puppet 8.7.0 → 8.9.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/Gemfile +3 -0
- data/Gemfile.lock +57 -43
- data/ext/project_data.yaml +12 -0
- data/ext/windows/service/daemon.rb +9 -2
- data/install.rb +3 -74
- data/lib/puppet/application/apply.rb +1 -0
- data/lib/puppet/application/doc.rb +1 -5
- data/lib/puppet/application/filebucket.rb +6 -4
- data/lib/puppet/application/lookup.rb +2 -0
- data/lib/puppet/application/ssl.rb +4 -4
- data/lib/puppet/daemon.rb +0 -1
- data/lib/puppet/defaults.rb +67 -71
- data/lib/puppet/face/catalog.rb +24 -8
- data/lib/puppet/face/help.rb +43 -23
- data/lib/puppet/file_serving/http_metadata.rb +2 -0
- data/lib/puppet/functions/capitalize.rb +1 -1
- data/lib/puppet/functions/find_file.rb +4 -0
- data/lib/puppet/functions/hiera.rb +1 -0
- data/lib/puppet/functions/index.rb +2 -2
- data/lib/puppet/functions/lookup.rb +1 -1
- data/lib/puppet/functions/new.rb +1 -1
- data/lib/puppet/functions/regsubst.rb +11 -14
- data/lib/puppet/functions/unique.rb +3 -2
- data/lib/puppet/functions/yaml_data.rb +1 -0
- data/lib/puppet/indirector/catalog/compiler.rb +2 -35
- data/lib/puppet/interface/action_manager.rb +1 -1
- data/lib/puppet/module_tool/tar/gnu.rb +10 -8
- data/lib/puppet/node/server_facts.rb +43 -0
- data/lib/puppet/parser/functions/generate.rb +2 -1
- data/lib/puppet/pops/evaluator/deferred_resolver.rb +41 -6
- data/lib/puppet/pops/evaluator/runtime3_resource_support.rb +2 -1
- data/lib/puppet/pops/evaluator/runtime3_support.rb +0 -6
- data/lib/puppet/provider/file/posix.rb +16 -2
- data/lib/puppet/provider/package/gem.rb +1 -0
- data/lib/puppet/provider/package/pacman.rb +9 -10
- data/lib/puppet/provider/package/pkgutil.rb +6 -5
- data/lib/puppet/provider/package/puppet_gem.rb +4 -15
- data/lib/puppet/reference/configuration.rb +6 -1
- data/lib/puppet/resource/type.rb +15 -1
- data/lib/puppet/scheduler/splay_job.rb +0 -9
- data/lib/puppet/settings.rb +2 -2
- data/lib/puppet/transaction/resource_harness.rb +7 -3
- data/lib/puppet/type/exec.rb +3 -4
- data/lib/puppet/type/file/checksum.rb +4 -2
- data/lib/puppet/type/file/ctime.rb +2 -2
- data/lib/puppet/type/file/mtime.rb +2 -2
- data/lib/puppet/type/file/selcontext.rb +8 -7
- data/lib/puppet/type/file/target.rb +9 -11
- data/lib/puppet/type/package.rb +4 -3
- data/lib/puppet/type/user.rb +1 -1
- data/lib/puppet/util/checksums.rb +1 -0
- data/lib/puppet/util/execution.rb +1 -1
- data/lib/puppet/util/profiler/aggregate.rb +2 -2
- data/lib/puppet/util/profiler/wall_clock.rb +2 -2
- data/lib/puppet/util/reference.rb +1 -31
- data/lib/puppet/util/run_mode.rb +40 -0
- data/lib/puppet/util/selinux.rb +38 -16
- data/lib/puppet/util/windows/daemon.rb +15 -32
- data/lib/puppet/version.rb +1 -1
- data/locales/puppet.pot +141 -145
- data/man/man5/puppet.conf.5 +18 -18
- data/man/man8/puppet-agent.8 +1 -1
- data/man/man8/puppet-apply.8 +2 -1
- data/man/man8/puppet-catalog.8 +5 -2
- data/man/man8/puppet-config.8 +1 -1
- data/man/man8/puppet-describe.8 +1 -1
- data/man/man8/puppet-device.8 +1 -1
- data/man/man8/puppet-doc.8 +1 -1
- data/man/man8/puppet-epp.8 +1 -1
- data/man/man8/puppet-facts.8 +1 -1
- data/man/man8/puppet-filebucket.8 +10 -1
- data/man/man8/puppet-generate.8 +1 -1
- data/man/man8/puppet-help.8 +1 -1
- data/man/man8/puppet-lookup.8 +1 -1
- data/man/man8/puppet-module.8 +1 -1
- data/man/man8/puppet-node.8 +1 -1
- data/man/man8/puppet-parser.8 +1 -1
- data/man/man8/puppet-plugin.8 +1 -1
- data/man/man8/puppet-report.8 +1 -1
- data/man/man8/puppet-resource.8 +1 -1
- data/man/man8/puppet-script.8 +1 -1
- data/man/man8/puppet-ssl.8 +3 -3
- data/man/man8/puppet.8 +128 -9
- metadata +44 -29
