From 3d60841cbcdc640286ce31a67333c862fc270b74 Mon Sep 17 00:00:00 2001 From: Arne Teuke Date: Fri, 21 Jul 2017 17:04:53 +0100 Subject: [PATCH 1/3] added index file --- manifests/certbot/config.pp | 37 ---------- manifests/params.pp | 13 ++-- manifests/server/files.pp | 100 ++++++-------------------- templates/certbot/create_tempfile.erb | 11 --- templates/httpd/index_html.erb | 0 templates/httpd/welcome_conf.erb | 33 ++++----- 6 files changed, 41 insertions(+), 153 deletions(-) delete mode 100644 templates/certbot/create_tempfile.erb create mode 100644 templates/httpd/index_html.erb diff --git a/manifests/certbot/config.pp b/manifests/certbot/config.pp index 568bcdb..1e86b4d 100644 --- a/manifests/certbot/config.pp +++ b/manifests/certbot/config.pp @@ -30,31 +30,6 @@ class cd_nagios::certbot::config ( require cd_certbot - # ensure there is no forward vhost file - - exec { 'remove_forward_vhost': - command => "rm -Rf ${ng_forward_conf}", - creates => '/etc/httpd/conf.d/.cert_created', - } - - exec { 'remove_nagios_conf': - command => "rm -Rf ${ng_nagios_conf}", - creates => '/etc/httpd/conf.d/.cert_created', - require => Exec['remove_forward_vhost'], - } - - # create temp vhost file - - exec { 'create_temp_vhost': - command => template('cd_nagios/certbot/create_tempfile.erb'), - cwd => '/tmp', - path => ['/bin','/usr/bin'], - provider => 'shell', - creates => '/etc/httpd/conf.d/.created', - notify => Service['httpd'], - require => Exec['remove_nagios_conf'], - } - # create cert exec { 'create_cert': @@ -68,18 +43,6 @@ class cd_nagios::certbot::config ( require => Exec['create_temp_vhost'], } - # remove temp_vhost - - exec { 'remove_temp_vhost': - command => "rm -Rf ${ng_certbot_temp_file}", - cwd => '/tmp', - path => ['/bin','/usr/bin'], - provider => 'shell', - notify => Service['httpd'], - require => Exec['create_cert'], - creates => "/etc/letsencrypt/live/${ng_nagios_server}/cert.pem", - } - # renew certs exec { 'renew_cert': diff --git a/manifests/params.pp b/manifests/params.pp index 20c01f2..9a5a6c1 100644 --- a/manifests/params.pp +++ b/manifests/params.pp @@ -200,15 +200,14 @@ # @param [string] ng_required_ips string of **__Ip addresses __** for hosts which # should be allowed/reqired. Requires format 'ipaddress ip address range'. # If you want no restriction, choose '0.0.0.0/0' -# @param [boolean] ng_disable_welcome Whether the regular welcome screen should -# be disabled. this is required for the nagios http check on the nagios server -# to be successful. # @param [boolean] ng_enable_certbot Whether to use certbot for automated TLS # certificate management # @param [string] ng_certbot_cert_path the path for certbot to place -# challenges for teh certification process. +# challenges for the certification process. # @param [string] ng_mail_user email address to receive administrative mail. # used for nagios itself as well as for certbot. +# @param [boolean] ng_enable_index Whether to create an index file to allow +# httpd checks with nagios on the nagios server. ############################################################################### class cd_nagios::params ( @@ -320,7 +319,7 @@ $ng_use_selinux_tools = true, # httpd $ng_required_hosts = '', $ng_required_ips = '127.0.0.0/8', -$ng_disable_welcome = true, +$ng_enable_index = true, # certbot $ng_enable_certbot = true, @@ -375,8 +374,8 @@ $ng_forward_conf_erb = 'cd_nagios/httpd/forward_conf.erb' $ng_get_cert_erb = 'cd_nagios/certbot/get_cert.erb' $ng_unless_get_cert = 'cd_nagios/certbot/unless_get_cert.erb' $ng_unless_renew_erb = 'cd_nagios/certbot/unless_renew_cert.erb' -$ng_create_tempvhost = 'cd_nagios/certbot/create_tempfile.erb' -$ng_certbot_temp_file = '/etc/httpd/conf.d/certbot_temp.conf' +$ng_index_html_file = '/var/www/html/index.html' +$ng_index_html_erb = 'cd_nagios/httpd/index_html.erb' # includes must be last diff --git a/manifests/server/files.pp b/manifests/server/files.pp index 22cbd91..f79a084 100644 --- a/manifests/server/files.pp +++ b/manifests/server/files.pp @@ -29,6 +29,10 @@ class cd_nagios::server::files ( if $ng_enable_certbot == true { require cd_nagios::certbot::config + + } + } + require cd_nagios::main::dirs # manage nagios.cfg @@ -84,84 +88,6 @@ class cd_nagios::server::files ( # manage welcome.conf for nagios web server - if $ng_disable_welcome == true { - file { $ng_welcome_conf: - ensure => file, - path => $ng_welcome_conf, - owner => 'root', - group => 'root', - mode => '0644', - selrange => s0, - selrole => object_r, - seltype => httpd_config_t, - seluser => system_u, - content => template($ng_welcome_conf_erb), - notify => Service[$ae_service], - } - } - } - } - - else { - - require cd_nagios::main::dirs - - # manage nagios.cfg - - - # manage cgi.cfg - - file { $ng_cgi_cfg_file: - ensure => file, - path => $ng_cgi_cfg_file, - owner => 'root', - group => 'root', - mode => '0644', - selrange => s0, - selrole => object_r, - seltype => nagios_etc_t, - seluser => system_u, - content => template($ng_cgi_cfg_erb), - notify => Service[$ng_service], - } - - # manage nagios.conf for httpd - - file { $ng_nagios_conf: - ensure => file, - path => $ng_nagios_conf, - owner => 'root', - group => 'root', - mode => '0644', - selrange => s0, - selrole => object_r, - seltype => httpd_config_t, - seluser => system_u, - content => template($ng_nagios_conf_erb), - notify => Service[$ae_service], - } - - if $ng_http_https_fw == true { - - file { $ng_forward_conf: - ensure => file, - path => $ng_forward_conf, - owner => 'root', - group => 'root', - mode => '0644', - selrange => s0, - selrole => object_r, - seltype => httpd_config_t, - seluser => system_u, - content => template($ng_forward_conf_erb), - notify => Service[$ae_service], - } - } - - # manage welcome.conf for nagios web server - - if $ng_disable_welcome == true { - file { $ng_welcome_conf: ensure => file, path => $ng_welcome_conf, @@ -175,6 +101,24 @@ class cd_nagios::server::files ( content => template($ng_welcome_conf_erb), notify => Service[$ae_service], } + + if $ng_enable_index == true { + + file { $ng_index_html_file: + ensure => file, + path => $ng_index_html_file, + owner => 'root', + group => 'root', + mode => '0644', + selrange => s0, + selrole => object_r, + seltype => httpd_config_t, + seluser => system_u, + content => template($ng_welcome_conf_erb), + notify => Service[$ae_service], + } + + } } } } diff --git a/templates/certbot/create_tempfile.erb b/templates/certbot/create_tempfile.erb deleted file mode 100644 index e7f4de6..0000000 --- a/templates/certbot/create_tempfile.erb +++ /dev/null @@ -1,11 +0,0 @@ -echo "# temporary vhost file - - ServerAdmin root@localhost - DocumentRoot /var/www/html - ServerName <%= @ng_nagios_server %> - - AllowOverride All - - - " > <%= @ng_certbot_temp_file %> -touch /etc/httpd/conf.d/.created diff --git a/templates/httpd/index_html.erb b/templates/httpd/index_html.erb new file mode 100644 index 0000000..e69de29 diff --git a/templates/httpd/welcome_conf.erb b/templates/httpd/welcome_conf.erb index 8a7646b..2a61ae5 100644 --- a/templates/httpd/welcome_conf.erb +++ b/templates/httpd/welcome_conf.erb @@ -3,25 +3,18 @@ ########### manual changes will be overwritten !!! ########## ################################################################################ -# -# This configuration file enables the default "Welcome" page if there -# is no default index page present for the root URL. To disable the -# Welcome page, comment out all the lines below. -# -# NOTE: if this file is removed, it will be restored on upgrades. -# -# -# Options -Indexes -# ErrorDocument 403 /.noindex.html -# + + Options -Indexes + ErrorDocument 403 /.noindex.html + -# -# AllowOverride None -# Require all granted -# + + AllowOverride None + Require all granted + -#Alias /.noindex.html /usr/share/httpd/noindex/index.html -#Alias /noindex/css/bootstrap.min.css /usr/share/httpd/noindex/css/bootstrap.min.css -#Alias /noindex/css/open-sans.css /usr/share/httpd/noindex/css/open-sans.css -#Alias /images/apache_pb.gif /usr/share/httpd/noindex/images/apache_pb.gif -#Alias /images/poweredby.png /usr/share/httpd/noindex/images/poweredby.png +Alias /.noindex.html /usr/share/httpd/noindex/index.html +Alias /noindex/css/bootstrap.min.css /usr/share/httpd/noindex/css/bootstrap.min.css +Alias /noindex/css/open-sans.css /usr/share/httpd/noindex/css/open-sans.css +Alias /images/apache_pb.gif /usr/share/httpd/noindex/images/apache_pb.gif +Alias /images/poweredby.png /usr/share/httpd/noindex/images/poweredby.png From 118a7b62ca09436588f7de533abdb4fa4b5fce2e Mon Sep 17 00:00:00 2001 From: Arne Teuke Date: Fri, 21 Jul 2017 17:11:42 +0100 Subject: [PATCH 2/3] added index file --- manifests/server/files.pp | 157 +++++++++++++++++++------------------- 1 file changed, 78 insertions(+), 79 deletions(-) diff --git a/manifests/server/files.pp b/manifests/server/files.pp index f79a084..411022e 100644 --- a/manifests/server/files.pp +++ b/manifests/server/files.pp @@ -33,92 +33,91 @@ class cd_nagios::server::files ( } } - require cd_nagios::main::dirs + require cd_nagios::main::dirs - # manage nagios.cfg + # manage nagios.cfg + + # manage cgi.cfg + + file { $ng_cgi_cfg_file: + ensure => file, + path => $ng_cgi_cfg_file, + owner => 'root', + group => 'root', + mode => '0644', + selrange => s0, + selrole => object_r, + seltype => nagios_etc_t, + seluser => system_u, + content => template($ng_cgi_cfg_erb), + notify => Service[$ng_service], + } + + # manage nagios.conf for httpd + + file { $ng_nagios_conf: + ensure => file, + path => $ng_nagios_conf, + owner => 'root', + group => 'root', + mode => '0644', + selrange => s0, + selrole => object_r, + seltype => httpd_config_t, + seluser => system_u, + content => template($ng_nagios_conf_erb), + notify => Service[$ae_service], + } + + # manage welcome.conf for nagios web server + + file { $ng_welcome_conf: + ensure => file, + path => $ng_welcome_conf, + owner => 'root', + group => 'root', + mode => '0644', + selrange => s0, + selrole => object_r, + seltype => httpd_config_t, + seluser => system_u, + content => template($ng_welcome_conf_erb), + notify => Service[$ae_service], + } - # manage cgi.cfg + if $ng_http_https_fw == true { - file { $ng_cgi_cfg_file: - ensure => file, - path => $ng_cgi_cfg_file, - owner => 'root', - group => 'root', - mode => '0644', - selrange => s0, - selrole => object_r, - seltype => nagios_etc_t, - seluser => system_u, - content => template($ng_cgi_cfg_erb), - notify => Service[$ng_service], - } + file { $ng_forward_conf: + ensure => file, + path => $ng_forward_conf, + owner => 'root', + group => 'root', + mode => '0644', + selrange => s0, + selrole => object_r, + seltype => httpd_config_t, + seluser => system_u, + content => template($ng_forward_conf_erb), + notify => Service[$ae_service], + } + } - # manage nagios.conf for httpd - file { $ng_nagios_conf: - ensure => file, - path => $ng_nagios_conf, - owner => 'root', - group => 'root', - mode => '0644', - selrange => s0, - selrole => object_r, - seltype => httpd_config_t, - seluser => system_u, - content => template($ng_nagios_conf_erb), - notify => Service[$ae_service], - } + if $ng_enable_index == true { - if $ng_http_https_fw == true { - file { $ng_forward_conf: - ensure => file, - path => $ng_forward_conf, - owner => 'root', - group => 'root', - mode => '0644', - selrange => s0, - selrole => object_r, - seltype => httpd_config_t, - seluser => system_u, - content => template($ng_forward_conf_erb), - notify => Service[$ae_service], - } - } - - # manage welcome.conf for nagios web server - - file { $ng_welcome_conf: - ensure => file, - path => $ng_welcome_conf, - owner => 'root', - group => 'root', - mode => '0644', - selrange => s0, - selrole => object_r, - seltype => httpd_config_t, - seluser => system_u, - content => template($ng_welcome_conf_erb), - notify => Service[$ae_service], - } - - if $ng_enable_index == true { - - file { $ng_index_html_file: - ensure => file, - path => $ng_index_html_file, - owner => 'root', - group => 'root', - mode => '0644', - selrange => s0, - selrole => object_r, - seltype => httpd_config_t, - seluser => system_u, - content => template($ng_welcome_conf_erb), - notify => Service[$ae_service], - } - - } + file { $ng_index_html_file: + ensure => file, + path => $ng_index_html_file, + owner => 'root', + group => 'root', + mode => '0644', + selrange => s0, + selrole => object_r, + seltype => httpd_config_t, + seluser => system_u, + content => template($ng_index_html_erb), + notify => Service[$ae_service], } } } From 7fff54ce74927d9a9c8b4c60230edd3a77116b74 Mon Sep 17 00:00:00 2001 From: Jenkins Server Date: Fri, 21 Jul 2017 18:11:57 +0200 Subject: [PATCH 3/3] recommit for updates in build 40 --- CHANGELOG.md | 10 + REPOSTRUCTURE.md | 2 +- doc/_index.html | 2 +- doc/file.README.html | 2 +- doc/index.html | 2 +- doc/puppet_classes/cd_nagios.html | 2 +- .../cd_nagios_3A_3Acertbot_3A_3Aconfig.html | 78 +----- .../cd_nagios_3A_3Aclient_3A_3Atarget.html | 2 +- ...cd_nagios_3A_3Afirewall_3A_3Aiptables.html | 2 +- .../cd_nagios_3A_3Amain_3A_3Aconfig.html | 2 +- .../cd_nagios_3A_3Amain_3A_3Adirs.html | 2 +- .../cd_nagios_3A_3Amain_3A_3Ainstall.html | 2 +- .../cd_nagios_3A_3Amain_3A_3Auser.html | 2 +- doc/puppet_classes/cd_nagios_3A_3Aparams.html | 57 ++-- .../cd_nagios_3A_3Aselinux_3A_3Aconfig.html | 2 +- ..._nagios_3A_3Aserver_3A_3Aaccess_rules.html | 2 +- .../cd_nagios_3A_3Aserver_3A_3Afiles.html | 252 +++++------------- .../cd_nagios_3A_3Aserver_3A_3Aservice.html | 2 +- .../cd_nagios_3A_3Aserver_3A_3Aaccess.html | 2 +- doc/top-level-namespace.html | 2 +- tests/UTF_Files | 1 + 21 files changed, 126 insertions(+), 304 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 177b611..fdec853 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -8,6 +8,16 @@ Changelog of Git Changelog.

