diff --git a/CHANGELOG.md b/CHANGELOG.md index 3d05fe8..177b611 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -8,6 +8,16 @@ Changelog of Git Changelog.

No issue

+919531809c41d5a Jenkins Server 2017-07-21 15:24:59 +

+

recommit for updates in build 37

+ +

+8db53dcf334af1b Arne Teuke 2017-07-21 15:24:35 +

+

re-ordering

+ +

abeba0589d446de Jenkins Server 2017-07-21 15:18:35

recommit for updates in build 36

diff --git a/doc/_index.html b/doc/_index.html index 9e9640a..287db70 100644 --- a/doc/_index.html +++ b/doc/_index.html @@ -186,7 +186,7 @@ diff --git a/doc/file.README.html b/doc/file.README.html index ba17304..ec778fc 100644 --- a/doc/file.README.html +++ b/doc/file.README.html @@ -304,7 +304,7 @@ environments.

diff --git a/doc/index.html b/doc/index.html index 58426ca..ea50e11 100644 --- a/doc/index.html +++ b/doc/index.html @@ -304,7 +304,7 @@ environments.

diff --git a/doc/puppet_classes/cd_nagios.html b/doc/puppet_classes/cd_nagios.html index 6109d71..e36d674 100644 --- a/doc/puppet_classes/cd_nagios.html +++ b/doc/puppet_classes/cd_nagios.html @@ -139,7 +139,7 @@ class cd_nagios { diff --git a/doc/puppet_classes/cd_nagios_3A_3Acertbot_3A_3Aconfig.html b/doc/puppet_classes/cd_nagios_3A_3Acertbot_3A_3Aconfig.html index d6ab931..888eb0c 100644 --- a/doc/puppet_classes/cd_nagios_3A_3Acertbot_3A_3Aconfig.html +++ b/doc/puppet_classes/cd_nagios_3A_3Acertbot_3A_3Aconfig.html @@ -200,7 +200,13 @@ href="http://www.gnu.org/licenses">www.gnu.org/licenses/.

91 92 93 -94 +94 +95 +96 +97 +98 +99 +100
# File 'manifests/certbot/config.pp', line 23
@@ -222,6 +228,12 @@ class cd_nagios::certbot::config (
           creates   =>  '/etc/httpd/conf.d/.cert_created',
         }
 
+        exec { 'remove_nagios_conf':
+          command   =>  "rm -Rf ${ng_nagios_conf}",
+          creates   =>  '/etc/httpd/conf.d/.cert_created',
+          require   =>  Exec['remove_forward_vhost'],
+        }
+
         # create temp vhost file
 
         exec { 'create_temp_vhost':
@@ -231,7 +243,7 @@ class cd_nagios::certbot::config (
           provider  =>  'shell',
           creates   =>  '/etc/httpd/conf.d/.created',
           notify    =>  Service['httpd'],
-          require   =>  Exec['remove_forward_vhost'],
+          require   =>  Exec['remove_nagios_conf'],
         }
 
         # create cert
@@ -284,7 +296,7 @@ class cd_nagios::certbot::config (
 
 
       
diff --git a/doc/puppet_classes/cd_nagios_3A_3Aclient_3A_3Atarget.html b/doc/puppet_classes/cd_nagios_3A_3Aclient_3A_3Atarget.html
index aaf75aa..6550dfd 100644
--- a/doc/puppet_classes/cd_nagios_3A_3Aclient_3A_3Atarget.html
+++ b/doc/puppet_classes/cd_nagios_3A_3Aclient_3A_3Atarget.html
@@ -368,7 +368,7 @@ class cd_nagios::client::target (
 
 
       
diff --git a/doc/puppet_classes/cd_nagios_3A_3Afirewall_3A_3Aiptables.html b/doc/puppet_classes/cd_nagios_3A_3Afirewall_3A_3Aiptables.html
index f616e46..71f05ac 100644
--- a/doc/puppet_classes/cd_nagios_3A_3Afirewall_3A_3Aiptables.html
+++ b/doc/puppet_classes/cd_nagios_3A_3Afirewall_3A_3Aiptables.html
@@ -207,7 +207,7 @@ class cd_nagios::firewall::iptables (
 
 
       
diff --git a/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Aconfig.html b/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Aconfig.html
index 8544b85..96d8475 100644
--- a/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Aconfig.html
+++ b/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Aconfig.html
@@ -187,7 +187,7 @@ class cd_nagios::main::config (
 
 
       
diff --git a/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Adirs.html b/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Adirs.html
index 2b94de6..711662a 100644
--- a/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Adirs.html
+++ b/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Adirs.html
@@ -468,7 +468,7 @@ class cd_nagios::main::dirs (
 
