chef 13.2.20-universal-mingw32 → 13.3.42-universal-mingw32

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (107) hide show
  1. checksums.yaml +4 -4
  2. data/CONTRIBUTING.md +1 -1
  3. data/Gemfile +2 -8
  4. data/README.md +6 -2
  5. data/Rakefile +0 -11
  6. data/VERSION +1 -1
  7. data/acceptance/Gemfile.lock +1 -1
  8. data/acceptance/data-collector/.acceptance/data-collector-test/files/default/api.rb +34 -18
  9. data/acceptance/data-collector/.acceptance/data-collector-test/recipes/default.rb +6 -0
  10. data/lib/chef/cookbook/metadata.rb +2 -2
  11. data/lib/chef/deprecation/warnings.rb +3 -1
  12. data/lib/chef/exceptions.rb +1 -1
  13. data/lib/chef/http.rb +9 -10
  14. data/lib/chef/http/api_versions.rb +2 -0
  15. data/lib/chef/http/http_request.rb +3 -0
  16. data/lib/chef/knife/core/bootstrap_context.rb +1 -0
  17. data/lib/chef/knife/core/status_presenter.rb +1 -1
  18. data/lib/chef/knife/ssh.rb +4 -0
  19. data/lib/chef/provider/apt_preference.rb +99 -0
  20. data/lib/chef/provider/execute.rb +3 -2
  21. data/lib/chef/provider/http_request.rb +14 -0
  22. data/lib/chef/provider/mount/aix.rb +49 -8
  23. data/lib/chef/provider/package/windows/registry_uninstall_entry.rb +1 -1
  24. data/lib/chef/provider/package/zypper.rb +5 -5
  25. data/lib/chef/provider/service/systemd.rb +12 -11
  26. data/lib/chef/provider/support/zypper_repo.erb +17 -0
  27. data/lib/chef/provider/systemd_unit.rb +3 -2
  28. data/lib/chef/provider/windows_task.rb +92 -71
  29. data/lib/chef/provider/zypper_repository.rb +81 -0
  30. data/lib/chef/providers.rb +2 -0
  31. data/lib/chef/resource/apt_preference.rb +36 -0
  32. data/lib/chef/resource/execute.rb +12 -2
  33. data/lib/chef/resource/http_request.rb +1 -1
  34. data/lib/chef/resource/zypper_repository.rb +51 -0
  35. data/lib/chef/resources.rb +2 -0
  36. data/lib/chef/search/query.rb +6 -1
  37. data/lib/chef/server_api_versions.rb +21 -2
  38. data/lib/chef/version.rb +3 -4
  39. data/lib/chef/win32/api/file.rb +1 -0
  40. data/lib/chef/win32/file.rb +2 -0
  41. data/lib/chef/win32/version.rb +6 -0
  42. data/spec/functional/knife/ssh_spec.rb +1 -1
  43. data/spec/functional/resource/execute_spec.rb +2 -2
  44. data/spec/spec_helper.rb +8 -1
  45. data/spec/unit/cookbook/metadata_spec.rb +3 -3
  46. data/spec/unit/http/api_versions_spec.rb +6 -3
  47. data/spec/unit/knife/bootstrap_spec.rb +4 -0
  48. data/spec/unit/knife/cookbook_show_spec.rb +3 -3
  49. data/spec/unit/knife/ssh_spec.rb +7 -1
  50. data/spec/unit/knife/status_spec.rb +2 -0
  51. data/spec/unit/provider/apt_preference_spec.rb +87 -0
  52. data/spec/unit/provider/apt_update_spec.rb +7 -7
  53. data/spec/unit/provider/dsc_resource_spec.rb +2 -2
  54. data/spec/unit/provider/execute_spec.rb +32 -14
  55. data/spec/unit/provider/mount/aix_spec.rb +33 -1
  56. data/spec/unit/provider/package/rubygems_spec.rb +1 -1
  57. data/spec/unit/provider/package/windows/registry_uninstall_entry_spec.rb +56 -3
  58. data/spec/unit/provider/package/windows_spec.rb +1 -1
  59. data/spec/unit/provider/package/zypper_spec.rb +43 -0
  60. data/spec/unit/provider/script_spec.rb +1 -1
  61. data/spec/unit/provider/service/systemd_service_spec.rb +23 -21
  62. data/spec/unit/provider/systemd_unit_spec.rb +42 -41
  63. data/spec/unit/provider/windows_task_spec.rb +40 -0
  64. data/spec/unit/resource/apt_preference_spec.rb +41 -0
  65. data/spec/unit/resource/execute_spec.rb +21 -1
  66. data/spec/unit/resource/powershell_script_spec.rb +2 -2
  67. data/spec/unit/resource/zypper_repository_spec.rb +65 -0
  68. data/spec/unit/search/query_spec.rb +13 -18
  69. data/spec/unit/server_api_spec.rb +75 -1
  70. data/spec/unit/server_api_versions_spec.rb +22 -0
  71. data/spec/unit/win32/link_spec.rb +73 -0
  72. data/tasks/dependencies.rb +0 -1
  73. metadata +14 -81
  74. data/acceptance/.bundle/config +0 -2
  75. data/acceptance/bin/aws.rb +0 -17
  76. data/acceptance/bin/berks +0 -17
  77. data/acceptance/bin/bundler +0 -17
  78. data/acceptance/bin/chef-acceptance +0 -17
  79. data/acceptance/bin/coderay +0 -17
  80. data/acceptance/bin/erubis +0 -17
  81. data/acceptance/bin/htmldiff +0 -17
  82. data/acceptance/bin/httpclient +0 -17
  83. data/acceptance/bin/inspec +0 -17
  84. data/acceptance/bin/kitchen +0 -17
  85. data/acceptance/bin/ldiff +0 -17
  86. data/acceptance/bin/nokogiri +0 -17
  87. data/acceptance/bin/pry +0 -17
  88. data/acceptance/bin/rake +0 -17
  89. data/acceptance/bin/rspec +0 -17
  90. data/acceptance/bin/rwinrm +0 -17
  91. data/acceptance/bin/rwinrmcp +0 -17
  92. data/acceptance/bin/safe_yaml +0 -17
  93. data/acceptance/bin/thor +0 -17
  94. data/acceptance/fips/.kitchen/fips-unit-functional-centos-6.yml +0 -7
  95. data/acceptance/fips/.kitchen/kitchen-vagrant/kitchen-fips-fips-unit-functional-centos-6/.vagrant/machines/default/virtualbox/action_set_name +0 -1
  96. data/acceptance/fips/.kitchen/kitchen-vagrant/kitchen-fips-fips-unit-functional-centos-6/.vagrant/machines/default/virtualbox/creator_uid +0 -1
  97. data/acceptance/fips/.kitchen/kitchen-vagrant/kitchen-fips-fips-unit-functional-centos-6/.vagrant/machines/default/virtualbox/id +0 -1
  98. data/acceptance/fips/.kitchen/kitchen-vagrant/kitchen-fips-fips-unit-functional-centos-6/.vagrant/machines/default/virtualbox/index_uuid +0 -1
  99. data/acceptance/fips/.kitchen/kitchen-vagrant/kitchen-fips-fips-unit-functional-centos-6/.vagrant/machines/default/virtualbox/private_key +0 -27
  100. data/acceptance/fips/.kitchen/kitchen-vagrant/kitchen-fips-fips-unit-functional-centos-6/.vagrant/machines/default/virtualbox/synced_folders +0 -1
  101. data/acceptance/fips/.kitchen/kitchen-vagrant/kitchen-fips-fips-unit-functional-centos-6/Vagrantfile +0 -11
  102. data/acceptance/fips/.kitchen/logs/fips-integration-centos-6.log +0 -0
  103. data/acceptance/fips/.kitchen/logs/fips-integration-windows-2012r2.log +0 -0
  104. data/acceptance/fips/.kitchen/logs/fips-unit-functional-centos-6.log +0 -80
  105. data/acceptance/fips/.kitchen/logs/kitchen.log +0 -4
  106. data/tasks/changelog.rb +0 -37
  107. data/tasks/version.rb +0 -41
@@ -539,7 +539,7 @@ describe Chef::Provider::Package::Rubygems do
539
539
  end
540
540
  end
541
541
 
