# SupportedStyles: strings, symbols
ChefStyle/AttributeKeys:
EnforcedStyle: symbols
-
-# Offense count: 489
-# Cop supports --auto-correct.
-ChefStyle/FileMode:
- Enabled: false
source name.to_s
owner name.to_s
group name.to_s
- mode 0o755
+ mode "755"
files_owner name.to_s
files_group name.to_s
files_mode 0o644
source "ports.conf.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
service "apache2" do
source new_resource.template
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables new_resource.variables
end
end
source new_resource.conf
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables new_resource.variables
end
end
source new_resource.template
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables new_resource.variables.merge(:name => new_resource.site, :directory => site_directory)
end
end
source "preferences.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
apt_update "/etc/apt/sources.list" do
source "sources.list.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables :archive_host => archive_host, :codename => node[:lsb][:codename]
notifies :update, "apt_update[/etc/apt/sources.list]", :immediately
end
file "/etc/apt/apt.conf.d/20auto-upgrades" do
user "root"
group "root"
- mode 0o644
+ mode "644"
content auto_upgrades
end
end
source "apt.conf.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
directory "/store/backup" do
owner "osmbackup"
group "osmbackup"
- mode 0o2755
+ mode "2755"
recursive true
end
cookbook_file "/usr/local/bin/expire-backups" do
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
template "/etc/cron.daily/expire-backups" do
source "expire.cron.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
source "named.local.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :restart, "service[#{service_name}]"
end
source "named.options.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables :ipv4_clients => ipv4_clients, :ipv6_clients => ipv6_clients
notifies :restart, "service[#{service_name}]"
end
source "db.10.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :reload, "service[#{service_name}]"
end
directory "/srv/blog.openstreetmap.org" do
owner "wordpress"
group "wordpress"
- mode 0o755
+ mode "755"
end
wordpress_site "blog.openstreetmap.org" do
source "backup.cron.erb"
owner "root"
group "root"
- mode 0o750
+ mode "750"
variables :passwords => passwords
end
directory "/srv/blogs.openstreetmap.org" do
owner "blogs"
group "blogs"
- mode 0o755
+ mode "755"
end
git "/srv/blogs.openstreetmap.org" do
source "https://packages.chef.io/files/stable/chef/#{chef_version}/ubuntu/#{node[:lsb][:release]}/#{chef_package}"
owner "root"
group "root"
- mode 0o644
+ mode "644"
backup false
ignore_failure true
end
directory "/etc/chef" do
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
template "/etc/chef/client.rb" do
source "client.rb.erb"
owner "root"
group "root"
- mode 0o640
+ mode "640"
end
file "/etc/chef/client.pem" do
owner "root"
group "root"
- mode 0o400
+ mode "400"
end
template "/etc/chef/report.rb" do
source "report.rb.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
template "/etc/logrotate.d/chef" do
source "logrotate.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
directory "/etc/chef/trusted_certs" do
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
template "/etc/chef/trusted_certs/verisign.pem" do
source "verisign.pem.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
directory node[:ohai][:plugin_dir] do
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
directory "/var/log/chef" do
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
systemd_service "chef-client" do
directory "/var/lib/chef" do
owner "chefrepo"
group "chefrepo"
- mode 0o2775
+ mode "2775"
end
%w[public private].each do |repository|
directory "/var/lib/chef/#{repository}/.chef" do
owner "chefrepo"
group "chefrepo"
- mode 0o2775
+ mode "2775"
end
file "/var/lib/chef/#{repository}/.chef/client.pem" do
content keys["git"].join("\n")
owner "chefrepo"
group "chefrepo"
- mode 0o660
+ mode "660"
end
cookbook_file "/var/lib/chef/#{repository}/.chef/knife.rb" do
source "knife.rb"
owner "chefrepo"
group "chefrepo"
- mode 0o660
+ mode "660"
end
template "#{repository_directory}/hooks/post-receive" do
source "post-receive.erb"
owner "chefrepo"
group "chefrepo"
- mode 0o750
+ mode "750"
variables :repository => repository
end
end
source "server.rb.erb"
owner "root"
group "root"
- mode 0o640
+ mode "640"
notifies :run, "execute[chef-server-reconfigure]"
end
source "server-backup.cron.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
munin_plugin "chef_status"
directory "/opt/civicrm-#{civicrm_version}" do
owner "wordpress"
group "wordpress"
- mode 0o755
+ mode "755"
end
remote_file "#{cache_dir}/civicrm-#{civicrm_version}-wordpress.zip" do
source "https://download.civicrm.org/civicrm-#{civicrm_version}-wordpress.zip"
owner "wordpress"
group "wordpress"
- mode 0o644
+ mode "644"
backup false
end
source "https://download.civicrm.org/civicrm-#{civicrm_version}-l10n.tar.gz"
owner "wordpress"
group "wordpress"
- mode 0o644
+ mode "644"
backup false
end
directory "/srv/join.osmfoundation.org/wp-content/plugins/files" do
owner "www-data"
group "www-data"
- mode 0o755
+ mode "755"
end
extensions_directory = "/srv/join.osmfoundation.org/wp-content/plugins/civicrm-extensions"
directory extensions_directory do
owner "wordpress"
group "wordpress"
- mode 0o755
+ mode "755"
end
node[:civicrm][:extensions].each_value do |details|
file "#{civicrm_directory}/civicrm.settings.php" do
owner "wordpress"
group "wordpress"
- mode 0o644
+ mode "644"
content settings
end
source "backup.cron.erb"
owner "root"
group "root"
- mode 0o750
+ mode "750"
variables :passwords => passwords
end
source "clamav-unofficial-sigs.conf.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
execute "freshclam" do
source "backup-db.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
cron_d "backup-db" do
directory "/srv/www.openstreetmap.org" do
group "rails"
- mode 0o2775
+ mode "2775"
end
rails_port "www.openstreetmap.org" do
directory function_directory do
owner "rails"
group "rails"
- mode 0o755
+ mode "755"
end
execute function_directory do
source "wal-e.erb"
owner "root"
group "postgres"
- mode 0o750
+ mode "750"
variables :s3_key => wal_secrets["s3_key"]
end
directory "/srv/dev.openstreetmap.org" do
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
template "/srv/dev.openstreetmap.org/index.html" do
source "dev.html.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
ssl_certificate "dev.openstreetmap.org" do
source "phppgadmin.conf.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
file "/etc/apache2/conf.d/phppgadmin" do
source "sudoers.user.erb"
owner "root"
group "root"
- mode 0o440
+ mode "440"
variables :user => name
end
end
source "cleanup-assets.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
ruby_version = node[:passenger][:ruby_version]
directory site_directory do
owner "apis"
group "apis"
- mode 0o755
+ mode "755"
end
directory log_directory do
owner "apis"
group "apis"
- mode 0o755
+ mode "755"
end
directory gpx_directory do
owner "apis"
group "apis"
- mode 0o755
+ mode "755"
end
directory "#{gpx_directory}/traces" do
owner "apis"
group "apis"
- mode 0o755
+ mode "755"
end
directory "#{gpx_directory}/images" do
owner "apis"
group "apis"
- mode 0o755
+ mode "755"
end
rails_port site_name do
source "rails.setup.rb.erb"
owner "apis"
group "apis"
- mode 0o644
+ mode "644"
variables :site => site_name
notifies :restart, "rails_port[#{site_name}]"
end
source "cgimap.environment.erb"
owner "root"
group "root"
- mode 0o640
+ mode "640"
variables :cgimap_port => cgimap_port,
:database_port => node[:postgresql][:clusters][:"12/main"][:port],
:database_name => database_name,
source "logrotate.apis.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables :name => name,
:log_directory => log_directory,
