puppet 6.17.0-x64-mingw32 → 6.18.0-x64-mingw32

Sign up to get free protection for your applications and to get access to all the features.

Potentially problematic release.


This version of puppet might be problematic. Click here for more details.

Files changed (189) hide show
  1. checksums.yaml +4 -4
  2. data/Gemfile.lock +6 -5
  3. data/lib/puppet/application/apply.rb +18 -20
  4. data/lib/puppet/application/lookup.rb +16 -4
  5. data/lib/puppet/configurer/downloader.rb +31 -10
  6. data/lib/puppet/confine.rb +1 -1
  7. data/lib/puppet/confine/any.rb +1 -1
  8. data/lib/puppet/defaults.rb +21 -3
  9. data/lib/puppet/feature/base.rb +1 -1
  10. data/lib/puppet/file_serving/mount/locales.rb +1 -2
  11. data/lib/puppet/file_serving/mount/pluginfacts.rb +1 -2
  12. data/lib/puppet/file_serving/mount/plugins.rb +1 -2
  13. data/lib/puppet/file_system/file_impl.rb +3 -3
  14. data/lib/puppet/functions/lstrip.rb +4 -4
  15. data/lib/puppet/functions/reverse_each.rb +1 -1
  16. data/lib/puppet/functions/rstrip.rb +4 -4
  17. data/lib/puppet/functions/step.rb +1 -1
  18. data/lib/puppet/functions/strip.rb +4 -4
  19. data/lib/puppet/gettext/config.rb +5 -5
  20. data/lib/puppet/gettext/module_translations.rb +4 -4
  21. data/lib/puppet/indirector/exec.rb +1 -1
  22. data/lib/puppet/indirector/facts/facter.rb +3 -3
  23. data/lib/puppet/indirector/file_metadata/http.rb +1 -0
  24. data/lib/puppet/indirector/hiera.rb +4 -0
  25. data/lib/puppet/indirector/indirection.rb +1 -1
  26. data/lib/puppet/indirector/report/processor.rb +2 -2
  27. data/lib/puppet/module.rb +1 -2
  28. data/lib/puppet/network/format_support.rb +2 -2
  29. data/lib/puppet/network/http/route.rb +2 -2
  30. data/lib/puppet/node/environment.rb +12 -5
  31. data/lib/puppet/pal/pal_impl.rb +27 -3
  32. data/lib/puppet/parameter.rb +1 -1
  33. data/lib/puppet/parser/functions.rb +21 -17
  34. data/lib/puppet/parser/functions/create_resources.rb +11 -7
  35. data/lib/puppet/parser/type_loader.rb +2 -2
  36. data/lib/puppet/pops/adaptable.rb +7 -13
  37. data/lib/puppet/pops/adapters.rb +8 -4
  38. data/lib/puppet/pops/loader/runtime3_type_loader.rb +4 -2
  39. data/lib/puppet/pops/loaders.rb +18 -11
  40. data/lib/puppet/pops/lookup/context.rb +1 -1
  41. data/lib/puppet/pops/lookup/hiera_config.rb +14 -1
  42. data/lib/puppet/pops/types/iterable.rb +34 -8
  43. data/lib/puppet/pops/validation/checker4_0.rb +19 -15
  44. data/lib/puppet/provider/file/windows.rb +1 -1
  45. data/lib/puppet/provider/package/apt.rb +34 -0
  46. data/lib/puppet/provider/package/gem.rb +4 -2
  47. data/lib/puppet/provider/package/puppet_gem.rb +5 -0
  48. data/lib/puppet/provider/package/zypper.rb +3 -0
  49. data/lib/puppet/provider/user/aix.rb +1 -1
  50. data/lib/puppet/provider/user/user_role_add.rb +1 -1
  51. data/lib/puppet/provider/user/windows_adsi.rb +18 -1
  52. data/lib/puppet/settings.rb +1 -1
  53. data/lib/puppet/ssl/validator/default_validator.rb +1 -1
  54. data/lib/puppet/test/test_helper.rb +10 -3
  55. data/lib/puppet/transaction.rb +2 -2
  56. data/lib/puppet/transaction/persistence.rb +1 -1
  57. data/lib/puppet/transaction/report.rb +1 -1
  58. data/lib/puppet/trusted_external.rb +2 -2
  59. data/lib/puppet/type.rb +4 -3
  60. data/lib/puppet/type/file.rb +2 -2
  61. data/lib/puppet/type/file/source.rb +27 -7
  62. data/lib/puppet/type/notify.rb +2 -2
  63. data/lib/puppet/type/service.rb +4 -0
  64. data/lib/puppet/type/user.rb +18 -3
  65. data/lib/puppet/util.rb +26 -12
  66. data/lib/puppet/util/autoload.rb +9 -7