data/lib/puppet/defaults.rb
CHANGED
@@ -7,6 +7,7 @@ module Puppet
|
|
7
7
|
'-u'
|
8
8
|
end
|
9
9
|
|
10
|
+
# If you modify this, update puppet/type/file/checksum.rb too
|
10
11
|
def self.default_digest_algorithm
|
11
12
|
'sha256'
|
12
13
|
end
|
@@ -47,29 +48,15 @@ module Puppet
|
|
47
48
|
end
|
48
49
|
|
49
50
|
def self.default_basemodulepath
|
50
|
-
|
51
|
-
|
52
|
-
|
53
|
-
if installdir
|
54
|
-
path << "#{installdir}/puppet/modules"
|
55
|
-
end
|
56
|
-
path.join(File::PATH_SEPARATOR)
|
57
|
-
else
|
58
|
-
'$codedir/modules:/opt/puppetlabs/puppet/modules'
|
51
|
+
path = ['$codedir/modules']
|
52
|
+
if (run_mode_dir = Puppet.run_mode.common_module_dir)
|
53
|
+
path << run_mode_dir
|
59
54
|
end
|
55
|
+
path.join(File::PATH_SEPARATOR)
|
60
56
|
end
|
61
57
|
|
62
58
|
def self.default_vendormoduledir
|
63
|
-
|
64
|
-
installdir = ENV.fetch("FACTER_env_windows_installdir", nil)
|
65
|
-
if installdir
|
66
|
-
"#{installdir}\\puppet\\vendor_modules"
|
67
|
-
else
|
68
|
-
nil
|
69
|
-
end
|
70
|
-
else
|
71
|
-
'/opt/puppetlabs/puppet/vendor_modules'
|
72
|
-
end
|
59
|
+
Puppet.run_mode.vendor_module_dir
|
73
60
|
end
|
74
61
|
|
75
62
|
############################################################################################
|
@@ -175,8 +162,8 @@ module Puppet
|
|
175
162
|
:skip_logging_catalog_request_destination => {
|
176
163
|
:default => false,
|
177
164
|
:type => :boolean,
|
178
|
-
:desc
|
179
|
-
catalog",
|
165
|
+
:desc => "Specifies whether to suppress the notice of which compiler
|
166
|
+
supplied the catalog. A value of `true` suppresses the notice.",
|
180
167
|
},
|
181
168
|
:merge_dependency_warnings => {
|
182
169
|
:default => false,
|
@@ -431,13 +418,15 @@ module Puppet
|
|
431
418
|
:type => :boolean,
|
432
419
|
:default => true,
|
433
420
|
:desc => <<-'EOT'
|
434
|
-
|
435
|
-
|
436
|
-
|
437
|
-
|
438
|
-
|
439
|
-
|
440
|
-
|
421
|
+
Specifies how environment paths are reported. When the value of
|
422
|
+
`versioned_environment_dirs` is `true`, Puppet applies the readlink function to
|
423
|
+
the `environmentpath` setting when constructing the environment's modulepath. The
|
424
|
+
full readlinked path is referred to as the "resolved path," and the configured
|
425
|
+
path potentially containing symlinks is the "configured path." When reporting
|
426
|
+
where resources come from, users may choose between the configured and resolved
|
427
|
+
path.
|
428
|
+
|
429
|
+
When set to `false`, the resolved paths are reported instead of the configured paths.
|
441
430
|
EOT
|
442
431
|
},
|
443
432
|
:use_last_environment => {
|
@@ -1218,17 +1207,18 @@ EOT
|
|
1218
1207
|
:ca_refresh_interval => {
|
1219
1208
|
:default => "1d",
|
1220
1209
|
:type => :duration,
|
1221
|
-
:desc => "How often the Puppet agent refreshes its local CA
|
1222
|
-
default
|
1223
|
-
|
1224
|
-
|
1225
|
-
exceeds the duration.
|
1226
|
-
|
1227
|
-
In general, the
|
1228
|
-
Setting
|
1229
|
-
|
1230
|
-
|
1231
|
-
|
1210
|
+
:desc => "How often the Puppet agent refreshes its local CA
|
1211
|
+
certificates. By default, CA certificates are refreshed every 24 hours. If a
|
1212
|
+
different interval is specified, the agent refreshes its CA certificates during
|
1213
|
+
the next agent run if the elapsed time since the certificates were last
|
1214
|
+
refreshed exceeds the specified duration.
|
1215
|
+
|
1216
|
+
In general, the interval should be greater than the `runinterval`
|
1217
|
+
value. Setting the `ca_refresh_interval` value to 0 or an equal or
|
1218
|
+
lesser value than `runinterval` causes the CA certificates to be
|
1219
|
+
refreshed on every run.