542
- context "when the source is from the rubygems_uri" do
542
+ context "when the source is from the rubygems_url" do
543
543
  it "determines the candidate version by querying the remote gem servers" do
544
544
  Chef::Config[:rubygems_url] = "https://mirror1/"
545
545
  expect(provider.gem_env).to receive(:candidate_version_from_remote)
@@ -9,7 +9,7 @@ describe Chef::Provider::Package::Windows::RegistryUninstallEntry do
9
9
  describe "when QuietUninstallString key not present" do
10
10
  let(:quiet_uninstall_string) { nil }
11
11
  let (:quiet_uninstall_string_key) { Chef::Provider::Package::Windows::RegistryUninstallEntry.quiet_uninstall_string_key?(quiet_uninstall_string, hkey, key, entry).uninstall_string }
12
- it "should return UninstallString key value" do
12
+ it "returns UninstallString key value" do
13
13
  expect(quiet_uninstall_string_key).to eql "UninstallStringPath"
14
14
  end
15
15
  end
@@ -17,9 +17,62 @@ describe Chef::Provider::Package::Windows::RegistryUninstallEntry do
17
17
  describe "when QuietUninstallString key present" do
18
18
  let(:quiet_uninstall_string) { "QuietUninstallString" }
19
19
  let (:quiet_uninstall_string_key) { Chef::Provider::Package::Windows::RegistryUninstallEntry.quiet_uninstall_string_key?(quiet_uninstall_string, hkey, key, entry).uninstall_string }
20
-
21
- it "should return QuietUninstallString key value" do
20
+ it "returns QuietUninstallString key value" do
22
21
  expect(quiet_uninstall_string_key).to eql "QuietUninstallStringPath"
23
22
  end
24
23
  end
24
+
25
+ describe ".find_entries", :windows_only do
26
+ let (:registry_uninstall_entry) { Chef::Provider::Package::Windows::RegistryUninstallEntry }
27
+ before(:each) do
28
+ allow_any_instance_of(::Win32::Registry).to receive(:open).and_return("::Win32::Registry::HKEY_CURRENT_USER")
29
+ end
30
+
31
+ context "when passing nil" do
32
+ let(:package_name) { nil }
33
+ it "returns empty entries array" do
34
+ allow(Chef::Provider::Package::Windows::RegistryUninstallEntry).to receive(:read_registry_property).and_return(nil)
35
+ entries = Chef::Provider::Package::Windows::RegistryUninstallEntry.find_entries(package_name)
36
+ expect(entries.size).to eql 0
37
+ end
38
+ end
39
+
40
+ context "when passing empty string" do
41
+ let(:package_name) { " " }
42
+ it "returns no entries" do
43
+ allow(Chef::Provider::Package::Windows::RegistryUninstallEntry).to receive(:read_registry_property).and_return(nil)
44
+ entries = Chef::Provider::Package::Windows::RegistryUninstallEntry.find_entries(package_name)
45
+ expect(entries.size).to eql 0
46
+ end
47
+ end
48
+
49
+ context "when package is not found" do
50
+ let(:package_name) { "hive" }
51
+ it "returns no entries" do
52
+ allow(Chef::Provider::Package::Windows::RegistryUninstallEntry).to receive(:read_registry_property).and_return("Chef Client")
53
+ entries = Chef::Provider::Package::Windows::RegistryUninstallEntry.find_entries(package_name)
54
+ expect(entries).to eql []
55
+ end
56
+ end
57
+
58
+ context "when trailing spaces are given in display name" do
59
+ let(:package_name) { "Chef" }
60
+ let(:display_name_with_space) { "Chef " }
61
+ it "removes the trailing spaces" do
62
+ allow(Chef::Provider::Package::Windows::RegistryUninstallEntry).to receive(:read_registry_property).and_return(display_name_with_space)
63
+ entries = registry_uninstall_entry.find_entries(package_name).first
64
+ expect(entries.display_name.rstrip).to eql package_name
65
+ end
66
+ end
67
+
68
+ context "When package found successfully" do
69
+ let(:package_name) { "Chef Client" }
70
+ let(:display_name) { "Chef Client" }
71
+ it "returns 'Chef Client' entries" do
72
+ allow(Chef::Provider::Package::Windows::RegistryUninstallEntry).to receive(:read_registry_property).and_return(display_name)
73
+ entries = registry_uninstall_entry.find_entries(package_name).first
74
+ expect(entries.display_name.rstrip).to eql package_name
75
+ end
76
+ end
77
+ end
25
78
  end
@@ -224,7 +224,7 @@ describe Chef::Provider::Package::Windows, :windows_only do
224
224
  end
225
225
  end
226
226
 
