}
file { "/etc/default/locale":
- source => [ "puppet://$server/files/etc/default/locale",
- "puppet://$server/modules/nodo/etc/default/locale" ],
+ source => [ "puppet:///modules/site-nodo/etc/default/locale",
+ "puppet:///modules/nodo/etc/default/locale" ],
ensure => present,
owner => root,
group => root,
}
file { "/etc/locale.gen":
- source => [ "puppet://$server/files/etc/locale.gen",
- "puppet://$server/modules/nodo/etc/locale.gen" ],
+ source => [ "puppet:///modules/site-nodo/etc/locale.gen",
+ "puppet:///modules/nodo/etc/locale.gen" ],
ensure => present,
owner => root,
group => root,
group => "root",
mode => 0644,
ensure => present,
- source => "puppet://$server/modules/nodo/etc/modprobe.d/blacklist.conf",
+ source => "puppet:///modules/nodo/etc/modprobe.d/blacklist.conf",
}
}
default: {
group => "root",
mode => 0644,
ensure => present,
- source => "puppet://$server/modules/nodo/etc/modprobe.d/blacklist.conf",
+ source => "puppet:///modules/nodo/etc/modprobe.d/blacklist.conf",
}
}
}
group => "root",
mode => 0644,
ensure => present,
- source => "puppet://$server/modules/nodo/etc/modules/laptop",
+ source => "puppet:///modules/nodo/etc/modules/laptop",
}
# see http://wiki.debian.org/DebianAcerOne#Cardreader
group => "root",
mode => 0644,
ensure => present,
- source => "puppet://$server/modules/nodo/etc/modprobe.d/aspire-blacklist-memstick.conf",
+ source => "puppet:///modules/nodo/etc/modprobe.d/aspire-blacklist-memstick.conf",
}
}
if $pam != false {
# pam - login
file { "/etc/pam.d/login":
- source => [ "puppet://$server/modules/nodo/etc/pam.d/login.${lsbdistcodename}",
- "puppet://$server/modules/nodo/etc/pam.d/login",
+ source => [ "puppet:///modules/nodo/etc/pam.d/login.${lsbdistcodename}",
+ "puppet:///modules/nodo/etc/pam.d/login",
],
owner => "root",
group => "root",
# pam - gdm
file { "/etc/pam.d/gdm":
- source => "puppet://$server/modules/nodo/etc/pam.d/gdm",
+ source => "puppet:///modules/nodo/etc/pam.d/gdm",
owner => "root",
group => "root",
mode => 0644,
owner => root,
group => root,
mode => 0644,
- source => [ "puppet://$server/files/etc/security/pam_mount.conf.xml.$lsbdistcodename",
- "puppet://$server/files/etc/security/pam_mount.conf.xml",
+ source => [ "puppet:///modules/site-nodo/security/pam_mount.conf.xml.$lsbdistcodename",
+ "puppet:///modules/site-nodo/security/pam_mount.conf.xml",
],
}
}
}
file { "/etc/sudoers":
- source => [ "puppet://$server/files/etc/sudoers/$hostname",
- "puppet://$server/modules/nodo/etc/sudoers" ],
+ source => [ "puppet:///modules/site-nodo/etc/sudoers/$hostname",
+ "puppet:///modules/nodo/etc/sudoers" ],
owner => "root",
group => "root",
mode => 440,
mode => 0644,
owner => 0,
group => 0,
- source => "puppet://$server/files/keys/${user}_id_${keytype}.pub",
+ source => "puppet:///modules/site-keys/${user}_id_${keytype}.pub",
require => File["${ssh_dir}"],
tag => "$tag",
}
owner => root,
group => root,
mode => 0644,
- source => [ "puppet://$server/files/etc/X11/xorg.conf/$hostname",
- "puppet://$server/files/etc/X11/xorg.conf.default" ],
+ source => [ "puppet:///modules/site-nodo/X11/xorg.conf/$hostname",
+ "puppet:///modules/site-nodo/X11/xorg.conf.default" ],
}
}
}
# Some nodes need a lot of space at /tmp otherwise some admin
# tasks like backups might not run.
file { "/etc/vservers/${name}/fstab":
- source => [ "puppet://$server/files/etc/fstab/vserver/$name",
- "puppet://$server/modules/nodo/etc/fstab/vserver" ],
+ source => [ "puppet:///modules/site-nodo/etc/fstab/vserver/$name",
+ "puppet:///modules/nodo/etc/fstab/vserver" ],
owner => "root",
group => "root",
mode => 0644,
if !defined(File["/usr/local/sbin/create-sound-devices"]) {
file { "/usr/local/sbin/create-sound-devices":
ensure => present,
- source => "puppet://$server/modules/nodo/sound/devices.sh",
+ source => "puppet:///modules/nodo/sound/devices.sh",
owner => root,
group => root,
mode => 755,