puppet 4.10.4-x64-mingw32 → 4.10.5-x64-mingw32
Sign up to get free protection for your applications and to get access to all the features.
Potentially problematic release.
This version of puppet might be problematic. Click here for more details.
- checksums.yaml +7 -0
- data/lib/puppet/application/lookup.rb +2 -2
- data/lib/puppet/configurer/fact_handler.rb +1 -1
- data/lib/puppet/face/epp.rb +26 -24
- data/lib/puppet/file_serving/metadata.rb +2 -2
- data/lib/puppet/forge.rb +5 -3
- data/lib/puppet/forge/cache.rb +1 -0
- data/lib/puppet/forge/repository.rb +2 -1
- data/lib/puppet/indirector/catalog/compiler.rb +4 -3
- data/lib/puppet/indirector/request.rb +9 -8
- data/lib/puppet/module.rb +30 -0
- data/lib/puppet/network/http/rack/rest.rb +2 -1
- data/lib/puppet/parser/compiler.rb +4 -0
- data/lib/puppet/parser/functions/assert_type.rb +1 -1
- data/lib/puppet/parser/functions/binary_file.rb +1 -1
- data/lib/puppet/parser/functions/break.rb +1 -1
- data/lib/puppet/parser/functions/defined.rb +1 -1
- data/lib/puppet/parser/functions/dig.rb +1 -1
- data/lib/puppet/parser/functions/each.rb +1 -1
- data/lib/puppet/parser/functions/epp.rb +1 -1
- data/lib/puppet/parser/functions/filter.rb +1 -1
- data/lib/puppet/parser/functions/find_file.rb +1 -1
- data/lib/puppet/parser/functions/inline_epp.rb +1 -1
- data/lib/puppet/parser/functions/lest.rb +1 -1
- data/lib/puppet/parser/functions/map.rb +1 -1
- data/lib/puppet/parser/functions/match.rb +1 -1
- data/lib/puppet/parser/functions/new.rb +1 -1
- data/lib/puppet/parser/functions/next.rb +1 -1
- data/lib/puppet/parser/functions/reduce.rb +1 -1
- data/lib/puppet/parser/functions/return.rb +1 -1
- data/lib/puppet/parser/functions/reverse_each.rb +1 -1
- data/lib/puppet/parser/functions/slice.rb +1 -1
- data/lib/puppet/parser/functions/step.rb +1 -1
- data/lib/puppet/parser/functions/strftime.rb +1 -1
- data/lib/puppet/parser/functions/then.rb +1 -1
- data/lib/puppet/parser/functions/type.rb +1 -1
- data/lib/puppet/parser/functions/with.rb +1 -1
- data/lib/puppet/pops/evaluator/collector_transformer.rb +2 -2
- data/lib/puppet/pops/evaluator/collectors/catalog_collector.rb +2 -2
- data/lib/puppet/pops/evaluator/collectors/exported_collector.rb +2 -2
- data/lib/puppet/pops/merge_strategy.rb +1 -1
- data/lib/puppet/provider/nameservice.rb +4 -2
- data/lib/puppet/reports/http.rb +4 -2
- data/lib/puppet/resource/capability_finder.rb +1 -1
- data/lib/puppet/type/file/source.rb +9 -3
- data/lib/puppet/util.rb +122 -2
- data/lib/puppet/util/execution.rb +1 -1
- data/lib/puppet/util/rdoc/generators/puppet_generator.rb +1 -1
- data/lib/puppet/version.rb +1 -1
- data/locales/puppet.pot +12 -4
- data/spec/integration/application/apply_spec.rb +10 -0
- data/spec/integration/type/file_spec.rb +29 -0
- data/spec/integration/util/execution_spec.rb +8 -0
- data/spec/unit/application/lookup_spec.rb +1 -1
- data/spec/unit/configurer/fact_handler_spec.rb +30 -8
