aboutsummaryrefslogtreecommitdiff
path: root/net/foreman-proxy/files/patch-config-settings.yml.example
blob: 3d6c700a2caf5d316c25ca1030fba92474165c55 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
--- config/settings.yml.example.orig	2014-06-18 10:54:21.000000000 +0200
+++ config/settings.yml.example	2014-06-19 15:42:56.264085917 +0200
@@ -23,7 +23,7 @@
 
 # Enable TFTP management
 :tftp: false
-:tftproot: /var/lib/tftpboot
+:tftproot: /tftpboot
 # Defines the TFTP Servername to use, overrides the name in the subnet declaration
 #:tftp_servername: tftp.domain.com
 
@@ -35,14 +35,14 @@
 #   nsupdate_gss (for GSS-TSIG support)
 #   virsh (simple implementation for libvirt)
 :dns_provider: nsupdate
-#:dns_key: /etc/rndc.key
+#:dns_key: %%LOCALBASE%%/etc/namedb/rndc.key
 # use this setting if you are managing a dns server which is not localhost though this proxy
 #:dns_server: dns.domain.com
 # use this setting if you want to override default TTL setting (86400)
 #:dns_ttl: 86400
 # use dns_tsig_* for GSS-TSIG updates using Kerberos.  Required for Windows MS DNS with
 # Secure Dynamic Updates, or BIND as used in FreeIPA.  Set dns_provider to nsupdate_gss.
-#:dns_tsig_keytab: /usr/share/foreman-proxy/dns.keytab
+#:dns_tsig_keytab: %%PREFIX%%/share/foreman-proxy/dns.keytab
 #:dns_tsig_principal: DNS/host.example.com@EXAMPLE.COM
 
 # Enable DHCP management
@@ -55,15 +55,8 @@
 # dhcp_subnets is an ISC &  Native MS implementation setting. It restricts the subnets queried to a
 # subset, so as to reduce the query time.
 #:dhcp_subnets: [192.168.205.0/255.255.255.128, 192.168.205.128/255.255.255.128]
-# Settings for Ubuntu ISC
-#:dhcp_config: /etc/dhcp3/dhcpd.conf
-#:dhcp_leases: /var/lib/dhcp3/dhcpd.leases
-# Settings for Redhat ISC
-# Redhat 5
-#:dhcp_config: /etc/dhcpd.conf
-# Redhat 6
-#:dhcp_config: /etc/dhcp/dhcpd.conf
-#:dhcp_leases: /var/lib/dhcpd/dhcpd.leases
+#:dhcp_config: %%LOCALBASE%%/etc/dhcpd.conf
+#:dhcp_leases: /var/db/dhcpd.leases
 #:dhcp_key_name: secret_key_name
 #:dhcp_key_secret: secret_key
 
@@ -72,10 +65,10 @@
 
 # enable PuppetCA management
 :puppetca: false
-#:ssldir: /var/lib/puppet/ssl
-#:puppetdir: /etc/puppet
+#:ssldir: /var/puppet/ssl
+#:puppetdir: %%LOCALBASE%%/etc/puppet
 #:puppetca_use_sudo: true
-#:sudo_command: /usr/bin/sudo
+#:sudo_command: %%LOCALBASE%%/bin/sudo
 
 # enable Puppet management
 :puppet: false
@@ -89,19 +82,19 @@
 
 # customrun command details
 # Set :customrun_cmd to the full path of the script you want to run, instead of /bin/false
-:customrun_cmd: /bin/false
+:customrun_cmd: /usr/bin/false
 # Set :customrun_args to any args you want to pass to your custom script. The hostname of the
 # system to run against will be appended after the custom commands.
 :customrun_args: -ay -f -s
 
-:puppet_conf: /etc/puppet/puppet.conf
+:puppet_conf: %%LOCALBASE%%/etc/puppet/puppet.conf
 # whether to use sudo before the ssh command
 :puppetssh_sudo: false
 # the command which will be sent to the host
-:puppetssh_command: /usr/bin/puppet agent --onetime --no-usecacheonfailure
+:puppetssh_command: %%LOCALBASE%%/bin/puppet agent --onetime --no-usecacheonfailure
 # With which user should the proxy connect
 #:puppetssh_user: root
-#:puppetssh_keyfile: /etc/foreman-proxy/id_rsa
+#:puppetssh_keyfile: %%PREFIX%%/etc/foreman-proxy/id_rsa
 
 # Which user to invoke sudo as to run puppet commands
 #:puppet_user: root
@@ -113,7 +106,7 @@
 # smart-proxy client node needs to have some admin right on chef-server
 # in order to retrive all nodes public keys
 # :chef_smartproxy_clientname: 'host.example.net'
-# :chef_smartproxy_privatekey: '/etc/chef/client.pem'
+# :chef_smartproxy_privatekey: '%%LOCALBASE%%/etc/chef/client.pem'
 
 # enable BMC management  (Bare metal power and bios controls)
 # Available providers:
@@ -130,7 +123,7 @@
 :realm_provider: freeipa
 
 # Authentication for Kerberos-based Realms
-:realm_keytab: /etc/foreman-proxy/freeipa.keytab
+:realm_keytab: %%PREFIX%%/etc/foreman-proxy/freeipa.keytab
 :realm_principal: realm-proxy@EXAMPLE.COM
 
 # FreeIPA specific settings