puppet 6.17.0-x64-mingw32 → 6.18.0-x64-mingw32
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of puppet might be problematic. Click here for more details.
- checksums.yaml +4 -4
- data/Gemfile.lock +6 -5
- data/lib/puppet/application/apply.rb +18 -20
- data/lib/puppet/application/lookup.rb +16 -4
- data/lib/puppet/configurer/downloader.rb +31 -10
- data/lib/puppet/confine.rb +1 -1
- data/lib/puppet/confine/any.rb +1 -1
- data/lib/puppet/defaults.rb +21 -3
- data/lib/puppet/feature/base.rb +1 -1
- data/lib/puppet/file_serving/mount/locales.rb +1 -2
- data/lib/puppet/file_serving/mount/pluginfacts.rb +1 -2
- data/lib/puppet/file_serving/mount/plugins.rb +1 -2
- data/lib/puppet/file_system/file_impl.rb +3 -3
- data/lib/puppet/functions/lstrip.rb +4 -4
- data/lib/puppet/functions/reverse_each.rb +1 -1
- data/lib/puppet/functions/rstrip.rb +4 -4
- data/lib/puppet/functions/step.rb +1 -1
- data/lib/puppet/functions/strip.rb +4 -4
- data/lib/puppet/gettext/config.rb +5 -5
- data/lib/puppet/gettext/module_translations.rb +4 -4
- data/lib/puppet/indirector/exec.rb +1 -1
- data/lib/puppet/indirector/facts/facter.rb +3 -3
- data/lib/puppet/indirector/file_metadata/http.rb +1 -0
- data/lib/puppet/indirector/hiera.rb +4 -0
- data/lib/puppet/indirector/indirection.rb +1 -1
- data/lib/puppet/indirector/report/processor.rb +2 -2
- data/lib/puppet/module.rb +1 -2
- data/lib/puppet/network/format_support.rb +2 -2
- data/lib/puppet/network/http/route.rb +2 -2
- data/lib/puppet/node/environment.rb +12 -5
- data/lib/puppet/pal/pal_impl.rb +27 -3
- data/lib/puppet/parameter.rb +1 -1
- data/lib/puppet/parser/functions.rb +21 -17
- data/lib/puppet/parser/functions/create_resources.rb +11 -7
- data/lib/puppet/parser/type_loader.rb +2 -2
- data/lib/puppet/pops/adaptable.rb +7 -13
- data/lib/puppet/pops/adapters.rb +8 -4
- data/lib/puppet/pops/loader/runtime3_type_loader.rb +4 -2
- data/lib/puppet/pops/loaders.rb +18 -11
- data/lib/puppet/pops/lookup/context.rb +1 -1
- data/lib/puppet/pops/lookup/hiera_config.rb +14 -1
- data/lib/puppet/pops/types/iterable.rb +34 -8
- data/lib/puppet/pops/validation/checker4_0.rb +19 -15
- data/lib/puppet/provider/file/windows.rb +1 -1
- data/lib/puppet/provider/package/apt.rb +34 -0
- data/lib/puppet/provider/package/gem.rb +4 -2
- data/lib/puppet/provider/package/puppet_gem.rb +5 -0
- data/lib/puppet/provider/package/zypper.rb +3 -0
- data/lib/puppet/provider/user/aix.rb +1 -1
- data/lib/puppet/provider/user/user_role_add.rb +1 -1
- data/lib/puppet/provider/user/windows_adsi.rb +18 -1
- data/lib/puppet/settings.rb +1 -1
- data/lib/puppet/ssl/validator/default_validator.rb +1 -1
- data/lib/puppet/test/test_helper.rb +10 -3
- data/lib/puppet/transaction.rb +2 -2
- data/lib/puppet/transaction/persistence.rb +1 -1
- data/lib/puppet/transaction/report.rb +1 -1
- data/lib/puppet/trusted_external.rb +2 -2
- data/lib/puppet/type.rb +4 -3
- data/lib/puppet/type/file.rb +2 -2
- data/lib/puppet/type/file/source.rb +27 -7
- data/lib/puppet/type/notify.rb +2 -2
- data/lib/puppet/type/service.rb +4 -0
- data/lib/puppet/type/user.rb +18 -3
- data/lib/puppet/util.rb +26 -12
- data/lib/puppet/util/autoload.rb +9 -7
- data/lib/puppet/util/character_encoding.rb +9 -5
- data/lib/puppet/util/execution.rb +2 -2
- data/lib/puppet/util/windows.rb +1 -0
- data/lib/puppet/util/windows/api_types.rb +15 -1
- data/lib/puppet/util/windows/monkey_patches/dir.rb +40 -0
- data/lib/puppet/util/windows/security.rb +4 -4
- data/lib/puppet/util/windows/user.rb +219 -0
- data/lib/puppet/version.rb +1 -1
- data/locales/puppet.pot +78 -69
- data/man/man5/puppet.conf.5 +22 -3
- data/man/man8/puppet-agent.8 +1 -1
- data/man/man8/puppet-apply.8 +1 -1
- data/man/man8/puppet-catalog.8 +1 -1
- data/man/man8/puppet-config.8 +1 -1
- data/man/man8/puppet-describe.8 +1 -1
- data/man/man8/puppet-device.8 +1 -1
- data/man/man8/puppet-doc.8 +1 -1
- data/man/man8/puppet-epp.8 +1 -1
- data/man/man8/puppet-facts.8 +1 -1
- data/man/man8/puppet-filebucket.8 +1 -1
- data/man/man8/puppet-generate.8 +1 -1
- data/man/man8/puppet-help.8 +1 -1
- data/man/man8/puppet-key.8 +1 -1
- data/man/man8/puppet-lookup.8 +2 -2
- data/man/man8/puppet-man.8 +1 -1
- data/man/man8/puppet-module.8 +1 -1
- data/man/man8/puppet-node.8 +1 -1
- data/man/man8/puppet-parser.8 +1 -1
- data/man/man8/puppet-plugin.8 +1 -1
- data/man/man8/puppet-report.8 +1 -1
- data/man/man8/puppet-resource.8 +1 -1
- data/man/man8/puppet-script.8 +1 -1
- data/man/man8/puppet-ssl.8 +1 -1
- data/man/man8/puppet-status.8 +1 -1
- data/man/man8/puppet.8 +2 -2
- data/spec/fixtures/integration/application/apply/environments/spec/modules/amod/lib/puppet/provider/applytest/applytest.rb +2 -0
- data/spec/fixtures/integration/application/apply/environments/spec/modules/amod/lib/puppet/type/applytest.rb +25 -0
- data/spec/fixtures/unit/forge/bacula-releases.json +128 -0
- data/spec/fixtures/unit/forge/bacula.tar.gz +0 -0
- data/spec/integration/application/agent_spec.rb +29 -37
- data/spec/integration/application/apply_spec.rb +149 -149
- data/spec/integration/application/config_spec.rb +74 -0
- data/spec/integration/application/doc_spec.rb +16 -6
- data/spec/integration/application/filebucket_spec.rb +65 -16
- data/spec/integration/application/help_spec.rb +42 -0
- data/spec/integration/application/lookup_spec.rb +13 -0
- data/spec/integration/application/module_spec.rb +68 -0
- data/spec/integration/application/plugin_spec.rb +50 -0
- data/spec/integration/data_binding_spec.rb +82 -0
- data/spec/integration/directory_environments_spec.rb +17 -17
- data/spec/integration/indirector/facts/facter_spec.rb +8 -6
- data/spec/integration/node/environment_spec.rb +1 -1
- data/spec/integration/util/execution_spec.rb +22 -0
- data/spec/integration/util/windows/monkey_patches/dir_spec.rb +11 -0
