aboutsummaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2020-11-10(maint) Allow git to use long paths in GitHub ActionsLuchian Nemes
Due to unknown environment changes in GitHub Actions runners, we encountered the following error: `fatal: cannot create directory: Filename too long` This commit allows git to use long paths in our GitHub Actions workflows.
2020-10-29Merge pull request #41 from ↵mihaibuzgau
luchihoratiu/MODULES-10815-add-slack-notification-job (MODULES-10815) Add Slack notification job
2020-10-29(MODULES-10815) Add Slack notification jobLuchian Nemes
This commit adds a job to the `[Daily] Unit Tests with nightly Puppet gem` workflow that notifies us the conclusion of it via Slack.
2020-10-16Merge pull request #40 from GabrielNagy/2.2.0_prepLuchi
(MODULES-10832) Release prep for 2.2.0
2020-10-16(MODULES-10832) Release prep for 2.2.0Gabriel Nagy
2020-10-06Merge pull request #39 from luchihoratiu/maint-github-actions-fixesGheorghe Popescu
2020-10-06Merge pull request #38 from Dorin-Pleava/MODULES-10827/alias_title_namemihaibuzgau
(MODULES-10827) Exported sshkey already exists error
2020-10-06(maint) Add pdk and blacksmith back in GemfileLuchian Nemes
During the removal of `puppet-module-dev`, the pdk and puppet-blacksmith gems were also removed by mistake. This commit makes us able to release again.
2020-10-06(maint) Replace Windows 2019 with 2016 on GitHub ActionsLuchian Nemes
Unit tests seem to be running much faster on Windows 2016 with GitHub Actions than Windows 2019.
2020-10-06(maint) Add commit summary checkLuchian Nemes
This commit adds the `commits` rake task and runs it in the Static Code Analysis workflow as a step.
2020-10-05(MODULES-10827) Exported sshkey already exists errorDorin Pleava
Using module https://github.com/ghoneycutt/puppet-module-ssh to export and collect sshkey resources from nodes, an 'already declared' error appears. This happened because when the catalog is first converted to resouces, the sshkey resource is added via https://github.com/puppetlabs/puppet/blob/main/lib/puppet/resource/catalog.rb#L137, where 'resource.ref'(https://github.com/puppetlabs/puppet/blob/main/lib/puppet/type.rb#L2548) uses 'self.title'. Since self.title goes to the title method defined in type.rb, it will return a different title than the title method from https://github.com/puppetlabs/puppetlabs-sshkeys_core/blob/main/lib/puppet/provider/sshkey/parsed.rb#L31. This mismatch try to add both resource, resulting in the 'already declared' error.
2020-09-10Merge pull request #37 from luchihoratiu/MODULES-10800mihaibuzgau
(MODULES-10800) Add GitHub Actions workflows
2020-09-10(MODULES-10800) Add GitHub Actions workflowsLuchian Nemes
Added GitHub Actions workflows for `Static Code Analysis` and `Unit Tests` that run each time there is a new `pull request` or `git push`. `Unit tests` are also set to run every workday at `05:00:00 UTC`. The `.yaml` config files of `Travis` and `AppVeyor` have been removed.
2020-09-08(maint) Remove 'puppet-module-dev' gem dependencyLuchian Nemes
In preparation for the Puppet 7 release, the `puppet-module-posix-dev-r2.7` and `puppet-module-posix-dev-r2.7` gems had to be removed from `Gemfile` due to the following dependency error: `puppet-module-posix-dev-r2.7` depends on `puppet_litmus` which depends on `bolt` which depends on `puppet` which is locked to a version below 7 Also added the needed gems that were lost in the above removal process.
2020-09-08Merge pull request #36 from ↵ciprianbadescu
Dorin-Pleava/MODULES-10760/sshkeys_core_update_beaker_4 (MODULES-10760) Bump to beaker 4
2020-09-07(MODULES-10760) Bump to beaker 4Dorin Pleava
2020-09-07Merge pull request #35 from bastelfreak/MODULES-10765Gabriel Nagy
(MODULES-10765) Implement public key certificate support
2020-09-06(MODULES-10765) Implement ecdsa-sha2-nistp521-cert-v01@openssh.com supportTim Meusel
2020-09-06(MODULES-10765) Implement ecdsa-sha2-nistp384-cert-v01@openssh.com supportTim Meusel
2020-09-06(MODULES-10765) Implement ecdsa-sha2-nistp256-cert-v01@openssh.com supportTim Meusel
2020-09-06(MODULES-10765) Implement ssh-dss-cert-v01@openssh.com supportTim Meusel
2020-09-06(MODULES-10765) Implement ssh-ed25519-cert-v01@openssh.com supportTim Meusel
2020-08-06(MODULES-10765) Implement ssh-rsa-cert-v01@openssh.com supportTim Meusel
2020-06-23Merge pull request #33 from jpogran/maint-update-puppet-vscode-idEthan J. Brown
(maint) Update Puppet VS Code Extension ID
2020-06-22Merge pull request #34 from ciprianbadescu/releaseGabriel Nagy
(MODULES-10686) release preparation for 2.1.0
2020-06-22(MODULES-10686) release preparation for 2.1.0Ciprian Badescu
2020-06-22Merge pull request #30 from GabrielNagy/maint/update-user-testsciprianbadescu
(maint) Update user type specs to match new behavior
2020-06-22(maint) Update user type specs to match new behaviorGabriel Nagy
`purge_ssh_keys` behavior will change with the next Puppet release (6.16.0). This commit updates the tests to reflect the updated behavior. See https://github.com/puppetlabs/puppet/pull/8157.
