modulesync 7.2.0 #91
ci.yml
on: pull_request
Puppet
/
Static validations
22s
Matrix: Puppet / acceptance
Matrix: Puppet / unit
Puppet
/
Test suite
0s
Annotations
4 errors
Puppet / 8 (Ruby 3.2):
spec/classes/os_spec.rb#L49
unattended_upgrades on debian-12-x86_64 is expected to contain File[/etc/apt/apt.conf.d/50unattended-upgrades] with content =~ /Unattended-Upgrade::Origins-Pattern\ {\n
\t"origin=Debian,codename=\${distro_codename},label=Debian";\n
\t"origin=Debian,codename=\${distro_codename},label=Debian-Security";\n
};/x
Failure/Error:
is_expected.to create_file(file_unattended).with_content(
/Unattended-Upgrade::Origins-Pattern\ {\n
\t"origin=Debian,codename=\${distro_codename},label=Debian";\n
\t"origin=Debian,codename=\${distro_codename},label=Debian-Security";\n
};/x
)
expected that the catalogue would contain File[/etc/apt/apt.conf.d/50unattended-upgrades] with content set to /Unattended-Upgrade::Origins-Pattern\ {\n
\t"origin=Debian,codename=\${distro_codename},label=Debian";\n
\t"origin=Debian,codename=\${distro_codename},label=Debian-Security";\n
};/x but it is set to "// This file is managed by Puppet. DO NOT EDIT.\n// Automatically upgrade packages from these (origin:archive) pairs\n//\n// Note that in Ubuntu security updates may pull in new dependencies\n// from non-security sources (e.g. chromium). By allowing the release\n// pocket these get automatically pulled in.\nUnattended-Upgrade::Origins-Pattern {\n\t\"origin=Debian,codename=${distro_codename},label=Debian\";\n\t\"origin=Debian,codename=${distro_codename}-security,label=Debian-Security\";\n};\n\n// List of packages to not update (regexp are supported)\nUnattended-Upgrade::Package-Blacklist {\n};\n\n// List of days in the week that updates should be applied.\n// The days can be specified as localized abbreviated or full names.\n// Or as integers where \"0\" is Sunday, \"1\" is Monday etc.\n// Require Unattended-upgrades version >=0.91 to work, else it is ignored\nUnattended-Upgrade::Update-Days {\n};\n\n// This option allows you to control if on a unclean dpkg exit\n// unattended-upgrades will automatically run\n// dpkg --force-confold --configure -a\n// The default is true, to ensure updates keep getting installed\nUnattended-Upgrade::AutoFixInterruptedDpkg \"true\";\n\n// Split the upgrade into the smallest possible chunks so that\n// they can be interrupted with SIGTERM. This makes the upgrade\n// a bit slower but it has the benefit that shutdown while a upgrade\n// is running is possible (with a small delay)\nUnattended-Upgrade::MinimalSteps \"true\";\n\n// Install all unattended-upgrades when the machine is shuting down\n// instead of doing it in the background while the machine is running\n// This will (obviously) make shutdown slower\nUnattended-Upgrade::InstallOnShutdown \"false\";\n\n\n\n\n// Do automatic removal of new unused dependencies after the upgrade\n// (equivalent to apt-get autoremove)\nUnattended-Upgrade::Remove-Unused-Dependencies \"true\";\n\n// Automatically reboot *WITHOUT CONFIRMATION*\n// if the file /var/run/reboot-required is found after the upgrade\nUnattended-Upgrade::Automatic-Reboot \"false\";\n\n// Automatically reboot even if there are users currently logged in\n// when Unattended-Upgrade::Automatic-Reboot is set to true\nUnattended-Upgrade::Automatic-Reboot-WithUsers \"true\";\n\n// If automatic reboot is enabled and needed, reboot at the specific\n// time instead of immediately\n// Default: \"now\"\nUnattended-Upgrade::Automatic-Reboot-Time \"now\";\n\n\n\n\n\n"
Diff:
@@ -1,5 +1,59 @@
-(?x-mi:Unattended-Upgrade::Origins-Pattern\ {\n
- \t"origin=Debian,codename=\${distro_codename},label=Debian";\n
- \t"origin=Debian,codename=\${distro_codename},label=Debian-Security";\n
- };)
+// This file is managed by Puppet. DO NOT EDIT.
+// Automatically upgrade packages from these (origin:archive) pairs
+//
+// Note that in Ubuntu security updates may pull in new dependencies
+// from non-security sources (e.g. chromium). By allowing the release
+// pocket these get automatically pulled in.
