puppet 8.7.0-x86-mingw32 → 8.9.0-x86-mingw32
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/Gemfile +3 -0
- data/Gemfile.lock +57 -43
- data/ext/project_data.yaml +12 -0
- data/ext/windows/service/daemon.rb +9 -2
- data/install.rb +3 -74
- data/lib/puppet/application/apply.rb +1 -0
- data/lib/puppet/application/doc.rb +1 -5
- data/lib/puppet/application/filebucket.rb +6 -4
- data/lib/puppet/application/lookup.rb +2 -0
- data/lib/puppet/application/ssl.rb +4 -4
- data/lib/puppet/daemon.rb +0 -1
- data/lib/puppet/defaults.rb +67 -71
- data/lib/puppet/face/catalog.rb +24 -8
- data/lib/puppet/face/help.rb +43 -23
- data/lib/puppet/file_serving/http_metadata.rb +2 -0
- data/lib/puppet/functions/capitalize.rb +1 -1
- data/lib/puppet/functions/find_file.rb +4 -0
- data/lib/puppet/functions/hiera.rb +1 -0
- data/lib/puppet/functions/index.rb +2 -2
- data/lib/puppet/functions/lookup.rb +1 -1
- data/lib/puppet/functions/new.rb +1 -1
- data/lib/puppet/functions/regsubst.rb +11 -14
- data/lib/puppet/functions/unique.rb +3 -2
- data/lib/puppet/functions/yaml_data.rb +1 -0
- data/lib/puppet/indirector/catalog/compiler.rb +2 -35
- data/lib/puppet/interface/action_manager.rb +1 -1
- data/lib/puppet/module_tool/tar/gnu.rb +10 -8
- data/lib/puppet/node/server_facts.rb +43 -0
- data/lib/puppet/parser/functions/generate.rb +2 -1
- data/lib/puppet/pops/evaluator/deferred_resolver.rb +41 -6
- data/lib/puppet/pops/evaluator/runtime3_resource_support.rb +2 -1
- data/lib/puppet/pops/evaluator/runtime3_support.rb +0 -6
- data/lib/puppet/provider/file/posix.rb +16 -2
- data/lib/puppet/provider/package/gem.rb +1 -0
- data/lib/puppet/provider/package/pacman.rb +9 -10
- data/lib/puppet/provider/package/pkgutil.rb +6 -5
- data/lib/puppet/provider/package/puppet_gem.rb +4 -15
- data/lib/puppet/reference/configuration.rb +6 -1
- data/lib/puppet/resource/type.rb +15 -1
- data/lib/puppet/scheduler/splay_job.rb +0 -9
- data/lib/puppet/settings.rb +2 -2
- data/lib/puppet/transaction/resource_harness.rb +7 -3
- data/lib/puppet/type/exec.rb +3 -4
- data/lib/puppet/type/file/checksum.rb +4 -2
- data/lib/puppet/type/file/ctime.rb +2 -2
- data/lib/puppet/type/file/mtime.rb +2 -2
- data/lib/puppet/type/file/selcontext.rb +8 -7
- data/lib/puppet/type/file/target.rb +9 -11
- data/lib/puppet/type/package.rb +4 -3
- data/lib/puppet/type/user.rb +1 -1
- data/lib/puppet/util/checksums.rb +1 -0
- data/lib/puppet/util/execution.rb +1 -1
- data/lib/puppet/util/profiler/aggregate.rb +2 -2
- data/lib/puppet/util/profiler/wall_clock.rb +2 -2
- data/lib/puppet/util/reference.rb +1 -31
- data/lib/puppet/util/run_mode.rb +40 -0
- data/lib/puppet/util/selinux.rb +38 -16
- data/lib/puppet/util/windows/daemon.rb +15 -32
- data/lib/puppet/version.rb +1 -1
- data/locales/puppet.pot +141 -145
- data/man/man5/puppet.conf.5 +18 -18
- data/man/man8/puppet-agent.8 +1 -1
- data/man/man8/puppet-apply.8 +2 -1
- data/man/man8/puppet-catalog.8 +5 -2
- data/man/man8/puppet-config.8 +1 -1
- data/man/man8/puppet-describe.8 +1 -1
- data/man/man8/puppet-device.8 +1 -1
- data/man/man8/puppet-doc.8 +1 -1
- data/man/man8/puppet-epp.8 +1 -1
- data/man/man8/puppet-facts.8 +1 -1
- data/man/man8/puppet-filebucket.8 +10 -1
- data/man/man8/puppet-generate.8 +1 -1
- data/man/man8/puppet-help.8 +1 -1
- data/man/man8/puppet-lookup.8 +1 -1
- data/man/man8/puppet-module.8 +1 -1
- data/man/man8/puppet-node.8 +1 -1
- data/man/man8/puppet-parser.8 +1 -1
- data/man/man8/puppet-plugin.8 +1 -1
- data/man/man8/puppet-report.8 +1 -1
- data/man/man8/puppet-resource.8 +1 -1
- data/man/man8/puppet-script.8 +1 -1
- data/man/man8/puppet-ssl.8 +3 -3
- data/man/man8/puppet.8 +128 -9
- metadata +44 -29
