repo stringlengths 5 92 | file_url stringlengths 80 287 | file_path stringlengths 5 197 | content stringlengths 0 32.8k | language stringclasses 1
value | license stringclasses 7
values | commit_sha stringlengths 40 40 | retrieved_at stringdate 2026-01-04 15:37:27 2026-01-04 17:58:21 | truncated bool 2
classes |
|---|---|---|---|---|---|---|---|---|
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/allow_arbitrary_node_name_fact_for_agent.rb | acceptance/tests/allow_arbitrary_node_name_fact_for_agent.rb | test_name "node_name_fact should be used to determine the node name for puppet agent"
tag 'audit:high',
'audit:integration', # Tests that the server properly overrides certname with node_name fact.
# Testing of passenger master is no longer needed.
'server'
success_message = "node_n... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/ticket_15560_managehome.rb | acceptance/tests/ticket_15560_managehome.rb | test_name "#15560: Manage home directories"
tag 'audit:high',
'audit:refactor', # Use block style `test_namme`
# refactor to be OS agnostic and added to the resource/user
# tests. managehome is currently not covered there.
'audit:acceptance'
confine :to, :platfor... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/ticket_6541_invalid_filebucket_files.rb | acceptance/tests/ticket_6541_invalid_filebucket_files.rb | test_name "#6541: file type truncates target when filebucket cannot retrieve hash"
tag 'audit:high',
'audit:integration', # file type and file bucket interop
'audit:refactor' # look into combining with ticket_4622_filebucket_diff_test.rb
# Use block style `test_run`
agents.each do... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/ticket_6907_use_provider_in_same_run_it_becomes_suitable.rb | acceptance/tests/ticket_6907_use_provider_in_same_run_it_becomes_suitable.rb | test_name "providers should be useable in the same run they become suitable"
tag 'audit:high', # autoloader, core puppet agent run functionality
'audit:refactor', # Use block style `test_name`
'audit:integration' # does not require packages, probably implicitly assumed in many other places
agents.eac... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/ticket_1334_clientbucket_corrupted.rb | acceptance/tests/ticket_1334_clientbucket_corrupted.rb | test_name 'C99977 corrupted clientbucket' do
tag 'audit:high',
'audit:integration'
agents.each do |agent|
tmpfile = agent.tmpfile('c99977file')
unmanaged_content = "unmanaged\n"
unmanaged_sha = Digest::SHA256.hexdigest(unmanaged_content)
managed_content = "managed\n"
manifest = "fi... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/allow_arbitrary_node_name_for_agent.rb | acceptance/tests/allow_arbitrary_node_name_for_agent.rb | test_name "node_name_value should be used as the node name for puppet agent"
tag 'audit:high',
'audit:integration', # Tests that the server properly overrides certname with node_name fact.
# Testing of passenger master is no longer needed.
'server'
success_message = "node_name_value... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/ticket_2280_refresh_fail_should_fail_run.rb | acceptance/tests/ticket_2280_refresh_fail_should_fail_run.rb | test_name 'C100297 - A resource triggered by a refresh that fails should be reported as a failure when using --detailed-exitcodes' do
tag 'audit:high',
'audit:integration' # Service type interaction with --detailed-exitcodes
manifest =<<EOS
exec{'true':
command => 'true',
path => ['/bin', '/... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/catalog_with_binary_data.rb | acceptance/tests/catalog_with_binary_data.rb | test_name "C100300: Catalog containing binary data is applied correctly" do
require 'puppet/acceptance/common_utils'
require 'puppet/acceptance/environment_utils'
extend Puppet::Acceptance::EnvironmentUtils
require 'puppet/acceptance/agent_fqdn_utils'
extend Puppet::Acceptance::AgentFqdnUtils
tag 'risk:hi... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/ticket_9862_puppet_runs_without_service_user_or_group_present.rb | acceptance/tests/ticket_9862_puppet_runs_without_service_user_or_group_present.rb | test_name "#9862: puppet runs without service user or group present"
tag 'audit:high', # startup/configuration, high impact, low risk
'audit:refactor', # Use block style `test_name`
'audit:integration' # could easily be acceptance, not package dependant,
# but changing a person r... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/ticket_5477_master_not_dectect_sitepp.rb | acceptance/tests/ticket_5477_master_not_dectect_sitepp.rb | # In 2.6, compile does not fail when site.pp does not exist.
