2011-12-13 23:49:18 +01:00
|
|
|
# define: nginx::resource::vhost
|
2011-06-07 01:05:27 +02:00
|
|
|
#
|
2011-12-13 23:49:18 +01:00
|
|
|
# This definition creates a virtual host
|
2011-06-07 01:05:27 +02:00
|
|
|
#
|
|
|
|
# Parameters:
|
2013-08-22 21:23:16 +02:00
|
|
|
# [*ensure*] - Enables or disables the specified vhost
|
|
|
|
# (present|absent)
|
|
|
|
# [*listen_ip*] - Default IP Address for NGINX to listen with this
|
|
|
|
# vHost on. Defaults to all interfaces (*)
|
|
|
|
# [*listen_port*] - Default IP Port for NGINX to listen with this
|
|
|
|
# vHost on. Defaults to TCP 80
|
|
|
|
# [*listen_options*] - Extra options for listen directive like
|
|
|
|
# 'default' to catchall. Undef by default.
|
2013-09-04 19:04:28 +02:00
|
|
|
# [*location_allow*] - Array: Locations to allow connections from.
|
|
|
|
# [*location_deny*] - Array: Locations to deny connections from.
|
2013-08-22 21:23:16 +02:00
|
|
|
# [*ipv6_enable*] - BOOL value to enable/disable IPv6 support
|
|
|
|
# (false|true). Module will check to see if IPv6 support exists on your
|
|
|
|
# system before enabling.
|
|
|
|
# [*ipv6_listen_ip*] - Default IPv6 Address for NGINX to listen with
|
|
|
|
# this vHost on. Defaults to all interfaces (::)
|
|
|
|
# [*ipv6_listen_port*] - Default IPv6 Port for NGINX to listen with this
|
|
|
|
# vHost on. Defaults to TCP 80
|
|
|
|
# [*ipv6_listen_options*] - Extra options for listen directive like 'default'
|
|
|
|
# to catchall. Template will allways add ipv6only=on. While issue
|
|
|
|
# jfryman/puppet-nginx#30 is discussed, default value is 'default'.
|
2013-12-24 19:47:15 +01:00
|
|
|
# [*add_header*] - Hash: Adds headers to the HTTP response when
|
2013-12-24 13:07:58 +01:00
|
|
|
# response code is equal to 200, 204, 301, 302 or 304.
|
2013-08-22 21:23:16 +02:00
|
|
|
# [*index_files*] - Default index files for NGINX to read when
|
|
|
|
# traversing a directory
|
2014-02-10 18:14:18 +01:00
|
|
|
# [*autoindex*] - Set it on 'on' or 'off 'to activate/deactivate
|
|
|
|
# autoindex directory listing. Undef by default.
|
2013-08-22 21:23:16 +02:00
|
|
|
# [*proxy*] - Proxy server(s) for the root location to connect
|
|
|
|
# to. Accepts a single value, can be used in conjunction with
|
|
|
|
# nginx::resource::upstream
|
|
|
|
# [*proxy_read_timeout*] - Override the default the proxy read timeout value
|
|
|
|
# of 90 seconds
|
2014-06-23 20:39:56 +02:00
|
|
|
# [*proxy_redirect*] - Override the default proxy_redirect value of off.
|
2014-04-03 11:59:47 +02:00
|
|
|
# [*resolver*] - Array: Configures name servers used to resolve
|
2013-12-29 15:48:32 +01:00
|
|
|
# names of upstream servers into addresses.
|
2013-03-20 18:44:45 +01:00
|
|
|
# [*fastcgi*] - location of fastcgi (host:port)
|
|
|
|
# [*fastcgi_params*] - optional alternative fastcgi_params file to use
|
|
|
|
# [*fastcgi_script*] - optional SCRIPT_FILE parameter
|
2013-08-22 21:23:16 +02:00
|
|
|
# [*ssl*] - Indicates whether to setup SSL bindings for this
|
|
|
|
# vhost.
|
|
|
|
# [*ssl_cert*] - Pre-generated SSL Certificate file to reference
|
|
|
|
# for SSL Support. This is not generated by this module.
|
2013-12-27 09:10:11 +01:00
|
|
|
# [*ssl_dhparam*] - This directive specifies a file containing
|
|
|
|
# Diffie-Hellman key agreement protocol cryptographic parameters, in PEM
|
2014-01-27 16:57:38 +01:00
|
|
|
# format, utilized for exchanging session keys between server and client.
|
2013-08-22 21:23:16 +02:00
|
|
|
# [*ssl_key*] - Pre-generated SSL Key file to reference for SSL
|
|
|
|
# Support. This is not generated by this module.
|
|
|
|
# [*ssl_port*] - Default IP Port for NGINX to listen with this SSL
|
|
|
|
# vHost on. Defaults to TCP 443
|
|
|
|
# [*ssl_protocols*] - SSL protocols enabled. Defaults to 'SSLv3 TLSv1
|
|
|
|
# TLSv1.1 TLSv1.2'.
|
|
|
|
# [*ssl_ciphers*] - SSL ciphers enabled. Defaults to
|
|
|
|
# 'HIGH:!aNULL:!MD5'.
|
2013-12-29 15:39:21 +01:00
|
|
|
# [*ssl_stapling*] - Bool: Enables or disables stapling of OCSP
|
|