- data/spec/integration/util/windows/process_spec.rb +26 -32
- data/spec/integration/util/windows/user_spec.rb +7 -0
- data/spec/integration/util_spec.rb +7 -33
- data/spec/lib/puppet_spec/matchers.rb +0 -80
- data/spec/lib/puppet_spec/puppetserver.rb +8 -0
- data/spec/unit/application/agent_spec.rb +3 -4
- data/spec/unit/application/face_base_spec.rb +6 -4
- data/spec/unit/application/facts_spec.rb +39 -10
- data/spec/unit/application/man_spec.rb +52 -0
- data/spec/unit/application/resource_spec.rb +3 -1
- data/spec/unit/application/ssl_spec.rb +15 -2
- data/spec/unit/configurer/downloader_spec.rb +10 -0
- data/spec/unit/configurer_spec.rb +47 -31
- data/spec/unit/confine_spec.rb +2 -1
- data/spec/unit/face/config_spec.rb +3 -1
- data/spec/unit/file_serving/mount/locales_spec.rb +2 -2
- data/spec/unit/file_serving/mount/pluginfacts_spec.rb +2 -2
- data/spec/unit/file_serving/mount/plugins_spec.rb +2 -2
- data/spec/unit/file_system/uniquefile_spec.rb +18 -0
- data/spec/unit/http/client_spec.rb +0 -1
- data/spec/unit/http/resolver_spec.rb +0 -1
- data/spec/unit/http/service/ca_spec.rb +0 -1
- data/spec/unit/http/service/compiler_spec.rb +0 -1
- data/spec/unit/http/service/file_server_spec.rb +0 -1
- data/spec/unit/http/service/report_spec.rb +0 -1
- data/spec/unit/http/service_spec.rb +0 -1
- data/spec/unit/http/session_spec.rb +0 -1
- data/spec/unit/module_tool/tar/mini_spec.rb +20 -0
- data/spec/unit/network/format_support_spec.rb +3 -2
- data/spec/unit/node/environment_spec.rb +18 -1
- data/spec/unit/pops/loaders/loaders_spec.rb +70 -0
- data/spec/unit/pops/lookup/lookup_spec.rb +25 -0
- data/spec/unit/provider/package/apt_spec.rb +77 -0
- data/spec/unit/provider/package/aptitude_spec.rb +1 -0
- data/spec/unit/provider/package/puppet_gem_spec.rb +4 -1
- data/spec/unit/provider/package/zypper_spec.rb +14 -0
- data/spec/unit/provider/service/init_spec.rb +41 -0
- data/spec/unit/provider/service/systemd_spec.rb +1 -6
- data/spec/unit/provider/service/windows_spec.rb +28 -0
- data/spec/unit/provider/user/windows_adsi_spec.rb +82 -0
- data/spec/unit/puppet_pal_2pec.rb +40 -0
- data/spec/unit/reports/store_spec.rb +17 -13
- data/spec/unit/transaction/persistence_spec.rb +15 -0
- data/spec/unit/type/service_spec.rb +35 -2
- data/spec/unit/type/user_spec.rb +31 -2
- data/spec/unit/util/character_encoding_spec.rb +4 -4
- data/spec/unit/util/command_line_spec.rb +11 -6
- metadata +21 -44
- data/spec/integration/faces/config_spec.rb +0 -91
- data/spec/integration/faces/documentation_spec.rb +0 -57
- data/spec/integration/file_bucket/file_spec.rb +0 -50
- data/spec/integration/file_serving/content_spec.rb +0 -7
- data/spec/integration/file_serving/fileset_spec.rb +0 -12
- data/spec/integration/file_serving/metadata_spec.rb +0 -8
- data/spec/integration/file_serving/terminus_helper_spec.rb +0 -20
- data/spec/integration/file_system/uniquefile_spec.rb +0 -26
- data/spec/integration/module_tool/forge_spec.rb +0 -51
- data/spec/integration/module_tool/tar/mini_spec.rb +0 -28
- data/spec/integration/provider/service/init_spec.rb +0 -48
- data/spec/integration/provider/service/systemd_spec.rb +0 -25
- data/spec/integration/provider/service/windows_spec.rb +0 -50
- data/spec/integration/reference/providers_spec.rb +0 -21
- data/spec/integration/reports_spec.rb +0 -13
- data/spec/integration/ssl/certificate_request_spec.rb +0 -44
- data/spec/integration/ssl/host_spec.rb +0 -72
- data/spec/integration/ssl/key_spec.rb +0 -99
- data/spec/shared_behaviours/file_serving_model.rb +0 -51
- data/spec/unit/face/man_spec.rb +0 -25
- data/spec/unit/man_spec.rb +0 -31
| @@ -1,12 +0,0 @@ | |
| 1 | 
            -
            require 'spec_helper'
         | 
| 2 | 
            -
             | 
| 3 | 
            -
            require 'puppet/file_serving/fileset'
         | 
| 4 | 
            -
             | 
| 5 | 
            -
            describe Puppet::FileServing::Fileset do
         | 
| 6 | 
            -
              it "should be able to recurse on a single file" do
         | 
| 7 | 
            -
                @path = Tempfile.new("fileset_integration")
         | 
| 8 | 
            -
             | 
| 9 | 
            -
                fileset = Puppet::FileServing::Fileset.new(@path.path)
         | 
| 10 | 
            -
                expect { fileset.files }.not_to raise_error
         | 
| 11 | 
            -
              end
         | 
| 12 | 
            -
            end
         | 
| @@ -1,20 +0,0 @@ | |
| 1 | 
            -
            require 'spec_helper'
         | 
| 2 | 
            -
             | 
| 3 | 
            -
            require 'puppet/file_serving/terminus_helper'
         | 
| 4 | 
            -
             | 
| 5 | 
            -
            class TerminusHelperIntegrationTester
         | 
| 6 | 
            -
              include Puppet::FileServing::TerminusHelper
         | 
| 7 | 
            -
              def model
         | 
| 8 | 
            -
                Puppet::FileServing::Metadata
         | 
| 9 | 
            -
              end
         | 
| 10 | 
            -
            end
         | 
| 11 | 
            -
             | 
| 12 | 
            -
            describe Puppet::FileServing::TerminusHelper do
         | 
| 13 | 
            -
              it "should be able to recurse on a single file" do
         | 
| 14 | 
            -
                @path = Tempfile.new("fileset_integration")
         | 
| 15 | 
            -
                request = Puppet::Indirector::Request.new(:metadata, :find, @path.path, nil, :recurse => true)
         | 
| 16 | 
            -
             | 
| 17 | 
            -
                tester = TerminusHelperIntegrationTester.new
         | 
