puppet 6.17.0-x64-mingw32 → 6.18.0-x64-mingw32
Sign up to get free protection for your applications and to get access to all the features.
Potentially problematic release.
This version of puppet might be problematic. Click here for more details.
- checksums.yaml +4 -4
- data/Gemfile.lock +6 -5
- data/lib/puppet/application/apply.rb +18 -20
- data/lib/puppet/application/lookup.rb +16 -4
- data/lib/puppet/configurer/downloader.rb +31 -10
- data/lib/puppet/confine.rb +1 -1
- data/lib/puppet/confine/any.rb +1 -1
- data/lib/puppet/defaults.rb +21 -3
- data/lib/puppet/feature/base.rb +1 -1
- data/lib/puppet/file_serving/mount/locales.rb +1 -2
- data/lib/puppet/file_serving/mount/pluginfacts.rb +1 -2
- data/lib/puppet/file_serving/mount/plugins.rb +1 -2
- data/lib/puppet/file_system/file_impl.rb +3 -3
- data/lib/puppet/functions/lstrip.rb +4 -4
- data/lib/puppet/functions/reverse_each.rb +1 -1
- data/lib/puppet/functions/rstrip.rb +4 -4
- data/lib/puppet/functions/step.rb +1 -1
- data/lib/puppet/functions/strip.rb +4 -4
- data/lib/puppet/gettext/config.rb +5 -5
- data/lib/puppet/gettext/module_translations.rb +4 -4
- data/lib/puppet/indirector/exec.rb +1 -1
- data/lib/puppet/indirector/facts/facter.rb +3 -3
- data/lib/puppet/indirector/file_metadata/http.rb +1 -0
- data/lib/puppet/indirector/hiera.rb +4 -0
- data/lib/puppet/indirector/indirection.rb +1 -1
- data/lib/puppet/indirector/report/processor.rb +2 -2
- data/lib/puppet/module.rb +1 -2
- data/lib/puppet/network/format_support.rb +2 -2
- data/lib/puppet/network/http/route.rb +2 -2
- data/lib/puppet/node/environment.rb +12 -5
- data/lib/puppet/pal/pal_impl.rb +27 -3
- data/lib/puppet/parameter.rb +1 -1
- data/lib/puppet/parser/functions.rb +21 -17
- data/lib/puppet/parser/functions/create_resources.rb +11 -7
- data/lib/puppet/parser/type_loader.rb +2 -2
- data/lib/puppet/pops/adaptable.rb +7 -13
- data/lib/puppet/pops/adapters.rb +8 -4
- data/lib/puppet/pops/loader/runtime3_type_loader.rb +4 -2
- data/lib/puppet/pops/loaders.rb +18 -11
- data/lib/puppet/pops/lookup/context.rb +1 -1
- data/lib/puppet/pops/lookup/hiera_config.rb +14 -1
- data/lib/puppet/pops/types/iterable.rb +34 -8
- data/lib/puppet/pops/validation/checker4_0.rb +19 -15
- data/lib/puppet/provider/file/windows.rb +1 -1
- data/lib/puppet/provider/package/apt.rb +34 -0
- data/lib/puppet/provider/package/gem.rb +4 -2
- data/lib/puppet/provider/package/puppet_gem.rb +5 -0
- data/lib/puppet/provider/package/zypper.rb +3 -0
- data/lib/puppet/provider/user/aix.rb +1 -1
- data/lib/puppet/provider/user/user_role_add.rb +1 -1
- data/lib/puppet/provider/user/windows_adsi.rb +18 -1
- data/lib/puppet/settings.rb +1 -1
- data/lib/puppet/ssl/validator/default_validator.rb +1 -1
- data/lib/puppet/test/test_helper.rb +10 -3
- data/lib/puppet/transaction.rb +2 -2
- data/lib/puppet/transaction/persistence.rb +1 -1
- data/lib/puppet/transaction/report.rb +1 -1
- data/lib/puppet/trusted_external.rb +2 -2
- data/lib/puppet/type.rb +4 -3
- data/lib/puppet/type/file.rb +2 -2
- data/lib/puppet/type/file/source.rb +27 -7
- data/lib/puppet/type/notify.rb +2 -2
- data/lib/puppet/type/service.rb +4 -0
- data/lib/puppet/type/user.rb +18 -3
- data/lib/puppet/util.rb +26 -12
- data/lib/puppet/util/autoload.rb +9 -7
- data/lib/puppet/util/character_encoding.rb +9 -5
- data/lib/puppet/util/execution.rb +2 -2
- data/lib/puppet/util/windows.rb +1 -0
- data/lib/puppet/util/windows/api_types.rb +15 -1
- data/lib/puppet/util/windows/monkey_patches/dir.rb +40 -0
- data/lib/puppet/util/windows/security.rb +4 -4
- data/lib/puppet/util/windows/user.rb +219 -0
- data/lib/puppet/version.rb +1 -1
- data/locales/puppet.pot +78 -69
- data/man/man5/puppet.conf.5 +22 -3
- data/man/man8/puppet-agent.8 +1 -1
- data/man/man8/puppet-apply.8 +1 -1
- data/man/man8/puppet-catalog.8 +1 -1
- data/man/man8/puppet-config.8 +1 -1
- data/man/man8/puppet-describe.8 +1 -1
- data/man/man8/puppet-device.8 +1 -1