- data/spec/unit/face/epp_face_spec.rb +9 -0
- data/spec/unit/file_serving/metadata_spec.rb +21 -0
- data/spec/unit/forge/forge_spec.rb +112 -0
- data/spec/unit/forge/repository_spec.rb +4 -4
- data/spec/unit/functions/lookup_spec.rb +26 -0
- data/spec/unit/indirector/catalog/compiler_spec.rb +1 -1
- data/spec/unit/indirector/file_bucket_file/file_spec.rb +3 -3
- data/spec/unit/indirector/request_spec.rb +16 -1
- data/spec/unit/module_spec.rb +29 -0
- data/spec/unit/network/http/api/indirected_routes_spec.rb +3 -3
- data/spec/unit/network/http/rack/rest_spec.rb +3 -3
- data/spec/unit/type/file_spec.rb +46 -0
- data/spec/unit/util_spec.rb +230 -1
- data/tasks/parallel.rake +12 -7
- metadata +188 -212
checksums.yaml
ADDED
@@ -0,0 +1,7 @@
|
|
1
|
+
---
|
2
|
+
SHA1:
|
3
|
+
metadata.gz: 6c19b170b8df620a02545aaf47be4c0a619906d8
|
4
|
+
data.tar.gz: 6b154e20dc33776d6b6966946fffc8f35304b6eb
|
5
|
+
SHA512:
|
6
|
+
metadata.gz: 44f6c5051af30de4eca372a42383203de3ed10c472ecf4b0a92493859c02001148cf702ea82e8d692fc01cd4d4578bfcf4485604abf1907a3fb883213ab465ba
|
7
|
+
data.tar.gz: 75020276612bda62f8b9478f9f8b8b1ca5e7501045d6769b986a4d325a6a9767836dbb5fb3d83aea63713b5884798e44ff3ad95891624f7ee3ae2be8a74f7ecf
|
@@ -243,7 +243,7 @@ Copyright (c) 2015 Puppet Inc., LLC Licensed under the Apache 2.0 License
|
|
243
243
|
# raise "No node was given via the '--node' flag for the scope of the lookup.\n#{RUN_HELP}"
|
244
244
|
#end
|
245
245
|
|
246
|
-
if (options[:
|
246
|
+
if (options[:sort_merged_arrays] || options[:merge_hash_arrays] || options[:prefix]) && options[:merge] != 'deep'
|
247
247
|
raise "The options #{DEEP_MERGE_OPTIONS} are only available with '--merge deep'\n#{RUN_HELP}"
|
248
248
|
end
|
249
249
|
|
@@ -260,7 +260,7 @@ Copyright (c) 2015 Puppet Inc., LLC Licensed under the Apache 2.0 License
|
|
260
260
|
|
261
261
|
if merge == 'deep'
|
262
262
|
merge_options = {'strategy' => 'deep',
|
263
|
-
'
|
263
|
+
'sort_merged_arrays' => !options[:sort_merged_arrays].nil?,
|
264
264
|
'merge_hash_arrays' => !options[:merge_hash_arrays].nil?}
|
265
265
|
|
266
266
|
if options[:prefix]
|
data/lib/puppet/face/epp.rb
CHANGED
@@ -316,34 +316,36 @@ Puppet::Face.define(:epp, '0.0.1') do
|
|
316
316
|
options[:header] = options[:header].nil? ? true : options[:header]
|
317
317
|
|
318
318
|
compiler = create_compiler(options)
|
319
|
-
|
320
|
-
|
321
|
-
|
322
|
-
|
323
|
-
|
324
|
-
|
325
|
-
|
326
|
-
|
327
|
-
|
328
|
-
|
329
|
-
|
319
|
+
compiler.with_context_overrides('For rendering epp') do
|
320
|
+
|
321
|
+
# Print to a buffer since the face needs to return the resulting string
|
322
|
+
# and the face API is "all or nothing"
|
323
|
+
#
|
324
|
+
buffer = StringIO.new
|
325
|
+
status = true
|
326
|
+
if options[:e]
|
327
|
+
buffer.print render_inline(options[:e], compiler, options)
|
328
|
+
elsif args.empty?
|
329
|
+
if ! STDIN.tty?
