Fixed "unquoted file mode" errors given by puppet-lint.
This commit is contained in:
parent
17341ec85c
commit
84edcd61ed
64 changed files with 512 additions and 512 deletions
|
@ -42,7 +42,7 @@ class abusehelper {
|
|||
|
||||
file { "/usr/local/src/abusehelper.tar.gz":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
"openbsd" => "wheel",
|
||||
|
@ -60,7 +60,7 @@ class abusehelper {
|
|||
}
|
||||
file { "/usr/local/src/idiokit.tar.gz":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
"openbsd" => "wheel",
|
||||
|
@ -86,7 +86,7 @@ class abusehelper {
|
|||
if $abusehelper_datadir {
|
||||
file { $abusehelper_datadir:
|
||||
ensure => directory,
|
||||
mode => 0750,
|
||||
mode => "0750",
|
||||
owner => "root",
|
||||
group => "abusehel",
|
||||
require => User["abusehel"],
|
||||
|
@ -100,7 +100,7 @@ class abusehelper {
|
|||
} else {
|
||||
file { "/var/lib/ah2":
|
||||
ensure => directory,
|
||||
mode => 0750,
|
||||
mode => "0750",
|
||||
owner => "root",
|
||||
group => "abusehel",
|
||||
require => User["abusehel"],
|
||||
|
|
|
@ -21,9 +21,9 @@ class alpine {
|
|||
file { "/etc/pine.conf.fixed":
|
||||
ensure => present,
|
||||
content => template("alpine/pine.conf.fixed.erb"),
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
require => Package["alpine"],
|
||||
}
|
||||
|
||||
|
|
|
@ -2,16 +2,16 @@ class amanda::common {
|
|||
|
||||
file { "/var/lib/amanda/.ssh":
|
||||
ensure => directory,
|
||||
mode => 0700,
|
||||
owner => amandabackup,
|
||||
group => disk,
|
||||
mode => "0700",
|
||||
owner => "amandabackup",
|
||||
group => "disk",
|
||||
}
|
||||
|
||||
file { "/var/lib/amanda/.ssh/authorized_keys":
|
||||
ensure => present,
|
||||
mode => 0600,
|
||||
owner => amandabackup,
|
||||
group => disk,
|
||||
mode => "0600",
|
||||
owner => "amandabackup",
|
||||
group => "disk",
|
||||
require => File["/var/lib/amanda/.ssh"],
|
||||
}
|
||||
|
||||
|
@ -45,9 +45,9 @@ class amanda::client inherits amanda::common {
|
|||
|
||||
file { "/etc/amanda/amanda-client.conf":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
owner => amandabackup,
|
||||
group => disk,
|
||||
mode => "0644",
|
||||
owner => "amandabackup",
|
||||
group => "disk",
|
||||
content => template("amanda/amanda-client.conf.erb"),
|
||||
require => Package["amanda-enterprise-backup-client"],
|
||||
}
|
||||
|
|
|
@ -14,7 +14,7 @@ class apache::debian::common {
|
|||
"/etc/apache2/conf.d",
|
||||
"/etc/apache2/sites-enabled", ]:
|
||||
ensure => directory,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
require => Package["httpd"],
|
||||
|
@ -31,7 +31,7 @@ class apache::debian::common {
|
|||
file { "/etc/apache2/envvars":
|
||||
ensure => present,
|
||||
content => template("apache/apache2.envvars.erb"),
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
before => File["/etc/apache2/apache2.conf"],
|
||||
|
@ -42,7 +42,7 @@ class apache::debian::common {
|
|||
file { "/etc/apache2/httpd.conf":
|
||||
ensure => present,
|
||||
content => template("apache/apache2.httpd.conf.erb"),
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
before => File["/etc/apache2/apache2.conf"],
|
||||
|
@ -53,7 +53,7 @@ class apache::debian::common {
|
|||
file { "/etc/apache2/ports.conf":
|
||||
ensure => present,
|
||||
content => "# HTTP server disabled\n",
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
before => File["/etc/apache2/apache2.conf"],
|
||||
|
@ -64,7 +64,7 @@ class apache::debian::common {
|
|||
file { "/etc/apache2/apache2.conf":
|
||||
ensure => present,
|
||||
content => template("apache/apache2.conf.erb"),
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
notify => Service["apache2"],
|
||||
|
@ -109,7 +109,7 @@ define apache::debian::site($aliases, $root, $redirect) {
|
|||
} else {
|
||||
file { "/srv/www/http/${site_fqdn}":
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
before => File[$site_conf],
|
||||
|
@ -118,7 +118,7 @@ define apache::debian::site($aliases, $root, $redirect) {
|
|||
|
||||
file { "/srv/www/log/http/${site_fqdn}":
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
before => File[$site_conf],
|
||||
|
@ -128,7 +128,7 @@ define apache::debian::site($aliases, $root, $redirect) {
|
|||
|
||||
file { $site_conf:
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
notify => Service["apache2"],
|
||||
|
@ -144,7 +144,7 @@ define apache::debian::site($aliases, $root, $redirect) {
|
|||
}
|
||||
file { $site_confdir:
|
||||
ensure => directory,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
purge => true,
|
||||
|
@ -168,7 +168,7 @@ class apache::debian::sslserver inherits apache::debian::common {
|
|||
"/srv/www/log/https",
|
||||
"/srv/www/log/https/${homename}", ]:
|
||||
ensure => directory,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
require => Package["httpd"],
|
||||
|
@ -196,7 +196,7 @@ define apache::debian::sslsite($ipaddr, $root, $ssl_cert, $ssl_key, $ssl_chain)
|
|||
} else {
|
||||
file { "/srv/www/https/${site_fqdn}":
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
before => Service["apache2"],
|
||||
|
@ -205,7 +205,7 @@ define apache::debian::sslsite($ipaddr, $root, $ssl_cert, $ssl_key, $ssl_chain)
|
|||
|
||||
file { "/srv/www/log/https/${site_fqdn}":
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
before => Service["apache2"],
|
||||
|
@ -221,7 +221,7 @@ define apache::debian::sslsite($ipaddr, $root, $ssl_cert, $ssl_key, $ssl_chain)
|
|||
file { "/etc/ssl/certs/${site_fqdn}.crt":
|
||||
ensure => present,
|
||||
source => $real_ssl_cert,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
notify => Service["apache2"],
|
||||
|
@ -236,7 +236,7 @@ define apache::debian::sslsite($ipaddr, $root, $ssl_cert, $ssl_key, $ssl_chain)
|
|||
file { "/etc/ssl/private/${site_fqdn}.key":
|
||||
ensure => present,
|
||||
source => $real_ssl_key,
|
||||
mode => 0600,
|
||||
mode => "0600",
|
||||
owner => root,
|
||||
group => root,
|
||||
notify => Service["apache2"],
|
||||
|
@ -246,7 +246,7 @@ define apache::debian::sslsite($ipaddr, $root, $ssl_cert, $ssl_key, $ssl_chain)
|
|||
file { "/etc/ssl/certs/${site_fqdn}.chain.crt":
|
||||
ensure => present,
|
||||
source => $ssl_chain,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
notify => Service["apache2"],
|
||||
|
@ -259,7 +259,7 @@ define apache::debian::sslsite($ipaddr, $root, $ssl_cert, $ssl_key, $ssl_chain)
|
|||
file { $site_conf:
|
||||
ensure => present,
|
||||
content => template("apache/site.https.conf.erb"),
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
notify => Service["apache2"],
|
||||
|
@ -269,7 +269,7 @@ define apache::debian::sslsite($ipaddr, $root, $ssl_cert, $ssl_key, $ssl_chain)
|
|||
|
||||
file { $site_confdir:
|
||||
ensure => directory,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
purge => true,
|
||||
|
@ -288,7 +288,7 @@ define apache::debian::configfile($source, $content, $http, $https) {
|
|||
|
||||
file { "/etc/apache2/conf.d/${name}":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
notify => Service["apache2"],
|
||||
|
@ -334,7 +334,7 @@ define apache::debian::a2enmod($source="", $content="") {
|
|||
|
||||
if $source or $content {
|
||||
file { "/etc/apache2/mods-available/${name}.conf":
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
notify => Service["apache2"],
|
||||
|
|
|
@ -23,7 +23,7 @@ class apache::common {
|
|||
if $apache_datadir {
|
||||
file { $apache_datadir:
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
seltype => "httpd_sys_content_t",
|
||||
|
@ -37,7 +37,7 @@ class apache::common {
|
|||
} else {
|
||||
file { "/srv/www":
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
}
|
||||
|
@ -45,7 +45,7 @@ class apache::common {
|
|||
|
||||
file { "/srv/www/log":
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
require => File["/srv/www"],
|
||||
|
@ -72,7 +72,7 @@ class apache::common {
|
|||
file { "/usr/local/sbin/www-logrotate.sh":
|
||||
ensure => present,
|
||||
source => "puppet:///modules/apache/www-logrotate.sh",
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
seluser => "system_u",
|
||||
|
@ -697,7 +697,7 @@ class apache::webalizer {
|
|||
"/srv/www/webalizer/html/https",
|
||||
"/srv/www/webalizer/html", ]:
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => $operatingsystem ? {
|
||||
debian => root,
|
||||
ubuntu => root,
|
||||
|
@ -711,7 +711,7 @@ class apache::webalizer {
|
|||
"/etc/webalizer/http",
|
||||
"/etc/webalizer/https", ]:
|
||||
ensure => directory,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
}
|
||||
|
@ -741,7 +741,7 @@ class apache::webalizer {
|
|||
file { "/usr/local/sbin/www-webalizer.sh":
|
||||
ensure => present,
|
||||
source => "puppet:///modules/apache/www-webalizer.sh",
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
require => Package["webalizer"],
|
||||
|
@ -770,7 +770,7 @@ define apache::webalizer::site($site_proto, $site_fqdn) {
|
|||
|
||||
@file { "/etc/webalizer/${name}.conf":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
content => template("apache/webalizer.conf.erb"),
|
||||
|
@ -781,7 +781,7 @@ define apache::webalizer::site($site_proto, $site_fqdn) {
|
|||
@file { [ "/srv/www/webalizer/history/${name}",
|
||||
"/srv/www/webalizer/html/${name}", ]:
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => $operatingsystem ? {
|
||||
debian => root,
|
||||
ubuntu => root,
|
||||
|
|
|
@ -7,7 +7,7 @@ class apache::redhat::server {
|
|||
"/srv/www/log/http",
|
||||
"/srv/www/log/http/${homename}", ]:
|
||||
ensure => directory,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
require => Package["httpd"],
|
||||
|
@ -24,7 +24,7 @@ class apache::redhat::server {
|
|||
file { "/etc/httpd/conf/httpd.conf":
|
||||
ensure => present,
|
||||
content => template("apache/httpd.conf.erb"),
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
require => Package["httpd"],
|
||||
|
@ -62,7 +62,7 @@ define apache::redhat::site($aliases, $root, $redirect) {
|
|||
} else {
|
||||
file { "/srv/www/http/${site_fqdn}":
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
before => File[$site_conf],
|
||||
|
@ -71,7 +71,7 @@ define apache::redhat::site($aliases, $root, $redirect) {
|
|||
|
||||
file { "/srv/www/log/http/${site_fqdn}":
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
before => File[$site_conf],
|
||||
|
@ -81,7 +81,7 @@ define apache::redhat::site($aliases, $root, $redirect) {
|
|||
|
||||
file { $site_conf:
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
notify => Service["httpd"],
|
||||
|
@ -97,7 +97,7 @@ define apache::redhat::site($aliases, $root, $redirect) {
|
|||
}
|
||||
file { $site_confdir:
|
||||
ensure => directory,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
purge => true,
|
||||
|
@ -126,7 +126,7 @@ class apache::redhat::sslserver {
|
|||
"/srv/www/log/https",
|
||||
"/srv/www/log/https/${homename}", ]:
|
||||
ensure => directory,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
require => Package["httpd"],
|
||||
|
@ -142,7 +142,7 @@ class apache::redhat::sslserver {
|
|||
|
||||
file { "/etc/httpd/conf/httpsd.conf":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
content => template("apache/httpsd.conf.erb"),
|
||||
|
@ -153,7 +153,7 @@ class apache::redhat::sslserver {
|
|||
file { "/etc/init.d/httpsd":
|
||||
ensure => present,
|
||||
source => "puppet:///modules/apache/httpsd",
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
}
|
||||
|
@ -197,7 +197,7 @@ define apache::redhat::sslsite($ipaddr, $root, $ssl_cert, $ssl_key, $ssl_chain)
|
|||
} else {
|
||||
file { "/srv/www/https/${site_fqdn}":
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
before => Service["httpsd"],
|
||||
|
@ -206,7 +206,7 @@ define apache::redhat::sslsite($ipaddr, $root, $ssl_cert, $ssl_key, $ssl_chain)
|
|||
|
||||
file { "/srv/www/log/https/${site_fqdn}":
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
before => Service["httpsd"],
|