227
- context "eninstall entries is empty" do
227
+ context "uninstall entries is empty" do
228
228
  before { allow(Chef::Provider::Package::Windows::RegistryUninstallEntry).to receive(:find_entries).and_return([]) }
229
229
 
230
230
  it "returns nil" do
@@ -139,6 +139,14 @@ describe Chef::Provider::Package::Zypper do
139
139
  )
140
140
  provider.install_package(["emacs"], ["1.0"])
141
141
  end
142
+
143
+ it "should add user provided options to the command" do
144
+ new_resource.options "--user-provided"
145
+ shell_out_expectation!(
146
+ "zypper", "--non-interactive", "install", "--user-provided", "--auto-agree-with-licenses", "emacs=1.0"
147
+ )
148
+ provider.install_package(["emacs"], ["1.0"])
149
+ end
142
150
  end
143
151
 
144
152
  describe "upgrade_package" do
@@ -162,6 +170,13 @@ describe Chef::Provider::Package::Zypper do
162
170
  )
163
171
  provider.upgrade_package(["emacs"], ["1.0"])
164
172
  end
173
+ it "should add user provided options to the command" do
174
+ new_resource.options "--user-provided"
175
+ shell_out_expectation!(
176
+ "zypper", "--non-interactive", "install", "--user-provided", "--auto-agree-with-licenses", "emacs=1.0"
177
+ )
178
+ provider.upgrade_package(["emacs"], ["1.0"])
179
+ end
165
180
  end
166
181
 
167
182
  describe "remove_package" do
@@ -196,6 +211,13 @@ describe Chef::Provider::Package::Zypper do
196
211
  )
197
212
  provider.remove_package(["emacs"], ["1.0"])
198
213
  end
214
+ it "should add user provided options to the command" do
215
+ new_resource.options "--user-provided"
216
+ shell_out_expectation!(
217
+ "zypper", "--non-interactive", "remove", "--user-provided", "emacs=1.0"
218
+ )
219
+ provider.remove_package(["emacs"], ["1.0"])
220
+ end
199
221
  end
200
222
  end
201
223
 
@@ -220,6 +242,13 @@ describe Chef::Provider::Package::Zypper do
220
242
  )
221
243
  provider.purge_package(["emacs"], ["1.0"])
222
244
  end
245
+ it "should add user provided options to the command" do
246
+ new_resource.options "--user-provided"
247
+ shell_out_expectation!(
248
+ "zypper", "--non-interactive", "remove", "--user-provided", "--clean-deps", "emacs=1.0"
249
+ )
250
+ provider.purge_package(["emacs"], ["1.0"])
251
+ end
223
252
  end
224
253
 
225
254
  describe "lock_package" do
@@ -236,6 +265,13 @@ describe Chef::Provider::Package::Zypper do
236
265
  )
237
266
  provider.lock_package(["emacs"], [nil])
238
267
  end
268
+ it "should add user provided options to the command" do
269
+ new_resource.options "--user-provided"
270
+ shell_out_expectation!(
271
+ "zypper", "--non-interactive", "addlock", "--user-provided", "emacs"
272
+ )
273
+ provider.lock_package(["emacs"], [nil])
274
+ end
239
275
  end
240
276
 
241
277
  describe "unlock_package" do
@@ -252,6 +288,13 @@ describe Chef::Provider::Package::Zypper do
252
288
  )
253
289
  provider.unlock_package(["emacs"], [nil])
254
290
  end
291
+ it "should add user provided options to the command" do
292
+ new_resource.options "--user-provided"
293
+ shell_out_expectation!(
294
+ "zypper", "--non-interactive", "removelock", "--user-provided", "emacs"
295
+ )
296
+ provider.unlock_package(["emacs"], [nil])
297
+ end
255
298
  end
256
299
 
257
300
  describe "on an older zypper" do
@@ -143,7 +143,7 @@ describe Chef::Provider::Script, "action_run" do
143
143
  end
144
144
 
145
145
  it "should call shell_out! with the command" do
146
- expect(provider).to receive(:shell_out!).with(provider.command, default_opts).and_return(true)
146
+ expect(provider).to receive(:shell_out_with_systems_locale!).with(provider.command, default_opts).and_return(true)
147
147
  provider.action_run
148
148
  end
149
149
 
@@ -36,7 +36,9 @@ describe Chef::Provider::Service::Systemd do
36
36
 
37
37
  let(:run_context) { Chef::RunContext.new(node, {}, events) }
38
38
 
39
- let(:service_name) { "rsyslog.service" }
39
+ let(:service_name) { "rsyslog\\x2d.service" }
40
+
41
+ let(:service_name_escaped) { "rsyslog\\\\x2d.service" }
40
42
 
41
43
  let(:new_resource) { Chef::Resource::Service.new(service_name) }
42
44
 
@@ -182,13 +184,13 @@ describe Chef::Provider::Service::Systemd do
182
184
 
183
185
  context "when a user is not specified" do
184
186
  it "should call '#{systemctl_path} --system start service_name' if no start command is specified" do
185
- expect(provider).to receive(:shell_out_with_systems_locale!).with("#{systemctl_path} --system start #{service_name}", {}).and_return(shell_out_success)
187
+ expect(provider).to receive(:shell_out_with_systems_locale!).with("#{systemctl_path} --system start #{service_name_escaped}", {}).and_return(shell_out_success)
186
188
  provider.start_service
187
189
  end
188
190
 
189
191
  it "should not call '#{systemctl_path} --system start service_name' if it is already running" do
190
192
  current_resource.running(true)
191
- expect(provider).not_to receive(:shell_out_with_systems_locale!).with("#{systemctl_path} --system start #{service_name}", {})
193
+ expect(provider).not_to receive(:shell_out_with_systems_locale!).with("#{systemctl_path} --system start #{service_name_escaped}", {})
192
194
  provider.start_service
193
195
  end
194
196
  end
@@ -196,14 +198,14 @@ describe Chef::Provider::Service::Systemd do
196
198
  context "when a user is specified" do
197
199
  it "should call '#{systemctl_path} --user start service_name' if no start command is specified" do
198
200
  current_resource.user("joe")
199
- expect(provider).to receive(:shell_out_with_systems_locale!).with("#{systemctl_path} --user start #{service_name}", { :environment => { "DBUS_SESSION_BUS_ADDRESS" => "unix:path=/run/user/10000/bus" }, :user => "joe" }).and_return(shell_out_success)
201
+ expect(provider).to receive(:shell_out_with_systems_locale!).with("#{systemctl_path} --user start #{service_name_escaped}", { :environment => { "DBUS_SESSION_BUS_ADDRESS" => "unix:path=/run/user/10000/bus" }, :user => "joe" }).and_return(shell_out_success)
200
202
  provider.start_service
201
203
  end
202
204
 