| 18 | 
            -
                expect { tester.path2instances(request, @path.path) }.not_to raise_error
         | 
| 19 | 
            -
              end
         | 
| 20 | 
            -
            end
         | 
| @@ -1,26 +0,0 @@ | |
| 1 | 
            -
            require 'spec_helper'
         | 
| 2 | 
            -
             | 
| 3 | 
            -
            describe Puppet::FileSystem::Uniquefile do
         | 
| 4 | 
            -
              describe "#open_tmp on Windows", :if => Puppet::Util::Platform.windows? do
         | 
| 5 | 
            -
                describe "with UTF8 characters" do
         | 
| 6 | 
            -
                  include PuppetSpec::Files
         | 
| 7 | 
            -
             | 
| 8 | 
            -
                  let(:rune_utf8) { "\u16A0\u16C7\u16BB\u16EB\u16D2\u16E6\u16A6\u16EB\u16A0\u16B1\u16A9\u16A0\u16A2\u16B1\u16EB\u16A0\u16C1\u16B1\u16AA\u16EB\u16B7\u16D6\u16BB\u16B9\u16E6\u16DA\u16B3\u16A2\u16D7" }
         | 
| 9 | 
            -
                  let(:temp_rune_utf8) { tmpdir(rune_utf8) }
         | 
| 10 | 
            -
             | 
| 11 | 
            -
                  it "should use UTF8 characters in TMP,TEMP,TMPDIR environment variable" do
         | 
| 12 | 
            -
                    # Set the temporary environment variables to the UTF8 temp path
         | 
| 13 | 
            -
                    Puppet::Util::Windows::Process.set_environment_variable('TMPDIR', temp_rune_utf8)
         | 
| 14 | 
            -
                    Puppet::Util::Windows::Process.set_environment_variable('TMP', temp_rune_utf8)
         | 
| 15 | 
            -
                    Puppet::Util::Windows::Process.set_environment_variable('TEMP', temp_rune_utf8)
         | 
| 16 | 
            -
             | 
| 17 | 
            -
                    # Create a unique file
         | 
| 18 | 
            -
                    filename = Puppet::FileSystem::Uniquefile.open_tmp('foo') do |file|
         | 
| 19 | 
            -
                      File.dirname(file.path)
         | 
| 20 | 
            -
                    end
         | 
| 21 | 
            -
             | 
| 22 | 
            -
                    expect(filename).to eq(temp_rune_utf8)
         | 
| 23 | 
            -
                  end
         | 
| 24 | 
            -
                end
         | 
| 25 | 
            -
              end
         | 
| 26 | 
            -
            end
         | 
| @@ -1,51 +0,0 @@ | |
| 1 | 
            -
            require 'spec_helper'
         | 
| 2 | 
            -
            require 'puppet/forge'
         | 
| 3 | 
            -
            require 'puppet_spec/https'
         | 
| 4 | 
            -
             | 
| 5 | 
            -
            describe Puppet::Forge, unless: Puppet::Util::Platform.jruby? do
         | 
| 6 | 
            -
              include PuppetSpec::Files
         | 
| 7 | 
            -
              include_context "https client"
         | 
| 8 | 
            -
             | 
| 9 | 
            -
              let(:wrong_hostname) { 'localhost' }
         | 
| 10 | 
            -
              let(:server) { PuppetSpec::HTTPSServer.new }
         | 
| 11 | 
            -
              let(:ssl_provider) { Puppet::SSL::SSLProvider.new }
         | 
| 12 | 
            -
             | 
| 13 | 
            -
              let(:http_response) do
         | 
| 14 | 
            -
                File.read(fixtures('unit/forge/bacula.json'))
         | 
| 15 | 
            -
              end
         | 
| 16 | 
            -
             | 
| 17 | 
            -
              let(:release_response) do
         | 
| 18 | 
            -
                releases = JSON.parse(http_response)
         | 
| 19 | 
            -
                releases['results'] = []
         | 
| 20 | 
            -
                JSON.dump(releases)
         | 
| 21 | 
            -
              end
         | 
| 22 | 
            -
             | 
| 23 | 
            -
              it 'fetching module release entries' do
         | 
| 24 | 
            -
                # create a temp cacert bundle
         | 
| 25 | 
            -
                ssl_file = tmpfile('systemstore')
         | 
| 26 | 
            -
                File.write(ssl_file, server.ca_cert)
         | 
| 27 | 
            -
             | 
| 28 | 
            -
                # override path to system cacert bundle, this must be done before
         | 
| 29 | 
            -
                # the SSLContext is created and the call to X509::Store.set_default_paths
         | 
| 30 | 
            -
                Puppet::Util.withenv("SSL_CERT_FILE" => ssl_file) do
         | 
| 31 | 
            -
                  response_proc = -> (req, res) {
         | 
| 32 | 
            -
                    res.status = 200
         | 
| 33 | 
            -
                    res.body = release_response
         | 
| 34 | 
            -
                  }
         | 
| 35 | 
            -
             | 
| 36 | 
            -
                  server.start_server(response_proc: response_proc) do |port|
         | 
| 37 | 
            -
                    forge = described_class.new("https://127.0.0.1:#{port}")
         | 
| 38 | 
            -
                    forge.fetch('bacula')
         | 
| 39 | 
            -
                  end
         | 
| 40 | 
            -
                end
         | 
| 41 | 
            -
              end
         | 
| 42 | 
            -
             | 
| 43 | 
            -
              it 'returns a valid exception when there is an SSL verification problem' do
         | 
| 44 | 
            -
                server.start_server do |port|
