No description
Find a file
varac d67dfe4beb [feat] Don't run an additional apt-get update
When adding custom keys, an additional `apt-get update` would
be run before the Exec['refresh_apt'], which don't make sense.
2015-12-13 17:56:17 +01:00
files make it possible to opt out of MailOnlyOnError 2015-04-17 15:50:36 -04:00
lib/facter Fix require path for ubuntu_nextcodename.rb 2015-12-07 22:09:42 +01:00
manifests [feat] Don't run an additional apt-get update 2015-12-13 17:56:17 +01:00
spec [rspec] extend test for custom facts 2015-12-07 21:54:49 +01:00
templates Merge branch 'support_missing_ubuntu_releases' into 'master' 2015-12-04 21:27:26 +00:00
.gitignore Add inital puppet rspec test for custom facts 2015-12-07 13:29:41 +01:00
Gemfile Add inital puppet rspec test for custom facts 2015-12-07 13:29:41 +01:00
LICENSE Apply GPL-v3 license 2012-04-21 05:54:28 -04:00
Rakefile Add inital puppet rspec test for custom facts 2015-12-07 13:29:41 +01:00
README [docs] Add test docs how to use custom facter/puppet version 2015-12-07 14:36:48 +01:00

Overview
========

This module manages apt on Debian.

It keeps dpkg's and apt's databases as well as the keyrings for securing
package download current.

backports.debian.org is added.

/etc/apt/sources.list and /etc/apt/preferences are managed. More
recent Debian releases are pinned to very low values by default to
prevent accidental upgrades.

Ubuntu support is lagging behind but not absent either.

! Upgrade Notice !

 * The apt::codename parameter has been removed. In its place, the
   debian_codename fact may be overridden via an environment variable. This
   will affect all other debian_* facts, and achieve the same result.

     FACTER_debian_codename=jessie puppet agent -t

 * If you were using custom 50unattended-upgrades.${::lsbdistcodename} in your
   site_apt, these are no longer supported. You should migrate to passing
   $blacklisted_packages to the apt::unattended_upgrades class.

 * the apt class has been moved to a paramterized class. if you were including
   this class before, after passing some variables, you will need to move to
   instantiating the class with those variables instead. For example, if you 
   had the following in your manifests:

    $apt_debian_url = 'http://localhost:9999/debian/'
    $apt_use_next_release = true
    include apt
 
   you will need to remove the variables, and the include and instead do
   the following:

    class { 'apt': debian_url => 'http://localhost:9999/debian/', use_next_release => true }

   previously, you could manually set $lsbdistcodename which would enable forced
   upgrades, but because this is a top-level facter variable, and newer puppet
   versions do not let you assign variables to other namespaces, this is no
   longer possible. However, there is a way to obtain this functionality, and
   that is to pass the 'codename' parameter to the apt class, which will change
   the sources.list and preferences files to be the codename you set, allowing
   you to trigger upgrades:

   include apt::dist_upgrade
   class { 'apt': codename => 'wheezy', notify => Exec['apt_dist-upgrade'] }

 * the apticron class has been moved to a parameterized class.  if you were
   including this class before, you will need to move to instantiating the
   class instead. For example, if you had the following in your manifests:

    $apticron_email = 'foo@example.com'
    $apticron_notifynew = '1'
    ... any $apticron_* variables
    include apticron

   you will need to remove the variables, and the include and instead do the
   following:

    class { 'apt::apticron': email => 'foo@example.com', notifynew => '1' }

 * the apt::listchanges class has been moved to a paramterized class. if you
   were including this class before, after passing some variables, you will need
   to move to instantiating the class with those variables instead. For example,
   if you had the following in your manifests:

    $apt_listchanges_email = 'foo@example.com'
    ... any $apt_listchanges_* variables
    include apt::listchanges

   you will need to remove the variables, and the include and instead do the
   following:
 
    class { 'apt::listchanges': email => 'foo@example.com' }
   
 * the apt::proxy_client class has been moved to a paramterized class. if you
   were including this class before, after passing some variables, you will need
   to move to instantiating the class with those variables instead. For example,
   if you had the following in your manifests:

    $apt_proxy = 'http://proxy.domain'
    $apt_proxy_port = 666
    include apt::proxy_client

   you will need to remove the variables, and the include and instead do the
   following:

    class { 'apt::proxy_client': proxy => 'http://proxy.domain', port => '666' }

Requirements
============

This module needs:

- the lsb-release package should be installed on the server prior to running
  puppet. otherwise, all of the $::lsb* facts will be empty during runs.
- the common module: https://gitlab.com/shared-puppet-modules-group/common

By default, on normal hosts, this module sets the configuration option
DSelect::Clean to 'auto'. On virtual servers, the value is set by default to
'pre-auto', because virtual servers are usually more space-bound and have better
recovery mechanisms via the host:

From apt.conf(5), 0.7.2:
     "Cache Clean mode; this value may be one of always, prompt, auto,
     pre-auto and never. always and prompt will remove all packages
     from the cache after upgrading, prompt (the default) does so
     conditionally.  auto removes only those packages which are no
     longer downloadable (replaced with a new version for
     instance). pre-auto performs this action before downloading new
     packages."