203
205
  it "should not call '#{systemctl_path} --user start service_name' if it is already running" do
204
206
  current_resource.running(true)
205
207
  current_resource.user("joe")
206
- expect(provider).not_to receive(:shell_out_with_systems_locale!).with("#{systemctl_path} --user start #{service_name}", { :environment => { "DBUS_SESSION_BUS_ADDRESS" => "unix:path=/run/user/10000/bus" }, :user => "joe" })
208
+ expect(provider).not_to receive(:shell_out_with_systems_locale!).with("#{systemctl_path} --user start #{service_name_escaped}", { :environment => { "DBUS_SESSION_BUS_ADDRESS" => "unix:path=/run/user/10000/bus" }, :user => "joe" })
207
209
  provider.start_service
208
210
  end
209
211
  end
@@ -217,7 +219,7 @@ describe Chef::Provider::Service::Systemd do
217
219
 
218
220
  it "should call '#{systemctl_path} --system restart service_name' if no restart command is specified" do
219
221
  current_resource.running(true)
220
- expect(provider).to receive(:shell_out_with_systems_locale!).with("#{systemctl_path} --system restart #{service_name}", {}).and_return(shell_out_success)
222
+ expect(provider).to receive(:shell_out_with_systems_locale!).with("#{systemctl_path} --system restart #{service_name_escaped}", {}).and_return(shell_out_success)
221
223
  provider.restart_service
222
224
  end
223
225
 
@@ -234,7 +236,7 @@ describe Chef::Provider::Service::Systemd do
234
236
  context "when a reload command is not specified" do
235
237
  it "should call '#{systemctl_path} --system reload service_name' if the service is running" do
236
238
  current_resource.running(true)
237
- expect(provider).to receive(:shell_out_with_systems_locale!).with("#{systemctl_path} --system reload #{service_name}", {}).and_return(shell_out_success)
239
+ expect(provider).to receive(:shell_out_with_systems_locale!).with("#{systemctl_path} --system reload #{service_name_escaped}", {}).and_return(shell_out_success)
238
240
  provider.reload_service
239
241
  end
240
242
 
@@ -255,13 +257,13 @@ describe Chef::Provider::Service::Systemd do
255
257
 
256
258
  it "should call '#{systemctl_path} --system stop service_name' if no stop command is specified" do
257
259
  current_resource.running(true)
258
- expect(provider).to receive(:shell_out_with_systems_locale!).with("#{systemctl_path} --system stop #{service_name}", {}).and_return(shell_out_success)
260
+ expect(provider).to receive(:shell_out_with_systems_locale!).with("#{systemctl_path} --system stop #{service_name_escaped}", {}).and_return(shell_out_success)
259
261
  provider.stop_service
260
262
  end
261
263
 
262
264
  it "should not call '#{systemctl_path} --system stop service_name' if it is already stopped" do
263
265
  current_resource.running(false)
264
- expect(provider).not_to receive(:shell_out_with_systems_locale!).with("#{systemctl_path} --system stop #{service_name}", {})
266
+ expect(provider).not_to receive(:shell_out_with_systems_locale!).with("#{systemctl_path} --system stop #{service_name_escaped}", {})
265
267
  provider.stop_service
266
268
  end
267
269
  end
@@ -274,12 +276,12 @@ describe Chef::Provider::Service::Systemd do
274
276
  end
275
277
 
276
278
  it "should call '#{systemctl_path} --system enable service_name' to enable the service" do
277
- expect(provider).to receive(:shell_out!).with("#{systemctl_path} --system enable #{service_name}", {}).and_return(shell_out_success)
279
+ expect(provider).to receive(:shell_out!).with("#{systemctl_path} --system enable #{service_name_escaped}", {}).and_return(shell_out_success)
278
280
  provider.enable_service
279
281
  end
280
282
 
281
283
  it "should call '#{systemctl_path} --system disable service_name' to disable the service" do
282
- expect(provider).to receive(:shell_out!).with("#{systemctl_path} --system disable #{service_name}", {}).and_return(shell_out_success)
284
+ expect(provider).to receive(:shell_out!).with("#{systemctl_path} --system disable #{service_name_escaped}", {}).and_return(shell_out_success)
283
285
  provider.disable_service
284
286
  end
285
287
  end
@@ -292,12 +294,12 @@ describe Chef::Provider::Service::Systemd do
292
294
  end
293
295
 
294
296
  it "should call '#{systemctl_path} --system mask service_name' to mask the service" do
295
- expect(provider).to receive(:shell_out!).with("#{systemctl_path} --system mask #{service_name}", {}).and_return(shell_out_success)
297
+ expect(provider).to receive(:shell_out!).with("#{systemctl_path} --system mask #{service_name_escaped}", {}).and_return(shell_out_success)
296
298
  provider.mask_service
297
299
  end
298
300
 
299
301
  it "should call '#{systemctl_path} --system unmask service_name' to unmask the service" do
300
- expect(provider).to receive(:shell_out!).with("#{systemctl_path} --system unmask #{service_name}", {}).and_return(shell_out_success)
302
+ expect(provider).to receive(:shell_out!).with("#{systemctl_path} --system unmask #{service_name_escaped}", {}).and_return(shell_out_success)
301
303
  provider.unmask_service
302
304
  end
303
305
  end
@@ -310,12 +312,12 @@ describe Chef::Provider::Service::Systemd do
310
312
  end
311
313
 
312
314
  it "should return true if '#{systemctl_path} --system is-active service_name' returns 0" do
313
- expect(provider).to receive(:shell_out).with("#{systemctl_path} --system is-active #{service_name} --quiet", {}).and_return(shell_out_success)
315
+ expect(provider).to receive(:shell_out).with("#{systemctl_path} --system is-active #{service_name_escaped} --quiet", {}).and_return(shell_out_success)
314
316
  expect(provider.is_active?).to be true
315
317
  end
316
318
 