||||
|
@ -222,7 +222,7 @@ define apache::redhat::sslsite($ipaddr, $root, $ssl_cert, $ssl_key, $ssl_chain)
|
|||
file { "/etc/pki/tls/certs/${site_fqdn}.crt":
|
||||
ensure => present,
|
||||
source => $real_ssl_cert,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
notify => Service["httpsd"],
|
||||
|
@ -237,7 +237,7 @@ define apache::redhat::sslsite($ipaddr, $root, $ssl_cert, $ssl_key, $ssl_chain)
|
|||
file { "/etc/pki/tls/private/${site_fqdn}.key":
|
||||
ensure => present,
|
||||
source => $real_ssl_key,
|
||||
mode => 0600,
|
||||
mode => "0600",
|
||||
owner => root,
|
||||
group => root,
|
||||
notify => Service["httpsd"],
|
||||
|
@ -247,7 +247,7 @@ define apache::redhat::sslsite($ipaddr, $root, $ssl_cert, $ssl_key, $ssl_chain)
|
|||
file { "/etc/pki/tls/certs/${site_fqdn}.chain.crt":
|
||||
ensure => present,
|
||||
source => $ssl_chain,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
notify => Service["httpsd"],
|
||||
|
@ -260,7 +260,7 @@ define apache::redhat::sslsite($ipaddr, $root, $ssl_cert, $ssl_key, $ssl_chain)
|
|||
file { $site_conf:
|
||||
ensure => present,
|
||||
content => template("apache/site.https.conf.erb"),
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
notify => Service["httpsd"],
|
||||
|
@ -270,7 +270,7 @@ define apache::redhat::sslsite($ipaddr, $root, $ssl_cert, $ssl_key, $ssl_chain)
|
|||
|
||||
file { $site_confdir:
|
||||
ensure => directory,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
purge => true,
|
||||
|
@ -293,7 +293,7 @@ define apache::redhat::configfile($source, $content, $http, $https) {
|
|||
true => present,
|
||||
default => absent,
|
||||
},
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
notify => Service["httpd"],
|
||||
|
@ -326,7 +326,7 @@ define apache::redhat::configfile($source, $content, $http, $https) {
|
|||
true => present,
|
||||
default => absent,
|
||||
},
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
notify => Service["httpsd"],
|
||||
|
|
|
@ -15,7 +15,7 @@ class apcupsd {
|
|||
|
||||
file { "/etc/apcupsd/apcupsd.conf":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
require => Package["apcupsd"],
|
||||
|
|
|
@ -2,7 +2,7 @@ class apt {
|
|||
|
||||
file { "/var/cache/apt/local-archives":
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
}
|
||||
|
@ -97,7 +97,7 @@ class apt::sources {
|
|||
|
||||
file { "/etc/apt/sources.list":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
content => template("apt/sources.list.erb"),
|
||||
|
@ -125,7 +125,7 @@ class apt::cacher {
|
|||
ensure => present,
|
||||
source => [ "puppet:///files/apt/apt-cacher.conf",
|
||||
"puppet:///modules/apt/apt-cacher.conf", ],
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
notify => Service["apt-cacher"],
|
||||
|
@ -178,7 +178,7 @@ class apt::mirror {
|
|||
default => "/etc/apt/miror.list",
|
||||
},
|
||||
content => template("apt/mirror.list.erb"),
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
require => Package["apt-mirror"],
|
||||
|
@ -217,7 +217,7 @@ define apt::package($ensure, $source) {
|
|||
default => absent,
|
||||
},
|
||||
source => $source,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
require => File["/var/cache/apt/local-archives"],
|
||||
|
@ -305,7 +305,7 @@ define apt::repo($ensure, $source, $dist="", $components="main",
|
|||
|
||||
file { "/etc/apt/sources.list.d/${name}.list":
|
||||
ensure => $ensure,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
content => $content,
|
||||
|
@ -338,7 +338,7 @@ define apt::repo($ensure, $source, $dist="", $components="main",
|
|||
$origin = regsubst($source, "^([^:]+://)([^/]+)/.*$", "\\2")
|
||||
file { "/etc/apt/preferences.d/${name}.pref":
|
||||
ensure => $ensure,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
content => $label ? {
|
||||
|
|
|
@ -34,7 +34,7 @@ class arduino {
|
|||
file { "/usr/local/src/arduino.tgz":
|
||||
ensure => present,
|
||||
source => "puppet:///files/packages/${arduino_package}",
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
}
|
||||
|
|
|
@ -17,9 +17,9 @@ class autofs {
|
|||
source => [ "puppet:///files/autofs/auto.master.${fqdn}",
|
||||
"puppet:///files/autofs/auto.master",
|
||||
"puppet:///modules/autofs/auto.master", ],
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
require => Package["autofs"],
|
||||
notify => Service["autofs"],
|
||||
}
|
||||
|
|
|
@ -33,7 +33,7 @@ class avahi::daemon {
|
|||
force => true,
|
||||
recurse => true,
|
||||
source => "puppet:///modules/custom/empty",
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => $operatingsystem ? {
|
||||
openbsd => wheel,
|
||||
|
@ -94,7 +94,7 @@ define avahi::service($port = "AUTO", $description = "%h", $ensure = "present",
|
|||
file { "/etc/avahi/services/${filename}":
|
||||
ensure => $ensure,
|
||||
content => template("avahi/service.erb"),
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => $operatingsystem ? {
|
||||
openbsd => wheel,
|
||||
|
|
|
@ -22,7 +22,7 @@ define backuppc::manualclient($ensure = "present", $operatingsystem = "default")
|
|||
"puppet:///files/backuppc/${operatingsystem}.pl",
|
||||
"puppet:///files/backuppc/default.pl",
|
||||
"puppet:///modules/backuppc/default.pl", ],
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => root,
|
||||
group => backuppc,
|
||||
tag => "backuppc",
|
||||
|
@ -65,7 +65,7 @@ class backuppc::server {
|
|||
if $backuppc_datadir {
|
||||
file { $backuppc_datadir:
|
||||
ensure => directory,
|
||||
mode => 0750,
|
||||
mode => "0750",
|
||||
owner => "backuppc",
|
||||
group => "root",
|
||||
require => Package["BackupPC"],
|
||||
|
@ -88,7 +88,7 @@ class backuppc::server {
|
|||
|
||||
file { "/usr/share/BackupPC/sbin/.htaccess":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
source => [ "puppet:///files/backuppc/htaccess",
|
||||
|
@ -98,7 +98,7 @@ class backuppc::server {
|
|||
|
||||
file { "/usr/share/BackupPC/sbin/BackupPC_Admin":
|
||||
ensure => present,
|
||||
mode => 4750,
|
||||
mode => "4750",
|
||||
owner => "backuppc",
|
||||
group => $apache::sslserver::group,
|
||||
require => Package["BackupPC"],
|
||||
|
@ -114,7 +114,7 @@ class backuppc::server {
|
|||
|
||||
file { "/etc/BackupPC/apache.users":
|
||||
ensure => present,
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => "root",
|
||||
group => $apache::sslserver::group,
|
||||
seltype => $operatingsystem ? {
|
||||
|
@ -130,7 +130,7 @@ class backuppc::server {
|
|||
file { "/etc/BackupPC/config.pl":
|
||||
ensure => present,
|
||||
source => "puppet:///files/backuppc/config.pl",
|
||||
mode => 0440,
|
||||
mode => "0440",
|
||||
owner => "backuppc",
|
||||
group => "backuppc",
|
||||
seltype => $operatingsystem ? {
|
||||
|
@ -148,7 +148,7 @@ class backuppc::server {
|
|||
ensure => present,
|
||||
source => [ "puppet:///files/backuppc/hosts.in",
|
||||
"puppet:///modules/backuppc/hosts.in", ],
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "backuppc",
|
||||
seltype => $operatingsystem ? {
|
||||
|
@ -167,7 +167,7 @@ class backuppc::server {
|
|||
purge => true,
|
||||
force => true,
|
||||
recurse => true,
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => "root",
|
||||
group => "backuppc",
|
||||
seltype => $operatingsystem ? {
|
||||
|
@ -208,14 +208,14 @@ class backuppc::server {
|
|||
|
||||
file { "/var/lib/BackupPC/.ssh":
|
||||
ensure => directory,
|
||||
mode => 0750,
|
||||
mode => "0750",
|
||||
owner => "root",
|
||||
group => "backuppc",
|
||||
}
|
||||
file { "/var/lib/BackupPC/.ssh/id_rsa":
|
||||
ensure => present,
|
||||
source => "/etc/ssh/ssh_host_rsa_key",
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => "root",
|
||||
group => "backuppc",
|
||||
require => File["/var/lib/BackupPC/.ssh"],
|
||||
|
@ -224,7 +224,7 @@ class backuppc::server {
|
|||
file { "/var/lib/BackupPC/.ssh/id_rsa.pub":
|
||||
ensure => present,
|
||||
source => "/etc/ssh/ssh_host_rsa_key.pub",
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => "root",
|
||||
group => "backuppc",
|
||||
require => File["/var/lib/BackupPC/.ssh"],
|
||||
|
|
|
@ -14,7 +14,7 @@ class clarified::analyzer {
|
|||
|
||||
file { "/usr/local/src/clarified-analyzer-linux-i686.sh":
|
||||
ensure => present,
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
source => "puppet:///files/packages/${clarified_analyzer_package}",
|
||||
|
@ -51,7 +51,7 @@ class clarified::recorder {
|
|||
if $recorder_datadir {
|
||||
file { $recorder_datadir:
|
||||
ensure => directory,
|
||||
mode => 0700,
|
||||
mode => "0700",
|
||||
owner => root,
|
||||
group => root,
|
||||
}
|
||||
|
@ -64,7 +64,7 @@ class clarified::recorder {
|
|||
} else {
|
||||
file { "/var/lib/recorder":
|
||||
ensure => directory,
|
||||
mode => 0700,
|
||||
mode => "0700",
|
||||
owner => root,
|
||||
group => root,
|
||||
}
|
||||
|
@ -74,7 +74,7 @@ class clarified::recorder {
|
|||
"/etc/clarified/probe.d",
|
||||
"/etc/clarified/remote.d", ]:
|
||||
ensure => directory,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
before => Exec["/usr/local/src/clarified-recorder-linux-i686.sh"],
|
||||
|
@ -89,7 +89,7 @@ class clarified::recorder {
|
|||
|
||||
file { "/usr/local/src/clarified-recorder-linux-i686.sh":
|
||||
ensure => present,
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
source => "puppet:///files/packages/${clarified_recorder_package}",
|
||||
|
@ -118,7 +118,7 @@ class clarified::recorder {
|
|||
|
||||
file { "/etc/init.d/clarified-probe":
|
||||
ensure => present,
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
source => "/usr/local/probe/probe-init.sh",
|
||||
|
@ -186,7 +186,7 @@ define clarified::probe($interface="", $snaplen="65535", $keeptime="100GB",
|
|||
true => present,
|
||||
false => absent,
|
||||
},
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
content => template("clarified/probe.erb"),
|
||||
|
@ -199,7 +199,7 @@ define clarified::probe($interface="", $snaplen="65535", $keeptime="100GB",
|
|||
true => present,
|
||||
false => absent,
|
||||
},
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
content => template("clarified/remote.erb"),
|
||||
|
@ -209,7 +209,7 @@ define clarified::probe($interface="", $snaplen="65535", $keeptime="100GB",
|
|||
|
||||
file { "/var/lib/recorder/${name}":
|
||||
ensure => directory,
|
||||
mode => 0700,
|
||||
mode => "0700",
|
||||
owner => root,
|
||||
group => root,
|
||||
require => File["/var/lib/recorder"],
|
||||
|
|
|
@ -10,7 +10,7 @@ class cups::client {
|
|||
file { "/etc/cups/client.conf":
|
||||
ensure => present,
|
||||
content => template("cups/client.conf.erb"),
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => $operatingsystem ? {
|
||||
openbsd => wheel,
|
||||
|
@ -49,7 +49,7 @@ class cups::server inherits cups::client {
|
|||
source => [ "puppet:///files/cups/cupsd.conf.${fqdn}",
|
||||
"puppet:///files/cups/cupsd.conf",
|
||||
"puppet:///modules/cups/cupsd.conf", ],
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => root,
|
||||
group => lp,
|
||||
require => Package["cups"],
|
||||
|
@ -64,7 +64,7 @@ class cups::server inherits cups::client {
|
|||
|
||||
file { "/etc/cups/ppd":
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => lp,
|
||||
require => Package["cups"],
|
||||
|
@ -136,7 +136,7 @@ define cups::printer($uri, $ensure = present) {
|
|||
ensure => $ensure,
|
||||
source => [ "puppet:///files/cups/${name}.ppd",
|
||||
"puppet:///modules/cups/postscript.ppd" ],
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
require => $ensure ? {
|
||||
|
@ -178,7 +178,7 @@ class cups::samba {
|
|||
"/usr/share/cups/drivers",
|
||||
"/usr/share/cups/drivers/x64", ]:
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
require => [ Package["samba"],
|
||||
|
@ -189,7 +189,7 @@ class cups::samba {
|
|||
file { "/usr/share/cups/drivers/${name}":
|
||||
ensure => present,
|
||||
source => "puppet:///modules/cups/drivers/${name}",
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