:rails_directory => rails_directory
directory "/srv/apis.dev.openstreetmap.org" do
owner "apis"
group "apis"
- mode 0o755
+ mode "755"
end
template "/srv/apis.dev.openstreetmap.org/index.html" do
source "apis.html.erb"
owner "apis"
group "apis"
- mode 0o644
+ mode "644"
end
ssl_certificate "apis.dev.openstreetmap.org" do
directory "/srv/ooc.openstreetmap.org" do
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
remote_directory "/srv/ooc.openstreetmap.org/html" do
source "ooc"
owner "root"
group "root"
- mode 0o755
+ mode "755"
files_owner "root"
files_group "root"
files_mode 0o644
cookbook_file "/usr/local/bin/fixeep-82574_83.sh" do
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
execute "udevadm-trigger" do
source "udev.rules.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :run, "execute[udevadm-trigger]"
end
source "dhcpd.conf.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables :domain => domain
end
directory "/srv/dmca.openstreetmap.org" do
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
remote_directory "/srv/dmca.openstreetmap.org/html" do
source "html"
owner "root"
group "root"
- mode 0o755
+ mode "755"
files_owner "root"
files_group "root"
files_mode 0o644
source "https://github.com/StackExchange/dnscontrol/releases/download/v3.2.0/dnscontrol-Linux"
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
directory "/srv/dns.openstreetmap.org" do
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
remote_directory "/srv/dns.openstreetmap.org/html" do
source "html"
owner "root"
group "root"
- mode 0o755
+ mode "755"
files_owner "root"
files_group "root"
files_mode 0o644
source "zone.html.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables :zone => zone
end
source "index.html.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables :zones => zones
end
source "dns-update.erb"
owner "root"
group "git"
- mode 0o750
+ mode "750"
variables :passwords => passwords, :geoservers => geoservers
end
directory "/var/lib/dns" do
owner "git"
group "git"
- mode 0o2775
+ mode "2775"
notifies :run, "execute[dns-update]"
end
source "creds.json.erb"
owner "git"
group "git"
- mode 0o440
+ mode "440"
variables :passwords => passwords
end
source "post-receive"
owner "git"
group "git"
- mode 0o750
+ mode "750"
only_if { ::Dir.exist?("#{node[:dns][:repository]}/hooks") }
end
source "dns-check.erb"
owner "root"
group "git"
- mode 0o750
+ mode "750"
variables :passwords => passwords, :geoservers => geoservers
end
directory "/etc/docker" do
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
template "/etc/docker/daemon.json" do
source "daemon.json.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
service "docker" do
directory "/srv/donate.openstreetmap.org" do
owner "donate"
group "donate"
- mode 0o755
+ mode "755"
end
git "/srv/donate.openstreetmap.org" do
directory "/srv/donate.openstreetmap.org/data" do
owner "donate"
group "donate"
- mode 0o755
+ mode "755"
end
template "/srv/donate.openstreetmap.org/scripts/db-connect.inc.php" do
source "db-connect.inc.php.erb"
owner "root"
group "donate"
- mode 0o644
+ mode "644"
variables :passwords => passwords
end
source "backup.cron.erb"
owner "root"
group "root"
- mode 0o750
+ mode "750"
variables :passwords => passwords
end
source "elasticsearch.yml.erb"
user "root"
group "root"
- mode 0o644
+ mode "644"
notifies :restart, "service[elasticsearch]"
end
key_file "/etc/ssl/private/exim.key"
owner "root"
group "ssl-cert"
- mode 0o640
+ mode "640"
org "OpenStreetMap"
email "postmaster@openstreetmap.org"
common_name node[:fqdn]
directory "/srv/mta-sts.#{primary_domain}" do
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
domains.each do |domain|
source "mta-sts.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables :domain => domain
end
end
file "/etc/exim4/blocked-senders" do
owner "root"
group "Debian-exim"
- mode 0o644
+ mode "644"
end
if node[:exim][:dkim_selectors]
owner "root"
source "dkim-domains.erb"
group "Debian-exim"
- mode 0o644
+ mode "644"
end
template "/etc/exim4/dkim-selectors" do
owner "root"
source "dkim-selectors.erb"
group "Debian-exim"
- mode 0o644
+ mode "644"
end
directory "/etc/exim4/dkim-keys" do
owner "root"
group "Debian-exim"
- mode 0o755
+ mode "755"
end
node[:exim][:dkim_selectors].each do |domain, _selector|
content keys[domain].join("\n")
owner "root"
group "Debian-exim"
- mode 0o640
+ mode "640"
end
end
end
source "exim4.conf.erb"
owner "root"
group "Debian-exim"
- mode 0o644
+ mode "644"
variables :relay_to_domains => relay_to_domains.sort,
:relay_from_hosts => relay_from_hosts.sort
notifies :restart, "service[exim4]"
source "aliases.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
remote_directory "/etc/exim4/noreply" do
source "noreply"
owner "root"
group "Debian-exim"
- mode 0o755
+ mode "755"
files_owner "root"
files_group "Debian-exim"
files_mode 0o755
source "jail.default.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :restart, "service[fail2ban]"
end
source "paths-overrides.local.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :restart, "service[fail2ban]"
end
source new_resource.source
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
else
template "/etc/fail2ban/filter.d/#{new_resource.filter}.conf" do
source "filter.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables :failregex => new_resource.failregex,
:ignoreregex => new_resource.ignoreregex
end
source "jail.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables :name => new_resource.jail,
:filter => new_resource.filter,
:logpath => new_resource.logpath,
directory "/srv/forum.openstreetmap.org" do
owner "forum"
group "forum"
- mode 0o755
+ mode "755"
end
git "/srv/forum.openstreetmap.org/html/" do
checksum "df547e3ac9596c1e6d9eedcb108559f84a28669763e24114ca6cdcbf118caf6c"
owner "root"
group "root"
- mode 0o644
+ mode "644"
backup false
end
directory "/srv/forum.openstreetmap.org/html/cache/" do
owner "www-data"
group "www-data"
- mode 0o755
+ mode "755"
end
directory "/srv/forum.openstreetmap.org/html/img/avatars/" do
owner "www-data"
group "www-data"
- mode 0o755
+ mode "755"
end
template "/srv/forum.openstreetmap.org/html/config.php" do
source "config.php.erb"
owner "forum"
group "www-data"
- mode 0o440
+ mode "440"
variables :passwords => passwords
end
source "backup.cron.erb"
owner "root"
group "root"
- mode 0o750
+ mode "750"
variables :passwords => passwords
end
cookbook_file "/srv/board.osmfoundation.org/Wiki.png" do
owner node[:mediawiki][:user]
group node[:mediawiki][:group]
- mode 0o644
+ mode "644"
end
cookbook_file "/srv/dwg.osmfoundation.org/Wiki.png" do
owner node[:mediawiki][:user]
group node[:mediawiki][:group]
- mode 0o644
+ mode "644"
end
cookbook_file "/srv/mwg.osmfoundation.org/Wiki.png" do
owner node[:mediawiki][:user]
group node[:mediawiki][:group]
- mode 0o644
+ mode "644"
end
end
directory "/srv/operations.osmfoundation.org/_site" do
- mode 0o755
+ mode "755"
owner "nobody"
group "nogroup"
end
# Workaround https://github.com/jekyll/jekyll/issues/7804
# by creating a .jekyll-cache folder
directory "/srv/operations.osmfoundation.org/.jekyll-cache" do
- mode 0o755
+ mode "755"
owner "nobody"
group "nogroup"
end
cookbook_file "/srv/wiki.osmfoundation.org/Wiki.png" do
owner node[:mediawiki][:user]
group node[:mediawiki][:group]
- mode 0o644
+ mode "644"
end
source "vsftpd.conf.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
template "/etc/pam.d/vsftpd" do
source "pam-vsftpd.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
service "vsftpd" do
directory "/etc/gdnsd/config.d" do
owner "nobody"
group "nogroup"
- mode 0o755
+ mode "755"
end
%w[tile nominatim].each do |zone|
source "zone.#{type}.erb"
owner "nobody"
group "nogroup"
- mode 0o644
+ mode "644"
variables :zone => zone
end
end
source "config.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :restart, "service[gdnsd]"
end
source "geo.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :restart, "service[gdnsd]"