#
# However, if a catalog is compiled when site.pp does not exist,
# puppetmaster does not detect when site.pp is created. This requires a restart
#
test_name "Ticket 5477, Puppet Master does not detect newly created site.pp file"
tag 'audit:high',
'audi... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/ticket_6857_password-disclosure-when-changing-a-users-password.rb | acceptance/tests/ticket_6857_password-disclosure-when-changing-a-users-password.rb | test_name "#6857: redact password hashes when applying in noop mode"
tag 'audit:high',
'audit:refactor', # Use block style `test_name`
'audit:integration'
require 'puppet/acceptance/common_utils'
extend Puppet::Acceptance::CommandUtils
hosts_to_test = agents.reject do |agent|
if agent['platform'].match(... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/modulepath.rb | acceptance/tests/modulepath.rb | test_name 'Supports vendored modules' do
tag 'risk:high'
# beacon custom type emits a message so we can tell where the
# type was loaded from, e.g. vendored, global, and whether the
# type was loaded locally or pluginsynced from the master.
def beacon_type(message)
return <<END
Puppet::Type.newtype(:... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/ticket_2455_on_solaris_init_provider_should_start_service_in_own_smf_contract.rb | acceptance/tests/ticket_2455_on_solaris_init_provider_should_start_service_in_own_smf_contract.rb | test_name "(PUP-2455) Service provider should start Solaris init service in its own SMF contract"
tag 'audit:high',
'audit:refactor', # Use block style `test_name`
# Use mk_tmp_environment_with_teardown
# Combine with Service resource tests
'audit:acceptance' # Se... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/ticket_13948_lib_dir_hook_should_be_called_on_initialization.rb | acceptance/tests/ticket_13948_lib_dir_hook_should_be_called_on_initialization.rb | test_name "the $libdir setting hook is called on startup"
require 'puppet/acceptance/temp_file_utils'
extend Puppet::Acceptance::TempFileUtils
tag 'audit:high', # tests basic custom module/pluginsync handling?
'audit:refactor', # Use block style `test_namme`
'audit:integration',
'server'
initial... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/ticket_5592_hiera_lookup_when_param_undef.rb | acceptance/tests/ticket_5592_hiera_lookup_when_param_undef.rb | test_name 'Ensure hiera lookup occurs if class param is undef' do
tag 'audit:high',
'audit:unit' # basic auto lookup functionality
agents.each do |agent|
testdir = agent.tmpdir('undef')
step 'Setup - create hiera data file and test module' do
##{{{
manifest =<<-PP
File {
ensure => dire... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/pluginsync/4420_pluginfacts_should_be_resolvable_on_agent.rb | acceptance/tests/pluginsync/4420_pluginfacts_should_be_resolvable_on_agent.rb | test_name "Pluginsync'ed external facts should be resolvable on the agent" do
tag 'audit:high',
'audit:integration'
#
# This test is intended to ensure that external facts downloaded onto an agent via
# pluginsync are resolvable. In Linux, the external fact should have the same
# permissions as its source on t... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/pluginsync/3935_pluginsync_should_follow_symlinks.rb | acceptance/tests/pluginsync/3935_pluginsync_should_follow_symlinks.rb | test_name "pluginsync should not error when modulepath is a symlink and no modules have plugin directories"
tag 'audit:high',
'audit:integration',
'server'
step "Create a modulepath directory which is a symlink and includes a module without facts.d or lib directories"
basedir = master.tmpdir("symlink_modulepa... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/pluginsync/4847_pluginfacts_should_be_resolvable_from_applications.rb | acceptance/tests/pluginsync/4847_pluginfacts_should_be_resolvable_from_applications.rb | test_name "Pluginsync'ed custom facts should be resolvable during application runs" do
tag 'audit:high',
'audit:integration'
#
# This test is intended to ensure that custom facts downloaded onto an agent via
# pluginsync are resolvable by puppet applications besides agent/apply.
#
require 'puppet/a... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/pluginsync/files_earlier_in_modulepath_take_precendence.rb | acceptance/tests/pluginsync/files_earlier_in_modulepath_take_precendence.rb | test_name "earlier modules take precendence over later modules in the modulepath"
tag 'audit:high',
'audit:integration',
'server'
step "Create some modules in the modulepath"
basedir = master.tmpdir("module_precedence")
module_dir1 = "#{basedir}/environments/production/modules1"
module_dir2 = "#{basedir}/mod... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/pluginsync/7316_apps_should_be_available_via_pluginsync.rb | acceptance/tests/pluginsync/7316_apps_should_be_available_via_pluginsync.rb | test_name 'the pluginsync functionality should sync app definitions, and they should be runnable afterwards' do
tag 'audit:high',
'audit:integration'
#
# This test is intended to ensure that pluginsync syncs app definitions to the agents.
# Further, the apps should be runnable on the agent after the syn... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/pluginsync/7316_faces_with_app_stubs_should_be_available_via_pluginsync.rb | acceptance/tests/pluginsync/7316_faces_with_app_stubs_should_be_available_via_pluginsync.rb | test_name "the pluginsync functionality should sync app definitions, and they should be runnable afterwards"
tag 'audit:high',
'audit:integration',
'server'
