diff --git a/manifests/init.pp b/manifests/init.pp index c75bd2e..904db3f 100644 --- a/manifests/init.pp +++ b/manifests/init.pp @@ -1,247 +1,247 @@ # Class: nginx # # This module manages NGINX. # # Parameters: # # Actions: # # Requires: # puppetlabs-stdlib - https://github.com/puppetlabs/puppetlabs-stdlib # # Packaged NGINX # - RHEL: EPEL or custom package # - Debian/Ubuntu: Default Install or custom package # - SuSE: Default Install or custom package # # stdlib # - puppetlabs-stdlib module >= 0.1.6 # # Sample Usage: # # The module works with sensible defaults: # # node default { # include nginx # } # # @param include_modules_enabled # When set, nginx will include module configurations files installed in the # /etc/nginx/modules-enabled directory. # # @param passenger_package_name # The name of the package to install in order for the passenger module of # nginx being usable. # # @param nginx_version # The version of nginx installed (or being installed). # Unfortunately, different versions of nginx may need configuring # differently. The default is derived from the version of nginx # already installed. If the fact is unavailable, it defaults to '1.6.0'. # You may need to set this manually to get a working and idempotent # configuration. # # @param debug_connections # Configures nginx `debug_connection` lines in the `events` section of the nginx config. # See http://nginx.org/en/docs/ngx_core_module.html#debug_connection class nginx ( ### START Nginx Configuration ### Variant[Stdlib::Absolutepath, Boolean] $client_body_temp_path = $nginx::params::client_body_temp_path, Boolean $confd_only = false, Boolean $confd_purge = false, $conf_dir = $nginx::params::conf_dir, Optional[Enum['on', 'off']] $daemon = undef, $daemon_user = $nginx::params::daemon_user, $daemon_group = undef, Array[String] $dynamic_modules = [], $global_owner = $nginx::params::global_owner, $global_group = $nginx::params::global_group, $global_mode = $nginx::params::global_mode, Optional[Variant[String[1], Array[String[1]]]] $limit_req_zone = undef, Stdlib::Absolutepath $log_dir = $nginx::params::log_dir, String[1] $log_user = $nginx::params::log_user, String[1] $log_group = $nginx::params::log_group, Stdlib::Filemode $log_mode = $nginx::params::log_mode, Variant[String, Array[String]] $http_access_log = "${log_dir}/${nginx::params::http_access_log_file}", $http_format_log = undef, Variant[String, Array[String]] $nginx_error_log = "${log_dir}/${nginx::params::nginx_error_log_file}", Nginx::ErrorLogSeverity $nginx_error_log_severity = 'error', $pid = $nginx::params::pid, Variant[Stdlib::Absolutepath, Boolean] $proxy_temp_path = $nginx::params::proxy_temp_path, $root_group = $nginx::params::root_group, $run_dir = $nginx::params::run_dir, $sites_available_owner = $nginx::params::sites_available_owner, $sites_available_group = $nginx::params::sites_available_group, $sites_available_mode = $nginx::params::sites_available_mode, Boolean $super_user = $nginx::params::super_user, $temp_dir = $nginx::params::temp_dir, Boolean $server_purge = false, Boolean $include_modules_enabled = $nginx::params::include_modules_enabled, # Primary Templates $conf_template = 'nginx/conf.d/nginx.conf.erb', ### START Nginx Configuration ### Optional[Enum['on', 'off']] $absolute_redirect = undef, Enum['on', 'off'] $accept_mutex = 'on', $accept_mutex_delay = '500ms', $client_body_buffer_size = '128k', String $client_max_body_size = '10m', $client_body_timeout = '60s', $send_timeout = '60s', $lingering_timeout = '5s', Optional[Enum['on', 'off']] $etag = undef, Optional[String] $events_use = undef, Array[Nginx::DebugConnection] $debug_connections = [], String $fastcgi_cache_inactive = '20m', Optional[String] $fastcgi_cache_key = undef, String $fastcgi_cache_keys_zone = 'd3:100m', String $fastcgi_cache_levels = '1', String $fastcgi_cache_max_size = '500m', Optional[String] $fastcgi_cache_path = undef, Optional[String] $fastcgi_cache_use_stale = undef, Enum['on', 'off'] $gzip = 'off', $gzip_buffers = undef, $gzip_comp_level = 1, $gzip_disable = 'msie6', $gzip_min_length = 20, $gzip_http_version = 1.1, $gzip_proxied = 'off', $gzip_types = undef, Enum['on', 'off'] $gzip_vary = 'off', Optional[Enum['on', 'off', 'always']] $gzip_static = undef, Optional[Variant[Hash, Array]] $http_cfg_prepend = undef, Optional[Variant[Hash, Array]] $http_cfg_append = undef, Optional[Variant[Array[String], String]] $http_raw_prepend = undef, Optional[Variant[Array[String], String]] $http_raw_append = undef, Enum['on', 'off'] $http_tcp_nodelay = 'on', Enum['on', 'off'] $http_tcp_nopush = 'off', $keepalive_timeout = '65s', $keepalive_requests = '100', $log_format = {}, Boolean $mail = false, Variant[String, Boolean] $mime_types_path = 'mime.types', Boolean $stream = false, String $multi_accept = 'off', Integer $names_hash_bucket_size = 64, Integer $names_hash_max_size = 512, $nginx_cfg_prepend = false, String $proxy_buffers = '32 4k', String $proxy_buffer_size = '8k', String $proxy_cache_inactive = '20m', String $proxy_cache_keys_zone = 'd2:100m', String $proxy_cache_levels = '1', String $proxy_cache_max_size = '500m', Optional[Variant[Hash, String]] $proxy_cache_path = undef, Optional[Integer] $proxy_cache_loader_files = undef, Optional[String] $proxy_cache_loader_sleep = undef, Optional[String] $proxy_cache_loader_threshold = undef, Optional[Enum['on', 'off']] $proxy_use_temp_path = undef, $proxy_connect_timeout = '90s', Integer $proxy_headers_hash_bucket_size = 64, Optional[String] $proxy_http_version = undef, $proxy_read_timeout = '90s', $proxy_redirect = undef, $proxy_send_timeout = '90s', Array $proxy_set_header = [ 'Host $host', 'X-Real-IP $remote_addr', 'X-Forwarded-For $proxy_add_x_forwarded_for', 'Proxy ""', ], Array $proxy_hide_header = [], Array $proxy_pass_header = [], Array $proxy_ignore_header = [], Optional[Nginx::Size] $proxy_max_temp_file_size = undef, Optional[Nginx::Size] $proxy_busy_buffers_size = undef, Enum['on', 'off'] $sendfile = 'on', Enum['on', 'off'] $server_tokens = 'on', Enum['on', 'off'] $spdy = 'off', Enum['on', 'off'] $http2 = 'off', Enum['on', 'off'] $ssl_stapling = 'off', Enum['on', 'off'] $ssl_stapling_verify = 'off', Stdlib::Absolutepath $snippets_dir = $nginx::params::snippets_dir, Boolean $manage_snippets_dir = true, $types_hash_bucket_size = '512', $types_hash_max_size = '1024', Integer $worker_connections = 1024, Enum['on', 'off'] $ssl_prefer_server_ciphers = 'on', Variant[Integer, Enum['auto']] $worker_processes = 'auto', Integer $worker_rlimit_nofile = 1024, String $ssl_protocols = 'TLSv1 TLSv1.1 TLSv1.2', String $ssl_ciphers = 'ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-RSA-AES256-SHA256:DHE-RSA-AES256-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:EDH-RSA-DES-CBC3-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA:!DSS', # lint:ignore:140chars Optional[Stdlib::Unixpath] $ssl_dhparam = undef, Optional[String] $ssl_ecdh_curve = undef, String $ssl_session_cache = 'shared:SSL:10m', String $ssl_session_timeout = '5m', Optional[Enum['on', 'off']] $ssl_session_tickets = undef, Optional[Stdlib::Absolutepath] $ssl_session_ticket_key = undef, Optional[String] $ssl_buffer_size = undef, Optional[Stdlib::Absolutepath] $ssl_crl = undef, Optional[Stdlib::Absolutepath] $ssl_stapling_file = undef, Optional[String] $ssl_stapling_responder = undef, Optional[Stdlib::Absolutepath] $ssl_trusted_certificate = undef, Optional[Integer] $ssl_verify_depth = undef, Optional[Stdlib::Absolutepath] $ssl_password_file = undef, ### START Package Configuration ### $package_ensure = present, $package_name = $nginx::params::package_name, $package_source = 'nginx', $package_flavor = undef, Boolean $manage_repo = $nginx::params::manage_repo, Hash[String[1], String[1]] $mime_types = $nginx::params::mime_types, Boolean $mime_types_preserve_defaults = false, Optional[String] $repo_release = undef, $passenger_package_ensure = 'present', String[1] $passenger_package_name = $nginx::params::passenger_package_name, Optional[Stdlib::HTTPUrl] $repo_source = undef, ### END Package Configuration ### ### START Service Configuation ### - $service_ensure = running, + Stdlib::Ensure::Service $service_ensure = 'running', $service_enable = true, $service_flags = undef, $service_restart = undef, $service_name = 'nginx', $service_manage = true, ### END Service Configuration ### ### START Hiera Lookups ### Hash $geo_mappings = {}, Hash $geo_mappings_defaults = {}, Hash $string_mappings = {}, Hash $string_mappings_defaults = {}, Hash $nginx_locations = {}, Hash $nginx_locations_defaults = {}, Hash $nginx_mailhosts = {}, Hash $nginx_mailhosts_defaults = {}, Hash $nginx_servers = {}, Hash $nginx_servers_defaults = {}, Hash $nginx_streamhosts = {}, Hash $nginx_streamhosts_defaults = {}, Hash $nginx_upstreams = {}, Nginx::UpstreamDefaults $nginx_upstreams_defaults = {}, Boolean $purge_passenger_repo = true, String[1] $nginx_version = pick(fact('nginx_version'), '1.6.0'), ### END Hiera Lookups ### ) inherits nginx::params { contain 'nginx::package' contain 'nginx::config' contain 'nginx::service' create_resources( 'nginx::resource::geo', $geo_mappings, $geo_mappings_defaults ) create_resources( 'nginx::resource::location', $nginx_locations, $nginx_locations_defaults ) create_resources( 'nginx::resource::mailhost', $nginx_mailhosts, $nginx_mailhosts_defaults ) create_resources( 'nginx::resource::map', $string_mappings, $string_mappings_defaults ) create_resources( 'nginx::resource::server', $nginx_servers, $nginx_servers_defaults ) create_resources( 'nginx::resource::streamhost', $nginx_streamhosts, $nginx_streamhosts_defaults ) create_resources( 'nginx::resource::upstream', $nginx_upstreams, $nginx_upstreams_defaults ) # Allow the end user to establish relationships to the "main" class # and preserve the relationship to the implementation classes through # a transitive relationship to the composite class. Class['nginx::package'] -> Class['nginx::config'] ~> Class['nginx::service'] Class['nginx::package'] ~> Class['nginx::service'] } diff --git a/manifests/service.pp b/manifests/service.pp index fd1a578..aba84eb 100644 --- a/manifests/service.pp +++ b/manifests/service.pp @@ -1,54 +1,14 @@ -# Class: nginx::service -# -# This module manages NGINX service management and server rebuild -# -# Parameters: -# -# There are no default parameters for this class. -# -# Actions: -# -# Requires: -# -# Sample Usage: -# -# This class file is not called directly -class nginx::service ( - $service_restart = $nginx::service_restart, - $service_ensure = $nginx::service_ensure, - $service_enable = $nginx::service_enable, - $service_name = $nginx::service_name, - $service_flags = $nginx::service_flags, - $service_manage = $nginx::service_manage, -) { +# @summary Manage NGINX service management +# @api private +class nginx::service { assert_private() - if $service_manage { - case $facts['os']['name'] { - 'OpenBSD': { - service { $service_name: - ensure => $service_ensure, - enable => $service_enable, - flags => $service_flags, - hasstatus => true, - hasrestart => true, - } - } - default: { - service { $service_name: - ensure => $service_ensure, - enable => $service_enable, - hasstatus => true, - hasrestart => true, - } - } - } - } - - # Allow overriding of 'restart' of Service resource; not used by default - if $service_restart { - Service[$service_name] { - restart => $service_restart, + if $nginx::service_manage { + service { $nginx::service_name: + ensure => $nginx::service_ensure, + enable => $nginx::service_enable, + flags => $nginx::service_flags, + restart => $nginx::service_restart, } } } diff --git a/spec/classes/nginx_spec.rb b/spec/classes/nginx_spec.rb