  67. data/lib/puppet/util/character_encoding.rb +9 -5
  68. data/lib/puppet/util/execution.rb +2 -2
  69. data/lib/puppet/util/windows.rb +1 -0
  70. data/lib/puppet/util/windows/api_types.rb +15 -1
  71. data/lib/puppet/util/windows/monkey_patches/dir.rb +40 -0
  72. data/lib/puppet/util/windows/security.rb +4 -4
  73. data/lib/puppet/util/windows/user.rb +219 -0
  74. data/lib/puppet/version.rb +1 -1
  75. data/locales/puppet.pot +78 -69
  76. data/man/man5/puppet.conf.5 +22 -3
  77. data/man/man8/puppet-agent.8 +1 -1
  78. data/man/man8/puppet-apply.8 +1 -1
  79. data/man/man8/puppet-catalog.8 +1 -1
  80. data/man/man8/puppet-config.8 +1 -1
  81. data/man/man8/puppet-describe.8 +1 -1
  82. data/man/man8/puppet-device.8 +1 -1
  83. data/man/man8/puppet-doc.8 +1 -1
  84. data/man/man8/puppet-epp.8 +1 -1
  85. data/man/man8/puppet-facts.8 +1 -1
  86. data/man/man8/puppet-filebucket.8 +1 -1
  87. data/man/man8/puppet-generate.8 +1 -1
  88. data/man/man8/puppet-help.8 +1 -1
  89. data/man/man8/puppet-key.8 +1 -1
  90. data/man/man8/puppet-lookup.8 +2 -2
  91. data/man/man8/puppet-man.8 +1 -1
  92. data/man/man8/puppet-module.8 +1 -1
  93. data/man/man8/puppet-node.8 +1 -1
  94. data/man/man8/puppet-parser.8 +1 -1
  95. data/man/man8/puppet-plugin.8 +1 -1
  96. data/man/man8/puppet-report.8 +1 -1
  97. data/man/man8/puppet-resource.8 +1 -1
  98. data/man/man8/puppet-script.8 +1 -1
  99. data/man/man8/puppet-ssl.8 +1 -1
  100. data/man/man8/puppet-status.8 +1 -1
  101. data/man/man8/puppet.8 +2 -2
  102. data/spec/fixtures/integration/application/apply/environments/spec/modules/amod/lib/puppet/provider/applytest/applytest.rb +2 -0
  103. data/spec/fixtures/integration/application/apply/environments/spec/modules/amod/lib/puppet/type/applytest.rb +25 -0
  104. data/spec/fixtures/unit/forge/bacula-releases.json +128 -0
  105. data/spec/fixtures/unit/forge/bacula.tar.gz +0 -0
  106. data/spec/integration/application/agent_spec.rb +29 -37
  107. data/spec/integration/application/apply_spec.rb +149 -149
  108. data/spec/integration/application/config_spec.rb +74 -0
  109. data/spec/integration/application/doc_spec.rb +16 -6
  110. data/spec/integration/application/filebucket_spec.rb +65 -16
  111. data/spec/integration/application/help_spec.rb +42 -0
  112. data/spec/integration/application/lookup_spec.rb +13 -0
  113. data/spec/integration/application/module_spec.rb +68 -0
  114. data/spec/integration/application/plugin_spec.rb +50 -0
  115. data/spec/integration/data_binding_spec.rb +82 -0
  116. data/spec/integration/directory_environments_spec.rb +17 -17
  117. data/spec/integration/indirector/facts/facter_spec.rb +8 -6
  118. data/spec/integration/node/environment_spec.rb +1 -1
  119. data/spec/integration/util/execution_spec.rb +22 -0
  120. data/spec/integration/util/windows/monkey_patches/dir_spec.rb +11 -0
  121. data/spec/integration/util/windows/process_spec.rb +26 -32
  122. data/spec/integration/util/windows/user_spec.rb +7 -0
  123. data/spec/integration/util_spec.rb +7 -33
  124. data/spec/lib/puppet_spec/matchers.rb +0 -80
  125. data/spec/lib/puppet_spec/puppetserver.rb +8 -0
  126. data/spec/unit/application/agent_spec.rb +3 -4
  127. data/spec/unit/application/face_base_spec.rb +6 -4
  128. data/spec/unit/application/facts_spec.rb +39 -10
  129. data/spec/unit/application/man_spec.rb +52 -0
  130. data/spec/unit/application/resource_spec.rb +3 -1
  131. data/spec/unit/application/ssl_spec.rb +15 -2
  132. data/spec/unit/configurer/downloader_spec.rb +10 -0
  133. data/spec/unit/configurer_spec.rb +47 -31
