File tree 3 files changed +20
-8
lines changed
3 files changed +20
-8
lines changed Original file line number Diff line number Diff line change @@ -8,16 +8,18 @@ dependencies:
8
8
msft-golang :
9
9
extra_repos :
10
10
- keys :
11
- msft.gpg : # Note: This must currently use a `.gpg` suffix or apt will not be happy
11
+ # Note: The name for the key must use the proper `.gpg` (binary) or `.asc` (ascii)
12
+ # extension, or apt will not be able to import the key properly
13
+ msft.asc :
12
14
http :
13
15
url : https://packages.microsoft.com/keys/microsoft.asc
14
16
digest : sha256:2cfd20a306b2fa5e25522d78f2ef50a1f429d35fd30bd983e2ebffc2b80944fa
15
17
config :
16
18
microsoft-prod.list :
17
19
inline :
18
20
file :
19
- # Note the `signed-by` path is always going to be `/usr/share/keyrings/<source key name>` for Ubuntu, in this case our source key name is `msft.gpg `
20
- contents : deb [arch=amd64,arm64,armhf signed-by=/usr/share/keyrings/msft.gpg ] https://packages.microsoft.com/ubuntu/22.04/prod jammy main
21
+ # Note the `signed-by` path is always going to be `/usr/share/keyrings/<source key name>` for Ubuntu, in this case our source key name is `msft.asc `
22
+ contents : deb [arch=amd64,arm64,armhf signed-by=/usr/share/keyrings/msft.asc ] https://packages.microsoft.com/ubuntu/22.04/prod jammy main
21
23
envs :
22
24
# The repository will only be available when installing build dependencies
23
25
- build
Original file line number Diff line number Diff line change @@ -14,7 +14,7 @@ structure:
14
14
A map of keys required to enable the configured repositories. Each key in
15
15
this map is associated with a specific source and must be imported to allow
16
16
the repositories to function as expected. The content of this is a
17
- [ source] ( sources.md ) just like in the sources section.
17
+ [ source] ( sources.md ) just like in the sources section.
18
18
19
19
- ** ` config ` **
20
20
A collection of repository configurations to add to the environment. The
@@ -43,6 +43,11 @@ structure:
43
43
44
44
These configurations are highly distribution specific.
45
45
46
+ ::: tip
47
+ Be careful to name the key files properly depending on whether they are ascii armored (` *.asc ` ) or binary (` *.gpg ` ).
48
+ Some package managers such as ` apt ` do not handle keys properly if they are not named with the correct extension.
49
+ :::
50
+
46
51
### Examples:
47
52
48
53
import MsftUbuntuRepo from './examples/repos/msft-ubuntu.yml.md'
Original file line number Diff line number Diff line change @@ -97,18 +97,23 @@ by the client, not the actual secret values.
97
97
98
98
# ## HTTP
99
99
100
- HTTP sources fetch a file from an HTTP URL.
101
- HTTP content is not verified by digest today, but it is in the roadmap.
100
+ HTTP sources fetch a file from an HTTP URL. The HTTP source type is considered to be a "file" source.
101
+
102
+ The fetched file can be verified against a digest
103
+ if one is supplied. There is also a `permissions` field that can set the octal permissions
104
+ of the fetched file.
102
105
103
106
` ` ` yaml
104
107
sources:
105
108
someSource1:
106
109
http:
107
- # No Digest verification
108
110
url: https://example.com/someFile.txt
111
+ # optional digest field
112
+ digest: sha256:1234567890abcdef
113
+ # optional permissions field
114
+ permissions: 0644
109
115
` ` `
110
116
111
- The HTTP source type is considered to be a "file" source.
112
117
113
118
# ## Build context
114
119
You can’t perform that action at this time.
0 commit comments