#
# This test is intended to ensure that pluginsync syncs face definitions to the agents.
# Further, the face should be runnable on the agent after the s... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/pluginsync/feature/pluginsync_should_sync_features.rb | acceptance/tests/pluginsync/feature/pluginsync_should_sync_features.rb | test_name "the pluginsync functionality should sync feature and function definitions" do
tag 'audit:high',
'audit:integration'
#
# This test is intended to ensure that pluginsync syncs feature definitions to
# the agents. It checks the feature twice; once to make sure that it gets
# loaded successful... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/service/puppet_service_management.rb | acceptance/tests/resource/service/puppet_service_management.rb | test_name "The Puppet service should be manageable with Puppet"
tag 'audit:high',
'audit:refactor', # Use block style `test_name`
'audit:acceptance' # uses services from a running puppet-agent install
#
# This test is intended to ensure that the Puppet service can
# be directly managed by Puppet. See PUP-5053... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/service/should_not_change_the_system.rb | acceptance/tests/resource/service/should_not_change_the_system.rb | test_name "`puppet resource service` should list running services without calling dangerous init scripts"
tag 'audit:high',
'audit:refactor', # Use block style `test_name`
'audit:integration' # Doesn't change the system it runs on
confine :except, :platform => 'windows'
confine :except, :platform => 'solari... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/service/AIX_service_provider.rb | acceptance/tests/resource/service/AIX_service_provider.rb | test_name 'AIX Service Provider Testing'
tag 'audit:high',
'audit:refactor', # Use block style `test_name`
'audit:acceptance' # Could be done at the integration (or unit) layer though
# actual changing of resources could irreparably damage a
# host running this, o... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/service/puppet_service_runs_puppet.rb | acceptance/tests/resource/service/puppet_service_runs_puppet.rb | require 'puppet/acceptance/service_utils'
extend Puppet::Acceptance::ServiceUtils
test_name 'Starting the puppet service should successfully run puppet' do
tag 'audit:high',
'audit:acceptance'
skip_test 'requires a server node to run puppet agent -t' unless master
agents.each do |agent|
statedir = o... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/service/service_enable_linux.rb | acceptance/tests/resource/service/service_enable_linux.rb | test_name 'SysV and Systemd Service Provider Validation'
tag 'audit:high',
'audit:refactor', # Investigate merging with init_on_systemd.rb
# Use block style `test_name`
'audit:acceptance' # Could be done at the integration (or unit) layer though
# actual changing ... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/service/windows_mixed_utf8.rb | acceptance/tests/resource/service/windows_mixed_utf8.rb | # coding: utf-8
test_name "Windows Service Provider With Mixed UTF-8 Service Names" do
confine :to, :platform => 'windows'
tag 'audit:high',
'audit:acceptance'
require 'puppet/acceptance/windows_utils'
extend Puppet::Acceptance::WindowsUtils
def service_manifest(name, params)
params_str = params.... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/service/ticket_5024_systemd_enabling_masked_service.rb | acceptance/tests/resource/service/ticket_5024_systemd_enabling_masked_service.rb | require 'puppet/acceptance/service_utils'
extend Puppet::Acceptance::ServiceUtils
test_name 'Systemd masked services are unmasked before attempting to start'
tag 'audit:high',
'audit:refactor', # Use block style `test_run`
'audit:acceptance' # Could be done at the integration (or unit) layer though
... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/service/launchd_provider.rb | acceptance/tests/resource/service/launchd_provider.rb | test_name 'Mac OS X launchd Provider Testing'
tag 'audit:high',
'audit:refactor', # Use block style `test_name`
'audit:acceptance' # Could be done at the integration (or unit) layer though
# actual changing of resources could irreparably damage a
# host running th... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/service/should_query_all.rb | acceptance/tests/resource/service/should_query_all.rb | test_name "should query all services"
tag 'audit:high',
'audit:refactor', # Investigate combining with should_not_change_the_system.rb
# Use block style `test_name`
'audit:integration' # Doesn't change the system it runs on
agents.each do |agent|
step "query with puppet"
on(agent... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/service/init_on_systemd.rb | acceptance/tests/resource/service/init_on_systemd.rb | test_name 'SysV on default Systemd Service Provider Validation' do
confine :to, :platform => /el-[6-8]|centos|fedora-(2[0-9])/ do |h|
result = on(h, 'which systemctl', :acceptable_exit_codes => [0, 1])
result.stdout =~ /systemctl/
end
tag 'audit:high',
'audit:acceptance' # Could be done at the int... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/service/systemd_resource_shows_correct_output.rb | acceptance/tests/resource/service/systemd_resource_shows_correct_output.rb | require 'puppet/acceptance/service_utils'
extend Puppet::Acceptance::ServiceUtils
test_name 'systemd service shows correct output when queried with "puppet resource"' do
tag 'audit:high'
