puppet 7.20.0-universal-darwin → 7.22.0-universal-darwin
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/Gemfile.lock +62 -48
- data/Guardfile.example +1 -1
- data/ext/project_data.yaml +1 -1
- data/ext/windows/service/daemon.rb +1 -1
- data/lib/puppet/application/lookup.rb +5 -5
- data/lib/puppet/defaults.rb +14 -0
- data/lib/puppet/indirector/facts/facter.rb +8 -1
- data/lib/puppet/info_service/task_information_service.rb +10 -2
- data/lib/puppet/transaction/report.rb +18 -1
- data/lib/puppet/type/resources.rb +1 -6
- data/lib/puppet/type/tidy.rb +3 -2
- data/lib/puppet/type/user.rb +1 -3
- data/lib/puppet/type.rb +10 -0
- data/lib/puppet/version.rb +1 -1
- data/man/man5/puppet.conf.5 +18 -2
- data/man/man8/puppet-agent.8 +1 -1
- data/man/man8/puppet-apply.8 +1 -1
- data/man/man8/puppet-catalog.8 +1 -1
- data/man/man8/puppet-config.8 +1 -1
- data/man/man8/puppet-describe.8 +1 -1
- data/man/man8/puppet-device.8 +1 -1
- data/man/man8/puppet-doc.8 +1 -1
- data/man/man8/puppet-epp.8 +1 -1
- data/man/man8/puppet-facts.8 +1 -1
- data/man/man8/puppet-filebucket.8 +1 -1
- data/man/man8/puppet-generate.8 +1 -1
- data/man/man8/puppet-help.8 +1 -1
- data/man/man8/puppet-lookup.8 +1 -1
- data/man/man8/puppet-module.8 +1 -1
- data/man/man8/puppet-node.8 +1 -1
- data/man/man8/puppet-parser.8 +1 -1
- data/man/man8/puppet-plugin.8 +1 -1
- data/man/man8/puppet-report.8 +1 -1
- data/man/man8/puppet-resource.8 +1 -1
- data/man/man8/puppet-script.8 +1 -1
- data/man/man8/puppet-ssl.8 +1 -1
- data/man/man8/puppet.8 +2 -2
- data/spec/integration/application/agent_spec.rb +100 -1
- data/spec/integration/application/lookup_spec.rb +55 -0
- data/spec/unit/agent_spec.rb +1 -1
- data/spec/unit/application/agent_spec.rb +1 -1
- data/spec/unit/application/device_spec.rb +1 -1
- data/spec/unit/application/resource_spec.rb +1 -1
- data/spec/unit/confiner_spec.rb +1 -1
- data/spec/unit/daemon_spec.rb +1 -1
- data/spec/unit/file_bucket/dipper_spec.rb +1 -1
- data/spec/unit/file_serving/fileset_spec.rb +14 -14
- data/spec/unit/file_system_spec.rb +3 -1
- data/spec/unit/graph/simple_graph_spec.rb +1 -1
- data/spec/unit/http/service/compiler_spec.rb +1 -1
- data/spec/unit/indirector/facts/facter_spec.rb +25 -0
- data/spec/unit/indirector/file_server_spec.rb +5 -5
- data/spec/unit/indirector/indirection_spec.rb +1 -1
- data/spec/unit/indirector/node/plain_spec.rb +1 -1
- data/spec/unit/info_service_spec.rb +21 -0
- data/spec/unit/module_tool/tar/mini_spec.rb +1 -1
- data/spec/unit/network/formats_spec.rb +1 -1
- data/spec/unit/provider/file/posix_spec.rb +4 -4
- data/spec/unit/provider/ldap_spec.rb +3 -3
- data/spec/unit/provider/nameservice_spec.rb +15 -15
- data/spec/unit/provider/package/aix_spec.rb +1 -1
- data/spec/unit/provider/package/dpkg_spec.rb +3 -3
- data/spec/unit/provider/package/nim_spec.rb +2 -2
- data/spec/unit/provider/package/pkgutil_spec.rb +4 -4
- data/spec/unit/provider/parsedfile_spec.rb +4 -4
- data/spec/unit/provider/service/bsd_spec.rb +4 -4
- data/spec/unit/provider/service/debian_spec.rb +2 -2
- data/spec/unit/provider/service/gentoo_spec.rb +20 -20
- data/spec/unit/provider/service/openbsd_spec.rb +18 -18
- data/spec/unit/provider/service/openrc_spec.rb +19 -19
- data/spec/unit/provider/service/systemd_spec.rb +22 -22
- data/spec/unit/provider/service/upstart_spec.rb +6 -6
- data/spec/unit/provider/user/aix_spec.rb +1 -1
- data/spec/unit/provider/user/hpux_spec.rb +1 -1
- data/spec/unit/provider/user/openbsd_spec.rb +1 -1
- data/spec/unit/provider/user/useradd_spec.rb +1 -1
- data/spec/unit/reports/store_spec.rb +5 -1
- data/spec/unit/resource/type_spec.rb +2 -2
- data/spec/unit/ssl/base_spec.rb +1 -1
- data/spec/unit/ssl/certificate_request_spec.rb +1 -1
- data/spec/unit/ssl/certificate_spec.rb +1 -1
- data/spec/unit/transaction/event_manager_spec.rb +4 -4
- data/spec/unit/transaction/report_spec.rb +38 -1
- data/spec/unit/transaction_spec.rb +2 -2
- data/spec/unit/type/exec_spec.rb +1 -1
- data/spec/unit/type/file_spec.rb +4 -4
- data/spec/unit/type/filebucket_spec.rb +3 -3
- data/spec/unit/type/resources_spec.rb +14 -0
- data/spec/unit/type/tidy_spec.rb +27 -17
- data/spec/unit/util/backups_spec.rb +1 -1
- data/spec/unit/util/execution_spec.rb +6 -6
- data/spec/unit/util/filetype_spec.rb +3 -3
- data/spec/unit/util/network_device_spec.rb +1 -6
- data/spec/unit/util/resource_template_spec.rb +1 -1
- data/spec/unit/util/storage_spec.rb +1 -1
- data/spec/unit/x509/cert_provider_spec.rb +1 -1
- metadata +9 -3
@@ -37,13 +37,13 @@ describe 'Puppet::Type::Service::Provider::Openrc',
|
|
37
37
|
describe "#start" do
|
38
38
|
it "should use the supplied start command if specified" do
|
39
39
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd', :start => '/bin/foo'))
|
40
|
-
expect(provider).to receive(:execute).with(['/bin/foo'], :failonfail => true, :override_locale => false, :squelch => false, :combine => true)
|
40
|
+
expect(provider).to receive(:execute).with(['/bin/foo'], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true})
|
41
41
|
provider.start
|
42
42
|
end
|
43
43
|
|
44
44
|
it "should start the service with rc-service start otherwise" do
|
45
45
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd'))
|
46
|
-
expect(provider).to receive(:execute).with(['/sbin/rc-service','sshd',:start], :failonfail => true, :override_locale => false, :squelch => false, :combine => true)
|
46
|
+
expect(provider).to receive(:execute).with(['/sbin/rc-service','sshd',:start], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true})
|
47
47
|
provider.start
|
48
48
|
end
|
49
49
|
end
|
@@ -51,13 +51,13 @@ describe 'Puppet::Type::Service::Provider::Openrc',
