ensure => present,
owner => root,
group => root,
- mode => 0644,
+ mode => '0644',
source => "puppet:///modules/mail/amavisd/05-domain_id",
notify => Service['amavis'],
}
ensure => present,
owner => root,
group => root,
- mode => 0644,
+ mode => '0644',
source => "puppet:///modules/mail/amavisd/15-content_filter_mode",
notify => Service['amavis'],
}
ensure => present,
owner => root,
group => root,
- mode => 0644,
+ mode => '0644',
source => "puppet:///modules/mail/amavisd/20-debian_defaults",
notify => Service['amavis'],
}
ensure => present,
owner => root,
group => root,
- mode => 0644,
+ mode => '0644',
source => "puppet:///modules/mail/amavisd/50-user",
notify => Service['amavis'],
}
ensure => present,
owner => root,
group => root,
- mode => 0644,
+ mode => '0644',
content => template('mail/amavisd/05-node_id.erb'),
notify => Service['amavis'],
}
ensure => present,
owner => root,
group => vmail,
- mode => 0644,
+ mode => '0644',
content => template("mail/dovecot/dovecot.conf.${::lsbdistcodename}.erb"),
notify => Service['dovecot'],
}
ensure => present,
owner => root,
group => root,
- mode => 0600,
+ mode => '0600',
content => template('mail/dovecot/dovecot-sql.conf.erb'),
notify => Service['dovecot'],
}
ensure => present,
owner => firma,
group => firma,
- mode => 0600,
+ mode => '0600',
require => Vcsrepo['/var/lib/firma'],
source => "puppet:///modules/mail/firma/firma.conf",
}
ensure => present,
owner => gpg_mailgate,
group => gpg_mailgate,
- mode => 0600,
+ mode => '0600',
require => Vcsrepo['/var/lib/gpg_mailgate'],
source => [ "puppet:///modules/site_mail/gpg_mailgate/gpg-mailgate.conf",
"puppet:///modules/mail/gpg_mailgate/gpg-mailgate.conf" ],
ensure => directory,
owner => 'debian-tor',
group => 'debian-tor',
- mode => 0700,
+ mode => '0700',
}
}
ensure => directory,
owner => mlmmj,
group => mlmmj,
- mode => 0750,
+ mode => '0750',
require => User['mlmmj'],
}
ensure => directory,
owner => mlmmj,
group => mlmmj,
- mode => 0640,
+ mode => '0640',
}
file { '/etc/mlmmj-php-web-admin/htpasswd':
ensure => present,
owner => mlmmj,
group => mlmmj,
- mode => 0640,
+ mode => '0640',
content => hiera('mail::mlmmj::web::htpasswd', ''),
}
}
ensure => present,
owner => root,
group => root,
- mode => 0644,
+ mode => '0644',
source => "puppet:///modules/mail/opendkim/default",
require => Package['opendkim'],
notify => Service['opendkim'],
ensure => present,
owner => root,
group => root,
- mode => 0644,
+ mode => '0644',
source => [ "puppet:///modules/site_mail/opendkim/opendkim.conf",
"puppet:///modules/mail/opendkim/opendkim.conf" ],
require => Package['opendkim'],
ensure => directory,
owner => root,
group => root,
- mode => 0644,
+ mode => '0644',
require => Package['opendkim'],
}
ensure => directory,
owner => opendkim,
group => opendkim,
- mode => 0750,
+ mode => '0750',
require => File['/etc/opendkim'],
}
ensure => present,
owner => root,
group => root,
- mode => 0644,
+ mode => '0644',
source => [ "puppet:///modules/site_mail/opendkim/TrustedHosts",
"puppet:///modules/mail/opendkim/TrustedHosts" ],
require => File['/etc/opendkim'],
ensure => present,
owner => root,
group => root,
- mode => 0644,
+ mode => '0644',
source => [ "puppet:///modules/site_mail/opendkim/KeyTable",
"puppet:///modules/mail/opendkim/KeyTable" ],
require => File['/etc/opendkim'],
ensure => present,
owner => root,
group => root,
- mode => 0644,
+ mode => '0644',
source => [ "puppet:///modules/site_mail/opendkim/SigningTable",
"puppet:///modules/mail/opendkim/SigningTable" ],
require => File['/etc/opendkim'],
ensure => present,
owner => root,
group => root,
- mode => 0644,
+ mode => '0644',
source => "puppet:///modules/mail/spamassassin/default",
require => Package['spamassassin'],
}
ensure => present,
owner => root,
group => root,
- mode => 0644,
+ mode => '0644',
source => "puppet:///modules/mail/spamassassin/awl.pre",
require => Package['spamassassin'],
}
ensure => directory,
owner => postfix,
