beaker-puppet 1.22.2 → 1.25.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/.github/workflows/test.yml +2 -0
- data/CHANGELOG.md +39 -0
- data/beaker-puppet.gemspec +3 -1
- data/lib/beaker-puppet/install_utils/foss_utils.rb +21 -9
- data/lib/beaker-puppet/install_utils/module_utils.rb +2 -2
- data/lib/beaker-puppet/version.rb +1 -1
- data/setup/common/003_solaris_cert_fix.rb +56 -0
- data/spec/beaker-puppet/helpers/puppet_helpers_spec.rb +19 -19
- data/spec/beaker-puppet/install_utils/foss_utils_spec.rb +2 -2
- data/spec/beaker-puppet/install_utils/windows_utils_spec.rb +2 -2
- data/tasks/ci.rake +1 -0
- metadata +5 -4
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 3573a547b543131e5debd257af0b1d2ea6b9ab279ee26768ee45834810afffc6
|
4
|
+
data.tar.gz: d2e9b04f5b5b8b3a00e8601f25b6fc29a110446e50f1ad64bbdc953956715733
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 786900d6635e7d08e8de92fba1c3b27257860b74778e5aa2ec531a401a5f323b9741649dbd7ea092188e3333623ecd876279e08a86b9d115b0681d5430e28645
|
7
|
+
data.tar.gz: c6f6013263022331eb1f6bb87f9d3f6a0bc7462804354e3794725f226477e405a114e2bd5b9fea96c19821e66c7f3c5a0a7093b0a981985c2dd8906a60837805
|
data/.github/workflows/test.yml
CHANGED
data/CHANGELOG.md
CHANGED
@@ -2,6 +2,45 @@
|
|
2
2
|
|
3
3
|
All notable changes to this project will be documented in this file.
|
4
4
|
|
5
|
+
## [1.25.0](https://github.com/voxpupuli/beaker-puppet/tree/1.25.0) (2022-03-16)
|
6
|
+
|
7
|
+
[Full Changelog](https://github.com/voxpupuli/beaker-puppet/compare/1.24.0...1.25.0)
|
8
|
+
|
9
|
+
**Implemented enhancements:**
|
10
|
+
|
11
|
+
- \(PA-4331\) Add a step for updating Solaris CA Keystore [\#182](https://github.com/voxpupuli/beaker-puppet/pull/182) ([cthorn42](https://github.com/cthorn42))
|
12
|
+
|
13
|
+
**Fixed bugs:**
|
14
|
+
|
15
|
+
- \(PA-4331\) Fix the logic to only run on older solaris versions [\#183](https://github.com/voxpupuli/beaker-puppet/pull/183) ([cthorn42](https://github.com/cthorn42))
|
16
|
+
|
17
|
+
## [1.24.0](https://github.com/voxpupuli/beaker-puppet/tree/1.24.0) (2022-03-04)
|
18
|
+
|
19
|
+
[Full Changelog](https://github.com/voxpupuli/beaker-puppet/compare/1.23.0...1.24.0)
|
20
|
+
|
21
|
+
**Implemented enhancements:**
|
22
|
+
|
23
|
+
- module setup on the target: Ignore files at the root level only [\#177](https://github.com/voxpupuli/beaker-puppet/pull/177) ([smortex](https://github.com/smortex))
|
24
|
+
|
25
|
+
**Merged pull requests:**
|
26
|
+
|
27
|
+
