8cdaf855a1
Adding this defined type allows puppet to add keys to the apt keystore without needing to add a corresponding source; it also adds the "key_source" parameter for wget'ing keys from arbitrary URLs, and allows for keys to be explicity removed. apt::key allows a key to be ensured present multiple times to account for apt::source resources that all reference the same key. However, this means that it is possible for a given key to be defined multiple times with differing source parameters. e.g. apt::key { "Add key: 4BD6EC30 from Apt::Source bunny": key => "4BD6EC30", key_server => "pgp.mit.edu", } apt::key { "Add key: 4BD6EC30 from Apt::Source rabbit": key => "4BD6EC30", key_server => "keyserver.ubuntu.com", } The defined type will accept both definitions and will create multiple exec resources. This was deemed preferable to the alternative (creating only one exec resource) in that one broken definition won't hose an entire catalog. If one definition fails to install the key because of a bad "key_server", the next apt::key that uses the key will get it done.
68 lines
2.2 KiB
Puppet
68 lines
2.2 KiB
Puppet
define apt::key (
|
|
$key = $title,
|
|
$ensure = present,
|
|
$key_content = false,
|
|
$key_source = false,
|
|
$key_server = "keyserver.ubuntu.com"
|
|
) {
|
|
|
|
include apt::params
|
|
|
|
if $key_content {
|
|
$method = "content"
|
|
} elsif $key_source {
|
|
$method = "source"
|
|
} elsif $key_server {
|
|
$method = "server"
|
|
}
|
|
|
|
# This is a hash of the parts of the key definition that we care about.
|
|
# It is used as a unique identifier for this instance of apt::key. It gets
|
|
# hashed to ensure that the resource name doesn't end up being pages and
|
|
# pages (e.g. in the situation where key_content is specified).
|
|
$digest = sha1("${key}/${key_content}/${key_source}/${key_server}/")
|
|
|
|
# Allow multiple ensure => present for the same key to account for many
|
|
# apt::source resources that all reference the same key.
|
|
case $ensure {
|
|
present: {
|
|
if defined(Exec["apt::key $key absent"]) {
|
|
fail ("Cannot ensure Apt::Key[$key] present; $key already ensured absent")
|
|
} elsif !defined(Exec["apt::key $key present"]) {
|
|
# this is a marker to ensure we don't simultaneously define a key
|
|
# ensure => absent AND ensure => present
|
|
exec { "apt::key $key present":
|
|
path => "/",
|
|
onlyif => "/bin/false",
|
|
noop => true;
|
|
}
|
|
}
|
|
if !defined(Exec[$digest]) {
|
|
exec { $digest:
|
|
path => "/bin:/usr/bin",
|
|
unless => "/usr/bin/apt-key list | /bin/grep '${key}'",
|
|
command => $method ? {
|
|
"content" => "echo '${key_content}' | /usr/bin/apt-key add -",
|
|
"source" => "wget -q '${key_source}' -O- | apt-key add -",
|
|
"server" => "apt-key adv --keyserver '${key_server}' --recv-keys '${key}'",
|
|
};
|
|
}
|
|
}
|
|
}
|
|
absent: {
|
|
if defined(Exec["apt::key $key present"]) {
|
|
fail ("Cannot ensure Apt::Key[$key] absent; $key already ensured present")
|
|
}
|
|
exec { "apt::key $key absent":
|
|
path => "/bin:/usr/bin",
|
|
onlyif => "apt-key list | grep '$key'",
|
|
command => "apt-key del '$key'",
|
|
user => "root",
|
|
group => "root",
|
|
}
|
|
}
|
|
default: {
|
|
fail "Invalid 'ensure' value '$ensure' for aptkey"
|
|
}
|
|
}
|
|
}
|