X-Git-Url: https://git.openstreetmap.org/chef.git/blobdiff_plain/5d7a8f818d35fc59408204ff7ca10c5eef541569..a68415b8f2bf106b6ea5948b0605c897b516ef4f:/cookbooks/tilecache/recipes/default.rb diff --git a/cookbooks/tilecache/recipes/default.rb b/cookbooks/tilecache/recipes/default.rb index 9357ee6d7..625783b66 100644 --- a/cookbooks/tilecache/recipes/default.rb +++ b/cookbooks/tilecache/recipes/default.rb @@ -17,12 +17,22 @@ # limitations under the License. # -node.default[:ssl][:certificates] = node[:ssl][:certificates] | [ "tile.openstreetmap" ] +require "ipaddr" + +certificate = node[:tilecache][:ssl][:certificate] +node.default[:ssl][:certificates] = node[:ssl][:certificates] | [certificate] include_recipe "ssl" include_recipe "squid" include_recipe "nginx" +package "apache2" do + action :remove +end + +package "xz-utils" +package "openssl" + tilecaches = search(:node, "roles:tilecache").sort_by { |n| n[:hostname] } tilerenders = search(:node, "roles:tile").sort_by { |n| n[:hostname] } @@ -44,7 +54,16 @@ tilecaches.each do |cache| dest "fw" proto "udp" dest_ports "3130" - source_ports "1024:" + source_ports "3130" + end + firewall_rule "accept-squid-icp-reply" do + action :accept + family "inet" + source "fw" + dest "net:#{address}" + proto "udp" + dest_ports "3130" + source_ports "3130" end end end @@ -58,15 +77,41 @@ template "/etc/logrotate.d/squid" do source "logrotate.squid.erb" owner "root" group "root" - mode 0644 + mode 0o644 end nginx_site "default" do - action :delete + action [:delete] +end + +resolvers = node[:networking][:nameservers].map do |resolver| + IPAddr.new(resolver).ipv6? ? "[#{resolver}]" : resolver end nginx_site "tile-ssl" do - action :create - source "nginx_tile_ssl.conf.erb" + template "nginx_tile_ssl.conf.erb" + variables :certificate => certificate, :resolvers => resolvers, :caches => tilecaches +end + +service "nginx-certificate-restart" do + service_name "nginx" + action :nothing + subscribes :restart, "cookbook_file[/etc/ssl/certs/rapidssl.pem]" + subscribes :restart, "cookbook_file[/etc/ssl/certs/#{certificate}.pem]" + subscribes :restart, "file[/etc/ssl/private/#{certificate}.key]" +end + +template "/etc/logrotate.d/nginx" do + source "logrotate.nginx.erb" + owner "root" + group "root" + mode 0o644 end +tilerenders.each do |render| + munin_plugin "ping_#{render[:fqdn]}" do + target "ping_" + conf "munin.ping.erb" + conf_variables :host => render[:fqdn] + end +end