require => [ File["/usr/share/cups/drivers"],
|
||||
|
@ -220,7 +220,7 @@ class cups::samba {
|
|||
file { "/etc/cron.hourly/update-printer-inf.sh":
|
||||
ensure => present,
|
||||
source => "puppet:///modules/cups/update-printer-inf.sh",
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
}
|
||||
|
@ -239,7 +239,7 @@ class cups::snmp {
|
|||
file { "/etc/cron.hourly/printer-details.py":
|
||||
ensure => present,
|
||||
source => "puppet:///modules/cups/printer-details.py",
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
require => Package["net-snmp-utils"],
|
||||
|
|
|
@ -3,7 +3,7 @@ class custom {
|
|||
|
||||
file { "/srv":
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => $operatingsystem ? {
|
||||
OpenBSD => wheel,
|
||||
|
|
|
@ -19,7 +19,7 @@ class daap::server {
|
|||
file { "/etc/mt-daapd.conf":
|
||||
ensure => present,
|
||||
source => "puppet:///files/daap/mt-daapd.conf",
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => root,
|
||||
group => mt-daapd,
|
||||
require => Package["mt-daapd"],
|
||||
|
|
|
@ -37,7 +37,7 @@ class dhcp::server::common {
|
|||
if $operatingsystem == "OpenBSD" and $operatingsystemrelease !~ /4\.[1-8]/ {
|
||||
file { "/etc/rc.d/isc_dhcpd":
|
||||
ensure => present,
|
||||
mode => 0555,
|
||||
mode => "0555",
|
||||
owner => "root",
|
||||
group => "bin",
|
||||
source => "puppet:///modules/dhcp/isc_dhcpd.rc",
|
||||
|
@ -82,7 +82,7 @@ class dhcp::server inherits dhcp::server::common {
|
|||
ensure => present,
|
||||
source => [ "puppet:///files/dhcp/dhcpd.conf.${fqdn}",
|
||||
"puppet:///files/dhcp/dhcpd.conf", ],
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => $operatingsystem ? {
|
||||
openbsd => wheel,
|
||||
|
@ -101,7 +101,7 @@ class dhcp::server::ldap inherits dhcp::server::common {
|
|||
file { "/usr/local/sbin/dhcpdump.py":
|
||||
ensure => present,
|
||||
source => "puppet:///modules/dhcp/dhcpdump.py",
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => $operatingsystem ? {
|
||||
OpenBSD => wheel,
|
||||
|
@ -113,7 +113,7 @@ class dhcp::server::ldap inherits dhcp::server::common {
|
|||
ensure => present,
|
||||
source => [ "puppet:///files/dhcp/dhcpd.conf.in.${hostname}",
|
||||
"puppet:///files/dhcp/dhcpd.conf.in", ],
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => $operatingsystem ? {
|
||||
OpenBSD => wheel,
|
||||
|
|
|
@ -64,7 +64,7 @@ class dns::server {
|
|||
|
||||
file { "${chroot}${rndckey}":
|
||||
ensure => present,
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => "root",
|
||||
group => $group,
|
||||
require => $operatingsystem ? {
|
||||
|
@ -113,7 +113,7 @@ class dns::server {
|
|||
file { "named.conf":
|
||||
ensure => present,
|
||||
path => "${chroot}${config}",
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => "root",
|
||||
group => $group,
|
||||
require => $operatingsystem ? {
|
||||
|
@ -125,7 +125,7 @@ class dns::server {
|
|||
file { "/usr/local/sbin/generate-named-conf.sh":
|
||||
ensure => present,
|
||||
content => template("dns/generate-named-conf.sh.erb"),
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
"openbsd" => "wheel",
|
||||
|
@ -147,7 +147,7 @@ class dns::server {
|
|||
source => [ "puppet:///files/dns/named.conf.options.${fqdn}",
|
||||
"puppet:///files/dns/named.conf.options",
|
||||
"puppet:///modules/dns/named.conf.options", ],
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => "root",
|
||||
group => $group,
|
||||
require => $operatingsystem ? {
|
||||
|
@ -162,7 +162,7 @@ class dns::server {
|
|||
source => [ "puppet:///files/dns/named.conf.local.${fqdn}",
|
||||
"puppet:///files/dns/named.conf.local",
|
||||
"puppet:///modules/dns/named.conf.local", ],
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => "root",
|
||||
group => $group,
|
||||
require => $operatingsystem ? {
|
||||
|
@ -234,7 +234,7 @@ define dns::zone($role = "master", $master = "", $slaves = [], $source = "AUTO")
|
|||
file { "${dns::server::chroot}${dns::server::confdir}/zone.${zonefile}":
|
||||
ensure => present,
|
||||
content => template("dns/zone.$role.erb"),
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => "root",
|
||||
group => $dns::server::group,
|
||||
require => $operatingsystem ? {
|
||||
|
@ -249,7 +249,7 @@ define dns::zone($role = "master", $master = "", $slaves = [], $source = "AUTO")
|
|||
file { "${dns::server::chroot}${zonedir}/db.${zonefile}":
|
||||
ensure => present,
|
||||
source => $source,
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => "root",
|
||||
group => $dns::server::group,
|
||||
require => $operatingsystem ? {
|
||||
|
@ -262,7 +262,7 @@ define dns::zone($role = "master", $master = "", $slaves = [], $source = "AUTO")
|
|||
file { "${dns::server::chroot}${zonedir}/db.${zonefile}":
|
||||
ensure => present,
|
||||
content => template("dns/db.erb"),
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => "root",
|
||||
group => $dns::server::group,
|
||||
require => $operatingsystem ? {
|
||||
|
@ -275,7 +275,7 @@ define dns::zone($role = "master", $master = "", $slaves = [], $source = "AUTO")
|
|||
ensure => present,
|
||||
source => [ "puppet:///files/dns/db.${zonefile}-dynamic.${homename}",
|
||||
"puppet:///modules/dns/empty", ],
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => "root",
|
||||
group => $dns::server::group,
|
||||
require => $operatingsystem ? {
|
||||
|
@ -288,7 +288,7 @@ define dns::zone($role = "master", $master = "", $slaves = [], $source = "AUTO")
|
|||
ensure => present,
|
||||
source => [ "puppet:///files/dns/db.${zonefile}-static.${homename}",
|
||||
"puppet:///modules/dns/empty", ],
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => "root",
|
||||
group => $dns::server::group,
|
||||
require => $operatingsystem ? {
|
||||
|
@ -328,7 +328,7 @@ class dns::nsupdate {
|
|||
file { "/usr/local/sbin/nsupdate.sh":
|
||||
ensure => present,
|
||||
content => template("dns/nsupdate.sh.erb"),
|
||||
mode => 0700,
|
||||
mode => "0700",
|
||||
owner => root,
|
||||
group => $operatingsystem ? {
|
||||
openbsd => wheel,
|
||||
|
|
|
@ -46,9 +46,9 @@ class dovecot::server inherits dovecot::common {
|
|||
file { "$dovecot_ssl_dir/private/dovecot.csr":
|
||||
ensure => present,
|
||||
source => $dovecot_ssl_csr,
|
||||
mode => 0640,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0640",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
notify => Service["dovecot"],
|
||||
}
|
||||
}
|
||||
|
@ -57,9 +57,9 @@ class dovecot::server inherits dovecot::common {
|
|||
file { "$dovecot_ssl_dir/certs/dovecot.ca.crt":
|
||||
ensure => present,
|
||||
source => $dovecot_ssl_ca,
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
notify => Service["dovecot"],
|
||||
}
|
||||
}
|
||||
|
@ -68,9 +68,9 @@ class dovecot::server inherits dovecot::common {
|
|||
file { "$dovecot_ssl_dir/certs/dovecot.crt":
|
||||
ensure => present,
|
||||
source => $dovecot_ssl_cert,
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
notify => Service["dovecot"],
|
||||
}
|
||||
} else {
|
||||
|
@ -81,9 +81,9 @@ class dovecot::server inherits dovecot::common {
|
|||
file { "$dovecot_ssl_dir/private/dovecot.key":
|
||||
ensure => present,
|
||||
source => $dovecot_ssl_key,
|
||||
mode => 0600,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0600",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
notify => Service["dovecot"],
|
||||
}
|
||||
} else {
|
||||
|
@ -93,9 +93,9 @@ class dovecot::server inherits dovecot::common {
|
|||
file { "/etc/dovecot.conf":
|
||||
ensure => present,
|
||||
content => template("dovecot/dovecot.conf.erb"),
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
notify => Service["dovecot"],
|
||||
}
|
||||
|
||||
|
|
|
@ -55,26 +55,26 @@ class ejabberd {
|
|||
file { "${cert_prefix}/private/ejabberd.key":
|
||||
ensure => present,
|
||||
source => $ejabberd_ssl_key,
|
||||
mode => 0600,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0600",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
notify => Exec["generate-ejabberd-pem"],
|
||||
}
|
||||
file { "${cert_prefix}/certs/ejabberd.crt":
|
||||
ensure => present,
|
||||
source => $ejabberd_ssl_cert,
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
notify => Exec["generate-ejabberd-pem"],
|
||||
}
|
||||
if $ejabberd_ssl_chain {
|
||||
file { "${cert_prefix}/certs/ejabberd.chain.crt":
|
||||
ensure => present,
|
||||
source => $ejabberd_ssl_chain,
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
notify => Exec["generate-ejabberd-pem"],
|
||||
}
|
||||
$cert_files = "private/ejabberd.key certs/ejabberd.crt certs/ejabberd.chain.crt"
|
||||
|
@ -94,7 +94,7 @@ class ejabberd {
|
|||
|
||||
file { "/etc/ejabberd/ejabberd.pem":
|
||||
ensure => present,
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => "root",
|
||||
group => "ejabberd",
|
||||
require => Package["ejabberd"],
|
||||
|
@ -102,7 +102,7 @@ class ejabberd {
|
|||
|
||||
file { "/etc/ejabberd/ejabberd.cfg":
|
||||
ensure => present,
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => "root",
|
||||
group => "ejabberd",
|
||||
content => template("ejabberd/ejabberd.cfg.erb"),
|
||||
|
@ -121,14 +121,14 @@ class ejabberd {
|
|||
if $ejabberd_webhosts {
|
||||
file { "/var/www/jabber":
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
}
|
||||
|
||||
file { "/var/www/jabber/.htaccess":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
source => "puppet:///modules/ejabberd/htaccess",
|
||||
|
@ -181,7 +181,7 @@ class ejabberd::collab inherits ejabberd {
|
|||
}
|
||||
file { "/usr/local/src/${ejabberd_package}":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
source => "puppet:///files/packages/${ejabberd_package}",
|
||||
|
@ -215,17 +215,17 @@ class ejabberd::backup {
|
|||
|
||||
file { $ejabberd_backup_datadir:
|
||||
ensure => directory,
|
||||
mode => 0700,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0700",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
}
|
||||
|
||||
file { "/usr/local/sbin/ejabberd-backup":
|
||||
ensure => present,
|
||||
content => template("ejabberd/ejabberd-backup.erb"),
|
||||
mode => 0755,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0755",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
}
|
||||
|
||||
cron { "ejabberd-backup":
|
||||
|
|
|
@ -91,9 +91,9 @@ class firewall::common::iptables {
|
|||
default => "/etc/sysconfig/iptables",
|
||||
},
|
||||
ensure => present,
|
||||
mode => 0600,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0600",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
require => Package["iptables"],
|
||||
notify => Service["iptables"],
|
||||
}
|
||||
|
@ -103,9 +103,9 @@ class firewall::common::iptables {
|
|||
$ip6states = versioncmp($kernelversion, "2.6.20")
|
||||
file { "/etc/sysconfig/ip6tables":
|
||||
ensure => present,
|
||||
mode => 0600,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0600",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
require => Package["iptables"],
|
||||
notify => Service["ip6tables"],
|
||||
}
|
||||
|
@ -177,9 +177,9 @@ class firewall::common::pf {
|
|||
|
||||
file { "/etc/pf.conf":
|
||||
ensure => present,
|
||||
mode => 0600,
|
||||
owner => root,
|
||||
group => wheel,
|
||||
mode => "0600",
|
||||
owner => "root",
|
||||
group => "wheel",
|
||||
notify => Exec["pfctl -f /etc/pf.conf"],
|
||||
}
|
||||
|
||||
|
|
|
@ -9,9 +9,9 @@ class func::minion {
|
|||
ensure => present,
|
||||
source => [ "puppet:///files/func/minion.conf",
|
||||
"puppet:///modules/func/minion.conf", ],
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
require => Package["func"],
|
||||
notify => Service["funcd"],
|
||||
}
|
||||
|
@ -19,27 +19,27 @@ class func::minion {
|
|||
file { "/etc/pki/certmaster/${hostname}.pem":
|
||||
ensure => present,
|
||||
source => "${puppet_ssldir}/private_keys/${fqdn}.pem",
|
||||
