X-Git-Url: https://git.openstreetmap.org./chef.git/blobdiff_plain/08d853efc90c809ebd90ac6832f80407769b92ba..6270f0b685e414b82dd311ad99fe4df0c3e2bfd6:/cookbooks/tilecache/recipes/default.rb diff --git a/cookbooks/tilecache/recipes/default.rb b/cookbooks/tilecache/recipes/default.rb index 23edf0155..d3f1dccfa 100644 --- a/cookbooks/tilecache/recipes/default.rb +++ b/cookbooks/tilecache/recipes/default.rb @@ -1,14 +1,14 @@ # -# Cookbook Name:: tilecache +# Cookbook:: tilecache # Recipe:: default # -# Copyright 2011, OpenStreetMap Foundation +# Copyright:: 2011, OpenStreetMap Foundation # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # -# http://www.apache.org/licenses/LICENSE-2.0 +# https://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, @@ -17,11 +17,210 @@ # limitations under the License. # +require "ipaddr" + +include_recipe "fail2ban" +include_recipe "munin" +include_recipe "nginx" include_recipe "squid" +include_recipe "ssl" + +package "apache2" do + action :remove +end + +package %w[ + curl + xz-utils + openssl +] + +# oathtool for QoS token +package "oathtool" + +tilecaches = search(:node, "roles:tilecache").sort_by { |n| n[:hostname] } +tilerenders = search(:node, "roles:tile").sort_by { |n| n[:hostname] } + +web_passwords = data_bag_item("web", "passwords") -tilecaches = search(:node, "roles:tilecache") +tilecaches.each do |cache| + cache.ipaddresses(:family => :inet, :role => :external).sort.each do |address| + firewall_rule "accept-squid" do + action :accept + family "inet" + source "net:#{address}" + dest "fw" + proto "tcp:syn" + dest_ports "3128" + source_ports "1024:" + end + + firewall_rule "accept-squid-icp" do + action :accept + family "inet" + source "net:#{address}" + dest "fw" + proto "udp" + dest_ports "3130" + source_ports "3130" + end + + firewall_rule "accept-squid-icp-reply" do + action :accept + family "inet" + source "fw" + dest "net:#{address}" + proto "udp" + dest_ports "3130" + source_ports "3130" + end + + firewall_rule "accept-squid-htcp" do + action :accept + family "inet" + source "net:#{address}" + dest "fw" + proto "udp" + dest_ports "4827" + source_ports "4827" + end + + firewall_rule "accept-squid-htcp-reply" do + action :accept + family "inet" + source "fw" + dest "net:#{address}" + proto "udp" + dest_ports "4827" + source_ports "4827" + end + end +end squid_fragment "tilecache" do template "squid.conf.erb" + variables :caches => tilecaches, :renders => tilerenders +end + +package "rsync" + +template "/etc/logrotate.d/squid" do + source "logrotate.squid.erb" + owner "root" + group "root" + mode "644" +end + +nginx_site "default" do + action [:delete] +end + +template "/usr/local/bin/nginx_generate_tilecache_qos_map" do + source "nginx_generate_tilecache_qos_map.erb" + owner "root" + group "root" + mode "750" + variables :totp_key => web_passwords["totp_key"] +end + +cron_d "tilecache" do + action :delete +end + +cron_d "tilecache-generate-qos-map" do + minute "0" + user "root" + command "/usr/local/bin/nginx_generate_tilecache_qos_map" +end + +cron_d "tilecache-curl-time" do + user "www-data" + command "/srv/tilecache/tilecache-curl-time" +end + +cron_d "tilecache-curl-time-cleanup" do + minute "15" + hour "0" + user "www-data" + command "/srv/tilecache/tilecache-curl-time-cleanup" +end + +execute "execute_nginx_generate_tilecache_qos_map" do + command "/usr/local/bin/nginx_generate_tilecache_qos_map" + creates "/etc/nginx/conf.d/tile_qos_rates.map" + action :run +end + +ssl_certificate "tile.openstreetmap.org" do + domains ["tile.openstreetmap.org", + "a.tile.openstreetmap.org", + "b.tile.openstreetmap.org", + "c.tile.openstreetmap.org", + "tile.osm.org", + "a.tile.osm.org", + "b.tile.osm.org", + "c.tile.osm.org"] + notifies :restart, "service[nginx]" +end + +nginx_site "tile" do + template "nginx_tile.conf.erb" variables :caches => tilecaches end + +template "/etc/logrotate.d/nginx" do + source "logrotate.nginx.erb" + owner "root" + group "root" + mode "644" +end + +fail2ban_jail "squid" do + maxretry 1000 +end + +tilerenders.each do |render| + munin_plugin "ping_#{render[:fqdn]}" do + target "ping_" + conf "munin.ping.erb" + conf_variables :host => render[:fqdn] + end +end + +directory "/srv/tilecache" do + owner "root" + group "root" + mode "755" +end + +directory "/srv/tilecache/data" do + owner "www-data" + group "www-data" + mode "755" +end + +cookbook_file "/srv/tilecache/tilecache-curl-time.txt" do + source "tilecache-curl-time.txt" + owner "root" + group "root" + mode "755" +end + +template "/srv/tilecache/tilecache-curl-time" do + source "tilecache-curl-time.erb" + owner "root" + group "root" + mode "755" + variables :caches => tilecaches, :renders => tilerenders +end + +template "/srv/tilecache/tilecache-curl-time-cleanup" do + source "tilecache-curl-time-cleanup.erb" + owner "root" + group "root" + mode "755" +end + +ohai_plugin "tilecache" do + template "ohai.rb.erb" +end