1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
|
# htpasswd_file: wether to deploy a passwd for this vhost or not
# - absent: ignore (default)
# - nodeploy: htpasswd file isn't deployed by this mechanism
# - else: try to deploy the file
#
# htpasswd_path: where to deploy the passwd file
# - absent: standardpath (default)
# - else: path to deploy
#
# run_mode: controls in which mode the vhost should be run, there are different setups
# possible:
# - normal: (*default*) run vhost with the current active worker (default: prefork) don't
# setup anything special
# - itk: run vhost with the mpm_itk module (Incompatibility: cannot be used in combination
# with 'proxy-itk' & 'static-itk' mode)
# - proxy-itk: run vhost with a dual prefork/itk setup, where prefork just proxies all the
# requests for the itk setup, that listens only on the loobpack device.
# (Incompatibility: cannot be used in combination with the itk setup.)
# - static-itk: run vhost with a dual prefork/itk setup, where prefork serves all the static
# content and proxies the dynamic calls to the itk setup, that listens only on
# the loobpack device (Incompatibility: cannot be used in combination with
# 'itk' mode)
#
# mod_security: Whether we use mod_security or not (will include mod_security module)
# - false: (*default*) don't activate mod_security
# - true: activate mod_security
#
define apache::vhost::file(
$ensure = present,
$vhost_source = 'absent',
$vhost_destination = 'absent',
$content = 'absent',
$do_includes = false,
$run_mode = 'normal',
$mod_security = false,
$htpasswd_file = 'absent',
$htpasswd_path = 'absent',
$use_mod_macro = false
){
if $mod_security {
case $run_mode {
'itk': { include mod_security::itk }
'proxy-itk','static-itk': { include mod_security::itk_plus }
default: { include mod_security }
}
}
case $run_mode {
'itk': { include ::apache::itk::lock }
'proxy-itk','static-itk': { include ::apache::itk_plus::lock }
}
$vhosts_dir = $operatingsystem ? {
centos => "$apache::centos::config_dir/vhosts.d",
gentoo => "$apache::gentoo::config_dir/vhosts.d",
debian => "$apache::debian::config_dir/sites-enabled",
ubuntu => "$apache::ubuntu::config_dir/sites-enabled",
openbsd => "$apache::openbsd::config_dir/vhosts.d",
default => '/etc/apache2/vhosts.d',
}
$real_vhost_destination = $vhost_destination ? {
'absent' => "$vhosts_dir/$name.conf",
default => $vhost_destination,
}
file{"${name}.conf":
ensure => $ensure,
path => $real_vhost_destination,
require => File[vhosts_dir],
notify => Service[apache],
owner => root, group => 0, mode => 0644;
}
if $do_includes {
include ::apache::includes
}
if $use_mod_macro {
include ::apache::mod_macro
}
if $ensure != 'absent' {
case $content {
'absent': {
$real_vhost_source = $vhost_source ? {
'absent' => [
"puppet:///modules/site-apache/vhosts.d/$fqdn/$name.conf",
"puppet:///modules/site-apache/vhosts.d/$apache_cluster_node/$name.conf",
"puppet:///modules/site-apache/vhosts.d/$operatingsystem.$lsbdistcodename/$name.conf",
"puppet:///modules/site-apache/vhosts.d/$operatingsystem/$name.conf",
"puppet:///modules/site-apache/vhosts.d/$name.conf",
"puppet:///modules/apache/vhosts.d/$operatingsystem.$lsbdistcodename/$name.conf",
"puppet:///modules/apache/vhosts.d/$operatingsystem/$name.conf",
"puppet:///modules/apache/vhosts.d/$name.conf"
],
default => "puppet:///$vhost_source",
}
File["${name}.conf"]{
source => $real_vhost_source,
}
}
default: {
File["${name}.conf"]{
content => $content,
}
}
}
}
case $htpasswd_file {
'absent','nodeploy': { info("don't deploy a htpasswd file for ${name}") }
default: {
if $htpasswd_path == 'absent' {
$real_htpasswd_path = "/var/www/htpasswds/$name"
} else {
$real_htpasswd_path = $htpasswd_path
}
file{$real_htpasswd_path:
ensure => $ensure,
source => [ "puppet:///modules/site-apache/htpasswds/$fqdn/$name",
"puppet:///modules/site-apache/htpasswds/$apache_cluster_node/$name",
"puppet:///modules/site-apache/htpasswds/$name" ],
owner => root, group => 0, mode => 0644;
}
}
}
}
|