X-Git-Url: https://git.openstreetmap.org./chef.git/blobdiff_plain/3bcff805711e0fae3d5509d1f68edf7e605e4048..8f368b10a8cd0e097632874f720c49ce8eacea3a:/cookbooks/tile/recipes/default.rb?ds=sidebyside diff --git a/cookbooks/tile/recipes/default.rb b/cookbooks/tile/recipes/default.rb index 70085058d..963c3dd2f 100644 --- a/cookbooks/tile/recipes/default.rb +++ b/cookbooks/tile/recipes/default.rb @@ -104,12 +104,9 @@ systemd_service "renderd" do after "postgresql.service" wants "postgresql.service" limit_nofile 4096 - private_tmp true - private_devices true - private_network true - protect_system "full" - protect_home true - no_new_privileges true + sandbox true + restrict_address_families "AF_UNIX" + read_write_paths "/store/tiles" restart "on-failure" end @@ -199,7 +196,11 @@ directory "/srv/tile.openstreetmap.org/data" do mode "755" end -package "mapnik-utils" +package %w[ + mapnik-utils + tar + unzip +] node[:tile][:data].each_value do |data| url = data[:url] @@ -218,8 +219,6 @@ node[:tile][:data].each_value do |data| end if file =~ /\.tgz$/ - package "tar" - execute file do action :nothing command "tar -zxf #{file} -C #{directory}" @@ -227,8 +226,6 @@ node[:tile][:data].each_value do |data| group "tile" end elsif file =~ /\.tar\.bz2$/ - package "tar" - execute file do action :nothing command "tar -jxf #{file} -C #{directory}" @@ -236,8 +233,6 @@ node[:tile][:data].each_value do |data| group "tile" end elsif file =~ /\.zip$/ - package "unzip" - execute file do action :nothing command "unzip -qq -o #{file} -d #{directory}" @@ -277,16 +272,16 @@ nodejs_package "carto" systemd_service "update-lowzoom@" do description "Low zoom tile update service for %i layer" - conflicts "render-lowzoom.service" user "tile" + exec_start_pre "+/bin/systemctl stop render-lowzoom.service" exec_start "/bin/bash /usr/local/bin/update-lowzoom-%i" runtime_directory "update-lowzoom-%i" - private_tmp true - private_devices true - private_network true - protect_system "full" - protect_home true - no_new_privileges true + sandbox true + restrict_address_families "AF_UNIX" + read_write_paths [ + "/srv/tile.openstreetmap.org/tiles/%i", + "/var/log/tile" + ] restart "on-failure" end @@ -375,7 +370,7 @@ node[:tile][:styles].each do |name, details| execute "#{style_directory}/project.mml" do action :nothing - command "carto -a 3.0.0 project.mml > project.xml" + command "carto -a 3.0.22 project.mml > project.xml" cwd style_directory user "tile" group "tile" @@ -400,6 +395,11 @@ postgresql_user "tomh" do superuser true end +postgresql_user "pnorman" do + cluster node[:tile][:database][:cluster] + superuser true +end + postgresql_user "tile" do cluster node[:tile][:database][:cluster] end @@ -537,13 +537,9 @@ systemd_service "tile-ratelimit" do user "tile" group "adm" exec_start "/usr/local/bin/tile-ratelimit" - private_tmp true - private_devices true - private_network true - protect_system "full" - protect_home true + nice 10 + sandbox true read_write_paths "/srv/tile.openstreetmap.org/conf" - no_new_privileges true restart "on-failure" end @@ -585,12 +581,15 @@ systemd_service "expire-tiles" do type "simple" user "_renderd" exec_start "/usr/local/bin/expire-tiles" + nice 10 standard_output "null" - private_tmp true - private_devices true - protect_system "full" - protect_home true - no_new_privileges true + sandbox true + read_write_paths [ + "/store/database/nodes", + "/store/tiles/%i", + "/var/lib/replicate/expire-queue", + "/var/log/tile" + ] end systemd_path "expire-tiles" do @@ -609,11 +608,13 @@ systemd_service "replicate" do wants "postgresql.service" user "tile" exec_start "/usr/local/bin/replicate" - private_tmp true - private_devices true - protect_system "full" - protect_home true - no_new_privileges true + sandbox :enable_network => true + restrict_address_families "AF_UNIX" + read_write_paths [ + "/store/database/nodes", + "/var/lib/replicate", + "/var/log/tile" + ] restart "on-failure" end @@ -642,12 +643,9 @@ systemd_service "render-lowzoom" do condition_path_exists_glob "!/run/update-lowzoom-*" user "tile" exec_start "/usr/local/bin/render-lowzoom" - private_tmp true - private_devices true - private_network true - protect_system "full" - protect_home true - no_new_privileges true + sandbox true + restrict_address_families "AF_UNIX" + read_write_paths "/var/log/tile" end systemd_timer "render-lowzoom" do