aboutsummaryrefslogtreecommitdiff
path: root/spec/unit
AgeCommit message (Collapse)Author
2021-10-01(MODULES-11197) Update to pdk-templates 2.2.0Gabriel Nagy
Includes REFERENCE.md ToC fixes for MODULES-8183.
2021-03-11(maint) Switch to rspec-mocksGabriel Nagy
2020-10-05(MODULES-10827) Exported sshkey already exists errorDorin Pleava
Using module https://github.com/ghoneycutt/puppet-module-ssh to export and collect sshkey resources from nodes, an 'already declared' error appears. This happened because when the catalog is first converted to resouces, the sshkey resource is added via https://github.com/puppetlabs/puppet/blob/main/lib/puppet/resource/catalog.rb#L137, where 'resource.ref'(https://github.com/puppetlabs/puppet/blob/main/lib/puppet/type.rb#L2548) uses 'self.title'. Since self.title goes to the title method defined in type.rb, it will return a different title than the title method from https://github.com/puppetlabs/puppetlabs-sshkeys_core/blob/main/lib/puppet/provider/sshkey/parsed.rb#L31. This mismatch try to add both resource, resulting in the 'already declared' error.
2020-09-06(MODULES-10765) Implement ecdsa-sha2-nistp521-cert-v01@openssh.com supportTim Meusel
2020-09-06(MODULES-10765) Implement ecdsa-sha2-nistp384-cert-v01@openssh.com supportTim Meusel
2020-09-06(MODULES-10765) Implement ecdsa-sha2-nistp256-cert-v01@openssh.com supportTim Meusel
2020-09-06(MODULES-10765) Implement ssh-dss-cert-v01@openssh.com supportTim Meusel
2020-09-06(MODULES-10765) Implement ssh-ed25519-cert-v01@openssh.com supportTim Meusel
2020-08-06(MODULES-10765) Implement ssh-rsa-cert-v01@openssh.com supportTim Meusel
2020-06-22(maint) Update user type specs to match new behaviorGabriel Nagy
`purge_ssh_keys` behavior will change with the next Puppet release (6.16.0). This commit updates the tests to reflect the updated behavior. See https://github.com/puppetlabs/puppet/pull/8157.
2020-05-25(MODULES-10671) New SSH key types for OpenSSH 8.2Dorin Pleava
Two new SSH key types were added on OpenSSH 8.2: sk-ecdsa-sha2-nistp256@openssh.com(alias ecdsa-sk) and sk-ssh-ed25519@openssh.com(alias ed25519-sk)
2020-02-25(MODULES-7613) use name and type as composite namevarCiprian Badescu
After this modification it will be possible to add two or more keys of different types for the same host
2019-10-23(MODULES-9578) Create authorized_key in root pathGabriel Nagy
Previously, when the `target` property was set, the ssh_authorized_key resource could not create directories/files within root-owned paths. This behavior is due to the module switching context to the user, then attempting to create the directory/file as the specified user, ultimately failing because of insufficient permissions. This commit adds a new parameter, `drop_privileges` which when set to false allows the module to write a ssh_authorized_key file in a privileged path. Due to the possible security implications of this, the parameter must be manually specified in order to activate this functionality. A path is considered to be privileged/trusted if all of its ancestors: - do not contain any symlinks - have the same owner as the user who runs Puppet - are not world/group writable
2018-11-28Account for pre-5 behaviorJosh Cooper
In Puppet4, the Report class requires a kind argument. Also the is_to_s and should_to_s methods returned an array of strings and a flattened array as a string. That behavior was changed in PUP-7616 (commit c14b28f9c427) so that both methods return a string as the name implies.
2018-07-24(maint) Import the User type unit tests specific to ssh_authorized_keysJacob Helwig
Since these tests require both the User & Ssh_authorized_keys types are available, they are unlikely to be run as part of the Puppet test suite as this module is unlikely to be installed & available to Puppet's test suite. By moving the tests into this module, we can ensure that they're at least run as part of development of the module.
2018-06-25Disable Rubocop Metrics/LineLength check for SSH key linesJacob Helwig
SSH keys are long, and splitting them into multiple lines can be error-prone, so we'll just disable the Metrics/LineLength check for lines that are SSH keys.
2018-06-25Remove Rubocop Lint/AmbiguousBlockAssociation violationJacob Helwig
2018-06-25Remove Rubocop RSpec/InstanceVariable violationsJacob Helwig
2018-06-22Remove Rubocop Style/BlockDelimiters violationsJacob Helwig
2018-06-22Clean up Rubocop Lint/ScriptPermission violationsJacob Helwig
2018-06-21Apply automatic PDK validation cleanupJacob Helwig
2018-06-21Initial sshkey type import from Puppet repositoryJacob Helwig
Imported from dbf5a8964af9b87446542d24f46534cf90f11f59 in the Puppet repo.