To change the default setting for DSelect::Clean, you can create a file named
"03clean" or "03clean_vserver" in your site_apt module's files directory. You
can also define this for a specific host by creating a file in a subdirectory of
the site_apt modules' files directory that is named the same as the
host. (example: site_apt/files/some.host.com/03clean, or
site_apt/files/some.host.com/03clean_vserver)

Classes
=======

apt
---

The apt class sets up most of the documented functionality. To use functionality
that is not enabled by default, you must set one of the following parameters.

Example usage:

 class { 'apt': use_next_release => true, debian_url => 'http://localhost:9999/debian/' }

Class parameters:

* use_lts

  If this variable is set to true the CODENAME-lts sources (such as
  squeeze-lts) are added.

  By default this is false for backward compatibility with older
  versions of this module.

* use_volatile

  If this variable is set to true the CODENAME-updates sources (such as
  squeeze-updates) are added.

  By default this is false for backward compatibility with older
  versions of this module.

* include_src

  If this variable is set to true a deb-src source is added for every
  added binary archive source.

  By default this is false for backward compatibility with older
  versions of this module.

* use_next_release

  If this variable is set to true the sources for the next Debian
  release are added. The default pinning configuration pins it to very
  low values.

  By default this is false for backward compatibility with older
  versions of this module.

* debian_url, security_url, backports_url, volatile_url

  These variables allow to override the default APT mirrors respectively
  used for the standard Debian archives, the Debian security archive,
  the Debian official backports and the Debian Volatile archive.

* ubuntu_url

  These variables allows to override the default APT mirror used for all
  standard Ubuntu archives (including updates, security, backports).

* repos

  If this variable is set the default repositories list ("main contrib non-free")
  is overriden.

* disable_update

  Disable "apt-get update" which is normally triggered by apt::upgrade_package 
  and apt::dist_upgrade. 

  Note that nodes can be updated once a day by using 
    APT::Periodic::Update-Package-Lists "1";
  in i.e. /etc/apt/apt.conf.d/80_apt_update_daily.

* custom_preferences

  For historical reasons (Debian Lenny's version of APT did not support the use
  of the preferences.d directory for putting fragments of 'preferences'), this
  module will manage a default generic apt/preferences file with more
  recent releases pinned to very low values so that any package
  installation will not accidentally pull in packages from those suites
  unless you explicitly specify the version number. This file will be
  complemented with all of the preferences_snippet calls (see below).

  If the default preferences template doesn't suit your needs, you can create a
  template located in your site_apt module, and set custom_preferences with the
  content (eg. custom_preferences => template('site_apt/preferences') )

  Setting this variable to false before including this class will force the
  apt/preferences file to be absent:

    class { 'apt': custom_preferences => false }
  
* custom_sources_list

  By default this module will use a basic apt/sources.list template with
  a generic Debian mirror. If you need to set more specific sources,
  e.g. changing the sections included in the source, etc. you can set
  this variable to the content that you desire to use instead.

  For example, setting this variable will pull in the
  templates/site_apt/sources.list file:

  class { 'apt': custom_sources_list => template('site_apt/sources.list') }

* custom_key_dir

  If you have different apt-key files that you want to get added to your
  apt keyring, you can set this variable to a path in your fileserver
  where individual key files can be placed. If this is set and keys
  exist there, this module will 'apt-key add' each key.

  The debian-archive-keyring package is installed and kept current up to the
  latest revision (this includes the backports archive keyring).

apt::apticron
-------------

When you instantiate this class, apticron will be installed, with the following
defaults, which you are free to change:

  $ensure_version = 'installed',
  $config = "apt/${::operatingsystem}/apticron_${::lsbdistcodename}.erb",
  $email = 'root',
  $diff_only = '1',
  $listchanges_profile = 'apticron',
  $system = false,
  $ipaddressnum = false,
  $ipaddresses = false,
  $notifyholds = '0',
  $notifynew = '0',
  $customsubject = ''

Example usage:

 class { 'apt::apticron': email => 'foo@example.com', notifynew => '1' }

apt::cron::download
-------------------

This class sets up cron-apt so that it downloads upgradable packages, does not
actually do any upgrade and emails when the output changes.

cron-apt defaults to run at 4 AM. You may want to set the
$apt_cron_hours variable before you include the class: its value will
be passed as the "hours" parameter of a cronjob. Example:

 # Run cron-apt every three hours
 $apt_cron_hours = '*/3'

Note that the default 4 AM cronjob won't be disabled.

apt::cron::dist_upgrade
-----------------------

This class sets up cron-apt so that it dist-upgrades the system and
emails when upgrades are performed.