- data/man/man8/puppet-doc.8 +1 -1
- data/man/man8/puppet-epp.8 +1 -1
- data/man/man8/puppet-facts.8 +1 -1
- data/man/man8/puppet-filebucket.8 +1 -1
- data/man/man8/puppet-generate.8 +1 -1
- data/man/man8/puppet-help.8 +1 -1
- data/man/man8/puppet-key.8 +1 -1
- data/man/man8/puppet-lookup.8 +2 -2
- data/man/man8/puppet-man.8 +1 -1
- data/man/man8/puppet-module.8 +1 -1
- data/man/man8/puppet-node.8 +1 -1
- data/man/man8/puppet-parser.8 +1 -1
- data/man/man8/puppet-plugin.8 +1 -1
- data/man/man8/puppet-report.8 +1 -1
- data/man/man8/puppet-resource.8 +1 -1
- data/man/man8/puppet-script.8 +1 -1
- data/man/man8/puppet-ssl.8 +1 -1
- data/man/man8/puppet-status.8 +1 -1
- data/man/man8/puppet.8 +2 -2
- data/spec/fixtures/integration/application/apply/environments/spec/modules/amod/lib/puppet/provider/applytest/applytest.rb +2 -0
- data/spec/fixtures/integration/application/apply/environments/spec/modules/amod/lib/puppet/type/applytest.rb +25 -0
- data/spec/fixtures/unit/forge/bacula-releases.json +128 -0
- data/spec/fixtures/unit/forge/bacula.tar.gz +0 -0
- data/spec/integration/application/agent_spec.rb +29 -37
- data/spec/integration/application/apply_spec.rb +149 -149
- data/spec/integration/application/config_spec.rb +74 -0
- data/spec/integration/application/doc_spec.rb +16 -6
- data/spec/integration/application/filebucket_spec.rb +65 -16
- data/spec/integration/application/help_spec.rb +42 -0
- data/spec/integration/application/lookup_spec.rb +13 -0
- data/spec/integration/application/module_spec.rb +68 -0
- data/spec/integration/application/plugin_spec.rb +50 -0
- data/spec/integration/data_binding_spec.rb +82 -0
- data/spec/integration/directory_environments_spec.rb +17 -17
- data/spec/integration/indirector/facts/facter_spec.rb +8 -6
- data/spec/integration/node/environment_spec.rb +1 -1
- data/spec/integration/util/execution_spec.rb +22 -0
- data/spec/integration/util/windows/monkey_patches/dir_spec.rb +11 -0
- data/spec/integration/util/windows/process_spec.rb +26 -32
- data/spec/integration/util/windows/user_spec.rb +7 -0
- data/spec/integration/util_spec.rb +7 -33
- data/spec/lib/puppet_spec/matchers.rb +0 -80
- data/spec/lib/puppet_spec/puppetserver.rb +8 -0
- data/spec/unit/application/agent_spec.rb +3 -4
- data/spec/unit/application/face_base_spec.rb +6 -4
- data/spec/unit/application/facts_spec.rb +39 -10
- data/spec/unit/application/man_spec.rb +52 -0
- data/spec/unit/application/resource_spec.rb +3 -1
- data/spec/unit/application/ssl_spec.rb +15 -2
- data/spec/unit/configurer/downloader_spec.rb +10 -0
- data/spec/unit/configurer_spec.rb +47 -31
- data/spec/unit/confine_spec.rb +2 -1
- data/spec/unit/face/config_spec.rb +3 -1
- data/spec/unit/file_serving/mount/locales_spec.rb +2 -2
- data/spec/unit/file_serving/mount/pluginfacts_spec.rb +2 -2
- data/spec/unit/file_serving/mount/plugins_spec.rb +2 -2
- data/spec/unit/file_system/uniquefile_spec.rb +18 -0
- data/spec/unit/http/client_spec.rb +0 -1
- data/spec/unit/http/resolver_spec.rb +0 -1
- data/spec/unit/http/service/ca_spec.rb +0 -1
- data/spec/unit/http/service/compiler_spec.rb +0 -1
- data/spec/unit/http/service/file_server_spec.rb +0 -1
- data/spec/unit/http/service/report_spec.rb +0 -1
- data/spec/unit/http/service_spec.rb +0 -1
- data/spec/unit/http/session_spec.rb +0 -1
- data/spec/unit/module_tool/tar/mini_spec.rb +20 -0
- data/spec/unit/network/format_support_spec.rb +3 -2
- data/spec/unit/node/environment_spec.rb +18 -1
- data/spec/unit/pops/loaders/loaders_spec.rb +70 -0
- data/spec/unit/pops/lookup/lookup_spec.rb +25 -0
- data/spec/unit/provider/package/apt_spec.rb +77 -0
- data/spec/unit/provider/package/aptitude_spec.rb +1 -0
- data/spec/unit/provider/package/puppet_gem_spec.rb +4 -1
- data/spec/unit/provider/package/zypper_spec.rb +14 -0
- data/spec/unit/provider/service/init_spec.rb +41 -0
- data/spec/unit/provider/service/systemd_spec.rb +1 -6
