puppet 6.13.0-x64-mingw32 → 6.18.0-x64-mingw32
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of puppet might be problematic. Click here for more details.
- checksums.yaml +4 -4
- data/CODEOWNERS +2 -7
- data/CONTRIBUTING.md +7 -13
- data/Gemfile +4 -2
- data/Gemfile.lock +36 -32
- data/README.md +17 -24
- data/ext/windows/service/daemon.rb +3 -3
- data/lib/puppet.rb +33 -9
- data/lib/puppet/agent.rb +20 -14
- data/lib/puppet/application/agent.rb +26 -17
- data/lib/puppet/application/apply.rb +18 -20
- data/lib/puppet/application/describe.rb +7 -5
- data/lib/puppet/application/device.rb +2 -2
- data/lib/puppet/application/filebucket.rb +19 -15
- data/lib/puppet/application/lookup.rb +16 -4
- data/lib/puppet/application/plugin.rb +1 -0
- data/lib/puppet/application/ssl.rb +4 -4
- data/lib/puppet/configurer.rb +58 -57
- data/lib/puppet/configurer/downloader.rb +31 -10
- data/lib/puppet/configurer/plugin_handler.rb +10 -1
- data/lib/puppet/confine.rb +2 -2
- data/lib/puppet/confine/any.rb +1 -1
- data/lib/puppet/context/trusted_information.rb +14 -8
- data/lib/puppet/daemon.rb +13 -27
- data/lib/puppet/defaults.rb +92 -12
- data/lib/puppet/environments.rb +4 -5
- data/lib/puppet/face/facts.rb +1 -1
- data/lib/puppet/face/help.rb +29 -3
- data/lib/puppet/face/module/search.rb +5 -0
- data/lib/puppet/face/plugin.rb +2 -2
- data/lib/puppet/feature/base.rb +1 -1
- data/lib/puppet/file_serving/http_metadata.rb +14 -2
- data/lib/puppet/file_serving/metadata.rb +4 -1
- data/lib/puppet/file_serving/mount/locales.rb +1 -2
- data/lib/puppet/file_serving/mount/pluginfacts.rb +1 -2
- data/lib/puppet/file_serving/mount/plugins.rb +1 -2
- data/lib/puppet/file_serving/terminus_selector.rb +7 -8
- data/lib/puppet/file_system/file_impl.rb +17 -13
- data/lib/puppet/file_system/uniquefile.rb +12 -16
- data/lib/puppet/forge.rb +1 -1
- data/lib/puppet/forge/cache.rb +1 -1
- data/lib/puppet/forge/repository.rb +4 -7
- data/lib/puppet/functions/call.rb +1 -1
- data/lib/puppet/functions/eyaml_lookup_key.rb +13 -8
- data/lib/puppet/functions/filter.rb +1 -0
- data/lib/puppet/functions/lstrip.rb +4 -4
- data/lib/puppet/functions/reduce.rb +2 -4
- data/lib/puppet/functions/reverse_each.rb +1 -1
- data/lib/puppet/functions/rstrip.rb +4 -4
- data/lib/puppet/functions/step.rb +1 -1
- data/lib/puppet/functions/strip.rb +4 -4
- data/lib/puppet/gettext/config.rb +5 -5
- data/lib/puppet/gettext/module_translations.rb +4 -4
- data/lib/puppet/http.rb +3 -0
- data/lib/puppet/http/client.rb +263 -73
- data/lib/puppet/http/external_client.rb +90 -0
- data/lib/puppet/http/redirector.rb +43 -7
- data/lib/puppet/http/resolver.rb +46 -3
- data/lib/puppet/http/resolver/server_list.rb +76 -16
- data/lib/puppet/http/resolver/settings.rb +23 -3
- data/lib/puppet/http/resolver/srv.rb +29 -3
- data/lib/puppet/http/response.rb +87 -1
- data/lib/puppet/http/retry_after_handler.rb +39 -0
- data/lib/puppet/http/service.rb +97 -12
- data/lib/puppet/http/service/ca.rb +76 -14
- data/lib/puppet/http/service/compiler.rb +249 -16
- data/lib/puppet/http/service/file_server.rb +141 -20
- data/lib/puppet/http/service/report.rb +47 -17
- data/lib/puppet/http/session.rb +96 -7
- data/lib/puppet/indirector.rb +1 -1
- data/lib/puppet/indirector/catalog/rest.rb +34 -0
- data/lib/puppet/indirector/exec.rb +1 -1
- data/lib/puppet/indirector/facts/facter.rb +3 -3
- data/lib/puppet/indirector/facts/rest.rb +42 -0
- data/lib/puppet/indirector/file_bucket_file/rest.rb +48 -0
- data/lib/puppet/indirector/file_content/http.rb +5 -0
- data/lib/puppet/indirector/file_content/rest.rb +30 -0
- data/lib/puppet/indirector/file_metadata/http.rb +28 -8
- data/lib/puppet/indirector/file_metadata/rest.rb +52 -0
- data/lib/puppet/indirector/hiera.rb +4 -0
- data/lib/puppet/indirector/indirection.rb +1 -1
- data/lib/puppet/indirector/node/rest.rb +24 -0
- data/lib/puppet/indirector/report/processor.rb +2 -2
- data/lib/puppet/indirector/report/rest.rb +19 -0
- data/lib/puppet/indirector/report/yaml.rb +23 -0
- data/lib/puppet/indirector/request.rb +1 -1
- data/lib/puppet/indirector/rest.rb +12 -0
- data/lib/puppet/indirector/status/rest.rb +18 -0
- data/lib/puppet/loaders.rb +6 -0
- data/lib/puppet/metatype/manager.rb +80 -80
- data/lib/puppet/module.rb +1 -2
- data/lib/puppet/network/format_support.rb +2 -2
- data/lib/puppet/network/http/api/indirected_routes.rb +1 -1
- data/lib/puppet/network/http/api/master/v3/environment.rb +3 -0
- data/lib/puppet/network/http/base_pool.rb +7 -2
- data/lib/puppet/network/http/compression.rb +7 -0
- data/lib/puppet/network/http/connection.rb +2 -0
- data/lib/puppet/network/http/connection_adapter.rb +184 -0
- data/lib/puppet/network/http/nocache_pool.rb +1 -0
- data/lib/puppet/network/http/pool.rb +8 -5
- data/lib/puppet/network/http/route.rb +2 -2
- data/lib/puppet/network/http_pool.rb +2 -1
- data/lib/puppet/node/environment.rb +22 -5
- data/lib/puppet/pal/catalog_compiler.rb +5 -0
- data/lib/puppet/pal/pal_impl.rb +30 -31
- data/lib/puppet/parameter.rb +1 -1
- data/lib/puppet/parser/ast/leaf.rb +5 -5
- data/lib/puppet/parser/ast/pops_bridge.rb +0 -4
- data/lib/puppet/parser/compiler.rb +43 -33
- data/lib/puppet/parser/compiler/catalog_validator/env_relationship_validator.rb +2 -0
- data/lib/puppet/parser/compiler/catalog_validator/site_validator.rb +2 -0
- data/lib/puppet/parser/environment_compiler.rb +4 -1
- data/lib/puppet/parser/functions.rb +18 -9
- data/lib/puppet/parser/functions/create_resources.rb +11 -7
- data/lib/puppet/parser/functions/filter.rb +1 -0
- data/lib/puppet/parser/resource.rb +3 -2
- data/lib/puppet/parser/resource/param.rb +6 -0
- data/lib/puppet/parser/type_loader.rb +2 -2
- data/lib/puppet/pops/adaptable.rb +7 -13
- data/lib/puppet/pops/adapters.rb +8 -4
- data/lib/puppet/pops/evaluator/evaluator_impl.rb +5 -5
- data/lib/puppet/pops/issues.rb +5 -0
- data/lib/puppet/pops/loader/runtime3_type_loader.rb +4 -2
- data/lib/puppet/pops/loaders.rb +24 -15
- data/lib/puppet/pops/lookup/context.rb +1 -1
- data/lib/puppet/pops/lookup/hiera_config.rb +14 -1
- data/lib/puppet/pops/resource/resource_type_impl.rb +2 -0
- data/lib/puppet/pops/types/iterable.rb +34 -8
- data/lib/puppet/pops/validation/checker4_0.rb +29 -15
- data/lib/puppet/pops/validation/validator_factory_4_0.rb +1 -0
- data/lib/puppet/provider/file/windows.rb +1 -1
- data/lib/puppet/provider/group/groupadd.rb +9 -4
- data/lib/puppet/provider/group/windows_adsi.rb +3 -3
- data/lib/puppet/provider/package/aix.rb +17 -2
- data/lib/puppet/provider/package/apt.rb +98 -1
- data/lib/puppet/provider/package/aptitude.rb +1 -1
- data/lib/puppet/provider/package/dnfmodule.rb +61 -14
- data/lib/puppet/provider/package/gem.rb +45 -9
- data/lib/puppet/provider/package/pacman.rb +2 -5
- data/lib/puppet/provider/package/pip.rb +143 -48
- data/lib/puppet/provider/package/pip3.rb +0 -2
- data/lib/puppet/provider/package/pkgdmg.rb +1 -1
- data/lib/puppet/provider/package/pkgng.rb +16 -4
- data/lib/puppet/provider/package/portage.rb +2 -2
- data/lib/puppet/provider/package/puppet_gem.rb +11 -2
- data/lib/puppet/provider/package/rpm.rb +6 -213
- data/lib/puppet/provider/package/yum.rb +100 -20
- data/lib/puppet/provider/package/zypper.rb +62 -1
- data/lib/puppet/provider/service/systemd.rb +22 -4
- data/lib/puppet/provider/service/windows.rb +23 -7
- data/lib/puppet/provider/user/aix.rb +1 -1
- data/lib/puppet/provider/user/user_role_add.rb +1 -1
- data/lib/puppet/provider/user/useradd.rb +16 -5
- data/lib/puppet/provider/user/windows_adsi.rb +18 -1
- data/lib/puppet/reports/http.rb +15 -9
- data/lib/puppet/resource.rb +2 -1
- data/lib/puppet/resource/type.rb +8 -0
- data/lib/puppet/resource/type_collection.rb +20 -16
- data/lib/puppet/runtime.rb +31 -1
- data/lib/puppet/settings.rb +3 -1
- data/lib/puppet/settings/http_extra_headers_setting.rb +25 -0
- data/lib/puppet/ssl.rb +1 -0
- data/lib/puppet/ssl/host.rb +4 -4
- data/lib/puppet/ssl/oids.rb +1 -0
- data/lib/puppet/ssl/ssl_context.rb +2 -2
