@ class puppet::client { file { "/etc/default/puppet": ensure => present, source => "puppet:///modules/puppet/puppet.enabled.default", - mode => 0644, - owner => root, - group => root, + mode => "0644", + owner => "root", + group => "root", notify => Service["puppet"], } } @@ -101,11 +101,11 @@ class puppet::client { file { "/usr/local/sbin/puppet-check": ensure => present, source => "puppet:///modules/puppet/puppet-check", - mode => 0755, - owner => root, + mode => "0755", + owner => "root", group => $operatingsystem ? { - openbsd => wheel, - default => root, + openbsd => "wheel", + default => "root", }, } cron { "puppet-check": @@ -261,8 +261,8 @@ class puppet::server::common inherits puppet::client { if $puppet_datadir { file { $puppet_datadir: ensure => directory, - mode => 0755, - owner => root, + mode => "0755", + owner => "root", group => $operatingsystem ? { "openbsd" => "wheel", default => "root", @@ -279,8 +279,8 @@ class puppet::server::common inherits puppet::client { } else { file { "/srv/puppet": ensure => directory, - mode => 0755, - owner => root, + mode => "0755", + owner => "root", group => $operatingsystem ? { "openbsd" => "wheel", default => "root", @@ -306,7 +306,7 @@ class puppet::server::common inherits puppet::client { if $puppet_storeconfigs != "none" { file { "/srv/puppet/storeconfigs": ensure => directory, - mode => 0750, + mode => "0750", owner => $user, group => $group, seltype => "var_lib_t", @@ -317,7 +317,7 @@ class puppet::server::common inherits puppet::client { "/srv/puppet/reports", "/srv/puppet/rrd", ]: ensure => directory, - mode => 0750, + mode => "0750", owner => $user, group => $group, seltype => "var_lib_t", @@ -326,8 +326,8 @@ class puppet::server::common inherits puppet::client { file { [ "/srv/puppet/files", "/srv/puppet/templates" ]: ensure => directory, - mode => 0755, - owner => root, + mode => "0755", + owner => "root", group => $operatingsystem ? { "openbsd" => "wheel", default => "root", @@ -337,8 +337,8 @@ class puppet::server::common inherits puppet::client { } file { "/srv/puppet/files/common": ensure => directory, - mode => 0755, - owner => root, + mode => "0755", + owner => "root", group => $operatingsystem ? { "openbsd" => "wheel", default => "root", @@ -348,8 +348,8 @@ class puppet::server::common inherits puppet::client { } file { "/srv/puppet/files/private": ensure => directory, - mode => 0750, - owner => root, + mode => "0750", + owner => "root", group => $group, seltype => "var_lib_t", require => File["/srv/puppet/files"], @@ -364,8 +364,8 @@ class puppet::server::common inherits puppet::client { source => [ "puppet:///files/puppet/tagmail.conf.${fqdn}", "puppet:///files/puppet/tagmail.conf", "puppet:///modules/puppet/tagmail.conf", ], - mode => 0644, - owner => root, + mode => "0644", + owner => "root", group => $operatingsystem ? { "openbsd" => "wheel", default => "root", @@ -378,8 +378,8 @@ class puppet::server::common inherits puppet::client { source => [ "puppet:///files/puppet/fileserver.conf.