See apt::cron::download above if you need to run cron-apt more often
than once a day.

apt::dist_upgrade
-----------------

This class provides the Exec['apt_dist-upgrade'] resource that
dist-upgrade's the system.

This exec is set as refreshonly so including this class does not
trigger any action per-se: other resources may notify it, other
classes may inherit from this one and add to its subscription list
using the plusignment ('+>') operator. A real-world example can be
seen in the apt::dist_upgrade::initiator source.

When this class is included the APT indexes are updated on every
Puppet run due to the author's lack of Puppet wizardry.

apt::dist_upgrade::initiator
----------------------------

This class automatically dist-upgrade's the system when an initiator
file's content changes. The initiator file is copied from the first
available source amongst the following ones, in decreasing priority
order:

- puppet:///modules/site_apt/${::fqdn}/upgrade_initiator
- puppet:///modules/site_apt/upgrade_initiator
- puppet:///modules/apt/upgrade_initiator

This is useful when one does not want to setup a fully automated
upgrade process but still needs a way to manually trigger full
upgrades of any number of systems at scheduled times.

Beware: a dist-upgrade is triggered the first time Puppet runs after
this class has been included. This is actually the single reason why
this class is not enabled by default.

When this class is included the APT indexes are updated on every
Puppet run due to the author's lack of Puppet wizardry.

apt::dselect
------------

This class, when included, installs dselect and switches it to expert mode to
suppress superfluous help screens.

apt::listchanges
----------------

This class, when instantiated, installs apt-listchanges and configures it using
the following parameterized variables, which can be changed:

 version = 'present'
 config = "apt/${::operatingsystem}/listchanges_${::lsbrelease}.erb"
 frontend = 'pager'
 email = 'root'
 confirm = 0
 saveseen = '/var/lib/apt/listchanges.db'
 which = 'both'

 Example usage:
  class { 'apt::listchanges': email => 'foo@example.com' }
 
apt::proxy_client
-----------------

This class adds the right configuration to apt to make it fetch packages via a
proxy. The class parameters apt_proxy and apt_proxy_port need to be set:

You can set the 'proxy' class parameter variable to the URL of the proxy that
will be used.  By default, the proxy will be queried on port 3142, but you can
change the port number by setting the 'port' class parameter.

Example:

 class { 'apt::proxy_client': proxy => 'http://proxy.domain', port => '666' }

apt::reboot_required_notify
---------------------------

This class installs a daily cronjob that checks if a package upgrade
requires the system to be rebooted; if so, cron sends a notification
email to root.

apt::unattended_upgrades
------------------------

If this class is included, it will install the package 'unattended-upgrades'
and configure it to daily upgrade the system.

The class has the following parameters that you can use to change the contents
of the configuration file. The values shown here are the default values:

 * $config_content = undef
 * $config_template = 'apt/50unattended-upgrades.erb'
 * $mailonlyonerror = true
 * $mail_recipient = 'root'
 * $blacklisted_packages = []

Note that using $config_content actually specifies all of the configuration
contents and thus makes the other parameters useless.

example:

    class { 'apt::unattended_upgrades':
      config_template      => 'site_apt/50unattended-upgrades.jessie',
      blacklisted_packages => [
       'libc6', 'libc6-dev', 'libc6-i686', 'mysql-server', 'redmine', 'nodejs',
       'bird'
      ],
    }

Defines
=======

apt::apt_conf
-------------

Creates a file in the apt/apt.conf.d directory to easily add configuration
components. One can use either the 'source' meta-parameter to specify a list of
static files to include from the puppet fileserver or the 'content'
meta-parameter to define content inline or with the help of a template.

Example:

  apt::apt_conf { '80download-only':
    source => 'puppet:///modules/site_apt/80download-only',
  }

apt::preferences_snippet
------------------------

A way to add pinning information to files in /etc/apt/preferences.d/

Example:

  apt::preferences_snippet {
    'irssi-plugin-otr':
      release => 'squeeze-backports',
      priority => 999;
  }

  apt::preferences_snippet {
    'unstable_fallback':
      package => '*',
      release => 'unstable',
      priority => 1;
  }

  apt::preferences_snippet {
    'ttdnsd':
      pin => 'origin deb.torproject.org',
      priority => 999;
  }

The names of the resources will be used as the names of the files in the
preferences.d directory, so you should ensure that resource names follow the
prescribed naming scheme.