index 91ecb3b..b384d5b 100644 --- a/spec/classes/nginx_spec.rb +++ b/spec/classes/nginx_spec.rb @@ -1,1500 +1,1498 @@ require 'spec_helper' describe 'nginx' do on_supported_os.each do |os, facts| context "on #{os} with Facter #{facts[:facterversion]} and Puppet #{facts[:puppetversion]}" do let(:facts) do facts end let :params do { nginx_upstreams: { 'upstream1' => { 'members' => { 'localhost' => { 'port' => 3000 } } } }, nginx_servers: { 'test2.local' => { 'www_root' => '/' } }, nginx_servers_defaults: { 'listen_options' => 'default_server' }, nginx_locations: { 'test2.local' => { 'server' => 'test2.local', 'www_root' => '/' } }, nginx_locations_defaults: { 'expires' => '@12h34m' }, nginx_mailhosts: { 'smtp.test2.local' => { 'auth_http' => 'server2.example/cgi-bin/auth', 'protocol' => 'smtp', 'listen_port' => 587 } }, nginx_mailhosts_defaults: { 'listen_options' => 'default_server_smtp' }, nginx_streamhosts: { 'streamhost1' => { 'proxy' => 'streamproxy' } } } end describe 'with defaults' do it { is_expected.to compile.with_all_deps } it { is_expected.to contain_class('nginx') } it { is_expected.to contain_class('nginx::config').that_requires('Class[nginx::package]') } it { is_expected.to contain_class('nginx::service').that_subscribes_to('Class[nginx::package]') } it { is_expected.to contain_class('nginx::service').that_subscribes_to('Class[nginx::config]') } it { is_expected.to contain_nginx__resource__upstream('upstream1') } it { is_expected.to contain_nginx__resource__server('test2.local') } it { is_expected.to contain_nginx__resource__server('test2.local').with_listen_options('default_server') } it { is_expected.to contain_nginx__resource__location('test2.local') } it { is_expected.to contain_nginx__resource__location('test2.local').with_expires('@12h34m') } it { is_expected.to contain_nginx__resource__mailhost('smtp.test2.local') } it { is_expected.to contain_nginx__resource__mailhost('smtp.test2.local').with_listen_options('default_server_smtp') } it { is_expected.to contain_nginx__resource__streamhost('streamhost1').with_proxy('streamproxy') } end context 'nginx::package' do case facts[:osfamily] when 'RedHat' context 'using defaults' do it { is_expected.to contain_package('nginx') } it do is_expected.to contain_yumrepo('nginx-release').with( 'baseurl' => "https://nginx.org/packages/#{%w[CentOS VirtuozzoLinux].include?(facts[:operatingsystem]) ? 'centos' : 'rhel'}/#{facts[:operatingsystemmajrelease]}/$basearch/", 'descr' => 'nginx repo', 'enabled' => '1', 'gpgcheck' => '1', 'priority' => '1', 'gpgkey' => 'https://nginx.org/keys/nginx_signing.key' ) end it do is_expected.to contain_yumrepo('passenger').with( 'ensure' => 'absent' ) end it { is_expected.to contain_yumrepo('nginx-release').that_comes_before('Package[nginx]') } it { is_expected.to contain_yumrepo('passenger').that_comes_before('Package[nginx]') } end context 'using default repo without passenger' do let(:params) { { purge_passenger_repo: false } } it { is_expected.to contain_package('nginx') } it do is_expected.to contain_yumrepo('nginx-release').with( 'baseurl' => "https://nginx.org/packages/#{%w[CentOS VirtuozzoLinux].include?(facts[:operatingsystem]) ? 'centos' : 'rhel'}/#{facts[:operatingsystemmajrelease]}/$basearch/", 'descr' => 'nginx repo', 'enabled' => '1', 'gpgcheck' => '1', 'priority' => '1', 'gpgkey' => 'https://nginx.org/keys/nginx_signing.key' ) end it { is_expected.not_to contain_yumrepo('passenger') } end context 'package_source => nginx-mainline' do let(:params) { { package_source: 'nginx-mainline' } } it do is_expected.to contain_yumrepo('nginx-release').with( 'baseurl' => "https://nginx.org/packages/mainline/#{%w[CentOS VirtuozzoLinux].include?(facts[:operatingsystem]) ? 'centos' : 'rhel'}/#{facts[:operatingsystemmajrelease]}/$basearch/" ) end it do is_expected.to contain_yumrepo('passenger').with( 'ensure' => 'absent' ) end it { is_expected.to contain_yumrepo('nginx-release').that_comes_before('Package[nginx]') } it { is_expected.to contain_yumrepo('passenger').that_comes_before('Package[nginx]') } end context 'package_source => passenger' do let(:params) { { package_source: 'passenger' } } it do is_expected.to contain_yumrepo('passenger').with( 'baseurl' => "https://oss-binaries.phusionpassenger.com/yum/passenger/el/#{facts[:operatingsystemmajrelease]}/$basearch", 'gpgcheck' => '0', 'repo_gpgcheck' => '1', 'gpgkey' => 'https://oss-binaries.phusionpassenger.com/auto-software-signing-gpg-key.txt' ) end it do is_expected.to contain_yumrepo('nginx-release').with( 'ensure' => 'absent' ) end it { is_expected.to contain_yumrepo('passenger').that_comes_before('Package[nginx]') } it { is_expected.to contain_yumrepo('nginx-release').that_comes_before('Package[nginx]') } it { is_expected.to contain_package('passenger').with('ensure' => 'present') } end describe 'installs the requested passenger package version' do let(:params) { { package_source: 'passenger', passenger_package_ensure: '4.1.0-1.el9' } } it 'installs specified version exactly' do is_expected.to contain_package('passenger').with('ensure' => '4.1.0-1.el9') end end context 'manage_repo => false' do let(:params) { { manage_repo: false } } it { is_expected.to contain_package('nginx') } it { is_expected.not_to contain_yumrepo('nginx-release') } end describe 'installs the requested package version' do let(:params) { { package_ensure: '3.0.0' } } it 'installs 3.0.0 exactly' do is_expected.to contain_package('nginx').with('ensure' => '3.0.0') end end when 'Debian' context 'using defaults' do it { is_expected.to contain_package('nginx') } it { is_expected.not_to contain_package('passenger') } it do is_expected.to contain_apt__source('nginx').with( 'location' => "https://nginx.org/packages/#{facts[:operatingsystem].downcase}", 'repos' => 'nginx', 'key' => { 'id' => '573BFD6B3D8FBC641079A6ABABF5BD827BD9BF62' } ) end end context 'repo_source' do let(:params) { { repo_source: 'https://example.com/nginx' } } it do is_expected.to contain_apt__source('nginx').with( 'location' => 'https://example.com/nginx' ) end end context 'package_source => nginx-mainline' do let(:params) { { package_source: 'nginx-mainline' } } it do is_expected.to contain_apt__source('nginx').with( 'location' => "https://nginx.org/packages/mainline/#{facts[:operatingsystem].downcase}" ) end end context "package_source => 'passenger'" do let(:params) { { package_source: 'passenger' } } it { is_expected.to contain_package('nginx') } if facts[:lsbdistid] == 'Debian' && %w[9 10].include?