- data/spec/unit/provider/service/windows_spec.rb +28 -0
- data/spec/unit/provider/user/windows_adsi_spec.rb +82 -0
- data/spec/unit/puppet_pal_2pec.rb +40 -0
- data/spec/unit/reports/store_spec.rb +17 -13
- data/spec/unit/transaction/persistence_spec.rb +15 -0
- data/spec/unit/type/service_spec.rb +35 -2
- data/spec/unit/type/user_spec.rb +31 -2
- data/spec/unit/util/character_encoding_spec.rb +4 -4
- data/spec/unit/util/command_line_spec.rb +11 -6
- metadata +21 -44
- data/spec/integration/faces/config_spec.rb +0 -91
- data/spec/integration/faces/documentation_spec.rb +0 -57
- data/spec/integration/file_bucket/file_spec.rb +0 -50
- data/spec/integration/file_serving/content_spec.rb +0 -7
- data/spec/integration/file_serving/fileset_spec.rb +0 -12
- data/spec/integration/file_serving/metadata_spec.rb +0 -8
- data/spec/integration/file_serving/terminus_helper_spec.rb +0 -20
- data/spec/integration/file_system/uniquefile_spec.rb +0 -26
- data/spec/integration/module_tool/forge_spec.rb +0 -51
- data/spec/integration/module_tool/tar/mini_spec.rb +0 -28
- data/spec/integration/provider/service/init_spec.rb +0 -48
- data/spec/integration/provider/service/systemd_spec.rb +0 -25
- data/spec/integration/provider/service/windows_spec.rb +0 -50
- data/spec/integration/reference/providers_spec.rb +0 -21
- data/spec/integration/reports_spec.rb +0 -13
- data/spec/integration/ssl/certificate_request_spec.rb +0 -44
- data/spec/integration/ssl/host_spec.rb +0 -72
- data/spec/integration/ssl/key_spec.rb +0 -99
- data/spec/shared_behaviours/file_serving_model.rb +0 -51
- data/spec/unit/face/man_spec.rb +0 -25
- data/spec/unit/man_spec.rb +0 -31
@@ -1,12 +0,0 @@
|
|
1
|
-
require 'spec_helper'
|
2
|
-
|
3
|
-
require 'puppet/file_serving/fileset'
|
4
|
-
|
5
|
-
describe Puppet::FileServing::Fileset do
|
6
|
-
it "should be able to recurse on a single file" do
|
7
|
-
@path = Tempfile.new("fileset_integration")
|
8
|
-
|
9
|
-
fileset = Puppet::FileServing::Fileset.new(@path.path)
|
10
|
-
expect { fileset.files }.not_to raise_error
|
11
|
-
end
|
12
|
-
end
|
@@ -1,20 +0,0 @@
|
|
1
|
-
require 'spec_helper'
|
2
|
-
|
3
|
-
require 'puppet/file_serving/terminus_helper'
|
4
|
-
|
5
|
-
class TerminusHelperIntegrationTester
|
6
|
-
include Puppet::FileServing::TerminusHelper
|
7
|
-
def model
|
8
|
-
Puppet::FileServing::Metadata
|
9
|
-
end
|
10
|
-
end
|
11
|
-
|
12
|
-
describe Puppet::FileServing::TerminusHelper do
|
13
|
-
it "should be able to recurse on a single file" do
|
14
|
-
@path = Tempfile.new("fileset_integration")
|
15
|
-
request = Puppet::Indirector::Request.new(:metadata, :find, @path.path, nil, :recurse => true)
|
16
|
-
|
17
|
-
tester = TerminusHelperIntegrationTester.new
|
18
|
-
expect { tester.path2instances(request, @path.path) }.not_to raise_error
|
19
|
-
end
|
20
|
-
end
|
@@ -1,26 +0,0 @@
|
|
1
|
-
require 'spec_helper'
|
2
|
-
|
3
|
-
describe Puppet::FileSystem::Uniquefile do
|
4
|
-
describe "#open_tmp on Windows", :if => Puppet::Util::Platform.windows? do
|
5
|
-
describe "with UTF8 characters" do
|
6
|
-
include PuppetSpec::Files
|
7
|
-
|
8
|
-
let(:rune_utf8) { "\u16A0\u16C7\u16BB\u16EB\u16D2\u16E6\u16A6\u16EB\u16A0\u16B1\u16A9\u16A0\u16A2\u16B1\u16EB\u16A0\u16C1\u16B1\u16AA\u16EB\u16B7\u16D6\u16BB\u16B9\u16E6\u16DA\u16B3\u16A2\u16D7" }
|
9
|
-
let(:temp_rune_utf8) { tmpdir(rune_utf8) }
|
10
|
-
|
11
|
-
it "should use UTF8 characters in TMP,TEMP,TMPDIR environment variable" do
|
12
|
-
# Set the temporary environment variables to the UTF8 temp path
|
13
|
-
Puppet::Util::Windows::Process.set_environment_variable('TMPDIR', temp_rune_utf8)
|
14
|
-
Puppet::Util::Windows::Process.set_environment_variable('TMP', temp_rune_utf8)
|
15
|
-
Puppet::Util::Windows::Process.set_environment_variable('TEMP', temp_rune_utf8)
|
16
|
-
|
17
|
-
# Create a unique file
|
18
|
-
filename = Puppet::FileSystem::Uniquefile.open_tmp('foo') do |file|