- data/lib/puppet/ssl/ssl_provider.rb +20 -1
- data/lib/puppet/ssl/state_machine.rb +81 -35
- data/lib/puppet/ssl/validator/default_validator.rb +1 -1
- data/lib/puppet/ssl/verifier_adapter.rb +9 -1
- data/lib/puppet/test/test_helper.rb +21 -14
- data/lib/puppet/transaction.rb +2 -2
- data/lib/puppet/transaction/persistence.rb +1 -1
- data/lib/puppet/transaction/report.rb +3 -3
- data/lib/puppet/trusted_external.rb +29 -1
- data/lib/puppet/type.rb +21 -8
- data/lib/puppet/type/file.rb +51 -13
- data/lib/puppet/type/file/checksum.rb +4 -4
- data/lib/puppet/type/file/source.rb +75 -64
- data/lib/puppet/type/notify.rb +2 -2
- data/lib/puppet/type/package.rb +41 -3
- data/lib/puppet/type/service.rb +59 -8
- data/lib/puppet/type/user.rb +19 -29
- data/lib/puppet/util.rb +41 -3
- data/lib/puppet/util/at_fork.rb +1 -1
- data/lib/puppet/util/autoload.rb +13 -25
- data/lib/puppet/util/character_encoding.rb +9 -5
- data/lib/puppet/util/checksums.rb +19 -4
- data/lib/puppet/util/execution.rb +2 -2
- data/lib/puppet/util/fileparsing.rb +2 -2
- data/lib/puppet/util/instance_loader.rb +14 -10
- data/lib/puppet/util/log/destinations.rb +1 -10
- data/lib/puppet/util/package/version/debian.rb +175 -0
- data/lib/puppet/util/package/version/gem.rb +15 -0
- data/lib/puppet/util/package/version/pip.rb +167 -0
- data/lib/puppet/util/package/version/range.rb +53 -0
- data/lib/puppet/util/package/version/range/eq.rb +14 -0
- data/lib/puppet/util/package/version/range/gt.rb +14 -0
- data/lib/puppet/util/package/version/range/gt_eq.rb +14 -0
- data/lib/puppet/util/package/version/range/lt.rb +14 -0
- data/lib/puppet/util/package/version/range/lt_eq.rb +14 -0
- data/lib/puppet/util/package/version/range/min_max.rb +21 -0
- data/lib/puppet/util/package/version/range/simple.rb +11 -0
- data/lib/puppet/util/package/version/rpm.rb +73 -0
- data/lib/puppet/util/pidlock.rb +13 -7
- data/lib/puppet/util/platform.rb +5 -0
- data/lib/puppet/util/provider_features.rb +1 -1
- data/lib/puppet/util/reference.rb +1 -1
- data/lib/puppet/util/rpm_compare.rb +193 -0
- data/lib/puppet/util/windows.rb +1 -0
- data/lib/puppet/util/windows/adsi.rb +2 -2
- data/lib/puppet/util/windows/api_types.rb +60 -33
- data/lib/puppet/util/windows/eventlog.rb +1 -6
- data/lib/puppet/util/windows/monkey_patches/dir.rb +40 -0
- data/lib/puppet/util/windows/principal.rb +8 -6
- data/lib/puppet/util/windows/process.rb +15 -14
- data/lib/puppet/util/windows/registry.rb +11 -11
- data/lib/puppet/util/windows/security.rb +5 -4
- data/lib/puppet/util/windows/service.rb +43 -26
- data/lib/puppet/util/windows/sid.rb +3 -3
- data/lib/puppet/util/windows/user.rb +242 -8
- data/lib/puppet/version.rb +1 -1
- data/locales/puppet.pot +641 -511
- data/man/man5/puppet.conf.5 +75 -10
- data/man/man8/puppet-agent.8 +7 -7
- data/man/man8/puppet-apply.8 +1 -1
- data/man/man8/puppet-catalog.8 +1 -1
- data/man/man8/puppet-config.8 +1 -1
- data/man/man8/puppet-describe.8 +1 -1
- data/man/man8/puppet-device.8 +2 -2
- data/man/man8/puppet-doc.8 +1 -1
- data/man/man8/puppet-epp.8 +1 -1
- data/man/man8/puppet-facts.8 +1 -1
- data/man/man8/puppet-filebucket.8 +17 -2
- data/man/man8/puppet-generate.8 +1 -1
- data/man/man8/puppet-help.8 +6 -3
- data/man/man8/puppet-key.8 +1 -1
- data/man/man8/puppet-lookup.8 +2 -2
- data/man/man8/puppet-man.8 +1 -1
- data/man/man8/puppet-module.8 +4 -1
- data/man/man8/puppet-node.8 +1 -1
- data/man/man8/puppet-parser.8 +1 -1
- data/man/man8/puppet-plugin.8 +1 -1
- data/man/man8/puppet-report.8 +1 -1
- data/man/man8/puppet-resource.8 +1 -1
- data/man/man8/puppet-script.8 +1 -1
- data/man/man8/puppet-ssl.8 +2 -2
- data/man/man8/puppet-status.8 +1 -1
- data/man/man8/puppet.8 +2 -2
- data/spec/fixtures/integration/application/apply/environments/spec/modules/amod/lib/puppet/provider/applytest/applytest.rb +2 -0
- data/spec/fixtures/integration/application/apply/environments/spec/modules/amod/lib/puppet/type/applytest.rb +25 -0
- data/spec/fixtures/ssl/unknown-127.0.0.1-key.pem +67 -0
- data/spec/fixtures/ssl/unknown-127.0.0.1.pem +48 -0
- data/spec/fixtures/ssl/unknown-ca-key.pem +67 -0
- data/spec/fixtures/ssl/unknown-ca.pem +59 -0
- data/spec/fixtures/unit/forge/bacula-releases.json +128 -0
- data/spec/fixtures/unit/forge/bacula.tar.gz +0 -0
- data/spec/fixtures/unit/provider/package/dnfmodule/{dnf-module-list-installed.txt → dnf-module-list.txt} +8 -0
- data/spec/fixtures/unit/provider/package/pkgng/pkg.version +2 -0
- data/spec/fixtures/unit/provider/package/yum/yum-check-update-subscription-manager.txt +9 -0
- data/spec/fixtures/unit/provider/package/zypper/zypper-search-uninstalled.out +13 -0
- data/spec/fixtures/unit/provider/service/systemd/list_unit_files_services +9 -0
- data/spec/fixtures/vcr/cassettes/Puppet_Type_File/when_sourcing/from_http/using_md5/should_fetch_if_not_on_the_local_disk.yml +1 -67
- data/spec/fixtures/vcr/cassettes/Puppet_Type_File/when_sourcing/from_http/using_md5/should_not_update_if_content_on_disk_is_up-to-date.yml +1 -69
- data/spec/fixtures/vcr/cassettes/Puppet_Type_File/when_sourcing/from_http/using_md5/should_update_if_content_differs_on_disk.yml +1 -69
- data/spec/fixtures/vcr/cassettes/Puppet_Type_File/when_sourcing/from_http/using_mtime/should_fetch_if_mtime_is_older_on_disk.yml +1 -67
- data/spec/fixtures/vcr/cassettes/Puppet_Type_File/when_sourcing/from_http/using_mtime/should_fetch_if_no_header_specified.yml +1 -65
- data/spec/fixtures/vcr/cassettes/Puppet_Type_File/when_sourcing/from_http/using_mtime/should_fetch_if_not_on_the_local_disk.yml +1 -67
- data/spec/fixtures/vcr/cassettes/Puppet_Type_File/when_sourcing/from_http/using_mtime/should_not_update_if_mtime_is_newer_on_disk.yml +1 -67
- data/spec/integration/application/agent_spec.rb +475 -0
- data/spec/integration/application/apply_spec.rb +279 -150
- data/spec/integration/application/config_spec.rb +74 -0
- data/spec/integration/application/doc_spec.rb +16 -6
- data/spec/integration/application/filebucket_spec.rb +239 -0
- data/spec/integration/application/help_spec.rb +42 -0
- data/spec/integration/application/lookup_spec.rb +13 -0
- data/spec/integration/application/module_spec.rb +68 -0
- data/spec/integration/application/plugin_spec.rb +123 -0
- data/spec/integration/data_binding_spec.rb +82 -0
- data/spec/integration/defaults_spec.rb +1 -2
- data/spec/integration/directory_environments_spec.rb +17 -17
- data/spec/integration/http/client_spec.rb +47 -37
- data/spec/integration/indirector/facts/facter_spec.rb +8 -6
- data/spec/integration/indirector/report/yaml.rb +83 -0
- data/spec/integration/network/http_pool_spec.rb +93 -20
- data/spec/integration/node/environment_spec.rb +15 -0
- data/spec/integration/parser/compiler_spec.rb +11 -0
- data/spec/integration/type/file_spec.rb +1 -1
- data/spec/integration/util/execution_spec.rb +22 -0
- data/spec/integration/util/windows/adsi_spec.rb +6 -1
- data/spec/integration/util/windows/monkey_patches/dir_spec.rb +11 -0
- data/spec/integration/util/windows/process_spec.rb +26 -32
- data/spec/integration/util/windows/registry_spec.rb +7 -7
- data/spec/integration/util/windows/user_spec.rb +47 -5
- data/spec/integration/util_spec.rb +7 -33
- data/spec/lib/puppet/test_ca.rb +2 -2
- data/spec/lib/puppet_spec/https.rb +16 -7
- data/spec/lib/puppet_spec/matchers.rb +0 -80
- data/spec/lib/puppet_spec/puppetserver.rb +127 -0
- data/spec/shared_contexts/https.rb +29 -0
- data/spec/unit/agent_spec.rb +80 -26
- data/spec/unit/application/agent_spec.rb +12 -9
- data/spec/unit/application/describe_spec.rb +88 -50
- data/spec/unit/application/device_spec.rb +2 -2
- data/spec/unit/application/face_base_spec.rb +6 -4
- data/spec/unit/application/facts_spec.rb +39 -10
- data/spec/unit/application/filebucket_spec.rb +22 -2
- data/spec/unit/application/man_spec.rb +52 -0
- data/spec/unit/application/resource_spec.rb +3 -1
- data/spec/unit/application/ssl_spec.rb +15 -2
- data/spec/unit/configurer/downloader_spec.rb +10 -0
