Dzahn has uploaded a new change for review.

  https://gerrit.wikimedia.org/r/153987

Change subject: puppetmaster Apache template - retab
......................................................................

puppetmaster Apache template - retab

Change-Id: I14b339c969a28a461a61072d5ec4a5737b4330be
---
M modules/puppetmaster/templates/puppetmaster.erb
1 file changed, 85 insertions(+), 85 deletions(-)


  git pull ssh://gerrit.wikimedia.org:29418/operations/puppet 
refs/changes/87/153987/1

diff --git a/modules/puppetmaster/templates/puppetmaster.erb 
b/modules/puppetmaster/templates/puppetmaster.erb
index e8cbc5a..f6ee749 100644
--- a/modules/puppetmaster/templates/puppetmaster.erb
+++ b/modules/puppetmaster/templates/puppetmaster.erb
@@ -12,105 +12,105 @@
 
 <%- if @server_type == 'frontend' or @server_type == 'standalone' -%>
 <VirtualHost <%= scope.lookupvar('puppetmaster::passenger::bind_address') 
%>:8140>
-       SSLEngine on
+    SSLEngine on
 
-       SSLCertificateFile      /var/lib/puppet/server/ssl/certs/<%= 
scope.lookupvar('puppetmaster::server_name') %>.pem
-       SSLCertificateKeyFile   /var/lib/puppet/server/ssl/private_keys/<%= 
scope.lookupvar('puppetmaster::server_name') %>.pem
-       SSLCACertificateFile    /var/lib/puppet/server/ssl/ca/ca_crt.pem
-       SSLCertificateChainFile /var/lib/puppet/server/ssl/ca/ca_crt.pem
-       # If Apache complains about invalid signatures on the CRL, you can try 
disabling
-       # CRL checking by commenting the next line, but this is not recommended.
-       SSLCARevocationPath     /var/lib/puppet/server/ssl/crl
-       SSLVerifyClient <%= 
scope.lookupvar('puppetmaster::passenger::verify_client') %>
-       SSLVerifyDepth  1
-       SSLOptions +StdEnvVars
-       <%= @ssl_settings.join("\n") %>
+    SSLCertificateFile      /var/lib/puppet/server/ssl/certs/<%= 
scope.lookupvar('puppetmaster::server_name') %>.pem
+    SSLCertificateKeyFile   /var/lib/puppet/server/ssl/private_keys/<%= 
scope.lookupvar('puppetmaster::server_name') %>.pem
+    SSLCACertificateFile    /var/lib/puppet/server/ssl/ca/ca_crt.pem
+    SSLCertificateChainFile /var/lib/puppet/server/ssl/ca/ca_crt.pem
+    # If Apache complains about invalid signatures on the CRL, you can try 
disabling
+    # CRL checking by commenting the next line, but this is not recommended.
+    SSLCARevocationPath     /var/lib/puppet/server/ssl/crl
+    SSLVerifyClient <%= 
scope.lookupvar('puppetmaster::passenger::verify_client') %>
+    SSLVerifyDepth  1
+    SSLOptions +StdEnvVars
+    <%= @ssl_settings.join("\n") %>
 
-       <%- if @server_type == 'frontend' -%>
-       # These request headers are used to pass the client certificate
-       # authentication information on to the puppet master process
-       RequestHeader set X-SSL-Subject %{SSL_CLIENT_S_DN}e
-       RequestHeader set X-Client-DN %{SSL_CLIENT_S_DN}e
-       RequestHeader set X-Client-Verify %{SSL_CLIENT_VERIFY}e
+    <%- if @server_type == 'frontend' -%>
+    # These request headers are used to pass the client certificate
+    # authentication information on to the puppet master process
+    RequestHeader set X-SSL-Subject %{SSL_CLIENT_S_DN}e
+    RequestHeader set X-Client-DN %{SSL_CLIENT_S_DN}e
+    RequestHeader set X-Client-Verify %{SSL_CLIENT_VERIFY}e
 
