summaryrefslogtreecommitdiff
path: root/manifests/site.pp
blob: 65c9f83bcb21a74264b6f89f23ab866fb7c28add (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
define apache::site($ensure = present, $docroot = false, $redirect = false,
            $redirect_match = false, $protocol = 'http', $aliases = false,
            $server_alias = false, $use = false, $ticket = false,
            $source = false, $template = 'apache/site.erb', $filename = '',
            $manage_docroot = true, $owner = 'root', $group = 'root',
            $mpm = true, $mpm_user = '', $mpm_group = '', $password = '*',
            $comment = '', $sshkey = absent,
            $groups = '', $shell = '/bin/false', $manage_user = true,
            $ssl = false, $listen = '*', $https_redirect = false,
            $canonical = false, $canonical_exceptions = '', $hidden_service = false) {

  $vhost = $filename ? {
    ''      => "$title",
    default => "$filename",
  }

  $hosting_domain = hiera('apache::site::domain', $::domain)

  $user = $mpm_user ? {
    ''      => regsubst($title, '\.', '_', 'G'),
    default => $mpm_user,
  }

  $gid = $mpm_group? {
    ''      => regsubst($title, '\.', '_', 'G'),
    default => $mpm_group,
  }

  if $hidden_service == true and defined('tor::daemon') {
    tor::daemon::hidden_service { $title:
      ports    => [ "80 127.0.0.1:80" ],
      data_dir => "${tor::daemon::data_dir}/hidden",
      require  => File["${tor::daemon::data_dir}/hidden"],
      ensure   => $ensure,
    }
  }

  if $mpm == true and $manage_user == true and $user != 'root' {
    if $ensure == present {
      if !defined(Group[$gid]) {
        group { "$gid":
          ensure => present,
        }
      }

      if !defined(User["$user"]) {
        user::manage { "$user":
          tag      => "virtual",
          password => $password,
          gid      => $gid,
          comment  => $comment,
          ticket   => $ticket,
          groups   => $groups,
          sshkey   => $sshkey,
          shell    => $shell,
          ensure   => present,
          require  => Group[$gid],
        }
      }
    }
    else {
      if !defined(User["$user"]) {
        user::manage { "$user":
          tag      => "virtual",
          password => $password,
          ensure   => absent,
        }
      }

      if !defined(Group[$gid]) {
        group { "$gid":
          ensure  => absent,
          require => User[$user],
        }
      }
    }
  }

  if $ssl == true {
    ssl::cert { "$name":
      group    => $gid,
      privmode => '0640',
      ensure   => $ensure,
    }
  
    ssl::check { "$name":
      file   => "/etc/ssl/certs/$name.crt",
      ensure => $ensure,
    }
  }

  case $source {
    true: {
             file { "${apache::sites}-available/$vhost":
               ensure  => $ensure,
               source  => [ "puppet:///modules/site_apache/vhosts/$domain/$title",
                            "puppet:///modules/site_apache/vhosts/$title" ],
               owner   => root,
               group   => root,
               mode    => 0644,
               require => File["${apache::macros}"],
               notify  => Service["apache"],
             }
           }
    false: {
             file { "${apache::sites}-available/$vhost":
               ensure  => $ensure,
               content => template("$template"),
               owner   => root,
               group   => root,
               mode    => 0644,
               require => File["${apache::macros}"],
               notify  => Service["apache"],
             }
           }
  }

  # Enable the site without a2ensite
  #
  #$status = $ensure ? {
  #  'present' => "${apache::sites}-available/$vhost",
  #  default   => 'absent',
  #}
  #
  #file { "/etc/apache2/sites-enabled/$title":
  #  ensure  => $status,
  #  owner   => root,
  #  group   => root,
  #  require => File["${apache::sites}-available/$title"],
  #  notify  => Service["apache"],
  #}

  case $ensure {
    'present': {
      if ($docroot != false) and ($manage_docroot == true) {
        if !defined(File["${docroot}"]) {
          file { "${docroot}":
            ensure  => present,
            owner   => $owner,
            group   => $group,
            mode    => 0755,
            recurse => false,
          }
        }
        if !defined(Exec["check_docroot_${docroot}"]) {
          # Ensure parent folder exist
          exec { "check_docroot_${docroot}":
            command => "/bin/mkdir -p ${docroot}",
            unless  => "/bin/sh -c '[ -e ${docroot} ]'",
            user    => root,
            before  => File["${docroot}"], 
          }
        }
      }
      exec { "/usr/sbin/a2ensite $vhost":
        unless  => "/bin/sh -c '[ -L ${apache::sites}-enabled/$vhost ] \
                && [ ${apache::sites}-enabled/$vhost -ef ${apache::sites}-available/$vhost ]'",
        notify  => Exec["reload-apache2"],
      }
    }
    'absent': {
      exec { "/usr/sbin/a2dissite $vhost":
        onlyif  => "/bin/sh -c '[ -L ${apache::sites}-enabled/$vhost ] \
                && [ ${apache::sites}-enabled/$vhost -ef ${apache::sites}-available/$vhost ]'",
        notify  => Exec["reload-apache2"],
      }

      file { "${apache::sites}-enabled/$vhost":
        ensure => absent,
        notify => Exec["reload-apache2"],
      }
    }
    default: { err ("Unknown ensure value: '$ensure'") }
  }
}