No issue

+10741c6eacd385f Jenkins Server 2017-07-21 15:46:57 +

+

recommit for updates in build 38

+ +

+09372f68657c04b Arne Teuke 2017-07-21 15:46:40 +

+

removing all final config files on certbot level

+ +

919531809c41d5a Jenkins Server 2017-07-21 15:24:59

recommit for updates in build 37

diff --git a/REPOSTRUCTURE.md b/REPOSTRUCTURE.md index b258133..79c14a1 100644 --- a/REPOSTRUCTURE.md +++ b/REPOSTRUCTURE.md @@ -54,12 +54,12 @@ | `-- params.pp |-- templates | |-- certbot -| | |-- create_tempfile.erb | | |-- get_cert.erb | | |-- unless_get_cert.erb | | `-- unless_renew_cert.erb | |-- httpd | | |-- forward_conf.erb +| | |-- index_html.erb | | |-- nagios_conf.erb | | `-- welcome_conf.erb | |-- nagios diff --git a/doc/_index.html b/doc/_index.html index 287db70..5adf359 100644 --- a/doc/_index.html +++ b/doc/_index.html @@ -186,7 +186,7 @@ diff --git a/doc/file.README.html b/doc/file.README.html index ec778fc..3a774f8 100644 --- a/doc/file.README.html +++ b/doc/file.README.html @@ -304,7 +304,7 @@ environments.

diff --git a/doc/index.html b/doc/index.html index ea50e11..16a34f1 100644 --- a/doc/index.html +++ b/doc/index.html @@ -304,7 +304,7 @@ environments.

diff --git a/doc/puppet_classes/cd_nagios.html b/doc/puppet_classes/cd_nagios.html index e36d674..e5bf056 100644 --- a/doc/puppet_classes/cd_nagios.html +++ b/doc/puppet_classes/cd_nagios.html @@ -139,7 +139,7 @@ class cd_nagios { diff --git a/doc/puppet_classes/cd_nagios_3A_3Acertbot_3A_3Aconfig.html b/doc/puppet_classes/cd_nagios_3A_3Acertbot_3A_3Aconfig.html index 888eb0c..c26eed5 100644 --- a/doc/puppet_classes/cd_nagios_3A_3Acertbot_3A_3Aconfig.html +++ b/doc/puppet_classes/cd_nagios_3A_3Acertbot_3A_3Aconfig.html @@ -169,44 +169,7 @@ href="http://www.gnu.org/licenses">www.gnu.org/licenses/.