|
1220
|
+
|
1221
|
+
If the agent downloads new CA certs, the agent uses those for subsequent
|
1232
1222
|
network requests. If the refresh request fails or if the CA certs are
|
1233
1223
|
unchanged on the server, then the agent run will continue using the
|
1234
1224
|
local CA certs it already has. #{AS_DURATION}",
|
@@ -1236,15 +1226,15 @@ EOT
|
|
1236
1226
|
:crl_refresh_interval => {
|
1237
1227
|
:default => "1d",
|
1238
1228
|
:type => :duration,
|
1239
|
-
:desc => "How often the Puppet agent refreshes its local
|
1240
|
-
default the CRL is refreshed
|
1241
|
-
|
1242
|
-
|
1243
|
-
exceeds the
|
1229
|
+
:desc => "How often the Puppet agent refreshes its local Certificate
|
1230
|
+
Revocation List (CRL). By default, the CRL is refreshed every 24 hours. If
|
1231
|
+
a different interval is specified, the agent refreshes its CRL on the next
|
1232
|
+
Puppet agent run if the elapsed time since the CRL was last refreshed
|
1233
|
+
exceeds the specified interval.
|
1244
1234
|
|
1245
|
-
In general, the
|
1246
|
-
Setting
|
1247
|
-
|
1235
|
+
In general, the interval should be greater than the `runinterval` value.
|
1236
|
+
Setting the `crl_refresh_interval` value to 0 or an equal or lesser value
|
1237
|
+
than `runinterval` causes the CRL to be refreshed on every run.
|
1248
1238
|
|
1249
1239
|
If the agent downloads a new CRL, the agent will use it for subsequent
|
1250
1240
|
network requests. If the refresh request fails or if the CRL is
|
@@ -1254,18 +1244,19 @@ EOT
|
|
1254
1244
|
:hostcert_renewal_interval => {
|
1255
1245
|
:default => "30d",
|
1256
1246
|
:type => :duration,
|
1257
|
-
:desc
|
1258
|
-
|
1259
|
-
expires. If a different
|
1260
|
-
|
1261
|
-
within the duration
|
1247
|
+
:desc => "How often the Puppet agent renews its client certificate. By
|
1248
|
+
default, the client certificate is renewed 30 days before the certificate
|
1249
|
+
expires. If a different interval is specified, the agent renews its client
|
1250
|
+
certificate during the next agent run, assuming that the client certificate has
|
1251
|
+
expired within the specified duration.
|
1262
1252
|
|
1263
|
-
In general, the
|
1264
|
-
Setting
|
1253
|
+
In general, the `hostcert_renewal_interval` value should be greater than the
|
1254
|
+
`runinterval` value. Setting the `hostcert_renewal_interval` value to 0 disables
|
1255
|
+
automatic renewal.
|
1265
1256
|
|
1266
|
-
If the agent downloads a new certificate, the agent will use it
|
1267
|
-
network requests. If the refresh request fails,
|
1268
|
-
|
1257
|
+
If the agent downloads a new certificate, the agent will use it
|
1258
|
+
for subsequent network requests. If the refresh request fails, the agent run
|
1259
|
+
continues to use its existing certificate. #{AS_DURATION}",
|
1269
1260
|
},
|
1270
1261
|
:keylength => {
|
1271
1262
|
:default => 4096,
|
@@ -1506,8 +1497,10 @@ EOT
|
|
1506
1497
|
:exclude_unchanged_resources => {
|
1507
1498
|
:default => true,
|
1508
1499
|
:type => :boolean,
|
1509
|
-
:desc =>
|
1510
|
-
|
1500
|
+
:desc => "Specifies how unchanged resources are listed in reports. When
|
1501
|
+
set to `true`, resources that have had no changes after catalog application
|
1502
|
+
will not have corresponding unchanged resource status updates listed in a
|
1503
|
+
report."
|
1511
1504
|
},
|
1512
1505
|
:reportdir => {
|
1513
1506
|
:default => "$vardir/reports",
|
@@ -1759,11 +1752,12 @@ EOT
|
|
1759
1752
|
:allow_pson_serialization => {
|
1760
1753
|
:default => false,
|
1761
1754
|
:type => :boolean,
|
1762
|
-
:desc
|
1763
|
-
Puppet falls back to PSON. This option affects
|
1764
|
-
configuration management service responses and
|
1765
|
-
|
1766
|
-
rich data cannot be
|
1755
|
+
:desc => "Whether to allow PSON serialization. When unable to serialize to
|
1756
|
+
JSON or other formats, Puppet falls back to PSON. This option affects the
|
1757
|
+
configuration management service responses of Puppet Server and the process by
|
1758
|
+
which the agent saves its cached catalog. With a default value of `false`, this
|
1759
|
+
option is useful in preventing the loss of data because rich data cannot be
|
1760
|
+
serialized via PSON.",
|
1767
1761
|
},
|
1768
1762
|
:agent_catalog_run_lockfile => {
|
1769
1763
|
:default => "$statedir/agent_catalog_run.lock",
|
@@ -1789,7 +1783,7 @@ EOT
|
|
1789
1783
|
:type => :boolean,
|
1790
1784
|
:default => false,
|
1791
1785
|
:desc => "Whether to include legacy facts when requesting a catalog. This
|
1792
|
-
option can be set to false
|
1786
|
+
option can be set to `false` if all puppet manifests, hiera.yaml, and hiera
|
1793
1787
|
configuration layers no longer access legacy facts, such as `$osfamily`, and
|
1794
1788
|
instead access structured facts, such as `$facts['os']['family']`."
