diff --git a/roles/karaage2.7_noppolicy/tasks/main.yml b/roles/karaage2.7_noppolicy/tasks/main.yml
index de944debc7e561409309467791ffe2c7f559fa5c..9fbafca47eaa413ab8b6ca8f4fb2a08a479077c9 100644
--- a/roles/karaage2.7_noppolicy/tasks/main.yml
+++ b/roles/karaage2.7_noppolicy/tasks/main.yml
@@ -13,7 +13,7 @@
   lineinfile:  
   args:
     dest: /etc/karaage/ldap_schemas.py 
-    regexp: "from placard.schemas.pwdpolicy import pwdPolicyMixin" 
+    regexp: 'from placard.schemas.pwdpolicy import pwdPolicyMixin'
     line: "from placard.schemas.defaultUnlocked import defaultUnlockedMixin" 
     backrefs: yes
   sudo: true
@@ -22,7 +22,7 @@
   lineinfile:  
   args:
     dest: /etc/karaage/ldap_schemas.py 
-    regexp: "    mixin_list = [ common.personMixin, pwdPolicyMixin, kPersonMixin ]"
+    regexp: '    mixin_list = \[ common.personMixin, pwdPolicyMixin, kPersonMixin \]'
     line: "    mixin_list = [ common.personMixin, defaultUnlockedMixin, kPersonMixin ]"
     backrefs: yes
   sudo: true
@@ -31,7 +31,7 @@
   lineinfile:  
   args:
     dest: /etc/karaage/ldap_schemas.py 
-    regexp: "class person(rfc.person, rfc.organizationalPerson, rfc.inetOrgPerson, rfc.pwdPolicy, common.baseMixin):"
-    line: class person(rfc.person, rfc.organizationalPerson, rfc.inetOrgPerson, common.baseMixin):"
+    regexp: 'class person\(rfc.person, rfc.organizationalPerson, rfc.inetOrgPerson, rfc.pwdPolicy, common.baseMixin\):'
+    line: "class person(rfc.person, rfc.organizationalPerson, rfc.inetOrgPerson, common.baseMixin):"
     backrefs: yes
   sudo: true
diff --git a/roles/nfs-client/handlers/main.yml b/roles/nfs-client/handlers/main.yml
index eb242b5c5587039a557db04807f01bf79d1f0c14..efae0ca88f0f040c04c36f7818807aadb2c38ef6 100644
--- a/roles/nfs-client/handlers/main.yml
+++ b/roles/nfs-client/handlers/main.yml
@@ -1,9 +1,4 @@
 ---
-- name: restart authentication
-  shell: authconfig --updateall
-  when: nfs_type == "nfs4"
-  sudo: true
-
 - name: restart idmap 
   service: name={{ item }} state=restarted
   with_items:
diff --git a/roles/openLdapClient/tasks/configLdapClient.yml b/roles/openLdapClient/tasks/configLdapClient.yml
index 0bcc83dbdcbe3b10638dafd3126ea5d9380ab25f..43cf99eccb2a16a7ca3b66d17f56a24383a2533a 100644
--- a/roles/openLdapClient/tasks/configLdapClient.yml
+++ b/roles/openLdapClient/tasks/configLdapClient.yml
@@ -6,6 +6,11 @@
     - nsswitch.conf
   sudo: true
 
+- name: "Copy the CA cert"
+  copy: src={{ ldapCaCertSrc }} dest={{ ldapCaCertFile }} owner=root mode=644
+  sudo: true
+  when: ldapCaCertSrc is defined
+
 - name: "Copy pam config to ldap client"
   template: src=system-auth-ac.j2 dest=/etc/pam.d/system-auth-ac
   sudo: true
diff --git a/roles/slurm-build/tasks/main.yml b/roles/slurm-build/tasks/main.yml
index 6868f089b21149335e58fd05f37b610a69401333..07d8886054276b201e675bf8fb31aa20b783f03f 100644
--- a/roles/slurm-build/tasks/main.yml
+++ b/roles/slurm-build/tasks/main.yml
@@ -54,15 +54,12 @@
   args:
     creates: /tmp/rpmbuild/RPMS/x86_64/slurm-{{ slurm_version }}-1.el6.x86_64.rpm
 
-#- name: retrieve rpms
-#  shell: scp -r {{ hostvars[ansible_hostname]['ansible_user_id'] }}@{{ ansible_ssh_host }}:/tmp/rpmbuild/ /tmp
-#  delegate_to: 127.0.0.1
-#  when: ansible_ssh_host | defined
-#  when: ansible_ssh_host | defined
-#  sudo: true
+- name: retrieve rpms 1
+  shell: scp -r {{ hostvars[ansible_hostname]['ansible_user_id'] }}@{{ ansible_ssh_host }}:/tmp/rpmbuild/ /tmp
+  delegate_to: 127.0.0.1
+  when: ansible_ssh_host is defined
 
-- name: retrieve rpms
+- name: retrieve rpms 2
   shell: scp -r {{ hostvars[ansible_hostname]['ansible_user_id'] }}@{{ ansible_hostname }}:/tmp/rpmbuild/ /tmp
   delegate_to: 127.0.0.1
-#  when: ansible_ssh_host | not defined
-
+  when: ansible_ssh_host is not defined
diff --git a/roles/syncExports/tasks/addExports.yml b/roles/syncExports/tasks/addExports.yml
index d5bb11156e61d4b921a8420abc2f746f4d6338a7..7cf821387a1be454dcdc72aadedefced3c7e604e 100644
--- a/roles/syncExports/tasks/addExports.yml
+++ b/roles/syncExports/tasks/addExports.yml
@@ -4,8 +4,10 @@
   template: src=exports.j2 dest=/etc/exports owner=root group=root mode=644
   delegate_to: "{{ nfs_server }}"
   run_once: true
+  sudo: true
 -
   name : Restart the NFS Server
   service: name=nfs state=restarted
   delegate_to: "{{ nfs_server }}"
   run_once: true
+  sudo: true