skip_test 'requires puppet service script from AIO agent package' if @options[:type] != 'aio'
package_name = 'puppet'
# ... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/service/windows.rb | acceptance/tests/resource/service/windows.rb | test_name "Windows Service Provider" do
confine :to, :platform => 'windows'
tag 'audit:high',
'audit:acceptance'
require 'puppet/acceptance/windows_utils'
extend Puppet::Acceptance::WindowsUtils
require 'puppet/acceptance/service_utils'
extend Puppet::Acceptance::ServiceUtils
def service_manifes... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/service/smf_basic_tests.rb | acceptance/tests/resource/service/smf_basic_tests.rb | test_name "SMF: basic tests" do
confine :to, :platform => 'solaris'
tag 'audit:high',
'audit:acceptance' # Could be done at the integration (or unit) layer though
# actual changing of resources could irreparably damage a
# host running this, or require specia... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/file/should_default_mode.rb | acceptance/tests/resource/file/should_default_mode.rb | test_name "file resource: set default modes"
tag 'audit:high',
'audit:refactor', # Use block style `test_name`
'audit:acceptance'
def regexp_mode(mode)
Regexp.new("mode\s*=>\s*'0?#{mode}'")
end
agents.each do |agent|
step "setup"
parent = agent.tmpdir('default-mode-parent')
on(agent, "rm -rf #{paren... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/file/content_attribute.rb | acceptance/tests/resource/file/content_attribute.rb | test_name "Content Attribute"
tag 'audit:high',
'audit:refactor', # Use block stype test_name
'audit:acceptance'
agents.each do |agent|
target = agent.tmpfile('content_file_test')
step "Ensure the test environment is clean"
on agent, "rm -f #{target}"
step "Content Attribute: using raw content"
... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/file/should_remove_dir.rb | acceptance/tests/resource/file/should_remove_dir.rb | test_name "should remove directory, but force required"
tag 'audit:high',
'audit:refactor', # Use block style `test_name`
'audit:acceptance'
agents.each do |agent|
target = agent.tmpdir("delete-dir")
step "clean up the system before we begin"
on(agent, "rm -rf #{target} ; mkdir -p #{target}")
step ... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/file/ticket_7680-follow-symlinks.rb | acceptance/tests/resource/file/ticket_7680-follow-symlinks.rb | test_name "#7680: 'links => follow' should use the file source content"
tag 'audit:high',
'audit:refactor', # Use block style `test_name`
'audit:acceptance'
agents.each do |agent|
step "Create file content"
real_source = agent.tmpfile('follow_links_source')
dest = agent.tmpfile('follow_links_d... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/file/ascii_diff_output_content_attribute.rb | acceptance/tests/resource/file/ascii_diff_output_content_attribute.rb | test_name "ASCII Diff Output of Content Attribute" do
tag 'audit:high',
'audit:acceptance'
sha256 = Digest::SHA256.new
agents.each do |agent|
step 'When handling ASCII files' do
target = agent.tmpfile('content_ASCII_file_test')
initial_text = 'Initial Text'
initial_text_sha_checksum =... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/file/symbolic_modes.rb | acceptance/tests/resource/file/symbolic_modes.rb | test_name 'file resource: symbolic modes' do
confine :except, :platform => /^windows/
confine :to, {}, hosts.select {|host| !host[:roles].include?('master')}
tag 'audit:high',
'audit:acceptance'
require 'puppet/acceptance/temp_file_utils'
extend Puppet::Acceptance::TempFileUtils
class FileSymlink
... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/file/ticket_8740_should_not_enumerate_root_directory.rb | acceptance/tests/resource/file/ticket_8740_should_not_enumerate_root_directory.rb | test_name "#8740: should not enumerate root directory"
confine :except, :platform => 'windows'
confine :except, :platform => 'osx'
tag 'audit:high',
'audit:refactor', # Use block style `test_name`
'audit:acceptance'
target = "/test-socket-#{$$}"
require 'puppet/acceptance/common_utils'
extend Puppet::Acce... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/file/handle_fifo_files.rb | acceptance/tests/resource/file/handle_fifo_files.rb | test_name "should be able to handle fifo files"
tag 'audit:high',
'audit:acceptance'
confine :except, :platform => /windows/
def ensure_content_to_file_manifest(file_path, ensure_value)
return <<-MANIFEST
file { "#{file_path}":
ensure => #{ensure_value},
content => "Hello World"
}
MANIFEST
end
age... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/file/source_attribute.rb | acceptance/tests/resource/file/source_attribute.rb | test_name "The source attribute" do
require 'puppet/acceptance/module_utils'
extend Puppet::Acceptance::ModuleUtils
tag 'audit:high',
'audit:acceptance',
'server'
@target_file_on_windows = 'C:/windows/temp/source_attr_test'
@target_file_on_nix = '/tmp/source_attr_test'
@target_dir_on_windo... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/file/bin_diff_output_content_attribute.rb | acceptance/tests/resource/file/bin_diff_output_content_attribute.rb | test_name "Binary Diff Output of Content Attribute" do
tag 'audit:high',
'audit:acceptance'
# cannot test binary diff on windows2012r2_ja-64-1
# Error: Could not write report for afire-lien.delivery.puppetlabs.net at C:/ProgramData/PuppetLabs/puppet/cache/reports/afire-lien.delivery.puppetlabs.net/20191204... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/file/handle_fifo_files_when_recursing.rb | acceptance/tests/resource/file/handle_fifo_files_when_recursing.rb | test_name "should be able to handle fifo files when recursing"
tag 'audit:high',