|
19
|
-
File.dirname(file.path)
|
20
|
-
end
|
21
|
-
|
22
|
-
expect(filename).to eq(temp_rune_utf8)
|
23
|
-
end
|
24
|
-
end
|
25
|
-
end
|
26
|
-
end
|
@@ -1,51 +0,0 @@
|
|
1
|
-
require 'spec_helper'
|
2
|
-
require 'puppet/forge'
|
3
|
-
require 'puppet_spec/https'
|
4
|
-
|
5
|
-
describe Puppet::Forge, unless: Puppet::Util::Platform.jruby? do
|
6
|
-
include PuppetSpec::Files
|
7
|
-
include_context "https client"
|
8
|
-
|
9
|
-
let(:wrong_hostname) { 'localhost' }
|
10
|
-
let(:server) { PuppetSpec::HTTPSServer.new }
|
11
|
-
let(:ssl_provider) { Puppet::SSL::SSLProvider.new }
|
12
|
-
|
13
|
-
let(:http_response) do
|
14
|
-
File.read(fixtures('unit/forge/bacula.json'))
|
15
|
-
end
|
16
|
-
|
17
|
-
let(:release_response) do
|
18
|
-
releases = JSON.parse(http_response)
|
19
|
-
releases['results'] = []
|
20
|
-
JSON.dump(releases)
|
21
|
-
end
|
22
|
-
|
23
|
-
it 'fetching module release entries' do
|
24
|
-
# create a temp cacert bundle
|
25
|
-
ssl_file = tmpfile('systemstore')
|
26
|
-
File.write(ssl_file, server.ca_cert)
|
27
|
-
|
28
|
-
# override path to system cacert bundle, this must be done before
|
29
|
-
# the SSLContext is created and the call to X509::Store.set_default_paths
|
30
|
-
Puppet::Util.withenv("SSL_CERT_FILE" => ssl_file) do
|
31
|
-
response_proc = -> (req, res) {
|
32
|
-
res.status = 200
|
33
|
-
res.body = release_response
|
34
|
-
}
|
35
|
-
|
36
|
-
server.start_server(response_proc: response_proc) do |port|
|
37
|
-
forge = described_class.new("https://127.0.0.1:#{port}")
|
38
|
-
forge.fetch('bacula')
|
39
|
-
end
|
40
|
-
end
|
41
|
-
end
|
42
|
-
|
43
|
-
it 'returns a valid exception when there is an SSL verification problem' do
|
44
|
-
server.start_server do |port|
|
45
|
-
forge = described_class.new("https://#{wrong_hostname}:#{port}")
|
46
|
-
expect {
|
47
|
-
forge.fetch('mymodule')
|
48
|
-
}.to raise_error Puppet::Forge::Errors::SSLVerifyError, %r{^Unable to verify the SSL certificate at https://#{wrong_hostname}}
|
49
|
-
end
|
50
|
-
end
|
51
|
-
end
|
@@ -1,28 +0,0 @@
|
|
1
|
-
require 'spec_helper'
|
2
|
-
require 'puppet/module_tool'
|
3
|
-
require 'puppet_spec/files'
|
4
|
-
|
5
|
-
describe Puppet::ModuleTool::Tar::Mini, :if => (Puppet.features.minitar? && Puppet.features.zlib?) do
|
6
|
-
let(:minitar) { described_class.new }
|
7
|
-
|
8
|
-
describe "Extracts tars with long and short pathnames" do
|
9
|
-
let (:sourcetar) { File.expand_path('../../../../fixtures/module.tar.gz', __FILE__) }
|
10
|
-
|
11
|
-
let (:longfilepath) { "puppetlabs-dsc-1.0.0/lib/puppet_x/dsc_resources/xWebAdministration/DSCResources/MSFT_xWebAppPoolDefaults/MSFT_xWebAppPoolDefaults.schema.mof" }
|
12
|
-
let (:shortfilepath) { "puppetlabs-dsc-1.0.0/README.md" }
|
13
|
-
|
14
|
-
it "unpacks a tar with a short path length" do
|
15
|
-
extractdir = PuppetSpec::Files.tmpdir('minitar')
|
16
|
-
|
17
|
-
minitar.unpack(sourcetar,extractdir,'module')
|
18
|
-
expect(File).to exist(File.expand_path("#{extractdir}/#{shortfilepath}"))
|
19
|
-
end
|
20
|
-
|
21
|
-
it "unpacks a tar with a long path length" do
|
22
|
-
extractdir = PuppetSpec::Files.tmpdir('minitar')
|
23
|
-
|
24
|
-
minitar.unpack(sourcetar,extractdir,'module')
|
25
|
-
expect(File).to exist(File.expand_path("#{extractdir}/#{longfilepath}"))
|
26
|
-
end
|
27
|
-
end
|
28
|
-
end
|
@@ -1,48 +0,0 @@
|
|
1
|
-
require 'spec_helper'
|
2
|
-
|
3
|
-
test_title = 'Integration Tests for Puppet::Type::Service::Provider::Init'
|
4
|
-
|
5
|
-
describe test_title, unless: Puppet::Util::Platform.jruby? do
|
6
|
-
let(:provider) { Puppet::Type.type(:service).provider(:init) }
|
7
|
-
|
8
|
-
describe "when running on FreeBSD" do
|
9
|
-
before :each do
|
10
|
-
allow(Facter).to receive(:value).with(:operatingsystem).and_return('FreeBSD')
|
11
|
-
allow(Facter).to receive(:value).with(:osfamily).and_return('FreeBSD')
|
12
|
-
end
|
13
|
-
|
14
|
-