         | 
| 45 | 
            -
                  forge = described_class.new("https://#{wrong_hostname}:#{port}")
         | 
| 46 | 
            -
                  expect {
         | 
| 47 | 
            -
                    forge.fetch('mymodule')
         | 
| 48 | 
            -
                  }.to raise_error Puppet::Forge::Errors::SSLVerifyError, %r{^Unable to verify the SSL certificate at https://#{wrong_hostname}}
         | 
| 49 | 
            -
                end
         | 
| 50 | 
            -
              end
         | 
| 51 | 
            -
            end
         | 
| @@ -1,28 +0,0 @@ | |
| 1 | 
            -
            require 'spec_helper'
         | 
| 2 | 
            -
            require 'puppet/module_tool'
         | 
| 3 | 
            -
            require 'puppet_spec/files'
         | 
| 4 | 
            -
             | 
| 5 | 
            -
            describe Puppet::ModuleTool::Tar::Mini, :if => (Puppet.features.minitar? && Puppet.features.zlib?) do
         | 
| 6 | 
            -
              let(:minitar)    { described_class.new }
         | 
| 7 | 
            -
             | 
| 8 | 
            -
              describe "Extracts tars with long and short pathnames" do
         | 
| 9 | 
            -
                let (:sourcetar) { File.expand_path('../../../../fixtures/module.tar.gz', __FILE__) }
         | 
| 10 | 
            -
             | 
| 11 | 
            -
                let (:longfilepath)  { "puppetlabs-dsc-1.0.0/lib/puppet_x/dsc_resources/xWebAdministration/DSCResources/MSFT_xWebAppPoolDefaults/MSFT_xWebAppPoolDefaults.schema.mof" }
         | 
| 12 | 
            -
                let (:shortfilepath) { "puppetlabs-dsc-1.0.0/README.md" }
         | 
| 13 | 
            -
             | 
| 14 | 
            -
                it "unpacks a tar with a short path length" do
         | 
| 15 | 
            -
                  extractdir = PuppetSpec::Files.tmpdir('minitar')
         | 
| 16 | 
            -
             | 
| 17 | 
            -
                  minitar.unpack(sourcetar,extractdir,'module')
         | 
| 18 | 
            -
                  expect(File).to exist(File.expand_path("#{extractdir}/#{shortfilepath}"))
         | 
| 19 | 
            -
                end
         | 
| 20 | 
            -
             | 
| 21 | 
            -
                it "unpacks a tar with a long path length" do
         | 
| 22 | 
            -
                  extractdir = PuppetSpec::Files.tmpdir('minitar')
         | 
| 23 | 
            -
             | 
| 24 | 
            -
                  minitar.unpack(sourcetar,extractdir,'module')
         | 
| 25 | 
            -
                  expect(File).to exist(File.expand_path("#{extractdir}/#{longfilepath}"))
         | 
| 26 | 
            -
                end
         | 
| 27 | 
            -
              end
         | 
| 28 | 
            -
            end
         | 
| @@ -1,48 +0,0 @@ | |
| 1 | 
            -
            require 'spec_helper'
         | 
| 2 | 
            -
             | 
| 3 | 
            -
            test_title = 'Integration Tests for Puppet::Type::Service::Provider::Init'
         | 
| 4 | 
            -
             | 
| 5 | 
            -
            describe test_title, unless: Puppet::Util::Platform.jruby? do
         | 
| 6 | 
            -
              let(:provider) { Puppet::Type.type(:service).provider(:init) }
         | 
| 7 | 
            -
             | 
| 8 | 
            -
              describe "when running on FreeBSD" do
         | 
| 9 | 
            -
                before :each do
         | 
| 10 | 
            -
                  allow(Facter).to receive(:value).with(:operatingsystem).and_return('FreeBSD')
         | 
| 11 | 
            -
                  allow(Facter).to receive(:value).with(:osfamily).and_return('FreeBSD')
         | 
| 12 | 
            -
                end
         | 
| 13 | 
            -
             | 
| 14 | 
            -
                it "should set its default path to include /etc/rc.d and /usr/local/etc/rc.d" do
         | 
| 15 | 
            -
                  expect(provider.defpath).to eq(["/etc/rc.d", "/usr/local/etc/rc.d"])
         | 
| 16 | 
            -
                end
         | 
| 17 | 
            -
              end
         | 
| 18 | 
            -
             | 
| 19 | 
            -
              describe "when running on HP-UX" do
         | 
| 20 | 
            -
                before :each do
         | 
| 21 | 
            -
                  allow(Facter).to receive(:value).with(:operatingsystem).and_return('HP-UX')
         | 
| 22 | 
            -
                end
         | 
| 23 | 
            -
             | 
| 24 | 
            -
                it "should set its default path to include /sbin/init.d" do
         | 
| 25 | 
            -
                  expect(provider.defpath).to eq("/sbin/init.d")
         | 
| 26 | 
            -
                end
         | 
| 27 | 
            -
              end
         | 
| 28 | 
            -
             | 
| 29 | 
            -
              describe "when running on Archlinux" do
         | 
| 30 | 
            -
                before :each do
         | 
| 31 | 
            -
                  allow(Facter).to receive(:value).with(:operatingsystem).and_return('Archlinux')
         | 
| 32 | 
            -
                end
         | 
| 33 | 
            -
             | 
| 34 | 
            -
                it "should set its default path to include /etc/rc.d" do
         | 
| 35 | 
            -
                  expect(provider.defpath).to eq("/etc/rc.d")
         | 
| 36 | 
            -
                end
         | 
