summaryrefslogtreecommitdiff
path: root/code/environments/production/modules/apt/lib/facter
diff options
context:
space:
mode:
authorMike Gabriel <mike.gabriel@das-netzwerkteam.de>2018-09-16 22:59:26 +0200
committerMike Gabriel <mike.gabriel@das-netzwerkteam.de>2018-09-16 22:59:26 +0200
commit3f1bbf87bbcc3daa15cd7391b2949b5bf742781b (patch)
treee7c058c84b2d8aebb84db73bb00429cdf284fc13 /code/environments/production/modules/apt/lib/facter
parent852be73c92e8a950dd0c3514cadd67058717b212 (diff)
downloadpuppet.FWSECK-3f1bbf87bbcc3daa15cd7391b2949b5bf742781b.tar.gz
puppet.FWSECK-3f1bbf87bbcc3daa15cd7391b2949b5bf742781b.tar.bz2
puppet.FWSECK-3f1bbf87bbcc3daa15cd7391b2949b5bf742781b.zip
modules/apt: Ship puppetlabs-apt module v4.5.1.
Diffstat (limited to 'code/environments/production/modules/apt/lib/facter')
-rw-r--r--code/environments/production/modules/apt/lib/facter/apt_reboot_required.rb7
-rw-r--r--code/environments/production/modules/apt/lib/facter/apt_update_last_success.rb16
-rw-r--r--code/environments/production/modules/apt/lib/facter/apt_updates.rb115
3 files changed, 138 insertions, 0 deletions
diff --git a/code/environments/production/modules/apt/lib/facter/apt_reboot_required.rb b/code/environments/production/modules/apt/lib/facter/apt_reboot_required.rb
new file mode 100644
index 0000000..1e1650a
--- /dev/null
+++ b/code/environments/production/modules/apt/lib/facter/apt_reboot_required.rb
@@ -0,0 +1,7 @@
+# apt_reboot_required.rb
+Facter.add(:apt_reboot_required) do
+ confine osfamily: 'Debian'
+ setcode do
+ File.file?('/var/run/reboot-required')
+ end
+end
diff --git a/code/environments/production/modules/apt/lib/facter/apt_update_last_success.rb b/code/environments/production/modules/apt/lib/facter/apt_update_last_success.rb
new file mode 100644
index 0000000..9866a2b
--- /dev/null
+++ b/code/environments/production/modules/apt/lib/facter/apt_update_last_success.rb
@@ -0,0 +1,16 @@
+require 'facter'
+
+# This is derived from the file /var/lib/apt/periodic/update-success-stamp
+# This is generated upon a successful apt-get update run natively in ubuntu.
+# the Puppetlabs-apt module deploys this same functionality for other debian-ish OSes
+Facter.add('apt_update_last_success') do
+ confine osfamily: 'Debian'
+ setcode do
+ if File.exist?('/var/lib/apt/periodic/update-success-stamp')
+ # get epoch time
+ File.mtime('/var/lib/apt/periodic/update-success-stamp').to_i
+ else
+ -1
+ end
+ end
+end
diff --git a/code/environments/production/modules/apt/lib/facter/apt_updates.rb b/code/environments/production/modules/apt/lib/facter/apt_updates.rb
new file mode 100644
index 0000000..cf7d12f
--- /dev/null
+++ b/code/environments/production/modules/apt/lib/facter/apt_updates.rb
@@ -0,0 +1,115 @@
+apt_package_updates = nil
+apt_dist_updates = nil
+
+def get_updates(upgrade_option)
+ apt_updates = nil
+ if File.executable?('/usr/bin/apt-get')
+ apt_get_result = Facter::Util::Resolution.exec("/usr/bin/apt-get -s -o Debug::NoLocking=true #{upgrade_option} 2>&1")
+ unless apt_get_result.nil?
+ apt_updates = [[], []]
+ apt_get_result.each_line do |line|
+ next unless line =~ %r{^Inst\s}
+ package = line.gsub(%r{^Inst\s([^\s]+)\s.*}, '\1').strip
+ apt_updates[0].push(package)
+ security_matches = [
+ %r{ Debian-Security:},
+ %r{ Ubuntu[^\s]+-security[, ]},
+ %r{ gNewSense[^\s]+-security[, ]},
+ ]
+ re = Regexp.union(security_matches)
+ if line.match(re)
+ apt_updates[1].push(package)
+ end
+ end
+ end
+ end
+
+ setcode do
+ if !apt_updates.nil? && apt_updates.length == 2
+ apt_updates != [[], []]
+ end
+ end
+ apt_updates
+end
+
+Facter.add('apt_has_updates') do
+ confine osfamily: 'Debian'
+ apt_package_updates = get_updates('upgrade')
+end
+
+Facter.add('apt_has_dist_updates') do
+ confine osfamily: 'Debian'
+ apt_dist_updates = get_updates('dist-upgrade')
+end
+
+Facter.add('apt_package_updates') do
+ confine apt_has_updates: true
+ setcode do
+ if Facter.version < '2.0.0'
+ apt_package_updates[0].join(',')
+ else
+ apt_package_updates[0]
+ end
+ end
+end
+
+Facter.add('apt_package_dist_updates') do
+ confine apt_has_dist_updates: true
+ setcode do
+ if Facter.version < '2.0.0'
+ apt_dist_updates[0].join(',')
+ else
+ apt_dist_updates[0]
+ end
+ end
+end
+
+Facter.add('apt_package_security_updates') do
+ confine apt_has_updates: true
+ setcode do
+ if Facter.version < '2.0.0'
+ apt_package_updates[1].join(',')
+ else
+ apt_package_updates[1]
+ end
+ end
+end
+
+Facter.add('apt_package_security_dist_updates') do
+ confine apt_has_dist_updates: true
+ setcode do
+ if Facter.version < '2.0.0'
+ apt_dist_updates[1].join(',')
+ else
+ apt_dist_updates[1]
+ end
+ end
+end
+
+Facter.add('apt_updates') do
+ confine apt_has_updates: true
+ setcode do
+ Integer(apt_package_updates[0].length)
+ end
+end
+
+Facter.add('apt_dist_updates') do
+ confine apt_has_dist_updates: true
+ setcode do
+ Integer(apt_dist_updates[0].length)
+ end
+end
+
+Facter.add('apt_security_updates') do
+ confine apt_has_updates: true
+ setcode do
+ Integer(apt_package_updates[1].length)
+ end
+end
+
+Facter.add('apt_security_dist_updates') do
+ confine apt_has_dist_updates: true
+ setcode do
+ Integer(apt_dist_updates[1].length)
+ end
+end