|
1795
1789
|
},
|
@@ -2105,12 +2099,12 @@ EOT
|
|
2105
2099
|
:preprocess_deferred => {
|
2106
2100
|
:default => false,
|
2107
2101
|
:type => :boolean,
|
2108
|
-
:desc => "Whether
|
2109
|
-
the catalog. If set to `true`,
|
2110
|
-
deferred function must be satisfied
|
2111
|
-
`false`,
|
2112
|
-
ordering.
|
2113
|
-
deferred function and call the deferred function in the same run."
|
2102
|
+
:desc => "Whether Puppet should call deferred functions before applying
|
2103
|
+
the catalog. If set to `true`, all prerequisites required for the
|
2104
|
+
deferred function must be satisfied before the Puppet run. If set to
|
2105
|
+
`false`, deferred functions follow Puppet relationships and
|
2106
|
+
ordering. In this way, Puppet can install the prerequisites required for a
|
2107
|
+
deferred function and call the deferred function in the same run.",
|
2114
2108
|
},
|
2115
2109
|
:summarize => {
|
2116
2110
|
:default => false,
|
@@ -2132,10 +2126,12 @@ EOT
|
|
2132
2126
|
can produce node information. The command must:
|
2133
2127
|
|
2134
2128
|
* Take the name of a node as a command-line argument.
|
2129
|
+
|
2135
2130
|
* Return a YAML hash with up to three keys:
|
2136
2131
|
* `classes` --- A list of classes, as an array or hash.
|
2137
2132
|
* `environment` --- A string.
|
2138
2133
|
* `parameters` --- A list of top-scope variables to set, as a hash.
|
2134
|
+
|
2139
2135
|
* For unknown nodes, exit with a non-zero exit code.
|
2140
2136
|
|
2141
2137
|
Generally, an ENC script makes requests to an external data source.
|
data/lib/puppet/face/catalog.rb
CHANGED
@@ -25,13 +25,27 @@ Puppet::Indirector::Face.define(:catalog, '0.0.1') do
|
|
25
25
|
|
26
26
|
deactivate_action(:destroy)
|
27
27
|
deactivate_action(:search)
|
28
|
-
|
29
|
-
|
30
|
-
|
31
|
-
|
32
|
-
|
33
|
-
|
34
|
-
|
28
|
+
action(:find) do
|
29
|
+
summary _("Retrieve the catalog for the node from which the command is run.")
|
30
|
+
arguments "<certname>, <facts>"
|
31
|
+
option("--facts_for_catalog") do
|
32
|
+
summary _("Not implemented for the CLI; facts are collected internally.")
|
33
|
+
end
|
34
|
+
returns <<-'EOT'
|
35
|
+
A serialized catalog. When used from the Ruby API, returns a
|
36
|
+
Puppet::Resource::Catalog object.
|
37
|
+
EOT
|
38
|
+
|
39
|
+
when_invoked do |*args|
|
40
|
+
# Default the key to Puppet[:certname] if none is supplied
|
41
|
+
if args.length == 1
|
42
|
+
key = Puppet[:certname]
|
43
|
+
else
|
44
|
+
key = args.shift
|
45
|
+
end
|
46
|
+
call_indirection_method :find, key, args.first
|
47
|
+
end
|
48
|
+
end
|
35
49
|
|
36
50
|
action(:apply) do
|
37
51
|
summary "Find and apply a catalog."