- gemspec: fix typo in Apache-2.0 license [\#180](https://github.com/voxpupuli/beaker-puppet/pull/180) ([bastelfreak](https://github.com/bastelfreak))
|
28
|
+
- Add Ruby 3.1 to CI [\#179](https://github.com/voxpupuli/beaker-puppet/pull/179) ([bastelfreak](https://github.com/bastelfreak))
|
29
|
+
- Depend on Ruby 2.4 or newer in gemspec [\#178](https://github.com/voxpupuli/beaker-puppet/pull/178) ([bastelfreak](https://github.com/bastelfreak))
|
30
|
+
|
31
|
+
## [1.23.0](https://github.com/voxpupuli/beaker-puppet/tree/1.23.0) (2022-02-23)
|
32
|
+
|
33
|
+
[Full Changelog](https://github.com/voxpupuli/beaker-puppet/compare/1.22.2...1.23.0)
|
34
|
+
|
35
|
+
**Implemented enhancements:**
|
36
|
+
|
37
|
+
- \(maint\) Follow redirects when curling MSI [\#176](https://github.com/voxpupuli/beaker-puppet/pull/176) ([joshcooper](https://github.com/joshcooper))
|
38
|
+
- Update agent download from URL logic to handle redirects [\#173](https://github.com/voxpupuli/beaker-puppet/pull/173) ([cthorn42](https://github.com/cthorn42))
|
39
|
+
|
40
|
+
**Merged pull requests:**
|
41
|
+
|
42
|
+
- Update specs to fix ruby 3 spec failures [\#174](https://github.com/voxpupuli/beaker-puppet/pull/174) ([cthorn42](https://github.com/cthorn42))
|
43
|
+
|
5
44
|
## [1.22.2](https://github.com/voxpupuli/beaker-puppet/tree/1.22.2) (2021-12-31)
|
6
45
|
|
7
46
|
[Full Changelog](https://github.com/voxpupuli/beaker-puppet/compare/1.22.1...1.22.2)
|
data/beaker-puppet.gemspec
CHANGED
@@ -10,7 +10,9 @@ Gem::Specification.new do |s|
|
|
10
10
|
s.homepage = "https://github.com/voxpupuli/beaker-puppet"
|
11
11
|
s.summary = %q{Beaker's Puppet DSL Extension Helpers!}
|
12
12
|
s.description = %q{For use for the Beaker acceptance testing tool}
|
13
|
-
s.license = '
|
13
|
+
s.license = 'Apache-2.0'
|
14
|
+
|
15
|
+
s.required_ruby_version = '>= 2.4'
|
14
16
|
|
15
17
|
s.files = `git ls-files`.split("\n")
|
16
18
|
s.test_files = `git ls-files -- {test,spec,features}/*`.split("\n")
|
@@ -75,7 +75,7 @@ module Beaker
|
|
75
75
|
# redhat-8-arm64 is provided from amazon
|
76
76
|
return true if host.host_hash[:template] == 'redhat-8-arm64' && host.hostname =~ /.puppet.net$/
|
77
77
|
|
78
|
-
result = on(host, %(curl -fI "#{url}"), accept_all_exit_codes: true)
|
78
|
+
result = on(host, %(curl --location -fI "#{url}"), accept_all_exit_codes: true)
|
79
79
|
return result.exit_code.zero?
|
80
80
|
end
|
81
81
|
|
@@ -681,7 +681,7 @@ module Beaker
|
|
681
681
|
if host.is_cygwin?