|
|
# responses by the server. Defaults to false.
|
|
|
|
# [*ssl_stapling_file*] - String: When set, the stapled OCSP response
|
|
|
|
# will be taken from the specified file instead of querying the OCSP
|
|
|
|
# responder specified in the server certificate.
|
|
|
|
# [*ssl_stapling_responder*] - String: Overrides the URL of the OCSP
|
2013-12-30 19:03:55 +01:00
|
|
|
# responder specified in the Authority Information Access certificate
|
2013-12-29 15:39:21 +01:00
|
|
|
# extension.
|
|
|
|
# [*ssl_stapling_verify*] - Bool: Enables or disables verification of
|
|
|
|
# OCSP responses by the server. Defaults to false.
|
|
|
|
# [*ssl_trusted_cert*] - String: Specifies a file with trusted CA
|
|
|
|
# certificates in the PEM format used to verify client certificates and
|
|
|
|
# OCSP responses if ssl_stapling is enabled.
|
2013-06-27 15:42:38 +02:00
|
|
|
# [*spdy*] - Toggles SPDY protocol.
|
2013-08-22 21:23:16 +02:00
|
|
|
# [*server_name*] - List of vhostnames for which this vhost will
|
|
|
|
# respond. Default [$name].
|
|
|
|
# [*www_root*] - Specifies the location on disk for files to be
|
|
|
|
# read from. Cannot be set in conjunction with $proxy
|
2013-05-21 15:15:59 +02:00
|
|
|
# [*rewrite_www_to_non_www*] - Adds a server directive and rewrite rule to
|
2013-08-22 21:23:16 +02:00
|
|
|
# rewrite www.domain.com to domain.com in order to avoid duplicate
|
|
|
|
# content (SEO);
|
2013-05-21 15:15:59 +02:00
|
|
|
# [*try_files*] - Specifies the locations for files to be
|
|
|
|
# checked as an array. Cannot be used in conjuction with $proxy.
|
|
|
|
# [*proxy_cache*] - This directive sets name of zone for caching.
|
|
|
|
# The same zone can be used in multiple places.
|
|
|
|
# [*proxy_cache_valid*] - This directive sets the time for caching
|
|
|
|
# different replies.
|
2013-10-15 22:49:33 +02:00
|
|
|
# [*proxy_method*] - If defined, overrides the HTTP method of the
|
|
|
|
# request to be passed to the backend.
|
2013-10-16 00:01:50 +02:00
|
|
|
# [*proxy_set_body*] - If defined, sets the body passed to the backend.
|
2013-05-21 15:15:59 +02:00
|
|
|
# [*auth_basic*] - This directive includes testing name and
|
|
|
|
# password with HTTP Basic Authentication.
|
|
|
|
# [*auth_basic_user_file*] - This directive sets the htpasswd filename for
|
|
|
|
# the authentication realm.
|
2014-01-28 21:52:56 +01:00
|
|
|
# [*client_max_body_size*] - This directive sets client_max_body_size.
|
2014-06-26 05:40:22 +02:00
|
|
|
# [*client_body_timeout*] - Sets how long the server will wait for a
|
2014-06-25 20:55:26 +02:00
|
|
|
# client body. Default is 60s
|
|
|
|
# [*client_header_timeout*] - Sets how long the server will wait for a
|
|
|
|
# client header. Default is 60s
|
2014-06-26 05:40:22 +02:00
|
|
|
# [*raw_prepend*] - A single string, or an array of strings to
|
|
|
|
# prepend to the server directive (after cfg prepend directives). NOTE:
|
|
|
|
# YOU are responsible for a semicolon on each line that requires one.
|
|
|
|
# [*raw_append*] - A single string, or an array of strings to
|
|
|
|
# append to the server directive (after cfg append directives). NOTE:
|
|
|
|
# YOU are responsible for a semicolon on each line that requires one.
|
|
|
|
# [*location_raw_prepend*] - A single string, or an array of strings
|
|
|
|
# to prepend to the location directive (after custom_cfg directives). NOTE:
|
|
|
|
# YOU are responsible for a semicolon on each line that requires one.
|
|
|
|
# [*location_raw_append*] - A single string, or an array of strings
|
|
|
|
# to append to the location directive (after custom_cfg directives). NOTE:
|
|
|
|
# YOU are responsible for a semicolon on each line that requires one.
|
2013-05-21 15:15:59 +02:00
|
|
|
# [*vhost_cfg_append*] - It expects a hash with custom directives to
|
|
|
|
# put after everything else inside vhost
|
2013-08-22 21:02:04 +02:00
|
|
|
# [*vhost_cfg_prepend*] - It expects a hash with custom directives to
|
|
|
|
# put before everything else inside vhost
|