From apt_preferences(5):
     Note that the files in the /etc/apt/preferences.d directory are parsed in
     alphanumeric ascending order and need to obey the following naming
     convention: The files have no or "pref" as filename extension and which
     only contain alphanumeric, hyphen (-), underscore (_) and period (.)
     characters - otherwise they will be silently ignored.

apt::preseeded_package
----------------------

This simplifies installation of packages for which you wish to preseed the
answers to debconf. For example, if you wish to provide a preseed file for the
locales package, you would place the locales.seed file in
'site_apt/templates/${::lsbdistcodename}/locales.seeds' and then include the
following in your manifest:

  apt::preseeded_package { locales: }

You can also specify the content of the seed via the content parameter, 
for example:

  apt::preseeded_package { 'apticron':
    content => 'apticron   apticron/notification   string  root@example.com',
  }

apt::sources_list
-----------------

Creates a file in the apt/sources.list.d directory to easily add additional apt
sources. One can use either the 'source' meta-parameter to specify a list of
static files to include from the puppet fileserver or the 'content'
meta-parameter to define content inline or with the help of a template. Ending
the resource name in '.list' is optional: it will be automatically added to the
file name if not present in the resource name.

Example:

  apt::sources_list { 'company_internals':
    source => [ "puppet:///modules/site_apt/${::fqdn}/company_internals.list",
                'puppet:///modules/site_apt/company_internals.list' ],
  }

apt::key
--------

Deploys a secure apt OpenPGP key. This usually accompanies the
sources.list snippets above for third party repositories. For example,
you would do:

  apt::key { 'neurodebian.gpg':
    ensure => present,
    source => 'puppet:///modules/site_apt/neurodebian.gpg',
  }

This deploys the key in the `/etc/apt/trusted.gpg.d` directory, which
is assumed by secure apt to be binary OpenPGP keys and *not*
"ascii-armored" or "plain text" OpenPGP key material. For the latter,
use `apt::key::plain`.

The `.gpg` extension is compulsory for `apt` to pickup the key properly.

apt::key::plain
---------------

Deploys a secure apt OpenPGP key. This usually accompanies the
sources.list snippets above for third party repositories. For example,
you would do:

  apt::key::plain { 'neurodebian.asc':
    source => 'puppet:///modules/site_apt/neurodebian.asc',
  }

This deploys the key in the `${apt_base_dir}/keys` directory (as
opposed to `$custom_key_dir` which deploys it in `keys.d`). The reason
this exists on top of `$custom_key_dir` is to allow a more
decentralised distribution of those keys, without having all modules
throw their keys in the same directory in the manifests.

Note that this model does *not* currently allow keys to be removed!
Use `apt::key` instead for a more practical, revokable approach, but
that needs binary keys.

apt::upgrade_package
--------------------

This simplifies upgrades for DSA security announcements or point-releases. This
will ensure that the named package is upgraded to the version specified, only if
the package is installed, otherwise nothing happens. If the specified version
is 'latest' (the default), then the package is ensured to be upgraded to the
latest package revision when it becomes available.

For example, the following upgrades the perl package to version 5.8.8-7etch1
(if it is installed), it also upgrades the syslog-ng and perl-modules packages
to their latest (also, only if they are installed):

upgrade_package { 'perl':
			version => '5.8.8-7etch1';
		  'syslog-ng':
			version => latest;
		  'perl-modules':
}

Resources
=========

File['apt_config']
------------------

Use this resource to depend on or add to a completed apt configuration

Exec['apt_updated']
-------------------

After this point the APT indexes are up-to-date.

This resource is usually used like this to ensure current packages are
installed by Package resources:

  include apt::update
  Package { require => Exec['apt_updated'] }

Please note that the apt::upgrade_package define automatically uses
this resource so you don't have to manage this yourself if you need to
make sure APT indexes are up-to-date before a package upgrade is
attempted, but don't want "apt-get update" to happen on every Puppet
run.

Tests
=====

To run pupept rspec tests:

    bundle install --path vendor/bundle
    bundle exec rake spec

Using different facter/puppet versions:

    FACTER_GEM_VERSION=1.6.10 PUPPET_GEM_VERSION=2.7.23 bundle install --path vendor/bundle
    bundle exec rake spec

Licensing
=========

This puppet module is licensed under the GPL version 3 or later. Redistribution
and modification is encouraged.

The GPL version 3 license text can be found in the "LICENSE" file accompanying
this puppet module, or at the following URL:

http://www.gnu.org/licenses/gpl-3.0.html