it "should set its default path to include /etc/rc.d and /usr/local/etc/rc.d" do
|
15
|
-
expect(provider.defpath).to eq(["/etc/rc.d", "/usr/local/etc/rc.d"])
|
16
|
-
end
|
17
|
-
end
|
18
|
-
|
19
|
-
describe "when running on HP-UX" do
|
20
|
-
before :each do
|
21
|
-
allow(Facter).to receive(:value).with(:operatingsystem).and_return('HP-UX')
|
22
|
-
end
|
23
|
-
|
24
|
-
it "should set its default path to include /sbin/init.d" do
|
25
|
-
expect(provider.defpath).to eq("/sbin/init.d")
|
26
|
-
end
|
27
|
-
end
|
28
|
-
|
29
|
-
describe "when running on Archlinux" do
|
30
|
-
before :each do
|
31
|
-
allow(Facter).to receive(:value).with(:operatingsystem).and_return('Archlinux')
|
32
|
-
end
|
33
|
-
|
34
|
-
it "should set its default path to include /etc/rc.d" do
|
35
|
-
expect(provider.defpath).to eq("/etc/rc.d")
|
36
|
-
end
|
37
|
-
end
|
38
|
-
|
39
|
-
describe "when not running on FreeBSD, HP-UX or Archlinux" do
|
40
|
-
before :each do
|
41
|
-
allow(Facter).to receive(:value).with(:operatingsystem).and_return('RedHat')
|
42
|
-
end
|
43
|
-
|
44
|
-
it "should set its default path to include /etc/init.d" do
|
45
|
-
expect(provider.defpath).to eq("/etc/init.d")
|
46
|
-
end
|
47
|
-
end
|
48
|
-
end
|
@@ -1,25 +0,0 @@
|
|
1
|
-
require 'spec_helper'
|
2
|
-
|
3
|
-
test_title = 'Integration Tests for Puppet::Type::Service::Provider::Systemd'
|
4
|
-
|
5
|
-
describe test_title, unless: Puppet::Util::Platform.jruby? do
|
6
|
-
let(:provider_class) { Puppet::Type.type(:service).provider(:systemd) }
|
7
|
-
|
8
|
-
# TODO: Unfortunately there does not seem a way to stub the executable
|
9
|
-
# checks in the systemd provider because they happen at load time.
|
10
|
-
|
11
|
-
it "should be considered suitable if /proc/1/comm is present and contains 'systemd'",
|
12
|
-
:if => File.exist?('/proc/1/comm') && Puppet::FileSystem.read('/proc/1/comm').include?('systemd') do
|
13
|
-
expect(provider_class).to be_suitable
|
14
|
-
end
|
15
|
-
|
16
|
-
it "should not be considered suitable if /proc/1/comm is present it does not contain 'systemd'",
|
17
|
-
:if => File.exist?('/proc/1/comm') && !Puppet::FileSystem.read('/proc/1/comm').include?('systemd') do
|
18
|
-
expect(provider_class).not_to be_suitable
|
19
|
-
end
|
20
|
-
|
21
|
-
it "should not be considered suitable if /proc/1/comm is absent",
|
22
|
-
:if => !File.exist?('/proc/1/comm') do
|
23
|
-
expect(provider_class).not_to be_suitable
|
24
|
-
end
|
25
|
-
end
|
@@ -1,50 +0,0 @@
|
|
1
|
-
require 'spec_helper'
|
2
|
-
|
3
|
-
test_title = 'Integration Tests for Puppet::Type::Service::Provider::Windows'
|
4
|
-
|
5
|
-
describe test_title, '(integration)', :if => Puppet::Util::Platform.windows? do
|
6
|
-
let(:provider_class) { Puppet::Type.type(:service).provider(:windows) }
|
7
|
-
|
8
|
-
require 'puppet/util/windows'
|
9
|
-
|
10
|
-
before :each do
|
11
|
-
allow(Puppet::Type.type(:service)).to receive(:defaultprovider).and_return(provider_class)
|
12
|
-
end
|
13
|
-
|
14
|
-
context 'should return valid values when querying a service that does not exist' do
|
15
|
-
let(:service) do
|
16
|
-
Puppet::Type.type(:service).new(:name => 'foobarservice1234')
|
17
|
-
end
|
18
|
-
|
19
|
-
it "with :false when asked if enabled" do
|
20
|
-
expect(service.provider.enabled?).to eql(:false)
|
21
|
-
end
|
22
|
-
|
23
|
-
it "with :stopped when asked about status" do
|
24
|
-
expect(service.provider.status).to eql(:stopped)
|
25
|
-
end
|
26
|
-
end
|
27
|
-
|
28
|
-
context 'should return valid values when querying a service that does exist' do
|
29
|
-
let(:service) do
|
30
|
-
# This service should be ubiquitous across all supported Windows platforms
|
31
|
-
Puppet::Type.type(:service).new(:name => 'lmhosts')
|
32
|
-
end
|
33
|
-
|
34
|
-
it "with a valid enabled? value when asked if enabled" do
|
35
|
-
expect([:true, :false, :manual]).to include(service.provider.enabled?)