|
682
682
|
# NOTE: it is critical that -o be before -O on Windows
|
683
683
|
proxy = opts[:package_proxy] ? "-x #{opts[:package_proxy]} " : ''
|
684
|
-
on host, "curl #{proxy}
|
684
|
+
on host, "curl #{proxy}--location --output \"#{msi_download_path}\" --remote-name #{link}"
|
685
685
|
|
686
686
|
#Because the msi installer doesn't add Puppet to the environment path
|
687
687
|
#Add both potential paths for simplicity
|
@@ -761,9 +761,9 @@ module Beaker
|
|
761
761
|
raise "You need to specify versions for OSX host\n eg. install_puppet({:version => '3.6.2',:facter_version => '2.1.0',:hiera_version => '1.3.4',})"
|
762
762
|
end
|
763
763
|
|
764
|
-
on host, "curl -
|
765
|
-
on host, "curl -
|
766
|
-
on host, "curl -
|
764
|
+
on host, "curl --location --remote-name #{opts[:mac_download_url]}/puppet-#{puppet_ver}.dmg"
|
765
|
+
on host, "curl --location --remote-name #{opts[:mac_download_url]}/facter-#{facter_ver}.dmg"
|
766
|
+
on host, "curl --location --remote-name #{opts[:mac_download_url]}/hiera-#{hiera_ver}.dmg"
|
767
767
|
|
768
768
|
host.install_package("puppet-#{puppet_ver}")
|
769
769
|
host.install_package("facter-#{facter_ver}")
|
@@ -815,7 +815,7 @@ module Beaker
|
|
815
815
|
|
816
816
|
pkg_name = "puppet-agent-#{agent_version}*"
|
817
817
|
dmg_name = "puppet-agent-#{agent_version}-1.osx#{version}.dmg"
|
818
|
-
on host, "curl -
|
818
|
+
on host, "curl --location --remote-name #{download_url}/#{dmg_name}"
|
819
819
|
|
820
820
|
host.install_package(pkg_name)
|
821
821
|
|
@@ -826,7 +826,7 @@ module Beaker
|
|
826
826
|
# Returns the latest puppet-agent version number from a given url.
|
827
827
|
#
|
828
828
|
# @param [String] url URL containing list of puppet-agent packages.
|
829
|
-
# Example: https://downloads.puppetlabs.com/mac/10.
|
829
|
+
# Example: https://downloads.puppetlabs.com/mac/puppet7/10.15/x86_64/
|
830
830
|
#
|
831
831
|
# @return [String] version puppet-agent version number (e.g. 1.4.1)
|
832
832
|
# Empty string if none found.
|
@@ -834,8 +834,20 @@ module Beaker
|
|
834
834
|
def get_latest_puppet_agent_build_from_url(url)
|
835
835
|
require 'oga'
|
836
836
|
require 'net/http'
|
837
|
-
|
838
|
-
|
837
|
+
|
838
|
+
full_url = "#{url}/index_by_lastModified_reverse.html"
|
839
|
+
response = Net::HTTP.get_response(URI(full_url))
|
840
|
+
counter = 0
|
841
|
+
|
842
|
+
# Redirect following
|
843
|
+
while response.is_a?(Net::HTTPRedirection) && counter < 15
|
844
|
+
response = Net::HTTP.get_response(URI.parse(Net::HTTP.get_response(URI(full_url))['location']))
|
845
|
+
counter = counter + 1
|
846
|
+
end
|
847
|
+
|
848