data/lib/puppet/defaults.rb
CHANGED
@@ -7,6 +7,7 @@ module Puppet
|
|
7
7
|
'-u'
|
8
8
|
end
|
9
9
|
|
10
|
+
# If you modify this, update puppet/type/file/checksum.rb too
|
10
11
|
def self.default_digest_algorithm
|
11
12
|
'sha256'
|
12
13
|
end
|
@@ -47,29 +48,15 @@ module Puppet
|
|
47
48
|
end
|
48
49
|
|
49
50
|
def self.default_basemodulepath
|
50
|
-
|
51
|
-
|
52
|
-
|
53
|
-
if installdir
|
54
|
-
path << "#{installdir}/puppet/modules"
|
55
|
-
end
|
56
|
-
path.join(File::PATH_SEPARATOR)
|
57
|
-
else
|
58
|
-
'$codedir/modules:/opt/puppetlabs/puppet/modules'
|
51
|
+
path = ['$codedir/modules']
|
52
|
+
if (run_mode_dir = Puppet.run_mode.common_module_dir)
|
53
|
+
path << run_mode_dir
|
59
54
|
end
|
55
|
+
path.join(File::PATH_SEPARATOR)
|
60
56
|
end
|
61
57
|
|
62
58
|
def self.default_vendormoduledir
|
63
|
-
|
64
|
-
installdir = ENV.fetch("FACTER_env_windows_installdir", nil)
|
65
|
-
if installdir
|
66
|
-
"#{installdir}\\puppet\\vendor_modules"
|
67
|
-
else
|
68
|
-
nil
|
69
|
-
end
|
70
|
-
else
|
71
|
-
'/opt/puppetlabs/puppet/vendor_modules'
|
72
|
-
end
|
59
|
+
Puppet.run_mode.vendor_module_dir
|
73
60
|
end
|
74
61
|
|
75
62
|
############################################################################################
|
@@ -175,8 +162,8 @@ module Puppet
|
|
175
162
|
:skip_logging_catalog_request_destination => {
|
176
163
|
:default => false,
|
177
164
|
:type => :boolean,
|
178
|
-
:desc
|
179
|
-
catalog",
|
165
|
+
:desc => "Specifies whether to suppress the notice of which compiler
|
166
|
+
supplied the catalog. A value of `true` suppresses the notice.",
|
180
167
|
},
|
181
168
|
:merge_dependency_warnings => {
|
182
169
|
:default => false,
|
@@ -431,13 +418,15 @@ module Puppet
|
|
431
418
|
:type => :boolean,
|
432
419
|
:default => true,
|
433
420
|
:desc => <<-'EOT'
|
434
|
-
|
435
|
-
|
436
|
-
|
437
|
-
|
438
|
-
|
439
|
-
|
440
|
-
|
421
|
+
Specifies how environment paths are reported. When the value of
|
422
|
+
`versioned_environment_dirs` is `true`, Puppet applies the readlink function to
|
423
|
+
the `environmentpath` setting when constructing the environment's modulepath. The
|
424
|
+
full readlinked path is referred to as the "resolved path," and the configured
|
425
|
+
path potentially containing symlinks is the "configured path." When reporting
|
426
|
+
where resources come from, users may choose between the configured and resolved
|
427
|
+
path.
|
428
|
+
|
429
|
+
When set to `false`, the resolved paths are reported instead of the configured paths.
|
441
430
|
EOT
|
442
431
|
},
|
443
432
|
:use_last_environment => {
|
@@ -1218,17 +1207,18 @@ EOT
|
|
1218
1207
|
:ca_refresh_interval => {
|
1219
1208
|
:default => "1d",
|
1220
1209
|
:type => :duration,
|
1221
|
-
:desc => "How often the Puppet agent refreshes its local CA
|
1222
|
-
default
|
1223
|
-
|
1224
|
-
|
1225
|
-
exceeds the duration.
|
1226
|
-
|
1227
|
-
In general, the
|
1228
|
-
Setting
|
1229
|
-
|
1230
|
-
|
1231
|
-
|
1210
|
+
:desc => "How often the Puppet agent refreshes its local CA
|
1211
|
+
certificates. By default, CA certificates are refreshed every 24 hours. If a
|
1212
|
+
different interval is specified, the agent refreshes its CA certificates during
|
1213
|
+
the next agent run if the elapsed time since the certificates were last
|
1214
|
+
refreshed exceeds the specified duration.
|
1215
|
+
|
1216
|
+
In general, the interval should be greater than the `runinterval`
|
1217
|
+
value. Setting the `ca_refresh_interval` value to 0 or an equal or
|
1218
|
+
lesser value than `runinterval` causes the CA certificates to be
|
1219
|
+
refreshed on every run.