|
|
51
51
|
describe "#stop" do
|
52
52
|
it "should use the supplied stop command if specified" do
|
53
53
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd', :stop => '/bin/foo'))
|
54
|
-
expect(provider).to receive(:execute).with(['/bin/foo'], :failonfail => true, :override_locale => false, :squelch => false, :combine => true)
|
54
|
+
expect(provider).to receive(:execute).with(['/bin/foo'], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true})
|
55
55
|
provider.stop
|
56
56
|
end
|
57
57
|
|
58
58
|
it "should stop the service with rc-service stop otherwise" do
|
59
59
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd'))
|
60
|
-
expect(provider).to receive(:execute).with(['/sbin/rc-service','sshd',:stop], :failonfail => true, :override_locale => false, :squelch => false, :combine => true)
|
60
|
+
expect(provider).to receive(:execute).with(['/sbin/rc-service','sshd',:stop], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true})
|
61
61
|
provider.stop
|
62
62
|
end
|
63
63
|
end
|
@@ -147,25 +147,25 @@ describe 'Puppet::Type::Service::Provider::Openrc',
|
|
147
147
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd', :status => '/bin/foo'))
|
148
148
|
expect(provider).not_to receive(:execute).with(['/sbin/rc-service','sshd',:status], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
|
149
149
|
expect(provider).to receive(:execute)
|
150
|
-
.with(['/bin/foo'], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
|
150
|
+
.with(['/bin/foo'], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
|
151
151
|
.and_return(Puppet::Util::Execution::ProcessOutput.new('', 0))
|
152
152
|
provider.status
|
153
153
|
end
|
154
154
|
|
155
155
|
it "should return :stopped when status command returns with a non-zero exitcode" do
|
156
156
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd', :status => '/bin/foo'))
|
157
|
-
expect(provider).not_to receive(:execute).with(['/sbin/rc-service','sshd',:status], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
|
157
|
+
expect(provider).not_to receive(:execute).with(['/sbin/rc-service','sshd',:status], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
|
158
158
|
expect(provider).to receive(:execute)
|
159
|
-
.with(['/bin/foo'], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
|
159
|
+
.with(['/bin/foo'], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
|
160
160
|
.and_return(Puppet::Util::Execution::ProcessOutput.new('', 3))
|
161
161
|
expect(provider.status).to eq(:stopped)
|
162
162
|
end
|
163
163
|
|
164
164
|
it "should return :running when status command returns with a zero exitcode" do
|
165
165
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd', :status => '/bin/foo'))
|
166
|
-
expect(provider).not_to receive(:execute).with(['/sbin/rc-service','sshd',:status], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
|
166
|
+
expect(provider).not_to receive(:execute).with(['/sbin/rc-service','sshd',:status], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
|
167
167
|
expect(provider).to receive(:execute)
|
168
|
-
.with(['/bin/foo'], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
|
168
|
+
.with(['/bin/foo'], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
|
169
169
|
.and_return(Puppet::Util::Execution::ProcessOutput.new('', 0))
|
170
170
|
expect(provider.status).to eq(:running)
|
171
171
|
end
|
@@ -174,14 +174,14 @@ describe 'Puppet::Type::Service::Provider::Openrc',
|
|
174
174
|
describe "when hasstatus is false" do
|
175
175
|
it "should return running if a pid can be found" do
|
176
176
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd', :hasstatus => false))
|
177
|
-
expect(provider).not_to receive(:execute).with(['/sbin/rc-service','sshd',:status], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
|
177
|
+
expect(provider).not_to receive(:execute).with(['/sbin/rc-service','sshd',:status], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
|
178
178
|
expect(provider).to receive(:getpid).and_return(1000)
|
179
179
|
expect(provider.status).to eq(:running)
|
180
180
|
end
|
181
181
|
|
182
182
|
it "should return stopped if no pid can be found" do
|
183
183
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd', :hasstatus => false))
|
184
|
-
expect(provider).not_to receive(:execute).with(['/sbin/rc-service','sshd',:status], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
|
184
|
+
expect(provider).not_to receive(:execute).with(['/sbin/rc-service','sshd',:status], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
|
185
185
|
expect(provider).to receive(:getpid).and_return(nil)
|
186
186
|
expect(provider.status).to eq(:stopped)
|
187
187
|
end
|
@@ -191,7 +191,7 @@ describe 'Puppet::Type::Service::Provider::Openrc',
|
|
191
191
|
it "should return running if rc-service status exits with a zero exitcode" do
|
192
192
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd', :hasstatus => true))
|
193
193
|
expect(provider).to receive(:execute)
|
194
|
-
.with(['/sbin/rc-service','sshd',:status], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
|
194
|
+
.with(['/sbin/rc-service','sshd',:status], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
|
195
195
|
.and_return(Puppet::Util::Execution::ProcessOutput.new('', 0))
|
196
196
|
expect(provider.status).to eq(:running)
|
197
197
|
end
|
@@ -199,7 +199,7 @@ describe 'Puppet::Type::Service::Provider::Openrc',
|
|
199
199
|
it "should return stopped if rc-service status exits with a non-zero exitcode" do
|
200
200
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd', :hasstatus => true))
|
201
201
|
expect(provider).to receive(:execute)