mode => 0600,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0600",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
require => Package["func"],
|
||||
notify => Service["funcd"],
|
||||
}
|
||||
file { "/etc/pki/certmaster/${hostname}.cert":
|
||||
ensure => present,
|
||||
source => "${puppet_ssldir}/certs/${fqdn}.pem",
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
require => Package["func"],
|
||||
notify => Service["funcd"],
|
||||
}
|
||||
file { "/etc/pki/certmaster/ca.cert":
|
||||
ensure => present,
|
||||
source => "${puppet_ssldir}/certs/ca.pem",
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
require => Package["func"],
|
||||
notify => Service["funcd"],
|
||||
}
|
||||
|
@ -56,9 +56,9 @@ class func::server inherits func::minion {
|
|||
|
||||
file { "/etc/pki/certmaster/ca":
|
||||
ensure => directory,
|
||||
mode => 0750,
|
||||
owner => root,
|
||||
group => sysadm,
|
||||
mode => "0750",
|
||||
owner => "root",
|
||||
group => "sysadm",
|
||||
}
|
||||
exec { "umask 077; openssl rsa -in ${puppet_ssldir}/ca/ca_key.pem -out /etc/pki/certmaster/ca/certmaster.key -passin file:${puppet_ssldir}/ca/private/ca.pass":
|
||||
path => "/bin:/sbin:/usr/bin:/usr/sbin:/usr/local/bin:/usr/local/sbin",
|
||||
|
@ -68,17 +68,17 @@ class func::server inherits func::minion {
|
|||
file { "/etc/pki/certmaster/ca/certmaster.crt":
|
||||
ensure => present,
|
||||
source => "${puppet_ssldir}/ca/ca_crt.pem",
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
require => File["/etc/pki/certmaster/ca"],
|
||||
}
|
||||
|
||||
file { "/var/lib/certmaster/certmaster":
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0755",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
}
|
||||
file { "/var/lib/certmaster/certmaster/certs":
|
||||
ensure => link,
|
||||
|
@ -89,9 +89,9 @@ class func::server inherits func::minion {
|
|||
ensure => present,
|
||||
source => [ "puppet:///files/func/certmaster.conf",
|
||||
"puppet:///modules/func/certmaster.conf", ],
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
require => Package["func"],
|
||||
}
|
||||
|
||||
|
|
|
@ -28,9 +28,9 @@ class git::server {
|
|||
if $git_datadir {
|
||||
file { $git_datadir:
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0755",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
}
|
||||
file { "/srv/git":
|
||||
ensure => link,
|
||||
|
@ -40,9 +40,9 @@ class git::server {
|
|||
} else {
|
||||
file { "/srv/git":
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0755",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
seltype => "httpd_sys_content_t",
|
||||
}
|
||||
}
|
||||
|
@ -108,9 +108,9 @@ class git::gitweb inherits git::server {
|
|||
source => [ "puppet:///files/git/gitweb_config.perl.${fqdn}",
|
||||
"puppet:///files/git/gitweb_config.perl",
|
||||
"puppet:///modules/git/gitweb_config.perl", ],
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
require => Package["gitweb"],
|
||||
}
|
||||
|
||||
|
|
|
@ -12,7 +12,7 @@ class hastymail {
|
|||
file { "/usr/local/src/hastymail.tar.gz":
|
||||
ensure => present,
|
||||
source => "puppet:///files/packages/$hastymail_package",
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
links => follow,
|
||||
|
@ -26,7 +26,7 @@ class hastymail {
|
|||
|
||||
file { "/etc/hastymail2":
|
||||
ensure => directory,
|
||||
mode => 0750,
|
||||
mode => "0750",
|
||||
owner => "root",
|
||||
group => $apache::sslserver::group,
|
||||
}
|
||||
|
@ -34,7 +34,7 @@ class hastymail {
|
|||
ensure => present,
|
||||
source => [ "puppet:///private/hastymail2.conf",
|
||||
"puppet:///files/mail/hastymail2.conf", ],
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => "root",
|
||||
group => $apache::sslserver::group,
|
||||
require => File["/etc/hastymail2"],
|
||||
|
@ -48,7 +48,7 @@ class hastymail {
|
|||
}
|
||||
file { "/etc/hastymail2/hastymail2.rc":
|
||||
ensure => present,
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => "root",
|
||||
group => $apache::sslserver::group,
|
||||
}
|
||||
|
|
|
@ -8,9 +8,9 @@ class ifstated {
|
|||
source => [ "puppet:///private/ifstated.conf",
|
||||
"puppet:///files/firewall/ifstated.conf.${fqdn}",
|
||||
"puppet:///files/firewall/ifstated.conf", ],
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
group => wheel,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "wheel",
|
||||
notify => Service["ifstated"],
|
||||
}
|
||||
|
||||
|
|
|
@ -8,9 +8,9 @@ class irc::server {
|
|||
|
||||
file { "/var/lib/ratbox":
|
||||
ensure => directory,
|
||||
owner => irc,
|
||||
group => irc,
|
||||
mode => 0700,
|
||||
owner => "irc",
|
||||
group => "irc",
|
||||
mode => "0700",
|
||||
require => Package["ircd-ratbox"],
|
||||
}
|
||||
|
||||
|
@ -27,9 +27,9 @@ class irc::services inherits irc::server {
|
|||
|
||||
file { "/var/lib/ratbox-services":
|
||||
ensure => directory,
|
||||
owner => irc,
|
||||
group => irc,
|
||||
mode => 0700,
|
||||
owner => "irc",
|
||||
group => "irc",
|
||||
mode => "0700",
|
||||
require => Package["ircd-ratbox", "ratbox-services-sqlite"],
|
||||
}
|
||||
|
||||
|
@ -46,17 +46,17 @@ define irc::network($desc, $servername, $serverdesc,
|
|||
|
||||
file { "/var/lib/ratbox/${name}":
|
||||
ensure => directory,
|
||||
owner => irc,
|
||||
group => irc,
|
||||
mode => 0700,
|
||||
owner => "irc",
|
||||
group => "irc",
|
||||
mode => "0700",
|
||||
require => File["/var/lib/ratbox"],
|
||||
}
|
||||
|
||||
file { "/var/lib/ratbox/${name}/ircd.conf":
|
||||
ensure => present,
|
||||
mode => 0600,
|
||||
owner => irc,
|
||||
group => irc,
|
||||
mode => "0600",
|
||||
owner => "irc",
|
||||
group => "irc",
|
||||
content => $services ? {
|
||||
true => template("irc/ircd-ratbox.conf.erb", "irc/ircd-ratbox-services.conf.erb"),
|
||||
false => template("irc/ircd-ratbox.conf.erb"),
|
||||
|
@ -68,14 +68,14 @@ define irc::network($desc, $servername, $serverdesc,
|
|||
|
||||
ssl::certificate { "/var/lib/ratbox/${name}/ircd.pem":
|
||||
cn => $servername,
|
||||
mode => 0600,
|
||||
mode => "0600",
|
||||
owner => "irc",
|
||||
group => "irc",
|
||||
require => File["/var/lib/ratbox/${name}"],
|
||||
}
|
||||
|
||||
ssl::dhparam { "/var/lib/ratbox/${name}/dh.pem":
|
||||
mode => 0600,
|
||||
mode => "0600",
|
||||
owner => "irc",
|
||||
group => "irc",
|
||||
require => File["/var/lib/ratbox/${name}"],
|
||||
|
@ -83,7 +83,7 @@ define irc::network($desc, $servername, $serverdesc,
|
|||
|
||||
file { "/etc/init.d/ircd-${name}":
|
||||
ensure => present,
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
content => template("irc/ircd-ratbox.init.erb"),
|
||||
|
@ -125,9 +125,9 @@ define irc::network($desc, $servername, $serverdesc,
|
|||
"/var/lib/ratbox-services/${name}/var/run",
|
||||
"/var/lib/ratbox-services/${name}/var/run/ratbox-services", ]:
|
||||
ensure => directory,
|
||||
owner => irc,
|
||||
group => irc,
|
||||
mode => 0600,
|
||||
owner => "irc",
|
||||
group => "irc",
|
||||
mode => "0600",
|
||||
before => Service["ratbox-services-${name}"],
|
||||
require => File["/var/lib/ratbox-services"],
|
||||
}
|
||||
|
@ -139,9 +139,9 @@ define irc::network($desc, $servername, $serverdesc,
|
|||
|
||||
file { "/var/lib/ratbox-services/${name}/etc/ratbox-services/ratbox-services.conf":
|
||||
ensure => present,
|
||||
mode => 0600,
|
||||
owner => irc,
|
||||
group => irc,
|
||||
mode => "0600",
|
||||
owner => "irc",
|
||||
group => "irc",
|
||||
content => template("irc/ratbox-services.conf.erb"),
|
||||
before => Service["ratbox-services-${name}"],
|
||||
notify => Service["ratbox-services-${name}"],
|
||||
|
@ -150,9 +150,9 @@ define irc::network($desc, $servername, $serverdesc,
|
|||
|
||||
file { "/var/lib/ratbox-services/${name}/etc/ratbox-services/ratbox-services.db":
|
||||
ensure => present,
|
||||
mode => 0600,
|
||||
owner => irc,
|
||||
group => irc,
|
||||
mode => "0600",
|
||||
owner => "irc",
|
||||
group => "irc",
|
||||
source => "/etc/ratbox-services/ratbox-services.db",
|
||||
replace => false,
|
||||
before => Service["ratbox-services-${name}"],
|
||||
|
@ -161,9 +161,9 @@ define irc::network($desc, $servername, $serverdesc,
|
|||
|
||||
file { "/etc/init.d/ratbox-services-${name}":
|
||||
ensure => present,
|
||||
mode => 0755,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0755",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
content => template("irc/ratbox-services.init.erb"),
|
||||
before => Service["ratbox-services-${name}"],
|
||||
notify => Exec["enable-ratbox-services-${name}"],
|
||||
|
|
|
@ -18,7 +18,7 @@ class iscsi::server {
|
|||
source => [ "puppet:///files/iscsi/targets.conf.${fqdn}",
|
||||
"puppet:///files/iscsi/targets.conf",
|
||||
"puppet:///modules/iscsi/targets.conf", ],
|
||||
mode => 0600,
|
||||
mode => "0600",
|
||||
owner => root,
|
||||
group => root,
|
||||
require => Package["scsi-target-utils"],
|
||||
|
@ -26,7 +26,7 @@ class iscsi::server {
|
|||
|
||||
file { "/etc/tgt/target.d":
|
||||
ensure => directory,
|
||||
mode => 0700,
|
||||
mode => "0700",
|
||||
owner => root,
|
||||
group => root,
|
||||
require => Package["scsi-target-utils"],
|
||||
|
@ -78,7 +78,7 @@ define iscsi::target($tid, $initiator = "ALL", $ensure = "present") {
|
|||
file { "/etc/tgt/target.d/${tid}.conf":
|
||||
ensure => present,
|
||||
content => template("iscsi/tid.conf.erb"),
|
||||
mode => 0600,
|
||||
mode => "0600",
|
||||
owner => root,
|
||||
group => root,
|
||||
require => File["/etc/tgt/target.d"],
|
||||
|
|
|
@ -33,11 +33,11 @@ class kerberos::client {
|
|||
},
|
||||
ensure => present,
|
||||
content => template("kerberos/krb5.conf.erb"),
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
openbsd => wheel,
|
||||
default => root,
|
||||
openbsd => "wheel",
|
||||
default => "root",
|
||||
},
|
||||
}
|
||||
|
||||
|
@ -105,7 +105,7 @@ class kerberos::server inherits kerberos::client {
|
|||
if $kerberos_datadir {
|
||||
file { $kerberos_datadir:
|
||||
ensure => directory,
|
||||
mode => 0600,
|
||||
mode => "0600",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
}
|
||||
|
@ -119,7 +119,7 @@ class kerberos::server inherits kerberos::client {
|
|||
} else {
|
||||
file { "/srv/kerberos":
|
||||
ensure => directory,
|
||||
mode => 0600,
|
||||
mode => "0600",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
}
|
||||
|
@ -128,7 +128,7 @@ class kerberos::server inherits kerberos::client {
|
|||
file { "/var/kerberos/krb5kdc/kdc.conf":
|
||||
ensure => present,
|
||||
content => template("kerberos/kdc.conf.erb"),
|
||||
mode => 0600,
|
||||
mode => "0600",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
require => [ Package["krb5-server"],
|
||||
|
|
|
@ -184,7 +184,7 @@ class ldap::auth inherits ldap::client {
|
|||
file { "/etc/login.conf":
|
||||
ensure => present,
|
||||
content => template("ldap/login.conf.erb"),
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => wheel,
|
||||
require => [ File["/etc/openldap/ldap.conf"],
|
||||
|
@ -231,7 +231,7 @@ class ldap::client {
|
|||
"ubuntu" => "/etc/ldap/ldap.conf",
|
||||
default => "/etc/openldap/ldap.conf",
|
||||
},
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => $operatingsystem ? {
|
||||
"darwin" => wheel,
|
||||
|
@ -353,7 +353,7 @@ class ldap::server {
|
|||
file { "${ssl::certs}/slapd.crt":
|
||||
ensure => present,
|
||||
source => $ldap_server_cert,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
"openbsd" => "wheel",
|
||||
|
@ -365,7 +365,7 @@ class ldap::server {
|
|||
file { "${ssl::private}/slapd.key":
|
||||
ensure => present,
|
||||
source => $ldap_server_key,
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => "root",
|
||||
group => $group,
|
||||
require => Package["openldap-server"],
|
||||
|
@ -376,7 +376,7 @@ class ldap::server {
|
|||
ensure => present,
|
||||
path => "${config}/slapd.conf",
|
||||
content => template("ldap/slapd.conf.erb"),
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => "root",
|
||||
group => $group,
|
||||