- data/spec/unit/configurer/fact_handler_spec.rb +4 -4
- data/spec/unit/configurer/plugin_handler_spec.rb +36 -19
- data/spec/unit/configurer_spec.rb +64 -46
- data/spec/unit/confine_spec.rb +2 -1
- data/spec/unit/context/trusted_information_spec.rb +25 -2
- data/spec/unit/daemon_spec.rb +5 -64
- data/spec/unit/defaults_spec.rb +24 -1
- data/spec/unit/environments_spec.rb +8 -0
- data/spec/unit/face/config_spec.rb +3 -1
- data/spec/unit/face/module/search_spec.rb +17 -0
- data/spec/unit/face/plugin_spec.rb +12 -10
- data/spec/unit/file_serving/http_metadata_spec.rb +37 -14
- data/spec/unit/file_serving/mount/locales_spec.rb +2 -2
- data/spec/unit/file_serving/mount/pluginfacts_spec.rb +2 -2
- data/spec/unit/file_serving/mount/plugins_spec.rb +2 -2
- data/spec/unit/file_serving/terminus_selector_spec.rb +45 -26
- data/spec/unit/file_system/uniquefile_spec.rb +29 -0
- data/spec/unit/file_system_spec.rb +10 -0
- data/spec/unit/functions/lookup_spec.rb +13 -0
- data/spec/unit/http/client_spec.rb +321 -36
- data/spec/unit/http/external_client_spec.rb +201 -0
- data/spec/unit/http/resolver_spec.rb +34 -3
- data/spec/unit/http/response_spec.rb +75 -0
- data/spec/unit/http/service/ca_spec.rb +53 -12
- data/spec/unit/http/service/compiler_spec.rb +332 -28
- data/spec/unit/http/service/file_server_spec.rb +100 -12
- data/spec/unit/http/service/report_spec.rb +19 -9
- data/spec/unit/http/service_spec.rb +94 -6
- data/spec/unit/http/session_spec.rb +159 -8
- data/spec/unit/indirector/catalog/compiler_spec.rb +1 -0
- data/spec/unit/indirector/catalog/rest_spec.rb +59 -2
- data/spec/unit/indirector/facts/rest_spec.rb +79 -24
- data/spec/unit/indirector/file_bucket_file/rest_spec.rb +82 -2
- data/spec/unit/indirector/file_content/rest_spec.rb +53 -2
- data/spec/unit/indirector/file_metadata/http_spec.rb +194 -0
- data/spec/unit/indirector/file_metadata/rest_spec.rb +110 -2
- data/spec/unit/indirector/node/rest_spec.rb +57 -2
- data/spec/unit/indirector/report/rest_spec.rb +58 -51
- data/spec/unit/indirector/request_spec.rb +1 -1
- data/spec/unit/indirector/resource/ral_spec.rb +7 -8
- data/spec/unit/indirector/rest_spec.rb +13 -0
- data/spec/unit/indirector/status/rest_spec.rb +43 -2
- data/spec/unit/interface_spec.rb +3 -3
- data/spec/unit/module_tool/tar/mini_spec.rb +20 -0
- data/spec/unit/network/format_support_spec.rb +3 -2
- data/spec/unit/network/http/api/indirected_routes_spec.rb +2 -1
- data/spec/unit/network/http/connection_spec.rb +552 -190
- data/spec/unit/network/http/nocache_pool_spec.rb +22 -0
- data/spec/unit/network/http/pool_spec.rb +59 -13
- data/spec/unit/network/http_pool_spec.rb +63 -57
- data/spec/unit/network/http_spec.rb +1 -1
- data/spec/unit/node/environment_spec.rb +33 -0
- data/spec/unit/parser/ast/block_expression_spec.rb +1 -1
- data/spec/unit/parser/environment_compiler_spec.rb +7 -0
- data/spec/unit/parser/scope_spec.rb +1 -1
- data/spec/unit/pops/evaluator/evaluating_parser_spec.rb +15 -1
- data/spec/unit/pops/loaders/loaders_spec.rb +71 -1
- data/spec/unit/pops/lookup/lookup_spec.rb +25 -0
- data/spec/unit/pops/types/type_calculator_spec.rb +1 -11
- data/spec/unit/provider/group/groupadd_spec.rb +22 -8
- data/spec/unit/provider/group/windows_adsi_spec.rb +43 -10
- data/spec/unit/provider/package/aix_spec.rb +29 -0
- data/spec/unit/provider/package/apt_spec.rb +107 -0
- data/spec/unit/provider/package/aptitude_spec.rb +1 -0
- data/spec/unit/provider/package/dnfmodule_spec.rb +54 -15
- data/spec/unit/provider/package/gem_spec.rb +40 -0
- data/spec/unit/provider/package/pacman_spec.rb +6 -21
- data/spec/unit/provider/package/pip_spec.rb +68 -19
- data/spec/unit/provider/package/pkgdmg_spec.rb +1 -1
- data/spec/unit/provider/package/pkgng_spec.rb +38 -0
- data/spec/unit/provider/package/portage_spec.rb +5 -0
- data/spec/unit/provider/package/puppet_gem_spec.rb +12 -1
- data/spec/unit/provider/package/rpm_spec.rb +0 -212
- data/spec/unit/provider/package/yum_spec.rb +243 -1
- data/spec/unit/provider/package/zypper_spec.rb +98 -0
- data/spec/unit/provider/service/init_spec.rb +42 -0
- data/spec/unit/provider/service/openbsd_spec.rb +9 -0
- data/spec/unit/provider/service/openwrt_spec.rb +1 -0
- data/spec/unit/provider/service/redhat_spec.rb +9 -0
- data/spec/unit/provider/service/systemd_spec.rb +93 -18
- data/spec/unit/provider/service/windows_spec.rb +50 -14
- data/spec/unit/provider/user/openbsd_spec.rb +1 -0
- data/spec/unit/provider/user/useradd_spec.rb +30 -16
- data/spec/unit/provider/user/windows_adsi_spec.rb +85 -3
- data/spec/unit/puppet_pal_2pec.rb +11 -0
- data/spec/unit/puppet_pal_catalog_spec.rb +43 -0
- data/spec/unit/puppet_spec.rb +33 -0
- data/spec/unit/reports/http_spec.rb +70 -52
- data/spec/unit/reports/store_spec.rb +17 -13
- data/spec/unit/resource_spec.rb +3 -3
- data/spec/unit/settings/autosign_setting_spec.rb +1 -1
- data/spec/unit/settings/http_extra_headers_spec.rb +64 -0
- data/spec/unit/ssl/host_spec.rb +4 -2
- data/spec/unit/ssl/oids_spec.rb +1 -0
- data/spec/unit/ssl/ssl_provider_spec.rb +69 -43
- data/spec/unit/ssl/state_machine_spec.rb +99 -13
- data/spec/unit/test/test_helper_spec.rb +17 -0
- data/spec/unit/transaction/persistence_spec.rb +15 -0
- data/spec/unit/transaction/report_spec.rb +5 -1
- data/spec/unit/transaction_spec.rb +0 -2
- data/spec/unit/type/file/ensure_spec.rb +1 -2
- data/spec/unit/type/file/source_spec.rb +89 -38
- data/spec/unit/type/file_spec.rb +122 -96
- data/spec/unit/type/service_spec.rb +218 -8
- data/spec/unit/type/user_spec.rb +32 -3
- data/spec/unit/type_spec.rb +50 -0
- data/spec/unit/util/at_fork_spec.rb +3 -2
- data/spec/unit/util/autoload_spec.rb +2 -1
- data/spec/unit/util/character_encoding_spec.rb +4 -4
- data/spec/unit/util/checksums_spec.rb +16 -0
- data/spec/unit/util/command_line_spec.rb +11 -6
- data/spec/unit/util/log/destinations_spec.rb +1 -29
- data/spec/unit/util/package/version/debian_spec.rb +83 -0
- data/spec/unit/util/package/version/pip_spec.rb +464 -0
- data/spec/unit/util/package/version/range_spec.rb +175 -0
- data/spec/unit/util/package/version/rpm_spec.rb +121 -0
- data/spec/unit/util/pidlock_spec.rb +102 -54
- data/spec/unit/util/rpm_compare_spec.rb +196 -0
- data/spec/unit/util/windows/adsi_spec.rb +4 -4
- data/spec/unit/util/windows/api_types_spec.rb +104 -40
- data/spec/unit/util/windows/service_spec.rb +4 -4
- data/spec/unit/util/windows/sid_spec.rb +2 -2
- data/spec/unit/util_spec.rb +3 -3
- data/spec/unit/x509/cert_provider_spec.rb +1 -1
- data/tasks/generate_cert_fixtures.rake +15 -1
- data/tasks/manpages.rake +5 -35
- metadata +84 -52
- data/COMMITTERS.md +0 -244
- data/spec/integration/faces/config_spec.rb +0 -91
- data/spec/integration/faces/documentation_spec.rb +0 -57
- data/spec/integration/faces/plugin_spec.rb +0 -61
- data/spec/integration/file_bucket/file_spec.rb +0 -50
- data/spec/integration/file_serving/content_spec.rb +0 -7
- data/spec/integration/file_serving/fileset_spec.rb +0 -12
- data/spec/integration/file_serving/metadata_spec.rb +0 -8
- data/spec/integration/file_serving/terminus_helper_spec.rb +0 -20
- data/spec/integration/file_system/uniquefile_spec.rb +0 -26
- data/spec/integration/module_tool/forge_spec.rb +0 -64
- data/spec/integration/module_tool/tar/mini_spec.rb +0 -28
- data/spec/integration/provider/service/init_spec.rb +0 -48
- data/spec/integration/provider/service/systemd_spec.rb +0 -25
- data/spec/integration/provider/service/windows_spec.rb +0 -50
- data/spec/integration/reference/providers_spec.rb +0 -21
- data/spec/integration/reports_spec.rb +0 -13
- data/spec/integration/ssl/certificate_request_spec.rb +0 -44
- data/spec/integration/ssl/host_spec.rb +0 -72
- data/spec/integration/ssl/key_spec.rb +0 -99
- data/spec/integration/test/test_helper_spec.rb +0 -31
- data/spec/shared_behaviours/file_serving_model.rb +0 -51
- data/spec/unit/face/man_spec.rb +0 -25
- data/spec/unit/man_spec.rb +0 -31
| @@ -6,53 +6,57 @@ require 'pathname' | |
| 6 6 | 
             
