puppet 7.20.0-x64-mingw32 → 7.22.0-x64-mingw32

Sign up to get free protection for your applications and to get access to all the features.
Files changed (98) hide show
  1. checksums.yaml +4 -4
  2. data/Gemfile.lock +62 -48
  3. data/Guardfile.example +1 -1
  4. data/ext/project_data.yaml +1 -1
  5. data/ext/windows/service/daemon.rb +1 -1
  6. data/lib/puppet/application/lookup.rb +5 -5
  7. data/lib/puppet/defaults.rb +14 -0
  8. data/lib/puppet/indirector/facts/facter.rb +8 -1
  9. data/lib/puppet/info_service/task_information_service.rb +10 -2
  10. data/lib/puppet/transaction/report.rb +18 -1
  11. data/lib/puppet/type/resources.rb +1 -6
  12. data/lib/puppet/type/tidy.rb +3 -2
  13. data/lib/puppet/type/user.rb +1 -3
  14. data/lib/puppet/type.rb +10 -0
  15. data/lib/puppet/version.rb +1 -1
  16. data/man/man5/puppet.conf.5 +18 -2
  17. data/man/man8/puppet-agent.8 +1 -1
  18. data/man/man8/puppet-apply.8 +1 -1
  19. data/man/man8/puppet-catalog.8 +1 -1
  20. data/man/man8/puppet-config.8 +1 -1
  21. data/man/man8/puppet-describe.8 +1 -1
  22. data/man/man8/puppet-device.8 +1 -1
  23. data/man/man8/puppet-doc.8 +1 -1
  24. data/man/man8/puppet-epp.8 +1 -1
  25. data/man/man8/puppet-facts.8 +1 -1
  26. data/man/man8/puppet-filebucket.8 +1 -1
  27. data/man/man8/puppet-generate.8 +1 -1
  28. data/man/man8/puppet-help.8 +1 -1
  29. data/man/man8/puppet-lookup.8 +1 -1
  30. data/man/man8/puppet-module.8 +1 -1
  31. data/man/man8/puppet-node.8 +1 -1
  32. data/man/man8/puppet-parser.8 +1 -1
  33. data/man/man8/puppet-plugin.8 +1 -1
  34. data/man/man8/puppet-report.8 +1 -1
  35. data/man/man8/puppet-resource.8 +1 -1
  36. data/man/man8/puppet-script.8 +1 -1
  37. data/man/man8/puppet-ssl.8 +1 -1
  38. data/man/man8/puppet.8 +2 -2
  39. data/spec/integration/application/agent_spec.rb +100 -1
  40. data/spec/integration/application/lookup_spec.rb +55 -0
  41. data/spec/unit/agent_spec.rb +1 -1
  42. data/spec/unit/application/agent_spec.rb +1 -1
  43. data/spec/unit/application/device_spec.rb +1 -1
  44. data/spec/unit/application/resource_spec.rb +1 -1
  45. data/spec/unit/confiner_spec.rb +1 -1
  46. data/spec/unit/daemon_spec.rb +1 -1
  47. data/spec/unit/file_bucket/dipper_spec.rb +1 -1
  48. data/spec/unit/file_serving/fileset_spec.rb +14 -14
  49. data/spec/unit/file_system_spec.rb +3 -1
  50. data/spec/unit/graph/simple_graph_spec.rb +1 -1
  51. data/spec/unit/http/service/compiler_spec.rb +1 -1
  52. data/spec/unit/indirector/facts/facter_spec.rb +25 -0
  53. data/spec/unit/indirector/file_server_spec.rb +5 -5
  54. data/spec/unit/indirector/indirection_spec.rb +1 -1
  55. data/spec/unit/indirector/node/plain_spec.rb +1 -1
  56. data/spec/unit/info_service_spec.rb +21 -0
  57. data/spec/unit/module_tool/tar/mini_spec.rb +1 -1
  58. data/spec/unit/network/formats_spec.rb +1 -1
  59. data/spec/unit/provider/file/posix_spec.rb +4 -4
  60. data/spec/unit/provider/ldap_spec.rb +3 -3
  61. data/spec/unit/provider/nameservice_spec.rb +15 -15
  62. data/spec/unit/provider/package/aix_spec.rb +1 -1
  63. data/spec/unit/provider/package/dpkg_spec.rb +3 -3
  64. data/spec/unit/provider/package/nim_spec.rb +2 -2
  65. data/spec/unit/provider/package/pkgutil_spec.rb +4 -4
  66. data/spec/unit/provider/parsedfile_spec.rb +4 -4
  67. data/spec/unit/provider/service/bsd_spec.rb +4 -4
  68. data/spec/unit/provider/service/debian_spec.rb +2 -2
  69. data/spec/unit/provider/service/gentoo_spec.rb +20 -20
  70. data/spec/unit/provider/service/openbsd_spec.rb +18 -18
  71. data/spec/unit/provider/service/openrc_spec.rb +19 -19
  72. data/spec/unit/provider/service/systemd_spec.rb +22 -22
  73. data/spec/unit/provider/service/upstart_spec.rb +6 -6
  74. data/spec/unit/provider/user/aix_spec.rb +1 -1
  75. data/spec/unit/provider/user/hpux_spec.rb +1 -1
  76. data/spec/unit/provider/user/openbsd_spec.rb +1 -1
  77. data/spec/unit/provider/user/useradd_spec.rb +1 -1
  78. data/spec/unit/reports/store_spec.rb +5 -1
  79. data/spec/unit/resource/type_spec.rb +2 -2
  80. data/spec/unit/ssl/base_spec.rb +1 -1
  81. data/spec/unit/ssl/certificate_request_spec.rb +1 -1
  82. data/spec/unit/ssl/certificate_spec.rb +1 -1
  83. data/spec/unit/transaction/event_manager_spec.rb +4 -4
  84. data/spec/unit/transaction/report_spec.rb +38 -1
  85. data/spec/unit/transaction_spec.rb +2 -2
  86. data/spec/unit/type/exec_spec.rb +1 -1
  87. data/spec/unit/type/file_spec.rb +4 -4
  88. data/spec/unit/type/filebucket_spec.rb +3 -3
  89. data/spec/unit/type/resources_spec.rb +14 -0
  90. data/spec/unit/type/tidy_spec.rb +27 -17
  91. data/spec/unit/util/backups_spec.rb +1 -1
  92. data/spec/unit/util/execution_spec.rb +6 -6
  93. data/spec/unit/util/filetype_spec.rb +3 -3
  94. data/spec/unit/util/network_device_spec.rb +1 -6
  95. data/spec/unit/util/resource_template_spec.rb +1 -1
  96. data/spec/unit/util/storage_spec.rb +1 -1
  97. data/spec/unit/x509/cert_provider_spec.rb +1 -1
  98. metadata +9 -3
@@ -37,13 +37,13 @@ describe 'Puppet::Type::Service::Provider::Openrc',
37
37
  describe "#start" do
38
38
  it "should use the supplied start command if specified" do
39
39
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd', :start => '/bin/foo'))
40
- expect(provider).to receive(:execute).with(['/bin/foo'], :failonfail => true, :override_locale => false, :squelch => false, :combine => true)
40
+ expect(provider).to receive(:execute).with(['/bin/foo'], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true})
41
41
  provider.start
42
42
  end
43
43
 