notify => Service["slapd"],
|
||||
|
@ -385,7 +385,7 @@ class ldap::server {
|
|||
file { "${config}/slapd.conf.d":
|
||||
ensure => directory,
|
||||
source => "puppet:///modules/custom/empty",
|
||||
mode => 0750,
|
||||
mode => "0750",
|
||||
owner => "root",
|
||||
group => $group,
|
||||
purge => true,
|
||||
|
@ -398,7 +398,7 @@ class ldap::server {
|
|||
file { "/etc/sysconfig/ldap":
|
||||
ensure => present,
|
||||
source => "puppet:///modules/ldap/ldap.sysconfig",
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
notify => Service["slapd"],
|
||||
|
@ -420,7 +420,7 @@ class ldap::server {
|
|||
if $ldap_datadir {
|
||||
file { $ldap_datadir:
|
||||
ensure => directory,
|
||||
mode => 0700,
|
||||
mode => "0700",
|
||||
owner => $user,
|
||||
group => $group,
|
||||
require => Package["openldap-server"],
|
||||
|
@ -433,7 +433,7 @@ class ldap::server {
|
|||
} else {
|
||||
file { "/srv/ldap":
|
||||
ensure => directory,
|
||||
mode => 0700,
|
||||
mode => "0700",
|
||||
owner => $user,
|
||||
group => $group,
|
||||
require => Package["openldap-server"],
|
||||
|
@ -443,7 +443,7 @@ class ldap::server {
|
|||
file { "${config}/schema":
|
||||
ensure => directory,
|
||||
source => "puppet:///modules/custom/empty",
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
"openbsd" => "wheel",
|
||||
|
@ -456,7 +456,7 @@ class ldap::server {
|
|||
}
|
||||
file { "${config}/slapd.conf.d/schema.conf":
|
||||
ensure => present,
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => "root",
|
||||
group => $group,
|
||||
require => Exec["generate-slapd-schema-config"],
|
||||
|
@ -473,7 +473,7 @@ class ldap::server {
|
|||
|
||||
file { "${config}/slapd.conf.d/database.conf":
|
||||
ensure => present,
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => "root",
|
||||
group => $group,
|
||||
require => Exec["generate-slapd-database-config"],
|
||||
|
@ -509,7 +509,7 @@ define ldap::server::database($aclsource = "") {
|
|||
file { "${ldap::server::config}/slapd.conf.d/db.${name}.conf":
|
||||
ensure => present,
|
||||
content => template("ldap/slapd-database.conf.erb"),
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => "root",
|
||||
group => $ldap::server::group,
|
||||
notify => Exec["generate-slapd-database-config"],
|
||||
|
@ -525,7 +525,7 @@ define ldap::server::database($aclsource = "") {
|
|||
"" => template("ldap/slapd-acl.conf.erb"),
|
||||
default => undef,
|
||||
},
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => "root",
|
||||
group => $ldap::server::group,
|
||||
notify => Service["slapd"],
|
||||
|
@ -536,7 +536,7 @@ define ldap::server::database($aclsource = "") {
|
|||
source => [ "puppet:///files/ldap/slapd-index.conf.${name}",
|
||||
"puppet:///files/ldap/slapd-index.conf",
|
||||
"puppet:///modules/ldap/slapd-index.conf", ],
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => "root",
|
||||
group => $ldap::server::group,
|
||||
notify => Service["slapd"],
|
||||
|
@ -544,7 +544,7 @@ define ldap::server::database($aclsource = "") {
|
|||
|
||||
file { "/srv/ldap/${name}":
|
||||
ensure => directory,
|
||||
mode => 0700,
|
||||
mode => "0700",
|
||||
owner => $ldap::server::user,
|
||||
group => $ldap::server::group,
|
||||
require => File["/srv/ldap"],
|
||||
|
@ -555,7 +555,7 @@ define ldap::server::database($aclsource = "") {
|
|||
source => [ "puppet:///files/ldap/DB_CONFIG.${name}",
|
||||
"puppet:///files/ldap/DB_CONFIG",
|
||||
"puppet:///modules/ldap/DB_CONFIG", ],
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
"openbsd" => "wheel",
|
||||
|
@ -591,7 +591,7 @@ define ldap::server::schema($idx = 50) {
|
|||
path => "${ldap::server::config}/schema/${idx}-${name}.schema",
|
||||
source => [ "puppet:///files/ldap/${name}.schema",
|
||||
"puppet:///modules/ldap/${name}.schema", ],
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
"openbsd" => "wheel",
|
||||
|
|
|
@ -41,7 +41,7 @@ class libvirt::kvm inherits libvirt::client {
|
|||
|
||||
file { "/etc/libvirt/libvirtd.conf":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
content => template("libvirt/libvirtd.conf.erb"),
|
||||
|
|
|
@ -6,7 +6,7 @@ class minecraft {
|
|||
file { "/usr/local/lib/minecraft.jar":
|
||||
ensure => present,
|
||||
source => "puppet:///files/packages/minecraft.jar",
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
}
|
||||
|
@ -14,7 +14,7 @@ class minecraft {
|
|||
file { "/usr/local/bin/minecraft":
|
||||
ensure => present,
|
||||
source => "puppet:///modules/minecraft/minecraft",
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
require => File["/usr/local/lib/minecraft.jar"],
|
||||
|
|
|
@ -34,12 +34,12 @@ class munin::node {
|
|||
file { "/etc/munin/munin-node.conf":
|
||||
ensure => present,
|
||||
content => template("munin/munin-node.conf.erb"),
|
||||
owner => root,
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
OpenBSD => wheel,
|
||||
default => root,
|
||||
OpenBSD => "wheel",
|
||||
default => "root",
|
||||
},
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
require => Package["munin-node"],
|
||||
notify => Exec["munin-node-configure"],
|
||||
}
|
||||
|
@ -89,7 +89,7 @@ define munin::snmpnode($snmp_community="public", $snmp_version="2") {
|
|||
OpenBSD => wheel,
|
||||
default => root,
|
||||
},
|
||||
mode => 0600,
|
||||
mode => "0600",
|
||||
notify => Service["munin-node"],
|
||||
}
|
||||
|
||||
|
@ -125,9 +125,9 @@ define munin::plugin($config = "") {
|
|||
file { "/usr/local/libexec/munin/plugins/${name}":
|
||||
ensure => present,
|
||||
source => "puppet:///modules/munin/plugins/${name}",
|
||||
owner => root,
|
||||
group => wheel,
|
||||
mode => 0755,
|
||||
owner => "root",
|
||||
group => "wheel",
|
||||
mode => "0755",
|
||||
require => Package["munin-node"],
|
||||
}
|
||||
}
|
||||
|
@ -135,9 +135,9 @@ define munin::plugin($config = "") {
|
|||
file { "/usr/share/munin/plugins/${name}":
|
||||
ensure => present,
|
||||
source => "puppet:///modules/munin/plugins/${name}",
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => 0755,
|
||||
owner => "root",
|
||||
group => "root",
|
||||
mode => "0755",
|
||||
require => Package["munin-node"],
|
||||
}
|
||||
}
|
||||
|
@ -149,12 +149,12 @@ define munin::plugin($config = "") {
|
|||
source => [ "puppet:///files/munin/plugin-conf/${config}.${fqdn}",
|
||||
"puppet:///files/munin/plugin-conf/${config}",
|
||||
"puppet:///modules/munin/plugin-conf/${config}", ],
|
||||
owner => root,
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
OpenBSD => wheel,
|
||||
default => root,
|
||||
},
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
notify => Service["munin-node"],
|
||||
require => $operatingsystem ? {
|
||||
OpenBSD => File["/usr/local/libexec/munin/plugins/${name}"],
|
||||
|
@ -206,9 +206,9 @@ class munin::server {
|
|||
if $munin_datadir {
|
||||
file { $munin_datadir:
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
owner => munin,
|
||||
group => munin,
|
||||
mode => "0755",
|
||||
owner => "munin",
|
||||
group => "munin",
|
||||
seltype => "munin_var_lib_t",
|
||||
require => Package["munin"],
|
||||
}
|
||||
|
@ -230,9 +230,9 @@ class munin::server {
|
|||
if $munin_htmldir {
|
||||
file { $munin_htmldir:
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
owner => munin,
|
||||
group => munin,
|
||||
mode => "0755",
|
||||
owner => "munin",
|
||||
group => "munin",
|
||||
seltype => "httpd_munin_content_t",
|
||||
require => Package["munin"],
|
||||
}
|
||||
|
@ -261,9 +261,9 @@ class munin::server {
|
|||
purge => true,
|
||||
force => true,
|
||||
recurse => true,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => 0644,
|
||||
owner => "root",
|
||||
group => "root",
|
||||
mode => "0644",
|
||||
source => "puppet:///modules/custom/empty",
|
||||
require => Package["munin"],
|
||||
}
|
||||
|
@ -272,9 +272,9 @@ class munin::server {
|
|||
ensure => present,
|
||||
source => [ "puppet:///files/munin/munin.conf.in",
|
||||
"puppet:///modules/munin/munin.conf.in", ],
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => 0644,
|
||||
owner => "root",
|
||||
group => "root",
|
||||
mode => "0644",
|
||||
require => Package["munin"],
|
||||
notify => Exec["generate-munin-conf"],
|
||||
}
|
||||
|
|
|
@ -29,11 +29,11 @@ class mutt {
|
|||
ensure => present,
|
||||
name => "${muttconfdir}/Muttrc.local",
|
||||
content => template("mutt/Muttrc.local.erb"),
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
openbsd => wheel,
|
||||
default => root,
|
||||
openbsd => "wheel",
|
||||
default => "root",
|
||||
},
|
||||
require => Exec["add-local-mutt-config"],
|
||||
}
|
||||
|
|
|
@ -26,9 +26,9 @@ class mysql::server {
|
|||
if $mysql_datadir {
|
||||
file { $mysql_datadir:
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
owner => mysql,
|
||||
group => mysql,
|
||||
mode => "0755",
|
||||
owner => "mysql",
|
||||
group => "mysql",
|
||||
seltype => "mysqld_db_t",
|
||||
require => Package["mysql-server"],
|
||||
}
|
||||
|
@ -41,9 +41,9 @@ class mysql::server {
|
|||
} else {
|
||||
file { "/srv/mysql":
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
owner => mysql,
|
||||
group => mysql,
|
||||
mode => "0755",
|
||||
owner => "mysql",
|
||||
group => "mysql",
|
||||
seltype => "mysqld_db_t",
|
||||
require => Package["mysql-server"],
|
||||
}
|
||||
|
@ -78,9 +78,9 @@ class mysql::server {
|
|||
source => [ "puppet:///files/mysql/my.cnf.${hostname}",
|
||||
"puppet:///files/mysql/my.cnf",
|
||||
"puppet:///modules/mysql/my.cnf", ],
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
require => Package["mysql-server"],
|
||||
notify => Service["mysqld"],
|
||||
}
|
||||
|
@ -88,17 +88,17 @@ class mysql::server {
|
|||
file { "/etc/logrotate.d/mysql":
|
||||
ensure => present,
|
||||
source => "puppet:///modules/mysql/mysql.logrotate",
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
require => Package["mysql-server"],
|
||||
}
|
||||
|
||||
file { "/var/lib/mysql":
|
||||
ensure => directory,
|
||||
mode => 0700,
|
||||
owner => mysql,
|
||||
group => mysql,
|
||||
mode => "0700",
|
||||
owner => "mysql",
|
||||
group => "mysql",
|
||||
require => Package["mysql-server"],
|
||||
}
|
||||
|
||||
|
@ -128,17 +128,17 @@ class mysql::server::backup {
|
|||
|
||||
file { $mysql_backup_datadir:
|
||||
ensure => directory,
|
||||
mode => 0700,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0700",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
}
|
||||
|
||||
file { "/etc/cron.daily/mysql-backup":
|
||||
ensure => present,
|
||||
content => template("mysql/mysql-backup.cron.erb"),
|
||||
mode => 0755,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0755",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
require => [ File[$mysql_backup_datadir],
|
||||
Package["mysql"], ],
|
||||
}
|
||||
|
@ -156,18 +156,18 @@ class mysql::server::report {
|
|||
|
||||
file { "/var/log/mysql-report":
|
||||
ensure => directory,
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
require => Package["mysql-server"],
|
||||
}
|
||||
|
||||
file { "/etc/cron.daily/mysql-report":
|
||||
ensure => present,
|
||||
source => "puppet:///modules/mysql/mysql-report.cron",
|
||||
mode => 0755,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0755",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
require => File["/var/log/mysql-report"],
|
||||
}
|
||||
|
||||
|
|
|
@ -44,7 +44,7 @@ class mythtv::backend {
|
|||
file { "/etc/mythtv/mysql.txt":
|
||||
ensure => present,
|
||||
content => template("mythtv/mysql.txt.erb"),
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => root,
|
||||
group => mythtv,
|
||||
notify => Service["mythbackend"],
|
||||
|
@ -54,7 +54,7 @@ class mythtv::backend {
|
|||
file { "/etc/mythtv/config.xml":
|
||||
ensure => present,
|
||||
content => template("mythtv/config.xml.erb"),
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => root,
|
||||
group => mythtv,
|
||||