|
202
|
-
.with(['/sbin/rc-service','sshd',:status], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
|
202
|
+
.with(['/sbin/rc-service','sshd',:status], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
|
203
203
|
.and_return(Puppet::Util::Execution::ProcessOutput.new('', 3))
|
204
204
|
expect(provider.status).to eq(:stopped)
|
205
205
|
end
|
@@ -209,22 +209,22 @@ describe 'Puppet::Type::Service::Provider::Openrc',
|
|
209
209
|
describe "#restart" do
|
210
210
|
it "should use the supplied restart command if specified" do
|
211
211
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd', :restart => '/bin/foo'))
|
212
|
-
expect(provider).not_to receive(:execute).with(['/sbin/rc-service','sshd',:restart], :failonfail => true, :override_locale => false, :squelch => false, :combine => true)
|
213
|
-
expect(provider).to receive(:execute).with(['/bin/foo'], :failonfail => true, :override_locale => false, :squelch => false, :combine => true)
|
212
|
+
expect(provider).not_to receive(:execute).with(['/sbin/rc-service','sshd',:restart], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true})
|
213
|
+
expect(provider).to receive(:execute).with(['/bin/foo'], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true})
|
214
214
|
provider.restart
|
215
215
|
end
|
216
216
|
|
217
217
|
it "should restart the service with rc-service restart if hasrestart is true" do
|
218
218
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd', :hasrestart => true))
|
219
|
-
expect(provider).to receive(:execute).with(['/sbin/rc-service','sshd',:restart], :failonfail => true, :override_locale => false, :squelch => false, :combine => true)
|
219
|
+
expect(provider).to receive(:execute).with(['/sbin/rc-service','sshd',:restart], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true})
|
220
220
|
provider.restart
|
221
221
|
end
|
222
222
|
|
223
223
|
it "should restart the service with rc-service stop/start if hasrestart is false" do
|
224
224
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd', :hasrestart => false))
|
225
|
-
expect(provider).not_to receive(:execute).with(['/sbin/rc-service','sshd',:restart], :failonfail => true, :override_locale => false, :squelch => false, :combine => true)
|
226
|
-
expect(provider).to receive(:execute).with(['/sbin/rc-service','sshd',:stop], :failonfail => true, :override_locale => false, :squelch => false, :combine => true)
|
227
|
-
expect(provider).to receive(:execute).with(['/sbin/rc-service','sshd',:start], :failonfail => true, :override_locale => false, :squelch => false, :combine => true)
|
225
|
+
expect(provider).not_to receive(:execute).with(['/sbin/rc-service','sshd',:restart], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true})
|
226
|
+
expect(provider).to receive(:execute).with(['/sbin/rc-service','sshd',:stop], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true})
|
227
|
+
expect(provider).to receive(:execute).with(['/sbin/rc-service','sshd',:start], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true})
|
228
228
|
provider.restart
|
229
229
|
end
|
230
230
|
end
|
@@ -217,7 +217,7 @@ describe 'Puppet::Type::Service::Provider::Systemd',
|
|
217
217
|
it "should use the supplied start command if specified" do
|
218
218
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service', :start => '/bin/foo'))
|
219
219
|
expect(provider).to receive(:daemon_reload?).and_return('no')
|
220
|
-
expect(provider).to receive(:execute).with(['/bin/foo'], :failonfail => true, :override_locale => false, :squelch => false, :combine => true)
|
220
|
+
expect(provider).to receive(:execute).with(['/bin/foo'], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true})
|
221
221
|
provider.start
|
222
222
|
end
|
223
223
|
|
@@ -249,13 +249,13 @@ Jun 14 21:43:23 foo.example.com systemd[1]: sshd.service lacks both ExecStart= a
|
|
249
249
|
describe "#stop" do
|
250
250
|
it "should use the supplied stop command if specified" do
|
251
251
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service', :stop => '/bin/foo'))
|
252
|
-
expect(provider).to receive(:execute).with(['/bin/foo'], :failonfail => true, :override_locale => false, :squelch => false, :combine => true)
|
252
|
+
expect(provider).to receive(:execute).with(['/bin/foo'], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true})
|
253
253
|
provider.stop
|
254
254
|
end
|
255
255
|
|
256
256
|
it "should stop the service with systemctl stop otherwise" do
|
257
257
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service'))
|
258
|
-
expect(provider).to receive(:execute).with(['/bin/systemctl','stop', '--', 'sshd.service'], :failonfail => true, :override_locale => false, :squelch => false, :combine => true)
|
258
|
+
expect(provider).to receive(:execute).with(['/bin/systemctl','stop', '--', 'sshd.service'], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true})
|
259
259
|
provider.stop
|
260
260
|
end
|
261
261
|
|
@@ -277,13 +277,13 @@ Jun 14 21:43:23 foo.example.com systemd[1]: sshd.service lacks both ExecStart= a
|
|
277
277
|
describe "#daemon_reload?" do
|
278
278
|
it "should skip the systemctl daemon_reload if not required by the service" do
|
279
279
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service'))
|
280
|
-
expect(provider).to receive(:execute).with(['/bin/systemctl', 'show', '--property=NeedDaemonReload', '--', 'sshd.service'], :failonfail => false).and_return("no")
|
280
|
+
expect(provider).to receive(:execute).with(['/bin/systemctl', 'show', '--property=NeedDaemonReload', '--', 'sshd.service'], {:failonfail => false}).and_return("no")
|
281
281
|
provider.daemon_reload?
|
282
282
|
end
|
283
283
|
it "should run a systemctl daemon_reload if the service has been modified" do
|
284
284
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service'))
|
285
|
-
expect(provider).to receive(:execute).with(['/bin/systemctl', 'show', '--property=NeedDaemonReload', '--', 'sshd.service'], :failonfail => false).and_return("yes")
|
286
|
-
expect(provider).to receive(:execute).with(['/bin/systemctl', 'daemon-reload'], :failonfail => false)
|
285
|
+
expect(provider).to receive(:execute).with(['/bin/systemctl', 'show', '--property=NeedDaemonReload', '--', 'sshd.service'], {:failonfail => false}).and_return("yes")
|
286
|
+
expect(provider).to receive(:execute).with(['/bin/systemctl', 'daemon-reload'], {:failonfail => false})
|
287
287
|
provider.daemon_reload?
|
288
288
|
end
|
289
289
|
end
|
@@ -291,51 +291,51 @@ Jun 14 21:43:23 foo.example.com systemd[1]: sshd.service lacks both ExecStart= a
|
|
291
291
|
describe "#enabled?" do
|
292
292
|
it "should return :true if the service is enabled" do
|
293
293
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service'))
|
294
|
-
expect(provider).to receive(:execute).with(['/bin/systemctl','is-enabled', '--', 'sshd.service'], :failonfail => false).
|
294
|
+
expect(provider).to receive(:execute).with(['/bin/systemctl','is-enabled', '--', 'sshd.service'], {:failonfail => false}).
|
295
295
|
and_return(Puppet::Util::Execution::ProcessOutput.new("enabled\n", 0))
|
296
296
|
expect(provider.enabled?).to eq(:true)
|
297
297
|
end
|
298
298
|
|
299
299
|
it "should return :true if the service is static" do
|
300
300
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service'))
|
301
|
-
expect(provider).to receive(:execute).with(['/bin/systemctl','is-enabled','--', 'sshd.service'], :failonfail => false).
|
301
|
+
expect(provider).to receive(:execute).with(['/bin/systemctl','is-enabled','--', 'sshd.service'], {:failonfail => false}).
|
302
302
|
and_return(Puppet::Util::Execution::ProcessOutput.new("static\n", 0))
|
303
303
|
expect(provider.enabled?).to eq(:true)
|
304
304
|
end
|
305
305
|
|
306
306
|
it "should return :false if the service is disabled" do
|
307
307
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service'))
|
308
|
-
expect(provider).to receive(:execute).with(['/bin/systemctl','is-enabled', '--', 'sshd.service'], :failonfail => false).
|
308
|
+
expect(provider).to receive(:execute).with(['/bin/systemctl','is-enabled', '--', 'sshd.service'], {:failonfail => false}).
|
309
309
|
and_return(Puppet::Util::Execution::ProcessOutput.new("disabled\n", 1))
|
310
310
|
expect(provider.enabled?).to eq(:false)
|
311
311
|
end
|
312
312
|
|
313
313
|
it "should return :false if the service is indirect" do
|
314
314
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service'))
|
315
|
-
expect(provider).to receive(:execute).with(['/bin/systemctl','is-enabled', '--', 'sshd.service'], :failonfail => false).
|
315
|
+
expect(provider).to receive(:execute).with(['/bin/systemctl','is-enabled', '--', 'sshd.service'], {:failonfail => false}).
|
316
316
|
and_return(Puppet::Util::Execution::ProcessOutput.new("indirect\n", 0))
|
317
317
|
expect(provider.enabled?).to eq(:false)
|
318
318
|
end
|
319
319
|
|
320
320
|
it "should return :false if the service is masked and the resource is attempting to be disabled" do
|
321
321
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service', :enable => false))
|
322
|
-
expect(provider).to receive(:execute).with(['/bin/systemctl','is-enabled', '--', 'sshd.service'], :failonfail => false).
|
322
|
+
expect(provider).to receive(:execute).with(['/bin/systemctl','is-enabled', '--', 'sshd.service'], {:failonfail => false}).
|
323
323
|
and_return(Puppet::Util::Execution::ProcessOutput.new("masked\n", 1))
|
324
324
|
expect(provider.enabled?).to eq(:false)
|
325
325
|
end
|
326
326
|
|
327
327
|
it "should return :mask if the service is masked and the resource is attempting to be masked" do
|
328
328
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service', :enable => 'mask'))
|
329
|
-
expect(provider).to receive(:execute).with(['/bin/systemctl','is-enabled', '--', 'sshd.service'], :failonfail => false).
|
329
|
+
expect(provider).to receive(:execute).with(['/bin/systemctl','is-enabled', '--', 'sshd.service'], {:failonfail => false}).
|
330
330
|
and_return(Puppet::Util::Execution::ProcessOutput.new("masked\n", 1))
|
331
331
|
expect(provider.enabled?).to eq(:mask)
|
332
332
|
end
|
333
333
|
|
334
334
|
it "should consider nonexistent services to be disabled" do
|
335
335
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'doesnotexist'))
|
336
|
-
expect(provider).to receive(:execute).with(['/bin/systemctl','is-enabled', '--', 'doesnotexist'], :failonfail => false)
|
336
|
+
expect(provider).to receive(:execute).with(['/bin/systemctl','is-enabled', '--', 'doesnotexist'], {:failonfail => false})
|
337
337
|
.and_return(Puppet::Util::Execution::ProcessOutput.new("", 1))
|
338
|
-
expect(provider).to receive(:execute).with(["/usr/sbin/invoke-rc.d", "--quiet", "--query", "doesnotexist", "start"], :failonfail => false)
|
338
|
+
expect(provider).to receive(:execute).with(["/usr/sbin/invoke-rc.d", "--quiet", "--query", "doesnotexist", "start"], {:failonfail => false})
|
339
339
|
.and_return(Puppet::Util::Execution::ProcessOutput.new("", 1))
|
340
340
|
|
341
341
|
expect(provider.enabled?).to be(:false)
|
@@ -363,7 +363,7 @@ Jun 14 21:43:23 foo.example.com systemd[1]: sshd.service lacks both ExecStart= a
|
|
363
363
|
it "should run systemctl to disable and mask a service" do
|
364
364
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service'))
|
365
365
|
expect(provider).to receive(:execute).
|
366
|
-
with(['/bin/systemctl','cat', '--', 'sshd.service'], :failonfail => false).
|
366
|
+
with(['/bin/systemctl','cat', '--', 'sshd.service'], {:failonfail => false}).