  134. data/spec/unit/confine_spec.rb +2 -1
  135. data/spec/unit/face/config_spec.rb +3 -1
  136. data/spec/unit/file_serving/mount/locales_spec.rb +2 -2
  137. data/spec/unit/file_serving/mount/pluginfacts_spec.rb +2 -2
  138. data/spec/unit/file_serving/mount/plugins_spec.rb +2 -2
  139. data/spec/unit/file_system/uniquefile_spec.rb +18 -0
  140. data/spec/unit/http/client_spec.rb +0 -1
  141. data/spec/unit/http/resolver_spec.rb +0 -1
  142. data/spec/unit/http/service/ca_spec.rb +0 -1
  143. data/spec/unit/http/service/compiler_spec.rb +0 -1
  144. data/spec/unit/http/service/file_server_spec.rb +0 -1
  145. data/spec/unit/http/service/report_spec.rb +0 -1
  146. data/spec/unit/http/service_spec.rb +0 -1
  147. data/spec/unit/http/session_spec.rb +0 -1
  148. data/spec/unit/module_tool/tar/mini_spec.rb +20 -0
  149. data/spec/unit/network/format_support_spec.rb +3 -2
  150. data/spec/unit/node/environment_spec.rb +18 -1
  151. data/spec/unit/pops/loaders/loaders_spec.rb +70 -0
  152. data/spec/unit/pops/lookup/lookup_spec.rb +25 -0
  153. data/spec/unit/provider/package/apt_spec.rb +77 -0
  154. data/spec/unit/provider/package/aptitude_spec.rb +1 -0
  155. data/spec/unit/provider/package/puppet_gem_spec.rb +4 -1
  156. data/spec/unit/provider/package/zypper_spec.rb +14 -0
  157. data/spec/unit/provider/service/init_spec.rb +41 -0
  158. data/spec/unit/provider/service/systemd_spec.rb +1 -6
  159. data/spec/unit/provider/service/windows_spec.rb +28 -0
  160. data/spec/unit/provider/user/windows_adsi_spec.rb +82 -0
  161. data/spec/unit/puppet_pal_2pec.rb +40 -0
  162. data/spec/unit/reports/store_spec.rb +17 -13
  163. data/spec/unit/transaction/persistence_spec.rb +15 -0
  164. data/spec/unit/type/service_spec.rb +35 -2
  165. data/spec/unit/type/user_spec.rb +31 -2
  166. data/spec/unit/util/character_encoding_spec.rb +4 -4
  167. data/spec/unit/util/command_line_spec.rb +11 -6
  168. metadata +21 -44
  169. data/spec/integration/faces/config_spec.rb +0 -91
  170. data/spec/integration/faces/documentation_spec.rb +0 -57
  171. data/spec/integration/file_bucket/file_spec.rb +0 -50
  172. data/spec/integration/file_serving/content_spec.rb +0 -7
  173. data/spec/integration/file_serving/fileset_spec.rb +0 -12
  174. data/spec/integration/file_serving/metadata_spec.rb +0 -8
  175. data/spec/integration/file_serving/terminus_helper_spec.rb +0 -20
  176. data/spec/integration/file_system/uniquefile_spec.rb +0 -26
  177. data/spec/integration/module_tool/forge_spec.rb +0 -51
  178. data/spec/integration/module_tool/tar/mini_spec.rb +0 -28
  179. data/spec/integration/provider/service/init_spec.rb +0 -48
  180. data/spec/integration/provider/service/systemd_spec.rb +0 -25
  181. data/spec/integration/provider/service/windows_spec.rb +0 -50
  182. data/spec/integration/reference/providers_spec.rb +0 -21
  183. data/spec/integration/reports_spec.rb +0 -13
  184. data/spec/integration/ssl/certificate_request_spec.rb +0 -44
  185. data/spec/integration/ssl/host_spec.rb +0 -72
  186. data/spec/integration/ssl/key_spec.rb +0 -99
  187. data/spec/shared_behaviours/file_serving_model.rb +0 -51
  188. data/spec/unit/face/man_spec.rb +0 -25
  189. data/spec/unit/man_spec.rb +0 -31
@@ -1,7 +0,0 @@
1
- require 'spec_helper'
2
-
3
- require 'puppet/file_serving/content'
4
-
5
- describe Puppet::FileServing::Content do
6
- it_should_behave_like "a file_serving model"
7
- end
@@ -1,12 +0,0 @@
1
- require 'spec_helper'
2
-
3
- require 'puppet/file_serving/fileset'
4
-
5
- describe Puppet::FileServing::Fileset do
6