'audit:acceptance'
confine :except, :platform => /windows/
def ensure_owner_recursively_manifest(path, owner_value)
return <<-MANIFEST
file { "#{path}":
ensure => present,
recurse => true,
owner => #{owner_value}
... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/file/should_remove_file.rb | acceptance/tests/resource/file/should_remove_file.rb | test_name "should remove file"
tag 'audit:high',
'audit:refactor', # Use block style `test_name`
'audit:acceptance'
agents.each do |agent|
target = agent.tmpfile('delete-file')
step "clean up the system before we begin"
on agent, "rm -rf #{target} && touch #{target}"
step "verify we can remove a fi... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/file/should_create_directory.rb | acceptance/tests/resource/file/should_create_directory.rb | test_name "should create directory"
tag 'audit:high',
'audit:refactor', # Use block style `test_name`
'audit:acceptance'
agents.each do |agent|
target = agent.tmpfile("create-dir")
teardown do
step "clean up after the test run" do
on(agent, "rm -rf #{target}")
end
end
step "verify we c... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/file/should_create_empty.rb | acceptance/tests/resource/file/should_create_empty.rb | test_name "should create empty file for 'present'"
tag 'audit:high',
'audit:refactor', # Use block style `test_name`
'audit:acceptance'
agents.each do |agent|
target = agent.tmpfile("empty")
step "clean up the system before we begin"
on(agent, "rm -rf #{target}")
step "verify we can create an empty... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/file/should_create_symlink.rb | acceptance/tests/resource/file/should_create_symlink.rb | test_name "should create symlink"
tag 'audit:high',
'audit:refactor', # Use block style `test_name`
'audit:acceptance'
def message
'hello world'
end
def reset_link_and_target(agent, link, target)
step "clean up the system before we begin"
on agent, "rm -rf #{target} #{link}"
on agent, "echo '#{messa... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/file/ticket_6448_file_with_utf8_source.rb | acceptance/tests/resource/file/ticket_6448_file_with_utf8_source.rb | test_name 'Ensure a file resource can have a UTF-8 source attribute, content, and path when served via a module' do
tag 'audit:high',
'broken:images',
'audit:acceptance',
'server'
require 'puppet/acceptance/environment_utils'
extend Puppet::Acceptance::EnvironmentUtils
require 'puppet/accept... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/user/should_modify_while_managing_home.rb | acceptance/tests/resource/user/should_modify_while_managing_home.rb | test_name "should modify a user without changing home directory (pending #19542)"
tag 'audit:high',
'audit:refactor', # Use block style `test_run`
'audit:acceptance' # Could be done as integration tests, but would
# require changing the system running the test
# i... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/user/should_manage_roles_on_windows.rb | acceptance/tests/resource/user/should_manage_roles_on_windows.rb | test_name "Manage roles for a Windows user" do
confine :to, :platform => 'windows'
tag 'audit:high',
'audit:acceptance'
require 'puppet/acceptance/windows_utils'
extend Puppet::Acceptance::WindowsUtils
def user_manifest(name, params)
params_str = params.map do |param, value|
value_str = val... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/user/should_manage_groups.rb | acceptance/tests/resource/user/should_manage_groups.rb | test_name "should correctly manage the groups property for the User resource" do
# NOTE: These tests run for only some of our supported platforms.
# We should eventually update them to work with all of our
# supported platforms where managing the groups property makes
# sense.
confine :except, :platform => /... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/user/should_modify_gid_forcelocal.rb | acceptance/tests/resource/user/should_modify_gid_forcelocal.rb | test_name "verify that we can modify the gid with forcelocal" do
confine :to, :platform => /el|fedora/ # PUP-5358
require 'puppet/acceptance/common_utils'
extend Puppet::Acceptance::PackageUtils
extend Puppet::Acceptance::ManifestUtils
tag 'audit:high'
user = "u#{rand(99999).to_i}"
group1 = "#{user}o"
... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/user/should_manage_purge_ssh_keys.rb | acceptance/tests/resource/user/should_manage_purge_ssh_keys.rb | test_name 'should manage purge_ssh_keys' do
tag 'audit:high',
'audit:acceptance'
# MODULES-11236
skip_test('This test does not work on Windows nor macOS') if agent['platform'] =~ /windows/ || agent['platform'] =~ /osx/
name = "usr#{rand(9999).to_i}"
agents.each do |agent|
home = agent.tmpdir(name... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/user/should_not_modify_disabled.rb | acceptance/tests/resource/user/should_not_modify_disabled.rb | test_name 'PUP-6586 Ensure puppet does not continually reset password for disabled user' do
confine :to, :platform => 'windows'
tag 'audit:high',
'audit:acceptance' # Could be done as integration tests, but would
# require changing the system running the test
... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/user/utf8_user_comments.rb | acceptance/tests/resource/user/utf8_user_comments.rb | # Ensure a user can be managed with UTF-8 comment value. The comment value is
