aboutsummaryrefslogtreecommitdiff
path: root/spec
AgeCommit message (Collapse)Author
2023-02-14(MODULES-11371) Add Vox Beaker gemMichael Hashizume
In 057188e, we updated the module according to PDK template 7.2.1, which updated puppetlabs_spec_helper. The updated version of puppetlabs_spec_helper removed the Beaker rake task, which we use for acceptance testing. This commit adds the voxpupuli-acceptance gem, which re-adds the Beaker rake task.
2021-10-01(MODULES-11197) Update to pdk-templates 2.2.0Gabriel Nagy
Includes REFERENCE.md ToC fixes for MODULES-8183.
2021-03-11(maint) Switch to rspec-mocksGabriel Nagy
2020-10-05(MODULES-10827) Exported sshkey already exists errorDorin Pleava
Using module https://github.com/ghoneycutt/puppet-module-ssh to export and collect sshkey resources from nodes, an 'already declared' error appears. This happened because when the catalog is first converted to resouces, the sshkey resource is added via https://github.com/puppetlabs/puppet/blob/main/lib/puppet/resource/catalog.rb#L137, where 'resource.ref'(https://github.com/puppetlabs/puppet/blob/main/lib/puppet/type.rb#L2548) uses 'self.title'. Since self.title goes to the title method defined in type.rb, it will return a different title than the title method from https://github.com/puppetlabs/puppetlabs-sshkeys_core/blob/main/lib/puppet/provider/sshkey/parsed.rb#L31. This mismatch try to add both resource, resulting in the 'already declared' error.
2020-09-06(MODULES-10765) Implement ecdsa-sha2-nistp521-cert-v01@openssh.com supportTim Meusel
2020-09-06(MODULES-10765) Implement ecdsa-sha2-nistp384-cert-v01@openssh.com supportTim Meusel
2020-09-06(MODULES-10765) Implement ecdsa-sha2-nistp256-cert-v01@openssh.com supportTim Meusel
2020-09-06(MODULES-10765) Implement ssh-dss-cert-v01@openssh.com supportTim Meusel
2020-09-06(MODULES-10765) Implement ssh-ed25519-cert-v01@openssh.com supportTim Meusel
2020-08-06(MODULES-10765) Implement ssh-rsa-cert-v01@openssh.com supportTim Meusel
2020-06-22(maint) Update user type specs to match new behaviorGabriel Nagy
`purge_ssh_keys` behavior will change with the next Puppet release (6.16.0). This commit updates the tests to reflect the updated behavior. See https://github.com/puppetlabs/puppet/pull/8157.
2020-06-17Merge pull request #32 from GabrielNagy/PUP-10510/purge-sshkeysmihaibuzgau
(PUP-10510) Fix sshkeys not being correctly purged
2020-05-27(PUP-10510) Fix sshkeys not being correctly purgedGabriel Nagy
After adding support for composite namevars in version 2.0.0, the module lost the ability to purge sshkeys. This happens due to Puppet being unable to correctly match the names and types of the sshkeys to be purged. Part of the fix was done in https://github.com/puppetlabs/puppet/pull/8174, which changes how a resource is initialized if the provider implements a `title` method. Additionally, we add the key name and type to be included in the output shown by `puppet resource`.
