X-Git-Url: https://review.fuel-infra.org/gitweb?a=blobdiff_plain;f=manifests%2Fkey.pp;h=9d3106dbd53a85334a69052366b3918800e2ce69;hb=c0b8640fc6a7c3381877863960e02da3fa1fe640;hp=d4a1d802adfa75089417362dd56fb15bf45e1228;hpb=30298508223bac5946acb2cd0c38e0899c574876;p=puppet-modules%2Fpuppetlabs-apt.git diff --git a/manifests/key.pp b/manifests/key.pp index d4a1d80..9d3106d 100644 --- a/manifests/key.pp +++ b/manifests/key.pp @@ -1,111 +1,107 @@ -# == Define: apt::key +# @summary Manages the GPG keys that Apt uses to authenticate packages. +# +# @note +# The apt::key defined type makes use of the apt_key type, but includes extra functionality to help prevent duplicate keys. +# +# @example Declare Apt key for apt.puppetlabs.com source +# apt::key { 'puppetlabs': +# id => '6F6B15509CF8E59E6E469F327F438280EF8D349F', +# server => 'keyserver.ubuntu.com', +# options => 'http-proxy="http://proxyuser:proxypass@example.org:3128"', +# } +# +# @param id +# Specifies a GPG key to authenticate Apt package signatures. Valid options: a string containing a key ID (8 or 16 hexadecimal +# characters, optionally prefixed with "0x") or a full key fingerprint (40 hexadecimal characters). +# +# @param ensure +# Specifies whether the key should exist. Valid options: 'present', 'absent' or 'refreshed'. Using 'refreshed' will make keys auto +# update when they have expired (assuming a new key exists on the key server). +# +# @param content +# Supplies the entire GPG key. Useful in case the key can't be fetched from a remote location and using a file resource is inconvenient. +# +# @param source +# Specifies the location of an existing GPG key file to copy. Valid options: a string containing a URL (ftp://, http://, or https://) or +# an absolute path. +# +# @param server +# Specifies a keyserver to provide the GPG key. Valid options: a string containing a domain name or a full URL (http://, https://, +# hkp:// or hkps://). The hkps:// protocol is currently only supported on Ubuntu 18.04. +# +# @param weak_ssl +# Specifies whether strict SSL verification on a https URL should be disabled. Valid options: true or false. +# +# @param options +# Passes additional options to `apt-key adv --keyserver-options`. +# define apt::key ( - $id = $title, - $ensure = present, - $content = undef, - $source = undef, - $server = $::apt::keyserver, - $options = undef, - $key = undef, - $key_content = undef, - $key_source = undef, - $key_server = undef, - $key_options = undef, + Pattern[/\A(0x)?[0-9a-fA-F]{8}\Z/, /\A(0x)?[0-9a-fA-F]{16}\Z/, /\A(0x)?[0-9a-fA-F]{40}\Z/] $id = $title, + Enum['present', 'absent', 'refreshed'] $ensure = present, + Optional[String] $content = undef, + Optional[Pattern[/\Ahttps?:\/\//, /\Aftp:\/\//, /\A\/\w+/]] $source = undef, + Pattern[/\A((hkp|hkps|http|https):\/\/)?([a-z\d])([a-z\d-]{0,61}\.)+[a-z\d]+(:\d{2,5})?(\/[a-zA-Z\d\-_.]+)*\/?$/] $server = $apt::keyserver, + Boolean $weak_ssl = false, + Optional[String] $options = $apt::key_options, ) { - - if $key != undef { - deprecation('apt $key', '$key is deprecated and will be removed in the next major release. Please use $id instead.') - $_id = $key - } else { - $_id = $id - } - - if $key_content != undef { - deprecation('apt $key_content', '$key_content is deprecated and will be removed in the next major release. Please use $content instead.') - $_content = $key_content - } else { - $_content = $content - } - - if $key_source != undef { - deprecation('apt $key_source', '$key_source is deprecated and will be removed in the next major release. Please use $source instead.') - $_source = $key_source - } else { - $_source = $source - } - - if $key_server != undef { - deprecation('apt $key_server', '$key_server is deprecated and will be removed in the next major release. Please use $server instead.') - $_server = $key_server - } else { - $_server = $server - } - - if $key_options != undef { - deprecation('apt $key_options', '$key_options is deprecated and will be removed in the next major release. Please use $options instead.') - $_options = $key_options - } else { - $_options = $options - } - - validate_re($_id, ['\A(0x)?[0-9a-fA-F]{8}\Z', '\A(0x)?[0-9a-fA-F]{16}\Z', '\A(0x)?[0-9a-fA-F]{40}\Z']) - validate_re($ensure, ['\A(absent|present)\Z',]) - - if $_content { - validate_string($_content) - } - - if $_source { - validate_re($_source, ['\Ahttps?:\/\/', '\Aftp:\/\/', '\A\/\w+']) - } - - if $_server { - validate_re($_server,['\A((hkp|http|https):\/\/)?([a-z\d])([a-z\d-]{0,61}\.)+[a-z\d]+(:\d{2,5})?$']) - } - - if $_options { - validate_string($_options) - } - case $ensure { - present: { - if defined(Anchor["apt_key ${_id} absent"]){ - fail("key with id ${_id} already ensured as absent") + /^(refreshed|present)$/: { + if defined(Anchor["apt_key ${id} absent"]) { + fail("key with id ${id} already ensured as absent") } - if !defined(Anchor["apt_key ${_id} present"]) { + if !defined(Anchor["apt_key ${id} present"]) { apt_key { $title: - ensure => $ensure, - id => $_id, - source => $_source, - content => $_content, - server => $_server, - options => $_options, + ensure => present, + refresh => $ensure == 'refreshed', + id => $id, + source => $source, + content => $content, + server => $server, + weak_ssl => $weak_ssl, + options => $options, + } -> anchor { "apt_key ${id} present": } + + case $facts['os']['name'] { + 'Debian': { + if versioncmp($facts['os']['release']['major'], '9') >= 0 { + stdlib::ensure_packages(['gnupg']) + Apt::Key<| title == $title |> + } + } + 'Ubuntu': { + if versioncmp($facts['os']['release']['full'], '17.04') >= 0 { + stdlib::ensure_packages(['gnupg']) + Apt::Key<| title == $title |> + } + } + default: { + # Nothing in here + } } - -> anchor { "apt_key ${_id} present": } } } - absent: { - if defined(Anchor["apt_key ${_id} present"]){ - fail("key with id ${_id} already ensured as present") + /^absent$/: { + if defined(Anchor["apt_key ${id} present"]) { + fail("key with id ${id} already ensured as present") } - if !defined(Anchor["apt_key ${_id} absent"]){ + if !defined(Anchor["apt_key ${id} absent"]) { apt_key { $title: - ensure => $ensure, - id => $_id, - source => $_source, - content => $_content, - server => $_server, - options => $_options, - } - -> anchor { "apt_key ${_id} absent": } + ensure => $ensure, + id => $id, + source => $source, + content => $content, + server => $server, + weak_ssl => $weak_ssl, + options => $options, + } -> anchor { "apt_key ${id} absent": } } } default: { - fail "Invalid 'ensure' value '${ensure}' for apt::key" + fail("Invalid \'ensure\' value \'${ensure}\' for apt::key") } } }