|
367
367
|
and_return(Puppet::Util::Execution::ProcessOutput.new("# /lib/systemd/system/sshd.service\n...", 0))
|
368
368
|
# :disable is the only call in the provider that uses a symbol instead of
|
369
369
|
# a string.
|
@@ -376,7 +376,7 @@ Jun 14 21:43:23 foo.example.com systemd[1]: sshd.service lacks both ExecStart= a
|
|
376
376
|
it "masks a service that doesn't exist" do
|
377
377
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'doesnotexist.service'))
|
378
378
|
expect(provider).to receive(:execute).
|
379
|
-
with(['/bin/systemctl','cat', '--', 'doesnotexist.service'], :failonfail => false).
|
379
|
+
with(['/bin/systemctl','cat', '--', 'doesnotexist.service'], {:failonfail => false}).
|
380
380
|
and_return(Puppet::Util::Execution::ProcessOutput.new("No files found for doesnotexist.service.\n", 1))
|
381
381
|
expect(provider).to receive(:systemctl).with(:mask, '--', 'doesnotexist.service')
|
382
382
|
provider.mask
|
@@ -389,7 +389,7 @@ Jun 14 21:43:23 foo.example.com systemd[1]: sshd.service lacks both ExecStart= a
|
|
389
389
|
it "should return running if the command returns 0" do
|
390
390
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service'))
|
391
391
|
expect(provider).to receive(:execute)
|
392
|
-
.with(['/bin/systemctl','is-active', '--', 'sshd.service'], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
|
392
|
+
.with(['/bin/systemctl','is-active', '--', 'sshd.service'], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
|
393
393
|
.and_return(Puppet::Util::Execution::ProcessOutput.new("active\n", 0))
|
394
394
|
expect(provider.status).to eq(:running)
|
395
395
|
end
|
@@ -398,7 +398,7 @@ Jun 14 21:43:23 foo.example.com systemd[1]: sshd.service lacks both ExecStart= a
|
|
398
398
|
it "should return stopped if the command returns something non-0" do
|
399
399
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service'))
|
400
400
|
expect(provider).to receive(:execute)
|
401
|
-
.with(['/bin/systemctl','is-active', '--', 'sshd.service'], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
|
401
|
+
.with(['/bin/systemctl','is-active', '--', 'sshd.service'], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
|
402
402
|
.and_return(Puppet::Util::Execution::ProcessOutput.new("inactive\n", ec))
|
403
403
|
expect(provider.status).to eq(:stopped)
|
404
404
|
end
|
@@ -407,7 +407,7 @@ Jun 14 21:43:23 foo.example.com systemd[1]: sshd.service lacks both ExecStart= a
|
|
407
407
|
it "should use the supplied status command if specified" do
|
408
408
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service', :status => '/bin/foo'))
|
409
409
|
expect(provider).to receive(:execute)
|
410
|
-
.with(['/bin/foo'], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
|
410
|
+
.with(['/bin/foo'], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
|
411
411
|
.and_return(process_output)
|
412
412
|
provider.status
|
413
413
|
end
|
@@ -419,15 +419,15 @@ Jun 14 21:43:23 foo.example.com systemd[1]: sshd.service lacks both ExecStart= a
|
|
419
419
|
it "should use the supplied restart command if specified" do
|
420
420
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd', :restart => '/bin/foo'))
|
421
421
|
expect(provider).to receive(:daemon_reload?).and_return('no')
|
422
|
-
expect(provider).to receive(:execute).with(['/bin/systemctl','restart', '--', 'sshd.service'], :failonfail => true, :override_locale => false, :squelch => false, :combine => true).never
|
423
|
-
expect(provider).to receive(:execute).with(['/bin/foo'], :failonfail => true, :override_locale => false, :squelch => false, :combine => true)
|
422
|
+
expect(provider).to receive(:execute).with(['/bin/systemctl','restart', '--', 'sshd.service'], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true}).never
|
423
|
+
expect(provider).to receive(:execute).with(['/bin/foo'], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true})
|
424
424
|
provider.restart
|
425
425
|
end
|
426
426
|
|
427
427
|
it "should restart the service with systemctl restart" do
|
428
428
|
provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service'))
|
429
429
|
expect(provider).to receive(:daemon_reload?).and_return('no')
|
430
|
-
expect(provider).to receive(:execute).with(['/bin/systemctl','restart','--','sshd.service'], :failonfail => true, :override_locale => false, :squelch => false, :combine => true)
|
430
|
+
expect(provider).to receive(:execute).with(['/bin/systemctl','restart','--','sshd.service'], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true})
|
431
431
|
provider.restart
|
432
432
|
end
|
433
433
|
|
@@ -132,7 +132,7 @@ describe 'Puppet::Type::Service::Provider::Upstart',
|
|
132
132
|
|
133
133
|
expect(provider).not_to receive(:status_exec).with(['foo'])
|
134
134
|
expect(provider).to receive(:execute)
|
135
|
-
.with(['/bin/foo'], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
|
135
|
+
.with(['/bin/foo'], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
|
136
136
|
.and_return(process_output)
|
137
137
|
provider.status
|
138
138
|
end
|
@@ -144,7 +144,7 @@ describe 'Puppet::Type::Service::Provider::Upstart',
|
|
144
144
|
|
145
145
|
