system-config/modules/openstack_project/manifests/website.pp
Clark Boylan b7ff8d9c8c Allow project website volume path to be overridden
We've created a /afs/.openstack.org/project/starlingx.io volume for
starlingx to host specs and docs and whatever else. Currently they are
trying to set up docs.starlingx.io as a vhost to serve docs. This Means
the vhost name and volume path differ. Allow for specifying a volume
name that is different than the volume path in this case. The idea here
is to avoid needing to create separate afs volumes for different (but
related) content.

Change-Id: Iea6d38096f2b4c90feab56289003af29fd5c224d
2018-09-10 09:28:16 -07:00

70 lines
2.0 KiB
Puppet

# Copyright 2017 Red Hat, Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
define openstack_project::website (
$aliases = undef,
$volume_name = undef,
$ssl_cert = undef,
$ssl_key = undef,
$ssl_intermediate = undef,
$template = 'openstack_project/website.vhost.erb',
) {
$afs_root = '/afs/openstack.org/'
if $volume_name == undef {
# Default to volume name matching vhost name
$volume_name_ = $name
} else {
$volume_name_ = $volume_name
}
::httpd::vhost { $name:
serveraliases => $aliases,
port => 443, # Is required despite not being used.
docroot => "${afs_root}/project/${volume_name_}/www",
priority => '50',
template => $template,
require => [File["/etc/ssl/certs/${name}.pem"],
File["/etc/ssl/private/${name}.key"],
File["/etc/ssl/certs/${name}_intermediate.pem"]],
}
file { "/etc/ssl/certs/${name}.pem":
ensure => present,
owner => 'root',
group => 'root',
mode => '0644',
content => $ssl_cert,
require => File['/etc/ssl/certs'],
}
file { "/etc/ssl/private/${name}.key":
ensure => present,
owner => 'root',
group => 'root',
mode => '0600',
content => $ssl_key,
require => File['/etc/ssl/private'],
}
file { "/etc/ssl/certs/${name}_intermediate.pem":
ensure => present,
owner => 'root',
group => 'root',
mode => '0644',
content => $ssl_intermediate,
require => File['/etc/ssl/certs'],
}
}