|
+
raise "The URL for puppet-agent download, #{response.uri}, returned #{response.message} with #{response.code}" unless response.is_a?(Net::HTTPSuccess)
|
849
|
+
|
850
|
+
document = Oga.parse_html(response.body)
|
839
851
|
agents = document.xpath('//a[contains(@href, "puppet-agent")]')
|
840
852
|
|
841
853
|
latest_match = agents.shift.attributes[0].value
|
@@ -15,8 +15,8 @@ module Beaker
|
|
15
15
|
|
16
16
|
# The directories in the module directory that will not be scp-ed to the test system when using
|
17
17
|
# `copy_module_to`
|
18
|
-
PUPPET_MODULE_INSTALL_IGNORE = ['
|
19
|
-
'bundle', 'spec', 'tests', 'log', '
|
18
|
+
PUPPET_MODULE_INSTALL_IGNORE = ['/.bundle', '/.git', '/.idea', '/.vagrant', '/.vendor', '/vendor', '/acceptance',
|
19
|
+
'/bundle', '/spec', '/tests', '/log', '/.svn', '/junit', '/pkg', '/example', '/tmp']
|
20
20
|
|
21
21
|
# Install the desired module on all hosts using either the PMT or a
|
22
22
|
# staging forge
|
@@ -0,0 +1,56 @@
|
|
1
|
+
test_name 'Add digicert to solaris keystore'
|
2
|
+
|
3
|
+
# Only need to run this on soliars 11, 11.2, and sparc
|
4
|
+
skip_test 'No solaris 11 version that needed keystore updating' if ! hosts.any? { |host| host.platform=~ /solaris-11(\.2)?-(i386|sparc)/}
|
5
|
+
|
6
|
+
DigiCert = <<-EOM
|
7
|
+
-----BEGIN CERTIFICATE-----
|
8
|
+
MIIFkDCCA3igAwIBAgIQBZsbV56OITLiOQe9p3d1XDANBgkqhkiG9w0BAQwFADBi
|
9
|
+
MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3
|
10
|
+
d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3Qg
|
11
|
+
RzQwHhcNMTMwODAxMTIwMDAwWhcNMzgwMTE1MTIwMDAwWjBiMQswCQYDVQQGEwJV
|
12
|
+
UzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQu
|
13
|
+
Y29tMSEwHwYDVQQDExhEaWdpQ2VydCBUcnVzdGVkIFJvb3QgRzQwggIiMA0GCSqG
|
14
|
+
SIb3DQEBAQUAA4ICDwAwggIKAoICAQC/5pBzaN675F1KPDAiMGkz7MKnJS7JIT3y
|
15
|
+
ithZwuEppz1Yq3aaza57G4QNxDAf8xukOBbrVsaXbR2rsnnyyhHS5F/WBTxSD1If
|
16
|
+
xp4VpX6+n6lXFllVcq9ok3DCsrp1mWpzMpTREEQQLt+C8weE5nQ7bXHiLQwb7iDV
|
17
|
+
ySAdYyktzuxeTsiT+CFhmzTrBcZe7FsavOvJz82sNEBfsXpm7nfISKhmV1efVFiO
|
18
|
+
DCu3T6cw2Vbuyntd463JT17lNecxy9qTXtyOj4DatpGYQJB5w3jHtrHEtWoYOAMQ
|
19
|
+
jdjUN6QuBX2I9YI+EJFwq1WCQTLX2wRzKm6RAXwhTNS8rhsDdV14Ztk6MUSaM0C/
|
20
|
+
CNdaSaTC5qmgZ92kJ7yhTzm1EVgX9yRcRo9k98FpiHaYdj1ZXUJ2h4mXaXpI8OCi
|
21
|
+
EhtmmnTK3kse5w5jrubU75KSOp493ADkRSWJtppEGSt+wJS00mFt6zPZxd9LBADM
|
22
|
+
fRyVw4/3IbKyEbe7f/LVjHAsQWCqsWMYRJUadmJ+9oCw++hkpjPRiQfhvbfmQ6QY
|
23
|
+
uKZ3AeEPlAwhHbJUKSWJbOUOUlFHdL4mrLZBdd56rF+NP8m800ERElvlEFDrMcXK
|
24
|
+
chYiCd98THU/Y+whX8QgUWtvsauGi0/C1kVfnSD8oR7FwI+isX4KJpn15GkvmB0t
|
25
|
+
9dmpsh3lGwIDAQABo0IwQDAPBgNVHRMBAf8EBTADAQH/MA4GA1UdDwEB/wQEAwIB