| 37 | 
            -
              end
         | 
| 38 | 
            -
             | 
| 39 | 
            -
              describe "when not running on FreeBSD, HP-UX or Archlinux" do
         | 
| 40 | 
            -
                before :each do
         | 
| 41 | 
            -
                  allow(Facter).to receive(:value).with(:operatingsystem).and_return('RedHat')
         | 
| 42 | 
            -
                end
         | 
| 43 | 
            -
             | 
| 44 | 
            -
                it "should set its default path to include /etc/init.d" do
         | 
| 45 | 
            -
                  expect(provider.defpath).to eq("/etc/init.d")
         | 
| 46 | 
            -
                end
         | 
| 47 | 
            -
              end
         | 
| 48 | 
            -
            end
         | 
| @@ -1,25 +0,0 @@ | |
| 1 | 
            -
            require 'spec_helper'
         | 
| 2 | 
            -
             | 
| 3 | 
            -
            test_title = 'Integration Tests for Puppet::Type::Service::Provider::Systemd'
         | 
| 4 | 
            -
             | 
| 5 | 
            -
            describe test_title, unless: Puppet::Util::Platform.jruby? do
         | 
| 6 | 
            -
              let(:provider_class) { Puppet::Type.type(:service).provider(:systemd) }
         | 
| 7 | 
            -
             | 
| 8 | 
            -
              # TODO: Unfortunately there does not seem a way to stub the executable
         | 
| 9 | 
            -
              #       checks in the systemd provider because they happen at load time.
         | 
| 10 | 
            -
             | 
| 11 | 
            -
              it "should be considered suitable if /proc/1/comm is present and contains 'systemd'",
         | 
| 12 | 
            -
                :if => File.exist?('/proc/1/comm') && Puppet::FileSystem.read('/proc/1/comm').include?('systemd') do
         | 
| 13 | 
            -
                expect(provider_class).to be_suitable
         | 
| 14 | 
            -
              end
         | 
| 15 | 
            -
             | 
| 16 | 
            -
              it "should not be considered suitable if /proc/1/comm is present it does not contain 'systemd'",
         | 
| 17 | 
            -
                :if => File.exist?('/proc/1/comm') && !Puppet::FileSystem.read('/proc/1/comm').include?('systemd') do
         | 
| 18 | 
            -
                expect(provider_class).not_to be_suitable
         | 
| 19 | 
            -
              end
         | 
| 20 | 
            -
             | 
| 21 | 
            -
              it "should not be considered suitable if /proc/1/comm is absent",
         | 
| 22 | 
            -
                :if => !File.exist?('/proc/1/comm') do
         | 
| 23 | 
            -
                expect(provider_class).not_to be_suitable
         | 
| 24 | 
            -
              end
         | 
| 25 | 
            -
            end
         | 
| @@ -1,50 +0,0 @@ | |
| 1 | 
            -
            require 'spec_helper'
         | 
| 2 | 
            -
             | 
| 3 | 
            -
            test_title = 'Integration Tests for Puppet::Type::Service::Provider::Windows'
         | 
| 4 | 
            -
             | 
| 5 | 
            -
            describe test_title, '(integration)', :if => Puppet::Util::Platform.windows? do
         | 
| 6 | 
            -
              let(:provider_class) { Puppet::Type.type(:service).provider(:windows) }
         | 
| 7 | 
            -
             | 
| 8 | 
            -
              require 'puppet/util/windows'
         | 
| 9 | 
            -
             | 
| 10 | 
            -
              before :each do
         | 
| 11 | 
            -
                allow(Puppet::Type.type(:service)).to receive(:defaultprovider).and_return(provider_class)
         | 
| 12 | 
            -
              end
         | 
| 13 | 
            -
             | 
| 14 | 
            -
              context 'should return valid values when querying a service that does not exist' do
         | 
| 15 | 
            -
                let(:service) do
         | 
| 16 | 
            -
                  Puppet::Type.type(:service).new(:name => 'foobarservice1234')
         | 
| 17 | 
            -
                end
         | 
| 18 | 
            -
             | 
| 19 | 
            -
                it "with :false when asked if enabled" do
         | 
| 20 | 
            -
                  expect(service.provider.enabled?).to eql(:false)
         | 
| 21 | 
            -
                end
         | 
| 22 | 
            -
             | 
| 23 | 
            -
                it "with :stopped when asked about status" do
         | 
| 24 | 
            -
                  expect(service.provider.status).to eql(:stopped)
         | 
| 25 | 
            -
                end
         | 
| 26 | 
            -
              end
         | 
| 27 | 
            -
             | 
| 28 | 
            -
              context 'should return valid values when querying a service that does exist' do
         | 
| 29 | 
            -
                let(:service) do
         | 
| 30 | 
            -
                  # This service should be ubiquitous across all supported Windows platforms
         | 
| 31 | 
            -
                  Puppet::Type.type(:service).new(:name => 'lmhosts')
         | 
| 32 | 
            -
                end
         | 
| 33 | 
            -
             | 
| 34 | 
            -
                it "with a valid enabled? value when asked if enabled" do
         | 
| 35 | 
            -
                  expect([:true, :false, :manual]).to include(service.provider.enabled?)
