puppet 7.23.0-universal-darwin → 7.25.0-universal-darwin
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CODEOWNERS +5 -5
- data/Gemfile +2 -2
- data/Gemfile.lock +50 -47
- data/ext/project_data.yaml +1 -1
- data/lib/puppet/application/face_base.rb +2 -1
- data/lib/puppet/defaults.rb +22 -0
- data/lib/puppet/environments.rb +9 -0
- data/lib/puppet/functions/each.rb +11 -13
- data/lib/puppet/functions/filter.rb +5 -13
- data/lib/puppet/functions/map.rb +7 -8
- data/lib/puppet/indirector/catalog/json.rb +8 -3
- data/lib/puppet/interface/action.rb +3 -3
- data/lib/puppet/interface/documentation.rb +2 -2
- data/lib/puppet/interface/option.rb +3 -4
- data/lib/puppet/module/plan.rb +1 -1
- data/lib/puppet/module/task.rb +1 -1
- data/lib/puppet/module.rb +1 -1
- data/lib/puppet/network/http/api/indirected_routes.rb +10 -4
- data/lib/puppet/node/environment.rb +38 -0
- data/lib/puppet/node.rb +2 -2
- data/lib/puppet/pops/evaluator/relationship_operator.rb +1 -1
- data/lib/puppet/pops/functions/function.rb +1 -3
- data/lib/puppet/pops/loader/dependency_loader.rb +1 -4
- data/lib/puppet/pops/loader/loader_paths.rb +1 -3
- data/lib/puppet/pops/loader/module_loaders.rb +1 -1
- data/lib/puppet/pops/loaders.rb +6 -2
- data/lib/puppet/pops/lookup/context.rb +3 -4
- data/lib/puppet/pops/lookup/hiera_config.rb +1 -1
- data/lib/puppet/resource.rb +4 -0
- data/lib/puppet/settings/base_setting.rb +3 -2
- data/lib/puppet/settings.rb +0 -1
- data/lib/puppet/thread_local.rb +1 -4
- data/lib/puppet/type/file/ctime.rb +1 -1
- data/lib/puppet/type/file/mtime.rb +1 -1
- data/lib/puppet/util/log.rb +2 -2
- data/lib/puppet/version.rb +1 -1
- data/man/man5/puppet.conf.5 +21 -2
- data/man/man8/puppet-agent.8 +1 -1
- data/man/man8/puppet-apply.8 +1 -1
- data/man/man8/puppet-catalog.8 +1 -1
- data/man/man8/puppet-config.8 +1 -1
- data/man/man8/puppet-describe.8 +1 -1
- data/man/man8/puppet-device.8 +1 -1
- data/man/man8/puppet-doc.8 +1 -1
- data/man/man8/puppet-epp.8 +1 -1
- data/man/man8/puppet-facts.8 +1 -1
- data/man/man8/puppet-filebucket.8 +1 -1
- data/man/man8/puppet-generate.8 +1 -1
- data/man/man8/puppet-help.8 +1 -1
- data/man/man8/puppet-lookup.8 +1 -1
- data/man/man8/puppet-module.8 +1 -1
- data/man/man8/puppet-node.8 +1 -1
- data/man/man8/puppet-parser.8 +1 -1
- data/man/man8/puppet-plugin.8 +1 -1
- data/man/man8/puppet-report.8 +1 -1
- data/man/man8/puppet-resource.8 +1 -1
- data/man/man8/puppet-script.8 +1 -1
- data/man/man8/puppet-ssl.8 +1 -1
- data/man/man8/puppet.8 +2 -2
- data/spec/fixtures/integration/application/module/environments/direnv/modules/nginx/README +3 -0
- data/spec/fixtures/integration/application/module/environments/direnv/modules/nginx/manifests/init.pp +17 -0
- data/spec/fixtures/integration/application/module/environments/direnv/modules/nginx/metadata.json +20 -0
- data/spec/integration/application/module_spec.rb +141 -0
- data/spec/unit/environments_spec.rb +9 -0
- data/spec/unit/network/http/api/indirected_routes_spec.rb +28 -0
- data/spec/unit/node/environment_spec.rb +41 -0
- data/spec/unit/parser/resource_spec.rb +9 -0
- data/spec/unit/type/file/ctime_spec.rb +1 -1
- data/spec/unit/type/file/mtime_spec.rb +1 -1
- metadata +9 -9
@@ -86,4 +86,145 @@ describe 'puppet module', unless: Puppet::Util::Platform.jruby? do
|
|
86
86
|
end
|
87
87
|
end
|
88
88
|
end
|
89
|
+
|
90
|
+
context 'install' do
|
91
|
+
it 'lists a module in a non-default directory environment' do