- it "should be able to recurse on a single file" do
7
- @path = Tempfile.new("fileset_integration")
8
-
9
- fileset = Puppet::FileServing::Fileset.new(@path.path)
10
- expect { fileset.files }.not_to raise_error
11
- end
12
- end
@@ -1,8 +0,0 @@
1
- require 'spec_helper'
2
-
3
- require 'puppet/file_serving/metadata'
4
-
5
- describe Puppet::FileServing::Metadata do
6
- it_should_behave_like "a file_serving model"
7
- end
8
-
@@ -1,20 +0,0 @@
1
- require 'spec_helper'
2
-
3
- require 'puppet/file_serving/terminus_helper'
4
-
5
- class TerminusHelperIntegrationTester
6
- include Puppet::FileServing::TerminusHelper
7
- def model
8
- Puppet::FileServing::Metadata
9
- end
10
- end
11
-
12
- describe Puppet::FileServing::TerminusHelper do
13
- it "should be able to recurse on a single file" do
14
- @path = Tempfile.new("fileset_integration")
15
- request = Puppet::Indirector::Request.new(:metadata, :find, @path.path, nil, :recurse => true)
16
-
17
- tester = TerminusHelperIntegrationTester.new
18
- expect { tester.path2instances(request, @path.path) }.not_to raise_error
19
- end
20
- end
@@ -1,26 +0,0 @@
1
- require 'spec_helper'
2
-
3
- describe Puppet::FileSystem::Uniquefile do
4
- describe "#open_tmp on Windows", :if => Puppet::Util::Platform.windows? do
5
- describe "with UTF8 characters" do
6
- include PuppetSpec::Files
7
-
8
- let(:rune_utf8) { "\u16A0\u16C7\u16BB\u16EB\u16D2\u16E6\u16A6\u16EB\u16A0\u16B1\u16A9\u16A0\u16A2\u16B1\u16EB\u16A0\u16C1\u16B1\u16AA\u16EB\u16B7\u16D6\u16BB\u16B9\u16E6\u16DA\u16B3\u16A2\u16D7" }
9
- let(:temp_rune_utf8) { tmpdir(rune_utf8) }
10
-
11
- it "should use UTF8 characters in TMP,TEMP,TMPDIR environment variable" do
12
- # Set the temporary environment variables to the UTF8 temp path
13
- Puppet::Util::Windows::Process.set_environment_variable('TMPDIR', temp_rune_utf8)
14
- Puppet::Util::Windows::Process.set_environment_variable('TMP', temp_rune_utf8)
15
- Puppet::Util::Windows::Process.set_environment_variable('TEMP', temp_rune_utf8)
16
-
17
- # Create a unique file
18
- filename = Puppet::FileSystem::Uniquefile.open_tmp('foo') do |file|
19
- File.dirname(file.path)
20
- end
21
-
22
- expect(filename).to eq(temp_rune_utf8)
23
- end
24
- end
25
- end
26
- end
@@ -1,51 +0,0 @@
1
- require 'spec_helper'
2
- require 'puppet/forge'
3
- require 'puppet_spec/https'
4
-
5
- describe Puppet::Forge, unless: Puppet::Util::Platform.jruby? do
6
- include PuppetSpec::Files
7
- include_context "https client"
8
-
9
- let(:wrong_hostname) { 'localhost' }
10
- let(:server) { PuppetSpec::HTTPSServer.new }
11
- let(:ssl_provider) { Puppet::SSL::SSLProvider.new }
12
-
13
- let(:http_response) do
14
- File.read(fixtures('unit/forge/bacula.json'))
15
- end
16
-
17
- let(:release_response) do
18
- releases = JSON.parse(http_response)
19
- releases['results'] = []
20
- JSON.dump(releases)
21
- end
22
-
23
- it 'fetching module release entries' do
24
- # create a temp cacert bundle
25
- ssl_file = tmpfile('systemstore')
26
- File.write(ssl_file, server.ca_cert)
27
-
28
- # override path to system cacert bundle, this must be done before
29
- # the SSLContext is created and the call to X509::Store.set_default_paths
30
- Puppet::Util.withenv("SSL_CERT_FILE" => ssl_file) do
31
- response_proc = -> (req, res) {
32
- res.status = 200
33
- res.body = release_response
34
- }
35
-
36
- server.start_server(response_proc: response_proc) do |port|
37
- forge = described_class.new("https://127.0.0.1:#{port}")
38
- forge.fetch('bacula')
39
- end
40
- end
41
- end
42
-
43
