X-Git-Url: https://git.openstreetmap.org./chef.git/blobdiff_plain/81d8eb8d36b74b4d979784f9a984e69ee5e7495c..6cce603b75b8ea9dc9a234f49427583abc9c0a1a:/cookbooks/tilecache/recipes/default.rb diff --git a/cookbooks/tilecache/recipes/default.rb b/cookbooks/tilecache/recipes/default.rb index 5c4907b69..adc222685 100644 --- a/cookbooks/tilecache/recipes/default.rb +++ b/cookbooks/tilecache/recipes/default.rb @@ -1,8 +1,8 @@ # -# Cookbook Name:: tilecache +# Cookbook:: tilecache # Recipe:: default # -# Copyright 2011, OpenStreetMap Foundation +# Copyright:: 2011, OpenStreetMap Foundation # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. @@ -19,15 +19,18 @@ require "ipaddr" -include_recipe "ssl" -include_recipe "squid" +include_recipe "fail2ban" +include_recipe "munin" include_recipe "nginx" +include_recipe "squid" +include_recipe "ssl" package "apache2" do action :remove end package %w[ + curl xz-utils openssl ] @@ -51,6 +54,7 @@ tilecaches.each do |cache| dest_ports "3128" source_ports "1024:" end + firewall_rule "accept-squid-icp" do action :accept family "inet" @@ -60,6 +64,7 @@ tilecaches.each do |cache| dest_ports "3130" source_ports "3130" end + firewall_rule "accept-squid-icp-reply" do action :accept family "inet" @@ -69,6 +74,26 @@ tilecaches.each do |cache| dest_ports "3130" source_ports "3130" end + + firewall_rule "accept-squid-htcp" do + action :accept + family "inet" + source "net:#{address}" + dest "fw" + proto "udp" + dest_ports "4827" + source_ports "4827" + end + + firewall_rule "accept-squid-htcp-reply" do + action :accept + family "inet" + source "fw" + dest "net:#{address}" + proto "udp" + dest_ports "4827" + source_ports "4827" + end end end @@ -98,11 +123,26 @@ template "/usr/local/bin/nginx_generate_tilecache_qos_map" do variables :totp_key => web_passwords["totp_key"] end -template "/etc/cron.d/tilecache" do - source "cron.erb" - owner "root" - group "root" - mode 0o644 +cron_d "tilecache" do + action :delete +end + +cron_d "tilecache-generate-qos-map" do + minute "0" + user "root" + command "/usr/local/bin/nginx_generate_tilecache_qos_map" +end + +cron_d "tilecache-curl-time" do + user "www-data" + command "/srv/tilecache/tilecache-curl-time" +end + +cron_d "tilecache-curl-time-cleanup" do + minute "15" + hour "0" + user "www-data" + command "/srv/tilecache/tilecache-curl-time-cleanup" end execute "execute_nginx_generate_tilecache_qos_map" do @@ -135,6 +175,10 @@ template "/etc/logrotate.d/nginx" do mode 0o644 end +fail2ban_jail "squid" do + maxretry 1000 +end + tilerenders.each do |render| munin_plugin "ping_#{render[:fqdn]}" do target "ping_" @@ -142,3 +186,41 @@ tilerenders.each do |render| conf_variables :host => render[:fqdn] end end + +directory "/srv/tilecache" do + owner "root" + group "root" + mode 0o755 +end + +directory "/srv/tilecache/data" do + owner "www-data" + group "www-data" + mode 0o755 +end + +cookbook_file "/srv/tilecache/tilecache-curl-time.txt" do + source "tilecache-curl-time.txt" + owner "root" + group "root" + mode 0o755 +end + +template "/srv/tilecache/tilecache-curl-time" do + source "tilecache-curl-time.erb" + owner "root" + group "root" + mode 0o755 + variables :caches => tilecaches, :renders => tilerenders +end + +template "/srv/tilecache/tilecache-curl-time-cleanup" do + source "tilecache-curl-time-cleanup.erb" + owner "root" + group "root" + mode 0o755 +end + +ohai_plugin "tilecache" do + template "ohai.rb.erb" +end