|
@@ -135,9 +149,11 @@ Puppet::Indirector::Face.define(:catalog, '0.0.1') do
|
|
135
149
|
when_invoked do |_options|
|
136
150
|
Puppet::Resource::Catalog.indirection.terminus_class = :rest
|
137
151
|
Puppet::Resource::Catalog.indirection.cache_class = nil
|
152
|
+
facts = Puppet::Face[:facts, '0.0.1'].find(Puppet[:certname])
|
138
153
|
catalog = nil
|
139
154
|
retrieval_duration = thinmark do
|
140
|
-
catalog = Puppet::Face[:catalog, '0.0.1'].find(Puppet[:certname]
|
155
|
+
catalog = Puppet::Face[:catalog, '0.0.1'].find(Puppet[:certname],
|
156
|
+
{ facts_for_catalog: facts })
|
141
157
|
end
|
142
158
|
catalog.retrieval_duration = retrieval_duration
|
143
159
|
catalog.write_class_file
|
data/lib/puppet/face/help.rb
CHANGED
@@ -151,6 +151,33 @@ Puppet::Face.define(:help, '0.0.1') do
|
|
151
151
|
end.sort
|
152
152
|
end
|
153
153
|
|
154
|
+
def generate_summary(appname)
|
155
|
+
if is_face_app?(appname)
|
156
|
+
begin
|
157
|
+
face = Puppet::Face[appname, :current]
|
158
|
+
# Add deprecation message to summary if the face is deprecated
|
159
|
+
summary = face.deprecated? ? face.summary + ' ' + _("(Deprecated)") : face.summary
|
160
|
+
[appname, summary, ' ']
|
161
|
+
rescue StandardError, LoadError
|
162
|
+
error_message = _("!%{sub_command}! Subcommand unavailable due to error.") % { sub_command: appname }
|
163
|
+
error_message += ' ' + _("Check error logs.")
|
164
|
+
[error_message, '', ' ']
|
165
|
+
end
|
166
|
+
else
|
167
|
+
begin
|
168
|
+
summary = Puppet::Application[appname].summary
|
169
|
+
if summary.empty?
|
170
|
+
summary = horribly_extract_summary_from(appname)
|
171
|
+
end
|
172
|
+
[appname, summary, ' ']
|
173
|
+
rescue StandardError, LoadError
|
174
|
+
error_message = _("!%{sub_command}! Subcommand unavailable due to error.") % { sub_command: appname }
|
175
|
+
error_message += ' ' + _("Check error logs.")
|
176
|
+
[error_message, '', ' ']
|
177
|
+
end
|
178
|
+
end
|
179
|
+
end
|
180
|
+
|
154
181
|
# Return a list of all applications (both legacy and Face applications), along with a summary
|
155
182
|
# of their functionality.
|
156
183
|
# @return [Array] An Array of Arrays. The outer array contains one entry per application; each
|
@@ -162,29 +189,8 @@ Puppet::Face.define(:help, '0.0.1') do
|
|
162
189
|
|
163
190
|
if appname == COMMON || appname == SPECIALIZED || appname == BLANK
|
164
191
|
result << appname
|
165
|
-
elsif is_face_app?(appname)
|
166
|
-
begin
|
167
|
-
face = Puppet::Face[appname, :current]
|
168
|
-
# Add deprecation message to summary if the face is deprecated
|
169
|
-
summary = face.deprecated? ? face.summary + ' ' + _("(Deprecated)") : face.summary
|
170
|
-
result << [appname, summary, ' ']
|
171
|
-
rescue StandardError, LoadError
|
172
|
-
error_message = _("!%{sub_command}! Subcommand unavailable due to error.") % { sub_command: appname }
|
173
|
-
error_message += ' ' + _("Check error logs.")
|
174
|
-
result << [error_message, '', ' ']
|
175
|
-
end
|
176
192
|
else
|
177
|
-
|
178
|
-
summary = Puppet::Application[appname].summary
|
179
|
-
if summary.empty?
|
180
|
-
summary = horribly_extract_summary_from(appname)
|
181
|
-
end
|
182
|
-
result << [appname, summary, ' ']
|
183
|
-
rescue StandardError, LoadError
|
184
|
-
error_message = _("!%{sub_command}! Subcommand unavailable due to error.") % { sub_command: appname }
|
185
|
-
error_message += ' ' + _("Check error logs.")