|
330
|
+
buffer.print render_inline(STDIN.read, compiler, options)
|
331
|
+
else
|
332
|
+
raise Puppet::Error, "No input to process given on command line or stdin"
|
333
|
+
end
|
330
334
|
else
|
331
|
-
|
332
|
-
|
333
|
-
|
334
|
-
|
335
|
-
|
336
|
-
|
337
|
-
|
338
|
-
|
339
|
-
|
340
|
-
Puppet.err(detail.message)
|
341
|
-
status = false
|
335
|
+
show_filename = args.count > 1
|
336
|
+
file_nbr = 0
|
337
|
+
args.each do |file|
|
338
|
+
begin
|
339
|
+
buffer.print render_file(file, compiler, options, show_filename, file_nbr += 1)
|
340
|
+
rescue Puppet::ParseError => detail
|
341
|
+
Puppet.err(detail.message)
|
342
|
+
status = false
|
343
|
+
end
|
342
344
|
end
|
343
345
|
end
|
346
|
+
raise Puppet::Error, "error while rendering epp" unless status
|
347
|
+
buffer.string
|
344
348
|
end
|
345
|
-
raise Puppet::Error, "error while rendering epp" unless status
|
346
|
-
buffer.string
|
347
349
|
end
|
348
350
|
end
|
349
351
|
|
@@ -31,14 +31,14 @@ class Puppet::FileServing::Metadata < Puppet::FileServing::Base
|
|
31
31
|
|
32
32
|
def content_uri=(path)
|
33
33
|
begin
|
34
|
-
uri = URI.parse(
|
34
|
+
uri = URI.parse(Puppet::Util.uri_encode(path))
|
35
35
|
rescue URI::InvalidURIError => detail
|
36
36
|
raise(ArgumentError, "Could not understand URI #{path}: #{detail}")
|
37
37
|
end
|
38
38
|
raise(ArgumentError, "Cannot use opaque URLs '#{path}'") unless uri.hierarchical?
|
39
39
|
raise(ArgumentError, "Must use URLs of type puppet as content URI") if uri.scheme != "puppet"
|
40
40
|
|
41
|
-
@content_uri = path
|
41
|
+
@content_uri = path.encode(Encoding::UTF_8)
|
42
42
|
end
|
43
43
|
|
44
44
|
class MetaStat
|
data/lib/puppet/forge.rb
CHANGED
@@ -53,12 +53,13 @@ class Puppet::Forge < SemanticPuppet::Dependency::Source
|
|
53
53
|
# bad HTTP response
|
54
54
|
def search(term)
|
55
55
|
matches = []
|
56
|
-
uri = "/v3/modules?query=#{
|
56
|
+
uri = "/v3/modules?query=#{term}"
|
57
57
|
if Puppet[:module_groups]
|
58
|
-
uri += "&module_groups=#{Puppet[:module_groups]}"
|
58
|
+
uri += "&module_groups=#{Puppet[:module_groups].gsub('+', ' ')}"
|
59
59
|
end
|
60
60
|
|
61
61
|
while uri
|
62
|
+
# make_http_request URI encodes parameters
|
62
63
|
response = make_http_request(uri)
|
63
64
|
|
64
65
|
if response.code == '200'
|
@@ -90,11 +91,12 @@ class Puppet::Forge < SemanticPuppet::Dependency::Source
|
|
90
91
|
name = input.tr('/', '-')
|
91
92
|
uri = "/v3/releases?module=#{name}"
|
92
93
|
if Puppet[:module_groups]
|
93
|
-
uri += "&module_groups=#{Puppet[:module_groups]}"
|
94
|
+
uri += "&module_groups=#{Puppet[:module_groups].gsub('+', ' ')}"
|
94
95
|
end
|
95
96
|
releases = []
|
96
97
|
|
97
98
|
while uri
|
99
|
+
# make_http_request URI encodes parameters
|
98
100
|
response = make_http_request(uri)
|
99
101
|
|
100
102
|
if response.code == '200'
|
data/lib/puppet/forge/cache.rb
CHANGED
@@ -24,6 +24,7 @@ class Puppet::Forge
|
|
24
24
|
uri = url.is_a?(::URI) ? url : ::URI.parse(url)
|
25
25
|
unless cached_file.file?