317
319
  it "should return false if '#{systemctl_path} --system is-active service_name' returns anything except 0" do
318
- expect(provider).to receive(:shell_out).with("#{systemctl_path} --system is-active #{service_name} --quiet", {}).and_return(shell_out_failure)
320
+ expect(provider).to receive(:shell_out).with("#{systemctl_path} --system is-active #{service_name_escaped} --quiet", {}).and_return(shell_out_failure)
319
321
  expect(provider.is_active?).to be false
320
322
  end
321
323
  end
@@ -328,12 +330,12 @@ describe Chef::Provider::Service::Systemd do
328
330
  end
329
331
 
330
332
  it "should return true if '#{systemctl_path} --system is-enabled service_name' returns 0" do
331
- expect(provider).to receive(:shell_out).with("#{systemctl_path} --system is-enabled #{service_name} --quiet", {}).and_return(shell_out_success)
333
+ expect(provider).to receive(:shell_out).with("#{systemctl_path} --system is-enabled #{service_name_escaped} --quiet", {}).and_return(shell_out_success)
332
334
  expect(provider.is_enabled?).to be true
333
335
  end
334
336
 
335
337
  it "should return false if '#{systemctl_path} --system is-enabled service_name' returns anything except 0" do
336
- expect(provider).to receive(:shell_out).with("#{systemctl_path} --system is-enabled #{service_name} --quiet", {}).and_return(shell_out_failure)
338
+ expect(provider).to receive(:shell_out).with("#{systemctl_path} --system is-enabled #{service_name_escaped} --quiet", {}).and_return(shell_out_failure)
337
339
  expect(provider.is_enabled?).to be false
338
340
  end
339
341
  end
@@ -346,22 +348,22 @@ describe Chef::Provider::Service::Systemd do
346
348
  end
347
349
 
348
350
  it "should return true if '#{systemctl_path} --system is-enabled service_name' returns 'masked' and returns anything except 0" do
349
- expect(provider).to receive(:shell_out).with("#{systemctl_path} --system is-enabled #{service_name}", {}).and_return(double(:stdout => "masked", :exitstatus => shell_out_failure))
351
+ expect(provider).to receive(:shell_out).with("#{systemctl_path} --system is-enabled #{service_name_escaped}", {}).and_return(double(:stdout => "masked", :exitstatus => shell_out_failure))
350
352
  expect(provider.is_masked?).to be true
351
353
  end
352
354
 
353
355
  it "should return true if '#{systemctl_path} --system is-enabled service_name' outputs 'masked-runtime' and returns anything except 0" do
354
- expect(provider).to receive(:shell_out).with("#{systemctl_path} --system is-enabled #{service_name}", {}).and_return(double(:stdout => "masked-runtime", :exitstatus => shell_out_failure))
356
+ expect(provider).to receive(:shell_out).with("#{systemctl_path} --system is-enabled #{service_name_escaped}", {}).and_return(double(:stdout => "masked-runtime", :exitstatus => shell_out_failure))
355
357
  expect(provider.is_masked?).to be true
356
358
  end
357
359
 
358
360
  it "should return false if '#{systemctl_path} --system is-enabled service_name' returns 0" do
359
- expect(provider).to receive(:shell_out).with("#{systemctl_path} --system is-enabled #{service_name}", {}).and_return(double(:stdout => "enabled", :exitstatus => shell_out_success))
361
+ expect(provider).to receive(:shell_out).with("#{systemctl_path} --system is-enabled #{service_name_escaped}", {}).and_return(double(:stdout => "enabled", :exitstatus => shell_out_success))
360
362
  expect(provider.is_masked?).to be false
361
363
  end
362
364
 
363
365
  it "should return false if '#{systemctl_path} --system is-enabled service_name' returns anything except 0 and outputs an error'" do
364
- expect(provider).to receive(:shell_out).with("#{systemctl_path} --system is-enabled #{service_name}", {}).and_return(double(:stdout => "Failed to get unit file state for #{service_name}: No such file or directory", :exitstatus => shell_out_failure))
366
+ expect(provider).to receive(:shell_out).with("#{systemctl_path} --system is-enabled #{service_name_escaped}", {}).and_return(double(:stdout => "Failed to get unit file state for #{service_name}: No such file or directory", :exitstatus => shell_out_failure))
365
367
  expect(provider.is_masked?).to be false
366
368
  end
367
369
  end
@@ -32,13 +32,14 @@ describe Chef::Provider::SystemdUnit do
32
32
 
33
33
  let(:events) { Chef::EventDispatch::Dispatcher.new }
34
34
  let(:run_context) { Chef::RunContext.new(node, {}, events) }
35
- let(:unit_name) { "sysstat-collect.timer" }
35
+ let(:unit_name) { "sysstat-collect\\x2d.timer" }
36
+ let(:unit_name_escaped) { "sysstat-collect\\\\x2d.timer" }
36
37
  let(:user_name) { "joe" }
37
38
  let(:current_resource) { Chef::Resource::SystemdUnit.new(unit_name) }
38
39
  let(:new_resource) { Chef::Resource::SystemdUnit.new(unit_name) }
39
40
  let(:provider) { Chef::Provider::SystemdUnit.new(new_resource, run_context) }
40
- let(:unit_path_system) { "/etc/systemd/system/sysstat-collect.timer" }
41
- let(:unit_path_user) { "/etc/systemd/user/sysstat-collect.timer" }
41
+ let(:unit_path_system) { "/etc/systemd/system/sysstat-collect\\x2d.timer" }
42
+ let(:unit_path_user) { "/etc/systemd/user/sysstat-collect\\x2d.timer" }
42
43
  let(:unit_content_string) { "[Unit]\nDescription = Run system activity accounting tool every 10 minutes\n\n[Timer]\nOnCalendar = *:00/10\n\n[Install]\nWantedBy = sysstat.service\n" }
43
44
  let(:malformed_content_string) { "derp" }
44
45
 