60 61 62 -63 -64 -65 -66 -67 -68 -69 -70 -71 -72 -73 -74 -75 -76 -77 -78 -79 -80 -81 -82 -83 -84 -85 -86 -87 -88 -89 -90 -91 -92 -93 -94 -95 -96 -97 -98 -99 -100 +63
# File 'manifests/certbot/config.pp', line 23
@@ -221,31 +184,6 @@ class cd_nagios::certbot::config (
 
         require cd_certbot
 
-        # ensure there is no forward vhost file
-
-        exec { 'remove_forward_vhost':
-          command   =>  "rm -Rf ${ng_forward_conf}",
-          creates   =>  '/etc/httpd/conf.d/.cert_created',
-        }
-
-        exec { 'remove_nagios_conf':
-          command   =>  "rm -Rf ${ng_nagios_conf}",
-          creates   =>  '/etc/httpd/conf.d/.cert_created',
-          require   =>  Exec['remove_forward_vhost'],
-        }
-
-        # create temp vhost file
-
-        exec { 'create_temp_vhost':
-          command   =>  template('cd_nagios/certbot/create_tempfile.erb'),
-          cwd       =>  '/tmp',
-          path      =>  ['/bin','/usr/bin'],
-          provider  =>  'shell',
-          creates   =>  '/etc/httpd/conf.d/.created',
-          notify    =>  Service['httpd'],
-          require   =>  Exec['remove_nagios_conf'],
-        }
-
         # create cert
 
         exec { 'create_cert':
@@ -259,18 +197,6 @@ class cd_nagios::certbot::config (
           require   =>  Exec['create_temp_vhost'],
         }
 
-        # remove temp_vhost
-
-        exec { 'remove_temp_vhost':
-          command   =>  "rm -Rf ${ng_certbot_temp_file}",
-          cwd       =>  '/tmp',
-          path      =>  ['/bin','/usr/bin'],
-          provider  =>  'shell',
-          notify    =>  Service['httpd'],
-          require   =>  Exec['create_cert'],
-          creates   =>  "/etc/letsencrypt/live/${ng_nagios_server}/cert.pem",
-        }
-
         # renew certs
 
         exec {  'renew_cert':
@@ -296,7 +222,7 @@ class cd_nagios::certbot::config (
 
 
       
diff --git a/doc/puppet_classes/cd_nagios_3A_3Aclient_3A_3Atarget.html b/doc/puppet_classes/cd_nagios_3A_3Aclient_3A_3Atarget.html
index 6550dfd..f810268 100644
--- a/doc/puppet_classes/cd_nagios_3A_3Aclient_3A_3Atarget.html
+++ b/doc/puppet_classes/cd_nagios_3A_3Aclient_3A_3Atarget.html
@@ -368,7 +368,7 @@ class cd_nagios::client::target (
 
 
       
diff --git a/doc/puppet_classes/cd_nagios_3A_3Afirewall_3A_3Aiptables.html b/doc/puppet_classes/cd_nagios_3A_3Afirewall_3A_3Aiptables.html
index 71f05ac..94df1c2 100644
--- a/doc/puppet_classes/cd_nagios_3A_3Afirewall_3A_3Aiptables.html
+++ b/doc/puppet_classes/cd_nagios_3A_3Afirewall_3A_3Aiptables.html
@@ -207,7 +207,7 @@ class cd_nagios::firewall::iptables (
 
 
       
diff --git a/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Aconfig.html b/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Aconfig.html
index 96d8475..7cd5a10 100644
--- a/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Aconfig.html
+++ b/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Aconfig.html
@@ -187,7 +187,7 @@ class cd_nagios::main::config (
 
 
       
diff --git a/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Adirs.html b/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Adirs.html
index 711662a..42c0f87 100644
--- a/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Adirs.html
+++ b/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Adirs.html
@@ -468,7 +468,7 @@ class cd_nagios::main::dirs (
 
 
       
diff --git a/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Ainstall.html b/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Ainstall.html
index 20a3649..9175c7b 100644
--- a/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Ainstall.html
+++ b/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Ainstall.html
@@ -235,7 +235,7 @@ class cd_nagios::main::install (
 
 
       
diff --git a/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Auser.html b/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Auser.html
index 45950ff..436244e 100644
--- a/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Auser.html
+++ b/doc/puppet_classes/cd_nagios_3A_3Amain_3A_3Auser.html
@@ -200,7 +200,7 @@ class cd_nagios::main::user (
 
 
       
diff --git a/doc/puppet_classes/cd_nagios_3A_3Aparams.html b/doc/puppet_classes/cd_nagios_3A_3Aparams.html
index 0b671f8..ef8811a 100644
--- a/doc/puppet_classes/cd_nagios_3A_3Aparams.html
+++ b/doc/puppet_classes/cd_nagios_3A_3Aparams.html
@@ -1860,27 +1860,6 @@ choose '0.0.0.0/0'

-
  • - - ng_disable_welcome - - - (boolean) - - - (defaults to: true) - - - — -
    -

    Whether the regular welcome screen should -be disabled. this is required for -the nagios http check on the nagios server - to be successful.