2014-02-08 00:40:52 +01:00
|
|
|
# [*vhost_cfg_ssl_append*] - It expects a hash with custom directives to
|
|
|
|
# put after everything else inside vhost ssl
|
|
|
|
# [*vhost_cfg_ssl_prepend*] - It expects a hash with custom directives to
|
|
|
|
# put before everything else inside vhost ssl
|
2013-05-21 15:15:59 +02:00
|
|
|
# [*rewrite_to_https*] - Adds a server directive and rewrite rule to
|
2014-04-18 11:57:31 +02:00
|
|
|
# rewrite to ssl
|
2013-06-13 18:44:15 +02:00
|
|
|
# [*include_files*] - Adds include files to vhost
|
2013-08-07 16:19:46 +02:00
|
|
|
# [*access_log*] - Where to write access log. May add additional
|
2014-04-18 11:57:31 +02:00
|
|
|
# options like log format to the end.
|
2013-08-07 16:19:46 +02:00
|
|
|
# [*error_log*] - Where to write error log. May add additional
|
2014-04-18 11:57:31 +02:00
|
|
|
# options like error level to the end.
|
2013-12-12 17:27:29 +01:00
|
|
|
# [*passenger_cgi_param*] - Allows one to define additional CGI environment
|
2014-04-18 11:57:31 +02:00
|
|
|
# variables to pass to the backend application
|
|
|
|
# [*log_by_lua*] - Run the Lua source code inlined as the
|
|
|
|
# <lua-script-str> at the log request processing phase.
|
|
|
|
# This does not replace the current access logs, but runs after.
|
|
|
|
# [*log_by_lua_file*] - Equivalent to log_by_lua, except that the file
|
|
|
|
# specified by <path-to-lua-script-file> contains the Lua code, or, as from
|
|
|
|
# the v0.5.0rc32 release, the Lua/LuaJIT bytecode to be executed.
|
2014-06-25 22:58:55 +02:00
|
|
|
# [*gzip_types*] - Defines gzip_types, nginx default is text/html
|
2014-07-03 16:06:54 +02:00
|
|
|
# [*owner*] - Defines owner of the .conf file
|
|
|
|
# [*group*] - Defines group of the .conf file
|
|
|
|
# [*mode*] - Defines mode of the .conf file
|
2011-06-07 01:05:27 +02:00
|
|
|
# Actions:
|
|
|
|
#
|
|
|
|
# Requires:
|
|
|
|
#
|
|
|
|
# Sample Usage:
|
|
|
|
# nginx::resource::vhost { 'test2.local':
|
|
|
|
# ensure => present,
|
|
|
|
# www_root => '/var/www/nginx-default',
|
2013-05-26 14:24:40 +02:00
|
|
|
# ssl => true,
|
2011-06-07 01:05:27 +02:00
|
|
|
# ssl_cert => '/tmp/server.crt',
|
|
|
|
# ssl_key => '/tmp/server.pem',
|
|
|
|
# }
|
2013-04-13 13:52:21 +02:00
|
|
|
define nginx::resource::vhost (
|
2014-01-06 19:47:33 +01:00
|
|
|
$ensure = 'present',
|
2012-10-03 01:35:52 +02:00
|
|
|
$listen_ip = '*',
|
|
|
|
$listen_port = '80',
|
2012-10-03 23:16:18 +02:00
|
|
|
$listen_options = undef,
|
2013-09-04 19:04:28 +02:00
|
|
|
$location_allow = [],
|
|
|
|
$location_deny = [],
|
2012-10-03 01:35:52 +02:00
|
|
|
$ipv6_enable = false,
|
|
|
|
$ipv6_listen_ip = '::',
|
|
|
|
$ipv6_listen_port = '80',
|
2014-01-27 16:57:38 +01:00
|
|
|
$ipv6_listen_options = 'default ipv6only=on',
|
2013-12-24 13:07:58 +01:00
|
|
|
$add_header = undef,
|
2012-10-03 01:35:52 +02:00
|
|
|
$ssl = false,
|
2014-06-02 00:23:07 +02:00
|
|
|
$ssl_listen_option = true,
|
2012-10-03 01:35:52 +02:00
|
|
|
$ssl_cert = undef,
|
2013-12-27 09:10:11 +01:00
|
|
|
$ssl_dhparam = undef,
|
2012-10-03 01:35:52 +02:00
|
|
|
$ssl_key = undef,
|
2013-03-16 10:34:07 +01:00
|
|
|
$ssl_port = '443',
|
2013-06-27 15:42:38 +02:00
|
|
|
$ssl_protocols = 'SSLv3 TLSv1 TLSv1.1 TLSv1.2',
|
|
|
|
$ssl_ciphers = 'HIGH:!aNULL:!MD5',
|
2013-09-29 20:36:19 +02:00
|
|
|
$ssl_cache = 'shared:SSL:10m',
|
2013-12-29 15:39:21 +01:00
|
|
|
$ssl_stapling = false,
|
|
|
|
$ssl_stapling_file = undef,
|
|
|
|
$ssl_stapling_responder = undef,
|
|
|
|
$ssl_stapling_verify = false,
|
|
|
|
$ssl_trusted_cert = undef,
|
2014-03-07 15:52:38 +01:00
|
|
|
$spdy = $nginx::config::spdy,
|
2012-10-03 01:35:52 +02:00
|
|
|
$proxy = undef,
|
2014-06-23 20:39:56 +02:00
|
|
|
$proxy_redirect = undef,
|
2014-06-04 21:35:12 +02:00
|
|
|
$proxy_read_timeout = $nginx::config::proxy_read_timeout,
|
|
|
|
$proxy_connect_timeout = $nginx::config::proxy_connect_timeout,
|
2013-04-24 10:42:06 +02:00
|
|
|
$proxy_set_header = [],
|
2013-05-21 14:30:21 +02:00
|
|
|
$proxy_cache = false,
|