         | 
| 36 | 
            -
                end
         | 
| 37 | 
            -
             | 
| 38 | 
            -
                it "with a valid status when asked about status" do
         | 
| 39 | 
            -
                  expect([
         | 
| 40 | 
            -
                    :running,
         | 
| 41 | 
            -
                    :'continue pending',
         | 
| 42 | 
            -
                    :'pause pending',
         | 
| 43 | 
            -
                    :paused,
         | 
| 44 | 
            -
                    :running,
         | 
| 45 | 
            -
                    :'start pending',
         | 
| 46 | 
            -
                    :'stop pending',
         | 
| 47 | 
            -
                    :stopped]).to include(service.provider.status)
         | 
| 48 | 
            -
                end
         | 
| 49 | 
            -
              end
         | 
| 50 | 
            -
            end
         | 
| @@ -1,21 +0,0 @@ | |
| 1 | 
            -
            require 'spec_helper'
         | 
| 2 | 
            -
             | 
| 3 | 
            -
            require 'puppet/util/reference'
         | 
| 4 | 
            -
             | 
| 5 | 
            -
            reference = Puppet::Util::Reference.reference(:providers)
         | 
| 6 | 
            -
             | 
| 7 | 
            -
            describe reference do
         | 
| 8 | 
            -
              it "should exist" do
         | 
| 9 | 
            -
                expect(reference).not_to be_nil
         | 
| 10 | 
            -
              end
         | 
| 11 | 
            -
             | 
| 12 | 
            -
              it "should be able to be rendered as markdown" do
         | 
| 13 | 
            -
                # We have a :confine block that calls execute in our upstart provider, which fails
         | 
| 14 | 
            -
                # on jruby. Thus, we stub it out here since we don't care to do any assertions on it.
         | 
| 15 | 
            -
                # This is only an issue if you're running these unit tests on a platform where upstart
         | 
| 16 | 
            -
                # is a default provider, like Ubuntu trusty.
         | 
| 17 | 
            -
                allow(Puppet::Util::Execution).to receive(:execute)
         | 
| 18 | 
            -
             | 
| 19 | 
            -
                reference.to_markdown
         | 
| 20 | 
            -
              end
         | 
| 21 | 
            -
            end
         | 
| @@ -1,13 +0,0 @@ | |
| 1 | 
            -
            require 'spec_helper'
         | 
| 2 | 
            -
             | 
| 3 | 
            -
            require 'puppet/reports'
         | 
| 4 | 
            -
             | 
| 5 | 
            -
            describe Puppet::Reports, " when using report types" do
         | 
| 6 | 
            -
              before do
         | 
| 7 | 
            -
                allow(Puppet.settings).to receive(:use)
         | 
| 8 | 
            -
              end
         | 
| 9 | 
            -
             | 
| 10 | 
            -
              it "should load report types as modules" do
         | 
| 11 | 
            -
                expect(Puppet::Reports.report(:store)).to be_instance_of(Module)
         | 
| 12 | 
            -
              end
         | 
| 13 | 
            -
            end
         | 
| @@ -1,44 +0,0 @@ | |
| 1 | 
            -
            require 'spec_helper'
         | 
| 2 | 
            -
             | 
| 3 | 
            -
            require 'puppet/ssl/certificate_request'
         | 
| 4 | 
            -
             | 
| 5 | 
            -
            describe Puppet::SSL::CertificateRequest do
         | 
| 6 | 
            -
              include PuppetSpec::Files
         | 
| 7 | 
            -
             | 
| 8 | 
            -
              before do
         | 
| 9 | 
            -
                # Get a safe temporary file
         | 
| 10 | 
            -
                dir = tmpdir("csr_integration_testing")
         | 
| 11 | 
            -
             | 
| 12 | 
            -
                Puppet.settings[:confdir] = dir
         | 
| 13 | 
            -
                Puppet.settings[:vardir] = dir
         | 
| 14 | 
            -
             | 
| 15 | 
            -
                @csr = Puppet::SSL::CertificateRequest.new("luke.madstop.com")
         | 
| 16 | 
            -
             | 
| 17 | 
            -
                @key = OpenSSL::PKey::RSA.new(512)
         | 
| 18 | 
            -
             | 
| 19 | 
            -
                # This is necessary so the terminus instances don't lie around.
         | 
| 20 | 
            -
                Puppet::SSL::CertificateRequest.indirection.termini.clear
         | 
| 21 | 
            -
              end
         | 
| 22 | 
            -
             | 
| 23 | 
            -
              it "should be able to generate CSRs" do
         | 
| 24 | 
            -
                @csr.generate(@key)
         | 
| 25 | 
            -
              end
         | 
| 26 | 
            -
             | 
| 27 | 
            -
              it "should be able to save CSRs" do
         | 
| 28 | 
            -
                Puppet::SSL::CertificateRequest.indirection.save(@csr)
         | 
| 29 | 
            -
              end
         | 
| 30 | 
            -
             | 
| 31 | 
            -
              it "should be able to find saved certificate requests via the Indirector" do
         | 
| 32 | 
            -
                @csr.generate(@key)
         | 
| 33 | 
            -
                Puppet::SSL::CertificateRequest.indirection.save(@csr)
         | 
| 34 | 
            -
             | 
| 35 | 
            -
                expect(Puppet::SSL::CertificateRequest.indirection.find("luke.madstop.com")).to be_instance_of(Puppet::SSL::CertificateRequest)
         | 
| 36 | 
            -
              end
         | 
| 37 | 
            -
             | 
| 38 | 
            -
              it "should save the completely CSR when saving" do
         | 
| 39 | 
            -
                @csr.generate(@key)
         | 
| 40 | 
            -
                Puppet::SSL::CertificateRequest.indirection.save(@csr)
         | 
| 41 | 
            -
             | 
| 42 | 
            -
                expect(Puppet::SSL::CertificateRequest.indirection.find("luke.madstop.com").content.to_s).to eq(@csr.content.to_s)
         | 
| 43 | 
            -
              end
         | 
| 44 | 
            -
            end
         | 
| @@ -1,72 +0,0 @@ | |
| 1 | 
            -
            require 'spec_helper'
         | 
| 2 | 
            -