    -
    - -
  • -
  • ng_enable_certbot @@ -1914,7 +1893,7 @@ certificate management

    the path for certbot to place -challenges for teh certification process.

    +challenges for the certification process.

  • @@ -1935,6 +1914,26 @@ challenges for teh certification process.

    email address to receive administrative mail. used for nagios itself as well as for certbot.

    + + + + +
  • + + ng_enable_index + + + (boolean) + + + (defaults to: true) + + + — +
    +

    Whether to create an index file to allow +httpd checks with nagios on the +nagios server.

  • @@ -1956,6 +1955,7 @@ well as for certbot.

     
     
    +212
     213
     214
     215
    @@ -2127,11 +2127,10 @@ well as for certbot.

    381 382 383 -384 -385
    +384
    -
    # File 'manifests/params.pp', line 213
    +        
    # File 'manifests/params.pp', line 212
     
     class cd_nagios::params (
     
    @@ -2243,7 +2242,7 @@ $ng_use_selinux_tools = true,
     # httpd
     $ng_required_hosts    = '',
     $ng_required_ips      = '127.0.0.0/8',
    -$ng_disable_welcome   = true,
    +$ng_enable_index      = true,
     
     # certbot
     $ng_enable_certbot    = true,
    @@ -2298,8 +2297,8 @@ $ng_forward_conf_erb  = 'cd_nagios/httpd/forward_conf.erb'
     $ng_get_cert_erb      = 'cd_nagios/certbot/get_cert.erb'
     $ng_unless_get_cert   = 'cd_nagios/certbot/unless_get_cert.erb'
     $ng_unless_renew_erb  = 'cd_nagios/certbot/unless_renew_cert.erb'
    -$ng_create_tempvhost  = 'cd_nagios/certbot/create_tempfile.erb'
    -$ng_certbot_temp_file = '/etc/httpd/conf.d/certbot_temp.conf'
    +$ng_index_html_file   = '/var/www/html/index.html'
    +$ng_index_html_erb    = 'cd_nagios/httpd/index_html.erb'
     
     # includes must be last
     
    @@ -2313,7 +2312,7 @@ $ng_certbot_temp_file = '/etc/httpd/conf.d/certbot_temp.conf'
     
     
           
    diff --git a/doc/puppet_classes/cd_nagios_3A_3Aselinux_3A_3Aconfig.html b/doc/puppet_classes/cd_nagios_3A_3Aselinux_3A_3Aconfig.html
    index 6bbb2d1..0d12d12 100644
    --- a/doc/puppet_classes/cd_nagios_3A_3Aselinux_3A_3Aconfig.html
    +++ b/doc/puppet_classes/cd_nagios_3A_3Aselinux_3A_3Aconfig.html
    @@ -249,7 +249,7 @@ class cd_nagios::selinux::config (
     
     
           
    diff --git a/doc/puppet_classes/cd_nagios_3A_3Aserver_3A_3Aaccess_rules.html b/doc/puppet_classes/cd_nagios_3A_3Aserver_3A_3Aaccess_rules.html
    index 1fd0278..63ff744 100644
    --- a/doc/puppet_classes/cd_nagios_3A_3Aserver_3A_3Aaccess_rules.html
    +++ b/doc/puppet_classes/cd_nagios_3A_3Aserver_3A_3Aaccess_rules.html
    @@ -195,7 +195,7 @@ class cd_nagios::server::access_rules (
     
     
           
    diff --git a/doc/puppet_classes/cd_nagios_3A_3Aserver_3A_3Afiles.html b/doc/puppet_classes/cd_nagios_3A_3Aserver_3A_3Afiles.html
    index 4ed64f9..4f50930 100644
    --- a/doc/puppet_classes/cd_nagios_3A_3Aserver_3A_3Afiles.html
    +++ b/doc/puppet_classes/cd_nagios_3A_3Aserver_3A_3Afiles.html
    @@ -230,64 +230,7 @@ href="http://www.gnu.org/licenses">www.gnu.org/licenses/.