|
|
|
$proxy_cache_valid = false,
|
2013-10-15 22:49:33 +02:00
|
|
|
$proxy_method = undef,
|
2013-10-16 00:01:50 +02:00
|
|
|
$proxy_set_body = undef,
|
2014-04-03 11:59:47 +02:00
|
|
|
$resolver = [],
|
2013-03-20 18:44:45 +01:00
|
|
|
$fastcgi = undef,
|
2014-06-13 12:29:02 +02:00
|
|
|
$fastcgi_params = "${nginx::config::conf_dir}/fastcgi_params",
|
2013-03-20 18:44:45 +01:00
|
|
|
$fastcgi_script = undef,
|
2013-04-13 13:52:21 +02:00
|
|
|
$index_files = [
|
|
|
|
'index.html',
|
|
|
|
'index.htm',
|
|
|
|
'index.php'],
|
2013-12-12 17:27:29 +01:00
|
|
|
$autoindex = undef,
|
2012-10-03 01:35:52 +02:00
|
|
|
$server_name = [$name],
|
|
|
|
$www_root = undef,
|
2012-09-01 17:46:27 +02:00
|
|
|
$rewrite_www_to_non_www = false,
|
2013-06-13 18:44:15 +02:00
|
|
|
$rewrite_to_https = undef,
|
2013-07-03 22:54:33 +02:00
|
|
|
$location_custom_cfg = undef,
|
2012-10-03 01:35:52 +02:00
|
|
|
$location_cfg_prepend = undef,
|
|
|
|
$location_cfg_append = undef,
|
2014-04-11 17:55:16 +02:00
|
|
|
$location_custom_cfg_prepend = undef,
|
|
|
|
$location_custom_cfg_append = undef,
|
2013-03-27 19:13:52 +01:00
|
|
|
$try_files = undef,
|
2013-05-20 16:30:32 +02:00
|
|
|
$auth_basic = undef,
|
|
|
|
$auth_basic_user_file = undef,
|
2014-06-25 20:55:26 +02:00
|
|
|
$client_body_timeout = undef,
|
|
|
|
$client_header_timeout = undef,
|
2014-01-28 21:52:56 +01:00
|
|
|
$client_max_body_size = undef,
|
2014-06-26 05:40:22 +02:00
|
|
|
$raw_prepend = undef,
|
|
|
|
$raw_append = undef,
|
|
|
|
$location_raw_prepend = undef,
|
|
|
|
$location_raw_append = undef,
|
2013-08-22 21:02:04 +02:00
|
|
|
$vhost_cfg_prepend = undef,
|
2013-05-21 14:30:21 +02:00
|
|
|
$vhost_cfg_append = undef,
|
2014-02-08 00:40:52 +01:00
|
|
|
$vhost_cfg_ssl_prepend = undef,
|
|
|
|
$vhost_cfg_ssl_append = undef,
|
2013-08-07 02:40:21 +02:00
|
|
|
$include_files = undef,
|
|
|
|
$access_log = undef,
|
|
|
|
$error_log = undef,
|
2014-04-11 17:55:16 +02:00
|
|
|
$format_log = undef,
|
2013-09-29 20:36:19 +02:00
|
|
|
$passenger_cgi_param = undef,
|
2014-04-18 11:57:31 +02:00
|
|
|
$log_by_lua = undef,
|
|
|
|
$log_by_lua_file = undef,
|
2013-09-29 20:53:25 +02:00
|
|
|
$use_default_location = true,
|
2014-01-13 19:20:02 +01:00
|
|
|
$rewrite_rules = [],
|
2014-06-12 20:12:24 +02:00
|
|
|
$string_mappings = {},
|
|
|
|
$geo_mappings = {},
|
2014-06-25 22:58:55 +02:00
|
|
|
$gzip_types = undef,
|
2014-07-03 16:06:54 +02:00
|
|
|
$owner = $nginx::config::global_owner,
|
|
|
|
$group = $nginx::config::global_group,
|
|
|
|
$mode = $nginx::config::global_mode,
|
2011-06-07 00:25:04 +02:00
|
|
|
) {
|
2011-06-15 21:40:42 +02:00
|
|
|
|
2014-01-06 19:47:33 +01:00
|
|
|
validate_re($ensure, '^(present|absent)$',
|
|
|
|
"${ensure} is not supported for ensure. Allowed values are 'present' and 'absent'.")
|
|
|
|
validate_string($listen_ip)
|
|
|
|
if !is_integer($listen_port) {
|
|
|
|
fail('$listen_port must be an integer.')
|
|
|
|
}
|
|
|
|
if ($listen_options != undef) {
|
|
|
|
validate_string($listen_options)
|
|
|
|
}
|
2013-09-04 19:04:28 +02:00
|
|
|
validate_array($location_allow)
|
|
|
|
validate_array($location_deny)
|
2014-01-06 19:47:33 +01:00
|
|
|
validate_bool($ipv6_enable)
|
|
|
|
validate_string($ipv6_listen_ip)
|
|
|
|
if !is_integer($ipv6_listen_port) {
|
|
|
|
fail('$ipv6_listen_port must be an integer.')
|
|
|
|
}
|
|
|
|
validate_string($ipv6_listen_options)
|
2013-12-24 19:47:15 +01:00
|
|
|
if ($add_header != undef) {
|
|
|
|
validate_hash($add_header)
|
|
|
|
}
|
2014-01-06 19:47:33 +01:00
|
|
|
validate_bool($ssl)
|
|
|
|
if ($ssl_cert != undef) {
|
|
|
|
validate_string($ssl_cert)
|
|
|
|
}
|
2014-06-02 00:23:07 +02:00
|
|
|
validate_bool($ssl_listen_option)
|
2013-12-27 09:10:11 +01:00
|
|
|
if ($ssl_dhparam != undef) {
|
|
|
|
validate_string($ssl_dhparam)
|
|
|
|
}
|
2014-01-06 19:47:33 +01:00
|
|
|
if ($ssl_key != undef) {
|
|
|
|
validate_string($ssl_key)
|
|
|
|
}
|
|
|
|
if !is_integer($ssl_port) {
|
|
|
|
fail('$ssl_port must be an integer.')