|
26
|
+
hjAdBgNVHQ4EFgQU7NfjgtJxXWRM3y5nP+e6mK4cD08wDQYJKoZIhvcNAQEMBQAD
|
27
|
+
ggIBALth2X2pbL4XxJEbw6GiAI3jZGgPVs93rnD5/ZpKmbnJeFwMDF/k5hQpVgs2
|
28
|
+
SV1EY+CtnJYYZhsjDT156W1r1lT40jzBQ0CuHVD1UvyQO7uYmWlrx8GnqGikJ9yd
|
29
|
+
+SeuMIW59mdNOj6PWTkiU0TryF0Dyu1Qen1iIQqAyHNm0aAFYF/opbSnr6j3bTWc
|
30
|
+
fFqK1qI4mfN4i/RN0iAL3gTujJtHgXINwBQy7zBZLq7gcfJW5GqXb5JQbZaNaHqa
|
31
|
+
sjYUegbyJLkJEVDXCLG4iXqEI2FCKeWjzaIgQdfRnGTZ6iahixTXTBmyUEFxPT9N
|
32
|
+
cCOGDErcgdLMMpSEDQgJlxxPwO5rIHQw0uA5NBCFIRUBCOhVMt5xSdkoF1BN5r5N
|
33
|
+
0XWs0Mr7QbhDparTwwVETyw2m+L64kW4I1NsBm9nVX9GtUw/bihaeSbSpKhil9Ie
|
34
|
+
4u1Ki7wb/UdKDd9nZn6yW0HQO+T0O/QEY+nvwlQAUaCKKsnOeMzV6ocEGLPOr0mI
|
35
|
+
r/OSmbaz5mEP0oUA51Aa5BuVnRmhuZyxm7EAHu/QD09CbMkKvO5D+jpxpchNJqU1
|
36
|
+
/YldvIViHTLSoCtU7ZpXwdv6EM8Zt4tKG48BtieVU+i2iW1bvGjUI+iLUaJW+fCm
|
37
|
+
gKDWHrO8Dw9TdSmq6hN35N6MgSGtBxBHEa2HPQfRdbzP82Z+
|
38
|
+
-----END CERTIFICATE-----
|
39
|
+
EOM
|
40
|
+
|
41
|
+
hosts.each do |host|
|
42
|
+
if host.platform=~ /solaris-11(\.2)?-(i386|sparc)/
|
43
|
+
create_remote_file(host, "DigiCertTrustedRootG4.crt.pem", DigiCert)
|
44
|
+
on(host, 'chmod a+r /root/DigiCertTrustedRootG4.crt.pem')
|
45
|
+
on(host, 'cp -p /root/DigiCertTrustedRootG4.crt.pem /etc/certs/CA/')
|
46
|
+
on(host, 'rm /root/DigiCertTrustedRootG4.crt.pem')
|
47
|
+
on(host, '/usr/sbin/svcadm restart /system/ca-certificates')
|
48
|
+
timeout = 60
|
49
|
+
counter = 0
|
50
|
+
while on(host, 'svcs -x ca-certificates').output !~ /State: online/ do
|
51
|
+
raise 'ca-certificates services failed start up' if counter > timeout
|
52
|
+
sleep 5
|
53
|
+
counter = counter + 5
|
54
|
+
end
|
55
|
+
end
|
56
|
+
end
|
@@ -174,7 +174,7 @@ describe ClassMixedWithDSLHelpers do
|
|
174
174
|
|
175
175
|
expect( subject ).to receive( :on ).
|
176
176
|
with( agent, 'puppet_command',
|
177
|
-
:acceptable_exit_codes => [0] )
|
177
|
+
{:acceptable_exit_codes => [0]} )
|
178
178
|
|
179
179
|
subject.apply_manifest_on( agent, 'class { "boo": }')
|
180
180
|
end
|
@@ -189,7 +189,7 @@ describe ClassMixedWithDSLHelpers do
|
|
189
189
|
and_return( 'puppet_command' )
|
190
190
|
|
191
191
|
expect( subject ).to receive( :on ).
|
192
|
-
with( host, 'puppet_command', :acceptable_exit_codes => [0] )
|
192
|
+
with( host, 'puppet_command', {:acceptable_exit_codes => [0]} )
|
193
193
|
end
|
194
194
|
|
195
195
|
result = subject.apply_manifest_on( the_hosts, 'include foobar' )
|
@@ -209,7 +209,7 @@ describe ClassMixedWithDSLHelpers do
|
|
209
209
|
and_return( 'puppet_command' )
|
210
210
|
the_hosts.each do |host|
|
211
211
|
allow( subject ).to receive( :on ).