    121 122 123 -124 -125 -126 -127 -128 -129 -130 -131 -132 -133 -134 -135 -136 -137 -138 -139 -140 -141 -142 -143 -144 -145 -146 -147 -148 -149 -150 -151 -152 -153 -154 -155 -156 -157 -158 -159 -160 -161 -162 -163 -164 -165 -166 -167 -168 -169 -170 -171 -172 -173 -174 -175 -176 -177 -178 -179 -180 -181
    +124
    # File 'manifests/server/files.pp', line 23
    @@ -301,107 +244,68 @@ class cd_nagios::server::files (
           if $ng_enable_certbot == true {
     
             require cd_nagios::certbot::config
    -        require cd_nagios::main::dirs
     
    -        # manage nagios.cfg
    -
    -
    -        # manage cgi.cfg
    -
    -        file { $ng_cgi_cfg_file:
    -          ensure    =>  file,
    -          path      =>  $ng_cgi_cfg_file,
    -          owner     =>  'root',
    -          group     =>  'root',
    -          mode      =>  '0644',
    -          selrange  =>  s0,
    -          selrole   =>  object_r,
    -          seltype   =>  nagios_etc_t,
    -          seluser   =>  system_u,
    -          content   =>  template($ng_cgi_cfg_erb),
    -          notify    =>  Service[$ng_service],
    -        }
    -
    -        # manage nagios.conf for httpd
    -
    -        file { $ng_nagios_conf:
    -          ensure    =>  file,
    -          path      =>  $ng_nagios_conf,
    -          owner     =>  'root',
    -          group     =>  'root',
    -          mode      =>  '0644',
    -          selrange  =>  s0,
    -          selrole   =>  object_r,
    -          seltype   =>  httpd_config_t,
    -          seluser   =>  system_u,
    -          content   =>  template($ng_nagios_conf_erb),
    -          notify    =>  Service[$ae_service],
    -        }
    -
    -        if $ng_http_https_fw == true {
    -          file { $ng_forward_conf:
    -            ensure    =>  file,
    -            path      =>  $ng_forward_conf,
    -            owner     =>  'root',
    -            group     =>  'root',
    -            mode      =>  '0644',
    -            selrange  =>  s0,
    -            selrole   =>  object_r,
    -            seltype   =>  httpd_config_t,
    -            seluser   =>  system_u,
    -            content   =>  template($ng_forward_conf_erb),
    -            notify    =>  Service[$ae_service],
    -          }
    -        }
    -
    -        # manage welcome.conf for nagios web server
    -
    -        if $ng_disable_welcome == true {
    -          file { $ng_welcome_conf:
    -            ensure    =>  file,
    -            path      =>  $ng_welcome_conf,
    -            owner     =>  'root',
    -            group     =>  'root',
    -            mode      =>  '0644',
    -            selrange  =>  s0,
    -            selrole   =>  object_r,
    -            seltype   =>  httpd_config_t,
    -            seluser   =>  system_u,
    -            content   =>  template($ng_welcome_conf_erb),
    -            notify    =>  Service[$ae_service],
    -          }
    -        }
           }
         }
     
    -  else {
    -
         require cd_nagios::main::dirs
     
    -      # manage nagios.cfg
    +    # manage nagios.cfg
    +
    +    # manage cgi.cfg
    +
    +    file { $ng_cgi_cfg_file:
    +      ensure    =>  file,
    +      path      =>  $ng_cgi_cfg_file,
    +      owner     =>  'root',
    +      group     =>  'root',
    +      mode      =>  '0644',
    +      selrange  =>  s0,
    +      selrole   =>  object_r,
    +      seltype   =>  nagios_etc_t,
    +      seluser   =>  system_u,
    +      content   =>  template($ng_cgi_cfg_erb),
    +      notify    =>  Service[$ng_service],
    +    }
    +
    +    # manage nagios.conf for httpd
    +
    +    file { $ng_nagios_conf:
    +      ensure    =>  file,
    +      path      =>  $ng_nagios_conf,
    +      owner     =>  'root',
    +      group     =>  'root',
    +      mode      =>  '0644',
    +      selrange  =>  s0,
    +      selrole   =>  object_r,
    +      seltype   =>  httpd_config_t,
    +      seluser   =>  system_u,
    +      content   =>  template($ng_nagios_conf_erb),
    +      notify    =>  Service[$ae_service],
    +    }
    +
    +    # manage welcome.conf for nagios web server
    +
    +    file { $ng_welcome_conf:
    +      ensure    =>  file,
    +      path      =>  $ng_welcome_conf,
    +      owner     =>  'root',
    +      group     =>  'root',
    +      mode      =>  '0644',
    +      selrange  =>  s0,
    +      selrole   =>  object_r,
    +      seltype   =>  httpd_config_t,
    +      seluser   =>  system_u,
    +      content   =>  template($ng_welcome_conf_erb),
    +      notify    =>  Service[$ae_service],
    +    }
     