# normally used for "Full Name" so this is important in a UTF-8 context.
# We should be able to:
# - create a new user with a UTF-8 comment
# - modify an existing UTF-8 comment to a new UTF-8 comment
# - modify an existing UTF-8 comment to an... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/user/should_modify.rb | acceptance/tests/resource/user/should_modify.rb | test_name "should modify a user"
tag 'audit:high',
'audit:refactor', # Use block style `test_run`
'audit:acceptance' # Could be done as integration tests, but would
# require changing the system running the test
# in ways that might require special permissions
... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/user/should_destroy_with_managehome.rb | acceptance/tests/resource/user/should_destroy_with_managehome.rb | test_name "should delete a user with managehome=true" do
confine :except, :platform => /osx/
tag 'audit:high',
'audit:acceptance' # Could be done as integration tests, but would
# require changing the system running the test
# in ways that might require speci... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/user/should_purge.rb | acceptance/tests/resource/user/should_purge.rb | test_name "should purge a user" do
# Until purging works on AIX, Solaris, and OSX. See PUP-9188
confine :except, :platform => /^aix/
confine :except, :platform => /^solaris/
confine :except, :platform => /^osx/
tag 'audit:high',
'audit:acceptance'
agents.each do |agent|
unmanaged = "unmanaged-#{r... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/user/should_allow_managed_macos_users_to_login.rb | acceptance/tests/resource/user/should_allow_managed_macos_users_to_login.rb | test_name "should allow managed macOS users to login" do
confine :to, :platform => /osx/
tag 'audit:high',
'audit:acceptance' # Could be done as integration tests, but would
# require changing the system running the test
# in ways that might require special ... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/user/should_manage_attributes_aix.rb | acceptance/tests/resource/user/should_manage_attributes_aix.rb | test_name "should correctly manage the attributes property for the User resource (AIX only)" do
confine :to, :platform => /aix/
tag 'audit:high',
'audit:acceptance' # Could be done as integration tests, but would
# require changing the system running the test
... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/user/should_modify_gid.rb | acceptance/tests/resource/user/should_modify_gid.rb | test_name "verify that we can modify the gid"
confine :except, :platform => 'windows'
confine :except, :platform => /aix/ # PUP-5358
tag 'audit:high',
'audit:refactor', # Use block style `test_run`
'audit:acceptance' # Could be done as integration tests, but would
# require changing the... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/user/should_not_create_existing.rb | acceptance/tests/resource/user/should_not_create_existing.rb | test_name "tests that user resource will not add users that already exist." do
tag 'audit:high',
'audit:acceptance' # Could be done as integration tests, but would
# require changing the system running the test
# in ways that might require special permissions
... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/user/should_destroy.rb | acceptance/tests/resource/user/should_destroy.rb | test_name "should delete a user"
tag 'audit:high',
'audit:refactor', # Use block style `test_run`
'audit:acceptance' # Could be done as integration tests, but would
# require changing the system running the test
# in ways that might require special permissions
... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/user/should_not_destroy_unexisting.rb | acceptance/tests/resource/user/should_not_destroy_unexisting.rb | test_name "ensure that puppet does not report removing a user that does not exist"
tag 'audit:high',
'audit:refactor', # Use block style `test_run`
'audit:acceptance' # Could be done as integration tests, but would
# require changing the system running the test
# ... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/user/should_query_all.rb | acceptance/tests/resource/user/should_query_all.rb | test_name "should query all users"
tag 'audit:high',
'audit:refactor', # Use block style `test_run`
'audit:integration'
agents.each do |agent|
next if agent == master
skip_test('this test fails on windows French due to Cygwin/UTF Issues - PUP-8319,IMAGES-492') if agent['platform'] =~ /windows/ && agent['... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/user/should_create_with_gid.rb | acceptance/tests/resource/user/should_create_with_gid.rb | test_name "verifies that puppet resource creates a user and assigns the correct group"
confine :except, :platform => 'windows'
tag 'audit:high',
'audit:refactor', # Use block style `test_run`
'audit:acceptance' # Could be done as integration tests, but would
# require changing the syste... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/user/should_modify_when_not_managing_home.rb | acceptance/tests/resource/user/should_modify_when_not_managing_home.rb | test_name "should modify a user when no longer managing home (#20726)"
tag 'audit:high',
'audit:refactor', # Use block style `test_run`
'audit:acceptance' # Could be done as integration tests, but would
# require changing the system running the test
# in ways that... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/user/should_create_with_expiry_absent.rb | acceptance/tests/resource/user/should_create_with_expiry_absent.rb | test_name "verifies that puppet resource creates a user and assigns the correct expiry date when absent" do
confine :except, :platform => 'windows'
tag 'audit:high',
'audit:acceptance' # Could be done as integration tests, but would
# require changing the system running the test
... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/user/osx_10.4_should_fail_when_modify_home.rb | acceptance/tests/resource/user/osx_10.4_should_fail_when_modify_home.rb | test_name "should not modify the home directory of an user on OS X >= 10.14" do
confine :to, :platform => /osx/
tag 'audit:high',
'audit:acceptance' # Could be done as integration tests, but would
# require changing the system running the test
# in ways that mi... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/user/should_create.rb | acceptance/tests/resource/user/should_create.rb | test_name "should create a user"
tag 'audit:high',
'audit:refactor', # Use block style `test_run`
'audit:acceptance' # Could be done as integration tests, but would
# require changing the system running the test
# in ways that might require special permissions
... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/user/should_create_modify_with_password.rb | acceptance/tests/resource/user/should_create_modify_with_password.rb | # frozen_string_literal: true
test_name 'should create a user with password and modify the password' do
tag 'audit:high',
'audit:acceptance' # Could be done as integration tests, but would
# require changing the system running the test
# in ways that might require special permissions
# or be harmful to ... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/user/osx_10.4_should_fail_when_modify_uid.rb | acceptance/tests/resource/user/osx_10.4_should_fail_when_modify_uid.rb | test_name "should not modify the uid of an user on OS X >= 10.14" do
confine :to, :platform => /osx/
tag 'audit:high',
'audit:acceptance' # Could be done as integration tests, but would
# require changing the system running the test
# in ways that might require... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/user/should_manage_shell.rb | acceptance/tests/resource/user/should_manage_shell.rb | test_name "should manage user shell"
tag 'audit:high',
'audit:refactor', # Use block style `test_run`
'audit:acceptance' # Could be done as integration tests, but would
# require changing the system running the test
# in ways that might require special permissions... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/user/should_query.rb | acceptance/tests/resource/user/should_query.rb | test_name "test that we can query and find a user that exists."