            require 'tempfile'
         | 
| 7 7 | 
             
            require 'fileutils'
         | 
| 8 8 |  | 
| 9 | 
            -
             | 
| 10 | 
            -
             | 
| 11 | 
            -
            describe processor do
         | 
| 9 | 
            +
            describe Puppet::Reports.report(:store) do
         | 
| 12 10 | 
             
              describe "#process" do
         | 
| 13 11 | 
             
                include PuppetSpec::Files
         | 
| 12 | 
            +
             | 
| 14 13 | 
             
                before :each do
         | 
| 15 14 | 
             
                  Puppet[:reportdir] = File.join(tmpdir('reports'), 'reports')
         | 
| 16 | 
            -
             | 
| 15 | 
            +
                end
         | 
| 16 | 
            +
             | 
| 17 | 
            +
                let(:report) do
         | 
| 18 | 
            +
                  report = YAML.load_file(File.join(PuppetSpec::FIXTURE_DIR, 'yaml/report2.6.x.yaml'))
         | 
| 19 | 
            +
                  report.extend(described_class)
         | 
| 20 | 
            +
                  report
         | 
| 17 21 | 
             
                end
         | 
| 18 22 |  | 
| 19 23 | 
             
                it "should create a report directory for the client if one doesn't exist" do
         | 
| 20 | 
            -
                   | 
| 24 | 
            +
                  report.process
         | 
| 21 25 |  | 
| 22 | 
            -
                  expect(File).to be_directory(File.join(Puppet[:reportdir],  | 
| 26 | 
            +
                  expect(File).to be_directory(File.join(Puppet[:reportdir], report.host))
         | 
| 23 27 | 
             
                end
         | 
| 24 28 |  | 
| 25 29 | 
             
                it "should write the report to the file in YAML" do
         | 
| 26 30 | 
             
                  allow(Time).to receive(:now).and_return(Time.utc(2011,01,06,12,00,00))
         | 
| 27 | 
            -
                   | 
| 31 | 
            +
                  report.process
         | 
| 28 32 |  | 
| 29 | 
            -
                  expect(File.read(File.join(Puppet[:reportdir],  | 
| 33 | 
            +
                  expect(File.read(File.join(Puppet[:reportdir], report.host, "201101061200.yaml"))).to eq(report.to_yaml)
         | 
| 30 34 | 
             
                end
         | 
| 31 35 |  | 
| 32 36 | 
             
                it "rejects invalid hostnames" do
         | 
| 33 | 
            -
                   | 
| 37 | 
            +
                  report.host = ".."
         | 
| 34 38 | 
             
                  expect(Puppet::FileSystem).not_to receive(:exist?)
         | 
| 35 | 
            -
                  expect {  | 
| 39 | 
            +
                  expect { report.process }.to raise_error(ArgumentError, /Invalid node/)
         | 
| 36 40 | 
             
                end
         | 
| 37 41 | 
             
              end
         | 
| 38 42 |  | 
| 39 43 | 
             
              describe "::destroy" do
         | 
| 40 44 | 
             
                it "rejects invalid hostnames" do
         | 
| 41 45 | 
             
                  expect(Puppet::FileSystem).not_to receive(:unlink)
         | 
| 42 | 
            -
                  expect {  | 
| 46 | 
            +
                  expect { described_class.destroy("..") }.to raise_error(ArgumentError, /Invalid node/)
         | 
| 43 47 | 
             
                end
         | 
| 44 48 | 
             
              end
         | 
| 45 49 |  | 
| 46 50 | 
             
              describe "::validate_host" do
         | 
| 47 51 | 
             
                ['..', 'hello/', '/hello', 'he/llo', 'hello/..', '.'].each do |node|
         | 
| 48 52 | 
             
                  it "rejects #{node.inspect}" do
         | 
| 49 | 
            -
                    expect {  | 
| 53 | 
            +
                    expect { described_class.validate_host(node) }.to raise_error(ArgumentError, /Invalid node/)
         | 
| 50 54 | 
             
                  end
         | 
| 51 55 | 
             
                end
         | 
| 52 56 |  | 
| 53 57 | 
             
                ['.hello', 'hello.', '..hi', 'hi..'].each do |node|
         | 
| 54 58 | 
             
                  it "accepts #{node.inspect}" do
         | 
| 55 | 
            -
                     | 
| 59 | 
            +
                    described_class.validate_host(node)
         | 
| 56 60 | 
             
                  end
         | 
| 57 61 | 
             
                end
         | 
| 58 62 | 
             
              end
         | 
    
        data/spec/unit/resource_spec.rb
    CHANGED
    
    | @@ -283,7 +283,7 @@ describe Puppet::Resource do | |
| 283 283 | 
             
                let(:scope)    { Puppet::Parser::Scope.new(compiler) }
         | 
| 284 284 |  | 
| 285 285 | 
             
                def ast_leaf(value)
         | 
| 286 | 
            -
                  Puppet::Parser::AST::Leaf.new( | 
| 286 | 
            +
                  Puppet::Parser::AST::Leaf.new(value: value)
         | 
| 287 287 | 
             
                end
         | 
| 288 288 |  | 
| 289 289 | 
             
                it "should fail when asked to set default values and it is not a parser resource" do
         | 
| @@ -389,7 +389,7 @@ describe Puppet::Resource do | |
| 389 389 | 
             
                    context "when a value is provided" do
         | 
| 390 390 | 
             
                      let(:port_parameter) do
         | 
| 391 391 | 
             
                        Puppet::Parser::Resource::Param.new(
         | 
| 392 | 
            -
                           | 
| 392 | 
            +
                          name: 'port', value: '8080'
         | 
| 393 393 | 
             
                        )
         | 
| 394 394 | 
             
                      end
         | 
| 395 395 |  | 
| @@ -414,7 +414,7 @@ describe Puppet::Resource do | |
| 414 414 | 
             
                        expect_lookup('apache::port', returns: '443')
         | 
| 415 415 |  | 
| 416 416 | 
             
                        rs = Puppet::Parser::Resource.new("class", "apache", :scope => scope,
         | 
| 417 | 
            -
                          :parameters => [Puppet::Parser::Resource::Param.new( | 
| 417 | 
            +
                          :parameters => [Puppet::Parser::Resource::Param.new(name: 'port', value: nil)])
         | 
| 418 418 |  | 
| 419 419 | 
             