|
26
26
|
if uri.scheme == 'file'
|
27
|
+
# CGI.unescape butchers Uris that are escaped properly
|
27
28
|
FileUtils.cp(URI.unescape(uri.path), cached_file)
|
28
29
|
else
|
29
30
|
# TODO: Handle HTTPS; probably should use repository.contact
|
@@ -57,6 +57,7 @@ class Puppet::Forge
|
|
57
57
|
end
|
58
58
|
end
|
59
59
|
|
60
|
+
# responsible for properly encoding a URI
|
60
61
|
def get_request_object(path)
|
61
62
|
headers = {
|
62
63
|
"User-Agent" => user_agent,
|
@@ -72,7 +73,7 @@ class Puppet::Forge
|
|
72
73
|
headers = headers.merge({"Authorization" => forge_authorization})
|
73
74
|
end
|
74
75
|
|
75
|
-
request = Net::HTTP::Get.new(
|
76
|
+
request = Net::HTTP::Get.new(Puppet::Util.uri_encode(path), headers)
|
76
77
|
|
77
78
|
unless @uri.user.nil? || @uri.password.nil? || forge_authorization
|
78
79
|
request.basic_auth(@uri.user, @uri.password)
|
@@ -26,7 +26,7 @@ class Puppet::Resource::Catalog::Compiler < Puppet::Indirector::Code
|
|
26
26
|
if text_facts.is_a?(Puppet::Node::Facts)
|
27
27
|
facts = text_facts
|
28
28
|
elsif format == 'pson'
|
29
|
-
# We unescape here because the corresponding code in Puppet::Configurer::FactHandler
|
29
|
+
# We unescape here because the corresponding code in Puppet::Configurer::FactHandler encodes with Puppet::Util.uri_query_encode
|
30
30
|
facts = Puppet::Node::Facts.convert_from('pson', CGI.unescape(text_facts))
|
31
31
|
else
|
32
32
|
raise ArgumentError, "Unsupported facts format"
|
@@ -105,7 +105,7 @@ class Puppet::Resource::Catalog::Compiler < Puppet::Indirector::Code
|
|
105
105
|
# This does that, while preserving any user-specified server or port.
|
106
106
|
source_path = Pathname.new(metadata.full_path)
|
107
107
|
path = source_path.relative_path_from(environment_path).to_s
|
108
|
-
source_as_uri = URI.parse(
|
108
|
+
source_as_uri = URI.parse(Puppet::Util.uri_encode(source))
|
109
109
|
server = source_as_uri.host
|
110
110
|
port = ":#{source_as_uri.port}" if source_as_uri.port
|
111
111
|
return "puppet://#{server}#{port}/#{path}"
|
@@ -130,7 +130,8 @@ class Puppet::Resource::Catalog::Compiler < Puppet::Indirector::Code
|
|
130
130
|
# for the 'modules' mount and the resolved path is of the form:
|
131
131
|
# $codedir/environments/$environment/*/*/files/**
|
132
132
|
def inlineable_metadata?(metadata, source, environment_path)
|
133
|
-
source_as_uri = URI.parse(
|
133
|
+
source_as_uri = URI.parse(Puppet::Util.uri_encode(source))
|
134
|
+
|
134
135
|
location = Puppet::Module::FILETYPES['files']
|
135
136
|
|
136
137
|
!!(source_as_uri.path =~ /^\/modules\// &&
|
@@ -41,8 +41,12 @@ class Puppet::Indirector::Request
|
|
41
41
|
end
|
42
42
|
end
|
43
43
|
|
44
|
+
# @api private
|
45
|
+
# @deprecated used only internally to be removed in Puppet 5
|
44
46
|
def escaped_key
|
45
|
-
|
47
|
+
# Puppet::Network::HTTP::API::IndirectedRoutes is the only caller to escaped_key
|
48
|
+
# and these fragments only appear in the path part of a URI
|
49
|
+
Puppet::Util.uri_encode(key)
|
46
50
|
end
|
47
51
|
|
48
52
|
# LAK:NOTE This is a messy interface to the cache, and it's only
|
@@ -143,7 +147,7 @@ class Puppet::Indirector::Request
|
|
143
147
|
|
144
148
|
def encode_params(params)
|
145
149
|
params.collect do |key, value|
|
146
|
-
"#{key}=#{
|
150
|
+
"#{key}=#{Puppet::Util.uri_query_encode(value.to_s)}"
|
147
151
|
end.join("&")
|
148
152
|
end
|
149
153
|
|
@@ -243,9 +247,8 @@ class Puppet::Indirector::Request
|
|
243
247
|
def set_uri_key(key)
|
244
248
|
@uri = key
|
245
249
|
begin
|
246
|
-
# calling
|
247
|
-
|
248
|
-
