5 if RUBY_VERSION == '1.8.7'
6 # Mothers cry, puppies die and Ruby 1.8.7's open-uri needs to be
7 # monkeypatched to support passing in :ftp_passive_mode.
8 require File.expand_path(File.join(File.dirname(__FILE__), '..', '..', '..',
9 'puppet_x', 'apt_key', 'patch_openuri.rb'))
10 OpenURI::Options.merge!({:ftp_active_mode => false,})
13 Puppet::Type.type(:apt_key).provide(:apt_key) do
15 confine :osfamily => :debian
16 defaultfor :osfamily => :debian
17 commands :apt_key => 'apt-key'
18 commands :gpg => '/usr/bin/gpg'
21 cli_args = ['adv','--list-keys', '--with-colons', '--fingerprint', '--fixed-list-mode']
23 if RUBY_VERSION > '1.8.7'
24 key_output = apt_key(cli_args).encode('UTF-8', 'binary', :invalid => :replace, :undef => :replace, :replace => '')
26 key_output = apt_key(cli_args)
29 pub_line, fpr_line = nil
31 key_array = key_output.split("\n").collect do |line|
32 if line.start_with?('pub')
34 elsif line.start_with?('fpr')
38 next unless (pub_line and fpr_line)
40 line_hash = key_line_hash(pub_line, fpr_line)
43 pub_line, fpr_line = nil
47 if line_hash[:key_expiry]
48 expired = Time.now >= line_hash[:key_expiry]
52 :name => line_hash[:key_fingerprint],
53 :id => line_hash[:key_long],
54 :fingerprint => line_hash[:key_fingerprint],
55 :short => line_hash[:key_short],
56 :long => line_hash[:key_long],
59 :expiry => line_hash[:key_expiry].nil? ? nil : line_hash[:key_expiry].strftime("%Y-%m-%d"),
60 :size => line_hash[:key_size],
61 :type => line_hash[:key_type],
62 :created => line_hash[:key_created].strftime("%Y-%m-%d")
68 def self.prefetch(resources)
70 resources.keys.each do |name|
72 if provider = apt_keys.find{ |key| key.fingerprint == name }
73 resources[name].provider = provider
75 elsif name.length == 16
76 if provider = apt_keys.find{ |key| key.long == name }
77 resources[name].provider = provider
79 elsif name.length == 8
80 if provider = apt_keys.find{ |key| key.short == name }
81 resources[name].provider = provider
87 def self.key_line_hash(pub_line, fpr_line)
88 pub_split = pub_line.split(':')
89 fpr_split = fpr_line.split(':')
91 fingerprint = fpr_split.last
93 :key_fingerprint => fingerprint,
94 :key_long => fingerprint[-16..-1], # last 16 characters of fingerprint
95 :key_short => fingerprint[-8..-1], # last 8 characters of fingerprint
96 :key_size => pub_split[2],
98 :key_created => Time.at(pub_split[5].to_i),
99 :key_expiry => pub_split[6].empty? ? nil : Time.at(pub_split[6].to_i),
102 # set key type based on types defined in /usr/share/doc/gnupg/DETAILS.gz
105 return_hash[:key_type] = :rsa
107 return_hash[:key_type] = :dsa
109 return_hash[:key_type] = :ecc
111 return_hash[:key_type] = :ecdsa
117 def source_to_file(value)
118 parsedValue = URI::parse(value)
119 if parsedValue.scheme.nil?
120 fail("The file #{value} does not exist") unless File.exists?(value)
121 # Because the tempfile method has to return a live object to prevent GC
122 # of the underlying file from occuring too early, we also have to return
123 # a file object here. The caller can still call the #path method on the
124 # closed file handle to get the path.
125 f = File.open(value, 'r')
130 key = parsedValue.read
131 rescue OpenURI::HTTPError, Net::FTPPermError => e
132 fail("#{e.message} for #{resource[:source]}")
134 fail("could not resolve #{resource[:source]}")
141 # The tempfile method needs to return the tempfile object to the caller, so
142 # that it doesn't get deleted by the GC immediately after it returns. We
143 # want the caller to control when it goes out of scope.
144 def tempfile(content)
145 file = Tempfile.new('apt_key')
148 #confirm that the fingerprint from the file, matches the long key that is in the manifest
150 if File.executable? command(:gpg)
151 extracted_key = execute(["#{command(:gpg)} --with-fingerprint --with-colons #{file.path} | awk -F: '/^fpr:/ { print $10 }'"], :failonfail => false)
152 extracted_key = extracted_key.chomp
155 extracted_key.each_line do |line|
156 if line.chomp == name
161 fail("The id in your manifest #{resource[:name]} and the fingerprint from content/source do not match. Please check there is not an error in the id or check the content/source is legitimate.")
164 warning('/usr/bin/gpg cannot be found for verification of the id.')
171 @property_hash[:ensure] == :present
176 if resource[:source].nil? and resource[:content].nil?
177 # Breaking up the command like this is needed because it blows up
178 # if --recv-keys isn't the last argument.
179 command.push('adv', '--keyserver', resource[:server])
180 unless resource[:options].nil?
181 command.push('--keyserver-options', resource[:options])
183 command.push('--recv-keys', resource[:id])
184 elsif resource[:content]
185 key_file = tempfile(resource[:content])
186 command.push('add', key_file.path)
187 elsif resource[:source]
188 key_file = source_to_file(resource[:source])
189 command.push('add', key_file.path)
190 # In case we really screwed up, better safe than sorry.
192 fail("an unexpected condition occurred while trying to add the key: #{resource[:id]}")
195 @property_hash[:ensure] = :present
200 apt_key('del', resource.provider.short)
201 r = execute(["#{command(:apt_key)} list | grep '/#{resource.provider.short}\s'"], :failonfail => false)
202 end while r.exitstatus == 0
207 fail('This is a read-only property.')
212 # Needed until PUP-1470 is fixed and we can drop support for Puppet versions
215 @property_hash[:expired]
218 # Alias the setters of read-only properties
219 # to the read_only function.
220 alias :created= :read_only
221 alias :expired= :read_only
222 alias :expiry= :read_only
223 alias :size= :read_only
224 alias :type= :read_only