maybe chmod 0755 'systemd/system/reboot.target.wants'
maybe chmod 0755 'systemd/system/sockets.target.wants'
maybe chmod 0755 'systemd/system/sysinit.target.wants'
+maybe chmod 0755 'systemd/system/timers.target.wants'
maybe chmod 0644 'systemd/timesyncd.conf'
maybe chmod 0644 'systemd/user.conf'
maybe chmod 0755 'terminfo'
SHELL=/bin/sh
PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin
-0 */12 * * * root test -x /usr/bin/certbot && perl -e 'sleep int(rand(3600))' && certbot -q renew
+0 */12 * * * root test -x /usr/bin/certbot -a \! -d /run/systemd/system && perl -e 'sleep int(rand(3600))' && certbot -q renew
# access the master has to the minion.
#disable_modules: [cmd,test]
#disable_returners: []
-#
+
+# This is the reverse of disable_modules. The default, like disable_modules, is the empty list,
+# but if this option is set to *anything* then *only* those modules will load.
+# Note that this is a very large hammer and it can be quite difficult to keep the minion working
+# the way you think it should since Salt uses many modules internally itself. At a bare minimum
+# you need the following enabled or else the minion won't start.
+#whitelist_modules:
+# - cmdmod
+# - test
+# - config
+
# Modules can be loaded from arbitrary paths. This enables the easy deployment
# of third party modules. Modules for returners and minions can be loaded.
# Specify a list of extra directories to search for minion modules and