end
source "GeoIP.conf.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables :license_keys => license_keys
end
directory git_directory do
owner "root"
group "root"
- mode 0o775
+ mode "775"
end
directory "#{git_directory}/public" do
owner node[:git][:public_user]
group node[:git][:public_group]
- mode 0o2775
+ mode "2775"
end
directory "#{git_directory}/private" do
owner node[:git][:private_user]
group node[:git][:private_group]
- mode 0o2775
+ mode "2775"
end
Dir.glob("#{git_directory}/*/*.git").each do |repository|
source "post-update.erb"
owner "root"
group node[:git][:group]
- mode 0o755
+ mode "755"
end
end
source "backup.cron.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
source "gitweb.conf.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
directory "/srv/#{git_site}" do
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
template "/srv/#{git_site}/robots.txt" do
source "robots.txt.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
ssl_certificate git_site do
directory "/srv/gps-tile.openstreetmap.org" do
owner "gpstile"
group "gpstile"
- mode 0o755
+ mode "755"
end
git "/srv/gps-tile.openstreetmap.org/import" do
source "html"
owner "gpstile"
group "gpstile"
- mode 0o755
+ mode "755"
files_owner "gpstile"
files_group "gpstile"
files_mode 0o644
source "grub.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables :units => units, :entry => grub_entry
notifies :run, "execute[update-grub]"
end
source "initramfs-mdadm.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :run, "execute[update-initramfs]"
end
source "cciss-vol-statusd.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
notifies :restart, "service[cciss-vol-statusd]"
end
source "raid.default.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables :devices => status_packages[status_package]
end
source "smartd-mailer.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
template "/etc/smartd.conf" do
source "smartd.conf.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables :disks => disks
end
source "smartmontools.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
service "smartd" do
file "/etc/mdadm/mdadm.conf" do
owner "root"
group "root"
- mode 0o644
+ mode "644"
content mdadm_conf
end
source "modules.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
service "kmod" do
source "watchdog.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables :module => node[:hardware][:watchdog]
end
source "sensors.conf.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :run, "execute[/etc/sensors.d/chef.conf]"
end
end
directory "/srv/imagery/mapserver" do
owner "root"
group "root"
- mode 0o755
+ mode "755"
recursive true
end
directory "/srv/imagery/common" do
owner "root"
group "root"
- mode 0o755
+ mode "755"
recursive true
end
directory "/srv/imagery/common/ostn02-ntv2-data" do
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
remote_file "#{Chef::Config[:file_cache_path]}/ostn02-ntv2-data.zip" do
file "/srv/imagery/layers/#{new_resource.site}/#{new_resource.layer}.yml" do
owner "root"
group "root"
- mode 0o644
+ mode "644"
content YAML.dump(:name => new_resource.layer,
:title => new_resource.title || new_resource.layer,
:url => "//{s}.#{new_resource.site}/layer/#{new_resource.layer}/{z}/{x}/{y}.png",
source "mapserver.map.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables new_resource.to_hash
end
directory "/srv/imagery/nginx/#{new_resource.site}" do
owner "root"
group "root"
- mode 0o755
+ mode "755"
recursive true
end
source "nginx_imagery_layer_fragment.conf.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables new_resource.to_hash
end
end
directory "/srv/#{new_resource.site}" do
user "root"
group "root"
- mode 0o755
+ mode "755"
end
directory "/srv/imagery/layers/#{new_resource.site}" do
user "root"
group "root"
- mode 0o755
+ mode "755"
recursive true
end
directory "/srv/imagery/overlays/#{new_resource.site}" do
user "root"
group "root"
- mode 0o755
+ mode "755"
recursive true
end
source "index.html.erb"
user "root"
group "root"
- mode 0o644
+ mode "644"
variables :title => new_resource.title
end
source "robots.txt"
user "root"
group "root"
- mode 0o644
+ mode "644"
end
cookbook_file "/srv/#{new_resource.site}/imagery.css" do
source "imagery.css"
user "root"
group "root"
- mode 0o644
+ mode "644"
end
cookbook_file "/srv/#{new_resource.site}/clientaccesspolicy.xml" do
source "clientaccesspolicy.xml"
user "root"
group "root"
- mode 0o644
+ mode "644"
end
cookbook_file "/srv/#{new_resource.site}/crossdomain.xml" do
source "crossdomain.xml"
user "root"
group "root"
- mode 0o644
+ mode "644"
end
layers = Dir.glob("/srv/imagery/layers/#{new_resource.site}/*.yml").collect do |path|
source "imagery.js.erb"
user "root"
group "root"
- mode 0o644
+ mode "644"
variables :bbox => new_resource.bbox, :layers => layers
end
file "/var/spool/incron/#{user}" do
owner user
group "incron"
- mode 0o600
+ mode "600"
content lines.join("\n")
end
end
directory "/srv/irc.openstreetmap.org" do
owner "root"
group "root"
- mode 0755
+ mode "755"
end
remote_directory "/srv/irc.openstreetmap.org/html" do
source "html"
owner "root"
group "root"
- mode 0o755
+ mode "755"
files_owner "root"
files_group "root"
files_mode 0o644
directory "/opt/kibana-#{version}" do
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
execute "unzip-kibana-#{version}" do
directory "/etc/kibana" do
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
directory "/var/run/kibana" do
owner "kibana"
group "kibana"
- mode 0o755
+ mode "755"
end
directory "/var/log/kibana" do
owner "kibana"
group "kibana"
- mode 0o755
+ mode "755"
end
systemd_service "kibana@" do
))
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :restart, "service[kibana@#{name}]"
end
directory "/etc/letsencrypt" do
owner "letsencrypt"
group "letsencrypt"
- mode 0o755
+ mode "755"
end
directory "/var/lib/letsencrypt" do
owner "letsencrypt"
group "letsencrypt"
- mode 0o755
+ mode "755"
end
directory "/var/log/letsencrypt" do
owner "letsencrypt"
group "letsencrypt"
- mode 0o700
+ mode "700"
end
directory "/srv/acme.openstreetmap.org" do
owner "letsencrypt"
group "letsencrypt"
- mode 0o755
+ mode "755"
end
directory "/srv/acme.openstreetmap.org/html" do
owner "letsencrypt"
group "letsencrypt"
- mode 0o755
+ mode "755"
end
ssl_certificate "acme.openstreetmap.org" do
directory "/srv/acme.openstreetmap.org/config" do
owner "letsencrypt"
group "letsencrypt"
- mode 0o755
+ mode "755"
end
directory "/srv/acme.openstreetmap.org/work" do
owner "letsencrypt"
group "letsencrypt"
- mode 0o755
+ mode "755"
end
directory "/srv/acme.openstreetmap.org/logs" do
owner "letsencrypt"
group "letsencrypt"
- mode 0o700
+ mode "700"
end
directory "/srv/acme.openstreetmap.org/.chef" do
owner "letsencrypt"
group "letsencrypt"
- mode 0o2775
+ mode "2775"
end
file "/srv/acme.openstreetmap.org/.chef/client.pem" do
content keys["letsencrypt"].join("\n")
owner "letsencrypt"
group "letsencrypt"
- mode 0o660
+ mode "660"
end
cookbook_file "/srv/acme.openstreetmap.org/.chef/knife.rb" do
source "knife.rb"
owner "letsencrypt"
group "letsencrypt"
- mode 0o660
+ mode "660"
end
remote_directory "/srv/acme.openstreetmap.org/bin" do
source "bin"
owner "root"
group "root"
- mode 0o755
+ mode "755"
files_owner "root"
files_group "root"
files_mode 0o755
directory "/srv/acme.openstreetmap.org/requests" do
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
certificates = search(:node, "letsencrypt:certificates").each_with_object({}) do |n, c|
source "request.erb"
owner "root"
group "letsencrypt"
- mode 0o754
+ mode "754"
variables details
end
source "check-certificates.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
variables :certificates => certificates
end
source "beats.crt"
user "root"
group "logstash"
- mode 0o644
+ mode "644"
notifies :restart, "service[logstash]"
end
content keys["beats"].join("\n")
user "root"
group "logstash"