|
212
|
-
|
212
|
+
with( host, 'puppet_command', {:acceptable_exit_codes => [0]} )
|
213
213
|
end
|
214
214
|
|
215
215
|
result = nil
|
@@ -228,11 +228,11 @@ describe ClassMixedWithDSLHelpers do
|
|
228
228
|
and_return( 'puppet_command' )
|
229
229
|
the_hosts.each do |host|
|
230
230
|
allow( subject ).to receive( :on ).
|
231
|
-
with( host, 'puppet_command', :acceptable_exit_codes => [0] )
|
231
|
+
with( host, 'puppet_command', {:acceptable_exit_codes => [0]} )
|
232
232
|
end
|
233
233
|
expect( subject ).to receive( :block_on ).with(
|
234
234
|
anything,
|
235
|
-
:run_in_parallel => true
|
235
|
+
{:run_in_parallel => true}
|
236
236
|
)
|
237
237
|
|
238
238
|
subject.apply_manifest_on( the_hosts, 'include foobar', { :run_in_parallel => true } )
|
@@ -246,11 +246,11 @@ describe ClassMixedWithDSLHelpers do
|
|
246
246
|
|
247
247
|
expect( subject ).to receive( :on ).
|
248
248
|
with( agent, 'puppet_command',
|
249
|
-
:acceptable_exit_codes => [0,2] )
|
249
|
+
{:acceptable_exit_codes => [0,2]} )
|
250
250
|
|
251
251
|
subject.apply_manifest_on( agent,
|
252
252
|
'class { "boo": }',
|
253
|
-
:catch_failures => true )
|
253
|
+
{:catch_failures => true} )
|
254
254
|
end
|
255
255
|
it 'allows acceptable exit codes through :catch_failures' do
|
256
256
|
allow( subject ).to receive( :hosts ).and_return( hosts )
|
@@ -260,12 +260,12 @@ describe ClassMixedWithDSLHelpers do
|
|
260
260
|
|
261
261
|
expect( subject ).to receive( :on ).
|
262
262
|
with( agent, 'puppet_command',
|
263
|
-
|
263
|
+
{:acceptable_exit_codes => [4,0,2]} )
|
264
264
|
|
265
265
|
subject.apply_manifest_on( agent,
|
266
266
|
'class { "boo": }',
|
267
|
-
:acceptable_exit_codes => [4],
|
268
|
-
|
267
|
+
{:acceptable_exit_codes => [4],
|
268
|
+
:catch_failures => true} )
|
269
269
|
end
|
270
270
|
it 'enforces a 0 exit code through :catch_changes' do
|
271
271
|
allow( subject ).to receive( :hosts ).and_return( hosts )
|
@@ -276,13 +276,13 @@ describe ClassMixedWithDSLHelpers do
|
|
276
276
|
expect( subject ).to receive( :on ).with(
|
277
277
|
agent,
|
278
278
|
'puppet_command',
|
279
|
-
:acceptable_exit_codes => [0]
|
279
|
+
{:acceptable_exit_codes => [0]}
|
280
280
|
)
|
281
281
|
|
282
282
|
subject.apply_manifest_on(
|
283
283
|
agent,
|
284
284
|
'class { "boo": }',
|
285
|
-
:catch_changes => true
|
285
|
+
{:catch_changes => true}
|
286
286
|
)
|
287
287
|
end
|
288
288
|
it 'enforces a 2 exit code through :expect_changes' do
|
@@ -294,13 +294,13 @@ describe ClassMixedWithDSLHelpers do
|
|
294
294
|
expect( subject ).to receive( :on ).with(
|
295
295
|
agent,
|
296
296
|
'puppet_command',
|
297
|
-
:acceptable_exit_codes => [2]
|
297
|
+
{:acceptable_exit_codes => [2]}
|
298
298
|
)
|
299
299
|
|
300
300
|
subject.apply_manifest_on(
|
301
301
|
agent,