            require 'puppet/test_ca'
         | 
| 3 | 
            -
             | 
| 4 | 
            -
            require 'puppet/ssl/host'
         | 
| 5 | 
            -
             | 
| 6 | 
            -
            describe Puppet::SSL::Host, if: !Puppet::Util::Platform.jruby? do
         | 
| 7 | 
            -
              include PuppetSpec::Files
         | 
| 8 | 
            -
             | 
| 9 | 
            -
              before do
         | 
| 10 | 
            -
                # Get a safe temporary file
         | 
| 11 | 
            -
                dir = tmpdir("host_integration_testing")
         | 
| 12 | 
            -
             | 
| 13 | 
            -
                Puppet.settings[:confdir] = dir
         | 
| 14 | 
            -
                Puppet.settings[:vardir] = dir
         | 
| 15 | 
            -
                Puppet.settings.use :main, :ssl
         | 
| 16 | 
            -
             | 
| 17 | 
            -
                @host = Puppet::SSL::Host.new("luke.madstop.com")
         | 
| 18 | 
            -
                allow(@host).to receive(:submit_certificate_request)
         | 
| 19 | 
            -
             | 
| 20 | 
            -
                @ca = Puppet::TestCa.new
         | 
| 21 | 
            -
                Puppet::Util.replace_file(Puppet[:localcacert], 0644) do |f|
         | 
| 22 | 
            -
                  f.write(@ca.ca_cert.to_s)
         | 
| 23 | 
            -
                end
         | 
| 24 | 
            -
                Puppet::Util.replace_file(Puppet[:hostcrl], 0644) do |f|
         | 
| 25 | 
            -
                  f.write(@ca.ca_crl.to_s)
         | 
| 26 | 
            -
                end
         | 
| 27 | 
            -
              end
         | 
| 28 | 
            -
             | 
| 29 | 
            -
              describe "when managing its key" do
         | 
| 30 | 
            -
                it "should be able to generate and save a key" do
         | 
| 31 | 
            -
                  @host.generate_key
         | 
| 32 | 
            -
                end
         | 
| 33 | 
            -
             | 
| 34 | 
            -
                it "should save the key such that the Indirector can find it" do
         | 
| 35 | 
            -
                  @host.generate_key
         | 
| 36 | 
            -
             | 
| 37 | 
            -
                  expect(Puppet::SSL::Key.indirection.find(@host.name).content.to_s).to eq(@host.key.to_s)
         | 
| 38 | 
            -
                end
         | 
| 39 | 
            -
             | 
| 40 | 
            -
                it "should save the private key into the :privatekeydir" do
         | 
| 41 | 
            -
                  @host.generate_key
         | 
| 42 | 
            -
                  expect(File.read(File.join(Puppet.settings[:privatekeydir], "luke.madstop.com.pem"))).to eq(@host.key.to_s)
         | 
| 43 | 
            -
                end
         | 
| 44 | 
            -
              end
         | 
| 45 | 
            -
             | 
| 46 | 
            -
              describe "when managing its certificate request" do
         | 
| 47 | 
            -
                it "should be able to generate and save a certificate request" do
         | 
| 48 | 
            -
                  @host.generate_certificate_request
         | 
| 49 | 
            -
                end
         | 
| 50 | 
            -
             | 
| 51 | 
            -
                it "should save the certificate request such that the Indirector can find it" do
         | 
| 52 | 
            -
                  @host.generate_certificate_request
         | 
| 53 | 
            -
             | 
| 54 | 
            -
                  expect(Puppet::SSL::CertificateRequest.indirection.find(@host.name).content.to_s).to eq(@host.certificate_request.to_s)
         | 
| 55 | 
            -
                end
         | 
| 56 | 
            -
             | 
| 57 | 
            -
                it "should save the private certificate request into the :privatekeydir" do
         | 
| 58 | 
            -
                  @host.generate_certificate_request
         | 
| 59 | 
            -
                  expect(File.read(File.join(Puppet.settings[:requestdir], "luke.madstop.com.pem"))).to eq(@host.certificate_request.to_s)
         | 
| 60 | 
            -
                end
         | 
| 61 | 
            -
              end
         | 
| 62 | 
            -
             | 
| 63 | 
            -
              it "should pass the verification of its own SSL store", :unless => Puppet.features.microsoft_windows? do
         | 
| 64 | 
            -
                @host.generate_certificate_request
         | 
| 65 | 
            -
                cert = @ca.sign(@host.certificate_request.content)
         | 
| 66 | 
            -
                Puppet::Util.replace_file(File.join(Puppet[:certdir], "#{@host.name}.pem"), 0644) do |f|
         | 
| 67 | 
            -
                  f.write(cert)
         | 
| 68 | 
            -
                end
         | 
| 69 | 
            -
             | 
| 70 | 
            -
                expect(@host.ssl_store.verify(@host.certificate.content)).to be_truthy
         | 
| 71 | 
            -
              end
         | 
| 72 | 
            -
            end
         | 
| @@ -1,99 +0,0 @@ | |
| 1 | 
            -
            require 'spec_helper'
         | 
| 2 | 
            -
             | 
| 3 | 
            -
            require 'puppet/ssl/key'
         | 
| 4 | 
            -
             | 
| 5 | 
            -
            describe Puppet::SSL::Key, unless: Puppet::Util::Platform.jruby? do
         | 
| 6 | 
            -
              include PuppetSpec::Files
         | 
| 7 | 
            -
             | 
| 8 | 
            -
              # different UTF-8 widths
         | 
| 9 | 
            -
              # 1-byte A
         | 
| 10 | 
            -
              # 2-byte ۿ - http://www.fileformat.info/info/unicode/char/06ff/index.htm - 0xDB 0xBF / 219 191
         | 
| 11 | 
            -
              # 3-byte ᚠ - http://www.fileformat.info/info/unicode/char/16A0/index.htm - 0xE1 0x9A 0xA0 / 225 154 160
         | 
| 12 | 
            -
              # 4-byte  - http://www.fileformat.info/info/unicode/char/2070E/index.htm - 0xF0 0xA0 0x9C 0x8E / 240 160 156 142
         | 
| 13 | 
            -
              let (:mixed_utf8) { "A\u06FF\u16A0\u{2070E}" } # Aۿᚠ
         | 
| 14 | 
            -
             | 
| 15 | 
            -
              before do
         | 
| 16 | 
            -
                # Get a safe temporary file
         | 
| 17 | 
            -
                dir = tmpdir('key_integration_testing')