${fqdn}", "puppet:///files/puppet/fileserver.conf", "puppet:///modules/puppet/fileserver.conf", ], - mode => 0644, - owner => root, + mode => "0644", + owner => "root", group => $operatingsystem ? { "openbsd" => "wheel", default => "root", @@ -394,9 +394,9 @@ class puppet::server::common inherits puppet::client { file { "/etc/cron.daily/puppet-report-cleanup": ensure => present, content => template("puppet/puppet-report-cleanup.erb"), - mode => 0755, - owner => root, - group => root, + mode => "0755", + owner => "root", + group => "root", require => File["/srv/puppet/reports"], } } @@ -405,7 +405,7 @@ class puppet::server::common inherits puppet::client { file { "/usr/local/sbin/puppet-clean-storeconfigs": ensure => present, source => "puppet:///modules/puppet/puppet-clean-storeconfigs", - mode => 0755, + mode => "0755", owner => "root", group => $operatingsystem ? { openbsd => "wheel", @@ -459,9 +459,9 @@ class puppet::server::mongrel { file { "/etc/default/puppetmaster": ensure => present, content => template("puppet/puppetmaster.default.erb"), - mode => 0644, - owner => root, - group => root, + mode => "0644", + owner => "root", + group => "root", notify => Service["puppetmaster"], } } @@ -469,9 +469,9 @@ class puppet::server::mongrel { file { "/etc/sysconfig/puppetmaster": ensure => present, content => template("puppet/puppetmaster.sysconfig.erb"), - mode => 0644, - owner => root, - group => root, + mode => "0644", + owner => "root", + group => "root", notify => Service["puppetmaster"], } } @@ -559,9 +559,9 @@ class puppet::opencollab { file { "/etc/puppet/opencollab.conf": ensure => present, - mode => 0600, - owner => root, - group => root, + mode => "0600", + owner => "root", + group => "root", content => "[creds]\nurl = ${puppet_opencollab_url}\nusername = ${puppet_opencollab_user}\npassword = ${puppet_opencollab_pass}\n", } diff --git a/rsync/manifests/init.pp b/rsync/manifests/init.pp index 6d4124b..32fc6c1 100644 --- a/rsync/manifests/init.pp +++ b/rsync/manifests/init.pp @@ -17,7 +17,7 @@ class rsync::run-rsync { ensure => present, source => [ "puppet:///files/run-rsync/${homename}-RunRsyncConfig.pm", "/etc/run-rsync/RunRsyncConfig.pm", ], - mode => 0644, + mode => "0644", owner => "root", group => "root", } diff --git a/samba/manifests/init.pp b/samba/manifests/init.pp index 2285fe8..2d23b2d 100644 --- a/samba/manifests/init.pp +++ b/samba/manifests/init.pp @@ -61,11 +61,11 @@ class samba::server { ensure => present, source => [ "puppet:///files/samba/smb.conf.${fqdn}", "puppet:///files/samba/smb.conf", ], - mode => 0644, - owner => root, + mode => "0644", + owner => "root", group => $operatingsystem ? { - openbsd => wheel, - default => root, + openbsd => "wheel", + default => "root", }, require => Package["samba"], } @@ -75,11 +75,11 @@ class samba::server { source => [ "puppet:///files/samba/lmhosts.${fqdn}", "puppet:///files/samba/lmhosts", "puppet:///modules/samba/lmhosts", ], - mode => 0644, - owner => root, + mode => "0644", + owner => "root", group => $operatingsystem ? { - openbsd => wheel, - default => root, + openbsd => "wheel", + default => "root", }, require => Package["samba"], } @@ -96,9 +96,9 @@ class samba::bdc { file { "/etc/cron.hourly/sync-netlogon.sh": ensure => present, source => "puppet:///modules/samba/sync-netlogon.sh", - mode => 0755, - owner => root, - group => root, + mode => "0755", + owner => "root", + group => "root", } } diff --git a/saslauthd/manifests/init.pp b/saslauthd/manifests/init.pp index 10b483a..d5e60a8 100644 --- a/saslauthd/manifests/init.pp +++ b/saslauthd/manifests/init.pp @@ -14,9 +14,9 @@ class saslauthd::server { file { "/etc/sasldb2": ensure => present, - mode => 0644, - owner => root, - group => root, + mode => "0644", + owner => "root", + group => "root", require => Exec["generate-sasldb2"], } exec { "generate-sasldb2": @@ -54,9 +54,9 @@ define saslauthd::service() { "puppet:///files/saslauthd/${name}.conf", "puppet:///files/saslauthd/service.conf", "puppet:///modules/saslauthd/service.conf", ], - mode => 0644, - owner => root, - group => root, + mode => "0644", + owner => "root", + group => "root", require => Service["saslauthd"], } diff --git a/selinux/manifests/init.pp b/selinux/manifests/init.pp index 68b275d..aa33a80 100644 --- a/selinux/manifests/init.pp +++ b/selinux/manifests/init.pp @@ -30,9 +30,9 @@ class selinux { file { "/etc/selinux/config": ensure => present, content => template("selinux/config.erb"), - mode => 0644, - owner => root, - group => root, + mode => "0644", + owner => "root", + group => "root", require => Package["selinux-policy-targeted"], notify => Exec["set-selinux-mode"], } diff --git a/sendmail/manifests/init.pp b/sendmail/manifests/init.pp index 56a22d9..4edba7b 100644 --- a/sendmail/manifests/init.pp +++ b/sendmail/manifests/init.pp @@ -25,7 +25,7 @@ class sendmail::common { content => "DAEMON=no\nQUEUE=1h\n", owner => "root", group => "root", - mode => 0644, + mode => "0644", notify => Service["sendmail"], } } @@ -59,7 +59,7 @@ class sendmail::client inherits sendmail::common { "openbsd" => "bin", default => "root", }, - mode => 0644, + mode => "0644", notify => Exec["make submit.cf"], require => $operatingsystem ? { "openbsd" => undef, @@ -88,7 +88,7 @@ class sendmail::client inherits sendmail::common { "ubuntu" => "smmsp", default => "root", }, - mode => 0644, + mode => "0644", source => $operatingsystem ? { "openbsd" => "/usr/share/sendmail/cf/submit.cf", default => undef, @@ -141,7 +141,7 @@ class sendmail::server inherits sendmail::common { content => template("sendmail/sendmail.mc.erb"), owner => "root", group => $group, - mode => 0644, + mode => "0644", notify => Exec["make sendmail.cf"], } @@ -150,7 +150,7 @@ class sendmail::server inherits sendmail::common { notify => Exec["newaliases"], owner => "root", group => $group, - mode => 0644, + mode => "0644", } exec { "make sendmail.cf": @@ -170,7 +170,7 @@ class sendmail::server inherits sendmail::common { ensure => present, owner => "root", group => $group, - mode => 0644, + mode => "0644", source => $operatingsystem ? { openbsd => "/usr/share/sendmail/cf/sendmail.cf", default => undef, diff --git a/ssh/manifests/init.pp b/ssh/manifests/init.pp index dd2b5a1..8bacbf3 100644 --- a/ssh/manifests/init.pp +++ b/ssh/manifests/init.pp @@ -4,7 +4,7 @@ class ssh::known_hosts { file { "/etc/ssh/ssh_known_hosts": ensure => present, - mode => 0644, + mode => "0644", owner => root, group => $operatingsystem ? { OpenBSD => wheel, @@ -32,7 +32,7 @@ class ssh::hostkeys { file { "/etc/ssh/ssh_host_dsa_key": ensure => present, source => "puppet:///private/ssh_host_dsa_key", - mode => 0600, + mode => "0600", owner => root, group => $operatingsystem ? { openbsd => wheel, @@ -42,7 +42,7 @@ class ssh::hostkeys { file { "/etc/ssh/ssh_host_dsa_key.pub": ensure => present, source => "puppet:///private/ssh_host_dsa_key.pub", - mode => 0644, + mode => "0644", owner => root, group => $operatingsystem ? { openbsd => wheel, @@ -53,7 +53,7 @@ class ssh::hostkeys { file { "/etc/ssh/ssh_host_rsa_key": ensure => present, source => "puppet:///private/ssh_host_rsa_key", - mode => 0600, + mode => "0600", owner => root, group => $operatingsystem ? { openbsd => wheel, @@ -63,7 +63,7 @@ class ssh::hostkeys { file { "/etc/ssh/ssh_host_rsa_key.pub": ensure => present, source => "puppet:///private/ssh_host_rsa_key.pub", - mode => 0644, + mode => "0644", owner => root, group => $operatingsystem ? { openbsd => wheel, @@ -74,7 +74,7 @@ class ssh::hostkeys { file { "/etc/ssh/ssh_host_key": ensure => present, source => "puppet:///private/ssh_host_key", - mode => 0600, + mode => "0600", owner => root, group => $operatingsystem ? { openbsd => wheel, @@ -84,7 +84,7 @@ class ssh::hostkeys { file { "/etc/ssh/ssh_host_key.pub": ensure => present, source => "puppet:///private/ssh_host_key.pub", - mode => 0644, + mode => "0644", owner => root, group => $operatingsystem ? { openbsd => wheel, @@ -112,7 +112,7 @@ class ssh::disable { } file { "/etc/init/ssh.conf": ensure => present, - mode => 0644, + mode => "0644", owner => root, group => root, source => "puppet:///modules/ssh/ssh.disabled.conf", diff --git a/sudo/manifests/init.pp b/sudo/manifests/init.pp index 350885e..3c3b322 100644 --- a/sudo/manifests/init.pp +++ b/sudo/manifests/init.pp @@ -11,7 +11,7 @@ class sudo { file { "/etc/sudoers.d": ensure => directory, - mode => 0440, + mode => "0440", owner => "root", group => $operatingsystem ? { "openbsd" => "wheel", @@ -25,7 +25,7 @@ class sudo { file { "/etc/sudoers": ensure => present, - mode => 0440, + mode => "0440", owner => "root", group => $operatingsystem ? { "openbsd" => "wheel", @@ -54,7 +54,7 @@ define sudo::sudoer($where="ALL", $as_whom="ALL", $what="ALL") { file { "/etc/sudoers.d/${name}": ensure => present, - mode => 0440, + mode => "0440", owner => "root", group => $operatingsystem ? { "openbsd" => "wheel", diff --git a/svn/manifests/init.pp b/svn/manifests/init.pp index 4b58b16..5ee538c 100644 --- a/svn/manifests/init.pp +++ b/svn/manifests/init.pp @@ -8,7 +8,7 @@ class svn::client { file { "/etc/subversion/servers": ensure => present, - mode => 0644, + mode => "0644", owner => root, group => root, content => template("svn/servers.erb"), diff --git a/syslog/manifests/init.pp b/syslog/manifests/init.pp index dde2166..76d75f0 100644 --- a/syslog/manifests/init.pp +++ b/syslog/manifests/init.pp @@ -40,7 +40,7 @@ class syslog::common { "linux": { file { "/etc/logrotate.d/syslog.all": ensure => present, - mode => 0644, + mode => "0644", owner => "root", group => "root", content => template("syslog/logrotate.erb"), @@ -92,7 +92,7 @@ class syslog::client::syslogd { file { "/var/log/all.log": ensure => present, - mode => 0640, + mode => "0640", owner => "root", group => $group, notify => Service["syslogd"], @@ -102,7 +102,7 @@ class syslog::client::syslogd { ensure => present, content => template("syslog/syslog.conf.$operatingsystem.erb", "syslog/syslog.conf.client.erb"), - mode => 0644, + mode => "0644", owner => "root", group => $operatingsystem ? { "openbsd" => "wheel", @@ -151,7 +151,7 @@ class syslog::client::rsyslog { content => template("syslog/rsyslog.conf.erb", "syslog/syslog.conf.$operatingsystem.erb", "syslog/syslog.conf.client.erb"), - mode => 0644, + mode => "0644", owner => "root", group => $operatingsystem ? { "openbsd" => "wheel", @@ -176,7 +176,7 @@ class syslog::client::rsyslog { if $operatingsystem == "OpenBSD" and $operatingsystemrelease !~ /4\.