|
1220
|
+
|
1221
|
+
If the agent downloads new CA certs, the agent uses those for subsequent
|
1232
1222
|
network requests. If the refresh request fails or if the CA certs are
|
1233
1223
|
unchanged on the server, then the agent run will continue using the
|
1234
1224
|
local CA certs it already has. #{AS_DURATION}",
|
@@ -1236,15 +1226,15 @@ EOT
|
|
1236
1226
|
:crl_refresh_interval => {
|
1237
1227
|
:default => "1d",
|
1238
1228
|
:type => :duration,
|
1239
|
-
:desc => "How often the Puppet agent refreshes its local
|
1240
|
-
default the CRL is refreshed
|
1241
|
-
|
1242
|
-
|
1243
|
-
exceeds the
|
1229
|
+
:desc => "How often the Puppet agent refreshes its local Certificate
|
1230
|
+
Revocation List (CRL). By default, the CRL is refreshed every 24 hours. If
|
1231
|
+
a different interval is specified, the agent refreshes its CRL on the next
|
1232
|
+
Puppet agent run if the elapsed time since the CRL was last refreshed
|
1233
|
+
exceeds the specified interval.
|
1244
1234
|
|
1245
|
-
In general, the
|
1246
|
-
Setting
|
1247
|
-
|
1235
|
+
In general, the interval should be greater than the `runinterval` value.
|
1236
|
+
Setting the `crl_refresh_interval` value to 0 or an equal or lesser value
|
1237
|
+
than `runinterval` causes the CRL to be refreshed on every run.
|
1248
1238
|
|
1249
1239
|
If the agent downloads a new CRL, the agent will use it for subsequent
|
1250
1240
|
network requests. If the refresh request fails or if the CRL is
|
@@ -1254,18 +1244,19 @@ EOT
|
|
1254
1244
|
:hostcert_renewal_interval => {
|
1255
1245
|
:default => "30d",
|
1256
1246
|
:type => :duration,
|
1257
|
-
:desc
|
1258
|
-
|
1259
|
-
expires. If a different
|
1260
|
-
|
1261
|
-
within the duration
|
1247
|
+
:desc => "How often the Puppet agent renews its client certificate. By
|
1248
|
+
default, the client certificate is renewed 30 days before the certificate
|
1249
|
+
expires. If a different interval is specified, the agent renews its client
|
1250
|
+
certificate during the next agent run, assuming that the client certificate has
|
1251
|
+
expired within the specified duration.
|
1262
1252
|
|
1263
|
-
In general, the
|
1264
|
-
Setting
|
1253
|
+
In general, the `hostcert_renewal_interval` value should be greater than the
|
1254
|
+
`runinterval` value. Setting the `hostcert_renewal_interval` value to 0 disables
|
1255
|
+
automatic renewal.
|
1265
1256
|
|
1266
|
-
If the agent downloads a new certificate, the agent will use it
|
1267
|
-
network requests. If the refresh request fails,
|
1268
|
-
|
1257
|
+
If the agent downloads a new certificate, the agent will use it
|
1258
|
+
for subsequent network requests. If the refresh request fails, the agent run
|
1259
|
+
continues to use its existing certificate. #{AS_DURATION}",
|
1269
1260
|
},
|
1270
1261
|
:keylength => {
|
1271
1262
|
:default => 4096,
|
@@ -1506,8 +1497,10 @@ EOT
|
|
1506
1497
|
:exclude_unchanged_resources => {
|
1507
1498
|
:default => true,
|
1508
1499
|
:type => :boolean,
|
1509
|
-
:desc =>
|
1510
|
-
|
1500
|
+
:desc => "Specifies how unchanged resources are listed in reports. When
|
1501
|
+
set to `true`, resources that have had no changes after catalog application
|
1502
|
+
will not have corresponding unchanged resource status updates listed in a
|
1503
|
+
report."