         | 
| 18 | 
            -
             | 
| 19 | 
            -
                Puppet.settings[:confdir] = dir
         | 
| 20 | 
            -
                Puppet.settings[:vardir] = dir
         | 
| 21 | 
            -
             | 
| 22 | 
            -
                # This is necessary so the terminus instances don't lie around.
         | 
| 23 | 
            -
                # and so that Puppet::SSL::Key.indirection.save may be used
         | 
| 24 | 
            -
                Puppet::SSL::Key.indirection.termini.clear
         | 
| 25 | 
            -
              end
         | 
| 26 | 
            -
             | 
| 27 | 
            -
              describe 'with a custom user-specified passfile' do
         | 
| 28 | 
            -
             | 
| 29 | 
            -
                before do
         | 
| 30 | 
            -
                  # write custom password file to where Puppet expects
         | 
| 31 | 
            -
                  password_file = tmpfile('passfile')
         | 
| 32 | 
            -
                  Puppet[:passfile] = password_file
         | 
| 33 | 
            -
                  Puppet::FileSystem.open(password_file, nil, 'w:UTF-8') { |f| f.print(mixed_utf8) }
         | 
| 34 | 
            -
                end
         | 
| 35 | 
            -
             | 
| 36 | 
            -
                it 'should use the configured password file if it is not the CA key' do
         | 
| 37 | 
            -
                  key = Puppet::SSL::Key.new('test')
         | 
| 38 | 
            -
                  expect(key.password_file).to eq(Puppet[:passfile])
         | 
| 39 | 
            -
                  expect(key.password).to eq(mixed_utf8.force_encoding(Encoding::BINARY))
         | 
| 40 | 
            -
                end
         | 
| 41 | 
            -
             | 
| 42 | 
            -
                it "should be able to read an existing private key given the correct password" do
         | 
| 43 | 
            -
                  key_name = 'test'
         | 
| 44 | 
            -
                  # use OpenSSL APIs to generate a private key
         | 
| 45 | 
            -
                  private_key = OpenSSL::PKey::RSA.generate(512)
         | 
| 46 | 
            -
             | 
| 47 | 
            -
                  # stash it in Puppets private key directory
         | 
| 48 | 
            -
                  FileUtils.mkdir_p(Puppet[:privatekeydir])
         | 
| 49 | 
            -
                  pem_path = File.join(Puppet[:privatekeydir], "#{key_name}.pem")
         | 
| 50 | 
            -
                  Puppet::FileSystem.open(pem_path, nil, 'w:UTF-8') do |f|
         | 
| 51 | 
            -
                    # with password protection enabled
         | 
| 52 | 
            -
                    pem = private_key.to_pem(OpenSSL::Cipher::DES.new(:EDE3, :CBC), mixed_utf8)
         | 
| 53 | 
            -
                    f.print(pem)
         | 
| 54 | 
            -
                  end
         | 
| 55 | 
            -
             | 
| 56 | 
            -
                  # indirector loads existing .pem off disk instead of replacing it
         | 
| 57 | 
            -
                  host = Puppet::SSL::Host.new(key_name)
         | 
| 58 | 
            -
                  host.key
         | 
| 59 | 
            -
             | 
| 60 | 
            -
                  # newly loaded host private key matches the manually created key
         | 
| 61 | 
            -
                  # Private-Key: (512 bit) style data
         | 
| 62 | 
            -
                  expect(host.key.content.to_text).to eq(private_key.to_text)
         | 
| 63 | 
            -
                  # -----BEGIN RSA PRIVATE KEY-----
         | 
| 64 | 
            -
                  expect(host.key.content.to_s).to eq(private_key.to_s)
         | 
| 65 | 
            -
                  expect(host.key.password).to eq(mixed_utf8.force_encoding(Encoding::BINARY))
         | 
| 66 | 
            -
                end
         | 
| 67 | 
            -
             | 
| 68 | 
            -
                it 'should export the private key to PEM using the password' do
         | 
| 69 | 
            -
                  key_name = 'test'
         | 
| 70 | 
            -
             | 
| 71 | 
            -
                  # uses specified :passfile when writing the private key
         | 
| 72 | 
            -
                  key = Puppet::SSL::Key.new(key_name)
         | 
| 73 | 
            -
                  key.generate
         | 
| 74 | 
            -
                  Puppet::SSL::Key.indirection.save(key)
         | 
| 75 | 
            -
             | 
| 76 | 
            -
                  # indirector writes file here
         | 
| 77 | 
            -
                  pem_path = File.join(Puppet[:privatekeydir], "#{key_name}.pem")
         | 
| 78 | 
            -
             | 
| 79 | 
            -
                  # note incorrect password is an error
         | 
| 80 | 
            -
                  expect do
         | 
| 81 | 
            -
                    Puppet::FileSystem.open(pem_path, nil, 'r:ASCII') do |f|
         | 
| 82 | 
            -
                      OpenSSL::PKey::RSA.new(f.read, 'invalid_password')
         | 
| 83 | 
            -
                    end
         | 
| 84 | 
            -
                  end.to raise_error(OpenSSL::PKey::RSAError)
         | 
| 85 | 
            -
             | 
| 86 | 
            -
                  # but when specifying the correct password
         | 
| 87 | 
            -
                  reloaded_key = nil
         | 
| 88 | 
            -
                  Puppet::FileSystem.open(pem_path, nil, 'r:ASCII') do |f|
         | 
| 89 | 
            -
                    reloaded_key = OpenSSL::PKey::RSA.new(f.read, mixed_utf8)
         | 
| 90 | 
            -
                  end
         | 
| 91 | 
            -
             | 
| 92 | 
            -
                  # the original key matches the manually reloaded key
         | 
| 93 | 
            -
                  # Private-Key: (512 bit) style data
         | 
| 94 | 
            -
                  expect(key.content.to_text).to eq(reloaded_key.to_text)
         | 
| 95 | 
            -
                  # -----BEGIN RSA PRIVATE KEY-----
         | 
| 96 | 
            -
                  expect(key.content.to_s).to eq(reloaded_key.to_s)
         | 
| 97 | 
            -
                end
         | 
| 98 | 
            -
              end
         | 
| 99 | 
            -
            end
         |