- it 'returns a valid exception when there is an SSL verification problem' do
44
- server.start_server do |port|
45
- forge = described_class.new("https://#{wrong_hostname}:#{port}")
46
- expect {
47
- forge.fetch('mymodule')
48
- }.to raise_error Puppet::Forge::Errors::SSLVerifyError, %r{^Unable to verify the SSL certificate at https://#{wrong_hostname}}
49
- end
50
- end
51
- end
@@ -1,28 +0,0 @@
1
- require 'spec_helper'
2
- require 'puppet/module_tool'
3
- require 'puppet_spec/files'
4
-
5
- describe Puppet::ModuleTool::Tar::Mini, :if => (Puppet.features.minitar? && Puppet.features.zlib?) do
6
- let(:minitar) { described_class.new }
7
-
8
- describe "Extracts tars with long and short pathnames" do
9
- let (:sourcetar) { File.expand_path('../../../../fixtures/module.tar.gz', __FILE__) }
10
-
11
- let (:longfilepath) { "puppetlabs-dsc-1.0.0/lib/puppet_x/dsc_resources/xWebAdministration/DSCResources/MSFT_xWebAppPoolDefaults/MSFT_xWebAppPoolDefaults.schema.mof" }
12
- let (:shortfilepath) { "puppetlabs-dsc-1.0.0/README.md" }
13
-
14
- it "unpacks a tar with a short path length" do
15
- extractdir = PuppetSpec::Files.tmpdir('minitar')
16
-
17
- minitar.unpack(sourcetar,extractdir,'module')
18
- expect(File).to exist(File.expand_path("#{extractdir}/#{shortfilepath}"))
19
- end
20
-
21
- it "unpacks a tar with a long path length" do
22
- extractdir = PuppetSpec::Files.tmpdir('minitar')
23
-
24
- minitar.unpack(sourcetar,extractdir,'module')
25
- expect(File).to exist(File.expand_path("#{extractdir}/#{longfilepath}"))
26
- end
27
- end
28
- end
@@ -1,48 +0,0 @@
1
- require 'spec_helper'
2
-
3
- test_title = 'Integration Tests for Puppet::Type::Service::Provider::Init'
4
-
5
- describe test_title, unless: Puppet::Util::Platform.jruby? do
6
- let(:provider) { Puppet::Type.type(:service).provider(:init) }
7
-
8
- describe "when running on FreeBSD" do
9
- before :each do
10
- allow(Facter).to receive(:value).with(:operatingsystem).and_return('FreeBSD')
11
- allow(Facter).to receive(:value).with(:osfamily).and_return('FreeBSD')
12
- end
13
-
14
- it "should set its default path to include /etc/rc.d and /usr/local/etc/rc.d" do
15
- expect(provider.defpath).to eq(["/etc/rc.d", "/usr/local/etc/rc.d"])
16
- end
17
- end
18
-
19
- describe "when running on HP-UX" do
20
- before :each do
21
- allow(Facter).to receive(:value).with(:operatingsystem).and_return('HP-UX')
22
- end
23
-
24
- it "should set its default path to include /sbin/init.d" do
25
- expect(provider.defpath).to eq("/sbin/init.d")
26
- end
27
- end
28
-
29
- describe "when running on Archlinux" do
30
- before :each do
31
- allow(Facter).to receive(:value).with(:operatingsystem).and_return('Archlinux')
32
- end
33
-
34
- it "should set its default path to include /etc/rc.d" do
35
- expect(provider.defpath).to eq("/etc/rc.d")
36
- end
37
- end
38
-
39
- describe "when not running on FreeBSD, HP-UX or Archlinux" do
40
- before :each do
41
- allow(Facter).to receive(:value).with(:operatingsystem).and_return('RedHat')
42
- end
43
-
44
- it "should set its default path to include /etc/init.d" do
45
- expect(provider.defpath).to eq("/etc/init.d")
46
- end
47
- end
48
- end
@@ -1,25 +0,0 @@
1
- require 'spec_helper'
2
-
3
- test_title = 'Integration Tests for Puppet::Type::Service::Provider::Systemd'
4
-
5
- describe test_title, unless: Puppet::Util::Platform.jruby? do
6
- let(:provider_class) { Puppet::Type.type(:service).provider(:systemd) }
7
-
8
- # TODO: Unfortunately there does not seem a way to stub the executable
9
- # checks in the systemd provider because they happen at load time.