-       SSLProxyEngine on
-       # Certificates should only be in the frontend. It is terminating SSL 
connections from clients and authenticating them
-       # The connection to the backends is also SSL encrypted but by frontend 
and backends do not authenticate connections
-       ProxyPassMatch ^/([^/]+/certificate.*)$ https://<%= @fqdn %>:8141
-       # Reports should only be in one place. Choosing the frontend by default 
for simplicity
-       ProxyPassMatch ^/([^/]+/report/.*)$ https://<%= @fqdn %>:8141
-       # File buckets should only be in one place. Choosing the frontend by 
default for simplicity
-       ProxyPassMatch ^/([^/]+/file_bucket_file/md5/.*)$ https://<%= @fqdn 
%>:8141
-       # Volatile should only be in one place. Choosing the frontend by 
default for simplicity
-       ProxyPassMatch ^/([^/]+/file_metadata(s)?/volatile/.*)$ https://<%= 
@fqdn %>:8141
-       ProxyPassMatch ^/([^/]+/file_content/volatile/.*)$ https://<%= @fqdn 
%>:8141
-       # The rest gets balanced
-       ProxyPass / balancer://mycluster/
-       <Proxy balancer://mycluster>
-         <%- @workers.each do |workerhash| -%>
-               BalancerMember https://<%= workerhash['worker'] %>:8141 
connectiontimeout=1 retry=500 timeout=900 <%- if workerhash['loadfactor'] 
-%>loadfactor=<%= workerhash['loadfactor'] %><%- end %>
-         <%- end -%>
-               Order allow,deny
-               Allow from all
-       </Proxy>
-       <%- else -%>
-       RackBaseURI /
+    SSLProxyEngine on
+    # Certificates should only be in the frontend. It is terminating SSL 
connections from clients and authenticating them
+    # The connection to the backends is also SSL encrypted but by frontend and 
backends do not authenticate connections
+    ProxyPassMatch ^/([^/]+/certificate.*)$ https://<%= @fqdn %>:8141
+    # Reports should only be in one place. Choosing the frontend by default 
for simplicity
+    ProxyPassMatch ^/([^/]+/report/.*)$ https://<%= @fqdn %>:8141
+    # File buckets should only be in one place. Choosing the frontend by 
default for simplicity
+    ProxyPassMatch ^/([^/]+/file_bucket_file/md5/.*)$ https://<%= @fqdn %>:8141
+    # Volatile should only be in one place. Choosing the frontend by default 
for simplicity
+    ProxyPassMatch ^/([^/]+/file_metadata(s)?/volatile/.*)$ https://<%= @fqdn 
%>:8141
+    ProxyPassMatch ^/([^/]+/file_content/volatile/.*)$ https://<%= @fqdn 
%>:8141
+    # The rest gets balanced
+    ProxyPass / balancer://mycluster/
+    <Proxy balancer://mycluster>
+      <%- @workers.each do |workerhash| -%>
+        BalancerMember https://<%= workerhash['worker'] %>:8141 
connectiontimeout=1 retry=500 timeout=900 <%- if workerhash['loadfactor'] 
-%>loadfactor=<%= workerhash['loadfactor'] %><%- end %>
+      <%- end -%>
+        Order allow,deny
+        Allow from all
+    </Proxy>
+    <%- else -%>
+    RackBaseURI /
 
-       <Location />
-               Order Allow,Deny
-               <%- scope.lookupvar('puppetmaster::passenger::allow_from').each 
do |entry| -%>
-               Allow from <%= entry.gsub(/^\*/, "") %>
-               <%- end -%>
-               <%- scope.lookupvar('puppetmaster::passenger::deny_from').each 
do |entry| -%>
-               Deny from <%= entry.gsub(/^\*/, "") %>
-               <%- end -%>
-       </Location>
+    <Location />
+        Order Allow,Deny
+        <%- scope.lookupvar('puppetmaster::passenger::allow_from').each do 
|entry| -%>
+        Allow from <%= entry.gsub(/^\*/, "") %>
+        <%- end -%>
+        <%- scope.lookupvar('puppetmaster::passenger::deny_from').each do 
|entry| -%>
+        Deny from <%= entry.gsub(/^\*/, "") %>
+        <%- end -%>
+    </Location>
 
-       DocumentRoot /usr/share/puppet/rack/puppetmasterd/public
-       <Directory /usr/share/puppet/rack/puppetmasterd/>
-               Options None
-               AllowOverride None
-               Order allow,deny
-               allow from all
-       </Directory>
-       <%- end -%>
+    DocumentRoot /usr/share/puppet/rack/puppetmasterd/public
+    <Directory /usr/share/puppet/rack/puppetmasterd/>
+        Options None
+        AllowOverride None
+        Order allow,deny
+        allow from all
+    </Directory>
+    <%- end -%>
 