 
       
diff --git a/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Ainstall.html b/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Ainstall.html
index 4f9458c..20a3649 100644
--- a/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Ainstall.html
+++ b/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Ainstall.html
@@ -235,7 +235,7 @@ class cd_nagios::main::install (
 
 
       
diff --git a/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Auser.html b/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Auser.html
index 2c998b9..45950ff 100644
--- a/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Auser.html
+++ b/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Auser.html
@@ -200,7 +200,7 @@ class cd_nagios::main::user (
 
 
       
diff --git a/doc/puppet_classes/cd_nagios_3A_3Aparams.html b/doc/puppet_classes/cd_nagios_3A_3Aparams.html
index e8dbcad..0b671f8 100644
--- a/doc/puppet_classes/cd_nagios_3A_3Aparams.html
+++ b/doc/puppet_classes/cd_nagios_3A_3Aparams.html
@@ -2313,7 +2313,7 @@ $ng_certbot_temp_file = '/etc/httpd/conf.d/certbot_temp.conf'
 
 
       
diff --git a/doc/puppet_classes/cd_nagios_3A_3Aselinux_3A_3Aconfig.html b/doc/puppet_classes/cd_nagios_3A_3Aselinux_3A_3Aconfig.html
index 8079307..6bbb2d1 100644
--- a/doc/puppet_classes/cd_nagios_3A_3Aselinux_3A_3Aconfig.html
+++ b/doc/puppet_classes/cd_nagios_3A_3Aselinux_3A_3Aconfig.html
@@ -249,7 +249,7 @@ class cd_nagios::selinux::config (
 
 
       
diff --git a/doc/puppet_classes/cd_nagios_3A_3Aserver_3A_3Aaccess_rules.html b/doc/puppet_classes/cd_nagios_3A_3Aserver_3A_3Aaccess_rules.html
index 25f8e45..1fd0278 100644
--- a/doc/puppet_classes/cd_nagios_3A_3Aserver_3A_3Aaccess_rules.html
+++ b/doc/puppet_classes/cd_nagios_3A_3Aserver_3A_3Aaccess_rules.html
@@ -195,7 +195,7 @@ class cd_nagios::server::access_rules (
 
 
       
diff --git a/doc/puppet_classes/cd_nagios_3A_3Aserver_3A_3Afiles.html b/doc/puppet_classes/cd_nagios_3A_3Aserver_3A_3Afiles.html
index 6678e28..4ed64f9 100644
--- a/doc/puppet_classes/cd_nagios_3A_3Aserver_3A_3Afiles.html
+++ b/doc/puppet_classes/cd_nagios_3A_3Aserver_3A_3Afiles.html
@@ -284,7 +284,10 @@ href="http://www.gnu.org/licenses">www.gnu.org/licenses/.

175 176 177 -178
+178 +179 +180 +181
# File 'manifests/server/files.pp', line 23
@@ -294,49 +297,36 @@ class cd_nagios::server::files (
 ) inherits cd_nagios::params {
 
   if $::fqdn == $ng_nagios_server {
-    if $ng_enable_certbot == true {
-      require cd_nagios::certbot::config
-      require cd_nagios::main::dirs
+    if $ng_use_https == true {
+      if $ng_enable_certbot == true {
 
-      # manage nagios.cfg
+        require cd_nagios::certbot::config
+        require cd_nagios::main::dirs
+
+        # manage nagios.cfg
 
 
-      # manage cgi.cfg
+        # manage cgi.cfg
 
-      file { $ng_cgi_cfg_file:
-        ensure    =>  file,
-        path      =>  $ng_cgi_cfg_file,
-        owner     =>  'root',
-        group     =>  'root',
-        mode      =>  '0644',
-        selrange  =>  s0,
-        selrole   =>  object_r,
-        seltype   =>  nagios_etc_t,
-        seluser   =>  system_u,
-        content   =>  template($ng_cgi_cfg_erb),
-        notify    =>  Service[$ng_service],
-      }
-
-      # manage nagios.conf for httpd
-
-      file { $ng_nagios_conf:
-        ensure    =>  file,
-        path      =>  $ng_nagios_conf,
-        owner     =>  'root',
-        group     =>  'root',
-        mode      =>  '0644',
-        selrange  =>  s0,
-        selrole   =>  object_r,
-        seltype   =>  httpd_config_t,
-        seluser   =>  system_u,
-        content   =>  template($ng_nagios_conf_erb),
-        notify    =>  Service[$ae_service],
-      }
-
-      if $ng_http_https_fw == true {
-        file { $ng_forward_conf:
+        file { $ng_cgi_cfg_file:
           ensure    =>  file,
-          path      =>  $ng_forward_conf,
+          path      =>  $ng_cgi_cfg_file,
+          owner     =>  'root',
+          group     =>  'root',
+          mode      =>  '0644',
+          selrange  =>  s0,
+          selrole   =>  object_r,
+          seltype   =>  nagios_etc_t,
+          seluser   =>  system_u,
+          content   =>  template($ng_cgi_cfg_erb),
+          notify    =>  Service[$ng_service],
+        }
+
+        # manage nagios.conf for httpd
+
+        file { $ng_nagios_conf:
+          ensure    =>  file,
+          path      =>  $ng_nagios_conf,
           owner     =>  'root',
           group     =>  'root',
           mode      =>  '0644',
@@ -344,26 +334,42 @@ class cd_nagios::server::files (
           selrole   =>  object_r,
           seltype   =>  httpd_config_t,
           seluser   =>  system_u,
-          content   =>  template($ng_forward_conf_erb),
+          content   =>  template($ng_nagios_conf_erb),
           notify    =>  Service[$ae_service],
         }
-      }
 