notify => Service["mythbackend"],
|
||||
|
@ -64,7 +64,7 @@ class mythtv::backend {
|
|||
file { "/etc/sysconfig/mythbackend":
|
||||
ensure => present,
|
||||
source => "puppet:///modules/mythtv/mythbackend",
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
notify => Service["mythbackend"],
|
||||
|
@ -88,7 +88,7 @@ class mythtv::backend {
|
|||
file { "/etc/cron.daily/mythorphans":
|
||||
ensure => present,
|
||||
source => "puppet:///modules/mythtv/mythorphans",
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
}
|
||||
|
@ -109,7 +109,7 @@ class mythtv::cron inherits mythtv::backend {
|
|||
file { "/etc/cron.daily/mythfilldatabase":
|
||||
ensure => present,
|
||||
source => "puppet:///modules/mythtv/mythfilldatabase",
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
}
|
||||
|
@ -117,7 +117,7 @@ class mythtv::cron inherits mythtv::backend {
|
|||
file { "/etc/cron.daily/mythoptimize":
|
||||
ensure => present,
|
||||
source => "puppet:///modules/mythtv/mythoptimize",
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
}
|
||||
|
@ -159,7 +159,7 @@ class mythtv::mythweb {
|
|||
|
||||
file { "/usr/share/mythweb/data":
|
||||
ensure => directory,
|
||||
mode => 0770,
|
||||
mode => "0770",
|
||||
owner => root,
|
||||
group => $apache::sslserver::group,
|
||||
seltype => "httpd_sys_rw_content_t",
|
||||
|
|
|
@ -37,7 +37,7 @@ class network::helper::debian {
|
|||
|
||||
file { "/etc/network/interfaces.in":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
source => "puppet:///modules/network/interfaces.in",
|
||||
|
@ -45,7 +45,7 @@ class network::helper::debian {
|
|||
|
||||
file { "/etc/network/interfaces.d":
|
||||
ensure => directory,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
purge => true,
|
||||
|
@ -66,7 +66,7 @@ class network::hostname {
|
|||
file { "/etc/hostname":
|
||||
ensure => present,
|
||||
content => "${homename}\n",
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
}
|
||||
|
@ -81,7 +81,7 @@ class network::hostname {
|
|||
file { "/etc/myname":
|
||||
ensure => present,
|
||||
content => "${homename}\n",
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "wheel",
|
||||
}
|
||||
|
@ -159,7 +159,7 @@ define network::interface($ipaddr = "none", $eaddr = "none", $netmask = "none",
|
|||
file { "/etc/hostname.${name}":
|
||||
ensure => present,
|
||||
content => template("network/hostname.if.erb"),
|
||||
mode => 0600,
|
||||
mode => "0600",
|
||||
owner => root,
|
||||
group => wheel,
|
||||
notify => Exec["restart-network"],
|
||||
|
@ -175,7 +175,7 @@ define network::interface($ipaddr = "none", $eaddr = "none", $netmask = "none",
|
|||
file { "/etc/sysconfig/network-scripts/ifcfg-${name}":
|
||||
ensure => present,
|
||||
content => template("network/ifcfg-if.erb"),
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
notify => Exec["restart-interface-${name}"],
|
||||
|
@ -193,7 +193,7 @@ define network::interface($ipaddr = "none", $eaddr = "none", $netmask = "none",
|
|||
file { "/etc/network/interfaces.d/${name}-addr.conf":
|
||||
ensure => present,
|
||||
content => template("network/interfaces-if.erb"),
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
notify => Exec["restart-network"],
|
||||
|
@ -202,7 +202,7 @@ define network::interface($ipaddr = "none", $eaddr = "none", $netmask = "none",
|
|||
if $eaddr_real {
|
||||
file { "/etc/udev/rules.d/99-persistent-net-${name}.rules":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
content => "SUBSYSTEM==\"net\", ACTION==\"add\", ATTR{address}==\"${eaddr_real}\", KERNEL==\"eth*\", NAME=\"${name}\"\n",
|
||||
|
@ -258,7 +258,7 @@ define network::route($gateway = "", $device, $ipv6gateway = "") {
|
|||
file { "/etc/mygate":
|
||||
ensure => present,
|
||||
content => template("network/mygate.erb"),
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => wheel,
|
||||
notify => Exec["restart-network"],
|
||||
|
@ -270,7 +270,7 @@ define network::route($gateway = "", $device, $ipv6gateway = "") {
|
|||
file { "/etc/network/interfaces.d/${device}-gate.conf":
|
||||
ensure => present,
|
||||
content => template("network/interfaces-gateway.erb"),
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
notify => Exec["restart-network"],
|
||||
|
@ -292,7 +292,7 @@ define network::route($gateway = "", $device, $ipv6gateway = "") {
|
|||
file { "/etc/sysconfig/network-scripts/route-${device}":
|
||||
ensure => present,
|
||||
content => template("network/route-if.erb"),
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
notify => Exec["restart-network"],
|
||||
|
@ -346,7 +346,7 @@ define network::carp($password, $ipaddr, $netmask, $options = []) {
|
|||
file { "/etc/ucarp/vip-${name}.conf":
|
||||
ensure => present,
|
||||
content => template("network/vip.conf.erb"),
|
||||
mode => 0600,
|
||||
mode => "0600",
|
||||
owner => root,
|
||||
group => root,
|
||||
require => Package["ucarp"],
|
||||
|
@ -401,7 +401,7 @@ define network::pppoe($username, $password, $device, $authtype = "pap") {
|
|||
file { "/etc/hostname.${name}":
|
||||
ensure => present,
|
||||
content => template("network/hostname.pppoe.erb"),
|
||||
mode => 0600,
|
||||
mode => "0600",
|
||||
owner => root,
|
||||
group => wheel,
|
||||
notify => Exec["restart-network"],
|
||||
|
@ -442,7 +442,7 @@ define network::trunk($devices, $mode = 0, $ipaddr = "none", $netmask = "none")
|
|||
file { "/etc/modprobe.d/${name}.conf":
|
||||
ensure => present,
|
||||
content => "alias ${name} bonding\noptions ${name} miimon=100 mode=${mode}\n",
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
}
|
||||
|
@ -536,7 +536,7 @@ class network::manager::disable {
|
|||
ubuntu: {
|
||||
file { "/etc/init/network-manager.conf":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
source => "puppet:///modules/network/network-manager.disabled.conf",
|
||||
|
|
|
@ -6,7 +6,7 @@ class networker::client {
|
|||
|
||||
file { [ "/nsr", "/nsr/res" ]:
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
require => Package["lgtoclnt"],
|
||||
|
@ -15,7 +15,7 @@ class networker::client {
|
|||
file { "/nsr/res/servers":
|
||||
ensure => present,
|
||||
content => template("networker/servers.erb"),
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
require => File["/nsr/res"],
|
||||
|
|
|
@ -30,7 +30,7 @@ class nfs::server inherits nfs::client {
|
|||
ensure => present,
|
||||
source => [ "puppet:///files/nfs/exports.${fqdn}",
|
||||
"puppet:///modules/nfs/exports", ],
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
require => Package["nfs-utils"],
|
||||
|
@ -40,7 +40,7 @@ class nfs::server inherits nfs::client {
|
|||
file { "/etc/sysconfig/nfs":
|
||||
ensure => present,
|
||||
source => "puppet:///modules/nfs/nfs.sysconfig",
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
notify => Service["nfs"],
|
||||
|
|
|
@ -25,7 +25,7 @@ class nginx {
|
|||
|
||||
file { "/etc/nginx/nginx.conf":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
"openbsd" => "wheel",
|
||||
|
@ -38,7 +38,7 @@ class nginx {
|
|||
|
||||
file { "/etc/nginx/conf.d":
|
||||
ensure => directory,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
"openbsd" => "wheel",
|
||||
|
@ -81,7 +81,7 @@ define nginx::configfile($source="", $content="") {
|
|||
|
||||
file { "/etc/nginx/conf.d/${name}":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
"openbsd" => "wheel",
|
||||
|
|
|
@ -56,7 +56,7 @@ class ntpd::chrony {
|
|||
|
||||
file { "/etc/chrony.conf":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
content => template("ntpd/chrony.conf.erb"),
|
||||
|
@ -82,7 +82,7 @@ class ntpd::isc-ntpd {
|
|||
|
||||
file { "/etc/ntp.conf":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
content => template("ntpd/ntp.conf.erb"),
|
||||
|
@ -109,7 +109,7 @@ class ntpd::openntpd {
|
|||
|
||||
file { "/etc/ntpd.conf":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => wheel,
|
||||
content => template("ntpd/openntpd.conf.erb"),
|
||||
|
|
|
@ -31,7 +31,7 @@ class openvpn::client {
|
|||
file { "/etc/openvpn/openvpn.conf":
|
||||
ensure => present,
|
||||
content => template("openvpn/openvpn.conf.erb"),
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
notify => Service["openvpn"],
|
||||
|
@ -40,7 +40,7 @@ class openvpn::client {
|
|||
file { "/etc/openvpn/ta.key":
|
||||
ensure => present,
|
||||
source => "puppet:///files/openvpn/ta.key",
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
require => Package["openvpn"],
|
||||
|
@ -48,7 +48,7 @@ class openvpn::client {
|
|||
file { "/etc/openvpn/ca.crt":
|
||||
ensure => present,
|
||||
source => "puppet:///files/openvpn/ca.crt",
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
require => Package["openvpn"],
|
||||
|
|
|
@ -35,7 +35,7 @@ class pam::mkhomedir {
|
|||
"ubuntu": {
|
||||
file { "/usr/share/pam-configs/pam_mkhomedir":
|
||||
source => "puppet:///modules/pam/pam_mkhomedir",
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
require => Package["libpam-runtime"],
|
||||
|
|
|
@ -12,7 +12,7 @@ class procmail {
|
|||
purge => true,
|
||||
force => true,
|
||||
recurse => true,
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
source => "puppet:///modules/custom/empty",
|
||||
|
@ -22,7 +22,7 @@ class procmail {
|
|||
|
||||
file { "/etc/procmailrc":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
require => Package["procmail"],
|
||||
|
@ -59,7 +59,7 @@ define procmail::rc($source = "AUTO") {
|
|||
"AUTO" => "puppet:///files/procmail/${name}",
|
||||
default => $source,
|
||||
},
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
notify => Exec["generate-procmailrc"],
|
||||
|
|
|
@ -50,9 +50,9 @@ class psacct::openbsd {
|
|||
|
||||
file { "/var/account/acct":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
group => wheel,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "wheel",
|
||||
notify => Exec["accton"],
|
||||
}
|
||||
|
||||
|
|
|
@ -21,14 +21,14 @@ class pulseaudio::server inherits pulseaudio::common {
|
|||
file { "/etc/init.d/pulseaudio":
|
||||
ensure => present,
|
||||
source => "puppet:///modules/pulseaudio/pulseaudio.init",
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
}
|
||||
file { "/etc/sysconfig/pulseaudio":
|
||||
ensure => present,
|
||||
source => "puppet:///modules/pulseaudio/pulseaudio.sysconfig.${operatingsystem}",
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
before => File["/etc/init.d/pulseaudio"],
|
||||
|
@ -39,7 +39,7 @@ class pulseaudio::server inherits pulseaudio::common {
|
|||
ensure => present,
|
||||
source => [ "puppet:///files/pulseaudio/system.pa.${fqdn}",
|
||||
"puppet:///files/pulseaudio/system.pa", ],
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
require => Package["pulseaudio"],
|
||||
|
|
|
@ -36,7 +36,7 @@ class puppet::client {
|
|||
file { "/etc/rc.d/puppetd":
|
||||
ensure => present,
|
||||
source => "puppet:///modules/puppet/puppetd.rc",
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => "root",
|
||||
group => "wheel",
|
||||
before => Service["puppet"],
|
||||
|
@ -48,8 +48,8 @@ class puppet::client {
|
|||
file { "/etc/puppet/puppet.conf":
|
||||
ensure => present,
|
||||
content => template("puppet/puppet.conf.erb"),
|
||||
mode => 0640,
|
||||
owner => root,
|
||||
mode => "0640",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
openbsd => "_puppet",
|
||||
default => "puppet",
|
||||
|
@ -82,9 +82,9 @@ class puppet::client {
|
|||
file { "/etc/default/puppet":
|
||||
ensure => present,
|
||||
source => "puppet:///modules/puppet/puppet.enabled.default",
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
notify => Service["puppet"],
|
||||
}
|
||||
}
|
||||
|
@ -101,11 +101,11 @@ class puppet::client {
|
|||
file { "/usr/local/sbin/puppet-check":
|
||||
ensure => present,
|
||||
source => "puppet:///modules/puppet/puppet-check",
|
||||
mode => 0755,
|
||||
owner => root,
|
||||
mode => "0755",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
openbsd => wheel,