[1-8]/ { file { "/etc/rc.d/syslogd": ensure => present, - mode => 0555, + mode => "0555", owner => "root", group => "wheel", source => "puppet:///modules/syslog/rsyslogd.rc", @@ -203,7 +203,7 @@ class syslog::common::standalone inherits syslog::common { if $syslog_datadir { file { $syslog_datadir: ensure => directory, - mode => 2750, + mode => "2750", owner => "root", group => $group, seltype => "var_log_t", @@ -219,7 +219,7 @@ class syslog::common::standalone inherits syslog::common { } else { file { "/srv/log": ensure => directory, - mode => 2750, + mode => "2750", owner => "root", group => $group, seltype => "var_log_t", @@ -228,7 +228,7 @@ class syslog::common::standalone inherits syslog::common { file { "/srv/log/archive": ensure => directory, - mode => 2750, + mode => "2750", owner => "root", group => $group, require => File["/srv/log"], @@ -256,7 +256,7 @@ class syslog::common::standalone inherits syslog::common { file { "/usr/local/sbin/logarchiver.sh": ensure => present, source => "puppet:///modules/syslog/logarchiver.sh", - mode => 0755, + mode => "0755", owner => "root", group => $operatingsystem ? { "openbsd" => "wheel", diff --git a/tftp/manifests/init.pp b/tftp/manifests/init.pp index 9c49f88..a1ee8fc 100644 --- a/tftp/manifests/init.pp +++ b/tftp/manifests/init.pp @@ -11,8 +11,8 @@ class tftp::server { if $tftp_datadir { file { $tftp_datadir: ensure => directory, - mode => 0755, - owner => root, + mode => "0755", + owner => "root", group => $operatingsystem ? { openbsd => "wheel", default => "root", @@ -28,7 +28,7 @@ class tftp::server { } else { file { "/srv/tftpboot": ensure => directory, - mode => 0755, + mode => "0755", owner => "root", group => $operatingsystem ? { "openbsd" => "wheel", diff --git a/time/manifests/init.pp b/time/manifests/init.pp index d69fe9d..a54be62 100644 --- a/time/manifests/init.pp +++ b/time/manifests/init.pp @@ -17,7 +17,7 @@ class time::server { class time::zone { file { "/etc/localtime": ensure => present, - mode => 0644, + mode => "0644", source => "/usr/share/zoneinfo/$timezone_set" } @@ -25,14 +25,14 @@ class time::zone { centos,redhat: { file { "/etc/sysconfig/clock": ensure => present, - mode => 0644, + mode => "0644", content => template("time/sysconfig_clock.erb"), } } ubuntu: { file { "/etc/timezone": ensure => present, - mode => 0644, + mode => "0644", content => "$timezone_set\n", } } diff --git a/user/manifests/init.pp b/user/manifests/init.pp index 28270b1..82d8288 100644 --- a/user/manifests/init.pp +++ b/user/manifests/init.pp @@ -4,7 +4,7 @@ class user::system { file { "/var/empty": ensure => directory, - mode => 0755, + mode => "0755", owner => "root", group => $operatingsystem ? { "openbsd" => "wheel", diff --git a/util/manifests/init.pp b/util/manifests/init.pp index 20c01ff..ac34316 100644 --- a/util/manifests/init.pp +++ b/util/manifests/init.pp @@ -37,7 +37,7 @@ define util::extract::tar($source, $ensure=present, $strip=0, $preserve=false) { file { $name: ensure => directory, - mode => 0755, + mode => "0755", owner => "root", group => $operatingsystem ? { "openbsd" => "wheel", @@ -106,7 +106,7 @@ define util::extract::zip($source, $ensure=present) { file { $name: ensure => directory, - mode => 0755, + mode => "0755", owner => root, group => root, } diff --git a/vmware/manifests/init.pp b/vmware/manifests/init.pp index 7b60f63..83fdfdc 100644 --- a/vmware/manifests/init.pp +++ b/vmware/manifests/init.pp @@ -15,7 +15,7 @@ define vmware::bundle() { ensure => present, source => "puppet:///files/packages/${name}.