                        rs.resource_type.set_resource_parameters(rs, scope)
         | 
| 420 420 | 
             
                        expect(rs[:port]).to eq('443')
         | 
| @@ -2,7 +2,6 @@ require 'spec_helper' | |
| 2 2 |  | 
| 3 3 | 
             
            require 'puppet/settings'
         | 
| 4 4 | 
             
            require 'puppet/settings/autosign_setting'
         | 
| 5 | 
            -
            require 'puppet/type/file'
         | 
| 6 5 |  | 
| 7 6 | 
             
            describe Puppet::Settings::AutosignSetting do
         | 
| 8 7 | 
             
              let(:settings) do
         | 
| @@ -75,6 +74,7 @@ describe Puppet::Settings::AutosignSetting do | |
| 75 74 | 
             
                it "converts the file path to a file resource", :if => !Puppet::Util::Platform.windows? do
         | 
| 76 75 | 
             
                  path = File.expand_path('/path/to/autosign.conf')
         | 
| 77 76 | 
             
                  allow(settings).to receive(:value).with('autosign', nil, false).and_return(path)
         | 
| 77 | 
            +
                  allow(Puppet::FileSystem).to receive(:exist?).and_call_original
         | 
| 78 78 | 
             
                  allow(Puppet::FileSystem).to receive(:exist?).with(path).and_return(true)
         | 
| 79 79 | 
             
                  expect(Puppet.features).to receive(:root?).and_return(true)
         | 
| 80 80 |  | 
| @@ -0,0 +1,64 @@ | |
| 1 | 
            +
            require 'spec_helper'
         | 
| 2 | 
            +
             | 
| 3 | 
            +
            require 'puppet/settings'
         | 
| 4 | 
            +
            require 'puppet/settings/http_extra_headers_setting'
         | 
| 5 | 
            +
             | 
| 6 | 
            +
            describe Puppet::Settings::HttpExtraHeadersSetting do
         | 
| 7 | 
            +
              subject { described_class.new(:settings => double('settings'), :desc => "test") }
         | 
| 8 | 
            +
             | 
| 9 | 
            +
              it "is of type :http_extra_headers" do
         | 
| 10 | 
            +
                expect(subject.type).to eq :http_extra_headers
         | 
| 11 | 
            +
              end
         | 
| 12 | 
            +
             | 
| 13 | 
            +
              describe "munging the value" do
         | 
| 14 | 
            +
                let(:final_value) { [['header1', 'foo'], ['header2', 'bar']] }
         | 
| 15 | 
            +
             | 
| 16 | 
            +
                describe "when given a string" do
         | 
| 17 | 
            +
                  it "splits multiple values into an array" do
         | 
| 18 | 
            +
                    expect(subject.munge("header1:foo,header2:bar")).to match_array(final_value)
         | 
| 19 | 
            +
                  end
         | 
| 20 | 
            +
             | 
| 21 | 
            +
                  it "strips whitespace between elements" do
         | 
| 22 | 
            +
                    expect(subject.munge("header1:foo , header2:bar")).to match_array(final_value)
         | 
| 23 | 
            +
                  end
         | 
| 24 | 
            +
             | 
| 25 | 
            +
                  it "creates an array when one item is given" do
         | 
| 26 | 
            +
                    expect(subject.munge("header1:foo")).to match_array([['header1', 'foo']])
         | 
| 27 | 
            +
                  end
         | 
| 28 | 
            +
                end
         | 
| 29 | 
            +
             | 
| 30 | 
            +
                describe "when given an array of strings" do
         | 
| 31 | 
            +
                  it "returns an array of arrays" do
         | 
| 32 | 
            +
                    expect(subject.munge(['header1:foo', 'header2:bar'])).to match_array(final_value)
         | 
| 33 | 
            +
                  end
         | 
| 34 | 
            +
                end
         | 
| 35 | 
            +
             | 
| 36 | 
            +
                describe "when given an array of arrays" do
         | 
| 37 | 
            +
                  it "returns an array of arrays" do
         | 
| 38 | 
            +
                    expect(subject.munge([['header1', 'foo'], ['header2', 'bar']])).to match_array(final_value)
         | 
| 39 | 
            +
                  end
         | 
| 40 | 
            +
                end
         | 
| 41 | 
            +
             | 
| 42 | 
            +
                describe "when given a hash" do
         | 
| 43 | 
            +
                  it "returns the hash" do
         | 
| 44 | 
            +
                    expect(subject.munge({'header1' => 'foo', 'header2' => 'bar'})).to match_array(final_value)
         | 
| 45 | 
            +
                  end
         | 
| 46 | 
            +
                end
         | 
| 47 | 
            +
             | 
| 48 | 
            +
                describe 'raises an error when' do
         | 
| 49 | 
            +
             | 
| 50 | 
            +
                  # Ruby 2.3 reports the class of these objects as Fixnum, whereas later ruby versions report them as Integer
         | 
| 51 | 
            +
                  it 'is given an unexpected object type' do
         | 
| 52 | 
            +
                    expect {
         | 
| 53 | 
            +
                      subject.munge(65)
         | 
| 54 | 
            +
                      }.to raise_error(ArgumentError, /^Expected an Array, String, or Hash, got a (Integer|Fixnum)/)
         | 
| 55 | 
            +
                  end
         | 
| 56 | 
            +
             | 
| 57 | 
            +
                  it 'is given an array of unexpected object types' do
         | 
| 58 | 
            +
                    expect {
         | 
| 59 | 
            +
                      subject.munge([65, 82])
         | 
| 60 | 
            +
                      }.to raise_error(ArgumentError, /^Expected an Array or String, got a (Integer|Fixnum)/)
         | 
| 61 | 
            +
                  end
         | 
| 62 | 
            +
                end
         | 
| 63 | 
            +
              end
         | 
| 64 | 
            +
            end
         | 
    
        data/spec/unit/ssl/host_spec.rb
    CHANGED
    
    | @@ -51,8 +51,10 @@ describe Puppet::SSL::Host, if: !Puppet::Util::Platform.jruby? do | |
| 51 51 | 
             
                  allow_any_instance_of(Puppet::SSL::Host).to receive(:generate)
         | 
| 52 52 | 
             
                end
         | 
| 53 53 |  | 
| 54 | 
            -
                it " | 
| 55 | 
            -
                   | 
| 54 | 
            +
                it "is deprecated" do
         | 
| 55 | 
            +
                  Puppet::SSL::Host.localhost
         | 
| 56 | 
            +
             | 
| 57 | 
            +
                  expect(@logs).to include(an_object_having_attributes(message: /Puppet::SSL::Host is deprecated/))
         | 
| 56 58 | 
             
                end
         | 
| 57 59 |  | 
| 58 60 | 
             
                it "should allow to reset localhost" do
         | 
    
        data/spec/unit/ssl/oids_spec.rb
    CHANGED
    
    | @@ -33,6 +33,7 @@ describe Puppet::SSL::Oids do | |
| 33 33 | 
             
                  'pp_cloudplatform'    => '1.3.6.1.4.1.34380.1.1.23',
         | 
| 34 34 | 
             
                  'pp_apptier'          => '1.3.6.1.4.1.34380.1.1.24',
         | 
| 35 35 | 
             
                  'pp_hostname'         => '1.3.6.1.4.1.34380.1.1.25',
         | 
| 36 | 
            +
                  'pp_owner'            => '1.3.6.1.4.1.34380.1.1.26',
         | 
| 36 37 | 
             
                  'ppPrivCertExt'       => '1.3.6.1.4.1.34380.1.2',
         | 
| 37 38 | 
             
                  'ppAuthCertExt'       => '1.3.6.1.4.1.34380.1.3',
         | 
| 38 39 | 
             
                  'pp_authorization'    => '1.3.6.1.4.1.34380.1.3.1',
         | 
| @@ -42,20 +42,20 @@ describe Puppet::SSL::SSLProvider do | |
| 42 42 | 
             
                let(:config) { { cacerts: [], crls: [], revocation: false } }
         | 
| 43 43 |  | 
| 44 44 | 
             
                it 'accepts empty list of certs and crls' do
         | 
| 45 | 
            -
                  sslctx = subject.create_root_context(config)
         | 
| 45 | 
            +
                  sslctx = subject.create_root_context(**config)
         | 
| 46 46 | 
             
                  expect(sslctx.cacerts).to eq([])
         | 
| 47 47 | 
             
                  expect(sslctx.crls).to eq([])
         | 
| 48 48 | 
             
                end
         | 
| 49 49 |  | 
| 50 50 | 
             
                it 'accepts valid root certs' do
         | 
| 51 51 | 
             
                  certs = [cert_fixture('ca.pem')]
         | 
| 52 | 
            -
                  sslctx = subject.create_root_context(config.merge(cacerts: certs))
         | 
| 52 | 
            +
                  sslctx = subject.create_root_context(**config.merge(cacerts: certs))
         | 
| 53 53 | 
             
                  expect(sslctx.cacerts).to eq(certs)
         | 
| 54 54 | 
             
                end
         | 
| 55 55 |  | 
| 56 56 | 
             
                it 'accepts valid intermediate certs' do
         | 
| 57 57 | 
             
                  certs = [cert_fixture('ca.pem'), cert_fixture('intermediate.pem')]
         | 
| 58 | 
            -
                  sslctx = subject.create_root_context(config.merge(cacerts: certs))
         | 
| 58 | 
            +
                  sslctx = subject.create_root_context(**config.merge(cacerts: certs))
         | 
| 59 59 | 
             
                  expect(sslctx.cacerts).to eq(certs)
         | 
| 60 60 | 
             
                end
         | 
| 61 61 |  | 
| @@ -63,19 +63,19 @@ describe Puppet::SSL::SSLProvider do | |
| 63 63 | 
             