- mode 0o640
+ mode "640"
notifies :restart, "service[logstash]"
end
source "logstash.conf.erb"
user "root"
group "root"
- mode 0o644
+ mode "644"
notifies :start, "service[logstash]"
end
file "/etc/logrotate.d/logstash" do
- mode 0o644
+ mode "644"
end
template "/etc/default/logstash" do
source "logstash.default.erb"
user "root"
group "root"
- mode 0o644
+ mode "644"
notifies :restart, "service[logstash]"
end
source "expire.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
forwarders = search(:node, "recipes:logstash\\:\\:forwarder")
source "beats.crt"
user "root"
group "root"
- mode 0o600
+ mode "600"
notifies :restart, "service[filebeat]"
end
content YAML.dump(node[:logstash][:forwarder].to_hash)
user "root"
group "root"
- mode 0o600
+ mode "600"
notifies :restart, "service[filebeat]"
end
source "mm_cfg.py.erb"
user "root"
group "root"
- mode 0o644
+ mode "644"
notifies :restart, "service[mailman]"
end
source "backup.cron.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
source "parsoid-config.yaml.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
service "parsoid" do
source new_resource.source
owner node[:mediawiki][:user]
group node[:mediawiki][:group]
- mode 0o755
+ mode "755"
files_owner node[:mediawiki][:user]
files_group node[:mediawiki][:group]
files_mode 0o755
source new_resource.template
user node[:mediawiki][:user]
group node[:mediawiki][:group]
- mode 0o664
+ mode "664"
variables new_resource.variables
end
else
content "<?php wfLoadExtension( '#{new_resource.extension}' );\n"
user node[:mediawiki][:user]
group node[:mediawiki][:group]
- mode 0o664
+ mode "664"
end
end
declare_resource :directory, site_directory do
owner node[:mediawiki][:user]
group node[:mediawiki][:group]
- mode 0o775
+ mode "775"
end
declare_resource :directory, mediawiki_directory do
owner node[:mediawiki][:user]
group node[:mediawiki][:group]
- mode 0o775
+ mode "775"
end
mediawiki_reference = "REL#{new_resource.version}".tr(".", "_")
source "composer.local.json.erb"
owner node[:mediawiki][:user]
group node[:mediawiki][:group]
- mode 0o664
+ mode "664"
end
# Safety catch if git doesn't update but install.php hasn't run
declare_resource :directory, "#{mediawiki_directory}/images" do
owner "www-data"
group node[:mediawiki][:group]
- mode 0o775
+ mode "775"
end
declare_resource :directory, "#{mediawiki_directory}/cache" do
owner "www-data"
group node[:mediawiki][:group]
- mode 0o775
+ mode "775"
end
declare_resource :directory, "#{mediawiki_directory}/LocalSettings.d" do
user node[:mediawiki][:user]
group node[:mediawiki][:group]
- mode 0o775
+ mode "775"
end
template "#{mediawiki_directory}/LocalSettings.php" do
source "LocalSettings.php.erb"
owner node[:mediawiki][:user]
group node[:mediawiki][:group]
- mode 0o664
+ mode "664"
variables :name => new_resource.site,
:directory => mediawiki_directory,
:database_params => database_params,
source "mediawiki-backup.cron.erb"
owner "root"
group "root"
- mode 0o700
+ mode "700"
variables :name => new_resource.site,
:directory => site_directory,
:database_params => database_params
cookbook "mediawiki"
owner node[:mediawiki][:user]
group node[:mediawiki][:group]
- mode 0o644
+ mode "644"
backup false
end
cookbook "mediawiki"
owner node[:mediawiki][:user]
group node[:mediawiki][:group]
- mode 0o644
+ mode "644"
backup false
end
cookbook "mediawiki"
owner node[:mediawiki][:user]
group node[:mediawiki][:group]
- mode 0o644
+ mode "644"
backup false
end
source "LocalSettings.php.erb"
owner node[:mediawiki][:user]
group node[:mediawiki][:group]
- mode 0o664
+ mode "664"
variables :name => new_resource.site,
:directory => mediawiki_directory,
:database_params => database_params,
source new_resource.source
owner node[:mediawiki][:user]
group node[:mediawiki][:group]
- mode 0o755
+ mode "755"
files_owner node[:mediawiki][:user]
files_group node[:mediawiki][:group]
files_mode 0o755
source new_resource.template
user node[:mediawiki][:user]
group node[:mediawiki][:group]
- mode 0o664
+ mode "664"
variables new_resource.variables
end
else
content file_content
user node[:mediawiki][:user]
group node[:mediawiki][:group]
- mode 0o664
+ mode "664"
only_if { ::File.exist?(skin_file) }
end
end
source "memcached.conf.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :restart, "service[memcached]"
end
source "munin-node.conf.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables :servers => servers
notifies :restart, "service[munin-node]"
end
source "plugins"
owner "root"
group "root"
- mode 0o755
+ mode "755"
files_owner "root"
files_group "root"
files_mode 0o755
source "plugin-conf.d"
owner "root"
group "munin"
- mode 0o750
+ mode "750"
files_owner "root"
files_group "root"
files_mode 0o644
source "rrdcached.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
directory "/var/lib/munin/rrdcached" do
owner "munin"
group "munin"
- mode 0o755
+ mode "755"
end
service "rrdcached" do
source "munin.conf.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables :expiry_time => expiry_time, :clients => clients,
:frontends => frontends, :backends => backends,
:tilecaches => tilecaches, :renderers => renderers,
source "www"
owner "root"
group "root"
- mode 0o755
+ mode "755"
files_owner "root"
files_group "root"
files_mode 0o644
directory "/srv/munin.openstreetmap.org/dumps" do
owner "www-data"
group "www-data"
- mode 0o755
+ mode "755"
end
ssl_certificate "munin.openstreetmap.org" do
source "backup.cron.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
munin_plugin "munin_stats"
source new_resource.template
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables new_resource.variables.merge(:name => new_resource.plugin_conf)
end
end
source "my.cnf.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :restart, "service[mysql]"
end
file "/etc/netplan/99-chef.yaml" do
owner "root"
group "root"
- mode 0o644
+ mode "644"
content YAML.dump(netplan)
end
source "hosts.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
not_if { ENV["TEST_KITCHEN"] }
end
directory "/etc/systemd/resolved.conf.d" do
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
template "/etc/systemd/resolved.conf.d/99-chef.conf" do
source "resolved.conf.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :restart, "service[systemd-resolved]", :immediately
end
source "shorewall-default.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :restart, "service[shorewall]"
end
source "shorewall.conf.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :restart, "service[shorewall]"
end
source "shorewall-zones.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables :type => "ipv4"
notifies :restart, "service[shorewall]"
end
source "shorewall-interfaces.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :restart, "service[shorewall]"
end
source "shorewall-hosts.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables :zones => zones
notifies :restart, "service[shorewall]"
end
source "shorewall-conntrack.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :restart, "service[shorewall]"
only_if { node[:networking][:firewall][:raw] }
end
source "shorewall-policy.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :restart, "service[shorewall]"
end
source "shorewall-rules.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables :family => "inet"
notifies :restart, "service[shorewall]"
end
source "logrotate.shorewall.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables :name => "shorewall"
end
source "shorewall-masq.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :restart, "service[shorewall]"
end
else
source "shorewall-default.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :restart, "service[shorewall6]"
end
source "shorewall6.conf.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :restart, "service[shorewall6]"
end
source "shorewall-zones.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables :type => "ipv6"
notifies :restart, "service[shorewall6]"