|
302
302
|
'class { "boo": }',
|
303
|
-
:expect_changes => true
|
303
|
+
{:expect_changes => true}
|
304
304
|
)
|
305
305
|
end
|
306
306
|
it 'enforces exit codes through :expect_failures' do
|
@@ -312,13 +312,13 @@ describe ClassMixedWithDSLHelpers do
|
|
312
312
|
expect( subject ).to receive( :on ).with(
|
313
313
|
agent,
|
314
314
|
'puppet_command',
|
315
|
-
:acceptable_exit_codes => [1,4,6]
|
315
|
+
{:acceptable_exit_codes => [1,4,6]}
|
316
316
|
)
|
317
317
|
|
318
318
|
subject.apply_manifest_on(
|
319
319
|
agent,
|
320
320
|
'class { "boo": }',
|
321
|
-
:expect_failures => true
|
321
|
+
{:expect_failures => true}
|
322
322
|
)
|
323
323
|
end
|
324
324
|
it 'enforces exit codes through :expect_failures' do
|
@@ -341,14 +341,14 @@ describe ClassMixedWithDSLHelpers do
|
|
341
341
|
expect( subject ).to receive( :on ).with(
|
342
342
|
agent,
|
343
343
|
'puppet_command',
|
344
|
-
:acceptable_exit_codes => [1,2,3,4,5,6]
|
344
|
+
{:acceptable_exit_codes => [1,2,3,4,5,6]}
|
345
345
|
)
|
346
346
|
|
347
347
|
subject.apply_manifest_on(
|
348
348
|
agent,
|
349
349
|
'class { "boo": }',
|
350
|
-
:acceptable_exit_codes => (1..5),
|
351
|
-
|
350
|
+
{:acceptable_exit_codes => (1..5),
|
351
|
+
:expect_failures => true}
|
352
352
|
)
|
353
353
|
end
|
354
354
|
|
@@ -341,7 +341,7 @@ describe ClassMixedWithDSLInstallUtils do
|
|
341
341
|
|
342
342
|
it 'installs puppet on cygwin windows' do
|
343
343
|
allow(subject).to receive(:link_exists?).and_return( true )
|
344
|
-
expect(subject).to receive(:on).with(winhost, "curl
|
344
|
+
expect(subject).to receive(:on).with(winhost, "curl --location --output \"#{win_temp}\\puppet-3.7.1-x64.msi\" --remote-name http://downloads.puppet.com/windows/puppet-3.7.1-x64.msi")
|
345
345
|
expect(subject).to receive(:on).with(winhost, " echo 'export PATH=$PATH:\"/cygdrive/c/Program Files (x86)/Puppet Labs/Puppet/bin\":\"/cygdrive/c/Program Files/Puppet Labs/Puppet/bin\"' > /etc/bash.bashrc ")
|
346
346
|
expect(subject).to receive(:install_msi_on).with(winhost, "#{win_temp}\\puppet-3.7.1-x64.msi", {}, {:debug => nil})
|
347
347
|
|
@@ -350,7 +350,7 @@ describe ClassMixedWithDSLInstallUtils do
|
|
350
350
|
|
351
351
|
it 'installs puppet on cygwin windows via proxy' do
|
352
352
|
allow(subject).to receive(:link_exists?).and_return( true )
|
353
|
-
expect(subject).to receive(:on).with(winhost, "curl -x https://proxy.com
|
353
|
+
expect(subject).to receive(:on).with(winhost, "curl -x https://proxy.com --location --output \"#{win_temp}\\puppet-3.7.1-x64.msi\" --remote-name http://downloads.puppet.com/windows/puppet-3.7.1-x64.msi")
|
354
354
|
expect(subject).to receive(:on).with(winhost, " echo 'export PATH=$PATH:\"/cygdrive/c/Program Files (x86)/Puppet Labs/Puppet/bin\":\"/cygdrive/c/Program Files/Puppet Labs/Puppet/bin\"' > /etc/bash.bashrc ")