|
2013-12-29 15:48:32 +01:00
|
|
|
}
|
2014-01-06 19:47:33 +01:00
|
|
|
validate_string($ssl_protocols)
|
|
|
|
validate_string($ssl_ciphers)
|
|
|
|
validate_string($ssl_cache)
|
2013-12-29 15:39:21 +01:00
|
|
|
validate_bool($ssl_stapling)
|
|
|
|
if ($ssl_stapling_file != undef) {
|
|
|
|
validate_string($ssl_stapling_file)
|
|
|
|
}
|
|
|
|
if ($ssl_stapling_responder != undef) {
|
|
|
|
validate_string($ssl_stapling_responder)
|
|
|
|
}
|
|
|
|
validate_bool($ssl_stapling_verify)
|
|
|
|
if ($ssl_trusted_cert != undef) {
|
|
|
|
validate_string($ssl_trusted_cert)
|
|
|
|
}
|
2014-01-06 19:47:33 +01:00
|
|
|
validate_string($spdy)
|
|
|
|
if ($proxy != undef) {
|
|
|
|
validate_string($proxy)
|
|
|
|
}
|
|
|
|
validate_string($proxy_read_timeout)
|
2014-06-23 20:39:56 +02:00
|
|
|
validate_string($proxy_redirect)
|
2014-01-06 19:47:33 +01:00
|
|
|
validate_array($proxy_set_header)
|
|
|
|
if ($proxy_cache != false) {
|
|
|
|
validate_string($proxy_cache)
|
|
|
|
}
|
|
|
|
if ($proxy_cache_valid != false) {
|
|
|
|
validate_string($proxy_cache_valid)
|
|
|
|
}
|
|
|
|
if ($proxy_method != undef) {
|
|
|
|
validate_string($proxy_method)
|
|
|
|
}
|
|
|
|
if ($proxy_set_body != undef) {
|
|
|
|
validate_string($proxy_set_body)
|
|
|
|
}
|
2014-04-03 11:59:47 +02:00
|
|
|
validate_array($resolver)
|
2014-01-06 19:47:33 +01:00
|
|
|
if ($fastcgi != undef) {
|
|
|
|
validate_string($fastcgi)
|
|
|
|
}
|
|
|
|
validate_string($fastcgi_params)
|
|
|
|
if ($fastcgi_script != undef) {
|
|
|
|
validate_string($fastcgi_script)
|
|
|
|
}
|
|
|
|
validate_array($index_files)
|
|
|
|
if ($autoindex != undef) {
|
|
|
|
validate_string($autoindex)
|
|
|
|
}
|
|
|
|
validate_array($server_name)
|
|
|
|
if ($www_root != undef) {
|
|
|
|
validate_string($www_root)
|
|
|
|
}
|
|
|
|
validate_bool($rewrite_www_to_non_www)
|
|
|
|
if ($rewrite_to_https != undef) {
|
|
|
|
validate_bool($rewrite_to_https)
|
|
|
|
}
|
2014-06-26 05:40:22 +02:00
|
|
|
if ($raw_prepend != undef) {
|
|
|
|
if (is_array($raw_prepend)) {
|
|
|
|
validate_array($raw_prepend)
|
|
|
|
} else {
|
|
|
|
validate_string($raw_prepend)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if ($raw_append != undef) {
|
|
|
|
if (is_array($raw_append)) {
|
|
|
|
validate_array($raw_append)
|
|
|
|
} else {
|
|
|
|
validate_string($raw_append)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if ($location_raw_prepend != undef) {
|
|
|
|
if (is_array($location_raw_prepend)) {
|
|
|
|
validate_array($location_raw_prepend)
|
|
|
|
} else {
|
|
|
|
validate_string($location_raw_prepend)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if ($location_raw_append != undef) {
|
|
|
|
if (is_array($location_raw_append)) {
|
|
|
|
validate_array($location_raw_append)
|
|
|
|
} else {
|
|
|
|
validate_string($location_raw_append)
|
|
|
|
}
|
|
|
|
}
|
2014-01-06 19:47:33 +01:00
|
|
|
if ($location_custom_cfg != undef) {
|
|
|
|
validate_hash($location_custom_cfg)
|
|
|
|
}
|
|
|
|
if ($location_cfg_prepend != undef) {
|
|
|
|
validate_hash($location_cfg_prepend)
|
|
|
|
}
|
|
|
|
if ($location_cfg_append != undef) {
|
|
|
|
validate_hash($location_cfg_append)
|
|
|
|
}
|
|
|
|
if ($try_files != undef) {
|
|
|
|
validate_array($try_files)
|
|
|
|
}
|
|
|
|
if ($auth_basic != undef) {
|
|
|
|
validate_string($auth_basic)
|
|
|
|
}
|
|
|
|
if ($auth_basic_user_file != undef) {
|
|
|
|
validate_string($auth_basic_user_file)
|
|
|
|
}
|
|
|
|
if ($vhost_cfg_prepend != undef) {
|
|
|
|
validate_hash($vhost_cfg_prepend)
|
|
|
|
}
|
|
|
|
if ($vhost_cfg_append != undef) {
|
|
|
|
validate_hash($vhost_cfg_append)
|
|
|
|
}
|
2014-02-08 00:40:52 +01:00
|
|
|
if ($vhost_cfg_ssl_prepend != undef) {
|
|
|
|
validate_hash($vhost_cfg_ssl_prepend)
|
|
|
|
}
|
|
|
|
if ($vhost_cfg_ssl_append != undef) {
|
|
|
|
validate_hash($vhost_cfg_ssl_append)
|
|
|
|
}
|
2014-01-06 19:47:33 +01:00
|
|
|
if ($include_files != undef) {
|
|
|
|
validate_array($include_files)
|
|
|
|
}
|
|
|
|
if ($access_log != undef) {
|
|
|
|
validate_string($access_log)
|
|
|
|
}
|
|
|
|
if ($error_log != undef) {
|
|
|
|
validate_string($error_log)
|
|
|
|
}
|
|
|
|
if ($passenger_cgi_param != undef) {
|
|
|
|
validate_hash($passenger_cgi_param)
|
|
|
|
}
|
2014-04-18 11:57:31 +02:00
|
|
|
if ($log_by_lua != undef) {
|
|
|
|
validate_string($log_by_lua)
|
|
|
|
}
|
|
|
|
if ($log_by_lua_file != undef) {
|
|
|
|
validate_string($log_by_lua_file)
|
|
|
|
}
|
2014-06-25 20:55:26 +02:00
|
|
|
if ($client_body_timeout != undef) {
|
|
|
|
validate_string($client_body_timeout)
|
|
|
|
}
|
|
|
|
if ($client_header_timeout != undef) {
|
|
|
|
validate_string($client_header_timeout)
|
|
|
|
}
|
2014-06-25 22:58:55 +02:00
|
|
|
if ($gzip_types != undef) {
|
|
|
|
validate_string($gzip_types)
|
|
|
|
}
|
2014-01-06 19:47:33 +01:00
|
|
|
validate_bool($use_default_location)
|
2014-01-13 19:20:02 +01:00
|
|
|
validate_array($rewrite_rules)
|
2014-06-12 20:12:24 +02:00
|
|
|
validate_hash($string_mappings)
|
|
|
|
validate_hash($geo_mappings)
|
2013-09-04 19:04:28 +02:00
|
|
|
|
2014-07-03 16:06:54 +02:00
|
|
|
validate_string($owner)
|
|
|
|
validate_string($group)
|
|
|
|
validate_re($mode, '^\d{4}$',
|
|
|
|
"${mode} is not valid. It should be 4 digits (0644 by default).")