end
source "shorewall6-interfaces.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :restart, "service[shorewall6]"
end
source "shorewall6-hosts.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables :zones => zones
notifies :restart, "service[shorewall6]"
end
source "shorewall-conntrack.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :restart, "service[shorewall6]"
only_if { node[:networking][:firewall][:raw] }
end
source "shorewall-policy.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :restart, "service[shorewall6]"
end
source "shorewall-rules.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables :family => "inet6"
notifies :restart, "service[shorewall6]"
end
source "logrotate.shorewall.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables :name => "shorewall6"
end
directory mountpoint do
owner "root"
group "root"
- mode 0o755
+ mode "755"
recursive true
not_if { ::File.exist?(mountpoint) }
end
source "exports.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables :exports => exports
notifies :run, "execute[exportfs]"
end
source "nginx.conf.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
directory node[:nginx][:cache][:fastcgi][:directory] do
owner "www-data"
group "root"
- mode 0o755
+ mode "755"
recursive true
only_if { node[:nginx][:cache][:fastcgi][:enable] }
end
directory node[:nginx][:cache][:proxy][:directory] do
owner "www-data"
group "root"
- mode 0o755
+ mode "755"
recursive true
only_if { node[:nginx][:cache][:proxy][:enable] }
end
source "nginx-old-cache-cleanup.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
cron_d "nginx-old-cache-cleanup" do
source new_resource.template
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables new_resource.variables.merge(:name => new_resource.site, :directory => directory)
end
end
directory basedir do
owner "nominatim"
group "nominatim"
- mode 0o755
+ mode "755"
recursive true
end
directory node[:nominatim][:logdir] do
owner "nominatim"
group "nominatim"
- mode 0o755
+ mode "755"
recursive true
end
action :create_if_missing
owner "www-data"
group "adm"
- mode 0o664
+ mode "664"
end
file "#{node[:nominatim][:logdir]}/update.log" do
action :create_if_missing
owner "nominatim"
group "adm"
- mode 0o664
+ mode "664"
end
# exception granted for a limited time so that they can set up their own server
directory "#{basedir}/tablespaces" do
owner "postgres"
group "postgres"
- mode 0o700
+ mode "700"
end
# Note: tablespaces must be exactly in the same location on each
directory location do
owner "postgres"
group "postgres"
- mode 0o700
+ mode "700"
recursive true
end
directory node[:rsyncd][:modules][:archive][:path] do
owner "postgres"
group "postgres"
- mode 0o700
+ mode "700"
end
template "/usr/local/bin/clean-db-nominatim" do
source "clean-db-nominatim.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
variables :archive_dir => node[:rsyncd][:modules][:archive][:path],
:update_stop_file => "#{basedir}/status/updates_disabled",
:streaming_clients => search(:node, "nominatim_state:slave").map { |slave| slave[:fqdn] }.join(" ")
directory build_directory do
owner "nominatim"
group "nominatim"
- mode 0o755
+ mode "755"
recursive true
end
source "git-post-merge-hook.erb"
owner "nominatim"
group "nominatim"
- mode 0o755
+ mode "755"
variables :srcdir => source_directory,
:builddir => build_directory,
:dbname => node[:nominatim][:dbname]
source "settings.erb"
owner "nominatim"
group "nominatim"
- mode 0o664
+ mode "664"
variables :base_url => node[:nominatim][:state] == "off" ? node[:fqdn] : "nominatim.openstreetmap.org",
:dbname => node[:nominatim][:dbname],
:flatnode_file => node[:nominatim][:flatnode_file],
source "logrotate.nominatim.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
external_data = [
source "https://www.nominatim.org/data/#{fname}"
owner "nominatim"
group "nominatim"
- mode 0o644
+ mode "644"
end
end
source "https://www.nominatim.org/data/country_grid.sql.gz"
owner "nominatim"
group "nominatim"
- mode 0o644
+ mode "644"
end
if node[:nominatim][:state] == "off"
source "updater.erb"
user "nominatim"
group "nominatim"
- mode 0o755
+ mode "755"
variables :bindir => build_directory,
:srcdir => source_directory,
:logfile => "#{node[:nominatim][:logdir]}/update.log",
source "updater.init.erb"
user "nominatim"
group "nominatim"
- mode 0o755
+ mode "755"
variables :source_directory => source_directory
end
source "#{fname}.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
variables :db => node[:nominatim][:dbname]
end
end
directory "#{basedir}/etc" do
owner "nominatim"
group "adm"
- mode 0o775
+ mode "775"
end
%w[user_agent referrer email].each do |name|
action :create_if_missing
owner "nominatim"
group "adm"
- mode 0o664
+ mode "664"
end
end
source "logrotate.nginx.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
munin_plugin_conf "nominatim" do
directory "#{basedir}/status" do
owner "nominatim"
group "postgres"
- mode 0o775
+ mode "775"
end
include_recipe "fail2ban"
source "chrony.conf.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :restart, "service[chrony]"
end
directory "/etc/chef/ohai" do
owner "root"
group "root"
- mode 0o755
+ mode "755"
recursive true
end
source new_resource.template
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :reload, "ohai[#{new_resource.plugin}]"
end
end
source "sshd_config.conf.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :restart, "service[ssh]"
only_if { Dir.exist?("/etc/ssh/sshd_config.d") }
end
template "/etc/ssh/ssh_known_hosts" do
source "ssh_known_hosts.erb"
- mode 0o444
+ mode "444"
owner "root"
group "root"
backup false
file "/etc/openvpn/#{name}.key" do
owner "root"
group "root"
- mode 0o600
+ mode "600"
content peer[:openvpn][:keys][name]
end
end
source "tunnel.conf.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables :name => name,
:address => node[:openvpn][:address],
:port => node[:openvpn][:tunnels][name][:port],
directory osmosis_directory do
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
remote_file "#{cache_dir}/#{osmosis_package}" do
source "https://github.com/openstreetmap/osmosis/releases/download/#{osmosis_version}/osmosis-#{osmosis_version}.zip"
owner "root"
group "root"
- mode 0o644
+ mode "644"
backup false
end
directory directory do
owner site_user
group site_group
- mode 0o755
+ mode "755"
end
execute "osqa-migrate" do
directory "#{directory}/upfiles" do
user site_user
group site_group
- mode 0o755
+ mode "755"
end
template "#{directory}/osqa/osqa.wsgi" do
source "osqa.wsgi.erb"
owner site_user
group site_group
- mode 0o644
+ mode "644"
variables :directory => directory
notifies :reload, "service[apache2]"
end
file "#{directory}/osqa/settings_local.py" do
owner site_user
group site_group
- mode 0o644
+ mode "644"
content settings
notifies :reload, "service[apache2]"
end
source "backup.cron.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
variables :name => backup_name, :directory => directory, :user => site_user, :database => database_name
end
end
file "/opt/otrs-#{version}/Kernel/Config.pm" do
owner user
group "www-data"
- mode 0o664
+ mode "664"
content config
end
file name do
owner "otrs"
group "www-data"
- mode 0o664
+ mode "664"
content IO.read(distname)
notifies :run, "execute[/opt/otrs/bin/Cron.sh]"
end
source "sudoers.erb"
owner "root"
group "root"
- mode 0o440
+ mode "440"
end
template "/etc/cron.daily/otrs-backup" do
source "backup.cron.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
source "ruby.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
notifies :reload, "service[apache2]"
end
source "php-fpm.ini.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :restart, "service[php#{node[:php][:version]}-fpm]"
end
source new_resource.template
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables new_resource.variables
end
end
source "planet-update.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