44
44
  it "should start the service with rc-service start otherwise" do
45
45
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd'))
46
- expect(provider).to receive(:execute).with(['/sbin/rc-service','sshd',:start], :failonfail => true, :override_locale => false, :squelch => false, :combine => true)
46
+ expect(provider).to receive(:execute).with(['/sbin/rc-service','sshd',:start], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true})
47
47
  provider.start
48
48
  end
49
49
  end
@@ -51,13 +51,13 @@ describe 'Puppet::Type::Service::Provider::Openrc',
51
51
  describe "#stop" do
52
52
  it "should use the supplied stop command if specified" do
53
53
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd', :stop => '/bin/foo'))
54
- expect(provider).to receive(:execute).with(['/bin/foo'], :failonfail => true, :override_locale => false, :squelch => false, :combine => true)
54
+ expect(provider).to receive(:execute).with(['/bin/foo'], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true})
55
55
  provider.stop
56
56
  end
57
57
 
58
58
  it "should stop the service with rc-service stop otherwise" do
59
59
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd'))
60
- expect(provider).to receive(:execute).with(['/sbin/rc-service','sshd',:stop], :failonfail => true, :override_locale => false, :squelch => false, :combine => true)
60
+ expect(provider).to receive(:execute).with(['/sbin/rc-service','sshd',:stop], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true})
61
61
  provider.stop
62
62
  end
63
63
  end
@@ -147,25 +147,25 @@ describe 'Puppet::Type::Service::Provider::Openrc',
147
147
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd', :status => '/bin/foo'))
148
148
  expect(provider).not_to receive(:execute).with(['/sbin/rc-service','sshd',:status], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
149
149
  expect(provider).to receive(:execute)
150
- .with(['/bin/foo'], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
150
+ .with(['/bin/foo'], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
151
151
  .and_return(Puppet::Util::Execution::ProcessOutput.new('', 0))
152
152
  provider.status
153
153
  end
154
154
 
155
155
  it "should return :stopped when status command returns with a non-zero exitcode" do
156
156
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd', :status => '/bin/foo'))
157
- expect(provider).not_to receive(:execute).with(['/sbin/rc-service','sshd',:status], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
157
+ expect(provider).not_to receive(:execute).with(['/sbin/rc-service','sshd',:status], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
158
158
  expect(provider).to receive(:execute)
159
- .with(['/bin/foo'], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
159
+ .with(['/bin/foo'], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
160
160
  .and_return(Puppet::Util::Execution::ProcessOutput.new('', 3))
161
161
  expect(provider.status).to eq(:stopped)
162
162
  end
163
163
 
164
164
  it "should return :running when status command returns with a zero exitcode" do
165
165
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd', :status => '/bin/foo'))
166
- expect(provider).not_to receive(:execute).with(['/sbin/rc-service','sshd',:status], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
166
+ expect(provider).not_to receive(:execute).with(['/sbin/rc-service','sshd',:status], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
167
167
  expect(provider).to receive(:execute)
168
- .with(['/bin/foo'], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
168
+ .with(['/bin/foo'], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
169
169
  .and_return(Puppet::Util::Execution::ProcessOutput.new('', 0))
170
170
  expect(provider.status).to eq(:running)
171
171
  end
@@ -174,14 +174,14 @@ describe 'Puppet::Type::Service::Provider::Openrc',
174
174
  describe "when hasstatus is false" do
175
175
  it "should return running if a pid can be found" do
176
176
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd', :hasstatus => false))
177
- expect(provider).not_to receive(:execute).with(['/sbin/rc-service','sshd',:status], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
177
+ expect(provider).not_to receive(:execute).with(['/sbin/rc-service','sshd',:status], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
178
178
  expect(provider).to receive(:getpid).and_return(1000)
179
179
  expect(provider.status).to eq(:running)
180
180
  end
181
181
 