|
1511
1504
|
},
|
1512
1505
|
:reportdir => {
|
1513
1506
|
:default => "$vardir/reports",
|
@@ -1759,11 +1752,12 @@ EOT
|
|
1759
1752
|
:allow_pson_serialization => {
|
1760
1753
|
:default => false,
|
1761
1754
|
:type => :boolean,
|
1762
|
-
:desc
|
1763
|
-
Puppet falls back to PSON. This option affects
|
1764
|
-
configuration management service responses and
|
1765
|
-
|
1766
|
-
rich data cannot be
|
1755
|
+
:desc => "Whether to allow PSON serialization. When unable to serialize to
|
1756
|
+
JSON or other formats, Puppet falls back to PSON. This option affects the
|
1757
|
+
configuration management service responses of Puppet Server and the process by
|
1758
|
+
which the agent saves its cached catalog. With a default value of `false`, this
|
1759
|
+
option is useful in preventing the loss of data because rich data cannot be
|
1760
|
+
serialized via PSON.",
|
1767
1761
|
},
|
1768
1762
|
:agent_catalog_run_lockfile => {
|
1769
1763
|
:default => "$statedir/agent_catalog_run.lock",
|
@@ -1789,7 +1783,7 @@ EOT
|
|
1789
1783
|
:type => :boolean,
|
1790
1784
|
:default => false,
|
1791
1785
|
:desc => "Whether to include legacy facts when requesting a catalog. This
|
1792
|
-
option can be set to false
|
1786
|
+
option can be set to `false` if all puppet manifests, hiera.yaml, and hiera
|
1793
1787
|
configuration layers no longer access legacy facts, such as `$osfamily`, and
|
1794
1788
|
instead access structured facts, such as `$facts['os']['family']`."
|
1795
1789
|
},
|
@@ -2105,12 +2099,12 @@ EOT
|
|
2105
2099
|
:preprocess_deferred => {
|
2106
2100
|
:default => false,
|
2107
2101
|
:type => :boolean,
|
2108
|
-
:desc => "Whether
|
2109
|
-
the catalog. If set to `true`,
|
2110
|
-
deferred function must be satisfied
|
2111
|
-
`false`,
|
2112
|
-
ordering.
|
2113
|
-
deferred function and call the deferred function in the same run."
|
2102
|
+
:desc => "Whether Puppet should call deferred functions before applying
|
2103
|
+
the catalog. If set to `true`, all prerequisites required for the
|
2104
|
+
deferred function must be satisfied before the Puppet run. If set to
|
2105
|
+
`false`, deferred functions follow Puppet relationships and
|
2106
|
+
ordering. In this way, Puppet can install the prerequisites required for a
|
2107
|
+
deferred function and call the deferred function in the same run.",
|
2114
2108
|
},
|
2115
2109
|
:summarize => {
|
2116
2110
|
:default => false,
|
@@ -2132,10 +2126,12 @@ EOT
|
|
2132
2126
|
can produce node information. The command must:
|
2133
2127
|
|
2134
2128
|
* Take the name of a node as a command-line argument.
|
2129
|
+
|
2135
2130
|
* Return a YAML hash with up to three keys:
|
2136
2131
|
* `classes` --- A list of classes, as an array or hash.
|
2137
2132
|
* `environment` --- A string.
|
2138
2133
|
* `parameters` --- A list of top-scope variables to set, as a hash.
|
2134
|
+
|
2139
2135
|
* For unknown nodes, exit with a non-zero exit code.
|
2140
2136
|
|
2141
2137
|
Generally, an ENC script makes requests to an external data source.
|
data/lib/puppet/face/catalog.rb
CHANGED
@@ -25,13 +25,27 @@ Puppet::Indirector::Face.define(:catalog, '0.0.1') do
|
|
25
25
|
|
26
26
|
deactivate_action(:destroy)
|
27
27
|
deactivate_action(:search)
|
28
|
-
|
29
|
-
|
30
|
-
|
31
|
-
|
32
|
-
|
33
|
-
|
34
|
-
|
28
|
+
action(:find) do
|
29
|
+
summary _("Retrieve the catalog for the node from which the command is run.")
|
30
|
+
arguments "<certname>, <facts>"
|
31
|
+
option("--facts_for_catalog") do
|
32
|
+
summary _("Not implemented for the CLI; facts are collected internally.")
|
33
|
+
end
|
34
|
+
returns <<-'EOT'
|
35
|
+
A serialized catalog. When used from the Ruby API, returns a
|
36
|
+
Puppet::Resource::Catalog object.
|
37
|
+
EOT
|
38
|
+
|
39
|
+
when_invoked do |*args|
|
40
|
+
# Default the key to Puppet[:certname] if none is supplied
|
41
|
+
if args.length == 1
|
42
|
+
key = Puppet[:certname]
|
43
|
+
else
|
44
|
+
key = args.shift
|
45
|
+
end
|
46
|
+
call_indirection_method :find, key, args.first
|
47
|
+
end
|
48
|
+
end
|
35
49
|
|
36
50
|
action(:apply) do
|
37
51
|
summary "Find and apply a catalog."