expect(provider).not_to receive(:status_exec).with(['foo'])
|
146
146
|
expect(provider).to receive(:execute)
|
147
|
-
.with(['/bin/foo'], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
|
147
|
+
.with(['/bin/foo'], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
|
148
148
|
.and_return(Puppet::Util::Execution::ProcessOutput.new('', 1))
|
149
149
|
expect(provider.status).to eq(:stopped)
|
150
150
|
end
|
@@ -156,7 +156,7 @@ describe 'Puppet::Type::Service::Provider::Upstart',
|
|
156
156
|
|
157
157
|
expect(provider).not_to receive(:status_exec).with(['foo'])
|
158
158
|
expect(provider).to receive(:execute)
|
159
|
-
.with(['/bin/foo'], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
|
159
|
+
.with(['/bin/foo'], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
|
160
160
|
.and_return(process_output)
|
161
161
|
expect(provider.status).to eq(:running)
|
162
162
|
end
|
@@ -192,7 +192,7 @@ describe 'Puppet::Type::Service::Provider::Upstart',
|
|
192
192
|
|
193
193
|
expect(provider).not_to receive(:status_exec).with(['foo'])
|
194
194
|
expect(provider).to receive(:execute)
|
195
|
-
.with(['/bin/foo'], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
|
195
|
+
.with(['/bin/foo'], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
|
196
196
|
.and_return(process_output)
|
197
197
|
provider.status
|
198
198
|
end
|
@@ -204,7 +204,7 @@ describe 'Puppet::Type::Service::Provider::Upstart',
|
|
204
204
|
|
205
205
|
expect(provider).not_to receive(:status_exec).with(['foo'])
|
206
206
|
expect(provider).to receive(:execute)
|
207
|
-
.with(['/bin/foo'], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
|
207
|
+
.with(['/bin/foo'], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
|
208
208
|
.and_return(Puppet::Util::Execution::ProcessOutput.new('', 1))
|
209
209
|
expect(provider.status).to eq(:stopped)
|
210
210
|
end
|
@@ -216,7 +216,7 @@ describe 'Puppet::Type::Service::Provider::Upstart',
|
|
216
216
|
|
217
217
|
expect(provider).not_to receive(:status_exec).with(['foo'])
|
218
218
|
expect(provider).to receive(:execute)
|
219
|
-
.with(['/bin/foo'], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
|
219
|
+
.with(['/bin/foo'], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
|
220
220
|
.and_return(process_output)
|
221
221
|
expect(provider.status).to eq(:running)
|
222
222
|
end
|
@@ -165,7 +165,7 @@ describe 'Puppet::Type::User::Provider::Aix' do
|
|
165
165
|
allow(mock_tempfile_obj).to receive(:path).and_return('tempfile_path')
|
166
166
|
|
167
167
|
allow(Tempfile).to receive(:new)
|
168
|
-
.with("puppet_#{provider.name}_pw", :encoding => Encoding::ASCII)
|
168
|
+
.with("puppet_#{provider.name}_pw", {:encoding => Encoding::ASCII})
|
169
169
|
.and_return(mock_tempfile_obj)
|
170
170
|
|
171
171
|
mock_tempfile_obj
|
@@ -22,7 +22,7 @@ describe Puppet::Type.type(:user).provider(:openbsd) do
|
|
22
22
|
|
23
23
|
let(:shadow_entry) {
|
24
24
|
return unless Puppet.features.libshadow?
|
25
|
-
entry =
|
25
|
+
entry = Etc::PasswdEntry.new
|
26
26
|
entry[:sp_namp] = 'myuser' # login name
|
27
27
|
entry[:sp_loginclass] = 'staff' # login class
|
28
28
|
entry
|
@@ -29,7 +29,7 @@ describe Puppet::Type.type(:user).provider(:useradd) do
|
|
29
29
|
|
30
30
|
let(:shadow_entry) {
|
31
31
|
return unless Puppet.features.libshadow?
|
32
|
-
entry =
|
32
|
+
entry = Etc::PasswdEntry.new
|
33
33
|
entry[:sp_namp] = 'myuser' # login name
|
34
34
|
entry[:sp_pwdp] = '$6$FvW8Ib8h$qQMI/CR9m.QzIicZKutLpBgCBBdrch1IX0rTnxuI32K1pD9.RXZrmeKQlaC.RzODNuoUtPPIyQDufunvLOQWF0' # encrypted password
|
35
35
|
entry[:sp_lstchg] = 15573 # date of last password change
|
@@ -15,7 +15,11 @@ describe Puppet::Reports.report(:store) do
|
|
15
15
|
end
|
16
16
|
|
17
17
|
let(:report) do
|
18
|
-
|
18
|
+
if RUBY_VERSION < "3.0"
|
19
|
+
report = YAML.load_file(File.join(PuppetSpec::FIXTURE_DIR, 'yaml/report2.6.x.yaml'))
|
20
|
+
else
|
21
|
+
report = YAML.unsafe_load_file(File.join(PuppetSpec::FIXTURE_DIR, 'yaml/report2.6.x.yaml'))
|
22
|
+
end
|
19
23
|
report.extend(described_class)
|
20
24
|
report
|
21
25
|
end
|
@@ -521,7 +521,7 @@ describe Puppet::Resource::Type do
|
|
521
521
|
allow(@type).to receive(:code).and_return(code)
|
522
522
|
|
523
523
|
subscope = double('subscope', :compiler => @compiler)
|
524
|
-
expect(@scope).to receive(:newscope).with(:source => @type, :resource => @resource).and_return(subscope)
|
524
|
+
expect(@scope).to receive(:newscope).with({:source => @type, :resource => @resource}).and_return(subscope)
|
525
525
|
|
526
526
|
expect(subscope).to receive(:with_guarded_scope).and_yield
|
527
527
|
expect(subscope).to receive(:ephemeral_from).with(match, nil, nil).and_return(subscope)
|
@@ -546,7 +546,7 @@ describe Puppet::Resource::Type do
|
|
546
546
|
|
547
547
|
it "should set all of its parameters in a subscope" do
|
548
548
|
subscope = double('subscope', :compiler => @compiler)
|
549
|
-
expect(@scope).to receive(:newscope).with(:source => @type, :resource => @resource).and_return(subscope)
|
549
|
+
expect(@scope).to receive(:newscope).with({:source => @type, :resource => @resource}).and_return(subscope)
|
550
550
|