group => root,
- mode => 0755,
+ mode => '0755',
}
file { "/etc/sympa/sympa.conf":
ensure => present,
owner => sympa,
group => sympa,
- mode => 0640,
+ mode => '0640',
content => template("mail/sympa/sympa.conf.${::lsbdistcodename}.erb"),
require => [ File['/etc/sympa'], User['sympa'] ],
notify => Service['apache', 'sympa'],
ensure => present,
owner => sympa,
group => sympa,
- mode => 0640,
+ mode => '0640',
source => "puppet:///modules/mail/sympa/wwsympa.conf",
notify => Service['apache', 'sympa'],
}
ensure => directory,
owner => root,
group => root,
- mode => 0755,
+ mode => '0755',
}
file { "/etc/dbconfig-common/sympa.conf":
ensure => present,
owner => root,
group => root,
- mode => 0600,
+ mode => '0600',
content => template("mail/sympa/dbconfig-common.${::lsbdistcodename}.erb"),
require => File['/etc/dbconfig-common'],
}
ensure => present,
owner => root,
group => root,
- mode => 0644,
+ mode => '0644',
source => "puppet:///modules/mail/sympa/logrotate",
}
ensure => present,
owner => sympa,
group => sympa,
- mode => 0550,
+ mode => '0550',
content => "#!/bin/sh\n/usr/lib/cgi-bin/sympa/wwsympa.fcgi\n",
require => File["${apache::www_folder}/${sympa::subdomain}"],
}
ensure => directory,
owner => vmail,
group => vmail,
- mode => 0750,
+ mode => '0750',
require => User['vmail'],
}
ensure => directory,
owner => postfix,
group => root,
- mode => 0755,
+ mode => '0755',
}
file { "/etc/postfix/sql/mysql_virtual_domains_maps.cf":
ensure => present,
owner => postfix,
- mode => 0600,
+ mode => '0600',
content => template('mail/virtual/database/mysql_virtual_domains_maps.cf.erb'),
require => File['/etc/postfix/sql'],
}
file { "/etc/postfix/sql/mysql_virtual_alias_maps.cf":
ensure => present,
owner => postfix,
- mode => 0600,
+ mode => '0600',
content => template('mail/virtual/database/mysql_virtual_alias_maps.cf.erb'),
require => File['/etc/postfix/sql'],
}
file { "/etc/postfix/sql/mysql_virtual_alias_domain_maps.cf":
ensure => present,
owner => postfix,
- mode => 0600,
+ mode => '0600',
content => template('mail/virtual/database/mysql_virtual_alias_domain_maps.cf.erb'),
require => File['/etc/postfix/sql'],
}
file { "/etc/postfix/sql/mysql_virtual_alias_domain_catchall_maps.cf":
ensure => present,
owner => postfix,
- mode => 0600,
+ mode => '0600',
content => template('mail/virtual/database/mysql_virtual_alias_domain_catchall_maps.cf.erb'),
require => File['/etc/postfix/sql'],
}
file { "/etc/postfix/sql/mysql_virtual_mailbox_maps.cf":
ensure => present,
owner => postfix,
- mode => 0600,
+ mode => '0600',
content => template('mail/virtual/database/mysql_virtual_mailbox_maps.cf.erb'),
require => File['/etc/postfix/sql'],
}
file { "/etc/postfix/sql/mysql_virtual_alias_domain_mailbox_maps.cf":
ensure => present,
owner => postfix,
- mode => 0600,
+ mode => '0600',
content => template('mail/virtual/database/mysql_virtual_alias_domain_mailbox_maps.cf.erb'),
require => File['/etc/postfix/sql'],
}
#file { "/etc/postfix/mysql_virtual_mailbox_limit_maps.cf":
# ensure => present,
# owner => postfix,
- # mode => 0600,
+ # mode => '0600',
# content => template('mail/virtual/database/mysql_virtual_mailbox_limit_maps.cf.erb'),
# require => File['/etc/postfix/sql'],
#}
ensure => present,
owner => www-data,
group => root,
- mode => 0640,
+ mode => '0640',
content => template('mail/virtual/postfixadmin/config.inc.php.erb'),
#require => File["${apache::sites_folder}/postfixadmin/site"],
require => Package['postfixadmin'],
ensure => absent,
owner => root,
group => www-data,
- mode => 0640,
+ mode => '0640',
require => Package['roundcube'],
}
},
owner => root,
group => www-data,
- mode => 0640,
+ mode => '0640',
content => template('mail/virtual/roundcube/config.inc.php.erb'),
require => Package['roundcube'],
}
recurse => true,
owner => root,
group => root,
- mode => 0644,
+ mode => '0644',
source => "puppet:///modules/mail/roundcube/plugins/login_info",
require => Package['roundcube'],
}