X-Git-Url: https://review.fuel-infra.org/gitweb?a=blobdiff_plain;f=lib%2Fpuppet%2Fprovider%2Fapt_key%2Fapt_key.rb;h=3f95c3cc96af9c68f40234d6f07a9a3072be5173;hb=73d200fedcb60b3fb1daeba3bff49f8a5881b183;hp=bac5b373e937a2a366912e18eceb249e271485e4;hpb=43ab92c4768b638edada41b801091af1a839dfba;p=puppet-modules%2Fpuppetlabs-apt.git diff --git a/lib/puppet/provider/apt_key/apt_key.rb b/lib/puppet/provider/apt_key/apt_key.rb index bac5b37..3f95c3c 100644 --- a/lib/puppet/provider/apt_key/apt_key.rb +++ b/lib/puppet/provider/apt_key/apt_key.rb @@ -26,15 +26,25 @@ Puppet::Type.type(:apt_key).provide(:apt_key) do key_output = apt_key(cli_args) end - pub_line, fpr_line = nil + pub_line, sub_line, fpr_line = nil key_array = key_output.split("\n").collect do |line| if line.start_with?('pub') pub_line = line + # reset fpr_line, to skip any previous subkeys which were collected + fpr_line = nil + sub_line = nil + elsif line.start_with?('sub') + sub_line = line elsif line.start_with?('fpr') fpr_line = line end + if (sub_line and fpr_line) + sub_line, fpr_line = nil + next + end + next unless (pub_line and fpr_line) line_hash = key_line_hash(pub_line, fpr_line) @@ -118,10 +128,24 @@ Puppet::Type.type(:apt_key).provide(:apt_key) do parsedValue = URI::parse(value) if parsedValue.scheme.nil? fail("The file #{value} does not exist") unless File.exists?(value) - value + # Because the tempfile method has to return a live object to prevent GC + # of the underlying file from occuring too early, we also have to return + # a file object here. The caller can still call the #path method on the + # closed file handle to get the path. + f = File.open(value, 'r') + f.close + f else begin - key = parsedValue.read + # Only send basic auth if URL contains userinfo + # Some webservers (e.g. Amazon S3) return code 400 if empty basic auth is sent + if parsedValue.userinfo.nil? + key = parsedValue.read + else + user_pass = parsedValue.userinfo.split(':') + parsedValue.userinfo = '' + key = open(parsedValue, :http_basic_authentication => user_pass).read + end rescue OpenURI::HTTPError, Net::FTPPermError => e fail("#{e.message} for #{resource[:source]}") rescue SocketError @@ -132,6 +156,9 @@ Puppet::Type.type(:apt_key).provide(:apt_key) do end end + # The tempfile method needs to return the tempfile object to the caller, so + # that it doesn't get deleted by the GC immediately after it returns. We + # want the caller to control when it goes out of scope. def tempfile(content) file = Tempfile.new('apt_key') file.write content @@ -141,14 +168,21 @@ Puppet::Type.type(:apt_key).provide(:apt_key) do if File.executable? command(:gpg) extracted_key = execute(["#{command(:gpg)} --with-fingerprint --with-colons #{file.path} | awk -F: '/^fpr:/ { print $10 }'"], :failonfail => false) extracted_key = extracted_key.chomp - if extracted_key != name + + found_match = false + extracted_key.each_line do |line| + if line.chomp == name + found_match = true + end + end + if not found_match fail("The id in your manifest #{resource[:name]} and the fingerprint from content/source do not match. Please check there is not an error in the id or check the content/source is legitimate.") end else warning('/usr/bin/gpg cannot be found for verification of the id.') end end - file.path + file end def exists? @@ -166,9 +200,11 @@ Puppet::Type.type(:apt_key).provide(:apt_key) do end command.push('--recv-keys', resource[:id]) elsif resource[:content] - command.push('add', tempfile(resource[:content])) + key_file = tempfile(resource[:content]) + command.push('add', key_file.path) elsif resource[:source] - command.push('add', source_to_file(resource[:source])) + key_file = source_to_file(resource[:source]) + command.push('add', key_file.path) # In case we really screwed up, better safe than sorry. else fail("an unexpected condition occurred while trying to add the key: #{resource[:id]}")