-       LogFormat "%h %l %u %{%Y-%m-%d %H:%M:%S}t \"%r\" %>s %O %D 
\"%{Referer}i\" \"%{User-Agent}i\"" puppetmaster
-       CustomLog /var/log/apache2/puppetmaster.log puppetmaster
+    LogFormat "%h %l %u %{%Y-%m-%d %H:%M:%S}t \"%r\" %>s %O %D \"%{Referer}i\" 
\"%{User-Agent}i\"" puppetmaster
+    CustomLog /var/log/apache2/puppetmaster.log puppetmaster
 </VirtualHost>
 <%- end -%>
 
 <%- if @server_type == 'frontend' or @server_type == 'backend' -%>
 <VirtualHost <%= scope.lookupvar('puppetmaster::passenger::bind_address') 
%>:8141>
-       SSLEngine on
-       SSLProtocol -ALL +SSLv3 +TLSv1
-       SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:-LOW:-SSLv2:-EXP
+    SSLEngine on
+    SSLProtocol -ALL +SSLv3 +TLSv1
+    SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:-LOW:-SSLv2:-EXP
 
-       SSLCertificateFile      /var/lib/puppet/ssl/certs/<%= @fqdn %>.pem
-       SSLCertificateKeyFile   /var/lib/puppet/ssl/private_keys/<%= @fqdn 
%>.pem
-       SSLCACertificateFile    /var/lib/puppet/ssl/certs/ca.pem
-       SSLCertificateChainFile /var/lib/puppet/ssl/certs/ca.pem
-       RackBaseURI /
+    SSLCertificateFile      /var/lib/puppet/ssl/certs/<%= @fqdn %>.pem
+    SSLCertificateKeyFile   /var/lib/puppet/ssl/private_keys/<%= @fqdn %>.pem
+    SSLCACertificateFile    /var/lib/puppet/ssl/certs/ca.pem
+    SSLCertificateChainFile /var/lib/puppet/ssl/certs/ca.pem
+    RackBaseURI /
 
-       <Location />
-               Order Allow,Deny
-               <%- scope.lookupvar('puppetmaster::passenger::allow_from').each 
do |entry| -%>
-               Allow from <%= entry.gsub(/^\*/, "") %>
-               <%- end -%>
-               <%- scope.lookupvar('puppetmaster::passenger::deny_from').each 
do |entry| -%>
-               Deny from <%= entry.gsub(/^\*/, "") %>
-               <%- end -%>
-       </Location>
+    <Location />
+        Order Allow,Deny
+        <%- scope.lookupvar('puppetmaster::passenger::allow_from').each do 
|entry| -%>
+        Allow from <%= entry.gsub(/^\*/, "") %>
+        <%- end -%>
+        <%- scope.lookupvar('puppetmaster::passenger::deny_from').each do 
|entry| -%>
+        Deny from <%= entry.gsub(/^\*/, "") %>
+        <%- end -%>
+    </Location>
 
-       DocumentRoot /usr/share/puppet/rack/puppetmasterd/public
-       <Directory /usr/share/puppet/rack/puppetmasterd/>
-               Options None
-               AllowOverride None
-               Order allow,deny
-               allow from all
-       </Directory>
+    DocumentRoot /usr/share/puppet/rack/puppetmasterd/public
+    <Directory /usr/share/puppet/rack/puppetmasterd/>
+        Options None
+        AllowOverride None
+        Order allow,deny
+        allow from all
+    </Directory>
 
-       LogFormat "%h %l %u %{%Y-%m-%d %H:%M:%S}t \"%r\" %>s %O %D 
\"%{Referer}i\" \"%{User-Agent}i\"" puppetmaster
-       CustomLog /var/log/apache2/puppetmaster-backend.log puppetmaster
+    LogFormat "%h %l %u %{%Y-%m-%d %H:%M:%S}t \"%r\" %>s %O %D \"%{Referer}i\" 
\"%{User-Agent}i\"" puppetmaster
+    CustomLog /var/log/apache2/puppetmaster-backend.log puppetmaster
 </VirtualHost>
 <%- end -%>

-- 
To view, visit https://gerrit.wikimedia.org/r/153987
To unsubscribe, visit https://gerrit.wikimedia.org/r/settings

Gerrit-MessageType: newchange
Gerrit-Change-Id: I14b339c969a28a461a61072d5ec4a5737b4330be
Gerrit-PatchSet: 1
Gerrit-Project: operations/puppet
Gerrit-Branch: production
Gerrit-Owner: Dzahn <[email protected]>

_______________________________________________
MediaWiki-commits mailing list
[email protected]
https://lists.wikimedia.org/mailman/listinfo/mediawiki-commits

Reply via email to