(facts.dig(:os, 'release', 'major')) || facts[:lsbdistid] == 'Ubuntu' && %w[bionic].include?(facts[:lsbdistcodename]) it { is_expected.to contain_package('libnginx-mod-http-passenger') } else it { is_expected.to contain_package('passenger') } end it do is_expected.to contain_apt__source('nginx').with( 'location' => 'https://oss-binaries.phusionpassenger.com/apt/passenger', 'repos' => 'main', 'key' => { 'id' => '16378A33A6EF16762922526E561F9B9CAC40B2F7' } ) end end context 'manage_repo => false' do let(:params) { { manage_repo: false } } it { is_expected.to contain_package('nginx') } it { is_expected.not_to contain_apt__source('nginx') } it { is_expected.not_to contain_package('passenger') } end when 'Archlinux' context 'using defaults' do it { is_expected.to contain_package('nginx-mainline') } end else it { is_expected.to contain_package('nginx') } end end context 'nginx::service' do let :params do { service_ensure: 'running', service_enable: true, service_name: 'nginx', service_manage: true } end context 'using default parameters' do it do is_expected.to contain_service('nginx').with( ensure: 'running', - enable: true, - hasstatus: true, - hasrestart: true + enable: true ) end it { is_expected.to contain_service('nginx').without_restart } end context "when service_restart => 'a restart command'" do let :params do { service_restart: 'a restart command', service_ensure: 'running', service_enable: true, service_name: 'nginx' } end it { is_expected.to contain_service('nginx').with_restart('a restart command') } end describe "when service_name => 'nginx14" do let :params do { service_name: 'nginx14' } end it { is_expected.to contain_service('nginx14') } end describe 'when service_manage => false' do let :params do { service_manage: false } end it { is_expected.not_to contain_service('nginx') } end end # nginx::config context 'nginx::config' do context 'with defaults' do it do is_expected.to contain_file('/etc/nginx').only_with( path: '/etc/nginx', ensure: 'directory', owner: 'root', group: 'root', mode: '0644' ) end it do is_expected.to contain_file('/etc/nginx/conf.d').only_with( path: '/etc/nginx/conf.d', ensure: 'directory', owner: 'root', group: 'root', mode: '0644' ) end it do is_expected.to contain_file('/etc/nginx/conf.stream.d').only_with( path: '/etc/nginx/conf.stream.d', ensure: 'directory', owner: 'root', group: 'root', mode: '0644' ) end it do is_expected.to contain_file('/etc/nginx/conf.mail.d').only_with( path: '/etc/nginx/conf.mail.d', ensure: 'directory', owner: 'root', group: 'root', mode: '0644' ) end it do case facts[:osfamily] when 'Debian' is_expected.to contain_file('/run/nginx').with( ensure: 'directory', owner: 'root', group: 'root', mode: '0644' ) else is_expected.to contain_file('/var/nginx').with( ensure: 'directory', owner: 'root', group: 'root', mode: '0644' ) end end it do case facts[:osfamily] when 'Debian' is_expected.to contain_file('/run/nginx/client_body_temp').with( ensure: 'directory', group: 'root', mode: '0644' ) else is_expected.to contain_file('/var/nginx/client_body_temp').with( ensure: 'directory', group: 'root', mode: '0644' ) end end it do case facts[:osfamily] when 'Debian' is_expected.to contain_file('/run/nginx/proxy_temp').with( ensure: 'directory', group: 'root', mode: '0644' ) else is_expected.to contain_file('/var/nginx/proxy_temp').with( ensure: 'directory', group: 'root', mode: '0644' ) end end it do is_expected.to contain_file('/etc/nginx/nginx.conf').with( ensure: 'file', owner: 'root', group: 'root', mode: '0644' ) end it do is_expected.to contain_file('/etc/nginx/mime.types').with( ensure: 'file', owner: 'root', group: 'root', mode: '0644' ) end it do is_expected.to contain_file('/tmp/nginx.d').with( ensure: 'absent', purge: true, recurse: true ) end it do is_expected.to contain_file('/tmp/nginx.mail.d').with( ensure: 'absent', purge: true, recurse: true ) end case facts[:osfamily] when 'RedHat' it { is_expected.to contain_file('/var/nginx/client_body_temp').with(owner: 'nginx') } it { is_expected.to contain_file('/var/nginx/proxy_temp').with(owner: 'nginx') } it { is_expected.to contain_file('/etc/nginx/nginx.conf').with_content %r{^user nginx;} } it do is_expected.to contain_file('/var/log/nginx').with( ensure: 'directory', owner: 'nginx', group: 'nginx', mode: '0750' ) end when 'Debian' it { is_expected.to contain_file('/run/nginx/client_body_temp').with(owner: 'www-data') } it { is_expected.to contain_file('/run/nginx/proxy_temp').with(owner: 'www-data') } it { is_expected.to contain_file('/etc/nginx/nginx.conf').with_content %r{^user www-data;} } it do is_expected.to contain_file('/var/log/nginx').with( ensure: 'directory', owner: 'root', group: 'adm', mode: '0755' ) end end describe 'nginx.conf template content' do [ { title: 'should not set load_module', attr: 'dynamic_modules', value: :undef, notmatch: %r{load_module} }, { title: 'should not set user', attr: 'super_user', value: false, notmatch: %r{user} }, { title: 'should not set group', attr: 'daemon_group', value: :undef, notmatch: %r{^user \S+ \S+;} }, { title: 'should set user', attr: 'daemon_user', value: 'test-user', match: 'user test-user;' }, { title: 'should