Commit graph

1023 commits

Author SHA1 Message Date
Daniele Sluijters
2188a03fb5 Merge pull request #477 from mhaskel/doc_updates
Doc updates
2015-03-20 19:09:18 +01:00
Morgan Haskel
3730f31688 README updates for 2.x rewrite
All classes, defines, parameters, and examples should be up to date.
2015-03-20 14:07:09 -04:00
Daniele Sluijters
ff51f714ab Merge pull request #472 from mhaskel/acceptance_test_fixes
Acceptance test fixes
2015-03-19 10:16:15 +01:00
Daniele Sluijters
0cbd24a4e5 Merge pull request #473 from mhaskel/freq_cleanup
Remove `update['always'] = true` support
2015-03-19 10:14:56 +01:00
Daniele Sluijters
22c77994ca Merge pull request #474 from mhaskel/containers_ftw
Linux open-source builds are regularly maxed out.
2015-03-19 10:14:35 +01:00
Morgan Haskel
adf9634b71 Linux open-source builds are regularly maxed out.
Container-based are not. Let's switch!
2015-03-18 15:51:37 -07:00
Morgan Haskel
df47ca7ff4 Remove update['always'] = true support
We don't really need both of `update['always'] = true` and
`update['frequency'] = 'always'`.
2015-03-18 13:52:12 -07:00
Morgan Haskel
f5c6775564 Make the acceptance tests work 2015-03-18 12:56:29 -07:00
Morgan Haskel
c7354b90fb Actually make it possible to use apt_key
The provider wasn't updated for a parameter rename.
2015-03-18 12:51:37 -07:00
Bryan Jen
3bb6a838a9 Merge pull request #471 from mhaskel/merge_1.8.x_to_master
Merge 1.8.x to master
2015-03-17 16:59:49 -07:00
Hunter Haugen
47c6f338ed Merge pull request #469 from mhaskel/test_fixes
Update all the unit tests to look for full fingerprints
2015-03-16 17:22:18 -07:00
Morgan Haskel
6bf1ac351f Update all the unit tests to look for full fingerprints
Merged #466 too quickly
2015-03-16 16:40:46 -07:00
Hunter Haugen
d880408143 Merge pull request #468 from mhaskel/1.8.0-prep
1.8.0 prep
2015-03-16 14:30:19 -07:00
Morgan Haskel
396e11af3a Merge pull request #466 from paroga/master
Fix gpg key checking warings after f588f26
2015-03-16 14:16:08 -07:00
Morgan Haskel
58d06816e7 1.8.0 prep 2015-03-16 14:05:58 -07:00
Patrick Gansterer
61a4fb6979 Fix gpg key checking warings after f588f26
Use the full fingerprint for all keys to silence the warning.
2015-03-16 19:34:24 +01:00
Morgan Haskel
be54e18899 Merge pull request #465 from bootc/fixes/gpg2_date_parsing
apt_key: fix parsing invalid dates when using GnuPG 2.x
2015-03-16 10:56:28 -07:00
Chris Boot
a24c41247f apt_key: fix some whitespace issues 2015-03-15 22:47:15 +00:00
Chris Boot
42ab470d00 apt_key: fix parsing invalid dates when using GnuPG 2.x
If one should happen to have redirected /usr/bin/gpg to run GnuPG 2.x
rather than the more usual GnuPG 1.x, the apt_key provider fails with
the following error:

Could not prefetch apt_key provider 'apt_key': invalid date

This is because the output of "--with-colons" defaults to using
"fixed-list-mode" in 2.x but did not do so for 1.x. This new format
gives much more information about keys and also uses timestamps in
seconds from 1970-01-01 (UNIX epoch) rather than dates in the format
YYYY-MM-DD.

This patch adds "--fixed-list-mode" when calling apt-key, and adjusts
the code to parse the timestamps instead. This actually has several
advantages:

- Works the same with GnuPG 1.x and 2.x.
- More accurate expiry time tracking, not just entire days.
- No need to require 'date' any longer.
- Will allow the provider to expose more key information in future.

Tested on:
- Debian Wheezy (Puppet 2.7.23, Ruby 1.8.7p358)
- Debian Jessie (Puppet 3.7.2, Ruby 2.1.5p273)
2015-03-15 22:33:22 +00:00
Colleen Murphy
7c48eb2f0e Merge pull request #464 from mhaskel/README_cleanup
Update docs for unattended_upgrades
2015-03-13 15:33:12 -07:00
Morgan Haskel
399d3cae5a Update docs and test for $legacy_origin 2015-03-13 15:31:38 -07:00
Hunter Haugen
dbd1b0decb Merge pull request #463 from mhaskel/toggle-legacy-origin
Allow changing legacy_origin
2015-03-13 15:29:20 -07:00
Morgan Haskel
81bb96c898 Update docs and test for $legacy_origin 2015-03-13 14:56:53 -07:00
Mikko Pesari
3799e3a23c unattended_upgrades: Allow changing legacy_origin
This enables using Origins-Pattern in Ubuntu.
2015-03-13 14:50:16 -07:00
Morgan Haskel
97f70034c9 Merge pull request #459 from tphoney/modules-1675_check_gpg_version
initial commit for apt_key checking
2015-03-13 14:40:43 -07:00
Morgan Haskel
0f81525367 Merge pull request #456 from johanfleury/cleaning/template/unattended-upgrades
Cleaning 50unattended-upgrades.erb
2015-03-13 14:10:13 -07:00
Colleen Murphy
b67b91b53f Merge pull request #462 from mhaskel/optional_software_properties
Make installation of software-properties optional
2015-03-13 13:51:56 -07:00
Morgan Haskel
0c35704245 Make installation of software-properties optional
This is cherry-picked from the PPA cleanup happening for the 2.0.0 release.