@@ -384,7 +385,7 @@ describe Chef::Provider::SystemdUnit do
384
385
  current_resource.user(user_name)
385
386
  current_resource.enabled(false)
386
387
  expect(provider).to receive(:shell_out_with_systems_locale!)
387
- .with("#{systemctl_path} --user enable #{unit_name}", user_cmd_opts)
388
+ .with("#{systemctl_path} --user enable #{unit_name_escaped}", user_cmd_opts)
388
389
  .and_return(shell_out_success)
389
390
  provider.action_enable
390
391
  end
@@ -407,7 +408,7 @@ describe Chef::Provider::SystemdUnit do
407
408
  current_resource.user(user_name)
408
409
  current_resource.enabled(true)
409
410
  expect(provider).to receive(:shell_out_with_systems_locale!)
410
- .with("#{systemctl_path} --user disable #{unit_name}", user_cmd_opts)
411
+ .with("#{systemctl_path} --user disable #{unit_name_escaped}", user_cmd_opts)
411
412
  .and_return(shell_out_success)
412
413
  provider.action_disable
413
414
  end
@@ -431,7 +432,7 @@ describe Chef::Provider::SystemdUnit do
431
432
  it "enables the unit when it is disabled" do
432
433
  current_resource.enabled(false)
433
434
  expect(provider).to receive(:shell_out_with_systems_locale!)
434
- .with("#{systemctl_path} --system enable #{unit_name}", {})
435
+ .with("#{systemctl_path} --system enable #{unit_name_escaped}", {})
435
436
  .and_return(shell_out_success)
436
437
  provider.action_enable
437
438
  end
@@ -451,7 +452,7 @@ describe Chef::Provider::SystemdUnit do
451
452
  it "disables the unit when it is enabled" do
452
453
  current_resource.enabled(true)
453
454
  expect(provider).to receive(:shell_out_with_systems_locale!)
454
- .with("#{systemctl_path} --system disable #{unit_name}", {})
455
+ .with("#{systemctl_path} --system disable #{unit_name_escaped}", {})
455
456
  .and_return(shell_out_success)
456
457
  provider.action_disable
457
458
  end
@@ -477,7 +478,7 @@ describe Chef::Provider::SystemdUnit do
477
478
  current_resource.user(user_name)
478
479
  current_resource.masked(false)
479
480
  expect(provider).to receive(:shell_out_with_systems_locale!)
480
- .with("#{systemctl_path} --user mask #{unit_name}", user_cmd_opts)
481
+ .with("#{systemctl_path} --user mask #{unit_name_escaped}", user_cmd_opts)
481
482
  .and_return(shell_out_success)
482
483
  provider.action_mask
483
484
  end
@@ -493,7 +494,7 @@ describe Chef::Provider::SystemdUnit do
493
494
  current_resource.user(user_name)
494
495
  current_resource.masked(true)
495
496
  expect(provider).to receive(:shell_out_with_systems_locale!)
496
- .with("#{systemctl_path} --user unmask #{unit_name}", user_cmd_opts)
497
+ .with("#{systemctl_path} --user unmask #{unit_name_escaped}", user_cmd_opts)
497
498
  .and_return(shell_out_success)
498
499
  provider.action_unmask
499
500
  end
@@ -510,7 +511,7 @@ describe Chef::Provider::SystemdUnit do
510
511
  it "masks the unit when it is unmasked" do
511
512
  current_resource.masked(false)
512
513
  expect(provider).to receive(:shell_out_with_systems_locale!)
513
- .with("#{systemctl_path} --system mask #{unit_name}", {})
514
+ .with("#{systemctl_path} --system mask #{unit_name_escaped}", {})
514
515
  .and_return(shell_out_success)
515
516
  provider.action_mask
516
517
  end
@@ -524,7 +525,7 @@ describe Chef::Provider::SystemdUnit do
524
525
  it "unmasks the unit when it is masked" do
525
526
  current_resource.masked(true)
526
527
  expect(provider).to receive(:shell_out_with_systems_locale!)
527
- .with("#{systemctl_path} --system unmask #{unit_name}", {})
528
+ .with("#{systemctl_path} --system unmask #{unit_name_escaped}", {})
528
529
  .and_return(shell_out_success)
529
530
  provider.action_unmask
530
531
  end
@@ -543,7 +544,7 @@ describe Chef::Provider::SystemdUnit do
543
544
  current_resource.user(user_name)
544
545
  current_resource.active(false)
545
546
  expect(provider).to receive(:shell_out_with_systems_locale!)
546
- .with("#{systemctl_path} --user start #{unit_name}", user_cmd_opts)
547
+ .with("#{systemctl_path} --user start #{unit_name_escaped}", user_cmd_opts)
547
548
  .and_return(shell_out_success)
548
549
  provider.action_start
549
550
  end
@@ -559,7 +560,7 @@ describe Chef::Provider::SystemdUnit do
559
560
  current_resource.user(user_name)
560
561
  current_resource.active(true)
561
562
  expect(provider).to receive(:shell_out_with_systems_locale!)
562
- .with("#{systemctl_path} --user stop #{unit_name}", user_cmd_opts)
563
+ .with("#{systemctl_path} --user stop #{unit_name_escaped}", user_cmd_opts)
563
564
  .and_return(shell_out_success)
564
565
  provider.action_stop
565
566
  end
@@ -576,7 +577,7 @@ describe Chef::Provider::SystemdUnit do
576
577
  it "starts the unit when it is inactive" do
577
578
  current_resource.active(false)
578
579
  expect(provider).to receive(:shell_out_with_systems_locale!)
579
- .with("#{systemctl_path} --system start #{unit_name}", {})
580
+ .with("#{systemctl_path} --system start #{unit_name_escaped}", {})
580
581
  .and_return(shell_out_success)
581
582
  provider.action_start
582
583
  end
@@ -590,7 +591,7 @@ describe Chef::Provider::SystemdUnit do
590
591
  it "stops the unit when it is active" do
591
592
  current_resource.active(true)
592
593
  expect(provider).to receive(:shell_out_with_systems_locale!)
593
- .with("#{systemctl_path} --system stop #{unit_name}", {})
594
+ .with("#{systemctl_path} --system stop #{unit_name_escaped}", {})
594
595
  .and_return(shell_out_success)
595
596
  provider.action_stop
596
597
  end
@@ -608,7 +609,7 @@ describe Chef::Provider::SystemdUnit do
608
609
  it "restarts the unit" do
609
610
  current_resource.user(user_name)
610
611
  expect(provider).to receive(:shell_out_with_systems_locale!)
611
- .with("#{systemctl_path} --user restart #{unit_name}", user_cmd_opts)
612
+ .with("#{systemctl_path} --user restart #{unit_name_escaped}", user_cmd_opts)
612
613
  .and_return(shell_out_success)
613
614
  provider.action_restart
614
615
  end
@@ -617,7 +618,7 @@ describe Chef::Provider::SystemdUnit do
617
618
  current_resource.user(user_name)
618
619
  current_resource.active(true)
619
620
  expect(provider).to receive(:shell_out_with_systems_locale!)
620
- .with("#{systemctl_path} --user reload #{unit_name}", user_cmd_opts)
621
+ .with("#{systemctl_path} --user reload #{unit_name_escaped}", user_cmd_opts)
621
622
  .and_return(shell_out_success)
622
623
  provider.action_reload
623
624
  end
@@ -633,7 +634,7 @@ describe Chef::Provider::SystemdUnit do
633
634
  context "when no user is specified" do
634
635
  it "restarts the unit" do
635
636
  expect(provider).to receive(:shell_out_with_systems_locale!)
636
- .with("#{systemctl_path} --system restart #{unit_name}", {})
637
+ .with("#{systemctl_path} --system restart #{unit_name_escaped}", {})
637
638
  .and_return(shell_out_success)
638
639
  provider.action_restart
639
640
  end
@@ -641,7 +642,7 @@ describe Chef::Provider::SystemdUnit do
641
642
  it "reloads the unit if active" do
642
643
  current_resource.active(true)
643
644
  expect(provider).to receive(:shell_out_with_systems_locale!)
644
- .with("#{systemctl_path} --system reload #{unit_name}", {})
645
+ .with("#{systemctl_path} --system reload #{unit_name_escaped}", {})
645
646
  .and_return(shell_out_success)
646
647
  provider.action_reload
647
648
  end
@@ -659,7 +660,7 @@ describe Chef::Provider::SystemdUnit do
659
660
  it "try-restarts the unit" do
660
661
  current_resource.user(user_name)
661
662
  expect(provider).to receive(:shell_out_with_systems_locale!)
662
- .with("#{systemctl_path} --user try-restart #{unit_name}", user_cmd_opts)
663
+ .with("#{systemctl_path} --user try-restart #{unit_name_escaped}", user_cmd_opts)
663
664
  .and_return(shell_out_success)
664
665
  provider.action_try_restart
665
666
  end
@@ -668,7 +669,7 @@ describe Chef::Provider::SystemdUnit do
668
669
  context "when no user is specified" do
669
670
  it "try-restarts the unit" do
670
671
  expect(provider).to receive(:shell_out_with_systems_locale!)
671
- .with("#{systemctl_path} --system try-restart #{unit_name}", {})
672
+ .with("#{systemctl_path} --system try-restart #{unit_name_escaped}", {})
672
673
  .and_return(shell_out_success)
673
674
  provider.action_try_restart
674
675
  end
@@ -680,7 +681,7 @@ describe Chef::Provider::SystemdUnit do
680
681
  it "reload-or-restarts the unit" do
681
682
  current_resource.user(user_name)
682
683
  expect(provider).to receive(:shell_out_with_systems_locale!)
683
- .with("#{systemctl_path} --user reload-or-restart #{unit_name}", user_cmd_opts)
684
+ .with("#{systemctl_path} --user reload-or-restart #{unit_name_escaped}", user_cmd_opts)
684
685
  .and_return(shell_out_success)
685
686
  provider.action_reload_or_restart
686
687
  end
@@ -689,7 +690,7 @@ describe Chef::Provider::SystemdUnit do
689
690
  context "when no user is specified" do
690
691
  it "reload-or-restarts the unit" do
691
692
  expect(provider).to receive(:shell_out_with_systems_locale!)
692
- .with("#{systemctl_path} --system reload-or-restart #{unit_name}", {})
693
+ .with("#{systemctl_path} --system reload-or-restart #{unit_name_escaped}", {})
693
694
  .and_return(shell_out_success)
694
695
  provider.action_reload_or_restart
695
696
  end
@@ -701,7 +702,7 @@ describe Chef::Provider::SystemdUnit do
701
702
  it "reload-or-try-restarts the unit" do
702
703
  current_resource.user(user_name)
703
704
  expect(provider).to receive(:shell_out_with_systems_locale!)
704
- .with("#{systemctl_path} --user reload-or-try-restart #{unit_name}", user_cmd_opts)
705
+ .with("#{systemctl_path} --user reload-or-try-restart #{unit_name_escaped}", user_cmd_opts)
705
706
  .and_return(shell_out_success)
706
707
  provider.action_reload_or_try_restart
707
708
  end
@@ -710,7 +711,7 @@ describe Chef::Provider::SystemdUnit do
710
711
  context "when no user is specified" do
711
712
  it "reload-or-try-restarts the unit" do
712
713
  expect(provider).to receive(:shell_out_with_systems_locale!)
713
- .with("#{systemctl_path} --system reload-or-try-restart #{unit_name}", {})
714
+ .with("#{systemctl_path} --system reload-or-try-restart #{unit_name_escaped}", {})
714
715
  .and_return(shell_out_success)
715
716
  provider.action_reload_or_try_restart
716
717
  end
@@ -727,7 +728,7 @@ describe Chef::Provider::SystemdUnit do
727
728
  it "returns true when unit is active" do
728
729
  current_resource.user(user_name)
729
730
  expect(provider).to receive(:shell_out)
730
- .with("#{systemctl_path} --user is-active #{unit_name}", user_cmd_opts)
731
+ .with("#{systemctl_path} --user is-active #{unit_name_escaped}", user_cmd_opts)
731
732
  .and_return(shell_out_success)
732
733
  expect(provider.active?).to be true
733
734
  end
@@ -735,7 +736,7 @@ describe Chef::Provider::SystemdUnit do
735
736
  it "returns false when unit is inactive" do
736
737
  current_resource.user(user_name)
737
738
  expect(provider).to receive(:shell_out)
738
- .with("#{systemctl_path} --user is-active #{unit_name}", user_cmd_opts)
739
+ .with("#{systemctl_path} --user is-active #{unit_name_escaped}", user_cmd_opts)
739
740
  .and_return(shell_out_failure)
740
741
  expect(provider.active?).to be false
741
742
  end
@@ -744,14 +745,14 @@ describe Chef::Provider::SystemdUnit do
744
745
  context "when no user is specified" do
745
746
  it "returns true when unit is active" do
746
747
  expect(provider).to receive(:shell_out)
747
- .with("#{systemctl_path} --system is-active #{unit_name}", {})
748
+ .with("#{systemctl_path} --system is-active #{unit_name_escaped}", {})
748
749
  .and_return(shell_out_success)
749
750
  expect(provider.active?).to be true
750
751
  end
751
752
 