expect(@type).to receive(:set_resource_parameters).with(@resource, subscope)
|
551
551
|
|
552
552
|
@type.evaluate_code(@resource)
|
data/spec/unit/ssl/base_spec.rb
CHANGED
@@ -46,7 +46,7 @@ describe Puppet::SSL::Certificate do
|
|
46
46
|
describe "when initializing wrapped class from a file with #read" do
|
47
47
|
it "should open the file with ASCII encoding" do
|
48
48
|
path = '/foo/bar/cert'
|
49
|
-
expect(Puppet::FileSystem).to receive(:read).with(path, :encoding => Encoding::ASCII).and_return("bar")
|
49
|
+
expect(Puppet::FileSystem).to receive(:read).with(path, {:encoding => Encoding::ASCII}).and_return("bar")
|
50
50
|
@base.read(path)
|
51
51
|
end
|
52
52
|
end
|
@@ -45,7 +45,7 @@ describe Puppet::SSL::CertificateRequest do
|
|
45
45
|
|
46
46
|
it "should be able to read requests from disk" do
|
47
47
|
path = "/my/path"
|
48
|
-
expect(Puppet::FileSystem).to receive(:read).with(path, :encoding => Encoding::ASCII).and_return("my request")
|
48
|
+
expect(Puppet::FileSystem).to receive(:read).with(path, {:encoding => Encoding::ASCII}).and_return("my request")
|
49
49
|
my_req = double('request')
|
50
50
|
expect(OpenSSL::X509::Request).to receive(:new).with("my request").and_return(my_req)
|
51
51
|
expect(request.read(path)).to equal(my_req)
|
@@ -156,7 +156,7 @@ describe Puppet::SSL::Certificate do
|
|
156
156
|
|
157
157
|
it "should be able to read certificates from disk" do
|
158
158
|
path = "/my/path"
|
159
|
-
expect(Puppet::FileSystem).to receive(:read).with(path, :encoding => Encoding::ASCII).and_return("my certificate")
|
159
|
+
expect(Puppet::FileSystem).to receive(:read).with(path, {:encoding => Encoding::ASCII}).and_return("my certificate")
|
160
160
|
certificate = double('certificate')
|
161
161
|
expect(OpenSSL::X509::Certificate).to receive(:new).with("my certificate").and_return(certificate)
|
162
162
|
expect(@certificate.read(path)).to equal(certificate)
|
@@ -191,8 +191,8 @@ describe Puppet::Transaction::EventManager do
|
|
191
191
|
|
192
192
|
allow(@resource).to receive(:callback1)
|
193
193
|
|
194
|
-
expect(@resource).to receive(:event).with(:message => "Triggered 'callback1' from 1 event", :status => 'success', :name => 'callback1')
|
195
|
-
expect(@resource).to receive(:event).with(:name => :restarted, :status => "success").and_return("myevent")
|
194
|
+
expect(@resource).to receive(:event).with({:message => "Triggered 'callback1' from 1 event", :status => 'success', :name => 'callback1'})
|
195
|
+
expect(@resource).to receive(:event).with({:name => :restarted, :status => "success"}).and_return("myevent")
|
196
196
|
expect(@manager).to receive(:queue_events).with(@resource, ["myevent"])
|
197
197
|
|
198
198
|
@manager.process_events(@resource)
|
@@ -247,7 +247,7 @@ describe Puppet::Transaction::EventManager do
|
|
247
247
|
|
248
248
|
it "should queue a new noop event generated from the resource" do
|
249
249
|
event = Puppet::Transaction::Event.new
|
250
|
-
expect(@resource).to receive(:event).with(:status => "noop", :name => :noop_restart).and_return(event)
|
250
|
+
expect(@resource).to receive(:event).with({:status => "noop", :name => :noop_restart}).and_return(event)
|
251
251
|
expect(@manager).to receive(:queue_events).with(@resource, [event])
|
252
252
|
|
253
253
|
@manager.process_events(@resource)
|
@@ -277,7 +277,7 @@ describe Puppet::Transaction::EventManager do
|
|
277
277
|
|
278
278
|
it "should queue a new noop event generated from the resource" do
|
279
279
|
event = Puppet::Transaction::Event.new
|
280
|
-
expect(@resource).to receive(:event).with(:status => "noop", :name => :noop_restart).and_return(event)
|
280
|
+
expect(@resource).to receive(:event).with({:status => "noop", :name => :noop_restart}).and_return(event)
|
281
281
|
expect(@manager).to receive(:queue_events).with(@resource, [event])
|
282
282
|
|
283
283
|
@manager.process_events(@resource)
|
@@ -1,5 +1,5 @@
|
|
1
1
|
require 'spec_helper'
|
2
|
-
|
2
|
+
require 'puppet_spec/compiler'
|
3
3
|
require 'puppet'
|
4
4
|
require 'puppet/transaction/report'
|
5
5
|
require 'matchers/json'
|
@@ -7,6 +7,7 @@ require 'matchers/json'
|
|
7
7
|
describe Puppet::Transaction::Report do
|
8
8
|
include JSONMatchers
|
9
9
|
include PuppetSpec::Files
|
10
|
+
include PuppetSpec::Compiler
|
10
11
|
|
11
12
|
before do
|
12
13
|
allow(Puppet::Util::Storage).to receive(:store)
|
@@ -136,6 +137,42 @@ describe Puppet::Transaction::Report do
|
|
136
137
|
expect(report.metrics['time'].values.any? {|metric| metric.first =~ /whit/i}).to be_falsey
|
137
138
|
end
|
138
139
|
|
140
|
+
describe "when exclude_unchanged_resources is true" do
|
141
|
+
before do
|
142
|
+
Puppet[:exclude_unchanged_resources] = true
|
143
|
+
end
|
144
|
+
|
145
|
+
let(:test_dir) { tmpdir('unchanged_resources') }
|
146
|
+
let(:test_dir2) { tmpdir('unchanged_resources') }
|
147
|
+
let(:test_file) { tmpfile('some_path')}
|
148
|
+
it 'should still list "changed" resource statuses but remove "unchanged"' do
|
149
|
+
transaction = apply_compiled_manifest(<<-END)
|
150
|
+
notify { "hi": } ~>
|
151
|
+
exec { "/bin/this_command_does_not_exist":
|
152
|
+
command => "#{make_absolute('/bin/this_command_does_not_exist')}",
|
153
|
+
