From e4420b08d2fe1d19fb4d1468a376d3a0e2e6ad9a Mon Sep 17 00:00:00 2001 From: Tim Abbott Date: Fri, 19 Aug 2016 08:27:17 -0700 Subject: [PATCH] zulip_ops: Disable unattended upgrades of security packages. Since Zulip does not handle e.g. postgres server restarts gracefully, it's best for a system administrator to manually trigger security updates. --- .../apt/apt.conf.d/50unattended-upgrades | 59 +++++++++++++++++++ puppet/zulip_ops/manifests/base.pp | 6 ++ 2 files changed, 65 insertions(+) create mode 100644 puppet/zulip_ops/files/apt/apt.conf.d/50unattended-upgrades diff --git a/puppet/zulip_ops/files/apt/apt.conf.d/50unattended-upgrades b/puppet/zulip_ops/files/apt/apt.conf.d/50unattended-upgrades new file mode 100644 index 0000000000..e34dc46421 --- /dev/null +++ b/puppet/zulip_ops/files/apt/apt.conf.d/50unattended-upgrades @@ -0,0 +1,59 @@ +// Automatically upgrade packages from these (origin:archive) pairs +Unattended-Upgrade::Allowed-Origins { +// "${distro_id}:${distro_codename}-security"; +// "${distro_id}:${distro_codename}-updates"; +// "${distro_id}:${distro_codename}-proposed"; +// "${distro_id}:${distro_codename}-backports"; +}; + +// List of packages to not update (regexp are supported) +Unattended-Upgrade::Package-Blacklist { +// "vim"; +// "libc6"; +// "libc6-dev"; +// "libc6-i686"; +}; + +// This option allows you to control if on a unclean dpkg exit +// unattended-upgrades will automatically run +// dpkg --force-confold --configure -a +// The default is true, to ensure updates keep getting installed +//Unattended-Upgrade::AutoFixInterruptedDpkg "false"; + +// Split the upgrade into the smallest possible chunks so that +// they can be interrupted with SIGUSR1. This makes the upgrade +// a bit slower but it has the benefit that shutdown while a upgrade +// is running is possible (with a small delay) +//Unattended-Upgrade::MinimalSteps "true"; + +// Install all unattended-upgrades when the machine is shuting down +// instead of doing it in the background while the machine is running +// This will (obviously) make shutdown slower +//Unattended-Upgrade::InstallOnShutdown "true"; + +// Send email to this address for problems or packages upgrades +// If empty or unset then no email is sent, make sure that you +// have a working mail setup on your system. A package that provides +// 'mailx' must be installed. E.g. "user@example.com" +//Unattended-Upgrade::Mail "root"; + +// Set this value to "true" to get emails only on errors. Default +// is to always send a mail if Unattended-Upgrade::Mail is set +//Unattended-Upgrade::MailOnlyOnError "true"; + +// Do automatic removal of new unused dependencies after the upgrade +// (equivalent to apt-get autoremove) +//Unattended-Upgrade::Remove-Unused-Dependencies "false"; + +// Automatically reboot *WITHOUT CONFIRMATION* +// if the file /var/run/reboot-required is found after the upgrade +//Unattended-Upgrade::Automatic-Reboot "false"; + +// If automatic reboot is enabled and needed, reboot at the specific +// time instead of immediately +// Default: "now" +//Unattended-Upgrade::Automatic-Reboot-Time "02:00"; + +// Use apt bandwidth limit feature, this example limits the download +// speed to 70kb/sec +//Acquire::http::Dl-Limit "70"; diff --git a/puppet/zulip_ops/manifests/base.pp b/puppet/zulip_ops/manifests/base.pp index 0da4adf896..b8ddc9696f 100644 --- a/puppet/zulip_ops/manifests/base.pp +++ b/puppet/zulip_ops/manifests/base.pp @@ -48,6 +48,12 @@ class zulip_ops::base { source => 'puppet:///modules/zulip_ops/apt/apt.conf.d/02periodic', } + file { '/etc/apt/apt.conf.d/50unattended-upgrades': + ensure => file, + mode => 644, + source => 'puppet:///modules/zulip_ops/apt/apt.conf.d/50unattended-upgrades', + } + file { '/home/zulip/.ssh/authorized_keys': ensure => file, require => File['/home/zulip/.ssh'],