Conflicts:
	manifests/params.pp
	manifests/ppa.pp
2015-03-13 13:38:38 -07:00
tphoney
f588f2651a initial commit for gpg key checking
better attempt at gpg version checking

adding in key length warning

removing version check, adding key check

adding tests

clean up the code

small changes

use commands

documentation updates
2015-03-12 18:25:26 +00:00
Daniele Sluijters
4fa28203b9 Merge pull request #461 from mhaskel/boo_inheritance
Inheritance of apt::params means it can't be private
2015-03-11 09:21:45 +01:00
Morgan Haskel
79db539f33 Inheritance of apt::params means it can't be private
Otherwise, if another module has `class { 'apt': }` in it everything
fails, as `$caller_module_name` will be the other module name.
2015-03-10 17:16:43 -07:00
Johan Fleury
31f732e789 Cleaning 50unattended-upgrades.erb 2015-03-09 00:01:57 +01:00
Morgan Haskel
481846b030 Merge pull request #453 from puppetlabs/daenney/location-required
apt::source: Make location required.
2015-03-06 10:08:02 -08:00
Daniele Sluijters
41a2725683 apt::source: Make location mostly required.
In what universe does it make sense to create a `sources.list.d` entry
for a repository **without** specifying where this repository is?
😖

😞 😩 😧 😱

Only when removing the resource should a location not be required.
2015-03-06 17:40:45 +01:00
TP Honey
b473af1ec5 Merge pull request #454 from LeslieCarr/MODULES-1827-add-cumulus-linux
MODULES-1827 adding Cumulus Linux detection
2015-03-06 12:13:49 +00:00
Leslie Carr
4802a6fc77 MODULES-1827 adding Cumulus Linux detection
the apt module did not correctly detect Cumulus Linux with lsbdistid.
This change adds several lines in params.pp to detect Cumulus Linux and
set $distid and $distcodename
2015-03-05 16:56:03 -08:00
Morgan Haskel
a8250aecfe Merge pull request #452 from puppetlabs/daenney/rename-trusted-source
apt::source: Rename `trusted_source`.
2015-03-05 16:49:23 -08:00
Daniele Sluijters
90bade9561 apt::source: Rename trusted_source.
It is weird that `trusted_source` would default to `false` as that would
imply that we normally don't trust our sources. This is opposite to the
truth, by default we trust them but only if the Releases file can be
verified (meaning it is signed by a GPG key known to apt).

What we were telling apt is that it should trust this source even if the
Releases file and the repository is unsigned. This is better captured
with `allow_unsigned` and better highlights the danger of what you're
doing, installing packages from a source we cannot authenticate.
2015-03-05 20:23:38 +01:00
Morgan Haskel
2a28938299 Merge pull request #451 from puppetlabs/daenney/consolidate-include
apt::source: Merge `include_*` options into hash.
2015-03-05 11:10:20 -08:00
Daniele Sluijters
a220dcf08c apt::source: Merge include_* options into hash.
This makes its behaviour similar to the `update`, `proxy` and `purge`
hashes on the main classes bringing its API more in line with the rest
of the module.
2015-03-05 17:37:51 +01:00
Morgan Haskel
acd280bce9 Merge pull request #450 from puppetlabs/daenney/guard-lsb-facts
apt::params: Complete $xfacts.
2015-03-03 09:38:29 -08:00
Daniele Sluijters
1c707c7d32 apt::params: Complete $xfacts.
`$xfacts` now contains and guards all `lsb*` facts. Looking up any
`lsb*`-related fact should now always be done through `$::apt::xfacts`
to ensure that the values are always set to either the value of the fact
or undef. This avoids all sorts of kerfuffles with strict variables.
2015-03-03 18:07:48 +01:00
Morgan Haskel
001e3a42b9 Merge pull request #449 from puppetlabs/daenney/fix-strict-vars
apt: Fix all strict variable cases.
2015-03-03 08:54:27 -08:00
Daniele Sluijters
c57d2dd5dd apt: Fix all strict variable cases.
A few of these fixes are absolutely horrendous but we have no choice as
we need to stay current- and future-parser compatible for now.

Once we can go Puppet 4 only we can use the `$facts` hash lookup instead
which will return undef/nil for things that aren't set instead of them
not being defined at all.
2015-03-03 17:33:14 +01:00
Morgan Haskel
d05e71238e Merge pull request #448 from puppetlabs/daenney/kill-file-perms
apt::setting: Remove file_perms.
2015-03-02 11:53:53 -08:00
Daniele Sluijters
7a35ea0355 apt::setting: Remove file_perms.
This was a great idea but is pretty pointless. It's also not being used
by anything and not exposed as a switch on the main class so it would
almost never affect any behaviour.
2015-03-02 20:37:01 +01:00
Morgan Haskel
396036892d Merge pull request #447 from puppetlabs/daenney/hulk-smash-2
It's been a long time - how have you been
2015-03-02 10:10:37 -08:00
Daniele Sluijters
0cb48b0c47 apt:🔑 Be explicit about the keyserver.
The behaviour of passing down undef through multiple layers gets fuzzy
so for now be explicit about the keyserver.

Once Puppet 4 is out and this behaviour has been crystallised and tested
we can revisit it.
2015-03-01 14:49:04 +01:00
Daniele Sluijters
061bc49463 apt:🔑 Rename $key to $id to match apt_key. 2015-03-01 14:40:17 +01:00
Daniele Sluijters
ea4f615735 apt::source: Allow passing in a complex key.
Turn `$key` into something that accepts a string or a hash of four keys
representing the different options that can be passed on to `apt::key`.
2015-03-01 14:40:17 +01:00