not set daemon', attr: 'daemon', value: :undef, notmatch: %r{^\s*daemon\s+} }, { title: 'should set daemon on', attr: 'daemon', value: 'on', match: %r{^daemon\s+on;$} }, { title: 'should set daemon off', attr: 'daemon', value: 'off', match: %r{^daemon\s+off;$} }, { title: 'should set worker_processes', attr: 'worker_processes', value: 4, match: 'worker_processes 4;' }, { title: 'should set worker_processes', attr: 'worker_processes', value: 'auto', match: 'worker_processes auto;' }, { title: 'should set worker_rlimit_nofile', attr: 'worker_rlimit_nofile', value: 10_000, match: 'worker_rlimit_nofile 10000;' }, { title: 'should set error_log', attr: 'nginx_error_log', value: '/path/to/error.log', match: ' error_log /path/to/error.log error;' }, { title: 'should set multiple error_logs', attr: 'nginx_error_log', value: ['/path/to/error.log', 'syslog:server=localhost'], match: [ ' error_log /path/to/error.log error;', ' error_log syslog:server=localhost error;' ] }, { title: 'should set error_log severity level', attr: 'nginx_error_log_severity', value: 'warn', match: ' error_log /var/log/nginx/error.log warn;' }, { title: 'should set limit_req_zone', attr: 'limit_req_zone', value: [ '$binary_remote_addr zone=myzone1:10m rate=5r/s', '$binary_remote_addr zone=myzone2:10m rate=5r/s' ], match: [ ' limit_req_zone $binary_remote_addr zone=myzone1:10m rate=5r/s;', ' limit_req_zone $binary_remote_addr zone=myzone2:10m rate=5r/s;' ] }, { title: 'should set pid', attr: 'pid', value: '/path/to/pid', match: 'pid /path/to/pid;' }, { title: 'should not set pid', attr: 'pid', value: false, notmatch: %r{pid} }, { title: 'should not set absolute_redirect', attr: 'absolute_redirect', value: :undef, notmatch: %r{absolute_redirect} }, { title: 'should set absolute_redirect off', attr: 'absolute_redirect', value: 'off', match: ' absolute_redirect off;' }, { title: 'should set accept_mutex on', attr: 'accept_mutex', value: 'on', match: ' accept_mutex on;' }, { title: 'should set accept_mutex off', attr: 'accept_mutex', value: 'off', match: ' accept_mutex off;' }, { title: 'should set accept_mutex_delay', attr: 'accept_mutex_delay', value: '500s', match: ' accept_mutex_delay 500s;' }, { title: 'should set worker_connections', attr: 'worker_connections', value: 100, match: ' worker_connections 100;' }, { title: 'should set log formats', attr: 'log_format', value: { 'format1' => 'FORMAT1', 'format2' => 'FORMAT2' }, match: [ ' log_format format1 \'FORMAT1\';', ' log_format format2 \'FORMAT2\';' ] }, { title: 'should not set log formats', attr: 'log_format', value: {}, notmatch: %r{log_format} }, { title: 'should set multi_accept', attr: 'multi_accept', value: 'on', match: %r{\s*multi_accept\s+on;} }, { title: 'should not set multi_accept', attr: 'multi_accept', value: 'off', notmatch: %r{multi_accept} }, { title: 'should set etag', attr: 'etag', value: 'off', match: ' etag off;' }, { title: 'should set events_use', attr: 'events_use', value: 'eventport', match: %r{\s*use\s+eventport;} }, { title: 'should set access_log', attr: 'http_access_log', value: '/path/to/access.log', match: ' access_log /path/to/access.log;' }, { title: 'should set multiple access_logs', attr: 'http_access_log', value: ['/path/to/access.log', 'syslog:server=localhost'], match: [ ' access_log /path/to/access.log;', ' access_log syslog:server=localhost;' ] }, { title: 'should set custom log format', attr: 'http_format_log', value: 'mycustomformat', match: ' access_log /var/log/nginx/access.log mycustomformat;' }, { title: 'should set sendfile', attr: 'sendfile', value: 'on', match: ' sendfile on;' }, { title: 'should not set sendfile', attr: 'sendfile', value: 'off', notmatch: %r{sendfile} }, { title: 'should set server_tokens', attr: 'server_tokens', value: 'on', match: ' server_tokens on;' }, { title: 'should set types_hash_max_size', attr: 'types_hash_max_size', value: 10, match: ' types_hash_max_size 10;' }, { title: 'should set types_hash_bucket_size', attr: 'types_hash_bucket_size', value: 10, match: ' types_hash_bucket_size 10;' }, { title: 'should set server_names_hash_bucket_size', attr: 'names_hash_bucket_size', value: 10, match: ' server_names_hash_bucket_size 10;' }, { title: 'should set server_names_hash_max_size', attr: 'names_hash_max_size', value: 10, match: ' server_names_hash_max_size 10;' }, { title: 'should set keepalive_timeout', attr: 'keepalive_timeout', value: '123', match: ' keepalive_timeout 123;' }, { title: 'should set keepalive_requests', attr: 'keepalive_requests', value: '345', match: ' keepalive_requests 345;' }, { title: 'should set client_body_timeout', attr: 'client_body_timeout', value: '888', match: ' client_body_timeout 888;' }, { title: 'should set send_timeout', attr: 'send_timeout', value: '963', match: ' send_timeout 963;' }, { title: 'should set lingering_timeout', attr: 'lingering_timeout', value: '385', match: ' lingering_timeout 385;' }, { title: 'should set tcp_nodelay', attr: 'http_tcp_nodelay', value: 'on', match: ' tcp_nodelay on;' }, { title: 'should set tcp_nopush', attr: 'http_tcp_nopush', value: 'on', match: ' tcp_nopush on;' }, { title: 'should not set gzip', attr: 'gzip', value: 'off', notmatch: %r{gzip} }, { title: 'should set proxy_cache_path', attr: 'proxy_cache_path', value: '/path/to/proxy.cache', match: %r{\s+proxy_cache_path\s+/path/to/proxy.cache levels=1 keys_zone=d2:100m max_size=500m inactive=20m;} }, { title: 'should set fastcgi_cache_path', attr: 'fastcgi_cache_path', value: '/path/to/proxy.cache', match: %r{\s*fastcgi_cache_path\s+/path/to/proxy.cache levels=1 keys_zone=d3:100m max_size=500m inactive=20m;} }, { title: 'should set fastcgi_cache_use_stale', attr: 'fastcgi_cache_use_stale', value: 'invalid_header', match: ' fastcgi_cache_use_stale invalid_header;' }, { title: 'should contain http_raw_prepend directives', attr: 