tag 'audit:high',
'audit:refactor', # Use block style `test_run`
'audit:acceptance' # Could be done as integration tests, but would
# require changing the system running the test
# in ways that might ... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/exec/should_run_command_as_user.rb | acceptance/tests/resource/exec/should_run_command_as_user.rb | test_name "The exec resource should be able to run commands as a different user" do
confine :except, :platform => 'windows'
tag 'audit:high',
'audit:acceptance'
require 'puppet/acceptance/common_utils'
extend Puppet::Acceptance::BeakerUtils
def random_username
"pl#{rand(999999).to_i}"
end
de... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/exec/should_run_command.rb | acceptance/tests/resource/exec/should_run_command.rb | test_name "tests that puppet correctly runs an exec."
# original author: Dan Bode --daniel 2010-12-23
tag 'audit:high',
'audit:refactor', # Use block style `test_name`
'audit:acceptance'
def before(agent)
step "file to be touched should not exist."
agent.tmpfile('test-exec')
end
def after(agent, touch... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/exec/accept_array_commands.rb | acceptance/tests/resource/exec/accept_array_commands.rb | test_name "Be able to execute array commands" do
tag 'audit:high',
'audit:acceptance'
agents.each do |agent|
if agent.platform =~ /windows/
cmd = ['C:\Windows\System32\cmd.exe', '/c', 'echo', '*']
else
cmd = ['/bin/echo', '*']
end
exec_manifest = <<~MANIFEST
exec { "test ex... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/exec/should_set_environment_variables.rb | acceptance/tests/resource/exec/should_set_environment_variables.rb | test_name "The Exec resource should set user-specified environment variables" do
tag 'audit:high',
'audit:acceptance'
# Would be nice to parse the actual values from puppet_output,
# but that would require some complicated matching since
# puppet_output contains other stuff.
def assert_env_var_values(p... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/exec/should_run_command_in_cwd.rb | acceptance/tests/resource/exec/should_run_command_in_cwd.rb | test_name "The Exec resource should run commands in the specified cwd" do
tag 'audit:high',
'audit:acceptance'
confine :except, :platform => /debian-12-amd64/ # PUP-12020
require 'puppet/acceptance/windows_utils'
extend Puppet::Acceptance::WindowsUtils
# Useful utility that converts a string literal
... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/exec/accept_multi-line_commands.rb | acceptance/tests/resource/exec/accept_multi-line_commands.rb | test_name "Be able to execute multi-line commands (#9996)"
confine :except, :platform => 'windows'
tag 'audit:high',
'audit:refactor', # Use block style `test_name`
'audit:acceptance'
agents.each do |agent|
temp_file_name = agent.tmpfile('9996-multi-line-commands')
test_manifest = <<HERE
exec { "test exe... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/exec/should_not_run_command_creates.rb | acceptance/tests/resource/exec/should_not_run_command_creates.rb | test_name "should not run command creates"
tag 'audit:high',
'audit:refactor', # Use block style `test_name`
'audit:acceptance'
agents.each do |agent|
touch = agent.tmpfile('touched')
donottouch = agent.tmpfile('not-touched')
manifest = %Q{
exec { "test#{Time.new.to_i}": command => '#{agent.touch... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/exec/should_run_bad_command.rb | acceptance/tests/resource/exec/should_run_bad_command.rb | test_name "tests that puppet can run badly written scripts that fork and inherit descriptors"
tag 'audit:high',
'audit:refactor', # Use block style `test_name`
'audit:acceptance'
def sleepy_daemon_script(agent)
if agent['platform'] =~ /win/
# Windows uses a shorter sleep, because it's expected to wait ... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/exec/should_set_path.rb | acceptance/tests/resource/exec/should_set_path.rb | test_name "the path statement should work to locate commands"
tag 'audit:high',
'audit:refactor', # Use block style `test_name`
'audit:acceptance'
agents.each do |agent|
file = agent.tmpfile('touched-should-set-path')
step "clean up the system for the test"
on agent, "rm -f #{file}"
step "invoke th... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/exec/should_accept_large_output.rb | acceptance/tests/resource/exec/should_accept_large_output.rb | test_name "tests that puppet correctly captures large and empty output."
