X-Git-Url: https://git.openstreetmap.org./chef.git/blobdiff_plain/21958591555b0b80370e944e3128ac5d533c281d..e5f294d3dc676675b2803915571c28337468c3b3:/cookbooks/tilecache/recipes/default.rb?ds=sidebyside diff --git a/cookbooks/tilecache/recipes/default.rb b/cookbooks/tilecache/recipes/default.rb index ce4819ad0..a69b6ed8d 100644 --- a/cookbooks/tilecache/recipes/default.rb +++ b/cookbooks/tilecache/recipes/default.rb @@ -19,9 +19,6 @@ require "ipaddr" -certificate = node[:tilecache][:ssl][:certificate] -node.default[:ssl][:certificates] = node[:ssl][:certificates] | [certificate] - include_recipe "ssl" include_recipe "squid" include_recipe "nginx" @@ -30,11 +27,19 @@ package "apache2" do action :remove end -package "xz-utils" +package %w[ + xz-utils + openssl +] + +# oathtool for QoS token +package "oathtool" tilecaches = search(:node, "roles:tilecache").sort_by { |n| n[:hostname] } tilerenders = search(:node, "roles:tile").sort_by { |n| n[:hostname] } +web_passwords = data_bag_item("web", "passwords") + tilecaches.each do |cache| cache.ipaddresses(:family => :inet, :role => :external).sort.each do |address| firewall_rule "accept-squid" do @@ -76,7 +81,7 @@ template "/etc/logrotate.d/squid" do source "logrotate.squid.erb" owner "root" group "root" - mode 0644 + mode 0o644 end nginx_site "default" do @@ -84,20 +89,48 @@ nginx_site "default" do end resolvers = node[:networking][:nameservers].map do |resolver| - IPAddr.new(resolver).ipv6? ? "[#{resolver}]" : "#{resolver}" + IPAddr.new(resolver).ipv6? ? "[#{resolver}]" : resolver +end + +template "/usr/local/bin/nginx_generate_tilecache_qos_map" do + source "nginx_generate_tilecache_qos_map.erb" + owner "root" + group "root" + mode 0o750 + variables :totp_key => web_passwords["totp_key"] +end + +template "/etc/cron.d/tilecache" do + source "cron.erb" + owner "root" + group "root" + mode 0o644 +end + +execute "execute_nginx_generate_tilecache_qos_map" do + command "/usr/local/bin/nginx_generate_tilecache_qos_map" + creates "/etc/nginx/conf.d/tile_qos_rates.map" + action :run +end + +ssl_certificate "tile.openstreetmap.org" do + domains ["tile.openstreetmap.org", + "a.tile.openstreetmap.org", + "b.tile.openstreetmap.org", + "c.tile.openstreetmap.org"] + notifies :restart, "service[nginx]" end nginx_site "tile-ssl" do - template "nginx_tile_ssl.conf.erb" - variables :certificate => certificate, :resolvers => resolvers + template_source "nginx_tile_ssl.conf.erb" + variables :resolvers => resolvers, :caches => tilecaches end -service "nginx-certificate-restart" do - service_name "nginx" - action :nothing - subscribes :restart, "cookbook_file[/etc/ssl/certs/rapidssl.pem]" - subscribes :restart, "cookbook_file[/etc/ssl/certs/#{certificate}.pem]" - subscribes :restart, "file[/etc/ssl/private/#{certificate}.key]" +template "/etc/logrotate.d/nginx" do + source "logrotate.nginx.erb" + owner "root" + group "root" + mode 0o644 end tilerenders.each do |render| @@ -107,3 +140,7 @@ tilerenders.each do |render| conf_variables :host => render[:fqdn] end end + +Dir.glob("/var/log/nginx/access.log*") do |log| + File.unlink(log) +end