182
182
  it "should return stopped if no pid can be found" do
183
183
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd', :hasstatus => false))
184
- expect(provider).not_to receive(:execute).with(['/sbin/rc-service','sshd',:status], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
184
+ expect(provider).not_to receive(:execute).with(['/sbin/rc-service','sshd',:status], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
185
185
  expect(provider).to receive(:getpid).and_return(nil)
186
186
  expect(provider.status).to eq(:stopped)
187
187
  end
@@ -191,7 +191,7 @@ describe 'Puppet::Type::Service::Provider::Openrc',
191
191
  it "should return running if rc-service status exits with a zero exitcode" do
192
192
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd', :hasstatus => true))
193
193
  expect(provider).to receive(:execute)
194
- .with(['/sbin/rc-service','sshd',:status], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
194
+ .with(['/sbin/rc-service','sshd',:status], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
195
195
  .and_return(Puppet::Util::Execution::ProcessOutput.new('', 0))
196
196
  expect(provider.status).to eq(:running)
197
197
  end
@@ -199,7 +199,7 @@ describe 'Puppet::Type::Service::Provider::Openrc',
199
199
  it "should return stopped if rc-service status exits with a non-zero exitcode" do
200
200
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd', :hasstatus => true))
201
201
  expect(provider).to receive(:execute)
202
- .with(['/sbin/rc-service','sshd',:status], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
202
+ .with(['/sbin/rc-service','sshd',:status], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
203
203
  .and_return(Puppet::Util::Execution::ProcessOutput.new('', 3))
204
204
  expect(provider.status).to eq(:stopped)
205
205
  end
@@ -209,22 +209,22 @@ describe 'Puppet::Type::Service::Provider::Openrc',
209
209
  describe "#restart" do
210
210
  it "should use the supplied restart command if specified" do
211
211
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd', :restart => '/bin/foo'))
212
- expect(provider).not_to receive(:execute).with(['/sbin/rc-service','sshd',:restart], :failonfail => true, :override_locale => false, :squelch => false, :combine => true)
213
- expect(provider).to receive(:execute).with(['/bin/foo'], :failonfail => true, :override_locale => false, :squelch => false, :combine => true)
212
+ expect(provider).not_to receive(:execute).with(['/sbin/rc-service','sshd',:restart], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true})
213
+ expect(provider).to receive(:execute).with(['/bin/foo'], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true})
214
214
  provider.restart
215
215
  end
216
216
 
217
217
  it "should restart the service with rc-service restart if hasrestart is true" do
218
218
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd', :hasrestart => true))
219
- expect(provider).to receive(:execute).with(['/sbin/rc-service','sshd',:restart], :failonfail => true, :override_locale => false, :squelch => false, :combine => true)
219
+ expect(provider).to receive(:execute).with(['/sbin/rc-service','sshd',:restart], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true})
220
220
  provider.restart
221
221
  end
222
222
 
223
223
  it "should restart the service with rc-service stop/start if hasrestart is false" do
224
224
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd', :hasrestart => false))
225
- expect(provider).not_to receive(:execute).with(['/sbin/rc-service','sshd',:restart], :failonfail => true, :override_locale => false, :squelch => false, :combine => true)
226
- expect(provider).to receive(:execute).with(['/sbin/rc-service','sshd',:stop], :failonfail => true, :override_locale => false, :squelch => false, :combine => true)
227
- expect(provider).to receive(:execute).with(['/sbin/rc-service','sshd',:start], :failonfail => true, :override_locale => false, :squelch => false, :combine => true)
225
+ expect(provider).not_to receive(:execute).with(['/sbin/rc-service','sshd',:restart], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true})
226
+ expect(provider).to receive(:execute).with(['/sbin/rc-service','sshd',:stop], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true})
227
+ expect(provider).to receive(:execute).with(['/sbin/rc-service','sshd',:start], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true})
228
228
  provider.restart
229
229
  end
230
230
  end
@@ -217,7 +217,7 @@ describe 'Puppet::Type::Service::Provider::Systemd',
217
217
  it "should use the supplied start command if specified" do
218
218
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service', :start => '/bin/foo'))
219
219
  expect(provider).to receive(:daemon_reload?).and_return('no')
220
- expect(provider).to receive(:execute).with(['/bin/foo'], :failonfail => true, :override_locale => false, :squelch => false, :combine => true)
220
+ expect(provider).to receive(:execute).with(['/bin/foo'], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true})
221
221
  provider.start
222
222
  end
223
223
 
@@ -249,13 +249,13 @@ Jun 14 21:43:23 foo.example.com systemd[1]: sshd.service lacks both ExecStart= a
249
249
  describe "#stop" do
250
250
  it "should use the supplied stop command if specified" do
251
251
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service', :stop => '/bin/foo'))
252
- expect(provider).to receive(:execute).with(['/bin/foo'], :failonfail => true, :override_locale => false, :squelch => false, :combine => true)
252
+ expect(provider).to receive(:execute).with(['/bin/foo'], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true})
253
253
  provider.stop
254
254
  end
255
255
 
256
256
  it "should stop the service with systemctl stop otherwise" do
257
257
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service'))
258
- expect(provider).to receive(:execute).with(['/bin/systemctl','stop', '--', 'sshd.service'], :failonfail => true, :override_locale => false, :squelch => false, :combine => true)
258
+ expect(provider).to receive(:execute).with(['/bin/systemctl','stop', '--', 'sshd.service'], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true})
259
259
  provider.stop
260
260
  end
261
261
 