${architecture}.bundle", links => follow, - mode => 0755, + mode => "0755", owner => root, group => root, } diff --git a/vmware/manifests/server.pp b/vmware/manifests/server.pp index a41d7bd..b40928e 100644 --- a/vmware/manifests/server.pp +++ b/vmware/manifests/server.pp @@ -40,7 +40,7 @@ class vmware::server { if $vmware_admin_group { file { "/etc/vmware/ssl/rui.key": ensure => present, - mode => 0640, + mode => "0640", owner => root, group => $vmware_admin_group, require => [ Service["vmware"], @@ -76,7 +76,7 @@ class vmware::server::scripts { file { "/usr/local/sbin/${name}": ensure => present, source => "puppet:///modules/vmware/scripts/${name}", - mode => 0755, + mode => "0755", owner => root, group => root, } @@ -85,7 +85,7 @@ class vmware::server::scripts { file { "/usr/local/lib/vmware.sh": ensure => present, source => "puppet:///modules/vmware/scripts/vmware.sh", - mode => 0644, + mode => "0644", owner => root, group => root, } @@ -113,14 +113,14 @@ class vmware::server::vmfs { file { "/vmfs": ensure => directory, - mode => 0755, + mode => "0755", owner => root, group => root, require => Package["VMware-server"], } file { "/vmfs/volumes": ensure => directory, - mode => 0755, + mode => "0755", owner => root, group => root, require => File["/vmfs"], @@ -176,8 +176,8 @@ define vmware::server::datastore($device, $type = "auto", $options = "defaults") file { "/vmfs/volumes/${name}": ensure => directory, mode => $fstype ? { - nfs => 0755, - default => 0775, + nfs => "0755", + default => "0775", }, owner => root, group => $fstype ? { diff --git a/vsroom/manifests/init.pp b/vsroom/manifests/init.pp index d6e343c..48d9915 100644 --- a/vsroom/manifests/init.pp +++ b/vsroom/manifests/init.pp @@ -25,7 +25,7 @@ class vsroom { file { "/usr/local/src/vsroom.tar.gz": ensure => present, - mode => 0644, + mode => "0644", owner => "root", group => "root", source => "puppet:///files/packages/${vsroom_package}", @@ -46,7 +46,7 @@ class vsroom { if $vsroom_datadir { file { $vsroom_datadir: ensure => directory, - mode => 0750, + mode => "0750", owner => "root", group => "vsroom", } @@ -59,7 +59,7 @@ class vsroom { } else { file { "/var/lib/vsroom": ensure => directory, - mode => 0750, + mode => "0750", owner => "root", group => "vsroom", } @@ -72,7 +72,7 @@ class vsroom { file { "${htdocs}/config.json": ensure => present, - mode => 0644, + mode => "0644", owner => "root", group => "root", source => [ "puppet:///files/vsroom/config.json.${fqdn}", diff --git a/wiki/manifests/init.pp b/wiki/manifests/init.pp index 87ca53f..338f2a9 100644 --- a/wiki/manifests/init.pp +++ b/wiki/manifests/init.pp @@ -14,17 +14,17 @@ class wiki::moin { file { "/usr/local/src/moin.tar.gz": ensure => present, - mode => 0644, - owner => root, - group => root, + mode => "0644", + owner => "root", + group => "root", source => "puppet:///files/packages/${moin_package}", links => follow, } file { "/usr/local/src/moin.patch": ensure => present, - mode => 0644, - owner => root, - group => root, + mode => "0644", + owner => "root", + group => "root", source => "puppet:///files/packages/${moin_patch}", links => follow, } @@ -49,7 +49,7 @@ class wiki::moin { file { "${shared}/htdocs/.htaccess": ensure => present, - mode => 0644, + mode => "0644", owner => "root", group => "root", content => "SetHandler None\n", @@ -73,7 +73,7 @@ class wiki::graphingwiki::common { file { "/usr/local/src/graphingwiki.tar.gz": ensure => directory, - mode => 0644, + mode => "0644", owner => "root", group => $operatingsystem ? { "openbsd" => "wheel", @@ -173,9 +173,9 @@ class wiki::collab::base { if $wiki_datadir { file { $wiki_datadir: ensure => directory, - mode => 0755, - owner => root, - group => root, + mode => "0755", + owner => "root", + group => "root", } file { "/srv/wikis": @@ -186,9 +186,9 @@ class wiki::collab::base { } else { file { "/srv/wikis": ensure => directory, - mode => 0755, - owner => root, - group => root, + mode => "0755", + owner => "root", + group => "root", } } @@ -204,9 +204,9 @@ class wiki::collab::base { "/srv/wikis/collab/wikis", "/srv/wikis/collab/run", ]: ensure => directory, - mode => 2660, - owner => collab, - group => collab, + mode => "2660", + owner => "collab", + group => "collab", require => [ File["/srv/wikis"], User["collab"], Group["collab"], Python::Setup::Install["/usr/local/src/graphingwiki/collab"], Python::Setup::Install["/usr/local/src/moin"], ], @@ -223,9 +223,9 @@ class wiki::collab::base { file { "/srv/wikis/collab/config/collabfarm.py": ensure => present, - mode => 0660, - owner => collab, - group => collab, + mode => "0660", + owner => "collab", + group => "collab", source => [ "puppet:///private/wiki/collabfarm.py", "puppet:///files/wiki/collabfarm.py", "/usr/local/src/graphingwiki/collab/config/collabfarm.py", ], @@ -235,9 +235,9 @@ class wiki::collab::base { file { "/srv/wikis/collab/config/intermap.txt": ensure => present, - mode => 0660, - owner => collab, - group => collab, + mode => "0660", + owner => "collab", + group => "collab", source => "/usr/local/src/graphingwiki/collab/config/intermap.txt", replace => false, require => File["/srv/wikis/collab/config"], @@ -245,9 +245,9 @@ class wiki::collab::base { file { "/srv/wikis/collab/config/logging.conf": ensure => present, - mode => 0660, - owner => collab, - group => collab, + mode => "0660", + owner => "collab", + group => "collab", source => "/usr/local/src/graphingwiki/collab/config/logging.conf", replace => false, require => File["/srv/wikis/collab/config"], @@ -255,9 +255,9 @@ class wiki::collab::base { file { "/srv/wikis/collab/htdocs/.htaccess": ensure => present, - mode => 0660, - owner => collab, - group => collab, + mode => "0660", + owner => "collab", + group => "collab", source => "puppet:///modules/wiki/htaccess", replace => false, require => File["/srv/wikis/collab/htdocs"], @@ -265,9 +265,9 @@ class wiki::collab::base { file { [ "/etc/local", "/etc/local/collab" ]: ensure => directory, - mode => 0755, - owner => root, - group => root, + mode => "0755", + owner => "root", + group => "root", } if $collab_jabberdomain and !$collab_conferencedomain { @@ -276,9 +276,9 @@ class wiki::collab::base { file { "/etc/local/collab/collab.ini": ensure => present, - mode => 0644, - owner => root, - group => root, + mode => "0644", + owner => "root", + group => "root", content => template("wiki/collab.ini.erb"), require => File["/etc/local/collab"], } diff --git a/yum/manifests/init.pp b/yum/manifests/init.pp index f15a61d..c73a999 100644 --- a/yum/manifests/init.pp +++ b/yum/manifests/init.pp @@ -12,9 +12,9 @@ class yum::updatesd { source => [ "puppet:///files/yum/yum-updatesd.conf.${fqdn}", "puppet:///files/yum/yum-updatesd.conf", "puppet:///modules/yum/yum-updatesd.conf", ], - mode => 0644, - owner => root, - group => root, + mode => "0644", + owner => "root", + group => "root", notify => Service["yum-updatesd"], } @@ -121,7 +121,7 @@ define yum::repo($baseurl="", $mirrorlist="", $descr="", $gpgkey="") { file { "/etc/pki/rpm-gpg/RPM-GPG-KEY-${name}": ensure => present, source => $gpgkey, - mode => 0644, + mode => "0644", owner => "root", group => "root", before => File["/etc/yum.repos.d/${name}.repo"], @@ -140,7 +140,7 @@ define yum::repo($baseurl="", $mirrorlist="", $descr="", $gpgkey="") { file { "/etc/yum.repos.d/${name}.repo": ensure => present, content => template("yum/yum.repo.erb"), - mode => 0644, + mode => "0644", owner => "root", group => "root", }