|
355
355
|
expect(subject).to receive(:install_msi_on).with(winhost, "#{win_temp}\\puppet-3.7.1-x64.msi", {}, {:debug => nil})
|
356
356
|
|
@@ -99,7 +99,7 @@ describe ClassMixedWithDSLInstallUtils do
|
|
99
99
|
expect_version_log_called
|
100
100
|
expect( subject ).to receive( :create_install_msi_batch_on ).with(
|
101
101
|
anything, anything,
|
102
|
-
'PUPPET_AGENT_STARTUP_MODE' => 'Manual')
|
102
|
+
{'PUPPET_AGENT_STARTUP_MODE' => 'Manual'})
|
103
103
|
subject.install_msi_on(hosts, msi_path, {})
|
104
104
|
end
|
105
105
|
|
@@ -112,7 +112,7 @@ describe ClassMixedWithDSLInstallUtils do
|
|
112
112
|
value = 'Automatic'
|
113
113
|
expect( subject ).to receive( :create_install_msi_batch_on ).with(
|
114
114
|
anything, anything,
|
115
|
-
'PUPPET_AGENT_STARTUP_MODE' => value)
|
115
|
+
{'PUPPET_AGENT_STARTUP_MODE' => value})
|
116
116
|
subject.install_msi_on(hosts, msi_path, {'PUPPET_AGENT_STARTUP_MODE' => value})
|
117
117
|
end
|
118
118
|
|
data/tasks/ci.rake
CHANGED
@@ -311,6 +311,7 @@ def pre_suites(type)
|
|
311
311
|
when :aio
|
312
312
|
[
|
313
313
|
"#{beaker_root}/setup/common/000-delete-puppet-when-none.rb",
|
314
|
+
"#{beaker_root}/setup/common/003_solaris_cert_fix.rb",
|
314
315
|
"#{beaker_root}/setup/aio/010_Install_Puppet_Agent.rb",
|
315
316
|
"#{beaker_root}/setup/common/011_Install_Puppet_Server.rb",
|
316
317
|
"#{beaker_root}/setup/common/012_Finalize_Installs.rb",
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: beaker-puppet
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.25.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Vox Pupuli
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date:
|
11
|
+
date: 2022-03-16 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: rspec
|
@@ -220,6 +220,7 @@ files:
|
|
220
220
|
- lib/beaker/dsl/install_utils/puppet_utils.rb
|
221
221
|
- setup/aio/010_Install_Puppet_Agent.rb
|
222
222
|
- setup/common/000-delete-puppet-when-none.rb
|
223
|
+
- setup/common/003_solaris_cert_fix.rb
|
223
224
|
- setup/common/011_Install_Puppet_Server.rb
|
224
225
|
- setup/common/012_Finalize_Installs.rb
|
225
226
|
- setup/common/020_InstallCumulusModules.rb
|
@@ -251,7 +252,7 @@ files:
|
|
251
252
|
- tasks/ci.rake
|
252
253
|
homepage: https://github.com/voxpupuli/beaker-puppet
|
253
254
|
licenses:
|
254
|
-
-
|
255
|
+
- Apache-2.0
|
255
256
|
metadata: {}
|
256
257
|
post_install_message:
|
257
258
|
rdoc_options: []
|
@@ -261,7 +262,7 @@ required_ruby_version: !ruby/object:Gem::Requirement
|
|
261
262
|
requirements:
|
262
263
|
- - ">="
|
263
264
|
- !ruby/object:Gem::Version
|
264
|
-
version: '
|
265
|
+
version: '2.4'
|
265
266
|
required_rubygems_version: !ruby/object:Gem::Requirement
|
266
267
|
requirements:
|
267
268
|
- - ">="
|