# @param allow_unsigned
# Specifies whether to authenticate packages from this release, even if the Release file is not signed or the signature can't be checked.
#
+# @param allow_insecure
+# Specifies whether to allow downloads from insecure repositories.
+#
# @param notify_update
# Specifies whether to trigger an `apt-get update` run.
#
+# @param check_valid_until
+# Specifies whether to check if the package release date is valid. Defaults to `True`.
+#
define apt::source (
Optional[String] $location = undef,
String $comment = $name,
Boolean $allow_unsigned = false,
Boolean $allow_insecure = false,
Boolean $notify_update = true,
+ Boolean $check_valid_until = true,
) {
- include ::apt
+ include apt
$_before = Apt::Setting["list-${title}"]
if ! $location {
fail('cannot create a source entry without specifying a location')
}
- elsif ($::apt::proxy['https_acng']) and ($location =~ /(?i:^https:\/\/)/) {
+ elsif ($apt::proxy['https_acng']) and ($location =~ /(?i:^https:\/\/)/) {
$_location = regsubst($location, 'https://','http://HTTPS///')
}
else {
# Newer oses, do not need the package for HTTPS transport.
$_transport_https_releases = ['9']
if (fact('os.release.major') in $_transport_https_releases) and $_location =~ /(?i:^https:\/\/)/ {
- ensure_packages('apt-transport-https')
+ stdlib::ensure_packages('apt-transport-https')
Package['apt-transport-https'] -> Class['apt::update']
}
} else {
$_location = undef
}
- $includes = merge($::apt::include_defaults, $include)
+ $includes = $apt::include_defaults + $include
if $key and $keyring {
fail('parameters key and keyring are mutualy exclusive')
unless $key['id'] {
fail('key hash must contain at least an id entry')
}
- $_key = merge($::apt::source_key_defaults, $key)
+ $_key = $apt::source_key_defaults + $key
} else {
$_key = { 'id' => assert_type(String[1], $key) }
}
}
$sourcelist = epp('apt/source.list.epp', {
- 'comment' => $comment,
- 'includes' => $includes,
- 'options' => delete_undef_values( {
- 'arch' => $architecture,
- 'trusted' => $allow_unsigned ? { true => 'yes', false => undef },
- 'allow-insecure' => $allow_insecure ? { true => 'yes', false => undef },
- 'signed-by' => $keyring,
- },
- ),
- 'location' => $_location,
- 'release' => $_release,
- 'repos' => $repos,
- })
+ 'comment' => $comment,
+ 'includes' => $includes,
+ 'options' => delete_undef_values({
+ 'arch' => $_architecture,
+ 'trusted' => $allow_unsigned ? { true => 'yes', false => undef },
+ 'allow-insecure' => $allow_insecure ? { true => 'yes', false => undef },
+ 'signed-by' => $keyring,
+ 'check-valid-until' => $check_valid_until? { true => undef, false => 'false' },
+ },
+ ),
+ 'location' => $_location,
+ 'release' => $_release,
+ 'repos' => $repos,
+ }
+ )
apt::setting { "list-${name}":
ensure => $ensure,
if $pin {
if $pin =~ Hash {
- $_pin = merge($pin, { 'ensure' => $ensure, 'before' => $_before })
+ $_pin = $pin + { 'ensure' => $ensure, 'before' => $_before }
} elsif ($pin =~ Numeric or $pin =~ String) {
$url_split = split($location, '[:\/]+')
$host = $url_split[1]