|
186
|
-
result << [error_message, '', ' ']
|
187
|
-
end
|
193
|
+
result << generate_summary(appname)
|
188
194
|
end
|
189
195
|
end
|
190
196
|
end
|
@@ -192,15 +198,29 @@ Puppet::Face.define(:help, '0.0.1') do
|
|
192
198
|
COMMON = 'Common:'
|
193
199
|
SPECIALIZED = 'Specialized:'
|
194
200
|
BLANK = "\n"
|
201
|
+
COMMON_APPS = %w[apply agent config help lookup module resource]
|
195
202
|
def available_application_names_special_sort
|
196
203
|
full_list = Puppet::Application.available_application_names
|
197
|
-
a_list = full_list &
|
204
|
+
a_list = full_list & COMMON_APPS
|
198
205
|
a_list = a_list.sort
|
199
206
|
also_ran = full_list - a_list
|
200
207
|
also_ran = also_ran.sort
|
201
208
|
[[COMMON], a_list, [BLANK], [SPECIALIZED], also_ran].flatten(1)
|
202
209
|
end
|
203
210
|
|
211
|
+
def common_app_summaries
|
212
|
+
COMMON_APPS.map do |appname|
|
213
|
+
generate_summary(appname)
|
214
|
+
end
|
215
|
+
end
|
216
|
+
|
217
|
+
def specialized_app_summaries
|
218
|
+
specialized_apps = Puppet::Application.available_application_names - COMMON_APPS
|
219
|
+
specialized_apps.filter_map do |appname|
|
220
|
+
generate_summary(appname) unless exclude_from_docs?(appname)
|
221
|
+
end
|
222
|
+
end
|
223
|
+
|
204
224
|
def horribly_extract_summary_from(appname)
|
205
225
|
help = Puppet::Application[appname].help.split("\n")
|
206
226
|
# Now we find the line with our summary, extract it, and return it. This
|
@@ -51,6 +51,8 @@ class Puppet::FileServing::HttpMetadata < Puppet::FileServing::Metadata
|
|
51
51
|
# Prefer the checksum_type from the indirector request options
|
52
52
|
# but fall back to the alternative otherwise
|
53
53
|
[@checksum_type, :sha256, :sha1, :md5, :mtime].each do |type|
|
54
|
+
next if type == :md5 && Puppet::Util::Platform.fips_enabled?
|
55
|
+
|
54
56
|
@checksum_type = type
|
55
57
|
@checksum = @checksums[type]
|
56
58
|
break if @checksum
|
@@ -5,7 +5,7 @@
|
|
5
5
|
# This function is compatible with the stdlib function with the same name.
|
6
6
|
#
|
7
7
|
# The function does the following:
|
8
|
-
# * For a `String`, a string
|
8
|
+
# * For a `String`, a string is returned in which the first character is uppercase.
|
9
9
|
# This is done using Ruby system locale which handles some, but not all
|
10
10
|
# special international up-casing rules (for example German double-s ß is capitalized to "Ss").
|
11
11
|
# * For an `Iterable[Variant[String, Numeric]]` (for example an `Array`) each value is capitalized and the conversion is not recursive.
|
@@ -7,6 +7,10 @@
|
|
7
7
|
# directory. (For example, the reference `mysql/mysqltuner.pl` will search for the
|
8
8
|
# file `<MODULES DIRECTORY>/mysql/files/mysqltuner.pl`.)
|
9
9
|
#
|
10
|
+
# If this function is run via puppet agent, it checks for file existence on the
|
11
|
+
# Puppet Primary server. If run via puppet apply, it checks on the local host.
|
12
|
+
# In both cases, the check is performed before any resources are changed.
|
13
|
+
#
|
10
14
|
# This function can also accept:
|
11
15
|
#
|
12
16
|
# * An absolute String path, which checks for the existence of a file from anywhere on disk.
|
@@ -40,8 +40,8 @@
|
|
40
40
|
# Note that the lambda gets the value and not an array with `[key, value]` as in other
|
41
41
|
# iterative functions.
|
42
42
|
#
|
43
|
-
# Using a lambda that accepts two values works the same way
|
44
|
-
# as the first parameter
|
43
|
+
# Using a lambda that accepts two values works the same way. The lambda gets the index/key
|
44
|
+
# as the first parameter and the value as the second parameter.
|
45
45
|
#
|
46
46
|
# @example Using the `index` function with an Array and a two-parameter lambda
|
47
47
|
#
|
@@ -97,7 +97,7 @@
|
|
97
97
|
# or `{'strategy' => 'hash'}` --- Same as the string versions of these merge behaviors.
|
98
98
|
# * `{'strategy' => 'deep', <DEEP OPTION> => <VALUE>, ...}` --- Same as `'deep'`,
|
99
99
|
# but can adjust the merge with additional options. The available options are:
|
100
|
-
# * `'knockout_prefix'` (string
|
100
|
+
# * `'knockout_prefix'` (string) --- A string prefix to indicate a
|
101
101
|
# value should be _removed_ from the final result. If a value is exactly equal
|
102
102
|
# to the prefix, it will knockout the entire element. Defaults to `undef`, which
|
103
103
|
# disables this feature.
|
data/lib/puppet/functions/new.rb
CHANGED
@@ -557,7 +557,7 @@
|
|
557
557
|
# @example Simple Conversion to String specifying the format for the given value directly
|
558
558
|
#
|
559
559
|
# ```puppet
|
560
|
-
# $str = String(10, "%#x") # produces '
|
560
|
+
# $str = String(10, "%#x") # produces '0xa'
|
561
561
|
# $str = String([10], "%(a") # produces '("10")'
|
562
562
|
# ```
|
563
563
|
#
|
@@ -20,13 +20,10 @@ Puppet::Functions.create_function(:regsubst) do
|
|
20
20
|
# - *M* Multiline regexps
|
21
21
|
# - *G* Global replacement; all occurrences of the regexp in each target string will be replaced. Without this, only the first occurrence will be replaced.