|
|
|
|
|
2013-12-01 01:51:31 +01:00
|
|
|
# Variables
|
2014-06-13 12:15:42 +02:00
|
|
|
$vhost_dir = "${nginx::config::conf_dir}/sites-available"
|
|
|
|
$vhost_enable_dir = "${nginx::config::conf_dir}/sites-enabled"
|
2013-12-01 01:51:31 +01:00
|
|
|
$vhost_symlink_ensure = $ensure ? {
|
|
|
|
'absent' => absent,
|
|
|
|
default => 'link',
|
|
|
|
}
|
2013-12-24 18:22:32 +01:00
|
|
|
|
|
|
|
$name_sanitized = regsubst($name, ' ', '_', 'G')
|
|
|
|
$config_file = "${vhost_dir}/${name_sanitized}.conf"
|
2013-12-01 01:51:31 +01:00
|
|
|
|
2011-06-15 21:40:42 +02:00
|
|
|
File {
|
2013-04-13 19:39:52 +02:00
|
|
|
ensure => $ensure ? {
|
|
|
|
'absent' => absent,
|
|
|
|
default => 'file',
|
|
|
|
},
|
|
|
|
notify => Class['nginx::service'],
|
2014-07-03 16:06:54 +02:00
|
|
|
owner => $owner,
|
|
|
|
group => $group,
|
|
|
|
mode => $mode,
|
2011-06-15 21:40:42 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
# Add IPv6 Logic Check - Nginx service will not start if ipv6 is enabled
|
|
|
|
# and support does not exist for it in the kernel.
|
2013-07-26 10:15:55 +02:00
|
|
|
if ($ipv6_enable == true) and (!$ipaddress6) {
|
2011-06-15 21:40:42 +02:00
|
|
|
warning('nginx: IPv6 support is not enabled or configured properly')
|
|
|
|
}
|
|
|
|
|
|
|
|
# Check to see if SSL Certificates are properly defined.
|
2013-04-13 19:39:52 +02:00
|
|
|
if ($ssl == true) {
|
2011-06-15 21:40:42 +02:00
|
|
|
if ($ssl_cert == undef) or ($ssl_key == undef) {
|
2014-05-29 15:23:57 +02:00
|
|
|
fail('nginx: SSL certificate/key (ssl_cert/ssl_key) and/or SSL Private must be defined and exist on the target system(s)')
|
2011-06-15 21:40:42 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-04-11 17:55:16 +02:00
|
|
|
|
2013-08-07 02:40:21 +02:00
|
|
|
# This was a lot to add up in parameter list so add it down here
|
|
|
|
# Also opted to add more logic here and keep template cleaner which
|
|
|
|
# unfortunately means resorting to the $varname_real thing
|
2014-04-11 17:55:16 +02:00
|
|
|
$access_log_tmp = $access_log ? {
|
2014-03-07 15:52:38 +01:00
|
|
|
undef => "${nginx::config::logdir}/${name_sanitized}.access.log",
|
2013-08-07 02:40:21 +02:00
|
|
|
default => $access_log,
|
|
|
|
}
|
2014-04-11 17:55:16 +02:00
|
|
|
|
|
|
|
$access_log_real = $format_log ? {
|
|
|
|
undef => $access_log_tmp,
|
2014-06-10 00:49:58 +02:00
|
|
|
default => "${access_log_tmp} ${format_log}",
|
2014-04-11 18:04:24 +02:00
|
|
|
}
|
2014-04-11 17:55:16 +02:00
|
|
|
|
2013-08-07 02:40:21 +02:00
|
|
|
$error_log_real = $error_log ? {
|
2014-03-07 15:52:38 +01:00
|
|
|
undef => "${nginx::config::logdir}/${name_sanitized}.error.log",
|
2013-08-07 02:40:21 +02:00
|
|
|
default => $error_log,
|
|
|
|
}
|
|
|
|
|
2013-12-01 01:51:31 +01:00
|
|
|
concat { $config_file:
|
2014-07-03 16:06:54 +02:00
|
|
|
owner => $owner,
|
|
|
|
group => $group,
|
|
|
|
mode => $mode,
|
2013-12-01 01:51:31 +01:00
|
|
|
notify => Class['nginx::service'],
|
|
|
|
}
|
|
|
|
|
2014-02-01 19:33:49 +01:00
|
|
|
$ssl_only = ($ssl == true) and ($ssl_port == $listen_port)
|
2013-12-12 17:27:29 +01:00
|
|
|
|
2013-09-29 20:53:25 +02:00
|
|
|
if $use_default_location == true {
|
|
|
|
# Create the default location reference for the vHost
|
2013-12-24 18:22:32 +01:00
|
|
|
nginx::resource::location {"${name_sanitized}-default":
|