                  expired = [cert_fixture('ca.pem'), cert_fixture('intermediate.pem')]
         | 
| 64 64 | 
             
                  expired.each { |x509| x509.not_after = Time.at(0) }
         | 
| 65 65 |  | 
| 66 | 
            -
                  sslctx = subject.create_root_context(config.merge(cacerts: expired))
         | 
| 66 | 
            +
                  sslctx = subject.create_root_context(**config.merge(cacerts: expired))
         | 
| 67 67 | 
             
                  expect(sslctx.cacerts).to eq(expired)
         | 
| 68 68 | 
             
                end
         | 
| 69 69 |  | 
| 70 70 | 
             
                it 'raises if the frozen context is modified' do
         | 
| 71 | 
            -
                  sslctx = subject.create_root_context(config)
         | 
| 71 | 
            +
                  sslctx = subject.create_root_context(**config)
         | 
| 72 72 | 
             
                  expect {
         | 
| 73 73 | 
             
                    sslctx.verify_peer = false
         | 
| 74 74 | 
             
                  }.to raise_error(/can't modify frozen/)
         | 
| 75 75 | 
             
                end
         | 
| 76 76 |  | 
| 77 77 | 
             
                it 'verifies peer' do
         | 
| 78 | 
            -
                  sslctx = subject.create_root_context(config)
         | 
| 78 | 
            +
                  sslctx = subject.create_root_context(**config)
         | 
| 79 79 | 
             
                  expect(sslctx.verify_peer).to eq(true)
         | 
| 80 80 | 
             
                end
         | 
| 81 81 | 
             
              end
         | 
| @@ -134,6 +134,32 @@ describe Puppet::SSL::SSLProvider do | |
| 134 134 | 
             
                  expect(sslctx.client_cert).to be_nil
         | 
| 135 135 | 
             
                  expect(sslctx.private_key).to be_nil
         | 
| 136 136 | 
             
                end
         | 
| 137 | 
            +
             | 
| 138 | 
            +
                it 'trusts additional system certs' do
         | 
| 139 | 
            +
                  path = tmpfile('system_cacerts')
         | 
| 140 | 
            +
                  File.write(path, cert_fixture('ca.pem').to_pem)
         | 
| 141 | 
            +
             | 
| 142 | 
            +
                  expect_any_instance_of(OpenSSL::X509::Store).to receive(:add_file).with(path)
         | 
| 143 | 
            +
             | 
| 144 | 
            +
                  subject.create_system_context(cacerts: [], path: path)
         | 
| 145 | 
            +
                end
         | 
| 146 | 
            +
             | 
| 147 | 
            +
                it 'ignores empty files' do
         | 
| 148 | 
            +
                  path = tmpfile('system_cacerts')
         | 
| 149 | 
            +
                  FileUtils.touch(path)
         | 
| 150 | 
            +
             | 
| 151 | 
            +
                  subject.create_system_context(cacerts: [], path: path)
         | 
| 152 | 
            +
             | 
| 153 | 
            +
                  expect(@logs).to eq([])
         | 
| 154 | 
            +
                end
         | 
| 155 | 
            +
             | 
| 156 | 
            +
                it 'prints an error if it is not a file' do
         | 
| 157 | 
            +
                  path = tmpdir('system_cacerts')
         | 
| 158 | 
            +
             | 
| 159 | 
            +
                  subject.create_system_context(cacerts: [], path: path)
         | 
| 160 | 
            +
             | 
| 161 | 
            +
                  expect(@logs).to include(an_object_having_attributes(level: :warning, message: /^The 'ssl_trust_store' setting does not refer to a file and will be ignored/))
         | 
| 162 | 
            +
                end
         | 
| 137 163 | 
             
              end
         | 
| 138 164 |  | 
| 139 165 | 
             
              context 'when creating an ssl context with crls' do
         | 
| @@ -142,14 +168,14 @@ describe Puppet::SSL::SSLProvider do | |
| 142 168 | 
             
                it 'accepts valid CRLs' do
         | 
| 143 169 | 
             
                  certs = [cert_fixture('ca.pem')]
         | 
| 144 170 | 
             
                  crls = [crl_fixture('crl.pem')]
         | 
| 145 | 
            -
                  sslctx = subject.create_root_context(config.merge(cacerts: certs, crls: crls))
         | 
| 171 | 
            +
                  sslctx = subject.create_root_context(**config.merge(cacerts: certs, crls: crls))
         | 
| 146 172 | 
             
                  expect(sslctx.crls).to eq(crls)
         | 
| 147 173 | 
             
                end
         | 
| 148 174 |  | 
| 149 175 | 
             
                it 'accepts valid CRLs for intermediate certs' do
         | 
| 150 176 | 
             
                  certs = [cert_fixture('ca.pem'), cert_fixture('intermediate.pem')]
         | 
| 151 177 | 
             
                  crls = [crl_fixture('crl.pem'), crl_fixture('intermediate-crl.pem')]
         | 
| 152 | 
            -
                  sslctx = subject.create_root_context(config.merge(cacerts: certs, crls: crls))
         | 
| 178 | 
            +
                  sslctx = subject.create_root_context(**config.merge(cacerts: certs, crls: crls))
         | 
| 153 179 | 
             
                  expect(sslctx.crls).to eq(crls)
         | 
| 154 180 | 
             
                end
         | 
| 155 181 |  | 
| @@ -157,12 +183,12 @@ describe Puppet::SSL::SSLProvider do | |
| 157 183 | 
             
                  expired = [crl_fixture('crl.pem'), crl_fixture('intermediate-crl.pem')]
         | 
| 158 184 | 
             
                  expired.each { |x509| x509.last_update = Time.at(0) }
         | 
| 159 185 |  | 
| 160 | 
            -
                  sslctx = subject.create_root_context(config.merge(crls: expired))
         | 
| 186 | 
            +
                  sslctx = subject.create_root_context(**config.merge(crls: expired))
         | 
| 161 187 | 
             
                  expect(sslctx.crls).to eq(expired)
         | 
| 162 188 | 
             
                end
         | 
| 163 189 |  | 
| 164 190 | 
             
                it 'verifies peer' do
         | 
| 165 | 
            -
                  sslctx = subject.create_root_context(config)
         | 
| 191 | 
            +
                  sslctx = subject.create_root_context(**config)
         | 
| 166 192 | 
             
                  expect(sslctx.verify_peer).to eq(true)
         | 
| 167 193 | 
             
                end
         | 
| 168 194 | 
             
              end
         | 
| @@ -174,49 +200,49 @@ describe Puppet::SSL::SSLProvider do | |
| 174 200 |  | 
| 175 201 | 
             
                it 'raises if CA certs are missing' do
         | 
| 176 202 | 
             
                  expect {
         | 
| 177 | 
            -
                    subject.create_context(config.merge(cacerts: nil))
         | 
| 203 | 
            +
                    subject.create_context(**config.merge(cacerts: nil))
         | 
| 178 204 | 
             
                  }.to raise_error(ArgumentError, /CA certs are missing/)
         | 
| 179 205 | 
             
                end
         | 
| 180 206 |  | 
| 181 207 | 
             
                it 'raises if CRLs are are missing' do
         | 
| 182 208 | 
             
                  expect {
         | 
| 183 | 
            -
                    subject.create_context(config.merge(crls: nil))
         | 
| 209 | 
            +
                    subject.create_context(**config.merge(crls: nil))
         | 
| 184 210 | 
             
                  }.to raise_error(ArgumentError, /CRLs are missing/)
         | 
| 185 211 | 
             
                end
         | 
| 186 212 |  | 
| 187 213 | 
             
                it 'raises if private key is missing' do
         | 
| 188 214 | 
             
                  expect {
         | 
| 189 | 
            -
                    subject.create_context(config.merge(private_key: nil))
         | 
| 215 | 
            +
                    subject.create_context(**config.merge(private_key: nil))
         | 
| 190 216 | 
             
                  }.to raise_error(ArgumentError, /Private key is missing/)
         | 
| 191 217 | 
             
                end
         | 
| 192 218 |  | 
| 193 219 | 
             
                it 'raises if client cert is missing' do
         | 
| 194 220 | 
             
                  expect {
         | 
| 195 | 
            -
                    subject.create_context(config.merge(client_cert: nil))
         | 
| 221 | 
            +
                    subject.create_context(**config.merge(client_cert: nil))
         | 
| 196 222 | 
             
                  }.to raise_error(ArgumentError, /Client cert is missing/)
         | 
| 197 223 | 
             
                end
         | 
| 198 224 |  | 
| 199 225 | 
             
                it 'accepts RSA keys' do
         | 
| 200 | 
            -
                  sslctx = subject.create_context(config)
         | 
| 226 | 
            +
                  sslctx = subject.create_context(**config)
         | 
| 201 227 | 
             
                  expect(sslctx.private_key).to eq(private_key)
         | 
| 202 228 | 
             
                end
         | 
| 203 229 |  | 
| 204 230 | 
             
                it 'accepts EC keys' do
         | 
| 205 231 | 
             
                  ec_key = ec_key_fixture('ec-key.pem')
         | 
| 206 232 | 
             
                  ec_cert = cert_fixture('ec.pem')
         | 
| 207 | 
            -
                  sslctx = subject.create_context(config.merge(client_cert: ec_cert, private_key: ec_key))
         | 
| 233 | 
            +
                  sslctx = subject.create_context(**config.merge(client_cert: ec_cert, private_key: ec_key))
         | 
| 208 234 | 
             
                  expect(sslctx.private_key).to eq(ec_key)
         | 
| 209 235 | 
             
                end
         | 
| 210 236 |  | 
| 211 237 | 
             
                it 'raises if private key is unsupported' do
         | 
| 212 238 | 
             
                  dsa_key = OpenSSL::PKey::DSA.new
         | 
| 213 239 | 
             
                  expect {
         | 
| 214 | 
            -
                    subject.create_context(config.merge(private_key: dsa_key))
         | 
| 240 | 
            +
                    subject.create_context(**config.merge(private_key: dsa_key))
         | 
| 215 241 | 
             