|
22
22
|
# @param encoding [Enum['N','E','S','U']]
|
23
|
-
#
|
24
|
-
# precompiled regexp). A single-character string with the following values:
|
25
|
-
# - *N* None
|
26
|
-
# - *E* EUC
|
27
|
-
# - *S* SJIS
|
28
|
-
# - *U* UTF-8
|
23
|
+
# Deprecated and ignored parameter, included only for compatibility.
|
29
24
|
# @return [Array[String], String] The result of the substitution. Result type is the same as for the target parameter.
|
25
|
+
# @deprecated
|
26
|
+
# This method has the optional encoding parameter, which is ignored.
|
30
27
|
# @example Get the third octet from the node's IP address:
|
31
28
|
# ```puppet
|
32
29
|
# $i3 = regsubst($ipaddress,'^(\\d+)\\.(\\d+)\\.(\\d+)\\.(\\d+)$','\\3')
|
@@ -56,13 +53,6 @@ Puppet::Functions.create_function(:regsubst) do
|
|
56
53
|
# - *I* Ignore case in regexps
|
57
54
|
# - *M* Multiline regexps
|
58
55
|
# - *G* Global replacement; all occurrences of the regexp in each target string will be replaced. Without this, only the first occurrence will be replaced.
|
59
|
-
# @param encoding [Enum['N','E','S','U']]
|
60
|
-
# Optional. How to handle multibyte characters when compiling the regexp (must not be used when pattern is a
|
61
|
-
# precompiled regexp). A single-character string with the following values:
|
62
|
-
# - *N* None
|
63
|
-
# - *E* EUC
|
64
|
-
# - *S* SJIS
|
65
|
-
# - *U* UTF-8
|
66
56
|
# @return [Array[String], String] The result of the substitution. Result type is the same as for the target parameter.
|
67
57
|
# @example Put angle brackets around each octet in the node's IP address:
|
68
58
|
# ```puppet
|
@@ -76,6 +66,13 @@ Puppet::Functions.create_function(:regsubst) do
|
|
76
66
|
end
|
77
67
|
|
78
68
|
def regsubst_string(target, pattern, replacement, flags = nil, encoding = nil)
|
69
|
+
if encoding
|
70
|
+
Puppet.warn_once(
|
71
|
+
'deprecations', 'regsubst_function_encoding',
|
72
|
+
_("The regsubst() function's encoding argument has been ignored since Ruby 1.9 and will be removed in a future release")
|
73
|
+
)
|
74
|
+
end
|
75
|
+
|
79
76
|
re_flags = 0
|
80
77
|
operation = :sub
|
81
78
|
unless flags.nil?
|
@@ -88,7 +85,7 @@ Puppet::Functions.create_function(:regsubst) do
|
|
88
85
|
end
|
89
86
|
end
|
90
87
|
end
|
91
|
-
inner_regsubst(target, Regexp.compile(pattern, re_flags
|
88
|
+
inner_regsubst(target, Regexp.compile(pattern, re_flags), replacement, operation)
|
92
89
|
end
|
93
90
|
|
94
91
|
def regsubst_regexp(target, pattern, replacement, flags = nil)
|
@@ -65,8 +65,9 @@
|
|
65
65
|
# *first-found* unique value, but for `Hash` it contains associations from a set of keys to the set of values clustered by the
|
66
66
|
# equality lambda (or the default value equality if no lambda was given). This makes the `unique` function more versatile for hashes
|
67
67
|
# in general, while requiring that the simple computation of "hash's unique set of values" is performed as `$hsh.map |$k, $v| { $v }.unique`.
|
68
|
-
# (
|
69
|
-
#
|
68
|
+
# (Generally, it's meaningless to compute the unique set of hash keys because they are unique by definition. However, the
|
69
|
+
# situation can change if the hash keys are processed with a different lambda for equality. For this unique computation,
|
70
|
+
# first map the hash to an array of its keys.)
|
70
71
|
# If the more advanced clustering is wanted for one of the other data types, simply transform it into a `Hash` as shown in the
|
71
72
|
# following example.
|
72
73
|
#
|
@@ -1,6 +1,7 @@
|
|
1
1
|
# frozen_string_literal: true
|
2
2
|
|
3
3
|
require 'yaml'
|
4
|
+
|
4
5
|
# The `yaml_data` is a hiera 5 `data_hash` data provider function.
|
5
6
|
# See [the configuration guide documentation](https://puppet.com/docs/puppet/latest/hiera_config_yaml_5.html#configuring-a-hierarchy-level-built-in-backends) for