|
92
|
+
Puppet.initialize_settings(['-E', 'direnv'])
|
93
|
+
Puppet[:color] = false
|
94
|
+
Puppet[:environmentpath] = File.join(my_fixture_dir, 'environments')
|
95
|
+
|
96
|
+
expect {
|
97
|
+
app.command_line.args = ['list']
|
98
|
+
app.run
|
99
|
+
}.to exit_with(0)
|
100
|
+
.and output(Regexp.new("└── pmtacceptance-nginx".encode(Encoding.default_external), Regexp::MULTILINE)).to_stdout
|
101
|
+
end
|
102
|
+
end
|
103
|
+
|
104
|
+
context 'changes' do
|
105
|
+
let(:tmp) { tmpdir('module_changes') }
|
106
|
+
|
107
|
+
before :each do
|
108
|
+
Puppet.initialize_settings(['-E', 'direnv'])
|
109
|
+
Puppet[:color] = false
|
110
|
+
end
|
111
|
+
|
112
|
+
def use_local_fixture
|
113
|
+
Puppet[:environmentpath] = File.join(my_fixture_dir, 'environments')
|
114
|
+
end
|
115
|
+
|
116
|
+
def create_working_copy
|
117
|
+
Puppet[:environmentpath] = File.join(tmp, 'environments')
|
118
|
+
FileUtils.cp_r(File.join(my_fixture_dir, 'environments'), tmp)
|
119
|
+
end
|
120
|
+
|
121
|
+
it 'reports an error when the install path is invalid' do
|
122
|
+
use_local_fixture
|
123
|
+
|
124
|
+
pattern = Regexp.new([
|
125
|
+
%Q{.*Error: Could not find a valid module at "#{tmp}/nginx".*},
|
126
|
+
%Q{.*Error: Try 'puppet help module changes' for usage.*},
|
127
|
+
].join("\n"), Regexp::MULTILINE)
|
128
|
+
|
129
|
+
expect {
|
130
|
+
app.command_line.args = ['changes', File.join(tmp, 'nginx')]
|
131
|
+
app.run
|
132
|
+
}.to exit_with(1)
|
133
|
+
.and output(pattern).to_stderr
|
134
|
+
end
|
135
|
+
|
136
|
+
it 'reports when checksums are missing from metadata.json' do
|
137
|
+
create_working_copy
|
138
|
+
|
139
|
+
# overwrite checksums in metadata.json
|
140
|
+
nginx_dir = File.join(tmp, 'environments', 'direnv', 'modules', 'nginx')
|
141
|
+
File.write(File.join(nginx_dir, 'metadata.json'), <<~END)
|
142
|
+
{
|
143
|
+
"name": "pmtacceptance/nginx",
|
144
|
+
"version": "0.0.1"
|
145
|
+
}
|
146
|
+
END
|
147
|
+
|
148
|
+
pattern = Regexp.new([
|
149
|
+
%Q{.*Error: No file containing checksums found.*},
|
150
|
+
%Q{.*Error: Try 'puppet help module changes' for usage.*},
|
151
|
+
].join("\n"), Regexp::MULTILINE)
|
152
|
+
|
153
|
+
expect {
|
154
|
+
app.command_line.args = ['changes', nginx_dir]
|
155
|
+
app.run
|
156
|
+
}.to exit_with(1)
|
157
|
+
.and output(pattern).to_stderr
|
158
|
+
end
|
159
|
+
|
160
|
+
it 'reports module not found when metadata.json is missing' do
|
161
|
+
create_working_copy
|
162
|
+
|
163
|
+
# overwrite checksums in metadata.json
|
164
|
+
nginx_dir = File.join(tmp, 'environments', 'direnv', 'modules', 'nginx')
|
165
|
+
File.unlink(File.join(nginx_dir, 'metadata.json'))
|
166
|
+
|
167
|
+
pattern = Regexp.new([
|
168
|
+
%Q{.*Error: Could not find a valid module at.*},
|
169
|
+
%Q{.*Error: Try 'puppet help module changes' for usage.*},
|
170
|
+
].join("\n"), Regexp::MULTILINE)
|
171
|
+
|
172
|
+
expect {
|
173
|
+
app.command_line.args = ['changes', nginx_dir]
|
174
|
+
app.run
|
175
|
+
}.to exit_with(1)
|
176
|
+
.and output(pattern).to_stderr
|
177
|
+
end
|
178
|
+
|
179
|
+
it 'reports when a file is modified' do
|
180
|
+
create_working_copy
|
181
|
+
|
182
|
+
# overwrite README so checksum doesn't match
|
183
|
+
nginx_dir = File.join(tmp, 'environments', 'direnv', 'modules', 'nginx')
|
184
|
+
File.write(File.join(nginx_dir, 'README'), '')
|
185
|
+
|
186
|
+