2020-06-17Merge pull request #32 from GabrielNagy/PUP-10510/purge-sshkeysmihaibuzgau
(PUP-10510) Fix sshkeys not being correctly purged
2020-06-04(maint) Update Puppet VS Code Extension IDJames Pogran
This commit updates the configuration file to point to the official Puppet VS Code Extension `puppet.puppet-vscode`
2020-05-29Merge pull request #31 from ↵mihaibuzgau
Dorin-Pleava/MODULES-10671/New_ssh_keys_types_open_ssh_8.2 (MODULES-10671) New SSH key types for OpenSSH 8.2
2020-05-27(PUP-10510) Fix sshkeys not being correctly purgedGabriel Nagy
After adding support for composite namevars in version 2.0.0, the module lost the ability to purge sshkeys. This happens due to Puppet being unable to correctly match the names and types of the sshkeys to be purged. Part of the fix was done in https://github.com/puppetlabs/puppet/pull/8174, which changes how a resource is initialized if the provider implements a `title` method. Additionally, we add the key name and type to be included in the output shown by `puppet resource`.
2020-05-25(MODULES-10671) New SSH key types for OpenSSH 8.2Dorin Pleava
Two new SSH key types were added on OpenSSH 8.2: sk-ecdsa-sha2-nistp256@openssh.com(alias ecdsa-sk) and sk-ssh-ed25519@openssh.com(alias ed25519-sk)
2020-04-03(maint) Update codeownersJosh Cooper
2020-03-13Merge pull request #28 from ciprianbadescu/releasemihaibuzgau
Release preparation for 2.0.0
2020-03-12Release preparation for 2.0.0Ciprian Badescu
2020-03-10Merge pull request #27 from ciprianbadescu/MODULES-7613/use_composite_namevarsLuchi
(MODULES-7613) use name and type as composite namevar
2020-02-25(MODULES-7613) use name and type as composite namevarCiprian Badescu
After this modification it will be possible to add two or more keys of different types for the same host
2019-10-31Merge pull request #26 from puppetlabs/pdksync_releaseJosh Cooper
pdksync - (maint) Prep for release
2019-10-31Prep for releasemihaibuzgau
2019-10-24Merge pull request #24 from joshcooper/update_pdk_1.14Jorie Tappa
(maint) Update module using pdk 1.14.0
2019-10-24(maint) Update module using pdk 1.14.0Josh Cooper
Adds vscode recommendations
2019-10-24Merge pull request #25 from puppetlabs/pdksync_update-pdkJosh Cooper
pdksync - (maint) Enable changelog-generator
2019-10-24(maint) Enable changelog-generatormihaibuzgau
2019-10-24Merge pull request #20 from GabrielNagy/MODULES-9578/create-file-as-rootmihaibuzgau
(MODULES-9578) Create ssh_authorized_key in root path
2019-10-23(MODULES-9578) Create authorized_key in root pathGabriel Nagy
Previously, when the `target` property was set, the ssh_authorized_key resource could not create directories/files within root-owned paths. This behavior is due to the module switching context to the user, then attempting to create the directory/file as the specified user, ultimately failing because of insufficient permissions. This commit adds a new parameter, `drop_privileges` which when set to false allows the module to write a ssh_authorized_key file in a privileged path. Due to the possible security implications of this, the parameter must be manually specified in order to activate this functionality. A path is considered to be privileged/trusted if all of its ancestors: - do not contain any symlinks - have the same owner as the user who runs Puppet - are not world/group writable
2019-08-20Merge pull request #21 from puppetlabs/fix-contributing-urlJosh Cooper
(maint) Fix broken readme URL and add codeowners file
2019-08-20(maint) Add CODEOWNERS fileGabriel Nagy
2019-08-14(maint) Fix broken contributing URLGabriel Nagy
2019-08-12(MODULES-9578) Add test for target attribute.Robert Vincent