|
6
7
|
# how to use this function.
|
@@ -2,6 +2,7 @@
|
|
2
2
|
|
3
3
|
require_relative '../../../puppet/environments'
|
4
4
|
require_relative '../../../puppet/node'
|
5
|
+
require_relative '../../../puppet/node/server_facts'
|
5
6
|
require_relative '../../../puppet/resource/catalog'
|
6
7
|
require_relative '../../../puppet/indirector/code'
|
7
8
|
require_relative '../../../puppet/util/profiler'
|
@@ -426,40 +427,6 @@ class Puppet::Resource::Catalog::Compiler < Puppet::Indirector::Code
|
|
426
427
|
#
|
427
428
|
# See also set_server_facts in Puppet::Server::Compiler in puppetserver.
|
428
429
|
def set_server_facts
|
429
|
-
@server_facts =
|
430
|
-
|
431
|
-
# Add our server Puppet Enterprise version, if available.
|
432
|
-
pe_version_file = '/opt/puppetlabs/server/pe_version'
|
433
|
-
if File.readable?(pe_version_file) and !File.zero?(pe_version_file)
|
434
|
-
@server_facts['pe_serverversion'] = File.read(pe_version_file).chomp
|
435
|
-
end
|
436
|
-
|
437
|
-
# Add our server version to the fact list
|
438
|
-
@server_facts["serverversion"] = Puppet.version.to_s
|
439
|
-
|
440
|
-
# And then add the server name and IP
|
441
|
-
{ "servername" => "networking.fqdn",
|
442
|
-
"serverip" => "networking.ip",
|
443
|
-
"serverip6" => "networking.ip6" }.each do |var, fact|
|
444
|
-
value = Puppet.runtime[:facter].value(fact)
|
445
|
-
unless value.nil?
|
446
|
-
@server_facts[var] = value
|
447
|
-
end
|
448
|
-
end
|
449
|
-
|
450
|
-
if @server_facts["servername"].nil?
|
451
|
-
host = Puppet.runtime[:facter].value('networking.hostname')
|
452
|
-
if host.nil?
|
453
|
-
Puppet.warning _("Could not retrieve fact servername")
|
454
|
-
elsif domain = Puppet.runtime[:facter].value('networking.domain') # rubocop:disable Lint/AssignmentInCondition
|
455
|
-
@server_facts["servername"] = [host, domain].join(".")
|
456
|
-
else
|
457
|
-
@server_facts["servername"] = host
|
458
|
-
end
|
459
|
-
end
|
460
|
-
|
461
|
-
if @server_facts["serverip"].nil? && @server_facts["serverip6"].nil?
|
462
|
-
Puppet.warning _("Could not retrieve either serverip or serverip6 fact")
|
463
|
-
end
|
430
|
+
@server_facts = Puppet::Node::ServerFacts.load
|
464
431
|
end
|
465
432
|
end
|
@@ -19,7 +19,7 @@ module Puppet::Interface::ActionManager
|
|
19
19
|
# @dsl Faces
|
20
20
|
def action(name, &block)
|
21
21
|
@actions ||= {}
|
22
|
-
Puppet.
|
22
|
+
Puppet.debug _("Redefining action %{name} for %{self}") % { name: name, self: self } if action?(name)
|
23
23
|
|
24
24
|
action = Puppet::Interface::ActionBuilder.build(self, name, &block)
|
25
25
|
|
@@ -4,18 +4,20 @@ require 'shellwords'
|
|
4
4
|
|
5
5
|
class Puppet::ModuleTool::Tar::Gnu
|
6
6
|
def unpack(sourcefile, destdir, owner)
|
7
|
-
|
7
|
+
safe_sourcefile = Shellwords.shellescape(File.expand_path(sourcefile))
|
8
8
|
destdir = File.expand_path(destdir)
|
9
|
+
safe_destdir = Shellwords.shellescape(destdir)
|
9
10
|
|
10
|
-
|
11
|
-
|
12
|
-
|
13
|
-
|
14
|
-
Puppet::Util::Execution.execute("chown -R #{owner} .")
|
15
|
-
end
|
11
|
+
Puppet::Util::Execution.execute("gzip -dc #{safe_sourcefile} | tar --extract --no-same-owner --directory #{safe_destdir} --file -")
|
12
|
+
Puppet::Util::Execution.execute(['find', destdir, '-type', 'd', '-exec', 'chmod', '755', '{}', '+'])
|
13
|
+
Puppet::Util::Execution.execute(['find', destdir, '-type', 'f', '-exec', 'chmod', 'u+rw,g+r,a-st', '{}', '+'])
|
14
|
+
Puppet::Util::Execution.execute(['chown', '-R', owner, destdir])
|
16
15
|
end
|
17
16
|
|
18
17
|
def pack(sourcedir, destfile)
|
19
|
-
|
18
|
+
safe_sourcedir = Shellwords.shellescape(sourcedir)
|
19
|
+
safe_destfile = Shellwords.shellescape(File.basename(destfile))
|
20
|
+
|
21
|
+
Puppet::Util::Execution.execute("tar cf - #{safe_sourcedir} | gzip -c > #{safe_destfile}")
|
20
22
|
end
|
21
23
|
end
|