2014-06-04 22:06:37 +02:00
|
|
|
ensure => $ensure,
|
|
|
|
vhost => $name_sanitized,
|
|
|
|
ssl => $ssl,
|
|
|
|
ssl_only => $ssl_only,
|
|
|
|
location => '/',
|
|
|
|
location_allow => $location_allow,
|
|
|
|
location_deny => $location_deny,
|
|
|
|
proxy => $proxy,
|
2014-06-23 20:39:56 +02:00
|
|
|
proxy_redirect => $proxy_redirect,
|
2014-06-04 22:06:37 +02:00
|
|
|
proxy_read_timeout => $proxy_read_timeout,
|
2014-04-12 21:17:45 +02:00
|
|
|
proxy_connect_timeout => $proxy_connect_timeout,
|
2014-06-04 22:06:37 +02:00
|
|
|
proxy_cache => $proxy_cache,
|
|
|
|
proxy_cache_valid => $proxy_cache_valid,
|
|
|
|
proxy_method => $proxy_method,
|
|
|
|
proxy_set_body => $proxy_set_body,
|
|
|
|
fastcgi => $fastcgi,
|
|
|
|
fastcgi_params => $fastcgi_params,
|
|
|
|
fastcgi_script => $fastcgi_script,
|
|
|
|
try_files => $try_files,
|
|
|
|
www_root => $www_root,
|
|
|
|
autoindex => $autoindex,
|
|
|
|
index_files => [],
|
|
|
|
location_custom_cfg => $location_custom_cfg,
|
|
|
|
notify => Class['nginx::service'],
|
|
|
|
rewrite_rules => $rewrite_rules,
|
2014-06-26 05:40:22 +02:00
|
|
|
raw_prepend => $location_raw_prepend,
|
|
|
|
raw_append => $location_raw_append
|
2013-09-29 20:53:25 +02:00
|
|
|
}
|
2014-04-12 00:12:54 +02:00
|
|
|
$root = undef
|
2013-09-29 20:53:25 +02:00
|
|
|
} else {
|
|
|
|
$root = $www_root
|
2011-06-15 21:40:42 +02:00
|
|
|
}
|
|
|
|
|
2012-10-03 01:35:52 +02:00
|
|
|
# Support location_cfg_prepend and location_cfg_append on default location created by vhost
|
|
|
|
if $location_cfg_prepend {
|
2013-12-24 18:22:32 +01:00
|
|
|
Nginx::Resource::Location["${name_sanitized}-default"] {
|
2013-04-13 13:52:21 +02:00
|
|
|
location_cfg_prepend => $location_cfg_prepend }
|
2012-10-03 01:35:52 +02:00
|
|
|
}
|
2013-04-13 13:52:21 +02:00
|
|
|
|
2012-10-03 01:35:52 +02:00
|
|
|
if $location_cfg_append {
|
2013-12-24 18:22:32 +01:00
|
|
|
Nginx::Resource::Location["${name_sanitized}-default"] {
|
2013-04-13 13:52:21 +02:00
|
|
|
location_cfg_append => $location_cfg_append }
|
2012-10-03 01:35:52 +02:00
|
|
|
}
|
2013-04-13 13:52:21 +02:00
|
|
|
|
2014-04-11 17:55:16 +02:00
|
|
|
if $location_custom_cfg_prepend {
|
|
|
|
Nginx::Resource::Location["${name_sanitized}-default"] {
|
|
|
|
location_custom_cfg_prepend => $location_custom_cfg_prepend }
|
|
|
|
}
|
|
|
|
|
|
|
|
if $location_custom_cfg_append {
|
|
|
|
Nginx::Resource::Location["${name_sanitized}-default"] {
|
|
|
|
location_custom_cfg_append => $location_custom_cfg_append }
|
|
|
|
}
|
|
|
|
|
2014-06-13 12:29:02 +02:00
|
|
|
if $fastcgi != undef and !defined(File[$fastcgi_params]) {
|
|
|
|
file { $fastcgi_params:
|
2013-07-31 23:07:59 +02:00
|
|
|
ensure => present,
|
|
|
|
mode => '0770',
|
|
|
|
content => template('nginx/vhost/fastcgi_params.erb'),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-11-22 05:23:45 +01:00
|
|
|
if ($listen_port != $ssl_port) {
|
2013-12-24 18:22:32 +01:00
|
|
|
concat::fragment { "${name_sanitized}-header":
|
2014-03-18 13:35:57 +01:00
|
|
|
ensure => present,
|
2013-12-01 01:51:31 +01:00
|
|
|
target => $config_file,
|
2013-11-22 05:23:45 +01:00
|
|
|
content => template('nginx/vhost/vhost_header.erb'),
|
2013-12-01 01:51:31 +01:00
|
|
|
order => '001',
|
2013-11-22 05:23:45 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-06-15 21:40:42 +02:00