@@ -277,13 +277,13 @@ Jun 14 21:43:23 foo.example.com systemd[1]: sshd.service lacks both ExecStart= a
277
277
  describe "#daemon_reload?" do
278
278
  it "should skip the systemctl daemon_reload if not required by the service" do
279
279
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service'))
280
- expect(provider).to receive(:execute).with(['/bin/systemctl', 'show', '--property=NeedDaemonReload', '--', 'sshd.service'], :failonfail => false).and_return("no")
280
+ expect(provider).to receive(:execute).with(['/bin/systemctl', 'show', '--property=NeedDaemonReload', '--', 'sshd.service'], {:failonfail => false}).and_return("no")
281
281
  provider.daemon_reload?
282
282
  end
283
283
  it "should run a systemctl daemon_reload if the service has been modified" do
284
284
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service'))
285
- expect(provider).to receive(:execute).with(['/bin/systemctl', 'show', '--property=NeedDaemonReload', '--', 'sshd.service'], :failonfail => false).and_return("yes")
286
- expect(provider).to receive(:execute).with(['/bin/systemctl', 'daemon-reload'], :failonfail => false)
285
+ expect(provider).to receive(:execute).with(['/bin/systemctl', 'show', '--property=NeedDaemonReload', '--', 'sshd.service'], {:failonfail => false}).and_return("yes")
286
+ expect(provider).to receive(:execute).with(['/bin/systemctl', 'daemon-reload'], {:failonfail => false})
287
287
  provider.daemon_reload?
288
288
  end
289
289
  end
@@ -291,51 +291,51 @@ Jun 14 21:43:23 foo.example.com systemd[1]: sshd.service lacks both ExecStart= a
291
291
  describe "#enabled?" do
292
292
  it "should return :true if the service is enabled" do
293
293
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service'))
294
- expect(provider).to receive(:execute).with(['/bin/systemctl','is-enabled', '--', 'sshd.service'], :failonfail => false).
294
+ expect(provider).to receive(:execute).with(['/bin/systemctl','is-enabled', '--', 'sshd.service'], {:failonfail => false}).
295
295
  and_return(Puppet::Util::Execution::ProcessOutput.new("enabled\n", 0))
296
296
  expect(provider.enabled?).to eq(:true)
297
297
  end
298
298
 
299
299
  it "should return :true if the service is static" do
300
300
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service'))
301
- expect(provider).to receive(:execute).with(['/bin/systemctl','is-enabled','--', 'sshd.service'], :failonfail => false).
301
+ expect(provider).to receive(:execute).with(['/bin/systemctl','is-enabled','--', 'sshd.service'], {:failonfail => false}).
302
302
  and_return(Puppet::Util::Execution::ProcessOutput.new("static\n", 0))
303
303
  expect(provider.enabled?).to eq(:true)
304
304
  end
305
305
 
306
306
  it "should return :false if the service is disabled" do
307
307
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service'))
308
- expect(provider).to receive(:execute).with(['/bin/systemctl','is-enabled', '--', 'sshd.service'], :failonfail => false).
308
+ expect(provider).to receive(:execute).with(['/bin/systemctl','is-enabled', '--', 'sshd.service'], {:failonfail => false}).
309
309
  and_return(Puppet::Util::Execution::ProcessOutput.new("disabled\n", 1))
310
310
  expect(provider.enabled?).to eq(:false)
311
311
  end
312
312
 
313
313
  it "should return :false if the service is indirect" do
314
314
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service'))
315
- expect(provider).to receive(:execute).with(['/bin/systemctl','is-enabled', '--', 'sshd.service'], :failonfail => false).
315
+ expect(provider).to receive(:execute).with(['/bin/systemctl','is-enabled', '--', 'sshd.service'], {:failonfail => false}).
316
316
  and_return(Puppet::Util::Execution::ProcessOutput.new("indirect\n", 0))
317
317
  expect(provider.enabled?).to eq(:false)
318
318
  end
319
319
 
320
320
  it "should return :false if the service is masked and the resource is attempting to be disabled" do
321
321
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service', :enable => false))
322
- expect(provider).to receive(:execute).with(['/bin/systemctl','is-enabled', '--', 'sshd.service'], :failonfail => false).
322
+ expect(provider).to receive(:execute).with(['/bin/systemctl','is-enabled', '--', 'sshd.service'], {:failonfail => false}).
323
323
  and_return(Puppet::Util::Execution::ProcessOutput.new("masked\n", 1))
324
324
  expect(provider.enabled?).to eq(:false)
325
325
  end
326
326
 
327
327
  it "should return :mask if the service is masked and the resource is attempting to be masked" do
328
328
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service', :enable => 'mask'))
329
- expect(provider).to receive(:execute).with(['/bin/systemctl','is-enabled', '--', 'sshd.service'], :failonfail => false).
329
+ expect(provider).to receive(:execute).with(['/bin/systemctl','is-enabled', '--', 'sshd.service'], {:failonfail => false}).
330
330
  and_return(Puppet::Util::Execution::ProcessOutput.new("masked\n", 1))
331
331
  expect(provider.enabled?).to eq(:mask)
332
332
  end
333
333
 
334
334
  it "should consider nonexistent services to be disabled" do
335
335
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'doesnotexist'))
336
- expect(provider).to receive(:execute).with(['/bin/systemctl','is-enabled', '--', 'doesnotexist'], :failonfail => false)
336
+ expect(provider).to receive(:execute).with(['/bin/systemctl','is-enabled', '--', 'doesnotexist'], {:failonfail => false})
337
337
  .and_return(Puppet::Util::Execution::ProcessOutput.new("", 1))
338
- expect(provider).to receive(:execute).with(["/usr/sbin/invoke-rc.d", "--quiet", "--query", "doesnotexist", "start"], :failonfail => false)
338
+ expect(provider).to receive(:execute).with(["/usr/sbin/invoke-rc.d", "--quiet", "--query", "doesnotexist", "start"], {:failonfail => false})
339
339
  .and_return(Puppet::Util::Execution::ProcessOutput.new("", 1))
340
340
 