2020-05-25(MODULES-10671) New SSH key types for OpenSSH 8.2Dorin Pleava
Two new SSH key types were added on OpenSSH 8.2: sk-ecdsa-sha2-nistp256@openssh.com(alias ecdsa-sk) and sk-ssh-ed25519@openssh.com(alias ed25519-sk)
2020-02-25(MODULES-7613) use name and type as composite namevarCiprian Badescu
After this modification it will be possible to add two or more keys of different types for the same host
2019-10-24(maint) Enable changelog-generatormihaibuzgau
2019-10-23(MODULES-9578) Create authorized_key in root pathGabriel Nagy
Previously, when the `target` property was set, the ssh_authorized_key resource could not create directories/files within root-owned paths. This behavior is due to the module switching context to the user, then attempting to create the directory/file as the specified user, ultimately failing because of insufficient permissions. This commit adds a new parameter, `drop_privileges` which when set to false allows the module to write a ssh_authorized_key file in a privileged path. Due to the possible security implications of this, the parameter must be manually specified in order to activate this functionality. A path is considered to be privileged/trusted if all of its ancestors: - do not contain any symlinks - have the same owner as the user who runs Puppet - are not world/group writable
2019-08-12(MODULES-9578) Add test for target attribute.Robert Vincent
2019-08-12(MODULES-9578) Acceptance tests should remove the authorized_keys file.Robert Vincent
2019-01-08(maint) update PDK to 1.8.0; update all templatesMelissa Stone
2018-11-28Account for pre-5 behaviorJosh Cooper
In Puppet4, the Report class requires a kind argument. Also the is_to_s and should_to_s methods returned an array of strings and a flattened array as a string. That behavior was changed in PUP-7616 (commit c14b28f9c427) so that both methods return a string as the name implies.
2018-07-25(maint) Import missed User type integration test from puppet repoJacob Helwig
2018-07-24(maint) Import the User type unit tests specific to ssh_authorized_keysJacob Helwig
Since these tests require both the User & Ssh_authorized_keys types are available, they are unlikely to be run as part of the Puppet test suite as this module is unlikely to be installed & available to Puppet's test suite. By moving the tests into this module, we can ensure that they're at least run as part of development of the module.
2018-07-17Install module on all hosts, not just those with default roleJosh Cooper
* Install module on all hosts, not just those with the default role * Remove dead comment
2018-07-02Remove test blocked on ticket marked as "Won't Do"Jacob Helwig
Since PUP-1605 was closed as "Won't Do", there doesn't seem to be much reason in keeping around an acceptance test (even if it is a pending one) that tests the scenario that PUP-1605 would have allowed.
2018-07-02Add default nodeset for acceptance testsJacob Helwig
2018-07-02Update acceptance tests to use RSpec syntaxJacob Helwig
2018-06-26Rename acceptance tests to have _spec at the endJacob Helwig
2018-06-25Remove Rubocop Performance/Caller violationJacob Helwig
Turns out that using `caller(n..n).first` is _significantly_ faster than `caller[n]`.
2018-06-25Remove Rubocop Layout/MultilineMethodCallIndentation violationsJacob Helwig
2018-06-25Remove Rubocop Style/TrailingCommaInLiteral violationJacob Helwig
2018-06-25Disable Rubocop Metrics/LineLength check for SSH key linesJacob Helwig
SSH keys are long, and splitting them into multiple lines can be error-prone, so we'll just disable the Metrics/LineLength check for lines that are SSH keys.
2018-06-25Disable Rubocop RSpec/AnyInstance check for specific instancesJacob Helwig
There isn't really a clean way to disable FileBucket backups without stubbing any_instance in these cases.
2018-06-25Remove Rubocop RSpec/DescribeMethod violationsJacob Helwig
2018-06-25Clean up hard tabs and whitespaceJacob Helwig
2018-06-25Fix duplicate test removing RSpec/RepeatedExample violationJacob Helwig
The "array host_alias" test was never actually testing against a list of host aliases, as it was using the exact same code as the "single host_alias" test. We now test against an actual array of host aliases in the manifest, and check that it is properly written out to the file.
2018-06-25Remove Rubocop RSpec/ScatteredLet violationsJacob Helwig
2018-06-25Remove Rubocop Lint/AmbiguousBlockAssociation violationJacob Helwig
2018-06-25Remove Rubocop RSpec/InstanceVariable violationsJacob Helwig
2018-06-22Remove Rubocop Style/BlockDelimiters violationsJacob Helwig
2018-06-22Clean up Rubocop Lint/ScriptPermission violationsJacob Helwig
2018-06-21Apply automatic PDK validation cleanupJacob Helwig
2018-06-21Initial sshkey type import from Puppet repositoryJacob Helwig
Imported from dbf5a8964af9b87446542d24f46534cf90f11f59 in the Puppet repo.