|
||||
default => root,
|
||||
openbsd => "wheel",
|
||||
default => "root",
|
||||
},
|
||||
}
|
||||
cron { "puppet-check":
|
||||
|
@ -261,8 +261,8 @@ class puppet::server::common inherits puppet::client {
|
|||
if $puppet_datadir {
|
||||
file { $puppet_datadir:
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
owner => root,
|
||||
mode => "0755",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
"openbsd" => "wheel",
|
||||
default => "root",
|
||||
|
@ -279,8 +279,8 @@ class puppet::server::common inherits puppet::client {
|
|||
} else {
|
||||
file { "/srv/puppet":
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
owner => root,
|
||||
mode => "0755",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
"openbsd" => "wheel",
|
||||
default => "root",
|
||||
|
@ -306,7 +306,7 @@ class puppet::server::common inherits puppet::client {
|
|||
if $puppet_storeconfigs != "none" {
|
||||
file { "/srv/puppet/storeconfigs":
|
||||
ensure => directory,
|
||||
mode => 0750,
|
||||
mode => "0750",
|
||||
owner => $user,
|
||||
group => $group,
|
||||
seltype => "var_lib_t",
|
||||
|
@ -317,7 +317,7 @@ class puppet::server::common inherits puppet::client {
|
|||
"/srv/puppet/reports",
|
||||
"/srv/puppet/rrd", ]:
|
||||
ensure => directory,
|
||||
mode => 0750,
|
||||
mode => "0750",
|
||||
owner => $user,
|
||||
group => $group,
|
||||
seltype => "var_lib_t",
|
||||
|
@ -326,8 +326,8 @@ class puppet::server::common inherits puppet::client {
|
|||
file { [ "/srv/puppet/files",
|
||||
"/srv/puppet/templates" ]:
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
owner => root,
|
||||
mode => "0755",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
"openbsd" => "wheel",
|
||||
default => "root",
|
||||
|
@ -337,8 +337,8 @@ class puppet::server::common inherits puppet::client {
|
|||
}
|
||||
file { "/srv/puppet/files/common":
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
owner => root,
|
||||
mode => "0755",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
"openbsd" => "wheel",
|
||||
default => "root",
|
||||
|
@ -348,8 +348,8 @@ class puppet::server::common inherits puppet::client {
|
|||
}
|
||||
file { "/srv/puppet/files/private":
|
||||
ensure => directory,
|
||||
mode => 0750,
|
||||
owner => root,
|
||||
mode => "0750",
|
||||
owner => "root",
|
||||
group => $group,
|
||||
seltype => "var_lib_t",
|
||||
require => File["/srv/puppet/files"],
|
||||
|
@ -364,8 +364,8 @@ class puppet::server::common inherits puppet::client {
|
|||
source => [ "puppet:///files/puppet/tagmail.conf.${fqdn}",
|
||||
"puppet:///files/puppet/tagmail.conf",
|
||||
"puppet:///modules/puppet/tagmail.conf", ],
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
"openbsd" => "wheel",
|
||||
default => "root",
|
||||
|
@ -378,8 +378,8 @@ class puppet::server::common inherits puppet::client {
|
|||
source => [ "puppet:///files/puppet/fileserver.conf.${fqdn}",
|
||||
"puppet:///files/puppet/fileserver.conf",
|
||||
"puppet:///modules/puppet/fileserver.conf", ],
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
"openbsd" => "wheel",
|
||||
default => "root",
|
||||
|
@ -394,9 +394,9 @@ class puppet::server::common inherits puppet::client {
|
|||
file { "/etc/cron.daily/puppet-report-cleanup":
|
||||
ensure => present,
|
||||
content => template("puppet/puppet-report-cleanup.erb"),
|
||||
mode => 0755,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0755",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
require => File["/srv/puppet/reports"],
|
||||
}
|
||||
}
|
||||
|
@ -405,7 +405,7 @@ class puppet::server::common inherits puppet::client {
|
|||
file { "/usr/local/sbin/puppet-clean-storeconfigs":
|
||||
ensure => present,
|
||||
source => "puppet:///modules/puppet/puppet-clean-storeconfigs",
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
openbsd => "wheel",
|
||||
|
@ -459,9 +459,9 @@ class puppet::server::mongrel {
|
|||
file { "/etc/default/puppetmaster":
|
||||
ensure => present,
|
||||
content => template("puppet/puppetmaster.default.erb"),
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
notify => Service["puppetmaster"],
|
||||
}
|
||||
}
|
||||
|
@ -469,9 +469,9 @@ class puppet::server::mongrel {
|
|||
file { "/etc/sysconfig/puppetmaster":
|
||||
ensure => present,
|
||||
content => template("puppet/puppetmaster.sysconfig.erb"),
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
notify => Service["puppetmaster"],
|
||||
}
|
||||
}
|
||||
|
@ -559,9 +559,9 @@ class puppet::opencollab {
|
|||
|
||||
file { "/etc/puppet/opencollab.conf":
|
||||
ensure => present,
|
||||
mode => 0600,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0600",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
content => "[creds]\nurl = ${puppet_opencollab_url}\nusername = ${puppet_opencollab_user}\npassword = ${puppet_opencollab_pass}\n",
|
||||
}
|
||||
|
||||
|
|
|
@ -17,7 +17,7 @@ class rsync::run-rsync {
|
|||
ensure => present,
|
||||
source => [ "puppet:///files/run-rsync/${homename}-RunRsyncConfig.pm",
|
||||
"/etc/run-rsync/RunRsyncConfig.pm", ],
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
}
|
||||
|
|
|
@ -61,11 +61,11 @@ class samba::server {
|
|||
ensure => present,
|
||||
source => [ "puppet:///files/samba/smb.conf.${fqdn}",
|
||||
"puppet:///files/samba/smb.conf", ],
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
openbsd => wheel,
|
||||
default => root,
|
||||
openbsd => "wheel",
|
||||
default => "root",
|
||||
},
|
||||
require => Package["samba"],
|
||||
}
|
||||
|
@ -75,11 +75,11 @@ class samba::server {
|
|||
source => [ "puppet:///files/samba/lmhosts.${fqdn}",
|
||||
"puppet:///files/samba/lmhosts",
|
||||
"puppet:///modules/samba/lmhosts", ],
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
openbsd => wheel,
|
||||
default => root,
|
||||
openbsd => "wheel",
|
||||
default => "root",
|
||||
},
|
||||
require => Package["samba"],
|
||||
}
|
||||
|
@ -96,9 +96,9 @@ class samba::bdc {
|
|||
file { "/etc/cron.hourly/sync-netlogon.sh":
|
||||
ensure => present,
|
||||
source => "puppet:///modules/samba/sync-netlogon.sh",
|
||||
mode => 0755,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0755",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
}
|
||||
|
||||
}
|
||||
|
|
|
@ -14,9 +14,9 @@ class saslauthd::server {
|
|||
|
||||
file { "/etc/sasldb2":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
require => Exec["generate-sasldb2"],
|
||||
}
|
||||
exec { "generate-sasldb2":
|
||||
|
@ -54,9 +54,9 @@ define saslauthd::service() {
|
|||
"puppet:///files/saslauthd/${name}.conf",
|
||||
"puppet:///files/saslauthd/service.conf",
|
||||
"puppet:///modules/saslauthd/service.conf", ],
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
require => Service["saslauthd"],
|
||||
}
|
||||
|
||||
|
|
|
@ -30,9 +30,9 @@ class selinux {
|
|||
file { "/etc/selinux/config":
|
||||
ensure => present,
|
||||
content => template("selinux/config.erb"),
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
require => Package["selinux-policy-targeted"],
|
||||
notify => Exec["set-selinux-mode"],
|
||||
}
|
||||
|
|
|
@ -25,7 +25,7 @@ class sendmail::common {
|
|||
content => "DAEMON=no\nQUEUE=1h\n",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
notify => Service["sendmail"],
|
||||
}
|
||||
}
|
||||
|
@ -59,7 +59,7 @@ class sendmail::client inherits sendmail::common {
|
|||
"openbsd" => "bin",
|
||||
default => "root",
|
||||
},
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
notify => Exec["make submit.cf"],
|
||||
require => $operatingsystem ? {
|
||||
"openbsd" => undef,
|
||||
|
@ -88,7 +88,7 @@ class sendmail::client inherits sendmail::common {
|
|||
"ubuntu" => "smmsp",
|
||||
default => "root",
|
||||
},
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
source => $operatingsystem ? {
|
||||
"openbsd" => "/usr/share/sendmail/cf/submit.cf",
|
||||
default => undef,
|
||||
|
@ -141,7 +141,7 @@ class sendmail::server inherits sendmail::common {
|
|||
content => template("sendmail/sendmail.mc.erb"),
|
||||
owner => "root",
|
||||
group => $group,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
notify => Exec["make sendmail.cf"],
|
||||
}
|
||||
|
||||
|
@ -150,7 +150,7 @@ class sendmail::server inherits sendmail::common {
|
|||
notify => Exec["newaliases"],
|
||||
owner => "root",
|
||||
group => $group,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
}
|
||||
|
||||
exec { "make sendmail.cf":
|
||||
|
@ -170,7 +170,7 @@ class sendmail::server inherits sendmail::common {
|
|||
ensure => present,
|
||||
owner => "root",
|
||||
group => $group,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
source => $operatingsystem ? {
|
||||
openbsd => "/usr/share/sendmail/cf/sendmail.cf",
|
||||
default => undef,
|
||||
|
|
|
@ -4,7 +4,7 @@ class ssh::known_hosts {
|
|||
|
||||
file { "/etc/ssh/ssh_known_hosts":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => $operatingsystem ? {
|
||||
OpenBSD => wheel,
|
||||
|
@ -32,7 +32,7 @@ class ssh::hostkeys {
|
|||
file { "/etc/ssh/ssh_host_dsa_key":
|
||||
ensure => present,
|
||||
source => "puppet:///private/ssh_host_dsa_key",
|
||||
mode => 0600,
|
||||
mode => "0600",
|
||||
owner => root,
|
||||
group => $operatingsystem ? {
|
||||
openbsd => wheel,
|
||||
|
@ -42,7 +42,7 @@ class ssh::hostkeys {
|
|||
file { "/etc/ssh/ssh_host_dsa_key.pub":
|
||||
ensure => present,
|
||||
source => "puppet:///private/ssh_host_dsa_key.pub",
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => $operatingsystem ? {
|
||||
openbsd => wheel,
|
||||
|
@ -53,7 +53,7 @@ class ssh::hostkeys {
|
|||
file { "/etc/ssh/ssh_host_rsa_key":
|
||||
ensure => present,
|
||||
source => "puppet:///private/ssh_host_rsa_key",
|
||||
mode => 0600,
|
||||
mode => "0600",
|
||||
owner => root,
|
||||
group => $operatingsystem ? {
|
||||
openbsd => wheel,
|
||||
|
@ -63,7 +63,7 @@ class ssh::hostkeys {
|
|||
file { "/etc/ssh/ssh_host_rsa_key.pub":
|
||||
ensure => present,
|
||||
source => "puppet:///private/ssh_host_rsa_key.pub",
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => $operatingsystem ? {
|
||||
openbsd => wheel,
|
||||
|
@ -74,7 +74,7 @@ class ssh::hostkeys {
|
|||
file { "/etc/ssh/ssh_host_key":
|
||||
ensure => present,
|
||||
source => "puppet:///private/ssh_host_key",
|
||||
mode => 0600,
|
||||
mode => "0600",
|
||||
owner => root,
|
||||
group => $operatingsystem ? {
|
||||
openbsd => wheel,
|
||||
|
@ -84,7 +84,7 @@ class ssh::hostkeys {
|
|||
file { "/etc/ssh/ssh_host_key.pub":
|
||||
ensure => present,
|
||||
source => "puppet:///private/ssh_host_key.pub",
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => $operatingsystem ? {
|
||||
openbsd => wheel,
|
||||
|
@ -112,7 +112,7 @@ class ssh::disable {
|
|||
}
|
||||
file { "/etc/init/ssh.conf":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
source => "puppet:///modules/ssh/ssh.disabled.conf",
|
||||
|
|
|
@ -11,7 +11,7 @@ class sudo {
|
|||
|
||||
file { "/etc/sudoers.d":
|
||||
ensure => directory,
|
||||
mode => 0440,
|
||||
mode => "0440",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
"openbsd" => "wheel",
|
||||
|
@ -25,7 +25,7 @@ class sudo {
|
|||
|
||||
file { "/etc/sudoers":
|
||||
ensure => present,
|
||||
mode => 0440,
|
||||
mode => "0440",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
"openbsd" => "wheel",
|
||||
|
@ -54,7 +54,7 @@ define sudo::sudoer($where="ALL", $as_whom="ALL", $what="ALL") {
|
|||
|
||||
file { "/etc/sudoers.d/${name}":
|
||||
ensure => present,
|
||||
mode => 0440,
|
||||
mode => "0440",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
"openbsd" => "wheel",
|
||||
|
|
|
@ -8,7 +8,7 @@ class svn::client {
|
|||
|
||||
file { "/etc/subversion/servers":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
content => template("svn/servers.erb"),
|
||||
|
|
|
@ -40,7 +40,7 @@ class syslog::common {
|
|||
"linux": {
|
||||