341
341
  expect(provider.enabled?).to be(:false)
@@ -363,7 +363,7 @@ Jun 14 21:43:23 foo.example.com systemd[1]: sshd.service lacks both ExecStart= a
363
363
  it "should run systemctl to disable and mask a service" do
364
364
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service'))
365
365
  expect(provider).to receive(:execute).
366
- with(['/bin/systemctl','cat', '--', 'sshd.service'], :failonfail => false).
366
+ with(['/bin/systemctl','cat', '--', 'sshd.service'], {:failonfail => false}).
367
367
  and_return(Puppet::Util::Execution::ProcessOutput.new("# /lib/systemd/system/sshd.service\n...", 0))
368
368
  # :disable is the only call in the provider that uses a symbol instead of
369
369
  # a string.
@@ -376,7 +376,7 @@ Jun 14 21:43:23 foo.example.com systemd[1]: sshd.service lacks both ExecStart= a
376
376
  it "masks a service that doesn't exist" do
377
377
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'doesnotexist.service'))
378
378
  expect(provider).to receive(:execute).
379
- with(['/bin/systemctl','cat', '--', 'doesnotexist.service'], :failonfail => false).
379
+ with(['/bin/systemctl','cat', '--', 'doesnotexist.service'], {:failonfail => false}).
380
380
  and_return(Puppet::Util::Execution::ProcessOutput.new("No files found for doesnotexist.service.\n", 1))
381
381
  expect(provider).to receive(:systemctl).with(:mask, '--', 'doesnotexist.service')
382
382
  provider.mask
@@ -389,7 +389,7 @@ Jun 14 21:43:23 foo.example.com systemd[1]: sshd.service lacks both ExecStart= a
389
389
  it "should return running if the command returns 0" do
390
390
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service'))
391
391
  expect(provider).to receive(:execute)
392
- .with(['/bin/systemctl','is-active', '--', 'sshd.service'], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
392
+ .with(['/bin/systemctl','is-active', '--', 'sshd.service'], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
393
393
  .and_return(Puppet::Util::Execution::ProcessOutput.new("active\n", 0))
394
394
  expect(provider.status).to eq(:running)
395
395
  end
@@ -398,7 +398,7 @@ Jun 14 21:43:23 foo.example.com systemd[1]: sshd.service lacks both ExecStart= a
398
398
  it "should return stopped if the command returns something non-0" do
399
399
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service'))
400
400
  expect(provider).to receive(:execute)
401
- .with(['/bin/systemctl','is-active', '--', 'sshd.service'], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
401
+ .with(['/bin/systemctl','is-active', '--', 'sshd.service'], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
402
402
  .and_return(Puppet::Util::Execution::ProcessOutput.new("inactive\n", ec))
403
403
  expect(provider.status).to eq(:stopped)
404
404
  end
@@ -407,7 +407,7 @@ Jun 14 21:43:23 foo.example.com systemd[1]: sshd.service lacks both ExecStart= a
407
407
  it "should use the supplied status command if specified" do
408
408
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service', :status => '/bin/foo'))
409
409
  expect(provider).to receive(:execute)
410
- .with(['/bin/foo'], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
410
+ .with(['/bin/foo'], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
411
411
  .and_return(process_output)
412
412
  provider.status
413
413
  end
@@ -419,15 +419,15 @@ Jun 14 21:43:23 foo.example.com systemd[1]: sshd.service lacks both ExecStart= a
419
419
  it "should use the supplied restart command if specified" do
420
420
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd', :restart => '/bin/foo'))
421
421
  expect(provider).to receive(:daemon_reload?).and_return('no')
422
- expect(provider).to receive(:execute).with(['/bin/systemctl','restart', '--', 'sshd.service'], :failonfail => true, :override_locale => false, :squelch => false, :combine => true).never
423
- expect(provider).to receive(:execute).with(['/bin/foo'], :failonfail => true, :override_locale => false, :squelch => false, :combine => true)
422
+ expect(provider).to receive(:execute).with(['/bin/systemctl','restart', '--', 'sshd.service'], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true}).never
423
+ expect(provider).to receive(:execute).with(['/bin/foo'], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true})
424
424
  provider.restart
425
425
  end
426
426
 
427
427
  it "should restart the service with systemctl restart" do
428
428
  provider = provider_class.new(Puppet::Type.type(:service).new(:name => 'sshd.service'))
429
429
  expect(provider).to receive(:daemon_reload?).and_return('no')
430
- expect(provider).to receive(:execute).with(['/bin/systemctl','restart','--','sshd.service'], :failonfail => true, :override_locale => false, :squelch => false, :combine => true)
430
+ expect(provider).to receive(:execute).with(['/bin/systemctl','restart','--','sshd.service'], {:failonfail => true, :override_locale => false, :squelch => false, :combine => true})
431
431
  provider.restart
432
432
  end
433
433
 
@@ -132,7 +132,7 @@ describe 'Puppet::Type::Service::Provider::Upstart',
132
132
 
133
133
  expect(provider).not_to receive(:status_exec).with(['foo'])
134
134
  expect(provider).to receive(:execute)
135
- .with(['/bin/foo'], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
135
+ .with(['/bin/foo'], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
136
136
  .and_return(process_output)
137
137
  provider.status
138
138
  end
@@ -144,7 +144,7 @@ describe 'Puppet::Type::Service::Provider::Upstart',
144
144
 
145
145
  expect(provider).not_to receive(:status_exec).with(['foo'])
146
146
  expect(provider).to receive(:execute)
147
- .with(['/bin/foo'], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
147
+ .with(['/bin/foo'], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
148
148
  .and_return(Puppet::Util::Execution::ProcessOutput.new('', 1))
149
149
  expect(provider.status).to eq(:stopped)
150
150
  end
@@ -156,7 +156,7 @@ describe 'Puppet::Type::Service::Provider::Upstart',
156
156
 