'http_raw_prepend', value: [ 'if (a) {', ' b;', '}' ], match: %r{^\s+if \(a\) \{\n\s++b;\n\s+\}} }, { title: 'should contain ordered appended directives from hash', attr: 'http_cfg_prepend', value: { 'test1' => 'test value 1', 'test2' => 'test value 2', 'allow' => 'test value 3' }, match: [ ' allow test value 3;', ' test1 test value 1;', ' test2 test value 2;' ] }, { title: 'should contain duplicate appended directives from list of hashes', attr: 'http_cfg_prepend', value: [['allow', 'test value 1'], ['allow', 'test value 2']], match: [ ' allow test value 1;', ' allow test value 2;' ] }, { title: 'should contain duplicate appended directives from array values', attr: 'http_cfg_prepend', value: { 'test1' => ['test value 1', 'test value 2', 'test value 3'] }, match: [ ' test1 test value 1;', ' test1 test value 2;' ] }, { title: 'should contain http_raw_append directives', attr: 'http_raw_append', value: [ 'if (a) {', ' b;', '}' ], match: %r{^\s+if \(a\) \{\n\s++b;\n\s+\}} }, { title: 'should contain ordered appended directives from hash', attr: 'http_cfg_append', value: { 'test1' => 'test value 1', 'test2' => 'test value 2', 'allow' => 'test value 3' }, match: [ ' allow test value 3;', ' test1 test value 1;', ' test2 test value 2;' ] }, { title: 'should contain duplicate appended directives from list of hashes', attr: 'http_cfg_append', value: [['allow', 'test value 1'], ['allow', 'test value 2']], match: [ ' allow test value 1;', ' allow test value 2;' ] }, { title: 'should contain duplicate appended directives from array values', attr: 'http_cfg_append', value: { 'test1' => ['test value 1', 'test value 2', 'test value 3'] }, match: [ ' test1 test value 1;', ' test1 test value 2;' ] }, { title: 'should contain ordered appended directives from hash', attr: 'nginx_cfg_prepend', value: { 'test1' => 'test value 1', 'test2' => 'test value 2', 'allow' => 'test value 3' }, match: [ 'allow test value 3;', 'test1 test value 1;', 'test2 test value 2;' ] }, { title: 'should contain duplicate appended directives from list of hashes', attr: 'nginx_cfg_prepend', value: [['allow', 'test value 1'], ['allow', 'test value 2']], match: [ 'allow test value 1;', 'allow test value 2;' ] }, { title: 'should contain duplicate appended directives from array values', attr: 'nginx_cfg_prepend', value: { 'test1' => ['test value 1', 'test value 2', 'test value 3'] }, match: [ 'test1 test value 1;', 'test1 test value 2;', 'test1 test value 3;' ] }, { title: 'should set pid', attr: 'pid', value: '/path/to/pid', match: 'pid /path/to/pid;' }, { title: 'should set mail', attr: 'mail', value: true, match: 'mail {' }, { title: 'should not set mail', attr: 'mail', value: false, notmatch: %r{mail} }, { title: 'should set proxy_buffers', attr: 'proxy_buffers', value: '50 5k', match: ' proxy_buffers 50 5k;' }, { title: 'should set proxy_buffer_size', attr: 'proxy_buffer_size', value: '2k', match: ' proxy_buffer_size 2k;' }, { title: 'should set proxy_http_version', attr: 'proxy_http_version', value: '1.1', match: ' proxy_http_version 1.1;' }, { title: 'should not set proxy_http_version', attr: 'proxy_http_version', value: nil, notmatch: 'proxy_http_version' }, { title: 'should contain ordered appended proxy_set_header directives', attr: 'proxy_set_header', value: %w[header1 header2], match: [ ' proxy_set_header header1;', ' proxy_set_header header2;' ] }, { title: 'should contain ordered appended proxy_hide_header directives', attr: 'proxy_hide_header', value: %w[header1 header2], match: [ ' proxy_hide_header header1;', ' proxy_hide_header header2;' ] }, { title: 'should contain ordered appended proxy_pass_header directives', attr: 'proxy_pass_header', value: %w[header1 header2], match: [ ' proxy_pass_header header1;', ' proxy_pass_header header2;' ] }, { title: 'should set client_body_temp_path', attr: 'client_body_temp_path', value: '/path/to/body_temp', match: ' client_body_temp_path /path/to/body_temp;' }, { title: 'should set proxy_temp_path', attr: 'proxy_temp_path', value: '/path/to/proxy_temp', match: ' proxy_temp_path /path/to/proxy_temp;' }, { title: 'should set proxy_max_temp_file_size', attr: 'proxy_max_temp_file_size', value: '1024m', match: ' proxy_max_temp_file_size 1024m;' }, { title: 'should set proxy_busy_buffers_size', attr: 'proxy_busy_buffers_size', value: '16k', match: ' proxy_busy_buffers_size 16k;' }, { title: 'should set ssl_stapling_verify', attr: 'ssl_stapling_verify', value: 'on', match: ' ssl_stapling_verify on;' }, { title: 'should set ssl_protocols', attr: 'ssl_protocols', value: 'TLSv1.2', match: ' ssl_protocols TLSv1.2;' }, { title: 'should set ssl_ciphers', attr: 'ssl_ciphers', value: 'ECDHE-ECDSA-CHACHA20-POLY1305', match: ' ssl_ciphers ECDHE-ECDSA-CHACHA20-POLY1305;' }, { title: 'should set ssl_dhparam', attr: 'ssl_dhparam', value: '/path/to/dhparam', match: ' ssl_dhparam /path/to/dhparam;' }, { title: 'should not set ssl_ecdh_curve', attr: 'ssl_ecdh_curve', value: :undef, notmatch: 'ssl_ecdh_curve' }, { title: 'should set ssl_ecdh_curve', attr: 'ssl_ecdh_curve', value: 'prime256v1:secp384r1', match: ' ssl_ecdh_curve prime256v1:secp384r1;' }, { title: 'should set ssl_session_cache', attr: 'ssl_session_cache', value: 'shared:SSL:10m', match: ' ssl_session_cache shared:SSL:10m;' }, { title: 'should set ssl_session_timeout', attr: 'ssl_session_timeout', value: '5m', match: ' ssl_session_timeout 5m;' }, { title: 'should not set ssl_session_tickets', attr: 'ssl_session_tickets', value: :undef, notmatch: 'ssl_session_tickets' }, { title: 'should set ssl_session_tickets', attr: 'ssl_session_tickets', value: 'on', match: ' ssl_session_tickets on;' }, { title: 'should not set ssl_session_ticket_key', attr: 'ssl_session_ticket_key', value: :undef, notmatch: 'ssl_session_ticket_key' }, { title: 'should set ssl_session_ticket_key', attr: 