Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

The following packages cannot be authenticated! rabbitmq-server #300

Closed
kramvan1 opened this issue Sep 1, 2015 · 13 comments
Closed

The following packages cannot be authenticated! rabbitmq-server #300

kramvan1 opened this issue Sep 1, 2015 · 13 comments
Labels

Comments

@kramvan1
Copy link
Contributor

kramvan1 commented Sep 1, 2015

ubuntu 14.04 Did the apt-get update and upgrade, no difference.

vagrant@controller:$ sudo apt-get -q -y install rabbitmq-server=3.4.3-2cloud0
Reading package lists...
Building dependency tree...
Reading state information...
The following NEW packages will be installed:
rabbitmq-server
0 upgraded, 1 newly installed, 0 to remove and 2 not upgraded.
Need to get 0 B/4,040 kB of archives.
After this operation, 4,955 kB of additional disk space will be used.
WARNING: The following packages cannot be authenticated!
rabbitmq-server
E: There are problems and -y was used without --force-yes

Do we need the default recipe where the rabbitmq-server gets installed to add the following to cover these cases?
options '--force-yes'

my key list contains (apt-key list) the rabbitmq and cloud keys:
sudo apt-key list

/etc/apt/trusted.gpg

pub 1024D/437D05B5 2004-09-12
uid Ubuntu Archive Automatic Signing Key ftpmaster@ubuntu.com
sub 2048g/79164387 2004-09-12

pub 1024D/FBB75451 2004-12-30
uid Ubuntu CD Image Automatic Signing Key cdimage@ubuntu.com

pub 4096R/C0B21F32 2012-05-11
uid Ubuntu Archive Automatic Signing Key (2012) ftpmaster@ubuntu.com

pub 4096R/EFE21092 2012-05-11
uid Ubuntu CD Image Automatic Signing Key (2012) cdimage@ubuntu.com

pub 4096R/EC4926EA 2012-08-14
uid Canonical Cloud Archive Signing Key ftpmaster@canonical.com
sub 4096R/ECD76E3E 2012-08-14

pub 1024D/056E8E56 2007-07-06
uid RabbitMQ Release Signing Key info@rabbitmq.com
sub 2048g/81181462 2007-07-06

Or is there a repo key missing somewhere in this path?

@ealwais
Copy link

ealwais commented Sep 2, 2015

create a file in /etc/apt/apt.conf.d/90forceyes with the following content:

APT::Get::Assume-Yes "true";
APT::Get::force-yes "true";

Then run the chef-client on the machine to resolve the issue.

@jjasghar
Copy link
Contributor

jjasghar commented Sep 2, 2015

We'll need to figure out a way to add this too. This would be a good time to update the version constraint on for the newer release. #266

@kramvan1
Copy link
Contributor Author

kramvan1 commented Sep 2, 2015

Looks like the apt cookbook at least has that dir created here: https://github.com/opscode-cookbooks/apt/blob/master/recipes/default.rb#L53
but I don't see a config in there for these Yes options, would look similar to: https://github.com/opscode-cookbooks/apt/blob/master/templates/default/10recommends.erb

Seems like a simple addition for the apt cookbook, then we could easily take advantage of that as a default attribute in the environment.

Something like:

templates/default/90forceyes.erb:

APT::Get::Assume-Yes "<%= node['apt']['confd']['assume_yes'] ? 1 : 0 %>";
APT::Get::force-yes "<%= node['apt']['confd']['force-yes'] ? 1 : 0 %>";

but I still really thing this is an issue with the repos themselves as force-yes is not a normal option to use.

@jjasghar
Copy link
Contributor

jjasghar commented Sep 2, 2015

So it shall be. Ill put it on my TODO to make the PR, unless someone beats me to it.

@jjasghar
Copy link
Contributor

jjasghar commented Sep 2, 2015

Hmm, yeah the more i chew on this the more i don't like the idea that we have to add something to the apt cookbook to get this to work. Maybe we should be tracking the Ubuntu packages. @michaelklishin are you watching the Ubuntu repos and may know what's going on here?

@jjasghar jjasghar added the bug label Sep 2, 2015
@jjasghar
Copy link
Contributor

jjasghar commented Sep 2, 2015

It looks like: https://review.openstack.org/#/c/211322/ is effected by this also.

@tas50
Copy link
Contributor

tas50 commented Sep 3, 2015

I'm going to look into this today and see if we have any options other than adding a new attribute to the package provider in the client.

@tas50
Copy link
Contributor

tas50 commented Sep 3, 2015

It looks like the correct apt config is APT::Get::AllowUnauthenticated "true";

We want to avoid assume yes and force yes since those will allow apt installs to continue when your apt sources are in a 1/2 complete state which can render the system unusable. Ideally we'd allow untrusted package installs in the apt provider, but for now you might want to add the option to the cookbook to template a 99-enabled-unstrusted file in apt's .d dir. It's a bit of a hack, but it will allow installing the package for now.

@jjasghar
Copy link
Contributor

jjasghar commented Sep 3, 2015

Yeah that's what it's starting to feel like. (the hack that is)

@michaelklishin any luck on figuring out what happened to your pkg becoming "untrusted?"

@michaelklishin
Copy link
Member

@jjasghar we are not aware of any changes. Our package was last updated in July.

@jjasghar
Copy link
Contributor

jjasghar commented Sep 3, 2015

Hmm, i've seen this repo'd in a couple places now. This could be problematic.

@jjasghar
Copy link
Contributor

jjasghar commented Sep 4, 2015

#301 Has been created, can i get some +1s and 🚀 s on it?

@michaelklishin
Copy link
Member

#301 was merged.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

5 participants