157
157
  expect(provider).not_to receive(:status_exec).with(['foo'])
158
158
  expect(provider).to receive(:execute)
159
- .with(['/bin/foo'], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
159
+ .with(['/bin/foo'], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
160
160
  .and_return(process_output)
161
161
  expect(provider.status).to eq(:running)
162
162
  end
@@ -192,7 +192,7 @@ describe 'Puppet::Type::Service::Provider::Upstart',
192
192
 
193
193
  expect(provider).not_to receive(:status_exec).with(['foo'])
194
194
  expect(provider).to receive(:execute)
195
- .with(['/bin/foo'], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
195
+ .with(['/bin/foo'], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
196
196
  .and_return(process_output)
197
197
  provider.status
198
198
  end
@@ -204,7 +204,7 @@ describe 'Puppet::Type::Service::Provider::Upstart',
204
204
 
205
205
  expect(provider).not_to receive(:status_exec).with(['foo'])
206
206
  expect(provider).to receive(:execute)
207
- .with(['/bin/foo'], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
207
+ .with(['/bin/foo'], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
208
208
  .and_return(Puppet::Util::Execution::ProcessOutput.new('', 1))
209
209
  expect(provider.status).to eq(:stopped)
210
210
  end
@@ -216,7 +216,7 @@ describe 'Puppet::Type::Service::Provider::Upstart',
216
216
 
217
217
  expect(provider).not_to receive(:status_exec).with(['foo'])
218
218
  expect(provider).to receive(:execute)
219
- .with(['/bin/foo'], :failonfail => false, :override_locale => false, :squelch => false, :combine => true)
219
+ .with(['/bin/foo'], {:failonfail => false, :override_locale => false, :squelch => false, :combine => true})
220
220
  .and_return(process_output)
221
221
  expect(provider.status).to eq(:running)
222
222
  end
@@ -165,7 +165,7 @@ describe 'Puppet::Type::User::Provider::Aix' do
165
165
  allow(mock_tempfile_obj).to receive(:path).and_return('tempfile_path')
166
166
 
167
167
  allow(Tempfile).to receive(:new)
168
- .with("puppet_#{provider.name}_pw", :encoding => Encoding::ASCII)
168
+ .with("puppet_#{provider.name}_pw", {:encoding => Encoding::ASCII})
169
169
  .and_return(mock_tempfile_obj)
170
170
 
171
171
  mock_tempfile_obj
@@ -27,7 +27,7 @@ describe Puppet::Type.type(:user).provider(:hpuxuseradd),
27
27
 
28
28
  context "managing passwords" do
29
29
  let :pwent do
30
- Struct::Passwd.new("testuser", "foopassword")
30
+ Etc::Passwd.new("testuser", "foopassword")
31
31
  end
32
32
 
33
33
  before :each do
@@ -22,7 +22,7 @@ describe Puppet::Type.type(:user).provider(:openbsd) do
22
22
 
23
23
  let(:shadow_entry) {
24
24
  return unless Puppet.features.libshadow?
25
- entry = Struct::PasswdEntry.new
25
+ entry = Etc::PasswdEntry.new
26
26
  entry[:sp_namp] = 'myuser' # login name
27
27
  entry[:sp_loginclass] = 'staff' # login class
28
28
  entry
@@ -29,7 +29,7 @@ describe Puppet::Type.type(:user).provider(:useradd) do
29
29
 
30
30
  let(:shadow_entry) {
31
31
  return unless Puppet.features.libshadow?
32
- entry = Struct::PasswdEntry.new
32
+ entry = Etc::PasswdEntry.new
33
33
  entry[:sp_namp] = 'myuser' # login name
34
34
  entry[:sp_pwdp] = '$6$FvW8Ib8h$qQMI/CR9m.QzIicZKutLpBgCBBdrch1IX0rTnxuI32K1pD9.RXZrmeKQlaC.RzODNuoUtPPIyQDufunvLOQWF0' # encrypted password
35
35
  entry[:sp_lstchg] = 15573 # date of last password change
@@ -15,7 +15,11 @@ describe Puppet::Reports.report(:store) do
15
15
  end
16
16
 
17
17
  let(:report) do
18
- report = YAML.load_file(File.join(PuppetSpec::FIXTURE_DIR, 'yaml/report2.6.x.yaml'))
18
+ if RUBY_VERSION < "3.0"
19
+ report = YAML.load_file(File.join(PuppetSpec::FIXTURE_DIR, 'yaml/report2.6.x.yaml'))
20
+ else
21
+ report = YAML.unsafe_load_file(File.join(PuppetSpec::FIXTURE_DIR, 'yaml/report2.6.x.yaml'))
22
+ end
19
23
  report.extend(described_class)
20
24
  report
21
25
  end
@@ -521,7 +521,7 @@ describe Puppet::Resource::Type do
521
521
  allow(@type).to receive(:code).and_return(code)
522
522
 
523
523
  subscope = double('subscope', :compiler => @compiler)
524
- expect(@scope).to receive(:newscope).with(:source => @type, :resource => @resource).and_return(subscope)
524
+ expect(@scope).to receive(:newscope).with({:source => @type, :resource => @resource}).and_return(subscope)
525
525
 
526
526
  expect(subscope).to receive(:with_guarded_scope).and_yield
527
527
  expect(subscope).to receive(:ephemeral_from).with(match, nil, nil).and_return(subscope)
@@ -546,7 +546,7 @@ describe Puppet::Resource::Type do
546
546
 
