summaryrefslogtreecommitdiff
path: root/sitemodules/profiles/manifests/sniproxy.pp
diff options
context:
space:
mode:
Diffstat (limited to 'sitemodules/profiles/manifests/sniproxy.pp')
-rw-r--r--sitemodules/profiles/manifests/sniproxy.pp39
1 files changed, 7 insertions, 32 deletions
diff --git a/sitemodules/profiles/manifests/sniproxy.pp b/sitemodules/profiles/manifests/sniproxy.pp
index 971c210..966f2d8 100644
--- a/sitemodules/profiles/manifests/sniproxy.pp
+++ b/sitemodules/profiles/manifests/sniproxy.pp
@@ -6,13 +6,9 @@
# Parameters
# ----------
#
-# @param https_forwards_sniproxy a list of server names to target ips/ports for
-# the sniproxy configuration
+# @param https_forwards a hash of server names to target ips/ports for nginx
#
-# @param https_forwards a hash of server names to target ips/ports for
-# nginx
-#
-# @param https_port the https port for nginx
+# @param https_port the https port for nginx
#
# Examples
# --------
@@ -33,45 +29,24 @@
# Copyright 2017-2021 Jan Dittberner
#
class profiles::sniproxy (
- Array[String] $https_forwards_sniproxy,
Hash[String,String] $https_forwards,
Integer $https_port = 443,
) {
- # not required since Buster
- file { '/etc/apt/preferences.d/sniproxy':
- ensure => absent,
- }
-
package { 'sniproxy':
- ensure => present,
+ ensure => purged,
}
file { '/etc/default/sniproxy':
- ensure => file,
- owner => 'root',
- group => 'root',
- mode => '0644',
- source => 'puppet:///modules/profiles/sniproxy/etc_default_sniproxy',
- require => Package['sniproxy'],
+ ensure => absent,
}
file { '/etc/sniproxy.conf':
- ensure => file,
- owner => 'root',
- group => 'root',
- mode => '0644',
- content => epp(
- 'profiles/sniproxy/sniproxy.conf.epp',
- {'https_forwards' => $https_forwards_sniproxy}
- ),
- require => Package['sniproxy'],
+ ensure => absent,
}
service { 'sniproxy':
- ensure => running,
- enable => true,
- require => [Package['sniproxy'], File['/etc/default/sniproxy'], File['/etc/sniproxy.conf']],
- subscribe => [File['/etc/default/sniproxy'], File['/etc/sniproxy.conf']],
+ ensure => stopped,
+ enable => false,
}
package { 'nginx-full':