Support Puppet v3.4

This commit is contained in:
Garrett Honeycutt 2014-02-06 14:54:43 -05:00
parent a2484ab239
commit cd5e300fa0
4 changed files with 33 additions and 38 deletions

View File

@ -8,10 +8,6 @@ rvm:
- 1.8.7 - 1.8.7
- 1.9.3 - 1.9.3
- 2.0.0 - 2.0.0
matrix:
fast_finish: true
allow_failures:
- env: PUPPET_VERSION=3.4.2
language: ruby language: ruby
before_script: "gem install --no-ri --no-rdoc bundler" before_script: "gem install --no-ri --no-rdoc bundler"
script: 'bundle exec rake validate && bundle exec rake lint && SPEC_OPTS="--format documentation" bundle exec rake spec' script: 'bundle exec rake validate && bundle exec rake lint && SPEC_OPTS="--format documentation" bundle exec rake spec'

View File

@ -8,7 +8,7 @@ The module uses exported resources to manage ssh keys and removes ssh keys that
# Compatability # # Compatability #
This module has been tested to work on the following systems with Puppet v3. This module has been tested to work on the following systems with Puppet v3 and Ruby versions 1.8.7, 1.9.3 and 2.0.0.
* Debian 7 * Debian 7
* EL 5 * EL 5

View File

@ -173,9 +173,8 @@ class ssh (
$sshd_config_subsystem_sftp_real = $sshd_config_subsystem_sftp $sshd_config_subsystem_sftp_real = $sshd_config_subsystem_sftp
} }
package { 'ssh_packages': package { $packages_real:
ensure => installed, ensure => installed,
name => $packages_real,
} }
file { 'ssh_config' : file { 'ssh_config' :
@ -185,7 +184,7 @@ class ssh (
group => $ssh_config_group, group => $ssh_config_group,
mode => $ssh_config_mode, mode => $ssh_config_mode,
content => template('ssh/ssh_config.erb'), content => template('ssh/ssh_config.erb'),
require => Package['ssh_packages'], require => Package[$packages_real],
} }
file { 'sshd_config' : file { 'sshd_config' :
@ -195,7 +194,7 @@ class ssh (
owner => $sshd_config_owner, owner => $sshd_config_owner,
group => $sshd_config_group, group => $sshd_config_group,
content => template('ssh/sshd_config.erb'), content => template('ssh/sshd_config.erb'),
require => Package['ssh_packages'], require => Package[$packages_real],
} }
if $sshd_config_banner != 'none' and $sshd_banner_content != undef { if $sshd_config_banner != 'none' and $sshd_banner_content != undef {
@ -206,7 +205,7 @@ class ssh (
group => $sshd_banner_group, group => $sshd_banner_group,
mode => $sshd_banner_mode, mode => $sshd_banner_mode,
content => $sshd_banner_content, content => $sshd_banner_content,
require => Package['ssh_packages'], require => Package[$packages_real],
} }
} }
@ -265,7 +264,7 @@ class ssh (
ensure => $ssh_key_ensure, ensure => $ssh_key_ensure,
type => $ssh_key_type, type => $ssh_key_type,
key => $key, key => $key,
require => Package['ssh_packages'], require => Package[$packages_real],
} }
# import all nodes' ssh keys # import all nodes' ssh keys