                  }.to raise_error(Puppet::SSL::SSLError, /Unsupported key 'OpenSSL::PKey::DSA'/)
         | 
| 216 242 | 
             
                end
         | 
| 217 243 |  | 
| 218 244 | 
             
                it 'resolves the client chain from leaf to root' do
         | 
| 219 | 
            -
                  sslctx = subject.create_context(config)
         | 
| 245 | 
            +
                  sslctx = subject.create_context(**config)
         | 
| 220 246 | 
             
                  expect(
         | 
| 221 247 | 
             
                    sslctx.client_chain.map(&:subject).map(&:to_utf8)
         | 
| 222 248 | 
             
                  ).to eq(['CN=signed', 'CN=Test CA Subauthority', 'CN=Test CA'])
         | 
| @@ -225,21 +251,21 @@ describe Puppet::SSL::SSLProvider do | |
| 225 251 | 
             
                it 'raises if client cert signature is invalid' do
         | 
| 226 252 | 
             
                  client_cert.sign(wrong_key, OpenSSL::Digest::SHA256.new)
         | 
| 227 253 | 
             
                  expect {
         | 
| 228 | 
            -
                    subject.create_context(config.merge(client_cert: client_cert))
         | 
| 254 | 
            +
                    subject.create_context(**config.merge(client_cert: client_cert))
         | 
| 229 255 | 
             
                  }.to raise_error(Puppet::SSL::CertVerifyError,
         | 
| 230 256 | 
             
                                   "Invalid signature for certificate 'CN=signed'")
         | 
| 231 257 | 
             
                end
         | 
| 232 258 |  | 
| 233 259 | 
             
                it 'raises if client cert and private key are mismatched' do
         | 
| 234 260 | 
             
                  expect {
         | 
| 235 | 
            -
                    subject.create_context(config.merge(private_key: wrong_key))
         | 
| 261 | 
            +
                    subject.create_context(**config.merge(private_key: wrong_key))
         | 
| 236 262 | 
             
                  }.to raise_error(Puppet::SSL::SSLError,
         | 
| 237 263 | 
             
                                   "The certificate for 'CN=signed' does not match its private key")
         | 
| 238 264 | 
             
                end
         | 
| 239 265 |  | 
| 240 266 | 
             
                it "raises if client cert's public key has been replaced" do
         | 
| 241 267 | 
             
                  expect {
         | 
| 242 | 
            -
                    subject.create_context(config.merge(client_cert: cert_fixture('tampered-cert.pem')))
         | 
| 268 | 
            +
                    subject.create_context(**config.merge(client_cert: cert_fixture('tampered-cert.pem')))
         | 
| 243 269 | 
             
                  }.to raise_error(Puppet::SSL::CertVerifyError,
         | 
| 244 270 | 
             
                                   "Invalid signature for certificate 'CN=signed'")
         | 
| 245 271 | 
             
                end
         | 
| @@ -250,7 +276,7 @@ describe Puppet::SSL::SSLProvider do | |
| 250 276 | 
             
                  ca.sign(wrong_key, OpenSSL::Digest::SHA256.new)
         | 
| 251 277 |  | 
| 252 278 | 
             
                  expect {
         | 
| 253 | 
            -
                    subject.create_context(config.merge(cacerts: global_cacerts))
         | 
| 279 | 
            +
                    subject.create_context(**config.merge(cacerts: global_cacerts))
         | 
| 254 280 | 
             
                  }.to raise_error(Puppet::SSL::CertVerifyError,
         | 
| 255 281 | 
             
                                   "Invalid signature for certificate 'CN=Test CA'")
         | 
| 256 282 | 
             
                end
         | 
| @@ -260,7 +286,7 @@ describe Puppet::SSL::SSLProvider do | |
| 260 286 | 
             
                  int.sign(wrong_key, OpenSSL::Digest::SHA256.new)
         | 
| 261 287 |  | 
| 262 288 | 
             
                  expect {
         | 
| 263 | 
            -
                    subject.create_context(config.merge(cacerts: global_cacerts))
         | 
| 289 | 
            +
                    subject.create_context(**config.merge(cacerts: global_cacerts))
         | 
| 264 290 | 
             
                  }.to raise_error(Puppet::SSL::CertVerifyError,
         | 
| 265 291 | 
             
                                   "Invalid signature for certificate 'CN=Test CA Subauthority'")
         | 
| 266 292 | 
             
                end
         | 
| @@ -270,7 +296,7 @@ describe Puppet::SSL::SSLProvider do | |
| 270 296 | 
             
                  crl.sign(wrong_key, OpenSSL::Digest::SHA256.new)
         | 
| 271 297 |  | 
| 272 298 | 
             
                  expect {
         | 
| 273 | 
            -
                    subject.create_context(config.merge(crls: global_crls))
         | 
| 299 | 
            +
                    subject.create_context(**config.merge(crls: global_crls))
         | 
| 274 300 | 
             
                  }.to raise_error(Puppet::SSL::CertVerifyError,
         | 
| 275 301 | 
             
                                   "Invalid signature for CRL issued by 'CN=Test CA'")
         | 
| 276 302 | 
             
                end
         | 
| @@ -280,14 +306,14 @@ describe Puppet::SSL::SSLProvider do | |
| 280 306 | 
             
                  crl.sign(wrong_key, OpenSSL::Digest::SHA256.new)
         | 
| 281 307 |  | 
| 282 308 | 
             
                  expect {
         | 
| 283 | 
            -
                    subject.create_context(config.merge(crls: global_crls))
         | 
| 309 | 
            +
                    subject.create_context(**config.merge(crls: global_crls))
         | 
| 284 310 | 
             
                  }.to raise_error(Puppet::SSL::CertVerifyError,
         | 
| 285 311 | 
             
                                   "Invalid signature for CRL issued by 'CN=Test CA Subauthority'")
         | 
| 286 312 | 
             
                end
         | 
| 287 313 |  | 
| 288 314 | 
             
                it 'raises if client cert is revoked' do
         | 
| 289 315 | 
             
                  expect {
         | 
| 290 | 
            -
                    subject.create_context(config.merge(private_key: key_fixture('revoked-key.pem'), client_cert: cert_fixture('revoked.pem')))
         | 
| 316 | 
            +
                    subject.create_context(**config.merge(private_key: key_fixture('revoked-key.pem'), client_cert: cert_fixture('revoked.pem')))
         | 
| 291 317 | 
             
                  }.to raise_error(Puppet::SSL::CertVerifyError,
         | 
| 292 318 | 
             
                                   "Certificate 'CN=revoked' is revoked")
         | 
| 293 319 | 
             
                end
         | 
| @@ -295,12 +321,12 @@ describe Puppet::SSL::SSLProvider do | |
| 295 321 | 
             
                it 'warns if intermediate issuer is missing' do
         | 
| 296 322 | 
             
                  expect(Puppet).to receive(:warning).with("The issuer 'CN=Test CA Subauthority' of certificate 'CN=signed' cannot be found locally")
         | 
| 297 323 |  | 
| 298 | 
            -
                  subject.create_context(config.merge(cacerts: [cert_fixture('ca.pem')]))
         | 
| 324 | 
            +
                  subject.create_context(**config.merge(cacerts: [cert_fixture('ca.pem')]))
         | 
| 299 325 | 
             
                end
         | 
| 300 326 |  | 
| 301 327 | 
             
                it 'raises if root issuer is missing' do
         | 
| 302 328 | 
             
                  expect {
         | 
| 303 | 
            -
                    subject.create_context(config.merge(cacerts: [cert_fixture('intermediate.pem')]))
         | 
| 329 | 
            +
                    subject.create_context(**config.merge(cacerts: [cert_fixture('intermediate.pem')]))
         | 
| 304 330 | 
             
                  }.to raise_error(Puppet::SSL::CertVerifyError,
         | 
| 305 331 | 
             
                                   "The issuer 'CN=Test CA' of certificate 'CN=Test CA Subauthority' is missing")
         | 
| 306 332 | 
             
                end
         | 
| @@ -308,7 +334,7 @@ describe Puppet::SSL::SSLProvider do | |
| 308 334 | 
             
                it 'raises if cert is not valid yet', unless: Puppet::Util::Platform.jruby? do
         | 
| 309 335 | 
             
                  client_cert.not_before = Time.now + (5 * 60 * 60)
         | 
| 310 336 | 
             
                  expect {
         | 
| 311 | 
            -
                    subject.create_context(config.merge(client_cert: client_cert))
         | 
| 337 | 
            +
                    subject.create_context(**config.merge(client_cert: client_cert))
         | 
| 312 338 | 
             