+Unattended-Upgrade::Origins-Pattern {
+ "origin=Debian,codename=${distro
|
Puppet / 8 (Ruby 3.2)
Process completed with exit code 1.
|
Puppet / 7 (Ruby 2.7):
spec/classes/os_spec.rb#L49
unattended_upgrades on debian-12-x86_64 is expected to contain File[/etc/apt/apt.conf.d/50unattended-upgrades] with content =~ /Unattended-Upgrade::Origins-Pattern\ {\n
\t"origin=Debian,codename=\${distro_codename},label=Debian";\n
\t"origin=Debian,codename=\${distro_codename},label=Debian-Security";\n
};/x
Failure/Error:
is_expected.to create_file(file_unattended).with_content(
/Unattended-Upgrade::Origins-Pattern\ {\n
\t"origin=Debian,codename=\${distro_codename},label=Debian";\n
\t"origin=Debian,codename=\${distro_codename},label=Debian-Security";\n
};/x
)
expected that the catalogue would contain File[/etc/apt/apt.conf.d/50unattended-upgrades] with content set to /Unattended-Upgrade::Origins-Pattern\ {\n
\t"origin=Debian,codename=\${distro_codename},label=Debian";\n
\t"origin=Debian,codename=\${distro_codename},label=Debian-Security";\n
};/x but it is set to "// This file is managed by Puppet. DO NOT EDIT.\n// Automatically upgrade packages from these (origin:archive) pairs\n//\n// Note that in Ubuntu security updates may pull in new dependencies\n// from non-security sources (e.g. chromium). By allowing the release\n// pocket these get automatically pulled in.\nUnattended-Upgrade::Origins-Pattern {\n\t\"origin=Debian,codename=${distro_codename},label=Debian\";\n\t\"origin=Debian,codename=${distro_codename}-security,label=Debian-Security\";\n};\n\n// List of packages to not update (regexp are supported)\nUnattended-Upgrade::Package-Blacklist {\n};\n\n// List of days in the week that updates should be applied.\n// The days can be specified as localized abbreviated or full names.\n// Or as integers where \"0\" is Sunday, \"1\" is Monday etc.\n// Require Unattended-upgrades version >=0.91 to work, else it is ignored\nUnattended-Upgrade::Update-Days {\n};\n\n// This option allows you to control if on a unclean dpkg exit\n// unattended-upgrades will automatically run\n// dpkg --force-confold --configure -a\n// The default is true, to ensure updates keep getting installed\nUnattended-Upgrade::AutoFixInterruptedDpkg \"true\";\n\n// Split the upgrade into the smallest possible chunks so that\n// they can be interrupted with SIGTERM. This makes the upgrade\n// a bit slower but it has the benefit that shutdown while a upgrade\n// is running is possible (with a small delay)\nUnattended-Upgrade::MinimalSteps \"true\";\n\n// Install all unattended-upgrades when the machine is shuting down\n// instead of doing it in the background while the machine is running\n// This will (obviously) make shutdown slower\nUnattended-Upgrade::InstallOnShutdown \"false\";\n\n\n\n\n// Do automatic removal of new unused dependencies after the upgrade\n// (equivalent to apt-get autoremove)\nUnattended-Upgrade::Remove-Unused-Dependencies \"true\";\n\n// Automatically reboot *WITHOUT CONFIRMATION*\n// if the file /var/run/reboot-required is found after the upgrade\nUnattended-Upgrade::Automatic-Reboot \"false\";\n\n// Automatically reboot even if there are users currently logged in\n// when Unattended-Upgrade::Automatic-Reboot is set to true\nUnattended-Upgrade::Automatic-Reboot-WithUsers \"true\";\n\n// If automatic reboot is enabled and needed, reboot at the specific\n// time instead of immediately\n// Default: \"now\"\nUnattended-Upgrade::Automatic-Reboot-Time \"now\";\n\n\n\n\n\n"
Diff:
@@ -1,5 +1,59 @@
-(?x-mi:Unattended-Upgrade::Origins-Pattern\ {\n
- \t"origin=Debian,codename=\${distro_codename},label=Debian";\n
- \t"origin=Debian,codename=\${distro_codename},label=Debian-Security";\n
- };)
+// This file is managed by Puppet. DO NOT EDIT.
+// Automatically upgrade packages from these (origin:archive) pairs
+//
+// Note that in Ubuntu security updates may pull in new dependencies
+// from non-security sources (e.g. chromium). By allowing the release
+// pocket these get automatically pulled in.
+Unattended-Upgrade::Origins-Pattern {
+ "origin=Debian,codename=${distro
|
Puppet / 7 (Ruby 2.7)
Process completed with exit code 1.
|