10
-
11
- it "should be considered suitable if /proc/1/comm is present and contains 'systemd'",
12
- :if => File.exist?('/proc/1/comm') && Puppet::FileSystem.read('/proc/1/comm').include?('systemd') do
13
- expect(provider_class).to be_suitable
14
- end
15
-
16
- it "should not be considered suitable if /proc/1/comm is present it does not contain 'systemd'",
17
- :if => File.exist?('/proc/1/comm') && !Puppet::FileSystem.read('/proc/1/comm').include?('systemd') do
18
- expect(provider_class).not_to be_suitable
19
- end
20
-
21
- it "should not be considered suitable if /proc/1/comm is absent",
22
- :if => !File.exist?('/proc/1/comm') do
23
- expect(provider_class).not_to be_suitable
24
- end
25
- end
@@ -1,50 +0,0 @@
1
- require 'spec_helper'
2
-
3
- test_title = 'Integration Tests for Puppet::Type::Service::Provider::Windows'
4
-
5
- describe test_title, '(integration)', :if => Puppet::Util::Platform.windows? do
6
- let(:provider_class) { Puppet::Type.type(:service).provider(:windows) }
7
-
8
- require 'puppet/util/windows'
9
-
10
- before :each do
11
- allow(Puppet::Type.type(:service)).to receive(:defaultprovider).and_return(provider_class)
12
- end
13
-
14
- context 'should return valid values when querying a service that does not exist' do
15
- let(:service) do
16
- Puppet::Type.type(:service).new(:name => 'foobarservice1234')
17
- end
18
-
19
- it "with :false when asked if enabled" do
20
- expect(service.provider.enabled?).to eql(:false)
21
- end
22
-
23
- it "with :stopped when asked about status" do
24
- expect(service.provider.status).to eql(:stopped)
25
- end
26
- end
27
-
28
- context 'should return valid values when querying a service that does exist' do
29
- let(:service) do
30
- # This service should be ubiquitous across all supported Windows platforms
31
- Puppet::Type.type(:service).new(:name => 'lmhosts')
32
- end
33
-
34
- it "with a valid enabled? value when asked if enabled" do
35
- expect([:true, :false, :manual]).to include(service.provider.enabled?)
36
- end
37
-
38
- it "with a valid status when asked about status" do
39
- expect([
40
- :running,
41
- :'continue pending',
42
- :'pause pending',
43
- :paused,
44
- :running,
45
- :'start pending',
46
- :'stop pending',
47
- :stopped]).to include(service.provider.status)
48
- end
49
- end
50
- end
@@ -1,21 +0,0 @@
1
- require 'spec_helper'
2
-
3
- require 'puppet/util/reference'
4
-
5
- reference = Puppet::Util::Reference.reference(:providers)
6
-
7
- describe reference do
8
- it "should exist" do
9
- expect(reference).not_to be_nil
10
- end
11
-
12
- it "should be able to be rendered as markdown" do
13
- # We have a :confine block that calls execute in our upstart provider, which fails
14
- # on jruby. Thus, we stub it out here since we don't care to do any assertions on it.
15
- # This is only an issue if you're running these unit tests on a platform where upstart
16
- # is a default provider, like Ubuntu trusty.
17
- allow(Puppet::Util::Execution).to receive(:execute)
18
-
19
- reference.to_markdown
20
- end
21
- end
@@ -1,13 +0,0 @@
1
- require 'spec_helper'
2
-
3
- require 'puppet/reports'
4
-
5
- describe Puppet::Reports, " when using report types" do
6
- before do
7
- allow(Puppet.settings).to receive(:use)
8
- end
9
-
10
- it "should load report types as modules" do
11
- expect(Puppet::Reports.report(:store)).to be_instance_of(Module)
12
- end
13
- end
@@ -1,44 +0,0 @@
1
- require 'spec_helper'
2
-
3
- require 'puppet/ssl/certificate_request'
4
-
5
- describe Puppet::SSL::CertificateRequest do
6
- include PuppetSpec::Files
7
-
8
- before do
9
- # Get a safe temporary file
10
- dir = tmpdir("csr_integration_testing")
11
-
12
- Puppet.settings[:confdir] = dir
13
- Puppet.settings[:vardir] = dir
14
-
15
- @csr = Puppet::SSL::CertificateRequest.new("luke.madstop.com")
16
-
17
- @key = OpenSSL::PKey::RSA.new(512)
18
-
19
- # This is necessary so the terminus instances don't lie around.