pattern = Regexp.new([
|
187
|
+
%Q{.*Warning: 1 files modified.*},
|
188
|
+
].join("\n"), Regexp::MULTILINE)
|
189
|
+
|
190
|
+
expect {
|
191
|
+
app.command_line.args = ['changes', nginx_dir]
|
192
|
+
app.run
|
193
|
+
}.to exit_with(0)
|
194
|
+
.and output(%r{README}).to_stdout
|
195
|
+
.and output(pattern).to_stderr
|
196
|
+
end
|
197
|
+
|
198
|
+
it 'reports when a file is missing' do
|
199
|
+
create_working_copy
|
200
|
+
|
201
|
+
# delete README so checksum doesn't match
|
202
|
+
nginx_dir = File.join(tmp, 'environments', 'direnv', 'modules', 'nginx')
|
203
|
+
File.unlink(File.join(nginx_dir, 'README'))
|
204
|
+
|
205
|
+
# odd that it says modified
|
206
|
+
pattern = Regexp.new([
|
207
|
+
%Q{.*Warning: 1 files modified.*},
|
208
|
+
].join("\n"), Regexp::MULTILINE)
|
209
|
+
|
210
|
+
expect {
|
211
|
+
app.command_line.args = ['changes', nginx_dir]
|
212
|
+
app.run
|
213
|
+
}.to exit_with(0)
|
214
|
+
.and output(%r{README}).to_stdout
|
215
|
+
.and output(pattern).to_stderr
|
216
|
+
end
|
217
|
+
|
218
|
+
it 'reports when there are no changes' do
|
219
|
+
use_local_fixture
|
220
|
+
|
221
|
+
nginx_dir = File.join(Puppet[:environmentpath], 'direnv', 'modules', 'nginx')
|
222
|
+
|
223
|
+
expect {
|
224
|
+
app.command_line.args = ['changes', nginx_dir]
|
225
|
+
app.run
|
226
|
+
}.to exit_with(0)
|
227
|
+
.and output(/No modified files/).to_stdout
|
228
|
+
end
|
229
|
+
end
|
89
230
|
end
|
@@ -115,6 +115,15 @@ describe Puppet::Environments do
|
|
115
115
|
end
|
116
116
|
end
|
117
117
|
|
118
|
+
it "sets the environment's configured and resolved paths set when symlinked" do
|
119
|
+
loader_from(:filesystem => [directory_tree],
|
120
|
+
:directory => directory_tree.children.first) do |loader|
|
121
|
+
env = loader.get("symlinked_environment")
|
122
|
+
expect(env.resolved_path).to eq("#{FS.path_string(directory_tree)}/versioned_env")
|
123
|
+
expect(env.configured_path).to eq("#{FS.path_string(directory_tree)}/envdir/symlinked_environment")
|
124
|
+
end
|
125
|
+
end
|
126
|
+
|
118
127
|
it "ignores symlinked environments when `:versioned_environment_dirs` is false" do
|
119
128
|
Puppet[:versioned_environment_dirs] = false
|
120
129
|
loader_from(:filesystem => [directory_tree],
|
@@ -182,6 +182,7 @@ describe Puppet::Network::HTTP::API::IndirectedRoutes do
|
|
182
182
|
indirection.save(data, "my data")
|
183
183
|
request = a_request_that_finds(data, :accept_header => "application/json, text/pson")
|
184
184
|
allow(data).to receive(:to_json).and_raise(Puppet::Network::FormatHandler::FormatError, 'Could not render to Puppet::Network::Format[json]: source sequence is illegal/malformed utf-8')
|
185
|
+
expect(Puppet).to receive(:warning).with(/Failed to serialize Puppet::IndirectorTesting for 'my data': Could not render to Puppet::Network::Format\[json\]/)
|
185
186
|
|
186
187
|
handler.call(request, response)
|
187
188
|
|
@@ -209,6 +210,19 @@ describe Puppet::Network::HTTP::API::IndirectedRoutes do
|
|
209
210
|
handler.call(request, response)
|
210
211
|
}.to raise_error(not_found_error)
|
211
212
|
end
|
213
|
+
|
214
|
+
it "should raise FormatError if tries to fallback and pson serialization is not allowed" do
|
215
|
+
Puppet[:allow_pson_serialization] = false
|
216
|
+
data = Puppet::IndirectorTesting.new("my data")
|
217
|
+
indirection.save(data, "my data")
|
218
|
+
request = a_request_that_finds(data, :accept_header => "unknown, text/pson")