|
36
|
-
end
|
37
|
-
|
38
|
-
it "with a valid status when asked about status" do
|
39
|
-
expect([
|
40
|
-
:running,
|
41
|
-
:'continue pending',
|
42
|
-
:'pause pending',
|
43
|
-
:paused,
|
44
|
-
:running,
|
45
|
-
:'start pending',
|
46
|
-
:'stop pending',
|
47
|
-
:stopped]).to include(service.provider.status)
|
48
|
-
end
|
49
|
-
end
|
50
|
-
end
|
@@ -1,21 +0,0 @@
|
|
1
|
-
require 'spec_helper'
|
2
|
-
|
3
|
-
require 'puppet/util/reference'
|
4
|
-
|
5
|
-
reference = Puppet::Util::Reference.reference(:providers)
|
6
|
-
|
7
|
-
describe reference do
|
8
|
-
it "should exist" do
|
9
|
-
expect(reference).not_to be_nil
|
10
|
-
end
|
11
|
-
|
12
|
-
it "should be able to be rendered as markdown" do
|
13
|
-
# We have a :confine block that calls execute in our upstart provider, which fails
|
14
|
-
# on jruby. Thus, we stub it out here since we don't care to do any assertions on it.
|
15
|
-
# This is only an issue if you're running these unit tests on a platform where upstart
|
16
|
-
# is a default provider, like Ubuntu trusty.
|
17
|
-
allow(Puppet::Util::Execution).to receive(:execute)
|
18
|
-
|
19
|
-
reference.to_markdown
|
20
|
-
end
|
21
|
-
end
|
@@ -1,13 +0,0 @@
|
|
1
|
-
require 'spec_helper'
|
2
|
-
|
3
|
-
require 'puppet/reports'
|
4
|
-
|
5
|
-
describe Puppet::Reports, " when using report types" do
|
6
|
-
before do
|
7
|
-
allow(Puppet.settings).to receive(:use)
|
8
|
-
end
|
9
|
-
|
10
|
-
it "should load report types as modules" do
|
11
|
-
expect(Puppet::Reports.report(:store)).to be_instance_of(Module)
|
12
|
-
end
|
13
|
-
end
|
@@ -1,44 +0,0 @@
|
|
1
|
-
require 'spec_helper'
|
2
|
-
|
3
|
-
require 'puppet/ssl/certificate_request'
|
4
|
-
|
5
|
-
describe Puppet::SSL::CertificateRequest do
|
6
|
-
include PuppetSpec::Files
|
7
|
-
|
8
|
-
before do
|
9
|
-
# Get a safe temporary file
|
10
|
-
dir = tmpdir("csr_integration_testing")
|
11
|
-
|
12
|
-
Puppet.settings[:confdir] = dir
|
13
|
-
Puppet.settings[:vardir] = dir
|
14
|
-
|
15
|
-
@csr = Puppet::SSL::CertificateRequest.new("luke.madstop.com")
|
16
|
-
|
17
|
-
@key = OpenSSL::PKey::RSA.new(512)