|
@@ -135,9 +149,11 @@ Puppet::Indirector::Face.define(:catalog, '0.0.1') do
|
|
135
149
|
when_invoked do |_options|
|
136
150
|
Puppet::Resource::Catalog.indirection.terminus_class = :rest
|
137
151
|
Puppet::Resource::Catalog.indirection.cache_class = nil
|
152
|
+
facts = Puppet::Face[:facts, '0.0.1'].find(Puppet[:certname])
|
138
153
|
catalog = nil
|
139
154
|
retrieval_duration = thinmark do
|
140
|
-
catalog = Puppet::Face[:catalog, '0.0.1'].find(Puppet[:certname]
|
155
|
+
catalog = Puppet::Face[:catalog, '0.0.1'].find(Puppet[:certname],
|
156
|
+
{ facts_for_catalog: facts })
|
141
157
|
end
|
142
158
|
catalog.retrieval_duration = retrieval_duration
|
143
159
|
catalog.write_class_file
|
data/lib/puppet/face/help.rb
CHANGED
@@ -151,6 +151,33 @@ Puppet::Face.define(:help, '0.0.1') do
|
|
151
151
|
end.sort
|
152
152
|
end
|
153
153
|
|
154
|
+
def generate_summary(appname)
|
155
|
+
if is_face_app?(appname)
|
156
|
+
begin
|
157
|
+
face = Puppet::Face[appname, :current]
|
158
|
+
# Add deprecation message to summary if the face is deprecated
|
159
|
+
summary = face.deprecated? ? face.summary + ' ' + _("(Deprecated)") : face.summary
|
160
|
+
[appname, summary, ' ']
|
161
|
+
rescue StandardError, LoadError
|
162
|
+
error_message = _("!%{sub_command}! Subcommand unavailable due to error.") % { sub_command: appname }
|
163
|
+
error_message += ' ' + _("Check error logs.")
|
164
|
+
[error_message, '', ' ']
|
165
|
+
end
|
166
|
+
else
|
167
|
+
begin
|
168
|
+
summary = Puppet::Application[appname].summary
|
169
|
+
if summary.empty?
|
170
|
+
summary = horribly_extract_summary_from(appname)
|
171
|
+
end
|
172
|
+
[appname, summary, ' ']
|
173
|
+
rescue StandardError, LoadError
|
174
|
+
error_message = _("!%{sub_command}! Subcommand unavailable due to error.") % { sub_command: appname }
|
175
|
+
error_message += ' ' + _("Check error logs.")
|
176
|
+
[error_message, '', ' ']
|
177
|
+
end
|
178
|
+
end
|
179
|
+
end
|
180
|
+
|
154
181
|
# Return a list of all applications (both legacy and Face applications), along with a summary
|
155
182
|
# of their functionality.
|
156
183
|
# @return [Array] An Array of Arrays. The outer array contains one entry per application; each
|
@@ -162,29 +189,8 @@ Puppet::Face.define(:help, '0.0.1') do
|
|
162
189
|
|
163
190
|
if appname == COMMON || appname == SPECIALIZED || appname == BLANK
|
164
191
|
result << appname
|
165
|
-
elsif is_face_app?(appname)
|
166
|
-
begin
|
167
|
-
face = Puppet::Face[appname, :current]
|
168
|
-
# Add deprecation message to summary if the face is deprecated
|
169
|
-
summary = face.deprecated? ? face.summary + ' ' + _("(Deprecated)") : face.summary
|
170
|
-
result << [appname, summary, ' ']
|
171
|
-
rescue StandardError, LoadError
|
172
|
-
error_message = _("!%{sub_command}! Subcommand unavailable due to error.") % { sub_command: appname }
|
173
|
-
error_message += ' ' + _("Check error logs.")
|
174
|
-
result << [error_message, '', ' ']
|
175
|
-
end
|
176
192
|
else
|
177
|
-
|
178
|
-
summary = Puppet::Application[appname].summary
|
179
|
-
if summary.empty?
|
180
|
-
summary = horribly_extract_summary_from(appname)
|
181
|
-
end
|
182
|
-
result << [appname, summary, ' ']
|
183
|
-
rescue StandardError, LoadError
|
184
|
-
error_message = _("!%{sub_command}! Subcommand unavailable due to error.") % { sub_command: appname }
|
185
|
-
error_message += ' ' + _("Check error logs.")