20
- Puppet::SSL::CertificateRequest.indirection.termini.clear
21
- end
22
-
23
- it "should be able to generate CSRs" do
24
- @csr.generate(@key)
25
- end
26
-
27
- it "should be able to save CSRs" do
28
- Puppet::SSL::CertificateRequest.indirection.save(@csr)
29
- end
30
-
31
- it "should be able to find saved certificate requests via the Indirector" do
32
- @csr.generate(@key)
33
- Puppet::SSL::CertificateRequest.indirection.save(@csr)
34
-
35
- expect(Puppet::SSL::CertificateRequest.indirection.find("luke.madstop.com")).to be_instance_of(Puppet::SSL::CertificateRequest)
36
- end
37
-
38
- it "should save the completely CSR when saving" do
39
- @csr.generate(@key)
40
- Puppet::SSL::CertificateRequest.indirection.save(@csr)
41
-
42
- expect(Puppet::SSL::CertificateRequest.indirection.find("luke.madstop.com").content.to_s).to eq(@csr.content.to_s)
43
- end
44
- end
@@ -1,72 +0,0 @@
1
- require 'spec_helper'
2
- require 'puppet/test_ca'
3
-
4
- require 'puppet/ssl/host'
5
-
6
- describe Puppet::SSL::Host, if: !Puppet::Util::Platform.jruby? do
7
- include PuppetSpec::Files
8
-
9
- before do
10
- # Get a safe temporary file
11
- dir = tmpdir("host_integration_testing")
12
-
13
- Puppet.settings[:confdir] = dir
14
- Puppet.settings[:vardir] = dir
15
- Puppet.settings.use :main, :ssl
16
-
17
- @host = Puppet::SSL::Host.new("luke.madstop.com")
18
- allow(@host).to receive(:submit_certificate_request)
19
-
20
- @ca = Puppet::TestCa.new
21
- Puppet::Util.replace_file(Puppet[:localcacert], 0644) do |f|
22
- f.write(@ca.ca_cert.to_s)
23
- end
24
- Puppet::Util.replace_file(Puppet[:hostcrl], 0644) do |f|
25
- f.write(@ca.ca_crl.to_s)
26
- end
27
- end
28
-
29
- describe "when managing its key" do
30
- it "should be able to generate and save a key" do
31
- @host.generate_key
32
- end
33
-
34
- it "should save the key such that the Indirector can find it" do
35
- @host.generate_key
36
-
37
- expect(Puppet::SSL::Key.indirection.find(@host.name).content.to_s).to eq(@host.key.to_s)
38
- end
39
-
40
- it "should save the private key into the :privatekeydir" do
41
- @host.generate_key
42
- expect(File.read(File.join(Puppet.settings[:privatekeydir], "luke.madstop.com.pem"))).to eq(@host.key.to_s)
43
- end
44
- end
45
-
46
- describe "when managing its certificate request" do
47
- it "should be able to generate and save a certificate request" do
48
- @host.generate_certificate_request
49
- end
50
-
51
- it "should save the certificate request such that the Indirector can find it" do
52
- @host.generate_certificate_request
53
-
54
- expect(Puppet::SSL::CertificateRequest.indirection.find(@host.name).content.to_s).to eq(@host.certificate_request.to_s)
55
- end
56
-
57
- it "should save the private certificate request into the :privatekeydir" do
58
- @host.generate_certificate_request
59
- expect(File.read(File.join(Puppet.settings[:requestdir], "luke.madstop.com.pem"))).to eq(@host.certificate_request.to_s)
60
- end
61
- end
62
-
63
- it "should pass the verification of its own SSL store", :unless => Puppet.features.microsoft_windows? do
64
- @host.generate_certificate_request
65
- cert = @ca.sign(@host.certificate_request.content)
66
- Puppet::Util.replace_file(File.join(Puppet[:certdir], "#{@host.name}.pem"), 0644) do |f|
67
- f.write(cert)
68
- end
69
-
70
- expect(@host.ssl_store.verify(@host.certificate.content)).to be_truthy
71
- end
72
- end
@@ -1,99 +0,0 @@
1
- require 'spec_helper'
2
-
3
- require 'puppet/ssl/key'
4
-
5
- describe Puppet::SSL::Key, unless: Puppet::Util::Platform.jruby? do
6
- include PuppetSpec::Files
7
-
8
- # different UTF-8 widths
9
- # 1-byte A
10
- # 2-byte ۿ - http://www.fileformat.info/info/unicode/char/06ff/index.htm - 0xDB 0xBF / 219 191
11
- # 3-byte ᚠ - http://www.fileformat.info/info/unicode/char/16A0/index.htm - 0xE1 0x9A 0xA0 / 225 154 160
12
- # 4-byte ܎ - http://www.fileformat.info/info/unicode/char/2070E/index.htm - 0xF0 0xA0 0x9C 0x8E / 240 160 156 142
13
- let (:mixed_utf8) { "A\u06FF\u16A0\u{2070E}" } # Aۿᚠ܎
14
-
15
- before do
16
- # Get a safe temporary file
17
- dir = tmpdir('key_integration_testing')
18
-
19
- Puppet.settings[:confdir] = dir
20
- Puppet.settings[:vardir] = dir
21
-
22
- # This is necessary so the terminus instances don't lie around.