547
547
  it "should set all of its parameters in a subscope" do
548
548
  subscope = double('subscope', :compiler => @compiler)
549
- expect(@scope).to receive(:newscope).with(:source => @type, :resource => @resource).and_return(subscope)
549
+ expect(@scope).to receive(:newscope).with({:source => @type, :resource => @resource}).and_return(subscope)
550
550
  expect(@type).to receive(:set_resource_parameters).with(@resource, subscope)
551
551
 
552
552
  @type.evaluate_code(@resource)
@@ -46,7 +46,7 @@ describe Puppet::SSL::Certificate do
46
46
  describe "when initializing wrapped class from a file with #read" do
47
47
  it "should open the file with ASCII encoding" do
48
48
  path = '/foo/bar/cert'
49
- expect(Puppet::FileSystem).to receive(:read).with(path, :encoding => Encoding::ASCII).and_return("bar")
49
+ expect(Puppet::FileSystem).to receive(:read).with(path, {:encoding => Encoding::ASCII}).and_return("bar")
50
50
  @base.read(path)
51
51
  end
52
52
  end
@@ -45,7 +45,7 @@ describe Puppet::SSL::CertificateRequest do
45
45
 
46
46
  it "should be able to read requests from disk" do
47
47
  path = "/my/path"
48
- expect(Puppet::FileSystem).to receive(:read).with(path, :encoding => Encoding::ASCII).and_return("my request")
48
+ expect(Puppet::FileSystem).to receive(:read).with(path, {:encoding => Encoding::ASCII}).and_return("my request")
49
49
  my_req = double('request')
50
50
  expect(OpenSSL::X509::Request).to receive(:new).with("my request").and_return(my_req)
51
51
  expect(request.read(path)).to equal(my_req)
@@ -156,7 +156,7 @@ describe Puppet::SSL::Certificate do
156
156
 
157
157
  it "should be able to read certificates from disk" do
158
158
  path = "/my/path"
159
- expect(Puppet::FileSystem).to receive(:read).with(path, :encoding => Encoding::ASCII).and_return("my certificate")
159
+ expect(Puppet::FileSystem).to receive(:read).with(path, {:encoding => Encoding::ASCII}).and_return("my certificate")
160
160
  certificate = double('certificate')
161
161
  expect(OpenSSL::X509::Certificate).to receive(:new).with("my certificate").and_return(certificate)
162
162
  expect(@certificate.read(path)).to equal(certificate)
@@ -191,8 +191,8 @@ describe Puppet::Transaction::EventManager do
191
191
 
192
192
  allow(@resource).to receive(:callback1)
193
193
 
194
- expect(@resource).to receive(:event).with(:message => "Triggered 'callback1' from 1 event", :status => 'success', :name => 'callback1')
195
- expect(@resource).to receive(:event).with(:name => :restarted, :status => "success").and_return("myevent")
194
+ expect(@resource).to receive(:event).with({:message => "Triggered 'callback1' from 1 event", :status => 'success', :name => 'callback1'})
195
+ expect(@resource).to receive(:event).with({:name => :restarted, :status => "success"}).and_return("myevent")
196
196
  expect(@manager).to receive(:queue_events).with(@resource, ["myevent"])
197
197
 
198
198
  @manager.process_events(@resource)
@@ -247,7 +247,7 @@ describe Puppet::Transaction::EventManager do
247
247
 
248
248
  it "should queue a new noop event generated from the resource" do
249
249
  event = Puppet::Transaction::Event.new
250
- expect(@resource).to receive(:event).with(:status => "noop", :name => :noop_restart).and_return(event)
250
+ expect(@resource).to receive(:event).with({:status => "noop", :name => :noop_restart}).and_return(event)
251
251
  expect(@manager).to receive(:queue_events).with(@resource, [event])
252
252
 
253
253
  @manager.process_events(@resource)
@@ -277,7 +277,7 @@ describe Puppet::Transaction::EventManager do
277
277
 
278
278
  it "should queue a new noop event generated from the resource" do
279
279
  event = Puppet::Transaction::Event.new
280
- expect(@resource).to receive(:event).with(:status => "noop", :name => :noop_restart).and_return(event)
280
+ expect(@resource).to receive(:event).with({:status => "noop", :name => :noop_restart}).and_return(event)
281
281
  expect(@manager).to receive(:queue_events).with(@resource, [event])
282
282
 
283
283
  @manager.process_events(@resource)
@@ -1,5 +1,5 @@
1
1
  require 'spec_helper'
2
-
2
+ require 'puppet_spec/compiler'
3
3
  require 'puppet'
4
4
  require 'puppet/transaction/report'
5
5
  require 'matchers/json'
@@ -7,6 +7,7 @@ require 'matchers/json'
7
7
  describe Puppet::Transaction::Report do
8
8
  include JSONMatchers
9
9
  include PuppetSpec::Files
10
+ include PuppetSpec::Compiler
10
11
 
11
12
  before do
12
13
  allow(Puppet::Util::Storage).to receive(:store)
@@ -136,6 +137,42 @@ describe Puppet::Transaction::Report do
136
137
  expect(report.metrics['time'].values.any? {|metric| metric.first =~ /whit/i}).to be_falsey
137
138
  end
138
139
 