752
753
  it "returns false when unit is not active" do
753
754
  expect(provider).to receive(:shell_out)
754
- .with("#{systemctl_path} --system is-active #{unit_name}", {})
755
+ .with("#{systemctl_path} --system is-active #{unit_name_escaped}", {})
755
756
  .and_return(shell_out_failure)
756
757
  expect(provider.active?).to be false
757
758
  end
@@ -768,7 +769,7 @@ describe Chef::Provider::SystemdUnit do
768
769
  it "returns true when unit is enabled" do
769
770
  current_resource.user(user_name)
770
771
  expect(provider).to receive(:shell_out)
771
- .with("#{systemctl_path} --user is-enabled #{unit_name}", user_cmd_opts)
772
+ .with("#{systemctl_path} --user is-enabled #{unit_name_escaped}", user_cmd_opts)
772
773
  .and_return(shell_out_success)
773
774
  expect(provider.enabled?).to be true
774
775
  end
@@ -776,7 +777,7 @@ describe Chef::Provider::SystemdUnit do
776
777
  it "returns false when unit is not enabled" do
777
778
  current_resource.user(user_name)
778
779
  expect(provider).to receive(:shell_out)
779
- .with("#{systemctl_path} --user is-enabled #{unit_name}", user_cmd_opts)
780
+ .with("#{systemctl_path} --user is-enabled #{unit_name_escaped}", user_cmd_opts)
780
781
  .and_return(shell_out_failure)
781
782
  expect(provider.enabled?).to be false
782
783
  end
@@ -785,14 +786,14 @@ describe Chef::Provider::SystemdUnit do
785
786
  context "when no user is specified" do
786
787
  it "returns true when unit is enabled" do
787
788
  expect(provider).to receive(:shell_out)
788
- .with("#{systemctl_path} --system is-enabled #{unit_name}", {})
789
+ .with("#{systemctl_path} --system is-enabled #{unit_name_escaped}", {})
789
790
  .and_return(shell_out_success)
790
791
  expect(provider.enabled?).to be true
791
792
  end
792
793
 