|
18
|
-
|
19
|
-
# This is necessary so the terminus instances don't lie around.
|
20
|
-
Puppet::SSL::CertificateRequest.indirection.termini.clear
|
21
|
-
end
|
22
|
-
|
23
|
-
it "should be able to generate CSRs" do
|
24
|
-
@csr.generate(@key)
|
25
|
-
end
|
26
|
-
|
27
|
-
it "should be able to save CSRs" do
|
28
|
-
Puppet::SSL::CertificateRequest.indirection.save(@csr)
|
29
|
-
end
|
30
|
-
|
31
|
-
it "should be able to find saved certificate requests via the Indirector" do
|
32
|
-
@csr.generate(@key)
|
33
|
-
Puppet::SSL::CertificateRequest.indirection.save(@csr)
|
34
|
-
|
35
|
-
expect(Puppet::SSL::CertificateRequest.indirection.find("luke.madstop.com")).to be_instance_of(Puppet::SSL::CertificateRequest)
|
36
|
-
end
|
37
|
-
|
38
|
-
it "should save the completely CSR when saving" do
|
39
|
-
@csr.generate(@key)
|
40
|
-
Puppet::SSL::CertificateRequest.indirection.save(@csr)
|
41
|
-
|
42
|
-
expect(Puppet::SSL::CertificateRequest.indirection.find("luke.madstop.com").content.to_s).to eq(@csr.content.to_s)
|
43
|
-
end
|
44
|
-
end
|
@@ -1,72 +0,0 @@
|
|
1
|
-
require 'spec_helper'
|
2
|
-
require 'puppet/test_ca'
|
3
|
-
|
4
|
-
require 'puppet/ssl/host'
|
5
|
-
|
6
|
-
describe Puppet::SSL::Host, if: !Puppet::Util::Platform.jruby? do
|
7
|
-
include PuppetSpec::Files
|
8
|
-
|
9
|
-
before do
|
10
|
-
# Get a safe temporary file
|
11
|
-
dir = tmpdir("host_integration_testing")
|
12
|
-
|
13
|
-
Puppet.settings[:confdir] = dir
|
14
|
-
Puppet.settings[:vardir] = dir
|
15
|
-
Puppet.settings.use :main, :ssl
|
16
|
-
|
17
|
-
@host = Puppet::SSL::Host.new("luke.madstop.com")
|
18
|
-
allow(@host).to receive(:submit_certificate_request)
|
19
|
-
|
20
|
-
@ca = Puppet::TestCa.new
|
21
|
-
Puppet::Util.replace_file(Puppet[:localcacert], 0644) do |f|
|
22
|
-
f.write(@ca.ca_cert.to_s)
|
23
|
-
end
|
24
|
-
Puppet::Util.replace_file(Puppet[:hostcrl], 0644) do |f|
|
25
|
-
f.write(@ca.ca_crl.to_s)
|
26
|
-
end
|
27
|
-
end
|
28
|
-
|
29
|
-
describe "when managing its key" do
|
30
|
-
it "should be able to generate and save a key" do
|
31
|
-
@host.generate_key
|
32
|
-
end
|
33
|
-
|
34
|
-
it "should save the key such that the Indirector can find it" do
|
35
|
-
@host.generate_key
|
36
|
-
|
37
|
-
expect(Puppet::SSL::Key.indirection.find(@host.name).content.to_s).to eq(@host.key.to_s)
|
38
|
-
end
|
39
|
-
|
40
|
-
it "should save the private key into the :privatekeydir" do
|
41
|
-
@host.generate_key
|
42
|
-
expect(File.read(File.join(Puppet.settings[:privatekeydir], "luke.madstop.com.pem"))).to eq(@host.key.to_s)
|
43
|
-
end
|
44
|
-
end
|
45
|
-
|
46
|
-
describe "when managing its certificate request" do
|
47
|
-
it "should be able to generate and save a certificate request" do
|
48
|
-
@host.generate_certificate_request
|
49
|
-
end
|
50
|
-
|
51
|
-
it "should save the certificate request such that the Indirector can find it" do
|
52
|
-
@host.generate_certificate_request
|
53
|
-
|
54
|
-
expect(Puppet::SSL::CertificateRequest.indirection.find(@host.name).content.to_s).to eq(@host.certificate_request.to_s)
|
55
|
-
end
|
56
|
-
|
57
|
-
it "should save the private certificate request into the :privatekeydir" do
|
58
|
-
@host.generate_certificate_request
|
59
|
-
expect(File.read(File.join(Puppet.settings[:requestdir], "luke.madstop.com.pem"))).to eq(@host.certificate_request.to_s)
|
60
|
-
end
|
61
|
-
end
|
62
|
-
|
63
|
-
it "should pass the verification of its own SSL store", :unless => Puppet.features.microsoft_windows? do
|
64
|
-
@host.generate_certificate_request
|
65
|
-
cert = @ca.sign(@host.certificate_request.content)
|
66
|
-
Puppet::Util.replace_file(File.join(Puppet[:certdir], "#{@host.name}.pem"), 0644) do |f|
|
67
|
-
f.write(cert)
|
68
|
-
end
|
69
|
-
|
70
|
-
expect(@host.ssl_store.verify(@host.certificate.content)).to be_truthy
|
71
|
-
end
|
72
|
-
end
|
@@ -1,99 +0,0 @@
|
|
1
|
-
require 'spec_helper'
|
2
|
-
|
3
|
-
require 'puppet/ssl/key'
|
4
|
-
|
5
|
-
describe Puppet::SSL::Key, unless: Puppet::Util::Platform.jruby? do
|
6
|
-
include PuppetSpec::Files
|
7
|
-
|
8
|
-
# different UTF-8 widths
|
9
|
-
# 1-byte A
|
10
|
-
# 2-byte ۿ - http://www.fileformat.info/info/unicode/char/06ff/index.htm - 0xDB 0xBF / 219 191
|
11
|
-
# 3-byte ᚠ - http://www.fileformat.info/info/unicode/char/16A0/index.htm - 0xE1 0x9A 0xA0 / 225 154 160
|
12
|
-
# 4-byte - http://www.fileformat.info/info/unicode/char/2070E/index.htm - 0xF0 0xA0 0x9C 0x8E / 240 160 156 142
|
13
|
-
let (:mixed_utf8) { "A\u06FF\u16A0\u{2070E}" } # Aۿᚠ
|
14
|
-
|
15
|
-
before do
|
16
|
-
# Get a safe temporary file
|
17
|
-
dir = tmpdir('key_integration_testing')