|
|
|
# Create a proper file close stub.
|
2012-10-18 15:33:07 +02:00
|
|
|
if ($listen_port != $ssl_port) {
|
2013-12-24 18:22:32 +01:00
|
|
|
concat::fragment { "${name_sanitized}-footer":
|
2014-03-18 13:35:57 +01:00
|
|
|
ensure => present,
|
2013-12-01 01:51:31 +01:00
|
|
|
target => $config_file,
|
|
|
|
content => template('nginx/vhost/vhost_footer.erb'),
|
|
|
|
order => '699',
|
|
|
|
}
|
2011-06-15 21:40:42 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
# Create SSL File Stubs if SSL is enabled
|
2013-05-26 14:24:40 +02:00
|
|
|
if ($ssl == true) {
|
2013-08-07 15:59:44 +02:00
|
|
|
# Access and error logs are named differently in ssl template
|
2014-06-10 00:49:33 +02:00
|
|
|
|
|
|
|
# This was a lot to add up in parameter list so add it down here
|
|
|
|
# Also opted to add more logic here and keep template cleaner which
|
|
|
|
# unfortunately means resorting to the $varname_real thing
|
|
|
|
$ssl_access_log_tmp = $access_log ? {
|
2014-03-07 15:52:38 +01:00
|
|
|
undef => "${nginx::config::logdir}/ssl-${name_sanitized}.access.log",
|
2013-08-07 15:59:44 +02:00
|
|
|
default => $access_log,
|
|
|
|
}
|
2014-06-10 00:49:33 +02:00
|
|
|
|
|
|
|
$ssl_access_log_real = $format_log ? {
|
|
|
|
undef => $ssl_access_log_tmp,
|
|
|
|
default => "${ssl_access_log_tmp} ${format_log}",
|
|
|
|
}
|
|
|
|
|
|
|
|
$ssl_error_log_real = $error_log ? {
|
2014-03-07 15:52:38 +01:00
|
|
|
undef => "${nginx::config::logdir}/ssl-${name_sanitized}.error.log",
|
2013-08-07 15:59:44 +02:00
|
|
|
default => $error_log,
|
|
|
|
}
|
2013-12-01 01:51:31 +01:00
|
|
|
|
2013-12-24 18:22:32 +01:00
|
|
|
concat::fragment { "${name_sanitized}-ssl-header":
|
2013-12-01 01:51:31 +01:00
|
|
|
target => $config_file,
|
2011-06-15 21:40:42 +02:00
|
|
|
content => template('nginx/vhost/vhost_ssl_header.erb'),
|
2013-12-01 01:51:31 +01:00
|
|
|
order => '700',
|
2011-06-15 21:40:42 +02:00
|
|
|
}
|
2013-12-24 18:22:32 +01:00
|
|
|
concat::fragment { "${name_sanitized}-ssl-footer":
|
2013-12-01 01:51:31 +01:00
|
|
|
target => $config_file,
|
2013-07-21 17:20:07 +02:00
|
|
|
content => template('nginx/vhost/vhost_ssl_footer.erb'),
|
2013-12-01 01:51:31 +01:00
|
|
|
order => '999',
|
2011-06-15 21:40:42 +02:00
|
|
|
}
|
2013-05-20 16:30:32 +02:00
|
|
|
|
2013-04-16 18:12:32 +02:00
|
|
|
#Generate ssl key/cert with provided file-locations
|
2014-04-11 17:47:19 +02:00
|
|
|
$cert = regsubst($name,' ','_', 'G')
|
2013-05-20 16:30:32 +02:00
|
|
|
|
2013-08-04 19:44:40 +02:00
|
|
|
# Check if the file has been defined before creating the file to
|
|
|
|
# avoid the error when using wildcard cert on the multiple vhosts
|
2014-06-13 12:15:42 +02:00
|
|
|
ensure_resource('file', "${nginx::config::conf_dir}/${cert}.crt", {
|
2014-06-05 00:00:41 +02:00
|
|
|
owner => $nginx::config::daemon_user,
|
2013-08-21 17:29:31 +02:00
|
|
|
mode => '0444',
|
2013-04-16 18:12:32 +02:00
|
|
|
source => $ssl_cert,
|
2013-08-04 19:44:40 +02:00
|
|
|
})
|
2014-06-13 12:15:42 +02:00
|
|
|
ensure_resource('file', "${nginx::config::conf_dir}/${cert}.key", {
|
2014-06-05 00:00:41 +02:00
|
|
|
owner => $nginx::config::daemon_user,
|
2013-08-22 23:13:53 +02:00
|
|
|
mode => '0440',
|
2013-04-16 18:12:32 +02:00
|
|
|
source => $ssl_key,
|
2013-08-04 19:44:40 +02:00
|
|
|
})
|
2013-12-27 09:10:11 +01:00
|
|
|
if ($ssl_dhparam != undef) {
|
2014-06-13 12:15:42 +02:00
|
|
|
ensure_resource('file', "${nginx::config::conf_dir}/${cert}.dh.pem", {
|
2014-06-05 00:00:41 +02:00
|
|
|
owner => $nginx::config::daemon_user,
|
2013-12-27 09:10:11 +01:00
|
|
|
mode => '0440',
|
|
|
|
source => $ssl_dhparam,
|
|
|
|
})
|
|
|
|
}
|
2013-12-29 15:39:21 +01:00
|
|
|
if ($ssl_stapling_file != undef) {
|
2014-06-13 12:15:42 +02:00
|
|
|
ensure_resource('file', "${nginx::config::conf_dir}/${cert}.ocsp.resp", {
|
2014-06-05 00:00:41 +02:00
|
|
|
owner => $nginx::config::daemon_user,
|
2013-12-29 15:39:21 +01:00
|
|
|
mode => '0440',
|
|
|
|
source => $ssl_stapling_file,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
if ($ssl_trusted_cert != undef) {
|
2014-06-13 12:15:42 +02:00
|
|
|
ensure_resource('file', "${nginx::config::conf_dir}/${cert}.trusted.crt", {
|
2014-06-05 00:00:41 +02:00
|
|
|
owner => $nginx::config::daemon_user,
|
2013-12-29 15:39:21 +01:00
|
|
|
mode => '0440',
|
|
|
|
source => $ssl_trusted_cert,
|
|
|
|
})
|
|
|
|
}
|
2011-06-15 21:40:42 +02:00
|
|
|
}
|
2013-12-01 01:51:31 +01:00
|
|
|
|
2013-12-24 18:22:32 +01:00
|
|
|
file{ "${name_sanitized}.conf symlink":
|
2013-12-01 01:51:31 +01:00
|
|
|
ensure => $vhost_symlink_ensure,
|
2013-12-24 18:22:32 +01:00
|
|
|
path => "${vhost_enable_dir}/${name_sanitized}.conf",
|
2013-12-01 01:51:31 +01:00
|
|
|
target => $config_file,
|
|
|
|
require => Concat[$config_file],
|
|
|
|
notify => Service['nginx'],
|
|
|
|
}
|
2014-06-12 20:12:24 +02:00
|
|
|
|
|
|
|
create_resources('nginx::resource::map', $string_mappings)
|
|
|
|
create_resources('nginx::resource::geo', $geo_mappings)
|
2011-06-15 21:40:42 +02:00
|
|
|
}
|