tag 'audit:high',
'audit:refactor', # Use block style `test_name`
'audit:acceptance'
agents.each do |agent|
testfile = agent.tmpfile('should_accept_large_output')
# Generate >64KB file to exceed pipe buffer.
lorem_ipsum = <<EOF
L... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/group/should_manage_attributes_aix.rb | acceptance/tests/resource/group/should_manage_attributes_aix.rb | test_name "should correctly manage the attributes property for the Group (AIX only)" do
confine :to, :platform => /aix/
tag 'audit:high',
'audit:acceptance' # Could be done as integration tests, but would
# require changing the system running the test
# in ... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/group/should_modify_gid.rb | acceptance/tests/resource/group/should_modify_gid.rb | test_name "should modify gid of existing group"
confine :except, :platform => 'windows'
tag 'audit:high',
'audit:refactor', # Use block style `test_name`
'audit:acceptance' # Could be done at the integration (or unit) layer though
# actual changing of resources could irreparably damage ... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/group/should_not_create_existing.rb | acceptance/tests/resource/group/should_not_create_existing.rb | test_name "group should not create existing group"
tag 'audit:high',
'audit:refactor', # Use block style `test_name`
'audit:acceptance' # Could be done at the integration (or unit) layer though
# actual changing of resources could irreparably damage a
# host runni... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/group/should_destroy.rb | acceptance/tests/resource/group/should_destroy.rb | test_name "should destroy a group"
tag 'audit:high',
'audit:refactor', # Use block style `test_name`
'audit:acceptance' # Could be done at the integration (or unit) layer though
# actual changing of resources could irreparably damage a
# host running this, or requ... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/group/should_not_destroy_unexisting.rb | acceptance/tests/resource/group/should_not_destroy_unexisting.rb | test_name "should not destroy a group that doesn't exist"
tag 'audit:high',
'audit:refactor', # Use block style `test_name`
'audit:acceptance' # Could be done at the integration (or unit) layer though
# actual changing of resources could irreparably damage a
# hos... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/group/should_query_all.rb | acceptance/tests/resource/group/should_query_all.rb | test_name "should query all groups"
tag 'audit:high',
'audit:refactor', # Use block style `test_name`
'audit:integration' # Does not modify system running test
agents.each do |agent|
skip_test('this test fails on windows French due to Cygwin/UTF Issues - PUP-8319,IMAGES-492') if agent['platform'] =~ /wind... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/group/should_create.rb | acceptance/tests/resource/group/should_create.rb | test_name "should create a group"
tag 'audit:high',
'audit:refactor', # Use block style `test_name`
'audit:acceptance' # Could be done at the integration (or unit) layer though
# actual changing of resources could irreparably damage a
# host running this, or requi... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/group/should_manage_members.rb | acceptance/tests/resource/group/should_manage_members.rb | test_name "should correctly manage the members property for the Group resource" do
# These are the only platforms whose group providers manage the members
# property
confine :to, :platform => /windows|osx|aix|^el-|fedora/
tag 'audit:high',
'audit:acceptance' # Could be done as integration tests, but woul... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/group/should_query.rb | acceptance/tests/resource/group/should_query.rb | test_name "test that we can query and find a group that exists."
tag 'audit:high',
'audit:refactor', # Use block style `test_name`
'audit:acceptance' # Could be done at the integration (or unit) layer though
# actual changing of resources could irreparably damage a
... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/package/yum.rb | acceptance/tests/resource/package/yum.rb | test_name "test the yum package provider" do
confine :to, {:platform => /(?:centos|el-|fedora)/}, agents
# Skipping tests if facter finds this is an ec2 host, PUP-7774
agents.each do |agent|
skip_test('Skipping EC2 Hosts') if fact_on(agent, 'ec2_metadata')
end
# Upgrade the AlmaLinux release package for... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/package/does_not_exist.rb | acceptance/tests/resource/package/does_not_exist.rb | # Redmine (#22529)
test_name "Puppet returns only resource package declaration when querying an uninstalled package" do
tag 'audit:high',
'audit:acceptance' # Could be done at the integration (or unit) layer though
# actual changing of resources could irreparably damage a
... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/package/common_package_name_in_different_providers.rb | acceptance/tests/resource/package/common_package_name_in_different_providers.rb | test_name "ticket 1073: common package name in two different providers should be allowed" do
confine :to, {:platform => /(?:centos|el-|fedora)/}, agents
# Skipping tests if facter finds this is an ec2 host, PUP-7774
agents.each do |agent|
skip_test('Skipping EC2 Hosts') if fact_on(agent, 'ec2_metadata')
en... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
puppetlabs/puppet | https://github.com/puppetlabs/puppet/blob/e227c27540975c25aa22d533a52424a9d2fc886a/acceptance/tests/resource/package/windows.rb | acceptance/tests/resource/package/windows.rb | test_name "Windows Package Provider" do
confine :to, :platform => 'windows'
tag 'audit:high',
'audit:acceptance'
require 'puppet/acceptance/windows_utils'
extend Puppet::Acceptance::WindowsUtils
def package_manifest(name, params, installer_source)
params_str = params.map do |param, value|
v... | ruby | Apache-2.0 | e227c27540975c25aa22d533a52424a9d2fc886a | 2026-01-04T15:39:26.576514Z | false |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.