23
- # and so that Puppet::SSL::Key.indirection.save may be used
24
- Puppet::SSL::Key.indirection.termini.clear
25
- end
26
-
27
- describe 'with a custom user-specified passfile' do
28
-
29
- before do
30
- # write custom password file to where Puppet expects
31
- password_file = tmpfile('passfile')
32
- Puppet[:passfile] = password_file
33
- Puppet::FileSystem.open(password_file, nil, 'w:UTF-8') { |f| f.print(mixed_utf8) }
34
- end
35
-
36
- it 'should use the configured password file if it is not the CA key' do
37
- key = Puppet::SSL::Key.new('test')
38
- expect(key.password_file).to eq(Puppet[:passfile])
39
- expect(key.password).to eq(mixed_utf8.force_encoding(Encoding::BINARY))
40
- end
41
-
42
- it "should be able to read an existing private key given the correct password" do
43
- key_name = 'test'
44
- # use OpenSSL APIs to generate a private key
45
- private_key = OpenSSL::PKey::RSA.generate(512)
46
-
47
- # stash it in Puppets private key directory
48
- FileUtils.mkdir_p(Puppet[:privatekeydir])
49
- pem_path = File.join(Puppet[:privatekeydir], "#{key_name}.pem")
50
- Puppet::FileSystem.open(pem_path, nil, 'w:UTF-8') do |f|
51
- # with password protection enabled
52
- pem = private_key.to_pem(OpenSSL::Cipher::DES.new(:EDE3, :CBC), mixed_utf8)
53
- f.print(pem)
54
- end
55
-
56
- # indirector loads existing .pem off disk instead of replacing it
57
- host = Puppet::SSL::Host.new(key_name)
58
- host.key
59
-
60
- # newly loaded host private key matches the manually created key
61
- # Private-Key: (512 bit) style data
62
- expect(host.key.content.to_text).to eq(private_key.to_text)
63
- # -----BEGIN RSA PRIVATE KEY-----
64
- expect(host.key.content.to_s).to eq(private_key.to_s)
65
- expect(host.key.password).to eq(mixed_utf8.force_encoding(Encoding::BINARY))
66
- end
67
-
68
- it 'should export the private key to PEM using the password' do
69
- key_name = 'test'
70
-
71
- # uses specified :passfile when writing the private key
72
- key = Puppet::SSL::Key.new(key_name)
73
- key.generate
74
- Puppet::SSL::Key.indirection.save(key)
75
-
76
- # indirector writes file here
77
- pem_path = File.join(Puppet[:privatekeydir], "#{key_name}.pem")
78
-
79
- # note incorrect password is an error
80
- expect do
81
- Puppet::FileSystem.open(pem_path, nil, 'r:ASCII') do |f|
82
- OpenSSL::PKey::RSA.new(f.read, 'invalid_password')
83
- end
84
- end.to raise_error(OpenSSL::PKey::RSAError)
85
-
86
- # but when specifying the correct password
87
- reloaded_key = nil
88
- Puppet::FileSystem.open(pem_path, nil, 'r:ASCII') do |f|
89
- reloaded_key = OpenSSL::PKey::RSA.new(f.read, mixed_utf8)
90
- end
91
-
92
- # the original key matches the manually reloaded key
93
- # Private-Key: (512 bit) style data
94
- expect(key.content.to_text).to eq(reloaded_key.to_text)
95
- # -----BEGIN RSA PRIVATE KEY-----
96
- expect(key.content.to_s).to eq(reloaded_key.to_s)
97
- end
98
- end
99
- end