-      # manage welcome.conf for nagios web server
+        if $ng_http_https_fw == true {
+          file { $ng_forward_conf:
+            ensure    =>  file,
+            path      =>  $ng_forward_conf,
+            owner     =>  'root',
+            group     =>  'root',
+            mode      =>  '0644',
+            selrange  =>  s0,
+            selrole   =>  object_r,
+            seltype   =>  httpd_config_t,
+            seluser   =>  system_u,
+            content   =>  template($ng_forward_conf_erb),
+            notify    =>  Service[$ae_service],
+          }
+        }
 
-      if $ng_disable_welcome == true {
-        file { $ng_welcome_conf:
-          ensure    =>  file,
-          path      =>  $ng_welcome_conf,
-          owner     =>  'root',
-          group     =>  'root',
-          mode      =>  '0644',
-          selrange  =>  s0,
-          selrole   =>  object_r,
-          seltype   =>  httpd_config_t,
-          seluser   =>  system_u,
-          content   =>  template($ng_welcome_conf_erb),
-          notify    =>  Service[$ae_service],
+        # manage welcome.conf for nagios web server
+
+        if $ng_disable_welcome == true {
+          file { $ng_welcome_conf:
+            ensure    =>  file,
+            path      =>  $ng_welcome_conf,
+            owner     =>  'root',
+            group     =>  'root',
+            mode      =>  '0644',
+            selrange  =>  s0,
+            selrole   =>  object_r,
+            seltype   =>  httpd_config_t,
+            seluser   =>  system_u,
+            content   =>  template($ng_welcome_conf_erb),
+            notify    =>  Service[$ae_service],
+          }
         }
       }
     }
@@ -452,7 +458,7 @@ class cd_nagios::server::files (
 
 
       
diff --git a/doc/puppet_classes/cd_nagios_3A_3Aserver_3A_3Aservice.html b/doc/puppet_classes/cd_nagios_3A_3Aserver_3A_3Aservice.html
index d000904..015ee17 100644
--- a/doc/puppet_classes/cd_nagios_3A_3Aserver_3A_3Aservice.html
+++ b/doc/puppet_classes/cd_nagios_3A_3Aserver_3A_3Aservice.html
@@ -174,7 +174,7 @@ class cd_nagios::server::service (
 
 
       
diff --git a/doc/puppet_defined_types/cd_nagios_3A_3Aserver_3A_3Aaccess.html b/doc/puppet_defined_types/cd_nagios_3A_3Aserver_3A_3Aaccess.html
index c4418eb..646a425 100644
--- a/doc/puppet_defined_types/cd_nagios_3A_3Aserver_3A_3Aaccess.html
+++ b/doc/puppet_defined_types/cd_nagios_3A_3Aserver_3A_3Aaccess.html
@@ -220,7 +220,7 @@ $ng_service       = $::cd_nagios::params::ng_service
 
 
       
diff --git a/doc/top-level-namespace.html b/doc/top-level-namespace.html
index 203cc45..8a49ac2 100644
--- a/doc/top-level-namespace.html
+++ b/doc/top-level-namespace.html
@@ -90,7 +90,7 @@
 
 
       
diff --git a/manifests/certbot/config.pp b/manifests/certbot/config.pp
index 3027474..568bcdb 100644
--- a/manifests/certbot/config.pp
+++ b/manifests/certbot/config.pp
@@ -37,6 +37,12 @@ class cd_nagios::certbot::config (
           creates   =>  '/etc/httpd/conf.d/.cert_created',
         }
 
+        exec { 'remove_nagios_conf':
+          command   =>  "rm -Rf ${ng_nagios_conf}",
+          creates   =>  '/etc/httpd/conf.d/.cert_created',
+          require   =>  Exec['remove_forward_vhost'],
+        }
+
         # create temp vhost file
 
         exec { 'create_temp_vhost':
@@ -46,7 +52,7 @@ class cd_nagios::certbot::config (
           provider  =>  'shell',
           creates   =>  '/etc/httpd/conf.d/.created',
           notify    =>  Service['httpd'],
-          require   =>  Exec['remove_forward_vhost'],
+          require   =>  Exec['remove_nagios_conf'],
         }
 
