Skip to content

Conversation

Copy link
Contributor

Copilot AI commented Aug 13, 2025

Updates the APT package signing key storage location from /etc/apt/trusted.gpg.d/ to /etc/apt/keyrings/ across all InfluxData installation documentation to follow modern security best practices.

Background

The current documentation instructs users to store GPG keys in /etc/apt/trusted.gpg.d/, which creates globally trusted keys for all repositories. This approach is less secure because these keys are trusted system-wide and cannot be restricted to specific repositories.

The modern recommended approach uses /etc/apt/keyrings/ with the signed-by option in sources lists, providing better security isolation by allowing per-repository key assignment rather than global trust.

Changes Made

Updated installation instructions in 5 documentation files:

  • Telegraf v1 installation (content/telegraf/v1/install.md) - Both Ubuntu 20.04+ and legacy versions
  • InfluxDB v1 installation (content/influxdb/v1/introduction/install.md) - Both installation methods
  • InfluxDB v2 installation (content/influxdb/v2/install/_index.md) - Ubuntu/Debian section
  • InfluxDB 3 Clustered CLI (content/influxdb3/clustered/reference/cli/influxctl/_index.md)
  • InfluxDB 3 Cloud Dedicated CLI (content/influxdb3/cloud-dedicated/reference/cli/influxctl/_index.md)

Technical Details

The changes replace:

sudo tee /etc/apt/trusted.gpg.d/influxdata-archive.gpg
echo 'deb [signed-by=/etc/apt/trusted.gpg.d/influxdata-archive.gpg] ...'

With:

sudo tee /etc/apt/keyrings/influxdata-archive.gpg  
echo 'deb [signed-by=/etc/apt/keyrings/influxdata-archive.gpg] ...'

This maintains full backward compatibility while improving security isolation. The /etc/apt/keyrings/ directory is supported in apt 2.4+ (Ubuntu 22.04+, Debian 12+), and the existing signed-by configuration ensures proper per-repository key assignment.

Fixes #6297.

Warning

Firewall rules blocked me from connecting to one or more addresses

I tried to connect to the following addresses, but was blocked by firewall rules:

  • download.cypress.io

If you need me to access, download, or install something from one of these locations, you can either:


✨ Let Copilot coding agent set things up for you — coding agent works faster and does higher quality work when set up for your repo.

…pt/keyrings

Co-authored-by: jstirnaman <212227+jstirnaman@users.noreply.github.com>
Copilot AI changed the title [WIP] Debian/Ubuntu package signing key location - update to /etc/apt/keyrings? Update Debian/Ubuntu package signing key location to /etc/apt/keyrings for improved security Aug 13, 2025
Copilot AI requested a review from jstirnaman August 13, 2025 14:22
@jstirnaman jstirnaman marked this pull request as ready for review August 19, 2025 13:29
@jstirnaman jstirnaman self-requested a review August 19, 2025 13:30
Add exclusion patterns for StackExchange sites to both production
and default link-checker configurations:
- *.stackexchange.com
- stackoverflow.com
- *.stackoverflow.com

These sites often block automated requests/bots, causing false
positive link validation failures in CI environments.
Add exclusion pattern for hub.docker.com to both production
and default link-checker configurations.

Docker Hub often implements rate limiting and bot detection that
causes false positive link validation failures in CI environments.
@jstirnaman jstirnaman merged commit 64082e9 into master Aug 19, 2025
2 checks passed
@jstirnaman jstirnaman deleted the copilot/fix-6297 branch August 19, 2025 16:16
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Debian/Ubuntu package signing key location - update to /etc/apt/keyrings?

3 participants