template "/usr/local/bin/planet-update-file" do
source "planet-update-file.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
directory "/var/lib/planet" do
owner "planet"
group "planet"
- mode 0o755
+ mode "755"
end
remote_file "/var/lib/planet/planet.pbf" do
source "https://planet.openstreetmap.org/pbf/planet-latest.osm.pbf"
owner "planet"
group "planet"
- mode 0o644
+ mode "644"
not_if { ENV["TEST_KITCHEN"] }
end
source "planet-update.logrotate.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
source "cgi"
owner "root"
group "root"
- mode 0o755
+ mode "755"
files_owner "root"
files_group "root"
files_mode 0o755
source "history_cgi"
owner "www-data"
group "planet"
- mode 0o775
+ mode "775"
files_owner "root"
files_group "root"
files_mode 0o755
source "ccbysa_history_cgi"
owner "www-data"
group "planet"
- mode 0o775
+ mode "775"
files_owner "root"
files_group "root"
files_mode 0o755
directory node[:planet][:dump][dir] do
owner "www-data"
group "planet"
- mode 0o775
+ mode "775"
end
end
directory "/store/planet/notes" do
owner "www-data"
group "planet"
- mode 0o775
+ mode "775"
end
template "/usr/local/bin/apache-latest-planet-filename" do
source "apache-latest-planet-filename.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
notifies :restart, "service[apache2]"
end
source "logrotate.apache.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
munin_plugin "planet_age"
source "old-planet-file-cleanup.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
cron_d "old-planet-file-cleanup" do
directory "/opt/planet-dump-ng" do
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
git "/opt/planet-dump-ng" do
directory "/store/planetdump" do
owner "www-data"
group "www-data"
- mode 0o755
+ mode "755"
recursive true
end
source "#{program}.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
end
directory "/opt/planet-notes-dump" do
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
git "/opt/planet-notes-dump" do
source "planet-notes-dump.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
variables :password => db_passwords["planetdump"]
end
source "flush"
owner "root"
group "root"
- mode 0o755
+ mode "755"
files_owner "root"
files_group "root"
files_mode 0o755
source "replication-bin"
owner "root"
group "root"
- mode 0o755
+ mode "755"
files_owner "root"
files_group "root"
files_mode 0o755
source "users-agreed.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
template "/usr/local/bin/users-deleted" do
source "users-deleted.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
remote_directory "/store/planet/users_deleted" do
source "users_deleted"
owner "planet"
group "planet"
- mode 0o755
+ mode "755"
files_owner "root"
files_group "root"
files_mode 0o644
source "replication-cgi"
owner "root"
group "root"
- mode 0o755
+ mode "755"
files_owner "root"
files_group "root"
files_mode 0o755
directory "/store/planet/replication/changesets" do
owner "planet"
group "planet"
- mode 0o755
+ mode "755"
end
directory "/store/planet/replication/day" do
owner "planet"
group "planet"
- mode 0o755
+ mode "755"
end
directory "/store/planet/replication/hour" do
owner "planet"
group "planet"
- mode 0o755
+ mode "755"
end
directory "/store/planet/replication/minute" do
owner "planet"
group "planet"
- mode 0o755
+ mode "755"
end
directory "/etc/replication" do
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
directory "/var/run/lock/changeset-replication/" do
owner "planet"
group "planet"
- mode 0o750
+ mode "750"
end
template "/etc/replication/auth.conf" do
source "replication.auth.erb"
user "root"
group "planet"
- mode 0o640
+ mode "640"
variables :password => db_passwords["planetdiff"]
end
source "changesets.conf.erb"
user "root"
group "planet"
- mode 0o640
+ mode "640"
variables :password => db_passwords["planetdiff"]
end
source "users-agreed.conf.erb"
user "planet"
group "planet"
- mode 0o600
+ mode "600"
variables :password => db_passwords["planetdiff"]
end
directory "/var/lib/replication" do
owner "planet"
group "planet"
- mode 0o755
+ mode "755"
end
directory "/var/lib/replication/hour" do
owner "planet"
group "planet"
- mode 0o755
+ mode "755"
end
template "/var/lib/replication/hour/configuration.txt" do
source "replication.config.erb"
owner "planet"
group "planet"
- mode 0o644
+ mode "644"
variables :base => "minute", :interval => 3600
end
directory "/var/lib/replication/day" do
owner "planet"
group "planet"
- mode 0o755
+ mode "755"
end
template "/var/lib/replication/day/configuration.txt" do
source "replication.config.erb"
owner "planet"
group "planet"
- mode 0o644
+ mode "644"
variables :base => "hour", :interval => 86400
end
source "postgresql.conf.erb"
owner "postgres"
group "postgres"
- mode 0o644
+ mode "644"
variables :version => version, :defaults => defaults, :settings => settings
notifies :reload, "service[postgresql]"
end
source "pg_hba.conf.erb"
owner "postgres"
group "postgres"
- mode 0o640
+ mode "640"
variables :early_rules => settings[:early_authentication_rules] || defaults[:early_authentication_rules],
:late_rules => settings[:late_authentication_rules] || defaults[:late_authentication_rules]
notifies :reload, "service[postgresql]"
source "pg_ident.conf.erb"
owner "postgres"
group "postgres"
- mode 0o640
+ mode "640"
variables :maps => settings[:user_name_maps] || defaults[:user_name_maps]
notifies :reload, "service[postgresql]"
end
source "recovery.conf.erb"
owner "postgres"
group "postgres"
- mode 0o640
+ mode "640"
variables :standby_mode => standby_mode,
:primary_conninfo => primary_conninfo,
:restore_command => restore_command,
source "rsync.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :restart, "service[rsync]"
end
source "rsyncd.conf.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables :hosts_allow => hosts_allow, :hosts_deny => hosts_deny
end
file "/srv/hardware.openstreetmap.org/_data/nodes.json" do
content nodes.to_json
- mode 0o644
+ mode "644"
owner "root"
group "root"
notifies :run, "execute[/srv/hardware.openstreetmap.org]"
file "/srv/hardware.openstreetmap.org/_data/roles.json" do
content roles.to_json
- mode 0o644
+ mode "644"
owner "root"
group "root"
notifies :run, "execute[/srv/hardware.openstreetmap.org]"
end
directory "/srv/hardware.openstreetmap.org/_site" do
- mode 0o755
+ mode "755"
owner "nobody"
group "nogroup"
end
# Workaround https://github.com/jekyll/jekyll/issues/7804
# by creating a .jekyll-cache folder
directory "/srv/hardware.openstreetmap.org/.jekyll-cache" do
- mode 0o755
+ mode "755"
owner "nobody"
group "nogroup"
end
source "snmpd.conf.erb"
owner "root"
group "root"
- mode 0o600
+ mode "600"
variables :communities => communities
notifies :restart, "service[snmpd]"
end
directory "/var/spool/spamassassin" do
owner "debian-spamd"
group "debian-spamd"
- mode 0o755
+ mode "755"
end
template "/etc/default/spamassassin" do
source "spamassassin.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :restart, "service[spamassassin]"
end
source "local.cf.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables :trusted_networks => trusted_networks.sort
notifies :restart, "service[spamassassin]"
end
source "squid.conf.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
directory "/etc/squid/squid.conf.d" do
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
Array(node[:squid][:cache_dir]).each do |cache_dir|
directory cache_dir do
owner "proxy"
group "proxy"
- mode 0o750
+ mode "750"
recursive true
notifies :restart, "service[squid]"
end
source new_resource.template
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables new_resource.variables
end
end
cookbook_file "/etc/ssl/certs/letsencrypt.pem" do
owner "root"
group "root"
- mode 0o444
+ mode "444"
backup false
end
openssl_dhparam "/etc/ssl/certs/dhparam.pem" do
owner "root"
group "root"
- mode 0o444
+ mode "444"
end
file "/etc/ssl/certs/#{new_resource.certificate}.pem" do
owner "root"
group "root"
- mode 0o444
+ mode "444"
content certificate