refreshonly => true,
|
154
|
+
}
|
155
|
+
file { '#{test_dir}':
|
156
|
+
ensure => directory
|
157
|
+
}
|
158
|
+
file { 'failing_file':
|
159
|
+
path => '#{test_dir2}',
|
160
|
+
ensure => file
|
161
|
+
}
|
162
|
+
file { 'skipped_file':
|
163
|
+
path => '#{test_file}',
|
164
|
+
require => File[failing_file]
|
165
|
+
}
|
166
|
+
END
|
167
|
+
rs = transaction.report.to_data_hash['resource_statuses']
|
168
|
+
expect(rs["Notify[hi]"]['out_of_sync']).to be true
|
169
|
+
expect(rs["Exec[/bin/this_command_does_not_exist]"]['failed_to_restart']).to be true
|
170
|
+
expect(rs["File[failing_file]"]['failed']).to be true
|
171
|
+
expect(rs["File[skipped_file]"]['skipped']).to be true
|
172
|
+
expect(rs).to_not have_key(["File[#{test_dir}]"])
|
173
|
+
end
|
174
|
+
end
|
175
|
+
|
139
176
|
describe "when accepting logs" do
|
140
177
|
before do
|
141
178
|
@report = Puppet::Transaction::Report.new
|
@@ -570,7 +570,7 @@ describe Puppet::Transaction do
|
|
570
570
|
end
|
571
571
|
|
572
572
|
it "should match resources by name, not title" do
|
573
|
-
expect(resource.provider.class).to receive(:prefetch).with("bar" => resource)
|
573
|
+
expect(resource.provider.class).to receive(:prefetch).with({"bar" => resource})
|
574
574
|
|
575
575
|
transaction.prefetch_if_necessary(resource)
|
576
576
|
end
|
@@ -598,7 +598,7 @@ describe Puppet::Transaction do
|
|
598
598
|
catalog.add_resource other
|
599
599
|
|
600
600
|
allow(resource.class).to receive(:defaultprovider).and_return(resource.provider.class)
|
601
|
-
expect(resource.provider.class).to receive(:prefetch).with('bar' => resource, 'other' => other)
|
601
|
+
expect(resource.provider.class).to receive(:prefetch).with({'bar' => resource, 'other' => other})
|
602
602
|
|
603
603
|
transaction.prefetch_if_necessary(resource)
|
604
604
|
end
|
data/spec/unit/type/exec_spec.rb
CHANGED
@@ -295,7 +295,7 @@ RSpec.describe Puppet::Type.type(:exec) do
|
|
295
295
|
|
296
296
|
it "accepts the current user" do
|
297
297
|
allow(Puppet.features).to receive(:root?).and_return(false)
|
298
|
-
allow(Etc).to receive(:getpwuid).and_return(
|
298
|
+
allow(Etc).to receive(:getpwuid).and_return(Etc::Passwd.new('input'))
|
299
299
|
|
300
300
|
type = Puppet::Type.type(:exec).new(:name => '/bin/true whatever', :user => 'input')
|
301
301
|
|
data/spec/unit/type/file_spec.rb
CHANGED
@@ -516,8 +516,8 @@ describe Puppet::Type.type(:file) do
|
|
516
516
|
it "should pass the already-discovered resources to recurse_remote" do
|
517
517
|
file[:source] = File.expand_path(__FILE__)
|
518
518
|
allow(child).to receive(:[]).with(:path).and_return(name)
|
519
|
-
allow(file).to receive(:recurse_local).and_return(name => child)
|
520
|
-
expect(file).to receive(:recurse_remote).with(name => child).and_return([])
|
519
|
+
allow(file).to receive(:recurse_local).and_return({name => child})
|
520
|
+
expect(file).to receive(:recurse_remote).with({name => child}).and_return([])
|
521
521
|
file.recurse
|
522
522
|
end
|
523
523
|
end
|
@@ -526,8 +526,8 @@ describe Puppet::Type.type(:file) do
|
|
526
526
|
it "should use recurse_link" do
|
527
527
|
file[:target] = File.expand_path(__FILE__)
|
528
528
|
allow(child).to receive(:[]).with(:path).and_return(name)
|
529
|
-
allow(file).to receive(:recurse_local).and_return(name => child)
|
530
|
-
expect(file).to receive(:recurse_link).with(name => child).and_return([])
|
529
|
+
allow(file).to receive(:recurse_local).and_return({name => child})
|
530
|
+
expect(file).to receive(:recurse_link).with({name => child}).and_return([])
|
531
531
|
file.recurse
|
532
532
|
end
|
533
533
|
end
|
@@ -82,20 +82,20 @@ describe Puppet::Type.type(:filebucket) do
|
|
82
82
|
it "should use any provided path" do
|
83
83
|
path = make_absolute("/foo/bar")
|
84
84
|
bucket = Puppet::Type.type(:filebucket).new :name => "main", :path => path
|
85
|
-
expect(Puppet::FileBucket::Dipper).to receive(:new).with(:Path => path).and_return(@bucket)
|
85
|
+
expect(Puppet::FileBucket::Dipper).to receive(:new).with({:Path => path}).and_return(@bucket)
|
86
86
|
bucket.bucket
|
87
87
|
end
|
88
88
|
|
89
89
|
it "should use any provided server and port" do
|
90
90
|
bucket = Puppet::Type.type(:filebucket).new :name => "main", :server => "myserv", :port => "myport", :path => false
|
91
|
-
expect(Puppet::FileBucket::Dipper).to receive(:new).with(:Server => "myserv", :Port => "myport").and_return(@bucket)
|
91
|
+
expect(Puppet::FileBucket::Dipper).to receive(:new).with({:Server => "myserv", :Port => "myport"}).and_return(@bucket)
|
92
92
|
bucket.bucket
|
93
93
|
end
|
94
94
|
|
95
95
|
it "should not try to guess server or port if the path is unset and no server is provided" do
|
96
96
|
Puppet.settings[:server] = "myserv"
|
97
97
|
Puppet.settings[:server_list] = ['server_list_0', 'server_list_1']
|
98
|
-
expect(Puppet::FileBucket::Dipper).to receive(:new).with(:Server => nil, :Port => nil).and_return(@bucket)
|
98
|
+
expect(Puppet::FileBucket::Dipper).to receive(:new).with({:Server => nil, :Port => nil}).and_return(@bucket)
|
99
99
|
|
100
100
|
bucket = Puppet::Type.type(:filebucket).new :name => "main", :path => false
|
101
101
|
bucket.bucket
|