|
186
|
-
result << [error_message, '', ' ']
|
187
|
-
end
|
193
|
+
result << generate_summary(appname)
|
188
194
|
end
|
189
195
|
end
|
190
196
|
end
|
@@ -192,15 +198,29 @@ Puppet::Face.define(:help, '0.0.1') do
|
|
192
198
|
COMMON = 'Common:'
|
193
199
|
SPECIALIZED = 'Specialized:'
|
194
200
|
BLANK = "\n"
|
201
|
+
COMMON_APPS = %w[apply agent config help lookup module resource]
|
195
202
|
def available_application_names_special_sort
|
196
203
|
full_list = Puppet::Application.available_application_names
|
197
|
-
a_list = full_list &
|
204
|
+
a_list = full_list & COMMON_APPS
|
198
205
|
a_list = a_list.sort
|
199
206
|
also_ran = full_list - a_list
|
200
207
|
also_ran = also_ran.sort
|
201
208
|
[[COMMON], a_list, [BLANK], [SPECIALIZED], also_ran].flatten(1)
|
202
209
|
end
|
203
210
|
|
211
|
+
def common_app_summaries
|
212
|
+
COMMON_APPS.map do |appname|
|
213
|
+
generate_summary(appname)
|
214
|
+
end
|
215
|
+
end
|
216
|
+
|
217
|
+
def specialized_app_summaries
|
218
|
+
specialized_apps = Puppet::Application.available_application_names - COMMON_APPS
|
219
|
+
specialized_apps.filter_map do |appname|
|
220
|
+
generate_summary(appname) unless exclude_from_docs?(appname)
|
221
|
+
end
|
222
|
+
end
|
223
|
+
|
204
224
|
def horribly_extract_summary_from(appname)
|
205
225
|
help = Puppet::Application[appname].help.split("\n")
|
206
226
|
# Now we find the line with our summary, extract it, and return it. This
|
@@ -51,6 +51,8 @@ class Puppet::FileServing::HttpMetadata < Puppet::FileServing::Metadata
|
|
51
51
|
# Prefer the checksum_type from the indirector request options
|
52
52
|
# but fall back to the alternative otherwise
|
53
53
|
[@checksum_type, :sha256, :sha1, :md5, :mtime].each do |type|
|
54
|
+
next if type == :md5 && Puppet::Util::Platform.fips_enabled?
|
55
|
+
|
54
56
|
@checksum_type = type
|
55
57
|
@checksum = @checksums[type]
|
56
58
|
break if @checksum
|
@@ -5,7 +5,7 @@
|
|
5
5
|
# This function is compatible with the stdlib function with the same name.
|
6
6
|
#
|
7
7
|
# The function does the following:
|
8
|
-
# * For a `String`, a string
|
8
|
+
# * For a `String`, a string is returned in which the first character is uppercase.
|
9
9
|
# This is done using Ruby system locale which handles some, but not all
|
10
10
|
# special international up-casing rules (for example German double-s ß is capitalized to "Ss").
|
11
11
|
# * For an `Iterable[Variant[String, Numeric]]` (for example an `Array`) each value is capitalized and the conversion is not recursive.
|
@@ -7,6 +7,10 @@
|
|
7
7
|
# directory. (For example, the reference `mysql/mysqltuner.pl` will search for the
|
8
8
|
# file `<MODULES DIRECTORY>/mysql/files/mysqltuner.pl`.)
|
9
9
|
#
|
10
|
+
# If this function is run via puppet agent, it checks for file existence on the
|
11
|
+
# Puppet Primary server. If run via puppet apply, it checks on the local host.
|
12
|
+
# In both cases, the check is performed before any resources are changed.
|
13
|
+
#
|
10
14
|
# This function can also accept:
|
11
15
|
#
|
12
16
|
# * An absolute String path, which checks for the existence of a file from anywhere on disk.
|
@@ -40,8 +40,8 @@
|
|
40
40
|
# Note that the lambda gets the value and not an array with `[key, value]` as in other
|
41
41
|
# iterative functions.
|
42
42
|
#
|
43
|
-
# Using a lambda that accepts two values works the same way
|
44
|
-
# as the first parameter
|
43
|
+
# Using a lambda that accepts two values works the same way. The lambda gets the index/key
|
44
|
+
# as the first parameter and the value as the second parameter.
|
45
45
|
#
|
46
46
|
# @example Using the `index` function with an Array and a two-parameter lambda
|
47
47
|
#
|
@@ -97,7 +97,7 @@
|
|
97
97
|
# or `{'strategy' => 'hash'}` --- Same as the string versions of these merge behaviors.
|
98
98
|
# * `{'strategy' => 'deep', <DEEP OPTION> => <VALUE>, ...}` --- Same as `'deep'`,
|
99
99
|
# but can adjust the merge with additional options. The available options are:
|
100
|
-
# * `'knockout_prefix'` (string
|
100
|
+
# * `'knockout_prefix'` (string) --- A string prefix to indicate a
|
101
101
|
# value should be _removed_ from the final result. If a value is exactly equal
|
102
102
|
# to the prefix, it will knockout the entire element. Defaults to `undef`, which
|
103
103
|
# disables this feature.
|
data/lib/puppet/functions/new.rb
CHANGED
@@ -557,7 +557,7 @@
|
|
557
557
|
# @example Simple Conversion to String specifying the format for the given value directly
|
558
558
|
#
|
559
559
|
# ```puppet
|
560
|
-
# $str = String(10, "%#x") # produces '
|
560
|
+
# $str = String(10, "%#x") # produces '0xa'
|
561
561
|
# $str = String([10], "%(a") # produces '("10")'
|
562
562
|
# ```
|
563
563
|
#
|
@@ -20,13 +20,10 @@ Puppet::Functions.create_function(:regsubst) do
|
|
20
20
|
# - *M* Multiline regexps
|
21
21
|
# - *G* Global replacement; all occurrences of the regexp in each target string will be replaced. Without this, only the first occurrence will be replaced.