|
219
|
+
allow(data).to receive(:to_pson).and_raise(Puppet::Network::FormatHandler::FormatError, 'Could not render to Puppet::Network::Format[pson]: source sequence is illegal/malformed utf-8')
|
220
|
+
|
221
|
+
expect {
|
222
|
+
handler.call(request, response)
|
223
|
+
}.to raise_error(Puppet::Network::FormatHandler::FormatError,
|
224
|
+
%r{Failed to serialize Puppet::IndirectorTesting for 'my data': Could not render to Puppet::Network::Format\[pson\]})
|
225
|
+
end
|
212
226
|
end
|
213
227
|
|
214
228
|
describe "when searching for model instances" do
|
@@ -228,6 +242,7 @@ describe Puppet::Network::HTTP::API::IndirectedRoutes do
|
|
228
242
|
indirection.save(data, "my data")
|
229
243
|
request = a_request_that_searches(Puppet::IndirectorTesting.new("my"), :accept_header => "application/json, text/pson")
|
230
244
|
allow(data).to receive(:to_json).and_raise(Puppet::Network::FormatHandler::FormatError, 'Could not render to Puppet::Network::Format[json]: source sequence is illegal/malformed utf-8')
|
245
|
+
expect(Puppet).to receive(:warning).with(/Failed to serialize Puppet::IndirectorTesting for 'my': Could not render_multiple to Puppet::Network::Format\[json\]/)
|
231
246
|
|
232
247
|
handler.call(request, response)
|
233
248
|
|
@@ -248,6 +263,19 @@ describe Puppet::Network::HTTP::API::IndirectedRoutes do
|
|
248
263
|
%r{No supported formats are acceptable \(Accept: application/json, text/pson\)})
|
249
264
|
end
|
250
265
|
|
266
|
+
it "raises FormatError if tries to fallback and pson serialization is not allowed" do
|
267
|
+
Puppet[:allow_pson_serialization] = false
|
268
|
+
data = Puppet::IndirectorTesting.new("my data")
|
269
|
+
indirection.save(data, "my data")
|
270
|
+
request = a_request_that_searches(Puppet::IndirectorTesting.new("my"), :accept_header => "unknown, text/pson")
|
271
|
+
allow(data).to receive(:to_pson).and_raise(Puppet::Network::FormatHandler::FormatError, 'Could not render to Puppet::Network::Format[pson]: source sequence is illegal/malformed utf-8')
|
272
|
+
|
273
|
+
expect {
|
274
|
+
handler.call(request, response)
|
275
|
+
}.to raise_error(Puppet::Network::FormatHandler::FormatError,
|
276
|
+
%r{Failed to serialize Puppet::IndirectorTesting for 'my': Could not render_multiple to Puppet::Network::Format\[pson\]})
|
277
|
+
end
|
278
|
+
|
251
279
|
it "should return [] when searching returns an empty array" do
|
252
280
|
request = a_request_that_searches(Puppet::IndirectorTesting.new("nothing"), :accept_header => "unknown, application/json")
|
253
281
|
|
@@ -40,6 +40,47 @@ describe Puppet::Node::Environment do
|
|
40
40
|
expect(e.inspect).to match(%r{<Puppet::Node::Environment:\w* @name="test" @manifest="#{File.expand_path('/manifests/path')}" @modulepath="#{File.expand_path('/modules/path')}:#{File.expand_path('/other/modules')}" >})
|
41
41
|
end
|
42
42
|
|
43
|
+
describe "externalizing filepaths" do
|
44
|
+
before(:each) do
|
45
|
+
env.resolved_path = "/opt/puppetlabs/envs/prod_123"
|
46
|
+
env.configured_path = "/etc/puppetlabs/envs/prod"
|
47
|
+
|
48
|
+
@vendored_manifest = "/opt/puppetlabs/vendored/modules/foo/manifests/init.pp"
|
49
|
+
@production_manifest = "/opt/puppetlabs/envs/prod_123/modules/foo/manifests/init.pp"
|
50
|
+
end
|
51
|
+
|
52
|
+
it "leaves paths alone if they do not match the resolved path" do
|
53
|
+
expect(env.externalize_path(@vendored_manifest)).to eq(@vendored_manifest)
|
54
|
+
end
|
55
|
+
|
56
|
+
it "leaves paths alone if resolved or configured paths are not set" do
|
57
|
+
env.resolved_path = nil
|
58
|
+
env.configured_path = nil
|
59
|
+
expect(env.externalize_path(@production_manifest)).to eq(@production_manifest)
|
60
|
+
end
|
61
|
+
|
62
|
+
it "replaces resolved paths with configured paths" do
|
63
|
+
externalized_path = env.externalize_path(@production_manifest)
|
64
|
+
expect(externalized_path).to eq("/etc/puppetlabs/envs/prod/modules/foo/manifests/init.pp")
|
65
|
+
end
|
66
|
+
|
67
|
+
it "handles nil" do
|
68
|
+
externalized_path = env.externalize_path(nil)
|
69
|
+
expect(externalized_path).to eq(nil)
|
70
|
+
end
|
71
|
+
|
72
|
+
it "appropriately handles mismatched trailing slashes" do
|
73
|
+
env.resolved_path = "/opt/puppetlabs/envs/prod_123/"
|
74
|
+
externalized_path = env.externalize_path(@production_manifest)
|
75
|
+
expect(externalized_path).to eq("/etc/puppetlabs/envs/prod/modules/foo/manifests/init.pp")
|
76
|
+
end
|
77
|
+
|
78
|
+
it "can be disabled with the `report_configured_environmentpath` setting" do
|
79
|
+
Puppet[:report_configured_environmentpath] = false
|
80
|
+
expect(env.externalize_path(@production_manifest)).to eq(@production_manifest)
|
81
|
+
end
|
82
|
+
end
|
83
|
+
|
43
84
|
describe "equality" do
|
44
85
|
it "works as a hash key" do
|
45
86
|
base = Puppet::Node::Environment.create(:first, ["modules"], "manifests")
|
@@ -108,6 +108,15 @@ describe Puppet::Parser::Resource do
|
|
108
108
|
}.to raise_error(ArgumentError, /Resources require a hash as last argument/)
|
109
109
|
end
|
110
110
|
|
111
|
+
it "should attempt to externalize filepaths via the environment" do
|
112
|
+
environment = Puppet::Node::Environment.create(:testing, [])
|
113
|
+
expect(environment).to receive(:externalize_path).at_least(:once).and_return("foo")
|
114
|
+
Puppet[:code] = "notify { 'hello': }"
|
115
|
+
catalog = Puppet::Parser::Compiler.compile(Puppet::Node.new 'anyone', environment: environment)
|
116
|
+
notify = catalog.resource('Notify[hello]')
|
117
|
+
expect(notify.file).to eq("foo")
|
118
|
+
end
|
119
|
+
|
111
120
|
it "should set the reference correctly" do
|
112
121
|
res = Puppet::Parser::Resource.new("resource", "testing", @arguments)
|
113
122
|
expect(res.ref).to eq("Resource[testing]")
|
@@ -15,7 +15,7 @@ describe Puppet::Type.type(:file).attrclass(:ctime) do
|
|
15
15
|
@resource[:audit] = [:ctime]
|
16
16
|
|
17
17
|
# this .to_resource audit behavior is magical :-(
|
18
|
-
expect(@resource.to_resource[:ctime]).to eq(Puppet::FileSystem.stat(@filename).ctime)
|
18
|
+
expect(@resource.to_resource[:ctime]).to eq(Puppet::FileSystem.stat(@filename).ctime.to_s)
|
19
19
|
end
|
20
20
|
|
21
21
|
it "should return absent if auditing an absent file" do
|
@@ -15,7 +15,7 @@ describe Puppet::Type.type(:file).attrclass(:mtime) do
|
|
15
15
|
@resource[:audit] = [:mtime]
|
16
16
|
|
17
17
|
# this .to_resource audit behavior is magical :-(
|
18
|
-
expect(@resource.to_resource[:mtime]).to eq(Puppet::FileSystem.stat(@filename).mtime)
|
18
|
+
expect(@resource.to_resource[:mtime]).to eq(Puppet::FileSystem.stat(@filename).mtime.to_s)
|
19
19
|
end
|
20
20
|
|
21
21
|
it "should return absent if auditing an absent file" do
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: puppet
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 7.
