X-Git-Url: https://git.openstreetmap.org./chef.git/blobdiff_plain/c5b119c4e6f0ae792672f344ab316cf4047d27aa..901782e5452c232c7e6f644f2c56a3903b09edf3:/cookbooks/tilecache/recipes/default.rb?ds=sidebyside diff --git a/cookbooks/tilecache/recipes/default.rb b/cookbooks/tilecache/recipes/default.rb index a0879928e..f1bab2e57 100644 --- a/cookbooks/tilecache/recipes/default.rb +++ b/cookbooks/tilecache/recipes/default.rb @@ -1,14 +1,14 @@ # -# Cookbook Name:: tilecache +# Cookbook:: tilecache # Recipe:: default # -# Copyright 2011, OpenStreetMap Foundation +# Copyright:: 2011, OpenStreetMap Foundation # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # -# http://www.apache.org/licenses/LICENSE-2.0 +# https://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, @@ -19,19 +19,20 @@ require "ipaddr" -certificate = node[:tilecache][:ssl][:certificate] -node.default[:ssl][:certificates] = node[:ssl][:certificates] | [certificate] - -include_recipe "ssl" -include_recipe "squid" +include_recipe "fail2ban" +include_recipe "munin" include_recipe "nginx" +include_recipe "squid" +include_recipe "ssl" package "apache2" do action :remove end -package "xz-utils" -package "openssl" +package %w[ + xz-utils + openssl +] # oathtool for QoS token package "oathtool" @@ -39,7 +40,7 @@ package "oathtool" tilecaches = search(:node, "roles:tilecache").sort_by { |n| n[:hostname] } tilerenders = search(:node, "roles:tile").sort_by { |n| n[:hostname] } -tilecache_tokens = data_bag_item("tilecache", "tokens") +web_passwords = data_bag_item("web", "passwords") tilecaches.each do |cache| cache.ipaddresses(:family => :inet, :role => :external).sort.each do |address| @@ -52,6 +53,7 @@ tilecaches.each do |cache| dest_ports "3128" source_ports "1024:" end + firewall_rule "accept-squid-icp" do action :accept family "inet" @@ -61,6 +63,7 @@ tilecaches.each do |cache| dest_ports "3130" source_ports "3130" end + firewall_rule "accept-squid-icp-reply" do action :accept family "inet" @@ -70,6 +73,26 @@ tilecaches.each do |cache| dest_ports "3130" source_ports "3130" end + + firewall_rule "accept-squid-htcp" do + action :accept + family "inet" + source "net:#{address}" + dest "fw" + proto "udp" + dest_ports "4827" + source_ports "4827" + end + + firewall_rule "accept-squid-htcp-reply" do + action :accept + family "inet" + source "fw" + dest "net:#{address}" + proto "udp" + dest_ports "4827" + source_ports "4827" + end end end @@ -78,6 +101,8 @@ squid_fragment "tilecache" do variables :caches => tilecaches, :renders => tilerenders end +package "rsync" + template "/etc/logrotate.d/squid" do source "logrotate.squid.erb" owner "root" @@ -89,21 +114,12 @@ nginx_site "default" do action [:delete] end -resolvers = node[:networking][:nameservers].map do |resolver| - IPAddr.new(resolver).ipv6? ? "[#{resolver}]" : resolver -end - -nginx_site "tile-ssl" do - template "nginx_tile_ssl.conf.erb" - variables :certificate => certificate, :resolvers => resolvers, :caches => tilecaches -end - template "/usr/local/bin/nginx_generate_tilecache_qos_map" do source "nginx_generate_tilecache_qos_map.erb" owner "root" group "root" mode 0o750 - variables :tokens => tilecache_tokens + variables :totp_key => web_passwords["totp_key"] end template "/etc/cron.d/tilecache" do @@ -113,18 +129,27 @@ template "/etc/cron.d/tilecache" do mode 0o644 end -execute 'execute_nginx_generate_tilecache_qos_map' do - command '/usr/local/bin/nginx_generate_tilecache_qos_map' - creates '/etc/nginx/conf.d/tile_qos_rates.map' +execute "execute_nginx_generate_tilecache_qos_map" do + command "/usr/local/bin/nginx_generate_tilecache_qos_map" + creates "/etc/nginx/conf.d/tile_qos_rates.map" action :run end -service "nginx-certificate-restart" do - service_name "nginx" - action :nothing - subscribes :restart, "cookbook_file[/etc/ssl/certs/rapidssl.pem]" - subscribes :restart, "file[/etc/ssl/certs/#{certificate}.pem]" - subscribes :restart, "file[/etc/ssl/private/#{certificate}.key]" +ssl_certificate "tile.openstreetmap.org" do + domains ["tile.openstreetmap.org", + "a.tile.openstreetmap.org", + "b.tile.openstreetmap.org", + "c.tile.openstreetmap.org", + "tile.osm.org", + "a.tile.osm.org", + "b.tile.osm.org", + "c.tile.osm.org"] + notifies :restart, "service[nginx]" +end + +nginx_site "tile" do + template "nginx_tile.conf.erb" + variables :caches => tilecaches end template "/etc/logrotate.d/nginx" do @@ -134,6 +159,10 @@ template "/etc/logrotate.d/nginx" do mode 0o644 end +fail2ban_jail "squid" do + maxretry 1000 +end + tilerenders.each do |render| munin_plugin "ping_#{render[:fqdn]}" do target "ping_"