140
+ describe "when exclude_unchanged_resources is true" do
141
+ before do
142
+ Puppet[:exclude_unchanged_resources] = true
143
+ end
144
+
145
+ let(:test_dir) { tmpdir('unchanged_resources') }
146
+ let(:test_dir2) { tmpdir('unchanged_resources') }
147
+ let(:test_file) { tmpfile('some_path')}
148
+ it 'should still list "changed" resource statuses but remove "unchanged"' do
149
+ transaction = apply_compiled_manifest(<<-END)
150
+ notify { "hi": } ~>
151
+ exec { "/bin/this_command_does_not_exist":
152
+ command => "#{make_absolute('/bin/this_command_does_not_exist')}",
153
+ refreshonly => true,
154
+ }
155
+ file { '#{test_dir}':
156
+ ensure => directory
157
+ }
158
+ file { 'failing_file':
159
+ path => '#{test_dir2}',
160
+ ensure => file
161
+ }
162
+ file { 'skipped_file':
163
+ path => '#{test_file}',
164
+ require => File[failing_file]
165
+ }
166
+ END
167
+ rs = transaction.report.to_data_hash['resource_statuses']
168
+ expect(rs["Notify[hi]"]['out_of_sync']).to be true
169
+ expect(rs["Exec[/bin/this_command_does_not_exist]"]['failed_to_restart']).to be true
170
+ expect(rs["File[failing_file]"]['failed']).to be true
171
+ expect(rs["File[skipped_file]"]['skipped']).to be true
172
+ expect(rs).to_not have_key(["File[#{test_dir}]"])
173
+ end
174
+ end
175
+
139
176
  describe "when accepting logs" do
140
177
  before do
141
178
  @report = Puppet::Transaction::Report.new
@@ -570,7 +570,7 @@ describe Puppet::Transaction do
570
570
  end
571
571
 
572
572
  it "should match resources by name, not title" do
573
- expect(resource.provider.class).to receive(:prefetch).with("bar" => resource)
573
+ expect(resource.provider.class).to receive(:prefetch).with({"bar" => resource})
574
574
 
575
575
  transaction.prefetch_if_necessary(resource)
576
576
  end
@@ -598,7 +598,7 @@ describe Puppet::Transaction do
598
598
  catalog.add_resource other
599
599
 
600
600
  allow(resource.class).to receive(:defaultprovider).and_return(resource.provider.class)
601
- expect(resource.provider.class).to receive(:prefetch).with('bar' => resource, 'other' => other)
601
+ expect(resource.provider.class).to receive(:prefetch).with({'bar' => resource, 'other' => other})
602
602
 
603
603
  transaction.prefetch_if_necessary(resource)
604
604
  end
@@ -295,7 +295,7 @@ RSpec.describe Puppet::Type.type(:exec) do
295
295
 
296
296
  it "accepts the current user" do
297
297
  allow(Puppet.features).to receive(:root?).and_return(false)
298
- allow(Etc).to receive(:getpwuid).and_return(Struct::Passwd.new('input'))
298
+ allow(Etc).to receive(:getpwuid).and_return(Etc::Passwd.new('input'))
299
299
 
300
300
  type = Puppet::Type.type(:exec).new(:name => '/bin/true whatever', :user => 'input')
301
301
 
@@ -516,8 +516,8 @@ describe Puppet::Type.type(:file) do
516
516
  it "should pass the already-discovered resources to recurse_remote" do
517
517
  file[:source] = File.expand_path(__FILE__)
518
518
  allow(child).to receive(:[]).with(:path).and_return(name)
519
- allow(file).to receive(:recurse_local).and_return(name => child)
520
- expect(file).to receive(:recurse_remote).with(name => child).and_return([])
519
+ allow(file).to receive(:recurse_local).and_return({name => child})
520
+ expect(file).to receive(:recurse_remote).with({name => child}).and_return([])
521
521
  file.recurse
522
522
  end
523
523
  end
@@ -526,8 +526,8 @@ describe Puppet::Type.type(:file) do
526
526
  it "should use recurse_link" do
527
527
  file[:target] = File.expand_path(__FILE__)
528
528
  allow(child).to receive(:[]).with(:path).and_return(name)
529
- allow(file).to receive(:recurse_local).and_return(name => child)
530
- expect(file).to receive(:recurse_link).with(name => child).and_return([])
529
+ allow(file).to receive(:recurse_local).and_return({name => child})
530
+ expect(file).to receive(:recurse_link).with({name => child}).and_return([])
531
531
  file.recurse
532
532
  end
533
533
  end
@@ -82,20 +82,20 @@ describe Puppet::Type.type(:filebucket) do
82
82
  it "should use any provided path" do
83
83
  path = make_absolute("/foo/bar")
84
84
  bucket = Puppet::Type.type(:filebucket).new :name => "main", :path => path
85
- expect(Puppet::FileBucket::Dipper).to receive(:new).with(:Path => path).and_return(@bucket)
85
+ expect(Puppet::FileBucket::Dipper).to receive(:new).with({:Path => path}).and_return(@bucket)
86
86
  bucket.bucket
87
87
  end
88
88
 
89
89
  it "should use any provided server and port" do
90
90
  bucket = Puppet::Type.type(:filebucket).new :name => "main", :server => "myserv", :port => "myport", :path => false
91
- expect(Puppet::FileBucket::Dipper).to receive(:new).with(:Server => "myserv", :Port => "myport").and_return(@bucket)
91
+ expect(Puppet::FileBucket::Dipper).to receive(:new).with({:Server => "myserv", :Port => "myport"}).and_return(@bucket)
92
92
  bucket.bucket
93
93
  end
94
94
 
95
95
  it "should not try to guess server or port if the path is unset and no server is provided" do
96
96
  Puppet.settings[:server] = "myserv"
97
97
  Puppet.settings[:server_list] = ['server_list_0', 'server_list_1']
98
- expect(Puppet::FileBucket::Dipper).to receive(:new).with(:Server => nil, :Port => nil).and_return(@bucket)
98
+ expect(Puppet::FileBucket::Dipper).to receive(:new).with({:Server => nil, :Port => nil}).and_return(@bucket)
99
99
 
100
100
  bucket = Puppet::Type.type(:filebucket).new :name => "main", :path => false
101
101
  bucket.bucket