|
22
22
|
# @param encoding [Enum['N','E','S','U']]
|
23
|
-
#
|
24
|
-
# precompiled regexp). A single-character string with the following values:
|
25
|
-
# - *N* None
|
26
|
-
# - *E* EUC
|
27
|
-
# - *S* SJIS
|
28
|
-
# - *U* UTF-8
|
23
|
+
# Deprecated and ignored parameter, included only for compatibility.
|
29
24
|
# @return [Array[String], String] The result of the substitution. Result type is the same as for the target parameter.
|
25
|
+
# @deprecated
|
26
|
+
# This method has the optional encoding parameter, which is ignored.
|
30
27
|
# @example Get the third octet from the node's IP address:
|
31
28
|
# ```puppet
|
32
29
|
# $i3 = regsubst($ipaddress,'^(\\d+)\\.(\\d+)\\.(\\d+)\\.(\\d+)$','\\3')
|
@@ -56,13 +53,6 @@ Puppet::Functions.create_function(:regsubst) do
|
|
56
53
|
# - *I* Ignore case in regexps
|
57
54
|
# - *M* Multiline regexps
|
58
55
|
# - *G* Global replacement; all occurrences of the regexp in each target string will be replaced. Without this, only the first occurrence will be replaced.
|
59
|
-
# @param encoding [Enum['N','E','S','U']]
|
60
|
-
# Optional. How to handle multibyte characters when compiling the regexp (must not be used when pattern is a
|
61
|
-
# precompiled regexp). A single-character string with the following values:
|
62
|
-
# - *N* None
|
63
|
-
# - *E* EUC
|
64
|
-
# - *S* SJIS
|
65
|
-
# - *U* UTF-8
|
66
56
|
# @return [Array[String], String] The result of the substitution. Result type is the same as for the target parameter.
|
67
57
|
# @example Put angle brackets around each octet in the node's IP address:
|
68
58
|
# ```puppet
|
@@ -76,6 +66,13 @@ Puppet::Functions.create_function(:regsubst) do
|
|
76
66
|
end
|
77
67
|
|
78
68
|
def regsubst_string(target, pattern, replacement, flags = nil, encoding = nil)
|
69
|
+
if encoding
|
70
|
+
Puppet.warn_once(
|
71
|
+
'deprecations', 'regsubst_function_encoding',
|
72
|
+
_("The regsubst() function's encoding argument has been ignored since Ruby 1.9 and will be removed in a future release")
|
73
|
+
)
|
74
|
+
end
|
75
|
+
|
79
76
|
re_flags = 0
|
80
77
|
operation = :sub
|
81
78
|
unless flags.nil?
|
@@ -88,7 +85,7 @@ Puppet::Functions.create_function(:regsubst) do
|
|
88
85
|
end
|
89
86
|
end
|
90
87
|
end
|
91
|
-
inner_regsubst(target, Regexp.compile(pattern, re_flags
|
88
|
+
inner_regsubst(target, Regexp.compile(pattern, re_flags), replacement, operation)
|
92
89
|
end
|
93
90
|
|
94
91
|
def regsubst_regexp(target, pattern, replacement, flags = nil)
|
@@ -65,8 +65,9 @@
|
|
65
65
|
# *first-found* unique value, but for `Hash` it contains associations from a set of keys to the set of values clustered by the
|
66
66
|
# equality lambda (or the default value equality if no lambda was given). This makes the `unique` function more versatile for hashes
|
67
67
|
# in general, while requiring that the simple computation of "hash's unique set of values" is performed as `$hsh.map |$k, $v| { $v }.unique`.
|
68
|
-
# (
|
69
|
-
#
|
68
|
+
# (Generally, it's meaningless to compute the unique set of hash keys because they are unique by definition. However, the
|
69
|
+
# situation can change if the hash keys are processed with a different lambda for equality. For this unique computation,
|
70
|
+
# first map the hash to an array of its keys.)
|
70
71
|
# If the more advanced clustering is wanted for one of the other data types, simply transform it into a `Hash` as shown in the
|
71
72
|
# following example.
|
72
73
|
#
|
@@ -1,6 +1,7 @@
|
|
1
1
|
# frozen_string_literal: true
|
2
2
|
|
3
3
|
require 'yaml'
|
4
|
+
|
4
5
|
# The `yaml_data` is a hiera 5 `data_hash` data provider function.
|
5
6
|
# See [the configuration guide documentation](https://puppet.com/docs/puppet/latest/hiera_config_yaml_5.html#configuring-a-hierarchy-level-built-in-backends) for