file { "/etc/logrotate.d/syslog.all":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
content => template("syslog/logrotate.erb"),
|
||||
|
@ -92,7 +92,7 @@ class syslog::client::syslogd {
|
|||
|
||||
file { "/var/log/all.log":
|
||||
ensure => present,
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => "root",
|
||||
group => $group,
|
||||
notify => Service["syslogd"],
|
||||
|
@ -102,7 +102,7 @@ class syslog::client::syslogd {
|
|||
ensure => present,
|
||||
content => template("syslog/syslog.conf.$operatingsystem.erb",
|
||||
"syslog/syslog.conf.client.erb"),
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
"openbsd" => "wheel",
|
||||
|
@ -151,7 +151,7 @@ class syslog::client::rsyslog {
|
|||
content => template("syslog/rsyslog.conf.erb",
|
||||
"syslog/syslog.conf.$operatingsystem.erb",
|
||||
"syslog/syslog.conf.client.erb"),
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
"openbsd" => "wheel",
|
||||
|
@ -176,7 +176,7 @@ class syslog::client::rsyslog {
|
|||
if $operatingsystem == "OpenBSD" and $operatingsystemrelease !~ /4\.[1-8]/ {
|
||||
file { "/etc/rc.d/syslogd":
|
||||
ensure => present,
|
||||
mode => 0555,
|
||||
mode => "0555",
|
||||
owner => "root",
|
||||
group => "wheel",
|
||||
source => "puppet:///modules/syslog/rsyslogd.rc",
|
||||
|
@ -203,7 +203,7 @@ class syslog::common::standalone inherits syslog::common {
|
|||
if $syslog_datadir {
|
||||
file { $syslog_datadir:
|
||||
ensure => directory,
|
||||
mode => 2750,
|
||||
mode => "2750",
|
||||
owner => "root",
|
||||
group => $group,
|
||||
seltype => "var_log_t",
|
||||
|
@ -219,7 +219,7 @@ class syslog::common::standalone inherits syslog::common {
|
|||
} else {
|
||||
file { "/srv/log":
|
||||
ensure => directory,
|
||||
mode => 2750,
|
||||
mode => "2750",
|
||||
owner => "root",
|
||||
group => $group,
|
||||
seltype => "var_log_t",
|
||||
|
@ -228,7 +228,7 @@ class syslog::common::standalone inherits syslog::common {
|
|||
|
||||
file { "/srv/log/archive":
|
||||
ensure => directory,
|
||||
mode => 2750,
|
||||
mode => "2750",
|
||||
owner => "root",
|
||||
group => $group,
|
||||
require => File["/srv/log"],
|
||||
|
@ -256,7 +256,7 @@ class syslog::common::standalone inherits syslog::common {
|
|||
file { "/usr/local/sbin/logarchiver.sh":
|
||||
ensure => present,
|
||||
source => "puppet:///modules/syslog/logarchiver.sh",
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
"openbsd" => "wheel",
|
||||
|
|
|
@ -11,8 +11,8 @@ class tftp::server {
|
|||
if $tftp_datadir {
|
||||
file { $tftp_datadir:
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
owner => root,
|
||||
mode => "0755",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
openbsd => "wheel",
|
||||
default => "root",
|
||||
|
@ -28,7 +28,7 @@ class tftp::server {
|
|||
} else {
|
||||
file { "/srv/tftpboot":
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
"openbsd" => "wheel",
|
||||
|
|
|
@ -17,7 +17,7 @@ class time::server {
|
|||
class time::zone {
|
||||
file { "/etc/localtime":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
source => "/usr/share/zoneinfo/$timezone_set"
|
||||
}
|
||||
|
||||
|
@ -25,14 +25,14 @@ class time::zone {
|
|||
centos,redhat: {
|
||||
file { "/etc/sysconfig/clock":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
content => template("time/sysconfig_clock.erb"),
|
||||
}
|
||||
}
|
||||
ubuntu: {
|
||||
file { "/etc/timezone":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
content => "$timezone_set\n",
|
||||
}
|
||||
}
|
||||
|
|
|
@ -4,7 +4,7 @@ class user::system {
|
|||
|
||||
file { "/var/empty":
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
"openbsd" => "wheel",
|
||||
|
|
|
@ -37,7 +37,7 @@ define util::extract::tar($source, $ensure=present, $strip=0, $preserve=false) {
|
|||
|
||||
file { $name:
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
"openbsd" => "wheel",
|
||||
|
@ -106,7 +106,7 @@ define util::extract::zip($source, $ensure=present) {
|
|||
|
||||
file { $name:
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
}
|
||||
|
|
|
@ -15,7 +15,7 @@ define vmware::bundle() {
|
|||
ensure => present,
|
||||
source => "puppet:///files/packages/${name}.${architecture}.bundle",
|
||||
links => follow,
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
}
|
||||
|
|
|
@ -40,7 +40,7 @@ class vmware::server {
|
|||
if $vmware_admin_group {
|
||||
file { "/etc/vmware/ssl/rui.key":
|
||||
ensure => present,
|
||||
mode => 0640,
|
||||
mode => "0640",
|
||||
owner => root,
|
||||
group => $vmware_admin_group,
|
||||
require => [ Service["vmware"],
|
||||
|
@ -76,7 +76,7 @@ class vmware::server::scripts {
|
|||
file { "/usr/local/sbin/${name}":
|
||||
ensure => present,
|
||||
source => "puppet:///modules/vmware/scripts/${name}",
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
}
|
||||
|
@ -85,7 +85,7 @@ class vmware::server::scripts {
|
|||
file { "/usr/local/lib/vmware.sh":
|
||||
ensure => present,
|
||||
source => "puppet:///modules/vmware/scripts/vmware.sh",
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => root,
|
||||
group => root,
|
||||
}
|
||||
|
@ -113,14 +113,14 @@ class vmware::server::vmfs {
|
|||
|
||||
file { "/vmfs":
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
require => Package["VMware-server"],
|
||||
}
|
||||
file { "/vmfs/volumes":
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
mode => "0755",
|
||||
owner => root,
|
||||
group => root,
|
||||
require => File["/vmfs"],
|
||||
|
@ -176,8 +176,8 @@ define vmware::server::datastore($device, $type = "auto", $options = "defaults")
|
|||
file { "/vmfs/volumes/${name}":
|
||||
ensure => directory,
|
||||
mode => $fstype ? {
|
||||
nfs => 0755,
|
||||
default => 0775,
|
||||
nfs => "0755",
|
||||
default => "0775",
|
||||
},
|
||||
owner => root,
|
||||
group => $fstype ? {
|
||||
|
|
|
@ -25,7 +25,7 @@ class vsroom {
|
|||
|
||||
file { "/usr/local/src/vsroom.tar.gz":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
source => "puppet:///files/packages/${vsroom_package}",
|
||||
|
@ -46,7 +46,7 @@ class vsroom {
|
|||
if $vsroom_datadir {
|
||||
file { $vsroom_datadir:
|
||||
ensure => directory,
|
||||
mode => 0750,
|
||||
mode => "0750",
|
||||
owner => "root",
|
||||
group => "vsroom",
|
||||
}
|
||||
|
@ -59,7 +59,7 @@ class vsroom {
|
|||
} else {
|
||||
file { "/var/lib/vsroom":
|
||||
ensure => directory,
|
||||
mode => 0750,
|
||||
mode => "0750",
|
||||
owner => "root",
|
||||
group => "vsroom",
|
||||
}
|
||||
|
@ -72,7 +72,7 @@ class vsroom {
|
|||
|
||||
file { "${htdocs}/config.json":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
source => [ "puppet:///files/vsroom/config.json.${fqdn}",
|
||||
|
|
|
@ -14,17 +14,17 @@ class wiki::moin {
|
|||
|
||||
file { "/usr/local/src/moin.tar.gz":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
source => "puppet:///files/packages/${moin_package}",
|
||||
links => follow,
|
||||
}
|
||||
file { "/usr/local/src/moin.patch":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
source => "puppet:///files/packages/${moin_patch}",
|
||||
links => follow,
|
||||
}
|
||||
|
@ -49,7 +49,7 @@ class wiki::moin {
|
|||
|
||||
file { "${shared}/htdocs/.htaccess":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
content => "SetHandler None\n",
|
||||
|
@ -73,7 +73,7 @@ class wiki::graphingwiki::common {
|
|||
|
||||
file { "/usr/local/src/graphingwiki.tar.gz":
|
||||
ensure => directory,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => $operatingsystem ? {
|
||||
"openbsd" => "wheel",
|
||||
|
@ -173,9 +173,9 @@ class wiki::collab::base {
|
|||
if $wiki_datadir {
|
||||
file { $wiki_datadir:
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0755",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
}
|
||||
|
||||
file { "/srv/wikis":
|
||||
|
@ -186,9 +186,9 @@ class wiki::collab::base {
|
|||
} else {
|
||||
file { "/srv/wikis":
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0755",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -204,9 +204,9 @@ class wiki::collab::base {
|
|||
"/srv/wikis/collab/wikis",
|
||||
"/srv/wikis/collab/run", ]:
|
||||
ensure => directory,
|
||||
mode => 2660,
|
||||
owner => collab,
|
||||
group => collab,
|
||||
mode => "2660",
|
||||
owner => "collab",
|
||||
group => "collab",
|
||||
require => [ File["/srv/wikis"], User["collab"], Group["collab"],
|
||||
Python::Setup::Install["/usr/local/src/graphingwiki/collab"],
|
||||
Python::Setup::Install["/usr/local/src/moin"], ],
|
||||
|
@ -223,9 +223,9 @@ class wiki::collab::base {
|
|||
|
||||
file { "/srv/wikis/collab/config/collabfarm.py":
|
||||
ensure => present,
|
||||
mode => 0660,
|
||||
owner => collab,
|
||||
group => collab,
|
||||
mode => "0660",
|
||||
owner => "collab",
|
||||
group => "collab",
|
||||
source => [ "puppet:///private/wiki/collabfarm.py",
|
||||
"puppet:///files/wiki/collabfarm.py",
|
||||
"/usr/local/src/graphingwiki/collab/config/collabfarm.py", ],
|
||||
|
@ -235,9 +235,9 @@ class wiki::collab::base {
|
|||
|
||||
file { "/srv/wikis/collab/config/intermap.txt":
|
||||
ensure => present,
|
||||
mode => 0660,
|
||||
owner => collab,
|
||||
group => collab,
|
||||
mode => "0660",
|
||||
owner => "collab",
|
||||
group => "collab",
|
||||
source => "/usr/local/src/graphingwiki/collab/config/intermap.txt",
|
||||
replace => false,
|
||||
require => File["/srv/wikis/collab/config"],
|
||||
|
@ -245,9 +245,9 @@ class wiki::collab::base {
|
|||
|
||||
file { "/srv/wikis/collab/config/logging.conf":
|
||||
ensure => present,
|
||||
mode => 0660,
|
||||
owner => collab,
|
||||
group => collab,
|
||||
mode => "0660",
|
||||
owner => "collab",
|
||||
group => "collab",
|
||||
source => "/usr/local/src/graphingwiki/collab/config/logging.conf",
|
||||
replace => false,
|
||||
require => File["/srv/wikis/collab/config"],
|
||||
|
@ -255,9 +255,9 @@ class wiki::collab::base {
|
|||
|
||||
file { "/srv/wikis/collab/htdocs/.htaccess":
|
||||
ensure => present,
|
||||
mode => 0660,
|
||||
owner => collab,
|
||||
group => collab,
|
||||
mode => "0660",
|
||||
owner => "collab",
|
||||
group => "collab",
|
||||
source => "puppet:///modules/wiki/htaccess",
|
||||
replace => false,
|
||||
require => File["/srv/wikis/collab/htdocs"],
|
||||
|
@ -265,9 +265,9 @@ class wiki::collab::base {
|
|||
|
||||
file { [ "/etc/local", "/etc/local/collab" ]:
|
||||
ensure => directory,
|
||||
mode => 0755,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0755",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
}
|
||||
|
||||
if $collab_jabberdomain and !$collab_conferencedomain {
|
||||
|
@ -276,9 +276,9 @@ class wiki::collab::base {
|
|||
|
||||
file { "/etc/local/collab/collab.ini":
|
||||
ensure => present,
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
content => template("wiki/collab.ini.erb"),
|
||||
require => File["/etc/local/collab"],
|
||||
}
|
||||
|
|
|
@ -12,9 +12,9 @@ class yum::updatesd {
|
|||
source => [ "puppet:///files/yum/yum-updatesd.conf.${fqdn}",
|
||||
"puppet:///files/yum/yum-updatesd.conf",
|
||||
"puppet:///modules/yum/yum-updatesd.conf", ],
|
||||
mode => 0644,
|
||||
owner => root,
|
||||
group => root,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
notify => Service["yum-updatesd"],
|
||||
}
|
||||
|
||||
|
@ -121,7 +121,7 @@ define yum::repo($baseurl="", $mirrorlist="", $descr="", $gpgkey="") {
|
|||
file { "/etc/pki/rpm-gpg/RPM-GPG-KEY-${name}":
|
||||
ensure => present,
|
||||
source => $gpgkey,
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
before => File["/etc/yum.repos.d/${name}.repo"],
|
||||
|
@ -140,7 +140,7 @@ define yum::repo($baseurl="", $mirrorlist="", $descr="", $gpgkey="") {
|
|||
file { "/etc/yum.repos.d/${name}.repo":
|
||||
ensure => present,
|
||||
content => template("yum/yum.repo.erb"),
|
||||
mode => 0644,
|
||||
mode => "0644",
|
||||
owner => "root",
|
||||
group => "root",
|
||||
}
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue