puppet 8.1.0-universal-darwin → 8.3.0-universal-darwin
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/Gemfile +1 -1
- data/Gemfile.lock +30 -30
- data/ext/project_data.yaml +2 -2
- data/lib/puppet/application/doc.rb +1 -1
- data/lib/puppet/application/ssl.rb +42 -7
- data/lib/puppet/application.rb +5 -1
- data/lib/puppet/defaults.rb +17 -5
- data/lib/puppet/face/config.rb +1 -1
- data/lib/puppet/face/epp.rb +2 -2
- data/lib/puppet/face/module/list.rb +2 -2
- data/lib/puppet/face/parser.rb +1 -1
- data/lib/puppet/functions/split.rb +28 -1
- data/lib/puppet/http/client.rb +12 -5
- data/lib/puppet/http/service/ca.rb +25 -0
- data/lib/puppet/indirector/facts/facter.rb +1 -1
- data/lib/puppet/indirector/file_bucket_file/file.rb +1 -1
- data/lib/puppet/indirector/indirection.rb +1 -1
- data/lib/puppet/info_service/task_information_service.rb +1 -1
- data/lib/puppet/module_tool.rb +1 -1
- data/lib/puppet/network/formats.rb +3 -3
- data/lib/puppet/network/http/memory_response.rb +1 -1
- data/lib/puppet/node/environment.rb +6 -4
- data/lib/puppet/parameter/value_collection.rb +1 -1
- data/lib/puppet/parser/files.rb +4 -3
- data/lib/puppet/parser/functions.rb +1 -1
- data/lib/puppet/pops/evaluator/deferred_resolver.rb +20 -3
- data/lib/puppet/pops/loader/loader_paths.rb +4 -4
- data/lib/puppet/pops/lookup/explainer.rb +1 -1
- data/lib/puppet/pops/lookup/hiera_config.rb +1 -1
- data/lib/puppet/pops/model/factory.rb +1 -1
- data/lib/puppet/pops/model/tree_dumper.rb +1 -1
- data/lib/puppet/pops/parser/epp_support.rb +1 -1
- data/lib/puppet/pops/parser/evaluating_parser.rb +1 -1
- data/lib/puppet/pops/parser/pn_parser.rb +1 -1
- data/lib/puppet/pops/pn.rb +1 -1
- data/lib/puppet/pops/serialization/json_path.rb +1 -1
- data/lib/puppet/pops/time/timespan.rb +4 -4
- data/lib/puppet/pops/types/ruby_generator.rb +2 -2
- data/lib/puppet/pops/types/string_converter.rb +6 -6
- data/lib/puppet/pops/types/type_formatter.rb +2 -2
- data/lib/puppet/pops/types/types.rb +1 -1
- data/lib/puppet/provider/nameservice/directoryservice.rb +2 -2
- data/lib/puppet/provider/package/apt.rb +1 -1
- data/lib/puppet/provider/package/dnf.rb +1 -1
- data/lib/puppet/provider/package/yum.rb +1 -1
- data/lib/puppet/provider/user/directoryservice.rb +1 -1
- data/lib/puppet/reference/configuration.rb +1 -1
- data/lib/puppet/reference/indirection.rb +1 -1
- data/lib/puppet/reports.rb +1 -1
- data/lib/puppet/ssl/oids.rb +2 -0
- data/lib/puppet/ssl/ssl_provider.rb +1 -1
- data/lib/puppet/ssl/state_machine.rb +60 -9
- data/lib/puppet/transaction/report.rb +1 -1
- data/lib/puppet/type/filebucket.rb +1 -1
- data/lib/puppet/util/diff.rb +1 -1
- data/lib/puppet/util/execution.rb +9 -4
- data/lib/puppet/util/inifile.rb +2 -2
- data/lib/puppet/util/monkey_patches.rb +18 -0
- data/lib/puppet/util/package/version/rpm.rb +1 -1
- data/lib/puppet/util/provider_features.rb +1 -1
- data/lib/puppet/util/selinux.rb +1 -1
- data/lib/puppet/util/windows/access_control_entry.rb +1 -1
- data/lib/puppet/util/windows/access_control_list.rb +1 -1
- data/lib/puppet/util/windows/adsi.rb +9 -2
- data/lib/puppet/util/windows/error.rb +1 -1
- data/lib/puppet/util/windows/file.rb +2 -2
- data/lib/puppet/util/windows/process.rb +1 -1
- data/lib/puppet/util/windows/sid.rb +4 -2
- data/lib/puppet/util.rb +2 -3
- data/lib/puppet/version.rb +1 -1
- data/lib/puppet/x509/cert_provider.rb +13 -2
- data/locales/puppet.pot +106 -74
- data/man/man5/puppet.conf.5 +16 -2
- data/man/man8/puppet-agent.8 +1 -1
- data/man/man8/puppet-apply.8 +1 -1
- data/man/man8/puppet-catalog.8 +1 -1
- data/man/man8/puppet-config.8 +1 -1
- data/man/man8/puppet-describe.8 +1 -1
- data/man/man8/puppet-device.8 +1 -1
- data/man/man8/puppet-doc.8 +1 -1
- data/man/man8/puppet-epp.8 +1 -1
- data/man/man8/puppet-facts.8 +1 -1
- data/man/man8/puppet-filebucket.8 +1 -1
- data/man/man8/puppet-generate.8 +1 -1
- data/man/man8/puppet-help.8 +1 -1
- data/man/man8/puppet-lookup.8 +1 -1
- data/man/man8/puppet-module.8 +1 -1
- data/man/man8/puppet-node.8 +1 -1
- data/man/man8/puppet-parser.8 +1 -1
- data/man/man8/puppet-plugin.8 +1 -1
- data/man/man8/puppet-report.8 +1 -1
- data/man/man8/puppet-resource.8 +1 -1
- data/man/man8/puppet-script.8 +1 -1
- data/man/man8/puppet-ssl.8 +5 -1
- data/man/man8/puppet.8 +2 -2
- data/spec/fixtures/ssl/127.0.0.1-key.pem +107 -107
- data/spec/fixtures/ssl/127.0.0.1.pem +52 -51
- data/spec/fixtures/ssl/bad-basic-constraints.pem +56 -56
- data/spec/fixtures/ssl/bad-int-basic-constraints.pem +53 -53
- data/spec/fixtures/ssl/ca.pem +54 -54
- data/spec/fixtures/ssl/crl.pem +26 -26
- data/spec/fixtures/ssl/ec-key.pem +11 -11
- data/spec/fixtures/ssl/ec.pem +33 -32
- data/spec/fixtures/ssl/encrypted-ec-key.pem +12 -12
- data/spec/fixtures/ssl/encrypted-key.pem +108 -108
- data/spec/fixtures/ssl/intermediate-agent-crl.pem +26 -26
- data/spec/fixtures/ssl/intermediate-agent.pem +56 -56
- data/spec/fixtures/ssl/intermediate-crl.pem +29 -29
- data/spec/fixtures/ssl/intermediate.pem +53 -53
- data/spec/fixtures/ssl/oid-key.pem +107 -107
- data/spec/fixtures/ssl/oid.pem +51 -50
- data/spec/fixtures/ssl/pluto-key.pem +107 -107
- data/spec/fixtures/ssl/pluto.pem +52 -51
- data/spec/fixtures/ssl/renewed.pem +67 -0
- data/spec/fixtures/ssl/request-key.pem +107 -107
- data/spec/fixtures/ssl/request.pem +50 -48
- data/spec/fixtures/ssl/revoked-key.pem +107 -107
- data/spec/fixtures/ssl/revoked.pem +51 -50
- data/spec/fixtures/ssl/signed-key.pem +107 -107
- data/spec/fixtures/ssl/signed.pem +49 -48
- data/spec/fixtures/ssl/tampered-cert.pem +51 -50
- data/spec/fixtures/ssl/tampered-csr.pem +50 -48
- data/spec/fixtures/ssl/unknown-127.0.0.1-key.pem +107 -107
- data/spec/fixtures/ssl/unknown-127.0.0.1.pem +50 -49
- data/spec/fixtures/ssl/unknown-ca-key.pem +107 -107
- data/spec/fixtures/ssl/unknown-ca.pem +54 -54
- data/spec/integration/application/agent_spec.rb +27 -27
- data/spec/integration/application/apply_spec.rb +14 -0
- data/spec/integration/http/client_spec.rb +16 -0
- data/spec/integration/type/exec_spec.rb +13 -0
- data/spec/lib/puppet/test_ca.rb +3 -10
- data/spec/lib/puppet_spec/verbose.rb +10 -1
- data/spec/unit/agent_spec.rb +2 -9
- data/spec/unit/application/ssl_spec.rb +49 -0
- data/spec/unit/defaults_spec.rb +2 -40
- data/spec/unit/file_system/path_pattern_spec.rb +15 -0
- data/spec/unit/functions/split_spec.rb +6 -0
- data/spec/unit/http/service/ca_spec.rb +71 -0
- data/spec/unit/info_service_spec.rb +1 -1
- data/spec/unit/ssl/certificate_signer_spec.rb +17 -0
- data/spec/unit/ssl/ssl_provider_spec.rb +21 -1
- data/spec/unit/ssl/state_machine_spec.rb +75 -3
- data/spec/unit/util/execution_spec.rb +1 -0
- data/spec/unit/util/monkey_patches_spec.rb +42 -0
- data/spec/unit/util/windows/adsi_spec.rb +25 -0
- data/spec/unit/x509/cert_provider_spec.rb +23 -0
- data/tasks/generate_cert_fixtures.rake +4 -0
- metadata +7 -3
@@ -76,7 +76,7 @@ module Puppet::Util::ProviderFeatures
|
|
76
76
|
|
77
77
|
# @return [String] Returns a string with documentation covering all features.
|
78
78
|
def featuredocs
|
79
|
-
str =
|
79
|
+
str = ''.dup
|
80
80
|
@features ||= {}
|
81
81
|
return nil if @features.empty?
|
82
82
|
names = @features.keys.sort_by(&:to_s)
|
data/lib/puppet/util/selinux.rb
CHANGED
@@ -227,7 +227,7 @@ module Puppet::Util::SELinux
|
|
227
227
|
|
228
228
|
# Internal helper function to read and parse /proc/mounts
|
229
229
|
def read_mounts
|
230
|
-
mounts =
|
230
|
+
mounts = ''.dup
|
231
231
|
begin
|
232
232
|
if File.method_defined? "read_nonblock"
|
233
233
|
# If possible we use read_nonblock in a loop rather than read to work-
|
@@ -176,6 +176,13 @@ module Puppet::Util::Windows::ADSI
|
|
176
176
|
sids = []
|
177
177
|
adsi_child_collection.each do |m|
|
178
178
|
sids << Puppet::Util::Windows::SID.ads_to_principal(m)
|
179
|
+
rescue Puppet::Util::Windows::Error => e
|
180
|
+
case e.code
|
181
|
+
when Puppet::Util::Windows::SID::ERROR_TRUSTED_RELATIONSHIP_FAILURE, Puppet::Util::Windows::SID::ERROR_TRUSTED_DOMAIN_FAILURE
|
182
|
+
sids << Puppet::Util::Windows::SID.unresolved_principal(m.name, m.sid)
|
183
|
+
else
|
184
|
+
raise e
|
185
|
+
end
|
179
186
|
end
|
180
187
|
|
181
188
|
sids
|
@@ -488,7 +495,7 @@ module Puppet::Util::Windows::ADSI
|
|
488
495
|
# UNLEN from lmcons.h - https://stackoverflow.com/a/2155176
|
489
496
|
MAX_USERNAME_LENGTH = 256
|
490
497
|
def self.current_user_name
|
491
|
-
user_name =
|
498
|
+
user_name = ''.dup
|
492
499
|
max_length = MAX_USERNAME_LENGTH + 1 # NULL terminated
|
493
500
|
FFI::MemoryPointer.new(max_length * 2) do |buffer| # wide string
|
494
501
|
FFI::MemoryPointer.new(:dword, 1) do |buffer_size|
|
@@ -520,7 +527,7 @@ module Puppet::Util::Windows::ADSI
|
|
520
527
|
NameSurname = 14
|
521
528
|
|
522
529
|
def self.current_user_name_with_format(format)
|
523
|
-
user_name =
|
530
|
+
user_name = ''.dup
|
524
531
|
max_length = 1024
|
525
532
|
|
526
533
|
FFI::MemoryPointer.new(:lpwstr, max_length * 2 + 1) do |buffer|
|
@@ -32,7 +32,7 @@ class Puppet::Util::Windows::Error < Puppet::Error
|
|
32
32
|
FORMAT_MESSAGE_ARGUMENT_ARRAY |
|
33
33
|
FORMAT_MESSAGE_IGNORE_INSERTS |
|
34
34
|
FORMAT_MESSAGE_MAX_WIDTH_MASK
|
35
|
-
error_string =
|
35
|
+
error_string = ''.dup
|
36
36
|
|
37
37
|
# this pointer actually points to a :lpwstr (pointer) since we're letting Windows allocate for us
|
38
38
|
FFI::MemoryPointer.new(:pointer, 1) do |buffer_ptr|
|
@@ -245,7 +245,7 @@ module Puppet::Util::Windows::File
|
|
245
245
|
module_function :readlink
|
246
246
|
|
247
247
|
def get_long_pathname(path)
|
248
|
-
converted =
|
248
|
+
converted = ''.dup
|
249
249
|
FFI::Pointer.from_string_to_wide_string(path) do |path_ptr|
|
250
250
|
# includes terminating NULL
|
251
251
|
buffer_size = GetLongPathNameW(path_ptr, FFI::Pointer::NULL, 0)
|
@@ -263,7 +263,7 @@ module Puppet::Util::Windows::File
|
|
263
263
|
module_function :get_long_pathname
|
264
264
|
|
265
265
|
def get_short_pathname(path)
|
266
|
-
converted =
|
266
|
+
converted = ''.dup
|
267
267
|
FFI::Pointer.from_string_to_wide_string(path) do |path_ptr|
|
268
268
|
# includes terminating NULL
|
269
269
|
buffer_size = GetShortPathNameW(path_ptr, FFI::Pointer::NULL, 0)
|
@@ -121,7 +121,7 @@ module Puppet::Util::Windows::Process
|
|
121
121
|
module_function :with_process_token
|
122
122
|
|
123
123
|
def get_process_image_name_by_pid(pid)
|
124
|
-
image_name =
|
124
|
+
image_name = ''.dup
|
125
125
|
|
126
126
|
Puppet::Util::Windows::Security.with_privilege(Puppet::Util::Windows::Security::SE_DEBUG_NAME) do
|
127
127
|
open_process(PROCESS_QUERY_INFORMATION, false, pid) do |phandle|
|
@@ -7,8 +7,10 @@ module Puppet::Util::Windows
|
|
7
7
|
extend FFI::Library
|
8
8
|
|
9
9
|
# missing from Windows::Error
|
10
|
-
ERROR_NONE_MAPPED
|
11
|
-
ERROR_INVALID_SID_STRUCTURE
|
10
|
+
ERROR_NONE_MAPPED = 1332
|
11
|
+
ERROR_INVALID_SID_STRUCTURE = 1337
|
12
|
+
ERROR_TRUSTED_DOMAIN_FAILURE = 1788
|
13
|
+
ERROR_TRUSTED_RELATIONSHIP_FAILURE = 1789
|
12
14
|
|
13
15
|
# Well Known SIDs
|
14
16
|
Null = 'S-1-0'
|
data/lib/puppet/util.rb
CHANGED
@@ -409,8 +409,7 @@ module Util
|
|
409
409
|
def uri_encode(path, opts = { :allow_fragment => false })
|
410
410
|
raise ArgumentError.new(_('path may not be nil')) if path.nil?
|
411
411
|
|
412
|
-
|
413
|
-
encoded = String.new.encode!(Encoding::UTF_8)
|
412
|
+
encoded = ''.dup
|
414
413
|
|
415
414
|
# parse uri into named matches, then reassemble properly encoded
|
416
415
|
parts = path.match(RFC_3986_URI_REGEX)
|
@@ -454,7 +453,7 @@ module Util
|
|
454
453
|
|
455
454
|
def rfc2396_escape(str)
|
456
455
|
str.gsub(UNSAFE) do |match|
|
457
|
-
tmp =
|
456
|
+
tmp = ''.dup
|
458
457
|
match.each_byte do |uc|
|
459
458
|
tmp << sprintf('%%%02X', uc)
|
460
459
|
end
|
data/lib/puppet/version.rb
CHANGED
@@ -311,6 +311,13 @@ class Puppet::X509::CertProvider
|
|
311
311
|
options[:extension_requests] = csr_attributes.extension_requests
|
312
312
|
end
|
313
313
|
|
314
|
+
# Adds auto-renew attribute to CSR if the agent supports auto-renewal of
|
315
|
+
# certificates
|
316
|
+
if Puppet[:hostcert_renewal_interval] && Puppet[:hostcert_renewal_interval] > 0
|
317
|
+
options[:csr_attributes] ||= {}
|
318
|
+
options[:csr_attributes].merge!({'1.3.6.1.4.1.34380.1.3.2' => 'true'})
|
319
|
+
end
|
320
|
+
|
314
321
|
csr = Puppet::SSL::CertificateRequest.new(name)
|
315
322
|
csr.generate(private_key, options)
|
316
323
|
end
|
@@ -369,13 +376,17 @@ class Puppet::X509::CertProvider
|
|
369
376
|
OpenSSL::X509::Request.new(pem)
|
370
377
|
end
|
371
378
|
|
372
|
-
|
373
|
-
|
379
|
+
# Return the path to the cert related object (key, CSR, cert, etc).
|
380
|
+
#
|
381
|
+
# @param base [String] base directory
|
382
|
+
# @param name [String] the name associated with the cert related object
|
374
383
|
def to_path(base, name)
|
375
384
|
raise _("Certname %{name} must not contain unprintable or non-ASCII characters") % { name: name.inspect } unless name =~ VALID_CERTNAME
|
376
385
|
File.join(base, "#{name.downcase}.pem")
|
377
386
|
end
|
378
387
|
|
388
|
+
private
|
389
|
+
|
379
390
|
def permissions_for_setting(name)
|
380
391
|
setting = Puppet.settings.setting(name)
|
381
392
|
perm = { mode: setting.mode.to_i(8) }
|
data/locales/puppet.pot
CHANGED
@@ -6,11 +6,11 @@
|
|
6
6
|
#, fuzzy
|
7
7
|
msgid ""
|
8
8
|
msgstr ""
|
9
|
-
"Project-Id-Version: Puppet automation framework 8.0
|
9
|
+
"Project-Id-Version: Puppet automation framework 8.2.0-29-g809d465a09\n"
|
10
10
|
"\n"
|
11
11
|
"Report-Msgid-Bugs-To: https://tickets.puppetlabs.com\n"
|
12
|
-
"POT-Creation-Date: 2023-
|
13
|
-
"PO-Revision-Date: 2023-
|
12
|
+
"POT-Creation-Date: 2023-09-21 23:07+0000\n"
|
13
|
+
"PO-Revision-Date: 2023-09-21 23:07+0000\n"
|
14
14
|
"Last-Translator: FULL NAME <EMAIL@ADDRESS>\n"
|
15
15
|
"Language-Team: LANGUAGE <LL@li.org>\n"
|
16
16
|
"Language: \n"
|
@@ -68,7 +68,7 @@ msgstr ""
|
|
68
68
|
msgid "Another puppet instance is already running; --waitforlock flag used, waiting for running instance to finish."
|
69
69
|
msgstr ""
|
70
70
|
|
71
|
-
#: ../lib/puppet/agent.rb:101 ../lib/puppet/ssl/state_machine.rb:
|
71
|
+
#: ../lib/puppet/agent.rb:101 ../lib/puppet/ssl/state_machine.rb:414 ../lib/puppet/ssl/state_machine.rb:445
|
72
72
|
msgid "Will try again in %{time} seconds."
|
73
73
|
msgstr ""
|
74
74
|
|
@@ -442,62 +442,70 @@ msgstr ""
|
|
442
442
|
msgid "Manage SSL keys and certificates for puppet SSL clients"
|
443
443
|
msgstr ""
|
444
444
|
|
445
|
-
#: ../lib/puppet/application/ssl.rb:
|
445
|
+
#: ../lib/puppet/application/ssl.rb:112
|
446
446
|
msgid "An action must be specified."
|
447
447
|
msgstr ""
|
448
448
|
|
449
|
-
#: ../lib/puppet/application/ssl.rb:
|
449
|
+
#: ../lib/puppet/application/ssl.rb:136 ../lib/puppet/application/ssl.rb:143
|
450
450
|
msgid "The certificate for '%{name}' has not yet been signed"
|
451
451
|
msgstr ""
|
452
452
|
|
453
|
-
#: ../lib/puppet/application/ssl.rb:
|
453
|
+
#: ../lib/puppet/application/ssl.rb:156
|
454
454
|
msgid "Completed SSL initialization"
|
455
455
|
msgstr ""
|
456
456
|
|
457
|
-
#: ../lib/puppet/application/ssl.rb:
|
457
|
+
#: ../lib/puppet/application/ssl.rb:160
|
458
458
|
msgid "Unknown action '%{action}'"
|
459
459
|
msgstr ""
|
460
460
|
|
461
|
-
#: ../lib/puppet/application/ssl.rb:
|
462
|
-
msgid "
|
461
|
+
#: ../lib/puppet/application/ssl.rb:181
|
462
|
+
msgid "Submitted certificate request for '%{name}' to %{url}"
|
463
463
|
msgstr ""
|
464
464
|
|
465
|
-
#: ../lib/puppet/application/ssl.rb:
|
466
|
-
msgid "
|
465
|
+
#: ../lib/puppet/application/ssl.rb:184
|
466
|
+
msgid "Could not submit certificate request for '%{name}' to %{url} due to a conflict on the server"
|
467
467
|
msgstr ""
|
468
468
|
|
469
|
-
#: ../lib/puppet/application/ssl.rb:
|
470
|
-
msgid "
|
469
|
+
#: ../lib/puppet/application/ssl.rb:186 ../lib/puppet/application/ssl.rb:189
|
470
|
+
msgid "Failed to submit certificate request: %{message}"
|
471
471
|
msgstr ""
|
472
472
|
|
473
|
-
#: ../lib/puppet/application/ssl.rb:
|
474
|
-
msgid "
|
473
|
+
#: ../lib/puppet/application/ssl.rb:201
|
474
|
+
msgid "Generated certificate request in '%{path}'"
|
475
475
|
msgstr ""
|
476
476
|
|
477
|
-
#: ../lib/puppet/application/ssl.rb:
|
478
|
-
msgid "Failed to
|
477
|
+
#: ../lib/puppet/application/ssl.rb:203
|
478
|
+
msgid "Failed to generate certificate request: %{message}"
|
479
479
|
msgstr ""
|
480
480
|
|
481
|
-
#: ../lib/puppet/application/ssl.rb:
|
481
|
+
#: ../lib/puppet/application/ssl.rb:211
|
482
482
|
msgid "Downloading certificate '%{name}' from %{url}"
|
483
483
|
msgstr ""
|
484
484
|
|
485
|
-
#: ../lib/puppet/application/ssl.rb:
|
485
|
+
#: ../lib/puppet/application/ssl.rb:215
|
486
486
|
msgid "Downloaded certificate '%{name}' with fingerprint %{fingerprint}"
|
487
487
|
msgstr ""
|
488
488
|
|
489
|
-
#: ../lib/puppet/application/ssl.rb:
|
489
|
+
#: ../lib/puppet/application/ssl.rb:228 ../lib/puppet/application/ssl.rb:231
|
490
490
|
msgid "Failed to download certificate: %{message}"
|
491
491
|
msgstr ""
|
492
492
|
|
493
|
-
#: ../lib/puppet/application/ssl.rb:
|
493
|
+
#: ../lib/puppet/application/ssl.rb:260 ../lib/puppet/application/ssl.rb:263
|
494
494
|
msgid "Failed to connect to the CA to determine if certificate %{certname} has been cleaned"
|
495
495
|
msgstr ""
|
496
496
|
|
497
|
-
#: ../lib/puppet/application/ssl.rb:
|
497
|
+
#: ../lib/puppet/application/ssl.rb:290
|
498
498
|
msgid "Removed %{label} %{path}"
|
499
499
|
msgstr ""
|
500
500
|
|
501
|
+
#: ../lib/puppet/application/ssl.rb:307 ../lib/puppet/ssl/state_machine.rb:273
|
502
|
+
msgid "Creating a new EC SSL key for %{name} using curve %{curve}"
|
503
|
+
msgstr ""
|
504
|
+
|
505
|
+
#: ../lib/puppet/application/ssl.rb:310
|
506
|
+
msgid "Creating a new SSL key for %{name}"
|
507
|
+
msgstr ""
|
508
|
+
|
501
509
|
#: ../lib/puppet/configurer.rb:22
|
502
510
|
msgid "Puppet configuration client"
|
503
511
|
msgstr ""
|
@@ -736,39 +744,39 @@ msgstr ""
|
|
736
744
|
msgid "a data type can only have one implementation"
|
737
745
|
msgstr ""
|
738
746
|
|
739
|
-
#: ../lib/puppet/defaults.rb:
|
747
|
+
#: ../lib/puppet/defaults.rb:169
|
740
748
|
msgid "Cannot disable unrecognized warning types '%{invalid}'."
|
741
749
|
msgstr ""
|
742
750
|
|
743
|
-
#: ../lib/puppet/defaults.rb:
|
751
|
+
#: ../lib/puppet/defaults.rb:170
|
744
752
|
msgid "Valid values are '%{values}'."
|
745
753
|
msgstr ""
|
746
754
|
|
747
755
|
#. TRANSLATORS 'data_binding_terminus' is a setting and should not be translated
|
748
|
-
#: ../lib/puppet/defaults.rb:
|
756
|
+
#: ../lib/puppet/defaults.rb:561
|
749
757
|
msgid "Setting 'data_binding_terminus' is deprecated."
|
750
758
|
msgstr ""
|
751
759
|
|
752
760
|
#. TRANSLATORS 'hiera' should not be translated
|
753
|
-
#: ../lib/puppet/defaults.rb:
|
761
|
+
#: ../lib/puppet/defaults.rb:563
|
754
762
|
msgid "Convert custom terminus to hiera 5 API."
|
755
763
|
msgstr ""
|
756
764
|
|
757
765
|
#. TRANSLATORS 'environment_data_provider' is a setting and should not be translated
|
758
|
-
#: ../lib/puppet/defaults.rb:
|
766
|
+
#: ../lib/puppet/defaults.rb:757
|
759
767
|
msgid "Setting 'environment_data_provider' is deprecated."
|
760
768
|
msgstr ""
|
761
769
|
|
762
|
-
#: ../lib/puppet/defaults.rb:
|
770
|
+
#: ../lib/puppet/defaults.rb:848
|
763
771
|
msgid "Certificate names must be lower case"
|
764
772
|
msgstr ""
|
765
773
|
|
766
|
-
#: ../lib/puppet/defaults.rb:
|
774
|
+
#: ../lib/puppet/defaults.rb:1107 ../lib/puppet/settings/enum_setting.rb:14 ../lib/puppet/settings/symbolic_enum_setting.rb:15
|
767
775
|
msgid "Invalid value '%{value}' for parameter %{name}. Allowed values are '%{allowed_values}'"
|
768
776
|
msgstr ""
|
769
777
|
|
770
778
|
#. TRANSLATORS 'pluginsync' is a setting and should not be translated
|
771
|
-
#: ../lib/puppet/defaults.rb:
|
779
|
+
#: ../lib/puppet/defaults.rb:2041
|
772
780
|
msgid "Setting 'pluginsync' is deprecated."
|
773
781
|
msgstr ""
|
774
782
|
|
@@ -1752,7 +1760,7 @@ msgstr ""
|
|
1752
1760
|
msgid "Timeout waiting for exclusive lock on %{path}"
|
1753
1761
|
msgstr ""
|
1754
1762
|
|
1755
|
-
#: ../lib/puppet/file_system/jruby.rb:19 ../lib/puppet/file_system/windows.rb:128 ../lib/puppet/util.rb:
|
1763
|
+
#: ../lib/puppet/file_system/jruby.rb:19 ../lib/puppet/file_system/windows.rb:128 ../lib/puppet/util.rb:671
|
1756
1764
|
msgid "Is a directory: %{directory}"
|
1757
1765
|
msgstr ""
|
1758
1766
|
|
@@ -2226,11 +2234,11 @@ msgstr ""
|
|
2226
2234
|
msgid "Run `puppet agent -t`"
|
2227
2235
|
msgstr ""
|
2228
2236
|
|
2229
|
-
#: ../lib/puppet/http/client.rb:
|
2237
|
+
#: ../lib/puppet/http/client.rb:390
|
2230
2238
|
msgid "Sleeping for %{interval} seconds before retrying the request"
|
2231
2239
|
msgstr ""
|
2232
2240
|
|
2233
|
-
#: ../lib/puppet/http/client.rb:
|
2241
|
+
#: ../lib/puppet/http/client.rb:445
|
2234
2242
|
msgid "HTTP REST queries cannot handle values of type '%{klass}'"
|
2235
2243
|
msgstr ""
|
2236
2244
|
|
@@ -2274,6 +2282,10 @@ msgstr ""
|
|
2274
2282
|
msgid "No content type in http response; cannot parse"
|
2275
2283
|
msgstr ""
|
2276
2284
|
|
2285
|
+
#: ../lib/puppet/http/service/ca.rb:126
|
2286
|
+
msgid "SSL context must contain a client certificate."
|
2287
|
+
msgstr ""
|
2288
|
+
|
2277
2289
|
#: ../lib/puppet/indirector.rb:26
|
2278
2290
|
msgid "Indirection %{indirection_name} does not exist"
|
2279
2291
|
msgstr ""
|
@@ -3883,7 +3895,7 @@ msgstr ""
|
|
3883
3895
|
msgid "The 'disable_per_environment_manifest' setting is true, and the '%{env_name}' environment has an environment.conf manifest that conflicts with the 'default_manifest' setting."
|
3884
3896
|
msgstr ""
|
3885
3897
|
|
3886
|
-
#: ../lib/puppet/node/environment.rb:
|
3898
|
+
#: ../lib/puppet/node/environment.rb:615 ../lib/puppet/pops/loaders.rb:306
|
3887
3899
|
msgid "Could not parse for environment %{env}: %{detail}"
|
3888
3900
|
msgstr ""
|
3889
3901
|
|
@@ -7331,7 +7343,7 @@ msgstr ""
|
|
7331
7343
|
msgid "%{name} has not declared what class it wraps"
|
7332
7344
|
msgstr ""
|
7333
7345
|
|
7334
|
-
#: ../lib/puppet/ssl/base.rb:32 ../lib/puppet/x509/cert_provider.rb:
|
7346
|
+
#: ../lib/puppet/ssl/base.rb:32 ../lib/puppet/x509/cert_provider.rb:384
|
7335
7347
|
msgid "Certname %{name} must not contain unprintable or non-ASCII characters"
|
7336
7348
|
msgstr ""
|
7337
7349
|
|
@@ -7431,23 +7443,23 @@ msgstr ""
|
|
7431
7443
|
msgid "Server hostname '%{host}' did not match server certificate; %{expected_certnames}"
|
7432
7444
|
msgstr ""
|
7433
7445
|
|
7434
|
-
#: ../lib/puppet/ssl/oids.rb:
|
7446
|
+
#: ../lib/puppet/ssl/oids.rb:115
|
7435
7447
|
msgid "Error loading ssl custom OIDs mapping file from '%{custom_oid_file}': %{err}"
|
7436
7448
|
msgstr ""
|
7437
7449
|
|
7438
|
-
#: ../lib/puppet/ssl/oids.rb:
|
7450
|
+
#: ../lib/puppet/ssl/oids.rb:119
|
7439
7451
|
msgid "Error loading ssl custom OIDs mapping file from '%{custom_oid_file}': no such index '%{map_key}'"
|
7440
7452
|
msgstr ""
|
7441
7453
|
|
7442
|
-
#: ../lib/puppet/ssl/oids.rb:
|
7454
|
+
#: ../lib/puppet/ssl/oids.rb:123
|
7443
7455
|
msgid "Error loading ssl custom OIDs mapping file from '%{custom_oid_file}': data under index '%{map_key}' must be a Hash"
|
7444
7456
|
msgstr ""
|
7445
7457
|
|
7446
|
-
#: ../lib/puppet/ssl/oids.rb:
|
7458
|
+
#: ../lib/puppet/ssl/oids.rb:130
|
7447
7459
|
msgid "Error loading ssl custom OIDs mapping file from '%{custom_oid_file}': incomplete definition of oid '%{oid}'"
|
7448
7460
|
msgstr ""
|
7449
7461
|
|
7450
|
-
#: ../lib/puppet/ssl/oids.rb:
|
7462
|
+
#: ../lib/puppet/ssl/oids.rb:162
|
7451
7463
|
msgid "Error registering ssl custom OIDs mapping from file '%{custom_oid_file}': %{err}"
|
7452
7464
|
msgstr ""
|
7453
7465
|
|
@@ -7543,31 +7555,31 @@ msgstr ""
|
|
7543
7555
|
msgid "Certificate '%{subject}' failed verification (%{err}): %{err_utf8}"
|
7544
7556
|
msgstr ""
|
7545
7557
|
|
7546
|
-
#: ../lib/puppet/ssl/state_machine.rb:
|
7558
|
+
#: ../lib/puppet/ssl/state_machine.rb:74
|
7547
7559
|
msgid "Verified CA bundle with digest (%{digest_type}) %{actual_digest}"
|
7548
7560
|
msgstr ""
|
7549
7561
|
|
7550
|
-
#: ../lib/puppet/ssl/state_machine.rb:
|
7562
|
+
#: ../lib/puppet/ssl/state_machine.rb:77
|
7551
7563
|
msgid "CA bundle with digest (%{digest_type}) %{actual_digest} did not match expected digest %{expected_digest}"
|
7552
7564
|
msgstr ""
|
7553
7565
|
|
7554
|
-
#: ../lib/puppet/ssl/state_machine.rb:
|
7566
|
+
#: ../lib/puppet/ssl/state_machine.rb:93
|
7555
7567
|
msgid "CA certificate is missing from the server"
|
7556
7568
|
msgstr ""
|
7557
7569
|
|
7558
|
-
#: ../lib/puppet/ssl/state_machine.rb:
|
7570
|
+
#: ../lib/puppet/ssl/state_machine.rb:95
|
7559
7571
|
msgid "Could not download CA certificate: %{message}"
|
7560
7572
|
msgstr ""
|
7561
7573
|
|
7562
|
-
#: ../lib/puppet/ssl/state_machine.rb:
|
7574
|
+
#: ../lib/puppet/ssl/state_machine.rb:111
|
7563
7575
|
msgid "Refreshing CA certificate"
|
7564
7576
|
msgstr ""
|
7565
7577
|
|
7566
|
-
#: ../lib/puppet/ssl/state_machine.rb:
|
7578
|
+
#: ../lib/puppet/ssl/state_machine.rb:122
|
7567
7579
|
msgid "CA certificate is unmodified, using existing CA certificate"
|
7568
7580
|
msgstr ""
|
7569
7581
|
|
7570
|
-
#: ../lib/puppet/ssl/state_machine.rb:
|
7582
|
+
#: ../lib/puppet/ssl/state_machine.rb:124 ../lib/puppet/ssl/state_machine.rb:130
|
7571
7583
|
msgid "Failed to refresh CA certificate, using existing CA certificate: %{message}"
|
7572
7584
|
msgstr ""
|
7573
7585
|
|
@@ -7583,71 +7595,91 @@ msgstr ""
|
|
7583
7595
|
msgid "Refreshing CRL"
|
7584
7596
|
msgstr ""
|
7585
7597
|
|
7586
|
-
#: ../lib/puppet/ssl/state_machine.rb:
|
7598
|
+
#: ../lib/puppet/ssl/state_machine.rb:220
|
7587
7599
|
msgid "CRL is unmodified, using existing CRL"
|
7588
7600
|
msgstr ""
|
7589
7601
|
|
7590
|
-
#: ../lib/puppet/ssl/state_machine.rb:
|
7602
|
+
#: ../lib/puppet/ssl/state_machine.rb:222 ../lib/puppet/ssl/state_machine.rb:228
|
7591
7603
|
msgid "Failed to refresh CRL, using existing CRL: %{message}"
|
7592
7604
|
msgstr ""
|
7593
7605
|
|
7594
|
-
#: ../lib/puppet/ssl/state_machine.rb:
|
7606
|
+
#: ../lib/puppet/ssl/state_machine.rb:255
|
7595
7607
|
msgid "Loading/generating private key"
|
7596
7608
|
msgstr ""
|
7597
7609
|
|
7598
|
-
#: ../lib/puppet/ssl/state_machine.rb:
|
7610
|
+
#: ../lib/puppet/ssl/state_machine.rb:276
|
7599
7611
|
msgid "Creating a new RSA SSL key for %{name}"
|
7600
7612
|
msgstr ""
|
7601
7613
|
|
7602
|
-
#: ../lib/puppet/ssl/state_machine.rb:
|
7614
|
+
#: ../lib/puppet/ssl/state_machine.rb:315
|
7603
7615
|
msgid "Generating and submitting a CSR"
|
7604
7616
|
msgstr ""
|
7605
7617
|
|
7606
|
-
#: ../lib/puppet/ssl/state_machine.rb:
|
7618
|
+
#: ../lib/puppet/ssl/state_machine.rb:326
|
7607
7619
|
msgid "Failed to submit the CSR, HTTP response was %{code}"
|
7608
7620
|
msgstr ""
|
7609
7621
|
|
7610
|
-
#: ../lib/puppet/ssl/state_machine.rb:
|
7622
|
+
#: ../lib/puppet/ssl/state_machine.rb:335
|
7611
7623
|
msgid "Downloading client certificate"
|
7612
7624
|
msgstr ""
|
7613
7625
|
|
7614
|
-
#: ../lib/puppet/ssl/state_machine.rb:
|
7626
|
+
#: ../lib/puppet/ssl/state_machine.rb:341
|
7615
7627
|
msgid "Downloaded certificate for %{name} from %{url}"
|
7616
7628
|
msgstr ""
|
7617
7629
|
|
7618
|
-
#: ../lib/puppet/ssl/state_machine.rb:
|
7630
|
+
#: ../lib/puppet/ssl/state_machine.rb:352
|
7619
7631
|
msgid "Failed to parse certificate: %{message}"
|
7620
7632
|
msgstr ""
|
7621
7633
|
|
7622
|
-
#: ../lib/puppet/ssl/state_machine.rb:
|
7634
|
+
#: ../lib/puppet/ssl/state_machine.rb:355
|
7623
7635
|
msgid "Certificate for %{certname} has not been signed yet"
|
7624
7636
|
msgstr ""
|
7625
7637
|
|
7626
|
-
#: ../lib/puppet/ssl/state_machine.rb:
|
7638
|
+
#: ../lib/puppet/ssl/state_machine.rb:356
|
7627
7639
|
msgid "Couldn't fetch certificate from CA server; you might still need to sign this agent's certificate (%{name})."
|
7628
7640
|
msgstr ""
|
7629
7641
|
|
7630
|
-
#: ../lib/puppet/ssl/state_machine.rb:
|
7642
|
+
#: ../lib/puppet/ssl/state_machine.rb:359
|
7631
7643
|
msgid "Failed to retrieve certificate for %{certname}: %{message}"
|
7632
7644
|
msgstr ""
|
7633
7645
|
|
7634
|
-
#: ../lib/puppet/ssl/state_machine.rb:
|
7646
|
+
#: ../lib/puppet/ssl/state_machine.rb:369
|
7647
|
+
msgid "Renewing client certificate"
|
7648
|
+
msgstr ""
|
7649
|
+
|
7650
|
+
#: ../lib/puppet/ssl/state_machine.rb:382
|
7651
|
+
msgid "Renewed client certificate: %{cert_digest}, not before '%{not_before}', not after '%{not_after}'"
|
7652
|
+
msgstr ""
|
7653
|
+
|
7654
|
+
#: ../lib/puppet/ssl/state_machine.rb:387
|
7655
|
+
msgid "Certificate autorenewal has not been enabled on the server."
|
7656
|
+
msgstr ""
|
7657
|
+
|
7658
|
+
#: ../lib/puppet/ssl/state_machine.rb:389
|
7659
|
+
msgid "Failed to automatically renew certificate: %{code} %{reason}"
|
7660
|
+
msgstr ""
|
7661
|
+
|
7662
|
+
#: ../lib/puppet/ssl/state_machine.rb:393
|
7663
|
+
msgid "Unable to automatically renew certificate: %{message}"
|
7664
|
+
msgstr ""
|
7665
|
+
|
7666
|
+
#: ../lib/puppet/ssl/state_machine.rb:408
|
7635
7667
|
msgid "Exiting now because the waitforcert setting is set to 0."
|
7636
7668
|
msgstr ""
|
7637
7669
|
|
7638
|
-
#: ../lib/puppet/ssl/state_machine.rb:
|
7670
|
+
#: ../lib/puppet/ssl/state_machine.rb:411
|
7639
7671
|
msgid "Couldn't fetch certificate from CA server; you might still need to sign this agent's certificate (%{name}). Exiting now because the maxwaitforcert timeout has been exceeded."
|
7640
7672
|
msgstr ""
|
7641
7673
|
|
7642
|
-
#: ../lib/puppet/ssl/state_machine.rb:
|
7674
|
+
#: ../lib/puppet/ssl/state_machine.rb:440
|
7643
7675
|
msgid "Another puppet instance is already running and the waitforlock setting is set to 0; exiting"
|
7644
7676
|
msgstr ""
|
7645
7677
|
|
7646
|
-
#: ../lib/puppet/ssl/state_machine.rb:
|
7678
|
+
#: ../lib/puppet/ssl/state_machine.rb:442
|
7647
7679
|
msgid "Another puppet instance is already running and the maxwaitforlock timeout has been exceeded; exiting"
|
7648
7680
|
msgstr ""
|
7649
7681
|
|
7650
|
-
#: ../lib/puppet/ssl/state_machine.rb:
|
7682
|
+
#: ../lib/puppet/ssl/state_machine.rb:444
|
7651
7683
|
msgid "Another puppet instance is already running; waiting for it to finish"
|
7652
7684
|
msgstr ""
|
7653
7685
|
|
@@ -8444,11 +8476,11 @@ msgstr ""
|
|
8444
8476
|
msgid "path may not be nil"
|
8445
8477
|
msgstr ""
|
8446
8478
|
|
8447
|
-
#: ../lib/puppet/util.rb:
|
8479
|
+
#: ../lib/puppet/util.rb:586
|
8448
8480
|
msgid "replace_file requires a block"
|
8449
8481
|
msgstr ""
|
8450
8482
|
|
8451
|
-
#: ../lib/puppet/util.rb:
|
8483
|
+
#: ../lib/puppet/util.rb:590
|
8452
8484
|
msgid "replace_file default_mode: %{default_mode} is invalid"
|
8453
8485
|
msgstr ""
|
8454
8486
|
|
@@ -8733,19 +8765,19 @@ msgstr ""
|
|
8733
8765
|
msgid "Working directory %{cwd} does not exist!"
|
8734
8766
|
msgstr ""
|
8735
8767
|
|
8736
|
-
#: ../lib/puppet/util/execution.rb:
|
8768
|
+
#: ../lib/puppet/util/execution.rb:283
|
8737
8769
|
msgid "Could not get output"
|
8738
8770
|
msgstr ""
|
8739
8771
|
|
8740
|
-
#: ../lib/puppet/util/execution.rb:
|
8772
|
+
#: ../lib/puppet/util/execution.rb:292
|
8741
8773
|
msgid "Execution of '%{str}' returned %{exit_status}: %{output}"
|
8742
8774
|
msgstr ""
|
8743
8775
|
|
8744
|
-
#: ../lib/puppet/util/execution.rb:
|
8776
|
+
#: ../lib/puppet/util/execution.rb:369
|
8745
8777
|
msgid "Could not execute posix command: %{detail}"
|
8746
8778
|
msgstr ""
|
8747
8779
|
|
8748
|
-
#: ../lib/puppet/util/execution.rb:
|
8780
|
+
#: ../lib/puppet/util/execution.rb:417
|
8749
8781
|
msgid "Waiting for output; will sleep %{time_to_sleep} seconds"
|
8750
8782
|
msgstr ""
|
8751
8783
|
|
@@ -9693,14 +9725,14 @@ msgstr ""
|
|
9693
9725
|
msgid "Failed to load client certificate for '%{name}'"
|
9694
9726
|
msgstr ""
|
9695
9727
|
|
9696
|
-
#: ../lib/puppet/x509/cert_provider.rb:
|
9728
|
+
#: ../lib/puppet/x509/cert_provider.rb:336
|
9697
9729
|
msgid "Failed to save certificate request for '%{name}'"
|
9698
9730
|
msgstr ""
|
9699
9731
|
|
9700
|
-
#: ../lib/puppet/x509/cert_provider.rb:
|
9732
|
+
#: ../lib/puppet/x509/cert_provider.rb:352
|
9701
9733
|
msgid "Failed to load certificate request for '%{name}'"
|
9702
9734
|
msgstr ""
|
9703
9735
|
|
9704
|
-
#: ../lib/puppet/x509/cert_provider.rb:
|
9736
|
+
#: ../lib/puppet/x509/cert_provider.rb:365
|
9705
9737
|
msgid "Failed to delete certificate request for '%{name}'"
|
9706
9738
|
msgstr ""
|