file { '/etc/ssl/servicecerts':
ensure => directory,
source => 'puppet:///modules/ssl/servicecerts/',
- mode => '0644',
+ mode => '0644', # this works; otherwise all files are +x
purge => true,
recurse => true,
force => true,
file { '/etc/ssl/debian':
ensure => directory,
source => 'puppet:///files/empty/',
- mode => '0644',
+ mode => '0644', # this works; otherwise all files are +x
purge => true,
recurse => true,
force => true,
}
file { '/etc/ssl/debian/certs/thishost.crt':
source => "puppet:///modules/ssl/clientcerts/${::fqdn}.client.crt",
- notify => Exec['c_rehash /etc/ssl/debian/certs'],
+ notify => Exec['refresh_debian_hashes'],
}
file { '/etc/ssl/debian/keys/thishost.key':
source => "puppet:///modules/ssl/clientcerts/${::fqdn}.key",
}
file { '/etc/ssl/debian/certs/ca.crt':
source => 'puppet:///modules/ssl/clientcerts/ca.crt',
- notify => Exec['c_rehash /etc/ssl/debian/certs'],
+ notify => Exec['refresh_debian_hashes'],
}
file { '/etc/ssl/debian/crls/ca.crl':
source => 'puppet:///modules/ssl/clientcerts/ca.crl',
}
file { '/etc/ssl/debian/certs/thishost-server.crt':
source => "puppet:///modules/exim/certs/${::fqdn}.crt",
- notify => Exec['c_rehash /etc/ssl/debian/certs'],
+ notify => Exec['refresh_debian_hashes'],
}
file { '/etc/ssl/debian/keys/thishost-server.key':
source => "puppet:///modules/exim/certs/${::fqdn}.key",
notify => Exec['refresh_normal_hashes'], # see NOTE 1
}
exec { 'modify_configuration':
- command => "sed -i -e 's#!${cacert}#${cacert}' ${caconf}",
+ command => "sed -i -e 's#!${cacert}#${cacert}#' ${caconf}",
onlyif => "grep -Fqx '!${cacert}' ${caconf}",
notify => Exec['refresh_normal_hashes'],
require => Package['ca-certificates'],
}
- exec { 'c_rehash /etc/ssl/debian/certs': # refresh_debian_hashes
+ exec { 'refresh_debian_hashes':
+ command => 'c_rehash /etc/ssl/debian/certs',
refreshonly => true,
require => Package['openssl'],
}