backup false
manage_symlink_source false
file "/etc/ssl/private/#{new_resource.certificate}.key" do
owner "root"
group "ssl-cert"
- mode 0o440
+ mode "440"
content key
backup false
manage_symlink_source false
key_file "/etc/ssl/private/#{new_resource.certificate}.key"
owner "root"
group "ssl-cert"
- mode 0o640
+ mode "640"
org "OpenStreetMap"
email "operations@osmfoundation.org"
common_name new_resource.domains.first
directory "/srv/2007.stateofthemap.org" do
owner "wordpress"
group "wordpress"
- mode 0o755
+ mode "755"
end
wordpress_site "2007.stateofthemap.org" do
directory "/srv/2008.stateofthemap.org" do
owner "wordpress"
group "wordpress"
- mode 0o755
+ mode "755"
end
wordpress_site "2008.stateofthemap.org" do
directory "/srv/2009.stateofthemap.org" do
owner "wordpress"
group "wordpress"
- mode 0o755
+ mode "755"
end
git "/srv/2009.stateofthemap.org" do
directory "/srv/2010.stateofthemap.org" do
owner "wordpress"
group "wordpress"
- mode 0o755
+ mode "755"
end
git "/srv/2010.stateofthemap.org" do
directory "/srv/2011.stateofthemap.org" do
owner "wordpress"
group "wordpress"
- mode 0o755
+ mode "755"
end
git "/srv/2011.stateofthemap.org" do
directory "/srv/2012.stateofthemap.org" do
owner "wordpress"
group "wordpress"
- mode 0o755
+ mode "755"
end
git "/srv/2012.stateofthemap.org" do
end
directory "/srv/#{year}.stateofthemap.org/_site" do
- mode 0o755
+ mode "755"
owner "nobody"
group "nogroup"
end
# Workaround https://github.com/jekyll/jekyll/issues/7804
# by creating a .jekyll-cache folder
directory "/srv/#{year}.stateofthemap.org/.jekyll-cache" do
- mode 0o755
+ mode "755"
owner "nobody"
group "nogroup"
end
source "backup.cron.erb"
owner "root"
group "root"
- mode 0o750
+ mode "750"
variables :passwords => passwords
end
source "hooks"
owner "www-data"
group "www-data"
- mode 0o755
+ mode "755"
files_owner "www-data"
files_group "www-data"
files_mode 0o755
source "backup.cron.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
directory "/etc/supybot" do
owner "supybot"
group "supybot"
- mode 0o755
+ mode "755"
end
template "/etc/supybot/supybot.conf" do
source "supybot.conf.erb"
owner "supybot"
group "supybot"
- mode 0o644
+ mode "644"
variables :passwords => passwords
end
source "channels.conf.erb"
owner "supybot"
group "supybot"
- mode 0o644
+ mode "644"
end
template "/etc/supybot/git.conf" do
source "git.conf.erb"
owner "supybot"
group "supybot"
- mode 0o644
+ mode "644"
end
template "/etc/supybot/ignores.conf" do
source "ignores.conf.erb"
owner "supybot"
group "supybot"
- mode 0o644
+ mode "644"
end
template "/etc/supybot/userdata.conf" do
source "userdata.conf.erb"
owner "supybot"
group "supybot"
- mode 0o644
+ mode "644"
end
template "/etc/supybot/users.conf" do
source "users.conf.erb"
owner "supybot"
group "supybot"
- mode 0o644
+ mode "644"
variables :passwords => users
end
directory "/var/lib/supybot" do
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
directory "/var/lib/supybot/data" do
owner "supybot"
group "supybot"
- mode 0o755
+ mode "755"
end
directory "/var/lib/supybot/backup" do
owner "supybot"
group "supybot"
- mode 0o755
+ mode "755"
end
directory "/var/lib/supybot/git" do
owner "supybot"
group "supybot"
- mode 0o755
+ mode "755"
end
directory "/var/log/supybot" do
owner "supybot"
group "supybot"
- mode 0o755
+ mode "755"
end
directory "/usr/local/lib/supybot" do
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
directory "/usr/local/lib/supybot/plugins" do
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
git "/usr/local/lib/supybot/plugins/Git" do
end
directory "/srv/switch2osm.org/_site" do
- mode 0o755
+ mode "755"
owner "nobody"
group "nogroup"
end
# Workaround https://github.com/jekyll/jekyll/issues/7804
# by creating a .jekyll-cache folder
directory "/srv/switch2osm.org/.jekyll-cache" do
- mode 0o755
+ mode "755"
owner "nobody"
group "nogroup"
end
source "sysfs.conf.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :restart, "service[sysfsutils]"
end
source "path.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables path_variables
end
source "environment.erb"
owner "root"
group "root"
- mode 0o640
+ mode "640"
variables :environment => new_resource.environment_file
end
directory dropin_directory do
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
end
source "service.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables service_variables
notifies :run, "execute[systemctl-reload]"
end
source "timer.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables timer_variables
end
source "tmpfile.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
variables new_resource.to_hash
end
directory "/var/log/taginfo" do
owner "taginfo"
group "taginfo"
- mode 0o755
+ mode "755"
end
template "/etc/sudoers.d/taginfo" do
source "sudoers.erb"
owner "root"
group "root"
- mode 0o440
+ mode "440"
end
node[:taginfo][:sites].each do |site|
directory "/var/log/taginfo/#{site_name}" do
owner "taginfo"
group "taginfo"
- mode 0o755
+ mode "755"
end
directory directory do
owner "taginfo"
group "taginfo"
- mode 0o755
+ mode "755"
end
git "#{directory}/taginfo" do
file "#{directory}/taginfo-config.json" do
owner "taginfo"
group "taginfo"
- mode 0o644
+ mode "644"
content settings
notifies :restart, "service[apache2]"
end
directory "#{directory}/#{dir}" do
owner "taginfo"
group "taginfo"
- mode 0o755
+ mode "755"
end
end
source "update.erb"
owner "taginfo"
group "taginfo"
- mode 0o755
+ mode "755"
variables :name => site_name, :directory => directory
end
source "taginfo-update.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
variables :sites => node[:taginfo][:sites]
end
source "logrotate.apache.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
directory "/srv/tile.openstreetmap.org" do
owner "tile"
group "tile"
- mode 0o755
+ mode "755"
end
package "renderd"
directory "/srv/tile.openstreetmap.org/tiles" do
owner "tile"
group "tile"
- mode 0o755
+ mode "755"
end
template "/etc/renderd.conf" do
source "renderd.conf.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
notifies :reload, "service[apache2]"
notifies :restart, "service[renderd]"
end
source "html"
owner "tile"
group "tile"
- mode 0o755
+ mode "755"
files_owner "tile"
files_group "tile"
files_mode 0o644
source "index.html.erb"
owner "tile"
group "tile"
- mode 0o644
+ mode "644"
end
package %w[
source "https://github.com/googlei18n/noto-fonts/raw/master/hinted/#{font}"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
end
directory "/srv/tile.openstreetmap.org/cgi-bin" do
owner "tile"
group "tile"
- mode 0o755
+ mode "755"
end
template "/srv/tile.openstreetmap.org/cgi-bin/export" do
source "export.erb"
owner "tile"
group "tile"
- mode 0o755
+ mode "755"
variables :blocks => blocks, :totp_key => web_passwords["totp_key"]
end
source "debug.erb"
owner "tile"
group "tile"
- mode 0o755
+ mode "755"
end
template "/etc/cron.hourly/export" do
source "export.cron.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
directory "/srv/tile.openstreetmap.org/data" do
owner "tile"
group "tile"
- mode 0o755
+ mode "755"
end
package "mapnik-utils"
directory directory do
owner "tile"
group "tile"
- mode 0o755
+ mode "755"
end
else
directory = "/srv/tile.openstreetmap.org/data"
source url
owner "tile"
group "tile"
- mode 0o644
+ mode "644"
backup false
notifies :run, "execute[#{file}]", :immediately
notifies :restart, "service[renderd]"
directory "/srv/tile.openstreetmap.org/styles" do
owner "tile"
group "tile"
- mode 0o755
+ mode "755"
end
node[:tile][:styles].each do |name, details|
source "update-lowzoom.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
variables :style => name
end
directory tile_directory do
owner "tile"
group "tile"
- mode 0o755
+ mode "755"
end
details[:tile_directories].each do |directory|
directory directory[:name] do
owner "www-data"
group "www-data"
- mode 0o755
+ mode "755"
end
directory[:min_zoom].upto(directory[:max_zoom]) do |zoom|