'ssl_session_ticket_key', value: '/path/to/ticket_key', match: ' ssl_session_ticket_key /path/to/ticket_key;' }, { title: 'should not set ssl_buffer_size', attr: 'ssl_buffer_size', value: :undef, notmatch: 'ssl_buffer_size' }, { title: 'should set ssl_buffer_size', attr: 'ssl_buffer_size', value: '16k', match: ' ssl_buffer_size 16k;' }, { title: 'should not set ssl_crl', attr: 'ssl_crl', value: :undef, notmatch: 'ssl_crl' }, { title: 'should set ssl_crl', attr: 'ssl_crl', value: '/path/to/crl', match: ' ssl_crl /path/to/crl;' }, { title: 'should not set ssl_stapling_file', attr: 'ssl_stapling_file', value: :undef, notmatch: 'ssl_stapling_file' }, { title: 'should set ssl_stapling_file', attr: 'ssl_stapling_file', value: '/path/to/stapling_file', match: ' ssl_stapling_file /path/to/stapling_file;' }, { title: 'should not set ssl_stapling_responder', attr: 'ssl_stapling_responder', value: :undef, notmatch: 'ssl_stapling_responder' }, { title: 'should set ssl_stapling_responder', attr: 'ssl_stapling_responder', value: 'http://stapling.responder/', match: ' ssl_stapling_responder http://stapling.responder/;' }, { title: 'should not set ssl_trusted_certificate', attr: 'ssl_trusted_certificate', value: :undef, notmatch: 'ssl_trusted_certificate' }, { title: 'should set ssl_trusted_certificate', attr: 'ssl_trusted_certificate', value: '/path/to/trusted_cert', match: ' ssl_trusted_certificate /path/to/trusted_cert;' }, { title: 'should not set ssl_verify_depth', attr: 'ssl_verify_depth', value: :undef, notmatch: 'ssl_verify_depth' }, { title: 'should set ssl_verify_depth', attr: 'ssl_verify_depth', value: 5, match: ' ssl_verify_depth 5;' }, { title: 'should not set ssl_password_file', attr: 'ssl_password_file', value: :undef, notmatch: 'ssl_password_file' }, { title: 'should set ssl_password_file', attr: 'ssl_password_file', value: '/path/to/password_file', match: ' ssl_password_file /path/to/password_file;' }, { title: 'should contain debug_connection directives', attr: 'debug_connections', value: %w[127.0.0.1 unix:], match: [ ' debug_connection 127.0.0.1;', ' debug_connection unix:;' ] } ].each do |param| context "when #{param[:attr]} is #{param[:value]}" do let(:params) { { param[:attr].to_sym => param[:value] } } it { is_expected.to contain_file('/etc/nginx/nginx.conf').with_mode('0644') } it param[:title] do matches = Array(param[:match]) if matches.all? { |m| m.is_a? Regexp } matches.each { |item| is_expected.to contain_file('/etc/nginx/nginx.conf').with_content(item) } else lines = catalogue.resource('file', '/etc/nginx/nginx.conf').send(:parameters)[:content].split("\n") expect(lines & Array(param[:match])).to eq(Array(param[:match])) end Array(param[:notmatch]).each do |item| is_expected.to contain_file('/etc/nginx/nginx.conf').without_content(item) end end end end end context 'when mime.types is "[\'text/css css\']"' do let(:params) do { mime_types: { 'text/css' => 'css' } } end it { is_expected.to contain_file('/etc/nginx/mime.types').with_content(%r{text/css css;}) } end context 'when mime.types is default' do it { is_expected.to contain_file('/etc/nginx/mime.types').with_content(%r{text/css css;}) } it { is_expected.to contain_file('/etc/nginx/mime.types').with_content(%r{audio/mpeg mp3;}) } end context 'when mime.types is "[\'custom/file customfile\']" and mime.types.preserve.defaults is true' do let(:params) do { mime_types: { 'custom/file' => 'customfile' }, mime_types_preserve_defaults: true } end it { is_expected.to contain_file('/etc/nginx/mime.types').with_content(%r{audio/mpeg mp3;}) } it { is_expected.to contain_file('/etc/nginx/mime.types').with_content(%r{custom/file customfile;}) } end context 'when dynamic_modules is "[\'ngx_http_geoip_module\']" ' do let(:params) do { dynamic_modules: ['ngx_http_geoip_module'] } end it { is_expected.to contain_file('/etc/nginx/nginx.conf').with_content(%r{load_module "modules/ngx_http_geoip_module.so";}) } end context 'when dynamic_modules is "[\'/path/to/module/ngx_http_geoip_module.so\']" ' do let(:params) do { dynamic_modules: ['/path/to/module/ngx_http_geoip_module.so'] } end it { is_expected.to contain_file('/etc/nginx/nginx.conf').with_content(%r{load_module "/path/to/module/ngx_http_geoip_module.so";}) } end context 'when proxy_cache_path is /path/to/proxy.cache and loader_files is 1000' do let(:params) do { conf_dir: '/path/to/nginx', proxy_cache_path: '/path/to/proxy.cache', proxy_cache_loader_files: 1000 } end it { is_expected.to contain_file('/path/to/nginx/nginx.conf').with_content(%r{\s+proxy_cache_path\s+/path/to/proxy.cache levels=1 keys_zone=d2:100m max_size=500m inactive=20m loader_files=1000;}) } end context 'when proxy_cache_path is /path/to/nginx and loader_sleep is 50ms' do let(:params) { { conf_dir: '/path/to/nginx', proxy_cache_path: '/path/to/proxy.cache', proxy_cache_loader_sleep: '50ms' } } it { is_expected.to contain_file('/path/to/nginx/nginx.conf').with_content(%r{\s+proxy_cache_path\s+/path/to/proxy.cache levels=1 keys_zone=d2:100m max_size=500m inactive=20m loader_sleep=50ms;}) } end context 'when proxy_cache_path is /path/to/nginx and loader_threshold is 300ms' do let(:params) { { conf_dir: '/path/to/nginx', proxy_cache_path: '/path/to/proxy.cache', proxy_cache_loader_threshold: '300ms' } } it { is_expected.to contain_file('/path/to/nginx/nginx.conf').with_content(%r{\s+proxy_cache_path\s+/path/to/proxy.cache levels=1 keys_zone=d2:100m max_size=500m inactive=20m loader_threshold=300ms;}) } end context 'when conf_dir is /path/to/nginx' do let(:params) { { conf_dir: '/path/to/nginx' } } it { is_expected.to contain_file('/path/to/nginx/nginx.conf').with_content(%r{include mime\.types;}) } it { is_expected.to contain_file('/path/to/nginx/nginx.conf').with_content(%r{include /path/to/nginx/conf\.d/\*\.conf;}) } it { is_expected.to