793
794
  it "returns false when unit is not enabled" do
794
795
  expect(provider).to receive(:shell_out)
795
- .with("#{systemctl_path} --system is-enabled #{unit_name}", {})
796
+ .with("#{systemctl_path} --system is-enabled #{unit_name_escaped}", {})
796
797
  .and_return(shell_out_failure)
797
798
  expect(provider.enabled?).to be false
798
799
  end
@@ -809,7 +810,7 @@ describe Chef::Provider::SystemdUnit do
809
810
  it "returns true when the unit is masked" do
810
811
  current_resource.user(user_name)
811
812
  expect(provider).to receive(:shell_out)
812
- .with("#{systemctl_path} --user status #{unit_name}", user_cmd_opts)
813
+ .with("#{systemctl_path} --user status #{unit_name_escaped}", user_cmd_opts)
813
814
  .and_return(shell_out_masked)
814
815
  expect(provider.masked?).to be true
815
816
  end
@@ -817,7 +818,7 @@ describe Chef::Provider::SystemdUnit do
817
818
  it "returns false when the unit is not masked" do
818
819
  current_resource.user(user_name)
819
820
  expect(provider).to receive(:shell_out)
820
- .with("#{systemctl_path} --user status #{unit_name}", user_cmd_opts)
821
+ .with("#{systemctl_path} --user status #{unit_name_escaped}", user_cmd_opts)
821
822
  .and_return(shell_out_static)
822
823
  expect(provider.masked?).to be false
823
824
  end
@@ -826,14 +827,14 @@ describe Chef::Provider::SystemdUnit do
826
827
  context "when no user is specified" do
827
828
  it "returns true when the unit is masked" do
828
829
  expect(provider).to receive(:shell_out)
829
- .with("#{systemctl_path} --system status #{unit_name}", {})
830
+ .with("#{systemctl_path} --system status #{unit_name_escaped}", {})
830
831
  .and_return(shell_out_masked)
831
832
  expect(provider.masked?).to be true
832
833
  end
833
834
 
834
835
  it "returns false when the unit is not masked" do
835
836
  expect(provider).to receive(:shell_out)
836
- .with("#{systemctl_path} --system status #{unit_name}", {})
837
+ .with("#{systemctl_path} --system status #{unit_name_escaped}", {})
837
838
  .and_return(shell_out_static)
838
839
  expect(provider.masked?).to be false
839
840
  end
@@ -850,7 +851,7 @@ describe Chef::Provider::SystemdUnit do
850
851
  it "returns true when the unit is static" do
851
852
  current_resource.user(user_name)
852
853
  expect(provider).to receive(:shell_out)
853
- .with("#{systemctl_path} --user is-enabled #{unit_name}", user_cmd_opts)
854
+ .with("#{systemctl_path} --user is-enabled #{unit_name_escaped}", user_cmd_opts)
854
855
  .and_return(shell_out_static)
855
856
  expect(provider.static?).to be true
856
857
  end
@@ -858,7 +859,7 @@ describe Chef::Provider::SystemdUnit do
858
859
  it "returns false when the unit is not static" do
859
860
  current_resource.user(user_name)
860
861
  expect(provider).to receive(:shell_out)
861
- .with("#{systemctl_path} --user is-enabled #{unit_name}", user_cmd_opts)
862
+ .with("#{systemctl_path} --user is-enabled #{unit_name_escaped}", user_cmd_opts)
862
863
  .and_return(shell_out_masked)
863
864
  expect(provider.static?).to be false
864
865
  end
@@ -867,14 +868,14 @@ describe Chef::Provider::SystemdUnit do
867
868
  context "when no user is specified" do
868
869
  it "returns true when the unit is static" do
869
870
  expect(provider).to receive(:shell_out)
870
- .with("#{systemctl_path} --system is-enabled #{unit_name}", {})
871
+ .with("#{systemctl_path} --system is-enabled #{unit_name_escaped}", {})
871
872
  .and_return(shell_out_static)
872
873
  expect(provider.static?).to be true
873
874
  end
874
875
 
875
876
  it "returns false when the unit is not static" do
876
877
  expect(provider).to receive(:shell_out)
877
- .with("#{systemctl_path} --system is-enabled #{unit_name}", {})
878
+ .with("#{systemctl_path} --system is-enabled #{unit_name_escaped}", {})
878
879
  .and_return(shell_out_masked)
879
880
  expect(provider.static?).to be false
880
881
  end