|
18
|
-
|
19
|
-
Puppet.settings[:confdir] = dir
|
20
|
-
Puppet.settings[:vardir] = dir
|
21
|
-
|
22
|
-
# This is necessary so the terminus instances don't lie around.
|
23
|
-
# and so that Puppet::SSL::Key.indirection.save may be used
|
24
|
-
Puppet::SSL::Key.indirection.termini.clear
|
25
|
-
end
|
26
|
-
|
27
|
-
describe 'with a custom user-specified passfile' do
|
28
|
-
|
29
|
-
before do
|
30
|
-
# write custom password file to where Puppet expects
|
31
|
-
password_file = tmpfile('passfile')
|
32
|
-
Puppet[:passfile] = password_file
|
33
|
-
Puppet::FileSystem.open(password_file, nil, 'w:UTF-8') { |f| f.print(mixed_utf8) }
|
34
|
-
end
|
35
|
-
|
36
|
-
it 'should use the configured password file if it is not the CA key' do
|
37
|
-
key = Puppet::SSL::Key.new('test')
|
38
|
-
expect(key.password_file).to eq(Puppet[:passfile])
|
39
|
-
expect(key.password).to eq(mixed_utf8.force_encoding(Encoding::BINARY))
|
40
|
-
end
|
41
|
-
|
42
|
-
it "should be able to read an existing private key given the correct password" do
|
43
|
-
key_name = 'test'
|
44
|
-
# use OpenSSL APIs to generate a private key
|
45
|
-
private_key = OpenSSL::PKey::RSA.generate(512)
|
46
|
-
|
47
|
-
# stash it in Puppets private key directory
|
48
|
-
FileUtils.mkdir_p(Puppet[:privatekeydir])
|
49
|
-
pem_path = File.join(Puppet[:privatekeydir], "#{key_name}.pem")
|
50
|
-
Puppet::FileSystem.open(pem_path, nil, 'w:UTF-8') do |f|
|
51
|
-
# with password protection enabled
|
52
|
-
pem = private_key.to_pem(OpenSSL::Cipher::DES.new(:EDE3, :CBC), mixed_utf8)
|
53
|
-
f.print(pem)
|
54
|
-
end
|
55
|
-
|
56
|
-
# indirector loads existing .pem off disk instead of replacing it
|
57
|
-
host = Puppet::SSL::Host.new(key_name)
|
58
|
-
host.key
|
59
|
-
|
60
|
-
# newly loaded host private key matches the manually created key
|
61
|
-
# Private-Key: (512 bit) style data
|
62
|
-
expect(host.key.content.to_text).to eq(private_key.to_text)
|
63
|
-
# -----BEGIN RSA PRIVATE KEY-----
|
64
|
-
expect(host.key.content.to_s).to eq(private_key.to_s)
|
65
|
-
expect(host.key.password).to eq(mixed_utf8.force_encoding(Encoding::BINARY))
|
66
|
-
end
|
67
|
-
|
68
|
-
it 'should export the private key to PEM using the password' do
|
69
|
-
key_name = 'test'
|
70
|
-
|
71
|
-
# uses specified :passfile when writing the private key
|
72
|
-
key = Puppet::SSL::Key.new(key_name)
|
73
|
-
key.generate
|
74
|
-
Puppet::SSL::Key.indirection.save(key)
|
75
|
-
|
76
|
-
# indirector writes file here
|
77
|
-
pem_path = File.join(Puppet[:privatekeydir], "#{key_name}.pem")
|
78
|
-
|
79
|
-
# note incorrect password is an error
|
80
|
-
expect do
|
81
|
-
Puppet::FileSystem.open(pem_path, nil, 'r:ASCII') do |f|
|
82
|
-
OpenSSL::PKey::RSA.new(f.read, 'invalid_password')
|
83
|
-
end
|
84
|
-
end.to raise_error(OpenSSL::PKey::RSAError)
|
85
|
-
|
86
|
-
# but when specifying the correct password
|
87
|
-
reloaded_key = nil
|
88
|
-
Puppet::FileSystem.open(pem_path, nil, 'r:ASCII') do |f|
|
89
|
-
reloaded_key = OpenSSL::PKey::RSA.new(f.read, mixed_utf8)
|
90
|
-
end
|
91
|
-
|
92
|
-
# the original key matches the manually reloaded key
|
93
|
-
# Private-Key: (512 bit) style data
|
94
|
-
expect(key.content.to_text).to eq(reloaded_key.to_text)
|
95
|
-
# -----BEGIN RSA PRIVATE KEY-----
|
96
|
-
expect(key.content.to_s).to eq(reloaded_key.to_s)
|
97
|
-
end
|
98
|
-
end
|
99
|
-
end
|