                  }.to raise_error(Puppet::SSL::CertVerifyError,
         | 
| 313 339 | 
             
                                   "The certificate 'CN=signed' is not yet valid, verify time is synchronized")
         | 
| 314 340 | 
             
                end
         | 
| @@ -316,7 +342,7 @@ describe Puppet::SSL::SSLProvider do | |
| 316 342 | 
             
                it 'raises if cert is expired', unless: Puppet::Util::Platform.jruby? do
         | 
| 317 343 | 
             
                  client_cert.not_after = Time.at(0)
         | 
| 318 344 | 
             
                  expect {
         | 
| 319 | 
            -
                    subject.create_context(config.merge(client_cert: client_cert))
         | 
| 345 | 
            +
                    subject.create_context(**config.merge(client_cert: client_cert))
         | 
| 320 346 | 
             
                  }.to raise_error(Puppet::SSL::CertVerifyError,
         | 
| 321 347 | 
             
                                   "The certificate 'CN=signed' has expired, verify time is synchronized")
         | 
| 322 348 | 
             
                end
         | 
| @@ -327,7 +353,7 @@ describe Puppet::SSL::SSLProvider do | |
| 327 353 | 
             
                  future_crls.first.last_update = Time.now + (5 * 60 * 60)
         | 
| 328 354 |  | 
| 329 355 | 
             
                  expect {
         | 
| 330 | 
            -
                    subject.create_context(config.merge(crls: future_crls))
         | 
| 356 | 
            +
                    subject.create_context(**config.merge(crls: future_crls))
         | 
| 331 357 | 
             
                  }.to raise_error(Puppet::SSL::CertVerifyError,
         | 
| 332 358 | 
             
                                   "The CRL issued by 'CN=Test CA' is not yet valid, verify time is synchronized")
         | 
| 333 359 | 
             
                end
         | 
| @@ -338,7 +364,7 @@ describe Puppet::SSL::SSLProvider do | |
| 338 364 | 
             
                  past_crls.first.next_update = Time.at(0)
         | 
| 339 365 |  | 
| 340 366 | 
             
                  expect {
         | 
| 341 | 
            -
                    subject.create_context(config.merge(crls: past_crls))
         | 
| 367 | 
            +
                    subject.create_context(**config.merge(crls: past_crls))
         | 
| 342 368 | 
             
                  }.to raise_error(Puppet::SSL::CertVerifyError,
         | 
| 343 369 | 
             
                                   "The CRL issued by 'CN=Test CA' has expired, verify time is synchronized")
         | 
| 344 370 | 
             
                end
         | 
| @@ -346,7 +372,7 @@ describe Puppet::SSL::SSLProvider do | |
| 346 372 | 
             
                it 'raises if the root CRL is missing' do
         | 
| 347 373 | 
             
                  crls = [crl_fixture('intermediate-crl.pem')]
         | 
| 348 374 | 
             
                  expect {
         | 
| 349 | 
            -
                    subject.create_context(config.merge(crls: crls, revocation: :chain))
         | 
| 375 | 
            +
                    subject.create_context(**config.merge(crls: crls, revocation: :chain))
         | 
| 350 376 | 
             
                  }.to raise_error(Puppet::SSL::CertVerifyError,
         | 
| 351 377 | 
             
                                   "The CRL issued by 'CN=Test CA' is missing")
         | 
| 352 378 | 
             
                end
         | 
| @@ -354,23 +380,23 @@ describe Puppet::SSL::SSLProvider do | |
| 354 380 | 
             
                it 'raises if the intermediate CRL is missing' do
         | 
| 355 381 | 
             
                  crls = [crl_fixture('crl.pem')]
         | 
| 356 382 | 
             
                  expect {
         | 
| 357 | 
            -
                    subject.create_context(config.merge(crls: crls))
         | 
| 383 | 
            +
                    subject.create_context(**config.merge(crls: crls))
         | 
| 358 384 | 
             
                  }.to raise_error(Puppet::SSL::CertVerifyError,
         | 
| 359 385 | 
             
                                   "The CRL issued by 'CN=Test CA Subauthority' is missing")
         | 
| 360 386 | 
             
                end
         | 
| 361 387 |  | 
| 362 388 | 
             
                it "doesn't raise if the root CRL is missing and we're just checking the leaf" do
         | 
| 363 389 | 
             
                  crls = [crl_fixture('intermediate-crl.pem')]
         | 
| 364 | 
            -
                  subject.create_context(config.merge(crls: crls, revocation: :leaf))
         | 
| 390 | 
            +
                  subject.create_context(**config.merge(crls: crls, revocation: :leaf))
         | 
| 365 391 | 
             
                end
         | 
| 366 392 |  | 
| 367 393 | 
             
                it "doesn't raise if the intermediate CRL is missing and revocation checking is disabled" do
         | 
| 368 394 | 
             
                  crls = [crl_fixture('crl.pem')]
         | 
| 369 | 
            -
                  subject.create_context(config.merge(crls: crls, revocation: false))
         | 
| 395 | 
            +
                  subject.create_context(**config.merge(crls: crls, revocation: false))
         | 
| 370 396 | 
             
                end
         | 
| 371 397 |  | 
| 372 398 | 
             
                it "doesn't raise if both CRLs are missing and revocation checking is disabled" do
         | 
| 373 | 
            -
                  subject.create_context(config.merge(crls: [], revocation: false))
         | 
| 399 | 
            +
                  subject.create_context(**config.merge(crls: [], revocation: false))
         | 
| 374 400 | 
             
                end
         | 
| 375 401 |  | 
| 376 402 | 
             
                # OpenSSL < 1.1 does not verify basicConstraints
         | 
| @@ -378,7 +404,7 @@ describe Puppet::SSL::SSLProvider do | |
| 378 404 | 
             
                  certs = [cert_fixture('bad-basic-constraints.pem'), cert_fixture('intermediate.pem')]
         | 
| 379 405 |  | 
| 380 406 | 
             
                  expect {
         | 
| 381 | 
            -
                    subject.create_context(config.merge(cacerts: certs, crls: [], revocation: false))
         | 
| 407 | 
            +
                    subject.create_context(**config.merge(cacerts: certs, crls: [], revocation: false))
         | 
| 382 408 | 
             
                  }.to raise_error(Puppet::SSL::CertVerifyError,
         | 
| 383 409 | 
             
                                   "Certificate 'CN=Test CA' failed verification (24): invalid CA certificate")
         | 
| 384 410 | 
             
                end
         | 
| @@ -388,32 +414,32 @@ describe Puppet::SSL::SSLProvider do | |
| 388 414 | 
             
                  certs = [cert_fixture('ca.pem'), cert_fixture('bad-int-basic-constraints.pem')]
         | 
| 389 415 |  | 
| 390 416 | 
             
                  expect {
         | 
| 391 | 
            -
                    subject.create_context(config.merge(cacerts: certs, crls: [], revocation: false))
         | 
| 417 | 
            +
                    subject.create_context(**config.merge(cacerts: certs, crls: [], revocation: false))
         | 
| 392 418 | 
             
                  }.to raise_error(Puppet::SSL::CertVerifyError,
         | 
| 393 419 | 
             
                                   "Certificate 'CN=Test CA Subauthority' failed verification (24): invalid CA certificate")
         | 
| 394 420 | 
             
                end
         | 
| 395 421 |  | 
| 396 422 | 
             
                it 'accepts CA certs in any order' do
         | 
| 397 | 
            -
                  sslctx = subject.create_context(config.merge(cacerts: global_cacerts.reverse))
         | 
| 423 | 
            +
                  sslctx = subject.create_context(**config.merge(cacerts: global_cacerts.reverse))
         | 
| 398 424 | 
             
                  # certs in ruby+openssl 1.0.x are not comparable, so compare subjects
         | 
| 399 425 | 
             
                  expect(sslctx.client_chain.map(&:subject).map(&:to_utf8)).to contain_exactly('CN=Test CA', 'CN=Test CA Subauthority', 'CN=signed')
         | 
| 400 426 | 
             
                end
         | 
| 401 427 |  | 
| 402 428 | 
             
                it 'accepts CRLs in any order' do
         | 
| 403 | 
            -
                  sslctx = subject.create_context(config.merge(crls: global_crls.reverse))
         | 
| 429 | 
            +
                  sslctx = subject.create_context(**config.merge(crls: global_crls.reverse))
         | 
| 404 430 | 
             
                  # certs in ruby+openssl 1.0.x are not comparable, so compare subjects
         | 
| 405 431 | 
             
                  expect(sslctx.client_chain.map(&:subject).map(&:to_utf8)).to contain_exactly('CN=Test CA', 'CN=Test CA Subauthority', 'CN=signed')
         | 
| 406 432 | 
             
                end
         | 
| 407 433 |  | 
| 408 434 | 
             
                it 'raises if the frozen context is modified' do
         | 
| 409 | 
            -
                  sslctx = subject.create_context(config)
         | 
| 435 | 
            +
                  sslctx = subject.create_context(**config)
         | 
| 410 436 | 
             
                  expect {
         | 
| 411 437 | 
             
                    sslctx.verify_peer = false
         | 
| 412 438 | 
             
                  }.to raise_error(/can't modify frozen/)
         | 
| 413 439 | 
             
                end
         | 
| 414 440 |  | 
| 415 441 | 
             
                it 'verifies peer' do
         | 
| 416 | 
            -
                  sslctx = subject.create_context(config)
         | 
| 442 | 
            +
                  sslctx = subject.create_context(**config)
         | 
| 417 443 | 
             
                  expect(sslctx.verify_peer).to eq(true)
         | 
| 418 444 | 
             
                end
         | 
| 419 445 | 
             
              end
         |