|
6
7
|
# how to use this function.
|
@@ -2,6 +2,7 @@
|
|
2
2
|
|
3
3
|
require_relative '../../../puppet/environments'
|
4
4
|
require_relative '../../../puppet/node'
|
5
|
+
require_relative '../../../puppet/node/server_facts'
|
5
6
|
require_relative '../../../puppet/resource/catalog'
|
6
7
|
require_relative '../../../puppet/indirector/code'
|
7
8
|
require_relative '../../../puppet/util/profiler'
|
@@ -426,40 +427,6 @@ class Puppet::Resource::Catalog::Compiler < Puppet::Indirector::Code
|
|
426
427
|
#
|
427
428
|
# See also set_server_facts in Puppet::Server::Compiler in puppetserver.
|
428
429
|
def set_server_facts
|
429
|
-
@server_facts =
|
430
|
-
|
431
|
-
# Add our server Puppet Enterprise version, if available.
|
432
|
-
pe_version_file = '/opt/puppetlabs/server/pe_version'
|
433
|
-
if File.readable?(pe_version_file) and !File.zero?(pe_version_file)
|
434
|
-
@server_facts['pe_serverversion'] = File.read(pe_version_file).chomp
|
435
|
-
end
|
436
|
-
|
437
|
-
# Add our server version to the fact list
|
438
|
-
@server_facts["serverversion"] = Puppet.version.to_s
|
439
|
-
|
440
|
-
# And then add the server name and IP
|
441
|
-
{ "servername" => "networking.fqdn",
|
442
|
-
"serverip" => "networking.ip",
|
443
|
-
"serverip6" => "networking.ip6" }.each do |var, fact|
|
444
|
-
value = Puppet.runtime[:facter].value(fact)
|
445
|
-
unless value.nil?
|
446
|
-
@server_facts[var] = value
|
447
|
-
end
|
448
|
-
end
|
449
|
-
|
450
|
-
if @server_facts["servername"].nil?
|
451
|
-
host = Puppet.runtime[:facter].value('networking.hostname')
|
452
|
-
if host.nil?
|
453
|
-
Puppet.warning _("Could not retrieve fact servername")
|
454
|
-
elsif domain = Puppet.runtime[:facter].value('networking.domain') # rubocop:disable Lint/AssignmentInCondition
|
455
|
-
@server_facts["servername"] = [host, domain].join(".")
|
456
|
-
else
|
457
|
-
@server_facts["servername"] = host
|
458
|
-
end
|
459
|
-
end
|
460
|
-
|
461
|
-
if @server_facts["serverip"].nil? && @server_facts["serverip6"].nil?
|
462
|
-
Puppet.warning _("Could not retrieve either serverip or serverip6 fact")
|
463
|
-
end
|
430
|
+
@server_facts = Puppet::Node::ServerFacts.load
|
464
431
|
end
|
465
432
|
end
|
@@ -19,7 +19,7 @@ module Puppet::Interface::ActionManager
|
|
19
19
|
# @dsl Faces
|
20
20
|
def action(name, &block)
|
21
21
|
@actions ||= {}
|
22
|
-
Puppet.
|
22
|
+
Puppet.debug _("Redefining action %{name} for %{self}") % { name: name, self: self } if action?(name)
|
23
23
|
|
24
24
|
action = Puppet::Interface::ActionBuilder.build(self, name, &block)
|
25
25
|
|
@@ -4,18 +4,20 @@ require 'shellwords'
|
|
4
4
|
|
5
5
|
class Puppet::ModuleTool::Tar::Gnu
|
6
6
|
def unpack(sourcefile, destdir, owner)
|
7
|
-
|
7
|
+
safe_sourcefile = Shellwords.shellescape(File.expand_path(sourcefile))
|
8
8
|
destdir = File.expand_path(destdir)
|
9
|
+
safe_destdir = Shellwords.shellescape(destdir)
|
9
10
|
|
10
|
-
|
11
|
-
|
12
|
-
|
13
|
-
|
14
|
-
Puppet::Util::Execution.execute("chown -R #{owner} .")
|
15
|
-
end
|
11
|
+
Puppet::Util::Execution.execute("gzip -dc #{safe_sourcefile} | tar --extract --no-same-owner --directory #{safe_destdir} --file -")
|
12
|
+
Puppet::Util::Execution.execute(['find', destdir, '-type', 'd', '-exec', 'chmod', '755', '{}', '+'])
|
13
|
+
Puppet::Util::Execution.execute(['find', destdir, '-type', 'f', '-exec', 'chmod', 'u+rw,g+r,a-st', '{}', '+'])
|
14
|
+
Puppet::Util::Execution.execute(['chown', '-R', owner, destdir])
|
16
15
|
end
|
17
16
|
|
18
17
|
def pack(sourcedir, destfile)
|
19
|
-
|
18
|
+
safe_sourcedir = Shellwords.shellescape(sourcedir)
|
19
|
+
safe_destfile = Shellwords.shellescape(File.basename(destfile))
|
20
|
+
|
21
|
+
Puppet::Util::Execution.execute("tar cf - #{safe_sourcedir} | gzip -c > #{safe_destfile}")
|
20
22
|
end
|
21
23
|
end
|