contain_file('/path/to/nginx/nginx.conf').with_content(%r{include /path/to/nginx/sites-enabled/\*;}) } end context 'when mime_types_path is /path/to/mime.types' do let(:params) { { mime_types_path: '/path/to/mime.types' } } it { is_expected.to contain_file('/etc/nginx/nginx.conf').with_content(%r{include /path/to/mime\.types;}) } end context 'when confd_purge true' do let(:params) { { confd_purge: true } } it do is_expected.to contain_file('/etc/nginx/conf.d').with( purge: true, recurse: true ) end end context 'when confd_purge false' do let(:params) { { confd_purge: false } } it do is_expected.to contain_file('/etc/nginx/conf.d').without( %w[ ignore purge recurse ] ) end end context 'when confd_only true' do let(:params) { { confd_only: true } } it do is_expected.to contain_file('/etc/nginx/conf.d').without( %w[ ignore purge recurse ] ) is_expected.not_to contain_file('/etc/nginx/sites-available') is_expected.not_to contain_file('/etc/nginx/sites-enabled') is_expected.to contain_file('/etc/nginx/nginx.conf').without_content(%r{include /path/to/nginx/sites-enabled/\*;}) is_expected.not_to contain_file('/etc/nginx/streams-available') is_expected.not_to contain_file('/etc/nginx/streams-enabled') end end context 'when server_purge true' do let(:params) { { server_purge: true } } it do is_expected.to contain_file('/etc/nginx/sites-available').with( purge: true, recurse: true ) end it do is_expected.to contain_file('/etc/nginx/sites-enabled').with( purge: true, recurse: true ) end end context 'when confd_purge true, server_purge true, and confd_only true' do let(:params) do { confd_purge: true, confd_only: true, server_purge: true } end it do is_expected.to contain_file('/etc/nginx/conf.d').with( purge: true, recurse: true ) end it do is_expected.to contain_file('/etc/nginx/conf.stream.d').with( purge: true, recurse: true ) end end context 'when confd_purge true, server_purge default (false), confd_only true' do let(:params) do { confd_purge: true, confd_only: true } end it do is_expected.to contain_file('/etc/nginx/conf.d').without( %w[ purge ] ) end it do is_expected.to contain_file('/etc/nginx/conf.stream.d').without( %w[ purge ] ) end end context 'when server_purge false' do let(:params) { { server_purge: false } } it do is_expected.to contain_file('/etc/nginx/sites-available').without( %w[ ignore purge recurse ] ) end it do is_expected.to contain_file('/etc/nginx/sites-enabled').without( %w[ ignore purge recurse ] ) end it do is_expected.to contain_file('/var/log/nginx').without( %w[ ignore purge recurse ] ) end it do is_expected.to contain_file('/etc/nginx/streams-available').without( %w[ ignore purge recurse ] ) end it do is_expected.to contain_file('/etc/nginx/streams-enabled').without( %w[ ignore purge recurse ] ) end end context 'when daemon_user = www-data' do let(:params) { { daemon_user: 'www-data' } } case facts[:osfamily] when 'Debian' it { is_expected.to contain_file('/run/nginx/client_body_temp').with(owner: 'www-data') } it { is_expected.to contain_file('/run/nginx/proxy_temp').with(owner: 'www-data') } else it { is_expected.to contain_file('/var/nginx/client_body_temp').with(owner: 'www-data') } it { is_expected.to contain_file('/var/nginx/proxy_temp').with(owner: 'www-data') } end it { is_expected.to contain_file('/etc/nginx/nginx.conf').with_content %r{^user www-data;} } end context 'when daemon_group = test-group' do let(:params) { { daemon_group: 'test-group' } } it { is_expected.to contain_file('/etc/nginx/nginx.conf').with_content %r{^user .* test-group;} } end context 'when log_dir is non-default' do let(:params) { { log_dir: '/foo/bar' } } it { is_expected.to contain_file('/foo/bar').with(ensure: 'directory') } it do is_expected.to contain_file('/etc/nginx/nginx.conf').with_content( %r{access_log /foo/bar/access.log;} ) end it do is_expected.to contain_file('/etc/nginx/nginx.conf').with_content( %r{error_log /foo/bar/error.log error;} ) end end context 'when log_mode is non-default' do let(:params) { { log_mode: '0771' } } it { is_expected.to contain_file('/var/log/nginx').with(mode: '0771') } end context 'when gzip is non-default (on) test gzip defaults' do let(:params) { { gzip: 'on' } } it do is_expected.to contain_file('/etc/nginx/nginx.conf').with_content( %r{ gzip on;} ) end it do is_expected.to contain_file('/etc/nginx/nginx.conf').with_content( %r{ gzip_comp_level 1;} ) end it do is_expected.to contain_file('/etc/nginx/nginx.conf').with_content( %r{ gzip_disable msie6;} ) end it do is_expected.to contain_file('/etc/nginx/nginx.conf').with_content( %r{ gzip_min_length 20;} ) end it do is_expected.to contain_file('/etc/nginx/nginx.conf').with_content( %r{ gzip_http_version 1.1;} ) end it do is_expected.to contain_file('/etc/nginx/nginx.conf').with_content( %r{ gzip_vary off;} ) end it do is_expected.to contain_file('/etc/nginx/nginx.conf').with_content( %r{ gzip_proxied off;} ) end end context 'when gzip is non-default (on) set gzip_types (array)' do let(:params) do { gzip: 'on', gzip_types: ['text/plain', 'text/html'] } end it do is_expected.to contain_file('/etc/nginx/nginx.conf').with_content( %r{ gzip_types text/plain text/html;} ) end end context 'when gzip is non-default (on) set gzip types (string)' do let(:params) do { gzip: 'on', gzip_types: 'text/plain' } end it do is_expected.to contain_file('/etc/nginx/nginx.conf').with_content( %r{ gzip_types text/plain;} ) end end context 'when gzip is non-default (on) set gzip buffers' do let(:params) do { gzip: 'on', gzip_buffers: '32 4k' } end it do is_expected.to contain_file('/etc/nginx/nginx.conf').with_content( %r{ gzip_buffers 32 4k;} ) end end context 'when gzip_static is non-default set gzip_static' do let(:params) do { gzip_static: 'on' } end it do is_expected.to contain_file('/etc/nginx/nginx.conf').with_content( %r{ gzip_static on;} ) end end end end end end end