uri = URI.parse(URI.escape(key))
|
250
|
+
# calling uri_encode for UTF-8 characters will % escape them and keep them UTF-8
|
251
|
+
uri = URI.parse(Puppet::Util.uri_encode(key))
|
249
252
|
rescue => detail
|
250
253
|
raise ArgumentError, "Could not understand URL #{key}: #{detail}", detail.backtrace
|
251
254
|
end
|
@@ -274,8 +277,6 @@ class Puppet::Indirector::Request
|
|
274
277
|
@protocol = uri.scheme
|
275
278
|
end
|
276
279
|
|
277
|
-
|
278
|
-
# as UTF-8 for the sake of performing string comparisons later
|
279
|
-
@key = URI.unescape(uri.path.sub(/^\//, '')).force_encoding(Encoding::UTF_8)
|
280
|
+
@key = URI.unescape(uri.path.sub(/^\//, ''))
|
280
281
|
end
|
281
282
|
end
|
data/lib/puppet/module.rb
CHANGED
@@ -68,6 +68,17 @@ class Puppet::Module
|
|
68
68
|
load_metadata
|
69
69
|
|
70
70
|
@absolute_path_to_manifests = Puppet::FileSystem::PathPattern.absolute(manifests)
|
71
|
+
|
72
|
+
# i18n initialization for modules
|
73
|
+
if Puppet::GETTEXT_AVAILABLE
|
74
|
+
begin
|
75
|
+
initialize_i18n
|
76
|
+
rescue Exception => e
|
77
|
+
Puppet.warning _("GettextSetup initialization for %{module_name} failed with: %{error_message}") % { module_name: name, error_message: e.message }
|
78
|
+
end
|
79
|
+
else
|
80
|
+
Puppet.warning _("GettextSetup is not available, skipping GettextSetup initialization for %{module_name}.") % { module_name: name }
|
81
|
+
end
|
71
82
|
end
|
72
83
|
|
73
84
|
# @deprecated The puppetversion module metadata field is no longer used.
|
@@ -353,8 +364,27 @@ class Puppet::Module
|
|
353
364
|
self.environment == other.environment
|
354
365
|
end
|
355
366
|
|
367
|
+
def initialize_i18n
|
368
|
+
module_name = @forge_name.gsub("/","-") if @forge_name
|
369
|
+
return if module_name.nil? || i18n_initialized?(module_name)
|
370
|
+
|
371
|
+
locales_path = File.absolute_path('locales', path)
|
372
|
+
|
373
|
+
begin
|
374
|
+
GettextSetup.initialize(locales_path)
|
375
|
+
Puppet.debug "#{module_name} initialized for i18n: #{GettextSetup.translation_repositories[module_name]}"
|
376
|
+
rescue
|
377
|
+
config_path = File.absolute_path('config.yaml', locales_path)
|
378
|
+
Puppet.debug "Could not find locales configuration file for #{module_name} at #{config_path}. Skipping i18n initialization."
|
379
|
+
end
|
380
|
+
end
|
381
|
+
|
356
382
|
private
|
357
383
|
|
384
|
+
def i18n_initialized?(module_name)
|
385
|
+
GettextSetup.translation_repositories.has_key? module_name
|
386
|
+
end
|
387
|
+
|
358
388
|
def wanted_manifests_from(pattern)
|
359
389
|
begin
|
360
390
|
extended = File.extname(pattern).empty? ? "#{pattern}.pp" : pattern
|
@@ -87,7 +87,8 @@ class Puppet::Network::HTTP::RackREST
|
|
87
87
|
# in the indirector / HTTP layer which consumes this path, however, assumes
|
88
88
|
# that it has already been unescaped, so it is unescaped here.
|
89
89
|
if request.path
|
90
|
-
|
90
|
+
# don't use CGI.unescape which mangles space handling
|
91
|
+
URI.unescape(request.path.encode(Encoding::UTF_8))
|
91
92
|
end
|
92
93
|
end
|
93
94
|
|
@@ -156,6 +156,10 @@ class Puppet::Parser::Compiler
|
|
156
156
|
# Return a list of all of the defined classes.
|
157
157
|
def_delegator :@catalog, :classes, :classlist
|
158
158
|
|
159
|
+
def with_context_overrides(description = '', &block)
|
160
|
+
Puppet.override( @context_overrides , description, &block)
|
161
|
+
end
|
162
|
+
|
159
163
|
# Compiler our catalog. This mostly revolves around finding and evaluating classes.
|
160
164
|
# This is the main entry into our catalog.
|
161
165
|
def compile
|