         # create cert
diff --git a/manifests/server/files.pp b/manifests/server/files.pp
index 42de5e0..22cbd91 100644
--- a/manifests/server/files.pp
+++ b/manifests/server/files.pp
@@ -25,49 +25,36 @@ class cd_nagios::server::files (
 ) inherits cd_nagios::params {
 
   if $::fqdn == $ng_nagios_server {
-    if $ng_enable_certbot == true {
-      require cd_nagios::certbot::config
-      require cd_nagios::main::dirs
+    if $ng_use_https == true {
+      if $ng_enable_certbot == true {
 
-      # manage nagios.cfg
+        require cd_nagios::certbot::config
+        require cd_nagios::main::dirs
+
+        # manage nagios.cfg
 
 
-      # manage cgi.cfg
+        # manage cgi.cfg
 
-      file { $ng_cgi_cfg_file:
-        ensure    =>  file,
-        path      =>  $ng_cgi_cfg_file,
-        owner     =>  'root',
-        group     =>  'root',
-        mode      =>  '0644',
-        selrange  =>  s0,
-        selrole   =>  object_r,
-        seltype   =>  nagios_etc_t,
-        seluser   =>  system_u,
-        content   =>  template($ng_cgi_cfg_erb),
-        notify    =>  Service[$ng_service],
-      }
-
-      # manage nagios.conf for httpd
-
-      file { $ng_nagios_conf:
-        ensure    =>  file,
-        path      =>  $ng_nagios_conf,
-        owner     =>  'root',
-        group     =>  'root',
-        mode      =>  '0644',
-        selrange  =>  s0,
-        selrole   =>  object_r,
-        seltype   =>  httpd_config_t,
-        seluser   =>  system_u,
-        content   =>  template($ng_nagios_conf_erb),
-        notify    =>  Service[$ae_service],
-      }
-
-      if $ng_http_https_fw == true {
-        file { $ng_forward_conf:
+        file { $ng_cgi_cfg_file:
           ensure    =>  file,
-          path      =>  $ng_forward_conf,
+          path      =>  $ng_cgi_cfg_file,
+          owner     =>  'root',
+          group     =>  'root',
+          mode      =>  '0644',
+          selrange  =>  s0,
+          selrole   =>  object_r,
+          seltype   =>  nagios_etc_t,
+          seluser   =>  system_u,
+          content   =>  template($ng_cgi_cfg_erb),
+          notify    =>  Service[$ng_service],
+        }
+
+        # manage nagios.conf for httpd
+
+        file { $ng_nagios_conf:
+          ensure    =>  file,
+          path      =>  $ng_nagios_conf,
           owner     =>  'root',
           group     =>  'root',
           mode      =>  '0644',
@@ -75,26 +62,42 @@ class cd_nagios::server::files (
           selrole   =>  object_r,
           seltype   =>  httpd_config_t,
           seluser   =>  system_u,
-          content   =>  template($ng_forward_conf_erb),
+          content   =>  template($ng_nagios_conf_erb),
           notify    =>  Service[$ae_service],
         }
-      }
 
-      # manage welcome.conf for nagios web server
+        if $ng_http_https_fw == true {
+          file { $ng_forward_conf:
+            ensure    =>  file,
+            path      =>  $ng_forward_conf,
+            owner     =>  'root',
+            group     =>  'root',
+            mode      =>  '0644',
+            selrange  =>  s0,
+            selrole   =>  object_r,
+            seltype   =>  httpd_config_t,
+            seluser   =>  system_u,
+            content   =>  template($ng_forward_conf_erb),
+            notify    =>  Service[$ae_service],
+          }
+        }
 
-      if $ng_disable_welcome == true {
-        file { $ng_welcome_conf:
-          ensure    =>  file,
-          path      =>  $ng_welcome_conf,
-          owner     =>  'root',
-          group     =>  'root',
-          mode      =>  '0644',
-          selrange  =>  s0,
-          selrole   =>  object_r,
-          seltype   =>  httpd_config_t,
-          seluser   =>  system_u,
-          content   =>  template($ng_welcome_conf_erb),
-          notify    =>  Service[$ae_service],
+        # manage welcome.conf for nagios web server
+
+        if $ng_disable_welcome == true {
+          file { $ng_welcome_conf:
+            ensure    =>  file,
+            path      =>  $ng_welcome_conf,
+            owner     =>  'root',
+            group     =>  'root',
+            mode      =>  '0644',
+            selrange  =>  s0,
+            selrole   =>  object_r,
+            seltype   =>  httpd_config_t,
+            seluser   =>  system_u,
+            content   =>  template($ng_welcome_conf_erb),
+            notify    =>  Service[$ae_service],
+          }
         }
       }
     }