|
4
|
+
version: 7.25.0
|
5
5
|
platform: universal-darwin
|
6
6
|
authors:
|
7
7
|
- Puppet Labs
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2023-
|
11
|
+
date: 2023-06-13 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: facter
|
@@ -133,9 +133,6 @@ dependencies:
|
|
133
133
|
- - "~>"
|
134
134
|
- !ruby/object:Gem::Version
|
135
135
|
version: '1.0'
|
136
|
-
- - "<"
|
137
|
-
- !ruby/object:Gem::Version
|
138
|
-
version: 1.2.0
|
139
136
|
type: :runtime
|
140
137
|
prerelease: false
|
141
138
|
version_requirements: !ruby/object:Gem::Requirement
|
@@ -143,9 +140,6 @@ dependencies:
|
|
143
140
|
- - "~>"
|
144
141
|
- !ruby/object:Gem::Version
|
145
142
|
version: '1.0'
|
146
|
-
- - "<"
|
147
|
-
- !ruby/object:Gem::Version
|
148
|
-
version: 1.2.0
|
149
143
|
- !ruby/object:Gem::Dependency
|
150
144
|
name: deep_merge
|
151
145
|
requirement: !ruby/object:Gem::Requirement
|
@@ -1309,6 +1303,9 @@ files:
|
|
1309
1303
|
- spec/fixtures/integration/application/agent/lib/facter/agent_spec_role.rb
|
1310
1304
|
- spec/fixtures/integration/application/apply/environments/spec/modules/amod/lib/puppet/provider/applytest/applytest.rb
|
1311
1305
|
- spec/fixtures/integration/application/apply/environments/spec/modules/amod/lib/puppet/type/applytest.rb
|
1306
|
+
- spec/fixtures/integration/application/module/environments/direnv/modules/nginx/README
|
1307
|
+
- spec/fixtures/integration/application/module/environments/direnv/modules/nginx/manifests/init.pp
|
1308
|
+
- spec/fixtures/integration/application/module/environments/direnv/modules/nginx/metadata.json
|
1312
1309
|
- spec/fixtures/integration/l10n/envs/prod/modules/demo/Gemfile
|
1313
1310
|
- spec/fixtures/integration/l10n/envs/prod/modules/demo/Rakefile
|
1314
1311
|
- spec/fixtures/integration/l10n/envs/prod/modules/demo/lib/puppet/functions/l10n.rb
|
@@ -2558,7 +2555,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
2558
2555
|
- !ruby/object:Gem::Version
|
2559
2556
|
version: 1.3.1
|
2560
2557
|
requirements: []
|
2561
|
-
rubygems_version: 3.
|
2558
|
+
rubygems_version: 3.4.12
|
2562
2559
|
signing_key:
|
2563
2560
|
specification_version: 4
|
2564
2561
|
summary: Puppet, an automated configuration management tool
|
@@ -2569,6 +2566,9 @@ test_files:
|
|
2569
2566
|
- spec/fixtures/integration/application/agent/lib/facter/agent_spec_role.rb
|
2570
2567
|
- spec/fixtures/integration/application/apply/environments/spec/modules/amod/lib/puppet/provider/applytest/applytest.rb
|
2571
2568
|
- spec/fixtures/integration/application/apply/environments/spec/modules/amod/lib/puppet/type/applytest.rb
|
2569
|
+
- spec/fixtures/integration/application/module/environments/direnv/modules/nginx/README
|
2570
|
+
- spec/fixtures/integration/application/module/environments/direnv/modules/nginx/manifests/init.pp
|
2571
|
+
- spec/fixtures/integration/application/module/environments/direnv/modules/nginx/metadata.json
|
2572
2572
|
- spec/fixtures/integration/l10n/envs/prod/modules/demo/Gemfile
|
2573
2573
|
- spec/fixtures/integration/l10n/envs/prod/modules/demo/Rakefile
|
2574
2574
|
- spec/fixtures/integration/l10n/envs/prod/modules/demo/lib/puppet/functions/l10n.rb
|