     
    -      # manage cgi.cfg
    +    if $ng_http_https_fw == true {
     
    -      file { $ng_cgi_cfg_file:
    +      file { $ng_forward_conf:
             ensure    =>  file,
    -        path      =>  $ng_cgi_cfg_file,
    -        owner     =>  'root',
    -        group     =>  'root',
    -        mode      =>  '0644',
    -        selrange  =>  s0,
    -        selrole   =>  object_r,
    -        seltype   =>  nagios_etc_t,
    -        seluser   =>  system_u,
    -        content   =>  template($ng_cgi_cfg_erb),
    -        notify    =>  Service[$ng_service],
    -      }
    -
    -      # manage nagios.conf for httpd
    -
    -      file { $ng_nagios_conf:
    -        ensure    =>  file,
    -        path      =>  $ng_nagios_conf,
    +        path      =>  $ng_forward_conf,
             owner     =>  'root',
             group     =>  'root',
             mode      =>  '0644',
    @@ -409,44 +313,26 @@ class cd_nagios::server::files (
             selrole   =>  object_r,
             seltype   =>  httpd_config_t,
             seluser   =>  system_u,
    -        content   =>  template($ng_nagios_conf_erb),
    +        content   =>  template($ng_forward_conf_erb),
             notify    =>  Service[$ae_service],
           }
    +    }
     
    -      if $ng_http_https_fw == true {
     
    -        file { $ng_forward_conf:
    -          ensure    =>  file,
    -          path      =>  $ng_forward_conf,
    -          owner     =>  'root',
    -          group     =>  'root',
    -          mode      =>  '0644',
    -          selrange  =>  s0,
    -          selrole   =>  object_r,
    -          seltype   =>  httpd_config_t,
    -          seluser   =>  system_u,
    -          content   =>  template($ng_forward_conf_erb),
    -          notify    =>  Service[$ae_service],
    -        }
    -      }
    +    if $ng_enable_index == true {
     
    -      # manage welcome.conf for nagios web server
    -
    -      if $ng_disable_welcome == true {
    -
    -        file { $ng_welcome_conf:
    -          ensure    =>  file,
    -          path      =>  $ng_welcome_conf,
    -          owner     =>  'root',
    -          group     =>  'root',
    -          mode      =>  '0644',
    -          selrange  =>  s0,
    -          selrole   =>  object_r,
    -          seltype   =>  httpd_config_t,
    -          seluser   =>  system_u,
    -          content   =>  template($ng_welcome_conf_erb),
    -          notify    =>  Service[$ae_service],
    -        }
    +      file { $ng_index_html_file:
    +        ensure    =>  file,
    +        path      =>  $ng_index_html_file,
    +        owner     =>  'root',
    +        group     =>  'root',
    +        mode      =>  '0644',
    +        selrange  =>  s0,
    +        selrole   =>  object_r,
    +        seltype   =>  httpd_config_t,
    +        seluser   =>  system_u,
    +        content   =>  template($ng_index_html_erb),
    +        notify    =>  Service[$ae_service],
           }
         }
       }
    @@ -458,7 +344,7 @@ class cd_nagios::server::files (
     
     
           
    diff --git a/doc/puppet_classes/cd_nagios_3A_3Aserver_3A_3Aservice.html b/doc/puppet_classes/cd_nagios_3A_3Aserver_3A_3Aservice.html
    index 015ee17..ddcb54a 100644
    --- a/doc/puppet_classes/cd_nagios_3A_3Aserver_3A_3Aservice.html
    +++ b/doc/puppet_classes/cd_nagios_3A_3Aserver_3A_3Aservice.html
    @@ -174,7 +174,7 @@ class cd_nagios::server::service (
     
     
           
    diff --git a/doc/puppet_defined_types/cd_nagios_3A_3Aserver_3A_3Aaccess.html b/doc/puppet_defined_types/cd_nagios_3A_3Aserver_3A_3Aaccess.html
    index 646a425..067dda4 100644
    --- a/doc/puppet_defined_types/cd_nagios_3A_3Aserver_3A_3Aaccess.html
    +++ b/doc/puppet_defined_types/cd_nagios_3A_3Aserver_3A_3Aaccess.html
    @@ -220,7 +220,7 @@ $ng_service       = $::cd_nagios::params::ng_service
     
     
           
    diff --git a/doc/top-level-namespace.html b/doc/top-level-namespace.html
    index 8a49ac2..4197551 100644
    --- a/doc/top-level-namespace.html
    +++ b/doc/top-level-namespace.html
    @@ -90,7 +90,7 @@
     
     
           
    diff --git a/tests/UTF_Files b/tests/UTF_Files
    index a138597..ef73186 100644
    --- a/tests/UTF_Files
    +++ b/tests/UTF_Files
    @@ -4,3 +4,4 @@
     ./.yardoc/objects/root.dat: data
     ./doc/css/style.css: HTML document, UTF-8 Unicode text, with very long lines
     ./doc/js/jquery.js: HTML document, UTF-8 Unicode text, with very long lines
    +./templates/httpd/index_html.erb: empty