directory "#{directory[:name]}/#{zoom}" do
owner "www-data"
group "www-data"
- mode 0o755
+ mode "755"
end
link "#{tile_directory}/#{zoom}" do
action :create_if_missing
owner "tile"
group "tile"
- mode 0o444
+ mode "444"
end
git style_directory do
directory File.dirname(node[:tile][:database][:node_file]) do
owner "root"
group "root"
- mode 0o755
+ mode "755"
recursive true
end
file node[:tile][:database][:node_file] do
owner "tile"
group "www-data"
- mode 0o660
+ mode "660"
end
directory "/var/log/tile" do
owner "tile"
group "tile"
- mode 0o755
+ mode "755"
end
package %w[
source "bin"
owner "root"
group "root"
- mode 0o755
+ mode "755"
files_owner "root"
files_group "root"
files_mode 0o755
source "expire-tiles.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
directory "/var/lib/replicate" do
owner "tile"
group "tile"
- mode 0o755
+ mode "755"
end
directory "/var/lib/replicate/expire-queue" do
owner "tile"
group "www-data"
- mode 0o775
+ mode "775"
end
template "/usr/local/bin/replicate" do
source "replicate.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
variables :postgresql_version => postgresql_version.to_f
end
source "replicate.logrotate.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
template "/usr/local/bin/render-lowzoom" do
source "render-lowzoom.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
systemd_service "render-lowzoom" do
source "cleanup-tiles.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
tile_directories = node[:tile][:styles].collect do |_, style|
source "logrotate.squid.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
nginx_site "default" do
source "nginx_generate_tilecache_qos_map.erb"
owner "root"
group "root"
- mode 0o750
+ mode "750"
variables :totp_key => web_passwords["totp_key"]
end
source "logrotate.nginx.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
fail2ban_jail "squid" do
directory "/srv/tilecache" do
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
directory "/srv/tilecache/data" do
owner "www-data"
group "www-data"
- mode 0o755
+ mode "755"
end
cookbook_file "/srv/tilecache/tilecache-curl-time.txt" do
source "tilecache-curl-time.txt"
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
template "/srv/tilecache/tilecache-curl-time" do
source "tilecache-curl-time.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
variables :caches => tilecaches, :renders => tilerenders
end
source "tilecache-curl-time-cleanup.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
ohai_plugin "tilecache" do
source "tilelog.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
variables :analyze_bin => "#{tilelog_source_directory}/openstreetmap-tile-analyze",
:input_dir => tilelog_input_directory,
:output_dir => tilelog_output_directory
directory tilelog_output_directory do
user "www-data"
group "www-data"
- mode 0o755
+ mode "755"
recursive true
end
source "motd-news.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
directory "/var/lib/trac" do
owner "trac"
group "trac"
- mode 0o755
+ mode "755"
end
execute "trac-initenv-#{site_name}" do
source "trac.ini.erb"
owner "trac"
group "www-data"
- mode 0o644
+ mode "644"
variables :name => site_name
end
source "htdocs"
owner "trac"
group "trac"
- mode 0o755
+ mode "755"
files_owner "trac"
files_group "trac"
files_mode 0o644
source "templates"
owner "trac"
group "trac"
- mode 0o755
+ mode "755"
files_owner "trac"
files_group "trac"
files_mode 0o644
cookbook_file "/usr/local/bin/trac-authenticate" do
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
apache_module "wsgi"
source "sudoers.erb"
owner "root"
group "root"
- mode 0o440
+ mode "440"
end
template "/etc/cron.daily/trac-backup" do
source "backup.cron.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
directory node[:web][:base_directory] do
group "rails"
- mode 0o2775
+ mode "2775"
end
systemd_tmpfile node[:web][:pid_directory] do
directory node[:web][:log_directory] do
owner "rails"
group "rails"
- mode 0o775
+ mode "775"
end
template "/etc/logrotate.d/web" do
source "logrotate.web.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
source "cleanup.cron.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
variables :ruby => ruby, :directory => rails_directory
end
source "logrotate.apache.erb"
owner "root"
group "root"
- mode 0o644
+ mode "644"
end
service "rails-jobs@mailers" do
source "passenger.cron.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
ruby_version = node[:passenger][:ruby_version]
source "cleanup-assets.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
gem_package "apachelogregex"
source "api-statistics.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
end
systemd_service "api-statistics" do
source "statistics.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
variables :ruby => ruby, :directory => rails_directory
end
declare_resource :directory, rails_directory do
owner new_resource.user
group new_resource.group
- mode 0o2775
+ mode "2775"
end
git rails_directory do
source "database.yml.erb"
owner new_resource.user
group new_resource.group
- mode 0o664
+ mode "664"
variables :host => new_resource.database_host,
:port => new_resource.database_port,
:name => new_resource.database_name,
path "#{rails_directory}/config/application.yml"
owner new_resource.user
group new_resource.group
- mode 0o664
+ mode "664"
content application_yml
notifies :run, "execute[#{rails_directory}/public/assets]"
only_if { ::File.exist?("#{rails_directory}/config/example.application.yml") }
file "#{rails_directory}/config/settings.local.yml" do
owner new_resource.user
group new_resource.group
- mode 0o664
+ mode "664"
content YAML.dump(settings)
notifies :run, "execute[#{rails_directory}/public/assets]"
only_if { ::File.exist?("#{rails_directory}/config/settings.yml") }
file "#{rails_directory}/config/storage.yml" do
owner new_resource.user
group new_resource.group
- mode 0o664
+ mode "664"
content YAML.dump(storage_configuration)
notifies :run, "execute[#{rails_directory}/public/assets]"
end
file "#{rails_directory}/config/piwik.yml" do
owner new_resource.user
group new_resource.group
- mode 0o664
+ mode "664"
content YAML.dump(new_resource.piwik_configuration)
notifies :run, "execute[#{rails_directory}/public/assets]"
end
source "rails.cron.erb"
owner "root"
group "root"
- mode 0o755
+ mode "755"
variables :directory => rails_directory
end
end
cookbook_file "/srv/wiki.openstreetmap.org/osm_logo_wiki.png" do
owner node[:mediawiki][:user]
group node[:mediawiki][:group]
- mode 0o644
+ mode "644"
end
template "/srv/wiki.openstreetmap.org/robots.txt" do
owner node[:mediawiki][:user]
group node[:mediawiki][:group]
- mode 0o644
+ mode "644"
source "robots.txt.erb"
end
cookbook_file "/srv/wiki.openstreetmap.org/favicon.ico" do
owner node[:mediawiki][:user]
group node[:mediawiki][:group]
- mode 0o644
+ mode "644"
end
directory "/srv/wiki.openstreetmap.org/dump" do
source new_resource.source
owner node[:wordpress][:user]
group node[:wordpress][:group]
- mode 0o755
+ mode "755"
files_owner node[:wordpress][:user]
files_group node[:wordpress][:group]
files_mode 0o755
declare_resource :directory, site_directory do
owner node[:wordpress][:user]
group node[:wordpress][:group]
- mode 0o755
+ mode "755"
end
subversion site_directory do
file "#{site_directory}/wp-config.php" do
owner node[:wordpress][:user]
group node[:wordpress][:group]
- mode 0o644
+ mode "644"
content wp_config
end
declare_resource :directory, "#{site_directory}/wp-content/uploads" do
owner "www-data"
group "www-data"
- mode 0o755
+ mode "755"
end
file "#{site_directory}/sitemap.xml" do
cookbook "wordpress"
owner node[:wordpress][:user]
group node[:wordpress][:group]
- mode 0o644
+ mode "644"
backup false
end
source new_resource.source
owner node[:wordpress][:user]
group node[:wordpress][:group]
- mode 0o755
+ mode "755"
files_owner node[:wordpress][:user]
files_group node[:wordpress][:group]
files_mode 0o644