View File

@ -16,12 +16,13 @@ describe 'ssh' do
it { should_not contain_class('common')} it { should_not contain_class('common')}
['openssh-server','openssh-clients'].each do |pkg|
it { it {
should contain_package('ssh_packages').with({ should contain_package(pkg).with({
'ensure' => 'installed', 'ensure' => 'installed',
'name' => ['openssh-server','openssh-clients'],
}) })
} }
end
it { it {
should contain_file('ssh_config').with({ should contain_file('ssh_config').with({
@ -30,7 +31,7 @@ describe 'ssh' do
'owner' => 'root', 'owner' => 'root',
'group' => 'root', 'group' => 'root',
'mode' => '0644', 'mode' => '0644',
'require' => 'Package[ssh_packages]', 'require' => ['Package[openssh-server]', 'Package[openssh-clients]'],
}) })
} }
@ -49,7 +50,7 @@ describe 'ssh' do
'owner' => 'root', 'owner' => 'root',
'group' => 'root', 'group' => 'root',
'mode' => '0600', 'mode' => '0600',
'require' => 'Package[ssh_packages]', 'require' => ['Package[openssh-server]', 'Package[openssh-clients]'],
}) })
} }
@ -101,12 +102,13 @@ describe 'ssh' do
it { should_not contain_class('common')} it { should_not contain_class('common')}
['openssh-server','openssh-client'].each do |pkg|
it { it {
should contain_package('ssh_packages').with({ should contain_package(pkg).with({
'ensure' => 'installed', 'ensure' => 'installed',
'name' => ['openssh-server','openssh-client'],
}) })
} }
end
it { it {
should contain_file('ssh_config').with({ should contain_file('ssh_config').with({
@ -115,7 +117,7 @@ describe 'ssh' do
'owner' => 'root', 'owner' => 'root',
'group' => 'root', 'group' => 'root',
'mode' => '0644', 'mode' => '0644',
'require' => 'Package[ssh_packages]', 'require' => ['Package[openssh-server]', 'Package[openssh-client]'],
}) })
} }
@ -134,7 +136,7 @@ describe 'ssh' do
'owner' => 'root', 'owner' => 'root',
'group' => 'root', 'group' => 'root',
'mode' => '0600', 'mode' => '0600',
'require' => 'Package[ssh_packages]', 'require' => ['Package[openssh-server]', 'Package[openssh-client]'],
}) })
} }
@ -189,9 +191,8 @@ describe 'ssh' do
it { should_not contain_class('common')} it { should_not contain_class('common')}
it { it {
should contain_package('ssh_packages').with({ should contain_package('openssh').with({
'ensure' => 'installed', 'ensure' => 'installed',
'name' => 'openssh',
}) })
} }
@ -202,7 +203,7 @@ describe 'ssh' do
'owner' => 'root', 'owner' => 'root',
'group' => 'root', 'group' => 'root',
'mode' => '0644', 'mode' => '0644',
'require' => 'Package[ssh_packages]', 'require' => 'Package[openssh]',
}) })
} }
@ -221,7 +222,7 @@ describe 'ssh' do
'owner' => 'root', 'owner' => 'root',
'group' => 'root', 'group' => 'root',
'mode' => '0600', 'mode' => '0600',
'require' => 'Package[ssh_packages]', 'require' => 'Package[openssh]',
}) })
} }
@ -276,9 +277,8 @@ describe 'ssh' do
it { should_not contain_class('common')} it { should_not contain_class('common')}
it { it {
should contain_package('ssh_packages').with({ should contain_package('openssh').with({
'ensure' => 'installed', 'ensure' => 'installed',
'name' => 'openssh',
}) })
} }
@ -289,7 +289,7 @@ describe 'ssh' do
'owner' => 'root', 'owner' => 'root',
'group' => 'root', 'group' => 'root',
'mode' => '0644', 'mode' => '0644',
'require' => 'Package[ssh_packages]', 'require' => 'Package[openssh]',
}) })
} }
@ -308,7 +308,7 @@ describe 'ssh' do
'owner' => 'root', 'owner' => 'root',
'group' => 'root', 'group' => 'root',
'mode' => '0600', 'mode' => '0600',
'require' => 'Package[ssh_packages]', 'require' => 'Package[openssh]',
}) })
} }
@ -393,7 +393,7 @@ describe 'ssh' do
'owner' => 'root', 'owner' => 'root',
'group' => 'root', 'group' => 'root',
'mode' => '0644', 'mode' => '0644',
'require' => 'Package[ssh_packages]', 'require' => ['Package[openssh-server]', 'Package[openssh-clients]'],
}) })
} }
@ -444,7 +444,7 @@ describe 'ssh' do
'owner' => 'root', 'owner' => 'root',
'group' => 'root', 'group' => 'root',
'mode' => '0600', 'mode' => '0600',
'require' => 'Package[ssh_packages]', 'require' => ['Package[openssh-server]', 'Package[openssh-clients]'],
}) })
} }
@ -472,7 +472,7 @@ describe 'ssh' do
'group' => 'root', 'group' => 'root',
'mode' => '0644', 'mode' => '0644',
'content' => 'textinbanner', 'content' => 'textinbanner',
'require' => 'Package[ssh_packages]', 'require' => ['Package[openssh-server]', 'Package[openssh-clients]'],
}) })
} }
end end